stream_put(s, bbpeer->open_tx, bbpeer->open_tx_len);
else {
stream_put(s, dummy_open, sizeof(dummy_open));
- zlog_warn("bmp: missing TX OPEN message for peer %s\n",
- peer->host);
+ zlog_warn("bmp: missing TX OPEN message for peer %s",
+ peer->host);
}
if (bbpeer && bbpeer->open_rx)
stream_put(s, bbpeer->open_rx, bbpeer->open_rx_len);
else {
stream_put(s, dummy_open, sizeof(dummy_open));
- zlog_warn("bmp: missing RX OPEN message for peer %s\n",
- peer->host);
+ zlog_warn("bmp: missing RX OPEN message for peer %s",
+ peer->host);
}
if (peer->desc)
/* We can handle IPv4 or IPv6 socket. */
bmp_sock = sockunion_accept(bl->sock, &su);
if (bmp_sock < 0) {
- zlog_info("bmp: accept_sock failed: %s\n",
- safe_strerror (errno));
+ zlog_info("bmp: accept_sock failed: %s", safe_strerror(errno));
return -1;
}
bmp_open(bl->targets, bmp_sock);
if (as_set == AGGREGATE_AS_SET) {
as_set_new = AGGREGATE_AS_UNSET;
zlog_warn(
- "%s: Ignoring as-set because `bgp reject-as-sets` is enabled.\n",
+ "%s: Ignoring as-set because `bgp reject-as-sets` is enabled.",
__func__);
vty_out(vty,
"Ignoring as-set because `bgp reject-as-sets` is enabled.\n");
if (dyn)
zlog_debug("%s", dyn->hostname);
- zlog_debug("SystemId %20s SNPA %s, level %d\nHolding Time %d",
+ zlog_debug("SystemId %20s SNPA %s, level %d; Holding Time %d",
sysid_print(adj->sysid), snpa_print(adj->snpa), adj->level,
adj->hold_time);
if (adj->ipv4_address_count) {
if (IS_DEBUG_OSPF_EVENT)
zlog_info(
- "SPF Processing Time(usecs): External Routes: %lld\n",
+ "SPF Processing Time(usecs): External Routes: %lld",
(stop_time.tv_sec - start_time.tv_sec)
* 1000000LL
+ (stop_time.tv_usec
if (CHECK_FLAG(lsa->flags, OSPF_LSA_PREMATURE_AGE)) {
if (IS_DEBUG_OSPF(lsa, LSA_FLOODING))
zlog_debug(
- "originating new lsa for lsa 0x%p\n",
+ "originating new lsa for lsa 0x%p",
(void *)lsa);
ospf_lsa_refresh(ospf, lsa);
}
if (IS_DEBUG_OSPF_PACKET(type - 1, SEND)) {
zlog_debug(
- "ospf_write_frags: sent id %d, off %d, len %d to %s\n",
+ "ospf_write_frags: sent id %d, off %d, len %d to %s",
iph->ip_id, iph->ip_off, iph->ip_len,
inet_ntoa(iph->ip_dst));
}
zlog_debug(" Algorithm %d: Strict SPF", i);
break;
default:
- zlog_debug(
- " Algorithm %d: Unknown value %d\n",
- i, algo->value[i]);
+ zlog_debug(" Algorithm %d: Unknown value %d",
+ i, algo->value[i]);
break;
}
}
if (listnode_add_sort_nodup(grpnode->partial_bsrp_list, bsm_rpinfo)) {
if (PIM_DEBUG_BSM)
zlog_debug(
- "%s, bs_rpinfo node added to the partial bs_rplist.\r\n",
+ "%s, bs_rpinfo node added to the partial bs_rplist.",
__func__);
return true;
}
if (PIM_DEBUG_BSM)
- zlog_debug("%s: list node not added\n", __func__);
+ zlog_debug("%s: list node not added", __func__);
XFREE(MTYPE_PIM_BSRP_NODE, bsm_rpinfo);
return false;
if (bsm_frag_tag != bsgrp->frag_tag) {
if (PIM_DEBUG_BSM)
zlog_debug(
- "%s,Received a new BSM ,so clear the pending bs_rpinfo list.\r\n",
+ "%s,Received a new BSM ,so clear the pending bs_rpinfo list.",
__func__);
list_delete_all_node(bsgrp->partial_bsrp_list);
bsgrp->pend_rp_cnt = total_rp_count;
pim_inet4_dump("<Group?>", grpinfo.group.addr, grp_str,
sizeof(grp_str));
zlog_debug(
- "%s, Group %s Rpcount:%d Fragment-Rp-count:%d\r\n",
+ "%s, Group %s Rpcount:%d Fragment-Rp-count:%d",
__func__, grp_str, grpinfo.rp_count,
grpinfo.frag_rp_count);
}
pim_inet4_dump("<Group?>", grpinfo.group.addr,
grp_str, sizeof(grp_str));
- zlog_debug(
- "%s, Rp count is zero for group: %s\r\n",
- __func__, grp_str);
+ zlog_debug("%s, Rp count is zero for group: %s",
+ __func__, grp_str);
}
return false;
}
if (!bsgrp) {
if (PIM_DEBUG_BSM)
- zlog_debug(
- "%s, Create new BSM Group node.\r\n",
- __func__);
+ zlog_debug("%s, Create new BSM Group node.",
+ __func__);
/* create a new node to be added to the tree. */
bsgrp = pim_bsm_new_bsgrp_node(scope->bsrp_table,
if (!bsgrp) {
zlog_debug(
- "%s, Failed to get the BSM group node.\r\n",
+ "%s, Failed to get the BSM group node.",
__func__);
continue;
}
pim_inet4_dump("<Rpaddr?>", rpinfo.rpaddr.addr,
rp_str, sizeof(rp_str));
zlog_debug(
- "%s, Rp address - %s; pri:%d hold:%d\r\n",
+ "%s, Rp address - %s; pri:%d hold:%d",
__func__, rp_str, rpinfo.rp_pri,
rpinfo.rp_holdtime);
}
(buf_size - PIM_BSM_HDR_LEN - PIM_MSG_HEADER_LEN),
frag_tag)) {
if (PIM_DEBUG_BSM) {
- zlog_debug("%s, Parsing BSM failed.\r\n", __func__);
+ zlog_debug("%s, Parsing BSM failed.", __func__);
}
pim->bsm_dropped++;
return -1;
if (!pinfo) {
if (PIM_DEBUG_PIM_REG)
zlog_debug(
- "%s: Interface: %s not configured for pim to trasmit on!\n",
+ "%s: Interface: %s not configured for pim to transmit on!",
__func__, ifp->name);
return;
}
*/
if (rtm->rtm_msglen != nbytes) {
zlog_debug(
- "kernel_read: rtm->rtm_msglen %d, nbytes %d, type %d\n",
+ "kernel_read: rtm->rtm_msglen %d, nbytes %d, type %d",
rtm->rtm_msglen, nbytes, rtm->rtm_type);
return -1;
}
if (IS_ZEBRA_DEBUG_NHT)
zlog_debug(
- "rnh_register msg from client %s: hdr->length=%d, type=%s vrf=%u\n",
+ "rnh_register msg from client %s: hdr->length=%d, type=%s vrf=%u",
zebra_route_string(client->proto), hdr->length,
(type == RNH_NEXTHOP_TYPE) ? "nexthop" : "route",
zvrf->vrf->vrf_id);
if (IS_ZEBRA_DEBUG_NHT)
zlog_debug(
- "rnh_unregister msg from client %s: hdr->length=%d vrf: %u\n",
+ "rnh_unregister msg from client %s: hdr->length=%d vrf: %u",
zebra_route_string(client->proto), hdr->length,
zvrf->vrf->vrf_id);