2 This file is part of catta.
4 catta is free software; you can redistribute it and/or modify it
5 under the terms of the GNU Lesser General Public License as
6 published by the Free Software Foundation; either version 2.1 of the
7 License, or (at your option) any later version.
9 catta is distributed in the hope that it will be useful, but WITHOUT
10 ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
11 or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General
12 Public License for more details.
14 You should have received a copy of the GNU Lesser General Public
15 License along with catta; if not, write to the Free Software
16 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
31 #include <sys/ioctl.h>
32 #ifdef HAVE_SYS_FILIO_H
33 #include <sys/filio.h>
37 #include <sys/types.h>
38 #include <sys/socket.h>
39 #include <netinet/in.h>
40 #include <arpa/inet.h>
45 #include <net/if_dl.h>
48 #include <catta/log.h>
52 #include "addr-util.h"
55 /* this is a portability hack */
56 #ifndef IPV6_ADD_MEMBERSHIP
57 #ifdef IPV6_JOIN_GROUP
58 #define IPV6_ADD_MEMBERSHIP IPV6_JOIN_GROUP
62 #ifndef IPV6_DROP_MEMBERSHIP
63 #ifdef IPV6_LEAVE_GROUP
64 #define IPV6_DROP_MEMBERSHIP IPV6_LEAVE_GROUP
68 static void mdns_mcast_group_ipv4(struct sockaddr_in *ret_sa) {
71 memset(ret_sa, 0, sizeof(struct sockaddr_in));
72 ret_sa->sin_family = AF_INET;
73 ret_sa->sin_port = htons(CATTA_MDNS_PORT);
74 inet_pton(AF_INET, CATTA_IPV4_MCAST_GROUP, &ret_sa->sin_addr);
77 static void mdns_mcast_group_ipv6(struct sockaddr_in6 *ret_sa) {
80 memset(ret_sa, 0, sizeof(struct sockaddr_in6));
81 ret_sa->sin6_family = AF_INET6;
82 ret_sa->sin6_port = htons(CATTA_MDNS_PORT);
83 inet_pton(AF_INET6, CATTA_IPV6_MCAST_GROUP, &ret_sa->sin6_addr);
86 static void ipv4_address_to_sockaddr(struct sockaddr_in *ret_sa, const CattaIPv4Address *a, uint16_t port) {
91 memset(ret_sa, 0, sizeof(struct sockaddr_in));
92 ret_sa->sin_family = AF_INET;
93 ret_sa->sin_port = htons(port);
94 memcpy(&ret_sa->sin_addr, a, sizeof(CattaIPv4Address));
97 static void ipv6_address_to_sockaddr(struct sockaddr_in6 *ret_sa, const CattaIPv6Address *a, uint16_t port) {
102 memset(ret_sa, 0, sizeof(struct sockaddr_in6));
103 ret_sa->sin6_family = AF_INET6;
104 ret_sa->sin6_port = htons(port);
105 memcpy(&ret_sa->sin6_addr, a, sizeof(CattaIPv6Address));
108 int catta_mdns_mcast_join_ipv4(int fd, const CattaIPv4Address *a, int idx, int join) {
109 #ifdef HAVE_STRUCT_IP_MREQN
110 struct ip_mreqn mreq;
114 struct sockaddr_in sa;
120 memset(&mreq, 0, sizeof(mreq));
121 #ifdef HAVE_STRUCT_IP_MREQN
122 mreq.imr_ifindex = idx;
123 mreq.imr_address.s_addr = a->address;
125 mreq.imr_interface.s_addr = a->address;
127 mdns_mcast_group_ipv4(&sa);
128 mreq.imr_multiaddr = sa.sin_addr;
130 /* Some network drivers have issues with dropping membership of
131 * mcast groups when the iface is down, but don't allow rejoining
132 * when it comes back up. This is an ugly workaround */
134 setsockopt(fd, IPPROTO_IP, IP_DROP_MEMBERSHIP, (void *)&mreq, sizeof(mreq));
136 if (setsockopt(fd, IPPROTO_IP, join ? IP_ADD_MEMBERSHIP : IP_DROP_MEMBERSHIP, (void *)&mreq, sizeof(mreq)) < 0) {
137 catta_log_warn("%s failed: %s", join ? "IP_ADD_MEMBERSHIP" : "IP_DROP_MEMBERSHIP", errnostrsocket());
144 int catta_mdns_mcast_join_ipv6(int fd, const CattaIPv6Address *a, int idx, int join) {
145 struct ipv6_mreq mreq6;
146 struct sockaddr_in6 sa6;
152 memset(&mreq6, 0, sizeof(mreq6));
153 mdns_mcast_group_ipv6 (&sa6);
154 mreq6.ipv6mr_multiaddr = sa6.sin6_addr;
155 mreq6.ipv6mr_interface = idx;
158 setsockopt(fd, IPPROTO_IPV6, IPV6_DROP_MEMBERSHIP, (void *)&mreq6, sizeof(mreq6));
160 if (setsockopt(fd, IPPROTO_IPV6, join ? IPV6_ADD_MEMBERSHIP : IPV6_DROP_MEMBERSHIP, (void *)&mreq6, sizeof(mreq6)) < 0) {
161 catta_log_warn("%s failed: %s", join ? "IPV6_ADD_MEMBERSHIP" : "IPV6_DROP_MEMBERSHIP", errnostrsocket());
168 static int reuseaddr(int fd) {
172 if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (void *)&yes, sizeof(yes)) < 0) {
173 catta_log_warn("SO_REUSEADDR failed: %s", errnostrsocket());
179 if (setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, (void *)&yes, sizeof(yes)) < 0) {
180 catta_log_warn("SO_REUSEPORT failed: %s", errnostrsocket());
188 static int bind_with_warn(int fd, const struct sockaddr *sa, socklen_t l) {
195 // Windows does not allow address reuse when SO_REUSEADDR was set after
196 // bind() on the first socket, so we must set it before.
197 // Note that this spoils the detection trickery below and the warning will
200 if (reuseaddr(fd) < 0)
204 if (bind(fd, sa, l) < 0) {
206 if (errno != EADDRINUSE) {
207 catta_log_warn("bind() failed: %s", errnostrsocket());
211 catta_log_warn("*** WARNING: Detected another %s mDNS stack running on this host. This makes mDNS unreliable and is thus not recommended. ***",
212 sa->sa_family == AF_INET ? "IPv4" : "IPv6");
214 /* Try again, this time with SO_REUSEADDR set */
215 if (reuseaddr(fd) < 0)
218 if (bind(fd, sa, l) < 0) {
219 catta_log_warn("bind() failed: %s", errnostrsocket());
224 /* We enable SO_REUSEADDR afterwards, to make sure that the
225 * user may run other mDNS implementations if he really
228 if (reuseaddr(fd) < 0)
235 static int ipv4_pktinfo(int fd) {
240 if (setsockopt(fd, IPPROTO_IP, IP_PKTINFO, (void *)&yes, sizeof(yes)) < 0) {
241 catta_log_warn("IP_PKTINFO failed: %s", errnostrsocket());
246 #ifdef IP_RECVINTERFACE
248 if (setsockopt (fd, IPPROTO_IP, IP_RECVINTERFACE, (void *)&yes, sizeof(yes)) < 0) {
249 catta_log_warn("IP_RECVINTERFACE failed: %s", errnostrsocket());
252 #elif defined(IP_RECVIF)
254 if (setsockopt (fd, IPPROTO_IP, IP_RECVIF, (void *)&yes, sizeof(yes)) < 0) {
255 catta_log_warn("IP_RECVIF failed: %s", errnostrsocket());
260 #ifdef IP_RECVDSTADDR
262 if (setsockopt (fd, IPPROTO_IP, IP_RECVDSTADDR, (void *)&yes, sizeof(yes)) < 0) {
263 catta_log_warn("IP_RECVDSTADDR failed: %s", errnostrsocket());
268 #endif /* IP_PKTINFO */
272 if (setsockopt(fd, IPPROTO_IP, IP_RECVTTL, (void *)&yes, sizeof(yes)) < 0) {
273 catta_log_warn("IP_RECVTTL failed: %s", errnostrsocket());
281 static int ipv6_pktinfo(int fd) {
284 #ifdef IPV6_RECVPKTINFO
286 if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVPKTINFO, (void *)&yes, sizeof(yes)) < 0) {
287 catta_log_warn("IPV6_RECVPKTINFO failed: %s", errnostrsocket());
290 #elif defined(IPV6_PKTINFO)
292 if (setsockopt(fd, IPPROTO_IPV6, IPV6_PKTINFO, (void *)&yes, sizeof(yes)) < 0) {
293 catta_log_warn("IPV6_PKTINFO failed: %s", errnostrsocket());
300 if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVHOPS, (void *)&yes, sizeof(yes)) < 0) {
301 catta_log_warn("IPV6_RECVHOPS failed: %s", errnostrsocket());
304 #elif defined(IPV6_RECVHOPLIMIT)
306 if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVHOPLIMIT, (void *)&yes, sizeof(yes)) < 0) {
307 catta_log_warn("IPV6_RECVHOPLIMIT failed: %s", errnostrsocket());
310 #elif defined(IPV6_HOPLIMIT)
312 if (setsockopt(fd, IPPROTO_IPV6, IPV6_HOPLIMIT, (void *)&yes, sizeof(yes)) < 0) {
313 catta_log_warn("IPV6_HOPLIMIT failed: %s", errnostrsocket());
321 int catta_open_socket_ipv4(int no_reuse) {
322 struct sockaddr_in local;
323 int fd = -1, r, ittl;
326 if ((fd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
327 catta_log_warn("socket() failed: %s", errnostrsocket());
332 if (setsockopt(fd, IPPROTO_IP, IP_MULTICAST_TTL, (void *)&ttl, sizeof(ttl)) < 0) {
333 catta_log_warn("IP_MULTICAST_TTL failed: %s", errnostrsocket());
338 if (setsockopt(fd, IPPROTO_IP, IP_TTL, (void *)&ittl, sizeof(ittl)) < 0) {
339 catta_log_warn("IP_TTL failed: %s", errnostrsocket());
344 if (setsockopt(fd, IPPROTO_IP, IP_MULTICAST_LOOP, (void *)&cyes, sizeof(cyes)) < 0) {
345 catta_log_warn("IP_MULTICAST_LOOP failed: %s", errnostrsocket());
349 memset(&local, 0, sizeof(local));
350 local.sin_family = AF_INET;
351 local.sin_port = htons(CATTA_MDNS_PORT);
354 r = bind(fd, (struct sockaddr*) &local, sizeof(local));
356 r = bind_with_warn(fd, (struct sockaddr*) &local, sizeof(local));
361 if (ipv4_pktinfo (fd) < 0)
364 if (catta_set_cloexec(fd) < 0) {
365 catta_log_warn("FD_CLOEXEC failed: %s", errnostrsocket());
369 if (catta_set_nonblock(fd) < 0) {
370 catta_log_warn("O_NONBLOCK failed: %s", errnostrsocket());
383 int catta_open_socket_ipv6(int no_reuse) {
384 struct sockaddr_in6 sa, local;
388 mdns_mcast_group_ipv6(&sa);
390 if ((fd = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
391 catta_log_warn("socket() failed: %s", errnostrsocket());
396 if (setsockopt(fd, IPPROTO_IPV6, IPV6_MULTICAST_HOPS, (void *)&ttl, sizeof(ttl)) < 0) {
397 catta_log_warn("IPV6_MULTICAST_HOPS failed: %s", errnostrsocket());
402 if (setsockopt(fd, IPPROTO_IPV6, IPV6_UNICAST_HOPS, (void *)&ttl, sizeof(ttl)) < 0) {
403 catta_log_warn("IPV6_UNICAST_HOPS failed: %s", errnostrsocket());
408 if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (void *)&yes, sizeof(yes)) < 0) {
409 catta_log_warn("IPV6_V6ONLY failed: %s", errnostrsocket());
414 if (setsockopt(fd, IPPROTO_IPV6, IPV6_MULTICAST_LOOP, (void *)&yes, sizeof(yes)) < 0) {
415 catta_log_warn("IPV6_MULTICAST_LOOP failed: %s", errnostrsocket());
419 memset(&local, 0, sizeof(local));
420 local.sin6_family = AF_INET6;
421 local.sin6_port = htons(CATTA_MDNS_PORT);
424 r = bind(fd, (struct sockaddr*) &local, sizeof(local));
426 r = bind_with_warn(fd, (struct sockaddr*) &local, sizeof(local));
431 if (ipv6_pktinfo(fd) < 0)
434 if (catta_set_cloexec(fd) < 0) {
435 catta_log_warn("FD_CLOEXEC failed: %s", errnostrsocket());
439 if (catta_set_nonblock(fd) < 0) {
440 catta_log_warn("O_NONBLOCK failed: %s", errnostrsocket());
453 static int sendmsg_loop(int fd, struct msghdr *msg, int flags) {
459 if (sendmsg(fd, msg, flags) >= 0)
465 if (errno != EAGAIN && errno != EWOULDBLOCK) {
467 struct sockaddr *sa = msg->msg_name;
469 if(sa->sa_family == AF_INET)
470 inet_ntop(sa->sa_family, &((struct sockaddr_in *)sa)->sin_addr, where, sizeof(where));
472 inet_ntop(sa->sa_family, &((struct sockaddr_in6 *)sa)->sin6_addr, where, sizeof(where));
473 catta_log_debug("sendmsg() to %s failed: %s", where, errnostrsocket());
477 if (catta_wait_for_write(fd) < 0)
484 int catta_send_dns_packet_ipv4(
488 const CattaIPv4Address *src_address,
489 const CattaIPv4Address *dst_address,
492 struct sockaddr_in sa;
496 struct cmsghdr *cmsg;
497 size_t cmsg_data[( CMSG_SPACE(sizeof(struct in_pktinfo)) / sizeof(size_t)) + 1];
498 #elif !defined(IP_MULTICAST_IF) && defined(IP_SENDSRCADDR)
499 struct cmsghdr *cmsg;
500 size_t cmsg_data[( CMSG_SPACE(sizeof(struct in_addr)) / sizeof(size_t)) + 1];
505 assert(catta_dns_packet_check_valid(p) >= 0);
506 assert(!dst_address || dst_port > 0);
509 mdns_mcast_group_ipv4(&sa);
511 ipv4_address_to_sockaddr(&sa, dst_address, dst_port);
513 memset(&io, 0, sizeof(io));
514 io.iov_base = CATTA_DNS_PACKET_DATA(p);
515 io.iov_len = p->size;
517 memset(&msg, 0, sizeof(msg));
519 msg.msg_namelen = sizeof(sa);
523 msg.msg_control = NULL;
524 msg.msg_controllen = 0;
527 if (iface > 0 || src_address) {
528 struct in_pktinfo *pkti;
530 memset(cmsg_data, 0, sizeof(cmsg_data));
531 msg.msg_control = cmsg_data;
532 msg.msg_controllen = CMSG_LEN(sizeof(struct in_pktinfo));
534 cmsg = CMSG_FIRSTHDR(&msg);
535 cmsg->cmsg_len = msg.msg_controllen;
536 cmsg->cmsg_level = IPPROTO_IP;
537 cmsg->cmsg_type = IP_PKTINFO;
539 pkti = (struct in_pktinfo*) CMSG_DATA(cmsg);
542 pkti->ipi_ifindex = iface;
544 #ifdef HAVE_IPI_SPEC_DST
546 pkti->ipi_spec_dst.s_addr = src_address->address;
549 #elif defined(IP_MULTICAST_IF)
551 struct in_addr any = { INADDR_ANY };
552 if (setsockopt(fd, IPPROTO_IP, IP_MULTICAST_IF, (void *)(src_address ? &src_address->address : &any), sizeof(struct in_addr)) < 0) {
553 catta_log_warn("IP_MULTICAST_IF failed: %s", errnostrsocket());
557 #elif defined(IP_SENDSRCADDR)
559 struct in_addr *addr;
561 memset(cmsg_data, 0, sizeof(cmsg_data));
562 msg.msg_control = cmsg_data;
563 msg.msg_controllen = CMSG_LEN(sizeof(struct in_addr));
565 cmsg = CMSG_FIRSTHDR(&msg);
566 cmsg->cmsg_len = msg.msg_controllen;
567 cmsg->cmsg_level = IPPROTO_IP;
568 cmsg->cmsg_type = IP_SENDSRCADDR;
570 addr = (struct in_addr *)CMSG_DATA(cmsg);
571 addr->s_addr = src_address->address;
573 #elif defined(__GNUC__)
574 #warning "FIXME: We need some code to set the outgoing interface/local address here if IP_PKTINFO/IP_MULTICAST_IF is not available"
577 return sendmsg_loop(fd, &msg, 0);
580 int catta_send_dns_packet_ipv6(
584 const CattaIPv6Address *src_address,
585 const CattaIPv6Address *dst_address,
588 struct sockaddr_in6 sa;
591 struct cmsghdr *cmsg;
592 size_t cmsg_data[(CMSG_SPACE(sizeof(struct in6_pktinfo))/sizeof(size_t)) + 1];
596 assert(catta_dns_packet_check_valid(p) >= 0);
597 assert(!dst_address || dst_port > 0);
600 mdns_mcast_group_ipv6(&sa);
602 ipv6_address_to_sockaddr(&sa, dst_address, dst_port);
604 memset(&io, 0, sizeof(io));
605 io.iov_base = CATTA_DNS_PACKET_DATA(p);
606 io.iov_len = p->size;
608 memset(&msg, 0, sizeof(msg));
610 msg.msg_namelen = sizeof(sa);
615 if (iface > 0 || src_address) {
616 struct in6_pktinfo *pkti;
618 memset(cmsg_data, 0, sizeof(cmsg_data));
619 msg.msg_control = cmsg_data;
620 msg.msg_controllen = CMSG_LEN(sizeof(struct in6_pktinfo));
622 cmsg = CMSG_FIRSTHDR(&msg);
623 cmsg->cmsg_len = msg.msg_controllen;
624 cmsg->cmsg_level = IPPROTO_IPV6;
625 cmsg->cmsg_type = IPV6_PKTINFO;
627 pkti = (struct in6_pktinfo*) CMSG_DATA(cmsg);
630 pkti->ipi6_ifindex = iface;
633 memcpy(&pkti->ipi6_addr, src_address->address, sizeof(src_address->address));
635 msg.msg_control = NULL;
636 msg.msg_controllen = 0;
639 return sendmsg_loop(fd, &msg, 0);
642 CattaDnsPacket *catta_recv_dns_packet_ipv4(
644 CattaIPv4Address *ret_src_address,
645 uint16_t *ret_src_port,
646 CattaIPv4Address *ret_dst_address,
647 CattaIfIndex *ret_iface,
650 CattaDnsPacket *p= NULL;
653 size_t aux[1024 / sizeof(size_t)]; /* for alignment on ia64 ! */
655 struct cmsghdr *cmsg;
658 struct sockaddr_in sa;
662 if (ioctl(fd, FIONREAD, &ms) < 0) {
663 catta_log_warn("ioctl(): %s", errnostrsocket());
668 catta_log_warn("FIONREAD returned negative value.");
672 p = catta_dns_packet_new(ms + CATTA_DNS_PACKET_EXTRA_SIZE);
674 io.iov_base = CATTA_DNS_PACKET_DATA(p);
675 io.iov_len = p->max_size;
677 memset(&msg, 0, sizeof(msg));
679 msg.msg_namelen = sizeof(sa);
682 msg.msg_control = aux;
683 msg.msg_controllen = sizeof(aux);
686 if ((l = recvmsg(fd, &msg, 0)) < 0) {
687 /* Linux returns EAGAIN when an invalid IP packet has been
688 received. We suppress warnings in this case because this might
689 create quite a bit of log traffic on machines with unstable
693 catta_log_warn("recvmsg(): %s", errnostrsocket());
698 /* For corrupt packets FIONREAD returns zero size (See rhbz #607297). So
699 * fail after having read them. */
703 if (sa.sin_addr.s_addr == INADDR_ANY)
704 /* Linux 2.4 behaves very strangely sometimes! */
707 assert(!(msg.msg_flags & MSG_CTRUNC));
708 assert(!(msg.msg_flags & MSG_TRUNC));
710 p->size = (size_t) l;
713 *ret_src_port = catta_port_from_sockaddr((struct sockaddr*) &sa);
715 if (ret_src_address) {
717 catta_address_from_sockaddr((struct sockaddr*) &sa, &a);
718 *ret_src_address = a.data.ipv4;
725 *ret_iface = CATTA_IF_UNSPEC;
727 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
729 if (cmsg->cmsg_level == IPPROTO_IP) {
731 switch (cmsg->cmsg_type) {
737 *ret_ttl = (uint8_t) (*(int *) CMSG_DATA(cmsg));
743 struct in_pktinfo *i = (struct in_pktinfo*) CMSG_DATA(cmsg);
745 if (ret_iface && i->ipi_ifindex > 0)
746 *ret_iface = (int) i->ipi_ifindex;
749 ret_dst_address->address = i->ipi_addr.s_addr;
759 struct sockaddr_dl *sdl = (struct sockaddr_dl *) CMSG_DATA (cmsg);
763 if (*(uint_t*) sdl > 0)
764 *ret_iface = *(uint_t*) sdl;
767 if (sdl->sdl_index > 0)
768 *ret_iface = (int) sdl->sdl_index;
776 #ifdef IP_RECVDSTADDR
779 memcpy(&ret_dst_address->address, CMSG_DATA (cmsg), 4);
786 catta_log_warn("Unhandled cmsg_type: %d", cmsg->cmsg_type);
798 catta_dns_packet_free(p);
803 CattaDnsPacket *catta_recv_dns_packet_ipv6(
805 CattaIPv6Address *ret_src_address,
806 uint16_t *ret_src_port,
807 CattaIPv6Address *ret_dst_address,
808 CattaIfIndex *ret_iface,
811 CattaDnsPacket *p = NULL;
814 size_t aux[1024 / sizeof(size_t)];
817 struct cmsghdr *cmsg;
818 int found_ttl = 0, found_iface = 0;
819 struct sockaddr_in6 sa;
823 if (ioctl(fd, FIONREAD, &ms) < 0) {
824 catta_log_warn("ioctl(): %s", errnostrsocket());
829 catta_log_warn("FIONREAD returned negative value.");
833 p = catta_dns_packet_new(ms + CATTA_DNS_PACKET_EXTRA_SIZE);
835 io.iov_base = CATTA_DNS_PACKET_DATA(p);
836 io.iov_len = p->max_size;
838 memset(&msg, 0, sizeof(msg));
839 msg.msg_name = (struct sockaddr*) &sa;
840 msg.msg_namelen = sizeof(sa);
844 msg.msg_control = aux;
845 msg.msg_controllen = sizeof(aux);
848 if ((l = recvmsg(fd, &msg, 0)) < 0) {
849 /* Linux returns EAGAIN when an invalid IP packet has been
850 received. We suppress warnings in this case because this might
851 create quite a bit of log traffic on machines with unstable
855 catta_log_warn("recvmsg(): %s", errnostrsocket());
860 /* For corrupt packets FIONREAD returns zero size (See rhbz #607297). So
861 * fail after having read them. */
865 assert(!(msg.msg_flags & MSG_CTRUNC));
866 assert(!(msg.msg_flags & MSG_TRUNC));
868 p->size = (size_t) l;
871 *ret_src_port = catta_port_from_sockaddr((struct sockaddr*) &sa);
873 if (ret_src_address) {
875 catta_address_from_sockaddr((struct sockaddr*) &sa, &a);
876 *ret_src_address = a.data.ipv6;
879 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
881 if (cmsg->cmsg_level == IPPROTO_IPV6) {
883 switch (cmsg->cmsg_type) {
888 *ret_ttl = (uint8_t) (*(int *) CMSG_DATA(cmsg));
895 struct in6_pktinfo *i = (struct in6_pktinfo*) CMSG_DATA(cmsg);
897 if (ret_iface && i->ipi6_ifindex > 0)
898 *ret_iface = i->ipi6_ifindex;
901 memcpy(ret_dst_address->address, i->ipi6_addr.s6_addr, 16);
908 catta_log_warn("Unhandled cmsg_type: %d", cmsg->cmsg_type);
921 catta_dns_packet_free(p);
926 int catta_open_unicast_socket_ipv4(void) {
927 struct sockaddr_in local;
930 if ((fd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
931 catta_log_warn("socket() failed: %s", errnostrsocket());
935 memset(&local, 0, sizeof(local));
936 local.sin_family = AF_INET;
938 if (bind(fd, (struct sockaddr*) &local, sizeof(local)) < 0) {
939 catta_log_warn("bind() failed: %s", errnostrsocket());
943 if (ipv4_pktinfo(fd) < 0) {
947 if (catta_set_cloexec(fd) < 0) {
948 catta_log_warn("FD_CLOEXEC failed: %s", errnostrsocket());
952 if (catta_set_nonblock(fd) < 0) {
953 catta_log_warn("O_NONBLOCK failed: %s", errnostrsocket());
966 int catta_open_unicast_socket_ipv6(void) {
967 struct sockaddr_in6 local;
970 if ((fd = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
971 catta_log_warn("socket() failed: %s", errnostrsocket());
976 if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (void *)&yes, sizeof(yes)) < 0) {
977 catta_log_warn("IPV6_V6ONLY failed: %s", errnostrsocket());
981 memset(&local, 0, sizeof(local));
982 local.sin6_family = AF_INET6;
984 if (bind(fd, (struct sockaddr*) &local, sizeof(local)) < 0) {
985 catta_log_warn("bind() failed: %s", errnostrsocket());
989 if (ipv6_pktinfo(fd) < 0)
992 if (catta_set_cloexec(fd) < 0) {
993 catta_log_warn("FD_CLOEXEC failed: %s", errnostrsocket());
997 if (catta_set_nonblock(fd) < 0) {
998 catta_log_warn("O_NONBLOCK failed: %s", errnostrsocket());