Home | History | Annotate | Line # | Download | only in daemon
remote.c revision 1.1.1.10
      1 /*
      2  * daemon/remote.c - remote control for the unbound daemon.
      3  *
      4  * Copyright (c) 2008, NLnet Labs. All rights reserved.
      5  *
      6  * This software is open source.
      7  *
      8  * Redistribution and use in source and binary forms, with or without
      9  * modification, are permitted provided that the following conditions
     10  * are met:
     11  *
     12  * Redistributions of source code must retain the above copyright notice,
     13  * this list of conditions and the following disclaimer.
     14  *
     15  * Redistributions in binary form must reproduce the above copyright notice,
     16  * this list of conditions and the following disclaimer in the documentation
     17  * and/or other materials provided with the distribution.
     18  *
     19  * Neither the name of the NLNET LABS nor the names of its contributors may
     20  * be used to endorse or promote products derived from this software without
     21  * specific prior written permission.
     22  *
     23  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
     24  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
     25  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
     26  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
     27  * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
     28  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
     29  * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
     30  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
     31  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
     32  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
     33  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     34  */
     35 
     36 /**
     37  * \file
     38  *
     39  * This file contains the remote control functionality for the daemon.
     40  * The remote control can be performed using either the commandline
     41  * unbound-control tool, or a TLS capable web browser.
     42  * The channel is secured using TLSv1, and certificates.
     43  * Both the server and the client(control tool) have their own keys.
     44  */
     45 #include "config.h"
     46 #ifdef HAVE_OPENSSL_ERR_H
     47 #include <openssl/err.h>
     48 #endif
     49 #ifdef HAVE_OPENSSL_DH_H
     50 #include <openssl/dh.h>
     51 #endif
     52 #ifdef HAVE_OPENSSL_BN_H
     53 #include <openssl/bn.h>
     54 #endif
     55 #ifdef HAVE_STDATOMIC_H
     56 #include <stdatomic.h>
     57 #endif
     58 
     59 #include <ctype.h>
     60 #include "daemon/remote.h"
     61 #include "daemon/worker.h"
     62 #include "daemon/daemon.h"
     63 #include "daemon/stats.h"
     64 #include "daemon/cachedump.h"
     65 #include "util/log.h"
     66 #include "util/config_file.h"
     67 #include "util/net_help.h"
     68 #include "util/module.h"
     69 #include "util/ub_event.h"
     70 #include "services/listen_dnsport.h"
     71 #include "services/cache/rrset.h"
     72 #include "services/cache/infra.h"
     73 #include "services/mesh.h"
     74 #include "services/localzone.h"
     75 #include "services/authzone.h"
     76 #include "services/rpz.h"
     77 #include "util/storage/slabhash.h"
     78 #include "util/fptr_wlist.h"
     79 #include "util/data/dname.h"
     80 #include "validator/validator.h"
     81 #include "validator/val_kcache.h"
     82 #include "validator/val_kentry.h"
     83 #include "validator/val_anchor.h"
     84 #include "validator/val_neg.h"
     85 #include "iterator/iterator.h"
     86 #include "iterator/iter_fwd.h"
     87 #include "iterator/iter_hints.h"
     88 #include "iterator/iter_delegpt.h"
     89 #include "iterator/iter_utils.h"
     90 #include "iterator/iter_donotq.h"
     91 #include "iterator/iter_priv.h"
     92 #include "services/outbound_list.h"
     93 #include "services/outside_network.h"
     94 #include "sldns/str2wire.h"
     95 #include "sldns/parseutil.h"
     96 #include "sldns/wire2str.h"
     97 #include "sldns/sbuffer.h"
     98 #include "util/timeval_func.h"
     99 #include "util/tcp_conn_limit.h"
    100 #include "util/edns.h"
    101 #ifdef USE_CACHEDB
    102 #include "cachedb/cachedb.h"
    103 #endif
    104 #ifdef CLIENT_SUBNET
    105 #include "edns-subnet/subnetmod.h"
    106 #include "edns-subnet/addrtree.h"
    107 #endif
    108 
    109 #ifdef HAVE_SYS_TYPES_H
    110 #  include <sys/types.h>
    111 #endif
    112 #ifdef HAVE_SYS_STAT_H
    113 #include <sys/stat.h>
    114 #endif
    115 #ifdef HAVE_NETDB_H
    116 #include <netdb.h>
    117 #endif
    118 #ifdef HAVE_POLL_H
    119 #include <poll.h>
    120 #endif
    121 
    122 /* just for portability */
    123 #ifdef SQ
    124 #undef SQ
    125 #endif
    126 
    127 /** what to put on statistics lines between var and value, ": " or "=" */
    128 #define SQ "="
    129 
    130 /** Acceptable lengths of str lines */
    131 #define MAX_CMD_STRLINE 1024
    132 #define MAX_STDIN_STRLINE 2048
    133 /** What number of loop iterations is too much for ipc retries */
    134 #define IPC_LOOP_MAX 200
    135 /** Timeout in msec for ipc socket poll. */
    136 #define IPC_NOTIFICATION_WAIT 200
    137 
    138 static void fr_printq_delete(struct fast_reload_printq* printq);
    139 static void fr_main_perform_printout(struct fast_reload_thread* fr);
    140 static int fr_printq_empty(struct fast_reload_printq* printq);
    141 static void fr_printq_list_insert(struct fast_reload_printq* printq,
    142 	struct daemon* daemon);
    143 static void fr_printq_remove(struct fast_reload_printq* printq);
    144 static void fr_check_cmd_from_thread(struct fast_reload_thread* fr);
    145 
    146 static int
    147 remote_setup_ctx(struct daemon_remote* rc, struct config_file* cfg)
    148 {
    149 	char* s_cert;
    150 	char* s_key;
    151 	rc->ctx = SSL_CTX_new(SSLv23_server_method());
    152 	if(!rc->ctx) {
    153 		log_crypto_err("could not SSL_CTX_new");
    154 		return 0;
    155 	}
    156 	if(!listen_sslctx_setup(rc->ctx)) {
    157 		return 0;
    158 	}
    159 
    160 	s_cert = fname_after_chroot(cfg->server_cert_file, cfg, 1);
    161 	s_key = fname_after_chroot(cfg->server_key_file, cfg, 1);
    162 	if(!s_cert || !s_key) {
    163 		log_err("out of memory in remote control fname");
    164 		goto setup_error;
    165 	}
    166 	verbose(VERB_ALGO, "setup SSL certificates");
    167 	if (!SSL_CTX_use_certificate_chain_file(rc->ctx,s_cert)) {
    168 		log_err("Error for server-cert-file: %s", s_cert);
    169 		log_crypto_err("Error in SSL_CTX use_certificate_chain_file");
    170 		goto setup_error;
    171 	}
    172 	if(!SSL_CTX_use_PrivateKey_file(rc->ctx,s_key,SSL_FILETYPE_PEM)) {
    173 		log_err("Error for server-key-file: %s", s_key);
    174 		log_crypto_err("Error in SSL_CTX use_PrivateKey_file");
    175 		goto setup_error;
    176 	}
    177 	if(!SSL_CTX_check_private_key(rc->ctx)) {
    178 		log_err("Error for server-key-file: %s", s_key);
    179 		log_crypto_err("Error in SSL_CTX check_private_key");
    180 		goto setup_error;
    181 	}
    182 	listen_sslctx_setup_2(rc->ctx);
    183 	if(!SSL_CTX_load_verify_locations(rc->ctx, s_cert, NULL)) {
    184 		log_crypto_err("Error setting up SSL_CTX verify locations");
    185 	setup_error:
    186 		free(s_cert);
    187 		free(s_key);
    188 		return 0;
    189 	}
    190 	SSL_CTX_set_client_CA_list(rc->ctx, SSL_load_client_CA_file(s_cert));
    191 	SSL_CTX_set_verify(rc->ctx, SSL_VERIFY_PEER, NULL);
    192 	free(s_cert);
    193 	free(s_key);
    194 	return 1;
    195 }
    196 
    197 struct daemon_remote*
    198 daemon_remote_create(struct config_file* cfg)
    199 {
    200 	struct daemon_remote* rc = (struct daemon_remote*)calloc(1,
    201 		sizeof(*rc));
    202 	if(!rc) {
    203 		log_err("out of memory in daemon_remote_create");
    204 		return NULL;
    205 	}
    206 	rc->max_active = 10;
    207 
    208 	if(!cfg->remote_control_enable) {
    209 		rc->ctx = NULL;
    210 		return rc;
    211 	}
    212 	if(options_remote_is_address(cfg) && cfg->control_use_cert) {
    213 		if(!remote_setup_ctx(rc, cfg)) {
    214 			daemon_remote_delete(rc);
    215 			return NULL;
    216 		}
    217 		rc->use_cert = 1;
    218 	} else {
    219 		struct config_strlist* p;
    220 		rc->ctx = NULL;
    221 		rc->use_cert = 0;
    222 		if(!options_remote_is_address(cfg))
    223 		  for(p = cfg->control_ifs.first; p; p = p->next) {
    224 			if(p->str && p->str[0] != '/')
    225 				log_warn("control-interface %s is not using TLS, but plain transfer, because first control-interface in config file is a local socket (starts with a /).", p->str);
    226 		}
    227 	}
    228 	return rc;
    229 }
    230 
    231 void daemon_remote_clear(struct daemon_remote* rc)
    232 {
    233 	struct rc_state* p, *np;
    234 	if(!rc) return;
    235 	/* but do not close the ports */
    236 	listen_list_delete(rc->accept_list);
    237 	rc->accept_list = NULL;
    238 	/* do close these sockets */
    239 	p = rc->busy_list;
    240 	while(p) {
    241 		np = p->next;
    242 		if(p->ssl)
    243 			SSL_free(p->ssl);
    244 		comm_point_delete(p->c);
    245 		free(p);
    246 		p = np;
    247 	}
    248 	rc->busy_list = NULL;
    249 	rc->active = 0;
    250 	rc->worker = NULL;
    251 }
    252 
    253 void daemon_remote_delete(struct daemon_remote* rc)
    254 {
    255 	if(!rc) return;
    256 	daemon_remote_clear(rc);
    257 	if(rc->ctx) {
    258 		SSL_CTX_free(rc->ctx);
    259 	}
    260 	free(rc);
    261 }
    262 
    263 /**
    264  * Add and open a new control port
    265  * @param ip: ip str
    266  * @param nr: port nr
    267  * @param list: list head
    268  * @param noproto_is_err: if lack of protocol support is an error.
    269  * @param cfg: config with username for chown of unix-sockets.
    270  * @return false on failure.
    271  */
    272 static int
    273 add_open(const char* ip, int nr, struct listen_port** list, int noproto_is_err,
    274 	struct config_file* cfg)
    275 {
    276 	struct addrinfo hints;
    277 	struct addrinfo* res;
    278 	struct listen_port* n;
    279 	int noproto = 0;
    280 	int fd, r;
    281 	char port[15];
    282 	snprintf(port, sizeof(port), "%d", nr);
    283 	port[sizeof(port)-1]=0;
    284 	memset(&hints, 0, sizeof(hints));
    285 	log_assert(ip);
    286 
    287 	if(ip[0] == '/') {
    288 		/* This looks like a local socket */
    289 		fd = create_local_accept_sock(ip, &noproto, cfg->use_systemd);
    290 		/*
    291 		 * Change socket ownership and permissions so users other
    292 		 * than root can access it provided they are in the same
    293 		 * group as the user we run as.
    294 		 */
    295 		if(fd != -1) {
    296 #ifdef HAVE_CHOWN
    297 			chmod(ip, (mode_t)(S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP));
    298 			if (cfg->username && cfg->username[0] &&
    299 				cfg_uid != (uid_t)-1) {
    300 				if(chown(ip, cfg_uid, cfg_gid) == -1)
    301 					verbose(VERB_QUERY, "cannot chown %u.%u %s: %s",
    302 					  (unsigned)cfg_uid, (unsigned)cfg_gid,
    303 					  ip, strerror(errno));
    304 			}
    305 #else
    306 			(void)cfg;
    307 #endif
    308 		}
    309 	} else {
    310 		hints.ai_socktype = SOCK_STREAM;
    311 		hints.ai_flags = AI_PASSIVE | AI_NUMERICHOST;
    312 		if((r = getaddrinfo(ip, port, &hints, &res)) != 0 || !res) {
    313 #ifdef USE_WINSOCK
    314 			if(!noproto_is_err && r == EAI_NONAME) {
    315 				/* tried to lookup the address as name */
    316 				return 1; /* return success, but do nothing */
    317 			}
    318 #endif /* USE_WINSOCK */
    319 			log_err("control interface %s:%s getaddrinfo: %s %s",
    320 				ip?ip:"default", port, gai_strerror(r),
    321 #ifdef EAI_SYSTEM
    322 				r==EAI_SYSTEM?(char*)strerror(errno):""
    323 #else
    324 				""
    325 #endif
    326 			);
    327 			return 0;
    328 		}
    329 
    330 		/* open fd */
    331 		fd = create_tcp_accept_sock(res, 1, &noproto, 0,
    332 			cfg->ip_transparent, 0, 0, cfg->ip_freebind,
    333 			cfg->use_systemd, cfg->ip_dscp, "unbound-control");
    334 		freeaddrinfo(res);
    335 	}
    336 
    337 	if(fd == -1 && noproto) {
    338 		if(!noproto_is_err)
    339 			return 1; /* return success, but do nothing */
    340 		log_err("cannot open control interface %s %d : "
    341 			"protocol not supported", ip, nr);
    342 		return 0;
    343 	}
    344 	if(fd == -1) {
    345 		log_err("cannot open control interface %s %d", ip, nr);
    346 		return 0;
    347 	}
    348 
    349 	/* alloc */
    350 	n = (struct listen_port*)calloc(1, sizeof(*n));
    351 	if(!n) {
    352 		sock_close(fd);
    353 		log_err("out of memory");
    354 		return 0;
    355 	}
    356 	n->next = *list;
    357 	*list = n;
    358 	n->fd = fd;
    359 	return 1;
    360 }
    361 
    362 struct listen_port* daemon_remote_open_ports(struct config_file* cfg)
    363 {
    364 	struct listen_port* l = NULL;
    365 	log_assert(cfg->remote_control_enable && cfg->control_port);
    366 	if(cfg->control_ifs.first) {
    367 		char** rcif = NULL;
    368 		int i, num_rcif = 0;
    369 		if(!resolve_interface_names(NULL, 0, cfg->control_ifs.first,
    370 			&rcif, &num_rcif)) {
    371 			return NULL;
    372 		}
    373 		for(i=0; i<num_rcif; i++) {
    374 			if(!add_open(rcif[i], cfg->control_port, &l, 1, cfg)) {
    375 				listening_ports_free(l);
    376 				config_del_strarray(rcif, num_rcif);
    377 				return NULL;
    378 			}
    379 		}
    380 		config_del_strarray(rcif, num_rcif);
    381 	} else {
    382 		/* defaults */
    383 		if(cfg->do_ip6 &&
    384 			!add_open("::1", cfg->control_port, &l, 0, cfg)) {
    385 			listening_ports_free(l);
    386 			return NULL;
    387 		}
    388 		if(cfg->do_ip4 &&
    389 			!add_open("127.0.0.1", cfg->control_port, &l, 1, cfg)) {
    390 			listening_ports_free(l);
    391 			return NULL;
    392 		}
    393 	}
    394 	return l;
    395 }
    396 
    397 /** open accept commpoint */
    398 static int
    399 accept_open(struct daemon_remote* rc, int fd)
    400 {
    401 	struct listen_list* n = (struct listen_list*)malloc(sizeof(*n));
    402 	if(!n) {
    403 		log_err("out of memory");
    404 		return 0;
    405 	}
    406 	n->next = rc->accept_list;
    407 	rc->accept_list = n;
    408 	/* open commpt */
    409 	n->com = comm_point_create_raw(rc->worker->base, fd, 0,
    410 		&remote_accept_callback, rc);
    411 	if(!n->com)
    412 		return 0;
    413 	/* keep this port open, its fd is kept in the rc portlist */
    414 	n->com->do_not_close = 1;
    415 	return 1;
    416 }
    417 
    418 int daemon_remote_open_accept(struct daemon_remote* rc,
    419 	struct listen_port* ports, struct worker* worker)
    420 {
    421 	struct listen_port* p;
    422 	rc->worker = worker;
    423 	for(p = ports; p; p = p->next) {
    424 		if(!accept_open(rc, p->fd)) {
    425 			log_err("could not create accept comm point");
    426 			return 0;
    427 		}
    428 	}
    429 	return 1;
    430 }
    431 
    432 void daemon_remote_stop_accept(struct daemon_remote* rc)
    433 {
    434 	struct listen_list* p;
    435 	for(p=rc->accept_list; p; p=p->next) {
    436 		comm_point_stop_listening(p->com);
    437 	}
    438 }
    439 
    440 void daemon_remote_start_accept(struct daemon_remote* rc)
    441 {
    442 	struct listen_list* p;
    443 	for(p=rc->accept_list; p; p=p->next) {
    444 		comm_point_start_listening(p->com, -1, -1);
    445 	}
    446 }
    447 
    448 int remote_accept_callback(struct comm_point* c, void* arg, int err,
    449 	struct comm_reply* ATTR_UNUSED(rep))
    450 {
    451 	struct daemon_remote* rc = (struct daemon_remote*)arg;
    452 	struct sockaddr_storage addr;
    453 	socklen_t addrlen;
    454 	int newfd;
    455 	struct rc_state* n;
    456 	if(err != NETEVENT_NOERROR) {
    457 		log_err("error %d on remote_accept_callback", err);
    458 		return 0;
    459 	}
    460 	/* perform the accept */
    461 	newfd = comm_point_perform_accept(c, &addr, &addrlen);
    462 	if(newfd == -1)
    463 		return 0;
    464 	/* create new commpoint unless we are servicing already */
    465 	if(rc->active >= rc->max_active) {
    466 		log_warn("drop incoming remote control: too many connections");
    467 	close_exit:
    468 		sock_close(newfd);
    469 		return 0;
    470 	}
    471 
    472 	/* setup commpoint to service the remote control command */
    473 	n = (struct rc_state*)calloc(1, sizeof(*n));
    474 	if(!n) {
    475 		log_err("out of memory");
    476 		goto close_exit;
    477 	}
    478 	n->fd = newfd;
    479 	/* start in reading state */
    480 	n->c = comm_point_create_raw(rc->worker->base, newfd, 0,
    481 		&remote_control_callback, n);
    482 	if(!n->c) {
    483 		log_err("out of memory");
    484 		free(n);
    485 		goto close_exit;
    486 	}
    487 	log_addr(VERB_QUERY, "new control connection from", &addr, addrlen);
    488 	n->c->do_not_close = 0;
    489 	comm_point_stop_listening(n->c);
    490 	comm_point_start_listening(n->c, -1, REMOTE_CONTROL_TCP_TIMEOUT);
    491 	memcpy(&n->c->repinfo.remote_addr, &addr, addrlen);
    492 	n->c->repinfo.remote_addrlen = addrlen;
    493 	if(rc->use_cert) {
    494 		n->shake_state = rc_hs_read;
    495 		n->ssl = SSL_new(rc->ctx);
    496 		if(!n->ssl) {
    497 			log_crypto_err("could not SSL_new");
    498 			comm_point_delete(n->c);
    499 			free(n);
    500 			goto close_exit;
    501 		}
    502 		SSL_set_accept_state(n->ssl);
    503 		(void)SSL_set_mode(n->ssl, (long)SSL_MODE_AUTO_RETRY);
    504 		if(!SSL_set_fd(n->ssl, newfd)) {
    505 			log_crypto_err("could not SSL_set_fd");
    506 			SSL_free(n->ssl);
    507 			comm_point_delete(n->c);
    508 			free(n);
    509 			goto close_exit;
    510 		}
    511 	} else {
    512 		n->ssl = NULL;
    513 	}
    514 
    515 	n->rc = rc;
    516 	n->next = rc->busy_list;
    517 	rc->busy_list = n;
    518 	rc->active ++;
    519 
    520 	/* perform the first nonblocking read already, for windows,
    521 	 * so it can return wouldblock. could be faster too. */
    522 	(void)remote_control_callback(n->c, n, NETEVENT_NOERROR, NULL);
    523 	return 0;
    524 }
    525 
    526 /** delete from list */
    527 static void
    528 state_list_remove_elem(struct rc_state** list, struct comm_point* c)
    529 {
    530 	while(*list) {
    531 		if( (*list)->c == c) {
    532 			*list = (*list)->next;
    533 			return;
    534 		}
    535 		list = &(*list)->next;
    536 	}
    537 }
    538 
    539 /** decrease active count and remove commpoint from busy list */
    540 static void
    541 clean_point(struct daemon_remote* rc, struct rc_state* s)
    542 {
    543 	if(!s->rc) {
    544 		/* the state has been picked up and moved away */
    545 		free(s);
    546 		return;
    547 	}
    548 	state_list_remove_elem(&rc->busy_list, s->c);
    549 	rc->active --;
    550 	if(s->ssl) {
    551 		SSL_shutdown(s->ssl);
    552 		SSL_free(s->ssl);
    553 	}
    554 	comm_point_delete(s->c);
    555 	free(s);
    556 }
    557 
    558 int
    559 ssl_print_text(RES* res, const char* text)
    560 {
    561 	int r;
    562 	if(!res)
    563 		return 0;
    564 	if(res->ssl) {
    565 		ERR_clear_error();
    566 		if((r=SSL_write(res->ssl, text, (int)strlen(text))) <= 0) {
    567 			int r2;
    568 			if((r2=SSL_get_error(res->ssl, r)) == SSL_ERROR_ZERO_RETURN) {
    569 				verbose(VERB_QUERY, "warning, in SSL_write, peer "
    570 					"closed connection");
    571 				return 0;
    572 			}
    573 			log_crypto_err_io("could not SSL_write", r2);
    574 			return 0;
    575 		}
    576 	} else {
    577 		size_t at = 0;
    578 		while(at < strlen(text)) {
    579 			ssize_t r = send(res->fd, text+at, strlen(text)-at, 0);
    580 			if(r == -1) {
    581 				if(errno == EAGAIN || errno == EINTR)
    582 					continue;
    583 				log_err("could not send: %s",
    584 					sock_strerror(errno));
    585 				return 0;
    586 			}
    587 			at += r;
    588 		}
    589 	}
    590 	return 1;
    591 }
    592 
    593 /** print text over the ssl connection */
    594 static int
    595 ssl_print_vmsg(RES* ssl, const char* format, va_list args)
    596 {
    597 	char msg[65535];
    598 	vsnprintf(msg, sizeof(msg), format, args);
    599 	return ssl_print_text(ssl, msg);
    600 }
    601 
    602 /** printf style printing to the ssl connection */
    603 int ssl_printf(RES* ssl, const char* format, ...)
    604 {
    605 	va_list args;
    606 	int ret;
    607 	va_start(args, format);
    608 	ret = ssl_print_vmsg(ssl, format, args);
    609 	va_end(args);
    610 	return ret;
    611 }
    612 
    613 int
    614 ssl_read_line(RES* res, char* buf, size_t max)
    615 {
    616 	int r;
    617 	size_t len = 0;
    618 	if(!res)
    619 		return 0;
    620 	while(len < max) {
    621 		if(res->ssl) {
    622 			ERR_clear_error();
    623 			if((r=SSL_read(res->ssl, buf+len, 1)) <= 0) {
    624 				int r2;
    625 				if((r2=SSL_get_error(res->ssl, r)) == SSL_ERROR_ZERO_RETURN) {
    626 					buf[len] = 0;
    627 					return 1;
    628 				}
    629 				log_crypto_err_io("could not SSL_read", r2);
    630 				return 0;
    631 			}
    632 		} else {
    633 			while(1) {
    634 				ssize_t rr = recv(res->fd, buf+len, 1, 0);
    635 				if(rr <= 0) {
    636 					if(rr == 0) {
    637 						buf[len] = 0;
    638 						return 1;
    639 					}
    640 					if(errno == EINTR || errno == EAGAIN)
    641 						continue;
    642 					if(rr < 0) log_err("could not recv: %s",
    643 						sock_strerror(errno));
    644 					return 0;
    645 				}
    646 				break;
    647 			}
    648 		}
    649 		if(buf[len] == '\n') {
    650 			/* return string without \n */
    651 			buf[len] = 0;
    652 			return 1;
    653 		}
    654 		len++;
    655 	}
    656 	buf[max-1] = 0;
    657 	log_err("control line too long (%d): %s", (int)max, buf);
    658 	return 0;
    659 }
    660 
    661 /** skip whitespace, return new pointer into string */
    662 static char*
    663 skipwhite(char* str)
    664 {
    665 	/* EOS \0 is not a space */
    666 	while( isspace((unsigned char)*str) )
    667 		str++;
    668 	return str;
    669 }
    670 
    671 /** send the OK to the control client */
    672 static void send_ok(RES* ssl)
    673 {
    674 	(void)ssl_printf(ssl, "ok\n");
    675 }
    676 
    677 /** tell other processes to execute the command */
    678 static void
    679 distribute_cmd(struct daemon_remote* rc, RES* ssl, char* cmd)
    680 {
    681 	int i;
    682 	if(!cmd || !ssl)
    683 		return;
    684 	/* skip i=0 which is me */
    685 	for(i=1; i<rc->worker->daemon->num; i++) {
    686 		worker_send_cmd(rc->worker->daemon->workers[i],
    687 			worker_cmd_remote);
    688 		if(!tube_write_msg(rc->worker->daemon->workers[i]->cmd,
    689 			(uint8_t*)cmd, strlen(cmd)+1, 0)) {
    690 			(void)ssl_printf(ssl, "error could not distribute cmd\n");
    691 			return;
    692 		}
    693 	}
    694 }
    695 
    696 /** do the stop command */
    697 static void
    698 do_stop(RES* ssl, struct worker* worker)
    699 {
    700 	worker->need_to_exit = 1;
    701 	comm_base_exit(worker->base);
    702 	send_ok(ssl);
    703 }
    704 
    705 /** do the reload command */
    706 static void
    707 do_reload(RES* ssl, struct worker* worker, int reuse_cache)
    708 {
    709 	worker->reuse_cache = reuse_cache;
    710 	worker->need_to_exit = 0;
    711 	comm_base_exit(worker->base);
    712 	send_ok(ssl);
    713 }
    714 
    715 #ifndef THREADS_DISABLED
    716 /** parse fast reload command options. */
    717 static int
    718 fr_parse_options(RES* ssl, char* arg, int* fr_verb, int* fr_nopause,
    719 	int* fr_drop_mesh)
    720 {
    721 	char* argp = arg;
    722 	while(*argp=='+') {
    723 		argp++;
    724 		while(*argp!=0 && *argp!=' ' && *argp!='\t') {
    725 			if(*argp == 'v') {
    726 				(*fr_verb)++;
    727 			} else if(*argp == 'p') {
    728 				(*fr_nopause) = 1;
    729 			} else if(*argp == 'd') {
    730 				(*fr_drop_mesh) = 1;
    731 			} else {
    732 				if(!ssl_printf(ssl,
    733 					"error: unknown option '+%c'\n",
    734 					*argp))
    735 					return 0;
    736 				return 0;
    737 			}
    738 			argp++;
    739 		}
    740 		argp = skipwhite(argp);
    741 	}
    742 	if(*argp!=0) {
    743 		if(!ssl_printf(ssl, "error: unknown option '%s'\n", argp))
    744 			return 0;
    745 		return 0;
    746 	}
    747 	return 1;
    748 }
    749 #endif /* !THREADS_DISABLED */
    750 
    751 /** do the fast_reload command */
    752 static void
    753 do_fast_reload(RES* ssl, struct worker* worker, struct rc_state* s, char* arg)
    754 {
    755 #ifdef THREADS_DISABLED
    756 	if(!ssl_printf(ssl, "error: no threads for fast_reload, compiled without threads.\n"))
    757 		return;
    758 	(void)worker;
    759 	(void)s;
    760 	(void)arg;
    761 #else
    762 	int fr_verb = 0, fr_nopause = 0, fr_drop_mesh = 0;
    763 	if(!fr_parse_options(ssl, arg, &fr_verb, &fr_nopause, &fr_drop_mesh))
    764 		return;
    765 	if(fr_verb >= 1) {
    766 		if(!ssl_printf(ssl, "start fast_reload\n"))
    767 			return;
    768 	}
    769 	fast_reload_thread_start(ssl, worker, s, fr_verb, fr_nopause,
    770 		fr_drop_mesh);
    771 #endif
    772 }
    773 
    774 /** do the verbosity command */
    775 static void
    776 do_verbosity(RES* ssl, char* str)
    777 {
    778 	int val = atoi(str);
    779 	if(val == 0 && strcmp(str, "0") != 0) {
    780 		ssl_printf(ssl, "error in verbosity number syntax: %s\n", str);
    781 		return;
    782 	}
    783 	verbosity = val;
    784 	send_ok(ssl);
    785 }
    786 
    787 /** print stats from statinfo */
    788 static int
    789 print_stats(RES* ssl, const char* nm, struct ub_stats_info* s)
    790 {
    791 	struct timeval sumwait, avg;
    792 	if(!ssl_printf(ssl, "%s.num.queries"SQ"%lu\n", nm,
    793 		(unsigned long)s->svr.num_queries)) return 0;
    794 	if(!ssl_printf(ssl, "%s.num.queries_ip_ratelimited"SQ"%lu\n", nm,
    795 		(unsigned long)s->svr.num_queries_ip_ratelimited)) return 0;
    796 	if(!ssl_printf(ssl, "%s.num.queries_cookie_valid"SQ"%lu\n", nm,
    797 		(unsigned long)s->svr.num_queries_cookie_valid)) return 0;
    798 	if(!ssl_printf(ssl, "%s.num.queries_cookie_client"SQ"%lu\n", nm,
    799 		(unsigned long)s->svr.num_queries_cookie_client)) return 0;
    800 	if(!ssl_printf(ssl, "%s.num.queries_cookie_invalid"SQ"%lu\n", nm,
    801 		(unsigned long)s->svr.num_queries_cookie_invalid)) return 0;
    802 	if(!ssl_printf(ssl, "%s.num.queries_discard_timeout"SQ"%lu\n", nm,
    803 		(unsigned long)s->svr.num_queries_discard_timeout)) return 0;
    804 	if(!ssl_printf(ssl, "%s.num.queries_wait_limit"SQ"%lu\n", nm,
    805 		(unsigned long)s->svr.num_queries_wait_limit)) return 0;
    806 	if(!ssl_printf(ssl, "%s.num.cachehits"SQ"%lu\n", nm,
    807 		(unsigned long)(s->svr.num_queries
    808 			- s->svr.num_queries_missed_cache))) return 0;
    809 	if(!ssl_printf(ssl, "%s.num.cachemiss"SQ"%lu\n", nm,
    810 		(unsigned long)s->svr.num_queries_missed_cache)) return 0;
    811 	if(!ssl_printf(ssl, "%s.num.prefetch"SQ"%lu\n", nm,
    812 		(unsigned long)s->svr.num_queries_prefetch)) return 0;
    813 	if(!ssl_printf(ssl, "%s.num.queries_timed_out"SQ"%lu\n", nm,
    814 		(unsigned long)s->svr.num_queries_timed_out)) return 0;
    815 	if(!ssl_printf(ssl, "%s.query.queue_time_us.max"SQ"%lu\n", nm,
    816 		(unsigned long)s->svr.max_query_time_us)) return 0;
    817 	if(!ssl_printf(ssl, "%s.num.expired"SQ"%lu\n", nm,
    818 		(unsigned long)s->svr.ans_expired)) return 0;
    819 	if(!ssl_printf(ssl, "%s.num.recursivereplies"SQ"%lu\n", nm,
    820 		(unsigned long)s->mesh_replies_sent)) return 0;
    821 #ifdef USE_DNSCRYPT
    822 	if(!ssl_printf(ssl, "%s.num.dnscrypt.crypted"SQ"%lu\n", nm,
    823 		(unsigned long)s->svr.num_query_dnscrypt_crypted)) return 0;
    824 	if(!ssl_printf(ssl, "%s.num.dnscrypt.cert"SQ"%lu\n", nm,
    825 		(unsigned long)s->svr.num_query_dnscrypt_cert)) return 0;
    826 	if(!ssl_printf(ssl, "%s.num.dnscrypt.cleartext"SQ"%lu\n", nm,
    827 		(unsigned long)s->svr.num_query_dnscrypt_cleartext)) return 0;
    828 	if(!ssl_printf(ssl, "%s.num.dnscrypt.malformed"SQ"%lu\n", nm,
    829 		(unsigned long)s->svr.num_query_dnscrypt_crypted_malformed)) return 0;
    830 #endif
    831 	if(!ssl_printf(ssl, "%s.num.dns_error_reports"SQ"%lu\n", nm,
    832 		(unsigned long)s->svr.num_dns_error_reports)) return 0;
    833 	if(!ssl_printf(ssl, "%s.requestlist.avg"SQ"%g\n", nm,
    834 		(s->svr.num_queries_missed_cache+s->svr.num_queries_prefetch)?
    835 			(double)s->svr.sum_query_list_size/
    836 			(double)(s->svr.num_queries_missed_cache+
    837 			s->svr.num_queries_prefetch) : 0.0)) return 0;
    838 	if(!ssl_printf(ssl, "%s.requestlist.max"SQ"%lu\n", nm,
    839 		(unsigned long)s->svr.max_query_list_size)) return 0;
    840 	if(!ssl_printf(ssl, "%s.requestlist.overwritten"SQ"%lu\n", nm,
    841 		(unsigned long)s->mesh_jostled)) return 0;
    842 	if(!ssl_printf(ssl, "%s.requestlist.exceeded"SQ"%lu\n", nm,
    843 		(unsigned long)s->mesh_dropped)) return 0;
    844 	if(!ssl_printf(ssl, "%s.requestlist.current.all"SQ"%lu\n", nm,
    845 		(unsigned long)s->mesh_num_states)) return 0;
    846 	if(!ssl_printf(ssl, "%s.requestlist.current.user"SQ"%lu\n", nm,
    847 		(unsigned long)s->mesh_num_reply_states)) return 0;
    848 #ifndef S_SPLINT_S
    849 	sumwait.tv_sec = s->mesh_replies_sum_wait_sec;
    850 	sumwait.tv_usec = s->mesh_replies_sum_wait_usec;
    851 #endif
    852 	timeval_divide(&avg, &sumwait, s->mesh_replies_sent);
    853 	if(!ssl_printf(ssl, "%s.recursion.time.avg"SQ ARG_LL "d.%6.6d\n", nm,
    854 		(long long)avg.tv_sec, (int)avg.tv_usec)) return 0;
    855 	if(!ssl_printf(ssl, "%s.recursion.time.median"SQ"%g\n", nm,
    856 		s->mesh_time_median)) return 0;
    857 	if(!ssl_printf(ssl, "%s.tcpusage"SQ"%lu\n", nm,
    858 		(unsigned long)s->svr.tcp_accept_usage)) return 0;
    859 	return 1;
    860 }
    861 
    862 /** print stats for one thread */
    863 static int
    864 print_thread_stats(RES* ssl, int i, struct ub_stats_info* s)
    865 {
    866 	char nm[32];
    867 	snprintf(nm, sizeof(nm), "thread%d", i);
    868 	nm[sizeof(nm)-1]=0;
    869 	return print_stats(ssl, nm, s);
    870 }
    871 
    872 /** print long number */
    873 static int
    874 print_longnum(RES* ssl, const char* desc, size_t x)
    875 {
    876 	if(x > 1024*1024*1024) {
    877 		/* more than a Gb */
    878 		size_t front = x / (size_t)1000000;
    879 		size_t back = x % (size_t)1000000;
    880 		return ssl_printf(ssl, "%s%u%6.6u\n", desc,
    881 			(unsigned)front, (unsigned)back);
    882 	} else {
    883 		return ssl_printf(ssl, "%s%lu\n", desc, (unsigned long)x);
    884 	}
    885 }
    886 
    887 /** print mem stats */
    888 static int
    889 print_mem(RES* ssl, struct worker* worker, struct daemon* daemon,
    890 	struct ub_stats_info* s)
    891 {
    892 	size_t msg, rrset, val, iter, respip;
    893 #ifdef CLIENT_SUBNET
    894 	size_t subnet = 0;
    895 #endif /* CLIENT_SUBNET */
    896 #ifdef USE_IPSECMOD
    897 	size_t ipsecmod = 0;
    898 #endif /* USE_IPSECMOD */
    899 #ifdef USE_DNSCRYPT
    900 	size_t dnscrypt_shared_secret = 0;
    901 	size_t dnscrypt_nonce = 0;
    902 #endif /* USE_DNSCRYPT */
    903 #ifdef WITH_DYNLIBMODULE
    904     size_t dynlib = 0;
    905 #endif /* WITH_DYNLIBMODULE */
    906 	msg = slabhash_get_mem(daemon->env->msg_cache);
    907 	rrset = slabhash_get_mem(&daemon->env->rrset_cache->table);
    908 	val = mod_get_mem(&worker->env, "validator");
    909 	iter = mod_get_mem(&worker->env, "iterator");
    910 	respip = mod_get_mem(&worker->env, "respip");
    911 #ifdef CLIENT_SUBNET
    912 	subnet = mod_get_mem(&worker->env, "subnetcache");
    913 #endif /* CLIENT_SUBNET */
    914 #ifdef USE_IPSECMOD
    915 	ipsecmod = mod_get_mem(&worker->env, "ipsecmod");
    916 #endif /* USE_IPSECMOD */
    917 #ifdef USE_DNSCRYPT
    918 	if(daemon->dnscenv) {
    919 		dnscrypt_shared_secret = slabhash_get_mem(
    920 			daemon->dnscenv->shared_secrets_cache);
    921 		dnscrypt_nonce = slabhash_get_mem(daemon->dnscenv->nonces_cache);
    922 	}
    923 #endif /* USE_DNSCRYPT */
    924 #ifdef WITH_DYNLIBMODULE
    925     dynlib = mod_get_mem(&worker->env, "dynlib");
    926 #endif /* WITH_DYNLIBMODULE */
    927 
    928 	if(!print_longnum(ssl, "mem.cache.rrset"SQ, rrset))
    929 		return 0;
    930 	if(!print_longnum(ssl, "mem.cache.message"SQ, msg))
    931 		return 0;
    932 	if(!print_longnum(ssl, "mem.mod.iterator"SQ, iter))
    933 		return 0;
    934 	if(!print_longnum(ssl, "mem.mod.validator"SQ, val))
    935 		return 0;
    936 	if(!print_longnum(ssl, "mem.mod.respip"SQ, respip))
    937 		return 0;
    938 #ifdef CLIENT_SUBNET
    939 	if(!print_longnum(ssl, "mem.mod.subnet"SQ, subnet))
    940 		return 0;
    941 #endif /* CLIENT_SUBNET */
    942 #ifdef USE_IPSECMOD
    943 	if(!print_longnum(ssl, "mem.mod.ipsecmod"SQ, ipsecmod))
    944 		return 0;
    945 #endif /* USE_IPSECMOD */
    946 #ifdef USE_DNSCRYPT
    947 	if(!print_longnum(ssl, "mem.cache.dnscrypt_shared_secret"SQ,
    948 			dnscrypt_shared_secret))
    949 		return 0;
    950 	if(!print_longnum(ssl, "mem.cache.dnscrypt_nonce"SQ,
    951 			dnscrypt_nonce))
    952 		return 0;
    953 #endif /* USE_DNSCRYPT */
    954 #ifdef WITH_DYNLIBMODULE
    955 	if(!print_longnum(ssl, "mem.mod.dynlibmod"SQ, dynlib))
    956 		return 0;
    957 #endif /* WITH_DYNLIBMODULE */
    958 	if(!print_longnum(ssl, "mem.streamwait"SQ,
    959 		(size_t)s->svr.mem_stream_wait))
    960 		return 0;
    961 	if(!print_longnum(ssl, "mem.http.query_buffer"SQ,
    962 		(size_t)s->svr.mem_http2_query_buffer))
    963 		return 0;
    964 	if(!print_longnum(ssl, "mem.http.response_buffer"SQ,
    965 		(size_t)s->svr.mem_http2_response_buffer))
    966 		return 0;
    967 #ifdef HAVE_NGTCP2
    968 	if(!print_longnum(ssl, "mem.quic"SQ, (size_t)s->svr.mem_quic))
    969 		return 0;
    970 #endif /* HAVE_NGTCP2 */
    971 	return 1;
    972 }
    973 
    974 /** print uptime stats */
    975 static int
    976 print_uptime(RES* ssl, struct worker* worker, int reset)
    977 {
    978 	struct timeval now = *worker->env.now_tv;
    979 	struct timeval up, dt;
    980 	timeval_subtract(&up, &now, &worker->daemon->time_boot);
    981 	timeval_subtract(&dt, &now, &worker->daemon->time_last_stat);
    982 	if(reset)
    983 		worker->daemon->time_last_stat = now;
    984 	if(!ssl_printf(ssl, "time.now"SQ ARG_LL "d.%6.6d\n",
    985 		(long long)now.tv_sec, (unsigned)now.tv_usec)) return 0;
    986 	if(!ssl_printf(ssl, "time.up"SQ ARG_LL "d.%6.6d\n",
    987 		(long long)up.tv_sec, (unsigned)up.tv_usec)) return 0;
    988 	if(!ssl_printf(ssl, "time.elapsed"SQ ARG_LL "d.%6.6d\n",
    989 		(long long)dt.tv_sec, (unsigned)dt.tv_usec)) return 0;
    990 	return 1;
    991 }
    992 
    993 /** print extended histogram */
    994 static int
    995 print_hist(RES* ssl, struct ub_stats_info* s)
    996 {
    997 	struct timehist* hist;
    998 	size_t i;
    999 	hist = timehist_setup();
   1000 	if(!hist) {
   1001 		log_err("out of memory");
   1002 		return 0;
   1003 	}
   1004 	timehist_import(hist, s->svr.hist, NUM_BUCKETS_HIST);
   1005 	for(i=0; i<hist->num; i++) {
   1006 		if(!ssl_printf(ssl,
   1007 			"histogram.%6.6d.%6.6d.to.%6.6d.%6.6d=%lu\n",
   1008 			(int)hist->buckets[i].lower.tv_sec,
   1009 			(int)hist->buckets[i].lower.tv_usec,
   1010 			(int)hist->buckets[i].upper.tv_sec,
   1011 			(int)hist->buckets[i].upper.tv_usec,
   1012 			(unsigned long)hist->buckets[i].count)) {
   1013 			timehist_delete(hist);
   1014 			return 0;
   1015 		}
   1016 	}
   1017 	timehist_delete(hist);
   1018 	return 1;
   1019 }
   1020 
   1021 /** print extended stats */
   1022 static int
   1023 print_ext(RES* ssl, struct ub_stats_info* s, int inhibit_zero)
   1024 {
   1025 	int i;
   1026 	char nm[32];
   1027 	const sldns_rr_descriptor* desc;
   1028 	const sldns_lookup_table* lt;
   1029 	/* TYPE */
   1030 	for(i=0; i<UB_STATS_QTYPE_NUM; i++) {
   1031 		if(inhibit_zero && s->svr.qtype[i] == 0)
   1032 			continue;
   1033 		desc = sldns_rr_descript((uint16_t)i);
   1034 		if(desc && desc->_name) {
   1035 			snprintf(nm, sizeof(nm), "%s", desc->_name);
   1036 		} else if (i == LDNS_RR_TYPE_IXFR) {
   1037 			snprintf(nm, sizeof(nm), "IXFR");
   1038 		} else if (i == LDNS_RR_TYPE_AXFR) {
   1039 			snprintf(nm, sizeof(nm), "AXFR");
   1040 		} else if (i == LDNS_RR_TYPE_MAILA) {
   1041 			snprintf(nm, sizeof(nm), "MAILA");
   1042 		} else if (i == LDNS_RR_TYPE_MAILB) {
   1043 			snprintf(nm, sizeof(nm), "MAILB");
   1044 		} else if (i == LDNS_RR_TYPE_ANY) {
   1045 			snprintf(nm, sizeof(nm), "ANY");
   1046 		} else {
   1047 			snprintf(nm, sizeof(nm), "TYPE%d", i);
   1048 		}
   1049 		if(!ssl_printf(ssl, "num.query.type.%s"SQ"%lu\n",
   1050 			nm, (unsigned long)s->svr.qtype[i])) return 0;
   1051 	}
   1052 	if(!inhibit_zero || s->svr.qtype_big) {
   1053 		if(!ssl_printf(ssl, "num.query.type.other"SQ"%lu\n",
   1054 			(unsigned long)s->svr.qtype_big)) return 0;
   1055 	}
   1056 	/* CLASS */
   1057 	for(i=0; i<UB_STATS_QCLASS_NUM; i++) {
   1058 		if(inhibit_zero && s->svr.qclass[i] == 0)
   1059 			continue;
   1060 		lt = sldns_lookup_by_id(sldns_rr_classes, i);
   1061 		if(lt && lt->name) {
   1062 			snprintf(nm, sizeof(nm), "%s", lt->name);
   1063 		} else {
   1064 			snprintf(nm, sizeof(nm), "CLASS%d", i);
   1065 		}
   1066 		if(!ssl_printf(ssl, "num.query.class.%s"SQ"%lu\n",
   1067 			nm, (unsigned long)s->svr.qclass[i])) return 0;
   1068 	}
   1069 	if(!inhibit_zero || s->svr.qclass_big) {
   1070 		if(!ssl_printf(ssl, "num.query.class.other"SQ"%lu\n",
   1071 			(unsigned long)s->svr.qclass_big)) return 0;
   1072 	}
   1073 	/* OPCODE */
   1074 	for(i=0; i<UB_STATS_OPCODE_NUM; i++) {
   1075 		if(inhibit_zero && s->svr.qopcode[i] == 0)
   1076 			continue;
   1077 		lt = sldns_lookup_by_id(sldns_opcodes, i);
   1078 		if(lt && lt->name) {
   1079 			snprintf(nm, sizeof(nm), "%s", lt->name);
   1080 		} else {
   1081 			snprintf(nm, sizeof(nm), "OPCODE%d", i);
   1082 		}
   1083 		if(!ssl_printf(ssl, "num.query.opcode.%s"SQ"%lu\n",
   1084 			nm, (unsigned long)s->svr.qopcode[i])) return 0;
   1085 	}
   1086 	/* transport */
   1087 	if(!ssl_printf(ssl, "num.query.tcp"SQ"%lu\n",
   1088 		(unsigned long)s->svr.qtcp)) return 0;
   1089 	if(!ssl_printf(ssl, "num.query.tcpout"SQ"%lu\n",
   1090 		(unsigned long)s->svr.qtcp_outgoing)) return 0;
   1091 	if(!ssl_printf(ssl, "num.query.udpout"SQ"%lu\n",
   1092 		(unsigned long)s->svr.qudp_outgoing)) return 0;
   1093 	if(!ssl_printf(ssl, "num.query.tls"SQ"%lu\n",
   1094 		(unsigned long)s->svr.qtls)) return 0;
   1095 	if(!ssl_printf(ssl, "num.query.tls.resume"SQ"%lu\n",
   1096 		(unsigned long)s->svr.qtls_resume)) return 0;
   1097 	if(!ssl_printf(ssl, "num.query.ipv6"SQ"%lu\n",
   1098 		(unsigned long)s->svr.qipv6)) return 0;
   1099 	if(!ssl_printf(ssl, "num.query.https"SQ"%lu\n",
   1100 		(unsigned long)s->svr.qhttps)) return 0;
   1101 #ifdef HAVE_NGTCP2
   1102 	if(!ssl_printf(ssl, "num.query.quic"SQ"%lu\n",
   1103 		(unsigned long)s->svr.qquic)) return 0;
   1104 #endif /* HAVE_NGTCP2 */
   1105 	/* flags */
   1106 	if(!ssl_printf(ssl, "num.query.flags.QR"SQ"%lu\n",
   1107 		(unsigned long)s->svr.qbit_QR)) return 0;
   1108 	if(!ssl_printf(ssl, "num.query.flags.AA"SQ"%lu\n",
   1109 		(unsigned long)s->svr.qbit_AA)) return 0;
   1110 	if(!ssl_printf(ssl, "num.query.flags.TC"SQ"%lu\n",
   1111 		(unsigned long)s->svr.qbit_TC)) return 0;
   1112 	if(!ssl_printf(ssl, "num.query.flags.RD"SQ"%lu\n",
   1113 		(unsigned long)s->svr.qbit_RD)) return 0;
   1114 	if(!ssl_printf(ssl, "num.query.flags.RA"SQ"%lu\n",
   1115 		(unsigned long)s->svr.qbit_RA)) return 0;
   1116 	if(!ssl_printf(ssl, "num.query.flags.Z"SQ"%lu\n",
   1117 		(unsigned long)s->svr.qbit_Z)) return 0;
   1118 	if(!ssl_printf(ssl, "num.query.flags.AD"SQ"%lu\n",
   1119 		(unsigned long)s->svr.qbit_AD)) return 0;
   1120 	if(!ssl_printf(ssl, "num.query.flags.CD"SQ"%lu\n",
   1121 		(unsigned long)s->svr.qbit_CD)) return 0;
   1122 	if(!ssl_printf(ssl, "num.query.edns.present"SQ"%lu\n",
   1123 		(unsigned long)s->svr.qEDNS)) return 0;
   1124 	if(!ssl_printf(ssl, "num.query.edns.DO"SQ"%lu\n",
   1125 		(unsigned long)s->svr.qEDNS_DO)) return 0;
   1126 
   1127 	/* RCODE */
   1128 	for(i=0; i<UB_STATS_RCODE_NUM; i++) {
   1129 		/* Always include RCODEs 0-5 */
   1130 		if(inhibit_zero && i > LDNS_RCODE_REFUSED && s->svr.ans_rcode[i] == 0)
   1131 			continue;
   1132 		lt = sldns_lookup_by_id(sldns_rcodes, i);
   1133 		if(lt && lt->name) {
   1134 			snprintf(nm, sizeof(nm), "%s", lt->name);
   1135 		} else {
   1136 			snprintf(nm, sizeof(nm), "RCODE%d", i);
   1137 		}
   1138 		if(!ssl_printf(ssl, "num.answer.rcode.%s"SQ"%lu\n",
   1139 			nm, (unsigned long)s->svr.ans_rcode[i])) return 0;
   1140 	}
   1141 	if(!inhibit_zero || s->svr.ans_rcode_nodata) {
   1142 		if(!ssl_printf(ssl, "num.answer.rcode.nodata"SQ"%lu\n",
   1143 			(unsigned long)s->svr.ans_rcode_nodata)) return 0;
   1144 	}
   1145 	/* iteration */
   1146 	if(!ssl_printf(ssl, "num.query.ratelimited"SQ"%lu\n",
   1147 		(unsigned long)s->svr.queries_ratelimited)) return 0;
   1148 	/* validation */
   1149 	if(!ssl_printf(ssl, "num.answer.secure"SQ"%lu\n",
   1150 		(unsigned long)s->svr.ans_secure)) return 0;
   1151 	if(!ssl_printf(ssl, "num.answer.bogus"SQ"%lu\n",
   1152 		(unsigned long)s->svr.ans_bogus)) return 0;
   1153 	if(!ssl_printf(ssl, "num.rrset.bogus"SQ"%lu\n",
   1154 		(unsigned long)s->svr.rrset_bogus)) return 0;
   1155 	if(!ssl_printf(ssl, "num.valops"SQ"%lu\n",
   1156 		(unsigned long)s->svr.val_ops)) return 0;
   1157 	if(!ssl_printf(ssl, "num.query.aggressive.NOERROR"SQ"%lu\n",
   1158 		(unsigned long)s->svr.num_neg_cache_noerror)) return 0;
   1159 	if(!ssl_printf(ssl, "num.query.aggressive.NXDOMAIN"SQ"%lu\n",
   1160 		(unsigned long)s->svr.num_neg_cache_nxdomain)) return 0;
   1161 	/* threat detection */
   1162 	if(!ssl_printf(ssl, "unwanted.queries"SQ"%lu\n",
   1163 		(unsigned long)s->svr.unwanted_queries)) return 0;
   1164 	if(!ssl_printf(ssl, "unwanted.replies"SQ"%lu\n",
   1165 		(unsigned long)s->svr.unwanted_replies)) return 0;
   1166 	/* cache counts */
   1167 	if(!ssl_printf(ssl, "msg.cache.count"SQ"%u\n",
   1168 		(unsigned)s->svr.msg_cache_count)) return 0;
   1169 	if(!ssl_printf(ssl, "rrset.cache.count"SQ"%u\n",
   1170 		(unsigned)s->svr.rrset_cache_count)) return 0;
   1171 	if(!ssl_printf(ssl, "infra.cache.count"SQ"%u\n",
   1172 		(unsigned)s->svr.infra_cache_count)) return 0;
   1173 	if(!ssl_printf(ssl, "key.cache.count"SQ"%u\n",
   1174 		(unsigned)s->svr.key_cache_count)) return 0;
   1175 	/* max collisions */
   1176 	if(!ssl_printf(ssl, "msg.cache.max_collisions"SQ"%u\n",
   1177 		(unsigned)s->svr.msg_cache_max_collisions)) return 0;
   1178 	if(!ssl_printf(ssl, "rrset.cache.max_collisions"SQ"%u\n",
   1179 		(unsigned)s->svr.rrset_cache_max_collisions)) return 0;
   1180 	/* applied RPZ actions */
   1181 	for(i=0; i<UB_STATS_RPZ_ACTION_NUM; i++) {
   1182 		if(i == RPZ_NO_OVERRIDE_ACTION)
   1183 			continue;
   1184 		if(inhibit_zero && s->svr.rpz_action[i] == 0)
   1185 			continue;
   1186 		if(!ssl_printf(ssl, "num.rpz.action.%s"SQ"%lu\n",
   1187 			rpz_action_to_string(i),
   1188 			(unsigned long)s->svr.rpz_action[i])) return 0;
   1189 	}
   1190 #ifdef USE_DNSCRYPT
   1191 	if(!ssl_printf(ssl, "dnscrypt_shared_secret.cache.count"SQ"%u\n",
   1192 		(unsigned)s->svr.shared_secret_cache_count)) return 0;
   1193 	if(!ssl_printf(ssl, "dnscrypt_nonce.cache.count"SQ"%u\n",
   1194 		(unsigned)s->svr.nonce_cache_count)) return 0;
   1195 	if(!ssl_printf(ssl, "num.query.dnscrypt.shared_secret.cachemiss"SQ"%lu\n",
   1196 		(unsigned long)s->svr.num_query_dnscrypt_secret_missed_cache)) return 0;
   1197 	if(!ssl_printf(ssl, "num.query.dnscrypt.replay"SQ"%lu\n",
   1198 		(unsigned long)s->svr.num_query_dnscrypt_replay)) return 0;
   1199 #endif /* USE_DNSCRYPT */
   1200 	if(!ssl_printf(ssl, "num.query.authzone.up"SQ"%lu\n",
   1201 		(unsigned long)s->svr.num_query_authzone_up)) return 0;
   1202 	if(!ssl_printf(ssl, "num.query.authzone.down"SQ"%lu\n",
   1203 		(unsigned long)s->svr.num_query_authzone_down)) return 0;
   1204 #ifdef CLIENT_SUBNET
   1205 	if(!ssl_printf(ssl, "num.query.subnet"SQ"%lu\n",
   1206 		(unsigned long)s->svr.num_query_subnet)) return 0;
   1207 	if(!ssl_printf(ssl, "num.query.subnet_cache"SQ"%lu\n",
   1208 		(unsigned long)s->svr.num_query_subnet_cache)) return 0;
   1209 #endif /* CLIENT_SUBNET */
   1210 #ifdef USE_CACHEDB
   1211 	if(!ssl_printf(ssl, "num.query.cachedb"SQ"%lu\n",
   1212 		(unsigned long)s->svr.num_query_cachedb)) return 0;
   1213 #endif /* USE_CACHEDB */
   1214 	return 1;
   1215 }
   1216 
   1217 /** do the stats command */
   1218 static void
   1219 do_stats(RES* ssl, struct worker* worker, int reset)
   1220 {
   1221 	struct daemon* daemon = worker->daemon;
   1222 	struct ub_stats_info total;
   1223 	struct ub_stats_info s;
   1224 	int i;
   1225 	memset(&total, 0, sizeof(total));
   1226 	log_assert(daemon->num > 0);
   1227 	/* gather all thread statistics in one place */
   1228 	for(i=0; i<daemon->num; i++) {
   1229 		server_stats_obtain(worker, daemon->workers[i], &s, reset);
   1230 		if(!print_thread_stats(ssl, i, &s))
   1231 			return;
   1232 		if(i == 0)
   1233 			total = s;
   1234 		else	server_stats_add(&total, &s);
   1235 	}
   1236 	/* print the thread statistics */
   1237 	total.mesh_time_median /= (double)daemon->num;
   1238 	if(!print_stats(ssl, "total", &total))
   1239 		return;
   1240 	if(!print_uptime(ssl, worker, reset))
   1241 		return;
   1242 	if(daemon->cfg->stat_extended) {
   1243 		if(!print_mem(ssl, worker, daemon, &total))
   1244 			return;
   1245 		if(!print_hist(ssl, &total))
   1246 			return;
   1247 		if(!print_ext(ssl, &total, daemon->cfg->stat_inhibit_zero))
   1248 			return;
   1249 	}
   1250 }
   1251 
   1252 /** parse commandline argument domain name */
   1253 static int
   1254 parse_arg_name(RES* ssl, char* str, uint8_t** res, size_t* len, int* labs)
   1255 {
   1256 	uint8_t nm[LDNS_MAX_DOMAINLEN+1];
   1257 	size_t nmlen = sizeof(nm);
   1258 	int status;
   1259 	*res = NULL;
   1260 	*len = 0;
   1261 	*labs = 0;
   1262 	if(str[0] == '\0') {
   1263 		ssl_printf(ssl, "error: this option requires a domain name\n");
   1264 		return 0;
   1265 	}
   1266 	status = sldns_str2wire_dname_buf(str, nm, &nmlen);
   1267 	if(status != 0) {
   1268 		ssl_printf(ssl, "error cannot parse name %s at %d: %s\n", str,
   1269 			LDNS_WIREPARSE_OFFSET(status),
   1270 			sldns_get_errorstr_parse(status));
   1271 		return 0;
   1272 	}
   1273 	*res = memdup(nm, nmlen);
   1274 	if(!*res) {
   1275 		ssl_printf(ssl, "error out of memory\n");
   1276 		return 0;
   1277 	}
   1278 	*labs = dname_count_size_labels(*res, len);
   1279 	return 1;
   1280 }
   1281 
   1282 /** find second argument, modifies string */
   1283 static int
   1284 find_arg2(RES* ssl, char* arg, char** arg2)
   1285 {
   1286 	char* as = strchr(arg, ' ');
   1287 	char* at = strchr(arg, '\t');
   1288 	if(as && at) {
   1289 		if(at < as)
   1290 			as = at;
   1291 		as[0]=0;
   1292 		*arg2 = skipwhite(as+1);
   1293 	} else if(as) {
   1294 		as[0]=0;
   1295 		*arg2 = skipwhite(as+1);
   1296 	} else if(at) {
   1297 		at[0]=0;
   1298 		*arg2 = skipwhite(at+1);
   1299 	} else {
   1300 		ssl_printf(ssl, "error could not find next argument "
   1301 			"after %s\n", arg);
   1302 		return 0;
   1303 	}
   1304 	return 1;
   1305 }
   1306 
   1307 /** Add a new zone */
   1308 static int
   1309 perform_zone_add(RES* ssl, struct local_zones* zones, char* arg)
   1310 {
   1311 	uint8_t* nm;
   1312 	int nmlabs;
   1313 	size_t nmlen;
   1314 	char* arg2;
   1315 	enum localzone_type t;
   1316 	struct local_zone* z;
   1317 	if(!find_arg2(ssl, arg, &arg2))
   1318 		return 0;
   1319 	if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
   1320 		return 0;
   1321 	if(!local_zone_str2type(arg2, &t)) {
   1322 		ssl_printf(ssl, "error not a zone type. %s\n", arg2);
   1323 		free(nm);
   1324 		return 0;
   1325 	}
   1326 	lock_rw_wrlock(&zones->lock);
   1327 	if((z=local_zones_find(zones, nm, nmlen,
   1328 		nmlabs, LDNS_RR_CLASS_IN))) {
   1329 		/* already present in tree */
   1330 		lock_rw_wrlock(&z->lock);
   1331 		z->type = t; /* update type anyway */
   1332 		lock_rw_unlock(&z->lock);
   1333 		free(nm);
   1334 		lock_rw_unlock(&zones->lock);
   1335 		return 1;
   1336 	}
   1337 	if(!local_zones_add_zone(zones, nm, nmlen,
   1338 		nmlabs, LDNS_RR_CLASS_IN, t)) {
   1339 		lock_rw_unlock(&zones->lock);
   1340 		ssl_printf(ssl, "error out of memory\n");
   1341 		return 0;
   1342 	}
   1343 	lock_rw_unlock(&zones->lock);
   1344 	return 1;
   1345 }
   1346 
   1347 /** Do the local_zone command */
   1348 static void
   1349 do_zone_add(RES* ssl, struct local_zones* zones, char* arg)
   1350 {
   1351 	if(!perform_zone_add(ssl, zones, arg))
   1352 		return;
   1353 	send_ok(ssl);
   1354 }
   1355 
   1356 /** Do the local_zones command */
   1357 static void
   1358 do_zones_add(struct daemon_remote* rc, RES* ssl, struct worker* worker)
   1359 {
   1360 	char buf[MAX_CMD_STRLINE + MAX_STDIN_STRLINE] = "local_zone ";
   1361 	int num = 0;
   1362 	size_t cmd_len = strlen(buf);
   1363 	while(ssl_read_line(ssl, buf+cmd_len, MAX_STDIN_STRLINE)) {
   1364 		if(buf[0+cmd_len] == 0 ||
   1365 			(buf[0+cmd_len] == 0x04 && buf[1+cmd_len] == 0))
   1366 			break; /* zero byte line or end of transmission */
   1367 #ifdef THREADS_DISABLED
   1368 		/* distribute single item command */
   1369 		if(rc) distribute_cmd(rc, ssl, buf);
   1370 #else
   1371 		(void)rc; /* unused */
   1372 #endif
   1373 		if(!perform_zone_add(ssl, worker->daemon->local_zones,
   1374 			buf+cmd_len)) {
   1375 			if(!ssl_printf(ssl, "error for input line: %s\n",
   1376 				buf+cmd_len))
   1377 				return;
   1378 		}
   1379 		else	num++;
   1380 	}
   1381 	(void)ssl_printf(ssl, "added %d zones\n", num);
   1382 }
   1383 
   1384 /** Remove a zone */
   1385 static int
   1386 perform_zone_remove(RES* ssl, struct local_zones* zones, char* arg)
   1387 {
   1388 	uint8_t* nm;
   1389 	int nmlabs;
   1390 	size_t nmlen;
   1391 	struct local_zone* z;
   1392 	if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
   1393 		return 0;
   1394 	lock_rw_wrlock(&zones->lock);
   1395 	if((z=local_zones_find(zones, nm, nmlen,
   1396 		nmlabs, LDNS_RR_CLASS_IN))) {
   1397 		/* present in tree */
   1398 		local_zones_del_zone(zones, z);
   1399 	}
   1400 	lock_rw_unlock(&zones->lock);
   1401 	free(nm);
   1402 	return 1;
   1403 }
   1404 
   1405 /** Do the local_zone_remove command */
   1406 static void
   1407 do_zone_remove(RES* ssl, struct local_zones* zones, char* arg)
   1408 {
   1409 	if(!perform_zone_remove(ssl, zones, arg))
   1410 		return;
   1411 	send_ok(ssl);
   1412 }
   1413 
   1414 /** Do the local_zones_remove command */
   1415 static void
   1416 do_zones_remove(struct daemon_remote* rc, RES* ssl, struct worker* worker)
   1417 {
   1418 	char buf[MAX_CMD_STRLINE + MAX_STDIN_STRLINE] = "local_zone_remove ";
   1419 	int num = 0;
   1420 	size_t cmd_len = strlen(buf);
   1421 	while(ssl_read_line(ssl, buf+cmd_len, MAX_STDIN_STRLINE)) {
   1422 		if(buf[0+cmd_len] == 0 ||
   1423 			(buf[0+cmd_len] == 0x04 && buf[1+cmd_len] == 0))
   1424 			break; /* zero byte line or end of transmission */
   1425 #ifdef THREADS_DISABLED
   1426 		/* distribute single item command */
   1427 		if(rc) distribute_cmd(rc, ssl, buf);
   1428 #else
   1429 		(void)rc; /* unused */
   1430 #endif
   1431 		if(!perform_zone_remove(ssl, worker->daemon->local_zones,
   1432 			buf+cmd_len)) {
   1433 			if(!ssl_printf(ssl, "error for input line: %s\n",
   1434 				buf+cmd_len))
   1435 				return;
   1436 		}
   1437 		else	num++;
   1438 	}
   1439 	(void)ssl_printf(ssl, "removed %d zones\n", num);
   1440 }
   1441 
   1442 /** check syntax of newly added RR */
   1443 static int
   1444 check_RR_syntax(RES* ssl, char* str, int line)
   1445 {
   1446 	uint8_t rr[LDNS_RR_BUF_SIZE];
   1447 	size_t len = sizeof(rr), dname_len = 0;
   1448 	int s = sldns_str2wire_rr_buf(str, rr, &len, &dname_len, 3600,
   1449 		NULL, 0, NULL, 0);
   1450 	if(s != 0) {
   1451 		char linestr[32];
   1452 		if(line == 0)
   1453 			linestr[0]=0;
   1454 		else 	snprintf(linestr, sizeof(linestr), "line %d ", line);
   1455 		if(!ssl_printf(ssl, "error parsing local-data at %sposition %d '%s': %s\n",
   1456 			linestr, LDNS_WIREPARSE_OFFSET(s), str,
   1457 			sldns_get_errorstr_parse(s)))
   1458 			return 0;
   1459 		return 0;
   1460 	}
   1461 	return 1;
   1462 }
   1463 
   1464 /** Add new RR data */
   1465 static int
   1466 perform_data_add(RES* ssl, struct local_zones* zones, char* arg, int line)
   1467 {
   1468 	if(!check_RR_syntax(ssl, arg, line)) {
   1469 		return 0;
   1470 	}
   1471 	if(!local_zones_add_RR(zones, arg)) {
   1472 		ssl_printf(ssl,"error in syntax or out of memory, %s\n", arg);
   1473 		return 0;
   1474 	}
   1475 	return 1;
   1476 }
   1477 
   1478 /** Do the local_data command */
   1479 static void
   1480 do_data_add(RES* ssl, struct local_zones* zones, char* arg)
   1481 {
   1482 	if(!perform_data_add(ssl, zones, arg, 0))
   1483 		return;
   1484 	send_ok(ssl);
   1485 }
   1486 
   1487 /** Do the local_datas command */
   1488 static void
   1489 do_datas_add(struct daemon_remote* rc, RES* ssl, struct worker* worker)
   1490 {
   1491 	char buf[MAX_CMD_STRLINE + MAX_STDIN_STRLINE] = "local_data ";
   1492 	int num = 0, line = 0;
   1493 	size_t cmd_len = strlen(buf);
   1494 	while(ssl_read_line(ssl, buf+cmd_len, MAX_STDIN_STRLINE)) {
   1495 		if(buf[0+cmd_len] == 0 ||
   1496 			(buf[0+cmd_len] == 0x04 && buf[1+cmd_len] == 0))
   1497 			break; /* zero byte line or end of transmission */
   1498 #ifdef THREADS_DISABLED
   1499 		/* distribute single item command */
   1500 		if(rc) distribute_cmd(rc, ssl, buf);
   1501 #else
   1502 		(void)rc; /* unused */
   1503 #endif
   1504 		line++;
   1505 		if(perform_data_add(ssl, worker->daemon->local_zones,
   1506 			buf+cmd_len, line))
   1507 			num++;
   1508 	}
   1509 	(void)ssl_printf(ssl, "added %d datas\n", num);
   1510 }
   1511 
   1512 /** Remove RR data */
   1513 static int
   1514 perform_data_remove(RES* ssl, struct local_zones* zones, char* arg)
   1515 {
   1516 	uint8_t* nm;
   1517 	int nmlabs;
   1518 	size_t nmlen;
   1519 	if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
   1520 		return 0;
   1521 	local_zones_del_data(zones, nm,
   1522 		nmlen, nmlabs, LDNS_RR_CLASS_IN);
   1523 	free(nm);
   1524 	return 1;
   1525 }
   1526 
   1527 /** Do the local_data_remove command */
   1528 static void
   1529 do_data_remove(RES* ssl, struct local_zones* zones, char* arg)
   1530 {
   1531 	if(!perform_data_remove(ssl, zones, arg))
   1532 		return;
   1533 	send_ok(ssl);
   1534 }
   1535 
   1536 /** Do the local_datas_remove command */
   1537 static void
   1538 do_datas_remove(struct daemon_remote* rc, RES* ssl, struct worker* worker)
   1539 {
   1540 	char buf[MAX_CMD_STRLINE + MAX_STDIN_STRLINE] = "local_data_remove ";
   1541 	int num = 0;
   1542 	size_t cmd_len = strlen(buf);
   1543 	while(ssl_read_line(ssl, buf+cmd_len, MAX_STDIN_STRLINE)) {
   1544 		if(buf[0+cmd_len] == 0 ||
   1545 			(buf[0+cmd_len] == 0x04 && buf[1+cmd_len] == 0))
   1546 			break; /* zero byte line or end of transmission */
   1547 #ifdef THREADS_DISABLED
   1548 		/* distribute single item command */
   1549 		if(rc) distribute_cmd(rc, ssl, buf);
   1550 #else
   1551 		(void)rc; /* unused */
   1552 #endif
   1553 		if(!perform_data_remove(ssl, worker->daemon->local_zones,
   1554 			buf+cmd_len)) {
   1555 			if(!ssl_printf(ssl, "error for input line: %s\n",
   1556 				buf+cmd_len))
   1557 				return;
   1558 		}
   1559 		else	num++;
   1560 	}
   1561 	(void)ssl_printf(ssl, "removed %d datas\n", num);
   1562 }
   1563 
   1564 /** Add a new zone to view */
   1565 static void
   1566 do_view_zone_add(RES* ssl, struct worker* worker, char* arg)
   1567 {
   1568 	char* arg2;
   1569 	struct view* v;
   1570 	if(!find_arg2(ssl, arg, &arg2))
   1571 		return;
   1572 	v = views_find_view(worker->env.views, arg, 1 /* get write lock*/);
   1573 	if(!v) {
   1574 		ssl_printf(ssl,"no view with name: %s\n", arg);
   1575 		return;
   1576 	}
   1577 	if(!v->local_zones) {
   1578 		if(!(v->local_zones = local_zones_create())){
   1579 			lock_rw_unlock(&v->lock);
   1580 			ssl_printf(ssl,"error out of memory\n");
   1581 			return;
   1582 		}
   1583 		if(!v->isfirst) {
   1584 			/* Global local-zone is not used for this view,
   1585 			 * therefore add defaults to this view-specific
   1586 			 * local-zone. */
   1587 			struct config_file lz_cfg;
   1588 			memset(&lz_cfg, 0, sizeof(lz_cfg));
   1589 			local_zone_enter_defaults(v->local_zones, &lz_cfg);
   1590 		}
   1591 	}
   1592 	do_zone_add(ssl, v->local_zones, arg2);
   1593 	lock_rw_unlock(&v->lock);
   1594 }
   1595 
   1596 /** Remove a zone from view */
   1597 static void
   1598 do_view_zone_remove(RES* ssl, struct worker* worker, char* arg)
   1599 {
   1600 	char* arg2;
   1601 	struct view* v;
   1602 	if(!find_arg2(ssl, arg, &arg2))
   1603 		return;
   1604 	v = views_find_view(worker->env.views, arg, 1 /* get write lock*/);
   1605 	if(!v) {
   1606 		ssl_printf(ssl,"no view with name: %s\n", arg);
   1607 		return;
   1608 	}
   1609 	if(!v->local_zones) {
   1610 		lock_rw_unlock(&v->lock);
   1611 		send_ok(ssl);
   1612 		return;
   1613 	}
   1614 	do_zone_remove(ssl, v->local_zones, arg2);
   1615 	lock_rw_unlock(&v->lock);
   1616 }
   1617 
   1618 /** Add new RR data to view */
   1619 static void
   1620 do_view_data_add(RES* ssl, struct worker* worker, char* arg)
   1621 {
   1622 	char* arg2;
   1623 	struct view* v;
   1624 	if(!find_arg2(ssl, arg, &arg2))
   1625 		return;
   1626 	v = views_find_view(worker->env.views, arg, 1 /* get write lock*/);
   1627 	if(!v) {
   1628 		ssl_printf(ssl,"no view with name: %s\n", arg);
   1629 		return;
   1630 	}
   1631 	if(!v->local_zones) {
   1632 		if(!(v->local_zones = local_zones_create())){
   1633 			lock_rw_unlock(&v->lock);
   1634 			ssl_printf(ssl,"error out of memory\n");
   1635 			return;
   1636 		}
   1637 	}
   1638 	do_data_add(ssl, v->local_zones, arg2);
   1639 	lock_rw_unlock(&v->lock);
   1640 }
   1641 
   1642 /** Add new RR data from stdin to view */
   1643 static void
   1644 do_view_datas_add(struct daemon_remote* rc, RES* ssl, struct worker* worker,
   1645 	char* arg)
   1646 {
   1647 	struct view* v;
   1648 	char buf[MAX_CMD_STRLINE + MAX_STDIN_STRLINE] = "view_local_data ";
   1649 	size_t cmd_len;
   1650 	int num = 0, line = 0;
   1651 	v = views_find_view(worker->env.views, arg, 1 /* get write lock*/);
   1652 	if(!v) {
   1653 		ssl_printf(ssl,"no view with name: %s\n", arg);
   1654 		return;
   1655 	}
   1656 	if(!v->local_zones) {
   1657 		if(!(v->local_zones = local_zones_create())){
   1658 			lock_rw_unlock(&v->lock);
   1659 			ssl_printf(ssl,"error out of memory\n");
   1660 			return;
   1661 		}
   1662 	}
   1663 	/* put the view name in the command buf */
   1664 	(void)snprintf(buf+strlen(buf), sizeof(buf)-strlen(buf), "%s ", arg);
   1665 	cmd_len = strlen(buf);
   1666 	while(ssl_read_line(ssl, buf+cmd_len, MAX_STDIN_STRLINE)) {
   1667 		if(buf[0+cmd_len] == 0 ||
   1668 			(buf[0+cmd_len] == 0x04 && buf[1+cmd_len] == 0))
   1669 			break; /* zero byte line or end of transmission */
   1670 #ifdef THREADS_DISABLED
   1671 		/* distribute single item command */
   1672 		if(rc) distribute_cmd(rc, ssl, buf);
   1673 #else
   1674 		(void)rc; /* unused */
   1675 #endif
   1676 		line++;
   1677 		if(perform_data_add(ssl, v->local_zones, buf+cmd_len, line))
   1678 			num++;
   1679 	}
   1680 	lock_rw_unlock(&v->lock);
   1681 	(void)ssl_printf(ssl, "added %d datas\n", num);
   1682 }
   1683 
   1684 /** Remove RR data from view */
   1685 static void
   1686 do_view_data_remove(RES* ssl, struct worker* worker, char* arg)
   1687 {
   1688 	char* arg2;
   1689 	struct view* v;
   1690 	if(!find_arg2(ssl, arg, &arg2))
   1691 		return;
   1692 	v = views_find_view(worker->env.views, arg, 1 /* get write lock*/);
   1693 	if(!v) {
   1694 		ssl_printf(ssl,"no view with name: %s\n", arg);
   1695 		return;
   1696 	}
   1697 	if(!v->local_zones) {
   1698 		lock_rw_unlock(&v->lock);
   1699 		send_ok(ssl);
   1700 		return;
   1701 	}
   1702 	do_data_remove(ssl, v->local_zones, arg2);
   1703 	lock_rw_unlock(&v->lock);
   1704 }
   1705 
   1706 /** Remove RR data from stdin from view */
   1707 static void
   1708 do_view_datas_remove(struct daemon_remote* rc, RES* ssl, struct worker* worker,
   1709 	char* arg)
   1710 {
   1711 	struct view* v;
   1712 	char buf[MAX_CMD_STRLINE + MAX_STDIN_STRLINE] = "view_local_data_remove ";
   1713 	int num = 0;
   1714 	size_t cmd_len;
   1715 	v = views_find_view(worker->env.views, arg, 1 /* get write lock*/);
   1716 	if(!v) {
   1717 		ssl_printf(ssl,"no view with name: %s\n", arg);
   1718 		return;
   1719 	}
   1720 	if(!v->local_zones){
   1721 		lock_rw_unlock(&v->lock);
   1722 		ssl_printf(ssl, "removed 0 datas\n");
   1723 		return;
   1724 	}
   1725 	/* put the view name in the command buf */
   1726 	(void)snprintf(buf+strlen(buf), sizeof(buf)-strlen(buf), "%s ", arg);
   1727 	cmd_len = strlen(buf);
   1728 	while(ssl_read_line(ssl, buf+cmd_len, MAX_STDIN_STRLINE)) {
   1729 		if(buf[0+cmd_len] == 0 ||
   1730 			(buf[0+cmd_len] == 0x04 && buf[1+cmd_len] == 0))
   1731 			break; /* zero byte line or end of transmission */
   1732 #ifdef THREADS_DISABLED
   1733 		/* distribute single item command */
   1734 		if(rc) distribute_cmd(rc, ssl, buf);
   1735 #else
   1736 		(void)rc; /* unused */
   1737 #endif
   1738 		if(!perform_data_remove(ssl, v->local_zones, buf+cmd_len)) {
   1739 			if(!ssl_printf(ssl, "error for input line: %s\n",
   1740 				buf+cmd_len))
   1741 				return;
   1742 		}
   1743 		else	num++;
   1744 	}
   1745 	lock_rw_unlock(&v->lock);
   1746 	(void)ssl_printf(ssl, "removed %d datas\n", num);
   1747 }
   1748 
   1749 /** information for the domain search */
   1750 struct cache_lookup_info {
   1751 	/** The connection to print on. */
   1752 	RES* ssl;
   1753 	/** The worker. */
   1754 	struct worker* worker;
   1755 	/** The domain, in wireformat. */
   1756 	uint8_t* nm;
   1757 	/** The length of nm. */
   1758 	size_t nmlen;
   1759 };
   1760 
   1761 #ifdef CLIENT_SUBNET
   1762 static void addrtree_traverse_visit_node(struct addrnode* n, addrkey_t* addr,
   1763 	size_t addr_size, int is_ipv6, time_t now, struct query_info* q,
   1764 	void (*func)(struct query_info*, struct reply_info*, addrkey_t*,
   1765 		size_t, int, addrlen_t, int, time_t, void*), void* arg);
   1766 
   1767 /** Lookup in subnet addrtree */
   1768 static void
   1769 cache_lookup_subnet_addrnode(struct query_info* q, struct reply_info* d,
   1770 	addrkey_t* addr, size_t addr_size, int is_ipv6, addrlen_t scope,
   1771 	int only_match_scope_zero, time_t ttl, void* arg)
   1772 {
   1773 	size_t i;
   1774 	char s[65535], tp[32], cl[32], rc[32], fg[32], astr[64];
   1775 	struct cache_lookup_info* inf = (struct cache_lookup_info*)arg;
   1776 	if(is_ipv6) {
   1777 		if(addr_size < 16 || inet_ntop(AF_INET6, addr, astr,
   1778 			sizeof(astr)) == NULL)
   1779 			snprintf(astr, sizeof(astr), "(inet6ntoperror)");
   1780 	} else {
   1781 		if(addr_size < 4 || inet_ntop(AF_INET, addr, astr,
   1782 			sizeof(astr)) == NULL)
   1783 			snprintf(astr, sizeof(astr), "(inetntoperror)");
   1784 	}
   1785 	sldns_wire2str_dname_buf(q->qname, q->qname_len, s, sizeof(s));
   1786 	sldns_wire2str_type_buf(q->qtype, tp, sizeof(tp));
   1787 	sldns_wire2str_class_buf(q->qclass, cl, sizeof(cl));
   1788 	sldns_wire2str_rcode_buf(FLAGS_GET_RCODE(d->flags),
   1789 		rc, sizeof(rc));
   1790 	snprintf(fg, sizeof(fg), "%s%s%s%s%s%s%s%s",
   1791 		((d->flags&BIT_QR)?" QR":""),
   1792 		((d->flags&BIT_AA)?" AA":""),
   1793 		((d->flags&BIT_TC)?" TC":""),
   1794 		((d->flags&BIT_RD)?" RD":""),
   1795 		((d->flags&BIT_RA)?" RA":""),
   1796 		((d->flags&BIT_Z)?" Z":""),
   1797 		((d->flags&BIT_AD)?" AD":""),
   1798 		((d->flags&BIT_CD)?" CD":""));
   1799 	if(!rrset_array_lock(d->ref, d->rrset_count,
   1800 		*inf->worker->env.now)) {
   1801 		/* rrsets have timed out or do not exist */
   1802 		return;
   1803 	}
   1804 	if(!ssl_printf(inf->ssl, "subnet %s/%d%s %s %s %s " ARG_LL "d\n", astr,
   1805 		(int)scope, (only_match_scope_zero?" scope_zero":""),
   1806 		s, cl, tp, (long long)(ttl-*inf->worker->env.now))) {
   1807 		rrset_array_unlock(d->ref, d->rrset_count);
   1808 		return;
   1809 	}
   1810 	ssl_printf(inf->ssl,
   1811 		"subnet msg %s %s %s%s %s %d %d " ARG_LL "d %d %u %u %u %d %s\n",
   1812 		s, cl, tp, fg, rc,
   1813 		(int)d->flags, (int)d->qdcount,
   1814 		(long long)(d->ttl-*inf->worker->env.now),
   1815 		(int)d->security,
   1816 		(unsigned)d->an_numrrsets,
   1817 		(unsigned)d->ns_numrrsets,
   1818 		(unsigned)d->ar_numrrsets,
   1819 		(int)d->reason_bogus,
   1820 		d->reason_bogus_str?d->reason_bogus_str:"");
   1821 	for(i=0; i<d->rrset_count; i++) {
   1822 		struct ub_packed_rrset_key* rk = d->rrsets[i];
   1823 		struct packed_rrset_data* rd = (struct packed_rrset_data*)rk->entry.data;
   1824 		size_t j;
   1825 		for(j=0; j<rd->count + rd->rrsig_count; j++) {
   1826 			if(!packed_rr_to_string(rk, j,
   1827 				*inf->worker->env.now, s, sizeof(s))) {
   1828 				ssl_printf(inf->ssl, "BADRR\n");
   1829 			} else {
   1830 				ssl_printf(inf->ssl, "%s", s);
   1831 			}
   1832 		}
   1833 	}
   1834 	rrset_array_unlock(d->ref, d->rrset_count);
   1835 	ssl_printf(inf->ssl, "\n");
   1836 }
   1837 
   1838 /** Visit an edge in subnet addrtree traverse */
   1839 static void
   1840 addrtree_traverse_visit_edge(struct addredge* edge, addrkey_t* addr,
   1841 	size_t addr_size, int is_ipv6, time_t now, struct query_info* q,
   1842 	void (*func)(struct query_info*, struct reply_info*, addrkey_t*,
   1843 		size_t, int, addrlen_t, int, time_t, void*), void* arg)
   1844 {
   1845 	size_t n;
   1846 	addrlen_t addrlen;
   1847 	if(!edge || !edge->node)
   1848 		return;
   1849 	addrlen = edge->len;
   1850 	/* ceil() */
   1851 	n = (size_t)((addrlen / KEYWIDTH) + ((addrlen % KEYWIDTH != 0)?1:0));
   1852 	if(n > addr_size)
   1853 		n = addr_size;
   1854 	memset(addr, 0, addr_size);
   1855 	memcpy(addr, edge->str, n);
   1856 	addrtree_traverse_visit_node(edge->node, addr, addr_size, is_ipv6,
   1857 		now, q, func, arg);
   1858 }
   1859 
   1860 /** Visit a node in subnet addrtree traverse */
   1861 static void
   1862 addrtree_traverse_visit_node(struct addrnode* n, addrkey_t* addr,
   1863 	size_t addr_size, int is_ipv6, time_t now, struct query_info* q,
   1864 	void (*func)(struct query_info*, struct reply_info*, addrkey_t*,
   1865 		size_t, int, addrlen_t, int, time_t, void*), void* arg)
   1866 {
   1867 	/* If this node has data, and not expired. */
   1868 	if(n->elem && n->ttl >= now) {
   1869 		func(q, (struct reply_info*)n->elem, addr, addr_size, is_ipv6,
   1870 			n->scope, n->only_match_scope_zero, n->ttl, arg);
   1871 	}
   1872 	/* Traverse edges. */
   1873 	addrtree_traverse_visit_edge(n->edge[0], addr, addr_size, is_ipv6,
   1874 		now, q, func, arg);
   1875 	addrtree_traverse_visit_edge(n->edge[1], addr, addr_size, is_ipv6,
   1876 		now, q, func, arg);
   1877 }
   1878 
   1879 /** Traverse subnet addrtree */
   1880 static void
   1881 addrtree_traverse(struct addrtree* tree, int is_ipv6, time_t now,
   1882 	struct query_info* q,
   1883 	void (*func)(struct query_info*, struct reply_info*, addrkey_t*,
   1884 		size_t, int, addrlen_t, int, time_t, void*), void* arg)
   1885 {
   1886 	uint8_t addr[16]; /* Large enough for IPv4 and IPv6. */
   1887 	memset(addr, 0, sizeof(addr));
   1888 	addrtree_traverse_visit_node(tree->root, (addrkey_t*)addr,
   1889 		sizeof(addr), is_ipv6, now, q, func, arg);
   1890 }
   1891 
   1892 /** Lookup cache_lookup for subnet content. */
   1893 static void
   1894 cache_lookup_subnet_msg(struct lruhash_entry* e, void* arg)
   1895 {
   1896 	struct cache_lookup_info* inf = (struct cache_lookup_info*)arg;
   1897 	struct msgreply_entry *k = (struct msgreply_entry*)e->key;
   1898 	struct subnet_msg_cache_data* d =
   1899 		(struct subnet_msg_cache_data*)e->data;
   1900 	if(!dname_subdomain_c(k->key.qname, inf->nm))
   1901 		return;
   1902 
   1903 	if(d->tree4) {
   1904 		addrtree_traverse(d->tree4, 0, *inf->worker->env.now, &k->key,
   1905 			&cache_lookup_subnet_addrnode, inf);
   1906 	}
   1907 	if(d->tree6) {
   1908 		addrtree_traverse(d->tree6, 1, *inf->worker->env.now, &k->key,
   1909 			&cache_lookup_subnet_addrnode, inf);
   1910 	}
   1911 }
   1912 #endif /* CLIENT_SUBNET */
   1913 
   1914 static void
   1915 cache_lookup_rrset(struct lruhash_entry* e, void* arg)
   1916 {
   1917 	struct cache_lookup_info* inf = (struct cache_lookup_info*)arg;
   1918 	struct ub_packed_rrset_key* k = (struct ub_packed_rrset_key*)e->key;
   1919 	struct packed_rrset_data* d = (struct packed_rrset_data*)e->data;
   1920 	if(*inf->worker->env.now < d->ttl &&
   1921 		k->id != 0 && /* not deleted */
   1922 		dname_subdomain_c(k->rk.dname, inf->nm)) {
   1923 		size_t i;
   1924 		for(i=0; i<d->count + d->rrsig_count; i++) {
   1925 			char s[65535];
   1926 			if(!packed_rr_to_string(k, i, *inf->worker->env.now,
   1927 				s, sizeof(s))) {
   1928 				ssl_printf(inf->ssl, "BADRR\n");
   1929 				return;
   1930 			}
   1931 			ssl_printf(inf->ssl, "%s", s);
   1932 		}
   1933 		ssl_printf(inf->ssl, "\n");
   1934 	}
   1935 }
   1936 
   1937 static void
   1938 cache_lookup_msg(struct lruhash_entry* e, void* arg)
   1939 {
   1940 	struct cache_lookup_info* inf = (struct cache_lookup_info*)arg;
   1941 	struct msgreply_entry* k = (struct msgreply_entry*)e->key;
   1942 	struct reply_info* d = (struct reply_info*)e->data;
   1943 	if(*inf->worker->env.now < d->ttl &&
   1944 		dname_subdomain_c(k->key.qname, inf->nm)) {
   1945 		size_t i;
   1946 		char s[65535], tp[32], cl[32], rc[32], fg[32];
   1947 		sldns_wire2str_dname_buf(k->key.qname, k->key.qname_len,
   1948 			s, sizeof(s));
   1949 		sldns_wire2str_type_buf(k->key.qtype, tp, sizeof(tp));
   1950 		sldns_wire2str_class_buf(k->key.qclass, cl, sizeof(cl));
   1951 		sldns_wire2str_rcode_buf(FLAGS_GET_RCODE(d->flags),
   1952 			rc, sizeof(rc));
   1953 		snprintf(fg, sizeof(fg), "%s%s%s%s%s%s%s%s",
   1954 			((d->flags&BIT_QR)?" QR":""),
   1955 			((d->flags&BIT_AA)?" AA":""),
   1956 			((d->flags&BIT_TC)?" TC":""),
   1957 			((d->flags&BIT_RD)?" RD":""),
   1958 			((d->flags&BIT_RA)?" RA":""),
   1959 			((d->flags&BIT_Z)?" Z":""),
   1960 			((d->flags&BIT_AD)?" AD":""),
   1961 			((d->flags&BIT_CD)?" CD":""));
   1962 		if(!rrset_array_lock(d->ref, d->rrset_count,
   1963 			*inf->worker->env.now)) {
   1964 			/* rrsets have timed out or do not exist */
   1965 			return;
   1966 		}
   1967 		ssl_printf(inf->ssl,
   1968 			"msg %s %s %s%s %s %d %d " ARG_LL "d %d %u %u %u %d %s\n",
   1969 			s, cl, tp, fg, rc,
   1970 			(int)d->flags, (int)d->qdcount,
   1971 			(long long)(d->ttl-*inf->worker->env.now),
   1972 			(int)d->security,
   1973 			(unsigned)d->an_numrrsets,
   1974 			(unsigned)d->ns_numrrsets,
   1975 			(unsigned)d->ar_numrrsets,
   1976 			(int)d->reason_bogus,
   1977 			d->reason_bogus_str?d->reason_bogus_str:"");
   1978 		for(i=0; i<d->rrset_count; i++) {
   1979 			struct ub_packed_rrset_key* rk = d->rrsets[i];
   1980 			struct packed_rrset_data* rd = (struct packed_rrset_data*)rk->entry.data;
   1981 			size_t j;
   1982 			for(j=0; j<rd->count + rd->rrsig_count; j++) {
   1983 				if(!packed_rr_to_string(rk, j,
   1984 					*inf->worker->env.now, s, sizeof(s))) {
   1985 					rrset_array_unlock(d->ref, d->rrset_count);
   1986 					ssl_printf(inf->ssl, "BADRR\n");
   1987 					return;
   1988 				}
   1989 				ssl_printf(inf->ssl, "%s", s);
   1990 			}
   1991 		}
   1992 		rrset_array_unlock(d->ref, d->rrset_count);
   1993 		ssl_printf(inf->ssl, "\n");
   1994 	}
   1995 }
   1996 
   1997 /** perform cache search for domain */
   1998 static void
   1999 do_cache_lookup_domain(RES* ssl, struct worker* worker, uint8_t* nm,
   2000 	size_t nmlen)
   2001 {
   2002 #ifdef CLIENT_SUBNET
   2003 	int m;
   2004 	struct subnet_env* sn_env = NULL;
   2005 #endif /* CLIENT_SUBNET */
   2006 	struct cache_lookup_info inf;
   2007 	inf.ssl = ssl;
   2008 	inf.worker = worker;
   2009 	inf.nm = nm;
   2010 	inf.nmlen = nmlen;
   2011 
   2012 #ifdef CLIENT_SUBNET
   2013 	m = modstack_find(worker->env.modstack, "subnetcache");
   2014 	if(m != -1) sn_env = (struct subnet_env*)worker->env.modinfo[m];
   2015 	if(sn_env) {
   2016 		lock_rw_rdlock(&sn_env->biglock);
   2017 		slabhash_traverse(sn_env->subnet_msg_cache, 0,
   2018 			&cache_lookup_subnet_msg, &inf);
   2019 		lock_rw_unlock(&sn_env->biglock);
   2020 	}
   2021 #endif /* CLIENT_SUBNET */
   2022 
   2023 	slabhash_traverse(&worker->env.rrset_cache->table, 0,
   2024 		&cache_lookup_rrset, &inf);
   2025 	slabhash_traverse(worker->env.msg_cache, 0, &cache_lookup_msg, &inf);
   2026 }
   2027 
   2028 /** cache lookup of domain */
   2029 static void
   2030 do_cache_lookup(RES* ssl, struct worker* worker, char* arg)
   2031 {
   2032 	uint8_t nm[LDNS_MAX_DOMAINLEN+1];
   2033 	size_t nmlen;
   2034 	int status;
   2035 	char* s = arg, *next = NULL;
   2036 	int allow_long = 0;
   2037 
   2038 	if(arg[0] == '+' && arg[1] == 't' && (arg[2]==' ' || arg[2]=='\t')) {
   2039 		allow_long = 1;
   2040 		s = arg+2;
   2041 	}
   2042 
   2043 	/* Find the commandline arguments of domains. */
   2044 	while(s && *s != 0) {
   2045 		s = skipwhite(s);
   2046 		if(*s == 0)
   2047 			break;
   2048 		if(strchr(s, ' ') || strchr(s, '\t')) {
   2049 			char* sp = strchr(s, ' ');
   2050 			if(strchr(s, '\t') != 0 && strchr(s, '\t') < sp)
   2051 				sp = strchr(s, '\t');
   2052 			*sp = 0;
   2053 			next = sp+1;
   2054 		} else {
   2055 			next = NULL;
   2056 		}
   2057 
   2058 		nmlen = sizeof(nm);
   2059 		status = sldns_str2wire_dname_buf(s, nm, &nmlen);
   2060 		if(status != 0) {
   2061 			ssl_printf(ssl, "error cannot parse name %s at %d: %s\n", s,
   2062 				LDNS_WIREPARSE_OFFSET(status),
   2063 				sldns_get_errorstr_parse(status));
   2064 			return;
   2065 		}
   2066 		if(!allow_long && dname_count_labels(nm) < 3) {
   2067 			ssl_printf(ssl, "error name too short: '%s'. Need example.com. or longer, short names take very long, use +t to allow them.\n", s);
   2068 			return;
   2069 		}
   2070 
   2071 		do_cache_lookup_domain(ssl, worker, nm, nmlen);
   2072 
   2073 		s = next;
   2074 	}
   2075 }
   2076 
   2077 /** cache lookup of nameservers */
   2078 static void
   2079 do_lookup(RES* ssl, struct worker* worker, char* arg)
   2080 {
   2081 	uint8_t* nm;
   2082 	int nmlabs;
   2083 	size_t nmlen;
   2084 	if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
   2085 		return;
   2086 	(void)print_deleg_lookup(ssl, worker, nm, nmlen, nmlabs);
   2087 	free(nm);
   2088 }
   2089 
   2090 /** flush something from rrset and msg caches */
   2091 static void
   2092 do_cache_remove(struct worker* worker, uint8_t* nm, size_t nmlen,
   2093 	uint16_t t, uint16_t c, int remcachedb)
   2094 {
   2095 	hashvalue_type h;
   2096 	struct query_info k;
   2097 	rrset_cache_remove(worker->env.rrset_cache, nm, nmlen, t, c, 0);
   2098 	if(t == LDNS_RR_TYPE_SOA)
   2099 		rrset_cache_remove(worker->env.rrset_cache, nm, nmlen, t, c,
   2100 			PACKED_RRSET_SOA_NEG);
   2101 	k.qname = nm;
   2102 	k.qname_len = nmlen;
   2103 	k.qtype = t;
   2104 	k.qclass = c;
   2105 	k.local_alias = NULL;
   2106 	h = query_info_hash(&k, 0);
   2107 	slabhash_remove(worker->env.msg_cache, h, &k);
   2108 	if(t == LDNS_RR_TYPE_AAAA) {
   2109 		/* for AAAA also flush dns64 bit_cd packet */
   2110 		h = query_info_hash(&k, BIT_CD);
   2111 		slabhash_remove(worker->env.msg_cache, h, &k);
   2112 	}
   2113 #ifdef USE_CACHEDB
   2114 	if(remcachedb && worker->env.cachedb_enabled)
   2115 		cachedb_msg_remove_qinfo(&worker->env, &k);
   2116 #else
   2117 	(void)remcachedb;
   2118 #endif
   2119 }
   2120 
   2121 /** parse '+c' option, modifies string to return remainder. */
   2122 static int
   2123 parse_remcachedb(RES* ssl, char** arg, int* pc)
   2124 {
   2125 	*arg = skipwhite(*arg);
   2126 	if((*arg)[0] == '+' && (*arg)[1] == 'c') {
   2127 		char* arg2;
   2128 		*pc = 1;
   2129 		if(!find_arg2(ssl, *arg, &arg2))
   2130 			return 0;
   2131 		*arg = arg2;
   2132 		return 1;
   2133 	}
   2134 	/* The option was not found, no problem */
   2135 	return 1;
   2136 }
   2137 
   2138 /** flush a type */
   2139 static void
   2140 do_flush_type(RES* ssl, struct worker* worker, char* arg)
   2141 {
   2142 	uint8_t* nm;
   2143 	int nmlabs;
   2144 	size_t nmlen;
   2145 	char* arg2;
   2146 	uint16_t t;
   2147 	int pc = 0; /* '+c' option */
   2148 	if(!parse_remcachedb(ssl, &arg, &pc))
   2149 		return;
   2150 	if(!find_arg2(ssl, arg, &arg2))
   2151 		return;
   2152 	if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
   2153 		return;
   2154 	t = sldns_get_rr_type_by_name(arg2);
   2155 	if(t == 0 && strcmp(arg2, "TYPE0") != 0) {
   2156 		(void)ssl_printf(ssl, "error parsing RRset type: '%s'\n", arg2);
   2157 		free(nm);
   2158 		return;
   2159 	}
   2160 	do_cache_remove(worker, nm, nmlen, t, LDNS_RR_CLASS_IN, pc);
   2161 
   2162 	free(nm);
   2163 	send_ok(ssl);
   2164 }
   2165 
   2166 /** flush statistics */
   2167 static void
   2168 do_flush_stats(RES* ssl, struct worker* worker)
   2169 {
   2170 	worker_stats_clear(worker);
   2171 	send_ok(ssl);
   2172 }
   2173 
   2174 /**
   2175  * Local info for deletion functions
   2176  */
   2177 struct del_info {
   2178 	/** worker */
   2179 	struct worker* worker;
   2180 	/** name to delete */
   2181 	uint8_t* name;
   2182 	/** length */
   2183 	size_t len;
   2184 	/** labels */
   2185 	int labs;
   2186 	/** time to invalidate to */
   2187 	time_t expired;
   2188 	/** number of rrsets removed */
   2189 	size_t num_rrsets;
   2190 	/** number of msgs removed */
   2191 	size_t num_msgs;
   2192 	/** number of key entries removed */
   2193 	size_t num_keys;
   2194 	/** length of addr */
   2195 	socklen_t addrlen;
   2196 	/** socket address for host deletion */
   2197 	struct sockaddr_storage addr;
   2198 	/** if cachedb information should be flushed too */
   2199 	int remcachedb;
   2200 };
   2201 
   2202 /** callback to delete hosts in infra cache */
   2203 static void
   2204 infra_del_host(struct lruhash_entry* e, void* arg)
   2205 {
   2206 	/* entry is locked */
   2207 	struct del_info* inf = (struct del_info*)arg;
   2208 	struct infra_key* k = (struct infra_key*)e->key;
   2209 	if(sockaddr_cmp(&inf->addr, inf->addrlen, &k->addr, k->addrlen) == 0) {
   2210 		struct infra_data* d = (struct infra_data*)e->data;
   2211 		d->probedelay = 0;
   2212 		d->timeout_A = 0;
   2213 		d->timeout_AAAA = 0;
   2214 		d->timeout_other = 0;
   2215 		rtt_init(&d->rtt);
   2216 		if(d->ttl > inf->expired) {
   2217 			d->ttl = inf->expired;
   2218 			inf->num_keys++;
   2219 		}
   2220 	}
   2221 }
   2222 
   2223 /** flush infra cache */
   2224 static void
   2225 do_flush_infra(RES* ssl, struct worker* worker, char* arg)
   2226 {
   2227 	struct sockaddr_storage addr;
   2228 	socklen_t len;
   2229 	struct del_info inf;
   2230 	if(strcmp(arg, "all") == 0) {
   2231 		slabhash_clear(worker->env.infra_cache->hosts);
   2232 		send_ok(ssl);
   2233 		return;
   2234 	}
   2235 	if(!ipstrtoaddr(arg, UNBOUND_DNS_PORT, &addr, &len)) {
   2236 		(void)ssl_printf(ssl, "error parsing ip addr: '%s'\n", arg);
   2237 		return;
   2238 	}
   2239 	/* delete all entries from cache */
   2240 	/* what we do is to set them all expired */
   2241 	inf.worker = worker;
   2242 	inf.name = 0;
   2243 	inf.len = 0;
   2244 	inf.labs = 0;
   2245 	inf.expired = *worker->env.now;
   2246 	inf.expired -= 3; /* handle 3 seconds skew between threads */
   2247 	inf.num_rrsets = 0;
   2248 	inf.num_msgs = 0;
   2249 	inf.num_keys = 0;
   2250 	inf.addrlen = len;
   2251 	inf.remcachedb = 0;
   2252 	memmove(&inf.addr, &addr, len);
   2253 	slabhash_traverse(worker->env.infra_cache->hosts, 1, &infra_del_host,
   2254 		&inf);
   2255 	send_ok(ssl);
   2256 }
   2257 
   2258 /** flush requestlist */
   2259 static void
   2260 do_flush_requestlist(RES* ssl, struct worker* worker)
   2261 {
   2262 	mesh_delete_all(worker->env.mesh);
   2263 	send_ok(ssl);
   2264 }
   2265 
   2266 /** callback to delete rrsets in a zone */
   2267 static void
   2268 zone_del_rrset(struct lruhash_entry* e, void* arg)
   2269 {
   2270 	/* entry is locked */
   2271 	struct del_info* inf = (struct del_info*)arg;
   2272 	struct ub_packed_rrset_key* k = (struct ub_packed_rrset_key*)e->key;
   2273 	if(dname_subdomain_c(k->rk.dname, inf->name)) {
   2274 		struct packed_rrset_data* d =
   2275 			(struct packed_rrset_data*)e->data;
   2276 		if(d->ttl > inf->expired) {
   2277 			d->ttl = inf->expired;
   2278 			inf->num_rrsets++;
   2279 		}
   2280 	}
   2281 }
   2282 
   2283 /** callback to delete messages in a zone */
   2284 static void
   2285 zone_del_msg(struct lruhash_entry* e, void* arg)
   2286 {
   2287 	/* entry is locked */
   2288 	struct del_info* inf = (struct del_info*)arg;
   2289 	struct msgreply_entry* k = (struct msgreply_entry*)e->key;
   2290 	if(dname_subdomain_c(k->key.qname, inf->name)) {
   2291 		struct reply_info* d = (struct reply_info*)e->data;
   2292 		if(d->ttl > inf->expired) {
   2293 			d->ttl = inf->expired;
   2294 			d->prefetch_ttl = inf->expired;
   2295 			d->serve_expired_ttl = inf->expired;
   2296 			inf->num_msgs++;
   2297 		}
   2298 #ifdef USE_CACHEDB
   2299 		if(inf->remcachedb && inf->worker->env.cachedb_enabled)
   2300 			cachedb_msg_remove_qinfo(&inf->worker->env, &k->key);
   2301 #endif
   2302 	}
   2303 }
   2304 
   2305 /** callback to delete keys in zone */
   2306 static void
   2307 zone_del_kcache(struct lruhash_entry* e, void* arg)
   2308 {
   2309 	/* entry is locked */
   2310 	struct del_info* inf = (struct del_info*)arg;
   2311 	struct key_entry_key* k = (struct key_entry_key*)e->key;
   2312 	if(dname_subdomain_c(k->name, inf->name)) {
   2313 		struct key_entry_data* d = (struct key_entry_data*)e->data;
   2314 		if(d->ttl > inf->expired) {
   2315 			d->ttl = inf->expired;
   2316 			inf->num_keys++;
   2317 		}
   2318 	}
   2319 }
   2320 
   2321 /** remove all rrsets and keys from zone from cache */
   2322 static void
   2323 do_flush_zone(RES* ssl, struct worker* worker, char* arg)
   2324 {
   2325 	uint8_t* nm;
   2326 	int nmlabs;
   2327 	size_t nmlen;
   2328 	struct del_info inf;
   2329 	int pc = 0; /* '+c' option */
   2330 	if(!parse_remcachedb(ssl, &arg, &pc))
   2331 		return;
   2332 	if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
   2333 		return;
   2334 	/* delete all RRs and key entries from zone */
   2335 	/* what we do is to set them all expired */
   2336 	inf.worker = worker;
   2337 	inf.name = nm;
   2338 	inf.len = nmlen;
   2339 	inf.labs = nmlabs;
   2340 	inf.expired = *worker->env.now;
   2341 	inf.expired -= 3; /* handle 3 seconds skew between threads */
   2342 	inf.num_rrsets = 0;
   2343 	inf.num_msgs = 0;
   2344 	inf.num_keys = 0;
   2345 	inf.remcachedb = pc;
   2346 	slabhash_traverse(&worker->env.rrset_cache->table, 1,
   2347 		&zone_del_rrset, &inf);
   2348 
   2349 	slabhash_traverse(worker->env.msg_cache, 1, &zone_del_msg, &inf);
   2350 
   2351 	/* and validator cache */
   2352 	if(worker->env.key_cache) {
   2353 		slabhash_traverse(worker->env.key_cache->slab, 1,
   2354 			&zone_del_kcache, &inf);
   2355 	}
   2356 
   2357 	free(nm);
   2358 
   2359 	(void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages "
   2360 		"and %lu key entries\n", (unsigned long)inf.num_rrsets,
   2361 		(unsigned long)inf.num_msgs, (unsigned long)inf.num_keys);
   2362 }
   2363 
   2364 /** callback to delete bogus rrsets */
   2365 static void
   2366 bogus_del_rrset(struct lruhash_entry* e, void* arg)
   2367 {
   2368 	/* entry is locked */
   2369 	struct del_info* inf = (struct del_info*)arg;
   2370 	struct packed_rrset_data* d = (struct packed_rrset_data*)e->data;
   2371 	if(d->security == sec_status_bogus && d->ttl > inf->expired) {
   2372 		d->ttl = inf->expired;
   2373 		inf->num_rrsets++;
   2374 	}
   2375 }
   2376 
   2377 /** callback to delete bogus messages */
   2378 static void
   2379 bogus_del_msg(struct lruhash_entry* e, void* arg)
   2380 {
   2381 	/* entry is locked */
   2382 	struct del_info* inf = (struct del_info*)arg;
   2383 	struct reply_info* d = (struct reply_info*)e->data;
   2384 	if(d->security == sec_status_bogus && d->ttl > inf->expired) {
   2385 		d->ttl = inf->expired;
   2386 		d->prefetch_ttl = inf->expired;
   2387 		d->serve_expired_ttl = inf->expired;
   2388 		inf->num_msgs++;
   2389 #ifdef USE_CACHEDB
   2390 		if(inf->remcachedb && inf->worker->env.cachedb_enabled)
   2391 			cachedb_msg_remove_qinfo(&inf->worker->env,
   2392 				&((struct msgreply_entry*)e->key)->key);
   2393 #endif
   2394 	}
   2395 }
   2396 
   2397 /** callback to delete bogus keys */
   2398 static void
   2399 bogus_del_kcache(struct lruhash_entry* e, void* arg)
   2400 {
   2401 	/* entry is locked */
   2402 	struct del_info* inf = (struct del_info*)arg;
   2403 	struct key_entry_data* d = (struct key_entry_data*)e->data;
   2404 	if(d->isbad && d->ttl > inf->expired) {
   2405 		d->ttl = inf->expired;
   2406 		inf->num_keys++;
   2407 	}
   2408 }
   2409 
   2410 /** remove all bogus rrsets, msgs and keys from cache */
   2411 static void
   2412 do_flush_bogus(RES* ssl, struct worker* worker, char* arg)
   2413 {
   2414 	struct del_info inf;
   2415 	int pc = 0; /* '+c' option */
   2416 	if(!parse_remcachedb(ssl, &arg, &pc))
   2417 		return;
   2418 	/* what we do is to set them all expired */
   2419 	inf.worker = worker;
   2420 	inf.expired = *worker->env.now;
   2421 	inf.expired -= 3; /* handle 3 seconds skew between threads */
   2422 	inf.num_rrsets = 0;
   2423 	inf.num_msgs = 0;
   2424 	inf.num_keys = 0;
   2425 	inf.remcachedb = pc;
   2426 	slabhash_traverse(&worker->env.rrset_cache->table, 1,
   2427 		&bogus_del_rrset, &inf);
   2428 
   2429 	slabhash_traverse(worker->env.msg_cache, 1, &bogus_del_msg, &inf);
   2430 
   2431 	/* and validator cache */
   2432 	if(worker->env.key_cache) {
   2433 		slabhash_traverse(worker->env.key_cache->slab, 1,
   2434 			&bogus_del_kcache, &inf);
   2435 	}
   2436 
   2437 	(void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages "
   2438 		"and %lu key entries\n", (unsigned long)inf.num_rrsets,
   2439 		(unsigned long)inf.num_msgs, (unsigned long)inf.num_keys);
   2440 }
   2441 
   2442 /** callback to delete negative and servfail rrsets */
   2443 static void
   2444 negative_del_rrset(struct lruhash_entry* e, void* arg)
   2445 {
   2446 	/* entry is locked */
   2447 	struct del_info* inf = (struct del_info*)arg;
   2448 	struct ub_packed_rrset_key* k = (struct ub_packed_rrset_key*)e->key;
   2449 	struct packed_rrset_data* d = (struct packed_rrset_data*)e->data;
   2450 	/* delete the parentside negative cache rrsets,
   2451 	 * these are nameserver rrsets that failed lookup, rdata empty */
   2452 	if((k->rk.flags & PACKED_RRSET_PARENT_SIDE) && d->count == 1 &&
   2453 		d->rrsig_count == 0 && d->rr_len[0] == 0 &&
   2454 		d->ttl > inf->expired) {
   2455 		d->ttl = inf->expired;
   2456 		inf->num_rrsets++;
   2457 	}
   2458 }
   2459 
   2460 /** callback to delete negative and servfail messages */
   2461 static void
   2462 negative_del_msg(struct lruhash_entry* e, void* arg)
   2463 {
   2464 	/* entry is locked */
   2465 	struct del_info* inf = (struct del_info*)arg;
   2466 	struct reply_info* d = (struct reply_info*)e->data;
   2467 	/* rcode not NOERROR: NXDOMAIN, SERVFAIL, ..: an nxdomain or error
   2468 	 * or NOERROR rcode with ANCOUNT==0: a NODATA answer */
   2469 	if((FLAGS_GET_RCODE(d->flags) != 0 || d->an_numrrsets == 0) &&
   2470 		d->ttl > inf->expired) {
   2471 		d->ttl = inf->expired;
   2472 		d->prefetch_ttl = inf->expired;
   2473 		d->serve_expired_ttl = inf->expired;
   2474 		inf->num_msgs++;
   2475 #ifdef USE_CACHEDB
   2476 		if(inf->remcachedb && inf->worker->env.cachedb_enabled)
   2477 			cachedb_msg_remove_qinfo(&inf->worker->env,
   2478 				&((struct msgreply_entry*)e->key)->key);
   2479 #endif
   2480 	}
   2481 }
   2482 
   2483 /** callback to delete negative key entries */
   2484 static void
   2485 negative_del_kcache(struct lruhash_entry* e, void* arg)
   2486 {
   2487 	/* entry is locked */
   2488 	struct del_info* inf = (struct del_info*)arg;
   2489 	struct key_entry_data* d = (struct key_entry_data*)e->data;
   2490 	/* could be bad because of lookup failure on the DS, DNSKEY, which
   2491 	 * was nxdomain or servfail, and thus a result of negative lookups */
   2492 	if(d->isbad && d->ttl > inf->expired) {
   2493 		d->ttl = inf->expired;
   2494 		inf->num_keys++;
   2495 	}
   2496 }
   2497 
   2498 /** remove all negative(NODATA,NXDOMAIN), and servfail messages from cache */
   2499 static void
   2500 do_flush_negative(RES* ssl, struct worker* worker, char* arg)
   2501 {
   2502 	struct del_info inf;
   2503 	int pc = 0; /* '+c' option */
   2504 	if(!parse_remcachedb(ssl, &arg, &pc))
   2505 		return;
   2506 	/* what we do is to set them all expired */
   2507 	inf.worker = worker;
   2508 	inf.expired = *worker->env.now;
   2509 	inf.expired -= 3; /* handle 3 seconds skew between threads */
   2510 	inf.num_rrsets = 0;
   2511 	inf.num_msgs = 0;
   2512 	inf.num_keys = 0;
   2513 	inf.remcachedb = pc;
   2514 	slabhash_traverse(&worker->env.rrset_cache->table, 1,
   2515 		&negative_del_rrset, &inf);
   2516 
   2517 	slabhash_traverse(worker->env.msg_cache, 1, &negative_del_msg, &inf);
   2518 
   2519 	/* and validator cache */
   2520 	if(worker->env.key_cache) {
   2521 		slabhash_traverse(worker->env.key_cache->slab, 1,
   2522 			&negative_del_kcache, &inf);
   2523 	}
   2524 
   2525 	(void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages "
   2526 		"and %lu key entries\n", (unsigned long)inf.num_rrsets,
   2527 		(unsigned long)inf.num_msgs, (unsigned long)inf.num_keys);
   2528 }
   2529 
   2530 /** remove name rrset from cache */
   2531 static void
   2532 do_flush_name(RES* ssl, struct worker* w, char* arg)
   2533 {
   2534 	uint8_t* nm;
   2535 	int nmlabs;
   2536 	size_t nmlen;
   2537 	int pc = 0; /* '+c' option */
   2538 	if(!parse_remcachedb(ssl, &arg, &pc))
   2539 		return;
   2540 	if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
   2541 		return;
   2542 	do_cache_remove(w, nm, nmlen, LDNS_RR_TYPE_A, LDNS_RR_CLASS_IN, pc);
   2543 	do_cache_remove(w, nm, nmlen, LDNS_RR_TYPE_AAAA, LDNS_RR_CLASS_IN, pc);
   2544 	do_cache_remove(w, nm, nmlen, LDNS_RR_TYPE_NS, LDNS_RR_CLASS_IN, pc);
   2545 	do_cache_remove(w, nm, nmlen, LDNS_RR_TYPE_SOA, LDNS_RR_CLASS_IN, pc);
   2546 	do_cache_remove(w, nm, nmlen, LDNS_RR_TYPE_CNAME, LDNS_RR_CLASS_IN, pc);
   2547 	do_cache_remove(w, nm, nmlen, LDNS_RR_TYPE_DNAME, LDNS_RR_CLASS_IN, pc);
   2548 	do_cache_remove(w, nm, nmlen, LDNS_RR_TYPE_MX, LDNS_RR_CLASS_IN, pc);
   2549 	do_cache_remove(w, nm, nmlen, LDNS_RR_TYPE_PTR, LDNS_RR_CLASS_IN, pc);
   2550 	do_cache_remove(w, nm, nmlen, LDNS_RR_TYPE_SRV, LDNS_RR_CLASS_IN, pc);
   2551 	do_cache_remove(w, nm, nmlen, LDNS_RR_TYPE_NAPTR, LDNS_RR_CLASS_IN, pc);
   2552 	do_cache_remove(w, nm, nmlen, LDNS_RR_TYPE_SVCB, LDNS_RR_CLASS_IN, pc);
   2553 	do_cache_remove(w, nm, nmlen, LDNS_RR_TYPE_HTTPS, LDNS_RR_CLASS_IN, pc);
   2554 
   2555 	free(nm);
   2556 	send_ok(ssl);
   2557 }
   2558 
   2559 /** printout a delegation point info */
   2560 static int
   2561 ssl_print_name_dp(RES* ssl, const char* str, uint8_t* nm, uint16_t dclass,
   2562 	struct delegpt* dp)
   2563 {
   2564 	char buf[LDNS_MAX_DOMAINLEN];
   2565 	struct delegpt_ns* ns;
   2566 	struct delegpt_addr* a;
   2567 	int f = 0;
   2568 	if(str) { /* print header for forward, stub */
   2569 		char* c = sldns_wire2str_class(dclass);
   2570 		dname_str(nm, buf);
   2571 		if(!ssl_printf(ssl, "%s %s %s ", buf, (c?c:"CLASS??"), str)) {
   2572 			free(c);
   2573 			return 0;
   2574 		}
   2575 		free(c);
   2576 	}
   2577 	for(ns = dp->nslist; ns; ns = ns->next) {
   2578 		dname_str(ns->name, buf);
   2579 		if(!ssl_printf(ssl, "%s%s", (f?" ":""), buf))
   2580 			return 0;
   2581 		f = 1;
   2582 	}
   2583 	for(a = dp->target_list; a; a = a->next_target) {
   2584 		addr_to_str(&a->addr, a->addrlen, buf, sizeof(buf));
   2585 		if(!ssl_printf(ssl, "%s%s", (f?" ":""), buf))
   2586 			return 0;
   2587 		f = 1;
   2588 	}
   2589 	return ssl_printf(ssl, "\n");
   2590 }
   2591 
   2592 
   2593 /** print root forwards */
   2594 static int
   2595 print_root_fwds(RES* ssl, struct iter_forwards* fwds, uint8_t* root)
   2596 {
   2597 	struct delegpt* dp;
   2598 	int nolock = 0;
   2599 	dp = forwards_lookup(fwds, root, LDNS_RR_CLASS_IN, nolock);
   2600 	if(!dp) {
   2601 		return ssl_printf(ssl, "off (using root hints)\n");
   2602 	}
   2603 	/* if dp is returned it must be the root */
   2604 	log_assert(query_dname_compare(dp->name, root)==0);
   2605 	if(!ssl_print_name_dp(ssl, NULL, root, LDNS_RR_CLASS_IN, dp)) {
   2606 		lock_rw_unlock(&fwds->lock);
   2607 		return 0;
   2608 	}
   2609 	lock_rw_unlock(&fwds->lock);
   2610 	return 1;
   2611 }
   2612 
   2613 /** parse args into delegpt */
   2614 static struct delegpt*
   2615 parse_delegpt(RES* ssl, char* args, uint8_t* nm)
   2616 {
   2617 	/* parse args and add in */
   2618 	char* p = args;
   2619 	char* todo;
   2620 	struct delegpt* dp = delegpt_create_mlc(nm);
   2621 	struct sockaddr_storage addr;
   2622 	socklen_t addrlen;
   2623 	char* auth_name;
   2624 	if(!dp) {
   2625 		(void)ssl_printf(ssl, "error out of memory\n");
   2626 		return NULL;
   2627 	}
   2628 	while(p) {
   2629 		todo = p;
   2630 		p = strchr(p, ' '); /* find next spot, if any */
   2631 		if(p) {
   2632 			*p++ = 0;	/* end this spot */
   2633 			p = skipwhite(p); /* position at next spot */
   2634 		}
   2635 		/* parse address */
   2636 		if(!authextstrtoaddr(todo, &addr, &addrlen, &auth_name)) {
   2637 			uint8_t* dname= NULL;
   2638 			int port;
   2639 			dname = authextstrtodname(todo, &port, &auth_name);
   2640 			if(!dname) {
   2641 				(void)ssl_printf(ssl, "error cannot parse"
   2642 					" '%s'\n", todo);
   2643 				delegpt_free_mlc(dp);
   2644 				return NULL;
   2645 			}
   2646 #if ! defined(HAVE_SSL_SET1_HOST) && ! defined(HAVE_X509_VERIFY_PARAM_SET1_HOST)
   2647 			if(auth_name)
   2648 				log_err("no name verification functionality in "
   2649 				"ssl library, ignored name for %s", todo);
   2650 #endif
   2651 			if(!delegpt_add_ns_mlc(dp, dname, 0, auth_name, port)) {
   2652 				(void)ssl_printf(ssl, "error out of memory\n");
   2653 				free(dname);
   2654 				delegpt_free_mlc(dp);
   2655 				return NULL;
   2656 			}
   2657 		} else {
   2658 #if ! defined(HAVE_SSL_SET1_HOST) && ! defined(HAVE_X509_VERIFY_PARAM_SET1_HOST)
   2659 			if(auth_name)
   2660 				log_err("no name verification functionality in "
   2661 				"ssl library, ignored name for %s", todo);
   2662 #endif
   2663 			/* add address */
   2664 			if(!delegpt_add_addr_mlc(dp, &addr, addrlen, 0, 0,
   2665 				auth_name, -1)) {
   2666 				(void)ssl_printf(ssl, "error out of memory\n");
   2667 				delegpt_free_mlc(dp);
   2668 				return NULL;
   2669 			}
   2670 		}
   2671 	}
   2672 	dp->has_parent_side_NS = 1;
   2673 	return dp;
   2674 }
   2675 
   2676 /** do the forward command */
   2677 static void
   2678 do_forward(RES* ssl, struct worker* worker, char* args)
   2679 {
   2680 	struct iter_forwards* fwd = worker->env.fwds;
   2681 	uint8_t* root = (uint8_t*)"\000";
   2682 	int nolock = 0;
   2683 	if(!fwd) {
   2684 		(void)ssl_printf(ssl, "error: structure not allocated\n");
   2685 		return;
   2686 	}
   2687 	if(args == NULL || args[0] == 0) {
   2688 		(void)print_root_fwds(ssl, fwd, root);
   2689 		return;
   2690 	}
   2691 	/* set root forwards for this thread. since we are in remote control
   2692 	 * the actual mesh is not running, so we can freely edit it. */
   2693 	/* delete all the existing queries first */
   2694 	mesh_delete_all(worker->env.mesh);
   2695 	if(strcmp(args, "off") == 0) {
   2696 		forwards_delete_zone(fwd, LDNS_RR_CLASS_IN, root, nolock);
   2697 	} else {
   2698 		struct delegpt* dp;
   2699 		if(!(dp = parse_delegpt(ssl, args, root)))
   2700 			return;
   2701 		if(!forwards_add_zone(fwd, LDNS_RR_CLASS_IN, dp, nolock)) {
   2702 			(void)ssl_printf(ssl, "error out of memory\n");
   2703 			return;
   2704 		}
   2705 	}
   2706 	send_ok(ssl);
   2707 }
   2708 
   2709 static int
   2710 parse_fs_args(RES* ssl, char* args, uint8_t** nm, struct delegpt** dp,
   2711 	int* insecure, int* prime, int* tls)
   2712 {
   2713 	char* zonename;
   2714 	char* rest;
   2715 	size_t nmlen;
   2716 	int nmlabs;
   2717 	/* parse all -x args */
   2718 	while(args[0] == '+') {
   2719 		if(!find_arg2(ssl, args, &rest))
   2720 			return 0;
   2721 		while(*(++args) != 0) {
   2722 			if(*args == 'i' && insecure)
   2723 				*insecure = 1;
   2724 			else if(*args == 'p' && prime)
   2725 				*prime = 1;
   2726 			else if(*args == 't' && tls)
   2727 				*tls = 1;
   2728 			else {
   2729 				(void)ssl_printf(ssl, "error: unknown option %s\n", args);
   2730 				return 0;
   2731 			}
   2732 		}
   2733 		args = rest;
   2734 	}
   2735 	/* parse name */
   2736 	if(dp) {
   2737 		if(!find_arg2(ssl, args, &rest))
   2738 			return 0;
   2739 		zonename = args;
   2740 		args = rest;
   2741 	} else	zonename = args;
   2742 	if(!parse_arg_name(ssl, zonename, nm, &nmlen, &nmlabs))
   2743 		return 0;
   2744 
   2745 	/* parse dp */
   2746 	if(dp) {
   2747 		if(!(*dp = parse_delegpt(ssl, args, *nm))) {
   2748 			free(*nm);
   2749 			return 0;
   2750 		}
   2751 	}
   2752 	return 1;
   2753 }
   2754 
   2755 /** do the forward_add command */
   2756 static void
   2757 do_forward_add(RES* ssl, struct worker* worker, char* args)
   2758 {
   2759 	struct iter_forwards* fwd = worker->env.fwds;
   2760 	int insecure = 0, tls = 0;
   2761 	uint8_t* nm = NULL;
   2762 	struct delegpt* dp = NULL;
   2763 	int nolock = 1;
   2764 	if(!parse_fs_args(ssl, args, &nm, &dp, &insecure, NULL, &tls))
   2765 		return;
   2766 	if(tls)
   2767 		dp->ssl_upstream = 1;
   2768 	/* prelock forwarders for atomic operation with anchors */
   2769 	lock_rw_wrlock(&fwd->lock);
   2770 	if(insecure && worker->env.anchors) {
   2771 		if(!anchors_add_insecure(worker->env.anchors, LDNS_RR_CLASS_IN,
   2772 			nm)) {
   2773 			lock_rw_unlock(&fwd->lock);
   2774 			(void)ssl_printf(ssl, "error out of memory\n");
   2775 			delegpt_free_mlc(dp);
   2776 			free(nm);
   2777 			return;
   2778 		}
   2779 	}
   2780 	if(!forwards_add_zone(fwd, LDNS_RR_CLASS_IN, dp, nolock)) {
   2781 		lock_rw_unlock(&fwd->lock);
   2782 		(void)ssl_printf(ssl, "error out of memory\n");
   2783 		free(nm);
   2784 		return;
   2785 	}
   2786 	lock_rw_unlock(&fwd->lock);
   2787 	free(nm);
   2788 	send_ok(ssl);
   2789 }
   2790 
   2791 /** do the forward_remove command */
   2792 static void
   2793 do_forward_remove(RES* ssl, struct worker* worker, char* args)
   2794 {
   2795 	struct iter_forwards* fwd = worker->env.fwds;
   2796 	int insecure = 0;
   2797 	uint8_t* nm = NULL;
   2798 	int nolock = 1;
   2799 	if(!parse_fs_args(ssl, args, &nm, NULL, &insecure, NULL, NULL))
   2800 		return;
   2801 	/* prelock forwarders for atomic operation with anchors */
   2802 	lock_rw_wrlock(&fwd->lock);
   2803 	if(insecure && worker->env.anchors)
   2804 		anchors_delete_insecure(worker->env.anchors, LDNS_RR_CLASS_IN,
   2805 			nm);
   2806 	forwards_delete_zone(fwd, LDNS_RR_CLASS_IN, nm, nolock);
   2807 	lock_rw_unlock(&fwd->lock);
   2808 	free(nm);
   2809 	send_ok(ssl);
   2810 }
   2811 
   2812 /** do the stub_add command */
   2813 static void
   2814 do_stub_add(RES* ssl, struct worker* worker, char* args)
   2815 {
   2816 	struct iter_forwards* fwd = worker->env.fwds;
   2817 	int insecure = 0, prime = 0, tls = 0;
   2818 	uint8_t* nm = NULL;
   2819 	struct delegpt* dp = NULL;
   2820 	int nolock = 1;
   2821 	if(!parse_fs_args(ssl, args, &nm, &dp, &insecure, &prime, &tls))
   2822 		return;
   2823 	if(tls)
   2824 		dp->ssl_upstream = 1;
   2825 	/* prelock forwarders and hints for atomic operation with anchors */
   2826 	lock_rw_wrlock(&fwd->lock);
   2827 	lock_rw_wrlock(&worker->env.hints->lock);
   2828 	if(insecure && worker->env.anchors) {
   2829 		if(!anchors_add_insecure(worker->env.anchors, LDNS_RR_CLASS_IN,
   2830 			nm)) {
   2831 			lock_rw_unlock(&fwd->lock);
   2832 			lock_rw_unlock(&worker->env.hints->lock);
   2833 			(void)ssl_printf(ssl, "error out of memory\n");
   2834 			delegpt_free_mlc(dp);
   2835 			free(nm);
   2836 			return;
   2837 		}
   2838 	}
   2839 	if(!forwards_add_stub_hole(fwd, LDNS_RR_CLASS_IN, nm, nolock)) {
   2840 		if(insecure && worker->env.anchors)
   2841 			anchors_delete_insecure(worker->env.anchors,
   2842 				LDNS_RR_CLASS_IN, nm);
   2843 		lock_rw_unlock(&fwd->lock);
   2844 		lock_rw_unlock(&worker->env.hints->lock);
   2845 		(void)ssl_printf(ssl, "error out of memory\n");
   2846 		delegpt_free_mlc(dp);
   2847 		free(nm);
   2848 		return;
   2849 	}
   2850 	if(!hints_add_stub(worker->env.hints, LDNS_RR_CLASS_IN, dp, !prime,
   2851 		nolock)) {
   2852 		(void)ssl_printf(ssl, "error out of memory\n");
   2853 		forwards_delete_stub_hole(fwd, LDNS_RR_CLASS_IN, nm, nolock);
   2854 		if(insecure && worker->env.anchors)
   2855 			anchors_delete_insecure(worker->env.anchors,
   2856 				LDNS_RR_CLASS_IN, nm);
   2857 		lock_rw_unlock(&fwd->lock);
   2858 		lock_rw_unlock(&worker->env.hints->lock);
   2859 		free(nm);
   2860 		return;
   2861 	}
   2862 	lock_rw_unlock(&fwd->lock);
   2863 	lock_rw_unlock(&worker->env.hints->lock);
   2864 	free(nm);
   2865 	send_ok(ssl);
   2866 }
   2867 
   2868 /** do the stub_remove command */
   2869 static void
   2870 do_stub_remove(RES* ssl, struct worker* worker, char* args)
   2871 {
   2872 	struct iter_forwards* fwd = worker->env.fwds;
   2873 	int insecure = 0;
   2874 	uint8_t* nm = NULL;
   2875 	int nolock = 1;
   2876 	if(!parse_fs_args(ssl, args, &nm, NULL, &insecure, NULL, NULL))
   2877 		return;
   2878 	/* prelock forwarders and hints for atomic operation with anchors */
   2879 	lock_rw_wrlock(&fwd->lock);
   2880 	lock_rw_wrlock(&worker->env.hints->lock);
   2881 	if(insecure && worker->env.anchors)
   2882 		anchors_delete_insecure(worker->env.anchors, LDNS_RR_CLASS_IN,
   2883 			nm);
   2884 	forwards_delete_stub_hole(fwd, LDNS_RR_CLASS_IN, nm, nolock);
   2885 	hints_delete_stub(worker->env.hints, LDNS_RR_CLASS_IN, nm, nolock);
   2886 	lock_rw_unlock(&fwd->lock);
   2887 	lock_rw_unlock(&worker->env.hints->lock);
   2888 	free(nm);
   2889 	send_ok(ssl);
   2890 }
   2891 
   2892 /** do the insecure_add command */
   2893 static void
   2894 do_insecure_add(RES* ssl, struct worker* worker, char* arg)
   2895 {
   2896 	size_t nmlen;
   2897 	int nmlabs;
   2898 	uint8_t* nm = NULL;
   2899 	if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
   2900 		return;
   2901 	if(worker->env.anchors) {
   2902 		if(!anchors_add_insecure(worker->env.anchors,
   2903 			LDNS_RR_CLASS_IN, nm)) {
   2904 			(void)ssl_printf(ssl, "error out of memory\n");
   2905 			free(nm);
   2906 			return;
   2907 		}
   2908 	}
   2909 	free(nm);
   2910 	send_ok(ssl);
   2911 }
   2912 
   2913 /** do the insecure_remove command */
   2914 static void
   2915 do_insecure_remove(RES* ssl, struct worker* worker, char* arg)
   2916 {
   2917 	size_t nmlen;
   2918 	int nmlabs;
   2919 	uint8_t* nm = NULL;
   2920 	if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
   2921 		return;
   2922 	if(worker->env.anchors)
   2923 		anchors_delete_insecure(worker->env.anchors,
   2924 			LDNS_RR_CLASS_IN, nm);
   2925 	free(nm);
   2926 	send_ok(ssl);
   2927 }
   2928 
   2929 static void
   2930 do_insecure_list(RES* ssl, struct worker* worker)
   2931 {
   2932 	char buf[LDNS_MAX_DOMAINLEN];
   2933 	struct trust_anchor* a;
   2934 	if(worker->env.anchors) {
   2935 		RBTREE_FOR(a, struct trust_anchor*, worker->env.anchors->tree) {
   2936 			if(a->numDS == 0 && a->numDNSKEY == 0) {
   2937 				dname_str(a->name, buf);
   2938 				ssl_printf(ssl, "%s\n", buf);
   2939 			}
   2940 		}
   2941 	}
   2942 }
   2943 
   2944 /** do the status command */
   2945 static void
   2946 do_status(RES* ssl, struct worker* worker)
   2947 {
   2948 	int i;
   2949 	time_t uptime;
   2950 	if(!ssl_printf(ssl, "version: %s\n", PACKAGE_VERSION))
   2951 		return;
   2952 	if(!ssl_printf(ssl, "verbosity: %d\n", verbosity))
   2953 		return;
   2954 	if(!ssl_printf(ssl, "threads: %d\n", worker->daemon->num))
   2955 		return;
   2956 	if(!ssl_printf(ssl, "modules: %d [", worker->daemon->mods.num))
   2957 		return;
   2958 	for(i=0; i<worker->daemon->mods.num; i++) {
   2959 		if(!ssl_printf(ssl, " %s", worker->daemon->mods.mod[i]->name))
   2960 			return;
   2961 	}
   2962 	if(!ssl_printf(ssl, " ]\n"))
   2963 		return;
   2964 	uptime = (time_t)time(NULL) - (time_t)worker->daemon->time_boot.tv_sec;
   2965 	if(!ssl_printf(ssl, "uptime: " ARG_LL "d seconds\n", (long long)uptime))
   2966 		return;
   2967 	if(!ssl_printf(ssl, "options:%s%s%s%s\n" ,
   2968 		(worker->daemon->reuseport?" reuseport":""),
   2969 		(worker->daemon->rc->accept_list?" control":""),
   2970 		(worker->daemon->rc->accept_list && worker->daemon->rc->use_cert?"(ssl)":""),
   2971 		(worker->daemon->rc->accept_list && worker->daemon->cfg->control_ifs.first && worker->daemon->cfg->control_ifs.first->str && worker->daemon->cfg->control_ifs.first->str[0] == '/'?"(namedpipe)":"")
   2972 		))
   2973 		return;
   2974 	if(!ssl_printf(ssl, "unbound (pid %d) is running...\n",
   2975 		(int)getpid()))
   2976 		return;
   2977 }
   2978 
   2979 /** get age for the mesh state */
   2980 static void
   2981 get_mesh_age(struct mesh_state* m, char* buf, size_t len,
   2982 	struct module_env* env)
   2983 {
   2984 	if(m->reply_list) {
   2985 		struct timeval d;
   2986 		struct mesh_reply* r = m->reply_list;
   2987 		/* last reply is the oldest */
   2988 		while(r && r->next)
   2989 			r = r->next;
   2990 		timeval_subtract(&d, env->now_tv, &r->start_time);
   2991 		snprintf(buf, len, ARG_LL "d.%6.6d",
   2992 			(long long)d.tv_sec, (int)d.tv_usec);
   2993 	} else {
   2994 		snprintf(buf, len, "-");
   2995 	}
   2996 }
   2997 
   2998 /** get status of a mesh state */
   2999 static void
   3000 get_mesh_status(struct mesh_area* mesh, struct mesh_state* m,
   3001 	char* buf, size_t len)
   3002 {
   3003 	enum module_ext_state s = m->s.ext_state[m->s.curmod];
   3004 	const char *modname = mesh->mods.mod[m->s.curmod]->name;
   3005 	size_t l;
   3006 	if(strcmp(modname, "iterator") == 0 && s == module_wait_reply &&
   3007 		m->s.minfo[m->s.curmod]) {
   3008 		/* break into iterator to find out who its waiting for */
   3009 		struct iter_qstate* qstate = (struct iter_qstate*)
   3010 			m->s.minfo[m->s.curmod];
   3011 		struct outbound_list* ol = &qstate->outlist;
   3012 		struct outbound_entry* e;
   3013 		snprintf(buf, len, "%s wait for", modname);
   3014 		l = strlen(buf);
   3015 		buf += l; len -= l;
   3016 		if(ol->first == NULL)
   3017 			snprintf(buf, len, " (empty_list)");
   3018 		for(e = ol->first; e; e = e->next) {
   3019 			snprintf(buf, len, " ");
   3020 			l = strlen(buf);
   3021 			buf += l; len -= l;
   3022 			addr_to_str(&e->qsent->addr, e->qsent->addrlen,
   3023 				buf, len);
   3024 			l = strlen(buf);
   3025 			buf += l; len -= l;
   3026 		}
   3027 	} else if(s == module_wait_subquery) {
   3028 		/* look in subs from mesh state to see what */
   3029 		char nm[LDNS_MAX_DOMAINLEN];
   3030 		struct mesh_state_ref* sub;
   3031 		snprintf(buf, len, "%s wants", modname);
   3032 		l = strlen(buf);
   3033 		buf += l; len -= l;
   3034 		if(m->sub_set.count == 0)
   3035 			snprintf(buf, len, " (empty_list)");
   3036 		RBTREE_FOR(sub, struct mesh_state_ref*, &m->sub_set) {
   3037 			char* t = sldns_wire2str_type(sub->s->s.qinfo.qtype);
   3038 			char* c = sldns_wire2str_class(sub->s->s.qinfo.qclass);
   3039 			dname_str(sub->s->s.qinfo.qname, nm);
   3040 			snprintf(buf, len, " %s %s %s", (t?t:"TYPE??"),
   3041 				(c?c:"CLASS??"), nm);
   3042 			l = strlen(buf);
   3043 			buf += l; len -= l;
   3044 			free(t);
   3045 			free(c);
   3046 		}
   3047 	} else {
   3048 		snprintf(buf, len, "%s is %s", modname, strextstate(s));
   3049 	}
   3050 }
   3051 
   3052 /** do the dump_requestlist command */
   3053 static void
   3054 do_dump_requestlist(RES* ssl, struct worker* worker)
   3055 {
   3056 	struct mesh_area* mesh;
   3057 	struct mesh_state* m;
   3058 	int num = 0;
   3059 	char buf[LDNS_MAX_DOMAINLEN];
   3060 	char timebuf[32];
   3061 	char statbuf[10240];
   3062 	if(!ssl_printf(ssl, "thread #%d\n", worker->thread_num))
   3063 		return;
   3064 	if(!ssl_printf(ssl, "#   type cl name    seconds    module status\n"))
   3065 		return;
   3066 	/* show worker mesh contents */
   3067 	mesh = worker->env.mesh;
   3068 	if(!mesh) return;
   3069 	RBTREE_FOR(m, struct mesh_state*, &mesh->all) {
   3070 		char* t = sldns_wire2str_type(m->s.qinfo.qtype);
   3071 		char* c = sldns_wire2str_class(m->s.qinfo.qclass);
   3072 		dname_str(m->s.qinfo.qname, buf);
   3073 		get_mesh_age(m, timebuf, sizeof(timebuf), &worker->env);
   3074 		get_mesh_status(mesh, m, statbuf, sizeof(statbuf));
   3075 		if(!ssl_printf(ssl, "%3d %4s %2s %s %s %s\n",
   3076 			num, (t?t:"TYPE??"), (c?c:"CLASS??"), buf, timebuf,
   3077 			statbuf)) {
   3078 			free(t);
   3079 			free(c);
   3080 			return;
   3081 		}
   3082 		num++;
   3083 		free(t);
   3084 		free(c);
   3085 	}
   3086 }
   3087 
   3088 /** structure for argument data for dump infra host */
   3089 struct infra_arg {
   3090 	/** the infra cache */
   3091 	struct infra_cache* infra;
   3092 	/** the SSL connection */
   3093 	RES* ssl;
   3094 	/** the time now */
   3095 	time_t now;
   3096 	/** ssl failure? stop writing and skip the rest.  If the tcp
   3097 	 * connection is broken, and writes fail, we then stop writing. */
   3098 	int ssl_failed;
   3099 };
   3100 
   3101 /** callback for every host element in the infra cache */
   3102 static void
   3103 dump_infra_host(struct lruhash_entry* e, void* arg)
   3104 {
   3105 	struct infra_arg* a = (struct infra_arg*)arg;
   3106 	struct infra_key* k = (struct infra_key*)e->key;
   3107 	struct infra_data* d = (struct infra_data*)e->data;
   3108 	char ip_str[1024];
   3109 	char name[LDNS_MAX_DOMAINLEN];
   3110 	int port;
   3111 	if(a->ssl_failed)
   3112 		return;
   3113 	addr_to_str(&k->addr, k->addrlen, ip_str, sizeof(ip_str));
   3114 	dname_str(k->zonename, name);
   3115 	port = (int)ntohs(((struct sockaddr_in*)&k->addr)->sin_port);
   3116 	if(port != UNBOUND_DNS_PORT) {
   3117 		snprintf(ip_str+strlen(ip_str), sizeof(ip_str)-strlen(ip_str),
   3118 			"@%d", port);
   3119 	}
   3120 	/* skip expired stuff (only backed off) */
   3121 	if(d->ttl < a->now) {
   3122 		if(d->rtt.rto >= USEFUL_SERVER_TOP_TIMEOUT) {
   3123 			if(!ssl_printf(a->ssl, "%s %s expired rto %d\n", ip_str,
   3124 				name, d->rtt.rto))  {
   3125 				a->ssl_failed = 1;
   3126 				return;
   3127 			}
   3128 		}
   3129 		return;
   3130 	}
   3131 	if(!ssl_printf(a->ssl, "%s %s ttl %lu ping %d var %d rtt %d rto %d "
   3132 		"tA %d tAAAA %d tother %d "
   3133 		"ednsknown %d edns %d delay %d lame dnssec %d rec %d A %d "
   3134 		"other %d\n", ip_str, name, (unsigned long)(d->ttl - a->now),
   3135 		d->rtt.srtt, d->rtt.rttvar, rtt_notimeout(&d->rtt), d->rtt.rto,
   3136 		d->timeout_A, d->timeout_AAAA, d->timeout_other,
   3137 		(int)d->edns_lame_known, (int)d->edns_version,
   3138 		(int)(a->now<d->probedelay?(d->probedelay - a->now):0),
   3139 		(int)d->isdnsseclame, (int)d->rec_lame, (int)d->lame_type_A,
   3140 		(int)d->lame_other)) {
   3141 		a->ssl_failed = 1;
   3142 		return;
   3143 	}
   3144 }
   3145 
   3146 /** do the dump_infra command */
   3147 static void
   3148 do_dump_infra(RES* ssl, struct worker* worker)
   3149 {
   3150 	struct infra_arg arg;
   3151 	arg.infra = worker->env.infra_cache;
   3152 	arg.ssl = ssl;
   3153 	arg.now = *worker->env.now;
   3154 	arg.ssl_failed = 0;
   3155 	slabhash_traverse(arg.infra->hosts, 0, &dump_infra_host, (void*)&arg);
   3156 }
   3157 
   3158 /** do the log_reopen command */
   3159 static void
   3160 do_log_reopen(RES* ssl, struct worker* worker)
   3161 {
   3162 	struct config_file* cfg = worker->env.cfg;
   3163 	send_ok(ssl);
   3164 	log_init(cfg->logfile, cfg->use_syslog, cfg->chrootdir);
   3165 }
   3166 
   3167 /** do the auth_zone_reload command */
   3168 static void
   3169 do_auth_zone_reload(RES* ssl, struct worker* worker, char* arg)
   3170 {
   3171 	size_t nmlen;
   3172 	int nmlabs;
   3173 	uint8_t* nm = NULL;
   3174 	struct auth_zones* az = worker->env.auth_zones;
   3175 	struct auth_zone* z = NULL;
   3176 	struct auth_xfer* xfr = NULL;
   3177 	char* reason = NULL;
   3178 	if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
   3179 		return;
   3180 	if(az) {
   3181 		lock_rw_rdlock(&az->lock);
   3182 		z = auth_zone_find(az, nm, nmlen, LDNS_RR_CLASS_IN);
   3183 		if(z) {
   3184 			lock_rw_wrlock(&z->lock);
   3185 		}
   3186 		xfr = auth_xfer_find(az, nm, nmlen, LDNS_RR_CLASS_IN);
   3187 		if(xfr) {
   3188 			lock_basic_lock(&xfr->lock);
   3189 		}
   3190 		lock_rw_unlock(&az->lock);
   3191 	}
   3192 	free(nm);
   3193 	if(!z) {
   3194 		if(xfr) {
   3195 			lock_basic_unlock(&xfr->lock);
   3196 		}
   3197 		(void)ssl_printf(ssl, "error no auth-zone %s\n", arg);
   3198 		return;
   3199 	}
   3200 	if(!auth_zone_read_zonefile(z, worker->env.cfg)) {
   3201 		lock_rw_unlock(&z->lock);
   3202 		if(xfr) {
   3203 			lock_basic_unlock(&xfr->lock);
   3204 		}
   3205 		(void)ssl_printf(ssl, "error failed to read %s\n", arg);
   3206 		return;
   3207 	}
   3208 
   3209 	z->zone_expired = 0;
   3210 	if(xfr) {
   3211 		xfr->zone_expired = 0;
   3212 		if(!xfr_find_soa(z, xfr)) {
   3213 			if(z->data.count == 0) {
   3214 				lock_rw_unlock(&z->lock);
   3215 				lock_basic_unlock(&xfr->lock);
   3216 				(void)ssl_printf(ssl, "zone %s has no contents\n", arg);
   3217 				return;
   3218 			}
   3219 			lock_rw_unlock(&z->lock);
   3220 			lock_basic_unlock(&xfr->lock);
   3221 			(void)ssl_printf(ssl, "error: no SOA in zone after read %s\n", arg);
   3222 			return;
   3223 		}
   3224 		if(xfr->have_zone) {
   3225 			xfr->lease_time = *worker->env.now;
   3226 			xfr->soa_zone_acquired = *worker->env.now;
   3227 		}
   3228 		lock_basic_unlock(&xfr->lock);
   3229 	}
   3230 	z->soa_zone_acquired = *worker->env.now;
   3231 
   3232 	auth_zone_verify_zonemd(z, &worker->env, &worker->env.mesh->mods,
   3233 		&reason, 0, 0);
   3234 	if(reason && z->zone_expired) {
   3235 		lock_rw_unlock(&z->lock);
   3236 		(void)ssl_printf(ssl, "error zonemd for %s failed: %s\n",
   3237 			arg, reason);
   3238 		free(reason);
   3239 		return;
   3240 	} else if(reason && strcmp(reason, "ZONEMD verification successful")
   3241 		==0) {
   3242 		(void)ssl_printf(ssl, "%s: %s\n", arg, reason);
   3243 	}
   3244 	lock_rw_unlock(&z->lock);
   3245 	free(reason);
   3246 	send_ok(ssl);
   3247 }
   3248 
   3249 /** do the auth_zone_transfer command */
   3250 static void
   3251 do_auth_zone_transfer(RES* ssl, struct worker* worker, char* arg)
   3252 {
   3253 	size_t nmlen;
   3254 	int nmlabs;
   3255 	uint8_t* nm = NULL;
   3256 	struct auth_zones* az = worker->env.auth_zones;
   3257 	if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
   3258 		return;
   3259 	if(!az || !auth_zones_startprobesequence(az, &worker->env, nm, nmlen,
   3260 		LDNS_RR_CLASS_IN)) {
   3261 		(void)ssl_printf(ssl, "error zone xfr task not found %s\n", arg);
   3262 		free(nm);
   3263 		return;
   3264 	}
   3265 	free(nm);
   3266 	send_ok(ssl);
   3267 }
   3268 
   3269 /** do the set_option command */
   3270 static void
   3271 do_set_option(RES* ssl, struct worker* worker, char* arg)
   3272 {
   3273 	char* arg2;
   3274 	if(!find_arg2(ssl, arg, &arg2))
   3275 		return;
   3276 	if(!config_set_option(worker->env.cfg, arg, arg2)) {
   3277 		(void)ssl_printf(ssl, "error setting option\n");
   3278 		return;
   3279 	}
   3280 	/* effectuate some arguments */
   3281 	if(strcmp(arg, "val-override-date:") == 0) {
   3282 		int m = modstack_find(&worker->env.mesh->mods, "validator");
   3283 		struct val_env* val_env = NULL;
   3284 		if(m != -1) val_env = (struct val_env*)worker->env.modinfo[m];
   3285 		if(val_env)
   3286 			val_env->date_override = worker->env.cfg->val_date_override;
   3287 	}
   3288 	send_ok(ssl);
   3289 }
   3290 
   3291 /* routine to printout option values over SSL */
   3292 void remote_get_opt_ssl(char* line, void* arg)
   3293 {
   3294 	RES* ssl = (RES*)arg;
   3295 	(void)ssl_printf(ssl, "%s\n", line);
   3296 }
   3297 
   3298 /** do the get_option command */
   3299 static void
   3300 do_get_option(RES* ssl, struct worker* worker, char* arg)
   3301 {
   3302 	int r;
   3303 	r = config_get_option(worker->env.cfg, arg, remote_get_opt_ssl, ssl);
   3304 	if(!r) {
   3305 		(void)ssl_printf(ssl, "error unknown option\n");
   3306 		return;
   3307 	}
   3308 }
   3309 
   3310 /** do the list_forwards command */
   3311 static void
   3312 do_list_forwards(RES* ssl, struct worker* worker)
   3313 {
   3314 	/* since its a per-worker structure no locks needed */
   3315 	struct iter_forwards* fwds = worker->env.fwds;
   3316 	struct iter_forward_zone* z;
   3317 	struct trust_anchor* a;
   3318 	int insecure;
   3319 	lock_rw_rdlock(&fwds->lock);
   3320 	RBTREE_FOR(z, struct iter_forward_zone*, fwds->tree) {
   3321 		if(!z->dp) continue; /* skip empty marker for stub */
   3322 
   3323 		/* see if it is insecure */
   3324 		insecure = 0;
   3325 		if(worker->env.anchors &&
   3326 			(a=anchor_find(worker->env.anchors, z->name,
   3327 			z->namelabs, z->namelen,  z->dclass))) {
   3328 			if(!a->keylist && !a->numDS && !a->numDNSKEY)
   3329 				insecure = 1;
   3330 			lock_basic_unlock(&a->lock);
   3331 		}
   3332 
   3333 		if(!ssl_print_name_dp(ssl, (insecure?"forward +i":"forward"),
   3334 			z->name, z->dclass, z->dp)) {
   3335 			lock_rw_unlock(&fwds->lock);
   3336 			return;
   3337 		}
   3338 	}
   3339 	lock_rw_unlock(&fwds->lock);
   3340 }
   3341 
   3342 /** do the list_stubs command */
   3343 static void
   3344 do_list_stubs(RES* ssl, struct worker* worker)
   3345 {
   3346 	struct iter_hints_stub* z;
   3347 	struct trust_anchor* a;
   3348 	int insecure;
   3349 	char str[32];
   3350 	lock_rw_rdlock(&worker->env.hints->lock);
   3351 	RBTREE_FOR(z, struct iter_hints_stub*, &worker->env.hints->tree) {
   3352 
   3353 		/* see if it is insecure */
   3354 		insecure = 0;
   3355 		if(worker->env.anchors &&
   3356 			(a=anchor_find(worker->env.anchors, z->node.name,
   3357 			z->node.labs, z->node.len,  z->node.dclass))) {
   3358 			if(!a->keylist && !a->numDS && !a->numDNSKEY)
   3359 				insecure = 1;
   3360 			lock_basic_unlock(&a->lock);
   3361 		}
   3362 
   3363 		snprintf(str, sizeof(str), "stub %sprime%s",
   3364 			(z->noprime?"no":""), (insecure?" +i":""));
   3365 		if(!ssl_print_name_dp(ssl, str, z->node.name,
   3366 			z->node.dclass, z->dp)) {
   3367 			lock_rw_unlock(&worker->env.hints->lock);
   3368 			return;
   3369 		}
   3370 	}
   3371 	lock_rw_unlock(&worker->env.hints->lock);
   3372 }
   3373 
   3374 /** do the list_auth_zones command */
   3375 static void
   3376 do_list_auth_zones(RES* ssl, struct auth_zones* az)
   3377 {
   3378 	struct auth_zone* z;
   3379 	char buf[LDNS_MAX_DOMAINLEN], buf2[256], buf3[256];
   3380 	lock_rw_rdlock(&az->lock);
   3381 	RBTREE_FOR(z, struct auth_zone*, &az->ztree) {
   3382 		lock_rw_rdlock(&z->lock);
   3383 		dname_str(z->name, buf);
   3384 		if(z->zone_expired)
   3385 			snprintf(buf2, sizeof(buf2), "expired");
   3386 		else {
   3387 			uint32_t serial = 0;
   3388 			if(auth_zone_get_serial(z, &serial)) {
   3389 				snprintf(buf2, sizeof(buf2), "serial %u",
   3390 					(unsigned)serial);
   3391 				if(z->soa_zone_acquired != 0) {
   3392 #if defined(HAVE_STRFTIME) && defined(HAVE_LOCALTIME_R)
   3393 					char tmbuf[32];
   3394 					struct tm tm;
   3395 					struct tm *tm_p;
   3396 					tm_p = localtime_r(
   3397 						&z->soa_zone_acquired, &tm);
   3398 					if(!strftime(tmbuf, sizeof(tmbuf), "%Y-%m-%dT%H:%M:%S", tm_p))
   3399 						snprintf(tmbuf, sizeof(tmbuf), "strftime-err-%u", (unsigned)z->soa_zone_acquired);
   3400 					snprintf(buf3, sizeof(buf3),
   3401 						"\t since %u %s",
   3402 						(unsigned)z->soa_zone_acquired,
   3403 						tmbuf);
   3404 #else
   3405 					snprintf(buf3, sizeof(buf3),
   3406 						"\t since %u",
   3407 						(unsigned)z->soa_zone_acquired);
   3408 #endif
   3409 				} else {
   3410 					buf3[0]=0;
   3411 				}
   3412 			} else	{
   3413 				snprintf(buf2, sizeof(buf2), "no serial");
   3414 				buf3[0]=0;
   3415 			}
   3416 		}
   3417 		lock_rw_unlock(&z->lock);
   3418 		if(!ssl_printf(ssl, "%s\t%s%s\n", buf, buf2, buf3)) {
   3419 			/* failure to print */
   3420 			lock_rw_unlock(&az->lock);
   3421 			return;
   3422 		}
   3423 	}
   3424 	lock_rw_unlock(&az->lock);
   3425 }
   3426 
   3427 /** do the list_local_zones command */
   3428 static void
   3429 do_list_local_zones(RES* ssl, struct local_zones* zones)
   3430 {
   3431 	struct local_zone* z;
   3432 	char buf[LDNS_MAX_DOMAINLEN];
   3433 	lock_rw_rdlock(&zones->lock);
   3434 	RBTREE_FOR(z, struct local_zone*, &zones->ztree) {
   3435 		lock_rw_rdlock(&z->lock);
   3436 		dname_str(z->name, buf);
   3437 		if(!ssl_printf(ssl, "%s %s\n", buf,
   3438 			local_zone_type2str(z->type))) {
   3439 			/* failure to print */
   3440 			lock_rw_unlock(&z->lock);
   3441 			lock_rw_unlock(&zones->lock);
   3442 			return;
   3443 		}
   3444 		lock_rw_unlock(&z->lock);
   3445 	}
   3446 	lock_rw_unlock(&zones->lock);
   3447 }
   3448 
   3449 /** do the list_local_data command */
   3450 static void
   3451 do_list_local_data(RES* ssl, struct worker* worker, struct local_zones* zones)
   3452 {
   3453 	struct local_zone* z;
   3454 	struct local_data* d;
   3455 	struct local_rrset* p;
   3456 	char* s = (char*)sldns_buffer_begin(worker->env.scratch_buffer);
   3457 	size_t slen = sldns_buffer_capacity(worker->env.scratch_buffer);
   3458 	lock_rw_rdlock(&zones->lock);
   3459 	RBTREE_FOR(z, struct local_zone*, &zones->ztree) {
   3460 		lock_rw_rdlock(&z->lock);
   3461 		RBTREE_FOR(d, struct local_data*, &z->data) {
   3462 			for(p = d->rrsets; p; p = p->next) {
   3463 				struct packed_rrset_data* d =
   3464 					(struct packed_rrset_data*)p->rrset->entry.data;
   3465 				size_t i;
   3466 				for(i=0; i<d->count + d->rrsig_count; i++) {
   3467 					if(!packed_rr_to_string(p->rrset, i,
   3468 						0, s, slen)) {
   3469 						if(!ssl_printf(ssl, "BADRR\n")) {
   3470 							lock_rw_unlock(&z->lock);
   3471 							lock_rw_unlock(&zones->lock);
   3472 							return;
   3473 						}
   3474 					}
   3475 				        if(!ssl_printf(ssl, "%s\n", s)) {
   3476 						lock_rw_unlock(&z->lock);
   3477 						lock_rw_unlock(&zones->lock);
   3478 						return;
   3479 					}
   3480 				}
   3481 			}
   3482 		}
   3483 		lock_rw_unlock(&z->lock);
   3484 	}
   3485 	lock_rw_unlock(&zones->lock);
   3486 }
   3487 
   3488 /** do the view_list_local_zones command */
   3489 static void
   3490 do_view_list_local_zones(RES* ssl, struct worker* worker, char* arg)
   3491 {
   3492 	struct view* v = views_find_view(worker->env.views,
   3493 		arg, 0 /* get read lock*/);
   3494 	if(!v) {
   3495 		ssl_printf(ssl,"no view with name: %s\n", arg);
   3496 		return;
   3497 	}
   3498 	if(v->local_zones) {
   3499 		do_list_local_zones(ssl, v->local_zones);
   3500 	}
   3501 	lock_rw_unlock(&v->lock);
   3502 }
   3503 
   3504 /** do the view_list_local_data command */
   3505 static void
   3506 do_view_list_local_data(RES* ssl, struct worker* worker, char* arg)
   3507 {
   3508 	struct view* v = views_find_view(worker->env.views,
   3509 		arg, 0 /* get read lock*/);
   3510 	if(!v) {
   3511 		ssl_printf(ssl,"no view with name: %s\n", arg);
   3512 		return;
   3513 	}
   3514 	if(v->local_zones) {
   3515 		do_list_local_data(ssl, worker, v->local_zones);
   3516 	}
   3517 	lock_rw_unlock(&v->lock);
   3518 }
   3519 
   3520 /** struct for user arg ratelimit list */
   3521 struct ratelimit_list_arg {
   3522 	/** the infra cache */
   3523 	struct infra_cache* infra;
   3524 	/** the SSL to print to */
   3525 	RES* ssl;
   3526 	/** all or only ratelimited */
   3527 	int all;
   3528 	/** current time */
   3529 	time_t now;
   3530 	/** if backoff is enabled */
   3531 	int backoff;
   3532 };
   3533 
   3534 #define ip_ratelimit_list_arg ratelimit_list_arg
   3535 
   3536 /** list items in the ratelimit table */
   3537 static void
   3538 rate_list(struct lruhash_entry* e, void* arg)
   3539 {
   3540 	struct ratelimit_list_arg* a = (struct ratelimit_list_arg*)arg;
   3541 	struct rate_key* k = (struct rate_key*)e->key;
   3542 	struct rate_data* d = (struct rate_data*)e->data;
   3543 	char buf[LDNS_MAX_DOMAINLEN];
   3544 	int lim = infra_find_ratelimit(a->infra, k->name, k->namelen);
   3545 	int max = infra_rate_max(d, a->now, a->backoff);
   3546 	if(a->all == 0) {
   3547 		if(max < lim)
   3548 			return;
   3549 	}
   3550 	dname_str(k->name, buf);
   3551 	ssl_printf(a->ssl, "%s %d limit %d\n", buf, max, lim);
   3552 }
   3553 
   3554 /** list items in the ip_ratelimit table */
   3555 static void
   3556 ip_rate_list(struct lruhash_entry* e, void* arg)
   3557 {
   3558 	char ip[128];
   3559 	struct ip_ratelimit_list_arg* a = (struct ip_ratelimit_list_arg*)arg;
   3560 	struct ip_rate_key* k = (struct ip_rate_key*)e->key;
   3561 	struct ip_rate_data* d = (struct ip_rate_data*)e->data;
   3562 	int lim = infra_ip_ratelimit;
   3563 	int max = infra_rate_max(d, a->now, a->backoff);
   3564 	if(a->all == 0) {
   3565 		if(max < lim)
   3566 			return;
   3567 	}
   3568 	addr_to_str(&k->addr, k->addrlen, ip, sizeof(ip));
   3569 	ssl_printf(a->ssl, "%s %d limit %d\n", ip, max, lim);
   3570 }
   3571 
   3572 /** do the ratelimit_list command */
   3573 static void
   3574 do_ratelimit_list(RES* ssl, struct worker* worker, char* arg)
   3575 {
   3576 	struct ratelimit_list_arg a;
   3577 	a.all = 0;
   3578 	a.infra = worker->env.infra_cache;
   3579 	a.now = *worker->env.now;
   3580 	a.ssl = ssl;
   3581 	a.backoff = worker->env.cfg->ratelimit_backoff;
   3582 	arg = skipwhite(arg);
   3583 	if(strcmp(arg, "+a") == 0)
   3584 		a.all = 1;
   3585 	if(a.infra->domain_rates==NULL ||
   3586 		(a.all == 0 && infra_dp_ratelimit == 0))
   3587 		return;
   3588 	slabhash_traverse(a.infra->domain_rates, 0, rate_list, &a);
   3589 }
   3590 
   3591 /** do the ip_ratelimit_list command */
   3592 static void
   3593 do_ip_ratelimit_list(RES* ssl, struct worker* worker, char* arg)
   3594 {
   3595 	struct ip_ratelimit_list_arg a;
   3596 	a.all = 0;
   3597 	a.infra = worker->env.infra_cache;
   3598 	a.now = *worker->env.now;
   3599 	a.ssl = ssl;
   3600 	a.backoff = worker->env.cfg->ip_ratelimit_backoff;
   3601 	arg = skipwhite(arg);
   3602 	if(strcmp(arg, "+a") == 0)
   3603 		a.all = 1;
   3604 	if(a.infra->client_ip_rates==NULL ||
   3605 		(a.all == 0 && infra_ip_ratelimit == 0))
   3606 		return;
   3607 	slabhash_traverse(a.infra->client_ip_rates, 0, ip_rate_list, &a);
   3608 }
   3609 
   3610 /** do the rpz_enable/disable command */
   3611 static void
   3612 do_rpz_enable_disable(RES* ssl, struct worker* worker, char* arg, int enable) {
   3613     size_t nmlen;
   3614     int nmlabs;
   3615     uint8_t *nm = NULL;
   3616     struct auth_zones *az = worker->env.auth_zones;
   3617     struct auth_zone *z = NULL;
   3618     if (!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
   3619         return;
   3620     if (az) {
   3621         lock_rw_rdlock(&az->lock);
   3622         z = auth_zone_find(az, nm, nmlen, LDNS_RR_CLASS_IN);
   3623         if (z) {
   3624             lock_rw_wrlock(&z->lock);
   3625         }
   3626         lock_rw_unlock(&az->lock);
   3627     }
   3628     free(nm);
   3629     if (!z) {
   3630         (void) ssl_printf(ssl, "error no auth-zone %s\n", arg);
   3631         return;
   3632     }
   3633     if (!z->rpz) {
   3634         (void) ssl_printf(ssl, "error auth-zone %s not RPZ\n", arg);
   3635         lock_rw_unlock(&z->lock);
   3636         return;
   3637     }
   3638     if (enable) {
   3639         rpz_enable(z->rpz);
   3640     } else {
   3641         rpz_disable(z->rpz);
   3642     }
   3643     lock_rw_unlock(&z->lock);
   3644     send_ok(ssl);
   3645 }
   3646 
   3647 /** do the rpz_enable command */
   3648 static void
   3649 do_rpz_enable(RES* ssl, struct worker* worker, char* arg)
   3650 {
   3651     do_rpz_enable_disable(ssl, worker, arg, 1);
   3652 }
   3653 
   3654 /** do the rpz_disable command */
   3655 static void
   3656 do_rpz_disable(RES* ssl, struct worker* worker, char* arg)
   3657 {
   3658     do_rpz_enable_disable(ssl, worker, arg, 0);
   3659 }
   3660 
   3661 /** Write the cookie secrets to file, returns `0` on failure.
   3662  * Caller has to hold the lock. */
   3663 static int
   3664 cookie_secret_file_dump(RES* ssl, struct worker* worker) {
   3665 	char const* secret_file = worker->env.cfg->cookie_secret_file;
   3666 	struct cookie_secrets* cookie_secrets = worker->daemon->cookie_secrets;
   3667 	char secret_hex[UNBOUND_COOKIE_SECRET_SIZE * 2 + 1];
   3668 	FILE* f;
   3669 	size_t i;
   3670 	if(secret_file == NULL || secret_file[0]==0) {
   3671 		(void)ssl_printf(ssl, "error: no cookie secret file configured\n");
   3672 		return 0;
   3673 	}
   3674 	log_assert( secret_file != NULL );
   3675 
   3676 	/* open write only and truncate */
   3677 	if((f = fopen(secret_file, "w")) == NULL ) {
   3678 		(void)ssl_printf(ssl, "unable to open cookie secret file %s: %s",
   3679 		                 secret_file, strerror(errno));
   3680 		return 0;
   3681 	}
   3682 	if(cookie_secrets == NULL) {
   3683 		/* nothing to write */
   3684 		fclose(f);
   3685 		return 1;
   3686 	}
   3687 
   3688 	for(i = 0; i < cookie_secrets->cookie_count; i++) {
   3689 		struct cookie_secret const* cs = &cookie_secrets->
   3690 			cookie_secrets[i];
   3691 		ssize_t const len = hex_ntop(cs->cookie_secret,
   3692 			UNBOUND_COOKIE_SECRET_SIZE, secret_hex,
   3693 			sizeof(secret_hex));
   3694 		(void)len; /* silence unused variable warning with -DNDEBUG */
   3695 		log_assert( len == UNBOUND_COOKIE_SECRET_SIZE * 2 );
   3696 		secret_hex[UNBOUND_COOKIE_SECRET_SIZE * 2] = '\0';
   3697 		fprintf(f, "%s\n", secret_hex);
   3698 	}
   3699 	explicit_bzero(secret_hex, sizeof(secret_hex));
   3700 	fclose(f);
   3701 	return 1;
   3702 }
   3703 
   3704 /** Activate cookie secret */
   3705 static void
   3706 do_activate_cookie_secret(RES* ssl, struct worker* worker) {
   3707 	char const* secret_file = worker->env.cfg->cookie_secret_file;
   3708 	struct cookie_secrets* cookie_secrets = worker->daemon->cookie_secrets;
   3709 
   3710 	if(secret_file == NULL || secret_file[0] == 0) {
   3711 		(void)ssl_printf(ssl, "error: no cookie secret file configured\n");
   3712 		return;
   3713 	}
   3714 	if(cookie_secrets == NULL) {
   3715 		(void)ssl_printf(ssl, "error: there are no cookie_secrets.");
   3716 		return;
   3717 	}
   3718 	lock_basic_lock(&cookie_secrets->lock);
   3719 
   3720 	if(cookie_secrets->cookie_count <= 1 ) {
   3721 		lock_basic_unlock(&cookie_secrets->lock);
   3722 		(void)ssl_printf(ssl, "error: no staging cookie secret to activate\n");
   3723 		return;
   3724 	}
   3725 	/* Only the worker 0 writes to file, the others update state. */
   3726 	if(worker->thread_num == 0 && !cookie_secret_file_dump(ssl, worker)) {
   3727 		lock_basic_unlock(&cookie_secrets->lock);
   3728 		(void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n",
   3729 				secret_file);
   3730 		return;
   3731 	}
   3732 	activate_cookie_secret(cookie_secrets);
   3733 	if(worker->thread_num == 0)
   3734 		(void)cookie_secret_file_dump(ssl, worker);
   3735 	lock_basic_unlock(&cookie_secrets->lock);
   3736 	send_ok(ssl);
   3737 }
   3738 
   3739 /** Drop cookie secret */
   3740 static void
   3741 do_drop_cookie_secret(RES* ssl, struct worker* worker) {
   3742 	char const* secret_file = worker->env.cfg->cookie_secret_file;
   3743 	struct cookie_secrets* cookie_secrets = worker->daemon->cookie_secrets;
   3744 
   3745 	if(secret_file == NULL || secret_file[0] == 0) {
   3746 		(void)ssl_printf(ssl, "error: no cookie secret file configured\n");
   3747 		return;
   3748 	}
   3749 	if(cookie_secrets == NULL) {
   3750 		(void)ssl_printf(ssl, "error: there are no cookie_secrets.");
   3751 		return;
   3752 	}
   3753 	lock_basic_lock(&cookie_secrets->lock);
   3754 
   3755 	if(cookie_secrets->cookie_count <= 1 ) {
   3756 		lock_basic_unlock(&cookie_secrets->lock);
   3757 		(void)ssl_printf(ssl, "error: can not drop the currently active cookie secret\n");
   3758 		return;
   3759 	}
   3760 	/* Only the worker 0 writes to file, the others update state. */
   3761 	if(worker->thread_num == 0 && !cookie_secret_file_dump(ssl, worker)) {
   3762 		lock_basic_unlock(&cookie_secrets->lock);
   3763 		(void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n",
   3764 				secret_file);
   3765 		return;
   3766 	}
   3767 	drop_cookie_secret(cookie_secrets);
   3768 	if(worker->thread_num == 0)
   3769 		(void)cookie_secret_file_dump(ssl, worker);
   3770 	lock_basic_unlock(&cookie_secrets->lock);
   3771 	send_ok(ssl);
   3772 }
   3773 
   3774 /** Add cookie secret */
   3775 static void
   3776 do_add_cookie_secret(RES* ssl, struct worker* worker, char* arg) {
   3777 	uint8_t secret[UNBOUND_COOKIE_SECRET_SIZE];
   3778 	char const* secret_file = worker->env.cfg->cookie_secret_file;
   3779 	struct cookie_secrets* cookie_secrets = worker->daemon->cookie_secrets;
   3780 
   3781 	if(secret_file == NULL || secret_file[0] == 0) {
   3782 		(void)ssl_printf(ssl, "error: no cookie secret file configured\n");
   3783 		return;
   3784 	}
   3785 	if(cookie_secrets == NULL) {
   3786 		worker->daemon->cookie_secrets = cookie_secrets_create();
   3787 		if(!worker->daemon->cookie_secrets) {
   3788 			(void)ssl_printf(ssl, "error: out of memory");
   3789 			return;
   3790 		}
   3791 		cookie_secrets = worker->daemon->cookie_secrets;
   3792 	}
   3793 	lock_basic_lock(&cookie_secrets->lock);
   3794 
   3795 	if(*arg == '\0') {
   3796 		lock_basic_unlock(&cookie_secrets->lock);
   3797 		(void)ssl_printf(ssl, "error: missing argument (cookie_secret)\n");
   3798 		return;
   3799 	}
   3800 	if(strlen(arg) != 32) {
   3801 		lock_basic_unlock(&cookie_secrets->lock);
   3802 		explicit_bzero(arg, strlen(arg));
   3803 		(void)ssl_printf(ssl, "invalid cookie secret: invalid argument length\n");
   3804 		(void)ssl_printf(ssl, "please provide a 128bit hex encoded secret\n");
   3805 		return;
   3806 	}
   3807 	if(hex_pton(arg, secret, UNBOUND_COOKIE_SECRET_SIZE) !=
   3808 		UNBOUND_COOKIE_SECRET_SIZE ) {
   3809 		lock_basic_unlock(&cookie_secrets->lock);
   3810 		explicit_bzero(secret, UNBOUND_COOKIE_SECRET_SIZE);
   3811 		explicit_bzero(arg, strlen(arg));
   3812 		(void)ssl_printf(ssl, "invalid cookie secret: parse error\n");
   3813 		(void)ssl_printf(ssl, "please provide a 128bit hex encoded secret\n");
   3814 		return;
   3815 	}
   3816 	/* Only the worker 0 writes to file, the others update state. */
   3817 	if(worker->thread_num == 0 && !cookie_secret_file_dump(ssl, worker)) {
   3818 		lock_basic_unlock(&cookie_secrets->lock);
   3819 		explicit_bzero(secret, UNBOUND_COOKIE_SECRET_SIZE);
   3820 		explicit_bzero(arg, strlen(arg));
   3821 		(void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n",
   3822 				secret_file);
   3823 		return;
   3824 	}
   3825 	add_cookie_secret(cookie_secrets, secret, UNBOUND_COOKIE_SECRET_SIZE);
   3826 	explicit_bzero(secret, UNBOUND_COOKIE_SECRET_SIZE);
   3827 	if(worker->thread_num == 0)
   3828 		(void)cookie_secret_file_dump(ssl, worker);
   3829 	lock_basic_unlock(&cookie_secrets->lock);
   3830 	explicit_bzero(arg, strlen(arg));
   3831 	send_ok(ssl);
   3832 }
   3833 
   3834 /** Print cookie secrets */
   3835 static void
   3836 do_print_cookie_secrets(RES* ssl, struct worker* worker) {
   3837 	struct cookie_secrets* cookie_secrets = worker->daemon->cookie_secrets;
   3838 	char secret_hex[UNBOUND_COOKIE_SECRET_SIZE * 2 + 1];
   3839 	int i;
   3840 
   3841 	if(!cookie_secrets)
   3842 		return; /* Output is empty. */
   3843 	lock_basic_lock(&cookie_secrets->lock);
   3844 	for(i = 0; (size_t)i < cookie_secrets->cookie_count; i++) {
   3845 		struct cookie_secret const* cs = &cookie_secrets->
   3846 			cookie_secrets[i];
   3847 		ssize_t const len = hex_ntop(cs->cookie_secret,
   3848 			UNBOUND_COOKIE_SECRET_SIZE, secret_hex,
   3849 			sizeof(secret_hex));
   3850 		(void)len; /* silence unused variable warning with -DNDEBUG */
   3851 		log_assert( len == UNBOUND_COOKIE_SECRET_SIZE * 2 );
   3852 		secret_hex[UNBOUND_COOKIE_SECRET_SIZE * 2] = '\0';
   3853 		if (i == 0)
   3854 			(void)ssl_printf(ssl, "active : %s\n",  secret_hex);
   3855 		else if (cookie_secrets->cookie_count == 2)
   3856 			(void)ssl_printf(ssl, "staging: %s\n",  secret_hex);
   3857 		else
   3858 			(void)ssl_printf(ssl, "staging[%d]: %s\n", i,
   3859 				secret_hex);
   3860 	}
   3861 	lock_basic_unlock(&cookie_secrets->lock);
   3862 	explicit_bzero(secret_hex, sizeof(secret_hex));
   3863 }
   3864 
   3865 /** check that there is no argument after a command that takes no arguments. */
   3866 static int
   3867 cmd_no_args(RES* ssl, char* cmd, char* p)
   3868 {
   3869 	if(p && *p != 0) {
   3870 		/* cmd contains the command that is called at the start,
   3871 		 * with space or tab after it. */
   3872 		char* c = cmd;
   3873 		if(strchr(c, ' ') && strchr(c, '\t')) {
   3874 			if(strchr(c, ' ') < strchr(c, '\t'))
   3875 				*strchr(c, ' ')=0;
   3876 			else	*strchr(c, '\t')=0;
   3877 		} else if(strchr(c, ' ')) {
   3878 			*strchr(c, ' ')=0;
   3879 		} else if(strchr(c, '\t')) {
   3880 			*strchr(c, '\t')=0;
   3881 		}
   3882 		(void)ssl_printf(ssl, "error command %s takes no arguments,"
   3883 			" have '%s'\n", c, p);
   3884 		return 1;
   3885 	}
   3886 	return 0;
   3887 }
   3888 
   3889 /** check for name with end-of-string, space or tab after it */
   3890 static int
   3891 cmdcmp(char* p, const char* cmd, size_t len)
   3892 {
   3893 	return strncmp(p,cmd,len)==0 && (p[len]==0||p[len]==' '||p[len]=='\t');
   3894 }
   3895 
   3896 /** execute a remote control command */
   3897 static void
   3898 execute_cmd(struct daemon_remote* rc, struct rc_state* s, RES* ssl, char* cmd,
   3899 	struct worker* worker)
   3900 {
   3901 	char* p = skipwhite(cmd);
   3902 	/* compare command */
   3903 	if(cmdcmp(p, "stop", 4)) {
   3904 		if(cmd_no_args(ssl, p, skipwhite(p+4)))
   3905 			return;
   3906 		do_stop(ssl, worker);
   3907 		return;
   3908 	} else if(cmdcmp(p, "reload_keep_cache", 17)) {
   3909 		if(cmd_no_args(ssl, p, skipwhite(p+17)))
   3910 			return;
   3911 		do_reload(ssl, worker, 1);
   3912 		return;
   3913 	} else if(cmdcmp(p, "reload", 6)) {
   3914 		if(cmd_no_args(ssl, p, skipwhite(p+6)))
   3915 			return;
   3916 		do_reload(ssl, worker, 0);
   3917 		return;
   3918 	} else if(cmdcmp(p, "fast_reload", 11)) {
   3919 		do_fast_reload(ssl, worker, s, skipwhite(p+11));
   3920 		return;
   3921 	} else if(cmdcmp(p, "stats_noreset", 13)) {
   3922 		if(cmd_no_args(ssl, p, skipwhite(p+13)))
   3923 			return;
   3924 		do_stats(ssl, worker, 0);
   3925 		return;
   3926 	} else if(cmdcmp(p, "stats", 5)) {
   3927 		if(cmd_no_args(ssl, p, skipwhite(p+5)))
   3928 			return;
   3929 		do_stats(ssl, worker, 1);
   3930 		return;
   3931 	} else if(cmdcmp(p, "status", 6)) {
   3932 		if(cmd_no_args(ssl, p, skipwhite(p+6)))
   3933 			return;
   3934 		do_status(ssl, worker);
   3935 		return;
   3936 	} else if(cmdcmp(p, "dump_cache", 10)) {
   3937 		if(cmd_no_args(ssl, p, skipwhite(p+10)))
   3938 			return;
   3939 #ifdef THREADS_DISABLED
   3940 		if(worker->daemon->num > 1) {
   3941 			(void)ssl_printf(ssl, "dump_cache/load_cache is not "
   3942 				"supported in multi-process operation\n");
   3943 			return;
   3944 		}
   3945 #endif
   3946 		(void)dump_cache(ssl, worker);
   3947 		return;
   3948 	} else if(cmdcmp(p, "load_cache", 10)) {
   3949 		if(cmd_no_args(ssl, p, skipwhite(p+10)))
   3950 			return;
   3951 #ifdef THREADS_DISABLED
   3952 		if(worker->daemon->num > 1) {
   3953 			/* The warning can't be printed when stdin is sending
   3954 			 * data; just return */
   3955 			return;
   3956 		}
   3957 #endif
   3958 		if(load_cache(ssl, worker)) send_ok(ssl);
   3959 		return;
   3960 	} else if(cmdcmp(p, "list_forwards", 13)) {
   3961 		if(cmd_no_args(ssl, p, skipwhite(p+13)))
   3962 			return;
   3963 		do_list_forwards(ssl, worker);
   3964 		return;
   3965 	} else if(cmdcmp(p, "list_stubs", 10)) {
   3966 		if(cmd_no_args(ssl, p, skipwhite(p+10)))
   3967 			return;
   3968 		do_list_stubs(ssl, worker);
   3969 		return;
   3970 	} else if(cmdcmp(p, "list_insecure", 13)) {
   3971 		if(cmd_no_args(ssl, p, skipwhite(p+13)))
   3972 			return;
   3973 		do_insecure_list(ssl, worker);
   3974 		return;
   3975 	} else if(cmdcmp(p, "list_local_zones", 16)) {
   3976 		if(cmd_no_args(ssl, p, skipwhite(p+16)))
   3977 			return;
   3978 		do_list_local_zones(ssl, worker->daemon->local_zones);
   3979 		return;
   3980 	} else if(cmdcmp(p, "list_local_data", 15)) {
   3981 		if(cmd_no_args(ssl, p, skipwhite(p+15)))
   3982 			return;
   3983 		do_list_local_data(ssl, worker, worker->daemon->local_zones);
   3984 		return;
   3985 	} else if(cmdcmp(p, "view_list_local_zones", 21)) {
   3986 		do_view_list_local_zones(ssl, worker, skipwhite(p+21));
   3987 		return;
   3988 	} else if(cmdcmp(p, "view_list_local_data", 20)) {
   3989 		do_view_list_local_data(ssl, worker, skipwhite(p+20));
   3990 		return;
   3991 	} else if(cmdcmp(p, "ratelimit_list", 14)) {
   3992 		do_ratelimit_list(ssl, worker, p+14);
   3993 		return;
   3994 	} else if(cmdcmp(p, "ip_ratelimit_list", 17)) {
   3995 		do_ip_ratelimit_list(ssl, worker, p+17);
   3996 		return;
   3997 	} else if(cmdcmp(p, "list_auth_zones", 15)) {
   3998 		if(cmd_no_args(ssl, p, skipwhite(p+15)))
   3999 			return;
   4000 		do_list_auth_zones(ssl, worker->env.auth_zones);
   4001 		return;
   4002 	} else if(cmdcmp(p, "auth_zone_reload", 16)) {
   4003 		do_auth_zone_reload(ssl, worker, skipwhite(p+16));
   4004 		return;
   4005 	} else if(cmdcmp(p, "auth_zone_transfer", 18)) {
   4006 		do_auth_zone_transfer(ssl, worker, skipwhite(p+18));
   4007 		return;
   4008 	} else if(cmdcmp(p, "insecure_add", 12)) {
   4009 		/* must always distribute this cmd */
   4010 		if(rc) distribute_cmd(rc, ssl, cmd);
   4011 		do_insecure_add(ssl, worker, skipwhite(p+12));
   4012 		return;
   4013 	} else if(cmdcmp(p, "insecure_remove", 15)) {
   4014 		/* must always distribute this cmd */
   4015 		if(rc) distribute_cmd(rc, ssl, cmd);
   4016 		do_insecure_remove(ssl, worker, skipwhite(p+15));
   4017 		return;
   4018 	} else if(cmdcmp(p, "flush_stats", 11)) {
   4019 		/* must always distribute this cmd */
   4020 		if(cmd_no_args(ssl, p, skipwhite(p+11)))
   4021 			return;
   4022 		if(rc) distribute_cmd(rc, ssl, cmd);
   4023 		do_flush_stats(ssl, worker);
   4024 		return;
   4025 	} else if(cmdcmp(p, "flush_requestlist", 17)) {
   4026 		/* must always distribute this cmd */
   4027 		if(cmd_no_args(ssl, p, skipwhite(p+17)))
   4028 			return;
   4029 		if(rc) distribute_cmd(rc, ssl, cmd);
   4030 		do_flush_requestlist(ssl, worker);
   4031 		return;
   4032 	} else if(cmdcmp(p, "cache_lookup", 12)) {
   4033 		do_cache_lookup(ssl, worker, skipwhite(p+12));
   4034 		return;
   4035 	} else if(cmdcmp(p, "lookup", 6)) {
   4036 		do_lookup(ssl, worker, skipwhite(p+6));
   4037 		return;
   4038 	/* The following are commands that read stdin.
   4039 	 * Each line needs to be distributed if THREADS_DISABLED.
   4040 	 */
   4041 	} else if(cmdcmp(p, "local_zones_remove", 18)) {
   4042 		if(cmd_no_args(ssl, p, skipwhite(p+18)))
   4043 			return;
   4044 		do_zones_remove(rc, ssl, worker);
   4045 		return;
   4046 	} else if(cmdcmp(p, "local_zones", 11)) {
   4047 		if(cmd_no_args(ssl, p, skipwhite(p+11)))
   4048 			return;
   4049 		do_zones_add(rc, ssl, worker);
   4050 		return;
   4051 	} else if(cmdcmp(p, "local_datas_remove", 18)) {
   4052 		if(cmd_no_args(ssl, p, skipwhite(p+18)))
   4053 			return;
   4054 		do_datas_remove(rc, ssl, worker);
   4055 		return;
   4056 	} else if(cmdcmp(p, "local_datas", 11)) {
   4057 		if(cmd_no_args(ssl, p, skipwhite(p+11)))
   4058 			return;
   4059 		do_datas_add(rc, ssl, worker);
   4060 		return;
   4061 	} else if(cmdcmp(p, "view_local_datas_remove", 23)){
   4062 		do_view_datas_remove(rc, ssl, worker, skipwhite(p+23));
   4063 		return;
   4064 	} else if(cmdcmp(p, "view_local_datas", 16)) {
   4065 		do_view_datas_add(rc, ssl, worker, skipwhite(p+16));
   4066 		return;
   4067 	} else if(cmdcmp(p, "print_cookie_secrets", 20)) {
   4068 		if(cmd_no_args(ssl, p, skipwhite(p+20)))
   4069 			return;
   4070 		do_print_cookie_secrets(ssl, worker);
   4071 		return;
   4072 	}
   4073 
   4074 #ifdef THREADS_DISABLED
   4075 	/* other processes must execute the command as well */
   4076 	/* commands that should not be distributed, returned above. */
   4077 	if(rc) { /* only if this thread is the master (rc) thread */
   4078 		/* done before the code below, which may split the string */
   4079 		distribute_cmd(rc, ssl, cmd);
   4080 	}
   4081 #endif
   4082 	if(cmdcmp(p, "verbosity", 9)) {
   4083 		do_verbosity(ssl, skipwhite(p+9));
   4084 	} else if(cmdcmp(p, "local_zone_remove", 17)) {
   4085 		do_zone_remove(ssl, worker->daemon->local_zones, skipwhite(p+17));
   4086 	} else if(cmdcmp(p, "local_zone", 10)) {
   4087 		do_zone_add(ssl, worker->daemon->local_zones, skipwhite(p+10));
   4088 	} else if(cmdcmp(p, "local_data_remove", 17)) {
   4089 		do_data_remove(ssl, worker->daemon->local_zones, skipwhite(p+17));
   4090 	} else if(cmdcmp(p, "local_data", 10)) {
   4091 		do_data_add(ssl, worker->daemon->local_zones, skipwhite(p+10));
   4092 	} else if(cmdcmp(p, "forward_add", 11)) {
   4093 		do_forward_add(ssl, worker, skipwhite(p+11));
   4094 	} else if(cmdcmp(p, "forward_remove", 14)) {
   4095 		do_forward_remove(ssl, worker, skipwhite(p+14));
   4096 	} else if(cmdcmp(p, "forward", 7)) {
   4097 		do_forward(ssl, worker, skipwhite(p+7));
   4098 	} else if(cmdcmp(p, "stub_add", 8)) {
   4099 		do_stub_add(ssl, worker, skipwhite(p+8));
   4100 	} else if(cmdcmp(p, "stub_remove", 11)) {
   4101 		do_stub_remove(ssl, worker, skipwhite(p+11));
   4102 	} else if(cmdcmp(p, "view_local_zone_remove", 22)) {
   4103 		do_view_zone_remove(ssl, worker, skipwhite(p+22));
   4104 	} else if(cmdcmp(p, "view_local_zone", 15)) {
   4105 		do_view_zone_add(ssl, worker, skipwhite(p+15));
   4106 	} else if(cmdcmp(p, "view_local_data_remove", 22)) {
   4107 		do_view_data_remove(ssl, worker, skipwhite(p+22));
   4108 	} else if(cmdcmp(p, "view_local_data", 15)) {
   4109 		do_view_data_add(ssl, worker, skipwhite(p+15));
   4110 	} else if(cmdcmp(p, "flush_zone", 10)) {
   4111 		do_flush_zone(ssl, worker, skipwhite(p+10));
   4112 	} else if(cmdcmp(p, "flush_type", 10)) {
   4113 		do_flush_type(ssl, worker, skipwhite(p+10));
   4114 	} else if(cmdcmp(p, "flush_infra", 11)) {
   4115 		do_flush_infra(ssl, worker, skipwhite(p+11));
   4116 	} else if(cmdcmp(p, "flush", 5)) {
   4117 		do_flush_name(ssl, worker, skipwhite(p+5));
   4118 	} else if(cmdcmp(p, "dump_requestlist", 16)) {
   4119 		if(cmd_no_args(ssl, p, skipwhite(p+16)))
   4120 			return;
   4121 		do_dump_requestlist(ssl, worker);
   4122 	} else if(cmdcmp(p, "dump_infra", 10)) {
   4123 		if(cmd_no_args(ssl, p, skipwhite(p+10)))
   4124 			return;
   4125 		do_dump_infra(ssl, worker);
   4126 	} else if(cmdcmp(p, "log_reopen", 10)) {
   4127 		if(cmd_no_args(ssl, p, skipwhite(p+10)))
   4128 			return;
   4129 		do_log_reopen(ssl, worker);
   4130 	} else if(cmdcmp(p, "set_option", 10)) {
   4131 		do_set_option(ssl, worker, skipwhite(p+10));
   4132 	} else if(cmdcmp(p, "get_option", 10)) {
   4133 		do_get_option(ssl, worker, skipwhite(p+10));
   4134 	} else if(cmdcmp(p, "flush_bogus", 11)) {
   4135 		do_flush_bogus(ssl, worker, skipwhite(p+11));
   4136 	} else if(cmdcmp(p, "flush_negative", 14)) {
   4137 		do_flush_negative(ssl, worker, skipwhite(p+14));
   4138 	} else if(cmdcmp(p, "rpz_enable", 10)) {
   4139 		do_rpz_enable(ssl, worker, skipwhite(p+10));
   4140 	} else if(cmdcmp(p, "rpz_disable", 11)) {
   4141 		do_rpz_disable(ssl, worker, skipwhite(p+11));
   4142 	} else if(cmdcmp(p, "add_cookie_secret", 17)) {
   4143 		do_add_cookie_secret(ssl, worker, skipwhite(p+17));
   4144 	} else if(cmdcmp(p, "drop_cookie_secret", 18)) {
   4145 		if(cmd_no_args(ssl, p, skipwhite(p+18)))
   4146 			return;
   4147 		do_drop_cookie_secret(ssl, worker);
   4148 	} else if(cmdcmp(p, "activate_cookie_secret", 22)) {
   4149 		if(cmd_no_args(ssl, p, skipwhite(p+22)))
   4150 			return;
   4151 		do_activate_cookie_secret(ssl, worker);
   4152 	} else {
   4153 		(void)ssl_printf(ssl, "error unknown command '%s'\n", p);
   4154 	}
   4155 }
   4156 
   4157 void
   4158 daemon_remote_exec(struct worker* worker)
   4159 {
   4160 	/* read the cmd string */
   4161 	uint8_t* msg = NULL;
   4162 	uint32_t len = 0;
   4163 	if(!tube_read_msg(worker->cmd, &msg, &len, 0)) {
   4164 		log_err("daemon_remote_exec: tube_read_msg failed");
   4165 		return;
   4166 	}
   4167 	verbose(VERB_ALGO, "remote exec distributed: %s", (char*)msg);
   4168 	execute_cmd(NULL, NULL, NULL, (char*)msg, worker);
   4169 	free(msg);
   4170 }
   4171 
   4172 /** handle remote control request */
   4173 static void
   4174 handle_req(struct daemon_remote* rc, struct rc_state* s, RES* res)
   4175 {
   4176 	int r;
   4177 	char pre[10];
   4178 	char magic[7];
   4179 	char buf[MAX_CMD_STRLINE];
   4180 #ifdef USE_WINSOCK
   4181 	/* makes it possible to set the socket blocking again. */
   4182 	/* basically removes it from winsock_event ... */
   4183 	WSAEventSelect(s->c->fd, NULL, 0);
   4184 #endif
   4185 	fd_set_block(s->c->fd);
   4186 
   4187 	/* try to read magic UBCT[version]_space_ string */
   4188 	if(res->ssl) {
   4189 		ERR_clear_error();
   4190 		if((r=SSL_read(res->ssl, magic, (int)sizeof(magic)-1)) <= 0) {
   4191 			int r2;
   4192 			if((r2=SSL_get_error(res->ssl, r)) == SSL_ERROR_ZERO_RETURN)
   4193 				return;
   4194 			log_crypto_err_io("could not SSL_read", r2);
   4195 			return;
   4196 		}
   4197 	} else {
   4198 		while(1) {
   4199 			ssize_t rr = recv(res->fd, magic, sizeof(magic)-1, 0);
   4200 			if(rr <= 0) {
   4201 				if(rr == 0) return;
   4202 				if(errno == EINTR || errno == EAGAIN)
   4203 					continue;
   4204 				log_err("could not recv: %s", sock_strerror(errno));
   4205 				return;
   4206 			}
   4207 			r = (int)rr;
   4208 			break;
   4209 		}
   4210 	}
   4211 	magic[6] = 0;
   4212 	if( r != 6 || strncmp(magic, "UBCT", 4) != 0) {
   4213 		verbose(VERB_QUERY, "control connection has bad magic string");
   4214 		/* probably wrong tool connected, ignore it completely */
   4215 		return;
   4216 	}
   4217 
   4218 	/* read the command line */
   4219 	if(!ssl_read_line(res, buf, sizeof(buf))) {
   4220 		return;
   4221 	}
   4222 	snprintf(pre, sizeof(pre), "UBCT%d ", UNBOUND_CONTROL_VERSION);
   4223 	if(strcmp(magic, pre) != 0) {
   4224 		verbose(VERB_QUERY, "control connection had bad "
   4225 			"version %s, cmd: %s", magic, buf);
   4226 		ssl_printf(res, "error version mismatch\n");
   4227 		return;
   4228 	}
   4229 	verbose(VERB_DETAIL, "control cmd: %s", buf);
   4230 
   4231 	/* figure out what to do */
   4232 	execute_cmd(rc, s, res, buf, rc->worker);
   4233 }
   4234 
   4235 /** handle SSL_do_handshake changes to the file descriptor to wait for later */
   4236 static int
   4237 remote_handshake_later(struct daemon_remote* rc, struct rc_state* s,
   4238 	struct comm_point* c, int r, int r2)
   4239 {
   4240 	if(r2 == SSL_ERROR_WANT_READ) {
   4241 		if(s->shake_state == rc_hs_read) {
   4242 			/* try again later */
   4243 			return 0;
   4244 		}
   4245 		s->shake_state = rc_hs_read;
   4246 		comm_point_listen_for_rw(c, 1, 0);
   4247 		return 0;
   4248 	} else if(r2 == SSL_ERROR_WANT_WRITE) {
   4249 		if(s->shake_state == rc_hs_write) {
   4250 			/* try again later */
   4251 			return 0;
   4252 		}
   4253 		s->shake_state = rc_hs_write;
   4254 		comm_point_listen_for_rw(c, 0, 1);
   4255 		return 0;
   4256 	} else {
   4257 		if(r == 0)
   4258 			log_err("remote control connection closed prematurely");
   4259 		log_addr(VERB_OPS, "failed connection from",
   4260 			&s->c->repinfo.remote_addr, s->c->repinfo.remote_addrlen);
   4261 		log_crypto_err_io("remote control failed ssl", r2);
   4262 		clean_point(rc, s);
   4263 	}
   4264 	return 0;
   4265 }
   4266 
   4267 int remote_control_callback(struct comm_point* c, void* arg, int err,
   4268 	struct comm_reply* ATTR_UNUSED(rep))
   4269 {
   4270 	RES res;
   4271 	struct rc_state* s = (struct rc_state*)arg;
   4272 	struct daemon_remote* rc = s->rc;
   4273 	int r;
   4274 	if(err != NETEVENT_NOERROR) {
   4275 		if(err==NETEVENT_TIMEOUT)
   4276 			log_err("remote control timed out");
   4277 		clean_point(rc, s);
   4278 		return 0;
   4279 	}
   4280 	if(s->ssl) {
   4281 		/* (continue to) setup the SSL connection */
   4282 		ERR_clear_error();
   4283 		r = SSL_do_handshake(s->ssl);
   4284 		if(r != 1) {
   4285 			int r2 = SSL_get_error(s->ssl, r);
   4286 			return remote_handshake_later(rc, s, c, r, r2);
   4287 		}
   4288 		s->shake_state = rc_none;
   4289 	}
   4290 
   4291 	/* once handshake has completed, check authentication */
   4292 	if (!rc->use_cert) {
   4293 		verbose(VERB_ALGO, "unauthenticated remote control connection");
   4294 	} else if(SSL_get_verify_result(s->ssl) == X509_V_OK) {
   4295 #ifdef HAVE_SSL_GET1_PEER_CERTIFICATE
   4296 		X509* x = SSL_get1_peer_certificate(s->ssl);
   4297 #else
   4298 		X509* x = SSL_get_peer_certificate(s->ssl);
   4299 #endif
   4300 		if(!x) {
   4301 			verbose(VERB_DETAIL, "remote control connection "
   4302 				"provided no client certificate");
   4303 			clean_point(rc, s);
   4304 			return 0;
   4305 		}
   4306 		verbose(VERB_ALGO, "remote control connection authenticated");
   4307 		X509_free(x);
   4308 	} else {
   4309 		verbose(VERB_DETAIL, "remote control connection failed to "
   4310 			"authenticate with client certificate");
   4311 		clean_point(rc, s);
   4312 		return 0;
   4313 	}
   4314 
   4315 	/* if OK start to actually handle the request */
   4316 	res.ssl = s->ssl;
   4317 	res.fd = c->fd;
   4318 	handle_req(rc, s, &res);
   4319 
   4320 	verbose(VERB_ALGO, "remote control operation completed");
   4321 	clean_point(rc, s);
   4322 	return 0;
   4323 }
   4324 
   4325 /**
   4326  * This routine polls a socket for readiness.
   4327  * @param fd: file descriptor, -1 uses no fd for a timer only.
   4328  * @param timeout: time in msec to wait. 0 means nonblocking test,
   4329  * 	-1 waits blocking for events.
   4330  * @param pollin: check for input event.
   4331  * @param pollout: check for output event.
   4332  * @param event: output variable, set to true if the event happens.
   4333  * 	It is false if there was an error or timeout.
   4334  * @return false is system call failure, also logged.
   4335  */
   4336 static int
   4337 sock_poll_timeout(int fd, int timeout, int pollin, int pollout, int* event)
   4338 {
   4339 	int loopcount = 0;
   4340 	/* Loop if the system call returns an errno to do so, like EINTR. */
   4341 	log_assert(pollin || pollout);
   4342 	while(1) {
   4343 		struct pollfd p, *fds;
   4344 		int nfds, ret;
   4345 		if(++loopcount > IPC_LOOP_MAX) {
   4346 			log_err("sock_poll_timeout: loop");
   4347 			if(event)
   4348 				*event = 0;
   4349 			return 0;
   4350 		}
   4351 		if(fd == -1) {
   4352 			fds = NULL;
   4353 			nfds = 0;
   4354 		} else {
   4355 			fds = &p;
   4356 			nfds = 1;
   4357 			memset(&p, 0, sizeof(p));
   4358 			p.fd = fd;
   4359 #ifndef USE_WINSOCK
   4360 			p.events = POLLERR
   4361 				| POLLHUP
   4362 				;
   4363 #endif
   4364 			if(pollin)
   4365 				p.events |= POLLIN;
   4366 			if(pollout)
   4367 				p.events |= POLLOUT;
   4368 		}
   4369 #ifndef USE_WINSOCK
   4370 		ret = poll(fds, nfds, timeout);
   4371 #else
   4372 		if(fds == NULL) {
   4373 			Sleep(timeout);
   4374 			ret = 0;
   4375 		} else {
   4376 			ret = WSAPoll(fds, nfds, timeout);
   4377 		}
   4378 #endif
   4379 		if(ret == -1) {
   4380 #ifndef USE_WINSOCK
   4381 			if(
   4382 				errno == EINTR || errno == EAGAIN
   4383 #  ifdef EWOULDBLOCK
   4384 				|| errno == EWOULDBLOCK
   4385 #  endif
   4386 			) continue; /* Try again. */
   4387 #endif
   4388 			/* For WSAPoll we only get errors here:
   4389 			 * o WSAENETDOWN
   4390 			 * o WSAEFAULT
   4391 			 * o WSAEINVAL
   4392 			 * o WSAENOBUFS
   4393 			 */
   4394 			log_err("poll: %s", sock_strerror(errno));
   4395 			if(event)
   4396 				*event = 0;
   4397 			return 0;
   4398 		} else if(ret == 0) {
   4399 			/* Timeout */
   4400 			if(event)
   4401 				*event = 0;
   4402 			return 1;
   4403 		}
   4404 		break;
   4405 	}
   4406 	if(event)
   4407 		*event = 1;
   4408 	return 1;
   4409 }
   4410 
   4411 /** fast reload convert fast reload notification status to string */
   4412 static const char*
   4413 fr_notification_to_string(enum fast_reload_notification status)
   4414 {
   4415 	switch(status) {
   4416 	case fast_reload_notification_none:
   4417 		return "none";
   4418 	case fast_reload_notification_done:
   4419 		return "done";
   4420 	case fast_reload_notification_done_error:
   4421 		return "done_error";
   4422 	case fast_reload_notification_exit:
   4423 		return "exit";
   4424 	case fast_reload_notification_exited:
   4425 		return "exited";
   4426 	case fast_reload_notification_printout:
   4427 		return "printout";
   4428 	case fast_reload_notification_reload_stop:
   4429 		return "reload_stop";
   4430 	case fast_reload_notification_reload_ack:
   4431 		return "reload_ack";
   4432 	case fast_reload_notification_reload_nopause_poll:
   4433 		return "reload_nopause_poll";
   4434 	case fast_reload_notification_reload_start:
   4435 		return "reload_start";
   4436 	default:
   4437 		break;
   4438 	}
   4439 	return "unknown";
   4440 }
   4441 
   4442 #ifndef THREADS_DISABLED
   4443 /** fast reload, poll for notification incoming. True if quit */
   4444 static int
   4445 fr_poll_for_quit(struct fast_reload_thread* fr)
   4446 {
   4447 	int inevent, loopexit = 0, bcount = 0;
   4448 	uint32_t cmd;
   4449 	ssize_t ret;
   4450 
   4451 	if(fr->need_to_quit)
   4452 		return 1;
   4453 	/* Is there data? */
   4454 	if(!sock_poll_timeout(fr->commpair[1], 0, 1, 0, &inevent)) {
   4455 		log_err("fr_poll_for_quit: poll failed");
   4456 		return 0;
   4457 	}
   4458 	if(!inevent)
   4459 		return 0;
   4460 
   4461 	/* Read the data */
   4462 	while(1) {
   4463 		if(++loopexit > IPC_LOOP_MAX) {
   4464 			log_err("fr_poll_for_quit: recv loops %s",
   4465 				sock_strerror(errno));
   4466 			return 0;
   4467 		}
   4468 		ret = recv(fr->commpair[1], ((char*)&cmd)+bcount,
   4469 			sizeof(cmd)-bcount, 0);
   4470 		if(ret == -1) {
   4471 			if(
   4472 #ifndef USE_WINSOCK
   4473 				errno == EINTR || errno == EAGAIN
   4474 #  ifdef EWOULDBLOCK
   4475 				|| errno == EWOULDBLOCK
   4476 #  endif
   4477 #else
   4478 				WSAGetLastError() == WSAEINTR ||
   4479 				WSAGetLastError() == WSAEINPROGRESS ||
   4480 				WSAGetLastError() == WSAEWOULDBLOCK
   4481 #endif
   4482 				)
   4483 				continue; /* Try again. */
   4484 			log_err("fr_poll_for_quit: recv: %s",
   4485 				sock_strerror(errno));
   4486 			return 0;
   4487 		} else if(ret+(ssize_t)bcount != sizeof(cmd)) {
   4488 			bcount += ret;
   4489 			if((size_t)bcount < sizeof(cmd))
   4490 				continue;
   4491 		}
   4492 		break;
   4493 	}
   4494 	if(cmd == fast_reload_notification_exit) {
   4495 		fr->need_to_quit = 1;
   4496 		verbose(VERB_ALGO, "fast reload: exit notification received");
   4497 		return 1;
   4498 	}
   4499 	log_err("fr_poll_for_quit: unknown notification status received: %d %s",
   4500 		cmd, fr_notification_to_string(cmd));
   4501 	return 0;
   4502 }
   4503 
   4504 /** fast reload thread. Send notification from the fast reload thread */
   4505 static void
   4506 fr_send_notification(struct fast_reload_thread* fr,
   4507 	enum fast_reload_notification status)
   4508 {
   4509 	int outevent, loopexit = 0, bcount = 0;
   4510 	uint32_t cmd;
   4511 	ssize_t ret;
   4512 	verbose(VERB_ALGO, "fast reload: send notification %s",
   4513 		fr_notification_to_string(status));
   4514 	/* Make a blocking attempt to send. But meanwhile stay responsive,
   4515 	 * once in a while for quit commands. In case the server has to quit. */
   4516 	/* see if there is incoming quit signals */
   4517 	if(fr_poll_for_quit(fr))
   4518 		return;
   4519 	cmd = status;
   4520 	while(1) {
   4521 		if(++loopexit > IPC_LOOP_MAX) {
   4522 			log_err("fast reload: could not send notification");
   4523 			return;
   4524 		}
   4525 		/* wait for socket to become writable */
   4526 		if(!sock_poll_timeout(fr->commpair[1], IPC_NOTIFICATION_WAIT,
   4527 			0, 1, &outevent)) {
   4528 			log_err("fast reload: poll failed");
   4529 			return;
   4530 		}
   4531 		if(fr_poll_for_quit(fr))
   4532 			return;
   4533 		if(!outevent)
   4534 			continue;
   4535 		ret = send(fr->commpair[1], ((char*)&cmd)+bcount,
   4536 			sizeof(cmd)-bcount, 0);
   4537 		if(ret == -1) {
   4538 			if(
   4539 #ifndef USE_WINSOCK
   4540 				errno == EINTR || errno == EAGAIN
   4541 #  ifdef EWOULDBLOCK
   4542 				|| errno == EWOULDBLOCK
   4543 #  endif
   4544 #else
   4545 				WSAGetLastError() == WSAEINTR ||
   4546 				WSAGetLastError() == WSAEINPROGRESS ||
   4547 				WSAGetLastError() == WSAEWOULDBLOCK
   4548 #endif
   4549 				)
   4550 				continue; /* Try again. */
   4551 			log_err("fast reload send notification: send: %s",
   4552 				sock_strerror(errno));
   4553 			return;
   4554 		} else if(ret+(ssize_t)bcount != sizeof(cmd)) {
   4555 			bcount += ret;
   4556 			if((size_t)bcount < sizeof(cmd))
   4557 				continue;
   4558 		}
   4559 		break;
   4560 	}
   4561 }
   4562 
   4563 /** fast reload thread queue up text string for output */
   4564 static int
   4565 fr_output_text(struct fast_reload_thread* fr, const char* msg)
   4566 {
   4567 	char* item = strdup(msg);
   4568 	if(!item) {
   4569 		log_err("fast reload output text: strdup out of memory");
   4570 		return 0;
   4571 	}
   4572 	lock_basic_lock(&fr->fr_output_lock);
   4573 	if(!cfg_strlist_append(fr->fr_output, item)) {
   4574 		lock_basic_unlock(&fr->fr_output_lock);
   4575 		/* The item is freed by cfg_strlist_append on failure. */
   4576 		log_err("fast reload output text: append out of memory");
   4577 		return 0;
   4578 	}
   4579 	lock_basic_unlock(&fr->fr_output_lock);
   4580 	return 1;
   4581 }
   4582 
   4583 /** fast reload thread output vmsg function */
   4584 static int
   4585 fr_output_vmsg(struct fast_reload_thread* fr, const char* format, va_list args)
   4586 {
   4587 	char msg[1024];
   4588 	vsnprintf(msg, sizeof(msg), format, args);
   4589 	return fr_output_text(fr, msg);
   4590 }
   4591 
   4592 /** fast reload thread printout function, with printf arguments */
   4593 static int fr_output_printf(struct fast_reload_thread* fr,
   4594 	const char* format, ...) ATTR_FORMAT(printf, 2, 3);
   4595 
   4596 /** fast reload thread printout function, prints to list and signals
   4597  * the remote control thread to move that to get written to the socket
   4598  * of the remote control connection. */
   4599 static int
   4600 fr_output_printf(struct fast_reload_thread* fr, const char* format, ...)
   4601 {
   4602 	va_list args;
   4603 	int ret;
   4604 	va_start(args, format);
   4605 	ret = fr_output_vmsg(fr, format, args);
   4606 	va_end(args);
   4607 	return ret;
   4608 }
   4609 
   4610 /** fast reload thread, init time counters */
   4611 static void
   4612 fr_init_time(struct timeval* time_start, struct timeval* time_read,
   4613 	struct timeval* time_construct, struct timeval* time_reload,
   4614 	struct timeval* time_end)
   4615 {
   4616 	memset(time_start, 0, sizeof(*time_start));
   4617 	memset(time_read, 0, sizeof(*time_read));
   4618 	memset(time_construct, 0, sizeof(*time_construct));
   4619 	memset(time_reload, 0, sizeof(*time_reload));
   4620 	memset(time_end, 0, sizeof(*time_end));
   4621 	if(gettimeofday(time_start, NULL) < 0)
   4622 		log_err("gettimeofday: %s", strerror(errno));
   4623 }
   4624 
   4625 /**
   4626  * Structure with constructed elements for use during fast reload.
   4627  * At the start it contains the tree items for the new config.
   4628  * After the tree items are swapped into the server, the old elements
   4629  * are kept in here. They can then be deleted.
   4630  */
   4631 struct fast_reload_construct {
   4632 	/** construct for views */
   4633 	struct views* views;
   4634 	/** construct for auth zones */
   4635 	struct auth_zones* auth_zones;
   4636 	/** construct for forwards */
   4637 	struct iter_forwards* fwds;
   4638 	/** construct for stubs */
   4639 	struct iter_hints* hints;
   4640 	/** construct for respip_set */
   4641 	struct respip_set* respip_set;
   4642 	/** construct for access control */
   4643 	struct acl_list* acl;
   4644 	/** construct for access control interface */
   4645 	struct acl_list* acl_interface;
   4646 	/** construct for tcp connection limit */
   4647 	struct tcl_list* tcl;
   4648 	/** construct for local zones */
   4649 	struct local_zones* local_zones;
   4650 	/** if there is response ip configuration in use */
   4651 	int use_response_ip;
   4652 	/** if there is an rpz zone */
   4653 	int use_rpz;
   4654 	/** construct for edns strings */
   4655 	struct edns_strings* edns_strings;
   4656 	/** construct for trust anchors */
   4657 	struct val_anchors* anchors;
   4658 	/** construct for nsec3 key size */
   4659 	size_t* nsec3_keysize;
   4660 	/** construct for nsec3 max iter */
   4661 	size_t* nsec3_maxiter;
   4662 	/** construct for nsec3 keyiter count */
   4663 	int nsec3_keyiter_count;
   4664 	/** construct for target fetch policy */
   4665 	int* target_fetch_policy;
   4666 	/** construct for max dependency depth */
   4667 	int max_dependency_depth;
   4668 	/** construct for donotquery addresses */
   4669 	struct iter_donotq* donotq;
   4670 	/** construct for private addresses and domains */
   4671 	struct iter_priv* priv;
   4672 	/** construct whitelist for capsforid names */
   4673 	struct rbtree_type* caps_white;
   4674 	/** construct for nat64 */
   4675 	struct iter_nat64 nat64;
   4676 	/** construct for wait_limits_netblock */
   4677 	struct rbtree_type wait_limits_netblock;
   4678 	/** construct for wait_limits_cookie_netblock */
   4679 	struct rbtree_type wait_limits_cookie_netblock;
   4680 	/** construct for domain limits */
   4681 	struct rbtree_type domain_limits;
   4682 	/** storage for the old configuration elements. The outer struct
   4683 	 * is allocated with malloc here, the items are from config. */
   4684 	struct config_file* oldcfg;
   4685 };
   4686 
   4687 /** fast reload thread, read config */
   4688 static int
   4689 fr_read_config(struct fast_reload_thread* fr, struct config_file** newcfg)
   4690 {
   4691 	/* Create new config structure. */
   4692 	*newcfg = config_create();
   4693 	if(!*newcfg) {
   4694 		if(!fr_output_printf(fr, "config_create failed: out of memory\n"))
   4695 			return 0;
   4696 		fr_send_notification(fr, fast_reload_notification_printout);
   4697 		return 0;
   4698 	}
   4699 	if(fr_poll_for_quit(fr))
   4700 		return 1;
   4701 
   4702 	/* Read new config from file */
   4703 	if(!config_read(*newcfg, fr->worker->daemon->cfgfile,
   4704 		fr->worker->daemon->chroot)) {
   4705 		config_delete(*newcfg);
   4706 		if(!fr_output_printf(fr, "config_read %s%s%s%s failed: %s\n",
   4707 			(fr->worker->daemon->chroot?"<chroot:":""),
   4708 			(fr->worker->daemon->chroot?fr->worker->daemon->chroot:""),
   4709 			(fr->worker->daemon->chroot?"> ":""),
   4710 			fr->worker->daemon->cfgfile, strerror(errno)))
   4711 			return 0;
   4712 		fr_send_notification(fr, fast_reload_notification_printout);
   4713 		return 0;
   4714 	}
   4715 	if(fr_poll_for_quit(fr))
   4716 		return 1;
   4717 	if(fr->fr_verb >= 1) {
   4718 		if(!fr_output_printf(fr, "done read config file %s%s%s%s\n",
   4719 			(fr->worker->daemon->chroot?"<chroot:":""),
   4720 			(fr->worker->daemon->chroot?fr->worker->daemon->chroot:""),
   4721 			(fr->worker->daemon->chroot?"> ":""),
   4722 			fr->worker->daemon->cfgfile))
   4723 			return 0;
   4724 		fr_send_notification(fr, fast_reload_notification_printout);
   4725 	}
   4726 
   4727 	return 1;
   4728 }
   4729 
   4730 /** Check if two taglists are equal. */
   4731 static int
   4732 taglist_equal(char** tagname_a, int num_tags_a, char** tagname_b,
   4733 	int num_tags_b)
   4734 {
   4735 	int i;
   4736 	if(num_tags_a != num_tags_b)
   4737 		return 0;
   4738 	for(i=0; i<num_tags_a; i++) {
   4739 		if(strcmp(tagname_a[i], tagname_b[i]) != 0)
   4740 			return 0;
   4741 	}
   4742 	return 1;
   4743 }
   4744 
   4745 /** Check the change from a to b is only new entries at the end. */
   4746 static int
   4747 taglist_change_at_end(char** tagname_a, int num_tags_a, char** tagname_b,
   4748 	int num_tags_b)
   4749 {
   4750 	if(num_tags_a < 0 || num_tags_b < 0)
   4751 		return 0;
   4752 	if(num_tags_a >= num_tags_b)
   4753 		return 0;
   4754 	/* So, b is longer than a. Check if the initial start of the two
   4755 	 * taglists is the same. */
   4756 	if(!taglist_equal(tagname_a, num_tags_a, tagname_b, num_tags_a))
   4757 		return 0;
   4758 	return 1;
   4759 }
   4760 
   4761 /** fast reload thread, check tag defines. */
   4762 static int
   4763 fr_check_tag_defines(struct fast_reload_thread* fr, struct config_file* newcfg)
   4764 {
   4765 	/* The tags are kept in a bitlist for items. Some of them are stored
   4766 	 * in query info. If the tags change, then the old values are
   4767 	 * inaccurate. The solution is to then flush the query list.
   4768 	 * Unless the change only involves adding new tags at the end, that
   4769 	 * needs no changes. */
   4770 	if(!taglist_equal(fr->worker->daemon->cfg->tagname,
   4771 			fr->worker->daemon->cfg->num_tags, newcfg->tagname,
   4772 			newcfg->num_tags) &&
   4773 		!taglist_change_at_end(fr->worker->daemon->cfg->tagname,
   4774 			fr->worker->daemon->cfg->num_tags, newcfg->tagname,
   4775 			newcfg->num_tags)) {
   4776 		/* The tags have changed too much, the define-tag config. */
   4777 		if(fr->fr_drop_mesh)
   4778 			return 1; /* already dropping queries */
   4779 		fr->fr_drop_mesh = 1;
   4780 		fr->worker->daemon->fast_reload_drop_mesh = fr->fr_drop_mesh;
   4781 		if(!fr_output_printf(fr, "tags have changed, with "
   4782 			"'define-tag', and the queries have to be dropped "
   4783 			"for consistency, setting '+d'\n"))
   4784 			return 0;
   4785 		fr_send_notification(fr, fast_reload_notification_printout);
   4786 	}
   4787 	return 1;
   4788 }
   4789 
   4790 /** fast reload thread, add incompatible option to the explanatory string */
   4791 static void
   4792 fr_add_incompatible_option(const char* desc, char* str, size_t len)
   4793 {
   4794 	size_t slen = strlen(str);
   4795 	size_t desclen = strlen(desc);
   4796 	if(slen == 0) {
   4797 		snprintf(str, len, "%s", desc);
   4798 		return;
   4799 	}
   4800 	if(len - slen < desclen+2)
   4801 		return; /* It does not fit */
   4802 	snprintf(str+slen, len-slen, " %s", desc);
   4803 }
   4804 
   4805 /** fast reload thread, check if config item has changed; thus incompatible */
   4806 #define FR_CHECK_CHANGED_CFG(desc, var, str)				\
   4807 do {									\
   4808 	if(cfg->var != newcfg->var) {					\
   4809 		fr_add_incompatible_option(desc, str, sizeof(str));	\
   4810 	}								\
   4811 } while(0);
   4812 
   4813 /** fast reload thread, check if config string has changed, checks NULLs. */
   4814 #define FR_CHECK_CHANGED_CFG_STR(desc, var, str)			\
   4815 do {									\
   4816 	if((!cfg->var && newcfg->var) ||				\
   4817 		(cfg->var && !newcfg->var) ||				\
   4818 		(cfg->var && newcfg->var				\
   4819 		&& strcmp(cfg->var, newcfg->var) != 0)) {		\
   4820 		fr_add_incompatible_option(desc, str, sizeof(str));	\
   4821 	}								\
   4822 } while(0);
   4823 
   4824 /** fast reload thread, check if config strlist has changed. */
   4825 #define FR_CHECK_CHANGED_CFG_STRLIST(desc, var, str) do {		\
   4826 	fr_check_changed_cfg_strlist(cfg->var, newcfg->var, desc, str,	\
   4827 		sizeof(str));						\
   4828 	} while(0);
   4829 static void
   4830 fr_check_changed_cfg_strlist(struct config_strlist* cmp1,
   4831 	struct config_strlist* cmp2, const char* desc, char* str, size_t len)
   4832 {
   4833 	struct config_strlist* p1 = cmp1, *p2 = cmp2;
   4834 	while(p1 && p2) {
   4835 		if((!p1->str && p2->str) ||
   4836 			(p1->str && !p2->str) ||
   4837 			(p1->str && p2->str && strcmp(p1->str, p2->str) != 0)) {
   4838 			/* The strlist is different. */
   4839 			fr_add_incompatible_option(desc, str, len);
   4840 			return;
   4841 		}
   4842 		p1 = p1->next;
   4843 		p2 = p2->next;
   4844 	}
   4845 	if((!p1 && p2) || (p1 && !p2)) {
   4846 		fr_add_incompatible_option(desc, str, len);
   4847 	}
   4848 }
   4849 
   4850 /** fast reload thread, check if config str2list has changed. */
   4851 #define FR_CHECK_CHANGED_CFG_STR2LIST(desc, var, buff) do {		\
   4852 	fr_check_changed_cfg_str2list(cfg->var, newcfg->var, desc, buff,\
   4853 		sizeof(buff));						\
   4854 	} while(0);
   4855 static void
   4856 fr_check_changed_cfg_str2list(struct config_str2list* cmp1,
   4857 	struct config_str2list* cmp2, const char* desc, char* str, size_t len)
   4858 {
   4859 	struct config_str2list* p1 = cmp1, *p2 = cmp2;
   4860 	while(p1 && p2) {
   4861 		if((!p1->str && p2->str) ||
   4862 			(p1->str && !p2->str) ||
   4863 			(p1->str && p2->str && strcmp(p1->str, p2->str) != 0)) {
   4864 			/* The str2list is different. */
   4865 			fr_add_incompatible_option(desc, str, len);
   4866 			return;
   4867 		}
   4868 		if((!p1->str2 && p2->str2) ||
   4869 			(p1->str2 && !p2->str2) ||
   4870 			(p1->str2 && p2->str2 &&
   4871 			strcmp(p1->str2, p2->str2) != 0)) {
   4872 			/* The str2list is different. */
   4873 			fr_add_incompatible_option(desc, str, len);
   4874 			return;
   4875 		}
   4876 		p1 = p1->next;
   4877 		p2 = p2->next;
   4878 	}
   4879 	if((!p1 && p2) || (p1 && !p2)) {
   4880 		fr_add_incompatible_option(desc, str, len);
   4881 	}
   4882 }
   4883 
   4884 /** fast reload thread, check compatible config items */
   4885 static int
   4886 fr_check_compat_cfg(struct fast_reload_thread* fr, struct config_file* newcfg)
   4887 {
   4888 	int i;
   4889 	char changed_str[1024];
   4890 	struct config_file* cfg = fr->worker->env.cfg;
   4891 	changed_str[0]=0;
   4892 
   4893 	/* Find incompatible options, and if so, print an error. */
   4894 	FR_CHECK_CHANGED_CFG("num-threads", num_threads, changed_str);
   4895 	FR_CHECK_CHANGED_CFG("do-ip4", do_ip4, changed_str);
   4896 	FR_CHECK_CHANGED_CFG("do-ip6", do_ip6, changed_str);
   4897 	FR_CHECK_CHANGED_CFG("do-udp", do_udp, changed_str);
   4898 	FR_CHECK_CHANGED_CFG("do-tcp", do_tcp, changed_str);
   4899 	FR_CHECK_CHANGED_CFG("port", port, changed_str);
   4900 	/* But cfg->outgoing_num_ports has been changed at startup,
   4901 	 * possibly to reduce it, so do not check it here. */
   4902 	FR_CHECK_CHANGED_CFG("outgoing-num-tcp", outgoing_num_tcp, changed_str);
   4903 	FR_CHECK_CHANGED_CFG("incoming-num-tcp", incoming_num_tcp, changed_str);
   4904 	FR_CHECK_CHANGED_CFG("outgoing-interface", num_out_ifs, changed_str);
   4905 	if(cfg->num_out_ifs == newcfg->num_out_ifs) {
   4906 		for(i=0; i<cfg->num_out_ifs; i++)
   4907 			FR_CHECK_CHANGED_CFG_STR("outgoing-interface",
   4908 				out_ifs[i], changed_str);
   4909 	}
   4910 	FR_CHECK_CHANGED_CFG("interface", num_ifs, changed_str);
   4911 	if(cfg->num_ifs == newcfg->num_ifs) {
   4912 		for(i=0; i<cfg->num_ifs; i++)
   4913 			FR_CHECK_CHANGED_CFG_STR("interface",
   4914 				ifs[i], changed_str);
   4915 	}
   4916 	FR_CHECK_CHANGED_CFG("interface-automatic", if_automatic, changed_str);
   4917 	FR_CHECK_CHANGED_CFG("so-rcvbuf", so_rcvbuf, changed_str);
   4918 	FR_CHECK_CHANGED_CFG("so-sndbuf", so_sndbuf, changed_str);
   4919 	FR_CHECK_CHANGED_CFG("so-reuseport", so_reuseport, changed_str);
   4920 	FR_CHECK_CHANGED_CFG("ip-transparent", ip_transparent, changed_str);
   4921 	FR_CHECK_CHANGED_CFG("ip-freebind", ip_freebind, changed_str);
   4922 	FR_CHECK_CHANGED_CFG("udp-connect", udp_connect, changed_str);
   4923 	FR_CHECK_CHANGED_CFG("msg-buffer-size", msg_buffer_size, changed_str);
   4924 	FR_CHECK_CHANGED_CFG("edns-tcp-keepalive", do_tcp_keepalive, changed_str);
   4925 	FR_CHECK_CHANGED_CFG("edns-tcp-keepalive-timeout", tcp_keepalive_timeout, changed_str);
   4926 	FR_CHECK_CHANGED_CFG("tcp-idle-timeout", tcp_idle_timeout, changed_str);
   4927 	/* Not changed, only if DoH is used, it is then stored in commpoints,
   4928 	 * as well as used from cfg. */
   4929 	FR_CHECK_CHANGED_CFG("harden-large-queries", harden_large_queries, changed_str);
   4930 	FR_CHECK_CHANGED_CFG("http-max-streams", http_max_streams, changed_str);
   4931 	FR_CHECK_CHANGED_CFG_STR("http-endpoint", http_endpoint, changed_str);
   4932 	FR_CHECK_CHANGED_CFG("http_notls_downstream", http_notls_downstream, changed_str);
   4933 	FR_CHECK_CHANGED_CFG("https-port", https_port, changed_str);
   4934 	FR_CHECK_CHANGED_CFG("tls-port", ssl_port, changed_str);
   4935 	FR_CHECK_CHANGED_CFG_STR("tls-service-key", ssl_service_key, changed_str);
   4936 	FR_CHECK_CHANGED_CFG_STR("tls-service-pem", ssl_service_pem, changed_str);
   4937 	FR_CHECK_CHANGED_CFG_STR("tls-cert-bundle", tls_cert_bundle, changed_str);
   4938 	FR_CHECK_CHANGED_CFG_STRLIST("proxy-protocol-port", proxy_protocol_port, changed_str);
   4939 	FR_CHECK_CHANGED_CFG_STRLIST("tls-additional-port", tls_additional_port, changed_str);
   4940 	FR_CHECK_CHANGED_CFG_STR("interface-automatic-ports", if_automatic_ports, changed_str);
   4941 	FR_CHECK_CHANGED_CFG("udp-upstream-without-downstream", udp_upstream_without_downstream, changed_str);
   4942 
   4943 	if(changed_str[0] != 0) {
   4944 		/* The new config changes some items that do not work with
   4945 		 * fast reload. */
   4946 		if(!fr_output_printf(fr, "The config changes items that are "
   4947 			"not compatible with fast_reload, perhaps do reload "
   4948 			"or restart: %s", changed_str) ||
   4949 			!fr_output_printf(fr, "\n"))
   4950 			return 0;
   4951 		fr_send_notification(fr, fast_reload_notification_printout);
   4952 		return 0;
   4953 	}
   4954 	return 1;
   4955 }
   4956 
   4957 /** fast reload thread, check nopause config items */
   4958 static int
   4959 fr_check_nopause_compat_cfg(struct fast_reload_thread* fr, struct config_file* newcfg)
   4960 {
   4961 	char changed_str[1024];
   4962 	struct config_file* cfg = fr->worker->env.cfg;
   4963 	if(!fr->fr_nopause)
   4964 		return 1; /* The nopause is not enabled, so no problem. */
   4965 	changed_str[0]=0;
   4966 
   4967 	/* Check for iter_env. */
   4968 	FR_CHECK_CHANGED_CFG("outbound-msg-retry", outbound_msg_retry, changed_str);
   4969 	FR_CHECK_CHANGED_CFG("max-sent-count", max_sent_count, changed_str);
   4970 	FR_CHECK_CHANGED_CFG("max-query-restarts", max_query_restarts, changed_str);
   4971 	FR_CHECK_CHANGED_CFG_STR("target-fetch-policy", target_fetch_policy, changed_str);
   4972 	FR_CHECK_CHANGED_CFG("do-not-query-localhost", donotquery_localhost, changed_str);
   4973 	FR_CHECK_CHANGED_CFG_STRLIST("do-not-query-address", donotqueryaddrs, changed_str);
   4974 	FR_CHECK_CHANGED_CFG_STRLIST("private-address", private_address, changed_str);
   4975 	FR_CHECK_CHANGED_CFG_STRLIST("private-domain", private_domain, changed_str);
   4976 	FR_CHECK_CHANGED_CFG_STRLIST("caps-exempt", caps_whitelist, changed_str);
   4977 	FR_CHECK_CHANGED_CFG("do-nat64", do_nat64, changed_str);
   4978 	FR_CHECK_CHANGED_CFG_STR("nat64-prefix", nat64_prefix, changed_str);
   4979 
   4980 	/* Check for val_env. */
   4981 	FR_CHECK_CHANGED_CFG("val-bogus-ttl", bogus_ttl, changed_str);
   4982 	FR_CHECK_CHANGED_CFG("val-date-override", val_date_override, changed_str);
   4983 	FR_CHECK_CHANGED_CFG("val-sig-skew-min", val_sig_skew_min, changed_str);
   4984 	FR_CHECK_CHANGED_CFG("val-sig-skew-max", val_sig_skew_max, changed_str);
   4985 	FR_CHECK_CHANGED_CFG("val-max-restart", val_max_restart, changed_str);
   4986 	FR_CHECK_CHANGED_CFG_STR("val-nsec3-keysize-iterations",
   4987 		val_nsec3_key_iterations, changed_str);
   4988 
   4989 	/* Check for infra. */
   4990 	FR_CHECK_CHANGED_CFG("infra-host-ttl", host_ttl, changed_str);
   4991 	FR_CHECK_CHANGED_CFG("infra-keep-probing", infra_keep_probing, changed_str);
   4992 	FR_CHECK_CHANGED_CFG("ratelimit", ratelimit, changed_str);
   4993 	FR_CHECK_CHANGED_CFG("ip-ratelimit", ip_ratelimit, changed_str);
   4994 	FR_CHECK_CHANGED_CFG("ip-ratelimit-cookie", ip_ratelimit_cookie, changed_str);
   4995 	FR_CHECK_CHANGED_CFG_STR2LIST("wait-limit-netblock", wait_limit_netblock, changed_str);
   4996 	FR_CHECK_CHANGED_CFG_STR2LIST("wait-limit-cookie-netblock", wait_limit_cookie_netblock, changed_str);
   4997 	FR_CHECK_CHANGED_CFG_STR2LIST("ratelimit-below-domain", ratelimit_below_domain, changed_str);
   4998 	FR_CHECK_CHANGED_CFG_STR2LIST("ratelimit-for-domain", ratelimit_for_domain, changed_str);
   4999 
   5000 	/* Check for dnstap. */
   5001 	FR_CHECK_CHANGED_CFG("dnstap-send-identity", dnstap_send_identity, changed_str);
   5002 	FR_CHECK_CHANGED_CFG("dnstap-send-version", dnstap_send_version, changed_str);
   5003 	FR_CHECK_CHANGED_CFG_STR("dnstap-identity", dnstap_identity, changed_str);
   5004 	FR_CHECK_CHANGED_CFG_STR("dnstap-version", dnstap_version, changed_str);
   5005 
   5006 	if(changed_str[0] != 0) {
   5007 		/* The new config changes some items that need a pause,
   5008 		 * to be able to update the variables. */
   5009 		if(!fr_output_printf(fr, "The config changes items that need "
   5010 			"the fast_reload +p option, for nopause, "
   5011 			"disabled to be reloaded: %s", changed_str) ||
   5012 			!fr_output_printf(fr, "\n"))
   5013 			return 0;
   5014 		fr_send_notification(fr, fast_reload_notification_printout);
   5015 		return 0;
   5016 	}
   5017 	return 1;
   5018 }
   5019 
   5020 /** fast reload thread, clear construct information, deletes items */
   5021 static void
   5022 fr_construct_clear(struct fast_reload_construct* ct)
   5023 {
   5024 	if(!ct)
   5025 		return;
   5026 	auth_zones_delete(ct->auth_zones);
   5027 	forwards_delete(ct->fwds);
   5028 	hints_delete(ct->hints);
   5029 	respip_set_delete(ct->respip_set);
   5030 	local_zones_delete(ct->local_zones);
   5031 	acl_list_delete(ct->acl);
   5032 	acl_list_delete(ct->acl_interface);
   5033 	tcl_list_delete(ct->tcl);
   5034 	edns_strings_delete(ct->edns_strings);
   5035 	anchors_delete(ct->anchors);
   5036 	views_delete(ct->views);
   5037 	free(ct->nsec3_keysize);
   5038 	free(ct->nsec3_maxiter);
   5039 	free(ct->target_fetch_policy);
   5040 	donotq_delete(ct->donotq);
   5041 	priv_delete(ct->priv);
   5042 	caps_white_delete(ct->caps_white);
   5043 	wait_limits_free(&ct->wait_limits_netblock);
   5044 	wait_limits_free(&ct->wait_limits_cookie_netblock);
   5045 	domain_limits_free(&ct->domain_limits);
   5046 	/* Delete the log identity here so that the global value is not
   5047 	 * reset by config_delete. */
   5048 	if(ct->oldcfg && ct->oldcfg->log_identity) {
   5049 		free(ct->oldcfg->log_identity);
   5050 		ct->oldcfg->log_identity = NULL;
   5051 	}
   5052 	config_delete(ct->oldcfg);
   5053 }
   5054 
   5055 /** get memory for strlist */
   5056 static size_t
   5057 getmem_config_strlist(struct config_strlist* p)
   5058 {
   5059 	size_t m = 0;
   5060 	struct config_strlist* s;
   5061 	for(s = p; s; s = s->next)
   5062 		m += sizeof(*s) + getmem_str(s->str);
   5063 	return m;
   5064 }
   5065 
   5066 /** get memory for str2list */
   5067 static size_t
   5068 getmem_config_str2list(struct config_str2list* p)
   5069 {
   5070 	size_t m = 0;
   5071 	struct config_str2list* s;
   5072 	for(s = p; s; s = s->next)
   5073 		m += sizeof(*s) + getmem_str(s->str) + getmem_str(s->str2);
   5074 	return m;
   5075 }
   5076 
   5077 /** get memory for str3list */
   5078 static size_t
   5079 getmem_config_str3list(struct config_str3list* p)
   5080 {
   5081 	size_t m = 0;
   5082 	struct config_str3list* s;
   5083 	for(s = p; s; s = s->next)
   5084 		m += sizeof(*s) + getmem_str(s->str) + getmem_str(s->str2)
   5085 			+ getmem_str(s->str3);
   5086 	return m;
   5087 }
   5088 
   5089 /** get memory for strbytelist */
   5090 static size_t
   5091 getmem_config_strbytelist(struct config_strbytelist* p)
   5092 {
   5093 	size_t m = 0;
   5094 	struct config_strbytelist* s;
   5095 	for(s = p; s; s = s->next)
   5096 		m += sizeof(*s) + getmem_str(s->str) + (s->str2?s->str2len:0);
   5097 	return m;
   5098 }
   5099 
   5100 /** get memory used by ifs array */
   5101 static size_t
   5102 getmem_ifs(int numifs, char** ifs)
   5103 {
   5104 	size_t m = 0;
   5105 	int i;
   5106 	m += numifs * sizeof(char*);
   5107 	for(i=0; i<numifs; i++)
   5108 		m += getmem_str(ifs[i]);
   5109 	return m;
   5110 }
   5111 
   5112 /** get memory for config_stub */
   5113 static size_t
   5114 getmem_config_stub(struct config_stub* p)
   5115 {
   5116 	size_t m = 0;
   5117 	struct config_stub* s;
   5118 	for(s = p; s; s = s->next)
   5119 		m += sizeof(*s) + getmem_str(s->name)
   5120 			+ getmem_config_strlist(s->hosts)
   5121 			+ getmem_config_strlist(s->addrs);
   5122 	return m;
   5123 }
   5124 
   5125 /** get memory for config_auth */
   5126 static size_t
   5127 getmem_config_auth(struct config_auth* p)
   5128 {
   5129 	size_t m = 0;
   5130 	struct config_auth* s;
   5131 	for(s = p; s; s = s->next)
   5132 		m += sizeof(*s) + getmem_str(s->name)
   5133 			+ getmem_config_strlist(s->masters)
   5134 			+ getmem_config_strlist(s->urls)
   5135 			+ getmem_config_strlist(s->allow_notify)
   5136 			+ getmem_str(s->zonefile)
   5137 			+ s->rpz_taglistlen
   5138 			+ getmem_str(s->rpz_action_override)
   5139 			+ getmem_str(s->rpz_log_name)
   5140 			+ getmem_str(s->rpz_cname);
   5141 	return m;
   5142 }
   5143 
   5144 /** get memory for config_view */
   5145 static size_t
   5146 getmem_config_view(struct config_view* p)
   5147 {
   5148 	size_t m = 0;
   5149 	struct config_view* s;
   5150 	for(s = p; s; s = s->next)
   5151 		m += sizeof(*s) + getmem_str(s->name)
   5152 			+ getmem_config_str2list(s->local_zones)
   5153 			+ getmem_config_strlist(s->local_data)
   5154 			+ getmem_config_strlist(s->local_zones_nodefault)
   5155 #ifdef USE_IPSET
   5156 			+ getmem_config_strlist(s->local_zones_ipset)
   5157 #endif
   5158 			+ getmem_config_str2list(s->respip_actions)
   5159 			+ getmem_config_str2list(s->respip_data);
   5160 
   5161 	return m;
   5162 }
   5163 
   5164 /** get memory used by config_file item, estimate */
   5165 static size_t
   5166 config_file_getmem(struct config_file* cfg)
   5167 {
   5168 	size_t m = 0;
   5169 	m += sizeof(*cfg);
   5170 	m += getmem_config_strlist(cfg->proxy_protocol_port);
   5171 	m += getmem_str(cfg->ssl_service_key);
   5172 	m += getmem_str(cfg->ssl_service_pem);
   5173 	m += getmem_str(cfg->tls_cert_bundle);
   5174 	m += getmem_config_strlist(cfg->tls_additional_port);
   5175 	m += getmem_config_strlist(cfg->tls_session_ticket_keys.first);
   5176 	m += getmem_str(cfg->tls_ciphers);
   5177 	m += getmem_str(cfg->tls_ciphersuites);
   5178 	m += getmem_str(cfg->http_endpoint);
   5179 	m += (cfg->outgoing_avail_ports?65536*sizeof(int):0);
   5180 	m += getmem_str(cfg->target_fetch_policy);
   5181 	m += getmem_str(cfg->if_automatic_ports);
   5182 	m += getmem_ifs(cfg->num_ifs, cfg->ifs);
   5183 	m += getmem_ifs(cfg->num_out_ifs, cfg->out_ifs);
   5184 	m += getmem_config_strlist(cfg->root_hints);
   5185 	m += getmem_config_stub(cfg->stubs);
   5186 	m += getmem_config_stub(cfg->forwards);
   5187 	m += getmem_config_auth(cfg->auths);
   5188 	m += getmem_config_view(cfg->views);
   5189 	m += getmem_config_strlist(cfg->donotqueryaddrs);
   5190 #ifdef CLIENT_SUBNET
   5191 	m += getmem_config_strlist(cfg->client_subnet);
   5192 	m += getmem_config_strlist(cfg->client_subnet_zone);
   5193 #endif
   5194 	m += getmem_config_str2list(cfg->acls);
   5195 	m += getmem_config_str2list(cfg->tcp_connection_limits);
   5196 	m += getmem_config_strlist(cfg->caps_whitelist);
   5197 	m += getmem_config_strlist(cfg->private_address);
   5198 	m += getmem_config_strlist(cfg->private_domain);
   5199 	m += getmem_str(cfg->chrootdir);
   5200 	m += getmem_str(cfg->username);
   5201 	m += getmem_str(cfg->directory);
   5202 	m += getmem_str(cfg->logfile);
   5203 	m += getmem_str(cfg->pidfile);
   5204 	m += getmem_str(cfg->log_identity);
   5205 	m += getmem_str(cfg->identity);
   5206 	m += getmem_str(cfg->version);
   5207 	m += getmem_str(cfg->http_user_agent);
   5208 	m += getmem_str(cfg->nsid_cfg_str);
   5209 	m += (cfg->nsid?cfg->nsid_len:0);
   5210 	m += getmem_str(cfg->module_conf);
   5211 	m += getmem_config_strlist(cfg->trust_anchor_file_list);
   5212 	m += getmem_config_strlist(cfg->trust_anchor_list);
   5213 	m += getmem_config_strlist(cfg->auto_trust_anchor_file_list);
   5214 	m += getmem_config_strlist(cfg->trusted_keys_file_list);
   5215 	m += getmem_config_strlist(cfg->domain_insecure);
   5216 	m += getmem_str(cfg->val_nsec3_key_iterations);
   5217 	m += getmem_config_str2list(cfg->local_zones);
   5218 	m += getmem_config_strlist(cfg->local_zones_nodefault);
   5219 #ifdef USE_IPSET
   5220 	m += getmem_config_strlist(cfg->local_zones_ipset);
   5221 #endif
   5222 	m += getmem_config_strlist(cfg->local_data);
   5223 	m += getmem_config_str3list(cfg->local_zone_overrides);
   5224 	m += getmem_config_strbytelist(cfg->local_zone_tags);
   5225 	m += getmem_config_strbytelist(cfg->acl_tags);
   5226 	m += getmem_config_str3list(cfg->acl_tag_actions);
   5227 	m += getmem_config_str3list(cfg->acl_tag_datas);
   5228 	m += getmem_config_str2list(cfg->acl_view);
   5229 	m += getmem_config_str2list(cfg->interface_actions);
   5230 	m += getmem_config_strbytelist(cfg->interface_tags);
   5231 	m += getmem_config_str3list(cfg->interface_tag_actions);
   5232 	m += getmem_config_str3list(cfg->interface_tag_datas);
   5233 	m += getmem_config_str2list(cfg->interface_view);
   5234 	m += getmem_config_strbytelist(cfg->respip_tags);
   5235 	m += getmem_config_str2list(cfg->respip_actions);
   5236 	m += getmem_config_str2list(cfg->respip_data);
   5237 	m += getmem_ifs(cfg->num_tags, cfg->tagname);
   5238 	m += getmem_config_strlist(cfg->control_ifs.first);
   5239 	m += getmem_str(cfg->server_key_file);
   5240 	m += getmem_str(cfg->server_cert_file);
   5241 	m += getmem_str(cfg->control_key_file);
   5242 	m += getmem_str(cfg->control_cert_file);
   5243 	m += getmem_config_strlist(cfg->python_script);
   5244 	m += getmem_config_strlist(cfg->dynlib_file);
   5245 	m += getmem_str(cfg->dns64_prefix);
   5246 	m += getmem_config_strlist(cfg->dns64_ignore_aaaa);
   5247 	m += getmem_str(cfg->nat64_prefix);
   5248 	m += getmem_str(cfg->dnstap_socket_path);
   5249 	m += getmem_str(cfg->dnstap_ip);
   5250 	m += getmem_str(cfg->dnstap_tls_server_name);
   5251 	m += getmem_str(cfg->dnstap_tls_cert_bundle);
   5252 	m += getmem_str(cfg->dnstap_tls_client_key_file);
   5253 	m += getmem_str(cfg->dnstap_tls_client_cert_file);
   5254 	m += getmem_str(cfg->dnstap_identity);
   5255 	m += getmem_str(cfg->dnstap_version);
   5256 	m += getmem_config_str2list(cfg->ratelimit_for_domain);
   5257 	m += getmem_config_str2list(cfg->ratelimit_below_domain);
   5258 	m += getmem_config_str2list(cfg->edns_client_strings);
   5259 	m += getmem_str(cfg->dnscrypt_provider);
   5260 	m += getmem_config_strlist(cfg->dnscrypt_secret_key);
   5261 	m += getmem_config_strlist(cfg->dnscrypt_provider_cert);
   5262 	m += getmem_config_strlist(cfg->dnscrypt_provider_cert_rotated);
   5263 #ifdef USE_IPSECMOD
   5264 	m += getmem_config_strlist(cfg->ipsecmod_whitelist);
   5265 	m += getmem_str(cfg->ipsecmod_hook);
   5266 #endif
   5267 #ifdef USE_CACHEDB
   5268 	m += getmem_str(cfg->cachedb_backend);
   5269 	m += getmem_str(cfg->cachedb_secret);
   5270 #ifdef USE_REDIS
   5271 	m += getmem_str(cfg->redis_server_host);
   5272 	m += getmem_str(cfg->redis_replica_server_host);
   5273 	m += getmem_str(cfg->redis_server_path);
   5274 	m += getmem_str(cfg->redis_replica_server_path);
   5275 	m += getmem_str(cfg->redis_server_password);
   5276 	m += getmem_str(cfg->redis_replica_server_password);
   5277 #endif
   5278 #endif
   5279 #ifdef USE_IPSET
   5280 	m += getmem_str(cfg->ipset_name_v4);
   5281 	m += getmem_str(cfg->ipset_name_v6);
   5282 #endif
   5283 	return m;
   5284 }
   5285 
   5286 /** fast reload thread, print memory used by construct of items. */
   5287 static int
   5288 fr_printmem(struct fast_reload_thread* fr,
   5289 	struct config_file* newcfg, struct fast_reload_construct* ct)
   5290 {
   5291 	size_t mem = 0;
   5292 	if(fr_poll_for_quit(fr))
   5293 		return 1;
   5294 	mem += views_get_mem(ct->views);
   5295 	mem += respip_set_get_mem(ct->respip_set);
   5296 	mem += auth_zones_get_mem(ct->auth_zones);
   5297 	mem += forwards_get_mem(ct->fwds);
   5298 	mem += hints_get_mem(ct->hints);
   5299 	mem += local_zones_get_mem(ct->local_zones);
   5300 	mem += acl_list_get_mem(ct->acl);
   5301 	mem += acl_list_get_mem(ct->acl_interface);
   5302 	mem += tcl_list_get_mem(ct->tcl);
   5303 	mem += edns_strings_get_mem(ct->edns_strings);
   5304 	mem += anchors_get_mem(ct->anchors);
   5305 	mem += sizeof(*ct->oldcfg);
   5306 	mem += config_file_getmem(newcfg);
   5307 
   5308 	if(!fr_output_printf(fr, "memory use %d bytes\n", (int)mem))
   5309 		return 0;
   5310 	fr_send_notification(fr, fast_reload_notification_printout);
   5311 
   5312 	return 1;
   5313 }
   5314 
   5315 /** fast reload thread, setup the acl_interface for the ports that
   5316  * the server has. */
   5317 static int
   5318 ct_acl_interface_setup_ports(struct acl_list* acl_interface,
   5319 	struct daemon* daemon)
   5320 {
   5321 	/* clean acl_interface */
   5322 	acl_interface_init(acl_interface);
   5323 	if(!setup_acl_for_ports(acl_interface, daemon->ports[0]))
   5324 		return 0;
   5325 	if(daemon->reuseport) {
   5326 		size_t i;
   5327 		for(i=1; i<daemon->num_ports; i++) {
   5328 			if(!setup_acl_for_ports(acl_interface,
   5329 				daemon->ports[i]))
   5330 				return 0;
   5331 		}
   5332 	}
   5333 	return 1;
   5334 }
   5335 
   5336 /** fast reload, add new change to list of auth zones */
   5337 static int
   5338 fr_add_auth_zone_change(struct fast_reload_thread* fr, struct auth_zone* old_z,
   5339 	struct auth_zone* new_z, int is_deleted, int is_added, int is_changed)
   5340 {
   5341 	struct fast_reload_auth_change* item;
   5342 	item = calloc(1, sizeof(*item));
   5343 	if(!item) {
   5344 		log_err("malloc failure in add auth zone change");
   5345 		return 0;
   5346 	}
   5347 	item->old_z = old_z;
   5348 	item->new_z = new_z;
   5349 	item->is_deleted = is_deleted;
   5350 	item->is_added = is_added;
   5351 	item->is_changed = is_changed;
   5352 
   5353 	item->next = fr->auth_zone_change_list;
   5354 	fr->auth_zone_change_list = item;
   5355 	return 1;
   5356 }
   5357 
   5358 /** See if auth master is equal */
   5359 static int
   5360 xfr_auth_master_equal(struct auth_master* m1, struct auth_master* m2)
   5361 {
   5362 	if(!m1 && !m2)
   5363 		return 1;
   5364 	if(!m1 || !m2)
   5365 		return 0;
   5366 
   5367 	if((m1->host && !m2->host) || (!m1->host && m2->host))
   5368 		return 0;
   5369 	if(m1->host && m2->host && strcmp(m1->host, m2->host) != 0)
   5370 		return 0;
   5371 
   5372 	if((m1->file && !m2->file) || (!m1->file && m2->file))
   5373 		return 0;
   5374 	if(m1->file && m2->file && strcmp(m1->file, m2->file) != 0)
   5375 		return 0;
   5376 
   5377 	if((m1->http && !m2->http) || (!m1->http && m2->http))
   5378 		return 0;
   5379 	if((m1->ixfr && !m2->ixfr) || (!m1->ixfr && m2->ixfr))
   5380 		return 0;
   5381 	if((m1->allow_notify && !m2->allow_notify) || (!m1->allow_notify && m2->allow_notify))
   5382 		return 0;
   5383 	if((m1->ssl && !m2->ssl) || (!m1->ssl && m2->ssl))
   5384 		return 0;
   5385 	if(m1->port != m2->port)
   5386 		return 0;
   5387 	return 1;
   5388 }
   5389 
   5390 /** See if list of auth masters is equal */
   5391 static int
   5392 xfr_masterlist_equal(struct auth_master* list1, struct auth_master* list2)
   5393 {
   5394 	struct auth_master* p1 = list1, *p2 = list2;
   5395 	while(p1 && p2) {
   5396 		if(!xfr_auth_master_equal(p1, p2))
   5397 			return 0;
   5398 		p1 = p1->next;
   5399 		p2 = p2->next;
   5400 	}
   5401 	if(!p1 && !p2)
   5402 		return 1;
   5403 	return 0;
   5404 }
   5405 
   5406 /** See if the list of masters has changed. */
   5407 static int
   5408 xfr_masters_equal(struct auth_xfer* xfr1, struct auth_xfer* xfr2)
   5409 {
   5410 	if(xfr1 == NULL && xfr2 == NULL)
   5411 		return 1;
   5412 	if(xfr1 == NULL && xfr2 != NULL)
   5413 		return 0;
   5414 	if(xfr1 != NULL && xfr2 == NULL)
   5415 		return 0;
   5416 	if(xfr_masterlist_equal(xfr1->task_probe->masters,
   5417 		xfr2->task_probe->masters) &&
   5418 		xfr_masterlist_equal(xfr1->task_transfer->masters,
   5419 		xfr2->task_transfer->masters))
   5420 		return 1;
   5421 	return 0;
   5422 }
   5423 
   5424 /** Check what has changed in auth zones, like added and deleted zones */
   5425 static int
   5426 auth_zones_check_changes(struct fast_reload_thread* fr,
   5427 	struct fast_reload_construct* ct)
   5428 {
   5429 	/* Check every zone in turn. */
   5430 	struct auth_zone* new_z, *old_z;
   5431 	struct module_env* env = &fr->worker->env;
   5432 
   5433 	fr->old_auth_zones = ct->auth_zones;
   5434 	/* Nobody is using the new ct version yet.
   5435 	 * Also the ct lock is picked up before the env lock for auth_zones. */
   5436 	lock_rw_rdlock(&ct->auth_zones->lock);
   5437 
   5438 	/* Find deleted zones by looping over the current list and looking
   5439 	 * up in the new tree. */
   5440 	lock_rw_rdlock(&env->auth_zones->lock);
   5441 	RBTREE_FOR(old_z, struct auth_zone*, &env->auth_zones->ztree) {
   5442 		new_z = auth_zone_find(ct->auth_zones, old_z->name,
   5443 			old_z->namelen, old_z->dclass);
   5444 		if(!new_z) {
   5445 			/* The zone has been removed. */
   5446 			if(!fr_add_auth_zone_change(fr, old_z, NULL, 1, 0,
   5447 				0)) {
   5448 				lock_rw_unlock(&env->auth_zones->lock);
   5449 				lock_rw_unlock(&ct->auth_zones->lock);
   5450 				return 0;
   5451 			}
   5452 		}
   5453 	}
   5454 	lock_rw_unlock(&env->auth_zones->lock);
   5455 
   5456 	/* Find added zones by looping over new list and lookup in current. */
   5457 	RBTREE_FOR(new_z, struct auth_zone*, &ct->auth_zones->ztree) {
   5458 		lock_rw_rdlock(&env->auth_zones->lock);
   5459 		old_z = auth_zone_find(env->auth_zones, new_z->name,
   5460 			new_z->namelen, new_z->dclass);
   5461 		if(!old_z) {
   5462 			/* The zone has been added. */
   5463 			lock_rw_unlock(&env->auth_zones->lock);
   5464 			if(!fr_add_auth_zone_change(fr, NULL, new_z, 0, 1,
   5465 				0)) {
   5466 				lock_rw_unlock(&ct->auth_zones->lock);
   5467 				return 0;
   5468 			}
   5469 		} else {
   5470 			uint32_t old_serial = 0, new_serial = 0;
   5471 			int have_old = 0, have_new = 0;
   5472 			struct auth_xfer* old_xfr, *new_xfr;
   5473 			lock_rw_rdlock(&new_z->lock);
   5474 			lock_rw_rdlock(&old_z->lock);
   5475 			new_xfr = auth_xfer_find(ct->auth_zones, new_z->name,
   5476 				new_z->namelen, new_z->dclass);
   5477 			old_xfr = auth_xfer_find(env->auth_zones, old_z->name,
   5478 				old_z->namelen, old_z->dclass);
   5479 			if(new_xfr) {
   5480 				lock_basic_lock(&new_xfr->lock);
   5481 			}
   5482 			if(old_xfr) {
   5483 				lock_basic_lock(&old_xfr->lock);
   5484 			}
   5485 			lock_rw_unlock(&env->auth_zones->lock);
   5486 
   5487 			/* Change in the auth zone can be detected. */
   5488 			/* A change in serial number means that auth_xfer
   5489 			 * has to be updated. */
   5490 			have_old = (auth_zone_get_serial(old_z,
   5491 				&old_serial)!=0);
   5492 			have_new = (auth_zone_get_serial(new_z,
   5493 				&new_serial)!=0);
   5494 			if(have_old != have_new || old_serial != new_serial
   5495 				|| !xfr_masters_equal(old_xfr, new_xfr)) {
   5496 				/* The zone has been changed. */
   5497 				if(!fr_add_auth_zone_change(fr, old_z, new_z,
   5498 					0, 0, 1)) {
   5499 					lock_rw_unlock(&old_z->lock);
   5500 					lock_rw_unlock(&new_z->lock);
   5501 					lock_rw_unlock(&ct->auth_zones->lock);
   5502 					if(new_xfr) {
   5503 						lock_basic_unlock(&new_xfr->lock);
   5504 					}
   5505 					if(old_xfr) {
   5506 						lock_basic_unlock(&old_xfr->lock);
   5507 					}
   5508 					return 0;
   5509 				}
   5510 			}
   5511 
   5512 			if(new_xfr) {
   5513 				lock_basic_unlock(&new_xfr->lock);
   5514 			}
   5515 			if(old_xfr) {
   5516 				lock_basic_unlock(&old_xfr->lock);
   5517 			}
   5518 			lock_rw_unlock(&old_z->lock);
   5519 			lock_rw_unlock(&new_z->lock);
   5520 		}
   5521 	}
   5522 
   5523 	lock_rw_unlock(&ct->auth_zones->lock);
   5524 	return 1;
   5525 }
   5526 
   5527 /** fast reload thread, construct from config the new items */
   5528 static int
   5529 fr_construct_from_config(struct fast_reload_thread* fr,
   5530 	struct config_file* newcfg, struct fast_reload_construct* ct)
   5531 {
   5532 	int have_view_respip_cfg = 0;
   5533 
   5534 	if(!(ct->views = views_create())) {
   5535 		fr_construct_clear(ct);
   5536 		return 0;
   5537 	}
   5538 	if(!views_apply_cfg(ct->views, newcfg)) {
   5539 		fr_construct_clear(ct);
   5540 		return 0;
   5541 	}
   5542 	if(fr_poll_for_quit(fr))
   5543 		return 1;
   5544 
   5545 	if(!(ct->acl = acl_list_create())) {
   5546 		fr_construct_clear(ct);
   5547 		return 0;
   5548 	}
   5549 	if(!acl_list_apply_cfg(ct->acl, newcfg, ct->views)) {
   5550 		fr_construct_clear(ct);
   5551 		return 0;
   5552 	}
   5553 	if(fr_poll_for_quit(fr))
   5554 		return 1;
   5555 
   5556 	if(!(ct->acl_interface = acl_list_create())) {
   5557 		fr_construct_clear(ct);
   5558 		return 0;
   5559 	}
   5560 	if(!ct_acl_interface_setup_ports(ct->acl_interface,
   5561 		fr->worker->daemon)) {
   5562 		fr_construct_clear(ct);
   5563 		return 0;
   5564 	}
   5565 	if(!acl_interface_apply_cfg(ct->acl_interface, newcfg, ct->views)) {
   5566 		fr_construct_clear(ct);
   5567 		return 0;
   5568 	}
   5569 	if(fr_poll_for_quit(fr))
   5570 		return 1;
   5571 
   5572 	if(!(ct->tcl = tcl_list_create())) {
   5573 		fr_construct_clear(ct);
   5574 		return 0;
   5575 	}
   5576 	if(!tcl_list_apply_cfg(ct->tcl, newcfg)) {
   5577 		fr_construct_clear(ct);
   5578 		return 0;
   5579 	}
   5580 	if(fr->worker->daemon->tcl->tree.count != 0)
   5581 		fr->worker->daemon->fast_reload_tcl_has_changes = 1;
   5582 	else	fr->worker->daemon->fast_reload_tcl_has_changes = 0;
   5583 	if(fr_poll_for_quit(fr))
   5584 		return 1;
   5585 
   5586 	if(!(ct->auth_zones = auth_zones_create())) {
   5587 		fr_construct_clear(ct);
   5588 		return 0;
   5589 	}
   5590 	if(!auth_zones_apply_cfg(ct->auth_zones, newcfg, 1, &ct->use_rpz,
   5591 		fr->worker->daemon->env, &fr->worker->daemon->mods)) {
   5592 		fr_construct_clear(ct);
   5593 		return 0;
   5594 	}
   5595 	if(!auth_zones_check_changes(fr, ct)) {
   5596 		fr_construct_clear(ct);
   5597 		return 0;
   5598 	}
   5599 	if(fr_poll_for_quit(fr))
   5600 		return 1;
   5601 
   5602 	if(!(ct->fwds = forwards_create())) {
   5603 		fr_construct_clear(ct);
   5604 		return 0;
   5605 	}
   5606 	if(!forwards_apply_cfg(ct->fwds, newcfg)) {
   5607 		fr_construct_clear(ct);
   5608 		return 0;
   5609 	}
   5610 	if(fr_poll_for_quit(fr))
   5611 		return 1;
   5612 
   5613 	if(!(ct->hints = hints_create())) {
   5614 		fr_construct_clear(ct);
   5615 		return 0;
   5616 	}
   5617 	if(!hints_apply_cfg(ct->hints, newcfg)) {
   5618 		fr_construct_clear(ct);
   5619 		return 0;
   5620 	}
   5621 	if(fr_poll_for_quit(fr))
   5622 		return 1;
   5623 
   5624 	if(!(ct->local_zones = local_zones_create())) {
   5625 		fr_construct_clear(ct);
   5626 		return 0;
   5627 	}
   5628 	if(!local_zones_apply_cfg(ct->local_zones, newcfg)) {
   5629 		fr_construct_clear(ct);
   5630 		return 0;
   5631 	}
   5632 	if(fr_poll_for_quit(fr))
   5633 		return 1;
   5634 
   5635 	if(!(ct->respip_set = respip_set_create())) {
   5636 		fr_construct_clear(ct);
   5637 		return 0;
   5638 	}
   5639 	if(!respip_global_apply_cfg(ct->respip_set, newcfg)) {
   5640 		fr_construct_clear(ct);
   5641 		return 0;
   5642 	}
   5643 	if(fr_poll_for_quit(fr))
   5644 		return 1;
   5645 	if(!respip_views_apply_cfg(ct->views, newcfg, &have_view_respip_cfg)) {
   5646 		fr_construct_clear(ct);
   5647 		return 0;
   5648 	}
   5649 	ct->use_response_ip = !respip_set_is_empty(ct->respip_set) ||
   5650 		have_view_respip_cfg;
   5651 	if(fr_poll_for_quit(fr))
   5652 		return 1;
   5653 
   5654 	if(!(ct->edns_strings = edns_strings_create())) {
   5655 		fr_construct_clear(ct);
   5656 		return 0;
   5657 	}
   5658 	if(!edns_strings_apply_cfg(ct->edns_strings, newcfg)) {
   5659 		fr_construct_clear(ct);
   5660 		return 0;
   5661 	}
   5662 	if(fr_poll_for_quit(fr))
   5663 		return 1;
   5664 
   5665 	if(fr->worker->env.anchors) {
   5666 		/* There are trust anchors already, so create it for reload. */
   5667 		if(!(ct->anchors = anchors_create())) {
   5668 			fr_construct_clear(ct);
   5669 			return 0;
   5670 		}
   5671 		if(!anchors_apply_cfg(ct->anchors, newcfg)) {
   5672 			fr_construct_clear(ct);
   5673 			return 0;
   5674 		}
   5675 		if(fr_poll_for_quit(fr))
   5676 			return 1;
   5677 	}
   5678 
   5679 	if(!val_env_parse_key_iter(newcfg->val_nsec3_key_iterations,
   5680 		&ct->nsec3_keysize, &ct->nsec3_maxiter,
   5681 		&ct->nsec3_keyiter_count)) {
   5682 		fr_construct_clear(ct);
   5683 		return 0;
   5684 	}
   5685 	if(fr_poll_for_quit(fr))
   5686 		return 1;
   5687 
   5688 	if(!read_fetch_policy(&ct->target_fetch_policy,
   5689 		&ct->max_dependency_depth, newcfg->target_fetch_policy)) {
   5690 		fr_construct_clear(ct);
   5691 		return 0;
   5692 	}
   5693 	if(!(ct->donotq = donotq_create())) {
   5694 		fr_construct_clear(ct);
   5695 		return 0;
   5696 	}
   5697 	if(!donotq_apply_cfg(ct->donotq, newcfg)) {
   5698 		fr_construct_clear(ct);
   5699 		return 0;
   5700 	}
   5701 	if(!(ct->priv = priv_create())) {
   5702 		fr_construct_clear(ct);
   5703 		return 0;
   5704 	}
   5705 	if(!priv_apply_cfg(ct->priv, newcfg)) {
   5706 		fr_construct_clear(ct);
   5707 		return 0;
   5708 	}
   5709 	if(newcfg->caps_whitelist) {
   5710 		if(!(ct->caps_white = caps_white_create())) {
   5711 			fr_construct_clear(ct);
   5712 			return 0;
   5713 		}
   5714 		if(!caps_white_apply_cfg(ct->caps_white, newcfg)) {
   5715 			fr_construct_clear(ct);
   5716 			return 0;
   5717 		}
   5718 	}
   5719 	if(!nat64_apply_cfg(&ct->nat64, newcfg)) {
   5720 		fr_construct_clear(ct);
   5721 		return 0;
   5722 	}
   5723 	if(fr_poll_for_quit(fr))
   5724 		return 1;
   5725 
   5726 	if(!setup_wait_limits(&ct->wait_limits_netblock,
   5727 		&ct->wait_limits_cookie_netblock, newcfg)) {
   5728 		fr_construct_clear(ct);
   5729 		return 0;
   5730 	}
   5731 	if(!setup_domain_limits(&ct->domain_limits, newcfg)) {
   5732 		fr_construct_clear(ct);
   5733 		return 0;
   5734 	}
   5735 	if(fr_poll_for_quit(fr))
   5736 		return 1;
   5737 
   5738 	if(!(ct->oldcfg = (struct config_file*)calloc(1,
   5739 		sizeof(*ct->oldcfg)))) {
   5740 		fr_construct_clear(ct);
   5741 		log_err("out of memory");
   5742 		return 0;
   5743 	}
   5744 	if(fr->fr_verb >= 2) {
   5745 		if(!fr_printmem(fr, newcfg, ct))
   5746 			return 0;
   5747 	}
   5748 	return 1;
   5749 }
   5750 
   5751 /** fast reload thread, finish timers */
   5752 static int
   5753 fr_finish_time(struct fast_reload_thread* fr, struct timeval* time_start,
   5754 	struct timeval* time_read, struct timeval* time_construct,
   5755 	struct timeval* time_reload, struct timeval* time_end)
   5756 {
   5757 	struct timeval total, readtime, constructtime, reloadtime, deletetime;
   5758 	if(gettimeofday(time_end, NULL) < 0)
   5759 		log_err("gettimeofday: %s", strerror(errno));
   5760 
   5761 	timeval_subtract(&total, time_end, time_start);
   5762 	timeval_subtract(&readtime, time_read, time_start);
   5763 	timeval_subtract(&constructtime, time_construct, time_read);
   5764 	timeval_subtract(&reloadtime, time_reload, time_construct);
   5765 	timeval_subtract(&deletetime, time_end, time_reload);
   5766 	if(!fr_output_printf(fr, "read disk  %3d.%6.6ds\n",
   5767 		(int)readtime.tv_sec, (int)readtime.tv_usec))
   5768 		return 0;
   5769 	if(!fr_output_printf(fr, "construct  %3d.%6.6ds\n",
   5770 		(int)constructtime.tv_sec, (int)constructtime.tv_usec))
   5771 		return 0;
   5772 	if(!fr_output_printf(fr, "reload     %3d.%6.6ds\n",
   5773 		(int)reloadtime.tv_sec, (int)reloadtime.tv_usec))
   5774 		return 0;
   5775 	if(!fr_output_printf(fr, "deletes    %3d.%6.6ds\n",
   5776 		(int)deletetime.tv_sec, (int)deletetime.tv_usec))
   5777 		return 0;
   5778 	if(!fr_output_printf(fr, "total time %3d.%6.6ds\n", (int)total.tv_sec,
   5779 		(int)total.tv_usec))
   5780 		return 0;
   5781 	fr_send_notification(fr, fast_reload_notification_printout);
   5782 	return 1;
   5783 }
   5784 
   5785 /** Swap auth zone information */
   5786 static void
   5787 auth_zones_swap(struct auth_zones* az, struct auth_zones* data)
   5788 {
   5789 	rbtree_type oldztree = az->ztree;
   5790 	int old_have_downstream = az->have_downstream;
   5791 	struct auth_zone* old_rpz_first = az->rpz_first;
   5792 
   5793 	az->ztree = data->ztree;
   5794 	data->ztree = oldztree;
   5795 
   5796 	az->have_downstream = data->have_downstream;
   5797 	data->have_downstream = old_have_downstream;
   5798 
   5799 	/* Leave num_query_up and num_query_down, the statistics can
   5800 	 * remain counted. */
   5801 
   5802 	az->rpz_first = data->rpz_first;
   5803 	data->rpz_first = old_rpz_first;
   5804 
   5805 	/* The xtree is not swapped. This contains the auth_xfer elements
   5806 	 * that contain tasks in progress, like zone transfers.
   5807 	 * The unchanged zones can keep their tasks in the tree, and thus
   5808 	 * the xfer elements can continue to be their callbacks. */
   5809 }
   5810 
   5811 #if defined(ATOMIC_POINTER_LOCK_FREE) && defined(HAVE_LINK_ATOMIC_STORE)
   5812 /** Fast reload thread, if atomics are available, copy the config items
   5813  * one by one with atomic store operations. */
   5814 static void
   5815 fr_atomic_copy_cfg(struct config_file* oldcfg, struct config_file* cfg,
   5816 	struct config_file* newcfg)
   5817 {
   5818 #define COPY_VAR_int(var) oldcfg->var = cfg->var; atomic_store((_Atomic int*)&cfg->var, newcfg->var); newcfg->var = 0;
   5819 #define COPY_VAR_ptr(var) oldcfg->var = cfg->var; atomic_store((void* _Atomic*)&cfg->var, newcfg->var); newcfg->var = 0;
   5820 #define COPY_VAR_unsigned_int(var) oldcfg->var = cfg->var; atomic_store((_Atomic unsigned*)&cfg->var, newcfg->var); newcfg->var = 0;
   5821 #define COPY_VAR_size_t(var) oldcfg->var = cfg->var; atomic_store((_Atomic size_t*)&cfg->var, newcfg->var); newcfg->var = 0;
   5822 #define COPY_VAR_uint8_t(var) oldcfg->var = cfg->var; atomic_store((_Atomic uint8_t*)&cfg->var, newcfg->var); newcfg->var = 0;
   5823 #define COPY_VAR_uint16_t(var) oldcfg->var = cfg->var; atomic_store((_Atomic uint16_t*)&cfg->var, newcfg->var); newcfg->var = 0;
   5824 #define COPY_VAR_uint32_t(var) oldcfg->var = cfg->var; atomic_store((_Atomic uint32_t*)&cfg->var, newcfg->var); newcfg->var = 0;
   5825 #define COPY_VAR_int32_t(var) oldcfg->var = cfg->var; atomic_store((_Atomic int32_t*)&cfg->var, newcfg->var); newcfg->var = 0;
   5826 	/* If config file items are missing from this list, they are
   5827 	 * not updated by fast-reload +p. */
   5828 	/* For missing items, the oldcfg item is not updated, still NULL,
   5829 	 * and the cfg stays the same. The newcfg item is untouched.
   5830 	 * The newcfg item is then deleted later. */
   5831 	/* Items that need synchronisation are omitted from the list.
   5832 	 * Use fast-reload without +p to update them together. */
   5833 	COPY_VAR_int(verbosity);
   5834 	COPY_VAR_int(stat_interval);
   5835 	COPY_VAR_int(stat_cumulative);
   5836 	COPY_VAR_int(stat_extended);
   5837 	COPY_VAR_int(stat_inhibit_zero);
   5838 	COPY_VAR_int(num_threads);
   5839 	COPY_VAR_int(port);
   5840 	COPY_VAR_int(do_ip4);
   5841 	COPY_VAR_int(do_ip6);
   5842 	COPY_VAR_int(do_nat64);
   5843 	COPY_VAR_int(prefer_ip4);
   5844 	COPY_VAR_int(prefer_ip6);
   5845 	COPY_VAR_int(do_udp);
   5846 	COPY_VAR_int(do_tcp);
   5847 	COPY_VAR_size_t(max_reuse_tcp_queries);
   5848 	COPY_VAR_int(tcp_reuse_timeout);
   5849 	COPY_VAR_int(tcp_auth_query_timeout);
   5850 	COPY_VAR_int(tcp_upstream);
   5851 	COPY_VAR_int(udp_upstream_without_downstream);
   5852 	COPY_VAR_int(tcp_mss);
   5853 	COPY_VAR_int(outgoing_tcp_mss);
   5854 	COPY_VAR_int(tcp_idle_timeout);
   5855 	COPY_VAR_int(do_tcp_keepalive);
   5856 	COPY_VAR_int(tcp_keepalive_timeout);
   5857 	COPY_VAR_int(sock_queue_timeout);
   5858 	COPY_VAR_ptr(proxy_protocol_port);
   5859 	COPY_VAR_ptr(ssl_service_key);
   5860 	COPY_VAR_ptr(ssl_service_pem);
   5861 	COPY_VAR_int(ssl_port);
   5862 	COPY_VAR_int(ssl_upstream);
   5863 	COPY_VAR_ptr(tls_cert_bundle);
   5864 	COPY_VAR_int(tls_win_cert);
   5865 	COPY_VAR_ptr(tls_additional_port);
   5866 	/* The first is used to walk through the list but last is
   5867 	 * only used during config read. */
   5868 	COPY_VAR_ptr(tls_session_ticket_keys.first);
   5869 	COPY_VAR_ptr(tls_session_ticket_keys.last);
   5870 	COPY_VAR_ptr(tls_ciphers);
   5871 	COPY_VAR_ptr(tls_ciphersuites);
   5872 	COPY_VAR_int(tls_use_sni);
   5873 	COPY_VAR_int(https_port);
   5874 	COPY_VAR_ptr(http_endpoint);
   5875 	COPY_VAR_uint32_t(http_max_streams);
   5876 	COPY_VAR_size_t(http_query_buffer_size);
   5877 	COPY_VAR_size_t(http_response_buffer_size);
   5878 	COPY_VAR_int(http_nodelay);
   5879 	COPY_VAR_int(http_notls_downstream);
   5880 	COPY_VAR_int(outgoing_num_ports);
   5881 	COPY_VAR_size_t(outgoing_num_tcp);
   5882 	COPY_VAR_size_t(incoming_num_tcp);
   5883 	COPY_VAR_ptr(outgoing_avail_ports);
   5884 	COPY_VAR_size_t(edns_buffer_size);
   5885 	COPY_VAR_size_t(stream_wait_size);
   5886 	COPY_VAR_size_t(msg_buffer_size);
   5887 	COPY_VAR_size_t(msg_cache_size);
   5888 	COPY_VAR_size_t(msg_cache_slabs);
   5889 	COPY_VAR_size_t(num_queries_per_thread);
   5890 	COPY_VAR_size_t(jostle_time);
   5891 	COPY_VAR_size_t(rrset_cache_size);
   5892 	COPY_VAR_size_t(rrset_cache_slabs);
   5893 	COPY_VAR_int(host_ttl);
   5894 	COPY_VAR_size_t(infra_cache_slabs);
   5895 	COPY_VAR_size_t(infra_cache_numhosts);
   5896 	COPY_VAR_int(infra_cache_min_rtt);
   5897 	COPY_VAR_int(infra_cache_max_rtt);
   5898 	COPY_VAR_int(infra_keep_probing);
   5899 	COPY_VAR_int(delay_close);
   5900 	COPY_VAR_int(udp_connect);
   5901 	COPY_VAR_ptr(target_fetch_policy);
   5902 	COPY_VAR_int(fast_server_permil);
   5903 	COPY_VAR_size_t(fast_server_num);
   5904 	COPY_VAR_int(if_automatic);
   5905 	COPY_VAR_ptr(if_automatic_ports);
   5906 	COPY_VAR_size_t(so_rcvbuf);
   5907 	COPY_VAR_size_t(so_sndbuf);
   5908 	COPY_VAR_int(so_reuseport);
   5909 	COPY_VAR_int(ip_transparent);
   5910 	COPY_VAR_int(ip_freebind);
   5911 	COPY_VAR_int(ip_dscp);
   5912 	/* Not copied because the length and items could then not match.
   5913 	   num_ifs, ifs, num_out_ifs, out_ifs
   5914 	*/
   5915 	COPY_VAR_ptr(root_hints);
   5916 	COPY_VAR_ptr(stubs);
   5917 	COPY_VAR_ptr(forwards);
   5918 	COPY_VAR_ptr(auths);
   5919 	COPY_VAR_ptr(views);
   5920 	COPY_VAR_ptr(donotqueryaddrs);
   5921 #ifdef CLIENT_SUBNET
   5922 	COPY_VAR_ptr(client_subnet);
   5923 	COPY_VAR_ptr(client_subnet_zone);
   5924 	COPY_VAR_uint16_t(client_subnet_opcode);
   5925 	COPY_VAR_int(client_subnet_always_forward);
   5926 	COPY_VAR_uint8_t(max_client_subnet_ipv4);
   5927 	COPY_VAR_uint8_t(max_client_subnet_ipv6);
   5928 	COPY_VAR_uint8_t(min_client_subnet_ipv4);
   5929 	COPY_VAR_uint8_t(min_client_subnet_ipv6);
   5930 	COPY_VAR_uint32_t(max_ecs_tree_size_ipv4);
   5931 	COPY_VAR_uint32_t(max_ecs_tree_size_ipv6);
   5932 #endif
   5933 	COPY_VAR_ptr(acls);
   5934 	COPY_VAR_int(donotquery_localhost);
   5935 	COPY_VAR_ptr(tcp_connection_limits);
   5936 	COPY_VAR_int(harden_short_bufsize);
   5937 	COPY_VAR_int(harden_large_queries);
   5938 	COPY_VAR_int(harden_glue);
   5939 	COPY_VAR_int(harden_dnssec_stripped);
   5940 	COPY_VAR_int(harden_below_nxdomain);
   5941 	COPY_VAR_int(harden_referral_path);
   5942 	COPY_VAR_int(harden_algo_downgrade);
   5943 	COPY_VAR_int(harden_unknown_additional);
   5944 	COPY_VAR_int(use_caps_bits_for_id);
   5945 	COPY_VAR_ptr(caps_whitelist);
   5946 	COPY_VAR_ptr(private_address);
   5947 	COPY_VAR_ptr(private_domain);
   5948 	COPY_VAR_size_t(unwanted_threshold);
   5949 	COPY_VAR_int(max_ttl);
   5950 	COPY_VAR_int(min_ttl);
   5951 	COPY_VAR_int(max_negative_ttl);
   5952 	COPY_VAR_int(min_negative_ttl);
   5953 	COPY_VAR_int(prefetch);
   5954 	COPY_VAR_int(prefetch_key);
   5955 	COPY_VAR_int(deny_any);
   5956 	COPY_VAR_ptr(chrootdir);
   5957 	COPY_VAR_ptr(username);
   5958 	COPY_VAR_ptr(directory);
   5959 	COPY_VAR_ptr(logfile);
   5960 	COPY_VAR_ptr(pidfile);
   5961 	COPY_VAR_int(use_syslog);
   5962 	COPY_VAR_int(log_time_ascii);
   5963 	COPY_VAR_int(log_queries);
   5964 	COPY_VAR_int(log_replies);
   5965 	COPY_VAR_int(log_tag_queryreply);
   5966 	COPY_VAR_int(log_local_actions);
   5967 	COPY_VAR_int(log_servfail);
   5968 	COPY_VAR_ptr(log_identity);
   5969 	COPY_VAR_int(log_destaddr);
   5970 	COPY_VAR_int(hide_identity);
   5971 	COPY_VAR_int(hide_version);
   5972 	COPY_VAR_int(hide_trustanchor);
   5973 	COPY_VAR_int(hide_http_user_agent);
   5974 	COPY_VAR_ptr(identity);
   5975 	COPY_VAR_ptr(version);
   5976 	COPY_VAR_ptr(http_user_agent);
   5977 	COPY_VAR_ptr(nsid_cfg_str);
   5978 	/* Not copied because the length and items could then not match.
   5979 	nsid;
   5980 	nsid_len;
   5981 	*/
   5982 	COPY_VAR_ptr(module_conf);
   5983 	COPY_VAR_ptr(trust_anchor_file_list);
   5984 	COPY_VAR_ptr(trust_anchor_list);
   5985 	COPY_VAR_ptr(auto_trust_anchor_file_list);
   5986 	COPY_VAR_ptr(trusted_keys_file_list);
   5987 	COPY_VAR_ptr(domain_insecure);
   5988 	COPY_VAR_int(trust_anchor_signaling);
   5989 	COPY_VAR_int(root_key_sentinel);
   5990 	COPY_VAR_int32_t(val_date_override);
   5991 	COPY_VAR_int32_t(val_sig_skew_min);
   5992 	COPY_VAR_int32_t(val_sig_skew_max);
   5993 	COPY_VAR_int32_t(val_max_restart);
   5994 	COPY_VAR_int(bogus_ttl);
   5995 	COPY_VAR_int(val_clean_additional);
   5996 	COPY_VAR_int(val_log_level);
   5997 	COPY_VAR_int(val_log_squelch);
   5998 	COPY_VAR_int(val_permissive_mode);
   5999 	COPY_VAR_int(aggressive_nsec);
   6000 	COPY_VAR_int(ignore_cd);
   6001 	COPY_VAR_int(disable_edns_do);
   6002 	COPY_VAR_int(serve_expired);
   6003 	COPY_VAR_int(serve_expired_ttl);
   6004 	COPY_VAR_int(serve_expired_ttl_reset);
   6005 	COPY_VAR_int(serve_expired_reply_ttl);
   6006 	COPY_VAR_int(serve_expired_client_timeout);
   6007 	COPY_VAR_int(ede_serve_expired);
   6008 	COPY_VAR_int(dns_error_reporting);
   6009 	COPY_VAR_int(serve_original_ttl);
   6010 	COPY_VAR_ptr(val_nsec3_key_iterations);
   6011 	COPY_VAR_int(zonemd_permissive_mode);
   6012 	COPY_VAR_unsigned_int(add_holddown);
   6013 	COPY_VAR_unsigned_int(del_holddown);
   6014 	COPY_VAR_unsigned_int(keep_missing);
   6015 	COPY_VAR_int(permit_small_holddown);
   6016 	COPY_VAR_size_t(key_cache_size);
   6017 	COPY_VAR_size_t(key_cache_slabs);
   6018 	COPY_VAR_size_t(neg_cache_size);
   6019 	COPY_VAR_ptr(local_zones);
   6020 	COPY_VAR_ptr(local_zones_nodefault);
   6021 #ifdef USE_IPSET
   6022 	COPY_VAR_ptr(local_zones_ipset);
   6023 #endif
   6024 	COPY_VAR_int(local_zones_disable_default);
   6025 	COPY_VAR_ptr(local_data);
   6026 	COPY_VAR_ptr(local_zone_overrides);
   6027 	COPY_VAR_int(unblock_lan_zones);
   6028 	COPY_VAR_int(insecure_lan_zones);
   6029 	/* These reference tags
   6030 	COPY_VAR_ptr(local_zone_tags);
   6031 	COPY_VAR_ptr(acl_tags);
   6032 	COPY_VAR_ptr(acl_tag_actions);
   6033 	COPY_VAR_ptr(acl_tag_datas);
   6034 	*/
   6035 	COPY_VAR_ptr(acl_view);
   6036 	COPY_VAR_ptr(interface_actions);
   6037 	/* These reference tags
   6038 	COPY_VAR_ptr(interface_tags);
   6039 	COPY_VAR_ptr(interface_tag_actions);
   6040 	COPY_VAR_ptr(interface_tag_datas);
   6041 	*/
   6042 	COPY_VAR_ptr(interface_view);
   6043 	/* This references tags
   6044 	COPY_VAR_ptr(respip_tags);
   6045 	*/
   6046 	COPY_VAR_ptr(respip_actions);
   6047 	COPY_VAR_ptr(respip_data);
   6048 	/* Not copied because the length and items could then not match.
   6049 	 * also the respip module keeps a pointer to the array in its state.
   6050 	   tagname, num_tags
   6051 	*/
   6052 	COPY_VAR_int(remote_control_enable);
   6053 	/* The first is used to walk through the list but last is
   6054 	 * only used during config read. */
   6055 	COPY_VAR_ptr(control_ifs.first);
   6056 	COPY_VAR_ptr(control_ifs.last);
   6057 	COPY_VAR_int(control_use_cert);
   6058 	COPY_VAR_int(control_port);
   6059 	COPY_VAR_ptr(server_key_file);
   6060 	COPY_VAR_ptr(server_cert_file);
   6061 	COPY_VAR_ptr(control_key_file);
   6062 	COPY_VAR_ptr(control_cert_file);
   6063 	COPY_VAR_ptr(python_script);
   6064 	COPY_VAR_ptr(dynlib_file);
   6065 	COPY_VAR_int(use_systemd);
   6066 	COPY_VAR_int(do_daemonize);
   6067 	COPY_VAR_int(minimal_responses);
   6068 	COPY_VAR_int(rrset_roundrobin);
   6069 	COPY_VAR_int(unknown_server_time_limit);
   6070 	COPY_VAR_int(discard_timeout);
   6071 	COPY_VAR_int(wait_limit);
   6072 	COPY_VAR_int(wait_limit_cookie);
   6073 	COPY_VAR_ptr(wait_limit_netblock);
   6074 	COPY_VAR_ptr(wait_limit_cookie_netblock);
   6075 	COPY_VAR_size_t(max_udp_size);
   6076 	COPY_VAR_ptr(dns64_prefix);
   6077 	COPY_VAR_int(dns64_synthall);
   6078 	COPY_VAR_ptr(dns64_ignore_aaaa);
   6079 	COPY_VAR_ptr(nat64_prefix);
   6080 	COPY_VAR_int(dnstap);
   6081 	COPY_VAR_int(dnstap_bidirectional);
   6082 	COPY_VAR_ptr(dnstap_socket_path);
   6083 	COPY_VAR_ptr(dnstap_ip);
   6084 	COPY_VAR_int(dnstap_tls);
   6085 	COPY_VAR_ptr(dnstap_tls_server_name);
   6086 	COPY_VAR_ptr(dnstap_tls_cert_bundle);
   6087 	COPY_VAR_ptr(dnstap_tls_client_key_file);
   6088 	COPY_VAR_ptr(dnstap_tls_client_cert_file);
   6089 	COPY_VAR_int(dnstap_send_identity);
   6090 	COPY_VAR_int(dnstap_send_version);
   6091 	COPY_VAR_ptr(dnstap_identity);
   6092 	COPY_VAR_ptr(dnstap_version);
   6093 	COPY_VAR_int(dnstap_sample_rate);
   6094 	COPY_VAR_int(dnstap_log_resolver_query_messages);
   6095 	COPY_VAR_int(dnstap_log_resolver_response_messages);
   6096 	COPY_VAR_int(dnstap_log_client_query_messages);
   6097 	COPY_VAR_int(dnstap_log_client_response_messages);
   6098 	COPY_VAR_int(dnstap_log_forwarder_query_messages);
   6099 	COPY_VAR_int(dnstap_log_forwarder_response_messages);
   6100 	COPY_VAR_int(disable_dnssec_lame_check);
   6101 	COPY_VAR_int(ip_ratelimit);
   6102 	COPY_VAR_int(ip_ratelimit_cookie);
   6103 	COPY_VAR_size_t(ip_ratelimit_slabs);
   6104 	COPY_VAR_size_t(ip_ratelimit_size);
   6105 	COPY_VAR_int(ip_ratelimit_factor);
   6106 	COPY_VAR_int(ip_ratelimit_backoff);
   6107 	COPY_VAR_int(ratelimit);
   6108 	COPY_VAR_size_t(ratelimit_slabs);
   6109 	COPY_VAR_size_t(ratelimit_size);
   6110 	COPY_VAR_ptr(ratelimit_for_domain);
   6111 	COPY_VAR_ptr(ratelimit_below_domain);
   6112 	COPY_VAR_int(ratelimit_factor);
   6113 	COPY_VAR_int(ratelimit_backoff);
   6114 	COPY_VAR_int(outbound_msg_retry);
   6115 	COPY_VAR_int(max_sent_count);
   6116 	COPY_VAR_int(max_query_restarts);
   6117 	COPY_VAR_int(qname_minimisation);
   6118 	COPY_VAR_int(qname_minimisation_strict);
   6119 	COPY_VAR_int(shm_enable);
   6120 	COPY_VAR_int(shm_key);
   6121 	COPY_VAR_ptr(edns_client_strings);
   6122 	COPY_VAR_uint16_t(edns_client_string_opcode);
   6123 	COPY_VAR_int(dnscrypt);
   6124 	COPY_VAR_int(dnscrypt_port);
   6125 	COPY_VAR_ptr(dnscrypt_provider);
   6126 	COPY_VAR_ptr(dnscrypt_secret_key);
   6127 	COPY_VAR_ptr(dnscrypt_provider_cert);
   6128 	COPY_VAR_ptr(dnscrypt_provider_cert_rotated);
   6129 	COPY_VAR_size_t(dnscrypt_shared_secret_cache_size);
   6130 	COPY_VAR_size_t(dnscrypt_shared_secret_cache_slabs);
   6131 	COPY_VAR_size_t(dnscrypt_nonce_cache_size);
   6132 	COPY_VAR_size_t(dnscrypt_nonce_cache_slabs);
   6133 	COPY_VAR_int(pad_responses);
   6134 	COPY_VAR_size_t(pad_responses_block_size);
   6135 	COPY_VAR_int(pad_queries);
   6136 	COPY_VAR_size_t(pad_queries_block_size);
   6137 #ifdef USE_IPSECMOD
   6138 	COPY_VAR_int(ipsecmod_enabled);
   6139 	COPY_VAR_ptr(ipsecmod_whitelist);
   6140 	COPY_VAR_ptr(ipsecmod_hook);
   6141 	COPY_VAR_int(ipsecmod_ignore_bogus);
   6142 	COPY_VAR_int(ipsecmod_max_ttl);
   6143 	COPY_VAR_int(ipsecmod_strict);
   6144 #endif
   6145 #ifdef USE_CACHEDB
   6146 	COPY_VAR_ptr(cachedb_backend);
   6147 	COPY_VAR_ptr(cachedb_secret);
   6148 	COPY_VAR_int(cachedb_no_store);
   6149 	COPY_VAR_int(cachedb_check_when_serve_expired);
   6150 #ifdef USE_REDIS
   6151 	COPY_VAR_ptr(redis_server_host);
   6152 	COPY_VAR_ptr(redis_replica_server_host);
   6153 	COPY_VAR_int(redis_server_port);
   6154 	COPY_VAR_int(redis_replica_server_port);
   6155 	COPY_VAR_ptr(redis_server_path);
   6156 	COPY_VAR_ptr(redis_replica_server_path);
   6157 	COPY_VAR_ptr(redis_server_password);
   6158 	COPY_VAR_ptr(redis_replica_server_password);
   6159 	COPY_VAR_int(redis_timeout);
   6160 	COPY_VAR_int(redis_replica_timeout);
   6161 	COPY_VAR_int(redis_command_timeout);
   6162 	COPY_VAR_int(redis_replica_command_timeout);
   6163 	COPY_VAR_int(redis_connect_timeout);
   6164 	COPY_VAR_int(redis_replica_connect_timeout);
   6165 	COPY_VAR_int(redis_expire_records);
   6166 	COPY_VAR_int(redis_logical_db);
   6167 	COPY_VAR_int(redis_replica_logical_db);
   6168 #endif
   6169 #endif
   6170 	COPY_VAR_int(do_answer_cookie);
   6171 	/* Not copied because the length and content could then not match.
   6172 	   cookie_secret[40], cookie_secret_len
   6173 	*/
   6174 #ifdef USE_IPSET
   6175 	COPY_VAR_ptr(ipset_name_v4);
   6176 	COPY_VAR_ptr(ipset_name_v6);
   6177 #endif
   6178 	COPY_VAR_int(ede);
   6179 	COPY_VAR_int(iter_scrub_promiscuous);
   6180 }
   6181 #endif /* ATOMIC_POINTER_LOCK_FREE && HAVE_LINK_ATOMIC_STORE */
   6182 
   6183 /** fast reload thread, adjust the cache sizes */
   6184 static void
   6185 fr_adjust_cache(struct module_env* env, struct config_file* oldcfg)
   6186 {
   6187 	if(env->cfg->msg_cache_size != oldcfg->msg_cache_size)
   6188 		slabhash_adjust_size(env->msg_cache, env->cfg->msg_cache_size);
   6189 	if(env->cfg->rrset_cache_size != oldcfg->rrset_cache_size)
   6190 		slabhash_adjust_size(&env->rrset_cache->table,
   6191 			env->cfg->rrset_cache_size);
   6192 	if(env->key_cache &&
   6193 		env->cfg->key_cache_size != oldcfg->key_cache_size)
   6194 		slabhash_adjust_size(env->key_cache->slab,
   6195 			env->cfg->key_cache_size);
   6196 	if(env->cfg->infra_cache_numhosts != oldcfg->infra_cache_numhosts) {
   6197 		size_t inframem = env->cfg->infra_cache_numhosts *
   6198 			(sizeof(struct infra_key) + sizeof(struct infra_data)
   6199 			+ INFRA_BYTES_NAME);
   6200 		slabhash_adjust_size(env->infra_cache->hosts, inframem);
   6201 	}
   6202 	if(env->cfg->ratelimit_size != oldcfg->ratelimit_size) {
   6203 		slabhash_adjust_size(env->infra_cache->domain_rates,
   6204 			env->cfg->ratelimit_size);
   6205 		slabhash_adjust_size(env->infra_cache->client_ip_rates,
   6206 			env->cfg->ratelimit_size);
   6207 	}
   6208 	if(env->neg_cache &&
   6209 		env->cfg->neg_cache_size != oldcfg->neg_cache_size) {
   6210 		val_neg_adjust_size(env->neg_cache, env->cfg->neg_cache_size);
   6211 	}
   6212 }
   6213 
   6214 /** fast reload thread, adjust the iterator env */
   6215 static void
   6216 fr_adjust_iter_env(struct module_env* env, struct fast_reload_construct* ct)
   6217 {
   6218 	int m;
   6219 	struct iter_env* iter_env = NULL;
   6220 	/* There is no comparison here to see if no options changed and thus
   6221 	 * no swap is needed, the trees with addresses and domains can be
   6222 	 * large and that would take too long. Instead the trees are
   6223 	 * swapped in. */
   6224 
   6225 	/* Because the iterator env is not locked, the update cannot happen
   6226 	 * when fr nopause is used. Without it the fast reload pauses the
   6227 	 * other threads, so they are not currently using the structure. */
   6228 	m = modstack_find(env->modstack, "iterator");
   6229 	if(m != -1) iter_env = (struct iter_env*)env->modinfo[m];
   6230 	if(iter_env) {
   6231 		/* Swap the data so that the delete happens afterwards. */
   6232 		int* oldtargetfetchpolicy = iter_env->target_fetch_policy;
   6233 		int oldmaxdependencydepth = iter_env->max_dependency_depth;
   6234 		struct iter_donotq* olddonotq = iter_env->donotq;
   6235 		struct iter_priv* oldpriv = iter_env->priv;
   6236 		struct rbtree_type* oldcapswhite = iter_env->caps_white;
   6237 		struct iter_nat64 oldnat64 = iter_env->nat64;
   6238 
   6239 		iter_env->target_fetch_policy = ct->target_fetch_policy;
   6240 		iter_env->max_dependency_depth = ct->max_dependency_depth;
   6241 		iter_env->donotq = ct->donotq;
   6242 		iter_env->priv = ct->priv;
   6243 		iter_env->caps_white = ct->caps_white;
   6244 		iter_env->nat64 = ct->nat64;
   6245 		iter_env->outbound_msg_retry = env->cfg->outbound_msg_retry;
   6246 		iter_env->max_sent_count = env->cfg->max_sent_count;
   6247 		iter_env->max_query_restarts = env->cfg->max_query_restarts;
   6248 
   6249 		ct->target_fetch_policy = oldtargetfetchpolicy;
   6250 		ct->max_dependency_depth = oldmaxdependencydepth;
   6251 		ct->donotq = olddonotq;
   6252 		ct->priv = oldpriv;
   6253 		ct->caps_white = oldcapswhite;
   6254 		ct->nat64 = oldnat64;
   6255 	}
   6256 }
   6257 
   6258 /** fast reload thread, adjust the validator env */
   6259 static void
   6260 fr_adjust_val_env(struct module_env* env, struct fast_reload_construct* ct,
   6261 	struct config_file* oldcfg)
   6262 {
   6263 	int m;
   6264 	struct val_env* val_env = NULL;
   6265 	if(env->cfg->bogus_ttl == oldcfg->bogus_ttl &&
   6266 		env->cfg->val_date_override == oldcfg->val_date_override &&
   6267 		env->cfg->val_sig_skew_min == oldcfg->val_sig_skew_min &&
   6268 		env->cfg->val_sig_skew_max == oldcfg->val_sig_skew_max &&
   6269 		env->cfg->val_max_restart == oldcfg->val_max_restart &&
   6270 		strcmp(env->cfg->val_nsec3_key_iterations,
   6271 		oldcfg->val_nsec3_key_iterations) == 0)
   6272 		return; /* no changes */
   6273 
   6274 	/* Because the validator env is not locked, the update cannot happen
   6275 	 * when fr nopause is used. Without it the fast reload pauses the
   6276 	 * other threads, so they are not currently using the structure. */
   6277 	m = modstack_find(env->modstack, "validator");
   6278 	if(m != -1) val_env = (struct val_env*)env->modinfo[m];
   6279 	if(val_env) {
   6280 		/* Swap the arrays so that the delete happens afterwards. */
   6281 		size_t* oldkeysize = val_env->nsec3_keysize;
   6282 		size_t* oldmaxiter = val_env->nsec3_maxiter;
   6283 		val_env->nsec3_keysize = NULL;
   6284 		val_env->nsec3_maxiter = NULL;
   6285 		val_env_apply_cfg(val_env, env->cfg, ct->nsec3_keysize,
   6286 			ct->nsec3_maxiter, ct->nsec3_keyiter_count);
   6287 		ct->nsec3_keysize = oldkeysize;
   6288 		ct->nsec3_maxiter = oldmaxiter;
   6289 		if(env->neg_cache) {
   6290 			lock_basic_lock(&env->neg_cache->lock);
   6291 			env->neg_cache->nsec3_max_iter = val_env->
   6292 				nsec3_maxiter[val_env->nsec3_keyiter_count-1];
   6293 			lock_basic_unlock(&env->neg_cache->lock);
   6294 		}
   6295 	}
   6296 }
   6297 
   6298 /** fast reload thread, adjust the infra cache parameters */
   6299 static void
   6300 fr_adjust_infra(struct module_env* env, struct fast_reload_construct* ct)
   6301 {
   6302 	struct infra_cache* infra = env->infra_cache;
   6303 	struct config_file* cfg = env->cfg;
   6304 	struct rbtree_type oldwaitlim = infra->wait_limits_netblock;
   6305 	struct rbtree_type oldwaitlimcookie =
   6306 		infra->wait_limits_cookie_netblock;
   6307 	struct rbtree_type olddomainlim = infra->domain_limits;
   6308 
   6309 	/* The size of the infra cache and ip rates is changed
   6310 	 * in fr_adjust_cache. */
   6311 	infra->host_ttl = cfg->host_ttl;
   6312 	infra->infra_keep_probing = cfg->infra_keep_probing;
   6313 	infra_dp_ratelimit = cfg->ratelimit;
   6314 	infra_ip_ratelimit = cfg->ip_ratelimit;
   6315 	infra_ip_ratelimit_cookie = cfg->ip_ratelimit_cookie;
   6316 	infra->wait_limits_netblock = ct->wait_limits_netblock;
   6317 	infra->wait_limits_cookie_netblock = ct->wait_limits_cookie_netblock;
   6318 	infra->domain_limits = ct->domain_limits;
   6319 
   6320 	ct->wait_limits_netblock = oldwaitlim;
   6321 	ct->wait_limits_cookie_netblock = oldwaitlimcookie;
   6322 	ct->domain_limits = olddomainlim;
   6323 }
   6324 
   6325 /** fast reload thread, reload config with putting the new config items
   6326  * in place and swapping out the old items. */
   6327 static int
   6328 fr_reload_config(struct fast_reload_thread* fr, struct config_file* newcfg,
   6329 	struct fast_reload_construct* ct)
   6330 {
   6331 	struct daemon* daemon = fr->worker->daemon;
   6332 	struct module_env* env = daemon->env;
   6333 
   6334 	/* These are constructed in the fr_construct_from_config routine. */
   6335 	log_assert(ct->oldcfg);
   6336 	log_assert(ct->fwds);
   6337 	log_assert(ct->hints);
   6338 
   6339 	/* Grab big locks to satisfy lock conditions. */
   6340 	lock_rw_wrlock(&ct->views->lock);
   6341 	lock_rw_wrlock(&env->views->lock);
   6342 	lock_rw_wrlock(&ct->respip_set->lock);
   6343 	lock_rw_wrlock(&env->respip_set->lock);
   6344 	lock_rw_wrlock(&ct->local_zones->lock);
   6345 	lock_rw_wrlock(&daemon->local_zones->lock);
   6346 	lock_rw_wrlock(&ct->auth_zones->rpz_lock);
   6347 	lock_rw_wrlock(&env->auth_zones->rpz_lock);
   6348 	lock_rw_wrlock(&ct->auth_zones->lock);
   6349 	lock_rw_wrlock(&env->auth_zones->lock);
   6350 	lock_rw_wrlock(&ct->fwds->lock);
   6351 	lock_rw_wrlock(&env->fwds->lock);
   6352 	lock_rw_wrlock(&ct->hints->lock);
   6353 	lock_rw_wrlock(&env->hints->lock);
   6354 	if(ct->anchors) {
   6355 		lock_basic_lock(&ct->anchors->lock);
   6356 		lock_basic_lock(&env->anchors->lock);
   6357 	}
   6358 
   6359 #if defined(ATOMIC_POINTER_LOCK_FREE) && defined(HAVE_LINK_ATOMIC_STORE)
   6360 	if(fr->fr_nopause) {
   6361 		fr_atomic_copy_cfg(ct->oldcfg, env->cfg, newcfg);
   6362 	} else {
   6363 #endif
   6364 		/* Store old config elements. */
   6365 		*ct->oldcfg = *env->cfg;
   6366 		/* Insert new config elements. */
   6367 		*env->cfg = *newcfg;
   6368 #if defined(ATOMIC_POINTER_LOCK_FREE) && defined(HAVE_LINK_ATOMIC_STORE)
   6369 	}
   6370 #endif
   6371 
   6372 	if(env->cfg->log_identity || ct->oldcfg->log_identity) {
   6373 		/* pick up new log_identity string to use for log output. */
   6374 		log_ident_set_or_default(env->cfg->log_identity);
   6375 	}
   6376 	/* the newcfg elements are in env->cfg, so should not be freed here. */
   6377 #if defined(ATOMIC_POINTER_LOCK_FREE) && defined(HAVE_LINK_ATOMIC_STORE)
   6378 	/* if used, the routine that copies the config has zeroed items. */
   6379 	if(!fr->fr_nopause)
   6380 #endif
   6381 		memset(newcfg, 0, sizeof(*newcfg));
   6382 
   6383 	/* Quickly swap the tree roots themselves with the already allocated
   6384 	 * elements. This is a quick swap operation on the pointer.
   6385 	 * The other threads are stopped and locks are held, so that a
   6386 	 * consistent view of the configuration, before, and after, exists
   6387 	 * towards the state machine for query resolution. */
   6388 	forwards_swap_tree(env->fwds, ct->fwds);
   6389 	hints_swap_tree(env->hints, ct->hints);
   6390 	views_swap_tree(env->views, ct->views);
   6391 	acl_list_swap_tree(daemon->acl, ct->acl);
   6392 	acl_list_swap_tree(daemon->acl_interface, ct->acl_interface);
   6393 	tcl_list_swap_tree(daemon->tcl, ct->tcl);
   6394 	local_zones_swap_tree(daemon->local_zones, ct->local_zones);
   6395 	respip_set_swap_tree(env->respip_set, ct->respip_set);
   6396 	daemon->use_response_ip = ct->use_response_ip;
   6397 	daemon->use_rpz = ct->use_rpz;
   6398 	auth_zones_swap(env->auth_zones, ct->auth_zones);
   6399 	edns_strings_swap_tree(env->edns_strings, ct->edns_strings);
   6400 	anchors_swap_tree(env->anchors, ct->anchors);
   6401 #ifdef USE_CACHEDB
   6402 	daemon->env->cachedb_enabled = cachedb_is_enabled(&daemon->mods,
   6403 		daemon->env);
   6404 #endif
   6405 #ifdef USE_DNSTAP
   6406 	if(env->cfg->dnstap) {
   6407 		if(!fr->fr_nopause)
   6408 			dt_apply_cfg(daemon->dtenv, env->cfg);
   6409 		else dt_apply_logcfg(daemon->dtenv, env->cfg);
   6410 	}
   6411 #endif
   6412 	fr_adjust_cache(env, ct->oldcfg);
   6413 	if(!fr->fr_nopause) {
   6414 		fr_adjust_iter_env(env, ct);
   6415 		fr_adjust_val_env(env, ct, ct->oldcfg);
   6416 		fr_adjust_infra(env, ct);
   6417 	}
   6418 
   6419 	/* Set globals with new config. */
   6420 	config_apply(env->cfg);
   6421 
   6422 	lock_rw_unlock(&ct->views->lock);
   6423 	lock_rw_unlock(&env->views->lock);
   6424 	lock_rw_unlock(&ct->respip_set->lock);
   6425 	lock_rw_unlock(&env->respip_set->lock);
   6426 	lock_rw_unlock(&ct->local_zones->lock);
   6427 	lock_rw_unlock(&daemon->local_zones->lock);
   6428 	lock_rw_unlock(&ct->auth_zones->lock);
   6429 	lock_rw_unlock(&env->auth_zones->lock);
   6430 	lock_rw_unlock(&ct->auth_zones->rpz_lock);
   6431 	lock_rw_unlock(&env->auth_zones->rpz_lock);
   6432 	lock_rw_unlock(&ct->fwds->lock);
   6433 	lock_rw_unlock(&env->fwds->lock);
   6434 	lock_rw_unlock(&ct->hints->lock);
   6435 	lock_rw_unlock(&env->hints->lock);
   6436 	if(ct->anchors) {
   6437 		lock_basic_unlock(&ct->anchors->lock);
   6438 		lock_basic_unlock(&env->anchors->lock);
   6439 	}
   6440 
   6441 	return 1;
   6442 }
   6443 
   6444 /** fast reload, poll for ack incoming. */
   6445 static void
   6446 fr_poll_for_ack(struct fast_reload_thread* fr)
   6447 {
   6448 	int loopexit = 0, bcount = 0;
   6449 	uint32_t cmd;
   6450 	ssize_t ret;
   6451 
   6452 	if(fr->need_to_quit)
   6453 		return;
   6454 	/* Is there data? */
   6455 	if(!sock_poll_timeout(fr->commpair[1], -1, 1, 0, NULL)) {
   6456 		log_err("fr_poll_for_ack: poll failed");
   6457 		return;
   6458 	}
   6459 
   6460 	/* Read the data */
   6461 	while(1) {
   6462 		if(++loopexit > IPC_LOOP_MAX) {
   6463 			log_err("fr_poll_for_ack: recv loops %s",
   6464 				sock_strerror(errno));
   6465 			return;
   6466 		}
   6467 		ret = recv(fr->commpair[1], ((char*)&cmd)+bcount,
   6468 			sizeof(cmd)-bcount, 0);
   6469 		if(ret == -1) {
   6470 			if(
   6471 #ifndef USE_WINSOCK
   6472 				errno == EINTR || errno == EAGAIN
   6473 #  ifdef EWOULDBLOCK
   6474 				|| errno == EWOULDBLOCK
   6475 #  endif
   6476 #else
   6477 				WSAGetLastError() == WSAEINTR ||
   6478 				WSAGetLastError() == WSAEINPROGRESS ||
   6479 				WSAGetLastError() == WSAEWOULDBLOCK
   6480 #endif
   6481 				)
   6482 				continue; /* Try again. */
   6483 			log_err("fr_poll_for_ack: recv: %s",
   6484 				sock_strerror(errno));
   6485 			return;
   6486 		} else if(ret+(ssize_t)bcount != sizeof(cmd)) {
   6487 			bcount += ret;
   6488 			if((size_t)bcount < sizeof(cmd))
   6489 				continue;
   6490 		}
   6491 		break;
   6492 	}
   6493 	if(cmd == fast_reload_notification_exit) {
   6494 		fr->need_to_quit = 1;
   6495 		verbose(VERB_ALGO, "fast reload wait for ack: "
   6496 			"exit notification received");
   6497 		return;
   6498 	}
   6499 	if(cmd != fast_reload_notification_reload_ack) {
   6500 		verbose(VERB_ALGO, "fast reload wait for ack: "
   6501 			"wrong notification %d", (int)cmd);
   6502 	}
   6503 }
   6504 
   6505 /** fast reload thread, reload ipc communication to stop and start threads. */
   6506 static int
   6507 fr_reload_ipc(struct fast_reload_thread* fr, struct config_file* newcfg,
   6508 	struct fast_reload_construct* ct)
   6509 {
   6510 	int result = 1;
   6511 	if(!fr->fr_nopause) {
   6512 		fr_send_notification(fr, fast_reload_notification_reload_stop);
   6513 		fr_poll_for_ack(fr);
   6514 	}
   6515 	if(!fr_reload_config(fr, newcfg, ct)) {
   6516 		result = 0;
   6517 	}
   6518 	if(!fr->fr_nopause) {
   6519 		fr_send_notification(fr, fast_reload_notification_reload_start);
   6520 		fr_poll_for_ack(fr);
   6521 	}
   6522 	return result;
   6523 }
   6524 
   6525 /** fast reload thread, load config */
   6526 static int
   6527 fr_load_config(struct fast_reload_thread* fr, struct timeval* time_read,
   6528 	struct timeval* time_construct, struct timeval* time_reload)
   6529 {
   6530 	struct fast_reload_construct ct;
   6531 	struct config_file* newcfg = NULL;
   6532 	memset(&ct, 0, sizeof(ct));
   6533 
   6534 	/* Read file. */
   6535 	if(!fr_read_config(fr, &newcfg))
   6536 		return 0;
   6537 	if(gettimeofday(time_read, NULL) < 0)
   6538 		log_err("gettimeofday: %s", strerror(errno));
   6539 	if(fr_poll_for_quit(fr)) {
   6540 		config_delete(newcfg);
   6541 		return 1;
   6542 	}
   6543 
   6544 	/* Check if the config can be loaded */
   6545 	if(!fr_check_tag_defines(fr, newcfg)) {
   6546 		config_delete(newcfg);
   6547 		return 0;
   6548 	}
   6549 	if(!fr_check_compat_cfg(fr, newcfg)) {
   6550 		config_delete(newcfg);
   6551 		return 0;
   6552 	}
   6553 	if(!fr_check_nopause_compat_cfg(fr, newcfg)) {
   6554 		config_delete(newcfg);
   6555 		return 0;
   6556 	}
   6557 	if(fr_poll_for_quit(fr)) {
   6558 		config_delete(newcfg);
   6559 		return 1;
   6560 	}
   6561 
   6562 	/* Construct items. */
   6563 	if(!fr_construct_from_config(fr, newcfg, &ct)) {
   6564 		config_delete(newcfg);
   6565 		if(!fr_output_printf(fr, "Could not construct from the "
   6566 			"config, check for errors with unbound-checkconf, or "
   6567 			"out of memory. The parse errors are printed in "
   6568 			"the log.\n"))
   6569 			return 0;
   6570 		fr_send_notification(fr, fast_reload_notification_printout);
   6571 		return 0;
   6572 	}
   6573 	if(gettimeofday(time_construct, NULL) < 0)
   6574 		log_err("gettimeofday: %s", strerror(errno));
   6575 	if(fr_poll_for_quit(fr)) {
   6576 		config_delete(newcfg);
   6577 		fr_construct_clear(&ct);
   6578 		return 1;
   6579 	}
   6580 
   6581 	/* Reload server. */
   6582 	if(!fr_reload_ipc(fr, newcfg, &ct)) {
   6583 		config_delete(newcfg);
   6584 		fr_construct_clear(&ct);
   6585 		if(!fr_output_printf(fr, "error: reload failed\n"))
   6586 			return 0;
   6587 		fr_send_notification(fr, fast_reload_notification_printout);
   6588 		return 0;
   6589 	}
   6590 	if(gettimeofday(time_reload, NULL) < 0)
   6591 		log_err("gettimeofday: %s", strerror(errno));
   6592 
   6593 	if(fr_poll_for_quit(fr)) {
   6594 		config_delete(newcfg);
   6595 		fr_construct_clear(&ct);
   6596 		return 1;
   6597 	}
   6598 	if(fr->fr_nopause) {
   6599 		/* Poll every thread, with a no-work poll item over the
   6600 		 * command pipe. This makes the worker thread surely move
   6601 		 * to deal with that event, and thus the thread is no longer
   6602 		 * holding, eg. a string item from the old config struct.
   6603 		 * And then the old config struct can safely be deleted.
   6604 		 * Only needed when nopause is used, because without that
   6605 		 * the worker threads are already waiting on a command pipe
   6606 		 * item. This nopause command pipe item does not take work,
   6607 		 * it returns immediately, so it does not delay the workers.
   6608 		 * They can be polled one at a time. But its processing causes
   6609 		 * the worker to have released data items from old config.
   6610 		 * This also makes sure the threads are not holding locks on
   6611 		 * individual items in the local_zones, views, respip_set. */
   6612 		fr_send_notification(fr,
   6613 			fast_reload_notification_reload_nopause_poll);
   6614 		fr_poll_for_ack(fr);
   6615 	}
   6616 
   6617 	/* Delete old. */
   6618 	config_delete(newcfg);
   6619 	fr_construct_clear(&ct);
   6620 	return 1;
   6621 }
   6622 
   6623 /** fast reload thread. the thread main function */
   6624 static void* fast_reload_thread_main(void* arg)
   6625 {
   6626 	struct fast_reload_thread* fast_reload_thread = (struct fast_reload_thread*)arg;
   6627 	struct timeval time_start, time_read, time_construct, time_reload,
   6628 		time_end;
   6629 	log_thread_set(&fast_reload_thread->threadnum);
   6630 
   6631 	verbose(VERB_ALGO, "start fast reload thread");
   6632 	if(fast_reload_thread->fr_verb >= 1) {
   6633 		fr_init_time(&time_start, &time_read, &time_construct,
   6634 			&time_reload, &time_end);
   6635 		if(fr_poll_for_quit(fast_reload_thread))
   6636 			goto done;
   6637 	}
   6638 
   6639 	/* print output to the client */
   6640 	if(fast_reload_thread->fr_verb >= 1) {
   6641 		if(!fr_output_printf(fast_reload_thread, "thread started\n"))
   6642 			goto done_error;
   6643 		fr_send_notification(fast_reload_thread,
   6644 			fast_reload_notification_printout);
   6645 		if(fr_poll_for_quit(fast_reload_thread))
   6646 			goto done;
   6647 	}
   6648 
   6649 	if(!fr_load_config(fast_reload_thread, &time_read, &time_construct,
   6650 		&time_reload))
   6651 		goto done_error;
   6652 	if(fr_poll_for_quit(fast_reload_thread))
   6653 		goto done;
   6654 
   6655 	if(fast_reload_thread->fr_verb >= 1) {
   6656 		if(!fr_finish_time(fast_reload_thread, &time_start, &time_read,
   6657 			&time_construct, &time_reload, &time_end))
   6658 			goto done_error;
   6659 		if(fr_poll_for_quit(fast_reload_thread))
   6660 			goto done;
   6661 	}
   6662 
   6663 	if(!fr_output_printf(fast_reload_thread, "ok\n"))
   6664 		goto done_error;
   6665 	fr_send_notification(fast_reload_thread,
   6666 		fast_reload_notification_printout);
   6667 	verbose(VERB_ALGO, "stop fast reload thread");
   6668 	/* If this is not an exit due to quit earlier, send regular done. */
   6669 	if(!fast_reload_thread->need_to_quit)
   6670 		fr_send_notification(fast_reload_thread,
   6671 			fast_reload_notification_done);
   6672 	/* If during the fast_reload_notification_done send,
   6673 	 * fast_reload_notification_exit was received, ack it. If the
   6674 	 * thread is exiting due to quit received earlier, also ack it.*/
   6675 done:
   6676 	if(fast_reload_thread->need_to_quit)
   6677 		fr_send_notification(fast_reload_thread,
   6678 			fast_reload_notification_exited);
   6679 	return NULL;
   6680 done_error:
   6681 	verbose(VERB_ALGO, "stop fast reload thread with done_error");
   6682 	fr_send_notification(fast_reload_thread,
   6683 		fast_reload_notification_done_error);
   6684 	return NULL;
   6685 }
   6686 #endif /* !THREADS_DISABLED */
   6687 
   6688 /** create a socketpair for bidirectional communication, false on failure */
   6689 static int
   6690 create_socketpair(int* pair, struct ub_randstate* rand)
   6691 {
   6692 #ifndef USE_WINSOCK
   6693 	if(socketpair(AF_UNIX, SOCK_STREAM, 0, pair) == -1) {
   6694 		log_err("socketpair: %s", strerror(errno));
   6695 		return 0;
   6696 	}
   6697 	(void)rand;
   6698 #else
   6699 	struct sockaddr_in addr, baddr, accaddr, connaddr;
   6700 	socklen_t baddrlen, accaddrlen, connaddrlen;
   6701 	uint8_t localhost[] = {127, 0, 0, 1};
   6702 	uint8_t nonce[16], recvnonce[16];
   6703 	size_t i;
   6704 	int lst, pollin_event, bcount, loopcount;
   6705 	int connect_poll_timeout = 200; /* msec to wait for connection */
   6706 	ssize_t ret;
   6707 	pair[0] = -1;
   6708 	pair[1] = -1;
   6709 	for(i=0; i<sizeof(nonce); i++) {
   6710 		nonce[i] = ub_random_max(rand, 256);
   6711 	}
   6712 	lst = socket(AF_INET, SOCK_STREAM, 0);
   6713 	if(lst == -1) {
   6714 		log_err("create_socketpair: socket: %s", sock_strerror(errno));
   6715 		return 0;
   6716 	}
   6717 	memset(&addr, 0, sizeof(addr));
   6718 	addr.sin_family = AF_INET;
   6719 	addr.sin_port = 0;
   6720 	memcpy(&addr.sin_addr, localhost, 4);
   6721 	if(bind(lst, (struct sockaddr*)&addr, (socklen_t)sizeof(addr))
   6722 		== -1) {
   6723 		log_err("create socketpair: bind: %s", sock_strerror(errno));
   6724 		sock_close(lst);
   6725 		return 0;
   6726 	}
   6727 	if(listen(lst, 12) == -1) {
   6728 		log_err("create socketpair: listen: %s", sock_strerror(errno));
   6729 		sock_close(lst);
   6730 		return 0;
   6731 	}
   6732 
   6733 	pair[1] = socket(AF_INET, SOCK_STREAM, 0);
   6734 	if(pair[1] == -1) {
   6735 		log_err("create socketpair: socket: %s", sock_strerror(errno));
   6736 		sock_close(lst);
   6737 		return 0;
   6738 	}
   6739 	baddrlen = (socklen_t)sizeof(baddr);
   6740 	if(getsockname(lst, (struct sockaddr*)&baddr, &baddrlen) == -1) {
   6741 		log_err("create socketpair: getsockname: %s",
   6742 			sock_strerror(errno));
   6743 		sock_close(lst);
   6744 		sock_close(pair[1]);
   6745 		pair[1] = -1;
   6746 		return 0;
   6747 	}
   6748 	if(baddrlen > (socklen_t)sizeof(baddr)) {
   6749 		log_err("create socketpair: getsockname returned addr too big");
   6750 		sock_close(lst);
   6751 		sock_close(pair[1]);
   6752 		pair[1] = -1;
   6753 		return 0;
   6754 	}
   6755 	/* the socket is blocking */
   6756 	if(connect(pair[1], (struct sockaddr*)&baddr, baddrlen) == -1) {
   6757 		log_err("create socketpair: connect: %s",
   6758 			sock_strerror(errno));
   6759 		sock_close(lst);
   6760 		sock_close(pair[1]);
   6761 		pair[1] = -1;
   6762 		return 0;
   6763 	}
   6764 	if(!sock_poll_timeout(lst, connect_poll_timeout, 1, 0, &pollin_event)) {
   6765 		log_err("create socketpair: poll for accept failed: %s",
   6766 			sock_strerror(errno));
   6767 		sock_close(lst);
   6768 		sock_close(pair[1]);
   6769 		pair[1] = -1;
   6770 		return 0;
   6771 	}
   6772 	if(!pollin_event) {
   6773 		log_err("create socketpair: poll timeout for accept");
   6774 		sock_close(lst);
   6775 		sock_close(pair[1]);
   6776 		pair[1] = -1;
   6777 		return 0;
   6778 	}
   6779 	accaddrlen = (socklen_t)sizeof(accaddr);
   6780 	pair[0] = accept(lst, (struct sockaddr*)&accaddr, &accaddrlen);
   6781 	if(pair[0] == -1) {
   6782 		log_err("create socketpair: accept: %s", sock_strerror(errno));
   6783 		sock_close(lst);
   6784 		sock_close(pair[1]);
   6785 		pair[1] = -1;
   6786 		return 0;
   6787 	}
   6788 	if(accaddrlen > (socklen_t)sizeof(accaddr)) {
   6789 		log_err("create socketpair: accept returned addr too big");
   6790 		sock_close(lst);
   6791 		sock_close(pair[0]);
   6792 		sock_close(pair[1]);
   6793 		pair[0] = -1;
   6794 		pair[1] = -1;
   6795 		return 0;
   6796 	}
   6797 	if(accaddr.sin_family != AF_INET ||
   6798 	   memcmp(localhost, &accaddr.sin_addr, 4) != 0) {
   6799 		log_err("create socketpair: accept from wrong address");
   6800 		sock_close(lst);
   6801 		sock_close(pair[0]);
   6802 		sock_close(pair[1]);
   6803 		pair[0] = -1;
   6804 		pair[1] = -1;
   6805 		return 0;
   6806 	}
   6807 	connaddrlen = (socklen_t)sizeof(connaddr);
   6808 	if(getsockname(pair[1], (struct sockaddr*)&connaddr, &connaddrlen)
   6809 		== -1) {
   6810 		log_err("create socketpair: getsockname connectedaddr: %s",
   6811 			sock_strerror(errno));
   6812 		sock_close(lst);
   6813 		sock_close(pair[0]);
   6814 		sock_close(pair[1]);
   6815 		pair[0] = -1;
   6816 		pair[1] = -1;
   6817 		return 0;
   6818 	}
   6819 	if(connaddrlen > (socklen_t)sizeof(connaddr)) {
   6820 		log_err("create socketpair: getsockname connectedaddr returned addr too big");
   6821 		sock_close(lst);
   6822 		sock_close(pair[0]);
   6823 		sock_close(pair[1]);
   6824 		pair[0] = -1;
   6825 		pair[1] = -1;
   6826 		return 0;
   6827 	}
   6828 	if(connaddr.sin_family != AF_INET ||
   6829 	   memcmp(localhost, &connaddr.sin_addr, 4) != 0) {
   6830 		log_err("create socketpair: getsockname connectedaddr returned wrong address");
   6831 		sock_close(lst);
   6832 		sock_close(pair[0]);
   6833 		sock_close(pair[1]);
   6834 		pair[0] = -1;
   6835 		pair[1] = -1;
   6836 		return 0;
   6837 	}
   6838 	if(accaddr.sin_port != connaddr.sin_port) {
   6839 		log_err("create socketpair: accept from wrong port");
   6840 		sock_close(lst);
   6841 		sock_close(pair[0]);
   6842 		sock_close(pair[1]);
   6843 		pair[0] = -1;
   6844 		pair[1] = -1;
   6845 		return 0;
   6846 	}
   6847 	sock_close(lst);
   6848 
   6849 	loopcount = 0;
   6850 	bcount = 0;
   6851 	while(1) {
   6852 		if(++loopcount > IPC_LOOP_MAX) {
   6853 			log_err("create socketpair: send failed due to loop");
   6854 			sock_close(pair[0]);
   6855 			sock_close(pair[1]);
   6856 			pair[0] = -1;
   6857 			pair[1] = -1;
   6858 			return 0;
   6859 		}
   6860 		ret = send(pair[1], (void*)(nonce+bcount),
   6861 			sizeof(nonce)-bcount, 0);
   6862 		if(ret == -1) {
   6863 			if(
   6864 #ifndef USE_WINSOCK
   6865 				errno == EINTR || errno == EAGAIN
   6866 #  ifdef EWOULDBLOCK
   6867 				|| errno == EWOULDBLOCK
   6868 #  endif
   6869 #else
   6870 				WSAGetLastError() == WSAEINTR ||
   6871 				WSAGetLastError() == WSAEINPROGRESS ||
   6872 				WSAGetLastError() == WSAEWOULDBLOCK
   6873 #endif
   6874 				)
   6875 				continue; /* Try again. */
   6876 			log_err("create socketpair: send: %s", sock_strerror(errno));
   6877 			sock_close(pair[0]);
   6878 			sock_close(pair[1]);
   6879 			pair[0] = -1;
   6880 			pair[1] = -1;
   6881 			return 0;
   6882 		} else if(ret+(ssize_t)bcount != sizeof(nonce)) {
   6883 			bcount += ret;
   6884 			if((size_t)bcount < sizeof(nonce))
   6885 				continue;
   6886 		}
   6887 		break;
   6888 	}
   6889 
   6890 	if(!sock_poll_timeout(pair[0], connect_poll_timeout, 1, 0, &pollin_event)) {
   6891 		log_err("create socketpair: poll failed: %s",
   6892 			sock_strerror(errno));
   6893 		sock_close(pair[0]);
   6894 		sock_close(pair[1]);
   6895 		pair[0] = -1;
   6896 		pair[1] = -1;
   6897 		return 0;
   6898 	}
   6899 	if(!pollin_event) {
   6900 		log_err("create socketpair: poll timeout for recv");
   6901 		sock_close(pair[0]);
   6902 		sock_close(pair[1]);
   6903 		pair[0] = -1;
   6904 		pair[1] = -1;
   6905 		return 0;
   6906 	}
   6907 
   6908 	loopcount = 0;
   6909 	bcount = 0;
   6910 	while(1) {
   6911 		if(++loopcount > IPC_LOOP_MAX) {
   6912 			log_err("create socketpair: recv failed due to loop");
   6913 			sock_close(pair[0]);
   6914 			sock_close(pair[1]);
   6915 			pair[0] = -1;
   6916 			pair[1] = -1;
   6917 			return 0;
   6918 		}
   6919 		ret = recv(pair[0], (void*)(recvnonce+bcount),
   6920 			sizeof(nonce)-bcount, 0);
   6921 		if(ret == -1) {
   6922 			if(
   6923 #ifndef USE_WINSOCK
   6924 				errno == EINTR || errno == EAGAIN
   6925 #  ifdef EWOULDBLOCK
   6926 				|| errno == EWOULDBLOCK
   6927 #  endif
   6928 #else
   6929 				WSAGetLastError() == WSAEINTR ||
   6930 				WSAGetLastError() == WSAEINPROGRESS ||
   6931 				WSAGetLastError() == WSAEWOULDBLOCK
   6932 #endif
   6933 				)
   6934 				continue; /* Try again. */
   6935 			log_err("create socketpair: recv: %s", sock_strerror(errno));
   6936 			sock_close(pair[0]);
   6937 			sock_close(pair[1]);
   6938 			pair[0] = -1;
   6939 			pair[1] = -1;
   6940 			return 0;
   6941 		} else if(ret == 0) {
   6942 			log_err("create socketpair: stream closed");
   6943 			sock_close(pair[0]);
   6944 			sock_close(pair[1]);
   6945 			pair[0] = -1;
   6946 			pair[1] = -1;
   6947 			return 0;
   6948 		} else if(ret+(ssize_t)bcount != sizeof(nonce)) {
   6949 			bcount += ret;
   6950 			if((size_t)bcount < sizeof(nonce))
   6951 				continue;
   6952 		}
   6953 		break;
   6954 	}
   6955 
   6956 	if(memcmp(nonce, recvnonce, sizeof(nonce)) != 0) {
   6957 		log_err("create socketpair: recv wrong nonce");
   6958 		sock_close(pair[0]);
   6959 		sock_close(pair[1]);
   6960 		pair[0] = -1;
   6961 		pair[1] = -1;
   6962 		return 0;
   6963 	}
   6964 #endif
   6965 	return 1;
   6966 }
   6967 
   6968 /** fast reload thread. setup the thread info */
   6969 static int
   6970 fast_reload_thread_setup(struct worker* worker, int fr_verb, int fr_nopause,
   6971 	int fr_drop_mesh)
   6972 {
   6973 	struct fast_reload_thread* fr;
   6974 	int numworkers = worker->daemon->num;
   6975 	worker->daemon->fast_reload_thread = (struct fast_reload_thread*)
   6976 		calloc(1, sizeof(*worker->daemon->fast_reload_thread));
   6977 	if(!worker->daemon->fast_reload_thread)
   6978 		return 0;
   6979 	fr = worker->daemon->fast_reload_thread;
   6980 	fr->fr_verb = fr_verb;
   6981 	fr->fr_nopause = fr_nopause;
   6982 	fr->fr_drop_mesh = fr_drop_mesh;
   6983 	worker->daemon->fast_reload_drop_mesh = fr->fr_drop_mesh;
   6984 	/* The thread id printed in logs, numworker+1 is the dnstap thread.
   6985 	 * This is numworkers+2. */
   6986 	fr->threadnum = numworkers+2;
   6987 	fr->commpair[0] = -1;
   6988 	fr->commpair[1] = -1;
   6989 	fr->commreload[0] = -1;
   6990 	fr->commreload[1] = -1;
   6991 	if(!create_socketpair(fr->commpair, worker->daemon->rand)) {
   6992 		free(fr);
   6993 		worker->daemon->fast_reload_thread = NULL;
   6994 		return 0;
   6995 	}
   6996 	fr->worker = worker;
   6997 	fr->fr_output = (struct config_strlist_head*)calloc(1,
   6998 		sizeof(*fr->fr_output));
   6999 	if(!fr->fr_output) {
   7000 		sock_close(fr->commpair[0]);
   7001 		sock_close(fr->commpair[1]);
   7002 		free(fr);
   7003 		worker->daemon->fast_reload_thread = NULL;
   7004 		return 0;
   7005 	}
   7006 	if(!create_socketpair(fr->commreload, worker->daemon->rand)) {
   7007 		sock_close(fr->commpair[0]);
   7008 		sock_close(fr->commpair[1]);
   7009 		free(fr->fr_output);
   7010 		free(fr);
   7011 		worker->daemon->fast_reload_thread = NULL;
   7012 		return 0;
   7013 	}
   7014 	lock_basic_init(&fr->fr_output_lock);
   7015 	lock_protect(&fr->fr_output_lock, fr->fr_output,
   7016 		sizeof(*fr->fr_output));
   7017 	return 1;
   7018 }
   7019 
   7020 /** fast reload, delete auth zone change list */
   7021 static void
   7022 fr_auth_change_list_delete(
   7023 	struct fast_reload_auth_change* auth_zone_change_list)
   7024 {
   7025 	struct fast_reload_auth_change* item, *next;
   7026 	item = auth_zone_change_list;
   7027 	while(item) {
   7028 		next = item->next;
   7029 		free(item);
   7030 		item = next;
   7031 	}
   7032 }
   7033 
   7034 /** fast reload thread. desetup and delete the thread info. */
   7035 static void
   7036 fast_reload_thread_desetup(struct fast_reload_thread* fast_reload_thread)
   7037 {
   7038 	if(!fast_reload_thread)
   7039 		return;
   7040 	if(fast_reload_thread->service_event &&
   7041 		fast_reload_thread->service_event_is_added) {
   7042 		ub_event_del(fast_reload_thread->service_event);
   7043 		fast_reload_thread->service_event_is_added = 0;
   7044 	}
   7045 	if(fast_reload_thread->service_event)
   7046 		ub_event_free(fast_reload_thread->service_event);
   7047 	sock_close(fast_reload_thread->commpair[0]);
   7048 	sock_close(fast_reload_thread->commpair[1]);
   7049 	sock_close(fast_reload_thread->commreload[0]);
   7050 	sock_close(fast_reload_thread->commreload[1]);
   7051 	if(fast_reload_thread->printq) {
   7052 		fr_main_perform_printout(fast_reload_thread);
   7053 		/* If it is empty now, there is nothing to print on fd. */
   7054 		if(fr_printq_empty(fast_reload_thread->printq)) {
   7055 			fr_printq_delete(fast_reload_thread->printq);
   7056 		} else {
   7057 			/* Keep the printq around to printout the remaining
   7058 			 * text to the remote client. Until it is done, it
   7059 			 * sits on a list, that is in the daemon struct.
   7060 			 * The event can then spool the remaining text to the
   7061 			 * remote client and eventually delete itself from the
   7062 			 * callback. */
   7063 			fr_printq_list_insert(fast_reload_thread->printq,
   7064 				fast_reload_thread->worker->daemon);
   7065 			fast_reload_thread->printq = NULL;
   7066 		}
   7067 	}
   7068 	lock_basic_destroy(&fast_reload_thread->fr_output_lock);
   7069 	if(fast_reload_thread->fr_output) {
   7070 		config_delstrlist(fast_reload_thread->fr_output->first);
   7071 		free(fast_reload_thread->fr_output);
   7072 	}
   7073 	fr_auth_change_list_delete(fast_reload_thread->auth_zone_change_list);
   7074 
   7075 	free(fast_reload_thread);
   7076 }
   7077 
   7078 /**
   7079  * Fast reload thread, send a command to the thread. Blocking on timeout.
   7080  * It handles received input from the thread, if any is received.
   7081  */
   7082 static void
   7083 fr_send_cmd_to(struct fast_reload_thread* fr,
   7084 	enum fast_reload_notification status, int check_cmds, int blocking)
   7085 {
   7086 	int outevent, loopexit = 0, bcount = 0;
   7087 	uint32_t cmd;
   7088 	ssize_t ret;
   7089 	verbose(VERB_ALGO, "send notification to fast reload thread: %s",
   7090 		fr_notification_to_string(status));
   7091 	cmd = status;
   7092 	while(1) {
   7093 		if(++loopexit > IPC_LOOP_MAX) {
   7094 			log_err("send notification to fast reload: could not send notification: loop");
   7095 			return;
   7096 		}
   7097 		if(check_cmds)
   7098 			fr_check_cmd_from_thread(fr);
   7099 		/* wait for socket to become writable */
   7100 		if(!sock_poll_timeout(fr->commpair[0],
   7101 			(blocking?-1:IPC_NOTIFICATION_WAIT),
   7102 			0, 1, &outevent)) {
   7103 			log_err("send notification to fast reload: poll failed");
   7104 			return;
   7105 		}
   7106 		if(!outevent)
   7107 			continue;
   7108 		/* keep static analyzer happy; send(-1,..) */
   7109 		log_assert(fr->commpair[0] >= 0);
   7110 		ret = send(fr->commpair[0], ((char*)&cmd)+bcount,
   7111 			sizeof(cmd)-bcount, 0);
   7112 		if(ret == -1) {
   7113 			if(
   7114 #ifndef USE_WINSOCK
   7115 				errno == EINTR || errno == EAGAIN
   7116 #  ifdef EWOULDBLOCK
   7117 				|| errno == EWOULDBLOCK
   7118 #  endif
   7119 #else
   7120 				WSAGetLastError() == WSAEINTR ||
   7121 				WSAGetLastError() == WSAEINPROGRESS ||
   7122 				WSAGetLastError() == WSAEWOULDBLOCK
   7123 #endif
   7124 				)
   7125 				continue; /* Try again. */
   7126 			log_err("send notification to fast reload: send: %s",
   7127 				sock_strerror(errno));
   7128 			return;
   7129 		} else if(ret+(ssize_t)bcount != sizeof(cmd)) {
   7130 			bcount += ret;
   7131 			if((size_t)bcount < sizeof(cmd))
   7132 				continue;
   7133 		}
   7134 		break;
   7135 	}
   7136 }
   7137 
   7138 /** Fast reload, the main thread handles that the fast reload thread has
   7139  * exited. */
   7140 static void
   7141 fr_main_perform_done(struct fast_reload_thread* fr)
   7142 {
   7143 	struct worker* worker = fr->worker;
   7144 	verbose(VERB_ALGO, "join with fastreload thread");
   7145 	ub_thread_join(fr->tid);
   7146 	verbose(VERB_ALGO, "joined with fastreload thread");
   7147 	fast_reload_thread_desetup(fr);
   7148 	worker->daemon->fast_reload_thread = NULL;
   7149 }
   7150 
   7151 /** Append strlist after strlist */
   7152 static void
   7153 cfg_strlist_append_listhead(struct config_strlist_head* list,
   7154 	struct config_strlist_head* more)
   7155 {
   7156 	if(!more->first)
   7157 		return;
   7158 	if(list->last)
   7159 		list->last->next = more->first;
   7160 	else
   7161 		list->first = more->first;
   7162 	list->last = more->last;
   7163 }
   7164 
   7165 /** Fast reload, the remote control thread handles that the fast reload thread
   7166  * has output to be printed, on the linked list that is locked. */
   7167 static void
   7168 fr_main_perform_printout(struct fast_reload_thread* fr)
   7169 {
   7170 	struct config_strlist_head out;
   7171 
   7172 	/* Fetch the list of items to be printed */
   7173 	lock_basic_lock(&fr->fr_output_lock);
   7174 	out.first = fr->fr_output->first;
   7175 	out.last = fr->fr_output->last;
   7176 	fr->fr_output->first = NULL;
   7177 	fr->fr_output->last = NULL;
   7178 	lock_basic_unlock(&fr->fr_output_lock);
   7179 
   7180 	if(!fr->printq || !fr->printq->client_cp) {
   7181 		/* There is no output socket, delete it. */
   7182 		config_delstrlist(out.first);
   7183 		return;
   7184 	}
   7185 
   7186 	/* Put them on the output list, not locked because the list
   7187 	 * producer and consumer are both owned by the remote control thread,
   7188 	 * it moves the items to the list for printing in the event callback
   7189 	 * for the client_cp. */
   7190 	cfg_strlist_append_listhead(fr->printq->to_print, &out);
   7191 
   7192 	/* Set the client_cp to output if not already */
   7193 	if(!fr->printq->client_cp->event_added)
   7194 		comm_point_listen_for_rw(fr->printq->client_cp, 0, 1);
   7195 }
   7196 
   7197 /** fast reload, receive ack from workers that they are waiting, run
   7198  * by the mainthr after sending them reload_stop. */
   7199 static void
   7200 fr_read_ack_from_workers(struct fast_reload_thread* fr)
   7201 {
   7202 	struct daemon* daemon = fr->worker->daemon;
   7203 	/* Every worker sends one byte, wait for num-1 bytes. */
   7204 	int count=0, total=daemon->num-1;
   7205 	while(count < total) {
   7206 		uint8_t r;
   7207 		ssize_t ret;
   7208 		ret = recv(fr->commreload[0], (void*)&r, 1, 0);
   7209 		if(ret == -1) {
   7210 			if(
   7211 #ifndef USE_WINSOCK
   7212 				errno == EINTR || errno == EAGAIN
   7213 #  ifdef EWOULDBLOCK
   7214 				|| errno == EWOULDBLOCK
   7215 #  endif
   7216 #else
   7217 				WSAGetLastError() == WSAEINTR ||
   7218 				WSAGetLastError() == WSAEINPROGRESS ||
   7219 				WSAGetLastError() == WSAEWOULDBLOCK
   7220 #endif
   7221 				)
   7222 				continue; /* Try again */
   7223 			log_err("worker reload ack: recv failed: %s",
   7224 				sock_strerror(errno));
   7225 			return;
   7226 		}
   7227 		count++;
   7228 		verbose(VERB_ALGO, "worker reload ack from (uint8_t)%d",
   7229 			(int)r);
   7230 	}
   7231 }
   7232 
   7233 /** fast reload, poll for reload_start in mainthr waiting on a notification
   7234  * from the fast reload thread. */
   7235 static void
   7236 fr_poll_for_reload_start(struct fast_reload_thread* fr)
   7237 {
   7238 	int loopexit = 0, bcount = 0;
   7239 	uint32_t cmd;
   7240 	ssize_t ret;
   7241 
   7242 	/* Is there data? */
   7243 	if(!sock_poll_timeout(fr->commpair[0], -1, 1, 0, NULL)) {
   7244 		log_err("fr_poll_for_reload_start: poll failed");
   7245 		return;
   7246 	}
   7247 
   7248 	/* Read the data */
   7249 	while(1) {
   7250 		if(++loopexit > IPC_LOOP_MAX) {
   7251 			log_err("fr_poll_for_reload_start: recv loops %s",
   7252 				sock_strerror(errno));
   7253 			return;
   7254 		}
   7255 		ret = recv(fr->commpair[0], ((char*)&cmd)+bcount,
   7256 			sizeof(cmd)-bcount, 0);
   7257 		if(ret == -1) {
   7258 			if(
   7259 #ifndef USE_WINSOCK
   7260 				errno == EINTR || errno == EAGAIN
   7261 #  ifdef EWOULDBLOCK
   7262 				|| errno == EWOULDBLOCK
   7263 #  endif
   7264 #else
   7265 				WSAGetLastError() == WSAEINTR ||
   7266 				WSAGetLastError() == WSAEINPROGRESS ||
   7267 				WSAGetLastError() == WSAEWOULDBLOCK
   7268 #endif
   7269 				)
   7270 				continue; /* Try again. */
   7271 			log_err("fr_poll_for_reload_start: recv: %s",
   7272 				sock_strerror(errno));
   7273 			return;
   7274 		} else if(ret+(ssize_t)bcount != sizeof(cmd)) {
   7275 			bcount += ret;
   7276 			if((size_t)bcount < sizeof(cmd))
   7277 				continue;
   7278 		}
   7279 		break;
   7280 	}
   7281 	if(cmd != fast_reload_notification_reload_start) {
   7282 		verbose(VERB_ALGO, "fast reload wait for ack: "
   7283 			"wrong notification %d", (int)cmd);
   7284 	}
   7285 }
   7286 
   7287 /** Pick up the worker mesh changes, after fast reload. */
   7288 static void
   7289 fr_worker_pickup_mesh(struct worker* worker)
   7290 {
   7291 	struct mesh_area* mesh = worker->env.mesh;
   7292 	struct config_file* cfg = worker->env.cfg;
   7293 	mesh->use_response_ip = worker->daemon->use_response_ip;
   7294 	mesh->use_rpz = worker->daemon->use_rpz;
   7295 	mesh->max_reply_states = cfg->num_queries_per_thread;
   7296 	mesh->max_forever_states = (mesh->max_reply_states+1)/2;
   7297 #ifndef S_SPLINT_S
   7298 	mesh->jostle_max.tv_sec = (time_t)(cfg->jostle_time / 1000);
   7299 	mesh->jostle_max.tv_usec = (time_t)((cfg->jostle_time % 1000)*1000);
   7300 #endif
   7301 }
   7302 
   7303 /**
   7304  * Remove the old tcl_addr entries from the open connections.
   7305  * They are only incremented when an accept is performed on a tcp comm point.
   7306  * @param front: listening comm ports of the worker.
   7307  */
   7308 static void
   7309 tcl_remove_old(struct listen_dnsport* front)
   7310 {
   7311 	struct listen_list* l;
   7312 	l = front->cps;
   7313 	while(l) {
   7314 		if(l->com->type == comm_tcp_accept) {
   7315 			int i;
   7316 			for(i=0; i<l->com->max_tcp_count; i++) {
   7317 				if(l->com->tcp_handlers[i]->tcl_addr) {
   7318 					/* Because the increment of the
   7319 					 * connection limit was in the old
   7320 					 * tcl list, the new list does not
   7321 					 * need a decrement. With NULL it is
   7322 					 * not decremented when the connection
   7323 					 * is done, and also there is no
   7324 					 * reference to the old connection
   7325 					 * limit structure. */
   7326 					l->com->tcp_handlers[i]->tcl_addr =
   7327 						NULL;
   7328 				}
   7329 			}
   7330 		}
   7331 		l = l->next;
   7332 	}
   7333 }
   7334 
   7335 /** Stop zonemd lookup */
   7336 static void
   7337 auth_zone_zonemd_stop_lookup(struct auth_zone* z, struct mesh_area* mesh)
   7338 {
   7339 	struct query_info qinfo;
   7340 	uint16_t qflags = BIT_RD;
   7341 	qinfo.qname_len = z->namelen;
   7342 	qinfo.qname = z->name;
   7343 	qinfo.qclass = z->dclass;
   7344 	qinfo.qtype = z->zonemd_callback_qtype;
   7345 	qinfo.local_alias = NULL;
   7346 
   7347 	mesh_remove_callback(mesh, &qinfo, qflags,
   7348 		&auth_zonemd_dnskey_lookup_callback, z);
   7349 }
   7350 
   7351 /** Pick up the auth zone locks. */
   7352 static void
   7353 fr_pickup_auth_locks(struct worker* worker, struct auth_zone* namez,
   7354 	struct auth_zone* old_z, struct auth_zone* new_z,
   7355 	struct auth_xfer** xfr, struct auth_xfer** loadxfr)
   7356 {
   7357 	uint8_t nm[LDNS_MAX_DOMAINLEN+1];
   7358 	size_t nmlen;
   7359 	uint16_t dclass;
   7360 
   7361 	log_assert(namez->namelen <= sizeof(nm));
   7362 	lock_rw_rdlock(&namez->lock);
   7363 	nmlen = namez->namelen;
   7364 	dclass = namez->dclass;
   7365 	memmove(nm, namez->name, nmlen);
   7366 	lock_rw_unlock(&namez->lock);
   7367 
   7368 	lock_rw_wrlock(&worker->daemon->fast_reload_thread->old_auth_zones->lock);
   7369 	lock_rw_wrlock(&worker->env.auth_zones->lock);
   7370 	if(new_z) {
   7371 		lock_rw_wrlock(&new_z->lock);
   7372 	}
   7373 	if(old_z) {
   7374 		lock_rw_wrlock(&old_z->lock);
   7375 	}
   7376 	if(loadxfr)
   7377 		*loadxfr = auth_xfer_find(worker->daemon->fast_reload_thread->
   7378 			old_auth_zones, nm, nmlen, dclass);
   7379 	if(xfr)
   7380 		*xfr = auth_xfer_find(worker->env.auth_zones, nm, nmlen,
   7381 			dclass);
   7382 	if(loadxfr && *loadxfr) {
   7383 		lock_basic_lock(&(*loadxfr)->lock);
   7384 	}
   7385 	if(xfr && *xfr) {
   7386 		lock_basic_lock(&(*xfr)->lock);
   7387 	}
   7388 }
   7389 
   7390 /** Fast reload, worker picks up deleted auth zone */
   7391 static void
   7392 fr_worker_auth_del(struct worker* worker, struct fast_reload_auth_change* item,
   7393 	int for_change)
   7394 {
   7395 	int released = 0; /* Did this routine release callbacks. */
   7396 	struct auth_xfer* xfr = NULL;
   7397 
   7398 	lock_rw_wrlock(&item->old_z->lock);
   7399 	if(item->old_z->zonemd_callback_env &&
   7400 	   item->old_z->zonemd_callback_env->worker == worker){
   7401 		/* This worker was performing a zonemd lookup,
   7402 		 * stop the lookup and remove that entry. */
   7403 		auth_zone_zonemd_stop_lookup(item->old_z, worker->env.mesh);
   7404 		item->old_z->zonemd_callback_env = NULL;
   7405 	}
   7406 	lock_rw_unlock(&item->old_z->lock);
   7407 
   7408 	fr_pickup_auth_locks(worker, item->old_z, item->old_z, NULL, &xfr,
   7409 		NULL);
   7410 	lock_rw_unlock(&worker->daemon->fast_reload_thread->old_auth_zones->lock);
   7411 	lock_rw_unlock(&worker->env.auth_zones->lock);
   7412 	lock_rw_unlock(&item->old_z->lock);
   7413 	if(xfr) {
   7414 		/* Release callbacks on the xfr, if this worker holds them. */
   7415 		if(xfr->task_nextprobe->worker == worker ||
   7416 			xfr->task_probe->worker == worker ||
   7417 			xfr->task_transfer->worker == worker) {
   7418 			released = 1;
   7419 			xfr_disown_tasks(xfr, worker);
   7420 		}
   7421 		lock_basic_unlock(&xfr->lock);
   7422 	}
   7423 
   7424 	if(!for_change && (released || worker->thread_num == 0)) {
   7425 		/* See if the xfr item can be deleted. */
   7426 		xfr = NULL;
   7427 		fr_pickup_auth_locks(worker, item->old_z, item->old_z, NULL,
   7428 			&xfr, NULL);
   7429 		lock_rw_unlock(&worker->daemon->fast_reload_thread->old_auth_zones->lock);
   7430 		lock_rw_unlock(&item->old_z->lock);
   7431 		if(xfr && xfr->task_nextprobe->worker == NULL &&
   7432 			xfr->task_probe->worker == NULL &&
   7433 			xfr->task_transfer->worker == NULL) {
   7434 			(void)rbtree_delete(&worker->env.auth_zones->xtree,
   7435 				&xfr->node);
   7436 			lock_rw_unlock(&worker->env.auth_zones->lock);
   7437 			lock_basic_unlock(&xfr->lock);
   7438 			auth_xfer_delete(xfr);
   7439 		} else {
   7440 			lock_rw_unlock(&worker->env.auth_zones->lock);
   7441 			if(xfr) {
   7442 				lock_basic_unlock(&xfr->lock);
   7443 			}
   7444 		}
   7445 	}
   7446 }
   7447 
   7448 /** Fast reload, auth xfer config is picked up */
   7449 static void
   7450 auth_xfr_pickup_config(struct auth_xfer* loadxfr, struct auth_xfer* xfr)
   7451 {
   7452 	struct auth_master *probe_masters, *transfer_masters;
   7453 	log_assert(loadxfr->namelen == xfr->namelen);
   7454 	log_assert(loadxfr->namelabs == xfr->namelabs);
   7455 	log_assert(loadxfr->dclass == xfr->dclass);
   7456 
   7457 	/* The lists can be swapped in, the other xfr struct will be deleted
   7458 	 * afterwards. */
   7459 	probe_masters = xfr->task_probe->masters;
   7460 	transfer_masters = xfr->task_transfer->masters;
   7461 	xfr->task_probe->masters = loadxfr->task_probe->masters;
   7462 	xfr->task_transfer->masters = loadxfr->task_transfer->masters;
   7463 	loadxfr->task_probe->masters = probe_masters;
   7464 	loadxfr->task_transfer->masters = transfer_masters;
   7465 }
   7466 
   7467 /** Fast reload, worker picks up added auth zone */
   7468 static void
   7469 fr_worker_auth_add(struct worker* worker, struct fast_reload_auth_change* item,
   7470 	int for_change)
   7471 {
   7472 	struct auth_xfer* xfr = NULL, *loadxfr = NULL;
   7473 
   7474 	/* Start zone transfers and lookups. */
   7475 	fr_pickup_auth_locks(worker, item->new_z, NULL, item->new_z, &xfr,
   7476 		&loadxfr);
   7477 	if(xfr == NULL && item->new_z->zone_is_slave) {
   7478 		/* The xfr item needs to be created. The auth zones lock
   7479 		 * is held to make this possible. */
   7480 		xfr = auth_xfer_create(worker->env.auth_zones, item->new_z);
   7481 		auth_xfr_pickup_config(loadxfr, xfr);
   7482 		/* Serial information is copied into the xfr struct. */
   7483 		if(!xfr_find_soa(item->new_z, xfr)) {
   7484 			xfr->serial = 0;
   7485 		}
   7486 	} else if(for_change && xfr) {
   7487 		if(!xfr_find_soa(item->new_z, xfr)) {
   7488 			xfr->serial = 0;
   7489 		}
   7490 	}
   7491 	auth_zone_pickup_initial_zone(item->new_z, &worker->env);
   7492 	lock_rw_unlock(&item->new_z->lock);
   7493 	lock_rw_unlock(&worker->env.auth_zones->lock);
   7494 	lock_rw_unlock(&worker->daemon->fast_reload_thread->old_auth_zones->lock);
   7495 	if(loadxfr) {
   7496 		lock_basic_unlock(&loadxfr->lock);
   7497 	}
   7498 	if(xfr) {
   7499 		auth_xfer_pickup_initial_zone(xfr, &worker->env);
   7500 		if(for_change) {
   7501 			xfr->task_probe->only_lookup = 0;
   7502 		}
   7503 		lock_basic_unlock(&xfr->lock);
   7504 	}
   7505 
   7506 	/* Perform ZONEMD verification lookups. */
   7507 	lock_rw_wrlock(&item->new_z->lock);
   7508 	/* holding only the new_z lock */
   7509 	auth_zone_verify_zonemd(item->new_z, &worker->env,
   7510 		&worker->env.mesh->mods, NULL, 0, 1);
   7511 	lock_rw_unlock(&item->new_z->lock);
   7512 }
   7513 
   7514 /** Fast reload, worker picks up changed auth zone */
   7515 static void
   7516 fr_worker_auth_cha(struct worker* worker, struct fast_reload_auth_change* item)
   7517 {
   7518 	int todelete = 0;
   7519 	struct auth_xfer* loadxfr = NULL, *xfr = NULL;
   7520 	/* Since the zone has been changed, by rereading it from zone file,
   7521 	 * existing transfers and probes are likely for the old version.
   7522 	 * Stop them, and start new ones if needed. */
   7523 	fr_worker_auth_del(worker, item, 1);
   7524 
   7525 	if(worker->thread_num != 0)
   7526 		return;
   7527 
   7528 	/* The old callbacks are stopped, tasks have been disowned. The
   7529 	 * new config contents can be picked up. SOA information is picked
   7530 	 * up in the auth_add routine, as it has the new_z ready. */
   7531 
   7532 	fr_pickup_auth_locks(worker, item->new_z, item->old_z, item->new_z,
   7533 		&xfr, &loadxfr);
   7534 
   7535 	/* The xfr is not there any more if the zone is not set to have
   7536 	 * zone transfers. Or the xfr needs to be created if it is set to
   7537 	 * have zone transfers. */
   7538 	if(loadxfr && xfr) {
   7539 		/* Copy the config from loadxfr to the xfr in current use. */
   7540 		auth_xfr_pickup_config(loadxfr, xfr);
   7541 	} else if(!loadxfr && xfr) {
   7542 		/* Delete the xfr. */
   7543 		(void)rbtree_delete(&worker->env.auth_zones->xtree,
   7544 			&xfr->node);
   7545 		todelete = 1;
   7546 		item->new_z->zone_is_slave = 0;
   7547 	} else if(loadxfr && !xfr) {
   7548 		/* Create the xfr. */
   7549 		xfr = auth_xfer_create(worker->env.auth_zones, item->new_z);
   7550 		auth_xfr_pickup_config(loadxfr, xfr);
   7551 		item->new_z->zone_is_slave = 1;
   7552 	}
   7553 	lock_rw_unlock(&item->new_z->lock);
   7554 	lock_rw_unlock(&item->old_z->lock);
   7555 	lock_rw_unlock(&worker->daemon->fast_reload_thread->old_auth_zones->lock);
   7556 	lock_rw_unlock(&worker->env.auth_zones->lock);
   7557 	if(loadxfr) {
   7558 		lock_basic_unlock(&loadxfr->lock);
   7559 	}
   7560 	if(xfr) {
   7561 		lock_basic_unlock(&xfr->lock);
   7562 	}
   7563 	if(todelete) {
   7564 		auth_xfer_delete(xfr);
   7565 	}
   7566 
   7567 	fr_worker_auth_add(worker, item, 1);
   7568 }
   7569 
   7570 /** Fast reload, the worker picks up changes in auth zones. */
   7571 static void
   7572 fr_worker_pickup_auth_changes(struct worker* worker,
   7573 	struct fast_reload_auth_change* auth_zone_change_list)
   7574 {
   7575 	struct fast_reload_auth_change* item;
   7576 	for(item = auth_zone_change_list; item; item = item->next) {
   7577 		if(item->is_deleted) {
   7578 			fr_worker_auth_del(worker, item, 0);
   7579 		}
   7580 		if(item->is_added) {
   7581 			if(worker->thread_num == 0) {
   7582 				fr_worker_auth_add(worker, item, 0);
   7583 			}
   7584 		}
   7585 		if(item->is_changed) {
   7586 			fr_worker_auth_cha(worker, item);
   7587 		}
   7588 	}
   7589 }
   7590 
   7591 /** Fast reload, the worker picks up changes in outside_network. */
   7592 static void
   7593 fr_worker_pickup_outside_network(struct worker* worker)
   7594 {
   7595 	struct outside_network* outnet = worker->back;
   7596 	struct config_file* cfg = worker->env.cfg;
   7597 	outnet->use_caps_for_id = cfg->use_caps_bits_for_id;
   7598 	outnet->unwanted_threshold = cfg->unwanted_threshold;
   7599 	outnet->tls_use_sni = cfg->tls_use_sni;
   7600 	outnet->tcp_mss = cfg->outgoing_tcp_mss;
   7601 	outnet->ip_dscp = cfg->ip_dscp;
   7602 	outnet->max_reuse_tcp_queries = cfg->max_reuse_tcp_queries;
   7603 	outnet->tcp_reuse_timeout = cfg->tcp_reuse_timeout;
   7604 	outnet->tcp_auth_query_timeout = cfg->tcp_auth_query_timeout;
   7605 	outnet->delayclose = cfg->delay_close;
   7606 	if(outnet->delayclose) {
   7607 #ifndef S_SPLINT_S
   7608 		outnet->delay_tv.tv_sec = cfg->delay_close/1000;
   7609 		outnet->delay_tv.tv_usec = (cfg->delay_close%1000)*1000;
   7610 #endif
   7611 	}
   7612 }
   7613 
   7614 void
   7615 fast_reload_worker_pickup_changes(struct worker* worker)
   7616 {
   7617 	/* The pickup of changes is called when the fast reload has
   7618 	 * a synchronized moment, and all the threads are paused and the
   7619 	 * reload has been applied. Then the worker can pick up the new
   7620 	 * changes and store them in worker-specific structs.
   7621 	 * The pickup is also called when there is no pause, and then
   7622 	 * it is called after the reload has completed, and the worker
   7623 	 * get a signal to release old information, it can then pick
   7624 	 * up the new information. But in the mean time, the reload has
   7625 	 * swapped in trees, and the worker has been running with the
   7626 	 * older information for some time. */
   7627 	fr_worker_pickup_mesh(worker);
   7628 
   7629 	/* If the tcp connection limit has changed, the open connections
   7630 	 * need to remove their reference for the old tcp limits counters. */
   7631 	if(worker->daemon->fast_reload_tcl_has_changes)
   7632 		tcl_remove_old(worker->front);
   7633 
   7634 	/* If there are zonemd lookups, but the zone was deleted, the
   7635 	 * lookups should be cancelled. */
   7636 	fr_worker_pickup_auth_changes(worker,
   7637 		worker->daemon->fast_reload_thread->auth_zone_change_list);
   7638 #ifdef USE_CACHEDB
   7639 	worker->env.cachedb_enabled = worker->daemon->env->cachedb_enabled;
   7640 #endif
   7641 	fr_worker_pickup_outside_network(worker);
   7642 }
   7643 
   7644 /** fast reload thread, handle reload_stop notification, send reload stop
   7645  * to other threads over IPC and collect their ack. When that is done,
   7646  * ack to the caller, the fast reload thread, and wait for it to send start. */
   7647 static void
   7648 fr_main_perform_reload_stop(struct fast_reload_thread* fr)
   7649 {
   7650 	struct daemon* daemon = fr->worker->daemon;
   7651 	int i;
   7652 
   7653 	/* Send reload_stop to other threads. */
   7654 	for(i=0; i<daemon->num; i++) {
   7655 		if(i == fr->worker->thread_num)
   7656 			continue; /* Do not send to ourselves. */
   7657 		worker_send_cmd(daemon->workers[i], worker_cmd_reload_stop);
   7658 	}
   7659 
   7660 	/* Wait for the other threads to ack. */
   7661 	fr_read_ack_from_workers(fr);
   7662 
   7663 	/* Send ack to fast reload thread. */
   7664 	fr_send_cmd_to(fr, fast_reload_notification_reload_ack, 0, 1);
   7665 
   7666 	/* Wait for reload_start from fast reload thread to resume. */
   7667 	fr_poll_for_reload_start(fr);
   7668 
   7669 	/* Send reload_start to other threads */
   7670 	for(i=0; i<daemon->num; i++) {
   7671 		if(i == fr->worker->thread_num)
   7672 			continue; /* Do not send to ourselves. */
   7673 		worker_send_cmd(daemon->workers[i], worker_cmd_reload_start);
   7674 	}
   7675 
   7676 	/* Pick up changes for this worker. */
   7677 	if(fr->worker->daemon->fast_reload_drop_mesh) {
   7678 		verbose(VERB_ALGO, "worker: drop mesh queries after reload");
   7679 		mesh_delete_all(fr->worker->env.mesh);
   7680 	}
   7681 	fast_reload_worker_pickup_changes(fr->worker);
   7682 
   7683 	/* Wait for the other threads to ack. */
   7684 	fr_read_ack_from_workers(fr);
   7685 
   7686 	/* Send ack to fast reload thread. */
   7687 	fr_send_cmd_to(fr, fast_reload_notification_reload_ack, 0, 1);
   7688 
   7689 	verbose(VERB_ALGO, "worker resume after reload");
   7690 }
   7691 
   7692 /** Fast reload, the main thread performs the nopause poll. It polls every
   7693  * other worker thread briefly over the command pipe ipc. The command takes
   7694  * no time for the worker, it can return immediately. After that it sends
   7695  * an acknowledgement to the fastreload thread. */
   7696 static void
   7697 fr_main_perform_reload_nopause_poll(struct fast_reload_thread* fr)
   7698 {
   7699 	struct daemon* daemon = fr->worker->daemon;
   7700 	int i;
   7701 
   7702 	/* Send the reload_poll to other threads. They can respond
   7703 	 * one at a time. */
   7704 	for(i=0; i<daemon->num; i++) {
   7705 		if(i == fr->worker->thread_num)
   7706 			continue; /* Do not send to ourselves. */
   7707 		worker_send_cmd(daemon->workers[i], worker_cmd_reload_poll);
   7708 	}
   7709 
   7710 	/* Wait for the other threads to ack. */
   7711 	fr_read_ack_from_workers(fr);
   7712 	fast_reload_worker_pickup_changes(fr->worker);
   7713 
   7714 	/* Send ack to fast reload thread. */
   7715 	fr_send_cmd_to(fr, fast_reload_notification_reload_ack, 0, 1);
   7716 }
   7717 
   7718 /** Fast reload, perform the command received from the fast reload thread */
   7719 static void
   7720 fr_main_perform_cmd(struct fast_reload_thread* fr,
   7721 	enum fast_reload_notification status)
   7722 {
   7723 	verbose(VERB_ALGO, "main perform fast reload status: %s",
   7724 		fr_notification_to_string(status));
   7725 	if(status == fast_reload_notification_printout) {
   7726 		fr_main_perform_printout(fr);
   7727 	} else if(status == fast_reload_notification_done ||
   7728 		status == fast_reload_notification_done_error ||
   7729 		status == fast_reload_notification_exited) {
   7730 		fr_main_perform_done(fr);
   7731 	} else if(status == fast_reload_notification_reload_stop) {
   7732 		fr_main_perform_reload_stop(fr);
   7733 	} else if(status == fast_reload_notification_reload_nopause_poll) {
   7734 		fr_main_perform_reload_nopause_poll(fr);
   7735 	} else {
   7736 		log_err("main received unknown status from fast reload: %d %s",
   7737 			(int)status, fr_notification_to_string(status));
   7738 	}
   7739 }
   7740 
   7741 /** Fast reload, handle command from fast reload to the main thread. */
   7742 static void
   7743 fr_main_handle_cmd(struct fast_reload_thread* fr)
   7744 {
   7745 	enum fast_reload_notification status;
   7746 	ssize_t ret;
   7747 	/* keep static analyzer happy; recv(-1,..) */
   7748 	log_assert(fr->commpair[0] >= 0);
   7749 	ret = recv(fr->commpair[0],
   7750 		((char*)&fr->service_read_cmd)+fr->service_read_cmd_count,
   7751 		sizeof(fr->service_read_cmd)-fr->service_read_cmd_count, 0);
   7752 	if(ret == -1) {
   7753 		if(
   7754 #ifndef USE_WINSOCK
   7755 			errno == EINTR || errno == EAGAIN
   7756 #  ifdef EWOULDBLOCK
   7757 			|| errno == EWOULDBLOCK
   7758 #  endif
   7759 #else
   7760 			WSAGetLastError() == WSAEINTR ||
   7761 			WSAGetLastError() == WSAEINPROGRESS
   7762 #endif
   7763 			)
   7764 			return; /* Continue later. */
   7765 #ifdef USE_WINSOCK
   7766 		if(WSAGetLastError() == WSAEWOULDBLOCK) {
   7767 			ub_winsock_tcp_wouldblock(fr->service_event,
   7768 				UB_EV_READ);
   7769 			return; /* Continue later. */
   7770 		}
   7771 #endif
   7772 		log_err("read cmd from fast reload thread, recv: %s",
   7773 			sock_strerror(errno));
   7774 		return;
   7775 	} else if(ret == 0) {
   7776 		verbose(VERB_ALGO, "closed connection from fast reload thread");
   7777 		fr->service_read_cmd_count = 0;
   7778 		/* handle this like an error */
   7779 		fr->service_read_cmd = fast_reload_notification_done_error;
   7780 	} else if(ret + (ssize_t)fr->service_read_cmd_count <
   7781 		(ssize_t)sizeof(fr->service_read_cmd)) {
   7782 		fr->service_read_cmd_count += ret;
   7783 		/* Continue later. */
   7784 		return;
   7785 	}
   7786 	status = fr->service_read_cmd;
   7787 	fr->service_read_cmd = 0;
   7788 	fr->service_read_cmd_count = 0;
   7789 	fr_main_perform_cmd(fr, status);
   7790 }
   7791 
   7792 /** Fast reload, poll for and handle cmd from fast reload thread. */
   7793 static void
   7794 fr_check_cmd_from_thread(struct fast_reload_thread* fr)
   7795 {
   7796 	int inevent = 0;
   7797 	struct worker* worker = fr->worker;
   7798 	/* Stop in case the thread has exited, or there is no read event. */
   7799 	while(worker->daemon->fast_reload_thread) {
   7800 		if(!sock_poll_timeout(fr->commpair[0], 0, 1, 0, &inevent)) {
   7801 			log_err("check for cmd from fast reload thread: "
   7802 				"poll failed");
   7803 #ifdef USE_WINSOCK
   7804 			if(worker->daemon->fast_reload_thread)
   7805 				ub_winsock_tcp_wouldblock(worker->daemon->
   7806 					fast_reload_thread->service_event,
   7807 					UB_EV_READ);
   7808 #endif
   7809 			return;
   7810 		}
   7811 		if(!inevent) {
   7812 #ifdef USE_WINSOCK
   7813 			if(worker->daemon->fast_reload_thread)
   7814 				ub_winsock_tcp_wouldblock(worker->daemon->
   7815 					fast_reload_thread->service_event,
   7816 					UB_EV_READ);
   7817 #endif
   7818 			return;
   7819 		}
   7820 		fr_main_handle_cmd(fr);
   7821 	}
   7822 }
   7823 
   7824 void fast_reload_service_cb(int ATTR_UNUSED(fd), short ATTR_UNUSED(bits),
   7825 	void* arg)
   7826 {
   7827 	struct fast_reload_thread* fast_reload_thread =
   7828 		(struct fast_reload_thread*)arg;
   7829 	struct worker* worker = fast_reload_thread->worker;
   7830 
   7831 	/* Read and handle the command */
   7832 	fr_main_handle_cmd(fast_reload_thread);
   7833 	if(worker->daemon->fast_reload_thread != NULL) {
   7834 		/* If not exited, see if there are more pending statuses
   7835 		 * from the fast reload thread. */
   7836 		fr_check_cmd_from_thread(fast_reload_thread);
   7837 	}
   7838 }
   7839 
   7840 #ifdef HAVE_SSL
   7841 /** fast reload, send client item over SSL. Returns number of bytes
   7842  * printed, 0 on wait later, or -1 on failure. */
   7843 static int
   7844 fr_client_send_item_ssl(struct fast_reload_printq* printq)
   7845 {
   7846 	int r;
   7847 	ERR_clear_error();
   7848 	r = SSL_write(printq->remote.ssl,
   7849 		printq->client_item+printq->client_byte_count,
   7850 		printq->client_len - printq->client_byte_count);
   7851 	if(r <= 0) {
   7852 		int want = SSL_get_error(printq->remote.ssl, r);
   7853 		if(want == SSL_ERROR_ZERO_RETURN) {
   7854 			log_err("fast_reload print to remote client: "
   7855 				"SSL_write says connection closed.");
   7856 			return -1;
   7857 		} else if(want == SSL_ERROR_WANT_READ) {
   7858 			/* wait for read condition */
   7859 			printq->client_cp->ssl_shake_state = comm_ssl_shake_hs_read;
   7860 			comm_point_listen_for_rw(printq->client_cp, 1, 0);
   7861 			return 0;
   7862 		} else if(want == SSL_ERROR_WANT_WRITE) {
   7863 #ifdef USE_WINSOCK
   7864 			ub_winsock_tcp_wouldblock(comm_point_internal(printq->client_cp), UB_EV_WRITE);
   7865 #endif
   7866 			return 0; /* write more later */
   7867 		} else if(want == SSL_ERROR_SYSCALL) {
   7868 #ifdef EPIPE
   7869 			if(errno == EPIPE && verbosity < 2) {
   7870 				/* silence 'broken pipe' */
   7871 				return -1;
   7872 			}
   7873 #endif
   7874 			if(errno != 0)
   7875 				log_err("fast_reload print to remote client: "
   7876 					"SSL_write syscall: %s",
   7877 					sock_strerror(errno));
   7878 			return -1;
   7879 		}
   7880 		log_crypto_err_io("fast_reload print to remote client: "
   7881 			"could not SSL_write", want);
   7882 		return -1;
   7883 	}
   7884 	return r;
   7885 }
   7886 #endif /* HAVE_SSL */
   7887 
   7888 /** fast reload, send client item for fd, returns bytes sent, or 0 for wait
   7889  * later, or -1 on failure. */
   7890 static int
   7891 fr_client_send_item_fd(struct fast_reload_printq* printq)
   7892 {
   7893 	int r;
   7894 	r = (int)send(printq->remote.fd,
   7895 		printq->client_item+printq->client_byte_count,
   7896 		printq->client_len - printq->client_byte_count, 0);
   7897 	if(r == -1) {
   7898 		if(
   7899 #ifndef USE_WINSOCK
   7900 			errno == EINTR || errno == EAGAIN
   7901 #  ifdef EWOULDBLOCK
   7902 			|| errno == EWOULDBLOCK
   7903 #  endif
   7904 #else
   7905 			WSAGetLastError() == WSAEINTR ||
   7906 			WSAGetLastError() == WSAEINPROGRESS ||
   7907 			WSAGetLastError() == WSAEWOULDBLOCK
   7908 #endif
   7909 			) {
   7910 #ifdef USE_WINSOCK
   7911 			ub_winsock_tcp_wouldblock(comm_point_internal(printq->client_cp), UB_EV_WRITE);
   7912 #endif
   7913 			return 0; /* Try again. */
   7914 		}
   7915 		log_err("fast_reload print to remote client: send failed: %s",
   7916 			sock_strerror(errno));
   7917 		return -1;
   7918 	}
   7919 	return r;
   7920 }
   7921 
   7922 /** fast reload, send current client item. false on failure or wait later. */
   7923 static int
   7924 fr_client_send_item(struct fast_reload_printq* printq)
   7925 {
   7926 	int r;
   7927 #ifdef HAVE_SSL
   7928 	if(printq->remote.ssl) {
   7929 		r = fr_client_send_item_ssl(printq);
   7930 	} else {
   7931 #endif
   7932 		r = fr_client_send_item_fd(printq);
   7933 #ifdef HAVE_SSL
   7934 	}
   7935 #endif
   7936 	if(r == 0) {
   7937 		/* Wait for later. */
   7938 		return 0;
   7939 	} else if(r == -1) {
   7940 		/* It failed, close comm point and stop sending. */
   7941 		fr_printq_remove(printq);
   7942 		return 0;
   7943 	}
   7944 	printq->client_byte_count += r;
   7945 	if(printq->client_byte_count < printq->client_len)
   7946 		return 0; /* Print more later. */
   7947 	return 1;
   7948 }
   7949 
   7950 /** fast reload, pick up the next item to print */
   7951 static void
   7952 fr_client_pickup_next_item(struct fast_reload_printq* printq)
   7953 {
   7954 	struct config_strlist* item;
   7955 	/* Pop first off the list. */
   7956 	if(!printq->to_print->first) {
   7957 		printq->client_item = NULL;
   7958 		printq->client_len = 0;
   7959 		printq->client_byte_count = 0;
   7960 		return;
   7961 	}
   7962 	item = printq->to_print->first;
   7963 	if(item->next) {
   7964 		printq->to_print->first = item->next;
   7965 	} else {
   7966 		printq->to_print->first = NULL;
   7967 		printq->to_print->last = NULL;
   7968 	}
   7969 	item->next = NULL;
   7970 	printq->client_len = 0;
   7971 	printq->client_byte_count = 0;
   7972 	printq->client_item = item->str;
   7973 	item->str = NULL;
   7974 	free(item);
   7975 	/* The len is the number of bytes to print out, and thus excludes
   7976 	 * the terminator zero. */
   7977 	if(printq->client_item)
   7978 		printq->client_len = (int)strlen(printq->client_item);
   7979 }
   7980 
   7981 int fast_reload_client_callback(struct comm_point* ATTR_UNUSED(c), void* arg,
   7982 	int err, struct comm_reply* ATTR_UNUSED(rep))
   7983 {
   7984 	struct fast_reload_printq* printq = (struct fast_reload_printq*)arg;
   7985 	if(!printq->client_cp) {
   7986 		fr_printq_remove(printq);
   7987 		return 0; /* the output is closed and deleted */
   7988 	}
   7989 	if(err != NETEVENT_NOERROR) {
   7990 		verbose(VERB_ALGO, "fast reload client: error, close it");
   7991 		fr_printq_remove(printq);
   7992 		return 0;
   7993 	}
   7994 #ifdef HAVE_SSL
   7995 	if(printq->client_cp->ssl_shake_state == comm_ssl_shake_hs_read) {
   7996 		/* read condition satisfied back to writing */
   7997 		comm_point_listen_for_rw(printq->client_cp, 0, 1);
   7998 		printq->client_cp->ssl_shake_state = comm_ssl_shake_none;
   7999 	}
   8000 #endif /* HAVE_SSL */
   8001 
   8002 	/* Pickup an item if there are none */
   8003 	if(!printq->client_item) {
   8004 		fr_client_pickup_next_item(printq);
   8005 	}
   8006 	if(!printq->client_item) {
   8007 		if(printq->in_list) {
   8008 			/* Nothing more to print, it can be removed. */
   8009 			fr_printq_remove(printq);
   8010 			return 0;
   8011 		}
   8012 		/* Done with printing for now. */
   8013 		comm_point_stop_listening(printq->client_cp);
   8014 		return 0;
   8015 	}
   8016 
   8017 	/* Try to print out a number of items, if they can print in full. */
   8018 	while(printq->client_item) {
   8019 		/* Send current item, if any. */
   8020 		if(printq->client_item && printq->client_len != 0 &&
   8021 			printq->client_byte_count < printq->client_len) {
   8022 			if(!fr_client_send_item(printq))
   8023 				return 0;
   8024 		}
   8025 
   8026 		/* The current item is done. */
   8027 		if(printq->client_item) {
   8028 			free(printq->client_item);
   8029 			printq->client_item = NULL;
   8030 			printq->client_len = 0;
   8031 			printq->client_byte_count = 0;
   8032 		}
   8033 		if(!printq->to_print->first) {
   8034 			if(printq->in_list) {
   8035 				/* Nothing more to print, it can be removed. */
   8036 				fr_printq_remove(printq);
   8037 				return 0;
   8038 			}
   8039 			/* Done with printing for now. */
   8040 			comm_point_stop_listening(printq->client_cp);
   8041 			return 0;
   8042 		}
   8043 		fr_client_pickup_next_item(printq);
   8044 	}
   8045 
   8046 	return 0;
   8047 }
   8048 
   8049 #ifndef THREADS_DISABLED
   8050 /** fast reload printq create */
   8051 static struct fast_reload_printq*
   8052 fr_printq_create(struct comm_point* c, struct worker* worker)
   8053 {
   8054 	struct fast_reload_printq* printq = calloc(1, sizeof(*printq));
   8055 	if(!printq)
   8056 		return NULL;
   8057 	printq->to_print = calloc(1, sizeof(*printq->to_print));
   8058 	if(!printq->to_print) {
   8059 		free(printq);
   8060 		return NULL;
   8061 	}
   8062 	printq->worker = worker;
   8063 	printq->client_cp = c;
   8064 	printq->client_cp->callback = fast_reload_client_callback;
   8065 	printq->client_cp->cb_arg = printq;
   8066 	return printq;
   8067 }
   8068 #endif /* !THREADS_DISABLED */
   8069 
   8070 /** fast reload printq delete */
   8071 static void
   8072 fr_printq_delete(struct fast_reload_printq* printq)
   8073 {
   8074 	if(!printq)
   8075 		return;
   8076 #ifdef HAVE_SSL
   8077 	if(printq->remote.ssl) {
   8078 		SSL_shutdown(printq->remote.ssl);
   8079 		SSL_free(printq->remote.ssl);
   8080 	}
   8081 #endif
   8082 	comm_point_delete(printq->client_cp);
   8083 	if(printq->to_print) {
   8084 		config_delstrlist(printq->to_print->first);
   8085 		free(printq->to_print);
   8086 	}
   8087 	free(printq);
   8088 }
   8089 
   8090 /** fast reload printq, returns true if the list is empty and no item */
   8091 static int
   8092 fr_printq_empty(struct fast_reload_printq* printq)
   8093 {
   8094 	if(printq->to_print->first == NULL && printq->client_item == NULL)
   8095 		return 1;
   8096 	return 0;
   8097 }
   8098 
   8099 /** fast reload printq, insert onto list */
   8100 static void
   8101 fr_printq_list_insert(struct fast_reload_printq* printq, struct daemon* daemon)
   8102 {
   8103 	if(printq->in_list)
   8104 		return;
   8105 	printq->next = daemon->fast_reload_printq_list;
   8106 	if(printq->next)
   8107 		printq->next->prev = printq;
   8108 	printq->prev = NULL;
   8109 	printq->in_list = 1;
   8110 	daemon->fast_reload_printq_list = printq;
   8111 }
   8112 
   8113 /** fast reload printq delete list */
   8114 void
   8115 fast_reload_printq_list_delete(struct fast_reload_printq* list)
   8116 {
   8117 	struct fast_reload_printq* printq = list, *next;
   8118 	while(printq) {
   8119 		next = printq->next;
   8120 		fr_printq_delete(printq);
   8121 		printq = next;
   8122 	}
   8123 }
   8124 
   8125 /** fast reload printq remove the item from the printq list */
   8126 static void
   8127 fr_printq_list_remove(struct fast_reload_printq* printq)
   8128 {
   8129 	struct daemon* daemon = printq->worker->daemon;
   8130 	if(printq->prev == NULL)
   8131 		daemon->fast_reload_printq_list = printq->next;
   8132 	else	printq->prev->next = printq->next;
   8133 	if(printq->next)
   8134 		printq->next->prev = printq->prev;
   8135 	printq->in_list = 0;
   8136 }
   8137 
   8138 /** fast reload printq, remove the printq when no longer needed,
   8139  * like the stream is closed. */
   8140 static void
   8141 fr_printq_remove(struct fast_reload_printq* printq)
   8142 {
   8143 	if(!printq)
   8144 		return;
   8145 	if(printq->worker->daemon->fast_reload_thread &&
   8146 		printq->worker->daemon->fast_reload_thread->printq == printq)
   8147 		printq->worker->daemon->fast_reload_thread->printq = NULL;
   8148 	if(printq->in_list)
   8149 		fr_printq_list_remove(printq);
   8150 	fr_printq_delete(printq);
   8151 }
   8152 
   8153 /** fast reload thread, send stop command to the thread, from the main thread.
   8154  */
   8155 static void
   8156 fr_send_stop(struct fast_reload_thread* fr)
   8157 {
   8158 	fr_send_cmd_to(fr, fast_reload_notification_exit, 1, 0);
   8159 }
   8160 
   8161 void
   8162 fast_reload_thread_start(RES* ssl, struct worker* worker, struct rc_state* s,
   8163 	int fr_verb, int fr_nopause, int fr_drop_mesh)
   8164 {
   8165 	if(worker->daemon->fast_reload_thread) {
   8166 		log_err("fast reload thread already running");
   8167 		return;
   8168 	}
   8169 	if(!fast_reload_thread_setup(worker, fr_verb, fr_nopause,
   8170 		fr_drop_mesh)) {
   8171 		if(!ssl_printf(ssl, "error could not setup thread\n"))
   8172 			return;
   8173 		return;
   8174 	}
   8175 	worker->daemon->fast_reload_thread->started = 1;
   8176 
   8177 #ifndef THREADS_DISABLED
   8178 	/* Setup command listener in remote servicing thread */
   8179 	/* The listener has to be nonblocking, so the the remote servicing
   8180 	 * thread can continue to service DNS queries, the fast reload
   8181 	 * thread is going to read the config from disk and apply it. */
   8182 	/* The commpair[1] element can stay blocking, it is used by the
   8183 	 * fast reload thread to communicate back. The thread needs to wait
   8184 	 * at these times, when it has to check briefly it can use poll. */
   8185 	fd_set_nonblock(worker->daemon->fast_reload_thread->commpair[0]);
   8186 	worker->daemon->fast_reload_thread->service_event = ub_event_new(
   8187 		comm_base_internal(worker->base),
   8188 		worker->daemon->fast_reload_thread->commpair[0],
   8189 		UB_EV_READ | UB_EV_PERSIST, fast_reload_service_cb,
   8190 		worker->daemon->fast_reload_thread);
   8191 	if(!worker->daemon->fast_reload_thread->service_event) {
   8192 		fast_reload_thread_desetup(worker->daemon->fast_reload_thread);
   8193 		if(!ssl_printf(ssl, "error out of memory\n"))
   8194 			return;
   8195 		return;
   8196 	}
   8197 	if(ub_event_add(worker->daemon->fast_reload_thread->service_event,
   8198 		NULL) != 0) {
   8199 		fast_reload_thread_desetup(worker->daemon->fast_reload_thread);
   8200 		if(!ssl_printf(ssl, "error out of memory adding service event\n"))
   8201 			return;
   8202 		return;
   8203 	}
   8204 	worker->daemon->fast_reload_thread->service_event_is_added = 1;
   8205 
   8206 	/* Setup the comm point to the remote control client as an event
   8207 	 * on the remote servicing thread, which it already is.
   8208 	 * It needs a new callback to service it. */
   8209 	log_assert(s);
   8210 	state_list_remove_elem(&s->rc->busy_list, s->c);
   8211 	s->rc->active --;
   8212 	/* Set the comm point file descriptor to nonblocking. So that
   8213 	 * printout to the remote control client does not block the
   8214 	 * server thread from servicing DNS queries. */
   8215 	fd_set_nonblock(s->c->fd);
   8216 	worker->daemon->fast_reload_thread->printq = fr_printq_create(s->c,
   8217 		worker);
   8218 	if(!worker->daemon->fast_reload_thread->printq) {
   8219 		fast_reload_thread_desetup(worker->daemon->fast_reload_thread);
   8220 		if(!ssl_printf(ssl, "error out of memory create printq\n"))
   8221 			return;
   8222 		return;
   8223 	}
   8224 	worker->daemon->fast_reload_thread->printq->remote = *ssl;
   8225 	s->rc = NULL; /* move away the rc state */
   8226 	/* Nothing to print right now, so no need to have it active. */
   8227 	comm_point_stop_listening(worker->daemon->fast_reload_thread->printq->client_cp);
   8228 
   8229 	/* Start fast reload thread */
   8230 	ub_thread_create(&worker->daemon->fast_reload_thread->tid,
   8231 		fast_reload_thread_main, worker->daemon->fast_reload_thread);
   8232 #else
   8233 	(void)s;
   8234 #endif
   8235 }
   8236 
   8237 void
   8238 fast_reload_thread_stop(struct fast_reload_thread* fast_reload_thread)
   8239 {
   8240 	struct worker* worker = fast_reload_thread->worker;
   8241 	if(!fast_reload_thread)
   8242 		return;
   8243 	fr_send_stop(fast_reload_thread);
   8244 	if(worker->daemon->fast_reload_thread != NULL) {
   8245 		/* If it did not exit yet, join with the thread now. It is
   8246 		 * going to exit because the exit command is sent to it. */
   8247 		fr_main_perform_done(fast_reload_thread);
   8248 	}
   8249 }
   8250