blob: 3af37f0060f422fda18415bdf2c0727eca25fbfc [file] [log] [blame]
Ky Srinivasancc04acf2010-12-16 18:56:54 -07001/*
2 * An implementation of key value pair (KVP) functionality for Linux.
3 *
4 *
5 * Copyright (C) 2010, Novell, Inc.
6 * Author : K. Y. Srinivasan <ksrinivasan@novell.com>
7 *
8 * This program is free software; you can redistribute it and/or modify it
9 * under the terms of the GNU General Public License version 2 as published
10 * by the Free Software Foundation.
11 *
12 * This program is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, GOOD TITLE or
15 * NON INFRINGEMENT. See the GNU General Public License for more
16 * details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
21 *
22 */
23
24
25#include <sys/types.h>
26#include <sys/socket.h>
27#include <sys/poll.h>
28#include <sys/utsname.h>
29#include <linux/types.h>
30#include <stdio.h>
31#include <stdlib.h>
32#include <unistd.h>
33#include <string.h>
34#include <errno.h>
35#include <arpa/inet.h>
36#include <linux/connector.h>
K. Y. Srinivasaneab6af72012-02-02 16:56:49 -080037#include <linux/hyperv.h>
Ky Srinivasancc04acf2010-12-16 18:56:54 -070038#include <linux/netlink.h>
Ky Srinivasancc04acf2010-12-16 18:56:54 -070039#include <ifaddrs.h>
40#include <netdb.h>
41#include <syslog.h>
K. Y. Srinivasandb425332012-03-16 08:02:26 -070042#include <sys/stat.h>
43#include <fcntl.h>
Ky Srinivasancc04acf2010-12-16 18:56:54 -070044
45/*
46 * KVP protocol: The user mode component first registers with the
47 * the kernel component. Subsequently, the kernel component requests, data
48 * for the specified keys. In response to this message the user mode component
49 * fills in the value corresponding to the specified key. We overload the
50 * sequence field in the cn_msg header to define our KVP message types.
51 *
52 * We use this infrastructure for also supporting queries from user mode
53 * application for state that may be maintained in the KVP kernel component.
54 *
Ky Srinivasancc04acf2010-12-16 18:56:54 -070055 */
56
Ky Srinivasancc04acf2010-12-16 18:56:54 -070057
58enum key_index {
59 FullyQualifiedDomainName = 0,
60 IntegrationServicesVersion, /*This key is serviced in the kernel*/
61 NetworkAddressIPv4,
62 NetworkAddressIPv6,
63 OSBuildNumber,
64 OSName,
65 OSMajorVersion,
66 OSMinorVersion,
67 OSVersion,
68 ProcessorArchitecture
69};
70
Ky Srinivasancc04acf2010-12-16 18:56:54 -070071static char kvp_send_buffer[4096];
K. Y. Srinivasan9b595782012-08-13 10:06:51 -070072static char kvp_recv_buffer[4096 * 2];
Ky Srinivasancc04acf2010-12-16 18:56:54 -070073static struct sockaddr_nl addr;
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -070074static int in_hand_shake = 1;
Ky Srinivasancc04acf2010-12-16 18:56:54 -070075
Olaf Hering7989f7d2011-03-22 10:02:17 +010076static char *os_name = "";
77static char *os_major = "";
78static char *os_minor = "";
79static char *processor_arch;
80static char *os_build;
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -070081static char *lic_version = "Unknown version";
Olaf Hering7989f7d2011-03-22 10:02:17 +010082static struct utsname uts_buf;
Ky Srinivasancc04acf2010-12-16 18:56:54 -070083
K. Y. Srinivasandb425332012-03-16 08:02:26 -070084
85#define MAX_FILE_NAME 100
86#define ENTRIES_PER_BLOCK 50
87
88struct kvp_record {
89 __u8 key[HV_KVP_EXCHANGE_MAX_KEY_SIZE];
90 __u8 value[HV_KVP_EXCHANGE_MAX_VALUE_SIZE];
91};
92
93struct kvp_file_state {
94 int fd;
95 int num_blocks;
96 struct kvp_record *records;
97 int num_records;
98 __u8 fname[MAX_FILE_NAME];
99};
100
101static struct kvp_file_state kvp_file_info[KVP_POOL_COUNT];
102
103static void kvp_acquire_lock(int pool)
104{
105 struct flock fl = {F_WRLCK, SEEK_SET, 0, 0, 0};
106 fl.l_pid = getpid();
107
108 if (fcntl(kvp_file_info[pool].fd, F_SETLKW, &fl) == -1) {
109 syslog(LOG_ERR, "Failed to acquire the lock pool: %d", pool);
110 exit(-1);
111 }
112}
113
114static void kvp_release_lock(int pool)
115{
116 struct flock fl = {F_UNLCK, SEEK_SET, 0, 0, 0};
117 fl.l_pid = getpid();
118
119 if (fcntl(kvp_file_info[pool].fd, F_SETLK, &fl) == -1) {
120 perror("fcntl");
121 syslog(LOG_ERR, "Failed to release the lock pool: %d", pool);
122 exit(-1);
123 }
124}
125
126static void kvp_update_file(int pool)
127{
128 FILE *filep;
129 size_t bytes_written;
130
131 /*
132 * We are going to write our in-memory registry out to
133 * disk; acquire the lock first.
134 */
135 kvp_acquire_lock(pool);
136
137 filep = fopen(kvp_file_info[pool].fname, "w");
138 if (!filep) {
139 kvp_release_lock(pool);
140 syslog(LOG_ERR, "Failed to open file, pool: %d", pool);
141 exit(-1);
142 }
143
144 bytes_written = fwrite(kvp_file_info[pool].records,
145 sizeof(struct kvp_record),
146 kvp_file_info[pool].num_records, filep);
147
148 fflush(filep);
149 kvp_release_lock(pool);
150}
151
K. Y. Srinivasanadc80ae2012-03-16 08:02:27 -0700152static void kvp_update_mem_state(int pool)
153{
154 FILE *filep;
155 size_t records_read = 0;
156 struct kvp_record *record = kvp_file_info[pool].records;
157 struct kvp_record *readp;
158 int num_blocks = kvp_file_info[pool].num_blocks;
159 int alloc_unit = sizeof(struct kvp_record) * ENTRIES_PER_BLOCK;
160
161 kvp_acquire_lock(pool);
162
163 filep = fopen(kvp_file_info[pool].fname, "r");
164 if (!filep) {
165 kvp_release_lock(pool);
166 syslog(LOG_ERR, "Failed to open file, pool: %d", pool);
167 exit(-1);
168 }
169 while (!feof(filep)) {
170 readp = &record[records_read];
171 records_read += fread(readp, sizeof(struct kvp_record),
172 ENTRIES_PER_BLOCK * num_blocks,
173 filep);
174
175 if (!feof(filep)) {
176 /*
177 * We have more data to read.
178 */
179 num_blocks++;
180 record = realloc(record, alloc_unit * num_blocks);
181
182 if (record == NULL) {
183 syslog(LOG_ERR, "malloc failed");
184 exit(-1);
185 }
186 continue;
187 }
188 break;
189 }
190
191 kvp_file_info[pool].num_blocks = num_blocks;
192 kvp_file_info[pool].records = record;
193 kvp_file_info[pool].num_records = records_read;
194
195 kvp_release_lock(pool);
196}
K. Y. Srinivasandb425332012-03-16 08:02:26 -0700197static int kvp_file_init(void)
198{
199 int ret, fd;
200 FILE *filep;
201 size_t records_read;
202 __u8 *fname;
203 struct kvp_record *record;
204 struct kvp_record *readp;
205 int num_blocks;
206 int i;
207 int alloc_unit = sizeof(struct kvp_record) * ENTRIES_PER_BLOCK;
208
209 if (access("/var/opt/hyperv", F_OK)) {
210 if (mkdir("/var/opt/hyperv", S_IRUSR | S_IWUSR | S_IROTH)) {
211 syslog(LOG_ERR, " Failed to create /var/opt/hyperv");
212 exit(-1);
213 }
214 }
215
216 for (i = 0; i < KVP_POOL_COUNT; i++) {
217 fname = kvp_file_info[i].fname;
218 records_read = 0;
219 num_blocks = 1;
220 sprintf(fname, "/var/opt/hyperv/.kvp_pool_%d", i);
221 fd = open(fname, O_RDWR | O_CREAT, S_IRUSR | S_IWUSR | S_IROTH);
222
223 if (fd == -1)
224 return 1;
225
226
227 filep = fopen(fname, "r");
228 if (!filep)
229 return 1;
230
231 record = malloc(alloc_unit * num_blocks);
232 if (record == NULL) {
233 fclose(filep);
234 return 1;
235 }
236 while (!feof(filep)) {
237 readp = &record[records_read];
238 records_read += fread(readp, sizeof(struct kvp_record),
239 ENTRIES_PER_BLOCK,
240 filep);
241
242 if (!feof(filep)) {
243 /*
244 * We have more data to read.
245 */
246 num_blocks++;
247 record = realloc(record, alloc_unit *
248 num_blocks);
249 if (record == NULL) {
250 fclose(filep);
251 return 1;
252 }
253 continue;
254 }
255 break;
256 }
257 kvp_file_info[i].fd = fd;
258 kvp_file_info[i].num_blocks = num_blocks;
259 kvp_file_info[i].records = record;
260 kvp_file_info[i].num_records = records_read;
261 fclose(filep);
262
263 }
264
265 return 0;
266}
267
268static int kvp_key_delete(int pool, __u8 *key, int key_size)
269{
270 int i;
271 int j, k;
K. Y. Srinivasanadc80ae2012-03-16 08:02:27 -0700272 int num_records;
273 struct kvp_record *record;
274
275 /*
276 * First update the in-memory state.
277 */
278 kvp_update_mem_state(pool);
279
280 num_records = kvp_file_info[pool].num_records;
281 record = kvp_file_info[pool].records;
K. Y. Srinivasandb425332012-03-16 08:02:26 -0700282
283 for (i = 0; i < num_records; i++) {
284 if (memcmp(key, record[i].key, key_size))
285 continue;
286 /*
287 * Found a match; just move the remaining
288 * entries up.
289 */
290 if (i == num_records) {
291 kvp_file_info[pool].num_records--;
292 kvp_update_file(pool);
293 return 0;
294 }
295
296 j = i;
297 k = j + 1;
298 for (; k < num_records; k++) {
299 strcpy(record[j].key, record[k].key);
300 strcpy(record[j].value, record[k].value);
301 j++;
302 }
303
304 kvp_file_info[pool].num_records--;
305 kvp_update_file(pool);
306 return 0;
307 }
308 return 1;
309}
310
311static int kvp_key_add_or_modify(int pool, __u8 *key, int key_size, __u8 *value,
312 int value_size)
313{
314 int i;
315 int j, k;
K. Y. Srinivasanadc80ae2012-03-16 08:02:27 -0700316 int num_records;
317 struct kvp_record *record;
318 int num_blocks;
K. Y. Srinivasandb425332012-03-16 08:02:26 -0700319
320 if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) ||
321 (value_size > HV_KVP_EXCHANGE_MAX_VALUE_SIZE))
322 return 1;
323
K. Y. Srinivasanadc80ae2012-03-16 08:02:27 -0700324 /*
325 * First update the in-memory state.
326 */
327 kvp_update_mem_state(pool);
328
329 num_records = kvp_file_info[pool].num_records;
330 record = kvp_file_info[pool].records;
331 num_blocks = kvp_file_info[pool].num_blocks;
332
K. Y. Srinivasandb425332012-03-16 08:02:26 -0700333 for (i = 0; i < num_records; i++) {
334 if (memcmp(key, record[i].key, key_size))
335 continue;
336 /*
337 * Found a match; just update the value -
338 * this is the modify case.
339 */
340 memcpy(record[i].value, value, value_size);
341 kvp_update_file(pool);
342 return 0;
343 }
344
345 /*
346 * Need to add a new entry;
347 */
348 if (num_records == (ENTRIES_PER_BLOCK * num_blocks)) {
349 /* Need to allocate a larger array for reg entries. */
350 record = realloc(record, sizeof(struct kvp_record) *
351 ENTRIES_PER_BLOCK * (num_blocks + 1));
352
353 if (record == NULL)
354 return 1;
355 kvp_file_info[pool].num_blocks++;
356
357 }
358 memcpy(record[i].value, value, value_size);
359 memcpy(record[i].key, key, key_size);
360 kvp_file_info[pool].records = record;
361 kvp_file_info[pool].num_records++;
362 kvp_update_file(pool);
363 return 0;
364}
365
366static int kvp_get_value(int pool, __u8 *key, int key_size, __u8 *value,
367 int value_size)
368{
369 int i;
K. Y. Srinivasanadc80ae2012-03-16 08:02:27 -0700370 int num_records;
371 struct kvp_record *record;
K. Y. Srinivasandb425332012-03-16 08:02:26 -0700372
373 if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) ||
374 (value_size > HV_KVP_EXCHANGE_MAX_VALUE_SIZE))
375 return 1;
376
K. Y. Srinivasanadc80ae2012-03-16 08:02:27 -0700377 /*
378 * First update the in-memory state.
379 */
380 kvp_update_mem_state(pool);
381
382 num_records = kvp_file_info[pool].num_records;
383 record = kvp_file_info[pool].records;
384
K. Y. Srinivasandb425332012-03-16 08:02:26 -0700385 for (i = 0; i < num_records; i++) {
386 if (memcmp(key, record[i].key, key_size))
387 continue;
388 /*
389 * Found a match; just copy the value out.
390 */
391 memcpy(value, record[i].value, value_size);
392 return 0;
393 }
394
395 return 1;
396}
397
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700398static int kvp_pool_enumerate(int pool, int index, __u8 *key, int key_size,
K. Y. Srinivasanadc80ae2012-03-16 08:02:27 -0700399 __u8 *value, int value_size)
400{
401 struct kvp_record *record;
402
403 /*
404 * First update our in-memory database.
405 */
406 kvp_update_mem_state(pool);
407 record = kvp_file_info[pool].records;
408
409 if (index >= kvp_file_info[pool].num_records) {
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700410 return 1;
K. Y. Srinivasanadc80ae2012-03-16 08:02:27 -0700411 }
412
413 memcpy(key, record[index].key, key_size);
414 memcpy(value, record[index].value, value_size);
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700415 return 0;
K. Y. Srinivasanadc80ae2012-03-16 08:02:27 -0700416}
417
418
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700419void kvp_get_os_info(void)
420{
421 FILE *file;
Olaf Hering7989f7d2011-03-22 10:02:17 +0100422 char *p, buf[512];
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700423
Olaf Hering7989f7d2011-03-22 10:02:17 +0100424 uname(&uts_buf);
425 os_build = uts_buf.release;
K. Y. Srinivasan064931d2011-07-19 11:44:20 -0700426 processor_arch = uts_buf.machine;
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700427
K. Y. Srinivasane54bbc62011-07-22 10:14:31 -0700428 /*
429 * The current windows host (win7) expects the build
430 * string to be of the form: x.y.z
431 * Strip additional information we may have.
432 */
433 p = strchr(os_build, '-');
434 if (p)
435 *p = '\0';
436
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700437 file = fopen("/etc/SuSE-release", "r");
438 if (file != NULL)
439 goto kvp_osinfo_found;
440 file = fopen("/etc/redhat-release", "r");
441 if (file != NULL)
442 goto kvp_osinfo_found;
443 /*
444 * Add code for other supported platforms.
445 */
446
447 /*
448 * We don't have information about the os.
449 */
Olaf Hering7989f7d2011-03-22 10:02:17 +0100450 os_name = uts_buf.sysname;
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700451 return;
452
453kvp_osinfo_found:
Olaf Hering7989f7d2011-03-22 10:02:17 +0100454 /* up to three lines */
455 p = fgets(buf, sizeof(buf), file);
456 if (p) {
457 p = strchr(buf, '\n');
458 if (p)
459 *p = '\0';
460 p = strdup(buf);
461 if (!p)
462 goto done;
463 os_name = p;
464
465 /* second line */
466 p = fgets(buf, sizeof(buf), file);
467 if (p) {
468 p = strchr(buf, '\n');
469 if (p)
470 *p = '\0';
471 p = strdup(buf);
472 if (!p)
473 goto done;
474 os_major = p;
475
476 /* third line */
477 p = fgets(buf, sizeof(buf), file);
478 if (p) {
479 p = strchr(buf, '\n');
480 if (p)
481 *p = '\0';
482 p = strdup(buf);
483 if (p)
484 os_minor = p;
485 }
486 }
487 }
488
489done:
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700490 fclose(file);
491 return;
492}
493
494static int
K. Y. Srinivasan0ecaa192012-08-16 18:32:13 -0700495kvp_get_ip_address(int family, char *if_name, int op,
496 void *out_buffer, int length)
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700497{
498 struct ifaddrs *ifap;
499 struct ifaddrs *curp;
500 int ipv4_len = strlen("255.255.255.255") + 1;
501 int ipv6_len = strlen("ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff")+1;
502 int offset = 0;
503 const char *str;
504 char tmp[50];
505 int error = 0;
K. Y. Srinivasan0ecaa192012-08-16 18:32:13 -0700506 char *buffer;
507 struct hv_kvp_ipaddr_value *ip_buffer;
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700508
K. Y. Srinivasan0ecaa192012-08-16 18:32:13 -0700509 if (op == KVP_OP_ENUMERATE) {
510 buffer = out_buffer;
511 } else {
512 ip_buffer = out_buffer;
513 buffer = (char *)ip_buffer->ip_addr;
514 ip_buffer->addr_family = 0;
515 }
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700516 /*
517 * On entry into this function, the buffer is capable of holding the
K. Y. Srinivasan0ecaa192012-08-16 18:32:13 -0700518 * maximum key value.
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700519 */
520
521 if (getifaddrs(&ifap)) {
522 strcpy(buffer, "getifaddrs failed\n");
523 return 1;
524 }
525
526 curp = ifap;
527 while (curp != NULL) {
K. Y. Srinivasan0ecaa192012-08-16 18:32:13 -0700528 if (curp->ifa_addr == NULL) {
529 curp = curp->ifa_next;
530 continue;
531 }
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700532
K. Y. Srinivasan0ecaa192012-08-16 18:32:13 -0700533 if ((if_name != NULL) &&
534 (strncmp(curp->ifa_name, if_name, strlen(if_name)))) {
535 /*
536 * We want info about a specific interface;
537 * just continue.
538 */
539 curp = curp->ifa_next;
540 continue;
541 }
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700542
K. Y. Srinivasan0ecaa192012-08-16 18:32:13 -0700543 /*
544 * We only support two address families: AF_INET and AF_INET6.
545 * If a family value of 0 is specified, we collect both
546 * supported address families; if not we gather info on
547 * the specified address family.
548 */
549 if ((family != 0) && (curp->ifa_addr->sa_family != family)) {
550 curp = curp->ifa_next;
551 continue;
552 }
553 if ((curp->ifa_addr->sa_family != AF_INET) &&
554 (curp->ifa_addr->sa_family != AF_INET6)) {
555 curp = curp->ifa_next;
556 continue;
557 }
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700558
K. Y. Srinivasan0ecaa192012-08-16 18:32:13 -0700559 if ((curp->ifa_addr->sa_family == AF_INET) &&
560 ((family == AF_INET) || (family == 0))) {
561 struct sockaddr_in *addr =
562 (struct sockaddr_in *) curp->ifa_addr;
563
564 str = inet_ntop(AF_INET, &addr->sin_addr, tmp, 50);
565 if (str == NULL) {
566 strcpy(buffer, "inet_ntop failed\n");
567 error = 1;
568 goto getaddr_done;
569 }
570 if (offset == 0)
571 strcpy(buffer, tmp);
572 else
573 strcat(buffer, tmp);
574 strcat(buffer, ";");
575
576 offset += strlen(str) + 1;
577 if ((length - offset) < (ipv4_len + 1))
578 goto getaddr_done;
579
580 } else if ((family == AF_INET6) || (family == 0)) {
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700581
582 /*
583 * We only support AF_INET and AF_INET6
Lucas De Marchi25985ed2011-03-30 22:57:33 -0300584 * and the list of addresses is separated by a ";".
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700585 */
K. Y. Srinivasan0ecaa192012-08-16 18:32:13 -0700586 struct sockaddr_in6 *addr =
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700587 (struct sockaddr_in6 *) curp->ifa_addr;
588
K. Y. Srinivasan0ecaa192012-08-16 18:32:13 -0700589 str = inet_ntop(AF_INET6,
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700590 &addr->sin6_addr.s6_addr,
591 tmp, 50);
K. Y. Srinivasan0ecaa192012-08-16 18:32:13 -0700592 if (str == NULL) {
593 strcpy(buffer, "inet_ntop failed\n");
594 error = 1;
595 goto getaddr_done;
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700596 }
K. Y. Srinivasan0ecaa192012-08-16 18:32:13 -0700597 if (offset == 0)
598 strcpy(buffer, tmp);
599 else
600 strcat(buffer, tmp);
601 strcat(buffer, ";");
602 offset += strlen(str) + 1;
603 if ((length - offset) < (ipv6_len + 1))
604 goto getaddr_done;
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700605
606 }
K. Y. Srinivasan0ecaa192012-08-16 18:32:13 -0700607
608
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700609 curp = curp->ifa_next;
610 }
611
612getaddr_done:
613 freeifaddrs(ifap);
614 return error;
615}
616
617
618static int
619kvp_get_domain_name(char *buffer, int length)
620{
621 struct addrinfo hints, *info ;
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700622 int error = 0;
623
K. Y. Srinivasan5be528c2011-07-26 11:03:10 -0700624 gethostname(buffer, length);
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700625 memset(&hints, 0, sizeof(hints));
626 hints.ai_family = AF_INET; /*Get only ipv4 addrinfo. */
627 hints.ai_socktype = SOCK_STREAM;
628 hints.ai_flags = AI_CANONNAME;
629
K. Y. Srinivasan5be528c2011-07-26 11:03:10 -0700630 error = getaddrinfo(buffer, NULL, &hints, &info);
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700631 if (error != 0) {
632 strcpy(buffer, "getaddrinfo failed\n");
K. Y. Srinivasan5be528c2011-07-26 11:03:10 -0700633 return error;
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700634 }
635 strcpy(buffer, info->ai_canonname);
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700636 freeaddrinfo(info);
637 return error;
638}
639
640static int
641netlink_send(int fd, struct cn_msg *msg)
642{
643 struct nlmsghdr *nlh;
644 unsigned int size;
645 struct msghdr message;
646 char buffer[64];
647 struct iovec iov[2];
648
649 size = NLMSG_SPACE(sizeof(struct cn_msg) + msg->len);
650
651 nlh = (struct nlmsghdr *)buffer;
652 nlh->nlmsg_seq = 0;
653 nlh->nlmsg_pid = getpid();
654 nlh->nlmsg_type = NLMSG_DONE;
655 nlh->nlmsg_len = NLMSG_LENGTH(size - sizeof(*nlh));
656 nlh->nlmsg_flags = 0;
657
658 iov[0].iov_base = nlh;
659 iov[0].iov_len = sizeof(*nlh);
660
661 iov[1].iov_base = msg;
662 iov[1].iov_len = size;
663
664 memset(&message, 0, sizeof(message));
665 message.msg_name = &addr;
666 message.msg_namelen = sizeof(addr);
667 message.msg_iov = iov;
668 message.msg_iovlen = 2;
669
670 return sendmsg(fd, &message, 0);
671}
672
Olaf Hering7989f7d2011-03-22 10:02:17 +0100673int main(void)
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700674{
675 int fd, len, sock_opt;
676 int error;
677 struct cn_msg *message;
678 struct pollfd pfd;
679 struct nlmsghdr *incoming_msg;
680 struct cn_msg *incoming_cn_msg;
K. Y. Srinivasan26403352012-02-02 16:56:50 -0800681 struct hv_kvp_msg *hv_msg;
Olaf Hering7989f7d2011-03-22 10:02:17 +0100682 char *p;
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700683 char *key_value;
684 char *key_name;
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700685 int op;
686 int pool;
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700687
688 daemon(1, 0);
689 openlog("KVP", 0, LOG_USER);
690 syslog(LOG_INFO, "KVP starting; pid is:%d", getpid());
691 /*
692 * Retrieve OS release information.
693 */
694 kvp_get_os_info();
695
K. Y. Srinivasandb425332012-03-16 08:02:26 -0700696 if (kvp_file_init()) {
697 syslog(LOG_ERR, "Failed to initialize the pools");
698 exit(-1);
699 }
700
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700701 fd = socket(AF_NETLINK, SOCK_DGRAM, NETLINK_CONNECTOR);
702 if (fd < 0) {
703 syslog(LOG_ERR, "netlink socket creation failed; error:%d", fd);
704 exit(-1);
705 }
706 addr.nl_family = AF_NETLINK;
707 addr.nl_pad = 0;
708 addr.nl_pid = 0;
709 addr.nl_groups = CN_KVP_IDX;
710
711
712 error = bind(fd, (struct sockaddr *)&addr, sizeof(addr));
713 if (error < 0) {
714 syslog(LOG_ERR, "bind failed; error:%d", error);
715 close(fd);
716 exit(-1);
717 }
718 sock_opt = addr.nl_groups;
719 setsockopt(fd, 270, 1, &sock_opt, sizeof(sock_opt));
720 /*
721 * Register ourselves with the kernel.
722 */
723 message = (struct cn_msg *)kvp_send_buffer;
724 message->id.idx = CN_KVP_IDX;
725 message->id.val = CN_KVP_VAL;
K. Y. Srinivasan26403352012-02-02 16:56:50 -0800726
727 hv_msg = (struct hv_kvp_msg *)message->data;
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700728 hv_msg->kvp_hdr.operation = KVP_OP_REGISTER1;
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700729 message->ack = 0;
K. Y. Srinivasan26403352012-02-02 16:56:50 -0800730 message->len = sizeof(struct hv_kvp_msg);
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700731
732 len = netlink_send(fd, message);
733 if (len < 0) {
734 syslog(LOG_ERR, "netlink_send failed; error:%d", len);
735 close(fd);
736 exit(-1);
737 }
738
739 pfd.fd = fd;
740
741 while (1) {
Olaf Heringbcc2c9c2012-05-31 16:40:06 +0200742 struct sockaddr *addr_p = (struct sockaddr *) &addr;
743 socklen_t addr_l = sizeof(addr);
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700744 pfd.events = POLLIN;
745 pfd.revents = 0;
746 poll(&pfd, 1, -1);
747
Olaf Heringbcc2c9c2012-05-31 16:40:06 +0200748 len = recvfrom(fd, kvp_recv_buffer, sizeof(kvp_recv_buffer), 0,
749 addr_p, &addr_l);
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700750
Olaf Heringbcc2c9c2012-05-31 16:40:06 +0200751 if (len < 0 || addr.nl_pid) {
752 syslog(LOG_ERR, "recvfrom failed; pid:%u error:%d %s",
753 addr.nl_pid, errno, strerror(errno));
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700754 close(fd);
755 return -1;
756 }
757
758 incoming_msg = (struct nlmsghdr *)kvp_recv_buffer;
759 incoming_cn_msg = (struct cn_msg *)NLMSG_DATA(incoming_msg);
K. Y. Srinivasan26403352012-02-02 16:56:50 -0800760 hv_msg = (struct hv_kvp_msg *)incoming_cn_msg->data;
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700761
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700762 /*
763 * We will use the KVP header information to pass back
764 * the error from this daemon. So, first copy the state
765 * and set the error code to success.
766 */
767 op = hv_msg->kvp_hdr.operation;
768 pool = hv_msg->kvp_hdr.pool;
769 hv_msg->error = HV_S_OK;
770
771 if ((in_hand_shake) && (op == KVP_OP_REGISTER1)) {
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700772 /*
773 * Driver is registering with us; stash away the version
774 * information.
775 */
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700776 in_hand_shake = 0;
K. Y. Srinivasane485ceac2012-03-10 15:32:08 -0800777 p = (char *)hv_msg->body.kvp_register.version;
Olaf Hering7989f7d2011-03-22 10:02:17 +0100778 lic_version = malloc(strlen(p) + 1);
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700779 if (lic_version) {
Olaf Hering7989f7d2011-03-22 10:02:17 +0100780 strcpy(lic_version, p);
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700781 syslog(LOG_INFO, "KVP LIC Version: %s",
782 lic_version);
783 } else {
784 syslog(LOG_ERR, "malloc failed");
785 }
786 continue;
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700787 }
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700788
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700789 switch (op) {
K. Y. Srinivasanfa3d5b82012-03-16 08:02:25 -0700790 case KVP_OP_SET:
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700791 if (kvp_key_add_or_modify(pool,
K. Y. Srinivasandb425332012-03-16 08:02:26 -0700792 hv_msg->body.kvp_set.data.key,
793 hv_msg->body.kvp_set.data.key_size,
794 hv_msg->body.kvp_set.data.value,
795 hv_msg->body.kvp_set.data.value_size))
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700796 hv_msg->error = HV_S_CONT;
K. Y. Srinivasandb425332012-03-16 08:02:26 -0700797 break;
798
K. Y. Srinivasanfa3d5b82012-03-16 08:02:25 -0700799 case KVP_OP_GET:
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700800 if (kvp_get_value(pool,
K. Y. Srinivasandb425332012-03-16 08:02:26 -0700801 hv_msg->body.kvp_set.data.key,
802 hv_msg->body.kvp_set.data.key_size,
803 hv_msg->body.kvp_set.data.value,
804 hv_msg->body.kvp_set.data.value_size))
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700805 hv_msg->error = HV_S_CONT;
K. Y. Srinivasandb425332012-03-16 08:02:26 -0700806 break;
807
K. Y. Srinivasanfa3d5b82012-03-16 08:02:25 -0700808 case KVP_OP_DELETE:
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700809 if (kvp_key_delete(pool,
K. Y. Srinivasandb425332012-03-16 08:02:26 -0700810 hv_msg->body.kvp_delete.key,
811 hv_msg->body.kvp_delete.key_size))
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700812 hv_msg->error = HV_S_CONT;
K. Y. Srinivasandb425332012-03-16 08:02:26 -0700813 break;
814
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700815 default:
K. Y. Srinivasan26403352012-02-02 16:56:50 -0800816 break;
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700817 }
818
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700819 if (op != KVP_OP_ENUMERATE)
K. Y. Srinivasanfa3d5b82012-03-16 08:02:25 -0700820 goto kvp_done;
821
K. Y. Srinivasanadc80ae2012-03-16 08:02:27 -0700822 /*
823 * If the pool is KVP_POOL_AUTO, dynamically generate
824 * both the key and the value; if not read from the
825 * appropriate pool.
826 */
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700827 if (pool != KVP_POOL_AUTO) {
828 if (kvp_pool_enumerate(pool,
K. Y. Srinivasanadc80ae2012-03-16 08:02:27 -0700829 hv_msg->body.kvp_enum_data.index,
830 hv_msg->body.kvp_enum_data.data.key,
831 HV_KVP_EXCHANGE_MAX_KEY_SIZE,
832 hv_msg->body.kvp_enum_data.data.value,
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700833 HV_KVP_EXCHANGE_MAX_VALUE_SIZE))
834 hv_msg->error = HV_S_CONT;
K. Y. Srinivasanadc80ae2012-03-16 08:02:27 -0700835 goto kvp_done;
836 }
837
K. Y. Srinivasan26403352012-02-02 16:56:50 -0800838 hv_msg = (struct hv_kvp_msg *)incoming_cn_msg->data;
839 key_name = (char *)hv_msg->body.kvp_enum_data.data.key;
840 key_value = (char *)hv_msg->body.kvp_enum_data.data.value;
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700841
K. Y. Srinivasan26403352012-02-02 16:56:50 -0800842 switch (hv_msg->body.kvp_enum_data.index) {
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700843 case FullyQualifiedDomainName:
844 kvp_get_domain_name(key_value,
845 HV_KVP_EXCHANGE_MAX_VALUE_SIZE);
846 strcpy(key_name, "FullyQualifiedDomainName");
847 break;
848 case IntegrationServicesVersion:
849 strcpy(key_name, "IntegrationServicesVersion");
850 strcpy(key_value, lic_version);
851 break;
852 case NetworkAddressIPv4:
K. Y. Srinivasan0ecaa192012-08-16 18:32:13 -0700853 kvp_get_ip_address(AF_INET, NULL, KVP_OP_ENUMERATE,
854 key_value, HV_KVP_EXCHANGE_MAX_VALUE_SIZE);
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700855 strcpy(key_name, "NetworkAddressIPv4");
856 break;
857 case NetworkAddressIPv6:
K. Y. Srinivasan0ecaa192012-08-16 18:32:13 -0700858 kvp_get_ip_address(AF_INET6, NULL, KVP_OP_ENUMERATE,
859 key_value, HV_KVP_EXCHANGE_MAX_VALUE_SIZE);
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700860 strcpy(key_name, "NetworkAddressIPv6");
861 break;
862 case OSBuildNumber:
863 strcpy(key_value, os_build);
864 strcpy(key_name, "OSBuildNumber");
865 break;
866 case OSName:
867 strcpy(key_value, os_name);
868 strcpy(key_name, "OSName");
869 break;
870 case OSMajorVersion:
871 strcpy(key_value, os_major);
872 strcpy(key_name, "OSMajorVersion");
873 break;
874 case OSMinorVersion:
875 strcpy(key_value, os_minor);
876 strcpy(key_name, "OSMinorVersion");
877 break;
878 case OSVersion:
879 strcpy(key_value, os_build);
880 strcpy(key_name, "OSVersion");
881 break;
882 case ProcessorArchitecture:
883 strcpy(key_value, processor_arch);
884 strcpy(key_name, "ProcessorArchitecture");
885 break;
886 default:
K. Y. Srinivasanb47a81d2012-08-13 10:06:52 -0700887 hv_msg->error = HV_S_CONT;
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700888 break;
889 }
890 /*
891 * Send the value back to the kernel. The response is
892 * already in the receive buffer. Update the cn_msg header to
893 * reflect the key value that has been added to the message
894 */
K. Y. Srinivasanfa3d5b82012-03-16 08:02:25 -0700895kvp_done:
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700896
897 incoming_cn_msg->id.idx = CN_KVP_IDX;
898 incoming_cn_msg->id.val = CN_KVP_VAL;
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700899 incoming_cn_msg->ack = 0;
K. Y. Srinivasan26403352012-02-02 16:56:50 -0800900 incoming_cn_msg->len = sizeof(struct hv_kvp_msg);
Ky Srinivasancc04acf2010-12-16 18:56:54 -0700901
902 len = netlink_send(fd, incoming_cn_msg);
903 if (len < 0) {
904 syslog(LOG_ERR, "net_link send failed; error:%d", len);
905 exit(-1);
906 }
907 }
908
909}