From 52713788b4dfafd7c07733f037e64bf2fec14ea1 Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Mon, 5 Mar 2007 02:40:58 +0000 Subject: [PATCH] r12080@catbus: nickm | 2007-03-04 21:40:55 -0500 Remove dnsworkers and related code. there goes another 550 lines of code. svn:r9736 --- ChangeLog | 3 + configure.in | 20 -- src/or/Makefile.am | 12 +- src/or/config.c | 11 +- src/or/connection.c | 22 -- src/or/dns.c | 482 +------------------------------------------- src/or/main.c | 5 +- src/or/or.h | 17 +- src/or/router.c | 3 - src/or/test.c | 3 - 10 files changed, 15 insertions(+), 563 deletions(-) diff --git a/ChangeLog b/ChangeLog index 4625602983..63396962d5 100644 --- a/ChangeLog +++ b/ChangeLog @@ -11,6 +11,9 @@ Changes in version 0.2.0.1-alpha - 2007-??-?? This has been deprecated since 0.1.1, and warnings have been issued since 0.1.2. When we encounter a v0 control message, we now send back an error and close the connection. + - Remove the old "dns worker" server DNS code: it hasn't been default + since 0.1.2.2-alpha, and all the servers seem to be using the new + eventdns code. Changes in version 0.1.2.10-rc - 2007-03-?? diff --git a/configure.in b/configure.in index 81ed1a9a47..473098680c 100644 --- a/configure.in +++ b/configure.in @@ -19,18 +19,6 @@ AC_ARG_ENABLE(debug, CFLAGS="$CFLAGS -g" fi]) -AC_ARG_ENABLE(eventdns, - AS_HELP_STRING(--enable-eventdns, enable asynchronous dns module), - [case "${enableval}" in - yes) eventdns=true ;; - no) eventdns=false ;; - *) AC_MSG_ERROR(bad value for --enable-eventdns) ;; - esac], [eventdns=true]) -AM_CONDITIONAL(EVENTDNS, test x$eventdns = xtrue) -if test x$eventdns = xtrue; then - AC_DEFINE([USE_EVENTDNS], 1, "Define to 1 if we'll be using eventdns.c") -fi - AC_ARG_ENABLE(transparent, AS_HELP_STRING(--disable-transparent, disable transparent proxy support), [case "${enableval}" in @@ -44,14 +32,6 @@ AC_ARG_ENABLE(threads, if test x$enable_threads = x; then case $host in - *-*-netbsd* | *-*-openbsd* ) - # Don't try multithreading on netbsd -- there is no threadsafe DNS - # lookup function there. - if test x$eventdns != xtrue; then - AC_MSG_NOTICE([You are running OpenBSD or NetBSD; I am assuming that -getaddrinfo is not threadsafe here, so I will disable threads.]) - enable_threads="no" - fi ;; *-*-solaris* ) # Don't try multithreading on solaris -- cpuworkers seem to lock. AC_MSG_NOTICE([You are running Solaris; Sometimes threading makes diff --git a/src/or/Makefile.am b/src/or/Makefile.am index 91ec1c057c..bf27e4d2cb 100644 --- a/src/or/Makefile.am +++ b/src/or/Makefile.am @@ -4,19 +4,13 @@ noinst_PROGRAMS = test bin_PROGRAMS = tor -if EVENTDNS -EVDNSSRC = eventdns.c -else -EVDNSSRC = -endif - tor_SOURCES = buffers.c circuitbuild.c circuitlist.c \ circuituse.c command.c config.c \ connection.c connection_edge.c connection_or.c control.c \ cpuworker.c directory.c dirserv.c dns.c hibernate.c main.c \ onion.c policies.c relay.c rendcommon.c rendclient.c rendmid.c \ rendservice.c rephist.c router.c routerlist.c routerparse.c \ - $(EVDNSSRC) \ + eventdns.c \ tor_main.c tor_LDADD = ../common/libor.a ../common/libor-crypto.a -lz -lssl -lcrypto @@ -27,10 +21,10 @@ test_SOURCES = buffers.c circuitbuild.c circuitlist.c \ cpuworker.c directory.c dirserv.c dns.c hibernate.c main.c \ onion.c policies.c relay.c rendcommon.c rendclient.c rendmid.c \ rendservice.c rephist.c router.c routerlist.c routerparse.c \ - $(EVDNSSRC) \ + eventdns.c \ test.c test_LDADD = ../common/libor.a ../common/libor-crypto.a -lz -lssl -lcrypto -noinst_HEADERS = or.h eventdns.h eventdns_tor.h eventdns.c +noinst_HEADERS = or.h eventdns.h eventdns_tor.h diff --git a/src/or/config.c b/src/or/config.c index 7aade11d81..47a2786b6c 100644 --- a/src/or/config.c +++ b/src/or/config.c @@ -1001,13 +1001,10 @@ options_act(or_options_t *old_options) cpuworkers_rotate(); if (dns_reset()) return -1; - } -#ifdef USE_EVENTDNS - else { + } else { if (dns_reset()) return -1; } -#endif } /* Check if we need to parse and add the EntryNodes config option. */ @@ -2714,12 +2711,6 @@ options_validate(or_options_t *old_options, or_options_t *options, if (options->UseEntryGuards && ! options->NumEntryGuards) REJECT("Cannot enable UseEntryGuards with NumEntryGuards set to 0"); -#ifndef USE_EVENTDNS - if (options->ServerDNSResolvConfFile) - log(LOG_WARN, LD_CONFIG, - "ServerDNSResolvConfFile only works when eventdns support is enabled."); -#endif - if (check_nickname_list(options->ExitNodes, "ExitNodes", msg)) return -1; if (check_nickname_list(options->EntryNodes, "EntryNodes", msg)) diff --git a/src/or/connection.c b/src/or/connection.c index c04d3bc374..c28fedecfc 100644 --- a/src/or/connection.c +++ b/src/or/connection.c @@ -51,7 +51,6 @@ conn_type_to_string(int type) case CONN_TYPE_AP: return "Socks"; case CONN_TYPE_DIR_LISTENER: return "Directory listener"; case CONN_TYPE_DIR: return "Directory"; - case CONN_TYPE_DNSWORKER: return "DNS worker"; case CONN_TYPE_CPUWORKER: return "CPU worker"; case CONN_TYPE_CONTROL_LISTENER: return "Control listener"; case CONN_TYPE_CONTROL: return "Control"; @@ -118,12 +117,6 @@ conn_state_to_string(int type, int state) case DIR_CONN_STATE_SERVER_WRITING: return "writing"; } break; - case CONN_TYPE_DNSWORKER: - switch (state) { - case DNSWORKER_STATE_IDLE: return "idle"; - case DNSWORKER_STATE_BUSY: return "busy"; - } - break; case CONN_TYPE_CPUWORKER: switch (state) { case CPUWORKER_STATE_IDLE: return "idle"; @@ -496,11 +489,6 @@ connection_about_to_close_connection(connection_t *conn) if (edge_conn->bridge_for_conn) connection_dirserv_unlink_from_bridge(edge_conn->bridge_for_conn); break; - case CONN_TYPE_DNSWORKER: - if (conn->state == DNSWORKER_STATE_BUSY) { - dns_cancel_pending_resolve(conn->address); - } - break; } } @@ -2242,8 +2230,6 @@ connection_process_inbuf(connection_t *conn, int package_partial) package_partial); case CONN_TYPE_DIR: return connection_dir_process_inbuf(TO_DIR_CONN(conn)); - case CONN_TYPE_DNSWORKER: - return connection_dns_process_inbuf(conn); case CONN_TYPE_CPUWORKER: return connection_cpu_process_inbuf(conn); case CONN_TYPE_CONTROL: @@ -2289,8 +2275,6 @@ connection_finished_flushing(connection_t *conn) return connection_edge_finished_flushing(TO_EDGE_CONN(conn)); case CONN_TYPE_DIR: return connection_dir_finished_flushing(TO_DIR_CONN(conn)); - case CONN_TYPE_DNSWORKER: - return connection_dns_finished_flushing(conn); case CONN_TYPE_CPUWORKER: return connection_cpu_finished_flushing(conn); case CONN_TYPE_CONTROL: @@ -2339,8 +2323,6 @@ connection_reached_eof(connection_t *conn) return connection_edge_reached_eof(TO_EDGE_CONN(conn)); case CONN_TYPE_DIR: return connection_dir_reached_eof(TO_DIR_CONN(conn)); - case CONN_TYPE_DNSWORKER: - return connection_dns_reached_eof(conn); case CONN_TYPE_CPUWORKER: return connection_cpu_reached_eof(conn); case CONN_TYPE_CONTROL: @@ -2513,10 +2495,6 @@ assert_connection_ok(connection_t *conn, time_t now) tor_assert(conn->purpose >= _DIR_PURPOSE_MIN); tor_assert(conn->purpose <= _DIR_PURPOSE_MAX); break; - case CONN_TYPE_DNSWORKER: - tor_assert(conn->state >= _DNSWORKER_STATE_MIN); - tor_assert(conn->state <= _DNSWORKER_STATE_MAX); - break; case CONN_TYPE_CPUWORKER: tor_assert(conn->state >= _CPUWORKER_STATE_MIN); tor_assert(conn->state <= _CPUWORKER_STATE_MAX); diff --git a/src/or/dns.c b/src/or/dns.c index 0a6dcfb882..3cf106a04f 100644 --- a/src/or/dns.c +++ b/src/or/dns.c @@ -8,32 +8,18 @@ const char dns_c_id[] = /** * \file dns.c * \brief Implements a local cache for DNS results for Tor servers. - * We provide two asynchronous backend implementations: - * 1) A farm of 'DNS worker' threads or processes to perform DNS lookups for - * onion routers and cache the results. - * 2) A wrapper around Adam Langley's eventdns.c code, to send requests - * to the nameservers asynchronously. + * This is implemetned as a wrapper around Adam Langley's eventdns.c code. * (We can't just use gethostbyname() and friends because we really need to * be nonblocking.) **/ #include "or.h" #include "../common/ht.h" -#ifdef USE_EVENTDNS #include "eventdns.h" -#endif /** Longest hostname we're willing to resolve. */ #define MAX_ADDRESSLEN 256 -/** Maximum DNS processes to spawn. */ -#define MAX_DNSWORKERS 100 -/** Minimum DNS processes to spawn. */ -#define MIN_DNSWORKERS 3 - -/** If more than this many processes are idle, shut down the extras. */ -#define MAX_IDLE_DNSWORKERS 10 - /** How long will we wait for an answer from the resolver before we decide * that the resolver is wedged? */ #define RESOLVE_MAX_TIMEOUT 300 @@ -44,14 +30,6 @@ const char dns_c_id[] = #define DNS_RESOLVE_FAILED_PERMANENT 2 #define DNS_RESOLVE_SUCCEEDED 3 -#ifndef USE_EVENTDNS -/** How many dnsworkers we have running right now. */ -static int num_dnsworkers=0; -/** How many of the running dnsworkers have an assigned task right now. */ -static int num_dnsworkers_busy=0; -/** When did we last rotate the dnsworkers? */ -static time_t last_rotation_time=0; -#else /** Have we currently configured nameservers with eventdns? */ static int nameservers_configured = 0; /** What was the resolv_conf fname we last used when configuring the @@ -60,7 +38,6 @@ static char *resolv_conf_fname = NULL; /** What was the mtime on the resolv.conf file we last used when configuring * the nameservers? Used to check whether we need to reconfigure. */ static time_t resolv_conf_mtime = 0; -#endif /** Linked list of connections waiting for a DNS answer. */ typedef struct pending_connection_t { @@ -118,16 +95,9 @@ static void dns_found_answer(const char *address, int is_reverse, static void send_resolved_cell(edge_connection_t *conn, or_circuit_t *circ, uint8_t answer_type); static int launch_resolve(edge_connection_t *exitconn, or_circuit_t *circ); -#ifndef USE_EVENTDNS -static void dnsworkers_rotate(void); -static void dnsworker_main(void *data); -static int spawn_dnsworker(void); -static int spawn_enough_dnsworkers(void); -#else static void add_wildcarded_test_address(const char *address); static int configure_nameservers(int force); static int answer_is_wildcarded(const char *ip); -#endif #ifdef DEBUG_DNS_CACHE static void _assert_cache_ok(void); #define assert_cache_ok() _assert_cache_ok() @@ -168,7 +138,6 @@ init_cache_map(void) HT_INIT(cache_map, &cache_root); } -#ifdef USE_EVENTDNS /** Helper: called by eventdns when eventdns wants to log something. */ static void evdns_log_cb(int warn, const char *msg) @@ -208,19 +177,14 @@ evdns_log_cb(int warn, const char *msg) } log(severity, LD_EXIT, "eventdns: %s", msg); } -#endif /** Initialize the DNS subsystem; called by the OR process. */ int dns_init(void) { init_cache_map(); -#ifdef USE_EVENTDNS if (server_mode(get_options())) return configure_nameservers(1); -#else - dnsworkers_rotate(); -#endif return 0; } @@ -229,7 +193,6 @@ dns_init(void) int dns_reset(void) { -#ifdef USE_EVENTDNS or_options_t *options = get_options(); if (! server_mode(options)) { evdns_clear_nameservers_and_suspend(); @@ -241,9 +204,6 @@ dns_reset(void) if (configure_nameservers(0) < 0) return -1; } -#else - dnsworkers_rotate(); -#endif return 0; } @@ -338,9 +298,7 @@ dns_free_all(void) if (cached_resolve_pqueue) smartlist_free(cached_resolve_pqueue); cached_resolve_pqueue = NULL; -#ifdef USE_EVENTDNS tor_free(resolv_conf_fname); -#endif } /** Remove every cached_resolve whose expire time is before now @@ -635,7 +593,6 @@ dns_resolve(edge_connection_t *exitconn, or_circuit_t *oncirc) if (r == 1) is_reverse = 1; -#ifdef USE_EVENTDNS if (!is_reverse || !is_resolve) { if (!is_reverse) log_info(LD_EXIT, "Bad .in-addr.arpa address \"%s\"; sending error.", @@ -645,12 +602,6 @@ dns_resolve(edge_connection_t *exitconn, or_circuit_t *oncirc) "Attempt to connect to a .in-addr.arpa address \"%s\"; " "sending error.", escaped_safe_str(exitconn->_base.address)); -#else - if (1) { - log_info(LD_PROTOCOL, "Dnsworker code does not support in-addr.arpa " - "domain, but received a request for \"%s\"; sending error.", - escaped_safe_str(exitconn->_base.address)); -#endif if (exitconn->_base.purpose == EXIT_PURPOSE_RESOLVE) send_resolved_cell(exitconn, oncirc, RESOLVED_TYPE_ERROR); @@ -1062,412 +1013,6 @@ dns_found_answer(const char *address, int is_reverse, uint32_t addr, assert_cache_ok(); } -#ifndef USE_EVENTDNS -/** Find or spawn a dns worker process to handle resolving - * exitconn-\>address; tell that dns worker to begin resolving. - */ -static int -launch_resolve(edge_connection_t *exitconn, or_circuit_t *circ) -{ - connection_t *dnsconn; - unsigned char len; - - tor_assert(exitconn->_base.state == EXIT_CONN_STATE_RESOLVING); - assert_connection_ok(TO_CONN(exitconn), 0); - tor_assert(exitconn->_base.s == -1); - - /* respawn here, to be sure there are enough */ - if (spawn_enough_dnsworkers() < 0) { - goto err; - } - - dnsconn = connection_get_by_type_state(CONN_TYPE_DNSWORKER, - DNSWORKER_STATE_IDLE); - - if (!dnsconn) { - log_warn(LD_EXIT,"no idle dns workers. Failing."); - if (exitconn->_base.purpose == EXIT_PURPOSE_RESOLVE) - send_resolved_cell(exitconn, circ, RESOLVED_TYPE_ERROR_TRANSIENT); - goto err; - } - - log_debug(LD_EXIT, - "Connection (fd %d) needs to resolve %s; assigning " - "to DNSWorker (fd %d)", exitconn->_base.s, - escaped_safe_str(exitconn->_base.address), dnsconn->s); - - tor_free(dnsconn->address); - dnsconn->address = tor_strdup(exitconn->_base.address); - dnsconn->state = DNSWORKER_STATE_BUSY; - /* touch the lastwritten timestamp, since that's how we check to - * see how long it's been since we asked the question, and sometimes - * we check before the first call to connection_handle_write(). */ - dnsconn->timestamp_lastwritten = time(NULL); - num_dnsworkers_busy++; - - len = strlen(dnsconn->address); - connection_write_to_buf((char*)&len, 1, dnsconn); - connection_write_to_buf(dnsconn->address, len, dnsconn); - - return 0; -err: - /* also sends end and frees */ - dns_cancel_pending_resolve(exitconn->_base.address); - return -1; -} - -/******************************************************************/ - -/* - * Connection between OR and dnsworker - */ - -/** Write handler: called when we've pushed a request to a dnsworker. */ -int -connection_dns_finished_flushing(connection_t *conn) -{ - tor_assert(conn); - tor_assert(conn->type == CONN_TYPE_DNSWORKER); - connection_stop_writing(conn); - return 0; -} - -/** Called when a connection to a dnsworker hits an EOF; this only happens - * when a dnsworker dies unexpectedly. */ -int -connection_dns_reached_eof(connection_t *conn) -{ - log_warn(LD_EXIT,"Read eof. DNS worker died unexpectedly."); - if (conn->state == DNSWORKER_STATE_BUSY) { - /* don't cancel the resolve here -- it would be cancelled in - * connection_about_to_close_connection(), since conn is still - * in state BUSY - */ - num_dnsworkers_busy--; - } - num_dnsworkers--; - connection_mark_for_close(conn); - return 0; -} - -/** Read handler: called when we get data from a dnsworker. See - * if we have a complete answer. If so, call dns_found_answer on the - * result. If not, wait. Returns 0. */ -int -connection_dns_process_inbuf(connection_t *conn) -{ - char success; - uint32_t addr; - int ttl; - - tor_assert(conn); - tor_assert(conn->type == CONN_TYPE_DNSWORKER); - - if (conn->state != DNSWORKER_STATE_BUSY && buf_datalen(conn->inbuf)) { - log_warn(LD_BUG, - "read data (%d bytes) from an idle dns worker (fd %d, " - "address %s). Please report.", (int)buf_datalen(conn->inbuf), - conn->s, escaped_safe_str(conn->address)); - tor_fragile_assert(); - - /* Pull it off the buffer anyway, or it will just stay there. - * Keep pulling things off because sometimes we get several - * answers at once (!). */ - while (buf_datalen(conn->inbuf)) { - connection_fetch_from_buf(&success,1,conn); - connection_fetch_from_buf((char *)&addr,sizeof(uint32_t),conn); - log_warn(LD_EXIT,"Discarding idle dns answer (success %d, addr %d.)", - success, addr); - } - return 0; - } - if (buf_datalen(conn->inbuf) < 5) /* entire answer available? */ - return 0; /* not yet */ - tor_assert(conn->state == DNSWORKER_STATE_BUSY); - tor_assert(buf_datalen(conn->inbuf) == 5); - - connection_fetch_from_buf(&success,1,conn); - connection_fetch_from_buf((char *)&addr,sizeof(uint32_t),conn); - - log_debug(LD_EXIT, "DNSWorker (fd %d) returned answer for %s", - conn->s, escaped_safe_str(conn->address)); - - tor_assert(success >= DNS_RESOLVE_FAILED_TRANSIENT); - tor_assert(success <= DNS_RESOLVE_SUCCEEDED); - - ttl = (success == DNS_RESOLVE_FAILED_TRANSIENT) ? 0 : MAX_DNS_ENTRY_AGE; - dns_found_answer(conn->address, 0, ntohl(addr), NULL, success, ttl); - - tor_free(conn->address); - conn->address = tor_strdup(""); - conn->state = DNSWORKER_STATE_IDLE; - num_dnsworkers_busy--; - if (conn->timestamp_created < last_rotation_time) { - connection_mark_for_close(conn); - num_dnsworkers--; - spawn_enough_dnsworkers(); - } - return 0; -} - -/** Close and re-open all idle dnsworkers; schedule busy ones to be closed - * and re-opened once they're no longer busy. - **/ -static void -dnsworkers_rotate(void) -{ - connection_t *dnsconn; - while ((dnsconn = connection_get_by_type_state(CONN_TYPE_DNSWORKER, - DNSWORKER_STATE_IDLE))) { - connection_mark_for_close(dnsconn); - num_dnsworkers--; - } - last_rotation_time = time(NULL); - if (server_mode(get_options())) - spawn_enough_dnsworkers(); -} - -/** Implementation for DNS workers; this code runs in a separate - * execution context. It takes as its argument an fdarray as returned - * by socketpair(), and communicates via fdarray[1]. The protocol is - * as follows: - * - The OR says: - * - ADDRESSLEN [1 byte] - * - ADDRESS [ADDRESSLEN bytes] - * - The DNS worker does the lookup, and replies: - * - OUTCOME [1 byte] - * - IP [4 bytes] - * - * OUTCOME is one of DNS_RESOLVE_{FAILED_TRANSIENT|FAILED_PERMANENT|SUCCEEDED}. - * IP is in host order. - * - * The dnsworker runs indefinitely, until its connection is closed or an error - * occurs. - */ -static void -dnsworker_main(void *data) -{ - char address[MAX_ADDRESSLEN+1]; /* Plus a byte for a final '.' */ - unsigned char address_len; - char *log_address; - char answer[5]; - uint32_t ip; - int *fdarray = data; - int fd; - int result; - int search = get_options()->ServerDNSSearchDomains; - - /* log_fn(LOG_NOTICE,"After spawn: fdarray @%d has %d:%d", (int)fdarray, - * fdarray[0],fdarray[1]); */ - - fd = fdarray[1]; /* this side is ours */ -#ifndef TOR_IS_MULTITHREADED - tor_close_socket(fdarray[0]); /* this is the side of the socketpair the - * parent uses */ - tor_free_all(1); /* so the child doesn't hold the parent's fd's open */ - handle_signals(0); /* ignore interrupts from the keyboard, etc */ -#endif - tor_free(data); - - for (;;) { - int r; - - if ((r = recv(fd, &address_len, 1, 0)) != 1) { - if (r == 0) { - log_info(LD_EXIT,"DNS worker exiting because Tor process closed " - "connection (either pruned idle dnsworker or died)."); - } else { - log_info(LD_EXIT,"DNS worker exiting because of error on connection " - "to Tor process."); - log_info(LD_EXIT,"(Error on %d was %s)", fd, - tor_socket_strerror(tor_socket_errno(fd))); - } - tor_close_socket(fd); - crypto_thread_cleanup(); - spawn_exit(); - } - - if (address_len && read_all(fd, address, address_len, 1) != address_len) { - log_err(LD_BUG,"read hostname failed. Child exiting."); - tor_close_socket(fd); - crypto_thread_cleanup(); - spawn_exit(); - } - /* Add a period to prevent local domain search, and NUL-terminate. */ - if (address[address_len-1] != '.' && !search) { - address[address_len] = '.'; - address[address_len+1] = '\0'; - } else { - address[address_len] = '\0'; - } - - log_address = esc_for_log(safe_str(address)); - result = tor_lookup_hostname(address, &ip); - /* Make 0.0.0.0 an error, so that we can use "0" to mean "no addr") */ - if (!ip) - result = -1; - switch (result) { - case 1: - /* XXX result can never be 1, because we set it to -1 above on error */ - log_info(LD_NET,"Could not resolve dest addr %s (transient)", - log_address); - answer[0] = DNS_RESOLVE_FAILED_TRANSIENT; - break; - case -1: - log_info(LD_NET,"Could not resolve dest addr %s (permanent)", - log_address); - answer[0] = DNS_RESOLVE_FAILED_PERMANENT; - break; - case 0: - log_info(LD_NET,"Resolved address %s", log_address); - answer[0] = DNS_RESOLVE_SUCCEEDED; - break; - } - tor_free(log_address); - set_uint32(answer+1, ip); - if (write_all(fd, answer, 5, 1) != 5) { - log_err(LD_NET,"writing answer failed. Child exiting."); - tor_close_socket(fd); - crypto_thread_cleanup(); - spawn_exit(); - } - } -} - -/** Launch a new DNS worker; return 0 on success, -1 on failure. - */ -static int -spawn_dnsworker(void) -{ - int *fdarray; - int fd; - connection_t *conn; - int err; - - fdarray = tor_malloc(sizeof(int)*2); - if ((err = tor_socketpair(AF_UNIX, SOCK_STREAM, 0, fdarray)) < 0) { - log_warn(LD_NET, "Couldn't construct socketpair for dns worker: %s", - tor_socket_strerror(-err)); - tor_free(fdarray); - return -1; - } - - tor_assert(fdarray[0] >= 0); - tor_assert(fdarray[1] >= 0); - - /* log_fn(LOG_NOTICE,"Before spawn: fdarray @%d has %d:%d", - (int)fdarray, fdarray[0],fdarray[1]); */ - - fd = fdarray[0]; /* We copy this out here, since dnsworker_main may free - * fdarray */ - spawn_func((void*) dnsworker_main, (void*)fdarray); - log_debug(LD_EXIT,"just spawned a dns worker."); -#ifndef TOR_IS_MULTITHREADED - tor_close_socket(fdarray[1]); /* don't need the worker's side of the pipe */ - tor_free(fdarray); -#endif - - conn = connection_new(CONN_TYPE_DNSWORKER); - - set_socket_nonblocking(fd); - - /* set up conn so it's got all the data we need to remember */ - conn->s = fd; - conn->address = tor_strdup(""); - - if (connection_add(conn) < 0) { /* no space, forget it */ - log_warn(LD_NET,"connection_add for dnsworker failed. Giving up."); - connection_free(conn); /* this closes fd */ - return -1; - } - - conn->state = DNSWORKER_STATE_IDLE; - connection_start_reading(conn); - - return 0; /* success */ -} - -/** If we have too many or too few DNS workers, spawn or kill some. - * Return 0 if we are happy, return -1 if we tried to spawn more but - * we couldn't. - */ -static int -spawn_enough_dnsworkers(void) -{ - int num_dnsworkers_needed; /* aim to have 1 more than needed, - * but no less than min and no more than max */ - connection_t *dnsconn; - - /* XXX This may not be the best strategy. Maybe we should queue pending - * requests until the old ones finish or time out: otherwise, if the - * connection requests come fast enough, we never get any DNS done. -NM - * - * XXX But if we queue them, then the adversary can pile even more - * queries onto us, blocking legitimate requests for even longer. Maybe - * we should compromise and only kill if it's been at it for more than, - * e.g., 2 seconds. -RD - */ - if (num_dnsworkers_busy == MAX_DNSWORKERS) { - /* We always want at least one worker idle. - * So find the oldest busy worker and kill it. - */ - dnsconn = connection_get_by_type_state_lastwritten(CONN_TYPE_DNSWORKER, - DNSWORKER_STATE_BUSY); - tor_assert(dnsconn); - - log_warn(LD_EXIT, "%d DNS workers are spawned; all are busy. Killing one.", - MAX_DNSWORKERS); - - connection_mark_for_close(dnsconn); - num_dnsworkers_busy--; - num_dnsworkers--; - } - - if (num_dnsworkers_busy >= MIN_DNSWORKERS) - num_dnsworkers_needed = num_dnsworkers_busy+1; - else - num_dnsworkers_needed = MIN_DNSWORKERS; - - while (num_dnsworkers < num_dnsworkers_needed) { - if (spawn_dnsworker() < 0) { - log_warn(LD_EXIT,"DNS worker spawn failed. Will try again later."); - return -1; - } - num_dnsworkers++; - } - - while (num_dnsworkers > num_dnsworkers_busy+MAX_IDLE_DNSWORKERS) { - /* too many idle? */ - /* cull excess workers */ - log_info(LD_EXIT,"%d of %d dnsworkers are idle. Killing one.", - num_dnsworkers-num_dnsworkers_busy, num_dnsworkers); - dnsconn = connection_get_by_type_state(CONN_TYPE_DNSWORKER, - DNSWORKER_STATE_IDLE); - tor_assert(dnsconn); - connection_mark_for_close(dnsconn); - num_dnsworkers--; - } - - return 0; -} - -void -dns_launch_correctness_checks(void) -{ -} - -int -dns_seems_to_be_broken(void) -{ - return 0; -} - -void -dns_reset_correctness_checks(void) -{ -} -#else /* !USE_EVENTDNS */ - /** Eventdns helper: return true iff the eventdns result err is * a transient failure. */ static int @@ -1483,30 +1028,6 @@ evdns_err_is_transient(int err) return 0; } } -/* Dummy function; never called with eventdns enabled. */ -int -connection_dns_finished_flushing(connection_t *conn) -{ - (void)conn; - tor_assert(0); - return 0; -} -/* Dummy function; never called with eventdns enabled. */ -int -connection_dns_process_inbuf(connection_t *conn) -{ - (void)conn; - tor_assert(0); - return 0; -} -/* Dummy function; never called with eventdns enabled. */ -int -connection_dns_reached_eof(connection_t *conn) -{ - (void)conn; - tor_assert(0); - return 0; -} /** Configure eventdns nameservers if force is true, or if the configuration * has changed since the last time we called this function. On Unix, this @@ -1978,7 +1499,6 @@ answer_is_wildcarded(const char *ip) { return dns_wildcard_list && smartlist_string_isin(dns_wildcard_list, ip); } -#endif /* USE_EVENTDNS */ /** Exit with an assertion if resolve is corrupt. */ static void diff --git a/src/or/main.c b/src/or/main.c index 3df1650925..7c801c7ad7 100644 --- a/src/or/main.c +++ b/src/or/main.c @@ -16,9 +16,8 @@ const char main_c_id[] = #ifdef USE_DMALLOC #include #endif -#ifdef USE_EVENTDNS + void evdns_shutdown(int); -#endif /********* PROTOTYPES **********/ @@ -1640,11 +1639,9 @@ tor_init(int argc, char *argv[]) void tor_free_all(int postfork) { -#ifdef USE_EVENTDNS if (!postfork) { evdns_shutdown(1); } -#endif routerlist_free_all(); addressmap_free_all(); set_exit_redirects(NULL); /* free the registered exit redirects */ diff --git a/src/or/or.h b/src/or/or.h index 8aff19a7ff..4af9e05c02 100644 --- a/src/or/or.h +++ b/src/or/or.h @@ -229,21 +229,19 @@ typedef enum { #define CONN_TYPE_DIR_LISTENER 8 /** Type for HTTP connections to the directory server. */ #define CONN_TYPE_DIR 9 -/** Connection from the main process to a DNS worker process. */ -#define CONN_TYPE_DNSWORKER 10 /** Connection from the main process to a CPU worker process. */ -#define CONN_TYPE_CPUWORKER 11 +#define CONN_TYPE_CPUWORKER 10 /** Type for listening for connections from user interface process. */ -#define CONN_TYPE_CONTROL_LISTENER 12 +#define CONN_TYPE_CONTROL_LISTENER 11 /** Type for connections from user interface process. */ -#define CONN_TYPE_CONTROL 13 +#define CONN_TYPE_CONTROL 12 /** Type for sockets listening for transparent connections redirected by pf or * netfilter. */ -#define CONN_TYPE_AP_TRANS_LISTENER 14 +#define CONN_TYPE_AP_TRANS_LISTENER 13 /** Type for sockets listening for transparent connections redirected by * natd. */ -#define CONN_TYPE_AP_NATD_LISTENER 15 -#define _CONN_TYPE_MAX 15 +#define CONN_TYPE_AP_NATD_LISTENER 14 +#define _CONN_TYPE_MAX 14 #define CONN_IS_EDGE(x) \ ((x)->type == CONN_TYPE_EXIT || (x)->type == CONN_TYPE_AP) @@ -2473,9 +2471,6 @@ void cached_dir_decref(cached_dir_t *d); int dns_init(void); void dns_free_all(void); uint32_t dns_clip_ttl(uint32_t ttl); -int connection_dns_finished_flushing(connection_t *conn); -int connection_dns_reached_eof(connection_t *conn); -int connection_dns_process_inbuf(connection_t *conn); int dns_reset(void); void connection_dns_remove(edge_connection_t *conn); void assert_connection_edge_not_dns_pending(edge_connection_t *conn); diff --git a/src/or/router.c b/src/or/router.c index 98123f889b..b666cfe671 100644 --- a/src/or/router.c +++ b/src/or/router.c @@ -1224,9 +1224,6 @@ router_dump_router_to_string(char *s, size_t maxlen, routerinfo_t *router, "bandwidth %d %d %d\n" "onion-key\n%s" "signing-key\n%s" -#ifndef USE_EVENTDNS - "opt eventdns 0\n" -#endif "%s%s%s", router->nickname, router->address, diff --git a/src/or/test.c b/src/or/test.c index 194d506433..ddb31188a2 100644 --- a/src/or/test.c +++ b/src/or/test.c @@ -1557,9 +1557,6 @@ test_dir_format(void) strlcat(buf2, pk1_str, sizeof(buf2)); strlcat(buf2, "signing-key\n", sizeof(buf2)); strlcat(buf2, pk2_str, sizeof(buf2)); -#ifndef USE_EVENTDNS - strlcat(buf2, "opt eventdns 0\n", sizeof(buf2)); -#endif strlcat(buf2, bw_lines, sizeof(buf2)); strlcat(buf2, "router-signature\n", sizeof(buf2)); buf[strlen(buf2)] = '\0'; /* Don't compare the sig; it's never the same