2 This file is part of catta.
4 catta is free software; you can redistribute it and/or modify it
5 under the terms of the GNU Lesser General Public License as
6 published by the Free Software Foundation; either version 2.1 of the
7 License, or (at your option) any later version.
9 catta is distributed in the hope that it will be useful, but WITHOUT
10 ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
11 or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General
12 Public License for more details.
14 You should have received a copy of the GNU Lesser General Public
15 License along with catta; if not, write to the Free Software
16 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
31 #include <sys/ioctl.h>
32 #ifdef HAVE_SYS_FILIO_H
33 #include <sys/filio.h>
37 #include <sys/types.h>
38 #include <sys/socket.h>
39 #include <netinet/in.h>
40 #include <arpa/inet.h>
45 #include <net/if_dl.h>
48 #include <catta/log.h>
52 #include "addr-util.h"
55 /* this is a portability hack */
56 #ifndef IPV6_ADD_MEMBERSHIP
57 #ifdef IPV6_JOIN_GROUP
58 #define IPV6_ADD_MEMBERSHIP IPV6_JOIN_GROUP
62 #ifndef IPV6_DROP_MEMBERSHIP
63 #ifdef IPV6_LEAVE_GROUP
64 #define IPV6_DROP_MEMBERSHIP IPV6_LEAVE_GROUP
68 static void mdns_mcast_group_ipv4(struct sockaddr_in *ret_sa) {
71 memset(ret_sa, 0, sizeof(struct sockaddr_in));
72 ret_sa->sin_family = AF_INET;
73 ret_sa->sin_port = htons(CATTA_MDNS_PORT);
74 inet_pton(AF_INET, CATTA_IPV4_MCAST_GROUP, &ret_sa->sin_addr);
77 static void mdns_mcast_group_ipv6(struct sockaddr_in6 *ret_sa) {
80 memset(ret_sa, 0, sizeof(struct sockaddr_in6));
81 ret_sa->sin6_family = AF_INET6;
82 ret_sa->sin6_port = htons(CATTA_MDNS_PORT);
83 inet_pton(AF_INET6, CATTA_IPV6_MCAST_GROUP, &ret_sa->sin6_addr);
86 static void ipv4_address_to_sockaddr(struct sockaddr_in *ret_sa, const CattaIPv4Address *a, uint16_t port) {
91 memset(ret_sa, 0, sizeof(struct sockaddr_in));
92 ret_sa->sin_family = AF_INET;
93 ret_sa->sin_port = htons(port);
94 memcpy(&ret_sa->sin_addr, a, sizeof(CattaIPv4Address));
97 static void ipv6_address_to_sockaddr(struct sockaddr_in6 *ret_sa, const CattaIPv6Address *a, uint16_t port) {
102 memset(ret_sa, 0, sizeof(struct sockaddr_in6));
103 ret_sa->sin6_family = AF_INET6;
104 ret_sa->sin6_port = htons(port);
105 memcpy(&ret_sa->sin6_addr, a, sizeof(CattaIPv6Address));
108 int catta_mdns_mcast_join_ipv4(int fd, const CattaIPv4Address *a, int idx, int join) {
109 #ifdef HAVE_STRUCT_IP_MREQN
110 struct ip_mreqn mreq;
114 struct sockaddr_in sa;
120 memset(&mreq, 0, sizeof(mreq));
121 #ifdef HAVE_STRUCT_IP_MREQN
122 mreq.imr_ifindex = idx;
123 mreq.imr_address.s_addr = a->address;
125 mreq.imr_interface.s_addr = a->address;
127 mdns_mcast_group_ipv4(&sa);
128 mreq.imr_multiaddr = sa.sin_addr;
130 /* Some network drivers have issues with dropping membership of
131 * mcast groups when the iface is down, but don't allow rejoining
132 * when it comes back up. This is an ugly workaround */
134 setsockopt(fd, IPPROTO_IP, IP_DROP_MEMBERSHIP, (void *)&mreq, sizeof(mreq));
136 if (setsockopt(fd, IPPROTO_IP, join ? IP_ADD_MEMBERSHIP : IP_DROP_MEMBERSHIP, (void *)&mreq, sizeof(mreq)) < 0) {
137 catta_log_warn("%s failed: %s", join ? "IP_ADD_MEMBERSHIP" : "IP_DROP_MEMBERSHIP", strerror(errno));
144 int catta_mdns_mcast_join_ipv6(int fd, const CattaIPv6Address *a, int idx, int join) {
145 struct ipv6_mreq mreq6;
146 struct sockaddr_in6 sa6;
152 memset(&mreq6, 0, sizeof(mreq6));
153 mdns_mcast_group_ipv6 (&sa6);
154 mreq6.ipv6mr_multiaddr = sa6.sin6_addr;
155 mreq6.ipv6mr_interface = idx;
158 setsockopt(fd, IPPROTO_IPV6, IPV6_DROP_MEMBERSHIP, (void *)&mreq6, sizeof(mreq6));
160 if (setsockopt(fd, IPPROTO_IPV6, join ? IPV6_ADD_MEMBERSHIP : IPV6_DROP_MEMBERSHIP, (void *)&mreq6, sizeof(mreq6)) < 0) {
161 catta_log_warn("%s failed: %s", join ? "IPV6_ADD_MEMBERSHIP" : "IPV6_DROP_MEMBERSHIP", strerror(errno));
168 static int reuseaddr(int fd) {
172 if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (void *)&yes, sizeof(yes)) < 0) {
173 catta_log_warn("SO_REUSEADDR failed: %s", strerror(errno));
179 if (setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, (void *)&yes, sizeof(yes)) < 0) {
180 catta_log_warn("SO_REUSEPORT failed: %s", strerror(errno));
188 static int bind_with_warn(int fd, const struct sockaddr *sa, socklen_t l) {
195 // Windows does not allow address reuse when SO_REUSEADDR was set after
196 // bind() on the first socket, so we must set it before.
197 // Note that this spoils the detection trickery below and the warning will
200 if (reuseaddr(fd) < 0)
204 if (bind(fd, sa, l) < 0) {
206 if (errno != EADDRINUSE) {
207 catta_log_warn("bind() failed: %s", strerror(errno));
211 catta_log_warn("*** WARNING: Detected another %s mDNS stack running on this host. This makes mDNS unreliable and is thus not recommended. ***",
212 sa->sa_family == AF_INET ? "IPv4" : "IPv6");
214 /* Try again, this time with SO_REUSEADDR set */
215 if (reuseaddr(fd) < 0)
218 if (bind(fd, sa, l) < 0) {
219 catta_log_warn("bind() failed: %s", strerror(errno));
224 /* We enable SO_REUSEADDR afterwards, to make sure that the
225 * user may run other mDNS implementations if he really
228 if (reuseaddr(fd) < 0)
235 static int ipv4_pktinfo(int fd) {
240 if (setsockopt(fd, IPPROTO_IP, IP_PKTINFO, (void *)&yes, sizeof(yes)) < 0) {
241 catta_log_warn("IP_PKTINFO failed: %s", strerror(errno));
246 #ifdef IP_RECVINTERFACE
248 if (setsockopt (fd, IPPROTO_IP, IP_RECVINTERFACE, (void *)&yes, sizeof(yes)) < 0) {
249 catta_log_warn("IP_RECVINTERFACE failed: %s", strerror(errno));
252 #elif defined(IP_RECVIF)
254 if (setsockopt (fd, IPPROTO_IP, IP_RECVIF, (void *)&yes, sizeof(yes)) < 0) {
255 catta_log_warn("IP_RECVIF failed: %s", strerror(errno));
260 #ifdef IP_RECVDSTADDR
262 if (setsockopt (fd, IPPROTO_IP, IP_RECVDSTADDR, (void *)&yes, sizeof(yes)) < 0) {
263 catta_log_warn("IP_RECVDSTADDR failed: %s", strerror(errno));
268 #endif /* IP_PKTINFO */
272 if (setsockopt(fd, IPPROTO_IP, IP_RECVTTL, (void *)&yes, sizeof(yes)) < 0) {
273 catta_log_warn("IP_RECVTTL failed: %s", strerror(errno));
281 static int ipv6_pktinfo(int fd) {
284 #ifdef IPV6_RECVPKTINFO
286 if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVPKTINFO, (void *)&yes, sizeof(yes)) < 0) {
287 catta_log_warn("IPV6_RECVPKTINFO failed: %s", strerror(errno));
290 #elif defined(IPV6_PKTINFO)
292 if (setsockopt(fd, IPPROTO_IPV6, IPV6_PKTINFO, (void *)&yes, sizeof(yes)) < 0) {
293 catta_log_warn("IPV6_PKTINFO failed: %s", strerror(errno));
300 if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVHOPS, (void *)&yes, sizeof(yes)) < 0) {
301 catta_log_warn("IPV6_RECVHOPS failed: %s", strerror(errno));
304 #elif defined(IPV6_RECVHOPLIMIT)
306 if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVHOPLIMIT, (void *)&yes, sizeof(yes)) < 0) {
307 catta_log_warn("IPV6_RECVHOPLIMIT failed: %s", strerror(errno));
310 #elif defined(IPV6_HOPLIMIT)
312 if (setsockopt(fd, IPPROTO_IPV6, IPV6_HOPLIMIT, (void *)&yes, sizeof(yes)) < 0) {
313 catta_log_warn("IPV6_HOPLIMIT failed: %s", strerror(errno));
321 int catta_open_socket_ipv4(int no_reuse) {
322 struct sockaddr_in local;
323 int fd = -1, r, ittl;
326 if ((fd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
327 catta_log_warn("socket() failed: %s", strerror(errno));
332 if (setsockopt(fd, IPPROTO_IP, IP_MULTICAST_TTL, (void *)&ttl, sizeof(ttl)) < 0) {
333 catta_log_warn("IP_MULTICAST_TTL failed: %s", strerror(errno));
338 if (setsockopt(fd, IPPROTO_IP, IP_TTL, (void *)&ittl, sizeof(ittl)) < 0) {
339 catta_log_warn("IP_TTL failed: %s", strerror(errno));
344 if (setsockopt(fd, IPPROTO_IP, IP_MULTICAST_LOOP, (void *)&cyes, sizeof(cyes)) < 0) {
345 catta_log_warn("IP_MULTICAST_LOOP failed: %s", strerror(errno));
349 memset(&local, 0, sizeof(local));
350 local.sin_family = AF_INET;
351 local.sin_port = htons(CATTA_MDNS_PORT);
354 r = bind(fd, (struct sockaddr*) &local, sizeof(local));
356 r = bind_with_warn(fd, (struct sockaddr*) &local, sizeof(local));
361 if (ipv4_pktinfo (fd) < 0)
364 if (catta_set_cloexec(fd) < 0) {
365 catta_log_warn("FD_CLOEXEC failed: %s", strerror(errno));
369 if (catta_set_nonblock(fd) < 0) {
370 catta_log_warn("O_NONBLOCK failed: %s", strerror(errno));
383 int catta_open_socket_ipv6(int no_reuse) {
384 struct sockaddr_in6 sa, local;
388 mdns_mcast_group_ipv6(&sa);
390 if ((fd = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
391 catta_log_warn("socket() failed: %s", strerror(errno));
396 if (setsockopt(fd, IPPROTO_IPV6, IPV6_MULTICAST_HOPS, (void *)&ttl, sizeof(ttl)) < 0) {
397 catta_log_warn("IPV6_MULTICAST_HOPS failed: %s", strerror(errno));
402 if (setsockopt(fd, IPPROTO_IPV6, IPV6_UNICAST_HOPS, (void *)&ttl, sizeof(ttl)) < 0) {
403 catta_log_warn("IPV6_UNICAST_HOPS failed: %s", strerror(errno));
408 if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (void *)&yes, sizeof(yes)) < 0) {
409 catta_log_warn("IPV6_V6ONLY failed: %s", strerror(errno));
414 if (setsockopt(fd, IPPROTO_IPV6, IPV6_MULTICAST_LOOP, (void *)&yes, sizeof(yes)) < 0) {
415 catta_log_warn("IPV6_MULTICAST_LOOP failed: %s", strerror(errno));
419 memset(&local, 0, sizeof(local));
420 local.sin6_family = AF_INET6;
421 local.sin6_port = htons(CATTA_MDNS_PORT);
424 r = bind(fd, (struct sockaddr*) &local, sizeof(local));
426 r = bind_with_warn(fd, (struct sockaddr*) &local, sizeof(local));
431 if (ipv6_pktinfo(fd) < 0)
434 if (catta_set_cloexec(fd) < 0) {
435 catta_log_warn("FD_CLOEXEC failed: %s", strerror(errno));
439 if (catta_set_nonblock(fd) < 0) {
440 catta_log_warn("O_NONBLOCK failed: %s", strerror(errno));
453 static int sendmsg_loop(int fd, struct msghdr *msg, int flags) {
459 if (sendmsg(fd, msg, flags) >= 0)
465 if (errno != EAGAIN) {
467 struct sockaddr_in *sin = msg->msg_name;
469 inet_ntop(sin->sin_family, &sin->sin_addr, where, sizeof(where));
470 catta_log_debug("sendmsg() to %s failed: %s", where, strerror(errno));
474 if (catta_wait_for_write(fd) < 0)
481 int catta_send_dns_packet_ipv4(
485 const CattaIPv4Address *src_address,
486 const CattaIPv4Address *dst_address,
489 struct sockaddr_in sa;
493 struct cmsghdr *cmsg;
494 size_t cmsg_data[( CMSG_SPACE(sizeof(struct in_pktinfo)) / sizeof(size_t)) + 1];
495 #elif !defined(IP_MULTICAST_IF) && defined(IP_SENDSRCADDR)
496 struct cmsghdr *cmsg;
497 size_t cmsg_data[( CMSG_SPACE(sizeof(struct in_addr)) / sizeof(size_t)) + 1];
502 assert(catta_dns_packet_check_valid(p) >= 0);
503 assert(!dst_address || dst_port > 0);
506 mdns_mcast_group_ipv4(&sa);
508 ipv4_address_to_sockaddr(&sa, dst_address, dst_port);
510 memset(&io, 0, sizeof(io));
511 io.iov_base = CATTA_DNS_PACKET_DATA(p);
512 io.iov_len = p->size;
514 memset(&msg, 0, sizeof(msg));
516 msg.msg_namelen = sizeof(sa);
520 msg.msg_control = NULL;
521 msg.msg_controllen = 0;
524 if (iface > 0 || src_address) {
525 struct in_pktinfo *pkti;
527 memset(cmsg_data, 0, sizeof(cmsg_data));
528 msg.msg_control = cmsg_data;
529 msg.msg_controllen = CMSG_LEN(sizeof(struct in_pktinfo));
531 cmsg = CMSG_FIRSTHDR(&msg);
532 cmsg->cmsg_len = msg.msg_controllen;
533 cmsg->cmsg_level = IPPROTO_IP;
534 cmsg->cmsg_type = IP_PKTINFO;
536 pkti = (struct in_pktinfo*) CMSG_DATA(cmsg);
539 pkti->ipi_ifindex = iface;
541 #ifdef HAVE_IPI_SPEC_DST
543 pkti->ipi_spec_dst.s_addr = src_address->address;
546 #elif defined(IP_MULTICAST_IF)
548 struct in_addr any = { INADDR_ANY };
549 if (setsockopt(fd, IPPROTO_IP, IP_MULTICAST_IF, (void *)(src_address ? &src_address->address : &any), sizeof(struct in_addr)) < 0) {
550 catta_log_warn("IP_MULTICAST_IF failed: %s", strerror(errno));
554 #elif defined(IP_SENDSRCADDR)
556 struct in_addr *addr;
558 memset(cmsg_data, 0, sizeof(cmsg_data));
559 msg.msg_control = cmsg_data;
560 msg.msg_controllen = CMSG_LEN(sizeof(struct in_addr));
562 cmsg = CMSG_FIRSTHDR(&msg);
563 cmsg->cmsg_len = msg.msg_controllen;
564 cmsg->cmsg_level = IPPROTO_IP;
565 cmsg->cmsg_type = IP_SENDSRCADDR;
567 addr = (struct in_addr *)CMSG_DATA(cmsg);
568 addr->s_addr = src_address->address;
570 #elif defined(__GNUC__)
571 #warning "FIXME: We need some code to set the outgoing interface/local address here if IP_PKTINFO/IP_MULTICAST_IF is not available"
574 return sendmsg_loop(fd, &msg, 0);
577 int catta_send_dns_packet_ipv6(
581 const CattaIPv6Address *src_address,
582 const CattaIPv6Address *dst_address,
585 struct sockaddr_in6 sa;
588 struct cmsghdr *cmsg;
589 size_t cmsg_data[(CMSG_SPACE(sizeof(struct in6_pktinfo))/sizeof(size_t)) + 1];
593 assert(catta_dns_packet_check_valid(p) >= 0);
594 assert(!dst_address || dst_port > 0);
597 mdns_mcast_group_ipv6(&sa);
599 ipv6_address_to_sockaddr(&sa, dst_address, dst_port);
601 memset(&io, 0, sizeof(io));
602 io.iov_base = CATTA_DNS_PACKET_DATA(p);
603 io.iov_len = p->size;
605 memset(&msg, 0, sizeof(msg));
607 msg.msg_namelen = sizeof(sa);
612 if (iface > 0 || src_address) {
613 struct in6_pktinfo *pkti;
615 memset(cmsg_data, 0, sizeof(cmsg_data));
616 msg.msg_control = cmsg_data;
617 msg.msg_controllen = CMSG_LEN(sizeof(struct in6_pktinfo));
619 cmsg = CMSG_FIRSTHDR(&msg);
620 cmsg->cmsg_len = msg.msg_controllen;
621 cmsg->cmsg_level = IPPROTO_IPV6;
622 cmsg->cmsg_type = IPV6_PKTINFO;
624 pkti = (struct in6_pktinfo*) CMSG_DATA(cmsg);
627 pkti->ipi6_ifindex = iface;
630 memcpy(&pkti->ipi6_addr, src_address->address, sizeof(src_address->address));
632 msg.msg_control = NULL;
633 msg.msg_controllen = 0;
636 return sendmsg_loop(fd, &msg, 0);
639 CattaDnsPacket *catta_recv_dns_packet_ipv4(
641 CattaIPv4Address *ret_src_address,
642 uint16_t *ret_src_port,
643 CattaIPv4Address *ret_dst_address,
644 CattaIfIndex *ret_iface,
647 CattaDnsPacket *p= NULL;
650 size_t aux[1024 / sizeof(size_t)]; /* for alignment on ia64 ! */
652 struct cmsghdr *cmsg;
655 struct sockaddr_in sa;
659 if (ioctl(fd, FIONREAD, &ms) < 0) {
660 catta_log_warn("ioctl(): %s", strerror(errno));
665 catta_log_warn("FIONREAD returned negative value.");
669 p = catta_dns_packet_new(ms + CATTA_DNS_PACKET_EXTRA_SIZE);
671 io.iov_base = CATTA_DNS_PACKET_DATA(p);
672 io.iov_len = p->max_size;
674 memset(&msg, 0, sizeof(msg));
676 msg.msg_namelen = sizeof(sa);
679 msg.msg_control = aux;
680 msg.msg_controllen = sizeof(aux);
683 if ((l = recvmsg(fd, &msg, 0)) < 0) {
684 /* Linux returns EAGAIN when an invalid IP packet has been
685 received. We suppress warnings in this case because this might
686 create quite a bit of log traffic on machines with unstable
690 catta_log_warn("recvmsg(): %s", strerror(errno));
695 /* For corrupt packets FIONREAD returns zero size (See rhbz #607297). So
696 * fail after having read them. */
700 if (sa.sin_addr.s_addr == INADDR_ANY)
701 /* Linux 2.4 behaves very strangely sometimes! */
704 assert(!(msg.msg_flags & MSG_CTRUNC));
705 assert(!(msg.msg_flags & MSG_TRUNC));
707 p->size = (size_t) l;
710 *ret_src_port = catta_port_from_sockaddr((struct sockaddr*) &sa);
712 if (ret_src_address) {
714 catta_address_from_sockaddr((struct sockaddr*) &sa, &a);
715 *ret_src_address = a.data.ipv4;
722 *ret_iface = CATTA_IF_UNSPEC;
724 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
726 if (cmsg->cmsg_level == IPPROTO_IP) {
728 switch (cmsg->cmsg_type) {
734 *ret_ttl = (uint8_t) (*(int *) CMSG_DATA(cmsg));
740 struct in_pktinfo *i = (struct in_pktinfo*) CMSG_DATA(cmsg);
742 if (ret_iface && i->ipi_ifindex > 0)
743 *ret_iface = (int) i->ipi_ifindex;
746 ret_dst_address->address = i->ipi_addr.s_addr;
756 struct sockaddr_dl *sdl = (struct sockaddr_dl *) CMSG_DATA (cmsg);
760 if (*(uint_t*) sdl > 0)
761 *ret_iface = *(uint_t*) sdl;
764 if (sdl->sdl_index > 0)
765 *ret_iface = (int) sdl->sdl_index;
773 #ifdef IP_RECVDSTADDR
776 memcpy(&ret_dst_address->address, CMSG_DATA (cmsg), 4);
783 catta_log_warn("Unhandled cmsg_type: %d", cmsg->cmsg_type);
795 catta_dns_packet_free(p);
800 CattaDnsPacket *catta_recv_dns_packet_ipv6(
802 CattaIPv6Address *ret_src_address,
803 uint16_t *ret_src_port,
804 CattaIPv6Address *ret_dst_address,
805 CattaIfIndex *ret_iface,
808 CattaDnsPacket *p = NULL;
811 size_t aux[1024 / sizeof(size_t)];
814 struct cmsghdr *cmsg;
815 int found_ttl = 0, found_iface = 0;
816 struct sockaddr_in6 sa;
820 if (ioctl(fd, FIONREAD, &ms) < 0) {
821 catta_log_warn("ioctl(): %s", strerror(errno));
826 catta_log_warn("FIONREAD returned negative value.");
830 p = catta_dns_packet_new(ms + CATTA_DNS_PACKET_EXTRA_SIZE);
832 io.iov_base = CATTA_DNS_PACKET_DATA(p);
833 io.iov_len = p->max_size;
835 memset(&msg, 0, sizeof(msg));
836 msg.msg_name = (struct sockaddr*) &sa;
837 msg.msg_namelen = sizeof(sa);
841 msg.msg_control = aux;
842 msg.msg_controllen = sizeof(aux);
845 if ((l = recvmsg(fd, &msg, 0)) < 0) {
846 /* Linux returns EAGAIN when an invalid IP packet has been
847 received. We suppress warnings in this case because this might
848 create quite a bit of log traffic on machines with unstable
852 catta_log_warn("recvmsg(): %s", strerror(errno));
857 /* For corrupt packets FIONREAD returns zero size (See rhbz #607297). So
858 * fail after having read them. */
862 assert(!(msg.msg_flags & MSG_CTRUNC));
863 assert(!(msg.msg_flags & MSG_TRUNC));
865 p->size = (size_t) l;
868 *ret_src_port = catta_port_from_sockaddr((struct sockaddr*) &sa);
870 if (ret_src_address) {
872 catta_address_from_sockaddr((struct sockaddr*) &sa, &a);
873 *ret_src_address = a.data.ipv6;
876 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
878 if (cmsg->cmsg_level == IPPROTO_IPV6) {
880 switch (cmsg->cmsg_type) {
885 *ret_ttl = (uint8_t) (*(int *) CMSG_DATA(cmsg));
892 struct in6_pktinfo *i = (struct in6_pktinfo*) CMSG_DATA(cmsg);
894 if (ret_iface && i->ipi6_ifindex > 0)
895 *ret_iface = i->ipi6_ifindex;
898 memcpy(ret_dst_address->address, i->ipi6_addr.s6_addr, 16);
905 catta_log_warn("Unhandled cmsg_type: %d", cmsg->cmsg_type);
918 catta_dns_packet_free(p);
923 int catta_open_unicast_socket_ipv4(void) {
924 struct sockaddr_in local;
927 if ((fd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
928 catta_log_warn("socket() failed: %s", strerror(errno));
932 memset(&local, 0, sizeof(local));
933 local.sin_family = AF_INET;
935 if (bind(fd, (struct sockaddr*) &local, sizeof(local)) < 0) {
936 catta_log_warn("bind() failed: %s", strerror(errno));
940 if (ipv4_pktinfo(fd) < 0) {
944 if (catta_set_cloexec(fd) < 0) {
945 catta_log_warn("FD_CLOEXEC failed: %s", strerror(errno));
949 if (catta_set_nonblock(fd) < 0) {
950 catta_log_warn("O_NONBLOCK failed: %s", strerror(errno));
963 int catta_open_unicast_socket_ipv6(void) {
964 struct sockaddr_in6 local;
967 if ((fd = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
968 catta_log_warn("socket() failed: %s", strerror(errno));
973 if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (void *)&yes, sizeof(yes)) < 0) {
974 catta_log_warn("IPV6_V6ONLY failed: %s", strerror(errno));
978 memset(&local, 0, sizeof(local));
979 local.sin6_family = AF_INET6;
981 if (bind(fd, (struct sockaddr*) &local, sizeof(local)) < 0) {
982 catta_log_warn("bind() failed: %s", strerror(errno));
986 if (ipv6_pktinfo(fd) < 0)
989 if (catta_set_cloexec(fd) < 0) {
990 catta_log_warn("FD_CLOEXEC failed: %s", strerror(errno));
994 if (catta_set_nonblock(fd) < 0) {
995 catta_log_warn("O_NONBLOCK failed: %s", strerror(errno));