Files
kata-containers/src/libs/kata-sys-util/src/fs.rs
Fabiano Fidêncio 021201005d kata-sys-util: Fix needless_borrow warnings
As we bumped the rust toolchain to 1.66.0, some new warnings have been
raised due to needless_borrow.

Let's fix them all here.

For more info about the warnings, please, take a look at:
https://rust-lang.github.io/rust-clippy/master/index.html#needless_borrow

Signed-off-by: Fabiano Fidêncio <fabiano.fidencio@intel.com>
2023-01-02 15:33:01 +01:00

213 lines
7.0 KiB
Rust

// Copyright (c) 2019-2021 Alibaba Cloud
// Copyright (c) 2019-2021 Ant Group
//
// SPDX-License-Identifier: Apache-2.0
//
use std::ffi::OsString;
use std::fs::{self, File};
use std::io::{Error, Result};
use std::os::unix::io::AsRawFd;
use std::path::Path;
use std::process::Command;
use crate::{eother, sl};
// nix filesystem_type for different libc and architectures
#[cfg(all(target_os = "linux", target_env = "musl"))]
type FsType = libc::c_ulong;
#[cfg(all(
target_os = "linux",
not(any(target_env = "musl", target_arch = "s390x"))
))]
type FsType = libc::__fsword_t;
#[cfg(all(target_os = "linux", not(target_env = "musl"), target_arch = "s390x"))]
type FsType = libc::c_uint;
// from linux.git/fs/fuse/inode.c: #define FUSE_SUPER_MAGIC 0x65735546
const FUSE_SUPER_MAGIC: FsType = 0x65735546;
// from linux.git/include/uapi/linux/magic.h
const OVERLAYFS_SUPER_MAGIC: FsType = 0x794c7630;
/// Get the basename of the canonicalized path
pub fn get_base_name<P: AsRef<Path>>(src: P) -> Result<OsString> {
let s = src.as_ref().canonicalize()?;
s.file_name().map(|v| v.to_os_string()).ok_or_else(|| {
eother!(
"failed to get base name of path {}",
src.as_ref().to_string_lossy()
)
})
}
/// Check whether `path` is on a fuse filesystem.
pub fn is_fuse_fs<P: AsRef<Path>>(path: P) -> bool {
if let Ok(st) = nix::sys::statfs::statfs(path.as_ref()) {
if st.filesystem_type().0 == FUSE_SUPER_MAGIC {
return true;
}
}
false
}
/// Check whether `path` is on a overlay filesystem.
pub fn is_overlay_fs<P: AsRef<Path>>(path: P) -> bool {
if let Ok(st) = nix::sys::statfs::statfs(path.as_ref()) {
if st.filesystem_type().0 == OVERLAYFS_SUPER_MAGIC {
return true;
}
}
false
}
/// Check whether the given path is a symlink.
pub fn is_symlink<P: AsRef<Path>>(path: P) -> std::io::Result<bool> {
let path = path.as_ref();
let meta = fs::symlink_metadata(path)?;
Ok(meta.file_type().is_symlink())
}
/// Reflink copy src to dst, and falls back to regular copy if reflink copy fails.
///
/// # Safety
/// The `reflink_copy()` doesn't preserve permission/security context for the copied file,
/// so caller needs to take care of it.
pub fn reflink_copy<S: AsRef<Path>, D: AsRef<Path>>(src: S, dst: D) -> Result<()> {
let src_path = src.as_ref();
let dst_path = dst.as_ref();
let src = src_path.to_string_lossy();
let dst = dst_path.to_string_lossy();
if !src_path.is_file() {
return Err(eother!("reflink_copy src {} is not a regular file", src));
}
// Make sure dst's parent exist. If dst is a regular file, then unlink it for later copy.
if dst_path.exists() {
if !dst_path.is_file() {
return Err(eother!("reflink_copy dst {} is not a regular file", dst));
} else {
fs::remove_file(dst_path)?;
}
} else if let Some(dst_parent) = dst_path.parent() {
if !dst_parent.exists() {
if let Err(e) = fs::create_dir_all(dst_parent) {
return Err(eother!(
"reflink_copy: create_dir_all {} failed: {:?}",
dst_parent.to_str().unwrap(),
e
));
}
} else if !dst_parent.is_dir() {
return Err(eother!("reflink_copy parent of {} is not a directory", dst));
}
}
// Reflink copy, and fallback to regular copy if reflink fails.
let src_file = fs::File::open(src_path)?;
let dst_file = fs::File::create(dst_path)?;
if let Err(e) = do_reflink_copy(src_file, dst_file) {
match e.raw_os_error() {
// Cross dev copy or filesystem doesn't support reflink, do regular copy
Some(os_err)
if os_err == nix::Error::EXDEV as i32
|| os_err == nix::Error::EOPNOTSUPP as i32 =>
{
warn!(
sl!(),
"reflink_copy: reflink is not supported ({:?}), do regular copy instead", e,
);
if let Err(e) = do_regular_copy(src.as_ref(), dst.as_ref()) {
return Err(eother!(
"reflink_copy: regular copy {} to {} failed: {:?}",
src,
dst,
e
));
}
}
// Reflink copy failed
_ => {
return Err(eother!(
"reflink_copy: copy {} to {} failed: {:?}",
src,
dst,
e,
))
}
}
}
Ok(())
}
// Copy file using cp command, which handles sparse file copy.
fn do_regular_copy(src: &str, dst: &str) -> Result<()> {
let mut cmd = Command::new("/bin/cp");
cmd.args(["--sparse=auto", src, dst]);
match cmd.output() {
Ok(output) => match output.status.success() {
true => Ok(()),
false => Err(eother!("`{:?}` failed: {:?}", cmd, output)),
},
Err(e) => Err(eother!("`{:?}` failed: {:?}", cmd, e)),
}
}
/// Copy file by reflink
fn do_reflink_copy(src: File, dst: File) -> Result<()> {
use nix::ioctl_write_int;
// FICLONE ioctl number definition, from include/linux/fs.h
const FS_IOC_MAGIC: u8 = 0x94;
const FS_IOC_FICLONE: u8 = 9;
// Define FICLONE ioctl using nix::ioctl_write_int! macro.
// The generated function has the following signature:
// pub unsafe fn ficlone(fd: libc::c_int, data: libc::c_ulang) -> Result<libc::c_int>
ioctl_write_int!(ficlone, FS_IOC_MAGIC, FS_IOC_FICLONE);
// Safe because the `src` and `dst` are valid file objects and we have checked the result.
unsafe { ficlone(dst.as_raw_fd(), src.as_raw_fd() as u64) }
.map(|_| ())
.map_err(|e| Error::from_raw_os_error(e as i32))
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn test_get_base_name() {
assert_eq!(&get_base_name("/etc/hostname").unwrap(), "hostname");
assert_eq!(&get_base_name("/bin").unwrap(), "bin");
assert!(&get_base_name("/").is_err());
assert!(&get_base_name("").is_err());
assert!(get_base_name("/no/such/path________yeah").is_err());
}
#[test]
fn test_is_symlink() {
let tmpdir = tempfile::tempdir().unwrap();
let path = tmpdir.path();
std::os::unix::fs::symlink(path, path.join("a")).unwrap();
assert!(is_symlink(path.join("a")).unwrap());
}
#[test]
fn test_reflink_copy() {
let tmpdir = tempfile::tempdir().unwrap();
let path = tmpdir.path().join("mounts");
reflink_copy("/proc/mounts", &path).unwrap();
let content = fs::read_to_string(&path).unwrap();
assert!(!content.is_empty());
reflink_copy("/proc/mounts", &path).unwrap();
let content = fs::read_to_string(&path).unwrap();
assert!(!content.is_empty());
reflink_copy("/proc/mounts", tmpdir.path()).unwrap_err();
reflink_copy("/proc/mounts_not_exist", &path).unwrap_err();
}
}