| File: | src/usr.sbin/nsd/difffile.c |
| Warning: | line 1397, column 4 Dereference of null pointer (loaded from field 'base') |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* | |||
| 2 | * difffile.c - DIFF file handling source code. Read and write diff files. | |||
| 3 | * | |||
| 4 | * Copyright (c) 2001-2006, NLnet Labs. All rights reserved. | |||
| 5 | * | |||
| 6 | * See LICENSE for the license. | |||
| 7 | * | |||
| 8 | */ | |||
| 9 | ||||
| 10 | #include "config.h" | |||
| 11 | #include <assert.h> | |||
| 12 | #include <string.h> | |||
| 13 | #include <unistd.h> | |||
| 14 | #include <stdlib.h> | |||
| 15 | #include <errno(*__errno()).h> | |||
| 16 | #include "difffile.h" | |||
| 17 | #include "xfrd-disk.h" | |||
| 18 | #include "util.h" | |||
| 19 | #include "packet.h" | |||
| 20 | #include "rdata.h" | |||
| 21 | #include "udb.h" | |||
| 22 | #include "udbzone.h" | |||
| 23 | #include "nsec3.h" | |||
| 24 | #include "nsd.h" | |||
| 25 | #include "rrl.h" | |||
| 26 | ||||
| 27 | static int | |||
| 28 | write_64(FILE *out, uint64_t val) | |||
| 29 | { | |||
| 30 | return write_data(out, &val, sizeof(val)); | |||
| 31 | } | |||
| 32 | ||||
| 33 | static int | |||
| 34 | write_32(FILE *out, uint32_t val) | |||
| 35 | { | |||
| 36 | val = htonl(val)(__uint32_t)(__builtin_constant_p(val) ? (__uint32_t)(((__uint32_t )(val) & 0xff) << 24 | ((__uint32_t)(val) & 0xff00 ) << 8 | ((__uint32_t)(val) & 0xff0000) >> 8 | ((__uint32_t)(val) & 0xff000000) >> 24) : __swap32md (val)); | |||
| 37 | return write_data(out, &val, sizeof(val)); | |||
| 38 | } | |||
| 39 | ||||
| 40 | static int | |||
| 41 | write_8(FILE *out, uint8_t val) | |||
| 42 | { | |||
| 43 | return write_data(out, &val, sizeof(val)); | |||
| 44 | } | |||
| 45 | ||||
| 46 | static int | |||
| 47 | write_str(FILE *out, const char* str) | |||
| 48 | { | |||
| 49 | uint32_t len = strlen(str); | |||
| 50 | if(!write_32(out, len)) | |||
| 51 | return 0; | |||
| 52 | return write_data(out, str, len); | |||
| 53 | } | |||
| 54 | ||||
| 55 | void | |||
| 56 | diff_write_packet(const char* zone, const char* pat, uint32_t old_serial, | |||
| 57 | uint32_t new_serial, uint32_t seq_nr, uint8_t* data, size_t len, | |||
| 58 | struct nsd* nsd, uint64_t filenumber) | |||
| 59 | { | |||
| 60 | FILE* df = xfrd_open_xfrfile(nsd, filenumber, seq_nr?"a":"w"); | |||
| 61 | if(!df) { | |||
| 62 | log_msg(LOG_ERR3, "could not open transfer %s file %lld: %s", | |||
| 63 | zone, (long long)filenumber, strerror(errno(*__errno()))); | |||
| 64 | return; | |||
| 65 | } | |||
| 66 | ||||
| 67 | /* if first part, first write the header */ | |||
| 68 | if(seq_nr == 0) { | |||
| 69 | struct timeval tv; | |||
| 70 | if (gettimeofday(&tv, NULL((void*)0)) != 0) { | |||
| 71 | log_msg(LOG_ERR3, "could not get timestamp for %s: %s", | |||
| 72 | zone, strerror(errno(*__errno()))); | |||
| 73 | } | |||
| 74 | if(!write_32(df, DIFF_PART_XFRF('X'<<24 | 'F'<<16 | 'R'<<8 | 'F')) || | |||
| 75 | !write_8(df, 0) /* notcommitted(yet) */ || | |||
| 76 | !write_32(df, 0) /* numberofparts when done */ || | |||
| 77 | !write_64(df, (uint64_t) tv.tv_sec) || | |||
| 78 | !write_32(df, (uint32_t) tv.tv_usec) || | |||
| 79 | !write_32(df, old_serial) || | |||
| 80 | !write_32(df, new_serial) || | |||
| 81 | !write_64(df, (uint64_t) tv.tv_sec) || | |||
| 82 | !write_32(df, (uint32_t) tv.tv_usec) || | |||
| 83 | !write_str(df, zone) || | |||
| 84 | !write_str(df, pat)) { | |||
| 85 | log_msg(LOG_ERR3, "could not write transfer %s file %lld: %s", | |||
| 86 | zone, (long long)filenumber, strerror(errno(*__errno()))); | |||
| 87 | fclose(df); | |||
| 88 | return; | |||
| 89 | } | |||
| 90 | } | |||
| 91 | ||||
| 92 | if(!write_32(df, DIFF_PART_XXFR('X'<<24 | 'X'<<16 | 'F'<<8 | 'R')) || | |||
| 93 | !write_32(df, len) || | |||
| 94 | !write_data(df, data, len) || | |||
| 95 | !write_32(df, len)) | |||
| 96 | { | |||
| 97 | log_msg(LOG_ERR3, "could not write transfer %s file %lld: %s", | |||
| 98 | zone, (long long)filenumber, strerror(errno(*__errno()))); | |||
| 99 | } | |||
| 100 | fclose(df); | |||
| 101 | } | |||
| 102 | ||||
| 103 | void | |||
| 104 | diff_write_commit(const char* zone, uint32_t old_serial, uint32_t new_serial, | |||
| 105 | uint32_t num_parts, uint8_t commit, const char* log_str, | |||
| 106 | struct nsd* nsd, uint64_t filenumber) | |||
| 107 | { | |||
| 108 | struct timeval tv; | |||
| 109 | FILE* df; | |||
| 110 | ||||
| 111 | if (gettimeofday(&tv, NULL((void*)0)) != 0) { | |||
| 112 | log_msg(LOG_ERR3, "could not set timestamp for %s: %s", | |||
| 113 | zone, strerror(errno(*__errno()))); | |||
| 114 | } | |||
| 115 | ||||
| 116 | /* overwrite the first part of the file with 'committed = 1', | |||
| 117 | * as well as the end_time and number of parts. | |||
| 118 | * also write old_serial and new_serial, so that a bad file mixup | |||
| 119 | * will result in unusable serial numbers. */ | |||
| 120 | ||||
| 121 | df = xfrd_open_xfrfile(nsd, filenumber, "r+"); | |||
| 122 | if(!df) { | |||
| 123 | log_msg(LOG_ERR3, "could not open transfer %s file %lld: %s", | |||
| 124 | zone, (long long)filenumber, strerror(errno(*__errno()))); | |||
| 125 | return; | |||
| 126 | } | |||
| 127 | if(!write_32(df, DIFF_PART_XFRF('X'<<24 | 'F'<<16 | 'R'<<8 | 'F')) || | |||
| 128 | !write_8(df, commit) /* committed */ || | |||
| 129 | !write_32(df, num_parts) || | |||
| 130 | !write_64(df, (uint64_t) tv.tv_sec) || | |||
| 131 | !write_32(df, (uint32_t) tv.tv_usec) || | |||
| 132 | !write_32(df, old_serial) || | |||
| 133 | !write_32(df, new_serial)) | |||
| 134 | { | |||
| 135 | log_msg(LOG_ERR3, "could not write transfer %s file %lld: %s", | |||
| 136 | zone, (long long)filenumber, strerror(errno(*__errno()))); | |||
| 137 | fclose(df); | |||
| 138 | return; | |||
| 139 | } | |||
| 140 | ||||
| 141 | /* append the log_str to the end of the file */ | |||
| 142 | if(fseek(df, 0, SEEK_END2) == -1) { | |||
| 143 | log_msg(LOG_ERR3, "could not fseek transfer %s file %lld: %s", | |||
| 144 | zone, (long long)filenumber, strerror(errno(*__errno()))); | |||
| 145 | fclose(df); | |||
| 146 | return; | |||
| 147 | } | |||
| 148 | if(!write_str(df, log_str)) { | |||
| 149 | log_msg(LOG_ERR3, "could not write transfer %s file %lld: %s", | |||
| 150 | zone, (long long)filenumber, strerror(errno(*__errno()))); | |||
| 151 | fclose(df); | |||
| 152 | return; | |||
| 153 | ||||
| 154 | } | |||
| 155 | fflush(df); | |||
| 156 | fclose(df); | |||
| 157 | } | |||
| 158 | ||||
| 159 | int | |||
| 160 | diff_read_64(FILE *in, uint64_t* result) | |||
| 161 | { | |||
| 162 | if (fread(result, sizeof(*result), 1, in) == 1) { | |||
| 163 | return 1; | |||
| 164 | } else { | |||
| 165 | return 0; | |||
| 166 | } | |||
| 167 | } | |||
| 168 | ||||
| 169 | int | |||
| 170 | diff_read_32(FILE *in, uint32_t* result) | |||
| 171 | { | |||
| 172 | if (fread(result, sizeof(*result), 1, in) == 1) { | |||
| 173 | *result = ntohl(*result)(__uint32_t)(__builtin_constant_p(*result) ? (__uint32_t)(((__uint32_t )(*result) & 0xff) << 24 | ((__uint32_t)(*result) & 0xff00) << 8 | ((__uint32_t)(*result) & 0xff0000) >> 8 | ((__uint32_t)(*result) & 0xff000000) >> 24) : __swap32md (*result)); | |||
| 174 | return 1; | |||
| 175 | } else { | |||
| 176 | return 0; | |||
| 177 | } | |||
| 178 | } | |||
| 179 | ||||
| 180 | int | |||
| 181 | diff_read_8(FILE *in, uint8_t* result) | |||
| 182 | { | |||
| 183 | if (fread(result, sizeof(*result), 1, in) == 1) { | |||
| 184 | return 1; | |||
| 185 | } else { | |||
| 186 | return 0; | |||
| 187 | } | |||
| 188 | } | |||
| 189 | ||||
| 190 | int | |||
| 191 | diff_read_str(FILE* in, char* buf, size_t len) | |||
| 192 | { | |||
| 193 | uint32_t disklen; | |||
| 194 | if(!diff_read_32(in, &disklen)) | |||
| 195 | return 0; | |||
| 196 | if(disklen >= len) | |||
| 197 | return 0; | |||
| 198 | if(fread(buf, disklen, 1, in) != 1) | |||
| 199 | return 0; | |||
| 200 | buf[disklen] = 0; | |||
| 201 | return 1; | |||
| 202 | } | |||
| 203 | ||||
| 204 | static void | |||
| 205 | add_rdata_to_recyclebin(namedb_type* db, rr_type* rr) | |||
| 206 | { | |||
| 207 | /* add rdatas to recycle bin. */ | |||
| 208 | size_t i; | |||
| 209 | for(i=0; i<rr->rdata_count; i++) | |||
| 210 | { | |||
| 211 | if(!rdata_atom_is_domain(rr->type, i)) | |||
| 212 | region_recycle(db->region, rr->rdatas[i].data, | |||
| 213 | rdata_atom_size(rr->rdatas[i]) | |||
| 214 | + sizeof(uint16_t)); | |||
| 215 | } | |||
| 216 | region_recycle(db->region, rr->rdatas, | |||
| 217 | sizeof(rdata_atom_type)*rr->rdata_count); | |||
| 218 | } | |||
| 219 | ||||
| 220 | /* this routine determines if below a domain there exist names with | |||
| 221 | * data (is_existing) or no names below the domain have data. | |||
| 222 | */ | |||
| 223 | static int | |||
| 224 | has_data_below(domain_type* top) | |||
| 225 | { | |||
| 226 | domain_type* d = top; | |||
| 227 | assert(d != NULL)((void)0); | |||
| 228 | /* in the canonical ordering subdomains are after this name */ | |||
| 229 | d = domain_next(d); | |||
| 230 | while(d != NULL((void*)0) && domain_is_subdomain(d, top)) { | |||
| 231 | if(d->is_existing) | |||
| 232 | return 1; | |||
| 233 | d = domain_next(d); | |||
| 234 | } | |||
| 235 | return 0; | |||
| 236 | } | |||
| 237 | ||||
| 238 | /** check if domain with 0 rrsets has become empty (nonexist) */ | |||
| 239 | static domain_type* | |||
| 240 | rrset_zero_nonexist_check(domain_type* domain, domain_type* ce) | |||
| 241 | { | |||
| 242 | /* is the node now an empty node (completely deleted) */ | |||
| 243 | if(domain->rrsets == 0) { | |||
| 244 | /* if there is no data below it, it becomes non existing. | |||
| 245 | also empty nonterminals above it become nonexisting */ | |||
| 246 | /* check for data below this node. */ | |||
| 247 | if(!has_data_below(domain)) { | |||
| 248 | /* nonexist this domain and all parent empty nonterminals */ | |||
| 249 | domain_type* p = domain; | |||
| 250 | while(p != NULL((void*)0) && p->rrsets == 0) { | |||
| 251 | if(p == ce || has_data_below(p)) | |||
| 252 | return p; | |||
| 253 | p->is_existing = 0; | |||
| 254 | /* fixup wildcard child of parent */ | |||
| 255 | if(p->parent && | |||
| 256 | p->parent->wildcard_child_closest_match == p) | |||
| 257 | p->parent->wildcard_child_closest_match = domain_previous_existing_child(p); | |||
| 258 | p = p->parent; | |||
| 259 | } | |||
| 260 | } | |||
| 261 | } | |||
| 262 | return NULL((void*)0); | |||
| 263 | } | |||
| 264 | ||||
| 265 | /** remove rrset. Adjusts zone params. Does not remove domain */ | |||
| 266 | static void | |||
| 267 | rrset_delete(namedb_type* db, domain_type* domain, rrset_type* rrset) | |||
| 268 | { | |||
| 269 | int i; | |||
| 270 | /* find previous */ | |||
| 271 | rrset_type** pp = &domain->rrsets; | |||
| 272 | while(*pp && *pp != rrset) { | |||
| 273 | pp = &( (*pp)->next ); | |||
| 274 | } | |||
| 275 | if(!*pp) { | |||
| 276 | /* rrset does not exist for domain */ | |||
| 277 | return; | |||
| 278 | } | |||
| 279 | *pp = rrset->next; | |||
| 280 | ||||
| 281 | DEBUG(DEBUG_XFRD,2, (LOG_INFO, "delete rrset of %s type %s", | |||
| 282 | domain_to_string(domain), | |||
| 283 | rrtype_to_string(rrset_rrtype(rrset)))); | |||
| 284 | ||||
| 285 | /* is this a SOA rrset ? */ | |||
| 286 | if(rrset->zone->soa_rrset == rrset) { | |||
| 287 | rrset->zone->soa_rrset = 0; | |||
| 288 | } | |||
| 289 | if(rrset->zone->ns_rrset == rrset) { | |||
| 290 | rrset->zone->ns_rrset = 0; | |||
| 291 | } | |||
| 292 | if(domain == rrset->zone->apex && rrset_rrtype(rrset) == TYPE_RRSIG46) { | |||
| 293 | for (i = 0; i < rrset->rr_count; ++i) { | |||
| 294 | if(rr_rrsig_type_covered(&rrset->rrs[i])==TYPE_DNSKEY48) { | |||
| 295 | rrset->zone->is_secure = 0; | |||
| 296 | break; | |||
| 297 | } | |||
| 298 | } | |||
| 299 | } | |||
| 300 | /* recycle the memory space of the rrset */ | |||
| 301 | for (i = 0; i < rrset->rr_count; ++i) | |||
| 302 | add_rdata_to_recyclebin(db, &rrset->rrs[i]); | |||
| 303 | region_recycle(db->region, rrset->rrs, | |||
| 304 | sizeof(rr_type) * rrset->rr_count); | |||
| 305 | rrset->rr_count = 0; | |||
| 306 | region_recycle(db->region, rrset, sizeof(rrset_type)); | |||
| 307 | } | |||
| 308 | ||||
| 309 | static int | |||
| 310 | rdatas_equal(rdata_atom_type *a, rdata_atom_type *b, int num, uint16_t type, | |||
| 311 | int* rdnum, char** reason) | |||
| 312 | { | |||
| 313 | int k, start, end; | |||
| 314 | start = 0; | |||
| 315 | end = num; | |||
| 316 | /** | |||
| 317 | * SOA RDATA comparisons in XFR are more lenient, | |||
| 318 | * only serial rdata is checked. | |||
| 319 | **/ | |||
| 320 | if (type == TYPE_SOA6) { | |||
| 321 | start = 2; | |||
| 322 | end = 3; | |||
| 323 | } | |||
| 324 | for(k = start; k < end; k++) | |||
| 325 | { | |||
| 326 | if(rdata_atom_is_domain(type, k)) { | |||
| 327 | if(dname_compare(domain_dname(a[k].domain), | |||
| 328 | domain_dname(b[k].domain))!=0) { | |||
| 329 | *rdnum = k; | |||
| 330 | *reason = "dname data"; | |||
| 331 | return 0; | |||
| 332 | } | |||
| 333 | } else if(rdata_atom_is_literal_domain(type, k)) { | |||
| 334 | /* literal dname, but compare case insensitive */ | |||
| 335 | if(a[k].data[0] != b[k].data[0]) { | |||
| 336 | *rdnum = k; | |||
| 337 | *reason = "literal dname len"; | |||
| 338 | return 0; /* uncompressed len must be equal*/ | |||
| 339 | } | |||
| 340 | if(!dname_equal_nocase((uint8_t*)(a[k].data+1), | |||
| 341 | (uint8_t*)(b[k].data+1), a[k].data[0])) { | |||
| 342 | *rdnum = k; | |||
| 343 | *reason = "literal dname data"; | |||
| 344 | return 0; | |||
| 345 | } | |||
| 346 | } else { | |||
| 347 | /* check length */ | |||
| 348 | if(a[k].data[0] != b[k].data[0]) { | |||
| 349 | *rdnum = k; | |||
| 350 | *reason = "rdata len"; | |||
| 351 | return 0; | |||
| 352 | } | |||
| 353 | /* check data */ | |||
| 354 | if(memcmp(a[k].data+1, b[k].data+1, a[k].data[0])!=0) { | |||
| 355 | *rdnum = k; | |||
| 356 | *reason = "rdata data"; | |||
| 357 | return 0; | |||
| 358 | } | |||
| 359 | } | |||
| 360 | } | |||
| 361 | return 1; | |||
| 362 | } | |||
| 363 | ||||
| 364 | static void | |||
| 365 | debug_find_rr_num(rrset_type* rrset, uint16_t type, uint16_t klass, | |||
| 366 | rdata_atom_type *rdatas, ssize_t rdata_num) | |||
| 367 | { | |||
| 368 | int i, rd; | |||
| 369 | char* reason = ""; | |||
| 370 | ||||
| 371 | for(i=0; i < rrset->rr_count; ++i) { | |||
| 372 | if (rrset->rrs[i].type != type) { | |||
| 373 | log_msg(LOG_WARNING4, "diff: RR <%s, %s> does not match " | |||
| 374 | "RR num %d type %s", | |||
| 375 | dname_to_string(domain_dname(rrset->rrs[i].owner),0), | |||
| 376 | rrtype_to_string(type), i, | |||
| 377 | rrtype_to_string(rrset->rrs[i].type)); | |||
| 378 | } | |||
| 379 | if (rrset->rrs[i].klass != klass) { | |||
| 380 | log_msg(LOG_WARNING4, "diff: RR <%s, %s> class %d " | |||
| 381 | "does not match RR num %d class %d", | |||
| 382 | dname_to_string(domain_dname(rrset->rrs[i].owner),0), | |||
| 383 | rrtype_to_string(type), | |||
| 384 | klass, i, | |||
| 385 | rrset->rrs[i].klass); | |||
| 386 | } | |||
| 387 | if (rrset->rrs[i].rdata_count != rdata_num) { | |||
| 388 | log_msg(LOG_WARNING4, "diff: RR <%s, %s> rdlen %u " | |||
| 389 | "does not match RR num %d rdlen %d", | |||
| 390 | dname_to_string(domain_dname(rrset->rrs[i].owner),0), | |||
| 391 | rrtype_to_string(type), | |||
| 392 | (unsigned) rdata_num, i, | |||
| 393 | (unsigned) rrset->rrs[i].rdata_count); | |||
| 394 | } | |||
| 395 | if (!rdatas_equal(rdatas, rrset->rrs[i].rdatas, rdata_num, type, | |||
| 396 | &rd, &reason)) { | |||
| 397 | log_msg(LOG_WARNING4, "diff: RR <%s, %s> rdata element " | |||
| 398 | "%d differs from RR num %d rdata (%s)", | |||
| 399 | dname_to_string(domain_dname(rrset->rrs[i].owner),0), | |||
| 400 | rrtype_to_string(type), | |||
| 401 | rd, i, reason); | |||
| 402 | } | |||
| 403 | } | |||
| 404 | } | |||
| 405 | ||||
| 406 | static int | |||
| 407 | find_rr_num(rrset_type* rrset, uint16_t type, uint16_t klass, | |||
| 408 | rdata_atom_type *rdatas, ssize_t rdata_num, int add) | |||
| 409 | { | |||
| 410 | int i, rd; | |||
| 411 | char* reason; | |||
| 412 | ||||
| 413 | for(i=0; i < rrset->rr_count; ++i) { | |||
| 414 | if(rrset->rrs[i].type == type && | |||
| 415 | rrset->rrs[i].klass == klass && | |||
| 416 | rrset->rrs[i].rdata_count == rdata_num && | |||
| 417 | rdatas_equal(rdatas, rrset->rrs[i].rdatas, rdata_num, type, | |||
| 418 | &rd, &reason)) | |||
| 419 | { | |||
| 420 | return i; | |||
| 421 | } | |||
| 422 | } | |||
| 423 | /* this is odd. Log why rr cannot be found. */ | |||
| 424 | if (!add) { | |||
| 425 | debug_find_rr_num(rrset, type, klass, rdatas, rdata_num); | |||
| 426 | } | |||
| 427 | return -1; | |||
| 428 | } | |||
| 429 | ||||
| 430 | #ifdef NSEC3 | |||
| 431 | /* see if nsec3 deletion triggers need action */ | |||
| 432 | static void | |||
| 433 | nsec3_delete_rr_trigger(namedb_type* db, rr_type* rr, zone_type* zone, | |||
| 434 | udb_ptr* udbz) | |||
| 435 | { | |||
| 436 | /* the RR has not actually been deleted yet, so we can inspect it */ | |||
| 437 | if(!zone->nsec3_param) | |||
| 438 | return; | |||
| 439 | /* see if the domain was an NSEC3-domain in the chain, but no longer */ | |||
| 440 | if(rr->type == TYPE_NSEC350 && rr->owner->nsec3 && | |||
| 441 | rr->owner->nsec3->nsec3_node.key && | |||
| 442 | nsec3_rr_uses_params(rr, zone) && | |||
| 443 | nsec3_in_chain_count(rr->owner, zone) <= 1) { | |||
| 444 | domain_type* prev = nsec3_chain_find_prev(zone, rr->owner); | |||
| 445 | /* remove from prehash because no longer an NSEC3 domain */ | |||
| 446 | if(domain_is_prehash(db->domains, rr->owner)) | |||
| 447 | prehash_del(db->domains, rr->owner); | |||
| 448 | /* fixup the last in the zone */ | |||
| 449 | if(rr->owner == zone->nsec3_last) | |||
| 450 | zone->nsec3_last = prev; | |||
| 451 | /* unlink from the nsec3tree */ | |||
| 452 | zone_del_domain_in_hash_tree(zone->nsec3tree, | |||
| 453 | &rr->owner->nsec3->nsec3_node); | |||
| 454 | /* add previous NSEC3 to the prehash list */ | |||
| 455 | if(prev && prev != rr->owner) | |||
| 456 | prehash_add(db->domains, prev); | |||
| 457 | else nsec3_clear_precompile(db, zone); | |||
| 458 | /* this domain becomes ordinary data domain: done later */ | |||
| 459 | } | |||
| 460 | /* see if the rr was NSEC3PARAM that we were using */ | |||
| 461 | else if(rr->type == TYPE_NSEC3PARAM51 && rr == zone->nsec3_param) { | |||
| 462 | /* clear trees, wipe hashes, wipe precompile */ | |||
| 463 | nsec3_clear_precompile(db, zone); | |||
| 464 | /* pick up new nsec3param (from udb, or avoid deleted rr) */ | |||
| 465 | nsec3_find_zone_param(db, zone, udbz, rr, 0); | |||
| 466 | /* if no more NSEC3, done */ | |||
| 467 | if(!zone->nsec3_param) | |||
| 468 | return; | |||
| 469 | nsec3_precompile_newparam(db, zone); | |||
| 470 | } | |||
| 471 | } | |||
| 472 | ||||
| 473 | /* see if nsec3 prehash can be removed with new rrset content */ | |||
| 474 | static void | |||
| 475 | nsec3_rrsets_changed_remove_prehash(domain_type* domain, zone_type* zone) | |||
| 476 | { | |||
| 477 | /* deletion of rrset already done, we can check if conditions apply */ | |||
| 478 | /* see if the domain is no longer precompiled */ | |||
| 479 | /* it has a hash_node, but no longer fulfills conditions */ | |||
| 480 | if(nsec3_domain_part_of_zone(domain, zone) && domain->nsec3 && | |||
| 481 | domain->nsec3->hash_wc && | |||
| 482 | domain->nsec3->hash_wc->hash.node.key && | |||
| 483 | !nsec3_condition_hash(domain, zone)) { | |||
| 484 | /* remove precompile */ | |||
| 485 | domain->nsec3->nsec3_cover = NULL((void*)0); | |||
| 486 | domain->nsec3->nsec3_wcard_child_cover = NULL((void*)0); | |||
| 487 | domain->nsec3->nsec3_is_exact = 0; | |||
| 488 | /* remove it from the hash tree */ | |||
| 489 | zone_del_domain_in_hash_tree(zone->hashtree, | |||
| 490 | &domain->nsec3->hash_wc->hash.node); | |||
| 491 | zone_del_domain_in_hash_tree(zone->wchashtree, | |||
| 492 | &domain->nsec3->hash_wc->wc.node); | |||
| 493 | } | |||
| 494 | if(domain != zone->apex && domain->nsec3 && | |||
| 495 | domain->nsec3->ds_parent_hash && | |||
| 496 | domain->nsec3->ds_parent_hash->node.key && | |||
| 497 | (!domain->parent || nsec3_domain_part_of_zone(domain->parent, zone)) && | |||
| 498 | !nsec3_condition_dshash(domain, zone)) { | |||
| 499 | /* remove precompile */ | |||
| 500 | domain->nsec3->nsec3_ds_parent_cover = NULL((void*)0); | |||
| 501 | domain->nsec3->nsec3_ds_parent_is_exact = 0; | |||
| 502 | /* remove it from the hash tree */ | |||
| 503 | zone_del_domain_in_hash_tree(zone->dshashtree, | |||
| 504 | &domain->nsec3->ds_parent_hash->node); | |||
| 505 | } | |||
| 506 | } | |||
| 507 | ||||
| 508 | /* see if domain needs to get precompiled info */ | |||
| 509 | static void | |||
| 510 | nsec3_rrsets_changed_add_prehash(namedb_type* db, domain_type* domain, | |||
| 511 | zone_type* zone) | |||
| 512 | { | |||
| 513 | if(!zone->nsec3_param) | |||
| 514 | return; | |||
| 515 | if((!domain->nsec3 || !domain->nsec3->hash_wc | |||
| 516 | || !domain->nsec3->hash_wc->hash.node.key) | |||
| 517 | && nsec3_condition_hash(domain, zone)) { | |||
| 518 | region_type* tmpregion = region_create(xalloc, free); | |||
| 519 | nsec3_precompile_domain(db, domain, zone, tmpregion); | |||
| 520 | region_destroy(tmpregion); | |||
| 521 | } | |||
| 522 | if((!domain->nsec3 || !domain->nsec3->ds_parent_hash | |||
| 523 | || !domain->nsec3->ds_parent_hash->node.key) | |||
| 524 | && nsec3_condition_dshash(domain, zone)) { | |||
| 525 | nsec3_precompile_domain_ds(db, domain, zone); | |||
| 526 | } | |||
| 527 | } | |||
| 528 | ||||
| 529 | /* see if nsec3 rrset-deletion triggers need action */ | |||
| 530 | static void | |||
| 531 | nsec3_delete_rrset_trigger(namedb_type* db, domain_type* domain, | |||
| 532 | zone_type* zone, uint16_t type) | |||
| 533 | { | |||
| 534 | if(!zone->nsec3_param) | |||
| 535 | return; | |||
| 536 | nsec3_rrsets_changed_remove_prehash(domain, zone); | |||
| 537 | /* for type nsec3, or a delegation, the domain may have become a | |||
| 538 | * 'normal' domain with its remaining data now */ | |||
| 539 | if(type == TYPE_NSEC350 || type == TYPE_NS2 || type == TYPE_DS43) | |||
| 540 | nsec3_rrsets_changed_add_prehash(db, domain, zone); | |||
| 541 | /* for type DNAME or a delegation, obscured data may be revealed */ | |||
| 542 | if(type == TYPE_NS2 || type == TYPE_DS43 || type == TYPE_DNAME39) { | |||
| 543 | /* walk over subdomains and check them each */ | |||
| 544 | domain_type *d; | |||
| 545 | for(d=domain_next(domain); d && domain_is_subdomain(d, domain); | |||
| 546 | d=domain_next(d)) { | |||
| 547 | nsec3_rrsets_changed_add_prehash(db, d, zone); | |||
| 548 | } | |||
| 549 | } | |||
| 550 | } | |||
| 551 | ||||
| 552 | /* see if nsec3 addition triggers need action */ | |||
| 553 | static void | |||
| 554 | nsec3_add_rr_trigger(namedb_type* db, rr_type* rr, zone_type* zone, | |||
| 555 | udb_ptr* udbz) | |||
| 556 | { | |||
| 557 | /* the RR has been added in full, also to UDB (and thus NSEC3PARAM | |||
| 558 | * in the udb has been adjusted) */ | |||
| 559 | if(zone->nsec3_param && rr->type == TYPE_NSEC350 && | |||
| 560 | (!rr->owner->nsec3 || !rr->owner->nsec3->nsec3_node.key) | |||
| 561 | && nsec3_rr_uses_params(rr, zone)) { | |||
| 562 | if(!zone->nsec3_last) { | |||
| 563 | /* all nsec3s have previously been deleted, but | |||
| 564 | * we have nsec3 parameters, set it up again from | |||
| 565 | * being cleared. */ | |||
| 566 | nsec3_precompile_newparam(db, zone); | |||
| 567 | } | |||
| 568 | /* added NSEC3 into the chain */ | |||
| 569 | nsec3_precompile_nsec3rr(db, rr->owner, zone); | |||
| 570 | /* the domain has become an NSEC3-domain, if it was precompiled | |||
| 571 | * previously, remove that, neatly done in routine above */ | |||
| 572 | nsec3_rrsets_changed_remove_prehash(rr->owner, zone); | |||
| 573 | /* set this NSEC3 to prehash */ | |||
| 574 | prehash_add(db->domains, rr->owner); | |||
| 575 | } else if(!zone->nsec3_param && rr->type == TYPE_NSEC3PARAM51) { | |||
| 576 | /* see if this means NSEC3 chain can be used */ | |||
| 577 | nsec3_find_zone_param(db, zone, udbz, NULL((void*)0), 0); | |||
| 578 | if(!zone->nsec3_param) | |||
| 579 | return; | |||
| 580 | nsec3_zone_trees_create(db->region, zone); | |||
| 581 | nsec3_precompile_newparam(db, zone); | |||
| 582 | } | |||
| 583 | } | |||
| 584 | ||||
| 585 | /* see if nsec3 rrset-addition triggers need action */ | |||
| 586 | static void | |||
| 587 | nsec3_add_rrset_trigger(namedb_type* db, domain_type* domain, zone_type* zone, | |||
| 588 | uint16_t type) | |||
| 589 | { | |||
| 590 | /* the rrset has been added so we can inspect it */ | |||
| 591 | if(!zone->nsec3_param) | |||
| 592 | return; | |||
| 593 | /* because the rrset is added we can check conditions easily. | |||
| 594 | * check if domain needs to become precompiled now */ | |||
| 595 | nsec3_rrsets_changed_add_prehash(db, domain, zone); | |||
| 596 | /* if a delegation, it changes from normal name to unhashed referral */ | |||
| 597 | if(type == TYPE_NS2 || type == TYPE_DS43) { | |||
| 598 | nsec3_rrsets_changed_remove_prehash(domain, zone); | |||
| 599 | } | |||
| 600 | /* if delegation or DNAME added, then some RRs may get obscured */ | |||
| 601 | if(type == TYPE_NS2 || type == TYPE_DS43 || type == TYPE_DNAME39) { | |||
| 602 | /* walk over subdomains and check them each */ | |||
| 603 | domain_type *d; | |||
| 604 | for(d=domain_next(domain); d && domain_is_subdomain(d, domain); | |||
| 605 | d=domain_next(d)) { | |||
| 606 | nsec3_rrsets_changed_remove_prehash(d, zone); | |||
| 607 | } | |||
| 608 | } | |||
| 609 | } | |||
| 610 | #endif /* NSEC3 */ | |||
| 611 | ||||
| 612 | /* fixup usage lower for domain names in the rdata */ | |||
| 613 | static void | |||
| 614 | rr_lower_usage(namedb_type* db, rr_type* rr) | |||
| 615 | { | |||
| 616 | unsigned i; | |||
| 617 | for(i=0; i<rr->rdata_count; i++) { | |||
| 618 | if(rdata_atom_is_domain(rr->type, i)) { | |||
| 619 | assert(rdata_atom_domain(rr->rdatas[i])->usage > 0)((void)0); | |||
| 620 | rdata_atom_domain(rr->rdatas[i])->usage --; | |||
| 621 | if(rdata_atom_domain(rr->rdatas[i])->usage == 0) | |||
| 622 | domain_table_deldomain(db, | |||
| 623 | rdata_atom_domain(rr->rdatas[i])); | |||
| 624 | } | |||
| 625 | } | |||
| 626 | } | |||
| 627 | ||||
| 628 | static void | |||
| 629 | rrset_lower_usage(namedb_type* db, rrset_type* rrset) | |||
| 630 | { | |||
| 631 | unsigned i; | |||
| 632 | for(i=0; i<rrset->rr_count; i++) | |||
| 633 | rr_lower_usage(db, &rrset->rrs[i]); | |||
| 634 | } | |||
| 635 | ||||
| 636 | int | |||
| 637 | delete_RR(namedb_type* db, const dname_type* dname, | |||
| 638 | uint16_t type, uint16_t klass, | |||
| 639 | buffer_type* packet, size_t rdatalen, zone_type *zone, | |||
| 640 | region_type* temp_region, udb_ptr* udbz, int* softfail) | |||
| 641 | { | |||
| 642 | domain_type *domain; | |||
| 643 | rrset_type *rrset; | |||
| 644 | domain = domain_table_find(db->domains, dname); | |||
| 645 | if(!domain) { | |||
| 646 | log_msg(LOG_WARNING4, "diff: domain %s does not exist", | |||
| 647 | dname_to_string(dname,0)); | |||
| 648 | buffer_skip(packet, rdatalen); | |||
| 649 | *softfail = 1; | |||
| 650 | return 1; /* not fatal error */ | |||
| 651 | } | |||
| 652 | rrset = domain_find_rrset(domain, zone, type); | |||
| 653 | if(!rrset) { | |||
| 654 | log_msg(LOG_WARNING4, "diff: rrset %s does not exist", | |||
| 655 | dname_to_string(dname,0)); | |||
| 656 | buffer_skip(packet, rdatalen); | |||
| 657 | *softfail = 1; | |||
| 658 | return 1; /* not fatal error */ | |||
| 659 | } else { | |||
| 660 | /* find the RR in the rrset */ | |||
| 661 | domain_table_type *temptable; | |||
| 662 | rdata_atom_type *rdatas; | |||
| 663 | ssize_t rdata_num; | |||
| 664 | int rrnum; | |||
| 665 | temptable = domain_table_create(temp_region); | |||
| 666 | /* This will ensure that the dnames in rdata are | |||
| 667 | * normalized, conform RFC 4035, section 6.2 | |||
| 668 | */ | |||
| 669 | rdata_num = rdata_wireformat_to_rdata_atoms( | |||
| 670 | temp_region, temptable, type, rdatalen, packet, &rdatas); | |||
| 671 | if(rdata_num == -1) { | |||
| 672 | log_msg(LOG_ERR3, "diff: bad rdata for %s", | |||
| 673 | dname_to_string(dname,0)); | |||
| 674 | return 0; | |||
| 675 | } | |||
| 676 | rrnum = find_rr_num(rrset, type, klass, rdatas, rdata_num, 0); | |||
| 677 | if(rrnum == -1 && type == TYPE_SOA6 && domain == zone->apex | |||
| 678 | && rrset->rr_count != 0) | |||
| 679 | rrnum = 0; /* replace existing SOA if no match */ | |||
| 680 | if(rrnum == -1) { | |||
| 681 | log_msg(LOG_WARNING4, "diff: RR <%s, %s> does not exist", | |||
| 682 | dname_to_string(dname,0), rrtype_to_string(type)); | |||
| 683 | *softfail = 1; | |||
| 684 | return 1; /* not fatal error */ | |||
| 685 | } | |||
| 686 | /* delete the normalized RR from the udb */ | |||
| 687 | if(db->udb) | |||
| 688 | udb_del_rr(db->udb, udbz, &rrset->rrs[rrnum]); | |||
| 689 | #ifdef NSEC3 | |||
| 690 | /* process triggers for RR deletions */ | |||
| 691 | nsec3_delete_rr_trigger(db, &rrset->rrs[rrnum], zone, udbz); | |||
| 692 | #endif | |||
| 693 | /* lower usage (possibly deleting other domains, and thus | |||
| 694 | * invalidating the current RR's domain pointers) */ | |||
| 695 | rr_lower_usage(db, &rrset->rrs[rrnum]); | |||
| 696 | if(rrset->rr_count == 1) { | |||
| 697 | /* delete entire rrset */ | |||
| 698 | rrset_delete(db, domain, rrset); | |||
| 699 | /* check if domain is now nonexisting (or parents) */ | |||
| 700 | rrset_zero_nonexist_check(domain, NULL((void*)0)); | |||
| 701 | #ifdef NSEC3 | |||
| 702 | /* cleanup nsec3 */ | |||
| 703 | nsec3_delete_rrset_trigger(db, domain, zone, type); | |||
| 704 | #endif | |||
| 705 | /* see if the domain can be deleted (and inspect parents) */ | |||
| 706 | domain_table_deldomain(db, domain); | |||
| 707 | } else { | |||
| 708 | /* swap out the bad RR and decrease the count */ | |||
| 709 | rr_type* rrs_orig = rrset->rrs; | |||
| 710 | add_rdata_to_recyclebin(db, &rrset->rrs[rrnum]); | |||
| 711 | if(rrnum < rrset->rr_count-1) | |||
| 712 | rrset->rrs[rrnum] = rrset->rrs[rrset->rr_count-1]; | |||
| 713 | memset(&rrset->rrs[rrset->rr_count-1], 0, sizeof(rr_type)); | |||
| 714 | /* realloc the rrs array one smaller */ | |||
| 715 | rrset->rrs = region_alloc_array_init(db->region, rrs_orig, | |||
| 716 | (rrset->rr_count-1), sizeof(rr_type)); | |||
| 717 | if(!rrset->rrs) { | |||
| 718 | log_msg(LOG_ERR3, "out of memory, %s:%d", __FILE__"/usr/src/usr.sbin/nsd/difffile.c", __LINE__718); | |||
| 719 | exit(1); | |||
| 720 | } | |||
| 721 | region_recycle(db->region, rrs_orig, | |||
| 722 | sizeof(rr_type) * rrset->rr_count); | |||
| 723 | #ifdef NSEC3 | |||
| 724 | if(type == TYPE_NSEC3PARAM51 && zone->nsec3_param) { | |||
| 725 | /* fixup nsec3_param pointer to same RR */ | |||
| 726 | assert(zone->nsec3_param >= rrs_orig &&((void)0) | |||
| 727 | zone->nsec3_param <=((void)0) | |||
| 728 | rrs_orig+rrset->rr_count)((void)0); | |||
| 729 | /* last moved to rrnum, others at same index*/ | |||
| 730 | if(zone->nsec3_param == &rrs_orig[ | |||
| 731 | rrset->rr_count-1]) | |||
| 732 | zone->nsec3_param = &rrset->rrs[rrnum]; | |||
| 733 | else | |||
| 734 | zone->nsec3_param = | |||
| 735 | (void*)zone->nsec3_param | |||
| 736 | -(void*)rrs_orig + | |||
| 737 | (void*)rrset->rrs; | |||
| 738 | } | |||
| 739 | #endif /* NSEC3 */ | |||
| 740 | rrset->rr_count --; | |||
| 741 | #ifdef NSEC3 | |||
| 742 | /* for type nsec3, the domain may have become a | |||
| 743 | * 'normal' domain with its remaining data now */ | |||
| 744 | if(type == TYPE_NSEC350) | |||
| 745 | nsec3_rrsets_changed_add_prehash(db, domain, | |||
| 746 | zone); | |||
| 747 | #endif /* NSEC3 */ | |||
| 748 | } | |||
| 749 | } | |||
| 750 | return 1; | |||
| 751 | } | |||
| 752 | ||||
| 753 | int | |||
| 754 | add_RR(namedb_type* db, const dname_type* dname, | |||
| 755 | uint16_t type, uint16_t klass, uint32_t ttl, | |||
| 756 | buffer_type* packet, size_t rdatalen, zone_type *zone, udb_ptr* udbz, | |||
| 757 | int* softfail) | |||
| 758 | { | |||
| 759 | domain_type* domain; | |||
| 760 | rrset_type* rrset; | |||
| 761 | rdata_atom_type *rdatas; | |||
| 762 | rr_type *rrs_old; | |||
| 763 | ssize_t rdata_num; | |||
| 764 | int rrnum; | |||
| 765 | #ifdef NSEC3 | |||
| 766 | int rrset_added = 0; | |||
| 767 | #endif | |||
| 768 | domain = domain_table_find(db->domains, dname); | |||
| 769 | if(!domain) { | |||
| 770 | /* create the domain */ | |||
| 771 | domain = domain_table_insert(db->domains, dname); | |||
| 772 | } | |||
| 773 | rrset = domain_find_rrset(domain, zone, type); | |||
| 774 | if(!rrset) { | |||
| 775 | /* create the rrset */ | |||
| 776 | rrset = region_alloc(db->region, sizeof(rrset_type)); | |||
| 777 | if(!rrset) { | |||
| 778 | log_msg(LOG_ERR3, "out of memory, %s:%d", __FILE__"/usr/src/usr.sbin/nsd/difffile.c", __LINE__778); | |||
| 779 | exit(1); | |||
| 780 | } | |||
| 781 | rrset->zone = zone; | |||
| 782 | rrset->rrs = 0; | |||
| 783 | rrset->rr_count = 0; | |||
| 784 | domain_add_rrset(domain, rrset); | |||
| 785 | #ifdef NSEC3 | |||
| 786 | rrset_added = 1; | |||
| 787 | #endif | |||
| 788 | } | |||
| 789 | ||||
| 790 | /* dnames in rdata are normalized, conform RFC 4035, | |||
| 791 | * Section 6.2 | |||
| 792 | */ | |||
| 793 | rdata_num = rdata_wireformat_to_rdata_atoms( | |||
| 794 | db->region, db->domains, type, rdatalen, packet, &rdatas); | |||
| 795 | if(rdata_num == -1) { | |||
| 796 | log_msg(LOG_ERR3, "diff: bad rdata for %s", | |||
| 797 | dname_to_string(dname,0)); | |||
| 798 | return 0; | |||
| 799 | } | |||
| 800 | rrnum = find_rr_num(rrset, type, klass, rdatas, rdata_num, 1); | |||
| 801 | if(rrnum != -1) { | |||
| 802 | DEBUG(DEBUG_XFRD, 2, (LOG_ERR, "diff: RR <%s, %s> already exists", | |||
| 803 | dname_to_string(dname,0), rrtype_to_string(type))); | |||
| 804 | /* ignore already existing RR: lenient accepting of messages */ | |||
| 805 | *softfail = 1; | |||
| 806 | return 1; | |||
| 807 | } | |||
| 808 | if(rrset->rr_count == 65535) { | |||
| 809 | log_msg(LOG_ERR3, "diff: too many RRs at %s", | |||
| 810 | dname_to_string(dname,0)); | |||
| 811 | return 0; | |||
| 812 | } | |||
| 813 | ||||
| 814 | /* re-alloc the rrs and add the new */ | |||
| 815 | rrs_old = rrset->rrs; | |||
| 816 | rrset->rrs = region_alloc_array(db->region, | |||
| 817 | (rrset->rr_count+1), sizeof(rr_type)); | |||
| 818 | if(!rrset->rrs) { | |||
| 819 | log_msg(LOG_ERR3, "out of memory, %s:%d", __FILE__"/usr/src/usr.sbin/nsd/difffile.c", __LINE__819); | |||
| 820 | exit(1); | |||
| 821 | } | |||
| 822 | if(rrs_old) | |||
| 823 | memcpy(rrset->rrs, rrs_old, rrset->rr_count * sizeof(rr_type)); | |||
| 824 | region_recycle(db->region, rrs_old, sizeof(rr_type) * rrset->rr_count); | |||
| 825 | rrset->rr_count ++; | |||
| 826 | ||||
| 827 | rrset->rrs[rrset->rr_count - 1].owner = domain; | |||
| 828 | rrset->rrs[rrset->rr_count - 1].rdatas = rdatas; | |||
| 829 | rrset->rrs[rrset->rr_count - 1].ttl = ttl; | |||
| 830 | rrset->rrs[rrset->rr_count - 1].type = type; | |||
| 831 | rrset->rrs[rrset->rr_count - 1].klass = klass; | |||
| 832 | rrset->rrs[rrset->rr_count - 1].rdata_count = rdata_num; | |||
| 833 | ||||
| 834 | /* see if it is a SOA */ | |||
| 835 | if(domain == zone->apex) { | |||
| 836 | apex_rrset_checks(db, rrset, domain); | |||
| 837 | #ifdef NSEC3 | |||
| 838 | if(type == TYPE_NSEC3PARAM51 && zone->nsec3_param) { | |||
| 839 | /* the pointer just changed, fix it up to point | |||
| 840 | * to the same record */ | |||
| 841 | assert(zone->nsec3_param >= rrs_old &&((void)0) | |||
| 842 | zone->nsec3_param < rrs_old+rrset->rr_count)((void)0); | |||
| 843 | /* in this order to make sure no overflow/underflow*/ | |||
| 844 | zone->nsec3_param = (void*)zone->nsec3_param - | |||
| 845 | (void*)rrs_old + (void*)rrset->rrs; | |||
| 846 | } | |||
| 847 | #endif /* NSEC3 */ | |||
| 848 | } | |||
| 849 | ||||
| 850 | /* write the just-normalized RR to the udb */ | |||
| 851 | if(db->udb) { | |||
| 852 | if(!udb_write_rr(db->udb, udbz, &rrset->rrs[rrset->rr_count - 1])) { | |||
| 853 | log_msg(LOG_ERR3, "could not add RR to nsd.db, disk-space?"); | |||
| 854 | return 0; | |||
| 855 | } | |||
| 856 | } | |||
| 857 | #ifdef NSEC3 | |||
| 858 | if(rrset_added) { | |||
| 859 | domain_type* p = domain->parent; | |||
| 860 | nsec3_add_rrset_trigger(db, domain, zone, type); | |||
| 861 | /* go up and process (possibly created) empty nonterminals, | |||
| 862 | * until we hit the apex or root */ | |||
| 863 | while(p && p->rrsets == NULL((void*)0) && !p->is_apex) { | |||
| 864 | nsec3_rrsets_changed_add_prehash(db, p, zone); | |||
| 865 | p = p->parent; | |||
| 866 | } | |||
| 867 | } | |||
| 868 | nsec3_add_rr_trigger(db, &rrset->rrs[rrset->rr_count - 1], zone, udbz); | |||
| 869 | #endif /* NSEC3 */ | |||
| 870 | return 1; | |||
| 871 | } | |||
| 872 | ||||
| 873 | static zone_type* | |||
| 874 | find_or_create_zone(namedb_type* db, const dname_type* zone_name, | |||
| 875 | struct nsd_options* opt, const char* zstr, const char* patname) | |||
| 876 | { | |||
| 877 | zone_type* zone; | |||
| 878 | struct zone_options* zopt; | |||
| 879 | zone = namedb_find_zone(db, zone_name); | |||
| 880 | if(zone) { | |||
| 881 | return zone; | |||
| 882 | } | |||
| 883 | zopt = zone_options_find(opt, zone_name); | |||
| 884 | if(!zopt) { | |||
| 885 | /* if _implicit_ then insert as _part_of_config */ | |||
| 886 | if(strncmp(patname, PATTERN_IMPLICIT_MARKER"_implicit_", | |||
| 887 | strlen(PATTERN_IMPLICIT_MARKER"_implicit_")) == 0) { | |||
| 888 | zopt = zone_options_create(opt->region); | |||
| 889 | if(!zopt) return 0; | |||
| 890 | zopt->part_of_config = 1; | |||
| 891 | zopt->name = region_strdup(opt->region, zstr); | |||
| 892 | zopt->pattern = pattern_options_find(opt, patname); | |||
| 893 | if(!zopt->name || !zopt->pattern) return 0; | |||
| 894 | if(!nsd_options_insert_zone(opt, zopt)) { | |||
| 895 | log_msg(LOG_ERR3, "bad domain name or duplicate zone '%s' " | |||
| 896 | "pattern %s", zstr, patname); | |||
| 897 | } | |||
| 898 | } else { | |||
| 899 | /* create zone : presumably already added to zonelist | |||
| 900 | * by xfrd, who wrote the AXFR or IXFR to disk, so we only | |||
| 901 | * need to add it to our config. | |||
| 902 | * This process does not need linesize and offset zonelist */ | |||
| 903 | zopt = zone_list_zone_insert(opt, zstr, patname, 0, 0); | |||
| 904 | if(!zopt) | |||
| 905 | return 0; | |||
| 906 | } | |||
| 907 | } | |||
| 908 | zone = namedb_zone_create(db, zone_name, zopt); | |||
| 909 | return zone; | |||
| 910 | } | |||
| 911 | ||||
| 912 | void | |||
| 913 | delete_zone_rrs(namedb_type* db, zone_type* zone) | |||
| 914 | { | |||
| 915 | rrset_type *rrset; | |||
| 916 | domain_type *domain = zone->apex, *next; | |||
| 917 | int nonexist_check = 0; | |||
| 918 | /* go through entire tree below the zone apex (incl subzones) */ | |||
| 919 | while(domain && domain_is_subdomain(domain, zone->apex)) | |||
| 920 | { | |||
| 921 | DEBUG(DEBUG_XFRD,2, (LOG_INFO, "delete zone visit %s", | |||
| 922 | domain_to_string(domain))); | |||
| 923 | /* delete all rrsets of the zone */ | |||
| 924 | while((rrset = domain_find_any_rrset(domain, zone))) { | |||
| 925 | /* lower usage can delete other domains */ | |||
| 926 | rrset_lower_usage(db, rrset); | |||
| 927 | /* rrset del does not delete our domain(yet) */ | |||
| 928 | rrset_delete(db, domain, rrset); | |||
| 929 | /* no rrset_zero_nonexist_check, do that later */ | |||
| 930 | if(domain->rrsets == 0) | |||
| 931 | nonexist_check = 1; | |||
| 932 | } | |||
| 933 | /* the delete upcoming could delete parents, but nothing next | |||
| 934 | * or after the domain so store next ptr */ | |||
| 935 | next = domain_next(domain); | |||
| 936 | /* see if the domain can be deleted (and inspect parents) */ | |||
| 937 | domain_table_deldomain(db, domain); | |||
| 938 | domain = next; | |||
| 939 | } | |||
| 940 | ||||
| 941 | /* check if data deletions have created nonexisting domain entries, | |||
| 942 | * but after deleting domains so the checks are faster */ | |||
| 943 | if(nonexist_check) { | |||
| 944 | domain_type* ce = NULL((void*)0); /* for speeding up has_data_below */ | |||
| 945 | DEBUG(DEBUG_XFRD, 1, (LOG_INFO, "axfrdel: zero rrset check")); | |||
| 946 | domain = zone->apex; | |||
| 947 | while(domain && domain_is_subdomain(domain, zone->apex)) | |||
| 948 | { | |||
| 949 | /* the interesting domains should be existing==1 | |||
| 950 | * and rrsets==0, speeding up out processing of | |||
| 951 | * sub-zones, since we only spuriously check empty | |||
| 952 | * nonterminals */ | |||
| 953 | if(domain->is_existing) | |||
| 954 | ce = rrset_zero_nonexist_check(domain, ce); | |||
| 955 | domain = domain_next(domain); | |||
| 956 | } | |||
| 957 | } | |||
| 958 | ||||
| 959 | DEBUG(DEBUG_XFRD, 1, (LOG_INFO, "axfrdel: recyclebin holds %lu bytes", | |||
| 960 | (unsigned long) region_get_recycle_size(db->region))); | |||
| 961 | #ifndef NDEBUG | |||
| 962 | if(nsd_debug_level >= 2) | |||
| 963 | region_log_stats(db->region); | |||
| 964 | #endif | |||
| 965 | ||||
| 966 | assert(zone->soa_rrset == 0)((void)0); | |||
| 967 | /* keep zone->soa_nx_rrset alloced: it is reused */ | |||
| 968 | assert(zone->ns_rrset == 0)((void)0); | |||
| 969 | assert(zone->is_secure == 0)((void)0); | |||
| 970 | } | |||
| 971 | ||||
| 972 | /* return value 0: syntaxerror,badIXFR, 1:OK, 2:done_and_skip_it */ | |||
| 973 | static int | |||
| 974 | apply_ixfr(namedb_type* db, FILE *in, const char* zone, uint32_t serialno, | |||
| 975 | struct nsd_options* opt, uint32_t seq_nr, uint32_t seq_total, | |||
| 976 | int* is_axfr, int* delete_mode, int* rr_count, | |||
| 977 | udb_ptr* udbz, struct zone** zone_res, const char* patname, int* bytes, | |||
| 978 | int* softfail) | |||
| 979 | { | |||
| 980 | uint32_t msglen, checklen, pkttype; | |||
| 981 | int qcount, ancount, counter; | |||
| 982 | buffer_type* packet; | |||
| 983 | region_type* region; | |||
| 984 | int i; | |||
| 985 | uint16_t rrlen; | |||
| 986 | const dname_type *dname_zone, *dname; | |||
| 987 | zone_type* zone_db; | |||
| 988 | ||||
| 989 | /* note that errors could not really happen due to format of the | |||
| 990 | * packet since xfrd has checked all dnames and RRs before commit, | |||
| 991 | * this is why the errors are fatal (exit process), it must be | |||
| 992 | * something internal or a bad disk or something. */ | |||
| 993 | ||||
| 994 | /* read ixfr packet RRs and apply to in memory db */ | |||
| 995 | if(!diff_read_32(in, &pkttype) || pkttype != DIFF_PART_XXFR('X'<<24 | 'X'<<16 | 'F'<<8 | 'R')) { | |||
| 996 | log_msg(LOG_ERR3, "could not read type or wrong type"); | |||
| 997 | return 0; | |||
| 998 | } | |||
| 999 | ||||
| 1000 | if(!diff_read_32(in, &msglen)) { | |||
| 1001 | log_msg(LOG_ERR3, "could not read len"); | |||
| 1002 | return 0; | |||
| 1003 | } | |||
| 1004 | ||||
| 1005 | if(msglen < QHEADERSZ12) { | |||
| 1006 | log_msg(LOG_ERR3, "msg too short"); | |||
| 1007 | return 0; | |||
| 1008 | } | |||
| 1009 | ||||
| 1010 | region = region_create(xalloc, free); | |||
| 1011 | if(!region) { | |||
| 1012 | log_msg(LOG_ERR3, "out of memory"); | |||
| 1013 | return 0; | |||
| 1014 | } | |||
| 1015 | packet = buffer_create(region, QIOBUFSZ(65535 + (255 + sizeof(uint32_t) + 4*sizeof(uint16_t) + 65535 ))); | |||
| 1016 | if(msglen > QIOBUFSZ(65535 + (255 + sizeof(uint32_t) + 4*sizeof(uint16_t) + 65535 ))) { | |||
| 1017 | log_msg(LOG_ERR3, "msg too long"); | |||
| 1018 | region_destroy(region); | |||
| 1019 | return 0; | |||
| 1020 | } | |||
| 1021 | buffer_clear(packet); | |||
| 1022 | if(fread(buffer_begin(packet), msglen, 1, in) != 1) { | |||
| 1023 | log_msg(LOG_ERR3, "short fread: %s", strerror(errno(*__errno()))); | |||
| 1024 | region_destroy(region); | |||
| 1025 | return 0; | |||
| 1026 | } | |||
| 1027 | buffer_set_limit(packet, msglen); | |||
| 1028 | ||||
| 1029 | /* see if check on data fails: checks that we are not reading | |||
| 1030 | * random garbage */ | |||
| 1031 | if(!diff_read_32(in, &checklen) || checklen != msglen) { | |||
| 1032 | log_msg(LOG_ERR3, "transfer part has incorrect checkvalue"); | |||
| 1033 | return 0; | |||
| 1034 | } | |||
| 1035 | *bytes += msglen; | |||
| 1036 | ||||
| 1037 | dname_zone = dname_parse(region, zone); | |||
| 1038 | zone_db = find_or_create_zone(db, dname_zone, opt, zone, patname); | |||
| 1039 | if(!zone_db) { | |||
| 1040 | log_msg(LOG_ERR3, "could not create zone %s %s", zone, patname); | |||
| 1041 | region_destroy(region); | |||
| 1042 | return 0; | |||
| 1043 | } | |||
| 1044 | *zone_res = zone_db; | |||
| 1045 | ||||
| 1046 | /* only answer section is really used, question, additional and | |||
| 1047 | authority section RRs are skipped */ | |||
| 1048 | qcount = QDCOUNT(packet)(buffer_read_u16_at((packet), 4)); | |||
| 1049 | ancount = ANCOUNT(packet)(buffer_read_u16_at((packet), 6)); | |||
| 1050 | buffer_skip(packet, QHEADERSZ12); | |||
| 1051 | /* qcount should be 0 or 1 really, ancount limited by 64k packet */ | |||
| 1052 | if(qcount > 64 || ancount > 65530) { | |||
| 1053 | log_msg(LOG_ERR3, "RR count impossibly high"); | |||
| 1054 | region_destroy(region); | |||
| 1055 | return 0; | |||
| 1056 | } | |||
| 1057 | ||||
| 1058 | /* skip queries */ | |||
| 1059 | for(i=0; i<qcount; ++i) | |||
| 1060 | if(!packet_skip_rr(packet, 1)) { | |||
| 1061 | log_msg(LOG_ERR3, "bad RR in question section"); | |||
| 1062 | region_destroy(region); | |||
| 1063 | return 0; | |||
| 1064 | } | |||
| 1065 | ||||
| 1066 | DEBUG(DEBUG_XFRD,2, (LOG_INFO, "diff: started packet for zone %s", | |||
| 1067 | dname_to_string(dname_zone, 0))); | |||
| 1068 | /* first RR: check if SOA and correct zone & serialno */ | |||
| 1069 | if(*rr_count == 0) { | |||
| 1070 | DEBUG(DEBUG_XFRD,2, (LOG_INFO, "diff: %s parse first RR", | |||
| 1071 | dname_to_string(dname_zone, 0))); | |||
| 1072 | dname = dname_make_from_packet(region, packet, 1, 1); | |||
| 1073 | if(!dname) { | |||
| 1074 | log_msg(LOG_ERR3, "could not parse dname"); | |||
| 1075 | region_destroy(region); | |||
| 1076 | return 0; | |||
| 1077 | } | |||
| 1078 | if(dname_compare(dname_zone, dname) != 0) { | |||
| 1079 | log_msg(LOG_ERR3, "SOA dname %s not equal to zone", | |||
| 1080 | dname_to_string(dname,0)); | |||
| 1081 | log_msg(LOG_ERR3, "zone dname is %s", | |||
| 1082 | dname_to_string(dname_zone,0)); | |||
| 1083 | region_destroy(region); | |||
| 1084 | return 0; | |||
| 1085 | } | |||
| 1086 | if(!buffer_available(packet, 10)) { | |||
| 1087 | log_msg(LOG_ERR3, "bad SOA RR"); | |||
| 1088 | region_destroy(region); | |||
| 1089 | return 0; | |||
| 1090 | } | |||
| 1091 | if(buffer_read_u16(packet) != TYPE_SOA6 || | |||
| 1092 | buffer_read_u16(packet) != CLASS_IN1) { | |||
| 1093 | log_msg(LOG_ERR3, "first RR not SOA IN"); | |||
| 1094 | region_destroy(region); | |||
| 1095 | return 0; | |||
| 1096 | } | |||
| 1097 | buffer_skip(packet, sizeof(uint32_t)); /* ttl */ | |||
| 1098 | if(!buffer_available(packet, buffer_read_u16(packet)) || | |||
| 1099 | !packet_skip_dname(packet) /* skip prim_ns */ || | |||
| 1100 | !packet_skip_dname(packet) /* skip email */) { | |||
| 1101 | log_msg(LOG_ERR3, "bad SOA RR"); | |||
| 1102 | region_destroy(region); | |||
| 1103 | return 0; | |||
| 1104 | } | |||
| 1105 | if(buffer_read_u32(packet) != serialno) { | |||
| 1106 | buffer_skip(packet, -4); | |||
| 1107 | log_msg(LOG_ERR3, "SOA serial %u different from commit %u", | |||
| 1108 | (unsigned)buffer_read_u32(packet), (unsigned)serialno); | |||
| 1109 | region_destroy(region); | |||
| 1110 | return 0; | |||
| 1111 | } | |||
| 1112 | buffer_skip(packet, sizeof(uint32_t)*4); | |||
| 1113 | counter = 1; | |||
| 1114 | *rr_count = 1; | |||
| 1115 | *is_axfr = 0; | |||
| 1116 | *delete_mode = 0; | |||
| 1117 | DEBUG(DEBUG_XFRD,2, (LOG_INFO, "diff: %s start count %d, ax %d, delmode %d", | |||
| 1118 | dname_to_string(dname_zone, 0), *rr_count, *is_axfr, *delete_mode)); | |||
| 1119 | } | |||
| 1120 | else counter = 0; | |||
| 1121 | ||||
| 1122 | for(; counter < ancount; ++counter,++(*rr_count)) | |||
| 1123 | { | |||
| 1124 | uint16_t type, klass; | |||
| 1125 | uint32_t ttl; | |||
| 1126 | ||||
| 1127 | if(!(dname=dname_make_from_packet(region, packet, 1,1))) { | |||
| 1128 | log_msg(LOG_ERR3, "bad xfr RR dname %d", *rr_count); | |||
| 1129 | region_destroy(region); | |||
| 1130 | return 0; | |||
| 1131 | } | |||
| 1132 | if(!buffer_available(packet, 10)) { | |||
| 1133 | log_msg(LOG_ERR3, "bad xfr RR format %d", *rr_count); | |||
| 1134 | region_destroy(region); | |||
| 1135 | return 0; | |||
| 1136 | } | |||
| 1137 | type = buffer_read_u16(packet); | |||
| 1138 | klass = buffer_read_u16(packet); | |||
| 1139 | ttl = buffer_read_u32(packet); | |||
| 1140 | rrlen = buffer_read_u16(packet); | |||
| 1141 | if(!buffer_available(packet, rrlen)) { | |||
| 1142 | log_msg(LOG_ERR3, "bad xfr RR rdata %d, len %d have %d", | |||
| 1143 | *rr_count, rrlen, (int)buffer_remaining(packet)); | |||
| 1144 | region_destroy(region); | |||
| 1145 | return 0; | |||
| 1146 | } | |||
| 1147 | DEBUG(DEBUG_XFRD,2, (LOG_INFO, "diff: %s parsed count %d, ax %d, delmode %d", | |||
| 1148 | dname_to_string(dname_zone, 0), *rr_count, *is_axfr, *delete_mode)); | |||
| 1149 | ||||
| 1150 | if(*rr_count == 1 && type != TYPE_SOA6) { | |||
| 1151 | /* second RR: if not SOA: this is an AXFR; delete all zone contents */ | |||
| 1152 | #ifdef NSEC3 | |||
| 1153 | nsec3_clear_precompile(db, zone_db); | |||
| 1154 | zone_db->nsec3_param = NULL((void*)0); | |||
| 1155 | #endif | |||
| 1156 | delete_zone_rrs(db, zone_db); | |||
| 1157 | if(db->udb) | |||
| 1158 | udb_zone_clear(db->udb, udbz); | |||
| 1159 | /* add everything else (incl end SOA) */ | |||
| 1160 | *delete_mode = 0; | |||
| 1161 | *is_axfr = 1; | |||
| 1162 | DEBUG(DEBUG_XFRD,2, (LOG_INFO, "diff: %s sawAXFR count %d, ax %d, delmode %d", | |||
| 1163 | dname_to_string(dname_zone, 0), *rr_count, *is_axfr, *delete_mode)); | |||
| 1164 | } | |||
| 1165 | if(*rr_count == 1 && type == TYPE_SOA6) { | |||
| 1166 | /* if the serial no of the SOA equals the serialno, then AXFR */ | |||
| 1167 | size_t bufpos = buffer_position(packet); | |||
| 1168 | uint32_t thisserial; | |||
| 1169 | if(!packet_skip_dname(packet) || | |||
| 1170 | !packet_skip_dname(packet) || | |||
| 1171 | buffer_remaining(packet) < sizeof(uint32_t)*5) | |||
| 1172 | { | |||
| 1173 | log_msg(LOG_ERR3, "bad xfr SOA RR formerr."); | |||
| 1174 | region_destroy(region); | |||
| 1175 | return 0; | |||
| 1176 | } | |||
| 1177 | thisserial = buffer_read_u32(packet); | |||
| 1178 | if(thisserial == serialno) { | |||
| 1179 | /* AXFR */ | |||
| 1180 | #ifdef NSEC3 | |||
| 1181 | nsec3_clear_precompile(db, zone_db); | |||
| 1182 | zone_db->nsec3_param = NULL((void*)0); | |||
| 1183 | #endif | |||
| 1184 | delete_zone_rrs(db, zone_db); | |||
| 1185 | if(db->udb) | |||
| 1186 | udb_zone_clear(db->udb, udbz); | |||
| 1187 | *delete_mode = 0; | |||
| 1188 | *is_axfr = 1; | |||
| 1189 | } | |||
| 1190 | /* must have stuff in memory for a successful IXFR, | |||
| 1191 | * the serial number of the SOA has been checked | |||
| 1192 | * previously (by check_for_bad_serial) if it exists */ | |||
| 1193 | if(!*is_axfr && !domain_find_rrset(zone_db->apex, | |||
| 1194 | zone_db, TYPE_SOA6)) { | |||
| 1195 | log_msg(LOG_ERR3, "%s SOA serial %u is not " | |||
| 1196 | "in memory, skip IXFR", zone, serialno); | |||
| 1197 | region_destroy(region); | |||
| 1198 | /* break out and stop the IXFR, ignore it */ | |||
| 1199 | return 2; | |||
| 1200 | } | |||
| 1201 | buffer_set_position(packet, bufpos); | |||
| 1202 | } | |||
| 1203 | if(type == TYPE_SOA6 && !*is_axfr) { | |||
| 1204 | /* switch from delete-part to add-part and back again, | |||
| 1205 | just before soa - so it gets deleted and added too */ | |||
| 1206 | /* this means we switch to delete mode for the final SOA */ | |||
| 1207 | *delete_mode = !*delete_mode; | |||
| 1208 | DEBUG(DEBUG_XFRD,2, (LOG_INFO, "diff: %s IXFRswapdel count %d, ax %d, delmode %d", | |||
| 1209 | dname_to_string(dname_zone, 0), *rr_count, *is_axfr, *delete_mode)); | |||
| 1210 | } | |||
| 1211 | if(type == TYPE_TSIG250 || type == TYPE_OPT41) { | |||
| 1212 | /* ignore pseudo RRs */ | |||
| 1213 | buffer_skip(packet, rrlen); | |||
| 1214 | continue; | |||
| 1215 | } | |||
| 1216 | ||||
| 1217 | DEBUG(DEBUG_XFRD,2, (LOG_INFO, "xfr %s RR dname is %s type %s", | |||
| 1218 | *delete_mode?"del":"add", | |||
| 1219 | dname_to_string(dname,0), rrtype_to_string(type))); | |||
| 1220 | if(*delete_mode) { | |||
| 1221 | /* delete this rr */ | |||
| 1222 | if(!*is_axfr && type == TYPE_SOA6 && counter==ancount-1 | |||
| 1223 | && seq_nr == seq_total-1) { | |||
| 1224 | continue; /* do not delete final SOA RR for IXFR */ | |||
| 1225 | } | |||
| 1226 | if(!delete_RR(db, dname, type, klass, packet, | |||
| 1227 | rrlen, zone_db, region, udbz, softfail)) { | |||
| 1228 | region_destroy(region); | |||
| 1229 | return 0; | |||
| 1230 | } | |||
| 1231 | } | |||
| 1232 | else | |||
| 1233 | { | |||
| 1234 | /* add this rr */ | |||
| 1235 | if(!add_RR(db, dname, type, klass, ttl, packet, | |||
| 1236 | rrlen, zone_db, udbz, softfail)) { | |||
| 1237 | region_destroy(region); | |||
| 1238 | return 0; | |||
| 1239 | } | |||
| 1240 | } | |||
| 1241 | } | |||
| 1242 | region_destroy(region); | |||
| 1243 | return 1; | |||
| 1244 | } | |||
| 1245 | ||||
| 1246 | static int | |||
| 1247 | check_for_bad_serial(namedb_type* db, const char* zone_str, uint32_t old_serial) | |||
| 1248 | { | |||
| 1249 | /* see if serial OK with in-memory serial */ | |||
| 1250 | domain_type* domain; | |||
| 1251 | region_type* region = region_create(xalloc, free); | |||
| 1252 | const dname_type* zone_name = dname_parse(region, zone_str); | |||
| 1253 | zone_type* zone = 0; | |||
| 1254 | domain = domain_table_find(db->domains, zone_name); | |||
| 1255 | if(domain) | |||
| 1256 | zone = domain_find_zone(db, domain); | |||
| 1257 | if(zone
| |||
| 1258 | { | |||
| 1259 | uint32_t memserial; | |||
| 1260 | memcpy(&memserial, rdata_atom_data(zone->soa_rrset->rrs[0].rdatas[2]), | |||
| 1261 | sizeof(uint32_t)); | |||
| 1262 | if(old_serial != ntohl(memserial)(__uint32_t)(__builtin_constant_p(memserial) ? (__uint32_t)(( (__uint32_t)(memserial) & 0xff) << 24 | ((__uint32_t )(memserial) & 0xff00) << 8 | ((__uint32_t)(memserial ) & 0xff0000) >> 8 | ((__uint32_t)(memserial) & 0xff000000) >> 24) : __swap32md(memserial))) { | |||
| 1263 | region_destroy(region); | |||
| 1264 | return 1; | |||
| 1265 | } | |||
| 1266 | } | |||
| 1267 | region_destroy(region); | |||
| 1268 | return 0; | |||
| 1269 | } | |||
| 1270 | ||||
| 1271 | static int | |||
| 1272 | apply_ixfr_for_zone(nsd_type* nsd, zone_type* zonedb, FILE* in, | |||
| 1273 | struct nsd_options* opt, udb_base* taskudb, udb_ptr* last_task, | |||
| 1274 | uint32_t xfrfilenr) | |||
| 1275 | { | |||
| 1276 | char zone_buf[3072]; | |||
| 1277 | char log_buf[5120]; | |||
| 1278 | char patname_buf[2048]; | |||
| 1279 | ||||
| 1280 | uint32_t old_serial, new_serial, num_parts, type; | |||
| 1281 | uint64_t time_end_0, time_start_0; | |||
| 1282 | uint32_t time_end_1, time_start_1; | |||
| 1283 | uint8_t committed; | |||
| 1284 | uint32_t i; | |||
| 1285 | int num_bytes = 0; | |||
| 1286 | assert(zonedb)((void)0); | |||
| 1287 | ||||
| 1288 | /* read zone name and serial */ | |||
| 1289 | if(!diff_read_32(in, &type)) { | |||
| 1290 | log_msg(LOG_ERR3, "diff file too short"); | |||
| 1291 | return 0; | |||
| 1292 | } | |||
| 1293 | if(type != DIFF_PART_XFRF('X'<<24 | 'F'<<16 | 'R'<<8 | 'F')) { | |||
| 1294 | log_msg(LOG_ERR3, "xfr file has wrong format"); | |||
| 1295 | return 0; | |||
| 1296 | ||||
| 1297 | } | |||
| 1298 | /* committed and num_parts are first because they need to be | |||
| 1299 | * updated once the rest is written. The log buf is not certain | |||
| 1300 | * until its done, so at end of file. The patname is in case a | |||
| 1301 | * new zone is created, we know what the options-pattern is */ | |||
| 1302 | if(!diff_read_8(in, &committed) || | |||
| 1303 | !diff_read_32(in, &num_parts) || | |||
| 1304 | !diff_read_64(in, &time_end_0) || | |||
| 1305 | !diff_read_32(in, &time_end_1) || | |||
| 1306 | !diff_read_32(in, &old_serial) || | |||
| 1307 | !diff_read_32(in, &new_serial) || | |||
| 1308 | !diff_read_64(in, &time_start_0) || | |||
| 1309 | !diff_read_32(in, &time_start_1) || | |||
| 1310 | !diff_read_str(in, zone_buf, sizeof(zone_buf)) || | |||
| 1311 | !diff_read_str(in, patname_buf, sizeof(patname_buf))) { | |||
| 1312 | log_msg(LOG_ERR3, "diff file bad commit part"); | |||
| 1313 | return 0; | |||
| 1314 | } | |||
| 1315 | ||||
| 1316 | /* has been read in completely */ | |||
| 1317 | if(strcmp(zone_buf, domain_to_string(zonedb->apex)) != 0) { | |||
| 1318 | log_msg(LOG_ERR3, "file %s does not match task %s", | |||
| 1319 | zone_buf, domain_to_string(zonedb->apex)); | |||
| 1320 | return 0; | |||
| 1321 | } | |||
| 1322 | if(!committed) { | |||
| 1323 | log_msg(LOG_ERR3, "diff file %s was not committed", zone_buf); | |||
| 1324 | return 0; | |||
| 1325 | } | |||
| 1326 | if(num_parts == 0) { | |||
| 1327 | log_msg(LOG_ERR3, "diff file %s was not completed", zone_buf); | |||
| 1328 | return 0; | |||
| 1329 | } | |||
| 1330 | if(check_for_bad_serial(nsd->db, zone_buf, old_serial)) { | |||
| 1331 | DEBUG(DEBUG_XFRD,1, (LOG_ERR, | |||
| 1332 | "skipping diff file commit with bad serial")); | |||
| 1333 | return 1; | |||
| 1334 | } | |||
| 1335 | ||||
| 1336 | if(committed
| |||
| 1337 | { | |||
| 1338 | int is_axfr=0, delete_mode=0, rr_count=0, softfail=0; | |||
| 1339 | const dname_type* apex = domain_dname_const(zonedb->apex); | |||
| 1340 | udb_ptr z; | |||
| 1341 | ||||
| 1342 | DEBUG(DEBUG_XFRD,1, (LOG_INFO, "processing xfr: %s", zone_buf)); | |||
| 1343 | memset(&z, 0, sizeof(z)); /* if udb==NULL, have &z defined */ | |||
| 1344 | if(nsd->db->udb) { | |||
| 1345 | if(udb_base_get_userflags(nsd->db->udb) != 0) { | |||
| 1346 | log_msg(LOG_ERR3, "database corrupted, cannot update"); | |||
| 1347 | xfrd_unlink_xfrfile(nsd, xfrfilenr); | |||
| 1348 | exit(1); | |||
| 1349 | } | |||
| 1350 | /* all parts were checked by xfrd before commit */ | |||
| 1351 | if(!udb_zone_search(nsd->db->udb, &z, dname_name(apex), | |||
| 1352 | apex->name_size)) { | |||
| 1353 | /* create it */ | |||
| 1354 | if(!udb_zone_create(nsd->db->udb, &z, dname_name(apex), | |||
| 1355 | apex->name_size)) { | |||
| 1356 | /* out of disk space perhaps */ | |||
| 1357 | log_msg(LOG_ERR3, "could not udb_create_zone " | |||
| 1358 | "%s, disk space full?", zone_buf); | |||
| 1359 | return 0; | |||
| 1360 | } | |||
| 1361 | } | |||
| 1362 | /* set the udb dirty until we are finished applying changes */ | |||
| 1363 | udb_base_set_userflags(nsd->db->udb, 1); | |||
| 1364 | } | |||
| 1365 | /* read and apply all of the parts */ | |||
| 1366 | for(i=0; i
| |||
| 1367 | int ret; | |||
| 1368 | DEBUG(DEBUG_XFRD,2, (LOG_INFO, "processing xfr: apply part %d", (int)i)); | |||
| 1369 | ret = apply_ixfr(nsd->db, in, zone_buf, new_serial, opt, | |||
| 1370 | i, num_parts, &is_axfr, &delete_mode, | |||
| 1371 | &rr_count, (nsd->db->udb
| |||
| 1372 | patname_buf, &num_bytes, &softfail); | |||
| 1373 | assert(zonedb)((void)0); | |||
| 1374 | if(ret
| |||
| 1375 | log_msg(LOG_ERR3, "bad ixfr packet part %d in diff file for %s", (int)i, zone_buf); | |||
| 1376 | xfrd_unlink_xfrfile(nsd, xfrfilenr); | |||
| 1377 | /* the udb is still dirty, it is bad */ | |||
| 1378 | exit(1); | |||
| 1379 | } else if(ret
| |||
| 1380 | break; | |||
| 1381 | } | |||
| 1382 | } | |||
| 1383 | if(nsd->db->udb) | |||
| 1384 | udb_base_set_userflags(nsd->db->udb, 0); | |||
| 1385 | /* read the final log_str: but do not fail on it */ | |||
| 1386 | if(!diff_read_str(in, log_buf, sizeof(log_buf))) { | |||
| 1387 | log_msg(LOG_ERR3, "could not read log for transfer %s", | |||
| 1388 | zone_buf); | |||
| 1389 | snprintf(log_buf, sizeof(log_buf), "error reading log"); | |||
| 1390 | } | |||
| 1391 | #ifdef NSEC3 | |||
| 1392 | if(zonedb
| |||
| 1393 | #endif /* NSEC3 */ | |||
| 1394 | zonedb->is_changed = 1; | |||
| 1395 | if(nsd->db->udb) { | |||
| 1396 | assert(z.base)((void)0); | |||
| 1397 | ZONE(&z)((struct zone_d*)(((void*)((char*)(*((&z)->base)) + (( &z)->data)))))->is_changed = 1; | |||
| ||||
| 1398 | ZONE(&z)((struct zone_d*)(((void*)((char*)(*((&z)->base)) + (( &z)->data)))))->mtime = time_end_0; | |||
| 1399 | ZONE(&z)((struct zone_d*)(((void*)((char*)(*((&z)->base)) + (( &z)->data)))))->mtime_nsec = time_end_1*1000; | |||
| 1400 | udb_zone_set_log_str(nsd->db->udb, &z, log_buf); | |||
| 1401 | udb_zone_set_file_str(nsd->db->udb, &z, NULL((void*)0)); | |||
| 1402 | udb_ptr_unlink(&z, nsd->db->udb); | |||
| 1403 | } else { | |||
| 1404 | zonedb->mtime.tv_sec = time_end_0; | |||
| 1405 | zonedb->mtime.tv_nsec = time_end_1*1000; | |||
| 1406 | if(zonedb->logstr) | |||
| 1407 | region_recycle(nsd->db->region, zonedb->logstr, | |||
| 1408 | strlen(zonedb->logstr)+1); | |||
| 1409 | zonedb->logstr = region_strdup(nsd->db->region, log_buf); | |||
| 1410 | if(zonedb->filename) | |||
| 1411 | region_recycle(nsd->db->region, zonedb->filename, | |||
| 1412 | strlen(zonedb->filename)+1); | |||
| 1413 | zonedb->filename = NULL((void*)0); | |||
| 1414 | } | |||
| 1415 | if(softfail && taskudb && !is_axfr) { | |||
| 1416 | log_msg(LOG_ERR3, "Failed to apply IXFR cleanly " | |||
| 1417 | "(deletes nonexistent RRs, adds existing RRs). " | |||
| 1418 | "Zone %s contents is different from master, " | |||
| 1419 | "starting AXFR. Transfer %s", zone_buf, log_buf); | |||
| 1420 | /* add/del failures in IXFR, get an AXFR */ | |||
| 1421 | task_new_soainfo(taskudb, last_task, zonedb, 1); | |||
| 1422 | } else { | |||
| 1423 | if(taskudb) | |||
| 1424 | task_new_soainfo(taskudb, last_task, zonedb, 0); | |||
| 1425 | } | |||
| 1426 | ||||
| 1427 | if(1 <= verbosity) { | |||
| 1428 | double elapsed = (double)(time_end_0 - time_start_0)+ | |||
| 1429 | (double)((double)time_end_1 | |||
| 1430 | -(double)time_start_1) / 1000000.0; | |||
| 1431 | VERBOSITY(1, (LOG_INFO, "zone %s %s of %d bytes in %g seconds",do { if ((1) <= verbosity) { log_msg (6, "zone %s %s of %d bytes in %g seconds" , zone_buf, log_buf, num_bytes, elapsed) ; } } while (0) | |||
| 1432 | zone_buf, log_buf, num_bytes, elapsed))do { if ((1) <= verbosity) { log_msg (6, "zone %s %s of %d bytes in %g seconds" , zone_buf, log_buf, num_bytes, elapsed) ; } } while (0); | |||
| 1433 | } | |||
| 1434 | } | |||
| 1435 | else { | |||
| 1436 | DEBUG(DEBUG_XFRD,1, (LOG_INFO, "skipping xfr: %s", log_buf)); | |||
| 1437 | } | |||
| 1438 | return 1; | |||
| 1439 | } | |||
| 1440 | ||||
| 1441 | struct udb_base* task_file_create(const char* file) | |||
| 1442 | { | |||
| 1443 | return udb_base_create_new(file, &namedb_walkfunc, NULL((void*)0)); | |||
| 1444 | } | |||
| 1445 | ||||
| 1446 | static int | |||
| 1447 | task_create_new_elem(struct udb_base* udb, udb_ptr* last, udb_ptr* e, | |||
| 1448 | size_t sz, const dname_type* zname) | |||
| 1449 | { | |||
| 1450 | if(!udb_ptr_alloc_space(e, udb, udb_chunk_type_task, sz)) { | |||
| 1451 | return 0; | |||
| 1452 | } | |||
| 1453 | if(udb_ptr_is_null(last)) { | |||
| 1454 | udb_base_set_userdata(udb, e->data); | |||
| 1455 | } else { | |||
| 1456 | udb_rptr_set_ptr(&TASKLIST(last)((struct task_list_d*)(((void*)((char*)(*((last)->base)) + ((last)->data)))))->next, udb, e); | |||
| 1457 | } | |||
| 1458 | udb_ptr_set_ptr(last, udb, e); | |||
| 1459 | ||||
| 1460 | /* fill in tasklist item */ | |||
| 1461 | udb_rel_ptr_init(&TASKLIST(e)((struct task_list_d*)(((void*)((char*)(*((e)->base)) + (( e)->data)))))->next); | |||
| 1462 | TASKLIST(e)((struct task_list_d*)(((void*)((char*)(*((e)->base)) + (( e)->data)))))->size = sz; | |||
| 1463 | TASKLIST(e)((struct task_list_d*)(((void*)((char*)(*((e)->base)) + (( e)->data)))))->oldserial = 0; | |||
| 1464 | TASKLIST(e)((struct task_list_d*)(((void*)((char*)(*((e)->base)) + (( e)->data)))))->newserial = 0; | |||
| 1465 | TASKLIST(e)((struct task_list_d*)(((void*)((char*)(*((e)->base)) + (( e)->data)))))->yesno = 0; | |||
| 1466 | ||||
| 1467 | if(zname) { | |||
| 1468 | memmove(TASKLIST(e)((struct task_list_d*)(((void*)((char*)(*((e)->base)) + (( e)->data)))))->zname, zname, dname_total_size(zname)); | |||
| 1469 | } | |||
| 1470 | return 1; | |||
| 1471 | } | |||
| 1472 | ||||
| 1473 | void task_new_soainfo(struct udb_base* udb, udb_ptr* last, struct zone* z, | |||
| 1474 | int gone) | |||
| 1475 | { | |||
| 1476 | /* calculate size */ | |||
| 1477 | udb_ptr e; | |||
| 1478 | size_t sz; | |||
| 1479 | const dname_type* apex, *ns, *em; | |||
| 1480 | if(!z || !z->apex || !domain_dname(z->apex)) | |||
| 1481 | return; /* safety check */ | |||
| 1482 | ||||
| 1483 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "nsd: add soa info for zone %s", | |||
| 1484 | domain_to_string(z->apex))); | |||
| 1485 | apex = domain_dname(z->apex); | |||
| 1486 | sz = sizeof(struct task_list_d) + dname_total_size(apex); | |||
| 1487 | if(z->soa_rrset && !gone) { | |||
| 1488 | ns = domain_dname(rdata_atom_domain( | |||
| 1489 | z->soa_rrset->rrs[0].rdatas[0])); | |||
| 1490 | em = domain_dname(rdata_atom_domain( | |||
| 1491 | z->soa_rrset->rrs[0].rdatas[1])); | |||
| 1492 | sz += sizeof(uint32_t)*6 + sizeof(uint8_t)*2 | |||
| 1493 | + ns->name_size + em->name_size; | |||
| 1494 | } else { | |||
| 1495 | ns = 0; | |||
| 1496 | em = 0; | |||
| 1497 | } | |||
| 1498 | ||||
| 1499 | /* create new task_list item */ | |||
| 1500 | if(!task_create_new_elem(udb, last, &e, sz, apex)) { | |||
| 1501 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add SOAINFO"); | |||
| 1502 | return; | |||
| 1503 | } | |||
| 1504 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_soa_info; | |||
| 1505 | ||||
| 1506 | if(z->soa_rrset && !gone) { | |||
| 1507 | uint32_t ttl = htonl(z->soa_rrset->rrs[0].ttl)(__uint32_t)(__builtin_constant_p(z->soa_rrset->rrs[0]. ttl) ? (__uint32_t)(((__uint32_t)(z->soa_rrset->rrs[0]. ttl) & 0xff) << 24 | ((__uint32_t)(z->soa_rrset-> rrs[0].ttl) & 0xff00) << 8 | ((__uint32_t)(z->soa_rrset ->rrs[0].ttl) & 0xff0000) >> 8 | ((__uint32_t)(z ->soa_rrset->rrs[0].ttl) & 0xff000000) >> 24) : __swap32md(z->soa_rrset->rrs[0].ttl)); | |||
| 1508 | uint8_t* p = (uint8_t*)TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->zname; | |||
| 1509 | p += dname_total_size(apex); | |||
| 1510 | memmove(p, &ttl, sizeof(uint32_t)); | |||
| 1511 | p += sizeof(uint32_t); | |||
| 1512 | memmove(p, &ns->name_size, sizeof(uint8_t)); | |||
| 1513 | p += sizeof(uint8_t); | |||
| 1514 | memmove(p, dname_name(ns), ns->name_size); | |||
| 1515 | p += ns->name_size; | |||
| 1516 | memmove(p, &em->name_size, sizeof(uint8_t)); | |||
| 1517 | p += sizeof(uint8_t); | |||
| 1518 | memmove(p, dname_name(em), em->name_size); | |||
| 1519 | p += em->name_size; | |||
| 1520 | memmove(p, rdata_atom_data(z->soa_rrset->rrs[0].rdatas[2]), | |||
| 1521 | sizeof(uint32_t)); | |||
| 1522 | p += sizeof(uint32_t); | |||
| 1523 | memmove(p, rdata_atom_data(z->soa_rrset->rrs[0].rdatas[3]), | |||
| 1524 | sizeof(uint32_t)); | |||
| 1525 | p += sizeof(uint32_t); | |||
| 1526 | memmove(p, rdata_atom_data(z->soa_rrset->rrs[0].rdatas[4]), | |||
| 1527 | sizeof(uint32_t)); | |||
| 1528 | p += sizeof(uint32_t); | |||
| 1529 | memmove(p, rdata_atom_data(z->soa_rrset->rrs[0].rdatas[5]), | |||
| 1530 | sizeof(uint32_t)); | |||
| 1531 | p += sizeof(uint32_t); | |||
| 1532 | memmove(p, rdata_atom_data(z->soa_rrset->rrs[0].rdatas[6]), | |||
| 1533 | sizeof(uint32_t)); | |||
| 1534 | } | |||
| 1535 | udb_ptr_unlink(&e, udb); | |||
| 1536 | } | |||
| 1537 | ||||
| 1538 | void task_process_sync(struct udb_base* taskudb) | |||
| 1539 | { | |||
| 1540 | /* need to sync before other process uses the mmap? */ | |||
| 1541 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "task procsync %s size %d", | |||
| 1542 | taskudb->fname, (int)taskudb->base_size)); | |||
| 1543 | (void)taskudb; | |||
| 1544 | } | |||
| 1545 | ||||
| 1546 | void task_remap(struct udb_base* taskudb) | |||
| 1547 | { | |||
| 1548 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "task remap %s size %d", | |||
| 1549 | taskudb->fname, (int)taskudb->glob_data->fsize)); | |||
| 1550 | udb_base_remap_process(taskudb); | |||
| 1551 | } | |||
| 1552 | ||||
| 1553 | void task_clear(struct udb_base* taskudb) | |||
| 1554 | { | |||
| 1555 | udb_ptr t, n; | |||
| 1556 | udb_ptr_new(&t, taskudb, udb_base_get_userdata(taskudb)); | |||
| 1557 | udb_base_set_userdata(taskudb, 0); | |||
| 1558 | udb_ptr_init(&n, taskudb); | |||
| 1559 | while(!udb_ptr_is_null(&t)) { | |||
| 1560 | udb_ptr_set_rptr(&n, taskudb, &TASKLIST(&t)((struct task_list_d*)(((void*)((char*)(*((&t)->base)) + ((&t)->data)))))->next); | |||
| 1561 | udb_rptr_zero(&TASKLIST(&t)((struct task_list_d*)(((void*)((char*)(*((&t)->base)) + ((&t)->data)))))->next, taskudb); | |||
| 1562 | udb_ptr_free_space(&t, taskudb, TASKLIST(&t)((struct task_list_d*)(((void*)((char*)(*((&t)->base)) + ((&t)->data)))))->size); | |||
| 1563 | udb_ptr_set_ptr(&t, taskudb, &n); | |||
| 1564 | } | |||
| 1565 | udb_ptr_unlink(&t, taskudb); | |||
| 1566 | udb_ptr_unlink(&n, taskudb); | |||
| 1567 | } | |||
| 1568 | ||||
| 1569 | void task_new_expire(struct udb_base* udb, udb_ptr* last, | |||
| 1570 | const struct dname* z, int expired) | |||
| 1571 | { | |||
| 1572 | udb_ptr e; | |||
| 1573 | if(!z) return; | |||
| 1574 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "add expire info for zone %s", | |||
| 1575 | dname_to_string(z,NULL))); | |||
| 1576 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d)+ | |||
| 1577 | dname_total_size(z), z)) { | |||
| 1578 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add expire"); | |||
| 1579 | return; | |||
| 1580 | } | |||
| 1581 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_expire; | |||
| 1582 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->yesno = expired; | |||
| 1583 | udb_ptr_unlink(&e, udb); | |||
| 1584 | } | |||
| 1585 | ||||
| 1586 | void task_new_check_zonefiles(udb_base* udb, udb_ptr* last, | |||
| 1587 | const dname_type* zone) | |||
| 1588 | { | |||
| 1589 | udb_ptr e; | |||
| 1590 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "add task checkzonefiles")); | |||
| 1591 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d) + | |||
| 1592 | (zone?dname_total_size(zone):0), zone)) { | |||
| 1593 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add check_zones"); | |||
| 1594 | return; | |||
| 1595 | } | |||
| 1596 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_check_zonefiles; | |||
| 1597 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->yesno = (zone!=NULL((void*)0)); | |||
| 1598 | udb_ptr_unlink(&e, udb); | |||
| 1599 | } | |||
| 1600 | ||||
| 1601 | void task_new_write_zonefiles(udb_base* udb, udb_ptr* last, | |||
| 1602 | const dname_type* zone) | |||
| 1603 | { | |||
| 1604 | udb_ptr e; | |||
| 1605 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "add task writezonefiles")); | |||
| 1606 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d) + | |||
| 1607 | (zone?dname_total_size(zone):0), zone)) { | |||
| 1608 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add writezones"); | |||
| 1609 | return; | |||
| 1610 | } | |||
| 1611 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_write_zonefiles; | |||
| 1612 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->yesno = (zone!=NULL((void*)0)); | |||
| 1613 | udb_ptr_unlink(&e, udb); | |||
| 1614 | } | |||
| 1615 | ||||
| 1616 | void task_new_set_verbosity(udb_base* udb, udb_ptr* last, int v) | |||
| 1617 | { | |||
| 1618 | udb_ptr e; | |||
| 1619 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "add task set_verbosity")); | |||
| 1620 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d), | |||
| 1621 | NULL((void*)0))) { | |||
| 1622 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add set_v"); | |||
| 1623 | return; | |||
| 1624 | } | |||
| 1625 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_set_verbosity; | |||
| 1626 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->yesno = v; | |||
| 1627 | udb_ptr_unlink(&e, udb); | |||
| 1628 | } | |||
| 1629 | ||||
| 1630 | #ifdef BIND8_STATS | |||
| 1631 | void* task_new_stat_info(udb_base* udb, udb_ptr* last, struct nsdst* stat, | |||
| 1632 | size_t child_count) | |||
| 1633 | { | |||
| 1634 | void* p; | |||
| 1635 | udb_ptr e; | |||
| 1636 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "add task stat_info")); | |||
| 1637 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d)+ | |||
| 1638 | sizeof(*stat) + sizeof(stc_type)*child_count, NULL((void*)0))) { | |||
| 1639 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add stati"); | |||
| 1640 | return NULL((void*)0); | |||
| 1641 | } | |||
| 1642 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_stat_info; | |||
| 1643 | p = TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->zname; | |||
| 1644 | memcpy(p, stat, sizeof(*stat)); | |||
| 1645 | udb_ptr_unlink(&e, udb); | |||
| 1646 | return (char*)p + sizeof(*stat); | |||
| 1647 | } | |||
| 1648 | #endif /* BIND8_STATS */ | |||
| 1649 | ||||
| 1650 | void | |||
| 1651 | task_new_add_zone(udb_base* udb, udb_ptr* last, const char* zone, | |||
| 1652 | const char* pattern, unsigned zonestatid) | |||
| 1653 | { | |||
| 1654 | size_t zlen = strlen(zone); | |||
| 1655 | size_t plen = strlen(pattern); | |||
| 1656 | void *p; | |||
| 1657 | udb_ptr e; | |||
| 1658 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "add task addzone %s %s", zone, pattern)); | |||
| 1659 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d)+ | |||
| 1660 | zlen + 1 + plen + 1, NULL((void*)0))) { | |||
| 1661 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add addz"); | |||
| 1662 | return; | |||
| 1663 | } | |||
| 1664 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_add_zone; | |||
| 1665 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->yesno = zonestatid; | |||
| 1666 | p = TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->zname; | |||
| 1667 | memcpy(p, zone, zlen+1); | |||
| 1668 | memmove((char*)p+zlen+1, pattern, plen+1); | |||
| 1669 | udb_ptr_unlink(&e, udb); | |||
| 1670 | } | |||
| 1671 | ||||
| 1672 | void | |||
| 1673 | task_new_del_zone(udb_base* udb, udb_ptr* last, const dname_type* dname) | |||
| 1674 | { | |||
| 1675 | udb_ptr e; | |||
| 1676 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "add task delzone %s", dname_to_string(dname, 0))); | |||
| 1677 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d) | |||
| 1678 | +dname_total_size(dname), dname)) { | |||
| 1679 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add delz"); | |||
| 1680 | return; | |||
| 1681 | } | |||
| 1682 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_del_zone; | |||
| 1683 | udb_ptr_unlink(&e, udb); | |||
| 1684 | } | |||
| 1685 | ||||
| 1686 | void task_new_add_key(udb_base* udb, udb_ptr* last, struct key_options* key) | |||
| 1687 | { | |||
| 1688 | char* p; | |||
| 1689 | udb_ptr e; | |||
| 1690 | assert(key->name && key->algorithm && key->secret)((void)0); | |||
| 1691 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "add task addkey")); | |||
| 1692 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d) | |||
| 1693 | +strlen(key->name)+1+strlen(key->algorithm)+1+ | |||
| 1694 | strlen(key->secret)+1, NULL((void*)0))) { | |||
| 1695 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add addk"); | |||
| 1696 | return; | |||
| 1697 | } | |||
| 1698 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_add_key; | |||
| 1699 | p = (char*)TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->zname; | |||
| 1700 | memmove(p, key->name, strlen(key->name)+1); | |||
| 1701 | p+=strlen(key->name)+1; | |||
| 1702 | memmove(p, key->algorithm, strlen(key->algorithm)+1); | |||
| 1703 | p+=strlen(key->algorithm)+1; | |||
| 1704 | memmove(p, key->secret, strlen(key->secret)+1); | |||
| 1705 | udb_ptr_unlink(&e, udb); | |||
| 1706 | } | |||
| 1707 | ||||
| 1708 | void task_new_del_key(udb_base* udb, udb_ptr* last, const char* name) | |||
| 1709 | { | |||
| 1710 | char* p; | |||
| 1711 | udb_ptr e; | |||
| 1712 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "add task delkey")); | |||
| 1713 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d) | |||
| 1714 | +strlen(name)+1, NULL((void*)0))) { | |||
| 1715 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add delk"); | |||
| 1716 | return; | |||
| 1717 | } | |||
| 1718 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_del_key; | |||
| 1719 | p = (char*)TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->zname; | |||
| 1720 | memmove(p, name, strlen(name)+1); | |||
| 1721 | udb_ptr_unlink(&e, udb); | |||
| 1722 | } | |||
| 1723 | ||||
| 1724 | void task_new_add_cookie_secret(udb_base* udb, udb_ptr* last, | |||
| 1725 | const char* secret) { | |||
| 1726 | udb_ptr e; | |||
| 1727 | char* p; | |||
| 1728 | size_t const secret_size = strlen(secret) + 1; | |||
| 1729 | ||||
| 1730 | DEBUG(DEBUG_IPC, 1, (LOG_INFO, "add task add_cookie_secret")); | |||
| 1731 | ||||
| 1732 | if(!task_create_new_elem(udb, last, &e, | |||
| 1733 | sizeof(struct task_list_d) + secret_size, NULL((void*)0))) { | |||
| 1734 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add add_cookie_secret"); | |||
| 1735 | return; | |||
| 1736 | } | |||
| 1737 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_add_cookie_secret; | |||
| 1738 | p = (char*)TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->zname; | |||
| 1739 | memmove(p, secret, secret_size); | |||
| 1740 | udb_ptr_unlink(&e, udb); | |||
| 1741 | } | |||
| 1742 | ||||
| 1743 | void task_new_drop_cookie_secret(udb_base* udb, udb_ptr* last) { | |||
| 1744 | udb_ptr e; | |||
| 1745 | DEBUG(DEBUG_IPC, 1, (LOG_INFO, "add task drop_cookie_secret")); | |||
| 1746 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d), NULL((void*)0))) { | |||
| 1747 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add drop_cookie_secret"); | |||
| 1748 | return; | |||
| 1749 | } | |||
| 1750 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_drop_cookie_secret; | |||
| 1751 | udb_ptr_unlink(&e, udb); | |||
| 1752 | } | |||
| 1753 | ||||
| 1754 | void task_new_activate_cookie_secret(udb_base* udb, udb_ptr* last) { | |||
| 1755 | udb_ptr e; | |||
| 1756 | DEBUG(DEBUG_IPC, 1, (LOG_INFO, "add task activate_cookie_secret")); | |||
| 1757 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d), NULL((void*)0))) { | |||
| 1758 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add activate_cookie_secret"); | |||
| 1759 | return; | |||
| 1760 | } | |||
| 1761 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_activate_cookie_secret; | |||
| 1762 | udb_ptr_unlink(&e, udb); | |||
| 1763 | } | |||
| 1764 | ||||
| 1765 | void task_new_add_pattern(udb_base* udb, udb_ptr* last, | |||
| 1766 | struct pattern_options* p) | |||
| 1767 | { | |||
| 1768 | region_type* temp; | |||
| 1769 | buffer_type* buffer; | |||
| 1770 | udb_ptr e; | |||
| 1771 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "add task addpattern %s", p->pname)); | |||
| 1772 | temp = region_create(xalloc, free); | |||
| 1773 | buffer = buffer_create(temp, 4096); | |||
| 1774 | pattern_options_marshal(buffer, p); | |||
| 1775 | buffer_flip(buffer); | |||
| 1776 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d) | |||
| 1777 | + buffer_limit(buffer), NULL((void*)0))) { | |||
| 1778 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add addp"); | |||
| 1779 | region_destroy(temp); | |||
| 1780 | return; | |||
| 1781 | } | |||
| 1782 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_add_pattern; | |||
| 1783 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->yesno = buffer_limit(buffer); | |||
| 1784 | memmove(TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->zname, buffer_begin(buffer), | |||
| 1785 | buffer_limit(buffer)); | |||
| 1786 | udb_ptr_unlink(&e, udb); | |||
| 1787 | region_destroy(temp); | |||
| 1788 | } | |||
| 1789 | ||||
| 1790 | void task_new_del_pattern(udb_base* udb, udb_ptr* last, const char* name) | |||
| 1791 | { | |||
| 1792 | char* p; | |||
| 1793 | udb_ptr e; | |||
| 1794 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "add task delpattern %s", name)); | |||
| 1795 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d) | |||
| 1796 | +strlen(name)+1, NULL((void*)0))) { | |||
| 1797 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add delp"); | |||
| 1798 | return; | |||
| 1799 | } | |||
| 1800 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_del_pattern; | |||
| 1801 | p = (char*)TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->zname; | |||
| 1802 | memmove(p, name, strlen(name)+1); | |||
| 1803 | udb_ptr_unlink(&e, udb); | |||
| 1804 | } | |||
| 1805 | ||||
| 1806 | void task_new_opt_change(udb_base* udb, udb_ptr* last, struct nsd_options* opt) | |||
| 1807 | { | |||
| 1808 | udb_ptr e; | |||
| 1809 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "add task opt_change")); | |||
| 1810 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d), | |||
| 1811 | NULL((void*)0))) { | |||
| 1812 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add o_c"); | |||
| 1813 | return; | |||
| 1814 | } | |||
| 1815 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_opt_change; | |||
| 1816 | #ifdef RATELIMIT | |||
| 1817 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->oldserial = opt->rrl_ratelimit; | |||
| 1818 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->newserial = opt->rrl_whitelist_ratelimit; | |||
| 1819 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->yesno = (uint64_t) opt->rrl_slip; | |||
| 1820 | #else | |||
| 1821 | (void)opt; | |||
| 1822 | #endif | |||
| 1823 | udb_ptr_unlink(&e, udb); | |||
| 1824 | } | |||
| 1825 | ||||
| 1826 | void task_new_zonestat_inc(udb_base* udb, udb_ptr* last, unsigned sz) | |||
| 1827 | { | |||
| 1828 | udb_ptr e; | |||
| 1829 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "add task zonestat_inc")); | |||
| 1830 | if(sz == 0) | |||
| 1831 | return; /* no need to decrease to 0 */ | |||
| 1832 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d), | |||
| 1833 | NULL((void*)0))) { | |||
| 1834 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add z_i"); | |||
| 1835 | return; | |||
| 1836 | } | |||
| 1837 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_zonestat_inc; | |||
| 1838 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->oldserial = (uint32_t)sz; | |||
| 1839 | udb_ptr_unlink(&e, udb); | |||
| 1840 | } | |||
| 1841 | ||||
| 1842 | int | |||
| 1843 | task_new_apply_xfr(udb_base* udb, udb_ptr* last, const dname_type* dname, | |||
| 1844 | uint32_t old_serial, uint32_t new_serial, uint64_t filenumber) | |||
| 1845 | { | |||
| 1846 | udb_ptr e; | |||
| 1847 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "add task apply_xfr")); | |||
| 1848 | if(!task_create_new_elem(udb, last, &e, sizeof(struct task_list_d) | |||
| 1849 | +dname_total_size(dname), dname)) { | |||
| 1850 | log_msg(LOG_ERR3, "tasklist: out of space, cannot add applyxfr"); | |||
| 1851 | return 0; | |||
| 1852 | } | |||
| 1853 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->oldserial = old_serial; | |||
| 1854 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->newserial = new_serial; | |||
| 1855 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->yesno = filenumber; | |||
| 1856 | TASKLIST(&e)((struct task_list_d*)(((void*)((char*)(*((&e)->base)) + ((&e)->data)))))->task_type = task_apply_xfr; | |||
| 1857 | udb_ptr_unlink(&e, udb); | |||
| 1858 | return 1; | |||
| 1859 | } | |||
| 1860 | ||||
| 1861 | void | |||
| 1862 | task_process_expire(namedb_type* db, struct task_list_d* task) | |||
| 1863 | { | |||
| 1864 | uint8_t ok; | |||
| 1865 | zone_type* z = namedb_find_zone(db, task->zname); | |||
| 1866 | assert(task->task_type == task_expire)((void)0); | |||
| 1867 | if(!z) { | |||
| 1868 | DEBUG(DEBUG_IPC, 1, (LOG_WARNING, "zone %s %s but not in zonetree", | |||
| 1869 | dname_to_string(task->zname, NULL), | |||
| 1870 | task->yesno?"expired":"unexpired")); | |||
| 1871 | return; | |||
| 1872 | } | |||
| 1873 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "xfrd: expire task zone %s %s", | |||
| 1874 | dname_to_string(task->zname,0), | |||
| 1875 | task->yesno?"expired":"unexpired")); | |||
| 1876 | /* find zone, set expire flag */ | |||
| 1877 | ok = !task->yesno; | |||
| 1878 | /* only update zone->is_ok if needed to minimize copy-on-write | |||
| 1879 | * of memory pages shared after fork() */ | |||
| 1880 | if(ok && !z->is_ok) | |||
| 1881 | z->is_ok = 1; | |||
| 1882 | else if(!ok && z->is_ok) | |||
| 1883 | z->is_ok = 0; | |||
| 1884 | } | |||
| 1885 | ||||
| 1886 | static void | |||
| 1887 | task_process_set_verbosity(struct task_list_d* task) | |||
| 1888 | { | |||
| 1889 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "verbosity task %d", (int)task->yesno)); | |||
| 1890 | verbosity = task->yesno; | |||
| 1891 | } | |||
| 1892 | ||||
| 1893 | static void | |||
| 1894 | task_process_checkzones(struct nsd* nsd, udb_base* udb, udb_ptr* last_task, | |||
| 1895 | struct task_list_d* task) | |||
| 1896 | { | |||
| 1897 | /* on SIGHUP check if zone-text-files changed and if so, | |||
| 1898 | * reread. When from xfrd-reload, no need to fstat the files */ | |||
| 1899 | if(task->yesno) { | |||
| 1900 | struct zone_options* zo = zone_options_find(nsd->options, | |||
| 1901 | task->zname); | |||
| 1902 | if(zo) | |||
| 1903 | namedb_check_zonefile(nsd, udb, last_task, zo); | |||
| 1904 | } else { | |||
| 1905 | /* check all zones */ | |||
| 1906 | namedb_check_zonefiles(nsd, nsd->options, udb, last_task); | |||
| 1907 | } | |||
| 1908 | } | |||
| 1909 | ||||
| 1910 | static void | |||
| 1911 | task_process_writezones(struct nsd* nsd, struct task_list_d* task) | |||
| 1912 | { | |||
| 1913 | if(task->yesno) { | |||
| 1914 | struct zone_options* zo = zone_options_find(nsd->options, | |||
| 1915 | task->zname); | |||
| 1916 | if(zo) | |||
| 1917 | namedb_write_zonefile(nsd, zo); | |||
| 1918 | } else { | |||
| 1919 | namedb_write_zonefiles(nsd, nsd->options); | |||
| 1920 | } | |||
| 1921 | } | |||
| 1922 | ||||
| 1923 | static void | |||
| 1924 | task_process_add_zone(struct nsd* nsd, udb_base* udb, udb_ptr* last_task, | |||
| 1925 | struct task_list_d* task) | |||
| 1926 | { | |||
| 1927 | zone_type* z; | |||
| 1928 | const dname_type* zdname; | |||
| 1929 | const char* zname = (const char*)task->zname; | |||
| 1930 | const char* pname = zname + strlen(zname)+1; | |||
| 1931 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "addzone task %s %s", zname, pname)); | |||
| 1932 | zdname = dname_parse(nsd->db->region, zname); | |||
| 1933 | if(!zdname) { | |||
| 1934 | log_msg(LOG_ERR3, "can not parse zone name %s", zname); | |||
| 1935 | return; | |||
| 1936 | } | |||
| 1937 | /* create zone */ | |||
| 1938 | z = find_or_create_zone(nsd->db, zdname, nsd->options, zname, pname); | |||
| 1939 | if(!z) { | |||
| 1940 | region_recycle(nsd->db->region, (void*)zdname, | |||
| 1941 | dname_total_size(zdname)); | |||
| 1942 | log_msg(LOG_ERR3, "can not add zone %s %s", zname, pname); | |||
| 1943 | return; | |||
| 1944 | } | |||
| 1945 | z->zonestatid = (unsigned)task->yesno; | |||
| 1946 | /* if zone is empty, attempt to read the zonefile from disk (if any) */ | |||
| 1947 | if(!z->soa_rrset && z->opts->pattern->zonefile) { | |||
| 1948 | namedb_read_zonefile(nsd, z, udb, last_task); | |||
| 1949 | } | |||
| 1950 | } | |||
| 1951 | ||||
| 1952 | static void | |||
| 1953 | task_process_del_zone(struct nsd* nsd, struct task_list_d* task) | |||
| 1954 | { | |||
| 1955 | zone_type* zone; | |||
| 1956 | struct zone_options* zopt; | |||
| 1957 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "delzone task %s", dname_to_string( | |||
| 1958 | task->zname, NULL))); | |||
| 1959 | zone = namedb_find_zone(nsd->db, task->zname); | |||
| 1960 | if(!zone) | |||
| 1961 | return; | |||
| 1962 | ||||
| 1963 | #ifdef NSEC3 | |||
| 1964 | nsec3_clear_precompile(nsd->db, zone); | |||
| 1965 | zone->nsec3_param = NULL((void*)0); | |||
| 1966 | #endif | |||
| 1967 | delete_zone_rrs(nsd->db, zone); | |||
| 1968 | if(nsd->db->udb) { | |||
| 1969 | udb_ptr udbz; | |||
| 1970 | if(udb_zone_search(nsd->db->udb, &udbz, dname_name(task->zname), | |||
| 1971 | task->zname->name_size)) { | |||
| 1972 | udb_zone_delete(nsd->db->udb, &udbz); | |||
| 1973 | udb_ptr_unlink(&udbz, nsd->db->udb); | |||
| 1974 | } | |||
| 1975 | } | |||
| 1976 | ||||
| 1977 | /* remove from zonetree, apex, soa */ | |||
| 1978 | zopt = zone->opts; | |||
| 1979 | namedb_zone_delete(nsd->db, zone); | |||
| 1980 | /* remove from options (zone_list already edited by xfrd) */ | |||
| 1981 | zone_options_delete(nsd->options, zopt); | |||
| 1982 | } | |||
| 1983 | ||||
| 1984 | static void | |||
| 1985 | task_process_add_key(struct nsd* nsd, struct task_list_d* task) | |||
| 1986 | { | |||
| 1987 | struct key_options key; | |||
| 1988 | key.name = (char*)task->zname; | |||
| 1989 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "addkey task %s", key.name)); | |||
| 1990 | key.algorithm = key.name + strlen(key.name)+1; | |||
| 1991 | key.secret = key.algorithm + strlen(key.algorithm)+1; | |||
| 1992 | key_options_add_modify(nsd->options, &key); | |||
| 1993 | memset(key.secret, 0xdd, strlen(key.secret)); /* wipe secret */ | |||
| 1994 | } | |||
| 1995 | ||||
| 1996 | static void | |||
| 1997 | task_process_del_key(struct nsd* nsd, struct task_list_d* task) | |||
| 1998 | { | |||
| 1999 | char* name = (char*)task->zname; | |||
| 2000 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "delkey task %s", name)); | |||
| 2001 | /* this is reload and nothing is using the TSIG key right now */ | |||
| 2002 | key_options_remove(nsd->options, name); | |||
| 2003 | } | |||
| 2004 | ||||
| 2005 | static void | |||
| 2006 | task_process_add_cookie_secret(struct nsd* nsd, struct task_list_d* task) { | |||
| 2007 | uint8_t secret_tmp[NSD_COOKIE_SECRET_SIZE16]; | |||
| 2008 | ssize_t decoded_len; | |||
| 2009 | char* secret = (char*)task->zname; | |||
| 2010 | ||||
| 2011 | DEBUG(DEBUG_IPC, 1, (LOG_INFO, "add_cookie_secret task %s", secret)); | |||
| 2012 | ||||
| 2013 | if( strlen(secret) != 32 ) { | |||
| 2014 | log_msg(LOG_ERR3, "invalid cookie secret: %s", secret); | |||
| 2015 | explicit_bzero(secret, strlen(secret)); | |||
| 2016 | return; | |||
| 2017 | } | |||
| 2018 | ||||
| 2019 | decoded_len = hex_pton(secret, secret_tmp, NSD_COOKIE_SECRET_SIZE16); | |||
| 2020 | if( decoded_len != 16 ) { | |||
| 2021 | explicit_bzero(secret_tmp, NSD_COOKIE_SECRET_SIZE16); | |||
| 2022 | log_msg(LOG_ERR3, "unable to parse cookie secret: %s", secret); | |||
| 2023 | explicit_bzero(secret, strlen(secret)); | |||
| 2024 | return; | |||
| 2025 | } | |||
| 2026 | explicit_bzero(secret, strlen(secret)); | |||
| 2027 | add_cookie_secret(nsd, secret_tmp); | |||
| 2028 | explicit_bzero(secret_tmp, NSD_COOKIE_SECRET_SIZE16); | |||
| 2029 | } | |||
| 2030 | ||||
| 2031 | static void | |||
| 2032 | task_process_drop_cookie_secret(struct nsd* nsd, struct task_list_d* task) | |||
| 2033 | { | |||
| 2034 | (void)task; | |||
| 2035 | DEBUG(DEBUG_IPC, 1, (LOG_INFO, "drop_cookie_secret task")); | |||
| 2036 | if( nsd->cookie_count <= 1 ) { | |||
| 2037 | log_msg(LOG_ERR3, "can not drop the only active cookie secret"); | |||
| 2038 | return; | |||
| 2039 | } | |||
| 2040 | drop_cookie_secret(nsd); | |||
| 2041 | } | |||
| 2042 | ||||
| 2043 | static void | |||
| 2044 | task_process_activate_cookie_secret(struct nsd* nsd, struct task_list_d* task) | |||
| 2045 | { | |||
| 2046 | (void)task; | |||
| 2047 | DEBUG(DEBUG_IPC, 1, (LOG_INFO, "activate_cookie_secret task")); | |||
| 2048 | if( nsd->cookie_count <= 1 ) { | |||
| 2049 | log_msg(LOG_ERR3, "can not activate the only active cookie secret"); | |||
| 2050 | return; | |||
| 2051 | } | |||
| 2052 | activate_cookie_secret(nsd); | |||
| 2053 | } | |||
| 2054 | ||||
| 2055 | static void | |||
| 2056 | task_process_add_pattern(struct nsd* nsd, struct task_list_d* task) | |||
| 2057 | { | |||
| 2058 | region_type* temp = region_create(xalloc, free); | |||
| 2059 | buffer_type buffer; | |||
| 2060 | struct pattern_options *pat; | |||
| 2061 | buffer_create_from(&buffer, task->zname, task->yesno); | |||
| 2062 | pat = pattern_options_unmarshal(temp, &buffer); | |||
| 2063 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "addpattern task %s", pat->pname)); | |||
| 2064 | pattern_options_add_modify(nsd->options, pat); | |||
| 2065 | region_destroy(temp); | |||
| 2066 | } | |||
| 2067 | ||||
| 2068 | static void | |||
| 2069 | task_process_del_pattern(struct nsd* nsd, struct task_list_d* task) | |||
| 2070 | { | |||
| 2071 | char* name = (char*)task->zname; | |||
| 2072 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "delpattern task %s", name)); | |||
| 2073 | pattern_options_remove(nsd->options, name); | |||
| 2074 | } | |||
| 2075 | ||||
| 2076 | static void | |||
| 2077 | task_process_opt_change(struct nsd* nsd, struct task_list_d* task) | |||
| 2078 | { | |||
| 2079 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "optchange task")); | |||
| 2080 | #ifdef RATELIMIT | |||
| 2081 | nsd->options->rrl_ratelimit = task->oldserial; | |||
| 2082 | nsd->options->rrl_whitelist_ratelimit = task->newserial; | |||
| 2083 | nsd->options->rrl_slip = task->yesno; | |||
| 2084 | rrl_set_limit(nsd->options->rrl_ratelimit, nsd->options->rrl_whitelist_ratelimit, | |||
| 2085 | nsd->options->rrl_slip); | |||
| 2086 | #else | |||
| 2087 | (void)nsd; (void)task; | |||
| 2088 | #endif | |||
| 2089 | } | |||
| 2090 | ||||
| 2091 | #ifdef USE_ZONE_STATS | |||
| 2092 | static void | |||
| 2093 | task_process_zonestat_inc(struct nsd* nsd, udb_base* udb, udb_ptr *last_task, | |||
| 2094 | struct task_list_d* task) | |||
| 2095 | { | |||
| 2096 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "zonestat_inc task %u", (unsigned)task->oldserial)); | |||
| 2097 | nsd->zonestatdesired = (unsigned)task->oldserial; | |||
| 2098 | /* send echo to xfrd to increment on its end */ | |||
| 2099 | task_new_zonestat_inc(udb, last_task, nsd->zonestatdesired); | |||
| 2100 | } | |||
| 2101 | #endif | |||
| 2102 | ||||
| 2103 | static void | |||
| 2104 | task_process_apply_xfr(struct nsd* nsd, udb_base* udb, udb_ptr *last_task, | |||
| 2105 | udb_ptr* task) | |||
| 2106 | { | |||
| 2107 | /* we have to use an udb_ptr task here, because the apply_xfr procedure | |||
| 2108 | * appends soa_info which may remap and change the pointer. */ | |||
| 2109 | zone_type* zone; | |||
| 2110 | FILE* df; | |||
| 2111 | DEBUG(DEBUG_IPC,1, (LOG_INFO, "applyxfr task %s", dname_to_string( | |||
| 2112 | TASKLIST(task)->zname, NULL))); | |||
| 2113 | zone = namedb_find_zone(nsd->db, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))->zname); | |||
| 2114 | if(!zone) { | |||
| 2115 | /* assume the zone has been deleted and a zone transfer was | |||
| 2116 | * still waiting to be processed */ | |||
| 2117 | xfrd_unlink_xfrfile(nsd, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))->yesno); | |||
| 2118 | return; | |||
| 2119 | } | |||
| 2120 | /* apply the XFR */ | |||
| 2121 | /* oldserial, newserial, yesno is filenumber */ | |||
| 2122 | df = xfrd_open_xfrfile(nsd, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))->yesno, "r"); | |||
| 2123 | if(!df) { | |||
| 2124 | /* could not open file to update */ | |||
| 2125 | /* there is no reply to xfrd failed-update, | |||
| 2126 | * because xfrd has a scan for apply-failures. */ | |||
| 2127 | xfrd_unlink_xfrfile(nsd, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))->yesno); | |||
| 2128 | return; | |||
| 2129 | } | |||
| 2130 | /* read and apply zone transfer */ | |||
| 2131 | if(!apply_ixfr_for_zone(nsd, zone, df, nsd->options, udb, | |||
| 2132 | last_task, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))->yesno)) { | |||
| 2133 | /* there is no reply to xfrd failed-update, | |||
| 2134 | * because xfrd has a scan for apply-failures. */ | |||
| 2135 | } | |||
| 2136 | ||||
| 2137 | fclose(df); | |||
| 2138 | xfrd_unlink_xfrfile(nsd, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))->yesno); | |||
| 2139 | } | |||
| 2140 | ||||
| 2141 | ||||
| 2142 | void task_process_in_reload(struct nsd* nsd, udb_base* udb, udb_ptr *last_task, | |||
| 2143 | udb_ptr* task) | |||
| 2144 | { | |||
| 2145 | switch(TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))->task_type) { | |||
| ||||
| 2146 | case task_expire: | |||
| 2147 | task_process_expire(nsd->db, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))); | |||
| 2148 | break; | |||
| 2149 | case task_check_zonefiles: | |||
| 2150 | task_process_checkzones(nsd, udb, last_task, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))); | |||
| 2151 | break; | |||
| 2152 | case task_write_zonefiles: | |||
| 2153 | task_process_writezones(nsd, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))); | |||
| 2154 | break; | |||
| 2155 | case task_set_verbosity: | |||
| 2156 | task_process_set_verbosity(TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))); | |||
| 2157 | break; | |||
| 2158 | case task_add_zone: | |||
| 2159 | task_process_add_zone(nsd, udb, last_task, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))); | |||
| 2160 | break; | |||
| 2161 | case task_del_zone: | |||
| 2162 | task_process_del_zone(nsd, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))); | |||
| 2163 | break; | |||
| 2164 | case task_add_key: | |||
| 2165 | task_process_add_key(nsd, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))); | |||
| 2166 | break; | |||
| 2167 | case task_del_key: | |||
| 2168 | task_process_del_key(nsd, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))); | |||
| 2169 | break; | |||
| 2170 | case task_add_pattern: | |||
| 2171 | task_process_add_pattern(nsd, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))); | |||
| 2172 | break; | |||
| 2173 | case task_del_pattern: | |||
| 2174 | task_process_del_pattern(nsd, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))); | |||
| 2175 | break; | |||
| 2176 | case task_opt_change: | |||
| 2177 | task_process_opt_change(nsd, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))); | |||
| 2178 | break; | |||
| 2179 | #ifdef USE_ZONE_STATS | |||
| 2180 | case task_zonestat_inc: | |||
| 2181 | task_process_zonestat_inc(nsd, udb, last_task, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))); | |||
| 2182 | break; | |||
| 2183 | #endif | |||
| 2184 | case task_apply_xfr: | |||
| 2185 | task_process_apply_xfr(nsd, udb, last_task, task); | |||
| 2186 | break; | |||
| 2187 | case task_add_cookie_secret: | |||
| 2188 | task_process_add_cookie_secret(nsd, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))); | |||
| 2189 | break; | |||
| 2190 | case task_drop_cookie_secret: | |||
| 2191 | task_process_drop_cookie_secret(nsd, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))); | |||
| 2192 | break; | |||
| 2193 | case task_activate_cookie_secret: | |||
| 2194 | task_process_activate_cookie_secret(nsd, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))); | |||
| 2195 | break; | |||
| 2196 | default: | |||
| 2197 | log_msg(LOG_WARNING4, "unhandled task in reload type %d", | |||
| 2198 | (int)TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))->task_type); | |||
| 2199 | break; | |||
| 2200 | } | |||
| 2201 | udb_ptr_free_space(task, udb, TASKLIST(task)((struct task_list_d*)(((void*)((char*)(*((task)->base)) + ((task)->data)))))->size); | |||
| 2202 | } |