2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-23 10:39:16 +00:00
bind/lib/dns/db.c

1118 lines
26 KiB
C
Raw Normal View History

1999-01-28 23:53:03 +00:00
/*
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
*
* See the COPYRIGHT file distributed with this work for additional
* information regarding copyright ownership.
1999-01-28 23:53:03 +00:00
*/
/*! \file */
2000-06-22 22:00:42 +00:00
/***
*** Imports
***/
#include <inttypes.h>
#include <stdbool.h>
#include <isc/buffer.h>
#include <isc/mem.h>
#include <isc/once.h>
#include <isc/rwlock.h>
#include <isc/string.h>
2000-04-28 01:12:23 +00:00
#include <isc/util.h>
1999-01-28 23:53:03 +00:00
#include <dns/callbacks.h>
#include <dns/clientinfo.h>
#include <dns/db.h>
#include <dns/dbiterator.h>
#include <dns/log.h>
1999-07-30 23:32:19 +00:00
#include <dns/master.h>
#include <dns/rdata.h>
#include <dns/rdataset.h>
#include <dns/rdatasetiter.h>
#include <dns/result.h>
/***
*** Private Types
***/
struct dns_dbimplementation {
2020-02-13 14:44:37 -08:00
const char *name;
dns_dbcreatefunc_t create;
2020-02-13 14:44:37 -08:00
isc_mem_t *mctx;
void *driverarg;
ISC_LINK(dns_dbimplementation_t) link;
};
/***
*** Supported DB Implementations Registry
***/
/*
* Built in database implementations are registered here.
*/
1999-01-28 23:53:03 +00:00
#include "rbtdb.h"
unsigned int dns_pps = 0U;
static ISC_LIST(dns_dbimplementation_t) implementations;
static isc_rwlock_t implock;
2020-02-13 14:44:37 -08:00
static isc_once_t once = ISC_ONCE_INIT;
static dns_dbimplementation_t rbtimp;
static void
2020-02-13 14:44:37 -08:00
initialize(void) {
isc_rwlock_init(&implock, 0, 0);
rbtimp.name = "rbt";
rbtimp.create = dns_rbtdb_create;
rbtimp.mctx = NULL;
rbtimp.driverarg = NULL;
ISC_LINK_INIT(&rbtimp, link);
ISC_LIST_INIT(implementations);
ISC_LIST_APPEND(implementations, &rbtimp, link);
}
static inline dns_dbimplementation_t *
2020-02-13 14:44:37 -08:00
impfind(const char *name) {
dns_dbimplementation_t *imp;
for (imp = ISC_LIST_HEAD(implementations); imp != NULL;
2020-02-13 14:44:37 -08:00
imp = ISC_LIST_NEXT(imp, link))
{
if (strcasecmp(name, imp->name) == 0) {
return (imp);
}
}
return (NULL);
}
/***
*** Basic DB Methods
***/
isc_result_t
dns_db_create(isc_mem_t *mctx, const char *db_type, const dns_name_t *origin,
dns_dbtype_t type, dns_rdataclass_t rdclass, unsigned int argc,
2020-02-13 14:44:37 -08:00
char *argv[], dns_db_t **dbp) {
dns_dbimplementation_t *impinfo;
RUNTIME_CHECK(isc_once_do(&once, initialize) == ISC_R_SUCCESS);
/*
* Create a new database using implementation 'db_type'.
*/
REQUIRE(dbp != NULL && *dbp == NULL);
REQUIRE(dns_name_isabsolute(origin));
1999-01-28 23:53:03 +00:00
RWLOCK(&implock, isc_rwlocktype_read);
impinfo = impfind(db_type);
if (impinfo != NULL) {
isc_result_t result;
result = ((impinfo->create)(mctx, origin, type, rdclass, argc,
argv, impinfo->driverarg, dbp));
RWUNLOCK(&implock, isc_rwlocktype_read);
return (result);
}
RWUNLOCK(&implock, isc_rwlocktype_read);
1999-01-28 23:53:03 +00:00
isc_log_write(dns_lctx, DNS_LOGCATEGORY_DATABASE, DNS_LOGMODULE_DB,
ISC_LOG_ERROR, "unsupported database type '%s'", db_type);
return (ISC_R_NOTFOUND);
1999-01-28 23:53:03 +00:00
}
void
2020-02-13 14:44:37 -08:00
dns_db_attach(dns_db_t *source, dns_db_t **targetp) {
/*
* Attach *targetp to source.
*/
1999-01-28 23:53:03 +00:00
REQUIRE(DNS_DB_VALID(source));
REQUIRE(targetp != NULL && *targetp == NULL);
1999-01-28 23:53:03 +00:00
(source->methods->attach)(source, targetp);
ENSURE(*targetp == source);
1999-01-28 23:53:03 +00:00
}
void
2020-02-13 14:44:37 -08:00
dns_db_detach(dns_db_t **dbp) {
1999-01-28 23:53:03 +00:00
/*
* Detach *dbp from its database.
1999-01-28 23:53:03 +00:00
*/
REQUIRE(dbp != NULL);
REQUIRE(DNS_DB_VALID(*dbp));
((*dbp)->methods->detach)(dbp);
ENSURE(*dbp == NULL);
1999-01-28 23:53:03 +00:00
}
bool
2020-02-13 14:44:37 -08:00
dns_db_iscache(dns_db_t *db) {
/*
* Does 'db' have cache semantics?
*/
1999-01-28 23:53:03 +00:00
REQUIRE(DNS_DB_VALID(db));
if ((db->attributes & DNS_DBATTR_CACHE) != 0) {
return (true);
}
return (false);
1999-01-28 23:53:03 +00:00
}
bool
2020-02-13 14:44:37 -08:00
dns_db_iszone(dns_db_t *db) {
/*
* Does 'db' have zone semantics?
*/
1999-01-28 23:53:03 +00:00
REQUIRE(DNS_DB_VALID(db));
if ((db->attributes & (DNS_DBATTR_CACHE | DNS_DBATTR_STUB)) == 0) {
return (true);
}
return (false);
}
bool
2020-02-13 14:44:37 -08:00
dns_db_isstub(dns_db_t *db) {
/*
* Does 'db' have stub semantics?
*/
REQUIRE(DNS_DB_VALID(db));
if ((db->attributes & DNS_DBATTR_STUB) != 0) {
return (true);
}
return (false);
1999-01-28 23:53:03 +00:00
}
bool
2020-02-13 14:44:37 -08:00
dns_db_isdnssec(dns_db_t *db) {
/*
* Is 'db' secure or partially secure?
*/
REQUIRE(DNS_DB_VALID(db));
REQUIRE((db->attributes & DNS_DBATTR_CACHE) == 0);
if (db->methods->isdnssec != NULL) {
return ((db->methods->isdnssec)(db));
}
return ((db->methods->issecure)(db));
}
bool
2020-02-13 14:44:37 -08:00
dns_db_issecure(dns_db_t *db) {
1999-09-07 18:12:11 +00:00
/*
* Is 'db' secure?
*/
1999-09-07 18:12:11 +00:00
REQUIRE(DNS_DB_VALID(db));
REQUIRE((db->attributes & DNS_DBATTR_CACHE) == 0);
return ((db->methods->issecure)(db));
}
bool
2020-02-13 14:44:37 -08:00
dns_db_ispersistent(dns_db_t *db) {
/*
* Is 'db' persistent?
*/
REQUIRE(DNS_DB_VALID(db));
return ((db->methods->ispersistent)(db));
}
1999-02-01 21:21:35 +00:00
dns_name_t *
2020-02-13 14:44:37 -08:00
dns_db_origin(dns_db_t *db) {
/*
* The origin of the database.
*/
1999-02-01 21:21:35 +00:00
REQUIRE(DNS_DB_VALID(db));
return (&db->origin);
1999-02-01 21:21:35 +00:00
}
1999-04-20 22:26:12 +00:00
dns_rdataclass_t
2020-02-13 14:44:37 -08:00
dns_db_class(dns_db_t *db) {
1999-04-20 22:26:12 +00:00
/*
* The class of the database.
*/
REQUIRE(DNS_DB_VALID(db));
return (db->rdclass);
}
isc_result_t
2020-02-13 14:44:37 -08:00
dns_db_beginload(dns_db_t *db, dns_rdatacallbacks_t *callbacks) {
1999-07-30 23:32:19 +00:00
/*
* Begin loading 'db'.
*/
REQUIRE(DNS_DB_VALID(db));
REQUIRE(DNS_CALLBACK_VALID(callbacks));
1999-07-30 23:32:19 +00:00
return ((db->methods->beginload)(db, callbacks));
1999-07-30 23:32:19 +00:00
}
isc_result_t
2020-02-13 14:44:37 -08:00
dns_db_endload(dns_db_t *db, dns_rdatacallbacks_t *callbacks) {
dns_dbonupdatelistener_t *listener;
1999-07-30 23:32:19 +00:00
/*
* Finish loading 'db'.
*/
REQUIRE(DNS_DB_VALID(db));
REQUIRE(DNS_CALLBACK_VALID(callbacks));
REQUIRE(callbacks->add_private != NULL);
1999-07-30 23:32:19 +00:00
for (listener = ISC_LIST_HEAD(db->update_listeners); listener != NULL;
2020-02-13 14:44:37 -08:00
listener = ISC_LIST_NEXT(listener, link))
{
listener->onupdate(db, listener->onupdate_arg);
}
return ((db->methods->endload)(db, callbacks));
1999-07-30 23:32:19 +00:00
}
isc_result_t
dns_db_load(dns_db_t *db, const char *filename, dns_masterformat_t format,
2020-02-13 14:44:37 -08:00
unsigned int options) {
isc_result_t result, eresult;
1999-07-30 23:32:19 +00:00
dns_rdatacallbacks_t callbacks;
/*
* Load master file 'filename' into 'db'.
*/
1999-01-29 07:03:42 +00:00
REQUIRE(DNS_DB_VALID(db));
if ((db->attributes & DNS_DBATTR_CACHE) != 0) {
options |= DNS_MASTER_AGETTL;
}
1999-07-30 23:32:19 +00:00
dns_rdatacallbacks_init(&callbacks);
result = dns_db_beginload(db, &callbacks);
if (result != ISC_R_SUCCESS) {
1999-07-30 23:32:19 +00:00
return (result);
}
result = dns_master_loadfile(filename, &db->origin, &db->origin,
db->rdclass, options, 0, &callbacks, NULL,
NULL, db->mctx, format, 0);
eresult = dns_db_endload(db, &callbacks);
1999-07-30 23:32:19 +00:00
/*
* We always call dns_db_endload(), but we only want to return its
1999-08-05 22:12:38 +00:00
* result if dns_master_loadfile() succeeded. If dns_master_loadfile()
1999-07-30 23:32:19 +00:00
* failed, we want to return the result code it gave us.
*/
if (eresult != ISC_R_SUCCESS &&
2020-02-13 14:44:37 -08:00
(result == ISC_R_SUCCESS || result == DNS_R_SEENINCLUDE))
{
1999-07-30 23:32:19 +00:00
result = eresult;
}
1999-07-30 23:32:19 +00:00
return (result);
1999-01-29 07:03:42 +00:00
}
isc_result_t
2020-02-13 14:44:37 -08:00
dns_db_dump(dns_db_t *db, dns_dbversion_t *version, const char *filename) {
return ((db->methods->dump)(db, version, filename,
dns_masterformat_text));
}
/***
*** Version Methods
***/
1999-01-28 23:53:03 +00:00
void
2020-02-13 14:44:37 -08:00
dns_db_currentversion(dns_db_t *db, dns_dbversion_t **versionp) {
/*
* Open the current version for reading.
*/
1999-01-28 23:53:03 +00:00
REQUIRE(DNS_DB_VALID(db));
REQUIRE((db->attributes & DNS_DBATTR_CACHE) == 0);
REQUIRE(versionp != NULL && *versionp == NULL);
1999-01-28 23:53:03 +00:00
(db->methods->currentversion)(db, versionp);
}
isc_result_t
2020-02-13 14:44:37 -08:00
dns_db_newversion(dns_db_t *db, dns_dbversion_t **versionp) {
/*
* Open a new version for reading and writing.
*/
1999-01-28 23:53:03 +00:00
REQUIRE(DNS_DB_VALID(db));
REQUIRE((db->attributes & DNS_DBATTR_CACHE) == 0);
REQUIRE(versionp != NULL && *versionp == NULL);
1999-01-28 23:53:03 +00:00
return ((db->methods->newversion)(db, versionp));
}
1999-04-19 22:51:48 +00:00
void
dns_db_attachversion(dns_db_t *db, dns_dbversion_t *source,
2020-02-13 14:44:37 -08:00
dns_dbversion_t **targetp) {
1999-04-19 22:51:48 +00:00
/*
* Attach '*targetp' to 'source'.
*/
REQUIRE(DNS_DB_VALID(db));
REQUIRE((db->attributes & DNS_DBATTR_CACHE) == 0);
REQUIRE(source != NULL);
REQUIRE(targetp != NULL && *targetp == NULL);
1999-04-19 22:51:48 +00:00
(db->methods->attachversion)(db, source, targetp);
ENSURE(*targetp != NULL);
}
1999-04-19 22:51:48 +00:00
1999-01-28 23:53:03 +00:00
void
2020-02-13 14:44:37 -08:00
dns_db_closeversion(dns_db_t *db, dns_dbversion_t **versionp, bool commit) {
dns_dbonupdatelistener_t *listener;
/*
* Close version '*versionp'.
*/
1999-01-28 23:53:03 +00:00
REQUIRE(DNS_DB_VALID(db));
REQUIRE((db->attributes & DNS_DBATTR_CACHE) == 0);
REQUIRE(versionp != NULL && *versionp != NULL);
(db->methods->closeversion)(db, versionp, commit);
1999-01-28 23:53:03 +00:00
if (commit) {
for (listener = ISC_LIST_HEAD(db->update_listeners);
2020-02-13 14:44:37 -08:00
listener != NULL; listener = ISC_LIST_NEXT(listener, link))
{
listener->onupdate(db, listener->onupdate_arg);
}
}
ENSURE(*versionp == NULL);
1999-01-28 23:53:03 +00:00
}
/***
*** Node Methods
***/
1999-01-28 23:53:03 +00:00
isc_result_t
dns_db_findnode(dns_db_t *db, const dns_name_t *name, bool create,
2020-02-13 14:44:37 -08:00
dns_dbnode_t **nodep) {
/*
* Find the node with name 'name'.
*/
1999-01-28 23:53:03 +00:00
REQUIRE(DNS_DB_VALID(db));
REQUIRE(nodep != NULL && *nodep == NULL);
1999-01-28 23:53:03 +00:00
if (db->methods->findnode != NULL) {
return ((db->methods->findnode)(db, name, create, nodep));
} else {
return ((db->methods->findnodeext)(db, name, create, NULL, NULL,
nodep));
}
}
isc_result_t
dns_db_findnodeext(dns_db_t *db, const dns_name_t *name, bool create,
dns_clientinfomethods_t *methods,
2020-02-13 14:44:37 -08:00
dns_clientinfo_t *clientinfo, dns_dbnode_t **nodep) {
/*
* Find the node with name 'name', passing 'arg' to the database
* implementation.
*/
REQUIRE(DNS_DB_VALID(db));
REQUIRE(nodep != NULL && *nodep == NULL);
if (db->methods->findnodeext != NULL) {
return ((db->methods->findnodeext)(db, name, create, methods,
clientinfo, nodep));
} else {
return ((db->methods->findnode)(db, name, create, nodep));
}
1999-01-28 23:53:03 +00:00
}
isc_result_t
dns_db_findnsec3node(dns_db_t *db, const dns_name_t *name, bool create,
2020-02-13 14:44:37 -08:00
dns_dbnode_t **nodep) {
/*
* Find the node with name 'name'.
*/
REQUIRE(DNS_DB_VALID(db));
REQUIRE(nodep != NULL && *nodep == NULL);
return ((db->methods->findnsec3node)(db, name, create, nodep));
}
isc_result_t
dns_db_find(dns_db_t *db, const dns_name_t *name, dns_dbversion_t *version,
dns_rdatatype_t type, unsigned int options, isc_stdtime_t now,
1999-04-01 04:03:22 +00:00
dns_dbnode_t **nodep, dns_name_t *foundname,
2020-02-13 14:44:37 -08:00
dns_rdataset_t *rdataset, dns_rdataset_t *sigrdataset) {
/*
* Find the best match for 'name' and 'type' in version 'version'
* of 'db'.
*/
REQUIRE(DNS_DB_VALID(db));
REQUIRE(type != dns_rdatatype_rrsig);
2018-07-11 10:46:25 +10:00
REQUIRE(nodep == NULL || *nodep == NULL);
REQUIRE(dns_name_hasbuffer(foundname));
REQUIRE(rdataset == NULL || (DNS_RDATASET_VALID(rdataset) &&
!dns_rdataset_isassociated(rdataset)));
1999-08-31 22:14:06 +00:00
REQUIRE(sigrdataset == NULL ||
(DNS_RDATASET_VALID(sigrdataset) &&
!dns_rdataset_isassociated(sigrdataset)));
if (db->methods->find != NULL) {
return ((db->methods->find)(db, name, version, type, options,
now, nodep, foundname, rdataset,
sigrdataset));
} else {
return ((db->methods->findext)(db, name, version, type, options,
now, nodep, foundname, NULL,
NULL, rdataset, sigrdataset));
}
}
isc_result_t
dns_db_findext(dns_db_t *db, const dns_name_t *name, dns_dbversion_t *version,
dns_rdatatype_t type, unsigned int options, isc_stdtime_t now,
dns_dbnode_t **nodep, dns_name_t *foundname,
dns_clientinfomethods_t *methods, dns_clientinfo_t *clientinfo,
2020-02-13 14:44:37 -08:00
dns_rdataset_t *rdataset, dns_rdataset_t *sigrdataset) {
/*
* Find the best match for 'name' and 'type' in version 'version'
* of 'db', passing in 'arg'.
*/
REQUIRE(DNS_DB_VALID(db));
REQUIRE(type != dns_rdatatype_rrsig);
2018-07-11 10:46:25 +10:00
REQUIRE(nodep == NULL || *nodep == NULL);
REQUIRE(dns_name_hasbuffer(foundname));
REQUIRE(rdataset == NULL || (DNS_RDATASET_VALID(rdataset) &&
!dns_rdataset_isassociated(rdataset)));
REQUIRE(sigrdataset == NULL ||
(DNS_RDATASET_VALID(sigrdataset) &&
!dns_rdataset_isassociated(sigrdataset)));
if (db->methods->findext != NULL) {
return ((db->methods->findext)(
db, name, version, type, options, now, nodep, foundname,
methods, clientinfo, rdataset, sigrdataset));
} else {
return ((db->methods->find)(db, name, version, type, options,
now, nodep, foundname, rdataset,
sigrdataset));
}
1999-04-01 04:03:22 +00:00
}
isc_result_t
dns_db_findzonecut(dns_db_t *db, const dns_name_t *name, unsigned int options,
isc_stdtime_t now, dns_dbnode_t **nodep,
dns_name_t *foundname, dns_name_t *dcname,
2020-02-13 14:44:37 -08:00
dns_rdataset_t *rdataset, dns_rdataset_t *sigrdataset) {
1999-10-21 17:50:36 +00:00
/*
* Find the deepest known zonecut which encloses 'name' in 'db'.
* foundname is the zonecut, dcname is the deepest name we have
* in database that is part of queried name.
1999-10-21 17:50:36 +00:00
*/
REQUIRE(DNS_DB_VALID(db));
REQUIRE((db->attributes & DNS_DBATTR_CACHE) != 0);
2018-07-11 10:46:25 +10:00
REQUIRE(nodep == NULL || *nodep == NULL);
1999-10-21 17:50:36 +00:00
REQUIRE(dns_name_hasbuffer(foundname));
REQUIRE(sigrdataset == NULL ||
(DNS_RDATASET_VALID(sigrdataset) &&
!dns_rdataset_isassociated(sigrdataset)));
1999-10-21 17:50:36 +00:00
return ((db->methods->findzonecut)(db, name, options, now, nodep,
foundname, dcname, rdataset,
sigrdataset));
1999-10-21 17:50:36 +00:00
}
1999-01-28 23:53:03 +00:00
void
2020-02-13 14:44:37 -08:00
dns_db_attachnode(dns_db_t *db, dns_dbnode_t *source, dns_dbnode_t **targetp) {
/*
* Attach *targetp to source.
*/
1999-01-28 23:53:03 +00:00
REQUIRE(DNS_DB_VALID(db));
REQUIRE(source != NULL);
REQUIRE(targetp != NULL && *targetp == NULL);
1999-01-28 23:53:03 +00:00
(db->methods->attachnode)(db, source, targetp);
}
void
2020-02-13 14:44:37 -08:00
dns_db_detachnode(dns_db_t *db, dns_dbnode_t **nodep) {
/*
* Detach *nodep from its node.
*/
1999-01-28 23:53:03 +00:00
REQUIRE(DNS_DB_VALID(db));
REQUIRE(nodep != NULL && *nodep != NULL);
1999-01-28 23:53:03 +00:00
(db->methods->detachnode)(db, nodep);
ENSURE(*nodep == NULL);
1999-01-28 23:53:03 +00:00
}
void
dns_db_transfernode(dns_db_t *db, dns_dbnode_t **sourcep,
2020-02-13 14:44:37 -08:00
dns_dbnode_t **targetp) {
REQUIRE(DNS_DB_VALID(db));
REQUIRE(targetp != NULL && *targetp == NULL);
/*
* This doesn't check the implementation magic. If we find that
* we need such checks in future then this will be done in the
* method.
*/
REQUIRE(sourcep != NULL && *sourcep != NULL);
UNUSED(db);
if (db->methods->transfernode == NULL) {
2008-04-01 23:47:10 +00:00
*targetp = *sourcep;
*sourcep = NULL;
} else {
2008-04-01 23:47:10 +00:00
(db->methods->transfernode)(db, sourcep, targetp);
}
ENSURE(*sourcep == NULL);
}
isc_result_t
2020-02-13 14:44:37 -08:00
dns_db_expirenode(dns_db_t *db, dns_dbnode_t *node, isc_stdtime_t now) {
1999-05-06 00:32:32 +00:00
/*
* Mark as stale all records at 'node' which expire at or before 'now'.
*/
REQUIRE(DNS_DB_VALID(db));
REQUIRE((db->attributes & DNS_DBATTR_CACHE) != 0);
REQUIRE(node != NULL);
return ((db->methods->expirenode)(db, node, now));
}
1999-03-05 23:25:44 +00:00
void
2020-02-13 14:44:37 -08:00
dns_db_printnode(dns_db_t *db, dns_dbnode_t *node, FILE *out) {
1999-03-05 23:25:44 +00:00
/*
* Print a textual representation of the contents of the node to
* 'out'.
*/
REQUIRE(DNS_DB_VALID(db));
REQUIRE(node != NULL);
(db->methods->printnode)(db, node, out);
}
1999-03-08 19:00:55 +00:00
/***
*** DB Iterator Creation
***/
isc_result_t
dns_db_createiterator(dns_db_t *db, unsigned int flags,
2020-02-13 14:44:37 -08:00
dns_dbiterator_t **iteratorp) {
1999-03-08 19:00:55 +00:00
/*
* Create an iterator for version 'version' of 'db'.
*/
REQUIRE(DNS_DB_VALID(db));
REQUIRE(iteratorp != NULL && *iteratorp == NULL);
return (db->methods->createiterator(db, flags, iteratorp));
1999-03-08 19:00:55 +00:00
}
/***
*** Rdataset Methods
***/
isc_result_t
1999-01-28 23:53:03 +00:00
dns_db_findrdataset(dns_db_t *db, dns_dbnode_t *node, dns_dbversion_t *version,
1999-08-31 22:14:06 +00:00
dns_rdatatype_t type, dns_rdatatype_t covers,
1999-09-08 01:10:08 +00:00
isc_stdtime_t now, dns_rdataset_t *rdataset,
2020-02-13 14:44:37 -08:00
dns_rdataset_t *sigrdataset) {
1999-01-28 23:53:03 +00:00
REQUIRE(DNS_DB_VALID(db));
REQUIRE(node != NULL);
REQUIRE(DNS_RDATASET_VALID(rdataset));
REQUIRE(!dns_rdataset_isassociated(rdataset));
REQUIRE(covers == 0 || type == dns_rdatatype_rrsig);
1999-08-31 22:14:06 +00:00
REQUIRE(type != dns_rdatatype_any);
1999-09-08 01:10:08 +00:00
REQUIRE(sigrdataset == NULL ||
(DNS_RDATASET_VALID(sigrdataset) &&
!dns_rdataset_isassociated(sigrdataset)));
1999-01-28 23:53:03 +00:00
return ((db->methods->findrdataset)(db, node, version, type, covers,
now, rdataset, sigrdataset));
1999-01-28 23:53:03 +00:00
}
isc_result_t
1999-03-11 06:00:22 +00:00
dns_db_allrdatasets(dns_db_t *db, dns_dbnode_t *node, dns_dbversion_t *version,
2020-02-13 14:44:37 -08:00
isc_stdtime_t now, dns_rdatasetiter_t **iteratorp) {
1999-03-11 06:00:22 +00:00
/*
* Make '*iteratorp' an rdataset iteratator for all rdatasets at
* 'node' in version 'version' of 'db'.
*/
REQUIRE(DNS_DB_VALID(db));
REQUIRE(iteratorp != NULL && *iteratorp == NULL);
return ((db->methods->allrdatasets)(db, node, version, now, iteratorp));
1999-03-11 06:00:22 +00:00
}
isc_result_t
1999-01-28 23:53:03 +00:00
dns_db_addrdataset(dns_db_t *db, dns_dbnode_t *node, dns_dbversion_t *version,
isc_stdtime_t now, dns_rdataset_t *rdataset,
2020-02-13 14:44:37 -08:00
unsigned int options, dns_rdataset_t *addedrdataset) {
/*
* Add 'rdataset' to 'node' in version 'version' of 'db'.
*/
1999-01-28 23:53:03 +00:00
REQUIRE(DNS_DB_VALID(db));
REQUIRE(node != NULL);
REQUIRE(((db->attributes & DNS_DBATTR_CACHE) == 0 && version != NULL) ||
((db->attributes & DNS_DBATTR_CACHE) != 0 && version == NULL &&
(options & DNS_DBADD_MERGE) == 0));
REQUIRE((options & DNS_DBADD_EXACT) == 0 ||
(options & DNS_DBADD_MERGE) != 0);
REQUIRE(DNS_RDATASET_VALID(rdataset));
REQUIRE(dns_rdataset_isassociated(rdataset));
REQUIRE(rdataset->rdclass == db->rdclass);
REQUIRE(addedrdataset == NULL ||
(DNS_RDATASET_VALID(addedrdataset) &&
!dns_rdataset_isassociated(addedrdataset)));
1999-01-28 23:53:03 +00:00
return ((db->methods->addrdataset)(db, node, version, now, rdataset,
2000-01-25 19:26:45 +00:00
options, addedrdataset));
}
isc_result_t
dns_db_subtractrdataset(dns_db_t *db, dns_dbnode_t *node,
dns_dbversion_t *version, dns_rdataset_t *rdataset,
2020-02-13 14:44:37 -08:00
unsigned int options, dns_rdataset_t *newrdataset) {
/*
* Remove any rdata in 'rdataset' from 'node' in version 'version' of
* 'db'.
*/
REQUIRE(DNS_DB_VALID(db));
REQUIRE(node != NULL);
1999-06-17 00:30:46 +00:00
REQUIRE((db->attributes & DNS_DBATTR_CACHE) == 0 && version != NULL);
REQUIRE(DNS_RDATASET_VALID(rdataset));
REQUIRE(dns_rdataset_isassociated(rdataset));
REQUIRE(rdataset->rdclass == db->rdclass);
REQUIRE(newrdataset == NULL ||
(DNS_RDATASET_VALID(newrdataset) &&
!dns_rdataset_isassociated(newrdataset)));
return ((db->methods->subtractrdataset)(db, node, version, rdataset,
options, newrdataset));
1999-01-28 23:53:03 +00:00
}
isc_result_t
1999-01-28 23:53:03 +00:00
dns_db_deleterdataset(dns_db_t *db, dns_dbnode_t *node,
dns_dbversion_t *version, dns_rdatatype_t type,
2020-02-13 14:44:37 -08:00
dns_rdatatype_t covers) {
/*
* Make it so that no rdataset of type 'type' exists at 'node' in
* version version 'version' of 'db'.
*/
1999-01-28 23:53:03 +00:00
REQUIRE(DNS_DB_VALID(db));
REQUIRE(node != NULL);
REQUIRE(((db->attributes & DNS_DBATTR_CACHE) == 0 && version != NULL) ||
((db->attributes & DNS_DBATTR_CACHE) != 0 && version == NULL));
1999-01-28 23:53:03 +00:00
return ((db->methods->deleterdataset)(db, node, version, type, covers));
1999-01-28 23:53:03 +00:00
}
2008-04-01 23:47:10 +00:00
void
2020-02-13 14:44:37 -08:00
dns_db_overmem(dns_db_t *db, bool overmem) {
2000-08-31 12:15:17 +00:00
REQUIRE(DNS_DB_VALID(db));
(db->methods->overmem)(db, overmem);
}
isc_result_t
2020-02-13 14:44:37 -08:00
dns_db_getsoaserial(dns_db_t *db, dns_dbversion_t *ver, uint32_t *serialp) {
isc_result_t result;
dns_dbnode_t *node = NULL;
dns_rdataset_t rdataset;
2020-02-13 14:44:37 -08:00
dns_rdata_t rdata = DNS_RDATA_INIT;
isc_buffer_t buffer;
REQUIRE(dns_db_iszone(db) || dns_db_isstub(db));
result = dns_db_findnode(db, dns_db_origin(db), false, &node);
if (result != ISC_R_SUCCESS) {
return (result);
}
dns_rdataset_init(&rdataset);
result = dns_db_findrdataset(db, node, ver, dns_rdatatype_soa, 0,
(isc_stdtime_t)0, &rdataset, NULL);
if (result != ISC_R_SUCCESS) {
goto freenode;
}
result = dns_rdataset_first(&rdataset);
if (result != ISC_R_SUCCESS) {
goto freerdataset;
}
dns_rdataset_current(&rdataset, &rdata);
result = dns_rdataset_next(&rdataset);
INSIST(result == ISC_R_NOMORE);
INSIST(rdata.length > 20);
isc_buffer_init(&buffer, rdata.data, rdata.length);
isc_buffer_add(&buffer, rdata.length);
isc_buffer_forward(&buffer, rdata.length - 20);
*serialp = isc_buffer_getuint32(&buffer);
result = ISC_R_SUCCESS;
freerdataset:
dns_rdataset_disassociate(&rdataset);
freenode:
dns_db_detachnode(db, &node);
return (result);
}
unsigned int
2020-02-13 14:44:37 -08:00
dns_db_nodecount(dns_db_t *db) {
REQUIRE(DNS_DB_VALID(db));
return ((db->methods->nodecount)(db));
}
2015-12-09 19:07:20 +05:30
size_t
2020-02-13 14:44:37 -08:00
dns_db_hashsize(dns_db_t *db) {
REQUIRE(DNS_DB_VALID(db));
if (db->methods->hashsize == NULL) {
2015-12-09 19:07:20 +05:30
return (0);
}
return ((db->methods->hashsize)(db));
}
Fix the rbt hashtable and grow it when setting max-cache-size There were several problems with rbt hashtable implementation: 1. Our internal hashing function returns uint64_t value, but it was silently truncated to unsigned int in dns_name_hash() and dns_name_fullhash() functions. As the SipHash 2-4 higher bits are more random, we need to use the upper half of the return value. 2. The hashtable implementation in rbt.c was using modulo to pick the slot number for the hash table. This has several problems because modulo is: a) slow, b) oblivious to patterns in the input data. This could lead to very uneven distribution of the hashed data in the hashtable. Combined with the single-linked lists we use, it could really hog-down the lookup and removal of the nodes from the rbt tree[a]. The Fibonacci Hashing is much better fit for the hashtable function here. For longer description, read "Fibonacci Hashing: The Optimization that the World Forgot"[b] or just look at the Linux kernel. Also this will make Diego very happy :). 3. The hashtable would rehash every time the number of nodes in the rbt tree would exceed 3 * (hashtable size). The overcommit will make the uneven distribution in the hashtable even worse, but the main problem lies in the rehashing - every time the database grows beyond the limit, each subsequent rehashing will be much slower. The mitigation here is letting the rbt know how big the cache can grown and pre-allocate the hashtable to be big enough to actually never need to rehash. This will consume more memory at the start, but since the size of the hashtable is capped to `1 << 32` (e.g. 4 mio entries), it will only consume maximum of 32GB of memory for hashtable in the worst case (and max-cache-size would need to be set to more than 4TB). Calling the dns_db_adjusthashsize() will also cap the maximum size of the hashtable to the pre-computed number of bits, so it won't try to consume more gigabytes of memory than available for the database. FIXME: What is the average size of the rbt node that gets hashed? I chose the pagesize (4k) as initial value to precompute the size of the hashtable, but the value is based on feeling and not any real data. For future work, there are more places where we use result of the hash value modulo some small number and that would benefit from Fibonacci Hashing to get better distribution. Notes: a. A doubly linked list should be used here to speedup the removal of the entries from the hashtable. b. https://probablydance.com/2018/06/16/fibonacci-hashing-the-optimization-that-the-world-forgot-or-a-better-alternative-to-integer-modulo/
2020-07-16 10:29:54 +02:00
isc_result_t
dns_db_adjusthashsize(dns_db_t *db, size_t size) {
REQUIRE(DNS_DB_VALID(db));
if (db->methods->adjusthashsize != NULL) {
return ((db->methods->adjusthashsize)(db, size));
}
return (ISC_R_NOTIMPLEMENTED);
}
void
2020-02-13 14:44:37 -08:00
dns_db_settask(dns_db_t *db, isc_task_t *task) {
REQUIRE(DNS_DB_VALID(db));
(db->methods->settask)(db, task);
}
isc_result_t
dns_db_register(const char *name, dns_dbcreatefunc_t create, void *driverarg,
2020-02-13 14:44:37 -08:00
isc_mem_t *mctx, dns_dbimplementation_t **dbimp) {
dns_dbimplementation_t *imp;
REQUIRE(name != NULL);
REQUIRE(dbimp != NULL && *dbimp == NULL);
RUNTIME_CHECK(isc_once_do(&once, initialize) == ISC_R_SUCCESS);
RWLOCK(&implock, isc_rwlocktype_write);
imp = impfind(name);
if (imp != NULL) {
RWUNLOCK(&implock, isc_rwlocktype_write);
return (ISC_R_EXISTS);
}
2008-04-01 23:47:10 +00:00
imp = isc_mem_get(mctx, sizeof(dns_dbimplementation_t));
imp->name = name;
imp->create = create;
imp->mctx = NULL;
imp->driverarg = driverarg;
isc_mem_attach(mctx, &imp->mctx);
ISC_LINK_INIT(imp, link);
ISC_LIST_APPEND(implementations, imp, link);
RWUNLOCK(&implock, isc_rwlocktype_write);
*dbimp = imp;
return (ISC_R_SUCCESS);
}
void
2020-02-13 14:44:37 -08:00
dns_db_unregister(dns_dbimplementation_t **dbimp) {
dns_dbimplementation_t *imp;
REQUIRE(dbimp != NULL && *dbimp != NULL);
RUNTIME_CHECK(isc_once_do(&once, initialize) == ISC_R_SUCCESS);
imp = *dbimp;
*dbimp = NULL;
RWLOCK(&implock, isc_rwlocktype_write);
ISC_LIST_UNLINK(implementations, imp, link);
isc_mem_putanddetach(&imp->mctx, imp, sizeof(dns_dbimplementation_t));
RWUNLOCK(&implock, isc_rwlocktype_write);
ENSURE(*dbimp == NULL);
}
isc_result_t
2020-02-13 14:44:37 -08:00
dns_db_getoriginnode(dns_db_t *db, dns_dbnode_t **nodep) {
REQUIRE(DNS_DB_VALID(db));
REQUIRE(dns_db_iszone(db));
REQUIRE(nodep != NULL && *nodep == NULL);
if (db->methods->getoriginnode != NULL) {
return ((db->methods->getoriginnode)(db, nodep));
}
return (ISC_R_NOTFOUND);
}
dns_stats_t *
2020-02-13 14:44:37 -08:00
dns_db_getrrsetstats(dns_db_t *db) {
REQUIRE(DNS_DB_VALID(db));
if (db->methods->getrrsetstats != NULL) {
return ((db->methods->getrrsetstats)(db));
}
return (NULL);
}
isc_result_t
2020-02-13 14:44:37 -08:00
dns_db_setcachestats(dns_db_t *db, isc_stats_t *stats) {
REQUIRE(DNS_DB_VALID(db));
if (db->methods->setcachestats != NULL) {
return ((db->methods->setcachestats)(db, stats));
}
return (ISC_R_NOTIMPLEMENTED);
}
isc_result_t
dns_db_getnsec3parameters(dns_db_t *db, dns_dbversion_t *version,
dns_hash_t *hash, uint8_t *flags,
uint16_t *iterations, unsigned char *salt,
2020-02-13 14:44:37 -08:00
size_t *salt_length) {
REQUIRE(DNS_DB_VALID(db));
REQUIRE(dns_db_iszone(db));
if (db->methods->getnsec3parameters != NULL) {
return ((db->methods->getnsec3parameters)(db, version, hash,
flags, iterations,
salt, salt_length));
}
return (ISC_R_NOTFOUND);
}
isc_result_t
dns_db_getsize(dns_db_t *db, dns_dbversion_t *version, uint64_t *records,
2020-02-13 14:44:37 -08:00
uint64_t *bytes) {
REQUIRE(DNS_DB_VALID(db));
REQUIRE(dns_db_iszone(db));
if (db->methods->getsize != NULL) {
return ((db->methods->getsize)(db, version, records, bytes));
}
return (ISC_R_NOTFOUND);
}
isc_result_t
dns_db_setsigningtime(dns_db_t *db, dns_rdataset_t *rdataset,
2020-02-13 14:44:37 -08:00
isc_stdtime_t resign) {
if (db->methods->setsigningtime != NULL) {
return ((db->methods->setsigningtime)(db, rdataset, resign));
}
return (ISC_R_NOTIMPLEMENTED);
}
isc_result_t
2020-02-13 14:44:37 -08:00
dns_db_getsigningtime(dns_db_t *db, dns_rdataset_t *rdataset,
dns_name_t *name) {
if (db->methods->getsigningtime != NULL) {
return ((db->methods->getsigningtime)(db, rdataset, name));
}
return (ISC_R_NOTFOUND);
}
void
dns_db_resigned(dns_db_t *db, dns_rdataset_t *rdataset,
2020-02-13 14:44:37 -08:00
dns_dbversion_t *version) {
if (db->methods->resigned != NULL) {
2008-04-01 03:02:20 +00:00
(db->methods->resigned)(db, rdataset, version);
}
}
/*
* Attach a database to policy zone databases.
* This should only happen when the caller has already ensured that
* it is dealing with a database that understands response policy zones.
*/
void
2020-02-13 14:44:37 -08:00
dns_db_rpz_attach(dns_db_t *db, void *rpzs, uint8_t rpz_num) {
REQUIRE(db->methods->rpz_attach != NULL);
(db->methods->rpz_attach)(db, rpzs, rpz_num);
}
/*
* Finish loading a response policy zone.
*/
isc_result_t
2020-02-13 14:44:37 -08:00
dns_db_rpz_ready(dns_db_t *db) {
if (db->methods->rpz_ready == NULL) {
return (ISC_R_SUCCESS);
}
return ((db->methods->rpz_ready)(db));
}
/**
* Attach a notify-on-update function the database
*/
isc_result_t
dns_db_updatenotify_register(dns_db_t *db, dns_dbupdate_callback_t fn,
2020-02-13 14:44:37 -08:00
void *fn_arg) {
dns_dbonupdatelistener_t *listener;
REQUIRE(db != NULL);
REQUIRE(fn != NULL);
listener = isc_mem_get(db->mctx, sizeof(dns_dbonupdatelistener_t));
listener->onupdate = fn;
listener->onupdate_arg = fn_arg;
ISC_LINK_INIT(listener, link);
ISC_LIST_APPEND(db->update_listeners, listener, link);
return (ISC_R_SUCCESS);
}
isc_result_t
dns_db_updatenotify_unregister(dns_db_t *db, dns_dbupdate_callback_t fn,
2020-02-13 14:44:37 -08:00
void *fn_arg) {
dns_dbonupdatelistener_t *listener;
REQUIRE(db != NULL);
for (listener = ISC_LIST_HEAD(db->update_listeners); listener != NULL;
2020-02-13 14:44:37 -08:00
listener = ISC_LIST_NEXT(listener, link))
{
if ((listener->onupdate == fn) &&
(listener->onupdate_arg == fn_arg)) {
ISC_LIST_UNLINK(db->update_listeners, listener, link);
isc_mem_put(db->mctx, listener,
sizeof(dns_dbonupdatelistener_t));
return (ISC_R_SUCCESS);
}
}
return (ISC_R_NOTFOUND);
}
isc_result_t
2020-02-13 14:44:37 -08:00
dns_db_nodefullname(dns_db_t *db, dns_dbnode_t *node, dns_name_t *name) {
REQUIRE(db != NULL);
REQUIRE(node != NULL);
REQUIRE(name != NULL);
if (db->methods->nodefullname == NULL) {
return (ISC_R_NOTIMPLEMENTED);
}
return ((db->methods->nodefullname)(db, node, name));
}
isc_result_t
2020-02-13 14:44:37 -08:00
dns_db_setservestalettl(dns_db_t *db, dns_ttl_t ttl) {
REQUIRE(DNS_DB_VALID(db));
REQUIRE((db->attributes & DNS_DBATTR_CACHE) != 0);
if (db->methods->setservestalettl != NULL) {
return ((db->methods->setservestalettl)(db, ttl));
}
return (ISC_R_NOTIMPLEMENTED);
}
isc_result_t
2020-02-13 14:44:37 -08:00
dns_db_getservestalettl(dns_db_t *db, dns_ttl_t *ttl) {
REQUIRE(DNS_DB_VALID(db));
REQUIRE((db->attributes & DNS_DBATTR_CACHE) != 0);
if (db->methods->getservestalettl != NULL) {
return ((db->methods->getservestalettl)(db, ttl));
}
return (ISC_R_NOTIMPLEMENTED);
}
Add stale-refresh-time option Before this update, BIND would attempt to do a full recursive resolution process for each query received if the requested rrset had its ttl expired. If the resolution fails for any reason, only then BIND would check for stale rrset in cache (if 'stale-cache-enable' and 'stale-answer-enable' is on). The problem with this approach is that if an authoritative server is unreachable or is failing to respond, it is very unlikely that the problem will be fixed in the next seconds. A better approach to improve performance in those cases, is to mark the moment in which a resolution failed, and if new queries arrive for that same rrset, try to respond directly from the stale cache, and do that for a window of time configured via 'stale-refresh-time'. Only when this interval expires we then try to do a normal refresh of the rrset. The logic behind this commit is as following: - In query.c / query_gotanswer(), if the test of 'result' variable falls to the default case, an error is assumed to have happened, and a call to 'query_usestale()' is made to check if serving of stale rrset is enabled in configuration. - If serving of stale answers is enabled, a flag will be turned on in the query context to look for stale records: query.c:6839 qctx->client->query.dboptions |= DNS_DBFIND_STALEOK; - A call to query_lookup() will be made again, inside it a call to 'dns_db_findext()' is made, which in turn will invoke rbdb.c / cache_find(). - In rbtdb.c / cache_find() the important bits of this change is the call to 'check_stale_header()', which is a function that yields true if we should skip the stale entry, or false if we should consider it. - In check_stale_header() we now check if the DNS_DBFIND_STALEOK option is set, if that is the case we know that this new search for stale records was made due to a failure in a normal resolution, so we keep track of the time in which the failured occured in rbtdb.c:4559: header->last_refresh_fail_ts = search->now; - In check_stale_header(), if DNS_DBFIND_STALEOK is not set, then we know this is a normal lookup, if the record is stale and the query time is between last failure time + stale-refresh-time window, then we return false so cache_find() knows it can consider this stale rrset entry to return as a response. The last additions are two new methods to the database interface: - setservestale_refresh - getservestale_refresh Those were added so rbtdb can be aware of the value set in configuration option, since in that level we have no access to the view object.
2020-10-19 17:02:03 -03:00
isc_result_t
dns_db_setservestalerefresh(dns_db_t *db, uint32_t interval) {
REQUIRE(DNS_DB_VALID(db));
REQUIRE((db->attributes & DNS_DBATTR_CACHE) != 0);
if (db->methods->setservestalerefresh != NULL) {
return ((db->methods->setservestalerefresh)(db, interval));
}
return (ISC_R_NOTIMPLEMENTED);
}
isc_result_t
dns_db_getservestalerefresh(dns_db_t *db, uint32_t *interval) {
REQUIRE(DNS_DB_VALID(db));
REQUIRE((db->attributes & DNS_DBATTR_CACHE) != 0);
if (db->methods->getservestalerefresh != NULL) {
return ((db->methods->getservestalerefresh)(db, interval));
}
return (ISC_R_NOTIMPLEMENTED);
}
isc_result_t
2020-02-13 14:44:37 -08:00
dns_db_setgluecachestats(dns_db_t *db, isc_stats_t *stats) {
REQUIRE(dns_db_iszone(db));
REQUIRE(stats != NULL);
if (db->methods->setgluecachestats != NULL) {
return ((db->methods->setgluecachestats)(db, stats));
}
return (ISC_R_NOTIMPLEMENTED);
}