From 29c5a43aff4fa59d2dce8878acf0b9af76c72948 Mon Sep 17 00:00:00 2001 From: Simon Rettberg Date: Mon, 9 Jul 2018 23:41:48 +0200 Subject: [SERVER] Reduce debug spam --- src/server/net.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/src/server/net.c b/src/server/net.c index 6fa536f..376af6f 100644 --- a/src/server/net.c +++ b/src/server/net.c @@ -79,7 +79,7 @@ static inline bool recv_request_header(int sock, dnbd3_request_t *request) if ( errno == EINTR && ++fails < 10 ) continue; if ( ret >= 0 || ++fails > SOCKET_TIMEOUT_CLIENT_RETRIES ) return false; if ( errno == EAGAIN ) continue; - logadd( LOG_DEBUG1, "Error receiving request: Could not read message header (%d/%d, e=%d)\n", (int)ret, (int)sizeof(*request), errno ); + logadd( LOG_DEBUG2, "Error receiving request: Could not read message header (%d/%d, e=%d)\n", (int)ret, (int)sizeof(*request), errno ); return false; } // Make sure all bytes are in the right order (endianness) @@ -488,7 +488,6 @@ void* net_handleNewConnection(void *clientPtr) } done += sent; } - logadd( LOG_DEBUG2, "Send %i to %s", (int)realBytes, client->hostName ); if ( request.size > (uint32_t)realBytes ) { if ( !sendPadding( client->sock, request.size - (uint32_t)realBytes ) ) { if ( lock ) pthread_mutex_unlock( &client->sendMutex ); -- cgit v1.2.3-55-g7522