2 * An implementation of the host initiated guest snapshot for Hyper-V.
5 * Copyright (C) 2013, Microsoft, Inc.
6 * Author : K. Y. Srinivasan <kys@microsoft.com>
8 * This program is free software; you can redistribute it and/or modify it
9 * under the terms of the GNU General Public License version 2 as published
10 * by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, GOOD TITLE or
15 * NON INFRINGEMENT. See the GNU General Public License for more
21 #include <sys/types.h>
22 #include <sys/socket.h>
24 #include <sys/ioctl.h>
33 #include <arpa/inet.h>
35 #include <linux/connector.h>
36 #include <linux/hyperv.h>
37 #include <linux/netlink.h>
41 static struct sockaddr_nl addr;
44 #define SOL_NETLINK 270
48 /* Don't use syslog() in the function since that can cause write to disk */
49 static int vss_do_freeze(char *dir, unsigned int cmd)
51 int ret, fd = open(dir, O_RDONLY);
56 ret = ioctl(fd, cmd, 0);
59 * If a partition is mounted more than once, only the first
60 * FREEZE/THAW can succeed and the later ones will get
61 * EBUSY/EINVAL respectively: there could be 2 cases:
62 * 1) a user may mount the same partition to differnt directories
63 * by mistake or on purpose;
64 * 2) The subvolume of btrfs appears to have the same partition
65 * mounted more than once.
68 if ((cmd == FIFREEZE && errno == EBUSY) ||
69 (cmd == FITHAW && errno == EINVAL)) {
79 static int vss_operate(int operation)
81 char match[] = "/dev/";
84 char errdir[1024] = {0};
86 int error = 0, root_seen = 0, save_errno = 0;
99 mounts = setmntent("/proc/mounts", "r");
103 while ((ent = getmntent(mounts))) {
104 if (strncmp(ent->mnt_fsname, match, strlen(match)))
106 if (hasmntopt(ent, MNTOPT_RO) != NULL)
108 if (strcmp(ent->mnt_type, "vfat") == 0)
110 if (strcmp(ent->mnt_dir, "/") == 0) {
114 error |= vss_do_freeze(ent->mnt_dir, cmd);
115 if (error && operation == VSS_OP_FREEZE)
122 error |= vss_do_freeze("/", cmd);
123 if (error && operation == VSS_OP_FREEZE)
131 strncpy(errdir, ent->mnt_dir, sizeof(errdir)-1);
134 vss_operate(VSS_OP_THAW);
135 /* Call syslog after we thaw all filesystems */
137 syslog(LOG_ERR, "FREEZE of %s failed; error:%d %s",
138 errdir, save_errno, strerror(save_errno));
140 syslog(LOG_ERR, "FREEZE of / failed; error:%d %s", save_errno,
141 strerror(save_errno));
146 static int netlink_send(int fd, struct cn_msg *msg)
148 struct nlmsghdr nlh = { .nlmsg_type = NLMSG_DONE };
150 struct msghdr message;
153 size = sizeof(struct cn_msg) + msg->len;
155 nlh.nlmsg_pid = getpid();
156 nlh.nlmsg_len = NLMSG_LENGTH(size);
158 iov[0].iov_base = &nlh;
159 iov[0].iov_len = sizeof(nlh);
161 iov[1].iov_base = msg;
162 iov[1].iov_len = size;
164 memset(&message, 0, sizeof(message));
165 message.msg_name = &addr;
166 message.msg_namelen = sizeof(addr);
167 message.msg_iov = iov;
168 message.msg_iovlen = 2;
170 return sendmsg(fd, &message, 0);
173 void print_usage(char *argv[])
175 fprintf(stderr, "Usage: %s [options]\n"
177 " -n, --no-daemon stay in foreground, don't daemonize\n"
178 " -h, --help print this help\n", argv[0]);
181 int main(int argc, char *argv[])
183 int fd, len, nl_group;
185 struct cn_msg *message;
187 struct nlmsghdr *incoming_msg;
188 struct cn_msg *incoming_cn_msg;
190 struct hv_vss_msg *vss_msg;
191 char *vss_recv_buffer;
192 size_t vss_recv_buffer_len;
193 int daemonize = 1, long_index = 0, opt;
195 static struct option long_options[] = {
196 {"help", no_argument, 0, 'h' },
197 {"no-daemon", no_argument, 0, 'n' },
201 while ((opt = getopt_long(argc, argv, "hn", long_options,
202 &long_index)) != -1) {
214 if (daemonize && daemon(1, 0))
217 openlog("Hyper-V VSS", 0, LOG_USER);
218 syslog(LOG_INFO, "VSS starting; pid is:%d", getpid());
220 vss_recv_buffer_len = NLMSG_LENGTH(0) + sizeof(struct cn_msg) + sizeof(struct hv_vss_msg);
221 vss_recv_buffer = calloc(1, vss_recv_buffer_len);
222 if (!vss_recv_buffer) {
223 syslog(LOG_ERR, "Failed to allocate netlink buffers");
227 fd = socket(AF_NETLINK, SOCK_DGRAM, NETLINK_CONNECTOR);
229 syslog(LOG_ERR, "netlink socket creation failed; error:%d %s",
230 errno, strerror(errno));
233 addr.nl_family = AF_NETLINK;
239 error = bind(fd, (struct sockaddr *)&addr, sizeof(addr));
241 syslog(LOG_ERR, "bind failed; error:%d %s", errno, strerror(errno));
245 nl_group = CN_VSS_IDX;
246 if (setsockopt(fd, SOL_NETLINK, NETLINK_ADD_MEMBERSHIP, &nl_group, sizeof(nl_group)) < 0) {
247 syslog(LOG_ERR, "setsockopt failed; error:%d %s", errno, strerror(errno));
252 * Register ourselves with the kernel.
254 message = (struct cn_msg *)vss_recv_buffer;
255 message->id.idx = CN_VSS_IDX;
256 message->id.val = CN_VSS_VAL;
258 vss_msg = (struct hv_vss_msg *)message->data;
259 vss_msg->vss_hdr.operation = VSS_OP_REGISTER;
261 message->len = sizeof(struct hv_vss_msg);
263 len = netlink_send(fd, message);
265 syslog(LOG_ERR, "netlink_send failed; error:%d %s", errno, strerror(errno));
273 struct sockaddr *addr_p = (struct sockaddr *) &addr;
274 socklen_t addr_l = sizeof(addr);
278 if (poll(&pfd, 1, -1) < 0) {
279 syslog(LOG_ERR, "poll failed; error:%d %s", errno, strerror(errno));
280 if (errno == EINVAL) {
288 len = recvfrom(fd, vss_recv_buffer, vss_recv_buffer_len, 0,
292 syslog(LOG_ERR, "recvfrom failed; pid:%u error:%d %s",
293 addr.nl_pid, errno, strerror(errno));
300 "Received packet from untrusted pid:%u",
305 incoming_msg = (struct nlmsghdr *)vss_recv_buffer;
307 if (incoming_msg->nlmsg_type != NLMSG_DONE)
310 incoming_cn_msg = (struct cn_msg *)NLMSG_DATA(incoming_msg);
311 vss_msg = (struct hv_vss_msg *)incoming_cn_msg->data;
312 op = vss_msg->vss_hdr.operation;
318 error = vss_operate(op);
319 syslog(LOG_INFO, "VSS: op=%s: %s\n",
320 op == VSS_OP_FREEZE ? "FREEZE" : "THAW",
321 error ? "failed" : "succeeded");
325 syslog(LOG_ERR, "op=%d failed!", op);
326 syslog(LOG_ERR, "report it with these files:");
327 syslog(LOG_ERR, "/etc/fstab and /proc/mounts");
331 syslog(LOG_ERR, "Illegal op:%d\n", op);
333 vss_msg->error = error;
334 len = netlink_send(fd, incoming_cn_msg);
336 syslog(LOG_ERR, "net_link send failed; error:%d %s",
337 errno, strerror(errno));