]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - contrib/unbound/services/cache/dns.c
unbound: Vendor import 1.19.1
[FreeBSD/FreeBSD.git] / contrib / unbound / services / cache / dns.c
1 /*
2  * services/cache/dns.c - Cache services for DNS using msg and rrset caches.
3  *
4  * Copyright (c) 2007, NLnet Labs. All rights reserved.
5  *
6  * This software is open source.
7  * 
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 
12  * Redistributions of source code must retain the above copyright notice,
13  * this list of conditions and the following disclaimer.
14  * 
15  * Redistributions in binary form must reproduce the above copyright notice,
16  * this list of conditions and the following disclaimer in the documentation
17  * and/or other materials provided with the distribution.
18  * 
19  * Neither the name of the NLNET LABS nor the names of its contributors may
20  * be used to endorse or promote products derived from this software without
21  * specific prior written permission.
22  * 
23  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27  * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29  * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34  */
35
36 /**
37  * \file
38  *
39  * This file contains the DNS cache.
40  */
41 #include "config.h"
42 #include "iterator/iter_delegpt.h"
43 #include "iterator/iter_utils.h"
44 #include "validator/val_nsec.h"
45 #include "validator/val_utils.h"
46 #include "services/cache/dns.h"
47 #include "services/cache/rrset.h"
48 #include "util/data/msgparse.h"
49 #include "util/data/msgreply.h"
50 #include "util/data/packed_rrset.h"
51 #include "util/data/dname.h"
52 #include "util/module.h"
53 #include "util/net_help.h"
54 #include "util/regional.h"
55 #include "util/config_file.h"
56 #include "sldns/sbuffer.h"
57
58 /** store rrsets in the rrset cache. 
59  * @param env: module environment with caches.
60  * @param rep: contains list of rrsets to store.
61  * @param now: current time.
62  * @param leeway: during prefetch how much leeway to update TTLs.
63  *      This makes rrsets (other than type NS) timeout sooner so they get
64  *      updated with a new full TTL.
65  *      Type NS does not get this, because it must not be refreshed from the
66  *      child domain, but keep counting down properly.
67  * @param pside: if from parentside discovered NS, so that its NS is okay
68  *      in a prefetch situation to be updated (without becoming sticky).
69  * @param qrep: update rrsets here if cache is better
70  * @param region: for qrep allocs.
71  * @param qstarttime: time when delegations were looked up, this is perhaps
72  *      earlier than the time in now. The time is used to determine if RRsets
73  *      of type NS have expired, so that they can only be updated using
74  *      lookups of delegation points that did not use them, since they had
75  *      expired then.
76  */
77 static void
78 store_rrsets(struct module_env* env, struct reply_info* rep, time_t now,
79         time_t leeway, int pside, struct reply_info* qrep,
80         struct regional* region, time_t qstarttime)
81 {
82         size_t i;
83         /* see if rrset already exists in cache, if not insert it. */
84         for(i=0; i<rep->rrset_count; i++) {
85                 rep->ref[i].key = rep->rrsets[i];
86                 rep->ref[i].id = rep->rrsets[i]->id;
87                 /* update ref if it was in the cache */
88                 switch(rrset_cache_update(env->rrset_cache, &rep->ref[i],
89                                 env->alloc, ((ntohs(rep->ref[i].key->rk.type)==
90                                 LDNS_RR_TYPE_NS && !pside)?qstarttime:now + leeway))) {
91                 case 0: /* ref unchanged, item inserted */
92                         break;
93                 case 2: /* ref updated, cache is superior */
94                         if(region) {
95                                 struct ub_packed_rrset_key* ck;
96                                 lock_rw_rdlock(&rep->ref[i].key->entry.lock);
97                                 /* if deleted rrset, do not copy it */
98                                 if(rep->ref[i].key->id == 0)
99                                         ck = NULL;
100                                 else    ck = packed_rrset_copy_region(
101                                         rep->ref[i].key, region, now);
102                                 lock_rw_unlock(&rep->ref[i].key->entry.lock);
103                                 if(ck) {
104                                         /* use cached copy if memory allows */
105                                         qrep->rrsets[i] = ck;
106                                 }
107                         }
108                         /* no break: also copy key item */
109                         /* the line below is matched by gcc regex and silences
110                          * the fallthrough warning */
111                         /* fallthrough */
112                 case 1: /* ref updated, item inserted */
113                         rep->rrsets[i] = rep->ref[i].key;
114                 }
115         }
116 }
117
118 /** delete message from message cache */
119 void
120 msg_cache_remove(struct module_env* env, uint8_t* qname, size_t qnamelen, 
121         uint16_t qtype, uint16_t qclass, uint16_t flags)
122 {
123         struct query_info k;
124         hashvalue_type h;
125
126         k.qname = qname;
127         k.qname_len = qnamelen;
128         k.qtype = qtype;
129         k.qclass = qclass;
130         k.local_alias = NULL;
131         h = query_info_hash(&k, flags);
132         slabhash_remove(env->msg_cache, h, &k);
133 }
134
135 void 
136 dns_cache_store_msg(struct module_env* env, struct query_info* qinfo,
137         hashvalue_type hash, struct reply_info* rep, time_t leeway, int pside,
138         struct reply_info* qrep, uint32_t flags, struct regional* region,
139         time_t qstarttime)
140 {
141         struct msgreply_entry* e;
142         time_t ttl = rep->ttl;
143         size_t i;
144
145         /* store RRsets */
146         for(i=0; i<rep->rrset_count; i++) {
147                 rep->ref[i].key = rep->rrsets[i];
148                 rep->ref[i].id = rep->rrsets[i]->id;
149         }
150
151         /* there was a reply_info_sortref(rep) here but it seems to be
152          * unnecessary, because the cache gets locked per rrset. */
153         reply_info_set_ttls(rep, *env->now);
154         store_rrsets(env, rep, *env->now, leeway, pside, qrep, region,
155                 qstarttime);
156         if(ttl == 0 && !(flags & DNSCACHE_STORE_ZEROTTL)) {
157                 /* we do not store the message, but we did store the RRs,
158                  * which could be useful for delegation information */
159                 verbose(VERB_ALGO, "TTL 0: dropped msg from cache");
160                 reply_info_delete(rep, NULL);
161                 /* if the message is in the cache, remove that msg,
162                  * so that the TTL 0 response can be returned for future
163                  * responses (i.e. don't get answered from
164                  * cache, but instead go to recursion to get this TTL0
165                  * response).
166                  * Possible messages that could be in the cache:
167                  * - SERVFAIL
168                  * - NXDOMAIN
169                  * - NODATA
170                  * - an older record that is expired
171                  * - an older record that did not yet expire */
172                 msg_cache_remove(env, qinfo->qname, qinfo->qname_len,
173                         qinfo->qtype, qinfo->qclass, flags);
174                 return;
175         }
176
177         /* store msg in the cache */
178         reply_info_sortref(rep);
179         if(!(e = query_info_entrysetup(qinfo, rep, hash))) {
180                 log_err("store_msg: malloc failed");
181                 return;
182         }
183         slabhash_insert(env->msg_cache, hash, &e->entry, rep, env->alloc);
184 }
185
186 /** see if an rrset is expired above the qname, return upper qname. */
187 static int
188 rrset_expired_above(struct module_env* env, uint8_t** qname, size_t* qnamelen,
189         uint16_t searchtype, uint16_t qclass, time_t now, uint8_t* expiretop,
190         size_t expiretoplen)
191 {
192         struct ub_packed_rrset_key *rrset;
193         uint8_t lablen;
194
195         while(*qnamelen > 0) {
196                 /* look one label higher */
197                 lablen = **qname;
198                 *qname += lablen + 1;
199                 *qnamelen -= lablen + 1;
200                 if(*qnamelen <= 0)
201                         break;
202
203                 /* looks up with a time of 0, to see expired entries */
204                 if((rrset = rrset_cache_lookup(env->rrset_cache, *qname,
205                         *qnamelen, searchtype, qclass, 0, 0, 0))) {
206                         struct packed_rrset_data* data =
207                                 (struct packed_rrset_data*)rrset->entry.data;
208                         if(now > data->ttl) {
209                                 /* it is expired, this is not wanted */
210                                 lock_rw_unlock(&rrset->entry.lock);
211                                 log_nametypeclass(VERB_ALGO, "this rrset is expired", *qname, searchtype, qclass);
212                                 return 1;
213                         }
214                         /* it is not expired, continue looking */
215                         lock_rw_unlock(&rrset->entry.lock);
216                 }
217
218                 /* do not look above the expiretop. */
219                 if(expiretop && *qnamelen == expiretoplen &&
220                         query_dname_compare(*qname, expiretop)==0)
221                         break;
222         }
223         return 0;
224 }
225
226 /** find closest NS or DNAME and returns the rrset (locked) */
227 static struct ub_packed_rrset_key*
228 find_closest_of_type(struct module_env* env, uint8_t* qname, size_t qnamelen, 
229         uint16_t qclass, time_t now, uint16_t searchtype, int stripfront,
230         int noexpiredabove, uint8_t* expiretop, size_t expiretoplen)
231 {
232         struct ub_packed_rrset_key *rrset;
233         uint8_t lablen;
234
235         if(stripfront) {
236                 /* strip off so that DNAMEs have strict subdomain match */
237                 lablen = *qname;
238                 qname += lablen + 1;
239                 qnamelen -= lablen + 1;
240         }
241
242         /* snip off front part of qname until the type is found */
243         while(qnamelen > 0) {
244                 if((rrset = rrset_cache_lookup(env->rrset_cache, qname, 
245                         qnamelen, searchtype, qclass, 0, now, 0))) {
246                         uint8_t* origqname = qname;
247                         size_t origqnamelen = qnamelen;
248                         if(!noexpiredabove)
249                                 return rrset;
250                         /* if expiretop set, do not look above it, but
251                          * qname is equal, so the just found result is also
252                          * the nonexpired above part. */
253                         if(expiretop && qnamelen == expiretoplen &&
254                                 query_dname_compare(qname, expiretop)==0)
255                                 return rrset;
256                         /* check for expiry, but we have to let go of the rrset
257                          * for the lock ordering */
258                         lock_rw_unlock(&rrset->entry.lock);
259                         /* the expired_above function always takes off one
260                          * label (if qnamelen>0) and returns the final qname
261                          * where it searched, so we can continue from there
262                          * turning the O N*N search into O N. */
263                         if(!rrset_expired_above(env, &qname, &qnamelen,
264                                 searchtype, qclass, now, expiretop,
265                                 expiretoplen)) {
266                                 /* we want to return rrset, but it may be
267                                  * gone from cache, if so, just loop like
268                                  * it was not in the cache in the first place.
269                                  */
270                                 if((rrset = rrset_cache_lookup(env->
271                                         rrset_cache, origqname, origqnamelen,
272                                         searchtype, qclass, 0, now, 0))) {
273                                         return rrset;
274                                 }
275                         }
276                         log_nametypeclass(VERB_ALGO, "ignoring rrset because expired rrsets exist above it", origqname, searchtype, qclass);
277                         continue;
278                 }
279
280                 /* snip off front label */
281                 lablen = *qname;
282                 qname += lablen + 1;
283                 qnamelen -= lablen + 1;
284         }
285         return NULL;
286 }
287
288 /** add addr to additional section */
289 static void
290 addr_to_additional(struct ub_packed_rrset_key* rrset, struct regional* region,
291         struct dns_msg* msg, time_t now)
292 {
293         if((msg->rep->rrsets[msg->rep->rrset_count] = 
294                 packed_rrset_copy_region(rrset, region, now))) {
295                 msg->rep->ar_numrrsets++;
296                 msg->rep->rrset_count++;
297         }
298 }
299
300 /** lookup message in message cache */
301 struct msgreply_entry* 
302 msg_cache_lookup(struct module_env* env, uint8_t* qname, size_t qnamelen, 
303         uint16_t qtype, uint16_t qclass, uint16_t flags, time_t now, int wr)
304 {
305         struct lruhash_entry* e;
306         struct query_info k;
307         hashvalue_type h;
308
309         k.qname = qname;
310         k.qname_len = qnamelen;
311         k.qtype = qtype;
312         k.qclass = qclass;
313         k.local_alias = NULL;
314         h = query_info_hash(&k, flags);
315         e = slabhash_lookup(env->msg_cache, h, &k, wr);
316
317         if(!e) return NULL;
318         if( now > ((struct reply_info*)e->data)->ttl ) {
319                 lock_rw_unlock(&e->lock);
320                 return NULL;
321         }
322         return (struct msgreply_entry*)e->key;
323 }
324
325 /** find and add A and AAAA records for nameservers in delegpt */
326 static int
327 find_add_addrs(struct module_env* env, uint16_t qclass, 
328         struct regional* region, struct delegpt* dp, time_t now, 
329         struct dns_msg** msg)
330 {
331         struct delegpt_ns* ns;
332         struct msgreply_entry* neg;
333         struct ub_packed_rrset_key* akey;
334         for(ns = dp->nslist; ns; ns = ns->next) {
335                 akey = rrset_cache_lookup(env->rrset_cache, ns->name, 
336                         ns->namelen, LDNS_RR_TYPE_A, qclass, 0, now, 0);
337                 if(akey) {
338                         if(!delegpt_add_rrset_A(dp, region, akey, 0, NULL)) {
339                                 lock_rw_unlock(&akey->entry.lock);
340                                 return 0;
341                         }
342                         if(msg)
343                                 addr_to_additional(akey, region, *msg, now);
344                         lock_rw_unlock(&akey->entry.lock);
345                 } else {
346                         /* BIT_CD on false because delegpt lookup does
347                          * not use dns64 translation */
348                         neg = msg_cache_lookup(env, ns->name, ns->namelen,
349                                 LDNS_RR_TYPE_A, qclass, 0, now, 0);
350                         if(neg) {
351                                 delegpt_add_neg_msg(dp, neg);
352                                 lock_rw_unlock(&neg->entry.lock);
353                         }
354                 }
355                 akey = rrset_cache_lookup(env->rrset_cache, ns->name, 
356                         ns->namelen, LDNS_RR_TYPE_AAAA, qclass, 0, now, 0);
357                 if(akey) {
358                         if(!delegpt_add_rrset_AAAA(dp, region, akey, 0, NULL)) {
359                                 lock_rw_unlock(&akey->entry.lock);
360                                 return 0;
361                         }
362                         if(msg)
363                                 addr_to_additional(akey, region, *msg, now);
364                         lock_rw_unlock(&akey->entry.lock);
365                 } else {
366                         /* BIT_CD on false because delegpt lookup does
367                          * not use dns64 translation */
368                         neg = msg_cache_lookup(env, ns->name, ns->namelen,
369                                 LDNS_RR_TYPE_AAAA, qclass, 0, now, 0);
370                         if(neg) {
371                                 delegpt_add_neg_msg(dp, neg);
372                                 lock_rw_unlock(&neg->entry.lock);
373                         }
374                 }
375         }
376         return 1;
377 }
378
379 /** find and add A and AAAA records for missing nameservers in delegpt */
380 int
381 cache_fill_missing(struct module_env* env, uint16_t qclass, 
382         struct regional* region, struct delegpt* dp)
383 {
384         struct delegpt_ns* ns;
385         struct msgreply_entry* neg;
386         struct ub_packed_rrset_key* akey;
387         time_t now = *env->now;
388         for(ns = dp->nslist; ns; ns = ns->next) {
389                 if(ns->cache_lookup_count > ITERATOR_NAME_CACHELOOKUP_MAX)
390                         continue;
391                 ns->cache_lookup_count++;
392                 akey = rrset_cache_lookup(env->rrset_cache, ns->name, 
393                         ns->namelen, LDNS_RR_TYPE_A, qclass, 0, now, 0);
394                 if(akey) {
395                         if(!delegpt_add_rrset_A(dp, region, akey, ns->lame,
396                                 NULL)) {
397                                 lock_rw_unlock(&akey->entry.lock);
398                                 return 0;
399                         }
400                         log_nametypeclass(VERB_ALGO, "found in cache",
401                                 ns->name, LDNS_RR_TYPE_A, qclass);
402                         lock_rw_unlock(&akey->entry.lock);
403                 } else {
404                         /* BIT_CD on false because delegpt lookup does
405                          * not use dns64 translation */
406                         neg = msg_cache_lookup(env, ns->name, ns->namelen,
407                                 LDNS_RR_TYPE_A, qclass, 0, now, 0);
408                         if(neg) {
409                                 delegpt_add_neg_msg(dp, neg);
410                                 lock_rw_unlock(&neg->entry.lock);
411                         }
412                 }
413                 akey = rrset_cache_lookup(env->rrset_cache, ns->name, 
414                         ns->namelen, LDNS_RR_TYPE_AAAA, qclass, 0, now, 0);
415                 if(akey) {
416                         if(!delegpt_add_rrset_AAAA(dp, region, akey, ns->lame,
417                                 NULL)) {
418                                 lock_rw_unlock(&akey->entry.lock);
419                                 return 0;
420                         }
421                         log_nametypeclass(VERB_ALGO, "found in cache",
422                                 ns->name, LDNS_RR_TYPE_AAAA, qclass);
423                         lock_rw_unlock(&akey->entry.lock);
424                 } else {
425                         /* BIT_CD on false because delegpt lookup does
426                          * not use dns64 translation */
427                         neg = msg_cache_lookup(env, ns->name, ns->namelen,
428                                 LDNS_RR_TYPE_AAAA, qclass, 0, now, 0);
429                         if(neg) {
430                                 delegpt_add_neg_msg(dp, neg);
431                                 lock_rw_unlock(&neg->entry.lock);
432                         }
433                 }
434         }
435         return 1;
436 }
437
438 /** find and add DS or NSEC to delegation msg */
439 static void
440 find_add_ds(struct module_env* env, struct regional* region, 
441         struct dns_msg* msg, struct delegpt* dp, time_t now)
442 {
443         /* Lookup the DS or NSEC at the delegation point. */
444         struct ub_packed_rrset_key* rrset = rrset_cache_lookup(
445                 env->rrset_cache, dp->name, dp->namelen, LDNS_RR_TYPE_DS, 
446                 msg->qinfo.qclass, 0, now, 0);
447         if(!rrset) {
448                 /* NOTE: this won't work for alternate NSEC schemes 
449                  *      (opt-in, NSEC3) */
450                 rrset = rrset_cache_lookup(env->rrset_cache, dp->name, 
451                         dp->namelen, LDNS_RR_TYPE_NSEC, msg->qinfo.qclass, 
452                         0, now, 0);
453                 /* Note: the PACKED_RRSET_NSEC_AT_APEX flag is not used.
454                  * since this is a referral, we need the NSEC at the parent
455                  * side of the zone cut, not the NSEC at apex side. */
456                 if(rrset && nsec_has_type(rrset, LDNS_RR_TYPE_DS)) {
457                         lock_rw_unlock(&rrset->entry.lock);
458                         rrset = NULL; /* discard wrong NSEC */
459                 }
460         }
461         if(rrset) {
462                 /* add it to auth section. This is the second rrset. */
463                 if((msg->rep->rrsets[msg->rep->rrset_count] = 
464                         packed_rrset_copy_region(rrset, region, now))) {
465                         msg->rep->ns_numrrsets++;
466                         msg->rep->rrset_count++;
467                 }
468                 lock_rw_unlock(&rrset->entry.lock);
469         }
470 }
471
472 struct dns_msg*
473 dns_msg_create(uint8_t* qname, size_t qnamelen, uint16_t qtype, 
474         uint16_t qclass, struct regional* region, size_t capacity)
475 {
476         struct dns_msg* msg = (struct dns_msg*)regional_alloc(region,
477                 sizeof(struct dns_msg));
478         if(!msg)
479                 return NULL;
480         msg->qinfo.qname = regional_alloc_init(region, qname, qnamelen);
481         if(!msg->qinfo.qname)
482                 return NULL;
483         msg->qinfo.qname_len = qnamelen;
484         msg->qinfo.qtype = qtype;
485         msg->qinfo.qclass = qclass;
486         msg->qinfo.local_alias = NULL;
487         /* non-packed reply_info, because it needs to grow the array */
488         msg->rep = (struct reply_info*)regional_alloc_zero(region, 
489                 sizeof(struct reply_info)-sizeof(struct rrset_ref));
490         if(!msg->rep)
491                 return NULL;
492         if(capacity > RR_COUNT_MAX)
493                 return NULL; /* integer overflow protection */
494         msg->rep->flags = BIT_QR; /* with QR, no AA */
495         msg->rep->qdcount = 1;
496         msg->rep->reason_bogus = LDNS_EDE_NONE;
497         msg->rep->rrsets = (struct ub_packed_rrset_key**)
498                 regional_alloc(region, 
499                 capacity*sizeof(struct ub_packed_rrset_key*));
500         if(!msg->rep->rrsets)
501                 return NULL;
502         return msg;
503 }
504
505 int
506 dns_msg_authadd(struct dns_msg* msg, struct regional* region, 
507         struct ub_packed_rrset_key* rrset, time_t now)
508 {
509         if(!(msg->rep->rrsets[msg->rep->rrset_count++] = 
510                 packed_rrset_copy_region(rrset, region, now)))
511                 return 0;
512         msg->rep->ns_numrrsets++;
513         return 1;
514 }
515
516 int
517 dns_msg_ansadd(struct dns_msg* msg, struct regional* region, 
518         struct ub_packed_rrset_key* rrset, time_t now)
519 {
520         if(!(msg->rep->rrsets[msg->rep->rrset_count++] = 
521                 packed_rrset_copy_region(rrset, region, now)))
522                 return 0;
523         msg->rep->an_numrrsets++;
524         return 1;
525 }
526
527 struct delegpt* 
528 dns_cache_find_delegation(struct module_env* env, uint8_t* qname, 
529         size_t qnamelen, uint16_t qtype, uint16_t qclass, 
530         struct regional* region, struct dns_msg** msg, time_t now,
531         int noexpiredabove, uint8_t* expiretop, size_t expiretoplen)
532 {
533         /* try to find closest NS rrset */
534         struct ub_packed_rrset_key* nskey;
535         struct packed_rrset_data* nsdata;
536         struct delegpt* dp;
537
538         nskey = find_closest_of_type(env, qname, qnamelen, qclass, now,
539                 LDNS_RR_TYPE_NS, 0, noexpiredabove, expiretop, expiretoplen);
540         if(!nskey) /* hope the caller has hints to prime or something */
541                 return NULL;
542         nsdata = (struct packed_rrset_data*)nskey->entry.data;
543         /* got the NS key, create delegation point */
544         dp = delegpt_create(region);
545         if(!dp || !delegpt_set_name(dp, region, nskey->rk.dname)) {
546                 lock_rw_unlock(&nskey->entry.lock);
547                 log_err("find_delegation: out of memory");
548                 return NULL;
549         }
550         /* create referral message */
551         if(msg) {
552                 /* allocate the array to as much as we could need:
553                  *      NS rrset + DS/NSEC rrset +
554                  *      A rrset for every NS RR
555                  *      AAAA rrset for every NS RR
556                  */
557                 *msg = dns_msg_create(qname, qnamelen, qtype, qclass, region, 
558                         2 + nsdata->count*2);
559                 if(!*msg || !dns_msg_authadd(*msg, region, nskey, now)) {
560                         lock_rw_unlock(&nskey->entry.lock);
561                         log_err("find_delegation: out of memory");
562                         return NULL;
563                 }
564         }
565         if(!delegpt_rrset_add_ns(dp, region, nskey, 0))
566                 log_err("find_delegation: addns out of memory");
567         lock_rw_unlock(&nskey->entry.lock); /* first unlock before next lookup*/
568         /* find and add DS/NSEC (if any) */
569         if(msg)
570                 find_add_ds(env, region, *msg, dp, now);
571         /* find and add A entries */
572         if(!find_add_addrs(env, qclass, region, dp, now, msg))
573                 log_err("find_delegation: addrs out of memory");
574         return dp;
575 }
576
577 /** allocate dns_msg from query_info and reply_info */
578 static struct dns_msg*
579 gen_dns_msg(struct regional* region, struct query_info* q, size_t num)
580 {
581         struct dns_msg* msg = (struct dns_msg*)regional_alloc(region, 
582                 sizeof(struct dns_msg));
583         if(!msg)
584                 return NULL;
585         memcpy(&msg->qinfo, q, sizeof(struct query_info));
586         msg->qinfo.qname = regional_alloc_init(region, q->qname, q->qname_len);
587         if(!msg->qinfo.qname)
588                 return NULL;
589         /* allocate replyinfo struct and rrset key array separately */
590         msg->rep = (struct reply_info*)regional_alloc(region,
591                 sizeof(struct reply_info) - sizeof(struct rrset_ref));
592         if(!msg->rep)
593                 return NULL;
594         msg->rep->reason_bogus = LDNS_EDE_NONE;
595         msg->rep->reason_bogus_str = NULL;
596         if(num > RR_COUNT_MAX)
597                 return NULL; /* integer overflow protection */
598         msg->rep->rrsets = (struct ub_packed_rrset_key**)
599                 regional_alloc(region,
600                 num * sizeof(struct ub_packed_rrset_key*));
601         if(!msg->rep->rrsets)
602                 return NULL;
603         return msg;
604 }
605
606 struct dns_msg*
607 tomsg(struct module_env* env, struct query_info* q, struct reply_info* r,
608         struct regional* region, time_t now, int allow_expired,
609         struct regional* scratch)
610 {
611         struct dns_msg* msg;
612         size_t i;
613         int is_expired = 0;
614         time_t now_control = now;
615         if(now > r->ttl) {
616                 /* Check if we are allowed to serve expired */
617                 if(allow_expired) {
618                         if(env->cfg->serve_expired_ttl &&
619                                 r->serve_expired_ttl < now) {
620                                 return NULL;
621                         }
622                         /* Ignore expired failure answers */
623                         if(FLAGS_GET_RCODE(r->flags) !=
624                                 LDNS_RCODE_NOERROR &&
625                                 FLAGS_GET_RCODE(r->flags) !=
626                                 LDNS_RCODE_NXDOMAIN &&
627                                 FLAGS_GET_RCODE(r->flags) !=
628                                 LDNS_RCODE_YXDOMAIN)
629                                 return 0;
630                 } else {
631                         return NULL;
632                 }
633                 /* Change the current time so we can pass the below TTL checks when
634                  * serving expired data. */
635                 now_control = r->ttl - env->cfg->serve_expired_reply_ttl;
636                 is_expired = 1;
637         }
638
639         msg = gen_dns_msg(region, q, r->rrset_count);
640         if(!msg) return NULL;
641         msg->rep->flags = r->flags;
642         msg->rep->qdcount = r->qdcount;
643         msg->rep->ttl = is_expired
644                 ?SERVE_EXPIRED_REPLY_TTL
645                 :r->ttl - now;
646         if(r->prefetch_ttl > now)
647                 msg->rep->prefetch_ttl = r->prefetch_ttl - now;
648         else
649                 msg->rep->prefetch_ttl = PREFETCH_TTL_CALC(msg->rep->ttl);
650         msg->rep->serve_expired_ttl = msg->rep->ttl + SERVE_EXPIRED_TTL;
651         msg->rep->security = r->security;
652         msg->rep->an_numrrsets = r->an_numrrsets;
653         msg->rep->ns_numrrsets = r->ns_numrrsets;
654         msg->rep->ar_numrrsets = r->ar_numrrsets;
655         msg->rep->rrset_count = r->rrset_count;
656         msg->rep->authoritative = r->authoritative;
657         msg->rep->reason_bogus = r->reason_bogus;
658         if(r->reason_bogus_str) {
659                 msg->rep->reason_bogus_str = regional_strdup(region, r->reason_bogus_str);
660         }
661
662         if(!rrset_array_lock(r->ref, r->rrset_count, now_control)) {
663                 return NULL;
664         }
665         if(r->an_numrrsets > 0 && (r->rrsets[0]->rk.type == htons(
666                 LDNS_RR_TYPE_CNAME) || r->rrsets[0]->rk.type == htons(
667                 LDNS_RR_TYPE_DNAME)) && !reply_check_cname_chain(q, r)) {
668                 /* cname chain is now invalid, reconstruct msg */
669                 rrset_array_unlock(r->ref, r->rrset_count);
670                 return NULL;
671         }
672         if(r->security == sec_status_secure && !reply_all_rrsets_secure(r)) {
673                 /* message rrsets have changed status, revalidate */
674                 rrset_array_unlock(r->ref, r->rrset_count);
675                 return NULL;
676         }
677         for(i=0; i<msg->rep->rrset_count; i++) {
678                 msg->rep->rrsets[i] = packed_rrset_copy_region(r->rrsets[i],
679                         region, now);
680                 if(!msg->rep->rrsets[i]) {
681                         rrset_array_unlock(r->ref, r->rrset_count);
682                         return NULL;
683                 }
684         }
685         if(env)
686                 rrset_array_unlock_touch(env->rrset_cache, scratch, r->ref, 
687                 r->rrset_count);
688         else
689                 rrset_array_unlock(r->ref, r->rrset_count);
690         return msg;
691 }
692
693 struct dns_msg*
694 dns_msg_deepcopy_region(struct dns_msg* origin, struct regional* region)
695 {
696         size_t i;
697         struct dns_msg* res = NULL;
698         res = gen_dns_msg(region, &origin->qinfo, origin->rep->rrset_count);
699         if(!res) return NULL;
700         *res->rep = *origin->rep;
701         if(origin->rep->reason_bogus_str) {
702                 res->rep->reason_bogus_str = regional_strdup(region,
703                         origin->rep->reason_bogus_str);
704         }
705         for(i=0; i<res->rep->rrset_count; i++) {
706                 res->rep->rrsets[i] = packed_rrset_copy_region(
707                         origin->rep->rrsets[i], region, 0);
708                 if(!res->rep->rrsets[i]) {
709                         return NULL;
710                 }
711         }
712         return res;
713 }
714
715 /** synthesize RRset-only response from cached RRset item */
716 static struct dns_msg*
717 rrset_msg(struct ub_packed_rrset_key* rrset, struct regional* region, 
718         time_t now, struct query_info* q)
719 {
720         struct dns_msg* msg;
721         struct packed_rrset_data* d = (struct packed_rrset_data*)
722                 rrset->entry.data;
723         if(now > d->ttl)
724                 return NULL;
725         msg = gen_dns_msg(region, q, 1); /* only the CNAME (or other) RRset */
726         if(!msg)
727                 return NULL;
728         msg->rep->flags = BIT_QR; /* reply, no AA, no error */
729         msg->rep->authoritative = 0; /* reply stored in cache can't be authoritative */
730         msg->rep->qdcount = 1;
731         msg->rep->ttl = d->ttl - now;
732         msg->rep->prefetch_ttl = PREFETCH_TTL_CALC(msg->rep->ttl);
733         msg->rep->serve_expired_ttl = msg->rep->ttl + SERVE_EXPIRED_TTL;
734         msg->rep->security = sec_status_unchecked;
735         msg->rep->an_numrrsets = 1;
736         msg->rep->ns_numrrsets = 0;
737         msg->rep->ar_numrrsets = 0;
738         msg->rep->rrset_count = 1;
739         msg->rep->reason_bogus = LDNS_EDE_NONE;
740         msg->rep->rrsets[0] = packed_rrset_copy_region(rrset, region, now);
741         if(!msg->rep->rrsets[0]) /* copy CNAME */
742                 return NULL;
743         return msg;
744 }
745
746 /** synthesize DNAME+CNAME response from cached DNAME item */
747 static struct dns_msg*
748 synth_dname_msg(struct ub_packed_rrset_key* rrset, struct regional* region, 
749         time_t now, struct query_info* q, enum sec_status* sec_status)
750 {
751         struct dns_msg* msg;
752         struct ub_packed_rrset_key* ck;
753         struct packed_rrset_data* newd, *d = (struct packed_rrset_data*)
754                 rrset->entry.data;
755         uint8_t* newname, *dtarg = NULL;
756         size_t newlen, dtarglen;
757         if(now > d->ttl)
758                 return NULL;
759         /* only allow validated (with DNSSEC) DNAMEs used from cache 
760          * for insecure DNAMEs, query again. */
761         *sec_status = d->security;
762         /* return sec status, so the status of the CNAME can be checked
763          * by the calling routine. */
764         msg = gen_dns_msg(region, q, 2); /* DNAME + CNAME RRset */
765         if(!msg)
766                 return NULL;
767         msg->rep->flags = BIT_QR; /* reply, no AA, no error */
768         msg->rep->authoritative = 0; /* reply stored in cache can't be authoritative */
769         msg->rep->qdcount = 1;
770         msg->rep->ttl = d->ttl - now;
771         msg->rep->prefetch_ttl = PREFETCH_TTL_CALC(msg->rep->ttl);
772         msg->rep->serve_expired_ttl = msg->rep->ttl + SERVE_EXPIRED_TTL;
773         msg->rep->security = sec_status_unchecked;
774         msg->rep->an_numrrsets = 1;
775         msg->rep->ns_numrrsets = 0;
776         msg->rep->ar_numrrsets = 0;
777         msg->rep->rrset_count = 1;
778         msg->rep->reason_bogus = LDNS_EDE_NONE;
779         msg->rep->rrsets[0] = packed_rrset_copy_region(rrset, region, now);
780         if(!msg->rep->rrsets[0]) /* copy DNAME */
781                 return NULL;
782         /* synth CNAME rrset */
783         get_cname_target(rrset, &dtarg, &dtarglen);
784         if(!dtarg)
785                 return NULL;
786         newlen = q->qname_len + dtarglen - rrset->rk.dname_len;
787         if(newlen > LDNS_MAX_DOMAINLEN) {
788                 msg->rep->flags |= LDNS_RCODE_YXDOMAIN;
789                 return msg;
790         }
791         newname = (uint8_t*)regional_alloc(region, newlen);
792         if(!newname)
793                 return NULL;
794         /* new name is concatenation of qname front (without DNAME owner)
795          * and DNAME target name */
796         memcpy(newname, q->qname, q->qname_len-rrset->rk.dname_len);
797         memmove(newname+(q->qname_len-rrset->rk.dname_len), dtarg, dtarglen);
798         /* create rest of CNAME rrset */
799         ck = (struct ub_packed_rrset_key*)regional_alloc(region, 
800                 sizeof(struct ub_packed_rrset_key));
801         if(!ck)
802                 return NULL;
803         memset(&ck->entry, 0, sizeof(ck->entry));
804         msg->rep->rrsets[1] = ck;
805         ck->entry.key = ck;
806         ck->rk.type = htons(LDNS_RR_TYPE_CNAME);
807         ck->rk.rrset_class = rrset->rk.rrset_class;
808         ck->rk.flags = 0;
809         ck->rk.dname = regional_alloc_init(region, q->qname, q->qname_len);
810         if(!ck->rk.dname)
811                 return NULL;
812         ck->rk.dname_len = q->qname_len;
813         ck->entry.hash = rrset_key_hash(&ck->rk);
814         newd = (struct packed_rrset_data*)regional_alloc_zero(region,
815                 sizeof(struct packed_rrset_data) + sizeof(size_t) + 
816                 sizeof(uint8_t*) + sizeof(time_t) + sizeof(uint16_t) 
817                 + newlen);
818         if(!newd)
819                 return NULL;
820         ck->entry.data = newd;
821         newd->ttl = 0; /* 0 for synthesized CNAME TTL */
822         newd->count = 1;
823         newd->rrsig_count = 0;
824         newd->trust = rrset_trust_ans_noAA;
825         newd->rr_len = (size_t*)((uint8_t*)newd + 
826                 sizeof(struct packed_rrset_data));
827         newd->rr_len[0] = newlen + sizeof(uint16_t);
828         packed_rrset_ptr_fixup(newd);
829         newd->rr_ttl[0] = newd->ttl;
830         msg->rep->ttl = newd->ttl;
831         msg->rep->prefetch_ttl = PREFETCH_TTL_CALC(newd->ttl);
832         msg->rep->serve_expired_ttl = newd->ttl + SERVE_EXPIRED_TTL;
833         sldns_write_uint16(newd->rr_data[0], newlen);
834         memmove(newd->rr_data[0] + sizeof(uint16_t), newname, newlen);
835         msg->rep->an_numrrsets ++;
836         msg->rep->rrset_count ++;
837         return msg;
838 }
839
840 /** Fill TYPE_ANY response with some data from cache */
841 static struct dns_msg*
842 fill_any(struct module_env* env,
843         uint8_t* qname, size_t qnamelen, uint16_t qtype, uint16_t qclass,
844         struct regional* region)
845 {
846         time_t now = *env->now;
847         struct dns_msg* msg = NULL;
848         uint16_t lookup[] = {LDNS_RR_TYPE_A, LDNS_RR_TYPE_AAAA,
849                 LDNS_RR_TYPE_MX, LDNS_RR_TYPE_SOA, LDNS_RR_TYPE_NS,
850                 LDNS_RR_TYPE_DNAME, 0};
851         int i, num=6; /* number of RR types to look up */
852         log_assert(lookup[num] == 0);
853
854         if(env->cfg->deny_any) {
855                 /* return empty message */
856                 msg = dns_msg_create(qname, qnamelen, qtype, qclass,
857                         region, 0);
858                 if(!msg) {
859                         return NULL;
860                 }
861                 /* set NOTIMPL for RFC 8482 */
862                 msg->rep->flags |= LDNS_RCODE_NOTIMPL;
863                 msg->rep->security = sec_status_indeterminate;
864                 return msg;
865         }
866
867         for(i=0; i<num; i++) {
868                 /* look up this RR for inclusion in type ANY response */
869                 struct ub_packed_rrset_key* rrset = rrset_cache_lookup(
870                         env->rrset_cache, qname, qnamelen, lookup[i],
871                         qclass, 0, now, 0);
872                 struct packed_rrset_data *d;
873                 if(!rrset)
874                         continue;
875
876                 /* only if rrset from answer section */
877                 d = (struct packed_rrset_data*)rrset->entry.data;
878                 if(d->trust == rrset_trust_add_noAA ||
879                         d->trust == rrset_trust_auth_noAA ||
880                         d->trust == rrset_trust_add_AA ||
881                         d->trust == rrset_trust_auth_AA) {
882                         lock_rw_unlock(&rrset->entry.lock);
883                         continue;
884                 }
885
886                 /* create msg if none */
887                 if(!msg) {
888                         msg = dns_msg_create(qname, qnamelen, qtype, qclass,
889                                 region, (size_t)(num-i));
890                         if(!msg) {
891                                 lock_rw_unlock(&rrset->entry.lock);
892                                 return NULL;
893                         }
894                 }
895
896                 /* add RRset to response */
897                 if(!dns_msg_ansadd(msg, region, rrset, now)) {
898                         lock_rw_unlock(&rrset->entry.lock);
899                         return NULL;
900                 }
901                 lock_rw_unlock(&rrset->entry.lock);
902         }
903         return msg;
904 }
905
906 struct dns_msg* 
907 dns_cache_lookup(struct module_env* env,
908         uint8_t* qname, size_t qnamelen, uint16_t qtype, uint16_t qclass,
909         uint16_t flags, struct regional* region, struct regional* scratch,
910         int no_partial, uint8_t* dpname, size_t dpnamelen)
911 {
912         struct lruhash_entry* e;
913         struct query_info k;
914         hashvalue_type h;
915         time_t now = *env->now;
916         struct ub_packed_rrset_key* rrset;
917
918         /* lookup first, this has both NXdomains and ANSWER responses */
919         k.qname = qname;
920         k.qname_len = qnamelen;
921         k.qtype = qtype;
922         k.qclass = qclass;
923         k.local_alias = NULL;
924         h = query_info_hash(&k, flags);
925         e = slabhash_lookup(env->msg_cache, h, &k, 0);
926         if(e) {
927                 struct msgreply_entry* key = (struct msgreply_entry*)e->key;
928                 struct reply_info* data = (struct reply_info*)e->data;
929                 struct dns_msg* msg = tomsg(env, &key->key, data, region, now, 0,
930                         scratch);
931                 if(msg) {
932                         lock_rw_unlock(&e->lock);
933                         return msg;
934                 }
935                 /* could be msg==NULL; due to TTL or not all rrsets available */
936                 lock_rw_unlock(&e->lock);
937         }
938
939         /* see if a DNAME exists. Checked for first, to enforce that DNAMEs
940          * are more important, the CNAME is resynthesized and thus 
941          * consistent with the DNAME */
942         if(!no_partial &&
943                 (rrset=find_closest_of_type(env, qname, qnamelen, qclass, now,
944                 LDNS_RR_TYPE_DNAME, 1, 0, NULL, 0))) {
945                 /* synthesize a DNAME+CNAME message based on this */
946                 enum sec_status sec_status = sec_status_unchecked;
947                 struct dns_msg* msg = synth_dname_msg(rrset, region, now, &k,
948                         &sec_status);
949                 if(msg) {
950                         struct ub_packed_rrset_key* cname_rrset;
951                         lock_rw_unlock(&rrset->entry.lock);
952                         /* now, after unlocking the DNAME rrset lock,
953                          * check the sec_status, and see if we need to look
954                          * up the CNAME record associated before it can
955                          * be used */
956                         /* normally, only secure DNAMEs allowed from cache*/
957                         if(sec_status == sec_status_secure)
958                                 return msg;
959                         /* but if we have a CNAME cached with this name, then we
960                          * have previously already allowed this name to pass.
961                          * the next cache lookup is going to fetch that CNAME itself,
962                          * but it is better to have the (unsigned)DNAME + CNAME in
963                          * that case */
964                         cname_rrset = rrset_cache_lookup(
965                                 env->rrset_cache, qname, qnamelen,
966                                 LDNS_RR_TYPE_CNAME, qclass, 0, now, 0);
967                         if(cname_rrset) {
968                                 /* CNAME already synthesized by
969                                  * synth_dname_msg routine, so we can
970                                  * straight up return the msg */
971                                 lock_rw_unlock(&cname_rrset->entry.lock);
972                                 return msg;
973                         }
974                 } else {
975                         lock_rw_unlock(&rrset->entry.lock);
976                 }
977         }
978
979         /* see if we have CNAME for this domain,
980          * but not for DS records (which are part of the parent) */
981         if(!no_partial && qtype != LDNS_RR_TYPE_DS &&
982            (rrset=rrset_cache_lookup(env->rrset_cache, qname, qnamelen, 
983                 LDNS_RR_TYPE_CNAME, qclass, 0, now, 0))) {
984                 uint8_t* wc = NULL;
985                 size_t wl;
986                 /* if the rrset is not a wildcard expansion, with wcname */
987                 /* because, if we return that CNAME rrset on its own, it is
988                  * missing the NSEC or NSEC3 proof */
989                 if(!(val_rrset_wildcard(rrset, &wc, &wl) && wc != NULL)) {
990                         struct dns_msg* msg = rrset_msg(rrset, region, now, &k);
991                         if(msg) {
992                                 lock_rw_unlock(&rrset->entry.lock);
993                                 return msg;
994                         }
995                 }
996                 lock_rw_unlock(&rrset->entry.lock);
997         }
998
999         /* construct DS, DNSKEY messages from rrset cache. */
1000         if((qtype == LDNS_RR_TYPE_DS || qtype == LDNS_RR_TYPE_DNSKEY) &&
1001                 (rrset=rrset_cache_lookup(env->rrset_cache, qname, qnamelen, 
1002                 qtype, qclass, 0, now, 0))) {
1003                 /* if the rrset is from the additional section, and the
1004                  * signatures have fallen off, then do not synthesize a msg
1005                  * instead, allow a full query for signed results to happen.
1006                  * Forego all rrset data from additional section, because
1007                  * some signatures may not be present and cause validation
1008                  * failure.
1009                  */
1010                 struct packed_rrset_data *d = (struct packed_rrset_data*)
1011                         rrset->entry.data;
1012                 if(d->trust != rrset_trust_add_noAA && 
1013                         d->trust != rrset_trust_add_AA && 
1014                         (qtype == LDNS_RR_TYPE_DS || 
1015                                 (d->trust != rrset_trust_auth_noAA 
1016                                 && d->trust != rrset_trust_auth_AA) )) {
1017                         struct dns_msg* msg = rrset_msg(rrset, region, now, &k);
1018                         if(msg) {
1019                                 lock_rw_unlock(&rrset->entry.lock);
1020                                 return msg;
1021                         }
1022                 }
1023                 lock_rw_unlock(&rrset->entry.lock);
1024         }
1025
1026         /* stop downwards cache search on NXDOMAIN.
1027          * Empty nonterminals are NOERROR, so an NXDOMAIN for foo
1028          * means bla.foo also does not exist.  The DNSSEC proofs are
1029          * the same.  We search upwards for NXDOMAINs. */
1030         if(env->cfg->harden_below_nxdomain) {
1031                 while(!dname_is_root(k.qname)) {
1032                         if(dpname && dpnamelen
1033                                 && !dname_subdomain_c(k.qname, dpname))
1034                                 break; /* no synth nxdomain above the stub */
1035                         dname_remove_label(&k.qname, &k.qname_len);
1036                         h = query_info_hash(&k, flags);
1037                         e = slabhash_lookup(env->msg_cache, h, &k, 0);
1038                         if(!e && k.qtype != LDNS_RR_TYPE_A &&
1039                                 env->cfg->qname_minimisation) {
1040                                 k.qtype = LDNS_RR_TYPE_A;
1041                                 h = query_info_hash(&k, flags);
1042                                 e = slabhash_lookup(env->msg_cache, h, &k, 0);
1043                         }
1044                         if(e) {
1045                                 struct reply_info* data = (struct reply_info*)e->data;
1046                                 struct dns_msg* msg;
1047                                 if(FLAGS_GET_RCODE(data->flags) == LDNS_RCODE_NXDOMAIN
1048                                         && data->security == sec_status_secure
1049                                         && (data->an_numrrsets == 0 ||
1050                                                 ntohs(data->rrsets[0]->rk.type) != LDNS_RR_TYPE_CNAME)
1051                                         && (msg=tomsg(env, &k, data, region, now, 0, scratch))) {
1052                                         lock_rw_unlock(&e->lock);
1053                                         msg->qinfo.qname=qname;
1054                                         msg->qinfo.qname_len=qnamelen;
1055                                         /* check that DNSSEC really works out */
1056                                         msg->rep->security = sec_status_unchecked;
1057                                         iter_scrub_nxdomain(msg);
1058                                         return msg;
1059                                 }
1060                                 lock_rw_unlock(&e->lock);
1061                         }
1062                         k.qtype = qtype;
1063                 }
1064         }
1065
1066         /* fill common RR types for ANY response to avoid requery */
1067         if(qtype == LDNS_RR_TYPE_ANY) {
1068                 return fill_any(env, qname, qnamelen, qtype, qclass, region);
1069         }
1070
1071         return NULL;
1072 }
1073
1074 int
1075 dns_cache_store(struct module_env* env, struct query_info* msgqinf,
1076         struct reply_info* msgrep, int is_referral, time_t leeway, int pside,
1077         struct regional* region, uint32_t flags, time_t qstarttime)
1078 {
1079         struct reply_info* rep = NULL;
1080         /* alloc, malloc properly (not in region, like msg is) */
1081         rep = reply_info_copy(msgrep, env->alloc, NULL);
1082         if(!rep)
1083                 return 0;
1084         /* ttl must be relative ;i.e. 0..86400 not  time(0)+86400.
1085          * the env->now is added to message and RRsets in this routine. */
1086         /* the leeway is used to invalidate other rrsets earlier */
1087         if(is_referral) {
1088                 /* store rrsets */
1089                 struct rrset_ref ref;
1090                 size_t i;
1091                 for(i=0; i<rep->rrset_count; i++) {
1092                         packed_rrset_ttl_add((struct packed_rrset_data*)
1093                                 rep->rrsets[i]->entry.data, *env->now);
1094                         ref.key = rep->rrsets[i];
1095                         ref.id = rep->rrsets[i]->id;
1096                         /*ignore ret: it was in the cache, ref updated */
1097                         /* no leeway for typeNS */
1098                         (void)rrset_cache_update(env->rrset_cache, &ref, 
1099                                 env->alloc,
1100                                 ((ntohs(ref.key->rk.type)==LDNS_RR_TYPE_NS
1101                                  && !pside) ? qstarttime:*env->now + leeway));
1102                 }
1103                 reply_info_delete(rep, NULL);
1104                 return 1;
1105         } else {
1106                 /* store msg, and rrsets */
1107                 struct query_info qinf;
1108                 hashvalue_type h;
1109
1110                 qinf = *msgqinf;
1111                 qinf.qname = memdup(msgqinf->qname, msgqinf->qname_len);
1112                 if(!qinf.qname) {
1113                         reply_info_parsedelete(rep, env->alloc);
1114                         return 0;
1115                 }
1116                 /* fixup flags to be sensible for a reply based on the cache */
1117                 /* this module means that RA is available. It is an answer QR. 
1118                  * Not AA from cache. Not CD in cache (depends on client bit). */
1119                 rep->flags |= (BIT_RA | BIT_QR);
1120                 rep->flags &= ~(BIT_AA | BIT_CD);
1121                 h = query_info_hash(&qinf, (uint16_t)flags);
1122                 dns_cache_store_msg(env, &qinf, h, rep, leeway, pside, msgrep,
1123                         flags, region, qstarttime);
1124                 /* qname is used inside query_info_entrysetup, and set to 
1125                  * NULL. If it has not been used, free it. free(0) is safe. */
1126                 free(qinf.qname);
1127         }
1128         return 1;
1129 }
1130
1131 int 
1132 dns_cache_prefetch_adjust(struct module_env* env, struct query_info* qinfo,
1133         time_t adjust, uint16_t flags)
1134 {
1135         struct msgreply_entry* msg;
1136         msg = msg_cache_lookup(env, qinfo->qname, qinfo->qname_len,
1137                 qinfo->qtype, qinfo->qclass, flags, *env->now, 1);
1138         if(msg) {
1139                 struct reply_info* rep = (struct reply_info*)msg->entry.data;
1140                 if(rep) {
1141                         rep->prefetch_ttl += adjust;
1142                         lock_rw_unlock(&msg->entry.lock);
1143                         return 1;
1144                 }
1145                 lock_rw_unlock(&msg->entry.lock);
1146         }
1147         return 0;
1148 }