1 | /** @file
|
---|
2 | *
|
---|
3 | * vboxsf -- VirtualBox Guest Additions for Linux:
|
---|
4 | * Virtual File System for VirtualBox Shared Folders
|
---|
5 | *
|
---|
6 | * Module initialization/finalization
|
---|
7 | * File system registration/deregistration
|
---|
8 | * Superblock reading
|
---|
9 | * Few utility functions
|
---|
10 | */
|
---|
11 |
|
---|
12 | /*
|
---|
13 | * Copyright (C) 2006-2010 Oracle Corporation
|
---|
14 | *
|
---|
15 | * This file is part of VirtualBox Open Source Edition (OSE), as
|
---|
16 | * available from http://www.virtualbox.org. This file is free software;
|
---|
17 | * you can redistribute it and/or modify it under the terms of the GNU
|
---|
18 | * General Public License (GPL) as published by the Free Software
|
---|
19 | * Foundation, in version 2 as it comes in the "COPYING" file of the
|
---|
20 | * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
|
---|
21 | * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
|
---|
22 | */
|
---|
23 |
|
---|
24 | /**
|
---|
25 | * @note Anyone wishing to make changes here might wish to take a look at
|
---|
26 | * http://www.atnf.csiro.au/people/rgooch/linux/vfs.txt
|
---|
27 | * which seems to be the closest there is to official documentation on
|
---|
28 | * writing filesystem drivers for Linux.
|
---|
29 | */
|
---|
30 |
|
---|
31 | #include "vfsmod.h"
|
---|
32 |
|
---|
33 | MODULE_DESCRIPTION(VBOX_PRODUCT " VFS Module for Host File System Access");
|
---|
34 | MODULE_AUTHOR(VBOX_VENDOR);
|
---|
35 | MODULE_LICENSE("GPL");
|
---|
36 | #ifdef MODULE_VERSION
|
---|
37 | MODULE_VERSION(VBOX_VERSION_STRING " (interface " RT_XSTR(VMMDEV_VERSION) ")");
|
---|
38 | #endif
|
---|
39 |
|
---|
40 | /* globals */
|
---|
41 | VBSFCLIENT client_handle;
|
---|
42 |
|
---|
43 | /* forward declarations */
|
---|
44 | static struct super_operations sf_super_ops;
|
---|
45 |
|
---|
46 | /* allocate global info, try to map host share */
|
---|
47 | static int sf_glob_alloc(struct vbsf_mount_info_new *info, struct sf_glob_info **sf_gp)
|
---|
48 | {
|
---|
49 | int err, rc;
|
---|
50 | SHFLSTRING *str_name;
|
---|
51 | size_t name_len, str_len;
|
---|
52 | struct sf_glob_info *sf_g;
|
---|
53 |
|
---|
54 | TRACE();
|
---|
55 | sf_g = kmalloc(sizeof(*sf_g), GFP_KERNEL);
|
---|
56 | if (!sf_g)
|
---|
57 | {
|
---|
58 | err = -ENOMEM;
|
---|
59 | LogRelFunc(("could not allocate memory for global info\n"));
|
---|
60 | goto fail0;
|
---|
61 | }
|
---|
62 |
|
---|
63 | RT_ZERO(*sf_g);
|
---|
64 |
|
---|
65 | if ( info->nullchar != '\0'
|
---|
66 | || info->signature[0] != VBSF_MOUNT_SIGNATURE_BYTE_0
|
---|
67 | || info->signature[1] != VBSF_MOUNT_SIGNATURE_BYTE_1
|
---|
68 | || info->signature[2] != VBSF_MOUNT_SIGNATURE_BYTE_2)
|
---|
69 | {
|
---|
70 | /* An old version of mount.vboxsf made the syscall. Translate the
|
---|
71 | * old parameters to the new structure. */
|
---|
72 | struct vbsf_mount_info_old *info_old = (struct vbsf_mount_info_old *)info;
|
---|
73 | static struct vbsf_mount_info_new info_compat;
|
---|
74 |
|
---|
75 | info = &info_compat;
|
---|
76 | memset(info, 0, sizeof(*info));
|
---|
77 | memcpy(&info->name, &info_old->name, MAX_HOST_NAME);
|
---|
78 | memcpy(&info->nls_name, &info_old->nls_name, MAX_NLS_NAME);
|
---|
79 | info->length = offsetof(struct vbsf_mount_info_new, dmode);
|
---|
80 | info->uid = info_old->uid;
|
---|
81 | info->gid = info_old->gid;
|
---|
82 | info->ttl = info_old->ttl;
|
---|
83 | }
|
---|
84 |
|
---|
85 | info->name[sizeof(info->name) - 1] = 0;
|
---|
86 | info->nls_name[sizeof(info->nls_name) - 1] = 0;
|
---|
87 |
|
---|
88 | name_len = strlen(info->name);
|
---|
89 | if (name_len > 0xfffe)
|
---|
90 | {
|
---|
91 | err = -ENAMETOOLONG;
|
---|
92 | LogFunc(("map name too big\n"));
|
---|
93 | goto fail1;
|
---|
94 | }
|
---|
95 |
|
---|
96 | str_len = offsetof(SHFLSTRING, String.utf8) + name_len + 1;
|
---|
97 | str_name = kmalloc(str_len, GFP_KERNEL);
|
---|
98 | if (!str_name)
|
---|
99 | {
|
---|
100 | err = -ENOMEM;
|
---|
101 | LogRelFunc(("could not allocate memory for host name\n"));
|
---|
102 | goto fail1;
|
---|
103 | }
|
---|
104 |
|
---|
105 | str_name->u16Length = name_len;
|
---|
106 | str_name->u16Size = name_len + 1;
|
---|
107 | memcpy(str_name->String.utf8, info->name, name_len + 1);
|
---|
108 |
|
---|
109 | if (info->nls_name[0] && strcmp(info->nls_name, "utf8"))
|
---|
110 | {
|
---|
111 | sf_g->nls = load_nls(info->nls_name);
|
---|
112 | if (!sf_g->nls)
|
---|
113 | {
|
---|
114 | err = -EINVAL;
|
---|
115 | LogFunc(("failed to load nls %s\n", info->nls_name));
|
---|
116 | goto fail1;
|
---|
117 | }
|
---|
118 | }
|
---|
119 | else
|
---|
120 | sf_g->nls = NULL;
|
---|
121 |
|
---|
122 | rc = vboxCallMapFolder(&client_handle, str_name, &sf_g->map);
|
---|
123 | kfree(str_name);
|
---|
124 |
|
---|
125 | if (RT_FAILURE(rc))
|
---|
126 | {
|
---|
127 | err = -EPROTO;
|
---|
128 | LogFunc(("vboxCallMapFolder failed rc=%d\n", rc));
|
---|
129 | goto fail2;
|
---|
130 | }
|
---|
131 |
|
---|
132 | sf_g->ttl = info->ttl;
|
---|
133 | sf_g->uid = info->uid;
|
---|
134 | sf_g->gid = info->gid;
|
---|
135 |
|
---|
136 | if ((unsigned)info->length >= sizeof(struct vbsf_mount_info_new))
|
---|
137 | {
|
---|
138 | /* new fields */
|
---|
139 | sf_g->dmode = info->dmode;
|
---|
140 | sf_g->fmode = info->fmode;
|
---|
141 | sf_g->dmask = info->dmask;
|
---|
142 | sf_g->fmask = info->fmask;
|
---|
143 | }
|
---|
144 | else
|
---|
145 | {
|
---|
146 | sf_g->dmode = ~0;
|
---|
147 | sf_g->fmode = ~0;
|
---|
148 | }
|
---|
149 |
|
---|
150 | *sf_gp = sf_g;
|
---|
151 | return 0;
|
---|
152 |
|
---|
153 | fail2:
|
---|
154 | if (sf_g->nls)
|
---|
155 | unload_nls(sf_g->nls);
|
---|
156 |
|
---|
157 | fail1:
|
---|
158 | kfree(sf_g);
|
---|
159 |
|
---|
160 | fail0:
|
---|
161 | return err;
|
---|
162 | }
|
---|
163 |
|
---|
164 | /* unmap the share and free global info [sf_g] */
|
---|
165 | static void
|
---|
166 | sf_glob_free(struct sf_glob_info *sf_g)
|
---|
167 | {
|
---|
168 | int rc;
|
---|
169 |
|
---|
170 | TRACE();
|
---|
171 | rc = vboxCallUnmapFolder(&client_handle, &sf_g->map);
|
---|
172 | if (RT_FAILURE(rc))
|
---|
173 | LogFunc(("vboxCallUnmapFolder failed rc=%d\n", rc));
|
---|
174 |
|
---|
175 | if (sf_g->nls)
|
---|
176 | unload_nls(sf_g->nls);
|
---|
177 |
|
---|
178 | kfree(sf_g);
|
---|
179 | }
|
---|
180 |
|
---|
181 | /**
|
---|
182 | * This is called (by sf_read_super_[24|26] when vfs mounts the fs and
|
---|
183 | * wants to read super_block.
|
---|
184 | *
|
---|
185 | * calls [sf_glob_alloc] to map the folder and allocate global
|
---|
186 | * information structure.
|
---|
187 | *
|
---|
188 | * initializes [sb], initializes root inode and dentry.
|
---|
189 | *
|
---|
190 | * should respect [flags]
|
---|
191 | */
|
---|
192 | static int sf_read_super_aux(struct super_block *sb, void *data, int flags)
|
---|
193 | {
|
---|
194 | int err;
|
---|
195 | struct dentry *droot;
|
---|
196 | struct inode *iroot;
|
---|
197 | struct sf_inode_info *sf_i;
|
---|
198 | struct sf_glob_info *sf_g;
|
---|
199 | RTFSOBJINFO fsinfo;
|
---|
200 | struct vbsf_mount_info_new *info;
|
---|
201 |
|
---|
202 | TRACE();
|
---|
203 | if (!data)
|
---|
204 | {
|
---|
205 | LogFunc(("no mount info specified\n"));
|
---|
206 | return -EINVAL;
|
---|
207 | }
|
---|
208 |
|
---|
209 | info = data;
|
---|
210 |
|
---|
211 | if (flags & MS_REMOUNT)
|
---|
212 | {
|
---|
213 | LogFunc(("remounting is not supported\n"));
|
---|
214 | return -ENOSYS;
|
---|
215 | }
|
---|
216 |
|
---|
217 | err = sf_glob_alloc(info, &sf_g);
|
---|
218 | if (err)
|
---|
219 | goto fail0;
|
---|
220 |
|
---|
221 | sf_i = kmalloc(sizeof (*sf_i), GFP_KERNEL);
|
---|
222 | if (!sf_i)
|
---|
223 | {
|
---|
224 | err = -ENOMEM;
|
---|
225 | LogRelFunc(("could not allocate memory for root inode info\n"));
|
---|
226 | goto fail1;
|
---|
227 | }
|
---|
228 |
|
---|
229 | sf_i->handle = SHFL_HANDLE_NIL;
|
---|
230 | sf_i->path = kmalloc(sizeof(SHFLSTRING) + 1, GFP_KERNEL);
|
---|
231 | if (!sf_i->path)
|
---|
232 | {
|
---|
233 | err = -ENOMEM;
|
---|
234 | LogRelFunc(("could not allocate memory for root inode path\n"));
|
---|
235 | goto fail2;
|
---|
236 | }
|
---|
237 |
|
---|
238 | sf_i->path->u16Length = 1;
|
---|
239 | sf_i->path->u16Size = 2;
|
---|
240 | sf_i->path->String.utf8[0] = '/';
|
---|
241 | sf_i->path->String.utf8[1] = 0;
|
---|
242 |
|
---|
243 | err = sf_stat(__func__, sf_g, sf_i->path, &fsinfo, 0);
|
---|
244 | if (err)
|
---|
245 | {
|
---|
246 | LogFunc(("could not stat root of share\n"));
|
---|
247 | goto fail3;
|
---|
248 | }
|
---|
249 |
|
---|
250 | sb->s_magic = 0xface;
|
---|
251 | sb->s_blocksize = 1024;
|
---|
252 | #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 3)
|
---|
253 | /* Required for seek/sendfile.
|
---|
254 | *
|
---|
255 | * Must by less than or equal to INT64_MAX despite the fact that the
|
---|
256 | * declaration of this variable is unsigned long long. See determination
|
---|
257 | * of 'loff_t max' in fs/read_write.c / do_sendfile(). I don't know the
|
---|
258 | * correct limit but MAX_LFS_FILESIZE (8TB-1 on 32-bit boxes) takes the
|
---|
259 | * page cache into account and is the suggested limit. */
|
---|
260 | # if defined MAX_LFS_FILESIZE
|
---|
261 | sb->s_maxbytes = MAX_LFS_FILESIZE;
|
---|
262 | # else
|
---|
263 | sb->s_maxbytes = 0x7fffffffffffffffULL;
|
---|
264 | # endif
|
---|
265 | #endif
|
---|
266 | sb->s_op = &sf_super_ops;
|
---|
267 |
|
---|
268 | #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 25)
|
---|
269 | iroot = iget_locked(sb, 0);
|
---|
270 | #else
|
---|
271 | iroot = iget(sb, 0);
|
---|
272 | #endif
|
---|
273 | if (!iroot)
|
---|
274 | {
|
---|
275 | err = -ENOMEM; /* XXX */
|
---|
276 | LogFunc(("could not get root inode\n"));
|
---|
277 | goto fail3;
|
---|
278 | }
|
---|
279 |
|
---|
280 | if (sf_init_backing_dev(sf_g, info->name))
|
---|
281 | {
|
---|
282 | err = -EINVAL;
|
---|
283 | LogFunc(("could not init bdi\n"));
|
---|
284 | goto fail4;
|
---|
285 | }
|
---|
286 |
|
---|
287 | sf_init_inode(sf_g, iroot, &fsinfo);
|
---|
288 | SET_INODE_INFO(iroot, sf_i);
|
---|
289 |
|
---|
290 | #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 25)
|
---|
291 | unlock_new_inode(iroot);
|
---|
292 | #endif
|
---|
293 |
|
---|
294 | droot = d_alloc_root(iroot);
|
---|
295 | if (!droot)
|
---|
296 | {
|
---|
297 | err = -ENOMEM; /* XXX */
|
---|
298 | LogFunc(("d_alloc_root failed\n"));
|
---|
299 | goto fail5;
|
---|
300 | }
|
---|
301 |
|
---|
302 | sb->s_root = droot;
|
---|
303 | SET_GLOB_INFO(sb, sf_g);
|
---|
304 | return 0;
|
---|
305 |
|
---|
306 | fail5:
|
---|
307 | sf_done_backing_dev(sf_g);
|
---|
308 |
|
---|
309 | fail4:
|
---|
310 | iput(iroot);
|
---|
311 |
|
---|
312 | fail3:
|
---|
313 | kfree(sf_i->path);
|
---|
314 |
|
---|
315 | fail2:
|
---|
316 | kfree(sf_i);
|
---|
317 |
|
---|
318 | fail1:
|
---|
319 | sf_glob_free(sf_g);
|
---|
320 |
|
---|
321 | fail0:
|
---|
322 | return err;
|
---|
323 | }
|
---|
324 |
|
---|
325 | #if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 0)
|
---|
326 | static struct super_block *
|
---|
327 | sf_read_super_24(struct super_block *sb, void *data, int flags)
|
---|
328 | {
|
---|
329 | int err;
|
---|
330 |
|
---|
331 | TRACE();
|
---|
332 | err = sf_read_super_aux(sb, data, flags);
|
---|
333 | if (err)
|
---|
334 | return NULL;
|
---|
335 |
|
---|
336 | return sb;
|
---|
337 | }
|
---|
338 | #endif
|
---|
339 |
|
---|
340 | /* this is called when vfs is about to destroy the [inode]. all
|
---|
341 | resources associated with this [inode] must be cleared here */
|
---|
342 | static void sf_clear_inode(struct inode *inode)
|
---|
343 | {
|
---|
344 | struct sf_inode_info *sf_i;
|
---|
345 |
|
---|
346 | TRACE();
|
---|
347 | sf_i = GET_INODE_INFO(inode);
|
---|
348 | if (!sf_i)
|
---|
349 | return;
|
---|
350 |
|
---|
351 | BUG_ON(!sf_i->path);
|
---|
352 | kfree(sf_i->path);
|
---|
353 | kfree(sf_i);
|
---|
354 | SET_INODE_INFO(inode, NULL);
|
---|
355 | }
|
---|
356 |
|
---|
357 | /* this is called by vfs when it wants to populate [inode] with data.
|
---|
358 | the only thing that is known about inode at this point is its index
|
---|
359 | hence we can't do anything here, and let lookup/whatever with the
|
---|
360 | job to properly fill then [inode] */
|
---|
361 | #if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 25)
|
---|
362 | static void sf_read_inode(struct inode *inode)
|
---|
363 | {
|
---|
364 | }
|
---|
365 | #endif
|
---|
366 |
|
---|
367 | /* vfs is done with [sb] (umount called) call [sf_glob_free] to unmap
|
---|
368 | the folder and free [sf_g] */
|
---|
369 | static void sf_put_super(struct super_block *sb)
|
---|
370 | {
|
---|
371 | struct sf_glob_info *sf_g;
|
---|
372 |
|
---|
373 | sf_g = GET_GLOB_INFO(sb);
|
---|
374 | BUG_ON(!sf_g);
|
---|
375 | sf_done_backing_dev(sf_g);
|
---|
376 | sf_glob_free(sf_g);
|
---|
377 | }
|
---|
378 |
|
---|
379 | #if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 18)
|
---|
380 | static int sf_statfs(struct super_block *sb, STRUCT_STATFS *stat)
|
---|
381 | {
|
---|
382 | return sf_get_volume_info(sb, stat);
|
---|
383 | }
|
---|
384 | #else
|
---|
385 | static int sf_statfs(struct dentry *dentry, STRUCT_STATFS *stat)
|
---|
386 | {
|
---|
387 | struct super_block *sb = dentry->d_inode->i_sb;
|
---|
388 | return sf_get_volume_info(sb, stat);
|
---|
389 | }
|
---|
390 | #endif
|
---|
391 |
|
---|
392 | static int sf_remount_fs(struct super_block *sb, int *flags, char *data)
|
---|
393 | {
|
---|
394 | TRACE();
|
---|
395 | return -ENOSYS;
|
---|
396 | }
|
---|
397 |
|
---|
398 | static struct super_operations sf_super_ops =
|
---|
399 | {
|
---|
400 | .clear_inode = sf_clear_inode,
|
---|
401 | #if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 25)
|
---|
402 | .read_inode = sf_read_inode,
|
---|
403 | #endif
|
---|
404 | .put_super = sf_put_super,
|
---|
405 | .statfs = sf_statfs,
|
---|
406 | .remount_fs = sf_remount_fs
|
---|
407 | };
|
---|
408 |
|
---|
409 | #if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 0)
|
---|
410 | static DECLARE_FSTYPE(vboxsf_fs_type, "vboxsf", sf_read_super_24, 0);
|
---|
411 | #else
|
---|
412 | static int
|
---|
413 | sf_read_super_26(struct super_block *sb, void *data, int flags)
|
---|
414 | {
|
---|
415 | int err;
|
---|
416 |
|
---|
417 | TRACE();
|
---|
418 | err = sf_read_super_aux(sb, data, flags);
|
---|
419 | if (err)
|
---|
420 | printk(KERN_DEBUG "sf_read_super_aux err=%d\n", err);
|
---|
421 |
|
---|
422 | return err;
|
---|
423 | }
|
---|
424 |
|
---|
425 | #if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 18)
|
---|
426 | static struct super_block *sf_get_sb(struct file_system_type *fs_type, int flags,
|
---|
427 | const char *dev_name, void *data)
|
---|
428 | {
|
---|
429 | TRACE();
|
---|
430 | return get_sb_nodev(fs_type, flags, data, sf_read_super_26);
|
---|
431 | }
|
---|
432 | #else
|
---|
433 | static int sf_get_sb(struct file_system_type *fs_type, int flags,
|
---|
434 | const char *dev_name, void *data, struct vfsmount *mnt)
|
---|
435 | {
|
---|
436 | TRACE();
|
---|
437 | return get_sb_nodev(fs_type, flags, data, sf_read_super_26, mnt);
|
---|
438 | }
|
---|
439 | #endif
|
---|
440 |
|
---|
441 | static struct file_system_type vboxsf_fs_type =
|
---|
442 | {
|
---|
443 | .owner = THIS_MODULE,
|
---|
444 | .name = "vboxsf",
|
---|
445 | .get_sb = sf_get_sb,
|
---|
446 | .kill_sb = kill_anon_super
|
---|
447 | };
|
---|
448 | #endif
|
---|
449 |
|
---|
450 | /* Module initialization/finalization handlers */
|
---|
451 | static int __init init(void)
|
---|
452 | {
|
---|
453 | int rcVBox;
|
---|
454 | int rcRet = 0;
|
---|
455 | int err;
|
---|
456 |
|
---|
457 | TRACE();
|
---|
458 |
|
---|
459 | if (sizeof(struct vbsf_mount_info_new) > PAGE_SIZE)
|
---|
460 | {
|
---|
461 | printk(KERN_ERR
|
---|
462 | "Mount information structure is too large %lu\n"
|
---|
463 | "Must be less than or equal to %lu\n",
|
---|
464 | (unsigned long)sizeof (struct vbsf_mount_info_new),
|
---|
465 | (unsigned long)PAGE_SIZE);
|
---|
466 | return -EINVAL;
|
---|
467 | }
|
---|
468 |
|
---|
469 | err = register_filesystem(&vboxsf_fs_type);
|
---|
470 | if (err)
|
---|
471 | {
|
---|
472 | LogFunc(("register_filesystem err=%d\n", err));
|
---|
473 | return err;
|
---|
474 | }
|
---|
475 |
|
---|
476 | rcVBox = vboxInit();
|
---|
477 | if (RT_FAILURE(rcVBox))
|
---|
478 | {
|
---|
479 | LogRelFunc(("vboxInit failed, rc=%d\n", rcVBox));
|
---|
480 | rcRet = -EPROTO;
|
---|
481 | goto fail0;
|
---|
482 | }
|
---|
483 |
|
---|
484 | rcVBox = vboxConnect(&client_handle);
|
---|
485 | if (RT_FAILURE(rcVBox))
|
---|
486 | {
|
---|
487 | LogRelFunc(("vboxConnect failed, rc=%d\n", rcVBox));
|
---|
488 | rcRet = -EPROTO;
|
---|
489 | goto fail1;
|
---|
490 | }
|
---|
491 |
|
---|
492 | rcVBox = vboxCallSetUtf8(&client_handle);
|
---|
493 | if (RT_FAILURE(rcVBox)) {
|
---|
494 | LogRelFunc(("vboxCallSetUtf8 failed, rc=%d\n", rcVBox));
|
---|
495 | rcRet = -EPROTO;
|
---|
496 | goto fail2;
|
---|
497 | }
|
---|
498 |
|
---|
499 | printk(KERN_DEBUG
|
---|
500 | "vboxsf: Successfully loaded version " VBOX_VERSION_STRING
|
---|
501 | " (interface " RT_XSTR(VMMDEV_VERSION) ")\n");
|
---|
502 |
|
---|
503 | return 0;
|
---|
504 |
|
---|
505 | fail2:
|
---|
506 | vboxDisconnect(&client_handle);
|
---|
507 |
|
---|
508 | fail1:
|
---|
509 | vboxUninit();
|
---|
510 |
|
---|
511 | fail0:
|
---|
512 | unregister_filesystem(&vboxsf_fs_type);
|
---|
513 | return rcRet;
|
---|
514 | }
|
---|
515 |
|
---|
516 | static void __exit fini(void)
|
---|
517 | {
|
---|
518 | TRACE();
|
---|
519 |
|
---|
520 | vboxDisconnect(&client_handle);
|
---|
521 | vboxUninit();
|
---|
522 | unregister_filesystem(&vboxsf_fs_type);
|
---|
523 | }
|
---|
524 |
|
---|
525 | module_init(init);
|
---|
526 | module_exit(fini);
|
---|
527 |
|
---|
528 | /* C++ hack */
|
---|
529 | int __gxx_personality_v0 = 0xdeadbeef;
|
---|