xref: /openbmc/linux/tools/hv/hv_vss_daemon.c (revision 0244ad00)
1 /*
2  * An implementation of the host initiated guest snapshot for Hyper-V.
3  *
4  *
5  * Copyright (C) 2013, Microsoft, Inc.
6  * Author : K. Y. Srinivasan <kys@microsoft.com>
7  *
8  * This program is free software; you can redistribute it and/or modify it
9  * under the terms of the GNU General Public License version 2 as published
10  * by the Free Software Foundation.
11  *
12  * This program is distributed in the hope that it will be useful, but
13  * WITHOUT ANY WARRANTY; without even the implied warranty of
14  * MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, GOOD TITLE or
15  * NON INFRINGEMENT.  See the GNU General Public License for more
16  * details.
17  *
18  */
19 
20 
21 #include <sys/types.h>
22 #include <sys/socket.h>
23 #include <sys/poll.h>
24 #include <sys/ioctl.h>
25 #include <linux/types.h>
26 #include <fcntl.h>
27 #include <stdio.h>
28 #include <mntent.h>
29 #include <stdlib.h>
30 #include <unistd.h>
31 #include <string.h>
32 #include <ctype.h>
33 #include <errno.h>
34 #include <arpa/inet.h>
35 #include <linux/fs.h>
36 #include <linux/connector.h>
37 #include <linux/hyperv.h>
38 #include <linux/netlink.h>
39 #include <syslog.h>
40 
41 static struct sockaddr_nl addr;
42 
43 #ifndef SOL_NETLINK
44 #define SOL_NETLINK 270
45 #endif
46 
47 
48 static int vss_do_freeze(char *dir, unsigned int cmd, char *fs_op)
49 {
50 	int ret, fd = open(dir, O_RDONLY);
51 
52 	if (fd < 0)
53 		return 1;
54 	ret = ioctl(fd, cmd, 0);
55 	syslog(LOG_INFO, "VSS: %s of %s: %s\n", fs_op, dir, strerror(errno));
56 	close(fd);
57 	return !!ret;
58 }
59 
60 static int vss_operate(int operation)
61 {
62 	char *fs_op;
63 	char match[] = "/dev/";
64 	FILE *mounts;
65 	struct mntent *ent;
66 	unsigned int cmd;
67 	int error = 0, root_seen = 0;
68 
69 	switch (operation) {
70 	case VSS_OP_FREEZE:
71 		cmd = FIFREEZE;
72 		fs_op = "freeze";
73 		break;
74 	case VSS_OP_THAW:
75 		cmd = FITHAW;
76 		fs_op = "thaw";
77 		break;
78 	default:
79 		return -1;
80 	}
81 
82 	mounts = setmntent("/proc/mounts", "r");
83 	if (mounts == NULL)
84 		return -1;
85 
86 	while ((ent = getmntent(mounts))) {
87 		if (strncmp(ent->mnt_fsname, match, strlen(match)))
88 			continue;
89 		if (strcmp(ent->mnt_type, "iso9660") == 0)
90 			continue;
91 		if (strcmp(ent->mnt_dir, "/") == 0) {
92 			root_seen = 1;
93 			continue;
94 		}
95 		error |= vss_do_freeze(ent->mnt_dir, cmd, fs_op);
96 	}
97 	endmntent(mounts);
98 
99 	if (root_seen) {
100 		error |= vss_do_freeze("/", cmd, fs_op);
101 	}
102 
103 	return error;
104 }
105 
106 static int netlink_send(int fd, struct cn_msg *msg)
107 {
108 	struct nlmsghdr nlh = { .nlmsg_type = NLMSG_DONE };
109 	unsigned int size;
110 	struct msghdr message;
111 	struct iovec iov[2];
112 
113 	size = sizeof(struct cn_msg) + msg->len;
114 
115 	nlh.nlmsg_pid = getpid();
116 	nlh.nlmsg_len = NLMSG_LENGTH(size);
117 
118 	iov[0].iov_base = &nlh;
119 	iov[0].iov_len = sizeof(nlh);
120 
121 	iov[1].iov_base = msg;
122 	iov[1].iov_len = size;
123 
124 	memset(&message, 0, sizeof(message));
125 	message.msg_name = &addr;
126 	message.msg_namelen = sizeof(addr);
127 	message.msg_iov = iov;
128 	message.msg_iovlen = 2;
129 
130 	return sendmsg(fd, &message, 0);
131 }
132 
133 int main(void)
134 {
135 	int fd, len, nl_group;
136 	int error;
137 	struct cn_msg *message;
138 	struct pollfd pfd;
139 	struct nlmsghdr *incoming_msg;
140 	struct cn_msg	*incoming_cn_msg;
141 	int	op;
142 	struct hv_vss_msg *vss_msg;
143 	char *vss_send_buffer;
144 	char *vss_recv_buffer;
145 	size_t vss_recv_buffer_len;
146 
147 	if (daemon(1, 0))
148 		return 1;
149 
150 	openlog("Hyper-V VSS", 0, LOG_USER);
151 	syslog(LOG_INFO, "VSS starting; pid is:%d", getpid());
152 
153 	vss_recv_buffer_len = NLMSG_HDRLEN + sizeof(struct cn_msg) + sizeof(struct hv_vss_msg);
154 	vss_send_buffer = calloc(1, vss_recv_buffer_len);
155 	vss_recv_buffer = calloc(1, vss_recv_buffer_len);
156 	if (!(vss_send_buffer && vss_recv_buffer)) {
157 		syslog(LOG_ERR, "Failed to allocate netlink buffers");
158 		exit(EXIT_FAILURE);
159 	}
160 
161 	fd = socket(AF_NETLINK, SOCK_DGRAM, NETLINK_CONNECTOR);
162 	if (fd < 0) {
163 		syslog(LOG_ERR, "netlink socket creation failed; error:%d %s",
164 				errno, strerror(errno));
165 		exit(EXIT_FAILURE);
166 	}
167 	addr.nl_family = AF_NETLINK;
168 	addr.nl_pad = 0;
169 	addr.nl_pid = 0;
170 	addr.nl_groups = 0;
171 
172 
173 	error = bind(fd, (struct sockaddr *)&addr, sizeof(addr));
174 	if (error < 0) {
175 		syslog(LOG_ERR, "bind failed; error:%d %s", errno, strerror(errno));
176 		close(fd);
177 		exit(EXIT_FAILURE);
178 	}
179 	nl_group = CN_VSS_IDX;
180 	if (setsockopt(fd, SOL_NETLINK, NETLINK_ADD_MEMBERSHIP, &nl_group, sizeof(nl_group)) < 0) {
181 		syslog(LOG_ERR, "setsockopt failed; error:%d %s", errno, strerror(errno));
182 		close(fd);
183 		exit(EXIT_FAILURE);
184 	}
185 	/*
186 	 * Register ourselves with the kernel.
187 	 */
188 	message = (struct cn_msg *)vss_send_buffer;
189 	message->id.idx = CN_VSS_IDX;
190 	message->id.val = CN_VSS_VAL;
191 	message->ack = 0;
192 	vss_msg = (struct hv_vss_msg *)message->data;
193 	vss_msg->vss_hdr.operation = VSS_OP_REGISTER;
194 
195 	message->len = sizeof(struct hv_vss_msg);
196 
197 	len = netlink_send(fd, message);
198 	if (len < 0) {
199 		syslog(LOG_ERR, "netlink_send failed; error:%d %s", errno, strerror(errno));
200 		close(fd);
201 		exit(EXIT_FAILURE);
202 	}
203 
204 	pfd.fd = fd;
205 
206 	while (1) {
207 		struct sockaddr *addr_p = (struct sockaddr *) &addr;
208 		socklen_t addr_l = sizeof(addr);
209 		pfd.events = POLLIN;
210 		pfd.revents = 0;
211 
212 		if (poll(&pfd, 1, -1) < 0) {
213 			syslog(LOG_ERR, "poll failed; error:%d %s", errno, strerror(errno));
214 			if (errno == EINVAL) {
215 				close(fd);
216 				exit(EXIT_FAILURE);
217 			}
218 			else
219 				continue;
220 		}
221 
222 		len = recvfrom(fd, vss_recv_buffer, vss_recv_buffer_len, 0,
223 				addr_p, &addr_l);
224 
225 		if (len < 0) {
226 			syslog(LOG_ERR, "recvfrom failed; pid:%u error:%d %s",
227 					addr.nl_pid, errno, strerror(errno));
228 			close(fd);
229 			return -1;
230 		}
231 
232 		if (addr.nl_pid) {
233 			syslog(LOG_WARNING,
234 				"Received packet from untrusted pid:%u",
235 				addr.nl_pid);
236 			continue;
237 		}
238 
239 		incoming_msg = (struct nlmsghdr *)vss_recv_buffer;
240 
241 		if (incoming_msg->nlmsg_type != NLMSG_DONE)
242 			continue;
243 
244 		incoming_cn_msg = (struct cn_msg *)NLMSG_DATA(incoming_msg);
245 		vss_msg = (struct hv_vss_msg *)incoming_cn_msg->data;
246 		op = vss_msg->vss_hdr.operation;
247 		error =  HV_S_OK;
248 
249 		switch (op) {
250 		case VSS_OP_FREEZE:
251 		case VSS_OP_THAW:
252 			error = vss_operate(op);
253 			if (error)
254 				error = HV_E_FAIL;
255 			break;
256 		default:
257 			syslog(LOG_ERR, "Illegal op:%d\n", op);
258 		}
259 		vss_msg->error = error;
260 		len = netlink_send(fd, incoming_cn_msg);
261 		if (len < 0) {
262 			syslog(LOG_ERR, "net_link send failed; error:%d %s",
263 					errno, strerror(errno));
264 			exit(EXIT_FAILURE);
265 		}
266 	}
267 
268 }
269