xref: /freebsd/contrib/unbound/libunbound/libunbound.c (revision 924226fba12cc9a228c73b956e1b7fa24c60b055)
1 /*
2  * unbound.c - unbound validating resolver public API implementation
3  *
4  * Copyright (c) 2007, NLnet Labs. All rights reserved.
5  *
6  * This software is open source.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * Redistributions of source code must retain the above copyright notice,
13  * this list of conditions and the following disclaimer.
14  *
15  * Redistributions in binary form must reproduce the above copyright notice,
16  * this list of conditions and the following disclaimer in the documentation
17  * and/or other materials provided with the distribution.
18  *
19  * Neither the name of the NLNET LABS nor the names of its contributors may
20  * be used to endorse or promote products derived from this software without
21  * specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27  * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29  * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34  */
35 
36 /**
37  * \file
38  *
39  * This file contains functions to resolve DNS queries and
40  * validate the answers. Synchronously and asynchronously.
41  *
42  */
43 
44 /* include the public api first, it should be able to stand alone */
45 #include "libunbound/unbound.h"
46 #include "libunbound/unbound-event.h"
47 #include "config.h"
48 #include <ctype.h>
49 #include "libunbound/context.h"
50 #include "libunbound/libworker.h"
51 #include "util/locks.h"
52 #include "util/config_file.h"
53 #include "util/alloc.h"
54 #include "util/module.h"
55 #include "util/regional.h"
56 #include "util/log.h"
57 #include "util/random.h"
58 #include "util/net_help.h"
59 #include "util/tube.h"
60 #include "util/ub_event.h"
61 #include "util/edns.h"
62 #include "services/modstack.h"
63 #include "services/localzone.h"
64 #include "services/cache/infra.h"
65 #include "services/cache/rrset.h"
66 #include "services/authzone.h"
67 #include "services/listen_dnsport.h"
68 #include "sldns/sbuffer.h"
69 #ifdef HAVE_PTHREAD
70 #include <signal.h>
71 #endif
72 #ifdef HAVE_SYS_WAIT_H
73 #include <sys/wait.h>
74 #endif
75 #ifdef HAVE_TIME_H
76 #include <time.h>
77 #endif
78 
79 #if defined(UB_ON_WINDOWS) && defined (HAVE_WINDOWS_H)
80 #include <windows.h>
81 #include <iphlpapi.h>
82 #endif /* UB_ON_WINDOWS */
83 
84 /** store that the logfile has a debug override */
85 int ctx_logfile_overridden = 0;
86 
87 /** create context functionality, but no pipes */
88 static struct ub_ctx* ub_ctx_create_nopipe(void)
89 {
90 	struct ub_ctx* ctx;
91 #ifdef USE_WINSOCK
92 	int r;
93 	WSADATA wsa_data;
94 #endif
95 
96 	checklock_start();
97 	if(!ctx_logfile_overridden)
98 		log_init(NULL, 0, NULL); /* logs to stderr */
99 	log_ident_set("libunbound");
100 #ifdef USE_WINSOCK
101 	if((r = WSAStartup(MAKEWORD(2,2), &wsa_data)) != 0) {
102 		log_err("could not init winsock. WSAStartup: %s",
103 			wsa_strerror(r));
104 		return NULL;
105 	}
106 #endif
107 	verbosity = NO_VERBOSE; /* errors only */
108 	checklock_start();
109 	ctx = (struct ub_ctx*)calloc(1, sizeof(*ctx));
110 	if(!ctx) {
111 		errno = ENOMEM;
112 		return NULL;
113 	}
114 	alloc_init(&ctx->superalloc, NULL, 0);
115 	if(!(ctx->seed_rnd = ub_initstate(NULL))) {
116 		ub_randfree(ctx->seed_rnd);
117 		free(ctx);
118 		errno = ENOMEM;
119 		return NULL;
120 	}
121 	lock_basic_init(&ctx->qqpipe_lock);
122 	lock_basic_init(&ctx->rrpipe_lock);
123 	lock_basic_init(&ctx->cfglock);
124 	ctx->env = (struct module_env*)calloc(1, sizeof(*ctx->env));
125 	if(!ctx->env) {
126 		ub_randfree(ctx->seed_rnd);
127 		free(ctx);
128 		errno = ENOMEM;
129 		return NULL;
130 	}
131 	ctx->env->cfg = config_create_forlib();
132 	if(!ctx->env->cfg) {
133 		free(ctx->env);
134 		ub_randfree(ctx->seed_rnd);
135 		free(ctx);
136 		errno = ENOMEM;
137 		return NULL;
138 	}
139 	/* init edns_known_options */
140 	if(!edns_known_options_init(ctx->env)) {
141 		config_delete(ctx->env->cfg);
142 		free(ctx->env);
143 		ub_randfree(ctx->seed_rnd);
144 		free(ctx);
145 		errno = ENOMEM;
146 		return NULL;
147 	}
148 	ctx->env->auth_zones = auth_zones_create();
149 	if(!ctx->env->auth_zones) {
150 		edns_known_options_delete(ctx->env);
151 		config_delete(ctx->env->cfg);
152 		free(ctx->env);
153 		ub_randfree(ctx->seed_rnd);
154 		free(ctx);
155 		errno = ENOMEM;
156 		return NULL;
157 	}
158 	ctx->env->edns_strings = edns_strings_create();
159 	if(!ctx->env->edns_strings) {
160 		auth_zones_delete(ctx->env->auth_zones);
161 		edns_known_options_delete(ctx->env);
162 		config_delete(ctx->env->cfg);
163 		free(ctx->env);
164 		ub_randfree(ctx->seed_rnd);
165 		free(ctx);
166 		errno = ENOMEM;
167 		return NULL;
168 	}
169 
170 	ctx->env->alloc = &ctx->superalloc;
171 	ctx->env->worker = NULL;
172 	ctx->env->need_to_validate = 0;
173 	modstack_init(&ctx->mods);
174 	rbtree_init(&ctx->queries, &context_query_cmp);
175 	return ctx;
176 }
177 
178 struct ub_ctx*
179 ub_ctx_create(void)
180 {
181 	struct ub_ctx* ctx = ub_ctx_create_nopipe();
182 	if(!ctx)
183 		return NULL;
184 	if((ctx->qq_pipe = tube_create()) == NULL) {
185 		int e = errno;
186 		ub_randfree(ctx->seed_rnd);
187 		config_delete(ctx->env->cfg);
188 		modstack_desetup(&ctx->mods, ctx->env);
189 		listen_desetup_locks();
190 		edns_known_options_delete(ctx->env);
191 		edns_strings_delete(ctx->env->edns_strings);
192 		free(ctx->env);
193 		free(ctx);
194 		errno = e;
195 		return NULL;
196 	}
197 	if((ctx->rr_pipe = tube_create()) == NULL) {
198 		int e = errno;
199 		tube_delete(ctx->qq_pipe);
200 		ub_randfree(ctx->seed_rnd);
201 		config_delete(ctx->env->cfg);
202 		modstack_desetup(&ctx->mods, ctx->env);
203 		listen_desetup_locks();
204 		edns_known_options_delete(ctx->env);
205 		edns_strings_delete(ctx->env->edns_strings);
206 		free(ctx->env);
207 		free(ctx);
208 		errno = e;
209 		return NULL;
210 	}
211 	return ctx;
212 }
213 
214 struct ub_ctx*
215 ub_ctx_create_ub_event(struct ub_event_base* ueb)
216 {
217 	struct ub_ctx* ctx = ub_ctx_create_nopipe();
218 	if(!ctx)
219 		return NULL;
220 	/* no pipes, but we have the locks to make sure everything works */
221 	ctx->created_bg = 0;
222 	ctx->dothread = 1; /* the processing is in the same process,
223 		makes ub_cancel and ub_ctx_delete do the right thing */
224 	ctx->event_base = ueb;
225 	return ctx;
226 }
227 
228 struct ub_ctx*
229 ub_ctx_create_event(struct event_base* eb)
230 {
231 	struct ub_ctx* ctx = ub_ctx_create_nopipe();
232 	if(!ctx)
233 		return NULL;
234 	/* no pipes, but we have the locks to make sure everything works */
235 	ctx->created_bg = 0;
236 	ctx->dothread = 1; /* the processing is in the same process,
237 		makes ub_cancel and ub_ctx_delete do the right thing */
238 	ctx->event_base = ub_libevent_event_base(eb);
239 	if (!ctx->event_base) {
240 		ub_ctx_delete(ctx);
241 		return NULL;
242 	}
243 	ctx->event_base_malloced = 1;
244 	return ctx;
245 }
246 
247 /** delete q */
248 static void
249 delq(rbnode_type* n, void* ATTR_UNUSED(arg))
250 {
251 	struct ctx_query* q = (struct ctx_query*)n;
252 	context_query_delete(q);
253 }
254 
255 /** stop the bg thread */
256 static void ub_stop_bg(struct ub_ctx* ctx)
257 {
258 	/* stop the bg thread */
259 	lock_basic_lock(&ctx->cfglock);
260 	if(ctx->created_bg) {
261 		uint8_t* msg;
262 		uint32_t len;
263 		uint32_t cmd = UB_LIBCMD_QUIT;
264 		lock_basic_unlock(&ctx->cfglock);
265 		lock_basic_lock(&ctx->qqpipe_lock);
266 		(void)tube_write_msg(ctx->qq_pipe, (uint8_t*)&cmd,
267 			(uint32_t)sizeof(cmd), 0);
268 		lock_basic_unlock(&ctx->qqpipe_lock);
269 		lock_basic_lock(&ctx->rrpipe_lock);
270 		while(tube_read_msg(ctx->rr_pipe, &msg, &len, 0)) {
271 			/* discard all results except a quit confirm */
272 			if(context_serial_getcmd(msg, len) == UB_LIBCMD_QUIT) {
273 				free(msg);
274 				break;
275 			}
276 			free(msg);
277 		}
278 		lock_basic_unlock(&ctx->rrpipe_lock);
279 
280 		/* if bg worker is a thread, wait for it to exit, so that all
281 	 	 * resources are really gone. */
282 		lock_basic_lock(&ctx->cfglock);
283 		if(ctx->dothread) {
284 			lock_basic_unlock(&ctx->cfglock);
285 			ub_thread_join(ctx->bg_tid);
286 		} else {
287 			lock_basic_unlock(&ctx->cfglock);
288 #ifndef UB_ON_WINDOWS
289 			if(waitpid(ctx->bg_pid, NULL, 0) == -1) {
290 				if(verbosity > 2)
291 					log_err("waitpid: %s", strerror(errno));
292 			}
293 #endif
294 		}
295 	}
296 	else {
297 		lock_basic_unlock(&ctx->cfglock);
298 	}
299 }
300 
301 void
302 ub_ctx_delete(struct ub_ctx* ctx)
303 {
304 	struct alloc_cache* a, *na;
305 	int do_stop = 1;
306 	if(!ctx) return;
307 
308 	/* see if bg thread is created and if threads have been killed */
309 	/* no locks, because those may be held by terminated threads */
310 	/* for processes the read pipe is closed and we see that on read */
311 #ifdef HAVE_PTHREAD
312 	if(ctx->created_bg && ctx->dothread) {
313 		if(pthread_kill(ctx->bg_tid, 0) == ESRCH) {
314 			/* thread has been killed */
315 			do_stop = 0;
316 		}
317 	}
318 #endif /* HAVE_PTHREAD */
319 	if(do_stop)
320 		ub_stop_bg(ctx);
321 	libworker_delete_event(ctx->event_worker);
322 
323 	modstack_desetup(&ctx->mods, ctx->env);
324 	a = ctx->alloc_list;
325 	while(a) {
326 		na = a->super;
327 		a->super = &ctx->superalloc;
328 		alloc_clear(a);
329 		free(a);
330 		a = na;
331 	}
332 	local_zones_delete(ctx->local_zones);
333 	lock_basic_destroy(&ctx->qqpipe_lock);
334 	lock_basic_destroy(&ctx->rrpipe_lock);
335 	lock_basic_destroy(&ctx->cfglock);
336 	tube_delete(ctx->qq_pipe);
337 	tube_delete(ctx->rr_pipe);
338 	if(ctx->env) {
339 		slabhash_delete(ctx->env->msg_cache);
340 		rrset_cache_delete(ctx->env->rrset_cache);
341 		infra_delete(ctx->env->infra_cache);
342 		config_delete(ctx->env->cfg);
343 		edns_known_options_delete(ctx->env);
344 		edns_strings_delete(ctx->env->edns_strings);
345 		auth_zones_delete(ctx->env->auth_zones);
346 		free(ctx->env);
347 	}
348 	ub_randfree(ctx->seed_rnd);
349 	alloc_clear(&ctx->superalloc);
350 	listen_desetup_locks();
351 	traverse_postorder(&ctx->queries, delq, NULL);
352 	if(ctx_logfile_overridden) {
353 		log_file(NULL);
354 		ctx_logfile_overridden = 0;
355 	}
356 	if(ctx->event_base_malloced)
357 		free(ctx->event_base);
358 	free(ctx);
359 #ifdef USE_WINSOCK
360 	WSACleanup();
361 #endif
362 }
363 
364 int
365 ub_ctx_set_option(struct ub_ctx* ctx, const char* opt, const char* val)
366 {
367 	lock_basic_lock(&ctx->cfglock);
368 	if(ctx->finalized) {
369 		lock_basic_unlock(&ctx->cfglock);
370 		return UB_AFTERFINAL;
371 	}
372 	if(!config_set_option(ctx->env->cfg, opt, val)) {
373 		lock_basic_unlock(&ctx->cfglock);
374 		return UB_SYNTAX;
375 	}
376 	lock_basic_unlock(&ctx->cfglock);
377 	return UB_NOERROR;
378 }
379 
380 int
381 ub_ctx_get_option(struct ub_ctx* ctx, const char* opt, char** str)
382 {
383 	int r;
384 	lock_basic_lock(&ctx->cfglock);
385 	r = config_get_option_collate(ctx->env->cfg, opt, str);
386 	lock_basic_unlock(&ctx->cfglock);
387 	if(r == 0) r = UB_NOERROR;
388 	else if(r == 1) r = UB_SYNTAX;
389 	else if(r == 2) r = UB_NOMEM;
390 	return r;
391 }
392 
393 int
394 ub_ctx_config(struct ub_ctx* ctx, const char* fname)
395 {
396 	lock_basic_lock(&ctx->cfglock);
397 	if(ctx->finalized) {
398 		lock_basic_unlock(&ctx->cfglock);
399 		return UB_AFTERFINAL;
400 	}
401 	if(!config_read(ctx->env->cfg, fname, NULL)) {
402 		lock_basic_unlock(&ctx->cfglock);
403 		return UB_SYNTAX;
404 	}
405 	lock_basic_unlock(&ctx->cfglock);
406 	return UB_NOERROR;
407 }
408 
409 int
410 ub_ctx_add_ta(struct ub_ctx* ctx, const char* ta)
411 {
412 	char* dup = strdup(ta);
413 	if(!dup) return UB_NOMEM;
414 	lock_basic_lock(&ctx->cfglock);
415 	if(ctx->finalized) {
416 		lock_basic_unlock(&ctx->cfglock);
417 		free(dup);
418 		return UB_AFTERFINAL;
419 	}
420 	if(!cfg_strlist_insert(&ctx->env->cfg->trust_anchor_list, dup)) {
421 		lock_basic_unlock(&ctx->cfglock);
422 		return UB_NOMEM;
423 	}
424 	lock_basic_unlock(&ctx->cfglock);
425 	return UB_NOERROR;
426 }
427 
428 int
429 ub_ctx_add_ta_file(struct ub_ctx* ctx, const char* fname)
430 {
431 	char* dup = strdup(fname);
432 	if(!dup) return UB_NOMEM;
433 	lock_basic_lock(&ctx->cfglock);
434 	if(ctx->finalized) {
435 		lock_basic_unlock(&ctx->cfglock);
436 		free(dup);
437 		return UB_AFTERFINAL;
438 	}
439 	if(!cfg_strlist_insert(&ctx->env->cfg->trust_anchor_file_list, dup)) {
440 		lock_basic_unlock(&ctx->cfglock);
441 		return UB_NOMEM;
442 	}
443 	lock_basic_unlock(&ctx->cfglock);
444 	return UB_NOERROR;
445 }
446 
447 int ub_ctx_add_ta_autr(struct ub_ctx* ctx, const char* fname)
448 {
449 	char* dup = strdup(fname);
450 	if(!dup) return UB_NOMEM;
451 	lock_basic_lock(&ctx->cfglock);
452 	if(ctx->finalized) {
453 		lock_basic_unlock(&ctx->cfglock);
454 		free(dup);
455 		return UB_AFTERFINAL;
456 	}
457 	if(!cfg_strlist_insert(&ctx->env->cfg->auto_trust_anchor_file_list,
458 		dup)) {
459 		lock_basic_unlock(&ctx->cfglock);
460 		return UB_NOMEM;
461 	}
462 	lock_basic_unlock(&ctx->cfglock);
463 	return UB_NOERROR;
464 }
465 
466 int
467 ub_ctx_trustedkeys(struct ub_ctx* ctx, const char* fname)
468 {
469 	char* dup = strdup(fname);
470 	if(!dup) return UB_NOMEM;
471 	lock_basic_lock(&ctx->cfglock);
472 	if(ctx->finalized) {
473 		lock_basic_unlock(&ctx->cfglock);
474 		free(dup);
475 		return UB_AFTERFINAL;
476 	}
477 	if(!cfg_strlist_insert(&ctx->env->cfg->trusted_keys_file_list, dup)) {
478 		lock_basic_unlock(&ctx->cfglock);
479 		return UB_NOMEM;
480 	}
481 	lock_basic_unlock(&ctx->cfglock);
482 	return UB_NOERROR;
483 }
484 
485 int
486 ub_ctx_debuglevel(struct ub_ctx* ctx, int d)
487 {
488 	lock_basic_lock(&ctx->cfglock);
489 	verbosity = d;
490 	ctx->env->cfg->verbosity = d;
491 	lock_basic_unlock(&ctx->cfglock);
492 	return UB_NOERROR;
493 }
494 
495 int ub_ctx_debugout(struct ub_ctx* ctx, void* out)
496 {
497 	lock_basic_lock(&ctx->cfglock);
498 	log_file((FILE*)out);
499 	ctx_logfile_overridden = 1;
500 	ctx->logfile_override = 1;
501 	ctx->log_out = out;
502 	lock_basic_unlock(&ctx->cfglock);
503 	return UB_NOERROR;
504 }
505 
506 int
507 ub_ctx_async(struct ub_ctx* ctx, int dothread)
508 {
509 #ifdef THREADS_DISABLED
510 	if(dothread) /* cannot do threading */
511 		return UB_NOERROR;
512 #endif
513 	lock_basic_lock(&ctx->cfglock);
514 	if(ctx->finalized) {
515 		lock_basic_unlock(&ctx->cfglock);
516 		return UB_AFTERFINAL;
517 	}
518 	ctx->dothread = dothread;
519 	lock_basic_unlock(&ctx->cfglock);
520 	return UB_NOERROR;
521 }
522 
523 int
524 ub_poll(struct ub_ctx* ctx)
525 {
526 	/* no need to hold lock while testing for readability. */
527 	return tube_poll(ctx->rr_pipe);
528 }
529 
530 int
531 ub_fd(struct ub_ctx* ctx)
532 {
533 	return tube_read_fd(ctx->rr_pipe);
534 }
535 
536 /** process answer from bg worker */
537 static int
538 process_answer_detail(struct ub_ctx* ctx, uint8_t* msg, uint32_t len,
539 	ub_callback_type* cb, void** cbarg, int* err,
540 	struct ub_result** res)
541 {
542 	struct ctx_query* q;
543 	if(context_serial_getcmd(msg, len) != UB_LIBCMD_ANSWER) {
544 		log_err("error: bad data from bg worker %d",
545 			(int)context_serial_getcmd(msg, len));
546 		return 0;
547 	}
548 
549 	lock_basic_lock(&ctx->cfglock);
550 	q = context_deserialize_answer(ctx, msg, len, err);
551 	if(!q) {
552 		lock_basic_unlock(&ctx->cfglock);
553 		/* probably simply the lookup that failed, i.e.
554 		 * response returned before cancel was sent out, so noerror */
555 		return 1;
556 	}
557 	log_assert(q->async);
558 
559 	/* grab cb while locked */
560 	if(q->cancelled) {
561 		*cb = NULL;
562 		*cbarg = NULL;
563 	} else {
564 		*cb = q->cb;
565 		*cbarg = q->cb_arg;
566 	}
567 	if(*err) {
568 		*res = NULL;
569 		ub_resolve_free(q->res);
570 	} else {
571 		/* parse the message, extract rcode, fill result */
572 		sldns_buffer* buf = sldns_buffer_new(q->msg_len);
573 		struct regional* region = regional_create();
574 		*res = q->res;
575 		(*res)->rcode = LDNS_RCODE_SERVFAIL;
576 		if(region && buf) {
577 			sldns_buffer_clear(buf);
578 			sldns_buffer_write(buf, q->msg, q->msg_len);
579 			sldns_buffer_flip(buf);
580 			libworker_enter_result(*res, buf, region,
581 				q->msg_security);
582 		}
583 		(*res)->answer_packet = q->msg;
584 		(*res)->answer_len = (int)q->msg_len;
585 		q->msg = NULL;
586 		sldns_buffer_free(buf);
587 		regional_destroy(region);
588 	}
589 	q->res = NULL;
590 	/* delete the q from list */
591 	(void)rbtree_delete(&ctx->queries, q->node.key);
592 	ctx->num_async--;
593 	context_query_delete(q);
594 	lock_basic_unlock(&ctx->cfglock);
595 
596 	if(*cb) return 2;
597 	ub_resolve_free(*res);
598 	return 1;
599 }
600 
601 /** process answer from bg worker */
602 static int
603 process_answer(struct ub_ctx* ctx, uint8_t* msg, uint32_t len)
604 {
605 	int err;
606 	ub_callback_type cb;
607 	void* cbarg;
608 	struct ub_result* res;
609 	int r;
610 
611 	r = process_answer_detail(ctx, msg, len, &cb, &cbarg, &err, &res);
612 
613 	/* no locks held while calling callback, so that library is
614 	 * re-entrant. */
615 	if(r == 2)
616 		(*cb)(cbarg, err, res);
617 
618 	return r;
619 }
620 
621 int
622 ub_process(struct ub_ctx* ctx)
623 {
624 	int r;
625 	uint8_t* msg;
626 	uint32_t len;
627 	while(1) {
628 		msg = NULL;
629 		lock_basic_lock(&ctx->rrpipe_lock);
630 		r = tube_read_msg(ctx->rr_pipe, &msg, &len, 1);
631 		lock_basic_unlock(&ctx->rrpipe_lock);
632 		if(r == 0)
633 			return UB_PIPE;
634 		else if(r == -1)
635 			break;
636 		if(!process_answer(ctx, msg, len)) {
637 			free(msg);
638 			return UB_PIPE;
639 		}
640 		free(msg);
641 	}
642 	return UB_NOERROR;
643 }
644 
645 int
646 ub_wait(struct ub_ctx* ctx)
647 {
648 	int err;
649 	ub_callback_type cb;
650 	void* cbarg;
651 	struct ub_result* res;
652 	int r;
653 	uint8_t* msg;
654 	uint32_t len;
655 	/* this is basically the same loop as _process(), but with changes.
656 	 * holds the rrpipe lock and waits with tube_wait */
657 	while(1) {
658 		lock_basic_lock(&ctx->rrpipe_lock);
659 		lock_basic_lock(&ctx->cfglock);
660 		if(ctx->num_async == 0) {
661 			lock_basic_unlock(&ctx->cfglock);
662 			lock_basic_unlock(&ctx->rrpipe_lock);
663 			break;
664 		}
665 		lock_basic_unlock(&ctx->cfglock);
666 
667 		/* keep rrpipe locked, while
668 		 * 	o waiting for pipe readable
669 		 * 	o parsing message
670 		 * 	o possibly decrementing num_async
671 		 * do callback without lock
672 		 */
673 		r = tube_wait(ctx->rr_pipe);
674 		if(r) {
675 			r = tube_read_msg(ctx->rr_pipe, &msg, &len, 1);
676 			if(r == 0) {
677 				lock_basic_unlock(&ctx->rrpipe_lock);
678 				return UB_PIPE;
679 			}
680 			if(r == -1) {
681 				lock_basic_unlock(&ctx->rrpipe_lock);
682 				continue;
683 			}
684 			r = process_answer_detail(ctx, msg, len,
685 				&cb, &cbarg, &err, &res);
686 			lock_basic_unlock(&ctx->rrpipe_lock);
687 			free(msg);
688 			if(r == 0)
689 				return UB_PIPE;
690 			if(r == 2)
691 				(*cb)(cbarg, err, res);
692 		} else {
693 			lock_basic_unlock(&ctx->rrpipe_lock);
694 		}
695 	}
696 	return UB_NOERROR;
697 }
698 
699 int
700 ub_resolve(struct ub_ctx* ctx, const char* name, int rrtype,
701 	int rrclass, struct ub_result** result)
702 {
703 	struct ctx_query* q;
704 	int r;
705 	*result = NULL;
706 
707 	lock_basic_lock(&ctx->cfglock);
708 	if(!ctx->finalized) {
709 		r = context_finalize(ctx);
710 		if(r) {
711 			lock_basic_unlock(&ctx->cfglock);
712 			return r;
713 		}
714 	}
715 	/* create new ctx_query and attempt to add to the list */
716 	lock_basic_unlock(&ctx->cfglock);
717 	q = context_new(ctx, name, rrtype, rrclass, NULL, NULL, NULL);
718 	if(!q)
719 		return UB_NOMEM;
720 	/* become a resolver thread for a bit */
721 
722 	r = libworker_fg(ctx, q);
723 	if(r) {
724 		lock_basic_lock(&ctx->cfglock);
725 		(void)rbtree_delete(&ctx->queries, q->node.key);
726 		context_query_delete(q);
727 		lock_basic_unlock(&ctx->cfglock);
728 		return r;
729 	}
730 	q->res->answer_packet = q->msg;
731 	q->res->answer_len = (int)q->msg_len;
732 	q->msg = NULL;
733 	*result = q->res;
734 	q->res = NULL;
735 
736 	lock_basic_lock(&ctx->cfglock);
737 	(void)rbtree_delete(&ctx->queries, q->node.key);
738 	context_query_delete(q);
739 	lock_basic_unlock(&ctx->cfglock);
740 	return UB_NOERROR;
741 }
742 
743 int
744 ub_resolve_event(struct ub_ctx* ctx, const char* name, int rrtype,
745 	int rrclass, void* mydata, ub_event_callback_type callback,
746 	int* async_id)
747 {
748 	struct ctx_query* q;
749 	int r;
750 
751 	if(async_id)
752 		*async_id = 0;
753 	lock_basic_lock(&ctx->cfglock);
754 	if(!ctx->finalized) {
755 		r = context_finalize(ctx);
756 		if(r) {
757 			lock_basic_unlock(&ctx->cfglock);
758 			return r;
759 		}
760 	}
761 	lock_basic_unlock(&ctx->cfglock);
762 	if(!ctx->event_worker) {
763 		ctx->event_worker = libworker_create_event(ctx,
764 			ctx->event_base);
765 		if(!ctx->event_worker) {
766 			return UB_INITFAIL;
767 		}
768 	}
769 
770 	/* set time in case answer comes from cache */
771 	ub_comm_base_now(ctx->event_worker->base);
772 
773 	/* create new ctx_query and attempt to add to the list */
774 	q = context_new(ctx, name, rrtype, rrclass, NULL, callback, mydata);
775 	if(!q)
776 		return UB_NOMEM;
777 
778 	/* attach to mesh */
779 	if((r=libworker_attach_mesh(ctx, q, async_id)) != 0)
780 		return r;
781 	return UB_NOERROR;
782 }
783 
784 
785 int
786 ub_resolve_async(struct ub_ctx* ctx, const char* name, int rrtype,
787 	int rrclass, void* mydata, ub_callback_type callback, int* async_id)
788 {
789 	struct ctx_query* q;
790 	uint8_t* msg = NULL;
791 	uint32_t len = 0;
792 
793 	if(async_id)
794 		*async_id = 0;
795 	lock_basic_lock(&ctx->cfglock);
796 	if(!ctx->finalized) {
797 		int r = context_finalize(ctx);
798 		if(r) {
799 			lock_basic_unlock(&ctx->cfglock);
800 			return r;
801 		}
802 	}
803 	if(!ctx->created_bg) {
804 		int r;
805 		ctx->created_bg = 1;
806 		lock_basic_unlock(&ctx->cfglock);
807 		r = libworker_bg(ctx);
808 		if(r) {
809 			lock_basic_lock(&ctx->cfglock);
810 			ctx->created_bg = 0;
811 			lock_basic_unlock(&ctx->cfglock);
812 			return r;
813 		}
814 	} else {
815 		lock_basic_unlock(&ctx->cfglock);
816 	}
817 
818 	/* create new ctx_query and attempt to add to the list */
819 	q = context_new(ctx, name, rrtype, rrclass, callback, NULL, mydata);
820 	if(!q)
821 		return UB_NOMEM;
822 
823 	/* write over pipe to background worker */
824 	lock_basic_lock(&ctx->cfglock);
825 	msg = context_serialize_new_query(q, &len);
826 	if(!msg) {
827 		(void)rbtree_delete(&ctx->queries, q->node.key);
828 		ctx->num_async--;
829 		context_query_delete(q);
830 		lock_basic_unlock(&ctx->cfglock);
831 		return UB_NOMEM;
832 	}
833 	if(async_id)
834 		*async_id = q->querynum;
835 	lock_basic_unlock(&ctx->cfglock);
836 
837 	lock_basic_lock(&ctx->qqpipe_lock);
838 	if(!tube_write_msg(ctx->qq_pipe, msg, len, 0)) {
839 		lock_basic_unlock(&ctx->qqpipe_lock);
840 		free(msg);
841 		return UB_PIPE;
842 	}
843 	lock_basic_unlock(&ctx->qqpipe_lock);
844 	free(msg);
845 	return UB_NOERROR;
846 }
847 
848 int
849 ub_cancel(struct ub_ctx* ctx, int async_id)
850 {
851 	struct ctx_query* q;
852 	uint8_t* msg = NULL;
853 	uint32_t len = 0;
854 	lock_basic_lock(&ctx->cfglock);
855 	q = (struct ctx_query*)rbtree_search(&ctx->queries, &async_id);
856 	if(!q || !q->async) {
857 		/* it is not there, so nothing to do */
858 		lock_basic_unlock(&ctx->cfglock);
859 		return UB_NOID;
860 	}
861 	log_assert(q->async);
862 	q->cancelled = 1;
863 
864 	/* delete it */
865 	if(!ctx->dothread) { /* if forked */
866 		(void)rbtree_delete(&ctx->queries, q->node.key);
867 		ctx->num_async--;
868 		msg = context_serialize_cancel(q, &len);
869 		context_query_delete(q);
870 		lock_basic_unlock(&ctx->cfglock);
871 		if(!msg) {
872 			return UB_NOMEM;
873 		}
874 		/* send cancel to background worker */
875 		lock_basic_lock(&ctx->qqpipe_lock);
876 		if(!tube_write_msg(ctx->qq_pipe, msg, len, 0)) {
877 			lock_basic_unlock(&ctx->qqpipe_lock);
878 			free(msg);
879 			return UB_PIPE;
880 		}
881 		lock_basic_unlock(&ctx->qqpipe_lock);
882 		free(msg);
883 	} else {
884 		lock_basic_unlock(&ctx->cfglock);
885 	}
886 	return UB_NOERROR;
887 }
888 
889 void
890 ub_resolve_free(struct ub_result* result)
891 {
892 	char** p;
893 	if(!result) return;
894 	free(result->qname);
895 	if(result->canonname != result->qname)
896 		free(result->canonname);
897 	if(result->data)
898 		for(p = result->data; *p; p++)
899 			free(*p);
900 	free(result->data);
901 	free(result->len);
902 	free(result->answer_packet);
903 	free(result->why_bogus);
904 	free(result);
905 }
906 
907 const char*
908 ub_strerror(int err)
909 {
910 	switch(err) {
911 		case UB_NOERROR: return "no error";
912 		case UB_SOCKET: return "socket io error";
913 		case UB_NOMEM: return "out of memory";
914 		case UB_SYNTAX: return "syntax error";
915 		case UB_SERVFAIL: return "server failure";
916 		case UB_FORKFAIL: return "could not fork";
917 		case UB_INITFAIL: return "initialization failure";
918 		case UB_AFTERFINAL: return "setting change after finalize";
919 		case UB_PIPE: return "error in pipe communication with async";
920 		case UB_READFILE: return "error reading file";
921 		case UB_NOID: return "error async_id does not exist";
922 		default: return "unknown error";
923 	}
924 }
925 
926 int
927 ub_ctx_set_fwd(struct ub_ctx* ctx, const char* addr)
928 {
929 	struct sockaddr_storage storage;
930 	socklen_t stlen;
931 	struct config_stub* s;
932 	char* dupl;
933 	lock_basic_lock(&ctx->cfglock);
934 	if(ctx->finalized) {
935 		lock_basic_unlock(&ctx->cfglock);
936 		errno=EINVAL;
937 		return UB_AFTERFINAL;
938 	}
939 	if(!addr) {
940 		/* disable fwd mode - the root stub should be first. */
941 		if(ctx->env->cfg->forwards &&
942 			strcmp(ctx->env->cfg->forwards->name, ".") == 0) {
943 			s = ctx->env->cfg->forwards;
944 			ctx->env->cfg->forwards = s->next;
945 			s->next = NULL;
946 			config_delstubs(s);
947 		}
948 		lock_basic_unlock(&ctx->cfglock);
949 		return UB_NOERROR;
950 	}
951 	lock_basic_unlock(&ctx->cfglock);
952 
953 	/* check syntax for addr */
954 	if(!extstrtoaddr(addr, &storage, &stlen)) {
955 		errno=EINVAL;
956 		return UB_SYNTAX;
957 	}
958 
959 	/* it parses, add root stub in front of list */
960 	lock_basic_lock(&ctx->cfglock);
961 	if(!ctx->env->cfg->forwards ||
962 		strcmp(ctx->env->cfg->forwards->name, ".") != 0) {
963 		s = calloc(1, sizeof(*s));
964 		if(!s) {
965 			lock_basic_unlock(&ctx->cfglock);
966 			errno=ENOMEM;
967 			return UB_NOMEM;
968 		}
969 		s->name = strdup(".");
970 		if(!s->name) {
971 			free(s);
972 			lock_basic_unlock(&ctx->cfglock);
973 			errno=ENOMEM;
974 			return UB_NOMEM;
975 		}
976 		s->next = ctx->env->cfg->forwards;
977 		ctx->env->cfg->forwards = s;
978 	} else {
979 		log_assert(ctx->env->cfg->forwards);
980 		s = ctx->env->cfg->forwards;
981 	}
982 	dupl = strdup(addr);
983 	if(!dupl) {
984 		lock_basic_unlock(&ctx->cfglock);
985 		errno=ENOMEM;
986 		return UB_NOMEM;
987 	}
988 	if(!cfg_strlist_insert(&s->addrs, dupl)) {
989 		lock_basic_unlock(&ctx->cfglock);
990 		errno=ENOMEM;
991 		return UB_NOMEM;
992 	}
993 	lock_basic_unlock(&ctx->cfglock);
994 	return UB_NOERROR;
995 }
996 
997 int ub_ctx_set_tls(struct ub_ctx* ctx, int tls)
998 {
999 	lock_basic_lock(&ctx->cfglock);
1000 	if(ctx->finalized) {
1001 		lock_basic_unlock(&ctx->cfglock);
1002 		errno=EINVAL;
1003 		return UB_AFTERFINAL;
1004 	}
1005 	ctx->env->cfg->ssl_upstream = tls;
1006 	lock_basic_unlock(&ctx->cfglock);
1007 	return UB_NOERROR;
1008 }
1009 
1010 int ub_ctx_set_stub(struct ub_ctx* ctx, const char* zone, const char* addr,
1011 	int isprime)
1012 {
1013 	char* a;
1014 	struct config_stub **prev, *elem;
1015 
1016 	/* check syntax for zone name */
1017 	if(zone) {
1018 		uint8_t* nm;
1019 		int nmlabs;
1020 		size_t nmlen;
1021 		if(!parse_dname(zone, &nm, &nmlen, &nmlabs)) {
1022 			errno=EINVAL;
1023 			return UB_SYNTAX;
1024 		}
1025 		free(nm);
1026 	} else {
1027 		zone = ".";
1028 	}
1029 
1030 	/* check syntax for addr (if not NULL) */
1031 	if(addr) {
1032 		struct sockaddr_storage storage;
1033 		socklen_t stlen;
1034 		if(!extstrtoaddr(addr, &storage, &stlen)) {
1035 			errno=EINVAL;
1036 			return UB_SYNTAX;
1037 		}
1038 	}
1039 
1040 	lock_basic_lock(&ctx->cfglock);
1041 	if(ctx->finalized) {
1042 		lock_basic_unlock(&ctx->cfglock);
1043 		errno=EINVAL;
1044 		return UB_AFTERFINAL;
1045 	}
1046 
1047 	/* arguments all right, now find or add the stub */
1048 	prev = &ctx->env->cfg->stubs;
1049 	elem = cfg_stub_find(&prev, zone);
1050 	if(!elem && !addr) {
1051 		/* not found and we want to delete, nothing to do */
1052 		lock_basic_unlock(&ctx->cfglock);
1053 		return UB_NOERROR;
1054 	} else if(elem && !addr) {
1055 		/* found, and we want to delete */
1056 		*prev = elem->next;
1057 		config_delstub(elem);
1058 		lock_basic_unlock(&ctx->cfglock);
1059 		return UB_NOERROR;
1060 	} else if(!elem) {
1061 		/* not found, create the stub entry */
1062 		elem=(struct config_stub*)calloc(1, sizeof(struct config_stub));
1063 		if(elem) elem->name = strdup(zone);
1064 		if(!elem || !elem->name) {
1065 			free(elem);
1066 			lock_basic_unlock(&ctx->cfglock);
1067 			errno = ENOMEM;
1068 			return UB_NOMEM;
1069 		}
1070 		elem->next = ctx->env->cfg->stubs;
1071 		ctx->env->cfg->stubs = elem;
1072 	}
1073 
1074 	/* add the address to the list and set settings */
1075 	elem->isprime = isprime;
1076 	a = strdup(addr);
1077 	if(!a) {
1078 		lock_basic_unlock(&ctx->cfglock);
1079 		errno = ENOMEM;
1080 		return UB_NOMEM;
1081 	}
1082 	if(!cfg_strlist_insert(&elem->addrs, a)) {
1083 		lock_basic_unlock(&ctx->cfglock);
1084 		errno = ENOMEM;
1085 		return UB_NOMEM;
1086 	}
1087 	lock_basic_unlock(&ctx->cfglock);
1088 	return UB_NOERROR;
1089 }
1090 
1091 int
1092 ub_ctx_resolvconf(struct ub_ctx* ctx, const char* fname)
1093 {
1094 	FILE* in;
1095 	int numserv = 0;
1096 	char buf[1024];
1097 	char* parse, *addr;
1098 	int r;
1099 
1100 	if(fname == NULL) {
1101 #if !defined(UB_ON_WINDOWS) || !defined(HAVE_WINDOWS_H)
1102 		fname = "/etc/resolv.conf";
1103 #else
1104 		FIXED_INFO *info;
1105 		ULONG buflen = sizeof(*info);
1106 		IP_ADDR_STRING *ptr;
1107 
1108 		info = (FIXED_INFO *) malloc(sizeof (FIXED_INFO));
1109 		if (info == NULL)
1110 			return UB_READFILE;
1111 
1112 		if (GetNetworkParams(info, &buflen) == ERROR_BUFFER_OVERFLOW) {
1113 			free(info);
1114 			info = (FIXED_INFO *) malloc(buflen);
1115 			if (info == NULL)
1116 				return UB_READFILE;
1117 		}
1118 
1119 		if (GetNetworkParams(info, &buflen) == NO_ERROR) {
1120 			int retval=0;
1121 			ptr = &(info->DnsServerList);
1122 			while (ptr) {
1123 				numserv++;
1124 				if((retval=ub_ctx_set_fwd(ctx,
1125 					ptr->IpAddress.String))!=0) {
1126 					free(info);
1127 					return retval;
1128 				}
1129 				ptr = ptr->Next;
1130 			}
1131 			free(info);
1132 			if (numserv==0)
1133 				return UB_READFILE;
1134 			return UB_NOERROR;
1135 		}
1136 		free(info);
1137 		return UB_READFILE;
1138 #endif /* WINDOWS */
1139 	}
1140 	in = fopen(fname, "r");
1141 	if(!in) {
1142 		/* error in errno! perror(fname) */
1143 		return UB_READFILE;
1144 	}
1145 	while(fgets(buf, (int)sizeof(buf), in)) {
1146 		buf[sizeof(buf)-1] = 0;
1147 		parse=buf;
1148 		while(*parse == ' ' || *parse == '\t')
1149 			parse++;
1150 		if(strncmp(parse, "nameserver", 10) == 0) {
1151 			numserv++;
1152 			parse += 10; /* skip 'nameserver' */
1153 			/* skip whitespace */
1154 			while(*parse == ' ' || *parse == '\t')
1155 				parse++;
1156 			addr = parse;
1157 			/* skip [0-9a-fA-F.:]*, i.e. IP4 and IP6 address */
1158 			while(isxdigit((unsigned char)*parse) || *parse=='.' || *parse==':')
1159 				parse++;
1160 			/* terminate after the address, remove newline */
1161 			*parse = 0;
1162 
1163 			if((r = ub_ctx_set_fwd(ctx, addr)) != UB_NOERROR) {
1164 				fclose(in);
1165 				return r;
1166 			}
1167 		}
1168 	}
1169 	fclose(in);
1170 	if(numserv == 0) {
1171 		/* from resolv.conf(5) if none given, use localhost */
1172 		return ub_ctx_set_fwd(ctx, "127.0.0.1");
1173 	}
1174 	return UB_NOERROR;
1175 }
1176 
1177 int
1178 ub_ctx_hosts(struct ub_ctx* ctx, const char* fname)
1179 {
1180 	FILE* in;
1181 	char buf[1024], ldata[2048];
1182 	char* parse, *addr, *name, *ins;
1183 	lock_basic_lock(&ctx->cfglock);
1184 	if(ctx->finalized) {
1185 		lock_basic_unlock(&ctx->cfglock);
1186 		errno=EINVAL;
1187 		return UB_AFTERFINAL;
1188 	}
1189 	lock_basic_unlock(&ctx->cfglock);
1190 	if(fname == NULL) {
1191 #if defined(UB_ON_WINDOWS) && defined(HAVE_WINDOWS_H)
1192 		/*
1193 		 * If this is Windows NT/XP/2K it's in
1194 		 * %WINDIR%\system32\drivers\etc\hosts.
1195 		 * If this is Windows 95/98/Me it's in %WINDIR%\hosts.
1196 		 */
1197 		name = getenv("WINDIR");
1198 		if (name != NULL) {
1199 			int retval=0;
1200 			snprintf(buf, sizeof(buf), "%s%s", name,
1201 				"\\system32\\drivers\\etc\\hosts");
1202 			if((retval=ub_ctx_hosts(ctx, buf)) !=0 ) {
1203 				snprintf(buf, sizeof(buf), "%s%s", name,
1204 					"\\hosts");
1205 				retval=ub_ctx_hosts(ctx, buf);
1206 			}
1207 			return retval;
1208 		}
1209 		return UB_READFILE;
1210 #else
1211 		fname = "/etc/hosts";
1212 #endif /* WIN32 */
1213 	}
1214 	in = fopen(fname, "r");
1215 	if(!in) {
1216 		/* error in errno! perror(fname) */
1217 		return UB_READFILE;
1218 	}
1219 	while(fgets(buf, (int)sizeof(buf), in)) {
1220 		buf[sizeof(buf)-1] = 0;
1221 		parse=buf;
1222 		while(*parse == ' ' || *parse == '\t')
1223 			parse++;
1224 		if(*parse == '#')
1225 			continue; /* skip comment */
1226 		/* format: <addr> spaces <name> spaces <name> ... */
1227 		addr = parse;
1228 		/* skip addr */
1229 		while(isxdigit((unsigned char)*parse) || *parse == '.' || *parse == ':')
1230 			parse++;
1231 		if(*parse == '\r')
1232 			parse++;
1233 		if(*parse == '\n' || *parse == 0)
1234 			continue;
1235 		if(*parse == '%')
1236 			continue; /* ignore macOSX fe80::1%lo0 localhost */
1237 		if(*parse != ' ' && *parse != '\t') {
1238 			/* must have whitespace after address */
1239 			fclose(in);
1240 			errno=EINVAL;
1241 			return UB_SYNTAX;
1242 		}
1243 		*parse++ = 0; /* end delimiter for addr ... */
1244 		/* go to names and add them */
1245 		while(*parse) {
1246 			while(*parse == ' ' || *parse == '\t' || *parse=='\n'
1247 				|| *parse=='\r')
1248 				parse++;
1249 			if(*parse == 0 || *parse == '#')
1250 				break;
1251 			/* skip name, allows (too) many printable characters */
1252 			name = parse;
1253 			while('!' <= *parse && *parse <= '~')
1254 				parse++;
1255 			if(*parse)
1256 				*parse++ = 0; /* end delimiter for name */
1257 			snprintf(ldata, sizeof(ldata), "%s %s %s",
1258 				name, str_is_ip6(addr)?"AAAA":"A", addr);
1259 			ins = strdup(ldata);
1260 			if(!ins) {
1261 				/* out of memory */
1262 				fclose(in);
1263 				errno=ENOMEM;
1264 				return UB_NOMEM;
1265 			}
1266 			lock_basic_lock(&ctx->cfglock);
1267 			if(!cfg_strlist_insert(&ctx->env->cfg->local_data,
1268 				ins)) {
1269 				lock_basic_unlock(&ctx->cfglock);
1270 				fclose(in);
1271 				errno=ENOMEM;
1272 				return UB_NOMEM;
1273 			}
1274 			lock_basic_unlock(&ctx->cfglock);
1275 		}
1276 	}
1277 	fclose(in);
1278 	return UB_NOERROR;
1279 }
1280 
1281 /** finalize the context, if not already finalized */
1282 static int ub_ctx_finalize(struct ub_ctx* ctx)
1283 {
1284 	int res = 0;
1285 	lock_basic_lock(&ctx->cfglock);
1286 	if (!ctx->finalized) {
1287 		res = context_finalize(ctx);
1288 	}
1289 	lock_basic_unlock(&ctx->cfglock);
1290 	return res;
1291 }
1292 
1293 /* Print local zones and RR data */
1294 int ub_ctx_print_local_zones(struct ub_ctx* ctx)
1295 {
1296 	int res = ub_ctx_finalize(ctx);
1297 	if (res) return res;
1298 
1299 	local_zones_print(ctx->local_zones);
1300 
1301 	return UB_NOERROR;
1302 }
1303 
1304 /* Add a new zone */
1305 int ub_ctx_zone_add(struct ub_ctx* ctx, const char *zone_name,
1306 	const char *zone_type)
1307 {
1308 	enum localzone_type t;
1309 	struct local_zone* z;
1310 	uint8_t* nm;
1311 	int nmlabs;
1312 	size_t nmlen;
1313 
1314 	int res = ub_ctx_finalize(ctx);
1315 	if (res) return res;
1316 
1317 	if(!local_zone_str2type(zone_type, &t)) {
1318 		return UB_SYNTAX;
1319 	}
1320 
1321 	if(!parse_dname(zone_name, &nm, &nmlen, &nmlabs)) {
1322 		return UB_SYNTAX;
1323 	}
1324 
1325 	lock_rw_wrlock(&ctx->local_zones->lock);
1326 	if((z=local_zones_find(ctx->local_zones, nm, nmlen, nmlabs,
1327 		LDNS_RR_CLASS_IN))) {
1328 		/* already present in tree */
1329 		lock_rw_wrlock(&z->lock);
1330 		z->type = t; /* update type anyway */
1331 		lock_rw_unlock(&z->lock);
1332 		lock_rw_unlock(&ctx->local_zones->lock);
1333 		free(nm);
1334 		return UB_NOERROR;
1335 	}
1336 	if(!local_zones_add_zone(ctx->local_zones, nm, nmlen, nmlabs,
1337 		LDNS_RR_CLASS_IN, t)) {
1338 		lock_rw_unlock(&ctx->local_zones->lock);
1339 		return UB_NOMEM;
1340 	}
1341 	lock_rw_unlock(&ctx->local_zones->lock);
1342 	return UB_NOERROR;
1343 }
1344 
1345 /* Remove zone */
1346 int ub_ctx_zone_remove(struct ub_ctx* ctx, const char *zone_name)
1347 {
1348 	struct local_zone* z;
1349 	uint8_t* nm;
1350 	int nmlabs;
1351 	size_t nmlen;
1352 
1353 	int res = ub_ctx_finalize(ctx);
1354 	if (res) return res;
1355 
1356 	if(!parse_dname(zone_name, &nm, &nmlen, &nmlabs)) {
1357 		return UB_SYNTAX;
1358 	}
1359 
1360 	lock_rw_wrlock(&ctx->local_zones->lock);
1361 	if((z=local_zones_find(ctx->local_zones, nm, nmlen, nmlabs,
1362 		LDNS_RR_CLASS_IN))) {
1363 		/* present in tree */
1364 		local_zones_del_zone(ctx->local_zones, z);
1365 	}
1366 	lock_rw_unlock(&ctx->local_zones->lock);
1367 	free(nm);
1368 	return UB_NOERROR;
1369 }
1370 
1371 /* Add new RR data */
1372 int ub_ctx_data_add(struct ub_ctx* ctx, const char *data)
1373 {
1374 	int res = ub_ctx_finalize(ctx);
1375 	if (res) return res;
1376 
1377 	res = local_zones_add_RR(ctx->local_zones, data);
1378 	return (!res) ? UB_NOMEM : UB_NOERROR;
1379 }
1380 
1381 /* Remove RR data */
1382 int ub_ctx_data_remove(struct ub_ctx* ctx, const char *data)
1383 {
1384 	uint8_t* nm;
1385 	int nmlabs;
1386 	size_t nmlen;
1387 	int res = ub_ctx_finalize(ctx);
1388 	if (res) return res;
1389 
1390 	if(!parse_dname(data, &nm, &nmlen, &nmlabs))
1391 		return UB_SYNTAX;
1392 
1393 	local_zones_del_data(ctx->local_zones, nm, nmlen, nmlabs,
1394 		LDNS_RR_CLASS_IN);
1395 
1396 	free(nm);
1397 	return UB_NOERROR;
1398 }
1399 
1400 const char* ub_version(void)
1401 {
1402 	return PACKAGE_VERSION;
1403 }
1404 
1405 int
1406 ub_ctx_set_event(struct ub_ctx* ctx, struct event_base* base) {
1407 	struct ub_event_base* new_base;
1408 
1409 	if (!ctx || !ctx->event_base || !base) {
1410 		return UB_INITFAIL;
1411 	}
1412 	if (ub_libevent_get_event_base(ctx->event_base) == base) {
1413 		/* already set */
1414 		return UB_NOERROR;
1415 	}
1416 
1417 	lock_basic_lock(&ctx->cfglock);
1418 	/* destroy the current worker - safe to pass in NULL */
1419 	libworker_delete_event(ctx->event_worker);
1420 	ctx->event_worker = NULL;
1421 	new_base = ub_libevent_event_base(base);
1422 	if (new_base)
1423 		ctx->event_base = new_base;
1424 	ctx->created_bg = 0;
1425 	ctx->dothread = 1;
1426 	lock_basic_unlock(&ctx->cfglock);
1427 	return new_base ? UB_NOERROR : UB_INITFAIL;
1428 }
1429