1 // SPDX-License-Identifier: GPL-2.0 2 3 //! Kernel errors. 4 //! 5 //! C header: [`include/uapi/asm-generic/errno-base.h`](srctree/include/uapi/asm-generic/errno-base.h)\ 6 //! C header: [`include/uapi/asm-generic/errno.h`](srctree/include/uapi/asm-generic/errno.h)\ 7 //! C header: [`include/linux/errno.h`](srctree/include/linux/errno.h) 8 9 use crate::{ 10 alloc::{layout::LayoutError, AllocError}, 11 fmt, 12 str::CStr, 13 }; 14 15 use core::num::NonZeroI32; 16 use core::num::TryFromIntError; 17 use core::str::Utf8Error; 18 19 /// Contains the C-compatible error codes. 20 #[rustfmt::skip] 21 pub mod code { 22 macro_rules! declare_err { 23 ($err:tt $(,)? $($doc:expr),+) => { 24 $( 25 #[doc = $doc] 26 )* 27 pub const $err: super::Error = 28 match super::Error::try_from_errno(-(crate::bindings::$err as i32)) { 29 Some(err) => err, 30 None => panic!("Invalid errno in `declare_err!`"), 31 }; 32 }; 33 } 34 35 declare_err!(EPERM, "Operation not permitted."); 36 declare_err!(ENOENT, "No such file or directory."); 37 declare_err!(ESRCH, "No such process."); 38 declare_err!(EINTR, "Interrupted system call."); 39 declare_err!(EIO, "I/O error."); 40 declare_err!(ENXIO, "No such device or address."); 41 declare_err!(E2BIG, "Argument list too long."); 42 declare_err!(ENOEXEC, "Exec format error."); 43 declare_err!(EBADF, "Bad file number."); 44 declare_err!(ECHILD, "No child processes."); 45 declare_err!(EAGAIN, "Try again."); 46 declare_err!(ENOMEM, "Out of memory."); 47 declare_err!(EACCES, "Permission denied."); 48 declare_err!(EFAULT, "Bad address."); 49 declare_err!(ENOTBLK, "Block device required."); 50 declare_err!(EBUSY, "Device or resource busy."); 51 declare_err!(EEXIST, "File exists."); 52 declare_err!(EXDEV, "Cross-device link."); 53 declare_err!(ENODEV, "No such device."); 54 declare_err!(ENOTDIR, "Not a directory."); 55 declare_err!(EISDIR, "Is a directory."); 56 declare_err!(EINVAL, "Invalid argument."); 57 declare_err!(ENFILE, "File table overflow."); 58 declare_err!(EMFILE, "Too many open files."); 59 declare_err!(ENOTTY, "Not a typewriter."); 60 declare_err!(ETXTBSY, "Text file busy."); 61 declare_err!(EFBIG, "File too large."); 62 declare_err!(ENOSPC, "No space left on device."); 63 declare_err!(ESPIPE, "Illegal seek."); 64 declare_err!(EROFS, "Read-only file system."); 65 declare_err!(EMLINK, "Too many links."); 66 declare_err!(EPIPE, "Broken pipe."); 67 declare_err!(EDOM, "Math argument out of domain of func."); 68 declare_err!(ERANGE, "Math result not representable."); 69 declare_err!(EOVERFLOW, "Value too large for defined data type."); 70 declare_err!(EMSGSIZE, "Message too long."); 71 declare_err!(ETIMEDOUT, "Connection timed out."); 72 declare_err!(ERESTARTSYS, "Restart the system call."); 73 declare_err!(ERESTARTNOINTR, "System call was interrupted by a signal and will be restarted."); 74 declare_err!(ERESTARTNOHAND, "Restart if no handler."); 75 declare_err!(ENOIOCTLCMD, "No ioctl command."); 76 declare_err!(ERESTART_RESTARTBLOCK, "Restart by calling sys_restart_syscall."); 77 declare_err!(EPROBE_DEFER, "Driver requests probe retry."); 78 declare_err!(EOPENSTALE, "Open found a stale dentry."); 79 declare_err!(ENOPARAM, "Parameter not supported."); 80 declare_err!(EBADHANDLE, "Illegal NFS file handle."); 81 declare_err!(ENOTSYNC, "Update synchronization mismatch."); 82 declare_err!(EBADCOOKIE, "Cookie is stale."); 83 declare_err!(ENOTSUPP, "Operation is not supported."); 84 declare_err!(ETOOSMALL, "Buffer or request is too small."); 85 declare_err!(ESERVERFAULT, "An untranslatable error occurred."); 86 declare_err!(EBADTYPE, "Type not supported by server."); 87 declare_err!(EJUKEBOX, "Request initiated, but will not complete before timeout."); 88 declare_err!(EIOCBQUEUED, "iocb queued, will get completion event."); 89 declare_err!(ERECALLCONFLICT, "Conflict with recalled state."); 90 declare_err!(ENOGRACE, "NFS file lock reclaim refused."); 91 } 92 93 /// Generic integer kernel error. 94 /// 95 /// The kernel defines a set of integer generic error codes based on C and 96 /// POSIX ones. These codes may have a more specific meaning in some contexts. 97 /// 98 /// # Invariants 99 /// 100 /// The value is a valid `errno` (i.e. `>= -MAX_ERRNO && < 0`). 101 #[derive(Clone, Copy, PartialEq, Eq)] 102 pub struct Error(NonZeroI32); 103 104 impl Error { 105 /// Creates an [`Error`] from a kernel error code. 106 /// 107 /// `errno` must be within error code range (i.e. `>= -MAX_ERRNO && < 0`). 108 /// 109 /// It is a bug to pass an out-of-range `errno`. [`code::EINVAL`] is returned in such a case. 110 /// 111 /// # Examples 112 /// 113 /// ``` 114 /// assert_eq!(Error::from_errno(-1), EPERM); 115 /// assert_eq!(Error::from_errno(-2), ENOENT); 116 /// ``` 117 /// 118 /// The following calls are considered a bug: 119 /// 120 /// ``` 121 /// assert_eq!(Error::from_errno(0), EINVAL); 122 /// assert_eq!(Error::from_errno(-1000000), EINVAL); 123 /// ``` 124 pub fn from_errno(errno: crate::ffi::c_int) -> Error { 125 if let Some(error) = Self::try_from_errno(errno) { 126 error 127 } else { 128 // TODO: Make it a `WARN_ONCE` once available. 129 crate::pr_warn!( 130 "attempted to create `Error` with out of range `errno`: {}\n", 131 errno 132 ); 133 code::EINVAL 134 } 135 } 136 137 /// Creates an [`Error`] from a kernel error code. 138 /// 139 /// Returns [`None`] if `errno` is out-of-range. 140 const fn try_from_errno(errno: crate::ffi::c_int) -> Option<Error> { 141 if errno < -(bindings::MAX_ERRNO as i32) || errno >= 0 { 142 return None; 143 } 144 145 // SAFETY: `errno` is checked above to be in a valid range. 146 Some(unsafe { Error::from_errno_unchecked(errno) }) 147 } 148 149 /// Creates an [`Error`] from a kernel error code. 150 /// 151 /// # Safety 152 /// 153 /// `errno` must be within error code range (i.e. `>= -MAX_ERRNO && < 0`). 154 const unsafe fn from_errno_unchecked(errno: crate::ffi::c_int) -> Error { 155 // INVARIANT: The contract ensures the type invariant 156 // will hold. 157 // SAFETY: The caller guarantees `errno` is non-zero. 158 Error(unsafe { NonZeroI32::new_unchecked(errno) }) 159 } 160 161 /// Returns the kernel error code. 162 pub fn to_errno(self) -> crate::ffi::c_int { 163 self.0.get() 164 } 165 166 #[cfg(CONFIG_BLOCK)] 167 pub(crate) fn to_blk_status(self) -> bindings::blk_status_t { 168 // SAFETY: `self.0` is a valid error due to its invariant. 169 unsafe { bindings::errno_to_blk_status(self.0.get()) } 170 } 171 172 /// Returns the error encoded as a pointer. 173 pub fn to_ptr<T>(self) -> *mut T { 174 // SAFETY: `self.0` is a valid error due to its invariant. 175 unsafe { bindings::ERR_PTR(self.0.get() as crate::ffi::c_long).cast() } 176 } 177 178 /// Returns a string representing the error, if one exists. 179 #[cfg(not(testlib))] 180 pub fn name(&self) -> Option<&'static CStr> { 181 // SAFETY: Just an FFI call, there are no extra safety requirements. 182 let ptr = unsafe { bindings::errname(-self.0.get()) }; 183 if ptr.is_null() { 184 None 185 } else { 186 use crate::str::CStrExt as _; 187 188 // SAFETY: The string returned by `errname` is static and `NUL`-terminated. 189 Some(unsafe { CStr::from_char_ptr(ptr) }) 190 } 191 } 192 193 /// Returns a string representing the error, if one exists. 194 /// 195 /// When `testlib` is configured, this always returns `None` to avoid the dependency on a 196 /// kernel function so that tests that use this (e.g., by calling [`Result::unwrap`]) can still 197 /// run in userspace. 198 #[cfg(testlib)] 199 pub fn name(&self) -> Option<&'static CStr> { 200 None 201 } 202 } 203 204 impl fmt::Debug for Error { 205 fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { 206 match self.name() { 207 // Print out number if no name can be found. 208 None => f.debug_tuple("Error").field(&-self.0).finish(), 209 Some(name) => f 210 .debug_tuple( 211 // SAFETY: These strings are ASCII-only. 212 unsafe { core::str::from_utf8_unchecked(name.to_bytes()) }, 213 ) 214 .finish(), 215 } 216 } 217 } 218 219 impl From<AllocError> for Error { 220 #[inline] 221 fn from(_: AllocError) -> Error { 222 code::ENOMEM 223 } 224 } 225 226 impl From<TryFromIntError> for Error { 227 #[inline] 228 fn from(_: TryFromIntError) -> Error { 229 code::EINVAL 230 } 231 } 232 233 impl From<Utf8Error> for Error { 234 #[inline] 235 fn from(_: Utf8Error) -> Error { 236 code::EINVAL 237 } 238 } 239 240 impl From<LayoutError> for Error { 241 #[inline] 242 fn from(_: LayoutError) -> Error { 243 code::ENOMEM 244 } 245 } 246 247 impl From<fmt::Error> for Error { 248 #[inline] 249 fn from(_: fmt::Error) -> Error { 250 code::EINVAL 251 } 252 } 253 254 impl From<core::convert::Infallible> for Error { 255 #[inline] 256 fn from(e: core::convert::Infallible) -> Error { 257 match e {} 258 } 259 } 260 261 /// A [`Result`] with an [`Error`] error type. 262 /// 263 /// To be used as the return type for functions that may fail. 264 /// 265 /// # Error codes in C and Rust 266 /// 267 /// In C, it is common that functions indicate success or failure through 268 /// their return value; modifying or returning extra data through non-`const` 269 /// pointer parameters. In particular, in the kernel, functions that may fail 270 /// typically return an `int` that represents a generic error code. We model 271 /// those as [`Error`]. 272 /// 273 /// In Rust, it is idiomatic to model functions that may fail as returning 274 /// a [`Result`]. Since in the kernel many functions return an error code, 275 /// [`Result`] is a type alias for a [`core::result::Result`] that uses 276 /// [`Error`] as its error type. 277 /// 278 /// Note that even if a function does not return anything when it succeeds, 279 /// it should still be modeled as returning a [`Result`] rather than 280 /// just an [`Error`]. 281 /// 282 /// Calling a function that returns [`Result`] forces the caller to handle 283 /// the returned [`Result`]. 284 /// 285 /// This can be done "manually" by using [`match`]. Using [`match`] to decode 286 /// the [`Result`] is similar to C where all the return value decoding and the 287 /// error handling is done explicitly by writing handling code for each 288 /// error to cover. Using [`match`] the error and success handling can be 289 /// implemented in all detail as required. For example (inspired by 290 /// [`samples/rust/rust_minimal.rs`]): 291 /// 292 /// ``` 293 /// # #[allow(clippy::single_match)] 294 /// fn example() -> Result { 295 /// let mut numbers = KVec::new(); 296 /// 297 /// match numbers.push(72, GFP_KERNEL) { 298 /// Err(e) => { 299 /// pr_err!("Error pushing 72: {e:?}"); 300 /// return Err(e.into()); 301 /// } 302 /// // Do nothing, continue. 303 /// Ok(()) => (), 304 /// } 305 /// 306 /// match numbers.push(108, GFP_KERNEL) { 307 /// Err(e) => { 308 /// pr_err!("Error pushing 108: {e:?}"); 309 /// return Err(e.into()); 310 /// } 311 /// // Do nothing, continue. 312 /// Ok(()) => (), 313 /// } 314 /// 315 /// match numbers.push(200, GFP_KERNEL) { 316 /// Err(e) => { 317 /// pr_err!("Error pushing 200: {e:?}"); 318 /// return Err(e.into()); 319 /// } 320 /// // Do nothing, continue. 321 /// Ok(()) => (), 322 /// } 323 /// 324 /// Ok(()) 325 /// } 326 /// # example()?; 327 /// # Ok::<(), Error>(()) 328 /// ``` 329 /// 330 /// An alternative to be more concise is the [`if let`] syntax: 331 /// 332 /// ``` 333 /// fn example() -> Result { 334 /// let mut numbers = KVec::new(); 335 /// 336 /// if let Err(e) = numbers.push(72, GFP_KERNEL) { 337 /// pr_err!("Error pushing 72: {e:?}"); 338 /// return Err(e.into()); 339 /// } 340 /// 341 /// if let Err(e) = numbers.push(108, GFP_KERNEL) { 342 /// pr_err!("Error pushing 108: {e:?}"); 343 /// return Err(e.into()); 344 /// } 345 /// 346 /// if let Err(e) = numbers.push(200, GFP_KERNEL) { 347 /// pr_err!("Error pushing 200: {e:?}"); 348 /// return Err(e.into()); 349 /// } 350 /// 351 /// Ok(()) 352 /// } 353 /// # example()?; 354 /// # Ok::<(), Error>(()) 355 /// ``` 356 /// 357 /// Instead of these verbose [`match`]/[`if let`], the [`?`] operator can 358 /// be used to handle the [`Result`]. Using the [`?`] operator is often 359 /// the best choice to handle [`Result`] in a non-verbose way as done in 360 /// [`samples/rust/rust_minimal.rs`]: 361 /// 362 /// ``` 363 /// fn example() -> Result { 364 /// let mut numbers = KVec::new(); 365 /// 366 /// numbers.push(72, GFP_KERNEL)?; 367 /// numbers.push(108, GFP_KERNEL)?; 368 /// numbers.push(200, GFP_KERNEL)?; 369 /// 370 /// Ok(()) 371 /// } 372 /// # example()?; 373 /// # Ok::<(), Error>(()) 374 /// ``` 375 /// 376 /// Another possibility is to call [`unwrap()`](Result::unwrap) or 377 /// [`expect()`](Result::expect). However, use of these functions is 378 /// *heavily discouraged* in the kernel because they trigger a Rust 379 /// [`panic!`] if an error happens, which may destabilize the system or 380 /// entirely break it as a result -- just like the C [`BUG()`] macro. 381 /// Please see the documentation for the C macro [`BUG()`] for guidance 382 /// on when to use these functions. 383 /// 384 /// Alternatively, depending on the use case, using [`unwrap_or()`], 385 /// [`unwrap_or_else()`], [`unwrap_or_default()`] or [`unwrap_unchecked()`] 386 /// might be an option, as well. 387 /// 388 /// For even more details, please see the [Rust documentation]. 389 /// 390 /// [`match`]: https://doc.rust-lang.org/reference/expressions/match-expr.html 391 /// [`samples/rust/rust_minimal.rs`]: srctree/samples/rust/rust_minimal.rs 392 /// [`if let`]: https://doc.rust-lang.org/reference/expressions/if-expr.html#if-let-expressions 393 /// [`?`]: https://doc.rust-lang.org/reference/expressions/operator-expr.html#the-question-mark-operator 394 /// [`unwrap()`]: Result::unwrap 395 /// [`expect()`]: Result::expect 396 /// [`BUG()`]: https://docs.kernel.org/process/deprecated.html#bug-and-bug-on 397 /// [`unwrap_or()`]: Result::unwrap_or 398 /// [`unwrap_or_else()`]: Result::unwrap_or_else 399 /// [`unwrap_or_default()`]: Result::unwrap_or_default 400 /// [`unwrap_unchecked()`]: Result::unwrap_unchecked 401 /// [Rust documentation]: https://doc.rust-lang.org/book/ch09-02-recoverable-errors-with-result.html 402 pub type Result<T = (), E = Error> = core::result::Result<T, E>; 403 404 /// Converts an integer as returned by a C kernel function to a [`Result`]. 405 /// 406 /// If the integer is negative, an [`Err`] with an [`Error`] as given by [`Error::from_errno`] is 407 /// returned. This means the integer must be `>= -MAX_ERRNO`. 408 /// 409 /// Otherwise, it returns [`Ok`]. 410 /// 411 /// It is a bug to pass an out-of-range negative integer. `Err(EINVAL)` is returned in such a case. 412 /// 413 /// # Examples 414 /// 415 /// This function may be used to easily perform early returns with the [`?`] operator when working 416 /// with C APIs within Rust abstractions: 417 /// 418 /// ``` 419 /// # use kernel::error::to_result; 420 /// # mod bindings { 421 /// # #![expect(clippy::missing_safety_doc)] 422 /// # use kernel::prelude::*; 423 /// # pub(super) unsafe fn f1() -> c_int { 0 } 424 /// # pub(super) unsafe fn f2() -> c_int { EINVAL.to_errno() } 425 /// # } 426 /// fn f() -> Result { 427 /// // SAFETY: ... 428 /// to_result(unsafe { bindings::f1() })?; 429 /// 430 /// // SAFETY: ... 431 /// to_result(unsafe { bindings::f2() })?; 432 /// 433 /// // ... 434 /// 435 /// Ok(()) 436 /// } 437 /// # assert_eq!(f(), Err(EINVAL)); 438 /// ``` 439 /// 440 /// [`?`]: https://doc.rust-lang.org/reference/expressions/operator-expr.html#the-question-mark-operator 441 pub fn to_result(err: crate::ffi::c_int) -> Result { 442 if err < 0 { 443 Err(Error::from_errno(err)) 444 } else { 445 Ok(()) 446 } 447 } 448 449 /// Transform a kernel "error pointer" to a normal pointer. 450 /// 451 /// Some kernel C API functions return an "error pointer" which optionally 452 /// embeds an `errno`. Callers are supposed to check the returned pointer 453 /// for errors. This function performs the check and converts the "error pointer" 454 /// to a normal pointer in an idiomatic fashion. 455 /// 456 /// Note that a `NULL` pointer is not considered an error pointer, and is returned 457 /// as-is, wrapped in [`Ok`]. 458 /// 459 /// # Examples 460 /// 461 /// ```ignore 462 /// # use kernel::from_err_ptr; 463 /// # use kernel::bindings; 464 /// fn devm_platform_ioremap_resource( 465 /// pdev: &mut PlatformDevice, 466 /// index: u32, 467 /// ) -> Result<*mut kernel::ffi::c_void> { 468 /// // SAFETY: `pdev` points to a valid platform device. There are no safety requirements 469 /// // on `index`. 470 /// from_err_ptr(unsafe { bindings::devm_platform_ioremap_resource(pdev.to_ptr(), index) }) 471 /// } 472 /// ``` 473 /// 474 /// ``` 475 /// # use kernel::error::from_err_ptr; 476 /// # mod bindings { 477 /// # #![expect(clippy::missing_safety_doc)] 478 /// # use kernel::prelude::*; 479 /// # pub(super) unsafe fn einval_err_ptr() -> *mut kernel::ffi::c_void { 480 /// # EINVAL.to_ptr() 481 /// # } 482 /// # pub(super) unsafe fn null_ptr() -> *mut kernel::ffi::c_void { 483 /// # core::ptr::null_mut() 484 /// # } 485 /// # pub(super) unsafe fn non_null_ptr() -> *mut kernel::ffi::c_void { 486 /// # 0x1234 as *mut kernel::ffi::c_void 487 /// # } 488 /// # } 489 /// // SAFETY: ... 490 /// let einval_err = from_err_ptr(unsafe { bindings::einval_err_ptr() }); 491 /// assert_eq!(einval_err, Err(EINVAL)); 492 /// 493 /// // SAFETY: ... 494 /// let null_ok = from_err_ptr(unsafe { bindings::null_ptr() }); 495 /// assert_eq!(null_ok, Ok(core::ptr::null_mut())); 496 /// 497 /// // SAFETY: ... 498 /// let non_null = from_err_ptr(unsafe { bindings::non_null_ptr() }).unwrap(); 499 /// assert_ne!(non_null, core::ptr::null_mut()); 500 /// ``` 501 pub fn from_err_ptr<T>(ptr: *mut T) -> Result<*mut T> { 502 // CAST: Casting a pointer to `*const crate::ffi::c_void` is always valid. 503 let const_ptr: *const crate::ffi::c_void = ptr.cast(); 504 // SAFETY: The FFI function does not deref the pointer. 505 if unsafe { bindings::IS_ERR(const_ptr) } { 506 // SAFETY: The FFI function does not deref the pointer. 507 let err = unsafe { bindings::PTR_ERR(const_ptr) }; 508 509 #[allow(clippy::unnecessary_cast)] 510 // CAST: If `IS_ERR()` returns `true`, 511 // then `PTR_ERR()` is guaranteed to return a 512 // negative value greater-or-equal to `-bindings::MAX_ERRNO`, 513 // which always fits in an `i16`, as per the invariant above. 514 // And an `i16` always fits in an `i32`. So casting `err` to 515 // an `i32` can never overflow, and is always valid. 516 // 517 // SAFETY: `IS_ERR()` ensures `err` is a 518 // negative value greater-or-equal to `-bindings::MAX_ERRNO`. 519 return Err(unsafe { Error::from_errno_unchecked(err as crate::ffi::c_int) }); 520 } 521 Ok(ptr) 522 } 523 524 /// Calls a closure returning a [`crate::error::Result<T>`] and converts the result to 525 /// a C integer result. 526 /// 527 /// This is useful when calling Rust functions that return [`crate::error::Result<T>`] 528 /// from inside `extern "C"` functions that need to return an integer error result. 529 /// 530 /// `T` should be convertible from an `i16` via `From<i16>`. 531 /// 532 /// # Examples 533 /// 534 /// ```ignore 535 /// # use kernel::from_result; 536 /// # use kernel::bindings; 537 /// unsafe extern "C" fn probe_callback( 538 /// pdev: *mut bindings::platform_device, 539 /// ) -> kernel::ffi::c_int { 540 /// from_result(|| { 541 /// let ptr = devm_alloc(pdev)?; 542 /// bindings::platform_set_drvdata(pdev, ptr); 543 /// Ok(0) 544 /// }) 545 /// } 546 /// ``` 547 pub fn from_result<T, F>(f: F) -> T 548 where 549 T: From<i16>, 550 F: FnOnce() -> Result<T>, 551 { 552 match f() { 553 Ok(v) => v, 554 // NO-OVERFLOW: negative `errno`s are no smaller than `-bindings::MAX_ERRNO`, 555 // `-bindings::MAX_ERRNO` fits in an `i16` as per invariant above, 556 // therefore a negative `errno` always fits in an `i16` and will not overflow. 557 Err(e) => T::from(e.to_errno() as i16), 558 } 559 } 560 561 /// Error message for calling a default function of a [`#[vtable]`](macros::vtable) trait. 562 pub const VTABLE_DEFAULT_ERROR: &str = 563 "This function must not be called, see the #[vtable] documentation."; 564