xref: /linux/rust/kernel/fs/file.rs (revision 416f99c3b16f582a3fc6d64a1f77f39d94b76de5)
1 // SPDX-License-Identifier: GPL-2.0
2 
3 // Copyright (C) 2024 Google LLC.
4 
5 //! Files and file descriptors.
6 //!
7 //! C headers: [`include/linux/fs.h`](srctree/include/linux/fs.h) and
8 //! [`include/linux/file.h`](srctree/include/linux/file.h)
9 
10 use crate::{
11     bindings,
12     cred::Credential,
13     error::{code::*, to_result, Error, Result},
14     fmt,
15     sync::aref::{ARef, AlwaysRefCounted},
16     types::{NotThreadSafe, Opaque},
17 };
18 use core::ptr;
19 
20 /// Primitive type representing the offset within a [`File`].
21 ///
22 /// Type alias for `bindings::loff_t`.
23 pub type Offset = bindings::loff_t;
24 
25 /// Flags associated with a [`File`].
26 pub mod flags {
27     /// File is opened in append mode.
28     pub const O_APPEND: u32 = bindings::O_APPEND;
29 
30     /// Signal-driven I/O is enabled.
31     pub const O_ASYNC: u32 = bindings::FASYNC;
32 
33     /// Close-on-exec flag is set.
34     pub const O_CLOEXEC: u32 = bindings::O_CLOEXEC;
35 
36     /// File was created if it didn't already exist.
37     pub const O_CREAT: u32 = bindings::O_CREAT;
38 
39     /// Direct I/O is enabled for this file.
40     pub const O_DIRECT: u32 = bindings::O_DIRECT;
41 
42     /// File must be a directory.
43     pub const O_DIRECTORY: u32 = bindings::O_DIRECTORY;
44 
45     /// Like [`O_SYNC`] except metadata is not synced.
46     pub const O_DSYNC: u32 = bindings::O_DSYNC;
47 
48     /// Ensure that this file is created with the `open(2)` call.
49     pub const O_EXCL: u32 = bindings::O_EXCL;
50 
51     /// Large file size enabled (`off64_t` over `off_t`).
52     pub const O_LARGEFILE: u32 = bindings::O_LARGEFILE;
53 
54     /// Do not update the file last access time.
55     pub const O_NOATIME: u32 = bindings::O_NOATIME;
56 
57     /// File should not be used as process's controlling terminal.
58     pub const O_NOCTTY: u32 = bindings::O_NOCTTY;
59 
60     /// If basename of path is a symbolic link, fail open.
61     pub const O_NOFOLLOW: u32 = bindings::O_NOFOLLOW;
62 
63     /// File is using nonblocking I/O.
64     pub const O_NONBLOCK: u32 = bindings::O_NONBLOCK;
65 
66     /// File is using nonblocking I/O.
67     ///
68     /// This is effectively the same flag as [`O_NONBLOCK`] on all architectures
69     /// except SPARC64.
70     pub const O_NDELAY: u32 = bindings::O_NDELAY;
71 
72     /// Used to obtain a path file descriptor.
73     pub const O_PATH: u32 = bindings::O_PATH;
74 
75     /// Write operations on this file will flush data and metadata.
76     pub const O_SYNC: u32 = bindings::O_SYNC;
77 
78     /// This file is an unnamed temporary regular file.
79     pub const O_TMPFILE: u32 = bindings::O_TMPFILE;
80 
81     /// File should be truncated to length 0.
82     pub const O_TRUNC: u32 = bindings::O_TRUNC;
83 
84     /// Bitmask for access mode flags.
85     ///
86     /// # Examples
87     ///
88     /// ```
89     /// use kernel::fs::file;
90     /// # fn do_something() {}
91     /// # let flags = 0;
92     /// if (flags & file::flags::O_ACCMODE) == file::flags::O_RDONLY {
93     ///     do_something();
94     /// }
95     /// ```
96     pub const O_ACCMODE: u32 = bindings::O_ACCMODE;
97 
98     /// File is read only.
99     pub const O_RDONLY: u32 = bindings::O_RDONLY;
100 
101     /// File is write only.
102     pub const O_WRONLY: u32 = bindings::O_WRONLY;
103 
104     /// File can be both read and written.
105     pub const O_RDWR: u32 = bindings::O_RDWR;
106 }
107 
108 /// Wraps the kernel's `struct file`. Thread safe.
109 ///
110 /// This represents an open file rather than a file on a filesystem. Processes generally reference
111 /// open files using file descriptors. However, file descriptors are not the same as files. A file
112 /// descriptor is just an integer that corresponds to a file, and a single file may be referenced
113 /// by multiple file descriptors.
114 ///
115 /// # Refcounting
116 ///
117 /// Instances of this type are reference-counted. The reference count is incremented by the
118 /// `fget`/`get_file` functions and decremented by `fput`. The Rust type `ARef<File>` represents a
119 /// pointer that owns a reference count on the file.
120 ///
121 /// Whenever a process opens a file descriptor (fd), it stores a pointer to the file in its fd
122 /// table (`struct files_struct`). This pointer owns a reference count to the file, ensuring the
123 /// file isn't prematurely deleted while the file descriptor is open. In Rust terminology, the
124 /// pointers in `struct files_struct` are `ARef<File>` pointers.
125 ///
126 /// ## Light refcounts
127 ///
128 /// Whenever a process has an fd to a file, it may use something called a "light refcount" as a
129 /// performance optimization. Light refcounts are acquired by calling `fdget` and released with
130 /// `fdput`. The idea behind light refcounts is that if the fd is not closed between the calls to
131 /// `fdget` and `fdput`, then the refcount cannot hit zero during that time, as the `struct
132 /// files_struct` holds a reference until the fd is closed. This means that it's safe to access the
133 /// file even if `fdget` does not increment the refcount.
134 ///
135 /// The requirement that the fd is not closed during a light refcount applies globally across all
136 /// threads - not just on the thread using the light refcount. For this reason, light refcounts are
137 /// only used when the `struct files_struct` is not shared with other threads, since this ensures
138 /// that other unrelated threads cannot suddenly start using the fd and close it. Therefore,
139 /// calling `fdget` on a shared `struct files_struct` creates a normal refcount instead of a light
140 /// refcount.
141 ///
142 /// Light reference counts must be released with `fdput` before the system call returns to
143 /// userspace. This means that if you wait until the current system call returns to userspace, then
144 /// all light refcounts that existed at the time have gone away.
145 ///
146 /// ### The file position
147 ///
148 /// Each `struct file` has a position integer, which is protected by the `f_pos_lock` mutex.
149 /// However, if the `struct file` is not shared, then the kernel may avoid taking the lock as a
150 /// performance optimization.
151 ///
152 /// The condition for avoiding the `f_pos_lock` mutex is different from the condition for using
153 /// `fdget`. With `fdget`, you may avoid incrementing the refcount as long as the current fd table
154 /// is not shared; it is okay if there are other fd tables that also reference the same `struct
155 /// file`. However, `fdget_pos` can only avoid taking the `f_pos_lock` if the entire `struct file`
156 /// is not shared, as different processes with an fd to the same `struct file` share the same
157 /// position.
158 ///
159 /// To represent files that are not thread safe due to this optimization, the [`LocalFile`] type is
160 /// used.
161 ///
162 /// ## Rust references
163 ///
164 /// The reference type `&File` is similar to light refcounts:
165 ///
166 /// * `&File` references don't own a reference count. They can only exist as long as the reference
167 ///   count stays positive, and can only be created when there is some mechanism in place to ensure
168 ///   this.
169 ///
170 /// * The Rust borrow-checker normally ensures this by enforcing that the `ARef<File>` from which
171 ///   a `&File` is created outlives the `&File`.
172 ///
173 /// * Using the unsafe [`File::from_raw_file`] means that it is up to the caller to ensure that the
174 ///   `&File` only exists while the reference count is positive.
175 ///
176 /// * You can think of `fdget` as using an fd to look up an `ARef<File>` in the `struct
177 ///   files_struct` and create an `&File` from it. The "fd cannot be closed" rule is like the Rust
178 ///   rule "the `ARef<File>` must outlive the `&File`".
179 ///
180 /// # Invariants
181 ///
182 /// * All instances of this type are refcounted using the `f_count` field.
183 /// * There must not be any active calls to `fdget_pos` on this file that did not take the
184 ///   `f_pos_lock` mutex.
185 #[repr(transparent)]
186 pub struct File {
187     inner: Opaque<bindings::file>,
188 }
189 
190 // SAFETY: This file is known to not have any active `fdget_pos` calls that did not take the
191 // `f_pos_lock` mutex, so it is safe to transfer it between threads.
192 unsafe impl Send for File {}
193 
194 // SAFETY: This file is known to not have any active `fdget_pos` calls that did not take the
195 // `f_pos_lock` mutex, so it is safe to access its methods from several threads in parallel.
196 unsafe impl Sync for File {}
197 
198 // SAFETY: The type invariants guarantee that `File` is always ref-counted. This implementation
199 // makes `ARef<File>` own a normal refcount.
200 unsafe impl AlwaysRefCounted for File {
201     #[inline]
inc_ref(&self)202     fn inc_ref(&self) {
203         // SAFETY: The existence of a shared reference means that the refcount is nonzero.
204         unsafe { bindings::get_file(self.as_ptr()) };
205     }
206 
207     #[inline]
dec_ref(obj: ptr::NonNull<File>)208     unsafe fn dec_ref(obj: ptr::NonNull<File>) {
209         // SAFETY: To call this method, the caller passes us ownership of a normal refcount, so we
210         // may drop it. The cast is okay since `File` has the same representation as `struct file`.
211         unsafe { bindings::fput(obj.cast().as_ptr()) }
212     }
213 }
214 
215 /// Wraps the kernel's `struct file`. Not thread safe.
216 ///
217 /// This type represents a file that is not known to be safe to transfer across thread boundaries.
218 /// To obtain a thread-safe [`File`], use the [`assume_no_fdget_pos`] conversion.
219 ///
220 /// See the documentation for [`File`] for more information.
221 ///
222 /// # Invariants
223 ///
224 /// * All instances of this type are refcounted using the `f_count` field.
225 /// * If there is an active call to `fdget_pos` that did not take the `f_pos_lock` mutex, then it
226 ///   must be on the same thread as this file.
227 ///
228 /// [`assume_no_fdget_pos`]: LocalFile::assume_no_fdget_pos
229 #[repr(transparent)]
230 pub struct LocalFile {
231     inner: Opaque<bindings::file>,
232 }
233 
234 // SAFETY: The type invariants guarantee that `LocalFile` is always ref-counted. This implementation
235 // makes `ARef<LocalFile>` own a normal refcount.
236 unsafe impl AlwaysRefCounted for LocalFile {
237     #[inline]
inc_ref(&self)238     fn inc_ref(&self) {
239         // SAFETY: The existence of a shared reference means that the refcount is nonzero.
240         unsafe { bindings::get_file(self.as_ptr()) };
241     }
242 
243     #[inline]
dec_ref(obj: ptr::NonNull<LocalFile>)244     unsafe fn dec_ref(obj: ptr::NonNull<LocalFile>) {
245         // SAFETY: To call this method, the caller passes us ownership of a normal refcount, so we
246         // may drop it. The cast is okay since `LocalFile` has the same representation as
247         // `struct file`.
248         unsafe { bindings::fput(obj.cast().as_ptr()) }
249     }
250 }
251 
252 impl LocalFile {
253     /// Constructs a new `struct file` wrapper from a file descriptor.
254     ///
255     /// The file descriptor belongs to the current process, and there might be active local calls
256     /// to `fdget_pos` on the same file.
257     ///
258     /// To obtain an `ARef<File>`, use the [`assume_no_fdget_pos`] function to convert.
259     ///
260     /// [`assume_no_fdget_pos`]: LocalFile::assume_no_fdget_pos
261     #[inline]
fget(fd: u32) -> Result<ARef<LocalFile>, BadFdError>262     pub fn fget(fd: u32) -> Result<ARef<LocalFile>, BadFdError> {
263         // SAFETY: FFI call, there are no requirements on `fd`.
264         let ptr = ptr::NonNull::new(unsafe { bindings::fget(fd) }).ok_or(BadFdError)?;
265 
266         // SAFETY: `bindings::fget` created a refcount, and we pass ownership of it to the `ARef`.
267         //
268         // INVARIANT: This file is in the fd table on this thread, so either all `fdget_pos` calls
269         // are on this thread, or the file is shared, in which case `fdget_pos` calls took the
270         // `f_pos_lock` mutex.
271         Ok(unsafe { ARef::from_raw(ptr.cast()) })
272     }
273 
274     /// Creates a reference to a [`LocalFile`] from a valid pointer.
275     ///
276     /// # Safety
277     ///
278     /// * The caller must ensure that `ptr` points at a valid file and that the file's refcount is
279     ///   positive for the duration of `'a`.
280     /// * The caller must ensure that if there is an active call to `fdget_pos` that did not take
281     ///   the `f_pos_lock` mutex, then that call is on the current thread.
282     #[inline]
from_raw_file<'a>(ptr: *const bindings::file) -> &'a LocalFile283     pub unsafe fn from_raw_file<'a>(ptr: *const bindings::file) -> &'a LocalFile {
284         // SAFETY: The caller guarantees that the pointer is not dangling and stays valid for the
285         // duration of `'a`. The cast is okay because `LocalFile` is `repr(transparent)`.
286         //
287         // INVARIANT: The caller guarantees that there are no problematic `fdget_pos` calls.
288         unsafe { &*ptr.cast() }
289     }
290 
291     /// Assume that there are no active `fdget_pos` calls that prevent us from sharing this file.
292     ///
293     /// This makes it safe to transfer this file to other threads. No checks are performed, and
294     /// using it incorrectly may lead to a data race on the file position if the file is shared
295     /// with another thread.
296     ///
297     /// This method is intended to be used together with [`LocalFile::fget`] when the caller knows
298     /// statically that there are no `fdget_pos` calls on the current thread. For example, you
299     /// might use it when calling `fget` from an ioctl, since ioctls usually do not touch the file
300     /// position.
301     ///
302     /// # Safety
303     ///
304     /// There must not be any active `fdget_pos` calls on the current thread.
305     #[inline]
assume_no_fdget_pos(me: ARef<LocalFile>) -> ARef<File>306     pub unsafe fn assume_no_fdget_pos(me: ARef<LocalFile>) -> ARef<File> {
307         // INVARIANT: There are no `fdget_pos` calls on the current thread, and by the type
308         // invariants, if there is a `fdget_pos` call on another thread, then it took the
309         // `f_pos_lock` mutex.
310         //
311         // SAFETY: `LocalFile` and `File` have the same layout.
312         unsafe { ARef::from_raw(ARef::into_raw(me).cast()) }
313     }
314 
315     /// Returns a raw pointer to the inner C struct.
316     #[inline]
as_ptr(&self) -> *mut bindings::file317     pub fn as_ptr(&self) -> *mut bindings::file {
318         self.inner.get()
319     }
320 
321     /// Returns the credentials of the task that originally opened the file.
cred(&self) -> &Credential322     pub fn cred(&self) -> &Credential {
323         // SAFETY: It's okay to read the `f_cred` field without synchronization because `f_cred` is
324         // never changed after initialization of the file.
325         let ptr = unsafe { (*self.as_ptr()).f_cred };
326 
327         // SAFETY: The signature of this function ensures that the caller will only access the
328         // returned credential while the file is still valid, and the C side ensures that the
329         // credential stays valid at least as long as the file.
330         unsafe { Credential::from_ptr(ptr) }
331     }
332 
333     /// Returns the flags associated with the file.
334     ///
335     /// The flags are a combination of the constants in [`flags`].
336     #[inline]
flags(&self) -> u32337     pub fn flags(&self) -> u32 {
338         // This `read_volatile` is intended to correspond to a READ_ONCE call.
339         //
340         // SAFETY: The file is valid because the shared reference guarantees a nonzero refcount.
341         //
342         // FIXME(read_once): Replace with `read_once` when available on the Rust side.
343         unsafe { core::ptr::addr_of!((*self.as_ptr()).f_flags).read_volatile() }
344     }
345 }
346 
347 impl File {
348     /// Creates a reference to a [`File`] from a valid pointer.
349     ///
350     /// # Safety
351     ///
352     /// * The caller must ensure that `ptr` points at a valid file and that the file's refcount is
353     ///   positive for the duration of `'a`.
354     /// * The caller must ensure that if there are active `fdget_pos` calls on this file, then they
355     ///   took the `f_pos_lock` mutex.
356     #[inline]
from_raw_file<'a>(ptr: *const bindings::file) -> &'a File357     pub unsafe fn from_raw_file<'a>(ptr: *const bindings::file) -> &'a File {
358         // SAFETY: The caller guarantees that the pointer is not dangling and stays valid for the
359         // duration of `'a`. The cast is okay because `File` is `repr(transparent)`.
360         //
361         // INVARIANT: The caller guarantees that there are no problematic `fdget_pos` calls.
362         unsafe { &*ptr.cast() }
363     }
364 }
365 
366 // Make LocalFile methods available on File.
367 impl core::ops::Deref for File {
368     type Target = LocalFile;
369     #[inline]
deref(&self) -> &LocalFile370     fn deref(&self) -> &LocalFile {
371         // SAFETY: The caller provides a `&File`, and since it is a reference, it must point at a
372         // valid file for the desired duration.
373         //
374         // By the type invariants, there are no `fdget_pos` calls that did not take the
375         // `f_pos_lock` mutex.
376         unsafe { LocalFile::from_raw_file(core::ptr::from_ref(self).cast()) }
377     }
378 }
379 
380 /// A file descriptor reservation.
381 ///
382 /// This allows the creation of a file descriptor in two steps: first, we reserve a slot for it,
383 /// then we commit or drop the reservation. The first step may fail (e.g., the current process ran
384 /// out of available slots), but commit and drop never fail (and are mutually exclusive).
385 ///
386 /// Dropping the reservation happens in the destructor of this type.
387 ///
388 /// # Invariants
389 ///
390 /// The fd stored in this struct must correspond to a reserved file descriptor of the current task.
391 pub struct FileDescriptorReservation {
392     fd: u32,
393     /// Prevent values of this type from being moved to a different task.
394     ///
395     /// The `fd_install` and `put_unused_fd` functions assume that the value of `current` is
396     /// unchanged since the call to `get_unused_fd_flags`. By adding this marker to this type, we
397     /// prevent it from being moved across task boundaries, which ensures that `current` does not
398     /// change while this value exists.
399     _not_send: NotThreadSafe,
400 }
401 
402 impl FileDescriptorReservation {
403     /// Creates a new file descriptor reservation.
404     #[inline]
get_unused_fd_flags(flags: u32) -> Result<Self>405     pub fn get_unused_fd_flags(flags: u32) -> Result<Self> {
406         // SAFETY: FFI call, there are no safety requirements on `flags`.
407         let fd: i32 = unsafe { bindings::get_unused_fd_flags(flags) };
408         to_result(fd)?;
409 
410         Ok(Self {
411             fd: fd as u32,
412             _not_send: NotThreadSafe,
413         })
414     }
415 
416     /// Returns the file descriptor number that was reserved.
417     #[inline]
reserved_fd(&self) -> u32418     pub fn reserved_fd(&self) -> u32 {
419         self.fd
420     }
421 
422     /// Commits the reservation.
423     ///
424     /// The previously reserved file descriptor is bound to `file`. This method consumes the
425     /// [`FileDescriptorReservation`], so it will not be usable after this call.
426     #[inline]
fd_install(self, file: ARef<File>)427     pub fn fd_install(self, file: ARef<File>) {
428         // SAFETY: `self.fd` was previously returned by `get_unused_fd_flags`. We have not yet used
429         // the fd, so it is still valid, and `current` still refers to the same task, as this type
430         // cannot be moved across task boundaries.
431         //
432         // Furthermore, the file pointer is guaranteed to own a refcount by its type invariants,
433         // and we take ownership of that refcount by not running the destructor below.
434         // Additionally, the file is known to not have any non-shared `fdget_pos` calls, so even if
435         // this process starts using the file position, this will not result in a data race on the
436         // file position.
437         unsafe { bindings::fd_install(self.fd, file.as_ptr()) };
438 
439         // `fd_install` consumes both the file descriptor and the file reference, so we cannot run
440         // the destructors.
441         core::mem::forget(self);
442         core::mem::forget(file);
443     }
444 }
445 
446 impl Drop for FileDescriptorReservation {
447     #[inline]
drop(&mut self)448     fn drop(&mut self) {
449         // SAFETY: By the type invariants of this type, `self.fd` was previously returned by
450         // `get_unused_fd_flags`. We have not yet used the fd, so it is still valid, and `current`
451         // still refers to the same task, as this type cannot be moved across task boundaries.
452         unsafe { bindings::put_unused_fd(self.fd) };
453     }
454 }
455 
456 /// Represents the [`EBADF`] error code.
457 ///
458 /// Used for methods that can only fail with [`EBADF`].
459 #[derive(Copy, Clone, Eq, PartialEq)]
460 pub struct BadFdError;
461 
462 impl From<BadFdError> for Error {
463     #[inline]
from(_: BadFdError) -> Error464     fn from(_: BadFdError) -> Error {
465         EBADF
466     }
467 }
468 
469 impl fmt::Debug for BadFdError {
fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result470     fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
471         f.pad("EBADF")
472     }
473 }
474