xfrd.c revision 1.1.1.4 1 1.1 christos /*
2 1.1 christos * xfrd.c - XFR (transfer) Daemon source file. Coordinates SOA updates.
3 1.1 christos *
4 1.1 christos * Copyright (c) 2001-2006, NLnet Labs. All rights reserved.
5 1.1 christos *
6 1.1 christos * See LICENSE for the license.
7 1.1 christos *
8 1.1 christos */
9 1.1 christos
10 1.1 christos #include "config.h"
11 1.1 christos #include <assert.h>
12 1.1 christos #include <string.h>
13 1.1 christos #include <unistd.h>
14 1.1 christos #include <stdlib.h>
15 1.1 christos #include <errno.h>
16 1.1 christos #include <sys/types.h>
17 1.1 christos #include <sys/wait.h>
18 1.1 christos #include "xfrd.h"
19 1.1 christos #include "xfrd-tcp.h"
20 1.1 christos #include "xfrd-disk.h"
21 1.1 christos #include "xfrd-notify.h"
22 1.1 christos #include "options.h"
23 1.1 christos #include "util.h"
24 1.1 christos #include "netio.h"
25 1.1 christos #include "region-allocator.h"
26 1.1 christos #include "nsd.h"
27 1.1 christos #include "packet.h"
28 1.1 christos #include "rdata.h"
29 1.1 christos #include "difffile.h"
30 1.1 christos #include "ipc.h"
31 1.1 christos #include "remote.h"
32 1.1.1.3 christos #include "rrl.h"
33 1.1.1.4 prlw1 #ifdef USE_DNSTAP
34 1.1.1.4 prlw1 #include "dnstap/dnstap_collector.h"
35 1.1.1.4 prlw1 #endif
36 1.1.1.3 christos
37 1.1.1.3 christos #ifdef HAVE_SYSTEMD
38 1.1.1.3 christos #include <systemd/sd-daemon.h>
39 1.1.1.3 christos #endif
40 1.1 christos
41 1.1 christos #define XFRD_UDP_TIMEOUT 10 /* seconds, before a udp request times out */
42 1.1 christos #define XFRD_NO_IXFR_CACHE 172800 /* 48h before retrying ixfr's after notimpl */
43 1.1 christos #define XFRD_LOWERBOUND_REFRESH 1 /* seconds, smallest refresh timeout */
44 1.1 christos #define XFRD_LOWERBOUND_RETRY 1 /* seconds, smallest retry timeout */
45 1.1 christos #define XFRD_MAX_ROUNDS 1 /* max number of rounds along the masters */
46 1.1 christos #define XFRD_TSIG_MAX_UNSIGNED 103 /* max number of packets without tsig in a tcp stream. */
47 1.1 christos /* rfc recommends 100, +3 for offbyone errors/interoperability. */
48 1.1 christos #define XFRD_CHILD_REAP_TIMEOUT 60 /* seconds to wakeup and reap lost children */
49 1.1 christos /* these are reload processes that SIGCHILDed but the signal
50 1.1 christos * was lost, and need waitpid to remove their process entry. */
51 1.1 christos
52 1.1 christos /* the daemon state */
53 1.1.1.2 christos xfrd_state_type* xfrd = 0;
54 1.1 christos
55 1.1 christos /* main xfrd loop */
56 1.1 christos static void xfrd_main(void);
57 1.1 christos /* shut down xfrd, close sockets. */
58 1.1 christos static void xfrd_shutdown(void);
59 1.1 christos /* delete pending task xfr files in tmp */
60 1.1 christos static void xfrd_clean_pending_tasks(struct nsd* nsd, udb_base* u);
61 1.1 christos /* create zone rbtree at start */
62 1.1 christos static void xfrd_init_zones(void);
63 1.1 christos /* initial handshake with SOAINFO from main and send expire to main */
64 1.1 christos static void xfrd_receive_soa(int socket, int shortsoa);
65 1.1 christos
66 1.1 christos /* handle incoming notification message. soa can be NULL. true if transfer needed. */
67 1.1.1.2 christos static int xfrd_handle_incoming_notify(xfrd_zone_type* zone,
68 1.1.1.2 christos xfrd_soa_type* soa);
69 1.1 christos
70 1.1 christos /* call with buffer just after the soa dname. returns 0 on error. */
71 1.1.1.2 christos static int xfrd_parse_soa_info(buffer_type* packet, xfrd_soa_type* soa);
72 1.1 christos /* set the zone state to a new state (takes care of expiry messages) */
73 1.1.1.2 christos static void xfrd_set_zone_state(xfrd_zone_type* zone,
74 1.1.1.2 christos enum xfrd_zone_state new_zone_state);
75 1.1 christos /* set timer for retry amount (depends on zone_state) */
76 1.1.1.2 christos static void xfrd_set_timer_retry(xfrd_zone_type* zone);
77 1.1 christos /* set timer for refresh timeout (depends on zone_state) */
78 1.1.1.2 christos static void xfrd_set_timer_refresh(xfrd_zone_type* zone);
79 1.1 christos
80 1.1 christos /* set reload timeout */
81 1.1 christos static void xfrd_set_reload_timeout(void);
82 1.1 christos /* handle reload timeout */
83 1.1 christos static void xfrd_handle_reload(int fd, short event, void* arg);
84 1.1 christos /* handle child timeout */
85 1.1 christos static void xfrd_handle_child_timer(int fd, short event, void* arg);
86 1.1 christos
87 1.1 christos /* send ixfr request, returns fd of connection to read on */
88 1.1.1.2 christos static int xfrd_send_ixfr_request_udp(xfrd_zone_type* zone);
89 1.1 christos /* obtain udp socket slot */
90 1.1.1.2 christos static void xfrd_udp_obtain(xfrd_zone_type* zone);
91 1.1 christos
92 1.1 christos /* read data via udp */
93 1.1.1.2 christos static void xfrd_udp_read(xfrd_zone_type* zone);
94 1.1 christos
95 1.1 christos /* find master by notify number */
96 1.1.1.2 christos static int find_same_master_notify(xfrd_zone_type* zone, int acl_num_nfy);
97 1.1 christos
98 1.1 christos /* set the write timer to activate */
99 1.1 christos static void xfrd_write_timer_set(void);
100 1.1 christos
101 1.1 christos static void
102 1.1 christos xfrd_signal_callback(int sig, short event, void* ATTR_UNUSED(arg))
103 1.1 christos {
104 1.1 christos if(!(event & EV_SIGNAL))
105 1.1 christos return;
106 1.1 christos sig_handler(sig);
107 1.1 christos }
108 1.1 christos
109 1.1.1.3 christos static struct event* xfrd_sig_evs[10];
110 1.1.1.3 christos static int xfrd_sig_num = 0;
111 1.1.1.3 christos
112 1.1 christos static void
113 1.1 christos xfrd_sigsetup(int sig)
114 1.1 christos {
115 1.1 christos struct event *ev = xalloc_zero(sizeof(*ev));
116 1.1.1.3 christos assert(xfrd_sig_num <= (int)(sizeof(xfrd_sig_evs)/sizeof(ev)));
117 1.1.1.3 christos xfrd_sig_evs[xfrd_sig_num++] = ev;
118 1.1 christos signal_set(ev, sig, xfrd_signal_callback, NULL);
119 1.1 christos if(event_base_set(xfrd->event_base, ev) != 0) {
120 1.1 christos log_msg(LOG_ERR, "xfrd sig handler: event_base_set failed");
121 1.1 christos }
122 1.1 christos if(signal_add(ev, NULL) != 0) {
123 1.1 christos log_msg(LOG_ERR, "xfrd sig handler: signal_add failed");
124 1.1 christos }
125 1.1 christos }
126 1.1 christos
127 1.1 christos void
128 1.1 christos xfrd_init(int socket, struct nsd* nsd, int shortsoa, int reload_active,
129 1.1 christos pid_t nsd_pid)
130 1.1 christos {
131 1.1 christos region_type* region;
132 1.1 christos
133 1.1 christos assert(xfrd == 0);
134 1.1 christos /* to setup signalhandling */
135 1.1 christos nsd->server_kind = NSD_SERVER_MAIN;
136 1.1 christos
137 1.1 christos region = region_create_custom(xalloc, free, DEFAULT_CHUNK_SIZE,
138 1.1 christos DEFAULT_LARGE_OBJECT_SIZE, DEFAULT_INITIAL_CLEANUP_SIZE, 1);
139 1.1.1.2 christos xfrd = (xfrd_state_type*)region_alloc(region, sizeof(xfrd_state_type));
140 1.1.1.2 christos memset(xfrd, 0, sizeof(xfrd_state_type));
141 1.1 christos xfrd->region = region;
142 1.1 christos xfrd->xfrd_start_time = time(0);
143 1.1 christos xfrd->event_base = nsd_child_event_base();
144 1.1 christos if(!xfrd->event_base) {
145 1.1 christos log_msg(LOG_ERR, "xfrd: cannot create event base");
146 1.1 christos exit(1);
147 1.1 christos }
148 1.1 christos xfrd->nsd = nsd;
149 1.1 christos xfrd->packet = buffer_create(xfrd->region, QIOBUFSZ);
150 1.1 christos xfrd->udp_waiting_first = NULL;
151 1.1 christos xfrd->udp_waiting_last = NULL;
152 1.1 christos xfrd->udp_use_num = 0;
153 1.1 christos xfrd->got_time = 0;
154 1.1 christos xfrd->xfrfilenumber = 0;
155 1.1 christos #ifdef USE_ZONE_STATS
156 1.1 christos xfrd->zonestat_safe = nsd->zonestatdesired;
157 1.1 christos #endif
158 1.1 christos xfrd->activated_first = NULL;
159 1.1 christos xfrd->ipc_pass = buffer_create(xfrd->region, QIOBUFSZ);
160 1.1 christos xfrd->last_task = region_alloc(xfrd->region, sizeof(*xfrd->last_task));
161 1.1 christos udb_ptr_init(xfrd->last_task, xfrd->nsd->task[xfrd->nsd->mytask]);
162 1.1 christos assert(shortsoa || udb_base_get_userdata(xfrd->nsd->task[xfrd->nsd->mytask])->data == 0);
163 1.1 christos
164 1.1 christos xfrd->reload_handler.ev_fd = -1;
165 1.1 christos xfrd->reload_added = 0;
166 1.1 christos xfrd->reload_timeout.tv_sec = 0;
167 1.1 christos xfrd->reload_cmd_last_sent = xfrd->xfrd_start_time;
168 1.1 christos xfrd->can_send_reload = !reload_active;
169 1.1 christos xfrd->reload_pid = nsd_pid;
170 1.1 christos xfrd->child_timer_added = 0;
171 1.1 christos
172 1.1 christos xfrd->ipc_send_blocked = 0;
173 1.1 christos event_set(&xfrd->ipc_handler, socket, EV_PERSIST|EV_READ,
174 1.1 christos xfrd_handle_ipc, xfrd);
175 1.1 christos if(event_base_set(xfrd->event_base, &xfrd->ipc_handler) != 0)
176 1.1 christos log_msg(LOG_ERR, "xfrd ipc handler: event_base_set failed");
177 1.1 christos if(event_add(&xfrd->ipc_handler, NULL) != 0)
178 1.1 christos log_msg(LOG_ERR, "xfrd ipc handler: event_add failed");
179 1.1 christos xfrd->ipc_handler_flags = EV_PERSIST|EV_READ;
180 1.1 christos xfrd->ipc_conn = xfrd_tcp_create(xfrd->region, QIOBUFSZ);
181 1.1 christos /* not reading using ipc_conn yet */
182 1.1 christos xfrd->ipc_conn->is_reading = 0;
183 1.1 christos xfrd->ipc_conn->fd = socket;
184 1.1 christos xfrd->need_to_send_reload = 0;
185 1.1 christos xfrd->need_to_send_shutdown = 0;
186 1.1 christos xfrd->need_to_send_stats = 0;
187 1.1 christos
188 1.1 christos xfrd->write_zonefile_needed = 0;
189 1.1 christos if(nsd->options->zonefiles_write)
190 1.1 christos xfrd_write_timer_set();
191 1.1 christos
192 1.1 christos xfrd->notify_waiting_first = NULL;
193 1.1 christos xfrd->notify_waiting_last = NULL;
194 1.1 christos xfrd->notify_udp_num = 0;
195 1.1 christos
196 1.1 christos #ifdef HAVE_SSL
197 1.1 christos daemon_remote_attach(xfrd->nsd->rc, xfrd);
198 1.1 christos #endif
199 1.1 christos
200 1.1 christos xfrd->tcp_set = xfrd_tcp_set_create(xfrd->region);
201 1.1 christos xfrd->tcp_set->tcp_timeout = nsd->tcp_timeout;
202 1.1 christos #ifndef HAVE_ARC4RANDOM
203 1.1 christos srandom((unsigned long) getpid() * (unsigned long) time(NULL));
204 1.1 christos #endif
205 1.1 christos
206 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd pre-startup"));
207 1.1 christos xfrd_init_zones();
208 1.1 christos xfrd_receive_soa(socket, shortsoa);
209 1.1 christos if(nsd->options->xfrdfile != NULL && nsd->options->xfrdfile[0]!=0)
210 1.1 christos xfrd_read_state(xfrd);
211 1.1 christos
212 1.1 christos /* did we get killed before startup was successful? */
213 1.1 christos if(nsd->signal_hint_shutdown) {
214 1.1 christos kill(nsd_pid, SIGTERM);
215 1.1 christos xfrd_shutdown();
216 1.1 christos return;
217 1.1 christos }
218 1.1 christos
219 1.1 christos /* init libevent signals now, so that in the previous init scripts
220 1.1 christos * the normal sighandler is called, and can set nsd->signal_hint..
221 1.1 christos * these are also looked at in sig_process before we run the main loop*/
222 1.1 christos xfrd_sigsetup(SIGHUP);
223 1.1 christos xfrd_sigsetup(SIGTERM);
224 1.1 christos xfrd_sigsetup(SIGQUIT);
225 1.1 christos xfrd_sigsetup(SIGCHLD);
226 1.1 christos xfrd_sigsetup(SIGALRM);
227 1.1 christos xfrd_sigsetup(SIGILL);
228 1.1 christos xfrd_sigsetup(SIGUSR1);
229 1.1 christos xfrd_sigsetup(SIGINT);
230 1.1 christos
231 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd startup"));
232 1.1.1.3 christos #ifdef HAVE_SYSTEMD
233 1.1.1.4 prlw1 sd_notify(0, "READY=1");
234 1.1.1.3 christos #endif
235 1.1 christos xfrd_main();
236 1.1 christos }
237 1.1 christos
238 1.1 christos static void
239 1.1 christos xfrd_process_activated(void)
240 1.1 christos {
241 1.1.1.2 christos xfrd_zone_type* zone;
242 1.1 christos while((zone = xfrd->activated_first)) {
243 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s activation",
244 1.1 christos zone->apex_str));
245 1.1 christos /* pop zone from activated list */
246 1.1 christos xfrd->activated_first = zone->activated_next;
247 1.1 christos if(zone->activated_next)
248 1.1 christos zone->activated_next->activated_prev = NULL;
249 1.1 christos zone->is_activated = 0;
250 1.1 christos /* run it : no events, specifically not the TIMEOUT event,
251 1.1 christos * so that running zone transfers are not interrupted */
252 1.1 christos xfrd_handle_zone(zone->zone_handler.ev_fd, 0, zone);
253 1.1 christos }
254 1.1 christos }
255 1.1 christos
256 1.1 christos static void
257 1.1 christos xfrd_sig_process(void)
258 1.1 christos {
259 1.1 christos int status;
260 1.1 christos pid_t child_pid;
261 1.1 christos
262 1.1 christos if(xfrd->nsd->signal_hint_quit || xfrd->nsd->signal_hint_shutdown) {
263 1.1 christos xfrd->nsd->signal_hint_quit = 0;
264 1.1 christos xfrd->nsd->signal_hint_shutdown = 0;
265 1.1 christos xfrd->need_to_send_shutdown = 1;
266 1.1 christos if(!(xfrd->ipc_handler_flags&EV_WRITE)) {
267 1.1 christos ipc_xfrd_set_listening(xfrd, EV_PERSIST|EV_READ|EV_WRITE);
268 1.1 christos }
269 1.1 christos } else if(xfrd->nsd->signal_hint_reload_hup) {
270 1.1 christos log_msg(LOG_WARNING, "SIGHUP received, reloading...");
271 1.1 christos xfrd->nsd->signal_hint_reload_hup = 0;
272 1.1 christos if(xfrd->nsd->options->zonefiles_check) {
273 1.1 christos task_new_check_zonefiles(xfrd->nsd->task[
274 1.1 christos xfrd->nsd->mytask], xfrd->last_task, NULL);
275 1.1 christos }
276 1.1 christos xfrd_set_reload_now(xfrd);
277 1.1 christos } else if(xfrd->nsd->signal_hint_statsusr) {
278 1.1 christos xfrd->nsd->signal_hint_statsusr = 0;
279 1.1 christos xfrd->need_to_send_stats = 1;
280 1.1 christos if(!(xfrd->ipc_handler_flags&EV_WRITE)) {
281 1.1 christos ipc_xfrd_set_listening(xfrd, EV_PERSIST|EV_READ|EV_WRITE);
282 1.1 christos }
283 1.1 christos }
284 1.1 christos
285 1.1 christos /* collect children that exited. */
286 1.1 christos xfrd->nsd->signal_hint_child = 0;
287 1.1 christos while((child_pid = waitpid(-1, &status, WNOHANG)) != -1 && child_pid != 0) {
288 1.1 christos if(status != 0) {
289 1.1 christos log_msg(LOG_ERR, "process %d exited with status %d",
290 1.1 christos (int)child_pid, status);
291 1.1 christos }
292 1.1 christos }
293 1.1 christos if(!xfrd->child_timer_added) {
294 1.1 christos struct timeval tv;
295 1.1 christos tv.tv_sec = XFRD_CHILD_REAP_TIMEOUT;
296 1.1 christos tv.tv_usec = 0;
297 1.1 christos event_set(&xfrd->child_timer, -1, EV_TIMEOUT,
298 1.1 christos xfrd_handle_child_timer, xfrd);
299 1.1 christos if(event_base_set(xfrd->event_base, &xfrd->child_timer) != 0)
300 1.1 christos log_msg(LOG_ERR, "xfrd child timer: event_base_set failed");
301 1.1 christos if(event_add(&xfrd->child_timer, &tv) != 0)
302 1.1 christos log_msg(LOG_ERR, "xfrd child timer: event_add failed");
303 1.1 christos xfrd->child_timer_added = 1;
304 1.1 christos }
305 1.1 christos }
306 1.1 christos
307 1.1 christos static void
308 1.1 christos xfrd_main(void)
309 1.1 christos {
310 1.1 christos /* we may have signals from the startup period, process them */
311 1.1 christos xfrd_sig_process();
312 1.1 christos xfrd->shutdown = 0;
313 1.1 christos while(!xfrd->shutdown)
314 1.1 christos {
315 1.1 christos /* process activated zones before blocking in select again */
316 1.1 christos xfrd_process_activated();
317 1.1 christos /* dispatch may block for a longer period, so current is gone */
318 1.1 christos xfrd->got_time = 0;
319 1.1 christos if(event_base_loop(xfrd->event_base, EVLOOP_ONCE) == -1) {
320 1.1 christos if (errno != EINTR) {
321 1.1 christos log_msg(LOG_ERR,
322 1.1 christos "xfrd dispatch failed: %s",
323 1.1 christos strerror(errno));
324 1.1 christos }
325 1.1 christos }
326 1.1 christos xfrd_sig_process();
327 1.1 christos }
328 1.1 christos xfrd_shutdown();
329 1.1 christos }
330 1.1 christos
331 1.1 christos static void
332 1.1 christos xfrd_shutdown()
333 1.1 christos {
334 1.1.1.2 christos xfrd_zone_type* zone;
335 1.1 christos
336 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd shutdown"));
337 1.1.1.3 christos #ifdef HAVE_SYSTEMD
338 1.1.1.4 prlw1 sd_notify(0, "STOPPING=1");
339 1.1.1.3 christos #endif
340 1.1 christos event_del(&xfrd->ipc_handler);
341 1.1 christos close(xfrd->ipc_handler.ev_fd); /* notifies parent we stop */
342 1.1.1.3 christos zone_list_close(nsd.options);
343 1.1 christos if(xfrd->nsd->options->xfrdfile != NULL && xfrd->nsd->options->xfrdfile[0]!=0)
344 1.1 christos xfrd_write_state(xfrd);
345 1.1 christos if(xfrd->reload_added) {
346 1.1 christos event_del(&xfrd->reload_handler);
347 1.1 christos xfrd->reload_added = 0;
348 1.1 christos }
349 1.1 christos if(xfrd->child_timer_added) {
350 1.1 christos event_del(&xfrd->child_timer);
351 1.1 christos xfrd->child_timer_added = 0;
352 1.1 christos }
353 1.1 christos if(xfrd->nsd->options->zonefiles_write) {
354 1.1 christos event_del(&xfrd->write_timer);
355 1.1 christos }
356 1.1 christos #ifdef HAVE_SSL
357 1.1 christos daemon_remote_close(xfrd->nsd->rc); /* close sockets of rc */
358 1.1 christos #endif
359 1.1 christos /* close sockets */
360 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
361 1.1 christos {
362 1.1 christos if(zone->event_added) {
363 1.1 christos event_del(&zone->zone_handler);
364 1.1 christos if(zone->zone_handler.ev_fd != -1) {
365 1.1 christos close(zone->zone_handler.ev_fd);
366 1.1 christos zone->zone_handler.ev_fd = -1;
367 1.1 christos }
368 1.1 christos zone->event_added = 0;
369 1.1 christos }
370 1.1 christos }
371 1.1 christos close_notify_fds(xfrd->notify_zones);
372 1.1 christos
373 1.1 christos /* wait for server parent (if necessary) */
374 1.1 christos if(xfrd->reload_pid != -1) {
375 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd wait for servermain %d",
376 1.1 christos (int)xfrd->reload_pid));
377 1.1 christos while(1) {
378 1.1 christos if(waitpid(xfrd->reload_pid, NULL, 0) == -1) {
379 1.1 christos if(errno == EINTR) continue;
380 1.1 christos if(errno == ECHILD) break;
381 1.1 christos log_msg(LOG_ERR, "xfrd: waitpid(%d): %s",
382 1.1 christos (int)xfrd->reload_pid, strerror(errno));
383 1.1 christos }
384 1.1 christos break;
385 1.1 christos }
386 1.1 christos }
387 1.1 christos
388 1.1 christos /* if we are killed past this point this is not a problem,
389 1.1 christos * some files left in /tmp are cleaned by the OS, but it is neater
390 1.1 christos * to clean them out */
391 1.1 christos
392 1.1 christos /* unlink xfr files for running transfers */
393 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
394 1.1 christos {
395 1.1 christos if(zone->msg_seq_nr)
396 1.1 christos xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
397 1.1 christos }
398 1.1 christos /* unlink xfr files in not-yet-done task file */
399 1.1 christos xfrd_clean_pending_tasks(xfrd->nsd, xfrd->nsd->task[xfrd->nsd->mytask]);
400 1.1 christos xfrd_del_tempdir(xfrd->nsd);
401 1.1.1.3 christos #ifdef HAVE_SSL
402 1.1.1.3 christos daemon_remote_delete(xfrd->nsd->rc); /* ssl-delete secret keys */
403 1.1.1.3 christos #endif
404 1.1.1.4 prlw1 #ifdef USE_DNSTAP
405 1.1.1.4 prlw1 dt_collector_close(nsd.dt_collector, &nsd);
406 1.1.1.4 prlw1 #endif
407 1.1 christos
408 1.1 christos /* process-exit cleans up memory used by xfrd process */
409 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd shutdown complete"));
410 1.1.1.3 christos #ifdef MEMCLEAN /* OS collects memory pages */
411 1.1.1.3 christos if(xfrd->zones) {
412 1.1.1.3 christos xfrd_zone_type* z;
413 1.1.1.3 christos RBTREE_FOR(z, xfrd_zone_type*, xfrd->zones) {
414 1.1.1.3 christos tsig_delete_record(&z->tsig, NULL);
415 1.1.1.3 christos }
416 1.1.1.3 christos }
417 1.1.1.3 christos if(xfrd->notify_zones) {
418 1.1.1.3 christos struct notify_zone* n;
419 1.1.1.3 christos RBTREE_FOR(n, struct notify_zone*, xfrd->notify_zones) {
420 1.1.1.3 christos tsig_delete_record(&n->notify_tsig, NULL);
421 1.1.1.3 christos }
422 1.1.1.3 christos }
423 1.1.1.3 christos if(xfrd_sig_num > 0) {
424 1.1.1.3 christos int i;
425 1.1.1.3 christos for(i=0; i<xfrd_sig_num; i++) {
426 1.1.1.3 christos signal_del(xfrd_sig_evs[i]);
427 1.1.1.3 christos free(xfrd_sig_evs[i]);
428 1.1.1.3 christos }
429 1.1.1.3 christos for(i=0; i<(int)nsd.ifs; i++) {
430 1.1.1.3 christos if(nsd.udp[i].s != -1 && nsd.udp[i].addr)
431 1.1.1.3 christos freeaddrinfo(nsd.udp[i].addr);
432 1.1.1.3 christos if(nsd.tcp[i].s != -1 && nsd.tcp[i].addr)
433 1.1.1.3 christos freeaddrinfo(nsd.tcp[i].addr);
434 1.1.1.3 christos }
435 1.1.1.3 christos }
436 1.1.1.3 christos #ifdef RATELIMIT
437 1.1.1.3 christos rrl_mmap_deinit();
438 1.1.1.3 christos #endif
439 1.1.1.4 prlw1 #ifdef USE_DNSTAP
440 1.1.1.4 prlw1 dt_collector_destroy(nsd.dt_collector, &nsd);
441 1.1.1.4 prlw1 #endif
442 1.1.1.3 christos udb_base_free(nsd.task[0]);
443 1.1.1.3 christos udb_base_free(nsd.task[1]);
444 1.1.1.3 christos event_base_free(xfrd->event_base);
445 1.1.1.3 christos region_destroy(xfrd->region);
446 1.1.1.3 christos nsd_options_destroy(nsd.options);
447 1.1.1.3 christos region_destroy(nsd.region);
448 1.1.1.3 christos log_finalize();
449 1.1.1.3 christos #endif
450 1.1 christos
451 1.1 christos exit(0);
452 1.1 christos }
453 1.1 christos
454 1.1 christos static void
455 1.1 christos xfrd_clean_pending_tasks(struct nsd* nsd, udb_base* u)
456 1.1 christos {
457 1.1 christos udb_ptr t;
458 1.1 christos udb_ptr_new(&t, u, udb_base_get_userdata(u));
459 1.1 christos /* no dealloc of entries, we delete the entire file when done */
460 1.1 christos while(!udb_ptr_is_null(&t)) {
461 1.1 christos if(TASKLIST(&t)->task_type == task_apply_xfr) {
462 1.1 christos xfrd_unlink_xfrfile(nsd, TASKLIST(&t)->yesno);
463 1.1 christos }
464 1.1 christos udb_ptr_set_rptr(&t, u, &TASKLIST(&t)->next);
465 1.1 christos }
466 1.1 christos udb_ptr_unlink(&t, u);
467 1.1 christos }
468 1.1 christos
469 1.1 christos void
470 1.1.1.2 christos xfrd_init_slave_zone(xfrd_state_type* xfrd, struct zone_options* zone_opt)
471 1.1 christos {
472 1.1.1.2 christos xfrd_zone_type *xzone;
473 1.1.1.2 christos xzone = (xfrd_zone_type*)region_alloc(xfrd->region,
474 1.1.1.2 christos sizeof(xfrd_zone_type));
475 1.1.1.2 christos memset(xzone, 0, sizeof(xfrd_zone_type));
476 1.1 christos xzone->apex = zone_opt->node.key;
477 1.1 christos xzone->apex_str = zone_opt->name;
478 1.1 christos xzone->state = xfrd_zone_refreshing;
479 1.1 christos xzone->zone_options = zone_opt;
480 1.1 christos /* first retry will use first master */
481 1.1 christos xzone->master = xzone->zone_options->pattern->request_xfr;
482 1.1 christos xzone->master_num = 0;
483 1.1 christos xzone->next_master = 0;
484 1.1 christos xzone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_START;
485 1.1 christos
486 1.1 christos xzone->soa_nsd_acquired = 0;
487 1.1 christos xzone->soa_disk_acquired = 0;
488 1.1 christos xzone->soa_notified_acquired = 0;
489 1.1 christos /* [0]=1, [1]=0; "." domain name */
490 1.1 christos xzone->soa_nsd.prim_ns[0] = 1;
491 1.1 christos xzone->soa_nsd.email[0] = 1;
492 1.1 christos xzone->soa_disk.prim_ns[0]=1;
493 1.1 christos xzone->soa_disk.email[0]=1;
494 1.1 christos xzone->soa_notified.prim_ns[0]=1;
495 1.1 christos xzone->soa_notified.email[0]=1;
496 1.1 christos
497 1.1 christos xzone->zone_handler.ev_fd = -1;
498 1.1 christos xzone->zone_handler_flags = 0;
499 1.1 christos xzone->event_added = 0;
500 1.1 christos
501 1.1 christos xzone->tcp_conn = -1;
502 1.1 christos xzone->tcp_waiting = 0;
503 1.1 christos xzone->udp_waiting = 0;
504 1.1 christos xzone->is_activated = 0;
505 1.1 christos
506 1.1 christos xzone->multi_master_first_master = -1;
507 1.1 christos xzone->multi_master_update_check = -1;
508 1.1 christos tsig_create_record_custom(&xzone->tsig, NULL, 0, 0, 4);
509 1.1 christos
510 1.1 christos /* set refreshing anyway, if we have data it may be old */
511 1.1 christos xfrd_set_refresh_now(xzone);
512 1.1 christos
513 1.1 christos xzone->node.key = xzone->apex;
514 1.1.1.2 christos rbtree_insert(xfrd->zones, (rbnode_type*)xzone);
515 1.1 christos }
516 1.1 christos
517 1.1 christos static void
518 1.1 christos xfrd_init_zones()
519 1.1 christos {
520 1.1.1.2 christos struct zone_options *zone_opt;
521 1.1 christos assert(xfrd->zones == 0);
522 1.1 christos
523 1.1 christos xfrd->zones = rbtree_create(xfrd->region,
524 1.1 christos (int (*)(const void *, const void *)) dname_compare);
525 1.1 christos xfrd->notify_zones = rbtree_create(xfrd->region,
526 1.1 christos (int (*)(const void *, const void *)) dname_compare);
527 1.1 christos
528 1.1.1.2 christos RBTREE_FOR(zone_opt, struct zone_options*, xfrd->nsd->options->zone_options)
529 1.1 christos {
530 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: adding %s zone",
531 1.1 christos zone_opt->name));
532 1.1 christos
533 1.1 christos init_notify_send(xfrd->notify_zones, xfrd->region, zone_opt);
534 1.1 christos if(!zone_is_slave(zone_opt)) {
535 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s, "
536 1.1 christos "master zone has no outgoing xfr requests",
537 1.1 christos zone_opt->name));
538 1.1 christos continue;
539 1.1 christos }
540 1.1 christos xfrd_init_slave_zone(xfrd, zone_opt);
541 1.1 christos }
542 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: started server %d "
543 1.1 christos "secondary zones", (int)xfrd->zones->count));
544 1.1 christos }
545 1.1 christos
546 1.1 christos static void
547 1.1 christos xfrd_process_soa_info_task(struct task_list_d* task)
548 1.1 christos {
549 1.1.1.2 christos xfrd_soa_type soa;
550 1.1.1.2 christos xfrd_soa_type* soa_ptr = &soa;
551 1.1.1.2 christos xfrd_zone_type* zone;
552 1.1 christos DEBUG(DEBUG_IPC,1, (LOG_INFO, "xfrd: process SOAINFO %s",
553 1.1 christos dname_to_string(task->zname, 0)));
554 1.1.1.2 christos zone = (xfrd_zone_type*)rbtree_search(xfrd->zones, task->zname);
555 1.1 christos if(task->size <= sizeof(struct task_list_d)+dname_total_size(
556 1.1 christos task->zname)+sizeof(uint32_t)*6 + sizeof(uint8_t)*2) {
557 1.1 christos /* NSD has zone without any info */
558 1.1 christos DEBUG(DEBUG_IPC,1, (LOG_INFO, "SOAINFO for %s lost zone",
559 1.1 christos dname_to_string(task->zname,0)));
560 1.1 christos soa_ptr = NULL;
561 1.1 christos } else {
562 1.1 christos uint8_t* p = (uint8_t*)task->zname + dname_total_size(
563 1.1 christos task->zname);
564 1.1 christos /* read the soa info */
565 1.1 christos memset(&soa, 0, sizeof(soa));
566 1.1 christos /* left out type, klass, count for speed */
567 1.1 christos soa.type = htons(TYPE_SOA);
568 1.1 christos soa.klass = htons(CLASS_IN);
569 1.1 christos memmove(&soa.ttl, p, sizeof(uint32_t));
570 1.1 christos p += sizeof(uint32_t);
571 1.1 christos soa.rdata_count = htons(7);
572 1.1 christos memmove(soa.prim_ns, p, sizeof(uint8_t));
573 1.1 christos p += sizeof(uint8_t);
574 1.1 christos memmove(soa.prim_ns+1, p, soa.prim_ns[0]);
575 1.1 christos p += soa.prim_ns[0];
576 1.1 christos memmove(soa.email, p, sizeof(uint8_t));
577 1.1 christos p += sizeof(uint8_t);
578 1.1 christos memmove(soa.email+1, p, soa.email[0]);
579 1.1 christos p += soa.email[0];
580 1.1 christos memmove(&soa.serial, p, sizeof(uint32_t));
581 1.1 christos p += sizeof(uint32_t);
582 1.1 christos memmove(&soa.refresh, p, sizeof(uint32_t));
583 1.1 christos p += sizeof(uint32_t);
584 1.1 christos memmove(&soa.retry, p, sizeof(uint32_t));
585 1.1 christos p += sizeof(uint32_t);
586 1.1 christos memmove(&soa.expire, p, sizeof(uint32_t));
587 1.1 christos p += sizeof(uint32_t);
588 1.1 christos memmove(&soa.minimum, p, sizeof(uint32_t));
589 1.1.1.3 christos /* p += sizeof(uint32_t); if we wanted to read further */
590 1.1 christos DEBUG(DEBUG_IPC,1, (LOG_INFO, "SOAINFO for %s %u",
591 1.1 christos dname_to_string(task->zname,0),
592 1.1 christos (unsigned)ntohl(soa.serial)));
593 1.1 christos }
594 1.1 christos
595 1.1 christos if(!zone) {
596 1.1 christos DEBUG(DEBUG_IPC,1, (LOG_INFO, "xfrd: zone %s master zone updated",
597 1.1 christos dname_to_string(task->zname,0)));
598 1.1 christos notify_handle_master_zone_soainfo(xfrd->notify_zones,
599 1.1 christos task->zname, soa_ptr);
600 1.1 christos return;
601 1.1 christos }
602 1.1 christos xfrd_handle_incoming_soa(zone, soa_ptr, xfrd_time());
603 1.1 christos }
604 1.1 christos
605 1.1 christos static void
606 1.1 christos xfrd_receive_soa(int socket, int shortsoa)
607 1.1 christos {
608 1.1 christos sig_atomic_t cmd;
609 1.1 christos struct udb_base* xtask = xfrd->nsd->task[xfrd->nsd->mytask];
610 1.1 christos udb_ptr last_task, t;
611 1.1.1.2 christos xfrd_zone_type* zone;
612 1.1 christos
613 1.1 christos if(!shortsoa) {
614 1.1 christos /* put all expired zones into mytask */
615 1.1 christos udb_ptr_init(&last_task, xtask);
616 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones) {
617 1.1 christos if(zone->state == xfrd_zone_expired) {
618 1.1 christos task_new_expire(xtask, &last_task, zone->apex, 1);
619 1.1 christos }
620 1.1 christos }
621 1.1 christos udb_ptr_unlink(&last_task, xtask);
622 1.1 christos
623 1.1 christos /* send RELOAD to main to give it this tasklist */
624 1.1 christos task_process_sync(xtask);
625 1.1 christos cmd = NSD_RELOAD;
626 1.1 christos if(!write_socket(socket, &cmd, sizeof(cmd))) {
627 1.1 christos log_msg(LOG_ERR, "problems sending reload xfrdtomain: %s",
628 1.1 christos strerror(errno));
629 1.1 christos }
630 1.1 christos }
631 1.1 christos
632 1.1 christos /* receive RELOAD_DONE to get SOAINFO tasklist */
633 1.1 christos if(block_read(&nsd, socket, &cmd, sizeof(cmd), -1) != sizeof(cmd) ||
634 1.1 christos cmd != NSD_RELOAD_DONE) {
635 1.1 christos if(nsd.signal_hint_shutdown)
636 1.1 christos return;
637 1.1 christos log_msg(LOG_ERR, "did not get start signal from main");
638 1.1 christos exit(1);
639 1.1 christos }
640 1.1 christos if(block_read(NULL, socket, &xfrd->reload_pid, sizeof(pid_t), -1)
641 1.1 christos != sizeof(pid_t)) {
642 1.1 christos log_msg(LOG_ERR, "xfrd cannot get reload_pid");
643 1.1 christos }
644 1.1 christos
645 1.1 christos /* process tasklist (SOAINFO data) */
646 1.1 christos udb_ptr_unlink(xfrd->last_task, xtask);
647 1.1 christos /* if shortsoa: then use my own taskdb that nsdparent filled */
648 1.1 christos if(!shortsoa)
649 1.1 christos xfrd->nsd->mytask = 1 - xfrd->nsd->mytask;
650 1.1 christos xtask = xfrd->nsd->task[xfrd->nsd->mytask];
651 1.1 christos task_remap(xtask);
652 1.1 christos udb_ptr_new(&t, xtask, udb_base_get_userdata(xtask));
653 1.1 christos while(!udb_ptr_is_null(&t)) {
654 1.1 christos xfrd_process_soa_info_task(TASKLIST(&t));
655 1.1 christos udb_ptr_set_rptr(&t, xtask, &TASKLIST(&t)->next);
656 1.1 christos }
657 1.1 christos udb_ptr_unlink(&t, xtask);
658 1.1 christos task_clear(xtask);
659 1.1 christos udb_ptr_init(xfrd->last_task, xfrd->nsd->task[xfrd->nsd->mytask]);
660 1.1 christos
661 1.1 christos if(!shortsoa) {
662 1.1 christos /* receive RELOAD_DONE that signals the other tasklist is
663 1.1 christos * empty, and thus xfrd can operate (can call reload and swap
664 1.1 christos * to the other, empty, tasklist) */
665 1.1 christos if(block_read(NULL, socket, &cmd, sizeof(cmd), -1) !=
666 1.1 christos sizeof(cmd) ||
667 1.1 christos cmd != NSD_RELOAD_DONE) {
668 1.1 christos log_msg(LOG_ERR, "did not get start signal 2 from "
669 1.1 christos "main");
670 1.1 christos exit(1);
671 1.1 christos }
672 1.1 christos } else {
673 1.1 christos /* for shortsoa version, do expire later */
674 1.1 christos /* if expire notifications, put in my task and
675 1.1 christos * schedule a reload to make sure they are processed */
676 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones) {
677 1.1 christos if(zone->state == xfrd_zone_expired) {
678 1.1 christos xfrd_send_expire_notification(zone);
679 1.1 christos }
680 1.1 christos }
681 1.1 christos }
682 1.1 christos }
683 1.1 christos
684 1.1 christos void
685 1.1 christos xfrd_reopen_logfile(void)
686 1.1 christos {
687 1.1 christos if (xfrd->nsd->file_rotation_ok)
688 1.1 christos log_reopen(xfrd->nsd->log_filename, 0);
689 1.1 christos }
690 1.1 christos
691 1.1 christos void
692 1.1.1.2 christos xfrd_deactivate_zone(xfrd_zone_type* z)
693 1.1 christos {
694 1.1 christos if(z->is_activated) {
695 1.1 christos /* delete from activated list */
696 1.1 christos if(z->activated_prev)
697 1.1 christos z->activated_prev->activated_next = z->activated_next;
698 1.1 christos else xfrd->activated_first = z->activated_next;
699 1.1 christos if(z->activated_next)
700 1.1 christos z->activated_next->activated_prev = z->activated_prev;
701 1.1 christos z->is_activated = 0;
702 1.1 christos }
703 1.1 christos }
704 1.1 christos
705 1.1 christos void
706 1.1.1.2 christos xfrd_del_slave_zone(xfrd_state_type* xfrd, const dname_type* dname)
707 1.1 christos {
708 1.1.1.2 christos xfrd_zone_type* z = (xfrd_zone_type*)rbtree_delete(xfrd->zones, dname);
709 1.1 christos if(!z) return;
710 1.1 christos
711 1.1 christos /* io */
712 1.1 christos if(z->tcp_waiting) {
713 1.1 christos /* delete from tcp waiting list */
714 1.1 christos if(z->tcp_waiting_prev)
715 1.1 christos z->tcp_waiting_prev->tcp_waiting_next =
716 1.1 christos z->tcp_waiting_next;
717 1.1 christos else xfrd->tcp_set->tcp_waiting_first = z->tcp_waiting_next;
718 1.1 christos if(z->tcp_waiting_next)
719 1.1 christos z->tcp_waiting_next->tcp_waiting_prev =
720 1.1 christos z->tcp_waiting_prev;
721 1.1 christos else xfrd->tcp_set->tcp_waiting_last = z->tcp_waiting_prev;
722 1.1 christos z->tcp_waiting = 0;
723 1.1 christos }
724 1.1 christos if(z->udp_waiting) {
725 1.1 christos /* delete from udp waiting list */
726 1.1 christos if(z->udp_waiting_prev)
727 1.1 christos z->udp_waiting_prev->udp_waiting_next =
728 1.1 christos z->udp_waiting_next;
729 1.1 christos else xfrd->udp_waiting_first = z->udp_waiting_next;
730 1.1 christos if(z->udp_waiting_next)
731 1.1 christos z->udp_waiting_next->udp_waiting_prev =
732 1.1 christos z->udp_waiting_prev;
733 1.1 christos else xfrd->udp_waiting_last = z->udp_waiting_prev;
734 1.1 christos z->udp_waiting = 0;
735 1.1 christos }
736 1.1 christos xfrd_deactivate_zone(z);
737 1.1 christos if(z->tcp_conn != -1) {
738 1.1 christos xfrd_tcp_release(xfrd->tcp_set, z);
739 1.1 christos } else if(z->zone_handler.ev_fd != -1 && z->event_added) {
740 1.1 christos xfrd_udp_release(z);
741 1.1 christos } else if(z->event_added)
742 1.1 christos event_del(&z->zone_handler);
743 1.1 christos if(z->msg_seq_nr)
744 1.1 christos xfrd_unlink_xfrfile(xfrd->nsd, z->xfrfilenumber);
745 1.1 christos
746 1.1 christos /* tsig */
747 1.1 christos tsig_delete_record(&z->tsig, NULL);
748 1.1 christos
749 1.1 christos /* z->dname is recycled when the zone_options is removed */
750 1.1 christos region_recycle(xfrd->region, z, sizeof(*z));
751 1.1 christos }
752 1.1 christos
753 1.1 christos void
754 1.1 christos xfrd_free_namedb(struct nsd* nsd)
755 1.1 christos {
756 1.1 christos namedb_close_udb(nsd->db);
757 1.1 christos namedb_close(nsd->db);
758 1.1 christos nsd->db = 0;
759 1.1 christos }
760 1.1 christos
761 1.1 christos static void
762 1.1.1.2 christos xfrd_set_timer_refresh(xfrd_zone_type* zone)
763 1.1 christos {
764 1.1 christos time_t set_refresh;
765 1.1 christos time_t set_expire;
766 1.1 christos time_t set_min;
767 1.1 christos time_t set;
768 1.1 christos if(zone->soa_disk_acquired == 0 || zone->state != xfrd_zone_ok) {
769 1.1 christos xfrd_set_timer_retry(zone);
770 1.1 christos return;
771 1.1 christos }
772 1.1 christos /* refresh or expire timeout, whichever is earlier */
773 1.1 christos set_refresh = ntohl(zone->soa_disk.refresh);
774 1.1 christos if (set_refresh > (time_t)zone->zone_options->pattern->max_refresh_time)
775 1.1 christos set_refresh = zone->zone_options->pattern->max_refresh_time;
776 1.1 christos else if (set_refresh < (time_t)zone->zone_options->pattern->min_refresh_time)
777 1.1 christos set_refresh = zone->zone_options->pattern->min_refresh_time;
778 1.1 christos set_refresh += zone->soa_disk_acquired;
779 1.1 christos set_expire = zone->soa_disk_acquired + ntohl(zone->soa_disk.expire);
780 1.1 christos if(set_refresh < set_expire)
781 1.1 christos set = set_refresh;
782 1.1 christos else set = set_expire;
783 1.1 christos set_min = zone->soa_disk_acquired + XFRD_LOWERBOUND_REFRESH;
784 1.1 christos if(set < set_min)
785 1.1 christos set = set_min;
786 1.1 christos if(set < xfrd_time())
787 1.1 christos set = 0;
788 1.1 christos else set -= xfrd_time();
789 1.1 christos xfrd_set_timer(zone, set);
790 1.1 christos }
791 1.1 christos
792 1.1 christos static void
793 1.1.1.2 christos xfrd_set_timer_retry(xfrd_zone_type* zone)
794 1.1 christos {
795 1.1 christos time_t set_retry;
796 1.1 christos int mult;
797 1.1 christos /* perform exponential backoff in all the cases */
798 1.1 christos if(zone->fresh_xfr_timeout == 0)
799 1.1 christos zone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_START;
800 1.1 christos else {
801 1.1 christos /* exponential backoff - some master data in zones is paid-for
802 1.1 christos but non-working, and will not get fixed. */
803 1.1 christos zone->fresh_xfr_timeout *= 2;
804 1.1 christos if(zone->fresh_xfr_timeout > XFRD_TRANSFER_TIMEOUT_MAX)
805 1.1 christos zone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_MAX;
806 1.1 christos }
807 1.1 christos /* exponential backoff multiplier, starts at 1, backs off */
808 1.1 christos mult = zone->fresh_xfr_timeout / XFRD_TRANSFER_TIMEOUT_START;
809 1.1 christos if(mult == 0) mult = 1;
810 1.1 christos
811 1.1 christos /* set timer for next retry or expire timeout if earlier. */
812 1.1 christos if(zone->soa_disk_acquired == 0) {
813 1.1 christos /* if no information, use reasonable timeout */
814 1.1 christos #ifdef HAVE_ARC4RANDOM_UNIFORM
815 1.1 christos xfrd_set_timer(zone, zone->fresh_xfr_timeout
816 1.1 christos + arc4random_uniform(zone->fresh_xfr_timeout));
817 1.1 christos #elif HAVE_ARC4RANDOM
818 1.1 christos xfrd_set_timer(zone, zone->fresh_xfr_timeout
819 1.1 christos + arc4random() % zone->fresh_xfr_timeout);
820 1.1 christos #else
821 1.1 christos xfrd_set_timer(zone, zone->fresh_xfr_timeout
822 1.1 christos + random()%zone->fresh_xfr_timeout);
823 1.1 christos #endif
824 1.1 christos } else if(zone->state == xfrd_zone_expired ||
825 1.1 christos xfrd_time() + (time_t)ntohl(zone->soa_disk.retry)*mult <
826 1.1 christos zone->soa_disk_acquired + (time_t)ntohl(zone->soa_disk.expire))
827 1.1 christos {
828 1.1 christos set_retry = ntohl(zone->soa_disk.retry);
829 1.1 christos set_retry *= mult;
830 1.1 christos if(set_retry > (time_t)zone->zone_options->pattern->max_retry_time)
831 1.1 christos set_retry = zone->zone_options->pattern->max_retry_time;
832 1.1 christos else if(set_retry < (time_t)zone->zone_options->pattern->min_retry_time)
833 1.1 christos set_retry = zone->zone_options->pattern->min_retry_time;
834 1.1 christos if(set_retry < XFRD_LOWERBOUND_RETRY)
835 1.1.1.2 christos set_retry = XFRD_LOWERBOUND_RETRY;
836 1.1 christos xfrd_set_timer(zone, set_retry);
837 1.1 christos } else {
838 1.1 christos set_retry = ntohl(zone->soa_disk.expire);
839 1.1 christos if(set_retry < XFRD_LOWERBOUND_RETRY)
840 1.1 christos xfrd_set_timer(zone, XFRD_LOWERBOUND_RETRY);
841 1.1 christos else {
842 1.1 christos if(zone->soa_disk_acquired + set_retry < xfrd_time())
843 1.1 christos xfrd_set_timer(zone, XFRD_LOWERBOUND_RETRY);
844 1.1 christos else xfrd_set_timer(zone, zone->soa_disk_acquired +
845 1.1 christos set_retry - xfrd_time());
846 1.1 christos }
847 1.1 christos }
848 1.1 christos }
849 1.1 christos
850 1.1 christos void
851 1.1 christos xfrd_handle_zone(int ATTR_UNUSED(fd), short event, void* arg)
852 1.1 christos {
853 1.1.1.2 christos xfrd_zone_type* zone = (xfrd_zone_type*)arg;
854 1.1 christos
855 1.1 christos if(zone->tcp_conn != -1) {
856 1.1 christos if(event == 0) /* activated, but already in TCP, nothing to do*/
857 1.1 christos return;
858 1.1 christos /* busy in tcp transaction: an internal error */
859 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s event tcp", zone->apex_str));
860 1.1 christos xfrd_tcp_release(xfrd->tcp_set, zone);
861 1.1 christos /* continue to retry; as if a timeout happened */
862 1.1 christos event = EV_TIMEOUT;
863 1.1 christos }
864 1.1 christos
865 1.1 christos if((event & EV_READ)) {
866 1.1 christos /* busy in udp transaction */
867 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s event udp read", zone->apex_str));
868 1.1 christos xfrd_udp_read(zone);
869 1.1 christos return;
870 1.1 christos }
871 1.1 christos
872 1.1 christos /* timeout */
873 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s timeout", zone->apex_str));
874 1.1 christos if(zone->zone_handler.ev_fd != -1 && zone->event_added &&
875 1.1 christos (event & EV_TIMEOUT)) {
876 1.1 christos assert(zone->tcp_conn == -1);
877 1.1 christos xfrd_udp_release(zone);
878 1.1 christos }
879 1.1 christos
880 1.1 christos if(zone->tcp_waiting) {
881 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s skips retry, TCP connections full",
882 1.1 christos zone->apex_str));
883 1.1 christos xfrd_unset_timer(zone);
884 1.1 christos return;
885 1.1 christos }
886 1.1 christos if(zone->udp_waiting) {
887 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s skips retry, UDP connections full",
888 1.1 christos zone->apex_str));
889 1.1 christos xfrd_unset_timer(zone);
890 1.1 christos return;
891 1.1 christos }
892 1.1 christos
893 1.1 christos if(zone->soa_disk_acquired)
894 1.1 christos {
895 1.1 christos if (zone->state != xfrd_zone_expired &&
896 1.1 christos xfrd_time() >= zone->soa_disk_acquired + (time_t)ntohl(zone->soa_disk.expire)) {
897 1.1 christos /* zone expired */
898 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s has expired", zone->apex_str);
899 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_expired);
900 1.1 christos }
901 1.1 christos else if(zone->state == xfrd_zone_ok &&
902 1.1 christos xfrd_time() >= zone->soa_disk_acquired + (time_t)ntohl(zone->soa_disk.refresh)) {
903 1.1 christos /* zone goes to refreshing state. */
904 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s is refreshing", zone->apex_str));
905 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
906 1.1 christos }
907 1.1 christos }
908 1.1 christos
909 1.1 christos /* only make a new request if no request is running (UDPorTCP) */
910 1.1 christos if(zone->zone_handler.ev_fd == -1 && zone->tcp_conn == -1) {
911 1.1 christos /* make a new request */
912 1.1 christos xfrd_make_request(zone);
913 1.1 christos }
914 1.1 christos }
915 1.1 christos
916 1.1 christos void
917 1.1.1.2 christos xfrd_make_request(xfrd_zone_type* zone)
918 1.1 christos {
919 1.1 christos if(zone->next_master != -1) {
920 1.1 christos /* we are told to use this next master */
921 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
922 1.1 christos "xfrd zone %s use master %i",
923 1.1 christos zone->apex_str, zone->next_master));
924 1.1 christos zone->master_num = zone->next_master;
925 1.1 christos zone->master = acl_find_num(zone->zone_options->pattern->
926 1.1 christos request_xfr, zone->master_num);
927 1.1 christos /* if there is no next master, fallback to use the first one */
928 1.1 christos if(!zone->master) {
929 1.1 christos zone->master = zone->zone_options->pattern->request_xfr;
930 1.1 christos zone->master_num = 0;
931 1.1 christos }
932 1.1 christos /* fallback to cycle master */
933 1.1 christos zone->next_master = -1;
934 1.1 christos zone->round_num = 0; /* fresh set of retries after notify */
935 1.1 christos } else {
936 1.1 christos /* cycle master */
937 1.1 christos
938 1.1 christos if(zone->round_num != -1 && zone->master && zone->master->next)
939 1.1 christos {
940 1.1 christos /* try the next master */
941 1.1 christos zone->master = zone->master->next;
942 1.1 christos zone->master_num++;
943 1.1 christos } else {
944 1.1 christos /* start a new round */
945 1.1 christos zone->master = zone->zone_options->pattern->request_xfr;
946 1.1 christos zone->master_num = 0;
947 1.1 christos zone->round_num++;
948 1.1 christos }
949 1.1 christos if(zone->round_num >= XFRD_MAX_ROUNDS) {
950 1.1 christos /* tried all servers that many times, wait */
951 1.1 christos zone->round_num = -1;
952 1.1 christos xfrd_set_timer_retry(zone);
953 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
954 1.1 christos "xfrd zone %s makereq wait_retry, rd %d mr %d nx %d",
955 1.1 christos zone->apex_str, zone->round_num, zone->master_num, zone->next_master));
956 1.1 christos zone->multi_master_first_master = -1;
957 1.1 christos return;
958 1.1 christos }
959 1.1 christos }
960 1.1 christos
961 1.1 christos /* multi-master-check */
962 1.1 christos if(zone->zone_options->pattern->multi_master_check) {
963 1.1 christos if(zone->multi_master_first_master == zone->master_num &&
964 1.1 christos zone->round_num > 0 &&
965 1.1 christos zone->state != xfrd_zone_expired) {
966 1.1 christos /* tried all servers and update zone */
967 1.1 christos if(zone->multi_master_update_check >= 0) {
968 1.1 christos VERBOSITY(2, (LOG_INFO, "xfrd: multi master "
969 1.1 christos "check: zone %s completed transfers",
970 1.1 christos zone->apex_str));
971 1.1 christos }
972 1.1 christos zone->round_num = -1; /* next try start anew */
973 1.1 christos zone->multi_master_first_master = -1;
974 1.1 christos xfrd_set_timer_refresh(zone);
975 1.1 christos return;
976 1.1 christos }
977 1.1 christos if(zone->multi_master_first_master < 0) {
978 1.1 christos zone->multi_master_first_master = zone->master_num;
979 1.1 christos zone->multi_master_update_check = -1;
980 1.1 christos }
981 1.1 christos }
982 1.1 christos
983 1.1 christos /* cache ixfr_disabled only for XFRD_NO_IXFR_CACHE time */
984 1.1 christos if (zone->master->ixfr_disabled &&
985 1.1 christos (zone->master->ixfr_disabled + XFRD_NO_IXFR_CACHE) <= time(NULL)) {
986 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "clear negative caching ixfr "
987 1.1 christos "disabled for master %s num "
988 1.1 christos "%d ",
989 1.1 christos zone->master->ip_address_spec, zone->master_num));
990 1.1 christos zone->master->ixfr_disabled = 0;
991 1.1 christos }
992 1.1 christos
993 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s make request round %d mr %d nx %d",
994 1.1 christos zone->apex_str, zone->round_num, zone->master_num, zone->next_master));
995 1.1 christos /* perform xfr request */
996 1.1 christos if (!zone->master->use_axfr_only && zone->soa_disk_acquired > 0 &&
997 1.1 christos !zone->master->ixfr_disabled) {
998 1.1 christos
999 1.1 christos if (zone->master->allow_udp) {
1000 1.1 christos xfrd_set_timer(zone, XFRD_UDP_TIMEOUT);
1001 1.1 christos xfrd_udp_obtain(zone);
1002 1.1 christos }
1003 1.1 christos else { /* doing 3 rounds of IXFR/TCP might not be useful */
1004 1.1 christos xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
1005 1.1 christos xfrd_tcp_obtain(xfrd->tcp_set, zone);
1006 1.1 christos }
1007 1.1 christos }
1008 1.1 christos else if (zone->master->use_axfr_only || zone->soa_disk_acquired <= 0) {
1009 1.1 christos xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
1010 1.1 christos xfrd_tcp_obtain(xfrd->tcp_set, zone);
1011 1.1 christos }
1012 1.1 christos else if (zone->master->ixfr_disabled) {
1013 1.1 christos if (zone->zone_options->pattern->allow_axfr_fallback) {
1014 1.1 christos xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
1015 1.1 christos xfrd_tcp_obtain(xfrd->tcp_set, zone);
1016 1.1 christos } else {
1017 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s axfr "
1018 1.1 christos "fallback not allowed, skipping master %s.",
1019 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1020 1.1 christos }
1021 1.1 christos }
1022 1.1 christos }
1023 1.1 christos
1024 1.1 christos static void
1025 1.1.1.2 christos xfrd_udp_obtain(xfrd_zone_type* zone)
1026 1.1 christos {
1027 1.1 christos assert(zone->udp_waiting == 0);
1028 1.1 christos if(zone->tcp_conn != -1) {
1029 1.1 christos /* no tcp and udp at the same time */
1030 1.1 christos xfrd_tcp_release(xfrd->tcp_set, zone);
1031 1.1 christos }
1032 1.1 christos if(xfrd->udp_use_num < XFRD_MAX_UDP) {
1033 1.1 christos int fd;
1034 1.1 christos xfrd->udp_use_num++;
1035 1.1 christos fd = xfrd_send_ixfr_request_udp(zone);
1036 1.1 christos if(fd == -1)
1037 1.1 christos xfrd->udp_use_num--;
1038 1.1 christos else {
1039 1.1 christos if(zone->event_added)
1040 1.1 christos event_del(&zone->zone_handler);
1041 1.1 christos event_set(&zone->zone_handler, fd,
1042 1.1 christos EV_PERSIST|EV_READ|EV_TIMEOUT,
1043 1.1 christos xfrd_handle_zone, zone);
1044 1.1 christos if(event_base_set(xfrd->event_base, &zone->zone_handler) != 0)
1045 1.1 christos log_msg(LOG_ERR, "xfrd udp: event_base_set failed");
1046 1.1 christos if(event_add(&zone->zone_handler, &zone->timeout) != 0)
1047 1.1 christos log_msg(LOG_ERR, "xfrd udp: event_add failed");
1048 1.1 christos zone->zone_handler_flags=EV_PERSIST|EV_READ|EV_TIMEOUT;
1049 1.1 christos zone->event_added = 1;
1050 1.1 christos }
1051 1.1 christos return;
1052 1.1 christos }
1053 1.1 christos /* queue the zone as last */
1054 1.1 christos zone->udp_waiting = 1;
1055 1.1 christos zone->udp_waiting_next = NULL;
1056 1.1 christos zone->udp_waiting_prev = xfrd->udp_waiting_last;
1057 1.1 christos if(!xfrd->udp_waiting_first)
1058 1.1 christos xfrd->udp_waiting_first = zone;
1059 1.1 christos if(xfrd->udp_waiting_last)
1060 1.1 christos xfrd->udp_waiting_last->udp_waiting_next = zone;
1061 1.1 christos xfrd->udp_waiting_last = zone;
1062 1.1 christos xfrd_unset_timer(zone);
1063 1.1 christos }
1064 1.1 christos
1065 1.1 christos time_t
1066 1.1 christos xfrd_time()
1067 1.1 christos {
1068 1.1 christos if(!xfrd->got_time) {
1069 1.1 christos xfrd->current_time = time(0);
1070 1.1 christos xfrd->got_time = 1;
1071 1.1 christos }
1072 1.1 christos return xfrd->current_time;
1073 1.1 christos }
1074 1.1 christos
1075 1.1 christos void
1076 1.1.1.2 christos xfrd_copy_soa(xfrd_soa_type* soa, rr_type* rr)
1077 1.1 christos {
1078 1.1 christos const uint8_t* rr_ns_wire = dname_name(domain_dname(rdata_atom_domain(rr->rdatas[0])));
1079 1.1 christos uint8_t rr_ns_len = domain_dname(rdata_atom_domain(rr->rdatas[0]))->name_size;
1080 1.1 christos const uint8_t* rr_em_wire = dname_name(domain_dname(rdata_atom_domain(rr->rdatas[1])));
1081 1.1 christos uint8_t rr_em_len = domain_dname(rdata_atom_domain(rr->rdatas[1]))->name_size;
1082 1.1 christos
1083 1.1 christos if(rr->type != TYPE_SOA || rr->rdata_count != 7) {
1084 1.1 christos log_msg(LOG_ERR, "xfrd: copy_soa called with bad rr, type %d rrs %u.",
1085 1.1 christos rr->type, rr->rdata_count);
1086 1.1 christos return;
1087 1.1 christos }
1088 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: copy_soa rr, type %d rrs %u, ttl %u.",
1089 1.1 christos (int)rr->type, (unsigned)rr->rdata_count, (unsigned)rr->ttl));
1090 1.1 christos soa->type = htons(rr->type);
1091 1.1 christos soa->klass = htons(rr->klass);
1092 1.1 christos soa->ttl = htonl(rr->ttl);
1093 1.1 christos soa->rdata_count = htons(rr->rdata_count);
1094 1.1 christos
1095 1.1 christos /* copy dnames */
1096 1.1 christos soa->prim_ns[0] = rr_ns_len;
1097 1.1 christos memcpy(soa->prim_ns+1, rr_ns_wire, rr_ns_len);
1098 1.1 christos soa->email[0] = rr_em_len;
1099 1.1 christos memcpy(soa->email+1, rr_em_wire, rr_em_len);
1100 1.1 christos
1101 1.1 christos /* already in network format */
1102 1.1 christos memcpy(&soa->serial, rdata_atom_data(rr->rdatas[2]), sizeof(uint32_t));
1103 1.1 christos memcpy(&soa->refresh, rdata_atom_data(rr->rdatas[3]), sizeof(uint32_t));
1104 1.1 christos memcpy(&soa->retry, rdata_atom_data(rr->rdatas[4]), sizeof(uint32_t));
1105 1.1 christos memcpy(&soa->expire, rdata_atom_data(rr->rdatas[5]), sizeof(uint32_t));
1106 1.1 christos memcpy(&soa->minimum, rdata_atom_data(rr->rdatas[6]), sizeof(uint32_t));
1107 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1108 1.1 christos "xfrd: copy_soa rr, serial %u refresh %u retry %u expire %u",
1109 1.1 christos (unsigned)ntohl(soa->serial), (unsigned)ntohl(soa->refresh),
1110 1.1 christos (unsigned)ntohl(soa->retry), (unsigned)ntohl(soa->expire)));
1111 1.1 christos }
1112 1.1 christos
1113 1.1 christos static void
1114 1.1.1.2 christos xfrd_set_zone_state(xfrd_zone_type* zone, enum xfrd_zone_state s)
1115 1.1 christos {
1116 1.1 christos if(s != zone->state) {
1117 1.1 christos enum xfrd_zone_state old = zone->state;
1118 1.1 christos zone->state = s;
1119 1.1 christos if((s == xfrd_zone_expired || old == xfrd_zone_expired)
1120 1.1 christos && s!=old) {
1121 1.1 christos xfrd_send_expire_notification(zone);
1122 1.1 christos }
1123 1.1 christos }
1124 1.1 christos }
1125 1.1 christos
1126 1.1 christos void
1127 1.1.1.2 christos xfrd_set_refresh_now(xfrd_zone_type* zone)
1128 1.1 christos {
1129 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd zone %s is activated, state %d",
1130 1.1 christos zone->apex_str, zone->state));
1131 1.1 christos if(!zone->is_activated) {
1132 1.1 christos /* push onto list */
1133 1.1 christos zone->activated_prev = 0;
1134 1.1 christos zone->activated_next = xfrd->activated_first;
1135 1.1 christos if(xfrd->activated_first)
1136 1.1 christos xfrd->activated_first->activated_prev = zone;
1137 1.1 christos xfrd->activated_first = zone;
1138 1.1 christos zone->is_activated = 1;
1139 1.1 christos }
1140 1.1 christos }
1141 1.1 christos
1142 1.1 christos void
1143 1.1.1.2 christos xfrd_unset_timer(xfrd_zone_type* zone)
1144 1.1 christos {
1145 1.1 christos assert(zone->zone_handler.ev_fd == -1);
1146 1.1 christos if(zone->event_added)
1147 1.1 christos event_del(&zone->zone_handler);
1148 1.1 christos zone->zone_handler_flags = 0;
1149 1.1 christos zone->event_added = 0;
1150 1.1 christos }
1151 1.1 christos
1152 1.1 christos void
1153 1.1.1.2 christos xfrd_set_timer(xfrd_zone_type* zone, time_t t)
1154 1.1 christos {
1155 1.1 christos int fd = zone->zone_handler.ev_fd;
1156 1.1 christos int fl = ((fd == -1)?EV_TIMEOUT:zone->zone_handler_flags);
1157 1.1 christos /* randomize the time, within 90%-100% of original */
1158 1.1 christos /* not later so zones cannot expire too late */
1159 1.1 christos /* only for times far in the future */
1160 1.1 christos if(t > 10) {
1161 1.1 christos time_t base = t*9/10;
1162 1.1 christos #ifdef HAVE_ARC4RANDOM_UNIFORM
1163 1.1 christos t = base + arc4random_uniform(t-base);
1164 1.1 christos #elif HAVE_ARC4RANDOM
1165 1.1 christos t = base + arc4random() % (t-base);
1166 1.1 christos #else
1167 1.1 christos t = base + random()%(t-base);
1168 1.1 christos #endif
1169 1.1 christos }
1170 1.1 christos
1171 1.1 christos /* keep existing flags and fd, but re-add with timeout */
1172 1.1 christos if(zone->event_added)
1173 1.1 christos event_del(&zone->zone_handler);
1174 1.1 christos else fd = -1;
1175 1.1 christos zone->timeout.tv_sec = t;
1176 1.1 christos zone->timeout.tv_usec = 0;
1177 1.1 christos event_set(&zone->zone_handler, fd, fl, xfrd_handle_zone, zone);
1178 1.1 christos if(event_base_set(xfrd->event_base, &zone->zone_handler) != 0)
1179 1.1 christos log_msg(LOG_ERR, "xfrd timer: event_base_set failed");
1180 1.1 christos if(event_add(&zone->zone_handler, &zone->timeout) != 0)
1181 1.1 christos log_msg(LOG_ERR, "xfrd timer: event_add failed");
1182 1.1 christos zone->zone_handler_flags = fl;
1183 1.1 christos zone->event_added = 1;
1184 1.1 christos }
1185 1.1 christos
1186 1.1 christos void
1187 1.1.1.2 christos xfrd_handle_incoming_soa(xfrd_zone_type* zone,
1188 1.1.1.2 christos xfrd_soa_type* soa, time_t acquired)
1189 1.1 christos {
1190 1.1 christos if(soa == NULL) {
1191 1.1 christos /* nsd no longer has a zone in memory */
1192 1.1 christos zone->soa_nsd_acquired = 0;
1193 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1194 1.1 christos xfrd_set_refresh_now(zone);
1195 1.1 christos return;
1196 1.1 christos }
1197 1.1 christos if(zone->soa_nsd_acquired && soa->serial == zone->soa_nsd.serial)
1198 1.1 christos return;
1199 1.1 christos
1200 1.1 christos if(zone->soa_disk_acquired && soa->serial == zone->soa_disk.serial)
1201 1.1 christos {
1202 1.1 christos /* soa in disk has been loaded in memory */
1203 1.1 christos log_msg(LOG_INFO, "zone %s serial %u is updated to %u.",
1204 1.1 christos zone->apex_str, (unsigned)ntohl(zone->soa_nsd.serial),
1205 1.1 christos (unsigned)ntohl(soa->serial));
1206 1.1 christos zone->soa_nsd = zone->soa_disk;
1207 1.1 christos zone->soa_nsd_acquired = zone->soa_disk_acquired;
1208 1.1 christos xfrd->write_zonefile_needed = 1;
1209 1.1 christos /* reset exponential backoff, we got a normal timer now */
1210 1.1 christos zone->fresh_xfr_timeout = 0;
1211 1.1 christos if(xfrd_time() - zone->soa_disk_acquired
1212 1.1 christos < (time_t)ntohl(zone->soa_disk.refresh))
1213 1.1 christos {
1214 1.1 christos /* zone ok, wait for refresh time */
1215 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_ok);
1216 1.1 christos zone->round_num = -1;
1217 1.1 christos xfrd_set_timer_refresh(zone);
1218 1.1 christos } else if(xfrd_time() - zone->soa_disk_acquired
1219 1.1 christos < (time_t)ntohl(zone->soa_disk.expire))
1220 1.1 christos {
1221 1.1 christos /* zone refreshing */
1222 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1223 1.1 christos xfrd_set_refresh_now(zone);
1224 1.1 christos }
1225 1.1 christos if(xfrd_time() - zone->soa_disk_acquired
1226 1.1 christos >= (time_t)ntohl(zone->soa_disk.expire)) {
1227 1.1 christos /* zone expired */
1228 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_expired);
1229 1.1 christos xfrd_set_refresh_now(zone);
1230 1.1 christos }
1231 1.1 christos
1232 1.1 christos if(zone->soa_notified_acquired != 0 &&
1233 1.1 christos (zone->soa_notified.serial == 0 ||
1234 1.1 christos compare_serial(ntohl(zone->soa_disk.serial),
1235 1.1 christos ntohl(zone->soa_notified.serial)) >= 0))
1236 1.1 christos { /* read was in response to this notification */
1237 1.1 christos zone->soa_notified_acquired = 0;
1238 1.1 christos }
1239 1.1 christos if(zone->soa_notified_acquired && zone->state == xfrd_zone_ok)
1240 1.1 christos {
1241 1.1 christos /* refresh because of notification */
1242 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1243 1.1 christos xfrd_set_refresh_now(zone);
1244 1.1 christos }
1245 1.1 christos xfrd_send_notify(xfrd->notify_zones, zone->apex, &zone->soa_nsd);
1246 1.1 christos return;
1247 1.1 christos }
1248 1.1 christos
1249 1.1 christos /* user must have manually provided zone data */
1250 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1251 1.1 christos "xfrd: zone %s serial %u from zonefile. refreshing",
1252 1.1 christos zone->apex_str, (unsigned)ntohl(soa->serial)));
1253 1.1 christos zone->soa_nsd = *soa;
1254 1.1 christos zone->soa_disk = *soa;
1255 1.1 christos zone->soa_nsd_acquired = acquired;
1256 1.1 christos zone->soa_disk_acquired = acquired;
1257 1.1 christos if(zone->soa_notified_acquired != 0 &&
1258 1.1 christos (zone->soa_notified.serial == 0 ||
1259 1.1 christos compare_serial(ntohl(zone->soa_disk.serial),
1260 1.1 christos ntohl(zone->soa_notified.serial)) >= 0))
1261 1.1 christos { /* user provided in response to this notification */
1262 1.1 christos zone->soa_notified_acquired = 0;
1263 1.1 christos }
1264 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
1265 1.1 christos xfrd_set_refresh_now(zone);
1266 1.1 christos xfrd_send_notify(xfrd->notify_zones, zone->apex, &zone->soa_nsd);
1267 1.1 christos }
1268 1.1 christos
1269 1.1 christos void
1270 1.1.1.2 christos xfrd_send_expire_notification(xfrd_zone_type* zone)
1271 1.1 christos {
1272 1.1 christos task_new_expire(xfrd->nsd->task[xfrd->nsd->mytask], xfrd->last_task,
1273 1.1 christos zone->apex, zone->state == xfrd_zone_expired);
1274 1.1 christos xfrd_set_reload_timeout();
1275 1.1 christos }
1276 1.1 christos
1277 1.1 christos int
1278 1.1.1.2 christos xfrd_udp_read_packet(buffer_type* packet, int fd, struct sockaddr* src,
1279 1.1.1.2 christos socklen_t* srclen)
1280 1.1 christos {
1281 1.1 christos ssize_t received;
1282 1.1 christos
1283 1.1 christos /* read the data */
1284 1.1 christos buffer_clear(packet);
1285 1.1 christos received = recvfrom(fd, buffer_begin(packet), buffer_remaining(packet),
1286 1.1.1.2 christos 0, src, srclen);
1287 1.1 christos if(received == -1) {
1288 1.1 christos log_msg(LOG_ERR, "xfrd: recvfrom failed: %s",
1289 1.1 christos strerror(errno));
1290 1.1 christos return 0;
1291 1.1 christos }
1292 1.1 christos buffer_set_limit(packet, received);
1293 1.1 christos return 1;
1294 1.1 christos }
1295 1.1 christos
1296 1.1 christos void
1297 1.1.1.2 christos xfrd_udp_release(xfrd_zone_type* zone)
1298 1.1 christos {
1299 1.1 christos assert(zone->udp_waiting == 0);
1300 1.1 christos if(zone->event_added)
1301 1.1 christos event_del(&zone->zone_handler);
1302 1.1 christos if(zone->zone_handler.ev_fd != -1) {
1303 1.1 christos close(zone->zone_handler.ev_fd);
1304 1.1 christos }
1305 1.1 christos zone->zone_handler.ev_fd = -1;
1306 1.1 christos zone->zone_handler_flags = 0;
1307 1.1 christos zone->event_added = 0;
1308 1.1 christos /* see if there are waiting zones */
1309 1.1 christos if(xfrd->udp_use_num == XFRD_MAX_UDP)
1310 1.1 christos {
1311 1.1 christos while(xfrd->udp_waiting_first) {
1312 1.1 christos /* snip off waiting list */
1313 1.1.1.2 christos xfrd_zone_type* wz = xfrd->udp_waiting_first;
1314 1.1 christos assert(wz->udp_waiting);
1315 1.1 christos wz->udp_waiting = 0;
1316 1.1 christos xfrd->udp_waiting_first = wz->udp_waiting_next;
1317 1.1 christos if(wz->udp_waiting_next)
1318 1.1 christos wz->udp_waiting_next->udp_waiting_prev = NULL;
1319 1.1 christos if(xfrd->udp_waiting_last == wz)
1320 1.1 christos xfrd->udp_waiting_last = NULL;
1321 1.1 christos /* see if this zone needs udp connection */
1322 1.1 christos if(wz->tcp_conn == -1) {
1323 1.1 christos int fd = xfrd_send_ixfr_request_udp(wz);
1324 1.1 christos if(fd != -1) {
1325 1.1 christos if(wz->event_added)
1326 1.1 christos event_del(&wz->zone_handler);
1327 1.1 christos event_set(&wz->zone_handler, fd,
1328 1.1 christos EV_READ|EV_TIMEOUT|EV_PERSIST,
1329 1.1 christos xfrd_handle_zone, wz);
1330 1.1 christos if(event_base_set(xfrd->event_base,
1331 1.1 christos &wz->zone_handler) != 0)
1332 1.1 christos log_msg(LOG_ERR, "cannot set event_base for ixfr");
1333 1.1 christos if(event_add(&wz->zone_handler, &wz->timeout) != 0)
1334 1.1 christos log_msg(LOG_ERR, "cannot add event for ixfr");
1335 1.1 christos wz->zone_handler_flags = EV_READ|EV_TIMEOUT|EV_PERSIST;
1336 1.1 christos wz->event_added = 1;
1337 1.1 christos return;
1338 1.1 christos } else {
1339 1.1 christos /* make this zone do something with
1340 1.1 christos * this failure to act */
1341 1.1 christos xfrd_set_refresh_now(wz);
1342 1.1 christos }
1343 1.1 christos }
1344 1.1 christos }
1345 1.1 christos }
1346 1.1 christos /* no waiting zones */
1347 1.1 christos if(xfrd->udp_use_num > 0)
1348 1.1 christos xfrd->udp_use_num--;
1349 1.1 christos }
1350 1.1 christos
1351 1.1 christos /** disable ixfr for master */
1352 1.1 christos void
1353 1.1.1.2 christos xfrd_disable_ixfr(xfrd_zone_type* zone)
1354 1.1 christos {
1355 1.1 christos if(!(zone->master->ixfr_disabled &&
1356 1.1 christos (zone->master->ixfr_disabled + XFRD_NO_IXFR_CACHE) <= time(NULL))) {
1357 1.1 christos /* start new round, with IXFR disabled */
1358 1.1 christos zone->round_num = 0;
1359 1.1 christos zone->next_master = zone->master_num;
1360 1.1 christos }
1361 1.1 christos zone->master->ixfr_disabled = time(NULL);
1362 1.1 christos }
1363 1.1 christos
1364 1.1 christos static void
1365 1.1.1.2 christos xfrd_udp_read(xfrd_zone_type* zone)
1366 1.1 christos {
1367 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s read udp data", zone->apex_str));
1368 1.1.1.2 christos if(!xfrd_udp_read_packet(xfrd->packet, zone->zone_handler.ev_fd,
1369 1.1.1.2 christos NULL, NULL)) {
1370 1.1 christos zone->master->bad_xfr_count++;
1371 1.1 christos if (zone->master->bad_xfr_count > 2) {
1372 1.1 christos xfrd_disable_ixfr(zone);
1373 1.1 christos zone->master->bad_xfr_count = 0;
1374 1.1 christos }
1375 1.1 christos /* drop packet */
1376 1.1 christos xfrd_udp_release(zone);
1377 1.1 christos /* query next server */
1378 1.1 christos xfrd_make_request(zone);
1379 1.1 christos return;
1380 1.1 christos }
1381 1.1 christos switch(xfrd_handle_received_xfr_packet(zone, xfrd->packet)) {
1382 1.1 christos case xfrd_packet_tcp:
1383 1.1 christos xfrd_set_timer(zone, xfrd->tcp_set->tcp_timeout);
1384 1.1 christos xfrd_udp_release(zone);
1385 1.1 christos xfrd_tcp_obtain(xfrd->tcp_set, zone);
1386 1.1 christos break;
1387 1.1 christos case xfrd_packet_transfer:
1388 1.1 christos if(zone->zone_options->pattern->multi_master_check) {
1389 1.1 christos xfrd_udp_release(zone);
1390 1.1 christos xfrd_make_request(zone);
1391 1.1 christos break;
1392 1.1 christos }
1393 1.1.1.2 christos /* fallthrough */
1394 1.1 christos case xfrd_packet_newlease:
1395 1.1 christos /* nothing more to do */
1396 1.1 christos assert(zone->round_num == -1);
1397 1.1 christos xfrd_udp_release(zone);
1398 1.1 christos break;
1399 1.1 christos case xfrd_packet_notimpl:
1400 1.1 christos xfrd_disable_ixfr(zone);
1401 1.1 christos /* drop packet */
1402 1.1 christos xfrd_udp_release(zone);
1403 1.1 christos /* query next server */
1404 1.1 christos xfrd_make_request(zone);
1405 1.1 christos break;
1406 1.1 christos case xfrd_packet_more:
1407 1.1 christos case xfrd_packet_drop:
1408 1.1 christos /* drop packet */
1409 1.1 christos xfrd_udp_release(zone);
1410 1.1 christos /* query next server */
1411 1.1 christos xfrd_make_request(zone);
1412 1.1 christos break;
1413 1.1 christos case xfrd_packet_bad:
1414 1.1 christos default:
1415 1.1 christos zone->master->bad_xfr_count++;
1416 1.1 christos if (zone->master->bad_xfr_count > 2) {
1417 1.1 christos xfrd_disable_ixfr(zone);
1418 1.1 christos zone->master->bad_xfr_count = 0;
1419 1.1 christos }
1420 1.1 christos /* drop packet */
1421 1.1 christos xfrd_udp_release(zone);
1422 1.1 christos /* query next server */
1423 1.1 christos xfrd_make_request(zone);
1424 1.1 christos break;
1425 1.1 christos }
1426 1.1 christos }
1427 1.1 christos
1428 1.1 christos int
1429 1.1.1.2 christos xfrd_send_udp(struct acl_options* acl, buffer_type* packet,
1430 1.1.1.2 christos struct acl_options* ifc)
1431 1.1 christos {
1432 1.1 christos #ifdef INET6
1433 1.1 christos struct sockaddr_storage to;
1434 1.1 christos #else
1435 1.1 christos struct sockaddr_in to;
1436 1.1 christos #endif /* INET6 */
1437 1.1 christos int fd, family;
1438 1.1 christos
1439 1.1 christos /* this will set the remote port to acl->port or TCP_PORT */
1440 1.1 christos socklen_t to_len = xfrd_acl_sockaddr_to(acl, &to);
1441 1.1 christos
1442 1.1 christos /* get the address family of the remote host */
1443 1.1 christos if(acl->is_ipv6) {
1444 1.1 christos #ifdef INET6
1445 1.1 christos family = PF_INET6;
1446 1.1 christos #else
1447 1.1 christos return -1;
1448 1.1 christos #endif /* INET6 */
1449 1.1 christos } else {
1450 1.1 christos family = PF_INET;
1451 1.1 christos }
1452 1.1 christos
1453 1.1 christos fd = socket(family, SOCK_DGRAM, IPPROTO_UDP);
1454 1.1 christos if(fd == -1) {
1455 1.1 christos log_msg(LOG_ERR, "xfrd: cannot create udp socket to %s: %s",
1456 1.1 christos acl->ip_address_spec, strerror(errno));
1457 1.1 christos return -1;
1458 1.1 christos }
1459 1.1 christos
1460 1.1 christos /* bind it */
1461 1.1 christos if (!xfrd_bind_local_interface(fd, ifc, acl, 0)) {
1462 1.1 christos log_msg(LOG_ERR, "xfrd: cannot bind outgoing interface '%s' to "
1463 1.1 christos "udp socket: No matching ip addresses found",
1464 1.1 christos ifc->ip_address_spec);
1465 1.1 christos close(fd);
1466 1.1 christos return -1;
1467 1.1 christos }
1468 1.1 christos
1469 1.1 christos /* send it (udp) */
1470 1.1 christos if(sendto(fd,
1471 1.1 christos buffer_current(packet),
1472 1.1 christos buffer_remaining(packet), 0,
1473 1.1 christos (struct sockaddr*)&to, to_len) == -1)
1474 1.1 christos {
1475 1.1 christos log_msg(LOG_ERR, "xfrd: sendto %s failed %s",
1476 1.1 christos acl->ip_address_spec, strerror(errno));
1477 1.1 christos close(fd);
1478 1.1 christos return -1;
1479 1.1 christos }
1480 1.1 christos return fd;
1481 1.1 christos }
1482 1.1 christos
1483 1.1 christos int
1484 1.1.1.2 christos xfrd_bind_local_interface(int sockd, struct acl_options* ifc,
1485 1.1.1.2 christos struct acl_options* acl, int tcp)
1486 1.1 christos {
1487 1.1 christos #ifdef SO_LINGER
1488 1.1 christos struct linger linger = {1, 0};
1489 1.1 christos #endif
1490 1.1 christos socklen_t frm_len;
1491 1.1 christos #ifdef INET6
1492 1.1 christos struct sockaddr_storage frm;
1493 1.1 christos #else
1494 1.1 christos struct sockaddr_in frm;
1495 1.1 christos #endif /* INET6 */
1496 1.1 christos int ret = 1;
1497 1.1 christos
1498 1.1 christos if (!ifc) /* no outgoing interface set */
1499 1.1 christos return 1;
1500 1.1 christos
1501 1.1 christos while (ifc) {
1502 1.1 christos if (ifc->is_ipv6 != acl->is_ipv6) {
1503 1.1 christos /* check if we have a matching address family */
1504 1.1 christos ifc = ifc->next;
1505 1.1 christos continue;
1506 1.1 christos }
1507 1.1 christos
1508 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: bind() %s to %s socket",
1509 1.1 christos ifc->ip_address_spec, tcp? "tcp":"udp"));
1510 1.1 christos ret = 0;
1511 1.1 christos frm_len = xfrd_acl_sockaddr_frm(ifc, &frm);
1512 1.1 christos
1513 1.1 christos if (tcp) {
1514 1.1 christos #ifdef SO_REUSEADDR
1515 1.1 christos if (setsockopt(sockd, SOL_SOCKET, SO_REUSEADDR, &frm,
1516 1.1 christos frm_len) < 0) {
1517 1.1 christos VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt "
1518 1.1 christos "SO_REUSEADDR failed: %s", strerror(errno)));
1519 1.1 christos }
1520 1.1 christos #else
1521 1.1 christos VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt SO_REUSEADDR "
1522 1.1 christos "failed: SO_REUSEADDR not defined"));
1523 1.1 christos #endif /* SO_REUSEADDR */
1524 1.1 christos
1525 1.1 christos if (ifc->port != 0) {
1526 1.1 christos #ifdef SO_LINGER
1527 1.1 christos if (setsockopt(sockd, SOL_SOCKET, SO_LINGER,
1528 1.1 christos &linger, sizeof(linger)) < 0) {
1529 1.1 christos VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt "
1530 1.1 christos "SO_LINGER failed: %s", strerror(errno)));
1531 1.1 christos }
1532 1.1 christos #else
1533 1.1 christos VERBOSITY(2, (LOG_WARNING, "xfrd: setsockopt SO_LINGER "
1534 1.1 christos "failed: SO_LINGER not defined"));
1535 1.1 christos #endif /* SO_LINGER */
1536 1.1 christos }
1537 1.1 christos }
1538 1.1 christos
1539 1.1 christos /* found one */
1540 1.1 christos if(bind(sockd, (struct sockaddr*)&frm, frm_len) >= 0) {
1541 1.1 christos DEBUG(DEBUG_XFRD,2, (LOG_INFO, "xfrd: bind() %s to %s "
1542 1.1 christos "socket was successful",
1543 1.1 christos ifc->ip_address_spec, tcp? "tcp":"udp"));
1544 1.1 christos return 1;
1545 1.1 christos }
1546 1.1 christos
1547 1.1 christos DEBUG(DEBUG_XFRD,2, (LOG_INFO, "xfrd: bind() %s to %s socket"
1548 1.1 christos "failed: %s",
1549 1.1 christos ifc->ip_address_spec, tcp? "tcp":"udp",
1550 1.1 christos strerror(errno)));
1551 1.1 christos
1552 1.1 christos log_msg(LOG_WARNING, "xfrd: could not bind source address:port to "
1553 1.1 christos "socket: %s", strerror(errno));
1554 1.1 christos /* try another */
1555 1.1 christos ifc = ifc->next;
1556 1.1 christos }
1557 1.1 christos return ret;
1558 1.1 christos }
1559 1.1 christos
1560 1.1 christos void
1561 1.1 christos xfrd_tsig_sign_request(buffer_type* packet, tsig_record_type* tsig,
1562 1.1.1.2 christos struct acl_options* acl)
1563 1.1 christos {
1564 1.1 christos tsig_algorithm_type* algo;
1565 1.1 christos assert(acl->key_options && acl->key_options->tsig_key);
1566 1.1 christos algo = tsig_get_algorithm_by_name(acl->key_options->algorithm);
1567 1.1 christos if(!algo) {
1568 1.1 christos log_msg(LOG_ERR, "tsig unknown algorithm %s",
1569 1.1 christos acl->key_options->algorithm);
1570 1.1 christos return;
1571 1.1 christos }
1572 1.1 christos assert(algo);
1573 1.1 christos tsig_init_record(tsig, algo, acl->key_options->tsig_key);
1574 1.1 christos tsig_init_query(tsig, ID(packet));
1575 1.1 christos tsig_prepare(tsig);
1576 1.1 christos tsig_update(tsig, packet, buffer_position(packet));
1577 1.1 christos tsig_sign(tsig);
1578 1.1 christos tsig_append_rr(tsig, packet);
1579 1.1 christos ARCOUNT_SET(packet, ARCOUNT(packet) + 1);
1580 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "appending tsig to packet"));
1581 1.1 christos /* prepare for validating tsigs */
1582 1.1 christos tsig_prepare(tsig);
1583 1.1 christos }
1584 1.1 christos
1585 1.1 christos static int
1586 1.1.1.2 christos xfrd_send_ixfr_request_udp(xfrd_zone_type* zone)
1587 1.1 christos {
1588 1.1 christos int fd;
1589 1.1 christos
1590 1.1 christos /* make sure we have a master to query the ixfr request to */
1591 1.1 christos assert(zone->master);
1592 1.1 christos
1593 1.1 christos if(zone->tcp_conn != -1) {
1594 1.1 christos /* tcp is using the zone_handler.fd */
1595 1.1 christos log_msg(LOG_ERR, "xfrd: %s tried to send udp whilst tcp engaged",
1596 1.1 christos zone->apex_str);
1597 1.1 christos return -1;
1598 1.1 christos }
1599 1.1 christos xfrd_setup_packet(xfrd->packet, TYPE_IXFR, CLASS_IN, zone->apex,
1600 1.1 christos qid_generate());
1601 1.1 christos zone->query_id = ID(xfrd->packet);
1602 1.1 christos /* delete old xfr file? */
1603 1.1 christos if(zone->msg_seq_nr)
1604 1.1 christos xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
1605 1.1 christos zone->msg_seq_nr = 0;
1606 1.1 christos zone->msg_rr_count = 0;
1607 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "sent query with ID %d", zone->query_id));
1608 1.1 christos NSCOUNT_SET(xfrd->packet, 1);
1609 1.1 christos xfrd_write_soa_buffer(xfrd->packet, zone->apex, &zone->soa_disk);
1610 1.1 christos /* if we have tsig keys, sign the ixfr query */
1611 1.1 christos if(zone->master->key_options && zone->master->key_options->tsig_key) {
1612 1.1 christos xfrd_tsig_sign_request(xfrd->packet, &zone->tsig, zone->master);
1613 1.1 christos }
1614 1.1 christos buffer_flip(xfrd->packet);
1615 1.1 christos xfrd_set_timer(zone, XFRD_UDP_TIMEOUT);
1616 1.1 christos
1617 1.1 christos if((fd = xfrd_send_udp(zone->master, xfrd->packet,
1618 1.1 christos zone->zone_options->pattern->outgoing_interface)) == -1)
1619 1.1 christos return -1;
1620 1.1 christos
1621 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1622 1.1 christos "xfrd sent udp request for ixfr=%u for zone %s to %s",
1623 1.1 christos (unsigned)ntohl(zone->soa_disk.serial),
1624 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1625 1.1 christos return fd;
1626 1.1 christos }
1627 1.1 christos
1628 1.1.1.2 christos static int xfrd_parse_soa_info(buffer_type* packet, xfrd_soa_type* soa)
1629 1.1 christos {
1630 1.1 christos if(!buffer_available(packet, 10))
1631 1.1 christos return 0;
1632 1.1 christos soa->type = htons(buffer_read_u16(packet));
1633 1.1 christos soa->klass = htons(buffer_read_u16(packet));
1634 1.1 christos soa->ttl = htonl(buffer_read_u32(packet));
1635 1.1 christos if(ntohs(soa->type) != TYPE_SOA || ntohs(soa->klass) != CLASS_IN)
1636 1.1 christos {
1637 1.1 christos return 0;
1638 1.1 christos }
1639 1.1 christos
1640 1.1 christos if(!buffer_available(packet, buffer_read_u16(packet)) /* rdata length */ ||
1641 1.1 christos !(soa->prim_ns[0] = dname_make_wire_from_packet(soa->prim_ns+1, packet, 1)) ||
1642 1.1 christos !(soa->email[0] = dname_make_wire_from_packet(soa->email+1, packet, 1)))
1643 1.1 christos {
1644 1.1 christos return 0;
1645 1.1 christos }
1646 1.1 christos soa->rdata_count = 7; /* rdata in SOA */
1647 1.1 christos soa->serial = htonl(buffer_read_u32(packet));
1648 1.1 christos soa->refresh = htonl(buffer_read_u32(packet));
1649 1.1 christos soa->retry = htonl(buffer_read_u32(packet));
1650 1.1 christos soa->expire = htonl(buffer_read_u32(packet));
1651 1.1 christos soa->minimum = htonl(buffer_read_u32(packet));
1652 1.1 christos
1653 1.1 christos return 1;
1654 1.1 christos }
1655 1.1 christos
1656 1.1 christos
1657 1.1 christos /*
1658 1.1 christos * Check the RRs in an IXFR/AXFR reply.
1659 1.1 christos * returns 0 on error, 1 on correct parseable packet.
1660 1.1 christos * done = 1 if the last SOA in an IXFR/AXFR has been seen.
1661 1.1 christos * soa then contains that soa info.
1662 1.1 christos * (soa contents is modified by the routine)
1663 1.1 christos */
1664 1.1 christos static int
1665 1.1.1.2 christos xfrd_xfr_check_rrs(xfrd_zone_type* zone, buffer_type* packet, size_t count,
1666 1.1.1.2 christos int *done, xfrd_soa_type* soa, region_type* temp)
1667 1.1 christos {
1668 1.1 christos /* first RR has already been checked */
1669 1.1 christos uint32_t tmp_serial = 0;
1670 1.1 christos uint16_t type, rrlen;
1671 1.1 christos size_t i, soapos, mempos;
1672 1.1 christos const dname_type* dname;
1673 1.1 christos domain_table_type* owners;
1674 1.1 christos rdata_atom_type* rdatas;
1675 1.1 christos
1676 1.1 christos for(i=0; i<count; ++i,++zone->msg_rr_count)
1677 1.1 christos {
1678 1.1 christos if (*done) {
1679 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr has "
1680 1.1 christos "trailing garbage", zone->apex_str));
1681 1.1 christos return 0;
1682 1.1 christos }
1683 1.1 christos region_free_all(temp);
1684 1.1 christos owners = domain_table_create(temp);
1685 1.1 christos /* check the dname for errors */
1686 1.1 christos dname = dname_make_from_packet(temp, packet, 1, 1);
1687 1.1 christos if(!dname) {
1688 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr unable "
1689 1.1 christos "to parse owner name", zone->apex_str));
1690 1.1 christos return 0;
1691 1.1 christos }
1692 1.1 christos if(!buffer_available(packet, 10)) {
1693 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr hdr "
1694 1.1 christos "too small", zone->apex_str));
1695 1.1 christos return 0;
1696 1.1 christos }
1697 1.1 christos soapos = buffer_position(packet);
1698 1.1 christos type = buffer_read_u16(packet);
1699 1.1 christos (void)buffer_read_u16(packet); /* class */
1700 1.1 christos (void)buffer_read_u32(packet); /* ttl */
1701 1.1 christos rrlen = buffer_read_u16(packet);
1702 1.1 christos if(!buffer_available(packet, rrlen)) {
1703 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr pkt "
1704 1.1 christos "too small", zone->apex_str));
1705 1.1 christos return 0;
1706 1.1 christos }
1707 1.1 christos mempos = buffer_position(packet);
1708 1.1 christos if(rdata_wireformat_to_rdata_atoms(temp, owners, type, rrlen,
1709 1.1 christos packet, &rdatas) == -1) {
1710 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr unable "
1711 1.1 christos "to parse rdata", zone->apex_str));
1712 1.1 christos return 0;
1713 1.1 christos }
1714 1.1 christos if(type == TYPE_SOA) {
1715 1.1 christos /* check the SOAs */
1716 1.1 christos buffer_set_position(packet, soapos);
1717 1.1 christos if(!xfrd_parse_soa_info(packet, soa)) {
1718 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1719 1.1 christos "unable to parse soainfo", zone->apex_str));
1720 1.1 christos return 0;
1721 1.1 christos }
1722 1.1 christos if(zone->msg_rr_count == 1 &&
1723 1.1 christos ntohl(soa->serial) != zone->msg_new_serial) {
1724 1.1 christos /* 2nd RR is SOA with lower serial, this is an IXFR */
1725 1.1 christos zone->msg_is_ixfr = 1;
1726 1.1 christos if(!zone->soa_disk_acquired) {
1727 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1728 1.1 christos "got ixfr but need axfr", zone->apex_str));
1729 1.1 christos return 0; /* got IXFR but need AXFR */
1730 1.1 christos }
1731 1.1 christos if(ntohl(soa->serial) != ntohl(zone->soa_disk.serial)) {
1732 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1733 1.1 christos "bad start serial", zone->apex_str));
1734 1.1 christos return 0; /* bad start serial in IXFR */
1735 1.1 christos }
1736 1.1 christos zone->msg_old_serial = ntohl(soa->serial);
1737 1.1 christos tmp_serial = ntohl(soa->serial);
1738 1.1 christos }
1739 1.1 christos else if(ntohl(soa->serial) == zone->msg_new_serial) {
1740 1.1 christos /* saw another SOA of new serial. */
1741 1.1 christos if(zone->msg_is_ixfr == 1) {
1742 1.1 christos zone->msg_is_ixfr = 2; /* seen middle SOA in ixfr */
1743 1.1 christos } else {
1744 1.1 christos /* 2nd SOA for AXFR or 3rd newSOA for IXFR */
1745 1.1 christos *done = 1;
1746 1.1 christos }
1747 1.1 christos }
1748 1.1 christos else if (zone->msg_is_ixfr) {
1749 1.1 christos /* some additional checks */
1750 1.1 christos if(ntohl(soa->serial) > zone->msg_new_serial) {
1751 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1752 1.1 christos "bad middle serial", zone->apex_str));
1753 1.1 christos return 0; /* bad middle serial in IXFR */
1754 1.1 christos }
1755 1.1 christos if(ntohl(soa->serial) < tmp_serial) {
1756 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s xfr "
1757 1.1 christos "serial decreasing not allowed", zone->apex_str));
1758 1.1 christos return 0; /* middle serial decreases in IXFR */
1759 1.1 christos }
1760 1.1 christos /* serial ok, update tmp serial */
1761 1.1 christos tmp_serial = ntohl(soa->serial);
1762 1.1 christos }
1763 1.1 christos }
1764 1.1 christos buffer_set_position(packet, mempos);
1765 1.1 christos buffer_skip(packet, rrlen);
1766 1.1 christos }
1767 1.1 christos /* packet seems to have a valid DNS RR structure */
1768 1.1 christos return 1;
1769 1.1 christos }
1770 1.1 christos
1771 1.1 christos static int
1772 1.1.1.2 christos xfrd_xfr_process_tsig(xfrd_zone_type* zone, buffer_type* packet)
1773 1.1 christos {
1774 1.1 christos int have_tsig = 0;
1775 1.1 christos assert(zone && zone->master && zone->master->key_options
1776 1.1 christos && zone->master->key_options->tsig_key && packet);
1777 1.1 christos if(!tsig_find_rr(&zone->tsig, packet)) {
1778 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s, from %s: malformed tsig RR",
1779 1.1 christos zone->apex_str, zone->master->ip_address_spec);
1780 1.1 christos return 0;
1781 1.1 christos }
1782 1.1 christos if(zone->tsig.status == TSIG_OK) {
1783 1.1 christos have_tsig = 1;
1784 1.1 christos if (zone->tsig.error_code != TSIG_ERROR_NOERROR) {
1785 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s, from %s: tsig error "
1786 1.1 christos "(%s)", zone->apex_str,
1787 1.1 christos zone->master->ip_address_spec,
1788 1.1 christos tsig_error(zone->tsig.error_code));
1789 1.1 christos }
1790 1.1 christos }
1791 1.1 christos if(have_tsig) {
1792 1.1 christos /* strip the TSIG resource record off... */
1793 1.1 christos buffer_set_limit(packet, zone->tsig.position);
1794 1.1 christos ARCOUNT_SET(packet, ARCOUNT(packet) - 1);
1795 1.1 christos }
1796 1.1 christos
1797 1.1 christos /* keep running the TSIG hash */
1798 1.1 christos tsig_update(&zone->tsig, packet, buffer_limit(packet));
1799 1.1 christos if(have_tsig) {
1800 1.1 christos if (!tsig_verify(&zone->tsig)) {
1801 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s, from %s: bad tsig signature",
1802 1.1 christos zone->apex_str, zone->master->ip_address_spec);
1803 1.1 christos return 0;
1804 1.1 christos }
1805 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s, from %s: good tsig signature",
1806 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1807 1.1 christos /* prepare for next tsigs */
1808 1.1 christos tsig_prepare(&zone->tsig);
1809 1.1 christos }
1810 1.1 christos else if(zone->tsig.updates_since_last_prepare > XFRD_TSIG_MAX_UNSIGNED) {
1811 1.1 christos /* we allow a number of non-tsig signed packets */
1812 1.1 christos log_msg(LOG_INFO, "xfrd: zone %s, from %s: too many consecutive "
1813 1.1 christos "packets without TSIG", zone->apex_str,
1814 1.1 christos zone->master->ip_address_spec);
1815 1.1 christos return 0;
1816 1.1 christos }
1817 1.1 christos
1818 1.1 christos if(!have_tsig && zone->msg_seq_nr == 0) {
1819 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s, from %s: no tsig in first packet of reply",
1820 1.1 christos zone->apex_str, zone->master->ip_address_spec);
1821 1.1 christos return 0;
1822 1.1 christos }
1823 1.1 christos return 1;
1824 1.1 christos }
1825 1.1 christos
1826 1.1 christos /* parse the received packet. returns xfrd packet result code. */
1827 1.1 christos static enum xfrd_packet_result
1828 1.1.1.2 christos xfrd_parse_received_xfr_packet(xfrd_zone_type* zone, buffer_type* packet,
1829 1.1.1.2 christos xfrd_soa_type* soa)
1830 1.1 christos {
1831 1.1 christos size_t rr_count;
1832 1.1 christos size_t qdcount = QDCOUNT(packet);
1833 1.1 christos size_t ancount = ANCOUNT(packet), ancount_todo;
1834 1.1 christos size_t nscount = NSCOUNT(packet);
1835 1.1 christos int done = 0;
1836 1.1 christos region_type* tempregion = NULL;
1837 1.1 christos
1838 1.1 christos /* has to be axfr / ixfr reply */
1839 1.1 christos if(!buffer_available(packet, QHEADERSZ)) {
1840 1.1 christos log_msg(LOG_INFO, "packet too small");
1841 1.1 christos return xfrd_packet_bad;
1842 1.1 christos }
1843 1.1 christos
1844 1.1 christos /* only check ID in first response message. Could also check that
1845 1.1 christos * AA bit and QR bit are set, but not needed.
1846 1.1 christos */
1847 1.1 christos DEBUG(DEBUG_XFRD,2, (LOG_INFO,
1848 1.1 christos "got query with ID %d and %d needed", ID(packet), zone->query_id));
1849 1.1 christos if(ID(packet) != zone->query_id) {
1850 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s received bad query id from %s, "
1851 1.1 christos "dropped",
1852 1.1 christos zone->apex_str, zone->master->ip_address_spec);
1853 1.1 christos return xfrd_packet_bad;
1854 1.1 christos }
1855 1.1 christos /* check RCODE in all response messages */
1856 1.1 christos if(RCODE(packet) != RCODE_OK) {
1857 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s received error code %s from "
1858 1.1 christos "%s",
1859 1.1 christos zone->apex_str, rcode2str(RCODE(packet)),
1860 1.1 christos zone->master->ip_address_spec);
1861 1.1 christos if (RCODE(packet) == RCODE_IMPL ||
1862 1.1 christos RCODE(packet) == RCODE_FORMAT) {
1863 1.1 christos return xfrd_packet_notimpl;
1864 1.1 christos }
1865 1.1 christos if (RCODE(packet) != RCODE_NOTAUTH) {
1866 1.1 christos /* RFC 2845: If NOTAUTH, client should do TSIG checking */
1867 1.1 christos return xfrd_packet_drop;
1868 1.1 christos }
1869 1.1 christos }
1870 1.1 christos /* check TSIG */
1871 1.1 christos if(zone->master->key_options) {
1872 1.1 christos if(!xfrd_xfr_process_tsig(zone, packet)) {
1873 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "dropping xfr reply due "
1874 1.1 christos "to bad TSIG"));
1875 1.1 christos return xfrd_packet_bad;
1876 1.1 christos }
1877 1.1 christos }
1878 1.1 christos if (RCODE(packet) == RCODE_NOTAUTH) {
1879 1.1 christos return xfrd_packet_drop;
1880 1.1 christos }
1881 1.1 christos
1882 1.1 christos buffer_skip(packet, QHEADERSZ);
1883 1.1 christos
1884 1.1 christos /* skip question section */
1885 1.1 christos for(rr_count = 0; rr_count < qdcount; ++rr_count) {
1886 1.1 christos if (!packet_skip_rr(packet, 1)) {
1887 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s, from %s: bad RR in "
1888 1.1 christos "question section",
1889 1.1 christos zone->apex_str, zone->master->ip_address_spec);
1890 1.1 christos return xfrd_packet_bad;
1891 1.1 christos }
1892 1.1 christos }
1893 1.1 christos if(zone->msg_rr_count == 0 && ancount == 0) {
1894 1.1 christos if(zone->tcp_conn == -1 && TC(packet)) {
1895 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: TC flagged"));
1896 1.1 christos return xfrd_packet_tcp;
1897 1.1 christos }
1898 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: too short xfr packet: no "
1899 1.1 christos "answer"));
1900 1.1 christos /* if IXFR is unknown, fallback to AXFR (if allowed) */
1901 1.1 christos if (nscount == 1) {
1902 1.1 christos if(!packet_skip_dname(packet) || !xfrd_parse_soa_info(packet, soa)) {
1903 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1904 1.1 christos "no SOA begins authority section",
1905 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1906 1.1 christos return xfrd_packet_bad;
1907 1.1 christos }
1908 1.1 christos return xfrd_packet_notimpl;
1909 1.1 christos }
1910 1.1 christos return xfrd_packet_bad;
1911 1.1 christos }
1912 1.1 christos ancount_todo = ancount;
1913 1.1 christos
1914 1.1 christos tempregion = region_create(xalloc, free);
1915 1.1 christos if(zone->msg_rr_count == 0) {
1916 1.1 christos const dname_type* soaname = dname_make_from_packet(tempregion,
1917 1.1 christos packet, 1, 1);
1918 1.1 christos if(!soaname) { /* parse failure */
1919 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1920 1.1 christos "parse error in SOA record",
1921 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1922 1.1 christos region_destroy(tempregion);
1923 1.1 christos return xfrd_packet_bad;
1924 1.1 christos }
1925 1.1 christos if(dname_compare(soaname, zone->apex) != 0) { /* wrong name */
1926 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1927 1.1 christos "wrong SOA record",
1928 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1929 1.1 christos region_destroy(tempregion);
1930 1.1 christos return xfrd_packet_bad;
1931 1.1 christos }
1932 1.1 christos
1933 1.1 christos /* parse the first RR, see if it is a SOA */
1934 1.1 christos if(!xfrd_parse_soa_info(packet, soa))
1935 1.1 christos {
1936 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_ERR, "xfrd: zone %s, from %s: "
1937 1.1 christos "bad SOA rdata",
1938 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1939 1.1 christos region_destroy(tempregion);
1940 1.1 christos return xfrd_packet_bad;
1941 1.1 christos }
1942 1.1 christos if(zone->soa_disk_acquired != 0 &&
1943 1.1 christos zone->state != xfrd_zone_expired /* if expired - accept anything */ &&
1944 1.1 christos compare_serial(ntohl(soa->serial), ntohl(zone->soa_disk.serial)) < 0) {
1945 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
1946 1.1 christos "xfrd: zone %s ignoring old serial from %s",
1947 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1948 1.1 christos VERBOSITY(1, (LOG_INFO,
1949 1.1 christos "xfrd: zone %s ignoring old serial from %s",
1950 1.1 christos zone->apex_str, zone->master->ip_address_spec));
1951 1.1 christos region_destroy(tempregion);
1952 1.1 christos return xfrd_packet_bad;
1953 1.1 christos }
1954 1.1 christos if(zone->soa_disk_acquired != 0 && zone->soa_disk.serial == soa->serial) {
1955 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s got "
1956 1.1 christos "update indicating "
1957 1.1 christos "current serial",
1958 1.1 christos zone->apex_str));
1959 1.1 christos /* (even if notified) the lease on the current soa is renewed */
1960 1.1 christos zone->soa_disk_acquired = xfrd_time();
1961 1.1 christos if(zone->soa_nsd.serial == soa->serial)
1962 1.1 christos zone->soa_nsd_acquired = xfrd_time();
1963 1.1.1.2 christos xfrd_set_zone_state(zone, xfrd_zone_ok);
1964 1.1.1.2 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s is ok",
1965 1.1.1.2 christos zone->apex_str));
1966 1.1 christos if(zone->zone_options->pattern->multi_master_check) {
1967 1.1 christos region_destroy(tempregion);
1968 1.1 christos return xfrd_packet_drop;
1969 1.1 christos }
1970 1.1 christos if(zone->soa_notified_acquired == 0) {
1971 1.1 christos /* not notified or anything, so stop asking around */
1972 1.1 christos zone->round_num = -1; /* next try start a new round */
1973 1.1 christos xfrd_set_timer_refresh(zone);
1974 1.1 christos region_destroy(tempregion);
1975 1.1 christos return xfrd_packet_newlease;
1976 1.1 christos }
1977 1.1 christos /* try next master */
1978 1.1 christos region_destroy(tempregion);
1979 1.1 christos return xfrd_packet_drop;
1980 1.1 christos }
1981 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "IXFR reply has ok serial (have \
1982 1.1 christos %u, reply %u).", (unsigned)ntohl(zone->soa_disk.serial), (unsigned)ntohl(soa->serial)));
1983 1.1 christos /* serial is newer than soa_disk */
1984 1.1 christos if(ancount == 1) {
1985 1.1 christos /* single record means it is like a notify */
1986 1.1 christos (void)xfrd_handle_incoming_notify(zone, soa);
1987 1.1 christos }
1988 1.1 christos else if(zone->soa_notified_acquired && zone->soa_notified.serial &&
1989 1.1 christos compare_serial(ntohl(zone->soa_notified.serial), ntohl(soa->serial)) < 0) {
1990 1.1 christos /* this AXFR/IXFR notifies me that an even newer serial exists */
1991 1.1 christos zone->soa_notified.serial = soa->serial;
1992 1.1 christos }
1993 1.1 christos zone->msg_new_serial = ntohl(soa->serial);
1994 1.1 christos zone->msg_rr_count = 1;
1995 1.1 christos zone->msg_is_ixfr = 0;
1996 1.1 christos if(zone->soa_disk_acquired)
1997 1.1 christos zone->msg_old_serial = ntohl(zone->soa_disk.serial);
1998 1.1 christos else zone->msg_old_serial = 0;
1999 1.1 christos ancount_todo = ancount - 1;
2000 1.1 christos }
2001 1.1 christos
2002 1.1 christos if(zone->tcp_conn == -1 && TC(packet)) {
2003 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
2004 1.1 christos "xfrd: zone %s received TC from %s. retry tcp.",
2005 1.1 christos zone->apex_str, zone->master->ip_address_spec));
2006 1.1 christos region_destroy(tempregion);
2007 1.1 christos return xfrd_packet_tcp;
2008 1.1 christos }
2009 1.1 christos
2010 1.1 christos if(zone->tcp_conn == -1 && ancount < 2) {
2011 1.1 christos /* too short to be a real ixfr/axfr data transfer: need at */
2012 1.1 christos /* least two RRs in the answer section. */
2013 1.1 christos /* The serial is newer, so try tcp to this master. */
2014 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: udp reply is short. Try "
2015 1.1 christos "tcp anyway."));
2016 1.1 christos region_destroy(tempregion);
2017 1.1 christos return xfrd_packet_tcp;
2018 1.1 christos }
2019 1.1 christos
2020 1.1 christos if(!xfrd_xfr_check_rrs(zone, packet, ancount_todo, &done, soa,
2021 1.1 christos tempregion))
2022 1.1 christos {
2023 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: zone %s sent bad xfr "
2024 1.1 christos "reply.", zone->apex_str));
2025 1.1 christos region_destroy(tempregion);
2026 1.1 christos return xfrd_packet_bad;
2027 1.1 christos }
2028 1.1 christos region_destroy(tempregion);
2029 1.1 christos if(zone->tcp_conn == -1 && done == 0) {
2030 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: udp reply incomplete"));
2031 1.1 christos return xfrd_packet_bad;
2032 1.1 christos }
2033 1.1 christos if(done == 0)
2034 1.1 christos return xfrd_packet_more;
2035 1.1 christos if(zone->master->key_options) {
2036 1.1 christos if(zone->tsig.updates_since_last_prepare != 0) {
2037 1.1 christos log_msg(LOG_INFO, "xfrd: last packet of reply has no "
2038 1.1 christos "TSIG");
2039 1.1 christos return xfrd_packet_bad;
2040 1.1 christos }
2041 1.1 christos }
2042 1.1 christos return xfrd_packet_transfer;
2043 1.1 christos }
2044 1.1 christos
2045 1.1 christos const char*
2046 1.1 christos xfrd_pretty_time(time_t v)
2047 1.1 christos {
2048 1.1 christos struct tm* tm = localtime(&v);
2049 1.1 christos static char buf[64];
2050 1.1 christos if(!strftime(buf, sizeof(buf), "%Y-%m-%dT%H:%M:%S", tm))
2051 1.1 christos snprintf(buf, sizeof(buf), "strftime-err-%u", (unsigned)v);
2052 1.1 christos return buf;
2053 1.1 christos }
2054 1.1 christos
2055 1.1 christos enum xfrd_packet_result
2056 1.1.1.2 christos xfrd_handle_received_xfr_packet(xfrd_zone_type* zone, buffer_type* packet)
2057 1.1 christos {
2058 1.1.1.2 christos xfrd_soa_type soa;
2059 1.1 christos enum xfrd_packet_result res;
2060 1.1 christos uint64_t xfrfile_size;
2061 1.1 christos
2062 1.1 christos /* parse and check the packet - see if it ends the xfr */
2063 1.1 christos switch((res=xfrd_parse_received_xfr_packet(zone, packet, &soa)))
2064 1.1 christos {
2065 1.1 christos case xfrd_packet_more:
2066 1.1 christos case xfrd_packet_transfer:
2067 1.1 christos /* continue with commit */
2068 1.1 christos break;
2069 1.1 christos case xfrd_packet_newlease:
2070 1.1 christos return xfrd_packet_newlease;
2071 1.1 christos case xfrd_packet_tcp:
2072 1.1 christos return xfrd_packet_tcp;
2073 1.1 christos case xfrd_packet_notimpl:
2074 1.1 christos case xfrd_packet_bad:
2075 1.1 christos case xfrd_packet_drop:
2076 1.1 christos default:
2077 1.1 christos {
2078 1.1 christos /* rollback */
2079 1.1 christos if(zone->msg_seq_nr > 0) {
2080 1.1 christos /* do not process xfr - if only one part simply ignore it. */
2081 1.1 christos /* delete file with previous parts of commit */
2082 1.1 christos xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
2083 1.1 christos VERBOSITY(1, (LOG_INFO, "xfrd: zone %s "
2084 1.1 christos "reverted transfer %u from %s",
2085 1.1 christos zone->apex_str, zone->msg_rr_count?
2086 1.1 christos (int)zone->msg_new_serial:0,
2087 1.1 christos zone->master->ip_address_spec));
2088 1.1 christos zone->msg_seq_nr = 0;
2089 1.1 christos } else if (res == xfrd_packet_bad) {
2090 1.1 christos VERBOSITY(1, (LOG_INFO, "xfrd: zone %s "
2091 1.1 christos "bad transfer %u from %s",
2092 1.1 christos zone->apex_str, zone->msg_rr_count?
2093 1.1 christos (int)zone->msg_new_serial:0,
2094 1.1 christos zone->master->ip_address_spec));
2095 1.1 christos }
2096 1.1 christos if (res == xfrd_packet_notimpl)
2097 1.1 christos return res;
2098 1.1 christos else
2099 1.1 christos return xfrd_packet_bad;
2100 1.1 christos }
2101 1.1 christos }
2102 1.1 christos
2103 1.1 christos /* dump reply on disk to diff file */
2104 1.1 christos /* if first part, get new filenumber. Numbers can wrap around, 64bit
2105 1.1 christos * is enough so we do not collide with older-transfers-in-progress */
2106 1.1 christos if(zone->msg_seq_nr == 0)
2107 1.1 christos zone->xfrfilenumber = xfrd->xfrfilenumber++;
2108 1.1 christos diff_write_packet(dname_to_string(zone->apex,0),
2109 1.1 christos zone->zone_options->pattern->pname,
2110 1.1 christos zone->msg_old_serial, zone->msg_new_serial, zone->msg_seq_nr,
2111 1.1 christos buffer_begin(packet), buffer_limit(packet), xfrd->nsd,
2112 1.1 christos zone->xfrfilenumber);
2113 1.1 christos VERBOSITY(3, (LOG_INFO,
2114 1.1 christos "xfrd: zone %s written received XFR packet from %s with serial %u to "
2115 1.1 christos "disk", zone->apex_str, zone->master->ip_address_spec,
2116 1.1 christos (int)zone->msg_new_serial));
2117 1.1 christos zone->msg_seq_nr++;
2118 1.1 christos
2119 1.1 christos xfrfile_size = xfrd_get_xfrfile_size(xfrd->nsd, zone->xfrfilenumber);
2120 1.1 christos if( zone->zone_options->pattern->size_limit_xfr != 0 &&
2121 1.1 christos xfrfile_size > zone->zone_options->pattern->size_limit_xfr ) {
2122 1.1 christos /* xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
2123 1.1 christos xfrd_set_reload_timeout(); */
2124 1.1 christos log_msg(LOG_INFO, "xfrd : transferred zone data was too large %llu", (long long unsigned)xfrfile_size);
2125 1.1 christos return xfrd_packet_bad;
2126 1.1 christos }
2127 1.1 christos if(res == xfrd_packet_more) {
2128 1.1 christos /* wait for more */
2129 1.1 christos return xfrd_packet_more;
2130 1.1 christos }
2131 1.1 christos
2132 1.1 christos /* done. we are completely sure of this */
2133 1.1 christos buffer_clear(packet);
2134 1.1 christos buffer_printf(packet, "received update to serial %u at %s from %s",
2135 1.1 christos (unsigned)zone->msg_new_serial, xfrd_pretty_time(xfrd_time()),
2136 1.1 christos zone->master->ip_address_spec);
2137 1.1 christos if(zone->master->key_options) {
2138 1.1 christos buffer_printf(packet, " TSIG verified with key %s",
2139 1.1 christos zone->master->key_options->name);
2140 1.1 christos }
2141 1.1 christos buffer_flip(packet);
2142 1.1 christos diff_write_commit(zone->apex_str, zone->msg_old_serial,
2143 1.1 christos zone->msg_new_serial, zone->msg_seq_nr, 1,
2144 1.1 christos (char*)buffer_begin(packet), xfrd->nsd, zone->xfrfilenumber);
2145 1.1 christos VERBOSITY(1, (LOG_INFO, "xfrd: zone %s committed \"%s\"",
2146 1.1 christos zone->apex_str, (char*)buffer_begin(packet)));
2147 1.1 christos /* reset msg seq nr, so if that is nonnull we know xfr file exists */
2148 1.1 christos zone->msg_seq_nr = 0;
2149 1.1 christos /* now put apply_xfr task on the tasklist */
2150 1.1 christos if(!task_new_apply_xfr(xfrd->nsd->task[xfrd->nsd->mytask],
2151 1.1 christos xfrd->last_task, zone->apex, zone->msg_old_serial,
2152 1.1 christos zone->msg_new_serial, zone->xfrfilenumber)) {
2153 1.1 christos /* delete the file and pretend transfer was bad to continue */
2154 1.1 christos xfrd_unlink_xfrfile(xfrd->nsd, zone->xfrfilenumber);
2155 1.1 christos xfrd_set_reload_timeout();
2156 1.1 christos return xfrd_packet_bad;
2157 1.1 christos }
2158 1.1 christos /* update the disk serial no. */
2159 1.1 christos zone->soa_disk_acquired = xfrd_time();
2160 1.1 christos zone->soa_disk = soa;
2161 1.1 christos if(zone->soa_notified_acquired && (
2162 1.1 christos zone->soa_notified.serial == 0 ||
2163 1.1 christos compare_serial(htonl(zone->soa_disk.serial),
2164 1.1 christos htonl(zone->soa_notified.serial)) >= 0))
2165 1.1 christos {
2166 1.1 christos zone->soa_notified_acquired = 0;
2167 1.1 christos }
2168 1.1 christos if(!zone->soa_notified_acquired) {
2169 1.1 christos /* do not set expired zone to ok:
2170 1.1 christos * it would cause nsd to start answering
2171 1.1 christos * bad data, since the zone is not loaded yet.
2172 1.1 christos * if nsd does not reload < retry time, more
2173 1.1 christos * queries (for even newer versions) are made.
2174 1.1 christos * For expired zone after reload it is set ok (SOAINFO ipc). */
2175 1.1 christos if(zone->state != xfrd_zone_expired)
2176 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_ok);
2177 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
2178 1.1 christos "xfrd: zone %s is waiting for reload",
2179 1.1 christos zone->apex_str));
2180 1.1 christos if(zone->zone_options->pattern->multi_master_check) {
2181 1.1 christos zone->multi_master_update_check = zone->master_num;
2182 1.1 christos xfrd_set_reload_timeout();
2183 1.1 christos return xfrd_packet_transfer;
2184 1.1 christos }
2185 1.1 christos zone->round_num = -1; /* next try start anew */
2186 1.1 christos xfrd_set_timer_refresh(zone);
2187 1.1 christos xfrd_set_reload_timeout();
2188 1.1 christos return xfrd_packet_transfer;
2189 1.1 christos } else {
2190 1.1 christos /* try to get an even newer serial */
2191 1.1 christos /* pretend it was bad to continue queries */
2192 1.1 christos xfrd_set_reload_timeout();
2193 1.1 christos return xfrd_packet_bad;
2194 1.1 christos }
2195 1.1 christos }
2196 1.1 christos
2197 1.1 christos static void
2198 1.1 christos xfrd_set_reload_timeout()
2199 1.1 christos {
2200 1.1 christos if(xfrd->nsd->options->xfrd_reload_timeout == -1)
2201 1.1 christos return; /* automatic reload disabled. */
2202 1.1 christos if(xfrd->reload_timeout.tv_sec == 0 ||
2203 1.1 christos xfrd_time() >= (time_t)xfrd->reload_timeout.tv_sec ) {
2204 1.1 christos /* no reload wait period (or it passed), do it right away */
2205 1.1 christos xfrd_set_reload_now(xfrd);
2206 1.1 christos /* start reload wait period */
2207 1.1 christos xfrd->reload_timeout.tv_sec = xfrd_time() +
2208 1.1 christos xfrd->nsd->options->xfrd_reload_timeout;
2209 1.1 christos xfrd->reload_timeout.tv_usec = 0;
2210 1.1 christos return;
2211 1.1 christos }
2212 1.1 christos /* cannot reload now, set that after the timeout a reload has to happen */
2213 1.1 christos if(xfrd->reload_added == 0) {
2214 1.1 christos struct timeval tv;
2215 1.1 christos tv.tv_sec = xfrd->reload_timeout.tv_sec - xfrd_time();
2216 1.1 christos tv.tv_usec = 0;
2217 1.1 christos if(tv.tv_sec > xfrd->nsd->options->xfrd_reload_timeout)
2218 1.1 christos tv.tv_sec = xfrd->nsd->options->xfrd_reload_timeout;
2219 1.1 christos event_set(&xfrd->reload_handler, -1, EV_TIMEOUT,
2220 1.1 christos xfrd_handle_reload, xfrd);
2221 1.1 christos if(event_base_set(xfrd->event_base, &xfrd->reload_handler) != 0)
2222 1.1 christos log_msg(LOG_ERR, "cannot set reload event base");
2223 1.1 christos if(event_add(&xfrd->reload_handler, &tv) != 0)
2224 1.1 christos log_msg(LOG_ERR, "cannot add reload event");
2225 1.1 christos xfrd->reload_added = 1;
2226 1.1 christos }
2227 1.1 christos }
2228 1.1 christos
2229 1.1 christos static void
2230 1.1 christos xfrd_handle_reload(int ATTR_UNUSED(fd), short event, void* ATTR_UNUSED(arg))
2231 1.1 christos {
2232 1.1 christos /* reload timeout */
2233 1.1 christos assert(event & EV_TIMEOUT);
2234 1.1 christos (void)event;
2235 1.1 christos /* timeout wait period after this request is sent */
2236 1.1 christos xfrd->reload_added = 0;
2237 1.1 christos xfrd->reload_timeout.tv_sec = xfrd_time() +
2238 1.1 christos xfrd->nsd->options->xfrd_reload_timeout;
2239 1.1 christos xfrd_set_reload_now(xfrd);
2240 1.1 christos }
2241 1.1 christos
2242 1.1 christos void
2243 1.1.1.2 christos xfrd_handle_notify_and_start_xfr(xfrd_zone_type* zone, xfrd_soa_type* soa)
2244 1.1 christos {
2245 1.1 christos if(xfrd_handle_incoming_notify(zone, soa)) {
2246 1.1 christos if(zone->zone_handler.ev_fd == -1 && zone->tcp_conn == -1 &&
2247 1.1 christos !zone->tcp_waiting && !zone->udp_waiting) {
2248 1.1 christos xfrd_set_refresh_now(zone);
2249 1.1 christos }
2250 1.1 christos /* zones with no content start expbackoff again; this is also
2251 1.1 christos * for nsd-control started transfer commands, and also when
2252 1.1 christos * the master apparently sends notifies (is back up) */
2253 1.1 christos if(zone->soa_disk_acquired == 0)
2254 1.1 christos zone->fresh_xfr_timeout = XFRD_TRANSFER_TIMEOUT_START;
2255 1.1 christos }
2256 1.1 christos }
2257 1.1 christos
2258 1.1 christos void
2259 1.1 christos xfrd_handle_passed_packet(buffer_type* packet,
2260 1.1 christos int acl_num, int acl_num_xfr)
2261 1.1 christos {
2262 1.1 christos uint8_t qnamebuf[MAXDOMAINLEN];
2263 1.1 christos uint16_t qtype, qclass;
2264 1.1 christos const dname_type* dname;
2265 1.1 christos region_type* tempregion = region_create(xalloc, free);
2266 1.1.1.2 christos xfrd_zone_type* zone;
2267 1.1 christos
2268 1.1 christos buffer_skip(packet, QHEADERSZ);
2269 1.1 christos if(!packet_read_query_section(packet, qnamebuf, &qtype, &qclass)) {
2270 1.1 christos region_destroy(tempregion);
2271 1.1 christos return; /* drop bad packet */
2272 1.1 christos }
2273 1.1 christos
2274 1.1 christos dname = dname_make(tempregion, qnamebuf, 1);
2275 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "xfrd: got passed packet for %s, acl "
2276 1.1 christos "%d", dname_to_string(dname,0), acl_num));
2277 1.1 christos
2278 1.1 christos /* find the zone */
2279 1.1.1.2 christos zone = (xfrd_zone_type*)rbtree_search(xfrd->zones, dname);
2280 1.1 christos if(!zone) {
2281 1.1 christos /* this could be because the zone has been deleted meanwhile */
2282 1.1 christos DEBUG(DEBUG_XFRD, 1, (LOG_INFO, "xfrd: incoming packet for "
2283 1.1 christos "unknown zone %s", dname_to_string(dname,0)));
2284 1.1 christos region_destroy(tempregion);
2285 1.1 christos return; /* drop packet for unknown zone */
2286 1.1 christos }
2287 1.1 christos region_destroy(tempregion);
2288 1.1 christos
2289 1.1 christos /* handle */
2290 1.1 christos if(OPCODE(packet) == OPCODE_NOTIFY) {
2291 1.1.1.2 christos xfrd_soa_type soa;
2292 1.1 christos int have_soa = 0;
2293 1.1 christos int next;
2294 1.1 christos /* get serial from a SOA */
2295 1.1 christos if(ANCOUNT(packet) == 1 && packet_skip_dname(packet) &&
2296 1.1 christos xfrd_parse_soa_info(packet, &soa)) {
2297 1.1 christos have_soa = 1;
2298 1.1 christos }
2299 1.1 christos xfrd_handle_notify_and_start_xfr(zone, have_soa?&soa:NULL);
2300 1.1 christos /* First, see if our notifier has a match in provide-xfr */
2301 1.1 christos if (acl_find_num(zone->zone_options->pattern->request_xfr,
2302 1.1 christos acl_num_xfr))
2303 1.1 christos next = acl_num_xfr;
2304 1.1 christos else /* If not, find master that matches notifiers ACL entry */
2305 1.1 christos next = find_same_master_notify(zone, acl_num);
2306 1.1 christos if(next != -1) {
2307 1.1 christos zone->next_master = next;
2308 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
2309 1.1 christos "xfrd: notify set next master to query %d",
2310 1.1 christos next));
2311 1.1 christos }
2312 1.1 christos }
2313 1.1 christos else {
2314 1.1 christos /* ignore other types of messages */
2315 1.1 christos }
2316 1.1 christos }
2317 1.1 christos
2318 1.1 christos static int
2319 1.1.1.2 christos xfrd_handle_incoming_notify(xfrd_zone_type* zone, xfrd_soa_type* soa)
2320 1.1 christos {
2321 1.1 christos if(soa && zone->soa_disk_acquired && zone->state != xfrd_zone_expired &&
2322 1.1 christos compare_serial(ntohl(soa->serial),ntohl(zone->soa_disk.serial)) <= 0)
2323 1.1 christos {
2324 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO,
2325 1.1 christos "xfrd: ignored notify %s %u old serial, zone valid "
2326 1.1 christos "(soa disk serial %u)", zone->apex_str,
2327 1.1 christos (unsigned)ntohl(soa->serial),
2328 1.1 christos (unsigned)ntohl(zone->soa_disk.serial)));
2329 1.1 christos return 0; /* ignore notify with old serial, we have a valid zone */
2330 1.1 christos }
2331 1.1 christos if(soa == 0) {
2332 1.1 christos zone->soa_notified.serial = 0;
2333 1.1 christos }
2334 1.1 christos else if (zone->soa_notified_acquired == 0 ||
2335 1.1 christos zone->soa_notified.serial == 0 ||
2336 1.1 christos compare_serial(ntohl(soa->serial),
2337 1.1 christos ntohl(zone->soa_notified.serial)) > 0)
2338 1.1 christos {
2339 1.1 christos zone->soa_notified = *soa;
2340 1.1 christos }
2341 1.1 christos zone->soa_notified_acquired = xfrd_time();
2342 1.1 christos if(zone->state == xfrd_zone_ok) {
2343 1.1 christos xfrd_set_zone_state(zone, xfrd_zone_refreshing);
2344 1.1 christos }
2345 1.1 christos /* transfer right away */
2346 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "Handle incoming notify for zone %s",
2347 1.1 christos zone->apex_str));
2348 1.1 christos return 1;
2349 1.1 christos }
2350 1.1 christos
2351 1.1 christos static int
2352 1.1.1.2 christos find_same_master_notify(xfrd_zone_type* zone, int acl_num_nfy)
2353 1.1 christos {
2354 1.1.1.2 christos struct acl_options* nfy_acl = acl_find_num(zone->zone_options->pattern->
2355 1.1 christos allow_notify, acl_num_nfy);
2356 1.1 christos int num = 0;
2357 1.1.1.2 christos struct acl_options* master = zone->zone_options->pattern->request_xfr;
2358 1.1 christos if(!nfy_acl)
2359 1.1 christos return -1;
2360 1.1 christos while(master)
2361 1.1 christos {
2362 1.1 christos if(acl_addr_matches_host(nfy_acl, master))
2363 1.1 christos return num;
2364 1.1 christos master = master->next;
2365 1.1 christos num++;
2366 1.1 christos }
2367 1.1 christos return -1;
2368 1.1 christos }
2369 1.1 christos
2370 1.1 christos void
2371 1.1 christos xfrd_check_failed_updates()
2372 1.1 christos {
2373 1.1 christos /* see if updates have not come through */
2374 1.1.1.2 christos xfrd_zone_type* zone;
2375 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
2376 1.1 christos {
2377 1.1 christos /* zone has a disk soa, and no nsd soa or a different nsd soa */
2378 1.1 christos if(zone->soa_disk_acquired != 0 &&
2379 1.1 christos (zone->soa_nsd_acquired == 0 ||
2380 1.1 christos zone->soa_disk.serial != zone->soa_nsd.serial))
2381 1.1 christos {
2382 1.1 christos if(zone->soa_disk_acquired <
2383 1.1 christos xfrd->reload_cmd_last_sent)
2384 1.1 christos {
2385 1.1 christos /* this zone should have been loaded, since its disk
2386 1.1 christos soa time is before the time of the reload cmd. */
2387 1.1.1.2 christos xfrd_soa_type dumped_soa = zone->soa_disk;
2388 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s: soa serial %u "
2389 1.1 christos "update failed, restarting "
2390 1.1 christos "transfer (notified zone)",
2391 1.1 christos zone->apex_str, (unsigned)ntohl(zone->soa_disk.serial));
2392 1.1 christos /* revert the soa; it has not been acquired properly */
2393 1.1 christos if(zone->soa_disk_acquired == zone->soa_nsd_acquired) {
2394 1.1 christos /* this was the same as served,
2395 1.1 christos * perform force_axfr , re-download
2396 1.1 christos * same serial from master */
2397 1.1 christos zone->soa_disk_acquired = 0;
2398 1.1 christos zone->soa_nsd_acquired = 0;
2399 1.1 christos } else {
2400 1.1 christos /* revert soa to the one in server */
2401 1.1 christos zone->soa_disk_acquired = zone->soa_nsd_acquired;
2402 1.1 christos zone->soa_disk = zone->soa_nsd;
2403 1.1 christos }
2404 1.1 christos /* pretend we are notified with disk soa.
2405 1.1 christos This will cause a refetch of the data, and reload. */
2406 1.1 christos xfrd_handle_incoming_notify(zone, &dumped_soa);
2407 1.1 christos xfrd_set_timer_refresh(zone);
2408 1.1 christos } else if(zone->soa_disk_acquired >= xfrd->reload_cmd_last_sent) {
2409 1.1 christos /* this zone still has to be loaded,
2410 1.1 christos make sure reload is set to be sent. */
2411 1.1 christos if(xfrd->need_to_send_reload == 0 &&
2412 1.1 christos xfrd->reload_added == 0) {
2413 1.1 christos log_msg(LOG_ERR, "xfrd: zone %s: needs "
2414 1.1 christos "to be loaded. reload lost? "
2415 1.1 christos "try again", zone->apex_str);
2416 1.1 christos xfrd_set_reload_timeout();
2417 1.1 christos }
2418 1.1 christos }
2419 1.1 christos }
2420 1.1 christos }
2421 1.1 christos }
2422 1.1 christos
2423 1.1 christos void
2424 1.1 christos xfrd_prepare_zones_for_reload()
2425 1.1 christos {
2426 1.1.1.2 christos xfrd_zone_type* zone;
2427 1.1.1.2 christos RBTREE_FOR(zone, xfrd_zone_type*, xfrd->zones)
2428 1.1 christos {
2429 1.1 christos /* zone has a disk soa, and no nsd soa or a different nsd soa */
2430 1.1 christos if(zone->soa_disk_acquired != 0 &&
2431 1.1 christos (zone->soa_nsd_acquired == 0 ||
2432 1.1 christos zone->soa_disk.serial != zone->soa_nsd.serial))
2433 1.1 christos {
2434 1.1 christos if(zone->soa_disk_acquired == xfrd_time()) {
2435 1.1 christos /* antedate by one second.
2436 1.1 christos * this makes sure that the zone time is before
2437 1.1 christos * reload, so that check_failed_zones() is
2438 1.1 christos * certain of the result.
2439 1.1 christos */
2440 1.1 christos zone->soa_disk_acquired--;
2441 1.1 christos }
2442 1.1 christos }
2443 1.1 christos }
2444 1.1 christos }
2445 1.1 christos
2446 1.1 christos struct buffer*
2447 1.1 christos xfrd_get_temp_buffer()
2448 1.1 christos {
2449 1.1 christos return xfrd->packet;
2450 1.1 christos }
2451 1.1 christos
2452 1.1 christos #ifdef BIND8_STATS
2453 1.1 christos /** process stat info task */
2454 1.1 christos static void
2455 1.1.1.2 christos xfrd_process_stat_info_task(xfrd_state_type* xfrd, struct task_list_d* task)
2456 1.1 christos {
2457 1.1 christos size_t i;
2458 1.1.1.2 christos stc_type* p = (void*)task->zname + sizeof(struct nsdst);
2459 1.1 christos stats_add(&xfrd->nsd->st, (struct nsdst*)task->zname);
2460 1.1 christos for(i=0; i<xfrd->nsd->child_count; i++) {
2461 1.1 christos xfrd->nsd->children[i].query_count += *p++;
2462 1.1 christos }
2463 1.1 christos /* got total, now see if users are interested in these statistics */
2464 1.1 christos #ifdef HAVE_SSL
2465 1.1 christos daemon_remote_process_stats(xfrd->nsd->rc);
2466 1.1 christos #endif
2467 1.1 christos }
2468 1.1 christos #endif /* BIND8_STATS */
2469 1.1 christos
2470 1.1 christos #ifdef USE_ZONE_STATS
2471 1.1 christos /** process zonestat inc task */
2472 1.1 christos static void
2473 1.1.1.2 christos xfrd_process_zonestat_inc_task(xfrd_state_type* xfrd, struct task_list_d* task)
2474 1.1 christos {
2475 1.1 christos xfrd->zonestat_safe = (unsigned)task->oldserial;
2476 1.1 christos zonestat_remap(xfrd->nsd, 0, xfrd->zonestat_safe*sizeof(struct nsdst));
2477 1.1 christos xfrd->nsd->zonestatsize[0] = xfrd->zonestat_safe;
2478 1.1 christos zonestat_remap(xfrd->nsd, 1, xfrd->zonestat_safe*sizeof(struct nsdst));
2479 1.1 christos xfrd->nsd->zonestatsize[1] = xfrd->zonestat_safe;
2480 1.1 christos }
2481 1.1 christos #endif /* USE_ZONE_STATS */
2482 1.1 christos
2483 1.1 christos static void
2484 1.1.1.2 christos xfrd_handle_taskresult(xfrd_state_type* xfrd, struct task_list_d* task)
2485 1.1 christos {
2486 1.1 christos #ifndef BIND8_STATS
2487 1.1 christos (void)xfrd;
2488 1.1 christos #endif
2489 1.1 christos switch(task->task_type) {
2490 1.1 christos case task_soa_info:
2491 1.1 christos xfrd_process_soa_info_task(task);
2492 1.1 christos break;
2493 1.1 christos #ifdef BIND8_STATS
2494 1.1 christos case task_stat_info:
2495 1.1 christos xfrd_process_stat_info_task(xfrd, task);
2496 1.1 christos break;
2497 1.1 christos #endif /* BIND8_STATS */
2498 1.1 christos #ifdef USE_ZONE_STATS
2499 1.1 christos case task_zonestat_inc:
2500 1.1 christos xfrd_process_zonestat_inc_task(xfrd, task);
2501 1.1 christos break;
2502 1.1 christos #endif
2503 1.1 christos default:
2504 1.1 christos log_msg(LOG_WARNING, "unhandled task result in xfrd from "
2505 1.1 christos "reload type %d", (int)task->task_type);
2506 1.1 christos }
2507 1.1 christos }
2508 1.1 christos
2509 1.1.1.2 christos void xfrd_process_task_result(xfrd_state_type* xfrd, struct udb_base* taskudb)
2510 1.1 christos {
2511 1.1 christos udb_ptr t;
2512 1.1 christos /* remap it for usage */
2513 1.1 christos task_remap(taskudb);
2514 1.1 christos /* process the task-results in the taskudb */
2515 1.1 christos udb_ptr_new(&t, taskudb, udb_base_get_userdata(taskudb));
2516 1.1 christos while(!udb_ptr_is_null(&t)) {
2517 1.1 christos xfrd_handle_taskresult(xfrd, TASKLIST(&t));
2518 1.1 christos udb_ptr_set_rptr(&t, taskudb, &TASKLIST(&t)->next);
2519 1.1 christos }
2520 1.1 christos udb_ptr_unlink(&t, taskudb);
2521 1.1 christos /* clear the udb so it can be used by xfrd to make new tasks for
2522 1.1 christos * reload, this happens when the reload signal is sent, and thus
2523 1.1 christos * the taskudbs are swapped */
2524 1.1 christos task_clear(taskudb);
2525 1.1.1.3 christos #ifdef HAVE_SYSTEMD
2526 1.1.1.4 prlw1 sd_notify(0, "READY=1");
2527 1.1.1.3 christos #endif
2528 1.1 christos }
2529 1.1 christos
2530 1.1.1.2 christos void xfrd_set_reload_now(xfrd_state_type* xfrd)
2531 1.1 christos {
2532 1.1.1.3 christos #ifdef HAVE_SYSTEMD
2533 1.1.1.4 prlw1 sd_notify(0, "RELOADING=1");
2534 1.1.1.3 christos #endif
2535 1.1 christos xfrd->need_to_send_reload = 1;
2536 1.1 christos if(!(xfrd->ipc_handler_flags&EV_WRITE)) {
2537 1.1 christos ipc_xfrd_set_listening(xfrd, EV_PERSIST|EV_READ|EV_WRITE);
2538 1.1 christos }
2539 1.1 christos }
2540 1.1 christos
2541 1.1 christos static void
2542 1.1 christos xfrd_handle_write_timer(int ATTR_UNUSED(fd), short event, void* ATTR_UNUSED(arg))
2543 1.1 christos {
2544 1.1 christos /* timeout for write events */
2545 1.1 christos assert(event & EV_TIMEOUT);
2546 1.1 christos (void)event;
2547 1.1 christos if(xfrd->nsd->options->zonefiles_write == 0)
2548 1.1 christos return;
2549 1.1 christos /* call reload to write changed zonefiles */
2550 1.1 christos if(!xfrd->write_zonefile_needed) {
2551 1.1 christos DEBUG(DEBUG_XFRD,2, (LOG_INFO, "zonefiles write timer (nothing)"));
2552 1.1 christos xfrd_write_timer_set();
2553 1.1 christos return;
2554 1.1 christos }
2555 1.1 christos DEBUG(DEBUG_XFRD,1, (LOG_INFO, "zonefiles write timer"));
2556 1.1 christos task_new_write_zonefiles(xfrd->nsd->task[xfrd->nsd->mytask],
2557 1.1 christos xfrd->last_task, NULL);
2558 1.1 christos xfrd_set_reload_now(xfrd);
2559 1.1 christos xfrd->write_zonefile_needed = 0;
2560 1.1 christos xfrd_write_timer_set();
2561 1.1 christos }
2562 1.1 christos
2563 1.1 christos static void xfrd_write_timer_set()
2564 1.1 christos {
2565 1.1 christos struct timeval tv;
2566 1.1 christos if(xfrd->nsd->options->zonefiles_write == 0)
2567 1.1 christos return;
2568 1.1 christos tv.tv_sec = xfrd->nsd->options->zonefiles_write;
2569 1.1 christos tv.tv_usec = 0;
2570 1.1 christos event_set(&xfrd->write_timer, -1, EV_TIMEOUT,
2571 1.1 christos xfrd_handle_write_timer, xfrd);
2572 1.1 christos if(event_base_set(xfrd->event_base, &xfrd->write_timer) != 0)
2573 1.1 christos log_msg(LOG_ERR, "xfrd write timer: event_base_set failed");
2574 1.1 christos if(event_add(&xfrd->write_timer, &tv) != 0)
2575 1.1 christos log_msg(LOG_ERR, "xfrd write timer: event_add failed");
2576 1.1 christos }
2577 1.1 christos
2578 1.1 christos static void xfrd_handle_child_timer(int ATTR_UNUSED(fd), short event,
2579 1.1 christos void* ATTR_UNUSED(arg))
2580 1.1 christos {
2581 1.1 christos assert(event & EV_TIMEOUT);
2582 1.1 christos (void)event;
2583 1.1 christos /* only used to wakeup the process to reap children, note the
2584 1.1 christos * event is no longer registered */
2585 1.1 christos xfrd->child_timer_added = 0;
2586 1.1 christos }
2587