2 * An implementation of key value pair (KVP) functionality for Linux.
5 * Copyright (C) 2010, Novell, Inc.
6 * Author : K. Y. Srinivasan <ksrinivasan@novell.com>
8 * This program is free software; you can redistribute it and/or modify it
9 * under the terms of the GNU General Public License version 2 as published
10 * by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, GOOD TITLE or
15 * NON INFRINGEMENT. See the GNU General Public License for more
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
25 #include <sys/types.h>
26 #include <sys/socket.h>
28 #include <sys/utsname.h>
29 #include <linux/types.h>
35 #include <arpa/inet.h>
36 #include <linux/connector.h>
37 #include <linux/netlink.h>
44 * The following definitions are shared with the in-kernel component; do not
45 * change any of this without making the corresponding changes in
46 * the KVP kernel component.
50 * KVP protocol: The user mode component first registers with the
51 * the kernel component. Subsequently, the kernel component requests, data
52 * for the specified keys. In response to this message the user mode component
53 * fills in the value corresponding to the specified key. We overload the
54 * sequence field in the cn_msg header to define our KVP message types.
56 * We use this infrastructure for also supporting queries from user mode
57 * application for state that may be maintained in the KVP kernel component.
59 * XXXKYS: Have a shared header file between the user and kernel (TODO)
63 KVP_REGISTER = 0, /* Register the user mode component*/
64 KVP_KERNEL_GET, /*Kernel is requesting the value for the specified key*/
65 KVP_KERNEL_SET, /*Kernel is providing the value for the specified key*/
66 KVP_USER_GET, /*User is requesting the value for the specified key*/
67 KVP_USER_SET /*User is providing the value for the specified key*/
70 #define HV_KVP_EXCHANGE_MAX_KEY_SIZE 512
71 #define HV_KVP_EXCHANGE_MAX_VALUE_SIZE 2048
75 __u8 kvp_key[HV_KVP_EXCHANGE_MAX_KEY_SIZE]; /* Key name */
76 __u8 kvp_value[HV_KVP_EXCHANGE_MAX_VALUE_SIZE]; /* Key value */
80 FullyQualifiedDomainName = 0,
81 IntegrationServicesVersion, /*This key is serviced in the kernel*/
93 * End of shared definitions.
96 static char kvp_send_buffer[4096];
97 static char kvp_recv_buffer[4096];
98 static struct sockaddr_nl addr;
100 static char *os_name = "";
101 static char *os_major = "";
102 static char *os_minor = "";
103 static char *processor_arch;
104 static char *os_build;
105 static char *lic_version;
106 static struct utsname uts_buf;
108 void kvp_get_os_info(void)
114 os_build = uts_buf.release;
115 processor_arch = uts_buf.machine;
118 * The current windows host (win7) expects the build
119 * string to be of the form: x.y.z
120 * Strip additional information we may have.
122 p = strchr(os_build, '-');
126 file = fopen("/etc/SuSE-release", "r");
128 goto kvp_osinfo_found;
129 file = fopen("/etc/redhat-release", "r");
131 goto kvp_osinfo_found;
133 * Add code for other supported platforms.
137 * We don't have information about the os.
139 os_name = uts_buf.sysname;
143 /* up to three lines */
144 p = fgets(buf, sizeof(buf), file);
146 p = strchr(buf, '\n');
155 p = fgets(buf, sizeof(buf), file);
157 p = strchr(buf, '\n');
166 p = fgets(buf, sizeof(buf), file);
168 p = strchr(buf, '\n');
184 kvp_get_ip_address(int family, char *buffer, int length)
186 struct ifaddrs *ifap;
187 struct ifaddrs *curp;
188 int ipv4_len = strlen("255.255.255.255") + 1;
189 int ipv6_len = strlen("ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff")+1;
196 * On entry into this function, the buffer is capable of holding the
197 * maximum key value (2048 bytes).
200 if (getifaddrs(&ifap)) {
201 strcpy(buffer, "getifaddrs failed\n");
206 while (curp != NULL) {
207 if ((curp->ifa_addr != NULL) &&
208 (curp->ifa_addr->sa_family == family)) {
209 if (family == AF_INET) {
210 struct sockaddr_in *addr =
211 (struct sockaddr_in *) curp->ifa_addr;
213 str = inet_ntop(family, &addr->sin_addr,
216 strcpy(buffer, "inet_ntop failed\n");
226 offset += strlen(str) + 1;
227 if ((length - offset) < (ipv4_len + 1))
233 * We only support AF_INET and AF_INET6
234 * and the list of addresses is separated by a ";".
236 struct sockaddr_in6 *addr =
237 (struct sockaddr_in6 *) curp->ifa_addr;
239 str = inet_ntop(family,
240 &addr->sin6_addr.s6_addr,
243 strcpy(buffer, "inet_ntop failed\n");
252 offset += strlen(str) + 1;
253 if ((length - offset) < (ipv6_len + 1))
259 curp = curp->ifa_next;
269 kvp_get_domain_name(char *buffer, int length)
271 struct addrinfo hints, *info ;
274 gethostname(buffer, length);
275 memset(&hints, 0, sizeof(hints));
276 hints.ai_family = AF_INET; /*Get only ipv4 addrinfo. */
277 hints.ai_socktype = SOCK_STREAM;
278 hints.ai_flags = AI_CANONNAME;
280 error = getaddrinfo(buffer, NULL, &hints, &info);
282 strcpy(buffer, "getaddrinfo failed\n");
285 strcpy(buffer, info->ai_canonname);
291 netlink_send(int fd, struct cn_msg *msg)
293 struct nlmsghdr *nlh;
295 struct msghdr message;
299 size = NLMSG_SPACE(sizeof(struct cn_msg) + msg->len);
301 nlh = (struct nlmsghdr *)buffer;
303 nlh->nlmsg_pid = getpid();
304 nlh->nlmsg_type = NLMSG_DONE;
305 nlh->nlmsg_len = NLMSG_LENGTH(size - sizeof(*nlh));
306 nlh->nlmsg_flags = 0;
308 iov[0].iov_base = nlh;
309 iov[0].iov_len = sizeof(*nlh);
311 iov[1].iov_base = msg;
312 iov[1].iov_len = size;
314 memset(&message, 0, sizeof(message));
315 message.msg_name = &addr;
316 message.msg_namelen = sizeof(addr);
317 message.msg_iov = iov;
318 message.msg_iovlen = 2;
320 return sendmsg(fd, &message, 0);
325 int fd, len, sock_opt;
327 struct cn_msg *message;
329 struct nlmsghdr *incoming_msg;
330 struct cn_msg *incoming_cn_msg;
331 struct hv_ku_msg *hv_msg;
337 openlog("KVP", 0, LOG_USER);
338 syslog(LOG_INFO, "KVP starting; pid is:%d", getpid());
340 * Retrieve OS release information.
344 fd = socket(AF_NETLINK, SOCK_DGRAM, NETLINK_CONNECTOR);
346 syslog(LOG_ERR, "netlink socket creation failed; error:%d", fd);
349 addr.nl_family = AF_NETLINK;
352 addr.nl_groups = CN_KVP_IDX;
355 error = bind(fd, (struct sockaddr *)&addr, sizeof(addr));
357 syslog(LOG_ERR, "bind failed; error:%d", error);
361 sock_opt = addr.nl_groups;
362 setsockopt(fd, 270, 1, &sock_opt, sizeof(sock_opt));
364 * Register ourselves with the kernel.
366 message = (struct cn_msg *)kvp_send_buffer;
367 message->id.idx = CN_KVP_IDX;
368 message->id.val = CN_KVP_VAL;
369 message->seq = KVP_REGISTER;
373 len = netlink_send(fd, message);
375 syslog(LOG_ERR, "netlink_send failed; error:%d", len);
387 len = recv(fd, kvp_recv_buffer, sizeof(kvp_recv_buffer), 0);
390 syslog(LOG_ERR, "recv failed; error:%d", len);
395 incoming_msg = (struct nlmsghdr *)kvp_recv_buffer;
396 incoming_cn_msg = (struct cn_msg *)NLMSG_DATA(incoming_msg);
398 switch (incoming_cn_msg->seq) {
401 * Driver is registering with us; stash away the version
404 p = (char *)incoming_cn_msg->data;
405 lic_version = malloc(strlen(p) + 1);
407 strcpy(lic_version, p);
408 syslog(LOG_INFO, "KVP LIC Version: %s",
411 syslog(LOG_ERR, "malloc failed");
421 hv_msg = (struct hv_ku_msg *)incoming_cn_msg->data;
422 key_name = (char *)hv_msg->kvp_key;
423 key_value = (char *)hv_msg->kvp_value;
425 switch (hv_msg->kvp_index) {
426 case FullyQualifiedDomainName:
427 kvp_get_domain_name(key_value,
428 HV_KVP_EXCHANGE_MAX_VALUE_SIZE);
429 strcpy(key_name, "FullyQualifiedDomainName");
431 case IntegrationServicesVersion:
432 strcpy(key_name, "IntegrationServicesVersion");
433 strcpy(key_value, lic_version);
435 case NetworkAddressIPv4:
436 kvp_get_ip_address(AF_INET, key_value,
437 HV_KVP_EXCHANGE_MAX_VALUE_SIZE);
438 strcpy(key_name, "NetworkAddressIPv4");
440 case NetworkAddressIPv6:
441 kvp_get_ip_address(AF_INET6, key_value,
442 HV_KVP_EXCHANGE_MAX_VALUE_SIZE);
443 strcpy(key_name, "NetworkAddressIPv6");
446 strcpy(key_value, os_build);
447 strcpy(key_name, "OSBuildNumber");
450 strcpy(key_value, os_name);
451 strcpy(key_name, "OSName");
454 strcpy(key_value, os_major);
455 strcpy(key_name, "OSMajorVersion");
458 strcpy(key_value, os_minor);
459 strcpy(key_name, "OSMinorVersion");
462 strcpy(key_value, os_build);
463 strcpy(key_name, "OSVersion");
465 case ProcessorArchitecture:
466 strcpy(key_value, processor_arch);
467 strcpy(key_name, "ProcessorArchitecture");
470 strcpy(key_value, "Unknown Key");
472 * We use a null key name to terminate enumeration.
474 strcpy(key_name, "");
478 * Send the value back to the kernel. The response is
479 * already in the receive buffer. Update the cn_msg header to
480 * reflect the key value that has been added to the message
483 incoming_cn_msg->id.idx = CN_KVP_IDX;
484 incoming_cn_msg->id.val = CN_KVP_VAL;
485 incoming_cn_msg->seq = KVP_USER_SET;
486 incoming_cn_msg->ack = 0;
487 incoming_cn_msg->len = sizeof(struct hv_ku_msg);
489 len = netlink_send(fd, incoming_cn_msg);
491 syslog(LOG_ERR, "net_link send failed; error:%d", len);