xref: /openbsd-src/usr.sbin/bgpd/logmsg.c (revision 03adc85b7600a1f8f04886b8321c1c1c0c4933d4)
1 /*	$OpenBSD: logmsg.c,v 1.2 2017/01/24 04:22:42 benno Exp $ */
2 
3 /*
4  * Copyright (c) 2003, 2004 Henning Brauer <henning@openbsd.org>
5  *
6  * Permission to use, copy, modify, and distribute this software for any
7  * purpose with or without fee is hereby granted, provided that the above
8  * copyright notice and this permission notice appear in all copies.
9  *
10  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17  */
18 
19 #include <errno.h>
20 #include <stdarg.h>
21 #include <stdio.h>
22 #include <stdlib.h>
23 #include <string.h>
24 #include <sys/types.h>
25 #include <syslog.h>
26 
27 #include "bgpd.h"
28 #include "session.h"
29 #include "log.h"
30 
31 char *
32 log_fmt_peer(const struct peer_config *peer)
33 {
34 	const char	*ip;
35 	char		*pfmt, *p;
36 
37 	ip = log_addr(&peer->remote_addr);
38 	if ((peer->remote_addr.aid == AID_INET && peer->remote_masklen != 32) ||
39 	    (peer->remote_addr.aid == AID_INET6 &&
40 	    peer->remote_masklen != 128)) {
41 		if (asprintf(&p, "%s/%u", ip, peer->remote_masklen) == -1)
42 			fatal(NULL);
43 	} else {
44 		if ((p = strdup(ip)) == NULL)
45 			fatal(NULL);
46 	}
47 
48 	if (peer->descr[0]) {
49 		if (asprintf(&pfmt, "neighbor %s (%s)", p, peer->descr) ==
50 		    -1)
51 			fatal(NULL);
52 	} else {
53 		if (asprintf(&pfmt, "neighbor %s", p) == -1)
54 			fatal(NULL);
55 	}
56 	free(p);
57 	return (pfmt);
58 }
59 
60 void
61 log_peer_warn(const struct peer_config *peer, const char *emsg, ...)
62 {
63 	char	*p, *nfmt;
64 	va_list	 ap;
65 
66 	p = log_fmt_peer(peer);
67 	if (emsg == NULL) {
68 		if (asprintf(&nfmt, "%s: %s", p, strerror(errno)) == -1)
69 			fatal(NULL);
70 	} else {
71 		if (asprintf(&nfmt, "%s: %s: %s", p, emsg, strerror(errno)) ==
72 		    -1)
73 			fatal(NULL);
74 	}
75 	va_start(ap, emsg);
76 	vlog(LOG_CRIT, nfmt, ap);
77 	va_end(ap);
78 	free(p);
79 	free(nfmt);
80 }
81 
82 void
83 log_peer_warnx(const struct peer_config *peer, const char *emsg, ...)
84 {
85 	char	*p, *nfmt;
86 	va_list	 ap;
87 
88 	p = log_fmt_peer(peer);
89 	if (asprintf(&nfmt, "%s: %s", p, emsg) == -1)
90 		fatal(NULL);
91 	va_start(ap, emsg);
92 	vlog(LOG_CRIT, nfmt, ap);
93 	va_end(ap);
94 	free(p);
95 	free(nfmt);
96 }
97 
98 void
99 log_statechange(struct peer *peer, enum session_state nstate,
100     enum session_events event)
101 {
102 	char	*p;
103 
104 	/* don't clutter the logs with constant Connect -> Active -> Connect */
105 	if (nstate == STATE_CONNECT && peer->state == STATE_ACTIVE &&
106 	    peer->prev_state == STATE_CONNECT)
107 		return;
108 	if (nstate == STATE_ACTIVE && peer->state == STATE_CONNECT &&
109 	    peer->prev_state == STATE_ACTIVE)
110 		return;
111 
112 	peer->lasterr = 0;
113 	p = log_fmt_peer(&peer->conf);
114 	logit(LOG_INFO, "%s: state change %s -> %s, reason: %s",
115 	    p, statenames[peer->state], statenames[nstate], eventnames[event]);
116 	free(p);
117 }
118 
119 void
120 log_notification(const struct peer *peer, u_int8_t errcode, u_int8_t subcode,
121     u_char *data, u_int16_t datalen, const char *dir)
122 {
123 	char		*p;
124 	const char	*suberrname = NULL;
125 	int		 uk = 0;
126 
127 	p = log_fmt_peer(&peer->conf);
128 	switch (errcode) {
129 	case ERR_HEADER:
130 		if (subcode >= sizeof(suberr_header_names)/sizeof(char *))
131 			uk = 1;
132 		else
133 			suberrname = suberr_header_names[subcode];
134 		break;
135 	case ERR_OPEN:
136 		if (subcode >= sizeof(suberr_open_names)/sizeof(char *))
137 			uk = 1;
138 		else
139 			suberrname = suberr_open_names[subcode];
140 		break;
141 	case ERR_UPDATE:
142 		if (subcode >= sizeof(suberr_update_names)/sizeof(char *))
143 			uk = 1;
144 		else
145 			suberrname = suberr_update_names[subcode];
146 		break;
147 	case ERR_CEASE:
148 		if (subcode >= sizeof(suberr_cease_names)/sizeof(char *))
149 			uk = 1;
150 		else
151 			suberrname = suberr_cease_names[subcode];
152 		break;
153 	case ERR_HOLDTIMEREXPIRED:
154 		if (subcode != 0)
155 			uk = 1;
156 		break;
157 	case ERR_FSM:
158 		if (subcode >= sizeof(suberr_fsm_names)/sizeof(char *))
159 			uk = 1;
160 		else
161 			suberrname = suberr_fsm_names[subcode];
162 		break;
163 	default:
164 		logit(LOG_CRIT, "%s: %s notification, unknown errcode "
165 		    "%u, subcode %u", p, dir, errcode, subcode);
166 		free(p);
167 		return;
168 	}
169 
170 	if (uk)
171 		logit(LOG_CRIT, "%s: %s notification: %s, unknown subcode %u",
172 		    p, dir, errnames[errcode], subcode);
173 	else {
174 		if (suberrname == NULL)
175 			logit(LOG_CRIT, "%s: %s notification: %s", p,
176 			    dir, errnames[errcode]);
177 		else
178 			logit(LOG_CRIT, "%s: %s notification: %s, %s",
179 			    p, dir, errnames[errcode], suberrname);
180 	}
181 	free(p);
182 }
183 
184 void
185 log_conn_attempt(const struct peer *peer, struct sockaddr *sa)
186 {
187 	char		*p;
188 	const char	*b;
189 
190 	if (peer == NULL) {	/* connection from non-peer, drop */
191 		b = log_sockaddr(sa);
192 		logit(LOG_INFO, "connection from non-peer %s refused", b);
193 	} else {
194 		/* only log if there is a chance that the session may come up */
195 		if (peer->conf.down && peer->state == STATE_IDLE)
196 			return;
197 		p = log_fmt_peer(&peer->conf);
198 		logit(LOG_INFO, "Connection attempt from %s while session is "
199 		    "in state %s", p, statenames[peer->state]);
200 		free(p);
201 	}
202 }
203