zx/
fifo.rs

1// Copyright 2017 The Fuchsia Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5//! Type-safe bindings for Zircon fifo objects.
6
7use crate::{ok, sys, AsHandleRef, Handle, HandleBased, HandleRef, Status};
8use std::mem::MaybeUninit;
9use zerocopy::{FromBytes, IntoBytes};
10
11/// An object representing a Zircon fifo.
12///
13/// As essentially a subtype of `Handle`, it can be freely interconverted.
14///
15/// Encodes the element type in the type. Defaults to `()` for the entry type to allow for untyped
16/// IPC. Use `Fifo::cast()` to convert an IPC-transferred fifo to one of the specific type required
17/// that will support reads and writes.
18#[repr(transparent)]
19pub struct Fifo<R = UnspecifiedFifoElement, W = R>(Handle, std::marker::PhantomData<(R, W)>);
20
21impl<R: IntoBytes + FromBytes, W: IntoBytes + FromBytes> Fifo<R, W> {
22    /// Create a pair of fifos and return their endpoints. Writing to one endpoint enqueues an
23    /// element into the fifo from which the opposing endpoint reads.
24    ///
25    /// Wraps the
26    /// [zx_fifo_create](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_create.md)
27    /// syscall.
28    pub fn create(elem_count: usize) -> Result<(Self, Fifo<W, R>), Status> {
29        if std::mem::size_of::<R>() != std::mem::size_of::<W>() {
30            return Err(Status::INVALID_ARGS);
31        }
32        let mut out0 = 0;
33        let mut out1 = 0;
34        let options = 0;
35
36        // SAFETY: this is a basic FFI call, and the mutable references are valid pointers.
37        let status = unsafe {
38            sys::zx_fifo_create(elem_count, std::mem::size_of::<R>(), options, &mut out0, &mut out1)
39        };
40        ok(status)?;
41
42        // SAFETY: if the above call succeeded, these are valid handle numbers.
43        unsafe { Ok((Fifo::from(Handle::from_raw(out0)), Fifo::from(Handle::from_raw(out1)))) }
44    }
45
46    /// Attempts to write some number of elements into the fifo. On success, returns the number of
47    /// elements actually written.
48    ///
49    /// Wraps
50    /// [zx_fifo_write](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_write.md).
51    pub fn write(&self, buf: &[W]) -> Result<usize, Status> {
52        // SAFETY: this pointer is valid for the length of the slice
53        unsafe { self.write_raw(buf.as_ptr(), buf.len()) }
54    }
55
56    /// Attempts to write a single element into the fifo.
57    ///
58    /// Wraps
59    /// [zx_fifo_write](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_write.md).
60    pub fn write_one(&self, elem: &W) -> Result<(), Status> {
61        // SAFETY: this pointer is valid for a single element
62        unsafe { self.write_raw(elem, 1).map(|n| debug_assert_eq!(n, 1)) }
63    }
64
65    /// Attempts to write some number of elements into the fifo. On success, returns the number of
66    /// elements actually written.
67    ///
68    /// Wraps
69    /// [zx_fifo_write](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_write.md).
70    ///
71    /// # Safety
72    ///
73    /// The caller is responsible for ensuring `buf` is valid to write to for `count` elements.
74    pub unsafe fn write_raw(&self, buf: *const W, count: usize) -> Result<usize, Status> {
75        let mut actual_count = 0;
76        // SAFETY: safety requirements for this call are upheld by our caller.
77        let status = unsafe {
78            sys::zx_fifo_write(
79                self.raw_handle(),
80                std::mem::size_of::<W>(),
81                buf.cast::<u8>(),
82                count,
83                &mut actual_count,
84            )
85        };
86        ok(status).map(|()| actual_count)
87    }
88
89    /// Attempts to read some elements out of the fifo. On success, returns the number of elements
90    /// actually read.
91    ///
92    /// Wraps
93    /// [zx_fifo_read](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_read.md).
94    pub fn read(&self, buf: &mut [R]) -> Result<usize, Status> {
95        // SAFETY: the pointer is valid for the length of the slice
96        unsafe { self.read_raw(buf.as_mut_ptr(), buf.len()) }
97    }
98
99    /// Attempts to read a single element out of the fifo.
100    ///
101    /// Wraps
102    /// [zx_fifo_read](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_read.md).
103    pub fn read_one(&self) -> Result<R, Status> {
104        let mut elem = MaybeUninit::uninit();
105
106        // SAFETY: the reference is valid to write to, and this call will not read from the bytes.
107        let valid_count = unsafe { self.read_raw(elem.as_mut_ptr(), 1)? };
108        debug_assert_eq!(valid_count, 1);
109
110        // SAFETY: if the previous call succeeded, the kernel has initialized this value.
111        Ok(unsafe { elem.assume_init() })
112    }
113
114    /// Attempts to read some number of elements out of the fifo. On success, returns a slice of
115    /// initialized elements.
116    ///
117    /// Wraps
118    /// [zx_fifo_read](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_read.md).
119    pub fn read_uninit(&self, bytes: &mut [MaybeUninit<R>]) -> Result<&mut [R], Status> {
120        // SAFETY: the slice is valid to write to for its entire length, and this call will not
121        // read from the bytes
122        let valid_count = unsafe { self.read_raw(bytes.as_mut_ptr().cast::<R>(), bytes.len())? };
123        let (valid, _uninit) = bytes.split_at_mut(valid_count);
124
125        // SAFETY: the kernel initialized all bytes, strip out MaybeUninit
126        unsafe { Ok(std::slice::from_raw_parts_mut(valid.as_mut_ptr().cast::<R>(), valid.len())) }
127    }
128
129    /// Attempts to read some number of elements out of the fifo. On success, returns the number of
130    /// elements actually read.
131    ///
132    /// Wraps
133    /// [zx_fifo_read](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_read.md).
134    ///
135    /// # Safety
136    ///
137    /// The caller is responsible for ensuring `bytes` points to valid (albeit
138    /// not necessarily initialized) memory at least `len` bytes long.
139    pub unsafe fn read_raw(&self, buf: *mut R, count: usize) -> Result<usize, Status> {
140        let mut actual_count = 0;
141        // SAFETY: this call's invariants must be upheld by our caller.
142        let status = unsafe {
143            sys::zx_fifo_read(
144                self.raw_handle(),
145                std::mem::size_of::<R>(),
146                buf.cast::<u8>(),
147                count,
148                &mut actual_count,
149            )
150        };
151        ok(status).map(|()| actual_count)
152    }
153}
154
155impl Fifo<UnspecifiedFifoElement> {
156    /// Give a `Fifo` specific read/write types. The size of `R2` and `W2` must match
157    /// the element size the underlying handle was created with for reads and writes to succeed.
158    pub fn cast<R2, W2>(self) -> Fifo<R2, W2> {
159        Fifo::<R2, W2>::from(self.0)
160    }
161}
162
163impl<R, W> Fifo<R, W> {
164    /// Convert a fifo from having a specific element type to a fifo without any element type that
165    /// will not support reads or writes.
166    pub fn downcast(self) -> Fifo {
167        Fifo::from(self.0)
168    }
169}
170
171impl<R, W> AsHandleRef for Fifo<R, W> {
172    fn as_handle_ref(&self) -> HandleRef<'_> {
173        self.0.as_handle_ref()
174    }
175}
176
177impl<R, W> From<Handle> for Fifo<R, W> {
178    fn from(handle: Handle) -> Self {
179        Self(handle, std::marker::PhantomData)
180    }
181}
182
183impl<R, W> From<Fifo<R, W>> for Handle {
184    fn from(x: Fifo<R, W>) -> Handle {
185        x.0
186    }
187}
188
189impl<R: FromBytes + IntoBytes, W: FromBytes + IntoBytes> From<Fifo> for Fifo<R, W> {
190    fn from(untyped: Fifo) -> Self {
191        untyped.cast()
192    }
193}
194
195impl<R, W> HandleBased for Fifo<R, W> {}
196
197impl<R, W> std::fmt::Debug for Fifo<R, W> {
198    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
199        let read_name = std::any::type_name::<R>();
200        let (_, short_read_name) = read_name.rsplit_once("::").unwrap();
201        let write_name = std::any::type_name::<W>();
202        let (_, short_write_name) = write_name.rsplit_once("::").unwrap();
203        f.debug_tuple(&format!("Fifo<{short_read_name}, {short_write_name}>"))
204            .field(&self.0)
205            .finish()
206    }
207}
208
209impl<R, W> std::cmp::PartialEq for Fifo<R, W> {
210    fn eq(&self, other: &Self) -> bool {
211        self.0 == other.0
212    }
213}
214impl<R, W> std::cmp::Eq for Fifo<R, W> {}
215
216impl<R, W> std::cmp::PartialOrd for Fifo<R, W> {
217    fn partial_cmp(&self, other: &Self) -> Option<std::cmp::Ordering> {
218        self.0.partial_cmp(&other.0)
219    }
220}
221impl<R, W> std::cmp::Ord for Fifo<R, W> {
222    fn cmp(&self, other: &Self) -> std::cmp::Ordering {
223        self.0.cmp(&other.0)
224    }
225}
226
227impl<R, W> std::hash::Hash for Fifo<R, W> {
228    fn hash<H: std::hash::Hasher>(&self, state: &mut H) {
229        self.0.hash(state)
230    }
231}
232
233/// The default element for fifos, does not support reading or writing. Only used for IPC transfer.
234#[derive(Copy, Clone, Debug)]
235pub struct UnspecifiedFifoElement;
236
237#[cfg(test)]
238mod tests {
239    use super::*;
240
241    #[test]
242    fn fifo_basic() {
243        let (fifo1, fifo2) = Fifo::<[u8; 2]>::create(4).unwrap();
244
245        // Trying to write less than one element should fail.
246        assert_eq!(fifo1.write(&[]), Err(Status::OUT_OF_RANGE));
247
248        // Should write one element "he"
249        fifo1.write_one(b"he").unwrap();
250
251        // Should write three elements "ll" "o " "wo" and drop the rest as it is full.
252        assert_eq!(fifo1.write(&[*b"ll", *b"o ", *b"wo", *b"rl", *b"ds"]).unwrap(), 3);
253
254        // Now that the fifo is full any further attempts to write should fail.
255        assert_eq!(fifo1.write(&[*b"bl", *b"ah", *b"bl", *b"ah"]), Err(Status::SHOULD_WAIT));
256
257        assert_eq!(fifo2.read_one().unwrap(), *b"he");
258
259        // Read remaining 3 entries from the other end.
260        let mut read_vec = vec![[0; 2]; 8];
261        assert_eq!(fifo2.read(&mut read_vec).unwrap(), 3);
262        assert_eq!(read_vec, &[*b"ll", *b"o ", *b"wo", [0, 0], [0, 0], [0, 0], [0, 0], [0, 0]]);
263
264        // Reading again should fail as the fifo is empty.
265        assert_eq!(fifo2.read(&mut read_vec), Err(Status::SHOULD_WAIT));
266    }
267}