| File: | build-scan/../src/resolve/resolved-dns-stream.c |
| Warning: | line 552, column 24 Potential leak of memory pointed to by 's' |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* SPDX-License-Identifier: LGPL-2.1+ */ | |||
| 2 | ||||
| 3 | #include <netinet/tcp.h> | |||
| 4 | ||||
| 5 | #include "alloc-util.h" | |||
| 6 | #include "fd-util.h" | |||
| 7 | #include "io-util.h" | |||
| 8 | #include "missing.h" | |||
| 9 | #include "resolved-dns-stream.h" | |||
| 10 | ||||
| 11 | #define DNS_STREAM_TIMEOUT_USEC(10 * ((usec_t) 1000000ULL)) (10 * USEC_PER_SEC((usec_t) 1000000ULL)) | |||
| 12 | #define DNS_STREAMS_MAX128 128 | |||
| 13 | ||||
| 14 | #define WRITE_TLS_DATA1 1 | |||
| 15 | ||||
| 16 | static void dns_stream_stop(DnsStream *s) { | |||
| 17 | assert(s)do { if ((__builtin_expect(!!(!(s)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s"), "../src/resolve/resolved-dns-stream.c" , 17, __PRETTY_FUNCTION__); } while (0); | |||
| 18 | ||||
| 19 | s->io_event_source = sd_event_source_unref(s->io_event_source); | |||
| 20 | s->timeout_event_source = sd_event_source_unref(s->timeout_event_source); | |||
| 21 | s->fd = safe_close(s->fd); | |||
| 22 | } | |||
| 23 | ||||
| 24 | static int dns_stream_update_io(DnsStream *s) { | |||
| 25 | int f = 0; | |||
| 26 | ||||
| 27 | assert(s)do { if ((__builtin_expect(!!(!(s)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s"), "../src/resolve/resolved-dns-stream.c" , 27, __PRETTY_FUNCTION__); } while (0); | |||
| 28 | ||||
| 29 | if (s->write_packet && s->n_written < sizeof(s->write_size) + s->write_packet->size) | |||
| 30 | f |= EPOLLOUTEPOLLOUT; | |||
| 31 | else if (!ordered_set_isempty(s->write_queue)) { | |||
| 32 | dns_packet_unref(s->write_packet); | |||
| 33 | s->write_packet = ordered_set_steal_first(s->write_queue); | |||
| 34 | s->write_size = htobe16(s->write_packet->size); | |||
| 35 | s->n_written = 0; | |||
| 36 | f |= EPOLLOUTEPOLLOUT; | |||
| 37 | } | |||
| 38 | if (!s->read_packet || s->n_read < sizeof(s->read_size) + s->read_packet->size) | |||
| 39 | f |= EPOLLINEPOLLIN; | |||
| 40 | ||||
| 41 | return sd_event_source_set_io_events(s->io_event_source, f); | |||
| 42 | } | |||
| 43 | ||||
| 44 | static int dns_stream_complete(DnsStream *s, int error) { | |||
| 45 | assert(s)do { if ((__builtin_expect(!!(!(s)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s"), "../src/resolve/resolved-dns-stream.c" , 45, __PRETTY_FUNCTION__); } while (0); | |||
| 46 | ||||
| 47 | #if ENABLE_DNS_OVER_TLS1 | |||
| 48 | if (s->tls_session && IN_SET(error, ETIMEDOUT, 0)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){110, 0})/sizeof(int)]; switch(error) { case 110: case 0: _found = 1; break; default: break; } _found; })) { | |||
| 49 | int r; | |||
| 50 | ||||
| 51 | r = gnutls_bye(s->tls_session, GNUTLS_SHUT_RDWR); | |||
| 52 | if (r == GNUTLS_E_AGAIN-28 && !s->tls_bye) { | |||
| 53 | dns_stream_ref(s); /* keep reference for closing TLS session */ | |||
| 54 | s->tls_bye = true1; | |||
| 55 | } else | |||
| 56 | dns_stream_stop(s); | |||
| 57 | } else | |||
| 58 | #endif | |||
| 59 | dns_stream_stop(s); | |||
| 60 | ||||
| 61 | if (s->complete) | |||
| 62 | s->complete(s, error); | |||
| 63 | else /* the default action if no completion function is set is to close the stream */ | |||
| 64 | dns_stream_unref(s); | |||
| 65 | ||||
| 66 | return 0; | |||
| 67 | } | |||
| 68 | ||||
| 69 | static int dns_stream_identify(DnsStream *s) { | |||
| 70 | union { | |||
| 71 | struct cmsghdr header; /* For alignment */ | |||
| 72 | uint8_t buffer[CMSG_SPACE(MAXSIZE(struct in_pktinfo, struct in6_pktinfo))(((((sizeof(union __attribute__ ((packed)) { typeof(struct in_pktinfo ) a; typeof(struct in6_pktinfo) b; }))) + sizeof (size_t) - 1 ) & (size_t) ~(sizeof (size_t) - 1)) + (((sizeof (struct cmsghdr )) + sizeof (size_t) - 1) & (size_t) ~(sizeof (size_t) - 1 ))) | |||
| 73 | + CMSG_SPACE(int)((((int) + sizeof (size_t) - 1) & (size_t) ~(sizeof (size_t ) - 1)) + (((sizeof (struct cmsghdr)) + sizeof (size_t) - 1) & (size_t) ~(sizeof (size_t) - 1))) + /* for the TTL */ | |||
| 74 | + EXTRA_CMSG_SPACE1024 /* kernel appears to require extra space */]; | |||
| 75 | } control; | |||
| 76 | struct msghdr mh = {}; | |||
| 77 | struct cmsghdr *cmsg; | |||
| 78 | socklen_t sl; | |||
| 79 | int r; | |||
| 80 | ||||
| 81 | assert(s)do { if ((__builtin_expect(!!(!(s)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s"), "../src/resolve/resolved-dns-stream.c" , 81, __PRETTY_FUNCTION__); } while (0); | |||
| 82 | ||||
| 83 | if (s->identified) | |||
| 84 | return 0; | |||
| 85 | ||||
| 86 | /* Query the local side */ | |||
| 87 | s->local_salen = sizeof(s->local); | |||
| 88 | r = getsockname(s->fd, &s->local.sa, &s->local_salen); | |||
| 89 | if (r < 0) | |||
| 90 | return -errno(*__errno_location ()); | |||
| 91 | if (s->local.sa.sa_family == AF_INET610 && s->ifindex <= 0) | |||
| 92 | s->ifindex = s->local.in6.sin6_scope_id; | |||
| 93 | ||||
| 94 | /* Query the remote side */ | |||
| 95 | s->peer_salen = sizeof(s->peer); | |||
| 96 | r = getpeername(s->fd, &s->peer.sa, &s->peer_salen); | |||
| 97 | if (r < 0) | |||
| 98 | return -errno(*__errno_location ()); | |||
| 99 | if (s->peer.sa.sa_family == AF_INET610 && s->ifindex <= 0) | |||
| 100 | s->ifindex = s->peer.in6.sin6_scope_id; | |||
| 101 | ||||
| 102 | /* Check consistency */ | |||
| 103 | assert(s->peer.sa.sa_family == s->local.sa.sa_family)do { if ((__builtin_expect(!!(!(s->peer.sa.sa_family == s-> local.sa.sa_family)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("s->peer.sa.sa_family == s->local.sa.sa_family"), "../src/resolve/resolved-dns-stream.c" , 103, __PRETTY_FUNCTION__); } while (0); | |||
| 104 | assert(IN_SET(s->peer.sa.sa_family, AF_INET, AF_INET6))do { if ((__builtin_expect(!!(!(({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended[20 - sizeof((int[]){2, 10})/sizeof(int)]; switch(s->peer.sa. sa_family) { case 2: case 10: _found = 1; break; default: break ; } _found; }))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("IN_SET(s->peer.sa.sa_family, AF_INET, AF_INET6)"), "../src/resolve/resolved-dns-stream.c" , 104, __PRETTY_FUNCTION__); } while (0); | |||
| 105 | ||||
| 106 | /* Query connection meta information */ | |||
| 107 | sl = sizeof(control); | |||
| 108 | if (s->peer.sa.sa_family == AF_INET2) { | |||
| 109 | r = getsockopt(s->fd, IPPROTO_IPIPPROTO_IP, IP_PKTOPTIONS9, &control, &sl); | |||
| 110 | if (r < 0) | |||
| 111 | return -errno(*__errno_location ()); | |||
| 112 | } else if (s->peer.sa.sa_family == AF_INET610) { | |||
| 113 | ||||
| 114 | r = getsockopt(s->fd, IPPROTO_IPV6IPPROTO_IPV6, IPV6_2292PKTOPTIONS6, &control, &sl); | |||
| 115 | if (r < 0) | |||
| 116 | return -errno(*__errno_location ()); | |||
| 117 | } else | |||
| 118 | return -EAFNOSUPPORT97; | |||
| 119 | ||||
| 120 | mh.msg_control = &control; | |||
| 121 | mh.msg_controllen = sl; | |||
| 122 | ||||
| 123 | CMSG_FOREACH(cmsg, &mh)for ((cmsg) = ((size_t) (&mh)->msg_controllen >= sizeof (struct cmsghdr) ? (struct cmsghdr *) (&mh)->msg_control : (struct cmsghdr *) 0); (cmsg); (cmsg) = __cmsg_nxthdr ((& mh), (cmsg))) { | |||
| 124 | ||||
| 125 | if (cmsg->cmsg_level == IPPROTO_IPV6IPPROTO_IPV6) { | |||
| 126 | assert(s->peer.sa.sa_family == AF_INET6)do { if ((__builtin_expect(!!(!(s->peer.sa.sa_family == 10 )),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("s->peer.sa.sa_family == AF_INET6" ), "../src/resolve/resolved-dns-stream.c", 126, __PRETTY_FUNCTION__ ); } while (0); | |||
| 127 | ||||
| 128 | switch (cmsg->cmsg_type) { | |||
| 129 | ||||
| 130 | case IPV6_PKTINFO50: { | |||
| 131 | struct in6_pktinfo *i = (struct in6_pktinfo*) CMSG_DATA(cmsg)((cmsg)->__cmsg_data); | |||
| 132 | ||||
| 133 | if (s->ifindex <= 0) | |||
| 134 | s->ifindex = i->ipi6_ifindex; | |||
| 135 | break; | |||
| 136 | } | |||
| 137 | ||||
| 138 | case IPV6_HOPLIMIT52: | |||
| 139 | s->ttl = *(int *) CMSG_DATA(cmsg)((cmsg)->__cmsg_data); | |||
| 140 | break; | |||
| 141 | } | |||
| 142 | ||||
| 143 | } else if (cmsg->cmsg_level == IPPROTO_IPIPPROTO_IP) { | |||
| 144 | assert(s->peer.sa.sa_family == AF_INET)do { if ((__builtin_expect(!!(!(s->peer.sa.sa_family == 2) ),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("s->peer.sa.sa_family == AF_INET" ), "../src/resolve/resolved-dns-stream.c", 144, __PRETTY_FUNCTION__ ); } while (0); | |||
| 145 | ||||
| 146 | switch (cmsg->cmsg_type) { | |||
| 147 | ||||
| 148 | case IP_PKTINFO8: { | |||
| 149 | struct in_pktinfo *i = (struct in_pktinfo*) CMSG_DATA(cmsg)((cmsg)->__cmsg_data); | |||
| 150 | ||||
| 151 | if (s->ifindex <= 0) | |||
| 152 | s->ifindex = i->ipi_ifindex; | |||
| 153 | break; | |||
| 154 | } | |||
| 155 | ||||
| 156 | case IP_TTL2: | |||
| 157 | s->ttl = *(int *) CMSG_DATA(cmsg)((cmsg)->__cmsg_data); | |||
| 158 | break; | |||
| 159 | } | |||
| 160 | } | |||
| 161 | } | |||
| 162 | ||||
| 163 | /* The Linux kernel sets the interface index to the loopback | |||
| 164 | * device if the connection came from the local host since it | |||
| 165 | * avoids the routing table in such a case. Let's unset the | |||
| 166 | * interface index in such a case. */ | |||
| 167 | if (s->ifindex == LOOPBACK_IFINDEX1) | |||
| 168 | s->ifindex = 0; | |||
| 169 | ||||
| 170 | /* If we don't know the interface index still, we look for the | |||
| 171 | * first local interface with a matching address. Yuck! */ | |||
| 172 | if (s->ifindex <= 0) | |||
| 173 | s->ifindex = manager_find_ifindex(s->manager, s->local.sa.sa_family, s->local.sa.sa_family == AF_INET2 ? (union in_addr_union*) &s->local.in.sin_addr : (union in_addr_union*) &s->local.in6.sin6_addr); | |||
| 174 | ||||
| 175 | if (s->protocol == DNS_PROTOCOL_LLMNR && s->ifindex > 0) { | |||
| 176 | uint32_t ifindex = htobe32(s->ifindex); | |||
| 177 | ||||
| 178 | /* Make sure all packets for this connection are sent on the same interface */ | |||
| 179 | if (s->local.sa.sa_family == AF_INET2) { | |||
| 180 | r = setsockopt(s->fd, IPPROTO_IPIPPROTO_IP, IP_UNICAST_IF50, &ifindex, sizeof(ifindex)); | |||
| 181 | if (r < 0) | |||
| 182 | log_debug_errno(errno, "Failed to invoke IP_UNICAST_IF: %m")({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/resolve/resolved-dns-stream.c", 182 , __func__, "Failed to invoke IP_UNICAST_IF: %m") : -abs(_e); }); | |||
| 183 | } else if (s->local.sa.sa_family == AF_INET610) { | |||
| 184 | r = setsockopt(s->fd, IPPROTO_IPV6IPPROTO_IPV6, IPV6_UNICAST_IF76, &ifindex, sizeof(ifindex)); | |||
| 185 | if (r < 0) | |||
| 186 | log_debug_errno(errno, "Failed to invoke IPV6_UNICAST_IF: %m")({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/resolve/resolved-dns-stream.c", 186 , __func__, "Failed to invoke IPV6_UNICAST_IF: %m") : -abs(_e ); }); | |||
| 187 | } | |||
| 188 | } | |||
| 189 | ||||
| 190 | s->identified = true1; | |||
| 191 | ||||
| 192 | return 0; | |||
| 193 | } | |||
| 194 | ||||
| 195 | static ssize_t dns_stream_writev(DnsStream *s, const struct iovec *iov, size_t iovcnt, int flags) { | |||
| 196 | ssize_t r; | |||
| 197 | ||||
| 198 | assert(s)do { if ((__builtin_expect(!!(!(s)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s"), "../src/resolve/resolved-dns-stream.c" , 198, __PRETTY_FUNCTION__); } while (0); | |||
| 199 | assert(iov)do { if ((__builtin_expect(!!(!(iov)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("iov"), "../src/resolve/resolved-dns-stream.c" , 199, __PRETTY_FUNCTION__); } while (0); | |||
| 200 | ||||
| 201 | #if ENABLE_DNS_OVER_TLS1 | |||
| 202 | if (s->tls_session && !(flags & WRITE_TLS_DATA1)) { | |||
| 203 | ssize_t ss; | |||
| 204 | size_t i; | |||
| 205 | ||||
| 206 | r = 0; | |||
| 207 | for (i = 0; i < iovcnt; i++) { | |||
| 208 | ss = gnutls_record_send(s->tls_session, iov[i].iov_base, iov[i].iov_len); | |||
| 209 | if (ss < 0) { | |||
| 210 | switch(ss) { | |||
| 211 | ||||
| 212 | case GNUTLS_E_INTERRUPTED-52: | |||
| 213 | return -EINTR4; | |||
| 214 | case GNUTLS_E_AGAIN-28: | |||
| 215 | return -EAGAIN11; | |||
| 216 | default: | |||
| 217 | log_debug("Failed to invoke gnutls_record_send: %s", gnutls_strerror(ss))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-stream.c", 217, __func__, "Failed to invoke gnutls_record_send: %s" , gnutls_strerror(ss)) : -abs(_e); }); | |||
| 218 | return -EIO5; | |||
| 219 | } | |||
| 220 | } | |||
| 221 | ||||
| 222 | r += ss; | |||
| 223 | if (ss != (ssize_t) iov[i].iov_len) | |||
| 224 | continue; | |||
| 225 | } | |||
| 226 | } else | |||
| 227 | #endif | |||
| 228 | if (s->tfo_salen > 0) { | |||
| 229 | struct msghdr hdr = { | |||
| 230 | .msg_iov = (struct iovec*) iov, | |||
| 231 | .msg_iovlen = iovcnt, | |||
| 232 | .msg_name = &s->tfo_address.sa, | |||
| 233 | .msg_namelen = s->tfo_salen | |||
| 234 | }; | |||
| 235 | ||||
| 236 | r = sendmsg(s->fd, &hdr, MSG_FASTOPENMSG_FASTOPEN); | |||
| 237 | if (r < 0) { | |||
| 238 | if (errno(*__errno_location ()) == EOPNOTSUPP95) { | |||
| 239 | s->tfo_salen = 0; | |||
| 240 | r = connect(s->fd, &s->tfo_address.sa, s->tfo_salen); | |||
| 241 | if (r < 0) | |||
| 242 | return -errno(*__errno_location ()); | |||
| 243 | ||||
| 244 | r = -EAGAIN11; | |||
| 245 | } else if (errno(*__errno_location ()) == EINPROGRESS115) | |||
| 246 | r = -EAGAIN11; | |||
| 247 | } else | |||
| 248 | s->tfo_salen = 0; /* connection is made */ | |||
| 249 | } else { | |||
| 250 | r = writev(s->fd, iov, iovcnt); | |||
| 251 | if (r < 0) | |||
| 252 | r = -errno(*__errno_location ()); | |||
| 253 | } | |||
| 254 | ||||
| 255 | return r; | |||
| 256 | } | |||
| 257 | ||||
| 258 | static ssize_t dns_stream_read(DnsStream *s, void *buf, size_t count) { | |||
| 259 | ssize_t ss; | |||
| 260 | ||||
| 261 | #if ENABLE_DNS_OVER_TLS1 | |||
| 262 | if (s->tls_session) { | |||
| 263 | ss = gnutls_record_recv(s->tls_session, buf, count); | |||
| 264 | if (ss < 0) { | |||
| 265 | switch(ss) { | |||
| 266 | ||||
| 267 | case GNUTLS_E_INTERRUPTED-52: | |||
| 268 | return -EINTR4; | |||
| 269 | case GNUTLS_E_AGAIN-28: | |||
| 270 | return -EAGAIN11; | |||
| 271 | default: | |||
| 272 | log_debug("Failed to invoke gnutls_record_send: %s", gnutls_strerror(ss))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-dns-stream.c", 272, __func__, "Failed to invoke gnutls_record_send: %s" , gnutls_strerror(ss)) : -abs(_e); }); | |||
| 273 | return -EIO5; | |||
| 274 | } | |||
| 275 | } else if (s->on_connection) { | |||
| 276 | int r; | |||
| 277 | ||||
| 278 | r = s->on_connection(s); | |||
| 279 | s->on_connection = NULL((void*)0); /* only call once */ | |||
| 280 | if (r < 0) | |||
| 281 | return r; | |||
| 282 | } | |||
| 283 | } else | |||
| 284 | #endif | |||
| 285 | { | |||
| 286 | ss = read(s->fd, buf, count); | |||
| 287 | if (ss < 0) | |||
| 288 | ss = -errno(*__errno_location ()); | |||
| 289 | } | |||
| 290 | ||||
| 291 | return ss; | |||
| 292 | } | |||
| 293 | ||||
| 294 | #if ENABLE_DNS_OVER_TLS1 | |||
| 295 | static ssize_t dns_stream_tls_writev(gnutls_transport_ptr_t p, const giovec_t * iov, int iovcnt) { | |||
| 296 | int r; | |||
| 297 | ||||
| 298 | assert(p)do { if ((__builtin_expect(!!(!(p)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("p"), "../src/resolve/resolved-dns-stream.c" , 298, __PRETTY_FUNCTION__); } while (0); | |||
| 299 | ||||
| 300 | r = dns_stream_writev((DnsStream*) p, (struct iovec*) iov, iovcnt, WRITE_TLS_DATA1); | |||
| 301 | if (r < 0) { | |||
| 302 | errno(*__errno_location ()) = -r; | |||
| 303 | return -1; | |||
| 304 | } | |||
| 305 | ||||
| 306 | return r; | |||
| 307 | } | |||
| 308 | #endif | |||
| 309 | ||||
| 310 | static int on_stream_timeout(sd_event_source *es, usec_t usec, void *userdata) { | |||
| 311 | DnsStream *s = userdata; | |||
| 312 | ||||
| 313 | assert(s)do { if ((__builtin_expect(!!(!(s)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s"), "../src/resolve/resolved-dns-stream.c" , 313, __PRETTY_FUNCTION__); } while (0); | |||
| 314 | ||||
| 315 | return dns_stream_complete(s, ETIMEDOUT110); | |||
| 316 | } | |||
| 317 | ||||
| 318 | static int on_stream_io(sd_event_source *es, int fd, uint32_t revents, void *userdata) { | |||
| 319 | DnsStream *s = userdata; | |||
| 320 | int r; | |||
| 321 | ||||
| 322 | assert(s)do { if ((__builtin_expect(!!(!(s)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s"), "../src/resolve/resolved-dns-stream.c" , 322, __PRETTY_FUNCTION__); } while (0); | |||
| 323 | ||||
| 324 | #if ENABLE_DNS_OVER_TLS1 | |||
| 325 | if (s->tls_bye) { | |||
| 326 | assert(s->tls_session)do { if ((__builtin_expect(!!(!(s->tls_session)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s->tls_session"), "../src/resolve/resolved-dns-stream.c" , 326, __PRETTY_FUNCTION__); } while (0); | |||
| 327 | ||||
| 328 | r = gnutls_bye(s->tls_session, GNUTLS_SHUT_RDWR); | |||
| 329 | if (r != GNUTLS_E_AGAIN-28) { | |||
| 330 | s->tls_bye = false0; | |||
| 331 | dns_stream_unref(s); | |||
| 332 | } | |||
| 333 | ||||
| 334 | return 0; | |||
| 335 | } | |||
| 336 | ||||
| 337 | if (s->tls_handshake < 0) { | |||
| 338 | assert(s->tls_session)do { if ((__builtin_expect(!!(!(s->tls_session)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s->tls_session"), "../src/resolve/resolved-dns-stream.c" , 338, __PRETTY_FUNCTION__); } while (0); | |||
| 339 | ||||
| 340 | s->tls_handshake = gnutls_handshake(s->tls_session); | |||
| 341 | if (s->tls_handshake >= 0) { | |||
| 342 | if (s->on_connection && !(gnutls_session_get_flags(s->tls_session) & GNUTLS_SFLAGS_FALSE_START)) { | |||
| 343 | r = s->on_connection(s); | |||
| 344 | s->on_connection = NULL((void*)0); /* only call once */ | |||
| 345 | if (r < 0) | |||
| 346 | return r; | |||
| 347 | } | |||
| 348 | } else { | |||
| 349 | if (gnutls_error_is_fatal(s->tls_handshake)) | |||
| 350 | return dns_stream_complete(s, ECONNREFUSED111); | |||
| 351 | else | |||
| 352 | return 0; | |||
| 353 | } | |||
| 354 | ||||
| 355 | } | |||
| 356 | #endif | |||
| 357 | ||||
| 358 | /* only identify after connecting */ | |||
| 359 | if (s->tfo_salen == 0) { | |||
| 360 | r = dns_stream_identify(s); | |||
| 361 | if (r < 0) | |||
| 362 | return dns_stream_complete(s, -r); | |||
| 363 | } | |||
| 364 | ||||
| 365 | if ((revents & EPOLLOUTEPOLLOUT) && | |||
| 366 | s->write_packet && | |||
| 367 | s->n_written < sizeof(s->write_size) + s->write_packet->size) { | |||
| 368 | ||||
| 369 | struct iovec iov[2]; | |||
| 370 | ssize_t ss; | |||
| 371 | ||||
| 372 | iov[0].iov_base = &s->write_size; | |||
| 373 | iov[0].iov_len = sizeof(s->write_size); | |||
| 374 | iov[1].iov_base = DNS_PACKET_DATA(s->write_packet); | |||
| 375 | iov[1].iov_len = s->write_packet->size; | |||
| 376 | ||||
| 377 | IOVEC_INCREMENT(iov, 2, s->n_written); | |||
| 378 | ||||
| 379 | ss = dns_stream_writev(s, iov, 2, 0); | |||
| 380 | if (ss < 0) { | |||
| 381 | if (!IN_SET(-ss, EINTR, EAGAIN)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){4, 11})/sizeof(int)]; switch(-ss) { case 4: case 11: _found = 1; break; default: break; } _found; })) | |||
| 382 | return dns_stream_complete(s, -ss); | |||
| 383 | } else | |||
| 384 | s->n_written += ss; | |||
| 385 | ||||
| 386 | /* Are we done? If so, disable the event source for EPOLLOUT */ | |||
| 387 | if (s->n_written >= sizeof(s->write_size) + s->write_packet->size) { | |||
| 388 | r = dns_stream_update_io(s); | |||
| 389 | if (r < 0) | |||
| 390 | return dns_stream_complete(s, -r); | |||
| 391 | } | |||
| 392 | } | |||
| 393 | ||||
| 394 | if ((revents & (EPOLLINEPOLLIN|EPOLLHUPEPOLLHUP|EPOLLRDHUPEPOLLRDHUP)) && | |||
| 395 | (!s->read_packet || | |||
| 396 | s->n_read < sizeof(s->read_size) + s->read_packet->size)) { | |||
| 397 | ||||
| 398 | if (s->n_read < sizeof(s->read_size)) { | |||
| 399 | ssize_t ss; | |||
| 400 | ||||
| 401 | ss = dns_stream_read(s, (uint8_t*) &s->read_size + s->n_read, sizeof(s->read_size) - s->n_read); | |||
| 402 | if (ss < 0) { | |||
| 403 | if (!IN_SET(-ss, EINTR, EAGAIN)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){4, 11})/sizeof(int)]; switch(-ss) { case 4: case 11: _found = 1; break; default: break; } _found; })) | |||
| 404 | return dns_stream_complete(s, -ss); | |||
| 405 | } else if (ss == 0) | |||
| 406 | return dns_stream_complete(s, ECONNRESET104); | |||
| 407 | else | |||
| 408 | s->n_read += ss; | |||
| 409 | } | |||
| 410 | ||||
| 411 | if (s->n_read >= sizeof(s->read_size)) { | |||
| 412 | ||||
| 413 | if (be16toh(s->read_size) < DNS_PACKET_HEADER_SIZEsizeof(DnsPacketHeader)) | |||
| 414 | return dns_stream_complete(s, EBADMSG74); | |||
| 415 | ||||
| 416 | if (s->n_read < sizeof(s->read_size) + be16toh(s->read_size)) { | |||
| 417 | ssize_t ss; | |||
| 418 | ||||
| 419 | if (!s->read_packet) { | |||
| 420 | r = dns_packet_new(&s->read_packet, s->protocol, be16toh(s->read_size), DNS_PACKET_SIZE_MAX0xFFFFu); | |||
| 421 | if (r < 0) | |||
| 422 | return dns_stream_complete(s, -r); | |||
| 423 | ||||
| 424 | s->read_packet->size = be16toh(s->read_size); | |||
| 425 | s->read_packet->ipproto = IPPROTO_TCPIPPROTO_TCP; | |||
| 426 | s->read_packet->family = s->peer.sa.sa_family; | |||
| 427 | s->read_packet->ttl = s->ttl; | |||
| 428 | s->read_packet->ifindex = s->ifindex; | |||
| 429 | ||||
| 430 | if (s->read_packet->family == AF_INET2) { | |||
| 431 | s->read_packet->sender.in = s->peer.in.sin_addr; | |||
| 432 | s->read_packet->sender_port = be16toh(s->peer.in.sin_port); | |||
| 433 | s->read_packet->destination.in = s->local.in.sin_addr; | |||
| 434 | s->read_packet->destination_port = be16toh(s->local.in.sin_port); | |||
| 435 | } else { | |||
| 436 | assert(s->read_packet->family == AF_INET6)do { if ((__builtin_expect(!!(!(s->read_packet->family == 10)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("s->read_packet->family == AF_INET6" ), "../src/resolve/resolved-dns-stream.c", 436, __PRETTY_FUNCTION__ ); } while (0); | |||
| 437 | s->read_packet->sender.in6 = s->peer.in6.sin6_addr; | |||
| 438 | s->read_packet->sender_port = be16toh(s->peer.in6.sin6_port); | |||
| 439 | s->read_packet->destination.in6 = s->local.in6.sin6_addr; | |||
| 440 | s->read_packet->destination_port = be16toh(s->local.in6.sin6_port); | |||
| 441 | ||||
| 442 | if (s->read_packet->ifindex == 0) | |||
| 443 | s->read_packet->ifindex = s->peer.in6.sin6_scope_id; | |||
| 444 | if (s->read_packet->ifindex == 0) | |||
| 445 | s->read_packet->ifindex = s->local.in6.sin6_scope_id; | |||
| 446 | } | |||
| 447 | } | |||
| 448 | ||||
| 449 | ss = dns_stream_read(s, | |||
| 450 | (uint8_t*) DNS_PACKET_DATA(s->read_packet) + s->n_read - sizeof(s->read_size), | |||
| 451 | sizeof(s->read_size) + be16toh(s->read_size) - s->n_read); | |||
| 452 | if (ss < 0) { | |||
| 453 | if (!IN_SET(errno, EINTR, EAGAIN)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){4, 11})/sizeof(int)]; switch((*__errno_location ())) { case 4: case 11: _found = 1; break; default: break; } _found; })) | |||
| 454 | return dns_stream_complete(s, errno(*__errno_location ())); | |||
| 455 | } else if (ss == 0) | |||
| 456 | return dns_stream_complete(s, ECONNRESET104); | |||
| 457 | else | |||
| 458 | s->n_read += ss; | |||
| 459 | } | |||
| 460 | ||||
| 461 | /* Are we done? If so, disable the event source for EPOLLIN */ | |||
| 462 | if (s->n_read >= sizeof(s->read_size) + be16toh(s->read_size)) { | |||
| 463 | /* If there's a packet handler | |||
| 464 | * installed, call that. Note that | |||
| 465 | * this is optional... */ | |||
| 466 | if (s->on_packet) { | |||
| 467 | r = s->on_packet(s); | |||
| 468 | if (r < 0) | |||
| 469 | return r; | |||
| 470 | } | |||
| 471 | ||||
| 472 | r = dns_stream_update_io(s); | |||
| 473 | if (r < 0) | |||
| 474 | return dns_stream_complete(s, -r); | |||
| 475 | } | |||
| 476 | } | |||
| 477 | } | |||
| 478 | ||||
| 479 | if ((s->write_packet && s->n_written >= sizeof(s->write_size) + s->write_packet->size) && | |||
| 480 | (s->read_packet && s->n_read >= sizeof(s->read_size) + s->read_packet->size)) | |||
| 481 | return dns_stream_complete(s, 0); | |||
| 482 | ||||
| 483 | return 0; | |||
| 484 | } | |||
| 485 | ||||
| 486 | DnsStream *dns_stream_unref(DnsStream *s) { | |||
| 487 | DnsPacket *p; | |||
| 488 | Iterator i; | |||
| 489 | ||||
| 490 | if (!s) | |||
| 491 | return NULL((void*)0); | |||
| 492 | ||||
| 493 | assert(s->n_ref > 0)do { if ((__builtin_expect(!!(!(s->n_ref > 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s->n_ref > 0"), "../src/resolve/resolved-dns-stream.c" , 493, __PRETTY_FUNCTION__); } while (0); | |||
| 494 | s->n_ref--; | |||
| 495 | ||||
| 496 | if (s->n_ref > 0) | |||
| 497 | return NULL((void*)0); | |||
| 498 | ||||
| 499 | dns_stream_stop(s); | |||
| 500 | ||||
| 501 | if (s->server && s->server->stream == s) | |||
| 502 | s->server->stream = NULL((void*)0); | |||
| 503 | ||||
| 504 | if (s->manager) { | |||
| 505 | LIST_REMOVE(streams, s->manager->dns_streams, s)do { typeof(*(s->manager->dns_streams)) **_head = & (s->manager->dns_streams), *_item = (s); do { if ((__builtin_expect (!!(!(_item)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("_item"), "../src/resolve/resolved-dns-stream.c", 505, __PRETTY_FUNCTION__ ); } while (0); if (_item->streams_next) _item->streams_next ->streams_prev = _item->streams_prev; if (_item->streams_prev ) _item->streams_prev->streams_next = _item->streams_next ; else { do { if ((__builtin_expect(!!(!(*_head == _item)),0) )) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("*_head == _item" ), "../src/resolve/resolved-dns-stream.c", 505, __PRETTY_FUNCTION__ ); } while (0); *_head = _item->streams_next; } _item-> streams_next = _item->streams_prev = ((void*)0); } while ( 0); | |||
| 506 | s->manager->n_dns_streams--; | |||
| 507 | } | |||
| 508 | ||||
| 509 | #if ENABLE_DNS_OVER_TLS1 | |||
| 510 | if (s->tls_session) | |||
| 511 | gnutls_deinit(s->tls_session); | |||
| 512 | #endif | |||
| 513 | ||||
| 514 | ORDERED_SET_FOREACH(p, s->write_queue, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); ordered_set_iterate((s->write_queue ), &(i), (void**)&(p)); ) | |||
| 515 | dns_packet_unref(ordered_set_remove(s->write_queue, p)); | |||
| 516 | ||||
| 517 | dns_packet_unref(s->write_packet); | |||
| 518 | dns_packet_unref(s->read_packet); | |||
| 519 | dns_server_unref(s->server); | |||
| 520 | ||||
| 521 | ordered_set_free(s->write_queue); | |||
| 522 | ||||
| 523 | return mfree(s); | |||
| 524 | } | |||
| 525 | ||||
| 526 | DnsStream *dns_stream_ref(DnsStream *s) { | |||
| 527 | if (!s) | |||
| 528 | return NULL((void*)0); | |||
| 529 | ||||
| 530 | assert(s->n_ref > 0)do { if ((__builtin_expect(!!(!(s->n_ref > 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s->n_ref > 0"), "../src/resolve/resolved-dns-stream.c" , 530, __PRETTY_FUNCTION__); } while (0); | |||
| 531 | s->n_ref++; | |||
| 532 | ||||
| 533 | return s; | |||
| 534 | } | |||
| 535 | ||||
| 536 | int dns_stream_new(Manager *m, DnsStream **ret, DnsProtocol protocol, int fd, const union sockaddr_union *tfo_address) { | |||
| 537 | _cleanup_(dns_stream_unrefp)__attribute__((cleanup(dns_stream_unrefp))) DnsStream *s = NULL((void*)0); | |||
| 538 | int r; | |||
| 539 | ||||
| 540 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-dns-stream.c" , 540, __PRETTY_FUNCTION__); } while (0); | |||
| ||||
| 541 | assert(fd >= 0)do { if ((__builtin_expect(!!(!(fd >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd >= 0"), "../src/resolve/resolved-dns-stream.c" , 541, __PRETTY_FUNCTION__); } while (0); | |||
| 542 | ||||
| 543 | if (m->n_dns_streams > DNS_STREAMS_MAX128) | |||
| 544 | return -EBUSY16; | |||
| 545 | ||||
| 546 | s = new0(DnsStream, 1)((DnsStream*) calloc((1), sizeof(DnsStream))); | |||
| 547 | if (!s) | |||
| 548 | return -ENOMEM12; | |||
| 549 | ||||
| 550 | r = ordered_set_ensure_allocated(&s->write_queue, &dns_packet_hash_ops); | |||
| 551 | if (r
| |||
| 552 | return r; | |||
| ||||
| 553 | ||||
| 554 | s->n_ref = 1; | |||
| 555 | s->fd = -1; | |||
| 556 | s->protocol = protocol; | |||
| 557 | ||||
| 558 | r = sd_event_add_io(m->event, &s->io_event_source, fd, EPOLLINEPOLLIN, on_stream_io, s); | |||
| 559 | if (r < 0) | |||
| 560 | return r; | |||
| 561 | ||||
| 562 | (void) sd_event_source_set_description(s->io_event_source, "dns-stream-io"); | |||
| 563 | ||||
| 564 | r = sd_event_add_time( | |||
| 565 | m->event, | |||
| 566 | &s->timeout_event_source, | |||
| 567 | clock_boottime_or_monotonic(), | |||
| 568 | now(clock_boottime_or_monotonic()) + DNS_STREAM_TIMEOUT_USEC(10 * ((usec_t) 1000000ULL)), 0, | |||
| 569 | on_stream_timeout, s); | |||
| 570 | if (r < 0) | |||
| 571 | return r; | |||
| 572 | ||||
| 573 | (void) sd_event_source_set_description(s->timeout_event_source, "dns-stream-timeout"); | |||
| 574 | ||||
| 575 | LIST_PREPEND(streams, m->dns_streams, s)do { typeof(*(m->dns_streams)) **_head = &(m->dns_streams ), *_item = (s); do { if ((__builtin_expect(!!(!(_item)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("_item"), "../src/resolve/resolved-dns-stream.c" , 575, __PRETTY_FUNCTION__); } while (0); if ((_item->streams_next = *_head)) _item->streams_next->streams_prev = _item; _item ->streams_prev = ((void*)0); *_head = _item; } while (0); | |||
| 576 | s->manager = m; | |||
| 577 | s->fd = fd; | |||
| 578 | if (tfo_address) { | |||
| 579 | s->tfo_address = *tfo_address; | |||
| 580 | s->tfo_salen = tfo_address->sa.sa_family == AF_INET610 ? sizeof(tfo_address->in6) : sizeof(tfo_address->in); | |||
| 581 | } | |||
| 582 | ||||
| 583 | m->n_dns_streams++; | |||
| 584 | ||||
| 585 | *ret = TAKE_PTR(s)({ typeof(s) _ptr_ = (s); (s) = ((void*)0); _ptr_; }); | |||
| 586 | ||||
| 587 | return 0; | |||
| 588 | } | |||
| 589 | ||||
| 590 | #if ENABLE_DNS_OVER_TLS1 | |||
| 591 | int dns_stream_connect_tls(DnsStream *s, gnutls_session_t tls_session) { | |||
| 592 | gnutls_transport_set_ptr2(tls_session, (gnutls_transport_ptr_t) (long) s->fd, s); | |||
| 593 | gnutls_transport_set_vec_push_function(tls_session, &dns_stream_tls_writev); | |||
| 594 | ||||
| 595 | s->encrypted = true1; | |||
| 596 | s->tls_session = tls_session; | |||
| 597 | s->tls_handshake = gnutls_handshake(tls_session); | |||
| 598 | if (s->tls_handshake < 0 && gnutls_error_is_fatal(s->tls_handshake)) | |||
| 599 | return -ECONNREFUSED111; | |||
| 600 | ||||
| 601 | return 0; | |||
| 602 | } | |||
| 603 | #endif | |||
| 604 | ||||
| 605 | int dns_stream_write_packet(DnsStream *s, DnsPacket *p) { | |||
| 606 | int r; | |||
| 607 | ||||
| 608 | assert(s)do { if ((__builtin_expect(!!(!(s)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s"), "../src/resolve/resolved-dns-stream.c" , 608, __PRETTY_FUNCTION__); } while (0); | |||
| 609 | ||||
| 610 | r = ordered_set_put(s->write_queue, p); | |||
| 611 | if (r < 0) | |||
| 612 | return r; | |||
| 613 | ||||
| 614 | dns_packet_ref(p); | |||
| 615 | ||||
| 616 | return dns_stream_update_io(s); | |||
| 617 | } |