1 /* 2 * ntpd.c - main program for the fixed point NTP daemon 3 */ 4 5 #ifdef HAVE_CONFIG_H 6 # include <config.h> 7 #endif 8 9 #include "ntp_machine.h" 10 #include "ntpd.h" 11 #include "ntp_io.h" 12 #include "ntp_stdlib.h" 13 #include <ntp_random.h> 14 15 #include "ntp_config.h" 16 #include "ntp_syslog.h" 17 #include "ntp_assert.h" 18 #include "isc/error.h" 19 #include "isc/strerror.h" 20 #include "isc/formatcheck.h" 21 #include "iosignal.h" 22 23 #ifdef SIM 24 # include "ntpsim.h" 25 #endif 26 27 #include "ntp_libopts.h" 28 #include "ntpd-opts.h" 29 30 /* there's a short treatise below what the thread stuff is for. 31 * [Bug 2954] enable the threading warm-up only for Linux. 32 */ 33 #if defined(HAVE_PTHREADS) && HAVE_PTHREADS && !defined(NO_THREADS) 34 # ifdef HAVE_PTHREAD_H 35 # include <pthread.h> 36 # endif 37 # if defined(linux) 38 # define NEED_PTHREAD_WARMUP 39 # endif 40 #endif 41 42 #ifdef HAVE_UNISTD_H 43 # include <unistd.h> 44 #endif 45 #ifdef HAVE_SYS_STAT_H 46 # include <sys/stat.h> 47 #endif 48 #include <stdio.h> 49 #ifdef HAVE_SYS_PARAM_H 50 # include <sys/param.h> 51 #endif 52 #ifdef HAVE_SYS_SIGNAL_H 53 # include <sys/signal.h> 54 #else 55 # include <signal.h> 56 #endif 57 #ifdef HAVE_SYS_IOCTL_H 58 # include <sys/ioctl.h> 59 #endif /* HAVE_SYS_IOCTL_H */ 60 #if defined(HAVE_RTPRIO) 61 # ifdef HAVE_SYS_LOCK_H 62 # include <sys/lock.h> 63 # endif 64 # include <sys/rtprio.h> 65 #else 66 # ifdef HAVE_PLOCK 67 # ifdef HAVE_SYS_LOCK_H 68 # include <sys/lock.h> 69 # endif 70 # endif 71 #endif 72 #if defined(HAVE_SCHED_SETSCHEDULER) 73 # ifdef HAVE_SCHED_H 74 # include <sched.h> 75 # else 76 # ifdef HAVE_SYS_SCHED_H 77 # include <sys/sched.h> 78 # endif 79 # endif 80 #endif 81 #if defined(HAVE_SYS_MMAN_H) 82 # include <sys/mman.h> 83 #endif 84 85 #ifdef HAVE_TERMIOS_H 86 # include <termios.h> 87 #endif 88 89 #ifdef SYS_DOMAINOS 90 # include <apollo/base.h> 91 #endif /* SYS_DOMAINOS */ 92 93 94 #include "recvbuff.h" 95 #include "ntp_cmdargs.h" 96 97 #if 0 /* HMS: I don't think we need this. 961223 */ 98 #ifdef LOCK_PROCESS 99 # ifdef SYS_SOLARIS 100 # include <sys/mman.h> 101 # else 102 # include <sys/lock.h> 103 # endif 104 #endif 105 #endif 106 107 #ifdef SYS_WINNT 108 # include "ntservice.h" 109 #endif 110 111 #ifdef _AIX 112 # include <ulimit.h> 113 #endif /* _AIX */ 114 115 #ifdef SCO5_CLOCK 116 # include <sys/ci/ciioctl.h> 117 #endif 118 119 #ifdef HAVE_DROPROOT 120 # include <ctype.h> 121 # include <grp.h> 122 # include <pwd.h> 123 #ifdef HAVE_LINUX_CAPABILITIES 124 # include <sys/capability.h> 125 # include <sys/prctl.h> 126 #endif /* HAVE_LINUX_CAPABILITIES */ 127 #if defined(HAVE_PRIV_H) && defined(HAVE_SOLARIS_PRIVS) 128 # include <priv.h> 129 #endif /* HAVE_PRIV_H */ 130 #if defined(HAVE_TRUSTEDBSD_MAC) 131 # include <sys/mac.h> 132 #endif /* HAVE_TRUSTEDBSD_MAC */ 133 #endif /* HAVE_DROPROOT */ 134 135 #if defined (LIBSECCOMP) && (KERN_SECCOMP) 136 /* # include <sys/types.h> */ 137 # include <sys/resource.h> 138 # include <seccomp.h> 139 #endif /* LIBSECCOMP and KERN_SECCOMP */ 140 141 #ifdef HAVE_DNSREGISTRATION 142 # include <dns_sd.h> 143 DNSServiceRef mdns; 144 #endif 145 146 #ifdef HAVE_SETPGRP_0 147 # define ntp_setpgrp(x, y) setpgrp() 148 #else 149 # define ntp_setpgrp(x, y) setpgrp(x, y) 150 #endif 151 152 #ifdef HAVE_SOLARIS_PRIVS 153 # define LOWPRIVS "basic,sys_time,net_privaddr,proc_setid,!proc_info,!proc_session,!proc_exec" 154 static priv_set_t *lowprivs = NULL; 155 static priv_set_t *highprivs = NULL; 156 #endif /* HAVE_SOLARIS_PRIVS */ 157 /* 158 * Scheduling priority we run at 159 */ 160 #define NTPD_PRIO (-12) 161 162 int priority_done = 2; /* 0 - Set priority */ 163 /* 1 - priority is OK where it is */ 164 /* 2 - Don't set priority */ 165 /* 1 and 2 are pretty much the same */ 166 167 int listen_to_virtual_ips = TRUE; 168 169 /* 170 * No-fork flag. If set, we do not become a background daemon. 171 */ 172 int nofork; /* Fork by default */ 173 174 #ifdef HAVE_DNSREGISTRATION 175 /* 176 * mDNS registration flag. If set, we attempt to register with the mDNS system, but only 177 * after we have synched the first time. If the attempt fails, then try again once per 178 * minute for up to 5 times. After all, we may be starting before mDNS. 179 */ 180 int mdnsreg = FALSE; 181 int mdnstries = 5; 182 #endif /* HAVE_DNSREGISTRATION */ 183 184 #ifdef HAVE_DROPROOT 185 int droproot; 186 int root_dropped; 187 char *user; /* User to switch to */ 188 char *group; /* group to switch to */ 189 const char *chrootdir; /* directory to chroot to */ 190 uid_t sw_uid; 191 gid_t sw_gid; 192 struct group *gr; 193 struct passwd *pw; 194 #endif /* HAVE_DROPROOT */ 195 196 #ifdef HAVE_WORKING_FORK 197 int waitsync_fd_to_close = -1; /* -w/--wait-sync */ 198 #endif 199 200 /* 201 * Version declaration 202 */ 203 extern const char *Version; 204 205 char const *progname; 206 207 int was_alarmed; 208 209 #ifdef DECL_SYSCALL 210 /* 211 * We put this here, since the argument profile is syscall-specific 212 */ 213 extern int syscall (int, ...); 214 #endif /* DECL_SYSCALL */ 215 216 217 #if !defined(SIM) && defined(SIGDIE1) 218 static volatile int signalled = 0; 219 static volatile int signo = 0; 220 221 /* In an ideal world, 'finish_safe()' would declared as noreturn... */ 222 static void finish_safe (int); 223 static RETSIGTYPE finish (int); 224 #endif 225 226 #if !defined(SIM) && defined(HAVE_WORKING_FORK) 227 static int wait_child_sync_if (int, long); 228 #endif 229 230 #if !defined(SIM) && !defined(SYS_WINNT) 231 # ifdef DEBUG 232 static RETSIGTYPE moredebug (int); 233 static RETSIGTYPE lessdebug (int); 234 # else /* !DEBUG follows */ 235 static RETSIGTYPE no_debug (int); 236 # endif /* !DEBUG */ 237 #endif /* !SIM && !SYS_WINNT */ 238 239 #ifndef WORK_FORK 240 int saved_argc; 241 char ** saved_argv; 242 #endif 243 244 #ifndef SIM 245 int ntpdmain (int, char **); 246 static void set_process_priority (void); 247 static void assertion_failed (const char *, int, 248 isc_assertiontype_t, 249 const char *) 250 __attribute__ ((__noreturn__)); 251 static void library_fatal_error (const char *, int, 252 const char *, va_list) 253 ISC_FORMAT_PRINTF(3, 0); 254 static void library_unexpected_error(const char *, int, 255 const char *, va_list) 256 ISC_FORMAT_PRINTF(3, 0); 257 #endif /* !SIM */ 258 259 260 /* Bug2332 unearthed a problem in the interaction of reduced user 261 * privileges, the limits on memory usage and some versions of the 262 * pthread library on Linux systems. The 'pthread_cancel()' function and 263 * likely some others need to track the stack of the thread involved, 264 * and uses a function that comes from GCC (--> libgcc_s.so) to do 265 * this. Unfortunately the developers of glibc decided to load the 266 * library on demand, which speeds up program start but can cause 267 * trouble here: Due to all the things NTPD does to limit its resource 268 * usage, this deferred load of libgcc_s does not always work once the 269 * restrictions are in effect. 270 * 271 * One way out of this was attempting a forced link against libgcc_s 272 * when possible because it makes the library available immediately 273 * without deferred load. (The symbol resolution would still be dynamic 274 * and on demand, but the code would already be in the process image.) 275 * 276 * This is a tricky thing to do, since it's not necessary everywhere, 277 * not possible everywhere, has shown to break the build of other 278 * programs in the NTP suite and is now generally frowned upon. 279 * 280 * So we take a different approach here: We creat a worker thread that does 281 * actually nothing except waiting for cancellation and cancel it. If 282 * this is done before all the limitations are put in place, the 283 * machinery is pre-heated and all the runtime stuff should be in place 284 * and useable when needed. 285 * 286 * This uses only the standard pthread API and should work with all 287 * implementations of pthreads. It is not necessary everywhere, but it's 288 * cheap enough to go on nearly unnoticed. 289 * 290 * Addendum: Bug 2954 showed that the assumption that this should work 291 * with all OS is wrong -- at least FreeBSD bombs heavily. 292 */ 293 #ifdef NEED_PTHREAD_WARMUP 294 295 /* simple thread function: sleep until cancelled, just to exercise 296 * thread cancellation. 297 */ 298 static void* 299 my_pthread_warmup_worker( 300 void *thread_args) 301 { 302 (void)thread_args; 303 for (;;) 304 sleep(10); 305 return NULL; 306 } 307 308 /* pre-heat threading: create a thread and cancel it, just to exercise 309 * thread cancellation. 310 */ 311 static void 312 my_pthread_warmup(void) 313 { 314 pthread_t thread; 315 pthread_attr_t thr_attr; 316 int rc; 317 318 pthread_attr_init(&thr_attr); 319 #if defined(HAVE_PTHREAD_ATTR_GETSTACKSIZE) && \ 320 defined(HAVE_PTHREAD_ATTR_SETSTACKSIZE) && \ 321 defined(PTHREAD_STACK_MIN) 322 { 323 size_t ssmin = 32*1024; /* 32kB should be minimum */ 324 if (ssmin < PTHREAD_STACK_MIN) 325 ssmin = PTHREAD_STACK_MIN; 326 rc = pthread_attr_setstacksize(&thr_attr, ssmin); 327 if (0 != rc) 328 msyslog(LOG_ERR, 329 "my_pthread_warmup: pthread_attr_setstacksize() -> %s", 330 strerror(rc)); 331 } 332 #endif 333 rc = pthread_create( 334 &thread, &thr_attr, my_pthread_warmup_worker, NULL); 335 pthread_attr_destroy(&thr_attr); 336 if (0 != rc) { 337 msyslog(LOG_ERR, 338 "my_pthread_warmup: pthread_create() -> %s", 339 strerror(rc)); 340 } else { 341 pthread_cancel(thread); 342 pthread_join(thread, NULL); 343 } 344 } 345 346 #endif /*defined(NEED_PTHREAD_WARMUP)*/ 347 348 #ifdef NEED_EARLY_FORK 349 static void 350 dummy_callback(void) { return; } 351 352 static void 353 fork_nonchroot_worker(void) { 354 getaddrinfo_sometime("localhost", "ntp", NULL, INITIAL_DNS_RETRY, 355 (gai_sometime_callback)&dummy_callback, NULL); 356 } 357 #endif /* NEED_EARLY_FORK */ 358 359 void 360 parse_cmdline_opts( 361 int * pargc, 362 char ***pargv 363 ) 364 { 365 static int parsed; 366 static int optct; 367 368 if (!parsed) 369 optct = ntpOptionProcess(&ntpdOptions, *pargc, *pargv); 370 371 parsed = 1; 372 373 *pargc -= optct; 374 *pargv += optct; 375 } 376 377 378 #ifdef SIM 379 int 380 main( 381 int argc, 382 char *argv[] 383 ) 384 { 385 progname = argv[0]; 386 parse_cmdline_opts(&argc, &argv); 387 #ifdef DEBUG 388 debug = OPT_VALUE_SET_DEBUG_LEVEL; 389 DPRINTF(1, ("%s\n", Version)); 390 #endif 391 392 return ntpsim(argc, argv); 393 } 394 #else /* !SIM follows */ 395 #ifdef NO_MAIN_ALLOWED 396 CALL(ntpd,"ntpd",ntpdmain); 397 #else /* !NO_MAIN_ALLOWED follows */ 398 #ifndef SYS_WINNT 399 int 400 main( 401 int argc, 402 char *argv[] 403 ) 404 { 405 return ntpdmain(argc, argv); 406 } 407 #endif /* !SYS_WINNT */ 408 #endif /* !NO_MAIN_ALLOWED */ 409 #endif /* !SIM */ 410 411 #ifdef _AIX 412 /* 413 * OK. AIX is different than solaris in how it implements plock(). 414 * If you do NOT adjust the stack limit, you will get the MAXIMUM 415 * stack size allocated and PINNED with you program. To check the 416 * value, use ulimit -a. 417 * 418 * To fix this, we create an automatic variable and set our stack limit 419 * to that PLUS 32KB of extra space (we need some headroom). 420 * 421 * This subroutine gets the stack address. 422 * 423 * Grover Davidson and Matt Ladendorf 424 * 425 */ 426 static char * 427 get_aix_stack(void) 428 { 429 char ch; 430 return (&ch); 431 } 432 433 /* 434 * Signal handler for SIGDANGER. 435 */ 436 static void 437 catch_danger(int signo) 438 { 439 msyslog(LOG_INFO, "ntpd: setpgid(): %m"); 440 /* Make the system believe we'll free something, but don't do it! */ 441 return; 442 } 443 #endif /* _AIX */ 444 445 /* 446 * Set the process priority 447 */ 448 #ifndef SIM 449 static void 450 set_process_priority(void) 451 { 452 453 # ifdef DEBUG 454 if (debug > 1) 455 msyslog(LOG_DEBUG, "set_process_priority: %s: priority_done is <%d>", 456 ((priority_done) 457 ? "Leave priority alone" 458 : "Attempt to set priority" 459 ), 460 priority_done); 461 # endif /* DEBUG */ 462 463 # if defined(HAVE_SCHED_SETSCHEDULER) 464 if (!priority_done) { 465 extern int config_priority_override, config_priority; 466 int pmax, pmin; 467 struct sched_param sched; 468 469 pmax = sched_get_priority_max(SCHED_FIFO); 470 sched.sched_priority = pmax; 471 if ( config_priority_override ) { 472 pmin = sched_get_priority_min(SCHED_FIFO); 473 if ( config_priority > pmax ) 474 sched.sched_priority = pmax; 475 else if ( config_priority < pmin ) 476 sched.sched_priority = pmin; 477 else 478 sched.sched_priority = config_priority; 479 } 480 if ( sched_setscheduler(0, SCHED_FIFO, &sched) == -1 ) 481 msyslog(LOG_ERR, "sched_setscheduler(): %m"); 482 else 483 ++priority_done; 484 } 485 # endif /* HAVE_SCHED_SETSCHEDULER */ 486 # ifdef HAVE_RTPRIO 487 # ifdef RTP_SET 488 if (!priority_done) { 489 struct rtprio srtp; 490 491 srtp.type = RTP_PRIO_REALTIME; /* was: RTP_PRIO_NORMAL */ 492 srtp.prio = 0; /* 0 (hi) -> RTP_PRIO_MAX (31,lo) */ 493 494 if (rtprio(RTP_SET, getpid(), &srtp) < 0) 495 msyslog(LOG_ERR, "rtprio() error: %m"); 496 else 497 ++priority_done; 498 } 499 # else /* !RTP_SET follows */ 500 if (!priority_done) { 501 if (rtprio(0, 120) < 0) 502 msyslog(LOG_ERR, "rtprio() error: %m"); 503 else 504 ++priority_done; 505 } 506 # endif /* !RTP_SET */ 507 # endif /* HAVE_RTPRIO */ 508 # if defined(NTPD_PRIO) && NTPD_PRIO != 0 509 # ifdef HAVE_ATT_NICE 510 if (!priority_done) { 511 errno = 0; 512 if (-1 == nice (NTPD_PRIO) && errno != 0) 513 msyslog(LOG_ERR, "nice() error: %m"); 514 else 515 ++priority_done; 516 } 517 # endif /* HAVE_ATT_NICE */ 518 # ifdef HAVE_BSD_NICE 519 if (!priority_done) { 520 if (-1 == setpriority(PRIO_PROCESS, 0, NTPD_PRIO)) 521 msyslog(LOG_ERR, "setpriority() error: %m"); 522 else 523 ++priority_done; 524 } 525 # endif /* HAVE_BSD_NICE */ 526 # endif /* NTPD_PRIO && NTPD_PRIO != 0 */ 527 if (!priority_done) 528 msyslog(LOG_ERR, "set_process_priority: No way found to improve our priority"); 529 } 530 #endif /* !SIM */ 531 532 #if !defined(SIM) && !defined(SYS_WINNT) 533 /* 534 * Detach from terminal (much like daemon()) 535 * Nothe that this function calls exit() 536 */ 537 static void 538 detach_from_terminal( 539 int pipe_fds[2], 540 long wait_sync, 541 const char *logfilename 542 ) 543 { 544 int rc; 545 int exit_code; 546 # if !defined(HAVE_SETSID) && !defined (HAVE_SETPGID) && defined(TIOCNOTTY) 547 int fid; 548 # endif 549 # ifdef _AIX 550 struct sigaction sa; 551 # endif 552 553 rc = fork(); 554 if (-1 == rc) { 555 exit_code = (errno) ? errno : -1; 556 msyslog(LOG_ERR, "fork: %m"); 557 exit(exit_code); 558 } 559 if (rc > 0) { 560 /* parent */ 561 exit_code = wait_child_sync_if(pipe_fds[0], 562 wait_sync); 563 exit(exit_code); 564 } 565 566 /* 567 * child/daemon 568 * close all open files excepting waitsync_fd_to_close. 569 * msyslog() unreliable until after init_logging(). 570 */ 571 closelog(); 572 if (syslog_file != NULL) { 573 fclose(syslog_file); 574 syslog_file = NULL; 575 syslogit = TRUE; 576 } 577 close_all_except(waitsync_fd_to_close); 578 INSIST(0 == open("/dev/null", 0) && 1 == dup2(0, 1) \ 579 && 2 == dup2(0, 2)); 580 581 init_logging(progname, 0, TRUE); 582 /* we lost our logfile (if any) daemonizing */ 583 setup_logfile(logfilename); 584 585 # ifdef SYS_DOMAINOS 586 { 587 uid_$t puid; 588 status_$t st; 589 590 proc2_$who_am_i(&puid); 591 proc2_$make_server(&puid, &st); 592 } 593 # endif /* SYS_DOMAINOS */ 594 # ifdef HAVE_SETSID 595 if (setsid() == (pid_t)-1) 596 msyslog(LOG_ERR, "setsid(): %m"); 597 # elif defined(HAVE_SETPGID) 598 if (setpgid(0, 0) == -1) 599 msyslog(LOG_ERR, "setpgid(): %m"); 600 # else /* !HAVE_SETSID && !HAVE_SETPGID follows */ 601 # ifdef TIOCNOTTY 602 fid = open("/dev/tty", 2); 603 if (fid >= 0) { 604 ioctl(fid, (u_long)TIOCNOTTY, NULL); 605 close(fid); 606 } 607 # endif /* TIOCNOTTY */ 608 ntp_setpgrp(0, getpid()); 609 # endif /* !HAVE_SETSID && !HAVE_SETPGID */ 610 # ifdef _AIX 611 /* Don't get killed by low-on-memory signal. */ 612 sa.sa_handler = catch_danger; 613 sigemptyset(&sa.sa_mask); 614 sa.sa_flags = SA_RESTART; 615 sigaction(SIGDANGER, &sa, NULL); 616 # endif /* _AIX */ 617 618 return; 619 } 620 621 #ifdef HAVE_DROPROOT 622 /* 623 * Map user name/number to user ID 624 */ 625 static int 626 map_user( 627 ) 628 { 629 char *endp; 630 631 if (isdigit((unsigned char)*user)) { 632 sw_uid = (uid_t)strtoul(user, &endp, 0); 633 if (*endp != '\0') 634 goto getuser; 635 636 if ((pw = getpwuid(sw_uid)) != NULL) { 637 free(user); 638 user = estrdup(pw->pw_name); 639 sw_gid = pw->pw_gid; 640 } else { 641 errno = 0; 642 msyslog(LOG_ERR, "Cannot find user ID %s", user); 643 return 0; 644 } 645 646 } else { 647 getuser: 648 errno = 0; 649 if ((pw = getpwnam(user)) != NULL) { 650 sw_uid = pw->pw_uid; 651 sw_gid = pw->pw_gid; 652 } else { 653 if (errno) 654 msyslog(LOG_ERR, "getpwnam(%s) failed: %m", user); 655 else 656 msyslog(LOG_ERR, "Cannot find user `%s'", user); 657 return 0; 658 } 659 } 660 661 return 1; 662 } 663 664 /* 665 * Map group name/number to group ID 666 */ 667 static int 668 map_group( 669 ) 670 { 671 char *endp; 672 673 if (isdigit((unsigned char)*group)) { 674 sw_gid = (gid_t)strtoul(group, &endp, 0); 675 if (*endp != '\0') 676 goto getgroup; 677 } else { 678 getgroup: 679 if ((gr = getgrnam(group)) != NULL) { 680 sw_gid = gr->gr_gid; 681 } else { 682 errno = 0; 683 msyslog(LOG_ERR, "Cannot find group `%s'", group); 684 return 0; 685 } 686 } 687 688 return 1; 689 } 690 691 /* 692 * Change (effective) user and group IDs, also initialize the supplementary group access list 693 */ 694 int 695 set_user_group_ids( 696 ) 697 { 698 /* If the the user was already mapped, no need to map it again */ 699 if ((NULL != user) && (0 == sw_uid)) { 700 if (0 == map_user()) 701 exit (-1); 702 } 703 /* same applies for the group */ 704 if ((NULL != group) && (0 == sw_gid)) { 705 if (0 == map_group()) 706 exit (-1); 707 } 708 709 if (user && initgroups(user, sw_gid)) { 710 msyslog(LOG_ERR, "Cannot initgroups() to user `%s': %m", user); 711 return 0; 712 } 713 if (group && setgid(sw_gid)) { 714 msyslog(LOG_ERR, "Cannot setgid() to group `%s': %m", group); 715 return 0; 716 } 717 if (group && setegid(sw_gid)) { 718 msyslog(LOG_ERR, "Cannot setegid() to group `%s': %m", group); 719 return 0; 720 } 721 if (group) { 722 if (0 != setgroups(1, &sw_gid)) { 723 msyslog(LOG_ERR, "setgroups(1, %d) failed: %m", sw_gid); 724 return 0; 725 } 726 } 727 else if (pw) 728 if (0 != initgroups(pw->pw_name, pw->pw_gid)) { 729 msyslog(LOG_ERR, "initgroups(<%s>, %d) filed: %m", pw->pw_name, pw->pw_gid); 730 return 0; 731 } 732 if (user && setuid(sw_uid)) { 733 msyslog(LOG_ERR, "Cannot setuid() to user `%s': %m", user); 734 return 0; 735 } 736 if (user && seteuid(sw_uid)) { 737 msyslog(LOG_ERR, "Cannot seteuid() to user `%s': %m", user); 738 return 0; 739 } 740 741 return 1; 742 } 743 #endif /* HAVE_DROPROOT */ 744 #endif /* !SIM */ 745 746 /* 747 * Main program. Initialize us, disconnect us from the tty if necessary, 748 * and loop waiting for I/O and/or timer expiries. 749 */ 750 #ifndef SIM 751 int 752 ntpdmain( 753 int argc, 754 char *argv[] 755 ) 756 { 757 l_fp now; 758 struct recvbuf *rbuf; 759 const char * logfilename; 760 # ifdef HAVE_UMASK 761 mode_t uv; 762 # endif 763 # if defined(HAVE_GETUID) && !defined(MPE) /* MPE lacks the concept of root */ 764 uid_t uid; 765 # endif 766 # if defined(HAVE_WORKING_FORK) 767 long wait_sync = 0; 768 int pipe_fds[2]; 769 int rc; 770 int exit_code; 771 # endif /* HAVE_WORKING_FORK*/ 772 # ifdef SCO5_CLOCK 773 int fd; 774 int zero; 775 # endif 776 777 # ifdef NEED_PTHREAD_WARMUP 778 my_pthread_warmup(); 779 # endif 780 781 # ifdef HAVE_UMASK 782 uv = umask(0); 783 if (uv) 784 umask(uv); 785 else 786 umask(022); 787 # endif 788 saved_argc = argc; 789 saved_argv = argv; 790 progname = argv[0]; 791 initializing = TRUE; /* mark that we are initializing */ 792 parse_cmdline_opts(&argc, &argv); 793 # ifdef DEBUG 794 debug = OPT_VALUE_SET_DEBUG_LEVEL; 795 # ifdef HAVE_SETLINEBUF 796 setlinebuf(stdout); 797 # endif 798 # endif 799 800 if (HAVE_OPT(NOFORK) || HAVE_OPT(QUIT) 801 # ifdef DEBUG 802 || debug 803 # endif 804 || HAVE_OPT(SAVECONFIGQUIT)) 805 nofork = TRUE; 806 807 init_logging(progname, NLOG_SYNCMASK, TRUE); 808 /* honor -l/--logfile option to log to a file */ 809 if (HAVE_OPT(LOGFILE)) { 810 logfilename = OPT_ARG(LOGFILE); 811 syslogit = FALSE; 812 change_logfile(logfilename, FALSE); 813 } else { 814 logfilename = NULL; 815 if (nofork) 816 msyslog_term = TRUE; 817 if (HAVE_OPT(SAVECONFIGQUIT)) 818 syslogit = FALSE; 819 } 820 msyslog(LOG_NOTICE, "%s: Starting", Version); 821 822 { 823 int i; 824 char buf[1024]; /* Secret knowledge of msyslog buf length */ 825 char *cp = buf; 826 827 /* Note that every arg has an initial space character */ 828 snprintf(cp, sizeof(buf), "Command line:"); 829 cp += strlen(cp); 830 831 for (i = 0; i < saved_argc ; ++i) { 832 snprintf(cp, sizeof(buf) - (cp - buf), 833 " %s", saved_argv[i]); 834 cp += strlen(cp); 835 } 836 msyslog(LOG_INFO, "%s", buf); 837 } 838 839 /* 840 * Install trap handlers to log errors and assertion failures. 841 * Default handlers print to stderr which doesn't work if detached. 842 */ 843 isc_assertion_setcallback(assertion_failed); 844 isc_error_setfatal(library_fatal_error); 845 isc_error_setunexpected(library_unexpected_error); 846 847 /* MPE lacks the concept of root */ 848 # if defined(HAVE_GETUID) && !defined(MPE) 849 uid = getuid(); 850 if (uid && !HAVE_OPT( SAVECONFIGQUIT ) 851 # if defined(HAVE_TRUSTEDBSD_MAC) 852 /* We can run as non-root if the mac_ntpd policy is enabled. */ 853 && mac_is_present("ntpd") != 1 854 # endif 855 ) { 856 msyslog_term = TRUE; 857 msyslog(LOG_ERR, 858 "must be run as root, not uid %ld", (long)uid); 859 exit(1); 860 } 861 # endif 862 863 /* 864 * Enable the Multi-Media Timer for Windows? 865 */ 866 # ifdef SYS_WINNT 867 if (HAVE_OPT( MODIFYMMTIMER )) 868 set_mm_timer(MM_TIMER_HIRES); 869 # endif 870 871 #ifdef HAVE_DNSREGISTRATION 872 /* 873 * Enable mDNS registrations? 874 */ 875 if (HAVE_OPT( MDNS )) { 876 mdnsreg = TRUE; 877 } 878 #endif /* HAVE_DNSREGISTRATION */ 879 880 if (HAVE_OPT( NOVIRTUALIPS )) 881 listen_to_virtual_ips = 0; 882 883 /* 884 * --interface, listen on specified interfaces 885 */ 886 if (HAVE_OPT( INTERFACE )) { 887 int ifacect = STACKCT_OPT( INTERFACE ); 888 const char** ifaces = STACKLST_OPT( INTERFACE ); 889 sockaddr_u addr; 890 891 while (ifacect-- > 0) { 892 add_nic_rule( 893 is_ip_address(*ifaces, AF_UNSPEC, &addr) 894 ? MATCH_IFADDR 895 : MATCH_IFNAME, 896 *ifaces, -1, ACTION_LISTEN); 897 ifaces++; 898 } 899 } 900 901 if (HAVE_OPT( NICE )) 902 priority_done = 0; 903 904 # ifdef HAVE_SCHED_SETSCHEDULER 905 if (HAVE_OPT( PRIORITY )) { 906 config_priority = OPT_VALUE_PRIORITY; 907 config_priority_override = 1; 908 priority_done = 0; 909 } 910 # endif 911 912 # ifdef HAVE_WORKING_FORK 913 /* make sure the FDs are initialised */ 914 pipe_fds[0] = -1; 915 pipe_fds[1] = -1; 916 do { /* 'loop' once */ 917 if (!HAVE_OPT( WAIT_SYNC )) 918 break; 919 wait_sync = OPT_VALUE_WAIT_SYNC; 920 if (wait_sync <= 0) { 921 wait_sync = 0; 922 break; 923 } 924 /* -w requires a fork() even with debug > 0 */ 925 nofork = FALSE; 926 if (pipe(pipe_fds)) { 927 exit_code = (errno) ? errno : -1; 928 msyslog(LOG_ERR, 929 "Pipe creation failed for --wait-sync: %m"); 930 exit(exit_code); 931 } 932 waitsync_fd_to_close = pipe_fds[1]; 933 } while (0); /* 'loop' once */ 934 # endif /* HAVE_WORKING_FORK */ 935 936 init_lib(); 937 # ifdef SYS_WINNT 938 /* 939 * Make sure the service is initialized before we do anything else 940 */ 941 ntservice_init(); 942 943 /* 944 * Start interpolation thread, must occur before first 945 * get_systime() 946 */ 947 init_winnt_time(); 948 # endif 949 /* 950 * Initialize random generator and public key pair 951 */ 952 get_systime(&now); 953 954 ntp_srandom((int)(now.l_i * now.l_uf)); 955 956 /* 957 * Detach us from the terminal. May need an #ifndef GIZMO. 958 */ 959 if (!nofork) { 960 961 # ifdef HAVE_WORKING_FORK 962 detach_from_terminal(pipe_fds, wait_sync, logfilename); 963 # endif /* HAVE_WORKING_FORK */ 964 } 965 966 # ifdef SCO5_CLOCK 967 /* 968 * SCO OpenServer's system clock offers much more precise timekeeping 969 * on the base CPU than the other CPUs (for multiprocessor systems), 970 * so we must lock to the base CPU. 971 */ 972 fd = open("/dev/at1", O_RDONLY); 973 if (fd >= 0) { 974 zero = 0; 975 if (ioctl(fd, ACPU_LOCK, &zero) < 0) 976 msyslog(LOG_ERR, "cannot lock to base CPU: %m"); 977 close(fd); 978 } 979 # endif 980 981 /* Setup stack size in preparation for locking pages in memory. */ 982 # if defined(HAVE_MLOCKALL) 983 # ifdef HAVE_SETRLIMIT 984 ntp_rlimit(RLIMIT_STACK, DFLT_RLIMIT_STACK * 4096, 4096, "4k"); 985 # ifdef RLIMIT_MEMLOCK 986 /* 987 * The default RLIMIT_MEMLOCK is very low on Linux systems. 988 * Unless we increase this limit malloc calls are likely to 989 * fail if we drop root privilege. To be useful the value 990 * has to be larger than the largest ntpd resident set size. 991 */ 992 ntp_rlimit(RLIMIT_MEMLOCK, DFLT_RLIMIT_MEMLOCK * 1024 * 1024, 1024 * 1024, "MB"); 993 # endif /* RLIMIT_MEMLOCK */ 994 # endif /* HAVE_SETRLIMIT */ 995 # else /* !HAVE_MLOCKALL follows */ 996 # ifdef HAVE_PLOCK 997 # ifdef PROCLOCK 998 # ifdef _AIX 999 /* 1000 * set the stack limit for AIX for plock(). 1001 * see get_aix_stack() for more info. 1002 */ 1003 if (ulimit(SET_STACKLIM, (get_aix_stack() - 8 * 4096)) < 0) 1004 msyslog(LOG_ERR, 1005 "Cannot adjust stack limit for plock: %m"); 1006 # endif /* _AIX */ 1007 # endif /* PROCLOCK */ 1008 # endif /* HAVE_PLOCK */ 1009 # endif /* !HAVE_MLOCKALL */ 1010 1011 /* 1012 * Set up signals we pay attention to locally. 1013 */ 1014 # ifdef SIGDIE1 1015 signal_no_reset(SIGDIE1, finish); 1016 signal_no_reset(SIGDIE2, finish); 1017 signal_no_reset(SIGDIE3, finish); 1018 signal_no_reset(SIGDIE4, finish); 1019 # endif 1020 # ifdef SIGBUS 1021 signal_no_reset(SIGBUS, finish); 1022 # endif 1023 1024 # if !defined(SYS_WINNT) && !defined(VMS) 1025 # ifdef DEBUG 1026 (void) signal_no_reset(MOREDEBUGSIG, moredebug); 1027 (void) signal_no_reset(LESSDEBUGSIG, lessdebug); 1028 # else 1029 (void) signal_no_reset(MOREDEBUGSIG, no_debug); 1030 (void) signal_no_reset(LESSDEBUGSIG, no_debug); 1031 # endif /* DEBUG */ 1032 # endif /* !SYS_WINNT && !VMS */ 1033 1034 /* 1035 * Set up signals we should never pay attention to. 1036 */ 1037 # ifdef SIGPIPE 1038 signal_no_reset(SIGPIPE, SIG_IGN); 1039 # endif 1040 1041 /* 1042 * Call the init_ routines to initialize the data structures. 1043 * 1044 * Exactly what command-line options are we expecting here? 1045 */ 1046 INIT_SSL(); 1047 init_auth(); 1048 init_util(); 1049 init_restrict(); 1050 init_mon(); 1051 init_timer(); 1052 init_request(); 1053 init_control(); 1054 init_peer(); 1055 # ifdef REFCLOCK 1056 init_refclock(); 1057 # endif 1058 set_process_priority(); 1059 init_proto(); /* Call at high priority */ 1060 init_io(); 1061 init_loopfilter(); 1062 mon_start(MON_ON); /* monitor on by default now */ 1063 /* turn off in config if unwanted */ 1064 1065 /* 1066 * Get the configuration. This is done in a separate module 1067 * since this will definitely be different for the gizmo board. 1068 */ 1069 getconfig(argc, argv); 1070 1071 if (-1 == cur_memlock) { 1072 # if defined(HAVE_MLOCKALL) 1073 /* 1074 * lock the process into memory 1075 */ 1076 if ( !HAVE_OPT(SAVECONFIGQUIT) 1077 # ifdef RLIMIT_MEMLOCK 1078 && -1 != DFLT_RLIMIT_MEMLOCK 1079 # endif 1080 && 0 != mlockall(MCL_CURRENT|MCL_FUTURE)) 1081 msyslog(LOG_ERR, "mlockall(): %m"); 1082 # else /* !HAVE_MLOCKALL follows */ 1083 # ifdef HAVE_PLOCK 1084 # ifdef PROCLOCK 1085 /* 1086 * lock the process into memory 1087 */ 1088 if (!HAVE_OPT(SAVECONFIGQUIT) && 0 != plock(PROCLOCK)) 1089 msyslog(LOG_ERR, "plock(PROCLOCK): %m"); 1090 # else /* !PROCLOCK follows */ 1091 # ifdef TXTLOCK 1092 /* 1093 * Lock text into ram 1094 */ 1095 if (!HAVE_OPT(SAVECONFIGQUIT) && 0 != plock(TXTLOCK)) 1096 msyslog(LOG_ERR, "plock(TXTLOCK) error: %m"); 1097 # else /* !TXTLOCK follows */ 1098 msyslog(LOG_ERR, "plock() - don't know what to lock!"); 1099 # endif /* !TXTLOCK */ 1100 # endif /* !PROCLOCK */ 1101 # endif /* HAVE_PLOCK */ 1102 # endif /* !HAVE_MLOCKALL */ 1103 } 1104 1105 loop_config(LOOP_DRIFTINIT, 0); 1106 report_event(EVNT_SYSRESTART, NULL, NULL); 1107 initializing = FALSE; 1108 1109 # ifdef HAVE_DROPROOT 1110 if (droproot) { 1111 1112 #ifdef NEED_EARLY_FORK 1113 fork_nonchroot_worker(); 1114 #endif 1115 1116 /* Drop super-user privileges and chroot now if the OS supports this */ 1117 1118 # ifdef HAVE_LINUX_CAPABILITIES 1119 /* set flag: keep privileges accross setuid() call (we only really need cap_sys_time): */ 1120 if (prctl( PR_SET_KEEPCAPS, 1L, 0L, 0L, 0L ) == -1) { 1121 msyslog( LOG_ERR, "prctl( PR_SET_KEEPCAPS, 1L ) failed: %m" ); 1122 exit(-1); 1123 } 1124 # elif HAVE_SOLARIS_PRIVS 1125 /* Nothing to do here */ 1126 # else 1127 /* we need a user to switch to */ 1128 if (user == NULL) { 1129 msyslog(LOG_ERR, "Need user name to drop root privileges (see -u flag!)" ); 1130 exit(-1); 1131 } 1132 # endif /* HAVE_LINUX_CAPABILITIES || HAVE_SOLARIS_PRIVS */ 1133 1134 if (user != NULL) { 1135 if (0 == map_user()) 1136 exit (-1); 1137 } 1138 if (group != NULL) { 1139 if (0 == map_group()) 1140 exit (-1); 1141 } 1142 1143 if (chrootdir ) { 1144 /* make sure cwd is inside the jail: */ 1145 if (chdir(chrootdir)) { 1146 msyslog(LOG_ERR, "Cannot chdir() to `%s': %m", chrootdir); 1147 exit (-1); 1148 } 1149 if (chroot(chrootdir)) { 1150 msyslog(LOG_ERR, "Cannot chroot() to `%s': %m", chrootdir); 1151 exit (-1); 1152 } 1153 if (chdir("/")) { 1154 msyslog(LOG_ERR, "Cannot chdir() to`root after chroot(): %m"); 1155 exit (-1); 1156 } 1157 } 1158 # ifdef HAVE_SOLARIS_PRIVS 1159 if ((lowprivs = priv_str_to_set(LOWPRIVS, ",", NULL)) == NULL) { 1160 msyslog(LOG_ERR, "priv_str_to_set() failed:%m"); 1161 exit(-1); 1162 } 1163 if ((highprivs = priv_allocset()) == NULL) { 1164 msyslog(LOG_ERR, "priv_allocset() failed:%m"); 1165 exit(-1); 1166 } 1167 (void) getppriv(PRIV_PERMITTED, highprivs); 1168 (void) priv_intersect(highprivs, lowprivs); 1169 if (setppriv(PRIV_SET, PRIV_PERMITTED, lowprivs) == -1) { 1170 msyslog(LOG_ERR, "setppriv() failed:%m"); 1171 exit(-1); 1172 } 1173 # endif /* HAVE_SOLARIS_PRIVS */ 1174 if (0 == set_user_group_ids()) 1175 exit(-1); 1176 1177 # if defined(HAVE_TRUSTEDBSD_MAC) 1178 /* 1179 * To manipulate system time and (re-)bind to NTP_PORT as needed 1180 * following interface changes, we must either run as uid 0 or 1181 * the mac_ntpd policy module must be enabled. 1182 */ 1183 if (sw_uid != 0 && mac_is_present("ntpd") != 1) { 1184 msyslog(LOG_ERR, "Need MAC 'ntpd' policy enabled to drop root privileges"); 1185 exit (-1); 1186 } 1187 # elif !defined(HAVE_LINUX_CAPABILITIES) && !defined(HAVE_SOLARIS_PRIVS) 1188 /* 1189 * for now assume that the privilege to bind to privileged ports 1190 * is associated with running with uid 0 - should be refined on 1191 * ports that allow binding to NTP_PORT with uid != 0 1192 */ 1193 disable_dynamic_updates |= (sw_uid != 0); /* also notifies routing message listener */ 1194 # endif /* !HAVE_LINUX_CAPABILITIES && !HAVE_SOLARIS_PRIVS */ 1195 1196 if (disable_dynamic_updates && interface_interval) { 1197 interface_interval = 0; 1198 msyslog(LOG_INFO, "running as non-root disables dynamic interface tracking"); 1199 } 1200 1201 # ifdef HAVE_LINUX_CAPABILITIES 1202 { 1203 /* 1204 * We may be running under non-root uid now, but we still hold full root privileges! 1205 * We drop all of them, except for the crucial one or two: cap_sys_time and 1206 * cap_net_bind_service if doing dynamic interface tracking. 1207 */ 1208 cap_t caps; 1209 char *captext; 1210 1211 captext = (0 != interface_interval) 1212 ? "cap_sys_time,cap_net_bind_service=pe" 1213 : "cap_sys_time=pe"; 1214 caps = cap_from_text(captext); 1215 if (!caps) { 1216 msyslog(LOG_ERR, 1217 "cap_from_text(%s) failed: %m", 1218 captext); 1219 exit(-1); 1220 } 1221 if (-1 == cap_set_proc(caps)) { 1222 msyslog(LOG_ERR, 1223 "cap_set_proc() failed to drop root privs: %m"); 1224 exit(-1); 1225 } 1226 cap_free(caps); 1227 } 1228 # endif /* HAVE_LINUX_CAPABILITIES */ 1229 # ifdef HAVE_SOLARIS_PRIVS 1230 if (priv_delset(lowprivs, "proc_setid") == -1) { 1231 msyslog(LOG_ERR, "priv_delset() failed:%m"); 1232 exit(-1); 1233 } 1234 if (setppriv(PRIV_SET, PRIV_PERMITTED, lowprivs) == -1) { 1235 msyslog(LOG_ERR, "setppriv() failed:%m"); 1236 exit(-1); 1237 } 1238 priv_freeset(lowprivs); 1239 priv_freeset(highprivs); 1240 # endif /* HAVE_SOLARIS_PRIVS */ 1241 root_dropped = TRUE; 1242 fork_deferred_worker(); 1243 } /* if (droproot) */ 1244 # endif /* HAVE_DROPROOT */ 1245 1246 /* libssecomp sandboxing */ 1247 #if defined (LIBSECCOMP) && (KERN_SECCOMP) 1248 scmp_filter_ctx ctx; 1249 1250 if ((ctx = seccomp_init(SCMP_ACT_KILL)) < 0) 1251 msyslog(LOG_ERR, "%s: seccomp_init(SCMP_ACT_KILL) failed: %m", __func__); 1252 else { 1253 msyslog(LOG_DEBUG, "%s: seccomp_init(SCMP_ACT_KILL) succeeded", __func__); 1254 } 1255 1256 #ifdef __x86_64__ 1257 int scmp_sc[] = { 1258 SCMP_SYS(adjtimex), 1259 SCMP_SYS(bind), 1260 SCMP_SYS(brk), 1261 SCMP_SYS(chdir), 1262 SCMP_SYS(clock_gettime), 1263 SCMP_SYS(clock_settime), 1264 SCMP_SYS(close), 1265 SCMP_SYS(connect), 1266 SCMP_SYS(exit_group), 1267 SCMP_SYS(fstat), 1268 SCMP_SYS(fsync), 1269 SCMP_SYS(futex), 1270 SCMP_SYS(getitimer), 1271 SCMP_SYS(getsockname), 1272 SCMP_SYS(ioctl), 1273 SCMP_SYS(lseek), 1274 SCMP_SYS(madvise), 1275 SCMP_SYS(mmap), 1276 SCMP_SYS(munmap), 1277 SCMP_SYS(open), 1278 SCMP_SYS(poll), 1279 SCMP_SYS(read), 1280 SCMP_SYS(recvmsg), 1281 SCMP_SYS(rename), 1282 SCMP_SYS(rt_sigaction), 1283 SCMP_SYS(rt_sigprocmask), 1284 SCMP_SYS(rt_sigreturn), 1285 SCMP_SYS(select), 1286 SCMP_SYS(sendto), 1287 SCMP_SYS(setitimer), 1288 SCMP_SYS(setsid), 1289 SCMP_SYS(socket), 1290 SCMP_SYS(stat), 1291 SCMP_SYS(time), 1292 SCMP_SYS(write), 1293 }; 1294 #endif 1295 #ifdef __i386__ 1296 int scmp_sc[] = { 1297 SCMP_SYS(_newselect), 1298 SCMP_SYS(adjtimex), 1299 SCMP_SYS(brk), 1300 SCMP_SYS(chdir), 1301 SCMP_SYS(clock_gettime), 1302 SCMP_SYS(clock_settime), 1303 SCMP_SYS(close), 1304 SCMP_SYS(exit_group), 1305 SCMP_SYS(fsync), 1306 SCMP_SYS(futex), 1307 SCMP_SYS(getitimer), 1308 SCMP_SYS(madvise), 1309 SCMP_SYS(mmap), 1310 SCMP_SYS(mmap2), 1311 SCMP_SYS(munmap), 1312 SCMP_SYS(open), 1313 SCMP_SYS(poll), 1314 SCMP_SYS(read), 1315 SCMP_SYS(rename), 1316 SCMP_SYS(rt_sigaction), 1317 SCMP_SYS(rt_sigprocmask), 1318 SCMP_SYS(select), 1319 SCMP_SYS(setitimer), 1320 SCMP_SYS(setsid), 1321 SCMP_SYS(sigprocmask), 1322 SCMP_SYS(sigreturn), 1323 SCMP_SYS(socketcall), 1324 SCMP_SYS(stat64), 1325 SCMP_SYS(time), 1326 SCMP_SYS(write), 1327 }; 1328 #endif 1329 { 1330 int i; 1331 1332 for (i = 0; i < COUNTOF(scmp_sc); i++) { 1333 if (seccomp_rule_add(ctx, 1334 SCMP_ACT_ALLOW, scmp_sc[i], 0) < 0) { 1335 msyslog(LOG_ERR, 1336 "%s: seccomp_rule_add() failed: %m", 1337 __func__); 1338 } 1339 } 1340 } 1341 1342 if (seccomp_load(ctx) < 0) 1343 msyslog(LOG_ERR, "%s: seccomp_load() failed: %m", 1344 __func__); 1345 else { 1346 msyslog(LOG_DEBUG, "%s: seccomp_load() succeeded", __func__); 1347 } 1348 #endif /* LIBSECCOMP and KERN_SECCOMP */ 1349 1350 #ifdef SYS_WINNT 1351 ntservice_isup(); 1352 #endif 1353 1354 # ifdef HAVE_IO_COMPLETION_PORT 1355 1356 for (;;) { 1357 #if !defined(SIM) && defined(SIGDIE1) 1358 if (signalled) 1359 finish_safe(signo); 1360 #endif 1361 GetReceivedBuffers(); 1362 # else /* normal I/O */ 1363 1364 BLOCK_IO_AND_ALARM(); 1365 was_alarmed = FALSE; 1366 1367 for (;;) { 1368 #if !defined(SIM) && defined(SIGDIE1) 1369 if (signalled) 1370 finish_safe(signo); 1371 #endif 1372 if (alarm_flag) { /* alarmed? */ 1373 was_alarmed = TRUE; 1374 alarm_flag = FALSE; 1375 } 1376 1377 /* collect async name/addr results */ 1378 if (!was_alarmed) 1379 harvest_blocking_responses(); 1380 1381 if (!was_alarmed && !has_full_recv_buffer()) { 1382 /* 1383 * Nothing to do. Wait for something. 1384 */ 1385 io_handler(); 1386 } 1387 1388 if (alarm_flag) { /* alarmed? */ 1389 was_alarmed = TRUE; 1390 alarm_flag = FALSE; 1391 } 1392 1393 if (was_alarmed) { 1394 UNBLOCK_IO_AND_ALARM(); 1395 /* 1396 * Out here, signals are unblocked. Call timer routine 1397 * to process expiry. 1398 */ 1399 timer(); 1400 was_alarmed = FALSE; 1401 BLOCK_IO_AND_ALARM(); 1402 } 1403 1404 # endif /* !HAVE_IO_COMPLETION_PORT */ 1405 1406 # ifdef DEBUG_TIMING 1407 { 1408 l_fp pts; 1409 l_fp tsa, tsb; 1410 int bufcount = 0; 1411 1412 get_systime(&pts); 1413 tsa = pts; 1414 # endif 1415 rbuf = get_full_recv_buffer(); 1416 while (rbuf != NULL) { 1417 if (alarm_flag) { 1418 was_alarmed = TRUE; 1419 alarm_flag = FALSE; 1420 } 1421 UNBLOCK_IO_AND_ALARM(); 1422 1423 if (was_alarmed) { 1424 /* avoid timer starvation during lengthy I/O handling */ 1425 timer(); 1426 was_alarmed = FALSE; 1427 } 1428 1429 /* 1430 * Call the data procedure to handle each received 1431 * packet. 1432 */ 1433 if (rbuf->receiver != NULL) { 1434 # ifdef DEBUG_TIMING 1435 l_fp dts = pts; 1436 1437 L_SUB(&dts, &rbuf->recv_time); 1438 DPRINTF(2, ("processing timestamp delta %s (with prec. fuzz)\n", lfptoa(&dts, 9))); 1439 collect_timing(rbuf, "buffer processing delay", 1, &dts); 1440 bufcount++; 1441 # endif 1442 (*rbuf->receiver)(rbuf); 1443 } else { 1444 msyslog(LOG_ERR, "fatal: receive buffer callback NULL"); 1445 abort(); 1446 } 1447 1448 BLOCK_IO_AND_ALARM(); 1449 freerecvbuf(rbuf); 1450 rbuf = get_full_recv_buffer(); 1451 } 1452 # ifdef DEBUG_TIMING 1453 get_systime(&tsb); 1454 L_SUB(&tsb, &tsa); 1455 if (bufcount) { 1456 collect_timing(NULL, "processing", bufcount, &tsb); 1457 DPRINTF(2, ("processing time for %d buffers %s\n", bufcount, lfptoa(&tsb, 9))); 1458 } 1459 } 1460 # endif 1461 1462 /* 1463 * Go around again 1464 */ 1465 1466 # ifdef HAVE_DNSREGISTRATION 1467 if (mdnsreg && (current_time - mdnsreg ) > 60 && mdnstries && sys_leap != LEAP_NOTINSYNC) { 1468 mdnsreg = current_time; 1469 msyslog(LOG_INFO, "Attempting to register mDNS"); 1470 if ( DNSServiceRegister (&mdns, 0, 0, NULL, "_ntp._udp", NULL, NULL, 1471 htons(NTP_PORT), 0, NULL, NULL, NULL) != kDNSServiceErr_NoError ) { 1472 if (!--mdnstries) { 1473 msyslog(LOG_ERR, "Unable to register mDNS, giving up."); 1474 } else { 1475 msyslog(LOG_INFO, "Unable to register mDNS, will try later."); 1476 } 1477 } else { 1478 msyslog(LOG_INFO, "mDNS service registered."); 1479 mdnsreg = FALSE; 1480 } 1481 } 1482 # endif /* HAVE_DNSREGISTRATION */ 1483 1484 } 1485 UNBLOCK_IO_AND_ALARM(); 1486 return 1; 1487 } 1488 #endif /* !SIM */ 1489 1490 1491 #if !defined(SIM) && defined(SIGDIE1) 1492 /* 1493 * finish - exit gracefully 1494 */ 1495 static void 1496 finish_safe( 1497 int sig 1498 ) 1499 { 1500 const char *sig_desc; 1501 1502 sig_desc = NULL; 1503 #ifdef HAVE_STRSIGNAL 1504 sig_desc = strsignal(sig); 1505 #endif 1506 if (sig_desc == NULL) 1507 sig_desc = ""; 1508 msyslog(LOG_NOTICE, "%s exiting on signal %d (%s)", progname, 1509 sig, sig_desc); 1510 /* See Bug 2513 and Bug 2522 re the unlink of PIDFILE */ 1511 # ifdef HAVE_DNSREGISTRATION 1512 if (mdns != NULL) 1513 DNSServiceRefDeallocate(mdns); 1514 # endif 1515 peer_cleanup(); 1516 exit(0); 1517 } 1518 1519 static RETSIGTYPE 1520 finish( 1521 int sig 1522 ) 1523 { 1524 signalled = 1; 1525 signo = sig; 1526 } 1527 1528 #endif /* !SIM && SIGDIE1 */ 1529 1530 1531 #ifndef SIM 1532 /* 1533 * wait_child_sync_if - implements parent side of -w/--wait-sync 1534 */ 1535 # ifdef HAVE_WORKING_FORK 1536 static int 1537 wait_child_sync_if( 1538 int pipe_read_fd, 1539 long wait_sync 1540 ) 1541 { 1542 int rc; 1543 int exit_code; 1544 time_t wait_end_time; 1545 time_t cur_time; 1546 time_t wait_rem; 1547 fd_set readset; 1548 struct timeval wtimeout; 1549 1550 if (0 == wait_sync) 1551 return 0; 1552 1553 /* waitsync_fd_to_close used solely by child */ 1554 close(waitsync_fd_to_close); 1555 wait_end_time = time(NULL) + wait_sync; 1556 do { 1557 cur_time = time(NULL); 1558 wait_rem = (wait_end_time > cur_time) 1559 ? (wait_end_time - cur_time) 1560 : 0; 1561 wtimeout.tv_sec = wait_rem; 1562 wtimeout.tv_usec = 0; 1563 FD_ZERO(&readset); 1564 FD_SET(pipe_read_fd, &readset); 1565 rc = select(pipe_read_fd + 1, &readset, NULL, NULL, 1566 &wtimeout); 1567 if (-1 == rc) { 1568 if (EINTR == errno) 1569 continue; 1570 exit_code = (errno) ? errno : -1; 1571 msyslog(LOG_ERR, 1572 "--wait-sync select failed: %m"); 1573 return exit_code; 1574 } 1575 if (0 == rc) { 1576 /* 1577 * select() indicated a timeout, but in case 1578 * its timeouts are affected by a step of the 1579 * system clock, select() again with a zero 1580 * timeout to confirm. 1581 */ 1582 FD_ZERO(&readset); 1583 FD_SET(pipe_read_fd, &readset); 1584 wtimeout.tv_sec = 0; 1585 wtimeout.tv_usec = 0; 1586 rc = select(pipe_read_fd + 1, &readset, NULL, 1587 NULL, &wtimeout); 1588 if (0 == rc) /* select() timeout */ 1589 break; 1590 else /* readable */ 1591 return 0; 1592 } else /* readable */ 1593 return 0; 1594 } while (wait_rem > 0); 1595 1596 fprintf(stderr, "%s: -w/--wait-sync %ld timed out.\n", 1597 progname, wait_sync); 1598 return ETIMEDOUT; 1599 } 1600 # endif /* HAVE_WORKING_FORK */ 1601 1602 1603 /* 1604 * assertion_failed - Redirect assertion failures to msyslog(). 1605 */ 1606 static void 1607 assertion_failed( 1608 const char *file, 1609 int line, 1610 isc_assertiontype_t type, 1611 const char *cond 1612 ) 1613 { 1614 isc_assertion_setcallback(NULL); /* Avoid recursion */ 1615 1616 msyslog(LOG_ERR, "%s:%d: %s(%s) failed", 1617 file, line, isc_assertion_typetotext(type), cond); 1618 msyslog(LOG_ERR, "exiting (due to assertion failure)"); 1619 1620 #if defined(DEBUG) && defined(SYS_WINNT) 1621 if (debug) 1622 DebugBreak(); 1623 #endif 1624 1625 abort(); 1626 } 1627 1628 1629 /* 1630 * library_fatal_error - Handle fatal errors from our libraries. 1631 */ 1632 static void 1633 library_fatal_error( 1634 const char *file, 1635 int line, 1636 const char *format, 1637 va_list args 1638 ) 1639 { 1640 char errbuf[256]; 1641 1642 isc_error_setfatal(NULL); /* Avoid recursion */ 1643 1644 msyslog(LOG_ERR, "%s:%d: fatal error:", file, line); 1645 vsnprintf(errbuf, sizeof(errbuf), format, args); 1646 msyslog(LOG_ERR, "%s", errbuf); 1647 msyslog(LOG_ERR, "exiting (due to fatal error in library)"); 1648 1649 #if defined(DEBUG) && defined(SYS_WINNT) 1650 if (debug) 1651 DebugBreak(); 1652 #endif 1653 1654 abort(); 1655 } 1656 1657 1658 /* 1659 * library_unexpected_error - Handle non fatal errors from our libraries. 1660 */ 1661 # define MAX_UNEXPECTED_ERRORS 100 1662 int unexpected_error_cnt = 0; 1663 static void 1664 library_unexpected_error( 1665 const char *file, 1666 int line, 1667 const char *format, 1668 va_list args 1669 ) 1670 { 1671 char errbuf[256]; 1672 1673 if (unexpected_error_cnt >= MAX_UNEXPECTED_ERRORS) 1674 return; /* avoid clutter in log */ 1675 1676 msyslog(LOG_ERR, "%s:%d: unexpected error:", file, line); 1677 vsnprintf(errbuf, sizeof(errbuf), format, args); 1678 msyslog(LOG_ERR, "%s", errbuf); 1679 1680 if (++unexpected_error_cnt == MAX_UNEXPECTED_ERRORS) 1681 msyslog(LOG_ERR, "Too many errors. Shutting up."); 1682 1683 } 1684 #endif /* !SIM */ 1685 1686 #if !defined(SIM) && !defined(SYS_WINNT) 1687 # ifdef DEBUG 1688 1689 /* 1690 * moredebug - increase debugging verbosity 1691 */ 1692 static RETSIGTYPE 1693 moredebug( 1694 int sig 1695 ) 1696 { 1697 int saved_errno = errno; 1698 1699 if (debug < 255) 1700 { 1701 debug++; 1702 msyslog(LOG_DEBUG, "debug raised to %d", debug); 1703 } 1704 errno = saved_errno; 1705 } 1706 1707 1708 /* 1709 * lessdebug - decrease debugging verbosity 1710 */ 1711 static RETSIGTYPE 1712 lessdebug( 1713 int sig 1714 ) 1715 { 1716 int saved_errno = errno; 1717 1718 if (debug > 0) 1719 { 1720 debug--; 1721 msyslog(LOG_DEBUG, "debug lowered to %d", debug); 1722 } 1723 errno = saved_errno; 1724 } 1725 1726 # else /* !DEBUG follows */ 1727 1728 1729 /* 1730 * no_debug - We don't do the debug here. 1731 */ 1732 static RETSIGTYPE 1733 no_debug( 1734 int sig 1735 ) 1736 { 1737 int saved_errno = errno; 1738 1739 msyslog(LOG_DEBUG, "ntpd not compiled for debugging (signal %d)", sig); 1740 errno = saved_errno; 1741 } 1742 # endif /* !DEBUG */ 1743 #endif /* !SIM && !SYS_WINNT */ 1744