resolved: longlived TCP connections
Keep DNS over TCP connection open until it's closed by the server or after a timeout.
This commit is contained in:
parent
65be7e0652
commit
98767d75d7
|
@ -48,6 +48,14 @@ static inline bool ordered_set_iterate(OrderedSet *s, Iterator *i, void **value)
|
||||||
return ordered_hashmap_iterate((OrderedHashmap*) s, i, value, NULL);
|
return ordered_hashmap_iterate((OrderedHashmap*) s, i, value, NULL);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static inline void* ordered_set_remove(OrderedSet *s, void *p) {
|
||||||
|
return ordered_hashmap_remove((OrderedHashmap*) s, p);
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline void* ordered_set_steal_first(OrderedSet *s) {
|
||||||
|
return ordered_hashmap_steal_first((OrderedHashmap*) s);
|
||||||
|
}
|
||||||
|
|
||||||
int ordered_set_consume(OrderedSet *s, void *p);
|
int ordered_set_consume(OrderedSet *s, void *p);
|
||||||
int ordered_set_put_strdup(OrderedSet *s, const char *p);
|
int ordered_set_put_strdup(OrderedSet *s, const char *p);
|
||||||
int ordered_set_put_strdupv(OrderedSet *s, char **l);
|
int ordered_set_put_strdupv(OrderedSet *s, char **l);
|
||||||
|
|
|
@ -2333,6 +2333,31 @@ int dns_packet_is_reply_for(DnsPacket *p, const DnsResourceKey *key) {
|
||||||
return dns_resource_key_equal(p->question->keys[0], key);
|
return dns_resource_key_equal(p->question->keys[0], key);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void dns_packet_hash_func(const void *p, struct siphash *state) {
|
||||||
|
const DnsPacket *s = p;
|
||||||
|
|
||||||
|
assert(s);
|
||||||
|
|
||||||
|
siphash24_compress(&s->size, sizeof(s->size), state);
|
||||||
|
siphash24_compress(DNS_PACKET_DATA((DnsPacket*) s), s->size, state);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int dns_packet_compare_func(const void *a, const void *b) {
|
||||||
|
const DnsPacket *x = a, *y = b;
|
||||||
|
|
||||||
|
if (x->size < y->size)
|
||||||
|
return -1;
|
||||||
|
if (x->size > y->size)
|
||||||
|
return 1;
|
||||||
|
|
||||||
|
return memcmp(DNS_PACKET_DATA((DnsPacket*) x), DNS_PACKET_DATA((DnsPacket*) y), x->size);
|
||||||
|
}
|
||||||
|
|
||||||
|
const struct hash_ops dns_packet_hash_ops = {
|
||||||
|
.hash = dns_packet_hash_func,
|
||||||
|
.compare = dns_packet_compare_func
|
||||||
|
};
|
||||||
|
|
||||||
static const char* const dns_rcode_table[_DNS_RCODE_MAX_DEFINED] = {
|
static const char* const dns_rcode_table[_DNS_RCODE_MAX_DEFINED] = {
|
||||||
[DNS_RCODE_SUCCESS] = "SUCCESS",
|
[DNS_RCODE_SUCCESS] = "SUCCESS",
|
||||||
[DNS_RCODE_FORMERR] = "FORMERR",
|
[DNS_RCODE_FORMERR] = "FORMERR",
|
||||||
|
|
|
@ -270,6 +270,8 @@ DnsProtocol dns_protocol_from_string(const char *s) _pure_;
|
||||||
#define MDNS_MULTICAST_IPV4_ADDRESS ((struct in_addr) { .s_addr = htobe32(224U << 24 | 251U) })
|
#define MDNS_MULTICAST_IPV4_ADDRESS ((struct in_addr) { .s_addr = htobe32(224U << 24 | 251U) })
|
||||||
#define MDNS_MULTICAST_IPV6_ADDRESS ((struct in6_addr) { .s6_addr = { 0xFF, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xfb } })
|
#define MDNS_MULTICAST_IPV6_ADDRESS ((struct in6_addr) { .s6_addr = { 0xFF, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xfb } })
|
||||||
|
|
||||||
|
extern const struct hash_ops dns_packet_hash_ops;
|
||||||
|
|
||||||
static inline uint64_t SD_RESOLVED_FLAGS_MAKE(DnsProtocol protocol, int family, bool authenticated) {
|
static inline uint64_t SD_RESOLVED_FLAGS_MAKE(DnsProtocol protocol, int family, bool authenticated) {
|
||||||
uint64_t f;
|
uint64_t f;
|
||||||
|
|
||||||
|
|
|
@ -123,6 +123,8 @@ DnsServer* dns_server_unref(DnsServer *s) {
|
||||||
if (s->n_ref > 0)
|
if (s->n_ref > 0)
|
||||||
return NULL;
|
return NULL;
|
||||||
|
|
||||||
|
dns_stream_unref(s->stream);
|
||||||
|
|
||||||
free(s->server_string);
|
free(s->server_string);
|
||||||
return mfree(s);
|
return mfree(s);
|
||||||
}
|
}
|
||||||
|
|
|
@ -53,6 +53,7 @@ struct DnsServer {
|
||||||
int ifindex; /* for IPv6 link-local DNS servers */
|
int ifindex; /* for IPv6 link-local DNS servers */
|
||||||
|
|
||||||
char *server_string;
|
char *server_string;
|
||||||
|
DnsStream *stream;
|
||||||
|
|
||||||
usec_t resend_timeout;
|
usec_t resend_timeout;
|
||||||
usec_t max_rtt;
|
usec_t max_rtt;
|
||||||
|
|
|
@ -31,6 +31,13 @@ static int dns_stream_update_io(DnsStream *s) {
|
||||||
|
|
||||||
if (s->write_packet && s->n_written < sizeof(s->write_size) + s->write_packet->size)
|
if (s->write_packet && s->n_written < sizeof(s->write_size) + s->write_packet->size)
|
||||||
f |= EPOLLOUT;
|
f |= EPOLLOUT;
|
||||||
|
else if (!ordered_set_isempty(s->write_queue)) {
|
||||||
|
dns_packet_unref(s->write_packet);
|
||||||
|
s->write_packet = ordered_set_steal_first(s->write_queue);
|
||||||
|
s->write_size = htobe16(s->write_packet->size);
|
||||||
|
s->n_written = 0;
|
||||||
|
f |= EPOLLOUT;
|
||||||
|
}
|
||||||
if (!s->read_packet || s->n_read < sizeof(s->read_size) + s->read_packet->size)
|
if (!s->read_packet || s->n_read < sizeof(s->read_size) + s->read_packet->size)
|
||||||
f |= EPOLLIN;
|
f |= EPOLLIN;
|
||||||
|
|
||||||
|
@ -291,15 +298,18 @@ static int on_stream_io(sd_event_source *es, int fd, uint32_t revents, void *use
|
||||||
|
|
||||||
/* Are we done? If so, disable the event source for EPOLLIN */
|
/* Are we done? If so, disable the event source for EPOLLIN */
|
||||||
if (s->n_read >= sizeof(s->read_size) + be16toh(s->read_size)) {
|
if (s->n_read >= sizeof(s->read_size) + be16toh(s->read_size)) {
|
||||||
r = dns_stream_update_io(s);
|
|
||||||
if (r < 0)
|
|
||||||
return dns_stream_complete(s, -r);
|
|
||||||
|
|
||||||
/* If there's a packet handler
|
/* If there's a packet handler
|
||||||
* installed, call that. Note that
|
* installed, call that. Note that
|
||||||
* this is optional... */
|
* this is optional... */
|
||||||
if (s->on_packet)
|
if (s->on_packet) {
|
||||||
return s->on_packet(s);
|
r = s->on_packet(s);
|
||||||
|
if (r < 0)
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
r = dns_stream_update_io(s);
|
||||||
|
if (r < 0)
|
||||||
|
return dns_stream_complete(s, -r);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -312,6 +322,9 @@ static int on_stream_io(sd_event_source *es, int fd, uint32_t revents, void *use
|
||||||
}
|
}
|
||||||
|
|
||||||
DnsStream *dns_stream_unref(DnsStream *s) {
|
DnsStream *dns_stream_unref(DnsStream *s) {
|
||||||
|
DnsPacket *p;
|
||||||
|
Iterator i;
|
||||||
|
|
||||||
if (!s)
|
if (!s)
|
||||||
return NULL;
|
return NULL;
|
||||||
|
|
||||||
|
@ -323,19 +336,26 @@ DnsStream *dns_stream_unref(DnsStream *s) {
|
||||||
|
|
||||||
dns_stream_stop(s);
|
dns_stream_stop(s);
|
||||||
|
|
||||||
|
if (s->server && s->server->stream == s)
|
||||||
|
s->server->stream = NULL;
|
||||||
|
|
||||||
if (s->manager) {
|
if (s->manager) {
|
||||||
LIST_REMOVE(streams, s->manager->dns_streams, s);
|
LIST_REMOVE(streams, s->manager->dns_streams, s);
|
||||||
s->manager->n_dns_streams--;
|
s->manager->n_dns_streams--;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
ORDERED_SET_FOREACH(p, s->write_queue, i)
|
||||||
|
dns_packet_unref(ordered_set_remove(s->write_queue, p));
|
||||||
|
|
||||||
dns_packet_unref(s->write_packet);
|
dns_packet_unref(s->write_packet);
|
||||||
dns_packet_unref(s->read_packet);
|
dns_packet_unref(s->read_packet);
|
||||||
|
dns_server_unref(s->server);
|
||||||
|
|
||||||
|
ordered_set_free(s->write_queue);
|
||||||
|
|
||||||
return mfree(s);
|
return mfree(s);
|
||||||
}
|
}
|
||||||
|
|
||||||
DEFINE_TRIVIAL_CLEANUP_FUNC(DnsStream*, dns_stream_unref);
|
|
||||||
|
|
||||||
DnsStream *dns_stream_ref(DnsStream *s) {
|
DnsStream *dns_stream_ref(DnsStream *s) {
|
||||||
if (!s)
|
if (!s)
|
||||||
return NULL;
|
return NULL;
|
||||||
|
@ -360,6 +380,10 @@ int dns_stream_new(Manager *m, DnsStream **ret, DnsProtocol protocol, int fd) {
|
||||||
if (!s)
|
if (!s)
|
||||||
return -ENOMEM;
|
return -ENOMEM;
|
||||||
|
|
||||||
|
r = ordered_set_ensure_allocated(&s->write_queue, &dns_packet_hash_ops);
|
||||||
|
if (r < 0)
|
||||||
|
return r;
|
||||||
|
|
||||||
s->n_ref = 1;
|
s->n_ref = 1;
|
||||||
s->fd = -1;
|
s->fd = -1;
|
||||||
s->protocol = protocol;
|
s->protocol = protocol;
|
||||||
|
@ -392,14 +416,15 @@ int dns_stream_new(Manager *m, DnsStream **ret, DnsProtocol protocol, int fd) {
|
||||||
}
|
}
|
||||||
|
|
||||||
int dns_stream_write_packet(DnsStream *s, DnsPacket *p) {
|
int dns_stream_write_packet(DnsStream *s, DnsPacket *p) {
|
||||||
|
int r;
|
||||||
|
|
||||||
assert(s);
|
assert(s);
|
||||||
|
|
||||||
if (s->write_packet)
|
r = ordered_set_put(s->write_queue, p);
|
||||||
return -EBUSY;
|
if (r < 0)
|
||||||
|
return r;
|
||||||
|
|
||||||
s->write_packet = dns_packet_ref(p);
|
dns_packet_ref(p);
|
||||||
s->write_size = htobe16(p->size);
|
|
||||||
s->n_written = 0;
|
|
||||||
|
|
||||||
return dns_stream_update_io(s);
|
return dns_stream_update_io(s);
|
||||||
}
|
}
|
||||||
|
|
|
@ -43,11 +43,13 @@ struct DnsStream {
|
||||||
be16_t write_size, read_size;
|
be16_t write_size, read_size;
|
||||||
DnsPacket *write_packet, *read_packet;
|
DnsPacket *write_packet, *read_packet;
|
||||||
size_t n_written, n_read;
|
size_t n_written, n_read;
|
||||||
|
OrderedSet *write_queue;
|
||||||
|
|
||||||
int (*on_packet)(DnsStream *s);
|
int (*on_packet)(DnsStream *s);
|
||||||
int (*complete)(DnsStream *s, int error);
|
int (*complete)(DnsStream *s, int error);
|
||||||
|
|
||||||
DnsTransaction *transaction; /* when used by the transaction logic */
|
LIST_HEAD(DnsTransaction, transactions); /* when used by the transaction logic */
|
||||||
|
DnsServer *server; /* when used by the transaction logic */
|
||||||
DnsQuery *query; /* when used by the DNS stub logic */
|
DnsQuery *query; /* when used by the DNS stub logic */
|
||||||
|
|
||||||
LIST_FIELDS(DnsStream, streams);
|
LIST_FIELDS(DnsStream, streams);
|
||||||
|
@ -57,6 +59,8 @@ int dns_stream_new(Manager *m, DnsStream **s, DnsProtocol protocol, int fd);
|
||||||
DnsStream *dns_stream_unref(DnsStream *s);
|
DnsStream *dns_stream_unref(DnsStream *s);
|
||||||
DnsStream *dns_stream_ref(DnsStream *s);
|
DnsStream *dns_stream_ref(DnsStream *s);
|
||||||
|
|
||||||
|
DEFINE_TRIVIAL_CLEANUP_FUNC(DnsStream*, dns_stream_unref);
|
||||||
|
|
||||||
int dns_stream_write_packet(DnsStream *s, DnsPacket *p);
|
int dns_stream_write_packet(DnsStream *s, DnsPacket *p);
|
||||||
|
|
||||||
static inline bool DNS_STREAM_QUEUED(DnsStream *s) {
|
static inline bool DNS_STREAM_QUEUED(DnsStream *s) {
|
||||||
|
|
|
@ -51,9 +51,11 @@ static void dns_transaction_close_connection(DnsTransaction *t) {
|
||||||
|
|
||||||
if (t->stream) {
|
if (t->stream) {
|
||||||
/* Let's detach the stream from our transaction, in case something else keeps a reference to it. */
|
/* Let's detach the stream from our transaction, in case something else keeps a reference to it. */
|
||||||
t->stream->complete = NULL;
|
LIST_REMOVE(transactions_by_stream, t->stream->transactions, t);
|
||||||
t->stream->on_packet = NULL;
|
|
||||||
t->stream->transaction = NULL;
|
/* Remove packet in case it's still in the queue */
|
||||||
|
dns_packet_unref(ordered_set_remove(t->stream->write_queue, t->sent));
|
||||||
|
|
||||||
t->stream = dns_stream_unref(t->stream);
|
t->stream = dns_stream_unref(t->stream);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -448,42 +450,31 @@ static int dns_transaction_maybe_restart(DnsTransaction *t) {
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int on_stream_complete(DnsStream *s, int error) {
|
static void on_transaction_stream_error(DnsTransaction *t, int error) {
|
||||||
_cleanup_(dns_packet_unrefp) DnsPacket *p = NULL;
|
assert(t);
|
||||||
DnsTransaction *t;
|
|
||||||
|
|
||||||
assert(s);
|
|
||||||
assert(s->transaction);
|
|
||||||
|
|
||||||
/* Copy the data we care about out of the stream before we
|
|
||||||
* destroy it. */
|
|
||||||
t = s->transaction;
|
|
||||||
p = dns_packet_ref(s->read_packet);
|
|
||||||
|
|
||||||
dns_transaction_close_connection(t);
|
dns_transaction_close_connection(t);
|
||||||
|
|
||||||
if (ERRNO_IS_DISCONNECT(error)) {
|
if (ERRNO_IS_DISCONNECT(error)) {
|
||||||
usec_t usec;
|
|
||||||
|
|
||||||
if (t->scope->protocol == DNS_PROTOCOL_LLMNR) {
|
if (t->scope->protocol == DNS_PROTOCOL_LLMNR) {
|
||||||
/* If the LLMNR/TCP connection failed, the host doesn't support LLMNR, and we cannot answer the
|
/* If the LLMNR/TCP connection failed, the host doesn't support LLMNR, and we cannot answer the
|
||||||
* question on this scope. */
|
* question on this scope. */
|
||||||
dns_transaction_complete(t, DNS_TRANSACTION_NOT_FOUND);
|
dns_transaction_complete(t, DNS_TRANSACTION_NOT_FOUND);
|
||||||
return 0;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
log_debug_errno(error, "Connection failure for DNS TCP stream: %m");
|
|
||||||
assert_se(sd_event_now(t->scope->manager->event, clock_boottime_or_monotonic(), &usec) >= 0);
|
|
||||||
dns_server_packet_lost(t->server, IPPROTO_TCP, t->current_feature_level, usec - t->start_usec);
|
|
||||||
|
|
||||||
dns_transaction_retry(t, true);
|
dns_transaction_retry(t, true);
|
||||||
return 0;
|
|
||||||
}
|
}
|
||||||
if (error != 0) {
|
if (error != 0) {
|
||||||
t->answer_errno = error;
|
t->answer_errno = error;
|
||||||
dns_transaction_complete(t, DNS_TRANSACTION_ERRNO);
|
dns_transaction_complete(t, DNS_TRANSACTION_ERRNO);
|
||||||
return 0;
|
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static int dns_transaction_on_stream_packet(DnsTransaction *t, DnsPacket *p) {
|
||||||
|
assert(t);
|
||||||
|
assert(p);
|
||||||
|
|
||||||
|
dns_transaction_close_connection(t);
|
||||||
|
|
||||||
if (dns_packet_validate_reply(p) <= 0) {
|
if (dns_packet_validate_reply(p) <= 0) {
|
||||||
log_debug("Invalid TCP reply packet.");
|
log_debug("Invalid TCP reply packet.");
|
||||||
|
@ -508,8 +499,64 @@ static int on_stream_complete(DnsStream *s, int error) {
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int dns_transaction_open_tcp(DnsTransaction *t) {
|
static int on_stream_complete(DnsStream *s, int error) {
|
||||||
|
DnsTransaction *t, *n;
|
||||||
|
int r = 0;
|
||||||
|
|
||||||
|
/* Do not let new transactions use this stream */
|
||||||
|
if (s->server && s->server->stream == s)
|
||||||
|
s->server->stream = dns_stream_unref(s->server->stream);
|
||||||
|
|
||||||
|
if (ERRNO_IS_DISCONNECT(error) && s->protocol != DNS_PROTOCOL_LLMNR) {
|
||||||
|
usec_t usec;
|
||||||
|
|
||||||
|
log_debug_errno(error, "Connection failure for DNS TCP stream: %m");
|
||||||
|
|
||||||
|
if (s->transactions) {
|
||||||
|
t = s->transactions;
|
||||||
|
assert_se(sd_event_now(t->scope->manager->event, clock_boottime_or_monotonic(), &usec) >= 0);
|
||||||
|
dns_server_packet_lost(t->server, IPPROTO_UDP, t->current_feature_level, usec - t->start_usec);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
LIST_FOREACH_SAFE(transactions_by_stream, t, n, s->transactions)
|
||||||
|
if (error != 0)
|
||||||
|
on_transaction_stream_error(t, error);
|
||||||
|
else if (DNS_PACKET_ID(s->read_packet) == t->id)
|
||||||
|
/* As each transaction have a unique id the return code is only set once */
|
||||||
|
r = dns_transaction_on_stream_packet(t, s->read_packet);
|
||||||
|
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int dns_stream_on_packet(DnsStream *s) {
|
||||||
|
_cleanup_(dns_packet_unrefp) DnsPacket *p = NULL;
|
||||||
|
int r = 0;
|
||||||
|
DnsTransaction *t;
|
||||||
|
|
||||||
|
/* Take ownership of packet to be able to receive new packets */
|
||||||
|
p = TAKE_PTR(s->read_packet);
|
||||||
|
s->n_read = 0;
|
||||||
|
|
||||||
|
t = hashmap_get(s->manager->dns_transactions, UINT_TO_PTR(DNS_PACKET_ID(p)));
|
||||||
|
|
||||||
|
/* Ignore incorrect transaction id as transaction can have been canceled */
|
||||||
|
if (t)
|
||||||
|
r = dns_transaction_on_stream_packet(t, p);
|
||||||
|
else {
|
||||||
|
if (dns_packet_validate_reply(p) <= 0) {
|
||||||
|
log_debug("Invalid TCP reply packet.");
|
||||||
|
on_stream_complete(s, 0);
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int dns_transaction_emit_tcp(DnsTransaction *t) {
|
||||||
_cleanup_close_ int fd = -1;
|
_cleanup_close_ int fd = -1;
|
||||||
|
_cleanup_(dns_stream_unrefp) DnsStream *s = NULL;
|
||||||
int r;
|
int r;
|
||||||
|
|
||||||
assert(t);
|
assert(t);
|
||||||
|
@ -530,7 +577,11 @@ static int dns_transaction_open_tcp(DnsTransaction *t) {
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
|
|
||||||
|
if (t->server->stream)
|
||||||
|
s = dns_stream_ref(t->server->stream);
|
||||||
|
else
|
||||||
fd = dns_scope_socket_tcp(t->scope, AF_UNSPEC, NULL, t->server, 53);
|
fd = dns_scope_socket_tcp(t->scope, AF_UNSPEC, NULL, t->server, 53);
|
||||||
|
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case DNS_PROTOCOL_LLMNR:
|
case DNS_PROTOCOL_LLMNR:
|
||||||
|
@ -562,27 +613,39 @@ static int dns_transaction_open_tcp(DnsTransaction *t) {
|
||||||
return -EAFNOSUPPORT;
|
return -EAFNOSUPPORT;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (!s) {
|
||||||
if (fd < 0)
|
if (fd < 0)
|
||||||
return fd;
|
return fd;
|
||||||
|
|
||||||
r = dns_stream_new(t->scope->manager, &t->stream, t->scope->protocol, fd);
|
r = dns_stream_new(t->scope->manager, &s, t->scope->protocol, fd);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
|
|
||||||
fd = -1;
|
fd = -1;
|
||||||
|
|
||||||
r = dns_stream_write_packet(t->stream, t->sent);
|
if (t->server) {
|
||||||
if (r < 0) {
|
dns_stream_unref(t->server->stream);
|
||||||
t->stream = dns_stream_unref(t->stream);
|
t->server->stream = dns_stream_ref(s);
|
||||||
return r;
|
s->server = dns_server_ref(t->server);
|
||||||
}
|
}
|
||||||
|
|
||||||
t->stream->complete = on_stream_complete;
|
s->complete = on_stream_complete;
|
||||||
t->stream->transaction = t;
|
s->on_packet = dns_stream_on_packet;
|
||||||
|
|
||||||
/* The interface index is difficult to determine if we are
|
/* The interface index is difficult to determine if we are
|
||||||
* connecting to the local host, hence fill this in right away
|
* connecting to the local host, hence fill this in right away
|
||||||
* instead of determining it from the socket */
|
* instead of determining it from the socket */
|
||||||
t->stream->ifindex = dns_scope_ifindex(t->scope);
|
s->ifindex = dns_scope_ifindex(t->scope);
|
||||||
|
}
|
||||||
|
|
||||||
|
t->stream = TAKE_PTR(s);
|
||||||
|
LIST_PREPEND(transactions_by_stream, t->stream->transactions, t);
|
||||||
|
|
||||||
|
r = dns_stream_write_packet(t->stream, t->sent);
|
||||||
|
if (r < 0) {
|
||||||
|
dns_transaction_close_connection(t);
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
||||||
dns_transaction_reset_answer(t);
|
dns_transaction_reset_answer(t);
|
||||||
|
|
||||||
|
@ -971,7 +1034,7 @@ void dns_transaction_process_reply(DnsTransaction *t, DnsPacket *p) {
|
||||||
log_debug("Reply truncated, retrying via TCP.");
|
log_debug("Reply truncated, retrying via TCP.");
|
||||||
|
|
||||||
/* Response was truncated, let's try again with good old TCP */
|
/* Response was truncated, let's try again with good old TCP */
|
||||||
r = dns_transaction_open_tcp(t);
|
r = dns_transaction_emit_tcp(t);
|
||||||
if (r == -ESRCH) {
|
if (r == -ESRCH) {
|
||||||
/* No servers found? Damn! */
|
/* No servers found? Damn! */
|
||||||
dns_transaction_complete(t, DNS_TRANSACTION_NO_SERVERS);
|
dns_transaction_complete(t, DNS_TRANSACTION_NO_SERVERS);
|
||||||
|
@ -1627,7 +1690,7 @@ int dns_transaction_go(DnsTransaction *t) {
|
||||||
|
|
||||||
/* RFC 4795, Section 2.4. says reverse lookups shall
|
/* RFC 4795, Section 2.4. says reverse lookups shall
|
||||||
* always be made via TCP on LLMNR */
|
* always be made via TCP on LLMNR */
|
||||||
r = dns_transaction_open_tcp(t);
|
r = dns_transaction_emit_tcp(t);
|
||||||
} else {
|
} else {
|
||||||
/* Try via UDP, and if that fails due to large size or lack of
|
/* Try via UDP, and if that fails due to large size or lack of
|
||||||
* support try via TCP */
|
* support try via TCP */
|
||||||
|
@ -1637,7 +1700,7 @@ int dns_transaction_go(DnsTransaction *t) {
|
||||||
else if (r == -EAGAIN)
|
else if (r == -EAGAIN)
|
||||||
log_debug("Sending query via TCP since server doesn't support UDP.");
|
log_debug("Sending query via TCP since server doesn't support UDP.");
|
||||||
if (IN_SET(r, -EMSGSIZE, -EAGAIN))
|
if (IN_SET(r, -EMSGSIZE, -EAGAIN))
|
||||||
r = dns_transaction_open_tcp(t);
|
r = dns_transaction_emit_tcp(t);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (r == -ESRCH) {
|
if (r == -ESRCH) {
|
||||||
|
|
|
@ -136,6 +136,7 @@ struct DnsTransaction {
|
||||||
unsigned block_gc;
|
unsigned block_gc;
|
||||||
|
|
||||||
LIST_FIELDS(DnsTransaction, transactions_by_scope);
|
LIST_FIELDS(DnsTransaction, transactions_by_scope);
|
||||||
|
LIST_FIELDS(DnsTransaction, transactions_by_stream);
|
||||||
};
|
};
|
||||||
|
|
||||||
int dns_transaction_new(DnsTransaction **ret, DnsScope *s, DnsResourceKey *key);
|
int dns_transaction_new(DnsTransaction **ret, DnsScope *s, DnsResourceKey *key);
|
||||||
|
|
Loading…
Reference in a new issue