connman.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
* [PATCH v1] dnsproxy: fix debug logging
@ 2022-04-11 16:58 Ryan Smith
  2022-04-14 18:51 ` Daniel Wagner
  0 siblings, 1 reply; 4+ messages in thread
From: Ryan Smith @ 2022-04-11 16:58 UTC (permalink / raw)
  To: connman; +Cc: Ryan Smith

This fixes the debug logging by compilation unit just as it
is done with all of the other files in src/.
---
 src/dnsproxy.c | 157 ++++++++++++++++++++++++-------------------------
 1 file changed, 78 insertions(+), 79 deletions(-)

diff --git a/src/dnsproxy.c b/src/dnsproxy.c
index 22730047..5589feeb 100644
--- a/src/dnsproxy.c
+++ b/src/dnsproxy.c
@@ -40,8 +40,7 @@
 #include <glib.h>
 
 #include "connman.h"
-
-#define debug(fmt...) do { } while (0)
+#include "connman/log.h"
 
 #if __BYTE_ORDER == __LITTLE_ENDIAN
 struct domain_hdr {
@@ -290,7 +289,7 @@ static struct server_data *find_server(int index,
 {
 	GSList *list;
 
-	debug("index %d server %s proto %d", index, server, protocol);
+	DBG("index %d server %s proto %d", index, server, protocol);
 
 	for (list = server_list; list; list = list->next) {
 		struct server_data *data = list->data;
@@ -341,14 +340,14 @@ static void refresh_dns_entry(struct cache_entry *entry, char *name)
 	}
 
 	if (!entry->ipv4) {
-		debug("Refreshing A record for %s", name);
+		DBG("Refreshing A record for %s", name);
 		g_resolv_lookup_hostname(ipv4_resolve, name,
 					dummy_resolve_func, NULL);
 		age = 4;
 	}
 
 	if (!entry->ipv6) {
-		debug("Refreshing AAAA record for %s", name);
+		DBG("Refreshing AAAA record for %s", name);
 		g_resolv_lookup_hostname(ipv6_resolve, name,
 					dummy_resolve_func, NULL);
 		age = 4;
@@ -460,7 +459,7 @@ static void send_cached_response(int sk, unsigned char *buf, int len,
 	else
 		update_cached_ttl((unsigned char *)hdr, adj_len, ttl);
 
-	debug("sk %d id 0x%04x answers %d ptr %p length %d dns %d",
+	DBG("sk %d id 0x%04x answers %d ptr %p length %d dns %d",
 		sk, hdr->id, answers, ptr, len, dns_len);
 
 	err = sendto(sk, ptr, len, MSG_NOSIGNAL, to, tolen);
@@ -472,7 +471,7 @@ static void send_cached_response(int sk, unsigned char *buf, int len,
 
 	if (err != len || (dns_len != (len - 2) && protocol == IPPROTO_TCP) ||
 				(dns_len != len && protocol == IPPROTO_UDP))
-		debug("Packet length mismatch, sent %d wanted %d dns %d",
+		DBG("Packet length mismatch, sent %d wanted %d dns %d",
 			err, len, dns_len);
 }
 
@@ -484,7 +483,7 @@ static void send_response(int sk, unsigned char *buf, size_t len,
 	int err;
 	size_t offset = protocol_offset(protocol);
 
-	debug("sk %d", sk);
+	DBG("sk %d", sk);
 
 	if (len < sizeof(*hdr) + offset)
 		return;
@@ -495,7 +494,7 @@ static void send_response(int sk, unsigned char *buf, size_t len,
 		buf[1] = sizeof(*hdr);
 	}
 
-	debug("id 0x%04x qr %d opcode %d", hdr->id, hdr->qr, hdr->opcode);
+	DBG("id 0x%04x qr %d opcode %d", hdr->id, hdr->qr, hdr->opcode);
 
 	hdr->qr = 1;
 	hdr->rcode = ns_r_servfail;
@@ -548,7 +547,7 @@ static gboolean request_timeout(gpointer user_data)
 	if (!req)
 		return FALSE;
 
-	debug("id 0x%04x", req->srcid);
+	DBG("id 0x%04x", req->srcid);
 
 	request_list = g_slist_remove(request_list, req);
 
@@ -590,7 +589,7 @@ static gboolean request_timeout(gpointer user_data)
 	 * if we get a request timeout from server.
 	 */
 	if (req->protocol == IPPROTO_TCP) {
-		debug("client %d removed", req->client_sk);
+		DBG("client %d removed", req->client_sk);
 		g_hash_table_remove(partial_tcp_req_table,
 				GINT_TO_POINTER(req->client_sk));
 	}
@@ -608,7 +607,7 @@ static int append_query(unsigned char *buf, unsigned int size,
 	unsigned char *ptr = buf;
 	int len;
 
-	debug("query %s domain %s", query, domain);
+	DBG("query %s domain %s", query, domain);
 
 	while (query) {
 		const char *tmp;
@@ -678,7 +677,7 @@ static void cache_enforce_validity(struct cache_entry *entry)
 
 	if (!cache_check_is_valid(entry->ipv4, current_time)
 							&& entry->ipv4) {
-		debug("cache timeout \"%s\" type A", entry->key);
+		DBG("cache timeout \"%s\" type A", entry->key);
 		g_free(entry->ipv4->data);
 		g_free(entry->ipv4);
 		entry->ipv4 = NULL;
@@ -687,7 +686,7 @@ static void cache_enforce_validity(struct cache_entry *entry)
 
 	if (!cache_check_is_valid(entry->ipv6, current_time)
 							&& entry->ipv6) {
-		debug("cache timeout \"%s\" type AAAA", entry->key);
+		DBG("cache timeout \"%s\" type AAAA", entry->key);
 		g_free(entry->ipv6->data);
 		g_free(entry->ipv6);
 		entry->ipv6 = NULL;
@@ -712,7 +711,7 @@ static uint16_t cache_check_validity(char *question, uint16_t type,
 	switch (type) {
 	case 1:		/* IPv4 */
 		if (!cache_check_is_valid(entry->ipv4, current_time)) {
-			debug("cache %s \"%s\" type A", entry->ipv4 ?
+			DBG("cache %s \"%s\" type A", entry->ipv4 ?
 					"timeout" : "entry missing", question);
 
 			if (want_refresh)
@@ -731,7 +730,7 @@ static uint16_t cache_check_validity(char *question, uint16_t type,
 
 	case 28:	/* IPv6 */
 		if (!cache_check_is_valid(entry->ipv6, current_time)) {
-			debug("cache %s \"%s\" type AAAA", entry->ipv6 ?
+			DBG("cache %s \"%s\" type AAAA", entry->ipv6 ?
 					"timeout" : "entry missing", question);
 
 			if (want_refresh)
@@ -777,7 +776,7 @@ static gboolean try_remove_cache(gpointer user_data)
 	cache_timer = 0;
 
 	if (__sync_fetch_and_sub(&cache_refcount, 1) == 1) {
-		debug("No cache users, removing it.");
+		DBG("No cache users, removing it.");
 
 		g_hash_table_destroy(cache);
 		cache = NULL;
@@ -990,7 +989,7 @@ static int parse_response(unsigned char *buf, int buflen,
 	if (buflen < 12)
 		return -EINVAL;
 
-	debug("qr %d qdcount %d", hdr->qr, qdcount);
+	DBG("qr %d qdcount %d", hdr->qr, qdcount);
 
 	/* We currently only cache responses where question count is 1 */
 	if (hdr->qr != 1 || qdcount != 1)
@@ -1236,7 +1235,7 @@ static void cache_cleanup(void)
 		count = g_hash_table_foreach_remove(cache, cache_check_entry,
 						&data);
 	}
-	debug("removed %d in the first pass", count);
+	DBG("removed %d in the first pass", count);
 
 	/*
 	 * In the second pass, if the first pass turned up blank,
@@ -1300,7 +1299,7 @@ static gboolean cache_invalidate_entry(gpointer key, gpointer value,
  */
 static void cache_invalidate(void)
 {
-	debug("Invalidating the DNS cache %p", cache);
+	DBG("Invalidating the DNS cache %p", cache);
 
 	if (!cache)
 		return;
@@ -1332,7 +1331,7 @@ static void cache_refresh_entry(struct cache_entry *entry)
 			*c = '.';
 			c += jump + 1;
 		}
-		debug("Refreshing %s\n", dns_name);
+		DBG("Refreshing %s\n", dns_name);
 		/* then refresh the hostname */
 		refresh_dns_entry(entry, &dns_name[1]);
 	}
@@ -1406,7 +1405,7 @@ static int cache_update(struct server_data *srv, unsigned char *msg,
 		next_refresh = current_time + 30;
 	}
 
-	debug("offset %zd hdr %p msg %p rcode %d", offset, hdr, msg, hdr->rcode);
+	DBG("offset %zd hdr %p msg %p rcode %d", offset, hdr, msg, hdr->rcode);
 
 	/* Continue only if response code is 0 (=ok) */
 	if (hdr->rcode != ns_r_noerror)
@@ -1586,7 +1585,7 @@ static int cache_update(struct server_data *srv, unsigned char *msg,
 		cache_size++;
 	}
 
-	debug("cache %d %squestion \"%s\" type %d ttl %d size %zd packet %u "
+	DBG("cache %d %squestion \"%s\" type %d ttl %d size %zd packet %u "
 								"dns len %u",
 		cache_size, new_entry ? "new " : "old ",
 		question, type, ttl,
@@ -1612,7 +1611,7 @@ static int ns_resolv(struct server_data *server, struct request_data *req,
 		int ttl_left = 0;
 		struct cache_data *data;
 
-		debug("cache hit %s type %s", lookup, type == 1 ? "A" : "AAAA");
+		DBG("cache hit %s type %s", lookup, type == 1 ? "A" : "AAAA");
 		if (type == 1)
 			data = entry->ipv4;
 		else
@@ -1649,7 +1648,7 @@ static int ns_resolv(struct server_data *server, struct request_data *req,
 	err = sendto(sk, request, req->request_len, MSG_NOSIGNAL,
 			server->server_addr, server->server_addr_len);
 	if (err < 0) {
-		debug("Cannot send message to server %s sock %d "
+		DBG("Cannot send message to server %s sock %d "
 			"protocol %d (%s/%d)",
 			server->server, sk, server->protocol,
 			strerror(errno), errno);
@@ -1706,7 +1705,7 @@ static int ns_resolv(struct server_data *server, struct request_data *req,
 			alt[1] = req_len & 0xff;
 		}
 
-		debug("req %p dstid 0x%04x altid 0x%04x", req, req->dstid,
+		DBG("req %p dstid 0x%04x altid 0x%04x", req, req->dstid,
 				req->altid);
 
 		err = send(sk, alt, req->request_len + domlen, MSG_NOSIGNAL);
@@ -1728,7 +1727,7 @@ static char *convert_label(char *start, char *end, char *ptr, char *uptr,
 	pos = dn_expand((u_char *)start, (u_char *)end, (u_char *)ptr,
 			name, NS_MAXLABEL);
 	if (pos < 0) {
-		debug("uncompress error [%d/%s]", errno, strerror(errno));
+		DBG("uncompress error [%d/%s]", errno, strerror(errno));
 		goto out;
 	}
 
@@ -1738,7 +1737,7 @@ static char *convert_label(char *start, char *end, char *ptr, char *uptr,
 	 */
 	comp_pos = dn_comp(name, (u_char *)uptr, remaining_len, NULL, NULL);
 	if (comp_pos < 0) {
-		debug("compress error [%d/%s]", errno, strerror(errno));
+		DBG("compress error [%d/%s]", errno, strerror(errno));
 		goto out;
 	}
 
@@ -1758,7 +1757,7 @@ static char *uncompress(int16_t field_count, char *start, char *end,
 	char *uptr = *uncompressed_ptr; /* position in result buffer */
 	char * const uncomp_end = uncompressed + uncomp_len - 1;
 
-	debug("count %d ptr %p end %p uptr %p", field_count, ptr, end, uptr);
+	DBG("count %d ptr %p end %p uptr %p", field_count, ptr, end, uptr);
 
 	while (field_count-- > 0 && ptr < end) {
 		int dlen;		/* data field length */
@@ -1782,7 +1781,7 @@ static char *uncompress(int16_t field_count, char *start, char *end,
 			goto out;
 		memcpy(uptr, name, ulen);
 
-		debug("pos %d ulen %d left %d name %s", pos, ulen,
+		DBG("pos %d ulen %d left %d name %s", pos, ulen,
 			(int)(uncomp_end - (uptr + ulen)), uptr);
 
 		uptr += ulen;
@@ -1794,7 +1793,7 @@ static char *uncompress(int16_t field_count, char *start, char *end,
 		 * ttl, address length and the address)
 		 */
 		if ((uptr + NS_RRFIXEDSZ) > uncomp_end) {
-			debug("uncompressed data too large for buffer");
+			DBG("uncompressed data too large for buffer");
 			goto out;
 		}
 		memcpy(uptr, ptr, NS_RRFIXEDSZ);
@@ -1829,7 +1828,7 @@ static char *uncompress(int16_t field_count, char *start, char *end,
 			dlen = uptr[-2] << 8 | uptr[-1];
 
 			if ((ptr + dlen) > end || (uptr + dlen) > uncomp_end) {
-				debug("data len %d too long", dlen);
+				DBG("data len %d too long", dlen);
 				goto out;
 			}
 
@@ -1868,7 +1867,7 @@ static char *uncompress(int16_t field_count, char *start, char *end,
 			 * limit and minimum ttl). They are 20 bytes long.
 			 */
 			if ((uptr + 20) > uncomp_end || (ptr + 20) > end) {
-				debug("soa record too long");
+				DBG("soa record too long");
 				goto out;
 			}
 			memcpy(uptr, ptr, 20);
@@ -1949,13 +1948,13 @@ static int forward_dns_reply(unsigned char *reply, int reply_len, int protocol,
 	hdr = (void *)(reply + offset);
 	dns_id = reply[offset] | reply[offset + 1] << 8;
 
-	debug("Received %d bytes (id 0x%04x)", reply_len, dns_id);
+	DBG("Received %d bytes (id 0x%04x)", reply_len, dns_id);
 
 	req = find_request(dns_id);
 	if (!req)
 		return -EINVAL;
 
-	debug("req %p dstid 0x%04x altid 0x%04x rcode %d",
+	DBG("req %p dstid 0x%04x altid 0x%04x rcode %d",
 			req, req->dstid, req->altid, hdr->rcode);
 
 	reply[offset] = req->srcid & 0xff;
@@ -2021,7 +2020,7 @@ static int forward_dns_reply(unsigned char *reply, int reply_len, int protocol,
 							ptr[dns_type_pos + 3];
 			if (dns_type != ns_t_a && dns_type != ns_t_aaaa &&
 					dns_class != ns_c_in) {
-				debug("Pass msg dns type %d class %d",
+				DBG("Pass msg dns type %d class %d",
 					dns_type, dns_class);
 				goto pass;
 			}
@@ -2116,7 +2115,7 @@ static int forward_dns_reply(unsigned char *reply, int reply_len, int protocol,
 				new_len = strip_domains(uncompressed, answers,
 							uptr - answers);
 				if (new_len < 0) {
-					debug("Corrupted packet");
+					DBG("Corrupted packet");
 					return -EINVAL;
 				}
 
@@ -2184,10 +2183,10 @@ out:
 	}
 
 	if (err < 0)
-		debug("Cannot send msg, sk %d proto %d errno %d/%s", sk,
+		DBG("Cannot send msg, sk %d proto %d errno %d/%s", sk,
 			protocol, errno, strerror(errno));
 	else
-		debug("proto %d sent %d bytes to %d", protocol, err, sk);
+		DBG("proto %d sent %d bytes to %d", protocol, err, sk);
 
 	destroy_request_data(req);
 
@@ -2196,7 +2195,7 @@ out:
 
 static void server_destroy_socket(struct server_data *data)
 {
-	debug("index %d server %s proto %d", data->index,
+	DBG("index %d server %s proto %d", data->index,
 					data->server, data->protocol);
 
 	if (data->watch > 0) {
@@ -2221,7 +2220,7 @@ static void server_destroy_socket(struct server_data *data)
 
 static void destroy_server(struct server_data *server)
 {
-	debug("index %d server %s sock %d", server->index, server->server,
+	DBG("index %d server %s sock %d", server->index, server->server,
 			server->channel ?
 			g_io_channel_unix_get_fd(server->channel): -1);
 
@@ -2229,7 +2228,7 @@ static void destroy_server(struct server_data *server)
 	server_destroy_socket(server);
 
 	if (server->protocol == IPPROTO_UDP && server->enabled)
-		debug("Removing DNS server %s", server->server);
+		DBG("Removing DNS server %s", server->server);
 
 	g_free(server->server);
 	g_list_free_full(server->domains, g_free);
@@ -2285,7 +2284,7 @@ static gboolean tcp_server_event(GIOChannel *channel, GIOCondition condition,
 	if (condition & (G_IO_NVAL | G_IO_ERR | G_IO_HUP)) {
 		GSList *list;
 hangup:
-		debug("TCP server channel closed, sk %d", sk);
+		DBG("TCP server channel closed, sk %d", sk);
 
 		/*
 		 * Discard any partial response which is buffered; better
@@ -2340,7 +2339,7 @@ hangup:
 						domains = domains->next) {
 				char *dom = domains->data;
 
-				debug("Adding domain %s to %s",
+				DBG("Adding domain %s to %s",
 						dom, server->server);
 
 				server->domains = g_list_append(server->domains,
@@ -2372,7 +2371,7 @@ hangup:
 				continue;
 			}
 
-			debug("Sending req %s over TCP", (char *)req->name);
+			DBG("Sending req %s over TCP", (char *)req->name);
 
 			status = ns_resolv(server, req,
 						req->request, req->name);
@@ -2431,7 +2430,7 @@ hangup:
 			reply_len = reply_len_buf[1] | reply_len_buf[0] << 8;
 			reply_len += 2;
 
-			debug("TCP reply %d bytes from %d", reply_len, sk);
+			DBG("TCP reply %d bytes from %d", reply_len, sk);
 
 			reply = g_try_malloc(sizeof(*reply) + reply_len + 2);
 			if (!reply)
@@ -2478,7 +2477,7 @@ static gboolean tcp_idle_timeout(gpointer user_data)
 {
 	struct server_data *server = user_data;
 
-	debug("");
+	DBG("");
 
 	if (!server)
 		return FALSE;
@@ -2493,7 +2492,7 @@ static int server_create_socket(struct server_data *data)
 	int sk, err;
 	char *interface;
 
-	debug("index %d server %s proto %d", data->index,
+	DBG("index %d server %s proto %d", data->index,
 					data->server, data->protocol);
 
 	sk = socket(data->server_addr->sa_family,
@@ -2507,7 +2506,7 @@ static int server_create_socket(struct server_data *data)
 		return -err;
 	}
 
-	debug("sk %d", sk);
+	DBG("sk %d", sk);
 
 	interface = connman_inet_ifname(data->index);
 	if (interface) {
@@ -2695,7 +2694,7 @@ static bool resolv(struct request_data *req,
 			continue;
 		}
 
-		debug("server %s enabled %d", data->server, data->enabled);
+		DBG("server %s enabled %d", data->server, data->enabled);
 
 		if (!data->enabled)
 			continue;
@@ -3018,7 +3017,7 @@ static int parse_request(unsigned char *buf, size_t len,
 	if (!name || !size)
 		return -EINVAL;
 
-	debug("id 0x%04x qr %d opcode %d qdcount %d arcount %d",
+	DBG("id 0x%04x qr %d opcode %d qdcount %d arcount %d",
 					hdr->id, hdr->qr, hdr->opcode,
 							qdcount, arcount);
 
@@ -3072,7 +3071,7 @@ static int parse_request(unsigned char *buf, size_t len,
 		DBG("DNS request with %d garbage bytes", remain);
 	}
 
-	debug("query %s", name);
+	DBG("query %s", name);
 
 	return 0;
 }
@@ -3083,7 +3082,7 @@ static void client_reset(struct tcp_partial_client_data *client)
 		return;
 
 	if (client->channel) {
-		debug("client %d closing",
+		DBG("client %d closing",
 			g_io_channel_unix_get_fd(client->channel));
 
 		g_io_channel_unref(client->channel);
@@ -3127,14 +3126,14 @@ static bool read_tcp_data(struct tcp_partial_client_data *client,
 	client_sk = g_io_channel_unix_get_fd(client->channel);
 
 	if (read_len == 0) {
-		debug("client %d closed, pending %d bytes",
+		DBG("client %d closed, pending %d bytes",
 			client_sk, client->buf_end);
 		g_hash_table_remove(partial_tcp_req_table,
 					GINT_TO_POINTER(client_sk));
 		return false;
 	}
 
-	debug("client %d received %d bytes", client_sk, read_len);
+	DBG("client %d received %d bytes", client_sk, read_len);
 
 	client->buf_end += read_len;
 
@@ -3143,24 +3142,24 @@ static bool read_tcp_data(struct tcp_partial_client_data *client,
 
 	msg_len = get_msg_len(client->buf);
 	if (msg_len > TCP_MAX_BUF_LEN) {
-		debug("client %d sent too much data %d", client_sk, msg_len);
+		DBG("client %d sent too much data %d", client_sk, msg_len);
 		g_hash_table_remove(partial_tcp_req_table,
 					GINT_TO_POINTER(client_sk));
 		return false;
 	}
 
 read_another:
-	debug("client %d msg len %d end %d past end %d", client_sk, msg_len,
+	DBG("client %d msg len %d end %d past end %d", client_sk, msg_len,
 		client->buf_end, client->buf_end - (msg_len + 2));
 
 	if (client->buf_end < (msg_len + 2)) {
-		debug("client %d still missing %d bytes",
+		DBG("client %d still missing %d bytes",
 			client_sk,
 			msg_len + 2 - client->buf_end);
 		return true;
 	}
 
-	debug("client %d all data %d received", client_sk, msg_len);
+	DBG("client %d all data %d received", client_sk, msg_len);
 
 	err = parse_request(client->buf + 2, msg_len,
 			query, sizeof(query));
@@ -3201,7 +3200,7 @@ read_another:
 		int ttl_left = 0;
 		struct cache_data *data;
 
-		debug("cache hit %s type %s", query, qtype == 1 ? "A" : "AAAA");
+		DBG("cache hit %s type %s", query, qtype == 1 ? "A" : "AAAA");
 		if (qtype == 1)
 			data = entry->ipv4;
 		else
@@ -3218,7 +3217,7 @@ read_another:
 			g_free(req);
 			goto out;
 		} else
-			debug("data missing, ignoring cache for this query");
+			DBG("data missing, ignoring cache for this query");
 	}
 
 	for (list = server_list; list; list = list->next) {
@@ -3273,7 +3272,7 @@ read_another:
 
 out:
 	if (client->buf_end > (msg_len + 2)) {
-		debug("client %d buf %p -> %p end %d len %d new %d",
+		DBG("client %d buf %p -> %p end %d len %d new %d",
 			client_sk,
 			client->buf + msg_len + 2,
 			client->buf, client->buf_end,
@@ -3289,12 +3288,12 @@ out:
 		 */
 		msg_len = get_msg_len(client->buf);
 		if ((msg_len + 2) == client->buf_end) {
-			debug("client %d reading another %d bytes", client_sk,
+			DBG("client %d reading another %d bytes", client_sk,
 								msg_len + 2);
 			goto read_another;
 		}
 	} else {
-		debug("client %d clearing reading buffer", client_sk);
+		DBG("client %d clearing reading buffer", client_sk);
 
 		client->buf_end = 0;
 		memset(client->buf, 0, TCP_MAX_BUF_LEN);
@@ -3356,7 +3355,7 @@ static gboolean tcp_client_event(GIOChannel *channel, GIOCondition condition,
 		if (errno == EAGAIN || errno == EWOULDBLOCK)
 			return TRUE;
 
-		debug("client %d cannot read errno %d/%s", client_sk, -errno,
+		DBG("client %d cannot read errno %d/%s", client_sk, -errno,
 			strerror(errno));
 		g_hash_table_remove(partial_tcp_req_table,
 					GINT_TO_POINTER(client_sk));
@@ -3373,7 +3372,7 @@ static gboolean client_timeout(gpointer user_data)
 
 	sock = g_io_channel_unix_get_fd(client->channel);
 
-	debug("client %d timeout pending %d bytes", sock, client->buf_end);
+	DBG("client %d timeout pending %d bytes", sock, client->buf_end);
 
 	g_hash_table_remove(partial_tcp_req_table, GINT_TO_POINTER(sock));
 
@@ -3396,7 +3395,7 @@ static bool tcp_listener_event(GIOChannel *channel, GIOCondition condition,
 	struct timeval tv;
 	fd_set readfds;
 
-	debug("condition 0x%02x channel %p ifdata %p family %d",
+	DBG("condition 0x%02x channel %p ifdata %p family %d",
 		condition, channel, ifdata, family);
 
 	if (condition & (G_IO_NVAL | G_IO_ERR | G_IO_HUP)) {
@@ -3426,9 +3425,9 @@ static bool tcp_listener_event(GIOChannel *channel, GIOCondition condition,
 	select(sk + 1, &readfds, NULL, NULL, &tv);
 	if (FD_ISSET(sk, &readfds)) {
 		client_sk = accept(sk, client_addr, client_addr_len);
-		debug("client %d accepted", client_sk);
+		DBG("client %d accepted", client_sk);
 	} else {
-		debug("No data to read from master %d, waiting.", sk);
+		DBG("No data to read from master %d, waiting.", sk);
 		return true;
 	}
 
@@ -3462,9 +3461,9 @@ static bool tcp_listener_event(GIOChannel *channel, GIOCondition condition,
 
 		client->ifdata = ifdata;
 
-		debug("client %d created %p", client_sk, client);
+		DBG("client %d created %p", client_sk, client);
 	} else {
-		debug("client %d already exists %p", client_sk, client);
+		DBG("client %d already exists %p", client_sk, client);
 	}
 
 	if (!client->buf) {
@@ -3488,11 +3487,11 @@ static bool tcp_listener_event(GIOChannel *channel, GIOCondition condition,
 	len = recv(client_sk, client->buf, TCP_MAX_BUF_LEN, 0);
 	if (len < 0) {
 		if (errno == EAGAIN || errno == EWOULDBLOCK) {
-			debug("client %d no data to read, waiting", client_sk);
+			DBG("client %d no data to read, waiting", client_sk);
 			return true;
 		}
 
-		debug("client %d cannot read errno %d/%s", client_sk, -errno,
+		DBG("client %d cannot read errno %d/%s", client_sk, -errno,
 			strerror(errno));
 		g_hash_table_remove(partial_tcp_req_table,
 					GINT_TO_POINTER(client_sk));
@@ -3500,14 +3499,14 @@ static bool tcp_listener_event(GIOChannel *channel, GIOCondition condition,
 	}
 
 	if (len < 2) {
-		debug("client %d not enough data to read, waiting", client_sk);
+		DBG("client %d not enough data to read, waiting", client_sk);
 		client->buf_end += len;
 		return true;
 	}
 
 	msg_len = get_msg_len(client->buf);
 	if (msg_len > TCP_MAX_BUF_LEN) {
-		debug("client %d invalid message length %u ignoring packet",
+		DBG("client %d invalid message length %u ignoring packet",
 			client_sk, msg_len);
 		g_hash_table_remove(partial_tcp_req_table,
 					GINT_TO_POINTER(client_sk));
@@ -3519,7 +3518,7 @@ static bool tcp_listener_event(GIOChannel *channel, GIOCondition condition,
 	 * that is the reason to -2 below.
 	 */
 	if (msg_len != (unsigned int)(len - 2)) {
-		debug("client %d sent %d bytes but expecting %u pending %d",
+		DBG("client %d sent %d bytes but expecting %u pending %d",
 			client_sk, len, msg_len + 2, msg_len + 2 - len);
 
 		client->buf_end += len;
@@ -3583,7 +3582,7 @@ static bool udp_listener_event(GIOChannel *channel, GIOCondition condition,
 	if (len < 2)
 		return true;
 
-	debug("Received %d bytes (id 0x%04x)", len, buf[0] | buf[1] << 8);
+	DBG("Received %d bytes (id 0x%04x)", len, buf[0] | buf[1] << 8);
 
 	err = parse_request(buf, len, query, sizeof(query));
 	if (err < 0 || (g_slist_length(server_list) == 0)) {
@@ -3660,7 +3659,7 @@ static GIOChannel *get_listener(int family, int protocol, int index)
 	int sk, type;
 	char *interface;
 
-	debug("family %d protocol %d index %d", family, protocol, index);
+	DBG("family %d protocol %d index %d", family, protocol, index);
 
 	switch (protocol) {
 	case IPPROTO_UDP:
@@ -3895,7 +3894,7 @@ static void destroy_listener(struct listener_data *ifdata)
 	for (list = request_list; list; list = list->next) {
 		struct request_data *req = list->data;
 
-		debug("Dropping request (id 0x%04x -> 0x%04x)",
+		DBG("Dropping request (id 0x%04x -> 0x%04x)",
 						req->srcid, req->dstid);
 		destroy_request_data(req);
 		list->data = NULL;
-- 
2.25.1


^ permalink raw reply related	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2022-05-16  6:35 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-04-11 16:58 [PATCH v1] dnsproxy: fix debug logging Ryan Smith
2022-04-14 18:51 ` Daniel Wagner
2022-04-14 20:45   ` Ryan Smith
2022-05-16  6:35     ` Daniel Wagner

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).