Browse Source

Add query retry feature

Nick Peng 6 years ago
parent
commit
c94fafb026
2 changed files with 178 additions and 99 deletions
  1. 143 97
      src/dns_client.c
  2. 35 2
      src/dns_server.c

+ 143 - 97
src/dns_client.c

@@ -54,6 +54,7 @@
 #define DNS_TCP_IDLE_TIMEOUT (60 * 10)
 #define DNS_TCP_CONNECT_TIMEOUT (5)
 #define DNS_QUERY_TIMEOUT (500)
+#define DNS_QUERY_RETRY (3)
 
 #ifndef TCP_FASTOPEN_CONNECT
 #define TCP_FASTOPEN_CONNECT 30
@@ -199,6 +200,12 @@ struct dns_query_struct {
 	dns_client_callback callback;
 	void *user_ptr;
 
+	/* retry count */
+	atomic_t retry_count;
+
+	/* has result */
+	int has_result;
+
 	/* replied hash table */
 	DECLARE_HASHTABLE(replied_map, 4);
 };
@@ -260,8 +267,8 @@ static int _dns_client_server_exist(struct addrinfo *gai, dns_server_type_t serv
 	return -1;
 }
 
-static void _dns_client_server_update_ttl(struct ping_host_struct *ping_host, const char *host, FAST_PING_RESULT result, struct sockaddr *addr, socklen_t addr_len,
-								   int seqno, int ttl, struct timeval *tv, void *userptr)
+static void _dns_client_server_update_ttl(struct ping_host_struct *ping_host, const char *host, FAST_PING_RESULT result, struct sockaddr *addr,
+										  socklen_t addr_len, int seqno, int ttl, struct timeval *tv, void *userptr)
 {
 	struct dns_server_info *server_info = userptr;
 	if (result != PING_RESULT_RESPONSE || server_info == NULL) {
@@ -566,8 +573,8 @@ static void _dns_client_group_remove_all(void)
 }
 
 /* add dns server information */
-static int _dns_client_server_add(char *server_ip, struct addrinfo *gai, dns_server_type_t server_type, unsigned int server_flag, unsigned int result_flag, int ttl,
-						   char *spki)
+static int _dns_client_server_add(char *server_ip, struct addrinfo *gai, dns_server_type_t server_type, unsigned int server_flag, unsigned int result_flag,
+								  int ttl, char *spki)
 {
 	struct dns_server_info *server_info = NULL;
 	unsigned char *spki_data = NULL;
@@ -773,7 +780,7 @@ static int _dns_client_server_remove(char *server_ip, struct addrinfo *gai, dns_
 }
 
 static int _dns_client_server_operate(char *server_ip, int port, dns_server_type_t server_type, unsigned int server_flag, unsigned int result_flag, int ttl,
-							   char *spki, int operate)
+									  char *spki, int operate)
 {
 	char port_s[8];
 	int sock_type;
@@ -982,48 +989,6 @@ static void _dns_client_check_tcp(void)
 	pthread_mutex_unlock(&client.server_list_lock);
 }
 
-static void _dns_client_period_run_second(void)
-{
-	_dns_client_check_tcp();
-}
-
-static void _dns_client_period_run(void)
-{
-	struct dns_query_struct *query, *tmp;
-	static unsigned int msec = 0;
-	msec++;
-
-	LIST_HEAD(check_list);
-
-	unsigned long now = get_tick_count();
-
-	/* get query which timed out to check list */
-	pthread_mutex_lock(&client.domain_map_lock);
-	list_for_each_entry_safe(query, tmp, &client.dns_request_list, dns_request_list)
-	{
-		if ((now - DNS_QUERY_TIMEOUT >= query->send_tick) && query->send_tick > 0) {
-			list_add(&query->period_list, &check_list);
-			_dns_client_query_get(query);
-		}
-	}
-	pthread_mutex_unlock(&client.domain_map_lock);
-
-	list_for_each_entry_safe(query, tmp, &check_list, period_list)
-	{
-		/* free timed out query, and notify caller */
-		list_del_init(&query->period_list);
-		_dns_client_check_udp_nat(query);
-		_dns_client_query_remove(query);
-		_dns_client_query_release(query);
-	}
-
-	if (msec % 10 == 0) {
-		_dns_client_period_run_second();
-	}
-
-	return;
-}
-
 static struct dns_query_struct *_dns_client_get_request(unsigned short sid, char *domain)
 {
 	struct dns_query_struct *query = NULL;
@@ -1163,6 +1128,10 @@ static int _dns_client_recv(struct dns_server_info *server_info, unsigned char *
 			/* if all server replied, or done, stop query, release resource */
 			_dns_client_query_remove(query);
 		}
+
+		if (ret == 0) {
+			query->has_result = 1;
+		}
 	}
 
 	_dns_client_query_release(query);
@@ -1593,7 +1562,7 @@ static int _dns_client_process_tcp(struct dns_server_info *server_info, struct e
 				goto errout;
 			}
 
-			tlog(TLOG_ERROR, "recv failed, %s\n", strerror(errno));
+			tlog(TLOG_ERROR, "recv failed, server %s, %s\n", server_info->ip, strerror(errno));
 			goto errout;
 		}
 
@@ -1899,55 +1868,6 @@ static int _dns_client_process(struct dns_server_info *server_info, struct epoll
 	return 0;
 }
 
-static void *_dns_client_work(void *arg)
-{
-	struct epoll_event events[DNS_MAX_EVENTS + 1];
-	int num;
-	int i;
-	unsigned long now = {0};
-	unsigned int sleep = 100;
-	int sleep_time;
-	unsigned long expect_time = 0;
-
-	sleep_time = sleep;
-	now = get_tick_count() - sleep;
-	expect_time = now + sleep;
-	while (client.run) {
-		now = get_tick_count();
-		if (now >= expect_time) {
-			_dns_client_period_run();
-			sleep_time = sleep - (now - expect_time);
-			if (sleep_time < 0) {
-				sleep_time = 0;
-				expect_time = now;
-			}
-			expect_time += sleep;
-		}
-
-		num = epoll_wait(client.epoll_fd, events, DNS_MAX_EVENTS, sleep_time);
-		if (num < 0) {
-			usleep(100000);
-			continue;
-		}
-
-		for (i = 0; i < num; i++) {
-			struct epoll_event *event = &events[i];
-			struct dns_server_info *server_info = (struct dns_server_info *)event->data.ptr;
-			if (server_info == NULL) {
-				tlog(TLOG_WARN, "server info is invalid.");
-				continue;
-			}
-
-			_dns_client_process(server_info, event, now);
-		}
-	}
-
-	close(client.epoll_fd);
-	client.epoll_fd = -1;
-
-	return NULL;
-}
-
 static int _dns_client_send_udp(struct dns_server_info *server_info, void *packet, int len)
 {
 	int send_len = 0;
@@ -2221,12 +2141,14 @@ int dns_client_query(char *domain, int qtype, dns_client_callback callback, void
 	INIT_LIST_HEAD(&query->dns_request_list);
 	atomic_set(&query->refcnt, 0);
 	atomic_set(&query->dns_request_sent, 0);
+	atomic_set(&query->retry_count, DNS_QUERY_RETRY);
 	hash_init(query->replied_map);
 	strncpy(query->domain, domain, DNS_MAX_CNAME_LEN);
 	query->user_ptr = user_ptr;
 	query->callback = callback;
 	query->qtype = qtype;
 	query->send_tick = 0;
+	query->has_result = 0;
 	query->sid = atomic_inc_return(&dns_client_sid);
 	query->server_group = _dns_client_get_dnsserver_group(group_name);
 	if (query->server_group == NULL) {
@@ -2270,6 +2192,130 @@ errout:
 	return -1;
 }
 
+static void _dns_client_check_servers(void)
+{
+	struct dns_server_info *server_info, *tmp;
+	static unsigned int second_count = 0;
+
+	second_count++;
+	if (second_count % 60 != 0) {
+		return;
+	}
+
+	pthread_mutex_lock(&client.server_list_lock);
+	list_for_each_entry_safe(server_info, tmp, &client.dns_server_list, list)
+	{
+		if (server_info->type != DNS_SERVER_UDP) {
+			continue;
+		}
+
+		if (server_info->last_send - 600 > server_info->last_recv) {
+			server_info->recv_buff.len = 0;
+			server_info->send_buff.len = 0;
+			tlog(TLOG_DEBUG, "server %s may failure.", server_info->ip);
+			_dns_client_close_socket(server_info);
+		}
+	}
+	pthread_mutex_unlock(&client.server_list_lock);
+}
+
+static void _dns_client_period_run_second(void)
+{
+	_dns_client_check_tcp();
+	_dns_client_check_servers();
+}
+
+static void _dns_client_period_run(void)
+{
+	struct dns_query_struct *query, *tmp;
+	static unsigned int msec = 0;
+	msec++;
+
+	LIST_HEAD(check_list);
+
+	unsigned long now = get_tick_count();
+
+	/* get query which timed out to check list */
+	pthread_mutex_lock(&client.domain_map_lock);
+	list_for_each_entry_safe(query, tmp, &client.dns_request_list, dns_request_list)
+	{
+		if ((now - DNS_QUERY_TIMEOUT >= query->send_tick) && query->send_tick > 0) {
+			list_add(&query->period_list, &check_list);
+			_dns_client_query_get(query);
+		}
+	}
+	pthread_mutex_unlock(&client.domain_map_lock);
+
+	list_for_each_entry_safe(query, tmp, &check_list, period_list)
+	{
+		/* free timed out query, and notify caller */
+		list_del_init(&query->period_list);
+		_dns_client_check_udp_nat(query);
+		if (atomic_dec_and_test(&query->retry_count) || (query->has_result != 0)) {
+			_dns_client_query_remove(query);
+		} else {
+			tlog(TLOG_DEBUG, "retry query %s", query->domain);
+			_dns_client_send_query(query, query->domain);
+		}
+		_dns_client_query_release(query);
+	}
+
+	if (msec % 10 == 0) {
+		_dns_client_period_run_second();
+	}
+
+	return;
+}
+
+static void *_dns_client_work(void *arg)
+{
+	struct epoll_event events[DNS_MAX_EVENTS + 1];
+	int num;
+	int i;
+	unsigned long now = {0};
+	unsigned int sleep = 100;
+	int sleep_time;
+	unsigned long expect_time = 0;
+
+	sleep_time = sleep;
+	now = get_tick_count() - sleep;
+	expect_time = now + sleep;
+	while (client.run) {
+		now = get_tick_count();
+		if (now >= expect_time) {
+			_dns_client_period_run();
+			sleep_time = sleep - (now - expect_time);
+			if (sleep_time < 0) {
+				sleep_time = 0;
+				expect_time = now;
+			}
+			expect_time += sleep;
+		}
+
+		num = epoll_wait(client.epoll_fd, events, DNS_MAX_EVENTS, sleep_time);
+		if (num < 0) {
+			usleep(100000);
+			continue;
+		}
+
+		for (i = 0; i < num; i++) {
+			struct epoll_event *event = &events[i];
+			struct dns_server_info *server_info = (struct dns_server_info *)event->data.ptr;
+			if (server_info == NULL) {
+				tlog(TLOG_WARN, "server info is invalid.");
+				continue;
+			}
+
+			_dns_client_process(server_info, event, now);
+		}
+	}
+
+	close(client.epoll_fd);
+	client.epoll_fd = -1;
+
+	return NULL;
+}
+
 int dns_client_set_ecs(char *ip, int subnet)
 {
 	return 0;

+ 35 - 2
src/dns_server.c

@@ -144,6 +144,8 @@ struct dns_request {
 
 	atomic_t adblock;
 
+	atomic_t soa_num;
+
 	/* send original raw packet to server/client like proxy */
 	int passthrough;
 	int request_wait;
@@ -577,6 +579,8 @@ static int _dns_server_request_complete(struct dns_request *request)
 				/* insert result to cache */
 				dns_cache_insert(request->domain, cname, cname_ttl, request->ttl_v6, DNS_T_AAAA, request->ipv6_addr, DNS_RR_AAAA_LEN, request->ping_ttl_v6);
 			}
+
+			request->has_soa = 0;
 		}
 
 		if (request->has_ipv4 && request->ping_ttl_v4 > 0) {
@@ -594,10 +598,9 @@ static int _dns_server_request_complete(struct dns_request *request)
 
 				return _dns_server_reply_SOA(DNS_RC_NOERROR, request, NULL);
 			}
-			request->has_ipv4 = 0;
 		}
 
-		request->has_soa = 0;
+		request->has_ipv4 = 0;
 	}
 
 	if (request->has_soa) {
@@ -949,6 +952,23 @@ match:
 	return 0;
 }
 
+static int _dns_server_is_adblock_ipv6(unsigned char addr[16])
+{
+	int i = 0;
+
+	for (i = 0; i < 15; i++) {
+		if (addr[i]) {
+			return -1;
+		}
+	}
+
+	if (addr[15] == 0 || addr[15] == 1) {
+		return 0;
+	}
+
+	return -1;
+}
+
 static int _dns_server_process_answer(struct dns_request *request, char *domain, struct dns_packet *packet, unsigned int result_flag)
 {
 	int ttl;
@@ -1086,6 +1106,15 @@ static int _dns_server_process_answer(struct dns_request *request, char *domain,
 					}
 				}
 
+				/* Ad blocking result */
+				if (_dns_server_is_adblock_ipv6(addr) == 0) {
+					/* If half of the servers return the same result, then the domain name result is the IP address. */
+					if (atomic_inc_return(&request->adblock) <= dns_server_num() / 2) {
+						_dns_server_request_release(request);
+						break;
+					}
+				}
+
 				/* add this ip to reqeust */
 				if (_dns_ip_address_check_add(request, addr, DNS_T_AAAA) != 0) {
 					_dns_server_request_release(request);
@@ -1122,6 +1151,9 @@ static int _dns_server_process_answer(struct dns_request *request, char *domain,
 				tlog(TLOG_DEBUG, "domain: %s, qtype: %d, SOA: mname: %s, rname: %s, serial: %d, refresh: %d, retry: %d, expire: %d, minimum: %d", domain,
 					 request->qtype, request->soa.mname, request->soa.rname, request->soa.serial, request->soa.refresh, request->soa.retry, request->soa.expire,
 					 request->soa.minimum);
+				if (atomic_inc_return(&request->soa_num) >= (dns_server_num() / 2)) {
+					_dns_server_request_complete(request);
+				}
 			} break;
 			default:
 				tlog(TLOG_DEBUG, "%s, qtype: %d", name, rrs->type);
@@ -1533,6 +1565,7 @@ static int _dns_server_recv(struct dns_server_conn *client, unsigned char *inpac
 	memset(request, 0, sizeof(*request));
 	pthread_mutex_init(&request->ip_map_lock, NULL);
 	atomic_set(&request->adblock, 0);
+	atomic_set(&request->soa_num, 0);
 	atomic_set(&request->refcnt, 0);
 	request->ping_ttl_v4 = -1;
 	request->ping_ttl_v6 = -1;