lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAPDJoNs_VTnVATXr4AFs5D8unOihrpYXLDn69fjT0OshrYADXA@mail.gmail.com>
Date:   Thu, 27 Jul 2023 16:32:48 +0300
From:   Ariel Miculas <ariel.miculas@...il.com>
To:     Ariel Miculas <amiculas@...co.com>
Cc:     rust-for-linux@...r.kernel.org, linux-kernel@...r.kernel.org,
        linux-fsdevel@...r.kernel.org, tycho@...ho.pizza,
        brauner@...nel.org, viro@...iv.linux.org.uk, ojeda@...nel.org,
        alex.gaynor@...il.com, wedsonaf@...il.com
Subject: Re: [RFC PATCH v2 06/10] rust: file: pass the filesystem context to
 the open function

On Wed, Jul 26, 2023 at 7:58 PM Ariel Miculas <amiculas@...co.com> wrote:
>
> This allows us to create a Vfsmount structure and pass it to the read
> callback.
>
> Signed-off-by: Ariel Miculas <amiculas@...co.com>
> ---
>  rust/kernel/file.rs      | 17 +++++++++++++++--
>  samples/rust/puzzlefs.rs | 40 +++++++++++++++++++++++++++++++++++-----
>  samples/rust/rust_fs.rs  |  3 ++-
>  3 files changed, 52 insertions(+), 8 deletions(-)
>
> diff --git a/rust/kernel/file.rs b/rust/kernel/file.rs
> index a3002c416dbb..af1eb1ee9267 100644
> --- a/rust/kernel/file.rs
> +++ b/rust/kernel/file.rs
> @@ -457,9 +457,15 @@ impl<A: OpenAdapter<T::OpenData>, T: Operations> OperationsVtable<A, T> {
>              // `fileref` never outlives this function, so it is guaranteed to be
>              // valid.
>              let fileref = unsafe { File::from_ptr(file) };
> +
> +            // SAFETY: into_foreign was called in fs::NewSuperBlock<..., NeedsInit>::init and
> +            // it is valid until from_foreign will be called in fs::Tables::free_callback
> +            let fs_info =
> +                unsafe { <T::Filesystem as fs::Type>::Data::borrow((*(*inode).i_sb).s_fs_info) };
> +
>              // SAFETY: `arg` was previously returned by `A::convert` and must
>              // be a valid non-null pointer.
> -            let ptr = T::open(unsafe { &*arg }, fileref)?.into_foreign();
> +            let ptr = T::open(fs_info, unsafe { &*arg }, fileref)?.into_foreign();
>              // SAFETY: The C contract guarantees that `private_data` is available
>              // for implementers of the file operations (no other C code accesses
>              // it), so we know that there are no concurrent threads/CPUs accessing
> @@ -930,10 +936,17 @@ pub trait Operations {
>      /// The type of the context data passed to [`Operations::open`].
>      type OpenData: Sync = ();
>
> +    /// Data associated with each file system instance.
> +    type Filesystem: fs::Type;
> +
>      /// Creates a new instance of this file.
>      ///
>      /// Corresponds to the `open` function pointer in `struct file_operations`.
> -    fn open(context: &Self::OpenData, file: &File) -> Result<Self::Data>;
> +    fn open(
> +        fs_info: <<Self::Filesystem as fs::Type>::Data as ForeignOwnable>::Borrowed<'_>,
> +        context: &Self::OpenData,
> +        file: &File,
> +    ) -> Result<Self::Data>;
>
>      /// Cleans up after the last reference to the file goes away.
>      ///
> diff --git a/samples/rust/puzzlefs.rs b/samples/rust/puzzlefs.rs
> index 9afd82745b64..8a64e0bd437d 100644
> --- a/samples/rust/puzzlefs.rs
> +++ b/samples/rust/puzzlefs.rs
> @@ -3,8 +3,14 @@
>  //! Rust file system sample.
>
>  use kernel::module_fs;
> +use kernel::mount::Vfsmount;
>  use kernel::prelude::*;
> -use kernel::{c_str, file, fs, io_buffer::IoBufferWriter};
> +use kernel::{
> +    c_str, file, fmt, fs,
> +    io_buffer::IoBufferWriter,
> +    str::CString,
> +    sync::{Arc, ArcBorrow},
> +};
>
>  mod puzzle;
>  // Required by the autogenerated '_capnp.rs' files
> @@ -19,6 +25,12 @@
>
>  struct PuzzleFsModule;
>
> +#[derive(Debug)]
> +struct PuzzlefsInfo {
> +    base_path: CString,
> +    vfs_mount: Arc<Vfsmount>,
> +}
> +
>  #[vtable]
>  impl fs::Context<Self> for PuzzleFsModule {
>      type Data = ();
> @@ -46,14 +58,23 @@ fn try_new() -> Result {
>  impl fs::Type for PuzzleFsModule {
>      type Context = Self;
>      type INodeData = &'static [u8];
> +    type Data = Box<PuzzlefsInfo>;
>      const SUPER_TYPE: fs::Super = fs::Super::Independent;
>      const NAME: &'static CStr = c_str!("puzzlefs");
>      const FLAGS: i32 = fs::flags::USERNS_MOUNT;
>      const DCACHE_BASED: bool = true;
>
>      fn fill_super(_data: (), sb: fs::NewSuperBlock<'_, Self>) -> Result<&fs::SuperBlock<Self>> {
> +        let base_path = CString::try_from_fmt(fmt!("hello world"))?;
> +        pr_info!("base_path {:?}\n", base_path);
> +        let vfs_mount = Vfsmount::new_private_mount(c_str!("/home/puzzlefs_oci"))?;
> +        pr_info!("vfs_mount {:?}\n", vfs_mount);
> +
>          let sb = sb.init(
> -            (),
> +            Box::try_new(PuzzlefsInfo {
> +                base_path,
> +                vfs_mount: Arc::try_new(vfs_mount)?,
> +            })?,
>              &fs::SuperParams {
>                  magic: 0x72757374,
>                  ..fs::SuperParams::DEFAULT
> @@ -88,14 +109,23 @@ fn fill_super(_data: (), sb: fs::NewSuperBlock<'_, Self>) -> Result<&fs::SuperBl
>
>  #[vtable]
>  impl file::Operations for FsFile {
> +    // must be the same as INodeData
>      type OpenData = &'static [u8];
> +    type Filesystem = PuzzleFsModule;
> +    // this is an Arc because Data must be ForeignOwnable and the only implementors of it are Box,
> +    // Arc and (); we cannot pass a reference to read, so we share Vfsmount using and Arc
> +    type Data = Arc<Vfsmount>;
>
> -    fn open(_context: &Self::OpenData, _file: &file::File) -> Result<Self::Data> {
> -        Ok(())
> +    fn open(
> +        fs_info: &PuzzlefsInfo,
> +        _context: &Self::OpenData,
> +        _file: &file::File,
> +    ) -> Result<Self::Data> {
> +        Ok(fs_info.vfs_mount.clone())
>      }
>
>      fn read(
> -        _data: (),
> +        data: ArcBorrow<'_, Vfsmount>,
>          file: &file::File,
>          writer: &mut impl IoBufferWriter,
>          offset: u64,
> diff --git a/samples/rust/rust_fs.rs b/samples/rust/rust_fs.rs
> index 7527681ee024..c58ed1560e06 100644
> --- a/samples/rust/rust_fs.rs
> +++ b/samples/rust/rust_fs.rs
> @@ -85,8 +85,9 @@ fn fill_super(_data: (), sb: fs::NewSuperBlock<'_, Self>) -> Result<&fs::SuperBl
>  #[vtable]
>  impl file::Operations for FsFile {
>      type OpenData = &'static [u8];
> +    type Filesystem = RustFs;
>
> -    fn open(_context: &Self::OpenData, _file: &file::File) -> Result<Self::Data> {
> +    fn open(_fs_info: (), _context: &Self::OpenData, _file: &file::File) -> Result<Self::Data> {
>          Ok(())
>      }
>
> --
> 2.41.0
>
>
Hey Wedson,

Is it ok to couple file::Operations with fs::Type? I didn't find a
better way to implement this.
I'm asking because I've seen you've gone to great lengths to decouple them.

Cheers,
Ariel

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ