Merge remote-tracking branch 'regulator/topic/tps65910' into regulator-next
[deliverable/linux.git] / tools / hv / hv_vss_daemon.c
1 /*
2 * An implementation of the host initiated guest snapshot for Hyper-V.
3 *
4 *
5 * Copyright (C) 2013, Microsoft, Inc.
6 * Author : K. Y. Srinivasan <kys@microsoft.com>
7 *
8 * This program is free software; you can redistribute it and/or modify it
9 * under the terms of the GNU General Public License version 2 as published
10 * by the Free Software Foundation.
11 *
12 * This program is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, GOOD TITLE or
15 * NON INFRINGEMENT. See the GNU General Public License for more
16 * details.
17 *
18 */
19
20
21 #include <sys/types.h>
22 #include <sys/socket.h>
23 #include <sys/poll.h>
24 #include <sys/ioctl.h>
25 #include <linux/types.h>
26 #include <fcntl.h>
27 #include <stdio.h>
28 #include <mntent.h>
29 #include <stdlib.h>
30 #include <unistd.h>
31 #include <string.h>
32 #include <ctype.h>
33 #include <errno.h>
34 #include <arpa/inet.h>
35 #include <linux/fs.h>
36 #include <linux/connector.h>
37 #include <linux/hyperv.h>
38 #include <linux/netlink.h>
39 #include <syslog.h>
40
41 static struct sockaddr_nl addr;
42
43 #ifndef SOL_NETLINK
44 #define SOL_NETLINK 270
45 #endif
46
47
48 static int vss_do_freeze(char *dir, unsigned int cmd, char *fs_op)
49 {
50 int ret, fd = open(dir, O_RDONLY);
51
52 if (fd < 0)
53 return 1;
54 ret = ioctl(fd, cmd, 0);
55 syslog(LOG_INFO, "VSS: %s of %s: %s\n", fs_op, dir, strerror(errno));
56 close(fd);
57 return !!ret;
58 }
59
60 static int vss_operate(int operation)
61 {
62 char *fs_op;
63 char match[] = "/dev/";
64 FILE *mounts;
65 struct mntent *ent;
66 unsigned int cmd;
67 int error = 0, root_seen = 0;
68
69 switch (operation) {
70 case VSS_OP_FREEZE:
71 cmd = FIFREEZE;
72 fs_op = "freeze";
73 break;
74 case VSS_OP_THAW:
75 cmd = FITHAW;
76 fs_op = "thaw";
77 break;
78 default:
79 return -1;
80 }
81
82 mounts = setmntent("/proc/mounts", "r");
83 if (mounts == NULL)
84 return -1;
85
86 while ((ent = getmntent(mounts))) {
87 if (strncmp(ent->mnt_fsname, match, strlen(match)))
88 continue;
89 if (strcmp(ent->mnt_type, "iso9660") == 0)
90 continue;
91 if (strcmp(ent->mnt_dir, "/") == 0) {
92 root_seen = 1;
93 continue;
94 }
95 error |= vss_do_freeze(ent->mnt_dir, cmd, fs_op);
96 }
97 endmntent(mounts);
98
99 if (root_seen) {
100 error |= vss_do_freeze("/", cmd, fs_op);
101 }
102
103 return error;
104 }
105
106 static int netlink_send(int fd, struct cn_msg *msg)
107 {
108 struct nlmsghdr nlh = { .nlmsg_type = NLMSG_DONE };
109 unsigned int size;
110 struct msghdr message;
111 struct iovec iov[2];
112
113 size = sizeof(struct cn_msg) + msg->len;
114
115 nlh.nlmsg_pid = getpid();
116 nlh.nlmsg_len = NLMSG_LENGTH(size);
117
118 iov[0].iov_base = &nlh;
119 iov[0].iov_len = sizeof(nlh);
120
121 iov[1].iov_base = msg;
122 iov[1].iov_len = size;
123
124 memset(&message, 0, sizeof(message));
125 message.msg_name = &addr;
126 message.msg_namelen = sizeof(addr);
127 message.msg_iov = iov;
128 message.msg_iovlen = 2;
129
130 return sendmsg(fd, &message, 0);
131 }
132
133 int main(void)
134 {
135 int fd, len, nl_group;
136 int error;
137 struct cn_msg *message;
138 struct pollfd pfd;
139 struct nlmsghdr *incoming_msg;
140 struct cn_msg *incoming_cn_msg;
141 int op;
142 struct hv_vss_msg *vss_msg;
143 char *vss_send_buffer;
144 char *vss_recv_buffer;
145 size_t vss_recv_buffer_len;
146
147 if (daemon(1, 0))
148 return 1;
149
150 openlog("Hyper-V VSS", 0, LOG_USER);
151 syslog(LOG_INFO, "VSS starting; pid is:%d", getpid());
152
153 vss_recv_buffer_len = NLMSG_HDRLEN + sizeof(struct cn_msg) + sizeof(struct hv_vss_msg);
154 vss_send_buffer = calloc(1, vss_recv_buffer_len);
155 vss_recv_buffer = calloc(1, vss_recv_buffer_len);
156 if (!(vss_send_buffer && vss_recv_buffer)) {
157 syslog(LOG_ERR, "Failed to allocate netlink buffers");
158 exit(EXIT_FAILURE);
159 }
160
161 fd = socket(AF_NETLINK, SOCK_DGRAM, NETLINK_CONNECTOR);
162 if (fd < 0) {
163 syslog(LOG_ERR, "netlink socket creation failed; error:%d %s",
164 errno, strerror(errno));
165 exit(EXIT_FAILURE);
166 }
167 addr.nl_family = AF_NETLINK;
168 addr.nl_pad = 0;
169 addr.nl_pid = 0;
170 addr.nl_groups = 0;
171
172
173 error = bind(fd, (struct sockaddr *)&addr, sizeof(addr));
174 if (error < 0) {
175 syslog(LOG_ERR, "bind failed; error:%d %s", errno, strerror(errno));
176 close(fd);
177 exit(EXIT_FAILURE);
178 }
179 nl_group = CN_VSS_IDX;
180 if (setsockopt(fd, SOL_NETLINK, NETLINK_ADD_MEMBERSHIP, &nl_group, sizeof(nl_group)) < 0) {
181 syslog(LOG_ERR, "setsockopt failed; error:%d %s", errno, strerror(errno));
182 close(fd);
183 exit(EXIT_FAILURE);
184 }
185 /*
186 * Register ourselves with the kernel.
187 */
188 message = (struct cn_msg *)vss_send_buffer;
189 message->id.idx = CN_VSS_IDX;
190 message->id.val = CN_VSS_VAL;
191 message->ack = 0;
192 vss_msg = (struct hv_vss_msg *)message->data;
193 vss_msg->vss_hdr.operation = VSS_OP_REGISTER;
194
195 message->len = sizeof(struct hv_vss_msg);
196
197 len = netlink_send(fd, message);
198 if (len < 0) {
199 syslog(LOG_ERR, "netlink_send failed; error:%d %s", errno, strerror(errno));
200 close(fd);
201 exit(EXIT_FAILURE);
202 }
203
204 pfd.fd = fd;
205
206 while (1) {
207 struct sockaddr *addr_p = (struct sockaddr *) &addr;
208 socklen_t addr_l = sizeof(addr);
209 pfd.events = POLLIN;
210 pfd.revents = 0;
211
212 if (poll(&pfd, 1, -1) < 0) {
213 syslog(LOG_ERR, "poll failed; error:%d %s", errno, strerror(errno));
214 if (errno == EINVAL) {
215 close(fd);
216 exit(EXIT_FAILURE);
217 }
218 else
219 continue;
220 }
221
222 len = recvfrom(fd, vss_recv_buffer, vss_recv_buffer_len, 0,
223 addr_p, &addr_l);
224
225 if (len < 0) {
226 syslog(LOG_ERR, "recvfrom failed; pid:%u error:%d %s",
227 addr.nl_pid, errno, strerror(errno));
228 close(fd);
229 return -1;
230 }
231
232 if (addr.nl_pid) {
233 syslog(LOG_WARNING,
234 "Received packet from untrusted pid:%u",
235 addr.nl_pid);
236 continue;
237 }
238
239 incoming_msg = (struct nlmsghdr *)vss_recv_buffer;
240
241 if (incoming_msg->nlmsg_type != NLMSG_DONE)
242 continue;
243
244 incoming_cn_msg = (struct cn_msg *)NLMSG_DATA(incoming_msg);
245 vss_msg = (struct hv_vss_msg *)incoming_cn_msg->data;
246 op = vss_msg->vss_hdr.operation;
247 error = HV_S_OK;
248
249 switch (op) {
250 case VSS_OP_FREEZE:
251 case VSS_OP_THAW:
252 error = vss_operate(op);
253 if (error)
254 error = HV_E_FAIL;
255 break;
256 default:
257 syslog(LOG_ERR, "Illegal op:%d\n", op);
258 }
259 vss_msg->error = error;
260 len = netlink_send(fd, incoming_cn_msg);
261 if (len < 0) {
262 syslog(LOG_ERR, "net_link send failed; error:%d %s",
263 errno, strerror(errno));
264 exit(EXIT_FAILURE);
265 }
266 }
267
268 }
This page took 0.047028 seconds and 5 git commands to generate.