2 This file is part of catta.
4 catta is free software; you can redistribute it and/or modify it
5 under the terms of the GNU Lesser General Public License as
6 published by the Free Software Foundation; either version 2.1 of the
7 License, or (at your option) any later version.
9 catta is distributed in the hope that it will be useful, but WITHOUT
10 ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
11 or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General
12 Public License for more details.
14 You should have received a copy of the GNU Lesser General Public
15 License along with catta; if not, write to the Free Software
16 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
31 #include <sys/ioctl.h>
32 #ifdef HAVE_SYS_FILIO_H
33 #include <sys/filio.h>
37 #include <sys/types.h>
38 #include <sys/socket.h>
39 #include <netinet/in.h>
40 #include <arpa/inet.h>
45 #include <net/if_dl.h>
48 #include <catta/log.h>
52 #include "addr-util.h"
55 /* this is a portability hack */
56 #ifndef IPV6_ADD_MEMBERSHIP
57 #ifdef IPV6_JOIN_GROUP
58 #define IPV6_ADD_MEMBERSHIP IPV6_JOIN_GROUP
62 #ifndef IPV6_DROP_MEMBERSHIP
63 #ifdef IPV6_LEAVE_GROUP
64 #define IPV6_DROP_MEMBERSHIP IPV6_LEAVE_GROUP
68 static void mdns_mcast_group_ipv4(struct sockaddr_in *ret_sa) {
71 memset(ret_sa, 0, sizeof(struct sockaddr_in));
72 ret_sa->sin_family = AF_INET;
73 ret_sa->sin_port = htons(CATTA_MDNS_PORT);
74 inet_pton(AF_INET, CATTA_IPV4_MCAST_GROUP, &ret_sa->sin_addr);
77 static void mdns_mcast_group_ipv6(struct sockaddr_in6 *ret_sa) {
80 memset(ret_sa, 0, sizeof(struct sockaddr_in6));
81 ret_sa->sin6_family = AF_INET6;
82 ret_sa->sin6_port = htons(CATTA_MDNS_PORT);
83 inet_pton(AF_INET6, CATTA_IPV6_MCAST_GROUP, &ret_sa->sin6_addr);
86 static void ipv4_address_to_sockaddr(struct sockaddr_in *ret_sa, const CattaIPv4Address *a, uint16_t port) {
91 memset(ret_sa, 0, sizeof(struct sockaddr_in));
92 ret_sa->sin_family = AF_INET;
93 ret_sa->sin_port = htons(port);
94 memcpy(&ret_sa->sin_addr, a, sizeof(CattaIPv4Address));
97 static void ipv6_address_to_sockaddr(struct sockaddr_in6 *ret_sa, const CattaIPv6Address *a, uint16_t port) {
102 memset(ret_sa, 0, sizeof(struct sockaddr_in6));
103 ret_sa->sin6_family = AF_INET6;
104 ret_sa->sin6_port = htons(port);
105 memcpy(&ret_sa->sin6_addr, a, sizeof(CattaIPv6Address));
108 int catta_mdns_mcast_join_ipv4(int fd, const CattaIPv4Address *a, int idx, int join) {
109 #ifdef HAVE_STRUCT_IP_MREQN
110 struct ip_mreqn mreq;
114 struct sockaddr_in sa;
120 memset(&mreq, 0, sizeof(mreq));
121 #ifdef HAVE_STRUCT_IP_MREQN
122 mreq.imr_ifindex = idx;
123 mreq.imr_address.s_addr = a->address;
125 mreq.imr_interface.s_addr = a->address;
127 mdns_mcast_group_ipv4(&sa);
128 mreq.imr_multiaddr = sa.sin_addr;
130 /* Some network drivers have issues with dropping membership of
131 * mcast groups when the iface is down, but don't allow rejoining
132 * when it comes back up. This is an ugly workaround */
134 setsockopt(fd, IPPROTO_IP, IP_DROP_MEMBERSHIP, (void *)&mreq, sizeof(mreq));
136 if (setsockopt(fd, IPPROTO_IP, join ? IP_ADD_MEMBERSHIP : IP_DROP_MEMBERSHIP, (void *)&mreq, sizeof(mreq)) < 0) {
137 catta_log_warn("%s failed: %s", join ? "IP_ADD_MEMBERSHIP" : "IP_DROP_MEMBERSHIP", errnostrsocket());
144 int catta_mdns_mcast_join_ipv6(int fd, const CattaIPv6Address *a, int idx, int join) {
145 struct ipv6_mreq mreq6;
146 struct sockaddr_in6 sa6;
152 memset(&mreq6, 0, sizeof(mreq6));
153 mdns_mcast_group_ipv6 (&sa6);
154 mreq6.ipv6mr_multiaddr = sa6.sin6_addr;
155 mreq6.ipv6mr_interface = idx;
158 setsockopt(fd, IPPROTO_IPV6, IPV6_DROP_MEMBERSHIP, (void *)&mreq6, sizeof(mreq6));
160 if (setsockopt(fd, IPPROTO_IPV6, join ? IPV6_ADD_MEMBERSHIP : IPV6_DROP_MEMBERSHIP, (void *)&mreq6, sizeof(mreq6)) < 0) {
161 catta_log_warn("%s failed: %s", join ? "IPV6_ADD_MEMBERSHIP" : "IPV6_DROP_MEMBERSHIP", errnostrsocket());
168 static int reuseaddr(int fd) {
172 if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (void *)&yes, sizeof(yes)) < 0) {
173 catta_log_warn("SO_REUSEADDR failed: %s", errnostrsocket());
179 if (setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, (void *)&yes, sizeof(yes)) < 0) {
180 catta_log_warn("SO_REUSEPORT failed: %s", errnostrsocket());
188 static int bind_with_warn(int fd, const struct sockaddr *sa, socklen_t l) {
195 // Windows does not allow address reuse when SO_REUSEADDR was set after
196 // bind() on the first socket, so we must set it before.
197 // Note that this spoils the detection trickery below and the warning will
200 if (reuseaddr(fd) < 0)
204 if (bind(fd, sa, l) < 0) {
206 if (errno != EADDRINUSE) {
207 catta_log_warn("bind() failed: %s", errnostrsocket());
211 catta_log_warn("*** WARNING: Detected another %s mDNS stack running on this host. This makes mDNS unreliable and is thus not recommended. ***",
212 sa->sa_family == AF_INET ? "IPv4" : "IPv6");
214 /* Try again, this time with SO_REUSEADDR set */
215 if (reuseaddr(fd) < 0)
218 if (bind(fd, sa, l) < 0) {
219 catta_log_warn("bind() failed: %s", errnostrsocket());
224 /* We enable SO_REUSEADDR afterwards, to make sure that the
225 * user may run other mDNS implementations if he really
228 if (reuseaddr(fd) < 0)
235 static int ipv4_pktinfo(int fd) {
240 if (setsockopt(fd, IPPROTO_IP, IP_PKTINFO, (void *)&yes, sizeof(yes)) < 0) {
241 catta_log_warn("IP_PKTINFO failed: %s", errnostrsocket());
246 #ifdef IP_RECVINTERFACE
248 if (setsockopt (fd, IPPROTO_IP, IP_RECVINTERFACE, (void *)&yes, sizeof(yes)) < 0) {
249 catta_log_warn("IP_RECVINTERFACE failed: %s", errnostrsocket());
252 #elif defined(IP_RECVIF)
254 if (setsockopt (fd, IPPROTO_IP, IP_RECVIF, (void *)&yes, sizeof(yes)) < 0) {
255 catta_log_warn("IP_RECVIF failed: %s", errnostrsocket());
260 #ifdef IP_RECVDSTADDR
262 if (setsockopt (fd, IPPROTO_IP, IP_RECVDSTADDR, (void *)&yes, sizeof(yes)) < 0) {
263 catta_log_warn("IP_RECVDSTADDR failed: %s", errnostrsocket());
268 #endif /* IP_PKTINFO */
272 if (setsockopt(fd, IPPROTO_IP, IP_RECVTTL, (void *)&yes, sizeof(yes)) < 0) {
273 catta_log_warn("IP_RECVTTL failed: %s", errnostrsocket());
281 static int ipv6_pktinfo(int fd) {
284 #ifdef IPV6_RECVPKTINFO
286 if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVPKTINFO, (void *)&yes, sizeof(yes)) < 0) {
287 catta_log_warn("IPV6_RECVPKTINFO failed: %s", errnostrsocket());
290 #elif defined(IPV6_PKTINFO)
292 if (setsockopt(fd, IPPROTO_IPV6, IPV6_PKTINFO, (void *)&yes, sizeof(yes)) < 0) {
293 catta_log_warn("IPV6_PKTINFO failed: %s", errnostrsocket());
300 if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVHOPS, (void *)&yes, sizeof(yes)) < 0) {
301 catta_log_warn("IPV6_RECVHOPS failed: %s", errnostrsocket());
304 #elif defined(IPV6_RECVHOPLIMIT)
306 if (setsockopt(fd, IPPROTO_IPV6, IPV6_RECVHOPLIMIT, (void *)&yes, sizeof(yes)) < 0) {
307 catta_log_warn("IPV6_RECVHOPLIMIT failed: %s", errnostrsocket());
310 #elif defined(IPV6_HOPLIMIT)
312 if (setsockopt(fd, IPPROTO_IPV6, IPV6_HOPLIMIT, (void *)&yes, sizeof(yes)) < 0) {
313 catta_log_warn("IPV6_HOPLIMIT failed: %s", errnostrsocket());
321 int catta_open_socket_ipv4(int no_reuse) {
322 struct sockaddr_in local;
323 int fd = -1, r, ittl;
326 if ((fd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
327 catta_log_warn("socket() failed: %s", errnostrsocket());
332 if (setsockopt(fd, IPPROTO_IP, IP_MULTICAST_TTL, (void *)&ttl, sizeof(ttl)) < 0) {
333 catta_log_warn("IP_MULTICAST_TTL failed: %s", errnostrsocket());
338 if (setsockopt(fd, IPPROTO_IP, IP_TTL, (void *)&ittl, sizeof(ittl)) < 0) {
339 catta_log_warn("IP_TTL failed: %s", errnostrsocket());
344 if (setsockopt(fd, IPPROTO_IP, IP_MULTICAST_LOOP, (void *)&cyes, sizeof(cyes)) < 0) {
345 catta_log_warn("IP_MULTICAST_LOOP failed: %s", errnostrsocket());
349 memset(&local, 0, sizeof(local));
350 local.sin_family = AF_INET;
351 local.sin_port = htons(CATTA_MDNS_PORT);
354 r = bind(fd, (struct sockaddr*) &local, sizeof(local));
356 r = bind_with_warn(fd, (struct sockaddr*) &local, sizeof(local));
361 if (ipv4_pktinfo (fd) < 0)
364 if (catta_set_cloexec(fd) < 0) {
365 catta_log_warn("FD_CLOEXEC failed: %s", errnostrsocket());
369 if (catta_set_nonblock(fd) < 0) {
370 catta_log_warn("O_NONBLOCK failed: %s", errnostrsocket());
383 int catta_open_socket_ipv6(int no_reuse) {
384 struct sockaddr_in6 sa, local;
388 mdns_mcast_group_ipv6(&sa);
390 if ((fd = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
391 catta_log_warn("socket() failed: %s", errnostrsocket());
396 if (setsockopt(fd, IPPROTO_IPV6, IPV6_MULTICAST_HOPS, (void *)&ttl, sizeof(ttl)) < 0) {
397 catta_log_warn("IPV6_MULTICAST_HOPS failed: %s", errnostrsocket());
402 if (setsockopt(fd, IPPROTO_IPV6, IPV6_UNICAST_HOPS, (void *)&ttl, sizeof(ttl)) < 0) {
403 catta_log_warn("IPV6_UNICAST_HOPS failed: %s", errnostrsocket());
408 if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (void *)&yes, sizeof(yes)) < 0) {
409 catta_log_warn("IPV6_V6ONLY failed: %s", errnostrsocket());
414 if (setsockopt(fd, IPPROTO_IPV6, IPV6_MULTICAST_LOOP, (void *)&yes, sizeof(yes)) < 0) {
415 catta_log_warn("IPV6_MULTICAST_LOOP failed: %s", errnostrsocket());
419 memset(&local, 0, sizeof(local));
420 local.sin6_family = AF_INET6;
421 local.sin6_port = htons(CATTA_MDNS_PORT);
424 r = bind(fd, (struct sockaddr*) &local, sizeof(local));
426 r = bind_with_warn(fd, (struct sockaddr*) &local, sizeof(local));
431 if (ipv6_pktinfo(fd) < 0)
434 if (catta_set_cloexec(fd) < 0) {
435 catta_log_warn("FD_CLOEXEC failed: %s", errnostrsocket());
439 if (catta_set_nonblock(fd) < 0) {
440 catta_log_warn("O_NONBLOCK failed: %s", errnostrsocket());
453 static int sendmsg_loop(int fd, struct msghdr *msg, int flags) {
459 if (sendmsg(fd, msg, flags) >= 0)
465 if (errno != EAGAIN && errno != EWOULDBLOCK) {
467 struct sockaddr *sa = msg->msg_name;
469 if(sa->sa_family == AF_INET)
470 inet_ntop(sa->sa_family, &((struct sockaddr_in *)sa)->sin_addr, where, sizeof(where));
472 inet_ntop(sa->sa_family, &((struct sockaddr_in6 *)sa)->sin6_addr, where, sizeof(where));
473 catta_log_debug("sendmsg() to %s failed: %s", where, errnostrsocket());
477 if (catta_wait_for_write(fd) < 0)
484 int catta_send_dns_packet_ipv4(
488 const CattaIPv4Address *src_address,
489 const CattaIPv4Address *dst_address,
492 struct sockaddr_in sa;
496 struct cmsghdr *cmsg;
497 size_t cmsg_data[( CMSG_SPACE(sizeof(struct in_pktinfo)) / sizeof(size_t)) + 1];
498 #elif !defined(IP_MULTICAST_IF) && defined(IP_SENDSRCADDR)
499 struct cmsghdr *cmsg;
500 size_t cmsg_data[( CMSG_SPACE(sizeof(struct in_addr)) / sizeof(size_t)) + 1];
505 assert(catta_dns_packet_check_valid(p) >= 0);
506 assert(!dst_address || dst_port > 0);
509 mdns_mcast_group_ipv4(&sa);
511 ipv4_address_to_sockaddr(&sa, dst_address, dst_port);
513 memset(&io, 0, sizeof(io));
514 io.iov_base = CATTA_DNS_PACKET_DATA(p);
515 io.iov_len = p->size;
517 memset(&msg, 0, sizeof(msg));
519 msg.msg_namelen = sizeof(sa);
523 msg.msg_control = NULL;
524 msg.msg_controllen = 0;
527 if (iface > 0 || src_address) {
528 struct in_pktinfo *pkti;
530 memset(cmsg_data, 0, sizeof(cmsg_data));
531 msg.msg_control = cmsg_data;
532 msg.msg_controllen = CMSG_LEN(sizeof(struct in_pktinfo));
534 cmsg = CMSG_FIRSTHDR(&msg);
535 cmsg->cmsg_len = msg.msg_controllen;
536 cmsg->cmsg_level = IPPROTO_IP;
537 cmsg->cmsg_type = IP_PKTINFO;
539 pkti = (struct in_pktinfo*) CMSG_DATA(cmsg);
542 pkti->ipi_ifindex = iface;
544 #ifdef HAVE_IPI_SPEC_DST
546 pkti->ipi_spec_dst.s_addr = src_address->address;
549 pkti->ipi_addr.s_addr = src_address->address;
552 #elif defined(IP_MULTICAST_IF)
554 struct in_addr any = { INADDR_ANY };
555 if (setsockopt(fd, IPPROTO_IP, IP_MULTICAST_IF, (void *)(src_address ? &src_address->address : &any), sizeof(struct in_addr)) < 0) {
556 catta_log_warn("IP_MULTICAST_IF failed: %s", errnostrsocket());
560 #elif defined(IP_SENDSRCADDR)
562 struct in_addr *addr;
564 memset(cmsg_data, 0, sizeof(cmsg_data));
565 msg.msg_control = cmsg_data;
566 msg.msg_controllen = CMSG_LEN(sizeof(struct in_addr));
568 cmsg = CMSG_FIRSTHDR(&msg);
569 cmsg->cmsg_len = msg.msg_controllen;
570 cmsg->cmsg_level = IPPROTO_IP;
571 cmsg->cmsg_type = IP_SENDSRCADDR;
573 addr = (struct in_addr *)CMSG_DATA(cmsg);
574 addr->s_addr = src_address->address;
576 #elif defined(__GNUC__)
577 #warning "FIXME: We need some code to set the outgoing interface/local address here if IP_PKTINFO/IP_MULTICAST_IF is not available"
580 return sendmsg_loop(fd, &msg, 0);
583 int catta_send_dns_packet_ipv6(
587 const CattaIPv6Address *src_address,
588 const CattaIPv6Address *dst_address,
591 struct sockaddr_in6 sa;
594 struct cmsghdr *cmsg;
595 size_t cmsg_data[(CMSG_SPACE(sizeof(struct in6_pktinfo))/sizeof(size_t)) + 1];
599 assert(catta_dns_packet_check_valid(p) >= 0);
600 assert(!dst_address || dst_port > 0);
603 mdns_mcast_group_ipv6(&sa);
605 ipv6_address_to_sockaddr(&sa, dst_address, dst_port);
607 memset(&io, 0, sizeof(io));
608 io.iov_base = CATTA_DNS_PACKET_DATA(p);
609 io.iov_len = p->size;
611 memset(&msg, 0, sizeof(msg));
613 msg.msg_namelen = sizeof(sa);
618 if (iface > 0 || src_address) {
619 struct in6_pktinfo *pkti;
621 memset(cmsg_data, 0, sizeof(cmsg_data));
622 msg.msg_control = cmsg_data;
623 msg.msg_controllen = CMSG_LEN(sizeof(struct in6_pktinfo));
625 cmsg = CMSG_FIRSTHDR(&msg);
626 cmsg->cmsg_len = msg.msg_controllen;
627 cmsg->cmsg_level = IPPROTO_IPV6;
628 cmsg->cmsg_type = IPV6_PKTINFO;
630 pkti = (struct in6_pktinfo*) CMSG_DATA(cmsg);
633 pkti->ipi6_ifindex = iface;
636 memcpy(&pkti->ipi6_addr, src_address->address, sizeof(src_address->address));
638 msg.msg_control = NULL;
639 msg.msg_controllen = 0;
642 return sendmsg_loop(fd, &msg, 0);
645 CattaDnsPacket *catta_recv_dns_packet_ipv4(
647 CattaIPv4Address *ret_src_address,
648 uint16_t *ret_src_port,
649 CattaIPv4Address *ret_dst_address,
650 CattaIfIndex *ret_iface,
653 CattaDnsPacket *p= NULL;
656 size_t aux[1024 / sizeof(size_t)]; /* for alignment on ia64 ! */
658 struct cmsghdr *cmsg;
661 struct sockaddr_in sa;
665 if (ioctl(fd, FIONREAD, &ms) < 0) {
666 catta_log_warn("ioctl(): %s", errnostrsocket());
671 catta_log_warn("FIONREAD returned negative value.");
675 p = catta_dns_packet_new(ms + CATTA_DNS_PACKET_EXTRA_SIZE);
677 io.iov_base = CATTA_DNS_PACKET_DATA(p);
678 io.iov_len = p->max_size;
680 memset(&msg, 0, sizeof(msg));
682 msg.msg_namelen = sizeof(sa);
685 msg.msg_control = aux;
686 msg.msg_controllen = sizeof(aux);
689 if ((l = recvmsg(fd, &msg, 0)) < 0) {
690 /* Linux returns EAGAIN when an invalid IP packet has been
691 received. We suppress warnings in this case because this might
692 create quite a bit of log traffic on machines with unstable
696 catta_log_warn("recvmsg(): %s", errnostrsocket());
701 /* For corrupt packets FIONREAD returns zero size (See rhbz #607297). So
702 * fail after having read them. */
706 if (sa.sin_addr.s_addr == INADDR_ANY)
707 /* Linux 2.4 behaves very strangely sometimes! */
710 assert(!(msg.msg_flags & MSG_CTRUNC));
711 assert(!(msg.msg_flags & MSG_TRUNC));
713 p->size = (size_t) l;
716 *ret_src_port = catta_port_from_sockaddr((struct sockaddr*) &sa);
718 if (ret_src_address) {
720 catta_address_from_sockaddr((struct sockaddr*) &sa, &a);
721 *ret_src_address = a.data.ipv4;
728 *ret_iface = CATTA_IF_UNSPEC;
730 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
732 if (cmsg->cmsg_level == IPPROTO_IP) {
734 switch (cmsg->cmsg_type) {
740 *ret_ttl = (uint8_t) (*(int *) CMSG_DATA(cmsg));
746 struct in_pktinfo *i = (struct in_pktinfo*) CMSG_DATA(cmsg);
748 if (ret_iface && i->ipi_ifindex > 0)
749 *ret_iface = (int) i->ipi_ifindex;
752 ret_dst_address->address = i->ipi_addr.s_addr;
762 struct sockaddr_dl *sdl = (struct sockaddr_dl *) CMSG_DATA (cmsg);
766 if (*(uint_t*) sdl > 0)
767 *ret_iface = *(uint_t*) sdl;
770 if (sdl->sdl_index > 0)
771 *ret_iface = (int) sdl->sdl_index;
779 #ifdef IP_RECVDSTADDR
782 memcpy(&ret_dst_address->address, CMSG_DATA (cmsg), 4);
789 catta_log_warn("Unhandled cmsg_type: %d", cmsg->cmsg_type);
801 catta_dns_packet_free(p);
806 CattaDnsPacket *catta_recv_dns_packet_ipv6(
808 CattaIPv6Address *ret_src_address,
809 uint16_t *ret_src_port,
810 CattaIPv6Address *ret_dst_address,
811 CattaIfIndex *ret_iface,
814 CattaDnsPacket *p = NULL;
817 size_t aux[1024 / sizeof(size_t)];
820 struct cmsghdr *cmsg;
821 int found_ttl = 0, found_iface = 0;
822 struct sockaddr_in6 sa;
826 if (ioctl(fd, FIONREAD, &ms) < 0) {
827 catta_log_warn("ioctl(): %s", errnostrsocket());
832 catta_log_warn("FIONREAD returned negative value.");
836 p = catta_dns_packet_new(ms + CATTA_DNS_PACKET_EXTRA_SIZE);
838 io.iov_base = CATTA_DNS_PACKET_DATA(p);
839 io.iov_len = p->max_size;
841 memset(&msg, 0, sizeof(msg));
842 msg.msg_name = (struct sockaddr*) &sa;
843 msg.msg_namelen = sizeof(sa);
847 msg.msg_control = aux;
848 msg.msg_controllen = sizeof(aux);
851 if ((l = recvmsg(fd, &msg, 0)) < 0) {
852 /* Linux returns EAGAIN when an invalid IP packet has been
853 received. We suppress warnings in this case because this might
854 create quite a bit of log traffic on machines with unstable
858 catta_log_warn("recvmsg(): %s", errnostrsocket());
863 /* For corrupt packets FIONREAD returns zero size (See rhbz #607297). So
864 * fail after having read them. */
868 assert(!(msg.msg_flags & MSG_CTRUNC));
869 assert(!(msg.msg_flags & MSG_TRUNC));
871 p->size = (size_t) l;
874 *ret_src_port = catta_port_from_sockaddr((struct sockaddr*) &sa);
876 if (ret_src_address) {
878 catta_address_from_sockaddr((struct sockaddr*) &sa, &a);
879 *ret_src_address = a.data.ipv6;
882 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
884 if (cmsg->cmsg_level == IPPROTO_IPV6) {
886 switch (cmsg->cmsg_type) {
891 *ret_ttl = (uint8_t) (*(int *) CMSG_DATA(cmsg));
898 struct in6_pktinfo *i = (struct in6_pktinfo*) CMSG_DATA(cmsg);
900 if (ret_iface && i->ipi6_ifindex > 0)
901 *ret_iface = i->ipi6_ifindex;
904 memcpy(ret_dst_address->address, i->ipi6_addr.s6_addr, 16);
911 catta_log_warn("Unhandled cmsg_type: %d", cmsg->cmsg_type);
924 catta_dns_packet_free(p);
929 int catta_open_unicast_socket_ipv4(void) {
930 struct sockaddr_in local;
933 if ((fd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
934 catta_log_warn("socket() failed: %s", errnostrsocket());
938 memset(&local, 0, sizeof(local));
939 local.sin_family = AF_INET;
941 if (bind(fd, (struct sockaddr*) &local, sizeof(local)) < 0) {
942 catta_log_warn("bind() failed: %s", errnostrsocket());
946 if (ipv4_pktinfo(fd) < 0) {
950 if (catta_set_cloexec(fd) < 0) {
951 catta_log_warn("FD_CLOEXEC failed: %s", errnostrsocket());
955 if (catta_set_nonblock(fd) < 0) {
956 catta_log_warn("O_NONBLOCK failed: %s", errnostrsocket());
969 int catta_open_unicast_socket_ipv6(void) {
970 struct sockaddr_in6 local;
973 if ((fd = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
974 catta_log_warn("socket() failed: %s", errnostrsocket());
979 if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (void *)&yes, sizeof(yes)) < 0) {
980 catta_log_warn("IPV6_V6ONLY failed: %s", errnostrsocket());
984 memset(&local, 0, sizeof(local));
985 local.sin6_family = AF_INET6;
987 if (bind(fd, (struct sockaddr*) &local, sizeof(local)) < 0) {
988 catta_log_warn("bind() failed: %s", errnostrsocket());
992 if (ipv6_pktinfo(fd) < 0)
995 if (catta_set_cloexec(fd) < 0) {
996 catta_log_warn("FD_CLOEXEC failed: %s", errnostrsocket());
1000 if (catta_set_nonblock(fd) < 0) {
1001 catta_log_warn("O_NONBLOCK failed: %s", errnostrsocket());