const char *func_str;
ssize_t size = 0;
u32 sid = vcom_sid_from_fd (fd);
- int rv, i, total = 0;
+ int rv = 0, i, total = 0;
if ((errno = -vcom_init ()))
return -1;
const char *func_str;
ssize_t size = 0, total = 0;
u32 sid = vcom_sid_from_fd (fd);
- int rv, i;
+ int i, rv = 0;
/*
* Use [f]printf() instead of clib_warning() to prevent recursion SIGSEGV.
if (((domain == AF_INET) || (domain == AF_INET6)) &&
((sock_type == SOCK_STREAM) || (sock_type == SOCK_DGRAM)))
{
+ func_str = __func__;
+
clib_warning ("LDP<%d>: LDP-TBD", getpid ());
errno = ENOSYS;
rv = -1;
if ((errno = -vcom_init ()))
return -1;
- clib_warning ("LDP<%d>: fd %d (0x%x) ", getpid (), fd, fd);
-
if (sid != INVALID_SESSION_ID)
{
vppcom_endpt_t ep;
if (sid != INVALID_SESSION_ID)
{
+ func_str = __func__;
+
clib_warning ("LDP<%d>: LDP-TBD", getpid ());
errno = ENOSYS;
size = -1;
if (sid != INVALID_SESSION_ID)
{
+ func_str = __func__;
+
clib_warning ("LDP<%d>: LDP-TBD", getpid ());
errno = ENOSYS;
size = -1;
int rv;
const char *func_str = __func__;
u32 sid = vcom_sid_from_fd (fd);
- u32 buflen = (u32) * optlen;
+ u32 buflen = optlen ? (u32) * optlen : 0;
if ((errno = -vcom_init ()))
return -1;
if (VCOM_DEBUG > 1)
clib_warning ("LDP<%d>: fd %d (0x%x): calling %s(): "
"sid %u (0x%x), optlen %d",
- getpid (), fd, fd, func_str, sid, sid, *optlen);
+ getpid (), fd, fd, func_str, sid, sid, buflen);
rv = vppcom_session_attr (sid, VPPCOM_ATTR_GET_RX_FIFO_LEN,
optval, optlen);
break;
{
vppcom_endpt_t ep;
u8 src_addr[sizeof (struct sockaddr_in6)];
+ memset (&ep, 0, sizeof (ep));
ep.ip = src_addr;
func_str = "vppcom_session_accept";
if (sid != INVALID_SESSION_ID)
{
+ func_str = __func__;
+
clib_warning ("LDP<%d>: LDP-TBD", getpid ());
errno = ENOSYS;
rv = -1;
int maxevents, int timeout, const sigset_t * sigmask)
{
const char *func_str;
- int rv;
+ int rv = 0;
double time_to_wait = (double) 0;
double time_out, now = 0;
u32 vep_idx = vcom_sid_from_fd (epfd);