xref: /openbsd-src/usr.sbin/bgpd/logmsg.c (revision f2da64fbbbf1b03f09f390ab01267c93dfd77c4c)
1 /*	$OpenBSD: logmsg.c,v 1.1 2016/09/02 14:04:51 benno Exp $ */
2 
3 /*
4  * Copyright (c) 2003, 2004 Henning Brauer <henning@openbsd.org>
5  *
6  * Permission to use, copy, modify, and distribute this software for any
7  * purpose with or without fee is hereby granted, provided that the above
8  * copyright notice and this permission notice appear in all copies.
9  *
10  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17  */
18 
19 #include <errno.h>
20 #include <stdarg.h>
21 #include <stdio.h>
22 #include <stdlib.h>
23 #include <string.h>
24 #include <sys/types.h>
25 #include <syslog.h>
26 
27 #include "bgpd.h"
28 #include "session.h"
29 
30 char *
31 log_fmt_peer(const struct peer_config *peer)
32 {
33 	const char	*ip;
34 	char		*pfmt, *p;
35 
36 	ip = log_addr(&peer->remote_addr);
37 	if ((peer->remote_addr.aid == AID_INET && peer->remote_masklen != 32) ||
38 	    (peer->remote_addr.aid == AID_INET6 &&
39 	    peer->remote_masklen != 128)) {
40 		if (asprintf(&p, "%s/%u", ip, peer->remote_masklen) == -1)
41 			fatal(NULL);
42 	} else {
43 		if ((p = strdup(ip)) == NULL)
44 			fatal(NULL);
45 	}
46 
47 	if (peer->descr[0]) {
48 		if (asprintf(&pfmt, "neighbor %s (%s)", p, peer->descr) ==
49 		    -1)
50 			fatal(NULL);
51 	} else {
52 		if (asprintf(&pfmt, "neighbor %s", p) == -1)
53 			fatal(NULL);
54 	}
55 	free(p);
56 	return (pfmt);
57 }
58 
59 void
60 log_peer_warn(const struct peer_config *peer, const char *emsg, ...)
61 {
62 	char	*p, *nfmt;
63 	va_list	 ap;
64 
65 	p = log_fmt_peer(peer);
66 	if (emsg == NULL) {
67 		if (asprintf(&nfmt, "%s: %s", p, strerror(errno)) == -1)
68 			fatal(NULL);
69 	} else {
70 		if (asprintf(&nfmt, "%s: %s: %s", p, emsg, strerror(errno)) ==
71 		    -1)
72 			fatal(NULL);
73 	}
74 	va_start(ap, emsg);
75 	vlog(LOG_CRIT, nfmt, ap);
76 	va_end(ap);
77 	free(p);
78 	free(nfmt);
79 }
80 
81 void
82 log_peer_warnx(const struct peer_config *peer, const char *emsg, ...)
83 {
84 	char	*p, *nfmt;
85 	va_list	 ap;
86 
87 	p = log_fmt_peer(peer);
88 	if (asprintf(&nfmt, "%s: %s", p, emsg) == -1)
89 		fatal(NULL);
90 	va_start(ap, emsg);
91 	vlog(LOG_CRIT, nfmt, ap);
92 	va_end(ap);
93 	free(p);
94 	free(nfmt);
95 }
96 
97 void
98 log_statechange(struct peer *peer, enum session_state nstate,
99     enum session_events event)
100 {
101 	char	*p;
102 
103 	/* don't clutter the logs with constant Connect -> Active -> Connect */
104 	if (nstate == STATE_CONNECT && peer->state == STATE_ACTIVE &&
105 	    peer->prev_state == STATE_CONNECT)
106 		return;
107 	if (nstate == STATE_ACTIVE && peer->state == STATE_CONNECT &&
108 	    peer->prev_state == STATE_ACTIVE)
109 		return;
110 
111 	peer->lasterr = 0;
112 	p = log_fmt_peer(&peer->conf);
113 	logit(LOG_INFO, "%s: state change %s -> %s, reason: %s",
114 	    p, statenames[peer->state], statenames[nstate], eventnames[event]);
115 	free(p);
116 }
117 
118 void
119 log_notification(const struct peer *peer, u_int8_t errcode, u_int8_t subcode,
120     u_char *data, u_int16_t datalen, const char *dir)
121 {
122 	char		*p;
123 	const char	*suberrname = NULL;
124 	int		 uk = 0;
125 
126 	p = log_fmt_peer(&peer->conf);
127 	switch (errcode) {
128 	case ERR_HEADER:
129 		if (subcode >= sizeof(suberr_header_names)/sizeof(char *))
130 			uk = 1;
131 		else
132 			suberrname = suberr_header_names[subcode];
133 		break;
134 	case ERR_OPEN:
135 		if (subcode >= sizeof(suberr_open_names)/sizeof(char *))
136 			uk = 1;
137 		else
138 			suberrname = suberr_open_names[subcode];
139 		break;
140 	case ERR_UPDATE:
141 		if (subcode >= sizeof(suberr_update_names)/sizeof(char *))
142 			uk = 1;
143 		else
144 			suberrname = suberr_update_names[subcode];
145 		break;
146 	case ERR_CEASE:
147 		if (subcode >= sizeof(suberr_cease_names)/sizeof(char *))
148 			uk = 1;
149 		else
150 			suberrname = suberr_cease_names[subcode];
151 		break;
152 	case ERR_HOLDTIMEREXPIRED:
153 		if (subcode != 0)
154 			uk = 1;
155 		break;
156 	case ERR_FSM:
157 		if (subcode >= sizeof(suberr_fsm_names)/sizeof(char *))
158 			uk = 1;
159 		else
160 			suberrname = suberr_fsm_names[subcode];
161 		break;
162 	default:
163 		logit(LOG_CRIT, "%s: %s notification, unknown errcode "
164 		    "%u, subcode %u", p, dir, errcode, subcode);
165 		free(p);
166 		return;
167 	}
168 
169 	if (uk)
170 		logit(LOG_CRIT, "%s: %s notification: %s, unknown subcode %u",
171 		    p, dir, errnames[errcode], subcode);
172 	else {
173 		if (suberrname == NULL)
174 			logit(LOG_CRIT, "%s: %s notification: %s", p,
175 			    dir, errnames[errcode]);
176 		else
177 			logit(LOG_CRIT, "%s: %s notification: %s, %s",
178 			    p, dir, errnames[errcode], suberrname);
179 	}
180 	free(p);
181 }
182 
183 void
184 log_conn_attempt(const struct peer *peer, struct sockaddr *sa)
185 {
186 	char		*p;
187 	const char	*b;
188 
189 	if (peer == NULL) {	/* connection from non-peer, drop */
190 		b = log_sockaddr(sa);
191 		logit(LOG_INFO, "connection from non-peer %s refused", b);
192 	} else {
193 		/* only log if there is a chance that the session may come up */
194 		if (peer->conf.down && peer->state == STATE_IDLE)
195 			return;
196 		p = log_fmt_peer(&peer->conf);
197 		logit(LOG_INFO, "Connection attempt from %s while session is "
198 		    "in state %s", p, statenames[peer->state]);
199 		free(p);
200 	}
201 }
202