VirtualBox

source: vbox/trunk/src/VBox/Additions/linux/sharedfolders/utils.c@ 21040

Last change on this file since 21040 was 21014, checked in by vboxsync, 16 years ago

Linux shared folders: Linux 2.6.31 fixes

  • Property svn:eol-style set to native
  • Property svn:keywords set to Author Date Id Revision
File size: 23.9 KB
Line 
1/** @file
2 *
3 * vboxvfs -- VirtualBox Guest Additions for Linux:
4 * Utility functions.
5 * Mainly conversion from/to VirtualBox/Linux data structures
6 */
7
8/*
9 * Copyright (C) 2006-2007 Sun Microsystems, Inc.
10 *
11 * This file is part of VirtualBox Open Source Edition (OSE), as
12 * available from http://www.virtualbox.org. This file is free software;
13 * you can redistribute it and/or modify it under the terms of the GNU
14 * General Public License (GPL) as published by the Free Software
15 * Foundation, in version 2 as it comes in the "COPYING" file of the
16 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
17 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
18 *
19 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa
20 * Clara, CA 95054 USA or visit http://www.sun.com if you need
21 * additional information or have any questions.
22 */
23
24#include "vfsmod.h"
25#include <linux/nfs_fs.h>
26#include <linux/vfs.h>
27
28/* #define USE_VMALLOC */
29
30#if LINUX_VERSION_CODE >= KERNEL_VERSION (2, 6, 0)
31/*
32 * sf_reg_aops and sf_backing_dev_info are just quick implementations to make
33 * sendfile work. For more information have a look at
34 *
35 * http://us1.samba.org/samba/ftp/cifs-cvs/ols2006-fs-tutorial-smf.odp
36 *
37 * and the sample implementation
38 *
39 * http://pserver.samba.org/samba/ftp/cifs-cvs/samplefs.tar.gz
40 */
41
42static struct backing_dev_info sf_backing_dev_info = {
43 .ra_pages = 0, /* No readahead */
44# if LINUX_VERSION_CODE >= KERNEL_VERSION (2, 6, 12)
45 .capabilities = BDI_CAP_MAP_DIRECT /* MAP_SHARED */
46 | BDI_CAP_MAP_COPY /* MAP_PRIVATE */
47 | BDI_CAP_READ_MAP /* can be mapped for reading */
48 | BDI_CAP_WRITE_MAP /* can be mapped for writing */
49 | BDI_CAP_EXEC_MAP, /* can be mapped for execution */
50# endif
51};
52#endif /* LINUX_VERSION_CODE >= KERNEL_VERSION (2, 6, 0) */
53
54#if LINUX_VERSION_CODE < KERNEL_VERSION (2, 6, 0)
55static void
56sf_ftime_from_timespec (time_t *time, RTTIMESPEC *ts)
57{
58 int64_t t = RTTimeSpecGetNano (ts);
59
60 do_div (t, 1000000000);
61 *time = t;
62}
63
64static void
65sf_timespec_from_ftime (RTTIMESPEC *ts, time_t *time)
66{
67 int64_t t = 1000000000 * *time;
68 RTTimeSpecSetNano (ts, t);
69}
70#else /* >= 2.6.0 */
71static void
72sf_ftime_from_timespec (struct timespec *tv, RTTIMESPEC *ts)
73{
74 int64_t t = RTTimeSpecGetNano (ts);
75 int64_t nsec;
76
77 nsec = do_div (t, 1000000000);
78 tv->tv_sec = t;
79 tv->tv_nsec = nsec;
80}
81
82static void
83sf_timespec_from_ftime (RTTIMESPEC *ts, struct timespec *tv)
84{
85 int64_t t = (int64_t)tv->tv_nsec + (int64_t)tv->tv_sec * 1000000000;
86 RTTimeSpecSetNano (ts, t);
87}
88#endif /* >= 2.6.0 */
89
90/* set [inode] attributes based on [info], uid/gid based on [sf_g] */
91void
92sf_init_inode (struct sf_glob_info *sf_g, struct inode *inode,
93 RTFSOBJINFO *info)
94{
95 int is_dir;
96 RTFSOBJATTR *attr;
97 int mode;
98
99 TRACE ();
100
101 attr = &info->Attr;
102 is_dir = RTFS_IS_DIRECTORY (attr->fMode);
103
104#define mode_set(r) attr->fMode & (RTFS_UNIX_##r) ? (S_##r) : 0;
105 mode = mode_set (ISUID);
106 mode |= mode_set (ISGID);
107
108 mode |= mode_set (IRUSR);
109 mode |= mode_set (IWUSR);
110 mode |= mode_set (IXUSR);
111
112 mode |= mode_set (IRGRP);
113 mode |= mode_set (IWGRP);
114 mode |= mode_set (IXGRP);
115
116 mode |= mode_set (IROTH);
117 mode |= mode_set (IWOTH);
118 mode |= mode_set (IXOTH);
119#undef mode_set
120
121#if LINUX_VERSION_CODE >= KERNEL_VERSION (2, 6, 0)
122 inode->i_mapping->a_ops = &sf_reg_aops;
123 inode->i_mapping->backing_dev_info = &sf_backing_dev_info;
124#endif
125
126 if (is_dir) {
127 inode->i_mode = sf_g->dmode != ~0 ? (sf_g->dmode & 0777) : mode;
128 inode->i_mode &= ~sf_g->dmask;
129 inode->i_mode |= S_IFDIR;
130 inode->i_op = &sf_dir_iops;
131 inode->i_fop = &sf_dir_fops;
132 /* XXX: this probably should be set to the number of entries
133 in the directory plus two (. ..) */
134 inode->i_nlink = 1;
135 }
136 else {
137 inode->i_mode = sf_g->fmode != ~0 ? (sf_g->fmode & 0777): mode;
138 inode->i_mode &= ~sf_g->fmask;
139 inode->i_mode |= S_IFREG;
140 inode->i_op = &sf_reg_iops;
141 inode->i_fop = &sf_reg_fops;
142 inode->i_nlink = 1;
143 }
144
145 inode->i_uid = sf_g->uid;
146 inode->i_gid = sf_g->gid;
147 inode->i_size = info->cbObject;
148#if LINUX_VERSION_CODE < KERNEL_VERSION (2, 6, 19) && !defined(KERNEL_FC6)
149 inode->i_blksize = 4096;
150#endif
151#if LINUX_VERSION_CODE >= KERNEL_VERSION (2, 4, 11)
152 inode->i_blkbits = 12;
153#endif
154 inode->i_blocks = (info->cbObject + 4095) / 4096;
155
156 sf_ftime_from_timespec (&inode->i_atime, &info->AccessTime);
157 sf_ftime_from_timespec (&inode->i_ctime, &info->ChangeTime);
158 sf_ftime_from_timespec (&inode->i_mtime, &info->ModificationTime);
159}
160
161int
162sf_stat (const char *caller, struct sf_glob_info *sf_g,
163 SHFLSTRING *path, RTFSOBJINFO *result, int ok_to_fail)
164{
165 int rc;
166 SHFLCREATEPARMS params;
167
168 TRACE ();
169
170 memset(&params, 0, sizeof(params));
171 params.CreateFlags = SHFL_CF_LOOKUP | SHFL_CF_ACT_FAIL_IF_NEW;
172 LogFunc(("calling vboxCallCreate, file %s, flags %#x\n",
173 path->String.utf8, params.CreateFlags));
174 rc = vboxCallCreate (&client_handle, &sf_g->map, path, &params);
175 if (RT_FAILURE (rc)) {
176 LogFunc(("vboxCallCreate(%s) failed. caller=%s, rc=%Rrc\n",
177 path->String.utf8, rc, caller));
178 return -EPROTO;
179 }
180
181 if (params.Result != SHFL_FILE_EXISTS) {
182 if (!ok_to_fail) {
183 LogFunc(("vboxCallCreate(%s) file does not exist. caller=%s, result=%d\n",
184 path->String.utf8, params.Result, caller));
185 }
186 return -ENOENT;
187 }
188
189 *result = params.Info;
190 return 0;
191}
192
193/* this is called directly as iop on 2.4, indirectly as dop
194 [sf_dentry_revalidate] on 2.4/2.6, indirectly as iop through
195 [sf_getattr] on 2.6. the job is to find out whether dentry/inode is
196 still valid. the test is failed if [dentry] does not have an inode
197 or [sf_stat] is unsuccessful, otherwise we return success and
198 update inode attributes */
199int
200sf_inode_revalidate (struct dentry *dentry)
201{
202 int err;
203 struct sf_glob_info *sf_g;
204 struct sf_inode_info *sf_i;
205 RTFSOBJINFO info;
206
207 TRACE ();
208 if (!dentry || !dentry->d_inode) {
209 LogFunc(("no dentry(%p) or inode(%p)\n", dentry, dentry->d_inode));
210 return -EINVAL;
211 }
212
213 sf_g = GET_GLOB_INFO (dentry->d_inode->i_sb);
214 sf_i = GET_INODE_INFO (dentry->d_inode);
215
216#if 0
217 printk ("%s called by %p:%p\n",
218 sf_i->path->String.utf8,
219 __builtin_return_address (0),
220 __builtin_return_address (1));
221#endif
222
223 BUG_ON (!sf_g);
224 BUG_ON (!sf_i);
225
226 if (!sf_i->force_restat) {
227 if (jiffies - dentry->d_time < sf_g->ttl) {
228 return 0;
229 }
230 }
231
232 err = sf_stat (__func__, sf_g, sf_i->path, &info, 1);
233 if (err) {
234 return err;
235 }
236
237 dentry->d_time = jiffies;
238 sf_init_inode (sf_g, dentry->d_inode, &info);
239 return 0;
240}
241
242/* this is called during name resolution/lookup to check if the
243 [dentry] in the cache is still valid. the job is handled by
244 [sf_inode_revalidate] */
245static int
246#if LINUX_VERSION_CODE < KERNEL_VERSION (2, 6, 0)
247sf_dentry_revalidate (struct dentry *dentry, int flags)
248#else
249sf_dentry_revalidate (struct dentry *dentry, struct nameidata *nd)
250#endif
251{
252 TRACE ();
253 if (sf_inode_revalidate (dentry)) {
254 return 0;
255 }
256 return 1;
257}
258
259/* on 2.6 this is a proxy for [sf_inode_revalidate] which (as a side
260 effect) updates inode attributes for [dentry] (given that [dentry]
261 has inode at all) from these new attributes we derive [kstat] via
262 [generic_fillattr] */
263#if LINUX_VERSION_CODE >= KERNEL_VERSION (2, 6, 0)
264int
265sf_getattr (struct vfsmount *mnt, struct dentry *dentry, struct kstat *kstat)
266{
267 int err;
268
269 TRACE ();
270 err = sf_inode_revalidate (dentry);
271 if (err) {
272 return err;
273 }
274
275 generic_fillattr (dentry->d_inode, kstat);
276 return 0;
277}
278
279int
280sf_setattr (struct dentry *dentry, struct iattr *iattr)
281{
282 struct sf_glob_info *sf_g;
283 struct sf_inode_info *sf_i;
284 SHFLCREATEPARMS params;
285 RTFSOBJINFO info;
286 uint32_t cbBuffer;
287 int rc, err;
288
289 TRACE ();
290
291 sf_g = GET_GLOB_INFO (dentry->d_inode->i_sb);
292 sf_i = GET_INODE_INFO (dentry->d_inode);
293 err = 0;
294
295 memset(&params, 0, sizeof(params));
296 memset(&info, 0, sizeof(info));
297
298 params.CreateFlags = SHFL_CF_ACT_OPEN_IF_EXISTS
299 | SHFL_CF_ACT_FAIL_IF_NEW
300 | SHFL_CF_ACCESS_ATTR_WRITE;
301
302 rc = vboxCallCreate (&client_handle, &sf_g->map, sf_i->path, &params);
303 if (VBOX_FAILURE (rc)) {
304 LogFunc(("vboxCallCreate(%s) failed rc=%Rrc\n",
305 sf_i->path->String.utf8, rc));
306 err = -RTErrConvertToErrno(rc);
307 goto fail2;
308 }
309 if (params.Result != SHFL_FILE_EXISTS) {
310 LogFunc(("file %s does not exist\n", sf_i->path->String.utf8));
311 err = -ENOENT;
312 goto fail1;
313 }
314
315 cbBuffer = sizeof(info);
316
317#define mode_set(r) ((iattr->ia_mode & (S_##r)) ? RTFS_UNIX_##r : 0)
318
319 if (iattr->ia_valid & ATTR_MODE)
320 {
321 info.Attr.fMode = mode_set (ISUID);
322 info.Attr.fMode |= mode_set (ISGID);
323 info.Attr.fMode |= mode_set (IRUSR);
324 info.Attr.fMode |= mode_set (IWUSR);
325 info.Attr.fMode |= mode_set (IXUSR);
326 info.Attr.fMode |= mode_set (IRGRP);
327 info.Attr.fMode |= mode_set (IWGRP);
328 info.Attr.fMode |= mode_set (IXGRP);
329 info.Attr.fMode |= mode_set (IROTH);
330 info.Attr.fMode |= mode_set (IWOTH);
331 info.Attr.fMode |= mode_set (IXOTH);
332
333 if (iattr->ia_mode & S_IFDIR)
334 info.Attr.fMode |= RTFS_TYPE_DIRECTORY;
335 else
336 info.Attr.fMode |= RTFS_TYPE_FILE;
337 }
338
339 if (iattr->ia_valid & ATTR_ATIME)
340 sf_timespec_from_ftime (&info.AccessTime, &iattr->ia_atime);
341 if (iattr->ia_valid & ATTR_MTIME)
342 sf_timespec_from_ftime (&info.ModificationTime, &iattr->ia_mtime);
343 /* ignore ctime (inode change time) as it can't be set from userland anyway */
344
345 rc = vboxCallFSInfo(&client_handle, &sf_g->map, params.Handle,
346 SHFL_INFO_SET | SHFL_INFO_FILE, &cbBuffer,
347 (PSHFLDIRINFO)&info);
348 if (VBOX_FAILURE (rc)) {
349 LogFunc(("vboxCallFSInfo(%s) failed rc=%Rrc\n",
350 sf_i->path->String.utf8, rc));
351 err = -RTErrConvertToErrno(rc);
352 goto fail1;
353 }
354
355 rc = vboxCallClose (&client_handle, &sf_g->map, params.Handle);
356 if (VBOX_FAILURE (rc)) {
357 LogFunc(("vboxCallClose(%s) failed rc=%Rrc\n",
358 sf_i->path->String.utf8, rc));
359 }
360
361 return sf_inode_revalidate (dentry);
362
363fail1:
364 rc = vboxCallClose (&client_handle, &sf_g->map, params.Handle);
365 if (VBOX_FAILURE (rc)) {
366 LogFunc(("vboxCallClose(%s) failed rc=%Rrc\n",
367 sf_i->path->String.utf8, rc));
368 }
369fail2:
370 return err;
371}
372#endif /* >= 2.6.0 */
373
374static int
375sf_make_path (const char *caller, struct sf_inode_info *sf_i,
376 const char *d_name, size_t d_len, SHFLSTRING **result)
377{
378 size_t path_len, shflstring_len;
379 SHFLSTRING *tmp;
380 uint16_t p_len;
381 uint8_t *p_name;
382 uint8_t *dst;
383 int is_root = 0;
384
385 TRACE ();
386 p_len = sf_i->path->u16Length;
387 p_name = sf_i->path->String.utf8;
388
389 if (p_len == 1 && *p_name == '/') {
390 path_len = d_len + 1;
391 is_root = 1;
392 }
393 else {
394 /* lengths of constituents plus terminating zero plus slash */
395 path_len = p_len + d_len + 2;
396 if (path_len > 0xffff) {
397 LogFunc(("path too long. caller=%s, path_len=%zu\n", caller, path_len));
398 return -ENAMETOOLONG;
399 }
400 }
401
402 shflstring_len = offsetof (SHFLSTRING, String.utf8) + path_len;
403 tmp = kmalloc (shflstring_len, GFP_KERNEL);
404 if (!tmp) {
405 LogRelFunc(("kmalloc failed, caller=%s\n", caller));
406 return -ENOMEM;
407 }
408 tmp->u16Length = path_len - 1;
409 tmp->u16Size = path_len;
410
411 if (is_root) {
412 memcpy (tmp->String.utf8, d_name, d_len + 1);
413 }
414 else {
415 dst = tmp->String.utf8;
416 memcpy (dst, p_name, p_len);
417 dst += p_len; *dst++ = '/';
418 memcpy (dst, d_name, d_len);
419 dst[d_len] = 0;
420 }
421
422 *result = tmp;
423 return 0;
424}
425
426/* [dentry] contains string encoded in coding system that corresponds
427 to [sf_g]->nls, we must convert it to UTF8 here and pass down to
428 [sf_make_path] which will allocate SHFLSTRING and fill it in */
429int
430sf_path_from_dentry (const char *caller, struct sf_glob_info *sf_g,
431 struct sf_inode_info *sf_i, struct dentry *dentry,
432 SHFLSTRING **result)
433{
434 int err;
435 const char *d_name;
436 size_t d_len;
437 const char *name;
438 size_t len = 0;
439
440 TRACE ();
441 d_name = dentry->d_name.name;
442 d_len = dentry->d_name.len;
443
444 if (sf_g->nls) {
445 size_t in_len, i, out_bound_len;
446 const char *in;
447 char *out;
448
449 in = d_name;
450 in_len = d_len;
451
452 out_bound_len = PATH_MAX;
453 out = kmalloc (out_bound_len, GFP_KERNEL);
454 name = out;
455
456 for (i = 0; i < d_len; ++i) {
457 /* We renamed the linux kernel wchar_t type to linux_wchar_t in
458 the-linux-kernel.h, as it conflicts with the C++ type of that name. */
459 linux_wchar_t uni;
460 int nb;
461
462 nb = sf_g->nls->char2uni (in, in_len, &uni);
463 if (nb < 0) {
464 LogFunc(("nls->char2uni failed %x %d\n",
465 *in, in_len));
466 err = -EINVAL;
467 goto fail1;
468 }
469 in_len -= nb;
470 in += nb;
471
472#if LINUX_VERSION_CODE >= KERNEL_VERSION (2, 6, 31)
473 nb = utf32_to_utf8 (uni, out, out_bound_len);
474#else
475 nb = utf8_wctomb (out, uni, out_bound_len);
476#endif
477 if (nb < 0) {
478 LogFunc(("nls->uni2char failed %x %d\n",
479 uni, out_bound_len));
480 err = -EINVAL;
481 goto fail1;
482 }
483 out_bound_len -= nb;
484 out += nb;
485 len += nb;
486 }
487 if (len >= PATH_MAX - 1) {
488 err = -ENAMETOOLONG;
489 goto fail1;
490 }
491
492 LogFunc(("result(%d) = %.*s\n", len, len, name));
493 *out = 0;
494 }
495 else {
496 name = d_name;
497 len = d_len;
498 }
499
500 err = sf_make_path (caller, sf_i, name, len, result);
501 if (name != d_name) {
502 kfree (name);
503 }
504 return err;
505
506 fail1:
507 kfree (name);
508 return err;
509}
510
511int
512sf_nlscpy (struct sf_glob_info *sf_g,
513 char *name, size_t name_bound_len,
514 const unsigned char *utf8_name, size_t utf8_len)
515{
516 if (sf_g->nls) {
517 const char *in;
518 char *out;
519 size_t out_len;
520 size_t out_bound_len;
521 size_t in_bound_len;
522
523 in = utf8_name;
524 in_bound_len = utf8_len;
525
526 out = name;
527 out_len = 0;
528 out_bound_len = name_bound_len;
529
530 while (in_bound_len) {
531 int nb;
532 wchar_t uni;
533
534#if LINUX_VERSION_CODE >= KERNEL_VERSION (2, 6, 31)
535 nb = utf8_to_utf32 (in, in_bound_len, &uni);
536#else
537 nb = utf8_mbtowc (&uni, in, in_bound_len);
538#endif
539 if (nb < 0) {
540 LogFunc(("utf8_mbtowc failed(%s) %x:%d\n",
541 (const char *) utf8_name, *in, in_bound_len));
542 return -EINVAL;
543 }
544 in += nb;
545 in_bound_len -= nb;
546
547 nb = sf_g->nls->uni2char (uni, out, out_bound_len);
548 if (nb < 0) {
549 LogFunc(("nls->uni2char failed(%s) %x:%d\n",
550 utf8_name, uni, out_bound_len));
551 return nb;
552 }
553 out += nb;
554 out_bound_len -= nb;
555 out_len += nb;
556 }
557
558 *out = 0;
559 return 0;
560 }
561 else {
562 if (utf8_len + 1 > name_bound_len) {
563 return -ENAMETOOLONG;
564 }
565 else {
566 memcpy (name, utf8_name, utf8_len + 1);
567 }
568 return 0;
569 }
570}
571
572static struct sf_dir_buf *
573sf_dir_buf_alloc (void)
574{
575 struct sf_dir_buf *b;
576
577 TRACE ();
578 b = kmalloc (sizeof (*b), GFP_KERNEL);
579 if (!b) {
580 LogRelFunc(("could not alloc directory buffer\n"));
581 return NULL;
582 }
583
584#ifdef USE_VMALLOC
585 b->buf = vmalloc (16384);
586#else
587 b->buf = kmalloc (16384, GFP_KERNEL);
588#endif
589 if (!b->buf) {
590 kfree (b);
591 LogRelFunc(("could not alloc directory buffer storage\n"));
592 return NULL;
593 }
594
595 INIT_LIST_HEAD (&b->head);
596 b->nb_entries = 0;
597 b->used_bytes = 0;
598 b->free_bytes = 16384;
599 return b;
600}
601
602static void
603sf_dir_buf_free (struct sf_dir_buf *b)
604{
605 BUG_ON (!b || !b->buf);
606
607 TRACE ();
608 list_del (&b->head);
609#ifdef USE_VMALLOC
610 vfree (b->buf);
611#else
612 kfree (b->buf);
613#endif
614 kfree (b);
615}
616
617void
618sf_dir_info_free (struct sf_dir_info *p)
619{
620 struct list_head *list, *pos, *tmp;
621
622 TRACE ();
623 list = &p->info_list;
624 list_for_each_safe (pos, tmp, list) {
625 struct sf_dir_buf *b;
626
627 b = list_entry (pos, struct sf_dir_buf, head);
628 sf_dir_buf_free (b);
629 }
630 kfree (p);
631}
632
633struct sf_dir_info *
634sf_dir_info_alloc (void)
635{
636 struct sf_dir_info *p;
637
638 TRACE ();
639 p = kmalloc (sizeof (*p), GFP_KERNEL);
640 if (!p) {
641 LogRelFunc(("could not alloc directory info\n"));
642 return NULL;
643 }
644
645 INIT_LIST_HEAD (&p->info_list);
646 return p;
647}
648
649static struct sf_dir_buf *
650sf_get_non_empty_dir_buf (struct sf_dir_info *sf_d)
651{
652 struct list_head *list, *pos;
653
654 list = &sf_d->info_list;
655 list_for_each (pos, list) {
656 struct sf_dir_buf *b;
657
658 b = list_entry (pos, struct sf_dir_buf, head);
659 if (!b) {
660 return NULL;
661 }
662 else {
663 if (b->free_bytes > 0) {
664 return b;
665 }
666 }
667 }
668
669 return NULL;
670}
671
672int
673sf_dir_read_all (struct sf_glob_info *sf_g, struct sf_inode_info *sf_i,
674 struct sf_dir_info *sf_d, SHFLHANDLE handle)
675{
676 int err;
677 SHFLSTRING *mask;
678 struct sf_dir_buf *b;
679
680 TRACE ();
681 err = sf_make_path (__func__, sf_i, "*", 1, &mask);
682 if (err) {
683 goto fail0;
684 }
685
686 b = sf_get_non_empty_dir_buf (sf_d);
687 for (;;) {
688 int rc;
689 void *buf;
690 uint32_t buf_size;
691 uint32_t nb_ents;
692
693 if (!b) {
694 b = sf_dir_buf_alloc ();
695 if (!b) {
696 err = -ENOMEM;
697 LogRelFunc(("could not alloc directory buffer\n"));
698 goto fail1;
699 }
700 }
701
702 list_add (&b->head, &sf_d->info_list);
703
704 buf = b->buf;
705 buf_size = b->free_bytes;
706
707 rc = vboxCallDirInfo (
708 &client_handle,
709 &sf_g->map,
710 handle,
711 mask,
712 0,
713 0,
714 &buf_size,
715 buf,
716 &nb_ents
717 );
718 switch (rc) {
719 case VINF_SUCCESS:
720 /* fallthrough */
721 case VERR_NO_MORE_FILES:
722 break;
723
724 case VERR_NO_TRANSLATION:
725 LogFunc(("host could not translate entry\n"));
726 /* XXX */
727 break;
728
729 default:
730 err = -RTErrConvertToErrno (rc);
731 LogFunc(("vboxCallDirInfo failed rc=%Rrc\n", rc));
732 goto fail1;
733 }
734
735 b->nb_entries += nb_ents;
736 b->free_bytes -= buf_size;
737 b->used_bytes += buf_size;
738 b = NULL;
739
740 if (RT_FAILURE (rc)) {
741 break;
742 }
743 }
744 return 0;
745
746 fail1:
747 kfree (mask);
748 fail0:
749 return err;
750}
751
752int sf_get_volume_info(struct super_block *sb, STRUCT_STATFS *stat)
753{
754 struct sf_glob_info *sf_g;
755 SHFLVOLINFO SHFLVolumeInfo;
756 uint32_t cbBuffer;
757 int rc;
758
759 sf_g = GET_GLOB_INFO (sb);
760 cbBuffer = sizeof(SHFLVolumeInfo);
761 rc = vboxCallFSInfo(&client_handle, &sf_g->map, 0, SHFL_INFO_GET | SHFL_INFO_VOLUME,
762 &cbBuffer, (PSHFLDIRINFO)&SHFLVolumeInfo);
763 if (RT_FAILURE(rc))
764 return -RTErrConvertToErrno(rc);
765
766 stat->f_type = NFS_SUPER_MAGIC; /* XXX vboxsf type? */
767 stat->f_bsize = SHFLVolumeInfo.ulBytesPerAllocationUnit;
768 stat->f_blocks = SHFLVolumeInfo.ullTotalAllocationBytes
769 / SHFLVolumeInfo.ulBytesPerAllocationUnit;
770 stat->f_bfree = SHFLVolumeInfo.ullAvailableAllocationBytes
771 / SHFLVolumeInfo.ulBytesPerAllocationUnit;
772 stat->f_bavail = SHFLVolumeInfo.ullAvailableAllocationBytes
773 / SHFLVolumeInfo.ulBytesPerAllocationUnit;
774 stat->f_files = 1000;
775 stat->f_ffree = 1000; /* don't return 0 here since the guest may think
776 * that it is not possible to create any more files */
777 stat->f_fsid.val[0] = 0;
778 stat->f_fsid.val[1] = 0;
779 stat->f_namelen = 255;
780 return 0;
781}
782
783struct dentry_operations sf_dentry_ops = {
784 .d_revalidate = sf_dentry_revalidate
785};
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette