1 // SPDX-License-Identifier: GPL-2.0 2 3 // Copyright (C) 2024 Google LLC. 4 5 //! Miscdevice support. 6 //! 7 //! C headers: [`include/linux/miscdevice.h`](srctree/include/linux/miscdevice.h). 8 //! 9 //! Reference: <https://www.kernel.org/doc/html/latest/driver-api/misc_devices.html> 10 11 use crate::{ 12 bindings, 13 device::Device, 14 error::{to_result, Error, Result, VTABLE_DEFAULT_ERROR}, 15 ffi::{c_int, c_long, c_uint, c_ulong}, 16 fs::{File, Kiocb}, 17 iov::{IovIterDest, IovIterSource}, 18 mm::virt::VmaNew, 19 prelude::*, 20 seq_file::SeqFile, 21 types::{ForeignOwnable, Opaque}, 22 }; 23 use core::{marker::PhantomData, pin::Pin}; 24 25 /// Options for creating a misc device. 26 #[derive(Copy, Clone)] 27 pub struct MiscDeviceOptions { 28 /// The name of the miscdevice. 29 pub name: &'static CStr, 30 } 31 32 impl MiscDeviceOptions { 33 /// Create a raw `struct miscdev` ready for registration. 34 pub const fn into_raw<T: MiscDevice>(self) -> bindings::miscdevice { 35 let mut result: bindings::miscdevice = pin_init::zeroed(); 36 result.minor = bindings::MISC_DYNAMIC_MINOR as ffi::c_int; 37 result.name = crate::str::as_char_ptr_in_const_context(self.name); 38 result.fops = MiscdeviceVTable::<T>::build(); 39 result 40 } 41 } 42 43 /// A registration of a miscdevice. 44 /// 45 /// # Invariants 46 /// 47 /// - `inner` contains a `struct miscdevice` that is registered using 48 /// `misc_register()`. 49 /// - This registration remains valid for the entire lifetime of the 50 /// [`MiscDeviceRegistration`] instance. 51 /// - Deregistration occurs exactly once in [`Drop`] via `misc_deregister()`. 52 /// - `inner` wraps a valid, pinned `miscdevice` created using 53 /// [`MiscDeviceOptions::into_raw`]. 54 #[repr(transparent)] 55 #[pin_data(PinnedDrop)] 56 pub struct MiscDeviceRegistration<T> { 57 #[pin] 58 inner: Opaque<bindings::miscdevice>, 59 _t: PhantomData<T>, 60 } 61 62 // SAFETY: It is allowed to call `misc_deregister` on a different thread from where you called 63 // `misc_register`. 64 unsafe impl<T> Send for MiscDeviceRegistration<T> {} 65 // SAFETY: All `&self` methods on this type are written to ensure that it is safe to call them in 66 // parallel. 67 unsafe impl<T> Sync for MiscDeviceRegistration<T> {} 68 69 impl<T: MiscDevice> MiscDeviceRegistration<T> { 70 /// Register a misc device. 71 pub fn register(opts: MiscDeviceOptions) -> impl PinInit<Self, Error> { 72 try_pin_init!(Self { 73 inner <- Opaque::try_ffi_init(move |slot: *mut bindings::miscdevice| { 74 // SAFETY: The initializer can write to the provided `slot`. 75 unsafe { slot.write(opts.into_raw::<T>()) }; 76 77 // SAFETY: We just wrote the misc device options to the slot. The miscdevice will 78 // get unregistered before `slot` is deallocated because the memory is pinned and 79 // the destructor of this type deallocates the memory. 80 // INVARIANT: If this returns `Ok(())`, then the `slot` will contain a registered 81 // misc device. 82 to_result(unsafe { bindings::misc_register(slot) }) 83 }), 84 _t: PhantomData, 85 }) 86 } 87 88 /// Returns a raw pointer to the misc device. 89 pub fn as_raw(&self) -> *mut bindings::miscdevice { 90 self.inner.get() 91 } 92 93 /// Access the `this_device` field. 94 pub fn device(&self) -> &Device { 95 // SAFETY: This can only be called after a successful register(), which always 96 // initialises `this_device` with a valid device. Furthermore, the signature of this 97 // function tells the borrow-checker that the `&Device` reference must not outlive the 98 // `&MiscDeviceRegistration<T>` used to obtain it, so the last use of the reference must be 99 // before the underlying `struct miscdevice` is destroyed. 100 unsafe { Device::from_raw((*self.as_raw()).this_device) } 101 } 102 } 103 104 #[pinned_drop] 105 impl<T> PinnedDrop for MiscDeviceRegistration<T> { 106 fn drop(self: Pin<&mut Self>) { 107 // SAFETY: We know that the device is registered by the type invariants. 108 unsafe { bindings::misc_deregister(self.inner.get()) }; 109 } 110 } 111 112 /// Trait implemented by the private data of an open misc device. 113 #[vtable] 114 pub trait MiscDevice: Sized { 115 /// What kind of pointer should `Self` be wrapped in. 116 type Ptr: ForeignOwnable + Send + Sync; 117 118 /// Called when the misc device is opened. 119 /// 120 /// The returned pointer will be stored as the private data for the file. 121 fn open(_file: &File, _misc: &MiscDeviceRegistration<Self>) -> Result<Self::Ptr>; 122 123 /// Called when the misc device is released. 124 fn release(device: Self::Ptr, _file: &File) { 125 drop(device); 126 } 127 128 /// Handle for mmap. 129 /// 130 /// This function is invoked when a user space process invokes the `mmap` system call on 131 /// `file`. The function is a callback that is part of the VMA initializer. The kernel will do 132 /// initial setup of the VMA before calling this function. The function can then interact with 133 /// the VMA initialization by calling methods of `vma`. If the function does not return an 134 /// error, the kernel will complete initialization of the VMA according to the properties of 135 /// `vma`. 136 fn mmap( 137 _device: <Self::Ptr as ForeignOwnable>::Borrowed<'_>, 138 _file: &File, 139 _vma: &VmaNew, 140 ) -> Result { 141 build_error!(VTABLE_DEFAULT_ERROR) 142 } 143 144 /// Read from this miscdevice. 145 fn read_iter(_kiocb: Kiocb<'_, Self::Ptr>, _iov: &mut IovIterDest<'_>) -> Result<usize> { 146 build_error!(VTABLE_DEFAULT_ERROR) 147 } 148 149 /// Write to this miscdevice. 150 fn write_iter(_kiocb: Kiocb<'_, Self::Ptr>, _iov: &mut IovIterSource<'_>) -> Result<usize> { 151 build_error!(VTABLE_DEFAULT_ERROR) 152 } 153 154 /// Handler for ioctls. 155 /// 156 /// The `cmd` argument is usually manipulated using the utilities in [`kernel::ioctl`]. 157 /// 158 /// [`kernel::ioctl`]: mod@crate::ioctl 159 fn ioctl( 160 _device: <Self::Ptr as ForeignOwnable>::Borrowed<'_>, 161 _file: &File, 162 _cmd: u32, 163 _arg: usize, 164 ) -> Result<isize> { 165 build_error!(VTABLE_DEFAULT_ERROR) 166 } 167 168 /// Handler for ioctls. 169 /// 170 /// Used for 32-bit userspace on 64-bit platforms. 171 /// 172 /// This method is optional and only needs to be provided if the ioctl relies on structures 173 /// that have different layout on 32-bit and 64-bit userspace. If no implementation is 174 /// provided, then `compat_ptr_ioctl` will be used instead. 175 #[cfg(CONFIG_COMPAT)] 176 fn compat_ioctl( 177 _device: <Self::Ptr as ForeignOwnable>::Borrowed<'_>, 178 _file: &File, 179 _cmd: u32, 180 _arg: usize, 181 ) -> Result<isize> { 182 build_error!(VTABLE_DEFAULT_ERROR) 183 } 184 185 /// Show info for this fd. 186 fn show_fdinfo( 187 _device: <Self::Ptr as ForeignOwnable>::Borrowed<'_>, 188 _m: &SeqFile, 189 _file: &File, 190 ) { 191 build_error!(VTABLE_DEFAULT_ERROR) 192 } 193 } 194 195 /// A vtable for the file operations of a Rust miscdevice. 196 struct MiscdeviceVTable<T: MiscDevice>(PhantomData<T>); 197 198 impl<T: MiscDevice> MiscdeviceVTable<T> { 199 /// # Safety 200 /// 201 /// `file` and `inode` must be the file and inode for a file that is undergoing initialization. 202 /// The file must be associated with a `MiscDeviceRegistration<T>`. 203 unsafe extern "C" fn open(inode: *mut bindings::inode, raw_file: *mut bindings::file) -> c_int { 204 // SAFETY: The pointers are valid and for a file being opened. 205 let ret = unsafe { bindings::generic_file_open(inode, raw_file) }; 206 if ret != 0 { 207 return ret; 208 } 209 210 // SAFETY: The open call of a file can access the private data. 211 let misc_ptr = unsafe { (*raw_file).private_data }; 212 213 // SAFETY: This is a miscdevice, so `misc_open()` set the private data to a pointer to the 214 // associated `struct miscdevice` before calling into this method. Furthermore, 215 // `misc_open()` ensures that the miscdevice can't be unregistered and freed during this 216 // call to `fops_open`. 217 let misc = unsafe { &*misc_ptr.cast::<MiscDeviceRegistration<T>>() }; 218 219 // SAFETY: 220 // * This underlying file is valid for (much longer than) the duration of `T::open`. 221 // * There is no active fdget_pos region on the file on this thread. 222 let file = unsafe { File::from_raw_file(raw_file) }; 223 224 let ptr = match T::open(file, misc) { 225 Ok(ptr) => ptr, 226 Err(err) => return err.to_errno(), 227 }; 228 229 // This overwrites the private data with the value specified by the user, changing the type 230 // of this file's private data. All future accesses to the private data is performed by 231 // other fops_* methods in this file, which all correctly cast the private data to the new 232 // type. 233 // 234 // SAFETY: The open call of a file can access the private data. 235 unsafe { (*raw_file).private_data = ptr.into_foreign() }; 236 237 0 238 } 239 240 /// # Safety 241 /// 242 /// `file` and `inode` must be the file and inode for a file that is being released. The file 243 /// must be associated with a `MiscDeviceRegistration<T>`. 244 unsafe extern "C" fn release(_inode: *mut bindings::inode, file: *mut bindings::file) -> c_int { 245 // SAFETY: The release call of a file owns the private data. 246 let private = unsafe { (*file).private_data }; 247 // SAFETY: The release call of a file owns the private data. 248 let ptr = unsafe { <T::Ptr as ForeignOwnable>::from_foreign(private) }; 249 250 // SAFETY: 251 // * The file is valid for the duration of this call. 252 // * There is no active fdget_pos region on the file on this thread. 253 T::release(ptr, unsafe { File::from_raw_file(file) }); 254 255 0 256 } 257 258 /// # Safety 259 /// 260 /// `kiocb` must be correspond to a valid file that is associated with a 261 /// `MiscDeviceRegistration<T>`. `iter` must be a valid `struct iov_iter` for writing. 262 unsafe extern "C" fn read_iter( 263 kiocb: *mut bindings::kiocb, 264 iter: *mut bindings::iov_iter, 265 ) -> isize { 266 // SAFETY: The caller provides a valid `struct kiocb` associated with a 267 // `MiscDeviceRegistration<T>` file. 268 let kiocb = unsafe { Kiocb::from_raw(kiocb) }; 269 // SAFETY: This is a valid `struct iov_iter` for writing. 270 let iov = unsafe { IovIterDest::from_raw(iter) }; 271 272 match T::read_iter(kiocb, iov) { 273 Ok(res) => res as isize, 274 Err(err) => err.to_errno() as isize, 275 } 276 } 277 278 /// # Safety 279 /// 280 /// `kiocb` must be correspond to a valid file that is associated with a 281 /// `MiscDeviceRegistration<T>`. `iter` must be a valid `struct iov_iter` for writing. 282 unsafe extern "C" fn write_iter( 283 kiocb: *mut bindings::kiocb, 284 iter: *mut bindings::iov_iter, 285 ) -> isize { 286 // SAFETY: The caller provides a valid `struct kiocb` associated with a 287 // `MiscDeviceRegistration<T>` file. 288 let kiocb = unsafe { Kiocb::from_raw(kiocb) }; 289 // SAFETY: This is a valid `struct iov_iter` for reading. 290 let iov = unsafe { IovIterSource::from_raw(iter) }; 291 292 match T::write_iter(kiocb, iov) { 293 Ok(res) => res as isize, 294 Err(err) => err.to_errno() as isize, 295 } 296 } 297 298 /// # Safety 299 /// 300 /// `file` must be a valid file that is associated with a `MiscDeviceRegistration<T>`. 301 /// `vma` must be a vma that is currently being mmap'ed with this file. 302 unsafe extern "C" fn mmap( 303 file: *mut bindings::file, 304 vma: *mut bindings::vm_area_struct, 305 ) -> c_int { 306 // SAFETY: The mmap call of a file can access the private data. 307 let private = unsafe { (*file).private_data }; 308 // SAFETY: This is a Rust Miscdevice, so we call `into_foreign` in `open` and 309 // `from_foreign` in `release`, and `fops_mmap` is guaranteed to be called between those 310 // two operations. 311 let device = unsafe { <T::Ptr as ForeignOwnable>::borrow(private.cast()) }; 312 // SAFETY: The caller provides a vma that is undergoing initial VMA setup. 313 let area = unsafe { VmaNew::from_raw(vma) }; 314 // SAFETY: 315 // * The file is valid for the duration of this call. 316 // * There is no active fdget_pos region on the file on this thread. 317 let file = unsafe { File::from_raw_file(file) }; 318 319 match T::mmap(device, file, area) { 320 Ok(()) => 0, 321 Err(err) => err.to_errno(), 322 } 323 } 324 325 /// # Safety 326 /// 327 /// `file` must be a valid file that is associated with a `MiscDeviceRegistration<T>`. 328 unsafe extern "C" fn ioctl(file: *mut bindings::file, cmd: c_uint, arg: c_ulong) -> c_long { 329 // SAFETY: The ioctl call of a file can access the private data. 330 let private = unsafe { (*file).private_data }; 331 // SAFETY: Ioctl calls can borrow the private data of the file. 332 let device = unsafe { <T::Ptr as ForeignOwnable>::borrow(private) }; 333 334 // SAFETY: 335 // * The file is valid for the duration of this call. 336 // * There is no active fdget_pos region on the file on this thread. 337 let file = unsafe { File::from_raw_file(file) }; 338 339 match T::ioctl(device, file, cmd, arg) { 340 Ok(ret) => ret as c_long, 341 Err(err) => err.to_errno() as c_long, 342 } 343 } 344 345 /// # Safety 346 /// 347 /// `file` must be a valid file that is associated with a `MiscDeviceRegistration<T>`. 348 #[cfg(CONFIG_COMPAT)] 349 unsafe extern "C" fn compat_ioctl( 350 file: *mut bindings::file, 351 cmd: c_uint, 352 arg: c_ulong, 353 ) -> c_long { 354 // SAFETY: The compat ioctl call of a file can access the private data. 355 let private = unsafe { (*file).private_data }; 356 // SAFETY: Ioctl calls can borrow the private data of the file. 357 let device = unsafe { <T::Ptr as ForeignOwnable>::borrow(private) }; 358 359 // SAFETY: 360 // * The file is valid for the duration of this call. 361 // * There is no active fdget_pos region on the file on this thread. 362 let file = unsafe { File::from_raw_file(file) }; 363 364 match T::compat_ioctl(device, file, cmd, arg) { 365 Ok(ret) => ret as c_long, 366 Err(err) => err.to_errno() as c_long, 367 } 368 } 369 370 /// # Safety 371 /// 372 /// - `file` must be a valid file that is associated with a `MiscDeviceRegistration<T>`. 373 /// - `seq_file` must be a valid `struct seq_file` that we can write to. 374 unsafe extern "C" fn show_fdinfo(seq_file: *mut bindings::seq_file, file: *mut bindings::file) { 375 // SAFETY: The release call of a file owns the private data. 376 let private = unsafe { (*file).private_data }; 377 // SAFETY: Ioctl calls can borrow the private data of the file. 378 let device = unsafe { <T::Ptr as ForeignOwnable>::borrow(private) }; 379 // SAFETY: 380 // * The file is valid for the duration of this call. 381 // * There is no active fdget_pos region on the file on this thread. 382 let file = unsafe { File::from_raw_file(file) }; 383 // SAFETY: The caller ensures that the pointer is valid and exclusive for the duration in 384 // which this method is called. 385 let m = unsafe { SeqFile::from_raw(seq_file) }; 386 387 T::show_fdinfo(device, m, file); 388 } 389 390 const VTABLE: bindings::file_operations = bindings::file_operations { 391 open: Some(Self::open), 392 release: Some(Self::release), 393 mmap: if T::HAS_MMAP { Some(Self::mmap) } else { None }, 394 read_iter: if T::HAS_READ_ITER { 395 Some(Self::read_iter) 396 } else { 397 None 398 }, 399 write_iter: if T::HAS_WRITE_ITER { 400 Some(Self::write_iter) 401 } else { 402 None 403 }, 404 unlocked_ioctl: if T::HAS_IOCTL { 405 Some(Self::ioctl) 406 } else { 407 None 408 }, 409 #[cfg(CONFIG_COMPAT)] 410 compat_ioctl: if T::HAS_COMPAT_IOCTL { 411 Some(Self::compat_ioctl) 412 } else if T::HAS_IOCTL { 413 bindings::compat_ptr_ioctl 414 } else { 415 None 416 }, 417 show_fdinfo: if T::HAS_SHOW_FDINFO { 418 Some(Self::show_fdinfo) 419 } else { 420 None 421 }, 422 ..pin_init::zeroed() 423 }; 424 425 const fn build() -> &'static bindings::file_operations { 426 &Self::VTABLE 427 } 428 } 429