2 * daemon/daemon.c - collection of workers that handles requests.
4 * Copyright (c) 2007, NLnet Labs. All rights reserved.
6 * This software is open source.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
15 * Redistributions in binary form must reproduce the above copyright notice,
16 * this list of conditions and the following disclaimer in the documentation
17 * and/or other materials provided with the distribution.
19 * Neither the name of the NLNET LABS nor the names of its contributors may
20 * be used to endorse or promote products derived from this software without
21 * specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27 * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
39 * The daemon consists of global settings and a number of workers.
43 #ifdef HAVE_OPENSSL_ERR_H
44 #include <openssl/err.h>
47 #ifdef HAVE_OPENSSL_RAND_H
48 #include <openssl/rand.h>
51 #ifdef HAVE_OPENSSL_CONF_H
52 #include <openssl/conf.h>
55 #ifdef HAVE_OPENSSL_ENGINE_H
56 #include <openssl/engine.h>
69 #include "daemon/daemon.h"
70 #include "daemon/worker.h"
71 #include "daemon/remote.h"
72 #include "daemon/acl_list.h"
74 #include "util/config_file.h"
75 #include "util/data/msgreply.h"
76 #include "util/storage/lookup3.h"
77 #include "util/storage/slabhash.h"
78 #include "services/listen_dnsport.h"
79 #include "services/cache/rrset.h"
80 #include "services/cache/infra.h"
81 #include "services/localzone.h"
82 #include "services/modstack.h"
83 #include "util/module.h"
84 #include "util/random.h"
85 #include "util/tube.h"
86 #include "util/net_help.h"
87 #include "ldns/keyraw.h"
90 /** How many quit requests happened. */
91 static int sig_record_quit = 0;
92 /** How many reload requests happened. */
93 static int sig_record_reload = 0;
95 #if HAVE_DECL_SSL_COMP_GET_COMPRESSION_METHODS
96 /** cleaner ssl memory freeup */
97 static void* comp_meth = NULL;
99 #ifdef LEX_HAS_YYLEX_DESTROY
100 /** remove buffers for parsing and init */
101 int ub_c_lex_destroy(void);
104 /** used when no other sighandling happens, so we don't die
105 * when multiple signals in quick succession are sent to us.
106 * @param sig: signal number.
107 * @return signal handler return type (void or int).
109 static RETSIGTYPE record_sigh(int sig)
111 #ifdef LIBEVENT_SIGNAL_PROBLEM
112 /* cannot log, verbose here because locks may be held */
113 /* quit on signal, no cleanup and statistics,
114 because installed libevent version is not threadsafe */
139 /* ignoring signal */
145 * Signal handling during the time when netevent is disabled.
146 * Stores signals to replay later.
149 signal_handling_record(void)
151 if( signal(SIGTERM, record_sigh) == SIG_ERR ||
153 signal(SIGQUIT, record_sigh) == SIG_ERR ||
156 signal(SIGBREAK, record_sigh) == SIG_ERR ||
159 signal(SIGHUP, record_sigh) == SIG_ERR ||
162 signal(SIGPIPE, SIG_IGN) == SIG_ERR ||
164 signal(SIGINT, record_sigh) == SIG_ERR
166 log_err("install sighandler: %s", strerror(errno));
170 * Replay old signals.
171 * @param wrk: worker that handles signals.
174 signal_handling_playback(struct worker* wrk)
177 if(sig_record_reload)
178 worker_sighandler(SIGHUP, wrk);
181 worker_sighandler(SIGTERM, wrk);
183 sig_record_reload = 0;
189 struct daemon* daemon = (struct daemon*)calloc(1,
190 sizeof(struct daemon));
198 r = WSAStartup(MAKEWORD(2,2), &wsa_data);
200 fatal_exit("could not init winsock. WSAStartup: %s",
203 #endif /* USE_WINSOCK */
204 signal_handling_record();
207 ERR_load_crypto_strings();
208 ERR_load_SSL_strings();
209 # ifdef HAVE_OPENSSL_CONFIG
210 OPENSSL_config("unbound");
213 (void)sldns_key_EVP_load_gost_id();
215 OpenSSL_add_all_algorithms();
216 # if HAVE_DECL_SSL_COMP_GET_COMPRESSION_METHODS
217 /* grab the COMP method ptr because openssl leaks it */
218 comp_meth = (void*)SSL_COMP_get_compression_methods();
220 (void)SSL_library_init();
221 # if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED)
222 if(!ub_openssl_lock_init())
223 fatal_exit("could not init openssl locks");
225 #elif defined(HAVE_NSS)
226 if(NSS_NoDB_Init(NULL) != SECSuccess)
227 fatal_exit("could not init NSS");
228 #endif /* HAVE_SSL or HAVE_NSS */
230 /* init timezone info while we are not chrooted yet */
233 /* open /dev/random if needed */
234 ub_systemseed((unsigned)time(NULL)^(unsigned)getpid()^0xe67);
235 daemon->need_to_exit = 0;
236 modstack_init(&daemon->mods);
237 if(!(daemon->env = (struct module_env*)calloc(1,
238 sizeof(*daemon->env)))) {
242 alloc_init(&daemon->superalloc, NULL, 0);
243 daemon->acl = acl_list_create();
249 if(gettimeofday(&daemon->time_boot, NULL) < 0)
250 log_err("gettimeofday: %s", strerror(errno));
251 daemon->time_last_stat = daemon->time_boot;
256 daemon_open_shared_ports(struct daemon* daemon)
259 if(daemon->cfg->port != daemon->listening_port) {
261 struct listen_port* p0;
262 daemon->reuseport = 0;
263 /* free and close old ports */
264 if(daemon->ports != NULL) {
265 for(i=0; i<daemon->num_ports; i++)
266 listening_ports_free(daemon->ports[i]);
268 daemon->ports = NULL;
270 /* see if we want to reuseport */
272 if(daemon->cfg->so_reuseport && daemon->cfg->num_threads > 0)
273 daemon->reuseport = 1;
275 /* try to use reuseport */
276 p0 = listening_ports_open(daemon->cfg, &daemon->reuseport);
278 listening_ports_free(p0);
281 if(daemon->reuseport) {
282 /* reuseport was successful, allocate for it */
283 daemon->num_ports = (size_t)daemon->cfg->num_threads;
285 /* do the normal, singleportslist thing,
286 * reuseport not enabled or did not work */
287 daemon->num_ports = 1;
289 if(!(daemon->ports = (struct listen_port**)calloc(
290 daemon->num_ports, sizeof(*daemon->ports)))) {
291 listening_ports_free(p0);
294 daemon->ports[0] = p0;
295 if(daemon->reuseport) {
296 /* continue to use reuseport */
297 for(i=1; i<daemon->num_ports; i++) {
298 if(!(daemon->ports[i]=
299 listening_ports_open(daemon->cfg,
301 || !daemon->reuseport ) {
302 for(i=0; i<daemon->num_ports; i++)
303 listening_ports_free(daemon->ports[i]);
305 daemon->ports = NULL;
310 daemon->listening_port = daemon->cfg->port;
312 if(!daemon->cfg->remote_control_enable && daemon->rc_port) {
313 listening_ports_free(daemon->rc_ports);
314 daemon->rc_ports = NULL;
317 if(daemon->cfg->remote_control_enable &&
318 daemon->cfg->control_port != daemon->rc_port) {
319 listening_ports_free(daemon->rc_ports);
320 if(!(daemon->rc_ports=daemon_remote_open_ports(daemon->cfg)))
322 daemon->rc_port = daemon->cfg->control_port;
328 * Setup modules. setup module stack.
329 * @param daemon: the daemon
331 static void daemon_setup_modules(struct daemon* daemon)
333 daemon->env->cfg = daemon->cfg;
334 daemon->env->alloc = &daemon->superalloc;
335 daemon->env->worker = NULL;
336 daemon->env->need_to_validate = 0; /* set by module init below */
337 if(!modstack_setup(&daemon->mods, daemon->cfg->module_conf,
339 fatal_exit("failed to setup modules");
344 * Obtain allowed port numbers, concatenate the list, and shuffle them
345 * (ready to be handed out to threads).
346 * @param daemon: the daemon. Uses rand and cfg.
347 * @param shufport: the portlist output.
348 * @return number of ports available.
350 static int daemon_get_shufport(struct daemon* daemon, int* shufport)
354 for(i=0; i<65536; i++) {
355 if(daemon->cfg->outgoing_avail_ports[i]) {
356 shufport[avail++] = daemon->cfg->
357 outgoing_avail_ports[i];
361 fatal_exit("no ports are permitted for UDP, add "
362 "with outgoing-port-permit");
366 k = ub_random_max(daemon->rand, n+1); /* 0<= k<= n */
368 shufport[k] = shufport[n];
375 * Allocate empty worker structures. With backptr and thread-number,
376 * from 0..numthread initialised. Used as user arguments to new threads.
377 * Creates the daemon random generator if it does not exist yet.
378 * The random generator stays existing between reloads with a unique state.
379 * @param daemon: the daemon with (new) config settings.
382 daemon_create_workers(struct daemon* daemon)
386 log_assert(daemon && daemon->cfg);
388 unsigned int seed = (unsigned int)time(NULL) ^
389 (unsigned int)getpid() ^ 0x438;
390 daemon->rand = ub_initstate(seed, NULL);
392 fatal_exit("could not init random generator");
394 hash_set_raninit((uint32_t)ub_random(daemon->rand));
395 shufport = (int*)calloc(65536, sizeof(int));
397 fatal_exit("out of memory during daemon init");
398 numport = daemon_get_shufport(daemon, shufport);
399 verbose(VERB_ALGO, "total of %d outgoing ports available", numport);
401 daemon->num = (daemon->cfg->num_threads?daemon->cfg->num_threads:1);
402 daemon->workers = (struct worker**)calloc((size_t)daemon->num,
403 sizeof(struct worker*));
404 if(daemon->cfg->dnstap) {
406 daemon->dtenv = dt_create(daemon->cfg->dnstap_socket_path,
407 (unsigned int)daemon->num);
409 fatal_exit("dt_create failed");
410 dt_apply_cfg(daemon->dtenv, daemon->cfg);
412 fatal_exit("dnstap enabled in config but not built with dnstap support");
415 for(i=0; i<daemon->num; i++) {
416 if(!(daemon->workers[i] = worker_create(daemon, i,
417 shufport+numport*i/daemon->num,
418 numport*(i+1)/daemon->num - numport*i/daemon->num)))
419 /* the above is not ports/numthr, due to rounding */
420 fatal_exit("could not create worker");
425 #ifdef THREADS_DISABLED
427 * Close all pipes except for the numbered thread.
428 * @param daemon: daemon to close pipes in.
429 * @param thr: thread number 0..num-1 of thread to skip.
431 static void close_other_pipes(struct daemon* daemon, int thr)
434 for(i=0; i<daemon->num; i++)
437 /* only close read part, need to write stats */
438 tube_close_read(daemon->workers[i]->cmd);
440 /* complete close channel to others */
441 tube_delete(daemon->workers[i]->cmd);
442 daemon->workers[i]->cmd = NULL;
446 #endif /* THREADS_DISABLED */
449 * Function to start one thread.
450 * @param arg: user argument.
451 * @return: void* user return value could be used for thread_join results.
454 thread_start(void* arg)
456 struct worker* worker = (struct worker*)arg;
458 log_thread_set(&worker->thread_num);
459 ub_thread_blocksigs();
460 #ifdef THREADS_DISABLED
461 /* close pipe ends used by main */
462 tube_close_write(worker->cmd);
463 close_other_pipes(worker->daemon, worker->thread_num);
466 if(worker->daemon->cfg->so_reuseport)
467 port_num = worker->thread_num;
471 if(!worker_init(worker, worker->daemon->cfg,
472 worker->daemon->ports[port_num], 0))
473 fatal_exit("Could not initialize thread");
480 * Fork and init the other threads. Main thread returns for special handling.
481 * @param daemon: the daemon with other threads to fork.
484 daemon_start_others(struct daemon* daemon)
488 verbose(VERB_ALGO, "start threads");
489 /* skip i=0, is this thread */
490 for(i=1; i<daemon->num; i++) {
491 ub_thread_create(&daemon->workers[i]->thr_id,
492 thread_start, daemon->workers[i]);
493 #ifdef THREADS_DISABLED
494 /* close pipe end of child */
495 tube_close_read(daemon->workers[i]->cmd);
496 #endif /* no threads */
501 * Stop the other threads.
502 * @param daemon: the daemon with other threads.
505 daemon_stop_others(struct daemon* daemon)
509 verbose(VERB_ALGO, "stop threads");
510 /* skip i=0, is this thread */
511 /* use i=0 buffer for sending cmds; because we are #0 */
512 for(i=1; i<daemon->num; i++) {
513 worker_send_cmd(daemon->workers[i], worker_cmd_quit);
515 /* wait for them to quit */
516 for(i=1; i<daemon->num; i++) {
517 /* join it to make sure its dead */
518 verbose(VERB_ALGO, "join %d", i);
519 ub_thread_join(daemon->workers[i]->thr_id);
520 verbose(VERB_ALGO, "join success %d", i);
525 daemon_fork(struct daemon* daemon)
528 if(!acl_list_apply_cfg(daemon->acl, daemon->cfg))
529 fatal_exit("Could not setup access control list");
530 if(!(daemon->local_zones = local_zones_create()))
531 fatal_exit("Could not create local zones: out of memory");
532 if(!local_zones_apply_cfg(daemon->local_zones, daemon->cfg))
533 fatal_exit("Could not set up local zones");
536 daemon_setup_modules(daemon);
538 /* first create all the worker structures, so we can pass
539 * them to the newly created threads.
541 daemon_create_workers(daemon);
543 #if defined(HAVE_EV_LOOP) || defined(HAVE_EV_DEFAULT_LOOP)
544 /* in libev the first inited base gets signals */
545 if(!worker_init(daemon->workers[0], daemon->cfg, daemon->ports[0], 1))
546 fatal_exit("Could not initialize main thread");
549 /* Now create the threads and init the workers.
550 * By the way, this is thread #0 (the main thread).
552 daemon_start_others(daemon);
554 /* Special handling for the main thread. This is the thread
555 * that handles signals and remote control.
557 #if !(defined(HAVE_EV_LOOP) || defined(HAVE_EV_DEFAULT_LOOP))
558 /* libevent has the last inited base get signals (or any base) */
559 if(!worker_init(daemon->workers[0], daemon->cfg, daemon->ports[0], 1))
560 fatal_exit("Could not initialize main thread");
562 signal_handling_playback(daemon->workers[0]);
564 /* Start resolver service on main thread. */
565 log_info("start of service (%s).", PACKAGE_STRING);
566 worker_work(daemon->workers[0]);
567 log_info("service stopped (%s).", PACKAGE_STRING);
569 /* we exited! a signal happened! Stop other threads */
570 daemon_stop_others(daemon);
572 daemon->need_to_exit = daemon->workers[0]->need_to_exit;
576 daemon_cleanup(struct daemon* daemon)
580 /* before stopping main worker, handle signals ourselves, so we
581 don't die on multiple reload signals for example. */
582 signal_handling_record();
583 log_thread_set(NULL);
584 /* clean up caches because
585 * a) RRset IDs will be recycled after a reload, causing collisions
586 * b) validation config can change, thus rrset, msg, keycache clear
587 * The infra cache is kept, the timing and edns info is still valid */
588 slabhash_clear(&daemon->env->rrset_cache->table);
589 slabhash_clear(daemon->env->msg_cache);
590 local_zones_delete(daemon->local_zones);
591 daemon->local_zones = NULL;
592 /* key cache is cleared by module desetup during next daemon_init() */
593 daemon_remote_clear(daemon->rc);
594 for(i=0; i<daemon->num; i++)
595 worker_delete(daemon->workers[i]);
596 free(daemon->workers);
597 daemon->workers = NULL;
600 dt_delete(daemon->dtenv);
606 daemon_delete(struct daemon* daemon)
611 modstack_desetup(&daemon->mods, daemon->env);
612 daemon_remote_delete(daemon->rc);
613 for(i = 0; i < daemon->num_ports; i++)
614 listening_ports_free(daemon->ports[i]);
616 listening_ports_free(daemon->rc_ports);
618 slabhash_delete(daemon->env->msg_cache);
619 rrset_cache_delete(daemon->env->rrset_cache);
620 infra_delete(daemon->env->infra_cache);
622 ub_randfree(daemon->rand);
623 alloc_clear(&daemon->superalloc);
624 acl_list_delete(daemon->acl);
625 free(daemon->chroot);
626 free(daemon->pidfile);
629 SSL_CTX_free((SSL_CTX*)daemon->listen_sslctx);
630 SSL_CTX_free((SSL_CTX*)daemon->connect_sslctx);
633 #ifdef LEX_HAS_YYLEX_DESTROY
637 /* libcrypto cleanup */
639 # if defined(USE_GOST) && defined(HAVE_LDNS_KEY_EVP_UNLOAD_GOST)
640 sldns_key_EVP_unload_gost();
642 # if HAVE_DECL_SSL_COMP_GET_COMPRESSION_METHODS && HAVE_DECL_SK_SSL_COMP_POP_FREE
644 sk_SSL_COMP_pop_free(comp_meth, (void(*)())CRYPTO_free);
647 # ifdef HAVE_OPENSSL_CONFIG
652 CRYPTO_cleanup_all_ex_data(); /* safe, no more threads right now */
656 # if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED)
657 ub_openssl_lock_delete();
659 #elif defined(HAVE_NSS)
661 #endif /* HAVE_SSL or HAVE_NSS */
664 if(WSACleanup() != 0) {
665 log_err("Could not WSACleanup: %s",
666 wsa_strerror(WSAGetLastError()));
671 void daemon_apply_cfg(struct daemon* daemon, struct config_file* cfg)
675 if(!daemon->env->msg_cache ||
676 cfg->msg_cache_size != slabhash_get_size(daemon->env->msg_cache) ||
677 cfg->msg_cache_slabs != daemon->env->msg_cache->size) {
678 slabhash_delete(daemon->env->msg_cache);
679 daemon->env->msg_cache = slabhash_create(cfg->msg_cache_slabs,
680 HASH_DEFAULT_STARTARRAY, cfg->msg_cache_size,
681 msgreply_sizefunc, query_info_compare,
682 query_entry_delete, reply_info_delete, NULL);
683 if(!daemon->env->msg_cache) {
684 fatal_exit("malloc failure updating config settings");
687 if((daemon->env->rrset_cache = rrset_cache_adjust(
688 daemon->env->rrset_cache, cfg, &daemon->superalloc)) == 0)
689 fatal_exit("malloc failure updating config settings");
690 if((daemon->env->infra_cache = infra_adjust(daemon->env->infra_cache,
692 fatal_exit("malloc failure updating config settings");