kernel/debugfs/
file_ops.rs

1// SPDX-License-Identifier: GPL-2.0
2// Copyright (C) 2025 Google LLC.
3
4use super::{BinaryReader, BinaryWriter, Reader, Writer};
5use crate::debugfs::callback_adapters::Adapter;
6use crate::fmt;
7use crate::fs::file;
8use crate::prelude::*;
9use crate::seq_file::SeqFile;
10use crate::seq_print;
11use crate::uaccess::UserSlice;
12use core::marker::PhantomData;
13
14#[cfg(CONFIG_DEBUG_FS)]
15use core::ops::Deref;
16
17/// # Invariant
18///
19/// `FileOps<T>` will always contain an `operations` which is safe to use for a file backed
20/// off an inode which has a pointer to a `T` in its private data that is safe to convert
21/// into a reference.
22pub(super) struct FileOps<T> {
23    #[cfg(CONFIG_DEBUG_FS)]
24    operations: bindings::file_operations,
25    #[cfg(CONFIG_DEBUG_FS)]
26    mode: u16,
27    _phantom: PhantomData<T>,
28}
29
30impl<T> FileOps<T> {
31    /// # Safety
32    ///
33    /// The caller asserts that the provided `operations` is safe to use for a file whose
34    /// inode has a pointer to `T` in its private data that is safe to convert into a reference.
35    const unsafe fn new(operations: bindings::file_operations, mode: u16) -> Self {
36        Self {
37            #[cfg(CONFIG_DEBUG_FS)]
38            operations,
39            #[cfg(CONFIG_DEBUG_FS)]
40            mode,
41            _phantom: PhantomData,
42        }
43    }
44
45    #[cfg(CONFIG_DEBUG_FS)]
46    pub(crate) const fn mode(&self) -> u16 {
47        self.mode
48    }
49}
50
51impl<T: Adapter> FileOps<T> {
52    pub(super) const fn adapt(&self) -> &FileOps<T::Inner> {
53        // SAFETY: `Adapter` asserts that `T` can be legally cast to `T::Inner`.
54        unsafe { core::mem::transmute(self) }
55    }
56}
57
58#[cfg(CONFIG_DEBUG_FS)]
59impl<T> Deref for FileOps<T> {
60    type Target = bindings::file_operations;
61
62    fn deref(&self) -> &Self::Target {
63        &self.operations
64    }
65}
66
67struct WriterAdapter<T>(T);
68
69impl<'a, T: Writer> fmt::Display for WriterAdapter<&'a T> {
70    fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
71        self.0.write(f)
72    }
73}
74
75/// Implements `open` for `file_operations` via `single_open` to fill out a `seq_file`.
76///
77/// # Safety
78///
79/// * `inode`'s private pointer must point to a value of type `T` which will outlive the `inode`
80///   and will not have any unique references alias it during the call.
81/// * `file` must point to a live, not-yet-initialized file object.
82unsafe extern "C" fn writer_open<T: Writer + Sync>(
83    inode: *mut bindings::inode,
84    file: *mut bindings::file,
85) -> c_int {
86    // SAFETY: The caller ensures that `inode` is a valid pointer.
87    let data = unsafe { (*inode).i_private };
88    // SAFETY:
89    // * `file` is acceptable by caller precondition.
90    // * `print_act` will be called on a `seq_file` with private data set to the third argument,
91    //   so we meet its safety requirements.
92    // * The `data` pointer passed in the third argument is a valid `T` pointer that outlives
93    //   this call by caller preconditions.
94    unsafe { bindings::single_open(file, Some(writer_act::<T>), data) }
95}
96
97/// Prints private data stashed in a seq_file to that seq file.
98///
99/// # Safety
100///
101/// `seq` must point to a live `seq_file` whose private data is a valid pointer to a `T` which may
102/// not have any unique references alias it during the call.
103unsafe extern "C" fn writer_act<T: Writer + Sync>(
104    seq: *mut bindings::seq_file,
105    _: *mut c_void,
106) -> c_int {
107    // SAFETY: By caller precondition, this pointer is valid pointer to a `T`, and
108    // there are not and will not be any unique references until we are done.
109    let data = unsafe { &*((*seq).private.cast::<T>()) };
110    // SAFETY: By caller precondition, `seq_file` points to a live `seq_file`, so we can lift
111    // it.
112    let seq_file = unsafe { SeqFile::from_raw(seq) };
113    seq_print!(seq_file, "{}", WriterAdapter(data));
114    0
115}
116
117// Work around lack of generic const items.
118pub(crate) trait ReadFile<T> {
119    const FILE_OPS: FileOps<T>;
120}
121
122impl<T: Writer + Sync> ReadFile<T> for T {
123    const FILE_OPS: FileOps<T> = {
124        let operations = bindings::file_operations {
125            read: Some(bindings::seq_read),
126            llseek: Some(bindings::seq_lseek),
127            release: Some(bindings::single_release),
128            open: Some(writer_open::<Self>),
129            // SAFETY: `file_operations` supports zeroes in all fields.
130            ..unsafe { core::mem::zeroed() }
131        };
132        // SAFETY: `operations` is all stock `seq_file` implementations except for `writer_open`.
133        // `open`'s only requirement beyond what is provided to all open functions is that the
134        // inode's data pointer must point to a `T` that will outlive it, which matches the
135        // `FileOps` requirements.
136        unsafe { FileOps::new(operations, 0o400) }
137    };
138}
139
140fn read<T: Reader + Sync>(data: &T, buf: *const c_char, count: usize) -> isize {
141    let mut reader = UserSlice::new(UserPtr::from_ptr(buf as *mut c_void), count).reader();
142
143    if let Err(e) = data.read_from_slice(&mut reader) {
144        return e.to_errno() as isize;
145    }
146
147    count as isize
148}
149
150/// # Safety
151///
152/// `file` must be a valid pointer to a `file` struct.
153/// The `private_data` of the file must contain a valid pointer to a `seq_file` whose
154/// `private` data in turn points to a `T` that implements `Reader`.
155/// `buf` must be a valid user-space buffer.
156pub(crate) unsafe extern "C" fn write<T: Reader + Sync>(
157    file: *mut bindings::file,
158    buf: *const c_char,
159    count: usize,
160    _ppos: *mut bindings::loff_t,
161) -> isize {
162    // SAFETY: The file was opened with `single_open`, which sets `private_data` to a `seq_file`.
163    let seq = unsafe { &mut *((*file).private_data.cast::<bindings::seq_file>()) };
164    // SAFETY: By caller precondition, this pointer is live and points to a value of type `T`.
165    let data = unsafe { &*(seq.private as *const T) };
166    read(data, buf, count)
167}
168
169// A trait to get the file operations for a type.
170pub(crate) trait ReadWriteFile<T> {
171    const FILE_OPS: FileOps<T>;
172}
173
174impl<T: Writer + Reader + Sync> ReadWriteFile<T> for T {
175    const FILE_OPS: FileOps<T> = {
176        let operations = bindings::file_operations {
177            open: Some(writer_open::<T>),
178            read: Some(bindings::seq_read),
179            write: Some(write::<T>),
180            llseek: Some(bindings::seq_lseek),
181            release: Some(bindings::single_release),
182            // SAFETY: `file_operations` supports zeroes in all fields.
183            ..unsafe { core::mem::zeroed() }
184        };
185        // SAFETY: `operations` is all stock `seq_file` implementations except for `writer_open`
186        // and `write`.
187        // `writer_open`'s only requirement beyond what is provided to all open functions is that
188        // the inode's data pointer must point to a `T` that will outlive it, which matches the
189        // `FileOps` requirements.
190        // `write` only requires that the file's private data pointer points to `seq_file`
191        // which points to a `T` that will outlive it, which matches what `writer_open`
192        // provides.
193        unsafe { FileOps::new(operations, 0o600) }
194    };
195}
196
197/// # Safety
198///
199/// `inode` must be a valid pointer to an `inode` struct.
200/// `file` must be a valid pointer to a `file` struct.
201unsafe extern "C" fn write_only_open(
202    inode: *mut bindings::inode,
203    file: *mut bindings::file,
204) -> c_int {
205    // SAFETY: The caller ensures that `inode` and `file` are valid pointers.
206    unsafe { (*file).private_data = (*inode).i_private };
207    0
208}
209
210/// # Safety
211///
212/// * `file` must be a valid pointer to a `file` struct.
213/// * The `private_data` of the file must contain a valid pointer to a `T` that implements
214///   `Reader`.
215/// * `buf` must be a valid user-space buffer.
216pub(crate) unsafe extern "C" fn write_only_write<T: Reader + Sync>(
217    file: *mut bindings::file,
218    buf: *const c_char,
219    count: usize,
220    _ppos: *mut bindings::loff_t,
221) -> isize {
222    // SAFETY: The caller ensures that `file` is a valid pointer and that `private_data` holds a
223    // valid pointer to `T`.
224    let data = unsafe { &*((*file).private_data as *const T) };
225    read(data, buf, count)
226}
227
228pub(crate) trait WriteFile<T> {
229    const FILE_OPS: FileOps<T>;
230}
231
232impl<T: Reader + Sync> WriteFile<T> for T {
233    const FILE_OPS: FileOps<T> = {
234        let operations = bindings::file_operations {
235            open: Some(write_only_open),
236            write: Some(write_only_write::<T>),
237            llseek: Some(bindings::noop_llseek),
238            // SAFETY: `file_operations` supports zeroes in all fields.
239            ..unsafe { core::mem::zeroed() }
240        };
241        // SAFETY:
242        // * `write_only_open` populates the file private data with the inode private data
243        // * `write_only_write`'s only requirement is that the private data of the file point to
244        //   a `T` and be legal to convert to a shared reference, which `write_only_open`
245        //   satisfies.
246        unsafe { FileOps::new(operations, 0o200) }
247    };
248}
249
250extern "C" fn blob_read<T: BinaryWriter>(
251    file: *mut bindings::file,
252    buf: *mut c_char,
253    count: usize,
254    ppos: *mut bindings::loff_t,
255) -> isize {
256    // SAFETY:
257    // - `file` is a valid pointer to a `struct file`.
258    // - The type invariant of `FileOps` guarantees that `private_data` points to a valid `T`.
259    let this = unsafe { &*((*file).private_data.cast::<T>()) };
260
261    // SAFETY:
262    // - `ppos` is a valid `file::Offset` pointer.
263    // - We have exclusive access to `ppos`.
264    let pos: &mut file::Offset = unsafe { &mut *ppos };
265
266    let mut writer = UserSlice::new(UserPtr::from_ptr(buf.cast()), count).writer();
267
268    let ret = || -> Result<isize> {
269        let written = this.write_to_slice(&mut writer, pos)?;
270
271        Ok(written.try_into()?)
272    }();
273
274    match ret {
275        Ok(n) => n,
276        Err(e) => e.to_errno() as isize,
277    }
278}
279
280/// Representation of [`FileOps`] for read only binary files.
281pub(crate) trait BinaryReadFile<T> {
282    const FILE_OPS: FileOps<T>;
283}
284
285impl<T: BinaryWriter + Sync> BinaryReadFile<T> for T {
286    const FILE_OPS: FileOps<T> = {
287        let operations = bindings::file_operations {
288            read: Some(blob_read::<T>),
289            llseek: Some(bindings::default_llseek),
290            open: Some(bindings::simple_open),
291            // SAFETY: `file_operations` supports zeroes in all fields.
292            ..unsafe { core::mem::zeroed() }
293        };
294
295        // SAFETY:
296        // - The private data of `struct inode` does always contain a pointer to a valid `T`.
297        // - `simple_open()` stores the `struct inode`'s private data in the private data of the
298        //   corresponding `struct file`.
299        // - `blob_read()` re-creates a reference to `T` from the `struct file`'s private data.
300        // - `default_llseek()` does not access the `struct file`'s private data.
301        unsafe { FileOps::new(operations, 0o400) }
302    };
303}
304
305extern "C" fn blob_write<T: BinaryReader>(
306    file: *mut bindings::file,
307    buf: *const c_char,
308    count: usize,
309    ppos: *mut bindings::loff_t,
310) -> isize {
311    // SAFETY:
312    // - `file` is a valid pointer to a `struct file`.
313    // - The type invariant of `FileOps` guarantees that `private_data` points to a valid `T`.
314    let this = unsafe { &*((*file).private_data.cast::<T>()) };
315
316    // SAFETY:
317    // - `ppos` is a valid `file::Offset` pointer.
318    // - We have exclusive access to `ppos`.
319    let pos: &mut file::Offset = unsafe { &mut *ppos };
320
321    let mut reader = UserSlice::new(UserPtr::from_ptr(buf.cast_mut().cast()), count).reader();
322
323    let ret = || -> Result<isize> {
324        let read = this.read_from_slice(&mut reader, pos)?;
325
326        Ok(read.try_into()?)
327    }();
328
329    match ret {
330        Ok(n) => n,
331        Err(e) => e.to_errno() as isize,
332    }
333}
334
335/// Representation of [`FileOps`] for write only binary files.
336pub(crate) trait BinaryWriteFile<T> {
337    const FILE_OPS: FileOps<T>;
338}
339
340impl<T: BinaryReader + Sync> BinaryWriteFile<T> for T {
341    const FILE_OPS: FileOps<T> = {
342        let operations = bindings::file_operations {
343            write: Some(blob_write::<T>),
344            llseek: Some(bindings::default_llseek),
345            open: Some(bindings::simple_open),
346            // SAFETY: `file_operations` supports zeroes in all fields.
347            ..unsafe { core::mem::zeroed() }
348        };
349
350        // SAFETY:
351        // - The private data of `struct inode` does always contain a pointer to a valid `T`.
352        // - `simple_open()` stores the `struct inode`'s private data in the private data of the
353        //   corresponding `struct file`.
354        // - `blob_write()` re-creates a reference to `T` from the `struct file`'s private data.
355        // - `default_llseek()` does not access the `struct file`'s private data.
356        unsafe { FileOps::new(operations, 0o200) }
357    };
358}
359
360/// Representation of [`FileOps`] for read/write binary files.
361pub(crate) trait BinaryReadWriteFile<T> {
362    const FILE_OPS: FileOps<T>;
363}
364
365impl<T: BinaryWriter + BinaryReader + Sync> BinaryReadWriteFile<T> for T {
366    const FILE_OPS: FileOps<T> = {
367        let operations = bindings::file_operations {
368            read: Some(blob_read::<T>),
369            write: Some(blob_write::<T>),
370            llseek: Some(bindings::default_llseek),
371            open: Some(bindings::simple_open),
372            // SAFETY: `file_operations` supports zeroes in all fields.
373            ..unsafe { core::mem::zeroed() }
374        };
375
376        // SAFETY:
377        // - The private data of `struct inode` does always contain a pointer to a valid `T`.
378        // - `simple_open()` stores the `struct inode`'s private data in the private data of the
379        //   corresponding `struct file`.
380        // - `blob_read()` re-creates a reference to `T` from the `struct file`'s private data.
381        // - `blob_write()` re-creates a reference to `T` from the `struct file`'s private data.
382        // - `default_llseek()` does not access the `struct file`'s private data.
383        unsafe { FileOps::new(operations, 0o600) }
384    };
385}