2 This file is part of catta.
4 catta is free software; you can redistribute it and/or modify it
5 under the terms of the GNU Lesser General Public License as
6 published by the Free Software Foundation; either version 2.1 of the
7 License, or (at your option) any later version.
9 catta is distributed in the hope that it will be useful, but WITHOUT
10 ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
11 or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General
12 Public License for more details.
14 You should have received a copy of the GNU Lesser General Public
15 License along with catta; if not, write to the Free Software
16 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
24 #define __APPLE_USE_RFC_2292
33 #include <sys/ioctl.h>
34 #ifdef HAVE_SYS_FILIO_H
35 #include <sys/filio.h>
39 #include <sys/types.h>
40 #include <sys/socket.h>
41 #include <netinet/in.h>
42 #include <arpa/inet.h>
47 #include <net/if_dl.h>
50 #include <catta/log.h>
54 #include "addr-util.h"
57 /* this is a portability hack */
58 #ifndef IPV6_ADD_MEMBERSHIP
59 #ifdef IPV6_JOIN_GROUP
60 #define IPV6_ADD_MEMBERSHIP IPV6_JOIN_GROUP
64 #ifndef IPV6_DROP_MEMBERSHIP
65 #ifdef IPV6_LEAVE_GROUP
66 #define IPV6_DROP_MEMBERSHIP IPV6_LEAVE_GROUP
70 static void mdns_mcast_group_ipv4(struct sockaddr_in *ret_sa) {
73 memset(ret_sa, 0, sizeof(struct sockaddr_in));
74 ret_sa->sin_family = AF_INET;
75 ret_sa->sin_port = htons(CATTA_MDNS_PORT);
76 inet_pton(AF_INET, CATTA_IPV4_MCAST_GROUP, &ret_sa->sin_addr);
79 static void mdns_mcast_group_ipv6(struct sockaddr_in6 *ret_sa) {
82 memset(ret_sa, 0, sizeof(struct sockaddr_in6));
83 ret_sa->sin6_family = AF_INET6;
84 ret_sa->sin6_port = htons(CATTA_MDNS_PORT);
85 inet_pton(AF_INET6, CATTA_IPV6_MCAST_GROUP, &ret_sa->sin6_addr);
88 static void ipv4_address_to_sockaddr(struct sockaddr_in *ret_sa, const CattaIPv4Address *a, uint16_t port) {
93 memset(ret_sa, 0, sizeof(struct sockaddr_in));
94 ret_sa->sin_family = AF_INET;
95 ret_sa->sin_port = htons(port);
96 memcpy(&ret_sa->sin_addr, a, sizeof(CattaIPv4Address));
99 static void ipv6_address_to_sockaddr(struct sockaddr_in6 *ret_sa, const CattaIPv6Address *a, uint16_t port) {
104 memset(ret_sa, 0, sizeof(struct sockaddr_in6));
105 ret_sa->sin6_family = AF_INET6;
106 ret_sa->sin6_port = htons(port);
107 memcpy(&ret_sa->sin6_addr, a, sizeof(CattaIPv6Address));
110 int catta_mdns_mcast_join_ipv4(int fd, const CattaIPv4Address *a, CattaIfIndex idx, int join) {
111 #ifdef HAVE_STRUCT_IP_MREQN
112 struct ip_mreqn mreq;
116 struct sockaddr_in sa;
122 memset(&mreq, 0, sizeof(mreq));
123 #ifdef HAVE_STRUCT_IP_MREQN
124 mreq.imr_ifindex = idx;
125 mreq.imr_address.s_addr = a->address;
127 mreq.imr_interface.s_addr = a->address;
129 mdns_mcast_group_ipv4(&sa);
130 mreq.imr_multiaddr = sa.sin_addr;
132 /* Some network drivers have issues with dropping membership of
133 * mcast groups when the iface is down, but don't allow rejoining
134 * when it comes back up. This is an ugly workaround */
136 setsockopt(fd, IPPROTO_IP, IP_DROP_MEMBERSHIP, (void *)&mreq, sizeof(mreq));
138 if (setsockopt(fd, IPPROTO_IP, join ? IP_ADD_MEMBERSHIP : IP_DROP_MEMBERSHIP, (void *)&mreq, sizeof(mreq)) < 0) {
139 catta_log_warn("%s failed: %s", join ? "IP_ADD_MEMBERSHIP" : "IP_DROP_MEMBERSHIP", errnostrsocket());
146 int catta_mdns_mcast_join_ipv6(int fd, const CattaIPv6Address *a, CattaIfIndex idx, int join) {
147 struct ipv6_mreq mreq6;
148 struct sockaddr_in6 sa6;
154 memset(&mreq6, 0, sizeof(mreq6));
155 mdns_mcast_group_ipv6 (&sa6);
156 mreq6.ipv6mr_multiaddr = sa6.sin6_addr;
157 mreq6.ipv6mr_interface = idx;
160 setsockopt(fd, IPPROTO_IPV6, IPV6_DROP_MEMBERSHIP, (void *)&mreq6, sizeof(mreq6));
162 if (setsockopt(fd, IPPROTO_IPV6, join ? IPV6_ADD_MEMBERSHIP : IPV6_DROP_MEMBERSHIP, (void *)&mreq6, sizeof(mreq6)) < 0) {
163 catta_log_warn("%s failed: %s", join ? "IPV6_ADD_MEMBERSHIP" : "IPV6_DROP_MEMBERSHIP", errnostrsocket());
170 static int reuseaddr(int fd) {
174 if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (void *)&yes, sizeof(yes)) < 0) {
175 catta_log_warn("SO_REUSEADDR failed: %s", errnostrsocket());
181 if (setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, (void *)&yes, sizeof(yes)) < 0) {
182 catta_log_warn("SO_REUSEPORT failed: %s", errnostrsocket());
190 static int bind_with_warn(int fd, const struct sockaddr *sa, socklen_t l) {
197 // Windows does not allow address reuse when SO_REUSEADDR was set after
198 // bind() on the first socket, so we must set it before.
199 // Note that this spoils the detection trickery below and the warning will
202 if (reuseaddr(fd) < 0)
206 if (bind(fd, sa, l) < 0) {
208 if (errno != EADDRINUSE) {
209 catta_log_warn("bind() failed: %s", errnostrsocket());
213 catta_log_warn("*** WARNING: Detected another %s mDNS stack running on this host. This makes mDNS unreliable and is thus not recommended. ***",
214 sa->sa_family == AF_INET ? "IPv4" : "IPv6");
216 /* Try again, this time with SO_REUSEADDR set */
217 if (reuseaddr(fd) < 0)
220 if (bind(fd, sa, l) < 0) {
221 catta_log_warn("bind() failed: %s", errnostrsocket());
226 /* We enable SO_REUSEADDR afterwards, to make sure that the
227 * user may run other mDNS implementations if he really
230 if (reuseaddr(fd) < 0)
237 static int ipv4_pktinfo(int fd) {
242 if (setsockopt(fd, IPPROTO_IP, IP_PKTINFO, (void *)&yes, sizeof(yes)) < 0) {
243 catta_log_warn("IP_PKTINFO failed: %s", errnostrsocket());
248 #ifdef IP_RECVINTERFACE
250 if (setsockopt (fd, IPPROTO_IP, IP_RECVINTERFACE, (void *)&yes, sizeof(yes)) < 0) {
251 catta_log_warn("IP_RECVINTERFACE failed: %s", errnostrsocket());
254 #elif defined(IP_RECVIF)
256 if (setsockopt (fd, IPPROTO_IP, IP_RECVIF, (void *)&yes, sizeof(yes)) < 0) {
257 catta_log_warn("IP_RECVIF failed: %s", errnostrsocket());
262 #ifdef IP_RECVDSTADDR
264 if (setsockopt (fd, IPPROTO_IP, IP_RECVDSTADDR, (void *)&yes, sizeof(yes)) < 0) {
265 catta_log_warn("IP_RECVDSTADDR failed: %s", errnostrsocket());
270 #endif /* IP_PKTINFO */
274 if (setsockopt(fd, IPPROTO_IP, IP_RECVTTL, (void *)&yes, sizeof(yes)) < 0) {
275 catta_log_warn("IP_RECVTTL failed: %s", errnostrsocket());
283 static int ipv6_pktinfo(int fd) {
286 #ifdef IPV6_RECVPKTINFO
288 if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVPKTINFO, (void *)&yes, sizeof(yes)) < 0) {
289 catta_log_warn("IPV6_RECVPKTINFO failed: %s", errnostrsocket());
292 #elif defined(IPV6_PKTINFO)
294 if (setsockopt(fd, IPPROTO_IPV6, IPV6_PKTINFO, (void *)&yes, sizeof(yes)) < 0) {
295 catta_log_warn("IPV6_PKTINFO failed: %s", errnostrsocket());
302 if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVHOPS, (void *)&yes, sizeof(yes)) < 0) {
303 catta_log_warn("IPV6_RECVHOPS failed: %s", errnostrsocket());
306 #elif defined(IPV6_RECVHOPLIMIT)
308 if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVHOPLIMIT, (void *)&yes, sizeof(yes)) < 0) {
309 catta_log_warn("IPV6_RECVHOPLIMIT failed: %s", errnostrsocket());
312 #elif defined(IPV6_HOPLIMIT)
314 if (setsockopt(fd, IPPROTO_IPV6, IPV6_HOPLIMIT, (void *)&yes, sizeof(yes)) < 0) {
315 catta_log_warn("IPV6_HOPLIMIT failed: %s", errnostrsocket());
323 int catta_open_socket_ipv4(int no_reuse) {
324 struct sockaddr_in local;
325 int fd = -1, r, ittl;
328 if ((fd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
329 catta_log_warn("socket() failed: %s", errnostrsocket());
334 if (setsockopt(fd, IPPROTO_IP, IP_MULTICAST_TTL, (void *)&ttl, sizeof(ttl)) < 0) {
335 catta_log_warn("IP_MULTICAST_TTL failed: %s", errnostrsocket());
340 if (setsockopt(fd, IPPROTO_IP, IP_TTL, (void *)&ittl, sizeof(ittl)) < 0) {
341 catta_log_warn("IP_TTL failed: %s", errnostrsocket());
346 if (setsockopt(fd, IPPROTO_IP, IP_MULTICAST_LOOP, (void *)&cyes, sizeof(cyes)) < 0) {
347 catta_log_warn("IP_MULTICAST_LOOP failed: %s", errnostrsocket());
351 memset(&local, 0, sizeof(local));
352 local.sin_family = AF_INET;
353 local.sin_port = htons(CATTA_MDNS_PORT);
356 r = bind(fd, (struct sockaddr*) &local, sizeof(local));
358 r = bind_with_warn(fd, (struct sockaddr*) &local, sizeof(local));
363 if (ipv4_pktinfo (fd) < 0)
366 if (catta_set_cloexec(fd) < 0) {
367 catta_log_warn("FD_CLOEXEC failed: %s", errnostrsocket());
371 if (catta_set_nonblock(fd) < 0) {
372 catta_log_warn("O_NONBLOCK failed: %s", errnostrsocket());
385 int catta_open_socket_ipv6(int no_reuse) {
386 struct sockaddr_in6 sa, local;
390 mdns_mcast_group_ipv6(&sa);
392 if ((fd = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
393 catta_log_warn("socket() failed: %s", errnostrsocket());
398 if (setsockopt(fd, IPPROTO_IPV6, IPV6_MULTICAST_HOPS, (void *)&ttl, sizeof(ttl)) < 0) {
399 catta_log_warn("IPV6_MULTICAST_HOPS failed: %s", errnostrsocket());
404 if (setsockopt(fd, IPPROTO_IPV6, IPV6_UNICAST_HOPS, (void *)&ttl, sizeof(ttl)) < 0) {
405 catta_log_warn("IPV6_UNICAST_HOPS failed: %s", errnostrsocket());
410 if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (void *)&yes, sizeof(yes)) < 0) {
411 catta_log_warn("IPV6_V6ONLY failed: %s", errnostrsocket());
416 if (setsockopt(fd, IPPROTO_IPV6, IPV6_MULTICAST_LOOP, (void *)&yes, sizeof(yes)) < 0) {
417 catta_log_warn("IPV6_MULTICAST_LOOP failed: %s", errnostrsocket());
421 memset(&local, 0, sizeof(local));
422 local.sin6_family = AF_INET6;
423 local.sin6_port = htons(CATTA_MDNS_PORT);
426 r = bind(fd, (struct sockaddr*) &local, sizeof(local));
428 r = bind_with_warn(fd, (struct sockaddr*) &local, sizeof(local));
433 if (ipv6_pktinfo(fd) < 0)
436 if (catta_set_cloexec(fd) < 0) {
437 catta_log_warn("FD_CLOEXEC failed: %s", errnostrsocket());
441 if (catta_set_nonblock(fd) < 0) {
442 catta_log_warn("O_NONBLOCK failed: %s", errnostrsocket());
455 static int sendmsg_loop(int fd, struct msghdr *msg, int flags) {
461 if (sendmsg(fd, msg, flags) >= 0)
467 if (errno != EAGAIN && errno != EWOULDBLOCK) {
469 struct sockaddr *sa = msg->msg_name;
471 if(sa->sa_family == AF_INET)
472 inet_ntop(sa->sa_family, &((struct sockaddr_in *)sa)->sin_addr, where, sizeof(where));
474 inet_ntop(sa->sa_family, &((struct sockaddr_in6 *)sa)->sin6_addr, where, sizeof(where));
475 catta_log_debug("sendmsg() to %s failed: %s", where, errnostrsocket());
479 if (catta_wait_for_write(fd) < 0)
486 int catta_send_dns_packet_ipv4(
490 const CattaIPv4Address *src_address,
491 const CattaIPv4Address *dst_address,
494 struct sockaddr_in sa;
498 struct cmsghdr *cmsg;
499 size_t cmsg_data[( CMSG_SPACE(sizeof(struct in_pktinfo)) / sizeof(size_t)) + 1];
500 #elif !defined(IP_MULTICAST_IF) && defined(IP_SENDSRCADDR)
501 struct cmsghdr *cmsg;
502 size_t cmsg_data[( CMSG_SPACE(sizeof(struct in_addr)) / sizeof(size_t)) + 1];
507 assert(catta_dns_packet_check_valid(p) >= 0);
508 assert(!dst_address || dst_port > 0);
511 mdns_mcast_group_ipv4(&sa);
513 ipv4_address_to_sockaddr(&sa, dst_address, dst_port);
515 memset(&io, 0, sizeof(io));
516 io.iov_base = CATTA_DNS_PACKET_DATA(p);
517 io.iov_len = p->size;
519 memset(&msg, 0, sizeof(msg));
521 msg.msg_namelen = sizeof(sa);
525 msg.msg_control = NULL;
526 msg.msg_controllen = 0;
529 if (iface > 0 || src_address) {
530 struct in_pktinfo *pkti;
532 memset(cmsg_data, 0, sizeof(cmsg_data));
533 msg.msg_control = cmsg_data;
534 msg.msg_controllen = CMSG_LEN(sizeof(struct in_pktinfo));
536 cmsg = CMSG_FIRSTHDR(&msg);
537 cmsg->cmsg_len = msg.msg_controllen;
538 cmsg->cmsg_level = IPPROTO_IP;
539 cmsg->cmsg_type = IP_PKTINFO;
541 pkti = (struct in_pktinfo*) CMSG_DATA(cmsg);
544 pkti->ipi_ifindex = iface;
546 #ifdef HAVE_IPI_SPEC_DST
548 pkti->ipi_spec_dst.s_addr = src_address->address;
551 pkti->ipi_addr.s_addr = src_address->address;
554 #elif defined(IP_MULTICAST_IF)
556 struct in_addr any = { INADDR_ANY };
557 if (setsockopt(fd, IPPROTO_IP, IP_MULTICAST_IF, (void *)(src_address ? &src_address->address : &any), sizeof(struct in_addr)) < 0) {
558 catta_log_warn("IP_MULTICAST_IF failed: %s", errnostrsocket());
562 #elif defined(IP_SENDSRCADDR)
564 struct in_addr *addr;
566 memset(cmsg_data, 0, sizeof(cmsg_data));
567 msg.msg_control = cmsg_data;
568 msg.msg_controllen = CMSG_LEN(sizeof(struct in_addr));
570 cmsg = CMSG_FIRSTHDR(&msg);
571 cmsg->cmsg_len = msg.msg_controllen;
572 cmsg->cmsg_level = IPPROTO_IP;
573 cmsg->cmsg_type = IP_SENDSRCADDR;
575 addr = (struct in_addr *)CMSG_DATA(cmsg);
576 addr->s_addr = src_address->address;
578 #elif defined(__GNUC__)
579 #warning "FIXME: We need some code to set the outgoing interface/local address here if IP_PKTINFO/IP_MULTICAST_IF is not available"
582 return sendmsg_loop(fd, &msg, 0);
585 int catta_send_dns_packet_ipv6(
589 const CattaIPv6Address *src_address,
590 const CattaIPv6Address *dst_address,
593 struct sockaddr_in6 sa;
596 struct cmsghdr *cmsg;
597 size_t cmsg_data[(CMSG_SPACE(sizeof(struct in6_pktinfo))/sizeof(size_t)) + 1];
601 assert(catta_dns_packet_check_valid(p) >= 0);
602 assert(!dst_address || dst_port > 0);
605 mdns_mcast_group_ipv6(&sa);
607 ipv6_address_to_sockaddr(&sa, dst_address, dst_port);
609 memset(&io, 0, sizeof(io));
610 io.iov_base = CATTA_DNS_PACKET_DATA(p);
611 io.iov_len = p->size;
613 memset(&msg, 0, sizeof(msg));
615 msg.msg_namelen = sizeof(sa);
620 if (iface > 0 || src_address) {
621 struct in6_pktinfo *pkti;
623 memset(cmsg_data, 0, sizeof(cmsg_data));
624 msg.msg_control = cmsg_data;
625 msg.msg_controllen = CMSG_LEN(sizeof(struct in6_pktinfo));
627 cmsg = CMSG_FIRSTHDR(&msg);
628 cmsg->cmsg_len = msg.msg_controllen;
629 cmsg->cmsg_level = IPPROTO_IPV6;
630 cmsg->cmsg_type = IPV6_PKTINFO;
632 pkti = (struct in6_pktinfo*) CMSG_DATA(cmsg);
635 pkti->ipi6_ifindex = iface;
638 memcpy(&pkti->ipi6_addr, src_address->address, sizeof(src_address->address));
640 msg.msg_control = NULL;
641 msg.msg_controllen = 0;
644 return sendmsg_loop(fd, &msg, 0);
647 CattaDnsPacket *catta_recv_dns_packet_ipv4(
649 CattaIPv4Address *ret_src_address,
650 uint16_t *ret_src_port,
651 CattaIPv4Address *ret_dst_address,
652 CattaIfIndex *ret_iface,
655 CattaDnsPacket *p= NULL;
658 size_t aux[1024 / sizeof(size_t)]; /* for alignment on ia64 ! */
660 struct cmsghdr *cmsg;
663 struct sockaddr_in sa;
667 if (ioctl(fd, FIONREAD, &ms) < 0) {
668 catta_log_warn("ioctl(): %s", errnostrsocket());
673 catta_log_warn("FIONREAD returned negative value.");
677 p = catta_dns_packet_new(ms + CATTA_DNS_PACKET_EXTRA_SIZE);
679 io.iov_base = CATTA_DNS_PACKET_DATA(p);
680 io.iov_len = p->max_size;
682 memset(&msg, 0, sizeof(msg));
684 msg.msg_namelen = sizeof(sa);
687 msg.msg_control = aux;
688 msg.msg_controllen = sizeof(aux);
691 if ((l = recvmsg(fd, &msg, 0)) < 0) {
692 /* Linux returns EAGAIN when an invalid IP packet has been
693 received. We suppress warnings in this case because this might
694 create quite a bit of log traffic on machines with unstable
698 catta_log_warn("recvmsg(): %s", errnostrsocket());
703 /* For corrupt packets FIONREAD returns zero size (See rhbz #607297). So
704 * fail after having read them. */
708 if (sa.sin_addr.s_addr == INADDR_ANY)
709 /* Linux 2.4 behaves very strangely sometimes! */
712 assert(!(msg.msg_flags & MSG_CTRUNC));
713 assert(!(msg.msg_flags & MSG_TRUNC));
715 p->size = (size_t) l;
718 *ret_src_port = catta_port_from_sockaddr((struct sockaddr*) &sa);
720 if (ret_src_address) {
722 catta_address_from_sockaddr((struct sockaddr*) &sa, &a);
723 *ret_src_address = a.data.ipv4;
730 *ret_iface = CATTA_IF_UNSPEC;
732 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
734 if (cmsg->cmsg_level == IPPROTO_IP) {
736 switch (cmsg->cmsg_type) {
742 *ret_ttl = (uint8_t) (*(int *) CMSG_DATA(cmsg));
748 struct in_pktinfo *i = (struct in_pktinfo*) CMSG_DATA(cmsg);
750 if (ret_iface && i->ipi_ifindex > 0)
751 *ret_iface = (int) i->ipi_ifindex;
754 ret_dst_address->address = i->ipi_addr.s_addr;
764 struct sockaddr_dl *sdl = (struct sockaddr_dl *) CMSG_DATA (cmsg);
768 if (*(uint_t*) sdl > 0)
769 *ret_iface = *(uint_t*) sdl;
772 if (sdl->sdl_index > 0)
773 *ret_iface = (int) sdl->sdl_index;
781 #ifdef IP_RECVDSTADDR
784 memcpy(&ret_dst_address->address, CMSG_DATA (cmsg), 4);
791 catta_log_warn("Unhandled cmsg_type: %d", cmsg->cmsg_type);
803 catta_dns_packet_free(p);
808 CattaDnsPacket *catta_recv_dns_packet_ipv6(
810 CattaIPv6Address *ret_src_address,
811 uint16_t *ret_src_port,
812 CattaIPv6Address *ret_dst_address,
813 CattaIfIndex *ret_iface,
816 CattaDnsPacket *p = NULL;
819 size_t aux[1024 / sizeof(size_t)];
822 struct cmsghdr *cmsg;
823 int found_ttl = 0, found_iface = 0;
824 struct sockaddr_in6 sa;
828 if (ioctl(fd, FIONREAD, &ms) < 0) {
829 catta_log_warn("ioctl(): %s", errnostrsocket());
834 catta_log_warn("FIONREAD returned negative value.");
838 p = catta_dns_packet_new(ms + CATTA_DNS_PACKET_EXTRA_SIZE);
840 io.iov_base = CATTA_DNS_PACKET_DATA(p);
841 io.iov_len = p->max_size;
843 memset(&msg, 0, sizeof(msg));
844 msg.msg_name = (struct sockaddr*) &sa;
845 msg.msg_namelen = sizeof(sa);
849 msg.msg_control = aux;
850 msg.msg_controllen = sizeof(aux);
853 if ((l = recvmsg(fd, &msg, 0)) < 0) {
854 /* Linux returns EAGAIN when an invalid IP packet has been
855 received. We suppress warnings in this case because this might
856 create quite a bit of log traffic on machines with unstable
860 catta_log_warn("recvmsg(): %s", errnostrsocket());
865 /* For corrupt packets FIONREAD returns zero size (See rhbz #607297). So
866 * fail after having read them. */
870 assert(!(msg.msg_flags & MSG_CTRUNC));
871 assert(!(msg.msg_flags & MSG_TRUNC));
873 p->size = (size_t) l;
876 *ret_src_port = catta_port_from_sockaddr((struct sockaddr*) &sa);
878 if (ret_src_address) {
880 catta_address_from_sockaddr((struct sockaddr*) &sa, &a);
881 *ret_src_address = a.data.ipv6;
884 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
886 if (cmsg->cmsg_level == IPPROTO_IPV6) {
888 switch (cmsg->cmsg_type) {
893 *ret_ttl = (uint8_t) (*(int *) CMSG_DATA(cmsg));
900 struct in6_pktinfo *i = (struct in6_pktinfo*) CMSG_DATA(cmsg);
902 if (ret_iface && i->ipi6_ifindex > 0)
903 *ret_iface = i->ipi6_ifindex;
906 memcpy(ret_dst_address->address, i->ipi6_addr.s6_addr, 16);
913 catta_log_warn("Unhandled cmsg_type: %d", cmsg->cmsg_type);
926 catta_dns_packet_free(p);
931 int catta_open_unicast_socket_ipv4(void) {
932 struct sockaddr_in local;
935 if ((fd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
936 catta_log_warn("socket() failed: %s", errnostrsocket());
940 memset(&local, 0, sizeof(local));
941 local.sin_family = AF_INET;
943 if (bind(fd, (struct sockaddr*) &local, sizeof(local)) < 0) {
944 catta_log_warn("bind() failed: %s", errnostrsocket());
948 if (ipv4_pktinfo(fd) < 0) {
952 if (catta_set_cloexec(fd) < 0) {
953 catta_log_warn("FD_CLOEXEC failed: %s", errnostrsocket());
957 if (catta_set_nonblock(fd) < 0) {
958 catta_log_warn("O_NONBLOCK failed: %s", errnostrsocket());
971 int catta_open_unicast_socket_ipv6(void) {
972 struct sockaddr_in6 local;
975 if ((fd = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
976 catta_log_warn("socket() failed: %s", errnostrsocket());
981 if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (void *)&yes, sizeof(yes)) < 0) {
982 catta_log_warn("IPV6_V6ONLY failed: %s", errnostrsocket());
986 memset(&local, 0, sizeof(local));
987 local.sin6_family = AF_INET6;
989 if (bind(fd, (struct sockaddr*) &local, sizeof(local)) < 0) {
990 catta_log_warn("bind() failed: %s", errnostrsocket());
994 if (ipv6_pktinfo(fd) < 0)
997 if (catta_set_cloexec(fd) < 0) {
998 catta_log_warn("FD_CLOEXEC failed: %s", errnostrsocket());
1002 if (catta_set_nonblock(fd) < 0) {
1003 catta_log_warn("O_NONBLOCK failed: %s", errnostrsocket());