/* SPDX-License-Identifier: GPL-2.0-or-later */
/*
* Copyright (C) 2010 Dan Williams <dcbw@redhat.com>
*/
#include "src/core/nm-default-daemon.h"
#include "nm-dns-dnsmasq.h"
#include <stdlib.h>
#include <unistd.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <arpa/inet.h>
#include <sys/stat.h>
#include <linux/if.h>
#include "nm-glib-aux/nm-dbus-aux.h"
#include "nm-core-internal.h"
#include "platform/nm-platform.h"
#include "nm-utils.h"
#include "nm-ip4-config.h"
#include "nm-ip6-config.h"
#include "nm-dbus-manager.h"
#include "NetworkManagerUtils.h"
#define PIDFILE NMRUNDIR "/dnsmasq.pid"
#define CONFDIR NMCONFDIR "/dnsmasq.d"
#define DNSMASQ_DBUS_SERVICE "org.freedesktop.NetworkManager.dnsmasq"
#define DNSMASQ_DBUS_PATH "/uk/org/thekelleys/dnsmasq"
#define RATELIMIT_INTERVAL_MSEC 30000
#define RATELIMIT_BURST 5
#define _NMLOG_DOMAIN LOGD_DNS
/*****************************************************************************/
#define _NMLOG(level, ...) __NMLOG_DEFAULT(level, _NMLOG_DOMAIN, "dnsmasq", __VA_ARGS__)
#define WAIT_MSEC_AFTER_SIGTERM 1000
G_STATIC_ASSERT(WAIT_MSEC_AFTER_SIGTERM <= NM_SHUTDOWN_TIMEOUT_MS);
#define WAIT_MSEC_AFTER_SIGKILL 400
G_STATIC_ASSERT(WAIT_MSEC_AFTER_SIGKILL + 100 <= NM_SHUTDOWN_TIMEOUT_MS_WATCHDOG);
typedef void (*GlPidSpawnAsyncNotify)(GCancellable *cancellable,
GPid pid,
const int * p_exit_code,
GError * error,
gpointer notify_user_data);
typedef struct {
NMShutdownWaitObjHandle *shutdown_wait_handle;
guint64 p_start_time;
gint64 started_at;
GPid pid;
bool sigkilled : 1;
} GlPidKillExternalData;
typedef struct {
const char * dm_binary;
GlPidSpawnAsyncNotify notify;
gpointer notify_user_data;
GCancellable * cancellable;
} GlPidSpawnAsyncData;
static struct {
GlPidKillExternalData *kill_external_data;
GlPidSpawnAsyncData *spawn_data;
NMShutdownWaitObjHandle *terminate_handle;
GPid pid;
guint terminate_timeout_id;
guint watch_id;
/* whether the external process (with the pid from PIDFILE) was already killed.
* This only happens once, once we do that, we remember to not do it again.
* The reason is that later one, when we want to kill the process it's a
* child process. So, we wait for the exit code. */
bool kill_external_done : 1;
bool terminate_sigkill : 1;
} gl_pid;
/*****************************************************************************/
static void _gl_pid_spawn_next_step(void);
static void _gl_pid_spawn_cancelled_cb(GCancellable *cancellable, GlPidSpawnAsyncData *sdata);
/*****************************************************************************/
static gboolean
_gl_pid_unlink_pidfile(gboolean do_unlink)
{
int errsv;
if (do_unlink) {
if (unlink(PIDFILE) == 0)
_LOGD("spawn: delete PID file %s", PIDFILE);
else {
errsv = errno;
if (errsv != ENOENT)
_LOGD("spawn: delete PID file %s failed: %s (%d)",
PIDFILE,
nm_strerror_native(errsv),
errsv);
}
}
return TRUE;
}
static gboolean
_gl_pid_kill_external_timeout_cb(gpointer user_data)
{
guint64 p_start_time;
char p_state = '\0';
gint64 now;
p_start_time = nm_utils_get_start_time_for_pid(gl_pid.kill_external_data->pid, &p_state, NULL);
if (p_start_time == 0 || p_start_time != gl_pid.kill_external_data->p_start_time
|| nm_utils_process_state_is_dead(p_state)) {
_LOGD("spawn: process %" G_PID_FORMAT " from pidfile %s is gone",
gl_pid.kill_external_data->pid,
PIDFILE);
goto process_gone;
}
now = nm_utils_get_monotonic_timestamp_msec();
if (gl_pid.kill_external_data->started_at + WAIT_MSEC_AFTER_SIGTERM < now) {
if (!gl_pid.kill_external_data->sigkilled) {
_LOGD("spawn: send SIGKILL to process %" G_PID_FORMAT " from pidfile %s",
gl_pid.kill_external_data->pid,
PIDFILE);
gl_pid.kill_external_data->sigkilled = TRUE;
kill(gl_pid.kill_external_data->pid, SIGKILL);
} else if (gl_pid.kill_external_data->started_at + WAIT_MSEC_AFTER_SIGTERM
+ WAIT_MSEC_AFTER_SIGKILL
< now) {
_LOGW("spawn: process %" G_PID_FORMAT
" from pidfile %s is still here after trying to kill it. Wait no longer",
gl_pid.kill_external_data->pid,
PIDFILE);
goto process_gone;
}
}
return G_SOURCE_CONTINUE;
process_gone:
nm_shutdown_wait_obj_unregister(gl_pid.kill_external_data->shutdown_wait_handle);
g_slice_free(GlPidKillExternalData, g_steal_pointer(&gl_pid.kill_external_data));
_gl_pid_unlink_pidfile(TRUE);
_gl_pid_spawn_next_step();
return G_SOURCE_REMOVE;
}
static gboolean
_gl_pid_kill_external(void)
{
gs_free char *contents = NULL;
gs_free char *cmdline_contents = NULL;
gs_free_error GError *error = NULL;
gint64 pid64;
GPid pid = 0;
guint64 p_start_time = 0;
char proc_path[256];
gboolean do_kill = FALSE;
char p_state = '\0';
gboolean do_unlink = TRUE;
int errsv;
if (gl_pid.kill_external_done) {
if (gl_pid.kill_external_data) {
_LOGD("spawn: waiting for external process %" G_PID_FORMAT " from pidfile %s quit",
gl_pid.kill_external_data->pid,
PIDFILE);
return FALSE;
}
return TRUE;
}
if (!g_file_get_contents(PIDFILE, &contents, NULL, &error)) {
if (g_error_matches(error, G_FILE_ERROR, G_FILE_ERROR_NOENT))
do_unlink = FALSE;
_LOGD("spawn: failure to read pidfile %s: %s", PIDFILE, error->message);
g_clear_error(&error);
goto handle_kill;
}
pid64 = _nm_utils_ascii_str_to_int64(contents, 10, 2, G_MAXINT64, -1);
if (pid64 == -1 || (pid = (GPid) pid64) != pid64) {
_LOGD("spawn: pidfile %s does not contain a valid process identifier", PIDFILE);
goto handle_kill;
}
G_STATIC_ASSERT_EXPR(sizeof(pid) == sizeof(pid_t));
p_start_time = nm_utils_get_start_time_for_pid(pid, &p_state, NULL);
if (p_start_time == 0) {
_LOGD("spawn: process %" G_PID_FORMAT " from pidfile %s seems to no longer exist",
pid,
PIDFILE);
goto handle_kill;
}
nm_sprintf_buf(proc_path, "/proc/%" G_PID_FORMAT "/cmdline", pid);
if (!g_file_get_contents(proc_path, &cmdline_contents, NULL, NULL)) {
_LOGD("spawn: process %" G_PID_FORMAT " from pidfile %s seems to no longer exist",
pid,
PIDFILE);
goto handle_kill;
}
if (!strstr(cmdline_contents, "/dnsmasq")) {
_LOGD("spawn: process %" G_PID_FORMAT
" from pidfile %s seems to no longer to be a dnsmasq process",
pid,
PIDFILE);
goto handle_kill;
}
do_kill = TRUE;
handle_kill:
gl_pid.kill_external_done = TRUE;
if (!do_kill)
return _gl_pid_unlink_pidfile(do_unlink);
if (nm_utils_process_state_is_dead(p_state)) {
_LOGD("spawn: process %" G_PID_FORMAT " from pidfile %s is already a zombie", pid, PIDFILE);
return _gl_pid_unlink_pidfile(do_unlink);
}
if (kill(pid, SIGTERM) != 0) {
errsv = errno;
if (errsv == ESRCH)
_LOGD("spawn: process %" G_PID_FORMAT " from pidfile %s no longer exists",
pid,
PIDFILE);
else
_LOGD("spawn: process %" G_PID_FORMAT " from pidfile %s failed with \"%s\" (%d)",
pid,
PIDFILE,
nm_strerror_native(errsv),
errsv);
return _gl_pid_unlink_pidfile(do_unlink);
}
_LOGD("spawn: waiting for process %" G_PID_FORMAT " from pidfile %s to terminate after SIGTERM",
pid,
PIDFILE);
gl_pid.kill_external_data = g_slice_new(GlPidKillExternalData);
*gl_pid.kill_external_data = (GlPidKillExternalData){
.shutdown_wait_handle = nm_shutdown_wait_obj_register_handle_full(
g_strdup_printf("kill-external-dnsmasq-process-%" G_PID_FORMAT, pid),
TRUE),
.started_at = nm_utils_get_monotonic_timestamp_msec(),
.pid = pid,
.p_start_time = p_start_time,
};
g_timeout_add(50, _gl_pid_kill_external_timeout_cb, NULL);
return FALSE;
}
/*****************************************************************************/
static gboolean
_gl_pid_spawn_clear_pid(void)
{
gboolean was_stopping = !!gl_pid.terminate_handle;
gl_pid.pid = 0;
gl_pid.terminate_sigkill = FALSE;
nm_clear_g_source(&gl_pid.watch_id);
nm_clear_g_source(&gl_pid.terminate_timeout_id);
nm_clear_pointer(&gl_pid.terminate_handle, nm_shutdown_wait_obj_unregister);
return was_stopping;
}
static void
_gl_pid_spawn_register_for_termination(void)
{
if (gl_pid.pid > 0 && !gl_pid.terminate_handle) {
/* Create a shutdown handle as a reminder that the currently running process must be terminated
* first. This also happens to block shutdown... */
gl_pid.terminate_handle = nm_shutdown_wait_obj_register_handle_full(
g_strdup_printf("kill-dnsmasq-process-%" G_PID_FORMAT, gl_pid.pid),
TRUE);
}
}
/**
* _gl_pid_spawn_notify:
* @sdata: the notify data. @sdata might be destroyed by the function,
* depending on the other arguments (which indicate whether the
* task is complete).
* @pid: the PID to notify (argument for GlPidSpawnAsyncNotify)
* @p_exit_code: the exit code to notify (argument for GlPidSpawnAsyncNotify)
* @error: error reason to notify (argument for GlPidSpawnAsyncNotify)
*
* The GlPidSpawnAsyncNotify callback passed to _gl_pid_spawn() is used
* for two purposes:
*
* - signal that the dnsmasq process was spawned (or failed to be spawned).
* - signal that the dnsmasq process quit (if it was spawned successfully before).
*
* Depending on the arguments, the callee can see what's the case.
*/
static void
_gl_pid_spawn_notify(GlPidSpawnAsyncData *sdata, GPid pid, const int *p_exit_code, GError *error)
{
gboolean destroy = TRUE;
nm_assert(sdata);
if (error) {
nm_assert(pid == 0);
nm_assert(!p_exit_code);
if (!nm_utils_error_is_cancelled(error))
_LOGD("spawn: dnsmasq failed: %s", error->message);
} else if (p_exit_code) {
/* the only caller already logged about this condition extensively. */
nm_assert(pid > 0);
} else {
nm_assert(pid > 0);
_LOGD("spawn: dnsmasq started with pid %" G_PID_FORMAT, pid);
destroy = FALSE;
}
nm_assert((!!destroy) == (sdata != gl_pid.spawn_data));
if (destroy)
g_signal_handlers_disconnect_by_func(sdata->cancellable, _gl_pid_spawn_cancelled_cb, sdata);
sdata->notify(sdata->cancellable, pid, p_exit_code, error, sdata->notify_user_data);
if (destroy) {
g_clear_object(&sdata->cancellable);
nm_g_slice_free(sdata);
}
}
static void
_gl_pid_spawn_cancelled_cb(GCancellable *cancellable, GlPidSpawnAsyncData *sdata)
{
gs_free_error GError *error = NULL;
if (sdata == gl_pid.spawn_data) {
gl_pid.spawn_data = NULL;
/* When the cancellable gets cancelled, we terminate the current dnsmasq instance
* in the background. The only way for keeping dnsmasq running while unregistering
* the callback is by calling _gl_pid_spawn() without a new callback. */
_gl_pid_spawn_register_for_termination();
} else
nm_assert_not_reached();
if (!g_cancellable_set_error_if_cancelled(cancellable, &error))
nm_assert_not_reached();
_gl_pid_spawn_notify(sdata, 0, NULL, error);
_gl_pid_spawn_next_step();
}
static gboolean
_gl_pid_spawn_terminate_timeout_cb(gpointer user_data)
{
nm_assert(gl_pid.terminate_timeout_id != 0);
nm_assert(gl_pid.pid > 0);
nm_assert(gl_pid.terminate_handle);
nm_assert(gl_pid.watch_id != 0);
gl_pid.terminate_timeout_id = 0;
if (!gl_pid.terminate_sigkill) {
gl_pid.terminate_sigkill = TRUE;
_LOGD("spawn: send SIGKILL signal to dnsmasq process %" G_PID_FORMAT
" as it did not exit yet",
gl_pid.pid);
kill(gl_pid.pid, SIGKILL);
gl_pid.terminate_timeout_id =
g_timeout_add(WAIT_MSEC_AFTER_SIGKILL, _gl_pid_spawn_terminate_timeout_cb, NULL);
} else {
_LOGE("spawn: process %" G_PID_FORMAT " did not exit even after SIGTERM and SIGKILL",
gl_pid.pid);
/* we don't unregister the watch. Just forget about it. We still want to reap the child eventually. */
gl_pid.watch_id = 0;
_gl_pid_spawn_clear_pid();
_gl_pid_spawn_next_step();
}
return G_SOURCE_REMOVE;
}
static void
_gl_pid_spawn_watch_cb(GPid pid, int status, gpointer user_data)
{
int err;
gboolean was_stopping;
nm_assert(pid > 0);
if (WIFEXITED(status)) {
err = WEXITSTATUS(status);
if (err) {
char sbuf[100];
_LOGW("spawn: dnsmasq process %" G_PID_FORMAT " exited with error: %s",
pid,
nm_utils_dnsmasq_status_to_string(err, sbuf, sizeof(sbuf)));
} else
_LOGD("spawn: dnsmasq process %" G_PID_FORMAT " exited normally", pid);
} else if (WIFSTOPPED(status))
_LOGW("spawn: dnsmasq process %" G_PID_FORMAT " stopped unexpectedly with signal %d",
pid,
WSTOPSIG(status));
else if (WIFSIGNALED(status))
_LOGW("spawn: dnsmasq process %" G_PID_FORMAT " died with signal %d",
pid,
WTERMSIG(status));
else
_LOGW("spawn: dnsmasq process %" G_PID_FORMAT " died from an unknown cause (status %d)",
pid,
status);
if (gl_pid.pid != pid) {
/* this can only happen, if we timed out and no longer care about this PID.
* We still kept the watch-id active, to reap the process. Nothing to do. */
return;
}
nm_assert(gl_pid.watch_id != 0);
gl_pid.watch_id = 0;
_gl_pid_unlink_pidfile(TRUE);
was_stopping = _gl_pid_spawn_clear_pid();
if (gl_pid.spawn_data) {
if (was_stopping) {
/* The current process was scheduled to be terminated. That means the pending
* spawn_data is not for that former instance, but for starting a new one.
* This spawn-request is not yet complete, instead it's just about to start. */
} else
_gl_pid_spawn_notify(g_steal_pointer(&gl_pid.spawn_data), pid, &status, NULL);
}
_gl_pid_spawn_next_step();
}
/**
* _gl_pid_spawn_next_step:
*
* The state about a running dnsmasq process is tracked in @gl_pid. There are
* various things that can happen
*
* - user calls _gl_pid_spawn() -- which might terminate an existing run first.
* - user might cancel the GCancellable -- which would abort the spawning or
* kill the current instance.
* - the child process might exit.
*
* In all these cases, we call _gl_pid_spawn_next_step() to check what to do next.
*/
static void
_gl_pid_spawn_next_step(void)
{
gs_free_error GError *error = NULL;
const char * argv[15];
GPid pid = 0;
guint argv_idx;
if (!_gl_pid_kill_external()) {
/* we need to wait to kill the instance from the PID file first. */
return;
}
if (gl_pid.terminate_handle) {
nm_assert(gl_pid.pid > 0);
if (gl_pid.terminate_timeout_id == 0) {
_LOGD("spawn: send SIGTERM signal to process %" G_PID_FORMAT, gl_pid.pid);
gl_pid.terminate_timeout_id =
g_timeout_add(WAIT_MSEC_AFTER_SIGTERM, _gl_pid_spawn_terminate_timeout_cb, NULL);
kill(gl_pid.pid, SIGTERM);
}
/* we can only wait for the process to exit. */
return;
}
if (!gl_pid.spawn_data) {
/* we are not requested to spawn another process. */
nm_assert(gl_pid.pid == 0);
return;
}
if (gl_pid.pid > 0) {
/* the process we desire is already running. All good. */
return;
}
argv_idx = 0;
argv[argv_idx++] = gl_pid.spawn_data->dm_binary;
argv[argv_idx++] = "--no-resolv"; /* Use only commandline */
argv[argv_idx++] = "--keep-in-foreground";
argv[argv_idx++] = "--no-hosts"; /* don't use /etc/hosts to resolve */
argv[argv_idx++] = "--bind-interfaces";
argv[argv_idx++] = "--pid-file=" PIDFILE;
argv[argv_idx++] = "--listen-address=127.0.0.1"; /* Should work for both 4 and 6 */
argv[argv_idx++] = "--cache-size=400";
argv[argv_idx++] = "--clear-on-reload"; /* clear cache when dns server changes */
argv[argv_idx++] = "--conf-file=/dev/null"; /* avoid loading /etc/dnsmasq.conf */
argv[argv_idx++] = "--proxy-dnssec"; /* Allow DNSSEC to pass through */
argv[argv_idx++] = "--enable-dbus=" DNSMASQ_DBUS_SERVICE;
/* dnsmasq exits if the conf dir is not present */
if (g_file_test(CONFDIR, G_FILE_TEST_IS_DIR))
argv[argv_idx++] = "--conf-dir=" CONFDIR;
argv[argv_idx++] = NULL;
nm_assert(argv_idx <= G_N_ELEMENTS(argv));
if (!_LOGD_ENABLED())
_LOGI("starting %s", gl_pid.spawn_data->dm_binary);
else {
gs_free char *cmdline = NULL;
_LOGD("spawn: starting dnsmasq: %s", (cmdline = g_strjoinv(" ", (char **) argv)));
}
if (!g_spawn_async(NULL,
(char **) argv,
NULL,
G_SPAWN_DO_NOT_REAP_CHILD,
nm_utils_setpgid,
NULL,
&pid,
&error)) {
_gl_pid_spawn_notify(g_steal_pointer(&gl_pid.spawn_data), 0, NULL, error);
return;
}
gl_pid.pid = pid;
gl_pid.watch_id = g_child_watch_add(pid, _gl_pid_spawn_watch_cb, NULL);
_gl_pid_spawn_notify(gl_pid.spawn_data, pid, NULL, NULL);
}
/**
* _gl_pid_spawn:
* @dm_binary: the binary name for dnsmasq to spawn. We could
* detect it ad-hoc right when needing it. But that would be
* asynchronously, and if dnsmasq is not in $PATH, we want to
* fail right away (synchronously). Hence, @dm_binary is
* an argument.
* @cancellable: abort the operation. This will invoke the callback
* a last time. Also, if the dnsmasq process is currently running,
* it will be terminated in the background. To unregister a notify
* call without killing the dnsmasq process, call _gl_pid_spawn()
* again with all arguments %NULL.
* @notify: the callback when the process is started successfully
* and when the process terminates.
* @notify_user_data: user-data for callback.
*
* If a dnsmasq process is already running (from a previous call of
* _gl_pid_spawn()), that one will be replaced. Meaning, the other notify
* callback will be invoked with NM_UTILS_ERROR/NM_UTILS_ERROR_CANCELLED_DISPOSING.
* If you the @dm_binary argument, the previously running process will
* also be terminated first, before spawning a new instance.
* However, you may also pass all arguments as %NULL. In that case, the
* previous @notify will be completed (and forgotten), but the dnsmasq
* process will be left running in the background.
*
* So, you can:
*
* - call _gl_pid_spawn() with a @dm_binary argument. The previous
* notify() completes with NM_UTILS_ERROR_CANCELLED_DISPOSING and
* the dnsmasq process gets killed.
* - cancel the GCancellable, in this case the notify() completes
* with G_IO_ERROR_CANCELLED and the dnsmasq process gets killed.
* - call _gl_pid_spawn() with all arguments %NULL. In that case
* the previous notify() completes with NM_UTILS_ERROR_CANCELLED_DISPOSING
* but the dnsmasq process keeps running in the background.
*
* The callback is used in two cases.
* - When spawning the process it will be invoked always exactly once.
* In this case the callback might be invoked synchronously or
* asynchronously.
* This either provides a PID or a failure reason. In case of a
* failure, that's the end and the process is not running.
* - if the process could be spawned, the child process with the
* provided PID gets monitored. When the process exits, the callback
* will be invoked again, with a failure reason. This is always done
* asynchronously.
*/
static void
_gl_pid_spawn(const char * dm_binary,
GCancellable * cancellable,
GlPidSpawnAsyncNotify notify,
gpointer notify_user_data)
{
GlPidSpawnAsyncData *sdata_replace;
sdata_replace = g_steal_pointer(&gl_pid.spawn_data);
if (dm_binary) {
nm_assert(notify);
nm_assert(G_IS_CANCELLABLE(cancellable));
gl_pid.spawn_data = g_slice_new(GlPidSpawnAsyncData);
*gl_pid.spawn_data = (GlPidSpawnAsyncData){
.dm_binary = dm_binary,
.notify = notify,
.notify_user_data = notify_user_data,
.cancellable = g_object_ref(cancellable),
};
g_signal_connect(cancellable,
"cancelled",
G_CALLBACK(_gl_pid_spawn_cancelled_cb),
gl_pid.spawn_data);
/* If dnsmasq is running, we terminate it and start a new instance.
*
* If the user would not provide a new callback, this would mean to fail/abort
* the currently subscribed notification (below). But it would leave the dnsmasq
* instance running in the background.
* This allows the user to say to not care about the current instance
* anymore, but still leave it running.
*
* To kill the dnsmasq process without scheduling a new one, cancel the cancellable
* instead. */
_gl_pid_spawn_register_for_termination();
} else {
nm_assert(!notify);
nm_assert(!cancellable);
nm_assert(!notify_user_data);
}
if (sdata_replace) {
gs_free_error GError *error = NULL;
/* we don't mark the error as G_IO_ERROR/G_IO_ERROR_CANCELLED. That
* is reserved for cancelling the cancellable. However, the current
* request was obsoleted/replaced by a new one, so we fail it with
* NM_UTILS_ERROR/NM_UTILS_ERROR_CANCELLED_DISPOSING. */
nm_utils_error_set_cancelled(&error, TRUE, NULL);
_gl_pid_spawn_notify(sdata_replace, 0, NULL, error);
}
_gl_pid_spawn_next_step();
}
/*****************************************************************************/
typedef struct {
GDBusConnection *dbus_connection;
GVariant *set_server_ex_args;
GCancellable *update_cancellable;
GCancellable *main_cancellable;
char *name_owner;
gint64 burst_start_at;
GPid process_pid;
guint name_owner_changed_id;
guint main_timeout_id;
guint burst_retry_timeout_id;
guint8 burst_count;
bool is_stopped : 1;
} NMDnsDnsmasqPrivate;
struct _NMDnsDnsmasq {
NMDnsPlugin parent;
NMDnsDnsmasqPrivate _priv;
};
struct _NMDnsDnsmasqClass {
NMDnsPluginClass parent;
};
G_DEFINE_TYPE(NMDnsDnsmasq, nm_dns_dnsmasq, NM_TYPE_DNS_PLUGIN)
#define NM_DNS_DNSMASQ_GET_PRIVATE(self) _NM_GET_PRIVATE(self, NMDnsDnsmasq, NM_IS_DNS_DNSMASQ)
/*****************************************************************************/
#undef _NMLOG
#define _NMLOG(level, ...) __NMLOG_DEFAULT_WITH_ADDR(level, _NMLOG_DOMAIN, "dnsmasq", __VA_ARGS__)
/*****************************************************************************/
static gboolean start_dnsmasq(NMDnsDnsmasq *self, gboolean force_start, GError **error);
/*****************************************************************************/
static void
add_dnsmasq_nameserver(NMDnsDnsmasq * self,
GVariantBuilder *servers,
const char * ip,
const char * domain)
{
g_return_if_fail(ip);
_LOGD("adding nameserver '%s'%s%s%s",
ip,
NM_PRINT_FMT_QUOTED(domain, " for domain \"", domain, "\"", ""));
g_variant_builder_open(servers, G_VARIANT_TYPE("as"));
g_variant_builder_add(servers, "s", ip);
if (domain)
g_variant_builder_add(servers, "s", domain);
g_variant_builder_close(servers);
}
#define IP_ADDR_TO_STRING_BUFLEN (NM_UTILS_INET_ADDRSTRLEN + 1 + IFNAMSIZ)
static const char *
ip_addr_to_string(int addr_family, gconstpointer addr, const char *iface, char *out_buf)
{
int n_written;
char buf2[NM_UTILS_INET_ADDRSTRLEN];
const char *separator;
nm_assert_addr_family(addr_family);
nm_assert(addr);
nm_assert(out_buf);
if (addr_family == AF_INET) {
nm_utils_inet_ntop(addr_family, addr, buf2);
separator = "@";
} else {
if (IN6_IS_ADDR_V4MAPPED(addr))
_nm_utils_inet4_ntop(((const struct in6_addr *) addr)->s6_addr32[3], buf2);
else
_nm_utils_inet6_ntop(addr, buf2);
/* Need to scope link-local addresses with %<zone-id>. Before dnsmasq 2.58,
* only '@' was supported as delimiter. Since 2.58, '@' and '%' are
* supported. Due to a bug, since 2.73 only '%' works properly as "server"
* address.
*/
separator = IN6_IS_ADDR_LINKLOCAL(addr) ? "%" : "@";
}
n_written = g_snprintf(out_buf,
IP_ADDR_TO_STRING_BUFLEN,
"%s%s%s",
buf2,
iface ? separator : "",
iface ?: "");
nm_assert(n_written < IP_ADDR_TO_STRING_BUFLEN);
return out_buf;
}
static void
add_global_config(NMDnsDnsmasq * self,
GVariantBuilder * dnsmasq_servers,
const NMGlobalDnsConfig *config)
{
guint i, j;
g_return_if_fail(config);
for (i = 0; i < nm_global_dns_config_get_num_domains(config); i++) {
NMGlobalDnsDomain *domain = nm_global_dns_config_get_domain(config, i);
const char *const *servers = nm_global_dns_domain_get_servers(domain);
const char * name = nm_global_dns_domain_get_name(domain);
g_return_if_fail(name);
for (j = 0; servers && servers[j]; j++) {
if (!strcmp(name, "*"))
add_dnsmasq_nameserver(self, dnsmasq_servers, servers[j], NULL);
else
add_dnsmasq_nameserver(self, dnsmasq_servers, servers[j], name);
}
}
}
static void
add_ip_config(NMDnsDnsmasq *self, GVariantBuilder *servers, const NMDnsConfigIPData *ip_data)
{
NMIPConfig * ip_config = ip_data->ip_config;
gconstpointer addr;
const char * iface, *domain;
char ip_addr_to_string_buf[IP_ADDR_TO_STRING_BUFLEN];
int addr_family;
guint i, j, num;
iface = nm_platform_link_get_name(NM_PLATFORM_GET, ip_data->data->ifindex);
addr_family = nm_ip_config_get_addr_family(ip_config);
num = nm_ip_config_get_num_nameservers(ip_config);
for (i = 0; i < num; i++) {
addr = nm_ip_config_get_nameserver(ip_config, i);
ip_addr_to_string(addr_family, addr, iface, ip_addr_to_string_buf);
if (!ip_data->domains.has_default_route_explicit && ip_data->domains.has_default_route)
add_dnsmasq_nameserver(self, servers, ip_addr_to_string_buf, NULL);
if (ip_data->domains.search) {
for (j = 0; ip_data->domains.search[j]; j++) {
domain = nm_utils_parse_dns_domain(ip_data->domains.search[j], NULL);
add_dnsmasq_nameserver(self,
servers,
ip_addr_to_string_buf,
domain[0] ? domain : NULL);
}
}
if (ip_data->domains.reverse) {
for (j = 0; ip_data->domains.reverse[j]; j++) {
add_dnsmasq_nameserver(self,
servers,
ip_addr_to_string_buf,
ip_data->domains.reverse[j]);
}
}
}
}
static GVariant *
create_update_args(NMDnsDnsmasq * self,
const NMGlobalDnsConfig *global_config,
const CList * ip_config_lst_head,
const char * hostname)
{
GVariantBuilder servers;
const NMDnsConfigIPData *ip_data;
g_variant_builder_init(&servers, G_VARIANT_TYPE("aas"));
if (global_config)
add_global_config(self, &servers, global_config);
else {
c_list_for_each_entry (ip_data, ip_config_lst_head, ip_config_lst)
add_ip_config(self, &servers, ip_data);
}
return g_variant_new("(aas)", &servers);
}
/*****************************************************************************/
static void
dnsmasq_update_done(GObject *source_object, GAsyncResult *res, gpointer user_data)
{
NMDnsDnsmasq *self;
gs_free_error GError *error = NULL;
gs_unref_variant GVariant *response = NULL;
response = g_dbus_connection_call_finish(G_DBUS_CONNECTION(source_object), res, &error);
if (nm_utils_error_is_cancelled(error))
return;
self = user_data;
if (!response)
_LOGW("dnsmasq update failed: %s", error->message);
else
_LOGD("dnsmasq update successful");
}
static void
send_dnsmasq_update(NMDnsDnsmasq *self)
{
NMDnsDnsmasqPrivate *priv = NM_DNS_DNSMASQ_GET_PRIVATE(self);
if (!priv->name_owner || !priv->set_server_ex_args)
return;
_LOGD("trying to update dnsmasq nameservers");
nm_clear_g_cancellable(&priv->update_cancellable);
priv->update_cancellable = g_cancellable_new();
g_dbus_connection_call(priv->dbus_connection,
priv->name_owner,
DNSMASQ_DBUS_PATH,
DNSMASQ_DBUS_SERVICE,
"SetServersEx",
priv->set_server_ex_args,
NULL,
G_DBUS_CALL_FLAGS_NO_AUTO_START,
20000,
priv->update_cancellable,
dnsmasq_update_done,
self);
}
/*****************************************************************************/
static void
_main_cleanup(NMDnsDnsmasq *self, gboolean emit_failed)
{
NMDnsDnsmasqPrivate *priv = NM_DNS_DNSMASQ_GET_PRIVATE(self);
if (!priv->main_cancellable)
return;
priv->process_pid = 0;
nm_clear_g_free(&priv->name_owner);
nm_clear_g_dbus_connection_signal(priv->dbus_connection, &priv->name_owner_changed_id);
nm_clear_g_source(&priv->main_timeout_id);
nm_clear_g_cancellable(&priv->update_cancellable);
/* cancelling the main_cancellable will also cause _gl_pid_spawn*() to terminate the
* process in the background. */
nm_clear_g_cancellable(&priv->main_cancellable);
if (!priv->is_stopped && priv->burst_retry_timeout_id == 0) {
start_dnsmasq(self, FALSE, NULL);
send_dnsmasq_update(self);
}
}
static void
name_owner_changed(NMDnsDnsmasq *self, const char *name_owner)
{
NMDnsDnsmasqPrivate *priv = NM_DNS_DNSMASQ_GET_PRIVATE(self);
name_owner = nm_str_not_empty(name_owner);
if (nm_streq0(priv->name_owner, name_owner))
return;
g_free(priv->name_owner);
priv->name_owner = g_strdup(name_owner);
if (!name_owner) {
_LOGT("D-Bus name for dnsmasq disappeared");
_main_cleanup(self, TRUE);
return;
}
_LOGT("D-Bus name for dnsmasq got owner %s", name_owner);
nm_clear_g_source(&priv->main_timeout_id);
send_dnsmasq_update(self);
}
static void
name_owner_changed_cb(GDBusConnection *connection,
const char * sender_name,
const char * object_path,
const char * interface_name,
const char * signal_name,
GVariant * parameters,
gpointer user_data)
{
NMDnsDnsmasq *self = user_data;
const char * new_owner;
if (!g_variant_is_of_type(parameters, G_VARIANT_TYPE("(sss)")))
return;
g_variant_get(parameters, "(&s&s&s)", NULL, NULL, &new_owner);
name_owner_changed(self, new_owner);
}
static void
get_name_owner_cb(const char *name_owner, GError *error, gpointer user_data)
{
if (!name_owner && g_error_matches(error, G_IO_ERROR, G_IO_ERROR_CANCELLED))
return;
name_owner_changed(user_data, name_owner);
}
static gboolean
spawn_timeout_cb(gpointer user_data)
{
NMDnsDnsmasq *self = user_data;
_LOGW("timeout waiting for dnsmasq to appear on D-Bus");
_main_cleanup(self, TRUE);
return G_SOURCE_REMOVE;
}
static void
spawn_notify(GCancellable *cancellable,
GPid pid,
const int * p_exit_code,
GError * error,
gpointer notify_user_data)
{
NMDnsDnsmasq * self;
NMDnsDnsmasqPrivate *priv;
if (nm_utils_error_is_cancelled(error))
return;
self = notify_user_data;
priv = NM_DNS_DNSMASQ_GET_PRIVATE(self);
if (error || p_exit_code) {
_main_cleanup(self, TRUE);
return;
}
nm_assert(pid > 0);
priv->process_pid = pid;
priv->name_owner_changed_id =
nm_dbus_connection_signal_subscribe_name_owner_changed(priv->dbus_connection,
DNSMASQ_DBUS_SERVICE,
name_owner_changed_cb,
self,
NULL);
nm_dbus_connection_call_get_name_owner(priv->dbus_connection,
DNSMASQ_DBUS_SERVICE,
-1,
priv->main_cancellable,
get_name_owner_cb,
self);
}
static gboolean
_burst_retry_timeout_cb(gpointer user_data)
{
NMDnsDnsmasq * self = user_data;
NMDnsDnsmasqPrivate *priv = NM_DNS_DNSMASQ_GET_PRIVATE(self);
priv->burst_retry_timeout_id = 0;
start_dnsmasq(self, TRUE, NULL);
send_dnsmasq_update(self);
return G_SOURCE_REMOVE;
}
static gboolean
start_dnsmasq(NMDnsDnsmasq *self, gboolean force_start, GError **error)
{
NMDnsDnsmasqPrivate *priv = NM_DNS_DNSMASQ_GET_PRIVATE(self);
const char * dm_binary;
gint64 now;
if (G_LIKELY(priv->main_cancellable)) {
/* The process is already running or about to be started. Nothing to do. */
return TRUE;
}
dm_binary = nm_utils_find_helper("dnsmasq", DNSMASQ_PATH, NULL);
if (!dm_binary) {
/* We resolve the binary name before trying to start it asynchronously.
* The reason is, that if dnsmasq is not installed, we want to fail early,
* so that NMDnsManager can fallback to a non-caching implementation. */
nm_utils_error_set(error, NM_UTILS_ERROR_UNKNOWN, "could not find dnsmasq binary");
return FALSE;
}
if (!priv->dbus_connection) {
priv->dbus_connection = nm_g_object_ref(NM_MAIN_DBUS_CONNECTION_GET);
if (!priv->dbus_connection) {
nm_utils_error_set(error,
NM_UTILS_ERROR_UNKNOWN,
"no D-Bus connection available to talk to dnsmasq");
return FALSE;
}
}
now = nm_utils_get_monotonic_timestamp_msec();
if (force_start || priv->burst_start_at == 0
|| priv->burst_start_at + RATELIMIT_INTERVAL_MSEC <= now) {
priv->burst_start_at = now;
priv->burst_count = 1;
nm_clear_g_source(&priv->burst_retry_timeout_id);
_LOGT("rate-limit: start burst interval of %d seconds %s",
RATELIMIT_INTERVAL_MSEC / 1000,
force_start ? " (force)" : "");
} else if (priv->burst_count < RATELIMIT_BURST) {
nm_assert(priv->burst_retry_timeout_id == 0);
priv->burst_count++;
_LOGT("rate-limit: %u try within burst interval of %d seconds",
(guint) priv->burst_count,
RATELIMIT_INTERVAL_MSEC / 1000);
} else {
if (priv->burst_retry_timeout_id == 0) {
_LOGW("dnsmasq dies and gets respawned too quickly. Back off. Something is very wrong");
priv->burst_retry_timeout_id =
g_timeout_add_seconds((2 * RATELIMIT_INTERVAL_MSEC) / 1000,
_burst_retry_timeout_cb,
self);
} else
_LOGT("rate-limit: currently rate-limited from restart");
return TRUE;
}
priv->main_timeout_id = g_timeout_add(10000, spawn_timeout_cb, self);
priv->main_cancellable = g_cancellable_new();
_gl_pid_spawn(dm_binary, priv->main_cancellable, spawn_notify, self);
return TRUE;
}
static gboolean
update(NMDnsPlugin * plugin,
const NMGlobalDnsConfig *global_config,
const CList * ip_config_lst_head,
const char * hostname,
GError ** error)
{
NMDnsDnsmasq * self = NM_DNS_DNSMASQ(plugin);
NMDnsDnsmasqPrivate *priv = NM_DNS_DNSMASQ_GET_PRIVATE(self);
if (!start_dnsmasq(self, TRUE, error))
return FALSE;
nm_clear_pointer(&priv->set_server_ex_args, g_variant_unref);
priv->set_server_ex_args =
g_variant_ref_sink(create_update_args(self, global_config, ip_config_lst_head, hostname));
send_dnsmasq_update(self);
return TRUE;
}
/*****************************************************************************/
static void
stop(NMDnsPlugin *plugin)
{
NMDnsDnsmasq * self = NM_DNS_DNSMASQ(plugin);
NMDnsDnsmasqPrivate *priv = NM_DNS_DNSMASQ_GET_PRIVATE(self);
priv->is_stopped = TRUE;
priv->burst_start_at = 0;
nm_clear_g_source(&priv->burst_retry_timeout_id);
/* Cancelling the cancellable will also terminate the
* process (in the background). */
_main_cleanup(self, FALSE);
}
/*****************************************************************************/
static void
nm_dns_dnsmasq_init(NMDnsDnsmasq *self)
{}
NMDnsPlugin *
nm_dns_dnsmasq_new(void)
{
return g_object_new(NM_TYPE_DNS_DNSMASQ, NULL);
}
static void
dispose(GObject *object)
{
NMDnsDnsmasq * self = NM_DNS_DNSMASQ(object);
NMDnsDnsmasqPrivate *priv = NM_DNS_DNSMASQ_GET_PRIVATE(self);
priv->is_stopped = TRUE;
nm_clear_g_source(&priv->burst_retry_timeout_id);
_main_cleanup(self, FALSE);
nm_clear_pointer(&priv->set_server_ex_args, g_variant_unref);
G_OBJECT_CLASS(nm_dns_dnsmasq_parent_class)->dispose(object);
g_clear_object(&priv->dbus_connection);
}
static void
nm_dns_dnsmasq_class_init(NMDnsDnsmasqClass *dns_class)
{
NMDnsPluginClass *plugin_class = NM_DNS_PLUGIN_CLASS(dns_class);
GObjectClass * object_class = G_OBJECT_CLASS(dns_class);
object_class->dispose = dispose;
plugin_class->plugin_name = "dnsmasq";
plugin_class->is_caching = TRUE;
plugin_class->stop = stop;
plugin_class->update = update;
}