]>
Commit | Line | Data |
---|---|---|
cc04acf5 KS |
1 | /* |
2 | * An implementation of key value pair (KVP) functionality for Linux. | |
3 | * | |
4 | * | |
5 | * Copyright (C) 2010, Novell, Inc. | |
6 | * Author : K. Y. Srinivasan <ksrinivasan@novell.com> | |
7 | * | |
8 | * This program is free software; you can redistribute it and/or modify it | |
9 | * under the terms of the GNU General Public License version 2 as published | |
10 | * by the Free Software Foundation. | |
11 | * | |
12 | * This program is distributed in the hope that it will be useful, but | |
13 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
14 | * MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, GOOD TITLE or | |
15 | * NON INFRINGEMENT. See the GNU General Public License for more | |
16 | * details. | |
17 | * | |
18 | * You should have received a copy of the GNU General Public License | |
19 | * along with this program; if not, write to the Free Software | |
20 | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. | |
21 | * | |
22 | */ | |
23 | ||
24 | ||
25 | #include <sys/types.h> | |
26 | #include <sys/socket.h> | |
27 | #include <sys/poll.h> | |
28 | #include <sys/utsname.h> | |
29 | #include <linux/types.h> | |
30 | #include <stdio.h> | |
31 | #include <stdlib.h> | |
32 | #include <unistd.h> | |
33 | #include <string.h> | |
34 | #include <errno.h> | |
35 | #include <arpa/inet.h> | |
36 | #include <linux/connector.h> | |
37 | #include <linux/netlink.h> | |
cc04acf5 KS |
38 | #include <ifaddrs.h> |
39 | #include <netdb.h> | |
40 | #include <syslog.h> | |
41 | ||
42 | /* | |
43 | * KYS: TODO. Need to register these in the kernel. | |
44 | * | |
45 | * The following definitions are shared with the in-kernel component; do not | |
46 | * change any of this without making the corresponding changes in | |
47 | * the KVP kernel component. | |
48 | */ | |
49 | #define CN_KVP_IDX 0x9 /* MSFT KVP functionality */ | |
50 | #define CN_KVP_VAL 0x1 /* This supports queries from the kernel */ | |
51 | #define CN_KVP_USER_VAL 0x2 /* This supports queries from the user */ | |
52 | ||
53 | /* | |
54 | * KVP protocol: The user mode component first registers with the | |
55 | * the kernel component. Subsequently, the kernel component requests, data | |
56 | * for the specified keys. In response to this message the user mode component | |
57 | * fills in the value corresponding to the specified key. We overload the | |
58 | * sequence field in the cn_msg header to define our KVP message types. | |
59 | * | |
60 | * We use this infrastructure for also supporting queries from user mode | |
61 | * application for state that may be maintained in the KVP kernel component. | |
62 | * | |
63 | * XXXKYS: Have a shared header file between the user and kernel (TODO) | |
64 | */ | |
65 | ||
66 | enum kvp_op { | |
67 | KVP_REGISTER = 0, /* Register the user mode component*/ | |
68 | KVP_KERNEL_GET, /*Kernel is requesting the value for the specified key*/ | |
69 | KVP_KERNEL_SET, /*Kernel is providing the value for the specified key*/ | |
70 | KVP_USER_GET, /*User is requesting the value for the specified key*/ | |
71 | KVP_USER_SET /*User is providing the value for the specified key*/ | |
72 | }; | |
73 | ||
74 | #define HV_KVP_EXCHANGE_MAX_KEY_SIZE 512 | |
75 | #define HV_KVP_EXCHANGE_MAX_VALUE_SIZE 2048 | |
76 | ||
77 | struct hv_ku_msg { | |
78 | __u32 kvp_index; | |
79 | __u8 kvp_key[HV_KVP_EXCHANGE_MAX_KEY_SIZE]; /* Key name */ | |
80 | __u8 kvp_value[HV_KVP_EXCHANGE_MAX_VALUE_SIZE]; /* Key value */ | |
81 | }; | |
82 | ||
83 | enum key_index { | |
84 | FullyQualifiedDomainName = 0, | |
85 | IntegrationServicesVersion, /*This key is serviced in the kernel*/ | |
86 | NetworkAddressIPv4, | |
87 | NetworkAddressIPv6, | |
88 | OSBuildNumber, | |
89 | OSName, | |
90 | OSMajorVersion, | |
91 | OSMinorVersion, | |
92 | OSVersion, | |
93 | ProcessorArchitecture | |
94 | }; | |
95 | ||
96 | /* | |
97 | * End of shared definitions. | |
98 | */ | |
99 | ||
100 | static char kvp_send_buffer[4096]; | |
101 | static char kvp_recv_buffer[4096]; | |
102 | static struct sockaddr_nl addr; | |
103 | ||
7989f7d5 OH |
104 | static char *os_name = ""; |
105 | static char *os_major = ""; | |
106 | static char *os_minor = ""; | |
107 | static char *processor_arch; | |
108 | static char *os_build; | |
cc04acf5 | 109 | static char *lic_version; |
7989f7d5 | 110 | static struct utsname uts_buf; |
cc04acf5 KS |
111 | |
112 | void kvp_get_os_info(void) | |
113 | { | |
114 | FILE *file; | |
7989f7d5 | 115 | char *p, buf[512]; |
cc04acf5 | 116 | |
7989f7d5 OH |
117 | uname(&uts_buf); |
118 | os_build = uts_buf.release; | |
064931d0 | 119 | processor_arch = uts_buf.machine; |
cc04acf5 | 120 | |
e54bbc64 S |
121 | /* |
122 | * The current windows host (win7) expects the build | |
123 | * string to be of the form: x.y.z | |
124 | * Strip additional information we may have. | |
125 | */ | |
126 | p = strchr(os_build, '-'); | |
127 | if (p) | |
128 | *p = '\0'; | |
129 | ||
cc04acf5 KS |
130 | file = fopen("/etc/SuSE-release", "r"); |
131 | if (file != NULL) | |
132 | goto kvp_osinfo_found; | |
133 | file = fopen("/etc/redhat-release", "r"); | |
134 | if (file != NULL) | |
135 | goto kvp_osinfo_found; | |
136 | /* | |
137 | * Add code for other supported platforms. | |
138 | */ | |
139 | ||
140 | /* | |
141 | * We don't have information about the os. | |
142 | */ | |
7989f7d5 | 143 | os_name = uts_buf.sysname; |
cc04acf5 KS |
144 | return; |
145 | ||
146 | kvp_osinfo_found: | |
7989f7d5 OH |
147 | /* up to three lines */ |
148 | p = fgets(buf, sizeof(buf), file); | |
149 | if (p) { | |
150 | p = strchr(buf, '\n'); | |
151 | if (p) | |
152 | *p = '\0'; | |
153 | p = strdup(buf); | |
154 | if (!p) | |
155 | goto done; | |
156 | os_name = p; | |
157 | ||
158 | /* second line */ | |
159 | p = fgets(buf, sizeof(buf), file); | |
160 | if (p) { | |
161 | p = strchr(buf, '\n'); | |
162 | if (p) | |
163 | *p = '\0'; | |
164 | p = strdup(buf); | |
165 | if (!p) | |
166 | goto done; | |
167 | os_major = p; | |
168 | ||
169 | /* third line */ | |
170 | p = fgets(buf, sizeof(buf), file); | |
171 | if (p) { | |
172 | p = strchr(buf, '\n'); | |
173 | if (p) | |
174 | *p = '\0'; | |
175 | p = strdup(buf); | |
176 | if (p) | |
177 | os_minor = p; | |
178 | } | |
179 | } | |
180 | } | |
181 | ||
182 | done: | |
cc04acf5 KS |
183 | fclose(file); |
184 | return; | |
185 | } | |
186 | ||
187 | static int | |
188 | kvp_get_ip_address(int family, char *buffer, int length) | |
189 | { | |
190 | struct ifaddrs *ifap; | |
191 | struct ifaddrs *curp; | |
192 | int ipv4_len = strlen("255.255.255.255") + 1; | |
193 | int ipv6_len = strlen("ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff")+1; | |
194 | int offset = 0; | |
195 | const char *str; | |
196 | char tmp[50]; | |
197 | int error = 0; | |
198 | ||
199 | /* | |
200 | * On entry into this function, the buffer is capable of holding the | |
201 | * maximum key value (2048 bytes). | |
202 | */ | |
203 | ||
204 | if (getifaddrs(&ifap)) { | |
205 | strcpy(buffer, "getifaddrs failed\n"); | |
206 | return 1; | |
207 | } | |
208 | ||
209 | curp = ifap; | |
210 | while (curp != NULL) { | |
211 | if ((curp->ifa_addr != NULL) && | |
212 | (curp->ifa_addr->sa_family == family)) { | |
213 | if (family == AF_INET) { | |
214 | struct sockaddr_in *addr = | |
215 | (struct sockaddr_in *) curp->ifa_addr; | |
216 | ||
217 | str = inet_ntop(family, &addr->sin_addr, | |
218 | tmp, 50); | |
219 | if (str == NULL) { | |
220 | strcpy(buffer, "inet_ntop failed\n"); | |
221 | error = 1; | |
222 | goto getaddr_done; | |
223 | } | |
224 | if (offset == 0) | |
225 | strcpy(buffer, tmp); | |
226 | else | |
227 | strcat(buffer, tmp); | |
228 | strcat(buffer, ";"); | |
229 | ||
230 | offset += strlen(str) + 1; | |
231 | if ((length - offset) < (ipv4_len + 1)) | |
232 | goto getaddr_done; | |
233 | ||
234 | } else { | |
235 | ||
236 | /* | |
237 | * We only support AF_INET and AF_INET6 | |
25985edc | 238 | * and the list of addresses is separated by a ";". |
cc04acf5 KS |
239 | */ |
240 | struct sockaddr_in6 *addr = | |
241 | (struct sockaddr_in6 *) curp->ifa_addr; | |
242 | ||
243 | str = inet_ntop(family, | |
244 | &addr->sin6_addr.s6_addr, | |
245 | tmp, 50); | |
246 | if (str == NULL) { | |
247 | strcpy(buffer, "inet_ntop failed\n"); | |
248 | error = 1; | |
249 | goto getaddr_done; | |
250 | } | |
251 | if (offset == 0) | |
252 | strcpy(buffer, tmp); | |
253 | else | |
254 | strcat(buffer, tmp); | |
255 | strcat(buffer, ";"); | |
256 | offset += strlen(str) + 1; | |
257 | if ((length - offset) < (ipv6_len + 1)) | |
258 | goto getaddr_done; | |
259 | ||
260 | } | |
261 | ||
262 | } | |
263 | curp = curp->ifa_next; | |
264 | } | |
265 | ||
266 | getaddr_done: | |
267 | freeifaddrs(ifap); | |
268 | return error; | |
269 | } | |
270 | ||
271 | ||
272 | static int | |
273 | kvp_get_domain_name(char *buffer, int length) | |
274 | { | |
275 | struct addrinfo hints, *info ; | |
cc04acf5 KS |
276 | int error = 0; |
277 | ||
5be528c2 | 278 | gethostname(buffer, length); |
cc04acf5 KS |
279 | memset(&hints, 0, sizeof(hints)); |
280 | hints.ai_family = AF_INET; /*Get only ipv4 addrinfo. */ | |
281 | hints.ai_socktype = SOCK_STREAM; | |
282 | hints.ai_flags = AI_CANONNAME; | |
283 | ||
5be528c2 | 284 | error = getaddrinfo(buffer, NULL, &hints, &info); |
cc04acf5 KS |
285 | if (error != 0) { |
286 | strcpy(buffer, "getaddrinfo failed\n"); | |
5be528c2 | 287 | return error; |
cc04acf5 KS |
288 | } |
289 | strcpy(buffer, info->ai_canonname); | |
cc04acf5 KS |
290 | freeaddrinfo(info); |
291 | return error; | |
292 | } | |
293 | ||
294 | static int | |
295 | netlink_send(int fd, struct cn_msg *msg) | |
296 | { | |
297 | struct nlmsghdr *nlh; | |
298 | unsigned int size; | |
299 | struct msghdr message; | |
300 | char buffer[64]; | |
301 | struct iovec iov[2]; | |
302 | ||
303 | size = NLMSG_SPACE(sizeof(struct cn_msg) + msg->len); | |
304 | ||
305 | nlh = (struct nlmsghdr *)buffer; | |
306 | nlh->nlmsg_seq = 0; | |
307 | nlh->nlmsg_pid = getpid(); | |
308 | nlh->nlmsg_type = NLMSG_DONE; | |
309 | nlh->nlmsg_len = NLMSG_LENGTH(size - sizeof(*nlh)); | |
310 | nlh->nlmsg_flags = 0; | |
311 | ||
312 | iov[0].iov_base = nlh; | |
313 | iov[0].iov_len = sizeof(*nlh); | |
314 | ||
315 | iov[1].iov_base = msg; | |
316 | iov[1].iov_len = size; | |
317 | ||
318 | memset(&message, 0, sizeof(message)); | |
319 | message.msg_name = &addr; | |
320 | message.msg_namelen = sizeof(addr); | |
321 | message.msg_iov = iov; | |
322 | message.msg_iovlen = 2; | |
323 | ||
324 | return sendmsg(fd, &message, 0); | |
325 | } | |
326 | ||
7989f7d5 | 327 | int main(void) |
cc04acf5 KS |
328 | { |
329 | int fd, len, sock_opt; | |
330 | int error; | |
331 | struct cn_msg *message; | |
332 | struct pollfd pfd; | |
333 | struct nlmsghdr *incoming_msg; | |
334 | struct cn_msg *incoming_cn_msg; | |
7989f7d5 OH |
335 | struct hv_ku_msg *hv_msg; |
336 | char *p; | |
cc04acf5 KS |
337 | char *key_value; |
338 | char *key_name; | |
cc04acf5 KS |
339 | |
340 | daemon(1, 0); | |
341 | openlog("KVP", 0, LOG_USER); | |
342 | syslog(LOG_INFO, "KVP starting; pid is:%d", getpid()); | |
343 | /* | |
344 | * Retrieve OS release information. | |
345 | */ | |
346 | kvp_get_os_info(); | |
347 | ||
348 | fd = socket(AF_NETLINK, SOCK_DGRAM, NETLINK_CONNECTOR); | |
349 | if (fd < 0) { | |
350 | syslog(LOG_ERR, "netlink socket creation failed; error:%d", fd); | |
351 | exit(-1); | |
352 | } | |
353 | addr.nl_family = AF_NETLINK; | |
354 | addr.nl_pad = 0; | |
355 | addr.nl_pid = 0; | |
356 | addr.nl_groups = CN_KVP_IDX; | |
357 | ||
358 | ||
359 | error = bind(fd, (struct sockaddr *)&addr, sizeof(addr)); | |
360 | if (error < 0) { | |
361 | syslog(LOG_ERR, "bind failed; error:%d", error); | |
362 | close(fd); | |
363 | exit(-1); | |
364 | } | |
365 | sock_opt = addr.nl_groups; | |
366 | setsockopt(fd, 270, 1, &sock_opt, sizeof(sock_opt)); | |
367 | /* | |
368 | * Register ourselves with the kernel. | |
369 | */ | |
370 | message = (struct cn_msg *)kvp_send_buffer; | |
371 | message->id.idx = CN_KVP_IDX; | |
372 | message->id.val = CN_KVP_VAL; | |
373 | message->seq = KVP_REGISTER; | |
374 | message->ack = 0; | |
375 | message->len = 0; | |
376 | ||
377 | len = netlink_send(fd, message); | |
378 | if (len < 0) { | |
379 | syslog(LOG_ERR, "netlink_send failed; error:%d", len); | |
380 | close(fd); | |
381 | exit(-1); | |
382 | } | |
383 | ||
384 | pfd.fd = fd; | |
385 | ||
386 | while (1) { | |
387 | pfd.events = POLLIN; | |
388 | pfd.revents = 0; | |
389 | poll(&pfd, 1, -1); | |
390 | ||
391 | len = recv(fd, kvp_recv_buffer, sizeof(kvp_recv_buffer), 0); | |
392 | ||
393 | if (len < 0) { | |
394 | syslog(LOG_ERR, "recv failed; error:%d", len); | |
395 | close(fd); | |
396 | return -1; | |
397 | } | |
398 | ||
399 | incoming_msg = (struct nlmsghdr *)kvp_recv_buffer; | |
400 | incoming_cn_msg = (struct cn_msg *)NLMSG_DATA(incoming_msg); | |
401 | ||
402 | switch (incoming_cn_msg->seq) { | |
403 | case KVP_REGISTER: | |
404 | /* | |
405 | * Driver is registering with us; stash away the version | |
406 | * information. | |
407 | */ | |
7989f7d5 OH |
408 | p = (char *)incoming_cn_msg->data; |
409 | lic_version = malloc(strlen(p) + 1); | |
cc04acf5 | 410 | if (lic_version) { |
7989f7d5 | 411 | strcpy(lic_version, p); |
cc04acf5 KS |
412 | syslog(LOG_INFO, "KVP LIC Version: %s", |
413 | lic_version); | |
414 | } else { | |
415 | syslog(LOG_ERR, "malloc failed"); | |
416 | } | |
417 | continue; | |
418 | ||
419 | case KVP_KERNEL_GET: | |
420 | break; | |
421 | default: | |
422 | continue; | |
423 | } | |
424 | ||
7989f7d5 OH |
425 | hv_msg = (struct hv_ku_msg *)incoming_cn_msg->data; |
426 | key_name = (char *)hv_msg->kvp_key; | |
427 | key_value = (char *)hv_msg->kvp_value; | |
cc04acf5 | 428 | |
7989f7d5 | 429 | switch (hv_msg->kvp_index) { |
cc04acf5 KS |
430 | case FullyQualifiedDomainName: |
431 | kvp_get_domain_name(key_value, | |
432 | HV_KVP_EXCHANGE_MAX_VALUE_SIZE); | |
433 | strcpy(key_name, "FullyQualifiedDomainName"); | |
434 | break; | |
435 | case IntegrationServicesVersion: | |
436 | strcpy(key_name, "IntegrationServicesVersion"); | |
437 | strcpy(key_value, lic_version); | |
438 | break; | |
439 | case NetworkAddressIPv4: | |
440 | kvp_get_ip_address(AF_INET, key_value, | |
441 | HV_KVP_EXCHANGE_MAX_VALUE_SIZE); | |
442 | strcpy(key_name, "NetworkAddressIPv4"); | |
443 | break; | |
444 | case NetworkAddressIPv6: | |
445 | kvp_get_ip_address(AF_INET6, key_value, | |
446 | HV_KVP_EXCHANGE_MAX_VALUE_SIZE); | |
447 | strcpy(key_name, "NetworkAddressIPv6"); | |
448 | break; | |
449 | case OSBuildNumber: | |
450 | strcpy(key_value, os_build); | |
451 | strcpy(key_name, "OSBuildNumber"); | |
452 | break; | |
453 | case OSName: | |
454 | strcpy(key_value, os_name); | |
455 | strcpy(key_name, "OSName"); | |
456 | break; | |
457 | case OSMajorVersion: | |
458 | strcpy(key_value, os_major); | |
459 | strcpy(key_name, "OSMajorVersion"); | |
460 | break; | |
461 | case OSMinorVersion: | |
462 | strcpy(key_value, os_minor); | |
463 | strcpy(key_name, "OSMinorVersion"); | |
464 | break; | |
465 | case OSVersion: | |
466 | strcpy(key_value, os_build); | |
467 | strcpy(key_name, "OSVersion"); | |
468 | break; | |
469 | case ProcessorArchitecture: | |
470 | strcpy(key_value, processor_arch); | |
471 | strcpy(key_name, "ProcessorArchitecture"); | |
472 | break; | |
473 | default: | |
474 | strcpy(key_value, "Unknown Key"); | |
475 | /* | |
476 | * We use a null key name to terminate enumeration. | |
477 | */ | |
478 | strcpy(key_name, ""); | |
479 | break; | |
480 | } | |
481 | /* | |
482 | * Send the value back to the kernel. The response is | |
483 | * already in the receive buffer. Update the cn_msg header to | |
484 | * reflect the key value that has been added to the message | |
485 | */ | |
486 | ||
487 | incoming_cn_msg->id.idx = CN_KVP_IDX; | |
488 | incoming_cn_msg->id.val = CN_KVP_VAL; | |
489 | incoming_cn_msg->seq = KVP_USER_SET; | |
490 | incoming_cn_msg->ack = 0; | |
491 | incoming_cn_msg->len = sizeof(struct hv_ku_msg); | |
492 | ||
493 | len = netlink_send(fd, incoming_cn_msg); | |
494 | if (len < 0) { | |
495 | syslog(LOG_ERR, "net_link send failed; error:%d", len); | |
496 | exit(-1); | |
497 | } | |
498 | } | |
499 | ||
500 | } |