Skip to main content

kernel/
error.rs

1// SPDX-License-Identifier: GPL-2.0
2
3//! Kernel errors.
4//!
5//! C header: [`include/uapi/asm-generic/errno-base.h`](srctree/include/uapi/asm-generic/errno-base.h)\
6//! C header: [`include/uapi/asm-generic/errno.h`](srctree/include/uapi/asm-generic/errno.h)\
7//! C header: [`include/linux/errno.h`](srctree/include/linux/errno.h)
8
9use crate::{
10    alloc::{layout::LayoutError, AllocError},
11    fmt,
12    str::CStr,
13};
14
15use core::num::NonZeroI32;
16use core::num::TryFromIntError;
17use core::str::Utf8Error;
18
19/// Contains the C-compatible error codes.
20#[rustfmt::skip]
21pub mod code {
22    macro_rules! declare_err {
23        ($err:tt $(,)? $($doc:expr),+) => {
24            $(
25            #[doc = $doc]
26            )*
27            pub const $err: super::Error =
28                match super::Error::try_from_errno(-(crate::bindings::$err as i32)) {
29                    Some(err) => err,
30                    None => panic!("Invalid errno in `declare_err!`"),
31                };
32        };
33    }
34
35    declare_err!(EPERM, "Operation not permitted.");
36    declare_err!(ENOENT, "No such file or directory.");
37    declare_err!(ESRCH, "No such process.");
38    declare_err!(EINTR, "Interrupted system call.");
39    declare_err!(EIO, "I/O error.");
40    declare_err!(ENXIO, "No such device or address.");
41    declare_err!(E2BIG, "Argument list too long.");
42    declare_err!(ENOEXEC, "Exec format error.");
43    declare_err!(EBADF, "Bad file number.");
44    declare_err!(ECHILD, "No child processes.");
45    declare_err!(EAGAIN, "Try again.");
46    declare_err!(ENOMEM, "Out of memory.");
47    declare_err!(EACCES, "Permission denied.");
48    declare_err!(EFAULT, "Bad address.");
49    declare_err!(ENOTBLK, "Block device required.");
50    declare_err!(EBUSY, "Device or resource busy.");
51    declare_err!(EEXIST, "File exists.");
52    declare_err!(EXDEV, "Cross-device link.");
53    declare_err!(ENODEV, "No such device.");
54    declare_err!(ENOTDIR, "Not a directory.");
55    declare_err!(EISDIR, "Is a directory.");
56    declare_err!(EINVAL, "Invalid argument.");
57    declare_err!(ENFILE, "File table overflow.");
58    declare_err!(EMFILE, "Too many open files.");
59    declare_err!(ENOTTY, "Not a typewriter.");
60    declare_err!(ETXTBSY, "Text file busy.");
61    declare_err!(EFBIG, "File too large.");
62    declare_err!(ENOSPC, "No space left on device.");
63    declare_err!(ESPIPE, "Illegal seek.");
64    declare_err!(EROFS, "Read-only file system.");
65    declare_err!(EMLINK, "Too many links.");
66    declare_err!(EPIPE, "Broken pipe.");
67    declare_err!(EDOM, "Math argument out of domain of func.");
68    declare_err!(ERANGE, "Math result not representable.");
69    declare_err!(EOVERFLOW, "Value too large for defined data type.");
70    declare_err!(EMSGSIZE, "Message too long.");
71    declare_err!(ETIMEDOUT, "Connection timed out.");
72    declare_err!(ERESTARTSYS, "Restart the system call.");
73    declare_err!(ERESTARTNOINTR, "System call was interrupted by a signal and will be restarted.");
74    declare_err!(ERESTARTNOHAND, "Restart if no handler.");
75    declare_err!(ENOIOCTLCMD, "No ioctl command.");
76    declare_err!(ERESTART_RESTARTBLOCK, "Restart by calling sys_restart_syscall.");
77    declare_err!(EPROBE_DEFER, "Driver requests probe retry.");
78    declare_err!(EOPENSTALE, "Open found a stale dentry.");
79    declare_err!(ENOPARAM, "Parameter not supported.");
80    declare_err!(EBADHANDLE, "Illegal NFS file handle.");
81    declare_err!(ENOTSYNC, "Update synchronization mismatch.");
82    declare_err!(EBADCOOKIE, "Cookie is stale.");
83    declare_err!(ENOTSUPP, "Operation is not supported.");
84    declare_err!(ETOOSMALL, "Buffer or request is too small.");
85    declare_err!(ESERVERFAULT, "An untranslatable error occurred.");
86    declare_err!(EBADTYPE, "Type not supported by server.");
87    declare_err!(EJUKEBOX, "Request initiated, but will not complete before timeout.");
88    declare_err!(EIOCBQUEUED, "iocb queued, will get completion event.");
89    declare_err!(ERECALLCONFLICT, "Conflict with recalled state.");
90    declare_err!(ENOGRACE, "NFS file lock reclaim refused.");
91}
92
93/// Generic integer kernel error.
94///
95/// The kernel defines a set of integer generic error codes based on C and
96/// POSIX ones. These codes may have a more specific meaning in some contexts.
97///
98/// # Invariants
99///
100/// The value is a valid `errno` (i.e. `>= -MAX_ERRNO && < 0`).
101#[derive(Clone, Copy, PartialEq, Eq)]
102pub struct Error(NonZeroI32);
103
104impl Error {
105    /// Creates an [`Error`] from a kernel error code.
106    ///
107    /// `errno` must be within error code range (i.e. `>= -MAX_ERRNO && < 0`).
108    ///
109    /// It is a bug to pass an out-of-range `errno`. [`code::EINVAL`] is returned in such a case.
110    ///
111    /// # Examples
112    ///
113    /// ```
114    /// assert_eq!(Error::from_errno(-1), EPERM);
115    /// assert_eq!(Error::from_errno(-2), ENOENT);
116    /// ```
117    ///
118    /// The following calls are considered a bug:
119    ///
120    /// ```
121    /// assert_eq!(Error::from_errno(0), EINVAL);
122    /// assert_eq!(Error::from_errno(-1000000), EINVAL);
123    /// ```
124    pub fn from_errno(errno: crate::ffi::c_int) -> Error {
125        if let Some(error) = Self::try_from_errno(errno) {
126            error
127        } else {
128            // TODO: Make it a `WARN_ONCE` once available.
129            crate::pr_warn!(
130                "attempted to create `Error` with out of range `errno`: {}\n",
131                errno
132            );
133            code::EINVAL
134        }
135    }
136
137    /// Creates an [`Error`] from a kernel error code.
138    ///
139    /// Returns [`None`] if `errno` is out-of-range.
140    const fn try_from_errno(errno: crate::ffi::c_int) -> Option<Error> {
141        if errno < -(bindings::MAX_ERRNO as i32) || errno >= 0 {
142            return None;
143        }
144
145        // SAFETY: `errno` is checked above to be in a valid range.
146        Some(unsafe { Error::from_errno_unchecked(errno) })
147    }
148
149    /// Creates an [`Error`] from a kernel error code.
150    ///
151    /// # Safety
152    ///
153    /// `errno` must be within error code range (i.e. `>= -MAX_ERRNO && < 0`).
154    const unsafe fn from_errno_unchecked(errno: crate::ffi::c_int) -> Error {
155        // INVARIANT: The contract ensures the type invariant
156        // will hold.
157        // SAFETY: The caller guarantees `errno` is non-zero.
158        Error(unsafe { NonZeroI32::new_unchecked(errno) })
159    }
160
161    /// Returns the kernel error code.
162    pub fn to_errno(self) -> crate::ffi::c_int {
163        self.0.get()
164    }
165
166    #[cfg(CONFIG_BLOCK)]
167    pub(crate) fn to_blk_status(self) -> bindings::blk_status_t {
168        // SAFETY: `self.0` is a valid error due to its invariant.
169        unsafe { bindings::errno_to_blk_status(self.0.get()) }
170    }
171
172    /// Returns the error encoded as a pointer.
173    pub fn to_ptr<T>(self) -> *mut T {
174        // SAFETY: `self.0` is a valid error due to its invariant.
175        unsafe { bindings::ERR_PTR(self.0.get() as crate::ffi::c_long).cast() }
176    }
177
178    /// Returns a string representing the error, if one exists.
179    #[cfg(not(testlib))]
180    pub fn name(&self) -> Option<&'static CStr> {
181        // SAFETY: Just an FFI call, there are no extra safety requirements.
182        let ptr = unsafe { bindings::errname(-self.0.get()) };
183        if ptr.is_null() {
184            None
185        } else {
186            use crate::str::CStrExt as _;
187
188            // SAFETY: The string returned by `errname` is static and `NUL`-terminated.
189            Some(unsafe { CStr::from_char_ptr(ptr) })
190        }
191    }
192
193    /// Returns a string representing the error, if one exists.
194    ///
195    /// When `testlib` is configured, this always returns `None` to avoid the dependency on a
196    /// kernel function so that tests that use this (e.g., by calling [`Result::unwrap`]) can still
197    /// run in userspace.
198    #[cfg(testlib)]
199    pub fn name(&self) -> Option<&'static CStr> {
200        None
201    }
202}
203
204impl fmt::Debug for Error {
205    fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
206        match self.name() {
207            // Print out number if no name can be found.
208            None => f.debug_tuple("Error").field(&-self.0).finish(),
209            Some(name) => f
210                .debug_tuple(
211                    // SAFETY: These strings are ASCII-only.
212                    unsafe { core::str::from_utf8_unchecked(name.to_bytes()) },
213                )
214                .finish(),
215        }
216    }
217}
218
219impl From<AllocError> for Error {
220    #[inline]
221    fn from(_: AllocError) -> Error {
222        code::ENOMEM
223    }
224}
225
226impl From<TryFromIntError> for Error {
227    #[inline]
228    fn from(_: TryFromIntError) -> Error {
229        code::EINVAL
230    }
231}
232
233impl From<Utf8Error> for Error {
234    #[inline]
235    fn from(_: Utf8Error) -> Error {
236        code::EINVAL
237    }
238}
239
240impl From<LayoutError> for Error {
241    #[inline]
242    fn from(_: LayoutError) -> Error {
243        code::ENOMEM
244    }
245}
246
247impl From<fmt::Error> for Error {
248    #[inline]
249    fn from(_: fmt::Error) -> Error {
250        code::EINVAL
251    }
252}
253
254impl From<core::convert::Infallible> for Error {
255    #[inline]
256    fn from(e: core::convert::Infallible) -> Error {
257        match e {}
258    }
259}
260
261/// A [`Result`] with an [`Error`] error type.
262///
263/// To be used as the return type for functions that may fail.
264///
265/// # Error codes in C and Rust
266///
267/// In C, it is common that functions indicate success or failure through
268/// their return value; modifying or returning extra data through non-`const`
269/// pointer parameters. In particular, in the kernel, functions that may fail
270/// typically return an `int` that represents a generic error code. We model
271/// those as [`Error`].
272///
273/// In Rust, it is idiomatic to model functions that may fail as returning
274/// a [`Result`]. Since in the kernel many functions return an error code,
275/// [`Result`] is a type alias for a [`core::result::Result`] that uses
276/// [`Error`] as its error type.
277///
278/// Note that even if a function does not return anything when it succeeds,
279/// it should still be modeled as returning a [`Result`] rather than
280/// just an [`Error`].
281///
282/// Calling a function that returns [`Result`] forces the caller to handle
283/// the returned [`Result`].
284///
285/// This can be done "manually" by using [`match`]. Using [`match`] to decode
286/// the [`Result`] is similar to C where all the return value decoding and the
287/// error handling is done explicitly by writing handling code for each
288/// error to cover. Using [`match`] the error and success handling can be
289/// implemented in all detail as required. For example (inspired by
290/// [`samples/rust/rust_minimal.rs`]):
291///
292/// ```
293/// # #[allow(clippy::single_match)]
294/// fn example() -> Result {
295///     let mut numbers = KVec::new();
296///
297///     match numbers.push(72, GFP_KERNEL) {
298///         Err(e) => {
299///             pr_err!("Error pushing 72: {e:?}");
300///             return Err(e.into());
301///         }
302///         // Do nothing, continue.
303///         Ok(()) => (),
304///     }
305///
306///     match numbers.push(108, GFP_KERNEL) {
307///         Err(e) => {
308///             pr_err!("Error pushing 108: {e:?}");
309///             return Err(e.into());
310///         }
311///         // Do nothing, continue.
312///         Ok(()) => (),
313///     }
314///
315///     match numbers.push(200, GFP_KERNEL) {
316///         Err(e) => {
317///             pr_err!("Error pushing 200: {e:?}");
318///             return Err(e.into());
319///         }
320///         // Do nothing, continue.
321///         Ok(()) => (),
322///     }
323///
324///     Ok(())
325/// }
326/// # example()?;
327/// # Ok::<(), Error>(())
328/// ```
329///
330/// An alternative to be more concise is the [`if let`] syntax:
331///
332/// ```
333/// fn example() -> Result {
334///     let mut numbers = KVec::new();
335///
336///     if let Err(e) = numbers.push(72, GFP_KERNEL) {
337///         pr_err!("Error pushing 72: {e:?}");
338///         return Err(e.into());
339///     }
340///
341///     if let Err(e) = numbers.push(108, GFP_KERNEL) {
342///         pr_err!("Error pushing 108: {e:?}");
343///         return Err(e.into());
344///     }
345///
346///     if let Err(e) = numbers.push(200, GFP_KERNEL) {
347///         pr_err!("Error pushing 200: {e:?}");
348///         return Err(e.into());
349///     }
350///
351///     Ok(())
352/// }
353/// # example()?;
354/// # Ok::<(), Error>(())
355/// ```
356///
357/// Instead of these verbose [`match`]/[`if let`], the [`?`] operator can
358/// be used to handle the [`Result`]. Using the [`?`] operator is often
359/// the best choice to handle [`Result`] in a non-verbose way as done in
360/// [`samples/rust/rust_minimal.rs`]:
361///
362/// ```
363/// fn example() -> Result {
364///     let mut numbers = KVec::new();
365///
366///     numbers.push(72, GFP_KERNEL)?;
367///     numbers.push(108, GFP_KERNEL)?;
368///     numbers.push(200, GFP_KERNEL)?;
369///
370///     Ok(())
371/// }
372/// # example()?;
373/// # Ok::<(), Error>(())
374/// ```
375///
376/// Another possibility is to call [`unwrap()`](Result::unwrap) or
377/// [`expect()`](Result::expect). However, use of these functions is
378/// *heavily discouraged* in the kernel because they trigger a Rust
379/// [`panic!`] if an error happens, which may destabilize the system or
380/// entirely break it as a result -- just like the C [`BUG()`] macro.
381/// Please see the documentation for the C macro [`BUG()`] for guidance
382/// on when to use these functions.
383///
384/// Alternatively, depending on the use case, using [`unwrap_or()`],
385/// [`unwrap_or_else()`], [`unwrap_or_default()`] or [`unwrap_unchecked()`]
386/// might be an option, as well.
387///
388/// For even more details, please see the [Rust documentation].
389///
390/// [`match`]: https://doc.rust-lang.org/reference/expressions/match-expr.html
391/// [`samples/rust/rust_minimal.rs`]: srctree/samples/rust/rust_minimal.rs
392/// [`if let`]: https://doc.rust-lang.org/reference/expressions/if-expr.html#if-let-expressions
393/// [`?`]: https://doc.rust-lang.org/reference/expressions/operator-expr.html#the-question-mark-operator
394/// [`unwrap()`]: Result::unwrap
395/// [`expect()`]: Result::expect
396/// [`BUG()`]: https://docs.kernel.org/process/deprecated.html#bug-and-bug-on
397/// [`unwrap_or()`]: Result::unwrap_or
398/// [`unwrap_or_else()`]: Result::unwrap_or_else
399/// [`unwrap_or_default()`]: Result::unwrap_or_default
400/// [`unwrap_unchecked()`]: Result::unwrap_unchecked
401/// [Rust documentation]: https://doc.rust-lang.org/book/ch09-02-recoverable-errors-with-result.html
402pub type Result<T = (), E = Error> = core::result::Result<T, E>;
403
404/// Converts an integer as returned by a C kernel function to a [`Result`].
405///
406/// If the integer is negative, an [`Err`] with an [`Error`] as given by [`Error::from_errno`] is
407/// returned. This means the integer must be `>= -MAX_ERRNO`.
408///
409/// Otherwise, it returns [`Ok`].
410///
411/// It is a bug to pass an out-of-range negative integer. `Err(EINVAL)` is returned in such a case.
412///
413/// # Examples
414///
415/// This function may be used to easily perform early returns with the [`?`] operator when working
416/// with C APIs within Rust abstractions:
417///
418/// ```
419/// # use kernel::error::to_result;
420/// # mod bindings {
421/// #     #![expect(clippy::missing_safety_doc)]
422/// #     use kernel::prelude::*;
423/// #     pub(super) unsafe fn f1() -> c_int { 0 }
424/// #     pub(super) unsafe fn f2() -> c_int { EINVAL.to_errno() }
425/// # }
426/// fn f() -> Result {
427///     // SAFETY: ...
428///     to_result(unsafe { bindings::f1() })?;
429///
430///     // SAFETY: ...
431///     to_result(unsafe { bindings::f2() })?;
432///
433///     // ...
434///
435///     Ok(())
436/// }
437/// # assert_eq!(f(), Err(EINVAL));
438/// ```
439///
440/// [`?`]: https://doc.rust-lang.org/reference/expressions/operator-expr.html#the-question-mark-operator
441pub fn to_result(err: crate::ffi::c_int) -> Result {
442    if err < 0 {
443        Err(Error::from_errno(err))
444    } else {
445        Ok(())
446    }
447}
448
449/// Transform a kernel "error pointer" to a normal pointer.
450///
451/// Some kernel C API functions return an "error pointer" which optionally
452/// embeds an `errno`. Callers are supposed to check the returned pointer
453/// for errors. This function performs the check and converts the "error pointer"
454/// to a normal pointer in an idiomatic fashion.
455///
456/// # Examples
457///
458/// ```ignore
459/// # use kernel::from_err_ptr;
460/// # use kernel::bindings;
461/// fn devm_platform_ioremap_resource(
462///     pdev: &mut PlatformDevice,
463///     index: u32,
464/// ) -> Result<*mut kernel::ffi::c_void> {
465///     // SAFETY: `pdev` points to a valid platform device. There are no safety requirements
466///     // on `index`.
467///     from_err_ptr(unsafe { bindings::devm_platform_ioremap_resource(pdev.to_ptr(), index) })
468/// }
469/// ```
470pub fn from_err_ptr<T>(ptr: *mut T) -> Result<*mut T> {
471    // CAST: Casting a pointer to `*const crate::ffi::c_void` is always valid.
472    let const_ptr: *const crate::ffi::c_void = ptr.cast();
473    // SAFETY: The FFI function does not deref the pointer.
474    if unsafe { bindings::IS_ERR(const_ptr) } {
475        // SAFETY: The FFI function does not deref the pointer.
476        let err = unsafe { bindings::PTR_ERR(const_ptr) };
477
478        #[allow(clippy::unnecessary_cast)]
479        // CAST: If `IS_ERR()` returns `true`,
480        // then `PTR_ERR()` is guaranteed to return a
481        // negative value greater-or-equal to `-bindings::MAX_ERRNO`,
482        // which always fits in an `i16`, as per the invariant above.
483        // And an `i16` always fits in an `i32`. So casting `err` to
484        // an `i32` can never overflow, and is always valid.
485        //
486        // SAFETY: `IS_ERR()` ensures `err` is a
487        // negative value greater-or-equal to `-bindings::MAX_ERRNO`.
488        return Err(unsafe { Error::from_errno_unchecked(err as crate::ffi::c_int) });
489    }
490    Ok(ptr)
491}
492
493/// Calls a closure returning a [`crate::error::Result<T>`] and converts the result to
494/// a C integer result.
495///
496/// This is useful when calling Rust functions that return [`crate::error::Result<T>`]
497/// from inside `extern "C"` functions that need to return an integer error result.
498///
499/// `T` should be convertible from an `i16` via `From<i16>`.
500///
501/// # Examples
502///
503/// ```ignore
504/// # use kernel::from_result;
505/// # use kernel::bindings;
506/// unsafe extern "C" fn probe_callback(
507///     pdev: *mut bindings::platform_device,
508/// ) -> kernel::ffi::c_int {
509///     from_result(|| {
510///         let ptr = devm_alloc(pdev)?;
511///         bindings::platform_set_drvdata(pdev, ptr);
512///         Ok(0)
513///     })
514/// }
515/// ```
516pub fn from_result<T, F>(f: F) -> T
517where
518    T: From<i16>,
519    F: FnOnce() -> Result<T>,
520{
521    match f() {
522        Ok(v) => v,
523        // NO-OVERFLOW: negative `errno`s are no smaller than `-bindings::MAX_ERRNO`,
524        // `-bindings::MAX_ERRNO` fits in an `i16` as per invariant above,
525        // therefore a negative `errno` always fits in an `i16` and will not overflow.
526        Err(e) => T::from(e.to_errno() as i16),
527    }
528}
529
530/// Error message for calling a default function of a [`#[vtable]`](macros::vtable) trait.
531pub const VTABLE_DEFAULT_ERROR: &str =
532    "This function must not be called, see the #[vtable] documentation.";