mirror of
https://git.proxmox.com/git/mirror_frr
synced 2025-04-28 11:50:21 +00:00
*: spelchek
Signed-off-by: David Lamparter <equinox@diac24.net>
This commit is contained in:
parent
6cd85474f8
commit
0437e10517
@ -32,7 +32,7 @@ THE SOFTWARE.
|
||||
#define CONFIG_NO 1
|
||||
#define CONFIG_YES 2
|
||||
|
||||
/* babeld interface informations */
|
||||
/* babeld interface information */
|
||||
struct babel_interface {
|
||||
unsigned short flags; /* see below */
|
||||
unsigned short cost;
|
||||
|
@ -385,7 +385,7 @@ show_babel_main_configuration (struct vty *vty)
|
||||
vty_out (vty,
|
||||
"state file = %s\n"
|
||||
"configuration file = %s\n"
|
||||
"protocol informations:\n"
|
||||
"protocol information:\n"
|
||||
" multicast address = %s\n"
|
||||
" port = %d\n"
|
||||
"vty address = %s\n"
|
||||
|
@ -1697,7 +1697,7 @@ int bgp_mp_reach_parse(struct bgp_attr_parser_args *args,
|
||||
* - for consistency in rx processing
|
||||
*
|
||||
* The following comment is to signal GCC this intention
|
||||
* and supress the warning
|
||||
* and suppress the warning
|
||||
*/
|
||||
/* FALLTHRU */
|
||||
case BGP_ATTR_NHLEN_IPV4:
|
||||
@ -2624,7 +2624,7 @@ bgp_attr_parse_ret_t bgp_attr_parse(struct peer *peer, struct attr *attr,
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* If hard error occured immediately return to the caller. */
|
||||
/* If hard error occurred immediately return to the caller. */
|
||||
if (ret == BGP_ATTR_PARSE_ERROR) {
|
||||
flog_warn(EC_BGP_ATTRIBUTE_PARSE_ERROR,
|
||||
"%s: Attribute %s, parse error", peer->host,
|
||||
|
@ -689,7 +689,7 @@ int bgp_show_dampening_parameters(struct vty *vty, afi_t afi, safi_t safi)
|
||||
vty_out(vty, "Suppress penalty: %d\n", damp->suppress_value);
|
||||
vty_out(vty, "Max suppress time: %lld min\n",
|
||||
(long long)damp->max_suppress_time / 60);
|
||||
vty_out(vty, "Max supress penalty: %u\n", damp->ceiling);
|
||||
vty_out(vty, "Max suppress penalty: %u\n", damp->ceiling);
|
||||
vty_out(vty, "\n");
|
||||
} else
|
||||
vty_out(vty, "dampening not enabled for %s\n",
|
||||
|
@ -171,7 +171,7 @@ static struct log_ref ferr_bgp_warn[] = {
|
||||
},
|
||||
{
|
||||
.code = EC_BGP_CAPABILITY_VENDOR,
|
||||
.title = "BGP has recieved capability data specific to a particular vendor",
|
||||
.title = "BGP has received capability data specific to a particular vendor",
|
||||
.description = "BGP has received a capability that is vendor specific and as such we have no knowledge of how to use this capability in FRR",
|
||||
.suggestion = "On peer turn off this feature"
|
||||
},
|
||||
@ -197,43 +197,43 @@ static struct log_ref ferr_bgp_err[] = {
|
||||
.code = EC_BGP_ATTR_FLAG,
|
||||
.title = "BGP attribute flag is incorrect",
|
||||
.description = "BGP attribute flag is set to the wrong value (Optional/Transitive/Partial)",
|
||||
.suggestion = "Determine the soure of the attribute and determine why the attribute flag has been set incorrectly"
|
||||
.suggestion = "Determine the source of the attribute and determine why the attribute flag has been set incorrectly"
|
||||
},
|
||||
{
|
||||
.code = EC_BGP_ATTR_LEN,
|
||||
.title = "BGP attribute length is incorrect",
|
||||
.description = "BGP attribute length is incorrect",
|
||||
.suggestion = "Determine the soure of the attribute and determine why the attribute length has been set incorrectly"
|
||||
.suggestion = "Determine the source of the attribute and determine why the attribute length has been set incorrectly"
|
||||
},
|
||||
{
|
||||
.code = EC_BGP_ATTR_ORIGIN,
|
||||
.title = "BGP attribute origin value invalid",
|
||||
.description = "BGP attribute origin value is invalid",
|
||||
.suggestion = "Determine the soure of the attribute and determine why the origin attribute has been set incorrectly"
|
||||
.suggestion = "Determine the source of the attribute and determine why the origin attribute has been set incorrectly"
|
||||
},
|
||||
{
|
||||
.code = EC_BGP_ATTR_MAL_AS_PATH,
|
||||
.title = "BGP as path is invalid",
|
||||
.description = "BGP as path has been malformed",
|
||||
.suggestion = "Determine the soure of the update and determine why the as path has been set incorrectly"
|
||||
.suggestion = "Determine the source of the update and determine why the as path has been set incorrectly"
|
||||
},
|
||||
{
|
||||
.code = EC_BGP_ATTR_FIRST_AS,
|
||||
.title = "BGP as path first as is invalid",
|
||||
.description = "BGP update has invalid first as in as path",
|
||||
.suggestion = "Determine the soure of the update and determine why the as path first as value has been set incorrectly"
|
||||
.suggestion = "Determine the source of the update and determine why the as path first as value has been set incorrectly"
|
||||
},
|
||||
{
|
||||
.code = EC_BGP_ATTR_PMSI_TYPE,
|
||||
.title = "BGP PMSI tunnel attribute type is invalid",
|
||||
.description = "BGP update has invalid type for PMSI tunnel",
|
||||
.suggestion = "Determine the soure of the update and determine why the PMSI tunnel attribute type has been set incorrectly"
|
||||
.suggestion = "Determine the source of the update and determine why the PMSI tunnel attribute type has been set incorrectly"
|
||||
},
|
||||
{
|
||||
.code = EC_BGP_ATTR_PMSI_LEN,
|
||||
.title = "BGP PMSI tunnel attribute length is invalid",
|
||||
.description = "BGP update has invalid length for PMSI tunnel",
|
||||
.suggestion = "Determine the soure of the update and determine why the PMSI tunnel attribute length has been set incorrectly"
|
||||
.suggestion = "Determine the source of the update and determine why the PMSI tunnel attribute length has been set incorrectly"
|
||||
},
|
||||
{
|
||||
.code = EC_BGP_PEER_GROUP,
|
||||
@ -269,7 +269,7 @@ static struct log_ref ferr_bgp_err[] = {
|
||||
.code = EC_BGP_JSON_MEM_ERROR,
|
||||
.title = "BGP unable to allocate memory for JSON output",
|
||||
.description = "BGP attempted to generate JSON output and was unable to allocate the memory required",
|
||||
.suggestion = "Ensure that the device has adequate memory to suport the required functions"
|
||||
.suggestion = "Ensure that the device has adequate memory to support the required functions"
|
||||
},
|
||||
{
|
||||
.code = EC_BGP_UPDGRP_ATTR_LEN,
|
||||
|
@ -1449,7 +1449,7 @@ static int update_evpn_type5_route_entry(struct bgp *bgp_def,
|
||||
}
|
||||
|
||||
/*
|
||||
* create a new route entry if one doesnt exist.
|
||||
* create a new route entry if one doesn't exist.
|
||||
* Otherwise see if route attr has changed
|
||||
*/
|
||||
if (!local_pi) {
|
||||
@ -5288,7 +5288,7 @@ int bgp_evpn_local_l3vni_add(vni_t l3vni, vrf_id_t vrf_id, struct ethaddr *rmac,
|
||||
}
|
||||
as = bgp_def->as;
|
||||
|
||||
/* if the BGP vrf instance doesnt exist - create one */
|
||||
/* if the BGP vrf instance doesn't exist - create one */
|
||||
bgp_vrf = bgp_lookup_by_name(vrf_id_to_name(vrf_id));
|
||||
if (!bgp_vrf) {
|
||||
|
||||
|
@ -3999,7 +3999,7 @@ DEFUN(test_withdraw_evpn_type4_route,
|
||||
}
|
||||
|
||||
if (!bgp->peer_self) {
|
||||
vty_out(vty, "%%BGP instance doesnt have self peer\n");
|
||||
vty_out(vty, "%%BGP instance doesn't have self peer\n");
|
||||
return CMD_WARNING;
|
||||
}
|
||||
|
||||
|
@ -931,7 +931,7 @@ static void bgp_update_delay_process_status_change(struct peer *peer)
|
||||
}
|
||||
}
|
||||
|
||||
/* Called after event occured, this function change status and reset
|
||||
/* Called after event occurred, this function change status and reset
|
||||
read/write and timer thread. */
|
||||
void bgp_fsm_change_status(struct peer *peer, int status)
|
||||
{
|
||||
|
@ -272,7 +272,7 @@ static void bgp_update_explicit_eors(struct peer *peer)
|
||||
PEER_STATUS_EOR_RECEIVED)) {
|
||||
if (bgp_debug_neighbor_events(peer))
|
||||
zlog_debug(
|
||||
" afi %d safi %d didnt receive EOR",
|
||||
" afi %d safi %d didn't receive EOR",
|
||||
afi, safi);
|
||||
return;
|
||||
}
|
||||
|
@ -2301,7 +2301,7 @@ DEFUN (bgp_default_show_hostname,
|
||||
"bgp default show-hostname",
|
||||
"BGP specific commands\n"
|
||||
"Configure BGP defaults\n"
|
||||
"Show hostname in certain command ouputs\n")
|
||||
"Show hostname in certain command outputs\n")
|
||||
{
|
||||
VTY_DECLVAR_CONTEXT(bgp, bgp);
|
||||
bgp_flag_set(bgp, BGP_FLAG_SHOW_HOSTNAME);
|
||||
@ -2314,7 +2314,7 @@ DEFUN (no_bgp_default_show_hostname,
|
||||
NO_STR
|
||||
"BGP specific commands\n"
|
||||
"Configure BGP defaults\n"
|
||||
"Show hostname in certain command ouputs\n")
|
||||
"Show hostname in certain command outputs\n")
|
||||
{
|
||||
VTY_DECLVAR_CONTEXT(bgp, bgp);
|
||||
bgp_flag_unset(bgp, BGP_FLAG_SHOW_HOSTNAME);
|
||||
@ -6016,7 +6016,7 @@ DEFUN (neighbor_allowas_in,
|
||||
NEIGHBOR_STR
|
||||
NEIGHBOR_ADDR_STR2
|
||||
"Accept as-path with my AS present in it\n"
|
||||
"Number of occurances of AS number\n"
|
||||
"Number of occurences of AS number\n"
|
||||
"Only accept my AS in the as-path if the route was originated in my AS\n")
|
||||
{
|
||||
int idx_peer = 1;
|
||||
@ -6050,7 +6050,7 @@ ALIAS_HIDDEN(
|
||||
"neighbor <A.B.C.D|X:X::X:X|WORD> allowas-in [<(1-10)|origin>]",
|
||||
NEIGHBOR_STR NEIGHBOR_ADDR_STR2
|
||||
"Accept as-path with my AS present in it\n"
|
||||
"Number of occurances of AS number\n"
|
||||
"Number of occurences of AS number\n"
|
||||
"Only accept my AS in the as-path if the route was originated in my AS\n")
|
||||
|
||||
DEFUN (no_neighbor_allowas_in,
|
||||
@ -6060,7 +6060,7 @@ DEFUN (no_neighbor_allowas_in,
|
||||
NEIGHBOR_STR
|
||||
NEIGHBOR_ADDR_STR2
|
||||
"allow local ASN appears in aspath attribute\n"
|
||||
"Number of occurances of AS number\n"
|
||||
"Number of occurences of AS number\n"
|
||||
"Only accept my AS in the as-path if the route was originated in my AS\n")
|
||||
{
|
||||
int idx_peer = 2;
|
||||
@ -6082,7 +6082,7 @@ ALIAS_HIDDEN(
|
||||
"no neighbor <A.B.C.D|X:X::X:X|WORD> allowas-in [<(1-10)|origin>]",
|
||||
NO_STR NEIGHBOR_STR NEIGHBOR_ADDR_STR2
|
||||
"allow local ASN appears in aspath attribute\n"
|
||||
"Number of occurances of AS number\n"
|
||||
"Number of occurences of AS number\n"
|
||||
"Only accept my AS in the as-path if the route was originated in my AS\n")
|
||||
|
||||
DEFUN (neighbor_ttl_security,
|
||||
@ -9607,7 +9607,7 @@ static void bgp_show_peer(struct vty *vty, struct peer *p, bool use_json,
|
||||
json_object_string_add(
|
||||
json_nxt,
|
||||
print_store,
|
||||
"recieved");
|
||||
"received");
|
||||
}
|
||||
}
|
||||
json_object_object_add(
|
||||
@ -10215,7 +10215,7 @@ static void bgp_show_peer(struct vty *vty, struct peer *p, bool use_json,
|
||||
json_object_object_add(
|
||||
json_neigh, "gracefulRestartInfo", json_grace);
|
||||
} else {
|
||||
vty_out(vty, " Graceful restart informations:\n");
|
||||
vty_out(vty, " Graceful restart information:\n");
|
||||
if (p->status == Established) {
|
||||
vty_out(vty, " End-of-RIB send: ");
|
||||
FOREACH_AFI_SAFI (afi, safi) {
|
||||
|
@ -136,7 +136,7 @@ These following options control the daemon's VTY (interactive command line) inte
|
||||
|
||||
NB: Unlike the other options, this option specifies a directory, not a full path.
|
||||
|
||||
This option is primarily used by the SNAP packaging system, its semantics may change. It should not be neccessary in most other scenarios.
|
||||
This option is primarily used by the SNAP packaging system, its semantics may change. It should not be necessary in most other scenarios.
|
||||
|
||||
MODULE LOADING
|
||||
--------------
|
||||
|
@ -33,7 +33,7 @@ OPTIONS available for the |DAEMON| command:
|
||||
|
||||
Set netlink receive buffer size. There are cases where zebra daemon can't handle flood of netlink messages from kernel. If you ever see "recvmsg overrun" messages in zebra log, you are in trouble.
|
||||
|
||||
Solution is to increase receive buffer of netlink socket. Note that kernel < 2.6.14 doesn't allow to increase it over maximum value defined in /proc/sys/net/core/rmem_max. If you want to do it, you have to increase maximum before starting zebra.
|
||||
Solution is to increase receive buffer of netlink socket. Note that kernel < 2.6.14 doesn't allow increasing it over maximum value defined in /proc/sys/net/core/rmem_max. If you want to do it, you have to increase maximum before starting zebra.
|
||||
|
||||
Note that this affects Linux only.
|
||||
|
||||
|
@ -152,7 +152,7 @@ enum eigrp_fsm_states {
|
||||
enum eigrp_fsm_events {
|
||||
/*
|
||||
* Input event other than query from succ,
|
||||
* FC is not satisified
|
||||
* FC is not satisfied
|
||||
*/
|
||||
EIGRP_FSM_EVENT_NQ_FCN,
|
||||
|
||||
@ -171,7 +171,7 @@ enum eigrp_fsm_events {
|
||||
/* Query from succ while in active state */
|
||||
EIGRP_FSM_EVENT_QACT,
|
||||
|
||||
/* last reply, FC not satisified */
|
||||
/* last reply, FC not satisfied */
|
||||
EIGRP_FSM_EVENT_LR_FCN,
|
||||
|
||||
/*
|
||||
|
@ -228,7 +228,7 @@ void show_ip_eigrp_interface_detail(struct vty *vty, struct eigrp *eigrp,
|
||||
"Un/reliable mcasts: ", 0, "/", 0, "Un/reliable ucasts: ", 0,
|
||||
"/", 0);
|
||||
vty_out(vty, "%-2s %s %d %s %d %s %d \n", "", "Mcast exceptions: ", 0,
|
||||
" CR packets: ", 0, " ACKs supressed: ", 0);
|
||||
" CR packets: ", 0, " ACKs suppressed: ", 0);
|
||||
vty_out(vty, "%-2s %s %d %s %d \n", "", "Retransmissions sent: ", 0,
|
||||
"Out-of-sequence rcvd: ", 0);
|
||||
vty_out(vty, "%-2s %s %s %s \n", "", "Authentication mode is ", "not",
|
||||
|
@ -222,9 +222,9 @@ static const char *fsm_state2str(enum eigrp_fsm_events event)
|
||||
case EIGRP_FSM_EVENT_LR:
|
||||
return "Last Reply Event";
|
||||
case EIGRP_FSM_EVENT_Q_FCN:
|
||||
return "Query Event Feasability not satisified";
|
||||
return "Query Event Feasability not satisfied";
|
||||
case EIGRP_FSM_EVENT_LR_FCS:
|
||||
return "Last Reply Event Feasability satisified";
|
||||
return "Last Reply Event Feasability satisfied";
|
||||
case EIGRP_FSM_EVENT_DINC:
|
||||
return "Distance Increase Event";
|
||||
case EIGRP_FSM_EVENT_QACT:
|
||||
|
@ -887,7 +887,7 @@ static int isis_spf_preload_tent(struct isis_spftree *spftree,
|
||||
case ISIS_SYSTYPE_UNKNOWN:
|
||||
default:
|
||||
zlog_warn(
|
||||
"isis_spf_preload_tent unknow adj type");
|
||||
"isis_spf_preload_tent unknown adj type");
|
||||
}
|
||||
}
|
||||
list_delete(&adj_list);
|
||||
|
@ -156,7 +156,7 @@ DEFPY (ldp_dual_stack_transport_connection_prefer_ipv4,
|
||||
NO_STR
|
||||
"Configure dual stack parameters\n"
|
||||
"Configure TCP transport parameters\n"
|
||||
"Configure prefered address family for TCP transport connection with neighbor\n"
|
||||
"Configure preferred address family for TCP transport connection with neighbor\n"
|
||||
"IPv4\n")
|
||||
{
|
||||
return (ldp_vty_trans_pref_ipv4(vty, no));
|
||||
|
@ -259,7 +259,7 @@ embedscope(struct sockaddr_in6 *sin6)
|
||||
if (IN6_IS_SCOPE_EMBED(&sin6->sin6_addr)) {
|
||||
memcpy(&tmp16, &sin6->sin6_addr.s6_addr[2], sizeof(tmp16));
|
||||
if (tmp16 != 0) {
|
||||
log_warnx("%s: address %s already has embeded scope %u",
|
||||
log_warnx("%s: address %s already has embedded scope %u",
|
||||
__func__, log_sockaddr(sin6), ntohs(tmp16));
|
||||
}
|
||||
tmp16 = htons(sin6->sin6_scope_id);
|
||||
|
@ -134,7 +134,7 @@ void bfd_peer_sendmsg(struct zclient *zclient, struct bfd_info *bfd_info,
|
||||
int ret;
|
||||
int len;
|
||||
|
||||
/* Individual reg/dereg messages are supressed during shutdown. */
|
||||
/* Individual reg/dereg messages are suppressed during shutdown. */
|
||||
if (CHECK_FLAG(bfd_gbl.flags, BFD_GBL_FLAG_IN_SHUTDOWN)) {
|
||||
if (bfd_debug)
|
||||
zlog_debug(
|
||||
|
@ -355,7 +355,7 @@ struct cmd_node {
|
||||
#define IN_STR "Filter incoming routing updates\n"
|
||||
#define V4NOTATION_STR "specify by IPv4 address notation(e.g. 0.0.0.0)\n"
|
||||
#define OSPF6_NUMBER_STR "Specify by number\n"
|
||||
#define INTERFACE_STR "Interface infomation\n"
|
||||
#define INTERFACE_STR "Interface information\n"
|
||||
#define IFNAME_STR "Interface name(e.g. ep0)\n"
|
||||
#define IP6_STR "IPv6 Information\n"
|
||||
#define OSPF6_STR "Open Shortest Path First (OSPF) for IPv6\n"
|
||||
|
@ -89,8 +89,8 @@ static struct log_ref ferr_lib_err[] = {
|
||||
{
|
||||
.code = EC_LIB_SOCKET,
|
||||
.title = "Socket Error",
|
||||
.description = "When attempting to access a socket a system error has occured and we were unable to properly complete the request",
|
||||
.suggestion = "Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permisions to work. If necessary open an Issue",
|
||||
.description = "When attempting to access a socket a system error has occurred and we were unable to properly complete the request",
|
||||
.suggestion = "Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permissions to work. If necessary open an Issue",
|
||||
},
|
||||
{
|
||||
.code = EC_LIB_ZAPI_MISSMATCH,
|
||||
|
@ -171,7 +171,7 @@ static inline char *label2str(mpls_label_t label, char *buf, size_t len)
|
||||
strlcpy(buf, "Router Alert", len);
|
||||
return (buf);
|
||||
case MPLS_LABEL_IPV6_EXPLICIT_NULL:
|
||||
strlcpy(buf, "IPv6 Explict Null", len);
|
||||
strlcpy(buf, "IPv6 Explicit Null", len);
|
||||
return (buf);
|
||||
case MPLS_LABEL_IMPLICIT_NULL:
|
||||
strlcpy(buf, "implicit-null", len);
|
||||
|
@ -356,7 +356,7 @@ int sockopt_ttl(int family, int sock, int ttl)
|
||||
* Which on linux is a no-op since it is enabled by
|
||||
* default and on BSD it uses TCP_NOPUSH to do
|
||||
* the same thing( which it was not configured to
|
||||
* use). This cleanup of the api occured on 8/1/17
|
||||
* use). This cleanup of the api occurred on 8/1/17
|
||||
* I imagine if after more than 1 year of no-one
|
||||
* complaining, and a major upgrade release we
|
||||
* can deprecate and remove this function call
|
||||
|
@ -22,7 +22,7 @@
|
||||
# another object file.
|
||||
#
|
||||
# There are four known schemes of declaring weak symbols; each scheme is
|
||||
# checked in turn, and the first one found is prefered. Note that only one
|
||||
# checked in turn, and the first one found is preferred. Note that only one
|
||||
# of the mentioned preprocessor macros will be defined!
|
||||
#
|
||||
# 1. Function attributes
|
||||
|
@ -321,7 +321,7 @@ int ospf6_abr_originate_summary_to_area(struct ospf6_route *route,
|
||||
|
||||
/* if this is a route to ASBR */
|
||||
if (route->type == OSPF6_DEST_TYPE_ROUTER) {
|
||||
/* Only the prefered best path is considered */
|
||||
/* Only the preferred best path is considered */
|
||||
if (!CHECK_FLAG(route->flag, OSPF6_ROUTE_BEST)) {
|
||||
if (is_debug)
|
||||
zlog_debug(
|
||||
|
@ -772,7 +772,7 @@ DEFUN (show_ipv6_ospf6_spf_tree,
|
||||
SHOW_STR
|
||||
IP6_STR
|
||||
OSPF6_STR
|
||||
"Shortest Path First caculation\n"
|
||||
"Shortest Path First calculation\n"
|
||||
"Show SPF tree\n")
|
||||
{
|
||||
struct listnode *node;
|
||||
@ -807,7 +807,7 @@ DEFUN (show_ipv6_ospf6_area_spf_tree,
|
||||
OSPF6_STR
|
||||
OSPF6_AREA_STR
|
||||
OSPF6_AREA_ID_STR
|
||||
"Shortest Path First caculation\n"
|
||||
"Shortest Path First calculation\n"
|
||||
"Show SPF tree\n")
|
||||
{
|
||||
int idx_ipv4 = 4;
|
||||
|
@ -277,7 +277,7 @@ static int ospf_wait_timer(struct thread *thread)
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* Hook function called after ospf ISM event is occured. And vty's
|
||||
/* Hook function called after ospf ISM event is occurred. And vty's
|
||||
network command invoke this function after making interface
|
||||
structure. */
|
||||
static void ism_timer_set(struct ospf_interface *oi)
|
||||
|
@ -94,7 +94,7 @@ static int ospf_db_desc_timer(struct thread *thread)
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* Hook function called after ospf NSM event is occured.
|
||||
/* Hook function called after ospf NSM event is occurred.
|
||||
*
|
||||
* Set/clear any timers whose condition is implicit to the neighbour
|
||||
* state. There may be other timers which are set/unset according to other
|
||||
|
@ -500,7 +500,7 @@ struct opaque_info_per_type {
|
||||
/* Collection of callback functions for this opaque-type. */
|
||||
struct ospf_opaque_functab *functab;
|
||||
|
||||
/* List of Opaque-LSA control informations per opaque-id. */
|
||||
/* List of Opaque-LSA control information per opaque-id. */
|
||||
struct list *id_list;
|
||||
};
|
||||
|
||||
|
@ -3368,7 +3368,7 @@ static int ospf_make_db_desc(struct ospf_interface *oi,
|
||||
if (IS_OPAQUE_LSA(lsa->data->type)
|
||||
&& (!CHECK_FLAG(options, OSPF_OPTION_O))) {
|
||||
/* Suppress advertising
|
||||
* opaque-informations. */
|
||||
* opaque-information. */
|
||||
/* Remove LSA from DB summary list. */
|
||||
ospf_lsdb_delete(lsdb, lsa);
|
||||
continue;
|
||||
|
@ -591,7 +591,7 @@ static int is_mandated_params_set(struct ospf_router_info ori)
|
||||
* @param enable To activate or not Segment Routing router Information flooding
|
||||
* @param size Size of Label Range i.e. SRGB size
|
||||
* @param lower Lower bound of the Label Range i.e. SRGB first label
|
||||
* @param msd Maximum label Stack Depth suported by the router
|
||||
* @param msd Maximum label Stack Depth supported by the router
|
||||
*
|
||||
* @return none
|
||||
*/
|
||||
|
@ -2406,7 +2406,7 @@ DEFUN (no_ospf_mpls_te_inter_as,
|
||||
ospf_mpls_te_lsa_schedule(lp, FLUSH_THIS_LSA);
|
||||
}
|
||||
|
||||
/* Deregister the Callbacks for Inter-AS suport */
|
||||
/* Deregister the Callbacks for Inter-AS support */
|
||||
ospf_mpls_te_unregister();
|
||||
|
||||
return CMD_SUCCESS;
|
||||
|
@ -171,7 +171,7 @@ void ospf_router_id_update(struct ospf *ospf)
|
||||
|
||||
/* Flush (inline) all external LSAs which now match the new
|
||||
router-id,
|
||||
need to adjust the OSPF_LSA_SELF flag, so the flush doesnt
|
||||
need to adjust the OSPF_LSA_SELF flag, so the flush doesn't
|
||||
hit
|
||||
asserts in ospf_refresher_unregister_lsa(). This step is
|
||||
needed
|
||||
|
@ -207,13 +207,13 @@ static int rule_notify_owner(int command, struct zclient *zclient,
|
||||
|
||||
switch (note) {
|
||||
case ZAPI_RULE_FAIL_INSTALL:
|
||||
DEBUGD(&pbr_dbg_zebra, "%s: Recieved RULE_FAIL_INSTALL",
|
||||
DEBUGD(&pbr_dbg_zebra, "%s: Received RULE_FAIL_INSTALL",
|
||||
__PRETTY_FUNCTION__);
|
||||
pbrms->installed &= ~installed;
|
||||
break;
|
||||
case ZAPI_RULE_INSTALLED:
|
||||
pbrms->installed |= installed;
|
||||
DEBUGD(&pbr_dbg_zebra, "%s: Recived RULE_INSTALLED",
|
||||
DEBUGD(&pbr_dbg_zebra, "%s: Received RULE_INSTALLED",
|
||||
__PRETTY_FUNCTION__);
|
||||
break;
|
||||
case ZAPI_RULE_FAIL_REMOVE:
|
||||
|
@ -74,7 +74,7 @@ static int pim_msdp_sa_adv_timer_cb(struct thread *t)
|
||||
struct pim_instance *pim = THREAD_ARG(t);
|
||||
|
||||
if (PIM_DEBUG_MSDP_EVENTS) {
|
||||
zlog_debug("MSDP SA advertisment timer expired");
|
||||
zlog_debug("MSDP SA advertisement timer expired");
|
||||
}
|
||||
|
||||
pim_msdp_sa_adv_timer_setup(pim, true /* start */);
|
||||
|
@ -462,7 +462,7 @@ static int pim_upstream_could_register(struct pim_upstream *up)
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* Source registration is supressed for SSM groups. When the SSM range changes
|
||||
/* Source registration is suppressed for SSM groups. When the SSM range changes
|
||||
* we re-revaluate register setup for existing upstream entries */
|
||||
void pim_upstream_register_reevaluate(struct pim_instance *pim)
|
||||
{
|
||||
|
@ -1238,7 +1238,7 @@ static void rip_response_process(struct rip_packet *packet, int size,
|
||||
Ciscos before the 'ip subnet zero' option, it would be almost
|
||||
right too :-)
|
||||
|
||||
Cisco summarize ripv1 advertisments to the classful boundary
|
||||
Cisco summarize ripv1 advertisements to the classful boundary
|
||||
(/16 for class B's) except when the RIP packet does to inside
|
||||
the classful network in question. */
|
||||
|
||||
@ -2513,7 +2513,7 @@ static void rip_update_process(int route_type)
|
||||
VRF_DEFAULT);
|
||||
if (!connected) {
|
||||
zlog_warn(
|
||||
"Neighbor %s doesnt have connected interface!",
|
||||
"Neighbor %s doesn't have connected interface!",
|
||||
inet_ntoa(p->u.prefix4));
|
||||
continue;
|
||||
}
|
||||
|
@ -1560,7 +1560,7 @@ void ripng_output_process(struct interface *ifp, struct sockaddr_in6 *to,
|
||||
&& rinfo->suppress == 0) {
|
||||
/* If no route-map are applied, the RTE will be these
|
||||
* following
|
||||
* informations.
|
||||
* information.
|
||||
*/
|
||||
p = (struct prefix_ipv6 *)&rp->p;
|
||||
rinfo->metric_out = rinfo->metric;
|
||||
@ -1701,7 +1701,7 @@ void ripng_output_process(struct interface *ifp, struct sockaddr_in6 *to,
|
||||
&& aggregate->suppress == 0) {
|
||||
/* If no route-map are applied, the RTE will be these
|
||||
* following
|
||||
* informations.
|
||||
* information.
|
||||
*/
|
||||
p = (struct prefix_ipv6 *)&rp->p;
|
||||
aggregate->metric_set = 0;
|
||||
|
@ -1013,7 +1013,7 @@ int main(int argc, char **argv)
|
||||
if (background) { /* ok, we need to detach this process */
|
||||
int i, fd;
|
||||
if (quietmode < 0)
|
||||
printf("Detatching to start %s...", startas);
|
||||
printf("Detaching to start %s...", startas);
|
||||
i = fork();
|
||||
if (i < 0) {
|
||||
fatal("Unable to fork.\n");
|
||||
|
@ -61,7 +61,7 @@ void ifstat_update_sysctl(void)
|
||||
/* We free this memory at the end of this function. */
|
||||
ref = buf = XMALLOC(MTYPE_TMP, bufsiz);
|
||||
|
||||
/* Fetch interface informations into allocated buffer. */
|
||||
/* Fetch interface information into allocated buffer. */
|
||||
if (sysctl(mib, MIBSIZ, buf, &bufsiz, NULL, 0) < 0) {
|
||||
flog_warn(EC_ZEBRA_SYSCTL_FAILED, "sysctl error by %s",
|
||||
safe_strerror(errno));
|
||||
@ -113,7 +113,7 @@ void interface_list(struct zebra_ns *zns)
|
||||
/* We free this memory at the end of this function. */
|
||||
ref = buf = XMALLOC(MTYPE_TMP, bufsiz);
|
||||
|
||||
/* Fetch interface informations into allocated buffer. */
|
||||
/* Fetch interface information into allocated buffer. */
|
||||
if (sysctl(mib, MIBSIZ, buf, &bufsiz, NULL, 0) < 0) {
|
||||
flog_err_sys(EC_ZEBRA_IFLIST_FAILED,
|
||||
"Could not enumerate interfaces: %s",
|
||||
|
@ -97,7 +97,7 @@ static void parse_irdp_packet(char *p, int len, struct interface *ifp)
|
||||
|
||||
if (len != iplen) {
|
||||
flog_err(EC_ZEBRA_IRDP_LEN_MISMATCH,
|
||||
"IRDP: RX length doesnt match IP length");
|
||||
"IRDP: RX length doesn't match IP length");
|
||||
return;
|
||||
}
|
||||
|
||||
@ -108,7 +108,7 @@ static void parse_irdp_packet(char *p, int len, struct interface *ifp)
|
||||
return;
|
||||
}
|
||||
|
||||
/* XXX: RAW doesnt receive link-layer, surely? ??? */
|
||||
/* XXX: RAW doesn't receive link-layer, surely? ??? */
|
||||
/* Check so we don't checksum packets longer than oure RX_BUF - (ethlen
|
||||
+
|
||||
len of IP-header) 14+20 */
|
||||
|
@ -469,7 +469,7 @@ int ifm_read(struct if_msghdr *ifm)
|
||||
if (ifnlen && (strncmp(ifp->name, ifname, IFNAMSIZ) != 0)) {
|
||||
if (IS_ZEBRA_DEBUG_KERNEL)
|
||||
zlog_debug(
|
||||
"%s: ifp name %s doesnt match sdl name %s",
|
||||
"%s: ifp name %s doesn't match sdl name %s",
|
||||
__func__, ifp->name, ifname);
|
||||
ifp = NULL;
|
||||
}
|
||||
|
@ -295,7 +295,7 @@ static void vty_show_ip_route_detail(struct vty *vty, struct route_node *rn,
|
||||
if (vrf)
|
||||
vty_out(vty, "(vrf %s)", vrf->name);
|
||||
else
|
||||
vty_out(vty, "(vrf UKNOWN)");
|
||||
vty_out(vty, "(vrf UNKNOWN)");
|
||||
}
|
||||
|
||||
if (CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_DUPLICATE))
|
||||
@ -670,7 +670,7 @@ static void vty_show_ip_route(struct vty *vty, struct route_node *rn,
|
||||
if (vrf)
|
||||
vty_out(vty, "(vrf %s)", vrf->name);
|
||||
else
|
||||
vty_out(vty, "(vrf UKNOWN)");
|
||||
vty_out(vty, "(vrf UNKNOWN)");
|
||||
}
|
||||
|
||||
if (!CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_ACTIVE))
|
||||
|
@ -1855,7 +1855,7 @@ static int zvni_gw_macip_del(struct interface *ifp, zebra_vni_t *zvni,
|
||||
/* mac entry should be present */
|
||||
mac = zvni_mac_lookup(zvni, &n->emac);
|
||||
if (!mac) {
|
||||
zlog_debug("MAC %s doesnt exists for neigh %s on VNI %u",
|
||||
zlog_debug("MAC %s doesn't exist for neigh %s on VNI %u",
|
||||
prefix_mac2str(&n->emac, buf1, sizeof(buf1)),
|
||||
ipaddr2str(ip, buf2, sizeof(buf2)), zvni->vni);
|
||||
return -1;
|
||||
@ -4564,7 +4564,7 @@ void zebra_vxlan_print_specific_rmac_l3vni(struct vty *vty, vni_t l3vni,
|
||||
if (use_json)
|
||||
vty_out(vty, "{}\n");
|
||||
else
|
||||
vty_out(vty, "%% L3-VNI %u doesnt exist\n", l3vni);
|
||||
vty_out(vty, "%% L3-VNI %u doesn't exist\n", l3vni);
|
||||
return;
|
||||
}
|
||||
|
||||
@ -4574,7 +4574,7 @@ void zebra_vxlan_print_specific_rmac_l3vni(struct vty *vty, vni_t l3vni,
|
||||
vty_out(vty, "{}\n");
|
||||
else
|
||||
vty_out(vty,
|
||||
"%% Requested RMAC doesnt exist in L3-VNI %u",
|
||||
"%% Requested RMAC doesn't exist in L3-VNI %u",
|
||||
l3vni);
|
||||
return;
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user