2 * ntp_io.c - input/output routines for ntpd. The socket-opening code
3 * was shamelessly stolen from ntpd.
10 #include "ntp_machine.h"
14 #include "ntp_refclock.h"
15 #include "ntp_stdlib.h"
16 #include "ntp_request.h"
18 #include "ntp_unixtime.h"
20 /* Don't include ISC's version of IPv6 variables and structures */
22 #include <isc/interfaceiter.h>
24 #include <isc/result.h>
32 #ifdef HAVE_SYS_PARAM_H
33 # include <sys/param.h>
34 #endif /* HAVE_SYS_PARAM_H */
35 #ifdef HAVE_SYS_IOCTL_H
36 # include <sys/ioctl.h>
38 #ifdef HAVE_SYS_SOCKIO_H /* UXPV: SIOC* #defines (Frank Vance <fvance@waii.com>) */
39 # include <sys/sockio.h>
46 * setsockopt does not always have the same arg declaration
47 * across all platforms. If it's not defined we make it empty
50 #ifndef SETSOCKOPT_ARG_CAST
51 #define SETSOCKOPT_ARG_CAST
55 * Set up some macros to look for IPv6 and IPv6 multicast
58 #if defined(ISC_PLATFORM_HAVEIPV6) && !defined(DISABLE_IPV6)
60 #define INCLUDE_IPV6_SUPPORT
62 #if defined(INCLUDE_IPV6_SUPPORT) && defined(IPV6_JOIN_GROUP) && defined(IPV6_LEAVE_GROUP)
63 #define INCLUDE_IPV6_MULTICAST_SUPPORT
65 #endif /* IPV6 Multicast Support */
66 #endif /* IPv6 Support */
68 #ifdef INCLUDE_IPV6_SUPPORT
69 #include <netinet/in.h>
70 #include <net/if_var.h>
71 #include <netinet/in_var.h>
72 #endif /* !INCLUDE_IPV6_SUPPORT */
74 extern int listen_to_virtual_ips;
75 extern const char *specific_interface;
77 #if defined(SO_TIMESTAMP) && defined(SCM_TIMESTAMP)
78 #if defined(CMSG_FIRSTHDR)
79 #define HAVE_TIMESTAMP
80 #define USE_TIMESTAMP_CMSG
81 #ifndef TIMESTAMP_CTLMSGBUF_SIZE
82 #define TIMESTAMP_CTLMSGBUF_SIZE 1536 /* moderate default */
85 /* fill in for old/other timestamp interfaces */
89 #if defined(SYS_WINNT)
90 #include <transmitbuff.h>
91 #include <isc/win32os.h>
93 * Define this macro to control the behavior of connection
94 * resets on UDP sockets. See Microsoft KnowledgeBase Article Q263823
96 * NOTE: This requires that Windows 2000 systems install Service Pack 2
99 #ifndef SIO_UDP_CONNRESET
100 #define SIO_UDP_CONNRESET _WSAIOW(IOC_VENDOR,12)
104 * Windows C runtime ioctl() can't deal properly with sockets,
105 * map to ioctlsocket for this source file.
107 #define ioctl(fd, opt, val) ioctlsocket((fd), (opt), (u_long *)(val))
108 #endif /* SYS_WINNT */
111 * We do asynchronous input using the SIGIO facility. A number of
112 * recvbuf buffers are preallocated for input. In the signal
113 * handler we poll to see which sockets are ready and read the
114 * packets from them into the recvbuf's along with a time stamp and
115 * an indication of the source host and the interface it was received
116 * through. This allows us to get as accurate receive time stamps
117 * as possible independent of other processing going on.
119 * We watch the number of recvbufs available to the signal handler
120 * and allocate more when this number drops below the low water
121 * mark. If the signal handler should run out of buffers in the
122 * interim it will drop incoming frames, the idea being that it is
123 * better to drop a packet than to be inaccurate.
128 * Other statistics of possible interest
130 volatile u_long packets_dropped; /* total number of packets dropped on reception */
131 volatile u_long packets_ignored; /* packets received on wild card interface */
132 volatile u_long packets_received; /* total number of packets received */
133 u_long packets_sent; /* total number of packets sent */
134 u_long packets_notsent; /* total number of packets which couldn't be sent */
136 volatile u_long handler_calls; /* number of calls to interrupt handler */
137 volatile u_long handler_pkts; /* number of pkts received by handler */
138 u_long io_timereset; /* time counters were reset */
143 struct interface *any_interface; /* default ipv4 interface */
144 struct interface *any6_interface; /* default ipv6 interface */
145 struct interface *loopback_interface; /* loopback ipv4 interface */
147 int ninterfaces; /* Total number of interfaces */
149 volatile int disable_dynamic_updates; /* when set to != 0 dynamic updates won't happen */
153 * Refclock stuff. We keep a chain of structures with data concerning
154 * the guys we are doing I/O for.
156 static struct refclockio *refio;
157 #endif /* REFCLOCK */
161 * Define what the possible "soft" errors can be. These are non-fatal returns
162 * of various network related functions, like recv() and so on.
164 * For some reason, BSDI (and perhaps others) will sometimes return <0
165 * from recv() but will have errno==0. This is broken, but we have to
166 * work around it here.
168 #define SOFT_ERROR(e) ((e) == EAGAIN || \
169 (e) == EWOULDBLOCK || \
174 * File descriptor masks etc. for call to select
175 * Not needed for I/O Completion Ports
180 * bit alternating value to detect verified interfaces during an update cycle
182 static u_char sys_interphase = 0;
184 static struct interface *new_interface P((struct interface *));
185 static void add_interface P((struct interface *));
186 static int update_interfaces P((u_short, interface_receiver_t, void *));
187 static void remove_interface P((struct interface *));
188 static struct interface *create_interface P((u_short, struct interface *));
190 static int move_fd P((SOCKET));
193 * Multicast functions
195 static isc_boolean_t addr_ismulticast P((struct sockaddr_storage *));
197 * Not all platforms support multicast
200 static isc_boolean_t socket_multicast_enable P((struct interface *, int, struct sockaddr_storage *));
201 static isc_boolean_t socket_multicast_disable P((struct interface *, struct sockaddr_storage *));
205 static void print_interface P((struct interface *, char *, char *));
206 #define DPRINT_INTERFACE(_LVL_, _ARGS_) do { if (debug >= (_LVL_)) { print_interface _ARGS_; } } while (0)
208 #define DPRINT_INTERFACE(_LVL_, _ARGS_) do {} while (0)
211 typedef struct vsock vsock_t;
212 enum desc_type { FD_TYPE_SOCKET, FD_TYPE_FILE };
217 ISC_LINK(vsock_t) link;
220 #if !defined(HAVE_IO_COMPLETION_PORT) && defined(HAS_ROUTING_SOCKET)
222 * async notification processing (e. g. routing sockets)
225 * support for receiving data on fd that is not a refclock or a socket
226 * like e. g. routing sockets
228 struct asyncio_reader {
229 SOCKET fd; /* fd to be read */
230 void *data; /* possibly local data */
231 void (*receiver)(struct asyncio_reader *); /* input handler */
232 ISC_LINK(struct asyncio_reader) link; /* the list this is being kept in */
235 ISC_LIST(struct asyncio_reader) asyncio_reader_list;
237 static void delete_asyncio_reader P((struct asyncio_reader *));
238 static struct asyncio_reader *new_asyncio_reader P((void));
239 static void add_asyncio_reader P((struct asyncio_reader *, enum desc_type));
240 static void remove_asyncio_reader P((struct asyncio_reader *));
242 #endif /* !defined(HAVE_IO_COMPLETION_PORT) && defined(HAS_ROUTING_SOCKET) */
244 static void init_async_notifications P((void));
246 static int create_sockets P((u_short));
247 static SOCKET open_socket P((struct sockaddr_storage *, int, int, struct interface *));
248 static char * fdbits P((int, fd_set *));
249 static void set_reuseaddr P((int));
250 static isc_boolean_t socket_broadcast_enable P((struct interface *, SOCKET, struct sockaddr_storage *));
251 static isc_boolean_t socket_broadcast_disable P((struct interface *, struct sockaddr_storage *));
253 ISC_LIST(vsock_t) fd_list;
255 typedef struct remaddr remaddr_t;
258 struct sockaddr_storage addr;
259 struct interface *interface;
260 ISC_LINK(remaddr_t) link;
263 ISC_LIST(remaddr_t) remoteaddr_list;
265 ISC_LIST(struct interface) inter_list;
267 static struct interface *wildipv4 = NULL;
268 static struct interface *wildipv6 = NULL;
270 static void add_fd_to_list P((SOCKET, enum desc_type));
271 static void close_and_delete_fd_from_list P((SOCKET));
272 static void add_addr_to_list P((struct sockaddr_storage *, struct interface *));
273 static void delete_addr_from_list P((struct sockaddr_storage *));
274 static struct interface *find_addr_in_list P((struct sockaddr_storage *));
275 static struct interface *find_flagged_addr_in_list P((struct sockaddr_storage *, int));
276 static void create_wildcards P((u_short));
277 static isc_boolean_t address_okay P((struct interface *));
278 static void convert_isc_if P((isc_interface_t *, struct interface *, u_short));
279 static void delete_interface_from_list P((struct interface *));
280 static struct interface *getinterface P((struct sockaddr_storage *, int));
281 static struct interface *findlocalinterface P((struct sockaddr_storage *, int));
282 static struct interface *findlocalcastinterface P((struct sockaddr_storage *, int));
285 * Routines to read the ntp packets
287 #if !defined(HAVE_IO_COMPLETION_PORT)
288 static inline int read_network_packet P((SOCKET, struct interface *, l_fp));
289 static inline int read_refclock_packet P((SOCKET, struct refclockio *, l_fp));
294 * Windows 2000 systems incorrectly cause UDP sockets using WASRecvFrom
295 * to not work correctly, returning a WSACONNRESET error when a WSASendTo
296 * fails with an "ICMP port unreachable" response and preventing the
297 * socket from using the WSARecvFrom in subsequent operations.
298 * The function below fixes this, but requires that Windows 2000
299 * Service Pack 2 or later be installed on the system. NT 4.0
300 * systems are not affected by this and work correctly.
301 * See Microsoft Knowledge Base Article Q263823 for details of this.
304 connection_reset_fix(
306 struct sockaddr_storage *addr
309 DWORD dwBytesReturned = 0;
310 BOOL bNewBehavior = FALSE;
314 * disable bad behavior using IOCTL: SIO_UDP_CONNRESET
315 * NT 4.0 has no problem
317 if (isc_win32os_majorversion() >= 5) {
318 status = WSAIoctl(fd, SIO_UDP_CONNRESET, &bNewBehavior,
319 sizeof(bNewBehavior), NULL, 0,
320 &dwBytesReturned, NULL, NULL);
321 if (SOCKET_ERROR == status)
322 netsyslog(LOG_ERR, "connection_reset_fix() "
323 "failed for address %s: %m",
330 * on Unix systems the stdio library typically
331 * makes use of file descriptors in the lower
332 * integer range. stdio usually will make use
333 * of the file descriptor in the range of
335 * in order to keep this range clean for socket
336 * file descriptors we attempt to move them above
337 * FOPEM_MAX. This is not as easy as it sounds as
338 * FOPEN_MAX changes from implementation to implementation
339 * and may exceed to current file decriptor limits.
340 * We are using following strategy:
341 * - keep a current socket fd boundary initialized with
342 * max(0, min(getdtablesize() - FD_CHUNK, FOPEN_MAX))
343 * - attempt to move the descriptor to the boundary or
345 * - if that fails and boundary > 0 set boundary
346 * to min(0, socket_fd_boundary - FD_CHUNK)
348 * if failure and boundary == 0 return old fd
349 * - on success close old fd return new fd
352 * - fds will be moved above the socket fd boundary
353 * if at all possible.
354 * - the socket boundary will be reduced until
355 * allocation is possible or 0 is reached - at this
356 * point the algrithm will be disabled
358 static int move_fd(SOCKET fd)
360 #if !defined(SYS_WINNT) && defined(F_DUPFD)
365 * number of fds we would like to have for
366 * stdio FILE* available.
367 * we can pick a "low" number as our use of
368 * FILE* is limited to log files and temporarily
369 * to data and config files. Except for log files
370 * we don't keep the other FILE* open beyond the
371 * scope of the function that opened it.
373 #ifndef FD_PREFERRED_SOCKBOUNDARY
374 #define FD_PREFERRED_SOCKBOUNDARY 48
377 #ifndef HAVE_GETDTABLESIZE
379 * if we have no idea about the max fd value set up things
380 * so we will start at FOPEN_MAX
382 #define getdtablesize() (FOPEN_MAX+FD_CHUNK)
386 #define FOPEN_MAX 20 /* assume that for the lack of anything better */
388 static SOCKET socket_boundary = -1;
392 * check whether boundary has be set up
395 if (socket_boundary == -1) {
396 socket_boundary = max(0, min(getdtablesize() - FD_CHUNK,
397 min(FOPEN_MAX, FD_PREFERRED_SOCKBOUNDARY)));
399 msyslog(LOG_DEBUG, "ntp_io: estimated max descriptors: %d, initial socket boundary: %d",
400 getdtablesize(), socket_boundary);
405 * Leave a space for stdio to work in. potentially moving the
406 * socket_boundary lower until allocation succeeds.
409 if (fd >= 0 && fd < socket_boundary) {
410 /* inside reserved range: attempt to move fd */
411 newfd = fcntl(fd, F_DUPFD, socket_boundary);
414 /* success: drop the old one - return the new one */
419 /* outside reserved range: no work - return the original one */
422 socket_boundary = max(0, socket_boundary - FD_CHUNK);
424 msyslog(LOG_DEBUG, "ntp_io: selecting new socket boundary: %d",
427 } while (socket_boundary > 0);
428 #endif /* !defined(SYS_WINNT) && defined(F_DUPFD) */
434 * collect timing information for various processing
435 * paths. currently we only pass then on to the file
436 * for later processing. this could also do histogram
437 * based analysis in other to reduce the load (and skew)
438 * dur to the file output
441 collect_timing(struct recvbuf *rb, const char *tag, int count, l_fp *dts)
445 snprintf(buf, sizeof(buf), "%s %d %s %s",
447 ((rb->dstadr) ? stoa(&rb->recv_srcadr) : "-REFCLOCK-") : "-",
448 count, lfptoa(dts, 9), tag);
449 record_timing_stats(buf);
454 * About dynamic interfaces, sockets, reception and more...
456 * the code solves following tasks:
458 * - keep a current list of active interfaces in order
459 * to bind to to the interface address on NTP_PORT so that
460 * all wild and specific bindings for NTP_PORT are taken by ntpd
461 * to avoid other daemons messing with the time or sockets.
462 * - all interfaces keep a list of peers that are referencing
463 * the interface in order to quickly re-assign the peers to
464 * new interface in case an interface is deleted (=> gone from system or
466 * - have a preconfigured socket ready with the right local address
467 * for transmission and reception
468 * - have an address list for all destination addresses used within ntpd
469 * to find the "right" preconfigured socket.
470 * - facilitate updating the internal interface list with respect to
471 * the current kernel state
475 * - mapping of multicast addresses to the interface affected is not always
476 * one to one - especially on hosts with multiple interfaces
477 * the code here currently allocates a separate interface entry for those
478 * multicast addresses
479 * iff it is able to bind to a *new* socket with the multicast address (flags |= MCASTIF)
480 * in case of failure the multicast address is bound to an existing interface.
481 * - on some systems it is perfectly legal to assign the same address to
482 * multiple interfaces. Therefore this code does not keep a list of interfaces
483 * but a list of interfaces that represent a unique address as determined by the kernel
484 * by the procedure in findlocalinterface. Thus it is perfectly legal to see only
485 * one representative of a group of real interfaces if they share the same address.
487 * Frank Kardel 20050910
491 * init_io - initialize I/O data structures and call socket creation routine
497 init_io_completion_port();
499 if (!Win32InitSockets())
501 netsyslog(LOG_ERR, "No useable winsock.dll: %m");
505 #endif /* SYS_WINNT */
508 * Init buffer free list and stat counters
510 init_recvbuff(RECV_INIT);
512 packets_dropped = packets_received = 0;
514 packets_sent = packets_notsent = 0;
515 handler_calls = handler_pkts = 0;
517 loopback_interface = NULL;
518 any_interface = NULL;
519 any6_interface = NULL;
525 #if defined(HAVE_SIGNALED_IO)
529 ISC_LIST_INIT(fd_list);
531 #if !defined(HAVE_IO_COMPLETION_PORT) && defined(HAS_ROUTING_SOCKET)
532 ISC_LIST_INIT(asyncio_reader_list);
535 ISC_LIST_INIT(remoteaddr_list);
537 ISC_LIST_INIT(inter_list);
543 (void) create_sockets(htons(NTP_PORT));
546 init_async_notifications();
548 DPRINTF(3, ("init_io: maxactivefd %d\n", maxactivefd));
553 * function to dump the contents of the interface structure
554 * for debugging use only.
557 interface_dump(struct interface *itf)
561 /* Limit the size of the sockaddr_storage hex dump */
562 int maxsize = min(32, sizeof(struct sockaddr_storage));
564 printf("Dumping interface: %p\n", itf);
565 printf("fd = %d\n", itf->fd);
566 printf("bfd = %d\n", itf->bfd);
567 printf("sin = %s,\n", stoa(&(itf->sin)));
568 cp = (u_char*) &(itf->sin);
569 for(i = 0; i < maxsize; i++)
571 printf("%02x", *cp++);
576 printf("bcast = %s,\n", stoa(&(itf->bcast)));
577 cp = (u_char*) &(itf->bcast);
578 for(i = 0; i < maxsize; i++)
580 printf("%02x", *cp++);
585 printf("mask = %s,\n", stoa(&(itf->mask)));
586 cp = (u_char*) &(itf->mask);
587 for(i = 0; i < maxsize; i++)
589 printf("%02x", *cp++);
594 printf("name = %s\n", itf->name);
595 printf("flags = 0x%08x\n", itf->flags);
596 printf("last_ttl = %d\n", itf->last_ttl);
597 printf("addr_refid = %08x\n", itf->addr_refid);
598 printf("num_mcast = %d\n", itf->num_mcast);
599 printf("received = %ld\n", itf->received);
600 printf("sent = %ld\n", itf->sent);
601 printf("notsent = %ld\n", itf->notsent);
602 printf("ifindex = %u\n", itf->ifindex);
603 printf("scopeid = %u\n", itf->scopeid);
604 printf("peercnt = %u\n", itf->peercnt);
605 printf("phase = %u\n", itf->phase);
609 * print_interface - helper to output debug information
612 print_interface(struct interface *iface, char *pfx, char *sfx)
614 printf("%sinterface #%d: fd=%d, bfd=%d, name=%s, flags=0x%x, scope=%d, ifindex=%d",
623 /* Leave these as three printf calls. */
625 stoa((&iface->sin)));
626 if (iface->flags & INT_BROADCAST)
627 printf(", bcast=%s,",
628 stoa((&iface->bcast)));
629 if (iface->family == AF_INET)
631 stoa((&iface->mask)));
632 printf(", %s:%s", iface->ignore_packets == ISC_FALSE ? "Enabled" : "Disabled", sfx);
633 if (debug > 4) /* in-depth debugging only */
634 interface_dump(iface);
639 #if !defined(HAVE_IO_COMPLETION_PORT) && defined(HAS_ROUTING_SOCKET)
641 * create an asyncio_reader structure
643 static struct asyncio_reader *
646 struct asyncio_reader *reader;
648 reader = (struct asyncio_reader *)emalloc(sizeof(struct asyncio_reader));
650 memset((char *)reader, 0, sizeof(*reader));
651 ISC_LINK_INIT(reader, link);
652 reader->fd = INVALID_SOCKET;
660 delete_asyncio_reader(struct asyncio_reader *reader)
666 * add asynchio_reader
669 add_asyncio_reader(struct asyncio_reader *reader, enum desc_type type)
671 ISC_LIST_APPEND(asyncio_reader_list, reader, link);
672 add_fd_to_list(reader->fd, type);
676 * remove asynchio_reader
679 remove_asyncio_reader(struct asyncio_reader *reader)
681 ISC_LIST_UNLINK_TYPE(asyncio_reader_list, reader, link, struct asyncio_reader);
683 if (reader->fd != INVALID_SOCKET)
684 close_and_delete_fd_from_list(reader->fd);
686 reader->fd = INVALID_SOCKET;
688 #endif /* !defined(HAVE_IO_COMPLETION_PORT) && defined(HAS_ROUTING_SOCKET) */
691 * interface list enumerator - visitor pattern
694 interface_enumerate(interface_receiver_t receiver, void *data)
696 interface_info_t ifi;
697 struct interface *interf;
699 ifi.action = IFS_EXISTS;
701 for (interf = ISC_LIST_HEAD(inter_list);
703 interf = ISC_LIST_NEXT(interf, link)) {
704 ifi.interface = interf;
705 receiver(data, &ifi);
710 * do standard initialization of interface structure
713 init_interface(struct interface *interface)
715 memset((char *)interface, 0, sizeof(struct interface));
716 ISC_LINK_INIT(interface, link);
717 ISC_LIST_INIT(interface->peers);
718 interface->fd = INVALID_SOCKET;
719 interface->bfd = INVALID_SOCKET;
720 interface->num_mcast = 0;
721 interface->received = 0;
723 interface->notsent = 0;
724 interface->peercnt = 0;
725 interface->phase = sys_interphase;
729 * create new interface structure initialize from
730 * template structure or via standard initialization
733 static struct interface *
734 new_interface(struct interface *interface)
736 static u_int sys_ifnum = 0;
738 struct interface *iface = (struct interface *)emalloc(sizeof(struct interface));
740 if (interface != NULL)
742 memcpy((char*)iface, (char*)interface, sizeof(*interface));
746 init_interface(iface);
749 iface->ifnum = sys_ifnum++; /* count every new instance of an interface in the system */
750 iface->starttime = current_time;
756 * return interface storage into free memory pool
759 delete_interface(struct interface *interface)
765 * link interface into list of known interfaces
768 add_interface(struct interface *interface)
770 static struct interface *listhead = NULL;
773 * For ntpd, the first few interfaces (wildcard, localhost)
774 * will never be removed. This means inter_list.head is
775 * unchanging once initialized. Take advantage of that to
776 * watch for changes and catch corruption earlier. This
777 * helped track down corruption caused by using FD_SET with
778 * a descriptor numerically larger than FD_SETSIZE.
780 if (NULL == listhead)
781 listhead = inter_list.head;
783 if (listhead != inter_list.head) {
784 msyslog(LOG_ERR, "add_interface inter_list.head corrupted: was %p now %p",
785 listhead, inter_list.head);
789 * Calculate the address hash
791 interface->addr_refid = addr2refid(&interface->sin);
793 ISC_LIST_APPEND(inter_list, interface, link);
798 * remove interface from known interface list and clean up
799 * associated resources
802 remove_interface(struct interface *interface)
804 struct sockaddr_storage resmask;
806 ISC_LIST_UNLINK_TYPE(inter_list, interface, link, struct interface);
808 delete_interface_from_list(interface);
810 if (interface->fd != INVALID_SOCKET)
812 msyslog(LOG_INFO, "Deleting interface #%d %s, %s#%d, interface stats: received=%ld, sent=%ld, dropped=%ld, active_time=%ld secs",
815 stoa((&interface->sin)),
816 NTP_PORT, /* XXX should extract port from sin structure */
820 current_time - interface->starttime);
822 close_and_delete_fd_from_list(interface->fd);
825 if (interface->bfd != INVALID_SOCKET)
827 msyslog(LOG_INFO, "Deleting interface #%d %s, broadcast address %s#%d",
830 stoa((&interface->bcast)),
831 (u_short) NTP_PORT); /* XXX extract port from sin structure */
832 close_and_delete_fd_from_list(interface->bfd);
836 ntp_monclearinterface(interface);
838 /* remove restrict interface entry */
841 * Blacklist bound interface address
843 SET_HOSTMASK(&resmask, interface->sin.ss_family);
844 hack_restrict(RESTRICT_REMOVEIF, &interface->sin, &resmask,
845 RESM_NTPONLY|RESM_INTERFACE, RES_IGNORE);
849 list_if_listening(struct interface *interface, u_short port)
851 msyslog(LOG_INFO, "Listening on interface #%d %s, %s#%d %s",
854 stoa((&interface->sin)),
855 ntohs( (u_short) port),
856 (interface->ignore_packets == ISC_FALSE) ?
857 "Enabled": "Disabled");
861 create_wildcards(u_short port) {
862 isc_boolean_t okipv4 = ISC_TRUE;
864 * create pseudo-interface with wildcard IPv4 address
867 if(isc_net_probeipv4() != ISC_R_SUCCESS)
871 if(okipv4 == ISC_TRUE) {
872 struct interface *interface = new_interface(NULL);
874 interface->family = AF_INET;
875 interface->sin.ss_family = AF_INET;
876 ((struct sockaddr_in*)&interface->sin)->sin_addr.s_addr = htonl(INADDR_ANY);
877 ((struct sockaddr_in*)&interface->sin)->sin_port = port;
878 (void) strncpy(interface->name, "wildcard", sizeof(interface->name));
879 interface->mask.ss_family = AF_INET;
880 ((struct sockaddr_in*)&interface->mask)->sin_addr.s_addr = htonl(~(u_int32)0);
881 interface->flags = INT_BROADCAST | INT_UP | INT_WILDCARD;
882 interface->ignore_packets = ISC_TRUE;
885 * enable possible multicast reception on the broadcast socket
887 interface->bcast.ss_family = AF_INET;
888 ((struct sockaddr_in*)&interface->bcast)->sin_port = port;
889 ((struct sockaddr_in*)&interface->bcast)->sin_addr.s_addr = htonl(INADDR_ANY);
891 interface->fd = open_socket(&interface->sin,
892 interface->flags, 1, interface);
894 if (interface->fd != INVALID_SOCKET) {
895 wildipv4 = interface;
896 any_interface = interface;
898 add_addr_to_list(&interface->sin, interface);
899 add_interface(interface);
900 list_if_listening(interface, port);
902 msyslog(LOG_ERR, "unable to bind to wildcard socket address %s - another process may be running - EXITING",
903 stoa((&interface->sin)));
908 #ifdef INCLUDE_IPV6_SUPPORT
910 * create pseudo-interface with wildcard IPv6 address
912 if (isc_net_probeipv6() == ISC_R_SUCCESS) {
913 struct interface *interface = new_interface(NULL);
915 interface->family = AF_INET6;
916 interface->sin.ss_family = AF_INET6;
917 ((struct sockaddr_in6*)&interface->sin)->sin6_addr = in6addr_any;
918 ((struct sockaddr_in6*)&interface->sin)->sin6_port = port;
919 # ifdef ISC_PLATFORM_HAVESCOPEID
920 ((struct sockaddr_in6*)&interface->sin)->sin6_scope_id = 0;
922 (void) strncpy(interface->name, "wildcard", sizeof(interface->name));
923 interface->mask.ss_family = AF_INET6;
924 memset(&((struct sockaddr_in6*)&interface->mask)->sin6_addr.s6_addr, 0xff, sizeof(struct in6_addr));
925 interface->flags = INT_UP | INT_WILDCARD;
926 interface->ignore_packets = ISC_TRUE;
928 interface->fd = open_socket(&interface->sin,
929 interface->flags, 1, interface);
931 if (interface->fd != INVALID_SOCKET) {
932 wildipv6 = interface;
933 any6_interface = interface;
934 add_addr_to_list(&interface->sin, interface);
935 add_interface(interface);
936 list_if_listening(interface, port);
938 msyslog(LOG_ERR, "unable to bind to wildcard socket address %s - another process may be running - EXITING",
939 stoa((&interface->sin)));
948 address_okay(struct interface *iface) {
950 DPRINTF(4, ("address_okay: listen Virtual: %d, IF name: %s\n",
951 listen_to_virtual_ips, iface->name));
954 * Always allow the loopback
956 if((iface->flags & INT_LOOPBACK) != 0) {
957 DPRINTF(4, ("address_okay: loopback - OK\n"));
962 * Check if the interface is specified
964 if (specific_interface != NULL) {
965 if (strcasecmp(iface->name, specific_interface) == 0) {
966 DPRINTF(4, ("address_okay: specific interface name matched - OK\n"));
969 DPRINTF(4, ("address_okay: specific interface name NOT matched - FAIL\n"));
974 if (listen_to_virtual_ips == 0 &&
975 (strchr(iface->name, (int)':') != NULL)) {
976 DPRINTF(4, ("address_okay: virtual ip/alias - FAIL\n"));
981 DPRINTF(4, ("address_okay: OK\n"));
986 convert_isc_if(isc_interface_t *isc_if, struct interface *itf, u_short port)
989 itf->family = (short) isc_if->af;
990 strcpy(itf->name, isc_if->name);
992 if(isc_if->af == AF_INET) {
993 itf->sin.ss_family = (u_short) isc_if->af;
994 memcpy(&(((struct sockaddr_in*)&itf->sin)->sin_addr),
995 &(isc_if->address.type.in),
996 sizeof(struct in_addr));
997 ((struct sockaddr_in*)&itf->sin)->sin_port = port;
999 if((isc_if->flags & INTERFACE_F_BROADCAST) != 0) {
1000 itf->flags |= INT_BROADCAST;
1001 itf->bcast.ss_family = itf->sin.ss_family;
1002 memcpy(&(((struct sockaddr_in*)&itf->bcast)->sin_addr),
1003 &(isc_if->broadcast.type.in),
1004 sizeof(struct in_addr));
1005 ((struct sockaddr_in*)&itf->bcast)->sin_port = port;
1008 itf->mask.ss_family = itf->sin.ss_family;
1009 memcpy(&(((struct sockaddr_in*)&itf->mask)->sin_addr),
1010 &(isc_if->netmask.type.in),
1011 sizeof(struct in_addr));
1012 ((struct sockaddr_in*)&itf->mask)->sin_port = port;
1014 #ifdef INCLUDE_IPV6_SUPPORT
1015 else if (isc_if->af == AF_INET6) {
1016 itf->sin.ss_family = (u_short) isc_if->af;
1017 memcpy(&(((struct sockaddr_in6 *)&itf->sin)->sin6_addr),
1018 &(isc_if->address.type.in6),
1019 sizeof(((struct sockaddr_in6 *)&itf->sin)->sin6_addr));
1020 ((struct sockaddr_in6 *)&itf->sin)->sin6_port = port;
1022 #ifdef ISC_PLATFORM_HAVESCOPEID
1023 ((struct sockaddr_in6 *)&itf->sin)->sin6_scope_id = isc_netaddr_getzone(&isc_if->address);
1024 itf->scopeid = isc_netaddr_getzone(&isc_if->address);
1026 itf->mask.ss_family = itf->sin.ss_family;
1027 memcpy(&(((struct sockaddr_in6 *)&itf->mask)->sin6_addr),
1028 &(isc_if->netmask.type.in6),
1029 sizeof(struct in6_addr));
1030 ((struct sockaddr_in6 *)&itf->mask)->sin6_port = port;
1031 /* Copy the interface index */
1032 itf->ifindex = isc_if->ifindex;
1034 #endif /* INCLUDE_IPV6_SUPPORT */
1037 /* Process the rest of the flags */
1039 if((isc_if->flags & INTERFACE_F_UP) != 0)
1040 itf->flags |= INT_UP;
1041 if((isc_if->flags & INTERFACE_F_LOOPBACK) != 0)
1042 itf->flags |= INT_LOOPBACK;
1043 if((isc_if->flags & INTERFACE_F_POINTTOPOINT) != 0)
1044 itf->flags |= INT_PPP;
1045 if((isc_if->flags & INTERFACE_F_MULTICAST) != 0)
1046 itf->flags |= INT_MULTICAST;
1053 * some OSes have been observed to keep
1054 * cached routes even when more specific routes
1056 * this can be mitigated by re-binding
1060 refresh_interface(struct interface * interface)
1062 #ifdef OS_MISSES_SPECIFIC_ROUTE_UPDATES
1063 if (interface->fd != INVALID_SOCKET)
1065 close_and_delete_fd_from_list(interface->fd);
1066 interface->fd = open_socket(&interface->sin,
1067 interface->flags, 0, interface);
1069 * reset TTL indication so TTL is is set again
1072 interface->last_ttl = 0;
1073 return interface->fd != INVALID_SOCKET;
1077 return 0; /* invalid sockets are not refreshable */
1079 #else /* !OS_MISSES_SPECIFIC_ROUTE_UPDATES */
1080 return interface->fd != INVALID_SOCKET;
1081 #endif /* !OS_MISSES_SPECIFIC_ROUTE_UPDATES */
1085 * interface_update - externally callable update function
1088 interface_update(interface_receiver_t receiver, void *data)
1090 if (!disable_dynamic_updates) {
1091 int new_interface_found;
1094 new_interface_found = update_interfaces(htons(NTP_PORT), receiver, data);
1097 if (new_interface_found) {
1099 msyslog(LOG_DEBUG, "new interface(s) found: waking up resolver");
1102 /* wake up the resolver thread */
1103 if (ResolverEventHandle != NULL)
1104 SetEvent(ResolverEventHandle);
1106 /* write any single byte to the pipe to wake up the resolver process */
1107 write( resolver_pipe_fd[1], &new_interface_found, 1 );
1114 * find out if a given interface structure contains
1115 * a wildcard address
1118 is_wildcard_addr(struct sockaddr_storage *sas)
1120 if (sas->ss_family == AF_INET &&
1121 ((struct sockaddr_in*)sas)->sin_addr.s_addr == htonl(INADDR_ANY))
1124 #ifdef INCLUDE_IPV6_SUPPORT
1125 if (sas->ss_family == AF_INET6 &&
1126 memcmp(&((struct sockaddr_in6*)sas)->sin6_addr, &in6addr_any,
1127 sizeof(in6addr_any)) == 0)
1134 #ifdef OS_NEEDS_REUSEADDR_FOR_IFADDRBIND
1136 * enable/disable re-use of wildcard address socket
1139 set_wildcard_reuse(int family, int on)
1144 SOCKET fd = INVALID_SOCKET;
1146 onoff = on ? &onvalue : &offvalue;
1150 if (any_interface) {
1151 fd = any_interface->fd;
1155 #ifdef INCLUDE_IPV6_SUPPORT
1157 if (any6_interface) {
1158 fd = any6_interface->fd;
1161 #endif /* !INCLUDE_IPV6_SUPPORT */
1164 if (fd != INVALID_SOCKET) {
1165 if (setsockopt(fd, SOL_SOCKET,
1166 SO_REUSEADDR, (char *)onoff,
1168 netsyslog(LOG_ERR, "set_wildcard_reuse: setsockopt(SO_REUSEADDR, %s) failed: %m", *onoff ? "on" : "off");
1170 DPRINTF(4, ("set SO_REUSEADDR to %s on %s\n", *onoff ? "ON" : "OFF",
1171 stoa((family == AF_INET) ?
1172 &any_interface->sin : &any6_interface->sin)));
1175 #endif /* OS_NEEDS_REUSEADDR_FOR_IFADDRBIND */
1177 #ifdef INCLUDE_IPV6_SUPPORT
1178 static isc_boolean_t
1179 is_not_bindable(struct sockaddr *sa, char *name)
1181 #if defined(SIOCGIFAFLAG_IN6) && \
1182 (defined(IN6_IFF_ANYCAST) || defined(IN6_IFF_NOTREADY))
1183 struct in6_ifreq ifr6;
1185 u_int32_t flags6, exclude = 0;
1187 if (sa->sa_family != AF_INET6)
1189 if ((fd = socket(AF_INET6, SOCK_DGRAM, 0)) < 0)
1191 memset(&ifr6, 0, sizeof(ifr6));
1192 memcpy(&ifr6.ifr_addr, (struct sockaddr_in6 *)sa,
1193 sizeof(struct sockaddr_in6));
1194 strlcpy(ifr6.ifr_name, name, IF_NAMESIZE);
1195 if (ioctl(fd, SIOCGIFAFLAG_IN6, &ifr6) < 0) {
1200 flags6 = ifr6.ifr_ifru.ifru_flags6;
1201 #if defined(IN6_IFF_ANYCAST)
1202 exclude |= IN6_IFF_ANYCAST;
1203 #endif /* !IN6_IFF_ANYCAST */
1204 #if defined(IN6_IFF_NOTREADY)
1205 exclude |= IN6_IFF_NOTREADY;
1206 #endif /* !IN6_IFF_NOTREADY */
1207 if ((flags6 & exclude) != 0)
1209 #endif /* !SIOCGIFAFLAG_IN6 || !(IN6_IFF_ANYCAST && IN6_IFF_NOTREADY) */
1212 #endif /* !INCLUDE_IPV6_SUPPORT */
1215 * update_interface strategy
1217 * toggle configuration phase
1220 * forall currently existing interfaces
1221 * if address is known:
1222 * drop socket - rebind again
1224 * if address is NOT known:
1225 * attempt to create a new interface entry
1228 * forall currently known non MCAST and WILDCARD interfaces
1229 * if interface does not match configuration phase (not seen in phase 1):
1230 * remove interface from known interface list
1231 * forall peers associated with this interface
1232 * disconnect peer from this interface
1235 * attempt to re-assign interfaces to peers
1242 interface_receiver_t receiver,
1246 interface_info_t ifi;
1247 isc_mem_t *mctx = NULL;
1248 isc_interfaceiter_t *iter = NULL;
1249 isc_boolean_t scan_ipv4 = ISC_FALSE;
1250 isc_boolean_t scan_ipv6 = ISC_FALSE;
1251 isc_result_t result;
1252 int new_interface_found = 0;
1254 DPRINTF(3, ("update_interfaces(%d)\n", ntohs( (u_short) port)));
1256 #ifdef INCLUDE_IPV6_SUPPORT
1257 if (isc_net_probeipv6() == ISC_R_SUCCESS)
1258 scan_ipv6 = ISC_TRUE;
1262 netsyslog(LOG_ERR, "no IPv6 interfaces found");
1265 if (isc_net_probeipv6() == ISC_R_SUCCESS)
1266 scan_ipv6 = ISC_TRUE;
1267 #if defined(ISC_PLATFORM_HAVEIPV6) && defined(DEBUG)
1270 netsyslog(LOG_ERR, "no IPv6 interfaces found");
1273 if (isc_net_probeipv4() == ISC_R_SUCCESS)
1274 scan_ipv4 = ISC_TRUE;
1278 netsyslog(LOG_ERR, "no IPv4 interfaces found");
1281 * phase one - scan interfaces
1282 * - create those that are not found
1283 * - update those that are found
1286 result = isc_interfaceiter_create(mctx, &iter);
1288 if (result != ISC_R_SUCCESS)
1291 sys_interphase ^= 0x1; /* toggle system phase for finding untouched (to be deleted) interfaces */
1293 for (result = isc_interfaceiter_first(iter);
1294 result == ISC_R_SUCCESS;
1295 result = isc_interfaceiter_next(iter))
1297 isc_interface_t isc_if;
1298 unsigned int family;
1299 struct interface interface;
1300 struct interface *iface;
1302 result = isc_interfaceiter_current(iter, &isc_if);
1304 if (result != ISC_R_SUCCESS)
1307 /* See if we have a valid family to use */
1308 family = isc_if.address.family;
1309 if (family != AF_INET && family != AF_INET6)
1311 if (scan_ipv4 == ISC_FALSE && family == AF_INET)
1313 if (scan_ipv6 == ISC_FALSE && family == AF_INET6)
1319 init_interface(&interface);
1321 convert_isc_if(&isc_if, &interface, port);
1324 * Check to see if we are going to use the interface
1325 * If we don't use it we mark it to drop any packet
1326 * received but we still must create the socket and
1327 * bind to it. This prevents other apps binding to it
1328 * and potentially causing problems with more than one
1329 * process fiddling with the clock
1331 if (address_okay(&interface) == ISC_TRUE) {
1332 interface.ignore_packets = ISC_FALSE;
1335 interface.ignore_packets = ISC_TRUE;
1338 DPRINT_INTERFACE(4, (&interface, "examining ", "\n"));
1340 if (!(interface.flags & INT_UP)) { /* interfaces must be UP to be usable */
1341 DPRINTF(4, ("skipping interface %s (%s) - DOWN\n", interface.name, stoa(&interface.sin)));
1346 * skip any interfaces UP and bound to a wildcard
1347 * address - some dhcp clients produce that in the
1350 if (is_wildcard_addr(&interface.sin))
1353 #ifdef INCLUDE_IPV6_SUPPORT
1354 if (is_not_bindable((struct sockaddr *)&interface.sin, isc_if.name))
1356 #endif /* !INCLUDE_IPV6_SUPPORT */
1359 * map to local *address* in order
1360 * to map all duplicate interfaces to an interface structure
1361 * with the appropriate socket (our name space is
1362 * (ip-address) - NOT (interface name, ip-address))
1364 iface = getinterface(&interface.sin, INT_WILDCARD);
1366 if (iface && refresh_interface(iface))
1369 * found existing and up to date interface - mark present
1372 iface->phase = sys_interphase;
1373 DPRINT_INTERFACE(4, (iface, "updating ", " present\n"));
1374 ifi.action = IFS_EXISTS;
1375 ifi.interface = iface;
1377 receiver(data, &ifi);
1382 * this is new or refreshing failed - add to our interface list
1383 * if refreshing failed we will delete the interface structure in
1384 * phase 2 as the interface was not marked current. We can bind to
1385 * the address as the refresh code already closed the offending socket
1388 iface = create_interface(port, &interface);
1392 ifi.action = IFS_CREATED;
1393 ifi.interface = iface;
1395 receiver(data, &ifi);
1397 new_interface_found = 1;
1399 DPRINT_INTERFACE(3, (iface, "updating ", " new - created\n"));
1403 DPRINT_INTERFACE(3, (&interface, "updating ", " new - creation FAILED"));
1405 msyslog(LOG_INFO, "failed to initialize interface for address %s", stoa(&interface.sin));
1411 isc_interfaceiter_destroy(&iter);
1414 * phase 2 - delete gone interfaces - reassigning peers to other interfaces
1417 struct interface *interf = ISC_LIST_HEAD(inter_list);
1419 while (interf != NULL)
1421 struct interface *next = ISC_LIST_NEXT(interf, link);
1423 if (!(interf->flags & (INT_WILDCARD|INT_MCASTIF))) {
1425 * if phase does not match sys_phase this interface was not
1426 * enumerated during interface scan - so it is gone and
1427 * will be deleted here unless it is solely an MCAST/WILDCARD interface
1429 if (interf->phase != sys_interphase) {
1431 DPRINT_INTERFACE(3, (interf, "updating ", "GONE - deleting\n"));
1432 remove_interface(interf);
1434 ifi.action = IFS_DELETED;
1435 ifi.interface = interf;
1437 receiver(data, &ifi);
1439 peer = ISC_LIST_HEAD(interf->peers);
1441 * disconnect peer from deleted interface
1443 while (peer != NULL) {
1444 struct peer *npeer = ISC_LIST_NEXT(peer, ilink);
1447 * this one just lost it's interface
1449 set_peerdstadr(peer, NULL);
1455 * update globals in case we lose
1456 * a loopback interface
1458 if (interf == loopback_interface)
1459 loopback_interface = NULL;
1461 delete_interface(interf);
1469 * phase 3 - re-configure as the world has changed if necessary
1471 refresh_all_peerinterfaces();
1472 return new_interface_found;
1477 * create_sockets - create a socket for each interface plus a default
1478 * socket for when we don't know where to send
1485 #ifndef HAVE_IO_COMPLETION_PORT
1487 * I/O Completion Ports don't care about the select and FD_SET
1490 FD_ZERO(&activefds);
1493 DPRINTF(2, ("create_sockets(%d)\n", ntohs( (u_short) port)));
1495 create_wildcards(port);
1497 update_interfaces(port, NULL, NULL);
1500 * Now that we have opened all the sockets, turn off the reuse
1501 * flag for security.
1505 DPRINTF(2, ("create_sockets: Total interfaces = %d\n", ninterfaces));
1511 * create_interface - create a new interface for a given prototype
1512 * binding the socket.
1514 static struct interface *
1517 struct interface *iface
1520 struct sockaddr_storage resmask;
1521 struct interface *interface;
1523 DPRINTF(2, ("create_interface(%s#%d)\n", stoa(&iface->sin), ntohs( (u_short) port)));
1525 /* build an interface */
1526 interface = new_interface(iface);
1531 interface->fd = open_socket(&interface->sin,
1532 interface->flags, 0, interface);
1534 if (interface->fd != INVALID_SOCKET)
1535 list_if_listening(interface, port);
1537 if ((interface->flags & INT_BROADCAST) &&
1538 interface->bfd != INVALID_SOCKET)
1539 msyslog(LOG_INFO, "Listening on broadcast address %s#%d",
1540 stoa((&interface->bcast)),
1541 ntohs( (u_short) port));
1543 if (interface->fd == INVALID_SOCKET &&
1544 interface->bfd == INVALID_SOCKET) {
1545 msyslog(LOG_ERR, "unable to create socket on %s (%d) for %s#%d",
1548 stoa((&interface->sin)),
1549 ntohs( (u_short) port));
1550 delete_interface(interface);
1555 * Blacklist bound interface address
1558 SET_HOSTMASK(&resmask, interface->sin.ss_family);
1559 hack_restrict(RESTRICT_FLAGS, &interface->sin, &resmask,
1560 RESM_NTPONLY|RESM_INTERFACE, RES_IGNORE);
1563 * set globals with the first found
1564 * loopback interface of the appropriate class
1566 if ((loopback_interface == NULL) &&
1567 (interface->family == AF_INET) &&
1568 ((interface->flags & INT_LOOPBACK) != 0))
1570 loopback_interface = interface;
1574 * put into our interface list
1576 add_addr_to_list(&interface->sin, interface);
1577 add_interface(interface);
1579 DPRINT_INTERFACE(2, (interface, "created ", "\n"));
1584 #ifdef SO_EXCLUSIVEADDRUSE
1586 set_excladdruse(int fd)
1591 failed = setsockopt(fd, SOL_SOCKET, SO_EXCLUSIVEADDRUSE,
1592 (char *)&one, sizeof(one));
1596 "setsockopt(%d, SO_EXCLUSIVEADDRUSE, on): %m", fd);
1598 #endif /* SO_EXCLUSIVEADDRUSE */
1602 * set_reuseaddr() - set/clear REUSEADDR on all sockets
1603 * NB possible hole - should we be doing this on broadcast
1607 set_reuseaddr(int flag) {
1608 struct interface *interf;
1610 #ifndef SO_EXCLUSIVEADDRUSE
1612 for (interf = ISC_LIST_HEAD(inter_list);
1614 interf = ISC_LIST_NEXT(interf, link)) {
1616 if (interf->flags & INT_WILDCARD)
1620 * if interf->fd is INVALID_SOCKET, we might have a adapter
1621 * configured but not present
1623 DPRINTF(4, ("setting SO_REUSEADDR on %.16s@%s to %s\n", interf->name, stoa(&interf->sin), flag ? "on" : "off"));
1625 if (interf->fd != INVALID_SOCKET) {
1626 if (setsockopt(interf->fd, SOL_SOCKET,
1627 SO_REUSEADDR, (char *)&flag,
1629 netsyslog(LOG_ERR, "set_reuseaddr: setsockopt(SO_REUSEADDR, %s) failed: %m", flag ? "on" : "off");
1633 #endif /* ! SO_EXCLUSIVEADDRUSE */
1637 * This is just a wrapper around an internal function so we can
1638 * make other changes as necessary later on
1641 enable_broadcast(struct interface *iface, struct sockaddr_storage *baddr)
1644 socket_broadcast_enable(iface, iface->fd, baddr);
1648 #ifdef OPEN_BCAST_SOCKET
1650 * Enable a broadcast address to a given socket
1651 * The socket is in the inter_list all we need to do is enable
1652 * broadcasting. It is not this function's job to select the socket
1654 static isc_boolean_t
1655 socket_broadcast_enable(struct interface *iface, SOCKET fd, struct sockaddr_storage *maddr)
1660 if (maddr->ss_family == AF_INET)
1662 /* if this interface can support broadcast, set SO_BROADCAST */
1663 if (setsockopt(fd, SOL_SOCKET, SO_BROADCAST,
1664 (char *)&on, sizeof(on)))
1666 netsyslog(LOG_ERR, "setsockopt(SO_BROADCAST) enable failure on address %s: %m",
1670 else if (debug > 1) {
1671 printf("Broadcast enabled on socket %d for address %s\n",
1676 iface->flags |= INT_BCASTOPEN;
1680 #endif /* SO_BROADCAST */
1684 * Remove a broadcast address from a given socket
1685 * The socket is in the inter_list all we need to do is disable
1686 * broadcasting. It is not this function's job to select the socket
1688 static isc_boolean_t
1689 socket_broadcast_disable(struct interface *iface, struct sockaddr_storage *maddr)
1692 int off = 0; /* This seems to be OK as an int */
1694 if (maddr->ss_family == AF_INET)
1696 if (setsockopt(iface->fd, SOL_SOCKET, SO_BROADCAST,
1697 (char *)&off, sizeof(off)))
1699 netsyslog(LOG_ERR, "setsockopt(SO_BROADCAST) disable failure on address %s: %m",
1703 iface->flags &= ~INT_BCASTOPEN;
1707 #endif /* SO_BROADCAST */
1710 #endif /* OPEN_BCAST_SOCKET */
1712 * Check to see if the address is a multicast address
1714 static isc_boolean_t
1715 addr_ismulticast(struct sockaddr_storage *maddr)
1717 switch (maddr->ss_family)
1720 if (!IN_CLASSD(ntohl(((struct sockaddr_in*)maddr)->sin_addr.s_addr))) {
1721 DPRINTF(4, ("multicast address %s not class D\n", stoa(maddr)));
1730 #ifdef INCLUDE_IPV6_MULTICAST_SUPPORT
1731 if (!IN6_IS_ADDR_MULTICAST(&((struct sockaddr_in6*)maddr)->sin6_addr)) {
1732 DPRINTF(4, ("address %s not IPv6 multicast address\n", stoa(maddr)));
1741 * If we don't have IPV6 support any IPV6 address is not multicast
1755 * Multicast servers need to set the appropriate Multicast interface
1756 * socket option in order for it to know which interface to use for
1757 * send the multicast packet.
1760 enable_multicast_if(struct interface *iface, struct sockaddr_storage *maddr)
1763 #ifdef IP_MULTICAST_LOOP
1764 /*u_char*/ TYPEOF_IP_MULTICAST_LOOP off = 0;
1766 #ifdef IPV6_MULTICAST_LOOP
1767 u_int off6 = 0; /* RFC 3493, 5.2. defines type unsigned int */
1770 switch (maddr->ss_family)
1773 if (setsockopt(iface->fd, IPPROTO_IP, IP_MULTICAST_IF,
1774 (char *)&(((struct sockaddr_in*)&iface->sin)->sin_addr.s_addr),
1775 sizeof(struct in_addr)) == -1) {
1777 "setsockopt IP_MULTICAST_IF failure: %m on socket %d, addr %s for multicast address %s",
1778 iface->fd, stoa(&iface->sin), stoa(maddr));
1781 #ifdef IP_MULTICAST_LOOP
1783 * Don't send back to itself, but allow it to fail to set it
1785 if (setsockopt(iface->fd, IPPROTO_IP, IP_MULTICAST_LOOP,
1786 SETSOCKOPT_ARG_CAST &off, sizeof(off)) == -1) {
1788 "setsockopt IP_MULTICAST_LOOP failure: %m on socket %d, addr %s for multicast address %s",
1789 iface->fd, stoa(&iface->sin), stoa(maddr));
1792 DPRINTF(4, ("Added IPv4 multicast interface on socket %d, addr %s for multicast address %s\n",
1793 iface->fd, stoa(&iface->sin),
1798 #ifdef INCLUDE_IPV6_MULTICAST_SUPPORT
1799 if (setsockopt(iface->fd, IPPROTO_IPV6, IPV6_MULTICAST_IF,
1800 (char *) &iface->scopeid, sizeof(iface->scopeid)) == -1) {
1802 "setsockopt IPV6_MULTICAST_IF failure: %m on socket %d, addr %s, scope %d for multicast address %s",
1803 iface->fd, stoa(&iface->sin), iface->scopeid,
1807 #ifdef IPV6_MULTICAST_LOOP
1809 * Don't send back to itself, but allow it to fail to set it
1811 if (setsockopt(iface->fd, IPPROTO_IPV6, IPV6_MULTICAST_LOOP,
1812 (char *) &off6, sizeof(off6)) == -1) {
1814 "setsockopt IPV6_MULTICAST_LOOP failure: %m on socket %d, addr %s for multicast address %s",
1815 iface->fd, stoa(&iface->sin), stoa(maddr));
1818 DPRINTF(4, ("Added IPv6 multicast interface on socket %d, addr %s, scope %d for multicast address %s\n",
1819 iface->fd, stoa(&iface->sin), iface->scopeid,
1824 #endif /* INCLUDE_IPV6_MULTICAST_SUPPORT */
1831 * Add a multicast address to a given socket
1832 * The socket is in the inter_list all we need to do is enable
1833 * multicasting. It is not this function's job to select the socket
1835 static isc_boolean_t
1836 socket_multicast_enable(struct interface *iface, int lscope, struct sockaddr_storage *maddr)
1838 #ifdef INCLUDE_IPV6_MULTICAST_SUPPORT
1839 struct ipv6_mreq mreq6;
1840 struct in6_addr iaddr6;
1841 #endif /* INCLUDE_IPV6_MULTICAST_SUPPORT */
1843 struct ip_mreq mreq;
1845 if (find_addr_in_list(maddr)) {
1846 DPRINTF(4, ("socket_multicast_enable(%s): already enabled\n", stoa(maddr)));
1850 switch (maddr->ss_family)
1853 memset((char *)&mreq, 0, sizeof(mreq));
1854 mreq.imr_multiaddr = (((struct sockaddr_in*)maddr)->sin_addr);
1855 mreq.imr_interface.s_addr = htonl(INADDR_ANY);
1856 if (setsockopt(iface->fd, IPPROTO_IP, IP_ADD_MEMBERSHIP,
1857 (char *)&mreq, sizeof(mreq)) == -1) {
1859 "setsockopt IP_ADD_MEMBERSHIP failure: %m on socket %d, addr %s for %x / %x (%s)",
1860 iface->fd, stoa(&iface->sin),
1861 mreq.imr_multiaddr.s_addr,
1862 mreq.imr_interface.s_addr, stoa(maddr));
1865 DPRINTF(4, ("Added IPv4 multicast membership on socket %d, addr %s for %x / %x (%s)\n",
1866 iface->fd, stoa(&iface->sin),
1867 mreq.imr_multiaddr.s_addr,
1868 mreq.imr_interface.s_addr, stoa(maddr)));
1872 #ifdef INCLUDE_IPV6_MULTICAST_SUPPORT
1874 * Enable reception of multicast packets
1875 * If the address is link-local we can get the interface index
1876 * from the scope id. Don't do this for other types of multicast
1877 * addresses. For now let the kernel figure it out.
1879 memset((char *)&mreq6, 0, sizeof(mreq6));
1880 iaddr6 = ((struct sockaddr_in6*)maddr)->sin6_addr;
1881 mreq6.ipv6mr_multiaddr = iaddr6;
1882 mreq6.ipv6mr_interface = lscope;
1884 if (setsockopt(iface->fd, IPPROTO_IPV6, IPV6_JOIN_GROUP,
1885 (char *)&mreq6, sizeof(mreq6)) == -1) {
1887 "setsockopt IPV6_JOIN_GROUP failure: %m on socket %d, addr %s for interface %d(%s)",
1888 iface->fd, stoa(&iface->sin),
1889 mreq6.ipv6mr_interface, stoa(maddr));
1892 DPRINTF(4, ("Added IPv6 multicast group on socket %d, addr %s for interface %d(%s)\n",
1893 iface->fd, stoa(&iface->sin),
1894 mreq6.ipv6mr_interface, stoa(maddr)));
1898 #endif /* INCLUDE_IPV6_MULTICAST_SUPPORT */
1900 iface->flags |= INT_MCASTOPEN;
1902 add_addr_to_list(maddr, iface);
1907 * Remove a multicast address from a given socket
1908 * The socket is in the inter_list all we need to do is disable
1909 * multicasting. It is not this function's job to select the socket
1911 static isc_boolean_t
1912 socket_multicast_disable(struct interface *iface, struct sockaddr_storage *maddr)
1914 #ifdef INCLUDE_IPV6_MULTICAST_SUPPORT
1915 struct ipv6_mreq mreq6;
1916 struct in6_addr iaddr6;
1917 #endif /* INCLUDE_IPV6_MULTICAST_SUPPORT */
1919 struct ip_mreq mreq;
1920 memset((char *)&mreq, 0, sizeof(mreq));
1922 if (find_addr_in_list(maddr) == NULL) {
1923 DPRINTF(4, ("socket_multicast_disable(%s): not enabled\n", stoa(maddr)));
1927 switch (maddr->ss_family)
1930 mreq.imr_multiaddr = (((struct sockaddr_in*)&maddr)->sin_addr);
1931 mreq.imr_interface.s_addr = ((struct sockaddr_in*)&iface->sin)->sin_addr.s_addr;
1932 if (setsockopt(iface->fd, IPPROTO_IP, IP_DROP_MEMBERSHIP,
1933 (char *)&mreq, sizeof(mreq)) == -1) {
1935 "setsockopt IP_DROP_MEMBERSHIP failure: %m on socket %d, addr %s for %x / %x (%s)",
1936 iface->fd, stoa(&iface->sin),
1937 mreq.imr_multiaddr.s_addr,
1938 mreq.imr_interface.s_addr, stoa(maddr));
1943 #ifdef INCLUDE_IPV6_MULTICAST_SUPPORT
1945 * Disable reception of multicast packets
1946 * If the address is link-local we can get the interface index
1947 * from the scope id. Don't do this for other types of multicast
1948 * addresses. For now let the kernel figure it out.
1950 iaddr6 = ((struct sockaddr_in6*)&maddr)->sin6_addr;
1951 mreq6.ipv6mr_multiaddr = iaddr6;
1952 mreq6.ipv6mr_interface = iface->scopeid;
1954 if (setsockopt(iface->fd, IPPROTO_IPV6, IPV6_LEAVE_GROUP,
1955 (char *)&mreq6, sizeof(mreq6)) == -1) {
1957 "setsockopt IPV6_LEAVE_GROUP failure: %m on socket %d, addr %s for %d(%s)",
1958 iface->fd, stoa(&iface->sin),
1959 mreq6.ipv6mr_interface, stoa(maddr));
1965 #endif /* INCLUDE_IPV6_MULTICAST_SUPPORT */
1969 if (iface->num_mcast <= 0) {
1970 iface->num_mcast = 0;
1971 iface->flags &= ~INT_MCASTOPEN;
1977 * io_setbclient - open the broadcast client sockets
1982 #ifdef OPEN_BCAST_SOCKET
1983 struct interface *interf;
1985 isc_boolean_t jstatus;
1990 for (interf = ISC_LIST_HEAD(inter_list);
1992 interf = ISC_LIST_NEXT(interf, link)) {
1993 if (interf->flags & INT_WILDCARD)
1996 /* use only allowed addresses */
1997 if (interf->ignore_packets == ISC_TRUE)
1999 /* Only IPv4 addresses are valid for broadcast */
2000 if (interf->sin.ss_family != AF_INET)
2003 /* Is this a broadcast address? */
2004 if (!(interf->flags & INT_BROADCAST))
2007 /* Skip the loopback addresses */
2008 if (interf->flags & INT_LOOPBACK)
2011 /* Do we already have the broadcast address open? */
2012 if (interf->flags & INT_BCASTOPEN) {
2013 /* account for already open interfaces to aviod misleading warning below */
2019 * Try to open the broadcast address
2021 interf->family = AF_INET;
2022 interf->bfd = open_socket(&interf->bcast,
2023 INT_BROADCAST, 0, interf);
2026 * If we succeeded then we use it otherwise
2027 * enable the underlying address
2029 if (interf->bfd == INVALID_SOCKET) {
2036 /* Enable Broadcast on socket */
2037 jstatus = socket_broadcast_enable(interf, fd, &interf->sin);
2038 if (jstatus == ISC_TRUE)
2041 netsyslog(LOG_INFO,"io_setbclient: Opened broadcast client on interface #%d %s, socket: %d",
2042 interf->ifnum, interf->name, fd);
2043 interf->addr_refid = addr2refid(&interf->sin);
2050 printf("io_setbclient: Opened broadcast clients\n");
2053 netsyslog(LOG_ERR, "Unable to listen for broadcasts, no broadcast interfaces available");
2055 netsyslog(LOG_ERR, "io_setbclient: Broadcast Client disabled by build");
2060 * io_unsetbclient - close the broadcast client sockets
2063 io_unsetbclient(void)
2065 struct interface *interf;
2066 isc_boolean_t lstatus;
2068 for (interf = ISC_LIST_HEAD(inter_list);
2070 interf = ISC_LIST_NEXT(interf, link))
2072 if (interf->flags & INT_WILDCARD)
2075 if (!(interf->flags & INT_BCASTOPEN))
2077 lstatus = socket_broadcast_disable(interf, &interf->sin);
2082 * io_multicast_add() - add multicast group address
2086 struct sockaddr_storage addr
2090 struct interface *interface;
2091 #ifndef MULTICAST_NONEWSOCKET
2092 struct interface *iface;
2097 * Check to see if this is a multicast address
2099 if (addr_ismulticast(&addr) == ISC_FALSE)
2102 /* If we already have it we can just return */
2103 if (find_flagged_addr_in_list(&addr, INT_MCASTOPEN|INT_MCASTIF) != NULL)
2105 netsyslog(LOG_INFO, "Duplicate request found for multicast address %s",
2110 #ifndef MULTICAST_NONEWSOCKET
2111 interface = new_interface(NULL);
2114 * Open a new socket for the multicast address
2116 interface->sin.ss_family = addr.ss_family;
2117 interface->family = addr.ss_family;
2119 switch(addr.ss_family) {
2121 memcpy(&(((struct sockaddr_in *)&interface->sin)->sin_addr),
2122 &(((struct sockaddr_in*)&addr)->sin_addr),
2123 sizeof(struct in_addr));
2124 ((struct sockaddr_in*)&interface->sin)->sin_port = htons(NTP_PORT);
2125 memset(&((struct sockaddr_in*)&interface->mask)->sin_addr.s_addr, 0xff, sizeof(struct in_addr));
2128 #ifdef INCLUDE_IPV6_MULTICAST_SUPPORT
2129 memcpy(&(((struct sockaddr_in6 *)&interface->sin)->sin6_addr),
2130 &((struct sockaddr_in6*)&addr)->sin6_addr,
2131 sizeof(struct in6_addr));
2132 ((struct sockaddr_in6*)&interface->sin)->sin6_port = htons(NTP_PORT);
2133 #ifdef ISC_PLATFORM_HAVESCOPEID
2134 ((struct sockaddr_in6*)&interface->sin)->sin6_scope_id = ((struct sockaddr_in6*)&addr)->sin6_scope_id;
2136 memset(&((struct sockaddr_in6*)&interface->mask)->sin6_addr.s6_addr, 0xff, sizeof(struct in6_addr));
2138 iface = findlocalcastinterface(&addr, INT_MULTICAST);
2140 # ifdef ISC_PLATFORM_HAVESCOPEID
2141 lscope = ((struct sockaddr_in6*)&iface->sin)->sin6_scope_id;
2143 DPRINTF(4, ("Found interface #%d %s, scope: %d for address %s\n", iface->ifnum, iface->name, lscope, stoa(&addr)));
2149 interface->bfd = INVALID_SOCKET;
2150 interface->fd = open_socket(&interface->sin,
2151 INT_MULTICAST, 0, interface);
2153 if (interface->fd != INVALID_SOCKET)
2155 interface->bfd = INVALID_SOCKET;
2156 interface->ignore_packets = ISC_FALSE;
2157 interface->flags |= INT_MCASTIF;
2159 (void) strncpy(interface->name, "multicast",
2160 sizeof(interface->name));
2161 ((struct sockaddr_in*)&interface->mask)->sin_addr.s_addr =
2163 DPRINT_INTERFACE(2, (interface, "multicast add ", "\n"));
2164 /* socket_multicast_enable() will add this address to the addresslist */
2165 add_interface(interface);
2166 list_if_listening(interface, htons(NTP_PORT));
2170 delete_interface(interface); /* re-use existing interface */
2172 if (addr.ss_family == AF_INET)
2173 interface = wildipv4;
2174 else if (addr.ss_family == AF_INET6)
2175 interface = wildipv6;
2177 if (interface != NULL) {
2178 /* HACK ! -- stuff in an address */
2179 interface->bcast = addr;
2181 "...multicast address %s using wildcard interface #%d %s",
2182 stoa(&addr), interface->ifnum, interface->name);
2185 "No multicast socket available to use for address %s",
2192 * For the case where we can't use a separate socket
2194 interface = findlocalcastinterface(&addr, INT_MULTICAST);
2196 * If we don't have a valid socket, just return
2201 "Cannot add multicast address %s: Cannot find slot",
2208 isc_boolean_t jstatus;
2209 jstatus = socket_multicast_enable(interface, lscope, &addr);
2211 if (jstatus == ISC_TRUE)
2212 netsyslog(LOG_INFO, "Added Multicast Listener %s on interface #%d %s\n", stoa(&addr), interface->ifnum, interface->name);
2214 netsyslog(LOG_ERR, "Failed to add Multicast Listener %s\n", stoa(&addr));
2218 "Cannot add multicast address %s: no Multicast support",
2225 * io_multicast_del() - delete multicast group address
2229 struct sockaddr_storage addr
2233 struct interface *interface;
2234 isc_boolean_t lstatus;
2237 * Check to see if this is a multicast address
2239 if (addr_ismulticast(&addr) == ISC_FALSE)
2242 "invalid multicast address %s", stoa(&addr));
2246 switch (addr.ss_family)
2250 * Disable reception of multicast packets
2252 interface = find_flagged_addr_in_list(&addr, INT_MCASTOPEN);
2253 while ( interface != NULL) {
2254 lstatus = socket_multicast_disable(interface, &addr);
2255 interface = find_flagged_addr_in_list(&addr, INT_MCASTOPEN);
2259 #ifdef INCLUDE_IPV6_MULTICAST_SUPPORT
2262 * Disable reception of multicast packets
2264 for (interface = ISC_LIST_HEAD(inter_list);
2266 interface = ISC_LIST_NEXT(interface, link))
2268 if (interface->flags & INT_WILDCARD)
2271 /* Be sure it's the correct family */
2272 if (interface->sin.ss_family != AF_INET6)
2274 if (!(interface->flags & INT_MCASTOPEN))
2276 if (!(interface->fd < 0))
2278 if (!SOCKCMP(&addr, &interface->sin))
2280 lstatus = socket_multicast_disable(interface, &addr);
2283 #endif /* INCLUDE_IPV6_MULTICAST_SUPPORT */
2287 delete_addr_from_list(&addr);
2289 #else /* not MCAST */
2290 netsyslog(LOG_ERR, "this function requires multicast kernel");
2291 #endif /* not MCAST */
2295 * init_nonblocking_io() - set up descriptor to be non blocking
2297 static void init_nonblocking_io(SOCKET fd)
2304 /* in vxWorks we use FIONBIO, but the others are defined for old systems, so
2305 * all hell breaks loose if we leave them defined
2312 #if defined(O_NONBLOCK) /* POSIX */
2313 if (fcntl(fd, F_SETFL, O_NONBLOCK) < 0)
2315 netsyslog(LOG_ERR, "fcntl(O_NONBLOCK) fails on fd #%d: %m",
2320 #elif defined(FNDELAY)
2321 if (fcntl(fd, F_SETFL, FNDELAY) < 0)
2323 netsyslog(LOG_ERR, "fcntl(FNDELAY) fails on fd #%d: %m",
2328 #elif defined(O_NDELAY) /* generally the same as FNDELAY */
2329 if (fcntl(fd, F_SETFL, O_NDELAY) < 0)
2331 netsyslog(LOG_ERR, "fcntl(O_NDELAY) fails on fd #%d: %m",
2336 #elif defined(FIONBIO)
2339 if (ioctl(fd,FIONBIO,&on) < 0)
2341 netsyslog(LOG_ERR, "ioctl(FIONBIO) fails on fd #%d: %m",
2347 #elif defined(FIOSNBIO)
2348 if (ioctl(fd,FIOSNBIO,&on) < 0)
2350 netsyslog(LOG_ERR, "ioctl(FIOSNBIO) fails on fd #%d: %m",
2356 # include "Bletch: Need non-blocking I/O!"
2361 * open_socket - open a socket, returning the file descriptor
2366 struct sockaddr_storage *addr,
2369 struct interface *interf
2375 * int is OK for REUSEADR per
2376 * http://www.kohala.com/start/mcast.api.txt
2381 #if defined(IPTOS_LOWDELAY) && defined(IPPROTO_IP) && defined(IP_TOS)
2383 #endif /* IPTOS_LOWDELAY && IPPROTO_IP && IP_TOS */
2385 if ((addr->ss_family == AF_INET6) && (isc_net_probeipv6() != ISC_R_SUCCESS))
2386 return (INVALID_SOCKET);
2388 /* create a datagram (UDP) socket */
2389 fd = socket(addr->ss_family, SOCK_DGRAM, 0);
2390 if (INVALID_SOCKET == fd) {
2394 errval = WSAGetLastError();
2397 "socket(AF_INET%s, SOCK_DGRAM, 0) failed on address %s: %m",
2398 (addr->ss_family == AF_INET6) ? "6" : "",
2401 if (errval == EPROTONOSUPPORT ||
2402 errval == EAFNOSUPPORT ||
2403 errval == EPFNOSUPPORT)
2404 return (INVALID_SOCKET);
2405 msyslog(LOG_ERR, "unexpected error code %d (not PROTONOSUPPORT|AFNOSUPPORT|FPNOSUPPORT) - exiting", errval);
2411 connection_reset_fix(fd, addr);
2414 * Fixup the file descriptor for some systems
2415 * See bug #530 for details of the issue.
2420 * set SO_REUSEADDR since we will be binding the same port
2421 * number on each interface according to turn_off_reuse.
2422 * This is undesirable on Windows versions starting with
2423 * Windows XP (numeric version 5.1).
2426 if (isc_win32os_versioncheck(5, 1, 0, 0) < 0) /* before 5.1 */
2428 if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR,
2429 (char *)(turn_off_reuse
2434 netsyslog(LOG_ERR, "setsockopt SO_REUSEADDR %s"
2435 " fails for address %s: %m",
2441 return INVALID_SOCKET;
2443 #ifdef SO_EXCLUSIVEADDRUSE
2445 * setting SO_EXCLUSIVEADDRUSE on the wildcard we open
2446 * first will cause more specific binds to fail.
2448 if (!(interf->flags & INT_WILDCARD))
2449 set_excladdruse(fd);
2453 * IPv4 specific options go here
2455 if (addr->ss_family == AF_INET) {
2456 #if defined(IPTOS_LOWDELAY) && defined(IPPROTO_IP) && defined(IP_TOS)
2457 /* set IP_TOS to minimize packet delay */
2458 tos = IPTOS_LOWDELAY;
2459 if (setsockopt(fd, IPPROTO_IP, IP_TOS, (char *) &tos, sizeof(tos)) < 0)
2461 netsyslog(LOG_ERR, "setsockopt IPTOS_LOWDELAY on fails on address %s: %m",
2464 #endif /* IPTOS_LOWDELAY && IPPROTO_IP && IP_TOS */
2468 * IPv6 specific options go here
2470 if (addr->ss_family == AF_INET6) {
2471 #if defined(IPV6_V6ONLY)
2472 if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY,
2473 (char*)&on, sizeof(on)))
2475 netsyslog(LOG_ERR, "setsockopt IPV6_V6ONLY on fails on address %s: %m",
2478 #endif /* IPV6_V6ONLY */
2479 #if defined(IPV6_BINDV6ONLY)
2480 if (setsockopt(fd, IPPROTO_IPV6, IPV6_BINDV6ONLY,
2481 (char*)&on, sizeof(on)))
2484 "setsockopt IPV6_BINDV6ONLY on fails on address %s: %m",
2487 #endif /* IPV6_BINDV6ONLY */
2490 #ifdef OS_NEEDS_REUSEADDR_FOR_IFADDRBIND
2492 * some OSes don't allow binding to more specific
2493 * addresses if a wildcard address already bound
2494 * to the port and SO_REUSEADDR is not set
2496 if (!is_wildcard_addr(addr)) {
2497 set_wildcard_reuse(addr->ss_family, 1);
2502 * bind the local address.
2504 errval = bind(fd, (struct sockaddr *)addr, SOCKLEN(addr));
2506 #ifdef OS_NEEDS_REUSEADDR_FOR_IFADDRBIND
2508 * some OSes don't allow binding to more specific
2509 * addresses if a wildcard address already bound
2510 * to the port and REUSE_ADDR is not set
2512 if (!is_wildcard_addr(addr)) {
2513 set_wildcard_reuse(addr->ss_family, 0);
2519 * Don't log this under all conditions
2521 if (turn_off_reuse == 0
2526 if (addr->ss_family == AF_INET)
2528 "bind() fd %d, family AF_INET, port %d, addr %s, in_classd=%d flags=0x%x fails: %m",
2529 fd, (int)ntohs(((struct sockaddr_in*)addr)->sin_port),
2531 IN_CLASSD(ntohl(((struct sockaddr_in*)addr)->sin_addr.s_addr)),
2533 #ifdef INCLUDE_IPV6_SUPPORT
2534 else if (addr->ss_family == AF_INET6)
2536 "bind() fd %d, family AF_INET6, port %d, scope %d, addr %s, mcast=%d flags=0x%x fails: %m",
2537 fd, (int)ntohs(((struct sockaddr_in6*)addr)->sin6_port),
2538 # ifdef ISC_PLATFORM_HAVESCOPEID
2539 ((struct sockaddr_in6*)addr)->sin6_scope_id
2544 IN6_IS_ADDR_MULTICAST(&((struct sockaddr_in6*)addr)->sin6_addr),
2551 return INVALID_SOCKET;
2554 #ifdef HAVE_TIMESTAMP
2556 if (setsockopt(fd, SOL_SOCKET, SO_TIMESTAMP,
2557 (char*)&on, sizeof(on)))
2559 netsyslog(LOG_DEBUG,
2560 "setsockopt SO_TIMESTAMP on fails on address %s: %m",
2566 DPRINTF(4, ("setsockopt SO_TIMESTAMP enabled on fd %d address %s\n", fd, stoa(addr)));
2571 DPRINTF(4, ("bind() fd %d, family %d, port %d, addr %s, flags=0x%x\n",
2574 (int)ntohs(((struct sockaddr_in*)addr)->sin_port),
2578 init_nonblocking_io(fd);
2580 #ifdef HAVE_SIGNALED_IO
2581 init_socket_sig(fd);
2582 #endif /* not HAVE_SIGNALED_IO */
2584 add_fd_to_list(fd, FD_TYPE_SOCKET);
2586 #if !defined(SYS_WINNT) && !defined(VMS)
2587 DPRINTF(4, ("flags for fd %d: 0x%x\n", fd,
2588 fcntl(fd, F_GETFL, 0)));
2589 #endif /* SYS_WINNT || VMS */
2591 #if defined (HAVE_IO_COMPLETION_PORT)
2593 * Add the socket to the completion port
2595 if (io_completion_port_add_socket(fd, interf))
2597 msyslog(LOG_ERR, "unable to set up io completion port - EXITING");
2604 /* XXX ELIMINATE sendpkt similar in ntpq.c, ntpdc.c, ntp_io.c, ntptrace.c */
2606 * sendpkt - send a packet to the specified destination. Maintain a
2607 * send error cache so that only the first consecutive error for a
2608 * destination is logged.
2612 struct sockaddr_storage *dest,
2613 struct interface *inter,
2622 * Send error caches. Empty slots have port == 0
2623 * Set ERRORCACHESIZE to 0 to disable
2627 struct in_addr addr;
2630 #ifdef INCLUDE_IPV6_SUPPORT
2633 struct in6_addr addr;
2635 #endif /* INCLUDE_IPV6_SUPPORT */
2638 #ifndef ERRORCACHESIZE
2639 #define ERRORCACHESIZE 8
2641 #if ERRORCACHESIZE > 0
2642 static struct cache badaddrs[ERRORCACHESIZE];
2643 #ifdef INCLUDE_IPV6_SUPPORT
2644 static struct cache6 badaddrs6[ERRORCACHESIZE];
2645 #endif /* INCLUDE_IPV6_SUPPORT */
2647 #define badaddrs ((struct cache *)0) /* Only used in empty loops! */
2648 #ifdef INCLUDE_IPV6_SUPPORT
2649 #define badaddrs6 ((struct cache6 *)0) /* Only used in empty loops! */
2650 #endif /* INCLUDE_IPV6_SUPPORT */
2657 printf("%ssendpkt(fd=%d dst=%s, src=%s, ttl=%d, len=%d)\n",
2658 (ttl > 0) ? "\tMCAST\t***** " : "",
2659 inter->fd, stoa(dest),
2660 stoa(&inter->sin), ttl, len);
2664 printf("%ssendpkt(dst=%s, ttl=%d, len=%d): no interface - IGNORED\n",
2665 (ttl > 0) ? "\tMCAST\t***** " : "",
2672 if (inter == NULL) /* unbound peer - drop request and wait for better network conditions */
2678 * for the moment we use the bcast option to set multicast ttl
2680 if (ttl > 0 && ttl != inter->last_ttl) {
2683 * set the multicast ttl for outgoing packets
2687 switch (inter->sin.ss_family) {
2691 u_char mttl = (u_char) ttl;
2693 rtc = setsockopt(inter->fd, IPPROTO_IP, IP_MULTICAST_TTL,
2694 (const void *) &mttl, sizeof(mttl));
2698 #ifdef INCLUDE_IPV6_SUPPORT
2701 u_int ittl = (u_char) ttl;
2703 rtc = setsockopt(inter->fd, IPPROTO_IPV6, IPV6_MULTICAST_HOPS,
2704 (const void *) &ittl, sizeof(ittl));
2708 #endif /* INCLUDE_IPV6_SUPPORT */
2709 default: /* just NOP if not supported */
2715 netsyslog(LOG_ERR, "setsockopt IP_MULTICAST_TTL/IPV6_MULTICAST_HOPS fails on address %s: %m",
2719 inter->last_ttl = ttl;
2724 for (slot = ERRORCACHESIZE; --slot >= 0; )
2725 if(dest->ss_family == AF_INET) {
2726 if (badaddrs[slot].port == SRCPORT(dest) &&
2727 badaddrs[slot].addr.s_addr == ((struct sockaddr_in*)dest)->sin_addr.s_addr)
2730 #ifdef INCLUDE_IPV6_SUPPORT
2731 else if (dest->ss_family == AF_INET6) {
2732 if (badaddrs6[slot].port == SRCPORT(dest) &&
2733 !memcmp(&badaddrs6[slot].addr, &((struct sockaddr_in6*)dest)->sin6_addr, sizeof(struct in6_addr)))
2736 #endif /* INCLUDE_IPV6_SUPPORT */
2738 #if defined(HAVE_IO_COMPLETION_PORT)
2739 cc = io_completion_port_sendto(inter, pkt, len, dest);
2740 if (cc != ERROR_SUCCESS)
2743 cc = srvr_rply(&ntp_node, dest, inter, pkt);
2745 cc = sendto(inter->fd, (char *)pkt, (unsigned int)len, 0, (struct sockaddr *)dest,
2754 #if defined(HAVE_IO_COMPLETION_PORT)
2755 if (cc != WSAEWOULDBLOCK && cc != WSAENOBUFS && slot < 0)
2757 if (errno != EWOULDBLOCK && errno != ENOBUFS && slot < 0)
2761 * Remember this, if there's an empty slot
2763 switch (dest->ss_family) {
2767 for (slot = ERRORCACHESIZE; --slot >= 0; )
2768 if (badaddrs[slot].port == 0)
2770 badaddrs[slot].port = SRCPORT(dest);
2771 badaddrs[slot].addr = ((struct sockaddr_in*)dest)->sin_addr;
2776 #ifdef INCLUDE_IPV6_SUPPORT
2779 for (slot = ERRORCACHESIZE; --slot >= 0; )
2780 if (badaddrs6[slot].port == 0)
2782 badaddrs6[slot].port = SRCPORT(dest);
2783 badaddrs6[slot].addr = ((struct sockaddr_in6*)dest)->sin6_addr;
2787 #endif /* INCLUDE_IPV6_SUPPORT */
2788 default: /* don't care if not supported */
2792 netsyslog(LOG_ERR, "sendto(%s) (fd=%d): %m",
2793 stoa(dest), inter->fd);
2801 * He's not bad any more
2805 netsyslog(LOG_INFO, "Connection re-established to %s", stoa(dest));
2806 switch (dest->ss_family) {
2808 badaddrs[slot].port = 0;
2810 #ifdef INCLUDE_IPV6_SUPPORT
2812 badaddrs6[slot].port = 0;
2814 #endif /* INCLUDE_IPV6_SUPPORT */
2815 default: /* don't care if not supported */
2822 #if !defined(HAVE_IO_COMPLETION_PORT)
2824 * fdbits - generate ascii representation of fd_set (FAU debug support)
2825 * HFDF format - highest fd first.
2833 static char buffer[256];
2834 char * buf = buffer;
2836 count = (count < 256) ? count : 255;
2840 *buf++ = FD_ISSET(count, set) ? '#' : '-';
2849 * Routine to read the refclock packets for a specific interface
2850 * Return the number of bytes read. That way we know if we should
2851 * read it again or go on to the next one if no bytes returned
2854 read_refclock_packet(SOCKET fd, struct refclockio *rp, l_fp ts)
2858 register struct recvbuf *rb;
2860 rb = get_free_recv_buffer();
2865 * No buffer space available - just drop the packet
2867 char buf[RX_BUFF_SIZE];
2869 buflen = read(fd, buf, sizeof buf);
2874 i = (rp->datalen == 0
2875 || rp->datalen > sizeof(rb->recv_space))
2876 ? sizeof(rb->recv_space) : rp->datalen;
2877 buflen = read(fd, (char *)&rb->recv_space, (unsigned)i);
2881 if (errno != EINTR && errno != EAGAIN) {
2882 netsyslog(LOG_ERR, "clock read fd %d: %m", fd);
2889 * Got one. Mark how and when it got here,
2890 * put it on the full list and do bookkeeping.
2892 rb->recv_length = buflen;
2893 rb->recv_srcclock = rp->srcclock;
2897 rb->receiver = rp->clock_recv;
2902 * have direct input routine for refclocks
2904 if (rp->io_input(rb) == 0)
2907 * data was consumed - nothing to pass up
2908 * into block input machine
2915 add_full_recv_buffer(rb);
2922 #ifdef HAVE_TIMESTAMP
2924 * extract timestamps from control message buffer
2927 fetch_timestamp(struct recvbuf *rb, struct msghdr *msghdr, l_fp ts)
2929 #ifdef USE_TIMESTAMP_CMSG
2930 struct cmsghdr *cmsghdr;
2932 cmsghdr = CMSG_FIRSTHDR(msghdr);
2933 while (cmsghdr != NULL) {
2934 switch (cmsghdr->cmsg_type)
2938 struct timeval *tvp = (struct timeval *)CMSG_DATA(cmsghdr);
2941 DPRINTF(4, ("fetch_timestamp: system network time stamp: %ld.%06ld\n", tvp->tv_sec, tvp->tv_usec));
2942 nts.l_i = tvp->tv_sec + JAN_1970;
2943 dtemp = tvp->tv_usec / 1e6;
2945 /* fuzz lower bits not covered by precision */
2946 if (sys_precision != 0)
2947 dtemp += (ntp_random() / FRAC - .5) / (1 <<
2950 nts.l_uf = (u_int32)(dtemp*FRAC);
2955 collect_timing(rb, "input processing delay", 1, &dts);
2956 DPRINTF(4, ("fetch_timestamp: timestamp delta: %s (incl. prec fuzz)\n", lfptoa(&dts, 9)));
2959 ts = nts; /* network time stamp */
2963 DPRINTF(4, ("fetch_timestamp: skipping control message 0x%x\n", cmsghdr->cmsg_type));
2966 cmsghdr = CMSG_NXTHDR(msghdr, cmsghdr);
2974 * Routine to read the network NTP packets for a specific interface
2975 * Return the number of bytes read. That way we know if we should
2976 * read it again or go on to the next one if no bytes returned
2979 read_network_packet(SOCKET fd, struct interface *itf, l_fp ts)
2981 GETSOCKNAME_SOCKLEN_TYPE fromlen;
2983 register struct recvbuf *rb;
2984 #ifdef HAVE_TIMESTAMP
2985 struct msghdr msghdr;
2987 char control[TIMESTAMP_CTLMSGBUF_SIZE]; /* pick up control messages */
2991 * Get a buffer and read the frame. If we
2992 * haven't got a buffer, or this is received
2993 * on a disallowed socket, just dump the
2997 rb = get_free_recv_buffer();
2999 if (rb == NULL || itf->ignore_packets == ISC_TRUE)
3001 char buf[RX_BUFF_SIZE];
3002 struct sockaddr_storage from;
3006 fromlen = sizeof(from);
3007 buflen = recvfrom(fd, buf, sizeof(buf), 0,
3008 (struct sockaddr*)&from, &fromlen);
3009 DPRINTF(4, ("%s on (%lu) fd=%d from %s\n",
3010 (itf->ignore_packets == ISC_TRUE) ? "ignore" : "drop",
3011 free_recvbuffs(), fd,
3013 if (itf->ignore_packets == ISC_TRUE)
3020 fromlen = sizeof(struct sockaddr_storage);
3022 #ifndef HAVE_TIMESTAMP
3023 rb->recv_length = recvfrom(fd,
3024 (char *)&rb->recv_space,
3025 sizeof(rb->recv_space), 0,
3026 (struct sockaddr *)&rb->recv_srcadr,
3029 iovec.iov_base = (void *)&rb->recv_space;
3030 iovec.iov_len = sizeof(rb->recv_space);
3031 msghdr.msg_name = (void *)&rb->recv_srcadr;
3032 msghdr.msg_namelen = sizeof(rb->recv_srcadr);
3033 msghdr.msg_iov = &iovec;
3034 msghdr.msg_iovlen = 1;
3035 msghdr.msg_control = (void *)&control;
3036 msghdr.msg_controllen = sizeof(control);
3037 msghdr.msg_flags = 0;
3038 rb->recv_length = recvmsg(fd, &msghdr, 0);
3041 buflen = rb->recv_length;
3043 if (buflen == 0 || (buflen == -1 &&
3052 else if (buflen < 0)
3054 netsyslog(LOG_ERR, "recvfrom(%s) fd=%d: %m",
3055 stoa(&rb->recv_srcadr), fd);
3056 DPRINTF(5, ("read_network_packet: fd=%d dropped (bad recvfrom)\n", fd));
3063 if(rb->recv_srcadr.ss_family == AF_INET)
3064 printf("read_network_packet: fd=%d length %d from %08lx %s\n",
3066 (u_long)ntohl(((struct sockaddr_in*)&rb->recv_srcadr)->sin_addr.s_addr) &
3068 stoa(&rb->recv_srcadr));
3070 printf("read_network_packet: fd=%d length %d from %s\n",
3072 stoa(&rb->recv_srcadr));
3077 * Got one. Mark how and when it got here,
3078 * put it on the full list and do bookkeeping.
3082 #ifdef HAVE_TIMESTAMP
3083 ts = fetch_timestamp(rb, &msghdr, ts); /* pick up a network time stamp if possible */
3086 rb->receiver = receive;
3088 add_full_recv_buffer(rb);
3096 * input_handler - receive packets asynchronously
3108 struct timeval tvzero;
3109 l_fp ts; /* Timestamp at BOselect() gob */
3111 l_fp ts_e; /* Timestamp at EOselect() gob */
3114 int select_count = 0;
3115 struct interface *interface;
3116 #if defined(HAS_ROUTING_SOCKET)
3117 struct asyncio_reader *asyncio_reader;
3123 * If we have something to do, freeze a timestamp.
3124 * See below for the other cases (nothing (left) to do or error)
3129 * Do a poll to see who has data
3133 tvzero.tv_sec = tvzero.tv_usec = 0;
3135 n = select(maxactivefd+1, &fds, (fd_set *)0, (fd_set *)0, &tvzero);
3138 * If there are no packets waiting just return
3144 * extended FAU debugging output
3148 "select(%d, %s, 0L, 0L, &0.0) error: %m",
3150 fdbits(maxactivefd, &activefds));
3154 for (j = 0; j <= maxactivefd; j++)
3155 if ((FD_ISSET(j, &fds) && (read(j, &b, 0) == -1)))
3156 netsyslog(LOG_ERR, "Bad file descriptor %d", j);
3167 * Check out the reference clocks first, if any
3172 register struct refclockio *rp;
3174 for (rp = refio; rp != NULL; rp = rp->next)
3178 if (FD_ISSET(fd, &fds))
3182 buflen = read_refclock_packet(fd, rp, ts);
3183 } while (buflen > 0);
3185 } /* End if (FD_ISSET(fd, &fds)) */
3186 } /* End for (rp = refio; rp != 0 && n > 0; rp = rp->next) */
3187 } /* End if (refio != 0) */
3189 #endif /* REFCLOCK */
3192 * Loop through the interfaces looking for data to read.
3194 for (interface = ISC_LIST_TAIL(inter_list);
3196 interface = ISC_LIST_PREV(interface, link))
3198 for (doing = 0; (doing < 2); doing++)
3206 if (!(interface->flags & INT_BCASTOPEN))
3208 fd = interface->bfd;
3210 if (fd < 0) continue;
3211 if (FD_ISSET(fd, &fds))
3215 buflen = read_network_packet(fd, interface, ts);
3216 } while (buflen > 0);
3218 /* Check more interfaces */
3222 #ifdef HAS_ROUTING_SOCKET
3224 * scan list of asyncio readers - currently only used for routing sockets
3226 asyncio_reader = ISC_LIST_TAIL(asyncio_reader_list);
3228 while (asyncio_reader != NULL)
3230 struct asyncio_reader *next = ISC_LIST_PREV(asyncio_reader, link);
3231 if (FD_ISSET(asyncio_reader->fd, &fds)) {
3233 asyncio_reader->receiver(asyncio_reader);
3235 asyncio_reader = next;
3237 #endif /* HAS_ROUTING_SOCKET */
3240 * Done everything from that select.
3244 * If nothing to do, just return.
3245 * If an error occurred, complain and return.
3247 if (select_count == 0) /* We really had nothing to do */
3251 netsyslog(LOG_DEBUG, "input_handler: select() returned 0");
3255 /* We've done our work */
3259 * (ts_e - ts) is the amount of time we spent
3260 * processing this gob of file descriptors. Log
3264 collect_timing(NULL, "input handler", 1, &ts_e);
3266 netsyslog(LOG_INFO, "input_handler: Processed a gob of fd's in %s msec", lfptoms(&ts_e, 6));
3275 * findinterface - find local interface corresponding to address
3279 struct sockaddr_storage *addr
3282 struct interface *interface;
3284 interface = findlocalinterface(addr, INT_WILDCARD);
3286 if (interface == NULL)
3288 DPRINTF(4, ("Found no interface for address %s - returning wildcard\n",
3291 return (ANY_INTERFACE_CHOOSE(addr));
3295 DPRINTF(4, ("Found interface #%d %s for address %s\n",
3296 interface->ifnum, interface->name, stoa(addr)));
3303 * findlocalinterface - find local interface index corresponding to address
3305 * This code attempts to find the local sending address for an outgoing
3306 * address by connecting a new socket to destinationaddress:NTP_PORT
3307 * and reading the sockname of the resulting connect.
3308 * the complicated sequence simulates the routing table lookup
3309 * for to first hop without duplicating any of the routing logic into
3310 * ntpd. preferably we would have used an API call - but its not there -
3311 * so this is the best we can do here short of duplicating to entire routing
3312 * logic in ntpd which would be a silly and really unportable thing to do.
3315 static struct interface *
3317 struct sockaddr_storage *addr,
3323 struct sockaddr_storage saddr;
3324 GETSOCKNAME_SOCKLEN_TYPE saddrlen = SOCKLEN(addr);
3325 struct interface *iface;
3327 DPRINTF(4, ("Finding interface for addr %s in list of addresses\n",
3330 memset(&saddr, 0, sizeof(saddr));
3331 saddr.ss_family = addr->ss_family;
3332 if(addr->ss_family == AF_INET) {
3333 memcpy(&((struct sockaddr_in*)&saddr)->sin_addr, &((struct sockaddr_in*)addr)->sin_addr, sizeof(struct in_addr));
3334 ((struct sockaddr_in*)&saddr)->sin_port = htons(NTP_PORT);
3336 #ifdef INCLUDE_IPV6_SUPPORT
3337 else if(addr->ss_family == AF_INET6) {
3338 memcpy(&((struct sockaddr_in6*)&saddr)->sin6_addr, &((struct sockaddr_in6*)addr)->sin6_addr, sizeof(struct in6_addr));
3339 ((struct sockaddr_in6*)&saddr)->sin6_port = htons(NTP_PORT);
3340 # ifdef ISC_PLATFORM_HAVESCOPEID
3341 ((struct sockaddr_in6*)&saddr)->sin6_scope_id = ((struct sockaddr_in6*)addr)->sin6_scope_id;
3346 s = socket(addr->ss_family, SOCK_DGRAM, 0);
3347 if (s == INVALID_SOCKET)
3350 rtn = connect(s, (struct sockaddr *)&saddr, SOCKLEN(&saddr));
3354 if (rtn == SOCKET_ERROR)
3361 rtn = getsockname(s, (struct sockaddr *)&saddr, &saddrlen);
3366 if (rtn == SOCKET_ERROR)
3370 DPRINTF(4, ("findlocalinterface: kernel maps %s to %s\n", stoa(addr), stoa(&saddr)));
3372 iface = getinterface(&saddr, flags);
3374 /* Don't both with ignore interfaces */
3375 if (iface != NULL && iface->ignore_packets == ISC_TRUE)
3386 * fetch an interface structure the matches the
3387 * address is has the given flags not set
3389 static struct interface *
3390 getinterface(struct sockaddr_storage *addr, int flags)
3392 struct interface *interface = find_addr_in_list(addr);
3394 if (interface != NULL && interface->flags & flags)
3405 * findlocalcastinterface - find local *cast interface index corresponding to address
3406 * depending on the flags passed
3408 static struct interface *
3409 findlocalcastinterface(
3410 struct sockaddr_storage *addr, int flags
3413 struct interface *interface;
3414 struct interface *nif = NULL;
3415 #ifdef INCLUDE_IPV6_MULTICAST_SUPPORT
3416 isc_boolean_t want_linklocal;
3420 * see how kernel maps the mcast address
3422 nif = findlocalinterface(addr, 0);
3425 DPRINTF(2, ("findlocalcastinterface: kernel recommends interface #%d %s\n", nif->ifnum, nif->name));
3429 #ifdef INCLUDE_IPV6_MULTICAST_SUPPORT
3430 want_linklocal = ISC_FALSE;
3431 if (addr_ismulticast(addr) && flags == INT_MULTICAST)
3433 if (IN6_IS_ADDR_MC_LINKLOCAL(&((struct sockaddr_in6*)addr)->sin6_addr))
3435 want_linklocal = ISC_TRUE;
3437 else if (IN6_IS_ADDR_MC_SITELOCAL(&((struct sockaddr_in6*)addr)->sin6_addr))
3439 want_linklocal = ISC_TRUE;
3444 for (interface = ISC_LIST_HEAD(inter_list);
3446 interface = ISC_LIST_NEXT(interface, link))
3448 /* use only allowed addresses */
3449 if (interface->ignore_packets == ISC_TRUE)
3452 /* Skip the loopback and wildcard addresses */
3453 if (interface->flags & (INT_LOOPBACK|INT_WILDCARD))
3456 /* Skip if different family */
3457 if(interface->sin.ss_family != addr->ss_family)
3460 /* Is this it one of these based on flags? */
3461 if (!(interface->flags & flags))
3464 /* for IPv6 multicast check the address for linklocal */
3465 #ifdef INCLUDE_IPV6_MULTICAST_SUPPORT
3466 if (flags == INT_MULTICAST && interface->sin.ss_family == AF_INET6 &&
3467 (IN6_IS_ADDR_LINKLOCAL(&((struct sockaddr_in6*)&interface->sin)->sin6_addr))
3468 && want_linklocal == ISC_TRUE)
3473 /* If we want a linklocal address and this isn't it, skip */\
3474 if (want_linklocal == ISC_TRUE)
3477 /* Otherwise just look for the flag */
3478 if((interface->flags & flags))
3488 printf("findlocalcastinterface: found interface #%d %s\n", nif->ifnum, nif->name);
3490 printf("findlocalcastinterface: no interface found for %s flags 0x%x\n", stoa(addr), flags);
3497 * findbcastinter - find broadcast interface corresponding to address
3501 struct sockaddr_storage *addr
3504 #if !defined(MPE) && (defined(SIOCGIFCONF) || defined(SYS_WINNT))
3505 struct interface *interface;
3508 DPRINTF(4, ("Finding broadcast/multicast interface for addr %s in list of addresses\n",
3511 interface = findlocalinterface(addr, INT_LOOPBACK|INT_WILDCARD);
3513 if (interface != NULL)
3515 DPRINTF(4, ("Found bcast-/mcast- interface index #%d %s\n", interface->ifnum, interface->name));
3519 /* plan B - try to find something reasonable in our lists in case kernel lookup doesn't help */
3521 for (interface = ISC_LIST_HEAD(inter_list);
3523 interface = ISC_LIST_NEXT(interface, link))
3525 if (interface->flags & INT_WILDCARD)
3528 /* Don't bother with ignored interfaces */
3529 if (interface->ignore_packets == ISC_TRUE)
3533 * First look if this is the correct family
3535 if(interface->sin.ss_family != addr->ss_family)
3538 /* Skip the loopback addresses */
3539 if (interface->flags & INT_LOOPBACK)
3543 * If we are looking to match a multicast address grab it.
3545 if (addr_ismulticast(addr) == ISC_TRUE && interface->flags & INT_MULTICAST)
3547 #ifdef INCLUDE_IPV6_SUPPORT
3548 if(addr->ss_family == AF_INET6) {
3549 /* Only use link-local address for link-scope mcast */
3550 if(IN6_IS_ADDR_MC_LINKLOCAL(&((struct sockaddr_in6*)addr)->sin6_addr) &&
3551 !IN6_IS_ADDR_LINKLOCAL(&((struct sockaddr_in6*)&interface->sin)->sin6_addr)) {
3560 * We match only those interfaces marked as
3561 * broadcastable and either the explicit broadcast
3562 * address or the network portion of the IP address.
3565 if(addr->ss_family == AF_INET) {
3566 if (SOCKCMP(&interface->bcast, addr)) {
3569 if ((NSRCADR(&interface->sin) &
3570 NSRCADR(&interface->mask)) == (NSRCADR(addr) &
3571 NSRCADR(&interface->mask)))
3574 #ifdef INCLUDE_IPV6_SUPPORT
3575 else if(addr->ss_family == AF_INET6) {
3576 if (SOCKCMP(&interface->bcast, addr)) {
3579 if (SOCKCMP(netof(&interface->sin), netof(addr))) {
3585 #endif /* SIOCGIFCONF */
3586 if (interface == NULL) {
3587 DPRINTF(4, ("No bcast interface found for %s\n", stoa(addr)));
3588 return ANY_INTERFACE_CHOOSE(addr);
3590 DPRINTF(4, ("Found bcast-/mcast- interface index #%d %s\n", interface->ifnum, interface->name));
3597 * io_clr_stats - clear I/O module statistics
3602 packets_dropped = 0;
3603 packets_ignored = 0;
3604 packets_received = 0;
3606 packets_notsent = 0;
3610 io_timereset = current_time;
3616 * io_addclock - add a reference clock to the list and arrange that we
3617 * get SIGIO interrupts from it.
3621 struct refclockio *rio
3626 * Stuff the I/O structure in the list and mark the descriptor
3627 * in use. There is a harmless (I hope) race condition here.
3631 # ifdef HAVE_SIGNALED_IO
3632 if (init_clock_sig(rio))
3637 # elif defined(HAVE_IO_COMPLETION_PORT)
3638 if (io_completion_port_add_clock_io(rio))
3653 add_fd_to_list(rio->fd, FD_TYPE_FILE);
3660 * io_closeclock - close the clock in the I/O structure given
3664 struct refclockio *rio
3669 * Remove structure from the list
3677 register struct refclockio *rp;
3679 for (rp = refio; rp != NULL; rp = rp->next)
3680 if (rp->next == rio)
3682 rp->next = rio->next;
3693 * Close the descriptor.
3695 close_and_delete_fd_from_list(rio->fd);
3698 #endif /* REFCLOCK */
3701 * On NT a SOCKET is an unsigned int so we cannot possibly keep it in
3702 * an array. So we use one of the ISC_LIST functions to hold the
3703 * socket value and use that when we want to enumerate it.
3706 kill_asyncio(int startfd)
3713 lsock = ISC_LIST_HEAD(fd_list);
3714 while (lsock != NULL) {
3716 * careful here - list is being dismantled while
3717 * we scan it - setting next here insures that
3718 * we are able to correctly scan the list
3720 next = ISC_LIST_NEXT(lsock, link);
3722 * will remove socket from list
3724 close_and_delete_fd_from_list(lsock->fd);
3732 * Add and delete functions for the list of open sockets
3735 add_fd_to_list(SOCKET fd, enum desc_type type) {
3736 vsock_t *lsock = (vsock_t *)emalloc(sizeof(vsock_t));
3740 ISC_LIST_APPEND(fd_list, lsock, link);
3742 * I/O Completion Ports don't care about the select and FD_SET
3744 #ifndef HAVE_IO_COMPLETION_PORT
3745 if (fd < 0 || fd >= FD_SETSIZE) {
3746 msyslog(LOG_ERR, "Too many sockets in use, FD_SETSIZE %d exceeded",
3751 * keep activefds in sync
3753 if (fd > maxactivefd)
3755 FD_SET( (u_int)fd, &activefds);
3760 close_and_delete_fd_from_list(SOCKET fd) {
3763 vsock_t *lsock = ISC_LIST_HEAD(fd_list);
3765 while(lsock != NULL) {
3766 next = ISC_LIST_NEXT(lsock, link);
3767 if(lsock->fd == fd) {
3768 ISC_LIST_DEQUEUE_TYPE(fd_list, lsock, link, vsock_t);
3770 switch (lsock->type) {
3771 case FD_TYPE_SOCKET:
3773 closesocket(lsock->fd);
3777 (void) close(lsock->fd);
3780 msyslog(LOG_ERR, "internal error - illegal descriptor type %d - EXITING", (int)lsock->type);
3786 * I/O Completion Ports don't care about select and fd_set
3788 #ifndef HAVE_IO_COMPLETION_PORT
3790 * remove from activefds
3792 FD_CLR( (u_int) fd, &activefds);
3794 if (fd == maxactivefd) {
3796 for (i = 0; i < maxactivefd; i++)
3797 if (FD_ISSET(i, &activefds))
3799 maxactivefd = newmax;
3809 add_addr_to_list(struct sockaddr_storage *addr, struct interface *interface){
3811 if (find_addr_in_list(addr) == NULL) {
3813 /* not there yet - add to list */
3814 remaddr_t *laddr = (remaddr_t *)emalloc(sizeof(remaddr_t));
3815 memcpy(&laddr->addr, addr, sizeof(struct sockaddr_storage));
3816 laddr->interface = interface;
3818 ISC_LIST_APPEND(remoteaddr_list, laddr, link);
3820 DPRINTF(4, ("Added addr %s to list of addresses\n",
3824 DPRINTF(4, ("WARNING: Attempt to add duplicate addr %s to address list\n",
3831 delete_addr_from_list(struct sockaddr_storage *addr) {
3834 remaddr_t *laddr = ISC_LIST_HEAD(remoteaddr_list);
3836 while(laddr != NULL) {
3837 next = ISC_LIST_NEXT(laddr, link);
3838 if(SOCKCMP(&laddr->addr, addr)) {
3839 ISC_LIST_DEQUEUE_TYPE(remoteaddr_list, laddr, link, remaddr_t);
3840 DPRINTF(4, ("Deleted addr %s from list of addresses\n",
3850 delete_interface_from_list(struct interface *iface) {
3852 remaddr_t *laddr = ISC_LIST_HEAD(remoteaddr_list);
3854 while(laddr != NULL) {
3855 next = ISC_LIST_NEXT(laddr, link);
3856 if (laddr->interface == iface) {
3857 ISC_LIST_DEQUEUE_TYPE(remoteaddr_list, laddr, link, remaddr_t);
3858 DPRINTF(4, ("Deleted addr %s for interface #%d %s from list of addresses\n",
3859 stoa(&laddr->addr), iface->ifnum, iface->name));
3866 static struct interface *
3867 find_addr_in_list(struct sockaddr_storage *addr) {
3870 remaddr_t *laddr = ISC_LIST_HEAD(remoteaddr_list);
3871 DPRINTF(4, ("Searching for addr %s in list of addresses - ",
3874 while(laddr != NULL) {
3875 next = ISC_LIST_NEXT(laddr, link);
3876 if(SOCKCMP(&laddr->addr, addr)) {
3877 DPRINTF(4, ("FOUND\n"));
3878 return laddr->interface;
3883 DPRINTF(4, ("NOT FOUND\n"));
3884 return NULL; /* Not found */
3888 * Find the given address with the associated flag in the list
3890 static struct interface *
3891 find_flagged_addr_in_list(struct sockaddr_storage *addr, int flag) {
3894 remaddr_t *laddr = ISC_LIST_HEAD(remoteaddr_list);
3895 DPRINTF(4, ("Finding addr %s in list of addresses\n",
3898 while(laddr != NULL) {
3899 next = ISC_LIST_NEXT(laddr, link);
3900 if(SOCKCMP(&laddr->addr, addr) && (laddr->interface->flags & flag)) {
3901 return laddr->interface;
3907 return NULL; /* Not found */
3910 #ifdef HAS_ROUTING_SOCKET
3911 #include <net/route.h>
3913 #ifndef UPDATE_GRACE
3914 #define UPDATE_GRACE 2 /* wait UPDATE_GRACE seconds before scanning */
3918 process_routing_msgs(struct asyncio_reader *reader)
3925 if (disable_dynamic_updates) {
3927 * discard ourselves if we are not need any more
3928 * usually happens when running unprivileged
3930 remove_asyncio_reader(reader);
3931 delete_asyncio_reader(reader);
3935 cnt = read(reader->fd, buffer, sizeof(buffer));
3938 msyslog(LOG_ERR, "i/o error on routing socket %m - disabling");
3939 remove_asyncio_reader(reader);
3940 delete_asyncio_reader(reader);
3945 * process routing message
3947 while ((p + sizeof(struct rt_msghdr)) <= (buffer + cnt))
3949 struct rt_msghdr *rtm;
3951 rtm = (struct rt_msghdr *)p;
3952 if (rtm->rtm_version != RTM_VERSION) {
3953 msyslog(LOG_ERR, "version mismatch on routing socket %m - disabling");
3954 remove_asyncio_reader(reader);
3955 delete_asyncio_reader(reader);
3959 switch (rtm->rtm_type) {
3984 #ifdef RTM_IFANNOUNCE
3985 case RTM_IFANNOUNCE:
3988 * we are keen on new and deleted addresses and if an interface goes up and down or routing changes
3990 DPRINTF(3, ("routing message op = %d: scheduling interface update\n", rtm->rtm_type));
3991 timer_interfacetimeout(current_time + UPDATE_GRACE);
3995 * the rest doesn't bother us.
3997 DPRINTF(4, ("routing message op = %d: ignored\n", rtm->rtm_type));
4000 p += rtm->rtm_msglen;
4005 * set up routing notifications
4008 init_async_notifications()
4010 struct asyncio_reader *reader;
4011 int fd = socket(PF_ROUTE, SOCK_RAW, 0);
4015 init_nonblocking_io(fd);
4016 #if defined(HAVE_SIGNALED_IO)
4017 init_socket_sig(fd);
4018 #endif /* HAVE_SIGNALED_IO */
4020 reader = new_asyncio_reader();
4023 reader->receiver = process_routing_msgs;
4025 add_asyncio_reader(reader, FD_TYPE_SOCKET);
4026 msyslog(LOG_INFO, "Listening on routing socket on fd #%d for interface updates", fd);
4028 msyslog(LOG_ERR, "unable to open routing socket (%m) - using polled interface update");
4033 init_async_notifications()