2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-23 10:39:16 +00:00
bind/lib/dns/request.c

1384 lines
35 KiB
C
Raw Normal View History

2000-02-24 14:31:43 +00:00
/*
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
*
* See the COPYRIGHT file distributed with this work for additional
* information regarding copyright ownership.
2000-02-24 14:31:43 +00:00
*/
/*! \file */
2000-06-22 22:00:42 +00:00
#include <inttypes.h>
#include <stdbool.h>
#include <isc/magic.h>
#include <isc/mem.h>
2000-03-13 20:43:39 +00:00
#include <isc/task.h>
#include <isc/timer.h>
#include <isc/util.h>
#include <dns/acl.h>
#include <dns/compress.h>
2000-03-13 20:43:39 +00:00
#include <dns/dispatch.h>
#include <dns/events.h>
#include <dns/log.h>
2000-03-13 20:43:39 +00:00
#include <dns/message.h>
#include <dns/rdata.h>
#include <dns/rdatastruct.h>
2000-02-24 14:31:43 +00:00
#include <dns/request.h>
#include <dns/result.h>
#include <dns/tsig.h>
2000-02-24 14:31:43 +00:00
2020-02-13 14:44:37 -08:00
#define REQUESTMGR_MAGIC ISC_MAGIC('R', 'q', 'u', 'M')
#define VALID_REQUESTMGR(mgr) ISC_MAGIC_VALID(mgr, REQUESTMGR_MAGIC)
2000-02-24 14:31:43 +00:00
2020-02-13 14:44:37 -08:00
#define REQUEST_MAGIC ISC_MAGIC('R', 'q', 'u', '!')
#define VALID_REQUEST(request) ISC_MAGIC_VALID(request, REQUEST_MAGIC)
2000-02-24 14:31:43 +00:00
2000-03-20 12:22:02 +00:00
typedef ISC_LIST(dns_request_t) dns_requestlist_t;
#define DNS_REQUEST_NLOCKS 7
2000-02-24 14:31:43 +00:00
struct dns_requestmgr {
unsigned int magic;
2020-02-13 14:44:37 -08:00
isc_mutex_t lock;
isc_mem_t *mctx;
2000-02-24 14:31:43 +00:00
/* locked */
2020-02-13 14:44:37 -08:00
int32_t eref;
int32_t iref;
isc_timermgr_t *timermgr;
isc_socketmgr_t *socketmgr;
isc_taskmgr_t *taskmgr;
dns_dispatchmgr_t *dispatchmgr;
2020-02-13 14:44:37 -08:00
dns_dispatch_t *dispatchv4;
dns_dispatch_t *dispatchv6;
bool exiting;
isc_eventlist_t whenshutdown;
unsigned int hash;
isc_mutex_t locks[DNS_REQUEST_NLOCKS];
dns_requestlist_t requests;
2000-02-24 14:31:43 +00:00
};
struct dns_request {
unsigned int magic;
unsigned int hash;
2020-02-13 14:44:37 -08:00
isc_mem_t *mctx;
int32_t flags;
ISC_LINK(dns_request_t) link;
2020-02-13 14:44:37 -08:00
isc_buffer_t *query;
isc_buffer_t *answer;
dns_requestevent_t *event;
2020-02-13 14:44:37 -08:00
dns_dispatch_t *dispatch;
dns_dispentry_t *dispentry;
isc_timer_t *timer;
dns_requestmgr_t *requestmgr;
isc_buffer_t *tsig;
dns_tsigkey_t *tsigkey;
isc_socketevent_t sendevent;
2020-02-13 14:44:37 -08:00
isc_event_t ctlevent;
bool canceling; /* ctlevent outstanding */
isc_sockaddr_t destaddr;
unsigned int udpcount;
isc_dscp_t dscp;
2000-03-13 20:43:39 +00:00
};
2000-02-24 14:31:43 +00:00
2000-03-20 12:22:02 +00:00
#define DNS_REQUEST_F_CONNECTING 0x0001
2020-02-13 14:44:37 -08:00
#define DNS_REQUEST_F_SENDING 0x0002
#define DNS_REQUEST_F_CANCELED \
0x0004 /*%< ctlevent received, or otherwise \
* synchronously canceled */
#define DNS_REQUEST_F_TIMEDOUT 0x0008 /*%< canceled due to a timeout */
#define DNS_REQUEST_F_TCP 0x0010 /*%< This request used TCP */
#define DNS_REQUEST_CANCELED(r) (((r)->flags & DNS_REQUEST_F_CANCELED) != 0)
#define DNS_REQUEST_CONNECTING(r) (((r)->flags & DNS_REQUEST_F_CONNECTING) != 0)
2020-02-13 14:44:37 -08:00
#define DNS_REQUEST_SENDING(r) (((r)->flags & DNS_REQUEST_F_SENDING) != 0)
#define DNS_REQUEST_TIMEDOUT(r) (((r)->flags & DNS_REQUEST_F_TIMEDOUT) != 0)
2000-03-20 12:22:02 +00:00
2000-02-24 14:31:43 +00:00
/***
*** Forward
***/
2020-02-14 08:14:03 +01:00
static void
mgr_destroy(dns_requestmgr_t *requestmgr);
static void
mgr_shutdown(dns_requestmgr_t *requestmgr);
static unsigned int
mgr_gethash(dns_requestmgr_t *requestmgr);
static void
send_shutdown_events(dns_requestmgr_t *requestmgr);
static isc_result_t
req_render(dns_message_t *message, isc_buffer_t **buffer, unsigned int options,
isc_mem_t *mctx);
static void
req_senddone(isc_task_t *task, isc_event_t *event);
static void
req_response(isc_task_t *task, isc_event_t *event);
static void
req_timeout(isc_task_t *task, isc_event_t *event);
static void
req_connected(isc_task_t *task, isc_event_t *event);
static void
req_sendevent(dns_request_t *request, isc_result_t result);
static void
req_cancel(dns_request_t *request);
static void
req_destroy(dns_request_t *request);
static void
req_log(int level, const char *fmt, ...) ISC_FORMAT_PRINTF(2, 3);
static void
do_cancel(isc_task_t *task, isc_event_t *event);
2000-02-24 14:31:43 +00:00
/***
*** Public
***/
isc_result_t
dns_requestmgr_create(isc_mem_t *mctx, isc_timermgr_t *timermgr,
isc_socketmgr_t *socketmgr, isc_taskmgr_t *taskmgr,
dns_dispatchmgr_t *dispatchmgr,
dns_dispatch_t *dispatchv4, dns_dispatch_t *dispatchv6,
2020-02-13 14:44:37 -08:00
dns_requestmgr_t **requestmgrp) {
2000-02-24 14:31:43 +00:00
dns_requestmgr_t *requestmgr;
2020-02-13 14:44:37 -08:00
int i;
unsigned int dispattr;
2000-02-24 14:31:43 +00:00
req_log(ISC_LOG_DEBUG(3), "dns_requestmgr_create");
2000-02-24 14:31:43 +00:00
REQUIRE(requestmgrp != NULL && *requestmgrp == NULL);
2000-03-20 12:22:02 +00:00
REQUIRE(timermgr != NULL);
REQUIRE(socketmgr != NULL);
REQUIRE(taskmgr != NULL);
REQUIRE(dispatchmgr != NULL);
2020-08-06 12:21:50 +10:00
2000-02-24 14:31:43 +00:00
if (dispatchv4 != NULL) {
dispattr = dns_dispatch_getattributes(dispatchv4);
REQUIRE((dispattr & DNS_DISPATCHATTR_UDP) != 0);
2000-02-24 14:31:43 +00:00
}
if (dispatchv6 != NULL) {
dispattr = dns_dispatch_getattributes(dispatchv6);
REQUIRE((dispattr & DNS_DISPATCHATTR_UDP) != 0);
2000-02-24 14:31:43 +00:00
}
requestmgr = isc_mem_get(mctx, sizeof(*requestmgr));
2018-11-16 15:33:22 +01:00
isc_mutex_init(&requestmgr->lock);
for (i = 0; i < DNS_REQUEST_NLOCKS; i++) {
2018-11-16 15:33:22 +01:00
isc_mutex_init(&requestmgr->locks[i]);
}
2000-02-24 14:31:43 +00:00
requestmgr->timermgr = timermgr;
2000-03-20 12:22:02 +00:00
requestmgr->socketmgr = socketmgr;
requestmgr->taskmgr = taskmgr;
requestmgr->dispatchmgr = dispatchmgr;
2000-02-24 14:31:43 +00:00
requestmgr->dispatchv4 = NULL;
if (dispatchv4 != NULL) {
2000-03-13 20:43:39 +00:00
dns_dispatch_attach(dispatchv4, &requestmgr->dispatchv4);
}
2000-02-24 14:31:43 +00:00
requestmgr->dispatchv6 = NULL;
if (dispatchv6 != NULL) {
2000-03-13 20:43:39 +00:00
dns_dispatch_attach(dispatchv6, &requestmgr->dispatchv6);
}
requestmgr->mctx = NULL;
isc_mem_attach(mctx, &requestmgr->mctx);
requestmgr->eref = 1; /* implicit attach */
requestmgr->iref = 0;
2000-02-24 14:31:43 +00:00
ISC_LIST_INIT(requestmgr->whenshutdown);
2000-03-20 12:22:02 +00:00
ISC_LIST_INIT(requestmgr->requests);
requestmgr->exiting = false;
requestmgr->hash = 0;
2000-02-24 14:31:43 +00:00
requestmgr->magic = REQUESTMGR_MAGIC;
req_log(ISC_LOG_DEBUG(3), "dns_requestmgr_create: %p", requestmgr);
*requestmgrp = requestmgr;
2000-02-24 14:31:43 +00:00
return (ISC_R_SUCCESS);
}
void
dns_requestmgr_whenshutdown(dns_requestmgr_t *requestmgr, isc_task_t *task,
2020-02-13 14:44:37 -08:00
isc_event_t **eventp) {
isc_task_t *tclone;
2000-12-11 19:24:30 +00:00
isc_event_t *event;
2000-02-24 14:31:43 +00:00
req_log(ISC_LOG_DEBUG(3), "dns_requestmgr_whenshutdown");
2000-12-11 19:24:30 +00:00
REQUIRE(VALID_REQUESTMGR(requestmgr));
REQUIRE(eventp != NULL);
event = *eventp;
*eventp = NULL;
LOCK(&requestmgr->lock);
if (requestmgr->exiting) {
/*
* We're already shutdown. Send the event.
*/
event->ev_sender = requestmgr;
isc_task_send(task, &event);
} else {
tclone = NULL;
isc_task_attach(task, &tclone);
event->ev_sender = tclone;
2000-12-11 19:24:30 +00:00
ISC_LIST_APPEND(requestmgr->whenshutdown, event, ev_link);
2000-02-24 14:31:43 +00:00
}
UNLOCK(&requestmgr->lock);
}
void
2020-02-13 14:44:37 -08:00
dns_requestmgr_shutdown(dns_requestmgr_t *requestmgr) {
2000-12-11 19:24:30 +00:00
REQUIRE(VALID_REQUESTMGR(requestmgr));
2000-02-24 14:31:43 +00:00
req_log(ISC_LOG_DEBUG(3), "dns_requestmgr_shutdown: %p", requestmgr);
2000-02-24 14:31:43 +00:00
LOCK(&requestmgr->lock);
2000-03-20 12:22:02 +00:00
mgr_shutdown(requestmgr);
UNLOCK(&requestmgr->lock);
}
static void
2020-02-13 14:44:37 -08:00
mgr_shutdown(dns_requestmgr_t *requestmgr) {
2000-03-20 12:22:02 +00:00
dns_request_t *request;
2000-03-20 12:22:02 +00:00
/*
* Caller holds lock.
*/
2000-02-24 14:31:43 +00:00
if (!requestmgr->exiting) {
requestmgr->exiting = true;
2000-03-20 12:22:02 +00:00
for (request = ISC_LIST_HEAD(requestmgr->requests);
2020-02-13 14:44:37 -08:00
request != NULL; request = ISC_LIST_NEXT(request, link))
{
2000-03-20 12:22:02 +00:00
dns_request_cancel(request);
}
if (requestmgr->iref == 0) {
INSIST(ISC_LIST_EMPTY(requestmgr->requests));
send_shutdown_events(requestmgr);
}
}
}
static void
2020-02-13 14:44:37 -08:00
requestmgr_attach(dns_requestmgr_t *source, dns_requestmgr_t **targetp) {
/*
* Locked by caller.
*/
2000-12-11 19:24:30 +00:00
REQUIRE(VALID_REQUESTMGR(source));
REQUIRE(targetp != NULL && *targetp == NULL);
REQUIRE(!source->exiting);
source->iref++;
*targetp = source;
req_log(ISC_LOG_DEBUG(3), "requestmgr_attach: %p: eref %d iref %d",
source, source->eref, source->iref);
}
static void
2020-02-13 14:44:37 -08:00
requestmgr_detach(dns_requestmgr_t **requestmgrp) {
dns_requestmgr_t *requestmgr;
2020-02-13 14:44:37 -08:00
bool need_destroy = false;
REQUIRE(requestmgrp != NULL);
requestmgr = *requestmgrp;
*requestmgrp = NULL;
REQUIRE(VALID_REQUESTMGR(requestmgr));
LOCK(&requestmgr->lock);
INSIST(requestmgr->iref > 0);
requestmgr->iref--;
req_log(ISC_LOG_DEBUG(3), "requestmgr_detach: %p: eref %d iref %d",
requestmgr, requestmgr->eref, requestmgr->iref);
if (requestmgr->iref == 0 && requestmgr->exiting) {
INSIST(ISC_LIST_HEAD(requestmgr->requests) == NULL);
2000-02-24 14:31:43 +00:00
send_shutdown_events(requestmgr);
if (requestmgr->eref == 0) {
need_destroy = true;
}
2000-02-24 14:31:43 +00:00
}
UNLOCK(&requestmgr->lock);
if (need_destroy) {
mgr_destroy(requestmgr);
}
2000-02-24 14:31:43 +00:00
}
void
2020-02-13 14:44:37 -08:00
dns_requestmgr_attach(dns_requestmgr_t *source, dns_requestmgr_t **targetp) {
2000-12-11 19:24:30 +00:00
REQUIRE(VALID_REQUESTMGR(source));
REQUIRE(targetp != NULL && *targetp == NULL);
2000-03-13 20:43:39 +00:00
REQUIRE(!source->exiting);
2000-02-24 14:31:43 +00:00
LOCK(&source->lock);
source->eref++;
2000-02-24 14:31:43 +00:00
*targetp = source;
UNLOCK(&source->lock);
req_log(ISC_LOG_DEBUG(3), "dns_requestmgr_attach: %p: eref %d iref %d",
source, source->eref, source->iref);
2000-02-24 14:31:43 +00:00
}
void
2020-02-13 14:44:37 -08:00
dns_requestmgr_detach(dns_requestmgr_t **requestmgrp) {
2000-02-24 14:31:43 +00:00
dns_requestmgr_t *requestmgr;
2020-02-13 14:44:37 -08:00
bool need_destroy = false;
2000-02-24 14:31:43 +00:00
REQUIRE(requestmgrp != NULL);
2000-03-13 20:43:39 +00:00
requestmgr = *requestmgrp;
*requestmgrp = NULL;
2000-02-24 14:31:43 +00:00
REQUIRE(VALID_REQUESTMGR(requestmgr));
LOCK(&requestmgr->lock);
INSIST(requestmgr->eref > 0);
requestmgr->eref--;
req_log(ISC_LOG_DEBUG(3), "dns_requestmgr_detach: %p: eref %d iref %d",
requestmgr, requestmgr->eref, requestmgr->iref);
if (requestmgr->eref == 0 && requestmgr->iref == 0) {
2000-03-20 12:22:02 +00:00
INSIST(requestmgr->exiting &&
ISC_LIST_HEAD(requestmgr->requests) == NULL);
need_destroy = true;
2000-02-24 14:31:43 +00:00
}
2000-03-13 20:43:39 +00:00
UNLOCK(&requestmgr->lock);
2000-02-24 14:31:43 +00:00
if (need_destroy) {
2000-03-20 12:22:02 +00:00
mgr_destroy(requestmgr);
}
2000-02-24 14:31:43 +00:00
}
static void
2020-02-13 14:44:37 -08:00
send_shutdown_events(dns_requestmgr_t *requestmgr) {
2000-02-24 14:31:43 +00:00
isc_event_t *event, *next_event;
2020-02-13 14:44:37 -08:00
isc_task_t *etask;
2000-02-24 14:31:43 +00:00
req_log(ISC_LOG_DEBUG(3), "send_shutdown_events: %p", requestmgr);
2000-02-24 14:31:43 +00:00
/*
* Caller must be holding the manager lock.
*/
for (event = ISC_LIST_HEAD(requestmgr->whenshutdown); event != NULL;
2020-02-13 14:44:37 -08:00
event = next_event)
{
next_event = ISC_LIST_NEXT(event, ev_link);
ISC_LIST_UNLINK(requestmgr->whenshutdown, event, ev_link);
etask = event->ev_sender;
event->ev_sender = requestmgr;
2000-02-24 14:31:43 +00:00
isc_task_sendanddetach(&etask, &event);
}
}
static void
2020-02-13 14:44:37 -08:00
mgr_destroy(dns_requestmgr_t *requestmgr) {
int i;
req_log(ISC_LOG_DEBUG(3), "mgr_destroy");
REQUIRE(requestmgr->eref == 0);
REQUIRE(requestmgr->iref == 0);
2000-03-20 12:22:02 +00:00
isc_mutex_destroy(&requestmgr->lock);
for (i = 0; i < DNS_REQUEST_NLOCKS; i++) {
isc_mutex_destroy(&requestmgr->locks[i]);
}
if (requestmgr->dispatchv4 != NULL) {
2000-02-24 14:31:43 +00:00
dns_dispatch_detach(&requestmgr->dispatchv4);
}
if (requestmgr->dispatchv6 != NULL) {
dns_dispatch_detach(&requestmgr->dispatchv6);
}
2000-03-13 20:43:39 +00:00
requestmgr->magic = 0;
isc_mem_putanddetach(&requestmgr->mctx, requestmgr,
sizeof(*requestmgr));
2000-02-24 14:31:43 +00:00
}
static unsigned int
2020-02-13 14:44:37 -08:00
mgr_gethash(dns_requestmgr_t *requestmgr) {
req_log(ISC_LOG_DEBUG(3), "mgr_gethash");
/*
* Locked by caller.
*/
requestmgr->hash++;
2001-01-23 02:00:56 +00:00
return (requestmgr->hash % DNS_REQUEST_NLOCKS);
}
2000-03-20 12:22:02 +00:00
static inline isc_result_t
req_send(dns_request_t *request, isc_task_t *task,
2020-02-13 14:44:37 -08:00
const isc_sockaddr_t *address) {
isc_result_t result;
isc_region_t r;
bool tcp;
2000-03-20 12:22:02 +00:00
req_log(ISC_LOG_DEBUG(3), "req_send: request %p", request);
2000-04-28 22:07:29 +00:00
REQUIRE(VALID_REQUEST(request));
isc_buffer_usedregion(request->query, &r);
Dispatch API simplification - Many dispatch attributes can be set implicitly instead of being passed in. we can infer whether to set DNS_DISPATCHATTR_TCP or _UDP from whether we're calling dns_dispatch_createtcp() or _createudp(). we can also infer DNS_DISPATCHATTR_IPV4 or _IPV6 from the addresses or the socket that were passed in. - We no longer use dup'd sockets in UDP dispatches, so the 'dup_socket' parameter has been removed from dns_dispatch_createudp(), along with the code implementing it. also removed isc_socket_dup() since it no longer has any callers. - The 'buffersize' parameter was ignored and has now been removed; buffersize is now fixed at 4096. - Maxbuffers and maxrequests don't need to be passed in on every call to dns_dispatch_createtcp() and _createudp(). In all current uses, the value for mgr->maxbuffers will either be raised once from its default of 20000 to 32768, or else left alone. (passing in a value lower than 20000 does not lower it.) there isn't enough difference between these values for there to be any need to configure this. The value for disp->maxrequests controls both the quota of concurrent requests for a dispatch and also the size of the dispatch socket memory pool. it's not clear that this quota is necessary at all. the memory pool size currently starts at 32768, but is sometimes lowered to 4096, which is definitely unnecessary. This commit sets both values permanently to 32768. - Previously TCP dispatches allocated their own separate QID table, which didn't incorporate a port table. this commit removes per-dispatch QID tables and shares the same table between all dispatches. since dispatches are created for each TCP socket, this may speed up the dispatch allocation process. there may be a slight increase in lock contention since all dispatches are sharing a single QID table, but since TCP sockets are used less often than UDP sockets (which were already sharing a QID table), it should not be a substantial change. - The dispatch port table was being used to determine whether a port was already in use; if so, then a UDP socket would be bound with REUSEADDR. this commit removes the port table, and always binds UDP sockets that way.
2020-12-17 00:43:00 -08:00
tcp = dns_request_usedtcp(request);
request->flags |= DNS_REQUEST_F_SENDING;
result = dns_dispatch_send(request->dispentry, tcp, task,
&request->sendevent, &r, address,
request->dscp, req_senddone, request);
INSIST(result == ISC_R_SUCCESS);
2000-12-31 05:05:34 +00:00
return (result);
2000-03-20 12:22:02 +00:00
}
2001-01-23 19:50:10 +00:00
static isc_result_t
2020-02-13 14:44:37 -08:00
new_request(isc_mem_t *mctx, dns_request_t **requestp) {
2001-01-23 19:50:10 +00:00
dns_request_t *request;
request = isc_mem_get(mctx, sizeof(*request));
Dispatch API simplification - Many dispatch attributes can be set implicitly instead of being passed in. we can infer whether to set DNS_DISPATCHATTR_TCP or _UDP from whether we're calling dns_dispatch_createtcp() or _createudp(). we can also infer DNS_DISPATCHATTR_IPV4 or _IPV6 from the addresses or the socket that were passed in. - We no longer use dup'd sockets in UDP dispatches, so the 'dup_socket' parameter has been removed from dns_dispatch_createudp(), along with the code implementing it. also removed isc_socket_dup() since it no longer has any callers. - The 'buffersize' parameter was ignored and has now been removed; buffersize is now fixed at 4096. - Maxbuffers and maxrequests don't need to be passed in on every call to dns_dispatch_createtcp() and _createudp(). In all current uses, the value for mgr->maxbuffers will either be raised once from its default of 20000 to 32768, or else left alone. (passing in a value lower than 20000 does not lower it.) there isn't enough difference between these values for there to be any need to configure this. The value for disp->maxrequests controls both the quota of concurrent requests for a dispatch and also the size of the dispatch socket memory pool. it's not clear that this quota is necessary at all. the memory pool size currently starts at 32768, but is sometimes lowered to 4096, which is definitely unnecessary. This commit sets both values permanently to 32768. - Previously TCP dispatches allocated their own separate QID table, which didn't incorporate a port table. this commit removes per-dispatch QID tables and shares the same table between all dispatches. since dispatches are created for each TCP socket, this may speed up the dispatch allocation process. there may be a slight increase in lock contention since all dispatches are sharing a single QID table, but since TCP sockets are used less often than UDP sockets (which were already sharing a QID table), it should not be a substantial change. - The dispatch port table was being used to determine whether a port was already in use; if so, then a UDP socket would be bound with REUSEADDR. this commit removes the port table, and always binds UDP sockets that way.
2020-12-17 00:43:00 -08:00
*request = (dns_request_t){ .dscp = -1 };
2001-01-23 19:50:10 +00:00
ISC_LINK_INIT(request, link);
ISC_EVENT_INIT(&request->ctlevent, sizeof(request->ctlevent), 0, NULL,
DNS_EVENT_REQUESTCONTROL, do_cancel, request, NULL, NULL,
NULL);
2001-01-23 19:50:10 +00:00
isc_mem_attach(mctx, &request->mctx);
request->magic = REQUEST_MAGIC;
2001-01-23 19:50:10 +00:00
*requestp = request;
return (ISC_R_SUCCESS);
}
static bool
2020-02-13 14:44:37 -08:00
isblackholed(dns_dispatchmgr_t *dispatchmgr, const isc_sockaddr_t *destaddr) {
dns_acl_t *blackhole;
2001-01-23 07:36:06 +00:00
isc_netaddr_t netaddr;
2020-02-13 14:44:37 -08:00
int match;
bool drop = false;
char netaddrstr[ISC_NETADDR_FORMATSIZE];
2001-01-23 07:36:06 +00:00
blackhole = dns_dispatchmgr_getblackhole(dispatchmgr);
2001-01-23 07:36:06 +00:00
if (blackhole != NULL) {
isc_netaddr_fromsockaddr(&netaddr, destaddr);
if (dns_acl_match(&netaddr, NULL, blackhole, NULL, &match,
NULL) == ISC_R_SUCCESS &&
2020-02-13 14:44:37 -08:00
match > 0)
{
drop = true;
}
2001-01-23 07:36:06 +00:00
}
if (drop) {
isc_netaddr_format(&netaddr, netaddrstr, sizeof(netaddrstr));
req_log(ISC_LOG_DEBUG(10), "blackholed address %s", netaddrstr);
}
return (drop);
}
static isc_result_t
Dispatch API simplification - Many dispatch attributes can be set implicitly instead of being passed in. we can infer whether to set DNS_DISPATCHATTR_TCP or _UDP from whether we're calling dns_dispatch_createtcp() or _createudp(). we can also infer DNS_DISPATCHATTR_IPV4 or _IPV6 from the addresses or the socket that were passed in. - We no longer use dup'd sockets in UDP dispatches, so the 'dup_socket' parameter has been removed from dns_dispatch_createudp(), along with the code implementing it. also removed isc_socket_dup() since it no longer has any callers. - The 'buffersize' parameter was ignored and has now been removed; buffersize is now fixed at 4096. - Maxbuffers and maxrequests don't need to be passed in on every call to dns_dispatch_createtcp() and _createudp(). In all current uses, the value for mgr->maxbuffers will either be raised once from its default of 20000 to 32768, or else left alone. (passing in a value lower than 20000 does not lower it.) there isn't enough difference between these values for there to be any need to configure this. The value for disp->maxrequests controls both the quota of concurrent requests for a dispatch and also the size of the dispatch socket memory pool. it's not clear that this quota is necessary at all. the memory pool size currently starts at 32768, but is sometimes lowered to 4096, which is definitely unnecessary. This commit sets both values permanently to 32768. - Previously TCP dispatches allocated their own separate QID table, which didn't incorporate a port table. this commit removes per-dispatch QID tables and shares the same table between all dispatches. since dispatches are created for each TCP socket, this may speed up the dispatch allocation process. there may be a slight increase in lock contention since all dispatches are sharing a single QID table, but since TCP sockets are used less often than UDP sockets (which were already sharing a QID table), it should not be a substantial change. - The dispatch port table was being used to determine whether a port was already in use; if so, then a UDP socket would be bound with REUSEADDR. this commit removes the port table, and always binds UDP sockets that way.
2020-12-17 00:43:00 -08:00
tcp_dispatch(bool newtcp, dns_requestmgr_t *requestmgr,
const isc_sockaddr_t *srcaddr, const isc_sockaddr_t *destaddr,
isc_dscp_t dscp, bool *connected, dns_dispatch_t **dispatchp) {
2020-02-13 14:44:37 -08:00
isc_result_t result;
2001-01-23 07:36:06 +00:00
if (!newtcp) {
result = dns_dispatch_gettcp(requestmgr->dispatchmgr, destaddr,
srcaddr, connected, dispatchp);
if (result == ISC_R_SUCCESS) {
char peer[ISC_SOCKADDR_FORMATSIZE];
isc_sockaddr_format(destaddr, peer, sizeof(peer));
req_log(ISC_LOG_DEBUG(1),
"attached to %s TCP "
"connection to %s",
*connected ? "existing" : "pending", peer);
return (result);
}
}
result = dns_dispatch_createtcp(
requestmgr->dispatchmgr, requestmgr->socketmgr,
requestmgr->taskmgr, srcaddr, destaddr, 0, dscp, dispatchp);
2001-01-23 07:36:06 +00:00
return (result);
}
static isc_result_t
Dispatch API simplification - Many dispatch attributes can be set implicitly instead of being passed in. we can infer whether to set DNS_DISPATCHATTR_TCP or _UDP from whether we're calling dns_dispatch_createtcp() or _createudp(). we can also infer DNS_DISPATCHATTR_IPV4 or _IPV6 from the addresses or the socket that were passed in. - We no longer use dup'd sockets in UDP dispatches, so the 'dup_socket' parameter has been removed from dns_dispatch_createudp(), along with the code implementing it. also removed isc_socket_dup() since it no longer has any callers. - The 'buffersize' parameter was ignored and has now been removed; buffersize is now fixed at 4096. - Maxbuffers and maxrequests don't need to be passed in on every call to dns_dispatch_createtcp() and _createudp(). In all current uses, the value for mgr->maxbuffers will either be raised once from its default of 20000 to 32768, or else left alone. (passing in a value lower than 20000 does not lower it.) there isn't enough difference between these values for there to be any need to configure this. The value for disp->maxrequests controls both the quota of concurrent requests for a dispatch and also the size of the dispatch socket memory pool. it's not clear that this quota is necessary at all. the memory pool size currently starts at 32768, but is sometimes lowered to 4096, which is definitely unnecessary. This commit sets both values permanently to 32768. - Previously TCP dispatches allocated their own separate QID table, which didn't incorporate a port table. this commit removes per-dispatch QID tables and shares the same table between all dispatches. since dispatches are created for each TCP socket, this may speed up the dispatch allocation process. there may be a slight increase in lock contention since all dispatches are sharing a single QID table, but since TCP sockets are used less often than UDP sockets (which were already sharing a QID table), it should not be a substantial change. - The dispatch port table was being used to determine whether a port was already in use; if so, then a UDP socket would be bound with REUSEADDR. this commit removes the port table, and always binds UDP sockets that way.
2020-12-17 00:43:00 -08:00
udp_dispatch(dns_requestmgr_t *requestmgr, const isc_sockaddr_t *srcaddr,
const isc_sockaddr_t *destaddr, dns_dispatch_t **dispatchp) {
2001-01-23 07:36:06 +00:00
dns_dispatch_t *disp = NULL;
if (srcaddr == NULL) {
switch (isc_sockaddr_pf(destaddr)) {
case PF_INET:
disp = requestmgr->dispatchv4;
break;
case PF_INET6:
disp = requestmgr->dispatchv6;
break;
default:
return (ISC_R_NOTIMPLEMENTED);
}
if (disp == NULL) {
2001-01-23 07:36:06 +00:00
return (ISC_R_FAMILYNOSUPPORT);
}
2001-01-23 07:36:06 +00:00
dns_dispatch_attach(disp, dispatchp);
return (ISC_R_SUCCESS);
}
Dispatch API simplification - Many dispatch attributes can be set implicitly instead of being passed in. we can infer whether to set DNS_DISPATCHATTR_TCP or _UDP from whether we're calling dns_dispatch_createtcp() or _createudp(). we can also infer DNS_DISPATCHATTR_IPV4 or _IPV6 from the addresses or the socket that were passed in. - We no longer use dup'd sockets in UDP dispatches, so the 'dup_socket' parameter has been removed from dns_dispatch_createudp(), along with the code implementing it. also removed isc_socket_dup() since it no longer has any callers. - The 'buffersize' parameter was ignored and has now been removed; buffersize is now fixed at 4096. - Maxbuffers and maxrequests don't need to be passed in on every call to dns_dispatch_createtcp() and _createudp(). In all current uses, the value for mgr->maxbuffers will either be raised once from its default of 20000 to 32768, or else left alone. (passing in a value lower than 20000 does not lower it.) there isn't enough difference between these values for there to be any need to configure this. The value for disp->maxrequests controls both the quota of concurrent requests for a dispatch and also the size of the dispatch socket memory pool. it's not clear that this quota is necessary at all. the memory pool size currently starts at 32768, but is sometimes lowered to 4096, which is definitely unnecessary. This commit sets both values permanently to 32768. - Previously TCP dispatches allocated their own separate QID table, which didn't incorporate a port table. this commit removes per-dispatch QID tables and shares the same table between all dispatches. since dispatches are created for each TCP socket, this may speed up the dispatch allocation process. there may be a slight increase in lock contention since all dispatches are sharing a single QID table, but since TCP sockets are used less often than UDP sockets (which were already sharing a QID table), it should not be a substantial change. - The dispatch port table was being used to determine whether a port was already in use; if so, then a UDP socket would be bound with REUSEADDR. this commit removes the port table, and always binds UDP sockets that way.
2020-12-17 00:43:00 -08:00
return (dns_dispatch_createudp(
requestmgr->dispatchmgr, requestmgr->socketmgr,
requestmgr->taskmgr, srcaddr, 0, dispatchp));
2001-01-23 07:36:06 +00:00
}
static isc_result_t
get_dispatch(bool tcp, bool newtcp, dns_requestmgr_t *requestmgr,
const isc_sockaddr_t *srcaddr, const isc_sockaddr_t *destaddr,
2020-02-13 14:44:37 -08:00
isc_dscp_t dscp, bool *connected, dns_dispatch_t **dispatchp) {
2001-01-23 07:36:06 +00:00
isc_result_t result;
if (tcp) {
Dispatch API simplification - Many dispatch attributes can be set implicitly instead of being passed in. we can infer whether to set DNS_DISPATCHATTR_TCP or _UDP from whether we're calling dns_dispatch_createtcp() or _createudp(). we can also infer DNS_DISPATCHATTR_IPV4 or _IPV6 from the addresses or the socket that were passed in. - We no longer use dup'd sockets in UDP dispatches, so the 'dup_socket' parameter has been removed from dns_dispatch_createudp(), along with the code implementing it. also removed isc_socket_dup() since it no longer has any callers. - The 'buffersize' parameter was ignored and has now been removed; buffersize is now fixed at 4096. - Maxbuffers and maxrequests don't need to be passed in on every call to dns_dispatch_createtcp() and _createudp(). In all current uses, the value for mgr->maxbuffers will either be raised once from its default of 20000 to 32768, or else left alone. (passing in a value lower than 20000 does not lower it.) there isn't enough difference between these values for there to be any need to configure this. The value for disp->maxrequests controls both the quota of concurrent requests for a dispatch and also the size of the dispatch socket memory pool. it's not clear that this quota is necessary at all. the memory pool size currently starts at 32768, but is sometimes lowered to 4096, which is definitely unnecessary. This commit sets both values permanently to 32768. - Previously TCP dispatches allocated their own separate QID table, which didn't incorporate a port table. this commit removes per-dispatch QID tables and shares the same table between all dispatches. since dispatches are created for each TCP socket, this may speed up the dispatch allocation process. there may be a slight increase in lock contention since all dispatches are sharing a single QID table, but since TCP sockets are used less often than UDP sockets (which were already sharing a QID table), it should not be a substantial change. - The dispatch port table was being used to determine whether a port was already in use; if so, then a UDP socket would be bound with REUSEADDR. this commit removes the port table, and always binds UDP sockets that way.
2020-12-17 00:43:00 -08:00
result = tcp_dispatch(newtcp, requestmgr, srcaddr, destaddr,
dscp, connected, dispatchp);
} else {
Dispatch API simplification - Many dispatch attributes can be set implicitly instead of being passed in. we can infer whether to set DNS_DISPATCHATTR_TCP or _UDP from whether we're calling dns_dispatch_createtcp() or _createudp(). we can also infer DNS_DISPATCHATTR_IPV4 or _IPV6 from the addresses or the socket that were passed in. - We no longer use dup'd sockets in UDP dispatches, so the 'dup_socket' parameter has been removed from dns_dispatch_createudp(), along with the code implementing it. also removed isc_socket_dup() since it no longer has any callers. - The 'buffersize' parameter was ignored and has now been removed; buffersize is now fixed at 4096. - Maxbuffers and maxrequests don't need to be passed in on every call to dns_dispatch_createtcp() and _createudp(). In all current uses, the value for mgr->maxbuffers will either be raised once from its default of 20000 to 32768, or else left alone. (passing in a value lower than 20000 does not lower it.) there isn't enough difference between these values for there to be any need to configure this. The value for disp->maxrequests controls both the quota of concurrent requests for a dispatch and also the size of the dispatch socket memory pool. it's not clear that this quota is necessary at all. the memory pool size currently starts at 32768, but is sometimes lowered to 4096, which is definitely unnecessary. This commit sets both values permanently to 32768. - Previously TCP dispatches allocated their own separate QID table, which didn't incorporate a port table. this commit removes per-dispatch QID tables and shares the same table between all dispatches. since dispatches are created for each TCP socket, this may speed up the dispatch allocation process. there may be a slight increase in lock contention since all dispatches are sharing a single QID table, but since TCP sockets are used less often than UDP sockets (which were already sharing a QID table), it should not be a substantial change. - The dispatch port table was being used to determine whether a port was already in use; if so, then a UDP socket would be bound with REUSEADDR. this commit removes the port table, and always binds UDP sockets that way.
2020-12-17 00:43:00 -08:00
result = udp_dispatch(requestmgr, srcaddr, destaddr, dispatchp);
}
2001-01-23 07:36:06 +00:00
return (result);
}
static isc_result_t
2020-02-13 14:44:37 -08:00
set_timer(isc_timer_t *timer, unsigned int timeout, unsigned int udpresend) {
isc_time_t expires;
isc_interval_t interval;
isc_result_t result;
isc_timertype_t timertype;
2001-01-23 07:36:06 +00:00
isc_interval_set(&interval, timeout, 0);
result = isc_time_nowplusinterval(&expires, &interval);
isc_interval_set(&interval, udpresend, 0);
2001-01-23 07:36:06 +00:00
timertype = udpresend != 0 ? isc_timertype_limited : isc_timertype_once;
if (result == ISC_R_SUCCESS) {
result = isc_timer_reset(timer, timertype, &expires, &interval,
false);
}
2001-01-23 07:36:06 +00:00
return (result);
}
isc_result_t
dns_request_createraw(dns_requestmgr_t *requestmgr, isc_buffer_t *msgbuf,
const isc_sockaddr_t *srcaddr,
const isc_sockaddr_t *destaddr, isc_dscp_t dscp,
unsigned int options, unsigned int timeout,
unsigned int udptimeout, unsigned int udpretries,
isc_task_t *task, isc_taskaction_t action, void *arg,
2020-02-13 14:44:37 -08:00
dns_request_t **requestp) {
dns_request_t *request = NULL;
isc_task_t *tclone = NULL;
isc_result_t result;
isc_mem_t *mctx;
dns_messageid_t id;
2020-02-13 14:44:37 -08:00
bool tcp = false;
bool newtcp = false;
isc_region_t r;
bool connected = false;
unsigned int dispopt = 0;
REQUIRE(VALID_REQUESTMGR(requestmgr));
REQUIRE(msgbuf != NULL);
REQUIRE(destaddr != NULL);
REQUIRE(task != NULL);
REQUIRE(action != NULL);
REQUIRE(requestp != NULL && *requestp == NULL);
REQUIRE(timeout > 0);
if (srcaddr != NULL) {
REQUIRE(isc_sockaddr_pf(srcaddr) == isc_sockaddr_pf(destaddr));
}
mctx = requestmgr->mctx;
req_log(ISC_LOG_DEBUG(3), "dns_request_createraw");
if (isblackholed(requestmgr->dispatchmgr, destaddr)) {
2001-01-23 07:36:06 +00:00
return (DNS_R_BLACKHOLED);
}
2001-01-23 19:50:10 +00:00
request = NULL;
result = new_request(mctx, &request);
if (result != ISC_R_SUCCESS) {
2001-01-23 19:50:10 +00:00
return (result);
}
2002-11-12 23:58:14 +00:00
if (udptimeout == 0 && udpretries != 0) {
udptimeout = timeout / (udpretries + 1);
if (udptimeout == 0) {
2002-11-12 23:58:14 +00:00
udptimeout = 1;
}
2002-11-12 23:58:14 +00:00
}
request->udpcount = udpretries;
request->dscp = dscp;
2002-11-12 23:58:14 +00:00
/*
* Create timer now. We will set it below once.
*/
result = isc_timer_create(requestmgr->timermgr, isc_timertype_inactive,
NULL, NULL, task, req_timeout, request,
&request->timer);
if (result != ISC_R_SUCCESS) {
goto cleanup;
}
request->event = (dns_requestevent_t *)isc_event_allocate(
mctx, task, DNS_EVENT_REQUESTDONE, action, arg,
sizeof(dns_requestevent_t));
isc_task_attach(task, &tclone);
request->event->ev_sender = task;
request->event->request = request;
request->event->result = ISC_R_FAILURE;
isc_buffer_usedregion(msgbuf, &r);
if (r.length < DNS_MESSAGE_HEADERLEN || r.length > 65535) {
result = DNS_R_FORMERR;
goto cleanup;
}
2008-06-23 23:47:11 +00:00
if ((options & DNS_REQUESTOPT_TCP) != 0 || r.length > 512) {
tcp = true;
}
again:
result = get_dispatch(tcp, newtcp, requestmgr, srcaddr, destaddr, dscp,
&connected, &request->dispatch);
if (result != ISC_R_SUCCESS) {
2001-01-23 07:36:06 +00:00
goto cleanup;
}
2001-01-23 07:36:06 +00:00
if ((options & DNS_REQUESTOPT_FIXEDID) != 0) {
id = (r.base[0] << 8) | r.base[1];
dispopt |= DNS_DISPATCHOPT_FIXEDID;
}
result = dns_dispatch_addresponse(
request->dispatch, dispopt, destaddr, task, req_response,
request, &id, &request->dispentry, requestmgr->socketmgr);
if (result != ISC_R_SUCCESS) {
if ((options & DNS_REQUESTOPT_FIXEDID) != 0 && !newtcp) {
newtcp = true;
connected = false;
dns_dispatch_detach(&request->dispatch);
goto again;
}
goto cleanup;
}
isc_buffer_allocate(mctx, &request->query, r.length + (tcp ? 2 : 0));
if (tcp) {
isc_buffer_putuint16(request->query, (uint16_t)r.length);
}
result = isc_buffer_copyregion(request->query, &r);
if (result != ISC_R_SUCCESS) {
goto cleanup;
}
/* Add message ID. */
isc_buffer_usedregion(request->query, &r);
if (tcp) {
isc_region_consume(&r, 2);
}
r.base[0] = (id >> 8) & 0xff;
r.base[1] = id & 0xff;
LOCK(&requestmgr->lock);
if (requestmgr->exiting) {
UNLOCK(&requestmgr->lock);
result = ISC_R_SHUTTINGDOWN;
goto cleanup;
}
requestmgr_attach(requestmgr, &request->requestmgr);
request->hash = mgr_gethash(requestmgr);
ISC_LIST_APPEND(requestmgr->requests, request, link);
UNLOCK(&requestmgr->lock);
2002-11-12 23:58:14 +00:00
result = set_timer(request->timer, timeout, tcp ? 0 : udptimeout);
if (result != ISC_R_SUCCESS) {
goto unlink;
}
request->destaddr = *destaddr;
if (tcp && !connected) {
result = dns_dispatch_connect(request->dispatch, NULL, task,
req_connected, request);
if (result != ISC_R_SUCCESS) {
goto unlink;
}
request->flags |= DNS_REQUEST_F_CONNECTING | DNS_REQUEST_F_TCP;
} else {
result = req_send(request, task, connected ? NULL : destaddr);
if (result != ISC_R_SUCCESS) {
goto unlink;
}
}
req_log(ISC_LOG_DEBUG(3), "dns_request_createraw: request %p", request);
*requestp = request;
return (ISC_R_SUCCESS);
unlink:
LOCK(&requestmgr->lock);
ISC_LIST_UNLINK(requestmgr->requests, request, link);
UNLOCK(&requestmgr->lock);
cleanup:
if (tclone != NULL) {
isc_task_detach(&tclone);
}
2001-01-23 19:50:10 +00:00
req_destroy(request);
req_log(ISC_LOG_DEBUG(3), "dns_request_createraw: failed %s",
dns_result_totext(result));
return (result);
}
2000-02-24 14:31:43 +00:00
isc_result_t
dns_request_create(dns_requestmgr_t *requestmgr, dns_message_t *message,
const isc_sockaddr_t *address, unsigned int options,
dns_tsigkey_t *key, unsigned int timeout, isc_task_t *task,
2020-02-13 14:44:37 -08:00
isc_taskaction_t action, void *arg,
dns_request_t **requestp) {
return (dns_request_createvia(requestmgr, message, NULL, address, -1,
options, key, timeout, 0, 0, task, action,
arg, requestp));
}
isc_result_t
dns_request_createvia(dns_requestmgr_t *requestmgr, dns_message_t *message,
const isc_sockaddr_t *srcaddr,
const isc_sockaddr_t *destaddr, isc_dscp_t dscp,
unsigned int options, dns_tsigkey_t *key,
unsigned int timeout, unsigned int udptimeout,
unsigned int udpretries, isc_task_t *task,
isc_taskaction_t action, void *arg,
2020-02-13 14:44:37 -08:00
dns_request_t **requestp) {
dns_request_t *request = NULL;
isc_task_t *tclone = NULL;
isc_result_t result;
isc_mem_t *mctx;
dns_messageid_t id;
2020-02-13 14:44:37 -08:00
bool tcp;
bool settsigkey = true;
bool connected = false;
2000-02-24 14:31:43 +00:00
REQUIRE(VALID_REQUESTMGR(requestmgr));
REQUIRE(message != NULL);
REQUIRE(destaddr != NULL);
2000-02-24 14:31:43 +00:00
REQUIRE(task != NULL);
REQUIRE(action != NULL);
REQUIRE(requestp != NULL && *requestp == NULL);
REQUIRE(timeout > 0);
2000-03-13 20:43:39 +00:00
mctx = requestmgr->mctx;
2001-01-23 19:50:10 +00:00
req_log(ISC_LOG_DEBUG(3), "dns_request_createvia");
if (srcaddr != NULL &&
isc_sockaddr_pf(srcaddr) != isc_sockaddr_pf(destaddr)) {
return (ISC_R_FAMILYMISMATCH);
}
if (isblackholed(requestmgr->dispatchmgr, destaddr)) {
2001-01-23 07:36:06 +00:00
return (DNS_R_BLACKHOLED);
}
2001-01-23 19:50:10 +00:00
request = NULL;
result = new_request(mctx, &request);
if (result != ISC_R_SUCCESS) {
2001-01-23 19:50:10 +00:00
return (result);
}
2000-03-13 20:43:39 +00:00
2002-11-12 23:58:14 +00:00
if (udptimeout == 0 && udpretries != 0) {
udptimeout = timeout / (udpretries + 1);
if (udptimeout == 0) {
2002-11-12 23:58:14 +00:00
udptimeout = 1;
}
2002-11-12 23:58:14 +00:00
}
request->udpcount = udpretries;
request->dscp = dscp;
2002-11-12 23:58:14 +00:00
2000-03-20 12:22:02 +00:00
/*
* Create timer now. We will set it below once.
*/
result = isc_timer_create(requestmgr->timermgr, isc_timertype_inactive,
NULL, NULL, task, req_timeout, request,
&request->timer);
if (result != ISC_R_SUCCESS) {
2000-03-20 12:22:02 +00:00
goto cleanup;
}
2000-03-20 12:22:02 +00:00
request->event = (dns_requestevent_t *)isc_event_allocate(
mctx, task, DNS_EVENT_REQUESTDONE, action, arg,
sizeof(dns_requestevent_t));
2000-03-13 20:43:39 +00:00
isc_task_attach(task, &tclone);
request->event->ev_sender = task;
2000-03-20 12:22:02 +00:00
request->event->request = request;
request->event->result = ISC_R_FAILURE;
if (key != NULL) {
dns_tsigkey_attach(key, &request->tsigkey);
}
use_tcp:
tcp = ((options & DNS_REQUESTOPT_TCP) != 0);
result = get_dispatch(tcp, false, requestmgr, srcaddr, destaddr, dscp,
&connected, &request->dispatch);
if (result != ISC_R_SUCCESS) {
2001-01-23 07:36:06 +00:00
goto cleanup;
}
2001-01-23 07:36:06 +00:00
result = dns_dispatch_addresponse(
request->dispatch, 0, destaddr, task, req_response, request,
&id, &request->dispentry, requestmgr->socketmgr);
if (result != ISC_R_SUCCESS) {
2000-03-13 20:43:39 +00:00
goto cleanup;
}
2000-03-13 20:43:39 +00:00
2000-03-20 12:22:02 +00:00
message->id = id;
if (settsigkey) {
result = dns_message_settsigkey(message, request->tsigkey);
if (result != ISC_R_SUCCESS) {
goto cleanup;
}
}
result = req_render(message, &request->query, options, mctx);
if (result == DNS_R_USETCP && (options & DNS_REQUESTOPT_TCP) == 0) {
2000-03-20 12:22:02 +00:00
/*
* Try again using TCP.
*/
dns_message_renderreset(message);
dns_dispatch_removeresponse(&request->dispentry, NULL);
2000-03-20 12:22:02 +00:00
dns_dispatch_detach(&request->dispatch);
options |= DNS_REQUESTOPT_TCP;
settsigkey = false;
2000-03-20 12:22:02 +00:00
goto use_tcp;
}
if (result != ISC_R_SUCCESS) {
2000-03-13 20:43:39 +00:00
goto cleanup;
}
result = dns_message_getquerytsig(message, mctx, &request->tsig);
if (result != ISC_R_SUCCESS) {
goto cleanup;
}
2000-03-20 12:22:02 +00:00
LOCK(&requestmgr->lock);
if (requestmgr->exiting) {
UNLOCK(&requestmgr->lock);
result = ISC_R_SHUTTINGDOWN;
goto cleanup;
}
requestmgr_attach(requestmgr, &request->requestmgr);
request->hash = mgr_gethash(requestmgr);
2000-03-20 12:22:02 +00:00
ISC_LIST_APPEND(requestmgr->requests, request, link);
UNLOCK(&requestmgr->lock);
2000-03-13 20:43:39 +00:00
2002-11-12 23:58:14 +00:00
result = set_timer(request->timer, timeout, tcp ? 0 : udptimeout);
if (result != ISC_R_SUCCESS) {
goto unlink;
}
2000-03-20 12:22:02 +00:00
request->destaddr = *destaddr;
if (tcp && !connected) {
result = dns_dispatch_connect(request->dispatch, NULL, task,
req_connected, request);
if (result != ISC_R_SUCCESS) {
goto unlink;
}
request->flags |= DNS_REQUEST_F_CONNECTING | DNS_REQUEST_F_TCP;
2000-03-20 12:22:02 +00:00
} else {
result = req_send(request, task, connected ? NULL : destaddr);
if (result != ISC_R_SUCCESS) {
goto unlink;
}
2000-03-20 12:22:02 +00:00
}
req_log(ISC_LOG_DEBUG(3), "dns_request_createvia: request %p", request);
2000-03-20 12:22:02 +00:00
*requestp = request;
2000-02-24 14:31:43 +00:00
return (ISC_R_SUCCESS);
2000-03-13 20:43:39 +00:00
unlink:
LOCK(&requestmgr->lock);
ISC_LIST_UNLINK(requestmgr->requests, request, link);
UNLOCK(&requestmgr->lock);
cleanup:
if (tclone != NULL) {
2000-03-13 20:43:39 +00:00
isc_task_detach(&tclone);
}
2001-01-23 19:50:10 +00:00
req_destroy(request);
req_log(ISC_LOG_DEBUG(3), "dns_request_createvia: failed %s",
dns_result_totext(result));
2000-03-13 20:43:39 +00:00
return (result);
}
static isc_result_t
req_render(dns_message_t *message, isc_buffer_t **bufferp, unsigned int options,
2020-02-13 14:44:37 -08:00
isc_mem_t *mctx) {
isc_buffer_t *buf1 = NULL;
isc_buffer_t *buf2 = NULL;
isc_result_t result;
isc_region_t r;
bool tcp = false;
dns_compress_t cctx;
2020-02-13 14:44:37 -08:00
bool cleanup_cctx = false;
2000-03-13 20:43:39 +00:00
REQUIRE(bufferp != NULL && *bufferp == NULL);
req_log(ISC_LOG_DEBUG(3), "request_render");
2000-03-20 12:22:02 +00:00
2000-03-13 20:43:39 +00:00
/*
* Create buffer able to hold largest possible message.
*/
isc_buffer_allocate(mctx, &buf1, 65535);
2000-03-13 20:43:39 +00:00
result = dns_compress_init(&cctx, -1, mctx);
if (result != ISC_R_SUCCESS) {
return (result);
}
cleanup_cctx = true;
if ((options & DNS_REQUESTOPT_CASE) != 0) {
dns_compress_setsensitive(&cctx, true);
}
2000-03-13 20:43:39 +00:00
/*
* Render message.
*/
result = dns_message_renderbegin(message, &cctx, buf1);
if (result != ISC_R_SUCCESS) {
2000-03-13 20:43:39 +00:00
goto cleanup;
}
2000-03-13 20:43:39 +00:00
result = dns_message_rendersection(message, DNS_SECTION_QUESTION, 0);
if (result != ISC_R_SUCCESS) {
2000-03-13 20:43:39 +00:00
goto cleanup;
}
2000-03-13 20:43:39 +00:00
result = dns_message_rendersection(message, DNS_SECTION_ANSWER, 0);
if (result != ISC_R_SUCCESS) {
2000-03-13 20:43:39 +00:00
goto cleanup;
}
2000-03-13 20:43:39 +00:00
result = dns_message_rendersection(message, DNS_SECTION_AUTHORITY, 0);
if (result != ISC_R_SUCCESS) {
2000-03-13 20:43:39 +00:00
goto cleanup;
}
2000-03-13 20:43:39 +00:00
result = dns_message_rendersection(message, DNS_SECTION_ADDITIONAL, 0);
if (result != ISC_R_SUCCESS) {
2000-03-13 20:43:39 +00:00
goto cleanup;
}
2000-03-13 20:43:39 +00:00
result = dns_message_renderend(message);
if (result != ISC_R_SUCCESS) {
2000-03-13 20:43:39 +00:00
goto cleanup;
}
2000-03-13 20:43:39 +00:00
dns_compress_invalidate(&cctx);
cleanup_cctx = false;
2000-03-13 20:43:39 +00:00
/*
* Copy rendered message to exact sized buffer.
*/
isc_buffer_usedregion(buf1, &r);
if ((options & DNS_REQUESTOPT_TCP) != 0) {
tcp = true;
} else if (r.length > 512) {
result = DNS_R_USETCP;
goto cleanup;
}
isc_buffer_allocate(mctx, &buf2, r.length + (tcp ? 2 : 0));
if (tcp) {
isc_buffer_putuint16(buf2, (uint16_t)r.length);
}
2000-03-13 20:43:39 +00:00
result = isc_buffer_copyregion(buf2, &r);
if (result != ISC_R_SUCCESS) {
2000-03-13 20:43:39 +00:00
goto cleanup;
}
2000-03-13 20:43:39 +00:00
/*
* Cleanup and return.
*/
isc_buffer_free(&buf1);
*bufferp = buf2;
return (ISC_R_SUCCESS);
cleanup:
2000-03-20 12:22:02 +00:00
dns_message_renderreset(message);
if (buf1 != NULL) {
2000-03-13 20:43:39 +00:00
isc_buffer_free(&buf1);
}
if (buf2 != NULL) {
2000-03-13 20:43:39 +00:00
isc_buffer_free(&buf2);
}
if (cleanup_cctx) {
dns_compress_invalidate(&cctx);
}
2000-03-13 20:43:39 +00:00
return (result);
2000-02-24 14:31:43 +00:00
}
/*
* If this request is no longer waiting for events,
* send the completion event. This will ultimately
* cause the request to be destroyed.
*
* Requires:
* 'request' is locked by the caller.
*/
static void
2020-02-13 14:44:37 -08:00
send_if_done(dns_request_t *request, isc_result_t result) {
if (request->event != NULL && !request->canceling) {
req_sendevent(request, result);
}
}
/*
* Handle the control event.
*/
static void
2020-02-13 14:44:37 -08:00
do_cancel(isc_task_t *task, isc_event_t *event) {
dns_request_t *request = event->ev_arg;
UNUSED(task);
INSIST(event->ev_type == DNS_EVENT_REQUESTCONTROL);
LOCK(&request->requestmgr->locks[request->hash]);
request->canceling = false;
if (!DNS_REQUEST_CANCELED(request)) {
req_cancel(request);
}
send_if_done(request, ISC_R_CANCELED);
2008-06-23 23:47:11 +00:00
UNLOCK(&request->requestmgr->locks[request->hash]);
}
void
2020-02-13 14:44:37 -08:00
dns_request_cancel(dns_request_t *request) {
2000-03-20 12:22:02 +00:00
REQUIRE(VALID_REQUEST(request));
2000-03-13 20:43:39 +00:00
req_log(ISC_LOG_DEBUG(3), "dns_request_cancel: request %p", request);
2000-04-28 22:07:29 +00:00
REQUIRE(VALID_REQUEST(request));
LOCK(&request->requestmgr->locks[request->hash]);
if (!request->canceling && !DNS_REQUEST_CANCELED(request)) {
isc_event_t *ev = &request->ctlevent;
isc_task_send(request->event->ev_sender, &ev);
request->canceling = true;
2000-03-20 12:22:02 +00:00
}
UNLOCK(&request->requestmgr->locks[request->hash]);
2000-02-24 14:31:43 +00:00
}
2000-03-13 20:43:39 +00:00
2000-02-24 14:31:43 +00:00
isc_result_t
dns_request_getresponse(dns_request_t *request, dns_message_t *message,
2020-02-13 14:44:37 -08:00
unsigned int options) {
isc_result_t result;
2000-03-13 20:43:39 +00:00
REQUIRE(VALID_REQUEST(request));
REQUIRE(request->answer != NULL);
req_log(ISC_LOG_DEBUG(3), "dns_request_getresponse: request %p",
request);
result = dns_message_setquerytsig(message, request->tsig);
if (result != ISC_R_SUCCESS) {
return (result);
}
result = dns_message_settsigkey(message, request->tsigkey);
if (result != ISC_R_SUCCESS) {
return (result);
}
result = dns_message_parse(message, request->answer, options);
if (result != ISC_R_SUCCESS) {
return (result);
}
if (request->tsigkey != NULL) {
result = dns_tsig_verify(request->answer, message, NULL, NULL);
}
return (result);
2000-02-24 14:31:43 +00:00
}
2019-07-20 14:35:59 -04:00
isc_buffer_t *
2020-02-13 14:44:37 -08:00
dns_request_getanswer(dns_request_t *request) {
2019-07-20 14:35:59 -04:00
REQUIRE(VALID_REQUEST(request));
return (request->answer);
}
bool
2020-02-13 14:44:37 -08:00
dns_request_usedtcp(dns_request_t *request) {
REQUIRE(VALID_REQUEST(request));
return ((request->flags & DNS_REQUEST_F_TCP) != 0);
}
2000-02-24 14:31:43 +00:00
void
2020-02-13 14:44:37 -08:00
dns_request_destroy(dns_request_t **requestp) {
2000-03-20 12:22:02 +00:00
dns_request_t *request;
2000-03-20 12:22:02 +00:00
REQUIRE(requestp != NULL && VALID_REQUEST(*requestp));
2000-03-20 12:22:02 +00:00
request = *requestp;
*requestp = NULL;
req_log(ISC_LOG_DEBUG(3), "dns_request_destroy: request %p", request);
LOCK(&request->requestmgr->lock);
LOCK(&request->requestmgr->locks[request->hash]);
ISC_LIST_UNLINK(request->requestmgr->requests, request, link);
INSIST(!DNS_REQUEST_CONNECTING(request));
2000-12-31 05:05:34 +00:00
INSIST(!DNS_REQUEST_SENDING(request));
UNLOCK(&request->requestmgr->locks[request->hash]);
UNLOCK(&request->requestmgr->lock);
/*
* These should have been cleaned up by req_cancel() before
* the completion event was sent.
*/
INSIST(!ISC_LINK_LINKED(request, link));
INSIST(request->dispentry == NULL);
INSIST(request->dispatch == NULL);
INSIST(request->timer == NULL);
req_destroy(request);
2000-02-24 14:31:43 +00:00
}
2000-03-20 12:22:02 +00:00
/***
*** Private: request.
***/
2000-03-13 20:43:39 +00:00
static void
2020-02-13 14:44:37 -08:00
req_connected(isc_task_t *task, isc_event_t *event) {
2000-03-13 20:43:39 +00:00
isc_socketevent_t *sevent = (isc_socketevent_t *)event;
2020-02-13 14:44:37 -08:00
isc_result_t result;
dns_request_t *request = event->ev_arg;
2000-03-13 20:43:39 +00:00
REQUIRE(event->ev_type == ISC_SOCKEVENT_CONNECT);
2000-04-28 22:07:29 +00:00
REQUIRE(VALID_REQUEST(request));
2000-03-20 12:22:02 +00:00
REQUIRE(DNS_REQUEST_CONNECTING(request));
req_log(ISC_LOG_DEBUG(3), "req_connected: request %p", request);
2000-03-13 20:43:39 +00:00
LOCK(&request->requestmgr->locks[request->hash]);
2000-03-20 12:22:02 +00:00
request->flags &= ~DNS_REQUEST_F_CONNECTING;
if (DNS_REQUEST_CANCELED(request)) {
/*
* Send delayed event.
*/
if (DNS_REQUEST_TIMEDOUT(request)) {
send_if_done(request, ISC_R_TIMEDOUT);
} else {
send_if_done(request, ISC_R_CANCELED);
}
2000-03-20 12:22:02 +00:00
} else {
dns_dispatch_starttcp(request->dispatch);
2000-03-20 12:22:02 +00:00
result = sevent->result;
if (result == ISC_R_SUCCESS) {
2000-03-20 12:22:02 +00:00
result = req_send(request, task, NULL);
}
2001-01-03 23:14:53 +00:00
if (result != ISC_R_SUCCESS) {
req_cancel(request);
send_if_done(request, ISC_R_CANCELED);
}
2000-03-20 12:22:02 +00:00
}
UNLOCK(&request->requestmgr->locks[request->hash]);
2000-03-20 12:22:02 +00:00
isc_event_free(&event);
}
static void
2020-02-13 14:44:37 -08:00
req_senddone(isc_task_t *task, isc_event_t *event) {
2000-03-20 12:22:02 +00:00
isc_socketevent_t *sevent = (isc_socketevent_t *)event;
2020-02-13 14:44:37 -08:00
dns_request_t *request = event->ev_arg;
2000-03-20 12:22:02 +00:00
REQUIRE(event->ev_type == ISC_SOCKEVENT_SENDDONE);
2000-04-28 22:07:29 +00:00
REQUIRE(VALID_REQUEST(request));
2000-12-31 05:05:34 +00:00
REQUIRE(DNS_REQUEST_SENDING(request));
2000-03-20 12:22:02 +00:00
req_log(ISC_LOG_DEBUG(3), "req_senddone: request %p", request);
2000-08-11 16:47:33 +00:00
UNUSED(task);
2000-03-13 20:43:39 +00:00
2000-12-31 05:05:34 +00:00
LOCK(&request->requestmgr->locks[request->hash]);
request->flags &= ~DNS_REQUEST_F_SENDING;
if (DNS_REQUEST_CANCELED(request)) {
/*
* Send delayed event.
*/
if (DNS_REQUEST_TIMEDOUT(request)) {
send_if_done(request, ISC_R_TIMEDOUT);
} else {
send_if_done(request, ISC_R_CANCELED);
}
2000-12-31 05:05:34 +00:00
} else if (sevent->result != ISC_R_SUCCESS) {
req_cancel(request);
send_if_done(request, ISC_R_CANCELED);
2000-12-31 05:05:34 +00:00
}
UNLOCK(&request->requestmgr->locks[request->hash]);
2000-03-13 20:43:39 +00:00
isc_event_free(&event);
}
static void
2020-02-13 14:44:37 -08:00
req_response(isc_task_t *task, isc_event_t *event) {
isc_result_t result;
dns_request_t *request = event->ev_arg;
2000-03-13 20:43:39 +00:00
dns_dispatchevent_t *devent = (dns_dispatchevent_t *)event;
2020-02-13 14:44:37 -08:00
isc_region_t r;
2000-03-13 20:43:39 +00:00
REQUIRE(VALID_REQUEST(request));
REQUIRE(event->ev_type == DNS_EVENT_DISPATCH);
2000-03-13 20:43:39 +00:00
2000-03-20 12:22:02 +00:00
UNUSED(task);
req_log(ISC_LOG_DEBUG(3), "req_response: request %p: %s", request,
dns_result_totext(devent->result));
2000-03-20 12:22:02 +00:00
LOCK(&request->requestmgr->locks[request->hash]);
2000-03-20 12:22:02 +00:00
result = devent->result;
if (result != ISC_R_SUCCESS) {
2000-03-13 20:43:39 +00:00
goto done;
}
2000-03-13 20:43:39 +00:00
/*
2000-03-20 12:22:02 +00:00
* Copy buffer to request.
2000-03-13 20:43:39 +00:00
*/
isc_buffer_usedregion(&devent->buffer, &r);
isc_buffer_allocate(request->mctx, &request->answer, r.length);
2000-03-20 12:22:02 +00:00
result = isc_buffer_copyregion(request->answer, &r);
if (result != ISC_R_SUCCESS) {
2000-03-20 12:22:02 +00:00
isc_buffer_free(&request->answer);
}
done:
2000-03-20 12:22:02 +00:00
/*
* Cleanup.
*/
dns_dispatch_removeresponse(&request->dispentry, &devent);
2000-03-20 12:22:02 +00:00
req_cancel(request);
/*
* Send completion event.
*/
send_if_done(request, result);
UNLOCK(&request->requestmgr->locks[request->hash]);
2000-03-13 20:43:39 +00:00
}
static void
2020-02-13 14:44:37 -08:00
req_timeout(isc_task_t *task, isc_event_t *event) {
dns_request_t *request = event->ev_arg;
2020-02-13 14:44:37 -08:00
isc_result_t result;
2000-04-28 22:07:29 +00:00
REQUIRE(VALID_REQUEST(request));
req_log(ISC_LOG_DEBUG(3), "req_timeout: request %p", request);
2000-03-20 12:22:02 +00:00
UNUSED(task);
LOCK(&request->requestmgr->locks[request->hash]);
if (event->ev_type == ISC_TIMEREVENT_TICK && request->udpcount-- != 0) {
if (!DNS_REQUEST_SENDING(request)) {
result = req_send(request, task, &request->destaddr);
if (result != ISC_R_SUCCESS) {
req_cancel(request);
send_if_done(request, result);
}
}
} else {
request->flags |= DNS_REQUEST_F_TIMEDOUT;
req_cancel(request);
send_if_done(request, ISC_R_TIMEDOUT);
}
UNLOCK(&request->requestmgr->locks[request->hash]);
2000-03-13 20:43:39 +00:00
isc_event_free(&event);
}
2000-03-20 12:22:02 +00:00
static void
2020-02-13 14:44:37 -08:00
req_sendevent(dns_request_t *request, isc_result_t result) {
2000-03-20 12:22:02 +00:00
isc_task_t *task;
2000-04-28 22:07:29 +00:00
REQUIRE(VALID_REQUEST(request));
req_log(ISC_LOG_DEBUG(3), "req_sendevent: request %p", request);
/*
* Lock held by caller.
*/
task = request->event->ev_sender;
request->event->ev_sender = request;
2000-03-20 12:22:02 +00:00
request->event->result = result;
isc_task_sendanddetach(&task, (isc_event_t **)&request->event);
}
static void
2020-02-13 14:44:37 -08:00
req_destroy(dns_request_t *request) {
2000-04-28 22:07:29 +00:00
REQUIRE(VALID_REQUEST(request));
req_log(ISC_LOG_DEBUG(3), "req_destroy: request %p", request);
2000-03-20 12:22:02 +00:00
request->magic = 0;
if (request->query != NULL) {
2000-03-20 12:22:02 +00:00
isc_buffer_free(&request->query);
}
if (request->answer != NULL) {
2000-03-20 12:22:02 +00:00
isc_buffer_free(&request->answer);
}
if (request->event != NULL) {
2000-03-20 12:22:02 +00:00
isc_event_free((isc_event_t **)&request->event);
}
if (request->dispentry != NULL) {
dns_dispatch_removeresponse(&request->dispentry, NULL);
}
if (request->dispatch != NULL) {
2000-03-20 12:22:02 +00:00
dns_dispatch_detach(&request->dispatch);
}
if (request->timer != NULL) {
2000-03-20 12:22:02 +00:00
isc_timer_detach(&request->timer);
}
if (request->tsig != NULL) {
isc_buffer_free(&request->tsig);
}
if (request->tsigkey != NULL) {
dns_tsigkey_detach(&request->tsigkey);
}
if (request->requestmgr != NULL) {
2001-01-23 19:50:10 +00:00
requestmgr_detach(&request->requestmgr);
}
isc_mem_putanddetach(&request->mctx, request, sizeof(*request));
2000-03-20 12:22:02 +00:00
}
/*
* Stop the current request. Must be called from the request's task.
*/
2000-03-20 12:22:02 +00:00
static void
2020-02-13 14:44:37 -08:00
req_cancel(dns_request_t *request) {
2000-04-28 22:07:29 +00:00
REQUIRE(VALID_REQUEST(request));
req_log(ISC_LOG_DEBUG(3), "req_cancel: request %p", request);
/*
* Lock held by caller.
*/
2000-03-20 12:22:02 +00:00
request->flags |= DNS_REQUEST_F_CANCELED;
if (request->timer != NULL) {
2000-03-20 12:22:02 +00:00
isc_timer_detach(&request->timer);
}
if (request->dispentry != NULL) {
dns_dispatch_cancel(NULL, request->dispentry,
DNS_REQUEST_SENDING(request),
DNS_REQUEST_CONNECTING(request));
dns_dispatch_removeresponse(&request->dispentry, NULL);
}
dns_dispatch_detach(&request->dispatch);
2000-03-20 12:22:02 +00:00
}
static void
2020-02-13 14:44:37 -08:00
req_log(int level, const char *fmt, ...) {
va_list ap;
va_start(ap, fmt);
isc_log_vwrite(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_REQUEST,
level, fmt, ap);
va_end(ap);
}