Remove old log_* macros and standardize on FRR's logging infrastructure.
Signed-off-by: Rafael Zalamena <rzalamena@opensourcerouting.org>
if (bs->key.vrfname[0]) {
vrf = vrf_lookup_by_name(bs->key.vrfname);
if (vrf == NULL) {
- log_error(
+ zlog_err(
"session-enable: specified VRF doesn't exists.");
return 0;
}
else
ifp = if_lookup_by_name_all_vrf(bs->key.ifname);
if (ifp == NULL) {
- log_error(
- "session-enable: specified interface doesn't exists.");
+ zlog_err(
+ "session-enable: specified interface doesn't exists.");
return 0;
}
if (bs->key.ifname[0] && !vrf) {
vrf = vrf_lookup_by_id(ifp->vrf_id);
if (vrf == NULL) {
- log_error(
- "session-enable: specified VRF doesn't exists.");
+ zlog_err(
+ "session-enable: specified VRF doesn't exists.");
return 0;
}
}
/* Sanity check: don't leak open sockets. */
if (bs->sock != -1) {
- log_debug("session-enable: previous socket open");
+ zlog_debug("session-enable: previous socket open");
close(bs->sock);
bs->sock = -1;
}
if (old_state != bfd->ses_state) {
bfd->stats.session_up++;
- log_info("state-change: [%s] %s -> %s", bs_to_string(bfd),
- state_list[old_state].str,
- state_list[bfd->ses_state].str);
+ zlog_debug("state-change: [%s] %s -> %s", bs_to_string(bfd),
+ state_list[old_state].str,
+ state_list[bfd->ses_state].str);
}
}
if (old_state != bfd->ses_state) {
bfd->stats.session_down++;
- log_info("state-change: [%s] %s -> %s reason:%s",
- bs_to_string(bfd), state_list[old_state].str,
- state_list[bfd->ses_state].str,
- get_diag_str(bfd->local_diag));
+ zlog_debug("state-change: [%s] %s -> %s reason:%s",
+ bs_to_string(bfd), state_list[old_state].str,
+ state_list[bfd->ses_state].str,
+ get_diag_str(bfd->local_diag));
}
}
/* Get BFD session storage with its defaults. */
bfd = bfd_session_new();
if (bfd == NULL) {
- log_error("session-new: allocation failed");
+ zlog_err("session-new: allocation failed");
return NULL;
}
if (bfd->key.ifname[0] || bfd->key.vrfname[0] || bfd->sock == -1)
bs_observer_add(bfd);
- log_info("session-new: %s", bs_to_string(bfd));
+ zlog_debug("session-new: %s", bs_to_string(bfd));
control_notify_config(BCM_NOTIFY_CONFIG_ADD, bfd);
/* This pointer is being referenced, don't let it be deleted. */
if (bs->refcount > 0) {
- log_error("session-delete: refcount failure: %" PRIu64
- " references",
- bs->refcount);
+ zlog_err("session-delete: refcount failure: %" PRIu64
+ " references",
+ bs->refcount);
return -1;
}
- log_info("session-delete: %s", bs_to_string(bs));
+ zlog_debug("session-delete: %s", bs_to_string(bs));
control_notify_config(BCM_NOTIFY_CONFIG_DELETE, bs);
break;
default:
- log_debug("state-change: unhandled neighbor state: %d", nstate);
+ zlog_debug("state-change: unhandled neighbor state: %d",
+ nstate);
break;
}
}
break;
default:
- log_debug("state-change: unhandled neighbor state: %d", nstate);
+ zlog_debug("state-change: unhandled neighbor state: %d",
+ nstate);
break;
}
}
if (old_state != bfd->ses_state) {
bfd->stats.session_down++;
- log_info("state-change: [%s] %s -> %s reason:%s",
- bs_to_string(bfd), state_list[old_state].str,
- state_list[bfd->ses_state].str,
- get_diag_str(bfd->local_diag));
+ zlog_debug("state-change: [%s] %s -> %s reason:%s",
+ bs_to_string(bfd), state_list[old_state].str,
+ state_list[bfd->ses_state].str,
+ get_diag_str(bfd->local_diag));
}
}
break;
default:
- log_debug("state-change: unhandled neighbor state: %d", nstate);
+ zlog_debug("state-change: unhandled neighbor state: %d",
+ nstate);
break;
}
}
break;
default:
- log_debug("state-change: [%s] is in invalid state: %d",
- bs_to_string(bs), nstate);
+ zlog_debug("state-change: [%s] is in invalid state: %d",
+ bs_to_string(bs), nstate);
break;
}
}
inet_ntop(bs.key.family, &key.local, addr_buf,
sizeof(addr_buf));
- log_debug(" peer %s found, but loc-addr %s ignored",
- peer_buf, addr_buf);
+ zlog_debug(" peer %s found, but loc-addr %s ignored",
+ peer_buf, addr_buf);
return bsp;
}
}
memset(bs.key.ifname, 0, sizeof(bs.key.ifname));
bsp = hash_lookup(bfd_key_hash, &bs);
if (bsp) {
- log_debug(" peer %s found, but ifp %s ignored",
- peer_buf, key.ifname);
+ zlog_debug(" peer %s found, but ifp %s ignored",
+ peer_buf, key.ifname);
return bsp;
}
}
inet_ntop(bs.key.family, &bs.key.local, addr_buf,
sizeof(addr_buf));
- log_debug(" peer %s found, but ifp %s"
- " and loc-addr %s ignored",
- peer_buf, key.ifname,
- addr_buf);
+ zlog_debug(
+ " peer %s found, but ifp %s"
+ " and loc-addr %s ignored",
+ peer_buf, key.ifname, addr_buf);
return bsp;
}
}
/* change key */
if (ctx.result) {
bsp = ctx.result;
- log_debug(" peer %s found, but ifp"
- " and/or loc-addr params ignored", peer_buf);
+ zlog_debug(
+ " peer %s found, but ifp"
+ " and/or loc-addr params ignored",
+ peer_buf);
}
return bsp;
}
*/
static int bfd_vrf_new(struct vrf *vrf)
{
- log_debug("VRF Created: %s(%u)", vrf->name, vrf->vrf_id);
+ zlog_debug("VRF Created: %s(%u)", vrf->name, vrf->vrf_id);
return 0;
}
static int bfd_vrf_delete(struct vrf *vrf)
{
- log_debug("VRF Deletion: %s(%u)", vrf->name, vrf->vrf_id);
+ zlog_debug("VRF Deletion: %s(%u)", vrf->name, vrf->vrf_id);
return 0;
}
{
if (!vrf_is_enabled(vrf))
return 0;
- log_debug("VRF update: %s(%u)", vrf->name, vrf->vrf_id);
+ zlog_debug("VRF update: %s(%u)", vrf->name, vrf->vrf_id);
/* a different name is given; update bfd list */
bfdd_sessions_enable_vrf(vrf);
return 0;
vrf->info = (void *)bvrf;
} else
bvrf = vrf->info;
- log_debug("VRF enable add %s id %u", vrf->name, vrf->vrf_id);
+ zlog_debug("VRF enable add %s id %u", vrf->name, vrf->vrf_id);
if (vrf->vrf_id == VRF_DEFAULT ||
vrf_get_backend() == VRF_BACKEND_NETNS) {
if (!bvrf->bg_shop)
bfdd_zclient_unregister(vrf->vrf_id);
}
- log_debug("VRF disable %s id %d", vrf->name, vrf->vrf_id);
+ zlog_debug("VRF disable %s id %d", vrf->name, vrf->vrf_id);
/* Disable read/write poll triggering. */
THREAD_OFF(bvrf->bg_ev[0]);
/*
* logging - alias to zebra log
*/
-
-#define log_debug zlog_debug
-#define log_info zlog_info
-#define log_warning zlog_warn
-#define log_error zlog_err
-
-#define log_fatal(msg, ...) \
+#define zlog_fatal(msg, ...) \
do { \
- zlog_err(msg, ## __VA_ARGS__); \
+ zlog_err(msg, ##__VA_ARGS__); \
assert(!msg); \
abort(); \
} while (0)
#endif /* HAVE_STRUCT_SOCKADDR_SA_LEN */
rv = sendto(sd, data, datalen, 0, sa, slen);
if (rv <= 0) {
- log_debug("packet-send: send failure: %s", strerror(errno));
+ zlog_debug("packet-send: send failure: %s", strerror(errno));
return -1;
}
if (rv < (ssize_t)datalen)
- log_debug("packet-send: send partial: %s", strerror(errno));
+ zlog_debug("packet-send: send partial: %s", strerror(errno));
return 0;
}
/* Your discriminator not zero - use it to find session */
bfd = bfd_id_lookup(my_discr);
if (bfd == NULL) {
- log_debug("echo-packet: no matching session (id:%u)", my_discr);
+ zlog_debug("echo-packet: no matching session (id:%u)",
+ my_discr);
return -1;
}
if (!CHECK_FLAG(bfd->flags, BFD_SESS_FLAG_ECHO_ACTIVE)) {
- log_debug("echo-packet: echo disabled [%s] (id:%u)",
- bs_to_string(bfd), my_discr);
+ zlog_debug("echo-packet: echo disabled [%s] (id:%u)",
+ bs_to_string(bfd), my_discr);
return -1;
}
mlen = recvmsg(sd, &msghdr, MSG_DONTWAIT);
if (mlen == -1) {
if (errno != EAGAIN)
- log_error("ipv4-recv: recv failed: %s",
- strerror(errno));
+ zlog_err("ipv4-recv: recv failed: %s", strerror(errno));
return -1;
}
memcpy(&ttlval, CMSG_DATA(cm), sizeof(ttlval));
if (ttlval > 255) {
- log_debug("ipv4-recv: invalid TTL: %u", ttlval);
+ zlog_debug("ipv4-recv: invalid TTL: %u",
+ ttlval);
return -1;
}
*ttl = ttlval;
mlen = recvmsg(sd, &msghdr6, MSG_DONTWAIT);
if (mlen == -1) {
if (errno != EAGAIN)
- log_error("ipv6-recv: recv failed: %s",
- strerror(errno));
+ zlog_err("ipv6-recv: recv failed: %s", strerror(errno));
return -1;
}
if (cm->cmsg_type == IPV6_HOPLIMIT) {
memcpy(&ttlval, CMSG_DATA(cm), sizeof(ttlval));
if (ttlval > 255) {
- log_debug("ipv6-recv: invalid TTL: %u", ttlval);
+ zlog_debug("ipv6-recv: invalid TTL: %u",
+ ttlval);
return -1;
}
vsnprintf(buf, sizeof(buf), fmt, vl);
va_end(vl);
- log_debug("control-packet: %s [mhop:%s%s%s%s%s]", buf,
- mhop ? "yes" : "no", peerstr, localstr, portstr, vrfstr);
+ zlog_debug("control-packet: %s [mhop:%s%s%s%s%s]", buf,
+ mhop ? "yes" : "no", peerstr, localstr, portstr, vrfstr);
}
int bfd_recv_cb(struct thread *t)
/* Send echo back. */
wlen = sendmsg(sd, &msg, 0);
if (wlen <= 0) {
- log_debug("udp-send: loopback failure: (%d) %s", errno, strerror(errno));
+ zlog_debug("udp-send: loopback failure: (%d) %s", errno,
+ strerror(errno));
return -1;
} else if (wlen < (ssize_t)datalen) {
- log_debug("udp-send: partial send: %zd expected %zu", wlen,
- datalen);
+ zlog_debug("udp-send: partial send: %zd expected %zu", wlen,
+ datalen);
return -1;
}
int ttl = value;
if (setsockopt(sd, IPPROTO_IP, IP_TTL, &ttl, sizeof(ttl)) == -1) {
- log_warning("set-ttl: setsockopt(IP_TTL, %d): %s", value,
- strerror(errno));
+ zlog_warn("set-ttl: setsockopt(IP_TTL, %d): %s", value,
+ strerror(errno));
return -1;
}
int tos = value;
if (setsockopt(sd, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) == -1) {
- log_warning("set-tos: setsockopt(IP_TOS, %d): %s", value,
- strerror(errno));
+ zlog_warn("set-tos: setsockopt(IP_TOS, %d): %s", value,
+ strerror(errno));
return -1;
}
int rcvttl = BFD_RCV_TTL_VAL;
if (bp_set_ttl(sd, BFD_TTL_VAL) != 0)
- log_fatal("set-ipopts: TTL configuration failed");
+ zlog_fatal("set-ipopts: TTL configuration failed");
if (setsockopt(sd, IPPROTO_IP, IP_RECVTTL, &rcvttl, sizeof(rcvttl))
== -1)
- log_fatal("set-ipopts: setsockopt(IP_RECVTTL, %d): %s", rcvttl,
- strerror(errno));
+ zlog_fatal("set-ipopts: setsockopt(IP_RECVTTL, %d): %s", rcvttl,
+ strerror(errno));
#ifdef BFD_LINUX
int pktinfo = BFD_PKT_INFO_VAL;
/* Figure out address and interface to do the peer matching. */
if (setsockopt(sd, IPPROTO_IP, IP_PKTINFO, &pktinfo, sizeof(pktinfo))
== -1)
- log_fatal("set-ipopts: setsockopt(IP_PKTINFO, %d): %s", pktinfo,
- strerror(errno));
+ zlog_fatal("set-ipopts: setsockopt(IP_PKTINFO, %d): %s",
+ pktinfo, strerror(errno));
#endif /* BFD_LINUX */
#ifdef BFD_BSD
int yes = 1;
/* Find out our address for peer matching. */
if (setsockopt(sd, IPPROTO_IP, IP_RECVDSTADDR, &yes, sizeof(yes)) == -1)
- log_fatal("set-ipopts: setsockopt(IP_RECVDSTADDR, %d): %s", yes,
- strerror(errno));
+ zlog_fatal("set-ipopts: setsockopt(IP_RECVDSTADDR, %d): %s",
+ yes, strerror(errno));
/* Find out interface where the packet came in. */
if (setsockopt_ifindex(AF_INET, sd, yes) == -1)
- log_fatal("set-ipopts: setsockopt_ipv4_ifindex(%d): %s", yes,
- strerror(errno));
+ zlog_fatal("set-ipopts: setsockopt_ipv4_ifindex(%d): %s", yes,
+ strerror(errno));
#endif /* BFD_BSD */
}
sin.sin_addr.s_addr = htonl(INADDR_ANY);
sin.sin_port = htons(port);
if (bind(sd, (struct sockaddr *)&sin, sizeof(sin)) == -1)
- log_fatal("bind-ip: bind: %s", strerror(errno));
+ zlog_fatal("bind-ip: bind: %s", strerror(errno));
}
int bp_udp_shop(const struct vrf *vrf)
vrf->name);
}
if (sd == -1)
- log_fatal("udp-shop: socket: %s", strerror(errno));
+ zlog_fatal("udp-shop: socket: %s", strerror(errno));
bp_set_ipopts(sd);
bp_bind_ip(sd, BFD_DEFDESTPORT);
vrf->name);
}
if (sd == -1)
- log_fatal("udp-mhop: socket: %s", strerror(errno));
+ zlog_fatal("udp-mhop: socket: %s", strerror(errno));
bp_set_ipopts(sd);
bp_bind_ip(sd, BFD_DEF_MHOP_DEST_PORT);
bs->vrf->vrf_id, device_to_bind);
}
if (sd == -1) {
- log_error("ipv4-new: failed to create socket: %s",
- strerror(errno));
+ zlog_err("ipv4-new: failed to create socket: %s",
+ strerror(errno));
return -1;
}
do {
if ((++pcount) > (BFD_SRCPORTMAX - BFD_SRCPORTINIT)) {
/* Searched all ports, none available */
- log_error("ipv4-new: failed to bind port: %s",
- strerror(errno));
+ zlog_err("ipv4-new: failed to bind port: %s",
+ strerror(errno));
close(sd);
return -1;
}
bs->vrf->vrf_id, device_to_bind);
}
if (sd == -1) {
- log_error("ipv6-new: failed to create socket: %s",
- strerror(errno));
+ zlog_err("ipv6-new: failed to create socket: %s",
+ strerror(errno));
return -1;
}
do {
if ((++pcount) > (BFD_SRCPORTMAX - BFD_SRCPORTINIT)) {
/* Searched all ports, none available */
- log_error("ipv6-new: failed to bind port: %s",
- strerror(errno));
+ zlog_err("ipv6-new: failed to bind port: %s",
+ strerror(errno));
close(sd);
return -1;
}
if (setsockopt(sd, IPPROTO_IPV6, IPV6_UNICAST_HOPS, &ttl, sizeof(ttl))
== -1) {
- log_warning("set-ttlv6: setsockopt(IPV6_UNICAST_HOPS, %d): %s",
- value, strerror(errno));
+ zlog_warn("set-ttlv6: setsockopt(IPV6_UNICAST_HOPS, %d): %s",
+ value, strerror(errno));
return -1;
}
if (setsockopt(sd, IPPROTO_IPV6, IPV6_TCLASS, &tos, sizeof(tos))
== -1) {
- log_warning("set-tosv6: setsockopt(IPV6_TCLASS, %d): %s", value,
- strerror(errno));
+ zlog_warn("set-tosv6: setsockopt(IPV6_TCLASS, %d): %s", value,
+ strerror(errno));
return -1;
}
int ipv6_only = BFD_IPV6_ONLY_VAL;
if (bp_set_ttlv6(sd, BFD_TTL_VAL) == -1)
- log_fatal("set-ipv6opts: setsockopt(IPV6_UNICAST_HOPS, %d): %s",
- BFD_TTL_VAL, strerror(errno));
+ zlog_fatal(
+ "set-ipv6opts: setsockopt(IPV6_UNICAST_HOPS, %d): %s",
+ BFD_TTL_VAL, strerror(errno));
if (setsockopt_ipv6_hoplimit(sd, BFD_RCV_TTL_VAL) == -1)
- log_fatal("set-ipv6opts: setsockopt(IPV6_HOPLIMIT, %d): %s",
- BFD_RCV_TTL_VAL, strerror(errno));
+ zlog_fatal("set-ipv6opts: setsockopt(IPV6_HOPLIMIT, %d): %s",
+ BFD_RCV_TTL_VAL, strerror(errno));
if (setsockopt_ipv6_pktinfo(sd, ipv6_pktinfo) == -1)
- log_fatal("set-ipv6opts: setsockopt(IPV6_PKTINFO, %d): %s",
- ipv6_pktinfo, strerror(errno));
+ zlog_fatal("set-ipv6opts: setsockopt(IPV6_PKTINFO, %d): %s",
+ ipv6_pktinfo, strerror(errno));
if (setsockopt(sd, IPPROTO_IPV6, IPV6_V6ONLY, &ipv6_only,
sizeof(ipv6_only))
== -1)
- log_fatal("set-ipv6opts: setsockopt(IPV6_V6ONLY, %d): %s",
- ipv6_only, strerror(errno));
+ zlog_fatal("set-ipv6opts: setsockopt(IPV6_V6ONLY, %d): %s",
+ ipv6_only, strerror(errno));
}
static void bp_bind_ipv6(int sd, uint16_t port)
sin6.sin6_len = sizeof(sin6);
#endif /* HAVE_STRUCT_SOCKADDR_SA_LEN */
if (bind(sd, (struct sockaddr *)&sin6, sizeof(sin6)) == -1)
- log_fatal("bind-ipv6: bind: %s", strerror(errno));
+ zlog_fatal("bind-ipv6: bind: %s", strerror(errno));
}
int bp_udp6_shop(const struct vrf *vrf)
vrf->name);
}
if (sd == -1)
- log_fatal("udp6-shop: socket: %s", strerror(errno));
+ zlog_fatal("udp6-shop: socket: %s", strerror(errno));
bp_set_ipv6opts(sd);
bp_bind_ipv6(sd, BFD_DEFDESTPORT);
vrf->name);
}
if (sd == -1)
- log_fatal("udp6-mhop: socket: %s", strerror(errno));
+ zlog_fatal("udp6-mhop: socket: %s", strerror(errno));
bp_set_ipv6opts(sd);
bp_bind_ipv6(sd, BFD_DEF_MHOP_DEST_PORT);
s = vrf_socket(AF_INET, SOCK_DGRAM, 0, vrf->vrf_id, vrf->name);
}
if (s == -1)
- log_fatal("echo-socket: socket: %s", strerror(errno));
+ zlog_fatal("echo-socket: socket: %s", strerror(errno));
bp_set_ipopts(s);
bp_bind_ip(s, BFD_DEF_ECHO_PORT);
s = vrf_socket(AF_INET6, SOCK_DGRAM, 0, vrf->vrf_id, vrf->name);
}
if (s == -1)
- log_fatal("echov6-socket: socket: %s", strerror(errno));
+ zlog_fatal("echov6-socket: socket: %s", strerror(errno));
bp_set_ipv6opts(s);
bp_bind_ipv6(s, BFD_DEF_ECHO_PORT);
return;
if (close(*s) != 0)
- log_error("%s: close(%d): (%d) %s", __func__, *s, errno,
- strerror(errno));
+ zlog_err("%s: close(%d): (%d) %s", __func__, *s, errno,
+ strerror(errno));
*s = -1;
}
jon = __display_peer_json(bs);
if (jon == NULL) {
- log_warning("%s: not enough memory", __func__);
+ zlog_warn("%s: not enough memory", __func__);
return;
}
jon = __display_peer_counters_json(bs);
if (jon == NULL) {
- log_warning("%s: not enough memory", __func__);
+ zlog_warn("%s: not enough memory", __func__);
return;
}
error += parse_list(jo_val, PLT_LABEL, h, arg);
} else {
sval = json_object_get_string(jo_val);
- log_warning("%s:%d invalid configuration: %s", __func__,
- __LINE__, sval);
+ zlog_warn("%s:%d invalid configuration: %s", __func__,
+ __LINE__, sval);
error++;
}
}
switch (plt) {
case PLT_IPV4:
- log_debug("ipv4 peers %d:", allen);
+ zlog_debug("ipv4 peers %d:", allen);
bpc.bpc_ipv4 = true;
break;
case PLT_IPV6:
- log_debug("ipv6 peers %d:", allen);
+ zlog_debug("ipv6 peers %d:", allen);
bpc.bpc_ipv4 = false;
break;
case PLT_LABEL:
- log_debug("label peers %d:", allen);
+ zlog_debug("label peers %d:", allen);
if (parse_peer_label_config(jo_val, &bpc) != 0) {
error++;
continue;
default:
error++;
- log_error("%s:%d: unsupported peer type", __func__,
- __LINE__);
+ zlog_err("%s:%d: unsupported peer type", __func__,
+ __LINE__);
break;
}
int family_type = (bpc->bpc_ipv4) ? AF_INET : AF_INET6;
int error = 0;
- log_debug(" peer: %s", bpc->bpc_ipv4 ? "ipv4" : "ipv6");
+ zlog_debug(" peer: %s", bpc->bpc_ipv4 ? "ipv4" : "ipv6");
JSON_FOREACH (jo, joi, join) {
key = json_object_iter_peek_name(&joi);
if (strcmp(key, "multihop") == 0) {
bpc->bpc_mhop = json_object_get_boolean(jo_val);
- log_debug(" multihop: %s",
- bpc->bpc_mhop ? "true" : "false");
+ zlog_debug(" multihop: %s",
+ bpc->bpc_mhop ? "true" : "false");
} else if (strcmp(key, "peer-address") == 0) {
sval = json_object_get_string(jo_val);
if (strtosa(sval, &bpc->bpc_peer) != 0
|| bpc->bpc_peer.sa_sin.sin_family != family_type) {
- log_info(
+ zlog_debug(
"%s:%d failed to parse peer-address '%s'",
__func__, __LINE__, sval);
error++;
}
- log_debug(" peer-address: %s", sval);
+ zlog_debug(" peer-address: %s", sval);
} else if (strcmp(key, "local-address") == 0) {
sval = json_object_get_string(jo_val);
if (strtosa(sval, &bpc->bpc_local) != 0
|| bpc->bpc_local.sa_sin.sin_family
!= family_type) {
- log_info(
+ zlog_debug(
"%s:%d failed to parse local-address '%s'",
__func__, __LINE__, sval);
error++;
}
- log_debug(" local-address: %s", sval);
+ zlog_debug(" local-address: %s", sval);
} else if (strcmp(key, "local-interface") == 0) {
bpc->bpc_has_localif = true;
sval = json_object_get_string(jo_val);
if (strlcpy(bpc->bpc_localif, sval,
sizeof(bpc->bpc_localif))
> sizeof(bpc->bpc_localif)) {
- log_debug(
+ zlog_debug(
" local-interface: %s (truncated)",
sval);
error++;
} else {
- log_debug(" local-interface: %s", sval);
+ zlog_debug(" local-interface: %s", sval);
}
} else if (strcmp(key, "vrf-name") == 0) {
bpc->bpc_has_vrfname = true;
if (strlcpy(bpc->bpc_vrfname, sval,
sizeof(bpc->bpc_vrfname))
> sizeof(bpc->bpc_vrfname)) {
- log_debug(" vrf-name: %s (truncated)",
- sval);
+ zlog_debug(" vrf-name: %s (truncated)",
+ sval);
error++;
} else {
- log_debug(" vrf-name: %s", sval);
+ zlog_debug(" vrf-name: %s", sval);
}
} else if (strcmp(key, "detect-multiplier") == 0) {
bpc->bpc_detectmultiplier =
json_object_get_int64(jo_val);
bpc->bpc_has_detectmultiplier = true;
- log_debug(" detect-multiplier: %u",
- bpc->bpc_detectmultiplier);
+ zlog_debug(" detect-multiplier: %u",
+ bpc->bpc_detectmultiplier);
} else if (strcmp(key, "receive-interval") == 0) {
bpc->bpc_recvinterval = json_object_get_int64(jo_val);
bpc->bpc_has_recvinterval = true;
- log_debug(" receive-interval: %" PRIu64,
- bpc->bpc_recvinterval);
+ zlog_debug(" receive-interval: %" PRIu64,
+ bpc->bpc_recvinterval);
} else if (strcmp(key, "transmit-interval") == 0) {
bpc->bpc_txinterval = json_object_get_int64(jo_val);
bpc->bpc_has_txinterval = true;
- log_debug(" transmit-interval: %" PRIu64,
- bpc->bpc_txinterval);
+ zlog_debug(" transmit-interval: %" PRIu64,
+ bpc->bpc_txinterval);
} else if (strcmp(key, "echo-interval") == 0) {
bpc->bpc_echointerval = json_object_get_int64(jo_val);
bpc->bpc_has_echointerval = true;
- log_debug(" echo-interval: %" PRIu64,
- bpc->bpc_echointerval);
+ zlog_debug(" echo-interval: %" PRIu64,
+ bpc->bpc_echointerval);
} else if (strcmp(key, "create-only") == 0) {
bpc->bpc_createonly = json_object_get_boolean(jo_val);
- log_debug(" create-only: %s",
- bpc->bpc_createonly ? "true" : "false");
+ zlog_debug(" create-only: %s",
+ bpc->bpc_createonly ? "true" : "false");
} else if (strcmp(key, "shutdown") == 0) {
bpc->bpc_shutdown = json_object_get_boolean(jo_val);
- log_debug(" shutdown: %s",
- bpc->bpc_shutdown ? "true" : "false");
+ zlog_debug(" shutdown: %s",
+ bpc->bpc_shutdown ? "true" : "false");
} else if (strcmp(key, "echo-mode") == 0) {
bpc->bpc_echo = json_object_get_boolean(jo_val);
- log_debug(" echo-mode: %s",
- bpc->bpc_echo ? "true" : "false");
+ zlog_debug(" echo-mode: %s",
+ bpc->bpc_echo ? "true" : "false");
} else if (strcmp(key, "label") == 0) {
bpc->bpc_has_label = true;
sval = json_object_get_string(jo_val);
if (strlcpy(bpc->bpc_label, sval,
sizeof(bpc->bpc_label))
> sizeof(bpc->bpc_label)) {
- log_debug(" label: %s (truncated)",
- sval);
+ zlog_debug(" label: %s (truncated)",
+ sval);
error++;
} else {
- log_debug(" label: %s", sval);
+ zlog_debug(" label: %s", sval);
}
} else {
sval = json_object_get_string(jo_val);
- log_warning("%s:%d invalid configuration: '%s: %s'",
- __func__, __LINE__, key, sval);
+ zlog_warn("%s:%d invalid configuration: '%s: %s'",
+ __func__, __LINE__, key, sval);
error++;
}
}
if (bpc->bpc_peer.sa_sin.sin_family == 0) {
- log_debug("%s:%d no peer address provided", __func__, __LINE__);
+ zlog_debug("%s:%d no peer address provided", __func__,
+ __LINE__);
error++;
}
if (pl == NULL)
return 1;
- log_debug(" peer-label: %s", sval);
+ zlog_debug(" peer-label: %s", sval);
/* Translate the label into BFD address keys. */
bs_to_bpc(pl->pl_bs, bpc);
if (strlcpy(pl->pl_label, label, sizeof(pl->pl_label))
> sizeof(pl->pl_label))
- log_warning("%s:%d: label was truncated", __func__, __LINE__);
+ zlog_warn("%s:%d: label was truncated", __func__, __LINE__);
pl->pl_bs = bs;
bs->pl = pl;
flags = fcntl(fd, F_GETFL, 0);
if (flags == -1) {
- log_warning("%s: fcntl F_GETFL: %s", __func__, strerror(errno));
+ zlog_warn("%s: fcntl F_GETFL: %s", __func__, strerror(errno));
return -1;
}
flags |= O_NONBLOCK;
if (fcntl(fd, F_SETFL, flags) == -1) {
- log_warning("%s: fcntl F_SETFL: %s", __func__, strerror(errno));
+ zlog_warn("%s: fcntl F_SETFL: %s", __func__, strerror(errno));
return -1;
}
sd = socket(AF_UNIX, SOCK_STREAM, PF_UNSPEC);
if (sd == -1) {
- log_error("%s: socket: %s", __func__, strerror(errno));
+ zlog_err("%s: socket: %s", __func__, strerror(errno));
return -1;
}
umval = umask(0);
if (bind(sd, (struct sockaddr *)&sun_, sizeof(sun_)) == -1) {
- log_error("%s: bind: %s", __func__, strerror(errno));
+ zlog_err("%s: bind: %s", __func__, strerror(errno));
close(sd);
return -1;
}
umask(umval);
if (listen(sd, SOMAXCONN) == -1) {
- log_error("%s: listen: %s", __func__, strerror(errno));
+ zlog_err("%s: listen: %s", __func__, strerror(errno));
close(sd);
return -1;
}
csock = accept(sd, NULL, 0);
if (csock == -1) {
- log_warning("%s: accept: %s", __func__, strerror(errno));
+ zlog_warn("%s: accept: %s", __func__, strerror(errno));
return 0;
}
if (errno == EAGAIN || errno == EWOULDBLOCK || errno == EINTR)
goto schedule_next_read;
- log_warning("%s: read: %s", __func__, strerror(errno));
+ zlog_warn("%s: read: %s", __func__, strerror(errno));
control_free(bcs);
return 0;
}
/* Validate header fields. */
plen = ntohl(bcm.bcm_length);
if (plen < 2) {
- log_debug("%s: client closed due small message length: %d",
- __func__, bcm.bcm_length);
+ zlog_debug("%s: client closed due small message length: %d",
+ __func__, bcm.bcm_length);
control_free(bcs);
return 0;
}
if (bcm.bcm_ver != BMV_VERSION_1) {
- log_debug("%s: client closed due bad version: %d", __func__,
- bcm.bcm_ver);
+ zlog_debug("%s: client closed due bad version: %d", __func__,
+ bcm.bcm_ver);
control_free(bcs);
return 0;
}
bcb->bcb_buf = XMALLOC(MTYPE_BFDD_NOTIFICATION,
sizeof(bcm) + bcb->bcb_left + 1);
if (bcb->bcb_buf == NULL) {
- log_warning("%s: not enough memory for message size: %zu",
- __func__, bcb->bcb_left);
+ zlog_warn("%s: not enough memory for message size: %zu",
+ __func__, bcb->bcb_left);
control_free(bcs);
return 0;
}
if (errno == EAGAIN || errno == EWOULDBLOCK || errno == EINTR)
goto schedule_next_read;
- log_warning("%s: read: %s", __func__, strerror(errno));
+ zlog_warn("%s: read: %s", __func__, strerror(errno));
control_free(bcs);
return 0;
}
break;
default:
- log_debug("%s: unhandled message type: %d", __func__,
- bcb->bcb_bcm->bcm_type);
+ zlog_debug("%s: unhandled message type: %d", __func__,
+ bcb->bcb_bcm->bcm_type);
control_response(bcs, bcb->bcb_bcm->bcm_id, BCM_RESPONSE_ERROR,
"invalid message type");
break;
return 0;
}
- log_warning("%s: write: %s", __func__, strerror(errno));
+ zlog_warn("%s: write: %s", __func__, strerror(errno));
control_free(bcs);
return 0;
}
/* Generate JSON response. */
jsonstr = config_response(status, error);
if (jsonstr == NULL) {
- log_warning("%s: config_response: failed to get JSON str",
- __func__);
+ zlog_warn("%s: config_response: failed to get JSON str",
+ __func__);
return;
}
/* Generate JSON response. */
jsonstr = config_notify(bs);
if (jsonstr == NULL) {
- log_warning("%s: config_notify: failed to get JSON str",
- __func__);
+ zlog_warn("%s: config_notify: failed to get JSON str",
+ __func__);
return;
}
/* Generate JSON response. */
jsonstr = config_notify_config(op, bs);
if (jsonstr == NULL) {
- log_warning("%s: config_notify_config: failed to get JSON str",
- __func__);
+ zlog_warn("%s: config_notify_config: failed to get JSON str",
+ __func__);
return;
}
tv_normalize(&tv);
#ifdef BFD_EVENT_DEBUG
- log_debug("%s: sec = %ld, usec = %ld", __func__, tv.tv_sec, tv.tv_usec);
+ zlog_debug("%s: sec = %ld, usec = %ld", __func__, tv.tv_sec,
+ tv.tv_usec);
#endif /* BFD_EVENT_DEBUG */
thread_add_timer_tv(master, bfd_recvtimer_cb, bs, &tv,
tv_normalize(&tv);
#ifdef BFD_EVENT_DEBUG
- log_debug("%s: sec = %ld, usec = %ld", __func__, tv.tv_sec, tv.tv_usec);
+ zlog_debug("%s: sec = %ld, usec = %ld", __func__, tv.tv_sec,
+ tv.tv_usec);
#endif /* BFD_EVENT_DEBUG */
thread_add_timer_tv(master, bfd_echo_recvtimer_cb, bs, &tv,
tv_normalize(&tv);
#ifdef BFD_EVENT_DEBUG
- log_debug("%s: sec = %ld, usec = %ld", __func__, tv.tv_sec, tv.tv_usec);
+ zlog_debug("%s: sec = %ld, usec = %ld", __func__, tv.tv_sec,
+ tv.tv_usec);
#endif /* BFD_EVENT_DEBUG */
thread_add_timer_tv(master, bfd_xmt_cb, bs, &tv, &bs->xmttimer_ev);
tv_normalize(&tv);
#ifdef BFD_EVENT_DEBUG
- log_debug("%s: sec = %ld, usec = %ld", __func__, tv.tv_sec, tv.tv_usec);
+ zlog_debug("%s: sec = %ld, usec = %ld", __func__, tv.tv_sec,
+ tv.tv_usec);
#endif /* BFD_EVENT_DEBUG */
thread_add_timer_tv(master, bfd_echo_xmt_cb, bs, &tv,
sprintf(cbit_str, "CB %x", bpc->bpc_cbit);
- log_debug("%s:%d: %s %s%s%s%s%s%s %s", func, line,
- bpc->bpc_mhop ? "multi-hop" : "single-hop", addr[0], addr[1],
- addr[2], timers[0], timers[1], timers[2], cbit_str);
+ zlog_debug("%s:%d: %s %s%s%s%s%s%s %s", func, line,
+ bpc->bpc_mhop ? "multi-hop" : "single-hop", addr[0], addr[1],
+ addr[2], timers[0], timers[1], timers[2], cbit_str);
}
#define DEBUG_PRINTBPC(bpc) debug_printbpc(__FILE__, __LINE__, (bpc))
return;
default:
- log_warning("ptm-read-address: invalid family: %d", family);
+ zlog_warn("ptm-read-address: invalid family: %d", family);
break;
}
*pc = pc_new(pid);
if (*pc == NULL) {
- log_debug("ptm-read: failed to allocate memory");
+ zlog_debug("ptm-read: failed to allocate memory");
return -1;
}
*/
STREAM_GETC(msg, ifnamelen);
if (ifnamelen >= sizeof(bpc->bpc_localif)) {
- log_error("ptm-read: interface name is too big");
+ zlog_err("ptm-read: interface name is too big");
return -1;
}
bpc->bpc_has_vrfname = true;
strlcpy(bpc->bpc_vrfname, vrf->name, sizeof(bpc->bpc_vrfname));
} else {
- log_error("ptm-read: vrf id %u could not be identified", vrf_id);
+ zlog_err("ptm-read: vrf id %u could not be identified",
+ vrf_id);
return -1;
}
} else {
if (bpc->bpc_local.sa_sin.sin_family != 0
&& (bpc->bpc_local.sa_sin.sin_family
!= bpc->bpc_peer.sa_sin.sin_family)) {
- log_warning("ptm-read: peer family doesn't match local type");
+ zlog_warn("ptm-read: peer family doesn't match local type");
return -1;
}
if (bs == NULL) {
bs = ptm_bfd_sess_new(&bpc);
if (bs == NULL) {
- log_debug("ptm-add-dest: failed to create BFD session");
+ zlog_debug(
+ "ptm-add-dest: failed to create BFD session");
return;
}
} else {
/* Create client peer notification register. */
pcn = pcn_new(pc, bs);
if (pcn == NULL) {
- log_error("ptm-add-dest: failed to registrate notifications");
+ zlog_err("ptm-add-dest: failed to registrate notifications");
return;
}
/* Find or start new BFD session. */
bs = bs_peer_find(&bpc);
if (bs == NULL) {
- log_debug("ptm-del-dest: failed to find BFD session");
+ zlog_debug("ptm-del-dest: failed to find BFD session");
return;
}
pc = pc_new(pid);
if (pc == NULL) {
- log_error("ptm-add-client: failed to register client: %u", pid);
+ zlog_err("ptm-add-client: failed to register client: %u", pid);
return;
}
return;
stream_failure:
- log_error("ptm-add-client: failed to register client");
+ zlog_err("ptm-add-client: failed to register client");
}
/*
pc = pc_lookup(pid);
if (pc == NULL) {
- log_debug("ptm-del-client: failed to find client: %u", pid);
+ zlog_debug("ptm-del-client: failed to find client: %u", pid);
return;
}
return;
stream_failure:
- log_error("ptm-del-client: failed to deregister client");
+ zlog_err("ptm-del-client: failed to deregister client");
}
static int bfdd_replay(ZAPI_CALLBACK_ARGS)
break;
default:
- log_debug("ptm-replay: invalid message type %u", rcmd);
+ zlog_debug("ptm-replay: invalid message type %u", rcmd);
return -1;
}
return 0;
stream_failure:
- log_error("ptm-replay: failed to find command");
+ zlog_err("ptm-replay: failed to find command");
return -1;
}