summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRainer Gerhards <rgerhards@adiscon.com>2009-07-20 16:47:26 +0200
committerRainer Gerhards <rgerhards@adiscon.com>2009-07-20 16:47:26 +0200
commit093179e9d366de9319b7ef11ebc57e4e8e789817 (patch)
treef2b9709c6292b429fa68767d8dcb981d16f0d3a3
parent1359632eef6be90b37b64fc864196c1977e68913 (diff)
downloadrsyslog-093179e9d366de9319b7ef11ebc57e4e8e789817.tar.gz
rsyslog-093179e9d366de9319b7ef11ebc57e4e8e789817.tar.xz
rsyslog-093179e9d366de9319b7ef11ebc57e4e8e789817.zip
minor: dbgprintf() converted to DBGPRINTF()
-rw-r--r--tcpsrv.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/tcpsrv.c b/tcpsrv.c
index eab1850e..776dc46b 100644
--- a/tcpsrv.c
+++ b/tcpsrv.c
@@ -165,9 +165,9 @@ TCPSessTblInit(tcpsrv_t *pThis)
ISOBJ_TYPE_assert(pThis, tcpsrv);
assert(pThis->pSessions == NULL);
- dbgprintf("Allocating buffer for %d TCP sessions.\n", pThis->iSessMax);
+ DBGPRINTF("Allocating buffer for %d TCP sessions.\n", pThis->iSessMax);
if((pThis->pSessions = (tcps_sess_t **) calloc(pThis->iSessMax, sizeof(tcps_sess_t *))) == NULL) {
- dbgprintf("Error: TCPSessInit() could not alloc memory for TCP session table.\n");
+ DBGPRINTF("Error: TCPSessInit() could not alloc memory for TCP session table.\n");
ABORT_FINALIZE(RS_RET_OUT_OF_MEMORY);
}
@@ -408,7 +408,7 @@ SessAccept(tcpsrv_t *pThis, tcpLstnPortList_t *pLstnInfo, tcps_sess_t **ppSess,
* rgerhards, 2005-09-26
*/
if(!pThis->pIsPermittedHost((struct sockaddr*) addr, (char*) fromHostFQDN, pThis->pUsr, pSess->pUsr)) {
- dbgprintf("%s is not an allowed sender\n", fromHostFQDN);
+ DBGPRINTF("%s is not an allowed sender\n", fromHostFQDN);
if(glbl.GetOption_DisallowWarning()) {
errno = 0;
errmsg.LogError(0, RS_RET_HOST_NOT_PERMITTED, "TCP message from disallowed sender %s discarded", fromHostFQDN);
@@ -472,7 +472,7 @@ doReceive(tcpsrv_t *pThis, tcps_sess_t **ppSess)
DEFiRet;
ISOBJ_TYPE_assert(pThis, tcpsrv);
- dbgprintf("netstream %p with new data\n", (*ppSess)->pStrm);
+ DBGPRINTF("netstream %p with new data\n", (*ppSess)->pStrm);
/* Receive message */
iRet = pThis->pRcvData(*ppSess, buf, sizeof(buf), &iRcvd);
@@ -553,7 +553,7 @@ Run(tcpsrv_t *pThis)
for(i = 0 ; i < pThis->iLstnMax ; ++i) {
CHKiRet(nssel.IsReady(pSel, pThis->ppLstn[i], NSDSEL_RD, &bIsReady, &nfds));
if(bIsReady) {
- dbgprintf("New connect on NSD %p.\n", pThis->ppLstn[i]);
+ DBGPRINTF("New connect on NSD %p.\n", pThis->ppLstn[i]);
SessAccept(pThis, pThis->ppLstnPort[i], &pNewSess, pThis->ppLstn[i]);
--nfds; /* indicate we have processed one */
}