MASSLESS LTD.

Interfacing with C and the Foreign Function Interface (FFI)

15 February 2025

Interfacing with C and the Foreign Function Interface (FFI)

Rust's Foreign Function Interface (FFI) enables you to call functions written in other languages, such as C. This capability is essential when you need to integrate with existing libraries or systems, or when performance-critical routines are already available in C. In this article, we'll focus on interfacing with C code, covering the basics of declaring external functions, handling unsafe code, and best practices for C FFI in Rust.


Declaring External C Functions

Rust provides the extern keyword to interface with C. When you declare an external function, you specify the C calling convention using extern "C". This informs Rust how to link and call the function.

Example: Calling a C Function

Suppose you want to call the standard C library function puts to print a string to the console. Here's how you can do it:

extern "C" {
    fn puts(s: *const i8) -> i32;
}

fn main() {
    // Convert a Rust string to a C-style null-terminated string
    let c_string = std::ffi::CString::new("Hello from C!").expect("CString::new failed");
    
    unsafe {
        // Call the C function `puts`
        puts(c_string.as_ptr());
    }
}

In this example:

  • We declare puts using extern "C".
  • A Rust string is converted to a C string using CString.
  • The call to puts is wrapped in an unsafe block because Rust cannot guarantee the safety of external code.

Handling Unsafe Code

Interfacing with C code involves unsafe blocks, as the Rust compiler cannot verify that the external code upholds Rust's safety guarantees. Always limit the scope of unsafe and validate all inputs when interacting with C functions.

Best Practices for Unsafe FFI Calls

  • Minimise Unsafe Blocks: Encapsulate unsafe operations in well-defined, small functions.
  • Input Validation: Ensure that any pointers or data passed to C functions are valid and correctly formatted.
  • Document Assumptions: Clearly document why the unsafe code is sound and under what assumptions it operates.

Using Bindgen for Automatic Bindings

When dealing with large C libraries, manually writing FFI declarations can be tedious and error-prone. Bindgen is a tool that automatically generates Rust bindings for C libraries.

Example: Generating Bindings

  1. Install Bindgen:
cargo install bindgen
  1. Generate Bindings:

Suppose you have a C header file library.h. Run bindgen to generate the corresponding Rust bindings:

bindgen library.h -o src/bindings.rs
  1. Use the Bindings:

Include the generated bindings in your Rust project:

// In src/main.rs or another module
mod bindings {
    #![allow(non_camel_case_types)]
    #![allow(non_upper_case_globals)]
    #![allow(non_snake_case)]
    include!(concat!(env!("CARGO_MANIFEST_DIR"), "/src/bindings.rs"));
}

fn main() {
    unsafe {
        // Now you can call functions from the C library via the bindings module
        bindings::c_function();
    }
}

Bindgen significantly simplifies the process of integrating with complex C libraries by automating the generation of Rust FFI bindings.


Conclusion

Interfacing with C via Rust's FFI is a powerful feature that allows you to leverage existing C libraries and performance-critical code. While using FFI involves unsafe blocks and careful management of data, following best practices ensures that your integration is robust and maintainable. Whether you're calling a simple C function or integrating a large C library using Bindgen, Rust's FFI capabilities provide a flexible bridge between the two languages.

Happy coding, and enjoy exploring the interoperability between Rust and C!

Rust for beginner's guide overview