diff options
author | Ron Yorston <rmy@pobox.com> | 2019-05-27 11:56:52 +0100 |
---|---|---|
committer | Ron Yorston <rmy@pobox.com> | 2019-05-27 11:56:52 +0100 |
commit | a61949401890cbb33a9d6c4571b51c53460ad438 (patch) | |
tree | 64dedaddb89896d5b1670a421af123670ca2120b /networking/dnsd.c | |
parent | 03a7b173605a890e1db5177ecd5b8dd591081c41 (diff) | |
parent | bcb1fc3e6ca6fe902610f507eaf9b0b58a5c583a (diff) | |
download | busybox-w32-a61949401890cbb33a9d6c4571b51c53460ad438.tar.gz busybox-w32-a61949401890cbb33a9d6c4571b51c53460ad438.tar.bz2 busybox-w32-a61949401890cbb33a9d6c4571b51c53460ad438.zip |
Merge branch 'busybox' into merge
Diffstat (limited to 'networking/dnsd.c')
-rw-r--r-- | networking/dnsd.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/networking/dnsd.c b/networking/dnsd.c index 37a80309d..f2c6bddc6 100644 --- a/networking/dnsd.c +++ b/networking/dnsd.c | |||
@@ -133,7 +133,7 @@ static struct dns_entry *parse_conf_file(const char *fileconf) | |||
133 | } | 133 | } |
134 | 134 | ||
135 | if (OPT_verbose) | 135 | if (OPT_verbose) |
136 | bb_error_msg("name:%s, ip:%s", token[0], token[1]); | 136 | bb_info_msg("name:%s, ip:%s", token[0], token[1]); |
137 | 137 | ||
138 | /* sizeof(*m) includes 1 byte for m->name[0] */ | 138 | /* sizeof(*m) includes 1 byte for m->name[0] */ |
139 | m = xzalloc(sizeof(*m) + strlen(token[0]) + 1); | 139 | m = xzalloc(sizeof(*m) + strlen(token[0]) + 1); |
@@ -438,7 +438,7 @@ static int process_packet(struct dns_entry *conf_data, | |||
438 | answstr = table_lookup(conf_data, type, query_string); | 438 | answstr = table_lookup(conf_data, type, query_string); |
439 | #if DEBUG | 439 | #if DEBUG |
440 | /* Shows lengths instead of dots, unusable for !DEBUG */ | 440 | /* Shows lengths instead of dots, unusable for !DEBUG */ |
441 | bb_error_msg("'%s'->'%s'", query_string, answstr); | 441 | bb_info_msg("'%s'->'%s'", query_string, answstr); |
442 | #endif | 442 | #endif |
443 | outr_rlen = 4; | 443 | outr_rlen = 4; |
444 | if (answstr && type == htons(REQ_PTR)) { | 444 | if (answstr && type == htons(REQ_PTR)) { |
@@ -474,7 +474,7 @@ static int process_packet(struct dns_entry *conf_data, | |||
474 | * RCODE = 0 "success" | 474 | * RCODE = 0 "success" |
475 | */ | 475 | */ |
476 | if (OPT_verbose) | 476 | if (OPT_verbose) |
477 | bb_error_msg("returning positive reply"); | 477 | bb_info_msg("returning positive reply"); |
478 | outr_flags = htons(0x8000 | 0x0400 | 0); | 478 | outr_flags = htons(0x8000 | 0x0400 | 0); |
479 | /* we have one answer */ | 479 | /* we have one answer */ |
480 | head->nansw = htons(1); | 480 | head->nansw = htons(1); |
@@ -539,7 +539,7 @@ int dnsd_main(int argc UNUSED_PARAM, char **argv) | |||
539 | 539 | ||
540 | { | 540 | { |
541 | char *p = xmalloc_sockaddr2dotted(&lsa->u.sa); | 541 | char *p = xmalloc_sockaddr2dotted(&lsa->u.sa); |
542 | bb_error_msg("accepting UDP packets on %s", p); | 542 | bb_info_msg("accepting UDP packets on %s", p); |
543 | free(p); | 543 | free(p); |
544 | } | 544 | } |
545 | 545 | ||
@@ -557,7 +557,7 @@ int dnsd_main(int argc UNUSED_PARAM, char **argv) | |||
557 | continue; | 557 | continue; |
558 | } | 558 | } |
559 | if (OPT_verbose) | 559 | if (OPT_verbose) |
560 | bb_error_msg("got UDP packet"); | 560 | bb_info_msg("got UDP packet"); |
561 | buf[r] = '\0'; /* paranoia */ | 561 | buf[r] = '\0'; /* paranoia */ |
562 | r = process_packet(conf_data, conf_ttl, buf); | 562 | r = process_packet(conf_data, conf_ttl, buf); |
563 | if (r <= 0) | 563 | if (r <= 0) |