freebsd-nq/contrib/ntp/ntpd/ntp_io.c

2258 lines
54 KiB
C
Raw Normal View History

1999-12-09 13:01:21 +00:00
/*
* ntp_io.c - input/output routines for ntpd. The socket-opening code
* was shamelessly stolen from ntpd.
*/
#ifdef HAVE_CONFIG_H
# include <config.h>
#endif
2001-08-29 14:35:15 +00:00
#include "ntp_machine.h"
#include "ntpd.h"
#include "ntp_io.h"
#include "iosignal.h"
#include "ntp_refclock.h"
#include "ntp_if.h"
#include "ntp_stdlib.h"
2004-07-20 15:01:56 +00:00
#include "ntp.h"
/* Don't include ISC's version of IPv6 variables and structures */
#define ISC_IPV6_H 1
#include <isc/interfaceiter.h>
#include <isc/list.h>
#include <isc/result.h>
#ifdef SIM
#include "ntpsim.h"
#endif
2001-08-29 14:35:15 +00:00
1999-12-09 13:01:21 +00:00
#include <stdio.h>
#include <signal.h>
#ifdef HAVE_SYS_PARAM_H
# include <sys/param.h>
#endif /* HAVE_SYS_PARAM_H */
#ifdef HAVE_NETINET_IN_H
# include <netinet/in.h>
#endif
2000-01-28 14:55:50 +00:00
#ifdef HAVE_NETINET_IN_SYSTM_H
# include <netinet/in_systm.h>
#else /* Some old linux systems at least have in_system.h instead. */
2002-10-29 19:58:12 +00:00
# ifdef HAVE_NETINET_IN_SYSTEM_H
# include <netinet/in_system.h>
# endif
2000-01-28 14:55:50 +00:00
#endif /* HAVE_NETINET_IN_SYSTM_H */
2002-10-29 19:58:12 +00:00
#ifdef HAVE_NETINET_IP_H
# include <netinet/ip.h>
#endif
1999-12-09 13:01:21 +00:00
#ifdef HAVE_SYS_IOCTL_H
# include <sys/ioctl.h>
#endif
#ifdef HAVE_SYS_SOCKIO_H /* UXPV: SIOC* #defines (Frank Vance <fvance@waii.com>) */
# include <sys/sockio.h>
#endif
#include <arpa/inet.h>
2002-10-29 19:58:12 +00:00
extern int listen_to_virtual_ips;
2004-07-20 15:01:56 +00:00
#if defined(SYS_WINNT)
#include <transmitbuff.h>
#include <isc/win32os.h>
/*
* Define this macro to control the behavior of connection
* resets on UDP sockets. See Microsoft KnowledgeBase Article Q263823
* for details.
* NOTE: This requires that Windows 2000 systems install Service Pack 2
* or later.
*/
#ifndef SIO_UDP_CONNRESET
#define SIO_UDP_CONNRESET _WSAIOW(IOC_VENDOR,12)
1999-12-09 13:01:21 +00:00
#endif
#endif
/*
* We do asynchronous input using the SIGIO facility. A number of
* recvbuf buffers are preallocated for input. In the signal
* handler we poll to see which sockets are ready and read the
* packets from them into the recvbuf's along with a time stamp and
* an indication of the source host and the interface it was received
* through. This allows us to get as accurate receive time stamps
* as possible independent of other processing going on.
*
* We watch the number of recvbufs available to the signal handler
* and allocate more when this number drops below the low water
* mark. If the signal handler should run out of buffers in the
* interim it will drop incoming frames, the idea being that it is
* better to drop a packet than to be inaccurate.
*/
/*
* Other statistics of possible interest
*/
volatile u_long packets_dropped; /* total number of packets dropped on reception */
volatile u_long packets_ignored; /* packets received on wild card interface */
volatile u_long packets_received; /* total number of packets received */
u_long packets_sent; /* total number of packets sent */
u_long packets_notsent; /* total number of packets which couldn't be sent */
volatile u_long handler_calls; /* number of calls to interrupt handler */
volatile u_long handler_pkts; /* number of pkts received by handler */
u_long io_timereset; /* time counters were reset */
/*
* Interface stuff
*/
2004-07-20 15:01:56 +00:00
struct interface *any_interface; /* default ipv4 interface */
struct interface *any6_interface; /* default ipv6 interface */
struct interface *loopback_interface; /* loopback ipv4 interface */
struct interface *loopback6_interface; /* loopback ipv6 interface */
struct interface inter_list[MAXINTERFACES]; /* Interface list */
int ninterfaces; /* Total number of interfaces */
int nwilds; /* Total number of wildcard intefaces */
int wildipv4 = -1; /* Index into inter_list for IPv4 wildcard */
int wildipv6 = -1; /* Index into inter_list for IPv6 wildcard */
1999-12-09 13:01:21 +00:00
#ifdef REFCLOCK
/*
* Refclock stuff. We keep a chain of structures with data concerning
* the guys we are doing I/O for.
*/
static struct refclockio *refio;
#endif /* REFCLOCK */
2004-07-20 15:01:56 +00:00
/*
* Define what the possible "soft" errors can be. These are non-fatal returns
* of various network related functions, like recv() and so on.
*
* For some reason, BSDI (and perhaps others) will sometimes return <0
* from recv() but will have errno==0. This is broken, but we have to
* work around it here.
*/
#define SOFT_ERROR(e) ((e) == EAGAIN || \
(e) == EWOULDBLOCK || \
(e) == EINTR || \
(e) == 0)
1999-12-09 13:01:21 +00:00
/*
* File descriptor masks etc. for call to select
2004-07-20 15:01:56 +00:00
* Not needed for I/O Completion Ports
1999-12-09 13:01:21 +00:00
*/
fd_set activefds;
int maxactivefd;
2004-07-20 15:01:56 +00:00
static int create_sockets P((u_short));
static SOCKET open_socket P((struct sockaddr_storage *, int, int));
static void close_socket P((SOCKET));
#ifdef REFCLOCK
static void close_file P((SOCKET));
#endif
1999-12-09 13:01:21 +00:00
static char * fdbits P((int, fd_set *));
2004-07-20 15:01:56 +00:00
static void set_reuseaddr P((int));
typedef struct vsock vsock_t;
struct vsock {
SOCKET fd;
ISC_LINK(vsock_t) link;
};
ISC_LIST(vsock_t) sockets_list;
typedef struct remaddr remaddr_t;
struct remaddr {
struct sockaddr_storage addr;
int if_index;
ISC_LINK(remaddr_t) link;
};
ISC_LIST(remaddr_t) remoteaddr_list;
void add_socket_to_list P((SOCKET));
void delete_socket_from_list P((SOCKET));
void add_addr_to_list P((struct sockaddr_storage *, int));
void delete_addr_from_list P((struct sockaddr_storage *));
int find_addr_in_list P((struct sockaddr_storage *));
int create_wildcards P((u_short));
isc_boolean_t address_okay P((isc_interface_t *));
void convert_isc_if P((isc_interface_t *, struct interface *, u_short));
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
#ifdef SYS_WINNT
/*
* Windows 2000 systems incorrectly cause UDP sockets using WASRecvFrom
* to not work correctly, returning a WSACONNRESET error when a WSASendTo
* fails with an "ICMP port unreachable" response and preventing the
* socket from using the WSARecvFrom in subsequent operations.
* The function below fixes this, but requires that Windows 2000
* Service Pack 2 or later be installed on the system. NT 4.0
* systems are not affected by this and work correctly.
* See Microsoft Knowledge Base Article Q263823 for details of this.
*/
isc_result_t
connection_reset_fix(SOCKET fd) {
DWORD dwBytesReturned = 0;
BOOL bNewBehavior = FALSE;
DWORD status;
if(isc_win32os_majorversion() < 5)
return (ISC_R_SUCCESS); /* NT 4.0 has no problem */
/* disable bad behavior using IOCTL: SIO_UDP_CONNRESET */
status = WSAIoctl(fd, SIO_UDP_CONNRESET, &bNewBehavior,
sizeof(bNewBehavior), NULL, 0,
&dwBytesReturned, NULL, NULL);
if (status != SOCKET_ERROR)
return (ISC_R_SUCCESS);
else
return (ISC_R_UNEXPECTED);
}
#endif
1999-12-09 13:01:21 +00:00
/*
* init_io - initialize I/O data structures and call socket creation routine
*/
void
init_io(void)
{
#ifdef SYS_WINNT
init_transmitbuff();
#endif /* SYS_WINNT */
/*
* Init buffer free list and stat counters
*/
init_recvbuff(RECV_INIT);
packets_dropped = packets_received = 0;
packets_ignored = 0;
packets_sent = packets_notsent = 0;
handler_calls = handler_pkts = 0;
io_timereset = 0;
2004-07-20 15:01:56 +00:00
loopback_interface = NULL;
loopback6_interface = NULL;
1999-12-09 13:01:21 +00:00
#ifdef REFCLOCK
refio = 0;
#endif
#if defined(HAVE_SIGNALED_IO)
(void) set_signal();
#endif
#ifdef SYS_WINNT
2004-07-20 15:01:56 +00:00
if (!Win32InitSockets())
1999-12-09 13:01:21 +00:00
{
2004-07-20 15:01:56 +00:00
netsyslog(LOG_ERR, "No useable winsock.dll: %m");
1999-12-09 13:01:21 +00:00
exit(1);
}
#endif /* SYS_WINNT */
2004-07-20 15:01:56 +00:00
ISC_LIST_INIT(sockets_list);
ISC_LIST_INIT(remoteaddr_list);
1999-12-09 13:01:21 +00:00
/*
* Create the sockets
*/
BLOCKIO();
(void) create_sockets(htons(NTP_PORT));
UNBLOCKIO();
#ifdef DEBUG
if (debug)
printf("init_io: maxactivefd %d\n", maxactivefd);
#endif
}
2004-07-20 15:01:56 +00:00
int
create_wildcards(u_short port) {
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
int idx = 0;
/*
* create pseudo-interface with wildcard IPv4 address
*/
inter_list[idx].sin.ss_family = AF_INET;
((struct sockaddr_in*)&inter_list[idx].sin)->sin_addr.s_addr = htonl(INADDR_ANY);
((struct sockaddr_in*)&inter_list[idx].sin)->sin_port = port;
(void) strncpy(inter_list[idx].name, "wildcard", sizeof(inter_list[idx].name));
inter_list[idx].mask.ss_family = AF_INET;
((struct sockaddr_in*)&inter_list[idx].mask)->sin_addr.s_addr = htonl(~(u_int32)0);
inter_list[idx].bfd = INVALID_SOCKET;
inter_list[idx].num_mcast = 0;
inter_list[idx].received = 0;
inter_list[idx].sent = 0;
inter_list[idx].notsent = 0;
inter_list[idx].flags = INT_BROADCAST;
any_interface = &inter_list[idx];
#if defined(MCAST)
/*
* enable possible multicast reception on the broadcast socket
*/
inter_list[idx].bcast.ss_family = AF_INET;
((struct sockaddr_in*)&inter_list[idx].bcast)->sin_port = port;
((struct sockaddr_in*)&inter_list[idx].bcast)->sin_addr.s_addr = htonl(INADDR_ANY);
#endif /* MCAST */
wildipv4 = idx;
idx++;
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
#ifdef HAVE_IPV6
1999-12-09 13:01:21 +00:00
/*
2004-07-20 15:01:56 +00:00
* create pseudo-interface with wildcard IPv6 address
1999-12-09 13:01:21 +00:00
*/
2004-07-20 15:01:56 +00:00
if (isc_net_probeipv6() == ISC_R_SUCCESS) {
inter_list[idx].sin.ss_family = AF_INET6;
((struct sockaddr_in6*)&inter_list[idx].sin)->sin6_addr = in6addr_any;
((struct sockaddr_in6*)&inter_list[idx].sin)->sin6_port = port;
(void) strncpy(inter_list[idx].name, "wildcard", sizeof(inter_list[idx].name));
inter_list[idx].mask.ss_family = AF_INET6;
memset(&((struct sockaddr_in6*)&inter_list[idx].mask)->sin6_addr.s6_addr, 0xff, sizeof(struct in6_addr));
inter_list[idx].bfd = INVALID_SOCKET;
inter_list[idx].num_mcast = 0;
inter_list[idx].received = 0;
inter_list[idx].sent = 0;
inter_list[idx].notsent = 0;
inter_list[idx].flags = 0;
any6_interface = &inter_list[idx];
wildipv6 = idx;
idx++;
1999-12-09 13:01:21 +00:00
}
2004-07-20 15:01:56 +00:00
#endif
return (idx);
}
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
isc_boolean_t
address_okay(isc_interface_t *isc_if) {
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
#ifdef DEBUG
if (debug > 2)
printf("address_okay: listen Virtual: %d, IF name: %s, Up Flag: %d\n",
listen_to_virtual_ips, isc_if->name, (isc_if->flags & INTERFACE_F_UP));
1999-12-09 13:01:21 +00:00
#endif
2004-07-20 15:01:56 +00:00
if (listen_to_virtual_ips == 0 && (strchr(isc_if->name, (int)':') != NULL))
return (ISC_FALSE);
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
/* XXXPDM This should be fixed later, but since we may not have set
* the UP flag, we at least get to use the interface.
* The UP flag is not always set so we don't do this right now.
*/
/* if ((isc_if->flags & INTERFACE_F_UP) == 0)
return (ISC_FALSE);
*/
return (ISC_TRUE);
}
void
convert_isc_if(isc_interface_t *isc_if, struct interface *itf, u_short port) {
if(isc_if->af == AF_INET) {
itf->sin.ss_family = (u_short) isc_if->af;
strcpy(itf->name, isc_if->name);
memcpy(&(((struct sockaddr_in*)&itf->sin)->sin_addr),
&(isc_if->address.type.in),
sizeof(struct in_addr));
((struct sockaddr_in*)&itf->sin)->sin_port = port;
if((isc_if->flags & INTERFACE_F_BROADCAST) != 0) {
itf->flags |= INT_BROADCAST;
itf->bcast.ss_family = itf->sin.ss_family;
memcpy(&(((struct sockaddr_in*)&itf->bcast)->sin_addr),
&(isc_if->broadcast.type.in),
sizeof(struct in_addr));
((struct sockaddr_in*)&itf->bcast)->sin_port = port;
}
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
itf->mask.ss_family = itf->sin.ss_family;
memcpy(&(((struct sockaddr_in*)&itf->mask)->sin_addr),
&(isc_if->netmask.type.in),
sizeof(struct in_addr));
((struct sockaddr_in*)&itf->mask)->sin_port = port;
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
if (((isc_if->flags & INTERFACE_F_LOOPBACK) != 0) && (loopback_interface == NULL))
{
loopback_interface = itf;
1999-12-09 13:01:21 +00:00
}
}
2004-07-20 15:01:56 +00:00
#ifdef HAVE_IPV6
else if (isc_if->af == AF_INET6) {
itf->sin.ss_family = (u_short) isc_if->af;
strcpy(itf->name, isc_if->name);
memcpy(&(((struct sockaddr_in6 *)&itf->sin)->sin6_addr),
&(isc_if->address.type.in6),
sizeof(struct in6_addr));
((struct sockaddr_in6 *)&itf->sin)->sin6_port = port;
itf->mask.ss_family = itf->sin.ss_family;
memcpy(&(((struct sockaddr_in6 *)&itf->mask)->sin6_addr),
&(isc_if->netmask.type.in6),
sizeof(struct in6_addr));
((struct sockaddr_in6 *)&itf->mask)->sin6_port = port;
if (((isc_if->flags & INTERFACE_F_LOOPBACK) != 0) && (loopback6_interface == NULL))
{
loopback6_interface = itf;
}
1999-12-09 13:01:21 +00:00
}
2004-07-20 15:01:56 +00:00
#endif /* HAVE_IPV6 */
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
/* Process the rest of the flags */
if((isc_if->flags & INTERFACE_F_UP) != 0)
itf->flags |= INT_UP;
if((isc_if->flags & INTERFACE_F_LOOPBACK) != 0)
itf->flags |= INT_LOOPBACK;
if((isc_if->flags & INTERFACE_F_POINTTOPOINT) != 0)
itf->flags |= INT_PPP;
1999-12-09 13:01:21 +00:00
}
2004-07-20 15:01:56 +00:00
/*
* create_sockets - create a socket for each interface plus a default
* socket for when we don't know where to send
*/
static int
create_sockets(
u_short port
)
{
struct sockaddr_storage resmask;
int i;
isc_mem_t *mctx = NULL;
isc_interfaceiter_t *iter = NULL;
isc_boolean_t scan_ipv4 = ISC_FALSE;
isc_boolean_t scan_ipv6 = ISC_FALSE;
isc_result_t result;
int idx = 0;
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
#ifdef DEBUG
if (debug)
printf("create_sockets(%d)\n", ntohs( (u_short) port));
#endif
if (isc_net_probeipv6() == ISC_R_SUCCESS)
scan_ipv6 = ISC_TRUE;
#ifdef HAVE_IPV6
else
netsyslog(LOG_ERR, "no IPv6 interfaces found");
#endif
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
if (isc_net_probeipv4() == ISC_R_SUCCESS)
scan_ipv4 = ISC_TRUE;
else
netsyslog(LOG_ERR, "no IPv4 interfaces found");
nwilds = create_wildcards(port);
idx = nwilds;
result = isc_interfaceiter_create(mctx, &iter);
if (result != ISC_R_SUCCESS)
return (result);
for (result = isc_interfaceiter_first(iter);
result == ISC_R_SUCCESS;
result = isc_interfaceiter_next(iter))
1999-12-09 13:01:21 +00:00
{
2004-07-20 15:01:56 +00:00
isc_interface_t isc_if;
unsigned int family;
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
result = isc_interfaceiter_current(iter, &isc_if);
if (result != ISC_R_SUCCESS)
break;
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
/* See if we have a valid family to use */
family = isc_if.address.family;
if (family != AF_INET && family != AF_INET6)
1999-12-09 13:01:21 +00:00
continue;
2004-07-20 15:01:56 +00:00
if (scan_ipv4 == ISC_FALSE && family == AF_INET)
1999-12-09 13:01:21 +00:00
continue;
2004-07-20 15:01:56 +00:00
if (scan_ipv6 == ISC_FALSE && family == AF_INET6)
1999-12-09 13:01:21 +00:00
continue;
2004-07-20 15:01:56 +00:00
/* Check to see if we are going to use the interface */
if (address_okay(&isc_if) == ISC_TRUE) {
convert_isc_if(&isc_if, &inter_list[idx], port);
inter_list[idx].fd = INVALID_SOCKET;
inter_list[idx].bfd = INVALID_SOCKET;
inter_list[idx].num_mcast = 0;
inter_list[idx].received = 0;
inter_list[idx].sent = 0;
inter_list[idx].notsent = 0;
idx++;
1999-12-09 13:01:21 +00:00
}
}
2004-07-20 15:01:56 +00:00
isc_interfaceiter_destroy(&iter);
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
ninterfaces = idx;
/*
* I/O Completion Ports don't care about the select and FD_SET
*/
#ifndef HAVE_IO_COMPLETION_PORT
1999-12-09 13:01:21 +00:00
maxactivefd = 0;
FD_ZERO(&activefds);
2004-07-20 15:01:56 +00:00
#endif
1999-12-09 13:01:21 +00:00
for (i = 0; i < ninterfaces; i++) {
2001-08-29 14:35:15 +00:00
inter_list[i].fd = open_socket(&inter_list[i].sin,
inter_list[i].flags & INT_BROADCAST, 0);
2004-07-20 15:01:56 +00:00
if (inter_list[i].bfd != INVALID_SOCKET)
msyslog(LOG_INFO, "Listening on interface %s, %s#%d",
inter_list[i].name,
stoa((&inter_list[i].sin)),
NTP_PORT);
if ((inter_list[i].flags & INT_BROADCAST) &&
inter_list[i].bfd != INVALID_SOCKET)
msyslog(LOG_INFO, "Listening on broadcast address %s#%d",
stoa((&inter_list[i].bcast)),
NTP_PORT);
#if defined (HAVE_IO_COMPLETION_PORT)
if (inter_list[i].fd != INVALID_SOCKET) {
io_completion_port_add_socket(inter_list[i].fd, &inter_list[i]);
1999-12-09 13:01:21 +00:00
}
2004-07-20 15:01:56 +00:00
#endif
1999-12-09 13:01:21 +00:00
}
/*
2004-07-20 15:01:56 +00:00
* Now that we have opened all the sockets, turn off the reuse
* flag for security.
1999-12-09 13:01:21 +00:00
*/
2004-07-20 15:01:56 +00:00
set_reuseaddr(0);
1999-12-09 13:01:21 +00:00
/*
* Blacklist all bound interface addresses
2004-07-20 15:01:56 +00:00
* Wildcard interfaces are ignored.
1999-12-09 13:01:21 +00:00
*/
2004-07-20 15:01:56 +00:00
for (i = nwilds; i < ninterfaces; i++) {
SET_HOSTMASK(&resmask, inter_list[i].sin.ss_family);
2001-08-29 14:35:15 +00:00
hack_restrict(RESTRICT_FLAGS, &inter_list[i].sin, &resmask,
RESM_NTPONLY|RESM_INTERFACE, RES_IGNORE);
2004-07-20 15:01:56 +00:00
}
/*
* Calculate the address hash for each interface address.
*/
for (i = 0; i < ninterfaces; i++) {
inter_list[i].addr_refid = addr2refid(&inter_list[i].sin);
}
1999-12-09 13:01:21 +00:00
#ifdef DEBUG
2001-08-29 14:35:15 +00:00
if (debug > 1) {
1999-12-09 13:01:21 +00:00
printf("create_sockets: ninterfaces=%d\n", ninterfaces);
for (i = 0; i < ninterfaces; i++) {
printf("interface %d: fd=%d, bfd=%d, name=%.8s, flags=0x%x\n",
i,
inter_list[i].fd,
inter_list[i].bfd,
inter_list[i].name,
inter_list[i].flags);
/* Leave these as three printf calls. */
printf(" sin=%s",
2004-07-20 15:01:56 +00:00
stoa((&inter_list[i].sin)));
1999-12-09 13:01:21 +00:00
if (inter_list[i].flags & INT_BROADCAST)
printf(" bcast=%s,",
2004-07-20 15:01:56 +00:00
stoa((&inter_list[i].bcast)));
1999-12-09 13:01:21 +00:00
printf(" mask=%s\n",
2004-07-20 15:01:56 +00:00
stoa((&inter_list[i].mask)));
1999-12-09 13:01:21 +00:00
}
}
#endif
return ninterfaces;
}
/*
* io_setbclient - open the broadcast client sockets
*/
void
io_setbclient(void)
{
int i;
2004-07-20 15:01:56 +00:00
#ifdef OPEN_BCAST_SOCKET
set_reuseaddr(1);
#endif
for (i = nwilds; i < ninterfaces; i++) {
/* Only IPv4 addresses are valid for broadcast */
if (inter_list[i].bcast.ss_family != AF_INET)
continue;
/* Is this a broadcast address? */
1999-12-09 13:01:21 +00:00
if (!(inter_list[i].flags & INT_BROADCAST))
2001-08-29 14:35:15 +00:00
continue;
2004-07-20 15:01:56 +00:00
/* Do we already have the broadcast address open? */
1999-12-09 13:01:21 +00:00
if (inter_list[i].flags & INT_BCASTOPEN)
2001-08-29 14:35:15 +00:00
continue;
1999-12-09 13:01:21 +00:00
#ifdef SYS_SOLARIS
inter_list[i].bcast.sin_addr.s_addr = htonl(INADDR_ANY);
#endif
#ifdef OPEN_BCAST_SOCKET /* Was: !SYS_DOMAINOS && !SYS_LINUX */
2001-08-29 14:35:15 +00:00
inter_list[i].bfd = open_socket(&inter_list[i].bcast,
INT_BROADCAST, 1);
2004-07-20 15:01:56 +00:00
if (inter_list[i].bfd != INVALID_SOCKET) {
inter_list[i].flags |= INT_BCASTOPEN;
#if defined (HAVE_IO_COMPLETION_PORT)
io_completion_port_add_socket(inter_list[i].bfd, &inter_list[i]);
#endif
}
#ifdef DEBUG
if (debug) {
if (inter_list[i].bfd != INVALID_SOCKET)
printf("io_setbclient: Opened broadcast client on interface %d, socket: %d\n",
i, inter_list[i].bfd);
else
printf("io_setbclient: Unable to Open broadcast client on interface %d\n",
i);
}
#endif
#endif
}
#ifdef OPEN_BCAST_SOCKET
set_reuseaddr(0);
#endif
#ifdef DEBUG
if (debug)
printf("io_setbclient: Opened broadcast clients\n");
1999-12-09 13:01:21 +00:00
#endif
2004-07-20 15:01:56 +00:00
}
/*
* set_reuseaddr() - set/clear REUSEADDR on all sockets
* NB possible hole - should we be doing this on broadcast
* fd's also?
*/
static void
set_reuseaddr(int flag) {
int i;
for (i=0; i < ninterfaces; i++) {
/*
* if inter_list[ n ].fd is -1, we might have a adapter
* configured but not present
*/
if (inter_list[i].fd != INVALID_SOCKET) {
if (setsockopt(inter_list[i].fd, SOL_SOCKET,
SO_REUSEADDR, (char *)&flag,
sizeof(flag))) {
netsyslog(LOG_ERR, "set_reuseaddr: setsockopt(SO_REUSEADDR, %s) failed: %m", flag ? "on" : "off");
}
}
1999-12-09 13:01:21 +00:00
}
}
/*
* io_multicast_add() - add multicast group address
*/
void
io_multicast_add(
2004-07-20 15:01:56 +00:00
struct sockaddr_storage addr
1999-12-09 13:01:21 +00:00
)
{
#ifdef MCAST
struct ip_mreq mreq;
int i = ninterfaces; /* Use the next interface */
2004-07-20 15:01:56 +00:00
u_int32 haddr = ntohl(((struct sockaddr_in*)&addr)->sin_addr.s_addr);
1999-12-09 13:01:21 +00:00
struct in_addr iaddr;
2004-07-20 15:01:56 +00:00
SOCKET s;
1999-12-09 13:01:21 +00:00
struct sockaddr_in *sinp;
2004-07-20 15:01:56 +00:00
#ifdef HAVE_IPV6
struct ipv6_mreq mreq6;
struct in6_addr iaddr6;
struct sockaddr_in6 *sin6p;
#endif /* HAVE_IPV6 */
switch (addr.ss_family)
{
case AF_INET :
iaddr = (((struct sockaddr_in*)&addr)->sin_addr);
if (!IN_CLASSD(haddr)) {
netsyslog(LOG_ERR,
"multicast address %s not class D",
inet_ntoa(iaddr));
2001-08-29 14:35:15 +00:00
return;
2004-07-20 15:01:56 +00:00
}
for (i = nwilds; i < ninterfaces; i++) {
/* Be sure it's the correct family */
if (inter_list[i].sin.ss_family != AF_INET)
continue;
/* Already have this address */
if (SOCKCMP(&inter_list[i].sin, &addr))
return;
/* found a free slot */
if (SOCKNUL(&inter_list[i].sin) &&
inter_list[i].fd <= 0 && inter_list[i].bfd <= 0 &&
inter_list[i].flags == 0)
break;
}
sinp = (struct sockaddr_in*)&(inter_list[i].sin);
memset((char *)&mreq, 0, sizeof(mreq));
memset((char *)&inter_list[i], 0, sizeof(struct interface));
sinp->sin_family = AF_INET;
sinp->sin_addr = iaddr;
sinp->sin_port = htons(NTP_PORT);
/*
* Try opening a socket for the specified class D address. This
* works under SunOS 4.x, but not OSF1 .. :-(
*/
set_reuseaddr(1);
s = open_socket((struct sockaddr_storage*)sinp, 0, 1);
set_reuseaddr(0);
if (s == INVALID_SOCKET) {
memset((char *)&inter_list[i], 0, sizeof(struct interface));
if (wildipv4 >= 0) {
i = wildipv4;
/* HACK ! -- stuff in an address */
inter_list[i].bcast = addr;
netsyslog(LOG_ERR,
"...multicast address %s using wildcard socket",
inet_ntoa(iaddr));
} else {
netsyslog(LOG_ERR,
"No wildcard socket available to use for address %s",
inet_ntoa(iaddr));
return;
}
} else {
inter_list[i].fd = s;
inter_list[i].bfd = INVALID_SOCKET;
(void) strncpy(inter_list[i].name, "multicast",
sizeof(inter_list[i].name));
((struct sockaddr_in*)&inter_list[i].mask)->sin_addr.s_addr = htonl(~(u_int32)0);
#if defined (HAVE_IO_COMPLETION_PORT)
io_completion_port_add_socket(inter_list[i].fd, &inter_list[i]);
#endif
}
/*
* enable reception of multicast packets
*/
mreq.imr_multiaddr = iaddr;
mreq.imr_interface.s_addr = htonl(INADDR_ANY);
if (setsockopt(inter_list[i].fd, IPPROTO_IP, IP_ADD_MEMBERSHIP,
(char *)&mreq, sizeof(mreq)) == -1)
netsyslog(LOG_ERR,
"setsockopt IP_ADD_MEMBERSHIP fails: %m for %x / %x (%s)",
mreq.imr_multiaddr.s_addr,
mreq.imr_interface.s_addr, inet_ntoa(iaddr));
inter_list[i].flags |= INT_MULTICAST;
inter_list[i].num_mcast++;
if (i >= ninterfaces)
ninterfaces = i+1;
add_addr_to_list(&addr, i);
2001-08-29 14:35:15 +00:00
break;
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
#ifdef HAVE_IPV6
case AF_INET6 :
iaddr6 = ((struct sockaddr_in6*)&addr)->sin6_addr;
if (!IN6_IS_ADDR_MULTICAST(&iaddr6)) {
netsyslog(LOG_ERR,
"address %s not IPv6 multicast address",
stoa(&addr));
return;
}
for (i = nwilds; i < ninterfaces; i++) {
/* Be sure it's the correct family */
if(inter_list[i].sin.ss_family != AF_INET6)
continue;
/* Already have this address */
if (SOCKCMP(&inter_list[i].sin, &addr))
return;
/* found a free slot */
if (SOCKNUL(&inter_list[i].sin) &&
inter_list[i].fd <= 0 && inter_list[i].bfd <= 0 &&
inter_list[i].flags == 0)
break;
}
sin6p = (struct sockaddr_in6*)&inter_list[i].sin;
memset((char *)&mreq6, 0, sizeof(mreq6));
memset((char *)&inter_list[i], 0, sizeof(struct interface));
sin6p->sin6_family = AF_INET6;
sin6p->sin6_addr = iaddr6;
sin6p->sin6_port = htons(NTP_PORT);
/*
* Try opening a socket for the specified class D address. This
* works under SunOS 4.x, but not OSF1 .. :-(
*/
set_reuseaddr(1);
s = open_socket((struct sockaddr_storage*)sin6p, 0, 1);
set_reuseaddr(0);
if(s == INVALID_SOCKET){
memset((char *)&inter_list[i], 0, sizeof(struct interface));
if (wildipv6 >= 0) {
i = wildipv6;
/* HACK ! -- stuff in an address */
inter_list[i].bcast = addr;
netsyslog(LOG_ERR,
"...multicast address %s using wildcard socket",
stoa(&addr));
} else {
netsyslog(LOG_ERR,
"No wildcard socket available to use for address %s",
stoa(&addr));
return;
}
} else {
inter_list[i].fd = s;
inter_list[i].bfd = INVALID_SOCKET;
(void)strncpy(inter_list[i].name, "multicast",
sizeof(inter_list[i].name));
memset(&(((struct sockaddr_in6*)&inter_list[i].mask)->sin6_addr), 1, sizeof(struct in6_addr));
#if defined (HAVE_IO_COMPLETION_PORT)
io_completion_port_add_socket(inter_list[i].fd, &inter_list[i]);
#endif
}
/*
* enable reception of multicast packets
*/
mreq6.ipv6mr_multiaddr = iaddr6;
mreq6.ipv6mr_interface = 0;
if(setsockopt(inter_list[i].fd, IPPROTO_IPV6, IPV6_JOIN_GROUP,
(char *)&mreq6, sizeof(mreq6)) == -1)
netsyslog(LOG_ERR,
"setsockopt IPV6_JOIN_GROUP fails: %m on interface %d(%s)",
mreq6.ipv6mr_interface, stoa(&addr));
inter_list[i].flags |= INT_MULTICAST;
inter_list[i].num_mcast++;
if(i >= ninterfaces)
ninterfaces = i+1;
add_addr_to_list(&addr, i);
break;
#endif /* HAVE_IPV6 */
1999-12-09 13:01:21 +00:00
}
2004-07-20 15:01:56 +00:00
#ifdef DEBUG
if (debug)
printf("io_multicast_add %s\n", stoa(&addr));
#endif
1999-12-09 13:01:21 +00:00
#else /* MCAST */
2004-07-20 15:01:56 +00:00
netsyslog(LOG_ERR,
2001-08-29 14:35:15 +00:00
"cannot add multicast address %s as no MCAST support",
2004-07-20 15:01:56 +00:00
stoa(&addr));
1999-12-09 13:01:21 +00:00
#endif /* MCAST */
}
/*
* io_unsetbclient - close the broadcast client sockets
*/
void
io_unsetbclient(void)
{
int i;
2004-07-20 15:01:56 +00:00
for (i = nwilds; i < ninterfaces; i++)
1999-12-09 13:01:21 +00:00
{
if (!(inter_list[i].flags & INT_BCASTOPEN))
continue;
close_socket(inter_list[i].bfd);
2004-07-20 15:01:56 +00:00
inter_list[i].bfd = INVALID_SOCKET;
1999-12-09 13:01:21 +00:00
inter_list[i].flags &= ~INT_BCASTOPEN;
}
}
/*
* io_multicast_del() - delete multicast group address
*/
void
io_multicast_del(
2004-07-20 15:01:56 +00:00
struct sockaddr_storage addr
1999-12-09 13:01:21 +00:00
)
{
#ifdef MCAST
int i;
struct ip_mreq mreq;
2004-07-20 15:01:56 +00:00
u_int32 haddr;
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
#ifdef HAVE_IPV6
struct ipv6_mreq mreq6;
struct in6_addr haddr6;
#endif /* HAVE_IPV6 */
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
switch (addr.ss_family)
1999-12-09 13:01:21 +00:00
{
2004-07-20 15:01:56 +00:00
case AF_INET :
haddr = ntohl(((struct sockaddr_in*)&addr)->sin_addr.s_addr);
if (!IN_CLASSD(haddr))
1999-12-09 13:01:21 +00:00
{
2004-07-20 15:01:56 +00:00
netsyslog(LOG_ERR,
"invalid multicast address %s", stoa(&addr));
return;
1999-12-09 13:01:21 +00:00
}
2004-07-20 15:01:56 +00:00
/*
* Disable reception of multicast packets
*/
mreq.imr_multiaddr = ((struct sockaddr_in*)&addr)->sin_addr;
mreq.imr_interface.s_addr = htonl(INADDR_ANY);
for (i = 0; i < ninterfaces; i++)
1999-12-09 13:01:21 +00:00
{
2004-07-20 15:01:56 +00:00
/* Be sure it's the correct family */
if (inter_list[i].sin.ss_family != AF_INET)
continue;
if (!(inter_list[i].flags & INT_MULTICAST))
continue;
if (!(inter_list[i].fd < 0))
continue;
if (!SOCKCMP(&addr, &inter_list[i].sin))
continue;
if (i != wildipv4)
{
/* we have an explicit fd, so we can close it */
close_socket(inter_list[i].fd);
memset((char *)&inter_list[i], 0, sizeof(struct interface));
inter_list[i].fd = INVALID_SOCKET;
inter_list[i].bfd = INVALID_SOCKET;
}
else
{
/* We are sharing "any address" port :-( Don't close it! */
if (setsockopt(inter_list[i].fd, IPPROTO_IP, IP_DROP_MEMBERSHIP,
(char *)&mreq, sizeof(mreq)) == -1)
netsyslog(LOG_ERR, "setsockopt IP_DROP_MEMBERSHIP fails on address: %s %m",
stoa(&addr));
inter_list[i].num_mcast--;
/* If there are none left negate the Multicast flag */
if(inter_list[i].num_mcast == 0)
inter_list[i].flags &= ~INT_MULTICAST;
}
1999-12-09 13:01:21 +00:00
}
2004-07-20 15:01:56 +00:00
break;
#ifdef HAVE_IPV6
case AF_INET6 :
haddr6 = ((struct sockaddr_in6*)&addr)->sin6_addr;
if (!IN6_IS_ADDR_MULTICAST(&haddr6))
{
netsyslog(LOG_ERR,
"invalid multicast address %s", stoa(&addr));
return;
}
/*
* Disable reception of multicast packets
*/
mreq6.ipv6mr_multiaddr = ((struct sockaddr_in6*)&addr)->sin6_addr;
mreq6.ipv6mr_interface = 0;
for (i = 0; i < ninterfaces; i++)
{
/* Be sure it's the correct family */
if (inter_list[i].sin.ss_family != AF_INET6)
continue;
if (!(inter_list[i].flags & INT_MULTICAST))
continue;
if (!(inter_list[i].fd < 0))
continue;
if (!SOCKCMP(&addr, &inter_list[i].sin))
continue;
if (i != wildipv6)
{
/* we have an explicit fd, so we can close it */
close_socket(inter_list[i].fd);
memset((char *)&inter_list[i], 0, sizeof(struct interface));
inter_list[i].fd = INVALID_SOCKET;
inter_list[i].bfd = INVALID_SOCKET;
}
else
{
/* We are sharing "any address" port :-( Don't close it! */
if (setsockopt(inter_list[i].fd, IPPROTO_IPV6, IPV6_LEAVE_GROUP,
(char *)&mreq6, sizeof(mreq6)) == -1)
netsyslog(LOG_ERR, "setsockopt IP_DROP_MEMBERSHIP fails on address %s: %m",
stoa(&addr));
/* If there are none left negate the Multicast flag */
if(inter_list[i].num_mcast == 0)
inter_list[i].flags &= ~INT_MULTICAST;
}
}
break;
#endif /* HAVE_IPV6 */
}/* switch */
delete_addr_from_list(&addr);
1999-12-09 13:01:21 +00:00
#else /* not MCAST */
2004-07-20 15:01:56 +00:00
netsyslog(LOG_ERR, "this function requires multicast kernel");
1999-12-09 13:01:21 +00:00
#endif /* not MCAST */
}
/*
* open_socket - open a socket, returning the file descriptor
*/
2004-07-20 15:01:56 +00:00
static SOCKET
1999-12-09 13:01:21 +00:00
open_socket(
2004-07-20 15:01:56 +00:00
struct sockaddr_storage *addr,
1999-12-09 13:01:21 +00:00
int flags,
int turn_off_reuse
)
{
2004-07-20 15:01:56 +00:00
int errval;
SOCKET fd;
1999-12-09 13:01:21 +00:00
int on = 1, off = 0;
2001-08-29 14:35:15 +00:00
#if defined(IPTOS_LOWDELAY) && defined(IPPROTO_IP) && defined(IP_TOS)
int tos;
#endif /* IPTOS_LOWDELAY && IPPROTO_IP && IP_TOS */
1999-12-09 13:01:21 +00:00
2004-07-20 15:01:56 +00:00
if ((addr->ss_family == AF_INET6) && (isc_net_probeipv6() != ISC_R_SUCCESS))
return (INVALID_SOCKET);
1999-12-09 13:01:21 +00:00
/* create a datagram (UDP) socket */
#ifndef SYS_WINNT
2004-07-20 15:01:56 +00:00
if ( (fd = socket(addr->ss_family, SOCK_DGRAM, 0)) < 0) {
errval = errno;
if(addr->ss_family == AF_INET)
netsyslog(LOG_ERR, "socket(AF_INET, SOCK_DGRAM, 0) failed on address %s: %m",
stoa(addr));
else if(addr->ss_family == AF_INET6)
netsyslog(LOG_ERR, "socket(AF_INET6, SOCK_DGRAM, 0) failed on address %s: %m",
stoa(addr));
if (errval == EPROTONOSUPPORT || errval == EAFNOSUPPORT ||
errval == EPFNOSUPPORT)
return (INVALID_SOCKET);
exit(1);
/*NOTREACHED*/
}
1999-12-09 13:01:21 +00:00
#else
2004-07-20 15:01:56 +00:00
if ( (fd = socket(addr->ss_family, SOCK_DGRAM, 0)) == INVALID_SOCKET) {
errval = WSAGetLastError();
if(addr->ss_family == AF_INET)
netsyslog(LOG_ERR, "socket(AF_INET, SOCK_DGRAM, 0) failed on address %s: %m",
stoa(addr));
else if(addr->ss_family == AF_INET6)
netsyslog(LOG_ERR, "socket(AF_INET6, SOCK_DGRAM, 0) failed on address %s: %m",
stoa(addr));
if (errval == WSAEPROTONOSUPPORT || errval == WSAEAFNOSUPPORT ||
errval == WSAEPFNOSUPPORT)
return (INVALID_SOCKET);
1999-12-09 13:01:21 +00:00
exit(1);
/*NOTREACHED*/
}
2004-07-20 15:01:56 +00:00
if (connection_reset_fix(fd) != ISC_R_SUCCESS) {
netsyslog(LOG_ERR, "connection_reset_fix(fd) failed on address %s: %m",
stoa(addr));
}
#endif /* SYS_WINNT */
1999-12-09 13:01:21 +00:00
/* set SO_REUSEADDR since we will be binding the same port
number on each interface */
if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR,
(char *)&on, sizeof(on)))
{
2004-07-20 15:01:56 +00:00
netsyslog(LOG_ERR, "setsockopt SO_REUSEADDR on fails on address %s: %m",
stoa(addr));
1999-12-09 13:01:21 +00:00
}
2000-01-28 14:55:50 +00:00
#if defined(IPTOS_LOWDELAY) && defined(IPPROTO_IP) && defined(IP_TOS)
/* set IP_TOS to minimize packet delay */
tos = IPTOS_LOWDELAY;
2004-07-20 15:01:56 +00:00
if (addr->ss_family == AF_INET)
if (setsockopt(fd, IPPROTO_IP, IP_TOS, (char *) &tos, sizeof(tos)) < 0)
{
netsyslog(LOG_ERR, "setsockopt IPTOS_LOWDELAY on fails on address %s: %m",
stoa(addr));
}
#if defined(IPV6_V6ONLY)
if (addr->ss_family == AF_INET6)
if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY,
(char*)&on, sizeof(on)))
{
netsyslog(LOG_ERR, "setsockopt IPV6_V6ONLY on fails on address %s: %m",
stoa(addr));
}
#else /* IPV6_V6ONLY */
#if defined(IPV6_BINDV6ONLY)
if (addr->ss_family == AF_INET6)
if (setsockopt(fd, IPPROTO_IPV6, IPV6_BINDV6ONLY,
(char*)&on, sizeof(on)))
{
netsyslog(LOG_ERR,
"setsockopt IPV6_BINDV6ONLY on fails on address %s: %m",
stoa(addr));
}
#endif /* IPV6_BINDV6ONLY */
#endif /* IPV6_V6ONLY */
2000-01-28 14:55:50 +00:00
#endif /* IPTOS_LOWDELAY && IPPROTO_IP && IP_TOS */
1999-12-09 13:01:21 +00:00
/*
* bind the local address.
*/
2004-07-20 15:01:56 +00:00
if (bind(fd, (struct sockaddr *)addr, SOCKLEN(addr)) < 0) {
1999-12-09 13:01:21 +00:00
char buff[160];
2004-07-20 15:01:56 +00:00
if(addr->ss_family == AF_INET)
sprintf(buff,
"bind() fd %d, family %d, port %d, addr %s, in_classd=%d flags=%d fails: %%m",
fd, addr->ss_family, (int)ntohs(((struct sockaddr_in*)addr)->sin_port),
stoa(addr),
IN_CLASSD(ntohl(((struct sockaddr_in*)addr)->sin_addr.s_addr)), flags);
else if(addr->ss_family == AF_INET6)
sprintf(buff,
"bind() fd %d, family %d, port %d, addr %s, in6_is_addr_multicast=%d flags=%d fails: %%m",
fd, addr->ss_family, (int)ntohs(((struct sockaddr_in6*)addr)->sin6_port),
stoa(addr),
IN6_IS_ADDR_MULTICAST(&((struct sockaddr_in6*)addr)->sin6_addr), flags);
else return INVALID_SOCKET;
netsyslog(LOG_ERR, buff);
1999-12-09 13:01:21 +00:00
closesocket(fd);
/*
2004-07-20 15:01:56 +00:00
* soft fail if opening a multicast address
1999-12-09 13:01:21 +00:00
*/
2004-07-20 15:01:56 +00:00
if(addr->ss_family == AF_INET){
if(IN_CLASSD(ntohl(((struct sockaddr_in*)addr)->sin_addr.s_addr)))
return (INVALID_SOCKET);
}
else {
if(IN6_IS_ADDR_MULTICAST(&((struct sockaddr_in6*)addr)->sin6_addr))
return (INVALID_SOCKET);
}
1999-12-09 13:01:21 +00:00
#if 0
exit(1);
#else
2004-07-20 15:01:56 +00:00
return INVALID_SOCKET;
1999-12-09 13:01:21 +00:00
#endif
}
#ifdef DEBUG
if (debug)
printf("bind() fd %d, family %d, port %d, addr %s, flags=%d\n",
fd,
2004-07-20 15:01:56 +00:00
addr->ss_family,
(int)ntohs(((struct sockaddr_in*)addr)->sin_port),
stoa(addr),
1999-12-09 13:01:21 +00:00
flags);
#endif
2004-07-20 15:01:56 +00:00
/*
* I/O Completion Ports don't care about the select and FD_SET
*/
#ifndef HAVE_IO_COMPLETION_PORT
1999-12-09 13:01:21 +00:00
if (fd > maxactivefd)
maxactivefd = fd;
FD_SET(fd, &activefds);
2004-07-20 15:01:56 +00:00
#endif
add_socket_to_list(fd);
1999-12-09 13:01:21 +00:00
/*
* set non-blocking,
*/
#ifdef USE_FIONBIO
/* in vxWorks we use FIONBIO, but the others are defined for old systems, so
* all hell breaks loose if we leave them defined
*/
#undef O_NONBLOCK
#undef FNDELAY
#undef O_NDELAY
#endif
#if defined(O_NONBLOCK) /* POSIX */
if (fcntl(fd, F_SETFL, O_NONBLOCK) < 0)
{
2004-07-20 15:01:56 +00:00
netsyslog(LOG_ERR, "fcntl(O_NONBLOCK) fails on address %s: %m",
stoa(addr));
1999-12-09 13:01:21 +00:00
exit(1);
/*NOTREACHED*/
}
#elif defined(FNDELAY)
if (fcntl(fd, F_SETFL, FNDELAY) < 0)
{
2004-07-20 15:01:56 +00:00
netsyslog(LOG_ERR, "fcntl(FNDELAY) fails on address %s: %m",
stoa(addr));
1999-12-09 13:01:21 +00:00
exit(1);
/*NOTREACHED*/
}
#elif defined(O_NDELAY) /* generally the same as FNDELAY */
if (fcntl(fd, F_SETFL, O_NDELAY) < 0)
{
2004-07-20 15:01:56 +00:00
netsyslog(LOG_ERR, "fcntl(O_NDELAY) fails on address %s: %m",
stoa(addr));
1999-12-09 13:01:21 +00:00
exit(1);
/*NOTREACHED*/
}
#elif defined(FIONBIO)
# if defined(VMS)
2004-07-20 15:01:56 +00:00
if (ioctl(fd,FIONBIO,&on) < 0)
1999-12-09 13:01:21 +00:00
# elif defined(SYS_WINNT)
2004-07-20 15:01:56 +00:00
if (ioctlsocket(fd,FIONBIO,(u_long *) &on) == SOCKET_ERROR)
1999-12-09 13:01:21 +00:00
# else
2004-07-20 15:01:56 +00:00
if (ioctl(fd,FIONBIO,&on) < 0)
1999-12-09 13:01:21 +00:00
# endif
{
2004-07-20 15:01:56 +00:00
netsyslog(LOG_ERR, "ioctl(FIONBIO) fails on address %s: %m",
stoa(addr));
1999-12-09 13:01:21 +00:00
exit(1);
/*NOTREACHED*/
}
#elif defined(FIOSNBIO)
if (ioctl(fd,FIOSNBIO,&on) < 0)
{
2004-07-20 15:01:56 +00:00
netsyslog(LOG_ERR, "ioctl(FIOSNBIO) fails on address %s: %m",
stoa(addr));
1999-12-09 13:01:21 +00:00
exit(1);
/*NOTREACHED*/
}
#else
# include "Bletch: Need non-blocking I/O!"
#endif
#ifdef HAVE_SIGNALED_IO
init_socket_sig(fd);
#endif /* not HAVE_SIGNALED_IO */
/*
* Turn off the SO_REUSEADDR socket option. It apparently
* causes heartburn on systems with multicast IP installed.
* On normal systems it only gets looked at when the address
* is being bound anyway..
*/
if (turn_off_reuse)
if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR,
(char *)&off, sizeof(off)))
{
2004-07-20 15:01:56 +00:00
netsyslog(LOG_ERR, "setsockopt SO_REUSEADDR off fails on address %s: %m",
stoa(addr));
1999-12-09 13:01:21 +00:00
}
#ifdef SO_BROADCAST
/* if this interface can support broadcast, set SO_BROADCAST */
if (flags & INT_BROADCAST)
{
if (setsockopt(fd, SOL_SOCKET, SO_BROADCAST,
(char *)&on, sizeof(on)))
{
2004-07-20 15:01:56 +00:00
netsyslog(LOG_ERR, "setsockopt(SO_BROADCAST) on address %s: %m",
stoa(addr));
1999-12-09 13:01:21 +00:00
}
}
#endif /* SO_BROADCAST */
#if !defined(SYS_WINNT) && !defined(VMS)
# ifdef DEBUG
if (debug > 1)
printf("flags for fd %d: 0%o\n", fd,
fcntl(fd, F_GETFL, 0));
# endif
#endif /* SYS_WINNT || VMS */
return fd;
}
/*
* close_socket - close a socket and remove from the activefd list
*/
static void
close_socket(
2004-07-20 15:01:56 +00:00
SOCKET fd
1999-12-09 13:01:21 +00:00
)
{
2004-07-20 15:01:56 +00:00
SOCKET i, newmax;
1999-12-09 13:01:21 +00:00
(void) closesocket(fd);
2004-07-20 15:01:56 +00:00
/*
* I/O Completion Ports don't care about select and fd_set
*/
#ifndef HAVE_IO_COMPLETION_PORT
1999-12-09 13:01:21 +00:00
FD_CLR( (u_int) fd, &activefds);
2004-07-20 15:01:56 +00:00
if (fd == maxactivefd) {
1999-12-09 13:01:21 +00:00
newmax = 0;
for (i = 0; i < maxactivefd; i++)
2001-08-29 14:35:15 +00:00
if (FD_ISSET(i, &activefds))
newmax = i;
1999-12-09 13:01:21 +00:00
maxactivefd = newmax;
}
2004-07-20 15:01:56 +00:00
#endif
delete_socket_from_list(fd);
1999-12-09 13:01:21 +00:00
}
/*
* close_file - close a file and remove from the activefd list
* added 1/31/1997 Greg Schueman for Windows NT portability
*/
2004-07-20 15:01:56 +00:00
#ifdef REFCLOCK
1999-12-09 13:01:21 +00:00
static void
close_file(
2004-07-20 15:01:56 +00:00
SOCKET fd
1999-12-09 13:01:21 +00:00
)
{
int i, newmax;
(void) close(fd);
2004-07-20 15:01:56 +00:00
/*
* I/O Completion Ports don't care about select and fd_set
*/
#ifndef HAVE_IO_COMPLETION_PORT
1999-12-09 13:01:21 +00:00
FD_CLR( (u_int) fd, &activefds);
2004-07-20 15:01:56 +00:00
if (fd == maxactivefd) {
1999-12-09 13:01:21 +00:00
newmax = 0;
for (i = 0; i < maxactivefd; i++)
2001-08-29 14:35:15 +00:00
if (FD_ISSET(i, &activefds))
newmax = i;
1999-12-09 13:01:21 +00:00
maxactivefd = newmax;
}
2004-07-20 15:01:56 +00:00
#endif
delete_socket_from_list(fd);
1999-12-09 13:01:21 +00:00
}
2004-07-20 15:01:56 +00:00
#endif
1999-12-09 13:01:21 +00:00
/* XXX ELIMINATE sendpkt similar in ntpq.c, ntpdc.c, ntp_io.c, ntptrace.c */
/*
* sendpkt - send a packet to the specified destination. Maintain a
* send error cache so that only the first consecutive error for a
* destination is logged.
*/
void
sendpkt(
2004-07-20 15:01:56 +00:00
struct sockaddr_storage *dest,
1999-12-09 13:01:21 +00:00
struct interface *inter,
int ttl,
struct pkt *pkt,
int len
)
{
int cc, slot;
#ifdef SYS_WINNT
DWORD err;
#endif /* SYS_WINNT */
/*
2004-07-20 15:01:56 +00:00
* Send error caches. Empty slots have port == 0
1999-12-09 13:01:21 +00:00
* Set ERRORCACHESIZE to 0 to disable
*/
struct cache {
u_short port;
struct in_addr addr;
};
2004-07-20 15:01:56 +00:00
#ifdef HAVE_IPV6
struct cache6 {
u_short port;
struct in6_addr addr;
};
#endif /* HAVE_IPV6 */
1999-12-09 13:01:21 +00:00
#ifndef ERRORCACHESIZE
#define ERRORCACHESIZE 8
#endif
#if ERRORCACHESIZE > 0
static struct cache badaddrs[ERRORCACHESIZE];
2004-07-20 15:01:56 +00:00
#ifdef HAVE_IPV6
static struct cache6 badaddrs6[ERRORCACHESIZE];
#endif /* HAVE_IPV6 */
1999-12-09 13:01:21 +00:00
#else
#define badaddrs ((struct cache *)0) /* Only used in empty loops! */
2004-07-20 15:01:56 +00:00
#ifdef HAVE_IPV6
#define badaddrs6 ((struct cache6 *)0) /* Only used in empty loops! */
#endif /* HAVE_IPV6 */
1999-12-09 13:01:21 +00:00
#endif
#ifdef DEBUG
if (debug > 1)
printf("%ssendpkt(fd=%d dst=%s, src=%s, ttl=%d, len=%d)\n",
(ttl >= 0) ? "\tMCAST\t*****" : "",
2004-07-20 15:01:56 +00:00
inter->fd, stoa(dest),
stoa(&inter->sin), ttl, len);
1999-12-09 13:01:21 +00:00
#endif
#ifdef MCAST
2004-07-20 15:01:56 +00:00
switch (inter->sin.ss_family) {
case AF_INET :
1999-12-09 13:01:21 +00:00
2001-08-29 14:35:15 +00:00
/*
2004-07-20 15:01:56 +00:00
* for the moment we use the bcast option to set multicast ttl
*/
if (ttl > 0 && ttl != inter->last_ttl) {
/*
* set the multicast ttl for outgoing packets
*/
if (setsockopt(inter->fd, IPPROTO_IP, IP_MULTICAST_TTL,
(char *) &ttl, sizeof(ttl)) != 0) {
netsyslog(LOG_ERR, "setsockopt IP_MULTICAST_TTL fails on address %s: %m",
stoa(&inter->sin));
}
else
inter->last_ttl = ttl;
}
break;
#ifdef HAVE_IPV6
case AF_INET6 :
/*
* for the moment we use the bcast option to set
* multicast max hops
2001-08-29 14:35:15 +00:00
*/
2004-07-20 15:01:56 +00:00
if (ttl > 0 && ttl != inter->last_ttl) {
/*
* set the multicast ttl for outgoing packets
*/
if (setsockopt(inter->fd, IPPROTO_IPV6, IPV6_MULTICAST_HOPS,
&ttl, sizeof(ttl)) == -1)
netsyslog(LOG_ERR, "setsockopt IP_MULTICAST_TTL fails on address %s: %m",
stoa(&inter->sin));
else
inter->last_ttl = ttl;
}
break;
#endif /* HAVE_IPV6 */
default :
exit(1);
1999-12-09 13:01:21 +00:00
}
2004-07-20 15:01:56 +00:00
1999-12-09 13:01:21 +00:00
#endif /* MCAST */
for (slot = ERRORCACHESIZE; --slot >= 0; )
2004-07-20 15:01:56 +00:00
if(dest->ss_family == AF_INET) {
if (badaddrs[slot].port == ((struct sockaddr_in*)dest)->sin_port &&
badaddrs[slot].addr.s_addr == ((struct sockaddr_in*)dest)->sin_addr.s_addr)
break;
}
#ifdef HAVE_IPV6
else if (dest->ss_family == AF_INET6) {
if (badaddrs6[slot].port == ((struct sockaddr_in6*)dest)->sin6_port &&
badaddrs6[slot].addr.s6_addr == ((struct sockaddr_in6*)dest)->sin6_addr.s6_addr)
break;
}
#endif /* HAVE_IPV6 */
else exit(1); /* address family not supported yet */
1999-12-09 13:01:21 +00:00
#if defined(HAVE_IO_COMPLETION_PORT)
err = io_completion_port_sendto(inter, pkt, len, dest);
if (err != ERROR_SUCCESS)
#else
2004-07-20 15:01:56 +00:00
#ifdef SIM
cc = srvr_rply(&ntp_node, dest, inter, pkt);
#else /* SIM */
cc = sendto(inter->fd, (char *)pkt, (unsigned int)len, 0, (struct sockaddr *)dest,
SOCKLEN(dest));
#endif /* SIM */
1999-12-09 13:01:21 +00:00
if (cc == -1)
#endif
{
inter->notsent++;
packets_notsent++;
#if defined(HAVE_IO_COMPLETION_PORT)
2004-07-20 15:01:56 +00:00
err = WSAGetLastError();
1999-12-09 13:01:21 +00:00
if (err != WSAEWOULDBLOCK && err != WSAENOBUFS && slot < 0)
#else
if (errno != EWOULDBLOCK && errno != ENOBUFS && slot < 0)
#endif
{
/*
* Remember this, if there's an empty slot
*/
2004-07-20 15:01:56 +00:00
switch (dest->ss_family) {
case AF_INET :
for (slot = ERRORCACHESIZE; --slot >= 0; )
if (badaddrs[slot].port == 0)
{
badaddrs[slot].port = SRCPORT(dest);
badaddrs[slot].addr = ((struct sockaddr_in*)dest)->sin_addr;
break;
}
break;
#ifdef HAVE_IPV6
case AF_INET6 :
for (slot = ERRORCACHESIZE; --slot >= 0; )
if (badaddrs6[slot].port == 0)
{
badaddrs6[slot].port = SRCPORT(dest);
badaddrs6[slot].addr = ((struct sockaddr_in6*)dest)->sin6_addr;
break;
}
break;
#endif /* HAVE_IPV6 */
default :
exit(1);
}
netsyslog(LOG_ERR, "sendto(%s): %m", stoa(dest));
1999-12-09 13:01:21 +00:00
}
}
else
{
inter->sent++;
packets_sent++;
/*
* He's not bad any more
*/
if (slot >= 0)
{
2004-07-20 15:01:56 +00:00
netsyslog(LOG_INFO, "Connection re-established to %s", stoa(dest));
switch (dest->ss_family) {
case AF_INET :
badaddrs[slot].port = 0;
break;
#ifdef HAVE_IPV6
case AF_INET6 :
badaddrs6[slot].port = 0;
break;
#endif /* HAVE_IPV6 */
}
1999-12-09 13:01:21 +00:00
}
}
}
#if !defined(HAVE_IO_COMPLETION_PORT)
/*
* fdbits - generate ascii representation of fd_set (FAU debug support)
* HFDF format - highest fd first.
*/
static char *
fdbits(
int count,
fd_set *set
)
{
static char buffer[256];
char * buf = buffer;
count = (count < 256) ? count : 255;
while (count >= 0)
{
*buf++ = FD_ISSET(count, set) ? '#' : '-';
count--;
}
*buf = '\0';
return buffer;
}
/*
* input_handler - receive packets asynchronously
*/
2002-10-29 19:58:12 +00:00
void
1999-12-09 13:01:21 +00:00
input_handler(
l_fp *cts
)
{
register int i, n;
register struct recvbuf *rb;
register int doing;
2004-07-20 15:01:56 +00:00
register SOCKET fd;
1999-12-09 13:01:21 +00:00
struct timeval tvzero;
int fromlen;
l_fp ts; /* Timestamp at BOselect() gob */
l_fp ts_e; /* Timestamp at EOselect() gob */
fd_set fds;
int select_count = 0;
static int handler_count = 0;
++handler_count;
if (handler_count != 1)
msyslog(LOG_ERR, "input_handler: handler_count is %d!", handler_count);
handler_calls++;
ts = *cts;
for (;;)
{
/*
* Do a poll to see who has data
*/
fds = activefds;
tvzero.tv_sec = tvzero.tv_usec = 0;
/*
* If we have something to do, freeze a timestamp.
* See below for the other cases (nothing (left) to do or error)
*/
while (0 < (n = select(maxactivefd+1, &fds, (fd_set *)0, (fd_set *)0, &tvzero)))
{
++select_count;
++handler_pkts;
#ifdef REFCLOCK
/*
* Check out the reference clocks first, if any
*/
if (refio != 0)
{
register struct refclockio *rp;
for (rp = refio; rp != 0 && n > 0; rp = rp->next)
{
fd = rp->fd;
if (FD_ISSET(fd, &fds))
{
n--;
if (free_recvbuffs() == 0)
{
char buf[RX_BUFF_SIZE];
(void) read(fd, buf, sizeof buf);
packets_dropped++;
goto select_again;
}
rb = get_free_recv_buffer();
i = (rp->datalen == 0
|| rp->datalen > sizeof(rb->recv_space))
? sizeof(rb->recv_space) : rp->datalen;
rb->recv_length =
2000-01-28 14:55:50 +00:00
read(fd, (char *)&rb->recv_space, (unsigned)i);
1999-12-09 13:01:21 +00:00
if (rb->recv_length == -1)
{
2004-07-20 15:01:56 +00:00
netsyslog(LOG_ERR, "clock read fd %d: %m", fd);
1999-12-09 13:01:21 +00:00
freerecvbuf(rb);
goto select_again;
}
/*
2004-07-20 15:01:56 +00:00
* Got one. Mark how
* and when it got here,
* put it on the full
* list and do
* bookkeeping.
1999-12-09 13:01:21 +00:00
*/
rb->recv_srcclock = rp->srcclock;
rb->dstadr = 0;
rb->fd = fd;
rb->recv_time = ts;
rb->receiver = rp->clock_recv;
if (rp->io_input)
{
/*
2004-07-20 15:01:56 +00:00
* have direct
* input routine
* for refclocks
1999-12-09 13:01:21 +00:00
*/
if (rp->io_input(rb) == 0)
{
/*
2004-07-20 15:01:56 +00:00
* data
* was
* consumed
* -
* nothing
* to
* pass
* up
* into
* block
* input
* machine
1999-12-09 13:01:21 +00:00
*/
freerecvbuf(rb);
#if 1
goto select_again;
#else
continue;
#endif
}
}
add_full_recv_buffer(rb);
rp->recvcount++;
packets_received++;
}
}
}
#endif /* REFCLOCK */
/*
2004-07-20 15:01:56 +00:00
* Loop through the interfaces looking for data
* to read.
1999-12-09 13:01:21 +00:00
*/
for (i = ninterfaces - 1; (i >= 0) && (n > 0); i--)
{
for (doing = 0; (doing < 2) && (n > 0); doing++)
{
if (doing == 0)
{
fd = inter_list[i].fd;
}
else
{
if (!(inter_list[i].flags & INT_BCASTOPEN))
break;
fd = inter_list[i].bfd;
}
if (fd < 0) continue;
if (FD_ISSET(fd, &fds))
{
n--;
/*
2004-07-20 15:01:56 +00:00
* Get a buffer and read
* the frame. If we
* haven't got a buffer,
* or this is received
* on the wild card
* socket, just dump the
1999-12-09 13:01:21 +00:00
* packet.
*/
if (
#ifdef UDP_WILDCARD_DELIVERY
/*
* these guys manage to put properly addressed
* packets into the wildcard queue
*/
(free_recvbuffs() == 0)
#else
2004-07-20 15:01:56 +00:00
((i == wildipv4) || (i == wildipv6)||
(free_recvbuffs() == 0))
1999-12-09 13:01:21 +00:00
#endif
)
{
char buf[RX_BUFF_SIZE];
2004-07-20 15:01:56 +00:00
struct sockaddr_storage from;
1999-12-09 13:01:21 +00:00
fromlen = sizeof from;
2004-07-20 15:01:56 +00:00
(void) recvfrom(fd, buf, sizeof(buf), 0, (struct sockaddr*)&from, &fromlen);
1999-12-09 13:01:21 +00:00
#ifdef DEBUG
if (debug)
printf("%s on %d(%lu) fd=%d from %s\n",
(i) ? "drop" : "ignore",
i, free_recvbuffs(), fd,
2004-07-20 15:01:56 +00:00
stoa(&from));
1999-12-09 13:01:21 +00:00
#endif
2004-07-20 15:01:56 +00:00
if (i == wildipv4 || i == wildipv6)
1999-12-09 13:01:21 +00:00
packets_ignored++;
else
packets_dropped++;
goto select_again;
}
rb = get_free_recv_buffer();
2004-07-20 15:01:56 +00:00
fromlen = sizeof(struct sockaddr_storage);
1999-12-09 13:01:21 +00:00
rb->recv_length = recvfrom(fd,
(char *)&rb->recv_space,
sizeof(rb->recv_space), 0,
(struct sockaddr *)&rb->recv_srcadr,
&fromlen);
if (rb->recv_length == 0
#ifdef EWOULDBLOCK
|| errno==EWOULDBLOCK
#endif
#ifdef EAGAIN
|| errno==EAGAIN
#endif
) {
freerecvbuf(rb);
continue;
}
else if (rb->recv_length < 0)
{
2004-07-20 15:01:56 +00:00
netsyslog(LOG_ERR, "recvfrom(%s) fd=%d: %m",
stoa(&rb->recv_srcadr), fd);
1999-12-09 13:01:21 +00:00
#ifdef DEBUG
if (debug)
printf("input_handler: fd=%d dropped (bad recvfrom)\n", fd);
#endif
freerecvbuf(rb);
continue;
}
#ifdef DEBUG
2004-07-20 15:01:56 +00:00
if (debug > 2) {
if(rb->recv_srcadr.ss_family == AF_INET)
printf("input_handler: if=%d fd=%d length %d from %08lx %s\n",
i, fd, rb->recv_length,
(u_long)ntohl(((struct sockaddr_in*)&rb->recv_srcadr)->sin_addr.s_addr) &
0x00000000ffffffff,
stoa(&rb->recv_srcadr));
else
printf("input_handler: if=%d fd=%d length %d from %s\n",
i, fd, rb->recv_length,
stoa(&rb->recv_srcadr));
}
1999-12-09 13:01:21 +00:00
#endif
/*
* Got one. Mark how and when it got here,
* put it on the full list and do bookkeeping.
*/
rb->dstadr = &inter_list[i];
rb->fd = fd;
rb->recv_time = ts;
rb->receiver = receive;
add_full_recv_buffer(rb);
2004-07-20 15:01:56 +00:00
1999-12-09 13:01:21 +00:00
inter_list[i].received++;
packets_received++;
goto select_again;
}
/* Check more interfaces */
}
}
select_again:;
/*
* Done everything from that select. Poll again.
*/
}
/*
* If nothing more to do, try again.
* If nothing to do, just return.
* If an error occurred, complain and return.
*/
if (n == 0)
{
if (select_count == 0) /* We really had nothing to do */
{
if (debug)
2004-07-20 15:01:56 +00:00
netsyslog(LOG_DEBUG, "input_handler: select() returned 0");
1999-12-09 13:01:21 +00:00
--handler_count;
return;
}
/* We've done our work */
get_systime(&ts_e);
/*
2004-07-20 15:01:56 +00:00
* (ts_e - ts) is the amount of time we spent
* processing this gob of file descriptors. Log
* it.
1999-12-09 13:01:21 +00:00
*/
L_SUB(&ts_e, &ts);
if (debug > 3)
2004-07-20 15:01:56 +00:00
netsyslog(LOG_INFO, "input_handler: Processed a gob of fd's in %s msec", lfptoms(&ts_e, 6));
1999-12-09 13:01:21 +00:00
/* just bail. */
--handler_count;
return;
}
else if (n == -1)
{
int err = errno;
/*
* extended FAU debugging output
*/
2004-07-20 15:01:56 +00:00
if (err != EINTR)
netsyslog(LOG_ERR,
"select(%d, %s, 0L, 0L, &0.0) error: %m",
maxactivefd+1,
fdbits(maxactivefd, &activefds));
2000-01-28 14:55:50 +00:00
if (err == EBADF) {
1999-12-09 13:01:21 +00:00
int j, b;
fds = activefds;
for (j = 0; j <= maxactivefd; j++)
if (
(FD_ISSET(j, &fds) && (read(j, &b, 0) == -1))
)
2004-07-20 15:01:56 +00:00
netsyslog(LOG_ERR, "Bad file descriptor %d", j);
1999-12-09 13:01:21 +00:00
}
--handler_count;
return;
}
}
msyslog(LOG_ERR, "input_handler: fell out of infinite for(;;) loop!");
--handler_count;
return;
}
#endif
/*
2001-08-29 14:35:15 +00:00
* findinterface - find interface corresponding to address
1999-12-09 13:01:21 +00:00
*/
struct interface *
findinterface(
2004-07-20 15:01:56 +00:00
struct sockaddr_storage *addr
1999-12-09 13:01:21 +00:00
)
{
2004-07-20 15:01:56 +00:00
SOCKET s;
int rtn, i;
struct sockaddr_storage saddr;
int saddrlen = SOCKLEN(addr);
1999-12-09 13:01:21 +00:00
/*
2001-08-29 14:35:15 +00:00
* This is considerably hoke. We open a socket, connect to it
* and slap a getsockname() on it. If anything breaks, as it
* probably will in some j-random knockoff, we just return the
* wildcard interface.
1999-12-09 13:01:21 +00:00
*/
2004-07-20 15:01:56 +00:00
memset(&saddr, 0, sizeof(saddr));
saddr.ss_family = addr->ss_family;
if(addr->ss_family == AF_INET)
memcpy(&((struct sockaddr_in*)&saddr)->sin_addr, &((struct sockaddr_in*)addr)->sin_addr, sizeof(struct in_addr));
else if(addr->ss_family == AF_INET6)
memcpy(&((struct sockaddr_in6*)&saddr)->sin6_addr, &((struct sockaddr_in6*)addr)->sin6_addr, sizeof(struct in6_addr));
((struct sockaddr_in*)&saddr)->sin_port = htons(2000);
s = socket(addr->ss_family, SOCK_DGRAM, 0);
if (s == INVALID_SOCKET)
return ANY_INTERFACE_CHOOSE(addr);
rtn = connect(s, (struct sockaddr *)&saddr, SOCKLEN(&saddr));
#ifndef SYS_WINNT
2001-08-29 14:35:15 +00:00
if (rtn < 0)
2004-07-20 15:01:56 +00:00
#else
if (rtn == SOCKET_ERROR)
#endif
{
closesocket(s);
return ANY_INTERFACE_CHOOSE(addr);
}
2001-08-29 14:35:15 +00:00
rtn = getsockname(s, (struct sockaddr *)&saddr, &saddrlen);
2004-07-20 15:01:56 +00:00
closesocket(s);
#ifndef SYS_WINNT
2001-08-29 14:35:15 +00:00
if (rtn < 0)
2004-07-20 15:01:56 +00:00
#else
if (rtn == SOCKET_ERROR)
#endif
return ANY_INTERFACE_CHOOSE(addr);
2001-08-29 14:35:15 +00:00
2004-07-20 15:01:56 +00:00
for (i = 0; i < ninterfaces; i++) {
/*
* First look if is the the correct family
*/
if(inter_list[i].sin.ss_family != saddr.ss_family)
continue;
2001-08-29 14:35:15 +00:00
/*
* We match the unicast address only.
*/
2004-07-20 15:01:56 +00:00
if (SOCKCMP(&inter_list[i].sin, &saddr))
2001-08-29 14:35:15 +00:00
return (&inter_list[i]);
1999-12-09 13:01:21 +00:00
}
2004-07-20 15:01:56 +00:00
return ANY_INTERFACE_CHOOSE(addr);
2001-08-29 14:35:15 +00:00
}
/*
* findbcastinter - find broadcast interface corresponding to address
*/
struct interface *
findbcastinter(
2004-07-20 15:01:56 +00:00
struct sockaddr_storage *addr
2001-08-29 14:35:15 +00:00
)
{
2002-10-29 19:58:12 +00:00
#if !defined(MPE) && (defined(SIOCGIFCONF) || defined(SYS_WINNT))
2001-08-29 14:35:15 +00:00
register int i;
2004-07-20 15:01:56 +00:00
i = find_addr_in_list(addr);
if(i >= 0)
return (&inter_list[i]);
2001-08-29 14:35:15 +00:00
2004-07-20 15:01:56 +00:00
for (i = 0; i < ninterfaces; i++) {
/*
* First look if this is the correct family
*/
if(inter_list[i].sin.ss_family != addr->ss_family)
continue;
2001-08-29 14:35:15 +00:00
/*
* We match only those interfaces marked as
* broadcastable and either the explicit broadcast
* address or the network portion of the IP address.
* Sloppy.
*/
if (!(inter_list[i].flags & INT_BROADCAST))
continue;
2004-07-20 15:01:56 +00:00
if(addr->ss_family == AF_INET) {
if (SOCKCMP(&inter_list[i].bcast, addr))
return (&inter_list[i]);
if ((NSRCADR(&inter_list[i].sin) &
NSRCADR(&inter_list[i].mask)) == (NSRCADR(addr) &
NSRCADR(&inter_list[i].mask)))
return (&inter_list[i]);
}
else if(addr->ss_family == AF_INET6) {
if (SOCKCMP(&inter_list[i].bcast, addr))
return (&inter_list[i]);
if (SOCKCMP(netof(&inter_list[i].sin), netof(addr)))
return (&inter_list[i]);
}
2001-08-29 14:35:15 +00:00
}
#endif /* SIOCGIFCONF */
2004-07-20 15:01:56 +00:00
return ANY_INTERFACE_CHOOSE(addr);
1999-12-09 13:01:21 +00:00
}
/*
* io_clr_stats - clear I/O module statistics
*/
void
io_clr_stats(void)
{
packets_dropped = 0;
packets_ignored = 0;
packets_received = 0;
packets_sent = 0;
packets_notsent = 0;
handler_calls = 0;
handler_pkts = 0;
io_timereset = current_time;
}
#ifdef REFCLOCK
/*
* This is a hack so that I don't have to fool with these ioctls in the
* pps driver ... we are already non-blocking and turn on SIGIO thru
* another mechanisim
*/
int
io_addclock_simple(
struct refclockio *rio
)
{
BLOCKIO();
/*
* Stuff the I/O structure in the list and mark the descriptor
* in use. There is a harmless (I hope) race condition here.
*/
rio->next = refio;
refio = rio;
2004-07-20 15:01:56 +00:00
/*
* I/O Completion Ports don't care about select and fd_set
*/
#ifndef HAVE_IO_COMPLETION_PORT
1999-12-09 13:01:21 +00:00
if (rio->fd > maxactivefd)
maxactivefd = rio->fd;
FD_SET(rio->fd, &activefds);
2004-07-20 15:01:56 +00:00
#endif
1999-12-09 13:01:21 +00:00
UNBLOCKIO();
return 1;
}
/*
* io_addclock - add a reference clock to the list and arrange that we
* get SIGIO interrupts from it.
*/
int
io_addclock(
struct refclockio *rio
)
{
BLOCKIO();
/*
* Stuff the I/O structure in the list and mark the descriptor
* in use. There is a harmless (I hope) race condition here.
*/
rio->next = refio;
refio = rio;
# ifdef HAVE_SIGNALED_IO
if (init_clock_sig(rio))
{
refio = rio->next;
UNBLOCKIO();
return 0;
}
# elif defined(HAVE_IO_COMPLETION_PORT)
if (io_completion_port_add_clock_io(rio))
{
2004-07-20 15:01:56 +00:00
add_socket_to_list(rio->fd);
1999-12-09 13:01:21 +00:00
refio = rio->next;
UNBLOCKIO();
return 0;
}
# endif
2004-07-20 15:01:56 +00:00
/*
* I/O Completion Ports don't care about select and fd_set
*/
#ifndef HAVE_IO_COMPLETION_PORT
1999-12-09 13:01:21 +00:00
if (rio->fd > maxactivefd)
maxactivefd = rio->fd;
FD_SET(rio->fd, &activefds);
2004-07-20 15:01:56 +00:00
#endif
1999-12-09 13:01:21 +00:00
UNBLOCKIO();
return 1;
}
/*
* io_closeclock - close the clock in the I/O structure given
*/
void
io_closeclock(
struct refclockio *rio
)
{
/*
* Remove structure from the list
*/
if (refio == rio)
{
refio = rio->next;
}
else
{
register struct refclockio *rp;
for (rp = refio; rp != 0; rp = rp->next)
if (rp->next == rio)
{
rp->next = rio->next;
break;
}
if (rp == 0)
{
/*
* Internal error. Report it.
*/
msyslog(LOG_ERR,
"internal error: refclockio structure not found");
return;
}
}
/*
* Close the descriptor.
*/
close_file(rio->fd);
}
#endif /* REFCLOCK */
2004-07-20 15:01:56 +00:00
/*
* I/O Completion Ports don't care about select and fd_set
*/
#ifndef HAVE_IO_COMPLETION_PORT
1999-12-09 13:01:21 +00:00
void
2004-07-20 15:01:56 +00:00
kill_asyncio(
int startfd
)
1999-12-09 13:01:21 +00:00
{
2004-07-20 15:01:56 +00:00
SOCKET i;
1999-12-09 13:01:21 +00:00
BLOCKIO();
2004-07-20 15:01:56 +00:00
for (i = startfd; i <= maxactivefd; i++)
1999-12-09 13:01:21 +00:00
(void)close_socket(i);
}
2004-07-20 15:01:56 +00:00
#else
/*
* On NT a SOCKET is an unsigned int so we cannot possibly keep it in
* an array. So we use one of the ISC_LIST functions to hold the
* socket value and use that when we want to enumerate it.
*/
void
kill_asyncio(int startfd)
{
vsock_t *lsock;
vsock_t *next;
BLOCKIO();
lsock = ISC_LIST_HEAD(sockets_list);
while (lsock != NULL) {
next = ISC_LIST_NEXT(lsock, link);
close_socket(lsock->fd);
lsock = next;
}
}
#endif
/*
* Add and delete functions for the list of open sockets
*/
void
add_socket_to_list(SOCKET fd){
vsock_t *lsock = malloc(sizeof(vsock_t));
lsock->fd = fd;
ISC_LIST_APPEND(sockets_list, lsock, link);
}
void
delete_socket_from_list(SOCKET fd) {
vsock_t *next;
vsock_t *lsock = ISC_LIST_HEAD(sockets_list);
while(lsock != NULL) {
next = ISC_LIST_NEXT(lsock, link);
if(lsock->fd == fd) {
ISC_LIST_DEQUEUE(sockets_list, lsock, link);
free(lsock);
break;
}
else
lsock = next;
}
}
void
add_addr_to_list(struct sockaddr_storage *addr, int if_index){
remaddr_t *laddr = malloc(sizeof(remaddr_t));
memcpy(&laddr->addr, addr, sizeof(addr));
laddr->if_index = if_index;
ISC_LIST_APPEND(remoteaddr_list, laddr, link);
#ifdef DEBUG
if (debug)
printf("Added addr %s to list of addresses\n",
stoa(addr));
#endif
}
void
delete_addr_from_list(struct sockaddr_storage *addr) {
remaddr_t *next;
remaddr_t *laddr = ISC_LIST_HEAD(remoteaddr_list);
while(laddr != NULL) {
next = ISC_LIST_NEXT(laddr, link);
if(SOCKCMP(&laddr->addr, addr)) {
ISC_LIST_DEQUEUE(remoteaddr_list, laddr, link);
free(laddr);
break;
}
else
laddr = next;
}
#ifdef DEBUG
if (debug)
printf("Deleted addr %s from list of addresses\n",
stoa(addr));
#endif
}
int
find_addr_in_list(struct sockaddr_storage *addr) {
remaddr_t *next;
remaddr_t *laddr = ISC_LIST_HEAD(remoteaddr_list);
#ifdef DEBUG
if (debug)
printf("Finding addr %s in list of addresses\n",
stoa(addr));
#endif
while(laddr != NULL) {
next = ISC_LIST_NEXT(laddr, link);
if(SOCKCMP(&laddr->addr, addr)) {
return (laddr->if_index);
break;
}
else
laddr = next;
}
return (-1); /* Not found */
}