Coverage Report

Created: 2025-06-24 06:40

/src/systemd/src/resolve/resolved-mdns.c
Line
Count
Source (jump to first uncovered line)
1
/* SPDX-License-Identifier: LGPL-2.1-or-later */
2
3
#include <netinet/in.h>
4
5
#include "sd-event.h"
6
7
#include "alloc-util.h"
8
#include "dns-domain.h"
9
#include "fd-util.h"
10
#include "log.h"
11
#include "resolved-dns-answer.h"
12
#include "resolved-dns-packet.h"
13
#include "resolved-dns-question.h"
14
#include "resolved-dns-rr.h"
15
#include "resolved-dns-scope.h"
16
#include "resolved-dns-transaction.h"
17
#include "resolved-link.h"
18
#include "resolved-manager.h"
19
#include "resolved-mdns.h"
20
#include "sort-util.h"
21
#include "time-util.h"
22
23
#define CLEAR_CACHE_FLUSH(x) (~MDNS_RR_CACHE_FLUSH_OR_QU & (x))
24
25
0
void manager_mdns_stop(Manager *m) {
26
0
        assert(m);
27
28
0
        m->mdns_ipv4_event_source = sd_event_source_disable_unref(m->mdns_ipv4_event_source);
29
0
        m->mdns_ipv4_fd = safe_close(m->mdns_ipv4_fd);
30
31
0
        m->mdns_ipv6_event_source = sd_event_source_disable_unref(m->mdns_ipv6_event_source);
32
0
        m->mdns_ipv6_fd = safe_close(m->mdns_ipv6_fd);
33
0
}
34
35
0
void manager_mdns_maybe_stop(Manager *m) {
36
0
        assert(m);
37
38
        /* This stops mDNS only when no interface enables mDNS. */
39
40
0
        Link *l;
41
0
        HASHMAP_FOREACH(l, m->links)
42
0
                if (link_get_mdns_support(l) != RESOLVE_SUPPORT_NO)
43
0
                        return;
44
45
0
        manager_mdns_stop(m);
46
0
}
47
48
0
int manager_mdns_start(Manager *m) {
49
0
        int r;
50
51
0
        assert(m);
52
53
0
        if (m->mdns_support == RESOLVE_SUPPORT_NO)
54
0
                return 0;
55
56
0
        r = manager_mdns_ipv4_fd(m);
57
0
        if (r == -EADDRINUSE)
58
0
                goto eaddrinuse;
59
0
        if (r < 0)
60
0
                return r;
61
62
0
        if (socket_ipv6_is_enabled()) {
63
0
                r = manager_mdns_ipv6_fd(m);
64
0
                if (r == -EADDRINUSE)
65
0
                        goto eaddrinuse;
66
0
                if (r < 0)
67
0
                        return r;
68
0
        }
69
70
0
        return 0;
71
72
0
eaddrinuse:
73
0
        log_warning("Another mDNS responder prohibits binding the socket to the same port. Turning off mDNS support.");
74
0
        m->mdns_support = RESOLVE_SUPPORT_NO;
75
0
        manager_mdns_stop(m);
76
77
0
        return 0;
78
0
}
79
80
0
static int mdns_rr_compare(DnsResourceRecord * const *a, DnsResourceRecord * const *b) {
81
0
        DnsResourceRecord *x = *(DnsResourceRecord **) a, *y = *(DnsResourceRecord **) b;
82
0
        size_t m;
83
0
        int r;
84
85
0
        assert(x);
86
0
        assert(y);
87
88
0
        r = CMP(CLEAR_CACHE_FLUSH(x->key->class), CLEAR_CACHE_FLUSH(y->key->class));
89
0
        if (r != 0)
90
0
                return r;
91
92
0
        r = CMP(x->key->type, y->key->type);
93
0
        if (r != 0)
94
0
                return r;
95
96
0
        r = dns_resource_record_to_wire_format(x, false);
97
0
        if (r < 0) {
98
0
                log_warning_errno(r, "Can't wire-format RR: %m");
99
0
                return 0;
100
0
        }
101
102
0
        r = dns_resource_record_to_wire_format(y, false);
103
0
        if (r < 0) {
104
0
                log_warning_errno(r, "Can't wire-format RR: %m");
105
0
                return 0;
106
0
        }
107
108
0
        m = MIN(DNS_RESOURCE_RECORD_RDATA_SIZE(x), DNS_RESOURCE_RECORD_RDATA_SIZE(y));
109
110
0
        r = memcmp(DNS_RESOURCE_RECORD_RDATA(x), DNS_RESOURCE_RECORD_RDATA(y), m);
111
0
        if (r != 0)
112
0
                return r;
113
114
0
        return CMP(DNS_RESOURCE_RECORD_RDATA_SIZE(x), DNS_RESOURCE_RECORD_RDATA_SIZE(y));
115
0
}
116
117
0
static int proposed_rrs_cmp(DnsResourceRecord **x, unsigned x_size, DnsResourceRecord **y, unsigned y_size) {
118
0
        unsigned m;
119
0
        int r;
120
121
0
        m = MIN(x_size, y_size);
122
0
        for (unsigned i = 0; i < m; i++) {
123
0
                r = mdns_rr_compare(&x[i], &y[i]);
124
0
                if (r != 0)
125
0
                        return r;
126
0
        }
127
128
0
        return CMP(x_size, y_size);
129
0
}
130
131
0
static int mdns_packet_extract_matching_rrs(DnsPacket *p, DnsResourceKey *key, DnsResourceRecord ***ret_rrs) {
132
0
        _cleanup_free_ DnsResourceRecord **list = NULL;
133
0
        size_t i, n = 0, size = 0;
134
0
        DnsResourceRecord *rr;
135
0
        int r;
136
137
0
        assert(p);
138
0
        assert(key);
139
0
        assert(ret_rrs);
140
0
        assert_return(DNS_PACKET_NSCOUNT(p) > 0, -EINVAL);
141
142
0
        i = 0;
143
0
        DNS_ANSWER_FOREACH(rr, p->answer) {
144
0
                if (i >= DNS_PACKET_ANCOUNT(p) && i < DNS_PACKET_ANCOUNT(p) + DNS_PACKET_NSCOUNT(p)) {
145
0
                        r = dns_resource_key_match_rr(key, rr, NULL);
146
0
                        if (r < 0)
147
0
                                return r;
148
0
                        if (r > 0)
149
0
                                size++;
150
0
                }
151
0
                i++;
152
0
        }
153
154
0
        if (size == 0) {
155
0
                *ret_rrs = NULL;
156
0
                return 0;
157
0
        }
158
159
0
        list = new(DnsResourceRecord *, size);
160
0
        if (!list)
161
0
                return -ENOMEM;
162
163
0
        i = 0;
164
0
        DNS_ANSWER_FOREACH(rr, p->answer) {
165
0
                if (i >= DNS_PACKET_ANCOUNT(p) && i < DNS_PACKET_ANCOUNT(p) + DNS_PACKET_NSCOUNT(p)) {
166
0
                        r = dns_resource_key_match_rr(key, rr, NULL);
167
0
                        if (r < 0)
168
0
                                return r;
169
0
                        if (r > 0)
170
0
                                list[n++] = rr;
171
0
                }
172
0
                i++;
173
0
        }
174
175
0
        assert(n == size);
176
0
        typesafe_qsort(list, size, mdns_rr_compare);
177
178
0
        *ret_rrs = TAKE_PTR(list);
179
180
0
        return size;
181
0
}
182
183
0
static int mdns_do_tiebreak(DnsResourceKey *key, DnsAnswer *answer, DnsPacket *p) {
184
0
        _cleanup_free_ DnsResourceRecord **our = NULL, **remote = NULL;
185
0
        DnsResourceRecord *rr;
186
0
        size_t i = 0, size;
187
0
        int r;
188
189
0
        size = dns_answer_size(answer);
190
0
        our = new(DnsResourceRecord *, size);
191
0
        if (!our)
192
0
                return -ENOMEM;
193
194
0
        DNS_ANSWER_FOREACH(rr, answer)
195
0
                our[i++] = rr;
196
197
0
        typesafe_qsort(our, size, mdns_rr_compare);
198
199
0
        r = mdns_packet_extract_matching_rrs(p, key, &remote);
200
0
        if (r < 0)
201
0
                return r;
202
203
0
        if (proposed_rrs_cmp(remote, r, our, size) > 0)
204
0
                return 1;
205
206
0
        return 0;
207
0
}
208
209
0
static bool mdns_should_reply_using_unicast(DnsPacket *p) {
210
0
        DnsQuestionItem *item;
211
212
        /* Work out if we should respond using multicast or unicast. */
213
214
        /* The query was a legacy "one-shot mDNS query", RFC 6762, sections 5.1 and 6.7 */
215
0
        if (p->sender_port != MDNS_PORT)
216
0
                return true;
217
218
        /* The query was a "direct unicast query", RFC 6762, section 5.5 */
219
0
        switch (p->family) {
220
0
        case AF_INET:
221
0
                if (!in4_addr_equal(&p->destination.in, &MDNS_MULTICAST_IPV4_ADDRESS))
222
0
                        return true;
223
0
                break;
224
0
        case AF_INET6:
225
0
                if (!in6_addr_equal(&p->destination.in6, &MDNS_MULTICAST_IPV6_ADDRESS))
226
0
                        return true;
227
0
                break;
228
0
        }
229
230
        /* All the questions in the query had a QU bit set, RFC 6762, section 5.4 */
231
0
        DNS_QUESTION_FOREACH_ITEM(item, p->question)
232
0
                if (!FLAGS_SET(item->flags, DNS_QUESTION_WANTS_UNICAST_REPLY))
233
0
                        return false;
234
235
0
        return true;
236
0
}
237
238
0
static bool sender_on_local_subnet(DnsScope *s, DnsPacket *p) {
239
0
        int r;
240
241
        /* Check whether the sender is on a local subnet. */
242
243
0
        if (!s->link)
244
0
                return false;
245
246
0
        LIST_FOREACH(addresses, a, s->link->addresses) {
247
0
                if (a->family != p->family)
248
0
                        continue;
249
0
                if (a->prefixlen == UCHAR_MAX) /* don't know subnet mask */
250
0
                        continue;
251
252
0
                r = in_addr_prefix_covers(a->family, &a->in_addr, a->prefixlen, &p->sender);
253
0
                if (r < 0)
254
0
                        log_debug_errno(r, "Failed to determine whether link address covers sender address: %m");
255
0
                if (r > 0)
256
0
                        return true;
257
0
        }
258
259
0
        return false;
260
0
}
261
262
0
static int mdns_scope_process_query(DnsScope *s, DnsPacket *p) {
263
0
        _cleanup_(dns_answer_unrefp) DnsAnswer *full_answer = NULL;
264
0
        _cleanup_(dns_packet_unrefp) DnsPacket *reply = NULL;
265
0
        DnsResourceKey *key = NULL;
266
0
        DnsResourceRecord *rr;
267
0
        bool tentative = false;
268
0
        bool legacy_query = p->sender_port != MDNS_PORT;
269
0
        bool unicast_reply;
270
0
        int r;
271
272
0
        assert(s);
273
0
        assert(p);
274
275
0
        r = dns_packet_extract(p);
276
0
        if (r < 0)
277
0
                return log_debug_errno(r, "Failed to extract resource records from incoming packet: %m");
278
279
        /* TODO: Support Known-Answers only packets gracefully. */
280
0
        if (dns_question_size(p->question) <= 0)
281
0
                return 0;
282
283
0
        unicast_reply = mdns_should_reply_using_unicast(p);
284
0
        if (unicast_reply && !sender_on_local_subnet(s, p)) {
285
                /* RFC 6762, section 5.5 recommends silently ignoring unicast queries
286
                 * from senders outside the local network, so that we don't reveal our
287
                 * internal network structure to outsiders. */
288
0
                log_debug("Sender wants a unicast reply, but is not on a local subnet. Ignoring.");
289
0
                return 0;
290
0
        }
291
292
0
        DNS_QUESTION_FOREACH(key, p->question) {
293
0
                _cleanup_(dns_answer_unrefp) DnsAnswer *answer = NULL, *soa = NULL;
294
0
                DnsAnswerItem *item;
295
296
0
                r = dns_zone_lookup(&s->zone, key, 0, &answer, &soa, &tentative);
297
0
                if (r < 0)
298
0
                        return log_debug_errno(r, "Failed to look up key: %m");
299
300
0
                if (tentative && DNS_PACKET_NSCOUNT(p) > 0) {
301
                        /*
302
                         * A race condition detected with the probe packet from
303
                         * a remote host.
304
                         * Do simultaneous probe tiebreaking as described in
305
                         * RFC 6762, Section 8.2. In case we lost don't reply
306
                         * the question and withdraw conflicting RRs.
307
                         */
308
0
                        r = mdns_do_tiebreak(key, answer, p);
309
0
                        if (r < 0)
310
0
                                return log_debug_errno(r, "Failed to do tiebreaking");
311
312
0
                        if (r > 0) { /* we lost */
313
0
                                DNS_ANSWER_FOREACH(rr, answer) {
314
0
                                        DnsZoneItem *i;
315
316
0
                                        i = dns_zone_get(&s->zone, rr);
317
0
                                        if (i)
318
0
                                                dns_zone_item_conflict(i);
319
0
                                }
320
321
0
                                continue;
322
0
                        }
323
0
                }
324
325
0
                if (dns_answer_isempty(answer))
326
0
                        continue;
327
328
                /* Copy answer items from full_answer to answer, tweaking them if needed. */
329
0
                if (full_answer) {
330
0
                        r = dns_answer_reserve(&full_answer, dns_answer_size(answer));
331
0
                        if (r < 0)
332
0
                                return log_debug_errno(r, "Failed to reserve space in answer");
333
0
                } else {
334
0
                        full_answer = dns_answer_new(dns_answer_size(answer));
335
0
                        if (!full_answer)
336
0
                                return log_oom();
337
0
                }
338
339
0
                DNS_ANSWER_FOREACH_ITEM(item, answer) {
340
0
                        DnsAnswerFlags flags = item->flags | DNS_ANSWER_REFUSE_TTL_NO_MATCH;
341
                        /* The cache-flush bit must not be set in legacy unicast responses.
342
                         * See section 6.7 of RFC 6762. */
343
0
                        if (legacy_query)
344
0
                                flags &= ~DNS_ANSWER_CACHE_FLUSH;
345
0
                        r = dns_answer_add(full_answer, item->rr, item->ifindex, flags, item->rrsig);
346
0
                        if (r < 0)
347
0
                                return log_debug_errno(r, "Failed to extend answer: %m");
348
0
                }
349
0
        }
350
351
0
        if (dns_answer_isempty(full_answer))
352
0
                return 0;
353
354
0
        r = dns_scope_make_reply_packet(s, DNS_PACKET_ID(p), DNS_RCODE_SUCCESS,
355
0
                                        legacy_query ? p->question : NULL, full_answer,
356
0
                                        NULL, false, &reply);
357
0
        if (r < 0)
358
0
                return log_debug_errno(r, "Failed to build reply packet: %m");
359
360
0
        if (!ratelimit_below(&s->ratelimit))
361
0
                return 0;
362
363
0
        if (unicast_reply) {
364
0
                reply->destination = p->sender;
365
0
                reply->destination_port = p->sender_port;
366
0
        }
367
0
        r = dns_scope_emit_udp(s, -1, AF_UNSPEC, reply);
368
0
        if (r < 0)
369
0
                return log_debug_errno(r, "Failed to send reply packet: %m");
370
371
0
        return 0;
372
0
}
373
374
0
static int mdns_goodbye_callback(sd_event_source *s, uint64_t usec, void *userdata) {
375
0
        DnsScope *scope = userdata;
376
0
        int r;
377
378
0
        assert(s);
379
0
        assert(scope);
380
381
0
        scope->mdns_goodbye_event_source = sd_event_source_disable_unref(scope->mdns_goodbye_event_source);
382
383
0
        dns_cache_prune(&scope->cache);
384
385
0
        if (dns_cache_expiry_in_one_second(&scope->cache, usec)) {
386
0
                r = sd_event_add_time_relative(
387
0
                        scope->manager->event,
388
0
                        &scope->mdns_goodbye_event_source,
389
0
                        CLOCK_BOOTTIME,
390
0
                        USEC_PER_SEC,
391
0
                        0,
392
0
                        mdns_goodbye_callback,
393
0
                        scope);
394
0
                if (r < 0)
395
0
                        return log_error_errno(r, "mDNS: Failed to re-schedule goodbye callback: %m");
396
0
        }
397
398
0
        return 0;
399
0
}
400
401
0
static int on_mdns_packet(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
402
0
        _cleanup_(dns_packet_unrefp) DnsPacket *p = NULL;
403
0
        Manager *m = userdata;
404
0
        DnsScope *scope;
405
0
        int r;
406
407
0
        r = manager_recv(m, fd, DNS_PROTOCOL_MDNS, &p);
408
0
        if (r <= 0)
409
0
                return r;
410
411
        /* Refuse traffic from the local host, to avoid query loops. However, allow legacy mDNS
412
         * unicast queries through anyway (we never send those ourselves, hence no risk).
413
         * i.e. check for the source port nr. */
414
0
        if (p->sender_port == MDNS_PORT && manager_packet_from_local_address(m, p)) {
415
0
                log_debug("Got mDNS UDP packet from local host, ignoring.");
416
0
                return 0;
417
0
        }
418
419
0
        scope = manager_find_scope(m, p);
420
0
        if (!scope) {
421
0
                log_debug("Got mDNS UDP packet on unknown scope. Ignoring.");
422
0
                return 0;
423
0
        }
424
425
0
        if (dns_packet_validate_reply(p) > 0) {
426
0
                DnsResourceRecord *rr;
427
428
                /* RFC 6762 section 6:
429
                 * The source UDP port in all Multicast DNS responses MUST be 5353 (the well-known port
430
                 * assigned to mDNS). Multicast DNS implementations MUST silently ignore any Multicast DNS
431
                 * responses they receive where the source UDP port is not 5353. */
432
0
                if (p->sender_port != MDNS_PORT) {
433
0
                        log_debug("Got mDNS reply from non-mDNS port %u (not %i), ignoring.", p->sender_port, MDNS_PORT);
434
0
                        return 0;
435
0
                }
436
437
0
                log_debug("Got mDNS reply packet");
438
439
                /*
440
                 * mDNS is different from regular DNS and LLMNR with regard to handling responses.
441
                 * While on other protocols, we can ignore every answer that doesn't match a question
442
                 * we broadcast earlier, RFC6762, section 18.1 recommends looking at and caching all
443
                 * incoming information, regardless of the DNS packet ID.
444
                 *
445
                 * Hence, extract the packet here, and try to find a transaction for answer the we got
446
                 * and complete it. Also store the new information in scope's cache.
447
                 */
448
0
                r = dns_packet_extract(p);
449
0
                if (r < 0) {
450
0
                        log_debug("mDNS packet extraction failed.");
451
0
                        return 0;
452
0
                }
453
454
0
                dns_scope_check_conflicts(scope, p);
455
456
0
                DNS_ANSWER_FOREACH(rr, p->answer) {
457
0
                        const char *name;
458
459
0
                        name = dns_resource_key_name(rr->key);
460
461
                        /* If the received reply packet contains ANY record that is not .local
462
                         * or .in-addr.arpa or .ip6.arpa, we assume someone's playing tricks on
463
                         * us and discard the packet completely. */
464
0
                        if (!(dns_name_endswith(name, "in-addr.arpa") > 0 ||
465
0
                              dns_name_endswith(name, "ip6.arpa") > 0 ||
466
0
                              dns_name_endswith(name, "local") > 0))
467
0
                                return 0;
468
469
0
                        if (rr->ttl == 0) {
470
0
                                log_debug("Got a goodbye packet");
471
                                /* See the section 10.1 of RFC6762 */
472
0
                                rr->ttl = 1;
473
474
                                /* Look at the cache 1 second later and remove stale entries.
475
                                 * This is particularly useful to keep service browsers updated on service removal,
476
                                 * as there are no other reliable triggers to propagate that info. */
477
0
                                if (!scope->mdns_goodbye_event_source) {
478
0
                                        r = sd_event_add_time_relative(
479
0
                                                        scope->manager->event,
480
0
                                                        &scope->mdns_goodbye_event_source,
481
0
                                                        CLOCK_BOOTTIME,
482
0
                                                        USEC_PER_SEC,
483
0
                                                        0,
484
0
                                                        mdns_goodbye_callback,
485
0
                                                        scope);
486
0
                                        if (r < 0)
487
0
                                                return r;
488
0
                                }
489
0
                        }
490
0
                }
491
492
0
                for (bool match = true; match;) {
493
0
                        match = false;
494
0
                        LIST_FOREACH(transactions_by_scope, t, scope->transactions) {
495
0
                                if (t->state != DNS_TRANSACTION_PENDING)
496
0
                                        continue;
497
498
0
                                r = dns_answer_match_key(p->answer, dns_transaction_key(t), NULL);
499
0
                                if (r <= 0) {
500
0
                                        if (r < 0)
501
0
                                                log_debug_errno(r, "Failed to match resource key, ignoring: %m");
502
0
                                        continue;
503
0
                                }
504
505
                                /* This packet matches the transaction, let's pass it on as reply */
506
0
                                dns_transaction_process_reply(t, p, false);
507
508
                                /* The dns_transaction_process_reply() -> dns_transaction_complete() ->
509
                                 * dns_query_candidate_stop() may free multiple transactions. Hence, restart
510
                                 * the loop. */
511
0
                                match = true;
512
0
                                break;
513
0
                        }
514
0
                }
515
516
0
                dns_cache_put(
517
0
                        &scope->cache,
518
0
                        scope->manager->enable_cache,
519
0
                        DNS_PROTOCOL_MDNS,
520
0
                        NULL,
521
0
                        dns_packet_rcode(p),
522
0
                        p->answer,
523
0
                        NULL,
524
0
                        false,
525
0
                        _DNSSEC_RESULT_INVALID,
526
0
                        UINT32_MAX,
527
0
                        p->family,
528
0
                        &p->sender,
529
0
                        scope->manager->stale_retention_usec);
530
531
0
        } else if (dns_packet_validate_query(p) > 0)  {
532
0
                log_debug("Got mDNS query packet for id %u", DNS_PACKET_ID(p));
533
534
0
                r = mdns_scope_process_query(scope, p);
535
0
                if (r < 0) {
536
0
                        log_debug_errno(r, "mDNS query processing failed: %m");
537
0
                        return 0;
538
0
                }
539
0
        } else
540
0
                log_debug("Invalid mDNS UDP packet.");
541
542
0
        return 0;
543
0
}
544
545
0
int manager_mdns_ipv4_fd(Manager *m) {
546
0
        union sockaddr_union sa = {
547
0
                .in.sin_family = AF_INET,
548
0
                .in.sin_port = htobe16(MDNS_PORT),
549
0
        };
550
0
        _cleanup_close_ int s = -EBADF;
551
0
        int r;
552
553
0
        assert(m);
554
555
0
        if (m->mdns_ipv4_fd >= 0)
556
0
                return m->mdns_ipv4_fd;
557
558
0
        s = socket(AF_INET, SOCK_DGRAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0);
559
0
        if (s < 0)
560
0
                return log_error_errno(errno, "mDNS-IPv4: Failed to create socket: %m");
561
562
0
        r = setsockopt_int(s, IPPROTO_IP, IP_TTL, 255);
563
0
        if (r < 0)
564
0
                return log_error_errno(r, "mDNS-IPv4: Failed to set IP_TTL: %m");
565
566
0
        r = setsockopt_int(s, IPPROTO_IP, IP_MULTICAST_TTL, 255);
567
0
        if (r < 0)
568
0
                return log_error_errno(r, "mDNS-IPv4: Failed to set IP_MULTICAST_TTL: %m");
569
570
0
        r = setsockopt_int(s, IPPROTO_IP, IP_MULTICAST_LOOP, true);
571
0
        if (r < 0)
572
0
                return log_error_errno(r, "mDNS-IPv4: Failed to set IP_MULTICAST_LOOP: %m");
573
574
0
        r = setsockopt_int(s, IPPROTO_IP, IP_PKTINFO, true);
575
0
        if (r < 0)
576
0
                return log_error_errno(r, "mDNS-IPv4: Failed to set IP_PKTINFO: %m");
577
578
0
        r = setsockopt_int(s, IPPROTO_IP, IP_RECVTTL, true);
579
0
        if (r < 0)
580
0
                return log_error_errno(r, "mDNS-IPv4: Failed to set IP_RECVTTL: %m");
581
582
        /* Disable Don't-Fragment bit in the IP header */
583
0
        r = setsockopt_int(s, IPPROTO_IP, IP_MTU_DISCOVER, IP_PMTUDISC_DONT);
584
0
        if (r < 0)
585
0
                return log_error_errno(r, "mDNS-IPv4: Failed to set IP_MTU_DISCOVER: %m");
586
587
        /* See the section 15.1 of RFC6762 */
588
        /* first try to bind without SO_REUSEADDR to detect another mDNS responder */
589
0
        r = bind(s, &sa.sa, sizeof(sa.in));
590
0
        if (r < 0) {
591
0
                if (errno != EADDRINUSE)
592
0
                        return log_error_errno(errno, "mDNS-IPv4: Failed to bind socket: %m");
593
594
0
                log_warning("mDNS-IPv4: There appears to be another mDNS responder running, or previously systemd-resolved crashed with some outstanding transfers.");
595
596
                /* try again with SO_REUSEADDR */
597
0
                r = setsockopt_int(s, SOL_SOCKET, SO_REUSEADDR, true);
598
0
                if (r < 0)
599
0
                        return log_error_errno(r, "mDNS-IPv4: Failed to set SO_REUSEADDR: %m");
600
601
0
                r = bind(s, &sa.sa, sizeof(sa.in));
602
0
                if (r < 0)
603
0
                        return log_error_errno(errno, "mDNS-IPv4: Failed to bind socket: %m");
604
0
        } else {
605
                /* enable SO_REUSEADDR for the case that the user really wants multiple mDNS responders */
606
0
                r = setsockopt_int(s, SOL_SOCKET, SO_REUSEADDR, true);
607
0
                if (r < 0)
608
0
                        return log_error_errno(r, "mDNS-IPv4: Failed to set SO_REUSEADDR: %m");
609
0
        }
610
611
0
        r = sd_event_add_io(m->event, &m->mdns_ipv4_event_source, s, EPOLLIN, on_mdns_packet, m);
612
0
        if (r < 0)
613
0
                return log_error_errno(r, "mDNS-IPv4: Failed to create event source: %m");
614
615
0
        (void) sd_event_source_set_description(m->mdns_ipv4_event_source, "mdns-ipv4");
616
617
0
        return m->mdns_ipv4_fd = TAKE_FD(s);
618
0
}
619
620
0
int manager_mdns_ipv6_fd(Manager *m) {
621
0
        union sockaddr_union sa = {
622
0
                .in6.sin6_family = AF_INET6,
623
0
                .in6.sin6_port = htobe16(MDNS_PORT),
624
0
        };
625
0
        _cleanup_close_ int s = -EBADF;
626
0
        int r;
627
628
0
        assert(m);
629
630
0
        if (m->mdns_ipv6_fd >= 0)
631
0
                return m->mdns_ipv6_fd;
632
633
0
        s = socket(AF_INET6, SOCK_DGRAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0);
634
0
        if (s < 0)
635
0
                return log_error_errno(errno, "mDNS-IPv6: Failed to create socket: %m");
636
637
0
        r = setsockopt_int(s, IPPROTO_IPV6, IPV6_UNICAST_HOPS, 255);
638
0
        if (r < 0)
639
0
                return log_error_errno(r, "mDNS-IPv6: Failed to set IPV6_UNICAST_HOPS: %m");
640
641
        /* RFC 6762, section 11 recommends setting the TTL of UDP packets to 255. */
642
0
        r = setsockopt_int(s, IPPROTO_IPV6, IPV6_MULTICAST_HOPS, 255);
643
0
        if (r < 0)
644
0
                return log_error_errno(r, "mDNS-IPv6: Failed to set IPV6_MULTICAST_HOPS: %m");
645
646
0
        r = setsockopt_int(s, IPPROTO_IPV6, IPV6_MULTICAST_LOOP, true);
647
0
        if (r < 0)
648
0
                return log_error_errno(r, "mDNS-IPv6: Failed to set IPV6_MULTICAST_LOOP: %m");
649
650
0
        r = setsockopt_int(s, IPPROTO_IPV6, IPV6_V6ONLY, true);
651
0
        if (r < 0)
652
0
                return log_error_errno(r, "mDNS-IPv6: Failed to set IPV6_V6ONLY: %m");
653
654
0
        r = setsockopt_int(s, IPPROTO_IPV6, IPV6_RECVPKTINFO, true);
655
0
        if (r < 0)
656
0
                return log_error_errno(r, "mDNS-IPv6: Failed to set IPV6_RECVPKTINFO: %m");
657
658
0
        r = setsockopt_int(s, IPPROTO_IPV6, IPV6_RECVHOPLIMIT, true);
659
0
        if (r < 0)
660
0
                return log_error_errno(r, "mDNS-IPv6: Failed to set IPV6_RECVHOPLIMIT: %m");
661
662
        /* See the section 15.1 of RFC6762 */
663
        /* first try to bind without SO_REUSEADDR to detect another mDNS responder */
664
0
        r = bind(s, &sa.sa, sizeof(sa.in6));
665
0
        if (r < 0) {
666
0
                if (errno != EADDRINUSE)
667
0
                        return log_error_errno(errno, "mDNS-IPv6: Failed to bind socket: %m");
668
669
0
                log_warning("mDNS-IPv6: There appears to be another mDNS responder running, or previously systemd-resolved crashed with some outstanding transfers.");
670
671
                /* try again with SO_REUSEADDR */
672
0
                r = setsockopt_int(s, SOL_SOCKET, SO_REUSEADDR, true);
673
0
                if (r < 0)
674
0
                        return log_error_errno(r, "mDNS-IPv6: Failed to set SO_REUSEADDR: %m");
675
676
0
                r = bind(s, &sa.sa, sizeof(sa.in6));
677
0
                if (r < 0)
678
0
                        return log_error_errno(errno, "mDNS-IPv6: Failed to bind socket: %m");
679
0
        } else {
680
                /* enable SO_REUSEADDR for the case that the user really wants multiple mDNS responders */
681
0
                r = setsockopt_int(s, SOL_SOCKET, SO_REUSEADDR, true);
682
0
                if (r < 0)
683
0
                        return log_error_errno(r, "mDNS-IPv6: Failed to set SO_REUSEADDR: %m");
684
0
        }
685
686
0
        r = sd_event_add_io(m->event, &m->mdns_ipv6_event_source, s, EPOLLIN, on_mdns_packet, m);
687
0
        if (r < 0)
688
0
                return log_error_errno(r, "mDNS-IPv6: Failed to create event source: %m");
689
690
0
        (void) sd_event_source_set_description(m->mdns_ipv6_event_source, "mdns-ipv6");
691
692
0
        return m->mdns_ipv6_fd = TAKE_FD(s);
693
0
}