Path: blob/master/drivers/android/binder/deferred_close.rs
29524 views
// SPDX-License-Identifier: GPL-2.012// Copyright (C) 2025 Google LLC.34//! Logic for closing files in a deferred manner.5//!6//! This file could make sense to have in `kernel::fs`, but it was rejected for being too7//! Binder-specific.89use core::mem::MaybeUninit;10use kernel::{11alloc::{AllocError, Flags},12bindings,13prelude::*,14};1516/// Helper used for closing file descriptors in a way that is safe even if the file is currently17/// held using `fdget`.18///19/// Additional motivation can be found in commit 80cd795630d6 ("binder: fix use-after-free due to20/// ksys_close() during fdget()") and in the comments on `binder_do_fd_close`.21pub(crate) struct DeferredFdCloser {22inner: KBox<DeferredFdCloserInner>,23}2425/// SAFETY: This just holds an allocation with no real content, so there's no safety issue with26/// moving it across threads.27unsafe impl Send for DeferredFdCloser {}28/// SAFETY: This just holds an allocation with no real content, so there's no safety issue with29/// moving it across threads.30unsafe impl Sync for DeferredFdCloser {}3132/// # Invariants33///34/// If the `file` pointer is non-null, then it points at a `struct file` and owns a refcount to35/// that file.36#[repr(C)]37struct DeferredFdCloserInner {38twork: MaybeUninit<bindings::callback_head>,39file: *mut bindings::file,40}4142impl DeferredFdCloser {43/// Create a new [`DeferredFdCloser`].44pub(crate) fn new(flags: Flags) -> Result<Self, AllocError> {45Ok(Self {46// INVARIANT: The `file` pointer is null, so the type invariant does not apply.47inner: KBox::new(48DeferredFdCloserInner {49twork: MaybeUninit::uninit(),50file: core::ptr::null_mut(),51},52flags,53)?,54})55}5657/// Schedule a task work that closes the file descriptor when this task returns to userspace.58///59/// Fails if this is called from a context where we cannot run work when returning to60/// userspace. (E.g., from a kthread.)61pub(crate) fn close_fd(self, fd: u32) -> Result<(), DeferredFdCloseError> {62use bindings::task_work_notify_mode_TWA_RESUME as TWA_RESUME;6364// In this method, we schedule the task work before closing the file. This is because65// scheduling a task work is fallible, and we need to know whether it will fail before we66// attempt to close the file.6768// Task works are not available on kthreads.69let current = kernel::current!();7071// Check if this is a kthread.72// SAFETY: Reading `flags` from a task is always okay.73if unsafe { ((*current.as_ptr()).flags & bindings::PF_KTHREAD) != 0 } {74return Err(DeferredFdCloseError::TaskWorkUnavailable);75}7677// Transfer ownership of the box's allocation to a raw pointer. This disables the78// destructor, so we must manually convert it back to a KBox to drop it.79//80// Until we convert it back to a `KBox`, there are no aliasing requirements on this81// pointer.82let inner = KBox::into_raw(self.inner);8384// The `callback_head` field is first in the struct, so this cast correctly gives us a85// pointer to the field.86let callback_head = inner.cast::<bindings::callback_head>();87// SAFETY: This pointer offset operation does not go out-of-bounds.88let file_field = unsafe { core::ptr::addr_of_mut!((*inner).file) };8990let current = current.as_ptr();9192// SAFETY: This function currently has exclusive access to the `DeferredFdCloserInner`, so93// it is okay for us to perform unsynchronized writes to its `callback_head` field.94unsafe { bindings::init_task_work(callback_head, Some(Self::do_close_fd)) };9596// SAFETY: This inserts the `DeferredFdCloserInner` into the task workqueue for the current97// task. If this operation is successful, then this transfers exclusive ownership of the98// `callback_head` field to the C side until it calls `do_close_fd`, and we don't touch or99// invalidate the field during that time.100//101// When the C side calls `do_close_fd`, the safety requirements of that method are102// satisfied because when a task work is executed, the callback is given ownership of the103// pointer.104//105// The file pointer is currently null. If it is changed to be non-null before `do_close_fd`106// is called, then that change happens due to the write at the end of this function, and107// that write has a safety comment that explains why the refcount can be dropped when108// `do_close_fd` runs.109let res = unsafe { bindings::task_work_add(current, callback_head, TWA_RESUME) };110111if res != 0 {112// SAFETY: Scheduling the task work failed, so we still have ownership of the box, so113// we may destroy it.114unsafe { drop(KBox::from_raw(inner)) };115116return Err(DeferredFdCloseError::TaskWorkUnavailable);117}118119// This removes the fd from the fd table in `current`. The file is not fully closed until120// `filp_close` is called. We are given ownership of one refcount to the file.121//122// SAFETY: This is safe no matter what `fd` is. If the `fd` is valid (that is, if the123// pointer is non-null), then we call `filp_close` on the returned pointer as required by124// `file_close_fd`.125let file = unsafe { bindings::file_close_fd(fd) };126if file.is_null() {127// We don't clean up the task work since that might be expensive if the task work queue128// is long. Just let it execute and let it clean up for itself.129return Err(DeferredFdCloseError::BadFd);130}131132// Acquire a second refcount to the file.133//134// SAFETY: The `file` pointer points at a file with a non-zero refcount.135unsafe { bindings::get_file(file) };136137// This method closes the fd, consuming one of our two refcounts. There could be active138// light refcounts created from that fd, so we must ensure that the file has a positive139// refcount for the duration of those active light refcounts. We do that by holding on to140// the second refcount until the current task returns to userspace.141//142// SAFETY: The `file` pointer is valid. Passing `current->files` as the file table to close143// it in is correct, since we just got the `fd` from `file_close_fd` which also uses144// `current->files`.145//146// Note: fl_owner_t is currently a void pointer.147unsafe { bindings::filp_close(file, (*current).files as bindings::fl_owner_t) };148149// We update the file pointer that the task work is supposed to fput. This transfers150// ownership of our last refcount.151//152// INVARIANT: This changes the `file` field of a `DeferredFdCloserInner` from null to153// non-null. This doesn't break the type invariant for `DeferredFdCloserInner` because we154// still own a refcount to the file, so we can pass ownership of that refcount to the155// `DeferredFdCloserInner`.156//157// When `do_close_fd` runs, it must be safe for it to `fput` the refcount. However, this is158// the case because all light refcounts that are associated with the fd we closed159// previously must be dropped when `do_close_fd`, since light refcounts must be dropped160// before returning to userspace.161//162// SAFETY: Task works are executed on the current thread right before we return to163// userspace, so this write is guaranteed to happen before `do_close_fd` is called, which164// means that a race is not possible here.165unsafe { *file_field = file };166167Ok(())168}169170/// # Safety171///172/// The provided pointer must point at the `twork` field of a `DeferredFdCloserInner` stored in173/// a `KBox`, and the caller must pass exclusive ownership of that `KBox`. Furthermore, if the174/// file pointer is non-null, then it must be okay to release the refcount by calling `fput`.175unsafe extern "C" fn do_close_fd(inner: *mut bindings::callback_head) {176// SAFETY: The caller just passed us ownership of this box.177let inner = unsafe { KBox::from_raw(inner.cast::<DeferredFdCloserInner>()) };178if !inner.file.is_null() {179// SAFETY: By the type invariants, we own a refcount to this file, and the caller180// guarantees that dropping the refcount now is okay.181unsafe { bindings::fput(inner.file) };182}183// The allocation is freed when `inner` goes out of scope.184}185}186187/// Represents a failure to close an fd in a deferred manner.188#[derive(Copy, Clone, Debug, Eq, PartialEq)]189pub(crate) enum DeferredFdCloseError {190/// Closing the fd failed because we were unable to schedule a task work.191TaskWorkUnavailable,192/// Closing the fd failed because the fd does not exist.193BadFd,194}195196impl From<DeferredFdCloseError> for Error {197fn from(err: DeferredFdCloseError) -> Error {198match err {199DeferredFdCloseError::TaskWorkUnavailable => ESRCH,200DeferredFdCloseError::BadFd => EBADF,201}202}203}204205206