diff options
author | Denis Vlasenko <vda.linux@googlemail.com> | 2008-11-16 04:07:16 +0000 |
---|---|---|
committer | Denis Vlasenko <vda.linux@googlemail.com> | 2008-11-16 04:07:16 +0000 |
commit | 1a82a7130a61eb7c072217447a20d9a65c4b308b (patch) | |
tree | 3b84742b1b577e5101366d1e9b54e6bb81f95a09 /libc | |
parent | ade760af3cb1bd8f3e1f6ac1b1fdc936d667c2a1 (diff) |
resolver: make getaddrinfo actually respect _res.nsaddr_list;
add largish comment explaining what we are doing, and why;
fixes to make IPv6-only resolver possible
Diffstat (limited to 'libc')
-rw-r--r-- | libc/inet/Makefile.in | 4 | ||||
-rw-r--r-- | libc/inet/resolv.c | 537 |
2 files changed, 337 insertions, 204 deletions
diff --git a/libc/inet/Makefile.in b/libc/inet/Makefile.in index f905c8e35..f6ee48f9d 100644 --- a/libc/inet/Makefile.in +++ b/libc/inet/Makefile.in @@ -43,8 +43,8 @@ resolv_CSRC += encodeh.c decodeh.c encoded.c decoded.c lengthd.c encodeq.c \ ifneq ($(UCLIBC_HAS_IPV4)$(UCLIBC_HAS_IPV6),) CSRC += $(resolv_CSRC) -# unused ATM -CSRC += encodep.c decodep.c formquery.c +## # unused ATM +## CSRC += encodep.c decodep.c formquery.c endif diff --git a/libc/inet/resolv.c b/libc/inet/resolv.c index a84c6af1f..defd4d77c 100644 --- a/libc/inet/resolv.c +++ b/libc/inet/resolv.c @@ -183,6 +183,7 @@ libc_hidden_proto(fopen) libc_hidden_proto(fclose) libc_hidden_proto(random) libc_hidden_proto(getservbyport) +libc_hidden_proto(gethostname) libc_hidden_proto(uname) libc_hidden_proto(inet_addr) libc_hidden_proto(inet_aton) @@ -298,8 +299,10 @@ typedef union sockaddr46_t { __UCLIBC_MUTEX_EXTERN(__resolv_lock); /* Protected by __resolv_lock */ -extern int __nameservers attribute_hidden; -extern int __searchdomains attribute_hidden; +extern void (*__res_sync)(void) attribute_hidden; +//extern uint32_t __resolv_opts attribute_hidden; +extern unsigned __nameservers attribute_hidden; +extern unsigned __searchdomains attribute_hidden; extern sockaddr46_t *__nameserver attribute_hidden; extern char **__searchdomain attribute_hidden; /* Arbitrary */ @@ -348,6 +351,90 @@ extern void __close_nameservers(void) attribute_hidden; extern int __dn_expand(const u_char *, const u_char *, const u_char *, char *, int); +/* + * Theory of operation. + * + * gethostbyname, getaddrinfo and friends end up here, and they sometimes + * need to talk to DNS servers. In order to do this, we need to read /etc/resolv.conf + * and determine servers' addresses and the like. resolv.conf format: + * + * nameserver <IP[v6]> + * Address of DNS server. Cumulative. + * If not specified, assumed to be on localhost. + * search <domain1>[ <domain2>]... + * Append these domains to unqualified names. + * See ndots:n option. + * $LOCALDOMAIN (space-separated list) overrides this. + * domain <domain> + * Effectively same as "search" with one domain. + * If no "domain" line is present, the domain is determined + * from the local host name returned by gethostname(); + * the domain part is taken to be everything after the first dot. + * If there are no dots, there will be no "domain". + * The domain and search keywords are mutually exclusive. + * If more than one instance of these keywords is present, + * the last instance wins. + * sortlist 130.155.160.0[/255.255.240.0] 130.155.0.0 + * Allows addresses returned by gethostbyname to be sorted. + * Not supported. + * options option[ option]... + * (so far we support none) + * $RES_OPTIONS (space-separated list) is to be added to "options" + * debug sets RES_DEBUG in _res.options + * ndots:n how many dots there should be so that name will be tried + * first as an absolute name before any search list elements + * are appended to it. Default 1 + * timeout:n how long to wait for response. Default 5 + * (sun seems to have retrans:n synonym) + * attempts:n number of rounds to do before giving up and returning + * an error. Default 2 + * (sun seems to have retry:n synonym) + * rotate sets RES_ROTATE in _res.options, round robin + * selection of nameservers. Otherwise try + * the first listed server first every time + * no-check-names + * sets RES_NOCHECKNAME in _res.options, which disables + * checking of incoming host names for invalid characters + * such as underscore (_), non-ASCII, or control characters + * inet6 sets RES_USE_INET6 in _res.options. Try a AAAA query + * before an A query inside the gethostbyname(), and map + * IPv4 responses in IPv6 "tunnelled form" if no AAAA records + * are found but an A record set exists + * no_tld_query (FreeBSDism?) + * do not attempt to resolve names without dots + * + * We will read and analyze /etc/resolv.conf as needed before + * we do a DNS request. This happens in __dns_lookup. + * (TODO: also re-parse it after a timeout, it might get updated). + * + * BSD has res_init routine which is used to initialize resolver state + * which is held in global structure _res. + * Generally, programs call res_init, then fiddle with _res.XXX + * (_res.options and _res.nscount, _res.nsaddr_list[N] + * are popular targets of fiddling) and expect subsequent calls + * to gethostbyname, getaddrinfo, etc to use modified information. + * + * However, historical _res structure is quite awkward. + * Using it for storing /etc/resolv.conf info is not desirable, + * and __dns_lookup does not use it. + * + * We would like to avoid using it unless absolutely necessary. + * If user doesn't use res_init, we should arrange it so that + * _res structure doesn't even *get linked in* into user's application + * (imagine static uclibc build here). + * + * The solution is a __res_sync function pointer, which is normally NULL. + * But if res_init is called, it gets set and any subsequent gethostbyname + * et al "syncronizes" our internal structures with potentially + * modified _res.XXX stuff by calling __res_sync. + * The trick here is that if res_init is not used and not linked in, + * gethostbyname itself won't reference _res and _res won't be linked in + * either. Other possible methods like + * if (__res_sync_just_an_int_flag) + * __sync_me_with_res() + * would pull in __sync_me_with_res, which pulls in _res. Bad. + */ + #ifdef L_encodeh @@ -584,7 +671,9 @@ int attribute_hidden __length_question(const unsigned char * const message, int } #endif + #ifdef L_encodea + int attribute_hidden __encode_answer(struct resolv_answer *a, unsigned char *dest, int maxlen) { int i; @@ -659,6 +748,7 @@ int attribute_hidden __decode_answer(const unsigned char *message, int offset, #endif +#ifdef CURRENTLY_UNUSED #ifdef L_encodep int __encode_packet(struct resolv_header *h, @@ -763,6 +853,192 @@ int __form_query(int id, const char *name, int type, unsigned char *packet, return i + j; } #endif +#endif /* CURRENTLY_UNUSED */ + + +#ifdef L_opennameservers + +__UCLIBC_MUTEX_INIT(__resolv_lock, PTHREAD_MUTEX_INITIALIZER); + +/* Protected by __resolv_lock */ +void (*__res_sync)(void); +//uint32_t __resolv_opts; +unsigned __nameservers; +unsigned __searchdomains; +sockaddr46_t *__nameserver; +char **__searchdomain; + +/* Helpers. Both stop on EOL, if it's '\n', it is converted to NUL first */ +static char *skip_nospace(char *p) +{ + while (*p != '\0' && !isspace(*p)) { + if (*p == '\n') { + *p = '\0'; + break; + } + p++; + } + return p; +} +static char *skip_and_NUL_space(char *p) +{ + /* NB: '\n' is not isspace! */ + while (1) { + char c = *p; + if (c == '\0' || !isspace(c)) + break; + *p = '\0'; + if (c == '\n' || c == '#') + break; + p++; + } + return p; +} + +/* Must be called under __resolv_lock. */ +void attribute_hidden __open_nameservers(void) +{ + char szBuffer[MAXLEN_searchdomain]; + FILE *fp; + int i; + sockaddr46_t sa; + + //if (!__res_sync && last_time_was_long_ago) + // __close_nameservers(); /* force config reread */ + + if (__nameservers) + goto sync; + + fp = fopen("/etc/resolv.conf", "r"); + if (!fp) { +// TODO: why? google says nothing about this... + fp = fopen("/etc/config/resolv.conf", "r"); + } + + if (fp) { + while (fgets(szBuffer, sizeof(szBuffer), fp) != NULL) { + void *ptr; + char *keyword, *p; + + keyword = p = skip_and_NUL_space(szBuffer); + /* skip keyword */ + p = skip_nospace(p); + /* find next word */ + p = skip_and_NUL_space(p); + + if (strcmp(keyword, "nameserver") == 0) { + /* terminate IP addr */ + *skip_nospace(p) = '\0'; + memset(&sa, 0, sizeof(sa)); + if (0) /* nothing */; +#ifdef __UCLIBC_HAS_IPV6__ + else if (inet_pton(AF_INET6, p, &sa.sa6.sin6_addr) > 0) { + sa.sa6.sin6_family = AF_INET6; + sa.sa6.sin6_port = htons(NAMESERVER_PORT); + } +#endif +#ifdef __UCLIBC_HAS_IPV4__ + else if (inet_pton(AF_INET, p, &sa.sa4.sin_addr) > 0) { + sa.sa4.sin_family = AF_INET; + sa.sa4.sin_port = htons(NAMESERVER_PORT); + } +#endif + else + continue; /* garbage on this line */ + ptr = realloc(__nameserver, (__nameservers + 1) * sizeof(__nameserver[0])); + if (!ptr) + continue; + __nameserver = ptr; + __nameserver[__nameservers++] = sa; /* struct copy */ + continue; + } + if (strcmp(keyword, "domain") == 0 || strcmp(keyword, "search") == 0) { + char *p1; +//TODO: delete old domains... + next_word: + /* terminate current word */ + p1 = skip_nospace(p); + /* find next word (maybe) */ + p1 = skip_and_NUL_space(p1); + /* paranoia - done by having szBuffer[MAXLEN_searchdomain] */ + /*if (strlen(p) > MAXLEN_searchdomain)*/ + /* goto skip;*/ + /* do we have this domain already? */ + for (i = 0; i < __searchdomains; i++) + if (strcmp(p, __searchdomain[i]) == 0) + goto skip; + /* add it */ + ptr = realloc(__searchdomain, (__searchdomains + 1) * sizeof(__searchdomain[0])); + if (!ptr) + continue; + __searchdomain = ptr; + ptr = strdup(p); + if (!ptr) + continue; + DPRINTF("adding search %s\n", (char*)ptr); + __searchdomain[__searchdomains++] = (char*)ptr; + skip: + p = p1; + if (*p) + goto next_word; + continue; + } + /* if (strcmp(keyword, "sortlist") == 0)... */ + /* if (strcmp(keyword, "options") == 0)... */ + } + fclose(fp); + } + if (__nameservers == 0) { + __nameserver = malloc(sizeof(__nameserver[0])); +//TODO: error check? + memset(&__nameserver[0], 0, sizeof(__nameserver[0])); +#ifdef __UCLIBC_HAS_IPV4__ + __nameserver[0].sa4.sin_family = AF_INET; + /*__nameserver[0].sa4.sin_addr = INADDR_ANY; - done by memset */ + __nameserver[0].sa4.sin_port = htons(NAMESERVER_PORT); +#else + __nameserver[0].sa6.sin6_family = AF_INET6; + __nameserver[0].sa6.sin6_port = htons(NAMESERVER_PORT); +#endif + __nameservers++; + } + if (__searchdomains == 0) { + char buf[256]; + char *p; + i = gethostname(buf, sizeof(buf) - 1); + buf[sizeof(buf) - 1] = '\0'; + if (i == 0 && (p = strchr(buf, '.')) != NULL && p[1]) { + p = strdup(p + 1); + __searchdomain = malloc(sizeof(__searchdomain[0])); +//TODO: error check? + __searchdomain[0] = p; + __searchdomains++; + } + } + DPRINTF("nameservers = %d\n", __nameservers); + + sync: + if (__res_sync) + __res_sync(); +} +#endif + + +#ifdef L_closenameservers + +/* Must be called under __resolv_lock. */ +void attribute_hidden __close_nameservers(void) +{ + free(__nameserver); + __nameserver = NULL; + __nameservers = 0; + while (__searchdomains) + free(__searchdomain[--__searchdomains]); + free(__searchdomain); + __searchdomain = NULL; + /*__searchdomains = 0; - already is */ +} +#endif #ifdef L_dnslookup @@ -859,43 +1135,23 @@ int attribute_hidden __dns_lookup(const char *name, int type, // local_ns_num = 0; // if (_res.options & RES_ROTATE) local_ns_num = last_ns_num; - if (local_ns_num >= __nameservers) - local_ns_num = 0; } - /* __nameservers == 0 case: act as if - * we have one DNS server configured - on 127.0.0.1 */ - { - int my_nameservers = __nameservers; - if (my_nameservers == 0) - my_nameservers++; - if (local_ns_num >= my_nameservers) { - local_ns_num = 0; - retries++; - /* break if retries >= MAX_RETRIES - *after unlock*! */ - } + if (local_ns_num >= __nameservers) { + local_ns_num = 0; +//TODO: wrong method of retries++! +// Should be if (local_ns_num == starting_ns_num) retries++; + retries++; + /* break if retries >= MAX_RETRIES - *after unlock*! */ } local_id++; local_id &= 0xffff; /* write new values back while still under lock */ last_id = local_id; last_ns_num = local_ns_num; - if (__nameservers != 0) { - /* struct copy */ - /* can't just take a pointer, __nameserver[] - * is not safe to use outside of locks */ - sa = __nameserver[local_ns_num]; - } else { - /* __nameservers == 0 */ - memset(&sa, 0, sizeof(sa)); -#ifdef __UCLIBC_HAS_IPV4__ - sa.sa4.sin_family = AF_INET; - /*sa.sa4.sin_addr = INADDR_ANY; - done by memset */ - sa.sa4.sin_port = htons(NAMESERVER_PORT); -#else - sa.sa6.sin_family = AF_INET6; - sa.sa6.sin6_port = htons(NAMESERVER_PORT); -#endif - } + /* struct copy */ + /* can't just take a pointer, __nameserver[x] + * is not safe to use outside of locks */ + sa = __nameserver[local_ns_num]; __UCLIBC_MUTEX_UNLOCK(__resolv_lock); if (retries >= MAX_RETRIES) break; @@ -964,8 +1220,7 @@ int attribute_hidden __dns_lookup(const char *name, int type, goto try_next_server; } #endif -//TODO: MSG_DONTWAIT? - len = recv(fd, packet, PACKETSZ, 0); + len = recv(fd, packet, PACKETSZ, MSG_DONTWAIT); if (len < HFIXEDSZ) { /* too short! */ //TODO: why next sdomain? it's just a bogus packet from somewhere, @@ -1104,155 +1359,6 @@ int attribute_hidden __dns_lookup(const char *name, int type, } #endif -#ifdef L_opennameservers - -__UCLIBC_MUTEX_INIT(__resolv_lock, PTHREAD_MUTEX_INITIALIZER); - -/* Protected by __resolv_lock */ -int __nameservers; -int __searchdomains; -sockaddr46_t *__nameserver; -char **__searchdomain; - -/* Helpers. Both stop on EOL, if it's '\n', it is converted to NUL first */ -static char *skip_nospace(char *p) -{ - while (*p != '\0' && !isspace(*p)) { - if (*p == '\n') { - *p = '\0'; - break; - } - p++; - } - return p; -} -static char *skip_and_NUL_space(char *p) -{ - /* NB: '\n' is not isspace! */ - while (1) { - char c = *p; - if (c == '\0' || !isspace(c)) - break; - *p = '\0'; - if (c == '\n' || c == '#') - break; - p++; - } - return p; -} - -/* Must be called under __resolv_lock. */ -void attribute_hidden __open_nameservers(void) -{ - char szBuffer[MAXLEN_searchdomain]; - FILE *fp; - int i; - sockaddr46_t sa; - - if (__nameservers > 0) - return; - - fp = fopen("/etc/resolv.conf", "r"); - if (!fp) { - fp = fopen("/etc/config/resolv.conf", "r"); - if (!fp) { - DPRINTF("failed to open %s\n", "resolv.conf"); - h_errno = NO_RECOVERY; - return; - } - } - - while (fgets(szBuffer, sizeof(szBuffer), fp) != NULL) { - void *ptr; - char *keyword, *p; - - keyword = p = skip_and_NUL_space(szBuffer); - /* skip keyword */ - p = skip_nospace(p); - /* find next word */ - p = skip_and_NUL_space(p); - - if (strcmp(keyword, "nameserver") == 0) { - /* terminate IP addr */ - *skip_nospace(p) = '\0'; - memset(&sa, 0, sizeof(sa)); - if (0) /* nothing */; -#ifdef __UCLIBC_HAS_IPV6__ - else if (inet_pton(AF_INET6, p, &sa.sa6.sin6_addr) > 0) { - sa.sa6.sin6_family = AF_INET6; - sa.sa6.sin6_port = htons(NAMESERVER_PORT); - } -#endif -#ifdef __UCLIBC_HAS_IPV4__ - else if (inet_pton(AF_INET, p, &sa.sa4.sin_addr) > 0) { - sa.sa4.sin_family = AF_INET; - sa.sa4.sin_port = htons(NAMESERVER_PORT); - } -#endif - else - continue; /* garbage on this line */ - ptr = realloc(__nameserver, (__nameservers + 1) * sizeof(__nameserver[0])); - if (!ptr) - continue; - __nameserver = ptr; - __nameserver[__nameservers++] = sa; /* struct copy */ - continue; - } - if (strcmp(keyword, "domain") == 0 || strcmp(keyword, "search") == 0) { - char *p1; - next_word: - /* terminate current word */ - p1 = skip_nospace(p); - /* find next word (maybe) */ - p1 = skip_and_NUL_space(p1); - /* paranoia - done by having szBuffer[MAXLEN_searchdomain] */ - /*if (strlen(p) > MAXLEN_searchdomain)*/ - /* goto skip;*/ - /* do we have this domain already? */ - for (i = 0; i < __searchdomains; i++) - if (strcmp(p, __searchdomain[i]) == 0) - goto skip; - /* add it */ - ptr = realloc(__searchdomain, (__searchdomains + 1) * sizeof(__searchdomain[0])); - if (!ptr) - continue; - __searchdomain = ptr; - ptr = strdup(p); - if (!ptr) - continue; - DPRINTF("adding search %s\n", (char*)ptr); - __searchdomain[__searchdomains++] = (char*)ptr; - skip: - p = p1; - if (*p) - goto next_word; - continue; - } - /* if (strcmp(keyword, "sortlist") == 0)... */ - /* if (strcmp(keyword, "options") == 0)... */ - } - fclose(fp); - DPRINTF("nameservers = %d\n", __nameservers); -} -#endif - - -#ifdef L_closenameservers - -/* Must be called under __resolv_lock. */ -void attribute_hidden __close_nameservers(void) -{ - free(__nameserver); - __nameserver = NULL; - __nameservers = 0; - while (__searchdomains) - free(__searchdomain[--__searchdomains]); - free(__searchdomain); - __searchdomain = NULL; - /*__searchdomains = 0; - already is */ -} -#endif - #ifdef L_gethostbyname @@ -1298,6 +1404,38 @@ struct hostent *gethostbyname2(const char *name, int family) /* Protected by __resolv_lock */ struct __res_state _res; +#undef ARRAY_SIZE +#define ARRAY_SIZE(v) (sizeof(v) / sizeof((v)[0])) + +/* Will be called under __resolv_lock. */ +static void res_sync_func(void) +{ + struct __res_state *rp = &(_res); + + /* Track .nscount and .nsaddr_list + * (busybox's nslookup uses it). + */ + if (__nameservers > rp->nscount) + __nameservers = rp->nscount; + /* TODO: + * if (__nameservers < rp->nscount) - try to grow __nameserver[]? + */ +#ifdef __UCLIBC_HAS_IPV4__ + { + int n = __nameservers; + while (--n >= 0) { + __nameserver[n].sa.sa_family = AF_INET; + __nameserver[n].sa4 = rp->nsaddr_list[n]; /* struct copy */ + } + } +#endif + /* Extend and comment what program is known + * to use which _res.XXX member(s). + */ + // __resolv_opts = rp->options; + // ... +} + /* Our res_init never fails (always returns 0) */ int res_init(void) { @@ -1308,6 +1446,8 @@ int res_init(void) __close_nameservers(); __open_nameservers(); + __res_sync = res_sync_func; + memset(rp, 0, sizeof(*rp)); rp->options = RES_INIT; #ifdef __UCLIBC_HAS_COMPAT_RES_STATE__ @@ -1315,27 +1455,17 @@ int res_init(void) rp->retry = 4; rp->id = random(); #endif - /* man resolv.conf says: - * "On a normally configured system this file should not be necessary. - * The only name server to be queried will be on the local machine; - * the domain name is determined from the host name - * and the domain search path is constructed from the domain name" */ - rp->nscount = 1; - rp->nsaddr_list[0].sin_addr.s_addr = INADDR_ANY; - rp->nsaddr_list[0].sin_family = AF_INET; - rp->nsaddr_list[0].sin_port = htons(NAMESERVER_PORT); rp->ndots = 1; #ifdef __UCLIBC_HAS_EXTRA_COMPAT_RES_STATE__ rp->_vcsock = -1; #endif -#undef ARRAY_SIZE -#define ARRAY_SIZE(v) (sizeof(v) / sizeof((v)[0])) n = __searchdomains; if (n > ARRAY_SIZE(rp->dnsrch)) n = ARRAY_SIZE(rp->dnsrch); for (i = 0; i < n; i++) rp->dnsrch[i] = __searchdomain[i]; +#ifdef __UCLIBC_HAS_IPV4__ i = 0; n = 0; while (n < ARRAY_SIZE(rp->nsaddr_list) && i < __nameservers) { @@ -1346,13 +1476,12 @@ int res_init(void) next_i: i++; } - if (n) - rp->nscount = n; - /* else rp->nscount stays 1 */ -#undef ARRAY_SIZE + rp->nscount = n; +#endif __UCLIBC_MUTEX_UNLOCK(__resolv_lock); return 0; } +#undef ARRAY_SIZE libc_hidden_def(res_init) #ifdef __UCLIBC_HAS_BSD_RES_CLOSE__ @@ -1360,6 +1489,7 @@ void res_close(void) { __UCLIBC_MUTEX_LOCK(__resolv_lock); __close_nameservers(); + __res_sync = NULL; memset(&_res, 0, sizeof(_res)); __UCLIBC_MUTEX_UNLOCK(__resolv_lock); } @@ -1367,6 +1497,7 @@ void res_close(void) #endif /* L_res_init */ + #ifdef L_res_query int res_query(const char *dname, int class, int type, @@ -1617,15 +1748,16 @@ int res_querydomain(const char *name, const char *domain, int class, int type, return res_query(longname, class, type, answer, anslen); } libc_hidden_def(res_querydomain) - /* res_mkquery */ /* res_send */ /* dn_comp */ /* dn_expand */ #endif + #ifdef L_gethostbyaddr -struct hostent *gethostbyaddr (const void *addr, socklen_t len, int type) + +struct hostent *gethostbyaddr(const void *addr, socklen_t len, int type) { static struct hostent h; static char buf[ @@ -2023,7 +2155,7 @@ BAD_FAM: } if (!ok) { - const char *c; + const char *c = NULL; if (flags & NI_NAMEREQD) { errno = serrno; @@ -2035,7 +2167,8 @@ BAD_FAM: sin6p = (const struct sockaddr_in6 *) sa; c = inet_ntop(AF_INET6, - (const void *) &sin6p->sin6_addr, host, hostlen); + (const void *) &sin6p->sin6_addr, + host, hostlen); #if 0 /* Does scope id need to be supported? */ uint32_t scopeid; |