dn.c 40 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094
  1. /*
  2. * This file is part of the UCB release of Plan 9. It is subject to the license
  3. * terms in the LICENSE file found in the top-level directory of this
  4. * distribution and at http://akaros.cs.berkeley.edu/files/Plan9License. No
  5. * part of the UCB release of Plan 9, including this file, may be copied,
  6. * modified, propagated, or distributed except according to the terms contained
  7. * in the LICENSE file.
  8. */
  9. #include <u.h>
  10. #include <libc.h>
  11. #include <ip.h>
  12. #include <pool.h>
  13. #include <ctype.h>
  14. #include "dns.h"
  15. /*
  16. * this comment used to say `our target is 4000 names cached, this should
  17. * be larger on large servers'. dns at Bell Labs starts off with
  18. * about 1780 names.
  19. *
  20. * aging corrupts the cache, so raise the trigger to avoid it.
  21. */
  22. enum {
  23. Deftarget = 1<<30, /* effectively disable aging */
  24. Minage = 1<<30,
  25. Defagefreq = 1<<30, /* age names this often (seconds) */
  26. /* these settings will trigger frequent aging */
  27. // Deftarget = 4000,
  28. // Minage = 5*60,
  29. // Defagefreq = 15*60, /* age names this often (seconds) */
  30. Restartmins = 0,
  31. // Restartmins = 600,
  32. };
  33. /*
  34. * Hash table for domain names. The hash is based only on the
  35. * first element of the domain name.
  36. */
  37. DN *ht[HTLEN];
  38. static struct {
  39. Lock;
  40. uint32_t names; /* names allocated */
  41. uint32_t oldest; /* longest we'll leave a name around */
  42. int active;
  43. int mutex;
  44. uint16_t id; /* same size as in packet */
  45. } dnvars;
  46. /* names of RR types */
  47. char *rrtname[] =
  48. {
  49. [Ta] "ip",
  50. [Tns] "ns",
  51. [Tmd] "md",
  52. [Tmf] "mf",
  53. [Tcname] "cname",
  54. [Tsoa] "soa",
  55. [Tmb] "mb",
  56. [Tmg] "mg",
  57. [Tmr] "mr",
  58. [Tnull] "null",
  59. [Twks] "wks",
  60. [Tptr] "ptr",
  61. [Thinfo] "hinfo",
  62. [Tminfo] "minfo",
  63. [Tmx] "mx",
  64. [Ttxt] "txt",
  65. [Trp] "rp",
  66. [Tafsdb] "afsdb",
  67. [Tx25] "x.25",
  68. [Tisdn] "isdn",
  69. [Trt] "rt",
  70. [Tnsap] "nsap",
  71. [Tnsapptr] "nsap-ptr",
  72. [Tsig] "sig",
  73. [Tkey] "key",
  74. [Tpx] "px",
  75. [Tgpos] "gpos",
  76. [Taaaa] "ipv6",
  77. [Tloc] "loc",
  78. [Tnxt] "nxt",
  79. [Teid] "eid",
  80. [Tnimloc] "nimrod",
  81. [Tsrv] "srv",
  82. [Tatma] "atma",
  83. [Tnaptr] "naptr",
  84. [Tkx] "kx",
  85. [Tcert] "cert",
  86. [Ta6] "a6",
  87. [Tdname] "dname",
  88. [Tsink] "sink",
  89. [Topt] "opt",
  90. [Tapl] "apl",
  91. [Tds] "ds",
  92. [Tsshfp] "sshfp",
  93. [Tipseckey] "ipseckey",
  94. [Trrsig] "rrsig",
  95. [Tnsec] "nsec",
  96. [Tdnskey] "dnskey",
  97. [Tspf] "spf",
  98. [Tuinfo] "uinfo",
  99. [Tuid] "uid",
  100. [Tgid] "gid",
  101. [Tunspec] "unspec",
  102. [Ttkey] "tkey",
  103. [Ttsig] "tsig",
  104. [Tixfr] "ixfr",
  105. [Taxfr] "axfr",
  106. [Tmailb] "mailb",
  107. [Tmaila] "maila",
  108. [Tall] "all",
  109. 0,
  110. };
  111. /* names of response codes */
  112. char *rname[Rmask+1] =
  113. {
  114. [Rok] "ok",
  115. [Rformat] "format error",
  116. [Rserver] "server failure",
  117. [Rname] "bad name",
  118. [Runimplimented] "unimplemented",
  119. [Rrefused] "we don't like you",
  120. [Ryxdomain] "name should not exist",
  121. [Ryxrrset] "rr set should not exist",
  122. [Rnxrrset] "rr set should exist",
  123. [Rnotauth] "not authorative",
  124. [Rnotzone] "not in zone",
  125. [Rbadvers] "bad opt version",
  126. /* [Rbadsig] "bad signature", */
  127. [Rbadkey] "bad key",
  128. [Rbadtime] "bad signature time",
  129. [Rbadmode] "bad mode",
  130. [Rbadname] "duplicate key name",
  131. [Rbadalg] "bad algorithm",
  132. };
  133. unsigned nrname = nelem(rname);
  134. /* names of op codes */
  135. char *opname[] =
  136. {
  137. [Oquery] "query",
  138. [Oinverse] "inverse query (retired)",
  139. [Ostatus] "status",
  140. [Oupdate] "update",
  141. };
  142. uint32_t target = Deftarget;
  143. uint32_t start;
  144. Lock dnlock;
  145. static uint32_t agefreq = Defagefreq;
  146. static int rrequiv(RR *r1, RR *r2);
  147. static int sencodefmt(Fmt*);
  148. static void
  149. ding(void *v, char *msg)
  150. {
  151. if(strstr(msg, "alarm") != nil) {
  152. stats.alarms++;
  153. noted(NCONT); /* resume with system call error */
  154. } else
  155. noted(NDFLT); /* die */
  156. }
  157. void
  158. dninit(void)
  159. {
  160. fmtinstall('E', eipfmt);
  161. fmtinstall('I', eipfmt);
  162. fmtinstall('V', eipfmt);
  163. fmtinstall('R', rrfmt);
  164. fmtinstall('Q', rravfmt);
  165. fmtinstall('H', sencodefmt);
  166. dnvars.oldest = maxage;
  167. dnvars.names = 0;
  168. dnvars.id = truerand(); /* don't start with same id every time */
  169. notify(ding);
  170. }
  171. /*
  172. * hash for a domain name
  173. */
  174. static uint32_t
  175. dnhash(char *name)
  176. {
  177. uint32_t hash;
  178. uint8_t *val = (uint8_t*)name;
  179. for(hash = 0; *val; val++)
  180. hash = hash*13 + tolower(*val)-'a';
  181. return hash % HTLEN;
  182. }
  183. /*
  184. * lookup a symbol. if enter is not zero and the name is
  185. * not found, create it.
  186. */
  187. DN*
  188. dnlookup(char *name, int class, int enter)
  189. {
  190. DN **l;
  191. DN *dp;
  192. l = &ht[dnhash(name)];
  193. lock(&dnlock);
  194. for(dp = *l; dp; dp = dp->next) {
  195. assert(dp->magic == DNmagic);
  196. if(dp->class == class && cistrcmp(dp->name, name) == 0){
  197. dp->referenced = now;
  198. unlock(&dnlock);
  199. return dp;
  200. }
  201. l = &dp->next;
  202. }
  203. if(!enter){
  204. unlock(&dnlock);
  205. return 0;
  206. }
  207. dnvars.names++;
  208. dp = emalloc(sizeof(*dp));
  209. dp->magic = DNmagic;
  210. dp->name = estrdup(name);
  211. assert(dp->name != nil);
  212. dp->class = class;
  213. dp->rr = 0;
  214. dp->referenced = now;
  215. /* add new DN to tail of the hash list. *l points to last next ptr. */
  216. dp->next = nil;
  217. *l = dp;
  218. unlock(&dnlock);
  219. return dp;
  220. }
  221. static int
  222. rrsame(RR *rr1, RR *rr2)
  223. {
  224. return rr1 == rr2 || rr2 && rrequiv(rr1, rr2) &&
  225. rr1->db == rr2->db && rr1->auth == rr2->auth;
  226. }
  227. static int
  228. rronlist(RR *rp, RR *lp)
  229. {
  230. for(; lp; lp = lp->next)
  231. if (rrsame(lp, rp))
  232. return 1;
  233. return 0;
  234. }
  235. /*
  236. * dump the stats
  237. */
  238. void
  239. dnstats(char *file)
  240. {
  241. int i, fd;
  242. fd = create(file, OWRITE, 0666);
  243. if(fd < 0)
  244. return;
  245. qlock(&stats);
  246. fprint(fd, "# system %s\n", sysname());
  247. fprint(fd, "# slave procs high-water mark\t%lud\n", stats.slavehiwat);
  248. fprint(fd, "# queries received by 9p\t%lud\n", stats.qrecvd9p);
  249. fprint(fd, "# queries received by udp\t%lud\n", stats.qrecvdudp);
  250. fprint(fd, "# queries answered from memory\t%lud\n", stats.answinmem);
  251. fprint(fd, "# queries sent by udp\t%lud\n", stats.qsent);
  252. for (i = 0; i < nelem(stats.under10ths); i++)
  253. if (stats.under10ths[i] || i == nelem(stats.under10ths) - 1)
  254. fprint(fd, "# responses arriving within %.1f s.\t%lud\n",
  255. (double)(i+1)/10, stats.under10ths[i]);
  256. fprint(fd, "\n# queries sent & timed-out\t%lud\n", stats.tmout);
  257. fprint(fd, "# cname queries timed-out\t%lud\n", stats.tmoutcname);
  258. fprint(fd, "# ipv6 queries timed-out\t%lud\n", stats.tmoutv6);
  259. fprint(fd, "\n# negative answers received\t%lud\n", stats.negans);
  260. fprint(fd, "# negative answers w Rserver set\t%lud\n", stats.negserver);
  261. fprint(fd, "# negative answers w bad delegation\t%lud\n",
  262. stats.negbaddeleg);
  263. fprint(fd, "# negative answers w bad delegation & no answers\t%lud\n",
  264. stats.negbdnoans);
  265. fprint(fd, "# negative answers w no Rname set\t%lud\n", stats.negnorname);
  266. fprint(fd, "# negative answers cached\t%lud\n", stats.negcached);
  267. qunlock(&stats);
  268. lock(&dnlock);
  269. fprint(fd, "\n# domain names %lud target %lud\n", dnvars.names, target);
  270. unlock(&dnlock);
  271. close(fd);
  272. }
  273. /*
  274. * dump the cache
  275. */
  276. void
  277. dndump(char *file)
  278. {
  279. int i, fd;
  280. DN *dp;
  281. RR *rp;
  282. fd = create(file, OWRITE, 0666);
  283. if(fd < 0)
  284. return;
  285. lock(&dnlock);
  286. for(i = 0; i < HTLEN; i++)
  287. for(dp = ht[i]; dp; dp = dp->next){
  288. fprint(fd, "%s\n", dp->name);
  289. for(rp = dp->rr; rp; rp = rp->next) {
  290. fprint(fd, "\t%R %c%c %lud/%lud\n",
  291. rp, rp->auth? 'A': 'U',
  292. rp->db? 'D': 'N', rp->expire, rp->ttl);
  293. if (rronlist(rp, rp->next))
  294. fprint(fd, "*** duplicate:\n");
  295. }
  296. }
  297. unlock(&dnlock);
  298. close(fd);
  299. }
  300. /*
  301. * purge all records
  302. */
  303. void
  304. dnpurge(void)
  305. {
  306. DN *dp;
  307. RR *rp, *srp;
  308. int i;
  309. lock(&dnlock);
  310. for(i = 0; i < HTLEN; i++)
  311. for(dp = ht[i]; dp; dp = dp->next){
  312. srp = rp = dp->rr;
  313. dp->rr = nil;
  314. for(; rp != nil; rp = rp->next)
  315. rp->cached = 0;
  316. rrfreelist(srp);
  317. }
  318. unlock(&dnlock);
  319. }
  320. /*
  321. * delete head of *l and free the old head.
  322. * call with dnlock held.
  323. */
  324. static void
  325. rrdelhead(RR **l)
  326. {
  327. RR *rp;
  328. if (canlock(&dnlock))
  329. abort(); /* rrdelhead called with dnlock not held */
  330. rp = *l;
  331. if(rp == nil)
  332. return;
  333. *l = rp->next; /* unlink head */
  334. rp->cached = 0; /* avoid blowing an assertion in rrfree */
  335. rrfree(rp);
  336. }
  337. /*
  338. * check the age of resource records, free any that have timed out.
  339. * call with dnlock held.
  340. */
  341. void
  342. dnage(DN *dp)
  343. {
  344. RR **l;
  345. RR *rp, *next;
  346. uint32_t diff;
  347. if (canlock(&dnlock))
  348. abort(); /* dnage called with dnlock not held */
  349. diff = now - dp->referenced;
  350. if(diff < Reserved || dp->keep)
  351. return;
  352. l = &dp->rr;
  353. for(rp = dp->rr; rp; rp = next){
  354. assert(rp->magic == RRmagic);
  355. assert(rp->cached);
  356. next = rp->next;
  357. if(!rp->db && (rp->expire < now || diff > dnvars.oldest))
  358. rrdelhead(l); /* rp == *l before; *l == rp->next after */
  359. else
  360. l = &rp->next;
  361. }
  362. }
  363. #define MARK(dp) { if (dp) (dp)->keep = 1; }
  364. /* mark a domain name and those in its RRs as never to be aged */
  365. void
  366. dnagenever(DN *dp, int dolock)
  367. {
  368. RR *rp;
  369. if (dolock)
  370. lock(&dnlock);
  371. /* mark all referenced domain names */
  372. MARK(dp);
  373. for(rp = dp->rr; rp; rp = rp->next){
  374. MARK(rp->owner);
  375. if(rp->negative){
  376. MARK(rp->negsoaowner);
  377. continue;
  378. }
  379. switch(rp->type){
  380. case Thinfo:
  381. MARK(rp->cpu);
  382. MARK(rp->os);
  383. break;
  384. case Ttxt:
  385. break;
  386. case Tcname:
  387. case Tmb:
  388. case Tmd:
  389. case Tmf:
  390. case Tns:
  391. case Tmx:
  392. case Tsrv:
  393. MARK(rp->host);
  394. break;
  395. case Tmg:
  396. case Tmr:
  397. MARK(rp->mb);
  398. break;
  399. case Tminfo:
  400. MARK(rp->rmb);
  401. MARK(rp->mb);
  402. break;
  403. case Trp:
  404. MARK(rp->rmb);
  405. MARK(rp->rp);
  406. break;
  407. case Ta:
  408. case Taaaa:
  409. MARK(rp->ip);
  410. break;
  411. case Tptr:
  412. MARK(rp->ptr);
  413. break;
  414. case Tsoa:
  415. MARK(rp->host);
  416. MARK(rp->rmb);
  417. break;
  418. }
  419. }
  420. if (dolock)
  421. unlock(&dnlock);
  422. }
  423. /* mark all current domain names as never to be aged */
  424. void
  425. dnageallnever(void)
  426. {
  427. int i;
  428. DN *dp;
  429. lock(&dnlock);
  430. /* mark all referenced domain names */
  431. for(i = 0; i < HTLEN; i++)
  432. for(dp = ht[i]; dp; dp = dp->next)
  433. dnagenever(dp, 0);
  434. unlock(&dnlock);
  435. dnslog("%ld initial domain names; target is %ld", dnvars.names, target);
  436. if(dnvars.names >= target)
  437. dnslog("more initial domain names (%ld) than target (%ld)",
  438. dnvars.names, target);
  439. }
  440. #define REF(dp) { if (dp) (dp)->refs++; }
  441. /*
  442. * periodicly sweep for old records and remove unreferenced domain names
  443. *
  444. * only called when all other threads are locked out
  445. */
  446. void
  447. dnageall(int doit)
  448. {
  449. DN *dp, **l;
  450. int i;
  451. RR *rp;
  452. static uint32_t nextage;
  453. if(dnvars.names < target || (now < nextage && !doit)){
  454. dnvars.oldest = maxage;
  455. return;
  456. }
  457. if(dnvars.names >= target) {
  458. dnslog("more names (%lud) than target (%lud)", dnvars.names,
  459. target);
  460. dnvars.oldest /= 2;
  461. if (dnvars.oldest < Minage)
  462. dnvars.oldest = Minage; /* don't be silly */
  463. }
  464. if (agefreq > dnvars.oldest / 2)
  465. nextage = now + dnvars.oldest / 2;
  466. else
  467. nextage = now + agefreq;
  468. lock(&dnlock);
  469. /* time out all old entries (and set refs to 0) */
  470. for(i = 0; i < HTLEN; i++)
  471. for(dp = ht[i]; dp; dp = dp->next){
  472. dp->refs = 0;
  473. dnage(dp);
  474. }
  475. /* mark all referenced domain names */
  476. for(i = 0; i < HTLEN; i++)
  477. for(dp = ht[i]; dp; dp = dp->next)
  478. for(rp = dp->rr; rp; rp = rp->next){
  479. REF(rp->owner);
  480. if(rp->negative){
  481. REF(rp->negsoaowner);
  482. continue;
  483. }
  484. switch(rp->type){
  485. case Thinfo:
  486. REF(rp->cpu);
  487. REF(rp->os);
  488. break;
  489. case Ttxt:
  490. break;
  491. case Tcname:
  492. case Tmb:
  493. case Tmd:
  494. case Tmf:
  495. case Tns:
  496. case Tmx:
  497. case Tsrv:
  498. REF(rp->host);
  499. break;
  500. case Tmg:
  501. case Tmr:
  502. REF(rp->mb);
  503. break;
  504. case Tminfo:
  505. REF(rp->rmb);
  506. REF(rp->mb);
  507. break;
  508. case Trp:
  509. REF(rp->rmb);
  510. REF(rp->rp);
  511. break;
  512. case Ta:
  513. case Taaaa:
  514. REF(rp->ip);
  515. break;
  516. case Tptr:
  517. REF(rp->ptr);
  518. break;
  519. case Tsoa:
  520. REF(rp->host);
  521. REF(rp->rmb);
  522. break;
  523. }
  524. }
  525. /* sweep and remove unreferenced domain names */
  526. for(i = 0; i < HTLEN; i++){
  527. l = &ht[i];
  528. for(dp = *l; dp; dp = *l){
  529. if(dp->rr == 0 && dp->refs == 0 && !dp->keep){
  530. assert(dp->magic == DNmagic);
  531. *l = dp->next;
  532. if(dp->name)
  533. free(dp->name);
  534. dp->magic = ~dp->magic;
  535. dnvars.names--;
  536. memset(dp, 0, sizeof *dp); /* cause trouble */
  537. free(dp);
  538. continue;
  539. }
  540. l = &dp->next;
  541. }
  542. }
  543. unlock(&dnlock);
  544. }
  545. /*
  546. * timeout all database records (used when rereading db)
  547. */
  548. void
  549. dnagedb(void)
  550. {
  551. DN *dp;
  552. int i;
  553. RR *rp;
  554. lock(&dnlock);
  555. /* time out all database entries */
  556. for(i = 0; i < HTLEN; i++)
  557. for(dp = ht[i]; dp; dp = dp->next) {
  558. dp->keep = 0;
  559. for(rp = dp->rr; rp; rp = rp->next)
  560. if(rp->db)
  561. rp->expire = 0;
  562. }
  563. unlock(&dnlock);
  564. }
  565. /*
  566. * mark all local db records about my area as authoritative,
  567. * time out any others
  568. */
  569. void
  570. dnauthdb(void)
  571. {
  572. int i;
  573. uint32_t minttl;
  574. Area *area;
  575. DN *dp;
  576. RR *rp;
  577. lock(&dnlock);
  578. /* time out all database entries */
  579. for(i = 0; i < HTLEN; i++)
  580. for(dp = ht[i]; dp; dp = dp->next){
  581. area = inmyarea(dp->name);
  582. for(rp = dp->rr; rp; rp = rp->next)
  583. if(rp->db){
  584. if(area){
  585. minttl = area->soarr->soa->minttl;
  586. if(rp->ttl < minttl)
  587. rp->ttl = minttl;
  588. rp->auth = 1;
  589. }
  590. if(rp->expire == 0){
  591. rp->db = 0;
  592. dp->referenced = now-Reserved-1;
  593. }
  594. }
  595. }
  596. unlock(&dnlock);
  597. }
  598. /*
  599. * keep track of other processes to know if we can
  600. * garbage collect. block while garbage collecting.
  601. */
  602. int
  603. getactivity(Request *req, int recursive)
  604. {
  605. int rv;
  606. if(traceactivity)
  607. dnslog("get: %d active by pid %d from %p",
  608. dnvars.active, getpid(), getcallerpc(&req));
  609. lock(&dnvars);
  610. /*
  611. * can't block here if we're already holding one
  612. * of the dnvars.active (recursive). will deadlock.
  613. */
  614. while(!recursive && dnvars.mutex){
  615. unlock(&dnvars);
  616. sleep(100); /* tune; was 200 */
  617. lock(&dnvars);
  618. }
  619. rv = ++dnvars.active;
  620. now = time(nil);
  621. nowns = nsec();
  622. req->id = ++dnvars.id;
  623. unlock(&dnvars);
  624. return rv;
  625. }
  626. void
  627. putactivity(int recursive)
  628. {
  629. static uint32_t lastclean;
  630. if(traceactivity)
  631. dnslog("put: %d active by pid %d",
  632. dnvars.active, getpid());
  633. lock(&dnvars);
  634. dnvars.active--;
  635. assert(dnvars.active >= 0); /* "dnvars.active %d", dnvars.active */
  636. /*
  637. * clean out old entries and check for new db periodicly
  638. * can't block here if being called to let go a "recursive" lock
  639. * or we'll deadlock waiting for ourselves to give up the dnvars.active.
  640. */
  641. if (recursive || dnvars.mutex ||
  642. (needrefresh == 0 && dnvars.active > 0)){
  643. unlock(&dnvars);
  644. return;
  645. }
  646. /* wait till we're alone */
  647. dnvars.mutex = 1;
  648. while(dnvars.active > 0){
  649. unlock(&dnvars);
  650. sleep(100); /* tune; was 100 */
  651. lock(&dnvars);
  652. }
  653. unlock(&dnvars);
  654. db2cache(needrefresh);
  655. /* if we've been running for long enough, restart */
  656. if(start == 0)
  657. start = time(nil);
  658. if(Restartmins > 0 && time(nil) - start > Restartmins*60){
  659. dnslog("killing all dns procs for timed restart");
  660. postnote(PNGROUP, getpid(), "die");
  661. dnvars.mutex = 0;
  662. exits("restart");
  663. }
  664. dnageall(0);
  665. /* let others back in */
  666. lastclean = now;
  667. needrefresh = 0;
  668. dnvars.mutex = 0;
  669. }
  670. int
  671. rrlistlen(RR *rp)
  672. {
  673. int n;
  674. n = 0;
  675. for(; rp; rp = rp->next)
  676. ++n;
  677. return n;
  678. }
  679. /*
  680. * Attach a single resource record to a domain name (new->owner).
  681. * - Avoid duplicates with already present RR's
  682. * - Chain all RR's of the same type adjacent to one another
  683. * - chain authoritative RR's ahead of non-authoritative ones
  684. * - remove any expired RR's
  685. * If new is a stale duplicate, rrfree it.
  686. * Must be called with dnlock held.
  687. */
  688. static void
  689. rrattach1(RR *new, int auth)
  690. {
  691. RR **l;
  692. RR *rp;
  693. DN *dp;
  694. assert(new->magic == RRmagic);
  695. assert(!new->cached);
  696. // dnslog("rrattach1: %s", new->owner->name);
  697. if(!new->db) {
  698. /*
  699. * try not to let responses expire before we
  700. * can use them to complete this query, by extending
  701. * past (or nearly past) expiration time.
  702. */
  703. new->expire = new->ttl > now + Min? new->ttl: now + 10*Min;
  704. } else
  705. new->expire = now + Year;
  706. dp = new->owner;
  707. assert(dp->magic == DNmagic);
  708. new->auth |= auth;
  709. new->next = 0;
  710. /*
  711. * find first rr of the right type
  712. */
  713. l = &dp->rr;
  714. for(rp = *l; rp; rp = *l){
  715. assert(rp->magic == RRmagic);
  716. assert(rp->cached);
  717. if(rp->type == new->type)
  718. break;
  719. l = &rp->next;
  720. }
  721. /*
  722. * negative entries replace positive entries
  723. * positive entries replace negative entries
  724. * newer entries replace older entries with the same fields
  725. *
  726. * look farther ahead than just the next entry when looking
  727. * for duplicates; RRs of a given type can have different rdata
  728. * fields (e.g. multiple NS servers).
  729. */
  730. while ((rp = *l) != nil){
  731. assert(rp->magic == RRmagic);
  732. assert(rp->cached);
  733. if(rp->type != new->type)
  734. break;
  735. if(rp->db == new->db && rp->auth == new->auth){
  736. /* negative drives out positive and vice versa */
  737. if(rp->negative != new->negative) {
  738. /* rp == *l before; *l == rp->next after */
  739. rrdelhead(l);
  740. continue;
  741. }
  742. /* all things equal, pick the newer one */
  743. else if(rp->arg0 == new->arg0 && rp->arg1 == new->arg1){
  744. /* new drives out old */
  745. if (new->ttl <= rp->ttl &&
  746. new->expire <= rp->expire) {
  747. rrfree(new);
  748. return;
  749. }
  750. /* rp == *l before; *l == rp->next after */
  751. rrdelhead(l);
  752. continue;
  753. }
  754. /*
  755. * Hack for pointer records. This makes sure
  756. * the ordering in the list reflects the ordering
  757. * received or read from the database
  758. */
  759. else if(rp->type == Tptr &&
  760. !rp->negative && !new->negative &&
  761. rp->ptr->ordinal > new->ptr->ordinal)
  762. break;
  763. }
  764. l = &rp->next;
  765. }
  766. if (rronlist(new, rp)) {
  767. /* should not happen; duplicates were processed above */
  768. dnslog("adding duplicate %R to list of %R; aborting", new, rp);
  769. abort();
  770. }
  771. /*
  772. * add to chain
  773. */
  774. new->cached = 1;
  775. new->next = rp;
  776. *l = new;
  777. }
  778. /*
  779. * Attach a list of resource records to a domain name.
  780. * May rrfree any stale duplicate RRs; dismembers the list.
  781. * Upon return, every RR in the list will have been rrfree-d
  782. * or attached to its domain name.
  783. * See rrattach1 for properties preserved.
  784. */
  785. void
  786. rrattach(RR *rp, int auth)
  787. {
  788. RR *next, *tp;
  789. DN *dp;
  790. lock(&dnlock);
  791. for(; rp; rp = next){
  792. next = rp->next;
  793. rp->next = nil;
  794. dp = rp->owner;
  795. // dnslog("rrattach: %s", rp->owner->name);
  796. /* avoid any outside spoofing; leave keepers alone */
  797. if(cfg.cachedb && !rp->db && inmyarea(rp->owner->name)
  798. // || dp->keep /* TODO: make this work */
  799. )
  800. rrfree(rp);
  801. else {
  802. /* ameliorate the memory leak (someday delete this) */
  803. if (0 && rrlistlen(dp->rr) > 50 && !dp->keep) {
  804. dnslog("rrattach(%s): rr list too long; "
  805. "freeing it", dp->name);
  806. tp = dp->rr;
  807. dp->rr = nil;
  808. rrfreelist(tp);
  809. } else
  810. USED(dp);
  811. rrattach1(rp, auth);
  812. }
  813. }
  814. unlock(&dnlock);
  815. }
  816. /* should be called with dnlock held */
  817. RR**
  818. rrcopy(RR *rp, RR **last)
  819. {
  820. Cert *cert;
  821. Key *key;
  822. Null *null;
  823. RR *nrp;
  824. SOA *soa;
  825. Sig *sig;
  826. Txt *t, *nt, **l;
  827. if (canlock(&dnlock))
  828. abort(); /* rrcopy called with dnlock not held */
  829. nrp = rralloc(rp->type);
  830. setmalloctag(nrp, getcallerpc(&rp));
  831. switch(rp->type){
  832. case Ttxt:
  833. *nrp = *rp;
  834. l = &nrp->txt;
  835. *l = nil;
  836. for(t = rp->txt; t != nil; t = t->next){
  837. nt = emalloc(sizeof(*nt));
  838. nt->p = estrdup(t->p);
  839. nt->next = nil;
  840. *l = nt;
  841. l = &nt->next;
  842. }
  843. break;
  844. case Tsoa:
  845. soa = nrp->soa;
  846. *nrp = *rp;
  847. nrp->soa = soa;
  848. *nrp->soa = *rp->soa;
  849. nrp->soa->slaves = copyserverlist(rp->soa->slaves);
  850. break;
  851. case Tsrv:
  852. *nrp = *rp;
  853. nrp->srv = emalloc(sizeof *nrp->srv);
  854. *nrp->srv = *rp->srv;
  855. break;
  856. case Tkey:
  857. key = nrp->key;
  858. *nrp = *rp;
  859. nrp->key = key;
  860. *key = *rp->key;
  861. key->data = emalloc(key->dlen);
  862. memmove(key->data, rp->key->data, rp->key->dlen);
  863. break;
  864. case Tsig:
  865. sig = nrp->sig;
  866. *nrp = *rp;
  867. nrp->sig = sig;
  868. *sig = *rp->sig;
  869. sig->data = emalloc(sig->dlen);
  870. memmove(sig->data, rp->sig->data, rp->sig->dlen);
  871. break;
  872. case Tcert:
  873. cert = nrp->cert;
  874. *nrp = *rp;
  875. nrp->cert = cert;
  876. *cert = *rp->cert;
  877. cert->data = emalloc(cert->dlen);
  878. memmove(cert->data, rp->cert->data, rp->cert->dlen);
  879. break;
  880. case Tnull:
  881. null = nrp->null;
  882. *nrp = *rp;
  883. nrp->null = null;
  884. *null = *rp->null;
  885. null->data = emalloc(null->dlen);
  886. memmove(null->data, rp->null->data, rp->null->dlen);
  887. break;
  888. default:
  889. *nrp = *rp;
  890. break;
  891. }
  892. nrp->cached = 0;
  893. nrp->next = 0;
  894. *last = nrp;
  895. return &nrp->next;
  896. }
  897. /*
  898. * lookup a resource record of a particular type and
  899. * class attached to a domain name. Return copies.
  900. *
  901. * Priority ordering is:
  902. * db authoritative
  903. * not timed out network authoritative
  904. * not timed out network unauthoritative
  905. * unauthoritative db
  906. *
  907. * if flag NOneg is set, don't return negative cached entries.
  908. * return nothing instead.
  909. */
  910. RR*
  911. rrlookup(DN *dp, int type, int flag)
  912. {
  913. RR *rp, *first, **last;
  914. assert(dp->magic == DNmagic);
  915. first = 0;
  916. last = &first;
  917. lock(&dnlock);
  918. /* try for an authoritative db entry */
  919. for(rp = dp->rr; rp; rp = rp->next){
  920. assert(rp->magic == RRmagic);
  921. assert(rp->cached);
  922. if(rp->db)
  923. if(rp->auth)
  924. if(tsame(type, rp->type)) {
  925. last = rrcopy(rp, last);
  926. // setmalloctag(*last, getcallerpc(&dp));
  927. }
  928. }
  929. if(first)
  930. goto out;
  931. /* try for a living authoritative network entry */
  932. for(rp = dp->rr; rp; rp = rp->next){
  933. if(!rp->db)
  934. if(rp->auth)
  935. if(rp->ttl + 60 > now)
  936. if(tsame(type, rp->type)){
  937. if(flag == NOneg && rp->negative)
  938. goto out;
  939. last = rrcopy(rp, last);
  940. }
  941. }
  942. if(first)
  943. goto out;
  944. /* try for a living unauthoritative network entry */
  945. for(rp = dp->rr; rp; rp = rp->next){
  946. if(!rp->db)
  947. if(rp->ttl + 60 > now)
  948. if(tsame(type, rp->type)){
  949. if(flag == NOneg && rp->negative)
  950. goto out;
  951. last = rrcopy(rp, last);
  952. }
  953. }
  954. if(first)
  955. goto out;
  956. /* try for an unauthoritative db entry */
  957. for(rp = dp->rr; rp; rp = rp->next){
  958. if(rp->db)
  959. if(tsame(type, rp->type))
  960. last = rrcopy(rp, last);
  961. }
  962. if(first)
  963. goto out;
  964. /* otherwise, settle for anything we got (except for negative caches) */
  965. for(rp = dp->rr; rp; rp = rp->next)
  966. if(tsame(type, rp->type)){
  967. if(rp->negative)
  968. goto out;
  969. last = rrcopy(rp, last);
  970. }
  971. out:
  972. unique(first);
  973. unlock(&dnlock);
  974. // dnslog("rrlookup(%s) -> %#p\t# in-core only", dp->name, first);
  975. // if (first)
  976. // setmalloctag(first, getcallerpc(&dp));
  977. return first;
  978. }
  979. /*
  980. * convert an ascii RR type name to its integer representation
  981. */
  982. int
  983. rrtype(char *atype)
  984. {
  985. int i;
  986. for(i = 0; i <= Tall; i++)
  987. if(rrtname[i] && strcmp(rrtname[i], atype) == 0)
  988. return i;
  989. /* make any a synonym for all */
  990. if(strcmp(atype, "any") == 0)
  991. return Tall;
  992. else if(isascii(atype[0]) && isdigit(atype[0]))
  993. return atoi(atype);
  994. else
  995. return -1;
  996. }
  997. /*
  998. * return 0 if not a supported rr type
  999. */
  1000. int
  1001. rrsupported(int type)
  1002. {
  1003. if(type < 0 || type >Tall)
  1004. return 0;
  1005. return rrtname[type] != nil;
  1006. }
  1007. /*
  1008. * compare 2 types
  1009. */
  1010. int
  1011. tsame(int t1, int t2)
  1012. {
  1013. return t1 == t2 || t1 == Tall;
  1014. }
  1015. /*
  1016. * Add resource records to a list, duplicate them if they are cached
  1017. * RR's since these are shared. should be called with dnlock held
  1018. * to avoid racing down the start chain.
  1019. */
  1020. RR*
  1021. rrcat(RR **start, RR *rp)
  1022. {
  1023. RR *olp, *nlp;
  1024. RR **last;
  1025. if (canlock(&dnlock))
  1026. abort(); /* rrcat called with dnlock not held */
  1027. /* check for duplicates */
  1028. for (olp = *start; 0 && olp; olp = olp->next)
  1029. for (nlp = rp; nlp; nlp = nlp->next)
  1030. if (rrsame(nlp, olp))
  1031. dnslog("rrcat: duplicate RR: %R", nlp);
  1032. USED(olp);
  1033. last = start;
  1034. while(*last != nil)
  1035. last = &(*last)->next;
  1036. *last = rp;
  1037. return *start;
  1038. }
  1039. /*
  1040. * remove negative cache rr's from an rr list
  1041. */
  1042. RR*
  1043. rrremneg(RR **l)
  1044. {
  1045. RR **nl, *rp;
  1046. RR *first;
  1047. if (canlock(&dnlock))
  1048. abort(); /* rrremneg called with dnlock not held */
  1049. first = nil;
  1050. nl = &first;
  1051. while(*l != nil){
  1052. rp = *l;
  1053. if(rp->negative){
  1054. *l = rp->next;
  1055. *nl = rp;
  1056. nl = &rp->next;
  1057. *nl = nil;
  1058. } else
  1059. l = &rp->next;
  1060. }
  1061. return first;
  1062. }
  1063. /*
  1064. * remove rr's of a particular type from an rr list
  1065. */
  1066. RR*
  1067. rrremtype(RR **l, int type)
  1068. {
  1069. RR *first, *rp;
  1070. RR **nl;
  1071. first = nil;
  1072. nl = &first;
  1073. while(*l != nil){
  1074. rp = *l;
  1075. if(rp->type == type){
  1076. *l = rp->next;
  1077. *nl = rp;
  1078. nl = &rp->next;
  1079. *nl = nil;
  1080. } else
  1081. l = &(*l)->next;
  1082. }
  1083. return first;
  1084. }
  1085. static char *
  1086. dnname(DN *dn)
  1087. {
  1088. return dn? dn->name: "<null>";
  1089. }
  1090. /*
  1091. * print conversion for rr records
  1092. */
  1093. int
  1094. rrfmt(Fmt *f)
  1095. {
  1096. int rv;
  1097. char *strp;
  1098. char buf[Domlen];
  1099. Fmt fstr;
  1100. RR *rp;
  1101. Server *s;
  1102. SOA *soa;
  1103. Srv *srv;
  1104. Txt *t;
  1105. fmtstrinit(&fstr);
  1106. rp = va_arg(f->args, RR*);
  1107. if(rp == nil){
  1108. fmtprint(&fstr, "<null>");
  1109. goto out;
  1110. }
  1111. fmtprint(&fstr, "%s %s", dnname(rp->owner),
  1112. rrname(rp->type, buf, sizeof buf));
  1113. if(rp->negative){
  1114. fmtprint(&fstr, "\tnegative - rcode %d", rp->negrcode);
  1115. goto out;
  1116. }
  1117. switch(rp->type){
  1118. case Thinfo:
  1119. fmtprint(&fstr, "\t%s %s", dnname(rp->cpu), dnname(rp->os));
  1120. break;
  1121. case Tcname:
  1122. case Tmb:
  1123. case Tmd:
  1124. case Tmf:
  1125. case Tns:
  1126. fmtprint(&fstr, "\t%s", dnname(rp->host));
  1127. break;
  1128. case Tmg:
  1129. case Tmr:
  1130. fmtprint(&fstr, "\t%s", dnname(rp->mb));
  1131. break;
  1132. case Tminfo:
  1133. fmtprint(&fstr, "\t%s %s", dnname(rp->mb), dnname(rp->rmb));
  1134. break;
  1135. case Tmx:
  1136. fmtprint(&fstr, "\t%lud %s", rp->pref, dnname(rp->host));
  1137. break;
  1138. case Ta:
  1139. case Taaaa:
  1140. fmtprint(&fstr, "\t%s", dnname(rp->ip));
  1141. break;
  1142. case Tptr:
  1143. // fmtprint(&fstr, "\t%s(%lud)", dnname(rp->ptr),
  1144. // rp->ptr? rp->ptr->ordinal: "<null>");
  1145. fmtprint(&fstr, "\t%s", dnname(rp->ptr));
  1146. break;
  1147. case Tsoa:
  1148. soa = rp->soa;
  1149. fmtprint(&fstr, "\t%s %s %lud %lud %lud %lud %lud",
  1150. dnname(rp->host), dnname(rp->rmb),
  1151. (soa? soa->serial: 0),
  1152. (soa? soa->refresh: 0), (soa? soa->retry: 0),
  1153. (soa? soa->expire: 0), (soa? soa->minttl: 0));
  1154. if (soa)
  1155. for(s = soa->slaves; s != nil; s = s->next)
  1156. fmtprint(&fstr, " %s", s->name);
  1157. break;
  1158. case Tsrv:
  1159. srv = rp->srv;
  1160. fmtprint(&fstr, "\t%ud %ud %ud %s",
  1161. (srv? srv->pri: 0), (srv? srv->weight: 0),
  1162. rp->port, dnname(rp->host));
  1163. break;
  1164. case Tnull:
  1165. if (rp->null == nil)
  1166. fmtprint(&fstr, "\t<null>");
  1167. else
  1168. fmtprint(&fstr, "\t%.*H", rp->null->dlen,
  1169. rp->null->data);
  1170. break;
  1171. case Ttxt:
  1172. fmtprint(&fstr, "\t");
  1173. for(t = rp->txt; t != nil; t = t->next)
  1174. fmtprint(&fstr, "%s", t->p);
  1175. break;
  1176. case Trp:
  1177. fmtprint(&fstr, "\t%s %s", dnname(rp->rmb), dnname(rp->rp));
  1178. break;
  1179. case Tkey:
  1180. if (rp->key == nil)
  1181. fmtprint(&fstr, "\t<null> <null> <null>");
  1182. else
  1183. fmtprint(&fstr, "\t%d %d %d", rp->key->flags,
  1184. rp->key->proto, rp->key->alg);
  1185. break;
  1186. case Tsig:
  1187. if (rp->sig == nil)
  1188. fmtprint(&fstr,
  1189. "\t<null> <null> <null> <null> <null> <null> <null> <null>");
  1190. else
  1191. fmtprint(&fstr, "\t%d %d %d %lud %lud %lud %d %s",
  1192. rp->sig->type, rp->sig->alg, rp->sig->labels,
  1193. rp->sig->ttl, rp->sig->exp, rp->sig->incep,
  1194. rp->sig->tag, dnname(rp->sig->signer));
  1195. break;
  1196. case Tcert:
  1197. if (rp->cert == nil)
  1198. fmtprint(&fstr, "\t<null> <null> <null>");
  1199. else
  1200. fmtprint(&fstr, "\t%d %d %d",
  1201. rp->cert->type, rp->cert->tag, rp->cert->alg);
  1202. break;
  1203. }
  1204. out:
  1205. strp = fmtstrflush(&fstr);
  1206. rv = fmtstrcpy(f, strp);
  1207. free(strp);
  1208. return rv;
  1209. }
  1210. /*
  1211. * print conversion for rr records in attribute value form
  1212. */
  1213. int
  1214. rravfmt(Fmt *f)
  1215. {
  1216. int rv, quote;
  1217. char *strp;
  1218. Fmt fstr;
  1219. RR *rp;
  1220. Server *s;
  1221. SOA *soa;
  1222. Srv *srv;
  1223. Txt *t;
  1224. fmtstrinit(&fstr);
  1225. rp = va_arg(f->args, RR*);
  1226. if(rp == nil){
  1227. fmtprint(&fstr, "<null>");
  1228. goto out;
  1229. }
  1230. if(rp->type == Tptr)
  1231. fmtprint(&fstr, "ptr=%s", dnname(rp->owner));
  1232. else
  1233. fmtprint(&fstr, "dom=%s", dnname(rp->owner));
  1234. switch(rp->type){
  1235. case Thinfo:
  1236. fmtprint(&fstr, " cpu=%s os=%s",
  1237. dnname(rp->cpu), dnname(rp->os));
  1238. break;
  1239. case Tcname:
  1240. fmtprint(&fstr, " cname=%s", dnname(rp->host));
  1241. break;
  1242. case Tmb:
  1243. case Tmd:
  1244. case Tmf:
  1245. fmtprint(&fstr, " mbox=%s", dnname(rp->host));
  1246. break;
  1247. case Tns:
  1248. fmtprint(&fstr, " ns=%s", dnname(rp->host));
  1249. break;
  1250. case Tmg:
  1251. case Tmr:
  1252. fmtprint(&fstr, " mbox=%s", dnname(rp->mb));
  1253. break;
  1254. case Tminfo:
  1255. fmtprint(&fstr, " mbox=%s mbox=%s",
  1256. dnname(rp->mb), dnname(rp->rmb));
  1257. break;
  1258. case Tmx:
  1259. fmtprint(&fstr, " pref=%lud mx=%s", rp->pref, dnname(rp->host));
  1260. break;
  1261. case Ta:
  1262. case Taaaa:
  1263. fmtprint(&fstr, " ip=%s", dnname(rp->ip));
  1264. break;
  1265. case Tptr:
  1266. fmtprint(&fstr, " dom=%s", dnname(rp->ptr));
  1267. break;
  1268. case Tsoa:
  1269. soa = rp->soa;
  1270. fmtprint(&fstr,
  1271. " ns=%s mbox=%s serial=%lud refresh=%lud retry=%lud expire=%lud ttl=%lud",
  1272. dnname(rp->host), dnname(rp->rmb),
  1273. (soa? soa->serial: 0),
  1274. (soa? soa->refresh: 0), (soa? soa->retry: 0),
  1275. (soa? soa->expire: 0), (soa? soa->minttl: 0));
  1276. for(s = soa->slaves; s != nil; s = s->next)
  1277. fmtprint(&fstr, " dnsslave=%s", s->name);
  1278. break;
  1279. case Tsrv:
  1280. srv = rp->srv;
  1281. fmtprint(&fstr, " pri=%ud weight=%ud port=%ud target=%s",
  1282. (srv? srv->pri: 0), (srv? srv->weight: 0),
  1283. rp->port, dnname(rp->host));
  1284. break;
  1285. case Tnull:
  1286. if (rp->null == nil)
  1287. fmtprint(&fstr, " null=<null>");
  1288. else
  1289. fmtprint(&fstr, " null=%.*H", rp->null->dlen,
  1290. rp->null->data);
  1291. break;
  1292. case Ttxt:
  1293. fmtprint(&fstr, " txt=");
  1294. quote = 0;
  1295. for(t = rp->txt; t != nil; t = t->next)
  1296. if(strchr(t->p, ' '))
  1297. quote = 1;
  1298. if(quote)
  1299. fmtprint(&fstr, "\"");
  1300. for(t = rp->txt; t != nil; t = t->next)
  1301. fmtprint(&fstr, "%s", t->p);
  1302. if(quote)
  1303. fmtprint(&fstr, "\"");
  1304. break;
  1305. case Trp:
  1306. fmtprint(&fstr, " rp=%s txt=%s",
  1307. dnname(rp->rmb), dnname(rp->rp));
  1308. break;
  1309. case Tkey:
  1310. if (rp->key == nil)
  1311. fmtprint(&fstr, " flags=<null> proto=<null> alg=<null>");
  1312. else
  1313. fmtprint(&fstr, " flags=%d proto=%d alg=%d",
  1314. rp->key->flags, rp->key->proto, rp->key->alg);
  1315. break;
  1316. case Tsig:
  1317. if (rp->sig == nil)
  1318. fmtprint(&fstr,
  1319. " type=<null> alg=<null> labels=<null> ttl=<null> exp=<null> incep=<null> tag=<null> signer=<null>");
  1320. else
  1321. fmtprint(&fstr,
  1322. " type=%d alg=%d labels=%d ttl=%lud exp=%lud incep=%lud tag=%d signer=%s",
  1323. rp->sig->type, rp->sig->alg, rp->sig->labels,
  1324. rp->sig->ttl, rp->sig->exp, rp->sig->incep,
  1325. rp->sig->tag, dnname(rp->sig->signer));
  1326. break;
  1327. case Tcert:
  1328. if (rp->cert == nil)
  1329. fmtprint(&fstr, " type=<null> tag=<null> alg=<null>");
  1330. else
  1331. fmtprint(&fstr, " type=%d tag=%d alg=%d",
  1332. rp->cert->type, rp->cert->tag, rp->cert->alg);
  1333. break;
  1334. }
  1335. out:
  1336. strp = fmtstrflush(&fstr);
  1337. rv = fmtstrcpy(f, strp);
  1338. free(strp);
  1339. return rv;
  1340. }
  1341. void
  1342. warning(char *fmt, ...)
  1343. {
  1344. char dnserr[256];
  1345. va_list arg;
  1346. va_start(arg, fmt);
  1347. vseprint(dnserr, dnserr+sizeof(dnserr), fmt, arg);
  1348. va_end(arg);
  1349. syslog(1, logfile, dnserr); /* on console too */
  1350. }
  1351. void
  1352. dnslog(char *fmt, ...)
  1353. {
  1354. char dnserr[256];
  1355. va_list arg;
  1356. va_start(arg, fmt);
  1357. vseprint(dnserr, dnserr+sizeof(dnserr), fmt, arg);
  1358. va_end(arg);
  1359. syslog(0, logfile, dnserr);
  1360. }
  1361. /*
  1362. * based on libthread's threadsetname, but drags in less library code.
  1363. * actually just sets the arguments displayed.
  1364. */
  1365. void
  1366. procsetname(char *fmt, ...)
  1367. {
  1368. int fd;
  1369. char *cmdname;
  1370. char buf[128];
  1371. va_list arg;
  1372. va_start(arg, fmt);
  1373. cmdname = vsmprint(fmt, arg);
  1374. va_end(arg);
  1375. if (cmdname == nil)
  1376. return;
  1377. snprint(buf, sizeof buf, "#p/%d/args", getpid());
  1378. if((fd = open(buf, OWRITE)) >= 0){
  1379. write(fd, cmdname, strlen(cmdname)+1);
  1380. close(fd);
  1381. }
  1382. free(cmdname);
  1383. }
  1384. /*
  1385. * create a slave process to handle a request to avoid one request blocking
  1386. * another
  1387. */
  1388. void
  1389. slave(Request *req)
  1390. {
  1391. int ppid, procs;
  1392. if(req->isslave)
  1393. return; /* we're already a slave process */
  1394. /*
  1395. * These calls to putactivity cannot block.
  1396. * After getactivity(), the current process is counted
  1397. * twice in dnvars.active (one will pass to the child).
  1398. * If putactivity tries to wait for dnvars.active == 0,
  1399. * it will never happen.
  1400. */
  1401. /* limit parallelism */
  1402. procs = getactivity(req, 1);
  1403. if (procs > stats.slavehiwat)
  1404. stats.slavehiwat = procs;
  1405. if(procs > Maxactive){
  1406. if(traceactivity)
  1407. dnslog("[%d] too much activity", getpid());
  1408. putactivity(1);
  1409. return;
  1410. }
  1411. /*
  1412. * parent returns to main loop, child does the work.
  1413. * don't change note group.
  1414. */
  1415. ppid = getpid();
  1416. switch(rfork(RFPROC|RFMEM|RFNOWAIT)){
  1417. case -1:
  1418. putactivity(1);
  1419. break;
  1420. case 0:
  1421. procsetname("request slave of pid %d", ppid);
  1422. if(traceactivity)
  1423. dnslog("[%d] take activity from %d", getpid(), ppid);
  1424. req->isslave = 1; /* why not `= getpid()'? */
  1425. break;
  1426. default:
  1427. /*
  1428. * this relies on rfork producing separate, initially-identical
  1429. * stacks, thus giving us two copies of `req', one in each
  1430. * process.
  1431. */
  1432. alarm(0);
  1433. longjmp(req->mret, 1);
  1434. }
  1435. }
  1436. /*
  1437. * chasing down double free's
  1438. */
  1439. void
  1440. dncheck(void *p, int dolock)
  1441. {
  1442. int i;
  1443. DN *dp;
  1444. RR *rp;
  1445. if(p != nil){
  1446. dp = p;
  1447. assert(dp->magic == DNmagic);
  1448. }
  1449. if(!testing)
  1450. return;
  1451. if(dolock)
  1452. lock(&dnlock);
  1453. poolcheck(mainmem);
  1454. for(i = 0; i < HTLEN; i++)
  1455. for(dp = ht[i]; dp; dp = dp->next){
  1456. assert(dp != p);
  1457. assert(dp->magic == DNmagic);
  1458. for(rp = dp->rr; rp; rp = rp->next){
  1459. assert(rp->magic == RRmagic);
  1460. assert(rp->cached);
  1461. assert(rp->owner == dp);
  1462. /* also check for duplicate rrs */
  1463. if (dolock && rronlist(rp, rp->next)) {
  1464. dnslog("%R duplicates its next chain "
  1465. "(%R); aborting", rp, rp->next);
  1466. abort();
  1467. }
  1468. }
  1469. }
  1470. if(dolock)
  1471. unlock(&dnlock);
  1472. }
  1473. static int
  1474. rrequiv(RR *r1, RR *r2)
  1475. {
  1476. return r1->owner == r2->owner
  1477. && r1->type == r2->type
  1478. && r1->arg0 == r2->arg0
  1479. && r1->arg1 == r2->arg1;
  1480. }
  1481. /* called with dnlock held */
  1482. void
  1483. unique(RR *rp)
  1484. {
  1485. RR **l, *nrp;
  1486. for(; rp; rp = rp->next){
  1487. l = &rp->next;
  1488. for(nrp = *l; nrp; nrp = *l)
  1489. if(rrequiv(rp, nrp)){
  1490. *l = nrp->next;
  1491. rrfree(nrp);
  1492. } else
  1493. l = &nrp->next;
  1494. }
  1495. }
  1496. /*
  1497. * true if second domain is subsumed by the first
  1498. */
  1499. int
  1500. subsume(char *higher, char *lower)
  1501. {
  1502. int hn, ln;
  1503. ln = strlen(lower);
  1504. hn = strlen(higher);
  1505. if (ln < hn || cistrcmp(lower + ln - hn, higher) != 0 ||
  1506. ln > hn && hn != 0 && lower[ln - hn - 1] != '.')
  1507. return 0;
  1508. return 1;
  1509. }
  1510. /*
  1511. * randomize the order we return items to provide some
  1512. * load balancing for servers.
  1513. *
  1514. * only randomize the first class of entries
  1515. */
  1516. RR*
  1517. randomize(RR *rp)
  1518. {
  1519. RR *first, *last, *x, *base;
  1520. uint32_t n;
  1521. if(rp == nil || rp->next == nil)
  1522. return rp;
  1523. /* just randomize addresses, mx's and ns's */
  1524. for(x = rp; x; x = x->next)
  1525. if(x->type != Ta && x->type != Taaaa &&
  1526. x->type != Tmx && x->type != Tns)
  1527. return rp;
  1528. base = rp;
  1529. n = rand();
  1530. last = first = nil;
  1531. while(rp != nil){
  1532. /* stop randomizing if we've moved past our class */
  1533. if(base->auth != rp->auth || base->db != rp->db){
  1534. last->next = rp;
  1535. break;
  1536. }
  1537. /* unchain */
  1538. x = rp;
  1539. rp = x->next;
  1540. x->next = nil;
  1541. if(n&1){
  1542. /* add to tail */
  1543. if(last == nil)
  1544. first = x;
  1545. else
  1546. last->next = x;
  1547. last = x;
  1548. } else {
  1549. /* add to head */
  1550. if(last == nil)
  1551. last = x;
  1552. x->next = first;
  1553. first = x;
  1554. }
  1555. /* reroll the dice */
  1556. n >>= 1;
  1557. }
  1558. return first;
  1559. }
  1560. static int
  1561. sencodefmt(Fmt *f)
  1562. {
  1563. int i, len, ilen, rv;
  1564. char *out, *buf;
  1565. uint8_t *b;
  1566. char obuf[64]; /* rsc optimization */
  1567. if(!(f->flags&FmtPrec) || f->prec < 1)
  1568. goto error;
  1569. b = va_arg(f->args, uint8_t*);
  1570. if(b == nil)
  1571. goto error;
  1572. /* if it's a printable, go for it */
  1573. len = f->prec;
  1574. for(i = 0; i < len; i++)
  1575. if(!isprint(b[i]))
  1576. break;
  1577. if(i == len){
  1578. if(len >= sizeof obuf)
  1579. len = sizeof(obuf)-1;
  1580. memmove(obuf, b, len);
  1581. obuf[len] = 0;
  1582. fmtstrcpy(f, obuf);
  1583. return 0;
  1584. }
  1585. ilen = f->prec;
  1586. f->prec = 0;
  1587. f->flags &= ~FmtPrec;
  1588. switch(f->r){
  1589. case '<':
  1590. len = (8*ilen+4)/5 + 3;
  1591. break;
  1592. case '[':
  1593. len = (8*ilen+5)/6 + 4;
  1594. break;
  1595. case 'H':
  1596. len = 2*ilen + 1;
  1597. break;
  1598. default:
  1599. goto error;
  1600. }
  1601. if(len > sizeof(obuf)){
  1602. buf = malloc(len);
  1603. if(buf == nil)
  1604. goto error;
  1605. } else
  1606. buf = obuf;
  1607. /* convert */
  1608. out = buf;
  1609. switch(f->r){
  1610. case '<':
  1611. rv = enc32(out, len, b, ilen);
  1612. break;
  1613. case '[':
  1614. rv = enc64(out, len, b, ilen);
  1615. break;
  1616. case 'H':
  1617. rv = enc16(out, len, b, ilen);
  1618. break;
  1619. default:
  1620. rv = -1;
  1621. break;
  1622. }
  1623. if(rv < 0)
  1624. goto error;
  1625. fmtstrcpy(f, buf);
  1626. if(buf != obuf)
  1627. free(buf);
  1628. return 0;
  1629. error:
  1630. return fmtstrcpy(f, "<encodefmt>");
  1631. }
  1632. void*
  1633. emalloc(int size)
  1634. {
  1635. char *x;
  1636. x = mallocz(size, 1);
  1637. if(x == nil)
  1638. abort();
  1639. setmalloctag(x, getcallerpc(&size));
  1640. return x;
  1641. }
  1642. char*
  1643. estrdup(char *s)
  1644. {
  1645. int size;
  1646. char *p;
  1647. size = strlen(s)+1;
  1648. p = mallocz(size, 0);
  1649. if(p == nil)
  1650. abort();
  1651. memmove(p, s, size);
  1652. setmalloctag(p, getcallerpc(&s));
  1653. return p;
  1654. }
  1655. /*
  1656. * create a pointer record
  1657. */
  1658. static RR*
  1659. mkptr(DN *dp, char *ptr, uint32_t ttl)
  1660. {
  1661. DN *ipdp;
  1662. RR *rp;
  1663. ipdp = dnlookup(ptr, Cin, 1);
  1664. rp = rralloc(Tptr);
  1665. rp->ptr = dp;
  1666. rp->owner = ipdp;
  1667. rp->db = 1;
  1668. if(ttl)
  1669. rp->ttl = ttl;
  1670. return rp;
  1671. }
  1672. void bytes2nibbles(uint8_t *nibbles, uint8_t *bytes, int nbytes);
  1673. /*
  1674. * look for all ip addresses in this network and make
  1675. * pointer records for them.
  1676. */
  1677. void
  1678. dnptr(uint8_t *net, uint8_t *mask, char *dom, int forwtype, int subdoms,
  1679. int ttl)
  1680. {
  1681. int i, j, len;
  1682. char *p, *e;
  1683. char ptr[Domlen];
  1684. uint8_t *ipp;
  1685. uint8_t ip[IPaddrlen], nnet[IPaddrlen];
  1686. uint8_t nibip[IPaddrlen*2];
  1687. DN *dp;
  1688. RR *rp, *nrp, *first, **l;
  1689. l = &first;
  1690. first = nil;
  1691. for(i = 0; i < HTLEN; i++)
  1692. for(dp = ht[i]; dp; dp = dp->next)
  1693. for(rp = dp->rr; rp; rp = rp->next){
  1694. if(rp->type != forwtype || rp->negative)
  1695. continue;
  1696. parseip(ip, rp->ip->name);
  1697. maskip(ip, mask, nnet);
  1698. if(ipcmp(net, nnet) != 0)
  1699. continue;
  1700. ipp = ip;
  1701. len = IPaddrlen;
  1702. if (forwtype == Taaaa) {
  1703. bytes2nibbles(nibip, ip, IPaddrlen);
  1704. ipp = nibip;
  1705. len = 2*IPaddrlen;
  1706. }
  1707. p = ptr;
  1708. e = ptr+sizeof(ptr);
  1709. for(j = len - 1; j >= len - subdoms; j--)
  1710. p = seprint(p, e, (forwtype == Ta?
  1711. "%d.": "%x."), ipp[j]);
  1712. seprint(p, e, "%s", dom);
  1713. nrp = mkptr(dp, ptr, ttl);
  1714. *l = nrp;
  1715. l = &nrp->next;
  1716. }
  1717. for(rp = first; rp != nil; rp = nrp){
  1718. nrp = rp->next;
  1719. rp->next = nil;
  1720. rrattach(rp, Authoritative);
  1721. }
  1722. }
  1723. void
  1724. addserver(Server **l, char *name)
  1725. {
  1726. Server *s;
  1727. while(*l)
  1728. l = &(*l)->next;
  1729. s = malloc(sizeof(Server)+strlen(name)+1);
  1730. if(s == nil)
  1731. return;
  1732. s->name = (char*)(s+1);
  1733. strcpy(s->name, name);
  1734. s->next = nil;
  1735. *l = s;
  1736. }
  1737. Server*
  1738. copyserverlist(Server *s)
  1739. {
  1740. Server *ns;
  1741. for(ns = nil; s != nil; s = s->next)
  1742. addserver(&ns, s->name);
  1743. return ns;
  1744. }
  1745. /* from here down is copied to ip/snoopy/dns.c periodically to update it */
  1746. /*
  1747. * convert an integer RR type to it's ascii name
  1748. */
  1749. char*
  1750. rrname(int type, char *buf, int len)
  1751. {
  1752. char *t;
  1753. t = nil;
  1754. if(type >= 0 && type <= Tall)
  1755. t = rrtname[type];
  1756. if(t==nil){
  1757. snprint(buf, len, "%d", type);
  1758. t = buf;
  1759. }
  1760. return t;
  1761. }
  1762. /*
  1763. * free a list of resource records and any related structs
  1764. */
  1765. void
  1766. rrfreelist(RR *rp)
  1767. {
  1768. RR *next;
  1769. for(; rp; rp = next){
  1770. next = rp->next;
  1771. rrfree(rp);
  1772. }
  1773. }
  1774. void
  1775. freeserverlist(Server *s)
  1776. {
  1777. Server *next;
  1778. for(; s != nil; s = next){
  1779. next = s->next;
  1780. free(s);
  1781. }
  1782. }
  1783. /*
  1784. * allocate a resource record of a given type
  1785. */
  1786. RR*
  1787. rralloc(int type)
  1788. {
  1789. RR *rp;
  1790. rp = emalloc(sizeof(*rp));
  1791. rp->magic = RRmagic;
  1792. rp->pc = getcallerpc(&type);
  1793. rp->type = type;
  1794. if (rp->type != type)
  1795. dnslog("rralloc: bogus type %d", type);
  1796. setmalloctag(rp, rp->pc);
  1797. switch(type){
  1798. case Tsoa:
  1799. rp->soa = emalloc(sizeof(*rp->soa));
  1800. rp->soa->slaves = nil;
  1801. setmalloctag(rp->soa, rp->pc);
  1802. break;
  1803. case Tsrv:
  1804. rp->srv = emalloc(sizeof(*rp->srv));
  1805. setmalloctag(rp->srv, rp->pc);
  1806. break;
  1807. case Tkey:
  1808. rp->key = emalloc(sizeof(*rp->key));
  1809. setmalloctag(rp->key, rp->pc);
  1810. break;
  1811. case Tcert:
  1812. rp->cert = emalloc(sizeof(*rp->cert));
  1813. setmalloctag(rp->cert, rp->pc);
  1814. break;
  1815. case Tsig:
  1816. rp->sig = emalloc(sizeof(*rp->sig));
  1817. setmalloctag(rp->sig, rp->pc);
  1818. break;
  1819. case Tnull:
  1820. rp->null = emalloc(sizeof(*rp->null));
  1821. setmalloctag(rp->null, rp->pc);
  1822. break;
  1823. }
  1824. rp->ttl = 0;
  1825. rp->expire = 0;
  1826. rp->next = 0;
  1827. return rp;
  1828. }
  1829. /*
  1830. * free a resource record and any related structs
  1831. */
  1832. void
  1833. rrfree(RR *rp)
  1834. {
  1835. DN *dp;
  1836. RR *nrp;
  1837. Txt *t;
  1838. assert(rp->magic == RRmagic);
  1839. assert(!rp->cached);
  1840. /* our callers often hold dnlock. it's needed to examine dp safely. */
  1841. dp = rp->owner;
  1842. if(dp){
  1843. /* if someone else holds dnlock, skip the sanity check. */
  1844. if (canlock(&dnlock)) {
  1845. assert(dp->magic == DNmagic);
  1846. for(nrp = dp->rr; nrp; nrp = nrp->next)
  1847. assert(nrp != rp); /* "rrfree of live rr" */
  1848. unlock(&dnlock);
  1849. }
  1850. }
  1851. switch(rp->type){
  1852. case Tsoa:
  1853. freeserverlist(rp->soa->slaves);
  1854. memset(rp->soa, 0, sizeof *rp->soa); /* cause trouble */
  1855. free(rp->soa);
  1856. break;
  1857. case Tsrv:
  1858. memset(rp->srv, 0, sizeof *rp->srv); /* cause trouble */
  1859. free(rp->srv);
  1860. break;
  1861. case Tkey:
  1862. free(rp->key->data);
  1863. memset(rp->key, 0, sizeof *rp->key); /* cause trouble */
  1864. free(rp->key);
  1865. break;
  1866. case Tcert:
  1867. free(rp->cert->data);
  1868. memset(rp->cert, 0, sizeof *rp->cert); /* cause trouble */
  1869. free(rp->cert);
  1870. break;
  1871. case Tsig:
  1872. free(rp->sig->data);
  1873. memset(rp->sig, 0, sizeof *rp->sig); /* cause trouble */
  1874. free(rp->sig);
  1875. break;
  1876. case Tnull:
  1877. free(rp->null->data);
  1878. memset(rp->null, 0, sizeof *rp->null); /* cause trouble */
  1879. free(rp->null);
  1880. break;
  1881. case Ttxt:
  1882. while(rp->txt != nil){
  1883. t = rp->txt;
  1884. rp->txt = t->next;
  1885. free(t->p);
  1886. memset(t, 0, sizeof *t); /* cause trouble */
  1887. free(t);
  1888. }
  1889. break;
  1890. }
  1891. rp->magic = ~rp->magic;
  1892. memset(rp, 0, sizeof *rp); /* cause trouble */
  1893. free(rp);
  1894. }