source: branches/samba-3.3.x/source/nmbd/asyncdns.c@ 309

Last change on this file since 309 was 206, checked in by Herwig Bauernfeind, 16 years ago

Import Samba 3.3 branch at 3.0.0 level (psmedley's port)

File size: 10.5 KB
Line 
1/*
2 Unix SMB/CIFS implementation.
3 a async DNS handler
4 Copyright (C) Andrew Tridgell 1997-1998
5
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
10
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
18 */
19
20#include "includes.h"
21
22/***************************************************************************
23 Add a DNS result to the name cache.
24****************************************************************************/
25
26static struct name_record *add_dns_result(struct nmb_name *question, struct in_addr addr)
27{
28 int name_type = question->name_type;
29 unstring qname;
30
31 pull_ascii_nstring(qname, sizeof(qname), question->name);
32
33 if (!addr.s_addr) {
34 /* add the fail to WINS cache of names. give it 1 hour in the cache */
35 DEBUG(3,("add_dns_result: Negative DNS answer for %s\n", qname));
36 add_name_to_subnet( wins_server_subnet, qname, name_type,
37 NB_ACTIVE, 60*60, DNSFAIL_NAME, 1, &addr );
38 return NULL;
39 }
40
41 /* add it to our WINS cache of names. give it 2 hours in the cache */
42 DEBUG(3,("add_dns_result: DNS gave answer for %s of %s\n", qname, inet_ntoa(addr)));
43
44 add_name_to_subnet( wins_server_subnet, qname, name_type,
45 NB_ACTIVE, 2*60*60, DNS_NAME, 1, &addr);
46
47 return find_name_on_subnet(wins_server_subnet, question, FIND_ANY_NAME);
48}
49
50#ifndef SYNC_DNS
51
52static int fd_in = -1, fd_out = -1;
53static pid_t child_pid = -1;
54static int in_dns;
55
56/* this is the structure that is passed between the parent and child */
57struct query_record {
58 struct nmb_name name;
59 struct in_addr result;
60};
61
62/* a queue of pending requests waiting to be sent to the DNS child */
63static struct packet_struct *dns_queue;
64
65/* the packet currently being processed by the dns child */
66static struct packet_struct *dns_current;
67
68
69/***************************************************************************
70 return the fd used to gather async dns replies. This is added to the select
71 loop
72 ****************************************************************************/
73
74int asyncdns_fd(void)
75{
76 return fd_in;
77}
78
79/***************************************************************************
80 handle DNS queries arriving from the parent
81 ****************************************************************************/
82static void asyncdns_process(void)
83{
84 struct query_record r;
85 unstring qname;
86
87 DEBUGLEVEL = -1;
88
89 while (1) {
90 NTSTATUS status;
91
92 status = read_data(fd_in, (char *)&r, sizeof(r));
93
94 if (!NT_STATUS_IS_OK(status)) {
95 break;
96 }
97
98 pull_ascii_nstring( qname, sizeof(qname), r.name.name);
99 r.result.s_addr = interpret_addr(qname);
100
101 if (write_data(fd_out, (char *)&r, sizeof(r)) != sizeof(r))
102 break;
103 }
104
105 _exit(0);
106}
107
108/**************************************************************************** **
109 catch a sigterm (in the child process - the parent has a different handler
110 see nmbd.c for details).
111 We need a separate term handler here so we don't release any
112 names that our parent is going to release, or overwrite a
113 WINS db that our parent is going to write.
114 **************************************************************************** */
115
116static void sig_term(int sig)
117{
118 _exit(0);
119}
120
121/***************************************************************************
122 Called by the parent process when it receives a SIGTERM - also kills the
123 child so we don't get child async dns processes lying around, causing trouble.
124 ****************************************************************************/
125
126void kill_async_dns_child(void)
127{
128 if (child_pid > 0) {
129 kill(child_pid, SIGTERM);
130 child_pid = -1;
131 }
132}
133
134/***************************************************************************
135 create a child process to handle DNS lookups
136 ****************************************************************************/
137void start_async_dns(void)
138{
139 int fd1[2], fd2[2];
140
141 CatchChild();
142
143#ifdef __OS2__
144// cant use pipes here, because select() from innotek lib does work only for sockets.
145 if (socketpair(AF_UNIX, SOCK_STREAM, 0, fd1) < 0)
146 {
147 DEBUG(0,("can't create asyncdns socketpair1 %d\n", errno));
148 return;
149 }
150 if (socketpair(AF_UNIX, SOCK_STREAM, 0, fd2) < 0)
151 {
152 DEBUG(0,("can't create asyncdns socketpair2 %d\n", errno));
153 close(fd1[0]);
154 close(fd1[1]);
155 return;
156 }
157DEBUG(9,("!!!!!!PIPES %d %d %d %d\n", fd1[0], fd1[1], fd2[0], fd2[1]));
158#else
159 if (pipe(fd1) || pipe(fd2)) {
160 DEBUG(0,("can't create asyncdns pipes\n"));
161 return;
162 }
163#endif /* __OS2__ */
164 child_pid = sys_fork();
165
166 if (child_pid) {
167 fd_in = fd1[0];
168 fd_out = fd2[1];
169 close(fd1[1]);
170 close(fd2[0]);
171 DEBUG(0,("started asyncdns process %d\n", (int)child_pid));
172 return;
173 }
174
175 fd_in = fd2[0];
176 fd_out = fd1[1];
177
178 CatchSignal(SIGUSR2, SIG_IGN);
179 CatchSignal(SIGUSR1, SIG_IGN);
180 CatchSignal(SIGHUP, SIG_IGN);
181 CatchSignal(SIGTERM, SIGNAL_CAST sig_term );
182
183 if (!reinit_after_fork(nmbd_messaging_context(),
184 nmbd_event_context(), true)) {
185 DEBUG(0,("reinit_after_fork() failed\n"));
186 smb_panic("reinit_after_fork() failed");
187 }
188
189 asyncdns_process();
190}
191
192
193/***************************************************************************
194check if a particular name is already being queried
195 ****************************************************************************/
196static bool query_current(struct query_record *r)
197{
198 return dns_current &&
199 nmb_name_equal(&r->name,
200 &dns_current->packet.nmb.question.question_name);
201}
202
203
204/***************************************************************************
205 write a query to the child process
206 ****************************************************************************/
207static bool write_child(struct packet_struct *p)
208{
209 struct query_record r;
210
211 r.name = p->packet.nmb.question.question_name;
212
213 return write_data(fd_out, (char *)&r, sizeof(r)) == sizeof(r);
214}
215
216/***************************************************************************
217 check the DNS queue
218 ****************************************************************************/
219void run_dns_queue(void)
220{
221 struct query_record r;
222 struct packet_struct *p, *p2;
223 struct name_record *namerec;
224 NTSTATUS status;
225
226 if (fd_in == -1)
227 return;
228
229 /* Allow SIGTERM to kill us. */
230 BlockSignals(False, SIGTERM);
231
232 if (!process_exists_by_pid(child_pid)) {
233 close(fd_in);
234 close(fd_out);
235 start_async_dns();
236 }
237
238 status = read_data(fd_in, (char *)&r, sizeof(r));
239
240 if (!NT_STATUS_IS_OK(status)) {
241 DEBUG(0, ("read from child failed: %s\n", nt_errstr(status)));
242 fd_in = -1;
243 BlockSignals(True, SIGTERM);
244 return;
245 }
246
247 BlockSignals(True, SIGTERM);
248
249 namerec = add_dns_result(&r.name, r.result);
250
251 if (dns_current) {
252 if (query_current(&r)) {
253 DEBUG(3,("DNS calling send_wins_name_query_response\n"));
254 in_dns = 1;
255 if(namerec == NULL)
256 send_wins_name_query_response(NAM_ERR, dns_current, NULL);
257 else
258 send_wins_name_query_response(0,dns_current,namerec);
259 in_dns = 0;
260 }
261
262 dns_current->locked = False;
263 free_packet(dns_current);
264 dns_current = NULL;
265 }
266
267 /* loop over the whole dns queue looking for entries that
268 match the result we just got */
269 for (p = dns_queue; p;) {
270 struct nmb_packet *nmb = &p->packet.nmb;
271 struct nmb_name *question = &nmb->question.question_name;
272
273 if (nmb_name_equal(question, &r.name)) {
274 DEBUG(3,("DNS calling send_wins_name_query_response\n"));
275 in_dns = 1;
276 if(namerec == NULL)
277 send_wins_name_query_response(NAM_ERR, p, NULL);
278 else
279 send_wins_name_query_response(0,p,namerec);
280 in_dns = 0;
281 p->locked = False;
282
283 if (p->prev)
284 p->prev->next = p->next;
285 else
286 dns_queue = p->next;
287 if (p->next)
288 p->next->prev = p->prev;
289 p2 = p->next;
290 free_packet(p);
291 p = p2;
292 } else {
293 p = p->next;
294 }
295 }
296
297 if (dns_queue) {
298 dns_current = dns_queue;
299 dns_queue = dns_queue->next;
300 if (dns_queue)
301 dns_queue->prev = NULL;
302 dns_current->next = NULL;
303
304 if (!write_child(dns_current)) {
305 DEBUG(3,("failed to send DNS query to child!\n"));
306 return;
307 }
308 }
309}
310
311/***************************************************************************
312queue a DNS query
313 ****************************************************************************/
314
315bool queue_dns_query(struct packet_struct *p,struct nmb_name *question)
316{
317 if (in_dns || fd_in == -1)
318 return False;
319
320 if (!dns_current) {
321 if (!write_child(p)) {
322 DEBUG(3,("failed to send DNS query to child!\n"));
323 return False;
324 }
325 dns_current = p;
326 p->locked = True;
327 } else {
328 p->locked = True;
329 p->next = dns_queue;
330 p->prev = NULL;
331 if (p->next)
332 p->next->prev = p;
333 dns_queue = p;
334 }
335
336 DEBUG(3,("added DNS query for %s\n", nmb_namestr(question)));
337 return True;
338}
339
340#else
341
342
343/***************************************************************************
344 we use this when we can't do async DNS lookups
345 ****************************************************************************/
346
347bool queue_dns_query(struct packet_struct *p,struct nmb_name *question)
348{
349 struct name_record *namerec = NULL;
350 struct in_addr dns_ip;
351 unstring qname;
352
353 pull_ascii_nstring(qname, sizeof(qname), question->name);
354
355 DEBUG(3,("DNS search for %s - ", nmb_namestr(question)));
356
357 /* Unblock TERM signal so we can be killed in DNS lookup. */
358 BlockSignals(False, SIGTERM);
359
360 dns_ip.s_addr = interpret_addr(qname);
361
362 /* Re-block TERM signal. */
363 BlockSignals(True, SIGTERM);
364
365 namerec = add_dns_result(question, dns_ip);
366 if(namerec == NULL) {
367 send_wins_name_query_response(NAM_ERR, p, NULL);
368 } else {
369 send_wins_name_query_response(0, p, namerec);
370 }
371 return False;
372}
373
374/***************************************************************************
375 With sync dns there is no child to kill on SIGTERM.
376 ****************************************************************************/
377
378void kill_async_dns_child(void)
379{
380 return;
381}
382#endif
Note: See TracBrowser for help on using the repository browser.