1 /* 2 * ntpd.c - main program for the fixed point NTP daemon 3 */ 4 5 #ifdef HAVE_CONFIG_H 6 # include <config.h> 7 #endif 8 9 #include "ntp_machine.h" 10 #include "ntpd.h" 11 #include "ntp_io.h" 12 #include "ntp_stdlib.h" 13 #include <ntp_random.h> 14 15 #include "ntp_config.h" 16 #include "ntp_syslog.h" 17 #include "ntp_assert.h" 18 #include "isc/error.h" 19 #include "isc/strerror.h" 20 #include "isc/formatcheck.h" 21 #include "iosignal.h" 22 23 #ifdef SIM 24 # include "ntpsim.h" 25 #endif 26 27 #include "ntp_libopts.h" 28 #include "ntpd-opts.h" 29 30 /* there's a short treatise below what the thread stuff is for. 31 * [Bug 2954] enable the threading warm-up only for Linux. 32 */ 33 #if defined(HAVE_PTHREADS) && HAVE_PTHREADS && !defined(NO_THREADS) 34 # ifdef HAVE_PTHREAD_H 35 # include <pthread.h> 36 # endif 37 # if defined(linux) 38 # define NEED_PTHREAD_WARMUP 39 # endif 40 #endif 41 42 #ifdef HAVE_UNISTD_H 43 # include <unistd.h> 44 #endif 45 #ifdef HAVE_SYS_STAT_H 46 # include <sys/stat.h> 47 #endif 48 #include <stdio.h> 49 #ifdef HAVE_SYS_PARAM_H 50 # include <sys/param.h> 51 #endif 52 #ifdef HAVE_SYS_SIGNAL_H 53 # include <sys/signal.h> 54 #else 55 # include <signal.h> 56 #endif 57 #ifdef HAVE_SYS_IOCTL_H 58 # include <sys/ioctl.h> 59 #endif /* HAVE_SYS_IOCTL_H */ 60 #if defined(HAVE_RTPRIO) 61 # ifdef HAVE_SYS_LOCK_H 62 # include <sys/lock.h> 63 # endif 64 # include <sys/rtprio.h> 65 #else 66 # ifdef HAVE_PLOCK 67 # ifdef HAVE_SYS_LOCK_H 68 # include <sys/lock.h> 69 # endif 70 # endif 71 #endif 72 #if defined(HAVE_SCHED_SETSCHEDULER) 73 # ifdef HAVE_SCHED_H 74 # include <sched.h> 75 # else 76 # ifdef HAVE_SYS_SCHED_H 77 # include <sys/sched.h> 78 # endif 79 # endif 80 #endif 81 #if defined(HAVE_SYS_MMAN_H) 82 # include <sys/mman.h> 83 #endif 84 85 #ifdef HAVE_TERMIOS_H 86 # include <termios.h> 87 #endif 88 89 #ifdef SYS_DOMAINOS 90 # include <apollo/base.h> 91 #endif /* SYS_DOMAINOS */ 92 93 94 #include "recvbuff.h" 95 #include "ntp_cmdargs.h" 96 97 #if 0 /* HMS: I don't think we need this. 961223 */ 98 #ifdef LOCK_PROCESS 99 # ifdef SYS_SOLARIS 100 # include <sys/mman.h> 101 # else 102 # include <sys/lock.h> 103 # endif 104 #endif 105 #endif 106 107 #ifdef SYS_WINNT 108 # include "ntservice.h" 109 #endif 110 111 #ifdef _AIX 112 # include <ulimit.h> 113 #endif /* _AIX */ 114 115 #ifdef SCO5_CLOCK 116 # include <sys/ci/ciioctl.h> 117 #endif 118 119 #ifdef HAVE_DROPROOT 120 # include <ctype.h> 121 # include <grp.h> 122 # include <pwd.h> 123 #ifdef HAVE_LINUX_CAPABILITIES 124 # include <sys/capability.h> 125 # include <sys/prctl.h> 126 #endif /* HAVE_LINUX_CAPABILITIES */ 127 #if defined(HAVE_PRIV_H) && defined(HAVE_SOLARIS_PRIVS) 128 # include <priv.h> 129 #endif /* HAVE_PRIV_H */ 130 #if defined(HAVE_TRUSTEDBSD_MAC) 131 # include <sys/mac.h> 132 #endif /* HAVE_TRUSTEDBSD_MAC */ 133 #endif /* HAVE_DROPROOT */ 134 135 #if defined (LIBSECCOMP) && (KERN_SECCOMP) 136 /* # include <sys/types.h> */ 137 # include <sys/resource.h> 138 # include <seccomp.h> 139 #endif /* LIBSECCOMP and KERN_SECCOMP */ 140 141 #ifdef HAVE_DNSREGISTRATION 142 # include <dns_sd.h> 143 DNSServiceRef mdns; 144 #endif 145 146 #ifdef HAVE_SETPGRP_0 147 # define ntp_setpgrp(x, y) setpgrp() 148 #else 149 # define ntp_setpgrp(x, y) setpgrp(x, y) 150 #endif 151 152 #ifdef HAVE_SOLARIS_PRIVS 153 # define LOWPRIVS "basic,sys_time,net_privaddr,proc_setid,!proc_info,!proc_session,!proc_exec" 154 static priv_set_t *lowprivs = NULL; 155 static priv_set_t *highprivs = NULL; 156 #endif /* HAVE_SOLARIS_PRIVS */ 157 /* 158 * Scheduling priority we run at 159 */ 160 #define NTPD_PRIO (-12) 161 162 int priority_done = 2; /* 0 - Set priority */ 163 /* 1 - priority is OK where it is */ 164 /* 2 - Don't set priority */ 165 /* 1 and 2 are pretty much the same */ 166 167 int listen_to_virtual_ips = TRUE; 168 169 /* 170 * No-fork flag. If set, we do not become a background daemon. 171 */ 172 int nofork; /* Fork by default */ 173 174 #ifdef HAVE_DNSREGISTRATION 175 /* 176 * mDNS registration flag. If set, we attempt to register with the mDNS system, but only 177 * after we have synched the first time. If the attempt fails, then try again once per 178 * minute for up to 5 times. After all, we may be starting before mDNS. 179 */ 180 int mdnsreg = FALSE; 181 int mdnstries = 5; 182 #endif /* HAVE_DNSREGISTRATION */ 183 184 #ifdef HAVE_DROPROOT 185 int droproot; 186 int root_dropped; 187 char *user; /* User to switch to */ 188 char *group; /* group to switch to */ 189 const char *chrootdir; /* directory to chroot to */ 190 uid_t sw_uid; 191 gid_t sw_gid; 192 struct group *gr; 193 struct passwd *pw; 194 #endif /* HAVE_DROPROOT */ 195 196 #ifdef HAVE_WORKING_FORK 197 int waitsync_fd_to_close = -1; /* -w/--wait-sync */ 198 #endif 199 200 /* 201 * Version declaration 202 */ 203 extern const char *Version; 204 205 char const *progname; 206 207 int was_alarmed; 208 209 #ifdef DECL_SYSCALL 210 /* 211 * We put this here, since the argument profile is syscall-specific 212 */ 213 extern int syscall (int, ...); 214 #endif /* DECL_SYSCALL */ 215 216 217 #if !defined(SIM) && defined(SIGDIE1) 218 static volatile int signalled = 0; 219 static volatile int signo = 0; 220 221 /* In an ideal world, 'finish_safe()' would declared as noreturn... */ 222 static void finish_safe (int); 223 static RETSIGTYPE finish (int); 224 #endif 225 226 #if !defined(SIM) && defined(HAVE_WORKING_FORK) 227 static int wait_child_sync_if (int, long); 228 #endif 229 230 #if !defined(SIM) && !defined(SYS_WINNT) 231 # ifdef DEBUG 232 static RETSIGTYPE moredebug (int); 233 static RETSIGTYPE lessdebug (int); 234 # else /* !DEBUG follows */ 235 static RETSIGTYPE no_debug (int); 236 # endif /* !DEBUG */ 237 #endif /* !SIM && !SYS_WINNT */ 238 239 #ifndef WORK_FORK 240 int saved_argc; 241 char ** saved_argv; 242 #endif 243 244 #ifndef SIM 245 int ntpdmain (int, char **); 246 static void set_process_priority (void); 247 static void assertion_failed (const char *, int, 248 isc_assertiontype_t, 249 const char *) 250 __attribute__ ((__noreturn__)); 251 static void library_fatal_error (const char *, int, 252 const char *, va_list) 253 ISC_FORMAT_PRINTF(3, 0); 254 static void library_unexpected_error(const char *, int, 255 const char *, va_list) 256 ISC_FORMAT_PRINTF(3, 0); 257 #endif /* !SIM */ 258 259 260 /* Bug2332 unearthed a problem in the interaction of reduced user 261 * privileges, the limits on memory usage and some versions of the 262 * pthread library on Linux systems. The 'pthread_cancel()' function and 263 * likely some others need to track the stack of the thread involved, 264 * and uses a function that comes from GCC (--> libgcc_s.so) to do 265 * this. Unfortunately the developers of glibc decided to load the 266 * library on demand, which speeds up program start but can cause 267 * trouble here: Due to all the things NTPD does to limit its resource 268 * usage, this deferred load of libgcc_s does not always work once the 269 * restrictions are in effect. 270 * 271 * One way out of this was attempting a forced link against libgcc_s 272 * when possible because it makes the library available immediately 273 * without deferred load. (The symbol resolution would still be dynamic 274 * and on demand, but the code would already be in the process image.) 275 * 276 * This is a tricky thing to do, since it's not necessary everywhere, 277 * not possible everywhere, has shown to break the build of other 278 * programs in the NTP suite and is now generally frowned upon. 279 * 280 * So we take a different approach here: We creat a worker thread that does 281 * actually nothing except waiting for cancellation and cancel it. If 282 * this is done before all the limitations are put in place, the 283 * machinery is pre-heated and all the runtime stuff should be in place 284 * and useable when needed. 285 * 286 * This uses only the standard pthread API and should work with all 287 * implementations of pthreads. It is not necessary everywhere, but it's 288 * cheap enough to go on nearly unnoticed. 289 * 290 * Addendum: Bug 2954 showed that the assumption that this should work 291 * with all OS is wrong -- at least FreeBSD bombs heavily. 292 */ 293 #ifdef NEED_PTHREAD_WARMUP 294 295 /* simple thread function: sleep until cancelled, just to exercise 296 * thread cancellation. 297 */ 298 static void* 299 my_pthread_warmup_worker( 300 void *thread_args) 301 { 302 (void)thread_args; 303 for (;;) 304 sleep(10); 305 return NULL; 306 } 307 308 /* pre-heat threading: create a thread and cancel it, just to exercise 309 * thread cancellation. 310 */ 311 static void 312 my_pthread_warmup(void) 313 { 314 pthread_t thread; 315 pthread_attr_t thr_attr; 316 int rc; 317 318 pthread_attr_init(&thr_attr); 319 #if defined(HAVE_PTHREAD_ATTR_GETSTACKSIZE) && \ 320 defined(HAVE_PTHREAD_ATTR_SETSTACKSIZE) && \ 321 defined(PTHREAD_STACK_MIN) 322 { 323 size_t ssmin = 32*1024; /* 32kB should be minimum */ 324 if (ssmin < PTHREAD_STACK_MIN) 325 ssmin = PTHREAD_STACK_MIN; 326 rc = pthread_attr_setstacksize(&thr_attr, ssmin); 327 if (0 != rc) 328 msyslog(LOG_ERR, 329 "my_pthread_warmup: pthread_attr_setstacksize() -> %s", 330 strerror(rc)); 331 } 332 #endif 333 rc = pthread_create( 334 &thread, &thr_attr, my_pthread_warmup_worker, NULL); 335 pthread_attr_destroy(&thr_attr); 336 if (0 != rc) { 337 msyslog(LOG_ERR, 338 "my_pthread_warmup: pthread_create() -> %s", 339 strerror(rc)); 340 } else { 341 pthread_cancel(thread); 342 pthread_join(thread, NULL); 343 } 344 } 345 346 #endif /*defined(NEED_PTHREAD_WARMUP)*/ 347 348 #ifdef NEED_EARLY_FORK 349 static void 350 dummy_callback(void) { return; } 351 352 static void 353 fork_nonchroot_worker(void) { 354 getaddrinfo_sometime("localhost", "ntp", NULL, INITIAL_DNS_RETRY, 355 (gai_sometime_callback)&dummy_callback, NULL); 356 } 357 #endif /* NEED_EARLY_FORK */ 358 359 void 360 parse_cmdline_opts( 361 int * pargc, 362 char ***pargv 363 ) 364 { 365 static int parsed; 366 static int optct; 367 368 if (!parsed) 369 optct = ntpOptionProcess(&ntpdOptions, *pargc, *pargv); 370 371 parsed = 1; 372 373 *pargc -= optct; 374 *pargv += optct; 375 } 376 377 378 #ifdef SIM 379 int 380 main( 381 int argc, 382 char *argv[] 383 ) 384 { 385 progname = argv[0]; 386 parse_cmdline_opts(&argc, &argv); 387 #ifdef DEBUG 388 debug = OPT_VALUE_SET_DEBUG_LEVEL; 389 DPRINTF(1, ("%s\n", Version)); 390 #endif 391 392 return ntpsim(argc, argv); 393 } 394 #else /* !SIM follows */ 395 #ifdef NO_MAIN_ALLOWED 396 CALL(ntpd,"ntpd",ntpdmain); 397 #else /* !NO_MAIN_ALLOWED follows */ 398 #ifndef SYS_WINNT 399 int 400 main( 401 int argc, 402 char *argv[] 403 ) 404 { 405 return ntpdmain(argc, argv); 406 } 407 #endif /* !SYS_WINNT */ 408 #endif /* !NO_MAIN_ALLOWED */ 409 #endif /* !SIM */ 410 411 #ifdef _AIX 412 /* 413 * OK. AIX is different than solaris in how it implements plock(). 414 * If you do NOT adjust the stack limit, you will get the MAXIMUM 415 * stack size allocated and PINNED with you program. To check the 416 * value, use ulimit -a. 417 * 418 * To fix this, we create an automatic variable and set our stack limit 419 * to that PLUS 32KB of extra space (we need some headroom). 420 * 421 * This subroutine gets the stack address. 422 * 423 * Grover Davidson and Matt Ladendorf 424 * 425 */ 426 static char * 427 get_aix_stack(void) 428 { 429 char ch; 430 return (&ch); 431 } 432 433 /* 434 * Signal handler for SIGDANGER. 435 */ 436 static void 437 catch_danger(int signo) 438 { 439 msyslog(LOG_INFO, "ntpd: setpgid(): %m"); 440 /* Make the system believe we'll free something, but don't do it! */ 441 return; 442 } 443 #endif /* _AIX */ 444 445 /* 446 * Set the process priority 447 */ 448 #ifndef SIM 449 static void 450 set_process_priority(void) 451 { 452 453 # ifdef DEBUG 454 if (debug > 1) 455 msyslog(LOG_DEBUG, "set_process_priority: %s: priority_done is <%d>", 456 ((priority_done) 457 ? "Leave priority alone" 458 : "Attempt to set priority" 459 ), 460 priority_done); 461 # endif /* DEBUG */ 462 463 # if defined(HAVE_SCHED_SETSCHEDULER) 464 if (!priority_done) { 465 extern int config_priority_override, config_priority; 466 int pmax, pmin; 467 struct sched_param sched; 468 469 pmax = sched_get_priority_max(SCHED_FIFO); 470 sched.sched_priority = pmax; 471 if ( config_priority_override ) { 472 pmin = sched_get_priority_min(SCHED_FIFO); 473 if ( config_priority > pmax ) 474 sched.sched_priority = pmax; 475 else if ( config_priority < pmin ) 476 sched.sched_priority = pmin; 477 else 478 sched.sched_priority = config_priority; 479 } 480 if ( sched_setscheduler(0, SCHED_FIFO, &sched) == -1 ) 481 msyslog(LOG_ERR, "sched_setscheduler(): %m"); 482 else 483 ++priority_done; 484 } 485 # endif /* HAVE_SCHED_SETSCHEDULER */ 486 # ifdef HAVE_RTPRIO 487 # ifdef RTP_SET 488 if (!priority_done) { 489 struct rtprio srtp; 490 491 srtp.type = RTP_PRIO_REALTIME; /* was: RTP_PRIO_NORMAL */ 492 srtp.prio = 0; /* 0 (hi) -> RTP_PRIO_MAX (31,lo) */ 493 494 if (rtprio(RTP_SET, getpid(), &srtp) < 0) 495 msyslog(LOG_ERR, "rtprio() error: %m"); 496 else 497 ++priority_done; 498 } 499 # else /* !RTP_SET follows */ 500 if (!priority_done) { 501 if (rtprio(0, 120) < 0) 502 msyslog(LOG_ERR, "rtprio() error: %m"); 503 else 504 ++priority_done; 505 } 506 # endif /* !RTP_SET */ 507 # endif /* HAVE_RTPRIO */ 508 # if defined(NTPD_PRIO) && NTPD_PRIO != 0 509 # ifdef HAVE_ATT_NICE 510 if (!priority_done) { 511 errno = 0; 512 if (-1 == nice (NTPD_PRIO) && errno != 0) 513 msyslog(LOG_ERR, "nice() error: %m"); 514 else 515 ++priority_done; 516 } 517 # endif /* HAVE_ATT_NICE */ 518 # ifdef HAVE_BSD_NICE 519 if (!priority_done) { 520 if (-1 == setpriority(PRIO_PROCESS, 0, NTPD_PRIO)) 521 msyslog(LOG_ERR, "setpriority() error: %m"); 522 else 523 ++priority_done; 524 } 525 # endif /* HAVE_BSD_NICE */ 526 # endif /* NTPD_PRIO && NTPD_PRIO != 0 */ 527 if (!priority_done) 528 msyslog(LOG_ERR, "set_process_priority: No way found to improve our priority"); 529 } 530 #endif /* !SIM */ 531 532 #if !defined(SIM) && !defined(SYS_WINNT) 533 /* 534 * Detach from terminal (much like daemon()) 535 * Nothe that this function calls exit() 536 */ 537 # ifdef HAVE_WORKING_FORK 538 static void 539 detach_from_terminal( 540 int pipe_fds[2], 541 long wait_sync, 542 const char *logfilename 543 ) 544 { 545 int rc; 546 int exit_code; 547 # if !defined(HAVE_SETSID) && !defined (HAVE_SETPGID) && defined(TIOCNOTTY) 548 int fid; 549 # endif 550 # ifdef _AIX 551 struct sigaction sa; 552 # endif 553 554 rc = fork(); 555 if (-1 == rc) { 556 exit_code = (errno) ? errno : -1; 557 msyslog(LOG_ERR, "fork: %m"); 558 exit(exit_code); 559 } 560 if (rc > 0) { 561 /* parent */ 562 exit_code = wait_child_sync_if(pipe_fds[0], 563 wait_sync); 564 exit(exit_code); 565 } 566 567 /* 568 * child/daemon 569 * close all open files excepting waitsync_fd_to_close. 570 * msyslog() unreliable until after init_logging(). 571 */ 572 closelog(); 573 if (syslog_file != NULL) { 574 fclose(syslog_file); 575 syslog_file = NULL; 576 syslogit = TRUE; 577 } 578 close_all_except(waitsync_fd_to_close); 579 INSIST(0 == open("/dev/null", 0) && 1 == dup2(0, 1) \ 580 && 2 == dup2(0, 2)); 581 582 init_logging(progname, 0, TRUE); 583 /* we lost our logfile (if any) daemonizing */ 584 setup_logfile(logfilename); 585 586 # ifdef SYS_DOMAINOS 587 { 588 uid_$t puid; 589 status_$t st; 590 591 proc2_$who_am_i(&puid); 592 proc2_$make_server(&puid, &st); 593 } 594 # endif /* SYS_DOMAINOS */ 595 # ifdef HAVE_SETSID 596 if (setsid() == (pid_t)-1) 597 msyslog(LOG_ERR, "setsid(): %m"); 598 # elif defined(HAVE_SETPGID) 599 if (setpgid(0, 0) == -1) 600 msyslog(LOG_ERR, "setpgid(): %m"); 601 # else /* !HAVE_SETSID && !HAVE_SETPGID follows */ 602 # ifdef TIOCNOTTY 603 fid = open("/dev/tty", 2); 604 if (fid >= 0) { 605 ioctl(fid, (u_long)TIOCNOTTY, NULL); 606 close(fid); 607 } 608 # endif /* TIOCNOTTY */ 609 ntp_setpgrp(0, getpid()); 610 # endif /* !HAVE_SETSID && !HAVE_SETPGID */ 611 # ifdef _AIX 612 /* Don't get killed by low-on-memory signal. */ 613 sa.sa_handler = catch_danger; 614 sigemptyset(&sa.sa_mask); 615 sa.sa_flags = SA_RESTART; 616 sigaction(SIGDANGER, &sa, NULL); 617 # endif /* _AIX */ 618 619 return; 620 } 621 # endif /* HAVE_WORKING_FORK */ 622 623 #ifdef HAVE_DROPROOT 624 /* 625 * Map user name/number to user ID 626 */ 627 static int 628 map_user( 629 ) 630 { 631 char *endp; 632 633 if (isdigit((unsigned char)*user)) { 634 sw_uid = (uid_t)strtoul(user, &endp, 0); 635 if (*endp != '\0') 636 goto getuser; 637 638 if ((pw = getpwuid(sw_uid)) != NULL) { 639 free(user); 640 user = estrdup(pw->pw_name); 641 sw_gid = pw->pw_gid; 642 } else { 643 errno = 0; 644 msyslog(LOG_ERR, "Cannot find user ID %s", user); 645 return 0; 646 } 647 648 } else { 649 getuser: 650 errno = 0; 651 if ((pw = getpwnam(user)) != NULL) { 652 sw_uid = pw->pw_uid; 653 sw_gid = pw->pw_gid; 654 } else { 655 if (errno) 656 msyslog(LOG_ERR, "getpwnam(%s) failed: %m", user); 657 else 658 msyslog(LOG_ERR, "Cannot find user `%s'", user); 659 return 0; 660 } 661 } 662 663 return 1; 664 } 665 666 /* 667 * Map group name/number to group ID 668 */ 669 static int 670 map_group(void) 671 { 672 char *endp; 673 674 if (isdigit((unsigned char)*group)) { 675 sw_gid = (gid_t)strtoul(group, &endp, 0); 676 if (*endp != '\0') 677 goto getgroup; 678 } else { 679 getgroup: 680 if ((gr = getgrnam(group)) != NULL) { 681 sw_gid = gr->gr_gid; 682 } else { 683 errno = 0; 684 msyslog(LOG_ERR, "Cannot find group `%s'", group); 685 return 0; 686 } 687 } 688 689 return 1; 690 } 691 692 static int 693 set_group_ids(void) 694 { 695 if (user && initgroups(user, sw_gid)) { 696 msyslog(LOG_ERR, "Cannot initgroups() to user `%s': %m", user); 697 return 0; 698 } 699 if (group && setgid(sw_gid)) { 700 msyslog(LOG_ERR, "Cannot setgid() to group `%s': %m", group); 701 return 0; 702 } 703 if (group && setegid(sw_gid)) { 704 msyslog(LOG_ERR, "Cannot setegid() to group `%s': %m", group); 705 return 0; 706 } 707 if (group) { 708 if (0 != setgroups(1, &sw_gid)) { 709 msyslog(LOG_ERR, "setgroups(1, %d) failed: %m", sw_gid); 710 return 0; 711 } 712 } 713 else if (pw) 714 if (0 != initgroups(pw->pw_name, pw->pw_gid)) { 715 msyslog(LOG_ERR, "initgroups(<%s>, %d) filed: %m", pw->pw_name, pw->pw_gid); 716 return 0; 717 } 718 return 1; 719 } 720 721 static int 722 set_user_ids(void) 723 { 724 if (user && setuid(sw_uid)) { 725 msyslog(LOG_ERR, "Cannot setuid() to user `%s': %m", user); 726 return 0; 727 } 728 if (user && seteuid(sw_uid)) { 729 msyslog(LOG_ERR, "Cannot seteuid() to user `%s': %m", user); 730 return 0; 731 } 732 return 1; 733 } 734 735 /* 736 * Change (effective) user and group IDs, also initialize the supplementary group access list 737 */ 738 int set_user_group_ids(void); 739 int 740 set_user_group_ids(void) 741 { 742 /* If the the user was already mapped, no need to map it again */ 743 if ((NULL != user) && (0 == sw_uid)) { 744 if (0 == map_user()) 745 exit (-1); 746 } 747 /* same applies for the group */ 748 if ((NULL != group) && (0 == sw_gid)) { 749 if (0 == map_group()) 750 exit (-1); 751 } 752 753 if (getegid() != sw_gid && 0 == set_group_ids()) 754 return 0; 755 if (geteuid() != sw_uid && 0 == set_user_ids()) 756 return 0; 757 758 return 1; 759 } 760 #endif /* HAVE_DROPROOT */ 761 #endif /* !SIM */ 762 763 /* 764 * Main program. Initialize us, disconnect us from the tty if necessary, 765 * and loop waiting for I/O and/or timer expiries. 766 */ 767 #ifndef SIM 768 int 769 ntpdmain( 770 int argc, 771 char *argv[] 772 ) 773 { 774 l_fp now; 775 struct recvbuf *rbuf; 776 const char * logfilename; 777 # ifdef HAVE_UMASK 778 mode_t uv; 779 # endif 780 # if defined(HAVE_GETUID) && !defined(MPE) /* MPE lacks the concept of root */ 781 uid_t uid; 782 # endif 783 # if defined(HAVE_WORKING_FORK) 784 long wait_sync = 0; 785 int pipe_fds[2]; 786 int rc; 787 int exit_code; 788 # endif /* HAVE_WORKING_FORK*/ 789 # ifdef SCO5_CLOCK 790 int fd; 791 int zero; 792 # endif 793 794 # ifdef NEED_PTHREAD_WARMUP 795 my_pthread_warmup(); 796 # endif 797 798 # ifdef HAVE_UMASK 799 uv = umask(0); 800 if (uv) 801 umask(uv); 802 else 803 umask(022); 804 # endif 805 saved_argc = argc; 806 saved_argv = argv; 807 progname = argv[0]; 808 initializing = TRUE; /* mark that we are initializing */ 809 parse_cmdline_opts(&argc, &argv); 810 # ifdef DEBUG 811 debug = OPT_VALUE_SET_DEBUG_LEVEL; 812 # ifdef HAVE_SETLINEBUF 813 setlinebuf(stdout); 814 # endif 815 # endif 816 817 if (HAVE_OPT(NOFORK) || HAVE_OPT(QUIT) 818 # ifdef DEBUG 819 || debug 820 # endif 821 || HAVE_OPT(SAVECONFIGQUIT)) 822 nofork = TRUE; 823 824 init_logging(progname, NLOG_SYNCMASK, TRUE); 825 /* honor -l/--logfile option to log to a file */ 826 if (HAVE_OPT(LOGFILE)) { 827 logfilename = OPT_ARG(LOGFILE); 828 syslogit = FALSE; 829 change_logfile(logfilename, FALSE); 830 } else { 831 logfilename = NULL; 832 if (nofork) 833 msyslog_term = TRUE; 834 if (HAVE_OPT(SAVECONFIGQUIT)) 835 syslogit = FALSE; 836 } 837 msyslog(LOG_NOTICE, "%s: Starting", Version); 838 839 { 840 int i; 841 char buf[1024]; /* Secret knowledge of msyslog buf length */ 842 char *cp = buf; 843 844 /* Note that every arg has an initial space character */ 845 snprintf(cp, sizeof(buf), "Command line:"); 846 cp += strlen(cp); 847 848 for (i = 0; i < saved_argc ; ++i) { 849 snprintf(cp, sizeof(buf) - (cp - buf), 850 " %s", saved_argv[i]); 851 cp += strlen(cp); 852 } 853 msyslog(LOG_INFO, "%s", buf); 854 } 855 856 /* 857 * Install trap handlers to log errors and assertion failures. 858 * Default handlers print to stderr which doesn't work if detached. 859 */ 860 isc_assertion_setcallback(assertion_failed); 861 isc_error_setfatal(library_fatal_error); 862 isc_error_setunexpected(library_unexpected_error); 863 864 /* MPE lacks the concept of root */ 865 # if defined(HAVE_GETUID) && !defined(MPE) 866 uid = getuid(); 867 if (uid && !HAVE_OPT( SAVECONFIGQUIT ) 868 # if defined(HAVE_TRUSTEDBSD_MAC) 869 /* We can run as non-root if the mac_ntpd policy is enabled. */ 870 && mac_is_present("ntpd") != 1 871 # endif 872 ) { 873 msyslog_term = TRUE; 874 msyslog(LOG_ERR, 875 "must be run as root, not uid %ld", (long)uid); 876 exit(1); 877 } 878 # endif 879 880 /* 881 * Enable the Multi-Media Timer for Windows? 882 */ 883 # ifdef SYS_WINNT 884 if (HAVE_OPT( MODIFYMMTIMER )) 885 set_mm_timer(MM_TIMER_HIRES); 886 # endif 887 888 #ifdef HAVE_DNSREGISTRATION 889 /* 890 * Enable mDNS registrations? 891 */ 892 if (HAVE_OPT( MDNS )) { 893 mdnsreg = TRUE; 894 } 895 #endif /* HAVE_DNSREGISTRATION */ 896 897 if (HAVE_OPT( NOVIRTUALIPS )) 898 listen_to_virtual_ips = 0; 899 900 /* 901 * --interface, listen on specified interfaces 902 */ 903 if (HAVE_OPT( INTERFACE )) { 904 int ifacect = STACKCT_OPT( INTERFACE ); 905 const char** ifaces = STACKLST_OPT( INTERFACE ); 906 sockaddr_u addr; 907 908 while (ifacect-- > 0) { 909 add_nic_rule( 910 is_ip_address(*ifaces, AF_UNSPEC, &addr) 911 ? MATCH_IFADDR 912 : MATCH_IFNAME, 913 *ifaces, -1, ACTION_LISTEN); 914 ifaces++; 915 } 916 } 917 918 if (HAVE_OPT( NICE )) 919 priority_done = 0; 920 921 # ifdef HAVE_SCHED_SETSCHEDULER 922 if (HAVE_OPT( PRIORITY )) { 923 config_priority = OPT_VALUE_PRIORITY; 924 config_priority_override = 1; 925 priority_done = 0; 926 } 927 # endif 928 929 # ifdef HAVE_WORKING_FORK 930 /* make sure the FDs are initialised */ 931 pipe_fds[0] = -1; 932 pipe_fds[1] = -1; 933 do { /* 'loop' once */ 934 if (!HAVE_OPT( WAIT_SYNC )) 935 break; 936 wait_sync = OPT_VALUE_WAIT_SYNC; 937 if (wait_sync <= 0) { 938 wait_sync = 0; 939 break; 940 } 941 /* -w requires a fork() even with debug > 0 */ 942 nofork = FALSE; 943 if (pipe(pipe_fds)) { 944 exit_code = (errno) ? errno : -1; 945 msyslog(LOG_ERR, 946 "Pipe creation failed for --wait-sync: %m"); 947 exit(exit_code); 948 } 949 waitsync_fd_to_close = pipe_fds[1]; 950 } while (0); /* 'loop' once */ 951 # endif /* HAVE_WORKING_FORK */ 952 953 init_lib(); 954 # ifdef SYS_WINNT 955 /* 956 * Make sure the service is initialized before we do anything else 957 */ 958 ntservice_init(); 959 960 /* 961 * Start interpolation thread, must occur before first 962 * get_systime() 963 */ 964 init_winnt_time(); 965 # endif 966 /* 967 * Initialize random generator and public key pair 968 */ 969 get_systime(&now); 970 971 ntp_srandom((int)(now.l_i * now.l_uf)); 972 973 /* 974 * Detach us from the terminal. May need an #ifndef GIZMO. 975 */ 976 if (!nofork) { 977 978 # ifdef HAVE_WORKING_FORK 979 detach_from_terminal(pipe_fds, wait_sync, logfilename); 980 # endif /* HAVE_WORKING_FORK */ 981 } 982 983 # ifdef SCO5_CLOCK 984 /* 985 * SCO OpenServer's system clock offers much more precise timekeeping 986 * on the base CPU than the other CPUs (for multiprocessor systems), 987 * so we must lock to the base CPU. 988 */ 989 fd = open("/dev/at1", O_RDONLY); 990 if (fd >= 0) { 991 zero = 0; 992 if (ioctl(fd, ACPU_LOCK, &zero) < 0) 993 msyslog(LOG_ERR, "cannot lock to base CPU: %m"); 994 close(fd); 995 } 996 # endif 997 998 /* Setup stack size in preparation for locking pages in memory. */ 999 # if defined(HAVE_MLOCKALL) 1000 # ifdef HAVE_SETRLIMIT 1001 ntp_rlimit(RLIMIT_STACK, DFLT_RLIMIT_STACK * 4096, 4096, "4k"); 1002 # ifdef RLIMIT_MEMLOCK 1003 /* 1004 * The default RLIMIT_MEMLOCK is very low on Linux systems. 1005 * Unless we increase this limit malloc calls are likely to 1006 * fail if we drop root privilege. To be useful the value 1007 * has to be larger than the largest ntpd resident set size. 1008 */ 1009 ntp_rlimit(RLIMIT_MEMLOCK, DFLT_RLIMIT_MEMLOCK * 1024 * 1024, 1024 * 1024, "MB"); 1010 # endif /* RLIMIT_MEMLOCK */ 1011 # endif /* HAVE_SETRLIMIT */ 1012 # else /* !HAVE_MLOCKALL follows */ 1013 # ifdef HAVE_PLOCK 1014 # ifdef PROCLOCK 1015 # ifdef _AIX 1016 /* 1017 * set the stack limit for AIX for plock(). 1018 * see get_aix_stack() for more info. 1019 */ 1020 if (ulimit(SET_STACKLIM, (get_aix_stack() - 8 * 4096)) < 0) 1021 msyslog(LOG_ERR, 1022 "Cannot adjust stack limit for plock: %m"); 1023 # endif /* _AIX */ 1024 # endif /* PROCLOCK */ 1025 # endif /* HAVE_PLOCK */ 1026 # endif /* !HAVE_MLOCKALL */ 1027 1028 /* 1029 * Set up signals we pay attention to locally. 1030 */ 1031 # ifdef SIGDIE1 1032 signal_no_reset(SIGDIE1, finish); 1033 signal_no_reset(SIGDIE2, finish); 1034 signal_no_reset(SIGDIE3, finish); 1035 signal_no_reset(SIGDIE4, finish); 1036 # endif 1037 # ifdef SIGBUS 1038 signal_no_reset(SIGBUS, finish); 1039 # endif 1040 1041 # if !defined(SYS_WINNT) && !defined(VMS) 1042 # ifdef DEBUG 1043 (void) signal_no_reset(MOREDEBUGSIG, moredebug); 1044 (void) signal_no_reset(LESSDEBUGSIG, lessdebug); 1045 # else 1046 (void) signal_no_reset(MOREDEBUGSIG, no_debug); 1047 (void) signal_no_reset(LESSDEBUGSIG, no_debug); 1048 # endif /* DEBUG */ 1049 # endif /* !SYS_WINNT && !VMS */ 1050 1051 /* 1052 * Set up signals we should never pay attention to. 1053 */ 1054 # ifdef SIGPIPE 1055 signal_no_reset(SIGPIPE, SIG_IGN); 1056 # endif 1057 1058 /* 1059 * Call the init_ routines to initialize the data structures. 1060 * 1061 * Exactly what command-line options are we expecting here? 1062 */ 1063 INIT_SSL(); 1064 init_auth(); 1065 init_util(); 1066 init_restrict(); 1067 init_mon(); 1068 init_timer(); 1069 init_request(); 1070 init_control(); 1071 init_peer(); 1072 # ifdef REFCLOCK 1073 init_refclock(); 1074 # endif 1075 set_process_priority(); 1076 init_proto(); /* Call at high priority */ 1077 init_io(); 1078 init_loopfilter(); 1079 mon_start(MON_ON); /* monitor on by default now */ 1080 /* turn off in config if unwanted */ 1081 1082 /* 1083 * Get the configuration. This is done in a separate module 1084 * since this will definitely be different for the gizmo board. 1085 */ 1086 getconfig(argc, argv); 1087 1088 if (-1 == cur_memlock) { 1089 # if defined(HAVE_MLOCKALL) 1090 /* 1091 * lock the process into memory 1092 */ 1093 if ( !HAVE_OPT(SAVECONFIGQUIT) 1094 # ifdef RLIMIT_MEMLOCK 1095 && -1 != DFLT_RLIMIT_MEMLOCK 1096 # endif 1097 && 0 != mlockall(MCL_CURRENT|MCL_FUTURE)) 1098 msyslog(LOG_ERR, "mlockall(): %m"); 1099 # else /* !HAVE_MLOCKALL follows */ 1100 # ifdef HAVE_PLOCK 1101 # ifdef PROCLOCK 1102 /* 1103 * lock the process into memory 1104 */ 1105 if (!HAVE_OPT(SAVECONFIGQUIT) && 0 != plock(PROCLOCK)) 1106 msyslog(LOG_ERR, "plock(PROCLOCK): %m"); 1107 # else /* !PROCLOCK follows */ 1108 # ifdef TXTLOCK 1109 /* 1110 * Lock text into ram 1111 */ 1112 if (!HAVE_OPT(SAVECONFIGQUIT) && 0 != plock(TXTLOCK)) 1113 msyslog(LOG_ERR, "plock(TXTLOCK) error: %m"); 1114 # else /* !TXTLOCK follows */ 1115 msyslog(LOG_ERR, "plock() - don't know what to lock!"); 1116 # endif /* !TXTLOCK */ 1117 # endif /* !PROCLOCK */ 1118 # endif /* HAVE_PLOCK */ 1119 # endif /* !HAVE_MLOCKALL */ 1120 } 1121 1122 loop_config(LOOP_DRIFTINIT, 0); 1123 report_event(EVNT_SYSRESTART, NULL, NULL); 1124 initializing = FALSE; 1125 1126 # ifdef HAVE_DROPROOT 1127 if (droproot) { 1128 1129 #ifdef NEED_EARLY_FORK 1130 fork_nonchroot_worker(); 1131 #endif 1132 1133 /* Drop super-user privileges and chroot now if the OS supports this */ 1134 1135 # ifdef HAVE_LINUX_CAPABILITIES 1136 /* set flag: keep privileges accross setuid() call (we only really need cap_sys_time): */ 1137 if (prctl( PR_SET_KEEPCAPS, 1L, 0L, 0L, 0L ) == -1) { 1138 msyslog( LOG_ERR, "prctl( PR_SET_KEEPCAPS, 1L ) failed: %m" ); 1139 exit(-1); 1140 } 1141 # elif HAVE_SOLARIS_PRIVS 1142 /* Nothing to do here */ 1143 # else 1144 /* we need a user to switch to */ 1145 if (user == NULL) { 1146 msyslog(LOG_ERR, "Need user name to drop root privileges (see -u flag!)" ); 1147 exit(-1); 1148 } 1149 # endif /* HAVE_LINUX_CAPABILITIES || HAVE_SOLARIS_PRIVS */ 1150 1151 if (user != NULL) { 1152 if (0 == map_user()) 1153 exit (-1); 1154 } 1155 if (group != NULL) { 1156 if (0 == map_group()) 1157 exit (-1); 1158 } 1159 1160 if (chrootdir ) { 1161 /* make sure cwd is inside the jail: */ 1162 if (chdir(chrootdir)) { 1163 msyslog(LOG_ERR, "Cannot chdir() to `%s': %m", chrootdir); 1164 exit (-1); 1165 } 1166 if (chroot(chrootdir)) { 1167 msyslog(LOG_ERR, "Cannot chroot() to `%s': %m", chrootdir); 1168 exit (-1); 1169 } 1170 if (chdir("/")) { 1171 msyslog(LOG_ERR, "Cannot chdir() to`root after chroot(): %m"); 1172 exit (-1); 1173 } 1174 } 1175 # ifdef HAVE_SOLARIS_PRIVS 1176 if ((lowprivs = priv_str_to_set(LOWPRIVS, ",", NULL)) == NULL) { 1177 msyslog(LOG_ERR, "priv_str_to_set() failed:%m"); 1178 exit(-1); 1179 } 1180 if ((highprivs = priv_allocset()) == NULL) { 1181 msyslog(LOG_ERR, "priv_allocset() failed:%m"); 1182 exit(-1); 1183 } 1184 (void) getppriv(PRIV_PERMITTED, highprivs); 1185 (void) priv_intersect(highprivs, lowprivs); 1186 if (setppriv(PRIV_SET, PRIV_PERMITTED, lowprivs) == -1) { 1187 msyslog(LOG_ERR, "setppriv() failed:%m"); 1188 exit(-1); 1189 } 1190 # endif /* HAVE_SOLARIS_PRIVS */ 1191 if (0 == set_user_group_ids()) 1192 exit(-1); 1193 1194 # if defined(HAVE_TRUSTEDBSD_MAC) 1195 /* 1196 * To manipulate system time and (re-)bind to NTP_PORT as needed 1197 * following interface changes, we must either run as uid 0 or 1198 * the mac_ntpd policy module must be enabled. 1199 */ 1200 if (sw_uid != 0 && mac_is_present("ntpd") != 1) { 1201 msyslog(LOG_ERR, "Need MAC 'ntpd' policy enabled to drop root privileges"); 1202 exit (-1); 1203 } 1204 # elif !defined(HAVE_LINUX_CAPABILITIES) && !defined(HAVE_SOLARIS_PRIVS) 1205 /* 1206 * for now assume that the privilege to bind to privileged ports 1207 * is associated with running with uid 0 - should be refined on 1208 * ports that allow binding to NTP_PORT with uid != 0 1209 */ 1210 disable_dynamic_updates |= (sw_uid != 0); /* also notifies routing message listener */ 1211 # endif /* !HAVE_LINUX_CAPABILITIES && !HAVE_SOLARIS_PRIVS */ 1212 1213 if (disable_dynamic_updates && interface_interval) { 1214 interface_interval = 0; 1215 msyslog(LOG_INFO, "running as non-root disables dynamic interface tracking"); 1216 } 1217 1218 # ifdef HAVE_LINUX_CAPABILITIES 1219 { 1220 /* 1221 * We may be running under non-root uid now, but we still hold full root privileges! 1222 * We drop all of them, except for the crucial one or two: cap_sys_time and 1223 * cap_net_bind_service if doing dynamic interface tracking. 1224 */ 1225 cap_t caps; 1226 char *captext; 1227 1228 captext = (0 != interface_interval) 1229 ? "cap_sys_time,cap_net_bind_service=pe" 1230 : "cap_sys_time=pe"; 1231 caps = cap_from_text(captext); 1232 if (!caps) { 1233 msyslog(LOG_ERR, 1234 "cap_from_text(%s) failed: %m", 1235 captext); 1236 exit(-1); 1237 } 1238 if (-1 == cap_set_proc(caps)) { 1239 msyslog(LOG_ERR, 1240 "cap_set_proc() failed to drop root privs: %m"); 1241 exit(-1); 1242 } 1243 cap_free(caps); 1244 } 1245 # endif /* HAVE_LINUX_CAPABILITIES */ 1246 # ifdef HAVE_SOLARIS_PRIVS 1247 if (priv_delset(lowprivs, "proc_setid") == -1) { 1248 msyslog(LOG_ERR, "priv_delset() failed:%m"); 1249 exit(-1); 1250 } 1251 if (setppriv(PRIV_SET, PRIV_PERMITTED, lowprivs) == -1) { 1252 msyslog(LOG_ERR, "setppriv() failed:%m"); 1253 exit(-1); 1254 } 1255 priv_freeset(lowprivs); 1256 priv_freeset(highprivs); 1257 # endif /* HAVE_SOLARIS_PRIVS */ 1258 root_dropped = TRUE; 1259 fork_deferred_worker(); 1260 } /* if (droproot) */ 1261 # endif /* HAVE_DROPROOT */ 1262 1263 /* libssecomp sandboxing */ 1264 #if defined (LIBSECCOMP) && (KERN_SECCOMP) 1265 scmp_filter_ctx ctx; 1266 1267 if ((ctx = seccomp_init(SCMP_ACT_KILL)) < 0) 1268 msyslog(LOG_ERR, "%s: seccomp_init(SCMP_ACT_KILL) failed: %m", __func__); 1269 else { 1270 msyslog(LOG_DEBUG, "%s: seccomp_init(SCMP_ACT_KILL) succeeded", __func__); 1271 } 1272 1273 #ifdef __x86_64__ 1274 int scmp_sc[] = { 1275 SCMP_SYS(adjtimex), 1276 SCMP_SYS(bind), 1277 SCMP_SYS(brk), 1278 SCMP_SYS(chdir), 1279 SCMP_SYS(clock_gettime), 1280 SCMP_SYS(clock_settime), 1281 SCMP_SYS(close), 1282 SCMP_SYS(connect), 1283 SCMP_SYS(exit_group), 1284 SCMP_SYS(fstat), 1285 SCMP_SYS(fsync), 1286 SCMP_SYS(futex), 1287 SCMP_SYS(getitimer), 1288 SCMP_SYS(getsockname), 1289 SCMP_SYS(ioctl), 1290 SCMP_SYS(lseek), 1291 SCMP_SYS(madvise), 1292 SCMP_SYS(mmap), 1293 SCMP_SYS(munmap), 1294 SCMP_SYS(open), 1295 SCMP_SYS(poll), 1296 SCMP_SYS(read), 1297 SCMP_SYS(recvmsg), 1298 SCMP_SYS(rename), 1299 SCMP_SYS(rt_sigaction), 1300 SCMP_SYS(rt_sigprocmask), 1301 SCMP_SYS(rt_sigreturn), 1302 SCMP_SYS(select), 1303 SCMP_SYS(sendto), 1304 SCMP_SYS(setitimer), 1305 SCMP_SYS(setsid), 1306 SCMP_SYS(socket), 1307 SCMP_SYS(stat), 1308 SCMP_SYS(time), 1309 SCMP_SYS(write), 1310 }; 1311 #endif 1312 #ifdef __i386__ 1313 int scmp_sc[] = { 1314 SCMP_SYS(_newselect), 1315 SCMP_SYS(adjtimex), 1316 SCMP_SYS(brk), 1317 SCMP_SYS(chdir), 1318 SCMP_SYS(clock_gettime), 1319 SCMP_SYS(clock_settime), 1320 SCMP_SYS(close), 1321 SCMP_SYS(exit_group), 1322 SCMP_SYS(fsync), 1323 SCMP_SYS(futex), 1324 SCMP_SYS(getitimer), 1325 SCMP_SYS(madvise), 1326 SCMP_SYS(mmap), 1327 SCMP_SYS(mmap2), 1328 SCMP_SYS(munmap), 1329 SCMP_SYS(open), 1330 SCMP_SYS(poll), 1331 SCMP_SYS(read), 1332 SCMP_SYS(rename), 1333 SCMP_SYS(rt_sigaction), 1334 SCMP_SYS(rt_sigprocmask), 1335 SCMP_SYS(select), 1336 SCMP_SYS(setitimer), 1337 SCMP_SYS(setsid), 1338 SCMP_SYS(sigprocmask), 1339 SCMP_SYS(sigreturn), 1340 SCMP_SYS(socketcall), 1341 SCMP_SYS(stat64), 1342 SCMP_SYS(time), 1343 SCMP_SYS(write), 1344 }; 1345 #endif 1346 { 1347 int i; 1348 1349 for (i = 0; i < COUNTOF(scmp_sc); i++) { 1350 if (seccomp_rule_add(ctx, 1351 SCMP_ACT_ALLOW, scmp_sc[i], 0) < 0) { 1352 msyslog(LOG_ERR, 1353 "%s: seccomp_rule_add() failed: %m", 1354 __func__); 1355 } 1356 } 1357 } 1358 1359 if (seccomp_load(ctx) < 0) 1360 msyslog(LOG_ERR, "%s: seccomp_load() failed: %m", 1361 __func__); 1362 else { 1363 msyslog(LOG_DEBUG, "%s: seccomp_load() succeeded", __func__); 1364 } 1365 #endif /* LIBSECCOMP and KERN_SECCOMP */ 1366 1367 #ifdef SYS_WINNT 1368 ntservice_isup(); 1369 #endif 1370 1371 # ifdef HAVE_IO_COMPLETION_PORT 1372 1373 for (;;) { 1374 #if !defined(SIM) && defined(SIGDIE1) 1375 if (signalled) 1376 finish_safe(signo); 1377 #endif 1378 GetReceivedBuffers(); 1379 # else /* normal I/O */ 1380 1381 BLOCK_IO_AND_ALARM(); 1382 was_alarmed = FALSE; 1383 1384 for (;;) { 1385 #if !defined(SIM) && defined(SIGDIE1) 1386 if (signalled) 1387 finish_safe(signo); 1388 #endif 1389 if (alarm_flag) { /* alarmed? */ 1390 was_alarmed = TRUE; 1391 alarm_flag = FALSE; 1392 } 1393 1394 /* collect async name/addr results */ 1395 if (!was_alarmed) 1396 harvest_blocking_responses(); 1397 1398 if (!was_alarmed && !has_full_recv_buffer()) { 1399 /* 1400 * Nothing to do. Wait for something. 1401 */ 1402 io_handler(); 1403 } 1404 1405 if (alarm_flag) { /* alarmed? */ 1406 was_alarmed = TRUE; 1407 alarm_flag = FALSE; 1408 } 1409 1410 if (was_alarmed) { 1411 UNBLOCK_IO_AND_ALARM(); 1412 /* 1413 * Out here, signals are unblocked. Call timer routine 1414 * to process expiry. 1415 */ 1416 timer(); 1417 was_alarmed = FALSE; 1418 BLOCK_IO_AND_ALARM(); 1419 } 1420 1421 # endif /* !HAVE_IO_COMPLETION_PORT */ 1422 1423 # ifdef DEBUG_TIMING 1424 { 1425 l_fp pts; 1426 l_fp tsa, tsb; 1427 int bufcount = 0; 1428 1429 get_systime(&pts); 1430 tsa = pts; 1431 # endif 1432 rbuf = get_full_recv_buffer(); 1433 while (rbuf != NULL) { 1434 if (alarm_flag) { 1435 was_alarmed = TRUE; 1436 alarm_flag = FALSE; 1437 } 1438 UNBLOCK_IO_AND_ALARM(); 1439 1440 if (was_alarmed) { 1441 /* avoid timer starvation during lengthy I/O handling */ 1442 timer(); 1443 was_alarmed = FALSE; 1444 } 1445 1446 /* 1447 * Call the data procedure to handle each received 1448 * packet. 1449 */ 1450 if (rbuf->receiver != NULL) { 1451 # ifdef DEBUG_TIMING 1452 l_fp dts = pts; 1453 1454 L_SUB(&dts, &rbuf->recv_time); 1455 DPRINTF(2, ("processing timestamp delta %s (with prec. fuzz)\n", lfptoa(&dts, 9))); 1456 collect_timing(rbuf, "buffer processing delay", 1, &dts); 1457 bufcount++; 1458 # endif 1459 (*rbuf->receiver)(rbuf); 1460 } else { 1461 msyslog(LOG_ERR, "fatal: receive buffer callback NULL"); 1462 abort(); 1463 } 1464 1465 BLOCK_IO_AND_ALARM(); 1466 freerecvbuf(rbuf); 1467 rbuf = get_full_recv_buffer(); 1468 } 1469 # ifdef DEBUG_TIMING 1470 get_systime(&tsb); 1471 L_SUB(&tsb, &tsa); 1472 if (bufcount) { 1473 collect_timing(NULL, "processing", bufcount, &tsb); 1474 DPRINTF(2, ("processing time for %d buffers %s\n", bufcount, lfptoa(&tsb, 9))); 1475 } 1476 } 1477 # endif 1478 1479 /* 1480 * Go around again 1481 */ 1482 1483 # ifdef HAVE_DNSREGISTRATION 1484 if (mdnsreg && (current_time - mdnsreg ) > 60 && mdnstries && sys_leap != LEAP_NOTINSYNC) { 1485 mdnsreg = current_time; 1486 msyslog(LOG_INFO, "Attempting to register mDNS"); 1487 if ( DNSServiceRegister (&mdns, 0, 0, NULL, "_ntp._udp", NULL, NULL, 1488 htons(NTP_PORT), 0, NULL, NULL, NULL) != kDNSServiceErr_NoError ) { 1489 if (!--mdnstries) { 1490 msyslog(LOG_ERR, "Unable to register mDNS, giving up."); 1491 } else { 1492 msyslog(LOG_INFO, "Unable to register mDNS, will try later."); 1493 } 1494 } else { 1495 msyslog(LOG_INFO, "mDNS service registered."); 1496 mdnsreg = FALSE; 1497 } 1498 } 1499 # endif /* HAVE_DNSREGISTRATION */ 1500 1501 } 1502 UNBLOCK_IO_AND_ALARM(); 1503 return 1; 1504 } 1505 #endif /* !SIM */ 1506 1507 1508 #if !defined(SIM) && defined(SIGDIE1) 1509 /* 1510 * finish - exit gracefully 1511 */ 1512 static void 1513 finish_safe( 1514 int sig 1515 ) 1516 { 1517 const char *sig_desc; 1518 1519 sig_desc = NULL; 1520 #ifdef HAVE_STRSIGNAL 1521 sig_desc = strsignal(sig); 1522 #endif 1523 if (sig_desc == NULL) 1524 sig_desc = ""; 1525 msyslog(LOG_NOTICE, "%s exiting on signal %d (%s)", progname, 1526 sig, sig_desc); 1527 /* See Bug 2513 and Bug 2522 re the unlink of PIDFILE */ 1528 # ifdef HAVE_DNSREGISTRATION 1529 if (mdns != NULL) 1530 DNSServiceRefDeallocate(mdns); 1531 # endif 1532 peer_cleanup(); 1533 exit(0); 1534 } 1535 1536 static RETSIGTYPE 1537 finish( 1538 int sig 1539 ) 1540 { 1541 signalled = 1; 1542 signo = sig; 1543 } 1544 1545 #endif /* !SIM && SIGDIE1 */ 1546 1547 1548 #ifndef SIM 1549 /* 1550 * wait_child_sync_if - implements parent side of -w/--wait-sync 1551 */ 1552 # ifdef HAVE_WORKING_FORK 1553 static int 1554 wait_child_sync_if( 1555 int pipe_read_fd, 1556 long wait_sync 1557 ) 1558 { 1559 int rc; 1560 int exit_code; 1561 time_t wait_end_time; 1562 time_t cur_time; 1563 time_t wait_rem; 1564 fd_set readset; 1565 struct timeval wtimeout; 1566 1567 if (0 == wait_sync) 1568 return 0; 1569 1570 /* waitsync_fd_to_close used solely by child */ 1571 close(waitsync_fd_to_close); 1572 wait_end_time = time(NULL) + wait_sync; 1573 do { 1574 cur_time = time(NULL); 1575 wait_rem = (wait_end_time > cur_time) 1576 ? (wait_end_time - cur_time) 1577 : 0; 1578 wtimeout.tv_sec = wait_rem; 1579 wtimeout.tv_usec = 0; 1580 FD_ZERO(&readset); 1581 FD_SET(pipe_read_fd, &readset); 1582 rc = select(pipe_read_fd + 1, &readset, NULL, NULL, 1583 &wtimeout); 1584 if (-1 == rc) { 1585 if (EINTR == errno) 1586 continue; 1587 exit_code = (errno) ? errno : -1; 1588 msyslog(LOG_ERR, 1589 "--wait-sync select failed: %m"); 1590 return exit_code; 1591 } 1592 if (0 == rc) { 1593 /* 1594 * select() indicated a timeout, but in case 1595 * its timeouts are affected by a step of the 1596 * system clock, select() again with a zero 1597 * timeout to confirm. 1598 */ 1599 FD_ZERO(&readset); 1600 FD_SET(pipe_read_fd, &readset); 1601 wtimeout.tv_sec = 0; 1602 wtimeout.tv_usec = 0; 1603 rc = select(pipe_read_fd + 1, &readset, NULL, 1604 NULL, &wtimeout); 1605 if (0 == rc) /* select() timeout */ 1606 break; 1607 else /* readable */ 1608 return 0; 1609 } else /* readable */ 1610 return 0; 1611 } while (wait_rem > 0); 1612 1613 fprintf(stderr, "%s: -w/--wait-sync %ld timed out.\n", 1614 progname, wait_sync); 1615 return ETIMEDOUT; 1616 } 1617 # endif /* HAVE_WORKING_FORK */ 1618 1619 1620 /* 1621 * assertion_failed - Redirect assertion failures to msyslog(). 1622 */ 1623 static void 1624 assertion_failed( 1625 const char *file, 1626 int line, 1627 isc_assertiontype_t type, 1628 const char *cond 1629 ) 1630 { 1631 isc_assertion_setcallback(NULL); /* Avoid recursion */ 1632 1633 msyslog(LOG_ERR, "%s:%d: %s(%s) failed", 1634 file, line, isc_assertion_typetotext(type), cond); 1635 msyslog(LOG_ERR, "exiting (due to assertion failure)"); 1636 1637 #if defined(DEBUG) && defined(SYS_WINNT) 1638 if (debug) 1639 DebugBreak(); 1640 #endif 1641 1642 abort(); 1643 } 1644 1645 1646 /* 1647 * library_fatal_error - Handle fatal errors from our libraries. 1648 */ 1649 static void 1650 library_fatal_error( 1651 const char *file, 1652 int line, 1653 const char *format, 1654 va_list args 1655 ) 1656 { 1657 char errbuf[256]; 1658 1659 isc_error_setfatal(NULL); /* Avoid recursion */ 1660 1661 msyslog(LOG_ERR, "%s:%d: fatal error:", file, line); 1662 vsnprintf(errbuf, sizeof(errbuf), format, args); 1663 msyslog(LOG_ERR, "%s", errbuf); 1664 msyslog(LOG_ERR, "exiting (due to fatal error in library)"); 1665 1666 #if defined(DEBUG) && defined(SYS_WINNT) 1667 if (debug) 1668 DebugBreak(); 1669 #endif 1670 1671 abort(); 1672 } 1673 1674 1675 /* 1676 * library_unexpected_error - Handle non fatal errors from our libraries. 1677 */ 1678 # define MAX_UNEXPECTED_ERRORS 100 1679 int unexpected_error_cnt = 0; 1680 static void 1681 library_unexpected_error( 1682 const char *file, 1683 int line, 1684 const char *format, 1685 va_list args 1686 ) 1687 { 1688 char errbuf[256]; 1689 1690 if (unexpected_error_cnt >= MAX_UNEXPECTED_ERRORS) 1691 return; /* avoid clutter in log */ 1692 1693 msyslog(LOG_ERR, "%s:%d: unexpected error:", file, line); 1694 vsnprintf(errbuf, sizeof(errbuf), format, args); 1695 msyslog(LOG_ERR, "%s", errbuf); 1696 1697 if (++unexpected_error_cnt == MAX_UNEXPECTED_ERRORS) 1698 msyslog(LOG_ERR, "Too many errors. Shutting up."); 1699 1700 } 1701 #endif /* !SIM */ 1702 1703 #if !defined(SIM) && !defined(SYS_WINNT) 1704 # ifdef DEBUG 1705 1706 /* 1707 * moredebug - increase debugging verbosity 1708 */ 1709 static RETSIGTYPE 1710 moredebug( 1711 int sig 1712 ) 1713 { 1714 int saved_errno = errno; 1715 1716 if (debug < 255) 1717 { 1718 debug++; 1719 msyslog(LOG_DEBUG, "debug raised to %d", debug); 1720 } 1721 errno = saved_errno; 1722 } 1723 1724 1725 /* 1726 * lessdebug - decrease debugging verbosity 1727 */ 1728 static RETSIGTYPE 1729 lessdebug( 1730 int sig 1731 ) 1732 { 1733 int saved_errno = errno; 1734 1735 if (debug > 0) 1736 { 1737 debug--; 1738 msyslog(LOG_DEBUG, "debug lowered to %d", debug); 1739 } 1740 errno = saved_errno; 1741 } 1742 1743 # else /* !DEBUG follows */ 1744 1745 1746 /* 1747 * no_debug - We don't do the debug here. 1748 */ 1749 static RETSIGTYPE 1750 no_debug( 1751 int sig 1752 ) 1753 { 1754 int saved_errno = errno; 1755 1756 msyslog(LOG_DEBUG, "ntpd not compiled for debugging (signal %d)", sig); 1757 errno = saved_errno; 1758 } 1759 # endif /* !DEBUG */ 1760 #endif /* !SIM && !SYS_WINNT */ 1761