mirror of
https://github.com/pi-hole/dnsmasq.git
synced 2025-12-19 18:28:25 +00:00
Support TCP fastopen on incoming and outgoing connections.
This commit is contained in:
@@ -26,7 +26,10 @@ version 2.81
|
||||
Thanks to Norman Rasmussen, Sven Mueller and Maciej Żenczykowski
|
||||
for spotting and diagnosing the bug and providing patches.
|
||||
|
||||
|
||||
Support TCP-fastopen (RFC-7413) on both incoming and
|
||||
outgoing TCP connections, if supported and enabled in the OS.
|
||||
|
||||
|
||||
version 2.80
|
||||
Add support for RFC 4039 DHCP rapid commit. Thanks to Ashram Method
|
||||
for the initial patch and motivation.
|
||||
|
||||
@@ -128,6 +128,7 @@ typedef unsigned long long u64;
|
||||
#include <netinet/ip.h>
|
||||
#include <netinet/ip6.h>
|
||||
#include <netinet/ip_icmp.h>
|
||||
#include <netinet/tcp.h>
|
||||
#include <sys/uio.h>
|
||||
#include <syslog.h>
|
||||
#include <dirent.h>
|
||||
|
||||
@@ -1635,6 +1635,8 @@ static int tcp_key_recurse(time_t now, int status, struct dns_header *header, si
|
||||
|
||||
while (1)
|
||||
{
|
||||
int data_sent = 0;
|
||||
|
||||
if (!firstsendto)
|
||||
firstsendto = server;
|
||||
else
|
||||
@@ -1667,8 +1669,22 @@ static int tcp_key_recurse(time_t now, int status, struct dns_header *header, si
|
||||
setsockopt(server->tcpfd, SOL_SOCKET, SO_MARK, &mark, sizeof(unsigned int));
|
||||
#endif
|
||||
|
||||
if (!local_bind(server->tcpfd, &server->source_addr, server->interface, 0, 1) ||
|
||||
connect(server->tcpfd, &server->addr.sa, sa_len(&server->addr)) == -1)
|
||||
if (!local_bind(server->tcpfd, &server->source_addr, server->interface, 0, 1))
|
||||
{
|
||||
close(server->tcpfd);
|
||||
server->tcpfd = -1;
|
||||
continue; /* No good, next server */
|
||||
}
|
||||
|
||||
#ifdef MSG_FASTOPEN
|
||||
while(retry_send(sendto(server->tcpfd, packet, m + sizeof(u16),
|
||||
MSG_FASTOPEN, &server->addr.sa, sa_len(&server->addr))));
|
||||
|
||||
if (errno == 0)
|
||||
data_sent = 1;
|
||||
#endif
|
||||
|
||||
if (!data_sent && connect(server->tcpfd, &server->addr.sa, sa_len(&server->addr)) == -1)
|
||||
{
|
||||
close(server->tcpfd);
|
||||
server->tcpfd = -1;
|
||||
@@ -1678,7 +1694,7 @@ static int tcp_key_recurse(time_t now, int status, struct dns_header *header, si
|
||||
server->flags &= ~SERV_GOT_TCP;
|
||||
}
|
||||
|
||||
if (!read_write(server->tcpfd, packet, m + sizeof(u16), 0) ||
|
||||
if ((!data_sent && !read_write(server->tcpfd, packet, m + sizeof(u16), 0)) ||
|
||||
!read_write(server->tcpfd, &c1, 1, 1) ||
|
||||
!read_write(server->tcpfd, &c2, 1, 1) ||
|
||||
!read_write(server->tcpfd, payload, (c1 << 8) | c2, 1))
|
||||
@@ -1951,6 +1967,8 @@ unsigned char *tcp_request(int confd, time_t now,
|
||||
which can go to the same server, do so. */
|
||||
while (1)
|
||||
{
|
||||
int data_sent = 0;
|
||||
|
||||
if (!firstsendto)
|
||||
firstsendto = last_server;
|
||||
else
|
||||
@@ -1969,6 +1987,8 @@ unsigned char *tcp_request(int confd, time_t now,
|
||||
continue;
|
||||
|
||||
retry:
|
||||
*length = htons(size);
|
||||
|
||||
if (last_server->tcpfd == -1)
|
||||
{
|
||||
if ((last_server->tcpfd = socket(last_server->addr.sa.sa_family, SOCK_STREAM, 0)) == -1)
|
||||
@@ -1978,10 +1998,24 @@ unsigned char *tcp_request(int confd, time_t now,
|
||||
/* Copy connection mark of incoming query to outgoing connection. */
|
||||
if (have_mark)
|
||||
setsockopt(last_server->tcpfd, SOL_SOCKET, SO_MARK, &mark, sizeof(unsigned int));
|
||||
#endif
|
||||
#endif
|
||||
|
||||
if ((!local_bind(last_server->tcpfd, &last_server->source_addr, last_server->interface, 0, 1) ||
|
||||
connect(last_server->tcpfd, &last_server->addr.sa, sa_len(&last_server->addr)) == -1))
|
||||
if ((!local_bind(last_server->tcpfd, &last_server->source_addr, last_server->interface, 0, 1)))
|
||||
{
|
||||
close(last_server->tcpfd);
|
||||
last_server->tcpfd = -1;
|
||||
continue;
|
||||
}
|
||||
|
||||
#ifdef MSG_FASTOPEN
|
||||
while(retry_send(sendto(last_server->tcpfd, packet, size + sizeof(u16),
|
||||
MSG_FASTOPEN, &last_server->addr.sa, sa_len(&last_server->addr))));
|
||||
|
||||
if (errno == 0)
|
||||
data_sent = 1;
|
||||
#endif
|
||||
|
||||
if (!data_sent && connect(last_server->tcpfd, &last_server->addr.sa, sa_len(&last_server->addr)) == -1)
|
||||
{
|
||||
close(last_server->tcpfd);
|
||||
last_server->tcpfd = -1;
|
||||
@@ -1991,13 +2025,11 @@ unsigned char *tcp_request(int confd, time_t now,
|
||||
last_server->flags &= ~SERV_GOT_TCP;
|
||||
}
|
||||
|
||||
*length = htons(size);
|
||||
|
||||
/* get query name again for logging - may have been overwritten */
|
||||
if (!(gotname = extract_request(header, (unsigned int)size, daemon->namebuff, &qtype)))
|
||||
strcpy(daemon->namebuff, "query");
|
||||
|
||||
if (!read_write(last_server->tcpfd, packet, size + sizeof(u16), 0) ||
|
||||
if ((!data_sent && !read_write(last_server->tcpfd, packet, size + sizeof(u16), 0)) ||
|
||||
!read_write(last_server->tcpfd, &c1, 1, 1) ||
|
||||
!read_write(last_server->tcpfd, &c2, 1, 1) ||
|
||||
!read_write(last_server->tcpfd, payload, (c1 << 8) | c2, 1))
|
||||
|
||||
@@ -726,6 +726,11 @@ static int make_sock(union mysockaddr *addr, int type, int dienow)
|
||||
|
||||
if (type == SOCK_STREAM)
|
||||
{
|
||||
#ifdef TCP_FASTOPEN
|
||||
int qlen = 5;
|
||||
setsockopt(fd, SOL_TCP, TCP_FASTOPEN, &qlen, sizeof(qlen));
|
||||
#endif
|
||||
|
||||
if (listen(fd, TCP_BACKLOG) == -1)
|
||||
goto err;
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user