[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20240514131711.379322-25-wedsonaf@gmail.com>
Date: Tue, 14 May 2024 10:17:05 -0300
From: Wedson Almeida Filho <wedsonaf@...il.com>
To: Alexander Viro <viro@...iv.linux.org.uk>,
Christian Brauner <brauner@...nel.org>,
Matthew Wilcox <willy@...radead.org>,
Dave Chinner <david@...morbit.com>
Cc: Kent Overstreet <kent.overstreet@...il.com>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
linux-fsdevel@...r.kernel.org,
rust-for-linux@...r.kernel.org,
linux-kernel@...r.kernel.org,
Wedson Almeida Filho <walmeida@...rosoft.com>
Subject: [RFC PATCH v2 24/30] rust: fs: allow per-inode data
From: Wedson Almeida Filho <walmeida@...rosoft.com>
Allow Rust file systems to attach extra [typed] data to each inode. If
no data is needed, use the regular inode kmem_cache, otherwise we create
a new one.
Signed-off-by: Wedson Almeida Filho <walmeida@...rosoft.com>
---
rust/helpers.c | 7 +++
rust/kernel/fs.rs | 19 ++++--
rust/kernel/fs/inode.rs | 123 ++++++++++++++++++++++++++++++++++++--
rust/kernel/mem_cache.rs | 2 -
samples/rust/rust_rofs.rs | 13 ++--
5 files changed, 143 insertions(+), 21 deletions(-)
diff --git a/rust/helpers.c b/rust/helpers.c
index 6c6d18df055f..edf12868962c 100644
--- a/rust/helpers.c
+++ b/rust/helpers.c
@@ -266,6 +266,13 @@ struct folio *rust_helper_read_mapping_folio(struct address_space *mapping,
}
EXPORT_SYMBOL_GPL(rust_helper_read_mapping_folio);
+void *rust_helper_alloc_inode_sb(struct super_block *sb,
+ struct kmem_cache *cache, gfp_t gfp)
+{
+ return alloc_inode_sb(sb, cache, gfp);
+}
+EXPORT_SYMBOL_GPL(rust_helper_alloc_inode_sb);
+
void rust_helper_i_uid_write(struct inode *inode, uid_t uid)
{
i_uid_write(inode, uid);
diff --git a/rust/kernel/fs.rs b/rust/kernel/fs.rs
index 864aca24d12c..d64fe1a5812f 100644
--- a/rust/kernel/fs.rs
+++ b/rust/kernel/fs.rs
@@ -8,8 +8,8 @@
use crate::error::{code::*, from_result, to_result, Error, Result};
use crate::types::{ForeignOwnable, Opaque};
-use crate::{bindings, init::PinInit, str::CStr, try_pin_init, ThisModule};
-use core::{ffi, marker::PhantomData, mem::ManuallyDrop, pin::Pin, ptr};
+use crate::{bindings, init::PinInit, mem_cache::MemCache, str::CStr, try_pin_init, ThisModule};
+use core::{ffi, marker::PhantomData, mem::size_of, mem::ManuallyDrop, pin::Pin, ptr};
use dentry::DEntry;
use inode::INode;
use macros::{pin_data, pinned_drop};
@@ -39,6 +39,9 @@ pub trait FileSystem {
/// Data associated with each file system instance (super-block).
type Data: ForeignOwnable + Send + Sync;
+ /// Type of data associated with each inode.
+ type INodeData: Send + Sync;
+
/// The name of the file system type.
const NAME: &'static CStr;
@@ -109,6 +112,7 @@ pub struct Stat {
impl FileSystem for UnspecifiedFS {
type Data = ();
+ type INodeData = ();
const NAME: &'static CStr = crate::c_str!("unspecified");
const IS_UNSPECIFIED: bool = true;
fn fill_super(_: &mut SuperBlock<Self, sb::New>, _: Option<inode::Mapper>) -> Result {
@@ -125,6 +129,7 @@ fn init_root(_: &SuperBlock<Self>) -> Result<dentry::Root<Self>> {
pub struct Registration {
#[pin]
fs: Opaque<bindings::file_system_type>,
+ inode_cache: Option<MemCache>,
}
// SAFETY: `Registration` doesn't provide any `&self` methods, so it is safe to pass references
@@ -139,6 +144,7 @@ impl Registration {
/// Creates the initialiser of a new file system registration.
pub fn new<T: FileSystem + ?Sized>(module: &'static ThisModule) -> impl PinInit<Self, Error> {
try_pin_init!(Self {
+ inode_cache: INode::<T>::new_cache()?,
fs <- Opaque::try_ffi_init(|fs_ptr: *mut bindings::file_system_type| {
// SAFETY: `try_ffi_init` guarantees that `fs_ptr` is valid for write.
unsafe { fs_ptr.write(bindings::file_system_type::default()) };
@@ -284,8 +290,12 @@ impl<T: FileSystem + ?Sized> Tables<T> {
}
const SUPER_BLOCK: bindings::super_operations = bindings::super_operations {
- alloc_inode: None,
- destroy_inode: None,
+ alloc_inode: if size_of::<T::INodeData>() != 0 {
+ Some(INode::<T>::alloc_inode_callback)
+ } else {
+ None
+ },
+ destroy_inode: Some(INode::<T>::destroy_inode_callback),
free_inode: None,
dirty_inode: None,
write_inode: None,
@@ -419,6 +429,7 @@ fn init(module: &'static ThisModule) -> impl PinInit<Self, Error> {
/// struct MyFs;
/// impl fs::FileSystem for MyFs {
/// type Data = ();
+/// type INodeData = ();
/// const NAME: &'static CStr = kernel::c_str!("myfs");
/// fn fill_super(_: &mut SuperBlock<Self, sb::New>, _: Option<Mapper>) -> Result {
/// todo!()
diff --git a/rust/kernel/fs/inode.rs b/rust/kernel/fs/inode.rs
index 5b3602362521..5230ff2fe0dd 100644
--- a/rust/kernel/fs/inode.rs
+++ b/rust/kernel/fs/inode.rs
@@ -13,9 +13,10 @@
use crate::error::{code::*, from_err_ptr, Result};
use crate::types::{ARef, AlwaysRefCounted, Either, ForeignOwnable, Lockable, Locked, Opaque};
use crate::{
- bindings, block, build_error, folio, folio::Folio, str::CStr, str::CString, time::Timespec,
+ bindings, block, build_error, container_of, folio, folio::Folio, mem_cache::MemCache,
+ str::CStr, str::CString, time::Timespec,
};
-use core::mem::ManuallyDrop;
+use core::mem::{size_of, ManuallyDrop, MaybeUninit};
use core::{cmp, marker::PhantomData, ops::Deref, ptr};
use macros::vtable;
@@ -91,6 +92,18 @@ pub fn super_block(&self) -> &SuperBlock<T> {
unsafe { SuperBlock::from_raw((*self.0.get()).i_sb) }
}
+ /// Returns the data associated with the inode.
+ pub fn data(&self) -> &T::INodeData {
+ if T::IS_UNSPECIFIED {
+ crate::build_error!("inode data type is unspecified");
+ }
+ let outerp = container_of!(self.0.get(), WithData<T::INodeData>, inode);
+ // SAFETY: `self` is guaranteed to be valid by the existence of a shared reference
+ // (`&self`) to it. Additionally, we know `T::INodeData` is always initialised in an
+ // `INode`.
+ unsafe { &*(*outerp).data.as_ptr() }
+ }
+
/// Returns the size of the inode contents.
pub fn size(&self) -> Offset {
// SAFETY: `self` is guaranteed to be valid by the existence of a shared reference.
@@ -182,6 +195,87 @@ pub unsafe fn for_each_page<U>(
Ok(None)
}
+
+ pub(crate) fn new_cache() -> Result<Option<MemCache>> {
+ Ok(if size_of::<T::INodeData>() == 0 {
+ None
+ } else {
+ Some(MemCache::try_new::<WithData<T::INodeData>>(
+ T::NAME,
+ Some(Self::inode_init_once_callback),
+ )?)
+ })
+ }
+
+ unsafe extern "C" fn inode_init_once_callback(outer_inode: *mut core::ffi::c_void) {
+ let ptr = outer_inode.cast::<WithData<T::INodeData>>();
+
+ // SAFETY: This is only used in `new`, so we know that we have a valid `inode::WithData`
+ // instance whose inode part can be initialised.
+ unsafe { bindings::inode_init_once(ptr::addr_of_mut!((*ptr).inode)) };
+ }
+
+ pub(crate) unsafe extern "C" fn alloc_inode_callback(
+ sb: *mut bindings::super_block,
+ ) -> *mut bindings::inode {
+ // SAFETY: The callback contract guarantees that `sb` is valid for read.
+ let super_type = unsafe { (*sb).s_type };
+
+ // SAFETY: This callback is only used in `Registration`, so `super_type` is necessarily
+ // embedded in a `Registration`, which is guaranteed to be valid because it has a
+ // superblock associated to it.
+ let reg = unsafe { &*container_of!(super_type, super::Registration, fs) };
+
+ // SAFETY: `sb` and `cache` are guaranteed to be valid by the callback contract and by
+ // the existence of a superblock respectively.
+ let ptr = unsafe {
+ bindings::alloc_inode_sb(sb, MemCache::ptr(®.inode_cache), bindings::GFP_KERNEL)
+ }
+ .cast::<WithData<T::INodeData>>();
+ if ptr.is_null() {
+ return ptr::null_mut();
+ }
+
+ // SAFETY: `ptr` was just allocated, so it is valid for dereferencing.
+ unsafe { ptr::addr_of_mut!((*ptr).inode) }
+ }
+
+ pub(crate) unsafe extern "C" fn destroy_inode_callback(inode: *mut bindings::inode) {
+ // SAFETY: By the C contract, `inode` is a valid pointer.
+ let is_bad = unsafe { bindings::is_bad_inode(inode) };
+
+ // SAFETY: The inode is guaranteed to be valid by the callback contract. Additionally, the
+ // superblock is also guaranteed to still be valid by the inode existence.
+ let super_type = unsafe { (*(*inode).i_sb).s_type };
+
+ // SAFETY: This callback is only used in `Registration`, so `super_type` is necessarily
+ // embedded in a `Registration`, which is guaranteed to be valid because it has a
+ // superblock associated to it.
+ let reg = unsafe { &*container_of!(super_type, super::Registration, fs) };
+ let ptr = container_of!(inode, WithData<T::INodeData>, inode).cast_mut();
+
+ if !is_bad {
+ // SAFETY: The code either initialises the data or marks the inode as bad. Since the
+ // inode is not bad, the data is initialised, and thus safe to drop.
+ unsafe { ptr::drop_in_place((*ptr).data.as_mut_ptr()) };
+ }
+
+ if size_of::<T::INodeData>() == 0 {
+ // SAFETY: When the size of `INodeData` is zero, we don't use a separate mem_cache, so
+ // it is allocated from the regular mem_cache, which is what `free_inode_nonrcu` uses
+ // to free the inode.
+ unsafe { bindings::free_inode_nonrcu(inode) };
+ } else {
+ // The callback contract guarantees that the inode was previously allocated via the
+ // `alloc_inode_callback` callback, so it is safe to free it back to the cache.
+ unsafe {
+ bindings::kmem_cache_free(
+ MemCache::ptr(®.inode_cache),
+ ptr.cast::<core::ffi::c_void>(),
+ )
+ };
+ }
+ }
}
impl<T: FileSystem + ?Sized, U: Deref<Target = INode<T>>> Locked<U, ReadSem> {
@@ -251,6 +345,11 @@ unsafe fn unlock(&self) {
}
}
+struct WithData<T> {
+ data: MaybeUninit<T>,
+ inode: bindings::inode,
+}
+
/// An inode that is locked and hasn't been initialised yet.
///
/// # Invariants
@@ -263,9 +362,18 @@ pub struct New<T: FileSystem + ?Sized>(
impl<T: FileSystem + ?Sized> New<T> {
/// Initialises the new inode with the given parameters.
- pub fn init(mut self, params: Params) -> Result<ARef<INode<T>>> {
- // SAFETY: This is a new inode, so it's safe to manipulate it mutably.
- let inode = unsafe { self.0.as_mut() };
+ pub fn init(self, params: Params<T::INodeData>) -> Result<ARef<INode<T>>> {
+ let outerp = container_of!(self.0.as_ptr(), WithData<T::INodeData>, inode);
+
+ // SAFETY: This is a newly-created inode. No other references to it exist, so it is
+ // safe to mutably dereference it.
+ let outer = unsafe { &mut *outerp.cast_mut() };
+
+ // N.B. We must always write this to a newly allocated inode because the free callback
+ // expects the data to be initialised and drops it.
+ outer.data.write(params.value);
+
+ let inode = &mut outer.inode;
let mode = match params.typ {
Type::Dir => bindings::S_IFDIR,
Type::Reg => {
@@ -404,7 +512,7 @@ pub enum Type {
/// Required inode parameters.
///
/// This is used when creating new inodes.
-pub struct Params {
+pub struct Params<T> {
/// The access mode. It's a mask that grants execute (1), write (2) and read (4) access to
/// everyone, the owner group, and the owner.
pub mode: u16,
@@ -439,6 +547,9 @@ pub struct Params {
/// Last access time.
pub atime: Timespec,
+
+ /// Value to attach to this node.
+ pub value: T,
}
/// Represents inode operations.
diff --git a/rust/kernel/mem_cache.rs b/rust/kernel/mem_cache.rs
index e7e2720ff6cd..cbf1b7e75334 100644
--- a/rust/kernel/mem_cache.rs
+++ b/rust/kernel/mem_cache.rs
@@ -20,7 +20,6 @@ impl MemCache {
/// Allocates a new `kmem_cache` for type `T`.
///
/// `init` is called by the C code when entries are allocated.
- #[allow(dead_code)]
pub(crate) fn try_new<T>(
name: &'static CStr,
init: Option<unsafe extern "C" fn(*mut core::ffi::c_void)>,
@@ -43,7 +42,6 @@ pub(crate) fn try_new<T>(
/// Returns the pointer to the `kmem_cache` instance, or null if it's `None`.
///
/// This is a helper for functions like `alloc_inode_sb` where the cache is optional.
- #[allow(dead_code)]
pub(crate) fn ptr(c: &Option<Self>) -> *mut bindings::kmem_cache {
match c {
Some(m) => m.ptr.as_ptr(),
diff --git a/samples/rust/rust_rofs.rs b/samples/rust/rust_rofs.rs
index fea3360b6e7a..5b6c3f50adf4 100644
--- a/samples/rust/rust_rofs.rs
+++ b/samples/rust/rust_rofs.rs
@@ -93,12 +93,14 @@ fn iget(sb: &sb::SuperBlock<Self>, e: &'static Entry) -> Result<ARef<INode<Self>
atime: UNIX_EPOCH,
ctime: UNIX_EPOCH,
mtime: UNIX_EPOCH,
+ value: e,
})
}
}
impl fs::FileSystem for RoFs {
type Data = ();
+ type INodeData = &'static Entry;
const NAME: &'static CStr = c_str!("rust_rofs");
fn fill_super(sb: &mut sb::SuperBlock<Self, sb::New>, _: Option<inode::Mapper>) -> Result {
@@ -149,10 +151,7 @@ fn get_link<'a>(
return Err(ECHILD);
}
- let name_buf = match inode.ino() {
- 3 => ENTRIES[3].contents,
- _ => return Err(EINVAL),
- };
+ let name_buf = inode.data().contents;
let mut name = Box::new_slice(
name_buf.len().checked_add(1).ok_or(ENOMEM)?,
b'\0',
@@ -168,11 +167,7 @@ impl address_space::Operations for RoFs {
type FileSystem = Self;
fn read_folio(_: Option<&File<Self>>, mut folio: Locked<&Folio<PageCache<Self>>>) -> Result {
- let data = match folio.inode().ino() {
- 2 => ENTRIES[2].contents,
- _ => return Err(EINVAL),
- };
-
+ let data = folio.inode().data().contents;
let pos = usize::try_from(folio.pos()).unwrap_or(usize::MAX);
let copied = if pos >= data.len() {
0
--
2.34.1
Powered by blists - more mailing lists