Crates.io | neocortex |
lib.rs | neocortex |
version | 3.0.3 |
source | src |
created_at | 2024-04-01 16:11:19.112588 |
updated_at | 2024-05-29 12:28:56.131753 |
description | Shared memory crate designed for simplicity, safety, and extensibility |
homepage | |
repository | https://github.com/jlodenius/neocortex |
max_upload_size | |
id | 1192709 |
size | 24,615 |
Shared memory crate designed for simplicity, safety, and extensibility. With minimal dependencies, this crate wraps unsafe shared memory operations from libc
in a user-friendly API.
Install using the (currently) only built-in lock implementation. See examples below for more instructions.
cargo add neocortex --features semaphore
libc
is available in their system's standard library.libc
syscalls are inherently unsafe, no guarantees can be made that all allocated resources are properly cleaned up on a failure. This crate provides two error variants, CleanSystem
and DirtySystem
to indicate whether or not the error is leaving any dangling resources. All system errors also provides additional error information from the operating system on top of our custom error messages.DirtySystem
errors that are not properly handled (currently only in some Drop
implementations) will emit a tracing::error!
event.Simple API: Offers an easy-to-use interface for shared memory operations, abstracting libc
complexities.
Clear Error Handling: Distinguishes between Clean
and Dirty
system errors.
Built-in Synchronization: Includes a semaphore-based lock for safe shared memory access. (requires crate feature "semaphore").
Extendable: Flexibility to implement custom synchronization logic through the CortexSync
trait.
Simple example using the built-in semaphore lock:
use neocortex::{Cortex, CortexBuilder, Semaphore};
// Initialize a segment of shared memory with the value 42.0
let key = 123;
let cortex = CortexBuilder::new(42.0)
.key(key)
.with_default_lock::<Semaphore>()
.unwrap();
// Attaching to an existing segment of shared memory requires explicit type annotations
let attached: Cortex<f64, Semaphore> = Cortex::attach(key).unwrap();
assert_eq!(cortex.read().unwrap(), attached.read().unwrap());
// Write to shared memory
let new_val = 12.34;
cortex.write(new_val).unwrap();
assert_eq!(cortex.read().unwrap(), new_val);
The semaphore
module comes with some pre-defined permissions, these permissions dictates which OS users can interact with the semaphore. Using with_default_lock
defaults to OwnerOnly
which is the most restrictive mode. Check out SemaphorePermission
for other modes, or use the Custom
enum-variant to set your own permissions.
use neocortex::{CortexBuilder, Semaphore, SemaphoreSettings, SemaphorePermission};
let settings = SemaphoreSettings {
mode: SemaphorePermission::OwnerAndGroup,
};
let cortex = CortexBuilder::new(42.0)
.key(123)
.with_lock::<Semaphore>(&settings)
.unwrap();
To generate a random key, instead of passing .key(some_key)
to the builder, use .random_key()
. This will attempt to randomize a key and retry up to 20 times if the key already exists.
Call .force_ownership()
on the builder after specifying a key (does not work with random key). This will either create a new segment or attach to an existing one if the key already exists. No matter what, this ensures that the shared memory is cleaned up when the instance is dropped by setting ownership to true. Use this with caution as it might drop memory that is being used by other parts of your application if used incorrectly.