diff --git a/buffer_iocp.c b/buffer_iocp.c index 3c7e6e9b..2b22d50a 100644 --- a/buffer_iocp.c +++ b/buffer_iocp.c @@ -117,7 +117,6 @@ read_completed(struct event_overlapped *eo, uintptr_t _, ssize_t nBytes) struct evbuffer_overlapped *buf = buf_o->buf; struct evbuffer *evbuf = &buf->buffer; - struct evbuffer_chain *chain = buf_o->first_pinned; struct evbuffer_iovec iov[2]; int n_vec; @@ -255,7 +254,7 @@ evbuffer_launch_read(struct evbuffer *buf, size_t at_most) struct evbuffer_chain *chain=NULL; DWORD bytesRead; DWORD flags = 0; - struct evbuffer_iovec vecs[MAX_VECS]; + struct evbuffer_iovec vecs[MAX_WSABUFS]; if (!buf_o) return -1; diff --git a/event_iocp.c b/event_iocp.c index f5eb185e..9aca3b89 100644 --- a/event_iocp.c +++ b/event_iocp.c @@ -202,7 +202,7 @@ event_base_get_iocp(struct event_base *base) #ifdef WIN32 return base->iocp; #else - return NULL + return NULL; #endif } diff --git a/signal.c b/signal.c index 2bbfeb44..f3531b86 100644 --- a/signal.c +++ b/signal.c @@ -121,7 +121,7 @@ evsig_init(struct event_base *base) #ifdef WIN32 /* Make this nonfatal on win32, where sometimes people have localhost firewalled. */ - event_sock_warn(1, -1, "%s: socketpair", __func__); + event_sock_warn(-1, "%s: socketpair", __func__); #else event_sock_err(1, -1, "%s: socketpair", __func__); #endif