]> CyberLeo.Net >> Repos - FreeBSD/releng/10.2.git/blob - contrib/ntp/ntpd/ntpd.c
- Copy stable/10@285827 to releng/10.2 in preparation for 10.2-RC1
[FreeBSD/releng/10.2.git] / contrib / ntp / ntpd / ntpd.c
1 /*
2  * ntpd.c - main program for the fixed point NTP daemon
3  */
4
5 #ifdef HAVE_CONFIG_H
6 # include <config.h>
7 #endif
8
9 #include "ntp_machine.h"
10 #include "ntpd.h"
11 #include "ntp_io.h"
12 #include "ntp_stdlib.h"
13 #include <ntp_random.h>
14
15 #include "ntp_config.h"
16 #include "ntp_syslog.h"
17 #include "ntp_assert.h"
18 #include "isc/error.h"
19 #include "isc/strerror.h"
20 #include "isc/formatcheck.h"
21 #include "iosignal.h"
22
23 #ifdef SIM
24 # include "ntpsim.h"
25 #endif
26
27 #include "ntp_libopts.h"
28 #include "ntpd-opts.h"
29
30 #ifdef HAVE_UNISTD_H
31 # include <unistd.h>
32 #endif
33 #ifdef HAVE_SYS_STAT_H
34 # include <sys/stat.h>
35 #endif
36 #include <stdio.h>
37 #ifdef HAVE_SYS_PARAM_H
38 # include <sys/param.h>
39 #endif
40 #ifdef HAVE_SYS_SIGNAL_H
41 # include <sys/signal.h>
42 #else
43 # include <signal.h>
44 #endif
45 #ifdef HAVE_SYS_IOCTL_H
46 # include <sys/ioctl.h>
47 #endif /* HAVE_SYS_IOCTL_H */
48 #if defined(HAVE_RTPRIO)
49 # ifdef HAVE_SYS_LOCK_H
50 #  include <sys/lock.h>
51 # endif
52 # include <sys/rtprio.h>
53 #else
54 # ifdef HAVE_PLOCK
55 #  ifdef HAVE_SYS_LOCK_H
56 #       include <sys/lock.h>
57 #  endif
58 # endif
59 #endif
60 #if defined(HAVE_SCHED_SETSCHEDULER)
61 # ifdef HAVE_SCHED_H
62 #  include <sched.h>
63 # else
64 #  ifdef HAVE_SYS_SCHED_H
65 #   include <sys/sched.h>
66 #  endif
67 # endif
68 #endif
69 #if defined(HAVE_SYS_MMAN_H)
70 # include <sys/mman.h>
71 #endif
72
73 #ifdef HAVE_TERMIOS_H
74 # include <termios.h>
75 #endif
76
77 #ifdef SYS_DOMAINOS
78 # include <apollo/base.h>
79 #endif /* SYS_DOMAINOS */
80
81
82 #include "recvbuff.h"
83 #include "ntp_cmdargs.h"
84
85 #if 0                           /* HMS: I don't think we need this. 961223 */
86 #ifdef LOCK_PROCESS
87 # ifdef SYS_SOLARIS
88 #  include <sys/mman.h>
89 # else
90 #  include <sys/lock.h>
91 # endif
92 #endif
93 #endif
94
95 #ifdef _AIX
96 # include <ulimit.h>
97 #endif /* _AIX */
98
99 #ifdef SCO5_CLOCK
100 # include <sys/ci/ciioctl.h>
101 #endif
102
103 #ifdef HAVE_DROPROOT
104 # include <ctype.h>
105 # include <grp.h>
106 # include <pwd.h>
107 #ifdef HAVE_LINUX_CAPABILITIES
108 # include <sys/capability.h>
109 # include <sys/prctl.h>
110 #endif /* HAVE_LINUX_CAPABILITIES */
111 #if defined(HAVE_PRIV_H) && defined(HAVE_SOLARIS_PRIVS)
112 # include <priv.h>
113 #endif /* HAVE_PRIV_H */
114 #endif /* HAVE_DROPROOT */
115
116 #if defined (LIBSECCOMP) && (KERN_SECCOMP)
117 /* # include <sys/types.h> */
118 # include <sys/resource.h>
119 # include <seccomp.h>
120 #endif /* LIBSECCOMP and KERN_SECCOMP */
121
122 #ifdef HAVE_DNSREGISTRATION
123 # include <dns_sd.h>
124 DNSServiceRef mdns;
125 #endif
126
127 #ifdef HAVE_SETPGRP_0
128 # define ntp_setpgrp(x, y)      setpgrp()
129 #else
130 # define ntp_setpgrp(x, y)      setpgrp(x, y)
131 #endif
132
133 #ifdef HAVE_SOLARIS_PRIVS
134 # define LOWPRIVS "basic,sys_time,net_privaddr,proc_setid,!proc_info,!proc_session,!proc_exec"
135 static priv_set_t *lowprivs = NULL;
136 static priv_set_t *highprivs = NULL;
137 #endif /* HAVE_SOLARIS_PRIVS */
138 /*
139  * Scheduling priority we run at
140  */
141 #define NTPD_PRIO       (-12)
142
143 int priority_done = 2;          /* 0 - Set priority */
144                                 /* 1 - priority is OK where it is */
145                                 /* 2 - Don't set priority */
146                                 /* 1 and 2 are pretty much the same */
147
148 int listen_to_virtual_ips = TRUE;
149
150 /*
151  * No-fork flag.  If set, we do not become a background daemon.
152  */
153 int nofork;                     /* Fork by default */
154
155 #ifdef HAVE_DNSREGISTRATION
156 /*
157  * mDNS registration flag. If set, we attempt to register with the mDNS system, but only
158  * after we have synched the first time. If the attempt fails, then try again once per 
159  * minute for up to 5 times. After all, we may be starting before mDNS.
160  */
161 int mdnsreg = FALSE;
162 int mdnstries = 5;
163 #endif  /* HAVE_DNSREGISTRATION */
164
165 #ifdef HAVE_DROPROOT
166 int droproot;
167 int root_dropped;
168 char *user;             /* User to switch to */
169 char *group;            /* group to switch to */
170 const char *chrootdir;  /* directory to chroot to */
171 uid_t sw_uid;
172 gid_t sw_gid;
173 char *endp;
174 struct group *gr;
175 struct passwd *pw;
176 #endif /* HAVE_DROPROOT */
177
178 #ifdef HAVE_WORKING_FORK
179 int     waitsync_fd_to_close = -1;      /* -w/--wait-sync */
180 #endif
181
182 /*
183  * Initializing flag.  All async routines watch this and only do their
184  * thing when it is clear.
185  */
186 int initializing;
187
188 /*
189  * Version declaration
190  */
191 extern const char *Version;
192
193 char const *progname;
194
195 int was_alarmed;
196
197 #ifdef DECL_SYSCALL
198 /*
199  * We put this here, since the argument profile is syscall-specific
200  */
201 extern int syscall      (int, ...);
202 #endif /* DECL_SYSCALL */
203
204
205 #if !defined(SIM) && defined(SIGDIE1)
206 static  RETSIGTYPE      finish          (int);
207 #endif
208
209 #if !defined(SIM) && defined(HAVE_WORKING_FORK)
210 static int      wait_child_sync_if      (int, long);
211 #endif
212
213 #if !defined(SIM) && !defined(SYS_WINNT)
214 # ifdef DEBUG
215 static  RETSIGTYPE      moredebug       (int);
216 static  RETSIGTYPE      lessdebug       (int);
217 # else  /* !DEBUG follows */
218 static  RETSIGTYPE      no_debug        (int);
219 # endif /* !DEBUG */
220 #endif  /* !SIM && !SYS_WINNT */
221
222 int     saved_argc;
223 char ** saved_argv;
224
225 #ifndef SIM
226 int             ntpdmain                (int, char **);
227 static void     set_process_priority    (void);
228 static void     assertion_failed        (const char *, int,
229                                          isc_assertiontype_t,
230                                          const char *)
231                         __attribute__   ((__noreturn__));
232 static void     library_fatal_error     (const char *, int, 
233                                          const char *, va_list)
234                                         ISC_FORMAT_PRINTF(3, 0);
235 static void     library_unexpected_error(const char *, int,
236                                          const char *, va_list)
237                                         ISC_FORMAT_PRINTF(3, 0);
238 #endif  /* !SIM */
239
240
241
242
243 void
244 parse_cmdline_opts(
245         int *   pargc,
246         char ***pargv
247         )
248 {
249         static int      parsed;
250         static int      optct;
251
252         if (!parsed)
253                 optct = ntpOptionProcess(&ntpdOptions, *pargc, *pargv);
254
255         parsed = 1;
256         
257         *pargc -= optct;
258         *pargv += optct;
259 }
260
261
262 #ifdef SIM
263 int
264 main(
265         int argc,
266         char *argv[]
267         )
268 {
269         progname = argv[0];
270         parse_cmdline_opts(&argc, &argv);
271 #ifdef DEBUG
272         debug = OPT_VALUE_SET_DEBUG_LEVEL;
273         DPRINTF(1, ("%s\n", Version));
274 #endif
275
276         return ntpsim(argc, argv);
277 }
278 #else   /* !SIM follows */
279 #ifdef NO_MAIN_ALLOWED
280 CALL(ntpd,"ntpd",ntpdmain);
281 #else   /* !NO_MAIN_ALLOWED follows */
282 #ifndef SYS_WINNT
283 int
284 main(
285         int argc,
286         char *argv[]
287         )
288 {
289         return ntpdmain(argc, argv);
290 }
291 #endif /* !SYS_WINNT */
292 #endif /* !NO_MAIN_ALLOWED */
293 #endif /* !SIM */
294
295 #ifdef _AIX
296 /*
297  * OK. AIX is different than solaris in how it implements plock().
298  * If you do NOT adjust the stack limit, you will get the MAXIMUM
299  * stack size allocated and PINNED with you program. To check the
300  * value, use ulimit -a.
301  *
302  * To fix this, we create an automatic variable and set our stack limit
303  * to that PLUS 32KB of extra space (we need some headroom).
304  *
305  * This subroutine gets the stack address.
306  *
307  * Grover Davidson and Matt Ladendorf
308  *
309  */
310 static char *
311 get_aix_stack(void)
312 {
313         char ch;
314         return (&ch);
315 }
316
317 /*
318  * Signal handler for SIGDANGER.
319  */
320 static void
321 catch_danger(int signo)
322 {
323         msyslog(LOG_INFO, "ntpd: setpgid(): %m");
324         /* Make the system believe we'll free something, but don't do it! */
325         return;
326 }
327 #endif /* _AIX */
328
329 /*
330  * Set the process priority
331  */
332 #ifndef SIM
333 static void
334 set_process_priority(void)
335 {
336
337 # ifdef DEBUG
338         if (debug > 1)
339                 msyslog(LOG_DEBUG, "set_process_priority: %s: priority_done is <%d>",
340                         ((priority_done)
341                          ? "Leave priority alone"
342                          : "Attempt to set priority"
343                                 ),
344                         priority_done);
345 # endif /* DEBUG */
346
347 # if defined(HAVE_SCHED_SETSCHEDULER)
348         if (!priority_done) {
349                 extern int config_priority_override, config_priority;
350                 int pmax, pmin;
351                 struct sched_param sched;
352
353                 pmax = sched_get_priority_max(SCHED_FIFO);
354                 sched.sched_priority = pmax;
355                 if ( config_priority_override ) {
356                         pmin = sched_get_priority_min(SCHED_FIFO);
357                         if ( config_priority > pmax )
358                                 sched.sched_priority = pmax;
359                         else if ( config_priority < pmin )
360                                 sched.sched_priority = pmin;
361                         else
362                                 sched.sched_priority = config_priority;
363                 }
364                 if ( sched_setscheduler(0, SCHED_FIFO, &sched) == -1 )
365                         msyslog(LOG_ERR, "sched_setscheduler(): %m");
366                 else
367                         ++priority_done;
368         }
369 # endif /* HAVE_SCHED_SETSCHEDULER */
370 # ifdef HAVE_RTPRIO
371 #  ifdef RTP_SET
372         if (!priority_done) {
373                 struct rtprio srtp;
374
375                 srtp.type = RTP_PRIO_REALTIME;  /* was: RTP_PRIO_NORMAL */
376                 srtp.prio = 0;          /* 0 (hi) -> RTP_PRIO_MAX (31,lo) */
377
378                 if (rtprio(RTP_SET, getpid(), &srtp) < 0)
379                         msyslog(LOG_ERR, "rtprio() error: %m");
380                 else
381                         ++priority_done;
382         }
383 #  else /* !RTP_SET follows */
384         if (!priority_done) {
385                 if (rtprio(0, 120) < 0)
386                         msyslog(LOG_ERR, "rtprio() error: %m");
387                 else
388                         ++priority_done;
389         }
390 #  endif        /* !RTP_SET */
391 # endif /* HAVE_RTPRIO */
392 # if defined(NTPD_PRIO) && NTPD_PRIO != 0
393 #  ifdef HAVE_ATT_NICE
394         if (!priority_done) {
395                 errno = 0;
396                 if (-1 == nice (NTPD_PRIO) && errno != 0)
397                         msyslog(LOG_ERR, "nice() error: %m");
398                 else
399                         ++priority_done;
400         }
401 #  endif        /* HAVE_ATT_NICE */
402 #  ifdef HAVE_BSD_NICE
403         if (!priority_done) {
404                 if (-1 == setpriority(PRIO_PROCESS, 0, NTPD_PRIO))
405                         msyslog(LOG_ERR, "setpriority() error: %m");
406                 else
407                         ++priority_done;
408         }
409 #  endif        /* HAVE_BSD_NICE */
410 # endif /* NTPD_PRIO && NTPD_PRIO != 0 */
411         if (!priority_done)
412                 msyslog(LOG_ERR, "set_process_priority: No way found to improve our priority");
413 }
414 #endif  /* !SIM */
415
416
417 /*
418  * Main program.  Initialize us, disconnect us from the tty if necessary,
419  * and loop waiting for I/O and/or timer expiries.
420  */
421 #ifndef SIM
422 int
423 ntpdmain(
424         int argc,
425         char *argv[]
426         )
427 {
428         l_fp            now;
429         struct recvbuf *rbuf;
430         const char *    logfilename;
431 # ifdef HAVE_UMASK
432         mode_t          uv;
433 # endif
434 # if defined(HAVE_GETUID) && !defined(MPE) /* MPE lacks the concept of root */
435         uid_t           uid;
436 # endif
437 # if defined(HAVE_WORKING_FORK)
438         long            wait_sync = 0;
439         int             pipe_fds[2];
440         int             rc;
441         int             exit_code;
442 #  ifdef _AIX
443         struct sigaction sa;
444 #  endif
445 #  if !defined(HAVE_SETSID) && !defined (HAVE_SETPGID) && defined(TIOCNOTTY)
446         int             fid;
447 #  endif
448 # endif /* HAVE_WORKING_FORK*/
449 # ifdef SCO5_CLOCK
450         int             fd;
451         int             zero;
452 # endif
453
454 # ifdef HAVE_UMASK
455         uv = umask(0);
456         if (uv)
457                 umask(uv);
458         else
459                 umask(022);
460 # endif
461         saved_argc = argc;
462         saved_argv = argv;
463         progname = argv[0];
464         initializing = TRUE;            /* mark that we are initializing */
465         parse_cmdline_opts(&argc, &argv);
466 # ifdef DEBUG
467         debug = OPT_VALUE_SET_DEBUG_LEVEL;
468 #  ifdef HAVE_SETLINEBUF
469         setlinebuf(stdout);
470 #  endif
471 # endif
472
473         if (HAVE_OPT(NOFORK) || HAVE_OPT(QUIT)
474 # ifdef DEBUG
475             || debug
476 # endif
477             || HAVE_OPT(SAVECONFIGQUIT))
478                 nofork = TRUE;
479
480         init_logging(progname, NLOG_SYNCMASK, TRUE);
481         /* honor -l/--logfile option to log to a file */
482         if (HAVE_OPT(LOGFILE)) {
483                 logfilename = OPT_ARG(LOGFILE);
484                 syslogit = FALSE;
485                 change_logfile(logfilename, FALSE);
486         } else {
487                 logfilename = NULL;
488                 if (nofork)
489                         msyslog_term = TRUE;
490                 if (HAVE_OPT(SAVECONFIGQUIT))
491                         syslogit = FALSE;
492         }
493         msyslog(LOG_NOTICE, "%s: Starting", Version);
494
495         {
496                 int i;
497                 char buf[1024]; /* Secret knowledge of msyslog buf length */
498                 char *cp = buf;
499
500                 /* Note that every arg has an initial space character */
501                 snprintf(cp, sizeof(buf), "Command line:");
502                 cp += strlen(cp);
503
504                 for (i = 0; i < saved_argc ; ++i) {
505                         snprintf(cp, sizeof(buf) - (cp - buf),
506                                 " %s", saved_argv[i]);
507                         cp += strlen(cp);
508                 }
509                 msyslog(LOG_INFO, "%s", buf);
510         }
511
512         /*
513          * Install trap handlers to log errors and assertion failures.
514          * Default handlers print to stderr which doesn't work if detached.
515          */
516         isc_assertion_setcallback(assertion_failed);
517         isc_error_setfatal(library_fatal_error);
518         isc_error_setunexpected(library_unexpected_error);
519
520         /* MPE lacks the concept of root */
521 # if defined(HAVE_GETUID) && !defined(MPE)
522         uid = getuid();
523         if (uid && !HAVE_OPT( SAVECONFIGQUIT )) {
524                 msyslog_term = TRUE;
525                 msyslog(LOG_ERR,
526                         "must be run as root, not uid %ld", (long)uid);
527                 exit(1);
528         }
529 # endif
530
531 /*
532  * Enable the Multi-Media Timer for Windows?
533  */
534 # ifdef SYS_WINNT
535         if (HAVE_OPT( MODIFYMMTIMER ))
536                 set_mm_timer(MM_TIMER_HIRES);
537 # endif
538
539 #ifdef HAVE_DNSREGISTRATION
540 /*
541  * Enable mDNS registrations?
542  */
543         if (HAVE_OPT( MDNS )) {
544                 mdnsreg = TRUE;
545         }
546 #endif  /* HAVE_DNSREGISTRATION */
547
548         if (HAVE_OPT( NOVIRTUALIPS ))
549                 listen_to_virtual_ips = 0;
550
551         /*
552          * --interface, listen on specified interfaces
553          */
554         if (HAVE_OPT( INTERFACE )) {
555                 int             ifacect = STACKCT_OPT( INTERFACE );
556                 const char**    ifaces  = STACKLST_OPT( INTERFACE );
557                 sockaddr_u      addr;
558
559                 while (ifacect-- > 0) {
560                         add_nic_rule(
561                                 is_ip_address(*ifaces, AF_UNSPEC, &addr)
562                                         ? MATCH_IFADDR
563                                         : MATCH_IFNAME,
564                                 *ifaces, -1, ACTION_LISTEN);
565                         ifaces++;
566                 }
567         }
568
569         if (HAVE_OPT( NICE ))
570                 priority_done = 0;
571
572 # ifdef HAVE_SCHED_SETSCHEDULER
573         if (HAVE_OPT( PRIORITY )) {
574                 config_priority = OPT_VALUE_PRIORITY;
575                 config_priority_override = 1;
576                 priority_done = 0;
577         }
578 # endif
579
580 # ifdef HAVE_WORKING_FORK
581         do {                                    /* 'loop' once */
582                 if (!HAVE_OPT( WAIT_SYNC ))
583                         break;
584                 wait_sync = OPT_VALUE_WAIT_SYNC;
585                 if (wait_sync <= 0) {
586                         wait_sync = 0;
587                         break;
588                 }
589                 /* -w requires a fork() even with debug > 0 */
590                 nofork = FALSE;
591                 if (pipe(pipe_fds)) {
592                         exit_code = (errno) ? errno : -1;
593                         msyslog(LOG_ERR,
594                                 "Pipe creation failed for --wait-sync: %m");
595                         exit(exit_code);
596                 }
597                 waitsync_fd_to_close = pipe_fds[1];
598         } while (0);                            /* 'loop' once */
599 # endif /* HAVE_WORKING_FORK */
600
601         init_lib();
602 # ifdef SYS_WINNT
603         /*
604          * Start interpolation thread, must occur before first
605          * get_systime()
606          */
607         init_winnt_time();
608 # endif
609         /*
610          * Initialize random generator and public key pair
611          */
612         get_systime(&now);
613
614         ntp_srandom((int)(now.l_i * now.l_uf));
615
616         /*
617          * Detach us from the terminal.  May need an #ifndef GIZMO.
618          */
619         if (!nofork) {
620
621 # ifdef HAVE_WORKING_FORK
622                 rc = fork();
623                 if (-1 == rc) {
624                         exit_code = (errno) ? errno : -1;
625                         msyslog(LOG_ERR, "fork: %m");
626                         exit(exit_code);
627                 }
628                 if (rc > 0) {   
629                         /* parent */
630                         exit_code = wait_child_sync_if(pipe_fds[0],
631                                                        wait_sync);
632                         exit(exit_code);
633                 }
634                 
635                 /*
636                  * child/daemon 
637                  * close all open files excepting waitsync_fd_to_close.
638                  * msyslog() unreliable until after init_logging().
639                  */
640                 closelog();
641                 if (syslog_file != NULL) {
642                         fclose(syslog_file);
643                         syslog_file = NULL;
644                         syslogit = TRUE;
645                 }
646                 close_all_except(waitsync_fd_to_close);
647                 INSIST(0 == open("/dev/null", 0) && 1 == dup2(0, 1) \
648                         && 2 == dup2(0, 2));
649
650                 init_logging(progname, 0, TRUE);
651                 /* we lost our logfile (if any) daemonizing */
652                 setup_logfile(logfilename);
653
654 #  ifdef SYS_DOMAINOS
655                 {
656                         uid_$t puid;
657                         status_$t st;
658
659                         proc2_$who_am_i(&puid);
660                         proc2_$make_server(&puid, &st);
661                 }
662 #  endif        /* SYS_DOMAINOS */
663 #  ifdef HAVE_SETSID
664                 if (setsid() == (pid_t)-1)
665                         msyslog(LOG_ERR, "setsid(): %m");
666 #  elif defined(HAVE_SETPGID)
667                 if (setpgid(0, 0) == -1)
668                         msyslog(LOG_ERR, "setpgid(): %m");
669 #  else         /* !HAVE_SETSID && !HAVE_SETPGID follows */
670 #   ifdef TIOCNOTTY
671                 fid = open("/dev/tty", 2);
672                 if (fid >= 0) {
673                         ioctl(fid, (u_long)TIOCNOTTY, NULL);
674                         close(fid);
675                 }
676 #   endif       /* TIOCNOTTY */
677                 ntp_setpgrp(0, getpid());
678 #  endif        /* !HAVE_SETSID && !HAVE_SETPGID */
679 #  ifdef _AIX
680                 /* Don't get killed by low-on-memory signal. */
681                 sa.sa_handler = catch_danger;
682                 sigemptyset(&sa.sa_mask);
683                 sa.sa_flags = SA_RESTART;
684                 sigaction(SIGDANGER, &sa, NULL);
685 #  endif        /* _AIX */
686 # endif         /* HAVE_WORKING_FORK */
687         }
688
689 # ifdef SCO5_CLOCK
690         /*
691          * SCO OpenServer's system clock offers much more precise timekeeping
692          * on the base CPU than the other CPUs (for multiprocessor systems),
693          * so we must lock to the base CPU.
694          */
695         fd = open("/dev/at1", O_RDONLY);                
696         if (fd >= 0) {
697                 zero = 0;
698                 if (ioctl(fd, ACPU_LOCK, &zero) < 0)
699                         msyslog(LOG_ERR, "cannot lock to base CPU: %m");
700                 close(fd);
701         }
702 # endif
703
704         /* Setup stack size in preparation for locking pages in memory. */
705 # if defined(HAVE_MLOCKALL)
706 #  ifdef HAVE_SETRLIMIT
707         ntp_rlimit(RLIMIT_STACK, DFLT_RLIMIT_STACK * 4096, 4096, "4k");
708 #   ifdef RLIMIT_MEMLOCK
709         /*
710          * The default RLIMIT_MEMLOCK is very low on Linux systems.
711          * Unless we increase this limit malloc calls are likely to
712          * fail if we drop root privilege.  To be useful the value
713          * has to be larger than the largest ntpd resident set size.
714          */
715         ntp_rlimit(RLIMIT_MEMLOCK, DFLT_RLIMIT_MEMLOCK * 1024 * 1024, 1024 * 1024, "MB");
716 #   endif       /* RLIMIT_MEMLOCK */
717 #  endif        /* HAVE_SETRLIMIT */
718 # else  /* !HAVE_MLOCKALL follows */
719 #  ifdef HAVE_PLOCK
720 #   ifdef PROCLOCK
721 #    ifdef _AIX
722         /*
723          * set the stack limit for AIX for plock().
724          * see get_aix_stack() for more info.
725          */
726         if (ulimit(SET_STACKLIM, (get_aix_stack() - 8 * 4096)) < 0)
727                 msyslog(LOG_ERR,
728                         "Cannot adjust stack limit for plock: %m");
729 #    endif      /* _AIX */
730 #   endif       /* PROCLOCK */
731 #  endif        /* HAVE_PLOCK */
732 # endif /* !HAVE_MLOCKALL */
733
734         /*
735          * Set up signals we pay attention to locally.
736          */
737 # ifdef SIGDIE1
738         signal_no_reset(SIGDIE1, finish);
739         signal_no_reset(SIGDIE2, finish);
740         signal_no_reset(SIGDIE3, finish);
741         signal_no_reset(SIGDIE4, finish);
742 # endif
743 # ifdef SIGBUS
744         signal_no_reset(SIGBUS, finish);
745 # endif
746
747 # if !defined(SYS_WINNT) && !defined(VMS)
748 #  ifdef DEBUG
749         (void) signal_no_reset(MOREDEBUGSIG, moredebug);
750         (void) signal_no_reset(LESSDEBUGSIG, lessdebug);
751 #  else
752         (void) signal_no_reset(MOREDEBUGSIG, no_debug);
753         (void) signal_no_reset(LESSDEBUGSIG, no_debug);
754 #  endif        /* DEBUG */
755 # endif /* !SYS_WINNT && !VMS */
756
757         /*
758          * Set up signals we should never pay attention to.
759          */
760 # ifdef SIGPIPE
761         signal_no_reset(SIGPIPE, SIG_IGN);
762 # endif
763
764         /*
765          * Call the init_ routines to initialize the data structures.
766          *
767          * Exactly what command-line options are we expecting here?
768          */
769         INIT_SSL();
770         init_auth();
771         init_util();
772         init_restrict();
773         init_mon();
774         init_timer();
775         init_request();
776         init_control();
777         init_peer();
778 # ifdef REFCLOCK
779         init_refclock();
780 # endif
781         set_process_priority();
782         init_proto();           /* Call at high priority */
783         init_io();
784         init_loopfilter();
785         mon_start(MON_ON);      /* monitor on by default now      */
786                                 /* turn off in config if unwanted */
787
788         /*
789          * Get the configuration.  This is done in a separate module
790          * since this will definitely be different for the gizmo board.
791          */
792         getconfig(argc, argv);
793
794         if (do_memlock) {
795 # if defined(HAVE_MLOCKALL)
796                 /*
797                  * lock the process into memory
798                  */
799                 if (!HAVE_OPT(SAVECONFIGQUIT) &&
800                     0 != mlockall(MCL_CURRENT|MCL_FUTURE))
801                         msyslog(LOG_ERR, "mlockall(): %m");
802 # else  /* !HAVE_MLOCKALL follows */
803 #  ifdef HAVE_PLOCK
804 #   ifdef PROCLOCK
805                 /*
806                  * lock the process into memory
807                  */
808                 if (!HAVE_OPT(SAVECONFIGQUIT) && 0 != plock(PROCLOCK))
809                         msyslog(LOG_ERR, "plock(PROCLOCK): %m");
810 #   else        /* !PROCLOCK follows  */
811 #    ifdef TXTLOCK
812                 /*
813                  * Lock text into ram
814                  */
815                 if (!HAVE_OPT(SAVECONFIGQUIT) && 0 != plock(TXTLOCK))
816                         msyslog(LOG_ERR, "plock(TXTLOCK) error: %m");
817 #    else       /* !TXTLOCK follows */
818                 msyslog(LOG_ERR, "plock() - don't know what to lock!");
819 #    endif      /* !TXTLOCK */
820 #   endif       /* !PROCLOCK */
821 #  endif        /* HAVE_PLOCK */
822 # endif /* !HAVE_MLOCKALL */
823         }
824
825         loop_config(LOOP_DRIFTINIT, 0);
826         report_event(EVNT_SYSRESTART, NULL, NULL);
827         initializing = FALSE;
828
829 # ifdef HAVE_DROPROOT
830         if (droproot) {
831                 /* Drop super-user privileges and chroot now if the OS supports this */
832
833 #  ifdef HAVE_LINUX_CAPABILITIES
834                 /* set flag: keep privileges accross setuid() call (we only really need cap_sys_time): */
835                 if (prctl( PR_SET_KEEPCAPS, 1L, 0L, 0L, 0L ) == -1) {
836                         msyslog( LOG_ERR, "prctl( PR_SET_KEEPCAPS, 1L ) failed: %m" );
837                         exit(-1);
838                 }
839 #  elif HAVE_SOLARIS_PRIVS
840                 /* Nothing to do here */
841 #  else
842                 /* we need a user to switch to */
843                 if (user == NULL) {
844                         msyslog(LOG_ERR, "Need user name to drop root privileges (see -u flag!)" );
845                         exit(-1);
846                 }
847 #  endif        /* HAVE_LINUX_CAPABILITIES || HAVE_SOLARIS_PRIVS */
848
849                 if (user != NULL) {
850                         if (isdigit((unsigned char)*user)) {
851                                 sw_uid = (uid_t)strtoul(user, &endp, 0);
852                                 if (*endp != '\0')
853                                         goto getuser;
854
855                                 if ((pw = getpwuid(sw_uid)) != NULL) {
856                                         free(user);
857                                         user = estrdup(pw->pw_name);
858                                         sw_gid = pw->pw_gid;
859                                 } else {
860                                         errno = 0;
861                                         msyslog(LOG_ERR, "Cannot find user ID %s", user);
862                                         exit (-1);
863                                 }
864
865                         } else {
866 getuser:
867                                 errno = 0;
868                                 if ((pw = getpwnam(user)) != NULL) {
869                                         sw_uid = pw->pw_uid;
870                                         sw_gid = pw->pw_gid;
871                                 } else {
872                                         if (errno)
873                                                 msyslog(LOG_ERR, "getpwnam(%s) failed: %m", user);
874                                         else
875                                                 msyslog(LOG_ERR, "Cannot find user `%s'", user);
876                                         exit (-1);
877                                 }
878                         }
879                 }
880                 if (group != NULL) {
881                         if (isdigit((unsigned char)*group)) {
882                                 sw_gid = (gid_t)strtoul(group, &endp, 0);
883                                 if (*endp != '\0')
884                                         goto getgroup;
885                         } else {
886 getgroup:
887                                 if ((gr = getgrnam(group)) != NULL) {
888                                         sw_gid = gr->gr_gid;
889                                 } else {
890                                         errno = 0;
891                                         msyslog(LOG_ERR, "Cannot find group `%s'", group);
892                                         exit (-1);
893                                 }
894                         }
895                 }
896
897                 if (chrootdir ) {
898                         /* make sure cwd is inside the jail: */
899                         if (chdir(chrootdir)) {
900                                 msyslog(LOG_ERR, "Cannot chdir() to `%s': %m", chrootdir);
901                                 exit (-1);
902                         }
903                         if (chroot(chrootdir)) {
904                                 msyslog(LOG_ERR, "Cannot chroot() to `%s': %m", chrootdir);
905                                 exit (-1);
906                         }
907                         if (chdir("/")) {
908                                 msyslog(LOG_ERR, "Cannot chdir() to`root after chroot(): %m");
909                                 exit (-1);
910                         }
911                 }
912 #  ifdef HAVE_SOLARIS_PRIVS
913                 if ((lowprivs = priv_str_to_set(LOWPRIVS, ",", NULL)) == NULL) {
914                         msyslog(LOG_ERR, "priv_str_to_set() failed:%m");
915                         exit(-1);
916                 }
917                 if ((highprivs = priv_allocset()) == NULL) {
918                         msyslog(LOG_ERR, "priv_allocset() failed:%m");
919                         exit(-1);
920                 }
921                 (void) getppriv(PRIV_PERMITTED, highprivs);
922                 (void) priv_intersect(highprivs, lowprivs);
923                 if (setppriv(PRIV_SET, PRIV_PERMITTED, lowprivs) == -1) {
924                         msyslog(LOG_ERR, "setppriv() failed:%m");
925                         exit(-1);
926                 }
927 #  endif /* HAVE_SOLARIS_PRIVS */
928                 if (user && initgroups(user, sw_gid)) {
929                         msyslog(LOG_ERR, "Cannot initgroups() to user `%s': %m", user);
930                         exit (-1);
931                 }
932                 if (group && setgid(sw_gid)) {
933                         msyslog(LOG_ERR, "Cannot setgid() to group `%s': %m", group);
934                         exit (-1);
935                 }
936                 if (group && setegid(sw_gid)) {
937                         msyslog(LOG_ERR, "Cannot setegid() to group `%s': %m", group);
938                         exit (-1);
939                 }
940                 if (group)
941                         setgroups(1, &sw_gid);
942                 else
943                         initgroups(pw->pw_name, pw->pw_gid);
944                 if (user && setuid(sw_uid)) {
945                         msyslog(LOG_ERR, "Cannot setuid() to user `%s': %m", user);
946                         exit (-1);
947                 }
948                 if (user && seteuid(sw_uid)) {
949                         msyslog(LOG_ERR, "Cannot seteuid() to user `%s': %m", user);
950                         exit (-1);
951                 }
952
953 #  if !defined(HAVE_LINUX_CAPABILITIES) && !defined(HAVE_SOLARIS_PRIVS)
954                 /*
955                  * for now assume that the privilege to bind to privileged ports
956                  * is associated with running with uid 0 - should be refined on
957                  * ports that allow binding to NTP_PORT with uid != 0
958                  */
959                 disable_dynamic_updates |= (sw_uid != 0);  /* also notifies routing message listener */
960 #  endif /* !HAVE_LINUX_CAPABILITIES && !HAVE_SOLARIS_PRIVS */
961
962                 if (disable_dynamic_updates && interface_interval) {
963                         interface_interval = 0;
964                         msyslog(LOG_INFO, "running as non-root disables dynamic interface tracking");
965                 }
966
967 #  ifdef HAVE_LINUX_CAPABILITIES
968                 {
969                         /*
970                          *  We may be running under non-root uid now, but we still hold full root privileges!
971                          *  We drop all of them, except for the crucial one or two: cap_sys_time and
972                          *  cap_net_bind_service if doing dynamic interface tracking.
973                          */
974                         cap_t caps;
975                         char *captext;
976                         
977                         captext = (0 != interface_interval)
978                                       ? "cap_sys_time,cap_net_bind_service=pe"
979                                       : "cap_sys_time=pe";
980                         caps = cap_from_text(captext);
981                         if (!caps) {
982                                 msyslog(LOG_ERR,
983                                         "cap_from_text(%s) failed: %m",
984                                         captext);
985                                 exit(-1);
986                         }
987                         if (-1 == cap_set_proc(caps)) {
988                                 msyslog(LOG_ERR,
989                                         "cap_set_proc() failed to drop root privs: %m");
990                                 exit(-1);
991                         }
992                         cap_free(caps);
993                 }
994 #  endif        /* HAVE_LINUX_CAPABILITIES */
995 #  ifdef HAVE_SOLARIS_PRIVS
996                 if (priv_delset(lowprivs, "proc_setid") == -1) {
997                         msyslog(LOG_ERR, "priv_delset() failed:%m");
998                         exit(-1);
999                 }
1000                 if (setppriv(PRIV_SET, PRIV_PERMITTED, lowprivs) == -1) {
1001                         msyslog(LOG_ERR, "setppriv() failed:%m");
1002                         exit(-1);
1003                 }
1004                 priv_freeset(lowprivs);
1005                 priv_freeset(highprivs);
1006 #  endif /* HAVE_SOLARIS_PRIVS */
1007                 root_dropped = TRUE;
1008                 fork_deferred_worker();
1009         }       /* if (droproot) */
1010 # endif /* HAVE_DROPROOT */
1011
1012 /* libssecomp sandboxing */
1013 #if defined (LIBSECCOMP) && (KERN_SECCOMP)
1014         scmp_filter_ctx ctx;
1015
1016         if ((ctx = seccomp_init(SCMP_ACT_KILL)) < 0)
1017                 msyslog(LOG_ERR, "%s: seccomp_init(SCMP_ACT_KILL) failed: %m", __func__);
1018         else {
1019                 msyslog(LOG_DEBUG, "%s: seccomp_init(SCMP_ACT_KILL) succeeded", __func__);
1020         }
1021
1022 #ifdef __x86_64__
1023 int scmp_sc[] = {
1024         SCMP_SYS(adjtimex),
1025         SCMP_SYS(bind),
1026         SCMP_SYS(brk),
1027         SCMP_SYS(chdir),
1028         SCMP_SYS(clock_gettime),
1029         SCMP_SYS(clock_settime),
1030         SCMP_SYS(close),
1031         SCMP_SYS(connect),
1032         SCMP_SYS(exit_group),
1033         SCMP_SYS(fstat),
1034         SCMP_SYS(fsync),
1035         SCMP_SYS(futex),
1036         SCMP_SYS(getitimer),
1037         SCMP_SYS(getsockname),
1038         SCMP_SYS(ioctl),
1039         SCMP_SYS(lseek),
1040         SCMP_SYS(madvise),
1041         SCMP_SYS(mmap),
1042         SCMP_SYS(munmap),
1043         SCMP_SYS(open),
1044         SCMP_SYS(poll),
1045         SCMP_SYS(read),
1046         SCMP_SYS(recvmsg),
1047         SCMP_SYS(rename),
1048         SCMP_SYS(rt_sigaction),
1049         SCMP_SYS(rt_sigprocmask),
1050         SCMP_SYS(rt_sigreturn),
1051         SCMP_SYS(select),
1052         SCMP_SYS(sendto),
1053         SCMP_SYS(setitimer),
1054         SCMP_SYS(setsid),
1055         SCMP_SYS(socket),
1056         SCMP_SYS(stat),
1057         SCMP_SYS(time),
1058         SCMP_SYS(write),
1059 };
1060 #endif
1061 #ifdef __i386__
1062 int scmp_sc[] = {
1063         SCMP_SYS(_newselect),
1064         SCMP_SYS(adjtimex),
1065         SCMP_SYS(brk),
1066         SCMP_SYS(chdir),
1067         SCMP_SYS(clock_gettime),
1068         SCMP_SYS(clock_settime),
1069         SCMP_SYS(close),
1070         SCMP_SYS(exit_group),
1071         SCMP_SYS(fsync),
1072         SCMP_SYS(futex),
1073         SCMP_SYS(getitimer),
1074         SCMP_SYS(madvise),
1075         SCMP_SYS(mmap),
1076         SCMP_SYS(mmap2),
1077         SCMP_SYS(munmap),
1078         SCMP_SYS(open),
1079         SCMP_SYS(poll),
1080         SCMP_SYS(read),
1081         SCMP_SYS(rename),
1082         SCMP_SYS(rt_sigaction),
1083         SCMP_SYS(rt_sigprocmask),
1084         SCMP_SYS(select),
1085         SCMP_SYS(setitimer),
1086         SCMP_SYS(setsid),
1087         SCMP_SYS(sigprocmask),
1088         SCMP_SYS(sigreturn),
1089         SCMP_SYS(socketcall),
1090         SCMP_SYS(stat64),
1091         SCMP_SYS(time),
1092         SCMP_SYS(write),
1093 };
1094 #endif
1095         {
1096                 int i;
1097
1098                 for (i = 0; i < COUNTOF(scmp_sc); i++) {
1099                         if (seccomp_rule_add(ctx,
1100                             SCMP_ACT_ALLOW, scmp_sc[i], 0) < 0) {
1101                                 msyslog(LOG_ERR,
1102                                     "%s: seccomp_rule_add() failed: %m",
1103                                     __func__);
1104                         }
1105                 }
1106         }
1107
1108         if (seccomp_load(ctx) < 0)
1109                 msyslog(LOG_ERR, "%s: seccomp_load() failed: %m",
1110                     __func__);  
1111         else {
1112                 msyslog(LOG_DEBUG, "%s: seccomp_load() succeeded", __func__);
1113         }
1114 #endif /* LIBSECCOMP and KERN_SECCOMP */
1115
1116 # ifdef HAVE_IO_COMPLETION_PORT
1117
1118         for (;;) {
1119                 GetReceivedBuffers();
1120 # else /* normal I/O */
1121
1122         BLOCK_IO_AND_ALARM();
1123         was_alarmed = FALSE;
1124
1125         for (;;) {
1126                 if (alarm_flag) {       /* alarmed? */
1127                         was_alarmed = TRUE;
1128                         alarm_flag = FALSE;
1129                 }
1130
1131                 if (!was_alarmed && !has_full_recv_buffer()) {
1132                         /*
1133                          * Nothing to do.  Wait for something.
1134                          */
1135                         io_handler();
1136                 }
1137
1138                 if (alarm_flag) {       /* alarmed? */
1139                         was_alarmed = TRUE;
1140                         alarm_flag = FALSE;
1141                 }
1142
1143                 if (was_alarmed) {
1144                         UNBLOCK_IO_AND_ALARM();
1145                         /*
1146                          * Out here, signals are unblocked.  Call timer routine
1147                          * to process expiry.
1148                          */
1149                         timer();
1150                         was_alarmed = FALSE;
1151                         BLOCK_IO_AND_ALARM();
1152                 }
1153
1154 # endif         /* !HAVE_IO_COMPLETION_PORT */
1155
1156 # ifdef DEBUG_TIMING
1157                 {
1158                         l_fp pts;
1159                         l_fp tsa, tsb;
1160                         int bufcount = 0;
1161
1162                         get_systime(&pts);
1163                         tsa = pts;
1164 # endif
1165                         rbuf = get_full_recv_buffer();
1166                         while (rbuf != NULL) {
1167                                 if (alarm_flag) {
1168                                         was_alarmed = TRUE;
1169                                         alarm_flag = FALSE;
1170                                 }
1171                                 UNBLOCK_IO_AND_ALARM();
1172
1173                                 if (was_alarmed) {
1174                                         /* avoid timer starvation during lengthy I/O handling */
1175                                         timer();
1176                                         was_alarmed = FALSE;
1177                                 }
1178
1179                                 /*
1180                                  * Call the data procedure to handle each received
1181                                  * packet.
1182                                  */
1183                                 if (rbuf->receiver != NULL) {
1184 # ifdef DEBUG_TIMING
1185                                         l_fp dts = pts;
1186
1187                                         L_SUB(&dts, &rbuf->recv_time);
1188                                         DPRINTF(2, ("processing timestamp delta %s (with prec. fuzz)\n", lfptoa(&dts, 9)));
1189                                         collect_timing(rbuf, "buffer processing delay", 1, &dts);
1190                                         bufcount++;
1191 # endif
1192                                         (*rbuf->receiver)(rbuf);
1193                                 } else {
1194                                         msyslog(LOG_ERR, "fatal: receive buffer callback NULL");
1195                                         abort();
1196                                 }
1197
1198                                 BLOCK_IO_AND_ALARM();
1199                                 freerecvbuf(rbuf);
1200                                 rbuf = get_full_recv_buffer();
1201                         }
1202 # ifdef DEBUG_TIMING
1203                         get_systime(&tsb);
1204                         L_SUB(&tsb, &tsa);
1205                         if (bufcount) {
1206                                 collect_timing(NULL, "processing", bufcount, &tsb);
1207                                 DPRINTF(2, ("processing time for %d buffers %s\n", bufcount, lfptoa(&tsb, 9)));
1208                         }
1209                 }
1210 # endif
1211
1212                 /*
1213                  * Go around again
1214                  */
1215
1216 # ifdef HAVE_DNSREGISTRATION
1217                 if (mdnsreg && (current_time - mdnsreg ) > 60 && mdnstries && sys_leap != LEAP_NOTINSYNC) {
1218                         mdnsreg = current_time;
1219                         msyslog(LOG_INFO, "Attempting to register mDNS");
1220                         if ( DNSServiceRegister (&mdns, 0, 0, NULL, "_ntp._udp", NULL, NULL, 
1221                             htons(NTP_PORT), 0, NULL, NULL, NULL) != kDNSServiceErr_NoError ) {
1222                                 if (!--mdnstries) {
1223                                         msyslog(LOG_ERR, "Unable to register mDNS, giving up.");
1224                                 } else {        
1225                                         msyslog(LOG_INFO, "Unable to register mDNS, will try later.");
1226                                 }
1227                         } else {
1228                                 msyslog(LOG_INFO, "mDNS service registered.");
1229                                 mdnsreg = FALSE;
1230                         }
1231                 }
1232 # endif /* HAVE_DNSREGISTRATION */
1233
1234         }
1235         UNBLOCK_IO_AND_ALARM();
1236         return 1;
1237 }
1238 #endif  /* !SIM */
1239
1240
1241 #if !defined(SIM) && defined(SIGDIE1)
1242 /*
1243  * finish - exit gracefully
1244  */
1245 static RETSIGTYPE
1246 finish(
1247         int sig
1248         )
1249 {
1250         const char *sig_desc;
1251
1252         sig_desc = NULL;
1253 #ifdef HAVE_STRSIGNAL
1254         sig_desc = strsignal(sig);
1255 #endif
1256         if (sig_desc == NULL)
1257                 sig_desc = "";
1258         msyslog(LOG_NOTICE, "%s exiting on signal %d (%s)", progname,
1259                 sig, sig_desc);
1260         /* See Bug 2513 and Bug 2522 re the unlink of PIDFILE */
1261 # ifdef HAVE_DNSREGISTRATION
1262         if (mdns != NULL)
1263                 DNSServiceRefDeallocate(mdns);
1264 # endif
1265         peer_cleanup();
1266         exit(0);
1267 }
1268 #endif  /* !SIM && SIGDIE1 */
1269
1270
1271 #ifndef SIM
1272 /*
1273  * wait_child_sync_if - implements parent side of -w/--wait-sync
1274  */
1275 # ifdef HAVE_WORKING_FORK
1276 static int
1277 wait_child_sync_if(
1278         int     pipe_read_fd,
1279         long    wait_sync
1280         )
1281 {
1282         int     rc;
1283         int     exit_code;
1284         time_t  wait_end_time;
1285         time_t  cur_time;
1286         time_t  wait_rem;
1287         fd_set  readset;
1288         struct timeval wtimeout;
1289
1290         if (0 == wait_sync) 
1291                 return 0;
1292
1293         /* waitsync_fd_to_close used solely by child */
1294         close(waitsync_fd_to_close);
1295         wait_end_time = time(NULL) + wait_sync;
1296         do {
1297                 cur_time = time(NULL);
1298                 wait_rem = (wait_end_time > cur_time)
1299                                 ? (wait_end_time - cur_time)
1300                                 : 0;
1301                 wtimeout.tv_sec = wait_rem;
1302                 wtimeout.tv_usec = 0;
1303                 FD_ZERO(&readset);
1304                 FD_SET(pipe_read_fd, &readset);
1305                 rc = select(pipe_read_fd + 1, &readset, NULL, NULL,
1306                             &wtimeout);
1307                 if (-1 == rc) {
1308                         if (EINTR == errno)
1309                                 continue;
1310                         exit_code = (errno) ? errno : -1;
1311                         msyslog(LOG_ERR,
1312                                 "--wait-sync select failed: %m");
1313                         return exit_code;
1314                 }
1315                 if (0 == rc) {
1316                         /*
1317                          * select() indicated a timeout, but in case
1318                          * its timeouts are affected by a step of the
1319                          * system clock, select() again with a zero 
1320                          * timeout to confirm.
1321                          */
1322                         FD_ZERO(&readset);
1323                         FD_SET(pipe_read_fd, &readset);
1324                         wtimeout.tv_sec = 0;
1325                         wtimeout.tv_usec = 0;
1326                         rc = select(pipe_read_fd + 1, &readset, NULL,
1327                                     NULL, &wtimeout);
1328                         if (0 == rc)    /* select() timeout */
1329                                 break;
1330                         else            /* readable */
1331                                 return 0;
1332                 } else                  /* readable */
1333                         return 0;
1334         } while (wait_rem > 0);
1335
1336         fprintf(stderr, "%s: -w/--wait-sync %ld timed out.\n",
1337                 progname, wait_sync);
1338         return ETIMEDOUT;
1339 }
1340 # endif /* HAVE_WORKING_FORK */
1341
1342
1343 /*
1344  * assertion_failed - Redirect assertion failures to msyslog().
1345  */
1346 static void
1347 assertion_failed(
1348         const char *file,
1349         int line,
1350         isc_assertiontype_t type,
1351         const char *cond
1352         )
1353 {
1354         isc_assertion_setcallback(NULL);    /* Avoid recursion */
1355
1356         msyslog(LOG_ERR, "%s:%d: %s(%s) failed",
1357                 file, line, isc_assertion_typetotext(type), cond);
1358         msyslog(LOG_ERR, "exiting (due to assertion failure)");
1359
1360 #if defined(DEBUG) && defined(SYS_WINNT)
1361         if (debug)
1362                 DebugBreak();
1363 #endif
1364
1365         abort();
1366 }
1367
1368
1369 /*
1370  * library_fatal_error - Handle fatal errors from our libraries.
1371  */
1372 static void
1373 library_fatal_error(
1374         const char *file,
1375         int line,
1376         const char *format,
1377         va_list args
1378         )
1379 {
1380         char errbuf[256];
1381
1382         isc_error_setfatal(NULL);  /* Avoid recursion */
1383
1384         msyslog(LOG_ERR, "%s:%d: fatal error:", file, line);
1385         vsnprintf(errbuf, sizeof(errbuf), format, args);
1386         msyslog(LOG_ERR, "%s", errbuf);
1387         msyslog(LOG_ERR, "exiting (due to fatal error in library)");
1388
1389 #if defined(DEBUG) && defined(SYS_WINNT)
1390         if (debug)
1391                 DebugBreak();
1392 #endif
1393
1394         abort();
1395 }
1396
1397
1398 /*
1399  * library_unexpected_error - Handle non fatal errors from our libraries.
1400  */
1401 # define MAX_UNEXPECTED_ERRORS 100
1402 int unexpected_error_cnt = 0;
1403 static void
1404 library_unexpected_error(
1405         const char *file,
1406         int line,
1407         const char *format,
1408         va_list args
1409         )
1410 {
1411         char errbuf[256];
1412
1413         if (unexpected_error_cnt >= MAX_UNEXPECTED_ERRORS)
1414                 return; /* avoid clutter in log */
1415
1416         msyslog(LOG_ERR, "%s:%d: unexpected error:", file, line);
1417         vsnprintf(errbuf, sizeof(errbuf), format, args);
1418         msyslog(LOG_ERR, "%s", errbuf);
1419
1420         if (++unexpected_error_cnt == MAX_UNEXPECTED_ERRORS)
1421                 msyslog(LOG_ERR, "Too many errors.  Shutting up.");
1422
1423 }
1424 #endif  /* !SIM */
1425
1426 #if !defined(SIM) && !defined(SYS_WINNT)
1427 # ifdef DEBUG
1428
1429 /*
1430  * moredebug - increase debugging verbosity
1431  */
1432 static RETSIGTYPE
1433 moredebug(
1434         int sig
1435         )
1436 {
1437         int saved_errno = errno;
1438
1439         if (debug < 255)
1440         {
1441                 debug++;
1442                 msyslog(LOG_DEBUG, "debug raised to %d", debug);
1443         }
1444         errno = saved_errno;
1445 }
1446
1447
1448 /*
1449  * lessdebug - decrease debugging verbosity
1450  */
1451 static RETSIGTYPE
1452 lessdebug(
1453         int sig
1454         )
1455 {
1456         int saved_errno = errno;
1457
1458         if (debug > 0)
1459         {
1460                 debug--;
1461                 msyslog(LOG_DEBUG, "debug lowered to %d", debug);
1462         }
1463         errno = saved_errno;
1464 }
1465
1466 # else  /* !DEBUG follows */
1467
1468
1469 /*
1470  * no_debug - We don't do the debug here.
1471  */
1472 static RETSIGTYPE
1473 no_debug(
1474         int sig
1475         )
1476 {
1477         int saved_errno = errno;
1478
1479         msyslog(LOG_DEBUG, "ntpd not compiled for debugging (signal %d)", sig);
1480         errno = saved_errno;
1481 }
1482 # endif /* !DEBUG */
1483 #endif  /* !SIM && !SYS_WINNT */