resolved-dns-query.c revision 0c903ae7db52af8ecad0619ec0da021f951c9c1c
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
/***
This file is part of systemd.
Copyright 2014 Lennart Poettering
under the terms of the GNU Lesser General Public License as published by
the Free Software Foundation; either version 2.1 of the License, or
(at your option) any later version.
systemd is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License
along with systemd; If not, see <http://www.gnu.org/licenses/>.
***/
#include "af-list.h"
#include "resolved-dns-query.h"
#include "resolved-dns-domain.h"
/* After how much time to repeat classic DNS requests */
/* After how much time to repeat LLMNR requests, see RFC 4795 Section 7 */
/* How long to wait for the query in total */
/* Maximum attempts to send DNS requests, across all DNS servers */
#define DNS_TRANSACTION_ATTEMPTS_MAX 8
/* Maximum attempts to send LLMNR requests, see RFC 4795 Section 2.7 */
#define LLMNR_TRANSACTION_ATTEMPTS_MAX 3
#define CNAME_MAX 8
#define QUERIES_MAX 2048
#define TRANSACTION_TIMEOUT_USEC(p) ((t)->scope->protocol == DNS_PROTOCOL_LLMNR ? LLMNR_TRANSACTION_TIMEOUT_USEC : DNS_TRANSACTION_TIMEOUT_USEC)
#define TRANSACTION_ATTEMPTS_MAX(p) ((t)->scope->protocol == DNS_PROTOCOL_LLMNR ? LLMNR_TRANSACTION_ATTEMPTS_MAX : DNS_TRANSACTION_ATTEMPTS_MAX)
static int dns_query_transaction_go(DnsQueryTransaction *t);
DnsQuery *q;
if (!t)
return NULL;
dns_packet_unref(t->sent);
dns_packet_unref(t->received);
dns_answer_unref(t->cached);
dns_stream_free(t->stream);
if (t->scope) {
if (t->id != 0)
}
while ((q = set_steal_first(t->queries)))
set_remove(q->transactions, t);
free(t);
return NULL;
}
static void dns_query_transaction_gc(DnsQueryTransaction *t) {
assert(t);
if (t->block_gc > 0)
return;
if (set_isempty(t->queries))
}
int r;
assert(s);
assert(q);
if (r < 0)
return r;
if (!t)
return -ENOMEM;
t->question = dns_question_ref(q);
do
while (t->id == 0 ||
if (r < 0) {
t->id = 0;
return r;
}
t->scope = s;
if (ret)
*ret = t;
t = NULL;
return 0;
}
static void dns_query_transaction_stop(DnsQueryTransaction *t) {
assert(t);
}
DnsQuery *q;
Iterator i;
assert(t);
/* Note that this call might invalidate the query. Callers
* should hence not attempt to access the query or transaction
* after calling this function. */
log_debug("Transaction on scope %s on %s/%s now complete with %s",
/* Notify all queries that are interested, but make sure the
* transaction isn't freed while we are still looking at it */
t->block_gc++;
SET_FOREACH(q, t->queries, i)
dns_query_ready(q);
t->block_gc--;
}
assert(s);
assert(s->transaction);
/* Copy the data we care about out of the stream before we
* destroy it. */
t = s->transaction;
p = dns_packet_ref(s->read_packet);
if (error != 0) {
return 0;
}
t->block_gc++;
t->block_gc--;
/* If the response wasn't useful, then complete the transition now */
if (t->state == DNS_QUERY_PENDING)
return 0;
}
static int dns_query_transaction_open_tcp(DnsQueryTransaction *t) {
int r;
assert(t);
if (t->stream)
return 0;
/* When we already received a query to this (but it was truncated), send to its sender address */
if (t->received)
fd = dns_scope_tcp_socket(t->scope, t->received->family, &t->received->sender, t->received->sender_port);
else {
union in_addr_union address;
int family;
/* Otherwise, try to talk to the owner of a
* the IP address, in case this is a reverse
* PTR lookup */
if (r < 0)
return r;
if (r == 0)
return -EINVAL;
}
} else
return -EAFNOSUPPORT;
if (fd < 0)
return fd;
if (r < 0)
return r;
fd = -1;
if (r < 0) {
return r;
}
t->stream->transaction = t;
/* The interface index is difficult to determine if we are
* connecting to the local host, hence fill this in right away
* instead of determining it from the socket */
return 0;
}
int r;
assert(t);
assert(p);
/* Note that this call might invalidate the query. Callers
* should hence not attempt to access the query or transaction
* after calling this function. */
/* For LLMNR we will not accept any packets from other
* interfaces */
return;
return;
/* Tentative replies shall be discarded, see RFC 4795,
* 2.1.1 */
if (DNS_PACKET_T(p))
return;
}
/* For DNS we are fine with accepting packets on any
* interface, but the source IP address must be one of
* a valid DNS server */
return;
if (p->sender_port != 53)
return;
}
if (t->received != p) {
dns_packet_unref(t->received);
t->received = dns_packet_ref(p);
}
if (p->ipproto == IPPROTO_TCP) {
if (DNS_PACKET_TC(p)) {
/* Truncated via TCP? Somebody must be fucking with us */
return;
}
if (DNS_PACKET_ID(p) != t->id) {
/* Not the reply to our query? Somebody must be fucking with us */
return;
}
}
if (DNS_PACKET_TC(p)) {
/* Response was truncated, let's try again with good old TCP */
r = dns_query_transaction_open_tcp(t);
if (r == -ESRCH) {
/* No servers found? Damn! */
return;
}
if (r < 0) {
/* On LLMNR, if we cannot connect to the host,
* we immediately give up */
return;
}
/* On DNS, couldn't send? Try immediately again, with a new server */
r = dns_query_transaction_go(t);
if (r < 0) {
return;
}
return;
}
}
/* Parse and update the cache */
r = dns_packet_extract(p);
if (r < 0) {
return;
}
/* According to RFC 4795, section 2.9. only the RRs from the answer section shall be cached */
dns_cache_put(&t->scope->cache, p->question, DNS_PACKET_RCODE(p), p->answer, DNS_PACKET_ANCOUNT(p), 0);
if (DNS_PACKET_RCODE(p) == DNS_RCODE_SUCCESS)
else
}
DnsQueryTransaction *t = userdata;
int r;
assert(s);
assert(t);
/* Timeout reached? Try again, with a new server */
r = dns_query_transaction_go(t);
if (r < 0)
return 0;
}
static int dns_query_make_packet(DnsQueryTransaction *t) {
unsigned n, added = 0;
int r;
assert(t);
if (t->sent)
return 0;
if (r < 0)
return r;
if (r < 0)
return r;
if (r == 0)
continue;
if (r < 0)
return r;
added++;
}
if (added <= 0)
return -EDOM;
t->sent = p;
p = NULL;
return 0;
}
static int dns_query_transaction_go(DnsQueryTransaction *t) {
bool had_stream;
int r;
assert(t);
had_stream = !!t->stream;
log_debug("Beginning transaction on scope %s on %s/%s",
if (t->n_attempts >= TRANSACTION_ATTEMPTS_MAX(t)) {
return 0;
}
/* If we already tried via a stream, then we don't
* retry on LLMNR. See RFC 4795, Section 2.7. */
return 0;
}
t->n_attempts++;
t->cached_rcode = 0;
/* First, let's try the cache */
if (r < 0)
return r;
if (r > 0) {
if (t->cached_rcode == DNS_RCODE_SUCCESS)
else
return 0;
}
/* Otherwise, we need to ask the network */
r = dns_query_make_packet(t);
if (r == -EDOM) {
/* Not the right request to make on this network?
* (i.e. an A request made on IPv6 or an AAAA request
* made on IPv4, on LLMNR or mDNS.) */
return 0;
}
if (r < 0)
return r;
/* RFC 4795, Section 2.4. says reverse lookups shall
* always be made via TCP on LLMNR */
r = dns_query_transaction_open_tcp(t);
} else {
/* Try via UDP, and if that fails due to large size try via TCP */
if (r == -EMSGSIZE)
r = dns_query_transaction_open_tcp(t);
}
if (r == -ESRCH) {
/* No servers to send this to? */
return 0;
}
if (r < 0) {
/* Couldn't send? Try immediately again, with a new server */
return dns_query_transaction_go(t);
}
r = sd_event_add_time(t->scope->manager->event, &t->timeout_event_source, CLOCK_MONOTONIC, now(CLOCK_MONOTONIC) + TRANSACTION_TIMEOUT_USEC(t), 0, on_transaction_timeout, t);
if (r < 0)
return r;
t->state = DNS_QUERY_PENDING;
return 1;
}
if (!q)
return NULL;
dns_answer_unref(q->answer);
while ((t = set_steal_first(q->transactions))) {
set_remove(t->queries, q);
}
set_free(q->transactions);
if (q->manager) {
q->manager->n_dns_queries--;
}
free(q);
return NULL;
}
unsigned i;
int r;
assert(m);
if (r < 0)
return r;
if (m->n_dns_queries >= QUERIES_MAX)
return -EBUSY;
if (!q)
return -ENOMEM;
log_debug("Looking up RR for %s %s %s",
}
m->n_dns_queries++;
q->manager = m;
if (ret)
*ret = q;
q = NULL;
return 0;
}
static void dns_query_stop(DnsQuery *q) {
assert(q);
while ((t = set_steal_first(q->transactions))) {
set_remove(t->queries, q);
}
}
assert(q);
/* Note that this call might invalidate the query. Callers
* should hence not attempt to access the query or transaction
* after calling this function. */
dns_query_stop(q);
if (q->complete)
q->complete(q);
}
assert(s);
assert(q);
return 0;
}
int r;
assert(q);
if (r < 0)
return r;
if (key) {
if (!question)
return -ENOMEM;
if (r < 0)
return r;
} else
break;
if (!t) {
r = dns_query_transaction_new(&t, s, question);
if (r < 0)
return r;
}
if (r < 0)
goto fail;
if (r < 0)
goto fail;
r = set_put(q->transactions, t);
if (r < 0) {
set_remove(t->queries, q);
goto fail;
}
return 0;
fail:
return r;
}
int r;
assert(q);
assert(s);
if (s->protocol == DNS_PROTOCOL_MDNS) {
r = dns_query_add_transaction(q, s, NULL);
if (r < 0)
return r;
} else {
unsigned i;
/* On DNS and LLMNR we can only send a single
* question per datagram, hence issue multiple
* transactions. */
if (r < 0)
return r;
}
}
return 0;
}
int dns_query_go(DnsQuery *q) {
const char *name;
Iterator i;
int r;
assert(q);
if (q->state != DNS_QUERY_NULL)
return 0;
if (match < 0)
return match;
if (match == DNS_SCOPE_NO)
continue;
if (match == DNS_SCOPE_YES) {
first = s;
break;
} else {
if (!first)
first = s;
}
}
if (found == DNS_SCOPE_NO)
return -ESRCH;
r = dns_query_add_transaction_split(q, first);
if (r < 0)
return r;
if (match < 0)
return match;
continue;
r = dns_query_add_transaction_split(q, s);
if (r < 0)
return r;
}
q->answer_ifindex = 0;
q->answer_rcode = 0;
r = sd_event_add_time(q->manager->event, &q->timeout_event_source, CLOCK_MONOTONIC, now(CLOCK_MONOTONIC) + QUERY_TIMEOUT_USEC, 0, on_query_timeout, q);
if (r < 0)
goto fail;
q->state = DNS_QUERY_PENDING;
q->block_ready++;
SET_FOREACH(t, q->transactions, i) {
if (t->state == DNS_QUERY_NULL) {
r = dns_query_transaction_go(t);
if (r < 0)
goto fail;
}
}
q->block_ready--;
dns_query_ready(q);
return 1;
fail:
dns_query_stop(q);
return r;
}
void dns_query_ready(DnsQuery *q) {
int rcode = 0;
Iterator i;
assert(q);
/* Note that this call might invalidate the query. Callers
* should hence not attempt to access the query or transaction
* after calling this function, unless the block_ready
* counter was explicitly bumped before doing so. */
if (q->block_ready > 0)
return;
SET_FOREACH(t, q->transactions, i) {
/* If we found a successful answer, ignore all answers from other scopes */
continue;
/* One of the transactions is still going on, let's wait for it */
return;
/* One of the transactions is successful, let's use
* it, and copy its data out */
if (t->state == DNS_QUERY_SUCCESS) {
DnsAnswer *a;
if (t->received) {
} else {
rcode = t->cached_rcode;
a = t->cached;
}
if (state == DNS_QUERY_SUCCESS) {
if (!merged) {
return;
}
} else {
answer = dns_answer_ref(a);
}
continue;
}
/* One of the transactions has failed, let's see
* whether we find anything better, but if not, return
* its response data */
DnsAnswer *a;
if (t->received) {
} else {
rcode = t->cached_rcode;
a = t->cached;
}
answer = dns_answer_ref(a);
continue;
}
}
q->answer_rcode = rcode;
}
dns_query_complete(q, state);
}
int r;
assert(q);
if (q->n_cname_redirects > CNAME_MAX)
return -ELOOP;
if (r < 0)
return r;
q->n_cname_redirects++;
dns_query_stop(q);
q->state = DNS_QUERY_NULL;
return 0;
}
static const char* const dns_query_state_table[_DNS_QUERY_STATE_MAX] = {
[DNS_QUERY_NULL] = "null",
[DNS_QUERY_PENDING] = "pending",
[DNS_QUERY_FAILURE] = "failure",
[DNS_QUERY_SUCCESS] = "success",
[DNS_QUERY_NO_SERVERS] = "no-servers",
[DNS_QUERY_TIMEOUT] = "timeout",
[DNS_QUERY_ATTEMPTS_MAX] = "attempts-max",
[DNS_QUERY_INVALID_REPLY] = "invalid-reply",
[DNS_QUERY_RESOURCES] = "resources",
[DNS_QUERY_ABORTED] = "aborted",
};