1 // SPDX-License-Identifier: GPL-2.0 2 // Copyright (C) 2025 Google LLC. 3 4 //! DebugFS Abstraction 5 //! 6 //! C header: [`include/linux/debugfs.h`](srctree/include/linux/debugfs.h) 7 8 // When DebugFS is disabled, many parameters are dead. Linting for this isn't helpful. 9 #![cfg_attr(not(CONFIG_DEBUG_FS), allow(unused_variables))] 10 11 use crate::prelude::*; 12 use crate::str::CStr; 13 #[cfg(CONFIG_DEBUG_FS)] 14 use crate::sync::Arc; 15 use crate::uaccess::UserSliceReader; 16 use core::fmt; 17 use core::marker::PhantomData; 18 use core::marker::PhantomPinned; 19 #[cfg(CONFIG_DEBUG_FS)] 20 use core::mem::ManuallyDrop; 21 use core::ops::Deref; 22 23 mod traits; 24 pub use traits::{Reader, Writer}; 25 26 mod callback_adapters; 27 use callback_adapters::{FormatAdapter, NoWriter, WritableAdapter}; 28 mod file_ops; 29 use file_ops::{FileOps, ReadFile, ReadWriteFile, WriteFile}; 30 #[cfg(CONFIG_DEBUG_FS)] 31 mod entry; 32 #[cfg(CONFIG_DEBUG_FS)] 33 use entry::Entry; 34 35 /// Owning handle to a DebugFS directory. 36 /// 37 /// The directory in the filesystem represented by [`Dir`] will be removed when handle has been 38 /// dropped *and* all children have been removed. 39 // If we have a parent, we hold a reference to it in the `Entry`. This prevents the `dentry` 40 // we point to from being cleaned up if our parent `Dir`/`Entry` is dropped before us. 41 // 42 // The `None` option indicates that the `Arc` could not be allocated, so our children would not be 43 // able to refer to us. In this case, we need to silently fail. All future child directories/files 44 // will silently fail as well. 45 #[derive(Clone)] 46 pub struct Dir(#[cfg(CONFIG_DEBUG_FS)] Option<Arc<Entry<'static>>>); 47 48 impl Dir { 49 /// Create a new directory in DebugFS. If `parent` is [`None`], it will be created at the root. 50 fn create(name: &CStr, parent: Option<&Dir>) -> Self { 51 #[cfg(CONFIG_DEBUG_FS)] 52 { 53 let parent_entry = match parent { 54 // If the parent couldn't be allocated, just early-return 55 Some(Dir(None)) => return Self(None), 56 Some(Dir(Some(entry))) => Some(entry.clone()), 57 None => None, 58 }; 59 Self( 60 // If Arc creation fails, the `Entry` will be dropped, so the directory will be 61 // cleaned up. 62 Arc::new(Entry::dynamic_dir(name, parent_entry), GFP_KERNEL).ok(), 63 ) 64 } 65 #[cfg(not(CONFIG_DEBUG_FS))] 66 Self() 67 } 68 69 /// Creates a DebugFS file which will own the data produced by the initializer provided in 70 /// `data`. 71 fn create_file<'a, T, E: 'a>( 72 &'a self, 73 name: &'a CStr, 74 data: impl PinInit<T, E> + 'a, 75 file_ops: &'static FileOps<T>, 76 ) -> impl PinInit<File<T>, E> + 'a 77 where 78 T: Sync + 'static, 79 { 80 let scope = Scope::<T>::new(data, move |data| { 81 #[cfg(CONFIG_DEBUG_FS)] 82 if let Some(parent) = &self.0 { 83 // SAFETY: Because data derives from a scope, and our entry will be dropped before 84 // the data is dropped, it is guaranteed to outlive the entry we return. 85 unsafe { Entry::dynamic_file(name, parent.clone(), data, file_ops) } 86 } else { 87 Entry::empty() 88 } 89 }); 90 try_pin_init! { 91 File { 92 scope <- scope 93 } ? E 94 } 95 } 96 97 /// Create a new directory in DebugFS at the root. 98 /// 99 /// # Examples 100 /// 101 /// ``` 102 /// # use kernel::c_str; 103 /// # use kernel::debugfs::Dir; 104 /// let debugfs = Dir::new(c_str!("parent")); 105 /// ``` 106 pub fn new(name: &CStr) -> Self { 107 Dir::create(name, None) 108 } 109 110 /// Creates a subdirectory within this directory. 111 /// 112 /// # Examples 113 /// 114 /// ``` 115 /// # use kernel::c_str; 116 /// # use kernel::debugfs::Dir; 117 /// let parent = Dir::new(c_str!("parent")); 118 /// let child = parent.subdir(c_str!("child")); 119 /// ``` 120 pub fn subdir(&self, name: &CStr) -> Self { 121 Dir::create(name, Some(self)) 122 } 123 124 /// Creates a read-only file in this directory. 125 /// 126 /// The file's contents are produced by invoking [`Writer::write`] on the value initialized by 127 /// `data`. 128 /// 129 /// # Examples 130 /// 131 /// ``` 132 /// # use kernel::c_str; 133 /// # use kernel::debugfs::Dir; 134 /// # use kernel::prelude::*; 135 /// # let dir = Dir::new(c_str!("my_debugfs_dir")); 136 /// let file = KBox::pin_init(dir.read_only_file(c_str!("foo"), 200), GFP_KERNEL)?; 137 /// // "my_debugfs_dir/foo" now contains the number 200. 138 /// // The file is removed when `file` is dropped. 139 /// # Ok::<(), Error>(()) 140 /// ``` 141 pub fn read_only_file<'a, T, E: 'a>( 142 &'a self, 143 name: &'a CStr, 144 data: impl PinInit<T, E> + 'a, 145 ) -> impl PinInit<File<T>, E> + 'a 146 where 147 T: Writer + Send + Sync + 'static, 148 { 149 let file_ops = &<T as ReadFile<_>>::FILE_OPS; 150 self.create_file(name, data, file_ops) 151 } 152 153 /// Creates a read-only file in this directory, with contents from a callback. 154 /// 155 /// `f` must be a function item or a non-capturing closure. 156 /// This is statically asserted and not a safety requirement. 157 /// 158 /// # Examples 159 /// 160 /// ``` 161 /// # use core::sync::atomic::{AtomicU32, Ordering}; 162 /// # use kernel::c_str; 163 /// # use kernel::debugfs::Dir; 164 /// # use kernel::prelude::*; 165 /// # let dir = Dir::new(c_str!("foo")); 166 /// let file = KBox::pin_init( 167 /// dir.read_callback_file(c_str!("bar"), 168 /// AtomicU32::new(3), 169 /// &|val, f| { 170 /// let out = val.load(Ordering::Relaxed); 171 /// writeln!(f, "{out:#010x}") 172 /// }), 173 /// GFP_KERNEL)?; 174 /// // Reading "foo/bar" will show "0x00000003". 175 /// file.store(10, Ordering::Relaxed); 176 /// // Reading "foo/bar" will now show "0x0000000a". 177 /// # Ok::<(), Error>(()) 178 /// ``` 179 pub fn read_callback_file<'a, T, E: 'a, F>( 180 &'a self, 181 name: &'a CStr, 182 data: impl PinInit<T, E> + 'a, 183 _f: &'static F, 184 ) -> impl PinInit<File<T>, E> + 'a 185 where 186 T: Send + Sync + 'static, 187 F: Fn(&T, &mut fmt::Formatter<'_>) -> fmt::Result + Send + Sync, 188 { 189 let file_ops = <FormatAdapter<T, F>>::FILE_OPS.adapt(); 190 self.create_file(name, data, file_ops) 191 } 192 193 /// Creates a read-write file in this directory. 194 /// 195 /// Reading the file uses the [`Writer`] implementation. 196 /// Writing to the file uses the [`Reader`] implementation. 197 pub fn read_write_file<'a, T, E: 'a>( 198 &'a self, 199 name: &'a CStr, 200 data: impl PinInit<T, E> + 'a, 201 ) -> impl PinInit<File<T>, E> + 'a 202 where 203 T: Writer + Reader + Send + Sync + 'static, 204 { 205 let file_ops = &<T as ReadWriteFile<_>>::FILE_OPS; 206 self.create_file(name, data, file_ops) 207 } 208 209 /// Creates a read-write file in this directory, with logic from callbacks. 210 /// 211 /// Reading from the file is handled by `f`. Writing to the file is handled by `w`. 212 /// 213 /// `f` and `w` must be function items or non-capturing closures. 214 /// This is statically asserted and not a safety requirement. 215 pub fn read_write_callback_file<'a, T, E: 'a, F, W>( 216 &'a self, 217 name: &'a CStr, 218 data: impl PinInit<T, E> + 'a, 219 _f: &'static F, 220 _w: &'static W, 221 ) -> impl PinInit<File<T>, E> + 'a 222 where 223 T: Send + Sync + 'static, 224 F: Fn(&T, &mut fmt::Formatter<'_>) -> fmt::Result + Send + Sync, 225 W: Fn(&T, &mut UserSliceReader) -> Result + Send + Sync, 226 { 227 let file_ops = 228 <WritableAdapter<FormatAdapter<T, F>, W> as file_ops::ReadWriteFile<_>>::FILE_OPS 229 .adapt() 230 .adapt(); 231 self.create_file(name, data, file_ops) 232 } 233 234 /// Creates a write-only file in this directory. 235 /// 236 /// The file owns its backing data. Writing to the file uses the [`Reader`] 237 /// implementation. 238 /// 239 /// The file is removed when the returned [`File`] is dropped. 240 pub fn write_only_file<'a, T, E: 'a>( 241 &'a self, 242 name: &'a CStr, 243 data: impl PinInit<T, E> + 'a, 244 ) -> impl PinInit<File<T>, E> + 'a 245 where 246 T: Reader + Send + Sync + 'static, 247 { 248 self.create_file(name, data, &T::FILE_OPS) 249 } 250 251 /// Creates a write-only file in this directory, with write logic from a callback. 252 /// 253 /// `w` must be a function item or a non-capturing closure. 254 /// This is statically asserted and not a safety requirement. 255 pub fn write_callback_file<'a, T, E: 'a, W>( 256 &'a self, 257 name: &'a CStr, 258 data: impl PinInit<T, E> + 'a, 259 _w: &'static W, 260 ) -> impl PinInit<File<T>, E> + 'a 261 where 262 T: Send + Sync + 'static, 263 W: Fn(&T, &mut UserSliceReader) -> Result + Send + Sync, 264 { 265 let file_ops = <WritableAdapter<NoWriter<T>, W> as WriteFile<_>>::FILE_OPS 266 .adapt() 267 .adapt(); 268 self.create_file(name, data, file_ops) 269 } 270 271 // While this function is safe, it is intentionally not public because it's a bit of a 272 // footgun. 273 // 274 // Unless you also extract the `entry` later and schedule it for `Drop` at the appropriate 275 // time, a `ScopedDir` with a `Dir` parent will never be deleted. 276 fn scoped_dir<'data>(&self, name: &CStr) -> ScopedDir<'data, 'static> { 277 #[cfg(CONFIG_DEBUG_FS)] 278 { 279 let parent_entry = match &self.0 { 280 None => return ScopedDir::empty(), 281 Some(entry) => entry.clone(), 282 }; 283 ScopedDir { 284 entry: ManuallyDrop::new(Entry::dynamic_dir(name, Some(parent_entry))), 285 _phantom: PhantomData, 286 } 287 } 288 #[cfg(not(CONFIG_DEBUG_FS))] 289 ScopedDir::empty() 290 } 291 292 /// Creates a new scope, which is a directory associated with some data `T`. 293 /// 294 /// The created directory will be a subdirectory of `self`. The `init` closure is called to 295 /// populate the directory with files and subdirectories. These files can reference the data 296 /// stored in the scope. 297 /// 298 /// The entire directory tree created within the scope will be removed when the returned 299 /// `Scope` handle is dropped. 300 pub fn scope<'a, T: 'a, E: 'a, F>( 301 &'a self, 302 data: impl PinInit<T, E> + 'a, 303 name: &'a CStr, 304 init: F, 305 ) -> impl PinInit<Scope<T>, E> + 'a 306 where 307 F: for<'data, 'dir> FnOnce(&'data T, &'dir ScopedDir<'data, 'dir>) + 'a, 308 { 309 Scope::new(data, |data| { 310 let scoped = self.scoped_dir(name); 311 init(data, &scoped); 312 scoped.into_entry() 313 }) 314 } 315 } 316 317 #[pin_data] 318 /// Handle to a DebugFS scope, which ensures that attached `data` will outlive the DebugFS entry 319 /// without moving. 320 /// 321 /// This is internally used to back [`File`], and used in the API to represent the attachment 322 /// of a directory lifetime to a data structure which may be jointly accessed by a number of 323 /// different files. 324 /// 325 /// When dropped, a `Scope` will remove all directories and files in the filesystem backed by the 326 /// attached data structure prior to releasing the attached data. 327 pub struct Scope<T> { 328 // This order is load-bearing for drops - `_entry` must be dropped before `data`. 329 #[cfg(CONFIG_DEBUG_FS)] 330 _entry: Entry<'static>, 331 #[pin] 332 data: T, 333 // Even if `T` is `Unpin`, we still can't allow it to be moved. 334 #[pin] 335 _pin: PhantomPinned, 336 } 337 338 #[pin_data] 339 /// Handle to a DebugFS file, owning its backing data. 340 /// 341 /// When dropped, the DebugFS file will be removed and the attached data will be dropped. 342 pub struct File<T> { 343 #[pin] 344 scope: Scope<T>, 345 } 346 347 #[cfg(not(CONFIG_DEBUG_FS))] 348 impl<'b, T: 'b> Scope<T> { 349 fn new<E: 'b, F>(data: impl PinInit<T, E> + 'b, init: F) -> impl PinInit<Self, E> + 'b 350 where 351 F: for<'a> FnOnce(&'a T) + 'b, 352 { 353 try_pin_init! { 354 Self { 355 data <- data, 356 _pin: PhantomPinned 357 } ? E 358 } 359 .pin_chain(|scope| { 360 init(&scope.data); 361 Ok(()) 362 }) 363 } 364 } 365 366 #[cfg(CONFIG_DEBUG_FS)] 367 impl<'b, T: 'b> Scope<T> { 368 fn entry_mut(self: Pin<&mut Self>) -> &mut Entry<'static> { 369 // SAFETY: _entry is not structurally pinned. 370 unsafe { &mut Pin::into_inner_unchecked(self)._entry } 371 } 372 373 fn new<E: 'b, F>(data: impl PinInit<T, E> + 'b, init: F) -> impl PinInit<Self, E> + 'b 374 where 375 F: for<'a> FnOnce(&'a T) -> Entry<'static> + 'b, 376 { 377 try_pin_init! { 378 Self { 379 _entry: Entry::empty(), 380 data <- data, 381 _pin: PhantomPinned 382 } ? E 383 } 384 .pin_chain(|scope| { 385 *scope.entry_mut() = init(&scope.data); 386 Ok(()) 387 }) 388 } 389 } 390 391 impl<'a, T: 'a> Scope<T> { 392 /// Creates a new scope, which is a directory at the root of the debugfs filesystem, 393 /// associated with some data `T`. 394 /// 395 /// The `init` closure is called to populate the directory with files and subdirectories. These 396 /// files can reference the data stored in the scope. 397 /// 398 /// The entire directory tree created within the scope will be removed when the returned 399 /// `Scope` handle is dropped. 400 pub fn dir<E: 'a, F>( 401 data: impl PinInit<T, E> + 'a, 402 name: &'a CStr, 403 init: F, 404 ) -> impl PinInit<Self, E> + 'a 405 where 406 F: for<'data, 'dir> FnOnce(&'data T, &'dir ScopedDir<'data, 'dir>) + 'a, 407 { 408 Scope::new(data, |data| { 409 let scoped = ScopedDir::new(name); 410 init(data, &scoped); 411 scoped.into_entry() 412 }) 413 } 414 } 415 416 impl<T> Deref for Scope<T> { 417 type Target = T; 418 fn deref(&self) -> &T { 419 &self.data 420 } 421 } 422 423 impl<T> Deref for File<T> { 424 type Target = T; 425 fn deref(&self) -> &T { 426 &self.scope 427 } 428 } 429 430 /// A handle to a directory which will live at most `'dir`, accessing data that will live for at 431 /// least `'data`. 432 /// 433 /// Dropping a ScopedDir will not delete or clean it up, this is expected to occur through dropping 434 /// the `Scope` that created it. 435 pub struct ScopedDir<'data, 'dir> { 436 #[cfg(CONFIG_DEBUG_FS)] 437 entry: ManuallyDrop<Entry<'dir>>, 438 _phantom: PhantomData<fn(&'data ()) -> &'dir ()>, 439 } 440 441 impl<'data, 'dir> ScopedDir<'data, 'dir> { 442 /// Creates a subdirectory inside this `ScopedDir`. 443 /// 444 /// The returned directory handle cannot outlive this one. 445 pub fn dir<'dir2>(&'dir2 self, name: &CStr) -> ScopedDir<'data, 'dir2> { 446 #[cfg(not(CONFIG_DEBUG_FS))] 447 let _ = name; 448 ScopedDir { 449 #[cfg(CONFIG_DEBUG_FS)] 450 entry: ManuallyDrop::new(Entry::dir(name, Some(&*self.entry))), 451 _phantom: PhantomData, 452 } 453 } 454 455 fn create_file<T: Sync>(&self, name: &CStr, data: &'data T, vtable: &'static FileOps<T>) { 456 #[cfg(CONFIG_DEBUG_FS)] 457 core::mem::forget(Entry::file(name, &self.entry, data, vtable)); 458 } 459 460 /// Creates a read-only file in this directory. 461 /// 462 /// The file's contents are produced by invoking [`Writer::write`]. 463 /// 464 /// This function does not produce an owning handle to the file. The created 465 /// file is removed when the [`Scope`] that this directory belongs 466 /// to is dropped. 467 pub fn read_only_file<T: Writer + Send + Sync + 'static>(&self, name: &CStr, data: &'data T) { 468 self.create_file(name, data, &T::FILE_OPS) 469 } 470 471 /// Creates a read-only file in this directory, with contents from a callback. 472 /// 473 /// The file contents are generated by calling `f` with `data`. 474 /// 475 /// 476 /// `f` must be a function item or a non-capturing closure. 477 /// This is statically asserted and not a safety requirement. 478 /// 479 /// This function does not produce an owning handle to the file. The created 480 /// file is removed when the [`Scope`] that this directory belongs 481 /// to is dropped. 482 pub fn read_callback_file<T, F>(&self, name: &CStr, data: &'data T, _f: &'static F) 483 where 484 T: Send + Sync + 'static, 485 F: Fn(&T, &mut fmt::Formatter<'_>) -> fmt::Result + Send + Sync, 486 { 487 let vtable = <FormatAdapter<T, F> as ReadFile<_>>::FILE_OPS.adapt(); 488 self.create_file(name, data, vtable) 489 } 490 491 /// Creates a read-write file in this directory. 492 /// 493 /// Reading the file uses the [`Writer`] implementation on `data`. Writing to the file uses 494 /// the [`Reader`] implementation on `data`. 495 /// 496 /// This function does not produce an owning handle to the file. The created 497 /// file is removed when the [`Scope`] that this directory belongs 498 /// to is dropped. 499 pub fn read_write_file<T: Writer + Reader + Send + Sync + 'static>( 500 &self, 501 name: &CStr, 502 data: &'data T, 503 ) { 504 let vtable = &<T as ReadWriteFile<_>>::FILE_OPS; 505 self.create_file(name, data, vtable) 506 } 507 508 /// Creates a read-write file in this directory, with logic from callbacks. 509 /// 510 /// Reading from the file is handled by `f`. Writing to the file is handled by `w`. 511 /// 512 /// `f` and `w` must be function items or non-capturing closures. 513 /// This is statically asserted and not a safety requirement. 514 /// 515 /// This function does not produce an owning handle to the file. The created 516 /// file is removed when the [`Scope`] that this directory belongs 517 /// to is dropped. 518 pub fn read_write_callback_file<T, F, W>( 519 &self, 520 name: &CStr, 521 data: &'data T, 522 _f: &'static F, 523 _w: &'static W, 524 ) where 525 T: Send + Sync + 'static, 526 F: Fn(&T, &mut fmt::Formatter<'_>) -> fmt::Result + Send + Sync, 527 W: Fn(&T, &mut UserSliceReader) -> Result + Send + Sync, 528 { 529 let vtable = <WritableAdapter<FormatAdapter<T, F>, W> as ReadWriteFile<_>>::FILE_OPS 530 .adapt() 531 .adapt(); 532 self.create_file(name, data, vtable) 533 } 534 535 /// Creates a write-only file in this directory. 536 /// 537 /// Writing to the file uses the [`Reader`] implementation on `data`. 538 /// 539 /// This function does not produce an owning handle to the file. The created 540 /// file is removed when the [`Scope`] that this directory belongs 541 /// to is dropped. 542 pub fn write_only_file<T: Reader + Send + Sync + 'static>(&self, name: &CStr, data: &'data T) { 543 let vtable = &<T as WriteFile<_>>::FILE_OPS; 544 self.create_file(name, data, vtable) 545 } 546 547 /// Creates a write-only file in this directory, with write logic from a callback. 548 /// 549 /// Writing to the file is handled by `w`. 550 /// 551 /// `w` must be a function item or a non-capturing closure. 552 /// This is statically asserted and not a safety requirement. 553 /// 554 /// This function does not produce an owning handle to the file. The created 555 /// file is removed when the [`Scope`] that this directory belongs 556 /// to is dropped. 557 pub fn write_only_callback_file<T, W>(&self, name: &CStr, data: &'data T, _w: &'static W) 558 where 559 T: Send + Sync + 'static, 560 W: Fn(&T, &mut UserSliceReader) -> Result + Send + Sync, 561 { 562 let vtable = &<WritableAdapter<NoWriter<T>, W> as WriteFile<_>>::FILE_OPS 563 .adapt() 564 .adapt(); 565 self.create_file(name, data, vtable) 566 } 567 568 fn empty() -> Self { 569 ScopedDir { 570 #[cfg(CONFIG_DEBUG_FS)] 571 entry: ManuallyDrop::new(Entry::empty()), 572 _phantom: PhantomData, 573 } 574 } 575 #[cfg(CONFIG_DEBUG_FS)] 576 fn into_entry(self) -> Entry<'dir> { 577 ManuallyDrop::into_inner(self.entry) 578 } 579 #[cfg(not(CONFIG_DEBUG_FS))] 580 fn into_entry(self) {} 581 } 582 583 impl<'data> ScopedDir<'data, 'static> { 584 // This is safe, but intentionally not exported due to footgun status. A ScopedDir with no 585 // parent will never be released by default, and needs to have its entry extracted and used 586 // somewhere. 587 fn new(name: &CStr) -> ScopedDir<'data, 'static> { 588 ScopedDir { 589 #[cfg(CONFIG_DEBUG_FS)] 590 entry: ManuallyDrop::new(Entry::dir(name, None)), 591 _phantom: PhantomData, 592 } 593 } 594 } 595