mirror of
https://github.com/torvalds/linux.git
synced 2025-11-01 00:58:39 +02:00
Extends the `debugfs` API to support creating files with content generated and updated by callbacks. This is done via the `read_callback_file`, `write_callback_file`, and `read_write_callback_file` methods. These methods allow for more flexible file definition, either because the type already has a `Writer` or `Reader` method that doesn't do what you'd like, or because you cannot implement it (e.g. because it's a type defined in another crate or a primitive type). Signed-off-by: Matthew Maurer <mmaurer@google.com> Tested-by: Dirk Behme <dirk.behme@de.bosch.com> Acked-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Link: https://lore.kernel.org/r/20250904-debugfs-rust-v11-4-7d12a165685a@google.com [ Fix up Result<(), Error> -> Result. - Danilo ] Signed-off-by: Danilo Krummrich <dakr@kernel.org>
247 lines
8.7 KiB
Rust
247 lines
8.7 KiB
Rust
// SPDX-License-Identifier: GPL-2.0
|
|
// Copyright (C) 2025 Google LLC.
|
|
|
|
use super::{Reader, Writer};
|
|
use crate::debugfs::callback_adapters::Adapter;
|
|
use crate::prelude::*;
|
|
use crate::seq_file::SeqFile;
|
|
use crate::seq_print;
|
|
use crate::uaccess::UserSlice;
|
|
use core::fmt::{Display, Formatter, Result};
|
|
use core::marker::PhantomData;
|
|
|
|
#[cfg(CONFIG_DEBUG_FS)]
|
|
use core::ops::Deref;
|
|
|
|
/// # Invariant
|
|
///
|
|
/// `FileOps<T>` will always contain an `operations` which is safe to use for a file backed
|
|
/// off an inode which has a pointer to a `T` in its private data that is safe to convert
|
|
/// into a reference.
|
|
pub(super) struct FileOps<T> {
|
|
#[cfg(CONFIG_DEBUG_FS)]
|
|
operations: bindings::file_operations,
|
|
#[cfg(CONFIG_DEBUG_FS)]
|
|
mode: u16,
|
|
_phantom: PhantomData<T>,
|
|
}
|
|
|
|
impl<T> FileOps<T> {
|
|
/// # Safety
|
|
///
|
|
/// The caller asserts that the provided `operations` is safe to use for a file whose
|
|
/// inode has a pointer to `T` in its private data that is safe to convert into a reference.
|
|
const unsafe fn new(operations: bindings::file_operations, mode: u16) -> Self {
|
|
Self {
|
|
#[cfg(CONFIG_DEBUG_FS)]
|
|
operations,
|
|
#[cfg(CONFIG_DEBUG_FS)]
|
|
mode,
|
|
_phantom: PhantomData,
|
|
}
|
|
}
|
|
|
|
#[cfg(CONFIG_DEBUG_FS)]
|
|
pub(crate) const fn mode(&self) -> u16 {
|
|
self.mode
|
|
}
|
|
}
|
|
|
|
impl<T: Adapter> FileOps<T> {
|
|
pub(super) const fn adapt(&self) -> &FileOps<T::Inner> {
|
|
// SAFETY: `Adapter` asserts that `T` can be legally cast to `T::Inner`.
|
|
unsafe { core::mem::transmute(self) }
|
|
}
|
|
}
|
|
|
|
#[cfg(CONFIG_DEBUG_FS)]
|
|
impl<T> Deref for FileOps<T> {
|
|
type Target = bindings::file_operations;
|
|
|
|
fn deref(&self) -> &Self::Target {
|
|
&self.operations
|
|
}
|
|
}
|
|
|
|
struct WriterAdapter<T>(T);
|
|
|
|
impl<'a, T: Writer> Display for WriterAdapter<&'a T> {
|
|
fn fmt(&self, f: &mut Formatter<'_>) -> Result {
|
|
self.0.write(f)
|
|
}
|
|
}
|
|
|
|
/// Implements `open` for `file_operations` via `single_open` to fill out a `seq_file`.
|
|
///
|
|
/// # Safety
|
|
///
|
|
/// * `inode`'s private pointer must point to a value of type `T` which will outlive the `inode`
|
|
/// and will not have any unique references alias it during the call.
|
|
/// * `file` must point to a live, not-yet-initialized file object.
|
|
unsafe extern "C" fn writer_open<T: Writer + Sync>(
|
|
inode: *mut bindings::inode,
|
|
file: *mut bindings::file,
|
|
) -> c_int {
|
|
// SAFETY: The caller ensures that `inode` is a valid pointer.
|
|
let data = unsafe { (*inode).i_private };
|
|
// SAFETY:
|
|
// * `file` is acceptable by caller precondition.
|
|
// * `print_act` will be called on a `seq_file` with private data set to the third argument,
|
|
// so we meet its safety requirements.
|
|
// * The `data` pointer passed in the third argument is a valid `T` pointer that outlives
|
|
// this call by caller preconditions.
|
|
unsafe { bindings::single_open(file, Some(writer_act::<T>), data) }
|
|
}
|
|
|
|
/// Prints private data stashed in a seq_file to that seq file.
|
|
///
|
|
/// # Safety
|
|
///
|
|
/// `seq` must point to a live `seq_file` whose private data is a valid pointer to a `T` which may
|
|
/// not have any unique references alias it during the call.
|
|
unsafe extern "C" fn writer_act<T: Writer + Sync>(
|
|
seq: *mut bindings::seq_file,
|
|
_: *mut c_void,
|
|
) -> c_int {
|
|
// SAFETY: By caller precondition, this pointer is valid pointer to a `T`, and
|
|
// there are not and will not be any unique references until we are done.
|
|
let data = unsafe { &*((*seq).private.cast::<T>()) };
|
|
// SAFETY: By caller precondition, `seq_file` points to a live `seq_file`, so we can lift
|
|
// it.
|
|
let seq_file = unsafe { SeqFile::from_raw(seq) };
|
|
seq_print!(seq_file, "{}", WriterAdapter(data));
|
|
0
|
|
}
|
|
|
|
// Work around lack of generic const items.
|
|
pub(crate) trait ReadFile<T> {
|
|
const FILE_OPS: FileOps<T>;
|
|
}
|
|
|
|
impl<T: Writer + Sync> ReadFile<T> for T {
|
|
const FILE_OPS: FileOps<T> = {
|
|
let operations = bindings::file_operations {
|
|
read: Some(bindings::seq_read),
|
|
llseek: Some(bindings::seq_lseek),
|
|
release: Some(bindings::single_release),
|
|
open: Some(writer_open::<Self>),
|
|
// SAFETY: `file_operations` supports zeroes in all fields.
|
|
..unsafe { core::mem::zeroed() }
|
|
};
|
|
// SAFETY: `operations` is all stock `seq_file` implementations except for `writer_open`.
|
|
// `open`'s only requirement beyond what is provided to all open functions is that the
|
|
// inode's data pointer must point to a `T` that will outlive it, which matches the
|
|
// `FileOps` requirements.
|
|
unsafe { FileOps::new(operations, 0o400) }
|
|
};
|
|
}
|
|
|
|
fn read<T: Reader + Sync>(data: &T, buf: *const c_char, count: usize) -> isize {
|
|
let mut reader = UserSlice::new(UserPtr::from_ptr(buf as *mut c_void), count).reader();
|
|
|
|
if let Err(e) = data.read_from_slice(&mut reader) {
|
|
return e.to_errno() as isize;
|
|
}
|
|
|
|
count as isize
|
|
}
|
|
|
|
/// # Safety
|
|
///
|
|
/// `file` must be a valid pointer to a `file` struct.
|
|
/// The `private_data` of the file must contain a valid pointer to a `seq_file` whose
|
|
/// `private` data in turn points to a `T` that implements `Reader`.
|
|
/// `buf` must be a valid user-space buffer.
|
|
pub(crate) unsafe extern "C" fn write<T: Reader + Sync>(
|
|
file: *mut bindings::file,
|
|
buf: *const c_char,
|
|
count: usize,
|
|
_ppos: *mut bindings::loff_t,
|
|
) -> isize {
|
|
// SAFETY: The file was opened with `single_open`, which sets `private_data` to a `seq_file`.
|
|
let seq = unsafe { &mut *((*file).private_data.cast::<bindings::seq_file>()) };
|
|
// SAFETY: By caller precondition, this pointer is live and points to a value of type `T`.
|
|
let data = unsafe { &*(seq.private as *const T) };
|
|
read(data, buf, count)
|
|
}
|
|
|
|
// A trait to get the file operations for a type.
|
|
pub(crate) trait ReadWriteFile<T> {
|
|
const FILE_OPS: FileOps<T>;
|
|
}
|
|
|
|
impl<T: Writer + Reader + Sync> ReadWriteFile<T> for T {
|
|
const FILE_OPS: FileOps<T> = {
|
|
let operations = bindings::file_operations {
|
|
open: Some(writer_open::<T>),
|
|
read: Some(bindings::seq_read),
|
|
write: Some(write::<T>),
|
|
llseek: Some(bindings::seq_lseek),
|
|
release: Some(bindings::single_release),
|
|
// SAFETY: `file_operations` supports zeroes in all fields.
|
|
..unsafe { core::mem::zeroed() }
|
|
};
|
|
// SAFETY: `operations` is all stock `seq_file` implementations except for `writer_open`
|
|
// and `write`.
|
|
// `writer_open`'s only requirement beyond what is provided to all open functions is that
|
|
// the inode's data pointer must point to a `T` that will outlive it, which matches the
|
|
// `FileOps` requirements.
|
|
// `write` only requires that the file's private data pointer points to `seq_file`
|
|
// which points to a `T` that will outlive it, which matches what `writer_open`
|
|
// provides.
|
|
unsafe { FileOps::new(operations, 0o600) }
|
|
};
|
|
}
|
|
|
|
/// # Safety
|
|
///
|
|
/// `inode` must be a valid pointer to an `inode` struct.
|
|
/// `file` must be a valid pointer to a `file` struct.
|
|
unsafe extern "C" fn write_only_open(
|
|
inode: *mut bindings::inode,
|
|
file: *mut bindings::file,
|
|
) -> c_int {
|
|
// SAFETY: The caller ensures that `inode` and `file` are valid pointers.
|
|
unsafe { (*file).private_data = (*inode).i_private };
|
|
0
|
|
}
|
|
|
|
/// # Safety
|
|
///
|
|
/// * `file` must be a valid pointer to a `file` struct.
|
|
/// * The `private_data` of the file must contain a valid pointer to a `T` that implements
|
|
/// `Reader`.
|
|
/// * `buf` must be a valid user-space buffer.
|
|
pub(crate) unsafe extern "C" fn write_only_write<T: Reader + Sync>(
|
|
file: *mut bindings::file,
|
|
buf: *const c_char,
|
|
count: usize,
|
|
_ppos: *mut bindings::loff_t,
|
|
) -> isize {
|
|
// SAFETY: The caller ensures that `file` is a valid pointer and that `private_data` holds a
|
|
// valid pointer to `T`.
|
|
let data = unsafe { &*((*file).private_data as *const T) };
|
|
read(data, buf, count)
|
|
}
|
|
|
|
pub(crate) trait WriteFile<T> {
|
|
const FILE_OPS: FileOps<T>;
|
|
}
|
|
|
|
impl<T: Reader + Sync> WriteFile<T> for T {
|
|
const FILE_OPS: FileOps<T> = {
|
|
let operations = bindings::file_operations {
|
|
open: Some(write_only_open),
|
|
write: Some(write_only_write::<T>),
|
|
llseek: Some(bindings::noop_llseek),
|
|
// SAFETY: `file_operations` supports zeroes in all fields.
|
|
..unsafe { core::mem::zeroed() }
|
|
};
|
|
// SAFETY:
|
|
// * `write_only_open` populates the file private data with the inode private data
|
|
// * `write_only_write`'s only requirement is that the private data of the file point to
|
|
// a `T` and be legal to convert to a shared reference, which `write_only_open`
|
|
// satisfies.
|
|
unsafe { FileOps::new(operations, 0o200) }
|
|
};
|
|
}
|