| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934 |
- /*************************************************************************
- *
- * Copyright (C) 2018-2023 Ruilin Peng (Nick) <[email protected]>.
- *
- * smartdns is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * smartdns is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- */
- #ifndef _GNU_SOURCE
- #define _GNU_SOURCE
- #include <stdio.h>
- #endif
- #include "dns_conf.h"
- #include "tlog.h"
- #include "util.h"
- #include <arpa/inet.h>
- #include <ctype.h>
- #include <dirent.h>
- #include <dlfcn.h>
- #include <errno.h>
- #include <fcntl.h>
- #include <inttypes.h>
- #include <libgen.h>
- #include <linux/capability.h>
- #include <linux/limits.h>
- #include <linux/netlink.h>
- #include <linux/rtnetlink.h>
- #include <netinet/tcp.h>
- #include <openssl/crypto.h>
- #include <openssl/ssl.h>
- #include <openssl/x509v3.h>
- #include <poll.h>
- #include <pthread.h>
- #include <signal.h>
- #include <stdlib.h>
- #include <string.h>
- #include <sys/prctl.h>
- #include <sys/resource.h>
- #include <sys/stat.h>
- #include <sys/statvfs.h>
- #include <sys/sysinfo.h>
- #include <sys/time.h>
- #include <sys/types.h>
- #include <time.h>
- #include <unistd.h>
- #include <unwind.h>
- #define TMP_BUFF_LEN_32 32
- #define NFNL_SUBSYS_IPSET 6
- #define IPSET_ATTR_DATA 7
- #define IPSET_ATTR_IP 1
- #define IPSET_ATTR_IPADDR_IPV4 1
- #define IPSET_ATTR_IPADDR_IPV6 2
- #define IPSET_ATTR_PROTOCOL 1
- #define IPSET_ATTR_SETNAME 2
- #define IPSET_ATTR_TIMEOUT 6
- #define IPSET_ADD 9
- #define IPSET_DEL 10
- #define IPSET_MAXNAMELEN 32
- #define IPSET_PROTOCOL 6
- #define IPV6_ADDR_LEN 16
- #define IPV4_ADDR_LEN 4
- #ifndef NFNETLINK_V0
- #define NFNETLINK_V0 0
- #endif
- #ifndef NLA_F_NESTED
- #define NLA_F_NESTED (1 << 15)
- #endif
- #ifndef NLA_F_NET_BYTEORDER
- #define NLA_F_NET_BYTEORDER (1 << 14)
- #endif
- #define NETLINK_ALIGN(len) (((len) + 3) & ~(3))
- #define BUFF_SZ 1024
- #define PACKET_BUF_SIZE 8192
- #define PACKET_MAGIC 0X11040918
- struct ipset_netlink_attr {
- unsigned short len;
- unsigned short type;
- };
- struct ipset_netlink_msg {
- unsigned char family;
- unsigned char version;
- __be16 res_id;
- };
- static int ipset_fd;
- static int pidfile_fd;
- unsigned long get_tick_count(void)
- {
- struct timespec ts;
- clock_gettime(CLOCK_MONOTONIC, &ts);
- return (ts.tv_sec * 1000 + ts.tv_nsec / 1000000);
- }
- char *dir_name(char *path)
- {
- if (strstr(path, "/") == NULL) {
- safe_strncpy(path, "./", PATH_MAX);
- return path;
- }
- return dirname(path);
- }
- char *get_host_by_addr(char *host, int maxsize, struct sockaddr *addr)
- {
- struct sockaddr_storage *addr_store = (struct sockaddr_storage *)addr;
- host[0] = 0;
- switch (addr_store->ss_family) {
- case AF_INET: {
- struct sockaddr_in *addr_in = NULL;
- addr_in = (struct sockaddr_in *)addr;
- inet_ntop(AF_INET, &addr_in->sin_addr, host, maxsize);
- } break;
- case AF_INET6: {
- struct sockaddr_in6 *addr_in6 = NULL;
- addr_in6 = (struct sockaddr_in6 *)addr;
- if (IN6_IS_ADDR_V4MAPPED(&addr_in6->sin6_addr)) {
- struct sockaddr_in addr_in4;
- memset(&addr_in4, 0, sizeof(addr_in4));
- memcpy(&addr_in4.sin_addr.s_addr, addr_in6->sin6_addr.s6_addr + 12, sizeof(addr_in4.sin_addr.s_addr));
- inet_ntop(AF_INET, &addr_in4.sin_addr, host, maxsize);
- } else {
- inet_ntop(AF_INET6, &addr_in6->sin6_addr, host, maxsize);
- }
- } break;
- default:
- goto errout;
- break;
- }
- return host;
- errout:
- return NULL;
- }
- int getaddr_by_host(const char *host, struct sockaddr *addr, socklen_t *addr_len)
- {
- struct addrinfo hints;
- struct addrinfo *result = NULL;
- int ret = 0;
- memset(&hints, 0, sizeof(hints));
- hints.ai_family = AF_UNSPEC;
- hints.ai_socktype = SOCK_STREAM;
- ret = getaddrinfo(host, "53", &hints, &result);
- if (ret != 0) {
- goto errout;
- }
- if (result->ai_addrlen > *addr_len) {
- result->ai_addrlen = *addr_len;
- }
- addr->sa_family = result->ai_family;
- memcpy(addr, result->ai_addr, result->ai_addrlen);
- *addr_len = result->ai_addrlen;
- freeaddrinfo(result);
- return 0;
- errout:
- if (result) {
- freeaddrinfo(result);
- }
- return -1;
- }
- int getsocket_inet(int fd, struct sockaddr *addr, socklen_t *addr_len)
- {
- struct sockaddr_storage addr_store;
- socklen_t addr_store_len = sizeof(addr_store);
- if (getsockname(fd, (struct sockaddr *)&addr_store, &addr_store_len) != 0) {
- goto errout;
- }
- switch (addr_store.ss_family) {
- case AF_INET: {
- struct sockaddr_in *addr_in = NULL;
- addr_in = (struct sockaddr_in *)addr;
- addr_in->sin_family = AF_INET;
- *addr_len = sizeof(struct sockaddr_in);
- memcpy(addr, addr_in, sizeof(struct sockaddr_in));
- } break;
- case AF_INET6: {
- struct sockaddr_in6 *addr_in6 = NULL;
- addr_in6 = (struct sockaddr_in6 *)addr;
- if (IN6_IS_ADDR_V4MAPPED(&addr_in6->sin6_addr)) {
- struct sockaddr_in addr_in4;
- memset(&addr_in4, 0, sizeof(addr_in4));
- memcpy(&addr_in4.sin_addr.s_addr, addr_in6->sin6_addr.s6_addr + 12, sizeof(addr_in4.sin_addr.s_addr));
- addr_in4.sin_family = AF_INET;
- addr_in4.sin_port = 0;
- *addr_len = sizeof(struct sockaddr_in);
- memcpy(addr, &addr_in4, sizeof(struct sockaddr_in));
- } else {
- addr_in6->sin6_family = AF_INET6;
- *addr_len = sizeof(struct sockaddr_in6);
- memcpy(addr, addr_in6, sizeof(struct sockaddr_in6));
- }
- } break;
- default:
- goto errout;
- break;
- }
- return 0;
- errout:
- return -1;
- }
- int fill_sockaddr_by_ip(unsigned char *ip, int ip_len, int port, struct sockaddr *addr, socklen_t *addr_len)
- {
- if (ip == NULL || addr == NULL || addr_len == NULL) {
- return -1;
- }
- if (ip_len == IPV4_ADDR_LEN) {
- struct sockaddr_in *addr_in = NULL;
- addr->sa_family = AF_INET;
- addr_in = (struct sockaddr_in *)addr;
- addr_in->sin_port = htons(port);
- addr_in->sin_family = AF_INET;
- memcpy(&addr_in->sin_addr.s_addr, ip, ip_len);
- *addr_len = 16;
- } else if (ip_len == IPV6_ADDR_LEN) {
- struct sockaddr_in6 *addr_in6 = NULL;
- addr->sa_family = AF_INET6;
- addr_in6 = (struct sockaddr_in6 *)addr;
- addr_in6->sin6_port = htons(port);
- addr_in6->sin6_family = AF_INET6;
- memcpy(addr_in6->sin6_addr.s6_addr, ip, ip_len);
- *addr_len = 28;
- }
- return -1;
- }
- int parse_ip(const char *value, char *ip, int *port)
- {
- int offset = 0;
- char *colon = NULL;
- colon = strstr(value, ":");
- if (strstr(value, "[")) {
- /* ipv6 with port */
- char *bracket_end = strstr(value, "]");
- if (bracket_end == NULL) {
- return -1;
- }
- offset = bracket_end - value - 1;
- memcpy(ip, value + 1, offset);
- ip[offset] = 0;
- colon = strstr(bracket_end, ":");
- if (colon) {
- colon++;
- }
- } else if (colon && strstr(colon + 1, ":")) {
- /* ipv6 without port */
- strncpy(ip, value, MAX_IP_LEN);
- colon = NULL;
- } else {
- /* ipv4 */
- colon = strstr(value, ":");
- if (colon == NULL) {
- /* without port */
- strncpy(ip, value, MAX_IP_LEN);
- } else {
- /* with port */
- offset = colon - value;
- colon++;
- memcpy(ip, value, offset);
- ip[offset] = 0;
- }
- }
- if (colon) {
- /* get port num */
- *port = atoi(colon);
- } else {
- *port = PORT_NOT_DEFINED;
- }
- if (ip[0] == 0) {
- return -1;
- }
- return 0;
- }
- int check_is_ipv4(const char *ip)
- {
- const char *ptr = ip;
- char c = 0;
- int dot_num = 0;
- int dig_num = 0;
- while ((c = *ptr++) != '\0') {
- if (c == '.') {
- dot_num++;
- dig_num = 0;
- continue;
- }
- /* check number count of one field */
- if (dig_num >= 4) {
- return -1;
- }
- if (c >= '0' && c <= '9') {
- dig_num++;
- continue;
- }
- return -1;
- }
- /* check field number */
- if (dot_num != 3) {
- return -1;
- }
- return 0;
- }
- int check_is_ipv6(const char *ip)
- {
- const char *ptr = ip;
- char c = 0;
- int colon_num = 0;
- int dig_num = 0;
- while ((c = *ptr++) != '\0') {
- if (c == '[' || c == ']') {
- continue;
- }
- if (c == ':') {
- colon_num++;
- dig_num = 0;
- continue;
- }
- /* check number count of one field */
- if (dig_num >= 5) {
- return -1;
- }
- dig_num++;
- if (c >= '0' && c <= '9') {
- continue;
- }
- if (c >= 'a' && c <= 'f') {
- continue;
- }
- if (c >= 'A' && c <= 'F') {
- continue;
- }
- return -1;
- }
- /* check field number */
- if (colon_num > 7) {
- return -1;
- }
- return 0;
- }
- int check_is_ipaddr(const char *ip)
- {
- if (strstr(ip, ".")) {
- /* IPV4 */
- return check_is_ipv4(ip);
- } else if (strstr(ip, ":")) {
- /* IPV6 */
- return check_is_ipv6(ip);
- }
- return -1;
- }
- int parse_uri(const char *value, char *scheme, char *host, int *port, char *path)
- {
- return parse_uri_ext(value, scheme, NULL, NULL, host, port, path);
- }
- void urldecode(char *dst, const char *src)
- {
- char a, b;
- while (*src) {
- if ((*src == '%') && ((a = src[1]) && (b = src[2])) && (isxdigit(a) && isxdigit(b))) {
- if (a >= 'a') {
- a -= 'a' - 'A';
- }
- if (a >= 'A') {
- a -= ('A' - 10);
- } else {
- a -= '0';
- }
- if (b >= 'a') {
- b -= 'a' - 'A';
- }
- if (b >= 'A') {
- b -= ('A' - 10);
- } else {
- b -= '0';
- }
- *dst++ = 16 * a + b;
- src += 3;
- } else if (*src == '+') {
- *dst++ = ' ';
- src++;
- } else {
- *dst++ = *src++;
- }
- }
- *dst++ = '\0';
- }
- int parse_uri_ext(const char *value, char *scheme, char *user, char *password, char *host, int *port, char *path)
- {
- char *scheme_end = NULL;
- int field_len = 0;
- const char *process_ptr = value;
- char user_pass_host_part[PATH_MAX];
- char *user_password = NULL;
- char *host_part = NULL;
- const char *host_end = NULL;
- scheme_end = strstr(value, "://");
- if (scheme_end) {
- field_len = scheme_end - value;
- if (scheme) {
- memcpy(scheme, value, field_len);
- scheme[field_len] = 0;
- }
- process_ptr += field_len + 3;
- } else {
- if (scheme) {
- scheme[0] = '\0';
- }
- }
- host_end = strstr(process_ptr, "/");
- if (host_end == NULL) {
- host_end = process_ptr + strlen(process_ptr);
- };
- field_len = host_end - process_ptr;
- if (field_len >= (int)sizeof(user_pass_host_part)) {
- return -1;
- }
- memcpy(user_pass_host_part, process_ptr, field_len);
- user_pass_host_part[field_len] = 0;
- host_part = strstr(user_pass_host_part, "@");
- if (host_part != NULL) {
- *host_part = '\0';
- host_part = host_part + 1;
- user_password = user_pass_host_part;
- char *sep = strstr(user_password, ":");
- if (sep != NULL) {
- *sep = '\0';
- sep = sep + 1;
- if (password) {
- urldecode(password, sep);
- }
- }
- if (user) {
- urldecode(user, user_password);
- }
- } else {
- host_part = user_pass_host_part;
- }
- if (host != NULL && parse_ip(host_part, host, port) != 0) {
- return -1;
- }
- process_ptr += field_len;
- if (path) {
- strcpy(path, process_ptr);
- }
- return 0;
- }
- int set_fd_nonblock(int fd, int nonblock)
- {
- int ret = 0;
- int flags = fcntl(fd, F_GETFL);
- if (flags == -1) {
- return -1;
- }
- flags = (nonblock) ? (flags | O_NONBLOCK) : (flags & ~O_NONBLOCK);
- ret = fcntl(fd, F_SETFL, flags);
- if (ret == -1) {
- return -1;
- }
- return 0;
- }
- char *reverse_string(char *output, const char *input, int len, int to_lower_case)
- {
- char *begin = output;
- if (len <= 0) {
- *output = 0;
- return output;
- }
- len--;
- while (len >= 0) {
- *output = *(input + len);
- if (to_lower_case) {
- if (*output >= 'A' && *output <= 'Z') {
- /* To lower case */
- *output = *output + 32;
- }
- }
- output++;
- len--;
- }
- *output = 0;
- return begin;
- }
- char *to_lower_case(char *output, const char *input, int len)
- {
- char *begin = output;
- int i = 0;
- if (len <= 0) {
- *output = 0;
- return output;
- }
- len--;
- while (i < len && *(input + i) != '\0') {
- *output = *(input + i);
- if (*output >= 'A' && *output <= 'Z') {
- /* To lower case */
- *output = *output + 32;
- }
- output++;
- i++;
- }
- *output = 0;
- return begin;
- }
- static inline void _ipset_add_attr(struct nlmsghdr *netlink_head, uint16_t type, size_t len, const void *data)
- {
- struct ipset_netlink_attr *attr = (void *)netlink_head + NETLINK_ALIGN(netlink_head->nlmsg_len);
- uint16_t payload_len = NETLINK_ALIGN(sizeof(struct ipset_netlink_attr)) + len;
- attr->type = type;
- attr->len = payload_len;
- memcpy((void *)attr + NETLINK_ALIGN(sizeof(struct ipset_netlink_attr)), data, len);
- netlink_head->nlmsg_len += NETLINK_ALIGN(payload_len);
- }
- static int _ipset_socket_init(void)
- {
- if (ipset_fd > 0) {
- return 0;
- }
- ipset_fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_NETFILTER);
- if (ipset_fd < 0) {
- return -1;
- }
- return 0;
- }
- static int _ipset_support_timeout(void)
- {
- if (dns_conf_ipset_timeout_enable) {
- return 0;
- }
- return -1;
- }
- static int _ipset_operate(const char *ipset_name, const unsigned char addr[], int addr_len, unsigned long timeout,
- int operate)
- {
- struct nlmsghdr *netlink_head = NULL;
- struct ipset_netlink_msg *netlink_msg = NULL;
- struct ipset_netlink_attr *nested[3];
- char buffer[BUFF_SZ];
- uint8_t proto = 0;
- ssize_t rc = 0;
- int af = 0;
- static const struct sockaddr_nl snl = {.nl_family = AF_NETLINK};
- uint32_t expire = 0;
- if (addr_len != IPV4_ADDR_LEN && addr_len != IPV6_ADDR_LEN) {
- errno = EINVAL;
- return -1;
- }
- if (addr_len == IPV4_ADDR_LEN) {
- af = AF_INET;
- } else if (addr_len == IPV6_ADDR_LEN) {
- af = AF_INET6;
- } else {
- errno = EINVAL;
- return -1;
- }
- if (_ipset_socket_init() != 0) {
- return -1;
- }
- if (strlen(ipset_name) >= IPSET_MAXNAMELEN) {
- errno = ENAMETOOLONG;
- return -1;
- }
- memset(buffer, 0, BUFF_SZ);
- netlink_head = (struct nlmsghdr *)buffer;
- netlink_head->nlmsg_len = NETLINK_ALIGN(sizeof(struct nlmsghdr));
- netlink_head->nlmsg_type = operate | (NFNL_SUBSYS_IPSET << 8);
- netlink_head->nlmsg_flags = NLM_F_REQUEST | NLM_F_REPLACE;
- netlink_msg = (struct ipset_netlink_msg *)(buffer + netlink_head->nlmsg_len);
- netlink_head->nlmsg_len += NETLINK_ALIGN(sizeof(struct ipset_netlink_msg));
- netlink_msg->family = af;
- netlink_msg->version = NFNETLINK_V0;
- netlink_msg->res_id = htons(0);
- proto = IPSET_PROTOCOL;
- _ipset_add_attr(netlink_head, IPSET_ATTR_PROTOCOL, sizeof(proto), &proto);
- _ipset_add_attr(netlink_head, IPSET_ATTR_SETNAME, strlen(ipset_name) + 1, ipset_name);
- nested[0] = (struct ipset_netlink_attr *)(buffer + NETLINK_ALIGN(netlink_head->nlmsg_len));
- netlink_head->nlmsg_len += NETLINK_ALIGN(sizeof(struct ipset_netlink_attr));
- nested[0]->type = NLA_F_NESTED | IPSET_ATTR_DATA;
- nested[1] = (struct ipset_netlink_attr *)(buffer + NETLINK_ALIGN(netlink_head->nlmsg_len));
- netlink_head->nlmsg_len += NETLINK_ALIGN(sizeof(struct ipset_netlink_attr));
- nested[1]->type = NLA_F_NESTED | IPSET_ATTR_IP;
- _ipset_add_attr(netlink_head,
- (af == AF_INET ? IPSET_ATTR_IPADDR_IPV4 : IPSET_ATTR_IPADDR_IPV6) | NLA_F_NET_BYTEORDER, addr_len,
- addr);
- nested[1]->len = (void *)buffer + NETLINK_ALIGN(netlink_head->nlmsg_len) - (void *)nested[1];
- if (timeout > 0 && _ipset_support_timeout() == 0) {
- expire = htonl(timeout);
- _ipset_add_attr(netlink_head, IPSET_ATTR_TIMEOUT | NLA_F_NET_BYTEORDER, sizeof(expire), &expire);
- }
- nested[0]->len = (void *)buffer + NETLINK_ALIGN(netlink_head->nlmsg_len) - (void *)nested[0];
- for (;;) {
- rc = sendto(ipset_fd, buffer, netlink_head->nlmsg_len, 0, (const struct sockaddr *)&snl, sizeof(snl));
- if (rc >= 0) {
- break;
- }
- if (errno == EAGAIN || errno == EWOULDBLOCK || errno == EINTR) {
- struct timespec waiter;
- waiter.tv_sec = 0;
- waiter.tv_nsec = 10000;
- nanosleep(&waiter, NULL);
- continue;
- }
- }
- return rc;
- }
- int ipset_add(const char *ipset_name, const unsigned char addr[], int addr_len, unsigned long timeout)
- {
- return _ipset_operate(ipset_name, addr, addr_len, timeout, IPSET_ADD);
- }
- int ipset_del(const char *ipset_name, const unsigned char addr[], int addr_len)
- {
- return _ipset_operate(ipset_name, addr, addr_len, 0, IPSET_DEL);
- }
- unsigned char *SSL_SHA256(const unsigned char *d, size_t n, unsigned char *md)
- {
- static unsigned char m[SHA256_DIGEST_LENGTH];
- if (md == NULL) {
- md = m;
- }
- EVP_MD_CTX *ctx = EVP_MD_CTX_create();
- if (ctx == NULL) {
- return NULL;
- }
- EVP_MD_CTX_init(ctx);
- EVP_DigestInit_ex(ctx, EVP_sha256(), NULL);
- EVP_DigestUpdate(ctx, d, n);
- EVP_DigestFinal_ex(ctx, m, NULL);
- EVP_MD_CTX_destroy(ctx);
- return (md);
- }
- int SSL_base64_decode(const char *in, unsigned char *out)
- {
- size_t inlen = strlen(in);
- int outlen = 0;
- if (inlen == 0) {
- return 0;
- }
- outlen = EVP_DecodeBlock(out, (unsigned char *)in, inlen);
- if (outlen < 0) {
- goto errout;
- }
- /* Subtract padding bytes from |outlen| */
- while (in[--inlen] == '=') {
- --outlen;
- }
- return outlen;
- errout:
- return -1;
- }
- int SSL_base64_encode(const void *in, int in_len, char *out)
- {
- int outlen = 0;
- if (in_len == 0) {
- return 0;
- }
- outlen = EVP_EncodeBlock((unsigned char *)out, in, in_len);
- if (outlen < 0) {
- goto errout;
- }
- return outlen;
- errout:
- return -1;
- }
- int create_pid_file(const char *pid_file)
- {
- int fd = 0;
- int flags = 0;
- char buff[TMP_BUFF_LEN_32];
- /* create pid file, and lock this file */
- fd = open(pid_file, O_RDWR | O_CREAT, S_IRUSR | S_IWUSR);
- if (fd == -1) {
- fprintf(stderr, "create pid file %s failed, %s\n", pid_file, strerror(errno));
- return -1;
- }
- flags = fcntl(fd, F_GETFD);
- if (flags < 0) {
- fprintf(stderr, "Could not get flags for PID file %s\n", pid_file);
- goto errout;
- }
- flags |= FD_CLOEXEC;
- if (fcntl(fd, F_SETFD, flags) == -1) {
- fprintf(stderr, "Could not set flags for PID file %s\n", pid_file);
- goto errout;
- }
- if (lockf(fd, F_TLOCK, 0) < 0) {
- memset(buff, 0, TMP_BUFF_LEN_32);
- if (read(fd, buff, TMP_BUFF_LEN_32) <= 0) {
- buff[0] = '\0';
- }
- fprintf(stderr, "Server is already running, pid is %s", buff);
- goto errout;
- }
- snprintf(buff, TMP_BUFF_LEN_32, "%d\n", getpid());
- if (write(fd, buff, strnlen(buff, TMP_BUFF_LEN_32)) < 0) {
- fprintf(stderr, "write pid to file failed, %s.\n", strerror(errno));
- goto errout;
- }
- if (pidfile_fd > 0) {
- close(pidfile_fd);
- }
- pidfile_fd = fd;
- return 0;
- errout:
- if (fd > 0) {
- close(fd);
- }
- return -1;
- }
- int full_path(char *normalized_path, int normalized_path_len, const char *path)
- {
- const char *p = path;
- if (path == NULL || normalized_path == NULL) {
- return -1;
- }
- while (*p == ' ') {
- p++;
- }
- if (*p == '\0' || *p == '/') {
- return -1;
- }
- char buf[PATH_MAX];
- snprintf(normalized_path, normalized_path_len, "%s/%s", getcwd(buf, sizeof(buf)), path);
- return 0;
- }
- int generate_cert_key(const char *key_path, const char *cert_path, const char *san, int days)
- {
- int ret = -1;
- #if (OPENSSL_VERSION_NUMBER <= 0x30000000L)
- RSA *rsa = NULL;
- BIGNUM *bn = NULL;
- #endif
- X509_EXTENSION *cert_ext = NULL;
- BIO *cert_file = NULL;
- BIO *key_file = NULL;
- X509 *cert = NULL;
- EVP_PKEY *pkey = NULL;
- const int RSA_KEY_LENGTH = 2048;
- if (key_path == NULL || cert_path == NULL) {
- return ret;
- }
- key_file = BIO_new_file(key_path, "wb");
- cert_file = BIO_new_file(cert_path, "wb");
- cert = X509_new();
- #if (OPENSSL_VERSION_NUMBER >= 0x30000000L)
- pkey = EVP_RSA_gen(RSA_KEY_LENGTH);
- #else
- bn = BN_new();
- rsa = RSA_new();
- pkey = EVP_PKEY_new();
- if (rsa == NULL || pkey == NULL || bn == NULL) {
- goto out;
- }
- EVP_PKEY_assign(pkey, EVP_PKEY_RSA, rsa);
- BN_set_word(bn, RSA_F4);
- if (RSA_generate_key_ex(rsa, RSA_KEY_LENGTH, bn, NULL) != 1) {
- goto out;
- }
- #endif
- if (key_file == NULL || cert_file == NULL || cert == NULL || pkey == NULL) {
- goto out;
- }
- ASN1_INTEGER_set(X509_get_serialNumber(cert), 1); // serial number
- X509_gmtime_adj(X509_get_notBefore(cert), 0); // now
- X509_gmtime_adj(X509_get_notAfter(cert), days * 24 * 3600); // accepts secs
- X509_set_pubkey(cert, pkey);
- X509_NAME *name = X509_get_subject_name(cert);
- const unsigned char *country = (unsigned char *)"smartdns";
- const unsigned char *company = (unsigned char *)"smartdns";
- const unsigned char *common_name = (unsigned char *)"smartdns";
- X509_NAME_add_entry_by_txt(name, "C", MBSTRING_ASC, country, -1, -1, 0);
- X509_NAME_add_entry_by_txt(name, "O", MBSTRING_ASC, company, -1, -1, 0);
- X509_NAME_add_entry_by_txt(name, "CN", MBSTRING_ASC, common_name, -1, -1, 0);
- if (san != NULL) {
- cert_ext = X509V3_EXT_conf_nid(NULL, NULL, NID_subject_alt_name, san);
- if (cert_ext == NULL) {
- goto out;
- }
- X509_add_ext(cert, cert_ext, -1);
- }
- X509_set_issuer_name(cert, name);
- X509_sign(cert, pkey, EVP_sha256());
- ret = PEM_write_bio_PrivateKey(key_file, pkey, NULL, NULL, 0, NULL, NULL);
- if (ret != 1) {
- goto out;
- }
- ret = PEM_write_bio_X509(cert_file, cert);
- if (ret != 1) {
- goto out;
- }
- chmod(key_path, S_IRUSR);
- chmod(cert_path, S_IRUSR);
- ret = 0;
- out:
- if (cert_ext) {
- X509_EXTENSION_free(cert_ext);
- }
- if (pkey) {
- EVP_PKEY_free(pkey);
- }
- #if (OPENSSL_VERSION_NUMBER <= 0x30000000L)
- if (rsa && pkey == NULL) {
- RSA_free(rsa);
- }
- if (bn) {
- BN_free(bn);
- }
- #endif
- if (cert_file) {
- BIO_free_all(cert_file);
- }
- if (key_file) {
- BIO_free_all(key_file);
- }
- if (cert) {
- X509_free(cert);
- }
- return ret;
- }
- #if OPENSSL_API_COMPAT < 0x10100000
- #define THREAD_STACK_SIZE (16 * 1024)
- static pthread_mutex_t *lock_cs;
- static long *lock_count;
- static __attribute__((unused)) void _pthreads_locking_callback(int mode, int type, const char *file, int line)
- {
- if (mode & CRYPTO_LOCK) {
- pthread_mutex_lock(&(lock_cs[type]));
- lock_count[type]++;
- } else {
- pthread_mutex_unlock(&(lock_cs[type]));
- }
- }
- static __attribute__((unused)) unsigned long _pthreads_thread_id(void)
- {
- unsigned long ret = 0;
- ret = (unsigned long)pthread_self();
- return (ret);
- }
- void SSL_CRYPTO_thread_setup(void)
- {
- int i = 0;
- lock_cs = OPENSSL_malloc(CRYPTO_num_locks() * sizeof(pthread_mutex_t));
- lock_count = OPENSSL_malloc(CRYPTO_num_locks() * sizeof(long));
- if (!lock_cs || !lock_count) {
- /* Nothing we can do about this...void function! */
- if (lock_cs) {
- OPENSSL_free(lock_cs);
- }
- if (lock_count) {
- OPENSSL_free(lock_count);
- }
- return;
- }
- for (i = 0; i < CRYPTO_num_locks(); i++) {
- lock_count[i] = 0;
- pthread_mutex_init(&(lock_cs[i]), NULL);
- }
- #if OPENSSL_API_COMPAT < 0x10000000
- CRYPTO_set_id_callback(_pthreads_thread_id);
- #else
- CRYPTO_THREADID_set_callback(_pthreads_thread_id);
- #endif
- CRYPTO_set_locking_callback(_pthreads_locking_callback);
- }
- void SSL_CRYPTO_thread_cleanup(void)
- {
- int i = 0;
- CRYPTO_set_locking_callback(NULL);
- for (i = 0; i < CRYPTO_num_locks(); i++) {
- pthread_mutex_destroy(&(lock_cs[i]));
- }
- OPENSSL_free(lock_cs);
- OPENSSL_free(lock_count);
- }
- #endif
- #define SERVER_NAME_LEN 256
- #define TLS_HEADER_LEN 5
- #define TLS_HANDSHAKE_CONTENT_TYPE 0x16
- #define TLS_HANDSHAKE_TYPE_CLIENT_HELLO 0x01
- #ifndef MIN
- #define MIN(X, Y) ((X) < (Y) ? (X) : (Y))
- #endif
- static int parse_extensions(const char *, size_t, char *, const char **);
- static int parse_server_name_extension(const char *, size_t, char *, const char **);
- /* Parse a TLS packet for the Server Name Indication extension in the client
- * hello handshake, returning the first server name found (pointer to static
- * array)
- *
- * Returns:
- * >=0 - length of the hostname and updates *hostname
- * caller is responsible for freeing *hostname
- * -1 - Incomplete request
- * -2 - No Host header included in this request
- * -3 - Invalid hostname pointer
- * -4 - malloc failure
- * < -4 - Invalid TLS client hello
- */
- int parse_tls_header(const char *data, size_t data_len, char *hostname, const char **hostname_ptr)
- {
- char tls_content_type = 0;
- char tls_version_major = 0;
- char tls_version_minor = 0;
- size_t pos = TLS_HEADER_LEN;
- size_t len = 0;
- if (hostname == NULL) {
- return -3;
- }
- /* Check that our TCP payload is at least large enough for a TLS header */
- if (data_len < TLS_HEADER_LEN) {
- return -1;
- }
- /* SSL 2.0 compatible Client Hello
- *
- * High bit of first byte (length) and content type is Client Hello
- *
- * See RFC5246 Appendix E.2
- */
- if (data[0] & 0x80 && data[2] == 1) {
- return -2;
- }
- tls_content_type = data[0];
- if (tls_content_type != TLS_HANDSHAKE_CONTENT_TYPE) {
- return -5;
- }
- tls_version_major = data[1];
- tls_version_minor = data[2];
- if (tls_version_major < 3) {
- return -2;
- }
- /* TLS record length */
- len = ((unsigned char)data[3] << 8) + (unsigned char)data[4] + TLS_HEADER_LEN;
- data_len = MIN(data_len, len);
- /* Check we received entire TLS record length */
- if (data_len < len) {
- return -1;
- }
- /*
- * Handshake
- */
- if (pos + 1 > data_len) {
- return -5;
- }
- if (data[pos] != TLS_HANDSHAKE_TYPE_CLIENT_HELLO) {
- return -5;
- }
- /* Skip past fixed length records:
- * 1 Handshake Type
- * 3 Length
- * 2 Version (again)
- * 32 Random
- * to Session ID Length
- */
- pos += 38;
- /* Session ID */
- if (pos + 1 > data_len) {
- return -5;
- }
- len = (unsigned char)data[pos];
- pos += 1 + len;
- /* Cipher Suites */
- if (pos + 2 > data_len) {
- return -5;
- }
- len = ((unsigned char)data[pos] << 8) + (unsigned char)data[pos + 1];
- pos += 2 + len;
- /* Compression Methods */
- if (pos + 1 > data_len) {
- return -5;
- }
- len = (unsigned char)data[pos];
- pos += 1 + len;
- if (pos == data_len && tls_version_major == 3 && tls_version_minor == 0) {
- return -2;
- }
- /* Extensions */
- if (pos + 2 > data_len) {
- return -5;
- }
- len = ((unsigned char)data[pos] << 8) + (unsigned char)data[pos + 1];
- pos += 2;
- if (pos + len > data_len) {
- return -5;
- }
- return parse_extensions(data + pos, len, hostname, hostname_ptr);
- }
- static int parse_extensions(const char *data, size_t data_len, char *hostname, const char **hostname_ptr)
- {
- size_t pos = 0;
- size_t len = 0;
- /* Parse each 4 bytes for the extension header */
- while (pos + 4 <= data_len) {
- /* Extension Length */
- len = ((unsigned char)data[pos + 2] << 8) + (unsigned char)data[pos + 3];
- /* Check if it's a server name extension */
- if (data[pos] == 0x00 && data[pos + 1] == 0x00) {
- /* There can be only one extension of each type, so we break
- * our state and move p to beginning of the extension here */
- if (pos + 4 + len > data_len) {
- return -5;
- }
- return parse_server_name_extension(data + pos + 4, len, hostname, hostname_ptr);
- }
- pos += 4 + len; /* Advance to the next extension header */
- }
- /* Check we ended where we expected to */
- if (pos != data_len) {
- return -5;
- }
- return -2;
- }
- static int parse_server_name_extension(const char *data, size_t data_len, char *hostname, const char **hostname_ptr)
- {
- size_t pos = 2; /* skip server name list length */
- size_t len = 0;
- while (pos + 3 < data_len) {
- len = ((unsigned char)data[pos + 1] << 8) + (unsigned char)data[pos + 2];
- if (pos + 3 + len > data_len) {
- return -5;
- }
- switch (data[pos]) { /* name type */
- case 0x00: /* host_name */
- strncpy(hostname, data + pos + 3, len);
- if (hostname_ptr) {
- *hostname_ptr = data + pos + 3;
- }
- hostname[len] = '\0';
- return len;
- default:
- break;
- }
- pos += 3 + len;
- }
- /* Check we ended where we expected to */
- if (pos != data_len) {
- return -5;
- }
- return -2;
- }
- void get_compiled_time(struct tm *tm)
- {
- char s_month[5];
- int month = 0;
- int day = 0;
- int year = 0;
- int hour = 0;
- int min = 0;
- int sec = 0;
- static const char *month_names = "JanFebMarAprMayJunJulAugSepOctNovDec";
- sscanf(__DATE__, "%4s %d %d", s_month, &day, &year);
- month = (strstr(month_names, s_month) - month_names) / 3;
- sscanf(__TIME__, "%d:%d:%d", &hour, &min, &sec);
- tm->tm_year = year - 1900;
- tm->tm_mon = month;
- tm->tm_mday = day;
- tm->tm_isdst = -1;
- tm->tm_hour = hour;
- tm->tm_min = min;
- tm->tm_sec = sec;
- }
- unsigned long get_system_mem_size(void)
- {
- struct sysinfo memInfo;
- sysinfo(&memInfo);
- long long totalMem = memInfo.totalram;
- totalMem *= memInfo.mem_unit;
- return totalMem;
- }
- int is_numeric(const char *str)
- {
- while (*str != '\0') {
- if (*str < '0' || *str > '9') {
- return -1;
- }
- str++;
- }
- return 0;
- }
- int has_network_raw_cap(void)
- {
- int fd = socket(AF_INET, SOCK_RAW, IPPROTO_ICMP);
- if (fd < 0) {
- return 0;
- }
- close(fd);
- return 1;
- }
- int has_unprivileged_ping(void)
- {
- int fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_ICMP);
- if (fd < 0) {
- return 0;
- }
- close(fd);
- fd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_ICMPV6);
- if (fd < 0) {
- return 0;
- }
- close(fd);
- return 1;
- }
- int set_sock_keepalive(int fd, int keepidle, int keepinterval, int keepcnt)
- {
- const int yes = 1;
- if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &yes, sizeof(yes)) != 0) {
- return -1;
- }
- setsockopt(fd, IPPROTO_TCP, TCP_KEEPIDLE, &keepidle, sizeof(keepidle));
- setsockopt(fd, IPPROTO_TCP, TCP_KEEPIDLE, &keepinterval, sizeof(keepinterval));
- setsockopt(fd, IPPROTO_TCP, TCP_KEEPIDLE, &keepcnt, sizeof(keepcnt));
- return 0;
- }
- int set_sock_lingertime(int fd, int time)
- {
- struct linger l;
- l.l_onoff = 1;
- l.l_linger = 0;
- if (setsockopt(fd, SOL_SOCKET, SO_LINGER, (const char *)&l, sizeof(l)) != 0) {
- return -1;
- }
- return 0;
- }
- uint64_t get_free_space(const char *path)
- {
- uint64_t size = 0;
- struct statvfs buf;
- if (statvfs(path, &buf) != 0) {
- return 0;
- }
- size = (uint64_t)buf.f_frsize * buf.f_bavail;
- return size;
- }
- struct backtrace_state {
- void **current;
- void **end;
- };
- static _Unwind_Reason_Code unwind_callback(struct _Unwind_Context *context, void *arg)
- {
- struct backtrace_state *state = (struct backtrace_state *)(arg);
- uintptr_t pc = _Unwind_GetIP(context);
- if (pc) {
- if (state->current == state->end) {
- return _URC_END_OF_STACK;
- }
- *state->current++ = (void *)(pc);
- }
- return _URC_NO_REASON;
- }
- void print_stack(void)
- {
- const size_t max_buffer = 30;
- void *buffer[max_buffer];
- int idx = 0;
- struct backtrace_state state = {buffer, buffer + max_buffer};
- _Unwind_Backtrace(unwind_callback, &state);
- int frame_num = state.current - buffer;
- if (frame_num == 0) {
- return;
- }
- tlog(TLOG_FATAL, "Stack:");
- for (idx = 0; idx < frame_num; ++idx) {
- const void *addr = buffer[idx];
- const char *symbol = "";
- Dl_info info;
- memset(&info, 0, sizeof(info));
- if (dladdr(addr, &info) && info.dli_sname) {
- symbol = info.dli_sname;
- }
- void *offset = (void *)((char *)(addr) - (char *)(info.dli_fbase));
- tlog(TLOG_FATAL, "#%.2d: %p %s() from %s+%p", idx + 1, addr, symbol, info.dli_fname, offset);
- }
- }
- void bug_ext(const char *file, int line, const char *func, const char *errfmt, ...)
- {
- va_list ap;
- va_start(ap, errfmt);
- tlog_vext(TLOG_FATAL, file, line, func, NULL, errfmt, ap);
- va_end(ap);
- print_stack();
- /* trigger BUG */
- sleep(1);
- raise(SIGSEGV);
- while (true) {
- sleep(1);
- };
- }
- int write_file(const char *filename, void *data, int data_len)
- {
- int fd = open(filename, O_WRONLY | O_CREAT, 0644);
- if (fd < 0) {
- return -1;
- }
- int len = write(fd, data, data_len);
- if (len < 0) {
- goto errout;
- }
- close(fd);
- return 0;
- errout:
- if (fd > 0) {
- close(fd);
- }
- return -1;
- }
- int dns_packet_save(const char *dir, const char *type, const char *from, const void *packet, int packet_len)
- {
- char *data = NULL;
- int data_len = 0;
- char filename[BUFF_SZ];
- char time_s[BUFF_SZ];
- int ret = -1;
- struct tm *ptm;
- struct tm tm;
- struct timeval tm_val;
- struct stat sb;
- if (stat(dir, &sb) != 0) {
- mkdir(dir, 0750);
- }
- if (gettimeofday(&tm_val, NULL) != 0) {
- return -1;
- }
- ptm = localtime_r(&tm_val.tv_sec, &tm);
- if (ptm == NULL) {
- return -1;
- }
- snprintf(time_s, sizeof(time_s) - 1, "%.4d-%.2d-%.2d %.2d:%.2d:%.2d.%.3d", ptm->tm_year + 1900, ptm->tm_mon + 1,
- ptm->tm_mday, ptm->tm_hour, ptm->tm_min, ptm->tm_sec, (int)(tm_val.tv_usec / 1000));
- snprintf(filename, sizeof(filename) - 1, "%s/%s-%.4d%.2d%.2d-%.2d%.2d%.2d%.1d.packet", dir, type,
- ptm->tm_year + 1900, ptm->tm_mon + 1, ptm->tm_mday, ptm->tm_hour, ptm->tm_min, ptm->tm_sec,
- (int)(tm_val.tv_usec / 100000));
- data = malloc(PACKET_BUF_SIZE);
- if (data == NULL) {
- return -1;
- }
- data_len = snprintf(data, PACKET_BUF_SIZE,
- "type: %s\n"
- "from: %s\n"
- "time: %s\n"
- "packet-len: %d\n",
- type, from, time_s, packet_len);
- if (data_len <= 0 || data_len >= PACKET_BUF_SIZE) {
- goto out;
- }
- data[data_len] = 0;
- data_len++;
- uint32_t magic = htonl(PACKET_MAGIC);
- memcpy(data + data_len, &magic, sizeof(magic));
- data_len += sizeof(magic);
- int len_in_h = htonl(packet_len);
- memcpy(data + data_len, &len_in_h, sizeof(len_in_h));
- data_len += 4;
- memcpy(data + data_len, packet, packet_len);
- data_len += packet_len;
- ret = write_file(filename, data, data_len);
- if (ret != 0) {
- goto out;
- }
- ret = 0;
- out:
- if (data) {
- free(data);
- }
- return ret;
- }
- static void _close_all_fd_by_res(void)
- {
- struct rlimit lim;
- int maxfd = 0;
- int i = 0;
- getrlimit(RLIMIT_NOFILE, &lim);
- maxfd = lim.rlim_cur;
- if (maxfd > 4096) {
- maxfd = 4096;
- }
- for (i = 3; i < maxfd; i++) {
- close(i);
- }
- }
- void close_all_fd(int keepfd)
- {
- DIR *dirp;
- int dir_fd = -1;
- struct dirent *dentp;
- dirp = opendir("/proc/self/fd");
- if (dirp == NULL) {
- goto errout;
- }
- dir_fd = dirfd(dirp);
- while ((dentp = readdir(dirp)) != NULL) {
- int fd = atol(dentp->d_name);
- if (fd < 0) {
- continue;
- }
- if (fd == dir_fd || fd == STDIN_FILENO || fd == STDOUT_FILENO || fd == STDERR_FILENO || fd == keepfd) {
- continue;
- }
- close(fd);
- }
- closedir(dirp);
- return;
- errout:
- if (dirp) {
- closedir(dirp);
- }
- _close_all_fd_by_res();
- return;
- }
- int daemon_kickoff(int fd, int status)
- {
- if (fd <= 0) {
- return -1;
- }
- int ret = write(fd, &status, sizeof(status));
- if (ret != sizeof(status)) {
- return -1;
- }
- int fd_null = open("/dev/null", O_RDWR);
- if (fd_null < 0) {
- fprintf(stderr, "open /dev/null failed, %s\n", strerror(errno));
- return -1;
- }
- dup2(fd_null, STDIN_FILENO);
- dup2(fd_null, STDOUT_FILENO);
- dup2(fd_null, STDERR_FILENO);
- if (fd_null > 2) {
- close(fd_null);
- }
- close(fd);
- return 0;
- }
- int run_daemon()
- {
- pid_t pid = 0;
- int fds[2] = {0};
- if (pipe(fds) != 0) {
- fprintf(stderr, "run daemon process failed, pipe failed, %s\n", strerror(errno));
- return -1;
- }
- pid = fork();
- if (pid < 0) {
- fprintf(stderr, "run daemon process failed, fork failed, %s\n", strerror(errno));
- close(fds[0]);
- close(fds[1]);
- return -1;
- } else if (pid > 0) {
- struct pollfd pfd;
- int ret = 0;
- int status = 0;
- close(fds[1]);
- pfd.fd = fds[0];
- pfd.events = POLLIN;
- pfd.revents = 0;
- ret = poll(&pfd, 1, 1000);
- if (ret <= 0) {
- fprintf(stderr, "run daemon process failed, wait child timeout\n");
- goto errout;
- }
- if (!(pfd.revents & POLLIN)) {
- goto errout;
- }
- ret = read(fds[0], &status, sizeof(status));
- if (ret != sizeof(status)) {
- goto errout;
- }
- return status;
- }
- setsid();
- pid = fork();
- if (pid < 0) {
- fprintf(stderr, "double fork failed, %s\n", strerror(errno));
- _exit(1);
- } else if (pid > 0) {
- _exit(0);
- }
- umask(0);
- if (chdir("/") != 0) {
- goto errout;
- }
- close(fds[0]);
- return fds[1];
- errout:
- kill(pid, SIGKILL);
- return -1;
- }
- #ifdef DEBUG
- struct _dns_read_packet_info {
- int data_len;
- int message_len;
- char *message;
- int packet_len;
- uint8_t *packet;
- uint8_t data[0];
- };
- static struct _dns_read_packet_info *_dns_read_packet_file(const char *packet_file)
- {
- struct _dns_read_packet_info *info = NULL;
- int fd = 0;
- int len = 0;
- int message_len = 0;
- uint8_t *ptr = NULL;
- info = malloc(sizeof(struct _dns_read_packet_info) + PACKET_BUF_SIZE);
- fd = open(packet_file, O_RDONLY);
- if (fd < 0) {
- printf("open file %s failed, %s\n", packet_file, strerror(errno));
- goto errout;
- }
- len = read(fd, info->data, PACKET_BUF_SIZE);
- if (len < 0) {
- printf("read file %s failed, %s\n", packet_file, strerror(errno));
- goto errout;
- }
- message_len = strnlen((char *)info->data, PACKET_BUF_SIZE);
- if (message_len >= 512 || message_len >= len) {
- printf("invalid packet file, bad message len\n");
- goto errout;
- }
- info->message_len = message_len;
- info->message = (char *)info->data;
- ptr = info->data + message_len + 1;
- uint32_t magic = 0;
- if (ptr - (uint8_t *)info + sizeof(magic) >= (size_t)len) {
- printf("invalid packet file, magic length is invalid.\n");
- goto errout;
- }
- memcpy(&magic, ptr, sizeof(magic));
- if (magic != htonl(PACKET_MAGIC)) {
- printf("invalid packet file, bad magic\n");
- goto errout;
- }
- ptr += sizeof(magic);
- uint32_t packet_len = 0;
- if (ptr - info->data + sizeof(packet_len) >= (size_t)len) {
- printf("invalid packet file, packet length is invalid.\n");
- goto errout;
- }
- memcpy(&packet_len, ptr, sizeof(packet_len));
- packet_len = ntohl(packet_len);
- ptr += sizeof(packet_len);
- if (packet_len != (size_t)len - (ptr - info->data)) {
- printf("invalid packet file, packet length is invalid\n");
- goto errout;
- }
- info->packet_len = packet_len;
- info->packet = ptr;
- close(fd);
- return info;
- errout:
- if (fd > 0) {
- close(fd);
- }
- if (info) {
- free(info);
- }
- return NULL;
- }
- static int _dns_debug_display(struct dns_packet *packet)
- {
- int i = 0;
- int j = 0;
- int ttl = 0;
- struct dns_rrs *rrs = NULL;
- int rr_count = 0;
- char req_host[MAX_IP_LEN];
- for (j = 1; j < DNS_RRS_END; j++) {
- rrs = dns_get_rrs_start(packet, j, &rr_count);
- printf("section: %d\n", j);
- for (i = 0; i < rr_count && rrs; i++, rrs = dns_get_rrs_next(packet, rrs)) {
- switch (rrs->type) {
- case DNS_T_A: {
- unsigned char addr[4];
- char name[DNS_MAX_CNAME_LEN] = {0};
- /* get A result */
- dns_get_A(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
- req_host[0] = '\0';
- inet_ntop(AF_INET, addr, req_host, sizeof(req_host));
- printf("domain: %s A: %s TTL: %d\n", name, req_host, ttl);
- } break;
- case DNS_T_AAAA: {
- unsigned char addr[16];
- char name[DNS_MAX_CNAME_LEN] = {0};
- dns_get_AAAA(rrs, name, DNS_MAX_CNAME_LEN, &ttl, addr);
- req_host[0] = '\0';
- inet_ntop(AF_INET6, addr, req_host, sizeof(req_host));
- printf("domain: %s AAAA: %s TTL:%d\n", name, req_host, ttl);
- } break;
- case DNS_T_HTTPS: {
- char name[DNS_MAX_CNAME_LEN] = {0};
- char target[DNS_MAX_CNAME_LEN] = {0};
- struct dns_https_param *p = NULL;
- int priority = 0;
- int ret = 0;
- ret = dns_get_HTTPS_svcparm_start(rrs, &p, name, DNS_MAX_CNAME_LEN, &ttl, &priority, target,
- DNS_MAX_CNAME_LEN);
- if (ret != 0) {
- printf("get HTTPS svcparm failed\n");
- break;
- }
- printf("domain: %s HTTPS: %s TTL: %d priority: %d\n", name, target, ttl, priority);
- for (; p; p = dns_get_HTTPS_svcparm_next(rrs, p)) {
- switch (p->key) {
- case DNS_HTTPS_T_MANDATORY: {
- printf(" HTTPS: mandatory: %s\n", p->value);
- } break;
- case DNS_HTTPS_T_ALPN: {
- char alph[64] = {0};
- int total_alph_len = 0;
- char *ptr = (char *)p->value;
- do {
- int alphlen = *ptr;
- memcpy(alph + total_alph_len, ptr + 1, alphlen);
- total_alph_len += alphlen;
- ptr += alphlen + 1;
- alph[total_alph_len] = ',';
- total_alph_len++;
- alph[total_alph_len] = ' ';
- total_alph_len++;
- } while (ptr - (char *)p->value < p->len);
- if (total_alph_len > 2) {
- alph[total_alph_len - 2] = '\0';
- }
- printf(" HTTPS: alpn: %s\n", alph);
- } break;
- case DNS_HTTPS_T_NO_DEFAULT_ALPN: {
- printf(" HTTPS: no_default_alpn: %s\n", p->value);
- } break;
- case DNS_HTTPS_T_PORT: {
- int port = *(unsigned short *)(p->value);
- printf(" HTTPS: port: %d\n", port);
- } break;
- case DNS_HTTPS_T_IPV4HINT: {
- printf(" HTTPS: ipv4hint: %d\n", p->len / 4);
- for (int k = 0; k < p->len / 4; k++) {
- char ip[16] = {0};
- inet_ntop(AF_INET, p->value + k * 4, ip, sizeof(ip));
- printf(" ipv4: %s\n", ip);
- }
- } break;
- case DNS_HTTPS_T_ECH: {
- printf(" HTTPS: ech: ");
- for (int k = 0; k < p->len; k++) {
- printf("%02x ", p->value[k]);
- }
- printf("\n");
- } break;
- case DNS_HTTPS_T_IPV6HINT: {
- printf(" HTTPS: ipv6hint: %d\n", p->len / 16);
- for (int k = 0; k < p->len / 16; k++) {
- char ip[64] = {0};
- inet_ntop(AF_INET6, p->value + k * 16, ip, sizeof(ip));
- printf(" ipv6: %s\n", ip);
- }
- } break;
- }
- }
- } break;
- case DNS_T_NS: {
- char cname[DNS_MAX_CNAME_LEN];
- char name[DNS_MAX_CNAME_LEN] = {0};
- dns_get_CNAME(rrs, name, DNS_MAX_CNAME_LEN, &ttl, cname, DNS_MAX_CNAME_LEN);
- printf("domain: %s TTL: %d NS: %s\n", name, ttl, cname);
- } break;
- case DNS_T_CNAME: {
- char cname[DNS_MAX_CNAME_LEN];
- char name[DNS_MAX_CNAME_LEN] = {0};
- if (dns_conf_force_no_cname) {
- continue;
- }
- dns_get_CNAME(rrs, name, DNS_MAX_CNAME_LEN, &ttl, cname, DNS_MAX_CNAME_LEN);
- printf("domain: %s TTL: %d CNAME: %s\n", name, ttl, cname);
- } break;
- case DNS_T_SOA: {
- char name[DNS_MAX_CNAME_LEN] = {0};
- struct dns_soa soa;
- dns_get_SOA(rrs, name, 128, &ttl, &soa);
- printf("domain: %s SOA: mname: %s, rname: %s, serial: %d, refresh: %d, retry: %d, expire: "
- "%d, minimum: %d",
- name, soa.mname, soa.rname, soa.serial, soa.refresh, soa.retry, soa.expire, soa.minimum);
- } break;
- default:
- break;
- }
- }
- printf("\n");
- }
- return 0;
- }
- int dns_packet_debug(const char *packet_file)
- {
- struct _dns_read_packet_info *info = NULL;
- char buff[DNS_PACKSIZE];
- tlog_set_maxlog_count(0);
- tlog_setlogscreen(1);
- tlog_setlevel(TLOG_DEBUG);
- info = _dns_read_packet_file(packet_file);
- if (info == NULL) {
- goto errout;
- }
- const char *send_env = getenv("SMARTDNS_DEBUG_SEND");
- if (send_env != NULL) {
- char ip[32];
- int port = 53;
- if (parse_ip(send_env, ip, &port) == 0) {
- int sockfd = socket(AF_INET, SOCK_DGRAM, 0);
- if (sockfd > 0) {
- struct sockaddr_in server;
- server.sin_family = AF_INET;
- server.sin_port = htons(port);
- server.sin_addr.s_addr = inet_addr(ip);
- sendto(sockfd, info->packet, info->packet_len, 0, (struct sockaddr *)&server, sizeof(server));
- close(sockfd);
- }
- }
- }
- struct dns_packet *packet = (struct dns_packet *)buff;
- if (dns_decode(packet, DNS_PACKSIZE, info->packet, info->packet_len) != 0) {
- printf("decode failed.\n");
- goto errout;
- }
- _dns_debug_display(packet);
- free(info);
- return 0;
- errout:
- if (info) {
- free(info);
- }
- return -1;
- }
- #endif
|