dn.c 39 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078
  1. #include <u.h>
  2. #include <libc.h>
  3. #include <ip.h>
  4. #include <pool.h>
  5. #include <ctype.h>
  6. #include "dns.h"
  7. /*
  8. * this comment used to say `our target is 4000 names cached, this should
  9. * be larger on large servers'. dns at Bell Labs starts off with
  10. * about 1780 names.
  11. *
  12. * aging seems to corrupt the cache, so raise the trigger from 4000 until we
  13. * figure it out.
  14. */
  15. enum {
  16. Deftarget = 1<<30, /* effectively disable aging */
  17. Minage = 1<<30,
  18. Defagefreq = 1<<30, /* age names this often (seconds) */
  19. Restartmins = 600,
  20. /* these settings will trigger frequent aging */
  21. // Deftarget = 4000,
  22. // Minage = 5*60,
  23. // Defagefreq = 15*60, /* age names this often (seconds) */
  24. };
  25. /*
  26. * Hash table for domain names. The hash is based only on the
  27. * first element of the domain name.
  28. */
  29. DN *ht[HTLEN];
  30. static struct {
  31. Lock;
  32. ulong names; /* names allocated */
  33. ulong oldest; /* longest we'll leave a name around */
  34. int active;
  35. int mutex;
  36. ushort id; /* same size as in packet */
  37. } dnvars;
  38. /* names of RR types */
  39. char *rrtname[] =
  40. {
  41. [Ta] "ip",
  42. [Tns] "ns",
  43. [Tmd] "md",
  44. [Tmf] "mf",
  45. [Tcname] "cname",
  46. [Tsoa] "soa",
  47. [Tmb] "mb",
  48. [Tmg] "mg",
  49. [Tmr] "mr",
  50. [Tnull] "null",
  51. [Twks] "wks",
  52. [Tptr] "ptr",
  53. [Thinfo] "hinfo",
  54. [Tminfo] "minfo",
  55. [Tmx] "mx",
  56. [Ttxt] "txt",
  57. [Trp] "rp",
  58. [Tafsdb] "afsdb",
  59. [Tx25] "x.25",
  60. [Tisdn] "isdn",
  61. [Trt] "rt",
  62. [Tnsap] "nsap",
  63. [Tnsapptr] "nsap-ptr",
  64. [Tsig] "sig",
  65. [Tkey] "key",
  66. [Tpx] "px",
  67. [Tgpos] "gpos",
  68. [Taaaa] "ipv6",
  69. [Tloc] "loc",
  70. [Tnxt] "nxt",
  71. [Teid] "eid",
  72. [Tnimloc] "nimrod",
  73. [Tsrv] "srv",
  74. [Tatma] "atma",
  75. [Tnaptr] "naptr",
  76. [Tkx] "kx",
  77. [Tcert] "cert",
  78. [Ta6] "a6",
  79. [Tdname] "dname",
  80. [Tsink] "sink",
  81. [Topt] "opt",
  82. [Tapl] "apl",
  83. [Tds] "ds",
  84. [Tsshfp] "sshfp",
  85. [Tipseckey] "ipseckey",
  86. [Trrsig] "rrsig",
  87. [Tnsec] "nsec",
  88. [Tdnskey] "dnskey",
  89. [Tspf] "spf",
  90. [Tuinfo] "uinfo",
  91. [Tuid] "uid",
  92. [Tgid] "gid",
  93. [Tunspec] "unspec",
  94. [Ttkey] "tkey",
  95. [Ttsig] "tsig",
  96. [Tixfr] "ixfr",
  97. [Taxfr] "axfr",
  98. [Tmailb] "mailb",
  99. [Tmaila] "maila",
  100. [Tall] "all",
  101. 0,
  102. };
  103. /* names of response codes */
  104. char *rname[Rmask+1] =
  105. {
  106. [Rok] "ok",
  107. [Rformat] "format error",
  108. [Rserver] "server failure",
  109. [Rname] "bad name",
  110. [Runimplimented] "unimplemented",
  111. [Rrefused] "we don't like you",
  112. [Ryxdomain] "name should not exist",
  113. [Ryxrrset] "rr set should not exist",
  114. [Rnxrrset] "rr set should exist",
  115. [Rnotauth] "not authorative",
  116. [Rnotzone] "not in zone",
  117. [Rbadvers] "bad opt version",
  118. /* [Rbadsig] "bad signature", */
  119. [Rbadkey] "bad key",
  120. [Rbadtime] "bad signature time",
  121. [Rbadmode] "bad mode",
  122. [Rbadname] "duplicate key name",
  123. [Rbadalg] "bad algorithm",
  124. };
  125. unsigned nrname = nelem(rname);
  126. /* names of op codes */
  127. char *opname[] =
  128. {
  129. [Oquery] "query",
  130. [Oinverse] "inverse query (retired)",
  131. [Ostatus] "status",
  132. [Oupdate] "update",
  133. };
  134. ulong target = Deftarget;
  135. ulong start;
  136. Lock dnlock;
  137. static ulong agefreq = Defagefreq;
  138. static int rrequiv(RR *r1, RR *r2);
  139. static int sencodefmt(Fmt*);
  140. static void
  141. ding(void*, char *msg)
  142. {
  143. if(strstr(msg, "alarm") != nil) {
  144. stats.alarms++;
  145. noted(NCONT); /* resume with system call error */
  146. } else
  147. noted(NDFLT); /* die */
  148. }
  149. void
  150. dninit(void)
  151. {
  152. fmtinstall('E', eipfmt);
  153. fmtinstall('I', eipfmt);
  154. fmtinstall('V', eipfmt);
  155. fmtinstall('R', rrfmt);
  156. fmtinstall('Q', rravfmt);
  157. fmtinstall('H', sencodefmt);
  158. dnvars.oldest = maxage;
  159. dnvars.names = 0;
  160. dnvars.id = truerand(); /* don't start with same id every time */
  161. notify(ding);
  162. }
  163. /*
  164. * hash for a domain name
  165. */
  166. static ulong
  167. dnhash(char *name)
  168. {
  169. ulong hash;
  170. uchar *val = (uchar*)name;
  171. for(hash = 0; *val; val++)
  172. hash = hash*13 + tolower(*val)-'a';
  173. return hash % HTLEN;
  174. }
  175. /*
  176. * lookup a symbol. if enter is not zero and the name is
  177. * not found, create it.
  178. */
  179. DN*
  180. dnlookup(char *name, int class, int enter)
  181. {
  182. DN **l;
  183. DN *dp;
  184. l = &ht[dnhash(name)];
  185. lock(&dnlock);
  186. for(dp = *l; dp; dp = dp->next) {
  187. assert(dp->magic == DNmagic);
  188. if(dp->class == class && cistrcmp(dp->name, name) == 0){
  189. dp->referenced = now;
  190. unlock(&dnlock);
  191. return dp;
  192. }
  193. l = &dp->next;
  194. }
  195. if(!enter){
  196. unlock(&dnlock);
  197. return 0;
  198. }
  199. dnvars.names++;
  200. dp = emalloc(sizeof(*dp));
  201. dp->magic = DNmagic;
  202. dp->name = estrdup(name);
  203. assert(dp->name != nil);
  204. dp->class = class;
  205. dp->rr = 0;
  206. dp->referenced = now;
  207. /* add new DN to tail of the hash list. *l points to last next ptr. */
  208. dp->next = nil;
  209. *l = dp;
  210. unlock(&dnlock);
  211. return dp;
  212. }
  213. static int
  214. rrsame(RR *rr1, RR *rr2)
  215. {
  216. return rr1 == rr2 || rr2 && rrequiv(rr1, rr2) &&
  217. rr1->db == rr2->db && rr1->auth == rr2->auth;
  218. }
  219. static int
  220. rronlist(RR *rp, RR *lp)
  221. {
  222. for(; lp; lp = lp->next)
  223. if (rrsame(lp, rp))
  224. return 1;
  225. return 0;
  226. }
  227. /*
  228. * dump the stats
  229. */
  230. void
  231. dnstats(char *file)
  232. {
  233. int i, fd;
  234. fd = create(file, OWRITE, 0666);
  235. if(fd < 0)
  236. return;
  237. qlock(&stats);
  238. fprint(fd, "# system %s\n", sysname());
  239. fprint(fd, "# slave procs high-water mark\t%lud\n", stats.slavehiwat);
  240. fprint(fd, "# queries received by 9p\t%lud\n", stats.qrecvd9p);
  241. fprint(fd, "# queries received by udp\t%lud\n", stats.qrecvdudp);
  242. fprint(fd, "# queries answered from memory\t%lud\n", stats.answinmem);
  243. fprint(fd, "# queries sent by udp\t%lud\n", stats.qsent);
  244. for (i = 0; i < nelem(stats.under10ths); i++)
  245. if (stats.under10ths[i] || i == nelem(stats.under10ths) - 1)
  246. fprint(fd, "# responses arriving within %.1f s.\t%lud\n",
  247. (double)(i+1)/10, stats.under10ths[i]);
  248. fprint(fd, "\n# queries sent & timed-out\t%lud\n", stats.tmout);
  249. fprint(fd, "# cname queries timed-out\t%lud\n", stats.tmoutcname);
  250. fprint(fd, "# ipv6 queries timed-out\t%lud\n", stats.tmoutv6);
  251. fprint(fd, "\n# negative answers received\t%lud\n", stats.negans);
  252. fprint(fd, "# negative answers w Rserver set\t%lud\n", stats.negserver);
  253. fprint(fd, "# negative answers w bad delegation\t%lud\n",
  254. stats.negbaddeleg);
  255. fprint(fd, "# negative answers w bad delegation & no answers\t%lud\n",
  256. stats.negbdnoans);
  257. fprint(fd, "# negative answers w no Rname set\t%lud\n", stats.negnorname);
  258. fprint(fd, "# negative answers cached\t%lud\n", stats.negcached);
  259. qunlock(&stats);
  260. lock(&dnlock);
  261. fprint(fd, "\n# domain names %lud target %lud\n", dnvars.names, target);
  262. unlock(&dnlock);
  263. close(fd);
  264. }
  265. /*
  266. * dump the cache
  267. */
  268. void
  269. dndump(char *file)
  270. {
  271. int i, fd;
  272. DN *dp;
  273. RR *rp;
  274. fd = create(file, OWRITE, 0666);
  275. if(fd < 0)
  276. return;
  277. lock(&dnlock);
  278. for(i = 0; i < HTLEN; i++)
  279. for(dp = ht[i]; dp; dp = dp->next){
  280. fprint(fd, "%s\n", dp->name);
  281. for(rp = dp->rr; rp; rp = rp->next) {
  282. fprint(fd, "\t%R %c%c %lud/%lud\n",
  283. rp, rp->auth? 'A': 'U',
  284. rp->db? 'D': 'N', rp->expire, rp->ttl);
  285. if (rronlist(rp, rp->next))
  286. fprint(fd, "*** duplicate:\n");
  287. }
  288. }
  289. unlock(&dnlock);
  290. close(fd);
  291. }
  292. /*
  293. * purge all records
  294. */
  295. void
  296. dnpurge(void)
  297. {
  298. DN *dp;
  299. RR *rp, *srp;
  300. int i;
  301. lock(&dnlock);
  302. for(i = 0; i < HTLEN; i++)
  303. for(dp = ht[i]; dp; dp = dp->next){
  304. srp = rp = dp->rr;
  305. dp->rr = nil;
  306. for(; rp != nil; rp = rp->next)
  307. rp->cached = 0;
  308. rrfreelist(srp);
  309. }
  310. unlock(&dnlock);
  311. }
  312. /*
  313. * delete head of *l and free the old head.
  314. * call with dnlock held.
  315. */
  316. static void
  317. rrdelhead(RR **l)
  318. {
  319. RR *rp;
  320. if (canlock(&dnlock))
  321. abort(); /* rrdelhead called with dnlock not held */
  322. rp = *l;
  323. if(rp == nil)
  324. return;
  325. *l = rp->next; /* unlink head */
  326. rp->cached = 0; /* avoid blowing an assertion in rrfree */
  327. rrfree(rp);
  328. }
  329. /*
  330. * check the age of resource records, free any that have timed out.
  331. * call with dnlock held.
  332. */
  333. void
  334. dnage(DN *dp)
  335. {
  336. RR **l;
  337. RR *rp, *next;
  338. ulong diff;
  339. if (canlock(&dnlock))
  340. abort(); /* dnage called with dnlock not held */
  341. diff = now - dp->referenced;
  342. if(diff < Reserved || dp->keep)
  343. return;
  344. l = &dp->rr;
  345. for(rp = dp->rr; rp; rp = next){
  346. assert(rp->magic == RRmagic && rp->cached);
  347. next = rp->next;
  348. if(!rp->db && (rp->expire < now || diff > dnvars.oldest))
  349. rrdelhead(l); /* rp == *l before; *l == rp->next after */
  350. else
  351. l = &rp->next;
  352. }
  353. }
  354. #define MARK(dp) { if (dp) (dp)->keep = 1; }
  355. /* mark a domain name and those in its RRs as never to be aged */
  356. void
  357. dnagenever(DN *dp, int dolock)
  358. {
  359. RR *rp;
  360. if (dolock)
  361. lock(&dnlock);
  362. /* mark all referenced domain names */
  363. MARK(dp);
  364. for(rp = dp->rr; rp; rp = rp->next){
  365. MARK(rp->owner);
  366. if(rp->negative){
  367. MARK(rp->negsoaowner);
  368. continue;
  369. }
  370. switch(rp->type){
  371. case Thinfo:
  372. MARK(rp->cpu);
  373. MARK(rp->os);
  374. break;
  375. case Ttxt:
  376. break;
  377. case Tcname:
  378. case Tmb:
  379. case Tmd:
  380. case Tmf:
  381. case Tns:
  382. case Tmx:
  383. case Tsrv:
  384. MARK(rp->host);
  385. break;
  386. case Tmg:
  387. case Tmr:
  388. MARK(rp->mb);
  389. break;
  390. case Tminfo:
  391. MARK(rp->rmb);
  392. MARK(rp->mb);
  393. break;
  394. case Trp:
  395. MARK(rp->rmb);
  396. MARK(rp->rp);
  397. break;
  398. case Ta:
  399. case Taaaa:
  400. MARK(rp->ip);
  401. break;
  402. case Tptr:
  403. MARK(rp->ptr);
  404. break;
  405. case Tsoa:
  406. MARK(rp->host);
  407. MARK(rp->rmb);
  408. break;
  409. }
  410. }
  411. if (dolock)
  412. unlock(&dnlock);
  413. }
  414. /* mark all current domain names as never to be aged */
  415. void
  416. dnageallnever(void)
  417. {
  418. int i;
  419. DN *dp;
  420. lock(&dnlock);
  421. /* mark all referenced domain names */
  422. for(i = 0; i < HTLEN; i++)
  423. for(dp = ht[i]; dp; dp = dp->next)
  424. dnagenever(dp, 0);
  425. unlock(&dnlock);
  426. dnslog("%ld initial domain names; target is %ld", dnvars.names, target);
  427. if(dnvars.names >= target)
  428. dnslog("more initial domain names (%ld) than target (%ld)",
  429. dnvars.names, target);
  430. }
  431. #define REF(dp) { if (dp) (dp)->refs++; }
  432. /*
  433. * periodicly sweep for old records and remove unreferenced domain names
  434. *
  435. * only called when all other threads are locked out
  436. */
  437. void
  438. dnageall(int doit)
  439. {
  440. DN *dp, **l;
  441. int i;
  442. RR *rp;
  443. static ulong nextage;
  444. if(dnvars.names < target || (now < nextage && !doit)){
  445. dnvars.oldest = maxage;
  446. return;
  447. }
  448. if(dnvars.names >= target) {
  449. dnslog("more names (%lud) than target (%lud)", dnvars.names,
  450. target);
  451. dnvars.oldest /= 2;
  452. if (dnvars.oldest < Minage)
  453. dnvars.oldest = Minage; /* don't be silly */
  454. }
  455. if (agefreq > dnvars.oldest / 2)
  456. nextage = now + dnvars.oldest / 2;
  457. else
  458. nextage = now + agefreq;
  459. lock(&dnlock);
  460. /* time out all old entries (and set refs to 0) */
  461. for(i = 0; i < HTLEN; i++)
  462. for(dp = ht[i]; dp; dp = dp->next){
  463. dp->refs = 0;
  464. dnage(dp);
  465. }
  466. /* mark all referenced domain names */
  467. for(i = 0; i < HTLEN; i++)
  468. for(dp = ht[i]; dp; dp = dp->next)
  469. for(rp = dp->rr; rp; rp = rp->next){
  470. REF(rp->owner);
  471. if(rp->negative){
  472. REF(rp->negsoaowner);
  473. continue;
  474. }
  475. switch(rp->type){
  476. case Thinfo:
  477. REF(rp->cpu);
  478. REF(rp->os);
  479. break;
  480. case Ttxt:
  481. break;
  482. case Tcname:
  483. case Tmb:
  484. case Tmd:
  485. case Tmf:
  486. case Tns:
  487. case Tmx:
  488. case Tsrv:
  489. REF(rp->host);
  490. break;
  491. case Tmg:
  492. case Tmr:
  493. REF(rp->mb);
  494. break;
  495. case Tminfo:
  496. REF(rp->rmb);
  497. REF(rp->mb);
  498. break;
  499. case Trp:
  500. REF(rp->rmb);
  501. REF(rp->rp);
  502. break;
  503. case Ta:
  504. case Taaaa:
  505. REF(rp->ip);
  506. break;
  507. case Tptr:
  508. REF(rp->ptr);
  509. break;
  510. case Tsoa:
  511. REF(rp->host);
  512. REF(rp->rmb);
  513. break;
  514. }
  515. }
  516. /* sweep and remove unreferenced domain names */
  517. for(i = 0; i < HTLEN; i++){
  518. l = &ht[i];
  519. for(dp = *l; dp; dp = *l){
  520. if(dp->rr == 0 && dp->refs == 0 && !dp->keep){
  521. assert(dp->magic == DNmagic);
  522. *l = dp->next;
  523. if(dp->name)
  524. free(dp->name);
  525. dp->magic = ~dp->magic;
  526. dnvars.names--;
  527. memset(dp, 0, sizeof *dp); /* cause trouble */
  528. free(dp);
  529. continue;
  530. }
  531. l = &dp->next;
  532. }
  533. }
  534. unlock(&dnlock);
  535. }
  536. /*
  537. * timeout all database records (used when rereading db)
  538. */
  539. void
  540. dnagedb(void)
  541. {
  542. DN *dp;
  543. int i;
  544. RR *rp;
  545. lock(&dnlock);
  546. /* time out all database entries */
  547. for(i = 0; i < HTLEN; i++)
  548. for(dp = ht[i]; dp; dp = dp->next) {
  549. dp->keep = 0;
  550. for(rp = dp->rr; rp; rp = rp->next)
  551. if(rp->db)
  552. rp->expire = 0;
  553. }
  554. unlock(&dnlock);
  555. }
  556. /*
  557. * mark all local db records about my area as authoritative,
  558. * time out any others
  559. */
  560. void
  561. dnauthdb(void)
  562. {
  563. int i;
  564. ulong minttl;
  565. Area *area;
  566. DN *dp;
  567. RR *rp;
  568. lock(&dnlock);
  569. /* time out all database entries */
  570. for(i = 0; i < HTLEN; i++)
  571. for(dp = ht[i]; dp; dp = dp->next){
  572. area = inmyarea(dp->name);
  573. for(rp = dp->rr; rp; rp = rp->next)
  574. if(rp->db){
  575. if(area){
  576. minttl = area->soarr->soa->minttl;
  577. if(rp->ttl < minttl)
  578. rp->ttl = minttl;
  579. rp->auth = 1;
  580. }
  581. if(rp->expire == 0){
  582. rp->db = 0;
  583. dp->referenced = now-Reserved-1;
  584. }
  585. }
  586. }
  587. unlock(&dnlock);
  588. }
  589. /*
  590. * keep track of other processes to know if we can
  591. * garbage collect. block while garbage collecting.
  592. */
  593. int
  594. getactivity(Request *req, int recursive)
  595. {
  596. int rv;
  597. if(traceactivity)
  598. dnslog("get: %d active by pid %d from %p",
  599. dnvars.active, getpid(), getcallerpc(&req));
  600. lock(&dnvars);
  601. /*
  602. * can't block here if we're already holding one
  603. * of the dnvars.active (recursive). will deadlock.
  604. */
  605. while(!recursive && dnvars.mutex){
  606. unlock(&dnvars);
  607. sleep(100); /* tune; was 200 */
  608. lock(&dnvars);
  609. }
  610. rv = ++dnvars.active;
  611. now = time(nil);
  612. nowns = nsec();
  613. req->id = ++dnvars.id;
  614. unlock(&dnvars);
  615. return rv;
  616. }
  617. void
  618. putactivity(int recursive)
  619. {
  620. static ulong lastclean;
  621. if(traceactivity)
  622. dnslog("put: %d active by pid %d",
  623. dnvars.active, getpid());
  624. lock(&dnvars);
  625. dnvars.active--;
  626. assert(dnvars.active >= 0); /* "dnvars.active %d", dnvars.active */
  627. /*
  628. * clean out old entries and check for new db periodicly
  629. * can't block here if being called to let go a "recursive" lock
  630. * or we'll deadlock waiting for ourselves to give up the dnvars.active.
  631. */
  632. if (recursive || dnvars.mutex ||
  633. (needrefresh == 0 && dnvars.active > 0)){
  634. unlock(&dnvars);
  635. return;
  636. }
  637. /* wait till we're alone */
  638. dnvars.mutex = 1;
  639. while(dnvars.active > 0){
  640. unlock(&dnvars);
  641. sleep(100); /* tune; was 100 */
  642. lock(&dnvars);
  643. }
  644. unlock(&dnvars);
  645. db2cache(needrefresh);
  646. /* if we've been running for long enough, restart */
  647. if(start == 0)
  648. start = time(nil);
  649. if(0 && time(nil) - start > Restartmins*60){ // TODO
  650. dnslog("killing all dns procs for timed restart");
  651. postnote(PNGROUP, getpid(), "die");
  652. dnvars.mutex = 0;
  653. exits("restart");
  654. }
  655. dnageall(0);
  656. /* let others back in */
  657. lastclean = now;
  658. needrefresh = 0;
  659. dnvars.mutex = 0;
  660. }
  661. int
  662. rrlistlen(RR *rp)
  663. {
  664. int n;
  665. n = 0;
  666. for(; rp; rp = rp->next)
  667. ++n;
  668. return n;
  669. }
  670. /*
  671. * Attach a single resource record to a domain name (new->owner).
  672. * - Avoid duplicates with already present RR's
  673. * - Chain all RR's of the same type adjacent to one another
  674. * - chain authoritative RR's ahead of non-authoritative ones
  675. * - remove any expired RR's
  676. * If new is a stale duplicate, rrfree it.
  677. * Must be called with dnlock held.
  678. */
  679. static void
  680. rrattach1(RR *new, int auth)
  681. {
  682. RR **l;
  683. RR *rp;
  684. DN *dp;
  685. assert(new->magic == RRmagic && !new->cached);
  686. // dnslog("rrattach1: %s", new->owner->name);
  687. if(!new->db) {
  688. /*
  689. * try not to let responses expire before we
  690. * can use them to complete this query, by extending
  691. * past (or nearly past) expiration time.
  692. */
  693. new->expire = new->ttl > now + Min? new->ttl: now + 10*Min;
  694. } else
  695. new->expire = now + Year;
  696. dp = new->owner;
  697. assert(dp->magic == DNmagic);
  698. new->auth |= auth;
  699. new->next = 0;
  700. /*
  701. * find first rr of the right type
  702. */
  703. l = &dp->rr;
  704. for(rp = *l; rp; rp = *l){
  705. assert(rp->magic == RRmagic && rp->cached);
  706. if(rp->type == new->type)
  707. break;
  708. l = &rp->next;
  709. }
  710. /*
  711. * negative entries replace positive entries
  712. * positive entries replace negative entries
  713. * newer entries replace older entries with the same fields
  714. *
  715. * look farther ahead than just the next entry when looking
  716. * for duplicates; RRs of a given type can have different rdata
  717. * fields (e.g. multiple NS servers).
  718. */
  719. while ((rp = *l) != nil){
  720. assert(rp->magic == RRmagic && rp->cached);
  721. if(rp->type != new->type)
  722. break;
  723. if(rp->db == new->db && rp->auth == new->auth){
  724. /* negative drives out positive and vice versa */
  725. if(rp->negative != new->negative) {
  726. /* rp == *l before; *l == rp->next after */
  727. rrdelhead(l);
  728. continue;
  729. }
  730. /* all things equal, pick the newer one */
  731. else if(rp->arg0 == new->arg0 && rp->arg1 == new->arg1){
  732. /* new drives out old */
  733. if (new->ttl <= rp->ttl &&
  734. new->expire <= rp->expire) {
  735. rrfree(new);
  736. return;
  737. }
  738. /* rp == *l before; *l == rp->next after */
  739. rrdelhead(l);
  740. continue;
  741. }
  742. /*
  743. * Hack for pointer records. This makes sure
  744. * the ordering in the list reflects the ordering
  745. * received or read from the database
  746. */
  747. else if(rp->type == Tptr &&
  748. !rp->negative && !new->negative &&
  749. rp->ptr->ordinal > new->ptr->ordinal)
  750. break;
  751. }
  752. l = &rp->next;
  753. }
  754. if (rronlist(new, rp)) {
  755. /* should not happen; duplicates were processed above */
  756. dnslog("adding duplicate %R to list of %R; aborting", new, rp);
  757. abort();
  758. }
  759. /*
  760. * add to chain
  761. */
  762. new->cached = 1;
  763. new->next = rp;
  764. *l = new;
  765. }
  766. /*
  767. * Attach a list of resource records to a domain name.
  768. * May rrfree any stale duplicate RRs; dismembers the list.
  769. * Upon return, every RR in the list will have been rrfree-d
  770. * or attached to its domain name.
  771. * See rrattach1 for properties preserved.
  772. */
  773. void
  774. rrattach(RR *rp, int auth)
  775. {
  776. RR *next, *tp;
  777. DN *dp;
  778. lock(&dnlock);
  779. for(; rp; rp = next){
  780. next = rp->next;
  781. rp->next = nil;
  782. dp = rp->owner;
  783. // dnslog("rrattach: %s", rp->owner->name);
  784. /* avoid any outside spoofing; leave keepers alone */
  785. if(cfg.cachedb && !rp->db && inmyarea(rp->owner->name)
  786. // || dp->keep /* TODO: make this work */
  787. )
  788. rrfree(rp);
  789. else {
  790. /* ameliorate the memory leak (someday delete this) */
  791. if (0 && rrlistlen(dp->rr) > 50 && !dp->keep) {
  792. dnslog("rrattach(%s): rr list too long; "
  793. "freeing it", dp->name);
  794. tp = dp->rr;
  795. dp->rr = nil;
  796. rrfreelist(tp);
  797. } else
  798. USED(dp);
  799. rrattach1(rp, auth);
  800. }
  801. }
  802. unlock(&dnlock);
  803. }
  804. /* should be called with dnlock held */
  805. RR**
  806. rrcopy(RR *rp, RR **last)
  807. {
  808. Cert *cert;
  809. Key *key;
  810. Null *null;
  811. RR *nrp;
  812. SOA *soa;
  813. Sig *sig;
  814. Txt *t, *nt, **l;
  815. if (canlock(&dnlock))
  816. abort(); /* rrcopy called with dnlock not held */
  817. nrp = rralloc(rp->type);
  818. setmalloctag(nrp, getcallerpc(&rp));
  819. switch(rp->type){
  820. case Ttxt:
  821. *nrp = *rp;
  822. l = &nrp->txt;
  823. *l = nil;
  824. for(t = rp->txt; t != nil; t = t->next){
  825. nt = emalloc(sizeof(*nt));
  826. nt->p = estrdup(t->p);
  827. nt->next = nil;
  828. *l = nt;
  829. l = &nt->next;
  830. }
  831. break;
  832. case Tsoa:
  833. soa = nrp->soa;
  834. *nrp = *rp;
  835. nrp->soa = soa;
  836. *nrp->soa = *rp->soa;
  837. nrp->soa->slaves = copyserverlist(rp->soa->slaves);
  838. break;
  839. case Tsrv:
  840. *nrp = *rp;
  841. nrp->srv = emalloc(sizeof *nrp->srv);
  842. *nrp->srv = *rp->srv;
  843. break;
  844. case Tkey:
  845. key = nrp->key;
  846. *nrp = *rp;
  847. nrp->key = key;
  848. *key = *rp->key;
  849. key->data = emalloc(key->dlen);
  850. memmove(key->data, rp->key->data, rp->key->dlen);
  851. break;
  852. case Tsig:
  853. sig = nrp->sig;
  854. *nrp = *rp;
  855. nrp->sig = sig;
  856. *sig = *rp->sig;
  857. sig->data = emalloc(sig->dlen);
  858. memmove(sig->data, rp->sig->data, rp->sig->dlen);
  859. break;
  860. case Tcert:
  861. cert = nrp->cert;
  862. *nrp = *rp;
  863. nrp->cert = cert;
  864. *cert = *rp->cert;
  865. cert->data = emalloc(cert->dlen);
  866. memmove(cert->data, rp->cert->data, rp->cert->dlen);
  867. break;
  868. case Tnull:
  869. null = nrp->null;
  870. *nrp = *rp;
  871. nrp->null = null;
  872. *null = *rp->null;
  873. null->data = emalloc(null->dlen);
  874. memmove(null->data, rp->null->data, rp->null->dlen);
  875. break;
  876. default:
  877. *nrp = *rp;
  878. break;
  879. }
  880. nrp->cached = 0;
  881. nrp->next = 0;
  882. *last = nrp;
  883. return &nrp->next;
  884. }
  885. /*
  886. * lookup a resource record of a particular type and
  887. * class attached to a domain name. Return copies.
  888. *
  889. * Priority ordering is:
  890. * db authoritative
  891. * not timed out network authoritative
  892. * not timed out network unauthoritative
  893. * unauthoritative db
  894. *
  895. * if flag NOneg is set, don't return negative cached entries.
  896. * return nothing instead.
  897. */
  898. RR*
  899. rrlookup(DN *dp, int type, int flag)
  900. {
  901. RR *rp, *first, **last;
  902. assert(dp->magic == DNmagic);
  903. first = 0;
  904. last = &first;
  905. lock(&dnlock);
  906. /* try for an authoritative db entry */
  907. for(rp = dp->rr; rp; rp = rp->next){
  908. assert(rp->magic == RRmagic && rp->cached);
  909. if(rp->db)
  910. if(rp->auth)
  911. if(tsame(type, rp->type)) {
  912. last = rrcopy(rp, last);
  913. // setmalloctag(*last, getcallerpc(&dp));
  914. }
  915. }
  916. if(first)
  917. goto out;
  918. /* try for a living authoritative network entry */
  919. for(rp = dp->rr; rp; rp = rp->next){
  920. if(!rp->db)
  921. if(rp->auth)
  922. if(rp->ttl + 60 > now)
  923. if(tsame(type, rp->type)){
  924. if(flag == NOneg && rp->negative)
  925. goto out;
  926. last = rrcopy(rp, last);
  927. }
  928. }
  929. if(first)
  930. goto out;
  931. /* try for a living unauthoritative network entry */
  932. for(rp = dp->rr; rp; rp = rp->next){
  933. if(!rp->db)
  934. if(rp->ttl + 60 > now)
  935. if(tsame(type, rp->type)){
  936. if(flag == NOneg && rp->negative)
  937. goto out;
  938. last = rrcopy(rp, last);
  939. }
  940. }
  941. if(first)
  942. goto out;
  943. /* try for an unauthoritative db entry */
  944. for(rp = dp->rr; rp; rp = rp->next){
  945. if(rp->db)
  946. if(tsame(type, rp->type))
  947. last = rrcopy(rp, last);
  948. }
  949. if(first)
  950. goto out;
  951. /* otherwise, settle for anything we got (except for negative caches) */
  952. for(rp = dp->rr; rp; rp = rp->next)
  953. if(tsame(type, rp->type)){
  954. if(rp->negative)
  955. goto out;
  956. last = rrcopy(rp, last);
  957. }
  958. out:
  959. unique(first);
  960. unlock(&dnlock);
  961. // dnslog("rrlookup(%s) -> %#p\t# in-core only", dp->name, first);
  962. // if (first)
  963. // setmalloctag(first, getcallerpc(&dp));
  964. return first;
  965. }
  966. /*
  967. * convert an ascii RR type name to its integer representation
  968. */
  969. int
  970. rrtype(char *atype)
  971. {
  972. int i;
  973. for(i = 0; i <= Tall; i++)
  974. if(rrtname[i] && strcmp(rrtname[i], atype) == 0)
  975. return i;
  976. /* make any a synonym for all */
  977. if(strcmp(atype, "any") == 0)
  978. return Tall;
  979. else if(isascii(atype[0]) && isdigit(atype[0]))
  980. return atoi(atype);
  981. else
  982. return -1;
  983. }
  984. /*
  985. * return 0 if not a supported rr type
  986. */
  987. int
  988. rrsupported(int type)
  989. {
  990. if(type < 0 || type >Tall)
  991. return 0;
  992. return rrtname[type] != nil;
  993. }
  994. /*
  995. * compare 2 types
  996. */
  997. int
  998. tsame(int t1, int t2)
  999. {
  1000. return t1 == t2 || t1 == Tall;
  1001. }
  1002. /*
  1003. * Add resource records to a list, duplicate them if they are cached
  1004. * RR's since these are shared. should be called with dnlock held
  1005. * to avoid racing down the start chain.
  1006. */
  1007. RR*
  1008. rrcat(RR **start, RR *rp)
  1009. {
  1010. RR *olp, *nlp;
  1011. RR **last;
  1012. if (canlock(&dnlock))
  1013. abort(); /* rrcat called with dnlock not held */
  1014. /* check for duplicates */
  1015. for (olp = *start; 0 && olp; olp = olp->next)
  1016. for (nlp = rp; nlp; nlp = nlp->next)
  1017. if (rrsame(nlp, olp))
  1018. dnslog("rrcat: duplicate RR: %R", nlp);
  1019. USED(olp);
  1020. last = start;
  1021. while(*last != nil)
  1022. last = &(*last)->next;
  1023. *last = rp;
  1024. return *start;
  1025. }
  1026. /*
  1027. * remove negative cache rr's from an rr list
  1028. */
  1029. RR*
  1030. rrremneg(RR **l)
  1031. {
  1032. RR **nl, *rp;
  1033. RR *first;
  1034. if (canlock(&dnlock))
  1035. abort(); /* rrremneg called with dnlock not held */
  1036. first = nil;
  1037. nl = &first;
  1038. while(*l != nil){
  1039. rp = *l;
  1040. if(rp->negative){
  1041. *l = rp->next;
  1042. *nl = rp;
  1043. nl = &rp->next;
  1044. *nl = nil;
  1045. } else
  1046. l = &rp->next;
  1047. }
  1048. return first;
  1049. }
  1050. /*
  1051. * remove rr's of a particular type from an rr list
  1052. */
  1053. RR*
  1054. rrremtype(RR **l, int type)
  1055. {
  1056. RR *first, *rp;
  1057. RR **nl;
  1058. first = nil;
  1059. nl = &first;
  1060. while(*l != nil){
  1061. rp = *l;
  1062. if(rp->type == type){
  1063. *l = rp->next;
  1064. *nl = rp;
  1065. nl = &rp->next;
  1066. *nl = nil;
  1067. } else
  1068. l = &(*l)->next;
  1069. }
  1070. return first;
  1071. }
  1072. static char *
  1073. dnname(DN *dn)
  1074. {
  1075. return dn? dn->name: "<null>";
  1076. }
  1077. /*
  1078. * print conversion for rr records
  1079. */
  1080. int
  1081. rrfmt(Fmt *f)
  1082. {
  1083. int rv;
  1084. char *strp;
  1085. char buf[Domlen];
  1086. Fmt fstr;
  1087. RR *rp;
  1088. Server *s;
  1089. SOA *soa;
  1090. Srv *srv;
  1091. Txt *t;
  1092. fmtstrinit(&fstr);
  1093. rp = va_arg(f->args, RR*);
  1094. if(rp == nil){
  1095. fmtprint(&fstr, "<null>");
  1096. goto out;
  1097. }
  1098. fmtprint(&fstr, "%s %s", dnname(rp->owner),
  1099. rrname(rp->type, buf, sizeof buf));
  1100. if(rp->negative){
  1101. fmtprint(&fstr, "\tnegative - rcode %d", rp->negrcode);
  1102. goto out;
  1103. }
  1104. switch(rp->type){
  1105. case Thinfo:
  1106. fmtprint(&fstr, "\t%s %s", dnname(rp->cpu), dnname(rp->os));
  1107. break;
  1108. case Tcname:
  1109. case Tmb:
  1110. case Tmd:
  1111. case Tmf:
  1112. case Tns:
  1113. fmtprint(&fstr, "\t%s", dnname(rp->host));
  1114. break;
  1115. case Tmg:
  1116. case Tmr:
  1117. fmtprint(&fstr, "\t%s", dnname(rp->mb));
  1118. break;
  1119. case Tminfo:
  1120. fmtprint(&fstr, "\t%s %s", dnname(rp->mb), dnname(rp->rmb));
  1121. break;
  1122. case Tmx:
  1123. fmtprint(&fstr, "\t%lud %s", rp->pref, dnname(rp->host));
  1124. break;
  1125. case Ta:
  1126. case Taaaa:
  1127. fmtprint(&fstr, "\t%s", dnname(rp->ip));
  1128. break;
  1129. case Tptr:
  1130. // fmtprint(&fstr, "\t%s(%lud)", dnname(rp->ptr),
  1131. // rp->ptr? rp->ptr->ordinal: "<null>");
  1132. fmtprint(&fstr, "\t%s", dnname(rp->ptr));
  1133. break;
  1134. case Tsoa:
  1135. soa = rp->soa;
  1136. fmtprint(&fstr, "\t%s %s %lud %lud %lud %lud %lud",
  1137. dnname(rp->host), dnname(rp->rmb),
  1138. (soa? soa->serial: 0),
  1139. (soa? soa->refresh: 0), (soa? soa->retry: 0),
  1140. (soa? soa->expire: 0), (soa? soa->minttl: 0));
  1141. if (soa)
  1142. for(s = soa->slaves; s != nil; s = s->next)
  1143. fmtprint(&fstr, " %s", s->name);
  1144. break;
  1145. case Tsrv:
  1146. srv = rp->srv;
  1147. fmtprint(&fstr, "\t%ud %ud %ud %s",
  1148. (srv? srv->pri: 0), (srv? srv->weight: 0),
  1149. rp->port, dnname(rp->host));
  1150. break;
  1151. case Tnull:
  1152. if (rp->null == nil)
  1153. fmtprint(&fstr, "\t<null>");
  1154. else
  1155. fmtprint(&fstr, "\t%.*H", rp->null->dlen,
  1156. rp->null->data);
  1157. break;
  1158. case Ttxt:
  1159. fmtprint(&fstr, "\t");
  1160. for(t = rp->txt; t != nil; t = t->next)
  1161. fmtprint(&fstr, "%s", t->p);
  1162. break;
  1163. case Trp:
  1164. fmtprint(&fstr, "\t%s %s", dnname(rp->rmb), dnname(rp->rp));
  1165. break;
  1166. case Tkey:
  1167. if (rp->key == nil)
  1168. fmtprint(&fstr, "\t<null> <null> <null>");
  1169. else
  1170. fmtprint(&fstr, "\t%d %d %d", rp->key->flags,
  1171. rp->key->proto, rp->key->alg);
  1172. break;
  1173. case Tsig:
  1174. if (rp->sig == nil)
  1175. fmtprint(&fstr,
  1176. "\t<null> <null> <null> <null> <null> <null> <null> <null>");
  1177. else
  1178. fmtprint(&fstr, "\t%d %d %d %lud %lud %lud %d %s",
  1179. rp->sig->type, rp->sig->alg, rp->sig->labels,
  1180. rp->sig->ttl, rp->sig->exp, rp->sig->incep,
  1181. rp->sig->tag, dnname(rp->sig->signer));
  1182. break;
  1183. case Tcert:
  1184. if (rp->cert == nil)
  1185. fmtprint(&fstr, "\t<null> <null> <null>");
  1186. else
  1187. fmtprint(&fstr, "\t%d %d %d",
  1188. rp->cert->type, rp->cert->tag, rp->cert->alg);
  1189. break;
  1190. }
  1191. out:
  1192. strp = fmtstrflush(&fstr);
  1193. rv = fmtstrcpy(f, strp);
  1194. free(strp);
  1195. return rv;
  1196. }
  1197. /*
  1198. * print conversion for rr records in attribute value form
  1199. */
  1200. int
  1201. rravfmt(Fmt *f)
  1202. {
  1203. int rv, quote;
  1204. char *strp;
  1205. Fmt fstr;
  1206. RR *rp;
  1207. Server *s;
  1208. SOA *soa;
  1209. Srv *srv;
  1210. Txt *t;
  1211. fmtstrinit(&fstr);
  1212. rp = va_arg(f->args, RR*);
  1213. if(rp == nil){
  1214. fmtprint(&fstr, "<null>");
  1215. goto out;
  1216. }
  1217. if(rp->type == Tptr)
  1218. fmtprint(&fstr, "ptr=%s", dnname(rp->owner));
  1219. else
  1220. fmtprint(&fstr, "dom=%s", dnname(rp->owner));
  1221. switch(rp->type){
  1222. case Thinfo:
  1223. fmtprint(&fstr, " cpu=%s os=%s",
  1224. dnname(rp->cpu), dnname(rp->os));
  1225. break;
  1226. case Tcname:
  1227. fmtprint(&fstr, " cname=%s", dnname(rp->host));
  1228. break;
  1229. case Tmb:
  1230. case Tmd:
  1231. case Tmf:
  1232. fmtprint(&fstr, " mbox=%s", dnname(rp->host));
  1233. break;
  1234. case Tns:
  1235. fmtprint(&fstr, " ns=%s", dnname(rp->host));
  1236. break;
  1237. case Tmg:
  1238. case Tmr:
  1239. fmtprint(&fstr, " mbox=%s", dnname(rp->mb));
  1240. break;
  1241. case Tminfo:
  1242. fmtprint(&fstr, " mbox=%s mbox=%s",
  1243. dnname(rp->mb), dnname(rp->rmb));
  1244. break;
  1245. case Tmx:
  1246. fmtprint(&fstr, " pref=%lud mx=%s", rp->pref, dnname(rp->host));
  1247. break;
  1248. case Ta:
  1249. case Taaaa:
  1250. fmtprint(&fstr, " ip=%s", dnname(rp->ip));
  1251. break;
  1252. case Tptr:
  1253. fmtprint(&fstr, " dom=%s", dnname(rp->ptr));
  1254. break;
  1255. case Tsoa:
  1256. soa = rp->soa;
  1257. fmtprint(&fstr,
  1258. " ns=%s mbox=%s serial=%lud refresh=%lud retry=%lud expire=%lud ttl=%lud",
  1259. dnname(rp->host), dnname(rp->rmb),
  1260. (soa? soa->serial: 0),
  1261. (soa? soa->refresh: 0), (soa? soa->retry: 0),
  1262. (soa? soa->expire: 0), (soa? soa->minttl: 0));
  1263. for(s = soa->slaves; s != nil; s = s->next)
  1264. fmtprint(&fstr, " dnsslave=%s", s->name);
  1265. break;
  1266. case Tsrv:
  1267. srv = rp->srv;
  1268. fmtprint(&fstr, " pri=%ud weight=%ud port=%ud target=%s",
  1269. (srv? srv->pri: 0), (srv? srv->weight: 0),
  1270. rp->port, dnname(rp->host));
  1271. break;
  1272. case Tnull:
  1273. if (rp->null == nil)
  1274. fmtprint(&fstr, " null=<null>");
  1275. else
  1276. fmtprint(&fstr, " null=%.*H", rp->null->dlen,
  1277. rp->null->data);
  1278. break;
  1279. case Ttxt:
  1280. fmtprint(&fstr, " txt=");
  1281. quote = 0;
  1282. for(t = rp->txt; t != nil; t = t->next)
  1283. if(strchr(t->p, ' '))
  1284. quote = 1;
  1285. if(quote)
  1286. fmtprint(&fstr, "\"");
  1287. for(t = rp->txt; t != nil; t = t->next)
  1288. fmtprint(&fstr, "%s", t->p);
  1289. if(quote)
  1290. fmtprint(&fstr, "\"");
  1291. break;
  1292. case Trp:
  1293. fmtprint(&fstr, " rp=%s txt=%s",
  1294. dnname(rp->rmb), dnname(rp->rp));
  1295. break;
  1296. case Tkey:
  1297. if (rp->key == nil)
  1298. fmtprint(&fstr, " flags=<null> proto=<null> alg=<null>");
  1299. else
  1300. fmtprint(&fstr, " flags=%d proto=%d alg=%d",
  1301. rp->key->flags, rp->key->proto, rp->key->alg);
  1302. break;
  1303. case Tsig:
  1304. if (rp->sig == nil)
  1305. fmtprint(&fstr,
  1306. " type=<null> alg=<null> labels=<null> ttl=<null> exp=<null> incep=<null> tag=<null> signer=<null>");
  1307. else
  1308. fmtprint(&fstr,
  1309. " type=%d alg=%d labels=%d ttl=%lud exp=%lud incep=%lud tag=%d signer=%s",
  1310. rp->sig->type, rp->sig->alg, rp->sig->labels,
  1311. rp->sig->ttl, rp->sig->exp, rp->sig->incep,
  1312. rp->sig->tag, dnname(rp->sig->signer));
  1313. break;
  1314. case Tcert:
  1315. if (rp->cert == nil)
  1316. fmtprint(&fstr, " type=<null> tag=<null> alg=<null>");
  1317. else
  1318. fmtprint(&fstr, " type=%d tag=%d alg=%d",
  1319. rp->cert->type, rp->cert->tag, rp->cert->alg);
  1320. break;
  1321. }
  1322. out:
  1323. strp = fmtstrflush(&fstr);
  1324. rv = fmtstrcpy(f, strp);
  1325. free(strp);
  1326. return rv;
  1327. }
  1328. void
  1329. warning(char *fmt, ...)
  1330. {
  1331. char dnserr[256];
  1332. va_list arg;
  1333. va_start(arg, fmt);
  1334. vseprint(dnserr, dnserr+sizeof(dnserr), fmt, arg);
  1335. va_end(arg);
  1336. syslog(1, logfile, dnserr); /* on console too */
  1337. }
  1338. void
  1339. dnslog(char *fmt, ...)
  1340. {
  1341. char dnserr[256];
  1342. va_list arg;
  1343. va_start(arg, fmt);
  1344. vseprint(dnserr, dnserr+sizeof(dnserr), fmt, arg);
  1345. va_end(arg);
  1346. syslog(0, logfile, dnserr);
  1347. }
  1348. /*
  1349. * based on libthread's threadsetname, but drags in less library code.
  1350. * actually just sets the arguments displayed.
  1351. */
  1352. void
  1353. procsetname(char *fmt, ...)
  1354. {
  1355. int fd;
  1356. char *cmdname;
  1357. char buf[128];
  1358. va_list arg;
  1359. va_start(arg, fmt);
  1360. cmdname = vsmprint(fmt, arg);
  1361. va_end(arg);
  1362. if (cmdname == nil)
  1363. return;
  1364. snprint(buf, sizeof buf, "#p/%d/args", getpid());
  1365. if((fd = open(buf, OWRITE)) >= 0){
  1366. write(fd, cmdname, strlen(cmdname)+1);
  1367. close(fd);
  1368. }
  1369. free(cmdname);
  1370. }
  1371. /*
  1372. * create a slave process to handle a request to avoid one request blocking
  1373. * another
  1374. */
  1375. void
  1376. slave(Request *req)
  1377. {
  1378. int ppid, procs;
  1379. if(req->isslave)
  1380. return; /* we're already a slave process */
  1381. /*
  1382. * These calls to putactivity cannot block.
  1383. * After getactivity(), the current process is counted
  1384. * twice in dnvars.active (one will pass to the child).
  1385. * If putactivity tries to wait for dnvars.active == 0,
  1386. * it will never happen.
  1387. */
  1388. /* limit parallelism */
  1389. procs = getactivity(req, 1);
  1390. if (procs > stats.slavehiwat)
  1391. stats.slavehiwat = procs;
  1392. if(procs > Maxactive){
  1393. if(traceactivity)
  1394. dnslog("[%d] too much activity", getpid());
  1395. putactivity(1);
  1396. return;
  1397. }
  1398. /*
  1399. * parent returns to main loop, child does the work.
  1400. * don't change note group.
  1401. */
  1402. ppid = getpid();
  1403. switch(rfork(RFPROC|RFMEM|RFNOWAIT)){
  1404. case -1:
  1405. putactivity(1);
  1406. break;
  1407. case 0:
  1408. procsetname("request slave of pid %d", ppid);
  1409. if(traceactivity)
  1410. dnslog("[%d] take activity from %d", getpid(), ppid);
  1411. req->isslave = 1; /* why not `= getpid()'? */
  1412. break;
  1413. default:
  1414. /*
  1415. * this relies on rfork producing separate, initially-identical
  1416. * stacks, thus giving us two copies of `req', one in each
  1417. * process.
  1418. */
  1419. alarm(0);
  1420. longjmp(req->mret, 1);
  1421. }
  1422. }
  1423. /*
  1424. * chasing down double free's
  1425. */
  1426. void
  1427. dncheck(void *p, int dolock)
  1428. {
  1429. int i;
  1430. DN *dp;
  1431. RR *rp;
  1432. if(p != nil){
  1433. dp = p;
  1434. assert(dp->magic == DNmagic);
  1435. }
  1436. if(!testing)
  1437. return;
  1438. if(dolock)
  1439. lock(&dnlock);
  1440. poolcheck(mainmem);
  1441. for(i = 0; i < HTLEN; i++)
  1442. for(dp = ht[i]; dp; dp = dp->next){
  1443. assert(dp != p);
  1444. assert(dp->magic == DNmagic);
  1445. for(rp = dp->rr; rp; rp = rp->next){
  1446. assert(rp->magic == RRmagic);
  1447. assert(rp->cached);
  1448. assert(rp->owner == dp);
  1449. /* also check for duplicate rrs */
  1450. if (dolock && rronlist(rp, rp->next)) {
  1451. dnslog("%R duplicates its next chain "
  1452. "(%R); aborting", rp, rp->next);
  1453. abort();
  1454. }
  1455. }
  1456. }
  1457. if(dolock)
  1458. unlock(&dnlock);
  1459. }
  1460. static int
  1461. rrequiv(RR *r1, RR *r2)
  1462. {
  1463. return r1->owner == r2->owner
  1464. && r1->type == r2->type
  1465. && r1->arg0 == r2->arg0
  1466. && r1->arg1 == r2->arg1;
  1467. }
  1468. /* called with dnlock held */
  1469. void
  1470. unique(RR *rp)
  1471. {
  1472. RR **l, *nrp;
  1473. for(; rp; rp = rp->next){
  1474. l = &rp->next;
  1475. for(nrp = *l; nrp; nrp = *l)
  1476. if(rrequiv(rp, nrp)){
  1477. *l = nrp->next;
  1478. rrfree(nrp);
  1479. } else
  1480. l = &nrp->next;
  1481. }
  1482. }
  1483. /*
  1484. * true if second domain is subsumed by the first
  1485. */
  1486. int
  1487. subsume(char *higher, char *lower)
  1488. {
  1489. int hn, ln;
  1490. ln = strlen(lower);
  1491. hn = strlen(higher);
  1492. if (ln < hn || cistrcmp(lower + ln - hn, higher) != 0 ||
  1493. ln > hn && hn != 0 && lower[ln - hn - 1] != '.')
  1494. return 0;
  1495. return 1;
  1496. }
  1497. /*
  1498. * randomize the order we return items to provide some
  1499. * load balancing for servers.
  1500. *
  1501. * only randomize the first class of entries
  1502. */
  1503. RR*
  1504. randomize(RR *rp)
  1505. {
  1506. RR *first, *last, *x, *base;
  1507. ulong n;
  1508. if(rp == nil || rp->next == nil)
  1509. return rp;
  1510. /* just randomize addresses, mx's and ns's */
  1511. for(x = rp; x; x = x->next)
  1512. if(x->type != Ta && x->type != Taaaa &&
  1513. x->type != Tmx && x->type != Tns)
  1514. return rp;
  1515. base = rp;
  1516. n = rand();
  1517. last = first = nil;
  1518. while(rp != nil){
  1519. /* stop randomizing if we've moved past our class */
  1520. if(base->auth != rp->auth || base->db != rp->db){
  1521. last->next = rp;
  1522. break;
  1523. }
  1524. /* unchain */
  1525. x = rp;
  1526. rp = x->next;
  1527. x->next = nil;
  1528. if(n&1){
  1529. /* add to tail */
  1530. if(last == nil)
  1531. first = x;
  1532. else
  1533. last->next = x;
  1534. last = x;
  1535. } else {
  1536. /* add to head */
  1537. if(last == nil)
  1538. last = x;
  1539. x->next = first;
  1540. first = x;
  1541. }
  1542. /* reroll the dice */
  1543. n >>= 1;
  1544. }
  1545. return first;
  1546. }
  1547. static int
  1548. sencodefmt(Fmt *f)
  1549. {
  1550. int i, len, ilen, rv;
  1551. char *out, *buf;
  1552. uchar *b;
  1553. char obuf[64]; /* rsc optimization */
  1554. if(!(f->flags&FmtPrec) || f->prec < 1)
  1555. goto error;
  1556. b = va_arg(f->args, uchar*);
  1557. if(b == nil)
  1558. goto error;
  1559. /* if it's a printable, go for it */
  1560. len = f->prec;
  1561. for(i = 0; i < len; i++)
  1562. if(!isprint(b[i]))
  1563. break;
  1564. if(i == len){
  1565. if(len >= sizeof obuf)
  1566. len = sizeof(obuf)-1;
  1567. memmove(obuf, b, len);
  1568. obuf[len] = 0;
  1569. fmtstrcpy(f, obuf);
  1570. return 0;
  1571. }
  1572. ilen = f->prec;
  1573. f->prec = 0;
  1574. f->flags &= ~FmtPrec;
  1575. switch(f->r){
  1576. case '<':
  1577. len = (8*ilen+4)/5 + 3;
  1578. break;
  1579. case '[':
  1580. len = (8*ilen+5)/6 + 4;
  1581. break;
  1582. case 'H':
  1583. len = 2*ilen + 1;
  1584. break;
  1585. default:
  1586. goto error;
  1587. }
  1588. if(len > sizeof(obuf)){
  1589. buf = malloc(len);
  1590. if(buf == nil)
  1591. goto error;
  1592. } else
  1593. buf = obuf;
  1594. /* convert */
  1595. out = buf;
  1596. switch(f->r){
  1597. case '<':
  1598. rv = enc32(out, len, b, ilen);
  1599. break;
  1600. case '[':
  1601. rv = enc64(out, len, b, ilen);
  1602. break;
  1603. case 'H':
  1604. rv = enc16(out, len, b, ilen);
  1605. break;
  1606. default:
  1607. rv = -1;
  1608. break;
  1609. }
  1610. if(rv < 0)
  1611. goto error;
  1612. fmtstrcpy(f, buf);
  1613. if(buf != obuf)
  1614. free(buf);
  1615. return 0;
  1616. error:
  1617. return fmtstrcpy(f, "<encodefmt>");
  1618. }
  1619. void*
  1620. emalloc(int size)
  1621. {
  1622. char *x;
  1623. x = mallocz(size, 1);
  1624. if(x == nil)
  1625. abort();
  1626. setmalloctag(x, getcallerpc(&size));
  1627. return x;
  1628. }
  1629. char*
  1630. estrdup(char *s)
  1631. {
  1632. int size;
  1633. char *p;
  1634. size = strlen(s)+1;
  1635. p = mallocz(size, 0);
  1636. if(p == nil)
  1637. abort();
  1638. memmove(p, s, size);
  1639. setmalloctag(p, getcallerpc(&s));
  1640. return p;
  1641. }
  1642. /*
  1643. * create a pointer record
  1644. */
  1645. static RR*
  1646. mkptr(DN *dp, char *ptr, ulong ttl)
  1647. {
  1648. DN *ipdp;
  1649. RR *rp;
  1650. ipdp = dnlookup(ptr, Cin, 1);
  1651. rp = rralloc(Tptr);
  1652. rp->ptr = dp;
  1653. rp->owner = ipdp;
  1654. rp->db = 1;
  1655. if(ttl)
  1656. rp->ttl = ttl;
  1657. return rp;
  1658. }
  1659. void bytes2nibbles(uchar *nibbles, uchar *bytes, int nbytes);
  1660. /*
  1661. * look for all ip addresses in this network and make
  1662. * pointer records for them.
  1663. */
  1664. void
  1665. dnptr(uchar *net, uchar *mask, char *dom, int forwtype, int subdoms, int ttl)
  1666. {
  1667. int i, j, len;
  1668. char *p, *e;
  1669. char ptr[Domlen];
  1670. uchar *ipp;
  1671. uchar ip[IPaddrlen], nnet[IPaddrlen];
  1672. uchar nibip[IPaddrlen*2];
  1673. DN *dp;
  1674. RR *rp, *nrp, *first, **l;
  1675. l = &first;
  1676. first = nil;
  1677. for(i = 0; i < HTLEN; i++)
  1678. for(dp = ht[i]; dp; dp = dp->next)
  1679. for(rp = dp->rr; rp; rp = rp->next){
  1680. if(rp->type != forwtype || rp->negative)
  1681. continue;
  1682. parseip(ip, rp->ip->name);
  1683. maskip(ip, mask, nnet);
  1684. if(ipcmp(net, nnet) != 0)
  1685. continue;
  1686. ipp = ip;
  1687. len = IPaddrlen;
  1688. if (forwtype == Taaaa) {
  1689. bytes2nibbles(nibip, ip, IPaddrlen);
  1690. ipp = nibip;
  1691. len = 2*IPaddrlen;
  1692. }
  1693. p = ptr;
  1694. e = ptr+sizeof(ptr);
  1695. for(j = len - 1; j >= len - subdoms; j--)
  1696. p = seprint(p, e, (forwtype == Ta?
  1697. "%d.": "%x."), ipp[j]);
  1698. seprint(p, e, "%s", dom);
  1699. nrp = mkptr(dp, ptr, ttl);
  1700. *l = nrp;
  1701. l = &nrp->next;
  1702. }
  1703. for(rp = first; rp != nil; rp = nrp){
  1704. nrp = rp->next;
  1705. rp->next = nil;
  1706. rrattach(rp, Authoritative);
  1707. }
  1708. }
  1709. void
  1710. addserver(Server **l, char *name)
  1711. {
  1712. Server *s;
  1713. while(*l)
  1714. l = &(*l)->next;
  1715. s = malloc(sizeof(Server)+strlen(name)+1);
  1716. if(s == nil)
  1717. return;
  1718. s->name = (char*)(s+1);
  1719. strcpy(s->name, name);
  1720. s->next = nil;
  1721. *l = s;
  1722. }
  1723. Server*
  1724. copyserverlist(Server *s)
  1725. {
  1726. Server *ns;
  1727. for(ns = nil; s != nil; s = s->next)
  1728. addserver(&ns, s->name);
  1729. return ns;
  1730. }
  1731. /* from here down is copied to ip/snoopy/dns.c periodically to update it */
  1732. /*
  1733. * convert an integer RR type to it's ascii name
  1734. */
  1735. char*
  1736. rrname(int type, char *buf, int len)
  1737. {
  1738. char *t;
  1739. t = nil;
  1740. if(type >= 0 && type <= Tall)
  1741. t = rrtname[type];
  1742. if(t==nil){
  1743. snprint(buf, len, "%d", type);
  1744. t = buf;
  1745. }
  1746. return t;
  1747. }
  1748. /*
  1749. * free a list of resource records and any related structs
  1750. */
  1751. void
  1752. rrfreelist(RR *rp)
  1753. {
  1754. RR *next;
  1755. for(; rp; rp = next){
  1756. next = rp->next;
  1757. rrfree(rp);
  1758. }
  1759. }
  1760. void
  1761. freeserverlist(Server *s)
  1762. {
  1763. Server *next;
  1764. for(; s != nil; s = next){
  1765. next = s->next;
  1766. free(s);
  1767. }
  1768. }
  1769. /*
  1770. * allocate a resource record of a given type
  1771. */
  1772. RR*
  1773. rralloc(int type)
  1774. {
  1775. RR *rp;
  1776. rp = emalloc(sizeof(*rp));
  1777. rp->magic = RRmagic;
  1778. rp->pc = getcallerpc(&type);
  1779. rp->type = type;
  1780. if (rp->type != type)
  1781. dnslog("rralloc: bogus type %d", type);
  1782. setmalloctag(rp, rp->pc);
  1783. switch(type){
  1784. case Tsoa:
  1785. rp->soa = emalloc(sizeof(*rp->soa));
  1786. rp->soa->slaves = nil;
  1787. setmalloctag(rp->soa, rp->pc);
  1788. break;
  1789. case Tsrv:
  1790. rp->srv = emalloc(sizeof(*rp->srv));
  1791. setmalloctag(rp->srv, rp->pc);
  1792. break;
  1793. case Tkey:
  1794. rp->key = emalloc(sizeof(*rp->key));
  1795. setmalloctag(rp->key, rp->pc);
  1796. break;
  1797. case Tcert:
  1798. rp->cert = emalloc(sizeof(*rp->cert));
  1799. setmalloctag(rp->cert, rp->pc);
  1800. break;
  1801. case Tsig:
  1802. rp->sig = emalloc(sizeof(*rp->sig));
  1803. setmalloctag(rp->sig, rp->pc);
  1804. break;
  1805. case Tnull:
  1806. rp->null = emalloc(sizeof(*rp->null));
  1807. setmalloctag(rp->null, rp->pc);
  1808. break;
  1809. }
  1810. rp->ttl = 0;
  1811. rp->expire = 0;
  1812. rp->next = 0;
  1813. return rp;
  1814. }
  1815. /*
  1816. * free a resource record and any related structs
  1817. */
  1818. void
  1819. rrfree(RR *rp)
  1820. {
  1821. DN *dp;
  1822. RR *nrp;
  1823. Txt *t;
  1824. assert(rp->magic == RRmagic);
  1825. assert(!rp->cached);
  1826. /* our callers often hold dnlock. it's needed to examine dp safely. */
  1827. dp = rp->owner;
  1828. if(dp){
  1829. /* if someone else holds dnlock, skip the sanity check. */
  1830. if (canlock(&dnlock)) {
  1831. assert(dp->magic == DNmagic);
  1832. for(nrp = dp->rr; nrp; nrp = nrp->next)
  1833. assert(nrp != rp); /* "rrfree of live rr" */
  1834. unlock(&dnlock);
  1835. }
  1836. }
  1837. switch(rp->type){
  1838. case Tsoa:
  1839. freeserverlist(rp->soa->slaves);
  1840. memset(rp->soa, 0, sizeof *rp->soa); /* cause trouble */
  1841. free(rp->soa);
  1842. break;
  1843. case Tsrv:
  1844. memset(rp->srv, 0, sizeof *rp->srv); /* cause trouble */
  1845. free(rp->srv);
  1846. break;
  1847. case Tkey:
  1848. free(rp->key->data);
  1849. memset(rp->key, 0, sizeof *rp->key); /* cause trouble */
  1850. free(rp->key);
  1851. break;
  1852. case Tcert:
  1853. free(rp->cert->data);
  1854. memset(rp->cert, 0, sizeof *rp->cert); /* cause trouble */
  1855. free(rp->cert);
  1856. break;
  1857. case Tsig:
  1858. free(rp->sig->data);
  1859. memset(rp->sig, 0, sizeof *rp->sig); /* cause trouble */
  1860. free(rp->sig);
  1861. break;
  1862. case Tnull:
  1863. free(rp->null->data);
  1864. memset(rp->null, 0, sizeof *rp->null); /* cause trouble */
  1865. free(rp->null);
  1866. break;
  1867. case Ttxt:
  1868. while(rp->txt != nil){
  1869. t = rp->txt;
  1870. rp->txt = t->next;
  1871. free(t->p);
  1872. memset(t, 0, sizeof *t); /* cause trouble */
  1873. free(t);
  1874. }
  1875. break;
  1876. }
  1877. rp->magic = ~rp->magic;
  1878. memset(rp, 0, sizeof *rp); /* cause trouble */
  1879. free(rp);
  1880. }