]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - contrib/unbound/libunbound/libworker.c
MFV r337184: 9457 libzfs_import.c:add_config() has a memory leak
[FreeBSD/FreeBSD.git] / contrib / unbound / libunbound / libworker.c
1 /*
2  * libunbound/worker.c - worker thread or process that resolves
3  *
4  * Copyright (c) 2007, NLnet Labs. All rights reserved.
5  *
6  * This software is open source.
7  * 
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 
12  * Redistributions of source code must retain the above copyright notice,
13  * this list of conditions and the following disclaimer.
14  * 
15  * Redistributions in binary form must reproduce the above copyright notice,
16  * this list of conditions and the following disclaimer in the documentation
17  * and/or other materials provided with the distribution.
18  * 
19  * Neither the name of the NLNET LABS nor the names of its contributors may
20  * be used to endorse or promote products derived from this software without
21  * specific prior written permission.
22  * 
23  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27  * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29  * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34  */
35
36 /**
37  * \file
38  *
39  * This file contains the worker process or thread that performs
40  * the DNS resolving and validation. The worker is called by a procedure
41  * and if in the background continues until exit, if in the foreground
42  * returns from the procedure when done.
43  */
44 #include "config.h"
45 #ifdef HAVE_SSL
46 #include <openssl/ssl.h>
47 #endif
48 #include "libunbound/libworker.h"
49 #include "libunbound/context.h"
50 #include "libunbound/unbound.h"
51 #include "libunbound/worker.h"
52 #include "libunbound/unbound-event.h"
53 #include "services/outside_network.h"
54 #include "services/mesh.h"
55 #include "services/localzone.h"
56 #include "services/cache/rrset.h"
57 #include "services/outbound_list.h"
58 #include "services/authzone.h"
59 #include "util/fptr_wlist.h"
60 #include "util/module.h"
61 #include "util/regional.h"
62 #include "util/random.h"
63 #include "util/config_file.h"
64 #include "util/netevent.h"
65 #include "util/storage/lookup3.h"
66 #include "util/storage/slabhash.h"
67 #include "util/net_help.h"
68 #include "util/data/dname.h"
69 #include "util/data/msgreply.h"
70 #include "util/data/msgencode.h"
71 #include "util/tube.h"
72 #include "iterator/iter_fwd.h"
73 #include "iterator/iter_hints.h"
74 #include "sldns/sbuffer.h"
75 #include "sldns/str2wire.h"
76
77 /** handle new query command for bg worker */
78 static void handle_newq(struct libworker* w, uint8_t* buf, uint32_t len);
79
80 /** delete libworker env */
81 static void
82 libworker_delete_env(struct libworker* w)
83 {
84         if(w->env) {
85                 outside_network_quit_prepare(w->back);
86                 mesh_delete(w->env->mesh);
87                 context_release_alloc(w->ctx, w->env->alloc, 
88                         !w->is_bg || w->is_bg_thread);
89                 sldns_buffer_free(w->env->scratch_buffer);
90                 regional_destroy(w->env->scratch);
91                 forwards_delete(w->env->fwds);
92                 hints_delete(w->env->hints);
93                 ub_randfree(w->env->rnd);
94                 free(w->env);
95         }
96 #ifdef HAVE_SSL
97         SSL_CTX_free(w->sslctx);
98 #endif
99         outside_network_delete(w->back);
100 }
101
102 /** delete libworker struct */
103 static void
104 libworker_delete(struct libworker* w)
105 {
106         if(!w) return;
107         libworker_delete_env(w);
108         comm_base_delete(w->base);
109         free(w);
110 }
111
112 void
113 libworker_delete_event(struct libworker* w)
114 {
115         if(!w) return;
116         libworker_delete_env(w);
117         comm_base_delete_no_base(w->base);
118         free(w);
119 }
120
121 /** setup fresh libworker struct */
122 static struct libworker*
123 libworker_setup(struct ub_ctx* ctx, int is_bg, struct ub_event_base* eb)
124 {
125         unsigned int seed;
126         struct libworker* w = (struct libworker*)calloc(1, sizeof(*w));
127         struct config_file* cfg = ctx->env->cfg;
128         int* ports;
129         int numports;
130         if(!w) return NULL;
131         w->is_bg = is_bg;
132         w->ctx = ctx;
133         w->env = (struct module_env*)malloc(sizeof(*w->env));
134         if(!w->env) {
135                 free(w);
136                 return NULL;
137         }
138         *w->env = *ctx->env;
139         w->env->alloc = context_obtain_alloc(ctx, !w->is_bg || w->is_bg_thread);
140         if(!w->env->alloc) {
141                 libworker_delete(w);
142                 return NULL;
143         }
144         w->thread_num = w->env->alloc->thread_num;
145         alloc_set_id_cleanup(w->env->alloc, &libworker_alloc_cleanup, w);
146         if(!w->is_bg || w->is_bg_thread) {
147                 lock_basic_lock(&ctx->cfglock);
148         }
149         w->env->scratch = regional_create_custom(cfg->msg_buffer_size);
150         w->env->scratch_buffer = sldns_buffer_new(cfg->msg_buffer_size);
151         w->env->fwds = forwards_create();
152         if(w->env->fwds && !forwards_apply_cfg(w->env->fwds, cfg)) { 
153                 forwards_delete(w->env->fwds);
154                 w->env->fwds = NULL;
155         }
156         w->env->hints = hints_create();
157         if(w->env->hints && !hints_apply_cfg(w->env->hints, cfg)) { 
158                 hints_delete(w->env->hints);
159                 w->env->hints = NULL;
160         }
161         if(cfg->ssl_upstream) {
162                 w->sslctx = connect_sslctx_create(NULL, NULL,
163                         cfg->tls_cert_bundle);
164                 if(!w->sslctx) {
165                         /* to make the setup fail after unlock */
166                         hints_delete(w->env->hints);
167                         w->env->hints = NULL;
168                 }
169         }
170         if(!w->is_bg || w->is_bg_thread) {
171                 lock_basic_unlock(&ctx->cfglock);
172         }
173         if(!w->env->scratch || !w->env->scratch_buffer || !w->env->fwds ||
174                 !w->env->hints) {
175                 libworker_delete(w);
176                 return NULL;
177         }
178         w->env->worker = (struct worker*)w;
179         w->env->probe_timer = NULL;
180         seed = (unsigned int)time(NULL) ^ (unsigned int)getpid() ^
181                 (((unsigned int)w->thread_num)<<17);
182         seed ^= (unsigned int)w->env->alloc->next_id;
183         if(!w->is_bg || w->is_bg_thread) {
184                 lock_basic_lock(&ctx->cfglock);
185         }
186         if(!(w->env->rnd = ub_initstate(seed, ctx->seed_rnd))) {
187                 if(!w->is_bg || w->is_bg_thread) {
188                         lock_basic_unlock(&ctx->cfglock);
189                 }
190                 seed = 0;
191                 libworker_delete(w);
192                 return NULL;
193         }
194         if(!w->is_bg || w->is_bg_thread) {
195                 lock_basic_unlock(&ctx->cfglock);
196         }
197         if(1) {
198                 /* primitive lockout for threading: if it overwrites another
199                  * thread it is like wiping the cache (which is likely empty
200                  * at the start) */
201                 /* note we are holding the ctx lock in normal threaded
202                  * cases so that is solved properly, it is only for many ctx
203                  * in different threads that this may clash */
204                 static int done_raninit = 0;
205                 if(!done_raninit) {
206                         done_raninit = 1;
207                         hash_set_raninit((uint32_t)ub_random(w->env->rnd));
208                 }
209         }
210         seed = 0;
211
212         if(eb)
213                 w->base = comm_base_create_event(eb);
214         else    w->base = comm_base_create(0);
215         if(!w->base) {
216                 libworker_delete(w);
217                 return NULL;
218         }
219         w->env->worker_base = w->base;
220         if(!w->is_bg || w->is_bg_thread) {
221                 lock_basic_lock(&ctx->cfglock);
222         }
223         numports = cfg_condense_ports(cfg, &ports);
224         if(numports == 0) {
225                 int locked = !w->is_bg || w->is_bg_thread;
226                 libworker_delete(w);
227                 if(locked) {
228                         lock_basic_unlock(&ctx->cfglock);
229                 }
230                 return NULL;
231         }
232         w->back = outside_network_create(w->base, cfg->msg_buffer_size,
233                 (size_t)cfg->outgoing_num_ports, cfg->out_ifs,
234                 cfg->num_out_ifs, cfg->do_ip4, cfg->do_ip6, 
235                 cfg->do_tcp?cfg->outgoing_num_tcp:0,
236                 w->env->infra_cache, w->env->rnd, cfg->use_caps_bits_for_id,
237                 ports, numports, cfg->unwanted_threshold,
238                 cfg->outgoing_tcp_mss, &libworker_alloc_cleanup, w,
239                 cfg->do_udp || cfg->udp_upstream_without_downstream, w->sslctx,
240                 cfg->delay_close, NULL);
241         w->env->outnet = w->back;
242         if(!w->is_bg || w->is_bg_thread) {
243                 lock_basic_unlock(&ctx->cfglock);
244         }
245         free(ports);
246         if(!w->back) {
247                 libworker_delete(w);
248                 return NULL;
249         }
250         w->env->mesh = mesh_create(&ctx->mods, w->env);
251         if(!w->env->mesh) {
252                 libworker_delete(w);
253                 return NULL;
254         }
255         w->env->send_query = &libworker_send_query;
256         w->env->detach_subs = &mesh_detach_subs;
257         w->env->attach_sub = &mesh_attach_sub;
258         w->env->add_sub = &mesh_add_sub;
259         w->env->kill_sub = &mesh_state_delete;
260         w->env->detect_cycle = &mesh_detect_cycle;
261         comm_base_timept(w->base, &w->env->now, &w->env->now_tv);
262         return w;
263 }
264
265 struct libworker* libworker_create_event(struct ub_ctx* ctx,
266         struct ub_event_base* eb)
267 {
268         return libworker_setup(ctx, 0, eb);
269 }
270
271 /** handle cancel command for bg worker */
272 static void
273 handle_cancel(struct libworker* w, uint8_t* buf, uint32_t len)
274 {
275         struct ctx_query* q;
276         if(w->is_bg_thread) {
277                 lock_basic_lock(&w->ctx->cfglock);
278                 q = context_deserialize_cancel(w->ctx, buf, len);
279                 lock_basic_unlock(&w->ctx->cfglock);
280         } else {
281                 q = context_deserialize_cancel(w->ctx, buf, len);
282         }
283         if(!q) {
284                 /* probably simply lookup failed, i.e. the message had been
285                  * processed and answered before the cancel arrived */
286                 return;
287         }
288         q->cancelled = 1;
289         free(buf);
290 }
291
292 /** do control command coming into bg server */
293 static void
294 libworker_do_cmd(struct libworker* w, uint8_t* msg, uint32_t len)
295 {
296         switch(context_serial_getcmd(msg, len)) {
297                 default:
298                 case UB_LIBCMD_ANSWER:
299                         log_err("unknown command for bg worker %d", 
300                                 (int)context_serial_getcmd(msg, len));
301                         /* and fall through to quit */
302                         /* fallthrough */
303                 case UB_LIBCMD_QUIT:
304                         free(msg);
305                         comm_base_exit(w->base);
306                         break;
307                 case UB_LIBCMD_NEWQUERY:
308                         handle_newq(w, msg, len);
309                         break;
310                 case UB_LIBCMD_CANCEL:
311                         handle_cancel(w, msg, len);
312                         break;
313         }
314 }
315
316 /** handle control command coming into server */
317 void 
318 libworker_handle_control_cmd(struct tube* ATTR_UNUSED(tube), 
319         uint8_t* msg, size_t len, int err, void* arg)
320 {
321         struct libworker* w = (struct libworker*)arg;
322
323         if(err != 0) {
324                 free(msg);
325                 /* it is of no use to go on, exit */
326                 comm_base_exit(w->base);
327                 return;
328         }
329         libworker_do_cmd(w, msg, len); /* also frees the buf */
330 }
331
332 /** the background thread func */
333 static void*
334 libworker_dobg(void* arg)
335 {
336         /* setup */
337         uint32_t m;
338         struct libworker* w = (struct libworker*)arg;
339         struct ub_ctx* ctx;
340         if(!w) {
341                 log_err("libunbound bg worker init failed, nomem");
342                 return NULL;
343         }
344         ctx = w->ctx;
345         log_thread_set(&w->thread_num);
346 #ifdef THREADS_DISABLED
347         /* we are forked */
348         w->is_bg_thread = 0;
349         /* close non-used parts of the pipes */
350         tube_close_write(ctx->qq_pipe);
351         tube_close_read(ctx->rr_pipe);
352 #endif
353         if(!tube_setup_bg_listen(ctx->qq_pipe, w->base, 
354                 libworker_handle_control_cmd, w)) {
355                 log_err("libunbound bg worker init failed, no bglisten");
356                 return NULL;
357         }
358         if(!tube_setup_bg_write(ctx->rr_pipe, w->base)) {
359                 log_err("libunbound bg worker init failed, no bgwrite");
360                 return NULL;
361         }
362
363         /* do the work */
364         comm_base_dispatch(w->base);
365
366         /* cleanup */
367         m = UB_LIBCMD_QUIT;
368         w->want_quit = 1;
369         tube_remove_bg_listen(w->ctx->qq_pipe);
370         tube_remove_bg_write(w->ctx->rr_pipe);
371         libworker_delete(w);
372         (void)tube_write_msg(ctx->rr_pipe, (uint8_t*)&m, 
373                 (uint32_t)sizeof(m), 0);
374 #ifdef THREADS_DISABLED
375         /* close pipes from forked process before exit */
376         tube_close_read(ctx->qq_pipe);
377         tube_close_write(ctx->rr_pipe);
378 #endif
379         return NULL;
380 }
381
382 int libworker_bg(struct ub_ctx* ctx)
383 {
384         struct libworker* w;
385         /* fork or threadcreate */
386         lock_basic_lock(&ctx->cfglock);
387         if(ctx->dothread) {
388                 lock_basic_unlock(&ctx->cfglock);
389                 w = libworker_setup(ctx, 1, NULL);
390                 if(!w) return UB_NOMEM;
391                 w->is_bg_thread = 1;
392 #ifdef ENABLE_LOCK_CHECKS
393                 w->thread_num = 1; /* for nicer DEBUG checklocks */
394 #endif
395                 ub_thread_create(&ctx->bg_tid, libworker_dobg, w);
396         } else {
397                 lock_basic_unlock(&ctx->cfglock);
398 #ifndef HAVE_FORK
399                 /* no fork on windows */
400                 return UB_FORKFAIL;
401 #else /* HAVE_FORK */
402                 switch((ctx->bg_pid=fork())) {
403                         case 0:
404                                 w = libworker_setup(ctx, 1, NULL);
405                                 if(!w) fatal_exit("out of memory");
406                                 /* close non-used parts of the pipes */
407                                 tube_close_write(ctx->qq_pipe);
408                                 tube_close_read(ctx->rr_pipe);
409                                 (void)libworker_dobg(w);
410                                 exit(0);
411                                 break;
412                         case -1:
413                                 return UB_FORKFAIL;
414                         default:
415                                 /* close non-used parts, so that the worker
416                                  * bgprocess gets 'pipe closed' when the
417                                  * main process exits */
418                                 tube_close_read(ctx->qq_pipe);
419                                 tube_close_write(ctx->rr_pipe);
420                                 break;
421                 }
422 #endif /* HAVE_FORK */ 
423         }
424         return UB_NOERROR;
425 }
426
427 /** insert canonname */
428 static int
429 fill_canon(struct ub_result* res, uint8_t* s)
430 {
431         char buf[255+2];
432         dname_str(s, buf);
433         res->canonname = strdup(buf);
434         return res->canonname != 0;
435 }
436
437 /** fill data into result */
438 static int
439 fill_res(struct ub_result* res, struct ub_packed_rrset_key* answer,
440         uint8_t* finalcname, struct query_info* rq, struct reply_info* rep)
441 {
442         size_t i;
443         struct packed_rrset_data* data;
444         res->ttl = 0;
445         if(!answer) {
446                 if(finalcname) {
447                         if(!fill_canon(res, finalcname))
448                                 return 0; /* out of memory */
449                 }
450                 if(rep->rrset_count != 0)
451                         res->ttl = (int)rep->ttl;
452                 res->data = (char**)calloc(1, sizeof(char*));
453                 res->len = (int*)calloc(1, sizeof(int));
454                 return (res->data && res->len);
455         }
456         data = (struct packed_rrset_data*)answer->entry.data;
457         if(query_dname_compare(rq->qname, answer->rk.dname) != 0) {
458                 if(!fill_canon(res, answer->rk.dname))
459                         return 0; /* out of memory */
460         } else  res->canonname = NULL;
461         res->data = (char**)calloc(data->count+1, sizeof(char*));
462         res->len = (int*)calloc(data->count+1, sizeof(int));
463         if(!res->data || !res->len)
464                 return 0; /* out of memory */
465         for(i=0; i<data->count; i++) {
466                 /* remove rdlength from rdata */
467                 res->len[i] = (int)(data->rr_len[i] - 2);
468                 res->data[i] = memdup(data->rr_data[i]+2, (size_t)res->len[i]);
469                 if(!res->data[i])
470                         return 0; /* out of memory */
471         }
472         /* ttl for positive answers, from CNAME and answer RRs */
473         if(data->count != 0) {
474                 size_t j;
475                 res->ttl = (int)data->ttl;
476                 for(j=0; j<rep->an_numrrsets; j++) {
477                         struct packed_rrset_data* d =
478                                 (struct packed_rrset_data*)rep->rrsets[j]->
479                                 entry.data;
480                         if((int)d->ttl < res->ttl)
481                                 res->ttl = (int)d->ttl;
482                 }
483         }
484         /* ttl for negative answers */
485         if(data->count == 0 && rep->rrset_count != 0)
486                 res->ttl = (int)rep->ttl;
487         res->data[data->count] = NULL;
488         res->len[data->count] = 0;
489         return 1;
490 }
491
492 /** fill result from parsed message, on error fills servfail */
493 void
494 libworker_enter_result(struct ub_result* res, sldns_buffer* buf,
495         struct regional* temp, enum sec_status msg_security)
496 {
497         struct query_info rq;
498         struct reply_info* rep;
499         res->rcode = LDNS_RCODE_SERVFAIL;
500         rep = parse_reply_in_temp_region(buf, temp, &rq);
501         if(!rep) {
502                 log_err("cannot parse buf");
503                 return; /* error parsing buf, or out of memory */
504         }
505         if(!fill_res(res, reply_find_answer_rrset(&rq, rep), 
506                 reply_find_final_cname_target(&rq, rep), &rq, rep))
507                 return; /* out of memory */
508         /* rcode, havedata, nxdomain, secure, bogus */
509         res->rcode = (int)FLAGS_GET_RCODE(rep->flags);
510         if(res->data && res->data[0])
511                 res->havedata = 1;
512         if(res->rcode == LDNS_RCODE_NXDOMAIN)
513                 res->nxdomain = 1;
514         if(msg_security == sec_status_secure)
515                 res->secure = 1;
516         if(msg_security == sec_status_bogus ||
517                 msg_security == sec_status_secure_sentinel_fail)
518                 res->bogus = 1;
519 }
520
521 /** fillup fg results */
522 static void
523 libworker_fillup_fg(struct ctx_query* q, int rcode, sldns_buffer* buf, 
524         enum sec_status s, char* why_bogus)
525 {
526         if(why_bogus)
527                 q->res->why_bogus = strdup(why_bogus);
528         if(rcode != 0) {
529                 q->res->rcode = rcode;
530                 q->msg_security = s;
531                 return;
532         }
533
534         q->res->rcode = LDNS_RCODE_SERVFAIL;
535         q->msg_security = 0;
536         q->msg = memdup(sldns_buffer_begin(buf), sldns_buffer_limit(buf));
537         q->msg_len = sldns_buffer_limit(buf);
538         if(!q->msg) {
539                 return; /* the error is in the rcode */
540         }
541
542         /* canonname and results */
543         q->msg_security = s;
544         libworker_enter_result(q->res, buf, q->w->env->scratch, s);
545 }
546
547 void
548 libworker_fg_done_cb(void* arg, int rcode, sldns_buffer* buf, enum sec_status s,
549         char* why_bogus)
550 {
551         struct ctx_query* q = (struct ctx_query*)arg;
552         /* fg query is done; exit comm base */
553         comm_base_exit(q->w->base);
554
555         libworker_fillup_fg(q, rcode, buf, s, why_bogus);
556 }
557
558 /** setup qinfo and edns */
559 static int
560 setup_qinfo_edns(struct libworker* w, struct ctx_query* q, 
561         struct query_info* qinfo, struct edns_data* edns)
562 {
563         qinfo->qtype = (uint16_t)q->res->qtype;
564         qinfo->qclass = (uint16_t)q->res->qclass;
565         qinfo->local_alias = NULL;
566         qinfo->qname = sldns_str2wire_dname(q->res->qname, &qinfo->qname_len);
567         if(!qinfo->qname) {
568                 return 0;
569         }
570         qinfo->local_alias = NULL;
571         edns->edns_present = 1;
572         edns->ext_rcode = 0;
573         edns->edns_version = 0;
574         edns->bits = EDNS_DO;
575         edns->opt_list = NULL;
576         if(sldns_buffer_capacity(w->back->udp_buff) < 65535)
577                 edns->udp_size = (uint16_t)sldns_buffer_capacity(
578                         w->back->udp_buff);
579         else    edns->udp_size = 65535;
580         return 1;
581 }
582
583 int libworker_fg(struct ub_ctx* ctx, struct ctx_query* q)
584 {
585         struct libworker* w = libworker_setup(ctx, 0, NULL);
586         uint16_t qflags, qid;
587         struct query_info qinfo;
588         struct edns_data edns;
589         if(!w)
590                 return UB_INITFAIL;
591         if(!setup_qinfo_edns(w, q, &qinfo, &edns)) {
592                 libworker_delete(w);
593                 return UB_SYNTAX;
594         }
595         qid = 0;
596         qflags = BIT_RD;
597         q->w = w;
598         /* see if there is a fixed answer */
599         sldns_buffer_write_u16_at(w->back->udp_buff, 0, qid);
600         sldns_buffer_write_u16_at(w->back->udp_buff, 2, qflags);
601         if(local_zones_answer(ctx->local_zones, w->env, &qinfo, &edns, 
602                 w->back->udp_buff, w->env->scratch, NULL, NULL, 0, NULL, 0,
603                 NULL, 0, NULL, 0, NULL)) {
604                 regional_free_all(w->env->scratch);
605                 libworker_fillup_fg(q, LDNS_RCODE_NOERROR, 
606                         w->back->udp_buff, sec_status_insecure, NULL);
607                 libworker_delete(w);
608                 free(qinfo.qname);
609                 return UB_NOERROR;
610         }
611         if(ctx->env->auth_zones && auth_zones_answer(ctx->env->auth_zones,
612                 w->env, &qinfo, &edns, w->back->udp_buff, w->env->scratch)) {
613                 regional_free_all(w->env->scratch);
614                 libworker_fillup_fg(q, LDNS_RCODE_NOERROR, 
615                         w->back->udp_buff, sec_status_insecure, NULL);
616                 libworker_delete(w);
617                 free(qinfo.qname);
618                 return UB_NOERROR;
619         }
620         /* process new query */
621         if(!mesh_new_callback(w->env->mesh, &qinfo, qflags, &edns, 
622                 w->back->udp_buff, qid, libworker_fg_done_cb, q)) {
623                 free(qinfo.qname);
624                 return UB_NOMEM;
625         }
626         free(qinfo.qname);
627
628         /* wait for reply */
629         comm_base_dispatch(w->base);
630
631         libworker_delete(w);
632         return UB_NOERROR;
633 }
634
635 void
636 libworker_event_done_cb(void* arg, int rcode, sldns_buffer* buf,
637         enum sec_status s, char* why_bogus)
638 {
639         struct ctx_query* q = (struct ctx_query*)arg;
640         ub_event_callback_type cb = (ub_event_callback_type)q->cb;
641         void* cb_arg = q->cb_arg;
642         int cancelled = q->cancelled;
643
644         /* delete it now */
645         struct ub_ctx* ctx = q->w->ctx;
646         lock_basic_lock(&ctx->cfglock);
647         (void)rbtree_delete(&ctx->queries, q->node.key);
648         ctx->num_async--;
649         context_query_delete(q);
650         lock_basic_unlock(&ctx->cfglock);
651
652         if(!cancelled) {
653                 /* call callback */
654                 int sec = 0;
655                 if(s == sec_status_bogus)
656                         sec = 1;
657                 else if(s == sec_status_secure)
658                         sec = 2;
659                 (*cb)(cb_arg, rcode, (void*)sldns_buffer_begin(buf),
660                         (int)sldns_buffer_limit(buf), sec, why_bogus);
661         }
662 }
663
664 int libworker_attach_mesh(struct ub_ctx* ctx, struct ctx_query* q,
665         int* async_id)
666 {
667         struct libworker* w = ctx->event_worker;
668         uint16_t qflags, qid;
669         struct query_info qinfo;
670         struct edns_data edns;
671         if(!w)
672                 return UB_INITFAIL;
673         if(!setup_qinfo_edns(w, q, &qinfo, &edns))
674                 return UB_SYNTAX;
675         qid = 0;
676         qflags = BIT_RD;
677         q->w = w;
678         /* see if there is a fixed answer */
679         sldns_buffer_write_u16_at(w->back->udp_buff, 0, qid);
680         sldns_buffer_write_u16_at(w->back->udp_buff, 2, qflags);
681         if(local_zones_answer(ctx->local_zones, w->env, &qinfo, &edns, 
682                 w->back->udp_buff, w->env->scratch, NULL, NULL, 0, NULL, 0,
683                 NULL, 0, NULL, 0, NULL)) {
684                 regional_free_all(w->env->scratch);
685                 free(qinfo.qname);
686                 libworker_event_done_cb(q, LDNS_RCODE_NOERROR,
687                         w->back->udp_buff, sec_status_insecure, NULL);
688                 return UB_NOERROR;
689         }
690         if(ctx->env->auth_zones && auth_zones_answer(ctx->env->auth_zones,
691                 w->env, &qinfo, &edns, w->back->udp_buff, w->env->scratch)) {
692                 regional_free_all(w->env->scratch);
693                 free(qinfo.qname);
694                 libworker_event_done_cb(q, LDNS_RCODE_NOERROR,
695                         w->back->udp_buff, sec_status_insecure, NULL);
696                 return UB_NOERROR;
697         }
698         /* process new query */
699         if(async_id)
700                 *async_id = q->querynum;
701         if(!mesh_new_callback(w->env->mesh, &qinfo, qflags, &edns, 
702                 w->back->udp_buff, qid, libworker_event_done_cb, q)) {
703                 free(qinfo.qname);
704                 return UB_NOMEM;
705         }
706         free(qinfo.qname);
707         return UB_NOERROR;
708 }
709
710 /** add result to the bg worker result queue */
711 static void
712 add_bg_result(struct libworker* w, struct ctx_query* q, sldns_buffer* pkt, 
713         int err, char* reason)
714 {
715         uint8_t* msg = NULL;
716         uint32_t len = 0;
717
718         if(w->want_quit) {
719                 context_query_delete(q);
720                 return;
721         }
722         /* serialize and delete unneeded q */
723         if(w->is_bg_thread) {
724                 lock_basic_lock(&w->ctx->cfglock);
725                 if(reason)
726                         q->res->why_bogus = strdup(reason);
727                 if(pkt) {
728                         q->msg_len = sldns_buffer_remaining(pkt);
729                         q->msg = memdup(sldns_buffer_begin(pkt), q->msg_len);
730                         if(!q->msg)
731                                 msg = context_serialize_answer(q, UB_NOMEM, 
732                                 NULL, &len);
733                         else    msg = context_serialize_answer(q, err, 
734                                 NULL, &len);
735                 } else msg = context_serialize_answer(q, err, NULL, &len);
736                 lock_basic_unlock(&w->ctx->cfglock);
737         } else {
738                 if(reason)
739                         q->res->why_bogus = strdup(reason);
740                 msg = context_serialize_answer(q, err, pkt, &len);
741                 (void)rbtree_delete(&w->ctx->queries, q->node.key);
742                 w->ctx->num_async--;
743                 context_query_delete(q);
744         }
745
746         if(!msg) {
747                 log_err("out of memory for async answer");
748                 return;
749         }
750         if(!tube_queue_item(w->ctx->rr_pipe, msg, len)) {
751                 log_err("out of memory for async answer");
752                 return;
753         }
754 }
755
756 void
757 libworker_bg_done_cb(void* arg, int rcode, sldns_buffer* buf, enum sec_status s,
758         char* why_bogus)
759 {
760         struct ctx_query* q = (struct ctx_query*)arg;
761
762         if(q->cancelled || q->w->back->want_to_quit) {
763                 if(q->w->is_bg_thread) {
764                         /* delete it now */
765                         struct ub_ctx* ctx = q->w->ctx;
766                         lock_basic_lock(&ctx->cfglock);
767                         (void)rbtree_delete(&ctx->queries, q->node.key);
768                         ctx->num_async--;
769                         context_query_delete(q);
770                         lock_basic_unlock(&ctx->cfglock);
771                 }
772                 /* cancelled, do not give answer */
773                 return;
774         }
775         q->msg_security = s;
776         if(!buf)
777                 buf = q->w->env->scratch_buffer;
778         if(rcode != 0) {
779                 error_encode(buf, rcode, NULL, 0, BIT_RD, NULL);
780         }
781         add_bg_result(q->w, q, buf, UB_NOERROR, why_bogus);
782 }
783
784
785 /** handle new query command for bg worker */
786 static void
787 handle_newq(struct libworker* w, uint8_t* buf, uint32_t len)
788 {
789         uint16_t qflags, qid;
790         struct query_info qinfo;
791         struct edns_data edns;
792         struct ctx_query* q;
793         if(w->is_bg_thread) {
794                 lock_basic_lock(&w->ctx->cfglock);
795                 q = context_lookup_new_query(w->ctx, buf, len);
796                 lock_basic_unlock(&w->ctx->cfglock);
797         } else {
798                 q = context_deserialize_new_query(w->ctx, buf, len);
799         }
800         free(buf);
801         if(!q) {
802                 log_err("failed to deserialize newq");
803                 return;
804         }
805         if(!setup_qinfo_edns(w, q, &qinfo, &edns)) {
806                 add_bg_result(w, q, NULL, UB_SYNTAX, NULL);
807                 return;
808         }
809         qid = 0;
810         qflags = BIT_RD;
811         /* see if there is a fixed answer */
812         sldns_buffer_write_u16_at(w->back->udp_buff, 0, qid);
813         sldns_buffer_write_u16_at(w->back->udp_buff, 2, qflags);
814         if(local_zones_answer(w->ctx->local_zones, w->env, &qinfo, &edns, 
815                 w->back->udp_buff, w->env->scratch, NULL, NULL, 0, NULL, 0,
816                 NULL, 0, NULL, 0, NULL)) {
817                 regional_free_all(w->env->scratch);
818                 q->msg_security = sec_status_insecure;
819                 add_bg_result(w, q, w->back->udp_buff, UB_NOERROR, NULL);
820                 free(qinfo.qname);
821                 return;
822         }
823         if(w->ctx->env->auth_zones && auth_zones_answer(w->ctx->env->auth_zones,
824                 w->env, &qinfo, &edns, w->back->udp_buff, w->env->scratch)) {
825                 regional_free_all(w->env->scratch);
826                 q->msg_security = sec_status_insecure;
827                 add_bg_result(w, q, w->back->udp_buff, UB_NOERROR, NULL);
828                 free(qinfo.qname);
829                 return;
830         }
831         q->w = w;
832         /* process new query */
833         if(!mesh_new_callback(w->env->mesh, &qinfo, qflags, &edns, 
834                 w->back->udp_buff, qid, libworker_bg_done_cb, q)) {
835                 add_bg_result(w, q, NULL, UB_NOMEM, NULL);
836         }
837         free(qinfo.qname);
838 }
839
840 void libworker_alloc_cleanup(void* arg)
841 {
842         struct libworker* w = (struct libworker*)arg;
843         slabhash_clear(&w->env->rrset_cache->table);
844         slabhash_clear(w->env->msg_cache);
845 }
846
847 struct outbound_entry* libworker_send_query(struct query_info* qinfo,
848         uint16_t flags, int dnssec, int want_dnssec, int nocaps,
849         struct sockaddr_storage* addr, socklen_t addrlen, uint8_t* zone,
850         size_t zonelen, int ssl_upstream, char* tls_auth_name,
851         struct module_qstate* q)
852 {
853         struct libworker* w = (struct libworker*)q->env->worker;
854         struct outbound_entry* e = (struct outbound_entry*)regional_alloc(
855                 q->region, sizeof(*e));
856         if(!e)
857                 return NULL;
858         e->qstate = q;
859         e->qsent = outnet_serviced_query(w->back, qinfo, flags, dnssec,
860                 want_dnssec, nocaps, q->env->cfg->tcp_upstream, ssl_upstream,
861                 tls_auth_name, addr, addrlen, zone, zonelen, q,
862                 libworker_handle_service_reply, e, w->back->udp_buff, q->env);
863         if(!e->qsent) {
864                 return NULL;
865         }
866         return e;
867 }
868
869 int 
870 libworker_handle_reply(struct comm_point* c, void* arg, int error,
871         struct comm_reply* reply_info)
872 {
873         struct module_qstate* q = (struct module_qstate*)arg;
874         struct libworker* lw = (struct libworker*)q->env->worker;
875         struct outbound_entry e;
876         e.qstate = q;
877         e.qsent = NULL;
878
879         if(error != 0) {
880                 mesh_report_reply(lw->env->mesh, &e, reply_info, error);
881                 return 0;
882         }
883         /* sanity check. */
884         if(!LDNS_QR_WIRE(sldns_buffer_begin(c->buffer))
885                 || LDNS_OPCODE_WIRE(sldns_buffer_begin(c->buffer)) !=
886                         LDNS_PACKET_QUERY
887                 || LDNS_QDCOUNT(sldns_buffer_begin(c->buffer)) > 1) {
888                 /* error becomes timeout for the module as if this reply
889                  * never arrived. */
890                 mesh_report_reply(lw->env->mesh, &e, reply_info, 
891                         NETEVENT_TIMEOUT);
892                 return 0;
893         }
894         mesh_report_reply(lw->env->mesh, &e, reply_info, NETEVENT_NOERROR);
895         return 0;
896 }
897
898 int 
899 libworker_handle_service_reply(struct comm_point* c, void* arg, int error,
900         struct comm_reply* reply_info)
901 {
902         struct outbound_entry* e = (struct outbound_entry*)arg;
903         struct libworker* lw = (struct libworker*)e->qstate->env->worker;
904
905         if(error != 0) {
906                 mesh_report_reply(lw->env->mesh, e, reply_info, error);
907                 return 0;
908         }
909         /* sanity check. */
910         if(!LDNS_QR_WIRE(sldns_buffer_begin(c->buffer))
911                 || LDNS_OPCODE_WIRE(sldns_buffer_begin(c->buffer)) !=
912                         LDNS_PACKET_QUERY
913                 || LDNS_QDCOUNT(sldns_buffer_begin(c->buffer)) > 1) {
914                 /* error becomes timeout for the module as if this reply
915                  * never arrived. */
916                 mesh_report_reply(lw->env->mesh, e, reply_info, 
917                         NETEVENT_TIMEOUT);
918                 return 0;
919         }
920         mesh_report_reply(lw->env->mesh,  e, reply_info, NETEVENT_NOERROR);
921         return 0;
922 }
923
924 /* --- fake callbacks for fptr_wlist to work --- */
925 void worker_handle_control_cmd(struct tube* ATTR_UNUSED(tube), 
926         uint8_t* ATTR_UNUSED(buffer), size_t ATTR_UNUSED(len),
927         int ATTR_UNUSED(error), void* ATTR_UNUSED(arg))
928 {
929         log_assert(0);
930 }
931
932 int worker_handle_request(struct comm_point* ATTR_UNUSED(c), 
933         void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
934         struct comm_reply* ATTR_UNUSED(repinfo))
935 {
936         log_assert(0);
937         return 0;
938 }
939
940 int worker_handle_reply(struct comm_point* ATTR_UNUSED(c), 
941         void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
942         struct comm_reply* ATTR_UNUSED(reply_info))
943 {
944         log_assert(0);
945         return 0;
946 }
947
948 int worker_handle_service_reply(struct comm_point* ATTR_UNUSED(c), 
949         void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
950         struct comm_reply* ATTR_UNUSED(reply_info))
951 {
952         log_assert(0);
953         return 0;
954 }
955
956 int remote_accept_callback(struct comm_point* ATTR_UNUSED(c), 
957         void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
958         struct comm_reply* ATTR_UNUSED(repinfo))
959 {
960         log_assert(0);
961         return 0;
962 }
963
964 int remote_control_callback(struct comm_point* ATTR_UNUSED(c), 
965         void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
966         struct comm_reply* ATTR_UNUSED(repinfo))
967 {
968         log_assert(0);
969         return 0;
970 }
971
972 void worker_sighandler(int ATTR_UNUSED(sig), void* ATTR_UNUSED(arg))
973 {
974         log_assert(0);
975 }
976
977 struct outbound_entry* worker_send_query(struct query_info* ATTR_UNUSED(qinfo),
978         uint16_t ATTR_UNUSED(flags), int ATTR_UNUSED(dnssec),
979         int ATTR_UNUSED(want_dnssec), int ATTR_UNUSED(nocaps),
980         struct sockaddr_storage* ATTR_UNUSED(addr), socklen_t ATTR_UNUSED(addrlen),
981         uint8_t* ATTR_UNUSED(zone), size_t ATTR_UNUSED(zonelen),
982         int ATTR_UNUSED(ssl_upstream), char* ATTR_UNUSED(tls_auth_name),
983         struct module_qstate* ATTR_UNUSED(q))
984 {
985         log_assert(0);
986         return 0;
987 }
988
989 void 
990 worker_alloc_cleanup(void* ATTR_UNUSED(arg))
991 {
992         log_assert(0);
993 }
994
995 void worker_stat_timer_cb(void* ATTR_UNUSED(arg))
996 {
997         log_assert(0);
998 }
999
1000 void worker_probe_timer_cb(void* ATTR_UNUSED(arg))
1001 {
1002         log_assert(0);
1003 }
1004
1005 void worker_start_accept(void* ATTR_UNUSED(arg))
1006 {
1007         log_assert(0);
1008 }
1009
1010 void worker_stop_accept(void* ATTR_UNUSED(arg))
1011 {
1012         log_assert(0);
1013 }
1014
1015 int order_lock_cmp(const void* ATTR_UNUSED(e1), const void* ATTR_UNUSED(e2))
1016 {
1017         log_assert(0);
1018         return 0;
1019 }
1020
1021 int
1022 codeline_cmp(const void* ATTR_UNUSED(a), const void* ATTR_UNUSED(b))
1023 {
1024         log_assert(0);
1025         return 0;
1026 }
1027
1028 int replay_var_compare(const void* ATTR_UNUSED(a), const void* ATTR_UNUSED(b))
1029 {
1030         log_assert(0);
1031         return 0;
1032 }
1033
1034 void remote_get_opt_ssl(char* ATTR_UNUSED(str), void* ATTR_UNUSED(arg))
1035 {
1036         log_assert(0);
1037 }
1038
1039 #ifdef UB_ON_WINDOWS
1040 void
1041 worker_win_stop_cb(int ATTR_UNUSED(fd), short ATTR_UNUSED(ev), void* 
1042         ATTR_UNUSED(arg)) {
1043         log_assert(0);
1044 }
1045
1046 void
1047 wsvc_cron_cb(void* ATTR_UNUSED(arg))
1048 {
1049         log_assert(0);
1050 }
1051 #endif /* UB_ON_WINDOWS */