*: spelchek

Signed-off-by: David Lamparter <equinox@diac24.net>
This commit is contained in:
David Lamparter 2018-10-25 20:06:59 +02:00
parent 6cd85474f8
commit 0437e10517
44 changed files with 73 additions and 73 deletions

View File

@ -32,7 +32,7 @@ THE SOFTWARE.
#define CONFIG_NO 1
#define CONFIG_YES 2
/* babeld interface informations */
/* babeld interface information */
struct babel_interface {
unsigned short flags; /* see below */
unsigned short cost;

View File

@ -385,7 +385,7 @@ show_babel_main_configuration (struct vty *vty)
vty_out (vty,
"state file = %s\n"
"configuration file = %s\n"
"protocol informations:\n"
"protocol information:\n"
" multicast address = %s\n"
" port = %d\n"
"vty address = %s\n"

View File

@ -1697,7 +1697,7 @@ int bgp_mp_reach_parse(struct bgp_attr_parser_args *args,
* - for consistency in rx processing
*
* The following comment is to signal GCC this intention
* and supress the warning
* and suppress the warning
*/
/* FALLTHRU */
case BGP_ATTR_NHLEN_IPV4:
@ -2624,7 +2624,7 @@ bgp_attr_parse_ret_t bgp_attr_parse(struct peer *peer, struct attr *attr,
return ret;
}
/* If hard error occured immediately return to the caller. */
/* If hard error occurred immediately return to the caller. */
if (ret == BGP_ATTR_PARSE_ERROR) {
flog_warn(EC_BGP_ATTRIBUTE_PARSE_ERROR,
"%s: Attribute %s, parse error", peer->host,

View File

@ -689,7 +689,7 @@ int bgp_show_dampening_parameters(struct vty *vty, afi_t afi, safi_t safi)
vty_out(vty, "Suppress penalty: %d\n", damp->suppress_value);
vty_out(vty, "Max suppress time: %lld min\n",
(long long)damp->max_suppress_time / 60);
vty_out(vty, "Max supress penalty: %u\n", damp->ceiling);
vty_out(vty, "Max suppress penalty: %u\n", damp->ceiling);
vty_out(vty, "\n");
} else
vty_out(vty, "dampening not enabled for %s\n",

View File

@ -171,7 +171,7 @@ static struct log_ref ferr_bgp_warn[] = {
},
{
.code = EC_BGP_CAPABILITY_VENDOR,
.title = "BGP has recieved capability data specific to a particular vendor",
.title = "BGP has received capability data specific to a particular vendor",
.description = "BGP has received a capability that is vendor specific and as such we have no knowledge of how to use this capability in FRR",
.suggestion = "On peer turn off this feature"
},
@ -197,43 +197,43 @@ static struct log_ref ferr_bgp_err[] = {
.code = EC_BGP_ATTR_FLAG,
.title = "BGP attribute flag is incorrect",
.description = "BGP attribute flag is set to the wrong value (Optional/Transitive/Partial)",
.suggestion = "Determine the soure of the attribute and determine why the attribute flag has been set incorrectly"
.suggestion = "Determine the source of the attribute and determine why the attribute flag has been set incorrectly"
},
{
.code = EC_BGP_ATTR_LEN,
.title = "BGP attribute length is incorrect",
.description = "BGP attribute length is incorrect",
.suggestion = "Determine the soure of the attribute and determine why the attribute length has been set incorrectly"
.suggestion = "Determine the source of the attribute and determine why the attribute length has been set incorrectly"
},
{
.code = EC_BGP_ATTR_ORIGIN,
.title = "BGP attribute origin value invalid",
.description = "BGP attribute origin value is invalid",
.suggestion = "Determine the soure of the attribute and determine why the origin attribute has been set incorrectly"
.suggestion = "Determine the source of the attribute and determine why the origin attribute has been set incorrectly"
},
{
.code = EC_BGP_ATTR_MAL_AS_PATH,
.title = "BGP as path is invalid",
.description = "BGP as path has been malformed",
.suggestion = "Determine the soure of the update and determine why the as path has been set incorrectly"
.suggestion = "Determine the source of the update and determine why the as path has been set incorrectly"
},
{
.code = EC_BGP_ATTR_FIRST_AS,
.title = "BGP as path first as is invalid",
.description = "BGP update has invalid first as in as path",
.suggestion = "Determine the soure of the update and determine why the as path first as value has been set incorrectly"
.suggestion = "Determine the source of the update and determine why the as path first as value has been set incorrectly"
},
{
.code = EC_BGP_ATTR_PMSI_TYPE,
.title = "BGP PMSI tunnel attribute type is invalid",
.description = "BGP update has invalid type for PMSI tunnel",
.suggestion = "Determine the soure of the update and determine why the PMSI tunnel attribute type has been set incorrectly"
.suggestion = "Determine the source of the update and determine why the PMSI tunnel attribute type has been set incorrectly"
},
{
.code = EC_BGP_ATTR_PMSI_LEN,
.title = "BGP PMSI tunnel attribute length is invalid",
.description = "BGP update has invalid length for PMSI tunnel",
.suggestion = "Determine the soure of the update and determine why the PMSI tunnel attribute length has been set incorrectly"
.suggestion = "Determine the source of the update and determine why the PMSI tunnel attribute length has been set incorrectly"
},
{
.code = EC_BGP_PEER_GROUP,
@ -269,7 +269,7 @@ static struct log_ref ferr_bgp_err[] = {
.code = EC_BGP_JSON_MEM_ERROR,
.title = "BGP unable to allocate memory for JSON output",
.description = "BGP attempted to generate JSON output and was unable to allocate the memory required",
.suggestion = "Ensure that the device has adequate memory to suport the required functions"
.suggestion = "Ensure that the device has adequate memory to support the required functions"
},
{
.code = EC_BGP_UPDGRP_ATTR_LEN,

View File

@ -1449,7 +1449,7 @@ static int update_evpn_type5_route_entry(struct bgp *bgp_def,
}
/*
* create a new route entry if one doesnt exist.
* create a new route entry if one doesn't exist.
* Otherwise see if route attr has changed
*/
if (!local_pi) {
@ -5288,7 +5288,7 @@ int bgp_evpn_local_l3vni_add(vni_t l3vni, vrf_id_t vrf_id, struct ethaddr *rmac,
}
as = bgp_def->as;
/* if the BGP vrf instance doesnt exist - create one */
/* if the BGP vrf instance doesn't exist - create one */
bgp_vrf = bgp_lookup_by_name(vrf_id_to_name(vrf_id));
if (!bgp_vrf) {

View File

@ -3999,7 +3999,7 @@ DEFUN(test_withdraw_evpn_type4_route,
}
if (!bgp->peer_self) {
vty_out(vty, "%%BGP instance doesnt have self peer\n");
vty_out(vty, "%%BGP instance doesn't have self peer\n");
return CMD_WARNING;
}

View File

@ -931,7 +931,7 @@ static void bgp_update_delay_process_status_change(struct peer *peer)
}
}
/* Called after event occured, this function change status and reset
/* Called after event occurred, this function change status and reset
read/write and timer thread. */
void bgp_fsm_change_status(struct peer *peer, int status)
{

View File

@ -272,7 +272,7 @@ static void bgp_update_explicit_eors(struct peer *peer)
PEER_STATUS_EOR_RECEIVED)) {
if (bgp_debug_neighbor_events(peer))
zlog_debug(
" afi %d safi %d didnt receive EOR",
" afi %d safi %d didn't receive EOR",
afi, safi);
return;
}

View File

@ -2301,7 +2301,7 @@ DEFUN (bgp_default_show_hostname,
"bgp default show-hostname",
"BGP specific commands\n"
"Configure BGP defaults\n"
"Show hostname in certain command ouputs\n")
"Show hostname in certain command outputs\n")
{
VTY_DECLVAR_CONTEXT(bgp, bgp);
bgp_flag_set(bgp, BGP_FLAG_SHOW_HOSTNAME);
@ -2314,7 +2314,7 @@ DEFUN (no_bgp_default_show_hostname,
NO_STR
"BGP specific commands\n"
"Configure BGP defaults\n"
"Show hostname in certain command ouputs\n")
"Show hostname in certain command outputs\n")
{
VTY_DECLVAR_CONTEXT(bgp, bgp);
bgp_flag_unset(bgp, BGP_FLAG_SHOW_HOSTNAME);
@ -6016,7 +6016,7 @@ DEFUN (neighbor_allowas_in,
NEIGHBOR_STR
NEIGHBOR_ADDR_STR2
"Accept as-path with my AS present in it\n"
"Number of occurances of AS number\n"
"Number of occurences of AS number\n"
"Only accept my AS in the as-path if the route was originated in my AS\n")
{
int idx_peer = 1;
@ -6050,7 +6050,7 @@ ALIAS_HIDDEN(
"neighbor <A.B.C.D|X:X::X:X|WORD> allowas-in [<(1-10)|origin>]",
NEIGHBOR_STR NEIGHBOR_ADDR_STR2
"Accept as-path with my AS present in it\n"
"Number of occurances of AS number\n"
"Number of occurences of AS number\n"
"Only accept my AS in the as-path if the route was originated in my AS\n")
DEFUN (no_neighbor_allowas_in,
@ -6060,7 +6060,7 @@ DEFUN (no_neighbor_allowas_in,
NEIGHBOR_STR
NEIGHBOR_ADDR_STR2
"allow local ASN appears in aspath attribute\n"
"Number of occurances of AS number\n"
"Number of occurences of AS number\n"
"Only accept my AS in the as-path if the route was originated in my AS\n")
{
int idx_peer = 2;
@ -6082,7 +6082,7 @@ ALIAS_HIDDEN(
"no neighbor <A.B.C.D|X:X::X:X|WORD> allowas-in [<(1-10)|origin>]",
NO_STR NEIGHBOR_STR NEIGHBOR_ADDR_STR2
"allow local ASN appears in aspath attribute\n"
"Number of occurances of AS number\n"
"Number of occurences of AS number\n"
"Only accept my AS in the as-path if the route was originated in my AS\n")
DEFUN (neighbor_ttl_security,
@ -9607,7 +9607,7 @@ static void bgp_show_peer(struct vty *vty, struct peer *p, bool use_json,
json_object_string_add(
json_nxt,
print_store,
"recieved");
"received");
}
}
json_object_object_add(
@ -10215,7 +10215,7 @@ static void bgp_show_peer(struct vty *vty, struct peer *p, bool use_json,
json_object_object_add(
json_neigh, "gracefulRestartInfo", json_grace);
} else {
vty_out(vty, " Graceful restart informations:\n");
vty_out(vty, " Graceful restart information:\n");
if (p->status == Established) {
vty_out(vty, " End-of-RIB send: ");
FOREACH_AFI_SAFI (afi, safi) {

View File

@ -136,7 +136,7 @@ These following options control the daemon's VTY (interactive command line) inte
NB: Unlike the other options, this option specifies a directory, not a full path.
This option is primarily used by the SNAP packaging system, its semantics may change. It should not be neccessary in most other scenarios.
This option is primarily used by the SNAP packaging system, its semantics may change. It should not be necessary in most other scenarios.
MODULE LOADING
--------------

View File

@ -33,7 +33,7 @@ OPTIONS available for the |DAEMON| command:
Set netlink receive buffer size. There are cases where zebra daemon can't handle flood of netlink messages from kernel. If you ever see "recvmsg overrun" messages in zebra log, you are in trouble.
Solution is to increase receive buffer of netlink socket. Note that kernel < 2.6.14 doesn't allow to increase it over maximum value defined in /proc/sys/net/core/rmem_max. If you want to do it, you have to increase maximum before starting zebra.
Solution is to increase receive buffer of netlink socket. Note that kernel < 2.6.14 doesn't allow increasing it over maximum value defined in /proc/sys/net/core/rmem_max. If you want to do it, you have to increase maximum before starting zebra.
Note that this affects Linux only.

View File

@ -152,7 +152,7 @@ enum eigrp_fsm_states {
enum eigrp_fsm_events {
/*
* Input event other than query from succ,
* FC is not satisified
* FC is not satisfied
*/
EIGRP_FSM_EVENT_NQ_FCN,
@ -171,7 +171,7 @@ enum eigrp_fsm_events {
/* Query from succ while in active state */
EIGRP_FSM_EVENT_QACT,
/* last reply, FC not satisified */
/* last reply, FC not satisfied */
EIGRP_FSM_EVENT_LR_FCN,
/*

View File

@ -228,7 +228,7 @@ void show_ip_eigrp_interface_detail(struct vty *vty, struct eigrp *eigrp,
"Un/reliable mcasts: ", 0, "/", 0, "Un/reliable ucasts: ", 0,
"/", 0);
vty_out(vty, "%-2s %s %d %s %d %s %d \n", "", "Mcast exceptions: ", 0,
" CR packets: ", 0, " ACKs supressed: ", 0);
" CR packets: ", 0, " ACKs suppressed: ", 0);
vty_out(vty, "%-2s %s %d %s %d \n", "", "Retransmissions sent: ", 0,
"Out-of-sequence rcvd: ", 0);
vty_out(vty, "%-2s %s %s %s \n", "", "Authentication mode is ", "not",

View File

@ -222,9 +222,9 @@ static const char *fsm_state2str(enum eigrp_fsm_events event)
case EIGRP_FSM_EVENT_LR:
return "Last Reply Event";
case EIGRP_FSM_EVENT_Q_FCN:
return "Query Event Feasability not satisified";
return "Query Event Feasability not satisfied";
case EIGRP_FSM_EVENT_LR_FCS:
return "Last Reply Event Feasability satisified";
return "Last Reply Event Feasability satisfied";
case EIGRP_FSM_EVENT_DINC:
return "Distance Increase Event";
case EIGRP_FSM_EVENT_QACT:

View File

@ -887,7 +887,7 @@ static int isis_spf_preload_tent(struct isis_spftree *spftree,
case ISIS_SYSTYPE_UNKNOWN:
default:
zlog_warn(
"isis_spf_preload_tent unknow adj type");
"isis_spf_preload_tent unknown adj type");
}
}
list_delete(&adj_list);

View File

@ -156,7 +156,7 @@ DEFPY (ldp_dual_stack_transport_connection_prefer_ipv4,
NO_STR
"Configure dual stack parameters\n"
"Configure TCP transport parameters\n"
"Configure prefered address family for TCP transport connection with neighbor\n"
"Configure preferred address family for TCP transport connection with neighbor\n"
"IPv4\n")
{
return (ldp_vty_trans_pref_ipv4(vty, no));

View File

@ -259,7 +259,7 @@ embedscope(struct sockaddr_in6 *sin6)
if (IN6_IS_SCOPE_EMBED(&sin6->sin6_addr)) {
memcpy(&tmp16, &sin6->sin6_addr.s6_addr[2], sizeof(tmp16));
if (tmp16 != 0) {
log_warnx("%s: address %s already has embeded scope %u",
log_warnx("%s: address %s already has embedded scope %u",
__func__, log_sockaddr(sin6), ntohs(tmp16));
}
tmp16 = htons(sin6->sin6_scope_id);

View File

@ -134,7 +134,7 @@ void bfd_peer_sendmsg(struct zclient *zclient, struct bfd_info *bfd_info,
int ret;
int len;
/* Individual reg/dereg messages are supressed during shutdown. */
/* Individual reg/dereg messages are suppressed during shutdown. */
if (CHECK_FLAG(bfd_gbl.flags, BFD_GBL_FLAG_IN_SHUTDOWN)) {
if (bfd_debug)
zlog_debug(

View File

@ -355,7 +355,7 @@ struct cmd_node {
#define IN_STR "Filter incoming routing updates\n"
#define V4NOTATION_STR "specify by IPv4 address notation(e.g. 0.0.0.0)\n"
#define OSPF6_NUMBER_STR "Specify by number\n"
#define INTERFACE_STR "Interface infomation\n"
#define INTERFACE_STR "Interface information\n"
#define IFNAME_STR "Interface name(e.g. ep0)\n"
#define IP6_STR "IPv6 Information\n"
#define OSPF6_STR "Open Shortest Path First (OSPF) for IPv6\n"

View File

@ -89,8 +89,8 @@ static struct log_ref ferr_lib_err[] = {
{
.code = EC_LIB_SOCKET,
.title = "Socket Error",
.description = "When attempting to access a socket a system error has occured and we were unable to properly complete the request",
.suggestion = "Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permisions to work. If necessary open an Issue",
.description = "When attempting to access a socket a system error has occurred and we were unable to properly complete the request",
.suggestion = "Ensure that there are sufficient system resources available and ensure that the frr user has sufficient permissions to work. If necessary open an Issue",
},
{
.code = EC_LIB_ZAPI_MISSMATCH,

View File

@ -171,7 +171,7 @@ static inline char *label2str(mpls_label_t label, char *buf, size_t len)
strlcpy(buf, "Router Alert", len);
return (buf);
case MPLS_LABEL_IPV6_EXPLICIT_NULL:
strlcpy(buf, "IPv6 Explict Null", len);
strlcpy(buf, "IPv6 Explicit Null", len);
return (buf);
case MPLS_LABEL_IMPLICIT_NULL:
strlcpy(buf, "implicit-null", len);

View File

@ -356,7 +356,7 @@ int sockopt_ttl(int family, int sock, int ttl)
* Which on linux is a no-op since it is enabled by
* default and on BSD it uses TCP_NOPUSH to do
* the same thing( which it was not configured to
* use). This cleanup of the api occured on 8/1/17
* use). This cleanup of the api occurred on 8/1/17
* I imagine if after more than 1 year of no-one
* complaining, and a major upgrade release we
* can deprecate and remove this function call

View File

@ -22,7 +22,7 @@
# another object file.
#
# There are four known schemes of declaring weak symbols; each scheme is
# checked in turn, and the first one found is prefered. Note that only one
# checked in turn, and the first one found is preferred. Note that only one
# of the mentioned preprocessor macros will be defined!
#
# 1. Function attributes

View File

@ -321,7 +321,7 @@ int ospf6_abr_originate_summary_to_area(struct ospf6_route *route,
/* if this is a route to ASBR */
if (route->type == OSPF6_DEST_TYPE_ROUTER) {
/* Only the prefered best path is considered */
/* Only the preferred best path is considered */
if (!CHECK_FLAG(route->flag, OSPF6_ROUTE_BEST)) {
if (is_debug)
zlog_debug(

View File

@ -772,7 +772,7 @@ DEFUN (show_ipv6_ospf6_spf_tree,
SHOW_STR
IP6_STR
OSPF6_STR
"Shortest Path First caculation\n"
"Shortest Path First calculation\n"
"Show SPF tree\n")
{
struct listnode *node;
@ -807,7 +807,7 @@ DEFUN (show_ipv6_ospf6_area_spf_tree,
OSPF6_STR
OSPF6_AREA_STR
OSPF6_AREA_ID_STR
"Shortest Path First caculation\n"
"Shortest Path First calculation\n"
"Show SPF tree\n")
{
int idx_ipv4 = 4;

View File

@ -277,7 +277,7 @@ static int ospf_wait_timer(struct thread *thread)
return 0;
}
/* Hook function called after ospf ISM event is occured. And vty's
/* Hook function called after ospf ISM event is occurred. And vty's
network command invoke this function after making interface
structure. */
static void ism_timer_set(struct ospf_interface *oi)

View File

@ -94,7 +94,7 @@ static int ospf_db_desc_timer(struct thread *thread)
return 0;
}
/* Hook function called after ospf NSM event is occured.
/* Hook function called after ospf NSM event is occurred.
*
* Set/clear any timers whose condition is implicit to the neighbour
* state. There may be other timers which are set/unset according to other

View File

@ -500,7 +500,7 @@ struct opaque_info_per_type {
/* Collection of callback functions for this opaque-type. */
struct ospf_opaque_functab *functab;
/* List of Opaque-LSA control informations per opaque-id. */
/* List of Opaque-LSA control information per opaque-id. */
struct list *id_list;
};

View File

@ -3368,7 +3368,7 @@ static int ospf_make_db_desc(struct ospf_interface *oi,
if (IS_OPAQUE_LSA(lsa->data->type)
&& (!CHECK_FLAG(options, OSPF_OPTION_O))) {
/* Suppress advertising
* opaque-informations. */
* opaque-information. */
/* Remove LSA from DB summary list. */
ospf_lsdb_delete(lsdb, lsa);
continue;

View File

@ -591,7 +591,7 @@ static int is_mandated_params_set(struct ospf_router_info ori)
* @param enable To activate or not Segment Routing router Information flooding
* @param size Size of Label Range i.e. SRGB size
* @param lower Lower bound of the Label Range i.e. SRGB first label
* @param msd Maximum label Stack Depth suported by the router
* @param msd Maximum label Stack Depth supported by the router
*
* @return none
*/

View File

@ -2406,7 +2406,7 @@ DEFUN (no_ospf_mpls_te_inter_as,
ospf_mpls_te_lsa_schedule(lp, FLUSH_THIS_LSA);
}
/* Deregister the Callbacks for Inter-AS suport */
/* Deregister the Callbacks for Inter-AS support */
ospf_mpls_te_unregister();
return CMD_SUCCESS;

View File

@ -171,7 +171,7 @@ void ospf_router_id_update(struct ospf *ospf)
/* Flush (inline) all external LSAs which now match the new
router-id,
need to adjust the OSPF_LSA_SELF flag, so the flush doesnt
need to adjust the OSPF_LSA_SELF flag, so the flush doesn't
hit
asserts in ospf_refresher_unregister_lsa(). This step is
needed

View File

@ -207,13 +207,13 @@ static int rule_notify_owner(int command, struct zclient *zclient,
switch (note) {
case ZAPI_RULE_FAIL_INSTALL:
DEBUGD(&pbr_dbg_zebra, "%s: Recieved RULE_FAIL_INSTALL",
DEBUGD(&pbr_dbg_zebra, "%s: Received RULE_FAIL_INSTALL",
__PRETTY_FUNCTION__);
pbrms->installed &= ~installed;
break;
case ZAPI_RULE_INSTALLED:
pbrms->installed |= installed;
DEBUGD(&pbr_dbg_zebra, "%s: Recived RULE_INSTALLED",
DEBUGD(&pbr_dbg_zebra, "%s: Received RULE_INSTALLED",
__PRETTY_FUNCTION__);
break;
case ZAPI_RULE_FAIL_REMOVE:

View File

@ -74,7 +74,7 @@ static int pim_msdp_sa_adv_timer_cb(struct thread *t)
struct pim_instance *pim = THREAD_ARG(t);
if (PIM_DEBUG_MSDP_EVENTS) {
zlog_debug("MSDP SA advertisment timer expired");
zlog_debug("MSDP SA advertisement timer expired");
}
pim_msdp_sa_adv_timer_setup(pim, true /* start */);

View File

@ -462,7 +462,7 @@ static int pim_upstream_could_register(struct pim_upstream *up)
return 0;
}
/* Source registration is supressed for SSM groups. When the SSM range changes
/* Source registration is suppressed for SSM groups. When the SSM range changes
* we re-revaluate register setup for existing upstream entries */
void pim_upstream_register_reevaluate(struct pim_instance *pim)
{

View File

@ -1238,7 +1238,7 @@ static void rip_response_process(struct rip_packet *packet, int size,
Ciscos before the 'ip subnet zero' option, it would be almost
right too :-)
Cisco summarize ripv1 advertisments to the classful boundary
Cisco summarize ripv1 advertisements to the classful boundary
(/16 for class B's) except when the RIP packet does to inside
the classful network in question. */
@ -2513,7 +2513,7 @@ static void rip_update_process(int route_type)
VRF_DEFAULT);
if (!connected) {
zlog_warn(
"Neighbor %s doesnt have connected interface!",
"Neighbor %s doesn't have connected interface!",
inet_ntoa(p->u.prefix4));
continue;
}

View File

@ -1560,7 +1560,7 @@ void ripng_output_process(struct interface *ifp, struct sockaddr_in6 *to,
&& rinfo->suppress == 0) {
/* If no route-map are applied, the RTE will be these
* following
* informations.
* information.
*/
p = (struct prefix_ipv6 *)&rp->p;
rinfo->metric_out = rinfo->metric;
@ -1701,7 +1701,7 @@ void ripng_output_process(struct interface *ifp, struct sockaddr_in6 *to,
&& aggregate->suppress == 0) {
/* If no route-map are applied, the RTE will be these
* following
* informations.
* information.
*/
p = (struct prefix_ipv6 *)&rp->p;
aggregate->metric_set = 0;

View File

@ -1013,7 +1013,7 @@ int main(int argc, char **argv)
if (background) { /* ok, we need to detach this process */
int i, fd;
if (quietmode < 0)
printf("Detatching to start %s...", startas);
printf("Detaching to start %s...", startas);
i = fork();
if (i < 0) {
fatal("Unable to fork.\n");

View File

@ -61,7 +61,7 @@ void ifstat_update_sysctl(void)
/* We free this memory at the end of this function. */
ref = buf = XMALLOC(MTYPE_TMP, bufsiz);
/* Fetch interface informations into allocated buffer. */
/* Fetch interface information into allocated buffer. */
if (sysctl(mib, MIBSIZ, buf, &bufsiz, NULL, 0) < 0) {
flog_warn(EC_ZEBRA_SYSCTL_FAILED, "sysctl error by %s",
safe_strerror(errno));
@ -113,7 +113,7 @@ void interface_list(struct zebra_ns *zns)
/* We free this memory at the end of this function. */
ref = buf = XMALLOC(MTYPE_TMP, bufsiz);
/* Fetch interface informations into allocated buffer. */
/* Fetch interface information into allocated buffer. */
if (sysctl(mib, MIBSIZ, buf, &bufsiz, NULL, 0) < 0) {
flog_err_sys(EC_ZEBRA_IFLIST_FAILED,
"Could not enumerate interfaces: %s",

View File

@ -97,7 +97,7 @@ static void parse_irdp_packet(char *p, int len, struct interface *ifp)
if (len != iplen) {
flog_err(EC_ZEBRA_IRDP_LEN_MISMATCH,
"IRDP: RX length doesnt match IP length");
"IRDP: RX length doesn't match IP length");
return;
}
@ -108,7 +108,7 @@ static void parse_irdp_packet(char *p, int len, struct interface *ifp)
return;
}
/* XXX: RAW doesnt receive link-layer, surely? ??? */
/* XXX: RAW doesn't receive link-layer, surely? ??? */
/* Check so we don't checksum packets longer than oure RX_BUF - (ethlen
+
len of IP-header) 14+20 */

View File

@ -469,7 +469,7 @@ int ifm_read(struct if_msghdr *ifm)
if (ifnlen && (strncmp(ifp->name, ifname, IFNAMSIZ) != 0)) {
if (IS_ZEBRA_DEBUG_KERNEL)
zlog_debug(
"%s: ifp name %s doesnt match sdl name %s",
"%s: ifp name %s doesn't match sdl name %s",
__func__, ifp->name, ifname);
ifp = NULL;
}

View File

@ -295,7 +295,7 @@ static void vty_show_ip_route_detail(struct vty *vty, struct route_node *rn,
if (vrf)
vty_out(vty, "(vrf %s)", vrf->name);
else
vty_out(vty, "(vrf UKNOWN)");
vty_out(vty, "(vrf UNKNOWN)");
}
if (CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_DUPLICATE))
@ -670,7 +670,7 @@ static void vty_show_ip_route(struct vty *vty, struct route_node *rn,
if (vrf)
vty_out(vty, "(vrf %s)", vrf->name);
else
vty_out(vty, "(vrf UKNOWN)");
vty_out(vty, "(vrf UNKNOWN)");
}
if (!CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_ACTIVE))

View File

@ -1855,7 +1855,7 @@ static int zvni_gw_macip_del(struct interface *ifp, zebra_vni_t *zvni,
/* mac entry should be present */
mac = zvni_mac_lookup(zvni, &n->emac);
if (!mac) {
zlog_debug("MAC %s doesnt exists for neigh %s on VNI %u",
zlog_debug("MAC %s doesn't exist for neigh %s on VNI %u",
prefix_mac2str(&n->emac, buf1, sizeof(buf1)),
ipaddr2str(ip, buf2, sizeof(buf2)), zvni->vni);
return -1;
@ -4564,7 +4564,7 @@ void zebra_vxlan_print_specific_rmac_l3vni(struct vty *vty, vni_t l3vni,
if (use_json)
vty_out(vty, "{}\n");
else
vty_out(vty, "%% L3-VNI %u doesnt exist\n", l3vni);
vty_out(vty, "%% L3-VNI %u doesn't exist\n", l3vni);
return;
}
@ -4574,7 +4574,7 @@ void zebra_vxlan_print_specific_rmac_l3vni(struct vty *vty, vni_t l3vni,
vty_out(vty, "{}\n");
else
vty_out(vty,
"%% Requested RMAC doesnt exist in L3-VNI %u",
"%% Requested RMAC doesn't exist in L3-VNI %u",
l3vni);
return;
}