1 | /** @file
|
---|
2 | *
|
---|
3 | * vboxsf -- VirtualBox Guest Additions for Linux:
|
---|
4 | * Virtual File System for VirtualBox Shared Folders
|
---|
5 | *
|
---|
6 | * Module initialization/finalization
|
---|
7 | * File system registration/deregistration
|
---|
8 | * Superblock reading
|
---|
9 | * Few utility functions
|
---|
10 | */
|
---|
11 |
|
---|
12 | /*
|
---|
13 | * Copyright (C) 2006-2010 Oracle Corporation
|
---|
14 | *
|
---|
15 | * This file is part of VirtualBox Open Source Edition (OSE), as
|
---|
16 | * available from http://www.virtualbox.org. This file is free software;
|
---|
17 | * you can redistribute it and/or modify it under the terms of the GNU
|
---|
18 | * General Public License (GPL) as published by the Free Software
|
---|
19 | * Foundation, in version 2 as it comes in the "COPYING" file of the
|
---|
20 | * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
|
---|
21 | * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
|
---|
22 | */
|
---|
23 |
|
---|
24 | /**
|
---|
25 | * @note Anyone wishing to make changes here might wish to take a look at
|
---|
26 | * http://www.atnf.csiro.au/people/rgooch/linux/vfs.txt
|
---|
27 | * which seems to be the closest there is to official documentation on
|
---|
28 | * writing filesystem drivers for Linux.
|
---|
29 | */
|
---|
30 |
|
---|
31 | #include "vfsmod.h"
|
---|
32 |
|
---|
33 | MODULE_DESCRIPTION(VBOX_PRODUCT " VFS Module for Host File System Access");
|
---|
34 | MODULE_AUTHOR(VBOX_VENDOR);
|
---|
35 | MODULE_LICENSE("GPL");
|
---|
36 | #ifdef MODULE_VERSION
|
---|
37 | MODULE_VERSION(VBOX_VERSION_STRING " (interface " RT_XSTR(VMMDEV_VERSION) ")");
|
---|
38 | #endif
|
---|
39 |
|
---|
40 | /* globals */
|
---|
41 | VBSFCLIENT client_handle;
|
---|
42 |
|
---|
43 | /* forward declarations */
|
---|
44 | static struct super_operations sf_super_ops;
|
---|
45 |
|
---|
46 | /* allocate global info, try to map host share */
|
---|
47 | static int sf_glob_alloc(struct vbsf_mount_info_new *info, struct sf_glob_info **sf_gp)
|
---|
48 | {
|
---|
49 | int err, rc;
|
---|
50 | SHFLSTRING *str_name;
|
---|
51 | size_t name_len, str_len;
|
---|
52 | struct sf_glob_info *sf_g;
|
---|
53 |
|
---|
54 | TRACE();
|
---|
55 | sf_g = kmalloc(sizeof(*sf_g), GFP_KERNEL);
|
---|
56 | if (!sf_g)
|
---|
57 | {
|
---|
58 | err = -ENOMEM;
|
---|
59 | LogRelFunc(("could not allocate memory for global info\n"));
|
---|
60 | goto fail0;
|
---|
61 | }
|
---|
62 |
|
---|
63 | RT_ZERO(*sf_g);
|
---|
64 |
|
---|
65 | if ( info->nullchar != '\0'
|
---|
66 | || info->signature[0] != VBSF_MOUNT_SIGNATURE_BYTE_0
|
---|
67 | || info->signature[1] != VBSF_MOUNT_SIGNATURE_BYTE_1
|
---|
68 | || info->signature[2] != VBSF_MOUNT_SIGNATURE_BYTE_2)
|
---|
69 | {
|
---|
70 | /* An old version of mount.vboxsf made the syscall. Translate the
|
---|
71 | * old parameters to the new structure. */
|
---|
72 | struct vbsf_mount_info_old *info_old = (struct vbsf_mount_info_old *)info;
|
---|
73 | static struct vbsf_mount_info_new info_compat;
|
---|
74 |
|
---|
75 | info = &info_compat;
|
---|
76 | memset(info, 0, sizeof(*info));
|
---|
77 | memcpy(&info->name, &info_old->name, MAX_HOST_NAME);
|
---|
78 | memcpy(&info->nls_name, &info_old->nls_name, MAX_NLS_NAME);
|
---|
79 | info->length = offsetof(struct vbsf_mount_info_new, dmode);
|
---|
80 | info->uid = info_old->uid;
|
---|
81 | info->gid = info_old->gid;
|
---|
82 | info->ttl = info_old->ttl;
|
---|
83 | }
|
---|
84 |
|
---|
85 | info->name[sizeof(info->name) - 1] = 0;
|
---|
86 | info->nls_name[sizeof(info->nls_name) - 1] = 0;
|
---|
87 |
|
---|
88 | name_len = strlen(info->name);
|
---|
89 | if (name_len > 0xfffe)
|
---|
90 | {
|
---|
91 | err = -ENAMETOOLONG;
|
---|
92 | LogFunc(("map name too big\n"));
|
---|
93 | goto fail1;
|
---|
94 | }
|
---|
95 |
|
---|
96 | str_len = offsetof(SHFLSTRING, String.utf8) + name_len + 1;
|
---|
97 | str_name = kmalloc(str_len, GFP_KERNEL);
|
---|
98 | if (!str_name)
|
---|
99 | {
|
---|
100 | err = -ENOMEM;
|
---|
101 | LogRelFunc(("could not allocate memory for host name\n"));
|
---|
102 | goto fail1;
|
---|
103 | }
|
---|
104 |
|
---|
105 | str_name->u16Length = name_len;
|
---|
106 | str_name->u16Size = name_len + 1;
|
---|
107 | memcpy(str_name->String.utf8, info->name, name_len + 1);
|
---|
108 |
|
---|
109 | if (info->nls_name[0] && strcmp(info->nls_name, "utf8"))
|
---|
110 | {
|
---|
111 | sf_g->nls = load_nls(info->nls_name);
|
---|
112 | if (!sf_g->nls)
|
---|
113 | {
|
---|
114 | err = -EINVAL;
|
---|
115 | LogFunc(("failed to load nls %s\n", info->nls_name));
|
---|
116 | goto fail1;
|
---|
117 | }
|
---|
118 | }
|
---|
119 | else
|
---|
120 | sf_g->nls = NULL;
|
---|
121 |
|
---|
122 | rc = vboxCallMapFolder(&client_handle, str_name, &sf_g->map);
|
---|
123 | kfree(str_name);
|
---|
124 |
|
---|
125 | if (RT_FAILURE(rc))
|
---|
126 | {
|
---|
127 | err = -EPROTO;
|
---|
128 | LogFunc(("vboxCallMapFolder failed rc=%d\n", rc));
|
---|
129 | goto fail2;
|
---|
130 | }
|
---|
131 |
|
---|
132 | sf_g->ttl = info->ttl;
|
---|
133 | sf_g->uid = info->uid;
|
---|
134 | sf_g->gid = info->gid;
|
---|
135 |
|
---|
136 | if ((unsigned)info->length >= sizeof(struct vbsf_mount_info_new))
|
---|
137 | {
|
---|
138 | /* new fields */
|
---|
139 | sf_g->dmode = info->dmode;
|
---|
140 | sf_g->fmode = info->fmode;
|
---|
141 | sf_g->dmask = info->dmask;
|
---|
142 | sf_g->fmask = info->fmask;
|
---|
143 | }
|
---|
144 | else
|
---|
145 | {
|
---|
146 | sf_g->dmode = ~0;
|
---|
147 | sf_g->fmode = ~0;
|
---|
148 | }
|
---|
149 |
|
---|
150 | *sf_gp = sf_g;
|
---|
151 | return 0;
|
---|
152 |
|
---|
153 | fail2:
|
---|
154 | if (sf_g->nls)
|
---|
155 | unload_nls(sf_g->nls);
|
---|
156 |
|
---|
157 | fail1:
|
---|
158 | kfree(sf_g);
|
---|
159 |
|
---|
160 | fail0:
|
---|
161 | return err;
|
---|
162 | }
|
---|
163 |
|
---|
164 | /* unmap the share and free global info [sf_g] */
|
---|
165 | static void
|
---|
166 | sf_glob_free(struct sf_glob_info *sf_g)
|
---|
167 | {
|
---|
168 | int rc;
|
---|
169 |
|
---|
170 | TRACE();
|
---|
171 | rc = vboxCallUnmapFolder(&client_handle, &sf_g->map);
|
---|
172 | if (RT_FAILURE(rc))
|
---|
173 | LogFunc(("vboxCallUnmapFolder failed rc=%d\n", rc));
|
---|
174 |
|
---|
175 | if (sf_g->nls)
|
---|
176 | unload_nls(sf_g->nls);
|
---|
177 |
|
---|
178 | kfree(sf_g);
|
---|
179 | }
|
---|
180 |
|
---|
181 | /**
|
---|
182 | * This is called (by sf_read_super_[24|26] when vfs mounts the fs and
|
---|
183 | * wants to read super_block.
|
---|
184 | *
|
---|
185 | * calls [sf_glob_alloc] to map the folder and allocate global
|
---|
186 | * information structure.
|
---|
187 | *
|
---|
188 | * initializes [sb], initializes root inode and dentry.
|
---|
189 | *
|
---|
190 | * should respect [flags]
|
---|
191 | */
|
---|
192 | static int sf_read_super_aux(struct super_block *sb, void *data, int flags)
|
---|
193 | {
|
---|
194 | int err;
|
---|
195 | struct dentry *droot;
|
---|
196 | struct inode *iroot;
|
---|
197 | struct sf_inode_info *sf_i;
|
---|
198 | struct sf_glob_info *sf_g;
|
---|
199 | SHFLFSOBJINFO fsinfo;
|
---|
200 | struct vbsf_mount_info_new *info;
|
---|
201 | bool fInodePut = true;
|
---|
202 |
|
---|
203 | TRACE();
|
---|
204 | if (!data)
|
---|
205 | {
|
---|
206 | LogFunc(("no mount info specified\n"));
|
---|
207 | return -EINVAL;
|
---|
208 | }
|
---|
209 |
|
---|
210 | info = data;
|
---|
211 |
|
---|
212 | if (flags & MS_REMOUNT)
|
---|
213 | {
|
---|
214 | LogFunc(("remounting is not supported\n"));
|
---|
215 | return -ENOSYS;
|
---|
216 | }
|
---|
217 |
|
---|
218 | err = sf_glob_alloc(info, &sf_g);
|
---|
219 | if (err)
|
---|
220 | goto fail0;
|
---|
221 |
|
---|
222 | sf_i = kmalloc(sizeof (*sf_i), GFP_KERNEL);
|
---|
223 | if (!sf_i)
|
---|
224 | {
|
---|
225 | err = -ENOMEM;
|
---|
226 | LogRelFunc(("could not allocate memory for root inode info\n"));
|
---|
227 | goto fail1;
|
---|
228 | }
|
---|
229 |
|
---|
230 | sf_i->handle = SHFL_HANDLE_NIL;
|
---|
231 | sf_i->path = kmalloc(sizeof(SHFLSTRING) + 1, GFP_KERNEL);
|
---|
232 | if (!sf_i->path)
|
---|
233 | {
|
---|
234 | err = -ENOMEM;
|
---|
235 | LogRelFunc(("could not allocate memory for root inode path\n"));
|
---|
236 | goto fail2;
|
---|
237 | }
|
---|
238 |
|
---|
239 | sf_i->path->u16Length = 1;
|
---|
240 | sf_i->path->u16Size = 2;
|
---|
241 | sf_i->path->String.utf8[0] = '/';
|
---|
242 | sf_i->path->String.utf8[1] = 0;
|
---|
243 |
|
---|
244 | err = sf_stat(__func__, sf_g, sf_i->path, &fsinfo, 0);
|
---|
245 | if (err)
|
---|
246 | {
|
---|
247 | LogFunc(("could not stat root of share\n"));
|
---|
248 | goto fail3;
|
---|
249 | }
|
---|
250 |
|
---|
251 | sb->s_magic = 0xface;
|
---|
252 | sb->s_blocksize = 1024;
|
---|
253 | #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 3)
|
---|
254 | /* Required for seek/sendfile.
|
---|
255 | *
|
---|
256 | * Must by less than or equal to INT64_MAX despite the fact that the
|
---|
257 | * declaration of this variable is unsigned long long. See determination
|
---|
258 | * of 'loff_t max' in fs/read_write.c / do_sendfile(). I don't know the
|
---|
259 | * correct limit but MAX_LFS_FILESIZE (8TB-1 on 32-bit boxes) takes the
|
---|
260 | * page cache into account and is the suggested limit. */
|
---|
261 | # if defined MAX_LFS_FILESIZE
|
---|
262 | sb->s_maxbytes = MAX_LFS_FILESIZE;
|
---|
263 | # else
|
---|
264 | sb->s_maxbytes = 0x7fffffffffffffffULL;
|
---|
265 | # endif
|
---|
266 | #endif
|
---|
267 | sb->s_op = &sf_super_ops;
|
---|
268 |
|
---|
269 | #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 25)
|
---|
270 | iroot = iget_locked(sb, 0);
|
---|
271 | #else
|
---|
272 | iroot = iget(sb, 0);
|
---|
273 | #endif
|
---|
274 | if (!iroot)
|
---|
275 | {
|
---|
276 | err = -ENOMEM; /* XXX */
|
---|
277 | LogFunc(("could not get root inode\n"));
|
---|
278 | goto fail3;
|
---|
279 | }
|
---|
280 |
|
---|
281 | if (sf_init_backing_dev(sf_g))
|
---|
282 | {
|
---|
283 | err = -EINVAL;
|
---|
284 | LogFunc(("could not init bdi\n"));
|
---|
285 | #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 25)
|
---|
286 | unlock_new_inode(iroot);
|
---|
287 | #endif
|
---|
288 | goto fail4;
|
---|
289 | }
|
---|
290 |
|
---|
291 | sf_init_inode(sf_g, iroot, &fsinfo);
|
---|
292 | SET_INODE_INFO(iroot, sf_i);
|
---|
293 |
|
---|
294 | #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 25)
|
---|
295 | unlock_new_inode(iroot);
|
---|
296 | #endif
|
---|
297 |
|
---|
298 | #if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0)
|
---|
299 | droot = d_make_root(iroot);
|
---|
300 | #else
|
---|
301 | droot = d_alloc_root(iroot);
|
---|
302 | #endif
|
---|
303 | if (!droot)
|
---|
304 | {
|
---|
305 | err = -ENOMEM; /* XXX */
|
---|
306 | LogFunc(("d_alloc_root failed\n"));
|
---|
307 | #if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0)
|
---|
308 | fInodePut = false;
|
---|
309 | #endif
|
---|
310 | goto fail5;
|
---|
311 | }
|
---|
312 |
|
---|
313 | sb->s_root = droot;
|
---|
314 | SET_GLOB_INFO(sb, sf_g);
|
---|
315 | return 0;
|
---|
316 |
|
---|
317 | fail5:
|
---|
318 | sf_done_backing_dev(sf_g);
|
---|
319 |
|
---|
320 | fail4:
|
---|
321 | if (fInodePut)
|
---|
322 | iput(iroot);
|
---|
323 |
|
---|
324 | fail3:
|
---|
325 | kfree(sf_i->path);
|
---|
326 |
|
---|
327 | fail2:
|
---|
328 | kfree(sf_i);
|
---|
329 |
|
---|
330 | fail1:
|
---|
331 | sf_glob_free(sf_g);
|
---|
332 |
|
---|
333 | fail0:
|
---|
334 | return err;
|
---|
335 | }
|
---|
336 |
|
---|
337 | #if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 0)
|
---|
338 | static struct super_block *
|
---|
339 | sf_read_super_24(struct super_block *sb, void *data, int flags)
|
---|
340 | {
|
---|
341 | int err;
|
---|
342 |
|
---|
343 | TRACE();
|
---|
344 | err = sf_read_super_aux(sb, data, flags);
|
---|
345 | if (err)
|
---|
346 | return NULL;
|
---|
347 |
|
---|
348 | return sb;
|
---|
349 | }
|
---|
350 | #endif
|
---|
351 |
|
---|
352 | /* this is called when vfs is about to destroy the [inode]. all
|
---|
353 | resources associated with this [inode] must be cleared here */
|
---|
354 | #if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 36)
|
---|
355 | static void sf_clear_inode(struct inode *inode)
|
---|
356 | {
|
---|
357 | struct sf_inode_info *sf_i;
|
---|
358 |
|
---|
359 | TRACE();
|
---|
360 | sf_i = GET_INODE_INFO(inode);
|
---|
361 | if (!sf_i)
|
---|
362 | return;
|
---|
363 |
|
---|
364 | BUG_ON(!sf_i->path);
|
---|
365 | kfree(sf_i->path);
|
---|
366 | kfree(sf_i);
|
---|
367 | SET_INODE_INFO(inode, NULL);
|
---|
368 | }
|
---|
369 | #else
|
---|
370 | static void sf_evict_inode(struct inode *inode)
|
---|
371 | {
|
---|
372 | struct sf_inode_info *sf_i;
|
---|
373 |
|
---|
374 | TRACE();
|
---|
375 | truncate_inode_pages(&inode->i_data, 0);
|
---|
376 | end_writeback(inode);
|
---|
377 |
|
---|
378 | sf_i = GET_INODE_INFO(inode);
|
---|
379 | if (!sf_i)
|
---|
380 | return;
|
---|
381 |
|
---|
382 | BUG_ON(!sf_i->path);
|
---|
383 | kfree(sf_i->path);
|
---|
384 | kfree(sf_i);
|
---|
385 | SET_INODE_INFO(inode, NULL);
|
---|
386 | }
|
---|
387 | #endif
|
---|
388 |
|
---|
389 | /* this is called by vfs when it wants to populate [inode] with data.
|
---|
390 | the only thing that is known about inode at this point is its index
|
---|
391 | hence we can't do anything here, and let lookup/whatever with the
|
---|
392 | job to properly fill then [inode] */
|
---|
393 | #if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 25)
|
---|
394 | static void sf_read_inode(struct inode *inode)
|
---|
395 | {
|
---|
396 | }
|
---|
397 | #endif
|
---|
398 |
|
---|
399 | /* vfs is done with [sb] (umount called) call [sf_glob_free] to unmap
|
---|
400 | the folder and free [sf_g] */
|
---|
401 | static void sf_put_super(struct super_block *sb)
|
---|
402 | {
|
---|
403 | struct sf_glob_info *sf_g;
|
---|
404 |
|
---|
405 | sf_g = GET_GLOB_INFO(sb);
|
---|
406 | BUG_ON(!sf_g);
|
---|
407 | sf_done_backing_dev(sf_g);
|
---|
408 | sf_glob_free(sf_g);
|
---|
409 | }
|
---|
410 |
|
---|
411 | #if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 18)
|
---|
412 | static int sf_statfs(struct super_block *sb, STRUCT_STATFS *stat)
|
---|
413 | {
|
---|
414 | return sf_get_volume_info(sb, stat);
|
---|
415 | }
|
---|
416 | #else
|
---|
417 | static int sf_statfs(struct dentry *dentry, STRUCT_STATFS *stat)
|
---|
418 | {
|
---|
419 | struct super_block *sb = dentry->d_inode->i_sb;
|
---|
420 | return sf_get_volume_info(sb, stat);
|
---|
421 | }
|
---|
422 | #endif
|
---|
423 |
|
---|
424 | static int sf_remount_fs(struct super_block *sb, int *flags, char *data)
|
---|
425 | {
|
---|
426 | #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 23)
|
---|
427 | struct sf_glob_info *sf_g;
|
---|
428 | struct vbsf_mount_info_new *info;
|
---|
429 | struct sf_inode_info *sf_i;
|
---|
430 | struct inode *iroot;
|
---|
431 | SHFLFSOBJINFO fsinfo;
|
---|
432 | int err;
|
---|
433 |
|
---|
434 | printk(KERN_DEBUG "ENTER: sf_remount_fs\n");
|
---|
435 | sf_g = GET_GLOB_INFO(sb);
|
---|
436 | BUG_ON(!sf_g);
|
---|
437 | BUG_ON(data[0] != 0);
|
---|
438 | info = (struct vbsf_mount_info_new *)data;
|
---|
439 | BUG_ON( info->signature[0] != VBSF_MOUNT_SIGNATURE_BYTE_0
|
---|
440 | || info->signature[1] != VBSF_MOUNT_SIGNATURE_BYTE_1
|
---|
441 | || info->signature[2] != VBSF_MOUNT_SIGNATURE_BYTE_2);
|
---|
442 |
|
---|
443 | sf_g->uid = info->uid;
|
---|
444 | sf_g->gid = info->gid;
|
---|
445 | sf_g->ttl = info->ttl;
|
---|
446 | sf_g->dmode = info->dmode;
|
---|
447 | sf_g->fmode = info->fmode;
|
---|
448 | sf_g->dmask = info->dmask;
|
---|
449 | sf_g->fmask = info->fmask;
|
---|
450 |
|
---|
451 | iroot = ilookup(sb, 0);
|
---|
452 | if (!iroot)
|
---|
453 | {
|
---|
454 | printk(KERN_DEBUG "can't find root inode\n");
|
---|
455 | return -ENOSYS;
|
---|
456 | }
|
---|
457 | sf_i = GET_INODE_INFO(iroot);
|
---|
458 | err = sf_stat(__func__, sf_g, sf_i->path, &fsinfo, 0);
|
---|
459 | BUG_ON(err != 0);
|
---|
460 | sf_init_inode(sf_g, iroot, &fsinfo);
|
---|
461 | /*unlock_new_inode(iroot);*/
|
---|
462 | printk(KERN_DEBUG "LEAVE: sf_remount_fs\n");
|
---|
463 | return 0;
|
---|
464 | #else
|
---|
465 | return -ENOSYS;
|
---|
466 | #endif
|
---|
467 | }
|
---|
468 |
|
---|
469 | static struct super_operations sf_super_ops =
|
---|
470 | {
|
---|
471 | #if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 36)
|
---|
472 | .clear_inode = sf_clear_inode,
|
---|
473 | #else
|
---|
474 | .evict_inode = sf_evict_inode,
|
---|
475 | #endif
|
---|
476 | #if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 25)
|
---|
477 | .read_inode = sf_read_inode,
|
---|
478 | #endif
|
---|
479 | .put_super = sf_put_super,
|
---|
480 | .statfs = sf_statfs,
|
---|
481 | .remount_fs = sf_remount_fs
|
---|
482 | };
|
---|
483 |
|
---|
484 | #if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 0)
|
---|
485 | static DECLARE_FSTYPE(vboxsf_fs_type, "vboxsf", sf_read_super_24, 0);
|
---|
486 | #else
|
---|
487 | static int
|
---|
488 | sf_read_super_26(struct super_block *sb, void *data, int flags)
|
---|
489 | {
|
---|
490 | int err;
|
---|
491 |
|
---|
492 | TRACE();
|
---|
493 | err = sf_read_super_aux(sb, data, flags);
|
---|
494 | if (err)
|
---|
495 | printk(KERN_DEBUG "sf_read_super_aux err=%d\n", err);
|
---|
496 |
|
---|
497 | return err;
|
---|
498 | }
|
---|
499 |
|
---|
500 | # if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 18)
|
---|
501 | static struct super_block *sf_get_sb(struct file_system_type *fs_type, int flags,
|
---|
502 | const char *dev_name, void *data)
|
---|
503 | {
|
---|
504 | TRACE();
|
---|
505 | return get_sb_nodev(fs_type, flags, data, sf_read_super_26);
|
---|
506 | }
|
---|
507 | # elif LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 39)
|
---|
508 | static int sf_get_sb(struct file_system_type *fs_type, int flags,
|
---|
509 | const char *dev_name, void *data, struct vfsmount *mnt)
|
---|
510 | {
|
---|
511 | TRACE();
|
---|
512 | return get_sb_nodev(fs_type, flags, data, sf_read_super_26, mnt);
|
---|
513 | }
|
---|
514 | # else
|
---|
515 | static struct dentry *sf_mount(struct file_system_type *fs_type, int flags,
|
---|
516 | const char *dev_name, void *data)
|
---|
517 | {
|
---|
518 | TRACE();
|
---|
519 | return mount_nodev(fs_type, flags, data, sf_read_super_26);
|
---|
520 | }
|
---|
521 | # endif
|
---|
522 |
|
---|
523 | static struct file_system_type vboxsf_fs_type =
|
---|
524 | {
|
---|
525 | .owner = THIS_MODULE,
|
---|
526 | .name = "vboxsf",
|
---|
527 | # if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 39)
|
---|
528 | .get_sb = sf_get_sb,
|
---|
529 | # else
|
---|
530 | .mount = sf_mount,
|
---|
531 | # endif
|
---|
532 | .kill_sb = kill_anon_super
|
---|
533 | };
|
---|
534 | #endif
|
---|
535 |
|
---|
536 | #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 0)
|
---|
537 | static int follow_symlinks = 0;
|
---|
538 | module_param(follow_symlinks, int, 0);
|
---|
539 | MODULE_PARM_DESC(follow_symlinks, "Let host resolve symlinks rather than showing them");
|
---|
540 | #endif
|
---|
541 |
|
---|
542 | /* Module initialization/finalization handlers */
|
---|
543 | static int __init init(void)
|
---|
544 | {
|
---|
545 | int rcVBox;
|
---|
546 | int rcRet = 0;
|
---|
547 | int err;
|
---|
548 |
|
---|
549 | TRACE();
|
---|
550 |
|
---|
551 | if (sizeof(struct vbsf_mount_info_new) > PAGE_SIZE)
|
---|
552 | {
|
---|
553 | printk(KERN_ERR
|
---|
554 | "Mount information structure is too large %lu\n"
|
---|
555 | "Must be less than or equal to %lu\n",
|
---|
556 | (unsigned long)sizeof (struct vbsf_mount_info_new),
|
---|
557 | (unsigned long)PAGE_SIZE);
|
---|
558 | return -EINVAL;
|
---|
559 | }
|
---|
560 |
|
---|
561 | err = register_filesystem(&vboxsf_fs_type);
|
---|
562 | if (err)
|
---|
563 | {
|
---|
564 | LogFunc(("register_filesystem err=%d\n", err));
|
---|
565 | return err;
|
---|
566 | }
|
---|
567 |
|
---|
568 | rcVBox = vboxInit();
|
---|
569 | if (RT_FAILURE(rcVBox))
|
---|
570 | {
|
---|
571 | LogRelFunc(("vboxInit failed, rc=%d\n", rcVBox));
|
---|
572 | rcRet = -EPROTO;
|
---|
573 | goto fail0;
|
---|
574 | }
|
---|
575 |
|
---|
576 | rcVBox = vboxConnect(&client_handle);
|
---|
577 | if (RT_FAILURE(rcVBox))
|
---|
578 | {
|
---|
579 | LogRelFunc(("vboxConnect failed, rc=%d\n", rcVBox));
|
---|
580 | rcRet = -EPROTO;
|
---|
581 | goto fail1;
|
---|
582 | }
|
---|
583 |
|
---|
584 | rcVBox = vboxCallSetUtf8(&client_handle);
|
---|
585 | if (RT_FAILURE(rcVBox))
|
---|
586 | {
|
---|
587 | LogRelFunc(("vboxCallSetUtf8 failed, rc=%d\n", rcVBox));
|
---|
588 | rcRet = -EPROTO;
|
---|
589 | goto fail2;
|
---|
590 | }
|
---|
591 |
|
---|
592 | #if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 0)
|
---|
593 | if (!follow_symlinks)
|
---|
594 | {
|
---|
595 | rcVBox = vboxCallSetSymlinks(&client_handle);
|
---|
596 | if (RT_FAILURE(rcVBox))
|
---|
597 | {
|
---|
598 | printk(KERN_WARNING
|
---|
599 | "vboxsf: Host unable to show symlinks, rc=%d\n",
|
---|
600 | rcVBox);
|
---|
601 | }
|
---|
602 | }
|
---|
603 | #endif
|
---|
604 |
|
---|
605 | printk(KERN_DEBUG
|
---|
606 | "vboxsf: Successfully loaded version " VBOX_VERSION_STRING
|
---|
607 | " (interface " RT_XSTR(VMMDEV_VERSION) ")\n");
|
---|
608 |
|
---|
609 | return 0;
|
---|
610 |
|
---|
611 | fail2:
|
---|
612 | vboxDisconnect(&client_handle);
|
---|
613 |
|
---|
614 | fail1:
|
---|
615 | vboxUninit();
|
---|
616 |
|
---|
617 | fail0:
|
---|
618 | unregister_filesystem(&vboxsf_fs_type);
|
---|
619 | return rcRet;
|
---|
620 | }
|
---|
621 |
|
---|
622 | static void __exit fini(void)
|
---|
623 | {
|
---|
624 | TRACE();
|
---|
625 |
|
---|
626 | vboxDisconnect(&client_handle);
|
---|
627 | vboxUninit();
|
---|
628 | unregister_filesystem(&vboxsf_fs_type);
|
---|
629 | }
|
---|
630 |
|
---|
631 | module_init(init);
|
---|
632 | module_exit(fini);
|
---|
633 |
|
---|
634 | /* C++ hack */
|
---|
635 | int __gxx_personality_v0 = 0xdeadbeef;
|
---|