From 1b756879001c702f5294031e833d5ad83f0c2bcd Mon Sep 17 00:00:00 2001 From: liangqi Date: Wed, 25 Jun 2025 11:48:27 +0800 Subject: [PATCH] fix log over limit Signed-off-by: liangqi --- adapter/uhdf2/hdi/src/servstat_listener_stub.cpp | 2 +- adapter/uhdf2/shared/src/dev_attribute_serialize.c | 2 +- interfaces/inner_api/hdi/base/hdi_smq.h | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/adapter/uhdf2/hdi/src/servstat_listener_stub.cpp b/adapter/uhdf2/hdi/src/servstat_listener_stub.cpp index 9d8ac76fb..be06dde66 100644 --- a/adapter/uhdf2/hdi/src/servstat_listener_stub.cpp +++ b/adapter/uhdf2/hdi/src/servstat_listener_stub.cpp @@ -57,7 +57,7 @@ int32_t ServStatListenerStub::ServStatListenerStubOnReceive( const char *info = data.ReadCString(); status.info = (info == nullptr) ? "" : info; - HDF_LOGI("call OnReceive, %{public}s, %{public}d", status.serviceName.c_str(), status.status); + HDF_LOGD("call OnReceive, %{public}s, %{public}d", status.serviceName.c_str(), status.status); OnReceive(status); return HDF_SUCCESS; } diff --git a/adapter/uhdf2/shared/src/dev_attribute_serialize.c b/adapter/uhdf2/shared/src/dev_attribute_serialize.c index d8eea9c7a..072f4d458 100644 --- a/adapter/uhdf2/shared/src/dev_attribute_serialize.c +++ b/adapter/uhdf2/shared/src/dev_attribute_serialize.c @@ -121,7 +121,7 @@ struct HdfDeviceInfo *DeviceAttributeDeserialize(struct HdfSBuf *sbuf) } if (attribute->deviceMatchAttr == NULL) { - HDF_LOGW("OsalMemCalloc failed, attribute->deviceMatchAttr is null"); + HDF_LOGD("OsalMemCalloc failed, attribute->deviceMatchAttr is null"); } if (!HdfSbufReadUint32(sbuf, &attribute->deviceId) || !HdfSbufReadUint16(sbuf, &attribute->policy)) { diff --git a/interfaces/inner_api/hdi/base/hdi_smq.h b/interfaces/inner_api/hdi/base/hdi_smq.h index b0207428e..c0b13fd4a 100644 --- a/interfaces/inner_api/hdi/base/hdi_smq.h +++ b/interfaces/inner_api/hdi/base/hdi_smq.h @@ -572,7 +572,7 @@ int SharedMemQueue::WriteNonBlocking(const T *data, size_t count) auto avalidWrite = GetAvalidWriteSize(); if (count > avalidWrite && meta_->GetType() == SmqType::SYNCED_SMQ) { // synced smq can not overflow write - HDF_LOGE("No sufficient space to write, try to write %{public}zu data, but currently " + HDF_LOGD("No sufficient space to write, try to write %{public}zu data, but currently " "maximum writen space is %{public}zu.", count, avalidWrite); return -E2BIG; } -- Gitee