VirtualBox

source: vbox/trunk/src/VBox/Additions/linux/sharedfolders/vfsmod.c@ 67597

Last change on this file since 67597 was 66107, checked in by vboxsync, 8 years ago

Additions/linux/shardfolders: trailing spaces

  • Property svn:eol-style set to native
  • Property svn:keywords set to Author Date Id Revision
File size: 16.3 KB
Line 
1/** @file
2 *
3 * vboxsf -- VirtualBox Guest Additions for Linux:
4 * Virtual File System for VirtualBox Shared Folders
5 *
6 * Module initialization/finalization
7 * File system registration/deregistration
8 * Superblock reading
9 * Few utility functions
10 */
11
12/*
13 * Copyright (C) 2006-2016 Oracle Corporation
14 *
15 * This file is part of VirtualBox Open Source Edition (OSE), as
16 * available from http://www.virtualbox.org. This file is free software;
17 * you can redistribute it and/or modify it under the terms of the GNU
18 * General Public License (GPL) as published by the Free Software
19 * Foundation, in version 2 as it comes in the "COPYING" file of the
20 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
21 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
22 */
23
24/**
25 * @note Anyone wishing to make changes here might wish to take a look at
26 * http://www.atnf.csiro.au/people/rgooch/linux/vfs.txt
27 * which seems to be the closest there is to official documentation on
28 * writing filesystem drivers for Linux.
29 */
30
31#include "vfsmod.h"
32#include "version-generated.h"
33#include "revision-generated.h"
34#include "product-generated.h"
35
36MODULE_DESCRIPTION(VBOX_PRODUCT " VFS Module for Host File System Access");
37MODULE_AUTHOR(VBOX_VENDOR);
38MODULE_LICENSE("GPL");
39#ifdef MODULE_ALIAS_FS
40MODULE_ALIAS_FS("vboxsf");
41#endif
42#ifdef MODULE_VERSION
43MODULE_VERSION(VBOX_VERSION_STRING " r" RT_XSTR(VBOX_SVN_REV));
44#endif
45
46/* globals */
47VBGLSFCLIENT client_handle;
48
49/* forward declarations */
50static struct super_operations sf_super_ops;
51
52/* allocate global info, try to map host share */
53static int sf_glob_alloc(struct vbsf_mount_info_new *info, struct sf_glob_info **sf_gp)
54{
55 int err, rc;
56 SHFLSTRING *str_name;
57 size_t name_len, str_len;
58 struct sf_glob_info *sf_g;
59
60 TRACE();
61 sf_g = kmalloc(sizeof(*sf_g), GFP_KERNEL);
62 if (!sf_g)
63 {
64 err = -ENOMEM;
65 LogRelFunc(("could not allocate memory for global info\n"));
66 goto fail0;
67 }
68
69 RT_ZERO(*sf_g);
70
71 if ( info->nullchar != '\0'
72 || info->signature[0] != VBSF_MOUNT_SIGNATURE_BYTE_0
73 || info->signature[1] != VBSF_MOUNT_SIGNATURE_BYTE_1
74 || info->signature[2] != VBSF_MOUNT_SIGNATURE_BYTE_2)
75 {
76 /* An old version of mount.vboxsf made the syscall. Translate the
77 * old parameters to the new structure. */
78 struct vbsf_mount_info_old *info_old = (struct vbsf_mount_info_old *)info;
79 static struct vbsf_mount_info_new info_compat;
80
81 info = &info_compat;
82 memset(info, 0, sizeof(*info));
83 memcpy(&info->name, &info_old->name, MAX_HOST_NAME);
84 memcpy(&info->nls_name, &info_old->nls_name, MAX_NLS_NAME);
85 info->length = offsetof(struct vbsf_mount_info_new, dmode);
86 info->uid = info_old->uid;
87 info->gid = info_old->gid;
88 info->ttl = info_old->ttl;
89 }
90
91 info->name[sizeof(info->name) - 1] = 0;
92 info->nls_name[sizeof(info->nls_name) - 1] = 0;
93
94 name_len = strlen(info->name);
95 if (name_len > 0xfffe)
96 {
97 err = -ENAMETOOLONG;
98 LogFunc(("map name too big\n"));
99 goto fail1;
100 }
101
102 str_len = offsetof(SHFLSTRING, String.utf8) + name_len + 1;
103 str_name = kmalloc(str_len, GFP_KERNEL);
104 if (!str_name)
105 {
106 err = -ENOMEM;
107 LogRelFunc(("could not allocate memory for host name\n"));
108 goto fail1;
109 }
110
111 str_name->u16Length = name_len;
112 str_name->u16Size = name_len + 1;
113 memcpy(str_name->String.utf8, info->name, name_len + 1);
114
115#define _IS_UTF8(_str) \
116 (strcmp(_str, "utf8") == 0)
117#define _IS_EMPTY(_str) \
118 (strcmp(_str, "") == 0)
119
120 /* Check if NLS charset is valid and not points to UTF8 table */
121 if (info->nls_name[0])
122 {
123 if (_IS_UTF8(info->nls_name))
124 sf_g->nls = NULL;
125 else
126 {
127 sf_g->nls = load_nls(info->nls_name);
128 if (!sf_g->nls)
129 {
130 err = -EINVAL;
131 LogFunc(("failed to load nls %s\n", info->nls_name));
132 goto fail1;
133 }
134 }
135 }
136 else
137 {
138#ifdef CONFIG_NLS_DEFAULT
139 /* If no NLS charset specified, try to load the default
140 * one if it's not points to UTF8. */
141 if (!_IS_UTF8(CONFIG_NLS_DEFAULT) && !_IS_EMPTY(CONFIG_NLS_DEFAULT))
142 sf_g->nls = load_nls_default();
143 else
144 sf_g->nls = NULL;
145#else
146 sf_g->nls = NULL;
147#endif
148
149#undef _IS_UTF8
150#undef _IS_EMPTY
151 }
152
153 rc = VbglR0SfMapFolder(&client_handle, str_name, &sf_g->map);
154 kfree(str_name);
155
156 if (RT_FAILURE(rc))
157 {
158 err = -EPROTO;
159 LogFunc(("VbglR0SfMapFolder failed rc=%d\n", rc));
160 goto fail2;
161 }
162
163 sf_g->ttl = info->ttl;
164 sf_g->uid = info->uid;
165 sf_g->gid = info->gid;
166
167 if ((unsigned)info->length >= sizeof(struct vbsf_mount_info_new))
168 {
169 /* new fields */
170 sf_g->dmode = info->dmode;
171 sf_g->fmode = info->fmode;
172 sf_g->dmask = info->dmask;
173 sf_g->fmask = info->fmask;
174 }
175 else
176 {
177 sf_g->dmode = ~0;
178 sf_g->fmode = ~0;
179 }
180
181 *sf_gp = sf_g;
182 return 0;
183
184fail2:
185 if (sf_g->nls)
186 unload_nls(sf_g->nls);
187
188fail1:
189 kfree(sf_g);
190
191fail0:
192 return err;
193}
194
195/* unmap the share and free global info [sf_g] */
196static void
197sf_glob_free(struct sf_glob_info *sf_g)
198{
199 int rc;
200
201 TRACE();
202 rc = VbglR0SfUnmapFolder(&client_handle, &sf_g->map);
203 if (RT_FAILURE(rc))
204 LogFunc(("VbglR0SfUnmapFolder failed rc=%d\n", rc));
205
206 if (sf_g->nls)
207 unload_nls(sf_g->nls);
208
209 kfree(sf_g);
210}
211
212/**
213 * This is called (by sf_read_super_[24|26] when vfs mounts the fs and
214 * wants to read super_block.
215 *
216 * calls [sf_glob_alloc] to map the folder and allocate global
217 * information structure.
218 *
219 * initializes [sb], initializes root inode and dentry.
220 *
221 * should respect [flags]
222 */
223static int sf_read_super_aux(struct super_block *sb, void *data, int flags)
224{
225 int err;
226 struct dentry *droot;
227 struct inode *iroot;
228 struct sf_inode_info *sf_i;
229 struct sf_glob_info *sf_g;
230 SHFLFSOBJINFO fsinfo;
231 struct vbsf_mount_info_new *info;
232 bool fInodePut = true;
233
234 TRACE();
235 if (!data)
236 {
237 LogFunc(("no mount info specified\n"));
238 return -EINVAL;
239 }
240
241 info = data;
242
243 if (flags & MS_REMOUNT)
244 {
245 LogFunc(("remounting is not supported\n"));
246 return -ENOSYS;
247 }
248
249 err = sf_glob_alloc(info, &sf_g);
250 if (err)
251 goto fail0;
252
253 sf_i = kmalloc(sizeof (*sf_i), GFP_KERNEL);
254 if (!sf_i)
255 {
256 err = -ENOMEM;
257 LogRelFunc(("could not allocate memory for root inode info\n"));
258 goto fail1;
259 }
260
261 sf_i->handle = SHFL_HANDLE_NIL;
262 sf_i->path = kmalloc(sizeof(SHFLSTRING) + 1, GFP_KERNEL);
263 if (!sf_i->path)
264 {
265 err = -ENOMEM;
266 LogRelFunc(("could not allocate memory for root inode path\n"));
267 goto fail2;
268 }
269
270 sf_i->path->u16Length = 1;
271 sf_i->path->u16Size = 2;
272 sf_i->path->String.utf8[0] = '/';
273 sf_i->path->String.utf8[1] = 0;
274 sf_i->force_reread = 0;
275
276 err = sf_stat(__func__, sf_g, sf_i->path, &fsinfo, 0);
277 if (err)
278 {
279 LogFunc(("could not stat root of share\n"));
280 goto fail3;
281 }
282
283 sb->s_magic = 0xface;
284 sb->s_blocksize = 1024;
285#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 3)
286 /* Required for seek/sendfile.
287 *
288 * Must by less than or equal to INT64_MAX despite the fact that the
289 * declaration of this variable is unsigned long long. See determination
290 * of 'loff_t max' in fs/read_write.c / do_sendfile(). I don't know the
291 * correct limit but MAX_LFS_FILESIZE (8TB-1 on 32-bit boxes) takes the
292 * page cache into account and is the suggested limit. */
293# if defined MAX_LFS_FILESIZE
294 sb->s_maxbytes = MAX_LFS_FILESIZE;
295# else
296 sb->s_maxbytes = 0x7fffffffffffffffULL;
297# endif
298#endif
299 sb->s_op = &sf_super_ops;
300
301#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 25)
302 iroot = iget_locked(sb, 0);
303#else
304 iroot = iget(sb, 0);
305#endif
306 if (!iroot)
307 {
308 err = -ENOMEM; /* XXX */
309 LogFunc(("could not get root inode\n"));
310 goto fail3;
311 }
312
313 if (sf_init_backing_dev(sf_g))
314 {
315 err = -EINVAL;
316 LogFunc(("could not init bdi\n"));
317#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 25)
318 unlock_new_inode(iroot);
319#endif
320 goto fail4;
321 }
322
323 sf_init_inode(sf_g, iroot, &fsinfo);
324 SET_INODE_INFO(iroot, sf_i);
325
326#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 25)
327 unlock_new_inode(iroot);
328#endif
329
330#if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0)
331 droot = d_make_root(iroot);
332#else
333 droot = d_alloc_root(iroot);
334#endif
335 if (!droot)
336 {
337 err = -ENOMEM; /* XXX */
338 LogFunc(("d_alloc_root failed\n"));
339#if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0)
340 fInodePut = false;
341#endif
342 goto fail5;
343 }
344
345 sb->s_root = droot;
346 SET_GLOB_INFO(sb, sf_g);
347 return 0;
348
349fail5:
350 sf_done_backing_dev(sf_g);
351
352fail4:
353 if (fInodePut)
354 iput(iroot);
355
356fail3:
357 kfree(sf_i->path);
358
359fail2:
360 kfree(sf_i);
361
362fail1:
363 sf_glob_free(sf_g);
364
365fail0:
366 return err;
367}
368
369#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 0)
370static struct super_block *
371sf_read_super_24(struct super_block *sb, void *data, int flags)
372{
373 int err;
374
375 TRACE();
376 err = sf_read_super_aux(sb, data, flags);
377 if (err)
378 return NULL;
379
380 return sb;
381}
382#endif
383
384/* this is called when vfs is about to destroy the [inode]. all
385 resources associated with this [inode] must be cleared here */
386#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 36)
387static void sf_clear_inode(struct inode *inode)
388{
389 struct sf_inode_info *sf_i;
390
391 TRACE();
392 sf_i = GET_INODE_INFO(inode);
393 if (!sf_i)
394 return;
395
396 BUG_ON(!sf_i->path);
397 kfree(sf_i->path);
398 kfree(sf_i);
399 SET_INODE_INFO(inode, NULL);
400}
401#else
402static void sf_evict_inode(struct inode *inode)
403{
404 struct sf_inode_info *sf_i;
405
406 TRACE();
407 truncate_inode_pages(&inode->i_data, 0);
408# if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 5, 0)
409 clear_inode(inode);
410# else
411 end_writeback(inode);
412# endif
413
414 sf_i = GET_INODE_INFO(inode);
415 if (!sf_i)
416 return;
417
418 BUG_ON(!sf_i->path);
419 kfree(sf_i->path);
420 kfree(sf_i);
421 SET_INODE_INFO(inode, NULL);
422}
423#endif
424
425/* this is called by vfs when it wants to populate [inode] with data.
426 the only thing that is known about inode at this point is its index
427 hence we can't do anything here, and let lookup/whatever with the
428 job to properly fill then [inode] */
429#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 25)
430static void sf_read_inode(struct inode *inode)
431{
432}
433#endif
434
435/* vfs is done with [sb] (umount called) call [sf_glob_free] to unmap
436 the folder and free [sf_g] */
437static void sf_put_super(struct super_block *sb)
438{
439 struct sf_glob_info *sf_g;
440
441 sf_g = GET_GLOB_INFO(sb);
442 BUG_ON(!sf_g);
443 sf_done_backing_dev(sf_g);
444 sf_glob_free(sf_g);
445}
446
447#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 18)
448static int sf_statfs(struct super_block *sb, STRUCT_STATFS *stat)
449{
450 return sf_get_volume_info(sb, stat);
451}
452#else
453static int sf_statfs(struct dentry *dentry, STRUCT_STATFS *stat)
454{
455 struct super_block *sb = dentry->d_inode->i_sb;
456 return sf_get_volume_info(sb, stat);
457}
458#endif
459
460static int sf_remount_fs(struct super_block *sb, int *flags, char *data)
461{
462#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 23)
463 struct sf_glob_info *sf_g;
464 struct sf_inode_info *sf_i;
465 struct inode *iroot;
466 SHFLFSOBJINFO fsinfo;
467 int err;
468
469 sf_g = GET_GLOB_INFO(sb);
470 BUG_ON(!sf_g);
471 if (data && data[0] != 0)
472 {
473 struct vbsf_mount_info_new *info =
474 (struct vbsf_mount_info_new *)data;
475 if ( info->signature[0] == VBSF_MOUNT_SIGNATURE_BYTE_0
476 && info->signature[1] == VBSF_MOUNT_SIGNATURE_BYTE_1
477 && info->signature[2] == VBSF_MOUNT_SIGNATURE_BYTE_2)
478 {
479 sf_g->uid = info->uid;
480 sf_g->gid = info->gid;
481 sf_g->ttl = info->ttl;
482 sf_g->dmode = info->dmode;
483 sf_g->fmode = info->fmode;
484 sf_g->dmask = info->dmask;
485 sf_g->fmask = info->fmask;
486 }
487 }
488
489 iroot = ilookup(sb, 0);
490 if (!iroot)
491 return -ENOSYS;
492
493 sf_i = GET_INODE_INFO(iroot);
494 err = sf_stat(__func__, sf_g, sf_i->path, &fsinfo, 0);
495 BUG_ON(err != 0);
496 sf_init_inode(sf_g, iroot, &fsinfo);
497 /*unlock_new_inode(iroot);*/
498 return 0;
499#else
500 return -ENOSYS;
501#endif
502}
503
504static struct super_operations sf_super_ops =
505{
506#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 36)
507 .clear_inode = sf_clear_inode,
508#else
509 .evict_inode = sf_evict_inode,
510#endif
511#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 25)
512 .read_inode = sf_read_inode,
513#endif
514 .put_super = sf_put_super,
515 .statfs = sf_statfs,
516 .remount_fs = sf_remount_fs
517};
518
519#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 0)
520static DECLARE_FSTYPE(vboxsf_fs_type, "vboxsf", sf_read_super_24, 0);
521#else
522static int
523sf_read_super_26(struct super_block *sb, void *data, int flags)
524{
525 int err;
526
527 TRACE();
528 err = sf_read_super_aux(sb, data, flags);
529 if (err)
530 printk(KERN_DEBUG "sf_read_super_aux err=%d\n", err);
531
532 return err;
533}
534
535# if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 18)
536static struct super_block *sf_get_sb(struct file_system_type *fs_type, int flags,
537 const char *dev_name, void *data)
538{
539 TRACE();
540 return get_sb_nodev(fs_type, flags, data, sf_read_super_26);
541}
542# elif LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 39)
543static int sf_get_sb(struct file_system_type *fs_type, int flags,
544 const char *dev_name, void *data, struct vfsmount *mnt)
545{
546 TRACE();
547 return get_sb_nodev(fs_type, flags, data, sf_read_super_26, mnt);
548}
549# else
550static struct dentry *sf_mount(struct file_system_type *fs_type, int flags,
551 const char *dev_name, void *data)
552{
553 TRACE();
554 return mount_nodev(fs_type, flags, data, sf_read_super_26);
555}
556# endif
557
558static struct file_system_type vboxsf_fs_type =
559{
560 .owner = THIS_MODULE,
561 .name = "vboxsf",
562# if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 39)
563 .get_sb = sf_get_sb,
564# else
565 .mount = sf_mount,
566# endif
567 .kill_sb = kill_anon_super
568};
569#endif
570
571#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 0)
572static int follow_symlinks = 0;
573module_param(follow_symlinks, int, 0);
574MODULE_PARM_DESC(follow_symlinks, "Let host resolve symlinks rather than showing them");
575#endif
576
577/* Module initialization/finalization handlers */
578static int __init init(void)
579{
580 int rcVBox;
581 int rcRet = 0;
582 int err;
583
584 TRACE();
585
586 if (sizeof(struct vbsf_mount_info_new) > PAGE_SIZE)
587 {
588 printk(KERN_ERR
589 "Mount information structure is too large %lu\n"
590 "Must be less than or equal to %lu\n",
591 (unsigned long)sizeof (struct vbsf_mount_info_new),
592 (unsigned long)PAGE_SIZE);
593 return -EINVAL;
594 }
595
596 err = register_filesystem(&vboxsf_fs_type);
597 if (err)
598 {
599 LogFunc(("register_filesystem err=%d\n", err));
600 return err;
601 }
602
603 rcVBox = VbglR0SfInit();
604 if (RT_FAILURE(rcVBox))
605 {
606 LogRelFunc(("VbglR0SfInit failed, rc=%d\n", rcVBox));
607 rcRet = -EPROTO;
608 goto fail0;
609 }
610
611 rcVBox = VbglR0SfConnect(&client_handle);
612 if (RT_FAILURE(rcVBox))
613 {
614 LogRelFunc(("VbglR0SfConnect failed, rc=%d\n", rcVBox));
615 rcRet = -EPROTO;
616 goto fail1;
617 }
618
619 rcVBox = VbglR0SfSetUtf8(&client_handle);
620 if (RT_FAILURE(rcVBox))
621 {
622 LogRelFunc(("VbglR0SfSetUtf8 failed, rc=%d\n", rcVBox));
623 rcRet = -EPROTO;
624 goto fail2;
625 }
626
627#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 0)
628 if (!follow_symlinks)
629 {
630 rcVBox = VbglR0SfSetSymlinks(&client_handle);
631 if (RT_FAILURE(rcVBox))
632 {
633 printk(KERN_WARNING
634 "vboxsf: Host unable to show symlinks, rc=%d\n",
635 rcVBox);
636 }
637 }
638#endif
639
640 printk(KERN_DEBUG
641 "vboxsf: Successfully loaded version " VBOX_VERSION_STRING
642 " (interface " RT_XSTR(VMMDEV_VERSION) ")\n");
643
644 return 0;
645
646fail2:
647 VbglR0SfDisconnect(&client_handle);
648
649fail1:
650 VbglR0SfTerm();
651
652fail0:
653 unregister_filesystem(&vboxsf_fs_type);
654 return rcRet;
655}
656
657static void __exit fini(void)
658{
659 TRACE();
660
661 VbglR0SfDisconnect(&client_handle);
662 VbglR0SfTerm();
663 unregister_filesystem(&vboxsf_fs_type);
664}
665
666module_init(init);
667module_exit(fini);
668
669/* C++ hack */
670int __gxx_personality_v0 = 0xdeadbeef;
Note: See TracBrowser for help on using the repository browser.

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette