/* vim:set ts=4 sw=4 sts=4 et cin: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #if defined(HAVE_RES_NINIT) #include #include #include #include #include #define RES_RETRY_ON_FAILURE #endif #include #include #include "nsHostResolver.h" #include "nsError.h" #include "nsISupportsBase.h" #include "nsISupportsUtils.h" #include "nsIThreadManager.h" #include "nsAutoPtr.h" #include "nsComponentManagerUtils.h" #include "nsPrintfCString.h" #include "nsXPCOMCIDInternal.h" #include "prthread.h" #include "prerror.h" #include "prtime.h" #include "mozilla/Logging.h" #include "PLDHashTable.h" #include "plstr.h" #include "nsURLHelper.h" #include "nsThreadUtils.h" #include "nsThreadPool.h" #include "GetAddrInfo.h" #include "GeckoProfiler.h" #include "TRR.h" #include "TRRService.h" #include "mozilla/Atomics.h" #include "mozilla/HashFunctions.h" #include "mozilla/TimeStamp.h" #include "mozilla/Telemetry.h" #include "mozilla/DebugOnly.h" #include "mozilla/Preferences.h" using namespace mozilla; using namespace mozilla::net; // None of our implementations expose a TTL for negative responses, so we use a // constant always. static const unsigned int NEGATIVE_RECORD_LIFETIME = 60; //---------------------------------------------------------------------------- // Use a persistent thread pool in order to avoid spinning up new threads all the time. // In particular, thread creation results in a res_init() call from libc which is // quite expensive. // // The pool dynamically grows between 0 and MAX_RESOLVER_THREADS in size. New requests // go first to an idle thread. If that cannot be found and there are fewer than MAX_RESOLVER_THREADS // currently in the pool a new thread is created for high priority requests. If // the new request is at a lower priority a new thread will only be created if // there are fewer than HighThreadThreshold currently outstanding. If a thread cannot be // created or an idle thread located for the request it is queued. // // When the pool is greater than HighThreadThreshold in size a thread will be destroyed after // ShortIdleTimeoutSeconds of idle time. Smaller pools use LongIdleTimeoutSeconds for a // timeout period. #define HighThreadThreshold MAX_RESOLVER_THREADS_FOR_ANY_PRIORITY #define LongIdleTimeoutSeconds 300 // for threads 1 -> HighThreadThreshold #define ShortIdleTimeoutSeconds 60 // for threads HighThreadThreshold+1 -> MAX_RESOLVER_THREADS static_assert(HighThreadThreshold <= MAX_RESOLVER_THREADS, "High Thread Threshold should be less equal Maximum allowed thread"); //---------------------------------------------------------------------------- namespace mozilla { namespace net { LazyLogModule gHostResolverLog("nsHostResolver"); #define LOG(args) MOZ_LOG(mozilla::net::gHostResolverLog, mozilla::LogLevel::Debug, args) #define LOG_ENABLED() MOZ_LOG_TEST(mozilla::net::gHostResolverLog, mozilla::LogLevel::Debug) } } //---------------------------------------------------------------------------- #if defined(RES_RETRY_ON_FAILURE) // this class represents the resolver state for a given thread. if we // encounter a lookup failure, then we can invoke the Reset method on an // instance of this class to reset the resolver (in case /etc/resolv.conf // for example changed). this is mainly an issue on GNU systems since glibc // only reads in /etc/resolv.conf once per thread. it may be an issue on // other systems as well. class nsResState { public: nsResState() // initialize mLastReset to the time when this object // is created. this means that a reset will not occur // if a thread is too young. the alternative would be // to initialize this to the beginning of time, so that // the first failure would cause a reset, but since the // thread would have just started up, it likely would // already have current /etc/resolv.conf info. : mLastReset(PR_IntervalNow()) { } bool Reset() { // reset no more than once per second if (PR_IntervalToSeconds(PR_IntervalNow() - mLastReset) < 1) return false; LOG(("Calling 'res_ninit'.\n")); mLastReset = PR_IntervalNow(); return (res_ninit(&_res) == 0); } private: PRIntervalTime mLastReset; }; #endif // RES_RETRY_ON_FAILURE //---------------------------------------------------------------------------- static inline bool IsHighPriority(uint16_t flags) { return !(flags & (nsHostResolver::RES_PRIORITY_LOW | nsHostResolver::RES_PRIORITY_MEDIUM)); } static inline bool IsMediumPriority(uint16_t flags) { return flags & nsHostResolver::RES_PRIORITY_MEDIUM; } static inline bool IsLowPriority(uint16_t flags) { return flags & nsHostResolver::RES_PRIORITY_LOW; } //---------------------------------------------------------------------------- // this macro filters out any flags that are not used when constructing the // host key. the significant flags are those that would affect the resulting // host record (i.e., the flags that are passed down to PR_GetAddrInfoByName). #define RES_KEY_FLAGS(_f) ((_f) & (nsHostResolver::RES_CANON_NAME | \ nsHostResolver::RES_DISABLE_TRR)) #define IS_ADDR_TYPE(_type) ((_type) == nsIDNSService::RESOLVE_TYPE_DEFAULT) #define IS_OTHER_TYPE(_type) ((_type) != nsIDNSService::RESOLVE_TYPE_DEFAULT) nsHostKey::nsHostKey(const nsACString& aHost, uint16_t aType, uint16_t aFlags, uint16_t aAf, bool aPb, const nsACString& aOriginsuffix) : host(aHost) , type(aType) , flags(aFlags) , af(aAf) , pb(aPb) , originSuffix(aOriginsuffix) { if (TRR_DISABLED(gTRRService->Mode())) { // When not using TRR, lookup all answers as TRR-disabled flags |= nsHostResolver::RES_DISABLE_TRR; } } bool nsHostKey::operator==(const nsHostKey& other) const { return host == other.host && type == other.type && RES_KEY_FLAGS (flags) == RES_KEY_FLAGS(other.flags) && af == other.af && originSuffix == other.originSuffix; } PLDHashNumber nsHostKey::Hash() const { return AddToHash(HashString(host.get()), type, RES_KEY_FLAGS(flags), af, HashString(originSuffix.get())); } size_t nsHostKey::SizeOfExcludingThis(mozilla::MallocSizeOf mallocSizeOf) const { size_t n = 0; n += host.SizeOfExcludingThisIfUnshared(mallocSizeOf); n += originSuffix.SizeOfExcludingThisIfUnshared(mallocSizeOf); return n; } nsHostRecord::nsHostRecord(const nsHostKey& key) : nsHostKey(key) , mResolverMode(MODE_NATIVEONLY) , mResolving(0) , negative(false) , mDoomed(false) { } nsHostRecord::~nsHostRecord() { mCallbacks.clear(); } void nsHostRecord::Invalidate() { mDoomed = true; } nsHostRecord::ExpirationStatus nsHostRecord::CheckExpiration(const mozilla::TimeStamp& now) const { if (!mGraceStart.IsNull() && now >= mGraceStart && !mValidEnd.IsNull() && now < mValidEnd) { return nsHostRecord::EXP_GRACE; } if (!mValidEnd.IsNull() && now < mValidEnd) { return nsHostRecord::EXP_VALID; } return nsHostRecord::EXP_EXPIRED; } void nsHostRecord::SetExpiration(const mozilla::TimeStamp& now, unsigned int valid, unsigned int grace) { mValidStart = now; if ((valid + grace) < 60) { grace = 60 - valid; LOG(("SetExpiration: artificially bumped grace to %d\n", grace)); } mGraceStart = now + TimeDuration::FromSeconds(valid); mValidEnd = now + TimeDuration::FromSeconds(valid + grace); } void nsHostRecord::CopyExpirationTimesAndFlagsFrom(const nsHostRecord *aFromHostRecord) { // This is used to copy information from a cache entry to a record. All // information necessary for HasUsableRecord needs to be copied. mValidStart = aFromHostRecord->mValidStart; mValidEnd = aFromHostRecord->mValidEnd; mGraceStart = aFromHostRecord->mGraceStart; mDoomed = aFromHostRecord->mDoomed; } bool nsHostRecord::HasUsableResult(const mozilla::TimeStamp& now, uint16_t queryFlags) const { if (mDoomed) { return false; } // don't use cached negative results for high priority queries. if (negative && IsHighPriority(queryFlags)) { return false; } if (CheckExpiration(now) == EXP_EXPIRED) { return false; } if (negative) { return true; } return HasUsableResultInternal(); } static size_t SizeOfResolveHostCallbackListExcludingHead(const mozilla::LinkedList>& aCallbacks, MallocSizeOf mallocSizeOf) { size_t n = aCallbacks.sizeOfExcludingThis(mallocSizeOf); for (const nsResolveHostCallback* t = aCallbacks.getFirst(); t; t = t->getNext()) { n += t->SizeOfIncludingThis(mallocSizeOf); } return n; } NS_IMPL_ISUPPORTS(AddrHostRecord, nsISupports, AddrHostRecord, nsHostRecord) AddrHostRecord::AddrHostRecord(const nsHostKey& key) : nsHostRecord(key) , addr_info_lock("AddrHostRecord.addr_info_lock") , addr_info_gencnt(0) , addr_info(nullptr) , addr(nullptr) , mFirstTRRresult(NS_OK) , mTRRSuccess(0) , mNativeSuccess(0) , mNative(false) , mTRRUsed(false) , mNativeUsed(false) , onQueue(false) , usingAnyThread(false) , mDidCallbacks(false) , mGetTtl(false) , mResolveAgain(false) , mTrrAUsed(INIT) , mTrrAAAAUsed(INIT) , mTrrLock("AddrHostRecord.mTrrLock") , mBlacklistedCount(0) { } AddrHostRecord::~AddrHostRecord() { Telemetry::Accumulate(Telemetry::DNS_BLACKLIST_COUNT, mBlacklistedCount); delete addr_info; } bool AddrHostRecord::Blacklisted(NetAddr *aQuery) { // must call locked LOG(("Checking blacklist for host [%s], host record [%p].\n", host.get(), this)); // skip the string conversion for the common case of no blacklist if (!mBlacklistedItems.Length()) { return false; } char buf[kIPv6CStrBufSize]; if (!NetAddrToString(aQuery, buf, sizeof(buf))) { return false; } nsDependentCString strQuery(buf); for (uint32_t i = 0; i < mBlacklistedItems.Length(); i++) { if (mBlacklistedItems.ElementAt(i).Equals(strQuery)) { LOG(("Address [%s] is blacklisted for host [%s].\n", buf, host.get())); return true; } } return false; } void AddrHostRecord::ReportUnusable(NetAddr *aAddress) { // must call locked LOG(("Adding address to blacklist for host [%s], host record [%p]." "used trr=%d\n", host.get(), this, mTRRSuccess)); ++mBlacklistedCount; char buf[kIPv6CStrBufSize]; if (NetAddrToString(aAddress, buf, sizeof(buf))) { LOG(("Successfully adding address [%s] to blacklist for host " "[%s].\n", buf, host.get())); mBlacklistedItems.AppendElement(nsCString(buf)); } } void AddrHostRecord::ResetBlacklist() { // must call locked LOG(("Resetting blacklist for host [%s], host record [%p].\n", host.get(), this)); mBlacklistedItems.Clear(); } size_t AddrHostRecord::SizeOfIncludingThis(MallocSizeOf mallocSizeOf) const { size_t n = mallocSizeOf(this); n += nsHostKey::SizeOfExcludingThis(mallocSizeOf); n += SizeOfResolveHostCallbackListExcludingHead(mCallbacks, mallocSizeOf); n += addr_info ? addr_info->SizeOfIncludingThis(mallocSizeOf) : 0; n += mallocSizeOf(addr.get()); n += mBlacklistedItems.ShallowSizeOfExcludingThis(mallocSizeOf); for (size_t i = 0; i < mBlacklistedItems.Length(); i++) { n += mBlacklistedItems[i].SizeOfExcludingThisIfUnshared(mallocSizeOf); } return n; } bool AddrHostRecord::HasUsableResultInternal() const { return addr_info || addr; } void AddrHostRecord::Cancel() { MutexAutoLock trrlock(mTrrLock); if (mTrrA) { mTrrA->Cancel(); mTrrA = nullptr; } if (mTrrAAAA) { mTrrAAAA->Cancel(); mTrrAAAA = nullptr; } } // Returns true if the entry can be removed, or false if it should be left. // Sets mResolveAgain true for entries being resolved right now. bool AddrHostRecord::RemoveOrRefresh() { // no need to flush TRRed names, they're not resolved "locally" MutexAutoLock lock(addr_info_lock); if (addr_info && addr_info->IsTRR()) { return false; } if (mNative) { if (!onQueue) { // The request has been passed to the OS resolver. The resultant DNS // record should be considered stale and not trusted; set a flag to // ensure it is called again. mResolveAgain = true; } // if Onqueue is true, the host entry is already added to the cache // but is still pending to get resolved: just leave it in hash. return false; } // Already resolved; not in a pending state; remove from cache return true; } void AddrHostRecord::ResolveComplete() { if (mNativeUsed) { if (mNativeSuccess) { uint32_t millis = static_cast(mNativeDuration.ToMilliseconds()); Telemetry::Accumulate(Telemetry::DNS_NATIVE_LOOKUP_TIME, millis); } AccumulateCategorical(mNativeSuccess ? Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::osOK : Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::osFail); } if (mTRRUsed) { if (mTRRSuccess) { uint32_t millis = static_cast(mTrrDuration.ToMilliseconds()); Telemetry::Accumulate(Telemetry::DNS_TRR_LOOKUP_TIME, millis); } AccumulateCategorical(mTRRSuccess ? Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::trrOK : Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::trrFail); if (mTrrAUsed == OK) { AccumulateCategorical(Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::trrAOK); } else if (mTrrAUsed == FAILED) { AccumulateCategorical(Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::trrAFail); } if (mTrrAAAAUsed == OK) { AccumulateCategorical(Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::trrAAAAOK); } else if (mTrrAAAAUsed == FAILED) { AccumulateCategorical(Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::trrAAAAFail); } } if (mTRRUsed && mNativeUsed && mNativeSuccess && mTRRSuccess) { // race or shadow! static const TimeDuration k50ms = TimeDuration::FromMilliseconds(50); static const TimeDuration k100ms = TimeDuration::FromMilliseconds(100); if (mTrrDuration <= mNativeDuration) { if ((mNativeDuration - mTrrDuration) > k100ms) { AccumulateCategorical(Telemetry::LABELS_DNS_TRR_RACE2::TRRFasterBy100); } else if ((mNativeDuration - mTrrDuration) > k50ms) { AccumulateCategorical(Telemetry::LABELS_DNS_TRR_RACE2::TRRFasterBy50); } else { AccumulateCategorical(Telemetry::LABELS_DNS_TRR_RACE2::TRRFaster); } LOG(("nsHostRecord::Complete %s Dns Race: TRR\n", host.get())); } else { if ((mTrrDuration - mNativeDuration) > k100ms) { AccumulateCategorical(Telemetry::LABELS_DNS_TRR_RACE2::NativeFasterBy100); } else if ((mTrrDuration - mNativeDuration) > k50ms) { AccumulateCategorical(Telemetry::LABELS_DNS_TRR_RACE2::NativeFasterBy50); } else { AccumulateCategorical(Telemetry::LABELS_DNS_TRR_RACE2::NativeFaster); } LOG(("nsHostRecord::Complete %s Dns Race: NATIVE\n", host.get())); } } if (mTRRUsed && mNativeUsed && ((mResolverMode == MODE_SHADOW) || (mResolverMode == MODE_PARALLEL))) { // both were used, accumulate comparative success AccumulateCategorical(mNativeSuccess && mTRRSuccess? Telemetry::LABELS_DNS_TRR_COMPARE::BothWorked : ((mNativeSuccess ? Telemetry::LABELS_DNS_TRR_COMPARE::NativeWorked : (mTRRSuccess ? Telemetry::LABELS_DNS_TRR_COMPARE::TRRWorked: Telemetry::LABELS_DNS_TRR_COMPARE::BothFailed)))); } else if (mResolverMode == MODE_TRRFIRST) { if(flags & nsIDNSService::RESOLVE_DISABLE_TRR) { // TRR is disabled on request, which is a next-level back-off method. Telemetry::Accumulate(Telemetry::DNS_TRR_DISABLED, mNativeSuccess); } else { if (mTRRSuccess) { AccumulateCategorical(Telemetry::LABELS_DNS_TRR_FIRST2::TRR); } else if(mNativeSuccess) { if (mTRRUsed) { AccumulateCategorical(Telemetry::LABELS_DNS_TRR_FIRST2::NativeAfterTRR); } else { AccumulateCategorical(Telemetry::LABELS_DNS_TRR_FIRST2::Native); } } else { AccumulateCategorical(Telemetry::LABELS_DNS_TRR_FIRST2::BothFailed); } } } switch(mResolverMode) { case MODE_NATIVEONLY: case MODE_TRROFF: AccumulateCategorical(Telemetry::LABELS_DNS_LOOKUP_ALGORITHM::nativeOnly); break; case MODE_PARALLEL: AccumulateCategorical(Telemetry::LABELS_DNS_LOOKUP_ALGORITHM::trrRace); break; case MODE_TRRFIRST: AccumulateCategorical(Telemetry::LABELS_DNS_LOOKUP_ALGORITHM::trrFirst); break; case MODE_TRRONLY: AccumulateCategorical(Telemetry::LABELS_DNS_LOOKUP_ALGORITHM::trrOnly); break; case MODE_SHADOW: AccumulateCategorical(Telemetry::LABELS_DNS_LOOKUP_ALGORITHM::trrShadow); break; } if (mTRRUsed && !mTRRSuccess && mNativeSuccess && gTRRService) { gTRRService->TRRBlacklist(nsCString(host), originSuffix, pb, true); } } AddrHostRecord::DnsPriority AddrHostRecord::GetPriority(uint16_t aFlags) { if (IsHighPriority(aFlags)){ return AddrHostRecord::DNS_PRIORITY_HIGH; } if (IsMediumPriority(aFlags)) { return AddrHostRecord::DNS_PRIORITY_MEDIUM; } return AddrHostRecord::DNS_PRIORITY_LOW; } NS_IMPL_ISUPPORTS(TypeHostRecord, nsISupports, TypeHostRecord, nsHostRecord) TypeHostRecord::TypeHostRecord(const nsHostKey& key) : nsHostRecord(key) , mTrrLock("TypeHostRecord.mTrrLock") , mResultsLock("TypeHostRecord.mResultsLock") { } TypeHostRecord::~TypeHostRecord() = default; bool TypeHostRecord::HasUsableResultInternal() const { return !mResults.IsEmpty(); } void TypeHostRecord::GetRecords(nsTArray &aRecords) { // deep copy MutexAutoLock lock(mResultsLock); aRecords = mResults; } void TypeHostRecord::GetRecordsAsOneString(nsACString &aRecords) { // deep copy MutexAutoLock lock(mResultsLock); for (uint32_t i = 0; i < mResults.Length(); i++) { aRecords.Append(mResults[i]); } } size_t TypeHostRecord::SizeOfIncludingThis(MallocSizeOf mallocSizeOf) const { size_t n = mallocSizeOf(this); n += nsHostKey::SizeOfExcludingThis(mallocSizeOf); n += SizeOfResolveHostCallbackListExcludingHead(mCallbacks, mallocSizeOf); return n; } void TypeHostRecord::Cancel() { if (mTrr) { mTrr->Cancel(); mTrr = nullptr; } } //---------------------------------------------------------------------------- static const char kPrefGetTtl[] = "network.dns.get-ttl"; static const char kPrefNativeIsLocalhost[] = "network.dns.native-is-localhost"; static const char kPrefThreadIdleTime[] = "network.dns.resolver-thread-extra-idle-time-seconds"; static bool sGetTtlEnabled = false; mozilla::Atomic gNativeIsLocalhost; static void DnsPrefChanged(const char* aPref, nsHostResolver* aSelf) { MOZ_ASSERT(NS_IsMainThread(), "Should be getting pref changed notification on main thread!"); MOZ_ASSERT(aSelf); if (!strcmp(aPref, kPrefGetTtl)) { #ifdef DNSQUERY_AVAILABLE sGetTtlEnabled = Preferences::GetBool(kPrefGetTtl); #endif } else if (!strcmp(aPref, kPrefNativeIsLocalhost)) { gNativeIsLocalhost = Preferences::GetBool(kPrefNativeIsLocalhost); } } NS_IMPL_ISUPPORTS0(nsHostResolver) nsHostResolver::nsHostResolver(uint32_t maxCacheEntries, uint32_t defaultCacheEntryLifetime, uint32_t defaultGracePeriod) : mMaxCacheEntries(maxCacheEntries) , mDefaultCacheLifetime(defaultCacheEntryLifetime) , mDefaultGracePeriod(defaultGracePeriod) , mLock("nsHostResolver.mLock") , mIdleTaskCV(mLock, "nsHostResolver.mIdleTaskCV") , mEvictionQSize(0) , mShutdown(true) , mNumIdleTasks(0) , mActiveTaskCount(0) , mActiveAnyThreadCount(0) , mPendingCount(0) { mCreationTime = PR_Now(); mLongIdleTimeout = TimeDuration::FromSeconds(LongIdleTimeoutSeconds); mShortIdleTimeout = TimeDuration::FromSeconds(ShortIdleTimeoutSeconds); } nsHostResolver::~nsHostResolver() = default; nsresult nsHostResolver::Init() { MOZ_ASSERT(NS_IsMainThread()); if (NS_FAILED(GetAddrInfoInit())) { return NS_ERROR_FAILURE; } LOG(("nsHostResolver::Init this=%p", this)); mShutdown = false; // The preferences probably haven't been loaded from the disk yet, so we // need to register a callback that will set up the experiment once they // are. We also need to explicitly set a value for the props otherwise the // callback won't be called. { DebugOnly rv = Preferences::RegisterCallbackAndCall( &DnsPrefChanged, kPrefGetTtl, this); NS_WARNING_ASSERTION(NS_SUCCEEDED(rv), "Could not register DNS TTL pref callback."); rv = Preferences::RegisterCallbackAndCall( &DnsPrefChanged, kPrefNativeIsLocalhost, this); NS_WARNING_ASSERTION(NS_SUCCEEDED(rv), "Could not register DNS pref callback."); } #if defined(HAVE_RES_NINIT) // We want to make sure the system is using the correct resolver settings, // so we force it to reload those settings whenever we startup a subsequent // nsHostResolver instance. We assume that there is no reason to do this // for the first nsHostResolver instance since that is usually created // during application startup. static int initCount = 0; if (initCount++ > 0) { LOG(("Calling 'res_ninit'.\n")); res_ninit(&_res); } #endif // We can configure the threadpool to keep threads alive for a while after // the last ThreadFunc task has been executed. int32_t poolTimeoutSecs = Preferences::GetInt(kPrefThreadIdleTime, 60); uint32_t poolTimeoutMs; if (poolTimeoutSecs < 0) { // This means never shut down the idle threads poolTimeoutMs = UINT32_MAX; } else { // We clamp down the idle time between 0 and one hour. poolTimeoutMs = mozilla::clamped(poolTimeoutSecs * 1000, 0, 3600 * 1000); } nsCOMPtr threadPool = new nsThreadPool(); MOZ_ALWAYS_SUCCEEDS(threadPool->SetThreadLimit(MAX_RESOLVER_THREADS)); MOZ_ALWAYS_SUCCEEDS(threadPool->SetIdleThreadLimit(MAX_RESOLVER_THREADS)); MOZ_ALWAYS_SUCCEEDS(threadPool->SetIdleThreadTimeout(poolTimeoutMs)); MOZ_ALWAYS_SUCCEEDS(threadPool->SetThreadStackSize(nsIThreadManager::kThreadPoolStackSize)); MOZ_ALWAYS_SUCCEEDS(threadPool->SetName(NS_LITERAL_CSTRING("DNS Resolver"))); mResolverThreads = threadPool.forget(); return NS_OK; } void nsHostResolver::ClearPendingQueue(LinkedList>& aPendingQ) { // loop through pending queue, erroring out pending lookups. if (!aPendingQ.isEmpty()) { for (RefPtr rec : aPendingQ) { rec->Cancel(); if (rec->IsAddrRecord()) { CompleteLookup(rec, NS_ERROR_ABORT, nullptr, rec->pb); } else { CompleteLookupByType(rec, NS_ERROR_ABORT, nullptr, 0, rec->pb); } } } } // // FlushCache() is what we call when the network has changed. We must not // trust names that were resolved before this change. They may resolve // differently now. // // This function removes all existing resolved host entries from the hash. // Names that are in the pending queues can be left there. Entries in the // cache that have 'Resolve' set true but not 'onQueue' are being resolved // right now, so we need to mark them to get re-resolved on completion! void nsHostResolver::FlushCache() { MutexAutoLock lock(mLock); mEvictionQSize = 0; // Clear the evictionQ and remove all its corresponding entries from // the cache first if (!mEvictionQ.isEmpty()) { for (RefPtr rec : mEvictionQ) { rec->Cancel(); mRecordDB.Remove(*static_cast(rec)); } mEvictionQ.clear(); } // Refresh the cache entries that are resolving RIGHT now, remove the rest. for (auto iter = mRecordDB.Iter(); !iter.Done(); iter.Next()) { nsHostRecord* record = iter.UserData(); // Try to remove the record, or mark it for refresh. // By-type records are from TRR. We do not need to flush those entry // when the network has change, because they are not local. if (record->IsAddrRecord()) { nsCOMPtr addrRec = do_QueryInterface(record); MOZ_ASSERT(addrRec); if (addrRec->RemoveOrRefresh()) { if (record->isInList()) { record->remove(); } iter.Remove(); } } } } void nsHostResolver::Shutdown() { LOG(("Shutting down host resolver.\n")); { DebugOnly rv = Preferences::UnregisterCallback( &DnsPrefChanged, kPrefGetTtl, this); NS_WARNING_ASSERTION(NS_SUCCEEDED(rv), "Could not unregister DNS TTL pref callback."); } LinkedList> pendingQHigh, pendingQMed, pendingQLow, evictionQ; { MutexAutoLock lock(mLock); mShutdown = true; // Move queues to temporary lists. pendingQHigh = std::move(mHighQ); pendingQMed = std::move(mMediumQ); pendingQLow = std::move(mLowQ); evictionQ = std::move(mEvictionQ); mEvictionQSize = 0; mPendingCount = 0; if (mNumIdleTasks) mIdleTaskCV.NotifyAll(); // empty host database mRecordDB.Clear(); } ClearPendingQueue(pendingQHigh); ClearPendingQueue(pendingQMed); ClearPendingQueue(pendingQLow); if (!evictionQ.isEmpty()) { for (RefPtr rec : evictionQ) { rec->Cancel(); } } pendingQHigh.clear(); pendingQMed.clear(); pendingQLow.clear(); evictionQ.clear(); for (auto iter = mRecordDB.Iter(); !iter.Done(); iter.Next()) { iter.UserData()->Cancel(); } #ifdef NS_BUILD_REFCNT_LOGGING // Logically join the outstanding worker threads with a timeout. // Use this approach instead of PR_JoinThread() because that does // not allow a timeout which may be necessary for a semi-responsive // shutdown if the thread is blocked on a very slow DNS resolution. // mActiveTaskCount is read outside of mLock, but the worst case // scenario for that race is one extra 25ms sleep. PRIntervalTime delay = PR_MillisecondsToInterval(25); PRIntervalTime stopTime = PR_IntervalNow() + PR_SecondsToInterval(20); while (mActiveTaskCount && PR_IntervalNow() < stopTime) PR_Sleep(delay); #endif { mozilla::DebugOnly rv = GetAddrInfoShutdown(); NS_WARNING_ASSERTION(NS_SUCCEEDED(rv), "Failed to shutdown GetAddrInfo"); } mResolverThreads->Shutdown(); } nsresult nsHostResolver::GetHostRecord(const nsACString &host, uint16_t type, uint16_t flags, uint16_t af, bool pb, const nsCString &originSuffix, nsHostRecord **result) { MutexAutoLock lock(mLock); nsHostKey key(host, type, flags, af, pb, originSuffix); RefPtr& entry = mRecordDB.GetOrInsert(key); if (!entry) { if (IS_ADDR_TYPE(type)) { entry = new AddrHostRecord(key); } else { entry = new TypeHostRecord(key); } } RefPtr rec = entry; if (rec->IsAddrRecord()) { nsCOMPtr addrRec = do_QueryInterface(rec); if (addrRec->addr) { return NS_ERROR_FAILURE; } } if (rec->mResolving) { return NS_ERROR_FAILURE; } *result = rec.forget().take(); return NS_OK; } nsresult nsHostResolver::ResolveHost(const nsACString &aHost, uint16_t type, const OriginAttributes &aOriginAttributes, uint16_t flags, uint16_t af, nsResolveHostCallback *aCallback) { nsAutoCString host(aHost); NS_ENSURE_TRUE(!host.IsEmpty(), NS_ERROR_UNEXPECTED); LOG(("Resolving host [%s]%s%s type %d. [this=%p]\n", host.get(), flags & RES_BYPASS_CACHE ? " - bypassing cache" : "", flags & RES_REFRESH_CACHE ? " - refresh cache" : "", type, this)); // ensure that we are working with a valid hostname before proceeding. see // bug 304904 for details. if (!net_IsValidHostName(host)) return NS_ERROR_UNKNOWN_HOST; // By-Type requests use only TRR. If TRR is disabled we can return // immediately. if (IS_OTHER_TYPE(type) && TRR_DISABLED(Mode())) { return NS_ERROR_UNKNOWN_HOST; } // Used to try to parse to an IP address literal. PRNetAddr tempAddr; // Unfortunately, PR_StringToNetAddr does not properly initialize // the output buffer in the case of IPv6 input. See bug 223145. memset(&tempAddr, 0, sizeof(PRNetAddr)); if (IS_OTHER_TYPE(type) && (PR_StringToNetAddr(host.get(), &tempAddr) == PR_SUCCESS)) { // For by-type queries the host cannot be IP literal. return NS_ERROR_UNKNOWN_HOST; } memset(&tempAddr, 0, sizeof(PRNetAddr)); RefPtr callback(aCallback); // if result is set inside the lock, then we need to issue the // callback before returning. RefPtr result; nsresult status = NS_OK, rv = NS_OK; { MutexAutoLock lock(mLock); if (mShutdown) { rv = NS_ERROR_NOT_INITIALIZED; } else { // check to see if there is already an entry for this |host| // in the hash table. if so, then check to see if we can't // just reuse the lookup result. otherwise, if there are // any pending callbacks, then add to pending callbacks queue, // and return. otherwise, add ourselves as first pending // callback, and proceed to do the lookup. nsAutoCString originSuffix; aOriginAttributes.CreateSuffix(originSuffix); nsHostKey key(host, type, flags, af, (aOriginAttributes.mPrivateBrowsingId > 0), originSuffix); RefPtr& entry = mRecordDB.GetOrInsert(key); if (!entry) { if (IS_ADDR_TYPE(type)) { entry = new AddrHostRecord(key); } else { entry = new TypeHostRecord(key); } } RefPtr rec = entry; nsCOMPtr addrRec = do_QueryInterface(rec); MOZ_ASSERT(rec, "Record should not be null"); MOZ_ASSERT((IS_ADDR_TYPE(type) && rec->IsAddrRecord() && addrRec) || (IS_OTHER_TYPE(type) && !rec->IsAddrRecord())); // Check if the entry is vaild. if (!(flags & RES_BYPASS_CACHE) && rec->HasUsableResult(TimeStamp::NowLoRes(), flags)) { LOG((" Using cached record for host [%s].\n", host.get())); // put reference to host record on stack... result = rec; if (IS_ADDR_TYPE(type)) { Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_HIT); } // For entries that are in the grace period // or all cached negative entries, use the cache but start a new // lookup in the background ConditionallyRefreshRecord(rec, host); if (rec->negative) { LOG((" Negative cache entry for host [%s].\n", host.get())); if (IS_ADDR_TYPE(type)) { Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_NEGATIVE_HIT); } status = NS_ERROR_UNKNOWN_HOST; } // Check whether host is a IP address for A/AAAA queries. // For by-type records we have already checked at the beginning of // this function. } else if (addrRec && addrRec->addr) { // if the host name is an IP address literal and has been // parsed, go ahead and use it. LOG((" Using cached address for IP Literal [%s].\n", host.get())); Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_LITERAL); result = rec; } else if (addrRec && PR_StringToNetAddr(host.get(), &tempAddr) == PR_SUCCESS) { // try parsing the host name as an IP address literal to short // circuit full host resolution. (this is necessary on some // platforms like Win9x. see bug 219376 for more details.) LOG((" Host is IP Literal [%s].\n", host.get())); // ok, just copy the result into the host record, and be // done with it! ;-) addrRec->addr = MakeUnique(); PRNetAddrToNetAddr(&tempAddr, addrRec->addr.get()); // put reference to host record on stack... Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_LITERAL); result = rec; // Check if we have received too many requests. } else if (mPendingCount >= MAX_NON_PRIORITY_REQUESTS && !IsHighPriority(flags) && !rec->mResolving) { LOG((" Lookup queue full: dropping %s priority request for " "host [%s].\n", IsMediumPriority(flags) ? "medium" : "low", host.get())); if (IS_ADDR_TYPE(type)) { Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_OVERFLOW); } // This is a lower priority request and we are swamped, so refuse it. rv = NS_ERROR_DNS_LOOKUP_QUEUE_FULL; // Check if the offline flag is set. } else if (flags & RES_OFFLINE) { LOG((" Offline request for host [%s]; ignoring.\n", host.get())); rv = NS_ERROR_OFFLINE; // We do not have a valid result till here. // A/AAAA request can check for an alternative entry like AF_UNSPEC. // Otherwise we need to start a new query. } else if (!rec->mResolving) { // If this is an IPV4 or IPV6 specific request, check if there is // an AF_UNSPEC entry we can use. Otherwise, hit the resolver... if (addrRec && !(flags & RES_BYPASS_CACHE) && ((af == PR_AF_INET) || (af == PR_AF_INET6))) { // Check for an AF_UNSPEC entry. const nsHostKey unspecKey(host, nsIDNSService::RESOLVE_TYPE_DEFAULT, flags, PR_AF_UNSPEC, (aOriginAttributes.mPrivateBrowsingId > 0), originSuffix); RefPtr unspecRec = mRecordDB.Get(unspecKey); TimeStamp now = TimeStamp::NowLoRes(); if (unspecRec && unspecRec->HasUsableResult(now, flags)) { MOZ_ASSERT(unspecRec->IsAddrRecord()); nsCOMPtr addrUnspecRec = do_QueryInterface(unspecRec); MOZ_ASSERT(addrUnspecRec); MOZ_ASSERT(addrUnspecRec->addr_info || addrUnspecRec->negative, "Entry should be resolved or negative."); LOG((" Trying AF_UNSPEC entry for host [%s] af: %s.\n", host.get(), (af == PR_AF_INET) ? "AF_INET" : "AF_INET6")); // We need to lock in case any other thread is reading // addr_info. MutexAutoLock lock(addrRec->addr_info_lock); // XXX: note that this actually leaks addr_info. // For some reason, freeing the memory causes a crash in // nsDNSRecord::GetNextAddr - see bug 1422173 addrRec->addr_info = nullptr; if (unspecRec->negative) { rec->negative = unspecRec->negative; rec->CopyExpirationTimesAndFlagsFrom(unspecRec); } else if (addrUnspecRec->addr_info) { // Search for any valid address in the AF_UNSPEC entry // in the cache (not blacklisted and from the right // family). NetAddrElement *addrIter = addrUnspecRec->addr_info->mAddresses.getFirst(); while (addrIter) { if ((af == addrIter->mAddress.inet.family) && !addrUnspecRec->Blacklisted(&addrIter->mAddress)) { if (!addrRec->addr_info) { addrRec->addr_info = new AddrInfo( addrUnspecRec->addr_info->mHostName, addrUnspecRec->addr_info->mCanonicalName, addrUnspecRec->addr_info->IsTRR() ); rec->CopyExpirationTimesAndFlagsFrom(unspecRec); } addrRec->addr_info->AddAddress( new NetAddrElement(*addrIter)); } addrIter = addrIter->getNext(); } } // Now check if we have a new record. if (rec->HasUsableResult(now, flags)) { result = rec; if (rec->negative) { status = NS_ERROR_UNKNOWN_HOST; } Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_HIT); ConditionallyRefreshRecord(rec, host); } else if (af == PR_AF_INET6) { // For AF_INET6, a new lookup means another AF_UNSPEC // lookup. We have already iterated through the // AF_UNSPEC addresses, so we mark this record as // negative. LOG((" No AF_INET6 in AF_UNSPEC entry: " "host [%s] unknown host.", host.get())); result = rec; rec->negative = true; status = NS_ERROR_UNKNOWN_HOST; Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_NEGATIVE_HIT); } } } // If this is a by-type request or if no valid record was found // in the cache or this is an AF_UNSPEC request, then start a // new lookup. if (!result) { LOG((" No usable record in cache for host [%s] type %d.", host.get(), type)); if (flags & RES_REFRESH_CACHE) { rec->Invalidate(); } // Add callback to the list of pending callbacks. rec->mCallbacks.insertBack(callback); rec->flags = flags; rv = NameLookup(rec); if (IS_ADDR_TYPE(type)) { Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_NETWORK_FIRST); } if (NS_FAILED(rv) && callback->isInList()) { callback->remove(); } else { LOG((" DNS lookup for host [%s] blocking " "pending 'getaddrinfo' or trr query: " "callback [%p]", host.get(), callback.get())); } } } else if (addrRec && addrRec->mDidCallbacks) { // This is only for A/AAAA query. // record is still pending more (TRR) data; make the callback // at once result = rec; // make it count as a hit Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_HIT); LOG((" Host [%s] re-using early TRR resolve data\n", host.get())); } else { LOG((" Host [%s] is being resolved. Appending callback " "[%p].", host.get(), callback.get())); rec->mCallbacks.insertBack(callback); // Only A/AAAA records are place in a queue. The queues are for // the native resolver, therefore by-type request are never put // into a queue. if (addrRec && addrRec->onQueue) { Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_NETWORK_SHARED); // Consider the case where we are on a pending queue of // lower priority than the request is being made at. // In that case we should upgrade to the higher queue. if (IsHighPriority(flags) && !IsHighPriority(rec->flags)) { // Move from (low|med) to high. NS_ASSERTION(addrRec->onQueue, "Moving Host Record Not Currently Queued"); rec->remove(); mHighQ.insertBack(rec); rec->flags = flags; ConditionallyCreateThread(rec); } else if (IsMediumPriority(flags) && IsLowPriority(rec->flags)) { // Move from low to med. NS_ASSERTION(addrRec->onQueue, "Moving Host Record Not Currently Queued"); rec->remove(); mMediumQ.insertBack(rec); rec->flags = flags; mIdleTaskCV.Notify(); } } } } } if (result) { if (callback->isInList()) { callback->remove(); } callback->OnResolveHostComplete(this, result, status); } return rv; } void nsHostResolver::DetachCallback(const nsACString &host, uint16_t aType, const OriginAttributes &aOriginAttributes, uint16_t flags, uint16_t af, nsResolveHostCallback *aCallback, nsresult status) { RefPtr rec; RefPtr callback(aCallback); { MutexAutoLock lock(mLock); nsAutoCString originSuffix; aOriginAttributes.CreateSuffix(originSuffix); nsHostKey key(host, aType, flags, af, (aOriginAttributes.mPrivateBrowsingId > 0), originSuffix); RefPtr entry = mRecordDB.Get(key); if (entry) { // walk list looking for |callback|... we cannot assume // that it will be there! for (nsResolveHostCallback* c: entry->mCallbacks) { if (c == callback) { rec = entry; c->remove(); break; } } } } // complete callback with the given status code; this would only be done if // the record was in the process of being resolved. if (rec) { callback->OnResolveHostComplete(this, rec, status); } } nsresult nsHostResolver::ConditionallyCreateThread(nsHostRecord *rec) { if (mNumIdleTasks) { // wake up idle tasks to process this lookup mIdleTaskCV.Notify(); } else if ((mActiveTaskCount < HighThreadThreshold) || (IsHighPriority(rec->flags) && mActiveTaskCount < MAX_RESOLVER_THREADS)) { nsCOMPtr event = mozilla::NewRunnableMethod("nsHostResolver::ThreadFunc", this, &nsHostResolver::ThreadFunc); mActiveTaskCount++; nsresult rv = mResolverThreads->Dispatch(event, nsIEventTarget::DISPATCH_NORMAL); if (NS_FAILED(rv)) { mActiveTaskCount--; } } else { LOG((" Unable to find a thread for looking up host [%s].\n", rec->host.get())); } return NS_OK; } // make sure the mTrrLock is held when this is used! #define TRROutstanding() ((addrRec->mTrrA || addrRec->mTrrAAAA)) nsresult nsHostResolver::TrrLookup_unlocked(nsHostRecord *rec, TRR *pushedTRR) { MutexAutoLock lock(mLock); return TrrLookup(rec, pushedTRR); } // returns error if no TRR resolve is issued // it is impt this is not called while a native lookup is going on nsresult nsHostResolver::TrrLookup(nsHostRecord *aRec, TRR *pushedTRR) { RefPtr rec(aRec); mLock.AssertCurrentThreadOwns(); nsCOMPtr addrRec; nsCOMPtr typeRec; if (rec->IsAddrRecord()) { addrRec = do_QueryInterface(rec); MOZ_ASSERT(addrRec); } else { typeRec = do_QueryInterface(rec); MOZ_ASSERT(typeRec); } #ifdef DEBUG if (rec->IsAddrRecord()) { MutexAutoLock trrlock(addrRec->mTrrLock); MOZ_ASSERT(!TRROutstanding()); } #endif MOZ_ASSERT(!rec->mResolving); if (!gTRRService || !gTRRService->Enabled()) { LOG(("TrrLookup:: %s service not enabled\n", rec->host.get())); return NS_ERROR_UNKNOWN_HOST; } if (rec->isInList()) { // we're already on the eviction queue. This is a renewal MOZ_ASSERT(mEvictionQSize); AssertOnQ(rec, mEvictionQ); rec->remove(); mEvictionQSize--; } bool madeQuery = false; if (addrRec) { addrRec->mTRRSuccess = 0; // bump for each successful TRR response addrRec->mTrrStart = TimeStamp::Now(); addrRec->mTRRUsed = true; // this record gets TRR treatment addrRec->mTrrAUsed = AddrHostRecord::INIT; addrRec->mTrrAAAAUsed = AddrHostRecord::INIT; // If asking for AF_UNSPEC, issue both A and AAAA. // If asking for AF_INET6 or AF_INET, do only that single type enum TrrType rectype = (rec->af == AF_INET6)? TRRTYPE_AAAA : TRRTYPE_A; if (pushedTRR) { rectype = pushedTRR->Type(); } bool sendAgain; do { sendAgain = false; if ((TRRTYPE_AAAA == rectype) && gTRRService && gTRRService->DisableIPv6()) { break; } LOG(("TRR Resolve %s type %d\n", addrRec->host.get(), (int)rectype)); RefPtr trr; MutexAutoLock trrlock(addrRec->mTrrLock); trr = pushedTRR ? pushedTRR : new TRR(this, rec, rectype); if (pushedTRR || NS_SUCCEEDED(NS_DispatchToMainThread(trr))) { addrRec->mResolving++; if (rectype == TRRTYPE_A) { MOZ_ASSERT(!addrRec->mTrrA); addrRec->mTrrA = trr; addrRec->mTrrAUsed = AddrHostRecord::STARTED; } else if (rectype == TRRTYPE_AAAA) { MOZ_ASSERT(!addrRec->mTrrAAAA); addrRec->mTrrAAAA = trr; addrRec->mTrrAAAAUsed = AddrHostRecord::STARTED; } else { LOG(("TrrLookup called with bad type set: %d\n", rectype)); MOZ_ASSERT(0); } madeQuery = true; if (!pushedTRR && (rec->af == AF_UNSPEC) && (rectype == TRRTYPE_A)) { rectype = TRRTYPE_AAAA; sendAgain = true; } } } while (sendAgain); } else { typeRec->mStart = TimeStamp::Now(); enum TrrType rectype = TRRTYPE_TXT; if (pushedTRR) { rectype = pushedTRR->Type(); } LOG(("TRR Resolve %s type %d\n", typeRec->host.get(), (int)rectype)); RefPtr trr; MutexAutoLock trrlock(typeRec->mTrrLock); trr = pushedTRR ? pushedTRR : new TRR(this, rec, rectype); if (pushedTRR || NS_SUCCEEDED(NS_DispatchToMainThread(trr))) { typeRec->mResolving++; MOZ_ASSERT(!typeRec->mTrr); typeRec->mTrr = trr; madeQuery = true; } } return madeQuery ? NS_OK : NS_ERROR_UNKNOWN_HOST; } void nsHostResolver::AssertOnQ(nsHostRecord *rec, LinkedList>& q) { #ifdef DEBUG MOZ_ASSERT(!q.isEmpty()); MOZ_ASSERT(rec->isInList()); for (RefPtr r: q) { if (rec == r) { return; } } MOZ_ASSERT(false, "Did not find element"); #endif } nsresult nsHostResolver::NativeLookup(nsHostRecord *aRec) { // Only A/AAAA request are resolve natively. MOZ_ASSERT(aRec->IsAddrRecord()); mLock.AssertCurrentThreadOwns(); RefPtr rec(aRec); nsCOMPtr addrRec; addrRec = do_QueryInterface(rec); MOZ_ASSERT(addrRec); addrRec->mNativeStart = TimeStamp::Now(); // Add rec to one of the pending queues, possibly removing it from mEvictionQ. if (rec->isInList()) { MOZ_ASSERT(mEvictionQSize); AssertOnQ(rec, mEvictionQ); rec->remove(); // was on the eviction queue mEvictionQSize--; } switch (AddrHostRecord::GetPriority(rec->flags)) { case AddrHostRecord::DNS_PRIORITY_HIGH: mHighQ.insertBack(rec); break; case AddrHostRecord::DNS_PRIORITY_MEDIUM: mMediumQ.insertBack(rec); break; case AddrHostRecord::DNS_PRIORITY_LOW: mLowQ.insertBack(rec); break; } mPendingCount++; addrRec->mNative = true; addrRec->mNativeUsed = true; addrRec->onQueue = true; addrRec->mResolving++; nsresult rv = ConditionallyCreateThread(rec); LOG ((" DNS thread counters: total=%d any-live=%d idle=%d pending=%d\n", static_cast(mActiveTaskCount), static_cast(mActiveAnyThreadCount), static_cast(mNumIdleTasks), static_cast(mPendingCount))); return rv; } ResolverMode nsHostResolver::Mode() { if (gTRRService) { return static_cast(gTRRService->Mode()); } return MODE_NATIVEONLY; } // Kick-off a name resolve operation, using native resolver and/or TRR nsresult nsHostResolver::NameLookup(nsHostRecord *rec) { nsresult rv = NS_ERROR_UNKNOWN_HOST; if (rec->mResolving) { LOG(("NameLookup %s while already resolving\n", rec->host.get())); return NS_OK; } ResolverMode mode = rec->mResolverMode = Mode(); if (rec->IsAddrRecord()) { nsCOMPtr addrRec; addrRec = do_QueryInterface(rec); MOZ_ASSERT(addrRec); addrRec->mNativeUsed = false; addrRec->mTRRUsed = false; addrRec->mNativeSuccess = false; addrRec->mTRRSuccess = 0; addrRec->mDidCallbacks = false; addrRec->mTrrAUsed = AddrHostRecord::INIT; addrRec->mTrrAAAAUsed = AddrHostRecord::INIT; } if (rec->flags & RES_DISABLE_TRR) { if (mode == MODE_TRRONLY) { return rv; } mode = MODE_NATIVEONLY; } if (!TRR_DISABLED(mode)) { rv = TrrLookup(rec); } if ((mode == MODE_PARALLEL) || TRR_DISABLED(mode) || (mode == MODE_SHADOW) || ((mode == MODE_TRRFIRST) && NS_FAILED(rv))) { if (!rec->IsAddrRecord()) { return rv; } rv = NativeLookup(rec); } return rv; } nsresult nsHostResolver::ConditionallyRefreshRecord(nsHostRecord *rec, const nsACString &host) { if ((rec->CheckExpiration(TimeStamp::NowLoRes()) != nsHostRecord::EXP_VALID || rec->negative) && !rec->mResolving) { LOG((" Using %s cache entry for host [%s] but starting async renewal.", rec->negative ? "negative" :"positive", host.BeginReading())); NameLookup(rec); if (rec->IsAddrRecord() && !rec->negative) { // negative entries are constantly being refreshed, only // track positive grace period induced renewals Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_RENEWAL); } } return NS_OK; } void nsHostResolver::DeQueue(LinkedList>& aQ, AddrHostRecord **aResult) { RefPtr rec = aQ.popFirst(); mPendingCount--; MOZ_ASSERT(rec->IsAddrRecord()); nsCOMPtr addrRec; addrRec = do_QueryInterface(rec); MOZ_ASSERT(addrRec); addrRec->onQueue = false; addrRec.forget(aResult); } bool nsHostResolver::GetHostToLookup(AddrHostRecord **result) { bool timedOut = false; TimeDuration timeout; TimeStamp epoch, now; MutexAutoLock lock(mLock); timeout = (mNumIdleTasks >= HighThreadThreshold) ? mShortIdleTimeout : mLongIdleTimeout; epoch = TimeStamp::Now(); while (!mShutdown) { // remove next record from Q; hand over owning reference. Check high, then med, then low #define SET_GET_TTL(var, val) (var)->mGetTtl = sGetTtlEnabled && (val) if (!mHighQ.isEmpty()) { DeQueue (mHighQ, result); SET_GET_TTL(*result, false); return true; } if (mActiveAnyThreadCount < HighThreadThreshold) { if (!mMediumQ.isEmpty()) { DeQueue (mMediumQ, result); mActiveAnyThreadCount++; (*result)->usingAnyThread = true; SET_GET_TTL(*result, true); return true; } if (!mLowQ.isEmpty()) { DeQueue (mLowQ, result); mActiveAnyThreadCount++; (*result)->usingAnyThread = true; SET_GET_TTL(*result, true); return true; } } // Determining timeout is racy, so allow one cycle through checking the queues // before exiting. if (timedOut) break; // wait for one or more of the following to occur: // (1) the pending queue has a host record to process // (2) the shutdown flag has been set // (3) the thread has been idle for too long mNumIdleTasks++; mIdleTaskCV.Wait(timeout); mNumIdleTasks--; now = TimeStamp::Now(); if (now - epoch >= timeout) { timedOut = true; } else { // It is possible that CondVar::Wait() was interrupted and returned // early, in which case we will loop back and re-enter it. In that // case we want to do so with the new timeout reduced to reflect // time already spent waiting. timeout -= now - epoch; epoch = now; } } // tell thread to exit... return false; } void nsHostResolver::PrepareRecordExpirationAddrRecord(AddrHostRecord* rec) const { // NOTE: rec->addr_info_lock is already held by parent MOZ_ASSERT(((bool)rec->addr_info) != rec->negative); mLock.AssertCurrentThreadOwns(); if (!rec->addr_info) { rec->SetExpiration(TimeStamp::NowLoRes(), NEGATIVE_RECORD_LIFETIME, 0); LOG(("Caching host [%s] negative record for %u seconds.\n", rec->host.get(), NEGATIVE_RECORD_LIFETIME)); return; } unsigned int lifetime = mDefaultCacheLifetime; unsigned int grace = mDefaultGracePeriod; unsigned int ttl = mDefaultCacheLifetime; if (sGetTtlEnabled || rec->addr_info->IsTRR()) { if (rec->addr_info && rec->addr_info->ttl != AddrInfo::NO_TTL_DATA) { ttl = rec->addr_info->ttl; } lifetime = ttl; grace = 0; } rec->SetExpiration(TimeStamp::NowLoRes(), lifetime, grace); LOG(("Caching host [%s] record for %u seconds (grace %d).", rec->host.get(), lifetime, grace)); } static nsresult merge_rrset(AddrInfo *rrto, AddrInfo *rrfrom) { if (!rrto || !rrfrom) { return NS_ERROR_NULL_POINTER; } NetAddrElement *element; while ((element = rrfrom->mAddresses.getFirst())) { element->remove(); // unlist from old rrto->AddAddress(element); // enlist on new } return NS_OK; } static bool different_rrset(AddrInfo *rrset1, AddrInfo *rrset2) { if (!rrset1 || !rrset2) { return true; } LOG(("different_rrset %s\n", rrset1->mHostName.get())); nsTArray orderedSet1; nsTArray orderedSet2; if (rrset1->IsTRR() != rrset2->IsTRR()) { return true; } for (NetAddrElement *element = rrset1->mAddresses.getFirst(); element; element = element->getNext()) { if (LOG_ENABLED()) { char buf[128]; NetAddrToString(&element->mAddress, buf, 128); LOG(("different_rrset add to set 1 %s\n", buf)); } orderedSet1.InsertElementAt(orderedSet1.Length(), element->mAddress); } for (NetAddrElement *element = rrset2->mAddresses.getFirst(); element; element = element->getNext()) { if (LOG_ENABLED()) { char buf[128]; NetAddrToString(&element->mAddress, buf, 128); LOG(("different_rrset add to set 2 %s\n", buf)); } orderedSet2.InsertElementAt(orderedSet2.Length(), element->mAddress); } if (orderedSet1.Length() != orderedSet2.Length()) { LOG(("different_rrset true due to length change\n")); return true; } orderedSet1.Sort(); orderedSet2.Sort(); for (uint32_t i = 0; i < orderedSet1.Length(); ++i) { if (!(orderedSet1[i] == orderedSet2[i])) { LOG(("different_rrset true due to content change\n")); return true; } } LOG(("different_rrset false\n")); return false; } void nsHostResolver::AddToEvictionQ(nsHostRecord* rec) { MOZ_ASSERT(!rec->isInList()); mEvictionQ.insertBack(rec); if (mEvictionQSize < mMaxCacheEntries) { mEvictionQSize++; } else { // remove first element on mEvictionQ RefPtr head = mEvictionQ.popFirst(); mRecordDB.Remove(*static_cast(head.get())); if (!head->negative) { // record the age of the entry upon eviction. TimeDuration age = TimeStamp::NowLoRes() - head->mValidStart; if (rec->IsAddrRecord()) { Telemetry::Accumulate(Telemetry::DNS_CLEANUP_AGE, static_cast(age.ToSeconds() / 60)); } else { Telemetry::Accumulate(Telemetry::DNS_BY_TYPE_CLEANUP_AGE, static_cast(age.ToSeconds() / 60)); } if (head->CheckExpiration(TimeStamp::Now()) != nsHostRecord::EXP_EXPIRED) { if (rec->IsAddrRecord()) { Telemetry::Accumulate(Telemetry::DNS_PREMATURE_EVICTION, static_cast(age.ToSeconds() / 60)); } else { Telemetry::Accumulate(Telemetry::DNS_BY_TYPE_PREMATURE_EVICTION, static_cast(age.ToSeconds() / 60)); } } } } } // // CompleteLookup() checks if the resolving should be redone and if so it // returns LOOKUP_RESOLVEAGAIN, but only if 'status' is not NS_ERROR_ABORT. // takes ownership of AddrInfo parameter nsHostResolver::LookupStatus nsHostResolver::CompleteLookup(nsHostRecord* rec, nsresult status, AddrInfo* aNewRRSet, bool pb) { MutexAutoLock lock(mLock); MOZ_ASSERT(rec); MOZ_ASSERT(rec->pb == pb); MOZ_ASSERT(rec->IsAddrRecord()); nsCOMPtr addrRec = do_QueryInterface(rec); MOZ_ASSERT(addrRec); // newRRSet needs to be taken into the hostrecord (which will then own it) // or deleted on early return. nsAutoPtr newRRSet(aNewRRSet); bool trrResult = newRRSet && newRRSet->IsTRR(); if (addrRec->mResolveAgain && (status != NS_ERROR_ABORT) && !trrResult) { LOG(("nsHostResolver record %p resolve again due to flushcache\n", addrRec.get())); addrRec->mResolveAgain = false; return LOOKUP_RESOLVEAGAIN; } MOZ_ASSERT(addrRec->mResolving); addrRec->mResolving--; LOG(("nsHostResolver::CompleteLookup %s %p %X trr=%d stillResolving=%d\n", addrRec->host.get(), aNewRRSet, (unsigned int)status, aNewRRSet ? aNewRRSet->IsTRR() : 0, addrRec->mResolving)); if (trrResult) { MutexAutoLock trrlock(addrRec->mTrrLock); LOG(("TRR lookup Complete (%d) %s %s\n", newRRSet->IsTRR(), newRRSet->mHostName.get(), NS_SUCCEEDED(status) ? "OK" : "FAILED")); MOZ_ASSERT(TRROutstanding()); if (newRRSet->IsTRR() == TRRTYPE_A) { MOZ_ASSERT(addrRec->mTrrA); addrRec->mTrrA = nullptr; addrRec->mTrrAUsed = NS_SUCCEEDED(status) ? AddrHostRecord::OK : AddrHostRecord::FAILED; } else if (newRRSet->IsTRR() == TRRTYPE_AAAA) { MOZ_ASSERT(addrRec->mTrrAAAA); addrRec->mTrrAAAA = nullptr; addrRec->mTrrAAAAUsed = NS_SUCCEEDED(status) ? AddrHostRecord::OK : AddrHostRecord::FAILED; } else { MOZ_ASSERT(0); } if (NS_SUCCEEDED(status)) { addrRec->mTRRSuccess++; if (addrRec->mTRRSuccess == 1) { // Store the duration on first succesful TRR response. We // don't know that there will be a second response nor can we // tell which of two has useful data, especially in // MODE_SHADOW where the actual results are discarded. addrRec->mTrrDuration = TimeStamp::Now() - addrRec->mTrrStart; } } if (TRROutstanding()) { addrRec->mFirstTRRresult = status; if (NS_FAILED(status)) { return LOOKUP_OK; // wait for outstanding } // There's another TRR complete pending. Wait for it and keep // this RRset around until then. MOZ_ASSERT(!addrRec->mFirstTRR && newRRSet); addrRec->mFirstTRR = newRRSet; // autoPtr.swap() MOZ_ASSERT(addrRec->mFirstTRR && !newRRSet); if (addrRec->mDidCallbacks || addrRec->mResolverMode == MODE_SHADOW) { return LOOKUP_OK; } if (addrRec->mTrrA && (!gTRRService || !gTRRService->EarlyAAAA())) { // This is an early AAAA with a pending A response. Allowed // only by pref. LOG(("CompleteLookup: avoiding early use of TRR AAAA!\n")); return LOOKUP_OK; } // we can do some callbacks with this partial result which requires // a deep copy newRRSet = new AddrInfo(addrRec->mFirstTRR); MOZ_ASSERT(addrRec->mFirstTRR && newRRSet); } else { // no more outstanding TRRs // If mFirstTRR is set, merge those addresses into current set! if (addrRec->mFirstTRR) { if (NS_SUCCEEDED(status)) { merge_rrset(newRRSet, addrRec->mFirstTRR); } else { newRRSet = addrRec->mFirstTRR; // transfers } addrRec->mFirstTRR = nullptr; } if (NS_FAILED(addrRec->mFirstTRRresult) && NS_FAILED(status) && (addrRec->mFirstTRRresult != NS_ERROR_UNKNOWN_HOST) && (status != NS_ERROR_UNKNOWN_HOST)) { // the errors are not failed resolves, that means // something else failed, consider this as *TRR not used* // for actually trying to resolve the host addrRec->mTRRUsed = false; } if (!addrRec->mTRRSuccess) { // no TRR success newRRSet = nullptr; status = NS_ERROR_UNKNOWN_HOST; } if (!addrRec->mTRRSuccess && addrRec->mResolverMode == MODE_TRRFIRST) { MOZ_ASSERT(!addrRec->mResolving); NativeLookup(addrRec); MOZ_ASSERT(addrRec->mResolving); return LOOKUP_OK; } // continue } } else { // native resolve completed if (addrRec->usingAnyThread) { mActiveAnyThreadCount--; addrRec->usingAnyThread = false; } addrRec->mNative = false; addrRec->mNativeSuccess = newRRSet ? true : false; if (addrRec->mNativeSuccess) { addrRec->mNativeDuration = TimeStamp::Now() - addrRec->mNativeStart; } } // update record fields. We might have a addrRec->addr_info already if a // previous lookup result expired and we're reresolving it or we get // a late second TRR response. // note that we don't update the addr_info if this is trr shadow results if (!mShutdown && !(trrResult && addrRec->mResolverMode == MODE_SHADOW)) { MutexAutoLock lock(addrRec->addr_info_lock); nsAutoPtr old_addr_info; if (different_rrset(addrRec->addr_info, newRRSet)) { LOG(("nsHostResolver record %p new gencnt\n", addrRec.get())); old_addr_info = addrRec->addr_info; addrRec->addr_info = newRRSet.forget(); addrRec->addr_info_gencnt++; } else { if (addrRec->addr_info && newRRSet) { addrRec->addr_info->ttl = newRRSet->ttl; } old_addr_info = newRRSet.forget(); } addrRec->negative = !addrRec->addr_info; PrepareRecordExpirationAddrRecord(addrRec); } bool doCallbacks = true; if (trrResult && (addrRec->mResolverMode == MODE_SHADOW) && !addrRec->mDidCallbacks) { // don't report result based only on suppressed TRR info doCallbacks = false; LOG(("nsHostResolver Suppressing TRR %s because it is first shadow result\n", addrRec->host.get())); } else if(trrResult && addrRec->mDidCallbacks) { // already callback'ed on the first TRR response LOG(("nsHostResolver Suppressing callback for second TRR response for %s\n", addrRec->host.get())); doCallbacks = false; } if (LOG_ENABLED()) { MutexAutoLock lock(addrRec->addr_info_lock); NetAddrElement *element; if (addrRec->addr_info) { for (element = addrRec->addr_info->mAddresses.getFirst(); element; element = element->getNext()) { char buf[128]; NetAddrToString(&element->mAddress, buf, sizeof(buf)); LOG(("CompleteLookup: %s has %s\n", addrRec->host.get(), buf)); } } else { LOG(("CompleteLookup: %s has NO address\n", addrRec->host.get())); } } if (doCallbacks) { // get the list of pending callbacks for this lookup, and notify // them that the lookup is complete. mozilla::LinkedList> cbs = std::move(rec->mCallbacks); LOG(("nsHostResolver record %p calling back dns users\n", addrRec.get())); for (nsResolveHostCallback* c = cbs.getFirst(); c; c = c->removeAndGetNext()) { c->OnResolveHostComplete(this, rec, status); } addrRec->mDidCallbacks = true; } if (!addrRec->mResolving && !mShutdown) { addrRec->ResolveComplete(); AddToEvictionQ(rec); } #ifdef DNSQUERY_AVAILABLE // Unless the result is from TRR, resolve again to get TTL bool fromTRR = false; { MutexAutoLock lock(addrRec->addr_info_lock); if(addrRec->addr_info && addrRec->addr_info->IsTRR()) { fromTRR = true; } } if (!fromTRR && !mShutdown && !addrRec->mGetTtl && !rec->mResolving && sGetTtlEnabled) { LOG(("Issuing second async lookup for TTL for host [%s].", addrRec->host.get())); addrRec->flags = (addrRec->flags & ~RES_PRIORITY_MEDIUM) | RES_PRIORITY_LOW | RES_DISABLE_TRR; DebugOnly rv = NameLookup(rec); NS_WARNING_ASSERTION( NS_SUCCEEDED(rv), "Could not issue second async lookup for TTL."); } #endif return LOOKUP_OK; } nsHostResolver::LookupStatus nsHostResolver::CompleteLookupByType(nsHostRecord* rec, nsresult status, const nsTArray *aResult, uint32_t aTtl, bool pb) { MutexAutoLock lock(mLock); MOZ_ASSERT(rec); MOZ_ASSERT(rec->pb == pb); MOZ_ASSERT(!rec->IsAddrRecord()); nsCOMPtr typeRec; typeRec = do_QueryInterface(rec); MOZ_ASSERT(typeRec); MOZ_ASSERT(typeRec->mResolving); typeRec->mResolving--; MutexAutoLock trrlock(typeRec->mTrrLock); typeRec->mTrr = nullptr; uint32_t duration = static_cast((TimeStamp::Now() - typeRec->mStart).ToMilliseconds()); if (NS_FAILED(status)) { LOG(("nsHostResolver::CompleteLookupByType record %p [%s] status %x\n", typeRec.get(), typeRec->host.get(), (unsigned int)status)); typeRec->SetExpiration(TimeStamp::NowLoRes(), NEGATIVE_RECORD_LIFETIME, 0); MOZ_ASSERT(!aResult); status = NS_ERROR_UNKNOWN_HOST; typeRec->negative = true; Telemetry::Accumulate(Telemetry::DNS_BY_TYPE_FAILED_LOOKUP_TIME, duration); } else { MOZ_ASSERT(aResult); LOG(("nsHostResolver::CompleteLookupByType record %p [%s], number of " "records %zu\n", typeRec.get(), typeRec->host.get(), aResult->Length())); MutexAutoLock typeLock(typeRec->mResultsLock); typeRec->mResults = *aResult; typeRec->SetExpiration(TimeStamp::NowLoRes(), aTtl, mDefaultGracePeriod); typeRec->negative = false; Telemetry::Accumulate(Telemetry::DNS_BY_TYPE_SUCCEEDED_LOOKUP_TIME, duration); } mozilla::LinkedList> cbs = std::move(typeRec->mCallbacks); LOG(("nsHostResolver::CompleteLookupByType record %p calling back dns " "users\n", typeRec.get())); for (nsResolveHostCallback* c = cbs.getFirst(); c; c = c->removeAndGetNext()) { c->OnResolveHostComplete(this, rec, status); } AddToEvictionQ(rec); return LOOKUP_OK; } void nsHostResolver::CancelAsyncRequest(const nsACString &host, uint16_t aType, const OriginAttributes &aOriginAttributes, uint16_t flags, uint16_t af, nsIDNSListener *aListener, nsresult status) { MutexAutoLock lock(mLock); nsAutoCString originSuffix; aOriginAttributes.CreateSuffix(originSuffix); // Lookup the host record associated with host, flags & address family nsHostKey key(host, aType, flags, af, (aOriginAttributes.mPrivateBrowsingId > 0), originSuffix); RefPtr rec = mRecordDB.Get(key); if (rec) { nsHostRecord* recPtr = nullptr; for (RefPtr c : rec->mCallbacks) { if (c->EqualsAsyncListener(aListener)) { c->remove(); recPtr = rec; c->OnResolveHostComplete(this, recPtr, status); break; } } // If there are no more callbacks, remove the hash table entry if (recPtr && recPtr->mCallbacks.isEmpty()) { mRecordDB.Remove(*static_cast(recPtr)); // If record is on a Queue, remove it and then deref it if (recPtr->isInList()) { recPtr->remove(); } } } } size_t nsHostResolver::SizeOfIncludingThis(MallocSizeOf mallocSizeOf) const { MutexAutoLock lock(mLock); size_t n = mallocSizeOf(this); n += mRecordDB.ShallowSizeOfExcludingThis(mallocSizeOf); for (auto iter = mRecordDB.ConstIter(); !iter.Done(); iter.Next()) { auto entry = iter.UserData(); n += entry->SizeOfIncludingThis(mallocSizeOf); } // The following fields aren't measured. // - mHighQ, mMediumQ, mLowQ, mEvictionQ, because they just point to // nsHostRecords that also pointed to by entries |mRecordDB|, and // measured when |mRecordDB| is measured. return n; } void nsHostResolver::ThreadFunc() { LOG(("DNS lookup thread - starting execution.\n")); #if defined(RES_RETRY_ON_FAILURE) nsResState rs; #endif nsCOMPtr rec; AddrInfo *ai = nullptr; do { if (!rec) { nsCOMPtr tmpRec; if (!GetHostToLookup(getter_AddRefs(tmpRec))) { break; // thread shutdown signal } // GetHostToLookup() returns an owning reference MOZ_ASSERT(tmpRec); rec.swap(tmpRec); } LOG(("DNS lookup thread - Calling getaddrinfo for host [%s].\n", rec->host.get())); TimeStamp startTime = TimeStamp::Now(); bool getTtl = rec->mGetTtl; TimeDuration inQueue = startTime - rec->mNativeStart; uint32_t ms = static_cast(inQueue.ToMilliseconds()); Telemetry::Accumulate(Telemetry::DNS_NATIVE_QUEUING, ms); nsresult status = GetAddrInfo(rec->host, rec->af, rec->flags, &ai, getTtl); #if defined(RES_RETRY_ON_FAILURE) if (NS_FAILED(status) && rs.Reset()) { status = GetAddrInfo(rec->host, rec->af, rec->flags, &ai, getTtl); } #endif { // obtain lock to check shutdown and manage inter-module telemetry MutexAutoLock lock(mLock); if (!mShutdown) { TimeDuration elapsed = TimeStamp::Now() - startTime; uint32_t millis = static_cast(elapsed.ToMilliseconds()); if (NS_SUCCEEDED(status)) { Telemetry::HistogramID histogramID; if (!rec->addr_info_gencnt) { // Time for initial lookup. histogramID = Telemetry::DNS_LOOKUP_TIME; } else if (!getTtl) { // Time for renewal; categorized by expiration strategy. histogramID = Telemetry::DNS_RENEWAL_TIME; } else { // Time to get TTL; categorized by expiration strategy. histogramID = Telemetry::DNS_RENEWAL_TIME_FOR_TTL; } Telemetry::Accumulate(histogramID, millis); } else { Telemetry::Accumulate(Telemetry::DNS_FAILED_LOOKUP_TIME, millis); } } } LOG(("DNS lookup thread - lookup completed for host [%s]: %s.\n", rec->host.get(), ai ? "success" : "failure: unknown host")); if (LOOKUP_RESOLVEAGAIN == CompleteLookup(rec, status, ai, rec->pb)) { // leave 'rec' assigned and loop to make a renewed host resolve LOG(("DNS lookup thread - Re-resolving host [%s].\n", rec->host.get())); } else { rec = nullptr; } } while(true); mActiveTaskCount--; LOG(("DNS lookup thread - queue empty, task finished.\n")); } void nsHostResolver::SetCacheLimits(uint32_t aMaxCacheEntries, uint32_t aDefaultCacheEntryLifetime, uint32_t aDefaultGracePeriod) { MutexAutoLock lock(mLock); mMaxCacheEntries = aMaxCacheEntries; mDefaultCacheLifetime = aDefaultCacheEntryLifetime; mDefaultGracePeriod = aDefaultGracePeriod; } nsresult nsHostResolver::Create(uint32_t maxCacheEntries, uint32_t defaultCacheEntryLifetime, uint32_t defaultGracePeriod, nsHostResolver **result) { RefPtr res = new nsHostResolver(maxCacheEntries, defaultCacheEntryLifetime, defaultGracePeriod); nsresult rv = res->Init(); if (NS_FAILED(rv)) { return rv; } res.forget(result); return NS_OK; } void nsHostResolver::GetDNSCacheEntries(nsTArray *args) { MutexAutoLock lock(mLock); for (auto iter = mRecordDB.Iter(); !iter.Done(); iter.Next()) { // We don't pay attention to address literals, only resolved domains. // Also require a host. nsHostRecord* rec = iter.UserData(); MOZ_ASSERT(rec, "rec should never be null here!"); if (!rec) { continue; } // For now we only show A/AAAA records. if (!rec->IsAddrRecord()) { continue; } nsCOMPtr addrRec = do_QueryInterface(rec); MOZ_ASSERT(addrRec); if (!addrRec || !addrRec->addr_info) { continue; } DNSCacheEntries info; info.hostname = rec->host; info.family = rec->af; info.expiration = (int64_t)(rec->mValidEnd - TimeStamp::NowLoRes()).ToSeconds(); if (info.expiration <= 0) { // We only need valid DNS cache entries continue; } { MutexAutoLock lock(addrRec->addr_info_lock); NetAddr *addr = nullptr; NetAddrElement *addrElement = addrRec->addr_info->mAddresses.getFirst(); if (addrElement) { addr = &addrElement->mAddress; } while (addr) { char buf[kIPv6CStrBufSize]; if (NetAddrToString(addr, buf, sizeof(buf))) { info.hostaddr.AppendElement(buf); } addr = nullptr; addrElement = addrElement->getNext(); if (addrElement) { addr = &addrElement->mAddress; } } info.TRR = addrRec->addr_info->IsTRR(); } args->AppendElement(info); } } #undef LOG #undef LOG_ENABLED