/* SPDX-License-Identifier: GPL-2.0+ */ /* * Copyright (C) 2004 - 2012 Red Hat, Inc. * Copyright (C) 2005 - 2008 Novell, Inc. */ #include "nm-default.h" #include #include #include #include #include #include #include #include #include "main-utils.h" #include "NetworkManagerUtils.h" #include "nm-config.h" static gboolean sighup_handler(gpointer user_data) { nm_main_config_reload(GPOINTER_TO_INT(user_data)); return G_SOURCE_CONTINUE; } static gboolean sigint_handler(gpointer user_data) { GMainLoop *main_loop = user_data; nm_log_info(LOGD_CORE, "caught SIGINT, shutting down normally."); g_main_loop_quit(main_loop); return G_SOURCE_REMOVE; } static gboolean sigterm_handler(gpointer user_data) { GMainLoop *main_loop = user_data; nm_log_info(LOGD_CORE, "caught SIGTERM, shutting down normally."); g_main_loop_quit(main_loop); return G_SOURCE_REMOVE; } /** * nm_main_utils_setup_signals: * @main_loop: the #GMainLoop to quit when SIGINT or SIGTERM is received * * Sets up signal handling for NetworkManager. */ void nm_main_utils_setup_signals(GMainLoop *main_loop) { g_return_if_fail(main_loop != NULL); signal(SIGPIPE, SIG_IGN); g_unix_signal_add(SIGHUP, sighup_handler, GINT_TO_POINTER(SIGHUP)); if (nm_glib_check_version(2, 36, 0)) { g_unix_signal_add(SIGUSR1, sighup_handler, GINT_TO_POINTER(SIGUSR1)); g_unix_signal_add(SIGUSR2, sighup_handler, GINT_TO_POINTER(SIGUSR2)); } else nm_log_warn(LOGD_CORE, "glib-version: cannot handle SIGUSR1 and SIGUSR2 signals. Consider upgrading " "glib to 2.36.0 or newer"); g_unix_signal_add(SIGINT, sigint_handler, main_loop); g_unix_signal_add(SIGTERM, sigterm_handler, main_loop); } gboolean nm_main_utils_write_pidfile(const char *pidfile) { char pid[16]; int fd; int errsv; gboolean success = FALSE; if ((fd = open(pidfile, O_CREAT | O_WRONLY | O_TRUNC | O_CLOEXEC, 00644)) < 0) { errsv = errno; fprintf(stderr, _("Opening %s failed: %s\n"), pidfile, nm_strerror_native(errsv)); return FALSE; } g_snprintf(pid, sizeof(pid), "%d", getpid()); if (write(fd, pid, strlen(pid)) < 0) { errsv = errno; fprintf(stderr, _("Writing to %s failed: %s\n"), pidfile, nm_strerror_native(errsv)); } else success = TRUE; if (nm_close(fd)) { errsv = errno; fprintf(stderr, _("Closing %s failed: %s\n"), pidfile, nm_strerror_native(errsv)); } return success; } void nm_main_utils_ensure_statedir() { gs_free char *parent = NULL; int errsv; parent = g_path_get_dirname(NMSTATEDIR); /* Ensure parent state directories exists */ if (parent && parent[0] == '/' && parent[1] != '\0' && g_mkdir_with_parents(parent, 0755) != 0) { errsv = errno; fprintf(stderr, "Cannot create parents for '%s': %s", NMSTATEDIR, nm_strerror_native(errsv)); exit(1); } /* Ensure state directory exists */ if (g_mkdir_with_parents(NMSTATEDIR, 0700) != 0) { errsv = errno; fprintf(stderr, "Cannot create '%s': %s", NMSTATEDIR, nm_strerror_native(errsv)); exit(1); } } void nm_main_utils_ensure_rundir() { int errsv; /* Setup runtime directory */ if (g_mkdir_with_parents(NMRUNDIR, 0755) != 0) { errsv = errno; fprintf(stderr, _("Cannot create '%s': %s"), NMRUNDIR, nm_strerror_native(errsv)); exit(1); } /* NM_CONFIG_DEVICE_STATE_DIR is used to determine whether NM is restarted or not. * It is important to set NMConfigCmdLineOptions.first_start before creating * the directory. */ nm_assert(g_str_has_prefix(NM_CONFIG_DEVICE_STATE_DIR, NMRUNDIR "/")); if (g_mkdir(NM_CONFIG_DEVICE_STATE_DIR, 0755) != 0) { errsv = errno; if (errsv != EEXIST) { fprintf(stderr, _("Cannot create '%s': %s"), NM_CONFIG_DEVICE_STATE_DIR, nm_strerror_native(errsv)); exit(1); } } } /** * nm_main_utils_ensure_not_running_pidfile: * @pidfile: the pid file * * Checks whether the pidfile already exists and contains PID of a running * process. * * Exits with code 1 if a conflicting process is running. */ void nm_main_utils_ensure_not_running_pidfile(const char *pidfile) { gs_free char *contents = NULL; gs_free char *proc_cmdline = NULL; gsize len = 0; long pid; const char * process_name; const char * prgname = g_get_prgname(); g_return_if_fail(prgname); if (!pidfile || !*pidfile) return; if (!g_file_get_contents(pidfile, &contents, &len, NULL)) return; if (len <= 0) return; errno = 0; pid = strtol(contents, NULL, 10); if (pid <= 0 || pid > 65536 || errno) return; nm_clear_g_free(&contents); proc_cmdline = g_strdup_printf("/proc/%ld/cmdline", pid); if (!g_file_get_contents(proc_cmdline, &contents, &len, NULL)) return; process_name = strrchr(contents, '/'); if (process_name) process_name++; else process_name = contents; if (strcmp(process_name, prgname) == 0) { /* Check that the process exists */ if (kill(pid, 0) == 0) { fprintf(stderr, _("%s is already running (pid %ld)\n"), prgname, pid); exit(1); } } } void nm_main_utils_ensure_root() { if (getuid() != 0) { fprintf(stderr, _("You must be root to run %s!\n"), g_get_prgname() ?: ""); exit(1); } } gboolean nm_main_utils_early_setup(const char * progname, int * argc, char ** argv[], GOptionEntry *options, void (*option_context_hook)(gpointer user_data, GOptionContext *opt_ctx), gpointer option_context_hook_data, const char *summary) { GOptionContext *opt_ctx = NULL; GError * error = NULL; gboolean success = FALSE; int i; const char * opt_fmt_log_level = NULL, *opt_fmt_log_domains = NULL; const char ** opt_loc_log_level = NULL, **opt_loc_log_domains = NULL; /* Make GIO ignore the remote VFS service; otherwise it tries to use the * session bus to contact the remote service, and NM shouldn't ever be * talking on the session bus. See rh #588745 */ setenv("GIO_USE_VFS", "local", 1); /* * Set the umask to 0022, which results in 0666 & ~0022 = 0644. * Otherwise, if root (or an su'ing user) has a wacky umask, we could * write out an unreadable resolv.conf. */ umask(022); /* Ensure gettext() gets the right environment (bgo #666516) */ setlocale(LC_ALL, ""); textdomain(GETTEXT_PACKAGE); for (i = 0; options[i].long_name; i++) { NM_PRAGMA_WARNING_DISABLE("-Wformat-nonliteral") if (!strcmp(options[i].long_name, "log-level")) { opt_fmt_log_level = options[i].description; opt_loc_log_level = &options[i].description; options[i].description = g_strdup_printf(options[i].description, nm_logging_all_levels_to_string()); } else if (!strcmp(options[i].long_name, "log-domains")) { opt_fmt_log_domains = options[i].description; opt_loc_log_domains = &options[i].description; options[i].description = g_strdup_printf(options[i].description, nm_logging_all_domains_to_string()); } NM_PRAGMA_WARNING_REENABLE } /* Parse options */ opt_ctx = g_option_context_new(NULL); g_option_context_set_translation_domain(opt_ctx, GETTEXT_PACKAGE); g_option_context_set_ignore_unknown_options(opt_ctx, FALSE); g_option_context_set_help_enabled(opt_ctx, TRUE); g_option_context_add_main_entries(opt_ctx, options, NULL); g_option_context_set_summary(opt_ctx, summary); if (option_context_hook) option_context_hook(option_context_hook_data, opt_ctx); success = g_option_context_parse(opt_ctx, argc, argv, &error); if (!success) { fprintf(stderr, _("%s. Please use --help to see a list of valid options.\n"), error->message); g_clear_error(&error); } g_option_context_free(opt_ctx); if (opt_loc_log_level) { g_free((char *) *opt_loc_log_level); *opt_loc_log_level = opt_fmt_log_level; } if (opt_loc_log_domains) { g_free((char *) *opt_loc_log_domains); *opt_loc_log_domains = opt_fmt_log_domains; } return success; }