| File: | build-scan/../src/resolve/resolved-manager.c |
| Warning: | line 446, column 13 Null pointer passed to 1st parameter expecting 'nonnull' |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* SPDX-License-Identifier: LGPL-2.1+ */ | |||
| 2 | ||||
| 3 | #include <netinet/in.h> | |||
| 4 | #include <poll.h> | |||
| 5 | #include <stdio_ext.h> | |||
| 6 | #include <sys/ioctl.h> | |||
| 7 | ||||
| 8 | #if HAVE_LIBIDN21 | |||
| 9 | #include <idn2.h> | |||
| 10 | #endif | |||
| 11 | ||||
| 12 | #include "af-list.h" | |||
| 13 | #include "alloc-util.h" | |||
| 14 | #include "dirent-util.h" | |||
| 15 | #include "dns-domain.h" | |||
| 16 | #include "fd-util.h" | |||
| 17 | #include "fileio-label.h" | |||
| 18 | #include "hostname-util.h" | |||
| 19 | #include "io-util.h" | |||
| 20 | #include "netlink-util.h" | |||
| 21 | #include "network-internal.h" | |||
| 22 | #include "ordered-set.h" | |||
| 23 | #include "parse-util.h" | |||
| 24 | #include "random-util.h" | |||
| 25 | #include "resolved-bus.h" | |||
| 26 | #include "resolved-conf.h" | |||
| 27 | #include "resolved-dnssd.h" | |||
| 28 | #include "resolved-dns-stub.h" | |||
| 29 | #include "resolved-etc-hosts.h" | |||
| 30 | #include "resolved-llmnr.h" | |||
| 31 | #include "resolved-manager.h" | |||
| 32 | #include "resolved-mdns.h" | |||
| 33 | #include "resolved-resolv-conf.h" | |||
| 34 | #include "socket-util.h" | |||
| 35 | #include "string-table.h" | |||
| 36 | #include "string-util.h" | |||
| 37 | #include "utf8.h" | |||
| 38 | ||||
| 39 | #define SEND_TIMEOUT_USEC(200 * ((usec_t) 1000ULL)) (200 * USEC_PER_MSEC((usec_t) 1000ULL)) | |||
| 40 | ||||
| 41 | static int manager_process_link(sd_netlink *rtnl, sd_netlink_message *mm, void *userdata) { | |||
| 42 | Manager *m = userdata; | |||
| 43 | uint16_t type; | |||
| 44 | Link *l; | |||
| 45 | int ifindex, r; | |||
| 46 | ||||
| 47 | assert(rtnl)do { if ((__builtin_expect(!!(!(rtnl)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("rtnl"), "../src/resolve/resolved-manager.c" , 47, __PRETTY_FUNCTION__); } while (0); | |||
| 48 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 48, __PRETTY_FUNCTION__); } while (0); | |||
| 49 | assert(mm)do { if ((__builtin_expect(!!(!(mm)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("mm"), "../src/resolve/resolved-manager.c" , 49, __PRETTY_FUNCTION__); } while (0); | |||
| 50 | ||||
| 51 | r = sd_netlink_message_get_type(mm, &type); | |||
| 52 | if (r < 0) | |||
| 53 | goto fail; | |||
| 54 | ||||
| 55 | r = sd_rtnl_message_link_get_ifindex(mm, &ifindex); | |||
| 56 | if (r < 0) | |||
| 57 | goto fail; | |||
| 58 | ||||
| 59 | l = hashmap_get(m->links, INT_TO_PTR(ifindex)((void *) ((intptr_t) (ifindex)))); | |||
| 60 | ||||
| 61 | switch (type) { | |||
| 62 | ||||
| 63 | case RTM_NEWLINKRTM_NEWLINK:{ | |||
| 64 | bool_Bool is_new = !l; | |||
| 65 | ||||
| 66 | if (!l) { | |||
| 67 | r = link_new(m, &l, ifindex); | |||
| 68 | if (r < 0) | |||
| 69 | goto fail; | |||
| 70 | } | |||
| 71 | ||||
| 72 | r = link_process_rtnl(l, mm); | |||
| 73 | if (r < 0) | |||
| 74 | goto fail; | |||
| 75 | ||||
| 76 | r = link_update(l); | |||
| 77 | if (r < 0) | |||
| 78 | goto fail; | |||
| 79 | ||||
| 80 | if (is_new) | |||
| 81 | log_debug("Found new link %i/%s", ifindex, l->name)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 81, __func__, "Found new link %i/%s" , ifindex, l->name) : -abs(_e); }); | |||
| 82 | ||||
| 83 | break; | |||
| 84 | } | |||
| 85 | ||||
| 86 | case RTM_DELLINKRTM_DELLINK: | |||
| 87 | if (l) { | |||
| 88 | log_debug("Removing link %i/%s", l->ifindex, l->name)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 88, __func__, "Removing link %i/%s" , l->ifindex, l->name) : -abs(_e); }); | |||
| 89 | link_remove_user(l); | |||
| 90 | link_free(l); | |||
| 91 | } | |||
| 92 | ||||
| 93 | break; | |||
| 94 | } | |||
| 95 | ||||
| 96 | return 0; | |||
| 97 | ||||
| 98 | fail: | |||
| 99 | log_warning_errno(r, "Failed to process RTNL link message: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 99, __func__, "Failed to process RTNL link message: %m" ) : -abs(_e); }); | |||
| 100 | return 0; | |||
| 101 | } | |||
| 102 | ||||
| 103 | static int manager_process_address(sd_netlink *rtnl, sd_netlink_message *mm, void *userdata) { | |||
| 104 | Manager *m = userdata; | |||
| 105 | union in_addr_union address; | |||
| 106 | uint16_t type; | |||
| 107 | int r, ifindex, family; | |||
| 108 | LinkAddress *a; | |||
| 109 | Link *l; | |||
| 110 | ||||
| 111 | assert(rtnl)do { if ((__builtin_expect(!!(!(rtnl)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("rtnl"), "../src/resolve/resolved-manager.c" , 111, __PRETTY_FUNCTION__); } while (0); | |||
| 112 | assert(mm)do { if ((__builtin_expect(!!(!(mm)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("mm"), "../src/resolve/resolved-manager.c" , 112, __PRETTY_FUNCTION__); } while (0); | |||
| 113 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 113, __PRETTY_FUNCTION__); } while (0); | |||
| 114 | ||||
| 115 | r = sd_netlink_message_get_type(mm, &type); | |||
| 116 | if (r < 0) | |||
| 117 | goto fail; | |||
| 118 | ||||
| 119 | r = sd_rtnl_message_addr_get_ifindex(mm, &ifindex); | |||
| 120 | if (r < 0) | |||
| 121 | goto fail; | |||
| 122 | ||||
| 123 | l = hashmap_get(m->links, INT_TO_PTR(ifindex)((void *) ((intptr_t) (ifindex)))); | |||
| 124 | if (!l) | |||
| 125 | return 0; | |||
| 126 | ||||
| 127 | r = sd_rtnl_message_addr_get_family(mm, &family); | |||
| 128 | if (r < 0) | |||
| 129 | goto fail; | |||
| 130 | ||||
| 131 | switch (family) { | |||
| 132 | ||||
| 133 | case AF_INET2: | |||
| 134 | r = sd_netlink_message_read_in_addr(mm, IFA_LOCAL, &address.in); | |||
| 135 | if (r < 0) { | |||
| 136 | r = sd_netlink_message_read_in_addr(mm, IFA_ADDRESS, &address.in); | |||
| 137 | if (r < 0) | |||
| 138 | goto fail; | |||
| 139 | } | |||
| 140 | ||||
| 141 | break; | |||
| 142 | ||||
| 143 | case AF_INET610: | |||
| 144 | r = sd_netlink_message_read_in6_addr(mm, IFA_LOCAL, &address.in6); | |||
| 145 | if (r < 0) { | |||
| 146 | r = sd_netlink_message_read_in6_addr(mm, IFA_ADDRESS, &address.in6); | |||
| 147 | if (r < 0) | |||
| 148 | goto fail; | |||
| 149 | } | |||
| 150 | ||||
| 151 | break; | |||
| 152 | ||||
| 153 | default: | |||
| 154 | return 0; | |||
| 155 | } | |||
| 156 | ||||
| 157 | a = link_find_address(l, family, &address); | |||
| 158 | ||||
| 159 | switch (type) { | |||
| 160 | ||||
| 161 | case RTM_NEWADDRRTM_NEWADDR: | |||
| 162 | ||||
| 163 | if (!a) { | |||
| 164 | r = link_address_new(l, &a, family, &address); | |||
| 165 | if (r < 0) | |||
| 166 | return r; | |||
| 167 | } | |||
| 168 | ||||
| 169 | r = link_address_update_rtnl(a, mm); | |||
| 170 | if (r < 0) | |||
| 171 | return r; | |||
| 172 | ||||
| 173 | break; | |||
| 174 | ||||
| 175 | case RTM_DELADDRRTM_DELADDR: | |||
| 176 | link_address_free(a); | |||
| 177 | break; | |||
| 178 | } | |||
| 179 | ||||
| 180 | return 0; | |||
| 181 | ||||
| 182 | fail: | |||
| 183 | log_warning_errno(r, "Failed to process RTNL address message: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 183, __func__, "Failed to process RTNL address message: %m" ) : -abs(_e); }); | |||
| 184 | return 0; | |||
| 185 | } | |||
| 186 | ||||
| 187 | static int manager_rtnl_listen(Manager *m) { | |||
| 188 | _cleanup_(sd_netlink_message_unrefp)__attribute__((cleanup(sd_netlink_message_unrefp))) sd_netlink_message *req = NULL((void*)0), *reply = NULL((void*)0); | |||
| 189 | sd_netlink_message *i; | |||
| 190 | int r; | |||
| 191 | ||||
| 192 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 192, __PRETTY_FUNCTION__); } while (0); | |||
| 193 | ||||
| 194 | /* First, subscribe to interfaces coming and going */ | |||
| 195 | r = sd_netlink_open(&m->rtnl); | |||
| 196 | if (r < 0) | |||
| 197 | return r; | |||
| 198 | ||||
| 199 | r = sd_netlink_attach_event(m->rtnl, m->event, SD_EVENT_PRIORITY_IMPORTANT); | |||
| 200 | if (r < 0) | |||
| 201 | return r; | |||
| 202 | ||||
| 203 | r = sd_netlink_add_match(m->rtnl, RTM_NEWLINKRTM_NEWLINK, manager_process_link, m); | |||
| 204 | if (r < 0) | |||
| 205 | return r; | |||
| 206 | ||||
| 207 | r = sd_netlink_add_match(m->rtnl, RTM_DELLINKRTM_DELLINK, manager_process_link, m); | |||
| 208 | if (r < 0) | |||
| 209 | return r; | |||
| 210 | ||||
| 211 | r = sd_netlink_add_match(m->rtnl, RTM_NEWADDRRTM_NEWADDR, manager_process_address, m); | |||
| 212 | if (r < 0) | |||
| 213 | return r; | |||
| 214 | ||||
| 215 | r = sd_netlink_add_match(m->rtnl, RTM_DELADDRRTM_DELADDR, manager_process_address, m); | |||
| 216 | if (r < 0) | |||
| 217 | return r; | |||
| 218 | ||||
| 219 | /* Then, enumerate all links */ | |||
| 220 | r = sd_rtnl_message_new_link(m->rtnl, &req, RTM_GETLINKRTM_GETLINK, 0); | |||
| 221 | if (r < 0) | |||
| 222 | return r; | |||
| 223 | ||||
| 224 | r = sd_netlink_message_request_dump(req, true1); | |||
| 225 | if (r < 0) | |||
| 226 | return r; | |||
| 227 | ||||
| 228 | r = sd_netlink_call(m->rtnl, req, 0, &reply); | |||
| 229 | if (r < 0) | |||
| 230 | return r; | |||
| 231 | ||||
| 232 | for (i = reply; i; i = sd_netlink_message_next(i)) { | |||
| 233 | r = manager_process_link(m->rtnl, i, m); | |||
| 234 | if (r < 0) | |||
| 235 | return r; | |||
| 236 | } | |||
| 237 | ||||
| 238 | req = sd_netlink_message_unref(req); | |||
| 239 | reply = sd_netlink_message_unref(reply); | |||
| 240 | ||||
| 241 | /* Finally, enumerate all addresses, too */ | |||
| 242 | r = sd_rtnl_message_new_addr(m->rtnl, &req, RTM_GETADDRRTM_GETADDR, 0, AF_UNSPEC0); | |||
| 243 | if (r < 0) | |||
| 244 | return r; | |||
| 245 | ||||
| 246 | r = sd_netlink_message_request_dump(req, true1); | |||
| 247 | if (r < 0) | |||
| 248 | return r; | |||
| 249 | ||||
| 250 | r = sd_netlink_call(m->rtnl, req, 0, &reply); | |||
| 251 | if (r < 0) | |||
| 252 | return r; | |||
| 253 | ||||
| 254 | for (i = reply; i; i = sd_netlink_message_next(i)) { | |||
| 255 | r = manager_process_address(m->rtnl, i, m); | |||
| 256 | if (r < 0) | |||
| 257 | return r; | |||
| 258 | } | |||
| 259 | ||||
| 260 | return r; | |||
| 261 | } | |||
| 262 | ||||
| 263 | static int on_network_event(sd_event_source *s, int fd, uint32_t revents, void *userdata) { | |||
| 264 | Manager *m = userdata; | |||
| 265 | Iterator i; | |||
| 266 | Link *l; | |||
| 267 | int r; | |||
| 268 | ||||
| 269 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 269, __PRETTY_FUNCTION__); } while (0); | |||
| 270 | ||||
| 271 | sd_network_monitor_flush(m->network_monitor); | |||
| 272 | ||||
| 273 | HASHMAP_FOREACH(l, m->links, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); hashmap_iterate((m->links), & (i), (void**)&(l), ((void*)0)); ) { | |||
| 274 | r = link_update(l); | |||
| 275 | if (r < 0) | |||
| 276 | log_warning_errno(r, "Failed to update monitor information for %i: %m", l->ifindex)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 276, __func__, "Failed to update monitor information for %i: %m" , l->ifindex) : -abs(_e); }); | |||
| 277 | } | |||
| 278 | ||||
| 279 | (void) manager_write_resolv_conf(m); | |||
| 280 | ||||
| 281 | return 0; | |||
| 282 | } | |||
| 283 | ||||
| 284 | static int manager_network_monitor_listen(Manager *m) { | |||
| 285 | int r, fd, events; | |||
| 286 | ||||
| 287 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 287, __PRETTY_FUNCTION__); } while (0); | |||
| 288 | ||||
| 289 | r = sd_network_monitor_new(&m->network_monitor, NULL((void*)0)); | |||
| 290 | if (r < 0) | |||
| 291 | return r; | |||
| 292 | ||||
| 293 | fd = sd_network_monitor_get_fd(m->network_monitor); | |||
| 294 | if (fd < 0) | |||
| 295 | return fd; | |||
| 296 | ||||
| 297 | events = sd_network_monitor_get_events(m->network_monitor); | |||
| 298 | if (events < 0) | |||
| 299 | return events; | |||
| 300 | ||||
| 301 | r = sd_event_add_io(m->event, &m->network_event_source, fd, events, &on_network_event, m); | |||
| 302 | if (r < 0) | |||
| 303 | return r; | |||
| 304 | ||||
| 305 | r = sd_event_source_set_priority(m->network_event_source, SD_EVENT_PRIORITY_IMPORTANT+5); | |||
| 306 | if (r < 0) | |||
| 307 | return r; | |||
| 308 | ||||
| 309 | (void) sd_event_source_set_description(m->network_event_source, "network-monitor"); | |||
| 310 | ||||
| 311 | return 0; | |||
| 312 | } | |||
| 313 | ||||
| 314 | static int determine_hostname(char **full_hostname, char **llmnr_hostname, char **mdns_hostname) { | |||
| 315 | _cleanup_free___attribute__((cleanup(freep))) char *h = NULL((void*)0), *n = NULL((void*)0); | |||
| 316 | #if HAVE_LIBIDN21 | |||
| 317 | _cleanup_free___attribute__((cleanup(freep))) char *utf8 = NULL((void*)0); | |||
| 318 | #elif HAVE_LIBIDN0 | |||
| 319 | int k; | |||
| 320 | #endif | |||
| 321 | char label[DNS_LABEL_MAX63]; | |||
| 322 | const char *p, *decoded; | |||
| 323 | int r; | |||
| 324 | ||||
| 325 | assert(full_hostname)do { if ((__builtin_expect(!!(!(full_hostname)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("full_hostname"), "../src/resolve/resolved-manager.c" , 325, __PRETTY_FUNCTION__); } while (0); | |||
| 326 | assert(llmnr_hostname)do { if ((__builtin_expect(!!(!(llmnr_hostname)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("llmnr_hostname"), "../src/resolve/resolved-manager.c" , 326, __PRETTY_FUNCTION__); } while (0); | |||
| 327 | assert(mdns_hostname)do { if ((__builtin_expect(!!(!(mdns_hostname)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("mdns_hostname"), "../src/resolve/resolved-manager.c" , 327, __PRETTY_FUNCTION__); } while (0); | |||
| 328 | ||||
| 329 | /* Extract and normalize the first label of the locally configured hostname, and check it's not "localhost". */ | |||
| 330 | ||||
| 331 | r = gethostname_strict(&h); | |||
| 332 | if (r < 0) | |||
| 333 | return log_debug_errno(r, "Can't determine system hostname: %m")({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 333, __func__, "Can't determine system hostname: %m" ) : -abs(_e); }); | |||
| 334 | ||||
| 335 | p = h; | |||
| 336 | r = dns_label_unescape(&p, label, sizeof label); | |||
| 337 | if (r < 0) | |||
| 338 | return log_error_errno(r, "Failed to unescape host name: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 338, __func__, "Failed to unescape host name: %m" ) : -abs(_e); }); | |||
| 339 | if (r == 0) { | |||
| 340 | log_error("Couldn't find a single label in hostname.")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 340, __func__, "Couldn't find a single label in hostname." ) : -abs(_e); }); | |||
| 341 | return -EINVAL22; | |||
| 342 | } | |||
| 343 | ||||
| 344 | #if HAVE_LIBIDN21 | |||
| 345 | r = idn2_to_unicode_8z8z(label, &utf8, 0); | |||
| 346 | if (r != IDN2_OK) | |||
| 347 | return log_error("Failed to undo IDNA: %s", idn2_strerror(r))({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 347, __func__, "Failed to undo IDNA: %s" , idn2_strerror(r)) : -abs(_e); }); | |||
| 348 | assert(utf8_is_valid(utf8))do { if ((__builtin_expect(!!(!(utf8_is_valid(utf8))),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("utf8_is_valid(utf8)"), "../src/resolve/resolved-manager.c" , 348, __PRETTY_FUNCTION__); } while (0); | |||
| 349 | ||||
| 350 | r = strlen(utf8); | |||
| 351 | decoded = utf8; | |||
| 352 | #elif HAVE_LIBIDN0 | |||
| 353 | k = dns_label_undo_idna(label, r, label, sizeof label); | |||
| 354 | if (k < 0) | |||
| 355 | return log_error_errno(k, "Failed to undo IDNA: %m")({ int _level = ((3)), _e = ((k)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 355, __func__, "Failed to undo IDNA: %m" ) : -abs(_e); }); | |||
| 356 | if (k > 0) | |||
| 357 | r = k; | |||
| 358 | ||||
| 359 | if (!utf8_is_valid(label)) { | |||
| 360 | log_error("System hostname is not UTF-8 clean.")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 360, __func__, "System hostname is not UTF-8 clean." ) : -abs(_e); }); | |||
| 361 | return -EINVAL22; | |||
| 362 | } | |||
| 363 | decoded = label; | |||
| 364 | #else | |||
| 365 | decoded = label; /* no decoding */ | |||
| 366 | #endif | |||
| 367 | ||||
| 368 | r = dns_label_escape_new(decoded, r, &n); | |||
| 369 | if (r < 0) | |||
| 370 | return log_error_errno(r, "Failed to escape host name: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 370, __func__, "Failed to escape host name: %m" ) : -abs(_e); }); | |||
| 371 | ||||
| 372 | if (is_localhost(n)) { | |||
| 373 | log_debug("System hostname is 'localhost', ignoring.")({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 373, __func__, "System hostname is 'localhost', ignoring." ) : -abs(_e); }); | |||
| 374 | return -EINVAL22; | |||
| 375 | } | |||
| 376 | ||||
| 377 | r = dns_name_concat(n, "local", mdns_hostname); | |||
| 378 | if (r < 0) | |||
| 379 | return log_error_errno(r, "Failed to determine mDNS hostname: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 379, __func__, "Failed to determine mDNS hostname: %m" ) : -abs(_e); }); | |||
| 380 | ||||
| 381 | *llmnr_hostname = TAKE_PTR(n)({ typeof(n) _ptr_ = (n); (n) = ((void*)0); _ptr_; }); | |||
| 382 | *full_hostname = TAKE_PTR(h)({ typeof(h) _ptr_ = (h); (h) = ((void*)0); _ptr_; }); | |||
| 383 | ||||
| 384 | return 0; | |||
| 385 | } | |||
| 386 | ||||
| 387 | static const char *fallback_hostname(void) { | |||
| 388 | ||||
| 389 | /* Determine the fall back hostname. For exposing this system to the outside world, we cannot have it to be | |||
| 390 | * "localhost" even if that's the compiled in hostname. In this case, let's revert to "linux" instead. */ | |||
| 391 | ||||
| 392 | if (is_localhost(FALLBACK_HOSTNAME"localhost")) | |||
| 393 | return "linux"; | |||
| 394 | ||||
| 395 | return FALLBACK_HOSTNAME"localhost"; | |||
| 396 | } | |||
| 397 | ||||
| 398 | static int make_fallback_hostnames(char **full_hostname, char **llmnr_hostname, char **mdns_hostname) { | |||
| 399 | _cleanup_free___attribute__((cleanup(freep))) char *n = NULL((void*)0), *m = NULL((void*)0); | |||
| 400 | char label[DNS_LABEL_MAX63], *h; | |||
| 401 | const char *p; | |||
| 402 | int r; | |||
| 403 | ||||
| 404 | assert(full_hostname)do { if ((__builtin_expect(!!(!(full_hostname)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("full_hostname"), "../src/resolve/resolved-manager.c" , 404, __PRETTY_FUNCTION__); } while (0); | |||
| 405 | assert(llmnr_hostname)do { if ((__builtin_expect(!!(!(llmnr_hostname)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("llmnr_hostname"), "../src/resolve/resolved-manager.c" , 405, __PRETTY_FUNCTION__); } while (0); | |||
| 406 | assert(mdns_hostname)do { if ((__builtin_expect(!!(!(mdns_hostname)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("mdns_hostname"), "../src/resolve/resolved-manager.c" , 406, __PRETTY_FUNCTION__); } while (0); | |||
| 407 | ||||
| 408 | p = fallback_hostname(); | |||
| 409 | r = dns_label_unescape(&p, label, sizeof(label)); | |||
| 410 | if (r < 0) | |||
| 411 | return log_error_errno(r, "Failed to unescape fallback host name: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 411, __func__, "Failed to unescape fallback host name: %m" ) : -abs(_e); }); | |||
| 412 | ||||
| 413 | assert(r > 0)do { if ((__builtin_expect(!!(!(r > 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("r > 0"), "../src/resolve/resolved-manager.c" , 413, __PRETTY_FUNCTION__); } while (0); /* The fallback hostname must have at least one label */ | |||
| 414 | ||||
| 415 | r = dns_label_escape_new(label, r, &n); | |||
| 416 | if (r < 0) | |||
| 417 | return log_error_errno(r, "Failed to escape fallback hostname: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 417, __func__, "Failed to escape fallback hostname: %m" ) : -abs(_e); }); | |||
| 418 | ||||
| 419 | r = dns_name_concat(n, "local", &m); | |||
| 420 | if (r < 0) | |||
| 421 | return log_error_errno(r, "Failed to concatenate mDNS hostname: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 421, __func__, "Failed to concatenate mDNS hostname: %m" ) : -abs(_e); }); | |||
| 422 | ||||
| 423 | h = strdup(fallback_hostname()); | |||
| 424 | if (!h) | |||
| 425 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/resolve/resolved-manager.c" , 425, __func__); | |||
| 426 | ||||
| 427 | *llmnr_hostname = TAKE_PTR(n)({ typeof(n) _ptr_ = (n); (n) = ((void*)0); _ptr_; }); | |||
| 428 | *mdns_hostname = TAKE_PTR(m)({ typeof(m) _ptr_ = (m); (m) = ((void*)0); _ptr_; }); | |||
| 429 | ||||
| 430 | *full_hostname = h; | |||
| 431 | ||||
| 432 | return 0; | |||
| 433 | } | |||
| 434 | ||||
| 435 | static int on_hostname_change(sd_event_source *es, int fd, uint32_t revents, void *userdata) { | |||
| 436 | _cleanup_free___attribute__((cleanup(freep))) char *full_hostname = NULL((void*)0), *llmnr_hostname = NULL((void*)0), *mdns_hostname = NULL((void*)0); | |||
| ||||
| 437 | Manager *m = userdata; | |||
| 438 | int r; | |||
| 439 | ||||
| 440 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 440, __PRETTY_FUNCTION__); } while (0); | |||
| 441 | ||||
| 442 | r = determine_hostname(&full_hostname, &llmnr_hostname, &mdns_hostname); | |||
| 443 | if (r < 0) | |||
| 444 | return 0; /* ignore invalid hostnames */ | |||
| 445 | ||||
| 446 | if (streq(full_hostname, m->full_hostname)(strcmp((full_hostname),(m->full_hostname)) == 0) && | |||
| ||||
| 447 | streq(llmnr_hostname, m->llmnr_hostname)(strcmp((llmnr_hostname),(m->llmnr_hostname)) == 0) && | |||
| 448 | streq(mdns_hostname, m->mdns_hostname)(strcmp((mdns_hostname),(m->mdns_hostname)) == 0)) | |||
| 449 | return 0; | |||
| 450 | ||||
| 451 | log_info("System hostname changed to '%s'.", full_hostname)({ int _level = (((6))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 451, __func__, "System hostname changed to '%s'." , full_hostname) : -abs(_e); }); | |||
| 452 | ||||
| 453 | free_and_replace(m->full_hostname, full_hostname)({ free(m->full_hostname); (m->full_hostname) = (full_hostname ); (full_hostname) = ((void*)0); 0; }); | |||
| 454 | free_and_replace(m->llmnr_hostname, llmnr_hostname)({ free(m->llmnr_hostname); (m->llmnr_hostname) = (llmnr_hostname ); (llmnr_hostname) = ((void*)0); 0; }); | |||
| 455 | free_and_replace(m->mdns_hostname, mdns_hostname)({ free(m->mdns_hostname); (m->mdns_hostname) = (mdns_hostname ); (mdns_hostname) = ((void*)0); 0; }); | |||
| 456 | ||||
| 457 | manager_refresh_rrs(m); | |||
| 458 | ||||
| 459 | return 0; | |||
| 460 | } | |||
| 461 | ||||
| 462 | static int manager_watch_hostname(Manager *m) { | |||
| 463 | int r; | |||
| 464 | ||||
| 465 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 465, __PRETTY_FUNCTION__); } while (0); | |||
| 466 | ||||
| 467 | m->hostname_fd = open("/proc/sys/kernel/hostname", | |||
| 468 | O_RDONLY00|O_CLOEXEC02000000|O_NONBLOCK04000|O_NOCTTY0400); | |||
| 469 | if (m->hostname_fd < 0) { | |||
| 470 | log_warning_errno(errno, "Failed to watch hostname: %m")({ int _level = ((4)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/resolve/resolved-manager.c", 470 , __func__, "Failed to watch hostname: %m") : -abs(_e); }); | |||
| 471 | return 0; | |||
| 472 | } | |||
| 473 | ||||
| 474 | r = sd_event_add_io(m->event, &m->hostname_event_source, m->hostname_fd, 0, on_hostname_change, m); | |||
| 475 | if (r < 0) { | |||
| 476 | if (r == -EPERM1) | |||
| 477 | /* kernels prior to 3.2 don't support polling this file. Ignore the failure. */ | |||
| 478 | m->hostname_fd = safe_close(m->hostname_fd); | |||
| 479 | else | |||
| 480 | return log_error_errno(r, "Failed to add hostname event source: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 480, __func__, "Failed to add hostname event source: %m" ) : -abs(_e); }); | |||
| 481 | } | |||
| 482 | ||||
| 483 | (void) sd_event_source_set_description(m->hostname_event_source, "hostname"); | |||
| 484 | ||||
| 485 | r = determine_hostname(&m->full_hostname, &m->llmnr_hostname, &m->mdns_hostname); | |||
| 486 | if (r < 0) { | |||
| 487 | log_info("Defaulting to hostname '%s'.", fallback_hostname())({ int _level = (((6))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 487, __func__, "Defaulting to hostname '%s'." , fallback_hostname()) : -abs(_e); }); | |||
| 488 | ||||
| 489 | r = make_fallback_hostnames(&m->full_hostname, &m->llmnr_hostname, &m->mdns_hostname); | |||
| 490 | if (r < 0) | |||
| 491 | return r; | |||
| 492 | } else | |||
| 493 | log_info("Using system hostname '%s'.", m->full_hostname)({ int _level = (((6))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 493, __func__, "Using system hostname '%s'." , m->full_hostname) : -abs(_e); }); | |||
| 494 | ||||
| 495 | return 0; | |||
| 496 | } | |||
| 497 | ||||
| 498 | static int manager_sigusr1(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) { | |||
| 499 | _cleanup_free___attribute__((cleanup(freep))) char *buffer = NULL((void*)0); | |||
| 500 | _cleanup_fclose___attribute__((cleanup(fclosep))) FILE *f = NULL((void*)0); | |||
| 501 | Manager *m = userdata; | |||
| 502 | DnsServer *server; | |||
| 503 | size_t size = 0; | |||
| 504 | DnsScope *scope; | |||
| 505 | Iterator i; | |||
| 506 | Link *l; | |||
| 507 | ||||
| 508 | assert(s)do { if ((__builtin_expect(!!(!(s)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s"), "../src/resolve/resolved-manager.c" , 508, __PRETTY_FUNCTION__); } while (0); | |||
| 509 | assert(si)do { if ((__builtin_expect(!!(!(si)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("si"), "../src/resolve/resolved-manager.c" , 509, __PRETTY_FUNCTION__); } while (0); | |||
| 510 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 510, __PRETTY_FUNCTION__); } while (0); | |||
| 511 | ||||
| 512 | f = open_memstream(&buffer, &size); | |||
| 513 | if (!f) | |||
| 514 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/resolve/resolved-manager.c" , 514, __func__); | |||
| 515 | ||||
| 516 | (void) __fsetlocking(f, FSETLOCKING_BYCALLERFSETLOCKING_BYCALLER); | |||
| 517 | ||||
| 518 | LIST_FOREACH(scopes, scope, m->dns_scopes)for ((scope) = (m->dns_scopes); (scope); (scope) = (scope) ->scopes_next) | |||
| 519 | dns_scope_dump(scope, f); | |||
| 520 | ||||
| 521 | LIST_FOREACH(servers, server, m->dns_servers)for ((server) = (m->dns_servers); (server); (server) = (server )->servers_next) | |||
| 522 | dns_server_dump(server, f); | |||
| 523 | LIST_FOREACH(servers, server, m->fallback_dns_servers)for ((server) = (m->fallback_dns_servers); (server); (server ) = (server)->servers_next) | |||
| 524 | dns_server_dump(server, f); | |||
| 525 | HASHMAP_FOREACH(l, m->links, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); hashmap_iterate((m->links), & (i), (void**)&(l), ((void*)0)); ) | |||
| 526 | LIST_FOREACH(servers, server, l->dns_servers)for ((server) = (l->dns_servers); (server); (server) = (server )->servers_next) | |||
| 527 | dns_server_dump(server, f); | |||
| 528 | ||||
| 529 | if (fflush_and_check(f) < 0) | |||
| 530 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/resolve/resolved-manager.c" , 530, __func__); | |||
| 531 | ||||
| 532 | log_dump(LOG_INFO, buffer)log_dump_internal(((LOG_REALM_SYSTEMD) << 10 | (6)), 0, "../src/resolve/resolved-manager.c", 532, __func__, buffer); | |||
| 533 | return 0; | |||
| 534 | } | |||
| 535 | ||||
| 536 | static int manager_sigusr2(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) { | |||
| 537 | Manager *m = userdata; | |||
| 538 | ||||
| 539 | assert(s)do { if ((__builtin_expect(!!(!(s)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s"), "../src/resolve/resolved-manager.c" , 539, __PRETTY_FUNCTION__); } while (0); | |||
| 540 | assert(si)do { if ((__builtin_expect(!!(!(si)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("si"), "../src/resolve/resolved-manager.c" , 540, __PRETTY_FUNCTION__); } while (0); | |||
| 541 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 541, __PRETTY_FUNCTION__); } while (0); | |||
| 542 | ||||
| 543 | manager_flush_caches(m); | |||
| 544 | ||||
| 545 | return 0; | |||
| 546 | } | |||
| 547 | ||||
| 548 | static int manager_sigrtmin1(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) { | |||
| 549 | Manager *m = userdata; | |||
| 550 | ||||
| 551 | assert(s)do { if ((__builtin_expect(!!(!(s)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s"), "../src/resolve/resolved-manager.c" , 551, __PRETTY_FUNCTION__); } while (0); | |||
| 552 | assert(si)do { if ((__builtin_expect(!!(!(si)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("si"), "../src/resolve/resolved-manager.c" , 552, __PRETTY_FUNCTION__); } while (0); | |||
| 553 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 553, __PRETTY_FUNCTION__); } while (0); | |||
| 554 | ||||
| 555 | manager_reset_server_features(m); | |||
| 556 | return 0; | |||
| 557 | } | |||
| 558 | ||||
| 559 | int manager_new(Manager **ret) { | |||
| 560 | _cleanup_(manager_freep)__attribute__((cleanup(manager_freep))) Manager *m = NULL((void*)0); | |||
| 561 | int r; | |||
| 562 | ||||
| 563 | assert(ret)do { if ((__builtin_expect(!!(!(ret)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("ret"), "../src/resolve/resolved-manager.c" , 563, __PRETTY_FUNCTION__); } while (0); | |||
| 564 | ||||
| 565 | m = new0(Manager, 1)((Manager*) calloc((1), sizeof(Manager))); | |||
| 566 | if (!m) | |||
| 567 | return -ENOMEM12; | |||
| 568 | ||||
| 569 | m->llmnr_ipv4_udp_fd = m->llmnr_ipv6_udp_fd = -1; | |||
| 570 | m->llmnr_ipv4_tcp_fd = m->llmnr_ipv6_tcp_fd = -1; | |||
| 571 | m->mdns_ipv4_fd = m->mdns_ipv6_fd = -1; | |||
| 572 | m->dns_stub_udp_fd = m->dns_stub_tcp_fd = -1; | |||
| 573 | m->hostname_fd = -1; | |||
| 574 | ||||
| 575 | m->llmnr_support = RESOLVE_SUPPORT_YES; | |||
| 576 | m->mdns_support = RESOLVE_SUPPORT_YES; | |||
| 577 | m->dnssec_mode = DEFAULT_DNSSEC_MODEDNSSEC_ALLOW_DOWNGRADE; | |||
| 578 | m->dns_over_tls_mode = DEFAULT_DNS_OVER_TLS_MODEDNS_OVER_TLS_NO; | |||
| 579 | m->enable_cache = true1; | |||
| 580 | m->dns_stub_listener_mode = DNS_STUB_LISTENER_UDP; | |||
| 581 | m->read_resolv_conf = true1; | |||
| 582 | m->need_builtin_fallbacks = true1; | |||
| 583 | m->etc_hosts_last = m->etc_hosts_mtime = USEC_INFINITY((usec_t) -1); | |||
| 584 | ||||
| 585 | r = dns_trust_anchor_load(&m->trust_anchor); | |||
| 586 | if (r < 0) | |||
| 587 | return r; | |||
| 588 | ||||
| 589 | r = manager_parse_config_file(m); | |||
| 590 | if (r < 0) | |||
| 591 | log_warning_errno(r, "Failed to parse configuration file: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 591, __func__, "Failed to parse configuration file: %m" ) : -abs(_e); }); | |||
| 592 | ||||
| 593 | r = sd_event_default(&m->event); | |||
| 594 | if (r < 0) | |||
| 595 | return r; | |||
| 596 | ||||
| 597 | sd_event_add_signal(m->event, NULL((void*)0), SIGTERM15, NULL((void*)0), NULL((void*)0)); | |||
| 598 | sd_event_add_signal(m->event, NULL((void*)0), SIGINT2, NULL((void*)0), NULL((void*)0)); | |||
| 599 | ||||
| 600 | sd_event_set_watchdog(m->event, true1); | |||
| 601 | ||||
| 602 | r = manager_watch_hostname(m); | |||
| 603 | if (r < 0) | |||
| 604 | return r; | |||
| 605 | ||||
| 606 | r = dnssd_load(m); | |||
| 607 | if (r < 0) | |||
| 608 | log_warning_errno(r, "Failed to load DNS-SD configuration files: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 608, __func__, "Failed to load DNS-SD configuration files: %m" ) : -abs(_e); }); | |||
| 609 | ||||
| 610 | r = dns_scope_new(m, &m->unicast_scope, NULL((void*)0), DNS_PROTOCOL_DNS, AF_UNSPEC0); | |||
| 611 | if (r < 0) | |||
| 612 | return r; | |||
| 613 | ||||
| 614 | r = manager_network_monitor_listen(m); | |||
| 615 | if (r < 0) | |||
| 616 | return r; | |||
| 617 | ||||
| 618 | r = manager_rtnl_listen(m); | |||
| 619 | if (r < 0) | |||
| 620 | return r; | |||
| 621 | ||||
| 622 | r = manager_connect_bus(m); | |||
| 623 | if (r < 0) | |||
| 624 | return r; | |||
| 625 | ||||
| 626 | (void) sd_event_add_signal(m->event, &m->sigusr1_event_source, SIGUSR110, manager_sigusr1, m); | |||
| 627 | (void) sd_event_add_signal(m->event, &m->sigusr2_event_source, SIGUSR212, manager_sigusr2, m); | |||
| 628 | (void) sd_event_add_signal(m->event, &m->sigrtmin1_event_source, SIGRTMIN(__libc_current_sigrtmin ())+1, manager_sigrtmin1, m); | |||
| 629 | ||||
| 630 | manager_cleanup_saved_user(m); | |||
| 631 | ||||
| 632 | *ret = TAKE_PTR(m)({ typeof(m) _ptr_ = (m); (m) = ((void*)0); _ptr_; }); | |||
| 633 | ||||
| 634 | return 0; | |||
| 635 | } | |||
| 636 | ||||
| 637 | int manager_start(Manager *m) { | |||
| 638 | int r; | |||
| 639 | ||||
| 640 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 640, __PRETTY_FUNCTION__); } while (0); | |||
| 641 | ||||
| 642 | r = manager_dns_stub_start(m); | |||
| 643 | if (r < 0) | |||
| 644 | return r; | |||
| 645 | ||||
| 646 | return 0; | |||
| 647 | } | |||
| 648 | ||||
| 649 | Manager *manager_free(Manager *m) { | |||
| 650 | Link *l; | |||
| 651 | DnssdService *s; | |||
| 652 | ||||
| 653 | if (!m) | |||
| 654 | return NULL((void*)0); | |||
| 655 | ||||
| 656 | dns_server_unlink_all(m->dns_servers); | |||
| 657 | dns_server_unlink_all(m->fallback_dns_servers); | |||
| 658 | dns_search_domain_unlink_all(m->search_domains); | |||
| 659 | ||||
| 660 | while ((l = hashmap_first(m->links))) | |||
| 661 | link_free(l); | |||
| 662 | ||||
| 663 | while (m->dns_queries) | |||
| 664 | dns_query_free(m->dns_queries); | |||
| 665 | ||||
| 666 | dns_scope_free(m->unicast_scope); | |||
| 667 | ||||
| 668 | /* At this point only orphaned streams should remain. All others should have been freed already by their | |||
| 669 | * owners */ | |||
| 670 | while (m->dns_streams) | |||
| 671 | dns_stream_unref(m->dns_streams); | |||
| 672 | ||||
| 673 | hashmap_free(m->links); | |||
| 674 | hashmap_free(m->dns_transactions); | |||
| 675 | ||||
| 676 | sd_event_source_unref(m->network_event_source); | |||
| 677 | sd_network_monitor_unref(m->network_monitor); | |||
| 678 | ||||
| 679 | sd_netlink_unref(m->rtnl); | |||
| 680 | sd_event_source_unref(m->rtnl_event_source); | |||
| 681 | ||||
| 682 | manager_llmnr_stop(m); | |||
| 683 | manager_mdns_stop(m); | |||
| 684 | manager_dns_stub_stop(m); | |||
| 685 | ||||
| 686 | sd_bus_slot_unref(m->prepare_for_sleep_slot); | |||
| 687 | sd_bus_unref(m->bus); | |||
| 688 | ||||
| 689 | sd_event_source_unref(m->sigusr1_event_source); | |||
| 690 | sd_event_source_unref(m->sigusr2_event_source); | |||
| 691 | sd_event_source_unref(m->sigrtmin1_event_source); | |||
| 692 | ||||
| 693 | sd_event_unref(m->event); | |||
| 694 | ||||
| 695 | dns_resource_key_unref(m->llmnr_host_ipv4_key); | |||
| 696 | dns_resource_key_unref(m->llmnr_host_ipv6_key); | |||
| 697 | dns_resource_key_unref(m->mdns_host_ipv4_key); | |||
| 698 | dns_resource_key_unref(m->mdns_host_ipv6_key); | |||
| 699 | ||||
| 700 | sd_event_source_unref(m->hostname_event_source); | |||
| 701 | safe_close(m->hostname_fd); | |||
| 702 | ||||
| 703 | free(m->full_hostname); | |||
| 704 | free(m->llmnr_hostname); | |||
| 705 | free(m->mdns_hostname); | |||
| 706 | ||||
| 707 | while ((s = hashmap_first(m->dnssd_services))) | |||
| 708 | dnssd_service_free(s); | |||
| 709 | hashmap_free(m->dnssd_services); | |||
| 710 | ||||
| 711 | dns_trust_anchor_flush(&m->trust_anchor); | |||
| 712 | manager_etc_hosts_flush(m); | |||
| 713 | ||||
| 714 | return mfree(m); | |||
| 715 | } | |||
| 716 | ||||
| 717 | int manager_recv(Manager *m, int fd, DnsProtocol protocol, DnsPacket **ret) { | |||
| 718 | _cleanup_(dns_packet_unrefp)__attribute__((cleanup(dns_packet_unrefp))) DnsPacket *p = NULL((void*)0); | |||
| 719 | union { | |||
| 720 | struct cmsghdr header; /* For alignment */ | |||
| 721 | uint8_t buffer[CMSG_SPACE(MAXSIZE(struct in_pktinfo, struct in6_pktinfo))(((((sizeof(union __attribute__ ((packed)) { typeof(struct in_pktinfo ) a; typeof(struct in6_pktinfo) b; }))) + sizeof (size_t) - 1 ) & (size_t) ~(sizeof (size_t) - 1)) + (((sizeof (struct cmsghdr )) + sizeof (size_t) - 1) & (size_t) ~(sizeof (size_t) - 1 ))) | |||
| 722 | + CMSG_SPACE(int)((((int) + sizeof (size_t) - 1) & (size_t) ~(sizeof (size_t ) - 1)) + (((sizeof (struct cmsghdr)) + sizeof (size_t) - 1) & (size_t) ~(sizeof (size_t) - 1))) /* ttl/hoplimit */ | |||
| 723 | + EXTRA_CMSG_SPACE1024 /* kernel appears to require extra buffer space */]; | |||
| 724 | } control; | |||
| 725 | union sockaddr_union sa; | |||
| 726 | struct msghdr mh = {}; | |||
| 727 | struct cmsghdr *cmsg; | |||
| 728 | struct iovec iov; | |||
| 729 | ssize_t ms, l; | |||
| 730 | int r; | |||
| 731 | ||||
| 732 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 732, __PRETTY_FUNCTION__); } while (0); | |||
| 733 | assert(fd >= 0)do { if ((__builtin_expect(!!(!(fd >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd >= 0"), "../src/resolve/resolved-manager.c" , 733, __PRETTY_FUNCTION__); } while (0); | |||
| 734 | assert(ret)do { if ((__builtin_expect(!!(!(ret)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("ret"), "../src/resolve/resolved-manager.c" , 734, __PRETTY_FUNCTION__); } while (0); | |||
| 735 | ||||
| 736 | ms = next_datagram_size_fd(fd); | |||
| 737 | if (ms < 0) | |||
| 738 | return ms; | |||
| 739 | ||||
| 740 | r = dns_packet_new(&p, protocol, ms, DNS_PACKET_SIZE_MAX0xFFFFu); | |||
| 741 | if (r < 0) | |||
| 742 | return r; | |||
| 743 | ||||
| 744 | iov.iov_base = DNS_PACKET_DATA(p); | |||
| 745 | iov.iov_len = p->allocated; | |||
| 746 | ||||
| 747 | mh.msg_name = &sa.sa; | |||
| 748 | mh.msg_namelen = sizeof(sa); | |||
| 749 | mh.msg_iov = &iov; | |||
| 750 | mh.msg_iovlen = 1; | |||
| 751 | mh.msg_control = &control; | |||
| 752 | mh.msg_controllen = sizeof(control); | |||
| 753 | ||||
| 754 | l = recvmsg(fd, &mh, 0); | |||
| 755 | if (l == 0) | |||
| 756 | return 0; | |||
| 757 | if (l < 0) { | |||
| 758 | if (IN_SET(errno, EAGAIN, EINTR)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){11, 4})/sizeof(int)]; switch((*__errno_location ())) { case 11: case 4: _found = 1; break; default: break; } _found; })) | |||
| 759 | return 0; | |||
| 760 | ||||
| 761 | return -errno(*__errno_location ()); | |||
| 762 | } | |||
| 763 | ||||
| 764 | assert(!(mh.msg_flags & MSG_CTRUNC))do { if ((__builtin_expect(!!(!(!(mh.msg_flags & MSG_CTRUNC ))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("!(mh.msg_flags & MSG_CTRUNC)" ), "../src/resolve/resolved-manager.c", 764, __PRETTY_FUNCTION__ ); } while (0); | |||
| 765 | assert(!(mh.msg_flags & MSG_TRUNC))do { if ((__builtin_expect(!!(!(!(mh.msg_flags & MSG_TRUNC ))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("!(mh.msg_flags & MSG_TRUNC)" ), "../src/resolve/resolved-manager.c", 765, __PRETTY_FUNCTION__ ); } while (0); | |||
| 766 | ||||
| 767 | p->size = (size_t) l; | |||
| 768 | ||||
| 769 | p->family = sa.sa.sa_family; | |||
| 770 | p->ipproto = IPPROTO_UDPIPPROTO_UDP; | |||
| 771 | if (p->family == AF_INET2) { | |||
| 772 | p->sender.in = sa.in.sin_addr; | |||
| 773 | p->sender_port = be16toh(sa.in.sin_port); | |||
| 774 | } else if (p->family == AF_INET610) { | |||
| 775 | p->sender.in6 = sa.in6.sin6_addr; | |||
| 776 | p->sender_port = be16toh(sa.in6.sin6_port); | |||
| 777 | p->ifindex = sa.in6.sin6_scope_id; | |||
| 778 | } else | |||
| 779 | return -EAFNOSUPPORT97; | |||
| 780 | ||||
| 781 | CMSG_FOREACH(cmsg, &mh)for ((cmsg) = ((size_t) (&mh)->msg_controllen >= sizeof (struct cmsghdr) ? (struct cmsghdr *) (&mh)->msg_control : (struct cmsghdr *) 0); (cmsg); (cmsg) = __cmsg_nxthdr ((& mh), (cmsg))) { | |||
| 782 | ||||
| 783 | if (cmsg->cmsg_level == IPPROTO_IPV6IPPROTO_IPV6) { | |||
| 784 | assert(p->family == AF_INET6)do { if ((__builtin_expect(!!(!(p->family == 10)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("p->family == AF_INET6"), "../src/resolve/resolved-manager.c" , 784, __PRETTY_FUNCTION__); } while (0); | |||
| 785 | ||||
| 786 | switch (cmsg->cmsg_type) { | |||
| 787 | ||||
| 788 | case IPV6_PKTINFO50: { | |||
| 789 | struct in6_pktinfo *i = (struct in6_pktinfo*) CMSG_DATA(cmsg)((cmsg)->__cmsg_data); | |||
| 790 | ||||
| 791 | if (p->ifindex <= 0) | |||
| 792 | p->ifindex = i->ipi6_ifindex; | |||
| 793 | ||||
| 794 | p->destination.in6 = i->ipi6_addr; | |||
| 795 | break; | |||
| 796 | } | |||
| 797 | ||||
| 798 | case IPV6_HOPLIMIT52: | |||
| 799 | p->ttl = *(int *) CMSG_DATA(cmsg)((cmsg)->__cmsg_data); | |||
| 800 | break; | |||
| 801 | ||||
| 802 | } | |||
| 803 | } else if (cmsg->cmsg_level == IPPROTO_IPIPPROTO_IP) { | |||
| 804 | assert(p->family == AF_INET)do { if ((__builtin_expect(!!(!(p->family == 2)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("p->family == AF_INET"), "../src/resolve/resolved-manager.c" , 804, __PRETTY_FUNCTION__); } while (0); | |||
| 805 | ||||
| 806 | switch (cmsg->cmsg_type) { | |||
| 807 | ||||
| 808 | case IP_PKTINFO8: { | |||
| 809 | struct in_pktinfo *i = (struct in_pktinfo*) CMSG_DATA(cmsg)((cmsg)->__cmsg_data); | |||
| 810 | ||||
| 811 | if (p->ifindex <= 0) | |||
| 812 | p->ifindex = i->ipi_ifindex; | |||
| 813 | ||||
| 814 | p->destination.in = i->ipi_addr; | |||
| 815 | break; | |||
| 816 | } | |||
| 817 | ||||
| 818 | case IP_TTL2: | |||
| 819 | p->ttl = *(int *) CMSG_DATA(cmsg)((cmsg)->__cmsg_data); | |||
| 820 | break; | |||
| 821 | } | |||
| 822 | } | |||
| 823 | } | |||
| 824 | ||||
| 825 | /* The Linux kernel sets the interface index to the loopback | |||
| 826 | * device if the packet came from the local host since it | |||
| 827 | * avoids the routing table in such a case. Let's unset the | |||
| 828 | * interface index in such a case. */ | |||
| 829 | if (p->ifindex == LOOPBACK_IFINDEX1) | |||
| 830 | p->ifindex = 0; | |||
| 831 | ||||
| 832 | if (protocol != DNS_PROTOCOL_DNS) { | |||
| 833 | /* If we don't know the interface index still, we look for the | |||
| 834 | * first local interface with a matching address. Yuck! */ | |||
| 835 | if (p->ifindex <= 0) | |||
| 836 | p->ifindex = manager_find_ifindex(m, p->family, &p->destination); | |||
| 837 | } | |||
| 838 | ||||
| 839 | *ret = TAKE_PTR(p)({ typeof(p) _ptr_ = (p); (p) = ((void*)0); _ptr_; }); | |||
| 840 | ||||
| 841 | return 1; | |||
| 842 | } | |||
| 843 | ||||
| 844 | static int sendmsg_loop(int fd, struct msghdr *mh, int flags) { | |||
| 845 | int r; | |||
| 846 | ||||
| 847 | assert(fd >= 0)do { if ((__builtin_expect(!!(!(fd >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd >= 0"), "../src/resolve/resolved-manager.c" , 847, __PRETTY_FUNCTION__); } while (0); | |||
| 848 | assert(mh)do { if ((__builtin_expect(!!(!(mh)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("mh"), "../src/resolve/resolved-manager.c" , 848, __PRETTY_FUNCTION__); } while (0); | |||
| 849 | ||||
| 850 | for (;;) { | |||
| 851 | if (sendmsg(fd, mh, flags) >= 0) | |||
| 852 | return 0; | |||
| 853 | ||||
| 854 | if (errno(*__errno_location ()) == EINTR4) | |||
| 855 | continue; | |||
| 856 | ||||
| 857 | if (errno(*__errno_location ()) != EAGAIN11) | |||
| 858 | return -errno(*__errno_location ()); | |||
| 859 | ||||
| 860 | r = fd_wait_for_event(fd, POLLOUT0x004, SEND_TIMEOUT_USEC(200 * ((usec_t) 1000ULL))); | |||
| 861 | if (r < 0) | |||
| 862 | return r; | |||
| 863 | if (r == 0) | |||
| 864 | return -ETIMEDOUT110; | |||
| 865 | } | |||
| 866 | } | |||
| 867 | ||||
| 868 | static int write_loop(int fd, void *message, size_t length) { | |||
| 869 | int r; | |||
| 870 | ||||
| 871 | assert(fd >= 0)do { if ((__builtin_expect(!!(!(fd >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd >= 0"), "../src/resolve/resolved-manager.c" , 871, __PRETTY_FUNCTION__); } while (0); | |||
| 872 | assert(message)do { if ((__builtin_expect(!!(!(message)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("message"), "../src/resolve/resolved-manager.c" , 872, __PRETTY_FUNCTION__); } while (0); | |||
| 873 | ||||
| 874 | for (;;) { | |||
| 875 | if (write(fd, message, length) >= 0) | |||
| 876 | return 0; | |||
| 877 | ||||
| 878 | if (errno(*__errno_location ()) == EINTR4) | |||
| 879 | continue; | |||
| 880 | ||||
| 881 | if (errno(*__errno_location ()) != EAGAIN11) | |||
| 882 | return -errno(*__errno_location ()); | |||
| 883 | ||||
| 884 | r = fd_wait_for_event(fd, POLLOUT0x004, SEND_TIMEOUT_USEC(200 * ((usec_t) 1000ULL))); | |||
| 885 | if (r < 0) | |||
| 886 | return r; | |||
| 887 | if (r == 0) | |||
| 888 | return -ETIMEDOUT110; | |||
| 889 | } | |||
| 890 | } | |||
| 891 | ||||
| 892 | int manager_write(Manager *m, int fd, DnsPacket *p) { | |||
| 893 | int r; | |||
| 894 | ||||
| 895 | log_debug("Sending %s packet with id %" PRIu16 ".", DNS_PACKET_QR(p) ? "response" : "query", DNS_PACKET_ID(p))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 895, __func__, "Sending %s packet with id %" "u" ".", ((be16toh(((DnsPacketHeader*) DNS_PACKET_DATA(p))-> flags) >> 15) & 1) ? "response" : "query", ((DnsPacketHeader *) DNS_PACKET_DATA(p))->id) : -abs(_e); }); | |||
| 896 | ||||
| 897 | r = write_loop(fd, DNS_PACKET_DATA(p), p->size); | |||
| 898 | if (r < 0) | |||
| 899 | return r; | |||
| 900 | ||||
| 901 | return 0; | |||
| 902 | } | |||
| 903 | ||||
| 904 | static int manager_ipv4_send( | |||
| 905 | Manager *m, | |||
| 906 | int fd, | |||
| 907 | int ifindex, | |||
| 908 | const struct in_addr *destination, | |||
| 909 | uint16_t port, | |||
| 910 | const struct in_addr *source, | |||
| 911 | DnsPacket *p) { | |||
| 912 | union sockaddr_union sa = { | |||
| 913 | .in.sin_family = AF_INET2, | |||
| 914 | }; | |||
| 915 | union { | |||
| 916 | struct cmsghdr header; /* For alignment */ | |||
| 917 | uint8_t buffer[CMSG_SPACE(sizeof(struct in_pktinfo))((((sizeof(struct in_pktinfo)) + sizeof (size_t) - 1) & ( size_t) ~(sizeof (size_t) - 1)) + (((sizeof (struct cmsghdr)) + sizeof (size_t) - 1) & (size_t) ~(sizeof (size_t) - 1) ))]; | |||
| 918 | } control; | |||
| 919 | struct msghdr mh = {}; | |||
| 920 | struct iovec iov; | |||
| 921 | ||||
| 922 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 922, __PRETTY_FUNCTION__); } while (0); | |||
| 923 | assert(fd >= 0)do { if ((__builtin_expect(!!(!(fd >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd >= 0"), "../src/resolve/resolved-manager.c" , 923, __PRETTY_FUNCTION__); } while (0); | |||
| 924 | assert(destination)do { if ((__builtin_expect(!!(!(destination)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("destination"), "../src/resolve/resolved-manager.c" , 924, __PRETTY_FUNCTION__); } while (0); | |||
| 925 | assert(port > 0)do { if ((__builtin_expect(!!(!(port > 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("port > 0"), "../src/resolve/resolved-manager.c" , 925, __PRETTY_FUNCTION__); } while (0); | |||
| 926 | assert(p)do { if ((__builtin_expect(!!(!(p)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("p"), "../src/resolve/resolved-manager.c" , 926, __PRETTY_FUNCTION__); } while (0); | |||
| 927 | ||||
| 928 | iov.iov_base = DNS_PACKET_DATA(p); | |||
| 929 | iov.iov_len = p->size; | |||
| 930 | ||||
| 931 | sa.in.sin_addr = *destination; | |||
| 932 | sa.in.sin_port = htobe16(port), | |||
| 933 | ||||
| 934 | mh.msg_iov = &iov; | |||
| 935 | mh.msg_iovlen = 1; | |||
| 936 | mh.msg_name = &sa.sa; | |||
| 937 | mh.msg_namelen = sizeof(sa.in); | |||
| 938 | ||||
| 939 | if (ifindex > 0) { | |||
| 940 | struct cmsghdr *cmsg; | |||
| 941 | struct in_pktinfo *pi; | |||
| 942 | ||||
| 943 | zero(control)(({ size_t _l_ = (sizeof(control)); void *_x_ = (&(control )); _l_ == 0 ? _x_ : memset(_x_, 0, _l_); })); | |||
| 944 | ||||
| 945 | mh.msg_control = &control; | |||
| 946 | mh.msg_controllen = CMSG_LEN(sizeof(struct in_pktinfo))((((sizeof (struct cmsghdr)) + sizeof (size_t) - 1) & (size_t ) ~(sizeof (size_t) - 1)) + (sizeof(struct in_pktinfo))); | |||
| 947 | ||||
| 948 | cmsg = CMSG_FIRSTHDR(&mh)((size_t) (&mh)->msg_controllen >= sizeof (struct cmsghdr ) ? (struct cmsghdr *) (&mh)->msg_control : (struct cmsghdr *) 0); | |||
| 949 | cmsg->cmsg_len = mh.msg_controllen; | |||
| 950 | cmsg->cmsg_level = IPPROTO_IPIPPROTO_IP; | |||
| 951 | cmsg->cmsg_type = IP_PKTINFO8; | |||
| 952 | ||||
| 953 | pi = (struct in_pktinfo*) CMSG_DATA(cmsg)((cmsg)->__cmsg_data); | |||
| 954 | pi->ipi_ifindex = ifindex; | |||
| 955 | ||||
| 956 | if (source) | |||
| 957 | pi->ipi_spec_dst = *source; | |||
| 958 | } | |||
| 959 | ||||
| 960 | return sendmsg_loop(fd, &mh, 0); | |||
| 961 | } | |||
| 962 | ||||
| 963 | static int manager_ipv6_send( | |||
| 964 | Manager *m, | |||
| 965 | int fd, | |||
| 966 | int ifindex, | |||
| 967 | const struct in6_addr *destination, | |||
| 968 | uint16_t port, | |||
| 969 | const struct in6_addr *source, | |||
| 970 | DnsPacket *p) { | |||
| 971 | ||||
| 972 | union sockaddr_union sa = { | |||
| 973 | .in6.sin6_family = AF_INET610, | |||
| 974 | }; | |||
| 975 | union { | |||
| 976 | struct cmsghdr header; /* For alignment */ | |||
| 977 | uint8_t buffer[CMSG_SPACE(sizeof(struct in6_pktinfo))((((sizeof(struct in6_pktinfo)) + sizeof (size_t) - 1) & ( size_t) ~(sizeof (size_t) - 1)) + (((sizeof (struct cmsghdr)) + sizeof (size_t) - 1) & (size_t) ~(sizeof (size_t) - 1) ))]; | |||
| 978 | } control; | |||
| 979 | struct msghdr mh = {}; | |||
| 980 | struct iovec iov; | |||
| 981 | ||||
| 982 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 982, __PRETTY_FUNCTION__); } while (0); | |||
| 983 | assert(fd >= 0)do { if ((__builtin_expect(!!(!(fd >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd >= 0"), "../src/resolve/resolved-manager.c" , 983, __PRETTY_FUNCTION__); } while (0); | |||
| 984 | assert(destination)do { if ((__builtin_expect(!!(!(destination)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("destination"), "../src/resolve/resolved-manager.c" , 984, __PRETTY_FUNCTION__); } while (0); | |||
| 985 | assert(port > 0)do { if ((__builtin_expect(!!(!(port > 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("port > 0"), "../src/resolve/resolved-manager.c" , 985, __PRETTY_FUNCTION__); } while (0); | |||
| 986 | assert(p)do { if ((__builtin_expect(!!(!(p)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("p"), "../src/resolve/resolved-manager.c" , 986, __PRETTY_FUNCTION__); } while (0); | |||
| 987 | ||||
| 988 | iov.iov_base = DNS_PACKET_DATA(p); | |||
| 989 | iov.iov_len = p->size; | |||
| 990 | ||||
| 991 | sa.in6.sin6_addr = *destination; | |||
| 992 | sa.in6.sin6_port = htobe16(port), | |||
| 993 | sa.in6.sin6_scope_id = ifindex; | |||
| 994 | ||||
| 995 | mh.msg_iov = &iov; | |||
| 996 | mh.msg_iovlen = 1; | |||
| 997 | mh.msg_name = &sa.sa; | |||
| 998 | mh.msg_namelen = sizeof(sa.in6); | |||
| 999 | ||||
| 1000 | if (ifindex > 0) { | |||
| 1001 | struct cmsghdr *cmsg; | |||
| 1002 | struct in6_pktinfo *pi; | |||
| 1003 | ||||
| 1004 | zero(control)(({ size_t _l_ = (sizeof(control)); void *_x_ = (&(control )); _l_ == 0 ? _x_ : memset(_x_, 0, _l_); })); | |||
| 1005 | ||||
| 1006 | mh.msg_control = &control; | |||
| 1007 | mh.msg_controllen = CMSG_LEN(sizeof(struct in6_pktinfo))((((sizeof (struct cmsghdr)) + sizeof (size_t) - 1) & (size_t ) ~(sizeof (size_t) - 1)) + (sizeof(struct in6_pktinfo))); | |||
| 1008 | ||||
| 1009 | cmsg = CMSG_FIRSTHDR(&mh)((size_t) (&mh)->msg_controllen >= sizeof (struct cmsghdr ) ? (struct cmsghdr *) (&mh)->msg_control : (struct cmsghdr *) 0); | |||
| 1010 | cmsg->cmsg_len = mh.msg_controllen; | |||
| 1011 | cmsg->cmsg_level = IPPROTO_IPV6IPPROTO_IPV6; | |||
| 1012 | cmsg->cmsg_type = IPV6_PKTINFO50; | |||
| 1013 | ||||
| 1014 | pi = (struct in6_pktinfo*) CMSG_DATA(cmsg)((cmsg)->__cmsg_data); | |||
| 1015 | pi->ipi6_ifindex = ifindex; | |||
| 1016 | ||||
| 1017 | if (source) | |||
| 1018 | pi->ipi6_addr = *source; | |||
| 1019 | } | |||
| 1020 | ||||
| 1021 | return sendmsg_loop(fd, &mh, 0); | |||
| 1022 | } | |||
| 1023 | ||||
| 1024 | int manager_send( | |||
| 1025 | Manager *m, | |||
| 1026 | int fd, | |||
| 1027 | int ifindex, | |||
| 1028 | int family, | |||
| 1029 | const union in_addr_union *destination, | |||
| 1030 | uint16_t port, | |||
| 1031 | const union in_addr_union *source, | |||
| 1032 | DnsPacket *p) { | |||
| 1033 | ||||
| 1034 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1034, __PRETTY_FUNCTION__); } while (0); | |||
| 1035 | assert(fd >= 0)do { if ((__builtin_expect(!!(!(fd >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd >= 0"), "../src/resolve/resolved-manager.c" , 1035, __PRETTY_FUNCTION__); } while (0); | |||
| 1036 | assert(destination)do { if ((__builtin_expect(!!(!(destination)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("destination"), "../src/resolve/resolved-manager.c" , 1036, __PRETTY_FUNCTION__); } while (0); | |||
| 1037 | assert(port > 0)do { if ((__builtin_expect(!!(!(port > 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("port > 0"), "../src/resolve/resolved-manager.c" , 1037, __PRETTY_FUNCTION__); } while (0); | |||
| 1038 | assert(p)do { if ((__builtin_expect(!!(!(p)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("p"), "../src/resolve/resolved-manager.c" , 1038, __PRETTY_FUNCTION__); } while (0); | |||
| 1039 | ||||
| 1040 | log_debug("Sending %s packet with id %" PRIu16 " on interface %i/%s.", DNS_PACKET_QR(p) ? "response" : "query", DNS_PACKET_ID(p), ifindex, af_to_name(family))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 1040, __func__, "Sending %s packet with id %" "u" " on interface %i/%s.", ((be16toh(((DnsPacketHeader*) DNS_PACKET_DATA (p))->flags) >> 15) & 1) ? "response" : "query", ((DnsPacketHeader*) DNS_PACKET_DATA(p))->id, ifindex, af_to_name (family)) : -abs(_e); }); | |||
| 1041 | ||||
| 1042 | if (family == AF_INET2) | |||
| 1043 | return manager_ipv4_send(m, fd, ifindex, &destination->in, port, &source->in, p); | |||
| 1044 | if (family == AF_INET610) | |||
| 1045 | return manager_ipv6_send(m, fd, ifindex, &destination->in6, port, &source->in6, p); | |||
| 1046 | ||||
| 1047 | return -EAFNOSUPPORT97; | |||
| 1048 | } | |||
| 1049 | ||||
| 1050 | uint32_t manager_find_mtu(Manager *m) { | |||
| 1051 | uint32_t mtu = 0; | |||
| 1052 | Link *l; | |||
| 1053 | Iterator i; | |||
| 1054 | ||||
| 1055 | /* If we don't know on which link a DNS packet would be | |||
| 1056 | * delivered, let's find the largest MTU that works on all | |||
| 1057 | * interfaces we know of */ | |||
| 1058 | ||||
| 1059 | HASHMAP_FOREACH(l, m->links, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); hashmap_iterate((m->links), & (i), (void**)&(l), ((void*)0)); ) { | |||
| 1060 | if (l->mtu <= 0) | |||
| 1061 | continue; | |||
| 1062 | ||||
| 1063 | if (mtu <= 0 || l->mtu < mtu) | |||
| 1064 | mtu = l->mtu; | |||
| 1065 | } | |||
| 1066 | ||||
| 1067 | return mtu; | |||
| 1068 | } | |||
| 1069 | ||||
| 1070 | int manager_find_ifindex(Manager *m, int family, const union in_addr_union *in_addr) { | |||
| 1071 | LinkAddress *a; | |||
| 1072 | ||||
| 1073 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1073, __PRETTY_FUNCTION__); } while (0); | |||
| 1074 | ||||
| 1075 | a = manager_find_link_address(m, family, in_addr); | |||
| 1076 | if (a) | |||
| 1077 | return a->link->ifindex; | |||
| 1078 | ||||
| 1079 | return 0; | |||
| 1080 | } | |||
| 1081 | ||||
| 1082 | void manager_refresh_rrs(Manager *m) { | |||
| 1083 | Iterator i; | |||
| 1084 | Link *l; | |||
| 1085 | DnssdService *s; | |||
| 1086 | ||||
| 1087 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1087, __PRETTY_FUNCTION__); } while (0); | |||
| 1088 | ||||
| 1089 | m->llmnr_host_ipv4_key = dns_resource_key_unref(m->llmnr_host_ipv4_key); | |||
| 1090 | m->llmnr_host_ipv6_key = dns_resource_key_unref(m->llmnr_host_ipv6_key); | |||
| 1091 | m->mdns_host_ipv4_key = dns_resource_key_unref(m->mdns_host_ipv4_key); | |||
| 1092 | m->mdns_host_ipv6_key = dns_resource_key_unref(m->mdns_host_ipv6_key); | |||
| 1093 | ||||
| 1094 | if (m->mdns_support == RESOLVE_SUPPORT_YES) | |||
| 1095 | HASHMAP_FOREACH(s, m->dnssd_services, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); hashmap_iterate((m->dnssd_services ), &(i), (void**)&(s), ((void*)0)); ) | |||
| 1096 | if (dnssd_update_rrs(s) < 0) | |||
| 1097 | log_warning("Failed to refresh DNS-SD service '%s'", s->name)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 1097, __func__, "Failed to refresh DNS-SD service '%s'" , s->name) : -abs(_e); }); | |||
| 1098 | ||||
| 1099 | HASHMAP_FOREACH(l, m->links, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); hashmap_iterate((m->links), & (i), (void**)&(l), ((void*)0)); ) { | |||
| 1100 | link_add_rrs(l, true1); | |||
| 1101 | link_add_rrs(l, false0); | |||
| 1102 | } | |||
| 1103 | } | |||
| 1104 | ||||
| 1105 | static int manager_next_random_name(const char *old, char **ret_new) { | |||
| 1106 | const char *p; | |||
| 1107 | uint64_t u, a; | |||
| 1108 | char *n; | |||
| 1109 | ||||
| 1110 | p = strchr(old, 0); | |||
| 1111 | assert(p)do { if ((__builtin_expect(!!(!(p)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("p"), "../src/resolve/resolved-manager.c" , 1111, __PRETTY_FUNCTION__); } while (0); | |||
| 1112 | ||||
| 1113 | while (p > old) { | |||
| 1114 | if (!strchr(DIGITS"0123456789", p[-1])) | |||
| 1115 | break; | |||
| 1116 | ||||
| 1117 | p--; | |||
| 1118 | } | |||
| 1119 | ||||
| 1120 | if (*p == 0 || safe_atou64(p, &u) < 0 || u <= 0) | |||
| 1121 | u = 1; | |||
| 1122 | ||||
| 1123 | /* Add a random number to the old value. This way we can avoid | |||
| 1124 | * that two hosts pick the same hostname, win on IPv4 and lose | |||
| 1125 | * on IPv6 (or vice versa), and pick the same hostname | |||
| 1126 | * replacement hostname, ad infinitum. We still want the | |||
| 1127 | * numbers to go up monotonically, hence we just add a random | |||
| 1128 | * value 1..10 */ | |||
| 1129 | ||||
| 1130 | random_bytes(&a, sizeof(a)); | |||
| 1131 | u += 1 + a % 10; | |||
| 1132 | ||||
| 1133 | if (asprintf(&n, "%.*s%" PRIu64"l" "u", (int) (p - old), old, u) < 0) | |||
| 1134 | return -ENOMEM12; | |||
| 1135 | ||||
| 1136 | *ret_new = n; | |||
| 1137 | ||||
| 1138 | return 0; | |||
| 1139 | } | |||
| 1140 | ||||
| 1141 | int manager_next_hostname(Manager *m) { | |||
| 1142 | _cleanup_free___attribute__((cleanup(freep))) char *h = NULL((void*)0), *k = NULL((void*)0); | |||
| 1143 | int r; | |||
| 1144 | ||||
| 1145 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1145, __PRETTY_FUNCTION__); } while (0); | |||
| 1146 | ||||
| 1147 | r = manager_next_random_name(m->llmnr_hostname, &h); | |||
| 1148 | if (r < 0) | |||
| 1149 | return r; | |||
| 1150 | ||||
| 1151 | r = dns_name_concat(h, "local", &k); | |||
| 1152 | if (r < 0) | |||
| 1153 | return r; | |||
| 1154 | ||||
| 1155 | log_info("Hostname conflict, changing published hostname from '%s' to '%s'.", m->llmnr_hostname, h)({ int _level = (((6))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 1155, __func__, "Hostname conflict, changing published hostname from '%s' to '%s'." , m->llmnr_hostname, h) : -abs(_e); }); | |||
| 1156 | ||||
| 1157 | free_and_replace(m->llmnr_hostname, h)({ free(m->llmnr_hostname); (m->llmnr_hostname) = (h); ( h) = ((void*)0); 0; }); | |||
| 1158 | free_and_replace(m->mdns_hostname, k)({ free(m->mdns_hostname); (m->mdns_hostname) = (k); (k ) = ((void*)0); 0; }); | |||
| 1159 | ||||
| 1160 | manager_refresh_rrs(m); | |||
| 1161 | ||||
| 1162 | return 0; | |||
| 1163 | } | |||
| 1164 | ||||
| 1165 | LinkAddress* manager_find_link_address(Manager *m, int family, const union in_addr_union *in_addr) { | |||
| 1166 | Iterator i; | |||
| 1167 | Link *l; | |||
| 1168 | ||||
| 1169 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1169, __PRETTY_FUNCTION__); } while (0); | |||
| 1170 | ||||
| 1171 | HASHMAP_FOREACH(l, m->links, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); hashmap_iterate((m->links), & (i), (void**)&(l), ((void*)0)); ) { | |||
| 1172 | LinkAddress *a; | |||
| 1173 | ||||
| 1174 | a = link_find_address(l, family, in_addr); | |||
| 1175 | if (a) | |||
| 1176 | return a; | |||
| 1177 | } | |||
| 1178 | ||||
| 1179 | return NULL((void*)0); | |||
| 1180 | } | |||
| 1181 | ||||
| 1182 | bool_Bool manager_our_packet(Manager *m, DnsPacket *p) { | |||
| 1183 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1183, __PRETTY_FUNCTION__); } while (0); | |||
| 1184 | assert(p)do { if ((__builtin_expect(!!(!(p)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("p"), "../src/resolve/resolved-manager.c" , 1184, __PRETTY_FUNCTION__); } while (0); | |||
| 1185 | ||||
| 1186 | return !!manager_find_link_address(m, p->family, &p->sender); | |||
| 1187 | } | |||
| 1188 | ||||
| 1189 | DnsScope* manager_find_scope(Manager *m, DnsPacket *p) { | |||
| 1190 | Link *l; | |||
| 1191 | ||||
| 1192 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1192, __PRETTY_FUNCTION__); } while (0); | |||
| 1193 | assert(p)do { if ((__builtin_expect(!!(!(p)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("p"), "../src/resolve/resolved-manager.c" , 1193, __PRETTY_FUNCTION__); } while (0); | |||
| 1194 | ||||
| 1195 | l = hashmap_get(m->links, INT_TO_PTR(p->ifindex)((void *) ((intptr_t) (p->ifindex)))); | |||
| 1196 | if (!l) | |||
| 1197 | return NULL((void*)0); | |||
| 1198 | ||||
| 1199 | switch (p->protocol) { | |||
| 1200 | case DNS_PROTOCOL_LLMNR: | |||
| 1201 | if (p->family == AF_INET2) | |||
| 1202 | return l->llmnr_ipv4_scope; | |||
| 1203 | else if (p->family == AF_INET610) | |||
| 1204 | return l->llmnr_ipv6_scope; | |||
| 1205 | ||||
| 1206 | break; | |||
| 1207 | ||||
| 1208 | case DNS_PROTOCOL_MDNS: | |||
| 1209 | if (p->family == AF_INET2) | |||
| 1210 | return l->mdns_ipv4_scope; | |||
| 1211 | else if (p->family == AF_INET610) | |||
| 1212 | return l->mdns_ipv6_scope; | |||
| 1213 | ||||
| 1214 | break; | |||
| 1215 | ||||
| 1216 | default: | |||
| 1217 | break; | |||
| 1218 | } | |||
| 1219 | ||||
| 1220 | return NULL((void*)0); | |||
| 1221 | } | |||
| 1222 | ||||
| 1223 | void manager_verify_all(Manager *m) { | |||
| 1224 | DnsScope *s; | |||
| 1225 | ||||
| 1226 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1226, __PRETTY_FUNCTION__); } while (0); | |||
| 1227 | ||||
| 1228 | LIST_FOREACH(scopes, s, m->dns_scopes)for ((s) = (m->dns_scopes); (s); (s) = (s)->scopes_next ) | |||
| 1229 | dns_zone_verify_all(&s->zone); | |||
| 1230 | } | |||
| 1231 | ||||
| 1232 | int manager_is_own_hostname(Manager *m, const char *name) { | |||
| 1233 | int r; | |||
| 1234 | ||||
| 1235 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1235, __PRETTY_FUNCTION__); } while (0); | |||
| 1236 | assert(name)do { if ((__builtin_expect(!!(!(name)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("name"), "../src/resolve/resolved-manager.c" , 1236, __PRETTY_FUNCTION__); } while (0); | |||
| 1237 | ||||
| 1238 | if (m->llmnr_hostname) { | |||
| 1239 | r = dns_name_equal(name, m->llmnr_hostname); | |||
| 1240 | if (r != 0) | |||
| 1241 | return r; | |||
| 1242 | } | |||
| 1243 | ||||
| 1244 | if (m->mdns_hostname) { | |||
| 1245 | r = dns_name_equal(name, m->mdns_hostname); | |||
| 1246 | if (r != 0) | |||
| 1247 | return r; | |||
| 1248 | } | |||
| 1249 | ||||
| 1250 | if (m->full_hostname) | |||
| 1251 | return dns_name_equal(name, m->full_hostname); | |||
| 1252 | ||||
| 1253 | return 0; | |||
| 1254 | } | |||
| 1255 | ||||
| 1256 | int manager_compile_dns_servers(Manager *m, OrderedSet **dns) { | |||
| 1257 | DnsServer *s; | |||
| 1258 | Iterator i; | |||
| 1259 | Link *l; | |||
| 1260 | int r; | |||
| 1261 | ||||
| 1262 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1262, __PRETTY_FUNCTION__); } while (0); | |||
| 1263 | assert(dns)do { if ((__builtin_expect(!!(!(dns)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("dns"), "../src/resolve/resolved-manager.c" , 1263, __PRETTY_FUNCTION__); } while (0); | |||
| 1264 | ||||
| 1265 | r = ordered_set_ensure_allocated(dns, &dns_server_hash_ops); | |||
| 1266 | if (r < 0) | |||
| 1267 | return r; | |||
| 1268 | ||||
| 1269 | /* First add the system-wide servers and domains */ | |||
| 1270 | LIST_FOREACH(servers, s, m->dns_servers)for ((s) = (m->dns_servers); (s); (s) = (s)->servers_next ) { | |||
| 1271 | r = ordered_set_put(*dns, s); | |||
| 1272 | if (r == -EEXIST17) | |||
| 1273 | continue; | |||
| 1274 | if (r < 0) | |||
| 1275 | return r; | |||
| 1276 | } | |||
| 1277 | ||||
| 1278 | /* Then, add the per-link servers */ | |||
| 1279 | HASHMAP_FOREACH(l, m->links, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); hashmap_iterate((m->links), & (i), (void**)&(l), ((void*)0)); ) { | |||
| 1280 | LIST_FOREACH(servers, s, l->dns_servers)for ((s) = (l->dns_servers); (s); (s) = (s)->servers_next ) { | |||
| 1281 | r = ordered_set_put(*dns, s); | |||
| 1282 | if (r == -EEXIST17) | |||
| 1283 | continue; | |||
| 1284 | if (r < 0) | |||
| 1285 | return r; | |||
| 1286 | } | |||
| 1287 | } | |||
| 1288 | ||||
| 1289 | /* If we found nothing, add the fallback servers */ | |||
| 1290 | if (ordered_set_isempty(*dns)) { | |||
| 1291 | LIST_FOREACH(servers, s, m->fallback_dns_servers)for ((s) = (m->fallback_dns_servers); (s); (s) = (s)->servers_next ) { | |||
| 1292 | r = ordered_set_put(*dns, s); | |||
| 1293 | if (r == -EEXIST17) | |||
| 1294 | continue; | |||
| 1295 | if (r < 0) | |||
| 1296 | return r; | |||
| 1297 | } | |||
| 1298 | } | |||
| 1299 | ||||
| 1300 | return 0; | |||
| 1301 | } | |||
| 1302 | ||||
| 1303 | /* filter_route is a tri-state: | |||
| 1304 | * < 0: no filtering | |||
| 1305 | * = 0 or false: return only domains which should be used for searching | |||
| 1306 | * > 0 or true: return only domains which are for routing only | |||
| 1307 | */ | |||
| 1308 | int manager_compile_search_domains(Manager *m, OrderedSet **domains, int filter_route) { | |||
| 1309 | DnsSearchDomain *d; | |||
| 1310 | Iterator i; | |||
| 1311 | Link *l; | |||
| 1312 | int r; | |||
| 1313 | ||||
| 1314 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1314, __PRETTY_FUNCTION__); } while (0); | |||
| 1315 | assert(domains)do { if ((__builtin_expect(!!(!(domains)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("domains"), "../src/resolve/resolved-manager.c" , 1315, __PRETTY_FUNCTION__); } while (0); | |||
| 1316 | ||||
| 1317 | r = ordered_set_ensure_allocated(domains, &dns_name_hash_ops); | |||
| 1318 | if (r < 0) | |||
| 1319 | return r; | |||
| 1320 | ||||
| 1321 | LIST_FOREACH(domains, d, m->search_domains)for ((d) = (m->search_domains); (d); (d) = (d)->domains_next ) { | |||
| 1322 | ||||
| 1323 | if (filter_route >= 0 && | |||
| 1324 | d->route_only != !!filter_route) | |||
| 1325 | continue; | |||
| 1326 | ||||
| 1327 | r = ordered_set_put(*domains, d->name); | |||
| 1328 | if (r == -EEXIST17) | |||
| 1329 | continue; | |||
| 1330 | if (r < 0) | |||
| 1331 | return r; | |||
| 1332 | } | |||
| 1333 | ||||
| 1334 | HASHMAP_FOREACH(l, m->links, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); hashmap_iterate((m->links), & (i), (void**)&(l), ((void*)0)); ) { | |||
| 1335 | ||||
| 1336 | LIST_FOREACH(domains, d, l->search_domains)for ((d) = (l->search_domains); (d); (d) = (d)->domains_next ) { | |||
| 1337 | ||||
| 1338 | if (filter_route >= 0 && | |||
| 1339 | d->route_only != !!filter_route) | |||
| 1340 | continue; | |||
| 1341 | ||||
| 1342 | r = ordered_set_put(*domains, d->name); | |||
| 1343 | if (r == -EEXIST17) | |||
| 1344 | continue; | |||
| 1345 | if (r < 0) | |||
| 1346 | return r; | |||
| 1347 | } | |||
| 1348 | } | |||
| 1349 | ||||
| 1350 | return 0; | |||
| 1351 | } | |||
| 1352 | ||||
| 1353 | DnssecMode manager_get_dnssec_mode(Manager *m) { | |||
| 1354 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1354, __PRETTY_FUNCTION__); } while (0); | |||
| 1355 | ||||
| 1356 | if (m->dnssec_mode != _DNSSEC_MODE_INVALID) | |||
| 1357 | return m->dnssec_mode; | |||
| 1358 | ||||
| 1359 | return DNSSEC_NO; | |||
| 1360 | } | |||
| 1361 | ||||
| 1362 | bool_Bool manager_dnssec_supported(Manager *m) { | |||
| 1363 | DnsServer *server; | |||
| 1364 | Iterator i; | |||
| 1365 | Link *l; | |||
| 1366 | ||||
| 1367 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1367, __PRETTY_FUNCTION__); } while (0); | |||
| 1368 | ||||
| 1369 | if (manager_get_dnssec_mode(m) == DNSSEC_NO) | |||
| 1370 | return false0; | |||
| 1371 | ||||
| 1372 | server = manager_get_dns_server(m); | |||
| 1373 | if (server && !dns_server_dnssec_supported(server)) | |||
| 1374 | return false0; | |||
| 1375 | ||||
| 1376 | HASHMAP_FOREACH(l, m->links, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); hashmap_iterate((m->links), & (i), (void**)&(l), ((void*)0)); ) | |||
| 1377 | if (!link_dnssec_supported(l)) | |||
| 1378 | return false0; | |||
| 1379 | ||||
| 1380 | return true1; | |||
| 1381 | } | |||
| 1382 | ||||
| 1383 | DnsOverTlsMode manager_get_dns_over_tls_mode(Manager *m) { | |||
| 1384 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1384, __PRETTY_FUNCTION__); } while (0); | |||
| 1385 | ||||
| 1386 | if (m->dns_over_tls_mode != _DNS_OVER_TLS_MODE_INVALID) | |||
| 1387 | return m->dns_over_tls_mode; | |||
| 1388 | ||||
| 1389 | return DNS_OVER_TLS_NO; | |||
| 1390 | } | |||
| 1391 | ||||
| 1392 | void manager_dnssec_verdict(Manager *m, DnssecVerdict verdict, const DnsResourceKey *key) { | |||
| 1393 | ||||
| 1394 | assert(verdict >= 0)do { if ((__builtin_expect(!!(!(verdict >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("verdict >= 0"), "../src/resolve/resolved-manager.c" , 1394, __PRETTY_FUNCTION__); } while (0); | |||
| 1395 | assert(verdict < _DNSSEC_VERDICT_MAX)do { if ((__builtin_expect(!!(!(verdict < _DNSSEC_VERDICT_MAX )),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("verdict < _DNSSEC_VERDICT_MAX" ), "../src/resolve/resolved-manager.c", 1395, __PRETTY_FUNCTION__ ); } while (0); | |||
| 1396 | ||||
| 1397 | if (DEBUG_LOGGING(__builtin_expect(!!(log_get_max_level_realm(LOG_REALM_SYSTEMD ) >= 7),0))) { | |||
| 1398 | char s[DNS_RESOURCE_KEY_STRING_MAX((sizeof "CLASS" + (2+(sizeof(uint16_t) <= 1 ? 3 : sizeof( uint16_t) <= 2 ? 5 : sizeof(uint16_t) <= 4 ? 10 : sizeof (uint16_t) <= 8 ? 20 : sizeof(int[-2*(sizeof(uint16_t) > 8)])))) + (sizeof "CLASS" + (2+(sizeof(uint16_t) <= 1 ? 3 : sizeof(uint16_t) <= 2 ? 5 : sizeof(uint16_t) <= 4 ? 10 : sizeof(uint16_t) <= 8 ? 20 : sizeof(int[-2*(sizeof(uint16_t ) > 8)])))) + 253 + 1)]; | |||
| 1399 | ||||
| 1400 | log_debug("Found verdict for lookup %s: %s",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 1402, __func__, "Found verdict for lookup %s: %s" , dns_resource_key_to_string(key, s, sizeof s), dnssec_verdict_to_string (verdict)) : -abs(_e); }) | |||
| 1401 | dns_resource_key_to_string(key, s, sizeof s),({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 1402, __func__, "Found verdict for lookup %s: %s" , dns_resource_key_to_string(key, s, sizeof s), dnssec_verdict_to_string (verdict)) : -abs(_e); }) | |||
| 1402 | dnssec_verdict_to_string(verdict))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 1402, __func__, "Found verdict for lookup %s: %s" , dns_resource_key_to_string(key, s, sizeof s), dnssec_verdict_to_string (verdict)) : -abs(_e); }); | |||
| 1403 | } | |||
| 1404 | ||||
| 1405 | m->n_dnssec_verdict[verdict]++; | |||
| 1406 | } | |||
| 1407 | ||||
| 1408 | bool_Bool manager_routable(Manager *m, int family) { | |||
| 1409 | Iterator i; | |||
| 1410 | Link *l; | |||
| 1411 | ||||
| 1412 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1412, __PRETTY_FUNCTION__); } while (0); | |||
| 1413 | ||||
| 1414 | /* Returns true if the host has at least one interface with a routable address of the specified type */ | |||
| 1415 | ||||
| 1416 | HASHMAP_FOREACH(l, m->links, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); hashmap_iterate((m->links), & (i), (void**)&(l), ((void*)0)); ) | |||
| 1417 | if (link_relevant(l, family, false0)) | |||
| 1418 | return true1; | |||
| 1419 | ||||
| 1420 | return false0; | |||
| 1421 | } | |||
| 1422 | ||||
| 1423 | void manager_flush_caches(Manager *m) { | |||
| 1424 | DnsScope *scope; | |||
| 1425 | ||||
| 1426 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1426, __PRETTY_FUNCTION__); } while (0); | |||
| 1427 | ||||
| 1428 | LIST_FOREACH(scopes, scope, m->dns_scopes)for ((scope) = (m->dns_scopes); (scope); (scope) = (scope) ->scopes_next) | |||
| 1429 | dns_cache_flush(&scope->cache); | |||
| 1430 | ||||
| 1431 | log_info("Flushed all caches.")({ int _level = (((6))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 1431, __func__, "Flushed all caches." ) : -abs(_e); }); | |||
| 1432 | } | |||
| 1433 | ||||
| 1434 | void manager_reset_server_features(Manager *m) { | |||
| 1435 | Iterator i; | |||
| 1436 | Link *l; | |||
| 1437 | ||||
| 1438 | dns_server_reset_features_all(m->dns_servers); | |||
| 1439 | dns_server_reset_features_all(m->fallback_dns_servers); | |||
| 1440 | ||||
| 1441 | HASHMAP_FOREACH(l, m->links, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); hashmap_iterate((m->links), & (i), (void**)&(l), ((void*)0)); ) | |||
| 1442 | dns_server_reset_features_all(l->dns_servers); | |||
| 1443 | ||||
| 1444 | log_info("Resetting learnt feature levels on all servers.")({ int _level = (((6))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 1444, __func__, "Resetting learnt feature levels on all servers." ) : -abs(_e); }); | |||
| 1445 | } | |||
| 1446 | ||||
| 1447 | void manager_cleanup_saved_user(Manager *m) { | |||
| 1448 | _cleanup_closedir___attribute__((cleanup(closedirp))) DIR *d = NULL((void*)0); | |||
| 1449 | struct dirent *de; | |||
| 1450 | int r; | |||
| 1451 | ||||
| 1452 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1452, __PRETTY_FUNCTION__); } while (0); | |||
| 1453 | ||||
| 1454 | /* Clean up all saved per-link files in /run/systemd/resolve/netif/ that don't have a matching interface | |||
| 1455 | * anymore. These files are created to persist settings pushed in by the user via the bus, so that resolved can | |||
| 1456 | * be restarted without losing this data. */ | |||
| 1457 | ||||
| 1458 | d = opendir("/run/systemd/resolve/netif/"); | |||
| 1459 | if (!d) { | |||
| 1460 | if (errno(*__errno_location ()) == ENOENT2) | |||
| 1461 | return; | |||
| 1462 | ||||
| 1463 | log_warning_errno(errno, "Failed to open interface directory: %m")({ int _level = ((4)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/resolve/resolved-manager.c", 1463 , __func__, "Failed to open interface directory: %m") : -abs( _e); }); | |||
| 1464 | return; | |||
| 1465 | } | |||
| 1466 | ||||
| 1467 | FOREACH_DIRENT_ALL(de, d, log_error_errno(errno, "Failed to read interface directory: %m"))for ((*__errno_location ()) = 0, de = readdir(d);; (*__errno_location ()) = 0, de = readdir(d)) if (!de) { if ((*__errno_location ( )) > 0) { ({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/resolve/resolved-manager.c" , 1467, __func__, "Failed to read interface directory: %m") : -abs(_e); }); } break; } else { | |||
| 1468 | _cleanup_free___attribute__((cleanup(freep))) char *p = NULL((void*)0); | |||
| 1469 | int ifindex; | |||
| 1470 | Link *l; | |||
| 1471 | ||||
| 1472 | if (!IN_SET(de->d_type, DT_UNKNOWN, DT_REG)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){DT_UNKNOWN, DT_REG})/sizeof(int)]; switch (de->d_type) { case DT_UNKNOWN: case DT_REG: _found = 1; break ; default: break; } _found; })) | |||
| 1473 | continue; | |||
| 1474 | ||||
| 1475 | if (dot_or_dot_dot(de->d_name)) | |||
| 1476 | continue; | |||
| 1477 | ||||
| 1478 | r = parse_ifindex(de->d_name, &ifindex); | |||
| 1479 | if (r < 0) /* Probably some temporary file from a previous run. Delete it */ | |||
| 1480 | goto rm; | |||
| 1481 | ||||
| 1482 | l = hashmap_get(m->links, INT_TO_PTR(ifindex)((void *) ((intptr_t) (ifindex)))); | |||
| 1483 | if (!l) /* link vanished */ | |||
| 1484 | goto rm; | |||
| 1485 | ||||
| 1486 | if (l->is_managed) /* now managed by networkd, hence the bus settings are useless */ | |||
| 1487 | goto rm; | |||
| 1488 | ||||
| 1489 | continue; | |||
| 1490 | ||||
| 1491 | rm: | |||
| 1492 | p = strappend("/run/systemd/resolve/netif/", de->d_name); | |||
| 1493 | if (!p) { | |||
| 1494 | log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/resolve/resolved-manager.c" , 1494, __func__); | |||
| 1495 | return; | |||
| 1496 | } | |||
| 1497 | ||||
| 1498 | (void) unlink(p); | |||
| 1499 | } | |||
| 1500 | } | |||
| 1501 | ||||
| 1502 | bool_Bool manager_next_dnssd_names(Manager *m) { | |||
| 1503 | Iterator i; | |||
| 1504 | DnssdService *s; | |||
| 1505 | bool_Bool tried = false0; | |||
| 1506 | int r; | |||
| 1507 | ||||
| 1508 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-manager.c" , 1508, __PRETTY_FUNCTION__); } while (0); | |||
| 1509 | ||||
| 1510 | HASHMAP_FOREACH(s, m->dnssd_services, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); hashmap_iterate((m->dnssd_services ), &(i), (void**)&(s), ((void*)0)); ) { | |||
| 1511 | _cleanup_free___attribute__((cleanup(freep))) char * new_name = NULL((void*)0); | |||
| 1512 | ||||
| 1513 | if (!s->withdrawn) | |||
| 1514 | continue; | |||
| 1515 | ||||
| 1516 | r = manager_next_random_name(s->name_template, &new_name); | |||
| 1517 | if (r < 0) { | |||
| 1518 | log_warning_errno(r, "Failed to get new name for service '%s': %m", s->name)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-manager.c", 1518, __func__, "Failed to get new name for service '%s': %m" , s->name) : -abs(_e); }); | |||
| 1519 | continue; | |||
| 1520 | } | |||
| 1521 | ||||
| 1522 | free_and_replace(s->name_template, new_name)({ free(s->name_template); (s->name_template) = (new_name ); (new_name) = ((void*)0); 0; }); | |||
| 1523 | ||||
| 1524 | s->withdrawn = false0; | |||
| 1525 | ||||
| 1526 | tried = true1; | |||
| 1527 | } | |||
| 1528 | ||||
| 1529 | if (tried) | |||
| 1530 | manager_refresh_rrs(m); | |||
| 1531 | ||||
| 1532 | return tried; | |||
| 1533 | } |