Lines Matching defs:on

150  * as possible independent of other processing going on.
163 volatile u_long packets_dropped; /* total number of packets dropped on reception */
164 volatile u_long packets_ignored; /* packets received on wild card interface */
255 * support for receiving data on fd that is not a refclock or a socket
390 * paths. currently we only pass them on to the file
417 * to bind to to the interface address on NTP_PORT so that
434 * one to one - especially on hosts with multiple interfaces
439 * - on some systems it is perfectly legal to assign the same address to
522 * with UNIX-like systems and does not truncate values on Win64.
560 /* XXX: Should we limit maxsize based on psau->saX.sin_family? */
863 * If we have multiple local addresses on the same network
870 * prefix on the same network interface, multicast from one,
1001 : "not found on",
1028 "stop listening for broadcasts to %s on interface #%d %s",
1055 msyslog(LOG_INFO, "%s on %d %s %s",
1161 * enable multicast reception on the broadcast socket
1350 * listen on loopback addresses. Since ntpq and ntpdc query
1352 * 127.0.0.1, it's useful to default to listening on both.
1372 * does indeed listen on eth0:1's addresses.
1388 * listen on any other addresses.
1541 * sau_from_netaddr() - convert network address on-wire formats.
1591 int on
1603 (void *)&on, sizeof(on)))
1606 on ? "on" : "off");
1608 DPRINTF(4, ("set SO_REUSEADDR to %s on %s\n",
1609 on ? "on" : "off",
1827 DPRINTF(4, ("drop on interface %s (%s) - by nic rules\n",
1911 * This leads to no service on the
2115 msyslog(LOG_INFO, "Listening on broadcast address %s#%d",
2120 msyslog(LOG_ERR, "unable to create socket on %s (%d) for %s#%d",
2205 * error WSAINVAL depending on service pack level and whether
2207 * complain if it fails that way on versions prior to XP (5.1).
2218 "setsockopt(%d, SO_EXCLUSIVEADDRUSE, on): %m",
2225 * set_reuseaddr() - set/clear REUSEADDR on all sockets
2226 * NB possible hole - should we be doing this on broadcast
2245 DPRINTF(4, ("setting SO_REUSEADDR on %.16s@%s to %s\n",
2247 flag ? "on" : "off"));
2253 stoa(&ep->sin), flag ? "on" : "off");
2262 * make other changes as necessary later on
2289 int on = 1;
2294 (void *)&on, sizeof(on)))
2296 "setsockopt(SO_BROADCAST) enable failure on address %s: %m",
2299 DPRINTF(2, ("Broadcast enabled on socket %d for address %s\n",
2327 "setsockopt(SO_BROADCAST) disable failure on address %s: %m",
2411 "setsockopt IP_MULTICAST_LOOP failed: %m on socket %d, addr %s for multicast address %s",
2429 "setsockopt IPV6_MULTICAST_LOOP failed: %m on socket %d, addr %s for multicast address %s",
2471 "setsockopt IP_ADD_MEMBERSHIP failed: %m on socket %d, addr %s for %x / %x (%s)",
2478 DPRINTF(4, ("Added IPv4 multicast membership on socket %d, addr %s for %x / %x (%s)\n",
2501 "setsockopt IPV6_JOIN_GROUP failed: %m on socket %d, addr %s for interface %u (%s)",
2506 DPRINTF(4, ("Added IPv6 multicast group on socket %d, addr %s for interface %u (%s)\n",
2556 "setsockopt IP_DROP_MEMBERSHIP failed: %m on socket %d, addr %s for %x / %x (%s)",
2580 "setsockopt IPV6_LEAVE_GROUP failure: %m on socket %d, addr %s for %d (%s)",
2654 * broadcast on the interface address
2660 "Listen for broadcasts to %s on interface #%d %s",
2684 "failed to listen for broadcasts to %s on interface #%d %s",
2727 "stop listening for broadcasts to %s on interface #%d %s",
2905 int on = 1;
2916 "socket(AF_INET%s, SOCK_DGRAM, 0) failed on address %s: %m",
2942 * number on each interface according to turn_off_reuse.
2943 * This is undesirable on Windows versions starting with
2952 : &on),
2953 sizeof(on))) {
2959 : "on",
2966 * setting SO_EXCLUSIVEADDRUSE on the wildcard we open
2981 "setsockopt IP_TOS (%02x) fails on address %s: %m",
2996 "setsockopt IPV6_TCLASS (%02x) fails on address %s: %m",
3002 (void *)&on, sizeof(on)))
3004 "setsockopt IPV6_V6ONLY on fails on address %s: %m",
3009 (void *)&on, sizeof(on)))
3011 "setsockopt IPV6_BINDV6ONLY on fails on address %s: %m",
3061 (void *)&on, sizeof(on)))
3063 "setsockopt SO_TIMESTAMP on fails on address %s: %m",
3066 DPRINTF(4, ("setsockopt SO_TIMESTAMP enabled on fd %d address %s\n",
3073 (void *)&on, sizeof(on)))
3075 "setsockopt SO_TIMESTAMPNS on fails on address %s: %m",
3078 DPRINTF(4, ("setsockopt SO_TIMESTAMPNS enabled on fd %d address %s\n",
3085 (void *)&on, sizeof(on)))
3087 "setsockopt SO_BINTIME on fails on address %s: %m",
3090 DPRINTF(4, ("setsockopt SO_BINTIME enabled on fd %d address %s\n",
3207 "setsockopt IP_MULTICAST_TTL/IPV6_MULTICAST_HOPS fails on address %s: %m",
3281 * read it again or go on to the next one if no bytes returned
3334 * put it on the full list and do bookkeeping.
3476 * read it again or go on to the next one if no bytes returned
3496 * or this is received on a disallowed socket, just dump the
3502 /* A partial read on a UDP socket truncates the data and
3504 * need to have a full buffer here on the stack.
3515 DPRINTF(4, ("%s on (%lu) fd=%d from %s\n",
3570 msyslog(LOG_ERR, "recvfrom(%s) fd=%d: refclock srcadr on a network interface!",
3605 * put it on the full list and do bookkeeping.
3634 * Use select() on all on all input fd's for unlimited
3635 * time. select() will terminate on SIGALARM or on the
4036 int on;
4042 * zero. This is bound to fail, but on the way to nowhere it
4043 * triggers a security incident on SELinux.
4061 on = 1;
4064 (void *)&on,
4065 sizeof(on))) {
4089 * if we didn't find an exact match on saddr, find the closest
4118 * suggested. This matches an address on the same subnet first, as
4466 * - close the file (which brings down any IO on it)
4762 "version mismatch (got %d - expected %d) on routing socket - disabling",
4812 * we are keen on new and deleted addresses and
4865 "bind failed on routing socket (%m) - using polled interface update");
4881 "Listening on routing socket on fd #%d for interface updates",