/* vim:set ts=4 sw=2 sts=2 et cin: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #if defined(HAVE_RES_NINIT) # include # include # include # include # include # define RES_RETRY_ON_FAILURE #endif #include #include #include "nsHostResolver.h" #include "nsError.h" #include "nsISupportsBase.h" #include "nsISupportsUtils.h" #include "nsIThreadManager.h" #include "nsAutoPtr.h" #include "nsComponentManagerUtils.h" #include "nsPrintfCString.h" #include "nsXPCOMCIDInternal.h" #include "prthread.h" #include "prerror.h" #include "prtime.h" #include "mozilla/Logging.h" #include "PLDHashTable.h" #include "plstr.h" #include "nsQueryObject.h" #include "nsURLHelper.h" #include "nsThreadUtils.h" #include "nsThreadPool.h" #include "GetAddrInfo.h" #include "GeckoProfiler.h" #include "TRR.h" #include "TRRService.h" #include "mozilla/Atomics.h" #include "mozilla/HashFunctions.h" #include "mozilla/TimeStamp.h" #include "mozilla/Telemetry.h" #include "mozilla/DebugOnly.h" #include "mozilla/Preferences.h" #include "mozilla/StaticPrefs_network.h" using namespace mozilla; using namespace mozilla::net; // None of our implementations expose a TTL for negative responses, so we use a // constant always. static const unsigned int NEGATIVE_RECORD_LIFETIME = 60; //---------------------------------------------------------------------------- // Use a persistent thread pool in order to avoid spinning up new threads all // the time. In particular, thread creation results in a res_init() call from // libc which is quite expensive. // // The pool dynamically grows between 0 and MAX_RESOLVER_THREADS in size. New // requests go first to an idle thread. If that cannot be found and there are // fewer than MAX_RESOLVER_THREADS currently in the pool a new thread is created // for high priority requests. If the new request is at a lower priority a new // thread will only be created if there are fewer than HighThreadThreshold // currently outstanding. If a thread cannot be created or an idle thread // located for the request it is queued. // // When the pool is greater than HighThreadThreshold in size a thread will be // destroyed after ShortIdleTimeoutSeconds of idle time. Smaller pools use // LongIdleTimeoutSeconds for a timeout period. #define HighThreadThreshold MAX_RESOLVER_THREADS_FOR_ANY_PRIORITY #define LongIdleTimeoutSeconds 300 // for threads 1 -> HighThreadThreshold #define ShortIdleTimeoutSeconds \ 60 // for threads HighThreadThreshold+1 -> MAX_RESOLVER_THREADS static_assert( HighThreadThreshold <= MAX_RESOLVER_THREADS, "High Thread Threshold should be less equal Maximum allowed thread"); //---------------------------------------------------------------------------- namespace mozilla { namespace net { LazyLogModule gHostResolverLog("nsHostResolver"); #define LOG(args) \ MOZ_LOG(mozilla::net::gHostResolverLog, mozilla::LogLevel::Debug, args) #define LOG1(args) \ MOZ_LOG(mozilla::net::gHostResolverLog, mozilla::LogLevel::Error, args) #define LOG_ENABLED() \ MOZ_LOG_TEST(mozilla::net::gHostResolverLog, mozilla::LogLevel::Debug) } // namespace net } // namespace mozilla //---------------------------------------------------------------------------- #if defined(RES_RETRY_ON_FAILURE) // this class represents the resolver state for a given thread. if we // encounter a lookup failure, then we can invoke the Reset method on an // instance of this class to reset the resolver (in case /etc/resolv.conf // for example changed). this is mainly an issue on GNU systems since glibc // only reads in /etc/resolv.conf once per thread. it may be an issue on // other systems as well. class nsResState { public: nsResState() // initialize mLastReset to the time when this object // is created. this means that a reset will not occur // if a thread is too young. the alternative would be // to initialize this to the beginning of time, so that // the first failure would cause a reset, but since the // thread would have just started up, it likely would // already have current /etc/resolv.conf info. : mLastReset(PR_IntervalNow()) {} bool Reset() { // reset no more than once per second if (PR_IntervalToSeconds(PR_IntervalNow() - mLastReset) < 1) return false; LOG(("Calling 'res_ninit'.\n")); mLastReset = PR_IntervalNow(); return (res_ninit(&_res) == 0); } private: PRIntervalTime mLastReset; }; #endif // RES_RETRY_ON_FAILURE //---------------------------------------------------------------------------- static inline bool IsHighPriority(uint16_t flags) { return !(flags & (nsHostResolver::RES_PRIORITY_LOW | nsHostResolver::RES_PRIORITY_MEDIUM)); } static inline bool IsMediumPriority(uint16_t flags) { return flags & nsHostResolver::RES_PRIORITY_MEDIUM; } static inline bool IsLowPriority(uint16_t flags) { return flags & nsHostResolver::RES_PRIORITY_LOW; } //---------------------------------------------------------------------------- // this macro filters out any flags that are not used when constructing the // host key. the significant flags are those that would affect the resulting // host record (i.e., the flags that are passed down to PR_GetAddrInfoByName). #define RES_KEY_FLAGS(_f) \ ((_f) & (nsHostResolver::RES_CANON_NAME | nsHostResolver::RES_DISABLE_TRR)) #define IS_ADDR_TYPE(_type) ((_type) == nsIDNSService::RESOLVE_TYPE_DEFAULT) #define IS_OTHER_TYPE(_type) ((_type) != nsIDNSService::RESOLVE_TYPE_DEFAULT) nsHostKey::nsHostKey(const nsACString& aHost, uint16_t aType, uint16_t aFlags, uint16_t aAf, bool aPb, const nsACString& aOriginsuffix) : host(aHost), type(aType), flags(aFlags), af(aAf), pb(aPb), originSuffix(aOriginsuffix) { if (TRR_DISABLED(gTRRService->Mode())) { // When not using TRR, lookup all answers as TRR-disabled flags |= nsHostResolver::RES_DISABLE_TRR; } } bool nsHostKey::operator==(const nsHostKey& other) const { return host == other.host && type == other.type && RES_KEY_FLAGS(flags) == RES_KEY_FLAGS(other.flags) && af == other.af && originSuffix == other.originSuffix; } PLDHashNumber nsHostKey::Hash() const { return AddToHash(HashString(host.get()), type, RES_KEY_FLAGS(flags), af, HashString(originSuffix.get())); } size_t nsHostKey::SizeOfExcludingThis( mozilla::MallocSizeOf mallocSizeOf) const { size_t n = 0; n += host.SizeOfExcludingThisIfUnshared(mallocSizeOf); n += originSuffix.SizeOfExcludingThisIfUnshared(mallocSizeOf); return n; } NS_IMPL_ISUPPORTS0(nsHostRecord) nsHostRecord::nsHostRecord(const nsHostKey& key) : nsHostKey(key), mResolverMode(MODE_NATIVEONLY), mResolving(0), negative(false), mDoomed(false) {} void nsHostRecord::Invalidate() { mDoomed = true; } nsHostRecord::ExpirationStatus nsHostRecord::CheckExpiration( const mozilla::TimeStamp& now) const { if (!mGraceStart.IsNull() && now >= mGraceStart && !mValidEnd.IsNull() && now < mValidEnd) { return nsHostRecord::EXP_GRACE; } if (!mValidEnd.IsNull() && now < mValidEnd) { return nsHostRecord::EXP_VALID; } return nsHostRecord::EXP_EXPIRED; } void nsHostRecord::SetExpiration(const mozilla::TimeStamp& now, unsigned int valid, unsigned int grace) { mValidStart = now; if ((valid + grace) < 60) { grace = 60 - valid; LOG(("SetExpiration: artificially bumped grace to %d\n", grace)); } mGraceStart = now + TimeDuration::FromSeconds(valid); mValidEnd = now + TimeDuration::FromSeconds(valid + grace); } void nsHostRecord::CopyExpirationTimesAndFlagsFrom( const nsHostRecord* aFromHostRecord) { // This is used to copy information from a cache entry to a record. All // information necessary for HasUsableRecord needs to be copied. mValidStart = aFromHostRecord->mValidStart; mValidEnd = aFromHostRecord->mValidEnd; mGraceStart = aFromHostRecord->mGraceStart; mDoomed = aFromHostRecord->mDoomed; } bool nsHostRecord::HasUsableResult(const mozilla::TimeStamp& now, uint16_t queryFlags) const { if (mDoomed) { return false; } // don't use cached negative results for high priority queries. if (negative && IsHighPriority(queryFlags)) { return false; } if (CheckExpiration(now) == EXP_EXPIRED) { return false; } if (negative) { return true; } return HasUsableResultInternal(); } static size_t SizeOfResolveHostCallbackListExcludingHead( const mozilla::LinkedList>& aCallbacks, MallocSizeOf mallocSizeOf) { size_t n = aCallbacks.sizeOfExcludingThis(mallocSizeOf); for (const nsResolveHostCallback* t = aCallbacks.getFirst(); t; t = t->getNext()) { n += t->SizeOfIncludingThis(mallocSizeOf); } return n; } NS_IMPL_ISUPPORTS_INHERITED(AddrHostRecord, nsHostRecord, AddrHostRecord) AddrHostRecord::AddrHostRecord(const nsHostKey& key) : nsHostRecord(key), addr_info_lock("AddrHostRecord.addr_info_lock"), addr_info_gencnt(0), addr_info(nullptr), addr(nullptr), mFirstTRRresult(NS_OK), mTRRSuccess(0), mNativeSuccess(0), mNative(false), mTRRUsed(false), mNativeUsed(false), onQueue(false), usingAnyThread(false), mDidCallbacks(false), mGetTtl(false), mResolveAgain(false), mTrrAUsed(INIT), mTrrAAAAUsed(INIT), mTrrLock("AddrHostRecord.mTrrLock"), mBlacklistedCount(0) {} AddrHostRecord::~AddrHostRecord() { mCallbacks.clear(); Telemetry::Accumulate(Telemetry::DNS_BLACKLIST_COUNT, mBlacklistedCount); } bool AddrHostRecord::Blacklisted(NetAddr* aQuery) { // must call locked LOG(("Checking blacklist for host [%s], host record [%p].\n", host.get(), this)); // skip the string conversion for the common case of no blacklist if (!mBlacklistedItems.Length()) { return false; } char buf[kIPv6CStrBufSize]; if (!NetAddrToString(aQuery, buf, sizeof(buf))) { return false; } nsDependentCString strQuery(buf); for (uint32_t i = 0; i < mBlacklistedItems.Length(); i++) { if (mBlacklistedItems.ElementAt(i).Equals(strQuery)) { LOG(("Address [%s] is blacklisted for host [%s].\n", buf, host.get())); return true; } } return false; } void AddrHostRecord::ReportUnusable(NetAddr* aAddress) { // must call locked LOG( ("Adding address to blacklist for host [%s], host record [%p]." "used trr=%d\n", host.get(), this, mTRRSuccess)); ++mBlacklistedCount; char buf[kIPv6CStrBufSize]; if (NetAddrToString(aAddress, buf, sizeof(buf))) { LOG( ("Successfully adding address [%s] to blacklist for host " "[%s].\n", buf, host.get())); mBlacklistedItems.AppendElement(nsCString(buf)); } } void AddrHostRecord::ResetBlacklist() { // must call locked LOG(("Resetting blacklist for host [%s], host record [%p].\n", host.get(), this)); mBlacklistedItems.Clear(); } size_t AddrHostRecord::SizeOfIncludingThis(MallocSizeOf mallocSizeOf) const { size_t n = mallocSizeOf(this); n += nsHostKey::SizeOfExcludingThis(mallocSizeOf); n += SizeOfResolveHostCallbackListExcludingHead(mCallbacks, mallocSizeOf); n += addr_info ? addr_info->SizeOfIncludingThis(mallocSizeOf) : 0; n += mallocSizeOf(addr.get()); n += mBlacklistedItems.ShallowSizeOfExcludingThis(mallocSizeOf); for (size_t i = 0; i < mBlacklistedItems.Length(); i++) { n += mBlacklistedItems[i].SizeOfExcludingThisIfUnshared(mallocSizeOf); } return n; } bool AddrHostRecord::HasUsableResultInternal() const { return addr_info || addr; } void AddrHostRecord::Cancel() { MutexAutoLock trrlock(mTrrLock); if (mTrrA) { mTrrA->Cancel(); mTrrA = nullptr; } if (mTrrAAAA) { mTrrAAAA->Cancel(); mTrrAAAA = nullptr; } } // Returns true if the entry can be removed, or false if it should be left. // Sets mResolveAgain true for entries being resolved right now. bool AddrHostRecord::RemoveOrRefresh(bool aTrrToo) { // no need to flush TRRed names, they're not resolved "locally" MutexAutoLock lock(addr_info_lock); if (addr_info && !aTrrToo && addr_info->IsTRR()) { return false; } if (mNative) { if (!onQueue) { // The request has been passed to the OS resolver. The resultant DNS // record should be considered stale and not trusted; set a flag to // ensure it is called again. mResolveAgain = true; } // if Onqueue is true, the host entry is already added to the cache // but is still pending to get resolved: just leave it in hash. return false; } // Already resolved; not in a pending state; remove from cache return true; } void AddrHostRecord::ResolveComplete() { if (mNativeUsed) { if (mNativeSuccess) { uint32_t millis = static_cast(mNativeDuration.ToMilliseconds()); Telemetry::Accumulate(Telemetry::DNS_NATIVE_LOOKUP_TIME, millis); } AccumulateCategorical( mNativeSuccess ? Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::osOK : Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::osFail); } if (mTRRUsed) { if (mTRRSuccess) { uint32_t millis = static_cast(mTrrDuration.ToMilliseconds()); Telemetry::Accumulate(Telemetry::DNS_TRR_LOOKUP_TIME, millis); } AccumulateCategorical( mTRRSuccess ? Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::trrOK : Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::trrFail); if (mTrrAUsed == OK) { AccumulateCategorical(Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::trrAOK); } else if (mTrrAUsed == FAILED) { AccumulateCategorical(Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::trrAFail); } if (mTrrAAAAUsed == OK) { AccumulateCategorical( Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::trrAAAAOK); } else if (mTrrAAAAUsed == FAILED) { AccumulateCategorical( Telemetry::LABELS_DNS_LOOKUP_DISPOSITION::trrAAAAFail); } } if (mResolverMode == MODE_TRRFIRST) { if (flags & nsIDNSService::RESOLVE_DISABLE_TRR) { // TRR is disabled on request, which is a next-level back-off method. Telemetry::Accumulate(Telemetry::DNS_TRR_DISABLED, mNativeSuccess); } else { if (mTRRSuccess) { AccumulateCategorical(Telemetry::LABELS_DNS_TRR_FIRST2::TRR); } else if (mNativeSuccess) { if (mTRRUsed) { AccumulateCategorical( Telemetry::LABELS_DNS_TRR_FIRST2::NativeAfterTRR); } else { AccumulateCategorical(Telemetry::LABELS_DNS_TRR_FIRST2::Native); } } else { AccumulateCategorical(Telemetry::LABELS_DNS_TRR_FIRST2::BothFailed); } } } switch (mResolverMode) { case MODE_NATIVEONLY: case MODE_TRROFF: AccumulateCategorical(Telemetry::LABELS_DNS_LOOKUP_ALGORITHM::nativeOnly); break; case MODE_TRRFIRST: AccumulateCategorical(Telemetry::LABELS_DNS_LOOKUP_ALGORITHM::trrFirst); break; case MODE_TRRONLY: AccumulateCategorical(Telemetry::LABELS_DNS_LOOKUP_ALGORITHM::trrOnly); break; case MODE_RESERVED1: MOZ_DIAGNOSTIC_ASSERT(false, "MODE_RESERVED1 should not be used"); break; case MODE_RESERVED4: MOZ_DIAGNOSTIC_ASSERT(false, "MODE_RESERVED4 should not be used"); break; } if (mTRRUsed && !mTRRSuccess && mNativeSuccess && gTRRService) { gTRRService->TRRBlacklist(nsCString(host), originSuffix, pb, true); } } AddrHostRecord::DnsPriority AddrHostRecord::GetPriority(uint16_t aFlags) { if (IsHighPriority(aFlags)) { return AddrHostRecord::DNS_PRIORITY_HIGH; } if (IsMediumPriority(aFlags)) { return AddrHostRecord::DNS_PRIORITY_MEDIUM; } return AddrHostRecord::DNS_PRIORITY_LOW; } NS_IMPL_ISUPPORTS_INHERITED(TypeHostRecord, nsHostRecord, TypeHostRecord) TypeHostRecord::TypeHostRecord(const nsHostKey& key) : nsHostRecord(key), mTrrLock("TypeHostRecord.mTrrLock"), mResultsLock("TypeHostRecord.mResultsLock") {} TypeHostRecord::~TypeHostRecord() { mCallbacks.clear(); } bool TypeHostRecord::HasUsableResultInternal() const { return !mResults.IsEmpty(); } void TypeHostRecord::GetRecords(nsTArray& aRecords) { // deep copy MutexAutoLock lock(mResultsLock); aRecords = mResults; } void TypeHostRecord::GetRecordsAsOneString(nsACString& aRecords) { // deep copy MutexAutoLock lock(mResultsLock); for (uint32_t i = 0; i < mResults.Length(); i++) { aRecords.Append(mResults[i]); } } size_t TypeHostRecord::SizeOfIncludingThis(MallocSizeOf mallocSizeOf) const { size_t n = mallocSizeOf(this); n += nsHostKey::SizeOfExcludingThis(mallocSizeOf); n += SizeOfResolveHostCallbackListExcludingHead(mCallbacks, mallocSizeOf); return n; } void TypeHostRecord::Cancel() { if (mTrr) { mTrr->Cancel(); mTrr = nullptr; } } //---------------------------------------------------------------------------- static const char kPrefGetTtl[] = "network.dns.get-ttl"; static const char kPrefNativeIsLocalhost[] = "network.dns.native-is-localhost"; static const char kPrefThreadIdleTime[] = "network.dns.resolver-thread-extra-idle-time-seconds"; static const char kPrefSkipTRRParentalControl[] = "network.dns.skipTRR-when-parental-control-enabled"; static bool sGetTtlEnabled = false; mozilla::Atomic gNativeIsLocalhost; static void DnsPrefChanged(const char* aPref, nsHostResolver* aSelf) { MOZ_ASSERT(NS_IsMainThread(), "Should be getting pref changed notification on main thread!"); MOZ_ASSERT(aSelf); if (!strcmp(aPref, kPrefGetTtl)) { #ifdef DNSQUERY_AVAILABLE sGetTtlEnabled = Preferences::GetBool(kPrefGetTtl); #endif } else if (!strcmp(aPref, kPrefNativeIsLocalhost)) { gNativeIsLocalhost = Preferences::GetBool(kPrefNativeIsLocalhost); } } NS_IMPL_ISUPPORTS0(nsHostResolver) nsHostResolver::nsHostResolver(uint32_t maxCacheEntries, uint32_t defaultCacheEntryLifetime, uint32_t defaultGracePeriod) : mMaxCacheEntries(maxCacheEntries), mDefaultCacheLifetime(defaultCacheEntryLifetime), mDefaultGracePeriod(defaultGracePeriod), mLock("nsHostResolver.mLock"), mIdleTaskCV(mLock, "nsHostResolver.mIdleTaskCV"), mEvictionQSize(0), mSkipTRRWhenParentalControlEnabled(true), mShutdown(true), mNumIdleTasks(0), mActiveTaskCount(0), mActiveAnyThreadCount(0), mPendingCount(0) { mCreationTime = PR_Now(); mLongIdleTimeout = TimeDuration::FromSeconds(LongIdleTimeoutSeconds); mShortIdleTimeout = TimeDuration::FromSeconds(ShortIdleTimeoutSeconds); } nsHostResolver::~nsHostResolver() = default; nsresult nsHostResolver::Init() { MOZ_ASSERT(NS_IsMainThread()); if (NS_FAILED(GetAddrInfoInit())) { return NS_ERROR_FAILURE; } LOG(("nsHostResolver::Init this=%p", this)); mShutdown = false; mNCS = NetworkConnectivityService::GetSingleton(); mSkipTRRWhenParentalControlEnabled = Preferences::GetBool(kPrefSkipTRRParentalControl, true); // The preferences probably haven't been loaded from the disk yet, so we // need to register a callback that will set up the experiment once they // are. We also need to explicitly set a value for the props otherwise the // callback won't be called. { DebugOnly rv = Preferences::RegisterCallbackAndCall( &DnsPrefChanged, kPrefGetTtl, this); NS_WARNING_ASSERTION(NS_SUCCEEDED(rv), "Could not register DNS TTL pref callback."); rv = Preferences::RegisterCallbackAndCall(&DnsPrefChanged, kPrefNativeIsLocalhost, this); NS_WARNING_ASSERTION(NS_SUCCEEDED(rv), "Could not register DNS pref callback."); } #if defined(HAVE_RES_NINIT) // We want to make sure the system is using the correct resolver settings, // so we force it to reload those settings whenever we startup a subsequent // nsHostResolver instance. We assume that there is no reason to do this // for the first nsHostResolver instance since that is usually created // during application startup. static int initCount = 0; if (initCount++ > 0) { LOG(("Calling 'res_ninit'.\n")); res_ninit(&_res); } #endif // We can configure the threadpool to keep threads alive for a while after // the last ThreadFunc task has been executed. int32_t poolTimeoutSecs = Preferences::GetInt(kPrefThreadIdleTime, 60); uint32_t poolTimeoutMs; if (poolTimeoutSecs < 0) { // This means never shut down the idle threads poolTimeoutMs = UINT32_MAX; } else { // We clamp down the idle time between 0 and one hour. poolTimeoutMs = mozilla::clamped(poolTimeoutSecs * 1000, 0, 3600 * 1000); } nsCOMPtr threadPool = new nsThreadPool(); MOZ_ALWAYS_SUCCEEDS(threadPool->SetThreadLimit(MAX_RESOLVER_THREADS)); MOZ_ALWAYS_SUCCEEDS(threadPool->SetIdleThreadLimit(MAX_RESOLVER_THREADS)); MOZ_ALWAYS_SUCCEEDS(threadPool->SetIdleThreadTimeout(poolTimeoutMs)); MOZ_ALWAYS_SUCCEEDS( threadPool->SetThreadStackSize(nsIThreadManager::kThreadPoolStackSize)); MOZ_ALWAYS_SUCCEEDS(threadPool->SetName(NS_LITERAL_CSTRING("DNS Resolver"))); mResolverThreads = threadPool.forget(); return NS_OK; } void nsHostResolver::ClearPendingQueue( LinkedList>& aPendingQ) { // loop through pending queue, erroring out pending lookups. if (!aPendingQ.isEmpty()) { for (RefPtr rec : aPendingQ) { rec->Cancel(); if (rec->IsAddrRecord()) { CompleteLookup(rec, NS_ERROR_ABORT, nullptr, rec->pb, rec->originSuffix); } else { CompleteLookupByType(rec, NS_ERROR_ABORT, nullptr, 0, rec->pb); } } } } // // FlushCache() is what we call when the network has changed. We must not // trust names that were resolved before this change. They may resolve // differently now. // // This function removes all existing resolved host entries from the hash. // Names that are in the pending queues can be left there. Entries in the // cache that have 'Resolve' set true but not 'onQueue' are being resolved // right now, so we need to mark them to get re-resolved on completion! void nsHostResolver::FlushCache(bool aTrrToo) { MutexAutoLock lock(mLock); mEvictionQSize = 0; // Clear the evictionQ and remove all its corresponding entries from // the cache first if (!mEvictionQ.isEmpty()) { for (RefPtr rec : mEvictionQ) { rec->Cancel(); mRecordDB.Remove(*static_cast(rec)); } mEvictionQ.clear(); } // Refresh the cache entries that are resolving RIGHT now, remove the rest. for (auto iter = mRecordDB.Iter(); !iter.Done(); iter.Next()) { nsHostRecord* record = iter.UserData(); // Try to remove the record, or mark it for refresh. // By-type records are from TRR. We do not need to flush those entry // when the network has change, because they are not local. if (record->IsAddrRecord()) { RefPtr addrRec = do_QueryObject(record); MOZ_ASSERT(addrRec); if (addrRec->RemoveOrRefresh(aTrrToo)) { if (record->isInList()) { record->remove(); } iter.Remove(); } } } } void nsHostResolver::Shutdown() { LOG(("Shutting down host resolver.\n")); { DebugOnly rv = Preferences::UnregisterCallback(&DnsPrefChanged, kPrefGetTtl, this); NS_WARNING_ASSERTION(NS_SUCCEEDED(rv), "Could not unregister DNS TTL pref callback."); } LinkedList> pendingQHigh, pendingQMed, pendingQLow, evictionQ; { MutexAutoLock lock(mLock); mShutdown = true; // Move queues to temporary lists. pendingQHigh = std::move(mHighQ); pendingQMed = std::move(mMediumQ); pendingQLow = std::move(mLowQ); evictionQ = std::move(mEvictionQ); mEvictionQSize = 0; mPendingCount = 0; if (mNumIdleTasks) mIdleTaskCV.NotifyAll(); for (auto iter = mRecordDB.Iter(); !iter.Done(); iter.Next()) { iter.UserData()->Cancel(); } // empty host database mRecordDB.Clear(); mNCS = nullptr; } ClearPendingQueue(pendingQHigh); ClearPendingQueue(pendingQMed); ClearPendingQueue(pendingQLow); if (!evictionQ.isEmpty()) { for (RefPtr rec : evictionQ) { rec->Cancel(); } } pendingQHigh.clear(); pendingQMed.clear(); pendingQLow.clear(); evictionQ.clear(); // Shutdown the resolver threads, but with a timeout of 2 seconds (prefable). // If the timeout is exceeded, any stuck threads will be leaked. mResolverThreads->ShutdownWithTimeout( StaticPrefs::network_dns_resolver_shutdown_timeout_ms()); { mozilla::DebugOnly rv = GetAddrInfoShutdown(); NS_WARNING_ASSERTION(NS_SUCCEEDED(rv), "Failed to shutdown GetAddrInfo"); } } nsresult nsHostResolver::GetHostRecord(const nsACString& host, uint16_t type, uint16_t flags, uint16_t af, bool pb, const nsCString& originSuffix, nsHostRecord** result) { MutexAutoLock lock(mLock); nsHostKey key(host, type, flags, af, pb, originSuffix); RefPtr& entry = mRecordDB.GetOrInsert(key); if (!entry) { if (IS_ADDR_TYPE(type)) { entry = new AddrHostRecord(key); } else { entry = new TypeHostRecord(key); } } RefPtr rec = entry; if (rec->IsAddrRecord()) { RefPtr addrRec = do_QueryObject(rec); if (addrRec->addr) { return NS_ERROR_FAILURE; } } if (rec->mResolving) { return NS_ERROR_FAILURE; } *result = rec.forget().take(); return NS_OK; } nsresult nsHostResolver::ResolveHost(const nsACString& aHost, uint16_t type, const OriginAttributes& aOriginAttributes, uint16_t flags, uint16_t af, nsResolveHostCallback* aCallback) { nsAutoCString host(aHost); NS_ENSURE_TRUE(!host.IsEmpty(), NS_ERROR_UNEXPECTED); LOG(("Resolving host [%s]%s%s type %d. [this=%p]\n", host.get(), flags & RES_BYPASS_CACHE ? " - bypassing cache" : "", flags & RES_REFRESH_CACHE ? " - refresh cache" : "", type, this)); // ensure that we are working with a valid hostname before proceeding. see // bug 304904 for details. if (!net_IsValidHostName(host)) return NS_ERROR_UNKNOWN_HOST; // By-Type requests use only TRR. If TRR is disabled we can return // immediately. if (IS_OTHER_TYPE(type) && TRR_DISABLED(Mode())) { return NS_ERROR_UNKNOWN_HOST; } // Used to try to parse to an IP address literal. PRNetAddr tempAddr; // Unfortunately, PR_StringToNetAddr does not properly initialize // the output buffer in the case of IPv6 input. See bug 223145. memset(&tempAddr, 0, sizeof(PRNetAddr)); if (IS_OTHER_TYPE(type) && (PR_StringToNetAddr(host.get(), &tempAddr) == PR_SUCCESS)) { // For by-type queries the host cannot be IP literal. return NS_ERROR_UNKNOWN_HOST; } memset(&tempAddr, 0, sizeof(PRNetAddr)); RefPtr callback(aCallback); // if result is set inside the lock, then we need to issue the // callback before returning. RefPtr result; nsresult status = NS_OK, rv = NS_OK; { MutexAutoLock lock(mLock); if (mShutdown) { rv = NS_ERROR_NOT_INITIALIZED; } else { // check to see if there is already an entry for this |host| // in the hash table. if so, then check to see if we can't // just reuse the lookup result. otherwise, if there are // any pending callbacks, then add to pending callbacks queue, // and return. otherwise, add ourselves as first pending // callback, and proceed to do the lookup. nsAutoCString originSuffix; aOriginAttributes.CreateSuffix(originSuffix); nsHostKey key(host, type, flags, af, (aOriginAttributes.mPrivateBrowsingId > 0), originSuffix); RefPtr& entry = mRecordDB.GetOrInsert(key); if (!entry) { if (IS_ADDR_TYPE(type)) { entry = new AddrHostRecord(key); } else { entry = new TypeHostRecord(key); } } RefPtr rec = entry; RefPtr addrRec = do_QueryObject(rec); MOZ_ASSERT(rec, "Record should not be null"); MOZ_ASSERT((IS_ADDR_TYPE(type) && rec->IsAddrRecord() && addrRec) || (IS_OTHER_TYPE(type) && !rec->IsAddrRecord())); // Check if the entry is vaild. if (!(flags & RES_BYPASS_CACHE) && rec->HasUsableResult(TimeStamp::NowLoRes(), flags)) { LOG((" Using cached record for host [%s].\n", host.get())); // put reference to host record on stack... result = rec; if (IS_ADDR_TYPE(type)) { Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_HIT); } // For entries that are in the grace period // or all cached negative entries, use the cache but start a new // lookup in the background ConditionallyRefreshRecord(rec, host); if (rec->negative) { LOG((" Negative cache entry for host [%s].\n", host.get())); if (IS_ADDR_TYPE(type)) { Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_NEGATIVE_HIT); } status = NS_ERROR_UNKNOWN_HOST; } // Check whether host is a IP address for A/AAAA queries. // For by-type records we have already checked at the beginning of // this function. } else if (addrRec && addrRec->addr) { // if the host name is an IP address literal and has been // parsed, go ahead and use it. LOG((" Using cached address for IP Literal [%s].\n", host.get())); Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_LITERAL); result = rec; } else if (addrRec && PR_StringToNetAddr(host.get(), &tempAddr) == PR_SUCCESS) { // try parsing the host name as an IP address literal to short // circuit full host resolution. (this is necessary on some // platforms like Win9x. see bug 219376 for more details.) LOG((" Host is IP Literal [%s].\n", host.get())); // ok, just copy the result into the host record, and be // done with it! ;-) addrRec->addr = MakeUnique(); PRNetAddrToNetAddr(&tempAddr, addrRec->addr.get()); // put reference to host record on stack... Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_LITERAL); result = rec; // Check if we have received too many requests. } else if (mPendingCount >= MAX_NON_PRIORITY_REQUESTS && !IsHighPriority(flags) && !rec->mResolving) { LOG( (" Lookup queue full: dropping %s priority request for " "host [%s].\n", IsMediumPriority(flags) ? "medium" : "low", host.get())); if (IS_ADDR_TYPE(type)) { Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_OVERFLOW); } // This is a lower priority request and we are swamped, so refuse it. rv = NS_ERROR_DNS_LOOKUP_QUEUE_FULL; // Check if the offline flag is set. } else if (flags & RES_OFFLINE) { LOG((" Offline request for host [%s]; ignoring.\n", host.get())); rv = NS_ERROR_OFFLINE; // We do not have a valid result till here. // A/AAAA request can check for an alternative entry like AF_UNSPEC. // Otherwise we need to start a new query. } else if (!rec->mResolving) { // If this is an IPV4 or IPV6 specific request, check if there is // an AF_UNSPEC entry we can use. Otherwise, hit the resolver... if (addrRec && !(flags & RES_BYPASS_CACHE) && ((af == PR_AF_INET) || (af == PR_AF_INET6))) { // Check for an AF_UNSPEC entry. const nsHostKey unspecKey( host, nsIDNSService::RESOLVE_TYPE_DEFAULT, flags, PR_AF_UNSPEC, (aOriginAttributes.mPrivateBrowsingId > 0), originSuffix); RefPtr unspecRec = mRecordDB.Get(unspecKey); TimeStamp now = TimeStamp::NowLoRes(); if (unspecRec && unspecRec->HasUsableResult(now, flags)) { MOZ_ASSERT(unspecRec->IsAddrRecord()); RefPtr addrUnspecRec = do_QueryObject(unspecRec); MOZ_ASSERT(addrUnspecRec); MOZ_ASSERT(addrUnspecRec->addr_info || addrUnspecRec->negative, "Entry should be resolved or negative."); LOG((" Trying AF_UNSPEC entry for host [%s] af: %s.\n", host.get(), (af == PR_AF_INET) ? "AF_INET" : "AF_INET6")); // We need to lock in case any other thread is reading // addr_info. MutexAutoLock lock(addrRec->addr_info_lock); addrRec->addr_info = nullptr; addrRec->addr_info_gencnt++; if (unspecRec->negative) { rec->negative = unspecRec->negative; rec->CopyExpirationTimesAndFlagsFrom(unspecRec); } else if (addrUnspecRec->addr_info) { // Search for any valid address in the AF_UNSPEC entry // in the cache (not blacklisted and from the right // family). NetAddrElement* addrIter = addrUnspecRec->addr_info->mAddresses.getFirst(); while (addrIter) { if ((af == addrIter->mAddress.inet.family) && !addrUnspecRec->Blacklisted(&addrIter->mAddress)) { if (!addrRec->addr_info) { addrRec->addr_info = new AddrInfo(addrUnspecRec->addr_info->mHostName, addrUnspecRec->addr_info->mCanonicalName, addrUnspecRec->addr_info->IsTRR()); addrRec->addr_info_gencnt++; rec->CopyExpirationTimesAndFlagsFrom(unspecRec); } addrRec->addr_info->AddAddress(new NetAddrElement(*addrIter)); } addrIter = addrIter->getNext(); } } // Now check if we have a new record. if (rec->HasUsableResult(now, flags)) { result = rec; if (rec->negative) { status = NS_ERROR_UNKNOWN_HOST; } Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_HIT); ConditionallyRefreshRecord(rec, host); } else if (af == PR_AF_INET6) { // For AF_INET6, a new lookup means another AF_UNSPEC // lookup. We have already iterated through the // AF_UNSPEC addresses, so we mark this record as // negative. LOG( (" No AF_INET6 in AF_UNSPEC entry: " "host [%s] unknown host.", host.get())); result = rec; rec->negative = true; status = NS_ERROR_UNKNOWN_HOST; Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_NEGATIVE_HIT); } } } // If this is a by-type request or if no valid record was found // in the cache or this is an AF_UNSPEC request, then start a // new lookup. if (!result) { LOG((" No usable record in cache for host [%s] type %d.", host.get(), type)); if (flags & RES_REFRESH_CACHE) { rec->Invalidate(); } // Add callback to the list of pending callbacks. rec->mCallbacks.insertBack(callback); rec->flags = flags; rv = NameLookup(rec); if (IS_ADDR_TYPE(type)) { Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_NETWORK_FIRST); } if (NS_FAILED(rv) && callback->isInList()) { callback->remove(); } else { LOG( (" DNS lookup for host [%s] blocking " "pending 'getaddrinfo' or trr query: " "callback [%p]", host.get(), callback.get())); } } } else if (addrRec && addrRec->mDidCallbacks) { // This is only for A/AAAA query. // record is still pending more (TRR) data; make the callback // at once result = rec; // make it count as a hit Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_HIT); LOG((" Host [%s] re-using early TRR resolve data\n", host.get())); } else { LOG( (" Host [%s] is being resolved. Appending callback " "[%p].", host.get(), callback.get())); rec->mCallbacks.insertBack(callback); // Only A/AAAA records are place in a queue. The queues are for // the native resolver, therefore by-type request are never put // into a queue. if (addrRec && addrRec->onQueue) { Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_NETWORK_SHARED); // Consider the case where we are on a pending queue of // lower priority than the request is being made at. // In that case we should upgrade to the higher queue. if (IsHighPriority(flags) && !IsHighPriority(rec->flags)) { // Move from (low|med) to high. NS_ASSERTION(addrRec->onQueue, "Moving Host Record Not Currently Queued"); rec->remove(); mHighQ.insertBack(rec); rec->flags = flags; ConditionallyCreateThread(rec); } else if (IsMediumPriority(flags) && IsLowPriority(rec->flags)) { // Move from low to med. NS_ASSERTION(addrRec->onQueue, "Moving Host Record Not Currently Queued"); rec->remove(); mMediumQ.insertBack(rec); rec->flags = flags; mIdleTaskCV.Notify(); } } } } } if (result) { if (callback->isInList()) { callback->remove(); } callback->OnResolveHostComplete(this, result, status); } return rv; } void nsHostResolver::DetachCallback(const nsACString& host, uint16_t aType, const OriginAttributes& aOriginAttributes, uint16_t flags, uint16_t af, nsResolveHostCallback* aCallback, nsresult status) { RefPtr rec; RefPtr callback(aCallback); { MutexAutoLock lock(mLock); nsAutoCString originSuffix; aOriginAttributes.CreateSuffix(originSuffix); nsHostKey key(host, aType, flags, af, (aOriginAttributes.mPrivateBrowsingId > 0), originSuffix); RefPtr entry = mRecordDB.Get(key); if (entry) { // walk list looking for |callback|... we cannot assume // that it will be there! for (nsResolveHostCallback* c : entry->mCallbacks) { if (c == callback) { rec = entry; c->remove(); break; } } } } // complete callback with the given status code; this would only be done if // the record was in the process of being resolved. if (rec) { callback->OnResolveHostComplete(this, rec, status); } } nsresult nsHostResolver::ConditionallyCreateThread(nsHostRecord* rec) { if (mNumIdleTasks) { // wake up idle tasks to process this lookup mIdleTaskCV.Notify(); } else if ((mActiveTaskCount < HighThreadThreshold) || (IsHighPriority(rec->flags) && mActiveTaskCount < MAX_RESOLVER_THREADS)) { nsCOMPtr event = mozilla::NewRunnableMethod( "nsHostResolver::ThreadFunc", this, &nsHostResolver::ThreadFunc); mActiveTaskCount++; nsresult rv = mResolverThreads->Dispatch(event, nsIEventTarget::DISPATCH_NORMAL); if (NS_FAILED(rv)) { mActiveTaskCount--; } } else { LOG((" Unable to find a thread for looking up host [%s].\n", rec->host.get())); } return NS_OK; } // make sure the mTrrLock is held when this is used! #define TRROutstanding() ((addrRec->mTrrA || addrRec->mTrrAAAA)) nsresult nsHostResolver::TrrLookup_unlocked(nsHostRecord* rec, TRR* pushedTRR) { MutexAutoLock lock(mLock); return TrrLookup(rec, pushedTRR); } // returns error if no TRR resolve is issued // it is impt this is not called while a native lookup is going on nsresult nsHostResolver::TrrLookup(nsHostRecord* aRec, TRR* pushedTRR) { RefPtr rec(aRec); mLock.AssertCurrentThreadOwns(); RefPtr addrRec; RefPtr typeRec; if (rec->IsAddrRecord()) { addrRec = do_QueryObject(rec); MOZ_ASSERT(addrRec); } else { typeRec = do_QueryObject(rec); MOZ_ASSERT(typeRec); } #ifdef DEBUG if (rec->IsAddrRecord()) { MutexAutoLock trrlock(addrRec->mTrrLock); MOZ_ASSERT(!TRROutstanding()); } #endif MOZ_ASSERT(!rec->mResolving); if (!gTRRService || !gTRRService->Enabled()) { LOG(("TrrLookup:: %s service not enabled\n", rec->host.get())); return NS_ERROR_UNKNOWN_HOST; } if (rec->isInList()) { // we're already on the eviction queue. This is a renewal MOZ_ASSERT(mEvictionQSize); AssertOnQ(rec, mEvictionQ); rec->remove(); mEvictionQSize--; } bool madeQuery = false; if (addrRec) { addrRec->mTRRSuccess = 0; // bump for each successful TRR response addrRec->mTrrStart = TimeStamp::Now(); addrRec->mTRRUsed = true; // this record gets TRR treatment addrRec->mTrrAUsed = AddrHostRecord::INIT; addrRec->mTrrAAAAUsed = AddrHostRecord::INIT; // If asking for AF_UNSPEC, issue both A and AAAA. // If asking for AF_INET6 or AF_INET, do only that single type enum TrrType rectype = (rec->af == AF_INET6) ? TRRTYPE_AAAA : TRRTYPE_A; if (pushedTRR) { rectype = pushedTRR->Type(); } bool sendAgain; do { sendAgain = false; if ((TRRTYPE_AAAA == rectype) && gTRRService && (gTRRService->DisableIPv6() || (gTRRService->CheckIPv6Connectivity() && mNCS && mNCS->GetIPv6() == nsINetworkConnectivityService::NOT_AVAILABLE))) { break; } LOG(("TRR Resolve %s type %d\n", addrRec->host.get(), (int)rectype)); RefPtr trr; MutexAutoLock trrlock(addrRec->mTrrLock); trr = pushedTRR ? pushedTRR : new TRR(this, rec, rectype); if (pushedTRR || NS_SUCCEEDED(NS_DispatchToMainThread(trr))) { addrRec->mResolving++; if (rectype == TRRTYPE_A) { MOZ_ASSERT(!addrRec->mTrrA); addrRec->mTrrA = trr; addrRec->mTrrAUsed = AddrHostRecord::STARTED; } else if (rectype == TRRTYPE_AAAA) { MOZ_ASSERT(!addrRec->mTrrAAAA); addrRec->mTrrAAAA = trr; addrRec->mTrrAAAAUsed = AddrHostRecord::STARTED; } else { LOG(("TrrLookup called with bad type set: %d\n", rectype)); MOZ_ASSERT(0); } madeQuery = true; if (!pushedTRR && (rec->af == AF_UNSPEC) && (rectype == TRRTYPE_A)) { rectype = TRRTYPE_AAAA; sendAgain = true; } } } while (sendAgain); } else { typeRec->mStart = TimeStamp::Now(); enum TrrType rectype = TRRTYPE_TXT; if (pushedTRR) { rectype = pushedTRR->Type(); } LOG(("TRR Resolve %s type %d\n", typeRec->host.get(), (int)rectype)); RefPtr trr; MutexAutoLock trrlock(typeRec->mTrrLock); trr = pushedTRR ? pushedTRR : new TRR(this, rec, rectype); if (pushedTRR || NS_SUCCEEDED(NS_DispatchToMainThread(trr))) { typeRec->mResolving++; MOZ_ASSERT(!typeRec->mTrr); typeRec->mTrr = trr; madeQuery = true; } } return madeQuery ? NS_OK : NS_ERROR_UNKNOWN_HOST; } void nsHostResolver::AssertOnQ(nsHostRecord* rec, LinkedList>& q) { #ifdef DEBUG MOZ_ASSERT(!q.isEmpty()); MOZ_ASSERT(rec->isInList()); for (RefPtr r : q) { if (rec == r) { return; } } MOZ_ASSERT(false, "Did not find element"); #endif } nsresult nsHostResolver::NativeLookup(nsHostRecord* aRec) { // Only A/AAAA request are resolve natively. MOZ_ASSERT(aRec->IsAddrRecord()); mLock.AssertCurrentThreadOwns(); RefPtr rec(aRec); RefPtr addrRec; addrRec = do_QueryObject(rec); MOZ_ASSERT(addrRec); addrRec->mNativeStart = TimeStamp::Now(); // Add rec to one of the pending queues, possibly removing it from mEvictionQ. if (rec->isInList()) { MOZ_ASSERT(mEvictionQSize); AssertOnQ(rec, mEvictionQ); rec->remove(); // was on the eviction queue mEvictionQSize--; } switch (AddrHostRecord::GetPriority(rec->flags)) { case AddrHostRecord::DNS_PRIORITY_HIGH: mHighQ.insertBack(rec); break; case AddrHostRecord::DNS_PRIORITY_MEDIUM: mMediumQ.insertBack(rec); break; case AddrHostRecord::DNS_PRIORITY_LOW: mLowQ.insertBack(rec); break; } mPendingCount++; addrRec->mNative = true; addrRec->mNativeUsed = true; addrRec->onQueue = true; addrRec->mResolving++; nsresult rv = ConditionallyCreateThread(rec); LOG((" DNS thread counters: total=%d any-live=%d idle=%d pending=%d\n", static_cast(mActiveTaskCount), static_cast(mActiveAnyThreadCount), static_cast(mNumIdleTasks), static_cast(mPendingCount))); return rv; } ResolverMode nsHostResolver::Mode() { if (gTRRService) { return static_cast(gTRRService->Mode()); } return MODE_NATIVEONLY; } // Kick-off a name resolve operation, using native resolver and/or TRR nsresult nsHostResolver::NameLookup(nsHostRecord* rec) { nsresult rv = NS_ERROR_UNKNOWN_HOST; if (rec->mResolving) { LOG(("NameLookup %s while already resolving\n", rec->host.get())); return NS_OK; } ResolverMode mode = rec->mResolverMode = Mode(); MOZ_ASSERT(mode != MODE_RESERVED1); if (rec->IsAddrRecord()) { RefPtr addrRec = do_QueryObject(rec); MOZ_ASSERT(addrRec); addrRec->mNativeUsed = false; addrRec->mTRRUsed = false; addrRec->mNativeSuccess = false; addrRec->mTRRSuccess = 0; addrRec->mDidCallbacks = false; addrRec->mTrrAUsed = AddrHostRecord::INIT; addrRec->mTrrAAAAUsed = AddrHostRecord::INIT; } // For domains that are excluded from TRR or when parental control is enabled, // we fallback to NativeLookup. This happens even in MODE_TRRONLY. By default // localhost and local are excluded (so we cover *.local hosts) See the // network.trr.excluded-domains pref. bool skipTRR = true; if (gTRRService) { skipTRR = gTRRService->IsExcludedFromTRR(rec->host) || (mSkipTRRWhenParentalControlEnabled && gTRRService->ParentalControlEnabled()); } if (rec->flags & RES_DISABLE_TRR) { if (mode == MODE_TRRONLY && !skipTRR) { return rv; } mode = MODE_NATIVEONLY; } if (!TRR_DISABLED(mode) && !skipTRR) { rv = TrrLookup(rec); } if (TRR_DISABLED(mode) || ((mode == MODE_TRRFIRST) && NS_FAILED(rv)) || (mode == MODE_TRRONLY && skipTRR)) { if (!rec->IsAddrRecord()) { return rv; } rv = NativeLookup(rec); } return rv; } nsresult nsHostResolver::ConditionallyRefreshRecord(nsHostRecord* rec, const nsACString& host) { if ((rec->CheckExpiration(TimeStamp::NowLoRes()) != nsHostRecord::EXP_VALID || rec->negative) && !rec->mResolving) { LOG((" Using %s cache entry for host [%s] but starting async renewal.", rec->negative ? "negative" : "positive", host.BeginReading())); NameLookup(rec); if (rec->IsAddrRecord() && !rec->negative) { // negative entries are constantly being refreshed, only // track positive grace period induced renewals Telemetry::Accumulate(Telemetry::DNS_LOOKUP_METHOD2, METHOD_RENEWAL); } } return NS_OK; } void nsHostResolver::DeQueue(LinkedList>& aQ, AddrHostRecord** aResult) { RefPtr rec = aQ.popFirst(); mPendingCount--; MOZ_ASSERT(rec->IsAddrRecord()); RefPtr addrRec = do_QueryObject(rec); MOZ_ASSERT(addrRec); addrRec->onQueue = false; addrRec.forget(aResult); } bool nsHostResolver::GetHostToLookup(AddrHostRecord** result) { bool timedOut = false; TimeDuration timeout; TimeStamp epoch, now; MutexAutoLock lock(mLock); timeout = (mNumIdleTasks >= HighThreadThreshold) ? mShortIdleTimeout : mLongIdleTimeout; epoch = TimeStamp::Now(); while (!mShutdown) { // remove next record from Q; hand over owning reference. Check high, then // med, then low #define SET_GET_TTL(var, val) (var)->mGetTtl = sGetTtlEnabled && (val) if (!mHighQ.isEmpty()) { DeQueue(mHighQ, result); SET_GET_TTL(*result, false); return true; } if (mActiveAnyThreadCount < HighThreadThreshold) { if (!mMediumQ.isEmpty()) { DeQueue(mMediumQ, result); mActiveAnyThreadCount++; (*result)->usingAnyThread = true; SET_GET_TTL(*result, true); return true; } if (!mLowQ.isEmpty()) { DeQueue(mLowQ, result); mActiveAnyThreadCount++; (*result)->usingAnyThread = true; SET_GET_TTL(*result, true); return true; } } // Determining timeout is racy, so allow one cycle through checking the // queues before exiting. if (timedOut) break; // wait for one or more of the following to occur: // (1) the pending queue has a host record to process // (2) the shutdown flag has been set // (3) the thread has been idle for too long mNumIdleTasks++; mIdleTaskCV.Wait(timeout); mNumIdleTasks--; now = TimeStamp::Now(); if (now - epoch >= timeout) { timedOut = true; } else { // It is possible that CondVar::Wait() was interrupted and returned // early, in which case we will loop back and re-enter it. In that // case we want to do so with the new timeout reduced to reflect // time already spent waiting. timeout -= now - epoch; epoch = now; } } // tell thread to exit... return false; } void nsHostResolver::PrepareRecordExpirationAddrRecord( AddrHostRecord* rec) const { // NOTE: rec->addr_info_lock is already held by parent MOZ_ASSERT(((bool)rec->addr_info) != rec->negative); mLock.AssertCurrentThreadOwns(); if (!rec->addr_info) { rec->SetExpiration(TimeStamp::NowLoRes(), NEGATIVE_RECORD_LIFETIME, 0); LOG(("Caching host [%s] negative record for %u seconds.\n", rec->host.get(), NEGATIVE_RECORD_LIFETIME)); return; } unsigned int lifetime = mDefaultCacheLifetime; unsigned int grace = mDefaultGracePeriod; unsigned int ttl = mDefaultCacheLifetime; if (sGetTtlEnabled || rec->addr_info->IsTRR()) { if (rec->addr_info && rec->addr_info->ttl != AddrInfo::NO_TTL_DATA) { ttl = rec->addr_info->ttl; } lifetime = ttl; grace = 0; } rec->SetExpiration(TimeStamp::NowLoRes(), lifetime, grace); LOG(("Caching host [%s] record for %u seconds (grace %d).", rec->host.get(), lifetime, grace)); } static nsresult merge_rrset(AddrInfo* rrto, AddrInfo* rrfrom) { if (!rrto || !rrfrom) { return NS_ERROR_NULL_POINTER; } NetAddrElement* element; while ((element = rrfrom->mAddresses.getFirst())) { element->remove(); // unlist from old rrto->AddAddress(element); // enlist on new } return NS_OK; } static bool different_rrset(AddrInfo* rrset1, AddrInfo* rrset2) { if (!rrset1 || !rrset2) { return true; } LOG(("different_rrset %s\n", rrset1->mHostName.get())); nsTArray orderedSet1; nsTArray orderedSet2; if (rrset1->IsTRR() != rrset2->IsTRR()) { return true; } for (NetAddrElement* element = rrset1->mAddresses.getFirst(); element; element = element->getNext()) { if (LOG_ENABLED()) { char buf[128]; NetAddrToString(&element->mAddress, buf, 128); LOG(("different_rrset add to set 1 %s\n", buf)); } orderedSet1.InsertElementAt(orderedSet1.Length(), element->mAddress); } for (NetAddrElement* element = rrset2->mAddresses.getFirst(); element; element = element->getNext()) { if (LOG_ENABLED()) { char buf[128]; NetAddrToString(&element->mAddress, buf, 128); LOG(("different_rrset add to set 2 %s\n", buf)); } orderedSet2.InsertElementAt(orderedSet2.Length(), element->mAddress); } if (orderedSet1.Length() != orderedSet2.Length()) { LOG(("different_rrset true due to length change\n")); return true; } orderedSet1.Sort(); orderedSet2.Sort(); for (uint32_t i = 0; i < orderedSet1.Length(); ++i) { if (!(orderedSet1[i] == orderedSet2[i])) { LOG(("different_rrset true due to content change\n")); return true; } } LOG(("different_rrset false\n")); return false; } void nsHostResolver::AddToEvictionQ(nsHostRecord* rec) { MOZ_ASSERT(!rec->isInList()); mEvictionQ.insertBack(rec); if (mEvictionQSize < mMaxCacheEntries) { mEvictionQSize++; } else { // remove first element on mEvictionQ RefPtr head = mEvictionQ.popFirst(); mRecordDB.Remove(*static_cast(head.get())); if (!head->negative) { // record the age of the entry upon eviction. TimeDuration age = TimeStamp::NowLoRes() - head->mValidStart; if (rec->IsAddrRecord()) { Telemetry::Accumulate(Telemetry::DNS_CLEANUP_AGE, static_cast(age.ToSeconds() / 60)); } else { Telemetry::Accumulate(Telemetry::DNS_BY_TYPE_CLEANUP_AGE, static_cast(age.ToSeconds() / 60)); } if (head->CheckExpiration(TimeStamp::Now()) != nsHostRecord::EXP_EXPIRED) { if (rec->IsAddrRecord()) { Telemetry::Accumulate(Telemetry::DNS_PREMATURE_EVICTION, static_cast(age.ToSeconds() / 60)); } else { Telemetry::Accumulate(Telemetry::DNS_BY_TYPE_PREMATURE_EVICTION, static_cast(age.ToSeconds() / 60)); } } } } } // // CompleteLookup() checks if the resolving should be redone and if so it // returns LOOKUP_RESOLVEAGAIN, but only if 'status' is not NS_ERROR_ABORT. nsHostResolver::LookupStatus nsHostResolver::CompleteLookup( nsHostRecord* rec, nsresult status, AddrInfo* aNewRRSet, bool pb, const nsACString& aOriginsuffix) { MutexAutoLock lock(mLock); MOZ_ASSERT(rec); MOZ_ASSERT(rec->pb == pb); MOZ_ASSERT(rec->IsAddrRecord()); RefPtr addrRec = do_QueryObject(rec); MOZ_ASSERT(addrRec); RefPtr newRRSet(aNewRRSet); bool trrResult = newRRSet && newRRSet->IsTRR(); if (addrRec->mResolveAgain && (status != NS_ERROR_ABORT) && !trrResult) { LOG(("nsHostResolver record %p resolve again due to flushcache\n", addrRec.get())); addrRec->mResolveAgain = false; return LOOKUP_RESOLVEAGAIN; } MOZ_ASSERT(addrRec->mResolving); addrRec->mResolving--; LOG(("nsHostResolver::CompleteLookup %s %p %X trr=%d stillResolving=%d\n", addrRec->host.get(), aNewRRSet, (unsigned int)status, aNewRRSet ? aNewRRSet->IsTRR() : 0, addrRec->mResolving)); if (trrResult) { MutexAutoLock trrlock(addrRec->mTrrLock); LOG(("TRR lookup Complete (%d) %s %s\n", newRRSet->IsTRR(), newRRSet->mHostName.get(), NS_SUCCEEDED(status) ? "OK" : "FAILED")); MOZ_ASSERT(TRROutstanding()); if (newRRSet->IsTRR() == TRRTYPE_A) { MOZ_ASSERT(addrRec->mTrrA); addrRec->mTrrA = nullptr; addrRec->mTrrAUsed = NS_SUCCEEDED(status) ? AddrHostRecord::OK : AddrHostRecord::FAILED; } else if (newRRSet->IsTRR() == TRRTYPE_AAAA) { MOZ_ASSERT(addrRec->mTrrAAAA); addrRec->mTrrAAAA = nullptr; addrRec->mTrrAAAAUsed = NS_SUCCEEDED(status) ? AddrHostRecord::OK : AddrHostRecord::FAILED; } else { MOZ_ASSERT(0); } if (NS_SUCCEEDED(status)) { addrRec->mTRRSuccess++; if (addrRec->mTRRSuccess == 1) { // Store the duration on first succesful TRR response. We // don't know that there will be a second response nor can we // tell which of two has useful data. addrRec->mTrrDuration = TimeStamp::Now() - addrRec->mTrrStart; } } if (TRROutstanding()) { addrRec->mFirstTRRresult = status; if (NS_FAILED(status)) { return LOOKUP_OK; // wait for outstanding } // There's another TRR complete pending. Wait for it and keep // this RRset around until then. MOZ_ASSERT(!addrRec->mFirstTRR && newRRSet); addrRec->mFirstTRR.swap(newRRSet); // autoPtr.swap() MOZ_ASSERT(addrRec->mFirstTRR && !newRRSet); if (addrRec->mDidCallbacks) { return LOOKUP_OK; } if (gTRRService && gTRRService->WaitForAllResponses()) { LOG(("CompleteLookup: waiting for all responses!\n")); return LOOKUP_OK; } if (addrRec->mTrrA && (!gTRRService || !gTRRService->EarlyAAAA())) { // This is an early AAAA with a pending A response. Allowed // only by pref. LOG(("CompleteLookup: avoiding early use of TRR AAAA!\n")); return LOOKUP_OK; } // we can do some callbacks with this partial result which requires // a deep copy newRRSet = new AddrInfo(addrRec->mFirstTRR); MOZ_ASSERT(addrRec->mFirstTRR && newRRSet); } else { // no more outstanding TRRs // If mFirstTRR is set, merge those addresses into current set! if (addrRec->mFirstTRR) { if (NS_SUCCEEDED(status)) { LOG(("Merging responses")); merge_rrset(newRRSet, addrRec->mFirstTRR); } else { LOG(("Will use previous response")); newRRSet.swap(addrRec->mFirstTRR); // transfers // We must use the status of the first response, otherwise we'll // pass an error result to the consumers. status = addrRec->mFirstTRRresult; } addrRec->mFirstTRR = nullptr; } if (NS_FAILED(addrRec->mFirstTRRresult) && NS_FAILED(status) && (addrRec->mFirstTRRresult != NS_ERROR_UNKNOWN_HOST) && (status != NS_ERROR_UNKNOWN_HOST)) { // the errors are not failed resolves, that means // something else failed, consider this as *TRR not used* // for actually trying to resolve the host addrRec->mTRRUsed = false; } if (!addrRec->mTRRSuccess) { // no TRR success newRRSet = nullptr; status = NS_ERROR_UNKNOWN_HOST; } if (!addrRec->mTRRSuccess && addrRec->mResolverMode == MODE_TRRFIRST) { MOZ_ASSERT(!addrRec->mResolving); NativeLookup(addrRec); MOZ_ASSERT(addrRec->mResolving); return LOOKUP_OK; } // continue } } else { // native resolve completed if (addrRec->usingAnyThread) { mActiveAnyThreadCount--; addrRec->usingAnyThread = false; } addrRec->mNative = false; addrRec->mNativeSuccess = newRRSet ? true : false; if (addrRec->mNativeSuccess) { addrRec->mNativeDuration = TimeStamp::Now() - addrRec->mNativeStart; } } // update record fields. We might have a addrRec->addr_info already if a // previous lookup result expired and we're reresolving it or we get // a late second TRR response. if (!mShutdown) { MutexAutoLock lock(addrRec->addr_info_lock); RefPtr old_addr_info; if (different_rrset(addrRec->addr_info, newRRSet)) { LOG(("nsHostResolver record %p new gencnt\n", addrRec.get())); old_addr_info = addrRec->addr_info; addrRec->addr_info = newRRSet.forget(); addrRec->addr_info_gencnt++; } else { if (addrRec->addr_info && newRRSet) { addrRec->addr_info->ttl = newRRSet->ttl; } old_addr_info = newRRSet.forget(); } addrRec->negative = !addrRec->addr_info; PrepareRecordExpirationAddrRecord(addrRec); } bool doCallbacks = true; if (trrResult && addrRec->mDidCallbacks) { // already callback'ed on the first TRR response LOG(("nsHostResolver Suppressing callback for second TRR response for %s\n", addrRec->host.get())); doCallbacks = false; } if (LOG_ENABLED()) { MutexAutoLock lock(addrRec->addr_info_lock); NetAddrElement* element; if (addrRec->addr_info) { for (element = addrRec->addr_info->mAddresses.getFirst(); element; element = element->getNext()) { char buf[128]; NetAddrToString(&element->mAddress, buf, sizeof(buf)); LOG(("CompleteLookup: %s has %s\n", addrRec->host.get(), buf)); } } else { LOG(("CompleteLookup: %s has NO address\n", addrRec->host.get())); } } if (doCallbacks) { // get the list of pending callbacks for this lookup, and notify // them that the lookup is complete. mozilla::LinkedList> cbs = std::move(rec->mCallbacks); LOG(("nsHostResolver record %p calling back dns users\n", addrRec.get())); for (nsResolveHostCallback* c = cbs.getFirst(); c; c = c->removeAndGetNext()) { c->OnResolveHostComplete(this, rec, status); } addrRec->mDidCallbacks = true; } if (!addrRec->mResolving && !mShutdown) { addrRec->ResolveComplete(); AddToEvictionQ(rec); } #ifdef DNSQUERY_AVAILABLE // Unless the result is from TRR, resolve again to get TTL bool fromTRR = false; { MutexAutoLock lock(addrRec->addr_info_lock); if (addrRec->addr_info && addrRec->addr_info->IsTRR()) { fromTRR = true; } } if (!fromTRR && !mShutdown && !addrRec->mGetTtl && !rec->mResolving && sGetTtlEnabled) { LOG(("Issuing second async lookup for TTL for host [%s].", addrRec->host.get())); addrRec->flags = (addrRec->flags & ~RES_PRIORITY_MEDIUM) | RES_PRIORITY_LOW | RES_DISABLE_TRR; DebugOnly rv = NameLookup(rec); NS_WARNING_ASSERTION(NS_SUCCEEDED(rv), "Could not issue second async lookup for TTL."); } #endif return LOOKUP_OK; } nsHostResolver::LookupStatus nsHostResolver::CompleteLookupByType( nsHostRecord* rec, nsresult status, const nsTArray* aResult, uint32_t aTtl, bool pb) { MutexAutoLock lock(mLock); MOZ_ASSERT(rec); MOZ_ASSERT(rec->pb == pb); MOZ_ASSERT(!rec->IsAddrRecord()); RefPtr typeRec = do_QueryObject(rec); MOZ_ASSERT(typeRec); MOZ_ASSERT(typeRec->mResolving); typeRec->mResolving--; MutexAutoLock trrlock(typeRec->mTrrLock); typeRec->mTrr = nullptr; uint32_t duration = static_cast( (TimeStamp::Now() - typeRec->mStart).ToMilliseconds()); if (NS_FAILED(status)) { LOG(("nsHostResolver::CompleteLookupByType record %p [%s] status %x\n", typeRec.get(), typeRec->host.get(), (unsigned int)status)); typeRec->SetExpiration(TimeStamp::NowLoRes(), NEGATIVE_RECORD_LIFETIME, 0); MOZ_ASSERT(!aResult); status = NS_ERROR_UNKNOWN_HOST; typeRec->negative = true; Telemetry::Accumulate(Telemetry::DNS_BY_TYPE_FAILED_LOOKUP_TIME, duration); } else { MOZ_ASSERT(aResult); LOG( ("nsHostResolver::CompleteLookupByType record %p [%s], number of " "records %zu\n", typeRec.get(), typeRec->host.get(), aResult->Length())); MutexAutoLock typeLock(typeRec->mResultsLock); typeRec->mResults = *aResult; typeRec->SetExpiration(TimeStamp::NowLoRes(), aTtl, mDefaultGracePeriod); typeRec->negative = false; Telemetry::Accumulate(Telemetry::DNS_BY_TYPE_SUCCEEDED_LOOKUP_TIME, duration); } mozilla::LinkedList> cbs = std::move(typeRec->mCallbacks); LOG( ("nsHostResolver::CompleteLookupByType record %p calling back dns " "users\n", typeRec.get())); for (nsResolveHostCallback* c = cbs.getFirst(); c; c = c->removeAndGetNext()) { c->OnResolveHostComplete(this, rec, status); } AddToEvictionQ(rec); return LOOKUP_OK; } void nsHostResolver::CancelAsyncRequest( const nsACString& host, uint16_t aType, const OriginAttributes& aOriginAttributes, uint16_t flags, uint16_t af, nsIDNSListener* aListener, nsresult status) { MutexAutoLock lock(mLock); nsAutoCString originSuffix; aOriginAttributes.CreateSuffix(originSuffix); // Lookup the host record associated with host, flags & address family nsHostKey key(host, aType, flags, af, (aOriginAttributes.mPrivateBrowsingId > 0), originSuffix); RefPtr rec = mRecordDB.Get(key); if (rec) { nsHostRecord* recPtr = nullptr; for (RefPtr c : rec->mCallbacks) { if (c->EqualsAsyncListener(aListener)) { c->remove(); recPtr = rec; c->OnResolveHostComplete(this, recPtr, status); break; } } // If there are no more callbacks, remove the hash table entry if (recPtr && recPtr->mCallbacks.isEmpty()) { mRecordDB.Remove(*static_cast(recPtr)); // If record is on a Queue, remove it and then deref it if (recPtr->isInList()) { recPtr->remove(); } } } } size_t nsHostResolver::SizeOfIncludingThis(MallocSizeOf mallocSizeOf) const { MutexAutoLock lock(mLock); size_t n = mallocSizeOf(this); n += mRecordDB.ShallowSizeOfExcludingThis(mallocSizeOf); for (auto iter = mRecordDB.ConstIter(); !iter.Done(); iter.Next()) { auto entry = iter.UserData(); n += entry->SizeOfIncludingThis(mallocSizeOf); } // The following fields aren't measured. // - mHighQ, mMediumQ, mLowQ, mEvictionQ, because they just point to // nsHostRecords that also pointed to by entries |mRecordDB|, and // measured when |mRecordDB| is measured. return n; } void nsHostResolver::ThreadFunc() { LOG(("DNS lookup thread - starting execution.\n")); #if defined(RES_RETRY_ON_FAILURE) nsResState rs; #endif RefPtr rec; RefPtr ai; do { if (!rec) { RefPtr tmpRec; if (!GetHostToLookup(getter_AddRefs(tmpRec))) { break; // thread shutdown signal } // GetHostToLookup() returns an owning reference MOZ_ASSERT(tmpRec); rec.swap(tmpRec); } LOG1(("DNS lookup thread - Calling getaddrinfo for host [%s].\n", rec->host.get())); TimeStamp startTime = TimeStamp::Now(); bool getTtl = rec->mGetTtl; TimeDuration inQueue = startTime - rec->mNativeStart; uint32_t ms = static_cast(inQueue.ToMilliseconds()); Telemetry::Accumulate(Telemetry::DNS_NATIVE_QUEUING, ms); nsresult status = GetAddrInfo(rec->host, rec->af, rec->flags, getter_AddRefs(ai), getTtl); #if defined(RES_RETRY_ON_FAILURE) if (NS_FAILED(status) && rs.Reset()) { status = GetAddrInfo(rec->host, rec->af, rec->flags, getter_AddRefs(ai), getTtl); } #endif { // obtain lock to check shutdown and manage inter-module telemetry MutexAutoLock lock(mLock); if (!mShutdown) { TimeDuration elapsed = TimeStamp::Now() - startTime; uint32_t millis = static_cast(elapsed.ToMilliseconds()); if (NS_SUCCEEDED(status)) { Telemetry::HistogramID histogramID; if (!rec->addr_info_gencnt) { // Time for initial lookup. histogramID = Telemetry::DNS_LOOKUP_TIME; } else if (!getTtl) { // Time for renewal; categorized by expiration strategy. histogramID = Telemetry::DNS_RENEWAL_TIME; } else { // Time to get TTL; categorized by expiration strategy. histogramID = Telemetry::DNS_RENEWAL_TIME_FOR_TTL; } Telemetry::Accumulate(histogramID, millis); } else { Telemetry::Accumulate(Telemetry::DNS_FAILED_LOOKUP_TIME, millis); } } } LOG1(("DNS lookup thread - lookup completed for host [%s]: %s.\n", rec->host.get(), ai ? "success" : "failure: unknown host")); if (LOOKUP_RESOLVEAGAIN == CompleteLookup(rec, status, ai, rec->pb, rec->originSuffix)) { // leave 'rec' assigned and loop to make a renewed host resolve LOG(("DNS lookup thread - Re-resolving host [%s].\n", rec->host.get())); } else { rec = nullptr; } } while (true); mActiveTaskCount--; LOG(("DNS lookup thread - queue empty, task finished.\n")); } void nsHostResolver::SetCacheLimits(uint32_t aMaxCacheEntries, uint32_t aDefaultCacheEntryLifetime, uint32_t aDefaultGracePeriod) { MutexAutoLock lock(mLock); mMaxCacheEntries = aMaxCacheEntries; mDefaultCacheLifetime = aDefaultCacheEntryLifetime; mDefaultGracePeriod = aDefaultGracePeriod; } nsresult nsHostResolver::Create(uint32_t maxCacheEntries, uint32_t defaultCacheEntryLifetime, uint32_t defaultGracePeriod, nsHostResolver** result) { RefPtr res = new nsHostResolver( maxCacheEntries, defaultCacheEntryLifetime, defaultGracePeriod); nsresult rv = res->Init(); if (NS_FAILED(rv)) { return rv; } res.forget(result); return NS_OK; } void nsHostResolver::GetDNSCacheEntries(nsTArray* args) { MutexAutoLock lock(mLock); for (auto iter = mRecordDB.Iter(); !iter.Done(); iter.Next()) { // We don't pay attention to address literals, only resolved domains. // Also require a host. nsHostRecord* rec = iter.UserData(); MOZ_ASSERT(rec, "rec should never be null here!"); if (!rec) { continue; } // For now we only show A/AAAA records. if (!rec->IsAddrRecord()) { continue; } RefPtr addrRec = do_QueryObject(rec); MOZ_ASSERT(addrRec); if (!addrRec || !addrRec->addr_info) { continue; } DNSCacheEntries info; info.hostname = rec->host; info.family = rec->af; info.expiration = (int64_t)(rec->mValidEnd - TimeStamp::NowLoRes()).ToSeconds(); if (info.expiration <= 0) { // We only need valid DNS cache entries continue; } { MutexAutoLock lock(addrRec->addr_info_lock); NetAddr* addr = nullptr; NetAddrElement* addrElement = addrRec->addr_info->mAddresses.getFirst(); if (addrElement) { addr = &addrElement->mAddress; } while (addr) { char buf[kIPv6CStrBufSize]; if (NetAddrToString(addr, buf, sizeof(buf))) { info.hostaddr.AppendElement(buf); } addr = nullptr; addrElement = addrElement->getNext(); if (addrElement) { addr = &addrElement->mAddress; } } info.TRR = addrRec->addr_info->IsTRR(); } args->AppendElement(info); } } #undef LOG #undef LOG_ENABLED