Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(12)

Side by Side Diff: net/dns/address_sorter_posix.cc

Issue 10442098: [net/dns] Resolve AF_UNSPEC on dual-stacked systems. Sort addresses according to RFC3484. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Minor edits. Fix one typo in variable name. Created 8 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
(Empty)
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "net/dns/address_sorter.h"
6
7 #include <stdint.h>
8 #include <netinet/in.h>
mmenke 2012/07/30 15:37:00 nit: Not in alphabetical order.
szym 2012/07/30 16:28:45 "stdint.h" is needed for "netinet/in.h", but it se
9
10 #if defined(OS_MACOSX) || defined(OS_BSD)
11 #include <sys/socket.h> // Must be included before ifaddrs.h.
12 #include <ifaddrs.h>
13 #include <net/if.h>
14 #include <netinet/in_var.h>
15 #include <string.h>
mmenke 2012/07/30 15:37:00 Why is this needed?
szym 2012/07/30 16:28:45 memcpy in line 453. But now I see it's included in
16 #include <sys/ioctl.h>
17 #endif
18
19 #include <algorithm>
20 #include <map>
21 #include <vector>
22
23 #include "base/eintr_wrapper.h"
24 #include "base/logging.h"
25 #include "base/memory/scoped_vector.h"
26 #include "net/base/address_list.h"
27 #include "net/base/net_errors.h"
28 #include "net/base/net_util.h"
29 #include "net/base/network_change_notifier.h"
30 #include "net/socket/client_socket_factory.h"
31 #include "net/udp/datagram_client_socket.h"
32
33 #if defined(OS_LINUX)
34 #include "net/base/address_tracker_linux.h"
35 #endif
36
37 namespace net {
38
39 namespace {
40
41 // Address sorting is performed according to RFC3484 with revisions.
42 // http://tools.ietf.org/html/draft-ietf-6man-rfc3484bis-03
mmenke 2012/07/30 15:37:00 They're up to http://tools.ietf.org/html/draft-iet
43 // The default policy has been updated as in Linux:
44 // http://www.akkadia.org/drepper/linux-rfc3484.html
mmenke 2012/07/30 19:40:34 Is this still needed? Looks like the latest 3484b
szym 2012/07/30 20:55:52 You're right. All problems raised there are alread
45 // Precedence and label are separate to support override through /etc/gai.conf.
46
47 // Generic policy entry.
48 struct PolicyEntry {
49 // IPv4 addresses must be mapped to IPv6.
50 unsigned char prefix[kIPv6AddressSize];
51 unsigned prefix_length;
52 unsigned value;
53 };
54
55 typedef std::vector<PolicyEntry> PolicyTable;
56
57 // Returns true if |p1| should precede |p2| in the table.
58 // Sorts table by decreasing prefix size to allow longest prefix matching.
59 bool ComparePolicy(const PolicyEntry& p1, const PolicyEntry& p2) {
60 return p1.prefix_length > p2.prefix_length;
61 }
62
63 // Creates sorted PolicyTable from |table| with |size| entries.
64 PolicyTable LoadPolicy(PolicyEntry* table, size_t size) {
65 PolicyTable result(table, table + size);
66 std::sort(result.begin(), result.end(), ComparePolicy);
67 return result;
68 }
69
70 // Search |table| for matching prefix of |address|. |table| must be sorted by
71 // descending prefix (prefix of another prefix must be later in table).
72 unsigned GetPolicyValue(const PolicyTable& table,
73 const IPAddressNumber& address) {
74 if (address.size() == kIPv4AddressSize)
75 return GetPolicyValue(table, ConvertIPv4NumberToIPv6Number(address));
mmenke 2012/07/30 15:37:00 I think converting everything up front may be a li
szym 2012/07/30 16:28:45 I agree, although converting everything up front w
76 for (unsigned i = 0; i < table.size(); ++i) {
77 const PolicyEntry& entry = table[i];
78 IPAddressNumber prefix(entry.prefix, entry.prefix + kIPv6AddressSize);
79 if (IPNumberMatchesPrefix(address, prefix, entry.prefix_length))
80 return entry.value;
81 }
82 NOTREACHED();
83 // The last entry is the least restrictive, so assume it's default.
84 return table.back().value;
85 }
86
87 enum AddressScope {
88 SCOPE_NODELOCAL = 1,
89 SCOPE_LINKLOCAL = 2,
90 SCOPE_SITELOCAL = 5,
91 SCOPE_ORGLOCAL = 8,
92 SCOPE_GLOBAL = 14,
93 };
94
95 bool IsMulticast(const IPAddressNumber& address) {
96 return address[0] == 0xFF;
97 }
98
99 AddressScope GetMulticastScope(const IPAddressNumber& address) {
100 return static_cast<AddressScope>(address[1] & 0x0F);
101 }
102
103 bool IsIPv6Loopback(const IPAddressNumber& address) {
104 // IN6_IS_ADDR_LOOPBACK
105 unsigned char kLoopback[kIPv6AddressSize] = {
106 0, 0, 0, 0, 0, 0, 0, 0,
107 0, 0, 0, 0, 0, 0, 0, 1,
108 };
109 return address == IPAddressNumber(kLoopback, kLoopback + kIPv6AddressSize);
110 }
111
112 bool IsLinkLocal(const IPAddressNumber& address) {
113 // IN6_IS_ADDR_LINKLOCAL
114 return (address[0] == 0xFE) && ((address[1] & 0xC0) == 0x80);
115 }
116
117 bool IsSiteLocal(const IPAddressNumber& address) {
118 // IN6_IS_ADDR_SITELOCAL
119 return (address[0] == 0xFE) && ((address[1] & 0xC0) == 0xC0);
120 }
121
122 AddressScope GetScope(const PolicyTable& table,
123 const IPAddressNumber& address) {
124 if (address.size() == kIPv6AddressSize) {
mmenke 2012/07/30 15:37:00 Should we handle IPv4 mapped addresses here? If s
szym 2012/07/30 16:28:45 Good question. Now that I think about it, I wonder
125 if (IsMulticast(address)) {
126 return GetMulticastScope(address);
127 } else if (IsIPv6Loopback(address) || IsLinkLocal(address)) {
128 return SCOPE_LINKLOCAL;
129 } else if (IsSiteLocal(address)) {
130 return SCOPE_SITELOCAL;
131 } else {
132 return SCOPE_GLOBAL;
133 }
134 } else if (address.size() == kIPv4AddressSize) {
135 return static_cast<AddressScope>(GetPolicyValue(table, address));
136 } else {
137 NOTREACHED();
138 return SCOPE_NODELOCAL;
139 }
140 }
141
142 // Default policy table. RFC 3484, Section 2.1. Updated for glibc.
143 PolicyEntry kDefaultPrecedenceTable[] = {
144 // ::1/128 -- loopback
145 { { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1 }, 128, 60 },
146 // fc00::/7 -- multicast
szym 2012/07/30 20:55:52 not "multicast", but "unique local address"
147 { { 0xFC }, 7, 50 },
148 // ::/0 -- any
149 { { }, 0, 40 },
150 // ::ffff:0:0/96 -- IPv4 mapped
151 { { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF }, 96, 30 },
152 // 2002::/16 -- 6to4
153 { { 0x20, 0x02, }, 17, 20 },
154 // 2001::/32 -- Teredo
155 { { 0x20, 0x01, 0, 0 }, 32, 10 },
mmenke 2012/07/30 19:40:34 The tables look a bit different from the tables in
szym 2012/07/30 20:55:52 Ah. As bionic, this is following: http://tools.iet
156 // ::/96 -- IPv4 compatible
157 { { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 }, 96, 1 },
158 // fec0::/16 -- unique local address
159 { { 0xFE, 0xC0 }, 16, 1 },
mmenke 2012/07/30 19:40:34 This looks wrong. fc00::/7 is unique local. fec0:
160 // 3ffe::/16 -- 6bone
161 { { 0x3F, 0xFE }, 16, 1 },
162 };
163
164 PolicyEntry kDefaultLabelTable[] = {
165 // ::1/128 -- loopback
166 { { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1 }, 128, 0 },
167 // fc00::/7 -- multicast
168 { { 0xFC }, 7, 1 },
169 // ::/0 -- any
170 { { }, 0, 2 },
171 // ::ffff:0:0/96 -- IPv4 mapped
172 { { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF }, 96, 3 },
173 // 2002::/16 -- 6to4
174 { { 0x20, 0x02, }, 17, 4 },
175 // 2001::/32 -- Teredo
176 { { 0x20, 0x01, 0, 0 }, 32, 5 },
177 // ::/96 -- IPv4 compatible
178 { { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 }, 96, 10 },
179 // fec0::/16 -- unique local address
180 { { 0xFE, 0xC0 }, 16, 11 },
181 // 3ffe::/16 -- 6bone
182 { { 0x3F, 0xFE }, 16, 12 },
183 };
184
185 // Default mapping of IPv4 addresses to scope.
186 PolicyEntry kDefaultScopeTable[] = {
mmenke 2012/07/30 15:37:00 Think this name is very confusing. May be worth j
szym 2012/07/30 16:28:45 The reason why this exists (and has 'Default' in n
mmenke 2012/07/30 19:40:34 Curiously, man gai.conf didn't mention the field,
szym 2012/07/30 20:55:52 My "man gai.conf" includes: ==== scopev4 mask valu
187 { { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF, 0x7F }, 104,
188 SCOPE_LINKLOCAL },
189 { { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF, 0xA9, 0xFE }, 112,
190 SCOPE_LINKLOCAL },
191 { { }, 0, SCOPE_GLOBAL },
192 };
193
194 // Returns number of matching initial bits between the addresses |a1| and |a2|.
195 unsigned CommonPrefixLength(const IPAddressNumber& a1,
196 const IPAddressNumber& a2) {
197 DCHECK_EQ(a1.size(), a2.size());
198 for (size_t i = 0; i < a1.size(); ++i) {
199 unsigned diff = a1[i] ^ a2[i];
200 if (!diff)
201 continue;
202 for (unsigned j = 0; j < CHAR_BIT; ++j) {
203 if (diff & (1 << (CHAR_BIT - 1)))
204 return i * CHAR_BIT + j;
205 diff <<= 1;
206 }
207 }
208 return a1.size() * CHAR_BIT;
209 }
210
211 // Computes the number of leading 1-bits in |addr|.
212 unsigned PrefixLength(const IPAddressNumber& addr) {
mmenke 2012/07/30 19:40:34 Suggest you rename this MaskPrefixLength(addr_mask
213 IPAddressNumber all_ones(addr.size(), 0xFF);
214 return CommonPrefixLength(addr, all_ones);
215 }
216
217 struct SourceAddressInfo {
218 AddressScope scope;
219 unsigned label;
220 // Values below matter only if more than one source address in the list.
221 unsigned prefix_length;
222 bool deprecated; // vs. preferred RFC4862
223 bool home; // vs. care-of RFC6275
224 bool native;
225 };
226
227 typedef std::map<IPAddressNumber, SourceAddressInfo> SourceAddressMap;
228
229 struct SortElement {
230 IPAddressNumber address;
231 AddressScope scope;
232 unsigned precedence;
233 unsigned label;
234 const SourceAddressInfo* src;
235 unsigned common_prefix_length;
236 };
237
238 // Returns true iff |a1| should precede |a2| in the address list.
239 // RFC 3484, section 6.
240 bool CompareElements(const SortElement* a1, const SortElement* a2) {
mmenke 2012/07/30 19:40:34 Think a1 / a2 could be named better. Suggest dest
241 // Rule 1: Avoid unusable destinations.
242 // Unusable destinations are already filtered out.
243 DCHECK(a1->src);
244 DCHECK(a2->src);
245
246 // Rule 2: Prefer matching scope.
247 bool scope_match1 = (a1->src->scope == a1->scope);
248 bool scope_match2 = (a2->src->scope == a2->scope);
249 if (scope_match1 != scope_match2)
250 return scope_match1;
251
252 // Rule 3: Avoid deprecated addresses.
253 if (a1->src->deprecated != a2->src->deprecated)
254 return !a1->src->deprecated;
255
256 // Rule 4: Prefer home addresses.
257 if (a1->src->home != a2->src->home)
258 return !a1->src->home;
mmenke 2012/07/30 19:40:34 Shouldn't this be "return a1->src->home;"? (No neg
szym 2012/07/30 20:55:52 Yes.
259
260 // Rule 5: Prefer matching label.
261 bool label_match1 = (a1->src->label == a1->label);
262 bool label_match2 = (a2->src->label == a2->label);
263 if (label_match1 != label_match2)
264 return label_match1;
265
266 // Rule 6: Prefer higher precedence.
267 if (a1->precedence != a2->precedence)
268 return a1->precedence > a2->precedence;
269
270 // Rule 7: Prefer native transport.
271 if (a1->src->native != a2->src->native)
272 return !a1->src->native;
mmenke 2012/07/30 19:40:34 Believe the negation here is also wrong.
szym 2012/07/30 20:55:52 Yes.
273
274 // Rule 8: Prefer smaller scope.
275 if (a1->scope != a2->scope)
276 return a1->scope < a2->scope;
277
278 // Rule 9: Use longest matching prefix. Only for matching address families.
279 if (a1->address.size() == a2->address.size()) {
280 if (a1->common_prefix_length != a2->common_prefix_length)
281 return a1->common_prefix_length > a2->common_prefix_length;
282 }
283
284 // Rule 10: Leave the order unchanged.
285 // stable_sort takes care of that.
286 return false;
287 }
288
289 class AddressSorterPosix : public AddressSorter,
290 public NetworkChangeNotifier::IPAddressObserver {
291 public:
292 explicit AddressSorterPosix(ClientSocketFactory* socket_factory);
293 virtual ~AddressSorterPosix();
294
295 virtual bool Sort(AddressList* list) const OVERRIDE;
296
297 private:
298 // NetworkChangeNotifier::IPAddressObserver:
299 virtual void OnIPAddressChanged() OVERRIDE;
300
301 SourceAddressMap source_info_;
302 // For the cases when the source address is not in |source_info_|.
303 // TODO(szym): Consider simply falling back to getaddrinfo in that case.
304 SourceAddressInfo mock_source_info_;
305
306 ClientSocketFactory* socket_factory_;
307 PolicyTable precedence_table_;
308 PolicyTable label_table_;
309 PolicyTable scope_table_;
310
311 DISALLOW_COPY_AND_ASSIGN(AddressSorterPosix);
312 };
313
314 AddressSorterPosix::AddressSorterPosix(ClientSocketFactory* socket_factory)
315 : socket_factory_(socket_factory),
316 precedence_table_(LoadPolicy(kDefaultPrecedenceTable,
317 arraysize(kDefaultPrecedenceTable))),
318 label_table_(LoadPolicy(kDefaultLabelTable,
319 arraysize(kDefaultLabelTable))),
320 scope_table_(LoadPolicy(kDefaultScopeTable,
321 arraysize(kDefaultScopeTable))) {
322 mock_source_info_.scope = SCOPE_GLOBAL;
323 mock_source_info_.deprecated = false;
324 mock_source_info_.home = false;
325 mock_source_info_.native = false;
326 mock_source_info_.label = static_cast<unsigned>(-1);
327 mock_source_info_.prefix_length = 0;
328 NetworkChangeNotifier::AddIPAddressObserver(this);
329 }
330
331 AddressSorterPosix::~AddressSorterPosix() {
332 NetworkChangeNotifier::RemoveIPAddressObserver(this);
333 }
334
335 bool AddressSorterPosix::Sort(AddressList* list) const {
336 ScopedVector<SortElement> sort_list;
337
338 for (size_t i = 0; i < list->size(); ++i) {
339 scoped_ptr<SortElement> el(new SortElement());
mmenke 2012/07/30 19:40:34 Think using "el" for a variable name violates Goog
340 el->address = (*list)[i].address();
341 el->scope = GetScope(scope_table_, el->address);
342 el->precedence = GetPolicyValue(precedence_table_, el->address);
343 el->label = GetPolicyValue(label_table_, el->address);
344
345 // Each socket can only be bound once.
346 scoped_ptr<DatagramClientSocket> socket(
347 socket_factory_->CreateDatagramClientSocket(
348 DatagramSocket::DEFAULT_BIND,
349 RandIntCallback(),
350 NULL /* NetLog */,
351 NetLog::Source()));
352
353 // Even though no packets are sent, cannot use port 0 in Connect.
354 IPEndPoint dest(el->address, 80 /* port */);
355 int rv = socket->Connect(dest);
356 if (rv != OK) {
357 LOG(WARNING) << "Could not connect to " << dest.ToStringWithoutPort()
358 << " reason " << rv;
359 continue;
360 }
361 // Filter out unsable destinations.
mmenke 2012/07/30 19:40:34 nit: unuseable
362 IPEndPoint src;
363 rv = socket->GetLocalAddress(&src);
364 if (rv != OK) {
365 LOG(WARNING) << "Could not get local address for "
366 << dest.ToStringWithoutPort() << " reason " << rv;
367 continue;
368 }
369
370 SourceAddressMap::const_iterator it = source_info_.find(src.address());
371 if (it != source_info_.end()) {
372 el->src = &(it->second);
373 } else {
374 // If |source_info_| is out of date, we still want to sort, although
375 // the HostCache will need to be cleared once it is updated.
376 el->src = &mock_source_info_;
mmenke 2012/07/30 19:40:34 Wonder if this case could occur often enough that
szym 2012/07/30 20:55:52 If the AddressTrackerLinux implementation is trust
mmenke 2012/07/30 21:07:17 That's probably more effort than it's worth... As
szym 2012/08/06 23:22:20 I figured the code looks cleaner without mock_sour
377 }
378
379 if (el->address.size() == src.address().size()) {
380 el->common_prefix_length = std::min(
381 CommonPrefixLength(el->address, src.address()),
382 el->src->prefix_length);
383 }
384 sort_list.push_back(el.release());
385 }
386
387 std::stable_sort(sort_list.begin(), sort_list.end(), CompareElements);
388
389 list->clear();
390 for (size_t i = 0; i < sort_list.size(); ++i)
391 list->push_back(IPEndPoint(sort_list[i]->address, 0 /* port */));
392
393 return true;
394 }
395
396 void AddressSorterPosix::OnIPAddressChanged() {
397 #if defined(OS_LINUX)
398 const internal::AddressTrackerLinux* tracker =
399 NetworkChangeNotifier::GetAddressTracker();
400 if (!tracker)
401 return;
szym 2012/07/30 16:28:45 There's a potential race during shutdown of Networ
402 typedef internal::AddressTrackerLinux::AddressMap AddressMap;
403 AddressMap map = tracker->GetAddressMap();
404 source_info_.clear();
405 for (AddressMap::const_iterator it = map.begin(); it != map.end(); ++it) {
406 const IPAddressNumber& address = it->first;
407 const struct ifaddrmsg& msg = it->second;
408 SourceAddressInfo& info = source_info_[address];
409 info.native = false; // TODO(szym): obtain this via netlink.
410 info.deprecated = msg.ifa_flags & IFA_F_DEPRECATED;
411 info.home = msg.ifa_flags & IFA_F_HOMEADDRESS;
412 info.prefix_length = msg.ifa_prefixlen;
413 info.label = GetPolicyValue(label_table_, address);
414 info.scope = GetScope(scope_table_, address);
415 }
416 #elif defined(OS_MACOSX) || defined(OS_BSD)
417 // It's not clear we will receive notification when deprecated flag changes.
418 source_info_.clear();
419 // Socket for ioctl.
420 int ioctl_socket = socket(AF_INET6, SOCK_DGRAM, 0);
421 if (ioctl_socket < 0) {
422 perror("ioctl_socket");
423 return;
424 }
425 struct ifaddrs* addrs;
426 int rv = getifaddrs(&addrs);
427 if (rv < 0) {
428 perror("getifaddrs");
429 close(ioctl_socket);
430 return;
431 }
432
433 for (struct ifaddrs* ifa = addrs; ifa != NULL; ifa = ifa->ifa_next) {
434 IPEndPoint src;
435 int rv = src.FromSockAddr(ifa->ifa_addr, ifa->ifa_addr->sa_len);
436 if (rv != OK) {
437 LOG(WARNING) << "could not ToSockAddr " << rv;
mmenke 2012/07/30 15:37:00 FromSockAddr?
438 continue;
439 }
440 IPEndPoint netmask;
441 rv = netmask.FromSockAddr(ifa->ifa_netmask, ifa->ifa_addr->sa_len);
442 if (rv != OK) {
443 LOG(WARNING) << "could not ToSockAddr " << rv;
mmenke 2012/07/30 15:37:00 FromSockAddr?
444 continue;
445 }
446 SourceAddressInfo& info = source_info_[src.address()];
447 // Note: no known way to fill in |native| and |home|.
448 info.native = info.home = info.deprecated = false;
449 if (ifa->ifa_addr->sa_family == AF_INET6) {
450 struct in6_ifreq ifr = {};
451 strncpy(ifr.ifr_name, ifa->ifa_name, sizeof(ifr.ifr_name) - 1);
452 DCHECK_LE(ifa->ifa_addr->sa_len, sizeof(ifr.ifr_ifru.ifru_addr));
453 memcpy(&ifr.ifr_ifru.ifru_addr, ifa->ifa_addr, ifa->ifa_addr->sa_len);
454 rv = ioctl(ioctl_socket, SIOCGIFAFLAG_IN6, &ifr);
455 if (rv < 0) {
456 perror("ioctl failed ");
457 continue;
458 }
459 info.deprecated = ifr.ifr_ifru.ifru_flags & IN6_IFF_DEPRECATED;
460 }
461 info.prefix_length = PrefixLength(netmask.address());
462 info.label = GetPolicyValue(label_table_, src.address());
463 info.scope = GetScope(scope_table_, src.address());
464 }
465 freeifaddrs(addrs);
466 close(ioctl_socket);
467 #endif
468 }
469
470 } // namespace
471
472 // static
473 scoped_ptr<AddressSorter> AddressSorter::CreateAddressSorter() {
474 return scoped_ptr<AddressSorter>(
475 new AddressSorterPosix(ClientSocketFactory::GetDefaultFactory()));
476 }
477
478 } // namespace net
479
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698