zx/fifo.rs
1// Copyright 2017 The Fuchsia Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5//! Type-safe bindings for Zircon fifo objects.
6
7use crate::{ok, sys, AsHandleRef, Handle, HandleBased, HandleRef, Status};
8use std::mem::MaybeUninit;
9use zerocopy::{FromBytes, IntoBytes};
10
11/// An object representing a Zircon fifo.
12///
13/// As essentially a subtype of `Handle`, it can be freely interconverted.
14///
15/// Encodes the element type in the type. Defaults to `()` for the entry type to allow for untyped
16/// IPC. Use `Fifo::cast()` to convert an IPC-transferred fifo to one of the specific type required
17/// that will support reads and writes.
18#[repr(transparent)]
19pub struct Fifo<R = UnspecifiedFifoElement, W = R>(Handle, std::marker::PhantomData<(R, W)>);
20
21impl<R: IntoBytes + FromBytes, W: IntoBytes + FromBytes> Fifo<R, W> {
22 /// Create a pair of fifos and return their endpoints. Writing to one endpoint enqueues an
23 /// element into the fifo from which the opposing endpoint reads.
24 ///
25 /// Wraps the
26 /// [zx_fifo_create](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_create.md)
27 /// syscall.
28 pub fn create(elem_count: usize) -> Result<(Self, Fifo<W, R>), Status> {
29 if std::mem::size_of::<R>() != std::mem::size_of::<W>() {
30 return Err(Status::INVALID_ARGS);
31 }
32 let mut out0 = 0;
33 let mut out1 = 0;
34 let options = 0;
35
36 // SAFETY: this is a basic FFI call, and the mutable references are valid pointers.
37 let status = unsafe {
38 sys::zx_fifo_create(elem_count, std::mem::size_of::<R>(), options, &mut out0, &mut out1)
39 };
40 ok(status)?;
41
42 // SAFETY: if the above call succeeded, these are valid handle numbers.
43 unsafe { Ok((Fifo::from(Handle::from_raw(out0)), Fifo::from(Handle::from_raw(out1)))) }
44 }
45
46 /// Attempts to write some number of elements into the fifo. On success, returns the number of
47 /// elements actually written.
48 ///
49 /// Wraps
50 /// [zx_fifo_write](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_write.md).
51 pub fn write(&self, buf: &[W]) -> Result<usize, Status> {
52 // SAFETY: this pointer is valid for the length of the slice
53 unsafe { self.write_raw(buf.as_ptr(), buf.len()) }
54 }
55
56 /// Attempts to write a single element into the fifo.
57 ///
58 /// Wraps
59 /// [zx_fifo_write](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_write.md).
60 pub fn write_one(&self, elem: &W) -> Result<(), Status> {
61 // SAFETY: this pointer is valid for a single element
62 unsafe { self.write_raw(elem, 1).map(|n| debug_assert_eq!(n, 1)) }
63 }
64
65 /// Attempts to write some number of elements into the fifo. On success, returns the number of
66 /// elements actually written.
67 ///
68 /// Wraps
69 /// [zx_fifo_write](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_write.md).
70 ///
71 /// # Safety
72 ///
73 /// The caller is responsible for ensuring `buf` is valid to write to for `count` elements.
74 pub unsafe fn write_raw(&self, buf: *const W, count: usize) -> Result<usize, Status> {
75 let mut actual_count = 0;
76 // SAFETY: safety requirements for this call are upheld by our caller.
77 let status = unsafe {
78 sys::zx_fifo_write(
79 self.raw_handle(),
80 std::mem::size_of::<W>(),
81 buf.cast::<u8>(),
82 count,
83 &mut actual_count,
84 )
85 };
86 ok(status).map(|()| actual_count)
87 }
88
89 /// Attempts to read some elements out of the fifo. On success, returns the number of elements
90 /// actually read.
91 ///
92 /// Wraps
93 /// [zx_fifo_read](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_read.md).
94 pub fn read(&self, buf: &mut [R]) -> Result<usize, Status> {
95 // SAFETY: the pointer is valid for the length of the slice
96 unsafe { self.read_raw(buf.as_mut_ptr(), buf.len()) }
97 }
98
99 /// Attempts to read a single element out of the fifo.
100 ///
101 /// Wraps
102 /// [zx_fifo_read](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_read.md).
103 pub fn read_one(&self) -> Result<R, Status> {
104 let mut elem = MaybeUninit::uninit();
105
106 // SAFETY: the reference is valid to write to, and this call will not read from the bytes.
107 let valid_count = unsafe { self.read_raw(elem.as_mut_ptr(), 1)? };
108 debug_assert_eq!(valid_count, 1);
109
110 // SAFETY: if the previous call succeeded, the kernel has initialized this value.
111 Ok(unsafe { elem.assume_init() })
112 }
113
114 /// Attempts to read some number of elements out of the fifo. On success, returns a slice of
115 /// initialized elements.
116 ///
117 /// Wraps
118 /// [zx_fifo_read](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_read.md).
119 pub fn read_uninit(&self, bytes: &mut [MaybeUninit<R>]) -> Result<&mut [R], Status> {
120 // SAFETY: the slice is valid to write to for its entire length, and this call will not
121 // read from the bytes
122 let valid_count = unsafe { self.read_raw(bytes.as_mut_ptr().cast::<R>(), bytes.len())? };
123 let (valid, _uninit) = bytes.split_at_mut(valid_count);
124
125 // SAFETY: the kernel initialized all bytes, strip out MaybeUninit
126 unsafe { Ok(std::slice::from_raw_parts_mut(valid.as_mut_ptr().cast::<R>(), valid.len())) }
127 }
128
129 /// Attempts to read some number of elements out of the fifo. On success, returns the number of
130 /// elements actually read.
131 ///
132 /// Wraps
133 /// [zx_fifo_read](https://fuchsia.dev/fuchsia-src/reference/syscalls/fifo_read.md).
134 ///
135 /// # Safety
136 ///
137 /// The caller is responsible for ensuring `bytes` points to valid (albeit
138 /// not necessarily initialized) memory at least `len` bytes long.
139 pub unsafe fn read_raw(&self, buf: *mut R, count: usize) -> Result<usize, Status> {
140 let mut actual_count = 0;
141 // SAFETY: this call's invariants must be upheld by our caller.
142 let status = unsafe {
143 sys::zx_fifo_read(
144 self.raw_handle(),
145 std::mem::size_of::<R>(),
146 buf.cast::<u8>(),
147 count,
148 &mut actual_count,
149 )
150 };
151 ok(status).map(|()| actual_count)
152 }
153}
154
155impl Fifo<UnspecifiedFifoElement> {
156 /// Give a `Fifo` specific read/write types. The size of `R2` and `W2` must match
157 /// the element size the underlying handle was created with for reads and writes to succeed.
158 pub fn cast<R2, W2>(self) -> Fifo<R2, W2> {
159 Fifo::<R2, W2>::from(self.0)
160 }
161}
162
163impl<R, W> Fifo<R, W> {
164 /// Convert a fifo from having a specific element type to a fifo without any element type that
165 /// will not support reads or writes.
166 pub fn downcast(self) -> Fifo {
167 Fifo::from(self.0)
168 }
169}
170
171impl<R, W> AsHandleRef for Fifo<R, W> {
172 fn as_handle_ref(&self) -> HandleRef<'_> {
173 self.0.as_handle_ref()
174 }
175}
176
177impl<R, W> From<Handle> for Fifo<R, W> {
178 fn from(handle: Handle) -> Self {
179 Self(handle, std::marker::PhantomData)
180 }
181}
182
183impl<R, W> From<Fifo<R, W>> for Handle {
184 fn from(x: Fifo<R, W>) -> Handle {
185 x.0
186 }
187}
188
189impl<R: FromBytes + IntoBytes, W: FromBytes + IntoBytes> From<Fifo> for Fifo<R, W> {
190 fn from(untyped: Fifo) -> Self {
191 untyped.cast()
192 }
193}
194
195impl<R, W> HandleBased for Fifo<R, W> {}
196
197impl<R, W> std::fmt::Debug for Fifo<R, W> {
198 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
199 let read_name = std::any::type_name::<R>();
200 let (_, short_read_name) = read_name.rsplit_once("::").unwrap();
201 let write_name = std::any::type_name::<W>();
202 let (_, short_write_name) = write_name.rsplit_once("::").unwrap();
203 f.debug_tuple(&format!("Fifo<{short_read_name}, {short_write_name}>"))
204 .field(&self.0)
205 .finish()
206 }
207}
208
209impl<R, W> std::cmp::PartialEq for Fifo<R, W> {
210 fn eq(&self, other: &Self) -> bool {
211 self.0 == other.0
212 }
213}
214impl<R, W> std::cmp::Eq for Fifo<R, W> {}
215
216impl<R, W> std::cmp::PartialOrd for Fifo<R, W> {
217 fn partial_cmp(&self, other: &Self) -> Option<std::cmp::Ordering> {
218 self.0.partial_cmp(&other.0)
219 }
220}
221impl<R, W> std::cmp::Ord for Fifo<R, W> {
222 fn cmp(&self, other: &Self) -> std::cmp::Ordering {
223 self.0.cmp(&other.0)
224 }
225}
226
227impl<R, W> std::hash::Hash for Fifo<R, W> {
228 fn hash<H: std::hash::Hasher>(&self, state: &mut H) {
229 self.0.hash(state)
230 }
231}
232
233/// The default element for fifos, does not support reading or writing. Only used for IPC transfer.
234#[derive(Copy, Clone, Debug)]
235pub struct UnspecifiedFifoElement;
236
237#[cfg(test)]
238mod tests {
239 use super::*;
240
241 #[test]
242 fn fifo_basic() {
243 let (fifo1, fifo2) = Fifo::<[u8; 2]>::create(4).unwrap();
244
245 // Trying to write less than one element should fail.
246 assert_eq!(fifo1.write(&[]), Err(Status::OUT_OF_RANGE));
247
248 // Should write one element "he"
249 fifo1.write_one(b"he").unwrap();
250
251 // Should write three elements "ll" "o " "wo" and drop the rest as it is full.
252 assert_eq!(fifo1.write(&[*b"ll", *b"o ", *b"wo", *b"rl", *b"ds"]).unwrap(), 3);
253
254 // Now that the fifo is full any further attempts to write should fail.
255 assert_eq!(fifo1.write(&[*b"bl", *b"ah", *b"bl", *b"ah"]), Err(Status::SHOULD_WAIT));
256
257 assert_eq!(fifo2.read_one().unwrap(), *b"he");
258
259 // Read remaining 3 entries from the other end.
260 let mut read_vec = vec![[0; 2]; 8];
261 assert_eq!(fifo2.read(&mut read_vec).unwrap(), 3);
262 assert_eq!(read_vec, &[*b"ll", *b"o ", *b"wo", [0, 0], [0, 0], [0, 0], [0, 0], [0, 0]]);
263
264 // Reading again should fail as the fifo is empty.
265 assert_eq!(fifo2.read(&mut read_vec), Err(Status::SHOULD_WAIT));
266 }
267}