xfrd.c revision 1.1.1.2 1 1.1 christos /*
2 1.1 christos * xfrd.c - XFR (transfer) Daemon source file. Coordinates SOA updates.
3 1.1 christos *
4 1.1 christos * Copyright (c) 2001-2006, NLnet Labs. All rights reserved.
5 1.1 christos *
6 1.1 christos * See LICENSE for the license.
7 1.1 christos *
8 1.1 christos */
9 1.1 christos
10 1.1 christos #include "config.h"
11 1.1 christos #include <assert.h>
12 1.1 christos #include <string.h>
13 1.1 christos #include <unistd.h>
14 1.1 christos #include <stdlib.h>
15 1.1 christos #include <errno.h>
16 1.1 christos #include <sys/types.h>
17 1.1 christos #include <sys/wait.h>
18 1.1 christos #include "xfrd.h"
19 1.1 christos #include "xfrd-tcp.h"
20 1.1 christos #include "xfrd-disk.h"
21 1.1 christos #include "xfrd-notify.h"
22 1.1 christos #include "options.h"
23 1.1 christos #include "util.h"
24 1.1 christos #include "netio.h"
25 1.1 christos #include "region-allocator.h"
26 1.1 christos #include "nsd.h"
27 1.1 christos #include "packet.h"
28 1.1 christos #include "rdata.h"
29 1.1 christos #include "difffile.h"
30 1.1 christos #include "ipc.h"
31 1.1 christos #include "remote.h"
32 1.1 christos
33 1.1 christos #define XFRD_UDP_TIMEOUT 10 /* seconds, before a udp request times out */
34 1.1 christos #define XFRD_NO_IXFR_CACHE 172800 /* 48h before retrying ixfr's after notimpl */
35 1.1 christos #define XFRD_LOWERBOUND_REFRESH 1 /* seconds, smallest refresh timeout */
36 1.1 christos #define XFRD_LOWERBOUND_RETRY 1 /* seconds, smallest retry timeout */
37 1.1 christos #define XFRD_MAX_ROUNDS 1 /* max number of rounds along the masters */
38 1.1 christos #define XFRD_TSIG_MAX_UNSIGNED 103 /* max number of packets without tsig in a tcp stream. */
39 1.1 christos /* rfc recommends 100, +3 for offbyone errors/interoperability. */
40 1.1 christos #define XFRD_CHILD_REAP_TIMEOUT 60 /* seconds to wakeup and reap lost children */
41 1.1 christos /* these are reload processes that SIGCHILDed but the signal
42 1.1 christos * was lost, and need waitpid to remove their process entry. */
43 1.1 christos
44 1.1 christos /* the daemon state */
45 1.1.1.2 christos xfrd_state_type* xfrd = 0;
46 1.1 christos
47 1.1 christos /* main xfrd loop */
48 1.1 christos static void xfrd_main(void);
49 1.1 christos /* shut down xfrd, close sockets. */
50 1.1 christos static void xfrd_shutdown(void);
51 1.1 christos /* delete pending task xfr files in tmp */
52 1.1 christos static void xfrd_clean_pending_tasks(struct nsd* nsd, udb_base* u);
53 1.1 christos /* create zone rbtree at start */
54 1.1 christos static void xfrd_init_zones(void);
55 1.1 christos /* initial handshake with SOAINFO from main and send expire to main */
56 1.1 christos static void xfrd_receive_soa(int socket, int shortsoa);
57 1.1 christos
58 1.1 christos /* handle incoming notification message. soa can be NULL. true if transfer needed. */
59 1.1.1.2 christos static int xfrd_handle_incoming_notify(xfrd_zone_type* zone,
60 1.1.1.2 christos xfrd_soa_type* soa);
61 1.1 christos
62 1.1 christos /* call with buffer just after the soa dname. returns 0 on error. */
63 1.1.1.2 christos static int xfrd_parse_soa_info(buffer_type* packet, xfrd_soa_type* soa);
64 1.1 christos /* set the zone state to a new state (takes care of expiry messages) */
65 1.1.1.2 christos static void xfrd_set_zone_state(xfrd_zone_type* zone,
66 1.1.1.2 christos enum xfrd_zone_state new_zone_state);
67 1.1 christos /* set timer for retry amount (depends on zone_state) */
68 1.1.1.2 christos static void xfrd_set_timer_retry(xfrd_zone_type* zone);
69 1.1 christos /* set timer for refresh timeout (depends on zone_state) */
70 1.1.1.2 christos static void xfrd_set_timer_refresh(xfrd_zone_type* zone);
71 1.1 christos
72 1.1 christos /* set reload timeout */
73 1.1 christos static void xfrd_set_reload_timeout(void);
74 1.1 christos /* handle reload timeout */
75 1.1 christos static void xfrd_handle_reload(int fd, short event, void* arg);
76 1.1 christos /* handle child timeout */
77 1.1 christos static void xfrd_handle_child_timer(int fd, short event, void* arg);
78 1.1 christos
79 1.1 christos /* send ixfr request, returns fd of connection to read on */
80 1.1.1.2 christos static int xfrd_send_ixfr_request_udp(xfrd_zone_type* zone);
81 1.1 christos /* obtain udp socket slot */
82 1.1.1.2 christos static void xfrd_udp_obtain(xfrd_zone_type* zone);
83 1.1 christos
84 1.1 christos /* read data via udp */
85 1.1.1.2 christos static void xfrd_udp_read(xfrd_zone_type* zone);
86 1.1 christos
87 1.1 christos /* find master by notify number */
88 1.1.1.2 christos static int find_same_master_notify(xfrd_zone_type* zone, int acl_num_nfy);
89 1.1 christos
90 1.1 christos /* set the write timer to activate */
91 1.1 christos static void xfrd_write_timer_set(void);
92 1.1 christos
93 1.1 christos static void
94 1.1 christos xfrd_signal_callback(int sig, short event, void* ATTR_UNUSED(arg))
95 1.1 christos {
96 1.1 christos if(!(event & EV_SIGNAL))
97 1.1 christos return;
98 1.1 christos sig_handler(sig);
99 1.1 christos }
100 1.1 christos
101 1.1 christos static void
102 1.1 christos xfrd_sigsetup(int sig)
103 1.1 christos {
104 1.1 christos /* no need to remember the event ; dealloc on process exit */
105 1.1 christos struct event *ev = xalloc_zero(sizeof(*ev));
106 1.1 christos signal_set(ev, sig, xfrd_signal_callback, NULL);
107 1.1 christos if(event_base_set(xfrd->event_base, ev) != 0) {
108 1.1 christos log_msg(LOG_ERR, "xfrd sig handler: event_base_set failed");
109 1.1 christos }
110 1.1 christos if(signal_add(ev, NULL) != 0) {
111 1.1 christos log_msg(LOG_ERR, "xfrd sig handler: signal_add failed");
112 1.1 christos }
113 1.1 christos }
114 1.1 christos
115 1.1 christos void
116 1.1 christos xfrd_init(int socket, struct nsd* nsd, int shortsoa, int reload_active,
117 1.1 christos pid_t nsd_pid)
118 1.1 christos {
119 1.1 christos region_type* region;
120 1.1 christos
121 1.1 christos assert(xfrd == 0);
122 1.1 christos /* to setup signalhandling */
123 1.1 christos nsd->server_kind = NSD_SERVER_MAIN;
124 1.1 christos
125 1.1 christos region = region_create_custom(xalloc, free, DEFAULT_CHUNK_SIZE,
126 1.1 christos DEFAULT_LARGE_OBJECT_SIZE, DEFAULT_INITIAL_CLEANUP_SIZE, 1);
127 1.1.1.2 christos xfrd = (xfrd_state_type*)region_alloc(region, sizeof(xfrd_state_type));
128 1.1.1.2 christos memset(xfrd, 0, sizeof(xfrd_state_type));
129 1.1 christos xfrd->region = region;
130 1.1 christos xfrd->xfrd_start_time = time(0);
131 1.1 christos xfrd->event_base = nsd_child_event_base();
132 1.1 christos if(!xfrd->event_base) {
133 1.1 christos log_msg(LOG_ERR, "xfrd: cannot create event base");
134 1.1 christos exit(1);
135 1.1 christos }
136 1.1 christos xfrd->nsd = nsd;
137 1.1 christos xfrd->packet = buffer_create(xfrd->region, QIOBUFSZ);
138 1.1 christos xfrd->udp_waiting_first = NULL;
139 1.1 christos xfrd->udp_waiting_last = NULL;
140 1.1 christos xfrd->udp_use_num = 0;
141 1.1 christos xfrd->got_time = 0;
142 1.1 christos xfrd->xfrfilenumber = 0;
143 1.1 christos #ifdef USE_ZONE_STATS
144 1.1 christos xfrd->zonestat_safe = nsd->zonestatdesired;
145 1.1 christos #endif
146 1.1 christos xfrd->activated_first = NULL;
147 1.1 christos xfrd->ipc_pass = buffer_create(xfrd->region, QIOBUFSZ);
148 1.1 christos xfrd->last_task = region_alloc(xfrd->region, sizeof(*xfrd->last_task));
149 1.1 christos udb_ptr_init(xfrd->last_task, xfrd->nsd->task[xfrd->nsd->mytask]);
150 1.1 christos assert(shortsoa || udb_base_get_userdata(xfrd->nsd->task[xfrd->nsd->mytask])->data == 0);
151 1.1 christos
152 1.1 christos xfrd->reload_handler.ev_fd = -1;
153 1.1 christos xfrd->reload_added = 0;
154 1.1 christos xfrd->reload_timeout.tv_sec = 0;
155 1.1 christos xfrd->reload_cmd_last_sent = xfrd->xfrd_start_time;
156 1.1 christos xfrd->can_send_reload = !reload_active;
157 1.1 christos xfrd->reload_pid = nsd_pid;
158 1.1 christos xfrd->child_timer_added = 0;
159 1.1 christos
160 1.1 christos xfrd->ipc_send_blocked = 0;
161 1.1 christos event_set(&xfrd->ipc_handler, socket, EV_PERSIST|EV_READ,
162 1.1 christos xfrd_handle_ipc, xfrd);
163 1.1 christos if(event_base_set(xfrd->event_base, &xfrd->ipc_handler) != 0)
164 1.1 christos log_msg(LOG_ERR, "xfrd ipc handler: event_base_set failed");
165 1.1 christos if(event_add(&xfrd->ipc_handler, NULL) != 0)
166 1.1 christos log_msg(LOG_ERR, "xfrd ipc handler: event_add failed");
167 1.1 christos xfrd->ipc_handler_flags = EV_PERSIST|EV_READ;
168 1.1 christos xfrd->ipc_conn = xfrd_tcp_create(xfrd->region, QIOBUFSZ);
169 1.1 christos /* not reading using ipc_conn yet */
170 1.1 christos xfrd->ipc_conn->is_reading = 0;
171 1.1 christos xfrd->ipc_conn->fd = socket;
172 1.1 christos xfrd->need_to_send_reload = 0;
173 1.1 christos xfrd->need_to_send_shutdown = 0;
174 1.1 christos xfrd->need_to_send_stats = 0;
175 1.1 christos
176 1.1 christos xfrd->write_zonefile_needed = 0;
177 1.1 christos if(nsd->options->zonefiles_write)
178 1.1 christos xfrd_write_timer_set();
179 1.1 christos
180 1.1 christos xfrd->notify_waiting_first = NULL;
181 1.1 christos xfrd->notify_waiting_last = NULL;
182 1.1 christos xfrd->notify_udp_num = 0;
183 1.1 christos
184 1.1 christos #ifdef HAVE_SSL
185 1.1 christos daemon_remote_attach(xfrd->nsd->rc, xfrd);
186 1.1 christos #endif
187 1.1 christos
188 1.1 christos xfrd->tcp_set = xfrd_tcp_set_create(xfrd->region);
189 1.1 christos xfrd->tcp_set->tcp_timeout = nsd->tcp_timeout;
190 1.1 christos #ifndef HAVE_ARC4RANDOM
191 1.1 christos srandom((unsigned long) getpid() * (unsigned long) time(NULL));
192 1.1 christos #endif
193 1.1 christos
194 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd pre-startup"));
195 1.1 christos xfrd_init_zones();
196 1.1 christos xfrd_receive_soa(socket, shortsoa);
197 1.1 christos if(nsd->options->xfrdfile != NULL && nsd->options->xfrdfile[0]!=0)
198 1.1 christos xfrd_read_state(xfrd);
199 1.1 christos
200 1.1 christos /* did we get killed before startup was successful? */
201 1.1 christos if(nsd->signal_hint_shutdown) {
202 1.1 christos kill(nsd_pid, SIGTERM);
203 1.1 christos xfrd_shutdown();
204 1.1 christos return;
205 1.1 christos }
206 1.1 christos
207 1.1 christos /* init libevent signals now, so that in the previous init scripts
208 1.1 christos * the normal sighandler is called, and can set nsd->signal_hint..
209 1.1 christos * these are also looked at in sig_process before we run the main loop*/
210 1.1 christos xfrd_sigsetup(SIGHUP);
211 1.1 christos xfrd_sigsetup(SIGTERM);
212 1.1 christos xfrd_sigsetup(SIGQUIT);
213 1.1 christos xfrd_sigsetup(SIGCHLD);
214 1.1 christos xfrd_sigsetup(SIGALRM);
215 1.1 christos xfrd_sigsetup(SIGILL);
216 1.1 christos xfrd_sigsetup(SIGUSR1);
217 1.1 christos xfrd_sigsetup(SIGINT);
218 1.1 christos
219 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd startup"));
220 1.1 christos xfrd_main();
221 1.1 christos }
222 1.1 christos
223 1.1 christos static void
224 1.1 christos xfrd_process_activated(void)
225 1.1 christos {
226 1.1.1.2 christos xfrd_zone_type* zone;
227 1.1 christos while((zone = xfrd->activated_first)) {
228 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s activation",
229 1.1 christos zone->apex_str));
230 1.1 christos /* pop zone from activated list */
231 1.1 christos xfrd->activated_first = zone->activated_next;
232 1.1 christos if(zone->activated_next)
233 1.1 christos zone->activated_next->activated_prev = NULL;
234 1.1 christos zone->is_activated = 0;
235 1.1 christos /* run it : no events, specifically not the TIMEOUT event,
236 1.1 christos * so that running zone transfers are not interrupted */
237 1.1 christos xfrd_handle_zone(zone->zone_handler.ev_fd, 0, zone);
238 1.1 christos }
239 1.1 christos }
240 1.1 christos
241 1.1 christos static void
242 1.1 christos xfrd_sig_process(void)
243 1.1 christos {
244 1.1 christos int status;
245 1.1 christos pid_t child_pid;
246 1.1 christos
247 1.1 christos if(xfrd->nsd->signal_hint_quit || xfrd->nsd->signal_hint_shutdown) {
248 1.1 christos xfrd->nsd->signal_hint_quit = 0;
249 1.1 christos xfrd->nsd->signal_hint_shutdown = 0;
250 1.1 christos xfrd->need_to_send_shutdown = 1;
251 1.1 christos if(!(xfrd->ipc_handler_flags&EV_WRITE)) {
252 1.1 christos ipc_xfrd_set_listening(xfrd, EV_PERSIST|EV_READ|EV_WRITE);
253 1.1 christos }
254 1.1 christos } else if(xfrd->nsd->signal_hint_reload_hup) {
255 1.1 christos log_msg(LOG_WARNING, "SIGHUP received, reloading...");
256 1.1 christos xfrd->nsd->signal_hint_reload_hup = 0;
257 1.1 christos if(xfrd->nsd->options->zonefiles_check) {
258 1.1 christos task_new_check_zonefiles(xfrd->nsd->task[
259 1.1 christos xfrd->nsd->mytask], xfrd->last_task, NULL);
260 1.1 christos }
261 1.1 christos xfrd_set_reload_now(xfrd);
262 1.1 christos } else if(xfrd->nsd->signal_hint_statsusr) {
263 1.1 christos xfrd->nsd->signal_hint_statsusr = 0;
264 1.1 christos xfrd->need_to_send_stats = 1;
265 1.1 christos if(!(xfrd->ipc_handler_flags&EV_WRITE)) {
266 1.1 christos ipc_xfrd_set_listening(xfrd, EV_PERSIST|EV_READ|EV_WRITE);
267 1.1 christos }
268 1.1 christos }
269 1.1 christos
270 1.1 christos /* collect children that exited. */
271 1.1 christos xfrd->nsd->signal_hint_child = 0;
272 1.1 christos while((child_pid = waitpid(-1, &status, WNOHANG)) != -1 && child_pid != 0) {
273 1.1 christos if(status != 0) {
274 1.1 christos log_msg(LOG_ERR, "process %d exited with status %d",
275 1.1 christos (int)child_pid, status);
276 1.1 christos }
277 1.1 christos }
278 1.1 christos if(!xfrd->child_timer_added) {
279 1.1 christos struct timeval tv;
280 1.1 christos tv.tv_sec = XFRD_CHILD_REAP_TIMEOUT;
281 1.1 christos tv.tv_usec = 0;
282 1.1 christos event_set(&xfrd->child_timer, -1, EV_TIMEOUT,
283 1.1 christos xfrd_handle_child_timer, xfrd);
284 1.1 christos if(event_base_set(xfrd->event_base, &xfrd->child_timer) != 0)
285 1.1 christos log_msg(LOG_ERR, "xfrd child timer: event_base_set failed");
286 1.1 christos if(event_add(&xfrd->child_timer, &tv) != 0)
287 1.1 christos log_msg(LOG_ERR, "xfrd child timer: event_add failed");
288 1.1 christos xfrd->child_timer_added = 1;
289 1.1 christos }
290 1.1 christos }
291 1.1 christos
292 1.1 christos static void
293 1.1 christos xfrd_main(void)
294 1.1 christos {
295 1.1 christos /* we may have signals from the startup period, process them */
296 1.1 christos xfrd_sig_process();
297 1.1 christos xfrd->shutdown = 0;
298 1.1 christos while(!xfrd->shutdown)
299 1.1 christos {
300 1.1 christos /* process activated zones before blocking in select again */
301 1.1 christos xfrd_process_activated();
302 1.1 christos /* dispatch may block for a longer period, so current is gone */
303 1.1 christos xfrd->got_time = 0;
304 1.1 christos if(event_base_loop(xfrd->event_base, EVLOOP_ONCE) == -1) {
305 1.1 christos if (errno != EINTR) {
306 1.1 christos log_msg(LOG_ERR,
307 1.1 christos "xfrd dispatch failed: %s",
308 1.1 christos strerror(errno));
309 1.1 christos }
310 1.1 christos }
311 1.1 christos xfrd_sig_process();
312 1.1 christos }
313 1.1 christos xfrd_shutdown();
314 1.1 christos }
315 1.1 christos
316 1.1 christos static void
317 1.1 christos xfrd_shutdown()
318 1.1 christos {
319 1.1.1.2 christos xfrd_zone_type* zone;
320 1.1 christos
321 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd shutdown"));
322 1.1 christos event_del(&xfrd->ipc_handler);
323 1.1 christos close(xfrd->ipc_handler.ev_fd); /* notifies parent we stop */
324 1.1 christos if(xfrd->nsd->options->xfrdfile != NULL && xfrd->nsd->options->xfrdfile[0]!=0)
325 1.1 christos xfrd_write_state(xfrd);
326 1.1 christos if(xfrd->reload_added) {
327 1.1 christos event_del(&xfrd->reload_handler);
328 1.1 christos xfrd->reload_added = 0;
329 1.1 christos }
330 1.1 christos if(xfrd->child_timer_added) {
331 1.1 christos event_del(&xfrd->child_timer);
332 1.1 christos xfrd->child_timer_added = 0;
333 1.1 christos }
334 1.1 christos if(xfrd->nsd->options->zonefiles_write) {
335 1.1 christos event_del(&xfrd->write_timer);
336 1.1 christos }
337 1.1 christos #ifdef HAVE_SSL
338 1.1 christos daemon_remote_close(xfrd->nsd->rc); /* close sockets of rc */
339 1.1 christos #endif
340 1.1 christos /* close sockets */
341 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
342 1.1 christos {
343 1.1 christos if(zone->event_added) {
344 1.1 christos event_del(&zone->zone_handler);
345 1.1 christos if(zone->zone_handler.ev_fd != -1) {
346 1.1 christos close(zone->zone_handler.ev_fd);
347 1.1 christos zone->zone_handler.ev_fd = -1;
348 1.1 christos }
349 1.1 christos zone->event_added = 0;
350 1.1 christos }
351 1.1 christos }
352 1.1 christos close_notify_fds(xfrd->notify_zones);
353 1.1 christos
354 1.1 christos /* wait for server parent (if necessary) */
355 1.1 christos if(xfrd->reload_pid != -1) {
356 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd wait for servermain %d",
357 1.1 christos (int)xfrd->reload_pid));
358 1.1 christos while(1) {
359 1.1 christos if(waitpid(xfrd->reload_pid, NULL, 0) == -1) {
360 1.1 christos if(errno == EINTR) continue;
361 1.1 christos if(errno == ECHILD) break;
362 1.1 christos log_msg(LOG_ERR, "xfrd: waitpid(%d): %s",
363 1.1 christos (int)xfrd->reload_pid, strerror(errno));
364 1.1 christos }
365 1.1 christos break;
366 1.1 christos }
367 1.1 christos }
368 1.1 christos
369 1.1 christos /* if we are killed past this point this is not a problem,
370 1.1 christos * some files left in /tmp are cleaned by the OS, but it is neater
371 1.1 christos * to clean them out */
372 1.1 christos
373 1.1 christos /* unlink xfr files for running transfers */
374 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
375 1.1 christos {
376 1.1 christos if(zone->msg_seq_nr)
377 1.1 christos xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
378 1.1 christos }
379 1.1 christos /* unlink xfr files in not-yet-done task file */
380 1.1 christos xfrd_clean_pending_tasks(xfrd->nsd, xfrd->nsd->task[xfrd->nsd->mytask]);
381 1.1 christos xfrd_del_tempdir(xfrd->nsd);
382 1.1 christos
383 1.1 christos /* process-exit cleans up memory used by xfrd process */
384 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd shutdown complete"));
385 1.1 christos
386 1.1 christos exit(0);
387 1.1 christos }
388 1.1 christos
389 1.1 christos static void
390 1.1 christos xfrd_clean_pending_tasks(struct nsd* nsd, udb_base* u)
391 1.1 christos {
392 1.1 christos udb_ptr t;
393 1.1 christos udb_ptr_new(&t, u, udb_base_get_userdata(u));
394 1.1 christos /* no dealloc of entries, we delete the entire file when done */
395 1.1 christos while(!udb_ptr_is_null(&t)) {
396 1.1 christos if(TASKLIST(&t)->task_type == task_apply_xfr) {
397 1.1 christos xfrd_unlink_xfrfile(nsd, TASKLIST(&t)->yesno);
398 1.1 christos }
399 1.1 christos udb_ptr_set_rptr(&t, u, &TASKLIST(&t)->next);
400 1.1 christos }
401 1.1 christos udb_ptr_unlink(&t, u);
402 1.1 christos }
403 1.1 christos
404 1.1 christos void
405 1.1.1.2 christos xfrd_init_slave_zone(xfrd_state_type* xfrd, struct zone_options* zone_opt)
406 1.1 christos {
407 1.1.1.2 christos xfrd_zone_type *xzone;
408 1.1.1.2 christos xzone = (xfrd_zone_type*)region_alloc(xfrd->region,
409 1.1.1.2 christos sizeof(xfrd_zone_type));
410 1.1.1.2 christos memset(xzone, 0, sizeof(xfrd_zone_type));
411 1.1 christos xzone->apex = zone_opt->node.key;
412 1.1 christos xzone->apex_str = zone_opt->name;
413 1.1 christos xzone->state = xfrd_zone_refreshing;
414 1.1 christos xzone->zone_options = zone_opt;
415 1.1 christos /* first retry will use first master */
416 1.1 christos xzone->master = xzone->zone_options->pattern->request_xfr;
417 1.1 christos xzone->master_num = 0;
418 1.1 christos xzone->next_master = 0;
419 1.1 christos xzone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_START;
420 1.1 christos
421 1.1 christos xzone->soa_nsd_acquired = 0;
422 1.1 christos xzone->soa_disk_acquired = 0;
423 1.1 christos xzone->soa_notified_acquired = 0;
424 1.1 christos /* [0]=1, [1]=0; "." domain name */
425 1.1 christos xzone->soa_nsd.prim_ns[0] = 1;
426 1.1 christos xzone->soa_nsd.email[0] = 1;
427 1.1 christos xzone->soa_disk.prim_ns[0]=1;
428 1.1 christos xzone->soa_disk.email[0]=1;
429 1.1 christos xzone->soa_notified.prim_ns[0]=1;
430 1.1 christos xzone->soa_notified.email[0]=1;
431 1.1 christos
432 1.1 christos xzone->zone_handler.ev_fd = -1;
433 1.1 christos xzone->zone_handler_flags = 0;
434 1.1 christos xzone->event_added = 0;
435 1.1 christos
436 1.1 christos xzone->tcp_conn = -1;
437 1.1 christos xzone->tcp_waiting = 0;
438 1.1 christos xzone->udp_waiting = 0;
439 1.1 christos xzone->is_activated = 0;
440 1.1 christos
441 1.1 christos xzone->multi_master_first_master = -1;
442 1.1 christos xzone->multi_master_update_check = -1;
443 1.1 christos tsig_create_record_custom(&xzone->tsig, NULL, 0, 0, 4);
444 1.1 christos
445 1.1 christos /* set refreshing anyway, if we have data it may be old */
446 1.1 christos xfrd_set_refresh_now(xzone);
447 1.1 christos
448 1.1 christos xzone->node.key = xzone->apex;
449 1.1.1.2 christos rbtree_insert(xfrd->zones, (rbnode_type*)xzone);
450 1.1 christos }
451 1.1 christos
452 1.1 christos static void
453 1.1 christos xfrd_init_zones()
454 1.1 christos {
455 1.1.1.2 christos struct zone_options *zone_opt;
456 1.1 christos assert(xfrd->zones == 0);
457 1.1 christos
458 1.1 christos xfrd->zones = rbtree_create(xfrd->region,
459 1.1 christos (int (*)(const void *, const void *)) dname_compare);
460 1.1 christos xfrd->notify_zones = rbtree_create(xfrd->region,
461 1.1 christos (int (*)(const void *, const void *)) dname_compare);
462 1.1 christos
463 1.1.1.2 christos RBTREE_FOR(zone_opt, struct zone_options*, xfrd->nsd->options->zone_options)
464 1.1 christos {
465 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: adding %s zone",
466 1.1 christos zone_opt->name));
467 1.1 christos
468 1.1 christos init_notify_send(xfrd->notify_zones, xfrd->region, zone_opt);
469 1.1 christos if(!zone_is_slave(zone_opt)) {
470 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s, "
471 1.1 christos "master zone has no outgoing xfr requests",
472 1.1 christos zone_opt->name));
473 1.1 christos continue;
474 1.1 christos }
475 1.1 christos xfrd_init_slave_zone(xfrd, zone_opt);
476 1.1 christos }
477 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: started server %d "
478 1.1 christos "secondary zones", (int)xfrd->zones->count));
479 1.1 christos }
480 1.1 christos
481 1.1 christos static void
482 1.1 christos xfrd_process_soa_info_task(struct task_list_d* task)
483 1.1 christos {
484 1.1.1.2 christos xfrd_soa_type soa;
485 1.1.1.2 christos xfrd_soa_type* soa_ptr = &soa;
486 1.1.1.2 christos xfrd_zone_type* zone;
487 1.1 christos DEBUG(DEBUG_IPC,1, (LOG_INFO, "xfrd: process SOAINFO %s",
488 1.1 christos dname_to_string(task->zname, 0)));
489 1.1.1.2 christos zone = (xfrd_zone_type*)rbtree_search(xfrd->zones, task->zname);
490 1.1 christos if(task->size <= sizeof(struct task_list_d)+dname_total_size(
491 1.1 christos task->zname)+sizeof(uint32_t)*6 + sizeof(uint8_t)*2) {
492 1.1 christos /* NSD has zone without any info */
493 1.1 christos DEBUG(DEBUG_IPC,1, (LOG_INFO, "SOAINFO for %s lost zone",
494 1.1 christos dname_to_string(task->zname,0)));
495 1.1 christos soa_ptr = NULL;
496 1.1 christos } else {
497 1.1 christos uint8_t* p = (uint8_t*)task->zname + dname_total_size(
498 1.1 christos task->zname);
499 1.1 christos /* read the soa info */
500 1.1 christos memset(&soa, 0, sizeof(soa));
501 1.1 christos /* left out type, klass, count for speed */
502 1.1 christos soa.type = htons(TYPE_SOA);
503 1.1 christos soa.klass = htons(CLASS_IN);
504 1.1 christos memmove(&soa.ttl, p, sizeof(uint32_t));
505 1.1 christos p += sizeof(uint32_t);
506 1.1 christos soa.rdata_count = htons(7);
507 1.1 christos memmove(soa.prim_ns, p, sizeof(uint8_t));
508 1.1 christos p += sizeof(uint8_t);
509 1.1 christos memmove(soa.prim_ns+1, p, soa.prim_ns[0]);
510 1.1 christos p += soa.prim_ns[0];
511 1.1 christos memmove(soa.email, p, sizeof(uint8_t));
512 1.1 christos p += sizeof(uint8_t);
513 1.1 christos memmove(soa.email+1, p, soa.email[0]);
514 1.1 christos p += soa.email[0];
515 1.1 christos memmove(&soa.serial, p, sizeof(uint32_t));
516 1.1 christos p += sizeof(uint32_t);
517 1.1 christos memmove(&soa.refresh, p, sizeof(uint32_t));
518 1.1 christos p += sizeof(uint32_t);
519 1.1 christos memmove(&soa.retry, p, sizeof(uint32_t));
520 1.1 christos p += sizeof(uint32_t);
521 1.1 christos memmove(&soa.expire, p, sizeof(uint32_t));
522 1.1 christos p += sizeof(uint32_t);
523 1.1 christos memmove(&soa.minimum, p, sizeof(uint32_t));
524 1.1 christos p += sizeof(uint32_t);
525 1.1 christos DEBUG(DEBUG_IPC,1, (LOG_INFO, "SOAINFO for %s %u",
526 1.1 christos dname_to_string(task->zname,0),
527 1.1 christos (unsigned)ntohl(soa.serial)));
528 1.1 christos }
529 1.1 christos
530 1.1 christos if(!zone) {
531 1.1 christos DEBUG(DEBUG_IPC,1, (LOG_INFO, "xfrd: zone %s master zone updated",
532 1.1 christos dname_to_string(task->zname,0)));
533 1.1 christos notify_handle_master_zone_soainfo(xfrd->notify_zones,
534 1.1 christos task->zname, soa_ptr);
535 1.1 christos return;
536 1.1 christos }
537 1.1 christos xfrd_handle_incoming_soa(zone, soa_ptr, xfrd_time());
538 1.1 christos }
539 1.1 christos
540 1.1 christos static void
541 1.1 christos xfrd_receive_soa(int socket, int shortsoa)
542 1.1 christos {
543 1.1 christos sig_atomic_t cmd;
544 1.1 christos struct udb_base* xtask = xfrd->nsd->task[xfrd->nsd->mytask];
545 1.1 christos udb_ptr last_task, t;
546 1.1.1.2 christos xfrd_zone_type* zone;
547 1.1 christos
548 1.1 christos if(!shortsoa) {
549 1.1 christos /* put all expired zones into mytask */
550 1.1 christos udb_ptr_init(&last_task, xtask);
551 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones) {
552 1.1 christos if(zone->state == xfrd_zone_expired) {
553 1.1 christos task_new_expire(xtask, &last_task, zone->apex, 1);
554 1.1 christos }
555 1.1 christos }
556 1.1 christos udb_ptr_unlink(&last_task, xtask);
557 1.1 christos
558 1.1 christos /* send RELOAD to main to give it this tasklist */
559 1.1 christos task_process_sync(xtask);
560 1.1 christos cmd = NSD_RELOAD;
561 1.1 christos if(!write_socket(socket, &cmd, sizeof(cmd))) {
562 1.1 christos log_msg(LOG_ERR, "problems sending reload xfrdtomain: %s",
563 1.1 christos strerror(errno));
564 1.1 christos }
565 1.1 christos }
566 1.1 christos
567 1.1 christos /* receive RELOAD_DONE to get SOAINFO tasklist */
568 1.1 christos if(block_read(&nsd, socket, &cmd, sizeof(cmd), -1) != sizeof(cmd) ||
569 1.1 christos cmd != NSD_RELOAD_DONE) {
570 1.1 christos if(nsd.signal_hint_shutdown)
571 1.1 christos return;
572 1.1 christos log_msg(LOG_ERR, "did not get start signal from main");
573 1.1 christos exit(1);
574 1.1 christos }
575 1.1 christos if(block_read(NULL, socket, &xfrd->reload_pid, sizeof(pid_t), -1)
576 1.1 christos != sizeof(pid_t)) {
577 1.1 christos log_msg(LOG_ERR, "xfrd cannot get reload_pid");
578 1.1 christos }
579 1.1 christos
580 1.1 christos /* process tasklist (SOAINFO data) */
581 1.1 christos udb_ptr_unlink(xfrd->last_task, xtask);
582 1.1 christos /* if shortsoa: then use my own taskdb that nsdparent filled */
583 1.1 christos if(!shortsoa)
584 1.1 christos xfrd->nsd->mytask = 1 - xfrd->nsd->mytask;
585 1.1 christos xtask = xfrd->nsd->task[xfrd->nsd->mytask];
586 1.1 christos task_remap(xtask);
587 1.1 christos udb_ptr_new(&t, xtask, udb_base_get_userdata(xtask));
588 1.1 christos while(!udb_ptr_is_null(&t)) {
589 1.1 christos xfrd_process_soa_info_task(TASKLIST(&t));
590 1.1 christos udb_ptr_set_rptr(&t, xtask, &TASKLIST(&t)->next);
591 1.1 christos }
592 1.1 christos udb_ptr_unlink(&t, xtask);
593 1.1 christos task_clear(xtask);
594 1.1 christos udb_ptr_init(xfrd->last_task, xfrd->nsd->task[xfrd->nsd->mytask]);
595 1.1 christos
596 1.1 christos if(!shortsoa) {
597 1.1 christos /* receive RELOAD_DONE that signals the other tasklist is
598 1.1 christos * empty, and thus xfrd can operate (can call reload and swap
599 1.1 christos * to the other, empty, tasklist) */
600 1.1 christos if(block_read(NULL, socket, &cmd, sizeof(cmd), -1) !=
601 1.1 christos sizeof(cmd) ||
602 1.1 christos cmd != NSD_RELOAD_DONE) {
603 1.1 christos log_msg(LOG_ERR, "did not get start signal 2 from "
604 1.1 christos "main");
605 1.1 christos exit(1);
606 1.1 christos }
607 1.1 christos } else {
608 1.1 christos /* for shortsoa version, do expire later */
609 1.1 christos /* if expire notifications, put in my task and
610 1.1 christos * schedule a reload to make sure they are processed */
611 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones) {
612 1.1 christos if(zone->state == xfrd_zone_expired) {
613 1.1 christos xfrd_send_expire_notification(zone);
614 1.1 christos }
615 1.1 christos }
616 1.1 christos }
617 1.1 christos }
618 1.1 christos
619 1.1 christos void
620 1.1 christos xfrd_reopen_logfile(void)
621 1.1 christos {
622 1.1 christos if (xfrd->nsd->file_rotation_ok)
623 1.1 christos log_reopen(xfrd->nsd->log_filename, 0);
624 1.1 christos }
625 1.1 christos
626 1.1 christos void
627 1.1.1.2 christos xfrd_deactivate_zone(xfrd_zone_type* z)
628 1.1 christos {
629 1.1 christos if(z->is_activated) {
630 1.1 christos /* delete from activated list */
631 1.1 christos if(z->activated_prev)
632 1.1 christos z->activated_prev->activated_next = z->activated_next;
633 1.1 christos else xfrd->activated_first = z->activated_next;
634 1.1 christos if(z->activated_next)
635 1.1 christos z->activated_next->activated_prev = z->activated_prev;
636 1.1 christos z->is_activated = 0;
637 1.1 christos }
638 1.1 christos }
639 1.1 christos
640 1.1 christos void
641 1.1.1.2 christos xfrd_del_slave_zone(xfrd_state_type* xfrd, const dname_type* dname)
642 1.1 christos {
643 1.1.1.2 christos xfrd_zone_type* z = (xfrd_zone_type*)rbtree_delete(xfrd->zones, dname);
644 1.1 christos if(!z) return;
645 1.1 christos
646 1.1 christos /* io */
647 1.1 christos if(z->tcp_waiting) {
648 1.1 christos /* delete from tcp waiting list */
649 1.1 christos if(z->tcp_waiting_prev)
650 1.1 christos z->tcp_waiting_prev->tcp_waiting_next =
651 1.1 christos z->tcp_waiting_next;
652 1.1 christos else xfrd->tcp_set->tcp_waiting_first = z->tcp_waiting_next;
653 1.1 christos if(z->tcp_waiting_next)
654 1.1 christos z->tcp_waiting_next->tcp_waiting_prev =
655 1.1 christos z->tcp_waiting_prev;
656 1.1 christos else xfrd->tcp_set->tcp_waiting_last = z->tcp_waiting_prev;
657 1.1 christos z->tcp_waiting = 0;
658 1.1 christos }
659 1.1 christos if(z->udp_waiting) {
660 1.1 christos /* delete from udp waiting list */
661 1.1 christos if(z->udp_waiting_prev)
662 1.1 christos z->udp_waiting_prev->udp_waiting_next =
663 1.1 christos z->udp_waiting_next;
664 1.1 christos else xfrd->udp_waiting_first = z->udp_waiting_next;
665 1.1 christos if(z->udp_waiting_next)
666 1.1 christos z->udp_waiting_next->udp_waiting_prev =
667 1.1 christos z->udp_waiting_prev;
668 1.1 christos else xfrd->udp_waiting_last = z->udp_waiting_prev;
669 1.1 christos z->udp_waiting = 0;
670 1.1 christos }
671 1.1 christos xfrd_deactivate_zone(z);
672 1.1 christos if(z->tcp_conn != -1) {
673 1.1 christos xfrd_tcp_release(xfrd->tcp_set, z);
674 1.1 christos } else if(z->zone_handler.ev_fd != -1 && z->event_added) {
675 1.1 christos xfrd_udp_release(z);
676 1.1 christos } else if(z->event_added)
677 1.1 christos event_del(&z->zone_handler);
678 1.1 christos if(z->msg_seq_nr)
679 1.1 christos xfrd_unlink_xfrfile(xfrd->nsd, z->xfrfilenumber);
680 1.1 christos
681 1.1 christos /* tsig */
682 1.1 christos tsig_delete_record(&z->tsig, NULL);
683 1.1 christos
684 1.1 christos /* z->dname is recycled when the zone_options is removed */
685 1.1 christos region_recycle(xfrd->region, z, sizeof(*z));
686 1.1 christos }
687 1.1 christos
688 1.1 christos void
689 1.1 christos xfrd_free_namedb(struct nsd* nsd)
690 1.1 christos {
691 1.1 christos namedb_close_udb(nsd->db);
692 1.1 christos namedb_close(nsd->db);
693 1.1 christos nsd->db = 0;
694 1.1 christos }
695 1.1 christos
696 1.1 christos static void
697 1.1.1.2 christos xfrd_set_timer_refresh(xfrd_zone_type* zone)
698 1.1 christos {
699 1.1 christos time_t set_refresh;
700 1.1 christos time_t set_expire;
701 1.1 christos time_t set_min;
702 1.1 christos time_t set;
703 1.1 christos if(zone->soa_disk_acquired == 0 || zone->state != xfrd_zone_ok) {
704 1.1 christos xfrd_set_timer_retry(zone);
705 1.1 christos return;
706 1.1 christos }
707 1.1 christos /* refresh or expire timeout, whichever is earlier */
708 1.1 christos set_refresh = ntohl(zone->soa_disk.refresh);
709 1.1 christos if (set_refresh > (time_t)zone->zone_options->pattern->max_refresh_time)
710 1.1 christos set_refresh = zone->zone_options->pattern->max_refresh_time;
711 1.1 christos else if (set_refresh < (time_t)zone->zone_options->pattern->min_refresh_time)
712 1.1 christos set_refresh = zone->zone_options->pattern->min_refresh_time;
713 1.1 christos set_refresh += zone->soa_disk_acquired;
714 1.1 christos set_expire = zone->soa_disk_acquired + ntohl(zone->soa_disk.expire);
715 1.1 christos if(set_refresh < set_expire)
716 1.1 christos set = set_refresh;
717 1.1 christos else set = set_expire;
718 1.1 christos set_min = zone->soa_disk_acquired + XFRD_LOWERBOUND_REFRESH;
719 1.1 christos if(set < set_min)
720 1.1 christos set = set_min;
721 1.1 christos if(set < xfrd_time())
722 1.1 christos set = 0;
723 1.1 christos else set -= xfrd_time();
724 1.1 christos xfrd_set_timer(zone, set);
725 1.1 christos }
726 1.1 christos
727 1.1 christos static void
728 1.1.1.2 christos xfrd_set_timer_retry(xfrd_zone_type* zone)
729 1.1 christos {
730 1.1 christos time_t set_retry;
731 1.1 christos int mult;
732 1.1 christos /* perform exponential backoff in all the cases */
733 1.1 christos if(zone->fresh_xfr_timeout == 0)
734 1.1 christos zone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_START;
735 1.1 christos else {
736 1.1 christos /* exponential backoff - some master data in zones is paid-for
737 1.1 christos but non-working, and will not get fixed. */
738 1.1 christos zone->fresh_xfr_timeout *= 2;
739 1.1 christos if(zone->fresh_xfr_timeout > XFRD_TRANSFER_TIMEOUT_MAX)
740 1.1 christos zone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_MAX;
741 1.1 christos }
742 1.1 christos /* exponential backoff multiplier, starts at 1, backs off */
743 1.1 christos mult = zone->fresh_xfr_timeout / XFRD_TRANSFER_TIMEOUT_START;
744 1.1 christos if(mult == 0) mult = 1;
745 1.1 christos
746 1.1 christos /* set timer for next retry or expire timeout if earlier. */
747 1.1 christos if(zone->soa_disk_acquired == 0) {
748 1.1 christos /* if no information, use reasonable timeout */
749 1.1 christos #ifdef HAVE_ARC4RANDOM_UNIFORM
750 1.1 christos xfrd_set_timer(zone, zone->fresh_xfr_timeout
751 1.1 christos + arc4random_uniform(zone->fresh_xfr_timeout));
752 1.1 christos #elif HAVE_ARC4RANDOM
753 1.1 christos xfrd_set_timer(zone, zone->fresh_xfr_timeout
754 1.1 christos + arc4random() % zone->fresh_xfr_timeout);
755 1.1 christos #else
756 1.1 christos xfrd_set_timer(zone, zone->fresh_xfr_timeout
757 1.1 christos + random()%zone->fresh_xfr_timeout);
758 1.1 christos #endif
759 1.1 christos } else if(zone->state == xfrd_zone_expired ||
760 1.1 christos xfrd_time() + (time_t)ntohl(zone->soa_disk.retry)*mult <
761 1.1 christos zone->soa_disk_acquired + (time_t)ntohl(zone->soa_disk.expire))
762 1.1 christos {
763 1.1 christos set_retry = ntohl(zone->soa_disk.retry);
764 1.1 christos set_retry *= mult;
765 1.1 christos if(set_retry > (time_t)zone->zone_options->pattern->max_retry_time)
766 1.1 christos set_retry = zone->zone_options->pattern->max_retry_time;
767 1.1 christos else if(set_retry < (time_t)zone->zone_options->pattern->min_retry_time)
768 1.1 christos set_retry = zone->zone_options->pattern->min_retry_time;
769 1.1 christos if(set_retry < XFRD_LOWERBOUND_RETRY)
770 1.1.1.2 christos set_retry = XFRD_LOWERBOUND_RETRY;
771 1.1 christos xfrd_set_timer(zone, set_retry);
772 1.1 christos } else {
773 1.1 christos set_retry = ntohl(zone->soa_disk.expire);
774 1.1 christos if(set_retry < XFRD_LOWERBOUND_RETRY)
775 1.1 christos xfrd_set_timer(zone, XFRD_LOWERBOUND_RETRY);
776 1.1 christos else {
777 1.1 christos if(zone->soa_disk_acquired + set_retry < xfrd_time())
778 1.1 christos xfrd_set_timer(zone, XFRD_LOWERBOUND_RETRY);
779 1.1 christos else xfrd_set_timer(zone, zone->soa_disk_acquired +
780 1.1 christos set_retry - xfrd_time());
781 1.1 christos }
782 1.1 christos }
783 1.1 christos }
784 1.1 christos
785 1.1 christos void
786 1.1 christos xfrd_handle_zone(int ATTR_UNUSED(fd), short event, void* arg)
787 1.1 christos {
788 1.1.1.2 christos xfrd_zone_type* zone = (xfrd_zone_type*)arg;
789 1.1 christos
790 1.1 christos if(zone->tcp_conn != -1) {
791 1.1 christos if(event == 0) /* activated, but already in TCP, nothing to do*/
792 1.1 christos return;
793 1.1 christos /* busy in tcp transaction: an internal error */
794 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s event tcp", zone->apex_str));
795 1.1 christos xfrd_tcp_release(xfrd->tcp_set, zone);
796 1.1 christos /* continue to retry; as if a timeout happened */
797 1.1 christos event = EV_TIMEOUT;
798 1.1 christos }
799 1.1 christos
800 1.1 christos if((event & EV_READ)) {
801 1.1 christos /* busy in udp transaction */
802 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s event udp read", zone->apex_str));
803 1.1 christos xfrd_udp_read(zone);
804 1.1 christos return;
805 1.1 christos }
806 1.1 christos
807 1.1 christos /* timeout */
808 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s timeout", zone->apex_str));
809 1.1 christos if(zone->zone_handler.ev_fd != -1 && zone->event_added &&
810 1.1 christos (event & EV_TIMEOUT)) {
811 1.1 christos assert(zone->tcp_conn == -1);
812 1.1 christos xfrd_udp_release(zone);
813 1.1 christos }
814 1.1 christos
815 1.1 christos if(zone->tcp_waiting) {
816 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s skips retry, TCP connections full",
817 1.1 christos zone->apex_str));
818 1.1 christos xfrd_unset_timer(zone);
819 1.1 christos return;
820 1.1 christos }
821 1.1 christos if(zone->udp_waiting) {
822 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s skips retry, UDP connections full",
823 1.1 christos zone->apex_str));
824 1.1 christos xfrd_unset_timer(zone);
825 1.1 christos return;
826 1.1 christos }
827 1.1 christos
828 1.1 christos if(zone->soa_disk_acquired)
829 1.1 christos {
830 1.1 christos if (zone->state != xfrd_zone_expired &&
831 1.1 christos xfrd_time() >= zone->soa_disk_acquired + (time_t)ntohl(zone->soa_disk.expire)) {
832 1.1 christos /* zone expired */
833 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s has expired", zone->apex_str);
834 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_expired);
835 1.1 christos }
836 1.1 christos else if(zone->state == xfrd_zone_ok &&
837 1.1 christos xfrd_time() >= zone->soa_disk_acquired + (time_t)ntohl(zone->soa_disk.refresh)) {
838 1.1 christos /* zone goes to refreshing state. */
839 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s is refreshing", zone->apex_str));
840 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
841 1.1 christos }
842 1.1 christos }
843 1.1 christos
844 1.1 christos /* only make a new request if no request is running (UDPorTCP) */
845 1.1 christos if(zone->zone_handler.ev_fd == -1 && zone->tcp_conn == -1) {
846 1.1 christos /* make a new request */
847 1.1 christos xfrd_make_request(zone);
848 1.1 christos }
849 1.1 christos }
850 1.1 christos
851 1.1 christos void
852 1.1.1.2 christos xfrd_make_request(xfrd_zone_type* zone)
853 1.1 christos {
854 1.1 christos if(zone->next_master != -1) {
855 1.1 christos /* we are told to use this next master */
856 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
857 1.1 christos "xfrd zone %s use master %i",
858 1.1 christos zone->apex_str, zone->next_master));
859 1.1 christos zone->master_num = zone->next_master;
860 1.1 christos zone->master = acl_find_num(zone->zone_options->pattern->
861 1.1 christos request_xfr, zone->master_num);
862 1.1 christos /* if there is no next master, fallback to use the first one */
863 1.1 christos if(!zone->master) {
864 1.1 christos zone->master = zone->zone_options->pattern->request_xfr;
865 1.1 christos zone->master_num = 0;
866 1.1 christos }
867 1.1 christos /* fallback to cycle master */
868 1.1 christos zone->next_master = -1;
869 1.1 christos zone->round_num = 0; /* fresh set of retries after notify */
870 1.1 christos } else {
871 1.1 christos /* cycle master */
872 1.1 christos
873 1.1 christos if(zone->round_num != -1 && zone->master && zone->master->next)
874 1.1 christos {
875 1.1 christos /* try the next master */
876 1.1 christos zone->master = zone->master->next;
877 1.1 christos zone->master_num++;
878 1.1 christos } else {
879 1.1 christos /* start a new round */
880 1.1 christos zone->master = zone->zone_options->pattern->request_xfr;
881 1.1 christos zone->master_num = 0;
882 1.1 christos zone->round_num++;
883 1.1 christos }
884 1.1 christos if(zone->round_num >= XFRD_MAX_ROUNDS) {
885 1.1 christos /* tried all servers that many times, wait */
886 1.1 christos zone->round_num = -1;
887 1.1 christos xfrd_set_timer_retry(zone);
888 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
889 1.1 christos "xfrd zone %s makereq wait_retry, rd %d mr %d nx %d",
890 1.1 christos zone->apex_str, zone->round_num, zone->master_num, zone->next_master));
891 1.1 christos zone->multi_master_first_master = -1;
892 1.1 christos return;
893 1.1 christos }
894 1.1 christos }
895 1.1 christos
896 1.1 christos /* multi-master-check */
897 1.1 christos if(zone->zone_options->pattern->multi_master_check) {
898 1.1 christos if(zone->multi_master_first_master == zone->master_num &&
899 1.1 christos zone->round_num > 0 &&
900 1.1 christos zone->state != xfrd_zone_expired) {
901 1.1 christos /* tried all servers and update zone */
902 1.1 christos if(zone->multi_master_update_check >= 0) {
903 1.1 christos VERBOSITY(2, (LOG_INFO, "xfrd: multi master "
904 1.1 christos "check: zone %s completed transfers",
905 1.1 christos zone->apex_str));
906 1.1 christos }
907 1.1 christos zone->round_num = -1; /* next try start anew */
908 1.1 christos zone->multi_master_first_master = -1;
909 1.1 christos xfrd_set_timer_refresh(zone);
910 1.1 christos return;
911 1.1 christos }
912 1.1 christos if(zone->multi_master_first_master < 0) {
913 1.1 christos zone->multi_master_first_master = zone->master_num;
914 1.1 christos zone->multi_master_update_check = -1;
915 1.1 christos }
916 1.1 christos }
917 1.1 christos
918 1.1 christos /* cache ixfr_disabled only for XFRD_NO_IXFR_CACHE time */
919 1.1 christos if (zone->master->ixfr_disabled &&
920 1.1 christos (zone->master->ixfr_disabled + XFRD_NO_IXFR_CACHE) <= time(NULL)) {
921 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "clear negative caching ixfr "
922 1.1 christos "disabled for master %s num "
923 1.1 christos "%d ",
924 1.1 christos zone->master->ip_address_spec, zone->master_num));
925 1.1 christos zone->master->ixfr_disabled = 0;
926 1.1 christos }
927 1.1 christos
928 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s make request round %d mr %d nx %d",
929 1.1 christos zone->apex_str, zone->round_num, zone->master_num, zone->next_master));
930 1.1 christos /* perform xfr request */
931 1.1 christos if (!zone->master->use_axfr_only && zone->soa_disk_acquired > 0 &&
932 1.1 christos !zone->master->ixfr_disabled) {
933 1.1 christos
934 1.1 christos if (zone->master->allow_udp) {
935 1.1 christos xfrd_set_timer(zone, XFRD_UDP_TIMEOUT);
936 1.1 christos xfrd_udp_obtain(zone);
937 1.1 christos }
938 1.1 christos else { /* doing 3 rounds of IXFR/TCP might not be useful */
939 1.1 christos xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
940 1.1 christos xfrd_tcp_obtain(xfrd->tcp_set, zone);
941 1.1 christos }
942 1.1 christos }
943 1.1 christos else if (zone->master->use_axfr_only || zone->soa_disk_acquired <= 0) {
944 1.1 christos xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
945 1.1 christos xfrd_tcp_obtain(xfrd->tcp_set, zone);
946 1.1 christos }
947 1.1 christos else if (zone->master->ixfr_disabled) {
948 1.1 christos if (zone->zone_options->pattern->allow_axfr_fallback) {
949 1.1 christos xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
950 1.1 christos xfrd_tcp_obtain(xfrd->tcp_set, zone);
951 1.1 christos } else {
952 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s axfr "
953 1.1 christos "fallback not allowed, skipping master %s.",
954 1.1 christos zone->apex_str, zone->master->ip_address_spec));
955 1.1 christos }
956 1.1 christos }
957 1.1 christos }
958 1.1 christos
959 1.1 christos static void
960 1.1.1.2 christos xfrd_udp_obtain(xfrd_zone_type* zone)
961 1.1 christos {
962 1.1 christos assert(zone->udp_waiting == 0);
963 1.1 christos if(zone->tcp_conn != -1) {
964 1.1 christos /* no tcp and udp at the same time */
965 1.1 christos xfrd_tcp_release(xfrd->tcp_set, zone);
966 1.1 christos }
967 1.1 christos if(xfrd->udp_use_num < XFRD_MAX_UDP) {
968 1.1 christos int fd;
969 1.1 christos xfrd->udp_use_num++;
970 1.1 christos fd = xfrd_send_ixfr_request_udp(zone);
971 1.1 christos if(fd == -1)
972 1.1 christos xfrd->udp_use_num--;
973 1.1 christos else {
974 1.1 christos if(zone->event_added)
975 1.1 christos event_del(&zone->zone_handler);
976 1.1 christos event_set(&zone->zone_handler, fd,
977 1.1 christos EV_PERSIST|EV_READ|EV_TIMEOUT,
978 1.1 christos xfrd_handle_zone, zone);
979 1.1 christos if(event_base_set(xfrd->event_base, &zone->zone_handler) != 0)
980 1.1 christos log_msg(LOG_ERR, "xfrd udp: event_base_set failed");
981 1.1 christos if(event_add(&zone->zone_handler, &zone->timeout) != 0)
982 1.1 christos log_msg(LOG_ERR, "xfrd udp: event_add failed");
983 1.1 christos zone->zone_handler_flags=EV_PERSIST|EV_READ|EV_TIMEOUT;
984 1.1 christos zone->event_added = 1;
985 1.1 christos }
986 1.1 christos return;
987 1.1 christos }
988 1.1 christos /* queue the zone as last */
989 1.1 christos zone->udp_waiting = 1;
990 1.1 christos zone->udp_waiting_next = NULL;
991 1.1 christos zone->udp_waiting_prev = xfrd->udp_waiting_last;
992 1.1 christos if(!xfrd->udp_waiting_first)
993 1.1 christos xfrd->udp_waiting_first = zone;
994 1.1 christos if(xfrd->udp_waiting_last)
995 1.1 christos xfrd->udp_waiting_last->udp_waiting_next = zone;
996 1.1 christos xfrd->udp_waiting_last = zone;
997 1.1 christos xfrd_unset_timer(zone);
998 1.1 christos }
999 1.1 christos
1000 1.1 christos time_t
1001 1.1 christos xfrd_time()
1002 1.1 christos {
1003 1.1 christos if(!xfrd->got_time) {
1004 1.1 christos xfrd->current_time = time(0);
1005 1.1 christos xfrd->got_time = 1;
1006 1.1 christos }
1007 1.1 christos return xfrd->current_time;
1008 1.1 christos }
1009 1.1 christos
1010 1.1 christos void
1011 1.1.1.2 christos xfrd_copy_soa(xfrd_soa_type* soa, rr_type* rr)
1012 1.1 christos {
1013 1.1 christos const uint8_t* rr_ns_wire = dname_name(domain_dname(rdata_atom_domain(rr->rdatas[0])));
1014 1.1 christos uint8_t rr_ns_len = domain_dname(rdata_atom_domain(rr->rdatas[0]))->name_size;
1015 1.1 christos const uint8_t* rr_em_wire = dname_name(domain_dname(rdata_atom_domain(rr->rdatas[1])));
1016 1.1 christos uint8_t rr_em_len = domain_dname(rdata_atom_domain(rr->rdatas[1]))->name_size;
1017 1.1 christos
1018 1.1 christos if(rr->type != TYPE_SOA || rr->rdata_count != 7) {
1019 1.1 christos log_msg(LOG_ERR, "xfrd: copy_soa called with bad rr, type %d rrs %u.",
1020 1.1 christos rr->type, rr->rdata_count);
1021 1.1 christos return;
1022 1.1 christos }
1023 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: copy_soa rr, type %d rrs %u, ttl %u.",
1024 1.1 christos (int)rr->type, (unsigned)rr->rdata_count, (unsigned)rr->ttl));
1025 1.1 christos soa->type = htons(rr->type);
1026 1.1 christos soa->klass = htons(rr->klass);
1027 1.1 christos soa->ttl = htonl(rr->ttl);
1028 1.1 christos soa->rdata_count = htons(rr->rdata_count);
1029 1.1 christos
1030 1.1 christos /* copy dnames */
1031 1.1 christos soa->prim_ns[0] = rr_ns_len;
1032 1.1 christos memcpy(soa->prim_ns+1, rr_ns_wire, rr_ns_len);
1033 1.1 christos soa->email[0] = rr_em_len;
1034 1.1 christos memcpy(soa->email+1, rr_em_wire, rr_em_len);
1035 1.1 christos
1036 1.1 christos /* already in network format */
1037 1.1 christos memcpy(&soa->serial, rdata_atom_data(rr->rdatas[2]), sizeof(uint32_t));
1038 1.1 christos memcpy(&soa->refresh, rdata_atom_data(rr->rdatas[3]), sizeof(uint32_t));
1039 1.1 christos memcpy(&soa->retry, rdata_atom_data(rr->rdatas[4]), sizeof(uint32_t));
1040 1.1 christos memcpy(&soa->expire, rdata_atom_data(rr->rdatas[5]), sizeof(uint32_t));
1041 1.1 christos memcpy(&soa->minimum, rdata_atom_data(rr->rdatas[6]), sizeof(uint32_t));
1042 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1043 1.1 christos "xfrd: copy_soa rr, serial %u refresh %u retry %u expire %u",
1044 1.1 christos (unsigned)ntohl(soa->serial), (unsigned)ntohl(soa->refresh),
1045 1.1 christos (unsigned)ntohl(soa->retry), (unsigned)ntohl(soa->expire)));
1046 1.1 christos }
1047 1.1 christos
1048 1.1 christos static void
1049 1.1.1.2 christos xfrd_set_zone_state(xfrd_zone_type* zone, enum xfrd_zone_state s)
1050 1.1 christos {
1051 1.1 christos if(s != zone->state) {
1052 1.1 christos enum xfrd_zone_state old = zone->state;
1053 1.1 christos zone->state = s;
1054 1.1 christos if((s == xfrd_zone_expired || old == xfrd_zone_expired)
1055 1.1 christos && s!=old) {
1056 1.1 christos xfrd_send_expire_notification(zone);
1057 1.1 christos }
1058 1.1 christos }
1059 1.1 christos }
1060 1.1 christos
1061 1.1 christos void
1062 1.1.1.2 christos xfrd_set_refresh_now(xfrd_zone_type* zone)
1063 1.1 christos {
1064 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s is activated, state %d",
1065 1.1 christos zone->apex_str, zone->state));
1066 1.1 christos if(!zone->is_activated) {
1067 1.1 christos /* push onto list */
1068 1.1 christos zone->activated_prev = 0;
1069 1.1 christos zone->activated_next = xfrd->activated_first;
1070 1.1 christos if(xfrd->activated_first)
1071 1.1 christos xfrd->activated_first->activated_prev = zone;
1072 1.1 christos xfrd->activated_first = zone;
1073 1.1 christos zone->is_activated = 1;
1074 1.1 christos }
1075 1.1 christos }
1076 1.1 christos
1077 1.1 christos void
1078 1.1.1.2 christos xfrd_unset_timer(xfrd_zone_type* zone)
1079 1.1 christos {
1080 1.1 christos assert(zone->zone_handler.ev_fd == -1);
1081 1.1 christos if(zone->event_added)
1082 1.1 christos event_del(&zone->zone_handler);
1083 1.1 christos zone->zone_handler_flags = 0;
1084 1.1 christos zone->event_added = 0;
1085 1.1 christos }
1086 1.1 christos
1087 1.1 christos void
1088 1.1.1.2 christos xfrd_set_timer(xfrd_zone_type* zone, time_t t)
1089 1.1 christos {
1090 1.1 christos int fd = zone->zone_handler.ev_fd;
1091 1.1 christos int fl = ((fd == -1)?EV_TIMEOUT:zone->zone_handler_flags);
1092 1.1 christos /* randomize the time, within 90%-100% of original */
1093 1.1 christos /* not later so zones cannot expire too late */
1094 1.1 christos /* only for times far in the future */
1095 1.1 christos if(t > 10) {
1096 1.1 christos time_t base = t*9/10;
1097 1.1 christos #ifdef HAVE_ARC4RANDOM_UNIFORM
1098 1.1 christos t = base + arc4random_uniform(t-base);
1099 1.1 christos #elif HAVE_ARC4RANDOM
1100 1.1 christos t = base + arc4random() % (t-base);
1101 1.1 christos #else
1102 1.1 christos t = base + random()%(t-base);
1103 1.1 christos #endif
1104 1.1 christos }
1105 1.1 christos
1106 1.1 christos /* keep existing flags and fd, but re-add with timeout */
1107 1.1 christos if(zone->event_added)
1108 1.1 christos event_del(&zone->zone_handler);
1109 1.1 christos else fd = -1;
1110 1.1 christos zone->timeout.tv_sec = t;
1111 1.1 christos zone->timeout.tv_usec = 0;
1112 1.1 christos event_set(&zone->zone_handler, fd, fl, xfrd_handle_zone, zone);
1113 1.1 christos if(event_base_set(xfrd->event_base, &zone->zone_handler) != 0)
1114 1.1 christos log_msg(LOG_ERR, "xfrd timer: event_base_set failed");
1115 1.1 christos if(event_add(&zone->zone_handler, &zone->timeout) != 0)
1116 1.1 christos log_msg(LOG_ERR, "xfrd timer: event_add failed");
1117 1.1 christos zone->zone_handler_flags = fl;
1118 1.1 christos zone->event_added = 1;
1119 1.1 christos }
1120 1.1 christos
1121 1.1 christos void
1122 1.1.1.2 christos xfrd_handle_incoming_soa(xfrd_zone_type* zone,
1123 1.1.1.2 christos xfrd_soa_type* soa, time_t acquired)
1124 1.1 christos {
1125 1.1 christos if(soa == NULL) {
1126 1.1 christos /* nsd no longer has a zone in memory */
1127 1.1 christos zone->soa_nsd_acquired = 0;
1128 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1129 1.1 christos xfrd_set_refresh_now(zone);
1130 1.1 christos return;
1131 1.1 christos }
1132 1.1 christos if(zone->soa_nsd_acquired && soa->serial == zone->soa_nsd.serial)
1133 1.1 christos return;
1134 1.1 christos
1135 1.1 christos if(zone->soa_disk_acquired && soa->serial == zone->soa_disk.serial)
1136 1.1 christos {
1137 1.1 christos /* soa in disk has been loaded in memory */
1138 1.1 christos log_msg(LOG_INFO, "zone %s serial %u is updated to %u.",
1139 1.1 christos zone->apex_str, (unsigned)ntohl(zone->soa_nsd.serial),
1140 1.1 christos (unsigned)ntohl(soa->serial));
1141 1.1 christos zone->soa_nsd = zone->soa_disk;
1142 1.1 christos zone->soa_nsd_acquired = zone->soa_disk_acquired;
1143 1.1 christos xfrd->write_zonefile_needed = 1;
1144 1.1 christos /* reset exponential backoff, we got a normal timer now */
1145 1.1 christos zone->fresh_xfr_timeout = 0;
1146 1.1 christos if(xfrd_time() - zone->soa_disk_acquired
1147 1.1 christos < (time_t)ntohl(zone->soa_disk.refresh))
1148 1.1 christos {
1149 1.1 christos /* zone ok, wait for refresh time */
1150 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_ok);
1151 1.1 christos zone->round_num = -1;
1152 1.1 christos xfrd_set_timer_refresh(zone);
1153 1.1 christos } else if(xfrd_time() - zone->soa_disk_acquired
1154 1.1 christos < (time_t)ntohl(zone->soa_disk.expire))
1155 1.1 christos {
1156 1.1 christos /* zone refreshing */
1157 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1158 1.1 christos xfrd_set_refresh_now(zone);
1159 1.1 christos }
1160 1.1 christos if(xfrd_time() - zone->soa_disk_acquired
1161 1.1 christos >= (time_t)ntohl(zone->soa_disk.expire)) {
1162 1.1 christos /* zone expired */
1163 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_expired);
1164 1.1 christos xfrd_set_refresh_now(zone);
1165 1.1 christos }
1166 1.1 christos
1167 1.1 christos if(zone->soa_notified_acquired != 0 &&
1168 1.1 christos (zone->soa_notified.serial == 0 ||
1169 1.1 christos compare_serial(ntohl(zone->soa_disk.serial),
1170 1.1 christos ntohl(zone->soa_notified.serial)) >= 0))
1171 1.1 christos { /* read was in response to this notification */
1172 1.1 christos zone->soa_notified_acquired = 0;
1173 1.1 christos }
1174 1.1 christos if(zone->soa_notified_acquired && zone->state == xfrd_zone_ok)
1175 1.1 christos {
1176 1.1 christos /* refresh because of notification */
1177 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1178 1.1 christos xfrd_set_refresh_now(zone);
1179 1.1 christos }
1180 1.1 christos xfrd_send_notify(xfrd->notify_zones, zone->apex, &zone->soa_nsd);
1181 1.1 christos return;
1182 1.1 christos }
1183 1.1 christos
1184 1.1 christos /* user must have manually provided zone data */
1185 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1186 1.1 christos "xfrd: zone %s serial %u from zonefile. refreshing",
1187 1.1 christos zone->apex_str, (unsigned)ntohl(soa->serial)));
1188 1.1 christos zone->soa_nsd = *soa;
1189 1.1 christos zone->soa_disk = *soa;
1190 1.1 christos zone->soa_nsd_acquired = acquired;
1191 1.1 christos zone->soa_disk_acquired = acquired;
1192 1.1 christos if(zone->soa_notified_acquired != 0 &&
1193 1.1 christos (zone->soa_notified.serial == 0 ||
1194 1.1 christos compare_serial(ntohl(zone->soa_disk.serial),
1195 1.1 christos ntohl(zone->soa_notified.serial)) >= 0))
1196 1.1 christos { /* user provided in response to this notification */
1197 1.1 christos zone->soa_notified_acquired = 0;
1198 1.1 christos }
1199 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1200 1.1 christos xfrd_set_refresh_now(zone);
1201 1.1 christos xfrd_send_notify(xfrd->notify_zones, zone->apex, &zone->soa_nsd);
1202 1.1 christos }
1203 1.1 christos
1204 1.1 christos void
1205 1.1.1.2 christos xfrd_send_expire_notification(xfrd_zone_type* zone)
1206 1.1 christos {
1207 1.1 christos task_new_expire(xfrd->nsd->task[xfrd->nsd->mytask], xfrd->last_task,
1208 1.1 christos zone->apex, zone->state == xfrd_zone_expired);
1209 1.1 christos xfrd_set_reload_timeout();
1210 1.1 christos }
1211 1.1 christos
1212 1.1 christos int
1213 1.1.1.2 christos xfrd_udp_read_packet(buffer_type* packet, int fd, struct sockaddr* src,
1214 1.1.1.2 christos socklen_t* srclen)
1215 1.1 christos {
1216 1.1 christos ssize_t received;
1217 1.1 christos
1218 1.1 christos /* read the data */
1219 1.1 christos buffer_clear(packet);
1220 1.1 christos received = recvfrom(fd, buffer_begin(packet), buffer_remaining(packet),
1221 1.1.1.2 christos 0, src, srclen);
1222 1.1 christos if(received == -1) {
1223 1.1 christos log_msg(LOG_ERR, "xfrd: recvfrom failed: %s",
1224 1.1 christos strerror(errno));
1225 1.1 christos return 0;
1226 1.1 christos }
1227 1.1 christos buffer_set_limit(packet, received);
1228 1.1 christos return 1;
1229 1.1 christos }
1230 1.1 christos
1231 1.1 christos void
1232 1.1.1.2 christos xfrd_udp_release(xfrd_zone_type* zone)
1233 1.1 christos {
1234 1.1 christos assert(zone->udp_waiting == 0);
1235 1.1 christos if(zone->event_added)
1236 1.1 christos event_del(&zone->zone_handler);
1237 1.1 christos if(zone->zone_handler.ev_fd != -1) {
1238 1.1 christos close(zone->zone_handler.ev_fd);
1239 1.1 christos }
1240 1.1 christos zone->zone_handler.ev_fd = -1;
1241 1.1 christos zone->zone_handler_flags = 0;
1242 1.1 christos zone->event_added = 0;
1243 1.1 christos /* see if there are waiting zones */
1244 1.1 christos if(xfrd->udp_use_num == XFRD_MAX_UDP)
1245 1.1 christos {
1246 1.1 christos while(xfrd->udp_waiting_first) {
1247 1.1 christos /* snip off waiting list */
1248 1.1.1.2 christos xfrd_zone_type* wz = xfrd->udp_waiting_first;
1249 1.1 christos assert(wz->udp_waiting);
1250 1.1 christos wz->udp_waiting = 0;
1251 1.1 christos xfrd->udp_waiting_first = wz->udp_waiting_next;
1252 1.1 christos if(wz->udp_waiting_next)
1253 1.1 christos wz->udp_waiting_next->udp_waiting_prev = NULL;
1254 1.1 christos if(xfrd->udp_waiting_last == wz)
1255 1.1 christos xfrd->udp_waiting_last = NULL;
1256 1.1 christos /* see if this zone needs udp connection */
1257 1.1 christos if(wz->tcp_conn == -1) {
1258 1.1 christos int fd = xfrd_send_ixfr_request_udp(wz);
1259 1.1 christos if(fd != -1) {
1260 1.1 christos if(wz->event_added)
1261 1.1 christos event_del(&wz->zone_handler);
1262 1.1 christos event_set(&wz->zone_handler, fd,
1263 1.1 christos EV_READ|EV_TIMEOUT|EV_PERSIST,
1264 1.1 christos xfrd_handle_zone, wz);
1265 1.1 christos if(event_base_set(xfrd->event_base,
1266 1.1 christos &wz->zone_handler) != 0)
1267 1.1 christos log_msg(LOG_ERR, "cannot set event_base for ixfr");
1268 1.1 christos if(event_add(&wz->zone_handler, &wz->timeout) != 0)
1269 1.1 christos log_msg(LOG_ERR, "cannot add event for ixfr");
1270 1.1 christos wz->zone_handler_flags = EV_READ|EV_TIMEOUT|EV_PERSIST;
1271 1.1 christos wz->event_added = 1;
1272 1.1 christos return;
1273 1.1 christos } else {
1274 1.1 christos /* make this zone do something with
1275 1.1 christos * this failure to act */
1276 1.1 christos xfrd_set_refresh_now(wz);
1277 1.1 christos }
1278 1.1 christos }
1279 1.1 christos }
1280 1.1 christos }
1281 1.1 christos /* no waiting zones */
1282 1.1 christos if(xfrd->udp_use_num > 0)
1283 1.1 christos xfrd->udp_use_num--;
1284 1.1 christos }
1285 1.1 christos
1286 1.1 christos /** disable ixfr for master */
1287 1.1 christos void
1288 1.1.1.2 christos xfrd_disable_ixfr(xfrd_zone_type* zone)
1289 1.1 christos {
1290 1.1 christos if(!(zone->master->ixfr_disabled &&
1291 1.1 christos (zone->master->ixfr_disabled + XFRD_NO_IXFR_CACHE) <= time(NULL))) {
1292 1.1 christos /* start new round, with IXFR disabled */
1293 1.1 christos zone->round_num = 0;
1294 1.1 christos zone->next_master = zone->master_num;
1295 1.1 christos }
1296 1.1 christos zone->master->ixfr_disabled = time(NULL);
1297 1.1 christos }
1298 1.1 christos
1299 1.1 christos static void
1300 1.1.1.2 christos xfrd_udp_read(xfrd_zone_type* zone)
1301 1.1 christos {
1302 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s read udp data", zone->apex_str));
1303 1.1.1.2 christos if(!xfrd_udp_read_packet(xfrd->packet, zone->zone_handler.ev_fd,
1304 1.1.1.2 christos NULL, NULL)) {
1305 1.1 christos zone->master->bad_xfr_count++;
1306 1.1 christos if (zone->master->bad_xfr_count > 2) {
1307 1.1 christos xfrd_disable_ixfr(zone);
1308 1.1 christos zone->master->bad_xfr_count = 0;
1309 1.1 christos }
1310 1.1 christos /* drop packet */
1311 1.1 christos xfrd_udp_release(zone);
1312 1.1 christos /* query next server */
1313 1.1 christos xfrd_make_request(zone);
1314 1.1 christos return;
1315 1.1 christos }
1316 1.1 christos switch(xfrd_handle_received_xfr_packet(zone, xfrd->packet)) {
1317 1.1 christos case xfrd_packet_tcp:
1318 1.1 christos xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
1319 1.1 christos xfrd_udp_release(zone);
1320 1.1 christos xfrd_tcp_obtain(xfrd->tcp_set, zone);
1321 1.1 christos break;
1322 1.1 christos case xfrd_packet_transfer:
1323 1.1 christos if(zone->zone_options->pattern->multi_master_check) {
1324 1.1 christos xfrd_udp_release(zone);
1325 1.1 christos xfrd_make_request(zone);
1326 1.1 christos break;
1327 1.1 christos }
1328 1.1.1.2 christos /* fallthrough */
1329 1.1 christos case xfrd_packet_newlease:
1330 1.1 christos /* nothing more to do */
1331 1.1 christos assert(zone->round_num == -1);
1332 1.1 christos xfrd_udp_release(zone);
1333 1.1 christos break;
1334 1.1 christos case xfrd_packet_notimpl:
1335 1.1 christos xfrd_disable_ixfr(zone);
1336 1.1 christos /* drop packet */
1337 1.1 christos xfrd_udp_release(zone);
1338 1.1 christos /* query next server */
1339 1.1 christos xfrd_make_request(zone);
1340 1.1 christos break;
1341 1.1 christos case xfrd_packet_more:
1342 1.1 christos case xfrd_packet_drop:
1343 1.1 christos /* drop packet */
1344 1.1 christos xfrd_udp_release(zone);
1345 1.1 christos /* query next server */
1346 1.1 christos xfrd_make_request(zone);
1347 1.1 christos break;
1348 1.1 christos case xfrd_packet_bad:
1349 1.1 christos default:
1350 1.1 christos zone->master->bad_xfr_count++;
1351 1.1 christos if (zone->master->bad_xfr_count > 2) {
1352 1.1 christos xfrd_disable_ixfr(zone);
1353 1.1 christos zone->master->bad_xfr_count = 0;
1354 1.1 christos }
1355 1.1 christos /* drop packet */
1356 1.1 christos xfrd_udp_release(zone);
1357 1.1 christos /* query next server */
1358 1.1 christos xfrd_make_request(zone);
1359 1.1 christos break;
1360 1.1 christos }
1361 1.1 christos }
1362 1.1 christos
1363 1.1 christos int
1364 1.1.1.2 christos xfrd_send_udp(struct acl_options* acl, buffer_type* packet,
1365 1.1.1.2 christos struct acl_options* ifc)
1366 1.1 christos {
1367 1.1 christos #ifdef INET6
1368 1.1 christos struct sockaddr_storage to;
1369 1.1 christos #else
1370 1.1 christos struct sockaddr_in to;
1371 1.1 christos #endif /* INET6 */
1372 1.1 christos int fd, family;
1373 1.1 christos
1374 1.1 christos /* this will set the remote port to acl->port or TCP_PORT */
1375 1.1 christos socklen_t to_len = xfrd_acl_sockaddr_to(acl, &to);
1376 1.1 christos
1377 1.1 christos /* get the address family of the remote host */
1378 1.1 christos if(acl->is_ipv6) {
1379 1.1 christos #ifdef INET6
1380 1.1 christos family = PF_INET6;
1381 1.1 christos #else
1382 1.1 christos return -1;
1383 1.1 christos #endif /* INET6 */
1384 1.1 christos } else {
1385 1.1 christos family = PF_INET;
1386 1.1 christos }
1387 1.1 christos
1388 1.1 christos fd = socket(family, SOCK_DGRAM, IPPROTO_UDP);
1389 1.1 christos if(fd == -1) {
1390 1.1 christos log_msg(LOG_ERR, "xfrd: cannot create udp socket to %s: %s",
1391 1.1 christos acl->ip_address_spec, strerror(errno));
1392 1.1 christos return -1;
1393 1.1 christos }
1394 1.1 christos
1395 1.1 christos /* bind it */
1396 1.1 christos if (!xfrd_bind_local_interface(fd, ifc, acl, 0)) {
1397 1.1 christos log_msg(LOG_ERR, "xfrd: cannot bind outgoing interface '%s' to "
1398 1.1 christos "udp socket: No matching ip addresses found",
1399 1.1 christos ifc->ip_address_spec);
1400 1.1 christos close(fd);
1401 1.1 christos return -1;
1402 1.1 christos }
1403 1.1 christos
1404 1.1 christos /* send it (udp) */
1405 1.1 christos if(sendto(fd,
1406 1.1 christos buffer_current(packet),
1407 1.1 christos buffer_remaining(packet), 0,
1408 1.1 christos (struct sockaddr*)&to, to_len) == -1)
1409 1.1 christos {
1410 1.1 christos log_msg(LOG_ERR, "xfrd: sendto %s failed %s",
1411 1.1 christos acl->ip_address_spec, strerror(errno));
1412 1.1 christos close(fd);
1413 1.1 christos return -1;
1414 1.1 christos }
1415 1.1 christos return fd;
1416 1.1 christos }
1417 1.1 christos
1418 1.1 christos int
1419 1.1.1.2 christos xfrd_bind_local_interface(int sockd, struct acl_options* ifc,
1420 1.1.1.2 christos struct acl_options* acl, int tcp)
1421 1.1 christos {
1422 1.1 christos #ifdef SO_LINGER
1423 1.1 christos struct linger linger = {1, 0};
1424 1.1 christos #endif
1425 1.1 christos socklen_t frm_len;
1426 1.1 christos #ifdef INET6
1427 1.1 christos struct sockaddr_storage frm;
1428 1.1 christos #else
1429 1.1 christos struct sockaddr_in frm;
1430 1.1 christos #endif /* INET6 */
1431 1.1 christos int ret = 1;
1432 1.1 christos
1433 1.1 christos if (!ifc) /* no outgoing interface set */
1434 1.1 christos return 1;
1435 1.1 christos
1436 1.1 christos while (ifc) {
1437 1.1 christos if (ifc->is_ipv6 != acl->is_ipv6) {
1438 1.1 christos /* check if we have a matching address family */
1439 1.1 christos ifc = ifc->next;
1440 1.1 christos continue;
1441 1.1 christos }
1442 1.1 christos
1443 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: bind() %s to %s socket",
1444 1.1 christos ifc->ip_address_spec, tcp? "tcp":"udp"));
1445 1.1 christos ret = 0;
1446 1.1 christos frm_len = xfrd_acl_sockaddr_frm(ifc, &frm);
1447 1.1 christos
1448 1.1 christos if (tcp) {
1449 1.1 christos #ifdef SO_REUSEADDR
1450 1.1 christos if (setsockopt(sockd, SOL_SOCKET, SO_REUSEADDR, &frm,
1451 1.1 christos frm_len) < 0) {
1452 1.1 christos VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt "
1453 1.1 christos "SO_REUSEADDR failed: %s", strerror(errno)));
1454 1.1 christos }
1455 1.1 christos #else
1456 1.1 christos VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt SO_REUSEADDR "
1457 1.1 christos "failed: SO_REUSEADDR not defined"));
1458 1.1 christos #endif /* SO_REUSEADDR */
1459 1.1 christos
1460 1.1 christos if (ifc->port != 0) {
1461 1.1 christos #ifdef SO_LINGER
1462 1.1 christos if (setsockopt(sockd, SOL_SOCKET, SO_LINGER,
1463 1.1 christos &linger, sizeof(linger)) < 0) {
1464 1.1 christos VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt "
1465 1.1 christos "SO_LINGER failed: %s", strerror(errno)));
1466 1.1 christos }
1467 1.1 christos #else
1468 1.1 christos VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt SO_LINGER "
1469 1.1 christos "failed: SO_LINGER not defined"));
1470 1.1 christos #endif /* SO_LINGER */
1471 1.1 christos }
1472 1.1 christos }
1473 1.1 christos
1474 1.1 christos /* found one */
1475 1.1 christos if(bind(sockd, (struct sockaddr*)&frm, frm_len) >= 0) {
1476 1.1 christos DEBUG(DEBUG_XFRD,2, (LOG_INFO, "xfrd: bind() %s to %s "
1477 1.1 christos "socket was successful",
1478 1.1 christos ifc->ip_address_spec, tcp? "tcp":"udp"));
1479 1.1 christos return 1;
1480 1.1 christos }
1481 1.1 christos
1482 1.1 christos DEBUG(DEBUG_XFRD,2, (LOG_INFO, "xfrd: bind() %s to %s socket"
1483 1.1 christos "failed: %s",
1484 1.1 christos ifc->ip_address_spec, tcp? "tcp":"udp",
1485 1.1 christos strerror(errno)));
1486 1.1 christos
1487 1.1 christos log_msg(LOG_WARNING, "xfrd: could not bind source address:port to "
1488 1.1 christos "socket: %s", strerror(errno));
1489 1.1 christos /* try another */
1490 1.1 christos ifc = ifc->next;
1491 1.1 christos }
1492 1.1 christos return ret;
1493 1.1 christos }
1494 1.1 christos
1495 1.1 christos void
1496 1.1 christos xfrd_tsig_sign_request(buffer_type* packet, tsig_record_type* tsig,
1497 1.1.1.2 christos struct acl_options* acl)
1498 1.1 christos {
1499 1.1 christos tsig_algorithm_type* algo;
1500 1.1 christos assert(acl->key_options && acl->key_options->tsig_key);
1501 1.1 christos algo = tsig_get_algorithm_by_name(acl->key_options->algorithm);
1502 1.1 christos if(!algo) {
1503 1.1 christos log_msg(LOG_ERR, "tsig unknown algorithm %s",
1504 1.1 christos acl->key_options->algorithm);
1505 1.1 christos return;
1506 1.1 christos }
1507 1.1 christos assert(algo);
1508 1.1 christos tsig_init_record(tsig, algo, acl->key_options->tsig_key);
1509 1.1 christos tsig_init_query(tsig, ID(packet));
1510 1.1 christos tsig_prepare(tsig);
1511 1.1 christos tsig_update(tsig, packet, buffer_position(packet));
1512 1.1 christos tsig_sign(tsig);
1513 1.1 christos tsig_append_rr(tsig, packet);
1514 1.1 christos ARCOUNT_SET(packet, ARCOUNT(packet) + 1);
1515 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "appending tsig to packet"));
1516 1.1 christos /* prepare for validating tsigs */
1517 1.1 christos tsig_prepare(tsig);
1518 1.1 christos }
1519 1.1 christos
1520 1.1 christos static int
1521 1.1.1.2 christos xfrd_send_ixfr_request_udp(xfrd_zone_type* zone)
1522 1.1 christos {
1523 1.1 christos int fd;
1524 1.1 christos
1525 1.1 christos /* make sure we have a master to query the ixfr request to */
1526 1.1 christos assert(zone->master);
1527 1.1 christos
1528 1.1 christos if(zone->tcp_conn != -1) {
1529 1.1 christos /* tcp is using the zone_handler.fd */
1530 1.1 christos log_msg(LOG_ERR, "xfrd: %s tried to send udp whilst tcp engaged",
1531 1.1 christos zone->apex_str);
1532 1.1 christos return -1;
1533 1.1 christos }
1534 1.1 christos xfrd_setup_packet(xfrd->packet, TYPE_IXFR, CLASS_IN, zone->apex,
1535 1.1 christos qid_generate());
1536 1.1 christos zone->query_id = ID(xfrd->packet);
1537 1.1 christos /* delete old xfr file? */
1538 1.1 christos if(zone->msg_seq_nr)
1539 1.1 christos xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
1540 1.1 christos zone->msg_seq_nr = 0;
1541 1.1 christos zone->msg_rr_count = 0;
1542 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "sent query with ID %d", zone->query_id));
1543 1.1 christos NSCOUNT_SET(xfrd->packet, 1);
1544 1.1 christos xfrd_write_soa_buffer(xfrd->packet, zone->apex, &zone->soa_disk);
1545 1.1 christos /* if we have tsig keys, sign the ixfr query */
1546 1.1 christos if(zone->master->key_options && zone->master->key_options->tsig_key) {
1547 1.1 christos xfrd_tsig_sign_request(xfrd->packet, &zone->tsig, zone->master);
1548 1.1 christos }
1549 1.1 christos buffer_flip(xfrd->packet);
1550 1.1 christos xfrd_set_timer(zone, XFRD_UDP_TIMEOUT);
1551 1.1 christos
1552 1.1 christos if((fd = xfrd_send_udp(zone->master, xfrd->packet,
1553 1.1 christos zone->zone_options->pattern->outgoing_interface)) == -1)
1554 1.1 christos return -1;
1555 1.1 christos
1556 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1557 1.1 christos "xfrd sent udp request for ixfr=%u for zone %s to %s",
1558 1.1 christos (unsigned)ntohl(zone->soa_disk.serial),
1559 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1560 1.1 christos return fd;
1561 1.1 christos }
1562 1.1 christos
1563 1.1.1.2 christos static int xfrd_parse_soa_info(buffer_type* packet, xfrd_soa_type* soa)
1564 1.1 christos {
1565 1.1 christos if(!buffer_available(packet, 10))
1566 1.1 christos return 0;
1567 1.1 christos soa->type = htons(buffer_read_u16(packet));
1568 1.1 christos soa->klass = htons(buffer_read_u16(packet));
1569 1.1 christos soa->ttl = htonl(buffer_read_u32(packet));
1570 1.1 christos if(ntohs(soa->type) != TYPE_SOA || ntohs(soa->klass) != CLASS_IN)
1571 1.1 christos {
1572 1.1 christos return 0;
1573 1.1 christos }
1574 1.1 christos
1575 1.1 christos if(!buffer_available(packet, buffer_read_u16(packet)) /* rdata length */ ||
1576 1.1 christos !(soa->prim_ns[0] = dname_make_wire_from_packet(soa->prim_ns+1, packet, 1)) ||
1577 1.1 christos !(soa->email[0] = dname_make_wire_from_packet(soa->email+1, packet, 1)))
1578 1.1 christos {
1579 1.1 christos return 0;
1580 1.1 christos }
1581 1.1 christos soa->rdata_count = 7; /* rdata in SOA */
1582 1.1 christos soa->serial = htonl(buffer_read_u32(packet));
1583 1.1 christos soa->refresh = htonl(buffer_read_u32(packet));
1584 1.1 christos soa->retry = htonl(buffer_read_u32(packet));
1585 1.1 christos soa->expire = htonl(buffer_read_u32(packet));
1586 1.1 christos soa->minimum = htonl(buffer_read_u32(packet));
1587 1.1 christos
1588 1.1 christos return 1;
1589 1.1 christos }
1590 1.1 christos
1591 1.1 christos
1592 1.1 christos /*
1593 1.1 christos * Check the RRs in an IXFR/AXFR reply.
1594 1.1 christos * returns 0 on error, 1 on correct parseable packet.
1595 1.1 christos * done = 1 if the last SOA in an IXFR/AXFR has been seen.
1596 1.1 christos * soa then contains that soa info.
1597 1.1 christos * (soa contents is modified by the routine)
1598 1.1 christos */
1599 1.1 christos static int
1600 1.1.1.2 christos xfrd_xfr_check_rrs(xfrd_zone_type* zone, buffer_type* packet, size_t count,
1601 1.1.1.2 christos int *done, xfrd_soa_type* soa, region_type* temp)
1602 1.1 christos {
1603 1.1 christos /* first RR has already been checked */
1604 1.1 christos uint32_t tmp_serial = 0;
1605 1.1 christos uint16_t type, rrlen;
1606 1.1 christos size_t i, soapos, mempos;
1607 1.1 christos const dname_type* dname;
1608 1.1 christos domain_table_type* owners;
1609 1.1 christos rdata_atom_type* rdatas;
1610 1.1 christos
1611 1.1 christos for(i=0; i<count; ++i,++zone->msg_rr_count)
1612 1.1 christos {
1613 1.1 christos if (*done) {
1614 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr has "
1615 1.1 christos "trailing garbage", zone->apex_str));
1616 1.1 christos return 0;
1617 1.1 christos }
1618 1.1 christos region_free_all(temp);
1619 1.1 christos owners = domain_table_create(temp);
1620 1.1 christos /* check the dname for errors */
1621 1.1 christos dname = dname_make_from_packet(temp, packet, 1, 1);
1622 1.1 christos if(!dname) {
1623 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr unable "
1624 1.1 christos "to parse owner name", zone->apex_str));
1625 1.1 christos return 0;
1626 1.1 christos }
1627 1.1 christos if(!buffer_available(packet, 10)) {
1628 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr hdr "
1629 1.1 christos "too small", zone->apex_str));
1630 1.1 christos return 0;
1631 1.1 christos }
1632 1.1 christos soapos = buffer_position(packet);
1633 1.1 christos type = buffer_read_u16(packet);
1634 1.1 christos (void)buffer_read_u16(packet); /* class */
1635 1.1 christos (void)buffer_read_u32(packet); /* ttl */
1636 1.1 christos rrlen = buffer_read_u16(packet);
1637 1.1 christos if(!buffer_available(packet, rrlen)) {
1638 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr pkt "
1639 1.1 christos "too small", zone->apex_str));
1640 1.1 christos return 0;
1641 1.1 christos }
1642 1.1 christos mempos = buffer_position(packet);
1643 1.1 christos if(rdata_wireformat_to_rdata_atoms(temp, owners, type, rrlen,
1644 1.1 christos packet, &rdatas) == -1) {
1645 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr unable "
1646 1.1 christos "to parse rdata", zone->apex_str));
1647 1.1 christos return 0;
1648 1.1 christos }
1649 1.1 christos if(type == TYPE_SOA) {
1650 1.1 christos /* check the SOAs */
1651 1.1 christos buffer_set_position(packet, soapos);
1652 1.1 christos if(!xfrd_parse_soa_info(packet, soa)) {
1653 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1654 1.1 christos "unable to parse soainfo", zone->apex_str));
1655 1.1 christos return 0;
1656 1.1 christos }
1657 1.1 christos if(zone->msg_rr_count == 1 &&
1658 1.1 christos ntohl(soa->serial) != zone->msg_new_serial) {
1659 1.1 christos /* 2nd RR is SOA with lower serial, this is an IXFR */
1660 1.1 christos zone->msg_is_ixfr = 1;
1661 1.1 christos if(!zone->soa_disk_acquired) {
1662 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1663 1.1 christos "got ixfr but need axfr", zone->apex_str));
1664 1.1 christos return 0; /* got IXFR but need AXFR */
1665 1.1 christos }
1666 1.1 christos if(ntohl(soa->serial) != ntohl(zone->soa_disk.serial)) {
1667 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1668 1.1 christos "bad start serial", zone->apex_str));
1669 1.1 christos return 0; /* bad start serial in IXFR */
1670 1.1 christos }
1671 1.1 christos zone->msg_old_serial = ntohl(soa->serial);
1672 1.1 christos tmp_serial = ntohl(soa->serial);
1673 1.1 christos }
1674 1.1 christos else if(ntohl(soa->serial) == zone->msg_new_serial) {
1675 1.1 christos /* saw another SOA of new serial. */
1676 1.1 christos if(zone->msg_is_ixfr == 1) {
1677 1.1 christos zone->msg_is_ixfr = 2; /* seen middle SOA in ixfr */
1678 1.1 christos } else {
1679 1.1 christos /* 2nd SOA for AXFR or 3rd newSOA for IXFR */
1680 1.1 christos *done = 1;
1681 1.1 christos }
1682 1.1 christos }
1683 1.1 christos else if (zone->msg_is_ixfr) {
1684 1.1 christos /* some additional checks */
1685 1.1 christos if(ntohl(soa->serial) > zone->msg_new_serial) {
1686 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1687 1.1 christos "bad middle serial", zone->apex_str));
1688 1.1 christos return 0; /* bad middle serial in IXFR */
1689 1.1 christos }
1690 1.1 christos if(ntohl(soa->serial) < tmp_serial) {
1691 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1692 1.1 christos "serial decreasing not allowed", zone->apex_str));
1693 1.1 christos return 0; /* middle serial decreases in IXFR */
1694 1.1 christos }
1695 1.1 christos /* serial ok, update tmp serial */
1696 1.1 christos tmp_serial = ntohl(soa->serial);
1697 1.1 christos }
1698 1.1 christos }
1699 1.1 christos buffer_set_position(packet, mempos);
1700 1.1 christos buffer_skip(packet, rrlen);
1701 1.1 christos }
1702 1.1 christos /* packet seems to have a valid DNS RR structure */
1703 1.1 christos return 1;
1704 1.1 christos }
1705 1.1 christos
1706 1.1 christos static int
1707 1.1.1.2 christos xfrd_xfr_process_tsig(xfrd_zone_type* zone, buffer_type* packet)
1708 1.1 christos {
1709 1.1 christos int have_tsig = 0;
1710 1.1 christos assert(zone && zone->master && zone->master->key_options
1711 1.1 christos && zone->master->key_options->tsig_key && packet);
1712 1.1 christos if(!tsig_find_rr(&zone->tsig, packet)) {
1713 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s, from %s: malformed tsig RR",
1714 1.1 christos zone->apex_str, zone->master->ip_address_spec);
1715 1.1 christos return 0;
1716 1.1 christos }
1717 1.1 christos if(zone->tsig.status == TSIG_OK) {
1718 1.1 christos have_tsig = 1;
1719 1.1 christos if (zone->tsig.error_code != TSIG_ERROR_NOERROR) {
1720 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s, from %s: tsig error "
1721 1.1 christos "(%s)", zone->apex_str,
1722 1.1 christos zone->master->ip_address_spec,
1723 1.1 christos tsig_error(zone->tsig.error_code));
1724 1.1 christos }
1725 1.1 christos }
1726 1.1 christos if(have_tsig) {
1727 1.1 christos /* strip the TSIG resource record off... */
1728 1.1 christos buffer_set_limit(packet, zone->tsig.position);
1729 1.1 christos ARCOUNT_SET(packet, ARCOUNT(packet) - 1);
1730 1.1 christos }
1731 1.1 christos
1732 1.1 christos /* keep running the TSIG hash */
1733 1.1 christos tsig_update(&zone->tsig, packet, buffer_limit(packet));
1734 1.1 christos if(have_tsig) {
1735 1.1 christos if (!tsig_verify(&zone->tsig)) {
1736 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s, from %s: bad tsig signature",
1737 1.1 christos zone->apex_str, zone->master->ip_address_spec);
1738 1.1 christos return 0;
1739 1.1 christos }
1740 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s, from %s: good tsig signature",
1741 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1742 1.1 christos /* prepare for next tsigs */
1743 1.1 christos tsig_prepare(&zone->tsig);
1744 1.1 christos }
1745 1.1 christos else if(zone->tsig.updates_since_last_prepare > XFRD_TSIG_MAX_UNSIGNED) {
1746 1.1 christos /* we allow a number of non-tsig signed packets */
1747 1.1 christos log_msg(LOG_INFO, "xfrd: zone %s, from %s: too many consecutive "
1748 1.1 christos "packets without TSIG", zone->apex_str,
1749 1.1 christos zone->master->ip_address_spec);
1750 1.1 christos return 0;
1751 1.1 christos }
1752 1.1 christos
1753 1.1 christos if(!have_tsig && zone->msg_seq_nr == 0) {
1754 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s, from %s: no tsig in first packet of reply",
1755 1.1 christos zone->apex_str, zone->master->ip_address_spec);
1756 1.1 christos return 0;
1757 1.1 christos }
1758 1.1 christos return 1;
1759 1.1 christos }
1760 1.1 christos
1761 1.1 christos /* parse the received packet. returns xfrd packet result code. */
1762 1.1 christos static enum xfrd_packet_result
1763 1.1.1.2 christos xfrd_parse_received_xfr_packet(xfrd_zone_type* zone, buffer_type* packet,
1764 1.1.1.2 christos xfrd_soa_type* soa)
1765 1.1 christos {
1766 1.1 christos size_t rr_count;
1767 1.1 christos size_t qdcount = QDCOUNT(packet);
1768 1.1 christos size_t ancount = ANCOUNT(packet), ancount_todo;
1769 1.1 christos size_t nscount = NSCOUNT(packet);
1770 1.1 christos int done = 0;
1771 1.1 christos region_type* tempregion = NULL;
1772 1.1 christos
1773 1.1 christos /* has to be axfr / ixfr reply */
1774 1.1 christos if(!buffer_available(packet, QHEADERSZ)) {
1775 1.1 christos log_msg(LOG_INFO, "packet too small");
1776 1.1 christos return xfrd_packet_bad;
1777 1.1 christos }
1778 1.1 christos
1779 1.1 christos /* only check ID in first response message. Could also check that
1780 1.1 christos * AA bit and QR bit are set, but not needed.
1781 1.1 christos */
1782 1.1 christos DEBUG(DEBUG_XFRD,2, (LOG_INFO,
1783 1.1 christos "got query with ID %d and %d needed", ID(packet), zone->query_id));
1784 1.1 christos if(ID(packet) != zone->query_id) {
1785 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s received bad query id from %s, "
1786 1.1 christos "dropped",
1787 1.1 christos zone->apex_str, zone->master->ip_address_spec);
1788 1.1 christos return xfrd_packet_bad;
1789 1.1 christos }
1790 1.1 christos /* check RCODE in all response messages */
1791 1.1 christos if(RCODE(packet) != RCODE_OK) {
1792 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s received error code %s from "
1793 1.1 christos "%s",
1794 1.1 christos zone->apex_str, rcode2str(RCODE(packet)),
1795 1.1 christos zone->master->ip_address_spec);
1796 1.1 christos if (RCODE(packet) == RCODE_IMPL ||
1797 1.1 christos RCODE(packet) == RCODE_FORMAT) {
1798 1.1 christos return xfrd_packet_notimpl;
1799 1.1 christos }
1800 1.1 christos if (RCODE(packet) != RCODE_NOTAUTH) {
1801 1.1 christos /* RFC 2845: If NOTAUTH, client should do TSIG checking */
1802 1.1 christos return xfrd_packet_drop;
1803 1.1 christos }
1804 1.1 christos }
1805 1.1 christos /* check TSIG */
1806 1.1 christos if(zone->master->key_options) {
1807 1.1 christos if(!xfrd_xfr_process_tsig(zone, packet)) {
1808 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "dropping xfr reply due "
1809 1.1 christos "to bad TSIG"));
1810 1.1 christos return xfrd_packet_bad;
1811 1.1 christos }
1812 1.1 christos }
1813 1.1 christos if (RCODE(packet) == RCODE_NOTAUTH) {
1814 1.1 christos return xfrd_packet_drop;
1815 1.1 christos }
1816 1.1 christos
1817 1.1 christos buffer_skip(packet, QHEADERSZ);
1818 1.1 christos
1819 1.1 christos /* skip question section */
1820 1.1 christos for(rr_count = 0; rr_count < qdcount; ++rr_count) {
1821 1.1 christos if (!packet_skip_rr(packet, 1)) {
1822 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s, from %s: bad RR in "
1823 1.1 christos "question section",
1824 1.1 christos zone->apex_str, zone->master->ip_address_spec);
1825 1.1 christos return xfrd_packet_bad;
1826 1.1 christos }
1827 1.1 christos }
1828 1.1 christos if(zone->msg_rr_count == 0 && ancount == 0) {
1829 1.1 christos if(zone->tcp_conn == -1 && TC(packet)) {
1830 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: TC flagged"));
1831 1.1 christos return xfrd_packet_tcp;
1832 1.1 christos }
1833 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: too short xfr packet: no "
1834 1.1 christos "answer"));
1835 1.1 christos /* if IXFR is unknown, fallback to AXFR (if allowed) */
1836 1.1 christos if (nscount == 1) {
1837 1.1 christos if(!packet_skip_dname(packet) || !xfrd_parse_soa_info(packet, soa)) {
1838 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1839 1.1 christos "no SOA begins authority section",
1840 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1841 1.1 christos return xfrd_packet_bad;
1842 1.1 christos }
1843 1.1 christos return xfrd_packet_notimpl;
1844 1.1 christos }
1845 1.1 christos return xfrd_packet_bad;
1846 1.1 christos }
1847 1.1 christos ancount_todo = ancount;
1848 1.1 christos
1849 1.1 christos tempregion = region_create(xalloc, free);
1850 1.1 christos if(zone->msg_rr_count == 0) {
1851 1.1 christos const dname_type* soaname = dname_make_from_packet(tempregion,
1852 1.1 christos packet, 1, 1);
1853 1.1 christos if(!soaname) { /* parse failure */
1854 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1855 1.1 christos "parse error in SOA record",
1856 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1857 1.1 christos region_destroy(tempregion);
1858 1.1 christos return xfrd_packet_bad;
1859 1.1 christos }
1860 1.1 christos if(dname_compare(soaname, zone->apex) != 0) { /* wrong name */
1861 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1862 1.1 christos "wrong SOA record",
1863 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1864 1.1 christos region_destroy(tempregion);
1865 1.1 christos return xfrd_packet_bad;
1866 1.1 christos }
1867 1.1 christos
1868 1.1 christos /* parse the first RR, see if it is a SOA */
1869 1.1 christos if(!xfrd_parse_soa_info(packet, soa))
1870 1.1 christos {
1871 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1872 1.1 christos "bad SOA rdata",
1873 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1874 1.1 christos region_destroy(tempregion);
1875 1.1 christos return xfrd_packet_bad;
1876 1.1 christos }
1877 1.1 christos if(zone->soa_disk_acquired != 0 &&
1878 1.1 christos zone->state != xfrd_zone_expired /* if expired - accept anything */ &&
1879 1.1 christos compare_serial(ntohl(soa->serial), ntohl(zone->soa_disk.serial)) < 0) {
1880 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1881 1.1 christos "xfrd: zone %s ignoring old serial from %s",
1882 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1883 1.1 christos VERBOSITY(1, (LOG_INFO,
1884 1.1 christos "xfrd: zone %s ignoring old serial from %s",
1885 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1886 1.1 christos region_destroy(tempregion);
1887 1.1 christos return xfrd_packet_bad;
1888 1.1 christos }
1889 1.1 christos if(zone->soa_disk_acquired != 0 && zone->soa_disk.serial == soa->serial) {
1890 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s got "
1891 1.1 christos "update indicating "
1892 1.1 christos "current serial",
1893 1.1 christos zone->apex_str));
1894 1.1 christos /* (even if notified) the lease on the current soa is renewed */
1895 1.1 christos zone->soa_disk_acquired = xfrd_time();
1896 1.1 christos if(zone->soa_nsd.serial == soa->serial)
1897 1.1 christos zone->soa_nsd_acquired = xfrd_time();
1898 1.1.1.2 christos xfrd_set_zone_state(zone, xfrd_zone_ok);
1899 1.1.1.2 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s is ok",
1900 1.1.1.2 christos zone->apex_str));
1901 1.1 christos if(zone->zone_options->pattern->multi_master_check) {
1902 1.1 christos region_destroy(tempregion);
1903 1.1 christos return xfrd_packet_drop;
1904 1.1 christos }
1905 1.1 christos if(zone->soa_notified_acquired == 0) {
1906 1.1 christos /* not notified or anything, so stop asking around */
1907 1.1 christos zone->round_num = -1; /* next try start a new round */
1908 1.1 christos xfrd_set_timer_refresh(zone);
1909 1.1 christos region_destroy(tempregion);
1910 1.1 christos return xfrd_packet_newlease;
1911 1.1 christos }
1912 1.1 christos /* try next master */
1913 1.1 christos region_destroy(tempregion);
1914 1.1 christos return xfrd_packet_drop;
1915 1.1 christos }
1916 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "IXFR reply has ok serial (have \
1917 1.1 christos %u, reply %u).", (unsigned)ntohl(zone->soa_disk.serial), (unsigned)ntohl(soa->serial)));
1918 1.1 christos /* serial is newer than soa_disk */
1919 1.1 christos if(ancount == 1) {
1920 1.1 christos /* single record means it is like a notify */
1921 1.1 christos (void)xfrd_handle_incoming_notify(zone, soa);
1922 1.1 christos }
1923 1.1 christos else if(zone->soa_notified_acquired && zone->soa_notified.serial &&
1924 1.1 christos compare_serial(ntohl(zone->soa_notified.serial), ntohl(soa->serial)) < 0) {
1925 1.1 christos /* this AXFR/IXFR notifies me that an even newer serial exists */
1926 1.1 christos zone->soa_notified.serial = soa->serial;
1927 1.1 christos }
1928 1.1 christos zone->msg_new_serial = ntohl(soa->serial);
1929 1.1 christos zone->msg_rr_count = 1;
1930 1.1 christos zone->msg_is_ixfr = 0;
1931 1.1 christos if(zone->soa_disk_acquired)
1932 1.1 christos zone->msg_old_serial = ntohl(zone->soa_disk.serial);
1933 1.1 christos else zone->msg_old_serial = 0;
1934 1.1 christos ancount_todo = ancount - 1;
1935 1.1 christos }
1936 1.1 christos
1937 1.1 christos if(zone->tcp_conn == -1 && TC(packet)) {
1938 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1939 1.1 christos "xfrd: zone %s received TC from %s. retry tcp.",
1940 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1941 1.1 christos region_destroy(tempregion);
1942 1.1 christos return xfrd_packet_tcp;
1943 1.1 christos }
1944 1.1 christos
1945 1.1 christos if(zone->tcp_conn == -1 && ancount < 2) {
1946 1.1 christos /* too short to be a real ixfr/axfr data transfer: need at */
1947 1.1 christos /* least two RRs in the answer section. */
1948 1.1 christos /* The serial is newer, so try tcp to this master. */
1949 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: udp reply is short. Try "
1950 1.1 christos "tcp anyway."));
1951 1.1 christos region_destroy(tempregion);
1952 1.1 christos return xfrd_packet_tcp;
1953 1.1 christos }
1954 1.1 christos
1955 1.1 christos if(!xfrd_xfr_check_rrs(zone, packet, ancount_todo, &done, soa,
1956 1.1 christos tempregion))
1957 1.1 christos {
1958 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s sent bad xfr "
1959 1.1 christos "reply.", zone->apex_str));
1960 1.1 christos region_destroy(tempregion);
1961 1.1 christos return xfrd_packet_bad;
1962 1.1 christos }
1963 1.1 christos region_destroy(tempregion);
1964 1.1 christos if(zone->tcp_conn == -1 && done == 0) {
1965 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: udp reply incomplete"));
1966 1.1 christos return xfrd_packet_bad;
1967 1.1 christos }
1968 1.1 christos if(done == 0)
1969 1.1 christos return xfrd_packet_more;
1970 1.1 christos if(zone->master->key_options) {
1971 1.1 christos if(zone->tsig.updates_since_last_prepare != 0) {
1972 1.1 christos log_msg(LOG_INFO, "xfrd: last packet of reply has no "
1973 1.1 christos "TSIG");
1974 1.1 christos return xfrd_packet_bad;
1975 1.1 christos }
1976 1.1 christos }
1977 1.1 christos return xfrd_packet_transfer;
1978 1.1 christos }
1979 1.1 christos
1980 1.1 christos const char*
1981 1.1 christos xfrd_pretty_time(time_t v)
1982 1.1 christos {
1983 1.1 christos struct tm* tm = localtime(&v);
1984 1.1 christos static char buf[64];
1985 1.1 christos if(!strftime(buf, sizeof(buf), "%Y-%m-%dT%H:%M:%S", tm))
1986 1.1 christos snprintf(buf, sizeof(buf), "strftime-err-%u", (unsigned)v);
1987 1.1 christos return buf;
1988 1.1 christos }
1989 1.1 christos
1990 1.1 christos enum xfrd_packet_result
1991 1.1.1.2 christos xfrd_handle_received_xfr_packet(xfrd_zone_type* zone, buffer_type* packet)
1992 1.1 christos {
1993 1.1.1.2 christos xfrd_soa_type soa;
1994 1.1 christos enum xfrd_packet_result res;
1995 1.1 christos uint64_t xfrfile_size;
1996 1.1 christos
1997 1.1 christos /* parse and check the packet - see if it ends the xfr */
1998 1.1 christos switch((res=xfrd_parse_received_xfr_packet(zone, packet, &soa)))
1999 1.1 christos {
2000 1.1 christos case xfrd_packet_more:
2001 1.1 christos case xfrd_packet_transfer:
2002 1.1 christos /* continue with commit */
2003 1.1 christos break;
2004 1.1 christos case xfrd_packet_newlease:
2005 1.1 christos return xfrd_packet_newlease;
2006 1.1 christos case xfrd_packet_tcp:
2007 1.1 christos return xfrd_packet_tcp;
2008 1.1 christos case xfrd_packet_notimpl:
2009 1.1 christos case xfrd_packet_bad:
2010 1.1 christos case xfrd_packet_drop:
2011 1.1 christos default:
2012 1.1 christos {
2013 1.1 christos /* rollback */
2014 1.1 christos if(zone->msg_seq_nr > 0) {
2015 1.1 christos /* do not process xfr - if only one part simply ignore it. */
2016 1.1 christos /* delete file with previous parts of commit */
2017 1.1 christos xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
2018 1.1 christos VERBOSITY(1, (LOG_INFO, "xfrd: zone %s "
2019 1.1 christos "reverted transfer %u from %s",
2020 1.1 christos zone->apex_str, zone->msg_rr_count?
2021 1.1 christos (int)zone->msg_new_serial:0,
2022 1.1 christos zone->master->ip_address_spec));
2023 1.1 christos zone->msg_seq_nr = 0;
2024 1.1 christos } else if (res == xfrd_packet_bad) {
2025 1.1 christos VERBOSITY(1, (LOG_INFO, "xfrd: zone %s "
2026 1.1 christos "bad transfer %u from %s",
2027 1.1 christos zone->apex_str, zone->msg_rr_count?
2028 1.1 christos (int)zone->msg_new_serial:0,
2029 1.1 christos zone->master->ip_address_spec));
2030 1.1 christos }
2031 1.1 christos if (res == xfrd_packet_notimpl)
2032 1.1 christos return res;
2033 1.1 christos else
2034 1.1 christos return xfrd_packet_bad;
2035 1.1 christos }
2036 1.1 christos }
2037 1.1 christos
2038 1.1 christos /* dump reply on disk to diff file */
2039 1.1 christos /* if first part, get new filenumber. Numbers can wrap around, 64bit
2040 1.1 christos * is enough so we do not collide with older-transfers-in-progress */
2041 1.1 christos if(zone->msg_seq_nr == 0)
2042 1.1 christos zone->xfrfilenumber = xfrd->xfrfilenumber++;
2043 1.1 christos diff_write_packet(dname_to_string(zone->apex,0),
2044 1.1 christos zone->zone_options->pattern->pname,
2045 1.1 christos zone->msg_old_serial, zone->msg_new_serial, zone->msg_seq_nr,
2046 1.1 christos buffer_begin(packet), buffer_limit(packet), xfrd->nsd,
2047 1.1 christos zone->xfrfilenumber);
2048 1.1 christos VERBOSITY(3, (LOG_INFO,
2049 1.1 christos "xfrd: zone %s written received XFR packet from %s with serial %u to "
2050 1.1 christos "disk", zone->apex_str, zone->master->ip_address_spec,
2051 1.1 christos (int)zone->msg_new_serial));
2052 1.1 christos zone->msg_seq_nr++;
2053 1.1 christos
2054 1.1 christos xfrfile_size = xfrd_get_xfrfile_size(xfrd->nsd, zone->xfrfilenumber);
2055 1.1 christos if( zone->zone_options->pattern->size_limit_xfr != 0 &&
2056 1.1 christos xfrfile_size > zone->zone_options->pattern->size_limit_xfr ) {
2057 1.1 christos /* xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
2058 1.1 christos xfrd_set_reload_timeout(); */
2059 1.1 christos log_msg(LOG_INFO, "xfrd : transferred zone data was too large %llu", (long long unsigned)xfrfile_size);
2060 1.1 christos return xfrd_packet_bad;
2061 1.1 christos }
2062 1.1 christos if(res == xfrd_packet_more) {
2063 1.1 christos /* wait for more */
2064 1.1 christos return xfrd_packet_more;
2065 1.1 christos }
2066 1.1 christos
2067 1.1 christos /* done. we are completely sure of this */
2068 1.1 christos buffer_clear(packet);
2069 1.1 christos buffer_printf(packet, "received update to serial %u at %s from %s",
2070 1.1 christos (unsigned)zone->msg_new_serial, xfrd_pretty_time(xfrd_time()),
2071 1.1 christos zone->master->ip_address_spec);
2072 1.1 christos if(zone->master->key_options) {
2073 1.1 christos buffer_printf(packet, " TSIG verified with key %s",
2074 1.1 christos zone->master->key_options->name);
2075 1.1 christos }
2076 1.1 christos buffer_flip(packet);
2077 1.1 christos diff_write_commit(zone->apex_str, zone->msg_old_serial,
2078 1.1 christos zone->msg_new_serial, zone->msg_seq_nr, 1,
2079 1.1 christos (char*)buffer_begin(packet), xfrd->nsd, zone->xfrfilenumber);
2080 1.1 christos VERBOSITY(1, (LOG_INFO, "xfrd: zone %s committed \"%s\"",
2081 1.1 christos zone->apex_str, (char*)buffer_begin(packet)));
2082 1.1 christos /* reset msg seq nr, so if that is nonnull we know xfr file exists */
2083 1.1 christos zone->msg_seq_nr = 0;
2084 1.1 christos /* now put apply_xfr task on the tasklist */
2085 1.1 christos if(!task_new_apply_xfr(xfrd->nsd->task[xfrd->nsd->mytask],
2086 1.1 christos xfrd->last_task, zone->apex, zone->msg_old_serial,
2087 1.1 christos zone->msg_new_serial, zone->xfrfilenumber)) {
2088 1.1 christos /* delete the file and pretend transfer was bad to continue */
2089 1.1 christos xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
2090 1.1 christos xfrd_set_reload_timeout();
2091 1.1 christos return xfrd_packet_bad;
2092 1.1 christos }
2093 1.1 christos /* update the disk serial no. */
2094 1.1 christos zone->soa_disk_acquired = xfrd_time();
2095 1.1 christos zone->soa_disk = soa;
2096 1.1 christos if(zone->soa_notified_acquired && (
2097 1.1 christos zone->soa_notified.serial == 0 ||
2098 1.1 christos compare_serial(htonl(zone->soa_disk.serial),
2099 1.1 christos htonl(zone->soa_notified.serial)) >= 0))
2100 1.1 christos {
2101 1.1 christos zone->soa_notified_acquired = 0;
2102 1.1 christos }
2103 1.1 christos if(!zone->soa_notified_acquired) {
2104 1.1 christos /* do not set expired zone to ok:
2105 1.1 christos * it would cause nsd to start answering
2106 1.1 christos * bad data, since the zone is not loaded yet.
2107 1.1 christos * if nsd does not reload < retry time, more
2108 1.1 christos * queries (for even newer versions) are made.
2109 1.1 christos * For expired zone after reload it is set ok (SOAINFO ipc). */
2110 1.1 christos if(zone->state != xfrd_zone_expired)
2111 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_ok);
2112 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
2113 1.1 christos "xfrd: zone %s is waiting for reload",
2114 1.1 christos zone->apex_str));
2115 1.1 christos if(zone->zone_options->pattern->multi_master_check) {
2116 1.1 christos zone->multi_master_update_check = zone->master_num;
2117 1.1 christos xfrd_set_reload_timeout();
2118 1.1 christos return xfrd_packet_transfer;
2119 1.1 christos }
2120 1.1 christos zone->round_num = -1; /* next try start anew */
2121 1.1 christos xfrd_set_timer_refresh(zone);
2122 1.1 christos xfrd_set_reload_timeout();
2123 1.1 christos return xfrd_packet_transfer;
2124 1.1 christos } else {
2125 1.1 christos /* try to get an even newer serial */
2126 1.1 christos /* pretend it was bad to continue queries */
2127 1.1 christos xfrd_set_reload_timeout();
2128 1.1 christos return xfrd_packet_bad;
2129 1.1 christos }
2130 1.1 christos }
2131 1.1 christos
2132 1.1 christos static void
2133 1.1 christos xfrd_set_reload_timeout()
2134 1.1 christos {
2135 1.1 christos if(xfrd->nsd->options->xfrd_reload_timeout == -1)
2136 1.1 christos return; /* automatic reload disabled. */
2137 1.1 christos if(xfrd->reload_timeout.tv_sec == 0 ||
2138 1.1 christos xfrd_time() >= (time_t)xfrd->reload_timeout.tv_sec ) {
2139 1.1 christos /* no reload wait period (or it passed), do it right away */
2140 1.1 christos xfrd_set_reload_now(xfrd);
2141 1.1 christos /* start reload wait period */
2142 1.1 christos xfrd->reload_timeout.tv_sec = xfrd_time() +
2143 1.1 christos xfrd->nsd->options->xfrd_reload_timeout;
2144 1.1 christos xfrd->reload_timeout.tv_usec = 0;
2145 1.1 christos return;
2146 1.1 christos }
2147 1.1 christos /* cannot reload now, set that after the timeout a reload has to happen */
2148 1.1 christos if(xfrd->reload_added == 0) {
2149 1.1 christos struct timeval tv;
2150 1.1 christos tv.tv_sec = xfrd->reload_timeout.tv_sec - xfrd_time();
2151 1.1 christos tv.tv_usec = 0;
2152 1.1 christos if(tv.tv_sec > xfrd->nsd->options->xfrd_reload_timeout)
2153 1.1 christos tv.tv_sec = xfrd->nsd->options->xfrd_reload_timeout;
2154 1.1 christos event_set(&xfrd->reload_handler, -1, EV_TIMEOUT,
2155 1.1 christos xfrd_handle_reload, xfrd);
2156 1.1 christos if(event_base_set(xfrd->event_base, &xfrd->reload_handler) != 0)
2157 1.1 christos log_msg(LOG_ERR, "cannot set reload event base");
2158 1.1 christos if(event_add(&xfrd->reload_handler, &tv) != 0)
2159 1.1 christos log_msg(LOG_ERR, "cannot add reload event");
2160 1.1 christos xfrd->reload_added = 1;
2161 1.1 christos }
2162 1.1 christos }
2163 1.1 christos
2164 1.1 christos static void
2165 1.1 christos xfrd_handle_reload(int ATTR_UNUSED(fd), short event, void* ATTR_UNUSED(arg))
2166 1.1 christos {
2167 1.1 christos /* reload timeout */
2168 1.1 christos assert(event & EV_TIMEOUT);
2169 1.1 christos (void)event;
2170 1.1 christos /* timeout wait period after this request is sent */
2171 1.1 christos xfrd->reload_added = 0;
2172 1.1 christos xfrd->reload_timeout.tv_sec = xfrd_time() +
2173 1.1 christos xfrd->nsd->options->xfrd_reload_timeout;
2174 1.1 christos xfrd_set_reload_now(xfrd);
2175 1.1 christos }
2176 1.1 christos
2177 1.1 christos void
2178 1.1.1.2 christos xfrd_handle_notify_and_start_xfr(xfrd_zone_type* zone, xfrd_soa_type* soa)
2179 1.1 christos {
2180 1.1 christos if(xfrd_handle_incoming_notify(zone, soa)) {
2181 1.1 christos if(zone->zone_handler.ev_fd == -1 && zone->tcp_conn == -1 &&
2182 1.1 christos !zone->tcp_waiting && !zone->udp_waiting) {
2183 1.1 christos xfrd_set_refresh_now(zone);
2184 1.1 christos }
2185 1.1 christos /* zones with no content start expbackoff again; this is also
2186 1.1 christos * for nsd-control started transfer commands, and also when
2187 1.1 christos * the master apparently sends notifies (is back up) */
2188 1.1 christos if(zone->soa_disk_acquired == 0)
2189 1.1 christos zone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_START;
2190 1.1 christos }
2191 1.1 christos }
2192 1.1 christos
2193 1.1 christos void
2194 1.1 christos xfrd_handle_passed_packet(buffer_type* packet,
2195 1.1 christos int acl_num, int acl_num_xfr)
2196 1.1 christos {
2197 1.1 christos uint8_t qnamebuf[MAXDOMAINLEN];
2198 1.1 christos uint16_t qtype, qclass;
2199 1.1 christos const dname_type* dname;
2200 1.1 christos region_type* tempregion = region_create(xalloc, free);
2201 1.1.1.2 christos xfrd_zone_type* zone;
2202 1.1 christos
2203 1.1 christos buffer_skip(packet, QHEADERSZ);
2204 1.1 christos if(!packet_read_query_section(packet, qnamebuf, &qtype, &qclass)) {
2205 1.1 christos region_destroy(tempregion);
2206 1.1 christos return; /* drop bad packet */
2207 1.1 christos }
2208 1.1 christos
2209 1.1 christos dname = dname_make(tempregion, qnamebuf, 1);
2210 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: got passed packet for %s, acl "
2211 1.1 christos "%d", dname_to_string(dname,0), acl_num));
2212 1.1 christos
2213 1.1 christos /* find the zone */
2214 1.1.1.2 christos zone = (xfrd_zone_type*)rbtree_search(xfrd->zones, dname);
2215 1.1 christos if(!zone) {
2216 1.1 christos /* this could be because the zone has been deleted meanwhile */
2217 1.1 christos DEBUG(DEBUG_XFRD, 1, (LOG_INFO, "xfrd: incoming packet for "
2218 1.1 christos "unknown zone %s", dname_to_string(dname,0)));
2219 1.1 christos region_destroy(tempregion);
2220 1.1 christos return; /* drop packet for unknown zone */
2221 1.1 christos }
2222 1.1 christos region_destroy(tempregion);
2223 1.1 christos
2224 1.1 christos /* handle */
2225 1.1 christos if(OPCODE(packet) == OPCODE_NOTIFY) {
2226 1.1.1.2 christos xfrd_soa_type soa;
2227 1.1 christos int have_soa = 0;
2228 1.1 christos int next;
2229 1.1 christos /* get serial from a SOA */
2230 1.1 christos if(ANCOUNT(packet) == 1 && packet_skip_dname(packet) &&
2231 1.1 christos xfrd_parse_soa_info(packet, &soa)) {
2232 1.1 christos have_soa = 1;
2233 1.1 christos }
2234 1.1 christos xfrd_handle_notify_and_start_xfr(zone, have_soa?&soa:NULL);
2235 1.1 christos /* First, see if our notifier has a match in provide-xfr */
2236 1.1 christos if (acl_find_num(zone->zone_options->pattern->request_xfr,
2237 1.1 christos acl_num_xfr))
2238 1.1 christos next = acl_num_xfr;
2239 1.1 christos else /* If not, find master that matches notifiers ACL entry */
2240 1.1 christos next = find_same_master_notify(zone, acl_num);
2241 1.1 christos if(next != -1) {
2242 1.1 christos zone->next_master = next;
2243 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
2244 1.1 christos "xfrd: notify set next master to query %d",
2245 1.1 christos next));
2246 1.1 christos }
2247 1.1 christos }
2248 1.1 christos else {
2249 1.1 christos /* ignore other types of messages */
2250 1.1 christos }
2251 1.1 christos }
2252 1.1 christos
2253 1.1 christos static int
2254 1.1.1.2 christos xfrd_handle_incoming_notify(xfrd_zone_type* zone, xfrd_soa_type* soa)
2255 1.1 christos {
2256 1.1 christos if(soa && zone->soa_disk_acquired && zone->state != xfrd_zone_expired &&
2257 1.1 christos compare_serial(ntohl(soa->serial),ntohl(zone->soa_disk.serial)) <= 0)
2258 1.1 christos {
2259 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
2260 1.1 christos "xfrd: ignored notify %s %u old serial, zone valid "
2261 1.1 christos "(soa disk serial %u)", zone->apex_str,
2262 1.1 christos (unsigned)ntohl(soa->serial),
2263 1.1 christos (unsigned)ntohl(zone->soa_disk.serial)));
2264 1.1 christos return 0; /* ignore notify with old serial, we have a valid zone */
2265 1.1 christos }
2266 1.1 christos if(soa == 0) {
2267 1.1 christos zone->soa_notified.serial = 0;
2268 1.1 christos }
2269 1.1 christos else if (zone->soa_notified_acquired == 0 ||
2270 1.1 christos zone->soa_notified.serial == 0 ||
2271 1.1 christos compare_serial(ntohl(soa->serial),
2272 1.1 christos ntohl(zone->soa_notified.serial)) > 0)
2273 1.1 christos {
2274 1.1 christos zone->soa_notified = *soa;
2275 1.1 christos }
2276 1.1 christos zone->soa_notified_acquired = xfrd_time();
2277 1.1 christos if(zone->state == xfrd_zone_ok) {
2278 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
2279 1.1 christos }
2280 1.1 christos /* transfer right away */
2281 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "Handle incoming notify for zone %s",
2282 1.1 christos zone->apex_str));
2283 1.1 christos return 1;
2284 1.1 christos }
2285 1.1 christos
2286 1.1 christos static int
2287 1.1.1.2 christos find_same_master_notify(xfrd_zone_type* zone, int acl_num_nfy)
2288 1.1 christos {
2289 1.1.1.2 christos struct acl_options* nfy_acl = acl_find_num(zone->zone_options->pattern->
2290 1.1 christos allow_notify, acl_num_nfy);
2291 1.1 christos int num = 0;
2292 1.1.1.2 christos struct acl_options* master = zone->zone_options->pattern->request_xfr;
2293 1.1 christos if(!nfy_acl)
2294 1.1 christos return -1;
2295 1.1 christos while(master)
2296 1.1 christos {
2297 1.1 christos if(acl_addr_matches_host(nfy_acl, master))
2298 1.1 christos return num;
2299 1.1 christos master = master->next;
2300 1.1 christos num++;
2301 1.1 christos }
2302 1.1 christos return -1;
2303 1.1 christos }
2304 1.1 christos
2305 1.1 christos void
2306 1.1 christos xfrd_check_failed_updates()
2307 1.1 christos {
2308 1.1 christos /* see if updates have not come through */
2309 1.1.1.2 christos xfrd_zone_type* zone;
2310 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
2311 1.1 christos {
2312 1.1 christos /* zone has a disk soa, and no nsd soa or a different nsd soa */
2313 1.1 christos if(zone->soa_disk_acquired != 0 &&
2314 1.1 christos (zone->soa_nsd_acquired == 0 ||
2315 1.1 christos zone->soa_disk.serial != zone->soa_nsd.serial))
2316 1.1 christos {
2317 1.1 christos if(zone->soa_disk_acquired <
2318 1.1 christos xfrd->reload_cmd_last_sent)
2319 1.1 christos {
2320 1.1 christos /* this zone should have been loaded, since its disk
2321 1.1 christos soa time is before the time of the reload cmd. */
2322 1.1.1.2 christos xfrd_soa_type dumped_soa = zone->soa_disk;
2323 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s: soa serial %u "
2324 1.1 christos "update failed, restarting "
2325 1.1 christos "transfer (notified zone)",
2326 1.1 christos zone->apex_str, (unsigned)ntohl(zone->soa_disk.serial));
2327 1.1 christos /* revert the soa; it has not been acquired properly */
2328 1.1 christos if(zone->soa_disk_acquired == zone->soa_nsd_acquired) {
2329 1.1 christos /* this was the same as served,
2330 1.1 christos * perform force_axfr , re-download
2331 1.1 christos * same serial from master */
2332 1.1 christos zone->soa_disk_acquired = 0;
2333 1.1 christos zone->soa_nsd_acquired = 0;
2334 1.1 christos } else {
2335 1.1 christos /* revert soa to the one in server */
2336 1.1 christos zone->soa_disk_acquired = zone->soa_nsd_acquired;
2337 1.1 christos zone->soa_disk = zone->soa_nsd;
2338 1.1 christos }
2339 1.1 christos /* pretend we are notified with disk soa.
2340 1.1 christos This will cause a refetch of the data, and reload. */
2341 1.1 christos xfrd_handle_incoming_notify(zone, &dumped_soa);
2342 1.1 christos xfrd_set_timer_refresh(zone);
2343 1.1 christos } else if(zone->soa_disk_acquired >= xfrd->reload_cmd_last_sent) {
2344 1.1 christos /* this zone still has to be loaded,
2345 1.1 christos make sure reload is set to be sent. */
2346 1.1 christos if(xfrd->need_to_send_reload == 0 &&
2347 1.1 christos xfrd->reload_added == 0) {
2348 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s: needs "
2349 1.1 christos "to be loaded. reload lost? "
2350 1.1 christos "try again", zone->apex_str);
2351 1.1 christos xfrd_set_reload_timeout();
2352 1.1 christos }
2353 1.1 christos }
2354 1.1 christos }
2355 1.1 christos }
2356 1.1 christos }
2357 1.1 christos
2358 1.1 christos void
2359 1.1 christos xfrd_prepare_zones_for_reload()
2360 1.1 christos {
2361 1.1.1.2 christos xfrd_zone_type* zone;
2362 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
2363 1.1 christos {
2364 1.1 christos /* zone has a disk soa, and no nsd soa or a different nsd soa */
2365 1.1 christos if(zone->soa_disk_acquired != 0 &&
2366 1.1 christos (zone->soa_nsd_acquired == 0 ||
2367 1.1 christos zone->soa_disk.serial != zone->soa_nsd.serial))
2368 1.1 christos {
2369 1.1 christos if(zone->soa_disk_acquired == xfrd_time()) {
2370 1.1 christos /* antedate by one second.
2371 1.1 christos * this makes sure that the zone time is before
2372 1.1 christos * reload, so that check_failed_zones() is
2373 1.1 christos * certain of the result.
2374 1.1 christos */
2375 1.1 christos zone->soa_disk_acquired--;
2376 1.1 christos }
2377 1.1 christos }
2378 1.1 christos }
2379 1.1 christos }
2380 1.1 christos
2381 1.1 christos struct buffer*
2382 1.1 christos xfrd_get_temp_buffer()
2383 1.1 christos {
2384 1.1 christos return xfrd->packet;
2385 1.1 christos }
2386 1.1 christos
2387 1.1 christos #ifdef BIND8_STATS
2388 1.1 christos /** process stat info task */
2389 1.1 christos static void
2390 1.1.1.2 christos xfrd_process_stat_info_task(xfrd_state_type* xfrd, struct task_list_d* task)
2391 1.1 christos {
2392 1.1 christos size_t i;
2393 1.1.1.2 christos stc_type* p = (void*)task->zname + sizeof(struct nsdst);
2394 1.1 christos stats_add(&xfrd->nsd->st, (struct nsdst*)task->zname);
2395 1.1 christos for(i=0; i<xfrd->nsd->child_count; i++) {
2396 1.1 christos xfrd->nsd->children[i].query_count += *p++;
2397 1.1 christos }
2398 1.1 christos /* got total, now see if users are interested in these statistics */
2399 1.1 christos #ifdef HAVE_SSL
2400 1.1 christos daemon_remote_process_stats(xfrd->nsd->rc);
2401 1.1 christos #endif
2402 1.1 christos }
2403 1.1 christos #endif /* BIND8_STATS */
2404 1.1 christos
2405 1.1 christos #ifdef USE_ZONE_STATS
2406 1.1 christos /** process zonestat inc task */
2407 1.1 christos static void
2408 1.1.1.2 christos xfrd_process_zonestat_inc_task(xfrd_state_type* xfrd, struct task_list_d* task)
2409 1.1 christos {
2410 1.1 christos xfrd->zonestat_safe = (unsigned)task->oldserial;
2411 1.1 christos zonestat_remap(xfrd->nsd, 0, xfrd->zonestat_safe*sizeof(struct nsdst));
2412 1.1 christos xfrd->nsd->zonestatsize[0] = xfrd->zonestat_safe;
2413 1.1 christos zonestat_remap(xfrd->nsd, 1, xfrd->zonestat_safe*sizeof(struct nsdst));
2414 1.1 christos xfrd->nsd->zonestatsize[1] = xfrd->zonestat_safe;
2415 1.1 christos }
2416 1.1 christos #endif /* USE_ZONE_STATS */
2417 1.1 christos
2418 1.1 christos static void
2419 1.1.1.2 christos xfrd_handle_taskresult(xfrd_state_type* xfrd, struct task_list_d* task)
2420 1.1 christos {
2421 1.1 christos #ifndef BIND8_STATS
2422 1.1 christos (void)xfrd;
2423 1.1 christos #endif
2424 1.1 christos switch(task->task_type) {
2425 1.1 christos case task_soa_info:
2426 1.1 christos xfrd_process_soa_info_task(task);
2427 1.1 christos break;
2428 1.1 christos #ifdef BIND8_STATS
2429 1.1 christos case task_stat_info:
2430 1.1 christos xfrd_process_stat_info_task(xfrd, task);
2431 1.1 christos break;
2432 1.1 christos #endif /* BIND8_STATS */
2433 1.1 christos #ifdef USE_ZONE_STATS
2434 1.1 christos case task_zonestat_inc:
2435 1.1 christos xfrd_process_zonestat_inc_task(xfrd, task);
2436 1.1 christos break;
2437 1.1 christos #endif
2438 1.1 christos default:
2439 1.1 christos log_msg(LOG_WARNING, "unhandled task result in xfrd from "
2440 1.1 christos "reload type %d", (int)task->task_type);
2441 1.1 christos }
2442 1.1 christos }
2443 1.1 christos
2444 1.1.1.2 christos void xfrd_process_task_result(xfrd_state_type* xfrd, struct udb_base* taskudb)
2445 1.1 christos {
2446 1.1 christos udb_ptr t;
2447 1.1 christos /* remap it for usage */
2448 1.1 christos task_remap(taskudb);
2449 1.1 christos /* process the task-results in the taskudb */
2450 1.1 christos udb_ptr_new(&t, taskudb, udb_base_get_userdata(taskudb));
2451 1.1 christos while(!udb_ptr_is_null(&t)) {
2452 1.1 christos xfrd_handle_taskresult(xfrd, TASKLIST(&t));
2453 1.1 christos udb_ptr_set_rptr(&t, taskudb, &TASKLIST(&t)->next);
2454 1.1 christos }
2455 1.1 christos udb_ptr_unlink(&t, taskudb);
2456 1.1 christos /* clear the udb so it can be used by xfrd to make new tasks for
2457 1.1 christos * reload, this happens when the reload signal is sent, and thus
2458 1.1 christos * the taskudbs are swapped */
2459 1.1 christos task_clear(taskudb);
2460 1.1 christos }
2461 1.1 christos
2462 1.1.1.2 christos void xfrd_set_reload_now(xfrd_state_type* xfrd)
2463 1.1 christos {
2464 1.1 christos xfrd->need_to_send_reload = 1;
2465 1.1 christos if(!(xfrd->ipc_handler_flags&EV_WRITE)) {
2466 1.1 christos ipc_xfrd_set_listening(xfrd, EV_PERSIST|EV_READ|EV_WRITE);
2467 1.1 christos }
2468 1.1 christos }
2469 1.1 christos
2470 1.1 christos static void
2471 1.1 christos xfrd_handle_write_timer(int ATTR_UNUSED(fd), short event, void* ATTR_UNUSED(arg))
2472 1.1 christos {
2473 1.1 christos /* timeout for write events */
2474 1.1 christos assert(event & EV_TIMEOUT);
2475 1.1 christos (void)event;
2476 1.1 christos if(xfrd->nsd->options->zonefiles_write == 0)
2477 1.1 christos return;
2478 1.1 christos /* call reload to write changed zonefiles */
2479 1.1 christos if(!xfrd->write_zonefile_needed) {
2480 1.1 christos DEBUG(DEBUG_XFRD,2, (LOG_INFO, "zonefiles write timer (nothing)"));
2481 1.1 christos xfrd_write_timer_set();
2482 1.1 christos return;
2483 1.1 christos }
2484 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "zonefiles write timer"));
2485 1.1 christos task_new_write_zonefiles(xfrd->nsd->task[xfrd->nsd->mytask],
2486 1.1 christos xfrd->last_task, NULL);
2487 1.1 christos xfrd_set_reload_now(xfrd);
2488 1.1 christos xfrd->write_zonefile_needed = 0;
2489 1.1 christos xfrd_write_timer_set();
2490 1.1 christos }
2491 1.1 christos
2492 1.1 christos static void xfrd_write_timer_set()
2493 1.1 christos {
2494 1.1 christos struct timeval tv;
2495 1.1 christos if(xfrd->nsd->options->zonefiles_write == 0)
2496 1.1 christos return;
2497 1.1 christos tv.tv_sec = xfrd->nsd->options->zonefiles_write;
2498 1.1 christos tv.tv_usec = 0;
2499 1.1 christos event_set(&xfrd->write_timer, -1, EV_TIMEOUT,
2500 1.1 christos xfrd_handle_write_timer, xfrd);
2501 1.1 christos if(event_base_set(xfrd->event_base, &xfrd->write_timer) != 0)
2502 1.1 christos log_msg(LOG_ERR, "xfrd write timer: event_base_set failed");
2503 1.1 christos if(event_add(&xfrd->write_timer, &tv) != 0)
2504 1.1 christos log_msg(LOG_ERR, "xfrd write timer: event_add failed");
2505 1.1 christos }
2506 1.1 christos
2507 1.1 christos static void xfrd_handle_child_timer(int ATTR_UNUSED(fd), short event,
2508 1.1 christos void* ATTR_UNUSED(arg))
2509 1.1 christos {
2510 1.1 christos assert(event & EV_TIMEOUT);
2511 1.1 christos (void)event;
2512 1.1 christos /* only used to wakeup the process to reap children, note the
2513 1.1 christos * event is no longer registered */
2514 1.1 christos xfrd->child_timer_added = 0;
2515 1.1 christos }
2516