dn.c 40 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091
  1. /*
  2. * This file is part of the UCB release of Plan 9. It is subject to the license
  3. * terms in the LICENSE file found in the top-level directory of this
  4. * distribution and at http://akaros.cs.berkeley.edu/files/Plan9License. No
  5. * part of the UCB release of Plan 9, including this file, may be copied,
  6. * modified, propagated, or distributed except according to the terms contained
  7. * in the LICENSE file.
  8. */
  9. #include <u.h>
  10. #include <libc.h>
  11. #include <ip.h>
  12. #include <pool.h>
  13. #include <ctype.h>
  14. #include "dns.h"
  15. /*
  16. * this comment used to say `our target is 4000 names cached, this should
  17. * be larger on large servers'. dns at Bell Labs starts off with
  18. * about 1780 names.
  19. *
  20. * aging corrupts the cache, so raise the trigger to avoid it.
  21. */
  22. enum {
  23. Deftarget = 1<<30, /* effectively disable aging */
  24. Minage = 1<<30,
  25. Defagefreq = 1<<30, /* age names this often (seconds) */
  26. /* these settings will trigger frequent aging */
  27. // Deftarget = 4000,
  28. // Minage = 5*60,
  29. // Defagefreq = 15*60, /* age names this often (seconds) */
  30. Restartmins = 0,
  31. // Restartmins = 600,
  32. };
  33. /*
  34. * Hash table for domain names. The hash is based only on the
  35. * first element of the domain name.
  36. */
  37. DN *ht[HTLEN];
  38. static struct {
  39. Lock Lock;
  40. uint32_t names; /* names allocated */
  41. uint32_t oldest; /* longest we'll leave a name around */
  42. int active;
  43. int mutex;
  44. uint16_t id; /* same size as in packet */
  45. } dnvars;
  46. /* names of RR types */
  47. char *rrtname[] =
  48. {
  49. [Ta] = "ip",
  50. [Tns] = "ns",
  51. [Tmd] = "md",
  52. [Tmf] = "mf",
  53. [Tcname] = "cname",
  54. [Tsoa] = "soa",
  55. [Tmb] = "mb",
  56. [Tmg] = "mg",
  57. [Tmr] = "mr",
  58. [Tnull] = "null",
  59. [Twks] = "wks",
  60. [Tptr] = "ptr",
  61. [Thinfo] = "hinfo",
  62. [Tminfo] = "minfo",
  63. [Tmx] = "mx",
  64. [Ttxt] = "txt",
  65. [Trp] = "rp",
  66. [Tafsdb] = "afsdb",
  67. [Tx25] = "x.25",
  68. [Tisdn] = "isdn",
  69. [Trt] = "rt",
  70. [Tnsap] = "nsap",
  71. [Tnsapptr] = "nsap-ptr",
  72. [Tsig] = "sig",
  73. [Tkey] = "key",
  74. [Tpx] = "px",
  75. [Tgpos] = "gpos",
  76. [Taaaa] = "ipv6",
  77. [Tloc] = "loc",
  78. [Tnxt] = "nxt",
  79. [Teid] = "eid",
  80. [Tnimloc] = "nimrod",
  81. [Tsrv] = "srv",
  82. [Tatma] = "atma",
  83. [Tnaptr] = "naptr",
  84. [Tkx] = "kx",
  85. [Tcert] = "cert",
  86. [Ta6] = "a6",
  87. [Tdname] = "dname",
  88. [Tsink] = "sink",
  89. [Topt] = "opt",
  90. [Tapl] = "apl",
  91. [Tds] = "ds",
  92. [Tsshfp] = "sshfp",
  93. [Tipseckey] = "ipseckey",
  94. [Trrsig] = "rrsig",
  95. [Tnsec] = "nsec",
  96. [Tdnskey] = "dnskey",
  97. [Tspf] = "spf",
  98. [Tuinfo] = "uinfo",
  99. [Tuid] = "uid",
  100. [Tgid] = "gid",
  101. [Tunspec] = "unspec",
  102. [Ttkey] = "tkey",
  103. [Ttsig] = "tsig",
  104. [Tixfr] = "ixfr",
  105. [Taxfr] = "axfr",
  106. [Tmailb] = "mailb",
  107. [Tmaila] = "maila",
  108. [Tall] = "all",
  109. 0,
  110. };
  111. /* names of response codes */
  112. char *rname[Rmask+1] =
  113. {
  114. [Rok] = "ok",
  115. [Rformat] = "format error",
  116. [Rserver] = "server failure",
  117. [Rname] = "bad name",
  118. [Runimplimented] = "unimplemented",
  119. [Rrefused] = "we don't like you",
  120. [Ryxdomain] = "name should not exist",
  121. [Ryxrrset] = "rr set should not exist",
  122. [Rnxrrset] = "rr set should exist",
  123. [Rnotauth] = "not authorative",
  124. [Rnotzone] = "not in zone",
  125. [Rbadvers] = "bad opt version",
  126. /* [Rbadsig] = "bad signature", */
  127. [Rbadkey] = "bad key",
  128. [Rbadtime] = "bad signature time",
  129. [Rbadmode] = "bad mode",
  130. [Rbadname] = "duplicate key name",
  131. [Rbadalg] = "bad algorithm",
  132. };
  133. unsigned nrname = nelem(rname);
  134. /* names of op codes */
  135. char *opname[] =
  136. {
  137. [Oquery] = "query",
  138. [Oinverse] = "inverse query (retired)",
  139. [Ostatus] = "status",
  140. [Oupdate] = "update",
  141. };
  142. uint32_t target = Deftarget;
  143. uint32_t start;
  144. Lock dnlock;
  145. static uint32_t agefreq = Defagefreq;
  146. static int rrequiv(RR *r1, RR *r2);
  147. static int sencodefmt(Fmt*);
  148. static void
  149. ding(void *v, char *msg)
  150. {
  151. if(strstr(msg, "alarm") != nil) {
  152. stats.alarms++;
  153. noted(NCONT); /* resume with system call error */
  154. } else
  155. noted(NDFLT); /* die */
  156. }
  157. void
  158. dninit(void)
  159. {
  160. fmtinstall('E', eipfmt);
  161. fmtinstall('I', eipfmt);
  162. fmtinstall('V', eipfmt);
  163. fmtinstall('R', rrfmt);
  164. fmtinstall('Q', rravfmt);
  165. fmtinstall('H', sencodefmt);
  166. dnvars.oldest = maxage;
  167. dnvars.names = 0;
  168. dnvars.id = truerand(); /* don't start with same id every time */
  169. notify(ding);
  170. }
  171. /*
  172. * hash for a domain name
  173. */
  174. static uint32_t
  175. dnhash(char *name)
  176. {
  177. uint32_t hash;
  178. uint8_t *val = (uint8_t*)name;
  179. for(hash = 0; *val; val++)
  180. hash = hash*13 + tolower(*val)-'a';
  181. return hash % HTLEN;
  182. }
  183. /*
  184. * lookup a symbol. if enter is not zero and the name is
  185. * not found, create it.
  186. */
  187. DN*
  188. dnlookup(char *name, int class, int enter)
  189. {
  190. DN **l;
  191. DN *dp;
  192. l = &ht[dnhash(name)];
  193. lock(&dnlock);
  194. for(dp = *l; dp; dp = dp->next) {
  195. assert(dp->magic == DNmagic);
  196. if(dp->class == class && cistrcmp(dp->name, name) == 0){
  197. dp->referenced = now;
  198. unlock(&dnlock);
  199. return dp;
  200. }
  201. l = &dp->next;
  202. }
  203. if(!enter){
  204. unlock(&dnlock);
  205. return 0;
  206. }
  207. dnvars.names++;
  208. dp = emalloc(sizeof(*dp));
  209. dp->magic = DNmagic;
  210. dp->name = estrdup(name);
  211. assert(dp->name != nil);
  212. dp->class = class;
  213. dp->rr = 0;
  214. dp->referenced = now;
  215. /* add new DN to tail of the hash list. *l points to last next ptr. */
  216. dp->next = nil;
  217. *l = dp;
  218. unlock(&dnlock);
  219. return dp;
  220. }
  221. static int
  222. rrsame(RR *rr1, RR *rr2)
  223. {
  224. return rr1 == rr2 || (rr2 && rrequiv(rr1, rr2) &&
  225. rr1->db == rr2->db && rr1->auth == rr2->auth);
  226. }
  227. static int
  228. rronlist(RR *rp, RR *lp)
  229. {
  230. for(; lp; lp = lp->next)
  231. if (rrsame(lp, rp))
  232. return 1;
  233. return 0;
  234. }
  235. /*
  236. * dump the stats
  237. */
  238. void
  239. dnstats(char *file)
  240. {
  241. int i, fd;
  242. fd = create(file, OWRITE, 0666);
  243. if(fd < 0)
  244. return;
  245. qlock(&stats.QLock);
  246. fprint(fd, "# system %s\n", sysname());
  247. fprint(fd, "# slave procs high-water mark\t%lu\n", stats.slavehiwat);
  248. fprint(fd, "# queries received by 9p\t%lu\n", stats.qrecvd9p);
  249. fprint(fd, "# queries received by udp\t%lu\n", stats.qrecvdudp);
  250. fprint(fd, "# queries answered from memory\t%lu\n", stats.answinmem);
  251. fprint(fd, "# queries sent by udp\t%lu\n", stats.qsent);
  252. for (i = 0; i < nelem(stats.under10ths); i++)
  253. if (stats.under10ths[i] || i == nelem(stats.under10ths) - 1)
  254. fprint(fd, "# responses arriving within %.1f s.\t%lu\n",
  255. (double)(i+1)/10, stats.under10ths[i]);
  256. fprint(fd, "\n# queries sent & timed-out\t%lu\n", stats.tmout);
  257. fprint(fd, "# cname queries timed-out\t%lu\n", stats.tmoutcname);
  258. fprint(fd, "# ipv6 queries timed-out\t%lu\n", stats.tmoutv6);
  259. fprint(fd, "\n# negative answers received\t%lu\n", stats.negans);
  260. fprint(fd, "# negative answers w Rserver set\t%lu\n", stats.negserver);
  261. fprint(fd, "# negative answers w bad delegation\t%lu\n",
  262. stats.negbaddeleg);
  263. fprint(fd, "# negative answers w bad delegation & no answers\t%lu\n",
  264. stats.negbdnoans);
  265. fprint(fd, "# negative answers w no Rname set\t%lu\n", stats.negnorname);
  266. fprint(fd, "# negative answers cached\t%lu\n", stats.negcached);
  267. qunlock(&stats.QLock);
  268. lock(&dnlock);
  269. fprint(fd, "\n# domain names %lu target %lu\n", dnvars.names, target);
  270. unlock(&dnlock);
  271. close(fd);
  272. }
  273. /*
  274. * dump the cache
  275. */
  276. void
  277. dndump(char *file)
  278. {
  279. int i, fd;
  280. DN *dp;
  281. RR *rp;
  282. fd = create(file, OWRITE, 0666);
  283. if(fd < 0)
  284. return;
  285. lock(&dnlock);
  286. for(i = 0; i < HTLEN; i++)
  287. for(dp = ht[i]; dp; dp = dp->next){
  288. fprint(fd, "%s\n", dp->name);
  289. for(rp = dp->rr; rp; rp = rp->next) {
  290. fprint(fd, "\t%R %c%c %lu/%lu\n",
  291. rp, rp->auth? 'A': 'U',
  292. rp->db? 'D': 'N', rp->expire, rp->ttl);
  293. if (rronlist(rp, rp->next))
  294. fprint(fd, "*** duplicate:\n");
  295. }
  296. }
  297. unlock(&dnlock);
  298. close(fd);
  299. }
  300. /*
  301. * purge all records
  302. */
  303. void
  304. dnpurge(void)
  305. {
  306. DN *dp;
  307. RR *rp, *srp;
  308. int i;
  309. lock(&dnlock);
  310. for(i = 0; i < HTLEN; i++)
  311. for(dp = ht[i]; dp; dp = dp->next){
  312. srp = rp = dp->rr;
  313. dp->rr = nil;
  314. for(; rp != nil; rp = rp->next)
  315. rp->cached = 0;
  316. rrfreelist(srp);
  317. }
  318. unlock(&dnlock);
  319. }
  320. /*
  321. * delete head of *l and free the old head.
  322. * call with dnlock held.
  323. */
  324. static void
  325. rrdelhead(RR **l)
  326. {
  327. RR *rp;
  328. if (canlock(&dnlock))
  329. abort(); /* rrdelhead called with dnlock not held */
  330. rp = *l;
  331. if(rp == nil)
  332. return;
  333. *l = rp->next; /* unlink head */
  334. rp->cached = 0; /* avoid blowing an assertion in rrfree */
  335. rrfree(rp);
  336. }
  337. /*
  338. * check the age of resource records, free any that have timed out.
  339. * call with dnlock held.
  340. */
  341. void
  342. dnage(DN *dp)
  343. {
  344. RR **l;
  345. RR *rp, *next;
  346. uint32_t diff;
  347. if (canlock(&dnlock))
  348. abort(); /* dnage called with dnlock not held */
  349. diff = now - dp->referenced;
  350. if(diff < Reserved || dp->keep)
  351. return;
  352. l = &dp->rr;
  353. for(rp = dp->rr; rp; rp = next){
  354. assert(rp->magic == RRmagic);
  355. assert(rp->cached);
  356. next = rp->next;
  357. if(!rp->db && (rp->expire < now || diff > dnvars.oldest))
  358. rrdelhead(l); /* rp == *l before; *l == rp->next after */
  359. else
  360. l = &rp->next;
  361. }
  362. }
  363. #define MARK(dp) { if (dp) (dp)->keep = 1; }
  364. /* mark a domain name and those in its RRs as never to be aged */
  365. void
  366. dnagenever(DN *dp, int dolock)
  367. {
  368. RR *rp;
  369. if (dolock)
  370. lock(&dnlock);
  371. /* mark all referenced domain names */
  372. MARK(dp);
  373. for(rp = dp->rr; rp; rp = rp->next){
  374. MARK(rp->owner);
  375. if(rp->negative){
  376. MARK(rp->negsoaowner);
  377. continue;
  378. }
  379. switch(rp->type){
  380. case Thinfo:
  381. MARK(rp->cpu);
  382. MARK(rp->os);
  383. break;
  384. case Ttxt:
  385. break;
  386. case Tcname:
  387. case Tmb:
  388. case Tmd:
  389. case Tmf:
  390. case Tns:
  391. case Tmx:
  392. case Tsrv:
  393. MARK(rp->host);
  394. break;
  395. case Tmg:
  396. case Tmr:
  397. MARK(rp->mb);
  398. break;
  399. case Tminfo:
  400. MARK(rp->rmb);
  401. MARK(rp->mb);
  402. break;
  403. case Trp:
  404. MARK(rp->rmb);
  405. MARK(rp->rp);
  406. break;
  407. case Ta:
  408. case Taaaa:
  409. MARK(rp->ip);
  410. break;
  411. case Tptr:
  412. MARK(rp->ptr);
  413. break;
  414. case Tsoa:
  415. MARK(rp->host);
  416. MARK(rp->rmb);
  417. break;
  418. }
  419. }
  420. if (dolock)
  421. unlock(&dnlock);
  422. }
  423. /* mark all current domain names as never to be aged */
  424. void
  425. dnageallnever(void)
  426. {
  427. int i;
  428. DN *dp;
  429. lock(&dnlock);
  430. /* mark all referenced domain names */
  431. for(i = 0; i < HTLEN; i++)
  432. for(dp = ht[i]; dp; dp = dp->next)
  433. dnagenever(dp, 0);
  434. unlock(&dnlock);
  435. dnslog("%ld initial domain names; target is %ld", dnvars.names, target);
  436. if(dnvars.names >= target)
  437. dnslog("more initial domain names (%ld) than target (%ld)",
  438. dnvars.names, target);
  439. }
  440. #define REF(dp) { if (dp) (dp)->refs++; }
  441. /*
  442. * periodicly sweep for old records and remove unreferenced domain names
  443. *
  444. * only called when all other threads are locked out
  445. */
  446. void
  447. dnageall(int doit)
  448. {
  449. DN *dp, **l;
  450. int i;
  451. RR *rp;
  452. static uint32_t nextage;
  453. if(dnvars.names < target || (now < nextage && !doit)){
  454. dnvars.oldest = maxage;
  455. return;
  456. }
  457. if(dnvars.names >= target) {
  458. dnslog("more names (%lu) than target (%lu)", dnvars.names,
  459. target);
  460. dnvars.oldest /= 2;
  461. if (dnvars.oldest < Minage)
  462. dnvars.oldest = Minage; /* don't be silly */
  463. }
  464. if (agefreq > dnvars.oldest / 2)
  465. nextage = now + dnvars.oldest / 2;
  466. else
  467. nextage = now + agefreq;
  468. lock(&dnlock);
  469. /* time out all old entries (and set refs to 0) */
  470. for(i = 0; i < HTLEN; i++)
  471. for(dp = ht[i]; dp; dp = dp->next){
  472. dp->refs = 0;
  473. dnage(dp);
  474. }
  475. /* mark all referenced domain names */
  476. for(i = 0; i < HTLEN; i++)
  477. for(dp = ht[i]; dp; dp = dp->next)
  478. for(rp = dp->rr; rp; rp = rp->next){
  479. REF(rp->owner);
  480. if(rp->negative){
  481. REF(rp->negsoaowner);
  482. continue;
  483. }
  484. switch(rp->type){
  485. case Thinfo:
  486. REF(rp->cpu);
  487. REF(rp->os);
  488. break;
  489. case Ttxt:
  490. break;
  491. case Tcname:
  492. case Tmb:
  493. case Tmd:
  494. case Tmf:
  495. case Tns:
  496. case Tmx:
  497. case Tsrv:
  498. REF(rp->host);
  499. break;
  500. case Tmg:
  501. case Tmr:
  502. REF(rp->mb);
  503. break;
  504. case Tminfo:
  505. REF(rp->rmb);
  506. REF(rp->mb);
  507. break;
  508. case Trp:
  509. REF(rp->rmb);
  510. REF(rp->rp);
  511. break;
  512. case Ta:
  513. case Taaaa:
  514. REF(rp->ip);
  515. break;
  516. case Tptr:
  517. REF(rp->ptr);
  518. break;
  519. case Tsoa:
  520. REF(rp->host);
  521. REF(rp->rmb);
  522. break;
  523. }
  524. }
  525. /* sweep and remove unreferenced domain names */
  526. for(i = 0; i < HTLEN; i++){
  527. l = &ht[i];
  528. for(dp = *l; dp; dp = *l){
  529. if(dp->rr == 0 && dp->refs == 0 && !dp->keep){
  530. assert(dp->magic == DNmagic);
  531. *l = dp->next;
  532. if(dp->name)
  533. free(dp->name);
  534. dp->magic = ~dp->magic;
  535. dnvars.names--;
  536. memset(dp, 0, sizeof *dp); /* cause trouble */
  537. free(dp);
  538. continue;
  539. }
  540. l = &dp->next;
  541. }
  542. }
  543. unlock(&dnlock);
  544. }
  545. /*
  546. * timeout all database records (used when rereading db)
  547. */
  548. void
  549. dnagedb(void)
  550. {
  551. DN *dp;
  552. int i;
  553. RR *rp;
  554. lock(&dnlock);
  555. /* time out all database entries */
  556. for(i = 0; i < HTLEN; i++)
  557. for(dp = ht[i]; dp; dp = dp->next) {
  558. dp->keep = 0;
  559. for(rp = dp->rr; rp; rp = rp->next)
  560. if(rp->db)
  561. rp->expire = 0;
  562. }
  563. unlock(&dnlock);
  564. }
  565. /*
  566. * mark all local db records about my area as authoritative,
  567. * time out any others
  568. */
  569. void
  570. dnauthdb(void)
  571. {
  572. int i;
  573. uint32_t minttl;
  574. Area *area;
  575. DN *dp;
  576. RR *rp;
  577. lock(&dnlock);
  578. /* time out all database entries */
  579. for(i = 0; i < HTLEN; i++)
  580. for(dp = ht[i]; dp; dp = dp->next){
  581. area = inmyarea(dp->name);
  582. for(rp = dp->rr; rp; rp = rp->next)
  583. if(rp->db){
  584. if(area){
  585. minttl = area->soarr->soa->minttl;
  586. if(rp->ttl < minttl)
  587. rp->ttl = minttl;
  588. rp->auth = 1;
  589. }
  590. if(rp->expire == 0){
  591. rp->db = 0;
  592. dp->referenced = now-Reserved-1;
  593. }
  594. }
  595. }
  596. unlock(&dnlock);
  597. }
  598. /*
  599. * keep track of other processes to know if we can
  600. * garbage collect. block while garbage collecting.
  601. */
  602. int
  603. getactivity(Request *req, int recursive)
  604. {
  605. int rv;
  606. if(traceactivity)
  607. dnslog("get: %d active by pid %d from %p",
  608. dnvars.active, getpid(), getcallerpc());
  609. lock(&dnvars.Lock);
  610. /*
  611. * can't block here if we're already holding one
  612. * of the dnvars.active (recursive). will deadlock.
  613. */
  614. while(!recursive && dnvars.mutex){
  615. unlock(&dnvars.Lock);
  616. sleep(100); /* tune; was 200 */
  617. lock(&dnvars.Lock);
  618. }
  619. rv = ++dnvars.active;
  620. now = time(nil);
  621. nowns = nsec();
  622. req->id = ++dnvars.id;
  623. unlock(&dnvars.Lock);
  624. return rv;
  625. }
  626. void
  627. putactivity(int recursive)
  628. {
  629. if(traceactivity)
  630. dnslog("put: %d active by pid %d",
  631. dnvars.active, getpid());
  632. lock(&dnvars.Lock);
  633. dnvars.active--;
  634. assert(dnvars.active >= 0); /* "dnvars.active %d", dnvars.active */
  635. /*
  636. * clean out old entries and check for new db periodicly
  637. * can't block here if being called to let go a "recursive" lock
  638. * or we'll deadlock waiting for ourselves to give up the dnvars.active.
  639. */
  640. if (recursive || dnvars.mutex ||
  641. (needrefresh == 0 && dnvars.active > 0)){
  642. unlock(&dnvars.Lock);
  643. return;
  644. }
  645. /* wait till we're alone */
  646. dnvars.mutex = 1;
  647. while(dnvars.active > 0){
  648. unlock(&dnvars.Lock);
  649. sleep(100); /* tune; was 100 */
  650. lock(&dnvars.Lock);
  651. }
  652. unlock(&dnvars.Lock);
  653. db2cache(needrefresh);
  654. /* if we've been running for long enough, restart */
  655. if(start == 0)
  656. start = time(nil);
  657. if(Restartmins > 0 && time(nil) - start > Restartmins*60){
  658. dnslog("killing all dns procs for timed restart");
  659. postnote(PNGROUP, getpid(), "die");
  660. dnvars.mutex = 0;
  661. exits("restart");
  662. }
  663. dnageall(0);
  664. /* let others back in */
  665. needrefresh = 0;
  666. dnvars.mutex = 0;
  667. }
  668. int
  669. rrlistlen(RR *rp)
  670. {
  671. int n;
  672. n = 0;
  673. for(; rp; rp = rp->next)
  674. ++n;
  675. return n;
  676. }
  677. /*
  678. * Attach a single resource record to a domain name (new->owner).
  679. * - Avoid duplicates with already present RR's
  680. * - Chain all RR's of the same type adjacent to one another
  681. * - chain authoritative RR's ahead of non-authoritative ones
  682. * - remove any expired RR's
  683. * If new is a stale duplicate, rrfree it.
  684. * Must be called with dnlock held.
  685. */
  686. static void
  687. rrattach1(RR *new, int auth)
  688. {
  689. RR **l;
  690. RR *rp;
  691. DN *dp;
  692. assert(new->magic == RRmagic);
  693. assert(!new->cached);
  694. // dnslog("rrattach1: %s", new->owner->name);
  695. if(!new->db) {
  696. /*
  697. * try not to let responses expire before we
  698. * can use them to complete this query, by extending
  699. * past (or nearly past) expiration time.
  700. */
  701. new->expire = new->ttl > now + Min? new->ttl: now + 10*Min;
  702. } else
  703. new->expire = now + Year;
  704. dp = new->owner;
  705. assert(dp->magic == DNmagic);
  706. new->auth |= auth;
  707. new->next = 0;
  708. /*
  709. * find first rr of the right type
  710. */
  711. l = &dp->rr;
  712. for(rp = *l; rp; rp = *l){
  713. assert(rp->magic == RRmagic);
  714. assert(rp->cached);
  715. if(rp->type == new->type)
  716. break;
  717. l = &rp->next;
  718. }
  719. /*
  720. * negative entries replace positive entries
  721. * positive entries replace negative entries
  722. * newer entries replace older entries with the same fields
  723. *
  724. * look farther ahead than just the next entry when looking
  725. * for duplicates; RRs of a given type can have different rdata
  726. * fields (e.g. multiple NS servers).
  727. */
  728. while ((rp = *l) != nil){
  729. assert(rp->magic == RRmagic);
  730. assert(rp->cached);
  731. if(rp->type != new->type)
  732. break;
  733. if(rp->db == new->db && rp->auth == new->auth){
  734. /* negative drives out positive and vice versa */
  735. if(rp->negative != new->negative) {
  736. /* rp == *l before; *l == rp->next after */
  737. rrdelhead(l);
  738. continue;
  739. }
  740. /* all things equal, pick the newer one */
  741. else if(rp->arg0 == new->arg0 && rp->arg1 == new->arg1){
  742. /* new drives out old */
  743. if (new->ttl <= rp->ttl &&
  744. new->expire <= rp->expire) {
  745. rrfree(new);
  746. return;
  747. }
  748. /* rp == *l before; *l == rp->next after */
  749. rrdelhead(l);
  750. continue;
  751. }
  752. /*
  753. * Hack for pointer records. This makes sure
  754. * the ordering in the list reflects the ordering
  755. * received or read from the database
  756. */
  757. else if(rp->type == Tptr &&
  758. !rp->negative && !new->negative &&
  759. rp->ptr->ordinal > new->ptr->ordinal)
  760. break;
  761. }
  762. l = &rp->next;
  763. }
  764. if (rronlist(new, rp)) {
  765. /* should not happen; duplicates were processed above */
  766. dnslog("adding duplicate %R to list of %R; aborting", new, rp);
  767. abort();
  768. }
  769. /*
  770. * add to chain
  771. */
  772. new->cached = 1;
  773. new->next = rp;
  774. *l = new;
  775. }
  776. /*
  777. * Attach a list of resource records to a domain name.
  778. * May rrfree any stale duplicate RRs; dismembers the list.
  779. * Upon return, every RR in the list will have been rrfree-d
  780. * or attached to its domain name.
  781. * See rrattach1 for properties preserved.
  782. */
  783. void
  784. rrattach(RR *rp, int auth)
  785. {
  786. RR *next, *tp;
  787. DN *dp;
  788. lock(&dnlock);
  789. for(; rp; rp = next){
  790. next = rp->next;
  791. rp->next = nil;
  792. dp = rp->owner;
  793. // dnslog("rrattach: %s", rp->owner->name);
  794. /* avoid any outside spoofing; leave keepers alone */
  795. if(cfg.cachedb && !rp->db && inmyarea(rp->owner->name)
  796. // || dp->keep /* TODO: make this work */
  797. )
  798. rrfree(rp);
  799. else {
  800. /* ameliorate the memory leak (someday delete this) */
  801. if (0 && rrlistlen(dp->rr) > 50 && !dp->keep) {
  802. dnslog("rrattach(%s): rr list too long; "
  803. "freeing it", dp->name);
  804. tp = dp->rr;
  805. dp->rr = nil;
  806. rrfreelist(tp);
  807. } else
  808. USED(dp);
  809. rrattach1(rp, auth);
  810. }
  811. }
  812. unlock(&dnlock);
  813. }
  814. /* should be called with dnlock held */
  815. RR**
  816. rrcopy(RR *rp, RR **last)
  817. {
  818. Cert *cert;
  819. Key *key;
  820. Null *null;
  821. RR *nrp;
  822. SOA *soa;
  823. Sig *sig;
  824. Txt *t, *nt, **l;
  825. if (canlock(&dnlock))
  826. abort(); /* rrcopy called with dnlock not held */
  827. nrp = rralloc(rp->type);
  828. setmalloctag(nrp, getcallerpc());
  829. switch(rp->type){
  830. case Ttxt:
  831. *nrp = *rp;
  832. l = &nrp->txt;
  833. *l = nil;
  834. for(t = rp->txt; t != nil; t = t->next){
  835. nt = emalloc(sizeof(*nt));
  836. nt->p = estrdup(t->p);
  837. nt->next = nil;
  838. *l = nt;
  839. l = &nt->next;
  840. }
  841. break;
  842. case Tsoa:
  843. soa = nrp->soa;
  844. *nrp = *rp;
  845. nrp->soa = soa;
  846. *nrp->soa = *rp->soa;
  847. nrp->soa->slaves = copyserverlist(rp->soa->slaves);
  848. break;
  849. case Tsrv:
  850. *nrp = *rp;
  851. nrp->srv = emalloc(sizeof *nrp->srv);
  852. *nrp->srv = *rp->srv;
  853. break;
  854. case Tkey:
  855. key = nrp->key;
  856. *nrp = *rp;
  857. nrp->key = key;
  858. *key = *rp->key;
  859. key->Block.data = emalloc(key->Block.dlen);
  860. memmove(key->Block.data, rp->key->Block.data, rp->key->Block.dlen);
  861. break;
  862. case Tsig:
  863. sig = nrp->sig;
  864. *nrp = *rp;
  865. nrp->sig = sig;
  866. *sig = *rp->sig;
  867. sig->Cert.Block.data = emalloc(sig->Cert.Block.dlen);
  868. memmove(sig->Cert.Block.data, rp->sig->Cert.Block.data, rp->sig->Cert.Block.dlen);
  869. break;
  870. case Tcert:
  871. cert = nrp->cert;
  872. *nrp = *rp;
  873. nrp->cert = cert;
  874. *cert = *rp->cert;
  875. cert->Block.data = emalloc(cert->Block.dlen);
  876. memmove(cert->Block.data, rp->cert->Block.data, rp->cert->Block.dlen);
  877. break;
  878. case Tnull:
  879. null = nrp->null;
  880. *nrp = *rp;
  881. nrp->null = null;
  882. *null = *rp->null;
  883. null->Block.data = emalloc(null->Block.dlen);
  884. memmove(null->Block.data, rp->null->Block.data, rp->null->Block.dlen);
  885. break;
  886. default:
  887. *nrp = *rp;
  888. break;
  889. }
  890. nrp->cached = 0;
  891. nrp->next = 0;
  892. *last = nrp;
  893. return &nrp->next;
  894. }
  895. /*
  896. * lookup a resource record of a particular type and
  897. * class attached to a domain name. Return copies.
  898. *
  899. * Priority ordering is:
  900. * db authoritative
  901. * not timed out network authoritative
  902. * not timed out network unauthoritative
  903. * unauthoritative db
  904. *
  905. * if flag NOneg is set, don't return negative cached entries.
  906. * return nothing instead.
  907. */
  908. RR*
  909. rrlookup(DN *dp, int type, int flag)
  910. {
  911. RR *rp, *first, **last;
  912. assert(dp->magic == DNmagic);
  913. first = 0;
  914. last = &first;
  915. lock(&dnlock);
  916. /* try for an authoritative db entry */
  917. for(rp = dp->rr; rp; rp = rp->next){
  918. assert(rp->magic == RRmagic);
  919. assert(rp->cached);
  920. if(rp->db)
  921. if(rp->auth)
  922. if(tsame(type, rp->type)) {
  923. last = rrcopy(rp, last);
  924. // setmalloctag(*last, getcallerpc());
  925. }
  926. }
  927. if(first)
  928. goto out;
  929. /* try for a living authoritative network entry */
  930. for(rp = dp->rr; rp; rp = rp->next){
  931. if(!rp->db)
  932. if(rp->auth)
  933. if(rp->ttl + 60 > now)
  934. if(tsame(type, rp->type)){
  935. if(flag == NOneg && rp->negative)
  936. goto out;
  937. last = rrcopy(rp, last);
  938. }
  939. }
  940. if(first)
  941. goto out;
  942. /* try for a living unauthoritative network entry */
  943. for(rp = dp->rr; rp; rp = rp->next){
  944. if(!rp->db)
  945. if(rp->ttl + 60 > now)
  946. if(tsame(type, rp->type)){
  947. if(flag == NOneg && rp->negative)
  948. goto out;
  949. last = rrcopy(rp, last);
  950. }
  951. }
  952. if(first)
  953. goto out;
  954. /* try for an unauthoritative db entry */
  955. for(rp = dp->rr; rp; rp = rp->next){
  956. if(rp->db)
  957. if(tsame(type, rp->type))
  958. last = rrcopy(rp, last);
  959. }
  960. if(first)
  961. goto out;
  962. /* otherwise, settle for anything we got (except for negative caches) */
  963. for(rp = dp->rr; rp; rp = rp->next)
  964. if(tsame(type, rp->type)){
  965. if(rp->negative)
  966. goto out;
  967. last = rrcopy(rp, last);
  968. }
  969. out:
  970. unique(first);
  971. unlock(&dnlock);
  972. // dnslog("rrlookup(%s) -> %#p\t# in-core only", dp->name, first);
  973. // if (first)
  974. // setmalloctag(first, getcallerpc());
  975. return first;
  976. }
  977. /*
  978. * convert an ascii RR type name to its integer representation
  979. */
  980. int
  981. rrtype(char *atype)
  982. {
  983. int i;
  984. for(i = 0; i <= Tall; i++)
  985. if(rrtname[i] && strcmp(rrtname[i], atype) == 0)
  986. return i;
  987. /* make any a synonym for all */
  988. if(strcmp(atype, "any") == 0)
  989. return Tall;
  990. else if(isascii(atype[0]) && isdigit(atype[0]))
  991. return atoi(atype);
  992. else
  993. return -1;
  994. }
  995. /*
  996. * return 0 if not a supported rr type
  997. */
  998. int
  999. rrsupported(int type)
  1000. {
  1001. if(type < 0 || type >Tall)
  1002. return 0;
  1003. return rrtname[type] != nil;
  1004. }
  1005. /*
  1006. * compare 2 types
  1007. */
  1008. int
  1009. tsame(int t1, int t2)
  1010. {
  1011. return t1 == t2 || t1 == Tall;
  1012. }
  1013. /*
  1014. * Add resource records to a list, duplicate them if they are cached
  1015. * RR's since these are shared. should be called with dnlock held
  1016. * to avoid racing down the start chain.
  1017. */
  1018. RR*
  1019. rrcat(RR **start, RR *rp)
  1020. {
  1021. RR *olp, *nlp;
  1022. RR **last;
  1023. if (canlock(&dnlock))
  1024. abort(); /* rrcat called with dnlock not held */
  1025. /* check for duplicates */
  1026. for (olp = *start; 0 && olp; olp = olp->next)
  1027. for (nlp = rp; nlp; nlp = nlp->next)
  1028. if (rrsame(nlp, olp))
  1029. dnslog("rrcat: duplicate RR: %R", nlp);
  1030. USED(olp);
  1031. last = start;
  1032. while(*last != nil)
  1033. last = &(*last)->next;
  1034. *last = rp;
  1035. return *start;
  1036. }
  1037. /*
  1038. * remove negative cache rr's from an rr list
  1039. */
  1040. RR*
  1041. rrremneg(RR **l)
  1042. {
  1043. RR **nl, *rp;
  1044. RR *first;
  1045. if (canlock(&dnlock))
  1046. abort(); /* rrremneg called with dnlock not held */
  1047. first = nil;
  1048. nl = &first;
  1049. while(*l != nil){
  1050. rp = *l;
  1051. if(rp->negative){
  1052. *l = rp->next;
  1053. *nl = rp;
  1054. nl = &rp->next;
  1055. *nl = nil;
  1056. } else
  1057. l = &rp->next;
  1058. }
  1059. return first;
  1060. }
  1061. /*
  1062. * remove rr's of a particular type from an rr list
  1063. */
  1064. RR*
  1065. rrremtype(RR **l, int type)
  1066. {
  1067. RR *first, *rp;
  1068. RR **nl;
  1069. first = nil;
  1070. nl = &first;
  1071. while(*l != nil){
  1072. rp = *l;
  1073. if(rp->type == type){
  1074. *l = rp->next;
  1075. *nl = rp;
  1076. nl = &rp->next;
  1077. *nl = nil;
  1078. } else
  1079. l = &(*l)->next;
  1080. }
  1081. return first;
  1082. }
  1083. static char *
  1084. dnname(DN *dn)
  1085. {
  1086. return dn? dn->name: "<null>";
  1087. }
  1088. /*
  1089. * print conversion for rr records
  1090. */
  1091. int
  1092. rrfmt(Fmt *f)
  1093. {
  1094. int rv;
  1095. char *strp;
  1096. char buf[Domlen];
  1097. Fmt fstr;
  1098. RR *rp;
  1099. Server *s;
  1100. SOA *soa;
  1101. Srv *srv;
  1102. Txt *t;
  1103. fmtstrinit(&fstr);
  1104. rp = va_arg(f->args, RR*);
  1105. if(rp == nil){
  1106. fmtprint(&fstr, "<null>");
  1107. goto out;
  1108. }
  1109. fmtprint(&fstr, "%s %s", dnname(rp->owner),
  1110. rrname(rp->type, buf, sizeof buf));
  1111. if(rp->negative){
  1112. fmtprint(&fstr, "\tnegative - rcode %d", rp->negrcode);
  1113. goto out;
  1114. }
  1115. switch(rp->type){
  1116. case Thinfo:
  1117. fmtprint(&fstr, "\t%s %s", dnname(rp->cpu), dnname(rp->os));
  1118. break;
  1119. case Tcname:
  1120. case Tmb:
  1121. case Tmd:
  1122. case Tmf:
  1123. case Tns:
  1124. fmtprint(&fstr, "\t%s", dnname(rp->host));
  1125. break;
  1126. case Tmg:
  1127. case Tmr:
  1128. fmtprint(&fstr, "\t%s", dnname(rp->mb));
  1129. break;
  1130. case Tminfo:
  1131. fmtprint(&fstr, "\t%s %s", dnname(rp->mb), dnname(rp->rmb));
  1132. break;
  1133. case Tmx:
  1134. fmtprint(&fstr, "\t%lu %s", rp->pref, dnname(rp->host));
  1135. break;
  1136. case Ta:
  1137. case Taaaa:
  1138. fmtprint(&fstr, "\t%s", dnname(rp->ip));
  1139. break;
  1140. case Tptr:
  1141. // fmtprint(&fstr, "\t%s(%lu)", dnname(rp->ptr),
  1142. // rp->ptr? rp->ptr->ordinal: "<null>");
  1143. fmtprint(&fstr, "\t%s", dnname(rp->ptr));
  1144. break;
  1145. case Tsoa:
  1146. soa = rp->soa;
  1147. fmtprint(&fstr, "\t%s %s %lu %lu %lu %lu %lu",
  1148. dnname(rp->host), dnname(rp->rmb),
  1149. (soa? soa->serial: 0),
  1150. (soa? soa->refresh: 0), (soa? soa->retry: 0),
  1151. (soa? soa->expire: 0), (soa? soa->minttl: 0));
  1152. if (soa)
  1153. for(s = soa->slaves; s != nil; s = s->next)
  1154. fmtprint(&fstr, " %s", s->name);
  1155. break;
  1156. case Tsrv:
  1157. srv = rp->srv;
  1158. fmtprint(&fstr, "\t%u %u %u %s",
  1159. (srv? srv->pri: 0), (srv? srv->weight: 0),
  1160. rp->port, dnname(rp->host));
  1161. break;
  1162. case Tnull:
  1163. if (rp->null == nil)
  1164. fmtprint(&fstr, "\t<null>");
  1165. else
  1166. fmtprint(&fstr, "\t%.*H", rp->null->Block.dlen,
  1167. rp->null->Block.data);
  1168. break;
  1169. case Ttxt:
  1170. fmtprint(&fstr, "\t");
  1171. for(t = rp->txt; t != nil; t = t->next)
  1172. fmtprint(&fstr, "%s", t->p);
  1173. break;
  1174. case Trp:
  1175. fmtprint(&fstr, "\t%s %s", dnname(rp->rmb), dnname(rp->rp));
  1176. break;
  1177. case Tkey:
  1178. if (rp->key == nil)
  1179. fmtprint(&fstr, "\t<null> <null> <null>");
  1180. else
  1181. fmtprint(&fstr, "\t%d %d %d", rp->key->flags,
  1182. rp->key->proto, rp->key->alg);
  1183. break;
  1184. case Tsig:
  1185. if (rp->sig == nil)
  1186. fmtprint(&fstr,
  1187. "\t<null> <null> <null> <null> <null> <null> <null> <null>");
  1188. else
  1189. fmtprint(&fstr, "\t%d %d %d %lu %lu %lu %d %s",
  1190. rp->sig->Cert.type, rp->sig->Cert.alg, rp->sig->labels,
  1191. rp->sig->ttl, rp->sig->exp, rp->sig->incep,
  1192. rp->sig->Cert.tag, dnname(rp->sig->signer));
  1193. break;
  1194. case Tcert:
  1195. if (rp->cert == nil)
  1196. fmtprint(&fstr, "\t<null> <null> <null>");
  1197. else
  1198. fmtprint(&fstr, "\t%d %d %d",
  1199. rp->cert->type, rp->cert->tag, rp->cert->alg);
  1200. break;
  1201. }
  1202. out:
  1203. strp = fmtstrflush(&fstr);
  1204. rv = fmtstrcpy(f, strp);
  1205. free(strp);
  1206. return rv;
  1207. }
  1208. /*
  1209. * print conversion for rr records in attribute value form
  1210. */
  1211. int
  1212. rravfmt(Fmt *f)
  1213. {
  1214. int rv, quote;
  1215. char *strp;
  1216. Fmt fstr;
  1217. RR *rp;
  1218. Server *s;
  1219. SOA *soa;
  1220. Srv *srv;
  1221. Txt *t;
  1222. fmtstrinit(&fstr);
  1223. rp = va_arg(f->args, RR*);
  1224. if(rp == nil){
  1225. fmtprint(&fstr, "<null>");
  1226. goto out;
  1227. }
  1228. if(rp->type == Tptr)
  1229. fmtprint(&fstr, "ptr=%s", dnname(rp->owner));
  1230. else
  1231. fmtprint(&fstr, "dom=%s", dnname(rp->owner));
  1232. switch(rp->type){
  1233. case Thinfo:
  1234. fmtprint(&fstr, " cpu=%s os=%s",
  1235. dnname(rp->cpu), dnname(rp->os));
  1236. break;
  1237. case Tcname:
  1238. fmtprint(&fstr, " cname=%s", dnname(rp->host));
  1239. break;
  1240. case Tmb:
  1241. case Tmd:
  1242. case Tmf:
  1243. fmtprint(&fstr, " mbox=%s", dnname(rp->host));
  1244. break;
  1245. case Tns:
  1246. fmtprint(&fstr, " ns=%s", dnname(rp->host));
  1247. break;
  1248. case Tmg:
  1249. case Tmr:
  1250. fmtprint(&fstr, " mbox=%s", dnname(rp->mb));
  1251. break;
  1252. case Tminfo:
  1253. fmtprint(&fstr, " mbox=%s mbox=%s",
  1254. dnname(rp->mb), dnname(rp->rmb));
  1255. break;
  1256. case Tmx:
  1257. fmtprint(&fstr, " pref=%lu mx=%s", rp->pref, dnname(rp->host));
  1258. break;
  1259. case Ta:
  1260. case Taaaa:
  1261. fmtprint(&fstr, " ip=%s", dnname(rp->ip));
  1262. break;
  1263. case Tptr:
  1264. fmtprint(&fstr, " dom=%s", dnname(rp->ptr));
  1265. break;
  1266. case Tsoa:
  1267. soa = rp->soa;
  1268. fmtprint(&fstr,
  1269. " ns=%s mbox=%s serial=%lu refresh=%lu retry=%lu expire=%lu ttl=%lu",
  1270. dnname(rp->host), dnname(rp->rmb),
  1271. (soa? soa->serial: 0),
  1272. (soa? soa->refresh: 0), (soa? soa->retry: 0),
  1273. (soa? soa->expire: 0), (soa? soa->minttl: 0));
  1274. for(s = soa->slaves; s != nil; s = s->next)
  1275. fmtprint(&fstr, " dnsslave=%s", s->name);
  1276. break;
  1277. case Tsrv:
  1278. srv = rp->srv;
  1279. fmtprint(&fstr, " pri=%u weight=%u port=%u target=%s",
  1280. (srv? srv->pri: 0), (srv? srv->weight: 0),
  1281. rp->port, dnname(rp->host));
  1282. break;
  1283. case Tnull:
  1284. if (rp->null == nil)
  1285. fmtprint(&fstr, " null=<null>");
  1286. else
  1287. fmtprint(&fstr, " null=%.*H", rp->null->Block.dlen,
  1288. rp->null->Block.data);
  1289. break;
  1290. case Ttxt:
  1291. fmtprint(&fstr, " txt=");
  1292. quote = 0;
  1293. for(t = rp->txt; t != nil; t = t->next)
  1294. if(strchr(t->p, ' '))
  1295. quote = 1;
  1296. if(quote)
  1297. fmtprint(&fstr, "\"");
  1298. for(t = rp->txt; t != nil; t = t->next)
  1299. fmtprint(&fstr, "%s", t->p);
  1300. if(quote)
  1301. fmtprint(&fstr, "\"");
  1302. break;
  1303. case Trp:
  1304. fmtprint(&fstr, " rp=%s txt=%s",
  1305. dnname(rp->rmb), dnname(rp->rp));
  1306. break;
  1307. case Tkey:
  1308. if (rp->key == nil)
  1309. fmtprint(&fstr, " flags=<null> proto=<null> alg=<null>");
  1310. else
  1311. fmtprint(&fstr, " flags=%d proto=%d alg=%d",
  1312. rp->key->flags, rp->key->proto, rp->key->alg);
  1313. break;
  1314. case Tsig:
  1315. if (rp->sig == nil)
  1316. fmtprint(&fstr,
  1317. " type=<null> alg=<null> labels=<null> ttl=<null> exp=<null> incep=<null> tag=<null> signer=<null>");
  1318. else
  1319. fmtprint(&fstr,
  1320. " type=%d alg=%d labels=%d ttl=%lu exp=%lu incep=%lu tag=%d signer=%s",
  1321. rp->sig->Cert.type, rp->sig->Cert.alg, rp->sig->labels,
  1322. rp->sig->ttl, rp->sig->exp, rp->sig->incep,
  1323. rp->sig->Cert.tag, dnname(rp->sig->signer));
  1324. break;
  1325. case Tcert:
  1326. if (rp->cert == nil)
  1327. fmtprint(&fstr, " type=<null> tag=<null> alg=<null>");
  1328. else
  1329. fmtprint(&fstr, " type=%d tag=%d alg=%d",
  1330. rp->cert->type, rp->cert->tag, rp->cert->alg);
  1331. break;
  1332. }
  1333. out:
  1334. strp = fmtstrflush(&fstr);
  1335. rv = fmtstrcpy(f, strp);
  1336. free(strp);
  1337. return rv;
  1338. }
  1339. void
  1340. warning(char *fmt, ...)
  1341. {
  1342. char dnserr[256];
  1343. va_list arg;
  1344. va_start(arg, fmt);
  1345. vseprint(dnserr, dnserr+sizeof(dnserr), fmt, arg);
  1346. va_end(arg);
  1347. syslog(1, logfile, dnserr); /* on console too */
  1348. }
  1349. void
  1350. dnslog(char *fmt, ...)
  1351. {
  1352. char dnserr[256];
  1353. va_list arg;
  1354. va_start(arg, fmt);
  1355. vseprint(dnserr, dnserr+sizeof(dnserr), fmt, arg);
  1356. va_end(arg);
  1357. syslog(0, logfile, dnserr);
  1358. }
  1359. /*
  1360. * based on libthread's threadsetname, but drags in less library code.
  1361. * actually just sets the arguments displayed.
  1362. */
  1363. void
  1364. procsetname(char *fmt, ...)
  1365. {
  1366. int fd;
  1367. char *cmdname;
  1368. char buf[128];
  1369. va_list arg;
  1370. va_start(arg, fmt);
  1371. cmdname = vsmprint(fmt, arg);
  1372. va_end(arg);
  1373. if (cmdname == nil)
  1374. return;
  1375. snprint(buf, sizeof buf, "#p/%d/args", getpid());
  1376. if((fd = open(buf, OWRITE)) >= 0){
  1377. write(fd, cmdname, strlen(cmdname)+1);
  1378. close(fd);
  1379. }
  1380. free(cmdname);
  1381. }
  1382. /*
  1383. * create a slave process to handle a request to avoid one request blocking
  1384. * another
  1385. */
  1386. void
  1387. slave(Request *req)
  1388. {
  1389. int ppid, procs;
  1390. if(req->isslave)
  1391. return; /* we're already a slave process */
  1392. /*
  1393. * These calls to putactivity cannot block.
  1394. * After getactivity(), the current process is counted
  1395. * twice in dnvars.active (one will pass to the child).
  1396. * If putactivity tries to wait for dnvars.active == 0,
  1397. * it will never happen.
  1398. */
  1399. /* limit parallelism */
  1400. procs = getactivity(req, 1);
  1401. if (procs > stats.slavehiwat)
  1402. stats.slavehiwat = procs;
  1403. if(procs > Maxactive){
  1404. if(traceactivity)
  1405. dnslog("[%d] too much activity", getpid());
  1406. putactivity(1);
  1407. return;
  1408. }
  1409. /*
  1410. * parent returns to main loop, child does the work.
  1411. * don't change note group.
  1412. */
  1413. ppid = getpid();
  1414. switch(rfork(RFPROC|RFMEM|RFNOWAIT)){
  1415. case -1:
  1416. putactivity(1);
  1417. break;
  1418. case 0:
  1419. procsetname("request slave of pid %d", ppid);
  1420. if(traceactivity)
  1421. dnslog("[%d] take activity from %d", getpid(), ppid);
  1422. req->isslave = 1; /* why not `= getpid()'? */
  1423. break;
  1424. default:
  1425. /*
  1426. * this relies on rfork producing separate, initially-identical
  1427. * stacks, thus giving us two copies of `req', one in each
  1428. * process.
  1429. */
  1430. alarm(0);
  1431. longjmp(req->mret, 1);
  1432. }
  1433. }
  1434. /*
  1435. * chasing down double free's
  1436. */
  1437. void
  1438. dncheck(void *p, int dolock)
  1439. {
  1440. int i;
  1441. DN *dp;
  1442. RR *rp;
  1443. if(p != nil){
  1444. dp = p;
  1445. assert(dp->magic == DNmagic);
  1446. }
  1447. if(!testing)
  1448. return;
  1449. if(dolock)
  1450. lock(&dnlock);
  1451. poolcheck(mainmem);
  1452. for(i = 0; i < HTLEN; i++)
  1453. for(dp = ht[i]; dp; dp = dp->next){
  1454. assert(dp != p);
  1455. assert(dp->magic == DNmagic);
  1456. for(rp = dp->rr; rp; rp = rp->next){
  1457. assert(rp->magic == RRmagic);
  1458. assert(rp->cached);
  1459. assert(rp->owner == dp);
  1460. /* also check for duplicate rrs */
  1461. if (dolock && rronlist(rp, rp->next)) {
  1462. dnslog("%R duplicates its next chain "
  1463. "(%R); aborting", rp, rp->next);
  1464. abort();
  1465. }
  1466. }
  1467. }
  1468. if(dolock)
  1469. unlock(&dnlock);
  1470. }
  1471. static int
  1472. rrequiv(RR *r1, RR *r2)
  1473. {
  1474. return r1->owner == r2->owner
  1475. && r1->type == r2->type
  1476. && r1->arg0 == r2->arg0
  1477. && r1->arg1 == r2->arg1;
  1478. }
  1479. /* called with dnlock held */
  1480. void
  1481. unique(RR *rp)
  1482. {
  1483. RR **l, *nrp;
  1484. for(; rp; rp = rp->next){
  1485. l = &rp->next;
  1486. for(nrp = *l; nrp; nrp = *l)
  1487. if(rrequiv(rp, nrp)){
  1488. *l = nrp->next;
  1489. rrfree(nrp);
  1490. } else
  1491. l = &nrp->next;
  1492. }
  1493. }
  1494. /*
  1495. * true if second domain is subsumed by the first
  1496. */
  1497. int
  1498. subsume(char *higher, char *lower)
  1499. {
  1500. int hn, ln;
  1501. ln = strlen(lower);
  1502. hn = strlen(higher);
  1503. if (ln < hn || cistrcmp(lower + ln - hn, higher) != 0 ||
  1504. (ln > hn && hn != 0 && lower[ln - hn - 1] != '.'))
  1505. return 0;
  1506. return 1;
  1507. }
  1508. /*
  1509. * randomize the order we return items to provide some
  1510. * load balancing for servers.
  1511. *
  1512. * only randomize the first class of entries
  1513. */
  1514. RR*
  1515. randomize(RR *rp)
  1516. {
  1517. RR *first, *last, *x, *base;
  1518. uint32_t n;
  1519. if(rp == nil || rp->next == nil)
  1520. return rp;
  1521. /* just randomize addresses, mx's and ns's */
  1522. for(x = rp; x; x = x->next)
  1523. if(x->type != Ta && x->type != Taaaa &&
  1524. x->type != Tmx && x->type != Tns)
  1525. return rp;
  1526. base = rp;
  1527. n = rand();
  1528. last = first = nil;
  1529. while(rp != nil){
  1530. /* stop randomizing if we've moved past our class */
  1531. if(base->auth != rp->auth || base->db != rp->db){
  1532. last->next = rp;
  1533. break;
  1534. }
  1535. /* unchain */
  1536. x = rp;
  1537. rp = x->next;
  1538. x->next = nil;
  1539. if(n&1){
  1540. /* add to tail */
  1541. if(last == nil)
  1542. first = x;
  1543. else
  1544. last->next = x;
  1545. last = x;
  1546. } else {
  1547. /* add to head */
  1548. if(last == nil)
  1549. last = x;
  1550. x->next = first;
  1551. first = x;
  1552. }
  1553. /* reroll the dice */
  1554. n >>= 1;
  1555. }
  1556. return first;
  1557. }
  1558. static int
  1559. sencodefmt(Fmt *f)
  1560. {
  1561. int i, len, ilen, rv;
  1562. char *out, *buf;
  1563. uint8_t *b;
  1564. char obuf[64]; /* rsc optimization */
  1565. if(!(f->flags&FmtPrec) || f->prec < 1)
  1566. goto error;
  1567. b = va_arg(f->args, uint8_t*);
  1568. if(b == nil)
  1569. goto error;
  1570. /* if it's a printable, go for it */
  1571. len = f->prec;
  1572. for(i = 0; i < len; i++)
  1573. if(!isprint(b[i]))
  1574. break;
  1575. if(i == len){
  1576. if(len >= sizeof obuf)
  1577. len = sizeof(obuf)-1;
  1578. memmove(obuf, b, len);
  1579. obuf[len] = 0;
  1580. fmtstrcpy(f, obuf);
  1581. return 0;
  1582. }
  1583. ilen = f->prec;
  1584. f->prec = 0;
  1585. f->flags &= ~FmtPrec;
  1586. switch(f->r){
  1587. case '<':
  1588. len = (8*ilen+4)/5 + 3;
  1589. break;
  1590. case '[':
  1591. len = (8*ilen+5)/6 + 4;
  1592. break;
  1593. case 'H':
  1594. len = 2*ilen + 1;
  1595. break;
  1596. default:
  1597. goto error;
  1598. }
  1599. if(len > sizeof(obuf)){
  1600. buf = malloc(len);
  1601. if(buf == nil)
  1602. goto error;
  1603. } else
  1604. buf = obuf;
  1605. /* convert */
  1606. out = buf;
  1607. switch(f->r){
  1608. case '<':
  1609. rv = enc32(out, len, b, ilen);
  1610. break;
  1611. case '[':
  1612. rv = enc64(out, len, b, ilen);
  1613. break;
  1614. case 'H':
  1615. rv = enc16(out, len, b, ilen);
  1616. break;
  1617. default:
  1618. rv = -1;
  1619. break;
  1620. }
  1621. if(rv < 0)
  1622. goto error;
  1623. fmtstrcpy(f, buf);
  1624. if(buf != obuf)
  1625. free(buf);
  1626. return 0;
  1627. error:
  1628. return fmtstrcpy(f, "<encodefmt>");
  1629. }
  1630. void*
  1631. emalloc(int size)
  1632. {
  1633. char *x;
  1634. x = mallocz(size, 1);
  1635. if(x == nil)
  1636. abort();
  1637. setmalloctag(x, getcallerpc());
  1638. return x;
  1639. }
  1640. char*
  1641. estrdup(char *s)
  1642. {
  1643. int size;
  1644. char *p;
  1645. size = strlen(s)+1;
  1646. p = mallocz(size, 0);
  1647. if(p == nil)
  1648. abort();
  1649. memmove(p, s, size);
  1650. setmalloctag(p, getcallerpc());
  1651. return p;
  1652. }
  1653. /*
  1654. * create a pointer record
  1655. */
  1656. static RR*
  1657. mkptr(DN *dp, char *ptr, uint32_t ttl)
  1658. {
  1659. DN *ipdp;
  1660. RR *rp;
  1661. ipdp = dnlookup(ptr, Cin, 1);
  1662. rp = rralloc(Tptr);
  1663. rp->ptr = dp;
  1664. rp->owner = ipdp;
  1665. rp->db = 1;
  1666. if(ttl)
  1667. rp->ttl = ttl;
  1668. return rp;
  1669. }
  1670. void bytes2nibbles(uint8_t *nibbles, uint8_t *bytes, int nbytes);
  1671. /*
  1672. * look for all ip addresses in this network and make
  1673. * pointer records for them.
  1674. */
  1675. void
  1676. dnptr(uint8_t *net, uint8_t *mask, char *dom, int forwtype, int subdoms,
  1677. int ttl)
  1678. {
  1679. int i, j, len;
  1680. char *p, *e;
  1681. char ptr[Domlen];
  1682. uint8_t *ipp;
  1683. uint8_t ip[IPaddrlen], nnet[IPaddrlen];
  1684. uint8_t nibip[IPaddrlen*2];
  1685. DN *dp;
  1686. RR *rp, *nrp, *first, **l;
  1687. l = &first;
  1688. first = nil;
  1689. for(i = 0; i < HTLEN; i++)
  1690. for(dp = ht[i]; dp; dp = dp->next)
  1691. for(rp = dp->rr; rp; rp = rp->next){
  1692. if(rp->type != forwtype || rp->negative)
  1693. continue;
  1694. parseip(ip, rp->ip->name);
  1695. maskip(ip, mask, nnet);
  1696. if(ipcmp(net, nnet) != 0)
  1697. continue;
  1698. ipp = ip;
  1699. len = IPaddrlen;
  1700. if (forwtype == Taaaa) {
  1701. bytes2nibbles(nibip, ip, IPaddrlen);
  1702. ipp = nibip;
  1703. len = 2*IPaddrlen;
  1704. }
  1705. p = ptr;
  1706. e = ptr+sizeof(ptr);
  1707. for(j = len - 1; j >= len - subdoms; j--)
  1708. p = seprint(p, e, (forwtype == Ta?
  1709. "%d.": "%x."), ipp[j]);
  1710. seprint(p, e, "%s", dom);
  1711. nrp = mkptr(dp, ptr, ttl);
  1712. *l = nrp;
  1713. l = &nrp->next;
  1714. }
  1715. for(rp = first; rp != nil; rp = nrp){
  1716. nrp = rp->next;
  1717. rp->next = nil;
  1718. rrattach(rp, Authoritative);
  1719. }
  1720. }
  1721. void
  1722. addserver(Server **l, char *name)
  1723. {
  1724. Server *s;
  1725. while(*l)
  1726. l = &(*l)->next;
  1727. s = malloc(sizeof(Server)+strlen(name)+1);
  1728. if(s == nil)
  1729. return;
  1730. s->name = (char*)(s+1);
  1731. strcpy(s->name, name);
  1732. s->next = nil;
  1733. *l = s;
  1734. }
  1735. Server*
  1736. copyserverlist(Server *s)
  1737. {
  1738. Server *ns;
  1739. for(ns = nil; s != nil; s = s->next)
  1740. addserver(&ns, s->name);
  1741. return ns;
  1742. }
  1743. /* from here down is copied to ip/snoopy/dns.c periodically to update it */
  1744. /*
  1745. * convert an integer RR type to it's ascii name
  1746. */
  1747. char*
  1748. rrname(int type, char *buf, int len)
  1749. {
  1750. char *t;
  1751. t = nil;
  1752. if(type >= 0 && type <= Tall)
  1753. t = rrtname[type];
  1754. if(t==nil){
  1755. snprint(buf, len, "%d", type);
  1756. t = buf;
  1757. }
  1758. return t;
  1759. }
  1760. /*
  1761. * free a list of resource records and any related structs
  1762. */
  1763. void
  1764. rrfreelist(RR *rp)
  1765. {
  1766. RR *next;
  1767. for(; rp; rp = next){
  1768. next = rp->next;
  1769. rrfree(rp);
  1770. }
  1771. }
  1772. void
  1773. freeserverlist(Server *s)
  1774. {
  1775. Server *next;
  1776. for(; s != nil; s = next){
  1777. next = s->next;
  1778. free(s);
  1779. }
  1780. }
  1781. /*
  1782. * allocate a resource record of a given type
  1783. */
  1784. RR*
  1785. rralloc(int type)
  1786. {
  1787. RR *rp;
  1788. rp = emalloc(sizeof(*rp));
  1789. rp->magic = RRmagic;
  1790. rp->pc = getcallerpc();
  1791. rp->type = type;
  1792. if (rp->type != type)
  1793. dnslog("rralloc: bogus type %d", type);
  1794. setmalloctag(rp, rp->pc);
  1795. switch(type){
  1796. case Tsoa:
  1797. rp->soa = emalloc(sizeof(*rp->soa));
  1798. rp->soa->slaves = nil;
  1799. setmalloctag(rp->soa, rp->pc);
  1800. break;
  1801. case Tsrv:
  1802. rp->srv = emalloc(sizeof(*rp->srv));
  1803. setmalloctag(rp->srv, rp->pc);
  1804. break;
  1805. case Tkey:
  1806. rp->key = emalloc(sizeof(*rp->key));
  1807. setmalloctag(rp->key, rp->pc);
  1808. break;
  1809. case Tcert:
  1810. rp->cert = emalloc(sizeof(*rp->cert));
  1811. setmalloctag(rp->cert, rp->pc);
  1812. break;
  1813. case Tsig:
  1814. rp->sig = emalloc(sizeof(*rp->sig));
  1815. setmalloctag(rp->sig, rp->pc);
  1816. break;
  1817. case Tnull:
  1818. rp->null = emalloc(sizeof(*rp->null));
  1819. setmalloctag(rp->null, rp->pc);
  1820. break;
  1821. }
  1822. rp->ttl = 0;
  1823. rp->expire = 0;
  1824. rp->next = 0;
  1825. return rp;
  1826. }
  1827. /*
  1828. * free a resource record and any related structs
  1829. */
  1830. void
  1831. rrfree(RR *rp)
  1832. {
  1833. DN *dp;
  1834. RR *nrp;
  1835. Txt *t;
  1836. assert(rp->magic == RRmagic);
  1837. assert(!rp->cached);
  1838. /* our callers often hold dnlock. it's needed to examine dp safely. */
  1839. dp = rp->owner;
  1840. if(dp){
  1841. /* if someone else holds dnlock, skip the sanity check. */
  1842. if (canlock(&dnlock)) {
  1843. assert(dp->magic == DNmagic);
  1844. for(nrp = dp->rr; nrp; nrp = nrp->next)
  1845. assert(nrp != rp); /* "rrfree of live rr" */
  1846. unlock(&dnlock);
  1847. }
  1848. }
  1849. switch(rp->type){
  1850. case Tsoa:
  1851. freeserverlist(rp->soa->slaves);
  1852. memset(rp->soa, 0, sizeof *rp->soa); /* cause trouble */
  1853. free(rp->soa);
  1854. break;
  1855. case Tsrv:
  1856. memset(rp->srv, 0, sizeof *rp->srv); /* cause trouble */
  1857. free(rp->srv);
  1858. break;
  1859. case Tkey:
  1860. free(rp->key->Block.data);
  1861. memset(rp->key, 0, sizeof *rp->key); /* cause trouble */
  1862. free(rp->key);
  1863. break;
  1864. case Tcert:
  1865. free(rp->cert->Block.data);
  1866. memset(rp->cert, 0, sizeof *rp->cert); /* cause trouble */
  1867. free(rp->cert);
  1868. break;
  1869. case Tsig:
  1870. free(rp->sig->Cert.Block.data);
  1871. memset(rp->sig, 0, sizeof *rp->sig); /* cause trouble */
  1872. free(rp->sig);
  1873. break;
  1874. case Tnull:
  1875. free(rp->null->Block.data);
  1876. memset(rp->null, 0, sizeof *rp->null); /* cause trouble */
  1877. free(rp->null);
  1878. break;
  1879. case Ttxt:
  1880. while(rp->txt != nil){
  1881. t = rp->txt;
  1882. rp->txt = t->next;
  1883. free(t->p);
  1884. memset(t, 0, sizeof *t); /* cause trouble */
  1885. free(t);
  1886. }
  1887. break;
  1888. }
  1889. rp->magic = ~rp->magic;
  1890. memset(rp, 0, sizeof *rp); /* cause trouble */
  1891. free(rp);
  1892. }