xref: /linux/rust/kernel/error.rs (revision 4a57e0913e8c7fff407e97909f4ae48caa84d612)
1 // SPDX-License-Identifier: GPL-2.0
2 
3 //! Kernel errors.
4 //!
5 //! C header: [`include/uapi/asm-generic/errno-base.h`](srctree/include/uapi/asm-generic/errno-base.h)\
6 //! C header: [`include/uapi/asm-generic/errno.h`](srctree/include/uapi/asm-generic/errno.h)\
7 //! C header: [`include/linux/errno.h`](srctree/include/linux/errno.h)
8 
9 use crate::{
10     alloc::{layout::LayoutError, AllocError},
11     fmt,
12     str::CStr,
13 };
14 
15 use core::num::NonZeroI32;
16 use core::num::TryFromIntError;
17 use core::str::Utf8Error;
18 
19 /// Contains the C-compatible error codes.
20 #[rustfmt::skip]
21 pub mod code {
22     macro_rules! declare_err {
23         ($err:tt $(,)? $($doc:expr),+) => {
24             $(
25             #[doc = $doc]
26             )*
27             pub const $err: super::Error =
28                 match super::Error::try_from_errno(-(crate::bindings::$err as i32)) {
29                     Some(err) => err,
30                     None => panic!("Invalid errno in `declare_err!`"),
31                 };
32         };
33     }
34 
35     declare_err!(EPERM, "Operation not permitted.");
36     declare_err!(ENOENT, "No such file or directory.");
37     declare_err!(ESRCH, "No such process.");
38     declare_err!(EINTR, "Interrupted system call.");
39     declare_err!(EIO, "I/O error.");
40     declare_err!(ENXIO, "No such device or address.");
41     declare_err!(E2BIG, "Argument list too long.");
42     declare_err!(ENOEXEC, "Exec format error.");
43     declare_err!(EBADF, "Bad file number.");
44     declare_err!(ECHILD, "No child processes.");
45     declare_err!(EAGAIN, "Try again.");
46     declare_err!(ENOMEM, "Out of memory.");
47     declare_err!(EACCES, "Permission denied.");
48     declare_err!(EFAULT, "Bad address.");
49     declare_err!(ENOTBLK, "Block device required.");
50     declare_err!(EBUSY, "Device or resource busy.");
51     declare_err!(EEXIST, "File exists.");
52     declare_err!(EXDEV, "Cross-device link.");
53     declare_err!(ENODEV, "No such device.");
54     declare_err!(ENOTDIR, "Not a directory.");
55     declare_err!(EISDIR, "Is a directory.");
56     declare_err!(EINVAL, "Invalid argument.");
57     declare_err!(ENFILE, "File table overflow.");
58     declare_err!(EMFILE, "Too many open files.");
59     declare_err!(ENOTTY, "Not a typewriter.");
60     declare_err!(ETXTBSY, "Text file busy.");
61     declare_err!(EFBIG, "File too large.");
62     declare_err!(ENOSPC, "No space left on device.");
63     declare_err!(ESPIPE, "Illegal seek.");
64     declare_err!(EROFS, "Read-only file system.");
65     declare_err!(EMLINK, "Too many links.");
66     declare_err!(EPIPE, "Broken pipe.");
67     declare_err!(EDOM, "Math argument out of domain of func.");
68     declare_err!(ERANGE, "Math result not representable.");
69     declare_err!(EOVERFLOW, "Value too large for defined data type.");
70     declare_err!(EMSGSIZE, "Message too long.");
71     declare_err!(ETIMEDOUT, "Connection timed out.");
72     declare_err!(ERESTARTSYS, "Restart the system call.");
73     declare_err!(ERESTARTNOINTR, "System call was interrupted by a signal and will be restarted.");
74     declare_err!(ERESTARTNOHAND, "Restart if no handler.");
75     declare_err!(ENOIOCTLCMD, "No ioctl command.");
76     declare_err!(ERESTART_RESTARTBLOCK, "Restart by calling sys_restart_syscall.");
77     declare_err!(EPROBE_DEFER, "Driver requests probe retry.");
78     declare_err!(EOPENSTALE, "Open found a stale dentry.");
79     declare_err!(ENOPARAM, "Parameter not supported.");
80     declare_err!(EBADHANDLE, "Illegal NFS file handle.");
81     declare_err!(ENOTSYNC, "Update synchronization mismatch.");
82     declare_err!(EBADCOOKIE, "Cookie is stale.");
83     declare_err!(ENOTSUPP, "Operation is not supported.");
84     declare_err!(ETOOSMALL, "Buffer or request is too small.");
85     declare_err!(ESERVERFAULT, "An untranslatable error occurred.");
86     declare_err!(EBADTYPE, "Type not supported by server.");
87     declare_err!(EJUKEBOX, "Request initiated, but will not complete before timeout.");
88     declare_err!(EIOCBQUEUED, "iocb queued, will get completion event.");
89     declare_err!(ERECALLCONFLICT, "Conflict with recalled state.");
90     declare_err!(ENOGRACE, "NFS file lock reclaim refused.");
91 }
92 
93 /// Generic integer kernel error.
94 ///
95 /// The kernel defines a set of integer generic error codes based on C and
96 /// POSIX ones. These codes may have a more specific meaning in some contexts.
97 ///
98 /// # Invariants
99 ///
100 /// The value is a valid `errno` (i.e. `>= -MAX_ERRNO && < 0`).
101 #[derive(Clone, Copy, PartialEq, Eq)]
102 pub struct Error(NonZeroI32);
103 
104 impl Error {
105     /// Creates an [`Error`] from a kernel error code.
106     ///
107     /// `errno` must be within error code range (i.e. `>= -MAX_ERRNO && < 0`).
108     ///
109     /// It is a bug to pass an out-of-range `errno`. [`code::EINVAL`] is returned in such a case.
110     ///
111     /// # Examples
112     ///
113     /// ```
114     /// assert_eq!(Error::from_errno(-1), EPERM);
115     /// assert_eq!(Error::from_errno(-2), ENOENT);
116     /// ```
117     ///
118     /// The following calls are considered a bug:
119     ///
120     /// ```
121     /// assert_eq!(Error::from_errno(0), EINVAL);
122     /// assert_eq!(Error::from_errno(-1000000), EINVAL);
123     /// ```
124     pub fn from_errno(errno: crate::ffi::c_int) -> Error {
125         if let Some(error) = Self::try_from_errno(errno) {
126             error
127         } else {
128             // TODO: Make it a `WARN_ONCE` once available.
129             crate::pr_warn!(
130                 "attempted to create `Error` with out of range `errno`: {}\n",
131                 errno
132             );
133             code::EINVAL
134         }
135     }
136 
137     /// Creates an [`Error`] from a kernel error code.
138     ///
139     /// Returns [`None`] if `errno` is out-of-range.
140     const fn try_from_errno(errno: crate::ffi::c_int) -> Option<Error> {
141         if errno < -(bindings::MAX_ERRNO as i32) || errno >= 0 {
142             return None;
143         }
144 
145         // SAFETY: `errno` is checked above to be in a valid range.
146         Some(unsafe { Error::from_errno_unchecked(errno) })
147     }
148 
149     /// Creates an [`Error`] from a kernel error code.
150     ///
151     /// # Safety
152     ///
153     /// `errno` must be within error code range (i.e. `>= -MAX_ERRNO && < 0`).
154     const unsafe fn from_errno_unchecked(errno: crate::ffi::c_int) -> Error {
155         // INVARIANT: The contract ensures the type invariant
156         // will hold.
157         // SAFETY: The caller guarantees `errno` is non-zero.
158         Error(unsafe { NonZeroI32::new_unchecked(errno) })
159     }
160 
161     /// Returns the kernel error code.
162     pub fn to_errno(self) -> crate::ffi::c_int {
163         self.0.get()
164     }
165 
166     #[cfg(CONFIG_BLOCK)]
167     pub(crate) fn to_blk_status(self) -> bindings::blk_status_t {
168         // SAFETY: `self.0` is a valid error due to its invariant.
169         unsafe { bindings::errno_to_blk_status(self.0.get()) }
170     }
171 
172     /// Returns the error encoded as a pointer.
173     pub fn to_ptr<T>(self) -> *mut T {
174         // SAFETY: `self.0` is a valid error due to its invariant.
175         unsafe { bindings::ERR_PTR(self.0.get() as crate::ffi::c_long).cast() }
176     }
177 
178     /// Returns a string representing the error, if one exists.
179     #[cfg(not(testlib))]
180     pub fn name(&self) -> Option<&'static CStr> {
181         // SAFETY: Just an FFI call, there are no extra safety requirements.
182         let ptr = unsafe { bindings::errname(-self.0.get()) };
183         if ptr.is_null() {
184             None
185         } else {
186             use crate::str::CStrExt as _;
187 
188             // SAFETY: The string returned by `errname` is static and `NUL`-terminated.
189             Some(unsafe { CStr::from_char_ptr(ptr) })
190         }
191     }
192 
193     /// Returns a string representing the error, if one exists.
194     ///
195     /// When `testlib` is configured, this always returns `None` to avoid the dependency on a
196     /// kernel function so that tests that use this (e.g., by calling [`Result::unwrap`]) can still
197     /// run in userspace.
198     #[cfg(testlib)]
199     pub fn name(&self) -> Option<&'static CStr> {
200         None
201     }
202 }
203 
204 impl fmt::Debug for Error {
205     fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
206         match self.name() {
207             // Print out number if no name can be found.
208             None => f.debug_tuple("Error").field(&-self.0).finish(),
209             Some(name) => f
210                 .debug_tuple(
211                     // SAFETY: These strings are ASCII-only.
212                     unsafe { core::str::from_utf8_unchecked(name.to_bytes()) },
213                 )
214                 .finish(),
215         }
216     }
217 }
218 
219 impl From<AllocError> for Error {
220     #[inline]
221     fn from(_: AllocError) -> Error {
222         code::ENOMEM
223     }
224 }
225 
226 impl From<TryFromIntError> for Error {
227     #[inline]
228     fn from(_: TryFromIntError) -> Error {
229         code::EINVAL
230     }
231 }
232 
233 impl From<Utf8Error> for Error {
234     #[inline]
235     fn from(_: Utf8Error) -> Error {
236         code::EINVAL
237     }
238 }
239 
240 impl From<LayoutError> for Error {
241     #[inline]
242     fn from(_: LayoutError) -> Error {
243         code::ENOMEM
244     }
245 }
246 
247 impl From<fmt::Error> for Error {
248     #[inline]
249     fn from(_: fmt::Error) -> Error {
250         code::EINVAL
251     }
252 }
253 
254 impl From<core::convert::Infallible> for Error {
255     #[inline]
256     fn from(e: core::convert::Infallible) -> Error {
257         match e {}
258     }
259 }
260 
261 /// A [`Result`] with an [`Error`] error type.
262 ///
263 /// To be used as the return type for functions that may fail.
264 ///
265 /// # Error codes in C and Rust
266 ///
267 /// In C, it is common that functions indicate success or failure through
268 /// their return value; modifying or returning extra data through non-`const`
269 /// pointer parameters. In particular, in the kernel, functions that may fail
270 /// typically return an `int` that represents a generic error code. We model
271 /// those as [`Error`].
272 ///
273 /// In Rust, it is idiomatic to model functions that may fail as returning
274 /// a [`Result`]. Since in the kernel many functions return an error code,
275 /// [`Result`] is a type alias for a [`core::result::Result`] that uses
276 /// [`Error`] as its error type.
277 ///
278 /// Note that even if a function does not return anything when it succeeds,
279 /// it should still be modeled as returning a [`Result`] rather than
280 /// just an [`Error`].
281 ///
282 /// Calling a function that returns [`Result`] forces the caller to handle
283 /// the returned [`Result`].
284 ///
285 /// This can be done "manually" by using [`match`]. Using [`match`] to decode
286 /// the [`Result`] is similar to C where all the return value decoding and the
287 /// error handling is done explicitly by writing handling code for each
288 /// error to cover. Using [`match`] the error and success handling can be
289 /// implemented in all detail as required. For example (inspired by
290 /// [`samples/rust/rust_minimal.rs`]):
291 ///
292 /// ```
293 /// # #[allow(clippy::single_match)]
294 /// fn example() -> Result {
295 ///     let mut numbers = KVec::new();
296 ///
297 ///     match numbers.push(72, GFP_KERNEL) {
298 ///         Err(e) => {
299 ///             pr_err!("Error pushing 72: {e:?}");
300 ///             return Err(e.into());
301 ///         }
302 ///         // Do nothing, continue.
303 ///         Ok(()) => (),
304 ///     }
305 ///
306 ///     match numbers.push(108, GFP_KERNEL) {
307 ///         Err(e) => {
308 ///             pr_err!("Error pushing 108: {e:?}");
309 ///             return Err(e.into());
310 ///         }
311 ///         // Do nothing, continue.
312 ///         Ok(()) => (),
313 ///     }
314 ///
315 ///     match numbers.push(200, GFP_KERNEL) {
316 ///         Err(e) => {
317 ///             pr_err!("Error pushing 200: {e:?}");
318 ///             return Err(e.into());
319 ///         }
320 ///         // Do nothing, continue.
321 ///         Ok(()) => (),
322 ///     }
323 ///
324 ///     Ok(())
325 /// }
326 /// # example()?;
327 /// # Ok::<(), Error>(())
328 /// ```
329 ///
330 /// An alternative to be more concise is the [`if let`] syntax:
331 ///
332 /// ```
333 /// fn example() -> Result {
334 ///     let mut numbers = KVec::new();
335 ///
336 ///     if let Err(e) = numbers.push(72, GFP_KERNEL) {
337 ///         pr_err!("Error pushing 72: {e:?}");
338 ///         return Err(e.into());
339 ///     }
340 ///
341 ///     if let Err(e) = numbers.push(108, GFP_KERNEL) {
342 ///         pr_err!("Error pushing 108: {e:?}");
343 ///         return Err(e.into());
344 ///     }
345 ///
346 ///     if let Err(e) = numbers.push(200, GFP_KERNEL) {
347 ///         pr_err!("Error pushing 200: {e:?}");
348 ///         return Err(e.into());
349 ///     }
350 ///
351 ///     Ok(())
352 /// }
353 /// # example()?;
354 /// # Ok::<(), Error>(())
355 /// ```
356 ///
357 /// Instead of these verbose [`match`]/[`if let`], the [`?`] operator can
358 /// be used to handle the [`Result`]. Using the [`?`] operator is often
359 /// the best choice to handle [`Result`] in a non-verbose way as done in
360 /// [`samples/rust/rust_minimal.rs`]:
361 ///
362 /// ```
363 /// fn example() -> Result {
364 ///     let mut numbers = KVec::new();
365 ///
366 ///     numbers.push(72, GFP_KERNEL)?;
367 ///     numbers.push(108, GFP_KERNEL)?;
368 ///     numbers.push(200, GFP_KERNEL)?;
369 ///
370 ///     Ok(())
371 /// }
372 /// # example()?;
373 /// # Ok::<(), Error>(())
374 /// ```
375 ///
376 /// Another possibility is to call [`unwrap()`](Result::unwrap) or
377 /// [`expect()`](Result::expect). However, use of these functions is
378 /// *heavily discouraged* in the kernel because they trigger a Rust
379 /// [`panic!`] if an error happens, which may destabilize the system or
380 /// entirely break it as a result -- just like the C [`BUG()`] macro.
381 /// Please see the documentation for the C macro [`BUG()`] for guidance
382 /// on when to use these functions.
383 ///
384 /// Alternatively, depending on the use case, using [`unwrap_or()`],
385 /// [`unwrap_or_else()`], [`unwrap_or_default()`] or [`unwrap_unchecked()`]
386 /// might be an option, as well.
387 ///
388 /// For even more details, please see the [Rust documentation].
389 ///
390 /// [`match`]: https://doc.rust-lang.org/reference/expressions/match-expr.html
391 /// [`samples/rust/rust_minimal.rs`]: srctree/samples/rust/rust_minimal.rs
392 /// [`if let`]: https://doc.rust-lang.org/reference/expressions/if-expr.html#if-let-expressions
393 /// [`?`]: https://doc.rust-lang.org/reference/expressions/operator-expr.html#the-question-mark-operator
394 /// [`unwrap()`]: Result::unwrap
395 /// [`expect()`]: Result::expect
396 /// [`BUG()`]: https://docs.kernel.org/process/deprecated.html#bug-and-bug-on
397 /// [`unwrap_or()`]: Result::unwrap_or
398 /// [`unwrap_or_else()`]: Result::unwrap_or_else
399 /// [`unwrap_or_default()`]: Result::unwrap_or_default
400 /// [`unwrap_unchecked()`]: Result::unwrap_unchecked
401 /// [Rust documentation]: https://doc.rust-lang.org/book/ch09-02-recoverable-errors-with-result.html
402 pub type Result<T = (), E = Error> = core::result::Result<T, E>;
403 
404 /// Converts an integer as returned by a C kernel function to a [`Result`].
405 ///
406 /// If the integer is negative, an [`Err`] with an [`Error`] as given by [`Error::from_errno`] is
407 /// returned. This means the integer must be `>= -MAX_ERRNO`.
408 ///
409 /// Otherwise, it returns [`Ok`].
410 ///
411 /// It is a bug to pass an out-of-range negative integer. `Err(EINVAL)` is returned in such a case.
412 ///
413 /// # Examples
414 ///
415 /// This function may be used to easily perform early returns with the [`?`] operator when working
416 /// with C APIs within Rust abstractions:
417 ///
418 /// ```
419 /// # use kernel::error::to_result;
420 /// # mod bindings {
421 /// #     #![expect(clippy::missing_safety_doc)]
422 /// #     use kernel::prelude::*;
423 /// #     pub(super) unsafe fn f1() -> c_int { 0 }
424 /// #     pub(super) unsafe fn f2() -> c_int { EINVAL.to_errno() }
425 /// # }
426 /// fn f() -> Result {
427 ///     // SAFETY: ...
428 ///     to_result(unsafe { bindings::f1() })?;
429 ///
430 ///     // SAFETY: ...
431 ///     to_result(unsafe { bindings::f2() })?;
432 ///
433 ///     // ...
434 ///
435 ///     Ok(())
436 /// }
437 /// # assert_eq!(f(), Err(EINVAL));
438 /// ```
439 ///
440 /// [`?`]: https://doc.rust-lang.org/reference/expressions/operator-expr.html#the-question-mark-operator
441 pub fn to_result(err: crate::ffi::c_int) -> Result {
442     if err < 0 {
443         Err(Error::from_errno(err))
444     } else {
445         Ok(())
446     }
447 }
448 
449 /// Transform a kernel "error pointer" to a normal pointer.
450 ///
451 /// Some kernel C API functions return an "error pointer" which optionally
452 /// embeds an `errno`. Callers are supposed to check the returned pointer
453 /// for errors. This function performs the check and converts the "error pointer"
454 /// to a normal pointer in an idiomatic fashion.
455 ///
456 /// Note that a `NULL` pointer is not considered an error pointer, and is returned
457 /// as-is, wrapped in [`Ok`].
458 ///
459 /// # Examples
460 ///
461 /// ```ignore
462 /// # use kernel::from_err_ptr;
463 /// # use kernel::bindings;
464 /// fn devm_platform_ioremap_resource(
465 ///     pdev: &mut PlatformDevice,
466 ///     index: u32,
467 /// ) -> Result<*mut kernel::ffi::c_void> {
468 ///     // SAFETY: `pdev` points to a valid platform device. There are no safety requirements
469 ///     // on `index`.
470 ///     from_err_ptr(unsafe { bindings::devm_platform_ioremap_resource(pdev.to_ptr(), index) })
471 /// }
472 /// ```
473 ///
474 /// ```
475 /// # use kernel::error::from_err_ptr;
476 /// # mod bindings {
477 /// #     #![expect(clippy::missing_safety_doc)]
478 /// #     use kernel::prelude::*;
479 /// #     pub(super) unsafe fn einval_err_ptr() -> *mut kernel::ffi::c_void {
480 /// #         EINVAL.to_ptr()
481 /// #     }
482 /// #     pub(super) unsafe fn null_ptr() -> *mut kernel::ffi::c_void {
483 /// #         core::ptr::null_mut()
484 /// #     }
485 /// #     pub(super) unsafe fn non_null_ptr() -> *mut kernel::ffi::c_void {
486 /// #         0x1234 as *mut kernel::ffi::c_void
487 /// #     }
488 /// # }
489 /// // SAFETY: ...
490 /// let einval_err = from_err_ptr(unsafe { bindings::einval_err_ptr() });
491 /// assert_eq!(einval_err, Err(EINVAL));
492 ///
493 /// // SAFETY: ...
494 /// let null_ok = from_err_ptr(unsafe { bindings::null_ptr() });
495 /// assert_eq!(null_ok, Ok(core::ptr::null_mut()));
496 ///
497 /// // SAFETY: ...
498 /// let non_null = from_err_ptr(unsafe { bindings::non_null_ptr() }).unwrap();
499 /// assert_ne!(non_null, core::ptr::null_mut());
500 /// ```
501 pub fn from_err_ptr<T>(ptr: *mut T) -> Result<*mut T> {
502     // CAST: Casting a pointer to `*const crate::ffi::c_void` is always valid.
503     let const_ptr: *const crate::ffi::c_void = ptr.cast();
504     // SAFETY: The FFI function does not deref the pointer.
505     if unsafe { bindings::IS_ERR(const_ptr) } {
506         // SAFETY: The FFI function does not deref the pointer.
507         let err = unsafe { bindings::PTR_ERR(const_ptr) };
508 
509         #[allow(clippy::unnecessary_cast)]
510         // CAST: If `IS_ERR()` returns `true`,
511         // then `PTR_ERR()` is guaranteed to return a
512         // negative value greater-or-equal to `-bindings::MAX_ERRNO`,
513         // which always fits in an `i16`, as per the invariant above.
514         // And an `i16` always fits in an `i32`. So casting `err` to
515         // an `i32` can never overflow, and is always valid.
516         //
517         // SAFETY: `IS_ERR()` ensures `err` is a
518         // negative value greater-or-equal to `-bindings::MAX_ERRNO`.
519         return Err(unsafe { Error::from_errno_unchecked(err as crate::ffi::c_int) });
520     }
521     Ok(ptr)
522 }
523 
524 /// Calls a closure returning a [`crate::error::Result<T>`] and converts the result to
525 /// a C integer result.
526 ///
527 /// This is useful when calling Rust functions that return [`crate::error::Result<T>`]
528 /// from inside `extern "C"` functions that need to return an integer error result.
529 ///
530 /// `T` should be convertible from an `i16` via `From<i16>`.
531 ///
532 /// # Examples
533 ///
534 /// ```ignore
535 /// # use kernel::from_result;
536 /// # use kernel::bindings;
537 /// unsafe extern "C" fn probe_callback(
538 ///     pdev: *mut bindings::platform_device,
539 /// ) -> kernel::ffi::c_int {
540 ///     from_result(|| {
541 ///         let ptr = devm_alloc(pdev)?;
542 ///         bindings::platform_set_drvdata(pdev, ptr);
543 ///         Ok(0)
544 ///     })
545 /// }
546 /// ```
547 pub fn from_result<T, F>(f: F) -> T
548 where
549     T: From<i16>,
550     F: FnOnce() -> Result<T>,
551 {
552     match f() {
553         Ok(v) => v,
554         // NO-OVERFLOW: negative `errno`s are no smaller than `-bindings::MAX_ERRNO`,
555         // `-bindings::MAX_ERRNO` fits in an `i16` as per invariant above,
556         // therefore a negative `errno` always fits in an `i16` and will not overflow.
557         Err(e) => T::from(e.to_errno() as i16),
558     }
559 }
560 
561 /// Error message for calling a default function of a [`#[vtable]`](macros::vtable) trait.
562 pub const VTABLE_DEFAULT_ERROR: &str =
563     "This function must not be called, see the #[vtable] documentation.";
564