vfsmod.c revision d3e0466e19699ab16033a59cd252b173e568abd1
/** @file
*
* vboxsf -- VirtualBox Guest Additions for Linux:
* Virtual File System for VirtualBox Shared Folders
*
* Module initialization/finalization
* File system registration/deregistration
* Superblock reading
* Few utility functions
*/
/*
* Copyright (C) 2006-2012 Oracle Corporation
*
* This file is part of VirtualBox Open Source Edition (OSE), as
* available from http://www.virtualbox.org. This file is free software;
* you can redistribute it and/or modify it under the terms of the GNU
* General Public License (GPL) as published by the Free Software
* Foundation, in version 2 as it comes in the "COPYING" file of the
* VirtualBox OSE distribution. VirtualBox OSE is distributed in the
* hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
*/
/**
* @note Anyone wishing to make changes here might wish to take a look at
* http://www.atnf.csiro.au/people/rgooch/linux/vfs.txt
* which seems to be the closest there is to official documentation on
* writing filesystem drivers for Linux.
*/
#include "vfsmod.h"
MODULE_DESCRIPTION(VBOX_PRODUCT " VFS Module for Host File System Access");
MODULE_AUTHOR(VBOX_VENDOR);
MODULE_LICENSE("GPL");
#ifdef MODULE_VERSION
MODULE_VERSION(VBOX_VERSION_STRING " (interface " RT_XSTR(VMMDEV_VERSION) ")");
#endif
/* globals */
VBSFCLIENT client_handle;
/* forward declarations */
static struct super_operations sf_super_ops;
/* allocate global info, try to map host share */
static int sf_glob_alloc(struct vbsf_mount_info_new *info, struct sf_glob_info **sf_gp)
{
int err, rc;
SHFLSTRING *str_name;
size_t name_len, str_len;
struct sf_glob_info *sf_g;
TRACE();
sf_g = kmalloc(sizeof(*sf_g), GFP_KERNEL);
if (!sf_g)
{
err = -ENOMEM;
LogRelFunc(("could not allocate memory for global info\n"));
goto fail0;
}
RT_ZERO(*sf_g);
if ( info->nullchar != '\0'
|| info->signature[0] != VBSF_MOUNT_SIGNATURE_BYTE_0
|| info->signature[1] != VBSF_MOUNT_SIGNATURE_BYTE_1
|| info->signature[2] != VBSF_MOUNT_SIGNATURE_BYTE_2)
{
/* An old version of mount.vboxsf made the syscall. Translate the
* old parameters to the new structure. */
struct vbsf_mount_info_old *info_old = (struct vbsf_mount_info_old *)info;
static struct vbsf_mount_info_new info_compat;
info = &info_compat;
memset(info, 0, sizeof(*info));
memcpy(&info->name, &info_old->name, MAX_HOST_NAME);
memcpy(&info->nls_name, &info_old->nls_name, MAX_NLS_NAME);
info->length = offsetof(struct vbsf_mount_info_new, dmode);
info->uid = info_old->uid;
info->gid = info_old->gid;
info->ttl = info_old->ttl;
}
info->name[sizeof(info->name) - 1] = 0;
info->nls_name[sizeof(info->nls_name) - 1] = 0;
name_len = strlen(info->name);
if (name_len > 0xfffe)
{
err = -ENAMETOOLONG;
LogFunc(("map name too big\n"));
goto fail1;
}
str_len = offsetof(SHFLSTRING, String.utf8) + name_len + 1;
str_name = kmalloc(str_len, GFP_KERNEL);
if (!str_name)
{
err = -ENOMEM;
LogRelFunc(("could not allocate memory for host name\n"));
goto fail1;
}
str_name->u16Length = name_len;
str_name->u16Size = name_len + 1;
memcpy(str_name->String.utf8, info->name, name_len + 1);
#define _IS_UTF8(_str) \
(strcmp(_str, "utf8") == 0)
#define _IS_EMPTY(_str) \
(strcmp(_str, "") == 0)
/* Check if NLS charset is valid and not points to UTF8 table */
if (info->nls_name[0])
{
if (_IS_UTF8(info->nls_name))
sf_g->nls = NULL;
else
{
sf_g->nls = load_nls(info->nls_name);
if (!sf_g->nls)
{
err = -EINVAL;
LogFunc(("failed to load nls %s\n", info->nls_name));
goto fail1;
}
}
}
else
{
#ifdef CONFIG_NLS_DEFAULT
/* If no NLS charset specified, try to load the default
* one if it's not points to UTF8. */
if (!_IS_UTF8(CONFIG_NLS_DEFAULT) && !_IS_EMPTY(CONFIG_NLS_DEFAULT))
sf_g->nls = load_nls_default();
else
sf_g->nls = NULL;
#else
sf_g->nls = NULL;
#endif
#undef _IS_UTF8
#undef _IS_EMPTY
}
rc = vboxCallMapFolder(&client_handle, str_name, &sf_g->map);
kfree(str_name);
if (RT_FAILURE(rc))
{
err = -EPROTO;
LogFunc(("vboxCallMapFolder failed rc=%d\n", rc));
goto fail2;
}
sf_g->ttl = info->ttl;
sf_g->uid = info->uid;
sf_g->gid = info->gid;
if ((unsigned)info->length >= sizeof(struct vbsf_mount_info_new))
{
/* new fields */
sf_g->dmode = info->dmode;
sf_g->fmode = info->fmode;
sf_g->dmask = info->dmask;
sf_g->fmask = info->fmask;
}
else
{
sf_g->dmode = ~0;
sf_g->fmode = ~0;
}
*sf_gp = sf_g;
return 0;
fail2:
if (sf_g->nls)
unload_nls(sf_g->nls);
fail1:
kfree(sf_g);
fail0:
return err;
}
/* unmap the share and free global info [sf_g] */
static void
sf_glob_free(struct sf_glob_info *sf_g)
{
int rc;
TRACE();
rc = vboxCallUnmapFolder(&client_handle, &sf_g->map);
if (RT_FAILURE(rc))
LogFunc(("vboxCallUnmapFolder failed rc=%d\n", rc));
if (sf_g->nls)
unload_nls(sf_g->nls);
kfree(sf_g);
}
/**
* This is called (by sf_read_super_[24|26] when vfs mounts the fs and
* wants to read super_block.
*
* calls [sf_glob_alloc] to map the folder and allocate global
* information structure.
*
* initializes [sb], initializes root inode and dentry.
*
* should respect [flags]
*/
static int sf_read_super_aux(struct super_block *sb, void *data, int flags)
{
int err;
struct dentry *droot;
struct inode *iroot;
struct sf_inode_info *sf_i;
struct sf_glob_info *sf_g;
SHFLFSOBJINFO fsinfo;
struct vbsf_mount_info_new *info;
bool fInodePut = true;
TRACE();
if (!data)
{
LogFunc(("no mount info specified\n"));
return -EINVAL;
}
info = data;
if (flags & MS_REMOUNT)
{
LogFunc(("remounting is not supported\n"));
return -ENOSYS;
}
err = sf_glob_alloc(info, &sf_g);
if (err)
goto fail0;
sf_i = kmalloc(sizeof (*sf_i), GFP_KERNEL);
if (!sf_i)
{
err = -ENOMEM;
LogRelFunc(("could not allocate memory for root inode info\n"));
goto fail1;
}
sf_i->handle = SHFL_HANDLE_NIL;
sf_i->path = kmalloc(sizeof(SHFLSTRING) + 1, GFP_KERNEL);
if (!sf_i->path)
{
err = -ENOMEM;
LogRelFunc(("could not allocate memory for root inode path\n"));
goto fail2;
}
sf_i->path->u16Length = 1;
sf_i->path->u16Size = 2;
sf_i->path->String.utf8[0] = '/';
sf_i->path->String.utf8[1] = 0;
sf_i->force_reread = 0;
err = sf_stat(__func__, sf_g, sf_i->path, &fsinfo, 0);
if (err)
{
LogFunc(("could not stat root of share\n"));
goto fail3;
}
sb->s_magic = 0xface;
sb->s_blocksize = 1024;
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 3)
/* Required for seek/sendfile.
*
* Must by less than or equal to INT64_MAX despite the fact that the
* declaration of this variable is unsigned long long. See determination
* of 'loff_t max' in fs/read_write.c / do_sendfile(). I don't know the
* correct limit but MAX_LFS_FILESIZE (8TB-1 on 32-bit boxes) takes the
* page cache into account and is the suggested limit. */
# if defined MAX_LFS_FILESIZE
sb->s_maxbytes = MAX_LFS_FILESIZE;
# else
sb->s_maxbytes = 0x7fffffffffffffffULL;
# endif
#endif
sb->s_op = &sf_super_ops;
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 25)
iroot = iget_locked(sb, 0);
#else
iroot = iget(sb, 0);
#endif
if (!iroot)
{
err = -ENOMEM; /* XXX */
LogFunc(("could not get root inode\n"));
goto fail3;
}
if (sf_init_backing_dev(sf_g))
{
err = -EINVAL;
LogFunc(("could not init bdi\n"));
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 25)
unlock_new_inode(iroot);
#endif
goto fail4;
}
sf_init_inode(sf_g, iroot, &fsinfo);
SET_INODE_INFO(iroot, sf_i);
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 25)
unlock_new_inode(iroot);
#endif
#if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0)
droot = d_make_root(iroot);
#else
droot = d_alloc_root(iroot);
#endif
if (!droot)
{
err = -ENOMEM; /* XXX */
LogFunc(("d_alloc_root failed\n"));
#if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 4, 0)
fInodePut = false;
#endif
goto fail5;
}
sb->s_root = droot;
SET_GLOB_INFO(sb, sf_g);
return 0;
fail5:
sf_done_backing_dev(sf_g);
fail4:
if (fInodePut)
iput(iroot);
fail3:
kfree(sf_i->path);
fail2:
kfree(sf_i);
fail1:
sf_glob_free(sf_g);
fail0:
return err;
}
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 0)
static struct super_block *
sf_read_super_24(struct super_block *sb, void *data, int flags)
{
int err;
TRACE();
err = sf_read_super_aux(sb, data, flags);
if (err)
return NULL;
return sb;
}
#endif
/* this is called when vfs is about to destroy the [inode]. all
resources associated with this [inode] must be cleared here */
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 36)
static void sf_clear_inode(struct inode *inode)
{
struct sf_inode_info *sf_i;
TRACE();
sf_i = GET_INODE_INFO(inode);
if (!sf_i)
return;
BUG_ON(!sf_i->path);
kfree(sf_i->path);
kfree(sf_i);
SET_INODE_INFO(inode, NULL);
}
#else
static void sf_evict_inode(struct inode *inode)
{
struct sf_inode_info *sf_i;
TRACE();
truncate_inode_pages(&inode->i_data, 0);
# if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 5, 0)
clear_inode(inode);
# else
end_writeback(inode);
# endif
sf_i = GET_INODE_INFO(inode);
if (!sf_i)
return;
BUG_ON(!sf_i->path);
kfree(sf_i->path);
kfree(sf_i);
SET_INODE_INFO(inode, NULL);
}
#endif
/* this is called by vfs when it wants to populate [inode] with data.
the only thing that is known about inode at this point is its index
hence we can't do anything here, and let lookup/whatever with the
job to properly fill then [inode] */
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 25)
static void sf_read_inode(struct inode *inode)
{
}
#endif
/* vfs is done with [sb] (umount called) call [sf_glob_free] to unmap
the folder and free [sf_g] */
static void sf_put_super(struct super_block *sb)
{
struct sf_glob_info *sf_g;
sf_g = GET_GLOB_INFO(sb);
BUG_ON(!sf_g);
sf_done_backing_dev(sf_g);
sf_glob_free(sf_g);
}
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 18)
static int sf_statfs(struct super_block *sb, STRUCT_STATFS *stat)
{
return sf_get_volume_info(sb, stat);
}
#else
static int sf_statfs(struct dentry *dentry, STRUCT_STATFS *stat)
{
struct super_block *sb = dentry->d_inode->i_sb;
return sf_get_volume_info(sb, stat);
}
#endif
static int sf_remount_fs(struct super_block *sb, int *flags, char *data)
{
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 4, 23)
struct sf_glob_info *sf_g;
struct sf_inode_info *sf_i;
struct inode *iroot;
SHFLFSOBJINFO fsinfo;
int err;
sf_g = GET_GLOB_INFO(sb);
BUG_ON(!sf_g);
if (data && data[0] != 0)
{
struct vbsf_mount_info_new *info =
(struct vbsf_mount_info_new *)data;
if ( info->signature[0] == VBSF_MOUNT_SIGNATURE_BYTE_0
&& info->signature[1] == VBSF_MOUNT_SIGNATURE_BYTE_1
&& info->signature[2] == VBSF_MOUNT_SIGNATURE_BYTE_2)
{
sf_g->uid = info->uid;
sf_g->gid = info->gid;
sf_g->ttl = info->ttl;
sf_g->dmode = info->dmode;
sf_g->fmode = info->fmode;
sf_g->dmask = info->dmask;
sf_g->fmask = info->fmask;
}
}
iroot = ilookup(sb, 0);
if (!iroot)
return -ENOSYS;
sf_i = GET_INODE_INFO(iroot);
err = sf_stat(__func__, sf_g, sf_i->path, &fsinfo, 0);
BUG_ON(err != 0);
sf_init_inode(sf_g, iroot, &fsinfo);
/*unlock_new_inode(iroot);*/
return 0;
#else
return -ENOSYS;
#endif
}
static struct super_operations sf_super_ops =
{
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 36)
.clear_inode = sf_clear_inode,
#else
.evict_inode = sf_evict_inode,
#endif
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 25)
.read_inode = sf_read_inode,
#endif
.put_super = sf_put_super,
.statfs = sf_statfs,
.remount_fs = sf_remount_fs
};
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 0)
static DECLARE_FSTYPE(vboxsf_fs_type, "vboxsf", sf_read_super_24, 0);
#else
static int
sf_read_super_26(struct super_block *sb, void *data, int flags)
{
int err;
TRACE();
err = sf_read_super_aux(sb, data, flags);
if (err)
printk(KERN_DEBUG "sf_read_super_aux err=%d\n", err);
return err;
}
# if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 18)
static struct super_block *sf_get_sb(struct file_system_type *fs_type, int flags,
const char *dev_name, void *data)
{
TRACE();
return get_sb_nodev(fs_type, flags, data, sf_read_super_26);
}
# elif LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 39)
static int sf_get_sb(struct file_system_type *fs_type, int flags,
const char *dev_name, void *data, struct vfsmount *mnt)
{
TRACE();
return get_sb_nodev(fs_type, flags, data, sf_read_super_26, mnt);
}
# else
static struct dentry *sf_mount(struct file_system_type *fs_type, int flags,
const char *dev_name, void *data)
{
TRACE();
return mount_nodev(fs_type, flags, data, sf_read_super_26);
}
# endif
static struct file_system_type vboxsf_fs_type =
{
.owner = THIS_MODULE,
.name = "vboxsf",
# if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 39)
.get_sb = sf_get_sb,
# else
.mount = sf_mount,
# endif
.kill_sb = kill_anon_super
};
#endif
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 0)
static int follow_symlinks = 0;
module_param(follow_symlinks, int, 0);
MODULE_PARM_DESC(follow_symlinks, "Let host resolve symlinks rather than showing them");
#endif
/* Module initialization/finalization handlers */
static int __init init(void)
{
int rcVBox;
int rcRet = 0;
int err;
TRACE();
if (sizeof(struct vbsf_mount_info_new) > PAGE_SIZE)
{
printk(KERN_ERR
"Mount information structure is too large %lu\n"
"Must be less than or equal to %lu\n",
(unsigned long)sizeof (struct vbsf_mount_info_new),
(unsigned long)PAGE_SIZE);
return -EINVAL;
}
err = register_filesystem(&vboxsf_fs_type);
if (err)
{
LogFunc(("register_filesystem err=%d\n", err));
return err;
}
rcVBox = vboxInit();
if (RT_FAILURE(rcVBox))
{
LogRelFunc(("vboxInit failed, rc=%d\n", rcVBox));
rcRet = -EPROTO;
goto fail0;
}
rcVBox = vboxConnect(&client_handle);
if (RT_FAILURE(rcVBox))
{
LogRelFunc(("vboxConnect failed, rc=%d\n", rcVBox));
rcRet = -EPROTO;
goto fail1;
}
rcVBox = vboxCallSetUtf8(&client_handle);
if (RT_FAILURE(rcVBox))
{
LogRelFunc(("vboxCallSetUtf8 failed, rc=%d\n", rcVBox));
rcRet = -EPROTO;
goto fail2;
}
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 0)
if (!follow_symlinks)
{
rcVBox = vboxCallSetSymlinks(&client_handle);
if (RT_FAILURE(rcVBox))
{
printk(KERN_WARNING
"vboxsf: Host unable to show symlinks, rc=%d\n",
rcVBox);
}
}
#endif
printk(KERN_DEBUG
"vboxsf: Successfully loaded version " VBOX_VERSION_STRING
" (interface " RT_XSTR(VMMDEV_VERSION) ")\n");
return 0;
fail2:
vboxDisconnect(&client_handle);
fail1:
vboxUninit();
fail0:
unregister_filesystem(&vboxsf_fs_type);
return rcRet;
}
static void __exit fini(void)
{
TRACE();
vboxDisconnect(&client_handle);
vboxUninit();
unregister_filesystem(&vboxsf_fs_type);
}
module_init(init);
module_exit(fini);
/* C++ hack */
int __gxx_personality_v0 = 0xdeadbeef;