Message ID | 20230726164535.230515-5-amiculas@cisco.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | Rust PuzleFS filesystem driver | expand |
On Wed, Jul 26, 2023 at 12:54 PM Ariel Miculas <amiculas@cisco.com> wrote: > > Implement from_path, from_path_in_root_mnt, read_with_offset, > read_to_end and get_file_size methods for a RegularFile newtype. > > Signed-off-by: Ariel Miculas <amiculas@cisco.com> > --- > rust/helpers.c | 6 ++ > rust/kernel/error.rs | 4 +- > rust/kernel/file.rs | 129 ++++++++++++++++++++++++++++++++++++++++++- > 3 files changed, 135 insertions(+), 4 deletions(-) > > diff --git a/rust/helpers.c b/rust/helpers.c > index eed8ace52fb5..9e860a554cda 100644 > --- a/rust/helpers.c > +++ b/rust/helpers.c > @@ -213,6 +213,12 @@ void *rust_helper_alloc_inode_sb(struct super_block *sb, > } > EXPORT_SYMBOL_GPL(rust_helper_alloc_inode_sb); > > +loff_t rust_helper_i_size_read(const struct inode *inode) > +{ > + return i_size_read(inode); > +} > +EXPORT_SYMBOL_GPL(rust_helper_i_size_read); > + > /* > * We use `bindgen`'s `--size_t-is-usize` option to bind the C `size_t` type > * as the Rust `usize` type, so we can use it in contexts where Rust > diff --git a/rust/kernel/error.rs b/rust/kernel/error.rs > index 05fcab6abfe6..e061c83f806a 100644 > --- a/rust/kernel/error.rs > +++ b/rust/kernel/error.rs > @@ -273,9 +273,7 @@ pub fn to_result(err: core::ffi::c_int) -> Result { > /// } > /// } > /// ``` > -// TODO: Remove `dead_code` marker once an in-kernel client is available. > -#[allow(dead_code)] > -pub(crate) fn from_err_ptr<T>(ptr: *mut T) -> Result<*mut T> { > +pub fn from_err_ptr<T>(ptr: *mut T) -> Result<*mut T> { > // CAST: Casting a pointer to `*const core::ffi::c_void` is always valid. > let const_ptr: *const core::ffi::c_void = ptr.cast(); > // SAFETY: The FFI function does not deref the pointer. > diff --git a/rust/kernel/file.rs b/rust/kernel/file.rs > index 494939ba74df..a3002c416dbb 100644 > --- a/rust/kernel/file.rs > +++ b/rust/kernel/file.rs > @@ -8,11 +8,13 @@ > use crate::{ > bindings, > cred::Credential, > - error::{code::*, from_result, Error, Result}, > + error::{code::*, from_err_ptr, from_result, Error, Result}, > fs, > io_buffer::{IoBufferReader, IoBufferWriter}, > iov_iter::IovIter, > mm, > + mount::Vfsmount, > + str::CStr, > sync::CondVar, > types::ARef, > types::AlwaysRefCounted, > @@ -20,6 +22,7 @@ > types::Opaque, > user_ptr::{UserSlicePtr, UserSlicePtrReader, UserSlicePtrWriter}, > }; > +use alloc::vec::Vec; > use core::convert::{TryFrom, TryInto}; > use core::{marker, mem, ptr}; > use macros::vtable; > @@ -201,6 +204,130 @@ unsafe fn dec_ref(obj: ptr::NonNull<Self>) { > } > } > > +/// A newtype over file, specific to regular files > +pub struct RegularFile(ARef<File>); > +impl RegularFile { > + /// Creates a new instance of Self if the file is a regular file > + /// > + /// # Safety > + /// > + /// The caller must ensure file_ptr.f_inode is initialized to a valid pointer (e.g. file_ptr is > + /// a pointer returned by path_openat); It must also ensure that file_ptr's reference count was > + /// incremented at least once > + fn create_if_regular(file_ptr: ptr::NonNull<bindings::file>) -> Result<RegularFile> { This function should be unsafe, correct? You instead take a `&bindings::file` instead of `NonNull` but still keep it unsafe, so the "valid pointer" invariant is always reached. Or, could this take `&kernel::file::File` instead to reduce some duplication? > + // SAFETY: file_ptr is a NonNull pointer > + let inode = unsafe { core::ptr::addr_of!((*file_ptr.as_ptr()).f_inode).read() }; > + // SAFETY: the caller must ensure f_inode is initialized to a valid pointer > + unsafe { > + if bindings::S_IFMT & ((*inode).i_mode) as u32 != bindings::S_IFREG { > + return Err(EINVAL); > + } > + } Nit: factor `unsafe { ((*inode).i_mode) }` out so it doesn't look like the whole statement is unsafe > + // SAFETY: the safety requirements state that file_ptr's reference count was incremented at > + // least once > + Ok(RegularFile(unsafe { ARef::from_raw(file_ptr.cast()) })) > + } > + /// Constructs a new [`struct file`] wrapper from a path. > + pub fn from_path(filename: &CStr, flags: i32, mode: u16) -> Result<Self> { > + let file_ptr = unsafe { > + // SAFETY: filename is a reference, so it's a valid pointer > + from_err_ptr(bindings::filp_open( > + filename.as_ptr() as *const i8, > + flags, > + mode, > + ))? > + }; I mentioned in another email that `.cast::<i8>()` can be more idiomatic and a bit safer than `as`, it's a stylistic choice but there are a few places it could be changed here if desired Also, the `// SAFETY` comments need to go outside the unsafe block > + let file_ptr = ptr::NonNull::new(file_ptr).ok_or(ENOENT)?; > + > + // SAFETY: `filp_open` initializes the refcount with 1 > + Self::create_if_regular(file_ptr) > + } Will need unsafe block if `create_if_regular` becomes unsafe > + > + /// Constructs a new [`struct file`] wrapper from a path and a vfsmount. > + pub fn from_path_in_root_mnt( > + mount: &Vfsmount, > + filename: &CStr, > + flags: i32, > + mode: u16, > + ) -> Result<Self> { > + let file_ptr = { > + let mnt = mount.get(); > + // construct a path from vfsmount, see file_open_root_mnt > + let raw_path = bindings::path { > + mnt, > + // SAFETY: Vfsmount structure stores a valid vfsmount object > + dentry: unsafe { (*mnt).mnt_root }, > + }; > + unsafe { > + // SAFETY: raw_path and filename are both references > + from_err_ptr(bindings::file_open_root( > + &raw_path, > + filename.as_ptr() as *const i8, > + flags, > + mode, > + ))? > + } > + }; Is there a reason to use the larger scope block, rather than moving `mnt` and `raw_path` out and doing `let file_ptr = unsafe { ... }`? If so, a comment would be good. > + let file_ptr = ptr::NonNull::new(file_ptr).ok_or(ENOENT)?; > + > + // SAFETY: `file_open_root` initializes the refcount with 1 > + Self::create_if_regular(file_ptr) > + } > + > + /// Read from the file into the specified buffer > + pub fn read_with_offset(&self, buf: &mut [u8], offset: u64) -> Result<usize> { > + Ok({ > + // kernel_read_file expects a pointer to a "void *" buffer > + let mut ptr_to_buf = buf.as_mut_ptr() as *mut core::ffi::c_void; > + // Unless we give a non-null pointer to the file size: > + // 1. we cannot give a non-zero value for the offset > + // 2. we cannot have offset 0 and buffer_size > file_size > + let mut file_size = 0; > + > + // SAFETY: 'file' is valid because it's taken from Self, 'buf' and 'file_size` are > + // references to the stack variables 'ptr_to_buf' and 'file_size'; ptr_to_buf is also > + // a pointer to a valid buffer that was obtained from a reference > + let result = unsafe { > + bindings::kernel_read_file( > + self.0 .0.get(), Is this spacing intentional? If so, `(self.0).0.get()` may be cleaner > + offset.try_into()?, > + &mut ptr_to_buf, > + buf.len(), > + &mut file_size, > + bindings::kernel_read_file_id_READING_UNKNOWN, > + ) > + }; > + > + // kernel_read_file returns the number of bytes read on success or negative on error. > + if result < 0 { > + return Err(Error::from_errno(result.try_into()?)); > + } > + > + result.try_into()? > + }) > + } I think you could remove the block here and just return `Ok(result.try_into()?)` > + > + /// Allocate and return a vector containing the contents of the entire file > + pub fn read_to_end(&self) -> Result<Vec<u8>> { > + let file_size = self.get_file_size()?; > + let mut buffer = Vec::try_with_capacity(file_size)?; > + buffer.try_resize(file_size, 0)?; > + self.read_with_offset(&mut buffer, 0)?; > + Ok(buffer) > + } > + > + fn get_file_size(&self) -> Result<usize> { > + // SAFETY: 'file' is valid because it's taken from Self > + let file_size = unsafe { bindings::i_size_read((*self.0 .0.get()).f_inode) }; > + > + if file_size < 0 { > + return Err(EINVAL); > + } > + > + Ok(file_size.try_into()?) > + } > +} > + > /// A file descriptor reservation. > /// > /// This allows the creation of a file descriptor in two steps: first, we reserve a slot for it, > -- > 2.41.0 > >
On Thu, Jul 27, 2023 at 2:52 AM Trevor Gross <tmgross@umich.edu> wrote: > > On Wed, Jul 26, 2023 at 12:54 PM Ariel Miculas <amiculas@cisco.com> wrote: > > > > Implement from_path, from_path_in_root_mnt, read_with_offset, > > read_to_end and get_file_size methods for a RegularFile newtype. > > > > Signed-off-by: Ariel Miculas <amiculas@cisco.com> > > --- > > rust/helpers.c | 6 ++ > > rust/kernel/error.rs | 4 +- > > rust/kernel/file.rs | 129 ++++++++++++++++++++++++++++++++++++++++++- > > 3 files changed, 135 insertions(+), 4 deletions(-) > > > > diff --git a/rust/helpers.c b/rust/helpers.c > > index eed8ace52fb5..9e860a554cda 100644 > > --- a/rust/helpers.c > > +++ b/rust/helpers.c > > @@ -213,6 +213,12 @@ void *rust_helper_alloc_inode_sb(struct super_block *sb, > > } > > EXPORT_SYMBOL_GPL(rust_helper_alloc_inode_sb); > > > > +loff_t rust_helper_i_size_read(const struct inode *inode) > > +{ > > + return i_size_read(inode); > > +} > > +EXPORT_SYMBOL_GPL(rust_helper_i_size_read); > > + > > /* > > * We use `bindgen`'s `--size_t-is-usize` option to bind the C `size_t` type > > * as the Rust `usize` type, so we can use it in contexts where Rust > > diff --git a/rust/kernel/error.rs b/rust/kernel/error.rs > > index 05fcab6abfe6..e061c83f806a 100644 > > --- a/rust/kernel/error.rs > > +++ b/rust/kernel/error.rs > > @@ -273,9 +273,7 @@ pub fn to_result(err: core::ffi::c_int) -> Result { > > /// } > > /// } > > /// ``` > > -// TODO: Remove `dead_code` marker once an in-kernel client is available. > > -#[allow(dead_code)] > > -pub(crate) fn from_err_ptr<T>(ptr: *mut T) -> Result<*mut T> { > > +pub fn from_err_ptr<T>(ptr: *mut T) -> Result<*mut T> { > > // CAST: Casting a pointer to `*const core::ffi::c_void` is always valid. > > let const_ptr: *const core::ffi::c_void = ptr.cast(); > > // SAFETY: The FFI function does not deref the pointer. > > diff --git a/rust/kernel/file.rs b/rust/kernel/file.rs > > index 494939ba74df..a3002c416dbb 100644 > > --- a/rust/kernel/file.rs > > +++ b/rust/kernel/file.rs > > @@ -8,11 +8,13 @@ > > use crate::{ > > bindings, > > cred::Credential, > > - error::{code::*, from_result, Error, Result}, > > + error::{code::*, from_err_ptr, from_result, Error, Result}, > > fs, > > io_buffer::{IoBufferReader, IoBufferWriter}, > > iov_iter::IovIter, > > mm, > > + mount::Vfsmount, > > + str::CStr, > > sync::CondVar, > > types::ARef, > > types::AlwaysRefCounted, > > @@ -20,6 +22,7 @@ > > types::Opaque, > > user_ptr::{UserSlicePtr, UserSlicePtrReader, UserSlicePtrWriter}, > > }; > > +use alloc::vec::Vec; > > use core::convert::{TryFrom, TryInto}; > > use core::{marker, mem, ptr}; > > use macros::vtable; > > @@ -201,6 +204,130 @@ unsafe fn dec_ref(obj: ptr::NonNull<Self>) { > > } > > } > > > > +/// A newtype over file, specific to regular files > > +pub struct RegularFile(ARef<File>); > > +impl RegularFile { > > + /// Creates a new instance of Self if the file is a regular file > > + /// > > + /// # Safety > > + /// > > + /// The caller must ensure file_ptr.f_inode is initialized to a valid pointer (e.g. file_ptr is > > + /// a pointer returned by path_openat); It must also ensure that file_ptr's reference count was > > + /// incremented at least once > > + fn create_if_regular(file_ptr: ptr::NonNull<bindings::file>) -> Result<RegularFile> { > > This function should be unsafe, correct? You instead take a > `&bindings::file` instead of `NonNull` but still keep it unsafe, so > the "valid pointer" invariant is always reached. > > Or, could this take `&kernel::file::File` instead to reduce some duplication? > Yes, this should have been unsafe, I've also changed it to receive a `*mut bindings::file` instead of NonNull. > > + // SAFETY: file_ptr is a NonNull pointer > > + let inode = unsafe { core::ptr::addr_of!((*file_ptr.as_ptr()).f_inode).read() }; > > + // SAFETY: the caller must ensure f_inode is initialized to a valid pointer > > + unsafe { > > + if bindings::S_IFMT & ((*inode).i_mode) as u32 != bindings::S_IFREG { > > + return Err(EINVAL); > > + } > > + } > > Nit: factor `unsafe { ((*inode).i_mode) }` out so it doesn't look like > the whole statement is unsafe > > > + // SAFETY: the safety requirements state that file_ptr's reference count was incremented at > > + // least once > > + Ok(RegularFile(unsafe { ARef::from_raw(file_ptr.cast()) })) > > + } > > + /// Constructs a new [`struct file`] wrapper from a path. > > + pub fn from_path(filename: &CStr, flags: i32, mode: u16) -> Result<Self> { > > + let file_ptr = unsafe { > > + // SAFETY: filename is a reference, so it's a valid pointer > > + from_err_ptr(bindings::filp_open( > > + filename.as_ptr() as *const i8, > > + flags, > > + mode, > > + ))? > > + }; > > I mentioned in another email that `.cast::<i8>()` can be more > idiomatic and a bit safer than `as`, it's a stylistic choice but there > are a few places it could be changed here if desired Thanks, didn't know about this. > > Also, the `// SAFETY` comments need to go outside the unsafe block > > > + let file_ptr = ptr::NonNull::new(file_ptr).ok_or(ENOENT)?; > > + > > + // SAFETY: `filp_open` initializes the refcount with 1 > > + Self::create_if_regular(file_ptr) > > + } > > Will need unsafe block if `create_if_regular` becomes unsafe > > > + > > + /// Constructs a new [`struct file`] wrapper from a path and a vfsmount. > > + pub fn from_path_in_root_mnt( > > + mount: &Vfsmount, > > + filename: &CStr, > > + flags: i32, > > + mode: u16, > > + ) -> Result<Self> { > > + let file_ptr = { > > + let mnt = mount.get(); > > + // construct a path from vfsmount, see file_open_root_mnt > > + let raw_path = bindings::path { > > + mnt, > > + // SAFETY: Vfsmount structure stores a valid vfsmount object > > + dentry: unsafe { (*mnt).mnt_root }, > > + }; > > + unsafe { > > + // SAFETY: raw_path and filename are both references > > + from_err_ptr(bindings::file_open_root( > > + &raw_path, > > + filename.as_ptr() as *const i8, > > + flags, > > + mode, > > + ))? > > + } > > + }; > > Is there a reason to use the larger scope block, rather than moving > `mnt` and `raw_path` out and doing `let file_ptr = unsafe { ... }`? If > so, a comment would be good. No, that's just how the code has evolved from splitting unsafe blocks, I've changed this in https://github.com/ariel-miculas/linux/tree/puzzlefs_rfc > > > + let file_ptr = ptr::NonNull::new(file_ptr).ok_or(ENOENT)?; > > + > > + // SAFETY: `file_open_root` initializes the refcount with 1 > > + Self::create_if_regular(file_ptr) > > + } > > + > > + /// Read from the file into the specified buffer > > + pub fn read_with_offset(&self, buf: &mut [u8], offset: u64) -> Result<usize> { > > + Ok({ > > + // kernel_read_file expects a pointer to a "void *" buffer > > + let mut ptr_to_buf = buf.as_mut_ptr() as *mut core::ffi::c_void; > > + // Unless we give a non-null pointer to the file size: > > + // 1. we cannot give a non-zero value for the offset > > + // 2. we cannot have offset 0 and buffer_size > file_size > > + let mut file_size = 0; > > + > > + // SAFETY: 'file' is valid because it's taken from Self, 'buf' and 'file_size` are > > + // references to the stack variables 'ptr_to_buf' and 'file_size'; ptr_to_buf is also > > + // a pointer to a valid buffer that was obtained from a reference > > + let result = unsafe { > > + bindings::kernel_read_file( > > + self.0 .0.get(), > > Is this spacing intentional? If so, `(self.0).0.get()` may be cleaner No, it's not intentional, this is rustfmt`s creation. > > > + offset.try_into()?, > > + &mut ptr_to_buf, > > + buf.len(), > > + &mut file_size, > > + bindings::kernel_read_file_id_READING_UNKNOWN, > > + ) > > + }; > > + > > + // kernel_read_file returns the number of bytes read on success or negative on error. > > + if result < 0 { > > + return Err(Error::from_errno(result.try_into()?)); > > + } > > + > > + result.try_into()? > > + }) > > + } > > I think you could remove the block here and just return `Ok(result.try_into()?)` Good idea. > > > + > > + /// Allocate and return a vector containing the contents of the entire file > > + pub fn read_to_end(&self) -> Result<Vec<u8>> { > > + let file_size = self.get_file_size()?; > > + let mut buffer = Vec::try_with_capacity(file_size)?; > > + buffer.try_resize(file_size, 0)?; > > + self.read_with_offset(&mut buffer, 0)?; > > + Ok(buffer) > > + } > > + > > + fn get_file_size(&self) -> Result<usize> { > > + // SAFETY: 'file' is valid because it's taken from Self > > + let file_size = unsafe { bindings::i_size_read((*self.0 .0.get()).f_inode) }; > > + > > + if file_size < 0 { > > + return Err(EINVAL); > > + } > > + > > + Ok(file_size.try_into()?) > > + } > > +} > > + > > /// A file descriptor reservation. > > /// > > /// This allows the creation of a file descriptor in two steps: first, we reserve a slot for it, > > -- > > 2.41.0 > > > > >
diff --git a/rust/helpers.c b/rust/helpers.c index eed8ace52fb5..9e860a554cda 100644 --- a/rust/helpers.c +++ b/rust/helpers.c @@ -213,6 +213,12 @@ void *rust_helper_alloc_inode_sb(struct super_block *sb, } EXPORT_SYMBOL_GPL(rust_helper_alloc_inode_sb); +loff_t rust_helper_i_size_read(const struct inode *inode) +{ + return i_size_read(inode); +} +EXPORT_SYMBOL_GPL(rust_helper_i_size_read); + /* * We use `bindgen`'s `--size_t-is-usize` option to bind the C `size_t` type * as the Rust `usize` type, so we can use it in contexts where Rust diff --git a/rust/kernel/error.rs b/rust/kernel/error.rs index 05fcab6abfe6..e061c83f806a 100644 --- a/rust/kernel/error.rs +++ b/rust/kernel/error.rs @@ -273,9 +273,7 @@ pub fn to_result(err: core::ffi::c_int) -> Result { /// } /// } /// ``` -// TODO: Remove `dead_code` marker once an in-kernel client is available. -#[allow(dead_code)] -pub(crate) fn from_err_ptr<T>(ptr: *mut T) -> Result<*mut T> { +pub fn from_err_ptr<T>(ptr: *mut T) -> Result<*mut T> { // CAST: Casting a pointer to `*const core::ffi::c_void` is always valid. let const_ptr: *const core::ffi::c_void = ptr.cast(); // SAFETY: The FFI function does not deref the pointer. diff --git a/rust/kernel/file.rs b/rust/kernel/file.rs index 494939ba74df..a3002c416dbb 100644 --- a/rust/kernel/file.rs +++ b/rust/kernel/file.rs @@ -8,11 +8,13 @@ use crate::{ bindings, cred::Credential, - error::{code::*, from_result, Error, Result}, + error::{code::*, from_err_ptr, from_result, Error, Result}, fs, io_buffer::{IoBufferReader, IoBufferWriter}, iov_iter::IovIter, mm, + mount::Vfsmount, + str::CStr, sync::CondVar, types::ARef, types::AlwaysRefCounted, @@ -20,6 +22,7 @@ types::Opaque, user_ptr::{UserSlicePtr, UserSlicePtrReader, UserSlicePtrWriter}, }; +use alloc::vec::Vec; use core::convert::{TryFrom, TryInto}; use core::{marker, mem, ptr}; use macros::vtable; @@ -201,6 +204,130 @@ unsafe fn dec_ref(obj: ptr::NonNull<Self>) { } } +/// A newtype over file, specific to regular files +pub struct RegularFile(ARef<File>); +impl RegularFile { + /// Creates a new instance of Self if the file is a regular file + /// + /// # Safety + /// + /// The caller must ensure file_ptr.f_inode is initialized to a valid pointer (e.g. file_ptr is + /// a pointer returned by path_openat); It must also ensure that file_ptr's reference count was + /// incremented at least once + fn create_if_regular(file_ptr: ptr::NonNull<bindings::file>) -> Result<RegularFile> { + // SAFETY: file_ptr is a NonNull pointer + let inode = unsafe { core::ptr::addr_of!((*file_ptr.as_ptr()).f_inode).read() }; + // SAFETY: the caller must ensure f_inode is initialized to a valid pointer + unsafe { + if bindings::S_IFMT & ((*inode).i_mode) as u32 != bindings::S_IFREG { + return Err(EINVAL); + } + } + // SAFETY: the safety requirements state that file_ptr's reference count was incremented at + // least once + Ok(RegularFile(unsafe { ARef::from_raw(file_ptr.cast()) })) + } + /// Constructs a new [`struct file`] wrapper from a path. + pub fn from_path(filename: &CStr, flags: i32, mode: u16) -> Result<Self> { + let file_ptr = unsafe { + // SAFETY: filename is a reference, so it's a valid pointer + from_err_ptr(bindings::filp_open( + filename.as_ptr() as *const i8, + flags, + mode, + ))? + }; + let file_ptr = ptr::NonNull::new(file_ptr).ok_or(ENOENT)?; + + // SAFETY: `filp_open` initializes the refcount with 1 + Self::create_if_regular(file_ptr) + } + + /// Constructs a new [`struct file`] wrapper from a path and a vfsmount. + pub fn from_path_in_root_mnt( + mount: &Vfsmount, + filename: &CStr, + flags: i32, + mode: u16, + ) -> Result<Self> { + let file_ptr = { + let mnt = mount.get(); + // construct a path from vfsmount, see file_open_root_mnt + let raw_path = bindings::path { + mnt, + // SAFETY: Vfsmount structure stores a valid vfsmount object + dentry: unsafe { (*mnt).mnt_root }, + }; + unsafe { + // SAFETY: raw_path and filename are both references + from_err_ptr(bindings::file_open_root( + &raw_path, + filename.as_ptr() as *const i8, + flags, + mode, + ))? + } + }; + let file_ptr = ptr::NonNull::new(file_ptr).ok_or(ENOENT)?; + + // SAFETY: `file_open_root` initializes the refcount with 1 + Self::create_if_regular(file_ptr) + } + + /// Read from the file into the specified buffer + pub fn read_with_offset(&self, buf: &mut [u8], offset: u64) -> Result<usize> { + Ok({ + // kernel_read_file expects a pointer to a "void *" buffer + let mut ptr_to_buf = buf.as_mut_ptr() as *mut core::ffi::c_void; + // Unless we give a non-null pointer to the file size: + // 1. we cannot give a non-zero value for the offset + // 2. we cannot have offset 0 and buffer_size > file_size + let mut file_size = 0; + + // SAFETY: 'file' is valid because it's taken from Self, 'buf' and 'file_size` are + // references to the stack variables 'ptr_to_buf' and 'file_size'; ptr_to_buf is also + // a pointer to a valid buffer that was obtained from a reference + let result = unsafe { + bindings::kernel_read_file( + self.0 .0.get(), + offset.try_into()?, + &mut ptr_to_buf, + buf.len(), + &mut file_size, + bindings::kernel_read_file_id_READING_UNKNOWN, + ) + }; + + // kernel_read_file returns the number of bytes read on success or negative on error. + if result < 0 { + return Err(Error::from_errno(result.try_into()?)); + } + + result.try_into()? + }) + } + + /// Allocate and return a vector containing the contents of the entire file + pub fn read_to_end(&self) -> Result<Vec<u8>> { + let file_size = self.get_file_size()?; + let mut buffer = Vec::try_with_capacity(file_size)?; + buffer.try_resize(file_size, 0)?; + self.read_with_offset(&mut buffer, 0)?; + Ok(buffer) + } + + fn get_file_size(&self) -> Result<usize> { + // SAFETY: 'file' is valid because it's taken from Self + let file_size = unsafe { bindings::i_size_read((*self.0 .0.get()).f_inode) }; + + if file_size < 0 { + return Err(EINVAL); + } + + Ok(file_size.try_into()?) + } +} + /// A file descriptor reservation. /// /// This allows the creation of a file descriptor in two steps: first, we reserve a slot for it,
Implement from_path, from_path_in_root_mnt, read_with_offset, read_to_end and get_file_size methods for a RegularFile newtype. Signed-off-by: Ariel Miculas <amiculas@cisco.com> --- rust/helpers.c | 6 ++ rust/kernel/error.rs | 4 +- rust/kernel/file.rs | 129 ++++++++++++++++++++++++++++++++++++++++++- 3 files changed, 135 insertions(+), 4 deletions(-)