diff options
Diffstat (limited to 'www-client/firefox/files/makotokato-riscv64-support-and-zenithal-backported.patch')
-rw-r--r-- | www-client/firefox/files/makotokato-riscv64-support-and-zenithal-backported.patch | 47126 |
1 files changed, 0 insertions, 47126 deletions
diff --git a/www-client/firefox/files/makotokato-riscv64-support-and-zenithal-backported.patch b/www-client/firefox/files/makotokato-riscv64-support-and-zenithal-backported.patch deleted file mode 100644 index 39ebd6a..0000000 --- a/www-client/firefox/files/makotokato-riscv64-support-and-zenithal-backported.patch +++ /dev/null @@ -1,47126 +0,0 @@ -From: Zenithal <i@zenithal.me> - -Some changes would be rejected/ignored when patching firefox 92 src, -so I commented out some blocks, see these #-leading block below - -From be9cbd86b4c121dbdb626f8c373fd809f25bc23e Mon Sep 17 00:00:00 2001 -From: Makoto Kato <m_kato@ga2.so-net.ne.jp> -Date: Sun, 13 Jun 2021 04:06:39 +0000 -Subject: [PATCH] Update authenticator-rs - ---- - .cargo/config.in | 5 + - Cargo.lock | 3 +- - .../rust/authenticator/.cargo-checksum.json | 2 +- - third_party/rust/authenticator/.clippy.toml | 2 + - third_party/rust/authenticator/.flake8 | 4 + - .../authenticator/.pre-commit-config.yaml | 42 + - third_party/rust/authenticator/.travis.yml | 42 + - third_party/rust/authenticator/Cargo.lock | 1603 ----------------- - third_party/rust/authenticator/Cargo.toml | 131 +- - third_party/rust/authenticator/build.rs | 2 + - .../authenticator/src/linux/hidwrapper.rs | 3 + - .../authenticator/src/linux/ioctl_riscv64.rs | 5 + - toolkit/library/rust/shared/Cargo.toml | 2 +- - 13 files changed, 154 insertions(+), 1692 deletions(-) - create mode 100644 third_party/rust/authenticator/.clippy.toml - create mode 100644 third_party/rust/authenticator/.flake8 - create mode 100644 third_party/rust/authenticator/.pre-commit-config.yaml - create mode 100644 third_party/rust/authenticator/.travis.yml - delete mode 100644 third_party/rust/authenticator/Cargo.lock - create mode 100644 third_party/rust/authenticator/src/linux/ioctl_riscv64.rs - -diff --unified --recursive --text a/.cargo/config.in b/.cargo/config.in ---- a/.cargo/config.in 2022-03-10 14:19:43.020478706 +0800 -+++ b/.cargo/config.in 2022-03-10 14:21:21.873044017 +0800 -@@ -22,11 +22,6 @@ - replace-with = "vendored-sources" - rev = "3bfc47d9a571d0842676043ba60716318e946c06" - --[source."https://github.com/mozilla/midir.git"] --git = "https://github.com/mozilla/midir.git" --replace-with = "vendored-sources" --rev = "4c11f0ffb5d6a10de4aff40a7b81218b33b94e6f" -- - [source."https://github.com/mozilla/l10nregistry-rs.git"] - git = "https://github.com/mozilla/l10nregistry-rs.git" - replace-with = "vendored-sources" -@@ -57,6 +52,16 @@ - replace-with = "vendored-sources" - rev = "a1a6ba41f0c610ebe751639f25f037474ca52941" - -+[source."https://github.com/makotokato/midir.git"] -+git = "https://github.com/makotokato/midir.git" -+replace-with = "vendored-sources" -+rev = "6140b2825dd4dc2b40e49e154ca7596e7b9a131a" -+ -+[source."https://github.com/makotokato/authenticator-rs"] -+git = "https://github.com/makotokato/authenticator-rs" -+replace-with = "vendored-sources" -+rev = "eed8919d50559f4959e2d7d2af7b4d48869b5366" -+ - [source."https://github.com/kinetiknz/mio-named-pipes"] - git = "https://github.com/kinetiknz/mio-named-pipes" - replace-with = "vendored-sources" -diff --git a/Cargo.lock b/Cargo.lock -index 7e17939fad48b..8519d3d0e95a6 100644 ---- a/Cargo.lock -+++ b/Cargo.lock -@@ -316,8 +316,7 @@ dependencies = [ - [[package]] - name = "authenticator" - version = "0.3.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --checksum = "08cee7a0952628fde958e149507c2bb321ab4fccfafd225da0b20adc956ef88a" -+source = "git+https://github.com/makotokato/authenticator-rs?rev=eed8919d50559f4959e2d7d2af7b4d48869b5366#eed8919d50559f4959e2d7d2af7b4d48869b5366" - dependencies = [ - "bitflags", - "core-foundation", -diff --git a/third_party/rust/authenticator/.cargo-checksum.json b/third_party/rust/authenticator/.cargo-checksum.json -index ce451ad09df4f..9791345c9de54 100644 ---- a/third_party/rust/authenticator/.cargo-checksum.json -+++ b/third_party/rust/authenticator/.cargo-checksum.json -@@ -1 +1 @@ --{"files":{"Cargo.lock":"abaed4932db2206e5fdb7cb73a8c100f6c91fc84a8f33e8763677040ae8ea9bf","Cargo.toml":"9b56d5495021e7cd8ab7e019cceda45e906a2a3629a68e9019c6e5cb682dbc43","Cross.toml":"8d132da818d48492aa9f4b78a348f0df3adfae45d988d42ebd6be8a5adadb6c3","LICENSE":"e866c8f5864d4cacfe403820e722e9dc03fe3c7565efa5e4dad9051d827bb92a","README.md":"c87d9c7cc44f1dd4ef861a3a9f8cd2eb68aedd3814768871f5fb63c2070806cd","build.rs":"bc308b771ae9741d775370e3efe45e9cca166fd1d0335f4214b00497042ccc55","examples/main.rs":"d899646fa396776d0bb66efb86099ffb195566ecdb6fc4c1765ae3d54d696a8d","rustfmt.toml":"ceb6615363d6fff16426eb56f5727f98a7f7ed459ba9af735b1d8b672e2c3b9b","src/authenticatorservice.rs":"9fc5bcdd1e4f32e58ae920f96f40619a870b0a1b8d05db650803b2402a37fbf9","src/capi.rs":"1d3145ce81293bec697b0d385357fb1b0b495b0c356e2da5e6f15d028d328c70","src/consts.rs":"3dbcdfced6241822062e1aa2e6c8628af5f539ea18ee41edab51a3d33ebb77c6","src/errors.rs":"de89e57435ed1f9ff10f1f2d997a5b29d61cb215551e0ab40861a08ca52d1447","src/freebsd/device.rs":"595df4b3f66b90dd73f8df67e1a2ba9a20c0b5fd893afbadbec564aa34f89981","src/freebsd/mod.rs":"42dcb57fbeb00140003a8ad39acac9b547062b8f281a3fa5deb5f92a6169dde6","src/freebsd/monitor.rs":"c10b154632fbedc3dca27197f7fc890c3d50ac1744b927e9f1e44a9e8a13506e","src/freebsd/transaction.rs":"bfb92dcf2edeb5d620a019907fff1025eb36ef322055e78649a3055b074fa851","src/freebsd/uhid.rs":"84f564d337637c1cd107ccc536b8fce2230628e144e4031e8db4d7163c9c0cb3","src/hidproto.rs":"362fc8e24b94ba431aad5ee0002f5a3364badd937c706c0ae119a5a7a2abc7c2","src/lib.rs":"12f62285a3d33347f95236b71341462a76ea1ded67651fc96ba25d7bd1dd8298","src/linux/device.rs":"d27c5f877cf96b97668579ac5db0f2685f7c969e7a5d0ddc68043eb16bfcddb8","src/linux/hidraw.rs":"ed55caa40fd518d67bb67d5af08f9adcab34f89e0ca591142d45b87f172926dd","src/linux/hidwrapper.h":"72785db3a9b27ea72b6cf13a958fee032af54304522d002f56322473978a20f9","src/linux/hidwrapper.rs":"4be65676cf3220929700bf4906938dcbd1538ba53d40c60b08f9ba8890c910f6","src/linux/ioctl_aarch64le.rs":"2d8b265cd39a9f46816f83d5a5df0701c13eb842bc609325bad42ce50add3bf0","src/linux/ioctl_armle.rs":"2d8b265cd39a9f46816f83d5a5df0701c13eb842bc609325bad42ce50add3bf0","src/linux/ioctl_mips64le.rs":"fbda309934ad8bda689cd4fb5c0ca696fe26dedb493fe9d5a5322c3047d474fd","src/linux/ioctl_mipsbe.rs":"fbda309934ad8bda689cd4fb5c0ca696fe26dedb493fe9d5a5322c3047d474fd","src/linux/ioctl_mipsle.rs":"fbda309934ad8bda689cd4fb5c0ca696fe26dedb493fe9d5a5322c3047d474fd","src/linux/ioctl_powerpc64be.rs":"fbda309934ad8bda689cd4fb5c0ca696fe26dedb493fe9d5a5322c3047d474fd","src/linux/ioctl_powerpc64le.rs":"fbda309934ad8bda689cd4fb5c0ca696fe26dedb493fe9d5a5322c3047d474fd","src/linux/ioctl_powerpcbe.rs":"fbda309934ad8bda689cd4fb5c0ca696fe26dedb493fe9d5a5322c3047d474fd","src/linux/ioctl_s390xbe.rs":"2d8b265cd39a9f46816f83d5a5df0701c13eb842bc609325bad42ce50add3bf0","src/linux/ioctl_x86.rs":"2d8b265cd39a9f46816f83d5a5df0701c13eb842bc609325bad42ce50add3bf0","src/linux/ioctl_x86_64.rs":"2d8b265cd39a9f46816f83d5a5df0701c13eb842bc609325bad42ce50add3bf0","src/linux/mod.rs":"446e435126d2a58f167f648dd95cba28e8ac9c17f1f799e1eaeab80ea800fc57","src/linux/monitor.rs":"9ef4e22fdcf005dd5201b42595d958ea462998c75dbfc68c8a403e7be64328e4","src/linux/transaction.rs":"bfb92dcf2edeb5d620a019907fff1025eb36ef322055e78649a3055b074fa851","src/macos/device.rs":"cc97b773254a89526164987e4b8e4181910fc3decb32acf51ca86c596ad0147b","src/macos/iokit.rs":"7dc4e7bbf8e42e2fcde0cee8e48d14d6234a5a910bd5d3c4e966d8ba6b73992f","src/macos/mod.rs":"333e561554fc901d4f6092f6e4c85823e2b0c4ff31c9188d0e6d542b71a0a07c","src/macos/monitor.rs":"d059861b4739c9272fa305b6dd91ebeb08530bd0e70a013dd999565d6f06fb30","src/macos/transaction.rs":"935b4bc79b0e50a984604a1ada96a7ef723cc283b7d33ca07f3150b1752b99f7","src/manager.rs":"5a4cdc26b9fde20e1a3dc2389f15d38d9153109bfee5119c092fbfdbd19bad8d","src/netbsd/device.rs":"3a99a989a7a8411ddb9893c371644076662a3b488d40b436601c27fd92fdf159","src/netbsd/fd.rs":"260f1a8ae04896c0eb35ab0914e11ca9291e7317a086c94328aa219c0e1fc1d2","src/netbsd/mod.rs":"b1c52aa29537330cebe67427062d6c94871cab2a9b0c04b2305d686f07e88fd5","src/netbsd/monitor.rs":"dfd68e026c52271b68a3a9263837c793127e9d54ed19b748ef6d13ab4c44e09a","src/netbsd/transaction.rs":"9334a832a57e717a981c13c364ed4ee80ce9798460fc6c8954723d2fcf20585a","src/netbsd/uhid.rs":"154a4587767f151e3f846cc0b79f615d5137de67afed84f19176f27ac9097908","src/openbsd/device.rs":"ae1c8de90bb515a12d571372a30322fadb5122bc69ab71caf154452caa8a644f","src/openbsd/mod.rs":"514274d414042ff84b3667a41a736e78581e22fda87ccc97c2bc05617e381a30","src/openbsd/monitor.rs":"5eb071dd3719ea305eac21ec20596463f63790f8cd1f908a59e3f9cb0b71b5ad","src/openbsd/transaction.rs":"2380c9430f4c95a1fefaaab729d8ece0d149674708d705a71dd5d2513d9e1a4c","src/statecallback.rs":"6b16f97176db1ae3fc3851fe8394e4ffc324bc6fe59313845ac3a88132fd52f1","src/statemachine.rs":"27e2655411ebc1077c200f0aa2ba429ca656fc7dd6f90e08b51492b59ec72e61","src/stub/device.rs":"5e378147e113e20160a45d395b717bd3deecb327247c24b6735035f7d50861b7","src/stub/mod.rs":"6a7fec504a52d403b0241b18cd8b95088a31807571f4c0a67e4055afc74f4453","src/stub/transaction.rs":"4a2ccb2d72070a8bc61442254e063278c68212d5565ba5bfe4d47cacebf5bd1c","src/u2fhid-capi.h":"10f2658df774bb7f7f197a9f217b9e20d67b232b60a554e8ee3c3f71480ea1f6","src/u2fprotocol.rs":"72120773a948ffd667b5976c26ae27a4327769d97b0eef7a3b1e6b2b4bbb46a9","src/u2ftypes.rs":"a02d2c29790c5edfec9af320b1d4bcb93be0bbf02b881fa5aa403cfb687a25ae","src/util.rs":"d2042b2db4864f2b1192606c3251709361de7fb7521e1519190ef26a77de8e64","src/virtualdevices/mod.rs":"2c7df7691d5c150757304241351612aed4260d65b70ab0f483edbc1a5cfb5674","src/virtualdevices/software_u2f.rs":"1b86b94c6eadec6a22dffdd2b003c5324247c6412eeddb28a6094feb1c523f8e","src/virtualdevices/webdriver/mod.rs":"4a36e6dfa9f45f941d863b4039bfbcfa8eaca660bd6ed78aeb1a2962db64be5a","src/virtualdevices/webdriver/testtoken.rs":"7146e02f1a5dad2c8827dd11c12ee408c0e42a0706ac65f139998feffd42570f","src/virtualdevices/webdriver/virtualmanager.rs":"a55a28995c81b5affb0a74207b6dd556d272086a554676df2e675fe991d730a9","src/virtualdevices/webdriver/web_api.rs":"27206ee09c83fe25b34cad62174e42383defd8c8a5e917d30691412aacdae08f","src/windows/device.rs":"bc3f9587677c185a624c0aae7537baf9f780484ab8337929db994800b9064ba9","src/windows/mod.rs":"218e7f2fe91ecb390c12bba5a5ffdad2c1f0b22861c937f4d386262e5b3dd617","src/windows/monitor.rs":"3804dc67de46a1a6b7925c83e0df95d94ddfa1aa53a88fc845f4ff26aede57f8","src/windows/transaction.rs":"ee639f28b2dcdb7e00c922d8762fe6aa33def8c7aaeb46ec93e3a772407a9d86","src/windows/winapi.rs":"de92afb17df26216161138f18eb3b9162f3fb2cdeb74aa78173afe804ba02e00","testing/cross/powerpc64le-unknown-linux-gnu.Dockerfile":"d7463ff4376e3e0ca3fed879fab4aa975c4c0a3e7924c5b88aef9381a5d013de","testing/cross/x86_64-unknown-linux-gnu.Dockerfile":"11c79c04b07a171b0c9b63ef75fa75f33263ce76e3c1eda0879a3e723ebd0c24","testing/run_cross.sh":"cc2a7e0359f210eba2e7121f81eb8ab0125cea6e0d0f2698177b0fe2ad0c33d8","webdriver-tools/requirements.txt":"8236aa3dedad886f213c9b778fec80b037212d30e640b458984110211d546005","webdriver-tools/webdriver-driver.py":"82327c26ba271d1689acc87b612ab8436cb5475f0a3c0dba7baa06e7f6f5e19c"},"package":"08cee7a0952628fde958e149507c2bb321ab4fccfafd225da0b20adc956ef88a"} -\ No newline at end of file -+{"files":{".clippy.toml":"86011295a6e2cea043b8002238f9c96b39f17aa8241aa079f44bb6e71eb62421",".flake8":"04f55f4a3c02b50dfa568ce4f7c6a47a9374b6483256811f8be702d1382576cd",".pre-commit-config.yaml":"b7920a17d5a378c7702f9c39bf5156bb8c4ea15d8691217e0a5a8e8f571b4cf7",".travis.yml":"883be088379477e7fa6f3d06b1c8d59dc41da61b6c15d2675c62113341e7b2d5","Cargo.toml":"e7334212220a6d8ca01996888275cc0d11d098e36db1bf4c5b7429051897bf3f","Cross.toml":"8d132da818d48492aa9f4b78a348f0df3adfae45d988d42ebd6be8a5adadb6c3","LICENSE":"e866c8f5864d4cacfe403820e722e9dc03fe3c7565efa5e4dad9051d827bb92a","README.md":"c87d9c7cc44f1dd4ef861a3a9f8cd2eb68aedd3814768871f5fb63c2070806cd","build.rs":"a459ee1ace052f9692817b15c702cb6e5a6dac7c7dfe74fa075662dbcf808dbe","examples/main.rs":"d899646fa396776d0bb66efb86099ffb195566ecdb6fc4c1765ae3d54d696a8d","rustfmt.toml":"ceb6615363d6fff16426eb56f5727f98a7f7ed459ba9af735b1d8b672e2c3b9b","src/authenticatorservice.rs":"9fc5bcdd1e4f32e58ae920f96f40619a870b0a1b8d05db650803b2402a37fbf9","src/capi.rs":"1d3145ce81293bec697b0d385357fb1b0b495b0c356e2da5e6f15d028d328c70","src/consts.rs":"3dbcdfced6241822062e1aa2e6c8628af5f539ea18ee41edab51a3d33ebb77c6","src/errors.rs":"de89e57435ed1f9ff10f1f2d997a5b29d61cb215551e0ab40861a08ca52d1447","src/freebsd/device.rs":"595df4b3f66b90dd73f8df67e1a2ba9a20c0b5fd893afbadbec564aa34f89981","src/freebsd/mod.rs":"42dcb57fbeb00140003a8ad39acac9b547062b8f281a3fa5deb5f92a6169dde6","src/freebsd/monitor.rs":"c10b154632fbedc3dca27197f7fc890c3d50ac1744b927e9f1e44a9e8a13506e","src/freebsd/transaction.rs":"bfb92dcf2edeb5d620a019907fff1025eb36ef322055e78649a3055b074fa851","src/freebsd/uhid.rs":"84f564d337637c1cd107ccc536b8fce2230628e144e4031e8db4d7163c9c0cb3","src/hidproto.rs":"362fc8e24b94ba431aad5ee0002f5a3364badd937c706c0ae119a5a7a2abc7c2","src/lib.rs":"12f62285a3d33347f95236b71341462a76ea1ded67651fc96ba25d7bd1dd8298","src/linux/device.rs":"d27c5f877cf96b97668579ac5db0f2685f7c969e7a5d0ddc68043eb16bfcddb8","src/linux/hidraw.rs":"ed55caa40fd518d67bb67d5af08f9adcab34f89e0ca591142d45b87f172926dd","src/linux/hidwrapper.h":"72785db3a9b27ea72b6cf13a958fee032af54304522d002f56322473978a20f9","src/linux/hidwrapper.rs":"753c7459dbb73befdd186b6269ac33f7a4537b4c935928f50f2b2131756e787d","src/linux/ioctl_aarch64le.rs":"2d8b265cd39a9f46816f83d5a5df0701c13eb842bc609325bad42ce50add3bf0","src/linux/ioctl_armle.rs":"2d8b265cd39a9f46816f83d5a5df0701c13eb842bc609325bad42ce50add3bf0","src/linux/ioctl_mips64le.rs":"fbda309934ad8bda689cd4fb5c0ca696fe26dedb493fe9d5a5322c3047d474fd","src/linux/ioctl_mipsbe.rs":"fbda309934ad8bda689cd4fb5c0ca696fe26dedb493fe9d5a5322c3047d474fd","src/linux/ioctl_mipsle.rs":"fbda309934ad8bda689cd4fb5c0ca696fe26dedb493fe9d5a5322c3047d474fd","src/linux/ioctl_powerpc64be.rs":"fbda309934ad8bda689cd4fb5c0ca696fe26dedb493fe9d5a5322c3047d474fd","src/linux/ioctl_powerpc64le.rs":"fbda309934ad8bda689cd4fb5c0ca696fe26dedb493fe9d5a5322c3047d474fd","src/linux/ioctl_powerpcbe.rs":"fbda309934ad8bda689cd4fb5c0ca696fe26dedb493fe9d5a5322c3047d474fd","src/linux/ioctl_riscv64.rs":"2d8b265cd39a9f46816f83d5a5df0701c13eb842bc609325bad42ce50add3bf0","src/linux/ioctl_s390xbe.rs":"2d8b265cd39a9f46816f83d5a5df0701c13eb842bc609325bad42ce50add3bf0","src/linux/ioctl_x86.rs":"2d8b265cd39a9f46816f83d5a5df0701c13eb842bc609325bad42ce50add3bf0","src/linux/ioctl_x86_64.rs":"2d8b265cd39a9f46816f83d5a5df0701c13eb842bc609325bad42ce50add3bf0","src/linux/mod.rs":"446e435126d2a58f167f648dd95cba28e8ac9c17f1f799e1eaeab80ea800fc57","src/linux/monitor.rs":"9ef4e22fdcf005dd5201b42595d958ea462998c75dbfc68c8a403e7be64328e4","src/linux/transaction.rs":"bfb92dcf2edeb5d620a019907fff1025eb36ef322055e78649a3055b074fa851","src/macos/device.rs":"cc97b773254a89526164987e4b8e4181910fc3decb32acf51ca86c596ad0147b","src/macos/iokit.rs":"7dc4e7bbf8e42e2fcde0cee8e48d14d6234a5a910bd5d3c4e966d8ba6b73992f","src/macos/mod.rs":"333e561554fc901d4f6092f6e4c85823e2b0c4ff31c9188d0e6d542b71a0a07c","src/macos/monitor.rs":"d059861b4739c9272fa305b6dd91ebeb08530bd0e70a013dd999565d6f06fb30","src/macos/transaction.rs":"935b4bc79b0e50a984604a1ada96a7ef723cc283b7d33ca07f3150b1752b99f7","src/manager.rs":"5a4cdc26b9fde20e1a3dc2389f15d38d9153109bfee5119c092fbfdbd19bad8d","src/netbsd/device.rs":"3a99a989a7a8411ddb9893c371644076662a3b488d40b436601c27fd92fdf159","src/netbsd/fd.rs":"260f1a8ae04896c0eb35ab0914e11ca9291e7317a086c94328aa219c0e1fc1d2","src/netbsd/mod.rs":"b1c52aa29537330cebe67427062d6c94871cab2a9b0c04b2305d686f07e88fd5","src/netbsd/monitor.rs":"dfd68e026c52271b68a3a9263837c793127e9d54ed19b748ef6d13ab4c44e09a","src/netbsd/transaction.rs":"9334a832a57e717a981c13c364ed4ee80ce9798460fc6c8954723d2fcf20585a","src/netbsd/uhid.rs":"154a4587767f151e3f846cc0b79f615d5137de67afed84f19176f27ac9097908","src/openbsd/device.rs":"ae1c8de90bb515a12d571372a30322fadb5122bc69ab71caf154452caa8a644f","src/openbsd/mod.rs":"514274d414042ff84b3667a41a736e78581e22fda87ccc97c2bc05617e381a30","src/openbsd/monitor.rs":"5eb071dd3719ea305eac21ec20596463f63790f8cd1f908a59e3f9cb0b71b5ad","src/openbsd/transaction.rs":"2380c9430f4c95a1fefaaab729d8ece0d149674708d705a71dd5d2513d9e1a4c","src/statecallback.rs":"6b16f97176db1ae3fc3851fe8394e4ffc324bc6fe59313845ac3a88132fd52f1","src/statemachine.rs":"27e2655411ebc1077c200f0aa2ba429ca656fc7dd6f90e08b51492b59ec72e61","src/stub/device.rs":"5e378147e113e20160a45d395b717bd3deecb327247c24b6735035f7d50861b7","src/stub/mod.rs":"6a7fec504a52d403b0241b18cd8b95088a31807571f4c0a67e4055afc74f4453","src/stub/transaction.rs":"4a2ccb2d72070a8bc61442254e063278c68212d5565ba5bfe4d47cacebf5bd1c","src/u2fhid-capi.h":"10f2658df774bb7f7f197a9f217b9e20d67b232b60a554e8ee3c3f71480ea1f6","src/u2fprotocol.rs":"72120773a948ffd667b5976c26ae27a4327769d97b0eef7a3b1e6b2b4bbb46a9","src/u2ftypes.rs":"a02d2c29790c5edfec9af320b1d4bcb93be0bbf02b881fa5aa403cfb687a25ae","src/util.rs":"d2042b2db4864f2b1192606c3251709361de7fb7521e1519190ef26a77de8e64","src/virtualdevices/mod.rs":"2c7df7691d5c150757304241351612aed4260d65b70ab0f483edbc1a5cfb5674","src/virtualdevices/software_u2f.rs":"1b86b94c6eadec6a22dffdd2b003c5324247c6412eeddb28a6094feb1c523f8e","src/virtualdevices/webdriver/mod.rs":"4a36e6dfa9f45f941d863b4039bfbcfa8eaca660bd6ed78aeb1a2962db64be5a","src/virtualdevices/webdriver/testtoken.rs":"7146e02f1a5dad2c8827dd11c12ee408c0e42a0706ac65f139998feffd42570f","src/virtualdevices/webdriver/virtualmanager.rs":"a55a28995c81b5affb0a74207b6dd556d272086a554676df2e675fe991d730a9","src/virtualdevices/webdriver/web_api.rs":"27206ee09c83fe25b34cad62174e42383defd8c8a5e917d30691412aacdae08f","src/windows/device.rs":"bc3f9587677c185a624c0aae7537baf9f780484ab8337929db994800b9064ba9","src/windows/mod.rs":"218e7f2fe91ecb390c12bba5a5ffdad2c1f0b22861c937f4d386262e5b3dd617","src/windows/monitor.rs":"3804dc67de46a1a6b7925c83e0df95d94ddfa1aa53a88fc845f4ff26aede57f8","src/windows/transaction.rs":"ee639f28b2dcdb7e00c922d8762fe6aa33def8c7aaeb46ec93e3a772407a9d86","src/windows/winapi.rs":"de92afb17df26216161138f18eb3b9162f3fb2cdeb74aa78173afe804ba02e00","testing/cross/powerpc64le-unknown-linux-gnu.Dockerfile":"d7463ff4376e3e0ca3fed879fab4aa975c4c0a3e7924c5b88aef9381a5d013de","testing/cross/x86_64-unknown-linux-gnu.Dockerfile":"11c79c04b07a171b0c9b63ef75fa75f33263ce76e3c1eda0879a3e723ebd0c24","testing/run_cross.sh":"cc2a7e0359f210eba2e7121f81eb8ab0125cea6e0d0f2698177b0fe2ad0c33d8","webdriver-tools/requirements.txt":"8236aa3dedad886f213c9b778fec80b037212d30e640b458984110211d546005","webdriver-tools/webdriver-driver.py":"82327c26ba271d1689acc87b612ab8436cb5475f0a3c0dba7baa06e7f6f5e19c"},"package":null} -\ No newline at end of file -diff --git a/third_party/rust/authenticator/.clippy.toml b/third_party/rust/authenticator/.clippy.toml -new file mode 100644 -index 0000000000000..844d0757e91f4 ---- /dev/null -+++ b/third_party/rust/authenticator/.clippy.toml -@@ -0,0 +1,2 @@ -+type-complexity-threshold = 384 -+too-many-arguments-threshold = 8 -diff --git a/third_party/rust/authenticator/.flake8 b/third_party/rust/authenticator/.flake8 -new file mode 100644 -index 0000000000000..5a725c9b4ce65 ---- /dev/null -+++ b/third_party/rust/authenticator/.flake8 -@@ -0,0 +1,4 @@ -+[flake8] -+# See http://pep8.readthedocs.io/en/latest/intro.html#configuration -+ignore = E121, E123, E126, E129, E133, E203, E226, E241, E242, E704, W503, E402, E741 -+max-line-length = 99 -diff --git a/third_party/rust/authenticator/.pre-commit-config.yaml b/third_party/rust/authenticator/.pre-commit-config.yaml -new file mode 100644 -index 0000000000000..e0ceb8ea5473c ---- /dev/null -+++ b/third_party/rust/authenticator/.pre-commit-config.yaml -@@ -0,0 +1,42 @@ -+- repo: git://github.com/pre-commit/pre-commit-hooks -+ rev: HEAD -+ hooks: -+ - id: flake8 -+ - id: check-ast -+ - id: detect-private-key -+ - id: detect-aws-credentials -+ - id: check-merge-conflict -+ - id: end-of-file-fixer -+ - id: requirements-txt-fixer -+ - id: trailing-whitespace -+- repo: local -+ hooks: -+ - id: rustfmt -+ name: Check rustfmt -+ language: system -+ entry: cargo fmt -- --check -+ pass_filenames: false -+ files: '.rs$' -+- repo: local -+ hooks: -+ - id: tests -+ name: Run tests -+ language: system -+ entry: cargo test --all-targets --all-features -+ pass_filenames: false -+ files: '.rs$' -+- repo: local -+ hooks: -+ - id: clippy -+ name: Check clippy -+ language: system -+ entry: cargo clippy --all-targets -- -A renamed_and_removed_lints -A clippy::new-ret-no-self -D warnings -+ pass_filenames: false -+ files: '.rs$' -+- repo: local -+ hooks: -+ - id: black -+ name: Check black -+ language: system -+ entry: black -+ files: '.py$' -diff --git a/third_party/rust/authenticator/.travis.yml b/third_party/rust/authenticator/.travis.yml -new file mode 100644 -index 0000000000000..70ea5c5581af2 ---- /dev/null -+++ b/third_party/rust/authenticator/.travis.yml -@@ -0,0 +1,42 @@ -+os: -+ - linux -+ - windows -+ -+language: rust -+rust: -+ - stable -+ - nightly -+cache: cargo -+ -+jobs: -+ allow_failures: -+ - rust: nightly -+ -+addons: -+ apt: -+ packages: -+ - build-essential -+ - libudev-dev -+ -+install: -+ - rustup component add rustfmt -+ - rustup component add clippy -+ -+script: -+- | -+ if [ "$TRAVIS_RUST_VERSION" == "nightly" ] && [ "$TRAVIS_OS_NAME" == "linux" ] ; then -+ export ASAN_OPTIONS="detect_odr_violation=1:leak_check_at_exit=0:detect_leaks=0" -+ export RUSTFLAGS="-Z sanitizer=address" -+ fi -+- | -+ if [ "$TRAVIS_RUST_VERSION" == "stable" ] && [ "$TRAVIS_OS_NAME" == "linux" ] ; then -+ echo "Running rustfmt" -+ cargo fmt --all -- --check -+ echo "Running clippy" -+ cargo clippy --all-targets --all-features -- -A renamed_and_removed_lints -A clippy::new-ret-no-self -D warnings -+ -+ rustup install nightly -+ cargo install cargo-fuzz -+ cargo +nightly fuzz build -+ fi -+- cargo test --all-targets --all-features -diff --git a/third_party/rust/authenticator/Cargo.lock b/third_party/rust/authenticator/Cargo.lock -deleted file mode 100644 -index 9f284b468deaa..0000000000000 ---- a/third_party/rust/authenticator/Cargo.lock -+++ /dev/null -@@ -1,1603 +0,0 @@ --# This file is automatically @generated by Cargo. --# It is not intended for manual editing. --[[package]] --name = "aho-corasick" --version = "0.7.13" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "memchr 2.3.3 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "ansi_term" --version = "0.11.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "winapi 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "assert_matches" --version = "1.3.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "atty" --version = "0.2.14" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "hermit-abi 0.1.15 (registry+https://github.com/rust-lang/crates.io-index)", -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "winapi 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "authenticator" --version = "0.3.1" --dependencies = [ -- "assert_matches 1.3.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "base64 0.10.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "bindgen 0.51.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "bytes 0.5.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "core-foundation 0.9.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "devd-rs 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "env_logger 0.6.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "getopts 0.2.21 (registry+https://github.com/rust-lang/crates.io-index)", -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "libudev 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "log 0.4.11 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand 0.7.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "runloop 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "serde 1.0.116 (registry+https://github.com/rust-lang/crates.io-index)", -- "serde_json 1.0.57 (registry+https://github.com/rust-lang/crates.io-index)", -- "sha2 0.8.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "tokio 0.2.22 (registry+https://github.com/rust-lang/crates.io-index)", -- "warp 0.2.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "winapi 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "autocfg" --version = "0.1.7" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "autocfg" --version = "1.0.1" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "base64" --version = "0.10.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "byteorder 1.3.4 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "base64" --version = "0.12.3" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "bindgen" --version = "0.51.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "cexpr 0.3.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)", -- "clang-sys 0.28.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "clap 2.33.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "env_logger 0.6.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "log 0.4.11 (registry+https://github.com/rust-lang/crates.io-index)", -- "peeking_take_while 0.1.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "proc-macro2 1.0.19 (registry+https://github.com/rust-lang/crates.io-index)", -- "quote 1.0.7 (registry+https://github.com/rust-lang/crates.io-index)", -- "regex 1.3.9 (registry+https://github.com/rust-lang/crates.io-index)", -- "rustc-hash 1.1.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "shlex 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "which 3.1.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "bitflags" --version = "1.2.1" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "block-buffer" --version = "0.7.3" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "block-padding 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "byte-tools 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "byteorder 1.3.4 (registry+https://github.com/rust-lang/crates.io-index)", -- "generic-array 0.12.3 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "block-buffer" --version = "0.9.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "generic-array 0.14.4 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "block-padding" --version = "0.1.5" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "byte-tools 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "buf_redux" --version = "0.8.4" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "memchr 2.3.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "safemem 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "byte-tools" --version = "0.3.1" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "byteorder" --version = "1.3.4" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "bytes" --version = "0.5.6" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "serde 1.0.116 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "cc" --version = "1.0.58" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "cexpr" --version = "0.3.6" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "nom 4.2.3 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "cfg-if" --version = "0.1.10" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "clang-sys" --version = "0.28.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "glob 0.3.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "libloading 0.5.2 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "clap" --version = "2.33.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "ansi_term 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "atty 0.2.14 (registry+https://github.com/rust-lang/crates.io-index)", -- "bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "strsim 0.8.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "textwrap 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "unicode-width 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)", -- "vec_map 0.8.2 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "cloudabi" --version = "0.0.3" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "core-foundation" --version = "0.9.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "core-foundation-sys 0.8.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "core-foundation-sys" --version = "0.8.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "cpuid-bool" --version = "0.1.2" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "devd-rs" --version = "0.3.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "nom 5.1.2 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "digest" --version = "0.8.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "generic-array 0.12.3 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "digest" --version = "0.9.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "generic-array 0.14.4 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "dtoa" --version = "0.4.6" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "env_logger" --version = "0.6.2" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "atty 0.2.14 (registry+https://github.com/rust-lang/crates.io-index)", -- "humantime 1.3.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "log 0.4.11 (registry+https://github.com/rust-lang/crates.io-index)", -- "regex 1.3.9 (registry+https://github.com/rust-lang/crates.io-index)", -- "termcolor 1.1.0 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "fake-simd" --version = "0.1.2" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "fnv" --version = "1.0.7" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "fuchsia-cprng" --version = "0.1.1" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "fuchsia-zircon" --version = "0.3.3" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "fuchsia-zircon-sys 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "fuchsia-zircon-sys" --version = "0.3.3" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "futures" --version = "0.3.5" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "futures-channel 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-core 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-io 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-sink 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-task 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-util 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "futures-channel" --version = "0.3.5" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "futures-core 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-sink 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "futures-core" --version = "0.3.5" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "futures-io" --version = "0.3.5" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "futures-sink" --version = "0.3.5" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "futures-task" --version = "0.3.5" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "once_cell 1.4.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "futures-util" --version = "0.3.5" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "futures-core 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-sink 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-task 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "pin-project 0.4.23 (registry+https://github.com/rust-lang/crates.io-index)", -- "pin-utils 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "slab 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "generic-array" --version = "0.12.3" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "typenum 1.12.0 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "generic-array" --version = "0.14.4" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "typenum 1.12.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "version_check 0.9.2 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "getopts" --version = "0.2.21" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "unicode-width 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "getrandom" --version = "0.1.14" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)", -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "wasi 0.9.0+wasi-snapshot-preview1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "glob" --version = "0.3.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "h2" --version = "0.2.6" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "bytes 0.5.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "fnv 1.0.7 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-core 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-sink 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-util 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "http 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "indexmap 1.6.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "slab 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "tokio 0.2.22 (registry+https://github.com/rust-lang/crates.io-index)", -- "tokio-util 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "tracing 0.1.19 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "hashbrown" --version = "0.9.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "headers" --version = "0.3.2" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "base64 0.12.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "bytes 0.5.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "headers-core 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "http 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "mime 0.3.16 (registry+https://github.com/rust-lang/crates.io-index)", -- "sha-1 0.8.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "time 0.1.44 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "headers-core" --version = "0.2.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "http 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "hermit-abi" --version = "0.1.15" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "http" --version = "0.2.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "bytes 0.5.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "fnv 1.0.7 (registry+https://github.com/rust-lang/crates.io-index)", -- "itoa 0.4.6 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "http-body" --version = "0.3.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "bytes 0.5.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "http 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "httparse" --version = "1.3.4" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "humantime" --version = "1.3.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "quick-error 1.2.3 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "hyper" --version = "0.13.7" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "bytes 0.5.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-channel 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-core 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-util 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "h2 0.2.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "http 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "http-body 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "httparse 1.3.4 (registry+https://github.com/rust-lang/crates.io-index)", -- "itoa 0.4.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "pin-project 0.4.23 (registry+https://github.com/rust-lang/crates.io-index)", -- "socket2 0.3.15 (registry+https://github.com/rust-lang/crates.io-index)", -- "time 0.1.44 (registry+https://github.com/rust-lang/crates.io-index)", -- "tokio 0.2.22 (registry+https://github.com/rust-lang/crates.io-index)", -- "tower-service 0.3.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "tracing 0.1.19 (registry+https://github.com/rust-lang/crates.io-index)", -- "want 0.3.0 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "idna" --version = "0.2.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "matches 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)", -- "unicode-bidi 0.3.4 (registry+https://github.com/rust-lang/crates.io-index)", -- "unicode-normalization 0.1.13 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "indexmap" --version = "1.6.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "autocfg 1.0.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "hashbrown 0.9.0 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "input_buffer" --version = "0.3.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "bytes 0.5.6 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "iovec" --version = "0.1.4" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "itoa" --version = "0.4.6" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "kernel32-sys" --version = "0.2.2" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "winapi 0.2.8 (registry+https://github.com/rust-lang/crates.io-index)", -- "winapi-build 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "lazy_static" --version = "1.4.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "libc" --version = "0.2.73" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "libloading" --version = "0.5.2" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "cc 1.0.58 (registry+https://github.com/rust-lang/crates.io-index)", -- "winapi 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "libudev" --version = "0.2.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "libudev-sys 0.1.4 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "libudev-sys" --version = "0.1.4" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "pkg-config 0.3.18 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "log" --version = "0.4.11" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "matches" --version = "0.1.8" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "memchr" --version = "2.3.3" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "mime" --version = "0.3.16" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "mime_guess" --version = "2.0.3" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "mime 0.3.16 (registry+https://github.com/rust-lang/crates.io-index)", -- "unicase 2.6.0 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "mio" --version = "0.6.22" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)", -- "fuchsia-zircon 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "fuchsia-zircon-sys 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "iovec 0.1.4 (registry+https://github.com/rust-lang/crates.io-index)", -- "kernel32-sys 0.2.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "log 0.4.11 (registry+https://github.com/rust-lang/crates.io-index)", -- "miow 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "net2 0.2.35 (registry+https://github.com/rust-lang/crates.io-index)", -- "slab 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "winapi 0.2.8 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "miow" --version = "0.2.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "kernel32-sys 0.2.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "net2 0.2.35 (registry+https://github.com/rust-lang/crates.io-index)", -- "winapi 0.2.8 (registry+https://github.com/rust-lang/crates.io-index)", -- "ws2_32-sys 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "multipart" --version = "0.17.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "buf_redux 0.8.4 (registry+https://github.com/rust-lang/crates.io-index)", -- "httparse 1.3.4 (registry+https://github.com/rust-lang/crates.io-index)", -- "log 0.4.11 (registry+https://github.com/rust-lang/crates.io-index)", -- "mime 0.3.16 (registry+https://github.com/rust-lang/crates.io-index)", -- "mime_guess 2.0.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "quick-error 1.2.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand 0.6.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "safemem 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "tempfile 3.1.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "twoway 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "net2" --version = "0.2.35" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)", -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "winapi 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "nom" --version = "4.2.3" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "memchr 2.3.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "version_check 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "nom" --version = "5.1.2" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "memchr 2.3.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "version_check 0.9.2 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "once_cell" --version = "1.4.1" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "opaque-debug" --version = "0.2.3" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "opaque-debug" --version = "0.3.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "peeking_take_while" --version = "0.1.2" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "percent-encoding" --version = "2.1.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "pin-project" --version = "0.4.23" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "pin-project-internal 0.4.23 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "pin-project-internal" --version = "0.4.23" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "proc-macro2 1.0.19 (registry+https://github.com/rust-lang/crates.io-index)", -- "quote 1.0.7 (registry+https://github.com/rust-lang/crates.io-index)", -- "syn 1.0.41 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "pin-project-lite" --version = "0.1.7" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "pin-utils" --version = "0.1.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "pkg-config" --version = "0.3.18" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "ppv-lite86" --version = "0.2.8" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "proc-macro2" --version = "1.0.19" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "unicode-xid 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "quick-error" --version = "1.2.3" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "quote" --version = "1.0.7" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "proc-macro2 1.0.19 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "rand" --version = "0.6.5" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)", -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_chacha 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_core 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_hc 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_isaac 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_jitter 0.1.4 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_os 0.1.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_pcg 0.1.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_xorshift 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "winapi 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "rand" --version = "0.7.3" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "getrandom 0.1.14 (registry+https://github.com/rust-lang/crates.io-index)", -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_chacha 0.2.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_core 0.5.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_hc 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "rand_chacha" --version = "0.1.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_core 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "rand_chacha" --version = "0.2.2" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "ppv-lite86 0.2.8 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_core 0.5.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "rand_core" --version = "0.3.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "rand_core 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "rand_core" --version = "0.4.2" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "rand_core" --version = "0.5.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "getrandom 0.1.14 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "rand_hc" --version = "0.1.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "rand_core 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "rand_hc" --version = "0.2.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "rand_core 0.5.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "rand_isaac" --version = "0.1.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "rand_core 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "rand_jitter" --version = "0.1.4" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_core 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "winapi 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "rand_os" --version = "0.1.3" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "cloudabi 0.0.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "fuchsia-cprng 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_core 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "rdrand 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "winapi 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "rand_pcg" --version = "0.1.2" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand_core 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "rand_xorshift" --version = "0.1.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "rand_core 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "rdrand" --version = "0.4.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "rand_core 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "redox_syscall" --version = "0.1.57" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "regex" --version = "1.3.9" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "aho-corasick 0.7.13 (registry+https://github.com/rust-lang/crates.io-index)", -- "memchr 2.3.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "regex-syntax 0.6.18 (registry+https://github.com/rust-lang/crates.io-index)", -- "thread_local 1.0.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "regex-syntax" --version = "0.6.18" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "remove_dir_all" --version = "0.5.3" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "winapi 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "runloop" --version = "0.1.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "rustc-hash" --version = "1.1.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "ryu" --version = "1.0.5" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "safemem" --version = "0.3.3" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "scoped-tls" --version = "1.0.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "serde" --version = "1.0.116" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "serde_derive 1.0.116 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "serde_derive" --version = "1.0.116" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "proc-macro2 1.0.19 (registry+https://github.com/rust-lang/crates.io-index)", -- "quote 1.0.7 (registry+https://github.com/rust-lang/crates.io-index)", -- "syn 1.0.41 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "serde_json" --version = "1.0.57" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "itoa 0.4.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "ryu 1.0.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "serde 1.0.116 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "serde_urlencoded" --version = "0.6.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "dtoa 0.4.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "itoa 0.4.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "serde 1.0.116 (registry+https://github.com/rust-lang/crates.io-index)", -- "url 2.1.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "sha-1" --version = "0.8.2" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "block-buffer 0.7.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "digest 0.8.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "fake-simd 0.1.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "opaque-debug 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "sha-1" --version = "0.9.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "block-buffer 0.9.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)", -- "cpuid-bool 0.1.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "digest 0.9.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "opaque-debug 0.3.0 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "sha2" --version = "0.8.2" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "block-buffer 0.7.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "digest 0.8.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "fake-simd 0.1.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "opaque-debug 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "shlex" --version = "0.1.1" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "slab" --version = "0.4.2" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "socket2" --version = "0.3.15" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)", -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "redox_syscall 0.1.57 (registry+https://github.com/rust-lang/crates.io-index)", -- "winapi 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "strsim" --version = "0.8.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "syn" --version = "1.0.41" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "proc-macro2 1.0.19 (registry+https://github.com/rust-lang/crates.io-index)", -- "quote 1.0.7 (registry+https://github.com/rust-lang/crates.io-index)", -- "unicode-xid 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "tempfile" --version = "3.1.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)", -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand 0.7.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "redox_syscall 0.1.57 (registry+https://github.com/rust-lang/crates.io-index)", -- "remove_dir_all 0.5.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "winapi 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "termcolor" --version = "1.1.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "winapi-util 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "textwrap" --version = "0.11.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "unicode-width 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "thread_local" --version = "1.0.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "time" --version = "0.1.44" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", -- "wasi 0.10.0+wasi-snapshot-preview1 (registry+https://github.com/rust-lang/crates.io-index)", -- "winapi 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "tinyvec" --version = "0.3.4" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "tokio" --version = "0.2.22" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "bytes 0.5.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "fnv 1.0.7 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-core 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "iovec 0.1.4 (registry+https://github.com/rust-lang/crates.io-index)", -- "lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "memchr 2.3.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "mio 0.6.22 (registry+https://github.com/rust-lang/crates.io-index)", -- "pin-project-lite 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)", -- "slab 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "tokio-macros 0.2.5 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "tokio-macros" --version = "0.2.5" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "proc-macro2 1.0.19 (registry+https://github.com/rust-lang/crates.io-index)", -- "quote 1.0.7 (registry+https://github.com/rust-lang/crates.io-index)", -- "syn 1.0.41 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "tokio-tungstenite" --version = "0.11.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "futures-util 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "log 0.4.11 (registry+https://github.com/rust-lang/crates.io-index)", -- "pin-project 0.4.23 (registry+https://github.com/rust-lang/crates.io-index)", -- "tokio 0.2.22 (registry+https://github.com/rust-lang/crates.io-index)", -- "tungstenite 0.11.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "tokio-util" --version = "0.3.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "bytes 0.5.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-core 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures-sink 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "log 0.4.11 (registry+https://github.com/rust-lang/crates.io-index)", -- "pin-project-lite 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)", -- "tokio 0.2.22 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "tower-service" --version = "0.3.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "tracing" --version = "0.1.19" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)", -- "log 0.4.11 (registry+https://github.com/rust-lang/crates.io-index)", -- "tracing-core 0.1.16 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "tracing-core" --version = "0.1.16" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "tracing-futures" --version = "0.2.4" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "pin-project 0.4.23 (registry+https://github.com/rust-lang/crates.io-index)", -- "tracing 0.1.19 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "try-lock" --version = "0.2.3" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "tungstenite" --version = "0.11.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "base64 0.12.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "byteorder 1.3.4 (registry+https://github.com/rust-lang/crates.io-index)", -- "bytes 0.5.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "http 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "httparse 1.3.4 (registry+https://github.com/rust-lang/crates.io-index)", -- "input_buffer 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "log 0.4.11 (registry+https://github.com/rust-lang/crates.io-index)", -- "rand 0.7.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "sha-1 0.9.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "url 2.1.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "utf-8 0.7.5 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "twoway" --version = "0.1.8" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "memchr 2.3.3 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "typenum" --version = "1.12.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "unicase" --version = "2.6.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "version_check 0.9.2 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "unicode-bidi" --version = "0.3.4" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "matches 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "unicode-normalization" --version = "0.1.13" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "tinyvec 0.3.4 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "unicode-width" --version = "0.1.8" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "unicode-xid" --version = "0.2.1" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "url" --version = "2.1.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "idna 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "matches 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)", -- "percent-encoding 2.1.0 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "urlencoding" --version = "1.1.1" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "utf-8" --version = "0.7.5" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "vec_map" --version = "0.8.2" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "version_check" --version = "0.1.5" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "version_check" --version = "0.9.2" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "want" --version = "0.3.0" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "log 0.4.11 (registry+https://github.com/rust-lang/crates.io-index)", -- "try-lock 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "warp" --version = "0.2.5" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "bytes 0.5.6 (registry+https://github.com/rust-lang/crates.io-index)", -- "futures 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)", -- "headers 0.3.2 (registry+https://github.com/rust-lang/crates.io-index)", -- "http 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "hyper 0.13.7 (registry+https://github.com/rust-lang/crates.io-index)", -- "log 0.4.11 (registry+https://github.com/rust-lang/crates.io-index)", -- "mime 0.3.16 (registry+https://github.com/rust-lang/crates.io-index)", -- "mime_guess 2.0.3 (registry+https://github.com/rust-lang/crates.io-index)", -- "multipart 0.17.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "pin-project 0.4.23 (registry+https://github.com/rust-lang/crates.io-index)", -- "scoped-tls 1.0.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "serde 1.0.116 (registry+https://github.com/rust-lang/crates.io-index)", -- "serde_json 1.0.57 (registry+https://github.com/rust-lang/crates.io-index)", -- "serde_urlencoded 0.6.1 (registry+https://github.com/rust-lang/crates.io-index)", -- "tokio 0.2.22 (registry+https://github.com/rust-lang/crates.io-index)", -- "tokio-tungstenite 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "tower-service 0.3.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "tracing 0.1.19 (registry+https://github.com/rust-lang/crates.io-index)", -- "tracing-futures 0.2.4 (registry+https://github.com/rust-lang/crates.io-index)", -- "urlencoding 1.1.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "wasi" --version = "0.9.0+wasi-snapshot-preview1" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "wasi" --version = "0.10.0+wasi-snapshot-preview1" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "which" --version = "3.1.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "winapi" --version = "0.2.8" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "winapi" --version = "0.3.9" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "winapi-i686-pc-windows-gnu 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)", -- "winapi-x86_64-pc-windows-gnu 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "winapi-build" --version = "0.1.1" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "winapi-i686-pc-windows-gnu" --version = "0.4.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "winapi-util" --version = "0.1.5" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "winapi 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[[package]] --name = "winapi-x86_64-pc-windows-gnu" --version = "0.4.0" --source = "registry+https://github.com/rust-lang/crates.io-index" -- --[[package]] --name = "ws2_32-sys" --version = "0.2.1" --source = "registry+https://github.com/rust-lang/crates.io-index" --dependencies = [ -- "winapi 0.2.8 (registry+https://github.com/rust-lang/crates.io-index)", -- "winapi-build 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)", --] -- --[metadata] --"checksum aho-corasick 0.7.13 (registry+https://github.com/rust-lang/crates.io-index)" = "043164d8ba5c4c3035fec9bbee8647c0261d788f3474306f93bb65901cae0e86" --"checksum ansi_term 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)" = "ee49baf6cb617b853aa8d93bf420db2383fab46d314482ca2803b40d5fde979b" --"checksum assert_matches 1.3.0 (registry+https://github.com/rust-lang/crates.io-index)" = "7deb0a829ca7bcfaf5da70b073a8d128619259a7be8216a355e23f00763059e5" --"checksum atty 0.2.14 (registry+https://github.com/rust-lang/crates.io-index)" = "d9b39be18770d11421cdb1b9947a45dd3f37e93092cbf377614828a319d5fee8" --"checksum autocfg 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)" = "1d49d90015b3c36167a20fe2810c5cd875ad504b39cff3d4eae7977e6b7c1cb2" --"checksum autocfg 1.0.1 (registry+https://github.com/rust-lang/crates.io-index)" = "cdb031dd78e28731d87d56cc8ffef4a8f36ca26c38fe2de700543e627f8a464a" --"checksum base64 0.10.1 (registry+https://github.com/rust-lang/crates.io-index)" = "0b25d992356d2eb0ed82172f5248873db5560c4721f564b13cb5193bda5e668e" --"checksum base64 0.12.3 (registry+https://github.com/rust-lang/crates.io-index)" = "3441f0f7b02788e948e47f457ca01f1d7e6d92c693bc132c22b087d3141c03ff" --"checksum bindgen 0.51.1 (registry+https://github.com/rust-lang/crates.io-index)" = "ebd71393f1ec0509b553aa012b9b58e81dadbdff7130bd3b8cba576e69b32f75" --"checksum bitflags 1.2.1 (registry+https://github.com/rust-lang/crates.io-index)" = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693" --"checksum block-buffer 0.7.3 (registry+https://github.com/rust-lang/crates.io-index)" = "c0940dc441f31689269e10ac70eb1002a3a1d3ad1390e030043662eb7fe4688b" --"checksum block-buffer 0.9.0 (registry+https://github.com/rust-lang/crates.io-index)" = "4152116fd6e9dadb291ae18fc1ec3575ed6d84c29642d97890f4b4a3417297e4" --"checksum block-padding 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)" = "fa79dedbb091f449f1f39e53edf88d5dbe95f895dae6135a8d7b881fb5af73f5" --"checksum buf_redux 0.8.4 (registry+https://github.com/rust-lang/crates.io-index)" = "b953a6887648bb07a535631f2bc00fbdb2a2216f135552cb3f534ed136b9c07f" --"checksum byte-tools 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)" = "e3b5ca7a04898ad4bcd41c90c5285445ff5b791899bb1b0abdd2a2aa791211d7" --"checksum byteorder 1.3.4 (registry+https://github.com/rust-lang/crates.io-index)" = "08c48aae112d48ed9f069b33538ea9e3e90aa263cfa3d1c24309612b1f7472de" --"checksum bytes 0.5.6 (registry+https://github.com/rust-lang/crates.io-index)" = "0e4cec68f03f32e44924783795810fa50a7035d8c8ebe78580ad7e6c703fba38" --"checksum cc 1.0.58 (registry+https://github.com/rust-lang/crates.io-index)" = "f9a06fb2e53271d7c279ec1efea6ab691c35a2ae67ec0d91d7acec0caf13b518" --"checksum cexpr 0.3.6 (registry+https://github.com/rust-lang/crates.io-index)" = "fce5b5fb86b0c57c20c834c1b412fd09c77c8a59b9473f86272709e78874cd1d" --"checksum cfg-if 0.1.10 (registry+https://github.com/rust-lang/crates.io-index)" = "4785bdd1c96b2a846b2bd7cc02e86b6b3dbf14e7e53446c4f54c92a361040822" --"checksum clang-sys 0.28.1 (registry+https://github.com/rust-lang/crates.io-index)" = "81de550971c976f176130da4b2978d3b524eaa0fd9ac31f3ceb5ae1231fb4853" --"checksum clap 2.33.1 (registry+https://github.com/rust-lang/crates.io-index)" = "bdfa80d47f954d53a35a64987ca1422f495b8d6483c0fe9f7117b36c2a792129" --"checksum cloudabi 0.0.3 (registry+https://github.com/rust-lang/crates.io-index)" = "ddfc5b9aa5d4507acaf872de71051dfd0e309860e88966e1051e462a077aac4f" --"checksum core-foundation 0.9.0 (registry+https://github.com/rust-lang/crates.io-index)" = "3b5ed8e7e76c45974e15e41bfa8d5b0483cd90191639e01d8f5f1e606299d3fb" --"checksum core-foundation-sys 0.8.0 (registry+https://github.com/rust-lang/crates.io-index)" = "9a21fa21941700a3cd8fcb4091f361a6a712fac632f85d9f487cc892045d55c6" --"checksum cpuid-bool 0.1.2 (registry+https://github.com/rust-lang/crates.io-index)" = "8aebca1129a03dc6dc2b127edd729435bbc4a37e1d5f4d7513165089ceb02634" --"checksum devd-rs 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)" = "1945ccb7caedabdfb9347766ead740fb1e0582b7425598325f546adbd832cce1" --"checksum digest 0.8.1 (registry+https://github.com/rust-lang/crates.io-index)" = "f3d0c8c8752312f9713efd397ff63acb9f85585afbf179282e720e7704954dd5" --"checksum digest 0.9.0 (registry+https://github.com/rust-lang/crates.io-index)" = "d3dd60d1080a57a05ab032377049e0591415d2b31afd7028356dbf3cc6dcb066" --"checksum dtoa 0.4.6 (registry+https://github.com/rust-lang/crates.io-index)" = "134951f4028bdadb9b84baf4232681efbf277da25144b9b0ad65df75946c422b" --"checksum env_logger 0.6.2 (registry+https://github.com/rust-lang/crates.io-index)" = "aafcde04e90a5226a6443b7aabdb016ba2f8307c847d524724bd9b346dd1a2d3" --"checksum fake-simd 0.1.2 (registry+https://github.com/rust-lang/crates.io-index)" = "e88a8acf291dafb59c2d96e8f59828f3838bb1a70398823ade51a84de6a6deed" --"checksum fnv 1.0.7 (registry+https://github.com/rust-lang/crates.io-index)" = "3f9eec918d3f24069decb9af1554cad7c880e2da24a9afd88aca000531ab82c1" --"checksum fuchsia-cprng 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "a06f77d526c1a601b7c4cdd98f54b5eaabffc14d5f2f0296febdc7f357c6d3ba" --"checksum fuchsia-zircon 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)" = "2e9763c69ebaae630ba35f74888db465e49e259ba1bc0eda7d06f4a067615d82" --"checksum fuchsia-zircon-sys 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)" = "3dcaa9ae7725d12cdb85b3ad99a434db70b468c09ded17e012d86b5c1010f7a7" --"checksum futures 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)" = "1e05b85ec287aac0dc34db7d4a569323df697f9c55b99b15d6b4ef8cde49f613" --"checksum futures-channel 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)" = "f366ad74c28cca6ba456d95e6422883cfb4b252a83bed929c83abfdbbf2967d5" --"checksum futures-core 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)" = "59f5fff90fd5d971f936ad674802482ba441b6f09ba5e15fd8b39145582ca399" --"checksum futures-io 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)" = "de27142b013a8e869c14957e6d2edeef89e97c289e69d042ee3a49acd8b51789" --"checksum futures-sink 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)" = "3f2032893cb734c7a05d85ce0cc8b8c4075278e93b24b66f9de99d6eb0fa8acc" --"checksum futures-task 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)" = "bdb66b5f09e22019b1ab0830f7785bcea8e7a42148683f99214f73f8ec21a626" --"checksum futures-util 0.3.5 (registry+https://github.com/rust-lang/crates.io-index)" = "8764574ff08b701a084482c3c7031349104b07ac897393010494beaa18ce32c6" --"checksum generic-array 0.12.3 (registry+https://github.com/rust-lang/crates.io-index)" = "c68f0274ae0e023facc3c97b2e00f076be70e254bc851d972503b328db79b2ec" --"checksum generic-array 0.14.4 (registry+https://github.com/rust-lang/crates.io-index)" = "501466ecc8a30d1d3b7fc9229b122b2ce8ed6e9d9223f1138d4babb253e51817" --"checksum getopts 0.2.21 (registry+https://github.com/rust-lang/crates.io-index)" = "14dbbfd5c71d70241ecf9e6f13737f7b5ce823821063188d7e46c41d371eebd5" --"checksum getrandom 0.1.14 (registry+https://github.com/rust-lang/crates.io-index)" = "7abc8dd8451921606d809ba32e95b6111925cd2906060d2dcc29c070220503eb" --"checksum glob 0.3.0 (registry+https://github.com/rust-lang/crates.io-index)" = "9b919933a397b79c37e33b77bb2aa3dc8eb6e165ad809e58ff75bc7db2e34574" --"checksum h2 0.2.6 (registry+https://github.com/rust-lang/crates.io-index)" = "993f9e0baeed60001cf565546b0d3dbe6a6ad23f2bd31644a133c641eccf6d53" --"checksum hashbrown 0.9.0 (registry+https://github.com/rust-lang/crates.io-index)" = "00d63df3d41950fb462ed38308eea019113ad1508da725bbedcd0fa5a85ef5f7" --"checksum headers 0.3.2 (registry+https://github.com/rust-lang/crates.io-index)" = "ed18eb2459bf1a09ad2d6b1547840c3e5e62882fa09b9a6a20b1de8e3228848f" --"checksum headers-core 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)" = "e7f66481bfee273957b1f20485a4ff3362987f85b2c236580d81b4eb7a326429" --"checksum hermit-abi 0.1.15 (registry+https://github.com/rust-lang/crates.io-index)" = "3deed196b6e7f9e44a2ae8d94225d80302d81208b1bb673fd21fe634645c85a9" --"checksum http 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)" = "28d569972648b2c512421b5f2a405ad6ac9666547189d0c5477a3f200f3e02f9" --"checksum http-body 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)" = "13d5ff830006f7646652e057693569bfe0d51760c0085a071769d142a205111b" --"checksum httparse 1.3.4 (registry+https://github.com/rust-lang/crates.io-index)" = "cd179ae861f0c2e53da70d892f5f3029f9594be0c41dc5269cd371691b1dc2f9" --"checksum humantime 1.3.0 (registry+https://github.com/rust-lang/crates.io-index)" = "df004cfca50ef23c36850aaaa59ad52cc70d0e90243c3c7737a4dd32dc7a3c4f" --"checksum hyper 0.13.7 (registry+https://github.com/rust-lang/crates.io-index)" = "3e68a8dd9716185d9e64ea473ea6ef63529252e3e27623295a0378a19665d5eb" --"checksum idna 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)" = "02e2673c30ee86b5b96a9cb52ad15718aa1f966f5ab9ad54a8b95d5ca33120a9" --"checksum indexmap 1.6.0 (registry+https://github.com/rust-lang/crates.io-index)" = "55e2e4c765aa53a0424761bf9f41aa7a6ac1efa87238f59560640e27fca028f2" --"checksum input_buffer 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)" = "19a8a95243d5a0398cae618ec29477c6e3cb631152be5c19481f80bc71559754" --"checksum iovec 0.1.4 (registry+https://github.com/rust-lang/crates.io-index)" = "b2b3ea6ff95e175473f8ffe6a7eb7c00d054240321b84c57051175fe3c1e075e" --"checksum itoa 0.4.6 (registry+https://github.com/rust-lang/crates.io-index)" = "dc6f3ad7b9d11a0c00842ff8de1b60ee58661048eb8049ed33c73594f359d7e6" --"checksum kernel32-sys 0.2.2 (registry+https://github.com/rust-lang/crates.io-index)" = "7507624b29483431c0ba2d82aece8ca6cdba9382bff4ddd0f7490560c056098d" --"checksum lazy_static 1.4.0 (registry+https://github.com/rust-lang/crates.io-index)" = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646" --"checksum libc 0.2.73 (registry+https://github.com/rust-lang/crates.io-index)" = "bd7d4bd64732af4bf3a67f367c27df8520ad7e230c5817b8ff485864d80242b9" --"checksum libloading 0.5.2 (registry+https://github.com/rust-lang/crates.io-index)" = "f2b111a074963af1d37a139918ac6d49ad1d0d5e47f72fd55388619691a7d753" --"checksum libudev 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)" = "ea626d3bdf40a1c5aee3bcd4f40826970cae8d80a8fec934c82a63840094dcfe" --"checksum libudev-sys 0.1.4 (registry+https://github.com/rust-lang/crates.io-index)" = "3c8469b4a23b962c1396b9b451dda50ef5b283e8dd309d69033475fa9b334324" --"checksum log 0.4.11 (registry+https://github.com/rust-lang/crates.io-index)" = "4fabed175da42fed1fa0746b0ea71f412aa9d35e76e95e59b192c64b9dc2bf8b" --"checksum matches 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)" = "7ffc5c5338469d4d3ea17d269fa8ea3512ad247247c30bd2df69e68309ed0a08" --"checksum memchr 2.3.3 (registry+https://github.com/rust-lang/crates.io-index)" = "3728d817d99e5ac407411fa471ff9800a778d88a24685968b36824eaf4bee400" --"checksum mime 0.3.16 (registry+https://github.com/rust-lang/crates.io-index)" = "2a60c7ce501c71e03a9c9c0d35b861413ae925bd979cc7a4e30d060069aaac8d" --"checksum mime_guess 2.0.3 (registry+https://github.com/rust-lang/crates.io-index)" = "2684d4c2e97d99848d30b324b00c8fcc7e5c897b7cbb5819b09e7c90e8baf212" --"checksum mio 0.6.22 (registry+https://github.com/rust-lang/crates.io-index)" = "fce347092656428bc8eaf6201042cb551b8d67855af7374542a92a0fbfcac430" --"checksum miow 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)" = "8c1f2f3b1cf331de6896aabf6e9d55dca90356cc9960cca7eaaf408a355ae919" --"checksum multipart 0.17.0 (registry+https://github.com/rust-lang/crates.io-index)" = "8209c33c951f07387a8497841122fc6f712165e3f9bda3e6be4645b58188f676" --"checksum net2 0.2.35 (registry+https://github.com/rust-lang/crates.io-index)" = "3ebc3ec692ed7c9a255596c67808dee269f64655d8baf7b4f0638e51ba1d6853" --"checksum nom 4.2.3 (registry+https://github.com/rust-lang/crates.io-index)" = "2ad2a91a8e869eeb30b9cb3119ae87773a8f4ae617f41b1eb9c154b2905f7bd6" --"checksum nom 5.1.2 (registry+https://github.com/rust-lang/crates.io-index)" = "ffb4262d26ed83a1c0a33a38fe2bb15797329c85770da05e6b828ddb782627af" --"checksum once_cell 1.4.1 (registry+https://github.com/rust-lang/crates.io-index)" = "260e51e7efe62b592207e9e13a68e43692a7a279171d6ba57abd208bf23645ad" --"checksum opaque-debug 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)" = "2839e79665f131bdb5782e51f2c6c9599c133c6098982a54c794358bf432529c" --"checksum opaque-debug 0.3.0 (registry+https://github.com/rust-lang/crates.io-index)" = "624a8340c38c1b80fd549087862da4ba43e08858af025b236e509b6649fc13d5" --"checksum peeking_take_while 0.1.2 (registry+https://github.com/rust-lang/crates.io-index)" = "19b17cddbe7ec3f8bc800887bab5e717348c95ea2ca0b1bf0837fb964dc67099" --"checksum percent-encoding 2.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "d4fd5641d01c8f18a23da7b6fe29298ff4b55afcccdf78973b24cf3175fee32e" --"checksum pin-project 0.4.23 (registry+https://github.com/rust-lang/crates.io-index)" = "ca4433fff2ae79342e497d9f8ee990d174071408f28f726d6d83af93e58e48aa" --"checksum pin-project-internal 0.4.23 (registry+https://github.com/rust-lang/crates.io-index)" = "2c0e815c3ee9a031fdf5af21c10aa17c573c9c6a566328d99e3936c34e36461f" --"checksum pin-project-lite 0.1.7 (registry+https://github.com/rust-lang/crates.io-index)" = "282adbf10f2698a7a77f8e983a74b2d18176c19a7fd32a45446139ae7b02b715" --"checksum pin-utils 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "8b870d8c151b6f2fb93e84a13146138f05d02ed11c7e7c54f8826aaaf7c9f184" --"checksum pkg-config 0.3.18 (registry+https://github.com/rust-lang/crates.io-index)" = "d36492546b6af1463394d46f0c834346f31548646f6ba10849802c9c9a27ac33" --"checksum ppv-lite86 0.2.8 (registry+https://github.com/rust-lang/crates.io-index)" = "237a5ed80e274dbc66f86bd59c1e25edc039660be53194b5fe0a482e0f2612ea" --"checksum proc-macro2 1.0.19 (registry+https://github.com/rust-lang/crates.io-index)" = "04f5f085b5d71e2188cb8271e5da0161ad52c3f227a661a3c135fdf28e258b12" --"checksum quick-error 1.2.3 (registry+https://github.com/rust-lang/crates.io-index)" = "a1d01941d82fa2ab50be1e79e6714289dd7cde78eba4c074bc5a4374f650dfe0" --"checksum quote 1.0.7 (registry+https://github.com/rust-lang/crates.io-index)" = "aa563d17ecb180e500da1cfd2b028310ac758de548efdd203e18f283af693f37" --"checksum rand 0.6.5 (registry+https://github.com/rust-lang/crates.io-index)" = "6d71dacdc3c88c1fde3885a3be3fbab9f35724e6ce99467f7d9c5026132184ca" --"checksum rand 0.7.3 (registry+https://github.com/rust-lang/crates.io-index)" = "6a6b1679d49b24bbfe0c803429aa1874472f50d9b363131f0e89fc356b544d03" --"checksum rand_chacha 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "556d3a1ca6600bfcbab7c7c91ccb085ac7fbbcd70e008a98742e7847f4f7bcef" --"checksum rand_chacha 0.2.2 (registry+https://github.com/rust-lang/crates.io-index)" = "f4c8ed856279c9737206bf725bf36935d8666ead7aa69b52be55af369d193402" --"checksum rand_core 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)" = "7a6fdeb83b075e8266dcc8762c22776f6877a63111121f5f8c7411e5be7eed4b" --"checksum rand_core 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)" = "9c33a3c44ca05fa6f1807d8e6743f3824e8509beca625669633be0acbdf509dc" --"checksum rand_core 0.5.1 (registry+https://github.com/rust-lang/crates.io-index)" = "90bde5296fc891b0cef12a6d03ddccc162ce7b2aff54160af9338f8d40df6d19" --"checksum rand_hc 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "7b40677c7be09ae76218dc623efbf7b18e34bced3f38883af07bb75630a21bc4" --"checksum rand_hc 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)" = "ca3129af7b92a17112d59ad498c6f81eaf463253766b90396d39ea7a39d6613c" --"checksum rand_isaac 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "ded997c9d5f13925be2a6fd7e66bf1872597f759fd9dd93513dd7e92e5a5ee08" --"checksum rand_jitter 0.1.4 (registry+https://github.com/rust-lang/crates.io-index)" = "1166d5c91dc97b88d1decc3285bb0a99ed84b05cfd0bc2341bdf2d43fc41e39b" --"checksum rand_os 0.1.3 (registry+https://github.com/rust-lang/crates.io-index)" = "7b75f676a1e053fc562eafbb47838d67c84801e38fc1ba459e8f180deabd5071" --"checksum rand_pcg 0.1.2 (registry+https://github.com/rust-lang/crates.io-index)" = "abf9b09b01790cfe0364f52bf32995ea3c39f4d2dd011eac241d2914146d0b44" --"checksum rand_xorshift 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "cbf7e9e623549b0e21f6e97cf8ecf247c1a8fd2e8a992ae265314300b2455d5c" --"checksum rdrand 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)" = "678054eb77286b51581ba43620cc911abf02758c91f93f479767aed0f90458b2" --"checksum redox_syscall 0.1.57 (registry+https://github.com/rust-lang/crates.io-index)" = "41cc0f7e4d5d4544e8861606a285bb08d3e70712ccc7d2b84d7c0ccfaf4b05ce" --"checksum regex 1.3.9 (registry+https://github.com/rust-lang/crates.io-index)" = "9c3780fcf44b193bc4d09f36d2a3c87b251da4a046c87795a0d35f4f927ad8e6" --"checksum regex-syntax 0.6.18 (registry+https://github.com/rust-lang/crates.io-index)" = "26412eb97c6b088a6997e05f69403a802a92d520de2f8e63c2b65f9e0f47c4e8" --"checksum remove_dir_all 0.5.3 (registry+https://github.com/rust-lang/crates.io-index)" = "3acd125665422973a33ac9d3dd2df85edad0f4ae9b00dafb1a05e43a9f5ef8e7" --"checksum runloop 0.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "5d79b4b604167921892e84afbbaad9d5ad74e091bf6c511d9dbfb0593f09fabd" --"checksum rustc-hash 1.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "08d43f7aa6b08d49f382cde6a7982047c3426db949b1424bc4b7ec9ae12c6ce2" --"checksum ryu 1.0.5 (registry+https://github.com/rust-lang/crates.io-index)" = "71d301d4193d031abdd79ff7e3dd721168a9572ef3fe51a1517aba235bd8f86e" --"checksum safemem 0.3.3 (registry+https://github.com/rust-lang/crates.io-index)" = "ef703b7cb59335eae2eb93ceb664c0eb7ea6bf567079d843e09420219668e072" --"checksum scoped-tls 1.0.0 (registry+https://github.com/rust-lang/crates.io-index)" = "ea6a9290e3c9cf0f18145ef7ffa62d68ee0bf5fcd651017e586dc7fd5da448c2" --"checksum serde 1.0.116 (registry+https://github.com/rust-lang/crates.io-index)" = "96fe57af81d28386a513cbc6858332abc6117cfdb5999647c6444b8f43a370a5" --"checksum serde_derive 1.0.116 (registry+https://github.com/rust-lang/crates.io-index)" = "f630a6370fd8e457873b4bd2ffdae75408bc291ba72be773772a4c2a065d9ae8" --"checksum serde_json 1.0.57 (registry+https://github.com/rust-lang/crates.io-index)" = "164eacbdb13512ec2745fb09d51fd5b22b0d65ed294a1dcf7285a360c80a675c" --"checksum serde_urlencoded 0.6.1 (registry+https://github.com/rust-lang/crates.io-index)" = "9ec5d77e2d4c73717816afac02670d5c4f534ea95ed430442cad02e7a6e32c97" --"checksum sha-1 0.8.2 (registry+https://github.com/rust-lang/crates.io-index)" = "f7d94d0bede923b3cea61f3f1ff57ff8cdfd77b400fb8f9998949e0cf04163df" --"checksum sha-1 0.9.1 (registry+https://github.com/rust-lang/crates.io-index)" = "170a36ea86c864a3f16dd2687712dd6646f7019f301e57537c7f4dc9f5916770" --"checksum sha2 0.8.2 (registry+https://github.com/rust-lang/crates.io-index)" = "a256f46ea78a0c0d9ff00077504903ac881a1dafdc20da66545699e7776b3e69" --"checksum shlex 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "7fdf1b9db47230893d76faad238fd6097fd6d6a9245cd7a4d90dbd639536bbd2" --"checksum slab 0.4.2 (registry+https://github.com/rust-lang/crates.io-index)" = "c111b5bd5695e56cffe5129854aa230b39c93a305372fdbb2668ca2394eea9f8" --"checksum socket2 0.3.15 (registry+https://github.com/rust-lang/crates.io-index)" = "b1fa70dc5c8104ec096f4fe7ede7a221d35ae13dcd19ba1ad9a81d2cab9a1c44" --"checksum strsim 0.8.0 (registry+https://github.com/rust-lang/crates.io-index)" = "8ea5119cdb4c55b55d432abb513a0429384878c15dde60cc77b1c99de1a95a6a" --"checksum syn 1.0.41 (registry+https://github.com/rust-lang/crates.io-index)" = "6690e3e9f692504b941dc6c3b188fd28df054f7fb8469ab40680df52fdcc842b" --"checksum tempfile 3.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "7a6e24d9338a0a5be79593e2fa15a648add6138caa803e2d5bc782c371732ca9" --"checksum termcolor 1.1.0 (registry+https://github.com/rust-lang/crates.io-index)" = "bb6bfa289a4d7c5766392812c0a1f4c1ba45afa1ad47803c11e1f407d846d75f" --"checksum textwrap 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)" = "d326610f408c7a4eb6f51c37c330e496b08506c9457c9d34287ecc38809fb060" --"checksum thread_local 1.0.1 (registry+https://github.com/rust-lang/crates.io-index)" = "d40c6d1b69745a6ec6fb1ca717914848da4b44ae29d9b3080cbee91d72a69b14" --"checksum time 0.1.44 (registry+https://github.com/rust-lang/crates.io-index)" = "6db9e6914ab8b1ae1c260a4ae7a49b6c5611b40328a735b21862567685e73255" --"checksum tinyvec 0.3.4 (registry+https://github.com/rust-lang/crates.io-index)" = "238ce071d267c5710f9d31451efec16c5ee22de34df17cc05e56cbc92e967117" --"checksum tokio 0.2.22 (registry+https://github.com/rust-lang/crates.io-index)" = "5d34ca54d84bf2b5b4d7d31e901a8464f7b60ac145a284fba25ceb801f2ddccd" --"checksum tokio-macros 0.2.5 (registry+https://github.com/rust-lang/crates.io-index)" = "f0c3acc6aa564495a0f2e1d59fab677cd7f81a19994cfc7f3ad0e64301560389" --"checksum tokio-tungstenite 0.11.0 (registry+https://github.com/rust-lang/crates.io-index)" = "6d9e878ad426ca286e4dcae09cbd4e1973a7f8987d97570e2469703dd7f5720c" --"checksum tokio-util 0.3.1 (registry+https://github.com/rust-lang/crates.io-index)" = "be8242891f2b6cbef26a2d7e8605133c2c554cd35b3e4948ea892d6d68436499" --"checksum tower-service 0.3.0 (registry+https://github.com/rust-lang/crates.io-index)" = "e987b6bf443f4b5b3b6f38704195592cca41c5bb7aedd3c3693c7081f8289860" --"checksum tracing 0.1.19 (registry+https://github.com/rust-lang/crates.io-index)" = "6d79ca061b032d6ce30c660fded31189ca0b9922bf483cd70759f13a2d86786c" --"checksum tracing-core 0.1.16 (registry+https://github.com/rust-lang/crates.io-index)" = "5bcf46c1f1f06aeea2d6b81f3c863d0930a596c86ad1920d4e5bad6dd1d7119a" --"checksum tracing-futures 0.2.4 (registry+https://github.com/rust-lang/crates.io-index)" = "ab7bb6f14721aa00656086e9335d363c5c8747bae02ebe32ea2c7dece5689b4c" --"checksum try-lock 0.2.3 (registry+https://github.com/rust-lang/crates.io-index)" = "59547bce71d9c38b83d9c0e92b6066c4253371f15005def0c30d9657f50c7642" --"checksum tungstenite 0.11.1 (registry+https://github.com/rust-lang/crates.io-index)" = "f0308d80d86700c5878b9ef6321f020f29b1bb9d5ff3cab25e75e23f3a492a23" --"checksum twoway 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)" = "59b11b2b5241ba34be09c3cc85a36e56e48f9888862e19cedf23336d35316ed1" --"checksum typenum 1.12.0 (registry+https://github.com/rust-lang/crates.io-index)" = "373c8a200f9e67a0c95e62a4f52fbf80c23b4381c05a17845531982fa99e6b33" --"checksum unicase 2.6.0 (registry+https://github.com/rust-lang/crates.io-index)" = "50f37be617794602aabbeee0be4f259dc1778fabe05e2d67ee8f79326d5cb4f6" --"checksum unicode-bidi 0.3.4 (registry+https://github.com/rust-lang/crates.io-index)" = "49f2bd0c6468a8230e1db229cff8029217cf623c767ea5d60bfbd42729ea54d5" --"checksum unicode-normalization 0.1.13 (registry+https://github.com/rust-lang/crates.io-index)" = "6fb19cf769fa8c6a80a162df694621ebeb4dafb606470b2b2fce0be40a98a977" --"checksum unicode-width 0.1.8 (registry+https://github.com/rust-lang/crates.io-index)" = "9337591893a19b88d8d87f2cec1e73fad5cdfd10e5a6f349f498ad6ea2ffb1e3" --"checksum unicode-xid 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)" = "f7fe0bb3479651439c9112f72b6c505038574c9fbb575ed1bf3b797fa39dd564" --"checksum url 2.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "829d4a8476c35c9bf0bbce5a3b23f4106f79728039b726d292bb93bc106787cb" --"checksum urlencoding 1.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "c9232eb53352b4442e40d7900465dfc534e8cb2dc8f18656fcb2ac16112b5593" --"checksum utf-8 0.7.5 (registry+https://github.com/rust-lang/crates.io-index)" = "05e42f7c18b8f902290b009cde6d651262f956c98bc51bca4cd1d511c9cd85c7" --"checksum vec_map 0.8.2 (registry+https://github.com/rust-lang/crates.io-index)" = "f1bddf1187be692e79c5ffeab891132dfb0f236ed36a43c7ed39f1165ee20191" --"checksum version_check 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)" = "914b1a6776c4c929a602fafd8bc742e06365d4bcbe48c30f9cca5824f70dc9dd" --"checksum version_check 0.9.2 (registry+https://github.com/rust-lang/crates.io-index)" = "b5a972e5669d67ba988ce3dc826706fb0a8b01471c088cb0b6110b805cc36aed" --"checksum want 0.3.0 (registry+https://github.com/rust-lang/crates.io-index)" = "1ce8a968cb1cd110d136ff8b819a556d6fb6d919363c61534f6860c7eb172ba0" --"checksum warp 0.2.5 (registry+https://github.com/rust-lang/crates.io-index)" = "f41be6df54c97904af01aa23e613d4521eed7ab23537cede692d4058f6449407" --"checksum wasi 0.10.0+wasi-snapshot-preview1 (registry+https://github.com/rust-lang/crates.io-index)" = "1a143597ca7c7793eff794def352d41792a93c481eb1042423ff7ff72ba2c31f" --"checksum wasi 0.9.0+wasi-snapshot-preview1 (registry+https://github.com/rust-lang/crates.io-index)" = "cccddf32554fecc6acb585f82a32a72e28b48f8c4c1883ddfeeeaa96f7d8e519" --"checksum which 3.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "d011071ae14a2f6671d0b74080ae0cd8ebf3a6f8c9589a2cd45f23126fe29724" --"checksum winapi 0.2.8 (registry+https://github.com/rust-lang/crates.io-index)" = "167dc9d6949a9b857f3451275e911c3f44255842c1f7a76f33c55103a909087a" --"checksum winapi 0.3.9 (registry+https://github.com/rust-lang/crates.io-index)" = "5c839a674fcd7a98952e593242ea400abe93992746761e38641405d28b00f419" --"checksum winapi-build 0.1.1 (registry+https://github.com/rust-lang/crates.io-index)" = "2d315eee3b34aca4797b2da6b13ed88266e6d612562a0c46390af8299fc699bc" --"checksum winapi-i686-pc-windows-gnu 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)" = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6" --"checksum winapi-util 0.1.5 (registry+https://github.com/rust-lang/crates.io-index)" = "70ec6ce85bb158151cae5e5c87f95a8e97d2c0c4b001223f33a334e3ce5de178" --"checksum winapi-x86_64-pc-windows-gnu 0.4.0 (registry+https://github.com/rust-lang/crates.io-index)" = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f" --"checksum ws2_32-sys 0.2.1 (registry+https://github.com/rust-lang/crates.io-index)" = "d59cefebd0c892fa2dd6de581e937301d8552cb44489cdff035c6187cb63fa5e" -diff --git a/third_party/rust/authenticator/Cargo.toml b/third_party/rust/authenticator/Cargo.toml -index 57d24bd66b948..c49befae2178c 100644 ---- a/third_party/rust/authenticator/Cargo.toml -+++ b/third_party/rust/authenticator/Cargo.toml -@@ -1,99 +1,60 @@ --# THIS FILE IS AUTOMATICALLY GENERATED BY CARGO --# --# When uploading crates to the registry Cargo will automatically --# "normalize" Cargo.toml files for maximal compatibility --# with all versions of Cargo and also rewrite `path` dependencies --# to registry (e.g., crates.io) dependencies --# --# If you believe there's an error in this file please file an --# issue against the rust-lang/cargo repository. If you're --# editing this file be aware that the upstream Cargo.toml --# will likely look very different (and much more reasonable) -- - [package] --edition = "2018" - name = "authenticator" - version = "0.3.1" - authors = ["J.C. Jones <jc@mozilla.com>", "Tim Taubert <ttaubert@mozilla.com>", "Kyle Machulis <kyle@nonpolynomial.com>"] --description = "Library for interacting with CTAP1/2 security keys for Web Authentication. Used by Firefox." - keywords = ["ctap2", "u2f", "fido", "webauthn"] - categories = ["cryptography", "hardware-support", "os"] --license = "MPL-2.0" - repository = "https://github.com/mozilla/authenticator-rs/" --[dependencies.base64] --version = "^0.10" --optional = true -- --[dependencies.bitflags] --version = "1.0" -- --[dependencies.bytes] --version = "0.5" --features = ["serde"] --optional = true -- --[dependencies.libc] --version = "0.2" -- --[dependencies.log] --version = "0.4" -- --[dependencies.rand] --version = "0.7" -- --[dependencies.runloop] --version = "0.1.0" -- --[dependencies.serde] --version = "1.0" --features = ["derive"] --optional = true -- --[dependencies.serde_json] --version = "1.0" --optional = true -- --[dependencies.tokio] --version = "0.2" --features = ["macros"] --optional = true -+license = "MPL-2.0" -+description = "Library for interacting with CTAP1/2 security keys for Web Authentication. Used by Firefox." -+edition = "2018" - --[dependencies.warp] --version = "0.2.4" --optional = true --[dev-dependencies.assert_matches] --version = "1.2" -+[badges] -+travis-ci = { repository = "mozilla/authenticator-rs", branch = "master" } -+maintenance = { status = "actively-developed" } - --[dev-dependencies.base64] --version = "^0.10" -+[features] -+binding-recompile = ["bindgen"] -+webdriver = ["base64", "bytes", "warp", "tokio", "serde", "serde_json"] - --[dev-dependencies.env_logger] --version = "^0.6" -+[target.'cfg(target_os = "linux")'.dependencies] -+libudev = "^0.2" - --[dev-dependencies.getopts] --version = "^0.2" -+[target.'cfg(target_os = "freebsd")'.dependencies] -+devd-rs = "0.3" - --[dev-dependencies.sha2] --version = "^0.8.2" --[build-dependencies.bindgen] --version = "^0.51" --optional = true -+[target.'cfg(target_os = "macos")'.dependencies] -+core-foundation = "0.9" - --[features] --binding-recompile = ["bindgen"] --webdriver = ["base64", "bytes", "warp", "tokio", "serde", "serde_json"] --[target."cfg(target_os = \"freebsd\")".dependencies.devd-rs] --version = "0.3" --[target."cfg(target_os = \"linux\")".dependencies.libudev] --version = "^0.2" --[target."cfg(target_os = \"macos\")".dependencies.core-foundation] --version = "0.9" --[target."cfg(target_os = \"windows\")".dependencies.winapi] -+[target.'cfg(target_os = "windows")'.dependencies.winapi] - version = "^0.3" --features = ["handleapi", "hidclass", "hidpi", "hidusage", "setupapi"] --[badges.maintenance] --status = "actively-developed" -- --[badges.travis-ci] --branch = "master" --repository = "mozilla/authenticator-rs" -+features = [ -+ "handleapi", -+ "hidclass", -+ "hidpi", -+ "hidusage", -+ "setupapi", -+] -+ -+[build-dependencies] -+bindgen = { version = "^0.58.1", optional = true } -+ -+[dependencies] -+rand = "0.7" -+log = "0.4" -+libc = "0.2" -+runloop = "0.1.0" -+bitflags = "1.0" -+tokio = { version = "0.2", optional = true, features = ["macros"] } -+warp = { version = "0.2.4", optional = true } -+serde = { version = "1.0", optional = true, features = ["derive"] } -+serde_json = { version = "1.0", optional = true } -+bytes = { version = "0.5", optional = true, features = ["serde"] } -+base64 = { version = "^0.10", optional = true } -+ -+[dev-dependencies] -+sha2 = "^0.8.2" -+base64 = "^0.10" -+env_logger = "^0.6" -+getopts = "^0.2" -+assert_matches = "1.2" -diff --git a/third_party/rust/authenticator/build.rs b/third_party/rust/authenticator/build.rs -index 299e4df6d7331..c972d85b898ea 100644 ---- a/third_party/rust/authenticator/build.rs -+++ b/third_party/rust/authenticator/build.rs -@@ -45,6 +45,8 @@ fn main() { - "ioctl_aarch64be.rs" - } else if cfg!(all(target_arch = "s390x", target_endian = "big")) { - "ioctl_s390xbe.rs" -+ } else if cfg!(all(target_arch = "riscv64", target_endian = "little")) { -+ "ioctl_riscv64.rs" - } else { - panic!("architecture not supported"); - }; -diff --git a/third_party/rust/authenticator/src/linux/hidwrapper.rs b/third_party/rust/authenticator/src/linux/hidwrapper.rs -index ea1a39051b63a..82aabc6301017 100644 ---- a/third_party/rust/authenticator/src/linux/hidwrapper.rs -+++ b/third_party/rust/authenticator/src/linux/hidwrapper.rs -@@ -46,3 +46,6 @@ include!("ioctl_aarch64be.rs"); - - #[cfg(all(target_arch = "s390x", target_endian = "big"))] - include!("ioctl_s390xbe.rs"); -+ -+#[cfg(all(target_arch = "riscv64", target_endian = "little"))] -+include!("ioctl_riscv64.rs"); -diff --git a/third_party/rust/authenticator/src/linux/ioctl_riscv64.rs b/third_party/rust/authenticator/src/linux/ioctl_riscv64.rs -new file mode 100644 -index 0000000000000..a784e9bf4600b ---- /dev/null -+++ b/third_party/rust/authenticator/src/linux/ioctl_riscv64.rs -@@ -0,0 +1,5 @@ -+/* automatically generated by rust-bindgen */ -+ -+pub type __u32 = ::std::os::raw::c_uint; -+pub const _HIDIOCGRDESCSIZE: __u32 = 2147764225; -+pub const _HIDIOCGRDESC: __u32 = 2416199682; ---- a/toolkit/library/rust/shared/Cargo.toml 2022-02-10 20:41:52.387673027 +0800 -+++ b/toolkit/library/rust/shared/Cargo.toml 2022-02-12 17:34:42.861720793 +0800 -@@ -24,7 +24,7 @@ - cubeb-pulse = { git = "https://github.com/mozilla/cubeb-pulse-rs", rev="f2456201dbfdc467b80f0ff6bbb1b8a6faf7df02", optional = true, features=["pulse-dlopen"] } - cubeb-sys = { version = "0.9", optional = true, features=["gecko-in-tree"] } - encoding_glue = { path = "../../../../intl/encoding_glue" } --authenticator = "0.3.1" -+authenticator = { git = "https://github.com/makotokato/authenticator-rs", rev = "eed8919d50559f4959e2d7d2af7b4d48869b5366" } - gkrust_utils = { path = "../../../../xpcom/rust/gkrust_utils" } - gecko_logger = { path = "../../../../xpcom/rust/gecko_logger" } - rsdparsa_capi = { path = "../../../../dom/media/webrtc/sdp/rsdparsa_capi" } -From a418c651c88cd2682c4cfe61e9f57b5389078c09 Mon Sep 17 00:00:00 2001 -From: Makoto Kato <m_kato@ga2.so-net.ne.jp> -Date: Thu, 17 Jun 2021 21:50:49 +0900 -Subject: [PATCH] signal handler - ---- - js/src/wasm/WasmSignalHandlers.cpp | 9 +++++++++ - 1 file changed, 9 insertions(+) ---- a/js/src/wasm/WasmSignalHandlers.cpp 2022-02-12 19:29:33.566924464 +0800 -+++ b/js/src/wasm/WasmSignalHandlers.cpp 2022-02-12 19:50:29.499985612 +0800 -@@ -156,6 +156,11 @@ - # define R01_sig(p) ((p)->uc_mcontext.gp_regs[1]) - # define R32_sig(p) ((p)->uc_mcontext.gp_regs[32]) - # endif -+# if defined(__linux__) && defined(__riscv) && __riscv_xlen == 64 -+# define EPC_sig(p) ((p)->uc_mcontext.__gregs[0]) -+# define X02_sig(p) ((p)->uc_mcontext.__gregs[2]) -+# define X08_sig(p) ((p)->uc_mcontext.__gregs[8]) -+# endif - # elif defined(__NetBSD__) - # define EIP_sig(p) ((p)->uc_mcontext.__gregs[_REG_EIP]) - # define EBP_sig(p) ((p)->uc_mcontext.__gregs[_REG_EBP]) -@@ -376,6 +381,10 @@ - # define PC_sig(p) R32_sig(p) - # define SP_sig(p) R01_sig(p) - # define FP_sig(p) R01_sig(p) -+#elif defined(__riscv) && __riscv_xlen == 64 -+# define PC_sig(p) EPC_sig(p) -+# define SP_sig(p) X02_sig(p) -+# define FP_sig(p) X08_sig(p) - # endif - - static void SetContextPC(CONTEXT* context, uint8_t* pc) { -From b6be52755af09f55e78d86bdd02a99efa0d16f9f Mon Sep 17 00:00:00 2001 -From: Makoto Kato <m_kato@ga2.so-net.ne.jp> -Date: Fri, 28 Jan 2022 12:21:06 +0900 -Subject: [PATCH] mach vendor rust - ---- - .cargo/config.in | 10 +- - Cargo.lock | 29 +- - Cargo.toml | 3 +- - .../mozbuild/mozbuild/vendor/vendor_rust.py | 1 + - third_party/rust/alsa/.cargo-checksum.json | 2 +- - third_party/rust/alsa/Cargo.toml | 8 +- - third_party/rust/alsa/src/direct/pcm.rs | 2 +- - third_party/rust/alsa/src/error.rs | 1 - - third_party/rust/alsa/src/lib.rs | 8 +- - third_party/rust/alsa/src/mixer.rs | 8 + - third_party/rust/alsa/src/pcm.rs | 78 +- - .../rust/bitflags/.cargo-checksum.json | 2 +- - third_party/rust/bitflags/CHANGELOG.md | 57 - - third_party/rust/bitflags/Cargo.toml | 34 +- - third_party/rust/bitflags/README.md | 12 +- - third_party/rust/bitflags/build.rs | 44 + - third_party/rust/bitflags/src/lib.rs | 873 ++---- - third_party/rust/bitflags/tests/basic.rs | 20 - - .../bitflags/tests/compile-fail/impls/copy.rs | 10 - - .../tests/compile-fail/impls/copy.stderr.beta | 27 - - .../bitflags/tests/compile-fail/impls/eq.rs | 10 - - .../tests/compile-fail/impls/eq.stderr.beta | 55 - - .../non_integer_base/all_defined.rs | 123 - - .../non_integer_base/all_defined.stderr.beta | 27 - - .../non_integer_base/all_missing.rs | 13 - - .../non_integer_base/all_missing.stderr.beta | 13 - - .../compile-fail/visibility/private_field.rs | 13 - - .../visibility/private_field.stderr.beta | 10 - - .../compile-fail/visibility/private_flags.rs | 18 - - .../visibility/private_flags.stderr.beta | 18 - - .../compile-fail/visibility/pub_const.rs | 9 - - .../visibility/pub_const.stderr.beta | 5 - - .../tests/compile-pass/impls/convert.rs | 17 - - .../tests/compile-pass/impls/default.rs | 10 - - .../compile-pass/impls/inherent_methods.rs | 15 - - .../tests/compile-pass/redefinition/core.rs | 14 - - .../compile-pass/redefinition/stringify.rs | 19 - - .../bitflags/tests/compile-pass/repr/c.rs | 10 - - .../tests/compile-pass/repr/transparent.rs | 10 - - .../compile-pass/visibility/bits_field.rs | 11 - - .../tests/compile-pass/visibility/pub_in.rs | 19 - - third_party/rust/bitflags/tests/compile.rs | 63 - - third_party/rust/midir/.cargo-checksum.json | 2 +- - third_party/rust/midir/Cargo.toml | 4 +- - .../rust/nix-0.15.0/.cargo-checksum.json | 1 + - third_party/rust/nix-0.15.0/CHANGELOG.md | 742 +++++ - third_party/rust/nix-0.15.0/CONTRIBUTING.md | 114 + - third_party/rust/nix-0.15.0/CONVENTIONS.md | 87 + - third_party/rust/nix-0.15.0/Cargo.toml | 71 + - third_party/rust/nix-0.15.0/LICENSE | 21 + - third_party/rust/nix-0.15.0/README.md | 111 + - third_party/rust/{nix => nix-0.15.0}/build.rs | 0 - third_party/rust/nix-0.15.0/src/dir.rs | 193 ++ - third_party/rust/nix-0.15.0/src/errno.rs | 1963 ++++++++++++++ - .../{nix => nix-0.15.0}/src/errno_dragonfly.c | 0 - third_party/rust/nix-0.15.0/src/fcntl.rs | 506 ++++ - third_party/rust/nix-0.15.0/src/features.rs | 103 + - third_party/rust/nix-0.15.0/src/ifaddrs.rs | 146 + - third_party/rust/nix-0.15.0/src/kmod.rs | 123 + - third_party/rust/nix-0.15.0/src/lib.rs | 284 ++ - third_party/rust/nix-0.15.0/src/macros.rs | 264 ++ - third_party/rust/nix-0.15.0/src/mount.rs | 98 + - third_party/rust/nix-0.15.0/src/mqueue.rs | 162 ++ - third_party/rust/nix-0.15.0/src/net/if_.rs | 268 ++ - third_party/rust/nix-0.15.0/src/net/mod.rs | 4 + - third_party/rust/nix-0.15.0/src/poll.rs | 143 + - third_party/rust/nix-0.15.0/src/pty.rs | 326 +++ - third_party/rust/nix-0.15.0/src/sched.rs | 147 + - third_party/rust/nix-0.15.0/src/sys/aio.rs | 1280 +++++++++ - third_party/rust/nix-0.15.0/src/sys/epoll.rs | 109 + - third_party/rust/nix-0.15.0/src/sys/event.rs | 351 +++ - .../rust/nix-0.15.0/src/sys/eventfd.rs | 18 + - .../rust/nix-0.15.0/src/sys/inotify.rs | 230 ++ - .../rust/nix-0.15.0/src/sys/ioctl/bsd.rs | 102 + - .../rust/nix-0.15.0/src/sys/ioctl/linux.rs | 140 + - .../rust/nix-0.15.0/src/sys/ioctl/mod.rs | 778 ++++++ - third_party/rust/nix-0.15.0/src/sys/memfd.rs | 20 + - third_party/rust/nix-0.15.0/src/sys/mman.rs | 325 +++ - third_party/rust/nix-0.15.0/src/sys/mod.rs | 100 + - .../rust/nix-0.15.0/src/sys/pthread.rs | 13 + - .../rust/nix-0.15.0/src/sys/ptrace/bsd.rs | 170 ++ - .../rust/nix-0.15.0/src/sys/ptrace/linux.rs | 402 +++ - .../rust/nix-0.15.0/src/sys/ptrace/mod.rs | 22 + - third_party/rust/nix-0.15.0/src/sys/quota.rs | 273 ++ - third_party/rust/nix-0.15.0/src/sys/reboot.rs | 45 + - third_party/rust/nix-0.15.0/src/sys/select.rs | 334 +++ - .../rust/nix-0.15.0/src/sys/sendfile.rs | 200 ++ - third_party/rust/nix-0.15.0/src/sys/signal.rs | 966 +++++++ - .../rust/nix-0.15.0/src/sys/signalfd.rs | 170 ++ - .../rust/nix-0.15.0/src/sys/socket/addr.rs | 1278 +++++++++ - .../rust/nix-0.15.0/src/sys/socket/mod.rs | 1294 +++++++++ - .../rust/nix-0.15.0/src/sys/socket/sockopt.rs | 680 +++++ - third_party/rust/nix-0.15.0/src/sys/stat.rs | 294 ++ - third_party/rust/nix-0.15.0/src/sys/statfs.rs | 548 ++++ - .../rust/nix-0.15.0/src/sys/statvfs.rs | 160 ++ - .../rust/nix-0.15.0/src/sys/sysinfo.rs | 72 + - .../rust/nix-0.15.0/src/sys/termios.rs | 1107 ++++++++ - third_party/rust/nix-0.15.0/src/sys/time.rs | 542 ++++ - third_party/rust/nix-0.15.0/src/sys/uio.rs | 194 ++ - .../rust/nix-0.15.0/src/sys/utsname.rs | 67 + - third_party/rust/nix-0.15.0/src/sys/wait.rs | 239 ++ - third_party/rust/nix-0.15.0/src/ucontext.rs | 39 + - third_party/rust/nix-0.15.0/src/unistd.rs | 2394 +++++++++++++++++ - third_party/rust/nix-0.15.0/test/sys/mod.rs | 38 + - .../rust/nix-0.15.0/test/sys/test_aio.rs | 654 +++++ - .../rust/nix-0.15.0/test/sys/test_aio_drop.rs | 32 + - .../rust/nix-0.15.0/test/sys/test_epoll.rs | 24 + - .../rust/nix-0.15.0/test/sys/test_inotify.rs | 65 + - .../rust/nix-0.15.0/test/sys/test_ioctl.rs | 334 +++ - .../test/sys/test_lio_listio_resubmit.rs | 111 + - .../rust/nix-0.15.0/test/sys/test_pthread.rs | 15 + - .../rust/nix-0.15.0/test/sys/test_ptrace.rs | 107 + - .../rust/nix-0.15.0/test/sys/test_select.rs | 54 + - .../rust/nix-0.15.0/test/sys/test_signal.rs | 104 + - .../rust/nix-0.15.0/test/sys/test_signalfd.rs | 25 + - .../rust/nix-0.15.0/test/sys/test_socket.rs | 1066 ++++++++ - .../rust/nix-0.15.0/test/sys/test_sockopt.rs | 53 + - .../rust/nix-0.15.0/test/sys/test_sysinfo.rs | 18 + - .../rust/nix-0.15.0/test/sys/test_termios.rs | 136 + - .../rust/nix-0.15.0/test/sys/test_uio.rs | 241 ++ - .../rust/nix-0.15.0/test/sys/test_wait.rs | 104 + - third_party/rust/nix-0.15.0/test/test.rs | 149 + - third_party/rust/nix-0.15.0/test/test_dir.rs | 46 + - .../rust/nix-0.15.0/test/test_fcntl.rs | 234 ++ - .../test/test_kmod/hello_mod/Makefile | 7 + - .../test/test_kmod/hello_mod/hello.c | 26 + - .../rust/nix-0.15.0/test/test_kmod/mod.rs | 166 ++ - .../rust/nix-0.15.0/test/test_mount.rs | 238 ++ - third_party/rust/nix-0.15.0/test/test_mq.rs | 152 ++ - third_party/rust/nix-0.15.0/test/test_net.rs | 12 + - .../rust/nix-0.15.0/test/test_nix_path.rs | 0 - third_party/rust/nix-0.15.0/test/test_poll.rs | 50 + - third_party/rust/nix-0.15.0/test/test_pty.rs | 235 ++ - .../nix-0.15.0/test/test_ptymaster_drop.rs | 21 + - .../rust/nix-0.15.0/test/test_sendfile.rs | 129 + - third_party/rust/nix-0.15.0/test/test_stat.rs | 296 ++ - .../rust/nix-0.15.0/test/test_unistd.rs | 669 +++++ - third_party/rust/nix/.cargo-checksum.json | 2 +- - third_party/rust/nix/CHANGELOG.md | 306 ++- - third_party/rust/nix/CONTRIBUTING.md | 10 +- - third_party/rust/nix/CONVENTIONS.md | 9 +- - third_party/rust/nix/Cargo.toml | 40 +- - third_party/rust/nix/README.md | 22 +- - third_party/rust/nix/src/dir.rs | 99 +- - third_party/rust/nix/src/env.rs | 53 + - third_party/rust/nix/src/errno.rs | 480 +++- - third_party/rust/nix/src/fcntl.rs | 268 +- - third_party/rust/nix/src/features.rs | 7 +- - third_party/rust/nix/src/ifaddrs.rs | 29 +- - third_party/rust/nix/src/kmod.rs | 4 +- - third_party/rust/nix/src/lib.rs | 74 +- - third_party/rust/nix/src/macros.rs | 79 +- - third_party/rust/nix/src/mount.rs | 43 +- - third_party/rust/nix/src/mqueue.rs | 65 +- - third_party/rust/nix/src/net/if_.rs | 3 +- - third_party/rust/nix/src/poll.rs | 29 +- - third_party/rust/nix/src/pty.rs | 80 +- - third_party/rust/nix/src/sched.rs | 104 +- - third_party/rust/nix/src/sys/aio.rs | 44 +- - third_party/rust/nix/src/sys/epoll.rs | 8 +- - third_party/rust/nix/src/sys/event.rs | 45 +- - third_party/rust/nix/src/sys/eventfd.rs | 4 +- - third_party/rust/nix/src/sys/inotify.rs | 37 +- - third_party/rust/nix/src/sys/ioctl/bsd.rs | 4 +- - third_party/rust/nix/src/sys/ioctl/linux.rs | 3 +- - third_party/rust/nix/src/sys/ioctl/mod.rs | 12 +- - third_party/rust/nix/src/sys/memfd.rs | 4 +- - third_party/rust/nix/src/sys/mman.rs | 136 +- - third_party/rust/nix/src/sys/mod.rs | 10 + - third_party/rust/nix/src/sys/personality.rs | 70 + - third_party/rust/nix/src/sys/ptrace/bsd.rs | 25 +- - third_party/rust/nix/src/sys/ptrace/linux.rs | 164 +- - third_party/rust/nix/src/sys/quota.rs | 16 +- - third_party/rust/nix/src/sys/reboot.rs | 8 +- - third_party/rust/nix/src/sys/select.rs | 140 +- - third_party/rust/nix/src/sys/sendfile.rs | 11 +- - third_party/rust/nix/src/sys/signal.rs | 300 ++- - third_party/rust/nix/src/sys/signalfd.rs | 28 +- - third_party/rust/nix/src/sys/socket/addr.rs | 205 +- - third_party/rust/nix/src/sys/socket/mod.rs | 930 +++++-- - .../rust/nix/src/sys/socket/sockopt.rs | 117 +- - third_party/rust/nix/src/sys/stat.rs | 39 +- - third_party/rust/nix/src/sys/statfs.rs | 216 +- - third_party/rust/nix/src/sys/statvfs.rs | 21 +- - third_party/rust/nix/src/sys/sysinfo.rs | 19 +- - third_party/rust/nix/src/sys/termios.rs | 217 +- - third_party/rust/nix/src/sys/time.rs | 79 +- - third_party/rust/nix/src/sys/timerfd.rs | 285 ++ - third_party/rust/nix/src/sys/uio.rs | 18 +- - third_party/rust/nix/src/sys/utsname.rs | 8 +- - third_party/rust/nix/src/sys/wait.rs | 43 +- - third_party/rust/nix/src/time.rs | 260 ++ - third_party/rust/nix/src/ucontext.rs | 25 +- - third_party/rust/nix/src/unistd.rs | 809 ++++-- - third_party/rust/nix/test/common/mod.rs | 127 + - third_party/rust/nix/test/sys/mod.rs | 7 + - third_party/rust/nix/test/sys/test_aio.rs | 104 +- - .../rust/nix/test/sys/test_aio_drop.rs | 4 +- - third_party/rust/nix/test/sys/test_ioctl.rs | 55 +- - .../nix/test/sys/test_lio_listio_resubmit.rs | 4 - - third_party/rust/nix/test/sys/test_mman.rs | 80 + - third_party/rust/nix/test/sys/test_pthread.rs | 4 +- - third_party/rust/nix/test/sys/test_ptrace.rs | 79 +- - third_party/rust/nix/test/sys/test_select.rs | 2 +- - third_party/rust/nix/test/sys/test_signal.rs | 25 +- - .../rust/nix/test/sys/test_signalfd.rs | 6 +- - third_party/rust/nix/test/sys/test_socket.rs | 555 +++- - third_party/rust/nix/test/sys/test_sockopt.rs | 43 + - third_party/rust/nix/test/sys/test_termios.rs | 22 +- - third_party/rust/nix/test/sys/test_timerfd.rs | 61 + - third_party/rust/nix/test/sys/test_uio.rs | 12 +- - third_party/rust/nix/test/sys/test_wait.rs | 21 +- - third_party/rust/nix/test/test.rs | 71 +- - third_party/rust/nix/test/test_clearenv.rs | 9 + - third_party/rust/nix/test/test_dir.rs | 7 +- - third_party/rust/nix/test/test_fcntl.rs | 199 +- - third_party/rust/nix/test/test_kmod/mod.rs | 31 +- - third_party/rust/nix/test/test_mount.rs | 7 +- - third_party/rust/nix/test/test_mq.rs | 28 +- - third_party/rust/nix/test/test_poll.rs | 27 +- - third_party/rust/nix/test/test_pty.rs | 104 +- - .../rust/nix/test/test_ptymaster_drop.rs | 41 +- - third_party/rust/nix/test/test_sched.rs | 32 + - third_party/rust/nix/test/test_stat.rs | 61 +- - third_party/rust/nix/test/test_time.rs | 56 + - third_party/rust/nix/test/test_unistd.rs | 575 +++- - 226 files changed, 33484 insertions(+), 3322 deletions(-) - create mode 100644 third_party/rust/bitflags/build.rs - delete mode 100644 third_party/rust/bitflags/tests/basic.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-fail/impls/copy.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-fail/impls/copy.stderr.beta - delete mode 100644 third_party/rust/bitflags/tests/compile-fail/impls/eq.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-fail/impls/eq.stderr.beta - delete mode 100644 third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_defined.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_defined.stderr.beta - delete mode 100644 third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_missing.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_missing.stderr.beta - delete mode 100644 third_party/rust/bitflags/tests/compile-fail/visibility/private_field.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-fail/visibility/private_field.stderr.beta - delete mode 100644 third_party/rust/bitflags/tests/compile-fail/visibility/private_flags.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-fail/visibility/private_flags.stderr.beta - delete mode 100644 third_party/rust/bitflags/tests/compile-fail/visibility/pub_const.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-fail/visibility/pub_const.stderr.beta - delete mode 100644 third_party/rust/bitflags/tests/compile-pass/impls/convert.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-pass/impls/default.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-pass/impls/inherent_methods.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-pass/redefinition/core.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-pass/redefinition/stringify.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-pass/repr/c.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-pass/repr/transparent.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-pass/visibility/bits_field.rs - delete mode 100644 third_party/rust/bitflags/tests/compile-pass/visibility/pub_in.rs - delete mode 100644 third_party/rust/bitflags/tests/compile.rs - create mode 100644 third_party/rust/nix-0.15.0/.cargo-checksum.json - create mode 100644 third_party/rust/nix-0.15.0/CHANGELOG.md - create mode 100644 third_party/rust/nix-0.15.0/CONTRIBUTING.md - create mode 100644 third_party/rust/nix-0.15.0/CONVENTIONS.md - create mode 100644 third_party/rust/nix-0.15.0/Cargo.toml - create mode 100644 third_party/rust/nix-0.15.0/LICENSE - create mode 100644 third_party/rust/nix-0.15.0/README.md - rename third_party/rust/{nix => nix-0.15.0}/build.rs (100%) - create mode 100644 third_party/rust/nix-0.15.0/src/dir.rs - create mode 100644 third_party/rust/nix-0.15.0/src/errno.rs - rename third_party/rust/{nix => nix-0.15.0}/src/errno_dragonfly.c (100%) - create mode 100644 third_party/rust/nix-0.15.0/src/fcntl.rs - create mode 100644 third_party/rust/nix-0.15.0/src/features.rs - create mode 100644 third_party/rust/nix-0.15.0/src/ifaddrs.rs - create mode 100644 third_party/rust/nix-0.15.0/src/kmod.rs - create mode 100644 third_party/rust/nix-0.15.0/src/lib.rs - create mode 100644 third_party/rust/nix-0.15.0/src/macros.rs - create mode 100644 third_party/rust/nix-0.15.0/src/mount.rs - create mode 100644 third_party/rust/nix-0.15.0/src/mqueue.rs - create mode 100644 third_party/rust/nix-0.15.0/src/net/if_.rs - create mode 100644 third_party/rust/nix-0.15.0/src/net/mod.rs - create mode 100644 third_party/rust/nix-0.15.0/src/poll.rs - create mode 100644 third_party/rust/nix-0.15.0/src/pty.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sched.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/aio.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/epoll.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/event.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/eventfd.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/inotify.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/ioctl/bsd.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/ioctl/linux.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/ioctl/mod.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/memfd.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/mman.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/mod.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/pthread.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/ptrace/bsd.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/ptrace/linux.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/ptrace/mod.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/quota.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/reboot.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/select.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/sendfile.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/signal.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/signalfd.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/socket/addr.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/socket/mod.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/socket/sockopt.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/stat.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/statfs.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/statvfs.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/sysinfo.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/termios.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/time.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/uio.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/utsname.rs - create mode 100644 third_party/rust/nix-0.15.0/src/sys/wait.rs - create mode 100644 third_party/rust/nix-0.15.0/src/ucontext.rs - create mode 100644 third_party/rust/nix-0.15.0/src/unistd.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/mod.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_aio.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_aio_drop.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_epoll.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_inotify.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_ioctl.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_lio_listio_resubmit.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_pthread.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_ptrace.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_select.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_signal.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_signalfd.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_socket.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_sockopt.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_sysinfo.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_termios.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_uio.rs - create mode 100644 third_party/rust/nix-0.15.0/test/sys/test_wait.rs - create mode 100644 third_party/rust/nix-0.15.0/test/test.rs - create mode 100644 third_party/rust/nix-0.15.0/test/test_dir.rs - create mode 100644 third_party/rust/nix-0.15.0/test/test_fcntl.rs - create mode 100644 third_party/rust/nix-0.15.0/test/test_kmod/hello_mod/Makefile - create mode 100644 third_party/rust/nix-0.15.0/test/test_kmod/hello_mod/hello.c - create mode 100644 third_party/rust/nix-0.15.0/test/test_kmod/mod.rs - create mode 100644 third_party/rust/nix-0.15.0/test/test_mount.rs - create mode 100644 third_party/rust/nix-0.15.0/test/test_mq.rs - create mode 100644 third_party/rust/nix-0.15.0/test/test_net.rs - create mode 100644 third_party/rust/nix-0.15.0/test/test_nix_path.rs - create mode 100644 third_party/rust/nix-0.15.0/test/test_poll.rs - create mode 100644 third_party/rust/nix-0.15.0/test/test_pty.rs - create mode 100644 third_party/rust/nix-0.15.0/test/test_ptymaster_drop.rs - create mode 100644 third_party/rust/nix-0.15.0/test/test_sendfile.rs - create mode 100644 third_party/rust/nix-0.15.0/test/test_stat.rs - create mode 100644 third_party/rust/nix-0.15.0/test/test_unistd.rs - create mode 100644 third_party/rust/nix/src/env.rs - create mode 100644 third_party/rust/nix/src/sys/personality.rs - create mode 100644 third_party/rust/nix/src/sys/timerfd.rs - create mode 100644 third_party/rust/nix/src/time.rs - create mode 100644 third_party/rust/nix/test/common/mod.rs - create mode 100644 third_party/rust/nix/test/sys/test_mman.rs - create mode 100644 third_party/rust/nix/test/sys/test_timerfd.rs - create mode 100644 third_party/rust/nix/test/test_clearenv.rs - create mode 100644 third_party/rust/nix/test/test_sched.rs - create mode 100644 third_party/rust/nix/test/test_time.rs - -diff --git a/Cargo.lock b/Cargo.lock -index edc5ef5ff2d98..f6240163e1440 100644 ---- a/Cargo.lock -+++ b/Cargo.lock -@@ -25,14 +25,14 @@ dependencies = [ - - [[package]] - name = "alsa" --version = "0.4.3" -+version = "0.5.0" - source = "registry+https://github.com/rust-lang/crates.io-index" --checksum = "eb213f6b3e4b1480a60931ca2035794aa67b73103d254715b1db7b70dcb3c934" -+checksum = "75c4da790adcb2ce5e758c064b4f3ec17a30349f9961d3e5e6c9688b052a9e18" - dependencies = [ - "alsa-sys", - "bitflags", - "libc", -- "nix", -+ "nix 0.20.2", - ] - - [[package]] -@@ -427,9 +427,9 @@ checksum = "349f9b6a179ed607305526ca489b34ad0a41aed5f7980fa90eb03160b69598fb" - - [[package]] - name = "bitflags" --version = "1.3.2" -+version = "1.2.1" - source = "registry+https://github.com/rust-lang/crates.io-index" --checksum = "bef38d45163c2f1dde094a7dfd33ccf595c92905c8f8f4fdc18d06fb1037718a" -+checksum = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693" - - [[package]] - name = "bitflags_serde_shim" -@@ -3073,7 +3073,7 @@ dependencies = [ - [[package]] - name = "midir" - version = "0.7.0" --source = "git+https://github.com/mozilla/midir.git?rev=4c11f0ffb5d6a10de4aff40a7b81218b33b94e6f#4c11f0ffb5d6a10de4aff40a7b81218b33b94e6f" -+source = "git+https://github.com/makotokato/midir.git?rev=6140b2825dd4dc2b40e49e154ca7596e7b9a131a#6140b2825dd4dc2b40e49e154ca7596e7b9a131a" - dependencies = [ - "alsa", - "bitflags", -@@ -3081,7 +3081,7 @@ dependencies = [ - "js-sys", - "libc", - "memalloc", -- "nix", -+ "nix 0.20.2", - "wasm-bindgen", - "web-sys", - "winapi", -@@ -3123,7 +3123,7 @@ dependencies = [ - "libc", - "memmap2 0.2.3", - "memoffset 0.5.6", -- "nix", -+ "nix 0.15.0", - "tempfile", - "thiserror", - ] -@@ -3535,6 +3535,19 @@ dependencies = [ - "void", - ] - -+[[package]] -+name = "nix" -+version = "0.20.2" -+source = "registry+https://github.com/rust-lang/crates.io-index" -+checksum = "f5e06129fb611568ef4e868c14b326274959aa70ff7776e9d55323531c374945" -+dependencies = [ -+ "bitflags", -+ "cc", -+ "cfg-if 1.0.0", -+ "libc", -+ "memoffset 0.6.5", -+] -+ - [[package]] - name = "nom" - version = "5.1.2" -diff --git a/Cargo.toml b/Cargo.toml -index 1c2437f1f5675..2923c7e5ea9bf 100644 ---- a/Cargo.toml 2022-03-10 14:19:47.963772765 +0800 -+++ b/Cargo.toml 2022-03-10 14:33:46.354649188 +0800 -@@ -103,13 +103,14 @@ - moz_asserts = { path = "mozglue/static/rust/moz_asserts" } - - # Other overrides -+authenticator = { git = "https://github.com/makotokato/authenticator-rs", rev="eed8919d50559f4959e2d7d2af7b4d48869b5366" } - async-task = { git = "https://github.com/smol-rs/async-task", rev="f6488e35beccb26eb6e85847b02aa78a42cd3d0e" } - chardetng = { git = "https://github.com/hsivonen/chardetng", rev="3484d3e3ebdc8931493aa5df4d7ee9360a90e76b" } - chardetng_c = { git = "https://github.com/hsivonen/chardetng_c", rev="ed8a4c6f900a90d4dbc1d64b856e61490a1c3570" } - coremidi = { git = "https://github.com/chris-zen/coremidi.git", rev="fc68464b5445caf111e41f643a2e69ccce0b4f83" } - libudev-sys = { path = "dom/webauthn/libudev-sys" } - packed_simd = { git = "https://github.com/hsivonen/packed_simd", rev="8b4bd7d8229660a749dbe419a57ea01df9de5453" } --midir = { git = "https://github.com/mozilla/midir.git", rev = "4c11f0ffb5d6a10de4aff40a7b81218b33b94e6f" } -+midir = { git = "https://github.com/makotokato/midir.git", rev = "6140b2825dd4dc2b40e49e154ca7596e7b9a131a" } - minidump_writer_linux = { git = "https://github.com/msirringhaus/minidump_writer_linux.git", rev = "029ac0d54b237f27dc7d8d4e51bc0fb076e5e852" } - - # Patch mio 0.6 to use winapi 0.3 and miow 0.3, getting rid of winapi 0.2. - -diff --git a/third_party/rust/alsa/.cargo-checksum.json b/third_party/rust/alsa/.cargo-checksum.json -index 17227c0a74d16..2bd6b2e2ce47b 100644 ---- a/third_party/rust/alsa/.cargo-checksum.json -+++ b/third_party/rust/alsa/.cargo-checksum.json -@@ -1 +1 @@ --{"files":{"Cargo.toml":"5c7a276dd872b47ff86f892e5d8991f38fbe3d61b64eb7138a4ee7ed43d437b7","README.md":"4ccf86e184eda628989919a15560c1ada2c00808cf34740f6e8de466338a1d48","src/card.rs":"f49c6cd6afb83848d34ce7a2e71ede2741ef60262d073be631347871c2768401","src/chmap.rs":"c639f9018fe7d49179a64b73d4f7ef418483c7b150b7edba61d81963c4056770","src/ctl_int.rs":"ebff40ad723a62632ed59840c15c4ec8e4cea2053e4f61d49bdae95e7a74da70","src/device_name.rs":"1e8ad5efbca9c4f062289213e3de8c3429d97a4acf6312c2016553b06e7fa57b","src/direct.rs":"fbd40addd2458bb0b3e856e5b0225fd24dc0ad46ce3662aef12635cf34ef7f55","src/direct/asound_ioctl.rs":"27c8935a0e7bd6e1925d947411c37ca81befba60468a6f2206da9fb08805be89","src/direct/ffi.rs":"aeb0871bd764198558557b5af1a1f6038efe8c8a400d77b4ddfc91143029ac90","src/direct/pcm.rs":"a258e7ba908ef6a2d7d0851ce5279ccc9f7b1579511f48550927fbe4306edaae","src/error.rs":"c8e9839123d760d49b58f46574445550c2c48b90c738b4daaf48aab8dd9a205f","src/hctl.rs":"cc33947cb0810d3edeec7b71686f0231d06c88b4214994605de7f4fd0f6de1a1","src/io.rs":"a6e21b94a265b7de56388e035b104877c8b6a0f5d10002c5931dacc90dd577fd","src/lib.rs":"df35e75bb2d83ddddcc90f4ed76e4bcef6843b3b2be09d9b8197c9ede564fbdf","src/mixer.rs":"d6610712f80eb4fd292d5b6e1d10723dfb245be4d85d0370a675034d83010e75","src/pcm.rs":"4259a5b33421e0b144de59da938af1ff1f70a1a3f6e0d2ab665dda4b94441d8c","src/poll.rs":"a6472dbcc96bcbdcc574563f305550df66870e48820d5e90609b0f105d12bb07","src/rawmidi.rs":"ca891bf1cd43ad59b1657efd58356f78ea476d5de999ed756eba74b729f0c184","src/seq.rs":"d229b36f12bf0161c87e0820fd4a3313f19718790e38e0b6294b7e6b1123c611"},"package":"eb213f6b3e4b1480a60931ca2035794aa67b73103d254715b1db7b70dcb3c934"} -\ No newline at end of file -+{"files":{"Cargo.toml":"e057013b541a2bcf1d2b7aa79a2860fec402dad4ae434a66ad2cf1f4e40d31b9","README.md":"4ccf86e184eda628989919a15560c1ada2c00808cf34740f6e8de466338a1d48","src/card.rs":"f49c6cd6afb83848d34ce7a2e71ede2741ef60262d073be631347871c2768401","src/chmap.rs":"c639f9018fe7d49179a64b73d4f7ef418483c7b150b7edba61d81963c4056770","src/ctl_int.rs":"ebff40ad723a62632ed59840c15c4ec8e4cea2053e4f61d49bdae95e7a74da70","src/device_name.rs":"1e8ad5efbca9c4f062289213e3de8c3429d97a4acf6312c2016553b06e7fa57b","src/direct.rs":"fbd40addd2458bb0b3e856e5b0225fd24dc0ad46ce3662aef12635cf34ef7f55","src/direct/asound_ioctl.rs":"27c8935a0e7bd6e1925d947411c37ca81befba60468a6f2206da9fb08805be89","src/direct/ffi.rs":"aeb0871bd764198558557b5af1a1f6038efe8c8a400d77b4ddfc91143029ac90","src/direct/pcm.rs":"e8d464f08405e4edfc35be12d715012b3c765093794dd8fafc8991a5f4367c67","src/error.rs":"b37d9958dd200362c44d7015d1b03813efec183c9c76168f2608d1e798035ea1","src/hctl.rs":"cc33947cb0810d3edeec7b71686f0231d06c88b4214994605de7f4fd0f6de1a1","src/io.rs":"a6e21b94a265b7de56388e035b104877c8b6a0f5d10002c5931dacc90dd577fd","src/lib.rs":"b1235da87167b3a329b5a1a1d8670db0ab411676c0cdb2bfd1b8884bca34f469","src/mixer.rs":"a358bb2ad1db787348c29cdfeda339c4cd16c5a85f5cea8d7e0e9dda8335cbbd","src/pcm.rs":"6c5c87c9d959626d717c6e0e6f13248a56297a0cb390ab0e58d27ca7ad901cac","src/poll.rs":"a6472dbcc96bcbdcc574563f305550df66870e48820d5e90609b0f105d12bb07","src/rawmidi.rs":"ca891bf1cd43ad59b1657efd58356f78ea476d5de999ed756eba74b729f0c184","src/seq.rs":"d229b36f12bf0161c87e0820fd4a3313f19718790e38e0b6294b7e6b1123c611"},"package":"75c4da790adcb2ce5e758c064b4f3ec17a30349f9961d3e5e6c9688b052a9e18"} -\ No newline at end of file -diff --git a/third_party/rust/alsa/Cargo.toml b/third_party/rust/alsa/Cargo.toml -index c7578fb0785b9..b4af1a6dae284 100644 ---- a/third_party/rust/alsa/Cargo.toml -+++ b/third_party/rust/alsa/Cargo.toml -@@ -13,7 +13,7 @@ - [package] - edition = "2018" - name = "alsa" --version = "0.4.3" -+version = "0.5.0" - authors = ["David Henningsson <diwic@ubuntu.com>"] - description = "Thin but safe wrappers for ALSA (Linux sound API)" - documentation = "http://docs.rs/alsa" -@@ -23,16 +23,16 @@ categories = ["multimedia::audio", "api-bindings"] - license = "Apache-2.0/MIT" - repository = "https://github.com/diwic/alsa-rs" - [dependencies.alsa-sys] --version = "0.3.0" -+version = "0.3.1" - - [dependencies.bitflags] - version = "1.2.1" - - [dependencies.libc] --version = "0.2.65" -+version = "0.2.88" - - [dependencies.nix] --version = "0.15" -+version = "0.20" - [badges.is-it-maintained-issue-resolution] - repository = "diwic/alsa-rs" - -diff --git a/third_party/rust/alsa/src/direct/pcm.rs b/third_party/rust/alsa/src/direct/pcm.rs -index 13a16a993b030..f248a70c67031 100644 ---- a/third_party/rust/alsa/src/direct/pcm.rs -+++ b/third_party/rust/alsa/src/direct/pcm.rs -@@ -19,7 +19,7 @@ don't expect it to work with, e g, the PulseAudio plugin or so. - For an example of how to use this mode, look in the "synth-example" directory. - */ - --use {libc, nix}; -+use libc; - use std::{mem, ptr, fmt, cmp}; - use crate::error::{Error, Result}; - use std::os::unix::io::RawFd; -diff --git a/third_party/rust/alsa/src/error.rs b/third_party/rust/alsa/src/error.rs -index 4711b0fd2016d..25089c4cbd1d7 100644 ---- a/third_party/rust/alsa/src/error.rs -+++ b/third_party/rust/alsa/src/error.rs -@@ -3,7 +3,6 @@ - use libc::{c_void, c_int, c_char, free}; - use std::{fmt, ptr, str}; - use std::ffi::CStr; --use nix; - use std::error::Error as StdError; - - /// ALSA error -diff --git a/third_party/rust/alsa/src/lib.rs b/third_party/rust/alsa/src/lib.rs -index cf172cb6c60c6..b1a98df7804f3 100644 ---- a/third_party/rust/alsa/src/lib.rs -+++ b/third_party/rust/alsa/src/lib.rs -@@ -18,7 +18,7 @@ extern crate libc; - #[macro_use] - extern crate bitflags; - #[macro_use] --extern crate nix; -+extern crate nix as nix_the_crate; - - macro_rules! alsa_enum { - ($(#[$attr:meta])+ $name:ident, $static_name:ident [$count:expr], $( $a:ident = $b:ident),* ,) => -@@ -125,3 +125,9 @@ pub use crate::io::Output; - mod chmap; - - pub mod direct; -+ -+/// Re-exports from the nix crate. -+pub mod nix { -+ pub use nix_the_crate::Error; -+ pub use nix_the_crate::errno; -+} -diff --git a/third_party/rust/alsa/src/mixer.rs b/third_party/rust/alsa/src/mixer.rs -index cb16247a85b62..834aafaf35c18 100644 ---- a/third_party/rust/alsa/src/mixer.rs -+++ b/third_party/rust/alsa/src/mixer.rs -@@ -112,11 +112,19 @@ impl ops::Add for MilliBel { - fn add(self, rhs: Self) -> Self { MilliBel(self.0 + rhs.0) } - } - -+impl ops::AddAssign for MilliBel { -+ fn add_assign(&mut self, rhs: Self) { self.0 += rhs.0 } -+} -+ - impl ops::Sub for MilliBel { - type Output = MilliBel; - fn sub(self, rhs: Self) -> Self { MilliBel(self.0 - rhs.0) } - } - -+impl ops::SubAssign for MilliBel { -+ fn sub_assign(&mut self, rhs: Self) { self.0 -= rhs.0 } -+} -+ - /// Wraps [snd_mixer_elem_t](http://www.alsa-project.org/alsa-doc/alsa-lib/group___mixer.html) - #[derive(Copy, Clone, Debug)] - pub struct Elem<'a>{ -diff --git a/third_party/rust/alsa/src/pcm.rs b/third_party/rust/alsa/src/pcm.rs -index 359b44c6db2cb..5696df9dc691e 100644 ---- a/third_party/rust/alsa/src/pcm.rs -+++ b/third_party/rust/alsa/src/pcm.rs -@@ -174,8 +174,7 @@ impl PCM { - } - - pub fn status(&self) -> Result<Status> { -- let z = Status::new(); -- acheck!(snd_pcm_status(self.0, z.ptr())).map(|_| z) -+ StatusBuilder::new().build(self) - } - - fn verify_format(&self, f: Format) -> Result<()> { -@@ -416,6 +415,7 @@ alsa_enum!( - ); - - alsa_enum!( -+ #[non_exhaustive] - /// [SND_PCM_FORMAT_xxx](http://www.alsa-project.org/alsa-doc/alsa-lib/group___p_c_m.html) constants - Format, ALL_FORMATS[48], - -@@ -470,21 +470,21 @@ alsa_enum!( - ); - - impl Format { -- pub fn s16() -> Format { <i16 as IoFormat>::FORMAT } -- pub fn u16() -> Format { <u16 as IoFormat>::FORMAT } -- pub fn s32() -> Format { <i32 as IoFormat>::FORMAT } -- pub fn u32() -> Format { <u32 as IoFormat>::FORMAT } -- pub fn float() -> Format { <f32 as IoFormat>::FORMAT } -- pub fn float64() -> Format { <f64 as IoFormat>::FORMAT } -+ pub const fn s16() -> Format { <i16 as IoFormat>::FORMAT } -+ pub const fn u16() -> Format { <u16 as IoFormat>::FORMAT } -+ pub const fn s32() -> Format { <i32 as IoFormat>::FORMAT } -+ pub const fn u32() -> Format { <u32 as IoFormat>::FORMAT } -+ pub const fn float() -> Format { <f32 as IoFormat>::FORMAT } -+ pub const fn float64() -> Format { <f64 as IoFormat>::FORMAT } - -- #[cfg(target_endian = "little")] pub fn s24() -> Format { Format::S24LE } -- #[cfg(target_endian = "big")] pub fn s24() -> Format { Format::S24BE } -+ #[cfg(target_endian = "little")] pub const fn s24() -> Format { Format::S24LE } -+ #[cfg(target_endian = "big")] pub const fn s24() -> Format { Format::S24BE } - -- #[cfg(target_endian = "little")] pub fn u24() -> Format { Format::U24LE } -- #[cfg(target_endian = "big")] pub fn u24() -> Format { Format::U24BE } -+ #[cfg(target_endian = "little")] pub const fn u24() -> Format { Format::U24LE } -+ #[cfg(target_endian = "big")] pub const fn u24() -> Format { Format::U24BE } - -- #[cfg(target_endian = "little")] pub fn iec958_subframe() -> Format { Format::IEC958SubframeLE } -- #[cfg(target_endian = "big")] pub fn iec958_subframe() -> Format { Format::IEC958SubframeBE } -+ #[cfg(target_endian = "little")] pub const fn iec958_subframe() -> Format { Format::IEC958SubframeLE } -+ #[cfg(target_endian = "big")] pub const fn iec958_subframe() -> Format { Format::IEC958SubframeBE } - } - - -@@ -769,6 +769,15 @@ impl<'a> HwParams<'a> { - unsafe { alsa::snd_pcm_hw_params_can_resume(self.0) != 0 } - } - -+ /// Returns true if the alsa stream supports the provided `AudioTstampType`, false if not. -+ /// -+ /// This function should only be called when the configuration space contains a single -+ /// configuration. Call `PCM::hw_params` to choose a single configuration from the -+ /// configuration space. -+ pub fn supports_audio_ts_type(&self, type_: AudioTstampType) -> bool { -+ unsafe { alsa::snd_pcm_hw_params_supports_audio_ts_type(self.0, type_ as libc::c_int) != 0 } -+ } -+ - pub fn dump(&self, o: &mut Output) -> Result<()> { - acheck!(snd_pcm_hw_params_dump(self.0, super::io::output_handle(o))).map(|_| ()) - } -@@ -923,6 +932,47 @@ impl Status { - } - } - -+/// Builder for [`Status`]. -+/// -+/// Allows setting the audio timestamp configuration before retrieving the -+/// status from the stream. -+pub struct StatusBuilder(Status); -+ -+impl StatusBuilder { -+ pub fn new() -> Self { -+ StatusBuilder(Status::new()) -+ } -+ -+ pub fn audio_htstamp_config( -+ self, -+ type_requested: AudioTstampType, -+ report_delay: bool, -+ ) -> Self { -+ let mut cfg: alsa::snd_pcm_audio_tstamp_config_t = unsafe { std::mem::zeroed() }; -+ cfg.set_type_requested(type_requested as _); -+ cfg.set_report_delay(report_delay as _); -+ unsafe { alsa::snd_pcm_status_set_audio_htstamp_config(self.0.ptr(), &mut cfg) }; -+ self -+ } -+ -+ pub fn build(self, pcm: &PCM) -> Result<Status> { -+ acheck!(snd_pcm_status(pcm.0, self.0.ptr())).map(|_| self.0) -+ } -+} -+ -+alsa_enum!( -+ #[non_exhaustive] -+ /// [SND_PCM_AUDIO_TSTAMP_TYPE_xxx](http://www.alsa-project.org/alsa-doc/alsa-lib/group___p_c_m.html) constants -+ AudioTstampType, ALL_AUDIO_TSTAMP_TYPES[6], -+ -+ Compat = SND_PCM_AUDIO_TSTAMP_TYPE_COMPAT, -+ Default = SND_PCM_AUDIO_TSTAMP_TYPE_DEFAULT, -+ Link = SND_PCM_AUDIO_TSTAMP_TYPE_LINK, -+ LinkAbsolute = SND_PCM_AUDIO_TSTAMP_TYPE_LINK_ABSOLUTE, -+ LinkEstimated = SND_PCM_AUDIO_TSTAMP_TYPE_LINK_ESTIMATED, -+ LinkSynchronized = SND_PCM_AUDIO_TSTAMP_TYPE_LINK_SYNCHRONIZED, -+); -+ - #[test] - fn info_from_default() { - use std::ffi::CString; -diff --git a/third_party/rust/bitflags/.cargo-checksum.json b/third_party/rust/bitflags/.cargo-checksum.json -index 7e8d470b53a37..a8b031c6517a2 100644 ---- a/third_party/rust/bitflags/.cargo-checksum.json -+++ b/third_party/rust/bitflags/.cargo-checksum.json -@@ -1 +1 @@ --{"files":{"CHANGELOG.md":"d362fc1fccaaf4d421bcf0fe8b80ddb4f625dade0c1ee52d08bd0b95509a49d1","CODE_OF_CONDUCT.md":"42634d0f6d922f49857175af991802822f7f920487aefa2ee250a50d12251a66","Cargo.toml":"87aced7532a7974eb37ab5fe6037f0abafc36d6b2d74891ecd2bf2f14f50d11e","LICENSE-APACHE":"a60eea817514531668d7e00765731449fe14d059d3249e0bc93b36de45f759f2","LICENSE-MIT":"6485b8ed310d3f0340bf1ad1f47645069ce4069dcc6bb46c7d5c6faf41de1fdb","README.md":"baa8604f8afb34fd93b9c79729daafb884dedcaf34023e4af8ad037d916061fd","src/example_generated.rs":"e43eb59e90f317f38d436670a6067d2fd9eb35fb319fe716184e4a04e24ed1b2","src/lib.rs":"e6477688535ee326d27238aeedc9cb4320ac35b9d17a4deda09e0587b0ccdbd4","tests/basic.rs":"146f1cbf6279bc609242cd3349f29cb21b41294f5e4921875f5ec95bd83529a2","tests/compile-fail/impls/copy.rs":"b791371237ddc75a7c04d2130e03b462c9c00a80dca08bd45aa97433d9c0d13a","tests/compile-fail/impls/copy.stderr.beta":"77d83484ce221d4b6ff2f7de843929a452d779fcfff428122710dd8218c298e3","tests/compile-fail/impls/eq.rs":"0cee8b9e07d537890e0189710293b53972d0fab63c09366f33c391065afafa99","tests/compile-fail/impls/eq.stderr.beta":"381fc6143d45ce76d7cecc47aa59cb69fe5e79c0b60a4a85d5c6163b400b3cc7","tests/compile-fail/non_integer_base/all_defined.rs":"95e14cad9e94560262f2862c3c01865ac30369b69da1001b0e7285cb55e6cb75","tests/compile-fail/non_integer_base/all_defined.stderr.beta":"1760739a276690903bb03844025587d37939f5dfcbfab309db3c86f32bdbf748","tests/compile-fail/non_integer_base/all_missing.rs":"b3d9da619d23213731ba2581aa7999c796c3c79aaf4f0ee6b11ceec08a11537f","tests/compile-fail/non_integer_base/all_missing.stderr.beta":"37e102290d3867e175b21976be798939f294efb17580d5b51e7b17b590d55132","tests/compile-fail/visibility/private_field.rs":"38e4d3fe6471829360d12c8d09b097f6a21aa93fb51eac3b215d96bdae23316b","tests/compile-fail/visibility/private_field.stderr.beta":"5aa24a3ebb39326f31927721c5017b8beb66c3e501fb865a3fa814c9763bfa0f","tests/compile-fail/visibility/private_flags.rs":"2ce4235802aa4e9c96c4e77d9e31d8401ef58dcda4741325184f0764ab1fe393","tests/compile-fail/visibility/private_flags.stderr.beta":"f3eb9f7baf2689258f3519ff7ee5c6ec3c237264ebcfe63f40c40f2023e5022f","tests/compile-fail/visibility/pub_const.rs":"8f813a97ac518c5ea8ac65b184101912452384afaf7b8d6c5e62f8370eca3c0a","tests/compile-fail/visibility/pub_const.stderr.beta":"823976ae1794d7f5372e2ec9aabba497e7bb88004722904c38da342ed98e8962","tests/compile-pass/impls/convert.rs":"88fe80bfb9cd5779f0e1d92c9ec02a8b6bb67e334c07f2309e9c0ba5ef776eb0","tests/compile-pass/impls/default.rs":"c508f9a461691f44b45142fa5ad599f02326e1de4c0cbca6c0593f4652eba109","tests/compile-pass/impls/inherent_methods.rs":"ecc26388e9a394bfa7a5bb69a5d621ab3d4d1e53f28f657bb8e78fe79f437913","tests/compile-pass/redefinition/core.rs":"ff5b6e72f87acc6ebb12405d3c0f6e3fa62e669933656a454bb63b30ea44179c","tests/compile-pass/redefinition/stringify.rs":"1edbce42b900c14425d7ffa14e83e165ebe452d7dccd8c0a8a821bdec64f5c93","tests/compile-pass/repr/c.rs":"6fda17f7c2edfcd155314579e83d0fc8a16209e400f1f9a5ca77bd9a799041f2","tests/compile-pass/repr/transparent.rs":"6cdc87a2137d8a4e0c8ce9b6cba83c82255f8ea125951bf614418685600489ce","tests/compile-pass/visibility/bits_field.rs":"1f3e5ba5a047440066a9f6bf7b7af33f5b06f6b1da3dd9af6886168199a7ea0a","tests/compile-pass/visibility/pub_in.rs":"e95312ff60966d42ec4bc00225507895a9b8ec24056ce6a9edd9145be35d730f","tests/compile.rs":"f27c67a7dd183ca30efea1b6e0880e3469a6dd63b92b1fd711c082df182c9eec"},"package":"bef38d45163c2f1dde094a7dfd33ccf595c92905c8f8f4fdc18d06fb1037718a"} -\ No newline at end of file -+{"files":{"CHANGELOG.md":"00224cc8d292567bdd212c36db66a1f662cd2e6c58e947900680234937e288a9","CODE_OF_CONDUCT.md":"42634d0f6d922f49857175af991802822f7f920487aefa2ee250a50d12251a66","Cargo.toml":"abacd42e33056c16008ab8eefd16eb2403cbc3393f8a6ed352a9a39d945ad3a5","LICENSE-APACHE":"a60eea817514531668d7e00765731449fe14d059d3249e0bc93b36de45f759f2","LICENSE-MIT":"6485b8ed310d3f0340bf1ad1f47645069ce4069dcc6bb46c7d5c6faf41de1fdb","README.md":"6b236f8b62c82f189fabce0756e01a2c0ab1f32cb84cad9ff3c96b2ce5282bda","build.rs":"8923f38056f859b30aa9022980bb517755cbef57e1b09c34b33b27eb03b0626c","src/example_generated.rs":"e43eb59e90f317f38d436670a6067d2fd9eb35fb319fe716184e4a04e24ed1b2","src/lib.rs":"bd4e44ac35831c75af8815ba3a11ee1659afe0f72ce9c5f638a66bf50aa23d2a"},"package":"cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693"} -\ No newline at end of file -diff --git a/third_party/rust/bitflags/CHANGELOG.md b/third_party/rust/bitflags/CHANGELOG.md -index 12fea1673ac30..0d4910153d909 100644 ---- a/third_party/rust/bitflags/CHANGELOG.md -+++ b/third_party/rust/bitflags/CHANGELOG.md -@@ -1,60 +1,3 @@ --# 1.3.2 -- --- Allow `non_snake_case` in generated flags types ([#256]) -- --[#252]: https://github.com/bitflags/bitflags/pull/256 -- --# 1.3.1 -- --- Revert unconditional `#[repr(transparent)]` ([#252]) -- --[#252]: https://github.com/bitflags/bitflags/pull/252 -- --# 1.3.0 (yanked) -- --- Add `#[repr(transparent)]` ([#187]) -- --- End `empty` doc comment with full stop ([#202]) -- --- Fix typo in crate root docs ([#206]) -- --- Document from_bits_unchecked unsafety ([#207]) -- --- Let `is_all` ignore extra bits ([#211]) -- --- Allows empty flag definition ([#225]) -- --- Making crate accessible from std ([#227]) -- --- Make `from_bits` a const fn ([#229]) -- --- Allow multiple bitflags structs in one macro invocation ([#235]) -- --- Add named functions to perform set operations ([#244]) -- --- Fix typos in method docs ([#245]) -- --- Modernization of the `bitflags` macro to take advantage of newer features and 2018 idioms ([#246]) -- --- Fix regression (in an unreleased feature) and simplify tests ([#247]) -- --- Use `Self` and fix bug when overriding `stringify!` ([#249]) -- --[#187]: https://github.com/bitflags/bitflags/pull/187 --[#202]: https://github.com/bitflags/bitflags/pull/202 --[#206]: https://github.com/bitflags/bitflags/pull/206 --[#207]: https://github.com/bitflags/bitflags/pull/207 --[#211]: https://github.com/bitflags/bitflags/pull/211 --[#225]: https://github.com/bitflags/bitflags/pull/225 --[#227]: https://github.com/bitflags/bitflags/pull/227 --[#229]: https://github.com/bitflags/bitflags/pull/229 --[#235]: https://github.com/bitflags/bitflags/pull/235 --[#244]: https://github.com/bitflags/bitflags/pull/244 --[#245]: https://github.com/bitflags/bitflags/pull/245 --[#246]: https://github.com/bitflags/bitflags/pull/246 --[#247]: https://github.com/bitflags/bitflags/pull/247 --[#249]: https://github.com/bitflags/bitflags/pull/249 -- - # 1.2.1 - - - Remove extraneous `#[inline]` attributes ([#194]) -diff --git a/third_party/rust/bitflags/Cargo.toml b/third_party/rust/bitflags/Cargo.toml -index 9d54c725a1c5d..b803644d44753 100644 ---- a/third_party/rust/bitflags/Cargo.toml -+++ b/third_party/rust/bitflags/Cargo.toml -@@ -11,11 +11,11 @@ - # will likely look very different (and much more reasonable) - - [package] --edition = "2018" - name = "bitflags" --version = "1.3.2" -+version = "1.2.1" - authors = ["The Rust Project Developers"] --exclude = ["bors.toml"] -+build = "build.rs" -+exclude = [".travis.yml", "appveyor.yml", "bors.toml"] - description = "A macro to generate structures which behave like bitflags.\n" - homepage = "https://github.com/bitflags/bitflags" - documentation = "https://docs.rs/bitflags" -@@ -26,33 +26,9 @@ license = "MIT/Apache-2.0" - repository = "https://github.com/bitflags/bitflags" - [package.metadata.docs.rs] - features = ["example_generated"] --[dependencies.compiler_builtins] --version = "0.1.2" --optional = true -- --[dependencies.core] --version = "1.0.0" --optional = true --package = "rustc-std-workspace-core" --[dev-dependencies.rustversion] --version = "1.0" -- --[dev-dependencies.serde] --version = "1.0" -- --[dev-dependencies.serde_derive] --version = "1.0" -- --[dev-dependencies.serde_json] --version = "1.0" -- --[dev-dependencies.trybuild] --version = "1.0" -- --[dev-dependencies.walkdir] --version = "2.3" - - [features] - default = [] - example_generated = [] --rustc-dep-of-std = ["core", "compiler_builtins"] -+[badges.travis-ci] -+repository = "bitflags/bitflags" -diff --git a/third_party/rust/bitflags/README.md b/third_party/rust/bitflags/README.md -index 0da0f853661b0..df12934c3e28a 100644 ---- a/third_party/rust/bitflags/README.md -+++ b/third_party/rust/bitflags/README.md -@@ -1,10 +1,11 @@ - bitflags - ======== - --[![Rust](https://github.com/bitflags/bitflags/workflows/Rust/badge.svg)](https://github.com/bitflags/bitflags/actions) -+[![Build Status](https://travis-ci.com/bitflags/bitflags.svg?branch=master)](https://travis-ci.com/bitflags/bitflags) - [![Join the chat at https://gitter.im/bitflags/Lobby](https://badges.gitter.im/Join%20Chat.svg)](https://gitter.im/bitflags/Lobby?utm_source=badge&utm_medium=badge&utm_content=badge) - [![Latest version](https://img.shields.io/crates/v/bitflags.svg)](https://crates.io/crates/bitflags) - [![Documentation](https://docs.rs/bitflags/badge.svg)](https://docs.rs/bitflags) -+![Minimum rustc version](https://img.shields.io/badge/rustc-1.20+-yellow.svg) - ![License](https://img.shields.io/crates/l/bitflags.svg) - - A Rust macro to generate structures which behave like a set of bitflags -@@ -18,15 +19,16 @@ Add this to your `Cargo.toml`: - - ```toml - [dependencies] --bitflags = "1.3" -+bitflags = "1.0" - ``` - --and this to your source code: -+and this to your crate root: - - ```rust --use bitflags::bitflags; -+#[macro_use] -+extern crate bitflags; - ``` - - ## Rust Version Support - --The minimum supported Rust version is 1.46 due to use of associated constants and const functions. -+The minimum supported Rust version is 1.20 due to use of associated constants. -diff --git a/third_party/rust/bitflags/build.rs b/third_party/rust/bitflags/build.rs -new file mode 100644 -index 0000000000000..985757a6f6126 ---- /dev/null -+++ b/third_party/rust/bitflags/build.rs -@@ -0,0 +1,44 @@ -+use std::env; -+use std::process::Command; -+use std::str::{self, FromStr}; -+ -+fn main(){ -+ let minor = match rustc_minor_version() { -+ Some(minor) => minor, -+ None => return, -+ }; -+ -+ // const fn stabilized in Rust 1.31: -+ if minor >= 31 { -+ println!("cargo:rustc-cfg=bitflags_const_fn"); -+ } -+} -+ -+fn rustc_minor_version() -> Option<u32> { -+ let rustc = match env::var_os("RUSTC") { -+ Some(rustc) => rustc, -+ None => return None, -+ }; -+ -+ let output = match Command::new(rustc).arg("--version").output() { -+ Ok(output) => output, -+ Err(_) => return None, -+ }; -+ -+ let version = match str::from_utf8(&output.stdout) { -+ Ok(version) => version, -+ Err(_) => return None, -+ }; -+ -+ let mut pieces = version.split('.'); -+ if pieces.next() != Some("rustc 1") { -+ return None; -+ } -+ -+ let next = match pieces.next() { -+ Some(next) => next, -+ None => return None, -+ }; -+ -+ u32::from_str(next).ok() -+} -\ No newline at end of file -diff --git a/third_party/rust/bitflags/src/lib.rs b/third_party/rust/bitflags/src/lib.rs -index 935e432f1701e..3929b02ac10d7 100644 ---- a/third_party/rust/bitflags/src/lib.rs -+++ b/third_party/rust/bitflags/src/lib.rs -@@ -11,14 +11,15 @@ - //! A typesafe bitmask flag generator useful for sets of C-style bitmask flags. - //! It can be used for creating typesafe wrappers around C APIs. - //! --//! The `bitflags!` macro generates `struct`s that manage a set of flags. The -+//! The `bitflags!` macro generates a `struct` that manages a set of flags. The - //! flags should only be defined for integer types, otherwise unexpected type - //! errors may occur at compile time. - //! - //! # Example - //! - //! ``` --//! use bitflags::bitflags; -+//! #[macro_use] -+//! extern crate bitflags; - //! - //! bitflags! { - //! struct Flags: u32 { -@@ -46,9 +47,10 @@ - //! implementations: - //! - //! ``` --//! use std::fmt; -+//! #[macro_use] -+//! extern crate bitflags; - //! --//! use bitflags::bitflags; -+//! use std::fmt; - //! - //! bitflags! { - //! struct Flags: u32 { -@@ -82,19 +84,21 @@ - //! - //! # Visibility - //! --//! The generated structs and their associated flag constants are not exported -+//! The generated struct and its associated flag constants are not exported - //! out of the current module by default. A definition can be exported out of --//! the current module by adding `pub` before `struct`: -+//! the current module by adding `pub` before `flags`: - //! - //! ``` --//! mod example { --//! use bitflags::bitflags; -+//! #[macro_use] -+//! extern crate bitflags; - //! -+//! mod example { - //! bitflags! { - //! pub struct Flags1: u32 { - //! const A = 0b00000001; - //! } --//! -+//! } -+//! bitflags! { - //! # pub - //! struct Flags2: u32 { - //! const B = 0b00000010; -@@ -110,44 +114,26 @@ - //! - //! # Attributes - //! --//! Attributes can be attached to the generated `struct`s by placing them --//! before the `struct` keyword. --//! --//! ## Representations --//! --//! It's valid to add a `#[repr(C)]` or `#[repr(transparent)]` attribute to a type --//! generated by `bitflags!`. In these cases, the type is guaranteed to be a newtype. --//! --//! ``` --//! use bitflags::bitflags; --//! --//! bitflags! { --//! #[repr(transparent)] --//! struct Flags: u32 { --//! const A = 0b00000001; --//! const B = 0b00000010; --//! const C = 0b00000100; --//! } --//! } --//! ``` -+//! Attributes can be attached to the generated `struct` by placing them -+//! before the `flags` keyword. - //! - //! # Trait implementations - //! - //! The `Copy`, `Clone`, `PartialEq`, `Eq`, `PartialOrd`, `Ord` and `Hash` --//! traits are automatically derived for the `struct`s using the `derive` attribute. -+//! traits automatically derived for the `struct` using the `derive` attribute. - //! Additional traits can be derived by providing an explicit `derive` --//! attribute on `struct`. -+//! attribute on `flags`. - //! --//! The `Extend` and `FromIterator` traits are implemented for the `struct`s, -+//! The `Extend` and `FromIterator` traits are implemented for the `struct`, - //! too: `Extend` adds the union of the instances of the `struct` iterated over, - //! while `FromIterator` calculates the union. - //! --//! The `Binary`, `Debug`, `LowerHex`, `Octal` and `UpperHex` traits are also -+//! The `Binary`, `Debug`, `LowerHex`, `Octal` and `UpperHex` trait is also - //! implemented by displaying the bits value of the internal struct. - //! - //! ## Operators - //! --//! The following operator traits are implemented for the generated `struct`s: -+//! The following operator traits are implemented for the generated `struct`: - //! - //! - `BitOr` and `BitOrAssign`: union - //! - `BitAnd` and `BitAndAssign`: intersection -@@ -157,7 +143,7 @@ - //! - //! # Methods - //! --//! The following methods are defined for the generated `struct`s: -+//! The following methods are defined for the generated `struct`: - //! - //! - `empty`: an empty set of flags - //! - `all`: the set of all defined flags -@@ -173,34 +159,23 @@ - //! - `is_empty`: `true` if no flags are currently stored - //! - `is_all`: `true` if currently set flags exactly equal all defined flags - //! - `intersects`: `true` if there are flags common to both `self` and `other` --//! - `contains`: `true` if all of the flags in `other` are contained within `self` -+//! - `contains`: `true` all of the flags in `other` are contained within `self` - //! - `insert`: inserts the specified flags in-place - //! - `remove`: removes the specified flags in-place - //! - `toggle`: the specified flags will be inserted if not present, and removed - //! if they are. - //! - `set`: inserts or removes the specified flags depending on the passed value --//! - `intersection`: returns a new set of flags, containing only the flags present --//! in both `self` and `other` (the argument to the function). --//! - `union`: returns a new set of flags, containing any flags present in --//! either `self` or `other` (the argument to the function). --//! - `difference`: returns a new set of flags, containing all flags present in --//! `self` without any of the flags present in `other` (the --//! argument to the function). --//! - `symmetric_difference`: returns a new set of flags, containing all flags --//! present in either `self` or `other` (the argument --//! to the function), but not both. --//! - `complement`: returns a new set of flags, containing all flags which are --//! not set in `self`, but which are allowed for this type. - //! - //! ## Default - //! --//! The `Default` trait is not automatically implemented for the generated structs. -+//! The `Default` trait is not automatically implemented for the generated struct. - //! - //! If your default value is equal to `0` (which is the same value as calling `empty()` - //! on the generated struct), you can simply derive `Default`: - //! - //! ``` --//! use bitflags::bitflags; -+//! #[macro_use] -+//! extern crate bitflags; - //! - //! bitflags! { - //! // Results in default value with bits: 0 -@@ -221,7 +196,8 @@ - //! If your default value is not equal to `0` you need to implement `Default` yourself: - //! - //! ``` --//! use bitflags::bitflags; -+//! #[macro_use] -+//! extern crate bitflags; - //! - //! bitflags! { - //! struct Flags: u32 { -@@ -249,7 +225,8 @@ - //! Flags with a value equal to zero will have some strange behavior that one should be aware of. - //! - //! ``` --//! use bitflags::bitflags; -+//! #[macro_use] -+//! extern crate bitflags; - //! - //! bitflags! { - //! struct Flags: u32 { -@@ -272,23 +249,28 @@ - //! assert!(none.is_empty()); - //! } - //! ``` --//! --//! Users should generally avoid defining a flag with a value of zero. - --#![cfg_attr(not(test), no_std)] --#![doc(html_root_url = "https://docs.rs/bitflags/1.3.2")] -+#![no_std] -+#![doc(html_root_url = "https://docs.rs/bitflags/1.2.1")] -+ -+#[cfg(test)] -+#[macro_use] -+extern crate std; - -+// Re-export libcore using an alias so that the macros can work without -+// requiring `extern crate core` downstream. - #[doc(hidden)] - pub extern crate core as _core; - --/// The macro used to generate the flag structures. -+/// The macro used to generate the flag structure. - /// - /// See the [crate level docs](../bitflags/index.html) for complete documentation. - /// - /// # Example - /// - /// ``` --/// use bitflags::bitflags; -+/// #[macro_use] -+/// extern crate bitflags; - /// - /// bitflags! { - /// struct Flags: u32 { -@@ -313,9 +295,10 @@ pub extern crate core as _core; - /// implementations: - /// - /// ``` --/// use std::fmt; -+/// #[macro_use] -+/// extern crate bitflags; - /// --/// use bitflags::bitflags; -+/// use std::fmt; - /// - /// bitflags! { - /// struct Flags: u32 { -@@ -350,18 +333,78 @@ pub extern crate core as _core; - macro_rules! bitflags { - ( - $(#[$outer:meta])* -- $vis:vis struct $BitFlags:ident: $T:ty { -+ pub struct $BitFlags:ident: $T:ty { -+ $( -+ $(#[$inner:ident $($args:tt)*])* -+ const $Flag:ident = $value:expr; -+ )+ -+ } -+ ) => { -+ __bitflags! { -+ $(#[$outer])* -+ (pub) $BitFlags: $T { -+ $( -+ $(#[$inner $($args)*])* -+ $Flag = $value; -+ )+ -+ } -+ } -+ }; -+ ( -+ $(#[$outer:meta])* -+ struct $BitFlags:ident: $T:ty { -+ $( -+ $(#[$inner:ident $($args:tt)*])* -+ const $Flag:ident = $value:expr; -+ )+ -+ } -+ ) => { -+ __bitflags! { -+ $(#[$outer])* -+ () $BitFlags: $T { -+ $( -+ $(#[$inner $($args)*])* -+ $Flag = $value; -+ )+ -+ } -+ } -+ }; -+ ( -+ $(#[$outer:meta])* -+ pub ($($vis:tt)+) struct $BitFlags:ident: $T:ty { - $( - $(#[$inner:ident $($args:tt)*])* - const $Flag:ident = $value:expr; -- )* -+ )+ -+ } -+ ) => { -+ __bitflags! { -+ $(#[$outer])* -+ (pub ($($vis)+)) $BitFlags: $T { -+ $( -+ $(#[$inner $($args)*])* -+ $Flag = $value; -+ )+ -+ } - } -+ }; -+} - -- $($t:tt)* -+#[macro_export(local_inner_macros)] -+#[doc(hidden)] -+macro_rules! __bitflags { -+ ( -+ $(#[$outer:meta])* -+ ($($vis:tt)*) $BitFlags:ident: $T:ty { -+ $( -+ $(#[$inner:ident $($args:tt)*])* -+ $Flag:ident = $value:expr; -+ )+ -+ } - ) => { - $(#[$outer])* - #[derive(Copy, PartialEq, Eq, Clone, PartialOrd, Ord, Hash)] -- $vis struct $BitFlags { -+ $($vis)* struct $BitFlags { - bits: $T, - } - -@@ -370,52 +413,63 @@ macro_rules! bitflags { - $( - $(#[$inner $($args)*])* - $Flag = $value; -- )* -+ )+ - } - } -+ }; -+} - -- bitflags! { -- $($t)* -- } -+#[macro_export(local_inner_macros)] -+#[doc(hidden)] -+#[cfg(bitflags_const_fn)] -+macro_rules! __fn_bitflags { -+ ( -+ $(# $attr_args:tt)* -+ const fn $($item:tt)* -+ ) => { -+ $(# $attr_args)* -+ const fn $($item)* -+ }; -+ ( -+ $(# $attr_args:tt)* -+ pub const fn $($item:tt)* -+ ) => { -+ $(# $attr_args)* -+ pub const fn $($item)* -+ }; -+ ( -+ $(# $attr_args:tt)* -+ pub const unsafe fn $($item:tt)* -+ ) => { -+ $(# $attr_args)* -+ pub const unsafe fn $($item)* - }; -- () => {}; - } - --// A helper macro to implement the `all` function. - #[macro_export(local_inner_macros)] - #[doc(hidden)] --macro_rules! __impl_all_bitflags { -+#[cfg(not(bitflags_const_fn))] -+macro_rules! __fn_bitflags { - ( -- $BitFlags:ident: $T:ty { -- $( -- $(#[$attr:ident $($args:tt)*])* -- $Flag:ident = $value:expr; -- )+ -- } -+ $(# $attr_args:tt)* -+ const fn $($item:tt)* - ) => { -- // See `Debug::fmt` for why this approach is taken. -- #[allow(non_snake_case)] -- trait __BitFlags { -- $( -- const $Flag: $T = 0; -- )+ -- } -- #[allow(non_snake_case)] -- impl __BitFlags for $BitFlags { -- $( -- __impl_bitflags! { -- #[allow(deprecated)] -- $(? #[$attr $($args)*])* -- const $Flag: $T = Self::$Flag.bits; -- } -- )+ -- } -- Self { bits: $(<Self as __BitFlags>::$Flag)|+ } -+ $(# $attr_args)* -+ fn $($item)* -+ }; -+ ( -+ $(# $attr_args:tt)* -+ pub const fn $($item:tt)* -+ ) => { -+ $(# $attr_args)* -+ pub fn $($item)* - }; - ( -- $BitFlags:ident: $T:ty { } -+ $(# $attr_args:tt)* -+ pub const unsafe fn $($item:tt)* - ) => { -- Self { bits: 0 } -+ $(# $attr_args)* -+ pub unsafe fn $($item)* - }; - } - -@@ -427,7 +481,7 @@ macro_rules! __impl_bitflags { - $( - $(#[$attr:ident $($args:tt)*])* - $Flag:ident = $value:expr; -- )* -+ )+ - } - ) => { - impl $crate::_core::fmt::Debug for $BitFlags { -@@ -445,12 +499,11 @@ macro_rules! __impl_bitflags { - $( - #[inline] - fn $Flag(&self) -> bool { false } -- )* -+ )+ - } - - // Conditionally override the check for just those flags that - // are not #[cfg]ed away. -- #[allow(non_snake_case)] - impl __BitFlags for $BitFlags { - $( - __impl_bitflags! { -@@ -465,20 +518,20 @@ macro_rules! __impl_bitflags { - } - } - } -- )* -+ )+ - } - - let mut first = true; - $( -- if <Self as __BitFlags>::$Flag(self) { -+ if <$BitFlags as __BitFlags>::$Flag(self) { - if !first { - f.write_str(" | ")?; - } - first = false; -- f.write_str($crate::_core::stringify!($Flag))?; -+ f.write_str(__bitflags_stringify!($Flag))?; - } -- )* -- let extra_bits = self.bits & !Self::all().bits(); -+ )+ -+ let extra_bits = self.bits & !$BitFlags::all().bits(); - if extra_bits != 0 { - if !first { - f.write_str(" | ")?; -@@ -518,295 +571,227 @@ macro_rules! __impl_bitflags { - impl $BitFlags { - $( - $(#[$attr $($args)*])* -- pub const $Flag: Self = Self { bits: $value }; -- )* -+ pub const $Flag: $BitFlags = $BitFlags { bits: $value }; -+ )+ - -- /// Returns an empty set of flags. -- #[inline] -- pub const fn empty() -> Self { -- Self { bits: 0 } -+ __fn_bitflags! { -+ /// Returns an empty set of flags -+ #[inline] -+ pub const fn empty() -> $BitFlags { -+ $BitFlags { bits: 0 } -+ } - } - -- /// Returns the set containing all flags. -- #[inline] -- pub const fn all() -> Self { -- __impl_all_bitflags! { -- $BitFlags: $T { -+ __fn_bitflags! { -+ /// Returns the set containing all flags. -+ #[inline] -+ pub const fn all() -> $BitFlags { -+ // See `Debug::fmt` for why this approach is taken. -+ #[allow(non_snake_case)] -+ trait __BitFlags { - $( -- $(#[$attr $($args)*])* -- $Flag = $value; -- )* -+ const $Flag: $T = 0; -+ )+ - } -+ impl __BitFlags for $BitFlags { -+ $( -+ __impl_bitflags! { -+ #[allow(deprecated)] -+ $(? #[$attr $($args)*])* -+ const $Flag: $T = Self::$Flag.bits; -+ } -+ )+ -+ } -+ $BitFlags { bits: $(<$BitFlags as __BitFlags>::$Flag)|+ } - } - } - -- /// Returns the raw value of the flags currently stored. -- #[inline] -- pub const fn bits(&self) -> $T { -- self.bits -+ __fn_bitflags! { -+ /// Returns the raw value of the flags currently stored. -+ #[inline] -+ pub const fn bits(&self) -> $T { -+ self.bits -+ } - } - - /// Convert from underlying bit representation, unless that - /// representation contains bits that do not correspond to a flag. - #[inline] -- pub const fn from_bits(bits: $T) -> $crate::_core::option::Option<Self> { -- if (bits & !Self::all().bits()) == 0 { -- $crate::_core::option::Option::Some(Self { bits }) -+ pub fn from_bits(bits: $T) -> $crate::_core::option::Option<$BitFlags> { -+ if (bits & !$BitFlags::all().bits()) == 0 { -+ $crate::_core::option::Option::Some($BitFlags { bits }) - } else { - $crate::_core::option::Option::None - } - } - -- /// Convert from underlying bit representation, dropping any bits -- /// that do not correspond to flags. -- #[inline] -- pub const fn from_bits_truncate(bits: $T) -> Self { -- Self { bits: bits & Self::all().bits } -+ __fn_bitflags! { -+ /// Convert from underlying bit representation, dropping any bits -+ /// that do not correspond to flags. -+ #[inline] -+ pub const fn from_bits_truncate(bits: $T) -> $BitFlags { -+ $BitFlags { bits: bits & $BitFlags::all().bits } -+ } - } - -- /// Convert from underlying bit representation, preserving all -- /// bits (even those not corresponding to a defined flag). -- /// -- /// # Safety -- /// -- /// The caller of the `bitflags!` macro can chose to allow or -- /// disallow extra bits for their bitflags type. -- /// -- /// The caller of `from_bits_unchecked()` has to ensure that -- /// all bits correspond to a defined flag or that extra bits -- /// are valid for this bitflags type. -- #[inline] -- pub const unsafe fn from_bits_unchecked(bits: $T) -> Self { -- Self { bits } -+ __fn_bitflags! { -+ /// Convert from underlying bit representation, preserving all -+ /// bits (even those not corresponding to a defined flag). -+ #[inline] -+ pub const unsafe fn from_bits_unchecked(bits: $T) -> $BitFlags { -+ $BitFlags { bits } -+ } - } - -- /// Returns `true` if no flags are currently stored. -- #[inline] -- pub const fn is_empty(&self) -> bool { -- self.bits() == Self::empty().bits() -+ __fn_bitflags! { -+ /// Returns `true` if no flags are currently stored. -+ #[inline] -+ pub const fn is_empty(&self) -> bool { -+ self.bits() == $BitFlags::empty().bits() -+ } - } - -- /// Returns `true` if all flags are currently set. -- #[inline] -- pub const fn is_all(&self) -> bool { -- Self::all().bits | self.bits == self.bits -+ __fn_bitflags! { -+ /// Returns `true` if all flags are currently set. -+ #[inline] -+ pub const fn is_all(&self) -> bool { -+ self.bits == $BitFlags::all().bits -+ } - } - -- /// Returns `true` if there are flags common to both `self` and `other`. -- #[inline] -- pub const fn intersects(&self, other: Self) -> bool { -- !(Self { bits: self.bits & other.bits}).is_empty() -+ __fn_bitflags! { -+ /// Returns `true` if there are flags common to both `self` and `other`. -+ #[inline] -+ pub const fn intersects(&self, other: $BitFlags) -> bool { -+ !$BitFlags{ bits: self.bits & other.bits}.is_empty() -+ } - } - -- /// Returns `true` if all of the flags in `other` are contained within `self`. -- #[inline] -- pub const fn contains(&self, other: Self) -> bool { -- (self.bits & other.bits) == other.bits -+ __fn_bitflags! { -+ /// Returns `true` all of the flags in `other` are contained within `self`. -+ #[inline] -+ pub const fn contains(&self, other: $BitFlags) -> bool { -+ (self.bits & other.bits) == other.bits -+ } - } - - /// Inserts the specified flags in-place. - #[inline] -- pub fn insert(&mut self, other: Self) { -+ pub fn insert(&mut self, other: $BitFlags) { - self.bits |= other.bits; - } - - /// Removes the specified flags in-place. - #[inline] -- pub fn remove(&mut self, other: Self) { -+ pub fn remove(&mut self, other: $BitFlags) { - self.bits &= !other.bits; - } - - /// Toggles the specified flags in-place. - #[inline] -- pub fn toggle(&mut self, other: Self) { -+ pub fn toggle(&mut self, other: $BitFlags) { - self.bits ^= other.bits; - } - - /// Inserts or removes the specified flags depending on the passed value. - #[inline] -- pub fn set(&mut self, other: Self, value: bool) { -+ pub fn set(&mut self, other: $BitFlags, value: bool) { - if value { - self.insert(other); - } else { - self.remove(other); - } - } -- -- /// Returns the intersection between the flags in `self` and -- /// `other`. -- /// -- /// Specifically, the returned set contains only the flags which are -- /// present in *both* `self` *and* `other`. -- /// -- /// This is equivalent to using the `&` operator (e.g. -- /// [`ops::BitAnd`]), as in `flags & other`. -- /// -- /// [`ops::BitAnd`]: https://doc.rust-lang.org/std/ops/trait.BitAnd.html -- #[inline] -- #[must_use] -- pub const fn intersection(self, other: Self) -> Self { -- Self { bits: self.bits & other.bits } -- } -- -- /// Returns the union of between the flags in `self` and `other`. -- /// -- /// Specifically, the returned set contains all flags which are -- /// present in *either* `self` *or* `other`, including any which are -- /// present in both (see [`Self::symmetric_difference`] if that -- /// is undesirable). -- /// -- /// This is equivalent to using the `|` operator (e.g. -- /// [`ops::BitOr`]), as in `flags | other`. -- /// -- /// [`ops::BitOr`]: https://doc.rust-lang.org/std/ops/trait.BitOr.html -- #[inline] -- #[must_use] -- pub const fn union(self, other: Self) -> Self { -- Self { bits: self.bits | other.bits } -- } -- -- /// Returns the difference between the flags in `self` and `other`. -- /// -- /// Specifically, the returned set contains all flags present in -- /// `self`, except for the ones present in `other`. -- /// -- /// It is also conceptually equivalent to the "bit-clear" operation: -- /// `flags & !other` (and this syntax is also supported). -- /// -- /// This is equivalent to using the `-` operator (e.g. -- /// [`ops::Sub`]), as in `flags - other`. -- /// -- /// [`ops::Sub`]: https://doc.rust-lang.org/std/ops/trait.Sub.html -- #[inline] -- #[must_use] -- pub const fn difference(self, other: Self) -> Self { -- Self { bits: self.bits & !other.bits } -- } -- -- /// Returns the [symmetric difference][sym-diff] between the flags -- /// in `self` and `other`. -- /// -- /// Specifically, the returned set contains the flags present which -- /// are present in `self` or `other`, but that are not present in -- /// both. Equivalently, it contains the flags present in *exactly -- /// one* of the sets `self` and `other`. -- /// -- /// This is equivalent to using the `^` operator (e.g. -- /// [`ops::BitXor`]), as in `flags ^ other`. -- /// -- /// [sym-diff]: https://en.wikipedia.org/wiki/Symmetric_difference -- /// [`ops::BitXor`]: https://doc.rust-lang.org/std/ops/trait.BitXor.html -- #[inline] -- #[must_use] -- pub const fn symmetric_difference(self, other: Self) -> Self { -- Self { bits: self.bits ^ other.bits } -- } -- -- /// Returns the complement of this set of flags. -- /// -- /// Specifically, the returned set contains all the flags which are -- /// not set in `self`, but which are allowed for this type. -- /// -- /// Alternatively, it can be thought of as the set difference -- /// between [`Self::all()`] and `self` (e.g. `Self::all() - self`) -- /// -- /// This is equivalent to using the `!` operator (e.g. -- /// [`ops::Not`]), as in `!flags`. -- /// -- /// [`Self::all()`]: Self::all -- /// [`ops::Not`]: https://doc.rust-lang.org/std/ops/trait.Not.html -- #[inline] -- #[must_use] -- pub const fn complement(self) -> Self { -- Self::from_bits_truncate(!self.bits) -- } -- - } - - impl $crate::_core::ops::BitOr for $BitFlags { -- type Output = Self; -+ type Output = $BitFlags; - - /// Returns the union of the two sets of flags. - #[inline] -- fn bitor(self, other: $BitFlags) -> Self { -- Self { bits: self.bits | other.bits } -+ fn bitor(self, other: $BitFlags) -> $BitFlags { -+ $BitFlags { bits: self.bits | other.bits } - } - } - - impl $crate::_core::ops::BitOrAssign for $BitFlags { -+ - /// Adds the set of flags. - #[inline] -- fn bitor_assign(&mut self, other: Self) { -+ fn bitor_assign(&mut self, other: $BitFlags) { - self.bits |= other.bits; - } - } - - impl $crate::_core::ops::BitXor for $BitFlags { -- type Output = Self; -+ type Output = $BitFlags; - - /// Returns the left flags, but with all the right flags toggled. - #[inline] -- fn bitxor(self, other: Self) -> Self { -- Self { bits: self.bits ^ other.bits } -+ fn bitxor(self, other: $BitFlags) -> $BitFlags { -+ $BitFlags { bits: self.bits ^ other.bits } - } - } - - impl $crate::_core::ops::BitXorAssign for $BitFlags { -+ - /// Toggles the set of flags. - #[inline] -- fn bitxor_assign(&mut self, other: Self) { -+ fn bitxor_assign(&mut self, other: $BitFlags) { - self.bits ^= other.bits; - } - } - - impl $crate::_core::ops::BitAnd for $BitFlags { -- type Output = Self; -+ type Output = $BitFlags; - - /// Returns the intersection between the two sets of flags. - #[inline] -- fn bitand(self, other: Self) -> Self { -- Self { bits: self.bits & other.bits } -+ fn bitand(self, other: $BitFlags) -> $BitFlags { -+ $BitFlags { bits: self.bits & other.bits } - } - } - - impl $crate::_core::ops::BitAndAssign for $BitFlags { -+ - /// Disables all flags disabled in the set. - #[inline] -- fn bitand_assign(&mut self, other: Self) { -+ fn bitand_assign(&mut self, other: $BitFlags) { - self.bits &= other.bits; - } - } - - impl $crate::_core::ops::Sub for $BitFlags { -- type Output = Self; -+ type Output = $BitFlags; - - /// Returns the set difference of the two sets of flags. - #[inline] -- fn sub(self, other: Self) -> Self { -- Self { bits: self.bits & !other.bits } -+ fn sub(self, other: $BitFlags) -> $BitFlags { -+ $BitFlags { bits: self.bits & !other.bits } - } - } - - impl $crate::_core::ops::SubAssign for $BitFlags { -+ - /// Disables all flags enabled in the set. - #[inline] -- fn sub_assign(&mut self, other: Self) { -+ fn sub_assign(&mut self, other: $BitFlags) { - self.bits &= !other.bits; - } - } - - impl $crate::_core::ops::Not for $BitFlags { -- type Output = Self; -+ type Output = $BitFlags; - - /// Returns the complement of this set of flags. - #[inline] -- fn not(self) -> Self { -- Self { bits: !self.bits } & Self::all() -+ fn not(self) -> $BitFlags { -+ $BitFlags { bits: !self.bits } & $BitFlags::all() - } - } - - impl $crate::_core::iter::Extend<$BitFlags> for $BitFlags { -- fn extend<T: $crate::_core::iter::IntoIterator<Item=Self>>(&mut self, iterator: T) { -+ fn extend<T: $crate::_core::iter::IntoIterator<Item=$BitFlags>>(&mut self, iterator: T) { - for item in iterator { - self.insert(item) - } -@@ -814,7 +799,7 @@ macro_rules! __impl_bitflags { - } - - impl $crate::_core::iter::FromIterator<$BitFlags> for $BitFlags { -- fn from_iter<T: $crate::_core::iter::IntoIterator<Item=Self>>(iterator: T) -> Self { -+ fn from_iter<T: $crate::_core::iter::IntoIterator<Item=$BitFlags>>(iterator: T) -> $BitFlags { - let mut result = Self::empty(); - result.extend(iterator); - result -@@ -832,7 +817,7 @@ macro_rules! __impl_bitflags { - // Input: - // - // ? #[cfg(feature = "advanced")] -- // ? #[deprecated(note = "Use something else.")] -+ // ? #[deprecated(note = "Use somthing else.")] - // ? #[doc = r"High quality documentation."] - // fn f() -> i32 { /* ... */ } - // -@@ -887,7 +872,7 @@ macro_rules! __impl_bitflags { - // Input: - // - // ? #[cfg(feature = "advanced")] -- // ? #[deprecated(note = "Use something else.")] -+ // ? #[deprecated(note = "Use somthing else.")] - // ? #[doc = r"High quality documentation."] - // const f: i32 { /* ... */ } - // -@@ -931,6 +916,16 @@ macro_rules! __impl_bitflags { - }; - } - -+// Same as std::stringify but callable from __impl_bitflags, which needs to use -+// local_inner_macros so can only directly call macros from this crate. -+#[macro_export] -+#[doc(hidden)] -+macro_rules! __bitflags_stringify { -+ ($s:ident) => { -+ stringify!($s) -+ }; -+} -+ - #[cfg(feature = "example_generated")] - pub mod example_generated; - -@@ -944,7 +939,6 @@ mod tests { - #[doc = "> you are the easiest person to fool."] - #[doc = "> "] - #[doc = "> - Richard Feynman"] -- #[derive(Default)] - struct Flags: u32 { - const A = 0b00000001; - #[doc = "<pcwalton> macros are way better at generating code than trans is"] -@@ -955,7 +949,9 @@ mod tests { - #[doc = "<strcat> wait what?"] - const ABC = Self::A.bits | Self::B.bits | Self::C.bits; - } -+ } - -+ bitflags! { - struct _CfgFlags: u32 { - #[cfg(unix)] - const _CFG_A = 0b01; -@@ -964,18 +960,17 @@ mod tests { - #[cfg(unix)] - const _CFG_C = Self::_CFG_A.bits | 0b10; - } -+ } - -+ bitflags! { - struct AnotherSetOfFlags: i8 { - const ANOTHER_FLAG = -1_i8; - } -- -- struct LongFlags: u32 { -- const LONG_A = 0b1111111111111111; -- } - } - - bitflags! { -- struct EmptyFlags: u32 { -+ struct LongFlags: u32 { -+ const LONG_A = 0b1111111111111111; - } - } - -@@ -987,8 +982,6 @@ mod tests { - - assert_eq!(AnotherSetOfFlags::empty().bits(), 0b00); - assert_eq!(AnotherSetOfFlags::ANOTHER_FLAG.bits(), !0_i8); -- -- assert_eq!(EmptyFlags::empty().bits(), 0b00000000); - } - - #[test] -@@ -1003,9 +996,6 @@ mod tests { - AnotherSetOfFlags::from_bits(!0_i8), - Some(AnotherSetOfFlags::ANOTHER_FLAG) - ); -- -- assert_eq!(EmptyFlags::from_bits(0), Some(EmptyFlags::empty())); -- assert_eq!(EmptyFlags::from_bits(0b1), None); - } - - #[test] -@@ -1021,9 +1011,6 @@ mod tests { - AnotherSetOfFlags::from_bits_truncate(0_i8), - AnotherSetOfFlags::empty() - ); -- -- assert_eq!(EmptyFlags::from_bits_truncate(0), EmptyFlags::empty()); -- assert_eq!(EmptyFlags::from_bits_truncate(0b1), EmptyFlags::empty()); - } - - #[test] -@@ -1032,25 +1019,9 @@ mod tests { - assert_eq!(unsafe { Flags::from_bits_unchecked(0) }, Flags::empty()); - assert_eq!(unsafe { Flags::from_bits_unchecked(0b1) }, Flags::A); - assert_eq!(unsafe { Flags::from_bits_unchecked(0b10) }, Flags::B); -- -- assert_eq!( -- unsafe { Flags::from_bits_unchecked(0b11) }, -- (Flags::A | Flags::B) -- ); -- assert_eq!( -- unsafe { Flags::from_bits_unchecked(0b1000) }, -- (extra | Flags::empty()) -- ); -- assert_eq!( -- unsafe { Flags::from_bits_unchecked(0b1001) }, -- (extra | Flags::A) -- ); -- -- let extra = unsafe { EmptyFlags::from_bits_unchecked(0b1000) }; -- assert_eq!( -- unsafe { EmptyFlags::from_bits_unchecked(0b1000) }, -- (extra | EmptyFlags::empty()) -- ); -+ assert_eq!(unsafe { Flags::from_bits_unchecked(0b11) }, (Flags::A | Flags::B)); -+ assert_eq!(unsafe { Flags::from_bits_unchecked(0b1000) }, (extra | Flags::empty())); -+ assert_eq!(unsafe { Flags::from_bits_unchecked(0b1001) }, (extra | Flags::A)); - } - - #[test] -@@ -1060,9 +1031,6 @@ mod tests { - assert!(!Flags::ABC.is_empty()); - - assert!(!AnotherSetOfFlags::ANOTHER_FLAG.is_empty()); -- -- assert!(EmptyFlags::empty().is_empty()); -- assert!(EmptyFlags::all().is_empty()); - } - - #[test] -@@ -1071,15 +1039,7 @@ mod tests { - assert!(!Flags::A.is_all()); - assert!(Flags::ABC.is_all()); - -- let extra = unsafe { Flags::from_bits_unchecked(0b1000) }; -- assert!(!extra.is_all()); -- assert!(!(Flags::A | extra).is_all()); -- assert!((Flags::ABC | extra).is_all()); -- - assert!(AnotherSetOfFlags::ANOTHER_FLAG.is_all()); -- -- assert!(EmptyFlags::all().is_all()); -- assert!(EmptyFlags::empty().is_all()); - } - - #[test] -@@ -1121,8 +1081,6 @@ mod tests { - assert!(Flags::ABC.contains(e2)); - - assert!(AnotherSetOfFlags::ANOTHER_FLAG.contains(AnotherSetOfFlags::ANOTHER_FLAG)); -- -- assert!(EmptyFlags::empty().contains(EmptyFlags::empty())); - } - - #[test] -@@ -1183,188 +1141,6 @@ mod tests { - assert_eq!(e3, Flags::A | Flags::B | extra); - } - -- #[test] -- fn test_set_ops_basic() { -- let ab = Flags::A.union(Flags::B); -- let ac = Flags::A.union(Flags::C); -- let bc = Flags::B.union(Flags::C); -- assert_eq!(ab.bits, 0b011); -- assert_eq!(bc.bits, 0b110); -- assert_eq!(ac.bits, 0b101); -- -- assert_eq!(ab, Flags::B.union(Flags::A)); -- assert_eq!(ac, Flags::C.union(Flags::A)); -- assert_eq!(bc, Flags::C.union(Flags::B)); -- -- assert_eq!(ac, Flags::A | Flags::C); -- assert_eq!(bc, Flags::B | Flags::C); -- assert_eq!(ab.union(bc), Flags::ABC); -- -- assert_eq!(ac, Flags::A | Flags::C); -- assert_eq!(bc, Flags::B | Flags::C); -- -- assert_eq!(ac.union(bc), ac | bc); -- assert_eq!(ac.union(bc), Flags::ABC); -- assert_eq!(bc.union(ac), Flags::ABC); -- -- assert_eq!(ac.intersection(bc), ac & bc); -- assert_eq!(ac.intersection(bc), Flags::C); -- assert_eq!(bc.intersection(ac), Flags::C); -- -- assert_eq!(ac.difference(bc), ac - bc); -- assert_eq!(bc.difference(ac), bc - ac); -- assert_eq!(ac.difference(bc), Flags::A); -- assert_eq!(bc.difference(ac), Flags::B); -- -- assert_eq!(bc.complement(), !bc); -- assert_eq!(bc.complement(), Flags::A); -- assert_eq!(ac.symmetric_difference(bc), Flags::A.union(Flags::B)); -- assert_eq!(bc.symmetric_difference(ac), Flags::A.union(Flags::B)); -- } -- -- #[test] -- fn test_set_ops_const() { -- // These just test that these compile and don't cause use-site panics -- // (would be possible if we had some sort of UB) -- const INTERSECT: Flags = Flags::all().intersection(Flags::C); -- const UNION: Flags = Flags::A.union(Flags::C); -- const DIFFERENCE: Flags = Flags::all().difference(Flags::A); -- const COMPLEMENT: Flags = Flags::C.complement(); -- const SYM_DIFFERENCE: Flags = UNION.symmetric_difference(DIFFERENCE); -- assert_eq!(INTERSECT, Flags::C); -- assert_eq!(UNION, Flags::A | Flags::C); -- assert_eq!(DIFFERENCE, Flags::all() - Flags::A); -- assert_eq!(COMPLEMENT, !Flags::C); -- assert_eq!(SYM_DIFFERENCE, (Flags::A | Flags::C) ^ (Flags::all() - Flags::A)); -- } -- -- #[test] -- fn test_set_ops_unchecked() { -- let extra = unsafe { Flags::from_bits_unchecked(0b1000) }; -- let e1 = Flags::A.union(Flags::C).union(extra); -- let e2 = Flags::B.union(Flags::C); -- assert_eq!(e1.bits, 0b1101); -- assert_eq!(e1.union(e2), (Flags::ABC | extra)); -- assert_eq!(e1.intersection(e2), Flags::C); -- assert_eq!(e1.difference(e2), Flags::A | extra); -- assert_eq!(e2.difference(e1), Flags::B); -- assert_eq!(e2.complement(), Flags::A); -- assert_eq!(e1.complement(), Flags::B); -- assert_eq!(e1.symmetric_difference(e2), Flags::A | Flags::B | extra); // toggle -- } -- -- #[test] -- fn test_set_ops_exhaustive() { -- // Define a flag that contains gaps to help exercise edge-cases, -- // especially around "unknown" flags (e.g. ones outside of `all()` -- // `from_bits_unchecked`). -- // - when lhs and rhs both have different sets of unknown flags. -- // - unknown flags at both ends, and in the middle -- // - cases with "gaps". -- bitflags! { -- struct Test: u16 { -- // Intentionally no `A` -- const B = 0b000000010; -- // Intentionally no `C` -- const D = 0b000001000; -- const E = 0b000010000; -- const F = 0b000100000; -- const G = 0b001000000; -- // Intentionally no `H` -- const I = 0b100000000; -- } -- } -- let iter_test_flags = -- || (0..=0b111_1111_1111).map(|bits| unsafe { Test::from_bits_unchecked(bits) }); -- -- for a in iter_test_flags() { -- assert_eq!( -- a.complement(), -- Test::from_bits_truncate(!a.bits), -- "wrong result: !({:?})", -- a, -- ); -- assert_eq!(a.complement(), !a, "named != op: !({:?})", a); -- for b in iter_test_flags() { -- // Check that the named operations produce the expected bitwise -- // values. -- assert_eq!( -- a.union(b).bits, -- a.bits | b.bits, -- "wrong result: `{:?}` | `{:?}`", -- a, -- b, -- ); -- assert_eq!( -- a.intersection(b).bits, -- a.bits & b.bits, -- "wrong result: `{:?}` & `{:?}`", -- a, -- b, -- ); -- assert_eq!( -- a.symmetric_difference(b).bits, -- a.bits ^ b.bits, -- "wrong result: `{:?}` ^ `{:?}`", -- a, -- b, -- ); -- assert_eq!( -- a.difference(b).bits, -- a.bits & !b.bits, -- "wrong result: `{:?}` - `{:?}`", -- a, -- b, -- ); -- // Note: Difference is checked as both `a - b` and `b - a` -- assert_eq!( -- b.difference(a).bits, -- b.bits & !a.bits, -- "wrong result: `{:?}` - `{:?}`", -- b, -- a, -- ); -- // Check that the named set operations are equivalent to the -- // bitwise equivalents -- assert_eq!(a.union(b), a | b, "named != op: `{:?}` | `{:?}`", a, b,); -- assert_eq!( -- a.intersection(b), -- a & b, -- "named != op: `{:?}` & `{:?}`", -- a, -- b, -- ); -- assert_eq!( -- a.symmetric_difference(b), -- a ^ b, -- "named != op: `{:?}` ^ `{:?}`", -- a, -- b, -- ); -- assert_eq!(a.difference(b), a - b, "named != op: `{:?}` - `{:?}`", a, b,); -- // Note: Difference is checked as both `a - b` and `b - a` -- assert_eq!(b.difference(a), b - a, "named != op: `{:?}` - `{:?}`", b, a,); -- // Verify that the operations which should be symmetric are -- // actually symmetric. -- assert_eq!(a.union(b), b.union(a), "asymmetry: `{:?}` | `{:?}`", a, b,); -- assert_eq!( -- a.intersection(b), -- b.intersection(a), -- "asymmetry: `{:?}` & `{:?}`", -- a, -- b, -- ); -- assert_eq!( -- a.symmetric_difference(b), -- b.symmetric_difference(a), -- "asymmetry: `{:?}` ^ `{:?}`", -- a, -- b, -- ); -- } -- } -- } -- - #[test] - fn test_set() { - let mut e1 = Flags::A | Flags::C; -@@ -1392,6 +1168,8 @@ mod tests { - assert_eq!(m1, e1); - } - -+ -+ #[cfg(bitflags_const_fn)] - #[test] - fn test_const_fn() { - const _M1: Flags = Flags::empty(); -@@ -1481,11 +1259,6 @@ mod tests { - assert_eq!(hash(&x), hash(&y)); - } - -- #[test] -- fn test_default() { -- assert_eq!(Flags::empty(), Flags::default()); -- } -- - #[test] - fn test_debug() { - assert_eq!(format!("{:?}", Flags::A | Flags::B), "A | B"); -@@ -1494,13 +1267,7 @@ mod tests { - let extra = unsafe { Flags::from_bits_unchecked(0xb8) }; - assert_eq!(format!("{:?}", extra), "0xb8"); - assert_eq!(format!("{:?}", Flags::A | extra), "A | 0xb8"); -- -- assert_eq!( -- format!("{:?}", Flags::ABC | extra), -- "A | B | C | ABC | 0xb8" -- ); -- -- assert_eq!(format!("{:?}", EmptyFlags::empty()), "(empty)"); -+ assert_eq!(format!("{:?}", Flags::ABC | extra), "A | B | C | ABC | 0xb8"); - } - - #[test] -@@ -1544,7 +1311,8 @@ mod tests { - pub struct PublicFlags: i8 { - const X = 0; - } -- -+ } -+ bitflags! { - struct PrivateFlags: i8 { - const Y = 0; - } -@@ -1659,71 +1427,4 @@ mod tests { - assert_eq!(format!("{:?}", Flags::empty()), "NONE"); - assert_eq!(format!("{:?}", Flags::SOME), "SOME"); - } -- -- #[test] -- fn test_empty_bitflags() { -- bitflags! {} -- } -- -- #[test] -- fn test_u128_bitflags() { -- bitflags! { -- struct Flags128: u128 { -- const A = 0x0000_0000_0000_0000_0000_0000_0000_0001; -- const B = 0x0000_0000_0000_1000_0000_0000_0000_0000; -- const C = 0x8000_0000_0000_0000_0000_0000_0000_0000; -- const ABC = Self::A.bits | Self::B.bits | Self::C.bits; -- } -- } -- -- assert_eq!(Flags128::ABC, Flags128::A | Flags128::B | Flags128::C); -- assert_eq!(Flags128::A.bits, 0x0000_0000_0000_0000_0000_0000_0000_0001); -- assert_eq!(Flags128::B.bits, 0x0000_0000_0000_1000_0000_0000_0000_0000); -- assert_eq!(Flags128::C.bits, 0x8000_0000_0000_0000_0000_0000_0000_0000); -- assert_eq!( -- Flags128::ABC.bits, -- 0x8000_0000_0000_1000_0000_0000_0000_0001 -- ); -- assert_eq!(format!("{:?}", Flags128::A), "A"); -- assert_eq!(format!("{:?}", Flags128::B), "B"); -- assert_eq!(format!("{:?}", Flags128::C), "C"); -- assert_eq!(format!("{:?}", Flags128::ABC), "A | B | C | ABC"); -- } -- -- #[test] -- fn test_serde_bitflags_serialize() { -- let flags = SerdeFlags::A | SerdeFlags::B; -- -- let serialized = serde_json::to_string(&flags).unwrap(); -- -- assert_eq!(serialized, r#"{"bits":3}"#); -- } -- -- #[test] -- fn test_serde_bitflags_deserialize() { -- let deserialized: SerdeFlags = serde_json::from_str(r#"{"bits":12}"#).unwrap(); -- -- let expected = SerdeFlags::C | SerdeFlags::D; -- -- assert_eq!(deserialized.bits, expected.bits); -- } -- -- #[test] -- fn test_serde_bitflags_roundtrip() { -- let flags = SerdeFlags::A | SerdeFlags::B; -- -- let deserialized: SerdeFlags = serde_json::from_str(&serde_json::to_string(&flags).unwrap()).unwrap(); -- -- assert_eq!(deserialized.bits, flags.bits); -- } -- -- bitflags! { -- #[derive(serde::Serialize, serde::Deserialize)] -- struct SerdeFlags: u32 { -- const A = 1; -- const B = 2; -- const C = 4; -- const D = 8; -- } -- } - } -diff --git a/third_party/rust/bitflags/tests/basic.rs b/third_party/rust/bitflags/tests/basic.rs -deleted file mode 100644 -index 73a52bec50b60..0000000000000 ---- a/third_party/rust/bitflags/tests/basic.rs -+++ /dev/null -@@ -1,20 +0,0 @@ --#![no_std] -- --use bitflags::bitflags; -- --bitflags! { -- /// baz -- struct Flags: u32 { -- const A = 0b00000001; -- #[doc = "bar"] -- const B = 0b00000010; -- const C = 0b00000100; -- #[doc = "foo"] -- const ABC = Flags::A.bits | Flags::B.bits | Flags::C.bits; -- } --} -- --#[test] --fn basic() { -- assert_eq!(Flags::ABC, Flags::A | Flags::B | Flags::C); --} -diff --git a/third_party/rust/bitflags/tests/compile-fail/impls/copy.rs b/third_party/rust/bitflags/tests/compile-fail/impls/copy.rs -deleted file mode 100644 -index 38f4822f5a5f2..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-fail/impls/copy.rs -+++ /dev/null -@@ -1,10 +0,0 @@ --use bitflags::bitflags; -- --bitflags! { -- #[derive(Clone, Copy)] -- struct Flags: u32 { -- const A = 0b00000001; -- } --} -- --fn main() {} -diff --git a/third_party/rust/bitflags/tests/compile-fail/impls/copy.stderr.beta b/third_party/rust/bitflags/tests/compile-fail/impls/copy.stderr.beta -deleted file mode 100644 -index 0c13aa5024197..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-fail/impls/copy.stderr.beta -+++ /dev/null -@@ -1,27 +0,0 @@ --error[E0119]: conflicting implementations of trait `std::clone::Clone` for type `Flags` -- --> $DIR/copy.rs:3:1 -- | --3 | / bitflags! { --4 | | #[derive(Clone, Copy)] -- | | ----- first implementation here --5 | | struct Flags: u32 { --6 | | const A = 0b00000001; --7 | | } --8 | | } -- | |_^ conflicting implementation for `Flags` -- | -- = note: this error originates in the derive macro `Clone` (in Nightly builds, run with -Z macro-backtrace for more info) -- --error[E0119]: conflicting implementations of trait `std::marker::Copy` for type `Flags` -- --> $DIR/copy.rs:3:1 -- | --3 | / bitflags! { --4 | | #[derive(Clone, Copy)] -- | | ---- first implementation here --5 | | struct Flags: u32 { --6 | | const A = 0b00000001; --7 | | } --8 | | } -- | |_^ conflicting implementation for `Flags` -- | -- = note: this error originates in the derive macro `Copy` (in Nightly builds, run with -Z macro-backtrace for more info) -diff --git a/third_party/rust/bitflags/tests/compile-fail/impls/eq.rs b/third_party/rust/bitflags/tests/compile-fail/impls/eq.rs -deleted file mode 100644 -index 4abbd630c6e12..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-fail/impls/eq.rs -+++ /dev/null -@@ -1,10 +0,0 @@ --use bitflags::bitflags; -- --bitflags! { -- #[derive(PartialEq, Eq)] -- struct Flags: u32 { -- const A = 0b00000001; -- } --} -- --fn main() {} -diff --git a/third_party/rust/bitflags/tests/compile-fail/impls/eq.stderr.beta b/third_party/rust/bitflags/tests/compile-fail/impls/eq.stderr.beta -deleted file mode 100644 -index 8a1a3b410a0e0..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-fail/impls/eq.stderr.beta -+++ /dev/null -@@ -1,55 +0,0 @@ --error[E0119]: conflicting implementations of trait `std::cmp::PartialEq` for type `Flags` -- --> $DIR/eq.rs:3:1 -- | --3 | / bitflags! { --4 | | #[derive(PartialEq, Eq)] -- | | --------- first implementation here --5 | | struct Flags: u32 { --6 | | const A = 0b00000001; --7 | | } --8 | | } -- | |_^ conflicting implementation for `Flags` -- | -- = note: this error originates in the derive macro `PartialEq` (in Nightly builds, run with -Z macro-backtrace for more info) -- --error[E0119]: conflicting implementations of trait `std::cmp::Eq` for type `Flags` -- --> $DIR/eq.rs:3:1 -- | --3 | / bitflags! { --4 | | #[derive(PartialEq, Eq)] -- | | -- first implementation here --5 | | struct Flags: u32 { --6 | | const A = 0b00000001; --7 | | } --8 | | } -- | |_^ conflicting implementation for `Flags` -- | -- = note: this error originates in the derive macro `Eq` (in Nightly builds, run with -Z macro-backtrace for more info) -- --error[E0119]: conflicting implementations of trait `std::marker::StructuralPartialEq` for type `Flags` -- --> $DIR/eq.rs:3:1 -- | --3 | / bitflags! { --4 | | #[derive(PartialEq, Eq)] -- | | --------- first implementation here --5 | | struct Flags: u32 { --6 | | const A = 0b00000001; --7 | | } --8 | | } -- | |_^ conflicting implementation for `Flags` -- | -- = note: this error originates in the derive macro `PartialEq` (in Nightly builds, run with -Z macro-backtrace for more info) -- --error[E0119]: conflicting implementations of trait `std::marker::StructuralEq` for type `Flags` -- --> $DIR/eq.rs:3:1 -- | --3 | / bitflags! { --4 | | #[derive(PartialEq, Eq)] -- | | -- first implementation here --5 | | struct Flags: u32 { --6 | | const A = 0b00000001; --7 | | } --8 | | } -- | |_^ conflicting implementation for `Flags` -- | -- = note: this error originates in the derive macro `Eq` (in Nightly builds, run with -Z macro-backtrace for more info) -diff --git a/third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_defined.rs b/third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_defined.rs -deleted file mode 100644 -index c2856b10830d3..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_defined.rs -+++ /dev/null -@@ -1,123 +0,0 @@ --use std::{ -- fmt::{ -- self, -- Debug, -- Display, -- LowerHex, -- UpperHex, -- Octal, -- Binary, -- }, -- ops::{ -- BitAnd, -- BitOr, -- BitXor, -- BitAndAssign, -- BitOrAssign, -- BitXorAssign, -- Not, -- }, --}; -- --use bitflags::bitflags; -- --// Ideally we'd actually want this to work, but currently need something like `num`'s `Zero` --// With some design work it could be made possible --#[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] --struct MyInt(u8); -- --impl BitAnd for MyInt { -- type Output = Self; -- -- fn bitand(self, other: Self) -> Self { -- MyInt(self.0 & other.0) -- } --} -- --impl BitOr for MyInt { -- type Output = Self; -- -- fn bitor(self, other: Self) -> Self { -- MyInt(self.0 | other.0) -- } --} -- --impl BitXor for MyInt { -- type Output = Self; -- -- fn bitxor(self, other: Self) -> Self { -- MyInt(self.0 ^ other.0) -- } --} -- --impl BitAndAssign for MyInt { -- fn bitand_assign(&mut self, other: Self) { -- self.0 &= other.0 -- } --} -- --impl BitOrAssign for MyInt { -- fn bitor_assign(&mut self, other: Self) { -- self.0 |= other.0 -- } --} -- --impl BitXorAssign for MyInt { -- fn bitxor_assign(&mut self, other: Self) { -- self.0 ^= other.0 -- } --} -- --impl Debug for MyInt { -- fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -- Debug::fmt(&self.0, f) -- } --} -- --impl Display for MyInt { -- fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -- Display::fmt(&self.0, f) -- } --} -- --impl LowerHex for MyInt { -- fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -- LowerHex::fmt(&self.0, f) -- } --} -- --impl UpperHex for MyInt { -- fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -- UpperHex::fmt(&self.0, f) -- } --} -- --impl Octal for MyInt { -- fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -- Octal::fmt(&self.0, f) -- } --} -- --impl Binary for MyInt { -- fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -- Binary::fmt(&self.0, f) -- } --} -- --impl Not for MyInt { -- type Output = MyInt; -- -- fn not(self) -> Self { -- MyInt(!self.0) -- } --} -- --bitflags! { -- struct Flags128: MyInt { -- const A = MyInt(0b0000_0001u8); -- const B = MyInt(0b0000_0010u8); -- const C = MyInt(0b0000_0100u8); -- } --} -- --fn main() {} -diff --git a/third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_defined.stderr.beta b/third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_defined.stderr.beta -deleted file mode 100644 -index 1f0fb5cf7ad0b..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_defined.stderr.beta -+++ /dev/null -@@ -1,27 +0,0 @@ --error[E0308]: mismatched types -- --> $DIR/all_defined.rs:115:1 -- | --115 | / bitflags! { --116 | | struct Flags128: MyInt { --117 | | const A = MyInt(0b0000_0001u8); --118 | | const B = MyInt(0b0000_0010u8); --119 | | const C = MyInt(0b0000_0100u8); --120 | | } --121 | | } -- | |_^ expected struct `MyInt`, found integer -- | -- = note: this error originates in the macro `__impl_all_bitflags` (in Nightly builds, run with -Z macro-backtrace for more info) -- --error[E0308]: mismatched types -- --> $DIR/all_defined.rs:115:1 -- | --115 | / bitflags! { --116 | | struct Flags128: MyInt { --117 | | const A = MyInt(0b0000_0001u8); --118 | | const B = MyInt(0b0000_0010u8); --119 | | const C = MyInt(0b0000_0100u8); --120 | | } --121 | | } -- | |_^ expected struct `MyInt`, found integer -- | -- = note: this error originates in the macro `__impl_bitflags` (in Nightly builds, run with -Z macro-backtrace for more info) -diff --git a/third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_missing.rs b/third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_missing.rs -deleted file mode 100644 -index fff6b2cc13062..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_missing.rs -+++ /dev/null -@@ -1,13 +0,0 @@ --use bitflags::bitflags; -- --struct MyInt(u8); -- --bitflags! { -- struct Flags128: MyInt { -- const A = MyInt(0b0000_0001); -- const B = MyInt(0b0000_0010); -- const C = MyInt(0b0000_0100); -- } --} -- --fn main() {} -diff --git a/third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_missing.stderr.beta b/third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_missing.stderr.beta -deleted file mode 100644 -index ee95f8365e33e..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-fail/non_integer_base/all_missing.stderr.beta -+++ /dev/null -@@ -1,13 +0,0 @@ --error[E0204]: the trait `Copy` may not be implemented for this type -- --> $DIR/all_missing.rs:5:1 -- | --5 | / bitflags! { --6 | | struct Flags128: MyInt { --7 | | const A = MyInt(0b0000_0001); --8 | | const B = MyInt(0b0000_0010); --9 | | const C = MyInt(0b0000_0100); --10 | | } --11 | | } -- | |_^ this field does not implement `Copy` -- | -- = note: this error originates in the derive macro `Copy` (in Nightly builds, run with -Z macro-backtrace for more info) -diff --git a/third_party/rust/bitflags/tests/compile-fail/visibility/private_field.rs b/third_party/rust/bitflags/tests/compile-fail/visibility/private_field.rs -deleted file mode 100644 -index a6a3912aea30a..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-fail/visibility/private_field.rs -+++ /dev/null -@@ -1,13 +0,0 @@ --mod example { -- use bitflags::bitflags; -- -- bitflags! { -- pub struct Flags1: u32 { -- const FLAG_A = 0b00000001; -- } -- } --} -- --fn main() { -- let flag1 = example::Flags1::FLAG_A.bits; --} -diff --git a/third_party/rust/bitflags/tests/compile-fail/visibility/private_field.stderr.beta b/third_party/rust/bitflags/tests/compile-fail/visibility/private_field.stderr.beta -deleted file mode 100644 -index 58a04660166a8..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-fail/visibility/private_field.stderr.beta -+++ /dev/null -@@ -1,10 +0,0 @@ --error[E0616]: field `bits` of struct `Flags1` is private -- --> $DIR/private_field.rs:12:41 -- | --12 | let flag1 = example::Flags1::FLAG_A.bits; -- | ^^^^ private field -- | --help: a method `bits` also exists, call it with parentheses -- | --12 | let flag1 = example::Flags1::FLAG_A.bits(); -- | ^^ -diff --git a/third_party/rust/bitflags/tests/compile-fail/visibility/private_flags.rs b/third_party/rust/bitflags/tests/compile-fail/visibility/private_flags.rs -deleted file mode 100644 -index 85a5b1863dd43..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-fail/visibility/private_flags.rs -+++ /dev/null -@@ -1,18 +0,0 @@ --mod example { -- use bitflags::bitflags; -- -- bitflags! { -- pub struct Flags1: u32 { -- const FLAG_A = 0b00000001; -- } -- -- struct Flags2: u32 { -- const FLAG_B = 0b00000010; -- } -- } --} -- --fn main() { -- let flag1 = example::Flags1::FLAG_A; -- let flag2 = example::Flags2::FLAG_B; --} -diff --git a/third_party/rust/bitflags/tests/compile-fail/visibility/private_flags.stderr.beta b/third_party/rust/bitflags/tests/compile-fail/visibility/private_flags.stderr.beta -deleted file mode 100644 -index d23f83209ba90..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-fail/visibility/private_flags.stderr.beta -+++ /dev/null -@@ -1,18 +0,0 @@ --error[E0603]: struct `Flags2` is private -- --> $DIR/private_flags.rs:17:26 -- | --17 | let flag2 = example::Flags2::FLAG_B; -- | ^^^^^^ private struct -- | --note: the struct `Flags2` is defined here -- --> $DIR/private_flags.rs:4:5 -- | --4 | / bitflags! { --5 | | pub struct Flags1: u32 { --6 | | const FLAG_A = 0b00000001; --7 | | } --... | --11 | | } --12 | | } -- | |_____^ -- = note: this error originates in the macro `bitflags` (in Nightly builds, run with -Z macro-backtrace for more info) -diff --git a/third_party/rust/bitflags/tests/compile-fail/visibility/pub_const.rs b/third_party/rust/bitflags/tests/compile-fail/visibility/pub_const.rs -deleted file mode 100644 -index b90f0ce92d1e6..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-fail/visibility/pub_const.rs -+++ /dev/null -@@ -1,9 +0,0 @@ --use bitflags::bitflags; -- --bitflags! { -- pub struct Flags1: u32 { -- pub const FLAG_A = 0b00000001; -- } --} -- --fn main() {} -diff --git a/third_party/rust/bitflags/tests/compile-fail/visibility/pub_const.stderr.beta b/third_party/rust/bitflags/tests/compile-fail/visibility/pub_const.stderr.beta -deleted file mode 100644 -index b01122c7ad879..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-fail/visibility/pub_const.stderr.beta -+++ /dev/null -@@ -1,5 +0,0 @@ --error: no rules expected the token `pub` -- --> $DIR/pub_const.rs:5:9 -- | --5 | pub const FLAG_A = 0b00000001; -- | ^^^ no rules expected this token in macro call -diff --git a/third_party/rust/bitflags/tests/compile-pass/impls/convert.rs b/third_party/rust/bitflags/tests/compile-pass/impls/convert.rs -deleted file mode 100644 -index 1f02982a8fa24..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-pass/impls/convert.rs -+++ /dev/null -@@ -1,17 +0,0 @@ --use bitflags::bitflags; -- --bitflags! { -- struct Flags: u32 { -- const A = 0b00000001; -- } --} -- --impl From<u32> for Flags { -- fn from(v: u32) -> Flags { -- Flags::from_bits_truncate(v) -- } --} -- --fn main() { -- --} -diff --git a/third_party/rust/bitflags/tests/compile-pass/impls/default.rs b/third_party/rust/bitflags/tests/compile-pass/impls/default.rs -deleted file mode 100644 -index a97b6536f2b58..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-pass/impls/default.rs -+++ /dev/null -@@ -1,10 +0,0 @@ --use bitflags::bitflags; -- --bitflags! { -- #[derive(Default)] -- struct Flags: u32 { -- const A = 0b00000001; -- } --} -- --fn main() {} -diff --git a/third_party/rust/bitflags/tests/compile-pass/impls/inherent_methods.rs b/third_party/rust/bitflags/tests/compile-pass/impls/inherent_methods.rs -deleted file mode 100644 -index 3052c460ec33a..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-pass/impls/inherent_methods.rs -+++ /dev/null -@@ -1,15 +0,0 @@ --use bitflags::bitflags; -- --bitflags! { -- struct Flags: u32 { -- const A = 0b00000001; -- } --} -- --impl Flags { -- pub fn new() -> Flags { -- Flags::A -- } --} -- --fn main() {} -diff --git a/third_party/rust/bitflags/tests/compile-pass/redefinition/core.rs b/third_party/rust/bitflags/tests/compile-pass/redefinition/core.rs -deleted file mode 100644 -index 47549215948d1..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-pass/redefinition/core.rs -+++ /dev/null -@@ -1,14 +0,0 @@ --use bitflags::bitflags; -- --// Checks for possible errors caused by overriding names used by `bitflags!` internally. -- --mod core {} --mod _core {} -- --bitflags! { -- struct Test: u8 { -- const A = 1; -- } --} -- --fn main() {} -diff --git a/third_party/rust/bitflags/tests/compile-pass/redefinition/stringify.rs b/third_party/rust/bitflags/tests/compile-pass/redefinition/stringify.rs -deleted file mode 100644 -index b04f2f6a49332..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-pass/redefinition/stringify.rs -+++ /dev/null -@@ -1,19 +0,0 @@ --use bitflags::bitflags; -- --// Checks for possible errors caused by overriding names used by `bitflags!` internally. -- --#[allow(unused_macros)] --macro_rules! stringify { -- ($($t:tt)*) => { "..." }; --} -- --bitflags! { -- struct Test: u8 { -- const A = 1; -- } --} -- --fn main() { -- // Just make sure we don't call the redefined `stringify` macro -- assert_eq!(format!("{:?}", Test::A), "A"); --} -diff --git a/third_party/rust/bitflags/tests/compile-pass/repr/c.rs b/third_party/rust/bitflags/tests/compile-pass/repr/c.rs -deleted file mode 100644 -index 6feba36ed82c1..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-pass/repr/c.rs -+++ /dev/null -@@ -1,10 +0,0 @@ --use bitflags::bitflags; -- --bitflags! { -- #[repr(C)] -- struct Flags: u32 { -- const A = 0b00000001; -- } --} -- --fn main() {} -diff --git a/third_party/rust/bitflags/tests/compile-pass/repr/transparent.rs b/third_party/rust/bitflags/tests/compile-pass/repr/transparent.rs -deleted file mode 100644 -index e38db4dd11b99..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-pass/repr/transparent.rs -+++ /dev/null -@@ -1,10 +0,0 @@ --use bitflags::bitflags; -- --bitflags! { -- #[repr(transparent)] -- struct Flags: u32 { -- const A = 0b00000001; -- } --} -- --fn main() {} -diff --git a/third_party/rust/bitflags/tests/compile-pass/visibility/bits_field.rs b/third_party/rust/bitflags/tests/compile-pass/visibility/bits_field.rs -deleted file mode 100644 -index 33a7967e629ef..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-pass/visibility/bits_field.rs -+++ /dev/null -@@ -1,11 +0,0 @@ --use bitflags::bitflags; -- --bitflags! { -- pub struct Flags1: u32 { -- const FLAG_A = 0b00000001; -- } --} -- --fn main() { -- assert_eq!(0b00000001, Flags1::FLAG_A.bits); --} -diff --git a/third_party/rust/bitflags/tests/compile-pass/visibility/pub_in.rs b/third_party/rust/bitflags/tests/compile-pass/visibility/pub_in.rs -deleted file mode 100644 -index c11050e3baf0c..0000000000000 ---- a/third_party/rust/bitflags/tests/compile-pass/visibility/pub_in.rs -+++ /dev/null -@@ -1,19 +0,0 @@ --mod a { -- mod b { -- use bitflags::bitflags; -- -- bitflags! { -- pub(in crate::a) struct Flags: u32 { -- const FLAG_A = 0b00000001; -- } -- } -- } -- -- pub fn flags() -> u32 { -- b::Flags::FLAG_A.bits() -- } --} -- --fn main() { -- assert_eq!(0b00000001, a::flags()); --} -diff --git a/third_party/rust/bitflags/tests/compile.rs b/third_party/rust/bitflags/tests/compile.rs -deleted file mode 100644 -index ed02d01e9ca1b..0000000000000 ---- a/third_party/rust/bitflags/tests/compile.rs -+++ /dev/null -@@ -1,63 +0,0 @@ --use std::{ -- fs, -- ffi::OsStr, -- io, -- path::Path, --}; -- --use walkdir::WalkDir; -- --#[test] --fn fail() { -- prepare_stderr_files("tests/compile-fail").unwrap(); -- -- let t = trybuild::TestCases::new(); -- t.compile_fail("tests/compile-fail/**/*.rs"); --} -- --#[test] --fn pass() { -- let t = trybuild::TestCases::new(); -- t.pass("tests/compile-pass/**/*.rs"); --} -- --// Compiler messages may change between versions --// We don't want to have to track these too closely for `bitflags`, but --// having some message to check makes sure user-facing errors are sensical. --// --// The approach we use is to run the test on all compilers, but only check stderr --// output on beta (which is the next stable release). We do this by default ignoring --// any `.stderr` files in the `compile-fail` directory, and copying `.stderr.beta` files --// when we happen to be running on a beta compiler. --fn prepare_stderr_files(path: impl AsRef<Path>) -> io::Result<()> { -- for entry in WalkDir::new(path) { -- let entry = entry?; -- -- if entry.path().extension().and_then(OsStr::to_str) == Some("beta") { -- let renamed = entry.path().with_extension(""); -- -- // Unconditionally remove a corresponding `.stderr` file for a `.stderr.beta` -- // file if it exists. On `beta` compilers, we'll recreate it. On other compilers, -- // we don't want to end up checking it anyways. -- if renamed.exists() { -- fs::remove_file(&renamed)?; -- } -- -- rename_beta_stderr(entry.path(), renamed)?; -- } -- } -- -- Ok(()) --} -- --#[rustversion::beta] --fn rename_beta_stderr(from: impl AsRef<Path>, to: impl AsRef<Path>) -> io::Result<()> { -- fs::copy(from, to)?; -- -- Ok(()) --} -- --#[rustversion::not(beta)] --fn rename_beta_stderr(_: impl AsRef<Path>, _: impl AsRef<Path>) -> io::Result<()> { -- Ok(()) --} -diff --git a/third_party/rust/midir/.cargo-checksum.json b/third_party/rust/midir/.cargo-checksum.json -index 390b25b1e0118..34b17c2c5c548 100644 ---- a/third_party/rust/midir/.cargo-checksum.json -+++ b/third_party/rust/midir/.cargo-checksum.json -@@ -1 +1 @@ --{"files":{"CHANGELOG.md":"10db6f8dbb1c5566e75f2eeda6b2ee8bb44fe4a76f57e0bfb98c62f7f8c04f89","Cargo.toml":"41aa086ea813af75458515ff515917bb48d20eaef42a74352ea12ff8d5d16bce","LICENSE":"6fe6f623b1fa80e90679aee2f917d8978a184988ebb995ebc254cc9633903cac","README.md":"4131b953217e77a4463fde307ba3262b4df11732c1ff209668df12dff3c73ffc","azure-pipelines-template.yml":"c787791a94e654226a299aaa875fcc48f6eedf4dae631855cb5a7067891dbe3a","azure-pipelines.yml":"1b4fab0afacc66732a385cb6e5b213c170fc9717219a03ccda9c5db78cd461dd","examples/test_forward.rs":"6cb060aba7e8c39eaf53ea95a72d4c7939ffb4bebc82c291135fdc35495078ce","examples/test_list_ports.rs":"41ba21ab1e56d76206abc8b291d27050cb1a788372f00f6761c78f03fb5981ff","examples/test_play.rs":"22630e46af9628d8193ad8e19ff095ad02542b7ab697be4e513da78210ad5c0c","examples/test_read_input.rs":"4901f18435c3f8021750ccd4687abe92194ab38f1e7721896a6a31f6650d524c","examples/test_reuse.rs":"fdb3b430aec42c7c648fbecf22e6c726ef8a20638936a1a70fb373dff94c0632","examples/test_sysex.rs":"ea06427a644c3639f1c49271be5d16c9d3890d3741eb6ebf2ff64d2f7fd36e96","src/backend/alsa/mod.rs":"6bc784435247c3302bf12c3f558b6027abfbec997a280baa113c7344e5b0479f","src/backend/coremidi/mod.rs":"f827cbc5db7086ea58c5927213a2c3e0246244d5939c2ba0ff787caae7089511","src/backend/jack/mod.rs":"8f2eace3e9046ec6de8c7fc37d3502d2b971a73fe2a96e5c2a423d51445f1505","src/backend/jack/wrappers.rs":"f18718f234e41c91bb5463546fbbe61be64e9581a4fae6ef2de20cafae487298","src/backend/mod.rs":"1a8106889ecd053af27b3a72515bfb286da1b08bb90909fa6d4e7b816b50c447","src/backend/webmidi/mod.rs":"4af5b288833ee99f047a638b368eca293f89356f1e82147c9a9c1633d950955d","src/backend/winmm/handler.rs":"45b36067fd280a38943f385d3d7f6885d7448153f53e9c8f66b58b484535ad1c","src/backend/winmm/mod.rs":"94d8c57fd2d327993d01ef06d8c68190c528fe52dd39e6b97c88d9f1f0afa753","src/backend/winrt/mod.rs":"ca7ac4ac310e7f6a6c28dd6374bfe97b38ed8656c7ca343494264cce45f93ae6","src/common.rs":"2cab2e987428522ca601544b516b64b858859730fbd1be0e53c828e82025319d","src/errors.rs":"495ba80f9dcfeefd343b460b74549b12cb1825c3e1b315848f859d0b4d66ddbe","src/lib.rs":"ecde030ca02a90a99577cd71446857a2c00aee8ff1bc7890c54a5d0d22d2be2c","src/os/mod.rs":"507dfa95e57805c489a883dcf9efddcb718d5178267f296294f72b3c397c12c7","src/os/unix.rs":"a1977659d270fcf31111d4446b949d2760d76e2077639e6008d634800861b77b","tests/virtual.rs":"b47501eeb313f3e255d2d1888c333ff994d958865272929fe7bf116be45b6805"},"package":null} -\ No newline at end of file -+{"files":{"CHANGELOG.md":"10db6f8dbb1c5566e75f2eeda6b2ee8bb44fe4a76f57e0bfb98c62f7f8c04f89","Cargo.toml":"792c11a1ab6ce0443cb040994b02f1e80e07d19e6bf59f683a7fb227539bc028","LICENSE":"6fe6f623b1fa80e90679aee2f917d8978a184988ebb995ebc254cc9633903cac","README.md":"4131b953217e77a4463fde307ba3262b4df11732c1ff209668df12dff3c73ffc","azure-pipelines-template.yml":"c787791a94e654226a299aaa875fcc48f6eedf4dae631855cb5a7067891dbe3a","azure-pipelines.yml":"1b4fab0afacc66732a385cb6e5b213c170fc9717219a03ccda9c5db78cd461dd","examples/test_forward.rs":"6cb060aba7e8c39eaf53ea95a72d4c7939ffb4bebc82c291135fdc35495078ce","examples/test_list_ports.rs":"41ba21ab1e56d76206abc8b291d27050cb1a788372f00f6761c78f03fb5981ff","examples/test_play.rs":"22630e46af9628d8193ad8e19ff095ad02542b7ab697be4e513da78210ad5c0c","examples/test_read_input.rs":"4901f18435c3f8021750ccd4687abe92194ab38f1e7721896a6a31f6650d524c","examples/test_reuse.rs":"fdb3b430aec42c7c648fbecf22e6c726ef8a20638936a1a70fb373dff94c0632","examples/test_sysex.rs":"ea06427a644c3639f1c49271be5d16c9d3890d3741eb6ebf2ff64d2f7fd36e96","src/backend/alsa/mod.rs":"6bc784435247c3302bf12c3f558b6027abfbec997a280baa113c7344e5b0479f","src/backend/coremidi/mod.rs":"f827cbc5db7086ea58c5927213a2c3e0246244d5939c2ba0ff787caae7089511","src/backend/jack/mod.rs":"8f2eace3e9046ec6de8c7fc37d3502d2b971a73fe2a96e5c2a423d51445f1505","src/backend/jack/wrappers.rs":"f18718f234e41c91bb5463546fbbe61be64e9581a4fae6ef2de20cafae487298","src/backend/mod.rs":"1a8106889ecd053af27b3a72515bfb286da1b08bb90909fa6d4e7b816b50c447","src/backend/webmidi/mod.rs":"4af5b288833ee99f047a638b368eca293f89356f1e82147c9a9c1633d950955d","src/backend/winmm/handler.rs":"45b36067fd280a38943f385d3d7f6885d7448153f53e9c8f66b58b484535ad1c","src/backend/winmm/mod.rs":"94d8c57fd2d327993d01ef06d8c68190c528fe52dd39e6b97c88d9f1f0afa753","src/backend/winrt/mod.rs":"ca7ac4ac310e7f6a6c28dd6374bfe97b38ed8656c7ca343494264cce45f93ae6","src/common.rs":"2cab2e987428522ca601544b516b64b858859730fbd1be0e53c828e82025319d","src/errors.rs":"495ba80f9dcfeefd343b460b74549b12cb1825c3e1b315848f859d0b4d66ddbe","src/lib.rs":"ecde030ca02a90a99577cd71446857a2c00aee8ff1bc7890c54a5d0d22d2be2c","src/os/mod.rs":"507dfa95e57805c489a883dcf9efddcb718d5178267f296294f72b3c397c12c7","src/os/unix.rs":"a1977659d270fcf31111d4446b949d2760d76e2077639e6008d634800861b77b","tests/virtual.rs":"b47501eeb313f3e255d2d1888c333ff994d958865272929fe7bf116be45b6805"},"package":null} -\ No newline at end of file -diff --git a/third_party/rust/midir/Cargo.toml b/third_party/rust/midir/Cargo.toml -index 49089e0ffe86e..ac48aab304db9 100644 ---- a/third_party/rust/midir/Cargo.toml -+++ b/third_party/rust/midir/Cargo.toml -@@ -28,8 +28,8 @@ libc = { version = "0.2.21", optional = true } - winrt = { version = "0.7.0", optional = true} - - [target.'cfg(target_os = "linux")'.dependencies] --alsa = "0.4.3" --nix = "0.15" -+alsa = "0.5.0" -+nix = "0.20" - libc = "0.2.21" - - [target.'cfg(target_os = "macos")'.dependencies] -diff --git a/third_party/rust/nix-0.15.0/.cargo-checksum.json b/third_party/rust/nix-0.15.0/.cargo-checksum.json -new file mode 100644 -index 0000000000000..e5f2bc789185a ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/.cargo-checksum.json -@@ -0,0 +1 @@ -+{"files":{"CHANGELOG.md":"91af9fd5f2d9cdb9c8bb750e24b625742e95a6c74bcff419f3de70eb26578281","CONTRIBUTING.md":"a9101e3d1487170d691d5f062ff49a433c167582ac8984dd41a744be92652f74","CONVENTIONS.md":"e150ce43c1d188c392c1a3bf7f2e08e3cf84906705c7bef43f319037d29ea385","Cargo.toml":"af0cc0ae7ff4bf6c2e5b35fe062f54fe2d619f70ba67795f4f43a981420b5de0","LICENSE":"66e3ee1fa7f909ad3c612d556f2a0cdabcd809ad6e66f3b0605015ac64841b70","README.md":"80d71b9eaac7bf7f0d307372592ed1467f994291e6fad816a44f3c70e2887d0f","build.rs":"14c9c678c33f5894509da47f77d6a326b14aecb4190ce87a24cce98687ca63b2","src/dir.rs":"21e330cbe6594274335b94d9e9b6059f1fa8e53d2e5b5c697058c52ec6b3c5ff","src/errno.rs":"a009ccf18b45c0a4c9319c65b0dc5bc322d9ad43cfe462ec4661559f44162451","src/errno_dragonfly.c":"a857e47b114acb85fddcb252a610ab5734d225c26b7bedd7c35d7789d46c8526","src/fcntl.rs":"6ae2f7f01dd2568b82a4e57f86e02b1d63eec6c26111c5adb2ca5d78a2a99fe7","src/features.rs":"22ff626ff8287a07dd55bcfc63c9f518c19c56144e15f9b6f9e3bbdcda51c2a8","src/ifaddrs.rs":"9a93de176edcca4613e668b8ccc2c3e3b6b711aa2d8d94ccb0ba08694d1ef35f","src/kmod.rs":"4d8a695d3d761f351a39d654303a1bd168e74295b7d142b918737e355b24f34d","src/lib.rs":"fdd8049a79ffb92384c72f0a6b0bab717001ddfa9b01f2b33413c83f424f2ac8","src/macros.rs":"aec27fa0fd98900913fada926c9a4581cd28f2640e3a7b5480707f923c9200f8","src/mount.rs":"cdf5db8409017483132db9d7493b5d6cc96df5560d0fa5ad8f385aff72db10ca","src/mqueue.rs":"82af42b31381af73e7966f845d1ed93957f0b9976bf2da524b178fad15b2b08d","src/net/if_.rs":"f7e02076fcf3cadf3fdf141884c9bd2c468a7047ba60bc490f0057df802b53ce","src/net/mod.rs":"577f70170e53d4a6de1abb70bf8f1031ec3e65c0e63ef5fcf05c907125e7ac17","src/poll.rs":"7305e250066cd1a7318cd239ed3db787937ee98426fe9289cf00fa874d76b6c7","src/pty.rs":"6b965b586579933af47d4efef4c82c391b927037eaa08d8c83fc974ef17fc7c8","src/sched.rs":"f9b214fa60006b5450ffb3589a55ec59c3694bd49597c65c38ac813fcd96c7dd","src/sys/aio.rs":"a1ba629258b3ce1268e5fe8e5b41dce3581f77d415dc5e2455c1f82f26dd3085","src/sys/epoll.rs":"f0b539e0645569657f2142db91a38c94ebe1925f44852d64c61c818758dbbf0b","src/sys/event.rs":"ef8bc02a08d9ce7924c87f8f891fa051587b195a36913712fe85237a2fe0685b","src/sys/eventfd.rs":"08008cf3dc64c2216847c02c0dd8d7189cf08edbaafe35ba2c57c053fde09ef4","src/sys/inotify.rs":"687c8417d737939aa93f805d6003afc4f84f50828b1bd9429ef5d00bef0e0955","src/sys/ioctl/bsd.rs":"56ca6ecf5f7cfb566f4f3ba589fcc778f747a517dd45e13780981922e6215344","src/sys/ioctl/linux.rs":"6cfbdff4dbfa1a3782acdedebe89ffa9f000fdfc4ab68cb46f52890ebc1c6f2d","src/sys/ioctl/mod.rs":"20bc3cf1fcbbc7c31e4d507baa4e576a793ea42fb33618d2e7afeda730c4324f","src/sys/memfd.rs":"11cd93c867fdbdbc9588cecb94268691de42b2ef2a38fe33525be7c7f60c85d5","src/sys/mman.rs":"f77d28611a7ff3bf62784a3c4f26d7d79969395b1d9bbc6ff15e734f52dc404f","src/sys/mod.rs":"f39a08c72e37638c7cecfb9c087e0a41e2b69409aa545b0ef7bbd59c0a063ee2","src/sys/pthread.rs":"cfa9ccd6f3b86c0c3fe012773c9c82a7813b298c2f20f8ab629781db627ce56b","src/sys/ptrace/bsd.rs":"8a7eacfc172b55763ae32109bf9b252669ba68b72cd5122f7504eb35c0c08345","src/sys/ptrace/linux.rs":"f09b45148004f4b28d8503c397a8d112d31046c98e68335bf4e89425d5b33f07","src/sys/ptrace/mod.rs":"671a6ccac955e75d5998f7e53ffc45ed4c7b6522a0f24a0937d60141f692dd39","src/sys/quota.rs":"7eb8e797466b506f6ed882f18eda92c4639cf43d9384a19bc39cd1bf982989c9","src/sys/reboot.rs":"fde9da27c2928f7026231430fa14fec2058df4e49a0aeda2a237a60524f11241","src/sys/select.rs":"57d6c4403d1bf788bd52ab6f03cfc16a189d31b6bfb338b135cb775fe369121f","src/sys/sendfile.rs":"ea386e83baf9b5b23488aca26635aacdc92f2bfe238e4399a7380bd0331e0ef7","src/sys/signal.rs":"9216cdd609b4dfb9c2e559c411be6b7c722f7ddd8024682c0895a32126b488aa","src/sys/signalfd.rs":"bfcfce619bf199e50f9cc80a3eb778d48474a015cfdafc64a0c3517373a225a9","src/sys/socket/addr.rs":"8b297ce13cd8ad200b3e764888c26ceb582ee505385d1e172440de94ade99644","src/sys/socket/mod.rs":"e0353f04f3d098a8bf5e2aae431645897b96e0889fb76537dc0330159c6f233d","src/sys/socket/sockopt.rs":"c663505d6a7a7ae9d76e03fbc17e53d308ea6b1eae92212812e1d76b2bf2916f","src/sys/stat.rs":"c4807048f86be67026756737cf81f448ec23c2a4745776cb40f40b533a88e0c8","src/sys/statfs.rs":"d2b72069f20aa7782ce5de4ec2d00c76a82a92376c2066bbb270cdac2167719e","src/sys/statvfs.rs":"2d328cf525ba04ab1e1351128624a7df7d0c55ea91fda6c8d620d13710d61606","src/sys/sysinfo.rs":"0c05244655aa9e6dff5138392c5c1ae97630d35bae0e5510d7f51a75c31fd425","src/sys/termios.rs":"a2e99afdfc3526641a2cb82b57bfd0a25a362fb9be5ad37ff9f11acaeb0b9439","src/sys/time.rs":"8a1224b9262026086af698630aedbed21b45d661fbd045fc6c6af41a16a23374","src/sys/uio.rs":"60a974275ff8c485ea183bdd6f7e25894e6f2360a5bfb25442391a825a3b9b8c","src/sys/utsname.rs":"c977a1aec6e051c72b27506395e942abab9cbd9523e6d345ea66dc10875ee87d","src/sys/wait.rs":"30b14a8f518d031805cae6c6ff644116f162d8c8a75fddcfce4479d8d55fd1c0","src/ucontext.rs":"075560ec08a362881534211f8c6b78844886d6b767c2f7067174600e38ed3f63","src/unistd.rs":"82308ec31b6293b55f86fafd04e976a41127fedebb8f158abd1399c7399af947","test/sys/mod.rs":"e0821cbc289ad952f17229609c7de4282cca1e44cd13e1a7494a6378ecbc12f8","test/sys/test_aio.rs":"b2544bfb321ca7fbed276ee637c769fb438156d14666cdc1e1d547b3514a44e3","test/sys/test_aio_drop.rs":"30dd1d238269d00381fa50f6d3cb2b13794b7cceb9f6455f3878fcbffa9aa62d","test/sys/test_epoll.rs":"35093d0cb1096a934dfc4f6efc737eadc4bdc2e2134d2a879061374a51b10c97","test/sys/test_inotify.rs":"a4f804bcf414b6635d9863c8534769a609009c451c3476cc839cdc30c439b3b1","test/sys/test_ioctl.rs":"eea690ed386da0a666df5eb23a417421fddb99dc8e39556f63b30969bb6cf779","test/sys/test_lio_listio_resubmit.rs":"203a583313542593148f375b087ae30620222a745680173fa98fc448d1e5ae7f","test/sys/test_pthread.rs":"3890e5ecbf2082e0d05d102cc9cec6e76ede3c15f250d104e3483b1c1c3400b1","test/sys/test_ptrace.rs":"4e8d5dff5fe6bc56e4ae53bdfd10f5e8ea567d8099576d1c690cf7a6b2bc955f","test/sys/test_select.rs":"bdb20211fc6ec1e3f186337eac51e08757acb6901d307d67c71bf9011f0d54bd","test/sys/test_signal.rs":"84ae63c2baa49eebeabe5bbd347b9c5417e14ba97f342719d753dc1c1c768d60","test/sys/test_signalfd.rs":"71b5d6d782283f6db64ca90f7fb06617faec71091d59d2587e41bbc9d8c43d5c","test/sys/test_socket.rs":"09a7ef0322e07b4579893e0307a7c4f81fbbc653d005b827a519c33a33e185ce","test/sys/test_sockopt.rs":"b3d386c8279f86bf9439c772317bafcdba5630fa806c8319e87ddac0ccfa3a03","test/sys/test_sysinfo.rs":"1e1bea9130fe38ccb07cd0ad7334c7be1e45efc33f7656a5973f8cad7126f225","test/sys/test_termios.rs":"fa4be3ade859b527bf33408f85a6f57b127917cf5f2afb662d09f6019d07913a","test/sys/test_uio.rs":"9da234e3bd5003fd200cc37c4a5be147ecda1a7670feb1d505f23d646d3e1c57","test/sys/test_wait.rs":"e6c5147e213daa93892cd828f53214995d2e019ff2372cc48d85ce9b93d26ec9","test/test.rs":"e6307f82a39426a949b8e925a2df4a62e31c0e43081d7a33d23759bdfeeece1f","test/test_dir.rs":"5d137a62f11d1a4993b4bb35dccc38a4c4416b7da374887f2335a9895b4fdee4","test/test_fcntl.rs":"730e64e99dc867ba5af7cc4ca83a4489c8b96b1a52f8937bcc666d673af27002","test/test_kmod/hello_mod/Makefile":"0219f7bce0603f97d997fb377ca071966c90333ecc665e78a54dfeb97a9c811b","test/test_kmod/hello_mod/hello.c":"bcac6b19c5bd807e1f3878c15e426acc85785a8ade9840c3bb4d068635c9188c","test/test_kmod/mod.rs":"f4754f028402a8ba788c87686288424cd3784e77c7eb5d96682ef491b1dd5262","test/test_mount.rs":"78ddc657f5098360c764fffa3a7d844503e4b6b65b44bfd42d9aa9045b415cb6","test/test_mq.rs":"5806f8825e91edc79dd0e2bc81d8be3ba094c2de6c0b2ac0268221ae2ad22701","test/test_net.rs":"ec6d580b87292519d514b0236bdd5abdd576fcf4835cfe49ed1ddb47c5f1aea3","test/test_nix_path.rs":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","test/test_poll.rs":"46c71ee988fe1b85561ea0530d099750be8c1b8f95ab6e845c8a9f46f16f060c","test/test_pty.rs":"be04f99904fa47b60400c2bd156a388b73df4b9aec2eebf13df7dcdfc9aacf45","test/test_ptymaster_drop.rs":"5cfbbb79551c205ab510c2d4ef497bf937ceac9151fbe2f2e543d6515e406990","test/test_sendfile.rs":"e0cbabbd34052ccaa03d6555d5631686aa076728f6378ee90f7ecec68f891144","test/test_stat.rs":"1dc420d3119bf4d863a7ae0ba63efa7f1416f6e46e4100ea161003fe1c3f66ba","test/test_unistd.rs":"0325c998acca1e826e9e2b3d351d55ab9723a6cb2ca2072245978e7f5a9acee8"},"package":"3b2e0b4f3320ed72aaedb9a5ac838690a8047c7b275da22711fddff4f8a14229"} -\ No newline at end of file -diff --git a/third_party/rust/nix-0.15.0/CHANGELOG.md b/third_party/rust/nix-0.15.0/CHANGELOG.md -new file mode 100644 -index 0000000000000..d93a5ce6bbfc9 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/CHANGELOG.md -@@ -0,0 +1,742 @@ -+# Change Log -+ -+All notable changes to this project will be documented in this file. -+This project adheres to [Semantic Versioning](http://semver.org/). -+ -+## [Unreleased] - ReleaseDate -+### Added -+### Changed -+### Fixed -+### Removed -+ -+## [0.15.0] - 10 August 2019 -+### Added -+- Added `MSG_WAITALL` to `MsgFlags` in `sys::socket`. -+ ([#1079](https://github.com/nix-rust/nix/pull/1079)) -+- Implemented `Clone`, `Copy`, `Debug`, `Eq`, `Hash`, and `PartialEq` for most -+ types that support them. ([#1035](https://github.com/nix-rust/nix/pull/1035)) -+- Added `copy_file_range` wrapper -+ ([#1069](https://github.com/nix-rust/nix/pull/1069)) -+- Add `mkdirat`. -+ ([#1084](https://github.com/nix-rust/nix/pull/1084)) -+- Add `posix_fadvise`. -+ ([#1089](https://github.com/nix-rust/nix/pull/1089)) -+- Added `AF_VSOCK` to `AddressFamily`. -+ ([#1091](https://github.com/nix-rust/nix/pull/1091)) -+- Add `unlinkat` -+ ([#1058](https://github.com/nix-rust/nix/pull/1058)) -+- Add `renameat`. -+ ([#1097](https://github.com/nix-rust/nix/pull/1097)) -+ -+### Changed -+- Support for `ifaddrs` now present when building for Android. -+ ([#1077](https://github.com/nix-rust/nix/pull/1077)) -+- Minimum supported Rust version is now 1.31.0 -+ ([#1035](https://github.com/nix-rust/nix/pull/1035)) -+ ([#1095](https://github.com/nix-rust/nix/pull/1095)) -+- Now functions `statfs()` and `fstatfs()` return result with `Statfs` wrapper -+ ([#928](https://github.com/nix-rust/nix/pull/928)) -+ -+### Fixed -+- Enabled `sched_yield` for all nix hosts. -+ ([#1090](https://github.com/nix-rust/nix/pull/1090)) -+ -+### Removed -+ -+## [0.14.1] - 2019-06-06 -+### Added -+- Macros exported by `nix` may now be imported via `use` on the Rust 2018 -+ edition without importing helper macros on Linux targets. -+ ([#1066](https://github.com/nix-rust/nix/pull/1066)) -+ -+ For example, in Rust 2018, the `ioctl_read_bad!` macro can now be imported -+ without importing the `convert_ioctl_res!` macro. -+ -+ ```rust -+ use nix::ioctl_read_bad; -+ -+ ioctl_read_bad!(tcgets, libc::TCGETS, libc::termios); -+ ``` -+ -+### Changed -+- Changed some public types from reexports of libc types like `uint32_t` to the -+ native equivalents like `u32.` -+ ([#1072](https://github.com/nix-rust/nix/pull/1072/commits)) -+ -+### Fixed -+- Fix the build on Android and Linux/mips with recent versions of libc. -+ ([#1072](https://github.com/nix-rust/nix/pull/1072/commits)) -+ -+### Removed -+ -+## [0.14.0] - 2019-05-21 -+### Added -+- Add IP_RECVIF & IP_RECVDSTADDR. Enable IP_PKTINFO and IP6_PKTINFO on netbsd/openbsd. -+ ([#1002](https://github.com/nix-rust/nix/pull/1002)) -+- Added `inotify_init1`, `inotify_add_watch` and `inotify_rm_watch` wrappers for -+ Android and Linux. ([#1016](https://github.com/nix-rust/nix/pull/1016)) -+- Add `ALG_SET_IV`, `ALG_SET_OP` and `ALG_SET_AEAD_ASSOCLEN` control messages and `AF_ALG` -+ socket types on Linux and Android ([#1031](https://github.com/nix-rust/nix/pull/1031)) -+- Add killpg -+ ([#1034](https://github.com/nix-rust/nix/pull/1034)) -+- Added ENOTSUP errno support for Linux and Android. -+ ([#969](https://github.com/nix-rust/nix/pull/969)) -+- Add several errno constants from OpenBSD 6.2 -+ ([#1036](https://github.com/nix-rust/nix/pull/1036)) -+- Added `from_std` and `to_std` methods for `sys::socket::IpAddr` -+ ([#1043](https://github.com/nix-rust/nix/pull/1043)) -+- Added `nix::unistd:seteuid` and `nix::unistd::setegid` for those platforms that do -+ not support `setresuid` nor `setresgid` respectively. -+ ([#1044](https://github.com/nix-rust/nix/pull/1044)) -+- Added a `access` wrapper -+ ([#1045](https://github.com/nix-rust/nix/pull/1045)) -+- Add `forkpty` -+ ([#1042](https://github.com/nix-rust/nix/pull/1042)) -+- Add `sched_yield` -+ ([#1050](https://github.com/nix-rust/nix/pull/1050)) -+ -+### Changed -+- `PollFd` event flags renamed to `PollFlags` ([#1024](https://github.com/nix-rust/nix/pull/1024/)) -+- `recvmsg` now returns an Iterator over `ControlMessageOwned` objects rather -+ than `ControlMessage` objects. This is sadly not backwards-compatible. Fix -+ code like this: -+ ```rust -+ if let ControlMessage::ScmRights(&fds) = cmsg { -+ ``` -+ -+ By replacing it with code like this: -+ ```rust -+ if let ControlMessageOwned::ScmRights(fds) = cmsg { -+ ``` -+ ([#1020](https://github.com/nix-rust/nix/pull/1020)) -+- Replaced `CmsgSpace` with the `cmsg_space` macro. -+ ([#1020](https://github.com/nix-rust/nix/pull/1020)) -+ -+### Fixed -+- Fixed multiple bugs when using `sendmsg` and `recvmsg` with ancillary control messages -+ ([#1020](https://github.com/nix-rust/nix/pull/1020)) -+- Macros exported by `nix` may now be imported via `use` on the Rust 2018 -+ edition without importing helper macros for BSD targets. -+ ([#1041](https://github.com/nix-rust/nix/pull/1041)) -+ -+ For example, in Rust 2018, the `ioctl_read_bad!` macro can now be imported -+ without importing the `convert_ioctl_res!` macro. -+ -+ ```rust -+ use nix::ioctl_read_bad; -+ -+ ioctl_read_bad!(tcgets, libc::TCGETS, libc::termios); -+ ``` -+ -+### Removed -+- `Daemon`, `NOTE_REAP`, and `NOTE_EXIT_REPARENTED` are now deprecated on OSX -+ and iOS. -+ ([#1033](https://github.com/nix-rust/nix/pull/1033)) -+- `PTRACE_GETREGS`, `PTRACE_SETREGS`, `PTRACE_GETFPREGS`, and -+ `PTRACE_SETFPREGS` have been removed from some platforms where they never -+ should've been defined in the first place. -+ ([#1055](https://github.com/nix-rust/nix/pull/1055)) -+ -+## [0.13.0] - 2019-01-15 -+### Added -+- Added PKTINFO(V4) & V6PKTINFO cmsg support - Android/FreeBSD/iOS/Linux/MacOS. -+ ([#990](https://github.com/nix-rust/nix/pull/990)) -+- Added support of CString type in `setsockopt`. -+ ([#972](https://github.com/nix-rust/nix/pull/972)) -+- Added option `TCP_CONGESTION` in `setsockopt`. -+ ([#972](https://github.com/nix-rust/nix/pull/972)) -+- Added `symlinkat` wrapper. -+ ([#997](https://github.com/nix-rust/nix/pull/997)) -+- Added `ptrace::{getregs, setregs}`. -+ ([#1010](https://github.com/nix-rust/nix/pull/1010)) -+- Added `nix::sys::signal::signal`. -+ ([#817](https://github.com/nix-rust/nix/pull/817)) -+- Added an `mprotect` wrapper. -+ ([#991](https://github.com/nix-rust/nix/pull/991)) -+ -+### Changed -+### Fixed -+- `lutimes` never worked on OpenBSD as it is not implemented on OpenBSD. It has -+ been removed. ([#1000](https://github.com/nix-rust/nix/pull/1000)) -+- `fexecve` never worked on NetBSD or on OpenBSD as it is not implemented on -+ either OS. It has been removed. ([#1000](https://github.com/nix-rust/nix/pull/1000)) -+ -+### Removed -+ -+## [0.12.0] 2018-11-28 -+ -+### Added -+- Added `FromStr` and `Display` impls for `nix::sys::Signal` -+ ([#884](https://github.com/nix-rust/nix/pull/884)) -+- Added a `sync` wrapper. -+ ([#961](https://github.com/nix-rust/nix/pull/961)) -+- Added a `sysinfo` wrapper. -+ ([#922](https://github.com/nix-rust/nix/pull/922)) -+- Support the `SO_PEERCRED` socket option and the `UnixCredentials` type on all Linux and Android targets. -+ ([#921](https://github.com/nix-rust/nix/pull/921)) -+- Added support for `SCM_CREDENTIALS`, allowing to send process credentials over Unix sockets. -+ ([#923](https://github.com/nix-rust/nix/pull/923)) -+- Added a `dir` module for reading directories (wraps `fdopendir`, `readdir`, and `rewinddir`). -+ ([#916](https://github.com/nix-rust/nix/pull/916)) -+- Added `kmod` module that allows loading and unloading kernel modules on Linux. -+ ([#930](https://github.com/nix-rust/nix/pull/930)) -+- Added `futimens` and `utimesat` wrappers ([#944](https://github.com/nix-rust/nix/pull/944)), -+ an `lutimes` wrapper ([#967](https://github.com/nix-rust/nix/pull/967)), -+ and a `utimes` wrapper ([#946](https://github.com/nix-rust/nix/pull/946)). -+- Added `AF_UNSPEC` wrapper to `AddressFamily` ([#948](https://github.com/nix-rust/nix/pull/948)) -+- Added the `mode_t` public alias within `sys::stat`. -+ ([#954](https://github.com/nix-rust/nix/pull/954)) -+- Added a `truncate` wrapper. -+ ([#956](https://github.com/nix-rust/nix/pull/956)) -+- Added a `fchownat` wrapper. -+ ([#955](https://github.com/nix-rust/nix/pull/955)) -+- Added support for `ptrace` on BSD operating systems ([#949](https://github.com/nix-rust/nix/pull/949)) -+- Added `ptrace` functions for reads and writes to tracee memory and ptrace kill -+ ([#949](https://github.com/nix-rust/nix/pull/949)) ([#958](https://github.com/nix-rust/nix/pull/958)) -+- Added a `acct` wrapper module for enabling and disabling process accounting -+ ([#952](https://github.com/nix-rust/nix/pull/952)) -+- Added the `time_t` and `suseconds_t` public aliases within `sys::time`. -+ ([#968](https://github.com/nix-rust/nix/pull/968)) -+- Added `unistd::execvpe` for Haiku, Linux and OpenBSD -+ ([#975](https://github.com/nix-rust/nix/pull/975)) -+- Added `Error::as_errno`. -+ ([#977](https://github.com/nix-rust/nix/pull/977)) -+ -+### Changed -+- Increased required Rust version to 1.24.1 -+ ([#900](https://github.com/nix-rust/nix/pull/900)) -+ ([#966](https://github.com/nix-rust/nix/pull/966)) -+ -+### Fixed -+- Made `preadv` take immutable slice of IoVec. -+ ([#914](https://github.com/nix-rust/nix/pull/914)) -+- Fixed passing multiple file descriptors over Unix Sockets. -+ ([#918](https://github.com/nix-rust/nix/pull/918)) -+ -+### Removed -+ -+## [0.11.0] 2018-06-01 -+ -+### Added -+- Added `sendfile` on FreeBSD and Darwin. -+ ([#901](https://github.com/nix-rust/nix/pull/901)) -+- Added `pselect` -+ ([#894](https://github.com/nix-rust/nix/pull/894)) -+- Exposed `preadv` and `pwritev` on the BSDs. -+ ([#883](https://github.com/nix-rust/nix/pull/883)) -+- Added `mlockall` and `munlockall` -+ ([#876](https://github.com/nix-rust/nix/pull/876)) -+- Added `SO_MARK` on Linux. -+ ([#873](https://github.com/nix-rust/nix/pull/873)) -+- Added safe support for nearly any buffer type in the `sys::aio` module. -+ ([#872](https://github.com/nix-rust/nix/pull/872)) -+- Added `sys::aio::LioCb` as a wrapper for `libc::lio_listio`. -+ ([#872](https://github.com/nix-rust/nix/pull/872)) -+- Added `unistd::getsid` -+ ([#850](https://github.com/nix-rust/nix/pull/850)) -+- Added `alarm`. ([#830](https://github.com/nix-rust/nix/pull/830)) -+- Added interface flags `IFF_NO_PI, IFF_TUN, IFF_TAP` on linux-like systems. -+ ([#853](https://github.com/nix-rust/nix/pull/853)) -+- Added `statvfs` module to all MacOS and Linux architectures. -+ ([#832](https://github.com/nix-rust/nix/pull/832)) -+- Added `EVFILT_EMPTY`, `EVFILT_PROCDESC`, and `EVFILT_SENDFILE` on FreeBSD. -+ ([#825](https://github.com/nix-rust/nix/pull/825)) -+- Exposed `termios::cfmakesane` on FreeBSD. -+ ([#825](https://github.com/nix-rust/nix/pull/825)) -+- Exposed `MSG_CMSG_CLOEXEC` on *BSD. -+ ([#825](https://github.com/nix-rust/nix/pull/825)) -+- Added `fchmod`, `fchmodat`. -+ ([#857](https://github.com/nix-rust/nix/pull/857)) -+- Added `request_code_write_int!` on FreeBSD/DragonFlyBSD -+ ([#833](https://github.com/nix-rust/nix/pull/833)) -+ -+### Changed -+- `Display` and `Debug` for `SysControlAddr` now includes all fields. -+ ([#837](https://github.com/nix-rust/nix/pull/837)) -+- `ioctl!` has been replaced with a family of `ioctl_*!` macros. -+ ([#833](https://github.com/nix-rust/nix/pull/833)) -+- `io!`, `ior!`, `iow!`, and `iorw!` has been renamed to `request_code_none!`, `request_code_read!`, -+ `request_code_write!`, and `request_code_readwrite!` respectively. These have also now been exposed -+ in the documentation. -+ ([#833](https://github.com/nix-rust/nix/pull/833)) -+- Enabled more `ptrace::Request` definitions for uncommon Linux platforms -+ ([#892](https://github.com/nix-rust/nix/pull/892)) -+- Emulation of `FD_CLOEXEC` and `O_NONBLOCK` was removed from `socket()`, `accept4()`, and -+ `socketpair()`. -+ ([#907](https://github.com/nix-rust/nix/pull/907)) -+ -+### Fixed -+- Fixed possible panics when using `SigAction::flags` on Linux -+ ([#869](https://github.com/nix-rust/nix/pull/869)) -+- Properly exposed 460800 and 921600 baud rates on NetBSD -+ ([#837](https://github.com/nix-rust/nix/pull/837)) -+- Fixed `ioctl_write_int!` on FreeBSD/DragonFlyBSD -+ ([#833](https://github.com/nix-rust/nix/pull/833)) -+- `ioctl_write_int!` now properly supports passing a `c_ulong` as the parameter on Linux non-musl targets -+ ([#833](https://github.com/nix-rust/nix/pull/833)) -+ -+### Removed -+- Removed explicit support for the `bytes` crate from the `sys::aio` module. -+ See `sys::aio::AioCb::from_boxed_slice` examples for alternatives. -+ ([#872](https://github.com/nix-rust/nix/pull/872)) -+- Removed `sys::aio::lio_listio`. Use `sys::aio::LioCb::listio` instead. -+ ([#872](https://github.com/nix-rust/nix/pull/872)) -+- Removed emulated `accept4()` from macos, ios, and netbsd targets -+ ([#907](https://github.com/nix-rust/nix/pull/907)) -+- Removed `IFF_NOTRAILERS` on OpenBSD, as it has been removed in OpenBSD 6.3 -+ ([#893](https://github.com/nix-rust/nix/pull/893)) -+ -+## [0.10.0] 2018-01-26 -+ -+### Added -+- Added specialized wrapper: `sys::ptrace::step` -+ ([#852](https://github.com/nix-rust/nix/pull/852)) -+- Added `AioCb::from_ptr` and `AioCb::from_mut_ptr` -+ ([#820](https://github.com/nix-rust/nix/pull/820)) -+- Added specialized wrappers: `sys::ptrace::{traceme, syscall, cont, attach}`. Using the matching routines -+ with `sys::ptrace::ptrace` is now deprecated. -+- Added `nix::poll` module for all platforms -+ ([#672](https://github.com/nix-rust/nix/pull/672)) -+- Added `nix::ppoll` function for FreeBSD and DragonFly -+ ([#672](https://github.com/nix-rust/nix/pull/672)) -+- Added protocol families in `AddressFamily` enum. -+ ([#647](https://github.com/nix-rust/nix/pull/647)) -+- Added the `pid()` method to `WaitStatus` for extracting the PID. -+ ([#722](https://github.com/nix-rust/nix/pull/722)) -+- Added `nix::unistd:fexecve`. -+ ([#727](https://github.com/nix-rust/nix/pull/727)) -+- Expose `uname()` on all platforms. -+ ([#739](https://github.com/nix-rust/nix/pull/739)) -+- Expose `signalfd` module on Android as well. -+ ([#739](https://github.com/nix-rust/nix/pull/739)) -+- Added `nix::sys::ptrace::detach`. -+ ([#749](https://github.com/nix-rust/nix/pull/749)) -+- Added timestamp socket control message variant: -+ `nix::sys::socket::ControlMessage::ScmTimestamp` -+ ([#663](https://github.com/nix-rust/nix/pull/663)) -+- Added socket option variant that enables the timestamp socket -+ control message: `nix::sys::socket::sockopt::ReceiveTimestamp` -+ ([#663](https://github.com/nix-rust/nix/pull/663)) -+- Added more accessor methods for `AioCb` -+ ([#773](https://github.com/nix-rust/nix/pull/773)) -+- Add `nix::sys::fallocate` -+ ([#768](https:://github.com/nix-rust/nix/pull/768)) -+- Added `nix::unistd::mkfifo`. -+ ([#602](https://github.com/nix-rust/nix/pull/774)) -+- Added `ptrace::Options::PTRACE_O_EXITKILL` on Linux and Android. -+ ([#771](https://github.com/nix-rust/nix/pull/771)) -+- Added `nix::sys::uio::{process_vm_readv, process_vm_writev}` on Linux -+ ([#568](https://github.com/nix-rust/nix/pull/568)) -+- Added `nix::unistd::{getgroups, setgroups, getgrouplist, initgroups}`. ([#733](https://github.com/nix-rust/nix/pull/733)) -+- Added `nix::sys::socket::UnixAddr::as_abstract` on Linux and Android. -+ ([#785](https://github.com/nix-rust/nix/pull/785)) -+- Added `nix::unistd::execveat` on Linux and Android. -+ ([#800](https://github.com/nix-rust/nix/pull/800)) -+- Added the `from_raw()` method to `WaitStatus` for converting raw status values -+ to `WaitStatus` independent of syscalls. -+ ([#741](https://github.com/nix-rust/nix/pull/741)) -+- Added more standard trait implementations for various types. -+ ([#814](https://github.com/nix-rust/nix/pull/814)) -+- Added `sigprocmask` to the signal module. -+ ([#826](https://github.com/nix-rust/nix/pull/826)) -+- Added `nix::sys::socket::LinkAddr` on Linux and all bsdlike system. -+ ([#813](https://github.com/nix-rust/nix/pull/813)) -+- Add socket options for `IP_TRANSPARENT` / `BIND_ANY`. -+ ([#835](https://github.com/nix-rust/nix/pull/835)) -+ -+### Changed -+- Exposed the `mqueue` module for all supported operating systems. -+ ([#834](https://github.com/nix-rust/nix/pull/834)) -+- Use native `pipe2` on all BSD targets. Users should notice no difference. -+ ([#777](https://github.com/nix-rust/nix/pull/777)) -+- Renamed existing `ptrace` wrappers to encourage namespacing ([#692](https://github.com/nix-rust/nix/pull/692)) -+- Marked `sys::ptrace::ptrace` as `unsafe`. -+- Changed function signature of `socket()` and `socketpair()`. The `protocol` argument -+ has changed type from `c_int` to `SockProtocol`. -+ It accepts a `None` value for default protocol that was specified with zero using `c_int`. -+ ([#647](https://github.com/nix-rust/nix/pull/647)) -+- Made `select` easier to use, adding the ability to automatically calculate the `nfds` parameter using the new -+ `FdSet::highest` ([#701](https://github.com/nix-rust/nix/pull/701)) -+- Exposed `unistd::setresuid` and `unistd::setresgid` on FreeBSD and OpenBSD -+ ([#721](https://github.com/nix-rust/nix/pull/721)) -+- Refactored the `statvfs` module removing extraneous API functions and the -+ `statvfs::vfs` module. Additionally `(f)statvfs()` now return the struct -+ directly. And the returned `Statvfs` struct now exposes its data through -+ accessor methods. ([#729](https://github.com/nix-rust/nix/pull/729)) -+- The `addr` argument to `madvise` and `msync` is now `*mut` to better match the -+ libc API. ([#731](https://github.com/nix-rust/nix/pull/731)) -+- `shm_open` and `shm_unlink` are no longer exposed on Android targets, where -+ they are not officially supported. ([#731](https://github.com/nix-rust/nix/pull/731)) -+- `MapFlags`, `MmapAdvise`, and `MsFlags` expose some more variants and only -+ officially-supported variants are provided for each target. -+ ([#731](https://github.com/nix-rust/nix/pull/731)) -+- Marked `pty::ptsname` function as `unsafe` -+ ([#744](https://github.com/nix-rust/nix/pull/744)) -+- Moved constants ptrace request, event and options to enums and updated ptrace functions and argument types accordingly. -+ ([#749](https://github.com/nix-rust/nix/pull/749)) -+- `AioCb::Drop` will now panic if the `AioCb` is still in-progress ([#715](https://github.com/nix-rust/nix/pull/715)) -+- Restricted `nix::sys::socket::UnixAddr::new_abstract` to Linux and Android only. -+ ([#785](https://github.com/nix-rust/nix/pull/785)) -+- The `ucred` struct has been removed in favor of a `UserCredentials` struct that -+ contains only getters for its fields. -+ ([#814](https://github.com/nix-rust/nix/pull/814)) -+- Both `ip_mreq` and `ipv6_mreq` have been replaced with `IpMembershipRequest` and -+ `Ipv6MembershipRequest`. -+ ([#814](https://github.com/nix-rust/nix/pull/814)) -+- Removed return type from `pause`. -+ ([#829](https://github.com/nix-rust/nix/pull/829)) -+- Changed the termios APIs to allow for using a `u32` instead of the `BaudRate` -+ enum on BSD platforms to support arbitrary baud rates. See the module docs for -+ `nix::sys::termios` for more details. -+ ([#843](https://github.com/nix-rust/nix/pull/843)) -+ -+### Fixed -+- Fix compilation and tests for OpenBSD targets -+ ([#688](https://github.com/nix-rust/nix/pull/688)) -+- Fixed error handling in `AioCb::fsync`, `AioCb::read`, and `AioCb::write`. -+ It is no longer an error to drop an `AioCb` that failed to enqueue in the OS. -+ ([#715](https://github.com/nix-rust/nix/pull/715)) -+- Fix potential memory corruption on non-Linux platforms when using -+ `sendmsg`/`recvmsg`, caused by mismatched `msghdr` definition. -+ ([#648](https://github.com/nix-rust/nix/pull/648)) -+ -+### Removed -+- `AioCb::from_boxed_slice` has been removed. It was never actually safe. Use -+ `from_bytes` or `from_bytes_mut` instead. -+ ([#820](https://github.com/nix-rust/nix/pull/820)) -+- The syscall module has been removed. This only exposed enough functionality for -+ `memfd_create()` and `pivot_root()`, which are still exposed as separate functions. -+ ([#747](https://github.com/nix-rust/nix/pull/747)) -+- The `Errno` variants are no longer reexported from the `errno` module. `Errno` itself is no longer reexported from the -+ crate root and instead must be accessed using the `errno` module. ([#696](https://github.com/nix-rust/nix/pull/696)) -+- Removed `MS_VERBOSE`, `MS_NOSEC`, and `MS_BORN` from `MsFlags`. These -+ are internal kernel flags and should never have been exposed. -+ ([#814](https://github.com/nix-rust/nix/pull/814)) -+ -+ -+## [0.9.0] 2017-07-23 -+ -+### Added -+- Added `sysconf`, `pathconf`, and `fpathconf` -+ ([#630](https://github.com/nix-rust/nix/pull/630) -+- Added `sys::signal::SigAction::{ flags, mask, handler}` -+ ([#611](https://github.com/nix-rust/nix/pull/609) -+- Added `nix::sys::pthread::pthread_self` -+ ([#591](https://github.com/nix-rust/nix/pull/591) -+- Added `AioCb::from_boxed_slice` -+ ([#582](https://github.com/nix-rust/nix/pull/582) -+- Added `nix::unistd::{openat, fstatat, readlink, readlinkat}` -+ ([#551](https://github.com/nix-rust/nix/pull/551)) -+- Added `nix::pty::{grantpt, posix_openpt, ptsname/ptsname_r, unlockpt}` -+ ([#556](https://github.com/nix-rust/nix/pull/556) -+- Added `nix::ptr::openpty` -+ ([#456](https://github.com/nix-rust/nix/pull/456)) -+- Added `nix::ptrace::{ptrace_get_data, ptrace_getsiginfo, ptrace_setsiginfo -+ and nix::Error::UnsupportedOperation}` -+ ([#614](https://github.com/nix-rust/nix/pull/614)) -+- Added `cfmakeraw`, `cfsetspeed`, and `tcgetsid`. ([#527](https://github.com/nix-rust/nix/pull/527)) -+- Added "bad none", "bad write_ptr", "bad write_int", and "bad readwrite" variants to the `ioctl!` -+ macro. ([#670](https://github.com/nix-rust/nix/pull/670)) -+- On Linux and Android, added support for receiving `PTRACE_O_TRACESYSGOOD` -+ events from `wait` and `waitpid` using `WaitStatus::PtraceSyscall` -+ ([#566](https://github.com/nix-rust/nix/pull/566)). -+ -+### Changed -+- The `ioctl!` macro and its variants now allow the generated functions to have -+ doccomments. ([#661](https://github.com/nix-rust/nix/pull/661)) -+- Changed `ioctl!(write ...)` into `ioctl!(write_ptr ...)` and `ioctl!(write_int ..)` variants -+ to more clearly separate those use cases. ([#670](https://github.com/nix-rust/nix/pull/670)) -+- Marked `sys::mman::{ mmap, munmap, madvise, munlock, msync }` as unsafe. -+ ([#559](https://github.com/nix-rust/nix/pull/559)) -+- Minimum supported Rust version is now 1.13. -+- Removed `revents` argument from `PollFd::new()` as it's an output argument and -+ will be overwritten regardless of value. -+ ([#542](https://github.com/nix-rust/nix/pull/542)) -+- Changed type signature of `sys::select::FdSet::contains` to make `self` -+ immutable ([#564](https://github.com/nix-rust/nix/pull/564)) -+- Introduced wrapper types for `gid_t`, `pid_t`, and `uid_t` as `Gid`, `Pid`, and `Uid` -+ respectively. Various functions have been changed to use these new types as -+ arguments. ([#629](https://github.com/nix-rust/nix/pull/629)) -+- Fixed compilation on all Android and iOS targets ([#527](https://github.com/nix-rust/nix/pull/527)) -+ and promoted them to Tier 2 support. -+- `nix::sys::statfs::{statfs,fstatfs}` uses statfs definition from `libc::statfs` instead of own linux specific type `nix::sys::Statfs`. -+ Also file system type constants like `nix::sys::statfs::ADFS_SUPER_MAGIC` were removed in favor of the libc equivalent. -+ ([#561](https://github.com/nix-rust/nix/pull/561)) -+- Revised the termios API including additional tests and documentation and exposed it on iOS. ([#527](https://github.com/nix-rust/nix/pull/527)) -+- `eventfd`, `signalfd`, and `pwritev`/`preadv` functionality is now included by default for all -+ supported platforms. ([#681](https://github.com/nix-rust/nix/pull/561)) -+- The `ioctl!` macro's plain variants has been replaced with "bad read" to be consistent with -+ other variants. The generated functions also have more strict types for their arguments. The -+ "*_buf" variants also now calculate total array size and take slice references for improved type -+ safety. The documentation has also been dramatically improved. -+ ([#670](https://github.com/nix-rust/nix/pull/670)) -+ -+### Removed -+- Removed `io::Error` from `nix::Error` and the conversion from `nix::Error` to `Errno` -+ ([#614](https://github.com/nix-rust/nix/pull/614)) -+- All feature flags have been removed in favor of conditional compilation on supported platforms. -+ `execvpe` is no longer supported, but this was already broken and will be added back in the next -+ release. ([#681](https://github.com/nix-rust/nix/pull/561)) -+- Removed `ioc_*` functions and many helper constants and macros within the `ioctl` module. These -+ should always have been private and only the `ioctl!` should be used in public code. -+ ([#670](https://github.com/nix-rust/nix/pull/670)) -+ -+### Fixed -+- Fixed multiple issues compiling under different archetectures and OSes. -+ Now compiles on Linux/MIPS ([#538](https://github.com/nix-rust/nix/pull/538)), -+ `Linux/PPC` ([#553](https://github.com/nix-rust/nix/pull/553)), -+ `MacOS/x86_64,i686` ([#553](https://github.com/nix-rust/nix/pull/553)), -+ `NetBSD/x64_64` ([#538](https://github.com/nix-rust/nix/pull/538)), -+ `FreeBSD/x86_64,i686` ([#536](https://github.com/nix-rust/nix/pull/536)), and -+ `Android` ([#631](https://github.com/nix-rust/nix/pull/631)). -+- `bind` and `errno_location` now work correctly on `Android` -+ ([#631](https://github.com/nix-rust/nix/pull/631)) -+- Added `nix::ptrace` on all Linux-kernel-based platforms -+ [#624](https://github.com/nix-rust/nix/pull/624). Previously it was -+ only available on x86, x86-64, and ARM, and also not on Android. -+- Fixed `sys::socket::sendmsg` with zero entry `cmsgs` parameter. -+ ([#623](https://github.com/nix-rust/nix/pull/623)) -+- Multiple constants related to the termios API have now been properly defined for -+ all supported platforms. ([#527](https://github.com/nix-rust/nix/pull/527)) -+- `ioctl!` macro now supports working with non-int datatypes and properly supports all platforms. -+ ([#670](https://github.com/nix-rust/nix/pull/670)) -+ -+## [0.8.1] 2017-04-16 -+ -+### Fixed -+- Fixed build on FreeBSD. (Cherry-picked -+ [a859ee3c](https://github.com/nix-rust/nix/commit/a859ee3c9396dfdb118fcc2c8ecc697e2d303467)) -+ -+## [0.8.0] 2017-03-02 -+ -+### Added -+- Added `::nix::sys::termios::BaudRate` enum to provide portable baudrate -+ values. ([#518](https://github.com/nix-rust/nix/pull/518)) -+- Added a new `WaitStatus::PtraceEvent` to support ptrace events on Linux -+ and Android ([#438](https://github.com/nix-rust/nix/pull/438)) -+- Added support for POSIX AIO -+ ([#483](https://github.com/nix-rust/nix/pull/483)) -+ ([#506](https://github.com/nix-rust/nix/pull/506)) -+- Added support for XNU system control sockets -+ ([#478](https://github.com/nix-rust/nix/pull/478)) -+- Added support for `ioctl` calls on BSD platforms -+ ([#478](https://github.com/nix-rust/nix/pull/478)) -+- Added struct `TimeSpec` -+ ([#475](https://github.com/nix-rust/nix/pull/475)) -+ ([#483](https://github.com/nix-rust/nix/pull/483)) -+- Added complete definitions for all kqueue-related constants on all supported -+ OSes -+ ([#415](https://github.com/nix-rust/nix/pull/415)) -+- Added function `epoll_create1` and bitflags `EpollCreateFlags` in -+ `::nix::sys::epoll` in order to support `::libc::epoll_create1`. -+ ([#410](https://github.com/nix-rust/nix/pull/410)) -+- Added `setresuid` and `setresgid` for Linux in `::nix::unistd` -+ ([#448](https://github.com/nix-rust/nix/pull/448)) -+- Added `getpgid` in `::nix::unistd` -+ ([#433](https://github.com/nix-rust/nix/pull/433)) -+- Added `tcgetpgrp` and `tcsetpgrp` in `::nix::unistd` -+ ([#451](https://github.com/nix-rust/nix/pull/451)) -+- Added `CLONE_NEWCGROUP` in `::nix::sched` -+ ([#457](https://github.com/nix-rust/nix/pull/457)) -+- Added `getpgrp` in `::nix::unistd` -+ ([#491](https://github.com/nix-rust/nix/pull/491)) -+- Added `fchdir` in `::nix::unistd` -+ ([#497](https://github.com/nix-rust/nix/pull/497)) -+- Added `major` and `minor` in `::nix::sys::stat` for decomposing `dev_t` -+ ([#508](https://github.com/nix-rust/nix/pull/508)) -+- Fixed the style of many bitflags and use `libc` in more places. -+ ([#503](https://github.com/nix-rust/nix/pull/503)) -+- Added `ppoll` in `::nix::poll` -+ ([#520](https://github.com/nix-rust/nix/pull/520)) -+- Added support for getting and setting pipe size with fcntl(2) on Linux -+ ([#540](https://github.com/nix-rust/nix/pull/540)) -+ -+### Changed -+- `::nix::sys::termios::{cfgetispeed, cfsetispeed, cfgetospeed, cfsetospeed}` -+ switched to use `BaudRate` enum from `speed_t`. -+ ([#518](https://github.com/nix-rust/nix/pull/518)) -+- `epoll_ctl` now could accept None as argument `event` -+ when op is `EpollOp::EpollCtlDel`. -+ ([#480](https://github.com/nix-rust/nix/pull/480)) -+- Removed the `bad` keyword from the `ioctl!` macro -+ ([#478](https://github.com/nix-rust/nix/pull/478)) -+- Changed `TimeVal` into an opaque Newtype -+ ([#475](https://github.com/nix-rust/nix/pull/475)) -+- `kill`'s signature, defined in `::nix::sys::signal`, changed, so that the -+ signal parameter has type `T: Into<Option<Signal>>`. `None` as an argument -+ for that parameter will result in a 0 passed to libc's `kill`, while a -+ `Some`-argument will result in the previous behavior for the contained -+ `Signal`. -+ ([#445](https://github.com/nix-rust/nix/pull/445)) -+- The minimum supported version of rustc is now 1.7.0. -+ ([#444](https://github.com/nix-rust/nix/pull/444)) -+- Changed `KEvent` to an opaque structure that may only be modified by its -+ constructor and the `ev_set` method. -+ ([#415](https://github.com/nix-rust/nix/pull/415)) -+ ([#442](https://github.com/nix-rust/nix/pull/442)) -+ ([#463](https://github.com/nix-rust/nix/pull/463)) -+- `pipe2` now calls `libc::pipe2` where available. Previously it was emulated -+ using `pipe`, which meant that setting `O_CLOEXEC` was not atomic. -+ ([#427](https://github.com/nix-rust/nix/pull/427)) -+- Renamed `EpollEventKind` to `EpollFlags` in `::nix::sys::epoll` in order for -+ it to conform with our conventions. -+ ([#410](https://github.com/nix-rust/nix/pull/410)) -+- `EpollEvent` in `::nix::sys::epoll` is now an opaque proxy for -+ `::libc::epoll_event`. The formerly public field `events` is now be read-only -+ accessible with the new method `events()` of `EpollEvent`. Instances of -+ `EpollEvent` can be constructed using the new method `new()` of EpollEvent. -+ ([#410](https://github.com/nix-rust/nix/pull/410)) -+- `SigFlags` in `::nix::sys::signal` has be renamed to `SigmaskHow` and its type -+ has changed from `bitflags` to `enum` in order to conform to our conventions. -+ ([#460](https://github.com/nix-rust/nix/pull/460)) -+- `sethostname` now takes a `&str` instead of a `&[u8]` as this provides an API -+ that makes more sense in normal, correct usage of the API. -+- `gethostname` previously did not expose the actual length of the hostname -+ written from the underlying system call at all. This has been updated to -+ return a `&CStr` within the provided buffer that is always properly -+ NUL-terminated (this is not guaranteed by the call with all platforms/libc -+ implementations). -+- Exposed all fcntl(2) operations at the module level, so they can be -+ imported direclty instead of via `FcntlArg` enum. -+ ([#541](https://github.com/nix-rust/nix/pull/541)) -+ -+### Fixed -+- Fixed multiple issues with Unix domain sockets on non-Linux OSes -+ ([#474](https://github.com/nix-rust/nix/pull/415)) -+- Fixed using kqueue with `EVFILT_USER` on FreeBSD -+ ([#415](https://github.com/nix-rust/nix/pull/415)) -+- Fixed the build on FreeBSD, and fixed the getsockopt, sendmsg, and recvmsg -+ functions on that same OS. -+ ([#397](https://github.com/nix-rust/nix/pull/397)) -+- Fixed an off-by-one bug in `UnixAddr::new_abstract` in `::nix::sys::socket`. -+ ([#429](https://github.com/nix-rust/nix/pull/429)) -+- Fixed clone passing a potentially unaligned stack. -+ ([#490](https://github.com/nix-rust/nix/pull/490)) -+- Fixed mkdev not creating a `dev_t` the same way as libc. -+ ([#508](https://github.com/nix-rust/nix/pull/508)) -+ -+## [0.7.0] 2016-09-09 -+ -+### Added -+- Added `lseek` and `lseek64` in `::nix::unistd` -+ ([#377](https://github.com/nix-rust/nix/pull/377)) -+- Added `mkdir` and `getcwd` in `::nix::unistd` -+ ([#416](https://github.com/nix-rust/nix/pull/416)) -+- Added accessors `sigmask_mut` and `sigmask` to `UContext` in -+ `::nix::ucontext`. -+ ([#370](https://github.com/nix-rust/nix/pull/370)) -+- Added `WUNTRACED` to `WaitPidFlag` in `::nix::sys::wait` for non-_linux_ -+ targets. -+ ([#379](https://github.com/nix-rust/nix/pull/379)) -+- Added new module `::nix::sys::reboot` with enumeration `RebootMode` and -+ functions `reboot` and `set_cad_enabled`. Currently for _linux_ only. -+ ([#386](https://github.com/nix-rust/nix/pull/386)) -+- `FdSet` in `::nix::sys::select` now also implements `Clone`. -+ ([#405](https://github.com/nix-rust/nix/pull/405)) -+- Added `F_FULLFSYNC` to `FcntlArg` in `::nix::fcntl` for _apple_ targets. -+ ([#407](https://github.com/nix-rust/nix/pull/407)) -+- Added `CpuSet::unset` in `::nix::sched`. -+ ([#402](https://github.com/nix-rust/nix/pull/402)) -+- Added constructor method `new()` to `PollFd` in `::nix::poll`, in order to -+ allow creation of objects, after removing public access to members. -+ ([#399](https://github.com/nix-rust/nix/pull/399)) -+- Added method `revents()` to `PollFd` in `::nix::poll`, in order to provide -+ read access to formerly public member `revents`. -+ ([#399](https://github.com/nix-rust/nix/pull/399)) -+- Added `MSG_CMSG_CLOEXEC` to `MsgFlags` in `::nix::sys::socket` for _linux_ only. -+ ([#422](https://github.com/nix-rust/nix/pull/422)) -+ -+### Changed -+- Replaced the reexported integer constants for signals by the enumeration -+ `Signal` in `::nix::sys::signal`. -+ ([#362](https://github.com/nix-rust/nix/pull/362)) -+- Renamed `EventFdFlag` to `EfdFlags` in `::nix::sys::eventfd`. -+ ([#383](https://github.com/nix-rust/nix/pull/383)) -+- Changed the result types of `CpuSet::is_set` and `CpuSet::set` in -+ `::nix::sched` to `Result<bool>` and `Result<()>`, respectively. They now -+ return `EINVAL`, if an invalid argument for the `field` parameter is passed. -+ ([#402](https://github.com/nix-rust/nix/pull/402)) -+- `MqAttr` in `::nix::mqueue` is now an opaque proxy for `::libc::mq_attr`, -+ which has the same structure as the old `MqAttr`. The field `mq_flags` of -+ `::libc::mq_attr` is readable using the new method `flags()` of `MqAttr`. -+ `MqAttr` also no longer implements `Debug`. -+ ([#392](https://github.com/nix-rust/nix/pull/392)) -+- The parameter `msq_prio` of `mq_receive` with type `u32` in `::nix::mqueue` -+ was replaced by a parameter named `msg_prio` with type `&mut u32`, so that -+ the message priority can be obtained by the caller. -+ ([#392](https://github.com/nix-rust/nix/pull/392)) -+- The type alias `MQd` in `::nix::queue` was replaced by the type alias -+ `libc::mqd_t`, both of which are aliases for the same type. -+ ([#392](https://github.com/nix-rust/nix/pull/392)) -+ -+### Removed -+- Type alias `SigNum` from `::nix::sys::signal`. -+ ([#362](https://github.com/nix-rust/nix/pull/362)) -+- Type alias `CpuMask` from `::nix::shed`. -+ ([#402](https://github.com/nix-rust/nix/pull/402)) -+- Removed public fields from `PollFd` in `::nix::poll`. (See also added method -+ `revents()`. -+ ([#399](https://github.com/nix-rust/nix/pull/399)) -+ -+### Fixed -+- Fixed the build problem for NetBSD (Note, that we currently do not support -+ it, so it might already be broken again). -+ ([#389](https://github.com/nix-rust/nix/pull/389)) -+- Fixed the build on FreeBSD, and fixed the getsockopt, sendmsg, and recvmsg -+ functions on that same OS. -+ ([#397](https://github.com/nix-rust/nix/pull/397)) -+ -+## [0.6.0] 2016-06-10 -+ -+### Added -+- Added `gettid` in `::nix::unistd` for _linux_ and _android_. -+ ([#293](https://github.com/nix-rust/nix/pull/293)) -+- Some _mips_ support in `::nix::sched` and `::nix::sys::syscall`. -+ ([#301](https://github.com/nix-rust/nix/pull/301)) -+- Added `SIGNALFD_SIGINFO_SIZE` in `::nix::sys::signalfd`. -+ ([#309](https://github.com/nix-rust/nix/pull/309)) -+- Added new module `::nix::ucontext` with struct `UContext`. Currently for -+ _linux_ only. -+ ([#311](https://github.com/nix-rust/nix/pull/311)) -+- Added `EPOLLEXCLUSIVE` to `EpollEventKind` in `::nix::sys::epoll`. -+ ([#330](https://github.com/nix-rust/nix/pull/330)) -+- Added `pause` to `::nix::unistd`. -+ ([#336](https://github.com/nix-rust/nix/pull/336)) -+- Added `sleep` to `::nix::unistd`. -+ ([#351](https://github.com/nix-rust/nix/pull/351)) -+- Added `S_IFDIR`, `S_IFLNK`, `S_IFMT` to `SFlag` in `::nix::sys::stat`. -+ ([#359](https://github.com/nix-rust/nix/pull/359)) -+- Added `clear` and `extend` functions to `SigSet`'s implementation in -+ `::nix::sys::signal`. -+ ([#347](https://github.com/nix-rust/nix/pull/347)) -+- `sockaddr_storage_to_addr` in `::nix::sys::socket` now supports `sockaddr_nl` -+ on _linux_ and _android_. -+ ([#366](https://github.com/nix-rust/nix/pull/366)) -+- Added support for `SO_ORIGINAL_DST` in `::nix::sys::socket` on _linux_. -+ ([#367](https://github.com/nix-rust/nix/pull/367)) -+- Added `SIGINFO` in `::nix::sys::signal` for the _macos_ target as well as -+ `SIGPWR` and `SIGSTKFLT` in `::nix::sys::signal` for non-_macos_ targets. -+ ([#361](https://github.com/nix-rust/nix/pull/361)) -+ -+### Changed -+- Changed the structure `IoVec` in `::nix::sys::uio`. -+ ([#304](https://github.com/nix-rust/nix/pull/304)) -+- Replaced `CREATE_NEW_FD` by `SIGNALFD_NEW` in `::nix::sys::signalfd`. -+ ([#309](https://github.com/nix-rust/nix/pull/309)) -+- Renamed `SaFlag` to `SaFlags` and `SigFlag` to `SigFlags` in -+ `::nix::sys::signal`. -+ ([#314](https://github.com/nix-rust/nix/pull/314)) -+- Renamed `Fork` to `ForkResult` and changed its fields in `::nix::unistd`. -+ ([#332](https://github.com/nix-rust/nix/pull/332)) -+- Added the `signal` parameter to `clone`'s signature in `::nix::sched`. -+ ([#344](https://github.com/nix-rust/nix/pull/344)) -+- `execv`, `execve`, and `execvp` now return `Result<Void>` instead of -+ `Result<()>` in `::nix::unistd`. -+ ([#357](https://github.com/nix-rust/nix/pull/357)) -+ -+### Fixed -+- Improved the conversion from `std::net::SocketAddr` to `InetAddr` in -+ `::nix::sys::socket::addr`. -+ ([#335](https://github.com/nix-rust/nix/pull/335)) -+ -+## [0.5.0] 2016-03-01 -diff --git a/third_party/rust/nix-0.15.0/CONTRIBUTING.md b/third_party/rust/nix-0.15.0/CONTRIBUTING.md -new file mode 100644 -index 0000000000000..03a1f630dbb06 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/CONTRIBUTING.md -@@ -0,0 +1,114 @@ -+# Contributing to nix -+ -+We're really glad you're interested in contributing to nix! This -+document has a few pointers and guidelines to help get you started. -+ -+To have a welcoming and inclusive project, nix uses the Rust project's -+[Code of Conduct][conduct]. All contributors are expected to follow it. -+ -+[conduct]: https://www.rust-lang.org/conduct.html -+ -+ -+# Issues -+ -+We use GitHub's [issue tracker][issues]. -+ -+[issues]: https://github.com/nix-rust/nix/issues -+ -+ -+## Bug reports -+ -+Before submitting a new bug report, please [search existing -+issues][issue-search] to see if there's something related. If not, just -+[open a new issue][new-issue]! -+ -+As a reminder, the more information you can give in your issue, the -+easier it is to figure out how to fix it. For nix, this will likely -+include the OS and version, and the architecture. -+ -+[issue-search]: https://github.com/nix-rust/nix/search?utf8=%E2%9C%93&q=is%3Aissue&type=Issues -+[new-issue]: https://github.com/nix-rust/nix/issues/new -+ -+ -+## Feature / API requests -+ -+If you'd like a new API or feature added, please [open a new -+issue][new-issue] requesting it. As with reporting a bug, the more -+information you can provide, the better. -+ -+ -+## Labels -+ -+We use labels to help manage issues. The structure is modeled after -+[Rust's issue labeling scheme][rust-labels]: -+- **A-**prefixed labels state which area of the project the issue -+ relates to -+- **E-**prefixed labels explain the level of experience necessary to fix the -+ issue -+- **O-**prefixed labels specify the OS for issues that are OS-specific -+- **R-**prefixed labels specify the architecture for issues that are -+ architecture-specific -+ -+[rust-labels]: https://github.com/rust-lang/rust/blob/master/CONTRIBUTING.md#issue-triage -+ -+ -+# Pull requests -+ -+GitHub pull requests are the primary mechanism we use to change nix. GitHub itself has -+some [great documentation][pr-docs] on using the Pull Request feature. We use the 'fork and -+pull' model described there. -+ -+Please make pull requests against the `master` branch. -+ -+If you change the API by way of adding, removing or changing something or if -+you fix a bug, please add an appropriate note to the [change log][cl]. We -+follow the conventions of [Keep A CHANGELOG][kacl]. -+ -+[cl]: https://github.com/nix-rust/nix/blob/master/CHANGELOG.md -+[kacl]: https://github.com/olivierlacan/keep-a-changelog/tree/18adb5f5be7a898d046f6a4acb93e39dcf40c4ad -+[pr-docs]: https://help.github.com/articles/using-pull-requests/ -+ -+## Testing -+ -+nix has a test suite that you can run with `cargo test`. Ideally, we'd like pull -+requests to include tests where they make sense. For example, when fixing a bug, -+add a test that would have failed without the fix. -+ -+After you've made your change, make sure the tests pass in your development -+environment. We also have [continuous integration set up on -+Travis-CI][travis-ci], which might find some issues on other platforms. The CI -+will run once you open a pull request. -+ -+There is also infrastructure for running tests for other targets -+locally. More information is available in the [CI Readme][ci-readme]. -+ -+[travis-ci]: https://travis-ci.org/nix-rust/nix -+[ci-readme]: ci/README.md -+ -+### Disabling a test in the CI environment -+ -+Sometimes there are features that cannot be tested in the CI environment. -+To stop a test from running under CI, add `#[cfg_attr(travis, ignore)]` -+to it. Please include a comment describing the reason it shouldn't run -+under CI, and a link to an upstream issue if possible! -+ -+## bors, the bot who merges all the PRs -+ -+All pull requests are merged via [bors], an integration bot. After the -+pull request has been reviewed, the reviewer will leave a comment like -+ -+> bors r+ -+ -+to let bors know that it was approved. Then bors will check that it passes -+tests when merged with the latest changes in the `master` branch, and -+merge if the tests succeed. -+ -+[bors]: https://bors-ng.github.io/ -+ -+ -+## API conventions -+ -+If you're adding a new API, we have a [document with -+conventions][conventions] to use throughout the nix project. -+ -+[conventions]: https://github.com/nix-rust/nix/blob/master/CONVENTIONS.md -diff --git a/third_party/rust/nix-0.15.0/CONVENTIONS.md b/third_party/rust/nix-0.15.0/CONVENTIONS.md -new file mode 100644 -index 0000000000000..48daa937345d2 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/CONVENTIONS.md -@@ -0,0 +1,87 @@ -+# Conventions -+ -+In order to achieve our goal of wrapping [libc][libc] code in idiomatic rust -+constructs with minimal performance overhead, we follow the following -+conventions. -+ -+Note that, thus far, not all the code follows these conventions and not all -+conventions we try to follow have been documented here. If you find an instance -+of either, feel free to remedy the flaw by opening a pull request with -+appropriate changes or additions. -+ -+## Change Log -+ -+We follow the conventions laid out in [Keep A CHANGELOG][kacl]. -+ -+[kacl]: https://github.com/olivierlacan/keep-a-changelog/tree/18adb5f5be7a898d046f6a4acb93e39dcf40c4ad -+ -+## libc constants, functions and structs -+ -+We do not define integer constants ourselves, but use or reexport them from the -+[libc crate][libc]. -+ -+We use the functions exported from [libc][libc] instead of writing our own -+`extern` declarations. -+ -+We use the `struct` definitions from [libc][libc] internally instead of writing -+our own. If we want to add methods to a libc type, we use the newtype pattern. -+For example, -+ -+```rust -+pub struct SigSet(libc::sigset_t); -+ -+impl SigSet { -+ ... -+} -+``` -+ -+When creating newtypes, we use Rust's `CamelCase` type naming convention. -+ -+## Bitflags -+ -+Many C functions have flags parameters that are combined from constants using -+bitwise operations. We represent the types of these parameters by types defined -+using our `libc_bitflags!` macro, which is a convenience wrapper around the -+`bitflags!` macro from the [bitflags crate][bitflags] that brings in the -+constant value from `libc`. -+ -+We name the type for a set of constants whose element's names start with `FOO_` -+`FooFlags`. -+ -+For example, -+ -+```rust -+libc_bitflags!{ -+ pub struct ProtFlags: libc::c_int { -+ PROT_NONE; -+ PROT_READ; -+ PROT_WRITE; -+ PROT_EXEC; -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ PROT_GROWSDOWN; -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ PROT_GROWSUP; -+ } -+} -+``` -+ -+ -+## Enumerations -+ -+We represent sets of constants that are intended as mutually exclusive arguments -+to parameters of functions by [enumerations][enum]. -+ -+ -+## Structures Initialized by libc Functions -+ -+Whenever we need to use a [libc][libc] function to properly initialize a -+variable and said function allows us to use uninitialized memory, we use -+[`std::mem::uninitialized`][std_uninitialized] (or [`core::mem::uninitialized`][core_uninitialized]) -+when defining the variable. This allows us to avoid the overhead incurred by -+zeroing or otherwise initializing the variable. -+ -+[bitflags]: https://crates.io/crates/bitflags/ -+[core_uninitialized]: https://doc.rust-lang.org/core/mem/fn.uninitialized.html -+[enum]: https://doc.rust-lang.org/reference.html#enumerations -+[libc]: https://crates.io/crates/libc/ -+[std_uninitialized]: https://doc.rust-lang.org/std/mem/fn.uninitialized.html -diff --git a/third_party/rust/nix-0.15.0/Cargo.toml b/third_party/rust/nix-0.15.0/Cargo.toml -new file mode 100644 -index 0000000000000..555b99020d68f ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/Cargo.toml -@@ -0,0 +1,71 @@ -+# THIS FILE IS AUTOMATICALLY GENERATED BY CARGO -+# -+# When uploading crates to the registry Cargo will automatically -+# "normalize" Cargo.toml files for maximal compatibility -+# with all versions of Cargo and also rewrite `path` dependencies -+# to registry (e.g., crates.io) dependencies -+# -+# If you believe there's an error in this file please file an -+# issue against the rust-lang/cargo repository. If you're -+# editing this file be aware that the upstream Cargo.toml -+# will likely look very different (and much more reasonable) -+ -+[package] -+name = "nix" -+version = "0.15.0" -+authors = ["The nix-rust Project Developers"] -+exclude = ["/.gitignore", "/.travis.yml", "/ci/*", "/Cross.toml", "/RELEASE_PROCEDURE.md", "/bors.toml"] -+description = "Rust friendly bindings to *nix APIs" -+categories = ["os::unix-apis"] -+license = "MIT" -+repository = "https://github.com/nix-rust/nix" -+ -+[[test]] -+name = "test" -+path = "test/test.rs" -+ -+[[test]] -+name = "test-aio-drop" -+path = "test/sys/test_aio_drop.rs" -+ -+[[test]] -+name = "test-lio-listio-resubmit" -+path = "test/sys/test_lio_listio_resubmit.rs" -+ -+[[test]] -+name = "test-mount" -+path = "test/test_mount.rs" -+harness = false -+ -+[[test]] -+name = "test-ptymaster-drop" -+path = "test/test_ptymaster_drop.rs" -+[dependencies.bitflags] -+version = "1.0" -+ -+[dependencies.cfg-if] -+version = "0.1.2" -+ -+[dependencies.libc] -+version = "0.2.60" -+features = ["extra_traits"] -+ -+[dependencies.void] -+version = "1.0.2" -+[dev-dependencies.bytes] -+version = "0.4.8" -+ -+[dev-dependencies.lazy_static] -+version = "1.2" -+ -+[dev-dependencies.rand] -+version = ">= 0.6, < 0.7" -+ -+[dev-dependencies.tempfile] -+version = ">= 3.0.5, < 3.0.9" -+[target."cfg(any(target_os = \"android\", target_os = \"linux\"))".dev-dependencies.caps] -+version = "0.3.1" -+[target."cfg(target_os = \"dragonfly\")".build-dependencies.cc] -+version = "1" -+[target."cfg(target_os = \"freebsd\")".dev-dependencies.sysctl] -+version = "0.1" -diff --git a/third_party/rust/nix-0.15.0/LICENSE b/third_party/rust/nix-0.15.0/LICENSE -new file mode 100644 -index 0000000000000..aff9096fdf11d ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/LICENSE -@@ -0,0 +1,21 @@ -+The MIT License (MIT) -+ -+Copyright (c) 2015 Carl Lerche + nix-rust Authors -+ -+Permission is hereby granted, free of charge, to any person obtaining a copy -+of this software and associated documentation files (the "Software"), to deal -+in the Software without restriction, including without limitation the rights -+to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -+copies of the Software, and to permit persons to whom the Software is -+furnished to do so, subject to the following conditions: -+ -+The above copyright notice and this permission notice shall be included in -+all copies or substantial portions of the Software. -+ -+THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -+IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -+FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -+AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -+LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -+OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -+THE SOFTWARE. -diff --git a/third_party/rust/nix-0.15.0/README.md b/third_party/rust/nix-0.15.0/README.md -new file mode 100644 -index 0000000000000..0e540ba5b968e ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/README.md -@@ -0,0 +1,111 @@ -+# Rust bindings to *nix APIs -+ -+[![Build Status](https://travis-ci.org/nix-rust/nix.svg?branch=master)](https://travis-ci.org/nix-rust/nix) -+[![crates.io](http://meritbadge.herokuapp.com/nix)](https://crates.io/crates/nix) -+ -+[Documentation (Releases)](https://docs.rs/nix/) -+ -+Nix seeks to provide friendly bindings to various *nix platform APIs (Linux, Darwin, -+...). The goal is to not provide a 100% unified interface, but to unify -+what can be while still providing platform specific APIs. -+ -+For many system APIs, Nix provides a safe alternative to the unsafe APIs -+exposed by the [libc crate](https://github.com/rust-lang/libc). This is done by -+wrapping the libc functionality with types/abstractions that enforce legal/safe -+usage. -+ -+ -+As an example of what Nix provides, examine the differences between what is -+exposed by libc and nix for the -+[gethostname](http://man7.org/linux/man-pages/man2/gethostname.2.html) system -+call: -+ -+```rust,ignore -+// libc api (unsafe, requires handling return code/errno) -+pub unsafe extern fn gethostname(name: *mut c_char, len: size_t) -> c_int; -+ -+// nix api (returns a nix::Result<CStr>) -+pub fn gethostname<'a>(buffer: &'a mut [u8]) -> Result<&'a CStr>; -+``` -+ -+## Supported Platforms -+ -+nix target support consists of two tiers. While nix attempts to support all -+platforms supported by [libc](https://github.com/rust-lang/libc), only some -+platforms are actively supported due to either technical or manpower -+limitations. Support for platforms is split into three tiers: -+ -+ * Tier 1 - Builds and tests for this target are run in CI. Failures of either -+ block the inclusion of new code. -+ * Tier 2 - Builds for this target are run in CI. Failures during the build -+ blocks the inclusion of new code. Tests may be run, but failures -+ in tests don't block the inclusion of new code. -+ * Tier 3 - Builds for this target are run in CI. Failures during the build -+ *do not* block the inclusion of new code. Testing may be run, but -+ failures in tests don't block the inclusion of new code. -+ -+The following targets are supported by `nix`: -+ -+Tier 1: -+ * aarch64-unknown-linux-gnu -+ * arm-unknown-linux-gnueabi -+ * armv7-unknown-linux-gnueabihf -+ * i686-apple-darwin -+ * i686-unknown-freebsd -+ * i686-unknown-linux-gnu -+ * i686-unknown-linux-musl -+ * mips-unknown-linux-gnu -+ * mips64-unknown-linux-gnuabi64 -+ * mips64el-unknown-linux-gnuabi64 -+ * mipsel-unknown-linux-gnu -+ * powerpc64-unknown-linux-gnu -+ * powerpc64le-unknown-linux-gnu -+ * x86_64-apple-darwin -+ * x86_64-unknown-freebsd -+ * x86_64-unknown-linux-gnu -+ * x86_64-unknown-linux-musl -+ -+Tier 2: -+ * aarch64-apple-ios -+ * aarch64-linux-android -+ * arm-linux-androideabi -+ * arm-unknown-linux-musleabi -+ * armv7-apple-ios -+ * armv7-linux-androideabi -+ * armv7s-apple-ios -+ * i386-apple-ios -+ * i686-linux-android -+ * powerpc-unknown-linux-gnu -+ * s390x-unknown-linux-gnu -+ * x86_64-apple-ios -+ * x86_64-linux-android -+ * x86_64-unknown-netbsd -+ -+## Usage -+ -+`nix` requires Rust 1.31.0 or newer. -+ -+To use `nix`, first add this to your `Cargo.toml`: -+ -+```toml -+[dependencies] -+nix = "0.15.0" -+``` -+ -+Then, add this to your crate root: -+ -+```rust,ignore -+extern crate nix; -+``` -+ -+## Contributing -+ -+Contributions are very welcome. Please See [CONTRIBUTING](CONTRIBUTING.md) for -+additional details. -+ -+Feel free to join us in [the nix-rust/nix](https://gitter.im/nix-rust/nix) channel on Gitter to -+discuss `nix` development. -+ -+## License -+ -+Nix is licensed under the MIT license. See [LICENSE](LICENSE) for more details. -diff --git a/third_party/rust/nix/build.rs b/third_party/rust/nix-0.15.0/build.rs -similarity index 100% -rename from third_party/rust/nix/build.rs -rename to third_party/rust/nix-0.15.0/build.rs -diff --git a/third_party/rust/nix-0.15.0/src/dir.rs b/third_party/rust/nix-0.15.0/src/dir.rs -new file mode 100644 -index 0000000000000..1820b5330ff60 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/dir.rs -@@ -0,0 +1,193 @@ -+use {Error, NixPath, Result}; -+use errno::Errno; -+use fcntl::{self, OFlag}; -+use libc; -+use std::os::unix::io::{AsRawFd, IntoRawFd, RawFd}; -+use std::{ffi, ptr}; -+use sys; -+ -+#[cfg(target_os = "linux")] -+use libc::{dirent64 as dirent, readdir64_r as readdir_r}; -+ -+#[cfg(not(target_os = "linux"))] -+use libc::{dirent, readdir_r}; -+ -+/// An open directory. -+/// -+/// This is a lower-level interface than `std::fs::ReadDir`. Notable differences: -+/// * can be opened from a file descriptor (as returned by `openat`, perhaps before knowing -+/// if the path represents a file or directory). -+/// * implements `AsRawFd`, so it can be passed to `fstat`, `openat`, etc. -+/// The file descriptor continues to be owned by the `Dir`, so callers must not keep a `RawFd` -+/// after the `Dir` is dropped. -+/// * can be iterated through multiple times without closing and reopening the file -+/// descriptor. Each iteration rewinds when finished. -+/// * returns entries for `.` (current directory) and `..` (parent directory). -+/// * returns entries' names as a `CStr` (no allocation or conversion beyond whatever libc -+/// does). -+#[derive(Clone, Debug, Eq, Hash, PartialEq)] -+pub struct Dir( -+ ptr::NonNull<libc::DIR> -+); -+ -+impl Dir { -+ /// Opens the given path as with `fcntl::open`. -+ pub fn open<P: ?Sized + NixPath>(path: &P, oflag: OFlag, -+ mode: sys::stat::Mode) -> Result<Self> { -+ let fd = fcntl::open(path, oflag, mode)?; -+ Dir::from_fd(fd) -+ } -+ -+ /// Opens the given path as with `fcntl::openat`. -+ pub fn openat<P: ?Sized + NixPath>(dirfd: RawFd, path: &P, oflag: OFlag, -+ mode: sys::stat::Mode) -> Result<Self> { -+ let fd = fcntl::openat(dirfd, path, oflag, mode)?; -+ Dir::from_fd(fd) -+ } -+ -+ /// Converts from a descriptor-based object, closing the descriptor on success or failure. -+ #[inline] -+ pub fn from<F: IntoRawFd>(fd: F) -> Result<Self> { -+ Dir::from_fd(fd.into_raw_fd()) -+ } -+ -+ /// Converts from a file descriptor, closing it on success or failure. -+ pub fn from_fd(fd: RawFd) -> Result<Self> { -+ let d = unsafe { libc::fdopendir(fd) }; -+ if d.is_null() { -+ let e = Error::last(); -+ unsafe { libc::close(fd) }; -+ return Err(e); -+ }; -+ // Always guaranteed to be non-null by the previous check -+ Ok(Dir(ptr::NonNull::new(d).unwrap())) -+ } -+ -+ /// Returns an iterator of `Result<Entry>` which rewinds when finished. -+ pub fn iter(&mut self) -> Iter { -+ Iter(self) -+ } -+} -+ -+// `Dir` is not `Sync`. With the current implementation, it could be, but according to -+// https://www.gnu.org/software/libc/manual/html_node/Reading_002fClosing-Directory.html, -+// future versions of POSIX are likely to obsolete `readdir_r` and specify that it's unsafe to -+// call `readdir` simultaneously from multiple threads. -+// -+// `Dir` is safe to pass from one thread to another, as it's not reference-counted. -+unsafe impl Send for Dir {} -+ -+impl AsRawFd for Dir { -+ fn as_raw_fd(&self) -> RawFd { -+ unsafe { libc::dirfd(self.0.as_ptr()) } -+ } -+} -+ -+impl Drop for Dir { -+ fn drop(&mut self) { -+ unsafe { libc::closedir(self.0.as_ptr()) }; -+ } -+} -+ -+#[derive(Debug, Eq, Hash, PartialEq)] -+pub struct Iter<'d>(&'d mut Dir); -+ -+impl<'d> Iterator for Iter<'d> { -+ type Item = Result<Entry>; -+ -+ fn next(&mut self) -> Option<Self::Item> { -+ unsafe { -+ // Note: POSIX specifies that portable applications should dynamically allocate a -+ // buffer with room for a `d_name` field of size `pathconf(..., _PC_NAME_MAX)` plus 1 -+ // for the NUL byte. It doesn't look like the std library does this; it just uses -+ // fixed-sized buffers (and libc's dirent seems to be sized so this is appropriate). -+ // Probably fine here too then. -+ let mut ent: Entry = Entry(::std::mem::uninitialized()); -+ let mut result = ptr::null_mut(); -+ if let Err(e) = Errno::result(readdir_r((self.0).0.as_ptr(), &mut ent.0, &mut result)) { -+ return Some(Err(e)); -+ } -+ if result == ptr::null_mut() { -+ return None; -+ } -+ assert_eq!(result, &mut ent.0 as *mut dirent); -+ return Some(Ok(ent)); -+ } -+ } -+} -+ -+impl<'d> Drop for Iter<'d> { -+ fn drop(&mut self) { -+ unsafe { libc::rewinddir((self.0).0.as_ptr()) } -+ } -+} -+ -+/// A directory entry, similar to `std::fs::DirEntry`. -+/// -+/// Note that unlike the std version, this may represent the `.` or `..` entries. -+#[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)] -+pub struct Entry(dirent); -+ -+#[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)] -+pub enum Type { -+ Fifo, -+ CharacterDevice, -+ Directory, -+ BlockDevice, -+ File, -+ Symlink, -+ Socket, -+} -+ -+impl Entry { -+ /// Returns the inode number (`d_ino`) of the underlying `dirent`. -+ #[cfg(any(target_os = "android", -+ target_os = "emscripten", -+ target_os = "fuchsia", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "l4re", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "solaris"))] -+ pub fn ino(&self) -> u64 { -+ self.0.d_ino as u64 -+ } -+ -+ /// Returns the inode number (`d_fileno`) of the underlying `dirent`. -+ #[cfg(not(any(target_os = "android", -+ target_os = "emscripten", -+ target_os = "fuchsia", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "l4re", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "solaris")))] -+ pub fn ino(&self) -> u64 { -+ self.0.d_fileno as u64 -+ } -+ -+ /// Returns the bare file name of this directory entry without any other leading path component. -+ pub fn file_name(&self) -> &ffi::CStr { -+ unsafe { ::std::ffi::CStr::from_ptr(self.0.d_name.as_ptr()) } -+ } -+ -+ /// Returns the type of this directory entry, if known. -+ /// -+ /// See platform `readdir(3)` or `dirent(5)` manpage for when the file type is known; -+ /// notably, some Linux filesystems don't implement this. The caller should use `stat` or -+ /// `fstat` if this returns `None`. -+ pub fn file_type(&self) -> Option<Type> { -+ match self.0.d_type { -+ libc::DT_FIFO => Some(Type::Fifo), -+ libc::DT_CHR => Some(Type::CharacterDevice), -+ libc::DT_DIR => Some(Type::Directory), -+ libc::DT_BLK => Some(Type::BlockDevice), -+ libc::DT_REG => Some(Type::File), -+ libc::DT_LNK => Some(Type::Symlink), -+ libc::DT_SOCK => Some(Type::Socket), -+ /* libc::DT_UNKNOWN | */ _ => None, -+ } -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/errno.rs b/third_party/rust/nix-0.15.0/src/errno.rs -new file mode 100644 -index 0000000000000..6a2447bc52675 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/errno.rs -@@ -0,0 +1,1963 @@ -+#[cfg(not(target_os = "dragonfly"))] -+use libc; -+use libc::{c_int, c_void}; -+use std::{fmt, io, error}; -+use {Error, Result}; -+ -+pub use self::consts::*; -+ -+cfg_if! { -+ if #[cfg(any(target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos"))] { -+ unsafe fn errno_location() -> *mut c_int { -+ libc::__error() -+ } -+ } else if #[cfg(target_os = "dragonfly")] { -+ // DragonFly uses a thread-local errno variable, but #[thread_local] is -+ // feature-gated and not available in stable Rust as of this writing -+ // (Rust 1.21.0). We have to use a C extension to access it -+ // (src/errno_dragonfly.c). -+ // -+ // Tracking issue for `thread_local` stabilization: -+ // -+ // https://github.com/rust-lang/rust/issues/29594 -+ // -+ // Once this becomes stable, we can remove build.rs, -+ // src/errno_dragonfly.c, and use: -+ // -+ // extern { #[thread_local] static errno: c_int; } -+ // -+ #[link(name="errno_dragonfly", kind="static")] -+ extern { -+ pub fn errno_location() -> *mut c_int; -+ } -+ } else if #[cfg(any(target_os = "android", -+ target_os = "netbsd", -+ target_os = "openbsd"))] { -+ unsafe fn errno_location() -> *mut c_int { -+ libc::__errno() -+ } -+ } else if #[cfg(target_os = "linux")] { -+ unsafe fn errno_location() -> *mut c_int { -+ libc::__errno_location() -+ } -+ } -+} -+ -+/// Sets the platform-specific errno to no-error -+unsafe fn clear() -> () { -+ *errno_location() = 0; -+} -+ -+/// Returns the platform-specific value of errno -+pub fn errno() -> i32 { -+ unsafe { -+ (*errno_location()) as i32 -+ } -+} -+ -+impl Errno { -+ pub fn last() -> Self { -+ last() -+ } -+ -+ pub fn desc(self) -> &'static str { -+ desc(self) -+ } -+ -+ pub fn from_i32(err: i32) -> Errno { -+ from_i32(err) -+ } -+ -+ pub unsafe fn clear() -> () { -+ clear() -+ } -+ -+ /// Returns `Ok(value)` if it does not contain the sentinel value. This -+ /// should not be used when `-1` is not the errno sentinel value. -+ pub fn result<S: ErrnoSentinel + PartialEq<S>>(value: S) -> Result<S> { -+ if value == S::sentinel() { -+ Err(Error::Sys(Self::last())) -+ } else { -+ Ok(value) -+ } -+ } -+} -+ -+/// The sentinel value indicates that a function failed and more detailed -+/// information about the error can be found in `errno` -+pub trait ErrnoSentinel: Sized { -+ fn sentinel() -> Self; -+} -+ -+impl ErrnoSentinel for isize { -+ fn sentinel() -> Self { -1 } -+} -+ -+impl ErrnoSentinel for i32 { -+ fn sentinel() -> Self { -1 } -+} -+ -+impl ErrnoSentinel for i64 { -+ fn sentinel() -> Self { -1 } -+} -+ -+impl ErrnoSentinel for *mut c_void { -+ fn sentinel() -> Self { (-1 as isize) as *mut c_void } -+} -+ -+impl ErrnoSentinel for libc::sighandler_t { -+ fn sentinel() -> Self { libc::SIG_ERR } -+} -+ -+impl error::Error for Errno { -+ fn description(&self) -> &str { -+ self.desc() -+ } -+} -+ -+impl fmt::Display for Errno { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ write!(f, "{:?}: {}", self, self.desc()) -+ } -+} -+ -+impl From<Errno> for io::Error { -+ fn from(err: Errno) -> Self { -+ io::Error::from_raw_os_error(err as i32) -+ } -+} -+ -+fn last() -> Errno { -+ Errno::from_i32(errno()) -+} -+ -+fn desc(errno: Errno) -> &'static str { -+ use self::Errno::*; -+ match errno { -+ UnknownErrno => "Unknown errno", -+ EPERM => "Operation not permitted", -+ ENOENT => "No such file or directory", -+ ESRCH => "No such process", -+ EINTR => "Interrupted system call", -+ EIO => "I/O error", -+ ENXIO => "No such device or address", -+ E2BIG => "Argument list too long", -+ ENOEXEC => "Exec format error", -+ EBADF => "Bad file number", -+ ECHILD => "No child processes", -+ EAGAIN => "Try again", -+ ENOMEM => "Out of memory", -+ EACCES => "Permission denied", -+ EFAULT => "Bad address", -+ ENOTBLK => "Block device required", -+ EBUSY => "Device or resource busy", -+ EEXIST => "File exists", -+ EXDEV => "Cross-device link", -+ ENODEV => "No such device", -+ ENOTDIR => "Not a directory", -+ EISDIR => "Is a directory", -+ EINVAL => "Invalid argument", -+ ENFILE => "File table overflow", -+ EMFILE => "Too many open files", -+ ENOTTY => "Not a typewriter", -+ ETXTBSY => "Text file busy", -+ EFBIG => "File too large", -+ ENOSPC => "No space left on device", -+ ESPIPE => "Illegal seek", -+ EROFS => "Read-only file system", -+ EMLINK => "Too many links", -+ EPIPE => "Broken pipe", -+ EDOM => "Math argument out of domain of func", -+ ERANGE => "Math result not representable", -+ EDEADLK => "Resource deadlock would occur", -+ ENAMETOOLONG => "File name too long", -+ ENOLCK => "No record locks available", -+ ENOSYS => "Function not implemented", -+ ENOTEMPTY => "Directory not empty", -+ ELOOP => "Too many symbolic links encountered", -+ ENOMSG => "No message of desired type", -+ EIDRM => "Identifier removed", -+ EINPROGRESS => "Operation now in progress", -+ EALREADY => "Operation already in progress", -+ ENOTSOCK => "Socket operation on non-socket", -+ EDESTADDRREQ => "Destination address required", -+ EMSGSIZE => "Message too long", -+ EPROTOTYPE => "Protocol wrong type for socket", -+ ENOPROTOOPT => "Protocol not available", -+ EPROTONOSUPPORT => "Protocol not supported", -+ ESOCKTNOSUPPORT => "Socket type not supported", -+ EPFNOSUPPORT => "Protocol family not supported", -+ EAFNOSUPPORT => "Address family not supported by protocol", -+ EADDRINUSE => "Address already in use", -+ EADDRNOTAVAIL => "Cannot assign requested address", -+ ENETDOWN => "Network is down", -+ ENETUNREACH => "Network is unreachable", -+ ENETRESET => "Network dropped connection because of reset", -+ ECONNABORTED => "Software caused connection abort", -+ ECONNRESET => "Connection reset by peer", -+ ENOBUFS => "No buffer space available", -+ EISCONN => "Transport endpoint is already connected", -+ ENOTCONN => "Transport endpoint is not connected", -+ ESHUTDOWN => "Cannot send after transport endpoint shutdown", -+ ETOOMANYREFS => "Too many references: cannot splice", -+ ETIMEDOUT => "Connection timed out", -+ ECONNREFUSED => "Connection refused", -+ EHOSTDOWN => "Host is down", -+ EHOSTUNREACH => "No route to host", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ECHRNG => "Channel number out of range", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EL2NSYNC => "Level 2 not synchronized", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EL3HLT => "Level 3 halted", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EL3RST => "Level 3 reset", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ELNRNG => "Link number out of range", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EUNATCH => "Protocol driver not attached", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ENOCSI => "No CSI structure available", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EL2HLT => "Level 2 halted", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EBADE => "Invalid exchange", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EBADR => "Invalid request descriptor", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EXFULL => "Exchange full", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ENOANO => "No anode", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EBADRQC => "Invalid request code", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EBADSLT => "Invalid slot", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EBFONT => "Bad font file format", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ENOSTR => "Device not a stream", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ENODATA => "No data available", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ETIME => "Timer expired", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ENOSR => "Out of streams resources", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ENONET => "Machine is not on the network", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ENOPKG => "Package not installed", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EREMOTE => "Object is remote", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ENOLINK => "Link has been severed", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EADV => "Advertise error", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ESRMNT => "Srmount error", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ECOMM => "Communication error on send", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EPROTO => "Protocol error", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EMULTIHOP => "Multihop attempted", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EDOTDOT => "RFS specific error", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EBADMSG => "Not a data message", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EOVERFLOW => "Value too large for defined data type", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ENOTUNIQ => "Name not unique on network", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EBADFD => "File descriptor in bad state", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EREMCHG => "Remote address changed", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ELIBACC => "Can not access a needed shared library", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ELIBBAD => "Accessing a corrupted shared library", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ELIBSCN => ".lib section in a.out corrupted", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ELIBMAX => "Attempting to link in too many shared libraries", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ELIBEXEC => "Cannot exec a shared library directly", -+ -+ #[cfg(any(target_os = "linux", target_os = "android", target_os = "openbsd"))] -+ EILSEQ => "Illegal byte sequence", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ERESTART => "Interrupted system call should be restarted", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ESTRPIPE => "Streams pipe error", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EUSERS => "Too many users", -+ -+ #[cfg(any(target_os = "linux", target_os = "android", target_os = "netbsd"))] -+ EOPNOTSUPP => "Operation not supported on transport endpoint", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ESTALE => "Stale file handle", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EUCLEAN => "Structure needs cleaning", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ENOTNAM => "Not a XENIX named type file", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ENAVAIL => "No XENIX semaphores available", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EISNAM => "Is a named type file", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EREMOTEIO => "Remote I/O error", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EDQUOT => "Quota exceeded", -+ -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "openbsd", target_os = "dragonfly"))] -+ ENOMEDIUM => "No medium found", -+ -+ #[cfg(any(target_os = "linux", target_os = "android", target_os = "openbsd"))] -+ EMEDIUMTYPE => "Wrong medium type", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ECANCELED => "Operation canceled", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ENOKEY => "Required key not available", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EKEYEXPIRED => "Key has expired", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EKEYREVOKED => "Key has been revoked", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EKEYREJECTED => "Key was rejected by service", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ EOWNERDEAD => "Owner died", -+ -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ ENOTRECOVERABLE => "State not recoverable", -+ -+ #[cfg(all(target_os = "linux", not(target_arch="mips")))] -+ ERFKILL => "Operation not possible due to RF-kill", -+ -+ #[cfg(all(target_os = "linux", not(target_arch="mips")))] -+ EHWPOISON => "Memory page has hardware error", -+ -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ EDOOFUS => "Programming error", -+ -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ EMULTIHOP => "Multihop attempted", -+ -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ ENOLINK => "Link has been severed", -+ -+ #[cfg(target_os = "freebsd")] -+ ENOTCAPABLE => "Capabilities insufficient", -+ -+ #[cfg(target_os = "freebsd")] -+ ECAPMODE => "Not permitted in capability mode", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ ENEEDAUTH => "Need authenticator", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ EOVERFLOW => "Value too large to be stored in data type", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "netbsd"))] -+ EILSEQ => "Illegal byte sequence", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ ENOATTR => "Attribute not found", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ EBADMSG => "Bad message", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ EPROTO => "Protocol error", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "ios", target_os = "openbsd", ))] -+ ENOTRECOVERABLE => "State not recoverable", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "ios", target_os = "openbsd"))] -+ EOWNERDEAD => "Previous owner died", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ ENOTSUP => "Operation not supported", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ EPROCLIM => "Too many processes", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ EUSERS => "Too many users", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ EDQUOT => "Disc quota exceeded", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ ESTALE => "Stale NFS file handle", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ EREMOTE => "Too many levels of remote in path", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ EBADRPC => "RPC struct is bad", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ ERPCMISMATCH => "RPC version wrong", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ EPROGUNAVAIL => "RPC prog. not avail", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ EPROGMISMATCH => "Program version wrong", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ EPROCUNAVAIL => "Bad procedure for program", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ EFTYPE => "Inappropriate file type or format", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ EAUTH => "Authentication error", -+ -+ #[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd"))] -+ ECANCELED => "Operation canceled", -+ -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ EPWROFF => "Device power is off", -+ -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ EDEVERR => "Device error, e.g. paper out", -+ -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ EBADEXEC => "Bad executable", -+ -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ EBADARCH => "Bad CPU type in executable", -+ -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ ESHLIBVERS => "Shared library version mismatch", -+ -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ EBADMACHO => "Malformed Macho file", -+ -+ #[cfg(any(target_os = "macos", target_os = "ios", target_os = "netbsd"))] -+ EMULTIHOP => "Reserved", -+ -+ #[cfg(any(target_os = "macos", target_os = "ios", target_os = "netbsd"))] -+ ENODATA => "No message available on STREAM", -+ -+ #[cfg(any(target_os = "macos", target_os = "ios", target_os = "netbsd"))] -+ ENOLINK => "Reserved", -+ -+ #[cfg(any(target_os = "macos", target_os = "ios", target_os = "netbsd"))] -+ ENOSR => "No STREAM resources", -+ -+ #[cfg(any(target_os = "macos", target_os = "ios", target_os = "netbsd"))] -+ ENOSTR => "Not a STREAM", -+ -+ #[cfg(any(target_os = "macos", target_os = "ios", target_os = "netbsd"))] -+ ETIME => "STREAM ioctl timeout", -+ -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ EOPNOTSUPP => "Operation not supported on socket", -+ -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ ENOPOLICY => "No such policy registered", -+ -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ EQFULL => "Interface output queue is full", -+ -+ #[cfg(target_os = "openbsd")] -+ EOPNOTSUPP => "Operation not supported", -+ -+ #[cfg(target_os = "openbsd")] -+ EIPSEC => "IPsec processing failure", -+ -+ #[cfg(target_os = "dragonfly")] -+ EASYNC => "Async", -+ } -+} -+ -+#[cfg(any(target_os = "linux", target_os = "android"))] -+mod consts { -+ use libc; -+ -+ #[derive(Clone, Copy, Debug, Eq, PartialEq)] -+ #[repr(i32)] -+ pub enum Errno { -+ UnknownErrno = 0, -+ EPERM = libc::EPERM, -+ ENOENT = libc::ENOENT, -+ ESRCH = libc::ESRCH, -+ EINTR = libc::EINTR, -+ EIO = libc::EIO, -+ ENXIO = libc::ENXIO, -+ E2BIG = libc::E2BIG, -+ ENOEXEC = libc::ENOEXEC, -+ EBADF = libc::EBADF, -+ ECHILD = libc::ECHILD, -+ EAGAIN = libc::EAGAIN, -+ ENOMEM = libc::ENOMEM, -+ EACCES = libc::EACCES, -+ EFAULT = libc::EFAULT, -+ ENOTBLK = libc::ENOTBLK, -+ EBUSY = libc::EBUSY, -+ EEXIST = libc::EEXIST, -+ EXDEV = libc::EXDEV, -+ ENODEV = libc::ENODEV, -+ ENOTDIR = libc::ENOTDIR, -+ EISDIR = libc::EISDIR, -+ EINVAL = libc::EINVAL, -+ ENFILE = libc::ENFILE, -+ EMFILE = libc::EMFILE, -+ ENOTTY = libc::ENOTTY, -+ ETXTBSY = libc::ETXTBSY, -+ EFBIG = libc::EFBIG, -+ ENOSPC = libc::ENOSPC, -+ ESPIPE = libc::ESPIPE, -+ EROFS = libc::EROFS, -+ EMLINK = libc::EMLINK, -+ EPIPE = libc::EPIPE, -+ EDOM = libc::EDOM, -+ ERANGE = libc::ERANGE, -+ EDEADLK = libc::EDEADLK, -+ ENAMETOOLONG = libc::ENAMETOOLONG, -+ ENOLCK = libc::ENOLCK, -+ ENOSYS = libc::ENOSYS, -+ ENOTEMPTY = libc::ENOTEMPTY, -+ ELOOP = libc::ELOOP, -+ ENOMSG = libc::ENOMSG, -+ EIDRM = libc::EIDRM, -+ ECHRNG = libc::ECHRNG, -+ EL2NSYNC = libc::EL2NSYNC, -+ EL3HLT = libc::EL3HLT, -+ EL3RST = libc::EL3RST, -+ ELNRNG = libc::ELNRNG, -+ EUNATCH = libc::EUNATCH, -+ ENOCSI = libc::ENOCSI, -+ EL2HLT = libc::EL2HLT, -+ EBADE = libc::EBADE, -+ EBADR = libc::EBADR, -+ EXFULL = libc::EXFULL, -+ ENOANO = libc::ENOANO, -+ EBADRQC = libc::EBADRQC, -+ EBADSLT = libc::EBADSLT, -+ EBFONT = libc::EBFONT, -+ ENOSTR = libc::ENOSTR, -+ ENODATA = libc::ENODATA, -+ ETIME = libc::ETIME, -+ ENOSR = libc::ENOSR, -+ ENONET = libc::ENONET, -+ ENOPKG = libc::ENOPKG, -+ EREMOTE = libc::EREMOTE, -+ ENOLINK = libc::ENOLINK, -+ EADV = libc::EADV, -+ ESRMNT = libc::ESRMNT, -+ ECOMM = libc::ECOMM, -+ EPROTO = libc::EPROTO, -+ EMULTIHOP = libc::EMULTIHOP, -+ EDOTDOT = libc::EDOTDOT, -+ EBADMSG = libc::EBADMSG, -+ EOVERFLOW = libc::EOVERFLOW, -+ ENOTUNIQ = libc::ENOTUNIQ, -+ EBADFD = libc::EBADFD, -+ EREMCHG = libc::EREMCHG, -+ ELIBACC = libc::ELIBACC, -+ ELIBBAD = libc::ELIBBAD, -+ ELIBSCN = libc::ELIBSCN, -+ ELIBMAX = libc::ELIBMAX, -+ ELIBEXEC = libc::ELIBEXEC, -+ EILSEQ = libc::EILSEQ, -+ ERESTART = libc::ERESTART, -+ ESTRPIPE = libc::ESTRPIPE, -+ EUSERS = libc::EUSERS, -+ ENOTSOCK = libc::ENOTSOCK, -+ EDESTADDRREQ = libc::EDESTADDRREQ, -+ EMSGSIZE = libc::EMSGSIZE, -+ EPROTOTYPE = libc::EPROTOTYPE, -+ ENOPROTOOPT = libc::ENOPROTOOPT, -+ EPROTONOSUPPORT = libc::EPROTONOSUPPORT, -+ ESOCKTNOSUPPORT = libc::ESOCKTNOSUPPORT, -+ EOPNOTSUPP = libc::EOPNOTSUPP, -+ EPFNOSUPPORT = libc::EPFNOSUPPORT, -+ EAFNOSUPPORT = libc::EAFNOSUPPORT, -+ EADDRINUSE = libc::EADDRINUSE, -+ EADDRNOTAVAIL = libc::EADDRNOTAVAIL, -+ ENETDOWN = libc::ENETDOWN, -+ ENETUNREACH = libc::ENETUNREACH, -+ ENETRESET = libc::ENETRESET, -+ ECONNABORTED = libc::ECONNABORTED, -+ ECONNRESET = libc::ECONNRESET, -+ ENOBUFS = libc::ENOBUFS, -+ EISCONN = libc::EISCONN, -+ ENOTCONN = libc::ENOTCONN, -+ ESHUTDOWN = libc::ESHUTDOWN, -+ ETOOMANYREFS = libc::ETOOMANYREFS, -+ ETIMEDOUT = libc::ETIMEDOUT, -+ ECONNREFUSED = libc::ECONNREFUSED, -+ EHOSTDOWN = libc::EHOSTDOWN, -+ EHOSTUNREACH = libc::EHOSTUNREACH, -+ EALREADY = libc::EALREADY, -+ EINPROGRESS = libc::EINPROGRESS, -+ ESTALE = libc::ESTALE, -+ EUCLEAN = libc::EUCLEAN, -+ ENOTNAM = libc::ENOTNAM, -+ ENAVAIL = libc::ENAVAIL, -+ EISNAM = libc::EISNAM, -+ EREMOTEIO = libc::EREMOTEIO, -+ EDQUOT = libc::EDQUOT, -+ ENOMEDIUM = libc::ENOMEDIUM, -+ EMEDIUMTYPE = libc::EMEDIUMTYPE, -+ ECANCELED = libc::ECANCELED, -+ ENOKEY = libc::ENOKEY, -+ EKEYEXPIRED = libc::EKEYEXPIRED, -+ EKEYREVOKED = libc::EKEYREVOKED, -+ EKEYREJECTED = libc::EKEYREJECTED, -+ EOWNERDEAD = libc::EOWNERDEAD, -+ ENOTRECOVERABLE = libc::ENOTRECOVERABLE, -+ #[cfg(not(any(target_os = "android", target_arch="mips")))] -+ ERFKILL = libc::ERFKILL, -+ #[cfg(not(any(target_os = "android", target_arch="mips")))] -+ EHWPOISON = libc::EHWPOISON, -+ } -+ -+ pub const EWOULDBLOCK: Errno = Errno::EAGAIN; -+ pub const EDEADLOCK: Errno = Errno::EDEADLK; -+ pub const ENOTSUP: Errno = Errno::EOPNOTSUPP; -+ -+ pub fn from_i32(e: i32) -> Errno { -+ use self::Errno::*; -+ -+ match e { -+ libc::EPERM => EPERM, -+ libc::ENOENT => ENOENT, -+ libc::ESRCH => ESRCH, -+ libc::EINTR => EINTR, -+ libc::EIO => EIO, -+ libc::ENXIO => ENXIO, -+ libc::E2BIG => E2BIG, -+ libc::ENOEXEC => ENOEXEC, -+ libc::EBADF => EBADF, -+ libc::ECHILD => ECHILD, -+ libc::EAGAIN => EAGAIN, -+ libc::ENOMEM => ENOMEM, -+ libc::EACCES => EACCES, -+ libc::EFAULT => EFAULT, -+ libc::ENOTBLK => ENOTBLK, -+ libc::EBUSY => EBUSY, -+ libc::EEXIST => EEXIST, -+ libc::EXDEV => EXDEV, -+ libc::ENODEV => ENODEV, -+ libc::ENOTDIR => ENOTDIR, -+ libc::EISDIR => EISDIR, -+ libc::EINVAL => EINVAL, -+ libc::ENFILE => ENFILE, -+ libc::EMFILE => EMFILE, -+ libc::ENOTTY => ENOTTY, -+ libc::ETXTBSY => ETXTBSY, -+ libc::EFBIG => EFBIG, -+ libc::ENOSPC => ENOSPC, -+ libc::ESPIPE => ESPIPE, -+ libc::EROFS => EROFS, -+ libc::EMLINK => EMLINK, -+ libc::EPIPE => EPIPE, -+ libc::EDOM => EDOM, -+ libc::ERANGE => ERANGE, -+ libc::EDEADLK => EDEADLK, -+ libc::ENAMETOOLONG => ENAMETOOLONG, -+ libc::ENOLCK => ENOLCK, -+ libc::ENOSYS => ENOSYS, -+ libc::ENOTEMPTY => ENOTEMPTY, -+ libc::ELOOP => ELOOP, -+ libc::ENOMSG => ENOMSG, -+ libc::EIDRM => EIDRM, -+ libc::ECHRNG => ECHRNG, -+ libc::EL2NSYNC => EL2NSYNC, -+ libc::EL3HLT => EL3HLT, -+ libc::EL3RST => EL3RST, -+ libc::ELNRNG => ELNRNG, -+ libc::EUNATCH => EUNATCH, -+ libc::ENOCSI => ENOCSI, -+ libc::EL2HLT => EL2HLT, -+ libc::EBADE => EBADE, -+ libc::EBADR => EBADR, -+ libc::EXFULL => EXFULL, -+ libc::ENOANO => ENOANO, -+ libc::EBADRQC => EBADRQC, -+ libc::EBADSLT => EBADSLT, -+ libc::EBFONT => EBFONT, -+ libc::ENOSTR => ENOSTR, -+ libc::ENODATA => ENODATA, -+ libc::ETIME => ETIME, -+ libc::ENOSR => ENOSR, -+ libc::ENONET => ENONET, -+ libc::ENOPKG => ENOPKG, -+ libc::EREMOTE => EREMOTE, -+ libc::ENOLINK => ENOLINK, -+ libc::EADV => EADV, -+ libc::ESRMNT => ESRMNT, -+ libc::ECOMM => ECOMM, -+ libc::EPROTO => EPROTO, -+ libc::EMULTIHOP => EMULTIHOP, -+ libc::EDOTDOT => EDOTDOT, -+ libc::EBADMSG => EBADMSG, -+ libc::EOVERFLOW => EOVERFLOW, -+ libc::ENOTUNIQ => ENOTUNIQ, -+ libc::EBADFD => EBADFD, -+ libc::EREMCHG => EREMCHG, -+ libc::ELIBACC => ELIBACC, -+ libc::ELIBBAD => ELIBBAD, -+ libc::ELIBSCN => ELIBSCN, -+ libc::ELIBMAX => ELIBMAX, -+ libc::ELIBEXEC => ELIBEXEC, -+ libc::EILSEQ => EILSEQ, -+ libc::ERESTART => ERESTART, -+ libc::ESTRPIPE => ESTRPIPE, -+ libc::EUSERS => EUSERS, -+ libc::ENOTSOCK => ENOTSOCK, -+ libc::EDESTADDRREQ => EDESTADDRREQ, -+ libc::EMSGSIZE => EMSGSIZE, -+ libc::EPROTOTYPE => EPROTOTYPE, -+ libc::ENOPROTOOPT => ENOPROTOOPT, -+ libc::EPROTONOSUPPORT => EPROTONOSUPPORT, -+ libc::ESOCKTNOSUPPORT => ESOCKTNOSUPPORT, -+ libc::EOPNOTSUPP => EOPNOTSUPP, -+ libc::EPFNOSUPPORT => EPFNOSUPPORT, -+ libc::EAFNOSUPPORT => EAFNOSUPPORT, -+ libc::EADDRINUSE => EADDRINUSE, -+ libc::EADDRNOTAVAIL => EADDRNOTAVAIL, -+ libc::ENETDOWN => ENETDOWN, -+ libc::ENETUNREACH => ENETUNREACH, -+ libc::ENETRESET => ENETRESET, -+ libc::ECONNABORTED => ECONNABORTED, -+ libc::ECONNRESET => ECONNRESET, -+ libc::ENOBUFS => ENOBUFS, -+ libc::EISCONN => EISCONN, -+ libc::ENOTCONN => ENOTCONN, -+ libc::ESHUTDOWN => ESHUTDOWN, -+ libc::ETOOMANYREFS => ETOOMANYREFS, -+ libc::ETIMEDOUT => ETIMEDOUT, -+ libc::ECONNREFUSED => ECONNREFUSED, -+ libc::EHOSTDOWN => EHOSTDOWN, -+ libc::EHOSTUNREACH => EHOSTUNREACH, -+ libc::EALREADY => EALREADY, -+ libc::EINPROGRESS => EINPROGRESS, -+ libc::ESTALE => ESTALE, -+ libc::EUCLEAN => EUCLEAN, -+ libc::ENOTNAM => ENOTNAM, -+ libc::ENAVAIL => ENAVAIL, -+ libc::EISNAM => EISNAM, -+ libc::EREMOTEIO => EREMOTEIO, -+ libc::EDQUOT => EDQUOT, -+ libc::ENOMEDIUM => ENOMEDIUM, -+ libc::EMEDIUMTYPE => EMEDIUMTYPE, -+ libc::ECANCELED => ECANCELED, -+ libc::ENOKEY => ENOKEY, -+ libc::EKEYEXPIRED => EKEYEXPIRED, -+ libc::EKEYREVOKED => EKEYREVOKED, -+ libc::EKEYREJECTED => EKEYREJECTED, -+ libc::EOWNERDEAD => EOWNERDEAD, -+ libc::ENOTRECOVERABLE => ENOTRECOVERABLE, -+ #[cfg(not(any(target_os = "android", target_arch="mips")))] -+ libc::ERFKILL => ERFKILL, -+ #[cfg(not(any(target_os = "android", target_arch="mips")))] -+ libc::EHWPOISON => EHWPOISON, -+ _ => UnknownErrno, -+ } -+ } -+} -+ -+#[cfg(any(target_os = "macos", target_os = "ios"))] -+mod consts { -+ use libc; -+ -+ #[derive(Clone, Copy, Debug, Eq, PartialEq)] -+ #[repr(i32)] -+ pub enum Errno { -+ UnknownErrno = 0, -+ EPERM = libc::EPERM, -+ ENOENT = libc::ENOENT, -+ ESRCH = libc::ESRCH, -+ EINTR = libc::EINTR, -+ EIO = libc::EIO, -+ ENXIO = libc::ENXIO, -+ E2BIG = libc::E2BIG, -+ ENOEXEC = libc::ENOEXEC, -+ EBADF = libc::EBADF, -+ ECHILD = libc::ECHILD, -+ EDEADLK = libc::EDEADLK, -+ ENOMEM = libc::ENOMEM, -+ EACCES = libc::EACCES, -+ EFAULT = libc::EFAULT, -+ ENOTBLK = libc::ENOTBLK, -+ EBUSY = libc::EBUSY, -+ EEXIST = libc::EEXIST, -+ EXDEV = libc::EXDEV, -+ ENODEV = libc::ENODEV, -+ ENOTDIR = libc::ENOTDIR, -+ EISDIR = libc::EISDIR, -+ EINVAL = libc::EINVAL, -+ ENFILE = libc::ENFILE, -+ EMFILE = libc::EMFILE, -+ ENOTTY = libc::ENOTTY, -+ ETXTBSY = libc::ETXTBSY, -+ EFBIG = libc::EFBIG, -+ ENOSPC = libc::ENOSPC, -+ ESPIPE = libc::ESPIPE, -+ EROFS = libc::EROFS, -+ EMLINK = libc::EMLINK, -+ EPIPE = libc::EPIPE, -+ EDOM = libc::EDOM, -+ ERANGE = libc::ERANGE, -+ EAGAIN = libc::EAGAIN, -+ EINPROGRESS = libc::EINPROGRESS, -+ EALREADY = libc::EALREADY, -+ ENOTSOCK = libc::ENOTSOCK, -+ EDESTADDRREQ = libc::EDESTADDRREQ, -+ EMSGSIZE = libc::EMSGSIZE, -+ EPROTOTYPE = libc::EPROTOTYPE, -+ ENOPROTOOPT = libc::ENOPROTOOPT, -+ EPROTONOSUPPORT = libc::EPROTONOSUPPORT, -+ ESOCKTNOSUPPORT = libc::ESOCKTNOSUPPORT, -+ ENOTSUP = libc::ENOTSUP, -+ EPFNOSUPPORT = libc::EPFNOSUPPORT, -+ EAFNOSUPPORT = libc::EAFNOSUPPORT, -+ EADDRINUSE = libc::EADDRINUSE, -+ EADDRNOTAVAIL = libc::EADDRNOTAVAIL, -+ ENETDOWN = libc::ENETDOWN, -+ ENETUNREACH = libc::ENETUNREACH, -+ ENETRESET = libc::ENETRESET, -+ ECONNABORTED = libc::ECONNABORTED, -+ ECONNRESET = libc::ECONNRESET, -+ ENOBUFS = libc::ENOBUFS, -+ EISCONN = libc::EISCONN, -+ ENOTCONN = libc::ENOTCONN, -+ ESHUTDOWN = libc::ESHUTDOWN, -+ ETOOMANYREFS = libc::ETOOMANYREFS, -+ ETIMEDOUT = libc::ETIMEDOUT, -+ ECONNREFUSED = libc::ECONNREFUSED, -+ ELOOP = libc::ELOOP, -+ ENAMETOOLONG = libc::ENAMETOOLONG, -+ EHOSTDOWN = libc::EHOSTDOWN, -+ EHOSTUNREACH = libc::EHOSTUNREACH, -+ ENOTEMPTY = libc::ENOTEMPTY, -+ EPROCLIM = libc::EPROCLIM, -+ EUSERS = libc::EUSERS, -+ EDQUOT = libc::EDQUOT, -+ ESTALE = libc::ESTALE, -+ EREMOTE = libc::EREMOTE, -+ EBADRPC = libc::EBADRPC, -+ ERPCMISMATCH = libc::ERPCMISMATCH, -+ EPROGUNAVAIL = libc::EPROGUNAVAIL, -+ EPROGMISMATCH = libc::EPROGMISMATCH, -+ EPROCUNAVAIL = libc::EPROCUNAVAIL, -+ ENOLCK = libc::ENOLCK, -+ ENOSYS = libc::ENOSYS, -+ EFTYPE = libc::EFTYPE, -+ EAUTH = libc::EAUTH, -+ ENEEDAUTH = libc::ENEEDAUTH, -+ EPWROFF = libc::EPWROFF, -+ EDEVERR = libc::EDEVERR, -+ EOVERFLOW = libc::EOVERFLOW, -+ EBADEXEC = libc::EBADEXEC, -+ EBADARCH = libc::EBADARCH, -+ ESHLIBVERS = libc::ESHLIBVERS, -+ EBADMACHO = libc::EBADMACHO, -+ ECANCELED = libc::ECANCELED, -+ EIDRM = libc::EIDRM, -+ ENOMSG = libc::ENOMSG, -+ EILSEQ = libc::EILSEQ, -+ ENOATTR = libc::ENOATTR, -+ EBADMSG = libc::EBADMSG, -+ EMULTIHOP = libc::EMULTIHOP, -+ ENODATA = libc::ENODATA, -+ ENOLINK = libc::ENOLINK, -+ ENOSR = libc::ENOSR, -+ ENOSTR = libc::ENOSTR, -+ EPROTO = libc::EPROTO, -+ ETIME = libc::ETIME, -+ EOPNOTSUPP = libc::EOPNOTSUPP, -+ ENOPOLICY = libc::ENOPOLICY, -+ ENOTRECOVERABLE = libc::ENOTRECOVERABLE, -+ EOWNERDEAD = libc::EOWNERDEAD, -+ EQFULL = libc::EQFULL, -+ } -+ -+ pub const ELAST: Errno = Errno::EQFULL; -+ pub const EWOULDBLOCK: Errno = Errno::EAGAIN; -+ pub const EDEADLOCK: Errno = Errno::EDEADLK; -+ -+ pub const EL2NSYNC: Errno = Errno::UnknownErrno; -+ -+ pub fn from_i32(e: i32) -> Errno { -+ use self::Errno::*; -+ -+ match e { -+ libc::EPERM => EPERM, -+ libc::ENOENT => ENOENT, -+ libc::ESRCH => ESRCH, -+ libc::EINTR => EINTR, -+ libc::EIO => EIO, -+ libc::ENXIO => ENXIO, -+ libc::E2BIG => E2BIG, -+ libc::ENOEXEC => ENOEXEC, -+ libc::EBADF => EBADF, -+ libc::ECHILD => ECHILD, -+ libc::EDEADLK => EDEADLK, -+ libc::ENOMEM => ENOMEM, -+ libc::EACCES => EACCES, -+ libc::EFAULT => EFAULT, -+ libc::ENOTBLK => ENOTBLK, -+ libc::EBUSY => EBUSY, -+ libc::EEXIST => EEXIST, -+ libc::EXDEV => EXDEV, -+ libc::ENODEV => ENODEV, -+ libc::ENOTDIR => ENOTDIR, -+ libc::EISDIR => EISDIR, -+ libc::EINVAL => EINVAL, -+ libc::ENFILE => ENFILE, -+ libc::EMFILE => EMFILE, -+ libc::ENOTTY => ENOTTY, -+ libc::ETXTBSY => ETXTBSY, -+ libc::EFBIG => EFBIG, -+ libc::ENOSPC => ENOSPC, -+ libc::ESPIPE => ESPIPE, -+ libc::EROFS => EROFS, -+ libc::EMLINK => EMLINK, -+ libc::EPIPE => EPIPE, -+ libc::EDOM => EDOM, -+ libc::ERANGE => ERANGE, -+ libc::EAGAIN => EAGAIN, -+ libc::EINPROGRESS => EINPROGRESS, -+ libc::EALREADY => EALREADY, -+ libc::ENOTSOCK => ENOTSOCK, -+ libc::EDESTADDRREQ => EDESTADDRREQ, -+ libc::EMSGSIZE => EMSGSIZE, -+ libc::EPROTOTYPE => EPROTOTYPE, -+ libc::ENOPROTOOPT => ENOPROTOOPT, -+ libc::EPROTONOSUPPORT => EPROTONOSUPPORT, -+ libc::ESOCKTNOSUPPORT => ESOCKTNOSUPPORT, -+ libc::ENOTSUP => ENOTSUP, -+ libc::EPFNOSUPPORT => EPFNOSUPPORT, -+ libc::EAFNOSUPPORT => EAFNOSUPPORT, -+ libc::EADDRINUSE => EADDRINUSE, -+ libc::EADDRNOTAVAIL => EADDRNOTAVAIL, -+ libc::ENETDOWN => ENETDOWN, -+ libc::ENETUNREACH => ENETUNREACH, -+ libc::ENETRESET => ENETRESET, -+ libc::ECONNABORTED => ECONNABORTED, -+ libc::ECONNRESET => ECONNRESET, -+ libc::ENOBUFS => ENOBUFS, -+ libc::EISCONN => EISCONN, -+ libc::ENOTCONN => ENOTCONN, -+ libc::ESHUTDOWN => ESHUTDOWN, -+ libc::ETOOMANYREFS => ETOOMANYREFS, -+ libc::ETIMEDOUT => ETIMEDOUT, -+ libc::ECONNREFUSED => ECONNREFUSED, -+ libc::ELOOP => ELOOP, -+ libc::ENAMETOOLONG => ENAMETOOLONG, -+ libc::EHOSTDOWN => EHOSTDOWN, -+ libc::EHOSTUNREACH => EHOSTUNREACH, -+ libc::ENOTEMPTY => ENOTEMPTY, -+ libc::EPROCLIM => EPROCLIM, -+ libc::EUSERS => EUSERS, -+ libc::EDQUOT => EDQUOT, -+ libc::ESTALE => ESTALE, -+ libc::EREMOTE => EREMOTE, -+ libc::EBADRPC => EBADRPC, -+ libc::ERPCMISMATCH => ERPCMISMATCH, -+ libc::EPROGUNAVAIL => EPROGUNAVAIL, -+ libc::EPROGMISMATCH => EPROGMISMATCH, -+ libc::EPROCUNAVAIL => EPROCUNAVAIL, -+ libc::ENOLCK => ENOLCK, -+ libc::ENOSYS => ENOSYS, -+ libc::EFTYPE => EFTYPE, -+ libc::EAUTH => EAUTH, -+ libc::ENEEDAUTH => ENEEDAUTH, -+ libc::EPWROFF => EPWROFF, -+ libc::EDEVERR => EDEVERR, -+ libc::EOVERFLOW => EOVERFLOW, -+ libc::EBADEXEC => EBADEXEC, -+ libc::EBADARCH => EBADARCH, -+ libc::ESHLIBVERS => ESHLIBVERS, -+ libc::EBADMACHO => EBADMACHO, -+ libc::ECANCELED => ECANCELED, -+ libc::EIDRM => EIDRM, -+ libc::ENOMSG => ENOMSG, -+ libc::EILSEQ => EILSEQ, -+ libc::ENOATTR => ENOATTR, -+ libc::EBADMSG => EBADMSG, -+ libc::EMULTIHOP => EMULTIHOP, -+ libc::ENODATA => ENODATA, -+ libc::ENOLINK => ENOLINK, -+ libc::ENOSR => ENOSR, -+ libc::ENOSTR => ENOSTR, -+ libc::EPROTO => EPROTO, -+ libc::ETIME => ETIME, -+ libc::EOPNOTSUPP => EOPNOTSUPP, -+ libc::ENOPOLICY => ENOPOLICY, -+ libc::ENOTRECOVERABLE => ENOTRECOVERABLE, -+ libc::EOWNERDEAD => EOWNERDEAD, -+ libc::EQFULL => EQFULL, -+ _ => UnknownErrno, -+ } -+ } -+} -+ -+#[cfg(target_os = "freebsd")] -+mod consts { -+ use libc; -+ -+ #[derive(Clone, Copy, Debug, Eq, PartialEq)] -+ #[repr(i32)] -+ pub enum Errno { -+ UnknownErrno = 0, -+ EPERM = libc::EPERM, -+ ENOENT = libc::ENOENT, -+ ESRCH = libc::ESRCH, -+ EINTR = libc::EINTR, -+ EIO = libc::EIO, -+ ENXIO = libc::ENXIO, -+ E2BIG = libc::E2BIG, -+ ENOEXEC = libc::ENOEXEC, -+ EBADF = libc::EBADF, -+ ECHILD = libc::ECHILD, -+ EDEADLK = libc::EDEADLK, -+ ENOMEM = libc::ENOMEM, -+ EACCES = libc::EACCES, -+ EFAULT = libc::EFAULT, -+ ENOTBLK = libc::ENOTBLK, -+ EBUSY = libc::EBUSY, -+ EEXIST = libc::EEXIST, -+ EXDEV = libc::EXDEV, -+ ENODEV = libc::ENODEV, -+ ENOTDIR = libc::ENOTDIR, -+ EISDIR = libc::EISDIR, -+ EINVAL = libc::EINVAL, -+ ENFILE = libc::ENFILE, -+ EMFILE = libc::EMFILE, -+ ENOTTY = libc::ENOTTY, -+ ETXTBSY = libc::ETXTBSY, -+ EFBIG = libc::EFBIG, -+ ENOSPC = libc::ENOSPC, -+ ESPIPE = libc::ESPIPE, -+ EROFS = libc::EROFS, -+ EMLINK = libc::EMLINK, -+ EPIPE = libc::EPIPE, -+ EDOM = libc::EDOM, -+ ERANGE = libc::ERANGE, -+ EAGAIN = libc::EAGAIN, -+ EINPROGRESS = libc::EINPROGRESS, -+ EALREADY = libc::EALREADY, -+ ENOTSOCK = libc::ENOTSOCK, -+ EDESTADDRREQ = libc::EDESTADDRREQ, -+ EMSGSIZE = libc::EMSGSIZE, -+ EPROTOTYPE = libc::EPROTOTYPE, -+ ENOPROTOOPT = libc::ENOPROTOOPT, -+ EPROTONOSUPPORT = libc::EPROTONOSUPPORT, -+ ESOCKTNOSUPPORT = libc::ESOCKTNOSUPPORT, -+ ENOTSUP = libc::ENOTSUP, -+ EPFNOSUPPORT = libc::EPFNOSUPPORT, -+ EAFNOSUPPORT = libc::EAFNOSUPPORT, -+ EADDRINUSE = libc::EADDRINUSE, -+ EADDRNOTAVAIL = libc::EADDRNOTAVAIL, -+ ENETDOWN = libc::ENETDOWN, -+ ENETUNREACH = libc::ENETUNREACH, -+ ENETRESET = libc::ENETRESET, -+ ECONNABORTED = libc::ECONNABORTED, -+ ECONNRESET = libc::ECONNRESET, -+ ENOBUFS = libc::ENOBUFS, -+ EISCONN = libc::EISCONN, -+ ENOTCONN = libc::ENOTCONN, -+ ESHUTDOWN = libc::ESHUTDOWN, -+ ETOOMANYREFS = libc::ETOOMANYREFS, -+ ETIMEDOUT = libc::ETIMEDOUT, -+ ECONNREFUSED = libc::ECONNREFUSED, -+ ELOOP = libc::ELOOP, -+ ENAMETOOLONG = libc::ENAMETOOLONG, -+ EHOSTDOWN = libc::EHOSTDOWN, -+ EHOSTUNREACH = libc::EHOSTUNREACH, -+ ENOTEMPTY = libc::ENOTEMPTY, -+ EPROCLIM = libc::EPROCLIM, -+ EUSERS = libc::EUSERS, -+ EDQUOT = libc::EDQUOT, -+ ESTALE = libc::ESTALE, -+ EREMOTE = libc::EREMOTE, -+ EBADRPC = libc::EBADRPC, -+ ERPCMISMATCH = libc::ERPCMISMATCH, -+ EPROGUNAVAIL = libc::EPROGUNAVAIL, -+ EPROGMISMATCH = libc::EPROGMISMATCH, -+ EPROCUNAVAIL = libc::EPROCUNAVAIL, -+ ENOLCK = libc::ENOLCK, -+ ENOSYS = libc::ENOSYS, -+ EFTYPE = libc::EFTYPE, -+ EAUTH = libc::EAUTH, -+ ENEEDAUTH = libc::ENEEDAUTH, -+ EIDRM = libc::EIDRM, -+ ENOMSG = libc::ENOMSG, -+ EOVERFLOW = libc::EOVERFLOW, -+ ECANCELED = libc::ECANCELED, -+ EILSEQ = libc::EILSEQ, -+ ENOATTR = libc::ENOATTR, -+ EDOOFUS = libc::EDOOFUS, -+ EBADMSG = libc::EBADMSG, -+ EMULTIHOP = libc::EMULTIHOP, -+ ENOLINK = libc::ENOLINK, -+ EPROTO = libc::EPROTO, -+ ENOTCAPABLE = libc::ENOTCAPABLE, -+ ECAPMODE = libc::ECAPMODE, -+ ENOTRECOVERABLE = libc::ENOTRECOVERABLE, -+ EOWNERDEAD = libc::EOWNERDEAD, -+ } -+ -+ pub const ELAST: Errno = Errno::EOWNERDEAD; -+ pub const EWOULDBLOCK: Errno = Errno::EAGAIN; -+ pub const EDEADLOCK: Errno = Errno::EDEADLK; -+ -+ pub const EL2NSYNC: Errno = Errno::UnknownErrno; -+ -+ pub fn from_i32(e: i32) -> Errno { -+ use self::Errno::*; -+ -+ match e { -+ libc::EPERM => EPERM, -+ libc::ENOENT => ENOENT, -+ libc::ESRCH => ESRCH, -+ libc::EINTR => EINTR, -+ libc::EIO => EIO, -+ libc::ENXIO => ENXIO, -+ libc::E2BIG => E2BIG, -+ libc::ENOEXEC => ENOEXEC, -+ libc::EBADF => EBADF, -+ libc::ECHILD => ECHILD, -+ libc::EDEADLK => EDEADLK, -+ libc::ENOMEM => ENOMEM, -+ libc::EACCES => EACCES, -+ libc::EFAULT => EFAULT, -+ libc::ENOTBLK => ENOTBLK, -+ libc::EBUSY => EBUSY, -+ libc::EEXIST => EEXIST, -+ libc::EXDEV => EXDEV, -+ libc::ENODEV => ENODEV, -+ libc::ENOTDIR => ENOTDIR, -+ libc::EISDIR => EISDIR, -+ libc::EINVAL => EINVAL, -+ libc::ENFILE => ENFILE, -+ libc::EMFILE => EMFILE, -+ libc::ENOTTY => ENOTTY, -+ libc::ETXTBSY => ETXTBSY, -+ libc::EFBIG => EFBIG, -+ libc::ENOSPC => ENOSPC, -+ libc::ESPIPE => ESPIPE, -+ libc::EROFS => EROFS, -+ libc::EMLINK => EMLINK, -+ libc::EPIPE => EPIPE, -+ libc::EDOM => EDOM, -+ libc::ERANGE => ERANGE, -+ libc::EAGAIN => EAGAIN, -+ libc::EINPROGRESS => EINPROGRESS, -+ libc::EALREADY => EALREADY, -+ libc::ENOTSOCK => ENOTSOCK, -+ libc::EDESTADDRREQ => EDESTADDRREQ, -+ libc::EMSGSIZE => EMSGSIZE, -+ libc::EPROTOTYPE => EPROTOTYPE, -+ libc::ENOPROTOOPT => ENOPROTOOPT, -+ libc::EPROTONOSUPPORT => EPROTONOSUPPORT, -+ libc::ESOCKTNOSUPPORT => ESOCKTNOSUPPORT, -+ libc::ENOTSUP => ENOTSUP, -+ libc::EPFNOSUPPORT => EPFNOSUPPORT, -+ libc::EAFNOSUPPORT => EAFNOSUPPORT, -+ libc::EADDRINUSE => EADDRINUSE, -+ libc::EADDRNOTAVAIL => EADDRNOTAVAIL, -+ libc::ENETDOWN => ENETDOWN, -+ libc::ENETUNREACH => ENETUNREACH, -+ libc::ENETRESET => ENETRESET, -+ libc::ECONNABORTED => ECONNABORTED, -+ libc::ECONNRESET => ECONNRESET, -+ libc::ENOBUFS => ENOBUFS, -+ libc::EISCONN => EISCONN, -+ libc::ENOTCONN => ENOTCONN, -+ libc::ESHUTDOWN => ESHUTDOWN, -+ libc::ETOOMANYREFS => ETOOMANYREFS, -+ libc::ETIMEDOUT => ETIMEDOUT, -+ libc::ECONNREFUSED => ECONNREFUSED, -+ libc::ELOOP => ELOOP, -+ libc::ENAMETOOLONG => ENAMETOOLONG, -+ libc::EHOSTDOWN => EHOSTDOWN, -+ libc::EHOSTUNREACH => EHOSTUNREACH, -+ libc::ENOTEMPTY => ENOTEMPTY, -+ libc::EPROCLIM => EPROCLIM, -+ libc::EUSERS => EUSERS, -+ libc::EDQUOT => EDQUOT, -+ libc::ESTALE => ESTALE, -+ libc::EREMOTE => EREMOTE, -+ libc::EBADRPC => EBADRPC, -+ libc::ERPCMISMATCH => ERPCMISMATCH, -+ libc::EPROGUNAVAIL => EPROGUNAVAIL, -+ libc::EPROGMISMATCH => EPROGMISMATCH, -+ libc::EPROCUNAVAIL => EPROCUNAVAIL, -+ libc::ENOLCK => ENOLCK, -+ libc::ENOSYS => ENOSYS, -+ libc::EFTYPE => EFTYPE, -+ libc::EAUTH => EAUTH, -+ libc::ENEEDAUTH => ENEEDAUTH, -+ libc::EIDRM => EIDRM, -+ libc::ENOMSG => ENOMSG, -+ libc::EOVERFLOW => EOVERFLOW, -+ libc::ECANCELED => ECANCELED, -+ libc::EILSEQ => EILSEQ, -+ libc::ENOATTR => ENOATTR, -+ libc::EDOOFUS => EDOOFUS, -+ libc::EBADMSG => EBADMSG, -+ libc::EMULTIHOP => EMULTIHOP, -+ libc::ENOLINK => ENOLINK, -+ libc::EPROTO => EPROTO, -+ libc::ENOTCAPABLE => ENOTCAPABLE, -+ libc::ECAPMODE => ECAPMODE, -+ libc::ENOTRECOVERABLE => ENOTRECOVERABLE, -+ libc::EOWNERDEAD => EOWNERDEAD, -+ _ => UnknownErrno, -+ } -+ } -+} -+ -+ -+#[cfg(target_os = "dragonfly")] -+mod consts { -+ use libc; -+ -+ #[derive(Clone, Copy, Debug, Eq, PartialEq)] -+ #[repr(i32)] -+ pub enum Errno { -+ UnknownErrno = 0, -+ EPERM = libc::EPERM, -+ ENOENT = libc::ENOENT, -+ ESRCH = libc::ESRCH, -+ EINTR = libc::EINTR, -+ EIO = libc::EIO, -+ ENXIO = libc::ENXIO, -+ E2BIG = libc::E2BIG, -+ ENOEXEC = libc::ENOEXEC, -+ EBADF = libc::EBADF, -+ ECHILD = libc::ECHILD, -+ EDEADLK = libc::EDEADLK, -+ ENOMEM = libc::ENOMEM, -+ EACCES = libc::EACCES, -+ EFAULT = libc::EFAULT, -+ ENOTBLK = libc::ENOTBLK, -+ EBUSY = libc::EBUSY, -+ EEXIST = libc::EEXIST, -+ EXDEV = libc::EXDEV, -+ ENODEV = libc::ENODEV, -+ ENOTDIR = libc::ENOTDIR, -+ EISDIR = libc::EISDIR, -+ EINVAL = libc::EINVAL, -+ ENFILE = libc::ENFILE, -+ EMFILE = libc::EMFILE, -+ ENOTTY = libc::ENOTTY, -+ ETXTBSY = libc::ETXTBSY, -+ EFBIG = libc::EFBIG, -+ ENOSPC = libc::ENOSPC, -+ ESPIPE = libc::ESPIPE, -+ EROFS = libc::EROFS, -+ EMLINK = libc::EMLINK, -+ EPIPE = libc::EPIPE, -+ EDOM = libc::EDOM, -+ ERANGE = libc::ERANGE, -+ EAGAIN = libc::EAGAIN, -+ EINPROGRESS = libc::EINPROGRESS, -+ EALREADY = libc::EALREADY, -+ ENOTSOCK = libc::ENOTSOCK, -+ EDESTADDRREQ = libc::EDESTADDRREQ, -+ EMSGSIZE = libc::EMSGSIZE, -+ EPROTOTYPE = libc::EPROTOTYPE, -+ ENOPROTOOPT = libc::ENOPROTOOPT, -+ EPROTONOSUPPORT = libc::EPROTONOSUPPORT, -+ ESOCKTNOSUPPORT = libc::ESOCKTNOSUPPORT, -+ ENOTSUP = libc::ENOTSUP, -+ EPFNOSUPPORT = libc::EPFNOSUPPORT, -+ EAFNOSUPPORT = libc::EAFNOSUPPORT, -+ EADDRINUSE = libc::EADDRINUSE, -+ EADDRNOTAVAIL = libc::EADDRNOTAVAIL, -+ ENETDOWN = libc::ENETDOWN, -+ ENETUNREACH = libc::ENETUNREACH, -+ ENETRESET = libc::ENETRESET, -+ ECONNABORTED = libc::ECONNABORTED, -+ ECONNRESET = libc::ECONNRESET, -+ ENOBUFS = libc::ENOBUFS, -+ EISCONN = libc::EISCONN, -+ ENOTCONN = libc::ENOTCONN, -+ ESHUTDOWN = libc::ESHUTDOWN, -+ ETOOMANYREFS = libc::ETOOMANYREFS, -+ ETIMEDOUT = libc::ETIMEDOUT, -+ ECONNREFUSED = libc::ECONNREFUSED, -+ ELOOP = libc::ELOOP, -+ ENAMETOOLONG = libc::ENAMETOOLONG, -+ EHOSTDOWN = libc::EHOSTDOWN, -+ EHOSTUNREACH = libc::EHOSTUNREACH, -+ ENOTEMPTY = libc::ENOTEMPTY, -+ EPROCLIM = libc::EPROCLIM, -+ EUSERS = libc::EUSERS, -+ EDQUOT = libc::EDQUOT, -+ ESTALE = libc::ESTALE, -+ EREMOTE = libc::EREMOTE, -+ EBADRPC = libc::EBADRPC, -+ ERPCMISMATCH = libc::ERPCMISMATCH, -+ EPROGUNAVAIL = libc::EPROGUNAVAIL, -+ EPROGMISMATCH = libc::EPROGMISMATCH, -+ EPROCUNAVAIL = libc::EPROCUNAVAIL, -+ ENOLCK = libc::ENOLCK, -+ ENOSYS = libc::ENOSYS, -+ EFTYPE = libc::EFTYPE, -+ EAUTH = libc::EAUTH, -+ ENEEDAUTH = libc::ENEEDAUTH, -+ EIDRM = libc::EIDRM, -+ ENOMSG = libc::ENOMSG, -+ EOVERFLOW = libc::EOVERFLOW, -+ ECANCELED = libc::ECANCELED, -+ EILSEQ = libc::EILSEQ, -+ ENOATTR = libc::ENOATTR, -+ EDOOFUS = libc::EDOOFUS, -+ EBADMSG = libc::EBADMSG, -+ EMULTIHOP = libc::EMULTIHOP, -+ ENOLINK = libc::ENOLINK, -+ EPROTO = libc::EPROTO, -+ ENOMEDIUM = libc::ENOMEDIUM, -+ EASYNC = libc::EASYNC, -+ } -+ -+ pub const ELAST: Errno = Errno::EASYNC; -+ pub const EWOULDBLOCK: Errno = Errno::EAGAIN; -+ pub const EDEADLOCK: Errno = Errno::EDEADLK; -+ pub const EOPNOTSUPP: Errno = Errno::ENOTSUP; -+ -+ pub const EL2NSYNC: Errno = Errno::UnknownErrno; -+ -+ pub fn from_i32(e: i32) -> Errno { -+ use self::Errno::*; -+ -+ match e { -+ libc::EPERM => EPERM, -+ libc::ENOENT => ENOENT, -+ libc::ESRCH => ESRCH, -+ libc::EINTR => EINTR, -+ libc::EIO => EIO, -+ libc::ENXIO => ENXIO, -+ libc::E2BIG => E2BIG, -+ libc::ENOEXEC => ENOEXEC, -+ libc::EBADF => EBADF, -+ libc::ECHILD => ECHILD, -+ libc::EDEADLK => EDEADLK, -+ libc::ENOMEM => ENOMEM, -+ libc::EACCES => EACCES, -+ libc::EFAULT => EFAULT, -+ libc::ENOTBLK => ENOTBLK, -+ libc::EBUSY => EBUSY, -+ libc::EEXIST => EEXIST, -+ libc::EXDEV => EXDEV, -+ libc::ENODEV => ENODEV, -+ libc::ENOTDIR => ENOTDIR, -+ libc::EISDIR=> EISDIR, -+ libc::EINVAL => EINVAL, -+ libc::ENFILE => ENFILE, -+ libc::EMFILE => EMFILE, -+ libc::ENOTTY => ENOTTY, -+ libc::ETXTBSY => ETXTBSY, -+ libc::EFBIG => EFBIG, -+ libc::ENOSPC => ENOSPC, -+ libc::ESPIPE => ESPIPE, -+ libc::EROFS => EROFS, -+ libc::EMLINK => EMLINK, -+ libc::EPIPE => EPIPE, -+ libc::EDOM => EDOM, -+ libc::ERANGE => ERANGE, -+ libc::EAGAIN => EAGAIN, -+ libc::EINPROGRESS => EINPROGRESS, -+ libc::EALREADY => EALREADY, -+ libc::ENOTSOCK => ENOTSOCK, -+ libc::EDESTADDRREQ => EDESTADDRREQ, -+ libc::EMSGSIZE => EMSGSIZE, -+ libc::EPROTOTYPE => EPROTOTYPE, -+ libc::ENOPROTOOPT => ENOPROTOOPT, -+ libc::EPROTONOSUPPORT => EPROTONOSUPPORT, -+ libc::ESOCKTNOSUPPORT => ESOCKTNOSUPPORT, -+ libc::ENOTSUP => ENOTSUP, -+ libc::EPFNOSUPPORT => EPFNOSUPPORT, -+ libc::EAFNOSUPPORT => EAFNOSUPPORT, -+ libc::EADDRINUSE => EADDRINUSE, -+ libc::EADDRNOTAVAIL => EADDRNOTAVAIL, -+ libc::ENETDOWN => ENETDOWN, -+ libc::ENETUNREACH => ENETUNREACH, -+ libc::ENETRESET => ENETRESET, -+ libc::ECONNABORTED => ECONNABORTED, -+ libc::ECONNRESET => ECONNRESET, -+ libc::ENOBUFS => ENOBUFS, -+ libc::EISCONN => EISCONN, -+ libc::ENOTCONN => ENOTCONN, -+ libc::ESHUTDOWN => ESHUTDOWN, -+ libc::ETOOMANYREFS => ETOOMANYREFS, -+ libc::ETIMEDOUT => ETIMEDOUT, -+ libc::ECONNREFUSED => ECONNREFUSED, -+ libc::ELOOP => ELOOP, -+ libc::ENAMETOOLONG => ENAMETOOLONG, -+ libc::EHOSTDOWN => EHOSTDOWN, -+ libc::EHOSTUNREACH => EHOSTUNREACH, -+ libc::ENOTEMPTY => ENOTEMPTY, -+ libc::EPROCLIM => EPROCLIM, -+ libc::EUSERS => EUSERS, -+ libc::EDQUOT => EDQUOT, -+ libc::ESTALE => ESTALE, -+ libc::EREMOTE => EREMOTE, -+ libc::EBADRPC => EBADRPC, -+ libc::ERPCMISMATCH => ERPCMISMATCH, -+ libc::EPROGUNAVAIL => EPROGUNAVAIL, -+ libc::EPROGMISMATCH => EPROGMISMATCH, -+ libc::EPROCUNAVAIL => EPROCUNAVAIL, -+ libc::ENOLCK => ENOLCK, -+ libc::ENOSYS => ENOSYS, -+ libc::EFTYPE => EFTYPE, -+ libc::EAUTH => EAUTH, -+ libc::ENEEDAUTH => ENEEDAUTH, -+ libc::EIDRM => EIDRM, -+ libc::ENOMSG => ENOMSG, -+ libc::EOVERFLOW => EOVERFLOW, -+ libc::ECANCELED => ECANCELED, -+ libc::EILSEQ => EILSEQ, -+ libc::ENOATTR => ENOATTR, -+ libc::EDOOFUS => EDOOFUS, -+ libc::EBADMSG => EBADMSG, -+ libc::EMULTIHOP => EMULTIHOP, -+ libc::ENOLINK => ENOLINK, -+ libc::EPROTO => EPROTO, -+ libc::ENOMEDIUM => ENOMEDIUM, -+ libc::EASYNC => EASYNC, -+ _ => UnknownErrno, -+ } -+ } -+} -+ -+ -+#[cfg(target_os = "openbsd")] -+mod consts { -+ use libc; -+ -+ #[derive(Clone, Copy, Debug, Eq, PartialEq)] -+ #[repr(i32)] -+ pub enum Errno { -+ UnknownErrno = 0, -+ EPERM = libc::EPERM, -+ ENOENT = libc::ENOENT, -+ ESRCH = libc::ESRCH, -+ EINTR = libc::EINTR, -+ EIO = libc::EIO, -+ ENXIO = libc::ENXIO, -+ E2BIG = libc::E2BIG, -+ ENOEXEC = libc::ENOEXEC, -+ EBADF = libc::EBADF, -+ ECHILD = libc::ECHILD, -+ EDEADLK = libc::EDEADLK, -+ ENOMEM = libc::ENOMEM, -+ EACCES = libc::EACCES, -+ EFAULT = libc::EFAULT, -+ ENOTBLK = libc::ENOTBLK, -+ EBUSY = libc::EBUSY, -+ EEXIST = libc::EEXIST, -+ EXDEV = libc::EXDEV, -+ ENODEV = libc::ENODEV, -+ ENOTDIR = libc::ENOTDIR, -+ EISDIR = libc::EISDIR, -+ EINVAL = libc::EINVAL, -+ ENFILE = libc::ENFILE, -+ EMFILE = libc::EMFILE, -+ ENOTTY = libc::ENOTTY, -+ ETXTBSY = libc::ETXTBSY, -+ EFBIG = libc::EFBIG, -+ ENOSPC = libc::ENOSPC, -+ ESPIPE = libc::ESPIPE, -+ EROFS = libc::EROFS, -+ EMLINK = libc::EMLINK, -+ EPIPE = libc::EPIPE, -+ EDOM = libc::EDOM, -+ ERANGE = libc::ERANGE, -+ EAGAIN = libc::EAGAIN, -+ EINPROGRESS = libc::EINPROGRESS, -+ EALREADY = libc::EALREADY, -+ ENOTSOCK = libc::ENOTSOCK, -+ EDESTADDRREQ = libc::EDESTADDRREQ, -+ EMSGSIZE = libc::EMSGSIZE, -+ EPROTOTYPE = libc::EPROTOTYPE, -+ ENOPROTOOPT = libc::ENOPROTOOPT, -+ EPROTONOSUPPORT = libc::EPROTONOSUPPORT, -+ ESOCKTNOSUPPORT = libc::ESOCKTNOSUPPORT, -+ EOPNOTSUPP = libc::EOPNOTSUPP, -+ EPFNOSUPPORT = libc::EPFNOSUPPORT, -+ EAFNOSUPPORT = libc::EAFNOSUPPORT, -+ EADDRINUSE = libc::EADDRINUSE, -+ EADDRNOTAVAIL = libc::EADDRNOTAVAIL, -+ ENETDOWN = libc::ENETDOWN, -+ ENETUNREACH = libc::ENETUNREACH, -+ ENETRESET = libc::ENETRESET, -+ ECONNABORTED = libc::ECONNABORTED, -+ ECONNRESET = libc::ECONNRESET, -+ ENOBUFS = libc::ENOBUFS, -+ EISCONN = libc::EISCONN, -+ ENOTCONN = libc::ENOTCONN, -+ ESHUTDOWN = libc::ESHUTDOWN, -+ ETOOMANYREFS = libc::ETOOMANYREFS, -+ ETIMEDOUT = libc::ETIMEDOUT, -+ ECONNREFUSED = libc::ECONNREFUSED, -+ ELOOP = libc::ELOOP, -+ ENAMETOOLONG = libc::ENAMETOOLONG, -+ EHOSTDOWN = libc::EHOSTDOWN, -+ EHOSTUNREACH = libc::EHOSTUNREACH, -+ ENOTEMPTY = libc::ENOTEMPTY, -+ EPROCLIM = libc::EPROCLIM, -+ EUSERS = libc::EUSERS, -+ EDQUOT = libc::EDQUOT, -+ ESTALE = libc::ESTALE, -+ EREMOTE = libc::EREMOTE, -+ EBADRPC = libc::EBADRPC, -+ ERPCMISMATCH = libc::ERPCMISMATCH, -+ EPROGUNAVAIL = libc::EPROGUNAVAIL, -+ EPROGMISMATCH = libc::EPROGMISMATCH, -+ EPROCUNAVAIL = libc::EPROCUNAVAIL, -+ ENOLCK = libc::ENOLCK, -+ ENOSYS = libc::ENOSYS, -+ EFTYPE = libc::EFTYPE, -+ EAUTH = libc::EAUTH, -+ ENEEDAUTH = libc::ENEEDAUTH, -+ EIPSEC = libc::EIPSEC, -+ ENOATTR = libc::ENOATTR, -+ EILSEQ = libc::EILSEQ, -+ ENOMEDIUM = libc::ENOMEDIUM, -+ EMEDIUMTYPE = libc::EMEDIUMTYPE, -+ EOVERFLOW = libc::EOVERFLOW, -+ ECANCELED = libc::ECANCELED, -+ EIDRM = libc::EIDRM, -+ ENOMSG = libc::ENOMSG, -+ ENOTSUP = libc::ENOTSUP, -+ EBADMSG = libc::EBADMSG, -+ ENOTRECOVERABLE = libc::ENOTRECOVERABLE, -+ EOWNERDEAD = libc::EOWNERDEAD, -+ EPROTO = libc::EPROTO, -+ } -+ -+ pub const ELAST: Errno = Errno::ENOTSUP; -+ pub const EWOULDBLOCK: Errno = Errno::EAGAIN; -+ -+ pub const EL2NSYNC: Errno = Errno::UnknownErrno; -+ -+ pub fn from_i32(e: i32) -> Errno { -+ use self::Errno::*; -+ -+ match e { -+ libc::EPERM => EPERM, -+ libc::ENOENT => ENOENT, -+ libc::ESRCH => ESRCH, -+ libc::EINTR => EINTR, -+ libc::EIO => EIO, -+ libc::ENXIO => ENXIO, -+ libc::E2BIG => E2BIG, -+ libc::ENOEXEC => ENOEXEC, -+ libc::EBADF => EBADF, -+ libc::ECHILD => ECHILD, -+ libc::EDEADLK => EDEADLK, -+ libc::ENOMEM => ENOMEM, -+ libc::EACCES => EACCES, -+ libc::EFAULT => EFAULT, -+ libc::ENOTBLK => ENOTBLK, -+ libc::EBUSY => EBUSY, -+ libc::EEXIST => EEXIST, -+ libc::EXDEV => EXDEV, -+ libc::ENODEV => ENODEV, -+ libc::ENOTDIR => ENOTDIR, -+ libc::EISDIR => EISDIR, -+ libc::EINVAL => EINVAL, -+ libc::ENFILE => ENFILE, -+ libc::EMFILE => EMFILE, -+ libc::ENOTTY => ENOTTY, -+ libc::ETXTBSY => ETXTBSY, -+ libc::EFBIG => EFBIG, -+ libc::ENOSPC => ENOSPC, -+ libc::ESPIPE => ESPIPE, -+ libc::EROFS => EROFS, -+ libc::EMLINK => EMLINK, -+ libc::EPIPE => EPIPE, -+ libc::EDOM => EDOM, -+ libc::ERANGE => ERANGE, -+ libc::EAGAIN => EAGAIN, -+ libc::EINPROGRESS => EINPROGRESS, -+ libc::EALREADY => EALREADY, -+ libc::ENOTSOCK => ENOTSOCK, -+ libc::EDESTADDRREQ => EDESTADDRREQ, -+ libc::EMSGSIZE => EMSGSIZE, -+ libc::EPROTOTYPE => EPROTOTYPE, -+ libc::ENOPROTOOPT => ENOPROTOOPT, -+ libc::EPROTONOSUPPORT => EPROTONOSUPPORT, -+ libc::ESOCKTNOSUPPORT => ESOCKTNOSUPPORT, -+ libc::EOPNOTSUPP => EOPNOTSUPP, -+ libc::EPFNOSUPPORT => EPFNOSUPPORT, -+ libc::EAFNOSUPPORT => EAFNOSUPPORT, -+ libc::EADDRINUSE => EADDRINUSE, -+ libc::EADDRNOTAVAIL => EADDRNOTAVAIL, -+ libc::ENETDOWN => ENETDOWN, -+ libc::ENETUNREACH => ENETUNREACH, -+ libc::ENETRESET => ENETRESET, -+ libc::ECONNABORTED => ECONNABORTED, -+ libc::ECONNRESET => ECONNRESET, -+ libc::ENOBUFS => ENOBUFS, -+ libc::EISCONN => EISCONN, -+ libc::ENOTCONN => ENOTCONN, -+ libc::ESHUTDOWN => ESHUTDOWN, -+ libc::ETOOMANYREFS => ETOOMANYREFS, -+ libc::ETIMEDOUT => ETIMEDOUT, -+ libc::ECONNREFUSED => ECONNREFUSED, -+ libc::ELOOP => ELOOP, -+ libc::ENAMETOOLONG => ENAMETOOLONG, -+ libc::EHOSTDOWN => EHOSTDOWN, -+ libc::EHOSTUNREACH => EHOSTUNREACH, -+ libc::ENOTEMPTY => ENOTEMPTY, -+ libc::EPROCLIM => EPROCLIM, -+ libc::EUSERS => EUSERS, -+ libc::EDQUOT => EDQUOT, -+ libc::ESTALE => ESTALE, -+ libc::EREMOTE => EREMOTE, -+ libc::EBADRPC => EBADRPC, -+ libc::ERPCMISMATCH => ERPCMISMATCH, -+ libc::EPROGUNAVAIL => EPROGUNAVAIL, -+ libc::EPROGMISMATCH => EPROGMISMATCH, -+ libc::EPROCUNAVAIL => EPROCUNAVAIL, -+ libc::ENOLCK => ENOLCK, -+ libc::ENOSYS => ENOSYS, -+ libc::EFTYPE => EFTYPE, -+ libc::EAUTH => EAUTH, -+ libc::ENEEDAUTH => ENEEDAUTH, -+ libc::EIPSEC => EIPSEC, -+ libc::ENOATTR => ENOATTR, -+ libc::EILSEQ => EILSEQ, -+ libc::ENOMEDIUM => ENOMEDIUM, -+ libc::EMEDIUMTYPE => EMEDIUMTYPE, -+ libc::EOVERFLOW => EOVERFLOW, -+ libc::ECANCELED => ECANCELED, -+ libc::EIDRM => EIDRM, -+ libc::ENOMSG => ENOMSG, -+ libc::ENOTSUP => ENOTSUP, -+ libc::EBADMSG => EBADMSG, -+ libc::ENOTRECOVERABLE => ENOTRECOVERABLE, -+ libc::EOWNERDEAD => EOWNERDEAD, -+ libc::EPROTO => EPROTO, -+ _ => UnknownErrno, -+ } -+ } -+} -+ -+#[cfg(target_os = "netbsd")] -+mod consts { -+ use libc; -+ -+ #[derive(Clone, Copy, Debug, Eq, PartialEq)] -+ #[repr(i32)] -+ pub enum Errno { -+ UnknownErrno = 0, -+ EPERM = libc::EPERM, -+ ENOENT = libc::ENOENT, -+ ESRCH = libc::ESRCH, -+ EINTR = libc::EINTR, -+ EIO = libc::EIO, -+ ENXIO = libc::ENXIO, -+ E2BIG = libc::E2BIG, -+ ENOEXEC = libc::ENOEXEC, -+ EBADF = libc::EBADF, -+ ECHILD = libc::ECHILD, -+ EDEADLK = libc::EDEADLK, -+ ENOMEM = libc::ENOMEM, -+ EACCES = libc::EACCES, -+ EFAULT = libc::EFAULT, -+ ENOTBLK = libc::ENOTBLK, -+ EBUSY = libc::EBUSY, -+ EEXIST = libc::EEXIST, -+ EXDEV = libc::EXDEV, -+ ENODEV = libc::ENODEV, -+ ENOTDIR = libc::ENOTDIR, -+ EISDIR = libc::EISDIR, -+ EINVAL = libc::EINVAL, -+ ENFILE = libc::ENFILE, -+ EMFILE = libc::EMFILE, -+ ENOTTY = libc::ENOTTY, -+ ETXTBSY = libc::ETXTBSY, -+ EFBIG = libc::EFBIG, -+ ENOSPC = libc::ENOSPC, -+ ESPIPE = libc::ESPIPE, -+ EROFS = libc::EROFS, -+ EMLINK = libc::EMLINK, -+ EPIPE = libc::EPIPE, -+ EDOM = libc::EDOM, -+ ERANGE = libc::ERANGE, -+ EAGAIN = libc::EAGAIN, -+ EINPROGRESS = libc::EINPROGRESS, -+ EALREADY = libc::EALREADY, -+ ENOTSOCK = libc::ENOTSOCK, -+ EDESTADDRREQ = libc::EDESTADDRREQ, -+ EMSGSIZE = libc::EMSGSIZE, -+ EPROTOTYPE = libc::EPROTOTYPE, -+ ENOPROTOOPT = libc::ENOPROTOOPT, -+ EPROTONOSUPPORT = libc::EPROTONOSUPPORT, -+ ESOCKTNOSUPPORT = libc::ESOCKTNOSUPPORT, -+ EOPNOTSUPP = libc::EOPNOTSUPP, -+ EPFNOSUPPORT = libc::EPFNOSUPPORT, -+ EAFNOSUPPORT = libc::EAFNOSUPPORT, -+ EADDRINUSE = libc::EADDRINUSE, -+ EADDRNOTAVAIL = libc::EADDRNOTAVAIL, -+ ENETDOWN = libc::ENETDOWN, -+ ENETUNREACH = libc::ENETUNREACH, -+ ENETRESET = libc::ENETRESET, -+ ECONNABORTED = libc::ECONNABORTED, -+ ECONNRESET = libc::ECONNRESET, -+ ENOBUFS = libc::ENOBUFS, -+ EISCONN = libc::EISCONN, -+ ENOTCONN = libc::ENOTCONN, -+ ESHUTDOWN = libc::ESHUTDOWN, -+ ETOOMANYREFS = libc::ETOOMANYREFS, -+ ETIMEDOUT = libc::ETIMEDOUT, -+ ECONNREFUSED = libc::ECONNREFUSED, -+ ELOOP = libc::ELOOP, -+ ENAMETOOLONG = libc::ENAMETOOLONG, -+ EHOSTDOWN = libc::EHOSTDOWN, -+ EHOSTUNREACH = libc::EHOSTUNREACH, -+ ENOTEMPTY = libc::ENOTEMPTY, -+ EPROCLIM = libc::EPROCLIM, -+ EUSERS = libc::EUSERS, -+ EDQUOT = libc::EDQUOT, -+ ESTALE = libc::ESTALE, -+ EREMOTE = libc::EREMOTE, -+ EBADRPC = libc::EBADRPC, -+ ERPCMISMATCH = libc::ERPCMISMATCH, -+ EPROGUNAVAIL = libc::EPROGUNAVAIL, -+ EPROGMISMATCH = libc::EPROGMISMATCH, -+ EPROCUNAVAIL = libc::EPROCUNAVAIL, -+ ENOLCK = libc::ENOLCK, -+ ENOSYS = libc::ENOSYS, -+ EFTYPE = libc::EFTYPE, -+ EAUTH = libc::EAUTH, -+ ENEEDAUTH = libc::ENEEDAUTH, -+ EIDRM = libc::EIDRM, -+ ENOMSG = libc::ENOMSG, -+ EOVERFLOW = libc::EOVERFLOW, -+ EILSEQ = libc::EILSEQ, -+ ENOTSUP = libc::ENOTSUP, -+ ECANCELED = libc::ECANCELED, -+ EBADMSG = libc::EBADMSG, -+ ENODATA = libc::ENODATA, -+ ENOSR = libc::ENOSR, -+ ENOSTR = libc::ENOSTR, -+ ETIME = libc::ETIME, -+ ENOATTR = libc::ENOATTR, -+ EMULTIHOP = libc::EMULTIHOP, -+ ENOLINK = libc::ENOLINK, -+ EPROTO = libc::EPROTO, -+ } -+ -+ pub const ELAST: Errno = Errno::ENOTSUP; -+ pub const EWOULDBLOCK: Errno = Errno::EAGAIN; -+ -+ pub const EL2NSYNC: Errno = Errno::UnknownErrno; -+ -+ pub fn from_i32(e: i32) -> Errno { -+ use self::Errno::*; -+ -+ match e { -+ libc::EPERM => EPERM, -+ libc::ENOENT => ENOENT, -+ libc::ESRCH => ESRCH, -+ libc::EINTR => EINTR, -+ libc::EIO => EIO, -+ libc::ENXIO => ENXIO, -+ libc::E2BIG => E2BIG, -+ libc::ENOEXEC => ENOEXEC, -+ libc::EBADF => EBADF, -+ libc::ECHILD => ECHILD, -+ libc::EDEADLK => EDEADLK, -+ libc::ENOMEM => ENOMEM, -+ libc::EACCES => EACCES, -+ libc::EFAULT => EFAULT, -+ libc::ENOTBLK => ENOTBLK, -+ libc::EBUSY => EBUSY, -+ libc::EEXIST => EEXIST, -+ libc::EXDEV => EXDEV, -+ libc::ENODEV => ENODEV, -+ libc::ENOTDIR => ENOTDIR, -+ libc::EISDIR => EISDIR, -+ libc::EINVAL => EINVAL, -+ libc::ENFILE => ENFILE, -+ libc::EMFILE => EMFILE, -+ libc::ENOTTY => ENOTTY, -+ libc::ETXTBSY => ETXTBSY, -+ libc::EFBIG => EFBIG, -+ libc::ENOSPC => ENOSPC, -+ libc::ESPIPE => ESPIPE, -+ libc::EROFS => EROFS, -+ libc::EMLINK => EMLINK, -+ libc::EPIPE => EPIPE, -+ libc::EDOM => EDOM, -+ libc::ERANGE => ERANGE, -+ libc::EAGAIN => EAGAIN, -+ libc::EINPROGRESS => EINPROGRESS, -+ libc::EALREADY => EALREADY, -+ libc::ENOTSOCK => ENOTSOCK, -+ libc::EDESTADDRREQ => EDESTADDRREQ, -+ libc::EMSGSIZE => EMSGSIZE, -+ libc::EPROTOTYPE => EPROTOTYPE, -+ libc::ENOPROTOOPT => ENOPROTOOPT, -+ libc::EPROTONOSUPPORT => EPROTONOSUPPORT, -+ libc::ESOCKTNOSUPPORT => ESOCKTNOSUPPORT, -+ libc::EOPNOTSUPP => EOPNOTSUPP, -+ libc::EPFNOSUPPORT => EPFNOSUPPORT, -+ libc::EAFNOSUPPORT => EAFNOSUPPORT, -+ libc::EADDRINUSE => EADDRINUSE, -+ libc::EADDRNOTAVAIL => EADDRNOTAVAIL, -+ libc::ENETDOWN => ENETDOWN, -+ libc::ENETUNREACH => ENETUNREACH, -+ libc::ENETRESET => ENETRESET, -+ libc::ECONNABORTED => ECONNABORTED, -+ libc::ECONNRESET => ECONNRESET, -+ libc::ENOBUFS => ENOBUFS, -+ libc::EISCONN => EISCONN, -+ libc::ENOTCONN => ENOTCONN, -+ libc::ESHUTDOWN => ESHUTDOWN, -+ libc::ETOOMANYREFS => ETOOMANYREFS, -+ libc::ETIMEDOUT => ETIMEDOUT, -+ libc::ECONNREFUSED => ECONNREFUSED, -+ libc::ELOOP => ELOOP, -+ libc::ENAMETOOLONG => ENAMETOOLONG, -+ libc::EHOSTDOWN => EHOSTDOWN, -+ libc::EHOSTUNREACH => EHOSTUNREACH, -+ libc::ENOTEMPTY => ENOTEMPTY, -+ libc::EPROCLIM => EPROCLIM, -+ libc::EUSERS => EUSERS, -+ libc::EDQUOT => EDQUOT, -+ libc::ESTALE => ESTALE, -+ libc::EREMOTE => EREMOTE, -+ libc::EBADRPC => EBADRPC, -+ libc::ERPCMISMATCH => ERPCMISMATCH, -+ libc::EPROGUNAVAIL => EPROGUNAVAIL, -+ libc::EPROGMISMATCH => EPROGMISMATCH, -+ libc::EPROCUNAVAIL => EPROCUNAVAIL, -+ libc::ENOLCK => ENOLCK, -+ libc::ENOSYS => ENOSYS, -+ libc::EFTYPE => EFTYPE, -+ libc::EAUTH => EAUTH, -+ libc::ENEEDAUTH => ENEEDAUTH, -+ libc::EIDRM => EIDRM, -+ libc::ENOMSG => ENOMSG, -+ libc::EOVERFLOW => EOVERFLOW, -+ libc::EILSEQ => EILSEQ, -+ libc::ENOTSUP => ENOTSUP, -+ libc::ECANCELED => ECANCELED, -+ libc::EBADMSG => EBADMSG, -+ libc::ENODATA => ENODATA, -+ libc::ENOSR => ENOSR, -+ libc::ENOSTR => ENOSTR, -+ libc::ETIME => ETIME, -+ libc::ENOATTR => ENOATTR, -+ libc::EMULTIHOP => EMULTIHOP, -+ libc::ENOLINK => ENOLINK, -+ libc::EPROTO => EPROTO, -+ _ => UnknownErrno, -+ } -+ } -+} -diff --git a/third_party/rust/nix/src/errno_dragonfly.c b/third_party/rust/nix-0.15.0/src/errno_dragonfly.c -similarity index 100% -rename from third_party/rust/nix/src/errno_dragonfly.c -rename to third_party/rust/nix-0.15.0/src/errno_dragonfly.c -diff --git a/third_party/rust/nix-0.15.0/src/fcntl.rs b/third_party/rust/nix-0.15.0/src/fcntl.rs -new file mode 100644 -index 0000000000000..be6ee0f73a8be ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/fcntl.rs -@@ -0,0 +1,506 @@ -+use {Error, Result, NixPath}; -+use errno::Errno; -+use libc::{self, c_int, c_uint, c_char, size_t, ssize_t}; -+use sys::stat::Mode; -+use std::os::raw; -+use std::os::unix::io::RawFd; -+use std::ffi::OsStr; -+use std::os::unix::ffi::OsStrExt; -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+use std::ptr; // For splice and copy_file_range -+#[cfg(any(target_os = "android", target_os = "linux"))] -+use sys::uio::IoVec; // For vmsplice -+ -+#[cfg(any(target_os = "linux", -+ target_os = "android", -+ target_os = "emscripten", -+ target_os = "fuchsia", -+ any(target_os = "wasi", target_env = "wasi"), -+ target_env = "uclibc", -+ target_env = "freebsd"))] -+pub use self::posix_fadvise::*; -+ -+libc_bitflags!{ -+ pub struct AtFlags: c_int { -+ AT_REMOVEDIR; -+ AT_SYMLINK_NOFOLLOW; -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ AT_NO_AUTOMOUNT; -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ AT_EMPTY_PATH; -+ } -+} -+ -+libc_bitflags!( -+ /// Configuration options for opened files. -+ pub struct OFlag: c_int { -+ /// Mask for the access mode of the file. -+ O_ACCMODE; -+ /// Use alternate I/O semantics. -+ #[cfg(target_os = "netbsd")] -+ O_ALT_IO; -+ /// Open the file in append-only mode. -+ O_APPEND; -+ /// Generate a signal when input or output becomes possible. -+ O_ASYNC; -+ /// Closes the file descriptor once an `execve` call is made. -+ /// -+ /// Also sets the file offset to the beginning of the file. -+ O_CLOEXEC; -+ /// Create the file if it does not exist. -+ O_CREAT; -+ /// Try to minimize cache effects of the I/O for this file. -+ #[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "netbsd"))] -+ O_DIRECT; -+ /// If the specified path isn't a directory, fail. -+ O_DIRECTORY; -+ /// Implicitly follow each `write()` with an `fdatasync()`. -+ #[cfg(any(target_os = "android", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ O_DSYNC; -+ /// Error out if a file was not created. -+ O_EXCL; -+ /// Open for execute only. -+ #[cfg(target_os = "freebsd")] -+ O_EXEC; -+ /// Open with an exclusive file lock. -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ O_EXLOCK; -+ /// Same as `O_SYNC`. -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ all(target_os = "linux", not(target_env = "musl")), -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ O_FSYNC; -+ /// Allow files whose sizes can't be represented in an `off_t` to be opened. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ O_LARGEFILE; -+ /// Do not update the file last access time during `read(2)`s. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ O_NOATIME; -+ /// Don't attach the device as the process' controlling terminal. -+ O_NOCTTY; -+ /// Same as `O_NONBLOCK`. -+ O_NDELAY; -+ /// `open()` will fail if the given path is a symbolic link. -+ O_NOFOLLOW; -+ /// When possible, open the file in nonblocking mode. -+ O_NONBLOCK; -+ /// Don't deliver `SIGPIPE`. -+ #[cfg(target_os = "netbsd")] -+ O_NOSIGPIPE; -+ /// Obtain a file descriptor for low-level access. -+ /// -+ /// The file itself is not opened and other file operations will fail. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ O_PATH; -+ /// Only allow reading. -+ /// -+ /// This should not be combined with `O_WRONLY` or `O_RDWR`. -+ O_RDONLY; -+ /// Allow both reading and writing. -+ /// -+ /// This should not be combined with `O_WRONLY` or `O_RDONLY`. -+ O_RDWR; -+ /// Similar to `O_DSYNC` but applies to `read`s instead. -+ #[cfg(any(target_os = "linux", target_os = "netbsd", target_os = "openbsd"))] -+ O_RSYNC; -+ /// Skip search permission checks. -+ #[cfg(target_os = "netbsd")] -+ O_SEARCH; -+ /// Open with a shared file lock. -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ O_SHLOCK; -+ /// Implicitly follow each `write()` with an `fsync()`. -+ O_SYNC; -+ /// Create an unnamed temporary file. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ O_TMPFILE; -+ /// Truncate an existing regular file to 0 length if it allows writing. -+ O_TRUNC; -+ /// Restore default TTY attributes. -+ #[cfg(target_os = "freebsd")] -+ O_TTY_INIT; -+ /// Only allow writing. -+ /// -+ /// This should not be combined with `O_RDONLY` or `O_RDWR`. -+ O_WRONLY; -+ } -+); -+ -+pub fn open<P: ?Sized + NixPath>(path: &P, oflag: OFlag, mode: Mode) -> Result<RawFd> { -+ let fd = path.with_nix_path(|cstr| { -+ unsafe { libc::open(cstr.as_ptr(), oflag.bits(), mode.bits() as c_uint) } -+ })?; -+ -+ Errno::result(fd) -+} -+ -+pub fn openat<P: ?Sized + NixPath>(dirfd: RawFd, path: &P, oflag: OFlag, mode: Mode) -> Result<RawFd> { -+ let fd = path.with_nix_path(|cstr| { -+ unsafe { libc::openat(dirfd, cstr.as_ptr(), oflag.bits(), mode.bits() as c_uint) } -+ })?; -+ Errno::result(fd) -+} -+ -+pub fn renameat<P1: ?Sized + NixPath, P2: ?Sized + NixPath>(old_dirfd: Option<RawFd>, old_path: &P1, -+ new_dirfd: Option<RawFd>, new_path: &P2) -+ -> Result<()> { -+ let res = old_path.with_nix_path(|old_cstr| { -+ new_path.with_nix_path(|new_cstr| unsafe { -+ libc::renameat(at_rawfd(old_dirfd), old_cstr.as_ptr(), -+ at_rawfd(new_dirfd), new_cstr.as_ptr()) -+ }) -+ })??; -+ Errno::result(res).map(drop) -+} -+ -+fn wrap_readlink_result(buffer: &mut[u8], res: ssize_t) -> Result<&OsStr> { -+ match Errno::result(res) { -+ Err(err) => Err(err), -+ Ok(len) => { -+ if (len as usize) >= buffer.len() { -+ Err(Error::Sys(Errno::ENAMETOOLONG)) -+ } else { -+ Ok(OsStr::from_bytes(&buffer[..(len as usize)])) -+ } -+ } -+ } -+} -+ -+pub fn readlink<'a, P: ?Sized + NixPath>(path: &P, buffer: &'a mut [u8]) -> Result<&'a OsStr> { -+ let res = path.with_nix_path(|cstr| { -+ unsafe { libc::readlink(cstr.as_ptr(), buffer.as_mut_ptr() as *mut c_char, buffer.len() as size_t) } -+ })?; -+ -+ wrap_readlink_result(buffer, res) -+} -+ -+ -+pub fn readlinkat<'a, P: ?Sized + NixPath>(dirfd: RawFd, path: &P, buffer: &'a mut [u8]) -> Result<&'a OsStr> { -+ let res = path.with_nix_path(|cstr| { -+ unsafe { libc::readlinkat(dirfd, cstr.as_ptr(), buffer.as_mut_ptr() as *mut c_char, buffer.len() as size_t) } -+ })?; -+ -+ wrap_readlink_result(buffer, res) -+} -+ -+/// Computes the raw fd consumed by a function of the form `*at`. -+pub(crate) fn at_rawfd(fd: Option<RawFd>) -> raw::c_int { -+ match fd { -+ None => libc::AT_FDCWD, -+ Some(fd) => fd, -+ } -+} -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+libc_bitflags!( -+ /// Additional flags for file sealing, which allows for limiting operations on a file. -+ pub struct SealFlag: c_int { -+ /// Prevents further calls to `fcntl()` with `F_ADD_SEALS`. -+ F_SEAL_SEAL; -+ /// The file cannot be reduced in size. -+ F_SEAL_SHRINK; -+ /// The size of the file cannot be increased. -+ F_SEAL_GROW; -+ /// The file contents cannot be modified. -+ F_SEAL_WRITE; -+ } -+); -+ -+libc_bitflags!( -+ /// Additional configuration flags for `fcntl`'s `F_SETFD`. -+ pub struct FdFlag: c_int { -+ /// The file descriptor will automatically be closed during a successful `execve(2)`. -+ FD_CLOEXEC; -+ } -+); -+ -+#[derive(Debug, Eq, Hash, PartialEq)] -+pub enum FcntlArg<'a> { -+ F_DUPFD(RawFd), -+ F_DUPFD_CLOEXEC(RawFd), -+ F_GETFD, -+ F_SETFD(FdFlag), // FD_FLAGS -+ F_GETFL, -+ F_SETFL(OFlag), // O_NONBLOCK -+ F_SETLK(&'a libc::flock), -+ F_SETLKW(&'a libc::flock), -+ F_GETLK(&'a mut libc::flock), -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ F_OFD_SETLK(&'a libc::flock), -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ F_OFD_SETLKW(&'a libc::flock), -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ F_OFD_GETLK(&'a mut libc::flock), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ F_ADD_SEALS(SealFlag), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ F_GET_SEALS, -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ F_FULLFSYNC, -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ F_GETPIPE_SZ, -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ F_SETPIPE_SZ(c_int), -+ -+ // TODO: Rest of flags -+} -+pub use self::FcntlArg::*; -+ -+// TODO: Figure out how to handle value fcntl returns -+pub fn fcntl(fd: RawFd, arg: FcntlArg) -> Result<c_int> { -+ let res = unsafe { -+ match arg { -+ F_DUPFD(rawfd) => libc::fcntl(fd, libc::F_DUPFD, rawfd), -+ F_DUPFD_CLOEXEC(rawfd) => libc::fcntl(fd, libc::F_DUPFD_CLOEXEC, rawfd), -+ F_GETFD => libc::fcntl(fd, libc::F_GETFD), -+ F_SETFD(flag) => libc::fcntl(fd, libc::F_SETFD, flag.bits()), -+ F_GETFL => libc::fcntl(fd, libc::F_GETFL), -+ F_SETFL(flag) => libc::fcntl(fd, libc::F_SETFL, flag.bits()), -+ F_SETLK(flock) => libc::fcntl(fd, libc::F_SETLK, flock), -+ F_SETLKW(flock) => libc::fcntl(fd, libc::F_SETLKW, flock), -+ F_GETLK(flock) => libc::fcntl(fd, libc::F_GETLK, flock), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ F_ADD_SEALS(flag) => libc::fcntl(fd, libc::F_ADD_SEALS, flag.bits()), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ F_GET_SEALS => libc::fcntl(fd, libc::F_GET_SEALS), -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ F_FULLFSYNC => libc::fcntl(fd, libc::F_FULLFSYNC), -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ F_GETPIPE_SZ => libc::fcntl(fd, libc::F_GETPIPE_SZ), -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ F_SETPIPE_SZ(size) => libc::fcntl(fd, libc::F_SETPIPE_SZ, size), -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ _ => unimplemented!() -+ } -+ }; -+ -+ Errno::result(res) -+} -+ -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub enum FlockArg { -+ LockShared, -+ LockExclusive, -+ Unlock, -+ LockSharedNonblock, -+ LockExclusiveNonblock, -+ UnlockNonblock, -+} -+ -+pub fn flock(fd: RawFd, arg: FlockArg) -> Result<()> { -+ use self::FlockArg::*; -+ -+ let res = unsafe { -+ match arg { -+ LockShared => libc::flock(fd, libc::LOCK_SH), -+ LockExclusive => libc::flock(fd, libc::LOCK_EX), -+ Unlock => libc::flock(fd, libc::LOCK_UN), -+ LockSharedNonblock => libc::flock(fd, libc::LOCK_SH | libc::LOCK_NB), -+ LockExclusiveNonblock => libc::flock(fd, libc::LOCK_EX | libc::LOCK_NB), -+ UnlockNonblock => libc::flock(fd, libc::LOCK_UN | libc::LOCK_NB), -+ } -+ }; -+ -+ Errno::result(res).map(drop) -+} -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+libc_bitflags! { -+ /// Additional flags to `splice` and friends. -+ pub struct SpliceFFlags: c_uint { -+ /// Request that pages be moved instead of copied. -+ /// -+ /// Not applicable to `vmsplice`. -+ SPLICE_F_MOVE; -+ /// Do not block on I/O. -+ SPLICE_F_NONBLOCK; -+ /// Hint that more data will be coming in a subsequent splice. -+ /// -+ /// Not applicable to `vmsplice`. -+ SPLICE_F_MORE; -+ /// Gift the user pages to the kernel. -+ /// -+ /// Not applicable to `splice`. -+ SPLICE_F_GIFT; -+ } -+} -+ -+/// Copy a range of data from one file to another -+/// -+/// The `copy_file_range` system call performs an in-kernel copy between -+/// file descriptors `fd_in` and `fd_out` without the additional cost of -+/// transferring data from the kernel to user space and then back into the -+/// kernel. It copies up to `len` bytes of data from file descriptor `fd_in` to -+/// file descriptor `fd_out`, overwriting any data that exists within the -+/// requested range of the target file. -+/// -+/// If the `off_in` and/or `off_out` arguments are used, the values -+/// will be mutated to reflect the new position within the file after -+/// copying. If they are not used, the relevant filedescriptors will be seeked -+/// to the new position. -+/// -+/// On successful completion the number of bytes actually copied will be -+/// returned. -+#[cfg(any(target_os = "android", target_os = "linux"))] -+pub fn copy_file_range( -+ fd_in: RawFd, -+ off_in: Option<&mut libc::loff_t>, -+ fd_out: RawFd, -+ off_out: Option<&mut libc::loff_t>, -+ len: usize, -+) -> Result<usize> { -+ let off_in = off_in -+ .map(|offset| offset as *mut libc::loff_t) -+ .unwrap_or(ptr::null_mut()); -+ let off_out = off_out -+ .map(|offset| offset as *mut libc::loff_t) -+ .unwrap_or(ptr::null_mut()); -+ -+ let ret = unsafe { -+ libc::syscall( -+ libc::SYS_copy_file_range, -+ fd_in, -+ off_in, -+ fd_out, -+ off_out, -+ len, -+ 0, -+ ) -+ }; -+ Errno::result(ret).map(|r| r as usize) -+} -+ -+#[cfg(any(target_os = "linux", target_os = "android"))] -+pub fn splice( -+ fd_in: RawFd, -+ off_in: Option<&mut libc::loff_t>, -+ fd_out: RawFd, -+ off_out: Option<&mut libc::loff_t>, -+ len: usize, -+ flags: SpliceFFlags, -+) -> Result<usize> { -+ let off_in = off_in -+ .map(|offset| offset as *mut libc::loff_t) -+ .unwrap_or(ptr::null_mut()); -+ let off_out = off_out -+ .map(|offset| offset as *mut libc::loff_t) -+ .unwrap_or(ptr::null_mut()); -+ -+ let ret = unsafe { -+ libc::splice(fd_in, off_in, fd_out, off_out, len, flags.bits()) -+ }; -+ Errno::result(ret).map(|r| r as usize) -+} -+ -+#[cfg(any(target_os = "linux", target_os = "android"))] -+pub fn tee(fd_in: RawFd, fd_out: RawFd, len: usize, flags: SpliceFFlags) -> Result<usize> { -+ let ret = unsafe { libc::tee(fd_in, fd_out, len, flags.bits()) }; -+ Errno::result(ret).map(|r| r as usize) -+} -+ -+#[cfg(any(target_os = "linux", target_os = "android"))] -+pub fn vmsplice(fd: RawFd, iov: &[IoVec<&[u8]>], flags: SpliceFFlags) -> Result<usize> { -+ let ret = unsafe { -+ libc::vmsplice(fd, iov.as_ptr() as *const libc::iovec, iov.len(), flags.bits()) -+ }; -+ Errno::result(ret).map(|r| r as usize) -+} -+ -+#[cfg(any(target_os = "linux"))] -+libc_bitflags!( -+ /// Mode argument flags for fallocate determining operation performed on a given range. -+ pub struct FallocateFlags: c_int { -+ /// File size is not changed. -+ /// -+ /// offset + len can be greater than file size. -+ FALLOC_FL_KEEP_SIZE; -+ /// Deallocates space by creating a hole. -+ /// -+ /// Must be ORed with FALLOC_FL_KEEP_SIZE. Byte range starts at offset and continues for len bytes. -+ FALLOC_FL_PUNCH_HOLE; -+ /// Removes byte range from a file without leaving a hole. -+ /// -+ /// Byte range to collapse starts at offset and continues for len bytes. -+ FALLOC_FL_COLLAPSE_RANGE; -+ /// Zeroes space in specified byte range. -+ /// -+ /// Byte range starts at offset and continues for len bytes. -+ FALLOC_FL_ZERO_RANGE; -+ /// Increases file space by inserting a hole within the file size. -+ /// -+ /// Does not overwrite existing data. Hole starts at offset and continues for len bytes. -+ FALLOC_FL_INSERT_RANGE; -+ /// Shared file data extants are made private to the file. -+ /// -+ /// Gaurantees that a subsequent write will not fail due to lack of space. -+ FALLOC_FL_UNSHARE_RANGE; -+ } -+); -+ -+/// Manipulates file space. -+/// -+/// Allows the caller to directly manipulate the allocated disk space for the -+/// file referred to by fd. -+#[cfg(any(target_os = "linux"))] -+pub fn fallocate(fd: RawFd, mode: FallocateFlags, offset: libc::off_t, len: libc::off_t) -> Result<c_int> { -+ let res = unsafe { libc::fallocate(fd, mode.bits(), offset, len) }; -+ Errno::result(res) -+} -+ -+#[cfg(any(target_os = "linux", -+ target_os = "android", -+ target_os = "emscripten", -+ target_os = "fuchsia", -+ any(target_os = "wasi", target_env = "wasi"), -+ target_env = "uclibc", -+ target_env = "freebsd"))] -+mod posix_fadvise { -+ use Result; -+ use libc; -+ use errno::Errno; -+ use std::os::unix::io::RawFd; -+ -+ libc_enum! { -+ #[repr(i32)] -+ pub enum PosixFadviseAdvice { -+ POSIX_FADV_NORMAL, -+ POSIX_FADV_SEQUENTIAL, -+ POSIX_FADV_RANDOM, -+ POSIX_FADV_NOREUSE, -+ POSIX_FADV_WILLNEED, -+ POSIX_FADV_DONTNEED, -+ } -+ } -+ -+ pub fn posix_fadvise(fd: RawFd, -+ offset: libc::off_t, -+ len: libc::off_t, -+ advice: PosixFadviseAdvice) -> Result<libc::c_int> { -+ let res = unsafe { libc::posix_fadvise(fd, offset, len, advice as libc::c_int) }; -+ Errno::result(res) -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/features.rs b/third_party/rust/nix-0.15.0/src/features.rs -new file mode 100644 -index 0000000000000..76cdfd3a1a6f1 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/features.rs -@@ -0,0 +1,103 @@ -+//! Feature tests for OS functionality -+pub use self::os::*; -+ -+#[cfg(any(target_os = "linux", target_os = "android"))] -+mod os { -+ use sys::utsname::uname; -+ -+ // Features: -+ // * atomic cloexec on socket: 2.6.27 -+ // * pipe2: 2.6.27 -+ // * accept4: 2.6.28 -+ -+ static VERS_UNKNOWN: usize = 1; -+ static VERS_2_6_18: usize = 2; -+ static VERS_2_6_27: usize = 3; -+ static VERS_2_6_28: usize = 4; -+ static VERS_3: usize = 5; -+ -+ #[inline] -+ fn digit(dst: &mut usize, b: u8) { -+ *dst *= 10; -+ *dst += (b - b'0') as usize; -+ } -+ -+ fn parse_kernel_version() -> usize { -+ let u = uname(); -+ -+ let mut curr: usize = 0; -+ let mut major: usize = 0; -+ let mut minor: usize = 0; -+ let mut patch: usize = 0; -+ -+ for b in u.release().bytes() { -+ if curr >= 3 { -+ break; -+ } -+ -+ match b { -+ b'.' | b'-' => { -+ curr += 1; -+ } -+ b'0'..=b'9' => { -+ match curr { -+ 0 => digit(&mut major, b), -+ 1 => digit(&mut minor, b), -+ _ => digit(&mut patch, b), -+ } -+ } -+ _ => break, -+ } -+ } -+ -+ if major >= 3 { -+ VERS_3 -+ } else if major >= 2 { -+ if minor >= 7 { -+ VERS_UNKNOWN -+ } else if minor >= 6 { -+ if patch >= 28 { -+ VERS_2_6_28 -+ } else if patch >= 27 { -+ VERS_2_6_27 -+ } else { -+ VERS_2_6_18 -+ } -+ } else { -+ VERS_UNKNOWN -+ } -+ } else { -+ VERS_UNKNOWN -+ } -+ } -+ -+ fn kernel_version() -> usize { -+ static mut KERNEL_VERS: usize = 0; -+ -+ unsafe { -+ if KERNEL_VERS == 0 { -+ KERNEL_VERS = parse_kernel_version(); -+ } -+ -+ KERNEL_VERS -+ } -+ } -+ -+ /// Check if the OS supports atomic close-on-exec for sockets -+ pub fn socket_atomic_cloexec() -> bool { -+ kernel_version() >= VERS_2_6_27 -+ } -+ -+ #[test] -+ pub fn test_parsing_kernel_version() { -+ assert!(kernel_version() > 0); -+ } -+} -+ -+#[cfg(any(target_os = "macos", target_os = "freebsd", target_os = "dragonfly", target_os = "ios", target_os = "openbsd", target_os = "netbsd"))] -+mod os { -+ /// Check if the OS supports atomic close-on-exec for sockets -+ pub fn socket_atomic_cloexec() -> bool { -+ false -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/ifaddrs.rs b/third_party/rust/nix-0.15.0/src/ifaddrs.rs -new file mode 100644 -index 0000000000000..12b59bcc92bef ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/ifaddrs.rs -@@ -0,0 +1,146 @@ -+//! Query network interface addresses -+//! -+//! Uses the Linux and/or BSD specific function `getifaddrs` to query the list -+//! of interfaces and their associated addresses. -+ -+use std::ffi; -+use std::iter::Iterator; -+use std::mem; -+use std::option::Option; -+ -+use libc; -+ -+use {Result, Errno}; -+use sys::socket::SockAddr; -+use net::if_::*; -+ -+/// Describes a single address for an interface as returned by `getifaddrs`. -+#[derive(Clone, Debug, Eq, Hash, PartialEq)] -+pub struct InterfaceAddress { -+ /// Name of the network interface -+ pub interface_name: String, -+ /// Flags as from `SIOCGIFFLAGS` ioctl -+ pub flags: InterfaceFlags, -+ /// Network address of this interface -+ pub address: Option<SockAddr>, -+ /// Netmask of this interface -+ pub netmask: Option<SockAddr>, -+ /// Broadcast address of this interface, if applicable -+ pub broadcast: Option<SockAddr>, -+ /// Point-to-point destination address -+ pub destination: Option<SockAddr>, -+} -+ -+cfg_if! { -+ if #[cfg(any(target_os = "android", target_os = "emscripten", target_os = "fuchsia", target_os = "linux"))] { -+ fn get_ifu_from_sockaddr(info: &libc::ifaddrs) -> *const libc::sockaddr { -+ info.ifa_ifu -+ } -+ } else { -+ fn get_ifu_from_sockaddr(info: &libc::ifaddrs) -> *const libc::sockaddr { -+ info.ifa_dstaddr -+ } -+ } -+} -+ -+impl InterfaceAddress { -+ /// Create an `InterfaceAddress` from the libc struct. -+ fn from_libc_ifaddrs(info: &libc::ifaddrs) -> InterfaceAddress { -+ let ifname = unsafe { ffi::CStr::from_ptr(info.ifa_name) }; -+ let address = unsafe { SockAddr::from_libc_sockaddr(info.ifa_addr) }; -+ let netmask = unsafe { SockAddr::from_libc_sockaddr(info.ifa_netmask) }; -+ let mut addr = InterfaceAddress { -+ interface_name: ifname.to_string_lossy().to_string(), -+ flags: InterfaceFlags::from_bits_truncate(info.ifa_flags as i32), -+ address: address, -+ netmask: netmask, -+ broadcast: None, -+ destination: None, -+ }; -+ -+ let ifu = get_ifu_from_sockaddr(info); -+ if addr.flags.contains(InterfaceFlags::IFF_POINTOPOINT) { -+ addr.destination = unsafe { SockAddr::from_libc_sockaddr(ifu) }; -+ } else if addr.flags.contains(InterfaceFlags::IFF_BROADCAST) { -+ addr.broadcast = unsafe { SockAddr::from_libc_sockaddr(ifu) }; -+ } -+ -+ addr -+ } -+} -+ -+/// Holds the results of `getifaddrs`. -+/// -+/// Use the function `getifaddrs` to create this Iterator. Note that the -+/// actual list of interfaces can be iterated once and will be freed as -+/// soon as the Iterator goes out of scope. -+#[derive(Debug, Eq, Hash, PartialEq)] -+pub struct InterfaceAddressIterator { -+ base: *mut libc::ifaddrs, -+ next: *mut libc::ifaddrs, -+} -+ -+impl Drop for InterfaceAddressIterator { -+ fn drop(&mut self) { -+ unsafe { libc::freeifaddrs(self.base) }; -+ } -+} -+ -+impl Iterator for InterfaceAddressIterator { -+ type Item = InterfaceAddress; -+ fn next(&mut self) -> Option<<Self as Iterator>::Item> { -+ match unsafe { self.next.as_ref() } { -+ Some(ifaddr) => { -+ self.next = ifaddr.ifa_next; -+ Some(InterfaceAddress::from_libc_ifaddrs(ifaddr)) -+ } -+ None => None, -+ } -+ } -+} -+ -+/// Get interface addresses using libc's `getifaddrs` -+/// -+/// Note that the underlying implementation differs between OSes. Only the -+/// most common address families are supported by the nix crate (due to -+/// lack of time and complexity of testing). The address family is encoded -+/// in the specific variant of `SockAddr` returned for the fields `address`, -+/// `netmask`, `broadcast`, and `destination`. For any entry not supported, -+/// the returned list will contain a `None` entry. -+/// -+/// # Example -+/// ``` -+/// let addrs = nix::ifaddrs::getifaddrs().unwrap(); -+/// for ifaddr in addrs { -+/// match ifaddr.address { -+/// Some(address) => { -+/// println!("interface {} address {}", -+/// ifaddr.interface_name, address); -+/// }, -+/// None => { -+/// println!("interface {} with unsupported address family", -+/// ifaddr.interface_name); -+/// } -+/// } -+/// } -+/// ``` -+pub fn getifaddrs() -> Result<InterfaceAddressIterator> { -+ let mut addrs: *mut libc::ifaddrs = unsafe { mem::uninitialized() }; -+ Errno::result(unsafe { libc::getifaddrs(&mut addrs) }).map(|_| { -+ InterfaceAddressIterator { -+ base: addrs, -+ next: addrs, -+ } -+ }) -+} -+ -+#[cfg(test)] -+mod tests { -+ use super::*; -+ -+ // Only checks if `getifaddrs` can be invoked without panicking. -+ #[test] -+ fn test_getifaddrs() { -+ let _ = getifaddrs(); -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/kmod.rs b/third_party/rust/nix-0.15.0/src/kmod.rs -new file mode 100644 -index 0000000000000..e853261b14f9d ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/kmod.rs -@@ -0,0 +1,123 @@ -+//! Load and unload kernel modules. -+//! -+//! For more details see -+ -+use libc; -+use std::ffi::CStr; -+use std::os::unix::io::AsRawFd; -+ -+use errno::Errno; -+use Result; -+ -+/// Loads a kernel module from a buffer. -+/// -+/// It loads an ELF image into kernel space, -+/// performs any necessary symbol relocations, -+/// initializes module parameters to values provided by the caller, -+/// and then runs the module's init function. -+/// -+/// This function requires `CAP_SYS_MODULE` privilege. -+/// -+/// The `module_image` argument points to a buffer containing the binary image -+/// to be loaded. The buffer should contain a valid ELF image -+/// built for the running kernel. -+/// -+/// The `param_values` argument is a string containing space-delimited specifications -+/// of the values for module parameters. -+/// Each of the parameter specifications has the form: -+/// -+/// `name[=value[,value...]]` -+/// -+/// # Example -+/// -+/// ```no_run -+/// use std::fs::File; -+/// use std::io::Read; -+/// use std::ffi::CString; -+/// use nix::kmod::init_module; -+/// -+/// let mut f = File::open("mykernel.ko").unwrap(); -+/// let mut contents: Vec<u8> = Vec::new(); -+/// f.read_to_end(&mut contents).unwrap(); -+/// init_module(&mut contents, &CString::new("who=Rust when=Now,12").unwrap()).unwrap(); -+/// ``` -+/// -+/// See [`man init_module(2)`](http://man7.org/linux/man-pages/man2/init_module.2.html) for more information. -+pub fn init_module(module_image: &[u8], param_values: &CStr) -> Result<()> { -+ let res = unsafe { -+ libc::syscall( -+ libc::SYS_init_module, -+ module_image.as_ptr(), -+ module_image.len(), -+ param_values.as_ptr(), -+ ) -+ }; -+ -+ Errno::result(res).map(drop) -+} -+ -+libc_bitflags!( -+ /// Flags used by the `finit_module` function. -+ pub struct ModuleInitFlags: libc::c_uint { -+ /// Ignore symbol version hashes. -+ MODULE_INIT_IGNORE_MODVERSIONS; -+ /// Ignore kernel version magic. -+ MODULE_INIT_IGNORE_VERMAGIC; -+ } -+); -+ -+/// Loads a kernel module from a given file descriptor. -+/// -+/// # Example -+/// -+/// ```no_run -+/// use std::fs::File; -+/// use std::ffi::CString; -+/// use nix::kmod::{finit_module, ModuleInitFlags}; -+/// -+/// let f = File::open("mymod.ko").unwrap(); -+/// finit_module(&f, &CString::new("").unwrap(), ModuleInitFlags::empty()).unwrap(); -+/// ``` -+/// -+/// See [`man init_module(2)`](http://man7.org/linux/man-pages/man2/init_module.2.html) for more information. -+pub fn finit_module<T: AsRawFd>(fd: &T, param_values: &CStr, flags: ModuleInitFlags) -> Result<()> { -+ let res = unsafe { -+ libc::syscall( -+ libc::SYS_finit_module, -+ fd.as_raw_fd(), -+ param_values.as_ptr(), -+ flags.bits(), -+ ) -+ }; -+ -+ Errno::result(res).map(drop) -+} -+ -+libc_bitflags!( -+ /// Flags used by `delete_module`. -+ /// -+ /// See [`man delete_module(2)`](http://man7.org/linux/man-pages/man2/delete_module.2.html) -+ /// for a detailed description how these flags work. -+ pub struct DeleteModuleFlags: libc::c_int { -+ O_NONBLOCK; -+ O_TRUNC; -+ } -+); -+ -+/// Unloads the kernel module with the given name. -+/// -+/// # Example -+/// -+/// ```no_run -+/// use std::ffi::CString; -+/// use nix::kmod::{delete_module, DeleteModuleFlags}; -+/// -+/// delete_module(&CString::new("mymod").unwrap(), DeleteModuleFlags::O_NONBLOCK).unwrap(); -+/// ``` -+/// -+/// See [`man delete_module(2)`](http://man7.org/linux/man-pages/man2/delete_module.2.html) for more information. -+pub fn delete_module(name: &CStr, flags: DeleteModuleFlags) -> Result<()> { -+ let res = unsafe { libc::syscall(libc::SYS_delete_module, name.as_ptr(), flags.bits()) }; -+ -+ Errno::result(res).map(drop) -+} -diff --git a/third_party/rust/nix-0.15.0/src/lib.rs b/third_party/rust/nix-0.15.0/src/lib.rs -new file mode 100644 -index 0000000000000..71485d2af1824 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/lib.rs -@@ -0,0 +1,284 @@ -+//! Rust friendly bindings to the various *nix system functions. -+//! -+//! Modules are structured according to the C header file that they would be -+//! defined in. -+#![crate_name = "nix"] -+#![cfg(unix)] -+#![allow(non_camel_case_types)] -+// latest bitflags triggers a rustc bug with cross-crate macro expansions causing dead_code -+// warnings even though the macro expands into something with allow(dead_code) -+#![allow(dead_code)] -+#![cfg_attr(test, deny(warnings))] -+#![recursion_limit = "500"] -+#![deny(unused)] -+#![deny(unstable_features)] -+#![deny(missing_copy_implementations)] -+#![deny(missing_debug_implementations)] -+// XXX Allow deprecated items until release 0.16.0. See issue #1096. -+#![allow(deprecated)] -+ -+// External crates -+#[macro_use] -+extern crate bitflags; -+#[macro_use] -+extern crate cfg_if; -+extern crate void; -+ -+// Re-exported external crates -+pub extern crate libc; -+ -+// Private internal modules -+#[macro_use] mod macros; -+ -+// Public crates -+pub mod dir; -+pub mod errno; -+#[deny(missing_docs)] -+pub mod features; -+pub mod fcntl; -+#[deny(missing_docs)] -+#[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+pub mod ifaddrs; -+#[cfg(any(target_os = "android", -+ target_os = "linux"))] -+pub mod kmod; -+#[cfg(any(target_os = "android", -+ target_os = "linux"))] -+pub mod mount; -+#[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "fushsia", -+ target_os = "linux", -+ target_os = "netbsd"))] -+pub mod mqueue; -+#[deny(missing_docs)] -+pub mod net; -+#[deny(missing_docs)] -+pub mod poll; -+#[deny(missing_docs)] -+pub mod pty; -+pub mod sched; -+pub mod sys; -+// This can be implemented for other platforms as soon as libc -+// provides bindings for them. -+#[cfg(all(target_os = "linux", -+ any(target_arch = "x86", target_arch = "x86_64")))] -+pub mod ucontext; -+pub mod unistd; -+ -+/* -+ * -+ * ===== Result / Error ===== -+ * -+ */ -+ -+use libc::{c_char, PATH_MAX}; -+ -+use std::{error, fmt, ptr, result}; -+use std::ffi::{CStr, OsStr}; -+use std::os::unix::ffi::OsStrExt; -+use std::path::{Path, PathBuf}; -+ -+use errno::Errno; -+ -+/// Nix Result Type -+pub type Result<T> = result::Result<T, Error>; -+ -+/// Nix Error Type -+/// -+/// The nix error type provides a common way of dealing with -+/// various system system/libc calls that might fail. Each -+/// error has a corresponding errno (usually the one from the -+/// underlying OS) to which it can be mapped in addition to -+/// implementing other common traits. -+#[derive(Clone, Copy, Debug, Eq, PartialEq)] -+pub enum Error { -+ Sys(Errno), -+ InvalidPath, -+ /// The operation involved a conversion to Rust's native String type, which failed because the -+ /// string did not contain all valid UTF-8. -+ InvalidUtf8, -+ /// The operation is not supported by Nix, in this instance either use the libc bindings or -+ /// consult the module documentation to see if there is a more appropriate interface available. -+ UnsupportedOperation, -+} -+ -+impl Error { -+ /// Convert this `Error` to an [`Errno`](enum.Errno.html). -+ /// -+ /// # Example -+ /// -+ /// ``` -+ /// # use nix::Error; -+ /// # use nix::errno::Errno; -+ /// let e = Error::from(Errno::EPERM); -+ /// assert_eq!(Some(Errno::EPERM), e.as_errno()); -+ /// ``` -+ pub fn as_errno(&self) -> Option<Errno> { -+ if let &Error::Sys(ref e) = self { -+ Some(*e) -+ } else { -+ None -+ } -+ } -+ -+ /// Create a nix Error from a given errno -+ pub fn from_errno(errno: Errno) -> Error { -+ Error::Sys(errno) -+ } -+ -+ /// Get the current errno and convert it to a nix Error -+ pub fn last() -> Error { -+ Error::Sys(Errno::last()) -+ } -+ -+ /// Create a new invalid argument error (`EINVAL`) -+ pub fn invalid_argument() -> Error { -+ Error::Sys(Errno::EINVAL) -+ } -+ -+} -+ -+impl From<Errno> for Error { -+ fn from(errno: Errno) -> Error { Error::from_errno(errno) } -+} -+ -+impl From<std::string::FromUtf8Error> for Error { -+ fn from(_: std::string::FromUtf8Error) -> Error { Error::InvalidUtf8 } -+} -+ -+impl error::Error for Error { -+ fn description(&self) -> &str { -+ match *self { -+ Error::InvalidPath => "Invalid path", -+ Error::InvalidUtf8 => "Invalid UTF-8 string", -+ Error::UnsupportedOperation => "Unsupported Operation", -+ Error::Sys(ref errno) => errno.desc(), -+ } -+ } -+} -+ -+impl fmt::Display for Error { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ match *self { -+ Error::InvalidPath => write!(f, "Invalid path"), -+ Error::InvalidUtf8 => write!(f, "Invalid UTF-8 string"), -+ Error::UnsupportedOperation => write!(f, "Unsupported Operation"), -+ Error::Sys(errno) => write!(f, "{:?}: {}", errno, errno.desc()), -+ } -+ } -+} -+ -+pub trait NixPath { -+ fn len(&self) -> usize; -+ -+ fn with_nix_path<T, F>(&self, f: F) -> Result<T> -+ where F: FnOnce(&CStr) -> T; -+} -+ -+impl NixPath for str { -+ fn len(&self) -> usize { -+ NixPath::len(OsStr::new(self)) -+ } -+ -+ fn with_nix_path<T, F>(&self, f: F) -> Result<T> -+ where F: FnOnce(&CStr) -> T { -+ OsStr::new(self).with_nix_path(f) -+ } -+} -+ -+impl NixPath for OsStr { -+ fn len(&self) -> usize { -+ self.as_bytes().len() -+ } -+ -+ fn with_nix_path<T, F>(&self, f: F) -> Result<T> -+ where F: FnOnce(&CStr) -> T { -+ self.as_bytes().with_nix_path(f) -+ } -+} -+ -+impl NixPath for CStr { -+ fn len(&self) -> usize { -+ self.to_bytes().len() -+ } -+ -+ fn with_nix_path<T, F>(&self, f: F) -> Result<T> -+ where F: FnOnce(&CStr) -> T { -+ // Equivalence with the [u8] impl. -+ if self.len() >= PATH_MAX as usize { -+ return Err(Error::InvalidPath); -+ } -+ -+ Ok(f(self)) -+ } -+} -+ -+impl NixPath for [u8] { -+ fn len(&self) -> usize { -+ self.len() -+ } -+ -+ fn with_nix_path<T, F>(&self, f: F) -> Result<T> -+ where F: FnOnce(&CStr) -> T { -+ let mut buf = [0u8; PATH_MAX as usize]; -+ -+ if self.len() >= PATH_MAX as usize { -+ return Err(Error::InvalidPath); -+ } -+ -+ match self.iter().position(|b| *b == 0) { -+ Some(_) => Err(Error::InvalidPath), -+ None => { -+ unsafe { -+ // TODO: Replace with bytes::copy_memory. rust-lang/rust#24028 -+ ptr::copy_nonoverlapping(self.as_ptr(), buf.as_mut_ptr(), self.len()); -+ Ok(f(CStr::from_ptr(buf.as_ptr() as *const c_char))) -+ } -+ -+ } -+ } -+ } -+} -+ -+impl NixPath for Path { -+ fn len(&self) -> usize { -+ NixPath::len(self.as_os_str()) -+ } -+ -+ fn with_nix_path<T, F>(&self, f: F) -> Result<T> where F: FnOnce(&CStr) -> T { -+ self.as_os_str().with_nix_path(f) -+ } -+} -+ -+impl NixPath for PathBuf { -+ fn len(&self) -> usize { -+ NixPath::len(self.as_os_str()) -+ } -+ -+ fn with_nix_path<T, F>(&self, f: F) -> Result<T> where F: FnOnce(&CStr) -> T { -+ self.as_os_str().with_nix_path(f) -+ } -+} -+ -+/// Treats `None` as an empty string. -+impl<'a, NP: ?Sized + NixPath> NixPath for Option<&'a NP> { -+ fn len(&self) -> usize { -+ self.map_or(0, NixPath::len) -+ } -+ -+ fn with_nix_path<T, F>(&self, f: F) -> Result<T> where F: FnOnce(&CStr) -> T { -+ if let Some(nix_path) = *self { -+ nix_path.with_nix_path(f) -+ } else { -+ unsafe { CStr::from_ptr("\0".as_ptr() as *const _).with_nix_path(f) } -+ } -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/macros.rs b/third_party/rust/nix-0.15.0/src/macros.rs -new file mode 100644 -index 0000000000000..3d1b0e4b7699c ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/macros.rs -@@ -0,0 +1,264 @@ -+/// The `libc_bitflags!` macro helps with a common use case of defining a public bitflags type -+/// with values from the libc crate. It is used the same way as the `bitflags!` macro, except -+/// that only the name of the flag value has to be given. -+/// -+/// The `libc` crate must be in scope with the name `libc`. -+/// -+/// # Example -+/// ``` -+/// libc_bitflags!{ -+/// pub struct ProtFlags: libc::c_int { -+/// PROT_NONE; -+/// PROT_READ; -+/// /// PROT_WRITE enables write protect -+/// PROT_WRITE; -+/// PROT_EXEC; -+/// #[cfg(any(target_os = "linux", target_os = "android"))] -+/// PROT_GROWSDOWN; -+/// #[cfg(any(target_os = "linux", target_os = "android"))] -+/// PROT_GROWSUP; -+/// } -+/// } -+/// ``` -+/// -+/// Example with casting, due to a mistake in libc. In this example, the -+/// various flags have different types, so we cast the broken ones to the right -+/// type. -+/// -+/// ``` -+/// libc_bitflags!{ -+/// pub struct SaFlags: libc::c_ulong { -+/// SA_NOCLDSTOP as libc::c_ulong; -+/// SA_NOCLDWAIT; -+/// SA_NODEFER as libc::c_ulong; -+/// SA_ONSTACK; -+/// SA_RESETHAND as libc::c_ulong; -+/// SA_RESTART as libc::c_ulong; -+/// SA_SIGINFO; -+/// } -+/// } -+/// ``` -+macro_rules! libc_bitflags { -+ ( -+ $(#[$outer:meta])* -+ pub struct $BitFlags:ident: $T:ty { -+ $( -+ $(#[$inner:ident $($args:tt)*])* -+ $Flag:ident $(as $cast:ty)*; -+ )+ -+ } -+ ) => { -+ bitflags! { -+ $(#[$outer])* -+ pub struct $BitFlags: $T { -+ $( -+ $(#[$inner $($args)*])* -+ const $Flag = libc::$Flag $(as $cast)*; -+ )+ -+ } -+ } -+ }; -+} -+ -+/// The `libc_enum!` macro helps with a common use case of defining an enum exclusively using -+/// values from the `libc` crate. This macro supports both `pub` and private `enum`s. -+/// -+/// The `libc` crate must be in scope with the name `libc`. -+/// -+/// # Example -+/// ``` -+/// libc_enum!{ -+/// pub enum ProtFlags { -+/// PROT_NONE, -+/// PROT_READ, -+/// PROT_WRITE, -+/// PROT_EXEC, -+/// #[cfg(any(target_os = "linux", target_os = "android"))] -+/// PROT_GROWSDOWN, -+/// #[cfg(any(target_os = "linux", target_os = "android"))] -+/// PROT_GROWSUP, -+/// } -+/// } -+/// ``` -+macro_rules! libc_enum { -+ // (non-pub) Exit rule. -+ (@make_enum -+ { -+ name: $BitFlags:ident, -+ attrs: [$($attrs:tt)*], -+ entries: [$($entries:tt)*], -+ } -+ ) => { -+ $($attrs)* -+ #[derive(Clone, Copy, Debug, Eq, Hash, Ord, PartialEq, PartialOrd)] -+ enum $BitFlags { -+ $($entries)* -+ } -+ }; -+ -+ // (pub) Exit rule. -+ (@make_enum -+ { -+ pub, -+ name: $BitFlags:ident, -+ attrs: [$($attrs:tt)*], -+ entries: [$($entries:tt)*], -+ } -+ ) => { -+ $($attrs)* -+ #[derive(Clone, Copy, Debug, Eq, Hash, Ord, PartialEq, PartialOrd)] -+ pub enum $BitFlags { -+ $($entries)* -+ } -+ }; -+ -+ // (non-pub) Done accumulating. -+ (@accumulate_entries -+ { -+ name: $BitFlags:ident, -+ attrs: $attrs:tt, -+ }, -+ $entries:tt; -+ ) => { -+ libc_enum! { -+ @make_enum -+ { -+ name: $BitFlags, -+ attrs: $attrs, -+ entries: $entries, -+ } -+ } -+ }; -+ -+ // (pub) Done accumulating. -+ (@accumulate_entries -+ { -+ pub, -+ name: $BitFlags:ident, -+ attrs: $attrs:tt, -+ }, -+ $entries:tt; -+ ) => { -+ libc_enum! { -+ @make_enum -+ { -+ pub, -+ name: $BitFlags, -+ attrs: $attrs, -+ entries: $entries, -+ } -+ } -+ }; -+ -+ // Munch an attr. -+ (@accumulate_entries -+ $prefix:tt, -+ [$($entries:tt)*]; -+ #[$attr:meta] $($tail:tt)* -+ ) => { -+ libc_enum! { -+ @accumulate_entries -+ $prefix, -+ [ -+ $($entries)* -+ #[$attr] -+ ]; -+ $($tail)* -+ } -+ }; -+ -+ // Munch last ident if not followed by a comma. -+ (@accumulate_entries -+ $prefix:tt, -+ [$($entries:tt)*]; -+ $entry:ident -+ ) => { -+ libc_enum! { -+ @accumulate_entries -+ $prefix, -+ [ -+ $($entries)* -+ $entry = libc::$entry, -+ ]; -+ } -+ }; -+ -+ // Munch an ident; covers terminating comma case. -+ (@accumulate_entries -+ $prefix:tt, -+ [$($entries:tt)*]; -+ $entry:ident, $($tail:tt)* -+ ) => { -+ libc_enum! { -+ @accumulate_entries -+ $prefix, -+ [ -+ $($entries)* -+ $entry = libc::$entry, -+ ]; -+ $($tail)* -+ } -+ }; -+ -+ // Munch an ident and cast it to the given type; covers terminating comma. -+ (@accumulate_entries -+ $prefix:tt, -+ [$($entries:tt)*]; -+ $entry:ident as $ty:ty, $($tail:tt)* -+ ) => { -+ libc_enum! { -+ @accumulate_entries -+ $prefix, -+ [ -+ $($entries)* -+ $entry = libc::$entry as $ty, -+ ]; -+ $($tail)* -+ } -+ }; -+ -+ // (non-pub) Entry rule. -+ ( -+ $(#[$attr:meta])* -+ enum $BitFlags:ident { -+ $($vals:tt)* -+ } -+ ) => { -+ libc_enum! { -+ @accumulate_entries -+ { -+ name: $BitFlags, -+ attrs: [$(#[$attr])*], -+ }, -+ []; -+ $($vals)* -+ } -+ }; -+ -+ // (pub) Entry rule. -+ ( -+ $(#[$attr:meta])* -+ pub enum $BitFlags:ident { -+ $($vals:tt)* -+ } -+ ) => { -+ libc_enum! { -+ @accumulate_entries -+ { -+ pub, -+ name: $BitFlags, -+ attrs: [$(#[$attr])*], -+ }, -+ []; -+ $($vals)* -+ } -+ }; -+} -+ -+/// A Rust version of the familiar C `offset_of` macro. It returns the byte -+/// offset of `field` within struct `ty` -+macro_rules! offset_of { -+ ($ty:ty, $field:ident) => { -+ &(*(0 as *const $ty)).$field as *const _ as usize -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/mount.rs b/third_party/rust/nix-0.15.0/src/mount.rs -new file mode 100644 -index 0000000000000..a9902b170ace8 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/mount.rs -@@ -0,0 +1,98 @@ -+use libc::{self, c_ulong, c_int}; -+use {Result, NixPath}; -+use errno::Errno; -+ -+libc_bitflags!( -+ pub struct MsFlags: c_ulong { -+ /// Mount read-only -+ MS_RDONLY; -+ /// Ignore suid and sgid bits -+ MS_NOSUID; -+ /// Disallow access to device special files -+ MS_NODEV; -+ /// Disallow program execution -+ MS_NOEXEC; -+ /// Writes are synced at once -+ MS_SYNCHRONOUS; -+ /// Alter flags of a mounted FS -+ MS_REMOUNT; -+ /// Allow mandatory locks on a FS -+ MS_MANDLOCK; -+ /// Directory modifications are synchronous -+ MS_DIRSYNC; -+ /// Do not update access times -+ MS_NOATIME; -+ /// Do not update directory access times -+ MS_NODIRATIME; -+ /// Linux 2.4.0 - Bind directory at different place -+ MS_BIND; -+ MS_MOVE; -+ MS_REC; -+ MS_SILENT; -+ MS_POSIXACL; -+ MS_UNBINDABLE; -+ MS_PRIVATE; -+ MS_SLAVE; -+ MS_SHARED; -+ MS_RELATIME; -+ MS_KERNMOUNT; -+ MS_I_VERSION; -+ MS_STRICTATIME; -+ MS_ACTIVE; -+ MS_NOUSER; -+ MS_RMT_MASK; -+ MS_MGC_VAL; -+ MS_MGC_MSK; -+ } -+); -+ -+libc_bitflags!( -+ pub struct MntFlags: c_int { -+ MNT_FORCE; -+ MNT_DETACH; -+ MNT_EXPIRE; -+ } -+); -+ -+pub fn mount<P1: ?Sized + NixPath, P2: ?Sized + NixPath, P3: ?Sized + NixPath, P4: ?Sized + NixPath>( -+ source: Option<&P1>, -+ target: &P2, -+ fstype: Option<&P3>, -+ flags: MsFlags, -+ data: Option<&P4>) -> Result<()> { -+ -+ let res = -+ source.with_nix_path(|source| { -+ target.with_nix_path(|target| { -+ fstype.with_nix_path(|fstype| { -+ data.with_nix_path(|data| { -+ unsafe { -+ libc::mount(source.as_ptr(), -+ target.as_ptr(), -+ fstype.as_ptr(), -+ flags.bits, -+ data.as_ptr() as *const libc::c_void) -+ } -+ }) -+ }) -+ }) -+ })????; -+ -+ Errno::result(res).map(drop) -+} -+ -+pub fn umount<P: ?Sized + NixPath>(target: &P) -> Result<()> { -+ let res = target.with_nix_path(|cstr| { -+ unsafe { libc::umount(cstr.as_ptr()) } -+ })?; -+ -+ Errno::result(res).map(drop) -+} -+ -+pub fn umount2<P: ?Sized + NixPath>(target: &P, flags: MntFlags) -> Result<()> { -+ let res = target.with_nix_path(|cstr| { -+ unsafe { libc::umount2(cstr.as_ptr(), flags.bits) } -+ })?; -+ -+ Errno::result(res).map(drop) -+} -diff --git a/third_party/rust/nix-0.15.0/src/mqueue.rs b/third_party/rust/nix-0.15.0/src/mqueue.rs -new file mode 100644 -index 0000000000000..b958b71cddb46 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/mqueue.rs -@@ -0,0 +1,162 @@ -+//! Posix Message Queue functions -+//! -+//! [Further reading and details on the C API](http://man7.org/linux/man-pages/man7/mq_overview.7.html) -+ -+use Result; -+use errno::Errno; -+ -+use libc::{self, c_char, c_long, mqd_t, size_t}; -+use std::ffi::CString; -+use sys::stat::Mode; -+use std::mem; -+ -+libc_bitflags!{ -+ pub struct MQ_OFlag: libc::c_int { -+ O_RDONLY; -+ O_WRONLY; -+ O_RDWR; -+ O_CREAT; -+ O_EXCL; -+ O_NONBLOCK; -+ O_CLOEXEC; -+ } -+} -+ -+libc_bitflags!{ -+ pub struct FdFlag: libc::c_int { -+ FD_CLOEXEC; -+ } -+} -+ -+#[repr(C)] -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct MqAttr { -+ mq_attr: libc::mq_attr, -+} -+ -+impl MqAttr { -+ pub fn new(mq_flags: c_long, -+ mq_maxmsg: c_long, -+ mq_msgsize: c_long, -+ mq_curmsgs: c_long) -+ -> MqAttr { -+ let mut attr = unsafe { mem::uninitialized::<libc::mq_attr>() }; -+ attr.mq_flags = mq_flags; -+ attr.mq_maxmsg = mq_maxmsg; -+ attr.mq_msgsize = mq_msgsize; -+ attr.mq_curmsgs = mq_curmsgs; -+ MqAttr { mq_attr: attr } -+ } -+ -+ pub fn flags(&self) -> c_long { -+ self.mq_attr.mq_flags -+ } -+} -+ -+ -+/// Open a message queue -+/// -+/// See also [`mq_open(2)`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/mq_open.html) -+pub fn mq_open(name: &CString, -+ oflag: MQ_OFlag, -+ mode: Mode, -+ attr: Option<&MqAttr>) -+ -> Result<mqd_t> { -+ let res = match attr { -+ Some(mq_attr) => unsafe { -+ libc::mq_open(name.as_ptr(), -+ oflag.bits(), -+ mode.bits() as libc::c_int, -+ &mq_attr.mq_attr as *const libc::mq_attr) -+ }, -+ None => unsafe { libc::mq_open(name.as_ptr(), oflag.bits()) }, -+ }; -+ Errno::result(res) -+} -+ -+/// Remove a message queue -+/// -+/// See also [`mq_unlink(2)`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/mq_unlink.html) -+pub fn mq_unlink(name: &CString) -> Result<()> { -+ let res = unsafe { libc::mq_unlink(name.as_ptr()) }; -+ Errno::result(res).map(drop) -+} -+ -+/// Close a message queue -+/// -+/// See also [`mq_close(2)`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/mq_close.html) -+pub fn mq_close(mqdes: mqd_t) -> Result<()> { -+ let res = unsafe { libc::mq_close(mqdes) }; -+ Errno::result(res).map(drop) -+} -+ -+/// Receive a message from a message queue -+/// -+/// See also [`mq_receive(2)`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/mq_receive.html) -+pub fn mq_receive(mqdes: mqd_t, message: &mut [u8], msg_prio: &mut u32) -> Result<usize> { -+ let len = message.len() as size_t; -+ let res = unsafe { -+ libc::mq_receive(mqdes, -+ message.as_mut_ptr() as *mut c_char, -+ len, -+ msg_prio as *mut u32) -+ }; -+ Errno::result(res).map(|r| r as usize) -+} -+ -+/// Send a message to a message queue -+/// -+/// See also [`mq_send(2)`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/mq_send.html) -+pub fn mq_send(mqdes: mqd_t, message: &[u8], msq_prio: u32) -> Result<()> { -+ let res = unsafe { -+ libc::mq_send(mqdes, -+ message.as_ptr() as *const c_char, -+ message.len(), -+ msq_prio) -+ }; -+ Errno::result(res).map(drop) -+} -+ -+/// Get message queue attributes -+/// -+/// See also [`mq_getattr(2)`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/mq_getattr.html) -+pub fn mq_getattr(mqd: mqd_t) -> Result<MqAttr> { -+ let mut attr = unsafe { mem::uninitialized::<libc::mq_attr>() }; -+ let res = unsafe { libc::mq_getattr(mqd, &mut attr) }; -+ Errno::result(res).map(|_| MqAttr { mq_attr: attr }) -+} -+ -+/// Set the attributes of the message queue. Only `O_NONBLOCK` can be set, everything else will be ignored -+/// Returns the old attributes -+/// It is recommend to use the `mq_set_nonblock()` and `mq_remove_nonblock()` convenience functions as they are easier to use -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/mq_setattr.html) -+pub fn mq_setattr(mqd: mqd_t, newattr: &MqAttr) -> Result<MqAttr> { -+ let mut attr = unsafe { mem::uninitialized::<libc::mq_attr>() }; -+ let res = unsafe { libc::mq_setattr(mqd, &newattr.mq_attr as *const libc::mq_attr, &mut attr) }; -+ Errno::result(res).map(|_| MqAttr { mq_attr: attr }) -+} -+ -+/// Convenience function. -+/// Sets the `O_NONBLOCK` attribute for a given message queue descriptor -+/// Returns the old attributes -+pub fn mq_set_nonblock(mqd: mqd_t) -> Result<(MqAttr)> { -+ let oldattr = mq_getattr(mqd)?; -+ let newattr = MqAttr::new(MQ_OFlag::O_NONBLOCK.bits() as c_long, -+ oldattr.mq_attr.mq_maxmsg, -+ oldattr.mq_attr.mq_msgsize, -+ oldattr.mq_attr.mq_curmsgs); -+ mq_setattr(mqd, &newattr) -+} -+ -+/// Convenience function. -+/// Removes `O_NONBLOCK` attribute for a given message queue descriptor -+/// Returns the old attributes -+pub fn mq_remove_nonblock(mqd: mqd_t) -> Result<(MqAttr)> { -+ let oldattr = mq_getattr(mqd)?; -+ let newattr = MqAttr::new(0, -+ oldattr.mq_attr.mq_maxmsg, -+ oldattr.mq_attr.mq_msgsize, -+ oldattr.mq_attr.mq_curmsgs); -+ mq_setattr(mqd, &newattr) -+} -diff --git a/third_party/rust/nix-0.15.0/src/net/if_.rs b/third_party/rust/nix-0.15.0/src/net/if_.rs -new file mode 100644 -index 0000000000000..58d677ae343d1 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/net/if_.rs -@@ -0,0 +1,268 @@ -+//! Network interface name resolution. -+//! -+//! Uses Linux and/or POSIX functions to resolve interface names like "eth0" -+//! or "socan1" into device numbers. -+ -+use libc; -+use libc::c_uint; -+use {Result, Error, NixPath}; -+ -+/// Resolve an interface into a interface number. -+pub fn if_nametoindex<P: ?Sized + NixPath>(name: &P) -> Result<c_uint> { -+ let if_index = name.with_nix_path(|name| unsafe { libc::if_nametoindex(name.as_ptr()) })?; -+ -+ if if_index == 0 { -+ Err(Error::last()) -+ } else { -+ Ok(if_index) -+ } -+} -+ -+libc_bitflags!( -+ /// Standard interface flags, used by `getifaddrs` -+ pub struct InterfaceFlags: libc::c_int { -+ /// Interface is running. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ IFF_UP; -+ /// Valid broadcast address set. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ IFF_BROADCAST; -+ /// Internal debugging flag. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ IFF_DEBUG; -+ /// Interface is a loopback interface. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ IFF_LOOPBACK; -+ /// Interface is a point-to-point link. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ IFF_POINTOPOINT; -+ /// Avoid use of trailers. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ #[cfg(any(target_os = "android", -+ target_os = "fuchsia", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "solaris"))] -+ IFF_NOTRAILERS; -+ /// Interface manages own routes. -+ #[cfg(any(target_os = "dragonfly"))] -+ IFF_SMART; -+ /// Resources allocated. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ #[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "fuchsia", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+ target_os = "solaris"))] -+ IFF_RUNNING; -+ /// No arp protocol, L2 destination address not set. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ IFF_NOARP; -+ /// Interface is in promiscuous mode. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ IFF_PROMISC; -+ /// Receive all multicast packets. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ IFF_ALLMULTI; -+ /// Master of a load balancing bundle. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ #[cfg(any(target_os = "android", target_os = "fuchsia", target_os = "linux"))] -+ IFF_MASTER; -+ /// transmission in progress, tx hardware queue is full -+ #[cfg(any(target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+ target_os = "ios"))] -+ IFF_OACTIVE; -+ /// Protocol code on board. -+ #[cfg(target_os = "solaris")] -+ IFF_INTELLIGENT; -+ /// Slave of a load balancing bundle. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ #[cfg(any(target_os = "android", target_os = "fuchsia", target_os = "linux"))] -+ IFF_SLAVE; -+ /// Can't hear own transmissions. -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+ target_os = "osx"))] -+ IFF_SIMPLEX; -+ /// Supports multicast. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ IFF_MULTICAST; -+ /// Per link layer defined bit. -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+ target_os = "ios"))] -+ IFF_LINK0; -+ /// Multicast using broadcast. -+ #[cfg(any(target_os = "solaris"))] -+ IFF_MULTI_BCAST; -+ /// Is able to select media type via ifmap. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ #[cfg(any(target_os = "android", target_os = "fuchsia", target_os = "linux"))] -+ IFF_PORTSEL; -+ /// Per link layer defined bit. -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+ target_os = "ios"))] -+ IFF_LINK1; -+ /// Non-unique address. -+ #[cfg(any(target_os = "solaris"))] -+ IFF_UNNUMBERED; -+ /// Auto media selection active. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ #[cfg(any(target_os = "android", target_os = "fuchsia", target_os = "linux"))] -+ IFF_AUTOMEDIA; -+ /// Per link layer defined bit. -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+ target_os = "ios"))] -+ IFF_LINK2; -+ /// Use alternate physical connection. -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "ios"))] -+ IFF_ALTPHYS; -+ /// DHCP controlls interface. -+ #[cfg(any(target_os = "solaris"))] -+ IFF_DHCPRUNNING; -+ /// The addresses are lost when the interface goes down. (see -+ /// [`netdevice(7)`](http://man7.org/linux/man-pages/man7/netdevice.7.html)) -+ #[cfg(any(target_os = "android", target_os = "fuchsia", target_os = "linux"))] -+ IFF_DYNAMIC; -+ /// Do not advertise. -+ #[cfg(any(target_os = "solaris"))] -+ IFF_PRIVATE; -+ /// Driver signals L1 up. Volatile. -+ #[cfg(any(target_os = "fuchsia", target_os = "linux"))] -+ IFF_LOWER_UP; -+ /// Interface is in polling mode. -+ #[cfg(any(target_os = "dragonfly"))] -+ IFF_POLLING_COMPAT; -+ /// Unconfigurable using ioctl(2). -+ #[cfg(any(target_os = "freebsd"))] -+ IFF_CANTCONFIG; -+ /// Do not transmit packets. -+ #[cfg(any(target_os = "solaris"))] -+ IFF_NOXMIT; -+ /// Driver signals dormant. Volatile. -+ #[cfg(any(target_os = "fuchsia", target_os = "linux"))] -+ IFF_DORMANT; -+ /// User-requested promisc mode. -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] -+ IFF_PPROMISC; -+ /// Just on-link subnet. -+ #[cfg(any(target_os = "solaris"))] -+ IFF_NOLOCAL; -+ /// Echo sent packets. Volatile. -+ #[cfg(any(target_os = "fuchsia", target_os = "linux"))] -+ IFF_ECHO; -+ /// User-requested monitor mode. -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] -+ IFF_MONITOR; -+ /// Address is deprecated. -+ #[cfg(any(target_os = "solaris"))] -+ IFF_DEPRECATED; -+ /// Static ARP. -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] -+ IFF_STATICARP; -+ /// Address from stateless addrconf. -+ #[cfg(any(target_os = "solaris"))] -+ IFF_ADDRCONF; -+ /// Interface is in polling mode. -+ #[cfg(any(target_os = "dragonfly"))] -+ IFF_NPOLLING; -+ /// Router on interface. -+ #[cfg(any(target_os = "solaris"))] -+ IFF_ROUTER; -+ /// Interface is in polling mode. -+ #[cfg(any(target_os = "dragonfly"))] -+ IFF_IDIRECT; -+ /// Interface is winding down -+ #[cfg(any(target_os = "freebsd"))] -+ IFF_DYING; -+ /// No NUD on interface. -+ #[cfg(any(target_os = "solaris"))] -+ IFF_NONUD; -+ /// Interface is being renamed -+ #[cfg(any(target_os = "freebsd"))] -+ IFF_RENAMING; -+ /// Anycast address. -+ #[cfg(any(target_os = "solaris"))] -+ IFF_ANYCAST; -+ /// Don't exchange routing info. -+ #[cfg(any(target_os = "solaris"))] -+ IFF_NORTEXCH; -+ /// Do not provide packet information -+ #[cfg(any(target_os = "android", target_os = "fuchsia", target_os = "linux"))] -+ IFF_NO_PI as libc::c_int; -+ /// TUN device (no Ethernet headers) -+ #[cfg(any(target_os = "android", target_os = "fuchsia", target_os = "linux"))] -+ IFF_TUN as libc::c_int; -+ /// TAP device -+ #[cfg(any(target_os = "android", target_os = "fuchsia", target_os = "linux"))] -+ IFF_TAP as libc::c_int; -+ /// IPv4 interface. -+ #[cfg(any(target_os = "solaris"))] -+ IFF_IPV4; -+ /// IPv6 interface. -+ #[cfg(any(target_os = "solaris"))] -+ IFF_IPV6; -+ /// in.mpathd test address -+ #[cfg(any(target_os = "solaris"))] -+ IFF_NOFAILOVER; -+ /// Interface has failed -+ #[cfg(any(target_os = "solaris"))] -+ IFF_FAILED; -+ /// Interface is a hot-spare -+ #[cfg(any(target_os = "solaris"))] -+ IFF_STANDBY; -+ /// Functioning but not used -+ #[cfg(any(target_os = "solaris"))] -+ IFF_INACTIVE; -+ /// Interface is offline -+ #[cfg(any(target_os = "solaris"))] -+ IFF_OFFLINE; -+ #[cfg(any(target_os = "solaris"))] -+ IFF_COS_ENABLED; -+ /// Prefer as source addr. -+ #[cfg(any(target_os = "solaris"))] -+ IFF_PREFERRED; -+ /// RFC3041 -+ #[cfg(any(target_os = "solaris"))] -+ IFF_TEMPORARY; -+ /// MTU set with SIOCSLIFMTU -+ #[cfg(any(target_os = "solaris"))] -+ IFF_FIXEDMTU; -+ /// Cannot send / receive packets -+ #[cfg(any(target_os = "solaris"))] -+ IFF_VIRTUAL; -+ /// Local address in use -+ #[cfg(any(target_os = "solaris"))] -+ IFF_DUPLICATE; -+ /// IPMP IP interface -+ #[cfg(any(target_os = "solaris"))] -+ IFF_IPMP; -+ } -+); -diff --git a/third_party/rust/nix-0.15.0/src/net/mod.rs b/third_party/rust/nix-0.15.0/src/net/mod.rs -new file mode 100644 -index 0000000000000..079fcfde6fd44 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/net/mod.rs -@@ -0,0 +1,4 @@ -+//! Functionality involving network interfaces -+// To avoid clashing with the keyword "if", we use "if_" as the module name. -+// The original header is called "net/if.h". -+pub mod if_; -diff --git a/third_party/rust/nix-0.15.0/src/poll.rs b/third_party/rust/nix-0.15.0/src/poll.rs -new file mode 100644 -index 0000000000000..c603611e3176f ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/poll.rs -@@ -0,0 +1,143 @@ -+//! Wait for events to trigger on specific file descriptors -+#[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", target_os = "linux"))] -+use sys::time::TimeSpec; -+#[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", target_os = "linux"))] -+use sys::signal::SigSet; -+use std::os::unix::io::RawFd; -+ -+use libc; -+use Result; -+use errno::Errno; -+ -+/// This is a wrapper around `libc::pollfd`. -+/// -+/// It's meant to be used as an argument to the [`poll`](fn.poll.html) and -+/// [`ppoll`](fn.ppoll.html) functions to specify the events of interest -+/// for a specific file descriptor. -+/// -+/// After a call to `poll` or `ppoll`, the events that occured can be -+/// retrieved by calling [`revents()`](#method.revents) on the `PollFd`. -+#[repr(C)] -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct PollFd { -+ pollfd: libc::pollfd, -+} -+ -+impl PollFd { -+ /// Creates a new `PollFd` specifying the events of interest -+ /// for a given file descriptor. -+ pub fn new(fd: RawFd, events: PollFlags) -> PollFd { -+ PollFd { -+ pollfd: libc::pollfd { -+ fd: fd, -+ events: events.bits(), -+ revents: PollFlags::empty().bits(), -+ }, -+ } -+ } -+ -+ /// Returns the events that occured in the last call to `poll` or `ppoll`. -+ pub fn revents(&self) -> Option<PollFlags> { -+ PollFlags::from_bits(self.pollfd.revents) -+ } -+} -+ -+libc_bitflags! { -+ /// These flags define the different events that can be monitored by `poll` and `ppoll` -+ pub struct PollFlags: libc::c_short { -+ /// There is data to read. -+ POLLIN; -+ /// There is some exceptional condition on the file descriptor. -+ /// -+ /// Possibilities include: -+ /// -+ /// * There is out-of-band data on a TCP socket (see -+ /// [tcp(7)](http://man7.org/linux/man-pages/man7/tcp.7.html)). -+ /// * A pseudoterminal master in packet mode has seen a state -+ /// change on the slave (see -+ /// [ioctl_tty(2)](http://man7.org/linux/man-pages/man2/ioctl_tty.2.html)). -+ /// * A cgroup.events file has been modified (see -+ /// [cgroups(7)](http://man7.org/linux/man-pages/man7/cgroups.7.html)). -+ POLLPRI; -+ /// Writing is now possible, though a write larger that the -+ /// available space in a socket or pipe will still block (unless -+ /// `O_NONBLOCK` is set). -+ POLLOUT; -+ /// Equivalent to [`POLLIN`](constant.POLLIN.html) -+ POLLRDNORM; -+ /// Equivalent to [`POLLOUT`](constant.POLLOUT.html) -+ POLLWRNORM; -+ /// Priority band data can be read (generally unused on Linux). -+ POLLRDBAND; -+ /// Priority data may be written. -+ POLLWRBAND; -+ /// Error condition (only returned in -+ /// [`PollFd::revents`](struct.PollFd.html#method.revents); -+ /// ignored in [`PollFd::new`](struct.PollFd.html#method.new)). -+ /// This bit is also set for a file descriptor referring to the -+ /// write end of a pipe when the read end has been closed. -+ POLLERR; -+ /// Hang up (only returned in [`PollFd::revents`](struct.PollFd.html#method.revents); -+ /// ignored in [`PollFd::new`](struct.PollFd.html#method.new)). -+ /// Note that when reading from a channel such as a pipe or a stream -+ /// socket, this event merely indicates that the peer closed its -+ /// end of the channel. Subsequent reads from the channel will -+ /// return 0 (end of file) only after all outstanding data in the -+ /// channel has been consumed. -+ POLLHUP; -+ /// Invalid request: `fd` not open (only returned in -+ /// [`PollFd::revents`](struct.PollFd.html#method.revents); -+ /// ignored in [`PollFd::new`](struct.PollFd.html#method.new)). -+ POLLNVAL; -+ } -+} -+ -+/// `poll` waits for one of a set of file descriptors to become ready to perform I/O. -+/// ([`poll(2)`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/poll.html)) -+/// -+/// `fds` contains all [`PollFd`](struct.PollFd.html) to poll. -+/// The function will return as soon as any event occur for any of these `PollFd`s. -+/// -+/// The `timeout` argument specifies the number of milliseconds that `poll()` -+/// should block waiting for a file descriptor to become ready. The call -+/// will block until either: -+/// -+/// * a file descriptor becomes ready; -+/// * the call is interrupted by a signal handler; or -+/// * the timeout expires. -+/// -+/// Note that the timeout interval will be rounded up to the system clock -+/// granularity, and kernel scheduling delays mean that the blocking -+/// interval may overrun by a small amount. Specifying a negative value -+/// in timeout means an infinite timeout. Specifying a timeout of zero -+/// causes `poll()` to return immediately, even if no file descriptors are -+/// ready. -+pub fn poll(fds: &mut [PollFd], timeout: libc::c_int) -> Result<libc::c_int> { -+ let res = unsafe { -+ libc::poll(fds.as_mut_ptr() as *mut libc::pollfd, -+ fds.len() as libc::nfds_t, -+ timeout) -+ }; -+ -+ Errno::result(res) -+} -+ -+/// `ppoll()` allows an application to safely wait until either a file -+/// descriptor becomes ready or until a signal is caught. -+/// ([`poll(2)`](http://man7.org/linux/man-pages/man2/poll.2.html)) -+/// -+/// `ppoll` behaves like `poll`, but let you specify what signals may interrupt it -+/// with the `sigmask` argument. -+/// -+#[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", target_os = "linux"))] -+pub fn ppoll(fds: &mut [PollFd], timeout: TimeSpec, sigmask: SigSet) -> Result<libc::c_int> { -+ -+ -+ let res = unsafe { -+ libc::ppoll(fds.as_mut_ptr() as *mut libc::pollfd, -+ fds.len() as libc::nfds_t, -+ timeout.as_ref(), -+ sigmask.as_ref()) -+ }; -+ Errno::result(res) -+} -diff --git a/third_party/rust/nix-0.15.0/src/pty.rs b/third_party/rust/nix-0.15.0/src/pty.rs -new file mode 100644 -index 0000000000000..db012d8158c53 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/pty.rs -@@ -0,0 +1,326 @@ -+//! Create master and slave virtual pseudo-terminals (PTYs) -+ -+use libc; -+ -+pub use libc::pid_t as SessionId; -+pub use libc::winsize as Winsize; -+ -+use std::ffi::CStr; -+use std::mem; -+use std::os::unix::prelude::*; -+ -+use sys::termios::Termios; -+use unistd::ForkResult; -+use {Result, Error, fcntl}; -+use errno::Errno; -+ -+/// Representation of a master/slave pty pair -+/// -+/// This is returned by `openpty`. Note that this type does *not* implement `Drop`, so the user -+/// must manually close the file descriptors. -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct OpenptyResult { -+ /// The master port in a virtual pty pair -+ pub master: RawFd, -+ /// The slave port in a virtual pty pair -+ pub slave: RawFd, -+} -+ -+/// Representation of a master with a forked pty -+/// -+/// This is returned by `forkpty`. Note that this type does *not* implement `Drop`, so the user -+/// must manually close the file descriptors. -+#[derive(Clone, Copy, Debug)] -+pub struct ForkptyResult { -+ /// The master port in a virtual pty pair -+ pub master: RawFd, -+ /// Metadata about forked process -+ pub fork_result: ForkResult, -+} -+ -+ -+/// Representation of the Master device in a master/slave pty pair -+/// -+/// While this datatype is a thin wrapper around `RawFd`, it enforces that the available PTY -+/// functions are given the correct file descriptor. Additionally this type implements `Drop`, -+/// so that when it's consumed or goes out of scope, it's automatically cleaned-up. -+#[derive(Clone, Debug, Eq, Hash, PartialEq)] -+pub struct PtyMaster(RawFd); -+ -+impl AsRawFd for PtyMaster { -+ fn as_raw_fd(&self) -> RawFd { -+ self.0 -+ } -+} -+ -+impl IntoRawFd for PtyMaster { -+ fn into_raw_fd(self) -> RawFd { -+ let fd = self.0; -+ mem::forget(self); -+ fd -+ } -+} -+ -+impl Drop for PtyMaster { -+ fn drop(&mut self) { -+ // On drop, we ignore errors like EINTR and EIO because there's no clear -+ // way to handle them, we can't return anything, and (on FreeBSD at -+ // least) the file descriptor is deallocated in these cases. However, -+ // we must panic on EBADF, because it is always an error to close an -+ // invalid file descriptor. That frequently indicates a double-close -+ // condition, which can cause confusing errors for future I/O -+ // operations. -+ let e = ::unistd::close(self.0); -+ if e == Err(Error::Sys(Errno::EBADF)) { -+ panic!("Closing an invalid file descriptor!"); -+ }; -+ } -+} -+ -+/// Grant access to a slave pseudoterminal (see -+/// [`grantpt(3)`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/grantpt.html)) -+/// -+/// `grantpt()` changes the mode and owner of the slave pseudoterminal device corresponding to the -+/// master pseudoterminal referred to by `fd`. This is a necessary step towards opening the slave. -+#[inline] -+pub fn grantpt(fd: &PtyMaster) -> Result<()> { -+ if unsafe { libc::grantpt(fd.as_raw_fd()) } < 0 { -+ return Err(Error::last()); -+ } -+ -+ Ok(()) -+} -+ -+/// Open a pseudoterminal device (see -+/// [`posix_openpt(3)`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/posix_openpt.html)) -+/// -+/// `posix_openpt()` returns a file descriptor to an existing unused pseuterminal master device. -+/// -+/// # Examples -+/// -+/// A common use case with this function is to open both a master and slave PTY pair. This can be -+/// done as follows: -+/// -+/// ``` -+/// use std::path::Path; -+/// use nix::fcntl::{OFlag, open}; -+/// use nix::pty::{grantpt, posix_openpt, ptsname, unlockpt}; -+/// use nix::sys::stat::Mode; -+/// -+/// # #[allow(dead_code)] -+/// # fn run() -> nix::Result<()> { -+/// // Open a new PTY master -+/// let master_fd = posix_openpt(OFlag::O_RDWR)?; -+/// -+/// // Allow a slave to be generated for it -+/// grantpt(&master_fd)?; -+/// unlockpt(&master_fd)?; -+/// -+/// // Get the name of the slave -+/// let slave_name = unsafe { ptsname(&master_fd) }?; -+/// -+/// // Try to open the slave -+/// let _slave_fd = open(Path::new(&slave_name), OFlag::O_RDWR, Mode::empty())?; -+/// # Ok(()) -+/// # } -+/// ``` -+#[inline] -+pub fn posix_openpt(flags: fcntl::OFlag) -> Result<PtyMaster> { -+ let fd = unsafe { -+ libc::posix_openpt(flags.bits()) -+ }; -+ -+ if fd < 0 { -+ return Err(Error::last()); -+ } -+ -+ Ok(PtyMaster(fd)) -+} -+ -+/// Get the name of the slave pseudoterminal (see -+/// [`ptsname(3)`](http://man7.org/linux/man-pages/man3/ptsname.3.html)) -+/// -+/// `ptsname()` returns the name of the slave pseudoterminal device corresponding to the master -+/// referred to by `fd`. -+/// -+/// This value is useful for opening the slave pty once the master has already been opened with -+/// `posix_openpt()`. -+/// -+/// # Safety -+/// -+/// `ptsname()` mutates global variables and is *not* threadsafe. -+/// Mutating global variables is always considered `unsafe` by Rust and this -+/// function is marked as `unsafe` to reflect that. -+/// -+/// For a threadsafe and non-`unsafe` alternative on Linux, see `ptsname_r()`. -+#[inline] -+pub unsafe fn ptsname(fd: &PtyMaster) -> Result<String> { -+ let name_ptr = libc::ptsname(fd.as_raw_fd()); -+ if name_ptr.is_null() { -+ return Err(Error::last()); -+ } -+ -+ let name = CStr::from_ptr(name_ptr); -+ Ok(name.to_string_lossy().into_owned()) -+} -+ -+/// Get the name of the slave pseudoterminal (see -+/// [`ptsname(3)`](http://man7.org/linux/man-pages/man3/ptsname.3.html)) -+/// -+/// `ptsname_r()` returns the name of the slave pseudoterminal device corresponding to the master -+/// referred to by `fd`. This is the threadsafe version of `ptsname()`, but it is not part of the -+/// POSIX standard and is instead a Linux-specific extension. -+/// -+/// This value is useful for opening the slave ptty once the master has already been opened with -+/// `posix_openpt()`. -+#[cfg(any(target_os = "android", target_os = "linux"))] -+#[inline] -+pub fn ptsname_r(fd: &PtyMaster) -> Result<String> { -+ let mut name_buf = vec![0u8; 64]; -+ let name_buf_ptr = name_buf.as_mut_ptr() as *mut libc::c_char; -+ if unsafe { libc::ptsname_r(fd.as_raw_fd(), name_buf_ptr, name_buf.capacity()) } != 0 { -+ return Err(Error::last()); -+ } -+ -+ // Find the first null-character terminating this string. This is guaranteed to succeed if the -+ // return value of `libc::ptsname_r` is 0. -+ let null_index = name_buf.iter().position(|c| *c == b'\0').unwrap(); -+ name_buf.truncate(null_index); -+ -+ let name = String::from_utf8(name_buf)?; -+ Ok(name) -+} -+ -+/// Unlock a pseudoterminal master/slave pseudoterminal pair (see -+/// [`unlockpt(3)`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/unlockpt.html)) -+/// -+/// `unlockpt()` unlocks the slave pseudoterminal device corresponding to the master pseudoterminal -+/// referred to by `fd`. This must be called before trying to open the slave side of a -+/// pseuoterminal. -+#[inline] -+pub fn unlockpt(fd: &PtyMaster) -> Result<()> { -+ if unsafe { libc::unlockpt(fd.as_raw_fd()) } < 0 { -+ return Err(Error::last()); -+ } -+ -+ Ok(()) -+} -+ -+ -+/// Create a new pseudoterminal, returning the slave and master file descriptors -+/// in `OpenptyResult` -+/// (see [`openpty`](http://man7.org/linux/man-pages/man3/openpty.3.html)). -+/// -+/// If `winsize` is not `None`, the window size of the slave will be set to -+/// the values in `winsize`. If `termios` is not `None`, the pseudoterminal's -+/// terminal settings of the slave will be set to the values in `termios`. -+#[inline] -+pub fn openpty<'a, 'b, T: Into<Option<&'a Winsize>>, U: Into<Option<&'b Termios>>>(winsize: T, termios: U) -> Result<OpenptyResult> { -+ use std::ptr; -+ -+ let mut slave: libc::c_int = unsafe { mem::uninitialized() }; -+ let mut master: libc::c_int = unsafe { mem::uninitialized() }; -+ let ret = { -+ match (termios.into(), winsize.into()) { -+ (Some(termios), Some(winsize)) => { -+ let inner_termios = termios.get_libc_termios(); -+ unsafe { -+ libc::openpty( -+ &mut master, -+ &mut slave, -+ ptr::null_mut(), -+ &*inner_termios as *const libc::termios as *mut _, -+ winsize as *const Winsize as *mut _, -+ ) -+ } -+ } -+ (None, Some(winsize)) => { -+ unsafe { -+ libc::openpty( -+ &mut master, -+ &mut slave, -+ ptr::null_mut(), -+ ptr::null_mut(), -+ winsize as *const Winsize as *mut _, -+ ) -+ } -+ } -+ (Some(termios), None) => { -+ let inner_termios = termios.get_libc_termios(); -+ unsafe { -+ libc::openpty( -+ &mut master, -+ &mut slave, -+ ptr::null_mut(), -+ &*inner_termios as *const libc::termios as *mut _, -+ ptr::null_mut(), -+ ) -+ } -+ } -+ (None, None) => { -+ unsafe { -+ libc::openpty( -+ &mut master, -+ &mut slave, -+ ptr::null_mut(), -+ ptr::null_mut(), -+ ptr::null_mut(), -+ ) -+ } -+ } -+ } -+ }; -+ -+ Errno::result(ret)?; -+ -+ Ok(OpenptyResult { -+ master: master, -+ slave: slave, -+ }) -+} -+ -+/// Create a new pseudoterminal, returning the master file descriptor and forked pid. -+/// in `ForkptyResult` -+/// (see [`forkpty`](http://man7.org/linux/man-pages/man3/forkpty.3.html)). -+/// -+/// If `winsize` is not `None`, the window size of the slave will be set to -+/// the values in `winsize`. If `termios` is not `None`, the pseudoterminal's -+/// terminal settings of the slave will be set to the values in `termios`. -+pub fn forkpty<'a, 'b, T: Into<Option<&'a Winsize>>, U: Into<Option<&'b Termios>>>( -+ winsize: T, -+ termios: U, -+) -> Result<ForkptyResult> { -+ use std::ptr; -+ use unistd::Pid; -+ use unistd::ForkResult::*; -+ -+ let mut master: libc::c_int = unsafe { mem::uninitialized() }; -+ -+ let term = match termios.into() { -+ Some(termios) => { -+ let inner_termios = termios.get_libc_termios(); -+ &*inner_termios as *const libc::termios as *mut _ -+ }, -+ None => ptr::null_mut(), -+ }; -+ -+ let win = winsize -+ .into() -+ .map(|ws| ws as *const Winsize as *mut _) -+ .unwrap_or(ptr::null_mut()); -+ -+ let res = unsafe { -+ libc::forkpty(&mut master, ptr::null_mut(), term, win) -+ }; -+ -+ let fork_result = Errno::result(res).map(|res| match res { -+ 0 => Child, -+ res => Parent { child: Pid::from_raw(res) }, -+ })?; -+ -+ Ok(ForkptyResult { -+ master: master, -+ fork_result: fork_result, -+ }) -+} -+ -diff --git a/third_party/rust/nix-0.15.0/src/sched.rs b/third_party/rust/nix-0.15.0/src/sched.rs -new file mode 100644 -index 0000000000000..67188c57eef7d ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sched.rs -@@ -0,0 +1,147 @@ -+use libc; -+use {Errno, Result}; -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+pub use self::sched_linux_like::*; -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+mod sched_linux_like { -+ use errno::Errno; -+ use libc::{self, c_int, c_void}; -+ use std::mem; -+ use std::option::Option; -+ use std::os::unix::io::RawFd; -+ use unistd::Pid; -+ use {Error, Result}; -+ -+ // For some functions taking with a parameter of type CloneFlags, -+ // only a subset of these flags have an effect. -+ libc_bitflags! { -+ pub struct CloneFlags: c_int { -+ CLONE_VM; -+ CLONE_FS; -+ CLONE_FILES; -+ CLONE_SIGHAND; -+ CLONE_PTRACE; -+ CLONE_VFORK; -+ CLONE_PARENT; -+ CLONE_THREAD; -+ CLONE_NEWNS; -+ CLONE_SYSVSEM; -+ CLONE_SETTLS; -+ CLONE_PARENT_SETTID; -+ CLONE_CHILD_CLEARTID; -+ CLONE_DETACHED; -+ CLONE_UNTRACED; -+ CLONE_CHILD_SETTID; -+ CLONE_NEWCGROUP; -+ CLONE_NEWUTS; -+ CLONE_NEWIPC; -+ CLONE_NEWUSER; -+ CLONE_NEWPID; -+ CLONE_NEWNET; -+ CLONE_IO; -+ } -+ } -+ -+ pub type CloneCb<'a> = Box<dyn FnMut() -> isize + 'a>; -+ -+ #[repr(C)] -+ #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+ pub struct CpuSet { -+ cpu_set: libc::cpu_set_t, -+ } -+ -+ impl CpuSet { -+ pub fn new() -> CpuSet { -+ CpuSet { -+ cpu_set: unsafe { mem::zeroed() }, -+ } -+ } -+ -+ pub fn is_set(&self, field: usize) -> Result<bool> { -+ if field >= 8 * mem::size_of::<libc::cpu_set_t>() { -+ Err(Error::Sys(Errno::EINVAL)) -+ } else { -+ Ok(unsafe { libc::CPU_ISSET(field, &self.cpu_set) }) -+ } -+ } -+ -+ pub fn set(&mut self, field: usize) -> Result<()> { -+ if field >= 8 * mem::size_of::<libc::cpu_set_t>() { -+ Err(Error::Sys(Errno::EINVAL)) -+ } else { -+ Ok(unsafe { libc::CPU_SET(field, &mut self.cpu_set) }) -+ } -+ } -+ -+ pub fn unset(&mut self, field: usize) -> Result<()> { -+ if field >= 8 * mem::size_of::<libc::cpu_set_t>() { -+ Err(Error::Sys(Errno::EINVAL)) -+ } else { -+ Ok(unsafe { libc::CPU_CLR(field, &mut self.cpu_set) }) -+ } -+ } -+ } -+ -+ pub fn sched_setaffinity(pid: Pid, cpuset: &CpuSet) -> Result<()> { -+ let res = unsafe { -+ libc::sched_setaffinity( -+ pid.into(), -+ mem::size_of::<CpuSet>() as libc::size_t, -+ &cpuset.cpu_set, -+ ) -+ }; -+ -+ Errno::result(res).map(drop) -+ } -+ -+ pub fn clone( -+ mut cb: CloneCb, -+ stack: &mut [u8], -+ flags: CloneFlags, -+ signal: Option<c_int>, -+ ) -> Result<Pid> { -+ extern "C" fn callback(data: *mut CloneCb) -> c_int { -+ let cb: &mut CloneCb = unsafe { &mut *data }; -+ (*cb)() as c_int -+ } -+ -+ let res = unsafe { -+ let combined = flags.bits() | signal.unwrap_or(0); -+ let ptr = stack.as_mut_ptr().offset(stack.len() as isize); -+ let ptr_aligned = ptr.offset((ptr as usize % 16) as isize * -1); -+ libc::clone( -+ mem::transmute( -+ callback as extern "C" fn(*mut Box<dyn FnMut() -> isize>) -> i32, -+ ), -+ ptr_aligned as *mut c_void, -+ combined, -+ &mut cb as *mut _ as *mut c_void, -+ ) -+ }; -+ -+ Errno::result(res).map(Pid::from_raw) -+ } -+ -+ pub fn unshare(flags: CloneFlags) -> Result<()> { -+ let res = unsafe { libc::unshare(flags.bits()) }; -+ -+ Errno::result(res).map(drop) -+ } -+ -+ pub fn setns(fd: RawFd, nstype: CloneFlags) -> Result<()> { -+ let res = unsafe { libc::setns(fd, nstype.bits()) }; -+ -+ Errno::result(res).map(drop) -+ } -+} -+ -+/// Explicitly yield the processor to other threads. -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/sched_yield.html) -+pub fn sched_yield() -> Result<()> { -+ let res = unsafe { libc::sched_yield() }; -+ -+ Errno::result(res).map(drop) -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/aio.rs b/third_party/rust/nix-0.15.0/src/sys/aio.rs -new file mode 100644 -index 0000000000000..9258a0657cc8a ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/aio.rs -@@ -0,0 +1,1280 @@ -+// vim: tw=80 -+//! POSIX Asynchronous I/O -+//! -+//! The POSIX AIO interface is used for asynchronous I/O on files and disk-like -+//! devices. It supports [`read`](struct.AioCb.html#method.read), -+//! [`write`](struct.AioCb.html#method.write), and -+//! [`fsync`](struct.AioCb.html#method.fsync) operations. Completion -+//! notifications can optionally be delivered via -+//! [signals](../signal/enum.SigevNotify.html#variant.SigevSignal), via the -+//! [`aio_suspend`](fn.aio_suspend.html) function, or via polling. Some -+//! platforms support other completion -+//! notifications, such as -+//! [kevent](../signal/enum.SigevNotify.html#variant.SigevKevent). -+//! -+//! Multiple operations may be submitted in a batch with -+//! [`lio_listio`](fn.lio_listio.html), though the standard does not guarantee -+//! that they will be executed atomically. -+//! -+//! Outstanding operations may be cancelled with -+//! [`cancel`](struct.AioCb.html#method.cancel) or -+//! [`aio_cancel_all`](fn.aio_cancel_all.html), though the operating system may -+//! not support this for all filesystems and devices. -+ -+use {Error, Result}; -+use errno::Errno; -+use std::os::unix::io::RawFd; -+use libc::{c_void, off_t, size_t}; -+use libc; -+use std::borrow::{Borrow, BorrowMut}; -+use std::fmt; -+use std::fmt::Debug; -+use std::marker::PhantomData; -+use std::mem; -+use std::ptr::{null, null_mut}; -+use sys::signal::*; -+use std::thread; -+use sys::time::TimeSpec; -+ -+libc_enum! { -+ /// Mode for `AioCb::fsync`. Controls whether only data or both data and -+ /// metadata are synced. -+ #[repr(i32)] -+ pub enum AioFsyncMode { -+ /// do it like `fsync` -+ O_SYNC, -+ /// on supported operating systems only, do it like `fdatasync` -+ #[cfg(any(target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ O_DSYNC -+ } -+} -+ -+libc_enum! { -+ /// When used with [`lio_listio`](fn.lio_listio.html), determines whether a -+ /// given `aiocb` should be used for a read operation, a write operation, or -+ /// ignored. Has no effect for any other aio functions. -+ #[repr(i32)] -+ pub enum LioOpcode { -+ LIO_NOP, -+ LIO_WRITE, -+ LIO_READ, -+ } -+} -+ -+libc_enum! { -+ /// Mode for [`lio_listio`](fn.lio_listio.html) -+ #[repr(i32)] -+ pub enum LioMode { -+ /// Requests that [`lio_listio`](fn.lio_listio.html) block until all -+ /// requested operations have been completed -+ LIO_WAIT, -+ /// Requests that [`lio_listio`](fn.lio_listio.html) return immediately -+ LIO_NOWAIT, -+ } -+} -+ -+/// Return values for [`AioCb::cancel`](struct.AioCb.html#method.cancel) and -+/// [`aio_cancel_all`](fn.aio_cancel_all.html) -+#[repr(i32)] -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub enum AioCancelStat { -+ /// All outstanding requests were canceled -+ AioCanceled = libc::AIO_CANCELED, -+ /// Some requests were not canceled. Their status should be checked with -+ /// `AioCb::error` -+ AioNotCanceled = libc::AIO_NOTCANCELED, -+ /// All of the requests have already finished -+ AioAllDone = libc::AIO_ALLDONE, -+} -+ -+/// Owns (uniquely or shared) a memory buffer to keep it from `Drop`ing while -+/// the kernel has a pointer to it. -+pub enum Buffer<'a> { -+ /// No buffer to own. -+ /// -+ /// Used for operations like `aio_fsync` that have no data, or for unsafe -+ /// operations that work with raw pointers. -+ None, -+ /// Keeps a reference to a slice -+ Phantom(PhantomData<&'a mut [u8]>), -+ /// Generic thing that keeps a buffer from dropping -+ BoxedSlice(Box<dyn Borrow<[u8]>>), -+ /// Generic thing that keeps a mutable buffer from dropping -+ BoxedMutSlice(Box<dyn BorrowMut<[u8]>>), -+} -+ -+impl<'a> Debug for Buffer<'a> { -+ // Note: someday it may be possible to Derive Debug for a trait object, but -+ // not today. -+ // https://github.com/rust-lang/rust/issues/1563 -+ fn fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result { -+ match *self { -+ Buffer::None => write!(fmt, "None"), -+ Buffer::Phantom(p) => p.fmt(fmt), -+ Buffer::BoxedSlice(ref bs) => { -+ let borrowed : &dyn Borrow<[u8]> = bs.borrow(); -+ write!(fmt, "BoxedSlice({:?})", -+ borrowed as *const dyn Borrow<[u8]>) -+ }, -+ Buffer::BoxedMutSlice(ref bms) => { -+ let borrowed : &dyn BorrowMut<[u8]> = bms.borrow(); -+ write!(fmt, "BoxedMutSlice({:?})", -+ borrowed as *const dyn BorrowMut<[u8]>) -+ } -+ } -+ } -+} -+ -+/// AIO Control Block. -+/// -+/// The basic structure used by all aio functions. Each `AioCb` represents one -+/// I/O request. -+pub struct AioCb<'a> { -+ aiocb: libc::aiocb, -+ /// Tracks whether the buffer pointed to by `libc::aiocb.aio_buf` is mutable -+ mutable: bool, -+ /// Could this `AioCb` potentially have any in-kernel state? -+ in_progress: bool, -+ /// Optionally keeps a reference to the data. -+ /// -+ /// Used to keep buffers from `Drop`'ing, and may be returned once the -+ /// `AioCb` is completed by [`buffer`](#method.buffer). -+ buffer: Buffer<'a> -+} -+ -+impl<'a> AioCb<'a> { -+ /// Remove the inner `Buffer` and return it -+ /// -+ /// It is an error to call this method while the `AioCb` is still in -+ /// progress. -+ pub fn buffer(&mut self) -> Buffer<'a> { -+ assert!(!self.in_progress); -+ let mut x = Buffer::None; -+ mem::swap(&mut self.buffer, &mut x); -+ x -+ } -+ -+ /// Remove the inner boxed slice, if any, and return it. -+ /// -+ /// The returned value will be the argument that was passed to -+ /// `from_boxed_slice` when this `AioCb` was created. -+ /// -+ /// It is an error to call this method while the `AioCb` is still in -+ /// progress. -+ pub fn boxed_slice(&mut self) -> Option<Box<dyn Borrow<[u8]>>> { -+ assert!(!self.in_progress, "Can't remove the buffer from an AioCb that's still in-progress. Did you forget to call aio_return?"); -+ if let Buffer::BoxedSlice(_) = self.buffer { -+ let mut oldbuffer = Buffer::None; -+ mem::swap(&mut self.buffer, &mut oldbuffer); -+ if let Buffer::BoxedSlice(inner) = oldbuffer { -+ Some(inner) -+ } else { -+ unreachable!(); -+ } -+ } else { -+ None -+ } -+ } -+ -+ /// Remove the inner boxed mutable slice, if any, and return it. -+ /// -+ /// The returned value will be the argument that was passed to -+ /// `from_boxed_mut_slice` when this `AioCb` was created. -+ /// -+ /// It is an error to call this method while the `AioCb` is still in -+ /// progress. -+ pub fn boxed_mut_slice(&mut self) -> Option<Box<dyn BorrowMut<[u8]>>> { -+ assert!(!self.in_progress, "Can't remove the buffer from an AioCb that's still in-progress. Did you forget to call aio_return?"); -+ if let Buffer::BoxedMutSlice(_) = self.buffer { -+ let mut oldbuffer = Buffer::None; -+ mem::swap(&mut self.buffer, &mut oldbuffer); -+ if let Buffer::BoxedMutSlice(inner) = oldbuffer { -+ Some(inner) -+ } else { -+ unreachable!(); -+ } -+ } else { -+ None -+ } -+ } -+ -+ /// Returns the underlying file descriptor associated with the `AioCb` -+ pub fn fd(&self) -> RawFd { -+ self.aiocb.aio_fildes -+ } -+ -+ /// Constructs a new `AioCb` with no associated buffer. -+ /// -+ /// The resulting `AioCb` structure is suitable for use with `AioCb::fsync`. -+ /// -+ /// # Parameters -+ /// -+ /// * `fd`: File descriptor. Required for all aio functions. -+ /// * `prio`: If POSIX Prioritized IO is supported, then the -+ /// operation will be prioritized at the process's -+ /// priority level minus `prio`. -+ /// * `sigev_notify`: Determines how you will be notified of event -+ /// completion. -+ /// -+ /// # Examples -+ /// -+ /// Create an `AioCb` from a raw file descriptor and use it for an -+ /// [`fsync`](#method.fsync) operation. -+ /// -+ /// ``` -+ /// # extern crate tempfile; -+ /// # extern crate nix; -+ /// # use nix::errno::Errno; -+ /// # use nix::Error; -+ /// # use nix::sys::aio::*; -+ /// # use nix::sys::signal::SigevNotify::SigevNone; -+ /// # use std::{thread, time}; -+ /// # use std::os::unix::io::AsRawFd; -+ /// # use tempfile::tempfile; -+ /// # fn main() { -+ /// let f = tempfile().unwrap(); -+ /// let mut aiocb = AioCb::from_fd( f.as_raw_fd(), 0, SigevNone); -+ /// aiocb.fsync(AioFsyncMode::O_SYNC).expect("aio_fsync failed early"); -+ /// while (aiocb.error() == Err(Error::from(Errno::EINPROGRESS))) { -+ /// thread::sleep(time::Duration::from_millis(10)); -+ /// } -+ /// aiocb.aio_return().expect("aio_fsync failed late"); -+ /// # } -+ /// ``` -+ pub fn from_fd(fd: RawFd, prio: libc::c_int, -+ sigev_notify: SigevNotify) -> AioCb<'a> { -+ let mut a = AioCb::common_init(fd, prio, sigev_notify); -+ a.aio_offset = 0; -+ a.aio_nbytes = 0; -+ a.aio_buf = null_mut(); -+ -+ AioCb { -+ aiocb: a, -+ mutable: false, -+ in_progress: false, -+ buffer: Buffer::None -+ } -+ } -+ -+ /// Constructs a new `AioCb` from a mutable slice. -+ /// -+ /// The resulting `AioCb` will be suitable for both read and write -+ /// operations, but only if the borrow checker can guarantee that the slice -+ /// will outlive the `AioCb`. That will usually be the case if the `AioCb` -+ /// is stack-allocated. If the borrow checker gives you trouble, try using -+ /// [`from_boxed_mut_slice`](#method.from_boxed_mut_slice) instead. -+ /// -+ /// # Parameters -+ /// -+ /// * `fd`: File descriptor. Required for all aio functions. -+ /// * `offs`: File offset -+ /// * `buf`: A memory buffer -+ /// * `prio`: If POSIX Prioritized IO is supported, then the -+ /// operation will be prioritized at the process's -+ /// priority level minus `prio` -+ /// * `sigev_notify`: Determines how you will be notified of event -+ /// completion. -+ /// * `opcode`: This field is only used for `lio_listio`. It -+ /// determines which operation to use for this individual -+ /// aiocb -+ /// -+ /// # Examples -+ /// -+ /// Create an `AioCb` from a mutable slice and read into it. -+ /// -+ /// ``` -+ /// # extern crate tempfile; -+ /// # extern crate nix; -+ /// # use nix::errno::Errno; -+ /// # use nix::Error; -+ /// # use nix::sys::aio::*; -+ /// # use nix::sys::signal::SigevNotify; -+ /// # use std::{thread, time}; -+ /// # use std::io::Write; -+ /// # use std::os::unix::io::AsRawFd; -+ /// # use tempfile::tempfile; -+ /// # fn main() { -+ /// const INITIAL: &[u8] = b"abcdef123456"; -+ /// const LEN: usize = 4; -+ /// let mut rbuf = vec![0; LEN]; -+ /// let mut f = tempfile().unwrap(); -+ /// f.write_all(INITIAL).unwrap(); -+ /// { -+ /// let mut aiocb = AioCb::from_mut_slice( f.as_raw_fd(), -+ /// 2, //offset -+ /// &mut rbuf, -+ /// 0, //priority -+ /// SigevNotify::SigevNone, -+ /// LioOpcode::LIO_NOP); -+ /// aiocb.read().unwrap(); -+ /// while (aiocb.error() == Err(Error::from(Errno::EINPROGRESS))) { -+ /// thread::sleep(time::Duration::from_millis(10)); -+ /// } -+ /// assert_eq!(aiocb.aio_return().unwrap() as usize, LEN); -+ /// } -+ /// assert_eq!(rbuf, b"cdef"); -+ /// # } -+ /// ``` -+ pub fn from_mut_slice(fd: RawFd, offs: off_t, buf: &'a mut [u8], -+ prio: libc::c_int, sigev_notify: SigevNotify, -+ opcode: LioOpcode) -> AioCb<'a> { -+ let mut a = AioCb::common_init(fd, prio, sigev_notify); -+ a.aio_offset = offs; -+ a.aio_nbytes = buf.len() as size_t; -+ a.aio_buf = buf.as_ptr() as *mut c_void; -+ a.aio_lio_opcode = opcode as libc::c_int; -+ -+ AioCb { -+ aiocb: a, -+ mutable: true, -+ in_progress: false, -+ buffer: Buffer::Phantom(PhantomData), -+ } -+ } -+ -+ /// The safest and most flexible way to create an `AioCb`. -+ /// -+ /// Unlike [`from_slice`], this method returns a structure suitable for -+ /// placement on the heap. It may be used for write operations, but not -+ /// read operations. Unlike `from_ptr`, this method will ensure that the -+ /// buffer doesn't `drop` while the kernel is still processing it. Any -+ /// object that can be borrowed as a boxed slice will work. -+ /// -+ /// # Parameters -+ /// -+ /// * `fd`: File descriptor. Required for all aio functions. -+ /// * `offs`: File offset -+ /// * `buf`: A boxed slice-like object -+ /// * `prio`: If POSIX Prioritized IO is supported, then the -+ /// operation will be prioritized at the process's -+ /// priority level minus `prio` -+ /// * `sigev_notify`: Determines how you will be notified of event -+ /// completion. -+ /// * `opcode`: This field is only used for `lio_listio`. It -+ /// determines which operation to use for this individual -+ /// aiocb -+ /// -+ /// # Examples -+ /// -+ /// Create an `AioCb` from a Vector and use it for writing -+ /// -+ /// ``` -+ /// # extern crate tempfile; -+ /// # extern crate nix; -+ /// # use nix::errno::Errno; -+ /// # use nix::Error; -+ /// # use nix::sys::aio::*; -+ /// # use nix::sys::signal::SigevNotify; -+ /// # use std::{thread, time}; -+ /// # use std::io::Write; -+ /// # use std::os::unix::io::AsRawFd; -+ /// # use tempfile::tempfile; -+ /// # fn main() { -+ /// let wbuf = Box::new(Vec::from("CDEF")); -+ /// let expected_len = wbuf.len(); -+ /// let mut f = tempfile().unwrap(); -+ /// let mut aiocb = AioCb::from_boxed_slice( f.as_raw_fd(), -+ /// 2, //offset -+ /// wbuf, -+ /// 0, //priority -+ /// SigevNotify::SigevNone, -+ /// LioOpcode::LIO_NOP); -+ /// aiocb.write().unwrap(); -+ /// while (aiocb.error() == Err(Error::from(Errno::EINPROGRESS))) { -+ /// thread::sleep(time::Duration::from_millis(10)); -+ /// } -+ /// assert_eq!(aiocb.aio_return().unwrap() as usize, expected_len); -+ /// # } -+ /// ``` -+ /// -+ /// Create an `AioCb` from a `Bytes` object -+ /// -+ /// ``` -+ /// # extern crate bytes; -+ /// # extern crate tempfile; -+ /// # extern crate nix; -+ /// # use bytes::Bytes; -+ /// # use nix::sys::aio::*; -+ /// # use nix::sys::signal::SigevNotify; -+ /// # use std::os::unix::io::AsRawFd; -+ /// # use tempfile::tempfile; -+ /// # fn main() { -+ /// let wbuf = Box::new(Bytes::from(&b"CDEF"[..])); -+ /// let mut f = tempfile().unwrap(); -+ /// let mut aiocb = AioCb::from_boxed_slice( f.as_raw_fd(), -+ /// 2, //offset -+ /// wbuf, -+ /// 0, //priority -+ /// SigevNotify::SigevNone, -+ /// LioOpcode::LIO_NOP); -+ /// # } -+ /// ``` -+ /// -+ /// If a library needs to work with buffers that aren't `Box`ed, it can -+ /// create a `Box`ed container for use with this method. Here's an example -+ /// using an un`Box`ed `Bytes` object. -+ /// -+ /// ``` -+ /// # extern crate bytes; -+ /// # extern crate tempfile; -+ /// # extern crate nix; -+ /// # use bytes::Bytes; -+ /// # use nix::sys::aio::*; -+ /// # use nix::sys::signal::SigevNotify; -+ /// # use std::borrow::Borrow; -+ /// # use std::os::unix::io::AsRawFd; -+ /// # use tempfile::tempfile; -+ /// struct BytesContainer(Bytes); -+ /// impl Borrow<[u8]> for BytesContainer { -+ /// fn borrow(&self) -> &[u8] { -+ /// self.0.as_ref() -+ /// } -+ /// } -+ /// fn main() { -+ /// let wbuf = Bytes::from(&b"CDEF"[..]); -+ /// let boxed_wbuf = Box::new(BytesContainer(wbuf)); -+ /// let mut f = tempfile().unwrap(); -+ /// let mut aiocb = AioCb::from_boxed_slice( f.as_raw_fd(), -+ /// 2, //offset -+ /// boxed_wbuf, -+ /// 0, //priority -+ /// SigevNotify::SigevNone, -+ /// LioOpcode::LIO_NOP); -+ /// } -+ /// ``` -+ /// -+ /// [`from_slice`]: #method.from_slice -+ pub fn from_boxed_slice(fd: RawFd, offs: off_t, buf: Box<dyn Borrow<[u8]>>, -+ prio: libc::c_int, sigev_notify: SigevNotify, -+ opcode: LioOpcode) -> AioCb<'a> { -+ let mut a = AioCb::common_init(fd, prio, sigev_notify); -+ { -+ let borrowed : &dyn Borrow<[u8]> = buf.borrow(); -+ let slice : &[u8] = borrowed.borrow(); -+ a.aio_nbytes = slice.len() as size_t; -+ a.aio_buf = slice.as_ptr() as *mut c_void; -+ } -+ a.aio_offset = offs; -+ a.aio_lio_opcode = opcode as libc::c_int; -+ -+ AioCb { -+ aiocb: a, -+ mutable: false, -+ in_progress: false, -+ buffer: Buffer::BoxedSlice(buf), -+ } -+ } -+ -+ /// The safest and most flexible way to create an `AioCb` for reading. -+ /// -+ /// Like [`from_boxed_slice`], but the slice is a mutable one. More -+ /// flexible than [`from_mut_slice`], because a wide range of objects can be -+ /// used. -+ /// -+ /// # Examples -+ /// -+ /// Create an `AioCb` from a Vector and use it for reading -+ /// -+ /// ``` -+ /// # extern crate tempfile; -+ /// # extern crate nix; -+ /// # use nix::errno::Errno; -+ /// # use nix::Error; -+ /// # use nix::sys::aio::*; -+ /// # use nix::sys::signal::SigevNotify; -+ /// # use std::{thread, time}; -+ /// # use std::io::Write; -+ /// # use std::os::unix::io::AsRawFd; -+ /// # use tempfile::tempfile; -+ /// # fn main() { -+ /// const INITIAL: &[u8] = b"abcdef123456"; -+ /// const LEN: usize = 4; -+ /// let rbuf = Box::new(vec![0; LEN]); -+ /// let mut f = tempfile().unwrap(); -+ /// f.write_all(INITIAL).unwrap(); -+ /// let mut aiocb = AioCb::from_boxed_mut_slice( f.as_raw_fd(), -+ /// 2, //offset -+ /// rbuf, -+ /// 0, //priority -+ /// SigevNotify::SigevNone, -+ /// LioOpcode::LIO_NOP); -+ /// aiocb.read().unwrap(); -+ /// while (aiocb.error() == Err(Error::from(Errno::EINPROGRESS))) { -+ /// thread::sleep(time::Duration::from_millis(10)); -+ /// } -+ /// assert_eq!(aiocb.aio_return().unwrap() as usize, LEN); -+ /// let mut buffer = aiocb.boxed_mut_slice().unwrap(); -+ /// const EXPECT: &[u8] = b"cdef"; -+ /// assert_eq!(buffer.borrow_mut(), EXPECT); -+ /// # } -+ /// ``` -+ /// -+ /// [`from_boxed_slice`]: #method.from_boxed_slice -+ /// [`from_mut_slice`]: #method.from_mut_slice -+ pub fn from_boxed_mut_slice(fd: RawFd, offs: off_t, -+ mut buf: Box<dyn BorrowMut<[u8]>>, -+ prio: libc::c_int, sigev_notify: SigevNotify, -+ opcode: LioOpcode) -> AioCb<'a> { -+ let mut a = AioCb::common_init(fd, prio, sigev_notify); -+ { -+ let borrowed : &mut dyn BorrowMut<[u8]> = buf.borrow_mut(); -+ let slice : &mut [u8] = borrowed.borrow_mut(); -+ a.aio_nbytes = slice.len() as size_t; -+ a.aio_buf = slice.as_mut_ptr() as *mut c_void; -+ } -+ a.aio_offset = offs; -+ a.aio_lio_opcode = opcode as libc::c_int; -+ -+ AioCb { -+ aiocb: a, -+ mutable: true, -+ in_progress: false, -+ buffer: Buffer::BoxedMutSlice(buf), -+ } -+ } -+ -+ /// Constructs a new `AioCb` from a mutable raw pointer -+ /// -+ /// Unlike `from_mut_slice`, this method returns a structure suitable for -+ /// placement on the heap. It may be used for both reads and writes. Due -+ /// to its unsafety, this method is not recommended. It is most useful when -+ /// heap allocation is required but for some reason the data cannot be -+ /// wrapped in a `struct` that implements `BorrowMut<[u8]>` -+ /// -+ /// # Parameters -+ /// -+ /// * `fd`: File descriptor. Required for all aio functions. -+ /// * `offs`: File offset -+ /// * `buf`: Pointer to the memory buffer -+ /// * `len`: Length of the buffer pointed to by `buf` -+ /// * `prio`: If POSIX Prioritized IO is supported, then the -+ /// operation will be prioritized at the process's -+ /// priority level minus `prio` -+ /// * `sigev_notify`: Determines how you will be notified of event -+ /// completion. -+ /// * `opcode`: This field is only used for `lio_listio`. It -+ /// determines which operation to use for this individual -+ /// aiocb -+ /// -+ /// # Safety -+ /// -+ /// The caller must ensure that the storage pointed to by `buf` outlives the -+ /// `AioCb`. The lifetime checker can't help here. -+ pub unsafe fn from_mut_ptr(fd: RawFd, offs: off_t, -+ buf: *mut c_void, len: usize, -+ prio: libc::c_int, sigev_notify: SigevNotify, -+ opcode: LioOpcode) -> AioCb<'a> { -+ let mut a = AioCb::common_init(fd, prio, sigev_notify); -+ a.aio_offset = offs; -+ a.aio_nbytes = len; -+ a.aio_buf = buf; -+ a.aio_lio_opcode = opcode as libc::c_int; -+ -+ AioCb { -+ aiocb: a, -+ mutable: true, -+ in_progress: false, -+ buffer: Buffer::None -+ } -+ } -+ -+ /// Constructs a new `AioCb` from a raw pointer. -+ /// -+ /// Unlike `from_slice`, this method returns a structure suitable for -+ /// placement on the heap. Due to its unsafety, this method is not -+ /// recommended. It is most useful when heap allocation is required but for -+ /// some reason the data cannot be wrapped in a `struct` that implements -+ /// `Borrow<[u8]>` -+ /// -+ /// # Parameters -+ /// -+ /// * `fd`: File descriptor. Required for all aio functions. -+ /// * `offs`: File offset -+ /// * `buf`: Pointer to the memory buffer -+ /// * `len`: Length of the buffer pointed to by `buf` -+ /// * `prio`: If POSIX Prioritized IO is supported, then the -+ /// operation will be prioritized at the process's -+ /// priority level minus `prio` -+ /// * `sigev_notify`: Determines how you will be notified of event -+ /// completion. -+ /// * `opcode`: This field is only used for `lio_listio`. It -+ /// determines which operation to use for this individual -+ /// aiocb -+ /// -+ /// # Safety -+ /// -+ /// The caller must ensure that the storage pointed to by `buf` outlives the -+ /// `AioCb`. The lifetime checker can't help here. -+ pub unsafe fn from_ptr(fd: RawFd, offs: off_t, -+ buf: *const c_void, len: usize, -+ prio: libc::c_int, sigev_notify: SigevNotify, -+ opcode: LioOpcode) -> AioCb<'a> { -+ let mut a = AioCb::common_init(fd, prio, sigev_notify); -+ a.aio_offset = offs; -+ a.aio_nbytes = len; -+ // casting a const ptr to a mutable ptr here is ok, because we set the -+ // AioCb's mutable field to false -+ a.aio_buf = buf as *mut c_void; -+ a.aio_lio_opcode = opcode as libc::c_int; -+ -+ AioCb { -+ aiocb: a, -+ mutable: false, -+ in_progress: false, -+ buffer: Buffer::None -+ } -+ } -+ -+ /// Like `from_mut_slice`, but works on constant slices rather than -+ /// mutable slices. -+ /// -+ /// An `AioCb` created this way cannot be used with `read`, and its -+ /// `LioOpcode` cannot be set to `LIO_READ`. This method is useful when -+ /// writing a const buffer with `AioCb::write`, since `from_mut_slice` can't -+ /// work with const buffers. -+ /// -+ /// # Examples -+ /// -+ /// Construct an `AioCb` from a slice and use it for writing. -+ /// -+ /// ``` -+ /// # extern crate tempfile; -+ /// # extern crate nix; -+ /// # use nix::errno::Errno; -+ /// # use nix::Error; -+ /// # use nix::sys::aio::*; -+ /// # use nix::sys::signal::SigevNotify; -+ /// # use std::{thread, time}; -+ /// # use std::os::unix::io::AsRawFd; -+ /// # use tempfile::tempfile; -+ /// # fn main() { -+ /// const WBUF: &[u8] = b"abcdef123456"; -+ /// let mut f = tempfile().unwrap(); -+ /// let mut aiocb = AioCb::from_slice( f.as_raw_fd(), -+ /// 2, //offset -+ /// WBUF, -+ /// 0, //priority -+ /// SigevNotify::SigevNone, -+ /// LioOpcode::LIO_NOP); -+ /// aiocb.write().unwrap(); -+ /// while (aiocb.error() == Err(Error::from(Errno::EINPROGRESS))) { -+ /// thread::sleep(time::Duration::from_millis(10)); -+ /// } -+ /// assert_eq!(aiocb.aio_return().unwrap() as usize, WBUF.len()); -+ /// # } -+ /// ``` -+ // Note: another solution to the problem of writing const buffers would be -+ // to genericize AioCb for both &mut [u8] and &[u8] buffers. AioCb::read -+ // could take the former and AioCb::write could take the latter. However, -+ // then lio_listio wouldn't work, because that function needs a slice of -+ // AioCb, and they must all be of the same type. -+ pub fn from_slice(fd: RawFd, offs: off_t, buf: &'a [u8], -+ prio: libc::c_int, sigev_notify: SigevNotify, -+ opcode: LioOpcode) -> AioCb { -+ let mut a = AioCb::common_init(fd, prio, sigev_notify); -+ a.aio_offset = offs; -+ a.aio_nbytes = buf.len() as size_t; -+ // casting an immutable buffer to a mutable pointer looks unsafe, -+ // but technically its only unsafe to dereference it, not to create -+ // it. -+ a.aio_buf = buf.as_ptr() as *mut c_void; -+ assert!(opcode != LioOpcode::LIO_READ, "Can't read into an immutable buffer"); -+ a.aio_lio_opcode = opcode as libc::c_int; -+ -+ AioCb { -+ aiocb: a, -+ mutable: false, -+ in_progress: false, -+ buffer: Buffer::None, -+ } -+ } -+ -+ fn common_init(fd: RawFd, prio: libc::c_int, -+ sigev_notify: SigevNotify) -> libc::aiocb { -+ // Use mem::zeroed instead of explicitly zeroing each field, because the -+ // number and name of reserved fields is OS-dependent. On some OSes, -+ // some reserved fields are used the kernel for state, and must be -+ // explicitly zeroed when allocated. -+ let mut a = unsafe { mem::zeroed::<libc::aiocb>()}; -+ a.aio_fildes = fd; -+ a.aio_reqprio = prio; -+ a.aio_sigevent = SigEvent::new(sigev_notify).sigevent(); -+ a -+ } -+ -+ /// Update the notification settings for an existing `aiocb` -+ pub fn set_sigev_notify(&mut self, sigev_notify: SigevNotify) { -+ self.aiocb.aio_sigevent = SigEvent::new(sigev_notify).sigevent(); -+ } -+ -+ /// Cancels an outstanding AIO request. -+ /// -+ /// The operating system is not required to implement cancellation for all -+ /// file and device types. Even if it does, there is no guarantee that the -+ /// operation has not already completed. So the caller must check the -+ /// result and handle operations that were not canceled or that have already -+ /// completed. -+ /// -+ /// # Examples -+ /// -+ /// Cancel an outstanding aio operation. Note that we must still call -+ /// `aio_return` to free resources, even though we don't care about the -+ /// result. -+ /// -+ /// ``` -+ /// # extern crate tempfile; -+ /// # extern crate nix; -+ /// # use nix::errno::Errno; -+ /// # use nix::Error; -+ /// # use nix::sys::aio::*; -+ /// # use nix::sys::signal::SigevNotify; -+ /// # use std::{thread, time}; -+ /// # use std::io::Write; -+ /// # use std::os::unix::io::AsRawFd; -+ /// # use tempfile::tempfile; -+ /// # fn main() { -+ /// let wbuf = b"CDEF"; -+ /// let mut f = tempfile().unwrap(); -+ /// let mut aiocb = AioCb::from_slice( f.as_raw_fd(), -+ /// 2, //offset -+ /// &wbuf[..], -+ /// 0, //priority -+ /// SigevNotify::SigevNone, -+ /// LioOpcode::LIO_NOP); -+ /// aiocb.write().unwrap(); -+ /// let cs = aiocb.cancel().unwrap(); -+ /// if cs == AioCancelStat::AioNotCanceled { -+ /// while (aiocb.error() == Err(Error::from(Errno::EINPROGRESS))) { -+ /// thread::sleep(time::Duration::from_millis(10)); -+ /// } -+ /// } -+ /// // Must call `aio_return`, but ignore the result -+ /// let _ = aiocb.aio_return(); -+ /// # } -+ /// ``` -+ /// -+ /// # References -+ /// -+ /// [aio_cancel](http://pubs.opengroup.org/onlinepubs/9699919799/functions/aio_cancel.html) -+ pub fn cancel(&mut self) -> Result<AioCancelStat> { -+ match unsafe { libc::aio_cancel(self.aiocb.aio_fildes, &mut self.aiocb) } { -+ libc::AIO_CANCELED => Ok(AioCancelStat::AioCanceled), -+ libc::AIO_NOTCANCELED => Ok(AioCancelStat::AioNotCanceled), -+ libc::AIO_ALLDONE => Ok(AioCancelStat::AioAllDone), -+ -1 => Err(Error::last()), -+ _ => panic!("unknown aio_cancel return value") -+ } -+ } -+ -+ /// Retrieve error status of an asynchronous operation. -+ /// -+ /// If the request has not yet completed, returns `EINPROGRESS`. Otherwise, -+ /// returns `Ok` or any other error. -+ /// -+ /// # Examples -+ /// -+ /// Issue an aio operation and use `error` to poll for completion. Polling -+ /// is an alternative to `aio_suspend`, used by most of the other examples. -+ /// -+ /// ``` -+ /// # extern crate tempfile; -+ /// # extern crate nix; -+ /// # use nix::errno::Errno; -+ /// # use nix::Error; -+ /// # use nix::sys::aio::*; -+ /// # use nix::sys::signal::SigevNotify; -+ /// # use std::{thread, time}; -+ /// # use std::os::unix::io::AsRawFd; -+ /// # use tempfile::tempfile; -+ /// # fn main() { -+ /// const WBUF: &[u8] = b"abcdef123456"; -+ /// let mut f = tempfile().unwrap(); -+ /// let mut aiocb = AioCb::from_slice( f.as_raw_fd(), -+ /// 2, //offset -+ /// WBUF, -+ /// 0, //priority -+ /// SigevNotify::SigevNone, -+ /// LioOpcode::LIO_NOP); -+ /// aiocb.write().unwrap(); -+ /// while (aiocb.error() == Err(Error::from(Errno::EINPROGRESS))) { -+ /// thread::sleep(time::Duration::from_millis(10)); -+ /// } -+ /// assert_eq!(aiocb.aio_return().unwrap() as usize, WBUF.len()); -+ /// # } -+ /// ``` -+ /// -+ /// # References -+ /// -+ /// [aio_error](http://pubs.opengroup.org/onlinepubs/9699919799/functions/aio_error.html) -+ pub fn error(&mut self) -> Result<()> { -+ match unsafe { libc::aio_error(&mut self.aiocb as *mut libc::aiocb) } { -+ 0 => Ok(()), -+ num if num > 0 => Err(Error::from_errno(Errno::from_i32(num))), -+ -1 => Err(Error::last()), -+ num => panic!("unknown aio_error return value {:?}", num) -+ } -+ } -+ -+ /// An asynchronous version of `fsync(2)`. -+ /// -+ /// # References -+ /// -+ /// [aio_fsync](http://pubs.opengroup.org/onlinepubs/9699919799/functions/aio_fsync.html) -+ pub fn fsync(&mut self, mode: AioFsyncMode) -> Result<()> { -+ let p: *mut libc::aiocb = &mut self.aiocb; -+ Errno::result(unsafe { -+ libc::aio_fsync(mode as libc::c_int, p) -+ }).map(|_| { -+ self.in_progress = true; -+ }) -+ } -+ -+ /// Returns the `aiocb`'s `LioOpcode` field -+ /// -+ /// If the value cannot be represented as an `LioOpcode`, returns `None` -+ /// instead. -+ pub fn lio_opcode(&self) -> Option<LioOpcode> { -+ match self.aiocb.aio_lio_opcode { -+ libc::LIO_READ => Some(LioOpcode::LIO_READ), -+ libc::LIO_WRITE => Some(LioOpcode::LIO_WRITE), -+ libc::LIO_NOP => Some(LioOpcode::LIO_NOP), -+ _ => None -+ } -+ } -+ -+ /// Returns the requested length of the aio operation in bytes -+ /// -+ /// This method returns the *requested* length of the operation. To get the -+ /// number of bytes actually read or written by a completed operation, use -+ /// `aio_return` instead. -+ pub fn nbytes(&self) -> usize { -+ self.aiocb.aio_nbytes -+ } -+ -+ /// Returns the file offset stored in the `AioCb` -+ pub fn offset(&self) -> off_t { -+ self.aiocb.aio_offset -+ } -+ -+ /// Returns the priority of the `AioCb` -+ pub fn priority(&self) -> libc::c_int { -+ self.aiocb.aio_reqprio -+ } -+ -+ /// Asynchronously reads from a file descriptor into a buffer -+ /// -+ /// # References -+ /// -+ /// [aio_read](http://pubs.opengroup.org/onlinepubs/9699919799/functions/aio_read.html) -+ pub fn read(&mut self) -> Result<()> { -+ assert!(self.mutable, "Can't read into an immutable buffer"); -+ let p: *mut libc::aiocb = &mut self.aiocb; -+ Errno::result(unsafe { -+ libc::aio_read(p) -+ }).map(|_| { -+ self.in_progress = true; -+ }) -+ } -+ -+ /// Returns the `SigEvent` stored in the `AioCb` -+ pub fn sigevent(&self) -> SigEvent { -+ SigEvent::from(&self.aiocb.aio_sigevent) -+ } -+ -+ /// Retrieve return status of an asynchronous operation. -+ /// -+ /// Should only be called once for each `AioCb`, after `AioCb::error` -+ /// indicates that it has completed. The result is the same as for the -+ /// synchronous `read(2)`, `write(2)`, of `fsync(2)` functions. -+ /// -+ /// # References -+ /// -+ /// [aio_return](http://pubs.opengroup.org/onlinepubs/9699919799/functions/aio_return.html) -+ // Note: this should be just `return`, but that's a reserved word -+ pub fn aio_return(&mut self) -> Result<isize> { -+ let p: *mut libc::aiocb = &mut self.aiocb; -+ self.in_progress = false; -+ Errno::result(unsafe { libc::aio_return(p) }) -+ } -+ -+ /// Asynchronously writes from a buffer to a file descriptor -+ /// -+ /// # References -+ /// -+ /// [aio_write](http://pubs.opengroup.org/onlinepubs/9699919799/functions/aio_write.html) -+ pub fn write(&mut self) -> Result<()> { -+ let p: *mut libc::aiocb = &mut self.aiocb; -+ Errno::result(unsafe { -+ libc::aio_write(p) -+ }).map(|_| { -+ self.in_progress = true; -+ }) -+ } -+ -+} -+ -+/// Cancels outstanding AIO requests for a given file descriptor. -+/// -+/// # Examples -+/// -+/// Issue an aio operation, then cancel all outstanding operations on that file -+/// descriptor. -+/// -+/// ``` -+/// # extern crate tempfile; -+/// # extern crate nix; -+/// # use nix::errno::Errno; -+/// # use nix::Error; -+/// # use nix::sys::aio::*; -+/// # use nix::sys::signal::SigevNotify; -+/// # use std::{thread, time}; -+/// # use std::io::Write; -+/// # use std::os::unix::io::AsRawFd; -+/// # use tempfile::tempfile; -+/// # fn main() { -+/// let wbuf = b"CDEF"; -+/// let mut f = tempfile().unwrap(); -+/// let mut aiocb = AioCb::from_slice( f.as_raw_fd(), -+/// 2, //offset -+/// &wbuf[..], -+/// 0, //priority -+/// SigevNotify::SigevNone, -+/// LioOpcode::LIO_NOP); -+/// aiocb.write().unwrap(); -+/// let cs = aio_cancel_all(f.as_raw_fd()).unwrap(); -+/// if cs == AioCancelStat::AioNotCanceled { -+/// while (aiocb.error() == Err(Error::from(Errno::EINPROGRESS))) { -+/// thread::sleep(time::Duration::from_millis(10)); -+/// } -+/// } -+/// // Must call `aio_return`, but ignore the result -+/// let _ = aiocb.aio_return(); -+/// # } -+/// ``` -+/// -+/// # References -+/// -+/// [`aio_cancel`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/aio_cancel.html) -+pub fn aio_cancel_all(fd: RawFd) -> Result<AioCancelStat> { -+ match unsafe { libc::aio_cancel(fd, null_mut()) } { -+ libc::AIO_CANCELED => Ok(AioCancelStat::AioCanceled), -+ libc::AIO_NOTCANCELED => Ok(AioCancelStat::AioNotCanceled), -+ libc::AIO_ALLDONE => Ok(AioCancelStat::AioAllDone), -+ -1 => Err(Error::last()), -+ _ => panic!("unknown aio_cancel return value") -+ } -+} -+ -+/// Suspends the calling process until at least one of the specified `AioCb`s -+/// has completed, a signal is delivered, or the timeout has passed. -+/// -+/// If `timeout` is `None`, `aio_suspend` will block indefinitely. -+/// -+/// # Examples -+/// -+/// Use `aio_suspend` to block until an aio operation completes. -+/// -+// Disable doctest due to a known bug in FreeBSD's 32-bit emulation. The fix -+// will be included in release 11.2. -+// FIXME reenable the doc test when the CI machine gets upgraded to that release. -+// https://svnweb.freebsd.org/base?view=revision&revision=325018 -+/// ```no_run -+/// # extern crate tempfile; -+/// # extern crate nix; -+/// # use nix::sys::aio::*; -+/// # use nix::sys::signal::SigevNotify; -+/// # use std::os::unix::io::AsRawFd; -+/// # use tempfile::tempfile; -+/// # fn main() { -+/// const WBUF: &[u8] = b"abcdef123456"; -+/// let mut f = tempfile().unwrap(); -+/// let mut aiocb = AioCb::from_slice( f.as_raw_fd(), -+/// 2, //offset -+/// WBUF, -+/// 0, //priority -+/// SigevNotify::SigevNone, -+/// LioOpcode::LIO_NOP); -+/// aiocb.write().unwrap(); -+/// aio_suspend(&[&aiocb], None).expect("aio_suspend failed"); -+/// assert_eq!(aiocb.aio_return().unwrap() as usize, WBUF.len()); -+/// # } -+/// ``` -+/// # References -+/// -+/// [`aio_suspend`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/aio_suspend.html) -+pub fn aio_suspend(list: &[&AioCb], timeout: Option<TimeSpec>) -> Result<()> { -+ let plist = list as *const [&AioCb] as *const [*const libc::aiocb]; -+ let p = plist as *const *const libc::aiocb; -+ let timep = match timeout { -+ None => null::<libc::timespec>(), -+ Some(x) => x.as_ref() as *const libc::timespec -+ }; -+ Errno::result(unsafe { -+ libc::aio_suspend(p, list.len() as i32, timep) -+ }).map(drop) -+} -+ -+impl<'a> Debug for AioCb<'a> { -+ fn fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result { -+ fmt.debug_struct("AioCb") -+ .field("aiocb", &self.aiocb) -+ .field("mutable", &self.mutable) -+ .field("in_progress", &self.in_progress) -+ .finish() -+ } -+} -+ -+impl<'a> Drop for AioCb<'a> { -+ /// If the `AioCb` has no remaining state in the kernel, just drop it. -+ /// Otherwise, dropping constitutes a resource leak, which is an error -+ fn drop(&mut self) { -+ assert!(thread::panicking() || !self.in_progress, -+ "Dropped an in-progress AioCb"); -+ } -+} -+ -+/// LIO Control Block. -+/// -+/// The basic structure used to issue multiple AIO operations simultaneously. -+#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+pub struct LioCb<'a> { -+ /// A collection of [`AioCb`]s. All of these will be issued simultaneously -+ /// by the [`listio`] method. -+ /// -+ /// [`AioCb`]: struct.AioCb.html -+ /// [`listio`]: #method.listio -+ pub aiocbs: Vec<AioCb<'a>>, -+ -+ /// The actual list passed to `libc::lio_listio`. -+ /// -+ /// It must live for as long as any of the operations are still being -+ /// processesed, because the aio subsystem uses its address as a unique -+ /// identifier. -+ list: Vec<*mut libc::aiocb>, -+ -+ /// A partial set of results. This field will get populated by -+ /// `listio_resubmit` when an `LioCb` is resubmitted after an error -+ results: Vec<Option<Result<isize>>> -+} -+ -+#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+impl<'a> LioCb<'a> { -+ /// Initialize an empty `LioCb` -+ pub fn with_capacity(capacity: usize) -> LioCb<'a> { -+ LioCb { -+ aiocbs: Vec::with_capacity(capacity), -+ list: Vec::with_capacity(capacity), -+ results: Vec::with_capacity(capacity) -+ } -+ } -+ -+ /// Submits multiple asynchronous I/O requests with a single system call. -+ /// -+ /// They are not guaranteed to complete atomically, and the order in which -+ /// the requests are carried out is not specified. Reads, writes, and -+ /// fsyncs may be freely mixed. -+ /// -+ /// This function is useful for reducing the context-switch overhead of -+ /// submitting many AIO operations. It can also be used with -+ /// `LioMode::LIO_WAIT` to block on the result of several independent -+ /// operations. Used that way, it is often useful in programs that -+ /// otherwise make little use of AIO. -+ /// -+ /// # Examples -+ /// -+ /// Use `listio` to submit an aio operation and wait for its completion. In -+ /// this case, there is no need to use [`aio_suspend`] to wait or -+ /// [`AioCb::error`] to poll. -+ /// -+ /// ``` -+ /// # extern crate tempfile; -+ /// # extern crate nix; -+ /// # use nix::sys::aio::*; -+ /// # use nix::sys::signal::SigevNotify; -+ /// # use std::os::unix::io::AsRawFd; -+ /// # use tempfile::tempfile; -+ /// # fn main() { -+ /// const WBUF: &[u8] = b"abcdef123456"; -+ /// let mut f = tempfile().unwrap(); -+ /// let mut liocb = LioCb::with_capacity(1); -+ /// liocb.aiocbs.push(AioCb::from_slice( f.as_raw_fd(), -+ /// 2, //offset -+ /// WBUF, -+ /// 0, //priority -+ /// SigevNotify::SigevNone, -+ /// LioOpcode::LIO_WRITE)); -+ /// liocb.listio(LioMode::LIO_WAIT, -+ /// SigevNotify::SigevNone).unwrap(); -+ /// assert_eq!(liocb.aio_return(0).unwrap() as usize, WBUF.len()); -+ /// # } -+ /// ``` -+ /// -+ /// # References -+ /// -+ /// [`lio_listio`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/lio_listio.html) -+ /// -+ /// [`aio_suspend`]: fn.aio_suspend.html -+ /// [`AioCb::error`]: struct.AioCb.html#method.error -+ pub fn listio(&mut self, mode: LioMode, -+ sigev_notify: SigevNotify) -> Result<()> { -+ let sigev = SigEvent::new(sigev_notify); -+ let sigevp = &mut sigev.sigevent() as *mut libc::sigevent; -+ self.list.clear(); -+ for a in &mut self.aiocbs { -+ a.in_progress = true; -+ self.list.push(a as *mut AioCb<'a> -+ as *mut libc::aiocb); -+ } -+ let p = self.list.as_ptr(); -+ Errno::result(unsafe { -+ libc::lio_listio(mode as i32, p, self.list.len() as i32, sigevp) -+ }).map(drop) -+ } -+ -+ /// Resubmits any incomplete operations with [`lio_listio`]. -+ /// -+ /// Sometimes, due to system resource limitations, an `lio_listio` call will -+ /// return `EIO`, or `EAGAIN`. Or, if a signal is received, it may return -+ /// `EINTR`. In any of these cases, only a subset of its constituent -+ /// operations will actually have been initiated. `listio_resubmit` will -+ /// resubmit any operations that are still uninitiated. -+ /// -+ /// After calling `listio_resubmit`, results should be collected by -+ /// [`LioCb::aio_return`]. -+ /// -+ /// # Examples -+ /// ```no_run -+ /// # extern crate tempfile; -+ /// # extern crate nix; -+ /// # use nix::Error; -+ /// # use nix::errno::Errno; -+ /// # use nix::sys::aio::*; -+ /// # use nix::sys::signal::SigevNotify; -+ /// # use std::os::unix::io::AsRawFd; -+ /// # use std::{thread, time}; -+ /// # use tempfile::tempfile; -+ /// # fn main() { -+ /// const WBUF: &[u8] = b"abcdef123456"; -+ /// let mut f = tempfile().unwrap(); -+ /// let mut liocb = LioCb::with_capacity(1); -+ /// liocb.aiocbs.push(AioCb::from_slice( f.as_raw_fd(), -+ /// 2, //offset -+ /// WBUF, -+ /// 0, //priority -+ /// SigevNotify::SigevNone, -+ /// LioOpcode::LIO_WRITE)); -+ /// let mut err = liocb.listio(LioMode::LIO_WAIT, SigevNotify::SigevNone); -+ /// while err == Err(Error::Sys(Errno::EIO)) || -+ /// err == Err(Error::Sys(Errno::EAGAIN)) { -+ /// thread::sleep(time::Duration::from_millis(10)); -+ /// err = liocb.listio_resubmit(LioMode::LIO_WAIT, SigevNotify::SigevNone); -+ /// } -+ /// assert_eq!(liocb.aio_return(0).unwrap() as usize, WBUF.len()); -+ /// # } -+ /// ``` -+ /// -+ /// # References -+ /// -+ /// [`lio_listio`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/lio_listio.html) -+ /// -+ /// [`lio_listio`]: http://pubs.opengroup.org/onlinepubs/9699919799/functions/lio_listio.html -+ /// [`LioCb::aio_return`]: struct.LioCb.html#method.aio_return -+ // Note: the addresses of any EINPROGRESS or EOK aiocbs _must_ not be -+ // changed by this method, because the kernel relies on their addresses -+ // being stable. -+ // Note: aiocbs that are Ok(()) must be finalized by aio_return, or else the -+ // sigev_notify will immediately refire. -+ pub fn listio_resubmit(&mut self, mode:LioMode, -+ sigev_notify: SigevNotify) -> Result<()> { -+ let sigev = SigEvent::new(sigev_notify); -+ let sigevp = &mut sigev.sigevent() as *mut libc::sigevent; -+ self.list.clear(); -+ -+ while self.results.len() < self.aiocbs.len() { -+ self.results.push(None); -+ } -+ -+ for (i, a) in self.aiocbs.iter_mut().enumerate() { -+ if self.results[i].is_some() { -+ // Already collected final status for this operation -+ continue; -+ } -+ match a.error() { -+ Ok(()) => { -+ // aiocb is complete; collect its status and don't resubmit -+ self.results[i] = Some(a.aio_return()); -+ }, -+ Err(Error::Sys(Errno::EAGAIN)) => { -+ self.list.push(a as *mut AioCb<'a> as *mut libc::aiocb); -+ }, -+ Err(Error::Sys(Errno::EINPROGRESS)) => { -+ // aiocb is was successfully queued; no need to do anything -+ () -+ }, -+ Err(Error::Sys(Errno::EINVAL)) => panic!( -+ "AioCb was never submitted, or already finalized"), -+ _ => unreachable!() -+ } -+ } -+ let p = self.list.as_ptr(); -+ Errno::result(unsafe { -+ libc::lio_listio(mode as i32, p, self.list.len() as i32, sigevp) -+ }).map(drop) -+ } -+ -+ /// Collect final status for an individual `AioCb` submitted as part of an -+ /// `LioCb`. -+ /// -+ /// This is just like [`AioCb::aio_return`], except it takes into account -+ /// operations that were restarted by [`LioCb::listio_resubmit`] -+ /// -+ /// [`AioCb::aio_return`]: struct.AioCb.html#method.aio_return -+ /// [`LioCb::listio_resubmit`]: #method.listio_resubmit -+ pub fn aio_return(&mut self, i: usize) -> Result<isize> { -+ if i >= self.results.len() || self.results[i].is_none() { -+ self.aiocbs[i].aio_return() -+ } else { -+ self.results[i].unwrap() -+ } -+ } -+ -+ /// Retrieve error status of an individual `AioCb` submitted as part of an -+ /// `LioCb`. -+ /// -+ /// This is just like [`AioCb::error`], except it takes into account -+ /// operations that were restarted by [`LioCb::listio_resubmit`] -+ /// -+ /// [`AioCb::error`]: struct.AioCb.html#method.error -+ /// [`LioCb::listio_resubmit`]: #method.listio_resubmit -+ pub fn error(&mut self, i: usize) -> Result<()> { -+ if i >= self.results.len() || self.results[i].is_none() { -+ self.aiocbs[i].error() -+ } else { -+ Ok(()) -+ } -+ } -+} -+ -+#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+impl<'a> Debug for LioCb<'a> { -+ fn fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result { -+ fmt.debug_struct("LioCb") -+ .field("aiocbs", &self.aiocbs) -+ .finish() -+ } -+} -+ -+#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+impl<'a> From<Vec<AioCb<'a>>> for LioCb<'a> { -+ fn from(src: Vec<AioCb<'a>>) -> LioCb<'a> { -+ LioCb { -+ list: Vec::with_capacity(src.capacity()), -+ results: Vec::with_capacity(src.capacity()), -+ aiocbs: src, -+ } -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/epoll.rs b/third_party/rust/nix-0.15.0/src/sys/epoll.rs -new file mode 100644 -index 0000000000000..fef6f4e3ec92c ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/epoll.rs -@@ -0,0 +1,109 @@ -+use Result; -+use errno::Errno; -+use libc::{self, c_int}; -+use std::os::unix::io::RawFd; -+use std::ptr; -+use std::mem; -+use ::Error; -+ -+libc_bitflags!( -+ pub struct EpollFlags: c_int { -+ EPOLLIN; -+ EPOLLPRI; -+ EPOLLOUT; -+ EPOLLRDNORM; -+ EPOLLRDBAND; -+ EPOLLWRNORM; -+ EPOLLWRBAND; -+ EPOLLMSG; -+ EPOLLERR; -+ EPOLLHUP; -+ EPOLLRDHUP; -+ #[cfg(target_os = "linux")] // Added in 4.5; not in Android. -+ EPOLLEXCLUSIVE; -+ #[cfg(not(target_arch = "mips"))] -+ EPOLLWAKEUP; -+ EPOLLONESHOT; -+ EPOLLET; -+ } -+); -+ -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+#[repr(i32)] -+pub enum EpollOp { -+ EpollCtlAdd = libc::EPOLL_CTL_ADD, -+ EpollCtlDel = libc::EPOLL_CTL_DEL, -+ EpollCtlMod = libc::EPOLL_CTL_MOD, -+} -+ -+libc_bitflags!{ -+ pub struct EpollCreateFlags: c_int { -+ EPOLL_CLOEXEC; -+ } -+} -+ -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+#[repr(C)] -+pub struct EpollEvent { -+ event: libc::epoll_event, -+} -+ -+impl EpollEvent { -+ pub fn new(events: EpollFlags, data: u64) -> Self { -+ EpollEvent { event: libc::epoll_event { events: events.bits() as u32, u64: data } } -+ } -+ -+ pub fn empty() -> Self { -+ unsafe { mem::zeroed::<EpollEvent>() } -+ } -+ -+ pub fn events(&self) -> EpollFlags { -+ EpollFlags::from_bits(self.event.events as c_int).unwrap() -+ } -+ -+ pub fn data(&self) -> u64 { -+ self.event.u64 -+ } -+} -+ -+#[inline] -+pub fn epoll_create() -> Result<RawFd> { -+ let res = unsafe { libc::epoll_create(1024) }; -+ -+ Errno::result(res) -+} -+ -+#[inline] -+pub fn epoll_create1(flags: EpollCreateFlags) -> Result<RawFd> { -+ let res = unsafe { libc::epoll_create1(flags.bits()) }; -+ -+ Errno::result(res) -+} -+ -+#[inline] -+pub fn epoll_ctl<'a, T>(epfd: RawFd, op: EpollOp, fd: RawFd, event: T) -> Result<()> -+ where T: Into<Option<&'a mut EpollEvent>> -+{ -+ let mut event: Option<&mut EpollEvent> = event.into(); -+ if event.is_none() && op != EpollOp::EpollCtlDel { -+ Err(Error::Sys(Errno::EINVAL)) -+ } else { -+ let res = unsafe { -+ if let Some(ref mut event) = event { -+ libc::epoll_ctl(epfd, op as c_int, fd, &mut event.event) -+ } else { -+ libc::epoll_ctl(epfd, op as c_int, fd, ptr::null_mut()) -+ } -+ }; -+ Errno::result(res).map(drop) -+ } -+} -+ -+#[inline] -+pub fn epoll_wait(epfd: RawFd, events: &mut [EpollEvent], timeout_ms: isize) -> Result<usize> { -+ let res = unsafe { -+ libc::epoll_wait(epfd, events.as_mut_ptr() as *mut libc::epoll_event, events.len() as c_int, timeout_ms as c_int) -+ }; -+ -+ Errno::result(res).map(|r| r as usize) -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/event.rs b/third_party/rust/nix-0.15.0/src/sys/event.rs -new file mode 100644 -index 0000000000000..8cd7372f88188 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/event.rs -@@ -0,0 +1,351 @@ -+/* TOOD: Implement for other kqueue based systems -+ */ -+ -+use {Errno, Result}; -+#[cfg(not(target_os = "netbsd"))] -+use libc::{timespec, time_t, c_int, c_long, intptr_t, uintptr_t}; -+#[cfg(target_os = "netbsd")] -+use libc::{timespec, time_t, c_long, intptr_t, uintptr_t, size_t}; -+use libc; -+use std::os::unix::io::RawFd; -+use std::ptr; -+use std::mem; -+ -+// Redefine kevent in terms of programmer-friendly enums and bitfields. -+#[repr(C)] -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct KEvent { -+ kevent: libc::kevent, -+} -+ -+#[cfg(any(target_os = "dragonfly", target_os = "freebsd", -+ target_os = "ios", target_os = "macos", -+ target_os = "openbsd"))] -+type type_of_udata = *mut libc::c_void; -+#[cfg(any(target_os = "dragonfly", target_os = "freebsd", -+ target_os = "ios", target_os = "macos"))] -+type type_of_data = intptr_t; -+#[cfg(any(target_os = "netbsd"))] -+type type_of_udata = intptr_t; -+#[cfg(any(target_os = "netbsd", target_os = "openbsd"))] -+type type_of_data = libc::int64_t; -+ -+#[cfg(target_os = "netbsd")] -+type type_of_event_filter = u32; -+#[cfg(not(target_os = "netbsd"))] -+type type_of_event_filter = i16; -+libc_enum! { -+ #[cfg_attr(target_os = "netbsd", repr(u32))] -+ #[cfg_attr(not(target_os = "netbsd"), repr(i16))] -+ pub enum EventFilter { -+ EVFILT_AIO, -+ /// Returns whenever there is no remaining data in the write buffer -+ #[cfg(target_os = "freebsd")] -+ EVFILT_EMPTY, -+ #[cfg(target_os = "dragonfly")] -+ EVFILT_EXCEPT, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos"))] -+ EVFILT_FS, -+ #[cfg(target_os = "freebsd")] -+ EVFILT_LIO, -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ EVFILT_MACHPORT, -+ EVFILT_PROC, -+ /// Returns events associated with the process referenced by a given -+ /// process descriptor, created by `pdfork()`. The events to monitor are: -+ /// -+ /// - NOTE_EXIT: the process has exited. The exit status will be stored in data. -+ #[cfg(target_os = "freebsd")] -+ EVFILT_PROCDESC, -+ EVFILT_READ, -+ /// Returns whenever an asynchronous `sendfile()` call completes. -+ #[cfg(target_os = "freebsd")] -+ EVFILT_SENDFILE, -+ EVFILT_SIGNAL, -+ EVFILT_TIMER, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos"))] -+ EVFILT_USER, -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ EVFILT_VM, -+ EVFILT_VNODE, -+ EVFILT_WRITE, -+ } -+} -+ -+#[cfg(any(target_os = "dragonfly", target_os = "freebsd", -+ target_os = "ios", target_os = "macos", -+ target_os = "openbsd"))] -+pub type type_of_event_flag = u16; -+#[cfg(any(target_os = "netbsd"))] -+pub type type_of_event_flag = u32; -+libc_bitflags!{ -+ pub struct EventFlag: type_of_event_flag { -+ EV_ADD; -+ EV_CLEAR; -+ EV_DELETE; -+ EV_DISABLE; -+ // No released version of OpenBSD supports EV_DISPATCH or EV_RECEIPT. -+ // These have been commited to the -current branch though and are -+ // expected to be part of the OpenBSD 6.2 release in Nov 2017. -+ // See: https://marc.info/?l=openbsd-tech&m=149621427511219&w=2 -+ // https://github.com/rust-lang/libc/pull/613 -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd", -+ target_os = "ios", target_os = "macos", -+ target_os = "netbsd"))] -+ EV_DISPATCH; -+ #[cfg(target_os = "freebsd")] -+ EV_DROP; -+ EV_ENABLE; -+ EV_EOF; -+ EV_ERROR; -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ EV_FLAG0; -+ EV_FLAG1; -+ #[cfg(target_os = "dragonfly")] -+ EV_NODATA; -+ EV_ONESHOT; -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ EV_OOBAND; -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ EV_POLL; -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd", -+ target_os = "ios", target_os = "macos", -+ target_os = "netbsd"))] -+ EV_RECEIPT; -+ EV_SYSFLAGS; -+ } -+} -+ -+libc_bitflags!( -+ pub struct FilterFlag: u32 { -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ NOTE_ABSOLUTE; -+ NOTE_ATTRIB; -+ NOTE_CHILD; -+ NOTE_DELETE; -+ #[cfg(target_os = "openbsd")] -+ NOTE_EOF; -+ NOTE_EXEC; -+ NOTE_EXIT; -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ #[deprecated( since="0.14.0", note="Deprecated since OSX 10.9")] -+ #[allow(deprecated)] -+ NOTE_EXIT_REPARENTED; -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ NOTE_EXITSTATUS; -+ NOTE_EXTEND; -+ #[cfg(any(target_os = "macos", -+ target_os = "ios", -+ target_os = "freebsd", -+ target_os = "dragonfly"))] -+ NOTE_FFAND; -+ #[cfg(any(target_os = "macos", -+ target_os = "ios", -+ target_os = "freebsd", -+ target_os = "dragonfly"))] -+ NOTE_FFCOPY; -+ #[cfg(any(target_os = "macos", -+ target_os = "ios", -+ target_os = "freebsd", -+ target_os = "dragonfly"))] -+ NOTE_FFCTRLMASK; -+ #[cfg(any(target_os = "macos", -+ target_os = "ios", -+ target_os = "freebsd", -+ target_os = "dragonfly"))] -+ NOTE_FFLAGSMASK; -+ #[cfg(any(target_os = "macos", -+ target_os = "ios", -+ target_os = "freebsd", -+ target_os = "dragonfly"))] -+ NOTE_FFNOP; -+ #[cfg(any(target_os = "macos", -+ target_os = "ios", -+ target_os = "freebsd", -+ target_os = "dragonfly"))] -+ NOTE_FFOR; -+ NOTE_FORK; -+ NOTE_LINK; -+ NOTE_LOWAT; -+ #[cfg(target_os = "freebsd")] -+ NOTE_MSECONDS; -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ NOTE_NONE; -+ #[cfg(any(target_os = "macos", target_os = "ios", target_os = "freebsd"))] -+ NOTE_NSECONDS; -+ #[cfg(target_os = "dragonfly")] -+ NOTE_OOB; -+ NOTE_PCTRLMASK; -+ NOTE_PDATAMASK; -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ #[deprecated( since="0.14.0", note="Deprecated since OSX 10.9")] -+ #[allow(deprecated)] -+ NOTE_REAP; -+ NOTE_RENAME; -+ NOTE_REVOKE; -+ #[cfg(any(target_os = "macos", target_os = "ios", target_os = "freebsd"))] -+ NOTE_SECONDS; -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ NOTE_SIGNAL; -+ NOTE_TRACK; -+ NOTE_TRACKERR; -+ #[cfg(any(target_os = "macos", -+ target_os = "ios", -+ target_os = "freebsd", -+ target_os = "dragonfly"))] -+ NOTE_TRIGGER; -+ #[cfg(target_os = "openbsd")] -+ NOTE_TRUNCATE; -+ #[cfg(any(target_os = "macos", target_os = "ios", target_os = "freebsd"))] -+ NOTE_USECONDS; -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ NOTE_VM_ERROR; -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ NOTE_VM_PRESSURE; -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ NOTE_VM_PRESSURE_SUDDEN_TERMINATE; -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ NOTE_VM_PRESSURE_TERMINATE; -+ NOTE_WRITE; -+ } -+); -+ -+pub fn kqueue() -> Result<RawFd> { -+ let res = unsafe { libc::kqueue() }; -+ -+ Errno::result(res) -+} -+ -+ -+// KEvent can't derive Send because on some operating systems, udata is defined -+// as a void*. However, KEvent's public API always treats udata as an intptr_t, -+// which is safe to Send. -+unsafe impl Send for KEvent { -+} -+ -+impl KEvent { -+ pub fn new(ident: uintptr_t, filter: EventFilter, flags: EventFlag, -+ fflags:FilterFlag, data: intptr_t, udata: intptr_t) -> KEvent { -+ KEvent { kevent: libc::kevent { -+ ident: ident, -+ filter: filter as type_of_event_filter, -+ flags: flags.bits(), -+ fflags: fflags.bits(), -+ data: data as type_of_data, -+ udata: udata as type_of_udata -+ } } -+ } -+ -+ pub fn ident(&self) -> uintptr_t { -+ self.kevent.ident -+ } -+ -+ pub fn filter(&self) -> EventFilter { -+ unsafe { mem::transmute(self.kevent.filter as type_of_event_filter) } -+ } -+ -+ pub fn flags(&self) -> EventFlag { -+ EventFlag::from_bits(self.kevent.flags).unwrap() -+ } -+ -+ pub fn fflags(&self) -> FilterFlag { -+ FilterFlag::from_bits(self.kevent.fflags).unwrap() -+ } -+ -+ pub fn data(&self) -> intptr_t { -+ self.kevent.data as intptr_t -+ } -+ -+ pub fn udata(&self) -> intptr_t { -+ self.kevent.udata as intptr_t -+ } -+} -+ -+pub fn kevent(kq: RawFd, -+ changelist: &[KEvent], -+ eventlist: &mut [KEvent], -+ timeout_ms: usize) -> Result<usize> { -+ -+ // Convert ms to timespec -+ let timeout = timespec { -+ tv_sec: (timeout_ms / 1000) as time_t, -+ tv_nsec: ((timeout_ms % 1000) * 1_000_000) as c_long -+ }; -+ -+ kevent_ts(kq, changelist, eventlist, Some(timeout)) -+} -+ -+#[cfg(any(target_os = "macos", -+ target_os = "ios", -+ target_os = "freebsd", -+ target_os = "dragonfly", -+ target_os = "openbsd"))] -+type type_of_nchanges = c_int; -+#[cfg(target_os = "netbsd")] -+type type_of_nchanges = size_t; -+ -+pub fn kevent_ts(kq: RawFd, -+ changelist: &[KEvent], -+ eventlist: &mut [KEvent], -+ timeout_opt: Option<timespec>) -> Result<usize> { -+ -+ let res = unsafe { -+ libc::kevent( -+ kq, -+ changelist.as_ptr() as *const libc::kevent, -+ changelist.len() as type_of_nchanges, -+ eventlist.as_mut_ptr() as *mut libc::kevent, -+ eventlist.len() as type_of_nchanges, -+ if let Some(ref timeout) = timeout_opt {timeout as *const timespec} else {ptr::null()}) -+ }; -+ -+ Errno::result(res).map(|r| r as usize) -+} -+ -+#[inline] -+pub fn ev_set(ev: &mut KEvent, -+ ident: usize, -+ filter: EventFilter, -+ flags: EventFlag, -+ fflags: FilterFlag, -+ udata: intptr_t) { -+ -+ ev.kevent.ident = ident as uintptr_t; -+ ev.kevent.filter = filter as type_of_event_filter; -+ ev.kevent.flags = flags.bits(); -+ ev.kevent.fflags = fflags.bits(); -+ ev.kevent.data = 0; -+ ev.kevent.udata = udata as type_of_udata; -+} -+ -+#[test] -+fn test_struct_kevent() { -+ let udata : intptr_t = 12345; -+ -+ let expected = libc::kevent{ident: 0xdead_beef, -+ filter: libc::EVFILT_READ, -+ flags: libc::EV_ONESHOT | libc::EV_ADD, -+ fflags: libc::NOTE_CHILD | libc::NOTE_EXIT, -+ data: 0x1337, -+ udata: udata as type_of_udata}; -+ let actual = KEvent::new(0xdead_beef, -+ EventFilter::EVFILT_READ, -+ EventFlag::EV_ONESHOT | EventFlag::EV_ADD, -+ FilterFlag::NOTE_CHILD | FilterFlag::NOTE_EXIT, -+ 0x1337, -+ udata); -+ assert!(expected.ident == actual.ident()); -+ assert!(expected.filter == actual.filter() as type_of_event_filter); -+ assert!(expected.flags == actual.flags().bits()); -+ assert!(expected.fflags == actual.fflags().bits()); -+ assert!(expected.data == actual.data() as type_of_data); -+ assert!(expected.udata == actual.udata() as type_of_udata); -+ assert!(mem::size_of::<libc::kevent>() == mem::size_of::<KEvent>()); -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/eventfd.rs b/third_party/rust/nix-0.15.0/src/sys/eventfd.rs -new file mode 100644 -index 0000000000000..c5a54e46a1735 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/eventfd.rs -@@ -0,0 +1,18 @@ -+use libc; -+use std::os::unix::io::RawFd; -+use Result; -+use errno::Errno; -+ -+libc_bitflags! { -+ pub struct EfdFlags: libc::c_int { -+ EFD_CLOEXEC; // Since Linux 2.6.27 -+ EFD_NONBLOCK; // Since Linux 2.6.27 -+ EFD_SEMAPHORE; // Since Linux 2.6.30 -+ } -+} -+ -+pub fn eventfd(initval: libc::c_uint, flags: EfdFlags) -> Result<RawFd> { -+ let res = unsafe { libc::eventfd(initval, flags.bits()) }; -+ -+ Errno::result(res).map(|r| r as RawFd) -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/inotify.rs b/third_party/rust/nix-0.15.0/src/sys/inotify.rs -new file mode 100644 -index 0000000000000..e6c2cf64d29dc ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/inotify.rs -@@ -0,0 +1,230 @@ -+//! Monitoring API for filesystem events. -+//! -+//! Inotify is a Linux-only API to monitor filesystems events. -+//! -+//! For more documentation, please read [inotify(7)](http://man7.org/linux/man-pages/man7/inotify.7.html). -+//! -+//! # Examples -+//! -+//! Monitor all events happening in directory "test": -+//! ```no_run -+//! # use nix::sys::inotify::{AddWatchFlags,InitFlags,Inotify}; -+//! # -+//! // We create a new inotify instance. -+//! let instance = Inotify::init(InitFlags::empty()).unwrap(); -+//! -+//! // We add a new watch on directory "test" for all events. -+//! let wd = instance.add_watch("test", AddWatchFlags::IN_ALL_EVENTS).unwrap(); -+//! -+//! loop { -+//! // We read from our inotify instance for events. -+//! let events = instance.read_events().unwrap(); -+//! println!("Events: {:?}", events); -+//! } -+//! ``` -+ -+use libc; -+use libc::{ -+ c_char, -+ c_int, -+}; -+use std::ffi::{OsString,OsStr,CStr}; -+use std::os::unix::ffi::OsStrExt; -+use std::mem::size_of; -+use std::os::unix::io::{RawFd,AsRawFd,FromRawFd}; -+use unistd::read; -+use Result; -+use NixPath; -+use errno::Errno; -+ -+libc_bitflags! { -+ /// Configuration options for [`inotify_add_watch`](fn.inotify_add_watch.html). -+ pub struct AddWatchFlags: u32 { -+ IN_ACCESS; -+ IN_MODIFY; -+ IN_ATTRIB; -+ IN_CLOSE_WRITE; -+ IN_CLOSE_NOWRITE; -+ IN_OPEN; -+ IN_MOVED_FROM; -+ IN_MOVED_TO; -+ IN_CREATE; -+ IN_DELETE; -+ IN_DELETE_SELF; -+ IN_MOVE_SELF; -+ -+ IN_UNMOUNT; -+ IN_Q_OVERFLOW; -+ IN_IGNORED; -+ -+ IN_CLOSE; -+ IN_MOVE; -+ -+ IN_ONLYDIR; -+ IN_DONT_FOLLOW; -+ -+ IN_ISDIR; -+ IN_ONESHOT; -+ IN_ALL_EVENTS; -+ } -+} -+ -+libc_bitflags! { -+ /// Configuration options for [`inotify_init1`](fn.inotify_init1.html). -+ pub struct InitFlags: c_int { -+ IN_CLOEXEC; -+ IN_NONBLOCK; -+ } -+} -+ -+/// An inotify instance. This is also a file descriptor, you can feed it to -+/// other interfaces consuming file descriptors, epoll for example. -+#[derive(Debug, Clone, Copy)] -+pub struct Inotify { -+ fd: RawFd -+} -+ -+/// This object is returned when you create a new watch on an inotify instance. -+/// It is then returned as part of an event once triggered. It allows you to -+/// know which watch triggered which event. -+#[derive(Debug, Clone, Copy, Hash, Eq, PartialEq, Ord, PartialOrd)] -+pub struct WatchDescriptor { -+ wd: i32 -+} -+ -+/// A single inotify event. -+/// -+/// For more documentation see, [inotify(7)](http://man7.org/linux/man-pages/man7/inotify.7.html). -+#[derive(Debug)] -+pub struct InotifyEvent { -+ /// Watch descriptor. This field corresponds to the watch descriptor you -+ /// were issued when calling add_watch. It allows you to know which watch -+ /// this event comes from. -+ pub wd: WatchDescriptor, -+ /// Event mask. This field is a bitfield describing the exact event that -+ /// occured. -+ pub mask: AddWatchFlags, -+ /// This cookie is a number that allows you to connect related events. For -+ /// now only IN_MOVED_FROM and IN_MOVED_TO can be connected. -+ pub cookie: u32, -+ /// Filename. This field exists only if the event was triggered for a file -+ /// inside the watched directory. -+ pub name: Option<OsString> -+} -+ -+impl Inotify { -+ /// Initialize a new inotify instance. -+ /// -+ /// Returns a Result containing an inotify instance. -+ /// -+ /// For more information see, [inotify_init(2)](http://man7.org/linux/man-pages/man2/inotify_init.2.html). -+ pub fn init(flags: InitFlags) -> Result<Inotify> { -+ let res = Errno::result(unsafe { -+ libc::inotify_init1(flags.bits()) -+ }); -+ -+ res.map(|fd| Inotify { fd }) -+ } -+ -+ /// Adds a new watch on the target file or directory. -+ /// -+ /// Returns a watch descriptor. This is not a File Descriptor! -+ /// -+ /// For more information see, [inotify_add_watch(2)](http://man7.org/linux/man-pages/man2/inotify_add_watch.2.html). -+ pub fn add_watch<P: ?Sized + NixPath>(&self, -+ path: &P, -+ mask: AddWatchFlags) -+ -> Result<WatchDescriptor> -+ { -+ let res = path.with_nix_path(|cstr| { -+ unsafe { -+ libc::inotify_add_watch(self.fd, cstr.as_ptr(), mask.bits()) -+ } -+ })?; -+ -+ Errno::result(res).map(|wd| WatchDescriptor { wd }) -+ } -+ -+ /// Removes an existing watch using the watch descriptor returned by -+ /// inotify_add_watch. -+ /// -+ /// Returns an EINVAL error if the watch descriptor is invalid. -+ /// -+ /// For more information see, [inotify_rm_watch(2)](http://man7.org/linux/man-pages/man2/inotify_rm_watch.2.html). -+ #[cfg(target_os = "linux")] -+ pub fn rm_watch(&self, wd: WatchDescriptor) -> Result<()> { -+ let res = unsafe { libc::inotify_rm_watch(self.fd, wd.wd) }; -+ -+ Errno::result(res).map(drop) -+ } -+ -+ #[cfg(target_os = "android")] -+ pub fn rm_watch(&self, wd: WatchDescriptor) -> Result<()> { -+ let res = unsafe { libc::inotify_rm_watch(self.fd, wd.wd as u32) }; -+ -+ Errno::result(res).map(drop) -+ } -+ -+ /// Reads a collection of events from the inotify file descriptor. This call -+ /// can either be blocking or non blocking depending on whether IN_NONBLOCK -+ /// was set at initialization. -+ /// -+ /// Returns as many events as available. If the call was non blocking and no -+ /// events could be read then the EAGAIN error is returned. -+ pub fn read_events(&self) -> Result<Vec<InotifyEvent>> { -+ let header_size = size_of::<libc::inotify_event>(); -+ let mut buffer = [0u8; 4096]; -+ let mut events = Vec::new(); -+ let mut offset = 0; -+ -+ let nread = read(self.fd, &mut buffer)?; -+ -+ while (nread - offset) >= header_size { -+ let event = unsafe { -+ &*( -+ buffer -+ .as_ptr() -+ .offset(offset as isize) as *const libc::inotify_event -+ ) -+ }; -+ -+ let name = match event.len { -+ 0 => None, -+ _ => { -+ let ptr = unsafe { -+ buffer -+ .as_ptr() -+ .offset(offset as isize + header_size as isize) -+ as *const c_char -+ }; -+ let cstr = unsafe { CStr::from_ptr(ptr) }; -+ -+ Some(OsStr::from_bytes(cstr.to_bytes()).to_owned()) -+ } -+ }; -+ -+ events.push(InotifyEvent { -+ wd: WatchDescriptor { wd: event.wd }, -+ mask: AddWatchFlags::from_bits_truncate(event.mask), -+ cookie: event.cookie, -+ name -+ }); -+ -+ offset += header_size + event.len as usize; -+ } -+ -+ Ok(events) -+ } -+} -+ -+impl AsRawFd for Inotify { -+ fn as_raw_fd(&self) -> RawFd { -+ self.fd -+ } -+} -+ -+impl FromRawFd for Inotify { -+ unsafe fn from_raw_fd(fd: RawFd) -> Self { -+ Inotify { fd } -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/ioctl/bsd.rs b/third_party/rust/nix-0.15.0/src/sys/ioctl/bsd.rs -new file mode 100644 -index 0000000000000..9b8b0ff1a155f ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/ioctl/bsd.rs -@@ -0,0 +1,102 @@ -+/// The datatype used for the ioctl number -+#[doc(hidden)] -+pub type ioctl_num_type = ::libc::c_ulong; -+/// The datatype used for the 3rd argument -+#[doc(hidden)] -+pub type ioctl_param_type = ::libc::c_int; -+ -+mod consts { -+ use ::sys::ioctl::ioctl_num_type; -+ #[doc(hidden)] -+ pub const VOID: ioctl_num_type = 0x2000_0000; -+ #[doc(hidden)] -+ pub const OUT: ioctl_num_type = 0x4000_0000; -+ #[doc(hidden)] -+ pub const IN: ioctl_num_type = 0x8000_0000; -+ #[doc(hidden)] -+ pub const INOUT: ioctl_num_type = (IN|OUT); -+ #[doc(hidden)] -+ pub const IOCPARM_MASK: ioctl_num_type = 0x1fff; -+} -+ -+pub use self::consts::*; -+ -+#[macro_export] -+#[doc(hidden)] -+macro_rules! ioc { -+ ($inout:expr, $group:expr, $num:expr, $len:expr) => ( -+ $inout | (($len as $crate::sys::ioctl::ioctl_num_type & $crate::sys::ioctl::IOCPARM_MASK) << 16) | (($group as $crate::sys::ioctl::ioctl_num_type) << 8) | ($num as $crate::sys::ioctl::ioctl_num_type) -+ ) -+} -+ -+/// Generate an ioctl request code for a command that passes no data. -+/// -+/// This is equivalent to the `_IO()` macro exposed by the C ioctl API. -+/// -+/// You should only use this macro directly if the `ioctl` you're working -+/// with is "bad" and you cannot use `ioctl_none!()` directly. -+/// -+/// # Example -+/// -+/// ``` -+/// # #[macro_use] extern crate nix; -+/// const KVMIO: u8 = 0xAE; -+/// ioctl_write_int_bad!(kvm_create_vm, request_code_none!(KVMIO, 0x03)); -+/// # fn main() {} -+/// ``` -+#[macro_export(local_inner_macros)] -+macro_rules! request_code_none { -+ ($g:expr, $n:expr) => (ioc!($crate::sys::ioctl::VOID, $g, $n, 0)) -+} -+ -+/// Generate an ioctl request code for a command that passes an integer -+/// -+/// This is equivalent to the `_IOWINT()` macro exposed by the C ioctl API. -+/// -+/// You should only use this macro directly if the `ioctl` you're working -+/// with is "bad" and you cannot use `ioctl_write_int!()` directly. -+#[macro_export(local_inner_macros)] -+macro_rules! request_code_write_int { -+ ($g:expr, $n:expr) => (ioc!($crate::sys::ioctl::VOID, $g, $n, ::std::mem::size_of::<$crate::libc::c_int>())) -+} -+ -+/// Generate an ioctl request code for a command that reads. -+/// -+/// This is equivalent to the `_IOR()` macro exposed by the C ioctl API. -+/// -+/// You should only use this macro directly if the `ioctl` you're working -+/// with is "bad" and you cannot use `ioctl_read!()` directly. -+/// -+/// The read/write direction is relative to userland, so this -+/// command would be userland is reading and the kernel is -+/// writing. -+#[macro_export(local_inner_macros)] -+macro_rules! request_code_read { -+ ($g:expr, $n:expr, $len:expr) => (ioc!($crate::sys::ioctl::OUT, $g, $n, $len)) -+} -+ -+/// Generate an ioctl request code for a command that writes. -+/// -+/// This is equivalent to the `_IOW()` macro exposed by the C ioctl API. -+/// -+/// You should only use this macro directly if the `ioctl` you're working -+/// with is "bad" and you cannot use `ioctl_write!()` directly. -+/// -+/// The read/write direction is relative to userland, so this -+/// command would be userland is writing and the kernel is -+/// reading. -+#[macro_export(local_inner_macros)] -+macro_rules! request_code_write { -+ ($g:expr, $n:expr, $len:expr) => (ioc!($crate::sys::ioctl::IN, $g, $n, $len)) -+} -+ -+/// Generate an ioctl request code for a command that reads and writes. -+/// -+/// This is equivalent to the `_IOWR()` macro exposed by the C ioctl API. -+/// -+/// You should only use this macro directly if the `ioctl` you're working -+/// with is "bad" and you cannot use `ioctl_readwrite!()` directly. -+#[macro_export(local_inner_macros)] -+macro_rules! request_code_readwrite { -+ ($g:expr, $n:expr, $len:expr) => (ioc!($crate::sys::ioctl::INOUT, $g, $n, $len)) -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/ioctl/linux.rs b/third_party/rust/nix-0.15.0/src/sys/ioctl/linux.rs -new file mode 100644 -index 0000000000000..9cdac72a4b80b ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/ioctl/linux.rs -@@ -0,0 +1,140 @@ -+/// The datatype used for the ioctl number -+#[cfg(any(target_os = "android", target_env = "musl"))] -+#[doc(hidden)] -+pub type ioctl_num_type = ::libc::c_int; -+#[cfg(not(any(target_os = "android", target_env = "musl")))] -+#[doc(hidden)] -+pub type ioctl_num_type = ::libc::c_ulong; -+/// The datatype used for the 3rd argument -+#[doc(hidden)] -+pub type ioctl_param_type = ::libc::c_ulong; -+ -+#[doc(hidden)] -+pub const NRBITS: ioctl_num_type = 8; -+#[doc(hidden)] -+pub const TYPEBITS: ioctl_num_type = 8; -+ -+#[cfg(any(target_arch = "mips", target_arch = "mips64", target_arch = "powerpc", target_arch = "powerpc64", target_arch = "sparc64"))] -+mod consts { -+ #[doc(hidden)] -+ pub const NONE: u8 = 1; -+ #[doc(hidden)] -+ pub const READ: u8 = 2; -+ #[doc(hidden)] -+ pub const WRITE: u8 = 4; -+ #[doc(hidden)] -+ pub const SIZEBITS: u8 = 13; -+ #[doc(hidden)] -+ pub const DIRBITS: u8 = 3; -+} -+ -+// "Generic" ioctl protocol -+#[cfg(any(target_arch = "x86", -+ target_arch = "arm", -+ target_arch = "s390x", -+ target_arch = "x86_64", -+ target_arch = "aarch64"))] -+mod consts { -+ #[doc(hidden)] -+ pub const NONE: u8 = 0; -+ #[doc(hidden)] -+ pub const READ: u8 = 2; -+ #[doc(hidden)] -+ pub const WRITE: u8 = 1; -+ #[doc(hidden)] -+ pub const SIZEBITS: u8 = 14; -+ #[doc(hidden)] -+ pub const DIRBITS: u8 = 2; -+} -+ -+pub use self::consts::*; -+ -+#[doc(hidden)] -+pub const NRSHIFT: ioctl_num_type = 0; -+#[doc(hidden)] -+pub const TYPESHIFT: ioctl_num_type = NRSHIFT + NRBITS as ioctl_num_type; -+#[doc(hidden)] -+pub const SIZESHIFT: ioctl_num_type = TYPESHIFT + TYPEBITS as ioctl_num_type; -+#[doc(hidden)] -+pub const DIRSHIFT: ioctl_num_type = SIZESHIFT + SIZEBITS as ioctl_num_type; -+ -+#[doc(hidden)] -+pub const NRMASK: ioctl_num_type = (1 << NRBITS) - 1; -+#[doc(hidden)] -+pub const TYPEMASK: ioctl_num_type = (1 << TYPEBITS) - 1; -+#[doc(hidden)] -+pub const SIZEMASK: ioctl_num_type = (1 << SIZEBITS) - 1; -+#[doc(hidden)] -+pub const DIRMASK: ioctl_num_type = (1 << DIRBITS) - 1; -+ -+/// Encode an ioctl command. -+#[macro_export] -+#[doc(hidden)] -+macro_rules! ioc { -+ ($dir:expr, $ty:expr, $nr:expr, $sz:expr) => ( -+ (($dir as $crate::sys::ioctl::ioctl_num_type & $crate::sys::ioctl::DIRMASK) << $crate::sys::ioctl::DIRSHIFT) | -+ (($ty as $crate::sys::ioctl::ioctl_num_type & $crate::sys::ioctl::TYPEMASK) << $crate::sys::ioctl::TYPESHIFT) | -+ (($nr as $crate::sys::ioctl::ioctl_num_type & $crate::sys::ioctl::NRMASK) << $crate::sys::ioctl::NRSHIFT) | -+ (($sz as $crate::sys::ioctl::ioctl_num_type & $crate::sys::ioctl::SIZEMASK) << $crate::sys::ioctl::SIZESHIFT)) -+} -+ -+/// Generate an ioctl request code for a command that passes no data. -+/// -+/// This is equivalent to the `_IO()` macro exposed by the C ioctl API. -+/// -+/// You should only use this macro directly if the `ioctl` you're working -+/// with is "bad" and you cannot use `ioctl_none!()` directly. -+/// -+/// # Example -+/// -+/// ``` -+/// # #[macro_use] extern crate nix; -+/// const KVMIO: u8 = 0xAE; -+/// ioctl_write_int_bad!(kvm_create_vm, request_code_none!(KVMIO, 0x03)); -+/// # fn main() {} -+/// ``` -+#[macro_export(local_inner_macros)] -+macro_rules! request_code_none { -+ ($ty:expr, $nr:expr) => (ioc!($crate::sys::ioctl::NONE, $ty, $nr, 0)) -+} -+ -+/// Generate an ioctl request code for a command that reads. -+/// -+/// This is equivalent to the `_IOR()` macro exposed by the C ioctl API. -+/// -+/// You should only use this macro directly if the `ioctl` you're working -+/// with is "bad" and you cannot use `ioctl_read!()` directly. -+/// -+/// The read/write direction is relative to userland, so this -+/// command would be userland is reading and the kernel is -+/// writing. -+#[macro_export(local_inner_macros)] -+macro_rules! request_code_read { -+ ($ty:expr, $nr:expr, $sz:expr) => (ioc!($crate::sys::ioctl::READ, $ty, $nr, $sz)) -+} -+ -+/// Generate an ioctl request code for a command that writes. -+/// -+/// This is equivalent to the `_IOW()` macro exposed by the C ioctl API. -+/// -+/// You should only use this macro directly if the `ioctl` you're working -+/// with is "bad" and you cannot use `ioctl_write!()` directly. -+/// -+/// The read/write direction is relative to userland, so this -+/// command would be userland is writing and the kernel is -+/// reading. -+#[macro_export(local_inner_macros)] -+macro_rules! request_code_write { -+ ($ty:expr, $nr:expr, $sz:expr) => (ioc!($crate::sys::ioctl::WRITE, $ty, $nr, $sz)) -+} -+ -+/// Generate an ioctl request code for a command that reads and writes. -+/// -+/// This is equivalent to the `_IOWR()` macro exposed by the C ioctl API. -+/// -+/// You should only use this macro directly if the `ioctl` you're working -+/// with is "bad" and you cannot use `ioctl_readwrite!()` directly. -+#[macro_export(local_inner_macros)] -+macro_rules! request_code_readwrite { -+ ($ty:expr, $nr:expr, $sz:expr) => (ioc!($crate::sys::ioctl::READ | $crate::sys::ioctl::WRITE, $ty, $nr, $sz)) -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/ioctl/mod.rs b/third_party/rust/nix-0.15.0/src/sys/ioctl/mod.rs -new file mode 100644 -index 0000000000000..4513bf877434a ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/ioctl/mod.rs -@@ -0,0 +1,778 @@ -+//! Provide helpers for making ioctl system calls. -+//! -+//! This library is pretty low-level and messy. `ioctl` is not fun. -+//! -+//! What is an `ioctl`? -+//! =================== -+//! -+//! The `ioctl` syscall is the grab-bag syscall on POSIX systems. Don't want to add a new -+//! syscall? Make it an `ioctl`! `ioctl` refers to both the syscall, and the commands that can be -+//! sent with it. `ioctl` stands for "IO control", and the commands are always sent to a file -+//! descriptor. -+//! -+//! It is common to see `ioctl`s used for the following purposes: -+//! -+//! * Provide read/write access to out-of-band data related to a device such as configuration -+//! (for instance, setting serial port options) -+//! * Provide a mechanism for performing full-duplex data transfers (for instance, xfer on SPI -+//! devices). -+//! * Provide access to control functions on a device (for example, on Linux you can send -+//! commands like pause, resume, and eject to the CDROM device. -+//! * Do whatever else the device driver creator thought made most sense. -+//! -+//! `ioctl`s are synchronous system calls and are similar to read and write calls in that regard. -+//! They operate on file descriptors and have an identifier that specifies what the ioctl is. -+//! Additionally they may read or write data and therefore need to pass along a data pointer. -+//! Besides the semantics of the ioctls being confusing, the generation of this identifer can also -+//! be difficult. -+//! -+//! Historically `ioctl` numbers were arbitrary hard-coded values. In Linux (before 2.6) and some -+//! unices this has changed to a more-ordered system where the ioctl numbers are partitioned into -+//! subcomponents (For linux this is documented in -+//! [`Documentation/ioctl/ioctl-number.txt`](http://elixir.free-electrons.com/linux/latest/source/Documentation/ioctl/ioctl-number.txt)): -+//! -+//! * Number: The actual ioctl ID -+//! * Type: A grouping of ioctls for a common purpose or driver -+//! * Size: The size in bytes of the data that will be transferred -+//! * Direction: Whether there is any data and if it's read, write, or both -+//! -+//! Newer drivers should not generate complete integer identifiers for their `ioctl`s instead -+//! preferring to use the 4 components above to generate the final ioctl identifier. Because of -+//! how old `ioctl`s are, however, there are many hard-coded `ioctl` identifiers. These are -+//! commonly referred to as "bad" in `ioctl` documentation. -+//! -+//! Defining `ioctl`s -+//! ================= -+//! -+//! This library provides several `ioctl_*!` macros for binding `ioctl`s. These generate public -+//! unsafe functions that can then be used for calling the ioctl. This macro has a few different -+//! ways it can be used depending on the specific ioctl you're working with. -+//! -+//! A simple `ioctl` is `SPI_IOC_RD_MODE`. This ioctl works with the SPI interface on Linux. This -+//! specific `ioctl` reads the mode of the SPI device as a `u8`. It's declared in -+//! `/include/uapi/linux/spi/spidev.h` as `_IOR(SPI_IOC_MAGIC, 1, __u8)`. Since it uses the `_IOR` -+//! macro, we know it's a `read` ioctl and can use the `ioctl_read!` macro as follows: -+//! -+//! ``` -+//! # #[macro_use] extern crate nix; -+//! const SPI_IOC_MAGIC: u8 = b'k'; // Defined in linux/spi/spidev.h -+//! const SPI_IOC_TYPE_MODE: u8 = 1; -+//! ioctl_read!(spi_read_mode, SPI_IOC_MAGIC, SPI_IOC_TYPE_MODE, u8); -+//! # fn main() {} -+//! ``` -+//! -+//! This generates the function: -+//! -+//! ``` -+//! # #[macro_use] extern crate nix; -+//! # use std::mem; -+//! # use nix::{libc, Result}; -+//! # use nix::errno::Errno; -+//! # use nix::libc::c_int as c_int; -+//! # const SPI_IOC_MAGIC: u8 = b'k'; // Defined in linux/spi/spidev.h -+//! # const SPI_IOC_TYPE_MODE: u8 = 1; -+//! pub unsafe fn spi_read_mode(fd: c_int, data: *mut u8) -> Result<c_int> { -+//! let res = libc::ioctl(fd, request_code_read!(SPI_IOC_MAGIC, SPI_IOC_TYPE_MODE, mem::size_of::<u8>()), data); -+//! Errno::result(res) -+//! } -+//! # fn main() {} -+//! ``` -+//! -+//! The return value for the wrapper functions generated by the `ioctl_*!` macros are `nix::Error`s. -+//! These are generated by assuming the return value of the ioctl is `-1` on error and everything -+//! else is a valid return value. If this is not the case, `Result::map` can be used to map some -+//! of the range of "good" values (-Inf..-2, 0..Inf) into a smaller range in a helper function. -+//! -+//! Writing `ioctl`s generally use pointers as their data source and these should use the -+//! `ioctl_write_ptr!`. But in some cases an `int` is passed directly. For these `ioctl`s use the -+//! `ioctl_write_int!` macro. This variant does not take a type as the last argument: -+//! -+//! ``` -+//! # #[macro_use] extern crate nix; -+//! const HCI_IOC_MAGIC: u8 = b'k'; -+//! const HCI_IOC_HCIDEVUP: u8 = 1; -+//! ioctl_write_int!(hci_dev_up, HCI_IOC_MAGIC, HCI_IOC_HCIDEVUP); -+//! # fn main() {} -+//! ``` -+//! -+//! Some `ioctl`s don't transfer any data, and those should use `ioctl_none!`. This macro -+//! doesn't take a type and so it is declared similar to the `write_int` variant shown above. -+//! -+//! The mode for a given `ioctl` should be clear from the documentation if it has good -+//! documentation. Otherwise it will be clear based on the macro used to generate the `ioctl` -+//! number where `_IO`, `_IOR`, `_IOW`, and `_IOWR` map to "none", "read", "write_*", and "readwrite" -+//! respectively. To determine the specific `write_` variant to use you'll need to find -+//! what the argument type is supposed to be. If it's an `int`, then `write_int` should be used, -+//! otherwise it should be a pointer and `write_ptr` should be used. On Linux the -+//! [`ioctl_list` man page](http://man7.org/linux/man-pages/man2/ioctl_list.2.html) describes a -+//! large number of `ioctl`s and describes their argument data type. -+//! -+//! Using "bad" `ioctl`s -+//! -------------------- -+//! -+//! As mentioned earlier, there are many old `ioctl`s that do not use the newer method of -+//! generating `ioctl` numbers and instead use hardcoded values. These can be used with the -+//! `ioctl_*_bad!` macros. This naming comes from the Linux kernel which refers to these -+//! `ioctl`s as "bad". These are a different variant as they bypass calling the macro that generates -+//! the ioctl number and instead use the defined value directly. -+//! -+//! For example the `TCGETS` `ioctl` reads a `termios` data structure for a given file descriptor. -+//! It's defined as `0x5401` in `ioctls.h` on Linux and can be implemented as: -+//! -+//! ``` -+//! # #[macro_use] extern crate nix; -+//! # #[cfg(any(target_os = "android", target_os = "linux"))] -+//! # use nix::libc::TCGETS as TCGETS; -+//! # #[cfg(any(target_os = "android", target_os = "linux"))] -+//! # use nix::libc::termios as termios; -+//! # #[cfg(any(target_os = "android", target_os = "linux"))] -+//! ioctl_read_bad!(tcgets, TCGETS, termios); -+//! # fn main() {} -+//! ``` -+//! -+//! The generated function has the same form as that generated by `ioctl_read!`: -+//! -+//! ```text -+//! pub unsafe fn tcgets(fd: c_int, data: *mut termios) -> Result<c_int>; -+//! ``` -+//! -+//! Working with Arrays -+//! ------------------- -+//! -+//! Some `ioctl`s work with entire arrays of elements. These are supported by the `ioctl_*_buf` -+//! family of macros: `ioctl_read_buf`, `ioctl_write_buf`, and `ioctl_readwrite_buf`. Note that -+//! there are no "bad" versions for working with buffers. The generated functions include a `len` -+//! argument to specify the number of elements (where the type of each element is specified in the -+//! macro). -+//! -+//! Again looking to the SPI `ioctl`s on Linux for an example, there is a `SPI_IOC_MESSAGE` `ioctl` -+//! that queues up multiple SPI messages by writing an entire array of `spi_ioc_transfer` structs. -+//! `linux/spi/spidev.h` defines a macro to calculate the `ioctl` number like: -+//! -+//! ```C -+//! #define SPI_IOC_MAGIC 'k' -+//! #define SPI_MSGSIZE(N) ... -+//! #define SPI_IOC_MESSAGE(N) _IOW(SPI_IOC_MAGIC, 0, char[SPI_MSGSIZE(N)]) -+//! ``` -+//! -+//! The `SPI_MSGSIZE(N)` calculation is already handled by the `ioctl_*!` macros, so all that's -+//! needed to define this `ioctl` is: -+//! -+//! ``` -+//! # #[macro_use] extern crate nix; -+//! const SPI_IOC_MAGIC: u8 = b'k'; // Defined in linux/spi/spidev.h -+//! const SPI_IOC_TYPE_MESSAGE: u8 = 0; -+//! # pub struct spi_ioc_transfer(u64); -+//! ioctl_write_buf!(spi_transfer, SPI_IOC_MAGIC, SPI_IOC_TYPE_MESSAGE, spi_ioc_transfer); -+//! # fn main() {} -+//! ``` -+//! -+//! This generates a function like: -+//! -+//! ``` -+//! # #[macro_use] extern crate nix; -+//! # use std::mem; -+//! # use nix::{libc, Result}; -+//! # use nix::errno::Errno; -+//! # use nix::libc::c_int as c_int; -+//! # const SPI_IOC_MAGIC: u8 = b'k'; -+//! # const SPI_IOC_TYPE_MESSAGE: u8 = 0; -+//! # pub struct spi_ioc_transfer(u64); -+//! pub unsafe fn spi_message(fd: c_int, data: &mut [spi_ioc_transfer]) -> Result<c_int> { -+//! let res = libc::ioctl(fd, -+//! request_code_write!(SPI_IOC_MAGIC, SPI_IOC_TYPE_MESSAGE, data.len() * mem::size_of::<spi_ioc_transfer>()), -+//! data); -+//! Errno::result(res) -+//! } -+//! # fn main() {} -+//! ``` -+//! -+//! Finding `ioctl` Documentation -+//! ----------------------------- -+//! -+//! For Linux, look at your system's headers. For example, `/usr/include/linux/input.h` has a lot -+//! of lines defining macros which use `_IO`, `_IOR`, `_IOW`, `_IOC`, and `_IOWR`. Some `ioctl`s are -+//! documented directly in the headers defining their constants, but others have more extensive -+//! documentation in man pages (like termios' `ioctl`s which are in `tty_ioctl(4)`). -+//! -+//! Documenting the Generated Functions -+//! =================================== -+//! -+//! In many cases, users will wish for the functions generated by the `ioctl` -+//! macro to be public and documented. For this reason, the generated functions -+//! are public by default. If you wish to hide the ioctl, you will need to put -+//! them in a private module. -+//! -+//! For documentation, it is possible to use doc comments inside the `ioctl_*!` macros. Here is an -+//! example : -+//! -+//! ``` -+//! # #[macro_use] extern crate nix; -+//! # use nix::libc::c_int; -+//! ioctl_read! { -+//! /// Make the given terminal the controlling terminal of the calling process. The calling -+//! /// process must be a session leader and not have a controlling terminal already. If the -+//! /// terminal is already the controlling terminal of a different session group then the -+//! /// ioctl will fail with **EPERM**, unless the caller is root (more precisely: has the -+//! /// **CAP_SYS_ADMIN** capability) and arg equals 1, in which case the terminal is stolen -+//! /// and all processes that had it as controlling terminal lose it. -+//! tiocsctty, b't', 19, c_int -+//! } -+//! -+//! # fn main() {} -+//! ``` -+#[cfg(any(target_os = "android", target_os = "linux"))] -+#[macro_use] -+mod linux; -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+pub use self::linux::*; -+ -+#[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+#[macro_use] -+mod bsd; -+ -+#[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+pub use self::bsd::*; -+ -+/// Convert raw ioctl return value to a Nix result -+#[macro_export] -+#[doc(hidden)] -+macro_rules! convert_ioctl_res { -+ ($w:expr) => ( -+ { -+ $crate::errno::Errno::result($w) -+ } -+ ); -+} -+ -+/// Generates a wrapper function for an ioctl that passes no data to the kernel. -+/// -+/// The arguments to this macro are: -+/// -+/// * The function name -+/// * The ioctl identifier -+/// * The ioctl sequence number -+/// -+/// The generated function has the following signature: -+/// -+/// ```rust,ignore -+/// pub unsafe fn FUNCTION_NAME(fd: libc::c_int) -> Result<libc::c_int> -+/// ``` -+/// -+/// For a more in-depth explanation of ioctls, see [`::sys::ioctl`](sys/ioctl/index.html). -+/// -+/// # Example -+/// -+/// The `videodev2` driver on Linux defines the `log_status` `ioctl` as: -+/// -+/// ```C -+/// #define VIDIOC_LOG_STATUS _IO('V', 70) -+/// ``` -+/// -+/// This can be implemented in Rust like: -+/// -+/// ```no_run -+/// # #[macro_use] extern crate nix; -+/// ioctl_none!(log_status, b'V', 70); -+/// fn main() {} -+/// ``` -+#[macro_export(local_inner_macros)] -+macro_rules! ioctl_none { -+ ($(#[$attr:meta])* $name:ident, $ioty:expr, $nr:expr) => ( -+ $(#[$attr])* -+ pub unsafe fn $name(fd: $crate::libc::c_int) -+ -> $crate::Result<$crate::libc::c_int> { -+ convert_ioctl_res!($crate::libc::ioctl(fd, request_code_none!($ioty, $nr) as $crate::sys::ioctl::ioctl_num_type)) -+ } -+ ) -+} -+ -+/// Generates a wrapper function for a "bad" ioctl that passes no data to the kernel. -+/// -+/// The arguments to this macro are: -+/// -+/// * The function name -+/// * The ioctl request code -+/// -+/// The generated function has the following signature: -+/// -+/// ```rust,ignore -+/// pub unsafe fn FUNCTION_NAME(fd: libc::c_int) -> Result<libc::c_int> -+/// ``` -+/// -+/// For a more in-depth explanation of ioctls, see [`::sys::ioctl`](sys/ioctl/index.html). -+/// -+/// # Example -+/// -+/// ```no_run -+/// # #[macro_use] extern crate nix; -+/// # extern crate libc; -+/// # use libc::TIOCNXCL; -+/// # use std::fs::File; -+/// # use std::os::unix::io::AsRawFd; -+/// ioctl_none_bad!(tiocnxcl, TIOCNXCL); -+/// fn main() { -+/// let file = File::open("/dev/ttyUSB0").unwrap(); -+/// unsafe { tiocnxcl(file.as_raw_fd()) }.unwrap(); -+/// } -+/// ``` -+// TODO: add an example using request_code_*!() -+#[macro_export(local_inner_macros)] -+macro_rules! ioctl_none_bad { -+ ($(#[$attr:meta])* $name:ident, $nr:expr) => ( -+ $(#[$attr])* -+ pub unsafe fn $name(fd: $crate::libc::c_int) -+ -> $crate::Result<$crate::libc::c_int> { -+ convert_ioctl_res!($crate::libc::ioctl(fd, $nr as $crate::sys::ioctl::ioctl_num_type)) -+ } -+ ) -+} -+ -+/// Generates a wrapper function for an ioctl that reads data from the kernel. -+/// -+/// The arguments to this macro are: -+/// -+/// * The function name -+/// * The ioctl identifier -+/// * The ioctl sequence number -+/// * The data type passed by this ioctl -+/// -+/// The generated function has the following signature: -+/// -+/// ```rust,ignore -+/// pub unsafe fn FUNCTION_NAME(fd: libc::c_int, data: *mut DATA_TYPE) -> Result<libc::c_int> -+/// ``` -+/// -+/// For a more in-depth explanation of ioctls, see [`::sys::ioctl`](sys/ioctl/index.html). -+/// -+/// # Example -+/// -+/// ``` -+/// # #[macro_use] extern crate nix; -+/// const SPI_IOC_MAGIC: u8 = b'k'; // Defined in linux/spi/spidev.h -+/// const SPI_IOC_TYPE_MODE: u8 = 1; -+/// ioctl_read!(spi_read_mode, SPI_IOC_MAGIC, SPI_IOC_TYPE_MODE, u8); -+/// # fn main() {} -+/// ``` -+#[macro_export(local_inner_macros)] -+macro_rules! ioctl_read { -+ ($(#[$attr:meta])* $name:ident, $ioty:expr, $nr:expr, $ty:ty) => ( -+ $(#[$attr])* -+ pub unsafe fn $name(fd: $crate::libc::c_int, -+ data: *mut $ty) -+ -> $crate::Result<$crate::libc::c_int> { -+ convert_ioctl_res!($crate::libc::ioctl(fd, request_code_read!($ioty, $nr, ::std::mem::size_of::<$ty>()) as $crate::sys::ioctl::ioctl_num_type, data)) -+ } -+ ) -+} -+ -+/// Generates a wrapper function for a "bad" ioctl that reads data from the kernel. -+/// -+/// The arguments to this macro are: -+/// -+/// * The function name -+/// * The ioctl request code -+/// * The data type passed by this ioctl -+/// -+/// The generated function has the following signature: -+/// -+/// ```rust,ignore -+/// pub unsafe fn FUNCTION_NAME(fd: libc::c_int, data: *mut DATA_TYPE) -> Result<libc::c_int> -+/// ``` -+/// -+/// For a more in-depth explanation of ioctls, see [`::sys::ioctl`](sys/ioctl/index.html). -+/// -+/// # Example -+/// -+/// ``` -+/// # extern crate libc; -+/// # #[macro_use] extern crate nix; -+/// # #[cfg(any(target_os = "android", target_os = "linux"))] -+/// ioctl_read_bad!(tcgets, libc::TCGETS, libc::termios); -+/// # fn main() {} -+/// ``` -+#[macro_export(local_inner_macros)] -+macro_rules! ioctl_read_bad { -+ ($(#[$attr:meta])* $name:ident, $nr:expr, $ty:ty) => ( -+ $(#[$attr])* -+ pub unsafe fn $name(fd: $crate::libc::c_int, -+ data: *mut $ty) -+ -> $crate::Result<$crate::libc::c_int> { -+ convert_ioctl_res!($crate::libc::ioctl(fd, $nr as $crate::sys::ioctl::ioctl_num_type, data)) -+ } -+ ) -+} -+ -+/// Generates a wrapper function for an ioctl that writes data through a pointer to the kernel. -+/// -+/// The arguments to this macro are: -+/// -+/// * The function name -+/// * The ioctl identifier -+/// * The ioctl sequence number -+/// * The data type passed by this ioctl -+/// -+/// The generated function has the following signature: -+/// -+/// ```rust,ignore -+/// pub unsafe fn FUNCTION_NAME(fd: libc::c_int, data: *const DATA_TYPE) -> Result<libc::c_int> -+/// ``` -+/// -+/// For a more in-depth explanation of ioctls, see [`::sys::ioctl`](sys/ioctl/index.html). -+/// -+/// # Example -+/// -+/// ``` -+/// # #[macro_use] extern crate nix; -+/// # pub struct v4l2_audio {} -+/// ioctl_write_ptr!(s_audio, b'V', 34, v4l2_audio); -+/// # fn main() {} -+/// ``` -+#[macro_export(local_inner_macros)] -+macro_rules! ioctl_write_ptr { -+ ($(#[$attr:meta])* $name:ident, $ioty:expr, $nr:expr, $ty:ty) => ( -+ $(#[$attr])* -+ pub unsafe fn $name(fd: $crate::libc::c_int, -+ data: *const $ty) -+ -> $crate::Result<$crate::libc::c_int> { -+ convert_ioctl_res!($crate::libc::ioctl(fd, request_code_write!($ioty, $nr, ::std::mem::size_of::<$ty>()) as $crate::sys::ioctl::ioctl_num_type, data)) -+ } -+ ) -+} -+ -+/// Generates a wrapper function for a "bad" ioctl that writes data through a pointer to the kernel. -+/// -+/// The arguments to this macro are: -+/// -+/// * The function name -+/// * The ioctl request code -+/// * The data type passed by this ioctl -+/// -+/// The generated function has the following signature: -+/// -+/// ```rust,ignore -+/// pub unsafe fn FUNCTION_NAME(fd: libc::c_int, data: *const DATA_TYPE) -> Result<libc::c_int> -+/// ``` -+/// -+/// For a more in-depth explanation of ioctls, see [`::sys::ioctl`](sys/ioctl/index.html). -+/// -+/// # Example -+/// -+/// ``` -+/// # extern crate libc; -+/// # #[macro_use] extern crate nix; -+/// # #[cfg(any(target_os = "android", target_os = "linux"))] -+/// ioctl_write_ptr_bad!(tcsets, libc::TCSETS, libc::termios); -+/// # fn main() {} -+/// ``` -+#[macro_export(local_inner_macros)] -+macro_rules! ioctl_write_ptr_bad { -+ ($(#[$attr:meta])* $name:ident, $nr:expr, $ty:ty) => ( -+ $(#[$attr])* -+ pub unsafe fn $name(fd: $crate::libc::c_int, -+ data: *const $ty) -+ -> $crate::Result<$crate::libc::c_int> { -+ convert_ioctl_res!($crate::libc::ioctl(fd, $nr as $crate::sys::ioctl::ioctl_num_type, data)) -+ } -+ ) -+} -+ -+cfg_if!{ -+ if #[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] { -+ /// Generates a wrapper function for a ioctl that writes an integer to the kernel. -+ /// -+ /// The arguments to this macro are: -+ /// -+ /// * The function name -+ /// * The ioctl identifier -+ /// * The ioctl sequence number -+ /// -+ /// The generated function has the following signature: -+ /// -+ /// ```rust,ignore -+ /// pub unsafe fn FUNCTION_NAME(fd: libc::c_int, data: nix::sys::ioctl::ioctl_param_type) -> Result<libc::c_int> -+ /// ``` -+ /// -+ /// `nix::sys::ioctl::ioctl_param_type` depends on the OS: -+ /// * BSD - `libc::c_int` -+ /// * Linux - `libc::c_ulong` -+ /// -+ /// For a more in-depth explanation of ioctls, see [`::sys::ioctl`](sys/ioctl/index.html). -+ /// -+ /// # Example -+ /// -+ /// ``` -+ /// # #[macro_use] extern crate nix; -+ /// ioctl_write_int!(vt_activate, b'v', 4); -+ /// # fn main() {} -+ /// ``` -+ #[macro_export(local_inner_macros)] -+ macro_rules! ioctl_write_int { -+ ($(#[$attr:meta])* $name:ident, $ioty:expr, $nr:expr) => ( -+ $(#[$attr])* -+ pub unsafe fn $name(fd: $crate::libc::c_int, -+ data: $crate::sys::ioctl::ioctl_param_type) -+ -> $crate::Result<$crate::libc::c_int> { -+ convert_ioctl_res!($crate::libc::ioctl(fd, request_code_write_int!($ioty, $nr) as $crate::sys::ioctl::ioctl_num_type, data)) -+ } -+ ) -+ } -+ } else { -+ /// Generates a wrapper function for a ioctl that writes an integer to the kernel. -+ /// -+ /// The arguments to this macro are: -+ /// -+ /// * The function name -+ /// * The ioctl identifier -+ /// * The ioctl sequence number -+ /// -+ /// The generated function has the following signature: -+ /// -+ /// ```rust,ignore -+ /// pub unsafe fn FUNCTION_NAME(fd: libc::c_int, data: nix::sys::ioctl::ioctl_param_type) -> Result<libc::c_int> -+ /// ``` -+ /// -+ /// `nix::sys::ioctl::ioctl_param_type` depends on the OS: -+ /// * BSD - `libc::c_int` -+ /// * Linux - `libc::c_ulong` -+ /// -+ /// For a more in-depth explanation of ioctls, see [`::sys::ioctl`](sys/ioctl/index.html). -+ /// -+ /// # Example -+ /// -+ /// ``` -+ /// # #[macro_use] extern crate nix; -+ /// const HCI_IOC_MAGIC: u8 = b'k'; -+ /// const HCI_IOC_HCIDEVUP: u8 = 1; -+ /// ioctl_write_int!(hci_dev_up, HCI_IOC_MAGIC, HCI_IOC_HCIDEVUP); -+ /// # fn main() {} -+ /// ``` -+ #[macro_export(local_inner_macros)] -+ macro_rules! ioctl_write_int { -+ ($(#[$attr:meta])* $name:ident, $ioty:expr, $nr:expr) => ( -+ $(#[$attr])* -+ pub unsafe fn $name(fd: $crate::libc::c_int, -+ data: $crate::sys::ioctl::ioctl_param_type) -+ -> $crate::Result<$crate::libc::c_int> { -+ convert_ioctl_res!($crate::libc::ioctl(fd, request_code_write!($ioty, $nr, ::std::mem::size_of::<$crate::libc::c_int>()) as $crate::sys::ioctl::ioctl_num_type, data)) -+ } -+ ) -+ } -+ } -+} -+ -+/// Generates a wrapper function for a "bad" ioctl that writes an integer to the kernel. -+/// -+/// The arguments to this macro are: -+/// -+/// * The function name -+/// * The ioctl request code -+/// -+/// The generated function has the following signature: -+/// -+/// ```rust,ignore -+/// pub unsafe fn FUNCTION_NAME(fd: libc::c_int, data: libc::c_int) -> Result<libc::c_int> -+/// ``` -+/// -+/// For a more in-depth explanation of ioctls, see [`::sys::ioctl`](sys/ioctl/index.html). -+/// -+/// # Examples -+/// -+/// ``` -+/// # extern crate libc; -+/// # #[macro_use] extern crate nix; -+/// # #[cfg(any(target_os = "android", target_os = "linux"))] -+/// ioctl_write_int_bad!(tcsbrk, libc::TCSBRK); -+/// # fn main() {} -+/// ``` -+/// -+/// ```rust -+/// # #[macro_use] extern crate nix; -+/// const KVMIO: u8 = 0xAE; -+/// ioctl_write_int_bad!(kvm_create_vm, request_code_none!(KVMIO, 0x03)); -+/// # fn main() {} -+/// ``` -+#[macro_export(local_inner_macros)] -+macro_rules! ioctl_write_int_bad { -+ ($(#[$attr:meta])* $name:ident, $nr:expr) => ( -+ $(#[$attr])* -+ pub unsafe fn $name(fd: $crate::libc::c_int, -+ data: $crate::libc::c_int) -+ -> $crate::Result<$crate::libc::c_int> { -+ convert_ioctl_res!($crate::libc::ioctl(fd, $nr as $crate::sys::ioctl::ioctl_num_type, data)) -+ } -+ ) -+} -+ -+/// Generates a wrapper function for an ioctl that reads and writes data to the kernel. -+/// -+/// The arguments to this macro are: -+/// -+/// * The function name -+/// * The ioctl identifier -+/// * The ioctl sequence number -+/// * The data type passed by this ioctl -+/// -+/// The generated function has the following signature: -+/// -+/// ```rust,ignore -+/// pub unsafe fn FUNCTION_NAME(fd: libc::c_int, data: *mut DATA_TYPE) -> Result<libc::c_int> -+/// ``` -+/// -+/// For a more in-depth explanation of ioctls, see [`::sys::ioctl`](sys/ioctl/index.html). -+/// -+/// # Example -+/// -+/// ``` -+/// # #[macro_use] extern crate nix; -+/// # pub struct v4l2_audio {} -+/// ioctl_readwrite!(enum_audio, b'V', 65, v4l2_audio); -+/// # fn main() {} -+/// ``` -+#[macro_export(local_inner_macros)] -+macro_rules! ioctl_readwrite { -+ ($(#[$attr:meta])* $name:ident, $ioty:expr, $nr:expr, $ty:ty) => ( -+ $(#[$attr])* -+ pub unsafe fn $name(fd: $crate::libc::c_int, -+ data: *mut $ty) -+ -> $crate::Result<$crate::libc::c_int> { -+ convert_ioctl_res!($crate::libc::ioctl(fd, request_code_readwrite!($ioty, $nr, ::std::mem::size_of::<$ty>()) as $crate::sys::ioctl::ioctl_num_type, data)) -+ } -+ ) -+} -+ -+/// Generates a wrapper function for a "bad" ioctl that reads and writes data to the kernel. -+/// -+/// The arguments to this macro are: -+/// -+/// * The function name -+/// * The ioctl request code -+/// * The data type passed by this ioctl -+/// -+/// The generated function has the following signature: -+/// -+/// ```rust,ignore -+/// pub unsafe fn FUNCTION_NAME(fd: libc::c_int, data: *mut DATA_TYPE) -> Result<libc::c_int> -+/// ``` -+/// -+/// For a more in-depth explanation of ioctls, see [`::sys::ioctl`](sys/ioctl/index.html). -+// TODO: Find an example for ioctl_readwrite_bad -+#[macro_export(local_inner_macros)] -+macro_rules! ioctl_readwrite_bad { -+ ($(#[$attr:meta])* $name:ident, $nr:expr, $ty:ty) => ( -+ $(#[$attr])* -+ pub unsafe fn $name(fd: $crate::libc::c_int, -+ data: *mut $ty) -+ -> $crate::Result<$crate::libc::c_int> { -+ convert_ioctl_res!($crate::libc::ioctl(fd, $nr as $crate::sys::ioctl::ioctl_num_type, data)) -+ } -+ ) -+} -+ -+/// Generates a wrapper function for an ioctl that reads an array of elements from the kernel. -+/// -+/// The arguments to this macro are: -+/// -+/// * The function name -+/// * The ioctl identifier -+/// * The ioctl sequence number -+/// * The data type passed by this ioctl -+/// -+/// The generated function has the following signature: -+/// -+/// ```rust,ignore -+/// pub unsafe fn FUNCTION_NAME(fd: libc::c_int, data: &mut [DATA_TYPE]) -> Result<libc::c_int> -+/// ``` -+/// -+/// For a more in-depth explanation of ioctls, see [`::sys::ioctl`](sys/ioctl/index.html). -+// TODO: Find an example for ioctl_read_buf -+#[macro_export(local_inner_macros)] -+macro_rules! ioctl_read_buf { -+ ($(#[$attr:meta])* $name:ident, $ioty:expr, $nr:expr, $ty:ty) => ( -+ $(#[$attr])* -+ pub unsafe fn $name(fd: $crate::libc::c_int, -+ data: &mut [$ty]) -+ -> $crate::Result<$crate::libc::c_int> { -+ convert_ioctl_res!($crate::libc::ioctl(fd, request_code_read!($ioty, $nr, data.len() * ::std::mem::size_of::<$ty>()) as $crate::sys::ioctl::ioctl_num_type, data)) -+ } -+ ) -+} -+ -+/// Generates a wrapper function for an ioctl that writes an array of elements to the kernel. -+/// -+/// The arguments to this macro are: -+/// -+/// * The function name -+/// * The ioctl identifier -+/// * The ioctl sequence number -+/// * The data type passed by this ioctl -+/// -+/// The generated function has the following signature: -+/// -+/// ```rust,ignore -+/// pub unsafe fn FUNCTION_NAME(fd: libc::c_int, data: &[DATA_TYPE]) -> Result<libc::c_int> -+/// ``` -+/// -+/// For a more in-depth explanation of ioctls, see [`::sys::ioctl`](sys/ioctl/index.html). -+/// -+/// # Examples -+/// -+/// ``` -+/// # #[macro_use] extern crate nix; -+/// const SPI_IOC_MAGIC: u8 = b'k'; // Defined in linux/spi/spidev.h -+/// const SPI_IOC_TYPE_MESSAGE: u8 = 0; -+/// # pub struct spi_ioc_transfer(u64); -+/// ioctl_write_buf!(spi_transfer, SPI_IOC_MAGIC, SPI_IOC_TYPE_MESSAGE, spi_ioc_transfer); -+/// # fn main() {} -+/// ``` -+#[macro_export(local_inner_macros)] -+macro_rules! ioctl_write_buf { -+ ($(#[$attr:meta])* $name:ident, $ioty:expr, $nr:expr, $ty:ty) => ( -+ $(#[$attr])* -+ pub unsafe fn $name(fd: $crate::libc::c_int, -+ data: &[$ty]) -+ -> $crate::Result<$crate::libc::c_int> { -+ convert_ioctl_res!($crate::libc::ioctl(fd, request_code_write!($ioty, $nr, data.len() * ::std::mem::size_of::<$ty>()) as $crate::sys::ioctl::ioctl_num_type, data)) -+ } -+ ) -+} -+ -+/// Generates a wrapper function for an ioctl that reads and writes an array of elements to the kernel. -+/// -+/// The arguments to this macro are: -+/// -+/// * The function name -+/// * The ioctl identifier -+/// * The ioctl sequence number -+/// * The data type passed by this ioctl -+/// -+/// The generated function has the following signature: -+/// -+/// ```rust,ignore -+/// pub unsafe fn FUNCTION_NAME(fd: libc::c_int, data: &mut [DATA_TYPE]) -> Result<libc::c_int> -+/// ``` -+/// -+/// For a more in-depth explanation of ioctls, see [`::sys::ioctl`](sys/ioctl/index.html). -+// TODO: Find an example for readwrite_buf -+#[macro_export(local_inner_macros)] -+macro_rules! ioctl_readwrite_buf { -+ ($(#[$attr:meta])* $name:ident, $ioty:expr, $nr:expr, $ty:ty) => ( -+ $(#[$attr])* -+ pub unsafe fn $name(fd: $crate::libc::c_int, -+ data: &mut [$ty]) -+ -> $crate::Result<$crate::libc::c_int> { -+ convert_ioctl_res!($crate::libc::ioctl(fd, request_code_readwrite!($ioty, $nr, data.len() * ::std::mem::size_of::<$ty>()) as $crate::sys::ioctl::ioctl_num_type, data)) -+ } -+ ) -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/memfd.rs b/third_party/rust/nix-0.15.0/src/sys/memfd.rs -new file mode 100644 -index 0000000000000..9672429b31e7f ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/memfd.rs -@@ -0,0 +1,20 @@ -+use libc; -+use std::os::unix::io::RawFd; -+use Result; -+use errno::Errno; -+use std::ffi::CStr; -+ -+libc_bitflags!( -+ pub struct MemFdCreateFlag: libc::c_uint { -+ MFD_CLOEXEC; -+ MFD_ALLOW_SEALING; -+ } -+); -+ -+pub fn memfd_create(name: &CStr, flags: MemFdCreateFlag) -> Result<RawFd> { -+ let res = unsafe { -+ libc::syscall(libc::SYS_memfd_create, name.as_ptr(), flags.bits()) -+ }; -+ -+ Errno::result(res).map(|r| r as RawFd) -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/mman.rs b/third_party/rust/nix-0.15.0/src/sys/mman.rs -new file mode 100644 -index 0000000000000..4e250501dd0f0 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/mman.rs -@@ -0,0 +1,325 @@ -+use {Error, Result}; -+#[cfg(not(target_os = "android"))] -+use NixPath; -+use errno::Errno; -+#[cfg(not(target_os = "android"))] -+use fcntl::OFlag; -+use libc::{self, c_int, c_void, size_t, off_t}; -+#[cfg(not(target_os = "android"))] -+use sys::stat::Mode; -+use std::os::unix::io::RawFd; -+ -+libc_bitflags!{ -+ /// Desired memory protection of a memory mapping. -+ pub struct ProtFlags: c_int { -+ /// Pages cannot be accessed. -+ PROT_NONE; -+ /// Pages can be read. -+ PROT_READ; -+ /// Pages can be written. -+ PROT_WRITE; -+ /// Pages can be executed -+ PROT_EXEC; -+ /// Apply protection up to the end of a mapping that grows upwards. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ PROT_GROWSDOWN; -+ /// Apply protection down to the beginning of a mapping that grows downwards. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ PROT_GROWSUP; -+ } -+} -+ -+libc_bitflags!{ -+ /// Additional parameters for `mmap()`. -+ pub struct MapFlags: c_int { -+ /// Compatibility flag. Ignored. -+ MAP_FILE; -+ /// Share this mapping. Mutually exclusive with `MAP_PRIVATE`. -+ MAP_SHARED; -+ /// Create a private copy-on-write mapping. Mutually exclusive with `MAP_SHARED`. -+ MAP_PRIVATE; -+ /// Place the mapping at exactly the address specified in `addr`. -+ MAP_FIXED; -+ /// Synonym for `MAP_ANONYMOUS`. -+ MAP_ANON; -+ /// The mapping is not backed by any file. -+ #[cfg(any(target_os = "android", target_os = "linux", target_os = "freebsd"))] -+ MAP_ANONYMOUS; -+ /// Put the mapping into the first 2GB of the process address space. -+ #[cfg(any(all(any(target_os = "android", target_os = "linux"), -+ any(target_arch = "x86", target_arch = "x86_64")), -+ all(target_os = "linux", target_env = "musl", any(target_arch = "x86", target_arch = "x86_64")), -+ all(target_os = "freebsd", target_pointer_width = "64")))] -+ MAP_32BIT; -+ /// Used for stacks; indicates to the kernel that the mapping should extend downward in memory. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MAP_GROWSDOWN; -+ /// Compatibility flag. Ignored. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MAP_DENYWRITE; -+ /// Compatibility flag. Ignored. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MAP_EXECUTABLE; -+ /// Mark the mmaped region to be locked in the same way as `mlock(2)`. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MAP_LOCKED; -+ /// Do not reserve swap space for this mapping. -+ /// -+ /// This was removed in FreeBSD 11. -+ #[cfg(not(target_os = "freebsd"))] -+ MAP_NORESERVE; -+ /// Populate page tables for a mapping. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MAP_POPULATE; -+ /// Only meaningful when used with `MAP_POPULATE`. Don't perform read-ahead. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MAP_NONBLOCK; -+ /// Allocate the mapping using "huge pages." -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MAP_HUGETLB; -+ /// Lock the mapped region into memory as with `mlock(2)`. -+ #[cfg(target_os = "netbsd")] -+ MAP_WIRED; -+ /// Causes dirtied data in the specified range to be flushed to disk only when necessary. -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] -+ MAP_NOSYNC; -+ /// Rename private pages to a file. -+ /// -+ /// This was removed in FreeBSD 11. -+ #[cfg(any(target_os = "dragonfly", target_os = "netbsd", target_os = "openbsd"))] -+ MAP_RENAME; -+ /// Region may contain semaphores. -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd", target_os = "netbsd", target_os = "openbsd"))] -+ MAP_HASSEMAPHORE; -+ /// Region grows down, like a stack. -+ #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", target_os = "linux"))] -+ MAP_STACK; -+ /// Pages in this mapping are not retained in the kernel's memory cache. -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ MAP_NOCACHE; -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ MAP_JIT; -+ } -+} -+ -+libc_enum!{ -+ /// Usage information for a range of memory to allow for performance optimizations by the kernel. -+ /// -+ /// Used by [`madvise`](./fn.madvise.html). -+ #[repr(i32)] -+ pub enum MmapAdvise { -+ /// No further special treatment. This is the default. -+ MADV_NORMAL, -+ /// Expect random page references. -+ MADV_RANDOM, -+ /// Expect sequential page references. -+ MADV_SEQUENTIAL, -+ /// Expect access in the near future. -+ MADV_WILLNEED, -+ /// Do not expect access in the near future. -+ MADV_DONTNEED, -+ /// Free up a given range of pages and its associated backing store. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MADV_REMOVE, -+ /// Do not make pages in this range available to the child after a `fork(2)`. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MADV_DONTFORK, -+ /// Undo the effect of `MADV_DONTFORK`. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MADV_DOFORK, -+ /// Poison the given pages. -+ /// -+ /// Subsequent references to those pages are treated like hardware memory corruption. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MADV_HWPOISON, -+ /// Enable Kernel Samepage Merging (KSM) for the given pages. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MADV_MERGEABLE, -+ /// Undo the effect of `MADV_MERGEABLE` -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MADV_UNMERGEABLE, -+ /// Preserve the memory of each page but offline the original page. -+ #[cfg(any(target_os = "android", -+ all(target_os = "linux", any( -+ target_arch = "aarch64", -+ target_arch = "arm", -+ target_arch = "ppc", -+ target_arch = "s390x", -+ target_arch = "x86", -+ target_arch = "x86_64", -+ target_arch = "sparc64"))))] -+ MADV_SOFT_OFFLINE, -+ /// Enable Transparent Huge Pages (THP) for pages in the given range. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MADV_HUGEPAGE, -+ /// Undo the effect of `MADV_HUGEPAGE`. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MADV_NOHUGEPAGE, -+ /// Exclude the given range from a core dump. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MADV_DONTDUMP, -+ /// Undo the effect of an earlier `MADV_DONTDUMP`. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MADV_DODUMP, -+ /// Specify that the application no longer needs the pages in the given range. -+ MADV_FREE, -+ /// Request that the system not flush the current range to disk unless it needs to. -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] -+ MADV_NOSYNC, -+ /// Undoes the effects of `MADV_NOSYNC` for any future pages dirtied within the given range. -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] -+ MADV_AUTOSYNC, -+ /// Region is not included in a core file. -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] -+ MADV_NOCORE, -+ /// Include region in a core file -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] -+ MADV_CORE, -+ #[cfg(any(target_os = "freebsd"))] -+ MADV_PROTECT, -+ /// Invalidate the hardware page table for the given region. -+ #[cfg(target_os = "dragonfly")] -+ MADV_INVAL, -+ /// Set the offset of the page directory page to `value` for the virtual page table. -+ #[cfg(target_os = "dragonfly")] -+ MADV_SETMAP, -+ /// Indicates that the application will not need the data in the given range. -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ MADV_ZERO_WIRED_PAGES, -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ MADV_FREE_REUSABLE, -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ MADV_FREE_REUSE, -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ MADV_CAN_REUSE, -+ } -+} -+ -+libc_bitflags!{ -+ /// Configuration flags for `msync`. -+ pub struct MsFlags: c_int { -+ /// Schedule an update but return immediately. -+ MS_ASYNC; -+ /// Invalidate all cached data. -+ MS_INVALIDATE; -+ /// Invalidate pages, but leave them mapped. -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ MS_KILLPAGES; -+ /// Deactivate pages, but leave them mapped. -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ MS_DEACTIVATE; -+ /// Perform an update and wait for it to complete. -+ MS_SYNC; -+ } -+} -+ -+libc_bitflags!{ -+ /// Flags for `mlockall`. -+ pub struct MlockAllFlags: c_int { -+ /// Lock pages that are currently mapped into the address space of the process. -+ MCL_CURRENT; -+ /// Lock pages which will become mapped into the address space of the process in the future. -+ MCL_FUTURE; -+ } -+} -+ -+/// Locks all memory pages that contain part of the address range with `length` bytes starting at -+/// `addr`. Locked pages never move to the swap area. -+pub unsafe fn mlock(addr: *const c_void, length: size_t) -> Result<()> { -+ Errno::result(libc::mlock(addr, length)).map(drop) -+} -+ -+/// Unlocks all memory pages that contain part of the address range with `length` bytes starting at -+/// `addr`. -+pub unsafe fn munlock(addr: *const c_void, length: size_t) -> Result<()> { -+ Errno::result(libc::munlock(addr, length)).map(drop) -+} -+ -+/// Locks all memory pages mapped into this process' address space. Locked pages never move to the -+/// swap area. -+pub fn mlockall(flags: MlockAllFlags) -> Result<()> { -+ unsafe { Errno::result(libc::mlockall(flags.bits())) }.map(drop) -+} -+ -+/// Unlocks all memory pages mapped into this process' address space. -+pub fn munlockall() -> Result<()> { -+ unsafe { Errno::result(libc::munlockall()) }.map(drop) -+} -+ -+/// Calls to mmap are inherently unsafe, so they must be made in an unsafe block. Typically -+/// a higher-level abstraction will hide the unsafe interactions with the mmap'd region. -+pub unsafe fn mmap(addr: *mut c_void, length: size_t, prot: ProtFlags, flags: MapFlags, fd: RawFd, offset: off_t) -> Result<*mut c_void> { -+ let ret = libc::mmap(addr, length, prot.bits(), flags.bits(), fd, offset); -+ -+ if ret == libc::MAP_FAILED { -+ Err(Error::Sys(Errno::last())) -+ } else { -+ Ok(ret) -+ } -+} -+ -+pub unsafe fn munmap(addr: *mut c_void, len: size_t) -> Result<()> { -+ Errno::result(libc::munmap(addr, len)).map(drop) -+} -+ -+pub unsafe fn madvise(addr: *mut c_void, length: size_t, advise: MmapAdvise) -> Result<()> { -+ Errno::result(libc::madvise(addr, length, advise as i32)).map(drop) -+} -+ -+/// Set protection of memory mapping. -+/// -+/// See [`mprotect(3)`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/mprotect.html) for -+/// details. -+/// -+/// # Safety -+/// -+/// Calls to `mprotect` are inherently unsafe, as changes to memory protections can lead to -+/// SIGSEGVs. -+/// -+/// ``` -+/// # use nix::libc::size_t; -+/// # use nix::sys::mman::{mmap, mprotect, MapFlags, ProtFlags}; -+/// # use std::ptr; -+/// const ONE_K: size_t = 1024; -+/// let mut slice: &mut [u8] = unsafe { -+/// let mem = mmap(ptr::null_mut(), ONE_K, ProtFlags::PROT_NONE, -+/// MapFlags::MAP_ANON | MapFlags::MAP_PRIVATE, -1, 0).unwrap(); -+/// mprotect(mem, ONE_K, ProtFlags::PROT_READ | ProtFlags::PROT_WRITE).unwrap(); -+/// std::slice::from_raw_parts_mut(mem as *mut u8, ONE_K) -+/// }; -+/// assert_eq!(slice[0], 0x00); -+/// slice[0] = 0xFF; -+/// assert_eq!(slice[0], 0xFF); -+/// ``` -+pub unsafe fn mprotect(addr: *mut c_void, length: size_t, prot: ProtFlags) -> Result<()> { -+ Errno::result(libc::mprotect(addr, length, prot.bits())).map(drop) -+} -+ -+pub unsafe fn msync(addr: *mut c_void, length: size_t, flags: MsFlags) -> Result<()> { -+ Errno::result(libc::msync(addr, length, flags.bits())).map(drop) -+} -+ -+#[cfg(not(target_os = "android"))] -+pub fn shm_open<P: ?Sized + NixPath>(name: &P, flag: OFlag, mode: Mode) -> Result<RawFd> { -+ let ret = name.with_nix_path(|cstr| { -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ unsafe { -+ libc::shm_open(cstr.as_ptr(), flag.bits(), mode.bits() as libc::c_uint) -+ } -+ #[cfg(not(any(target_os = "macos", target_os = "ios")))] -+ unsafe { -+ libc::shm_open(cstr.as_ptr(), flag.bits(), mode.bits() as libc::mode_t) -+ } -+ })?; -+ -+ Errno::result(ret) -+} -+ -+#[cfg(not(target_os = "android"))] -+pub fn shm_unlink<P: ?Sized + NixPath>(name: &P) -> Result<()> { -+ let ret = name.with_nix_path(|cstr| { -+ unsafe { libc::shm_unlink(cstr.as_ptr()) } -+ })?; -+ -+ Errno::result(ret).map(drop) -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/mod.rs b/third_party/rust/nix-0.15.0/src/sys/mod.rs -new file mode 100644 -index 0000000000000..d3c2f92bbaaea ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/mod.rs -@@ -0,0 +1,100 @@ -+#[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd"))] -+pub mod aio; -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+pub mod epoll; -+ -+#[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+pub mod event; -+ -+#[cfg(target_os = "linux")] -+pub mod eventfd; -+ -+#[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+#[macro_use] -+pub mod ioctl; -+ -+#[cfg(target_os = "linux")] -+pub mod memfd; -+ -+pub mod mman; -+ -+pub mod pthread; -+ -+#[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+pub mod ptrace; -+ -+#[cfg(target_os = "linux")] -+pub mod quota; -+ -+#[cfg(any(target_os = "linux"))] -+pub mod reboot; -+ -+pub mod select; -+ -+#[cfg(any(target_os = "android", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+pub mod sendfile; -+ -+pub mod signal; -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+pub mod signalfd; -+ -+pub mod socket; -+ -+pub mod stat; -+ -+#[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "openbsd" -+))] -+pub mod statfs; -+ -+pub mod statvfs; -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+pub mod sysinfo; -+ -+pub mod termios; -+ -+pub mod time; -+ -+pub mod uio; -+ -+pub mod utsname; -+ -+pub mod wait; -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+pub mod inotify; -diff --git a/third_party/rust/nix-0.15.0/src/sys/pthread.rs b/third_party/rust/nix-0.15.0/src/sys/pthread.rs -new file mode 100644 -index 0000000000000..a4d98250f2b8b ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/pthread.rs -@@ -0,0 +1,13 @@ -+use libc::{self, pthread_t}; -+ -+pub type Pthread = pthread_t; -+ -+/// Obtain ID of the calling thread (see -+/// [`pthread_self(3)`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/pthread_self.html) -+/// -+/// The thread ID returned by `pthread_self()` is not the same thing as -+/// the kernel thread ID returned by a call to `gettid(2)`. -+#[inline] -+pub fn pthread_self() -> Pthread { -+ unsafe { libc::pthread_self() } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/ptrace/bsd.rs b/third_party/rust/nix-0.15.0/src/sys/ptrace/bsd.rs -new file mode 100644 -index 0000000000000..7797d10647ef4 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/ptrace/bsd.rs -@@ -0,0 +1,170 @@ -+use errno::Errno; -+use libc::{self, c_int}; -+use std::ptr; -+use sys::signal::Signal; -+use unistd::Pid; -+use Result; -+ -+pub type RequestType = c_int; -+ -+cfg_if! { -+ if #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "openbsd"))] { -+ #[doc(hidden)] -+ pub type AddressType = *mut ::libc::c_char; -+ } else { -+ #[doc(hidden)] -+ pub type AddressType = *mut ::libc::c_void; -+ } -+} -+ -+libc_enum! { -+ #[repr(i32)] -+ /// Ptrace Request enum defining the action to be taken. -+ pub enum Request { -+ PT_TRACE_ME, -+ PT_READ_I, -+ PT_READ_D, -+ #[cfg(target_os = "macos")] -+ PT_READ_U, -+ PT_WRITE_I, -+ PT_WRITE_D, -+ #[cfg(target_os = "macos")] -+ PT_WRITE_U, -+ PT_CONTINUE, -+ PT_KILL, -+ #[cfg(any(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos"), -+ all(target_os = "openbsd", target_arch = "x86_64"), -+ all(target_os = "netbsd", any(target_arch = "x86_64", -+ target_arch = "powerpc"))))] -+ PT_STEP, -+ PT_ATTACH, -+ PT_DETACH, -+ #[cfg(target_os = "macos")] -+ PT_SIGEXC, -+ #[cfg(target_os = "macos")] -+ PT_THUPDATE, -+ #[cfg(target_os = "macos")] -+ PT_ATTACHEXC -+ } -+} -+ -+unsafe fn ptrace_other( -+ request: Request, -+ pid: Pid, -+ addr: AddressType, -+ data: c_int, -+) -> Result<c_int> { -+ Errno::result(libc::ptrace( -+ request as RequestType, -+ libc::pid_t::from(pid), -+ addr, -+ data, -+ )).map(|_| 0) -+} -+ -+/// Sets the process as traceable, as with `ptrace(PT_TRACEME, ...)` -+/// -+/// Indicates that this process is to be traced by its parent. -+/// This is the only ptrace request to be issued by the tracee. -+pub fn traceme() -> Result<()> { -+ unsafe { ptrace_other(Request::PT_TRACE_ME, Pid::from_raw(0), ptr::null_mut(), 0).map(drop) } -+} -+ -+/// Attach to a running process, as with `ptrace(PT_ATTACH, ...)` -+/// -+/// Attaches to the process specified in pid, making it a tracee of the calling process. -+pub fn attach(pid: Pid) -> Result<()> { -+ unsafe { ptrace_other(Request::PT_ATTACH, pid, ptr::null_mut(), 0).map(drop) } -+} -+ -+/// Detaches the current running process, as with `ptrace(PT_DETACH, ...)` -+/// -+/// Detaches from the process specified in pid allowing it to run freely -+pub fn detach(pid: Pid) -> Result<()> { -+ unsafe { ptrace_other(Request::PT_DETACH, pid, ptr::null_mut(), 0).map(drop) } -+} -+ -+/// Restart the stopped tracee process, as with `ptrace(PTRACE_CONT, ...)` -+/// -+/// Continues the execution of the process with PID `pid`, optionally -+/// delivering a signal specified by `sig`. -+pub fn cont<T: Into<Option<Signal>>>(pid: Pid, sig: T) -> Result<()> { -+ let data = match sig.into() { -+ Some(s) => s as c_int, -+ None => 0, -+ }; -+ unsafe { -+ // Ignore the useless return value -+ ptrace_other(Request::PT_CONTINUE, pid, 1 as AddressType, data).map(drop) -+ } -+} -+ -+/// Issues a kill request as with `ptrace(PT_KILL, ...)` -+/// -+/// This request is equivalent to `ptrace(PT_CONTINUE, ..., SIGKILL);` -+pub fn kill(pid: Pid) -> Result<()> { -+ unsafe { -+ ptrace_other(Request::PT_KILL, pid, 0 as AddressType, 0).map(drop) -+ } -+} -+ -+/// Move the stopped tracee process forward by a single step as with -+/// `ptrace(PT_STEP, ...)` -+/// -+/// Advances the execution of the process with PID `pid` by a single step optionally delivering a -+/// signal specified by `sig`. -+/// -+/// # Example -+/// ```rust -+/// extern crate nix; -+/// use nix::sys::ptrace::step; -+/// use nix::unistd::Pid; -+/// use nix::sys::signal::Signal; -+/// use nix::sys::wait::*; -+/// fn main() { -+/// // If a process changes state to the stopped state because of a SIGUSR1 -+/// // signal, this will step the process forward and forward the user -+/// // signal to the stopped process -+/// match waitpid(Pid::from_raw(-1), None) { -+/// Ok(WaitStatus::Stopped(pid, Signal::SIGUSR1)) => { -+/// let _ = step(pid, Signal::SIGUSR1); -+/// } -+/// _ => {}, -+/// } -+/// } -+/// ``` -+#[cfg( -+ any( -+ any(target_os = "dragonfly", target_os = "freebsd", target_os = "macos"), -+ all(target_os = "openbsd", target_arch = "x86_64"), -+ all(target_os = "netbsd", -+ any(target_arch = "x86_64", target_arch = "powerpc") -+ ) -+ ) -+)] -+pub fn step<T: Into<Option<Signal>>>(pid: Pid, sig: T) -> Result<()> { -+ let data = match sig.into() { -+ Some(s) => s as c_int, -+ None => 0, -+ }; -+ unsafe { ptrace_other(Request::PT_STEP, pid, ptr::null_mut(), data).map(drop) } -+} -+ -+/// Reads a word from a processes memory at the given address -+pub fn read(pid: Pid, addr: AddressType) -> Result<c_int> { -+ unsafe { -+ // Traditionally there was a difference between reading data or -+ // instruction memory but not in modern systems. -+ ptrace_other(Request::PT_READ_D, pid, addr, 0) -+ } -+} -+ -+/// Writes a word into the processes memory at the given address -+pub fn write(pid: Pid, addr: AddressType, data: c_int) -> Result<()> { -+ unsafe { ptrace_other(Request::PT_WRITE_D, pid, addr, data).map(drop) } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/ptrace/linux.rs b/third_party/rust/nix-0.15.0/src/sys/ptrace/linux.rs -new file mode 100644 -index 0000000000000..df15e66527562 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/ptrace/linux.rs -@@ -0,0 +1,402 @@ -+//! For detailed description of the ptrace requests, consult `man ptrace`. -+ -+use std::{mem, ptr}; -+use {Error, Result}; -+use errno::Errno; -+use libc::{self, c_void, c_long, siginfo_t}; -+use ::unistd::Pid; -+use sys::signal::Signal; -+ -+pub type AddressType = *mut ::libc::c_void; -+ -+#[cfg(all(target_os = "linux", -+ any(target_arch = "x86_64", -+ target_arch = "x86"), -+ target_env = "gnu"))] -+use libc::user_regs_struct; -+ -+cfg_if! { -+ if #[cfg(any(all(target_os = "linux", target_arch = "s390x"), -+ all(target_os = "linux", target_env = "gnu")))] { -+ #[doc(hidden)] -+ pub type RequestType = ::libc::c_uint; -+ } else { -+ #[doc(hidden)] -+ pub type RequestType = ::libc::c_int; -+ } -+} -+ -+libc_enum!{ -+ #[cfg_attr(not(any(target_env = "musl", target_os = "android")), repr(u32))] -+ #[cfg_attr(any(target_env = "musl", target_os = "android"), repr(i32))] -+ /// Ptrace Request enum defining the action to be taken. -+ pub enum Request { -+ PTRACE_TRACEME, -+ PTRACE_PEEKTEXT, -+ PTRACE_PEEKDATA, -+ PTRACE_PEEKUSER, -+ PTRACE_POKETEXT, -+ PTRACE_POKEDATA, -+ PTRACE_POKEUSER, -+ PTRACE_CONT, -+ PTRACE_KILL, -+ PTRACE_SINGLESTEP, -+ #[cfg(any(all(target_os = "android", target_pointer_width = "32"), -+ all(target_os = "linux", any(target_env = "musl", -+ target_arch = "mips", -+ target_arch = "mips64", -+ target_arch = "x86_64", -+ target_pointer_width = "32"))))] -+ PTRACE_GETREGS, -+ #[cfg(any(all(target_os = "android", target_pointer_width = "32"), -+ all(target_os = "linux", any(target_env = "musl", -+ target_arch = "mips", -+ target_arch = "mips64", -+ target_arch = "x86_64", -+ target_pointer_width = "32"))))] -+ PTRACE_SETREGS, -+ #[cfg(any(all(target_os = "android", target_pointer_width = "32"), -+ all(target_os = "linux", any(target_env = "musl", -+ target_arch = "mips", -+ target_arch = "mips64", -+ target_arch = "x86_64", -+ target_pointer_width = "32"))))] -+ PTRACE_GETFPREGS, -+ #[cfg(any(all(target_os = "android", target_pointer_width = "32"), -+ all(target_os = "linux", any(target_env = "musl", -+ target_arch = "mips", -+ target_arch = "mips64", -+ target_arch = "x86_64", -+ target_pointer_width = "32"))))] -+ PTRACE_SETFPREGS, -+ PTRACE_ATTACH, -+ PTRACE_DETACH, -+ #[cfg(all(target_os = "linux", any(target_env = "musl", -+ target_arch = "mips", -+ target_arch = "mips64", -+ target_arch = "x86", -+ target_arch = "x86_64")))] -+ PTRACE_GETFPXREGS, -+ #[cfg(all(target_os = "linux", any(target_env = "musl", -+ target_arch = "mips", -+ target_arch = "mips64", -+ target_arch = "x86", -+ target_arch = "x86_64")))] -+ PTRACE_SETFPXREGS, -+ PTRACE_SYSCALL, -+ PTRACE_SETOPTIONS, -+ PTRACE_GETEVENTMSG, -+ PTRACE_GETSIGINFO, -+ PTRACE_SETSIGINFO, -+ #[cfg(all(target_os = "linux", not(any(target_arch = "mips", -+ target_arch = "mips64"))))] -+ PTRACE_GETREGSET, -+ #[cfg(all(target_os = "linux", not(any(target_arch = "mips", -+ target_arch = "mips64"))))] -+ PTRACE_SETREGSET, -+ #[cfg(all(target_os = "linux", not(any(target_arch = "mips", -+ target_arch = "mips64"))))] -+ PTRACE_SEIZE, -+ #[cfg(all(target_os = "linux", not(any(target_arch = "mips", -+ target_arch = "mips64"))))] -+ PTRACE_INTERRUPT, -+ #[cfg(all(target_os = "linux", not(any(target_arch = "mips", -+ target_arch = "mips64"))))] -+ PTRACE_LISTEN, -+ #[cfg(all(target_os = "linux", not(any(target_arch = "mips", -+ target_arch = "mips64"))))] -+ PTRACE_PEEKSIGINFO, -+ } -+} -+ -+libc_enum!{ -+ #[repr(i32)] -+ /// Using the ptrace options the tracer can configure the tracee to stop -+ /// at certain events. This enum is used to define those events as defined -+ /// in `man ptrace`. -+ pub enum Event { -+ /// Event that stops before a return from fork or clone. -+ PTRACE_EVENT_FORK, -+ /// Event that stops before a return from vfork or clone. -+ PTRACE_EVENT_VFORK, -+ /// Event that stops before a return from clone. -+ PTRACE_EVENT_CLONE, -+ /// Event that stops before a return from execve. -+ PTRACE_EVENT_EXEC, -+ /// Event for a return from vfork. -+ PTRACE_EVENT_VFORK_DONE, -+ /// Event for a stop before an exit. Unlike the waitpid Exit status program. -+ /// registers can still be examined -+ PTRACE_EVENT_EXIT, -+ /// STop triggered by a seccomp rule on a tracee. -+ PTRACE_EVENT_SECCOMP, -+ // PTRACE_EVENT_STOP not provided by libc because it's defined in glibc 2.26 -+ } -+} -+ -+libc_bitflags! { -+ /// Ptrace options used in conjunction with the PTRACE_SETOPTIONS request. -+ /// See `man ptrace` for more details. -+ pub struct Options: libc::c_int { -+ /// When delivering system call traps set a bit to allow tracer to -+ /// distinguish between normal stops or syscall stops. May not work on -+ /// all systems. -+ PTRACE_O_TRACESYSGOOD; -+ /// Stop tracee at next fork and start tracing the forked process. -+ PTRACE_O_TRACEFORK; -+ /// Stop tracee at next vfork call and trace the vforked process. -+ PTRACE_O_TRACEVFORK; -+ /// Stop tracee at next clone call and trace the cloned process. -+ PTRACE_O_TRACECLONE; -+ /// Stop tracee at next execve call. -+ PTRACE_O_TRACEEXEC; -+ /// Stop tracee at vfork completion. -+ PTRACE_O_TRACEVFORKDONE; -+ /// Stop tracee at next exit call. Stops before exit commences allowing -+ /// tracer to see location of exit and register states. -+ PTRACE_O_TRACEEXIT; -+ /// Stop tracee when a SECCOMP_RET_TRACE rule is triggered. See `man seccomp` for more -+ /// details. -+ PTRACE_O_TRACESECCOMP; -+ /// Send a SIGKILL to the tracee if the tracer exits. This is useful -+ /// for ptrace jailers to prevent tracees from escaping their control. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ PTRACE_O_EXITKILL; -+ } -+} -+ -+/// Performs a ptrace request. If the request in question is provided by a specialised function -+/// this function will return an unsupported operation error. -+#[deprecated( -+ since="0.10.0", -+ note="usages of `ptrace()` should be replaced with the specialized helper functions instead" -+)] -+pub unsafe fn ptrace(request: Request, pid: Pid, addr: AddressType, data: *mut c_void) -> Result<c_long> { -+ use self::Request::*; -+ match request { -+ PTRACE_PEEKTEXT | PTRACE_PEEKDATA | PTRACE_GETSIGINFO | -+ PTRACE_GETEVENTMSG | PTRACE_SETSIGINFO | PTRACE_SETOPTIONS | -+ PTRACE_POKETEXT | PTRACE_POKEDATA | PTRACE_KILL => Err(Error::UnsupportedOperation), -+ _ => ptrace_other(request, pid, addr, data) -+ } -+} -+ -+fn ptrace_peek(request: Request, pid: Pid, addr: AddressType, data: *mut c_void) -> Result<c_long> { -+ let ret = unsafe { -+ Errno::clear(); -+ libc::ptrace(request as RequestType, libc::pid_t::from(pid), addr, data) -+ }; -+ match Errno::result(ret) { -+ Ok(..) | Err(Error::Sys(Errno::UnknownErrno)) => Ok(ret), -+ err @ Err(..) => err, -+ } -+} -+ -+/// Get user registers, as with `ptrace(PTRACE_GETREGS, ...)` -+#[cfg(all(target_os = "linux", -+ any(target_arch = "x86_64", -+ target_arch = "x86"), -+ target_env = "gnu"))] -+pub fn getregs(pid: Pid) -> Result<user_regs_struct> { -+ ptrace_get_data::<user_regs_struct>(Request::PTRACE_GETREGS, pid) -+} -+ -+/// Set user registers, as with `ptrace(PTRACE_SETREGS, ...)` -+#[cfg(all(target_os = "linux", -+ any(target_arch = "x86_64", -+ target_arch = "x86"), -+ target_env = "gnu"))] -+pub fn setregs(pid: Pid, regs: user_regs_struct) -> Result<()> { -+ let res = unsafe { -+ libc::ptrace(Request::PTRACE_SETREGS as RequestType, -+ libc::pid_t::from(pid), -+ ptr::null_mut::<c_void>(), -+ ®s as *const _ as *const c_void) -+ }; -+ Errno::result(res).map(drop) -+} -+ -+/// Function for ptrace requests that return values from the data field. -+/// Some ptrace get requests populate structs or larger elements than `c_long` -+/// and therefore use the data field to return values. This function handles these -+/// requests. -+fn ptrace_get_data<T>(request: Request, pid: Pid) -> Result<T> { -+ // Creates an uninitialized pointer to store result in -+ let data: T = unsafe { mem::uninitialized() }; -+ let res = unsafe { -+ libc::ptrace(request as RequestType, -+ libc::pid_t::from(pid), -+ ptr::null_mut::<T>(), -+ &data as *const _ as *const c_void) -+ }; -+ Errno::result(res)?; -+ Ok(data) -+} -+ -+unsafe fn ptrace_other(request: Request, pid: Pid, addr: AddressType, data: *mut c_void) -> Result<c_long> { -+ Errno::result(libc::ptrace(request as RequestType, libc::pid_t::from(pid), addr, data)).map(|_| 0) -+} -+ -+/// Set options, as with `ptrace(PTRACE_SETOPTIONS,...)`. -+pub fn setoptions(pid: Pid, options: Options) -> Result<()> { -+ let res = unsafe { -+ libc::ptrace(Request::PTRACE_SETOPTIONS as RequestType, -+ libc::pid_t::from(pid), -+ ptr::null_mut::<c_void>(), -+ options.bits() as *mut c_void) -+ }; -+ Errno::result(res).map(drop) -+} -+ -+/// Gets a ptrace event as described by `ptrace(PTRACE_GETEVENTMSG,...)` -+pub fn getevent(pid: Pid) -> Result<c_long> { -+ ptrace_get_data::<c_long>(Request::PTRACE_GETEVENTMSG, pid) -+} -+ -+/// Get siginfo as with `ptrace(PTRACE_GETSIGINFO,...)` -+pub fn getsiginfo(pid: Pid) -> Result<siginfo_t> { -+ ptrace_get_data::<siginfo_t>(Request::PTRACE_GETSIGINFO, pid) -+} -+ -+/// Set siginfo as with `ptrace(PTRACE_SETSIGINFO,...)` -+pub fn setsiginfo(pid: Pid, sig: &siginfo_t) -> Result<()> { -+ let ret = unsafe{ -+ Errno::clear(); -+ libc::ptrace(Request::PTRACE_SETSIGINFO as RequestType, -+ libc::pid_t::from(pid), -+ ptr::null_mut::<c_void>(), -+ sig as *const _ as *const c_void) -+ }; -+ match Errno::result(ret) { -+ Ok(_) => Ok(()), -+ Err(e) => Err(e), -+ } -+} -+ -+/// Sets the process as traceable, as with `ptrace(PTRACE_TRACEME, ...)` -+/// -+/// Indicates that this process is to be traced by its parent. -+/// This is the only ptrace request to be issued by the tracee. -+pub fn traceme() -> Result<()> { -+ unsafe { -+ ptrace_other( -+ Request::PTRACE_TRACEME, -+ Pid::from_raw(0), -+ ptr::null_mut(), -+ ptr::null_mut(), -+ ).map(drop) // ignore the useless return value -+ } -+} -+ -+/// Ask for next syscall, as with `ptrace(PTRACE_SYSCALL, ...)` -+/// -+/// Arranges for the tracee to be stopped at the next entry to or exit from a system call. -+pub fn syscall(pid: Pid) -> Result<()> { -+ unsafe { -+ ptrace_other( -+ Request::PTRACE_SYSCALL, -+ pid, -+ ptr::null_mut(), -+ ptr::null_mut(), -+ ).map(drop) // ignore the useless return value -+ } -+} -+ -+/// Attach to a running process, as with `ptrace(PTRACE_ATTACH, ...)` -+/// -+/// Attaches to the process specified in pid, making it a tracee of the calling process. -+pub fn attach(pid: Pid) -> Result<()> { -+ unsafe { -+ ptrace_other( -+ Request::PTRACE_ATTACH, -+ pid, -+ ptr::null_mut(), -+ ptr::null_mut(), -+ ).map(drop) // ignore the useless return value -+ } -+} -+ -+/// Detaches the current running process, as with `ptrace(PTRACE_DETACH, ...)` -+/// -+/// Detaches from the process specified in pid allowing it to run freely -+pub fn detach(pid: Pid) -> Result<()> { -+ unsafe { -+ ptrace_other( -+ Request::PTRACE_DETACH, -+ pid, -+ ptr::null_mut(), -+ ptr::null_mut() -+ ).map(drop) -+ } -+} -+ -+/// Restart the stopped tracee process, as with `ptrace(PTRACE_CONT, ...)` -+/// -+/// Continues the execution of the process with PID `pid`, optionally -+/// delivering a signal specified by `sig`. -+pub fn cont<T: Into<Option<Signal>>>(pid: Pid, sig: T) -> Result<()> { -+ let data = match sig.into() { -+ Some(s) => s as i32 as *mut c_void, -+ None => ptr::null_mut(), -+ }; -+ unsafe { -+ ptrace_other(Request::PTRACE_CONT, pid, ptr::null_mut(), data).map(drop) // ignore the useless return value -+ } -+} -+ -+/// Issues a kill request as with `ptrace(PTRACE_KILL, ...)` -+/// -+/// This request is equivalent to `ptrace(PTRACE_CONT, ..., SIGKILL);` -+pub fn kill(pid: Pid) -> Result<()> { -+ unsafe { -+ ptrace_other(Request::PTRACE_KILL, pid, ptr::null_mut(), ptr::null_mut()).map(drop) -+ } -+} -+ -+/// Move the stopped tracee process forward by a single step as with -+/// `ptrace(PTRACE_SINGLESTEP, ...)` -+/// -+/// Advances the execution of the process with PID `pid` by a single step optionally delivering a -+/// signal specified by `sig`. -+/// -+/// # Example -+/// ```rust -+/// extern crate nix; -+/// use nix::sys::ptrace::step; -+/// use nix::unistd::Pid; -+/// use nix::sys::signal::Signal; -+/// use nix::sys::wait::*; -+/// fn main() { -+/// // If a process changes state to the stopped state because of a SIGUSR1 -+/// // signal, this will step the process forward and forward the user -+/// // signal to the stopped process -+/// match waitpid(Pid::from_raw(-1), None) { -+/// Ok(WaitStatus::Stopped(pid, Signal::SIGUSR1)) => { -+/// let _ = step(pid, Signal::SIGUSR1); -+/// } -+/// _ => {}, -+/// } -+/// } -+/// ``` -+pub fn step<T: Into<Option<Signal>>>(pid: Pid, sig: T) -> Result<()> { -+ let data = match sig.into() { -+ Some(s) => s as i32 as *mut c_void, -+ None => ptr::null_mut(), -+ }; -+ unsafe { -+ ptrace_other(Request::PTRACE_SINGLESTEP, pid, ptr::null_mut(), data).map(drop) -+ } -+} -+ -+ -+/// Reads a word from a processes memory at the given address -+pub fn read(pid: Pid, addr: AddressType) -> Result<c_long> { -+ ptrace_peek(Request::PTRACE_PEEKDATA, pid, addr, ptr::null_mut()) -+} -+ -+/// Writes a word into the processes memory at the given address -+pub fn write(pid: Pid, addr: AddressType, data: *mut c_void) -> Result<()> { -+ unsafe { -+ ptrace_other(Request::PTRACE_POKEDATA, pid, addr, data).map(drop) -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/ptrace/mod.rs b/third_party/rust/nix-0.15.0/src/sys/ptrace/mod.rs -new file mode 100644 -index 0000000000000..782c30409bc12 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/ptrace/mod.rs -@@ -0,0 +1,22 @@ -+///! Provides helpers for making ptrace system calls -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+mod linux; -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+pub use self::linux::*; -+ -+#[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+mod bsd; -+ -+#[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd" -+ ))] -+pub use self::bsd::*; -diff --git a/third_party/rust/nix-0.15.0/src/sys/quota.rs b/third_party/rust/nix-0.15.0/src/sys/quota.rs -new file mode 100644 -index 0000000000000..8946fca2213c8 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/quota.rs -@@ -0,0 +1,273 @@ -+//! Set and configure disk quotas for users, groups, or projects. -+//! -+//! # Examples -+//! -+//! Enabling and setting a quota: -+//! -+//! ```rust,no_run -+//! # use nix::sys::quota::{Dqblk, quotactl_on, quotactl_set, QuotaFmt, QuotaType, QuotaValidFlags}; -+//! quotactl_on(QuotaType::USRQUOTA, "/dev/sda1", QuotaFmt::QFMT_VFS_V1, "aquota.user"); -+//! let mut dqblk: Dqblk = Default::default(); -+//! dqblk.set_blocks_hard_limit(10000); -+//! dqblk.set_blocks_soft_limit(8000); -+//! quotactl_set(QuotaType::USRQUOTA, "/dev/sda1", 50, &dqblk, QuotaValidFlags::QIF_BLIMITS); -+//! ``` -+use std::default::Default; -+use std::{mem, ptr}; -+use libc::{self, c_int, c_char}; -+use {Result, NixPath}; -+use errno::Errno; -+ -+struct QuotaCmd(QuotaSubCmd, QuotaType); -+ -+impl QuotaCmd { -+ fn as_int(&self) -> c_int { -+ unsafe { libc::QCMD(self.0 as i32, self.1 as i32) } -+ } -+} -+ -+// linux quota version >= 2 -+libc_enum!{ -+ #[repr(i32)] -+ enum QuotaSubCmd { -+ Q_SYNC, -+ Q_QUOTAON, -+ Q_QUOTAOFF, -+ Q_GETQUOTA, -+ Q_SETQUOTA, -+ } -+} -+ -+libc_enum!{ -+ /// The scope of the quota. -+ #[repr(i32)] -+ pub enum QuotaType { -+ /// Specify a user quota -+ USRQUOTA, -+ /// Specify a group quota -+ GRPQUOTA, -+ } -+} -+ -+libc_enum!{ -+ /// The type of quota format to use. -+ #[repr(i32)] -+ pub enum QuotaFmt { -+ /// Use the original quota format. -+ QFMT_VFS_OLD, -+ /// Use the standard VFS v0 quota format. -+ /// -+ /// Handles 32-bit UIDs/GIDs and quota limits up to 2<sup>32</sup> bytes/2<sup>32</sup> inodes. -+ QFMT_VFS_V0, -+ /// Use the VFS v1 quota format. -+ /// -+ /// Handles 32-bit UIDs/GIDs and quota limits of 2<sup>64</sup> bytes/2<sup>64</sup> inodes. -+ QFMT_VFS_V1, -+ } -+} -+ -+libc_bitflags!( -+ /// Indicates the quota fields that are valid to read from. -+ #[derive(Default)] -+ pub struct QuotaValidFlags: u32 { -+ /// The block hard & soft limit fields. -+ QIF_BLIMITS; -+ /// The current space field. -+ QIF_SPACE; -+ /// The inode hard & soft limit fields. -+ QIF_ILIMITS; -+ /// The current inodes field. -+ QIF_INODES; -+ /// The disk use time limit field. -+ QIF_BTIME; -+ /// The file quote time limit field. -+ QIF_ITIME; -+ /// All block & inode limits. -+ QIF_LIMITS; -+ /// The space & inodes usage fields. -+ QIF_USAGE; -+ /// The time limit fields. -+ QIF_TIMES; -+ /// All fields. -+ QIF_ALL; -+ } -+); -+ -+/// Wrapper type for `if_dqblk` -+// FIXME: Change to repr(transparent) -+#[repr(C)] -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct Dqblk(libc::dqblk); -+ -+impl Default for Dqblk { -+ fn default() -> Dqblk { -+ Dqblk(libc::dqblk { -+ dqb_bhardlimit: 0, -+ dqb_bsoftlimit: 0, -+ dqb_curspace: 0, -+ dqb_ihardlimit: 0, -+ dqb_isoftlimit: 0, -+ dqb_curinodes: 0, -+ dqb_btime: 0, -+ dqb_itime: 0, -+ dqb_valid: 0, -+ }) -+ } -+} -+ -+impl Dqblk { -+ /// The absolute limit on disk quota blocks allocated. -+ pub fn blocks_hard_limit(&self) -> Option<u64> { -+ let valid_fields = QuotaValidFlags::from_bits_truncate(self.0.dqb_valid); -+ if valid_fields.contains(QuotaValidFlags::QIF_BLIMITS) { -+ Some(self.0.dqb_bhardlimit) -+ } else { -+ None -+ } -+ } -+ -+ /// Set the absolute limit on disk quota blocks allocated. -+ pub fn set_blocks_hard_limit(&mut self, limit: u64) { -+ self.0.dqb_bhardlimit = limit; -+ } -+ -+ /// Preferred limit on disk quota blocks -+ pub fn blocks_soft_limit(&self) -> Option<u64> { -+ let valid_fields = QuotaValidFlags::from_bits_truncate(self.0.dqb_valid); -+ if valid_fields.contains(QuotaValidFlags::QIF_BLIMITS) { -+ Some(self.0.dqb_bsoftlimit) -+ } else { -+ None -+ } -+ } -+ -+ /// Set the preferred limit on disk quota blocks allocated. -+ pub fn set_blocks_soft_limit(&mut self, limit: u64) { -+ self.0.dqb_bsoftlimit = limit; -+ } -+ -+ /// Current occupied space (bytes). -+ pub fn occupied_space(&self) -> Option<u64> { -+ let valid_fields = QuotaValidFlags::from_bits_truncate(self.0.dqb_valid); -+ if valid_fields.contains(QuotaValidFlags::QIF_SPACE) { -+ Some(self.0.dqb_curspace) -+ } else { -+ None -+ } -+ } -+ -+ /// Maximum number of allocated inodes. -+ pub fn inodes_hard_limit(&self) -> Option<u64> { -+ let valid_fields = QuotaValidFlags::from_bits_truncate(self.0.dqb_valid); -+ if valid_fields.contains(QuotaValidFlags::QIF_ILIMITS) { -+ Some(self.0.dqb_ihardlimit) -+ } else { -+ None -+ } -+ } -+ -+ /// Set the maximum number of allocated inodes. -+ pub fn set_inodes_hard_limit(&mut self, limit: u64) { -+ self.0.dqb_ihardlimit = limit; -+ } -+ -+ /// Preferred inode limit -+ pub fn inodes_soft_limit(&self) -> Option<u64> { -+ let valid_fields = QuotaValidFlags::from_bits_truncate(self.0.dqb_valid); -+ if valid_fields.contains(QuotaValidFlags::QIF_ILIMITS) { -+ Some(self.0.dqb_isoftlimit) -+ } else { -+ None -+ } -+ } -+ -+ /// Set the preferred limit of allocated inodes. -+ pub fn set_inodes_soft_limit(&mut self, limit: u64) { -+ self.0.dqb_isoftlimit = limit; -+ } -+ -+ /// Current number of allocated inodes. -+ pub fn allocated_inodes(&self) -> Option<u64> { -+ let valid_fields = QuotaValidFlags::from_bits_truncate(self.0.dqb_valid); -+ if valid_fields.contains(QuotaValidFlags::QIF_INODES) { -+ Some(self.0.dqb_curinodes) -+ } else { -+ None -+ } -+ } -+ -+ /// Time limit for excessive disk use. -+ pub fn block_time_limit(&self) -> Option<u64> { -+ let valid_fields = QuotaValidFlags::from_bits_truncate(self.0.dqb_valid); -+ if valid_fields.contains(QuotaValidFlags::QIF_BTIME) { -+ Some(self.0.dqb_btime) -+ } else { -+ None -+ } -+ } -+ -+ /// Set the time limit for excessive disk use. -+ pub fn set_block_time_limit(&mut self, limit: u64) { -+ self.0.dqb_btime = limit; -+ } -+ -+ /// Time limit for excessive files. -+ pub fn inode_time_limit(&self) -> Option<u64> { -+ let valid_fields = QuotaValidFlags::from_bits_truncate(self.0.dqb_valid); -+ if valid_fields.contains(QuotaValidFlags::QIF_ITIME) { -+ Some(self.0.dqb_itime) -+ } else { -+ None -+ } -+ } -+ -+ /// Set the time limit for excessive files. -+ pub fn set_inode_time_limit(&mut self, limit: u64) { -+ self.0.dqb_itime = limit; -+ } -+} -+ -+fn quotactl<P: ?Sized + NixPath>(cmd: QuotaCmd, special: Option<&P>, id: c_int, addr: *mut c_char) -> Result<()> { -+ unsafe { -+ Errno::clear(); -+ let res = match special { -+ Some(dev) => dev.with_nix_path(|path| libc::quotactl(cmd.as_int(), path.as_ptr(), id, addr)), -+ None => Ok(libc::quotactl(cmd.as_int(), ptr::null(), id, addr)), -+ }?; -+ -+ Errno::result(res).map(drop) -+ } -+} -+ -+/// Turn on disk quotas for a block device. -+pub fn quotactl_on<P: ?Sized + NixPath>(which: QuotaType, special: &P, format: QuotaFmt, quota_file: &P) -> Result<()> { -+ quota_file.with_nix_path(|path| { -+ let mut path_copy = path.to_bytes_with_nul().to_owned(); -+ let p: *mut c_char = path_copy.as_mut_ptr() as *mut c_char; -+ quotactl(QuotaCmd(QuotaSubCmd::Q_QUOTAON, which), Some(special), format as c_int, p) -+ })? -+} -+ -+/// Disable disk quotas for a block device. -+pub fn quotactl_off<P: ?Sized + NixPath>(which: QuotaType, special: &P) -> Result<()> { -+ quotactl(QuotaCmd(QuotaSubCmd::Q_QUOTAOFF, which), Some(special), 0, ptr::null_mut()) -+} -+ -+/// Update the on-disk copy of quota usages for a filesystem. -+pub fn quotactl_sync<P: ?Sized + NixPath>(which: QuotaType, special: Option<&P>) -> Result<()> { -+ quotactl(QuotaCmd(QuotaSubCmd::Q_SYNC, which), special, 0, ptr::null_mut()) -+} -+ -+/// Get disk quota limits and current usage for the given user/group id. -+pub fn quotactl_get<P: ?Sized + NixPath>(which: QuotaType, special: &P, id: c_int) -> Result<Dqblk> { -+ let mut dqblk = unsafe { mem::uninitialized() }; -+ quotactl(QuotaCmd(QuotaSubCmd::Q_GETQUOTA, which), Some(special), id, &mut dqblk as *mut _ as *mut c_char)?; -+ dqblk -+} -+ -+/// Configure quota values for the specified fields for a given user/group id. -+pub fn quotactl_set<P: ?Sized + NixPath>(which: QuotaType, special: &P, id: c_int, dqblk: &Dqblk, fields: QuotaValidFlags) -> Result<()> { -+ let mut dqblk_copy = *dqblk; -+ dqblk_copy.0.dqb_valid = fields.bits(); -+ quotactl(QuotaCmd(QuotaSubCmd::Q_SETQUOTA, which), Some(special), id, &mut dqblk_copy as *mut _ as *mut c_char) -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/reboot.rs b/third_party/rust/nix-0.15.0/src/sys/reboot.rs -new file mode 100644 -index 0000000000000..bafa8fc11996d ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/reboot.rs -@@ -0,0 +1,45 @@ -+//! Reboot/shutdown or enable/disable Ctrl-Alt-Delete. -+ -+use {Error, Result}; -+use errno::Errno; -+use libc; -+use void::Void; -+use std::mem::drop; -+ -+libc_enum! { -+ /// How exactly should the system be rebooted. -+ /// -+ /// See [`set_cad_enabled()`](fn.set_cad_enabled.html) for -+ /// enabling/disabling Ctrl-Alt-Delete. -+ #[repr(i32)] -+ pub enum RebootMode { -+ RB_HALT_SYSTEM, -+ RB_KEXEC, -+ RB_POWER_OFF, -+ RB_AUTOBOOT, -+ // we do not support Restart2, -+ RB_SW_SUSPEND, -+ } -+} -+ -+pub fn reboot(how: RebootMode) -> Result<Void> { -+ unsafe { -+ libc::reboot(how as libc::c_int) -+ }; -+ Err(Error::Sys(Errno::last())) -+} -+ -+/// Enable or disable the reboot keystroke (Ctrl-Alt-Delete). -+/// -+/// Corresponds to calling `reboot(RB_ENABLE_CAD)` or `reboot(RB_DISABLE_CAD)` in C. -+pub fn set_cad_enabled(enable: bool) -> Result<()> { -+ let cmd = if enable { -+ libc::RB_ENABLE_CAD -+ } else { -+ libc::RB_DISABLE_CAD -+ }; -+ let res = unsafe { -+ libc::reboot(cmd) -+ }; -+ Errno::result(res).map(drop) -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/select.rs b/third_party/rust/nix-0.15.0/src/sys/select.rs -new file mode 100644 -index 0000000000000..1b518e29f67a6 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/select.rs -@@ -0,0 +1,334 @@ -+use std::mem; -+use std::os::unix::io::RawFd; -+use std::ptr::{null, null_mut}; -+use libc::{self, c_int}; -+use Result; -+use errno::Errno; -+use sys::signal::SigSet; -+use sys::time::{TimeSpec, TimeVal}; -+ -+pub use libc::FD_SETSIZE; -+ -+// FIXME: Change to repr(transparent) once it's stable -+#[repr(C)] -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct FdSet(libc::fd_set); -+ -+impl FdSet { -+ pub fn new() -> FdSet { -+ let mut fdset = unsafe { mem::uninitialized() }; -+ unsafe { libc::FD_ZERO(&mut fdset) }; -+ FdSet(fdset) -+ } -+ -+ pub fn insert(&mut self, fd: RawFd) { -+ unsafe { libc::FD_SET(fd, &mut self.0) }; -+ } -+ -+ pub fn remove(&mut self, fd: RawFd) { -+ unsafe { libc::FD_CLR(fd, &mut self.0) }; -+ } -+ -+ pub fn contains(&mut self, fd: RawFd) -> bool { -+ unsafe { libc::FD_ISSET(fd, &mut self.0) } -+ } -+ -+ pub fn clear(&mut self) { -+ unsafe { libc::FD_ZERO(&mut self.0) }; -+ } -+ -+ /// Finds the highest file descriptor in the set. -+ /// -+ /// Returns `None` if the set is empty. -+ /// -+ /// This can be used to calculate the `nfds` parameter of the [`select`] function. -+ /// -+ /// # Example -+ /// -+ /// ``` -+ /// # extern crate nix; -+ /// # use nix::sys::select::FdSet; -+ /// # fn main() { -+ /// let mut set = FdSet::new(); -+ /// set.insert(4); -+ /// set.insert(9); -+ /// assert_eq!(set.highest(), Some(9)); -+ /// # } -+ /// ``` -+ /// -+ /// [`select`]: fn.select.html -+ pub fn highest(&mut self) -> Option<RawFd> { -+ for i in (0..FD_SETSIZE).rev() { -+ let i = i as RawFd; -+ if unsafe { libc::FD_ISSET(i, self as *mut _ as *mut libc::fd_set) } { -+ return Some(i) -+ } -+ } -+ -+ None -+ } -+} -+ -+/// Monitors file descriptors for readiness -+/// -+/// Returns the total number of ready file descriptors in all sets. The sets are changed so that all -+/// file descriptors that are ready for the given operation are set. -+/// -+/// When this function returns, `timeout` has an implementation-defined value. -+/// -+/// # Parameters -+/// -+/// * `nfds`: The highest file descriptor set in any of the passed `FdSet`s, plus 1. If `None`, this -+/// is calculated automatically by calling [`FdSet::highest`] on all descriptor sets and adding 1 -+/// to the maximum of that. -+/// * `readfds`: File descriptors to check for being ready to read. -+/// * `writefds`: File descriptors to check for being ready to write. -+/// * `errorfds`: File descriptors to check for pending error conditions. -+/// * `timeout`: Maximum time to wait for descriptors to become ready (`None` to block -+/// indefinitely). -+/// -+/// # References -+/// -+/// [select(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/select.html) -+/// -+/// [`FdSet::highest`]: struct.FdSet.html#method.highest -+pub fn select<'a, N, R, W, E, T>(nfds: N, -+ readfds: R, -+ writefds: W, -+ errorfds: E, -+ timeout: T) -> Result<c_int> -+where -+ N: Into<Option<c_int>>, -+ R: Into<Option<&'a mut FdSet>>, -+ W: Into<Option<&'a mut FdSet>>, -+ E: Into<Option<&'a mut FdSet>>, -+ T: Into<Option<&'a mut TimeVal>>, -+{ -+ let mut readfds = readfds.into(); -+ let mut writefds = writefds.into(); -+ let mut errorfds = errorfds.into(); -+ let timeout = timeout.into(); -+ -+ let nfds = nfds.into().unwrap_or_else(|| { -+ readfds.iter_mut() -+ .chain(writefds.iter_mut()) -+ .chain(errorfds.iter_mut()) -+ .map(|set| set.highest().unwrap_or(-1)) -+ .max() -+ .unwrap_or(-1) + 1 -+ }); -+ -+ let readfds = readfds.map(|set| set as *mut _ as *mut libc::fd_set).unwrap_or(null_mut()); -+ let writefds = writefds.map(|set| set as *mut _ as *mut libc::fd_set).unwrap_or(null_mut()); -+ let errorfds = errorfds.map(|set| set as *mut _ as *mut libc::fd_set).unwrap_or(null_mut()); -+ let timeout = timeout.map(|tv| tv as *mut _ as *mut libc::timeval) -+ .unwrap_or(null_mut()); -+ -+ let res = unsafe { -+ libc::select(nfds, readfds, writefds, errorfds, timeout) -+ }; -+ -+ Errno::result(res) -+} -+ -+/// Monitors file descriptors for readiness with an altered signal mask. -+/// -+/// Returns the total number of ready file descriptors in all sets. The sets are changed so that all -+/// file descriptors that are ready for the given operation are set. -+/// -+/// When this function returns, the original signal mask is restored. -+/// -+/// Unlike [`select`](#fn.select), `pselect` does not mutate the `timeout` value. -+/// -+/// # Parameters -+/// -+/// * `nfds`: The highest file descriptor set in any of the passed `FdSet`s, plus 1. If `None`, this -+/// is calculated automatically by calling [`FdSet::highest`] on all descriptor sets and adding 1 -+/// to the maximum of that. -+/// * `readfds`: File descriptors to check for read readiness -+/// * `writefds`: File descriptors to check for write readiness -+/// * `errorfds`: File descriptors to check for pending error conditions. -+/// * `timeout`: Maximum time to wait for descriptors to become ready (`None` to block -+/// indefinitely). -+/// * `sigmask`: Signal mask to activate while waiting for file descriptors to turn -+/// ready (`None` to set no alternative signal mask). -+/// -+/// # References -+/// -+/// [pselect(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/pselect.html) -+/// -+/// [The new pselect() system call](https://lwn.net/Articles/176911/) -+/// -+/// [`FdSet::highest`]: struct.FdSet.html#method.highest -+pub fn pselect<'a, N, R, W, E, T, S>(nfds: N, -+ readfds: R, -+ writefds: W, -+ errorfds: E, -+ timeout: T, -+ sigmask: S) -> Result<c_int> -+where -+ N: Into<Option<c_int>>, -+ R: Into<Option<&'a mut FdSet>>, -+ W: Into<Option<&'a mut FdSet>>, -+ E: Into<Option<&'a mut FdSet>>, -+ T: Into<Option<&'a TimeSpec>>, -+ S: Into<Option<&'a SigSet>>, -+{ -+ let mut readfds = readfds.into(); -+ let mut writefds = writefds.into(); -+ let mut errorfds = errorfds.into(); -+ let sigmask = sigmask.into(); -+ let timeout = timeout.into(); -+ -+ let nfds = nfds.into().unwrap_or_else(|| { -+ readfds.iter_mut() -+ .chain(writefds.iter_mut()) -+ .chain(errorfds.iter_mut()) -+ .map(|set| set.highest().unwrap_or(-1)) -+ .max() -+ .unwrap_or(-1) + 1 -+ }); -+ -+ let readfds = readfds.map(|set| set as *mut _ as *mut libc::fd_set).unwrap_or(null_mut()); -+ let writefds = writefds.map(|set| set as *mut _ as *mut libc::fd_set).unwrap_or(null_mut()); -+ let errorfds = errorfds.map(|set| set as *mut _ as *mut libc::fd_set).unwrap_or(null_mut()); -+ let timeout = timeout.map(|ts| ts.as_ref() as *const libc::timespec).unwrap_or(null()); -+ let sigmask = sigmask.map(|sm| sm.as_ref() as *const libc::sigset_t).unwrap_or(null()); -+ -+ let res = unsafe { -+ libc::pselect(nfds, readfds, writefds, errorfds, timeout, sigmask) -+ }; -+ -+ Errno::result(res) -+} -+ -+ -+#[cfg(test)] -+mod tests { -+ use super::*; -+ use std::os::unix::io::RawFd; -+ use sys::time::{TimeVal, TimeValLike}; -+ use unistd::{write, pipe}; -+ -+ #[test] -+ fn fdset_insert() { -+ let mut fd_set = FdSet::new(); -+ -+ for i in 0..FD_SETSIZE { -+ assert!(!fd_set.contains(i as RawFd)); -+ } -+ -+ fd_set.insert(7); -+ -+ assert!(fd_set.contains(7)); -+ } -+ -+ #[test] -+ fn fdset_remove() { -+ let mut fd_set = FdSet::new(); -+ -+ for i in 0..FD_SETSIZE { -+ assert!(!fd_set.contains(i as RawFd)); -+ } -+ -+ fd_set.insert(7); -+ fd_set.remove(7); -+ -+ for i in 0..FD_SETSIZE { -+ assert!(!fd_set.contains(i as RawFd)); -+ } -+ } -+ -+ #[test] -+ fn fdset_clear() { -+ let mut fd_set = FdSet::new(); -+ fd_set.insert(1); -+ fd_set.insert((FD_SETSIZE / 2) as RawFd); -+ fd_set.insert((FD_SETSIZE - 1) as RawFd); -+ -+ fd_set.clear(); -+ -+ for i in 0..FD_SETSIZE { -+ assert!(!fd_set.contains(i as RawFd)); -+ } -+ } -+ -+ #[test] -+ fn fdset_highest() { -+ let mut set = FdSet::new(); -+ assert_eq!(set.highest(), None); -+ set.insert(0); -+ assert_eq!(set.highest(), Some(0)); -+ set.insert(90); -+ assert_eq!(set.highest(), Some(90)); -+ set.remove(0); -+ assert_eq!(set.highest(), Some(90)); -+ set.remove(90); -+ assert_eq!(set.highest(), None); -+ -+ set.insert(4); -+ set.insert(5); -+ set.insert(7); -+ assert_eq!(set.highest(), Some(7)); -+ } -+ -+ #[test] -+ fn test_select() { -+ let (r1, w1) = pipe().unwrap(); -+ write(w1, b"hi!").unwrap(); -+ let (r2, _w2) = pipe().unwrap(); -+ -+ let mut fd_set = FdSet::new(); -+ fd_set.insert(r1); -+ fd_set.insert(r2); -+ -+ let mut timeout = TimeVal::seconds(10); -+ assert_eq!(1, select(None, -+ &mut fd_set, -+ None, -+ None, -+ &mut timeout).unwrap()); -+ assert!(fd_set.contains(r1)); -+ assert!(!fd_set.contains(r2)); -+ } -+ -+ #[test] -+ fn test_select_nfds() { -+ let (r1, w1) = pipe().unwrap(); -+ write(w1, b"hi!").unwrap(); -+ let (r2, _w2) = pipe().unwrap(); -+ -+ let mut fd_set = FdSet::new(); -+ fd_set.insert(r1); -+ fd_set.insert(r2); -+ -+ let mut timeout = TimeVal::seconds(10); -+ assert_eq!(1, select(Some(fd_set.highest().unwrap() + 1), -+ &mut fd_set, -+ None, -+ None, -+ &mut timeout).unwrap()); -+ assert!(fd_set.contains(r1)); -+ assert!(!fd_set.contains(r2)); -+ } -+ -+ #[test] -+ fn test_select_nfds2() { -+ let (r1, w1) = pipe().unwrap(); -+ write(w1, b"hi!").unwrap(); -+ let (r2, _w2) = pipe().unwrap(); -+ -+ let mut fd_set = FdSet::new(); -+ fd_set.insert(r1); -+ fd_set.insert(r2); -+ -+ let mut timeout = TimeVal::seconds(10); -+ assert_eq!(1, select(::std::cmp::max(r1, r2) + 1, -+ &mut fd_set, -+ None, -+ None, -+ &mut timeout).unwrap()); -+ assert!(fd_set.contains(r1)); -+ assert!(!fd_set.contains(r2)); -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/sendfile.rs b/third_party/rust/nix-0.15.0/src/sys/sendfile.rs -new file mode 100644 -index 0000000000000..a47d8962f73fb ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/sendfile.rs -@@ -0,0 +1,200 @@ -+use std::os::unix::io::RawFd; -+use std::ptr; -+ -+use libc::{self, off_t}; -+ -+use Result; -+use errno::Errno; -+ -+/// Copy up to `count` bytes to `out_fd` from `in_fd` starting at `offset`. -+/// -+/// Returns a `Result` with the number of bytes written. -+/// -+/// If `offset` is `None`, `sendfile` will begin reading at the current offset of `in_fd`and will -+/// update the offset of `in_fd`. If `offset` is `Some`, `sendfile` will begin at the specified -+/// offset and will not update the offset of `in_fd`. Instead, it will mutate `offset` to point to -+/// the byte after the last byte copied. -+/// -+/// `in_fd` must support `mmap`-like operations and therefore cannot be a socket. -+/// -+/// For more information, see [the sendfile(2) man page.](http://man7.org/linux/man-pages/man2/sendfile.2.html) -+#[cfg(any(target_os = "android", target_os = "linux"))] -+pub fn sendfile( -+ out_fd: RawFd, -+ in_fd: RawFd, -+ offset: Option<&mut off_t>, -+ count: usize, -+) -> Result<usize> { -+ let offset = offset -+ .map(|offset| offset as *mut _) -+ .unwrap_or(ptr::null_mut()); -+ let ret = unsafe { libc::sendfile(out_fd, in_fd, offset, count) }; -+ Errno::result(ret).map(|r| r as usize) -+} -+ -+cfg_if! { -+ if #[cfg(any(target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos"))] { -+ use sys::uio::IoVec; -+ -+ #[derive(Clone, Debug, Eq, Hash, PartialEq)] -+ struct SendfileHeaderTrailer<'a>( -+ libc::sf_hdtr, -+ Option<Vec<IoVec<&'a [u8]>>>, -+ Option<Vec<IoVec<&'a [u8]>>>, -+ ); -+ -+ impl<'a> SendfileHeaderTrailer<'a> { -+ fn new( -+ headers: Option<&'a [&'a [u8]]>, -+ trailers: Option<&'a [&'a [u8]]> -+ ) -> SendfileHeaderTrailer<'a> { -+ let header_iovecs: Option<Vec<IoVec<&[u8]>>> = -+ headers.map(|s| s.iter().map(|b| IoVec::from_slice(b)).collect()); -+ let trailer_iovecs: Option<Vec<IoVec<&[u8]>>> = -+ trailers.map(|s| s.iter().map(|b| IoVec::from_slice(b)).collect()); -+ SendfileHeaderTrailer( -+ libc::sf_hdtr { -+ headers: { -+ header_iovecs -+ .as_ref() -+ .map_or(ptr::null(), |v| v.as_ptr()) as *mut libc::iovec -+ }, -+ hdr_cnt: header_iovecs.as_ref().map(|v| v.len()).unwrap_or(0) as i32, -+ trailers: { -+ trailer_iovecs -+ .as_ref() -+ .map_or(ptr::null(), |v| v.as_ptr()) as *mut libc::iovec -+ }, -+ trl_cnt: trailer_iovecs.as_ref().map(|v| v.len()).unwrap_or(0) as i32 -+ }, -+ header_iovecs, -+ trailer_iovecs, -+ ) -+ } -+ } -+ } -+} -+ -+cfg_if! { -+ if #[cfg(target_os = "freebsd")] { -+ use libc::c_int; -+ -+ libc_bitflags!{ -+ /// Configuration options for [`sendfile`.](fn.sendfile.html) -+ pub struct SfFlags: c_int { -+ /// Causes `sendfile` to return EBUSY instead of blocking when attempting to read a -+ /// busy page. -+ SF_NODISKIO; -+ /// Causes `sendfile` to sleep until the network stack releases its reference to the -+ /// VM pages read. When `sendfile` returns, the data is not guaranteed to have been -+ /// sent, but it is safe to modify the file. -+ SF_SYNC; -+ /// Causes `sendfile` to cache exactly the number of pages specified in the -+ /// `readahead` parameter, disabling caching heuristics. -+ SF_USER_READAHEAD; -+ /// Causes `sendfile` not to cache the data read. -+ SF_NOCACHE; -+ } -+ } -+ -+ /// Read up to `count` bytes from `in_fd` starting at `offset` and write to `out_sock`. -+ /// -+ /// Returns a `Result` and a count of bytes written. Bytes written may be non-zero even if -+ /// an error occurs. -+ /// -+ /// `in_fd` must describe a regular file or shared memory object. `out_sock` must describe a -+ /// stream socket. -+ /// -+ /// If `offset` falls past the end of the file, the function returns success and zero bytes -+ /// written. -+ /// -+ /// If `count` is `None` or 0, bytes will be read from `in_fd` until reaching the end of -+ /// file (EOF). -+ /// -+ /// `headers` and `trailers` specify optional slices of byte slices to be sent before and -+ /// after the data read from `in_fd`, respectively. The length of headers and trailers sent -+ /// is included in the returned count of bytes written. The values of `offset` and `count` -+ /// do not apply to headers or trailers. -+ /// -+ /// `readahead` specifies the minimum number of pages to cache in memory ahead of the page -+ /// currently being sent. -+ /// -+ /// For more information, see -+ /// [the sendfile(2) man page.](https://www.freebsd.org/cgi/man.cgi?query=sendfile&sektion=2) -+ pub fn sendfile( -+ in_fd: RawFd, -+ out_sock: RawFd, -+ offset: off_t, -+ count: Option<usize>, -+ headers: Option<&[&[u8]]>, -+ trailers: Option<&[&[u8]]>, -+ flags: SfFlags, -+ readahead: u16 -+ ) -> (Result<()>, off_t) { -+ // Readahead goes in upper 16 bits -+ // Flags goes in lower 16 bits -+ // see `man 2 sendfile` -+ let flags: u32 = ((readahead as u32) << 16) | (flags.bits() as u32); -+ let mut bytes_sent: off_t = 0; -+ let hdtr = headers.or(trailers).map(|_| SendfileHeaderTrailer::new(headers, trailers)); -+ let hdtr_ptr = hdtr.as_ref().map_or(ptr::null(), |s| &s.0 as *const libc::sf_hdtr); -+ let return_code = unsafe { -+ libc::sendfile(in_fd, -+ out_sock, -+ offset, -+ count.unwrap_or(0), -+ hdtr_ptr as *mut libc::sf_hdtr, -+ &mut bytes_sent as *mut off_t, -+ flags as c_int) -+ }; -+ (Errno::result(return_code).and(Ok(())), bytes_sent) -+ } -+ } else if #[cfg(any(target_os = "ios", target_os = "macos"))] { -+ /// Read bytes from `in_fd` starting at `offset` and write up to `count` bytes to -+ /// `out_sock`. -+ /// -+ /// Returns a `Result` and a count of bytes written. Bytes written may be non-zero even if -+ /// an error occurs. -+ /// -+ /// `in_fd` must describe a regular file. `out_sock` must describe a stream socket. -+ /// -+ /// If `offset` falls past the end of the file, the function returns success and zero bytes -+ /// written. -+ /// -+ /// If `count` is `None` or 0, bytes will be read from `in_fd` until reaching the end of -+ /// file (EOF). -+ /// -+ /// `hdtr` specifies an optional list of headers and trailers to be sent before and after -+ /// the data read from `in_fd`, respectively. The length of headers and trailers sent is -+ /// included in the returned count of bytes written. If any headers are specified and -+ /// `count` is non-zero, the length of the headers will be counted in the limit of total -+ /// bytes sent. Trailers do not count toward the limit of bytes sent and will always be sent -+ /// regardless. The value of `offset` does not affect headers or trailers. -+ /// -+ /// For more information, see -+ /// [the sendfile(2) man page.](https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man2/sendfile.2.html) -+ pub fn sendfile( -+ in_fd: RawFd, -+ out_sock: RawFd, -+ offset: off_t, -+ count: Option<off_t>, -+ headers: Option<&[&[u8]]>, -+ trailers: Option<&[&[u8]]> -+ ) -> (Result<()>, off_t) { -+ let mut len = count.unwrap_or(0); -+ let hdtr = headers.or(trailers).map(|_| SendfileHeaderTrailer::new(headers, trailers)); -+ let hdtr_ptr = hdtr.as_ref().map_or(ptr::null(), |s| &s.0 as *const libc::sf_hdtr); -+ let return_code = unsafe { -+ libc::sendfile(in_fd, -+ out_sock, -+ offset, -+ &mut len as *mut off_t, -+ hdtr_ptr as *mut libc::sf_hdtr, -+ 0) -+ }; -+ (Errno::result(return_code).and(Ok(())), len) -+ } -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/signal.rs b/third_party/rust/nix-0.15.0/src/sys/signal.rs -new file mode 100644 -index 0000000000000..1013a77fd4b40 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/signal.rs -@@ -0,0 +1,966 @@ -+// Portions of this file are Copyright 2014 The Rust Project Developers. -+// See http://rust-lang.org/COPYRIGHT. -+ -+///! Operating system signals. -+ -+use libc; -+use {Error, Result}; -+use errno::Errno; -+use std::mem; -+use std::fmt; -+use std::str::FromStr; -+#[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] -+use std::os::unix::io::RawFd; -+use std::ptr; -+ -+#[cfg(not(target_os = "openbsd"))] -+pub use self::sigevent::*; -+ -+libc_enum!{ -+ // Currently there is only one definition of c_int in libc, as well as only one -+ // type for signal constants. -+ // We would prefer to use the libc::c_int alias in the repr attribute. Unfortunately -+ // this is not (yet) possible. -+ #[repr(i32)] -+ pub enum Signal { -+ SIGHUP, -+ SIGINT, -+ SIGQUIT, -+ SIGILL, -+ SIGTRAP, -+ SIGABRT, -+ SIGBUS, -+ SIGFPE, -+ SIGKILL, -+ SIGUSR1, -+ SIGSEGV, -+ SIGUSR2, -+ SIGPIPE, -+ SIGALRM, -+ SIGTERM, -+ #[cfg(all(any(target_os = "android", target_os = "emscripten", target_os = "linux"), -+ not(any(target_arch = "mips", target_arch = "mips64", target_arch = "sparc64"))))] -+ SIGSTKFLT, -+ SIGCHLD, -+ SIGCONT, -+ SIGSTOP, -+ SIGTSTP, -+ SIGTTIN, -+ SIGTTOU, -+ SIGURG, -+ SIGXCPU, -+ SIGXFSZ, -+ SIGVTALRM, -+ SIGPROF, -+ SIGWINCH, -+ SIGIO, -+ #[cfg(any(target_os = "android", target_os = "emscripten", target_os = "linux"))] -+ SIGPWR, -+ SIGSYS, -+ #[cfg(not(any(target_os = "android", target_os = "emscripten", target_os = "linux")))] -+ SIGEMT, -+ #[cfg(not(any(target_os = "android", target_os = "emscripten", target_os = "linux")))] -+ SIGINFO, -+ } -+} -+ -+impl FromStr for Signal { -+ type Err = Error; -+ fn from_str(s: &str) -> Result<Signal> { -+ Ok(match s { -+ "SIGHUP" => Signal::SIGHUP, -+ "SIGINT" => Signal::SIGINT, -+ "SIGQUIT" => Signal::SIGQUIT, -+ "SIGILL" => Signal::SIGILL, -+ "SIGTRAP" => Signal::SIGTRAP, -+ "SIGABRT" => Signal::SIGABRT, -+ "SIGBUS" => Signal::SIGBUS, -+ "SIGFPE" => Signal::SIGFPE, -+ "SIGKILL" => Signal::SIGKILL, -+ "SIGUSR1" => Signal::SIGUSR1, -+ "SIGSEGV" => Signal::SIGSEGV, -+ "SIGUSR2" => Signal::SIGUSR2, -+ "SIGPIPE" => Signal::SIGPIPE, -+ "SIGALRM" => Signal::SIGALRM, -+ "SIGTERM" => Signal::SIGTERM, -+ #[cfg(all(any(target_os = "android", target_os = "emscripten", target_os = "linux"), -+ not(any(target_arch = "mips", target_arch = "mips64", target_arch = "sparc64"))))] -+ "SIGSTKFLT" => Signal::SIGSTKFLT, -+ "SIGCHLD" => Signal::SIGCHLD, -+ "SIGCONT" => Signal::SIGCONT, -+ "SIGSTOP" => Signal::SIGSTOP, -+ "SIGTSTP" => Signal::SIGTSTP, -+ "SIGTTIN" => Signal::SIGTTIN, -+ "SIGTTOU" => Signal::SIGTTOU, -+ "SIGURG" => Signal::SIGURG, -+ "SIGXCPU" => Signal::SIGXCPU, -+ "SIGXFSZ" => Signal::SIGXFSZ, -+ "SIGVTALRM" => Signal::SIGVTALRM, -+ "SIGPROF" => Signal::SIGPROF, -+ "SIGWINCH" => Signal::SIGWINCH, -+ "SIGIO" => Signal::SIGIO, -+ #[cfg(any(target_os = "android", target_os = "emscripten", target_os = "linux"))] -+ "SIGPWR" => Signal::SIGPWR, -+ "SIGSYS" => Signal::SIGSYS, -+ #[cfg(not(any(target_os = "android", target_os = "emscripten", target_os = "linux")))] -+ "SIGEMT" => Signal::SIGEMT, -+ #[cfg(not(any(target_os = "android", target_os = "emscripten", target_os = "linux")))] -+ "SIGINFO" => Signal::SIGINFO, -+ _ => return Err(Error::invalid_argument()), -+ }) -+ } -+} -+ -+impl AsRef<str> for Signal { -+ fn as_ref(&self) -> &str { -+ match *self { -+ Signal::SIGHUP => "SIGHUP", -+ Signal::SIGINT => "SIGINT", -+ Signal::SIGQUIT => "SIGQUIT", -+ Signal::SIGILL => "SIGILL", -+ Signal::SIGTRAP => "SIGTRAP", -+ Signal::SIGABRT => "SIGABRT", -+ Signal::SIGBUS => "SIGBUS", -+ Signal::SIGFPE => "SIGFPE", -+ Signal::SIGKILL => "SIGKILL", -+ Signal::SIGUSR1 => "SIGUSR1", -+ Signal::SIGSEGV => "SIGSEGV", -+ Signal::SIGUSR2 => "SIGUSR2", -+ Signal::SIGPIPE => "SIGPIPE", -+ Signal::SIGALRM => "SIGALRM", -+ Signal::SIGTERM => "SIGTERM", -+ #[cfg(all(any(target_os = "android", target_os = "emscripten", target_os = "linux"), -+ not(any(target_arch = "mips", target_arch = "mips64", target_arch = "sparc64"))))] -+ Signal::SIGSTKFLT => "SIGSTKFLT", -+ Signal::SIGCHLD => "SIGCHLD", -+ Signal::SIGCONT => "SIGCONT", -+ Signal::SIGSTOP => "SIGSTOP", -+ Signal::SIGTSTP => "SIGTSTP", -+ Signal::SIGTTIN => "SIGTTIN", -+ Signal::SIGTTOU => "SIGTTOU", -+ Signal::SIGURG => "SIGURG", -+ Signal::SIGXCPU => "SIGXCPU", -+ Signal::SIGXFSZ => "SIGXFSZ", -+ Signal::SIGVTALRM => "SIGVTALRM", -+ Signal::SIGPROF => "SIGPROF", -+ Signal::SIGWINCH => "SIGWINCH", -+ Signal::SIGIO => "SIGIO", -+ #[cfg(any(target_os = "android", target_os = "emscripten", target_os = "linux"))] -+ Signal::SIGPWR => "SIGPWR", -+ Signal::SIGSYS => "SIGSYS", -+ #[cfg(not(any(target_os = "android", target_os = "emscripten", target_os = "linux")))] -+ Signal::SIGEMT => "SIGEMT", -+ #[cfg(not(any(target_os = "android", target_os = "emscripten", target_os = "linux")))] -+ Signal::SIGINFO => "SIGINFO", -+ } -+ } -+} -+ -+impl fmt::Display for Signal { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ f.write_str(self.as_ref()) -+ } -+} -+ -+pub use self::Signal::*; -+ -+#[cfg(all(any(target_os = "linux", target_os = "android", target_os = "emscripten"), not(any(target_arch = "mips", target_arch = "mips64", target_arch = "sparc64"))))] -+const SIGNALS: [Signal; 31] = [ -+ SIGHUP, -+ SIGINT, -+ SIGQUIT, -+ SIGILL, -+ SIGTRAP, -+ SIGABRT, -+ SIGBUS, -+ SIGFPE, -+ SIGKILL, -+ SIGUSR1, -+ SIGSEGV, -+ SIGUSR2, -+ SIGPIPE, -+ SIGALRM, -+ SIGTERM, -+ SIGSTKFLT, -+ SIGCHLD, -+ SIGCONT, -+ SIGSTOP, -+ SIGTSTP, -+ SIGTTIN, -+ SIGTTOU, -+ SIGURG, -+ SIGXCPU, -+ SIGXFSZ, -+ SIGVTALRM, -+ SIGPROF, -+ SIGWINCH, -+ SIGIO, -+ SIGPWR, -+ SIGSYS]; -+#[cfg(all(any(target_os = "linux", target_os = "android", target_os = "emscripten"), any(target_arch = "mips", target_arch = "mips64", target_arch = "sparc64")))] -+const SIGNALS: [Signal; 30] = [ -+ SIGHUP, -+ SIGINT, -+ SIGQUIT, -+ SIGILL, -+ SIGTRAP, -+ SIGABRT, -+ SIGBUS, -+ SIGFPE, -+ SIGKILL, -+ SIGUSR1, -+ SIGSEGV, -+ SIGUSR2, -+ SIGPIPE, -+ SIGALRM, -+ SIGTERM, -+ SIGCHLD, -+ SIGCONT, -+ SIGSTOP, -+ SIGTSTP, -+ SIGTTIN, -+ SIGTTOU, -+ SIGURG, -+ SIGXCPU, -+ SIGXFSZ, -+ SIGVTALRM, -+ SIGPROF, -+ SIGWINCH, -+ SIGIO, -+ SIGPWR, -+ SIGSYS]; -+#[cfg(not(any(target_os = "linux", target_os = "android", target_os = "emscripten")))] -+const SIGNALS: [Signal; 31] = [ -+ SIGHUP, -+ SIGINT, -+ SIGQUIT, -+ SIGILL, -+ SIGTRAP, -+ SIGABRT, -+ SIGBUS, -+ SIGFPE, -+ SIGKILL, -+ SIGUSR1, -+ SIGSEGV, -+ SIGUSR2, -+ SIGPIPE, -+ SIGALRM, -+ SIGTERM, -+ SIGCHLD, -+ SIGCONT, -+ SIGSTOP, -+ SIGTSTP, -+ SIGTTIN, -+ SIGTTOU, -+ SIGURG, -+ SIGXCPU, -+ SIGXFSZ, -+ SIGVTALRM, -+ SIGPROF, -+ SIGWINCH, -+ SIGIO, -+ SIGSYS, -+ SIGEMT, -+ SIGINFO]; -+ -+pub const NSIG: libc::c_int = 32; -+ -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct SignalIterator { -+ next: usize, -+} -+ -+impl Iterator for SignalIterator { -+ type Item = Signal; -+ -+ fn next(&mut self) -> Option<Signal> { -+ if self.next < SIGNALS.len() { -+ let next_signal = SIGNALS[self.next]; -+ self.next += 1; -+ Some(next_signal) -+ } else { -+ None -+ } -+ } -+} -+ -+impl Signal { -+ pub fn iterator() -> SignalIterator { -+ SignalIterator{next: 0} -+ } -+ -+ // We do not implement the From trait, because it is supposed to be infallible. -+ // With Rust RFC 1542 comes the appropriate trait TryFrom. Once it is -+ // implemented, we'll replace this function. -+ #[inline] -+ pub fn from_c_int(signum: libc::c_int) -> Result<Signal> { -+ if 0 < signum && signum < NSIG { -+ Ok(unsafe { mem::transmute(signum) }) -+ } else { -+ Err(Error::invalid_argument()) -+ } -+ } -+} -+ -+pub const SIGIOT : Signal = SIGABRT; -+pub const SIGPOLL : Signal = SIGIO; -+pub const SIGUNUSED : Signal = SIGSYS; -+ -+libc_bitflags!{ -+ pub struct SaFlags: libc::c_int { -+ SA_NOCLDSTOP; -+ SA_NOCLDWAIT; -+ SA_NODEFER; -+ SA_ONSTACK; -+ SA_RESETHAND; -+ SA_RESTART; -+ SA_SIGINFO; -+ } -+} -+ -+libc_enum! { -+ #[repr(i32)] -+ pub enum SigmaskHow { -+ SIG_BLOCK, -+ SIG_UNBLOCK, -+ SIG_SETMASK, -+ } -+} -+ -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct SigSet { -+ sigset: libc::sigset_t -+} -+ -+ -+impl SigSet { -+ pub fn all() -> SigSet { -+ let mut sigset: libc::sigset_t = unsafe { mem::uninitialized() }; -+ let _ = unsafe { libc::sigfillset(&mut sigset as *mut libc::sigset_t) }; -+ -+ SigSet { sigset: sigset } -+ } -+ -+ pub fn empty() -> SigSet { -+ let mut sigset: libc::sigset_t = unsafe { mem::uninitialized() }; -+ let _ = unsafe { libc::sigemptyset(&mut sigset as *mut libc::sigset_t) }; -+ -+ SigSet { sigset: sigset } -+ } -+ -+ pub fn add(&mut self, signal: Signal) { -+ unsafe { libc::sigaddset(&mut self.sigset as *mut libc::sigset_t, signal as libc::c_int) }; -+ } -+ -+ pub fn clear(&mut self) { -+ unsafe { libc::sigemptyset(&mut self.sigset as *mut libc::sigset_t) }; -+ } -+ -+ pub fn remove(&mut self, signal: Signal) { -+ unsafe { libc::sigdelset(&mut self.sigset as *mut libc::sigset_t, signal as libc::c_int) }; -+ } -+ -+ pub fn contains(&self, signal: Signal) -> bool { -+ let res = unsafe { libc::sigismember(&self.sigset as *const libc::sigset_t, signal as libc::c_int) }; -+ -+ match res { -+ 1 => true, -+ 0 => false, -+ _ => unreachable!("unexpected value from sigismember"), -+ } -+ } -+ -+ pub fn extend(&mut self, other: &SigSet) { -+ for signal in Signal::iterator() { -+ if other.contains(signal) { -+ self.add(signal); -+ } -+ } -+ } -+ -+ /// Gets the currently blocked (masked) set of signals for the calling thread. -+ pub fn thread_get_mask() -> Result<SigSet> { -+ let mut oldmask: SigSet = unsafe { mem::uninitialized() }; -+ pthread_sigmask(SigmaskHow::SIG_SETMASK, None, Some(&mut oldmask))?; -+ Ok(oldmask) -+ } -+ -+ /// Sets the set of signals as the signal mask for the calling thread. -+ pub fn thread_set_mask(&self) -> Result<()> { -+ pthread_sigmask(SigmaskHow::SIG_SETMASK, Some(self), None) -+ } -+ -+ /// Adds the set of signals to the signal mask for the calling thread. -+ pub fn thread_block(&self) -> Result<()> { -+ pthread_sigmask(SigmaskHow::SIG_BLOCK, Some(self), None) -+ } -+ -+ /// Removes the set of signals from the signal mask for the calling thread. -+ pub fn thread_unblock(&self) -> Result<()> { -+ pthread_sigmask(SigmaskHow::SIG_UNBLOCK, Some(self), None) -+ } -+ -+ /// Sets the set of signals as the signal mask, and returns the old mask. -+ pub fn thread_swap_mask(&self, how: SigmaskHow) -> Result<SigSet> { -+ let mut oldmask: SigSet = unsafe { mem::uninitialized() }; -+ pthread_sigmask(how, Some(self), Some(&mut oldmask))?; -+ Ok(oldmask) -+ } -+ -+ /// Suspends execution of the calling thread until one of the signals in the -+ /// signal mask becomes pending, and returns the accepted signal. -+ pub fn wait(&self) -> Result<Signal> { -+ let mut signum: libc::c_int = unsafe { mem::uninitialized() }; -+ let res = unsafe { libc::sigwait(&self.sigset as *const libc::sigset_t, &mut signum) }; -+ -+ Errno::result(res).map(|_| Signal::from_c_int(signum).unwrap()) -+ } -+} -+ -+impl AsRef<libc::sigset_t> for SigSet { -+ fn as_ref(&self) -> &libc::sigset_t { -+ &self.sigset -+ } -+} -+ -+/// A signal handler. -+#[allow(unknown_lints)] -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub enum SigHandler { -+ /// Default signal handling. -+ SigDfl, -+ /// Request that the signal be ignored. -+ SigIgn, -+ /// Use the given signal-catching function, which takes in the signal. -+ Handler(extern fn(libc::c_int)), -+ /// Use the given signal-catching function, which takes in the signal, information about how -+ /// the signal was generated, and a pointer to the threads `ucontext_t`. -+ SigAction(extern fn(libc::c_int, *mut libc::siginfo_t, *mut libc::c_void)) -+} -+ -+/// Action to take on receipt of a signal. Corresponds to `sigaction`. -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct SigAction { -+ sigaction: libc::sigaction -+} -+ -+impl SigAction { -+ /// Creates a new action. -+ /// -+ /// The `SA_SIGINFO` bit in the `flags` argument is ignored (it will be set only if `handler` -+ /// is the `SigAction` variant). `mask` specifies other signals to block during execution of -+ /// the signal-catching function. -+ pub fn new(handler: SigHandler, flags: SaFlags, mask: SigSet) -> SigAction { -+ let mut s = unsafe { mem::uninitialized::<libc::sigaction>() }; -+ s.sa_sigaction = match handler { -+ SigHandler::SigDfl => libc::SIG_DFL, -+ SigHandler::SigIgn => libc::SIG_IGN, -+ SigHandler::Handler(f) => f as *const extern fn(libc::c_int) as usize, -+ SigHandler::SigAction(f) => f as *const extern fn(libc::c_int, *mut libc::siginfo_t, *mut libc::c_void) as usize, -+ }; -+ s.sa_flags = match handler { -+ SigHandler::SigAction(_) => (flags | SaFlags::SA_SIGINFO).bits(), -+ _ => (flags - SaFlags::SA_SIGINFO).bits(), -+ }; -+ s.sa_mask = mask.sigset; -+ -+ SigAction { sigaction: s } -+ } -+ -+ /// Returns the flags set on the action. -+ pub fn flags(&self) -> SaFlags { -+ SaFlags::from_bits_truncate(self.sigaction.sa_flags) -+ } -+ -+ /// Returns the set of signals that are blocked during execution of the action's -+ /// signal-catching function. -+ pub fn mask(&self) -> SigSet { -+ SigSet { sigset: self.sigaction.sa_mask } -+ } -+ -+ /// Returns the action's handler. -+ pub fn handler(&self) -> SigHandler { -+ match self.sigaction.sa_sigaction { -+ libc::SIG_DFL => SigHandler::SigDfl, -+ libc::SIG_IGN => SigHandler::SigIgn, -+ f if self.flags().contains(SaFlags::SA_SIGINFO) => -+ SigHandler::SigAction( unsafe { mem::transmute(f) } ), -+ f => SigHandler::Handler( unsafe { mem::transmute(f) } ), -+ } -+ } -+} -+ -+/// Changes the action taken by a process on receipt of a specific signal. -+/// -+/// `signal` can be any signal except `SIGKILL` or `SIGSTOP`. On success, it returns the previous -+/// action for the given signal. If `sigaction` fails, no new signal handler is installed. -+/// -+/// # Safety -+/// -+/// Signal handlers may be called at any point during execution, which limits what is safe to do in -+/// the body of the signal-catching function. Be certain to only make syscalls that are explicitly -+/// marked safe for signal handlers and only share global data using atomics. -+pub unsafe fn sigaction(signal: Signal, sigaction: &SigAction) -> Result<SigAction> { -+ let mut oldact = mem::uninitialized::<libc::sigaction>(); -+ -+ let res = -+ libc::sigaction(signal as libc::c_int, &sigaction.sigaction as *const libc::sigaction, &mut oldact as *mut libc::sigaction); -+ -+ Errno::result(res).map(|_| SigAction { sigaction: oldact }) -+} -+ -+/// Signal management (see [signal(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/signal.html)) -+/// -+/// Installs `handler` for the given `signal`, returning the previous signal -+/// handler. `signal` should only be used following another call to `signal` or -+/// if the current handler is the default. The return value of `signal` is -+/// undefined after setting the handler with [`sigaction`][SigActionFn]. -+/// -+/// # Safety -+/// -+/// If the pointer to the previous signal handler is invalid, undefined -+/// behavior could be invoked when casting it back to a [`SigAction`][SigActionStruct]. -+/// -+/// # Examples -+/// -+/// Ignore `SIGINT`: -+/// -+/// ```no_run -+/// # use nix::sys::signal::{self, Signal, SigHandler}; -+/// unsafe { signal::signal(Signal::SIGINT, SigHandler::SigIgn) }.unwrap(); -+/// ``` -+/// -+/// Use a signal handler to set a flag variable: -+/// -+/// ```no_run -+/// # #[macro_use] extern crate lazy_static; -+/// # extern crate libc; -+/// # extern crate nix; -+/// # use std::sync::atomic::{AtomicBool, Ordering}; -+/// # use nix::sys::signal::{self, Signal, SigHandler}; -+/// lazy_static! { -+/// static ref SIGNALED: AtomicBool = AtomicBool::new(false); -+/// } -+/// -+/// extern fn handle_sigint(signal: libc::c_int) { -+/// let signal = Signal::from_c_int(signal).unwrap(); -+/// SIGNALED.store(signal == Signal::SIGINT, Ordering::Relaxed); -+/// } -+/// -+/// fn main() { -+/// let handler = SigHandler::Handler(handle_sigint); -+/// unsafe { signal::signal(Signal::SIGINT, handler) }.unwrap(); -+/// } -+/// ``` -+/// -+/// # Errors -+/// -+/// Returns [`Error::UnsupportedOperation`] if `handler` is -+/// [`SigAction`][SigActionStruct]. Use [`sigaction`][SigActionFn] instead. -+/// -+/// `signal` also returns any error from `libc::signal`, such as when an attempt -+/// is made to catch a signal that cannot be caught or to ignore a signal that -+/// cannot be ignored. -+/// -+/// [`Error::UnsupportedOperation`]: ../../enum.Error.html#variant.UnsupportedOperation -+/// [SigActionStruct]: struct.SigAction.html -+/// [sigactionFn]: fn.sigaction.html -+pub unsafe fn signal(signal: Signal, handler: SigHandler) -> Result<SigHandler> { -+ let signal = signal as libc::c_int; -+ let res = match handler { -+ SigHandler::SigDfl => libc::signal(signal, libc::SIG_DFL), -+ SigHandler::SigIgn => libc::signal(signal, libc::SIG_IGN), -+ SigHandler::Handler(handler) => libc::signal(signal, handler as libc::sighandler_t), -+ SigHandler::SigAction(_) => return Err(Error::UnsupportedOperation), -+ }; -+ Errno::result(res).map(|oldhandler| { -+ match oldhandler { -+ libc::SIG_DFL => SigHandler::SigDfl, -+ libc::SIG_IGN => SigHandler::SigIgn, -+ f => SigHandler::Handler(mem::transmute(f)), -+ } -+ }) -+} -+ -+/// Manages the signal mask (set of blocked signals) for the calling thread. -+/// -+/// If the `set` parameter is `Some(..)`, then the signal mask will be updated with the signal set. -+/// The `how` flag decides the type of update. If `set` is `None`, `how` will be ignored, -+/// and no modification will take place. -+/// -+/// If the 'oldset' parameter is `Some(..)` then the current signal mask will be written into it. -+/// -+/// If both `set` and `oldset` is `Some(..)`, the current signal mask will be written into oldset, -+/// and then it will be updated with `set`. -+/// -+/// If both `set` and `oldset` is None, this function is a no-op. -+/// -+/// For more information, visit the [`pthread_sigmask`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/pthread_sigmask.html), -+/// or [`sigprocmask`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/sigprocmask.html) man pages. -+pub fn pthread_sigmask(how: SigmaskHow, -+ set: Option<&SigSet>, -+ oldset: Option<&mut SigSet>) -> Result<()> { -+ if set.is_none() && oldset.is_none() { -+ return Ok(()) -+ } -+ -+ let res = unsafe { -+ // if set or oldset is None, pass in null pointers instead -+ libc::pthread_sigmask(how as libc::c_int, -+ set.map_or_else(ptr::null::<libc::sigset_t>, -+ |s| &s.sigset as *const libc::sigset_t), -+ oldset.map_or_else(ptr::null_mut::<libc::sigset_t>, -+ |os| &mut os.sigset as *mut libc::sigset_t)) -+ }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Examine and change blocked signals. -+/// -+/// For more informations see the [`sigprocmask` man -+/// pages](http://pubs.opengroup.org/onlinepubs/9699919799/functions/sigprocmask.html). -+pub fn sigprocmask(how: SigmaskHow, set: Option<&SigSet>, oldset: Option<&mut SigSet>) -> Result<()> { -+ if set.is_none() && oldset.is_none() { -+ return Ok(()) -+ } -+ -+ let res = unsafe { -+ // if set or oldset is None, pass in null pointers instead -+ libc::sigprocmask(how as libc::c_int, -+ set.map_or_else(ptr::null::<libc::sigset_t>, -+ |s| &s.sigset as *const libc::sigset_t), -+ oldset.map_or_else(ptr::null_mut::<libc::sigset_t>, -+ |os| &mut os.sigset as *mut libc::sigset_t)) -+ }; -+ -+ Errno::result(res).map(drop) -+} -+ -+pub fn kill<T: Into<Option<Signal>>>(pid: ::unistd::Pid, signal: T) -> Result<()> { -+ let res = unsafe { libc::kill(pid.into(), -+ match signal.into() { -+ Some(s) => s as libc::c_int, -+ None => 0, -+ }) }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Send a signal to a process group [(see -+/// killpg(3))](http://pubs.opengroup.org/onlinepubs/9699919799/functions/killpg.html). -+/// -+/// If `pgrp` less then or equal 1, the behavior is platform-specific. -+/// If `signal` is `None`, `killpg` will only preform error checking and won't -+/// send any signal. -+pub fn killpg<T: Into<Option<Signal>>>(pgrp: ::unistd::Pid, signal: T) -> Result<()> { -+ let res = unsafe { libc::killpg(pgrp.into(), -+ match signal.into() { -+ Some(s) => s as libc::c_int, -+ None => 0, -+ }) }; -+ -+ Errno::result(res).map(drop) -+} -+ -+pub fn raise(signal: Signal) -> Result<()> { -+ let res = unsafe { libc::raise(signal as libc::c_int) }; -+ -+ Errno::result(res).map(drop) -+} -+ -+ -+#[cfg(target_os = "freebsd")] -+pub type type_of_thread_id = libc::lwpid_t; -+#[cfg(target_os = "linux")] -+pub type type_of_thread_id = libc::pid_t; -+ -+/// Used to request asynchronous notification of certain events, for example, -+/// with POSIX AIO, POSIX message queues, and POSIX timers. -+// sigval is actually a union of a int and a void*. But it's never really used -+// as a pointer, because neither libc nor the kernel ever dereference it. nix -+// therefore presents it as an intptr_t, which is how kevent uses it. -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub enum SigevNotify { -+ /// No notification will be delivered -+ SigevNone, -+ /// The signal given by `signal` will be delivered to the process. The -+ /// value in `si_value` will be present in the `si_value` field of the -+ /// `siginfo_t` structure of the queued signal. -+ SigevSignal { signal: Signal, si_value: libc::intptr_t }, -+ // Note: SIGEV_THREAD is not implemented because libc::sigevent does not -+ // expose a way to set the union members needed by SIGEV_THREAD. -+ /// A new `kevent` is posted to the kqueue `kq`. The `kevent`'s `udata` -+ /// field will contain the value in `udata`. -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] -+ SigevKevent { kq: RawFd, udata: libc::intptr_t }, -+ /// The signal `signal` is queued to the thread whose LWP ID is given in -+ /// `thread_id`. The value stored in `si_value` will be present in the -+ /// `si_value` of the `siginfo_t` structure of the queued signal. -+ #[cfg(any(target_os = "freebsd", target_os = "linux"))] -+ SigevThreadId { signal: Signal, thread_id: type_of_thread_id, -+ si_value: libc::intptr_t }, -+} -+ -+#[cfg(not(target_os = "openbsd"))] -+mod sigevent { -+ use libc; -+ use std::mem; -+ use std::ptr; -+ use super::SigevNotify; -+ #[cfg(any(target_os = "freebsd", target_os = "linux"))] -+ use super::type_of_thread_id; -+ -+ /// Used to request asynchronous notification of the completion of certain -+ /// events, such as POSIX AIO and timers. -+ #[repr(C)] -+ #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+ pub struct SigEvent { -+ sigevent: libc::sigevent -+ } -+ -+ impl SigEvent { -+ /// **Note:** this constructor does not allow the user to set the -+ /// `sigev_notify_kevent_flags` field. That's considered ok because on FreeBSD -+ /// at least those flags don't do anything useful. That field is part of a -+ /// union that shares space with the more genuinely useful fields. -+ /// -+ /// **Note:** This constructor also doesn't allow the caller to set the -+ /// `sigev_notify_function` or `sigev_notify_attributes` fields, which are -+ /// required for `SIGEV_THREAD`. That's considered ok because on no operating -+ /// system is `SIGEV_THREAD` the most efficient way to deliver AIO -+ /// notification. FreeBSD and DragonFly BSD programs should prefer `SIGEV_KEVENT`. -+ /// Linux, Solaris, and portable programs should prefer `SIGEV_THREAD_ID` or -+ /// `SIGEV_SIGNAL`. That field is part of a union that shares space with the -+ /// more genuinely useful `sigev_notify_thread_id` -+ pub fn new(sigev_notify: SigevNotify) -> SigEvent { -+ let mut sev = unsafe { mem::zeroed::<libc::sigevent>()}; -+ sev.sigev_notify = match sigev_notify { -+ SigevNotify::SigevNone => libc::SIGEV_NONE, -+ SigevNotify::SigevSignal{..} => libc::SIGEV_SIGNAL, -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] -+ SigevNotify::SigevKevent{..} => libc::SIGEV_KEVENT, -+ #[cfg(target_os = "freebsd")] -+ SigevNotify::SigevThreadId{..} => libc::SIGEV_THREAD_ID, -+ #[cfg(all(target_os = "linux", target_env = "gnu", not(target_arch = "mips")))] -+ SigevNotify::SigevThreadId{..} => libc::SIGEV_THREAD_ID, -+ #[cfg(any(all(target_os = "linux", target_env = "musl"), target_arch = "mips"))] -+ SigevNotify::SigevThreadId{..} => 4 // No SIGEV_THREAD_ID defined -+ }; -+ sev.sigev_signo = match sigev_notify { -+ SigevNotify::SigevSignal{ signal, .. } => signal as libc::c_int, -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] -+ SigevNotify::SigevKevent{ kq, ..} => kq, -+ #[cfg(any(target_os = "linux", target_os = "freebsd"))] -+ SigevNotify::SigevThreadId{ signal, .. } => signal as libc::c_int, -+ _ => 0 -+ }; -+ sev.sigev_value.sival_ptr = match sigev_notify { -+ SigevNotify::SigevNone => ptr::null_mut::<libc::c_void>(), -+ SigevNotify::SigevSignal{ si_value, .. } => si_value as *mut libc::c_void, -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] -+ SigevNotify::SigevKevent{ udata, .. } => udata as *mut libc::c_void, -+ #[cfg(any(target_os = "freebsd", target_os = "linux"))] -+ SigevNotify::SigevThreadId{ si_value, .. } => si_value as *mut libc::c_void, -+ }; -+ SigEvent::set_tid(&mut sev, &sigev_notify); -+ SigEvent{sigevent: sev} -+ } -+ -+ #[cfg(any(target_os = "freebsd", target_os = "linux"))] -+ fn set_tid(sev: &mut libc::sigevent, sigev_notify: &SigevNotify) { -+ sev.sigev_notify_thread_id = match *sigev_notify { -+ SigevNotify::SigevThreadId { thread_id, .. } => thread_id, -+ _ => 0 as type_of_thread_id -+ }; -+ } -+ -+ #[cfg(not(any(target_os = "freebsd", target_os = "linux")))] -+ fn set_tid(_sev: &mut libc::sigevent, _sigev_notify: &SigevNotify) { -+ } -+ -+ pub fn sigevent(&self) -> libc::sigevent { -+ self.sigevent -+ } -+ } -+ -+ impl<'a> From<&'a libc::sigevent> for SigEvent { -+ fn from(sigevent: &libc::sigevent) -> Self { -+ SigEvent{ sigevent: *sigevent } -+ } -+ } -+} -+ -+#[cfg(test)] -+mod tests { -+ use std::thread; -+ use super::*; -+ -+ #[test] -+ fn test_contains() { -+ let mut mask = SigSet::empty(); -+ mask.add(SIGUSR1); -+ -+ assert!(mask.contains(SIGUSR1)); -+ assert!(!mask.contains(SIGUSR2)); -+ -+ let all = SigSet::all(); -+ assert!(all.contains(SIGUSR1)); -+ assert!(all.contains(SIGUSR2)); -+ } -+ -+ #[test] -+ fn test_clear() { -+ let mut set = SigSet::all(); -+ set.clear(); -+ for signal in Signal::iterator() { -+ assert!(!set.contains(signal)); -+ } -+ } -+ -+ #[test] -+ fn test_from_str_round_trips() { -+ for signal in Signal::iterator() { -+ assert_eq!(signal.as_ref().parse::<Signal>().unwrap(), signal); -+ assert_eq!(signal.to_string().parse::<Signal>().unwrap(), signal); -+ } -+ } -+ -+ #[test] -+ fn test_from_str_invalid_value() { -+ let errval = Err(Error::Sys(Errno::EINVAL)); -+ assert_eq!("NOSIGNAL".parse::<Signal>(), errval); -+ assert_eq!("kill".parse::<Signal>(), errval); -+ assert_eq!("9".parse::<Signal>(), errval); -+ } -+ -+ #[test] -+ fn test_extend() { -+ let mut one_signal = SigSet::empty(); -+ one_signal.add(SIGUSR1); -+ -+ let mut two_signals = SigSet::empty(); -+ two_signals.add(SIGUSR2); -+ two_signals.extend(&one_signal); -+ -+ assert!(two_signals.contains(SIGUSR1)); -+ assert!(two_signals.contains(SIGUSR2)); -+ } -+ -+ #[test] -+ fn test_thread_signal_set_mask() { -+ thread::spawn(|| { -+ let prev_mask = SigSet::thread_get_mask() -+ .expect("Failed to get existing signal mask!"); -+ -+ let mut test_mask = prev_mask; -+ test_mask.add(SIGUSR1); -+ -+ assert!(test_mask.thread_set_mask().is_ok()); -+ let new_mask = SigSet::thread_get_mask() -+ .expect("Failed to get new mask!"); -+ -+ assert!(new_mask.contains(SIGUSR1)); -+ assert!(!new_mask.contains(SIGUSR2)); -+ -+ prev_mask.thread_set_mask().expect("Failed to revert signal mask!"); -+ }).join().unwrap(); -+ } -+ -+ #[test] -+ fn test_thread_signal_block() { -+ thread::spawn(|| { -+ let mut mask = SigSet::empty(); -+ mask.add(SIGUSR1); -+ -+ assert!(mask.thread_block().is_ok()); -+ -+ assert!(SigSet::thread_get_mask().unwrap().contains(SIGUSR1)); -+ }).join().unwrap(); -+ } -+ -+ #[test] -+ fn test_thread_signal_unblock() { -+ thread::spawn(|| { -+ let mut mask = SigSet::empty(); -+ mask.add(SIGUSR1); -+ -+ assert!(mask.thread_unblock().is_ok()); -+ -+ assert!(!SigSet::thread_get_mask().unwrap().contains(SIGUSR1)); -+ }).join().unwrap(); -+ } -+ -+ #[test] -+ fn test_thread_signal_swap() { -+ thread::spawn(|| { -+ let mut mask = SigSet::empty(); -+ mask.add(SIGUSR1); -+ mask.thread_block().unwrap(); -+ -+ assert!(SigSet::thread_get_mask().unwrap().contains(SIGUSR1)); -+ -+ let mut mask2 = SigSet::empty(); -+ mask2.add(SIGUSR2); -+ -+ let oldmask = mask2.thread_swap_mask(SigmaskHow::SIG_SETMASK) -+ .unwrap(); -+ -+ assert!(oldmask.contains(SIGUSR1)); -+ assert!(!oldmask.contains(SIGUSR2)); -+ -+ assert!(SigSet::thread_get_mask().unwrap().contains(SIGUSR2)); -+ }).join().unwrap(); -+ } -+ -+ #[test] -+ fn test_sigaction() { -+ use libc; -+ thread::spawn(|| { -+ extern fn test_sigaction_handler(_: libc::c_int) {} -+ extern fn test_sigaction_action(_: libc::c_int, -+ _: *mut libc::siginfo_t, _: *mut libc::c_void) {} -+ -+ let handler_sig = SigHandler::Handler(test_sigaction_handler); -+ -+ let flags = SaFlags::SA_ONSTACK | SaFlags::SA_RESTART | -+ SaFlags::SA_SIGINFO; -+ -+ let mut mask = SigSet::empty(); -+ mask.add(SIGUSR1); -+ -+ let action_sig = SigAction::new(handler_sig, flags, mask); -+ -+ assert_eq!(action_sig.flags(), -+ SaFlags::SA_ONSTACK | SaFlags::SA_RESTART); -+ assert_eq!(action_sig.handler(), handler_sig); -+ -+ mask = action_sig.mask(); -+ assert!(mask.contains(SIGUSR1)); -+ assert!(!mask.contains(SIGUSR2)); -+ -+ let handler_act = SigHandler::SigAction(test_sigaction_action); -+ let action_act = SigAction::new(handler_act, flags, mask); -+ assert_eq!(action_act.handler(), handler_act); -+ -+ let action_dfl = SigAction::new(SigHandler::SigDfl, flags, mask); -+ assert_eq!(action_dfl.handler(), SigHandler::SigDfl); -+ -+ let action_ign = SigAction::new(SigHandler::SigIgn, flags, mask); -+ assert_eq!(action_ign.handler(), SigHandler::SigIgn); -+ }).join().unwrap(); -+ } -+ -+ #[test] -+ fn test_sigwait() { -+ thread::spawn(|| { -+ let mut mask = SigSet::empty(); -+ mask.add(SIGUSR1); -+ mask.add(SIGUSR2); -+ mask.thread_block().unwrap(); -+ -+ raise(SIGUSR1).unwrap(); -+ assert_eq!(mask.wait().unwrap(), SIGUSR1); -+ }).join().unwrap(); -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/signalfd.rs b/third_party/rust/nix-0.15.0/src/sys/signalfd.rs -new file mode 100644 -index 0000000000000..5425a27be9e52 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/signalfd.rs -@@ -0,0 +1,170 @@ -+//! Interface for the `signalfd` syscall. -+//! -+//! # Signal discarding -+//! When a signal can't be delivered to a process (or thread), it will become a pending signal. -+//! Failure to deliver could happen if the signal is blocked by every thread in the process or if -+//! the signal handler is still handling a previous signal. -+//! -+//! If a signal is sent to a process (or thread) that already has a pending signal of the same -+//! type, it will be discarded. This means that if signals of the same type are received faster than -+//! they are processed, some of those signals will be dropped. Because of this limitation, -+//! `signalfd` in itself cannot be used for reliable communication between processes or threads. -+//! -+//! Once the signal is unblocked, or the signal handler is finished, and a signal is still pending -+//! (ie. not consumed from a signalfd) it will be delivered to the signal handler. -+//! -+//! Please note that signal discarding is not specific to `signalfd`, but also happens with regular -+//! signal handlers. -+use libc; -+use unistd; -+use {Error, Result}; -+use errno::Errno; -+pub use sys::signal::{self, SigSet}; -+pub use libc::signalfd_siginfo as siginfo; -+ -+use std::os::unix::io::{RawFd, AsRawFd}; -+use std::mem; -+ -+ -+libc_bitflags!{ -+ pub struct SfdFlags: libc::c_int { -+ SFD_NONBLOCK; -+ SFD_CLOEXEC; -+ } -+} -+ -+pub const SIGNALFD_NEW: RawFd = -1; -+pub const SIGNALFD_SIGINFO_SIZE: usize = 128; -+ -+/// Creates a new file descriptor for reading signals. -+/// -+/// **Important:** please read the module level documentation about signal discarding before using -+/// this function! -+/// -+/// The `mask` parameter specifies the set of signals that can be accepted via this file descriptor. -+/// -+/// A signal must be blocked on every thread in a process, otherwise it won't be visible from -+/// signalfd (the default handler will be invoked instead). -+/// -+/// See [the signalfd man page for more information](http://man7.org/linux/man-pages/man2/signalfd.2.html) -+pub fn signalfd(fd: RawFd, mask: &SigSet, flags: SfdFlags) -> Result<RawFd> { -+ unsafe { -+ Errno::result(libc::signalfd(fd as libc::c_int, mask.as_ref(), flags.bits())) -+ } -+} -+ -+/// A helper struct for creating, reading and closing a `signalfd` instance. -+/// -+/// **Important:** please read the module level documentation about signal discarding before using -+/// this struct! -+/// -+/// # Examples -+/// -+/// ``` -+/// # use nix::sys::signalfd::*; -+/// // Set the thread to block the SIGUSR1 signal, otherwise the default handler will be used -+/// let mut mask = SigSet::empty(); -+/// mask.add(signal::SIGUSR1); -+/// mask.thread_block().unwrap(); -+/// -+/// // Signals are queued up on the file descriptor -+/// let mut sfd = SignalFd::with_flags(&mask, SfdFlags::SFD_NONBLOCK).unwrap(); -+/// -+/// match sfd.read_signal() { -+/// // we caught a signal -+/// Ok(Some(sig)) => (), -+/// // there were no signals waiting (only happens when the SFD_NONBLOCK flag is set, -+/// // otherwise the read_signal call blocks) -+/// Ok(None) => (), -+/// Err(err) => (), // some error happend -+/// } -+/// ``` -+#[derive(Clone, Debug, Eq, Hash, PartialEq)] -+pub struct SignalFd(RawFd); -+ -+impl SignalFd { -+ pub fn new(mask: &SigSet) -> Result<SignalFd> { -+ Self::with_flags(mask, SfdFlags::empty()) -+ } -+ -+ pub fn with_flags(mask: &SigSet, flags: SfdFlags) -> Result<SignalFd> { -+ let fd = signalfd(SIGNALFD_NEW, mask, flags)?; -+ -+ Ok(SignalFd(fd)) -+ } -+ -+ pub fn set_mask(&mut self, mask: &SigSet) -> Result<()> { -+ signalfd(self.0, mask, SfdFlags::empty()).map(drop) -+ } -+ -+ pub fn read_signal(&mut self) -> Result<Option<siginfo>> { -+ let mut buffer: [u8; SIGNALFD_SIGINFO_SIZE] = unsafe { mem::uninitialized() }; -+ -+ match unistd::read(self.0, &mut buffer) { -+ Ok(SIGNALFD_SIGINFO_SIZE) => Ok(Some(unsafe { mem::transmute(buffer) })), -+ Ok(_) => unreachable!("partial read on signalfd"), -+ Err(Error::Sys(Errno::EAGAIN)) => Ok(None), -+ Err(error) => Err(error) -+ } -+ } -+} -+ -+impl Drop for SignalFd { -+ fn drop(&mut self) { -+ let _ = unistd::close(self.0); -+ } -+} -+ -+impl AsRawFd for SignalFd { -+ fn as_raw_fd(&self) -> RawFd { -+ self.0 -+ } -+} -+ -+impl Iterator for SignalFd { -+ type Item = siginfo; -+ -+ fn next(&mut self) -> Option<Self::Item> { -+ match self.read_signal() { -+ Ok(Some(sig)) => Some(sig), -+ Ok(None) | Err(_) => None, -+ } -+ } -+} -+ -+ -+#[cfg(test)] -+mod tests { -+ use super::*; -+ use std::mem; -+ use libc; -+ -+ -+ #[test] -+ fn check_siginfo_size() { -+ assert_eq!(mem::size_of::<libc::signalfd_siginfo>(), SIGNALFD_SIGINFO_SIZE); -+ } -+ -+ #[test] -+ fn create_signalfd() { -+ let mask = SigSet::empty(); -+ let fd = SignalFd::new(&mask); -+ assert!(fd.is_ok()); -+ } -+ -+ #[test] -+ fn create_signalfd_with_opts() { -+ let mask = SigSet::empty(); -+ let fd = SignalFd::with_flags(&mask, SfdFlags::SFD_CLOEXEC | SfdFlags::SFD_NONBLOCK); -+ assert!(fd.is_ok()); -+ } -+ -+ #[test] -+ fn read_empty_signalfd() { -+ let mask = SigSet::empty(); -+ let mut fd = SignalFd::with_flags(&mask, SfdFlags::SFD_NONBLOCK).unwrap(); -+ -+ let res = fd.read_signal(); -+ assert!(res.unwrap().is_none()); -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/socket/addr.rs b/third_party/rust/nix-0.15.0/src/sys/socket/addr.rs -new file mode 100644 -index 0000000000000..ed41441155361 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/socket/addr.rs -@@ -0,0 +1,1278 @@ -+use super::sa_family_t; -+use {Error, Result, NixPath}; -+use errno::Errno; -+use libc; -+use std::{fmt, mem, net, ptr, slice}; -+use std::ffi::OsStr; -+use std::hash::{Hash, Hasher}; -+use std::path::Path; -+use std::os::unix::ffi::OsStrExt; -+#[cfg(any(target_os = "android", target_os = "linux"))] -+use ::sys::socket::addr::netlink::NetlinkAddr; -+#[cfg(any(target_os = "android", target_os = "linux"))] -+use ::sys::socket::addr::alg::AlgAddr; -+#[cfg(any(target_os = "ios", target_os = "macos"))] -+use std::os::unix::io::RawFd; -+#[cfg(any(target_os = "ios", target_os = "macos"))] -+use ::sys::socket::addr::sys_control::SysControlAddr; -+#[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+pub use self::datalink::LinkAddr; -+#[cfg(target_os = "linux")] -+pub use self::vsock::VsockAddr; -+ -+/// These constants specify the protocol family to be used -+/// in [`socket`](fn.socket.html) and [`socketpair`](fn.socketpair.html) -+#[repr(i32)] -+#[derive(Copy, Clone, PartialEq, Eq, Debug, Hash)] -+pub enum AddressFamily { -+ /// Local communication (see [`unix(7)`](http://man7.org/linux/man-pages/man7/unix.7.html)) -+ Unix = libc::AF_UNIX, -+ /// IPv4 Internet protocols (see [`ip(7)`](http://man7.org/linux/man-pages/man7/ip.7.html)) -+ Inet = libc::AF_INET, -+ /// IPv6 Internet protocols (see [`ipv6(7)`](http://man7.org/linux/man-pages/man7/ipv6.7.html)) -+ Inet6 = libc::AF_INET6, -+ /// Kernel user interface device (see [`netlink(7)`](http://man7.org/linux/man-pages/man7/netlink.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Netlink = libc::AF_NETLINK, -+ /// Low level packet interface (see [`packet(7)`](http://man7.org/linux/man-pages/man7/packet.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Packet = libc::AF_PACKET, -+ /// KEXT Controls and Notifications -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ System = libc::AF_SYSTEM, -+ /// Amateur radio AX.25 protocol -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Ax25 = libc::AF_AX25, -+ /// IPX - Novell protocols -+ Ipx = libc::AF_IPX, -+ /// AppleTalk -+ AppleTalk = libc::AF_APPLETALK, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetRom = libc::AF_NETROM, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Bridge = libc::AF_BRIDGE, -+ /// Access to raw ATM PVCs -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ AtmPvc = libc::AF_ATMPVC, -+ /// ITU-T X.25 / ISO-8208 protocol (see [`x25(7)`](http://man7.org/linux/man-pages/man7/x25.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ X25 = libc::AF_X25, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Rose = libc::AF_ROSE, -+ Decnet = libc::AF_DECnet, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetBeui = libc::AF_NETBEUI, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Security = libc::AF_SECURITY, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Key = libc::AF_KEY, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Ash = libc::AF_ASH, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Econet = libc::AF_ECONET, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ AtmSvc = libc::AF_ATMSVC, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Rds = libc::AF_RDS, -+ Sna = libc::AF_SNA, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Irda = libc::AF_IRDA, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Pppox = libc::AF_PPPOX, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Wanpipe = libc::AF_WANPIPE, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Llc = libc::AF_LLC, -+ #[cfg(target_os = "linux")] -+ Ib = libc::AF_IB, -+ #[cfg(target_os = "linux")] -+ Mpls = libc::AF_MPLS, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Can = libc::AF_CAN, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Tipc = libc::AF_TIPC, -+ #[cfg(not(any(target_os = "ios", target_os = "macos")))] -+ Bluetooth = libc::AF_BLUETOOTH, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Iucv = libc::AF_IUCV, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ RxRpc = libc::AF_RXRPC, -+ Isdn = libc::AF_ISDN, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Phonet = libc::AF_PHONET, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Ieee802154 = libc::AF_IEEE802154, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Caif = libc::AF_CAIF, -+ /// Interface to kernel crypto API -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Alg = libc::AF_ALG, -+ #[cfg(target_os = "linux")] -+ Nfc = libc::AF_NFC, -+ #[cfg(target_os = "linux")] -+ Vsock = libc::AF_VSOCK, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ ImpLink = libc::AF_IMPLINK, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ Pup = libc::AF_PUP, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ Chaos = libc::AF_CHAOS, -+ #[cfg(any(target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ Ns = libc::AF_NS, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ Iso = libc::AF_ISO, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ Datakit = libc::AF_DATAKIT, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ Ccitt = libc::AF_CCITT, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ Dli = libc::AF_DLI, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ Lat = libc::AF_LAT, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ Hylink = libc::AF_HYLINK, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ Link = libc::AF_LINK, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ Coip = libc::AF_COIP, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ Cnt = libc::AF_CNT, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ Natm = libc::AF_NATM, -+ /// Unspecified address family, (see [`getaddrinfo(3)`](http://man7.org/linux/man-pages/man3/getaddrinfo.3.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Unspec = libc::AF_UNSPEC, -+} -+ -+impl AddressFamily { -+ /// Create a new `AddressFamily` from an integer value retrieved from `libc`, usually from -+ /// the `sa_family` field of a `sockaddr`. -+ /// -+ /// Currently only supports these address families: Unix, Inet (v4 & v6), Netlink, Link/Packet -+ /// and System. Returns None for unsupported or unknown address families. -+ pub fn from_i32(family: i32) -> Option<AddressFamily> { -+ match family { -+ libc::AF_UNIX => Some(AddressFamily::Unix), -+ libc::AF_INET => Some(AddressFamily::Inet), -+ libc::AF_INET6 => Some(AddressFamily::Inet6), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ libc::AF_NETLINK => Some(AddressFamily::Netlink), -+ #[cfg(any(target_os = "macos", target_os = "macos"))] -+ libc::AF_SYSTEM => Some(AddressFamily::System), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ libc::AF_PACKET => Some(AddressFamily::Packet), -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ libc::AF_LINK => Some(AddressFamily::Link), -+ #[cfg(target_os = "linux")] -+ libc::AF_VSOCK => Some(AddressFamily::Vsock), -+ _ => None -+ } -+ } -+} -+ -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub enum InetAddr { -+ V4(libc::sockaddr_in), -+ V6(libc::sockaddr_in6), -+} -+ -+impl InetAddr { -+ pub fn from_std(std: &net::SocketAddr) -> InetAddr { -+ match *std { -+ net::SocketAddr::V4(ref addr) => { -+ InetAddr::V4(libc::sockaddr_in { -+ sin_family: AddressFamily::Inet as sa_family_t, -+ sin_port: addr.port().to_be(), // network byte order -+ sin_addr: Ipv4Addr::from_std(addr.ip()).0, -+ .. unsafe { mem::zeroed() } -+ }) -+ } -+ net::SocketAddr::V6(ref addr) => { -+ InetAddr::V6(libc::sockaddr_in6 { -+ sin6_family: AddressFamily::Inet6 as sa_family_t, -+ sin6_port: addr.port().to_be(), // network byte order -+ sin6_addr: Ipv6Addr::from_std(addr.ip()).0, -+ sin6_flowinfo: addr.flowinfo(), // host byte order -+ sin6_scope_id: addr.scope_id(), // host byte order -+ .. unsafe { mem::zeroed() } -+ }) -+ } -+ } -+ } -+ -+ pub fn new(ip: IpAddr, port: u16) -> InetAddr { -+ match ip { -+ IpAddr::V4(ref ip) => { -+ InetAddr::V4(libc::sockaddr_in { -+ sin_family: AddressFamily::Inet as sa_family_t, -+ sin_port: port.to_be(), -+ sin_addr: ip.0, -+ .. unsafe { mem::zeroed() } -+ }) -+ } -+ IpAddr::V6(ref ip) => { -+ InetAddr::V6(libc::sockaddr_in6 { -+ sin6_family: AddressFamily::Inet6 as sa_family_t, -+ sin6_port: port.to_be(), -+ sin6_addr: ip.0, -+ .. unsafe { mem::zeroed() } -+ }) -+ } -+ } -+ } -+ /// Gets the IP address associated with this socket address. -+ pub fn ip(&self) -> IpAddr { -+ match *self { -+ InetAddr::V4(ref sa) => IpAddr::V4(Ipv4Addr(sa.sin_addr)), -+ InetAddr::V6(ref sa) => IpAddr::V6(Ipv6Addr(sa.sin6_addr)), -+ } -+ } -+ -+ /// Gets the port number associated with this socket address -+ pub fn port(&self) -> u16 { -+ match *self { -+ InetAddr::V6(ref sa) => u16::from_be(sa.sin6_port), -+ InetAddr::V4(ref sa) => u16::from_be(sa.sin_port), -+ } -+ } -+ -+ pub fn to_std(&self) -> net::SocketAddr { -+ match *self { -+ InetAddr::V4(ref sa) => net::SocketAddr::V4( -+ net::SocketAddrV4::new( -+ Ipv4Addr(sa.sin_addr).to_std(), -+ self.port())), -+ InetAddr::V6(ref sa) => net::SocketAddr::V6( -+ net::SocketAddrV6::new( -+ Ipv6Addr(sa.sin6_addr).to_std(), -+ self.port(), -+ sa.sin6_flowinfo, -+ sa.sin6_scope_id)), -+ } -+ } -+ -+ pub fn to_str(&self) -> String { -+ format!("{}", self) -+ } -+} -+ -+impl fmt::Display for InetAddr { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ match *self { -+ InetAddr::V4(_) => write!(f, "{}:{}", self.ip(), self.port()), -+ InetAddr::V6(_) => write!(f, "[{}]:{}", self.ip(), self.port()), -+ } -+ } -+} -+ -+/* -+ * -+ * ===== IpAddr ===== -+ * -+ */ -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub enum IpAddr { -+ V4(Ipv4Addr), -+ V6(Ipv6Addr), -+} -+ -+impl IpAddr { -+ /// Create a new IpAddr that contains an IPv4 address. -+ /// -+ /// The result will represent the IP address a.b.c.d -+ pub fn new_v4(a: u8, b: u8, c: u8, d: u8) -> IpAddr { -+ IpAddr::V4(Ipv4Addr::new(a, b, c, d)) -+ } -+ -+ /// Create a new IpAddr that contains an IPv6 address. -+ /// -+ /// The result will represent the IP address a:b:c:d:e:f -+ pub fn new_v6(a: u16, b: u16, c: u16, d: u16, e: u16, f: u16, g: u16, h: u16) -> IpAddr { -+ IpAddr::V6(Ipv6Addr::new(a, b, c, d, e, f, g, h)) -+ } -+ -+ pub fn from_std(std: &net::IpAddr) -> IpAddr { -+ match *std { -+ net::IpAddr::V4(ref std) => IpAddr::V4(Ipv4Addr::from_std(std)), -+ net::IpAddr::V6(ref std) => IpAddr::V6(Ipv6Addr::from_std(std)), -+ } -+ } -+ -+ pub fn to_std(&self) -> net::IpAddr { -+ match *self { -+ IpAddr::V4(ref ip) => net::IpAddr::V4(ip.to_std()), -+ IpAddr::V6(ref ip) => net::IpAddr::V6(ip.to_std()), -+ } -+ } -+} -+ -+impl fmt::Display for IpAddr { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ match *self { -+ IpAddr::V4(ref v4) => v4.fmt(f), -+ IpAddr::V6(ref v6) => v6.fmt(f) -+ } -+ } -+} -+ -+/* -+ * -+ * ===== Ipv4Addr ===== -+ * -+ */ -+ -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct Ipv4Addr(pub libc::in_addr); -+ -+impl Ipv4Addr { -+ pub fn new(a: u8, b: u8, c: u8, d: u8) -> Ipv4Addr { -+ let ip = (((a as u32) << 24) | -+ ((b as u32) << 16) | -+ ((c as u32) << 8) | -+ ((d as u32) << 0)).to_be(); -+ -+ Ipv4Addr(libc::in_addr { s_addr: ip }) -+ } -+ -+ pub fn from_std(std: &net::Ipv4Addr) -> Ipv4Addr { -+ let bits = std.octets(); -+ Ipv4Addr::new(bits[0], bits[1], bits[2], bits[3]) -+ } -+ -+ pub fn any() -> Ipv4Addr { -+ Ipv4Addr(libc::in_addr { s_addr: libc::INADDR_ANY }) -+ } -+ -+ pub fn octets(&self) -> [u8; 4] { -+ let bits = u32::from_be(self.0.s_addr); -+ [(bits >> 24) as u8, (bits >> 16) as u8, (bits >> 8) as u8, bits as u8] -+ } -+ -+ pub fn to_std(&self) -> net::Ipv4Addr { -+ let bits = self.octets(); -+ net::Ipv4Addr::new(bits[0], bits[1], bits[2], bits[3]) -+ } -+} -+ -+impl fmt::Display for Ipv4Addr { -+ fn fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result { -+ let octets = self.octets(); -+ write!(fmt, "{}.{}.{}.{}", octets[0], octets[1], octets[2], octets[3]) -+ } -+} -+ -+/* -+ * -+ * ===== Ipv6Addr ===== -+ * -+ */ -+ -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct Ipv6Addr(pub libc::in6_addr); -+ -+// Note that IPv6 addresses are stored in big endian order on all architectures. -+// See https://tools.ietf.org/html/rfc1700 or consult your favorite search -+// engine. -+ -+macro_rules! to_u8_array { -+ ($($num:ident),*) => { -+ [ $(($num>>8) as u8, ($num&0xff) as u8,)* ] -+ } -+} -+ -+macro_rules! to_u16_array { -+ ($slf:ident, $($first:expr, $second:expr),*) => { -+ [$( (($slf.0.s6_addr[$first] as u16) << 8) + $slf.0.s6_addr[$second] as u16,)*] -+ } -+} -+ -+impl Ipv6Addr { -+ pub fn new(a: u16, b: u16, c: u16, d: u16, e: u16, f: u16, g: u16, h: u16) -> Ipv6Addr { -+ let mut in6_addr_var: libc::in6_addr = unsafe{mem::uninitialized()}; -+ in6_addr_var.s6_addr = to_u8_array!(a,b,c,d,e,f,g,h); -+ Ipv6Addr(in6_addr_var) -+ } -+ -+ pub fn from_std(std: &net::Ipv6Addr) -> Ipv6Addr { -+ let s = std.segments(); -+ Ipv6Addr::new(s[0], s[1], s[2], s[3], s[4], s[5], s[6], s[7]) -+ } -+ -+ /// Return the eight 16-bit segments that make up this address -+ pub fn segments(&self) -> [u16; 8] { -+ to_u16_array!(self, 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15) -+ } -+ -+ pub fn to_std(&self) -> net::Ipv6Addr { -+ let s = self.segments(); -+ net::Ipv6Addr::new(s[0], s[1], s[2], s[3], s[4], s[5], s[6], s[7]) -+ } -+} -+ -+impl fmt::Display for Ipv6Addr { -+ fn fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result { -+ self.to_std().fmt(fmt) -+ } -+} -+ -+/// A wrapper around `sockaddr_un`. -+/// -+/// This also tracks the length of `sun_path` address (excluding -+/// a terminating null), because it may not be null-terminated. For example, -+/// unconnected and Linux abstract sockets are never null-terminated, and POSIX -+/// does not require that `sun_len` include the terminating null even for normal -+/// sockets. Note that the actual sockaddr length is greater by -+/// `offset_of!(libc::sockaddr_un, sun_path)` -+#[derive(Clone, Copy, Debug)] -+pub struct UnixAddr(pub libc::sockaddr_un, pub usize); -+ -+impl UnixAddr { -+ /// Create a new sockaddr_un representing a filesystem path. -+ pub fn new<P: ?Sized + NixPath>(path: &P) -> Result<UnixAddr> { -+ path.with_nix_path(|cstr| { -+ unsafe { -+ let mut ret = libc::sockaddr_un { -+ sun_family: AddressFamily::Unix as sa_family_t, -+ .. mem::zeroed() -+ }; -+ -+ let bytes = cstr.to_bytes(); -+ -+ if bytes.len() > ret.sun_path.len() { -+ return Err(Error::Sys(Errno::ENAMETOOLONG)); -+ } -+ -+ ptr::copy_nonoverlapping(bytes.as_ptr(), -+ ret.sun_path.as_mut_ptr() as *mut u8, -+ bytes.len()); -+ -+ Ok(UnixAddr(ret, bytes.len())) -+ } -+ })? -+ } -+ -+ /// Create a new `sockaddr_un` representing an address in the "abstract namespace". -+ /// -+ /// The leading null byte for the abstract namespace is automatically added; -+ /// thus the input `path` is expected to be the bare name, not null-prefixed. -+ /// This is a Linux-specific extension, primarily used to allow chrooted -+ /// processes to communicate with processes having a different filesystem view. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ pub fn new_abstract(path: &[u8]) -> Result<UnixAddr> { -+ unsafe { -+ let mut ret = libc::sockaddr_un { -+ sun_family: AddressFamily::Unix as sa_family_t, -+ .. mem::zeroed() -+ }; -+ -+ if path.len() + 1 > ret.sun_path.len() { -+ return Err(Error::Sys(Errno::ENAMETOOLONG)); -+ } -+ -+ // Abstract addresses are represented by sun_path[0] == -+ // b'\0', so copy starting one byte in. -+ ptr::copy_nonoverlapping(path.as_ptr(), -+ ret.sun_path.as_mut_ptr().offset(1) as *mut u8, -+ path.len()); -+ -+ Ok(UnixAddr(ret, ret.sun_path.len())) -+ } -+ } -+ -+ fn sun_path(&self) -> &[u8] { -+ unsafe { slice::from_raw_parts(self.0.sun_path.as_ptr() as *const u8, self.1) } -+ } -+ -+ /// If this address represents a filesystem path, return that path. -+ pub fn path(&self) -> Option<&Path> { -+ if self.1 == 0 || self.0.sun_path[0] == 0 { -+ // unnamed or abstract -+ None -+ } else { -+ let p = self.sun_path(); -+ // POSIX only requires that `sun_len` be at least long enough to -+ // contain the pathname, and it need not be null-terminated. So we -+ // need to create a string that is the shorter of the -+ // null-terminated length or the full length. -+ let ptr = &self.0.sun_path as *const libc::c_char; -+ let reallen = unsafe { libc::strnlen(ptr, p.len()) }; -+ Some(Path::new(<OsStr as OsStrExt>::from_bytes(&p[..reallen]))) -+ } -+ } -+ -+ /// If this address represents an abstract socket, return its name. -+ /// -+ /// For abstract sockets only the bare name is returned, without the -+ /// leading null byte. `None` is returned for unnamed or path-backed sockets. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ pub fn as_abstract(&self) -> Option<&[u8]> { -+ if self.1 >= 1 && self.0.sun_path[0] == 0 { -+ Some(&self.sun_path()[1..]) -+ } else { -+ // unnamed or filesystem path -+ None -+ } -+ } -+} -+ -+impl fmt::Display for UnixAddr { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ if self.1 == 0 { -+ f.write_str("<unbound UNIX socket>") -+ } else if let Some(path) = self.path() { -+ path.display().fmt(f) -+ } else { -+ let display = String::from_utf8_lossy(&self.sun_path()[1..]); -+ write!(f, "@{}", display) -+ } -+ } -+} -+ -+impl PartialEq for UnixAddr { -+ fn eq(&self, other: &UnixAddr) -> bool { -+ self.sun_path() == other.sun_path() -+ } -+} -+ -+impl Eq for UnixAddr {} -+ -+impl Hash for UnixAddr { -+ fn hash<H: Hasher>(&self, s: &mut H) { -+ ( self.0.sun_family, self.sun_path() ).hash(s) -+ } -+} -+ -+/// Represents a socket address -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub enum SockAddr { -+ Inet(InetAddr), -+ Unix(UnixAddr), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Netlink(NetlinkAddr), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Alg(AlgAddr), -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ SysControl(SysControlAddr), -+ /// Datalink address (MAC) -+ #[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ Link(LinkAddr), -+ #[cfg(target_os = "linux")] -+ Vsock(VsockAddr), -+} -+ -+impl SockAddr { -+ pub fn new_inet(addr: InetAddr) -> SockAddr { -+ SockAddr::Inet(addr) -+ } -+ -+ pub fn new_unix<P: ?Sized + NixPath>(path: &P) -> Result<SockAddr> { -+ Ok(SockAddr::Unix(UnixAddr::new(path)?)) -+ } -+ -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ pub fn new_netlink(pid: u32, groups: u32) -> SockAddr { -+ SockAddr::Netlink(NetlinkAddr::new(pid, groups)) -+ } -+ -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ pub fn new_alg(alg_type: &str, alg_name: &str) -> SockAddr { -+ SockAddr::Alg(AlgAddr::new(alg_type, alg_name)) -+ } -+ -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ pub fn new_sys_control(sockfd: RawFd, name: &str, unit: u32) -> Result<SockAddr> { -+ SysControlAddr::from_name(sockfd, name, unit).map(|a| SockAddr::SysControl(a)) -+ } -+ -+ #[cfg(target_os = "linux")] -+ pub fn new_vsock(cid: u32, port: u32) -> SockAddr { -+ SockAddr::Vsock(VsockAddr::new(cid, port)) -+ } -+ -+ pub fn family(&self) -> AddressFamily { -+ match *self { -+ SockAddr::Inet(InetAddr::V4(..)) => AddressFamily::Inet, -+ SockAddr::Inet(InetAddr::V6(..)) => AddressFamily::Inet6, -+ SockAddr::Unix(..) => AddressFamily::Unix, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ SockAddr::Netlink(..) => AddressFamily::Netlink, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ SockAddr::Alg(..) => AddressFamily::Alg, -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ SockAddr::SysControl(..) => AddressFamily::System, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ SockAddr::Link(..) => AddressFamily::Packet, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ SockAddr::Link(..) => AddressFamily::Link, -+ #[cfg(target_os = "linux")] -+ SockAddr::Vsock(..) => AddressFamily::Vsock, -+ } -+ } -+ -+ pub fn to_str(&self) -> String { -+ format!("{}", self) -+ } -+ -+ /// Creates a `SockAddr` struct from libc's sockaddr. -+ /// -+ /// Supports only the following address families: Unix, Inet (v4 & v6), Netlink and System. -+ /// Returns None for unsupported families. -+ pub unsafe fn from_libc_sockaddr(addr: *const libc::sockaddr) -> Option<SockAddr> { -+ if addr.is_null() { -+ None -+ } else { -+ match AddressFamily::from_i32((*addr).sa_family as i32) { -+ Some(AddressFamily::Unix) => None, -+ Some(AddressFamily::Inet) => Some(SockAddr::Inet( -+ InetAddr::V4(*(addr as *const libc::sockaddr_in)))), -+ Some(AddressFamily::Inet6) => Some(SockAddr::Inet( -+ InetAddr::V6(*(addr as *const libc::sockaddr_in6)))), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Some(AddressFamily::Netlink) => Some(SockAddr::Netlink( -+ NetlinkAddr(*(addr as *const libc::sockaddr_nl)))), -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ Some(AddressFamily::System) => Some(SockAddr::SysControl( -+ SysControlAddr(*(addr as *const libc::sockaddr_ctl)))), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Some(AddressFamily::Packet) => Some(SockAddr::Link( -+ LinkAddr(*(addr as *const libc::sockaddr_ll)))), -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ Some(AddressFamily::Link) => { -+ let ether_addr = LinkAddr(*(addr as *const libc::sockaddr_dl)); -+ if ether_addr.is_empty() { -+ None -+ } else { -+ Some(SockAddr::Link(ether_addr)) -+ } -+ }, -+ #[cfg(target_os = "linux")] -+ Some(AddressFamily::Vsock) => Some(SockAddr::Vsock( -+ VsockAddr(*(addr as *const libc::sockaddr_vm)))), -+ // Other address families are currently not supported and simply yield a None -+ // entry instead of a proper conversion to a `SockAddr`. -+ Some(_) | None => None, -+ } -+ } -+ } -+ -+ /// Conversion from nix's SockAddr type to the underlying libc sockaddr type. -+ /// -+ /// This is useful for interfacing with other libc functions that don't yet have nix wrappers. -+ /// Returns a reference to the underlying data type (as a sockaddr reference) along -+ /// with the size of the actual data type. sockaddr is commonly used as a proxy for -+ /// a superclass as C doesn't support inheritance, so many functions that take -+ /// a sockaddr * need to take the size of the underlying type as well and then internally cast it back. -+ pub unsafe fn as_ffi_pair(&self) -> (&libc::sockaddr, libc::socklen_t) { -+ match *self { -+ SockAddr::Inet(InetAddr::V4(ref addr)) => (mem::transmute(addr), mem::size_of::<libc::sockaddr_in>() as libc::socklen_t), -+ SockAddr::Inet(InetAddr::V6(ref addr)) => (mem::transmute(addr), mem::size_of::<libc::sockaddr_in6>() as libc::socklen_t), -+ SockAddr::Unix(UnixAddr(ref addr, len)) => (mem::transmute(addr), (len + offset_of!(libc::sockaddr_un, sun_path)) as libc::socklen_t), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ SockAddr::Netlink(NetlinkAddr(ref sa)) => (mem::transmute(sa), mem::size_of::<libc::sockaddr_nl>() as libc::socklen_t), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ SockAddr::Alg(AlgAddr(ref sa)) => (mem::transmute(sa), mem::size_of::<libc::sockaddr_alg>() as libc::socklen_t), -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ SockAddr::SysControl(SysControlAddr(ref sa)) => (mem::transmute(sa), mem::size_of::<libc::sockaddr_ctl>() as libc::socklen_t), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ SockAddr::Link(LinkAddr(ref ether_addr)) => (mem::transmute(ether_addr), mem::size_of::<libc::sockaddr_ll>() as libc::socklen_t), -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ SockAddr::Link(LinkAddr(ref ether_addr)) => (mem::transmute(ether_addr), mem::size_of::<libc::sockaddr_dl>() as libc::socklen_t), -+ #[cfg(target_os = "linux")] -+ SockAddr::Vsock(VsockAddr(ref sa)) => (mem::transmute(sa), mem::size_of::<libc::sockaddr_vm>() as libc::socklen_t), -+ } -+ } -+} -+ -+impl fmt::Display for SockAddr { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ match *self { -+ SockAddr::Inet(ref inet) => inet.fmt(f), -+ SockAddr::Unix(ref unix) => unix.fmt(f), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ SockAddr::Netlink(ref nl) => nl.fmt(f), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ SockAddr::Alg(ref nl) => nl.fmt(f), -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ SockAddr::SysControl(ref sc) => sc.fmt(f), -+ #[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ SockAddr::Link(ref ether_addr) => ether_addr.fmt(f), -+ #[cfg(target_os = "linux")] -+ SockAddr::Vsock(ref svm) => svm.fmt(f), -+ } -+ } -+} -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+pub mod netlink { -+ use ::sys::socket::addr::AddressFamily; -+ use libc::{sa_family_t, sockaddr_nl}; -+ use std::{fmt, mem}; -+ -+ #[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)] -+ pub struct NetlinkAddr(pub sockaddr_nl); -+ -+ impl NetlinkAddr { -+ pub fn new(pid: u32, groups: u32) -> NetlinkAddr { -+ let mut addr: sockaddr_nl = unsafe { mem::zeroed() }; -+ addr.nl_family = AddressFamily::Netlink as sa_family_t; -+ addr.nl_pid = pid; -+ addr.nl_groups = groups; -+ -+ NetlinkAddr(addr) -+ } -+ -+ pub fn pid(&self) -> u32 { -+ self.0.nl_pid -+ } -+ -+ pub fn groups(&self) -> u32 { -+ self.0.nl_groups -+ } -+ } -+ -+ impl fmt::Display for NetlinkAddr { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ write!(f, "pid: {} groups: {}", self.pid(), self.groups()) -+ } -+ } -+} -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+pub mod alg { -+ use libc::{AF_ALG, sockaddr_alg, c_char}; -+ use std::{fmt, mem, str}; -+ use std::hash::{Hash, Hasher}; -+ use std::ffi::CStr; -+ -+ #[derive(Copy, Clone)] -+ pub struct AlgAddr(pub sockaddr_alg); -+ -+ // , PartialEq, Eq, Debug, Hash -+ impl PartialEq for AlgAddr { -+ fn eq(&self, other: &Self) -> bool { -+ let (inner, other) = (self.0, other.0); -+ (inner.salg_family, &inner.salg_type[..], inner.salg_feat, inner.salg_mask, &inner.salg_name[..]) == -+ (other.salg_family, &other.salg_type[..], other.salg_feat, other.salg_mask, &other.salg_name[..]) -+ } -+ } -+ -+ impl Eq for AlgAddr {} -+ -+ impl Hash for AlgAddr { -+ fn hash<H: Hasher>(&self, s: &mut H) { -+ let inner = self.0; -+ (inner.salg_family, &inner.salg_type[..], inner.salg_feat, inner.salg_mask, &inner.salg_name[..]).hash(s); -+ } -+ } -+ -+ impl AlgAddr { -+ pub fn new(alg_type: &str, alg_name: &str) -> AlgAddr { -+ let mut addr: sockaddr_alg = unsafe { mem::zeroed() }; -+ addr.salg_family = AF_ALG as u16; -+ addr.salg_type[..alg_type.len()].copy_from_slice(alg_type.to_string().as_bytes()); -+ addr.salg_name[..alg_name.len()].copy_from_slice(alg_name.to_string().as_bytes()); -+ -+ AlgAddr(addr) -+ } -+ -+ -+ pub fn alg_type(&self) -> &CStr { -+ unsafe { CStr::from_ptr(self.0.salg_type.as_ptr() as *const c_char) } -+ } -+ -+ pub fn alg_name(&self) -> &CStr { -+ unsafe { CStr::from_ptr(self.0.salg_name.as_ptr() as *const c_char) } -+ } -+ } -+ -+ impl fmt::Display for AlgAddr { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ write!(f, "type: {} alg: {}", -+ self.alg_name().to_string_lossy(), -+ self.alg_type().to_string_lossy()) -+ } -+ } -+ -+ impl fmt::Debug for AlgAddr { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ fmt::Display::fmt(self, f) -+ } -+ } -+} -+ -+#[cfg(any(target_os = "ios", target_os = "macos"))] -+pub mod sys_control { -+ use ::sys::socket::addr::AddressFamily; -+ use libc::{self, c_uchar}; -+ use std::{fmt, mem}; -+ use std::os::unix::io::RawFd; -+ use {Errno, Error, Result}; -+ -+ // FIXME: Move type into `libc` -+ #[repr(C)] -+ #[derive(Clone, Copy)] -+ #[allow(missing_debug_implementations)] -+ pub struct ctl_ioc_info { -+ pub ctl_id: u32, -+ pub ctl_name: [c_uchar; MAX_KCTL_NAME], -+ } -+ -+ const CTL_IOC_MAGIC: u8 = 'N' as u8; -+ const CTL_IOC_INFO: u8 = 3; -+ const MAX_KCTL_NAME: usize = 96; -+ -+ ioctl_readwrite!(ctl_info, CTL_IOC_MAGIC, CTL_IOC_INFO, ctl_ioc_info); -+ -+ #[repr(C)] -+ #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+ pub struct SysControlAddr(pub libc::sockaddr_ctl); -+ -+ impl SysControlAddr { -+ pub fn new(id: u32, unit: u32) -> SysControlAddr { -+ let addr = libc::sockaddr_ctl { -+ sc_len: mem::size_of::<libc::sockaddr_ctl>() as c_uchar, -+ sc_family: AddressFamily::System as c_uchar, -+ ss_sysaddr: libc::AF_SYS_CONTROL as u16, -+ sc_id: id, -+ sc_unit: unit, -+ sc_reserved: [0; 5] -+ }; -+ -+ SysControlAddr(addr) -+ } -+ -+ pub fn from_name(sockfd: RawFd, name: &str, unit: u32) -> Result<SysControlAddr> { -+ if name.len() > MAX_KCTL_NAME { -+ return Err(Error::Sys(Errno::ENAMETOOLONG)); -+ } -+ -+ let mut ctl_name = [0; MAX_KCTL_NAME]; -+ ctl_name[..name.len()].clone_from_slice(name.as_bytes()); -+ let mut info = ctl_ioc_info { ctl_id: 0, ctl_name: ctl_name }; -+ -+ unsafe { ctl_info(sockfd, &mut info)?; } -+ -+ Ok(SysControlAddr::new(info.ctl_id, unit)) -+ } -+ -+ pub fn id(&self) -> u32 { -+ self.0.sc_id -+ } -+ -+ pub fn unit(&self) -> u32 { -+ self.0.sc_unit -+ } -+ } -+ -+ impl fmt::Display for SysControlAddr { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ fmt::Debug::fmt(self, f) -+ } -+ } -+} -+ -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+mod datalink { -+ use super::{libc, fmt, AddressFamily}; -+ -+ /// Hardware Address -+ #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+ pub struct LinkAddr(pub libc::sockaddr_ll); -+ -+ impl LinkAddr { -+ /// Always AF_PACKET -+ pub fn family(&self) -> AddressFamily { -+ assert_eq!(self.0.sll_family as i32, libc::AF_PACKET); -+ AddressFamily::Packet -+ } -+ -+ /// Physical-layer protocol -+ pub fn protocol(&self) -> u16 { -+ self.0.sll_protocol -+ } -+ -+ /// Interface number -+ pub fn ifindex(&self) -> usize { -+ self.0.sll_ifindex as usize -+ } -+ -+ /// ARP hardware type -+ pub fn hatype(&self) -> u16 { -+ self.0.sll_hatype -+ } -+ -+ /// Packet type -+ pub fn pkttype(&self) -> u8 { -+ self.0.sll_pkttype -+ } -+ -+ /// Length of MAC address -+ pub fn halen(&self) -> usize { -+ self.0.sll_halen as usize -+ } -+ -+ /// Physical-layer address (MAC) -+ pub fn addr(&self) -> [u8; 6] { -+ let a = self.0.sll_addr[0] as u8; -+ let b = self.0.sll_addr[1] as u8; -+ let c = self.0.sll_addr[2] as u8; -+ let d = self.0.sll_addr[3] as u8; -+ let e = self.0.sll_addr[4] as u8; -+ let f = self.0.sll_addr[5] as u8; -+ -+ [a, b, c, d, e, f] -+ } -+ } -+ -+ impl fmt::Display for LinkAddr { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ let addr = self.addr(); -+ write!(f, "{:02x}:{:02x}:{:02x}:{:02x}:{:02x}:{:02x}", -+ addr[0], -+ addr[1], -+ addr[2], -+ addr[3], -+ addr[4], -+ addr[5]) -+ } -+ } -+} -+ -+#[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+mod datalink { -+ use super::{libc, fmt, AddressFamily}; -+ -+ /// Hardware Address -+ #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+ pub struct LinkAddr(pub libc::sockaddr_dl); -+ -+ impl LinkAddr { -+ /// Total length of sockaddr -+ pub fn len(&self) -> usize { -+ self.0.sdl_len as usize -+ } -+ -+ /// always == AF_LINK -+ pub fn family(&self) -> AddressFamily { -+ assert_eq!(self.0.sdl_family as i32, libc::AF_LINK); -+ AddressFamily::Link -+ } -+ -+ /// interface index, if != 0, system given index for interface -+ pub fn ifindex(&self) -> usize { -+ self.0.sdl_index as usize -+ } -+ -+ /// Datalink type -+ pub fn datalink_type(&self) -> u8 { -+ self.0.sdl_type -+ } -+ -+ // MAC address start position -+ pub fn nlen(&self) -> usize { -+ self.0.sdl_nlen as usize -+ } -+ -+ /// link level address length -+ pub fn alen(&self) -> usize { -+ self.0.sdl_alen as usize -+ } -+ -+ /// link layer selector length -+ pub fn slen(&self) -> usize { -+ self.0.sdl_slen as usize -+ } -+ -+ /// if link level address length == 0, -+ /// or `sdl_data` not be larger. -+ pub fn is_empty(&self) -> bool { -+ let nlen = self.nlen(); -+ let alen = self.alen(); -+ let data_len = self.0.sdl_data.len(); -+ -+ if alen > 0 && nlen + alen < data_len { -+ false -+ } else { -+ true -+ } -+ } -+ -+ /// Physical-layer address (MAC) -+ pub fn addr(&self) -> [u8; 6] { -+ let nlen = self.nlen(); -+ let data = self.0.sdl_data; -+ -+ assert!(!self.is_empty()); -+ -+ let a = data[nlen] as u8; -+ let b = data[nlen + 1] as u8; -+ let c = data[nlen + 2] as u8; -+ let d = data[nlen + 3] as u8; -+ let e = data[nlen + 4] as u8; -+ let f = data[nlen + 5] as u8; -+ -+ [a, b, c, d, e, f] -+ } -+ } -+ -+ impl fmt::Display for LinkAddr { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ let addr = self.addr(); -+ write!(f, "{:02x}:{:02x}:{:02x}:{:02x}:{:02x}:{:02x}", -+ addr[0], -+ addr[1], -+ addr[2], -+ addr[3], -+ addr[4], -+ addr[5]) -+ } -+ } -+} -+ -+#[cfg(target_os = "linux")] -+pub mod vsock { -+ use ::sys::socket::addr::AddressFamily; -+ use libc::{sa_family_t, sockaddr_vm}; -+ use std::{fmt, mem}; -+ use std::hash::{Hash, Hasher}; -+ -+ #[derive(Copy, Clone)] -+ pub struct VsockAddr(pub sockaddr_vm); -+ -+ impl PartialEq for VsockAddr { -+ fn eq(&self, other: &Self) -> bool { -+ let (inner, other) = (self.0, other.0); -+ (inner.svm_family, inner.svm_cid, inner.svm_port) == -+ (other.svm_family, other.svm_cid, other.svm_port) -+ } -+ } -+ -+ impl Eq for VsockAddr {} -+ -+ impl Hash for VsockAddr { -+ fn hash<H: Hasher>(&self, s: &mut H) { -+ let inner = self.0; -+ (inner.svm_family, inner.svm_cid, inner.svm_port).hash(s); -+ } -+ } -+ -+ /// VSOCK Address -+ /// -+ /// The address for AF_VSOCK socket is defined as a combination of a -+ /// 32-bit Context Identifier (CID) and a 32-bit port number. -+ impl VsockAddr { -+ pub fn new(cid: u32, port: u32) -> VsockAddr { -+ let mut addr: sockaddr_vm = unsafe { mem::zeroed() }; -+ addr.svm_family = AddressFamily::Vsock as sa_family_t; -+ addr.svm_cid = cid; -+ addr.svm_port = port; -+ -+ VsockAddr(addr) -+ } -+ -+ /// Context Identifier (CID) -+ pub fn cid(&self) -> u32 { -+ self.0.svm_cid -+ } -+ -+ /// Port number -+ pub fn port(&self) -> u32 { -+ self.0.svm_port -+ } -+ } -+ -+ impl fmt::Display for VsockAddr { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ write!(f, "cid: {} port: {}", self.cid(), self.port()) -+ } -+ } -+ -+ impl fmt::Debug for VsockAddr { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ fmt::Display::fmt(self, f) -+ } -+ } -+} -+ -+#[cfg(test)] -+mod tests { -+ #[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ use super::*; -+ -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ #[test] -+ fn test_macos_loopback_datalink_addr() { -+ let bytes = [20i8, 18, 1, 0, 24, 3, 0, 0, 108, 111, 48, 0, 0, 0, 0, 0]; -+ let sa = bytes.as_ptr() as *const libc::sockaddr; -+ let _sock_addr = unsafe { SockAddr::from_libc_sockaddr(sa) }; -+ assert!(_sock_addr.is_none()); -+ } -+ -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ #[test] -+ fn test_macos_tap_datalink_addr() { -+ let bytes = [20i8, 18, 7, 0, 6, 3, 6, 0, 101, 110, 48, 24, 101, -112, -35, 76, -80]; -+ let ptr = bytes.as_ptr(); -+ let sa = ptr as *const libc::sockaddr; -+ let _sock_addr = unsafe { SockAddr::from_libc_sockaddr(sa) }; -+ -+ assert!(_sock_addr.is_some()); -+ -+ let sock_addr = _sock_addr.unwrap(); -+ -+ assert_eq!(sock_addr.family(), AddressFamily::Link); -+ -+ match sock_addr { -+ SockAddr::Link(ether_addr) => { -+ assert_eq!(ether_addr.addr(), [24u8, 101, 144, 221, 76, 176]); -+ }, -+ _ => { unreachable!() } -+ }; -+ } -+ -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ #[test] -+ fn test_abstract_sun_path() { -+ let name = String::from("nix\0abstract\0test"); -+ let addr = UnixAddr::new_abstract(name.as_bytes()).unwrap(); -+ -+ let sun_path1 = addr.sun_path(); -+ let sun_path2 = [0u8, 110, 105, 120, 0, 97, 98, 115, 116, 114, 97, 99, 116, 0, 116, 101, 115, 116, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]; -+ assert_eq!(sun_path1.len(), sun_path2.len()); -+ for i in 0..sun_path1.len() { -+ assert_eq!(sun_path1[i], sun_path2[i]); -+ } -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/socket/mod.rs b/third_party/rust/nix-0.15.0/src/sys/socket/mod.rs -new file mode 100644 -index 0000000000000..1c12c5f851734 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/socket/mod.rs -@@ -0,0 +1,1294 @@ -+//! Socket interface functions -+//! -+//! [Further reading](http://man7.org/linux/man-pages/man7/socket.7.html) -+use {Error, Result}; -+use errno::Errno; -+use libc::{self, c_void, c_int, iovec, socklen_t, size_t, -+ CMSG_FIRSTHDR, CMSG_NXTHDR, CMSG_DATA, CMSG_LEN}; -+use std::{mem, ptr, slice}; -+use std::os::unix::io::RawFd; -+use sys::time::TimeVal; -+use sys::uio::IoVec; -+ -+mod addr; -+pub mod sockopt; -+ -+/* -+ * -+ * ===== Re-exports ===== -+ * -+ */ -+ -+pub use self::addr::{ -+ AddressFamily, -+ SockAddr, -+ InetAddr, -+ UnixAddr, -+ IpAddr, -+ Ipv4Addr, -+ Ipv6Addr, -+ LinkAddr, -+}; -+#[cfg(any(target_os = "android", target_os = "linux"))] -+pub use ::sys::socket::addr::netlink::NetlinkAddr; -+#[cfg(any(target_os = "android", target_os = "linux"))] -+pub use sys::socket::addr::alg::AlgAddr; -+#[cfg(target_os = "linux")] -+pub use sys::socket::addr::vsock::VsockAddr; -+ -+pub use libc::{ -+ cmsghdr, -+ msghdr, -+ sa_family_t, -+ sockaddr, -+ sockaddr_in, -+ sockaddr_in6, -+ sockaddr_storage, -+ sockaddr_un, -+}; -+ -+// Needed by the cmsg_space macro -+#[doc(hidden)] -+pub use libc::{c_uint, CMSG_SPACE}; -+ -+/// These constants are used to specify the communication semantics -+/// when creating a socket with [`socket()`](fn.socket.html) -+#[derive(Clone, Copy, PartialEq, Eq, Debug)] -+#[repr(i32)] -+pub enum SockType { -+ /// Provides sequenced, reliable, two-way, connection- -+ /// based byte streams. An out-of-band data transmission -+ /// mechanism may be supported. -+ Stream = libc::SOCK_STREAM, -+ /// Supports datagrams (connectionless, unreliable -+ /// messages of a fixed maximum length). -+ Datagram = libc::SOCK_DGRAM, -+ /// Provides a sequenced, reliable, two-way connection- -+ /// based data transmission path for datagrams of fixed -+ /// maximum length; a consumer is required to read an -+ /// entire packet with each input system call. -+ SeqPacket = libc::SOCK_SEQPACKET, -+ /// Provides raw network protocol access. -+ Raw = libc::SOCK_RAW, -+ /// Provides a reliable datagram layer that does not -+ /// guarantee ordering. -+ Rdm = libc::SOCK_RDM, -+} -+ -+/// Constants used in [`socket`](fn.socket.html) and [`socketpair`](fn.socketpair.html) -+/// to specify the protocol to use. -+#[repr(i32)] -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub enum SockProtocol { -+ /// TCP protocol ([ip(7)](http://man7.org/linux/man-pages/man7/ip.7.html)) -+ Tcp = libc::IPPROTO_TCP, -+ /// UDP protocol ([ip(7)](http://man7.org/linux/man-pages/man7/ip.7.html)) -+ Udp = libc::IPPROTO_UDP, -+ /// Allows applications and other KEXTs to be notified when certain kernel events occur -+ /// ([ref](https://developer.apple.com/library/content/documentation/Darwin/Conceptual/NKEConceptual/control/control.html)) -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ KextEvent = libc::SYSPROTO_EVENT, -+ /// Allows applications to configure and control a KEXT -+ /// ([ref](https://developer.apple.com/library/content/documentation/Darwin/Conceptual/NKEConceptual/control/control.html)) -+ #[cfg(any(target_os = "ios", target_os = "macos"))] -+ KextControl = libc::SYSPROTO_CONTROL, -+} -+ -+libc_bitflags!{ -+ /// Additional socket options -+ pub struct SockFlag: c_int { -+ /// Set non-blocking mode on the new socket -+ #[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ SOCK_NONBLOCK; -+ /// Set close-on-exec on the new descriptor -+ #[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ SOCK_CLOEXEC; -+ /// Return `EPIPE` instead of raising `SIGPIPE` -+ #[cfg(target_os = "netbsd")] -+ SOCK_NOSIGPIPE; -+ /// For domains `AF_INET(6)`, only allow `connect(2)`, `sendto(2)`, or `sendmsg(2)` -+ /// to the DNS port (typically 53) -+ #[cfg(target_os = "openbsd")] -+ SOCK_DNS; -+ } -+} -+ -+libc_bitflags!{ -+ /// Flags for send/recv and their relatives -+ pub struct MsgFlags: c_int { -+ /// Sends or requests out-of-band data on sockets that support this notion -+ /// (e.g., of type [`Stream`](enum.SockType.html)); the underlying protocol must also -+ /// support out-of-band data. -+ MSG_OOB; -+ /// Peeks at an incoming message. The data is treated as unread and the next -+ /// [`recv()`](fn.recv.html) -+ /// or similar function shall still return this data. -+ MSG_PEEK; -+ /// Receive operation blocks until the full amount of data can be -+ /// returned. The function may return smaller amount of data if a signal -+ /// is caught, an error or disconnect occurs. -+ MSG_WAITALL; -+ /// Enables nonblocking operation; if the operation would block, -+ /// `EAGAIN` or `EWOULDBLOCK` is returned. This provides similar -+ /// behavior to setting the `O_NONBLOCK` flag -+ /// (via the [`fcntl`](../../fcntl/fn.fcntl.html) -+ /// `F_SETFL` operation), but differs in that `MSG_DONTWAIT` is a per- -+ /// call option, whereas `O_NONBLOCK` is a setting on the open file -+ /// description (see [open(2)](http://man7.org/linux/man-pages/man2/open.2.html)), -+ /// which will affect all threads in -+ /// the calling process and as well as other processes that hold -+ /// file descriptors referring to the same open file description. -+ MSG_DONTWAIT; -+ /// Receive flags: Control Data was discarded (buffer too small) -+ MSG_CTRUNC; -+ /// For raw ([`Packet`](addr/enum.AddressFamily.html)), Internet datagram -+ /// (since Linux 2.4.27/2.6.8), -+ /// netlink (since Linux 2.6.22) and UNIX datagram (since Linux 3.4) -+ /// sockets: return the real length of the packet or datagram, even -+ /// when it was longer than the passed buffer. Not implemented for UNIX -+ /// domain ([unix(7)](https://linux.die.net/man/7/unix)) sockets. -+ /// -+ /// For use with Internet stream sockets, see [tcp(7)](https://linux.die.net/man/7/tcp). -+ MSG_TRUNC; -+ /// Terminates a record (when this notion is supported, as for -+ /// sockets of type [`SeqPacket`](enum.SockType.html)). -+ MSG_EOR; -+ /// This flag specifies that queued errors should be received from -+ /// the socket error queue. (For more details, see -+ /// [recvfrom(2)](https://linux.die.net/man/2/recvfrom)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ MSG_ERRQUEUE; -+ /// Set the `close-on-exec` flag for the file descriptor received via a UNIX domain -+ /// file descriptor using the `SCM_RIGHTS` operation (described in -+ /// [unix(7)](https://linux.die.net/man/7/unix)). -+ /// This flag is useful for the same reasons as the `O_CLOEXEC` flag of -+ /// [open(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/open.html). -+ /// -+ /// Only used in [`recvmsg`](fn.recvmsg.html) function. -+ #[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ MSG_CMSG_CLOEXEC; -+ } -+} -+ -+cfg_if! { -+ if #[cfg(any(target_os = "android", target_os = "linux"))] { -+ /// Unix credentials of the sending process. -+ /// -+ /// This struct is used with the `SO_PEERCRED` ancillary message for UNIX sockets. -+ #[repr(C)] -+ #[derive(Clone, Copy, Debug, Eq, PartialEq)] -+ pub struct UnixCredentials(libc::ucred); -+ -+ impl UnixCredentials { -+ /// Returns the process identifier -+ pub fn pid(&self) -> libc::pid_t { -+ self.0.pid -+ } -+ -+ /// Returns the user identifier -+ pub fn uid(&self) -> libc::uid_t { -+ self.0.uid -+ } -+ -+ /// Returns the group identifier -+ pub fn gid(&self) -> libc::gid_t { -+ self.0.gid -+ } -+ } -+ -+ impl From<libc::ucred> for UnixCredentials { -+ fn from(cred: libc::ucred) -> Self { -+ UnixCredentials(cred) -+ } -+ } -+ -+ impl Into<libc::ucred> for UnixCredentials { -+ fn into(self) -> libc::ucred { -+ self.0 -+ } -+ } -+ } -+} -+ -+/// Request for multicast socket operations -+/// -+/// This is a wrapper type around `ip_mreq`. -+#[repr(C)] -+#[derive(Clone, Copy, Debug, Eq, PartialEq)] -+pub struct IpMembershipRequest(libc::ip_mreq); -+ -+impl IpMembershipRequest { -+ /// Instantiate a new `IpMembershipRequest` -+ /// -+ /// If `interface` is `None`, then `Ipv4Addr::any()` will be used for the interface. -+ pub fn new(group: Ipv4Addr, interface: Option<Ipv4Addr>) -> Self { -+ IpMembershipRequest(libc::ip_mreq { -+ imr_multiaddr: group.0, -+ imr_interface: interface.unwrap_or_else(Ipv4Addr::any).0, -+ }) -+ } -+} -+ -+/// Request for ipv6 multicast socket operations -+/// -+/// This is a wrapper type around `ipv6_mreq`. -+#[repr(C)] -+#[derive(Clone, Copy, Debug, Eq, PartialEq)] -+pub struct Ipv6MembershipRequest(libc::ipv6_mreq); -+ -+impl Ipv6MembershipRequest { -+ /// Instantiate a new `Ipv6MembershipRequest` -+ pub fn new(group: Ipv6Addr) -> Self { -+ Ipv6MembershipRequest(libc::ipv6_mreq { -+ ipv6mr_multiaddr: group.0, -+ ipv6mr_interface: 0, -+ }) -+ } -+} -+ -+cfg_if! { -+ // Darwin and DragonFly BSD always align struct cmsghdr to 32-bit only. -+ if #[cfg(any(target_os = "dragonfly", target_os = "ios", target_os = "macos"))] { -+ type align_of_cmsg_data = u32; -+ } else { -+ type align_of_cmsg_data = size_t; -+ } -+} -+ -+/// A type that can be used to store ancillary data received by -+/// [`recvmsg`](fn.recvmsg.html) -+pub trait CmsgBuffer { -+ fn as_bytes_mut(&mut self) -> &mut [u8]; -+} -+ -+/// Create a buffer large enough for storing some control messages as returned -+/// by [`recvmsg`](fn.recvmsg.html). -+/// -+/// # Examples -+/// -+/// ``` -+/// # #[macro_use] extern crate nix; -+/// # use nix::sys::time::TimeVal; -+/// # use std::os::unix::io::RawFd; -+/// # fn main() { -+/// // Create a buffer for a `ControlMessageOwned::ScmTimestamp` message -+/// let _ = cmsg_space!(TimeVal); -+/// // Create a buffer big enough for a `ControlMessageOwned::ScmRights` message -+/// // with two file descriptors -+/// let _ = cmsg_space!([RawFd; 2]); -+/// // Create a buffer big enough for a `ControlMessageOwned::ScmRights` message -+/// // and a `ControlMessageOwned::ScmTimestamp` message -+/// let _ = cmsg_space!(RawFd, TimeVal); -+/// # } -+/// ``` -+// Unfortunately, CMSG_SPACE isn't a const_fn, or else we could return a -+// stack-allocated array. -+#[macro_export] -+macro_rules! cmsg_space { -+ ( $( $x:ty ),* ) => { -+ { -+ use nix::sys::socket::{c_uint, CMSG_SPACE}; -+ use std::mem; -+ let mut space = 0; -+ $( -+ // CMSG_SPACE is always safe -+ space += unsafe { -+ CMSG_SPACE(mem::size_of::<$x>() as c_uint) -+ } as usize; -+ )* -+ let mut v = Vec::<u8>::with_capacity(space); -+ // safe because any bit pattern is a valid u8 -+ unsafe {v.set_len(space)}; -+ v -+ } -+ } -+} -+ -+/// A structure used to make room in a cmsghdr passed to recvmsg. The -+/// size and alignment match that of a cmsghdr followed by a T, but the -+/// fields are not accessible, as the actual types will change on a call -+/// to recvmsg. -+/// -+/// To make room for multiple messages, nest the type parameter with -+/// tuples: -+/// -+/// ``` -+/// use std::os::unix::io::RawFd; -+/// use nix::sys::socket::CmsgSpace; -+/// let cmsg: CmsgSpace<([RawFd; 3], CmsgSpace<[RawFd; 2]>)> = CmsgSpace::new(); -+/// ``` -+#[repr(C)] -+#[derive(Clone, Copy, Debug, Eq, PartialEq)] -+pub struct CmsgSpace<T> { -+ _hdr: cmsghdr, -+ _pad: [align_of_cmsg_data; 0], -+ _data: T, -+} -+ -+impl<T> CmsgSpace<T> { -+ /// Create a CmsgSpace<T>. The structure is used only for space, so -+ /// the fields are uninitialized. -+ #[deprecated( since="0.14.0", note="Use the cmsg_space! macro instead")] -+ pub fn new() -> Self { -+ // Safe because the fields themselves aren't accessible. -+ unsafe { mem::uninitialized() } -+ } -+} -+ -+impl<T> CmsgBuffer for CmsgSpace<T> { -+ fn as_bytes_mut(&mut self) -> &mut [u8] { -+ // Safe because nothing ever attempts to access CmsgSpace's fields -+ unsafe { -+ slice::from_raw_parts_mut(self as *mut CmsgSpace<T> as *mut u8, -+ mem::size_of::<Self>()) -+ } -+ } -+} -+ -+impl CmsgBuffer for Vec<u8> { -+ fn as_bytes_mut(&mut self) -> &mut [u8] { -+ &mut self[..] -+ } -+} -+ -+#[derive(Clone, Copy, Debug, Eq, PartialEq)] -+pub struct RecvMsg<'a> { -+ pub bytes: usize, -+ cmsghdr: Option<&'a cmsghdr>, -+ pub address: Option<SockAddr>, -+ pub flags: MsgFlags, -+ mhdr: msghdr, -+} -+ -+impl<'a> RecvMsg<'a> { -+ /// Iterate over the valid control messages pointed to by this -+ /// msghdr. -+ pub fn cmsgs(&self) -> CmsgIterator { -+ CmsgIterator { -+ cmsghdr: self.cmsghdr, -+ mhdr: &self.mhdr -+ } -+ } -+} -+ -+#[derive(Clone, Copy, Debug, Eq, PartialEq)] -+pub struct CmsgIterator<'a> { -+ /// Control message buffer to decode from. Must adhere to cmsg alignment. -+ cmsghdr: Option<&'a cmsghdr>, -+ mhdr: &'a msghdr -+} -+ -+impl<'a> Iterator for CmsgIterator<'a> { -+ type Item = ControlMessageOwned; -+ -+ fn next(&mut self) -> Option<ControlMessageOwned> { -+ match self.cmsghdr { -+ None => None, // No more messages -+ Some(hdr) => { -+ // Get the data. -+ // Safe if cmsghdr points to valid data returned by recvmsg(2) -+ let cm = unsafe { Some(ControlMessageOwned::decode_from(hdr))}; -+ // Advance the internal pointer. Safe if mhdr and cmsghdr point -+ // to valid data returned by recvmsg(2) -+ self.cmsghdr = unsafe { -+ let p = CMSG_NXTHDR(self.mhdr as *const _, hdr as *const _); -+ p.as_ref() -+ }; -+ cm -+ } -+ } -+ } -+} -+ -+/// A type-safe wrapper around a single control message, as used with -+/// [`recvmsg`](#fn.recvmsg). -+/// -+/// [Further reading](http://man7.org/linux/man-pages/man3/cmsg.3.html) -+// Nix version 0.13.0 and earlier used ControlMessage for both recvmsg and -+// sendmsg. However, on some platforms the messages returned by recvmsg may be -+// unaligned. ControlMessageOwned takes those messages by copy, obviating any -+// alignment issues. -+// -+// See https://github.com/nix-rust/nix/issues/999 -+#[derive(Clone, Debug, Eq, PartialEq)] -+pub enum ControlMessageOwned { -+ /// Received version of -+ /// [`ControlMessage::ScmRights`][#enum.ControlMessage.html#variant.ScmRights] -+ ScmRights(Vec<RawFd>), -+ /// Received version of -+ /// [`ControlMessage::ScmCredentials`][#enum.ControlMessage.html#variant.ScmCredentials] -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ ScmCredentials(libc::ucred), -+ /// A message of type `SCM_TIMESTAMP`, containing the time the -+ /// packet was received by the kernel. -+ /// -+ /// See the kernel's explanation in "SO_TIMESTAMP" of -+ /// [networking/timestamping](https://www.kernel.org/doc/Documentation/networking/timestamping.txt). -+ /// -+ /// # Examples -+ /// -+ // Disable this test on FreeBSD i386 -+ // https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=222039 -+ #[cfg_attr(not(all(target_os = "freebsd", target_arch = "x86")), doc = " ```")] -+ #[cfg_attr(all(target_os = "freebsd", target_arch = "x86"), doc = " ```no_run")] -+ /// # #[macro_use] extern crate nix; -+ /// # use nix::sys::socket::*; -+ /// # use nix::sys::uio::IoVec; -+ /// # use nix::sys::time::*; -+ /// # use std::time::*; -+ /// # fn main() { -+ /// // Set up -+ /// let message = "Ohayō!".as_bytes(); -+ /// let in_socket = socket( -+ /// AddressFamily::Inet, -+ /// SockType::Datagram, -+ /// SockFlag::empty(), -+ /// None).unwrap(); -+ /// setsockopt(in_socket, sockopt::ReceiveTimestamp, &true).unwrap(); -+ /// let localhost = InetAddr::new(IpAddr::new_v4(127, 0, 0, 1), 0); -+ /// bind(in_socket, &SockAddr::new_inet(localhost)).unwrap(); -+ /// let address = getsockname(in_socket).unwrap(); -+ /// // Get initial time -+ /// let time0 = SystemTime::now(); -+ /// // Send the message -+ /// let iov = [IoVec::from_slice(message)]; -+ /// let flags = MsgFlags::empty(); -+ /// let l = sendmsg(in_socket, &iov, &[], flags, Some(&address)).unwrap(); -+ /// assert_eq!(message.len(), l); -+ /// // Receive the message -+ /// let mut buffer = vec![0u8; message.len()]; -+ /// let mut cmsgspace = cmsg_space!(TimeVal); -+ /// let iov = [IoVec::from_mut_slice(&mut buffer)]; -+ /// let r = recvmsg(in_socket, &iov, Some(&mut cmsgspace), flags).unwrap(); -+ /// let rtime = match r.cmsgs().next() { -+ /// Some(ControlMessageOwned::ScmTimestamp(rtime)) => rtime, -+ /// Some(_) => panic!("Unexpected control message"), -+ /// None => panic!("No control message") -+ /// }; -+ /// // Check the final time -+ /// let time1 = SystemTime::now(); -+ /// // the packet's received timestamp should lie in-between the two system -+ /// // times, unless the system clock was adjusted in the meantime. -+ /// let rduration = Duration::new(rtime.tv_sec() as u64, -+ /// rtime.tv_usec() as u32 * 1000); -+ /// assert!(time0.duration_since(UNIX_EPOCH).unwrap() <= rduration); -+ /// assert!(rduration <= time1.duration_since(UNIX_EPOCH).unwrap()); -+ /// // Close socket -+ /// nix::unistd::close(in_socket).unwrap(); -+ /// # } -+ /// ``` -+ ScmTimestamp(TimeVal), -+ #[cfg(any( -+ target_os = "android", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ ))] -+ Ipv4PacketInfo(libc::in_pktinfo), -+ #[cfg(any( -+ target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "openbsd", -+ target_os = "netbsd", -+ ))] -+ Ipv6PacketInfo(libc::in6_pktinfo), -+ #[cfg(any( -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+ ))] -+ Ipv4RecvIf(libc::sockaddr_dl), -+ #[cfg(any( -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+ ))] -+ Ipv4RecvDstAddr(libc::in_addr), -+ /// Catch-all variant for unimplemented cmsg types. -+ #[doc(hidden)] -+ Unknown(UnknownCmsg), -+} -+ -+impl ControlMessageOwned { -+ /// Decodes a `ControlMessageOwned` from raw bytes. -+ /// -+ /// This is only safe to call if the data is correct for the message type -+ /// specified in the header. Normally, the kernel ensures that this is the -+ /// case. "Correct" in this case includes correct length, alignment and -+ /// actual content. -+ /// -+ /// Returns `None` if the data may be unaligned. In that case use -+ /// `ControlMessageOwned::decode_from`. -+ unsafe fn decode_from(header: &cmsghdr) -> ControlMessageOwned -+ { -+ let p = CMSG_DATA(header); -+ let len = header as *const _ as usize + header.cmsg_len as usize -+ - p as usize; -+ match (header.cmsg_level, header.cmsg_type) { -+ (libc::SOL_SOCKET, libc::SCM_RIGHTS) => { -+ let n = len / mem::size_of::<RawFd>(); -+ let mut fds = Vec::with_capacity(n); -+ for i in 0..n { -+ let fdp = (p as *const RawFd).offset(i as isize); -+ fds.push(ptr::read_unaligned(fdp)); -+ } -+ let cmo = ControlMessageOwned::ScmRights(fds); -+ cmo -+ }, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ (libc::SOL_SOCKET, libc::SCM_CREDENTIALS) => { -+ let cred: libc::ucred = ptr::read_unaligned(p as *const _); -+ ControlMessageOwned::ScmCredentials(cred) -+ } -+ (libc::SOL_SOCKET, libc::SCM_TIMESTAMP) => { -+ let tv: libc::timeval = ptr::read_unaligned(p as *const _); -+ ControlMessageOwned::ScmTimestamp(TimeVal::from(tv)) -+ }, -+ #[cfg(any( -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos" -+ ))] -+ (libc::IPPROTO_IPV6, libc::IPV6_PKTINFO) => { -+ let info = ptr::read_unaligned(p as *const libc::in6_pktinfo); -+ ControlMessageOwned::Ipv6PacketInfo(info) -+ } -+ #[cfg(any( -+ target_os = "android", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ ))] -+ (libc::IPPROTO_IP, libc::IP_PKTINFO) => { -+ let info = ptr::read_unaligned(p as *const libc::in_pktinfo); -+ ControlMessageOwned::Ipv4PacketInfo(info) -+ } -+ #[cfg(any( -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+ ))] -+ (libc::IPPROTO_IP, libc::IP_RECVIF) => { -+ let dl = ptr::read_unaligned(p as *const libc::sockaddr_dl); -+ ControlMessageOwned::Ipv4RecvIf(dl) -+ }, -+ #[cfg(any( -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+ ))] -+ (libc::IPPROTO_IP, libc::IP_RECVDSTADDR) => { -+ let dl = ptr::read_unaligned(p as *const libc::in_addr); -+ ControlMessageOwned::Ipv4RecvDstAddr(dl) -+ }, -+ (_, _) => { -+ let sl = slice::from_raw_parts(p, len); -+ let ucmsg = UnknownCmsg(*header, Vec::<u8>::from(&sl[..])); -+ ControlMessageOwned::Unknown(ucmsg) -+ } -+ } -+ } -+} -+ -+/// A type-safe zero-copy wrapper around a single control message, as used wih -+/// [`sendmsg`](#fn.sendmsg). More types may be added to this enum; do not -+/// exhaustively pattern-match it. -+/// -+/// [Further reading](http://man7.org/linux/man-pages/man3/cmsg.3.html) -+#[derive(Clone, Copy, Debug, Eq, PartialEq)] -+pub enum ControlMessage<'a> { -+ /// A message of type `SCM_RIGHTS`, containing an array of file -+ /// descriptors passed between processes. -+ /// -+ /// See the description in the "Ancillary messages" section of the -+ /// [unix(7) man page](http://man7.org/linux/man-pages/man7/unix.7.html). -+ /// -+ /// Using multiple `ScmRights` messages for a single `sendmsg` call isn't -+ /// recommended since it causes platform-dependent behaviour: It might -+ /// swallow all but the first `ScmRights` message or fail with `EINVAL`. -+ /// Instead, you can put all fds to be passed into a single `ScmRights` -+ /// message. -+ ScmRights(&'a [RawFd]), -+ /// A message of type `SCM_CREDENTIALS`, containing the pid, uid and gid of -+ /// a process connected to the socket. -+ /// -+ /// This is similar to the socket option `SO_PEERCRED`, but requires a -+ /// process to explicitly send its credentials. A process running as root is -+ /// allowed to specify any credentials, while credentials sent by other -+ /// processes are verified by the kernel. -+ /// -+ /// For further information, please refer to the -+ /// [`unix(7)`](http://man7.org/linux/man-pages/man7/unix.7.html) man page. -+ // FIXME: When `#[repr(transparent)]` is stable, use it on `UnixCredentials` -+ // and put that in here instead of a raw ucred. -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ ScmCredentials(&'a libc::ucred), -+ -+ /// Set IV for `AF_ALG` crypto API. -+ /// -+ /// For further information, please refer to the -+ /// [`documentation`](https://kernel.readthedocs.io/en/sphinx-samples/crypto-API.html) -+ #[cfg(any( -+ target_os = "android", -+ target_os = "linux", -+ ))] -+ AlgSetIv(&'a [u8]), -+ /// Set crypto operation for `AF_ALG` crypto API. It may be one of -+ /// `ALG_OP_ENCRYPT` or `ALG_OP_DECRYPT` -+ /// -+ /// For further information, please refer to the -+ /// [`documentation`](https://kernel.readthedocs.io/en/sphinx-samples/crypto-API.html) -+ #[cfg(any( -+ target_os = "android", -+ target_os = "linux", -+ ))] -+ AlgSetOp(&'a libc::c_int), -+ /// Set the length of associated authentication data (AAD) (applicable only to AEAD algorithms) -+ /// for `AF_ALG` crypto API. -+ /// -+ /// For further information, please refer to the -+ /// [`documentation`](https://kernel.readthedocs.io/en/sphinx-samples/crypto-API.html) -+ #[cfg(any( -+ target_os = "android", -+ target_os = "linux", -+ ))] -+ AlgSetAeadAssoclen(&'a u32), -+ -+} -+ -+// An opaque structure used to prevent cmsghdr from being a public type -+#[doc(hidden)] -+#[derive(Clone, Debug, Eq, PartialEq)] -+pub struct UnknownCmsg(cmsghdr, Vec<u8>); -+ -+impl<'a> ControlMessage<'a> { -+ /// The value of CMSG_SPACE on this message. -+ /// Safe because CMSG_SPACE is always safe -+ fn space(&self) -> usize { -+ unsafe{CMSG_SPACE(self.len() as libc::c_uint) as usize} -+ } -+ -+ /// The value of CMSG_LEN on this message. -+ /// Safe because CMSG_LEN is always safe -+ #[cfg(any(target_os = "android", -+ all(target_os = "linux", not(target_env = "musl"))))] -+ fn cmsg_len(&self) -> usize { -+ unsafe{CMSG_LEN(self.len() as libc::c_uint) as usize} -+ } -+ -+ #[cfg(not(any(target_os = "android", -+ all(target_os = "linux", not(target_env = "musl")))))] -+ fn cmsg_len(&self) -> libc::c_uint { -+ unsafe{CMSG_LEN(self.len() as libc::c_uint)} -+ } -+ -+ /// Return a reference to the payload data as a byte pointer -+ fn copy_to_cmsg_data(&self, cmsg_data: *mut u8) { -+ let data_ptr = match self { -+ &ControlMessage::ScmRights(fds) => { -+ fds as *const _ as *const u8 -+ }, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ &ControlMessage::ScmCredentials(creds) => { -+ creds as *const libc::ucred as *const u8 -+ } -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ &ControlMessage::AlgSetIv(iv) => { -+ unsafe { -+ let alg_iv = cmsg_data as *mut libc::af_alg_iv; -+ (*alg_iv).ivlen = iv.len() as u32; -+ ptr::copy_nonoverlapping( -+ iv.as_ptr(), -+ (*alg_iv).iv.as_mut_ptr(), -+ iv.len() -+ ); -+ }; -+ return -+ }, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ &ControlMessage::AlgSetOp(op) => { -+ op as *const _ as *const u8 -+ }, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ &ControlMessage::AlgSetAeadAssoclen(len) => { -+ len as *const _ as *const u8 -+ }, -+ }; -+ unsafe { -+ ptr::copy_nonoverlapping( -+ data_ptr, -+ cmsg_data, -+ self.len() -+ ) -+ }; -+ } -+ -+ /// The size of the payload, excluding its cmsghdr -+ fn len(&self) -> usize { -+ match self { -+ &ControlMessage::ScmRights(fds) => { -+ mem::size_of_val(fds) -+ }, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ &ControlMessage::ScmCredentials(creds) => { -+ mem::size_of_val(creds) -+ } -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ &ControlMessage::AlgSetIv(iv) => { -+ mem::size_of::<libc::af_alg_iv>() + iv.len() -+ }, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ &ControlMessage::AlgSetOp(op) => { -+ mem::size_of_val(op) -+ }, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ &ControlMessage::AlgSetAeadAssoclen(len) => { -+ mem::size_of_val(len) -+ }, -+ } -+ } -+ -+ /// Returns the value to put into the `cmsg_level` field of the header. -+ fn cmsg_level(&self) -> libc::c_int { -+ match self { -+ &ControlMessage::ScmRights(_) => libc::SOL_SOCKET, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ &ControlMessage::ScmCredentials(_) => libc::SOL_SOCKET, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ &ControlMessage::AlgSetIv(_) | &ControlMessage::AlgSetOp(_) | &ControlMessage::AlgSetAeadAssoclen(_) => { -+ libc::SOL_ALG -+ }, -+ } -+ } -+ -+ /// Returns the value to put into the `cmsg_type` field of the header. -+ fn cmsg_type(&self) -> libc::c_int { -+ match self { -+ &ControlMessage::ScmRights(_) => libc::SCM_RIGHTS, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ &ControlMessage::ScmCredentials(_) => libc::SCM_CREDENTIALS, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ &ControlMessage::AlgSetIv(_) => { -+ libc::ALG_SET_IV -+ }, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ &ControlMessage::AlgSetOp(_) => { -+ libc::ALG_SET_OP -+ }, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ &ControlMessage::AlgSetAeadAssoclen(_) => { -+ libc::ALG_SET_AEAD_ASSOCLEN -+ }, -+ } -+ } -+ -+ // Unsafe: cmsg must point to a valid cmsghdr with enough space to -+ // encode self. -+ unsafe fn encode_into(&self, cmsg: *mut cmsghdr) { -+ (*cmsg).cmsg_level = self.cmsg_level(); -+ (*cmsg).cmsg_type = self.cmsg_type(); -+ (*cmsg).cmsg_len = self.cmsg_len(); -+ self.copy_to_cmsg_data(CMSG_DATA(cmsg)); -+ } -+} -+ -+ -+/// Send data in scatter-gather vectors to a socket, possibly accompanied -+/// by ancillary data. Optionally direct the message at the given address, -+/// as with sendto. -+/// -+/// Allocates if cmsgs is nonempty. -+pub fn sendmsg(fd: RawFd, iov: &[IoVec<&[u8]>], cmsgs: &[ControlMessage], -+ flags: MsgFlags, addr: Option<&SockAddr>) -> Result<usize> -+{ -+ let capacity = cmsgs.iter().map(|c| c.space()).sum(); -+ -+ // First size the buffer needed to hold the cmsgs. It must be zeroed, -+ // because subsequent code will not clear the padding bytes. -+ let cmsg_buffer = vec![0u8; capacity]; -+ -+ // Next encode the sending address, if provided -+ let (name, namelen) = match addr { -+ Some(addr) => { -+ let (x, y) = unsafe { addr.as_ffi_pair() }; -+ (x as *const _, y) -+ }, -+ None => (ptr::null(), 0), -+ }; -+ -+ // The message header must be initialized before the individual cmsgs. -+ let cmsg_ptr = if capacity > 0 { -+ cmsg_buffer.as_ptr() as *mut c_void -+ } else { -+ ptr::null_mut() -+ }; -+ -+ let mhdr = { -+ // Musl's msghdr has private fields, so this is the only way to -+ // initialize it. -+ let mut mhdr: msghdr = unsafe{mem::uninitialized()}; -+ mhdr.msg_name = name as *mut _; -+ mhdr.msg_namelen = namelen; -+ // transmute iov into a mutable pointer. sendmsg doesn't really mutate -+ // the buffer, but the standard says that it takes a mutable pointer -+ mhdr.msg_iov = iov.as_ptr() as *mut _; -+ mhdr.msg_iovlen = iov.len() as _; -+ mhdr.msg_control = cmsg_ptr; -+ mhdr.msg_controllen = capacity as _; -+ mhdr.msg_flags = 0; -+ mhdr -+ }; -+ -+ // Encode each cmsg. This must happen after initializing the header because -+ // CMSG_NEXT_HDR and friends read the msg_control and msg_controllen fields. -+ // CMSG_FIRSTHDR is always safe -+ let mut pmhdr: *mut cmsghdr = unsafe{CMSG_FIRSTHDR(&mhdr as *const msghdr)}; -+ for cmsg in cmsgs { -+ assert_ne!(pmhdr, ptr::null_mut()); -+ // Safe because we know that pmhdr is valid, and we initialized it with -+ // sufficient space -+ unsafe { cmsg.encode_into(pmhdr) }; -+ // Safe because mhdr is valid -+ pmhdr = unsafe{CMSG_NXTHDR(&mhdr as *const msghdr, pmhdr)}; -+ } -+ -+ let ret = unsafe { libc::sendmsg(fd, &mhdr, flags.bits()) }; -+ -+ Errno::result(ret).map(|r| r as usize) -+} -+ -+/// Receive message in scatter-gather vectors from a socket, and -+/// optionally receive ancillary data into the provided buffer. -+/// If no ancillary data is desired, use () as the type parameter. -+/// -+/// # References -+/// [recvmsg(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/recvmsg.html) -+pub fn recvmsg<'a>(fd: RawFd, iov: &[IoVec<&mut [u8]>], -+ cmsg_buffer: Option<&'a mut dyn CmsgBuffer>, -+ flags: MsgFlags) -> Result<RecvMsg<'a>> -+{ -+ let mut address: sockaddr_storage = unsafe { mem::uninitialized() }; -+ let (msg_control, msg_controllen) = match cmsg_buffer { -+ Some(cmsgspace) => { -+ let msg_buf = cmsgspace.as_bytes_mut(); -+ (msg_buf.as_mut_ptr(), msg_buf.len()) -+ }, -+ None => (ptr::null_mut(), 0), -+ }; -+ let mut mhdr = { -+ // Musl's msghdr has private fields, so this is the only way to -+ // initialize it. -+ let mut mhdr: msghdr = unsafe{mem::uninitialized()}; -+ mhdr.msg_name = &mut address as *mut sockaddr_storage as *mut c_void; -+ mhdr.msg_namelen = mem::size_of::<sockaddr_storage>() as socklen_t; -+ mhdr.msg_iov = iov.as_ptr() as *mut iovec; -+ mhdr.msg_iovlen = iov.len() as _; -+ mhdr.msg_control = msg_control as *mut c_void; -+ mhdr.msg_controllen = msg_controllen as _; -+ mhdr.msg_flags = 0; -+ mhdr -+ }; -+ -+ let ret = unsafe { libc::recvmsg(fd, &mut mhdr, flags.bits()) }; -+ -+ Errno::result(ret).map(|r| { -+ let cmsghdr = unsafe { -+ if mhdr.msg_controllen > 0 { -+ // got control message(s) -+ debug_assert!(!mhdr.msg_control.is_null()); -+ debug_assert!(msg_controllen >= mhdr.msg_controllen as usize); -+ CMSG_FIRSTHDR(&mhdr as *const msghdr) -+ } else { -+ ptr::null() -+ }.as_ref() -+ }; -+ -+ let address = unsafe { -+ sockaddr_storage_to_addr(&address, mhdr.msg_namelen as usize).ok() -+ }; -+ RecvMsg { -+ bytes: r as usize, -+ cmsghdr, -+ address, -+ flags: MsgFlags::from_bits_truncate(mhdr.msg_flags), -+ mhdr, -+ } -+ }) -+} -+ -+ -+/// Create an endpoint for communication -+/// -+/// The `protocol` specifies a particular protocol to be used with the -+/// socket. Normally only a single protocol exists to support a -+/// particular socket type within a given protocol family, in which case -+/// protocol can be specified as `None`. However, it is possible that many -+/// protocols may exist, in which case a particular protocol must be -+/// specified in this manner. -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/socket.html) -+pub fn socket<T: Into<Option<SockProtocol>>>(domain: AddressFamily, ty: SockType, flags: SockFlag, protocol: T) -> Result<RawFd> { -+ let protocol = match protocol.into() { -+ None => 0, -+ Some(p) => p as c_int, -+ }; -+ -+ // SockFlags are usually embedded into `ty`, but we don't do that in `nix` because it's a -+ // little easier to understand by separating it out. So we have to merge these bitfields -+ // here. -+ let mut ty = ty as c_int; -+ ty |= flags.bits(); -+ -+ let res = unsafe { libc::socket(domain as c_int, ty, protocol) }; -+ -+ Errno::result(res) -+} -+ -+/// Create a pair of connected sockets -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/socketpair.html) -+pub fn socketpair<T: Into<Option<SockProtocol>>>(domain: AddressFamily, ty: SockType, protocol: T, -+ flags: SockFlag) -> Result<(RawFd, RawFd)> { -+ let protocol = match protocol.into() { -+ None => 0, -+ Some(p) => p as c_int, -+ }; -+ -+ // SockFlags are usually embedded into `ty`, but we don't do that in `nix` because it's a -+ // little easier to understand by separating it out. So we have to merge these bitfields -+ // here. -+ let mut ty = ty as c_int; -+ ty |= flags.bits(); -+ -+ let mut fds = [-1, -1]; -+ -+ let res = unsafe { libc::socketpair(domain as c_int, ty, protocol, fds.as_mut_ptr()) }; -+ Errno::result(res)?; -+ -+ Ok((fds[0], fds[1])) -+} -+ -+/// Listen for connections on a socket -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/listen.html) -+pub fn listen(sockfd: RawFd, backlog: usize) -> Result<()> { -+ let res = unsafe { libc::listen(sockfd, backlog as c_int) }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Bind a name to a socket -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/bind.html) -+pub fn bind(fd: RawFd, addr: &SockAddr) -> Result<()> { -+ let res = unsafe { -+ let (ptr, len) = addr.as_ffi_pair(); -+ libc::bind(fd, ptr, len) -+ }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Accept a connection on a socket -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/accept.html) -+pub fn accept(sockfd: RawFd) -> Result<RawFd> { -+ let res = unsafe { libc::accept(sockfd, ptr::null_mut(), ptr::null_mut()) }; -+ -+ Errno::result(res) -+} -+ -+/// Accept a connection on a socket -+/// -+/// [Further reading](http://man7.org/linux/man-pages/man2/accept.2.html) -+#[cfg(any(target_os = "android", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "openbsd"))] -+pub fn accept4(sockfd: RawFd, flags: SockFlag) -> Result<RawFd> { -+ let res = unsafe { libc::accept4(sockfd, ptr::null_mut(), ptr::null_mut(), flags.bits()) }; -+ -+ Errno::result(res) -+} -+ -+/// Initiate a connection on a socket -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/connect.html) -+pub fn connect(fd: RawFd, addr: &SockAddr) -> Result<()> { -+ let res = unsafe { -+ let (ptr, len) = addr.as_ffi_pair(); -+ libc::connect(fd, ptr, len) -+ }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Receive data from a connection-oriented socket. Returns the number of -+/// bytes read -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/recv.html) -+pub fn recv(sockfd: RawFd, buf: &mut [u8], flags: MsgFlags) -> Result<usize> { -+ unsafe { -+ let ret = libc::recv( -+ sockfd, -+ buf.as_ptr() as *mut c_void, -+ buf.len() as size_t, -+ flags.bits()); -+ -+ Errno::result(ret).map(|r| r as usize) -+ } -+} -+ -+/// Receive data from a connectionless or connection-oriented socket. Returns -+/// the number of bytes read and the socket address of the sender. -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/recvfrom.html) -+pub fn recvfrom(sockfd: RawFd, buf: &mut [u8]) -> Result<(usize, SockAddr)> { -+ unsafe { -+ let addr: sockaddr_storage = mem::zeroed(); -+ let mut len = mem::size_of::<sockaddr_storage>() as socklen_t; -+ -+ let ret = Errno::result(libc::recvfrom( -+ sockfd, -+ buf.as_ptr() as *mut c_void, -+ buf.len() as size_t, -+ 0, -+ mem::transmute(&addr), -+ &mut len as *mut socklen_t))?; -+ -+ sockaddr_storage_to_addr(&addr, len as usize) -+ .map(|addr| (ret as usize, addr)) -+ } -+} -+ -+/// Send a message to a socket -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/sendto.html) -+pub fn sendto(fd: RawFd, buf: &[u8], addr: &SockAddr, flags: MsgFlags) -> Result<usize> { -+ let ret = unsafe { -+ let (ptr, len) = addr.as_ffi_pair(); -+ libc::sendto(fd, buf.as_ptr() as *const c_void, buf.len() as size_t, flags.bits(), ptr, len) -+ }; -+ -+ Errno::result(ret).map(|r| r as usize) -+} -+ -+/// Send data to a connection-oriented socket. Returns the number of bytes read -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/send.html) -+pub fn send(fd: RawFd, buf: &[u8], flags: MsgFlags) -> Result<usize> { -+ let ret = unsafe { -+ libc::send(fd, buf.as_ptr() as *const c_void, buf.len() as size_t, flags.bits()) -+ }; -+ -+ Errno::result(ret).map(|r| r as usize) -+} -+ -+/* -+ * -+ * ===== Socket Options ===== -+ * -+ */ -+ -+/// The protocol level at which to get / set socket options. Used as an -+/// argument to `getsockopt` and `setsockopt`. -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/setsockopt.html) -+#[repr(i32)] -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub enum SockLevel { -+ Socket = libc::SOL_SOCKET, -+ Tcp = libc::IPPROTO_TCP, -+ Ip = libc::IPPROTO_IP, -+ Ipv6 = libc::IPPROTO_IPV6, -+ Udp = libc::IPPROTO_UDP, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Netlink = libc::SOL_NETLINK, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ Alg = libc::SOL_ALG, -+} -+ -+/// Represents a socket option that can be accessed or set. Used as an argument -+/// to `getsockopt` -+pub trait GetSockOpt : Copy { -+ type Val; -+ -+ #[doc(hidden)] -+ fn get(&self, fd: RawFd) -> Result<Self::Val>; -+} -+ -+/// Represents a socket option that can be accessed or set. Used as an argument -+/// to `setsockopt` -+pub trait SetSockOpt : Clone { -+ type Val; -+ -+ #[doc(hidden)] -+ fn set(&self, fd: RawFd, val: &Self::Val) -> Result<()>; -+} -+ -+/// Get the current value for the requested socket option -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getsockopt.html) -+pub fn getsockopt<O: GetSockOpt>(fd: RawFd, opt: O) -> Result<O::Val> { -+ opt.get(fd) -+} -+ -+/// Sets the value for the requested socket option -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/setsockopt.html) -+/// -+/// # Examples -+/// -+/// ``` -+/// use nix::sys::socket::setsockopt; -+/// use nix::sys::socket::sockopt::KeepAlive; -+/// use std::net::TcpListener; -+/// use std::os::unix::io::AsRawFd; -+/// -+/// let listener = TcpListener::bind("0.0.0.0:0").unwrap(); -+/// let fd = listener.as_raw_fd(); -+/// let res = setsockopt(fd, KeepAlive, &true); -+/// assert!(res.is_ok()); -+/// ``` -+pub fn setsockopt<O: SetSockOpt>(fd: RawFd, opt: O, val: &O::Val) -> Result<()> { -+ opt.set(fd, val) -+} -+ -+/// Get the address of the peer connected to the socket `fd`. -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getpeername.html) -+pub fn getpeername(fd: RawFd) -> Result<SockAddr> { -+ unsafe { -+ let addr: sockaddr_storage = mem::uninitialized(); -+ let mut len = mem::size_of::<sockaddr_storage>() as socklen_t; -+ -+ let ret = libc::getpeername(fd, mem::transmute(&addr), &mut len); -+ -+ Errno::result(ret)?; -+ -+ sockaddr_storage_to_addr(&addr, len as usize) -+ } -+} -+ -+/// Get the current address to which the socket `fd` is bound. -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getsockname.html) -+pub fn getsockname(fd: RawFd) -> Result<SockAddr> { -+ unsafe { -+ let addr: sockaddr_storage = mem::uninitialized(); -+ let mut len = mem::size_of::<sockaddr_storage>() as socklen_t; -+ -+ let ret = libc::getsockname(fd, mem::transmute(&addr), &mut len); -+ -+ Errno::result(ret)?; -+ -+ sockaddr_storage_to_addr(&addr, len as usize) -+ } -+} -+ -+/// Return the appropriate `SockAddr` type from a `sockaddr_storage` of a certain -+/// size. In C this would usually be done by casting. The `len` argument -+/// should be the number of bytes in the `sockaddr_storage` that are actually -+/// allocated and valid. It must be at least as large as all the useful parts -+/// of the structure. Note that in the case of a `sockaddr_un`, `len` need not -+/// include the terminating null. -+pub unsafe fn sockaddr_storage_to_addr( -+ addr: &sockaddr_storage, -+ len: usize) -> Result<SockAddr> { -+ -+ if len < mem::size_of_val(&addr.ss_family) { -+ return Err(Error::Sys(Errno::ENOTCONN)); -+ } -+ -+ match addr.ss_family as c_int { -+ libc::AF_INET => { -+ assert!(len as usize == mem::size_of::<sockaddr_in>()); -+ let ret = *(addr as *const _ as *const sockaddr_in); -+ Ok(SockAddr::Inet(InetAddr::V4(ret))) -+ } -+ libc::AF_INET6 => { -+ assert!(len as usize == mem::size_of::<sockaddr_in6>()); -+ Ok(SockAddr::Inet(InetAddr::V6(*(addr as *const _ as *const sockaddr_in6)))) -+ } -+ libc::AF_UNIX => { -+ let sun = *(addr as *const _ as *const sockaddr_un); -+ let pathlen = len - offset_of!(sockaddr_un, sun_path); -+ Ok(SockAddr::Unix(UnixAddr(sun, pathlen))) -+ } -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ libc::AF_NETLINK => { -+ use libc::sockaddr_nl; -+ Ok(SockAddr::Netlink(NetlinkAddr(*(addr as *const _ as *const sockaddr_nl)))) -+ } -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ libc::AF_ALG => { -+ use libc::sockaddr_alg; -+ Ok(SockAddr::Alg(AlgAddr(*(addr as *const _ as *const sockaddr_alg)))) -+ } -+ #[cfg(target_os = "linux")] -+ libc::AF_VSOCK => { -+ use libc::sockaddr_vm; -+ Ok(SockAddr::Vsock(VsockAddr(*(addr as *const _ as *const sockaddr_vm)))) -+ } -+ af => panic!("unexpected address family {}", af), -+ } -+} -+ -+ -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub enum Shutdown { -+ /// Further receptions will be disallowed. -+ Read, -+ /// Further transmissions will be disallowed. -+ Write, -+ /// Further receptions and transmissions will be disallowed. -+ Both, -+} -+ -+/// Shut down part of a full-duplex connection. -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/shutdown.html) -+pub fn shutdown(df: RawFd, how: Shutdown) -> Result<()> { -+ unsafe { -+ use libc::shutdown; -+ -+ let how = match how { -+ Shutdown::Read => libc::SHUT_RD, -+ Shutdown::Write => libc::SHUT_WR, -+ Shutdown::Both => libc::SHUT_RDWR, -+ }; -+ -+ Errno::result(shutdown(df, how)).map(drop) -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/socket/sockopt.rs b/third_party/rust/nix-0.15.0/src/sys/socket/sockopt.rs -new file mode 100644 -index 0000000000000..a996010018d5b ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/socket/sockopt.rs -@@ -0,0 +1,680 @@ -+use super::{GetSockOpt, SetSockOpt}; -+use Result; -+use errno::Errno; -+use sys::time::TimeVal; -+use libc::{self, c_int, c_void, socklen_t}; -+use std::mem; -+use std::os::unix::io::RawFd; -+use std::ffi::{OsStr, OsString}; -+#[cfg(target_family = "unix")] -+use std::os::unix::ffi::OsStrExt; -+ -+// Constants -+// TCP_CA_NAME_MAX isn't defined in user space include files -+#[cfg(any(target_os = "freebsd", target_os = "linux"))] -+const TCP_CA_NAME_MAX: usize = 16; -+ -+/// Helper for implementing `SetSockOpt` for a given socket option. See -+/// [`::sys::socket::SetSockOpt`](sys/socket/trait.SetSockOpt.html). -+/// -+/// This macro aims to help implementing `SetSockOpt` for different socket options that accept -+/// different kinds of data to be used with `setsockopt`. -+/// -+/// Instead of using this macro directly consider using `sockopt_impl!`, especially if the option -+/// you are implementing represents a simple type. -+/// -+/// # Arguments -+/// -+/// * `$name:ident`: name of the type you want to implement `SetSockOpt` for. -+/// * `$level:path` : socket layer, or a `protocol level`: could be *raw sockets* -+/// (`libc::SOL_SOCKET`), *ip protocol* (libc::IPPROTO_IP), *tcp protocol* (`libc::IPPROTO_TCP`), -+/// and more. Please refer to your system manual for more options. Will be passed as the second -+/// argument (`level`) to the `setsockopt` call. -+/// * `$flag:path`: a flag name to set. Some examples: `libc::SO_REUSEADDR`, `libc::TCP_NODELAY`, -+/// `libc::IP_ADD_MEMBERSHIP` and others. Will be passed as the third argument (`option_name`) -+/// to the `setsockopt` call. -+/// * Type of the value that you are going to set. -+/// * Type that implements the `Set` trait for the type from the previous item (like `SetBool` for -+/// `bool`, `SetUsize` for `usize`, etc.). -+macro_rules! setsockopt_impl { -+ ($name:ident, $level:path, $flag:path, $ty:ty, $setter:ty) => { -+ impl SetSockOpt for $name { -+ type Val = $ty; -+ -+ fn set(&self, fd: RawFd, val: &$ty) -> Result<()> { -+ unsafe { -+ let setter: $setter = Set::new(val); -+ -+ let res = libc::setsockopt(fd, $level, $flag, -+ setter.ffi_ptr(), -+ setter.ffi_len()); -+ Errno::result(res).map(drop) -+ } -+ } -+ } -+ } -+} -+ -+/// Helper for implementing `GetSockOpt` for a given socket option. See -+/// [`::sys::socket::GetSockOpt`](sys/socket/trait.GetSockOpt.html). -+/// -+/// This macro aims to help implementing `GetSockOpt` for different socket options that accept -+/// different kinds of data to be use with `getsockopt`. -+/// -+/// Instead of using this macro directly consider using `sockopt_impl!`, especially if the option -+/// you are implementing represents a simple type. -+/// -+/// # Arguments -+/// -+/// * Name of the type you want to implement `GetSockOpt` for. -+/// * Socket layer, or a `protocol level`: could be *raw sockets* (`lic::SOL_SOCKET`), *ip -+/// protocol* (libc::IPPROTO_IP), *tcp protocol* (`libc::IPPROTO_TCP`), and more. Please refer -+/// to your system manual for more options. Will be passed as the second argument (`level`) to -+/// the `getsockopt` call. -+/// * A flag to set. Some examples: `libc::SO_REUSEADDR`, `libc::TCP_NODELAY`, -+/// `libc::SO_ORIGINAL_DST` and others. Will be passed as the third argument (`option_name`) to -+/// the `getsockopt` call. -+/// * Type of the value that you are going to get. -+/// * Type that implements the `Get` trait for the type from the previous item (`GetBool` for -+/// `bool`, `GetUsize` for `usize`, etc.). -+macro_rules! getsockopt_impl { -+ ($name:ident, $level:path, $flag:path, $ty:ty, $getter:ty) => { -+ impl GetSockOpt for $name { -+ type Val = $ty; -+ -+ fn get(&self, fd: RawFd) -> Result<$ty> { -+ unsafe { -+ let mut getter: $getter = Get::blank(); -+ -+ let res = libc::getsockopt(fd, $level, $flag, -+ getter.ffi_ptr(), -+ getter.ffi_len()); -+ Errno::result(res)?; -+ -+ Ok(getter.unwrap()) -+ } -+ } -+ } -+ } -+} -+ -+/// Helper to generate the sockopt accessors. See -+/// [`::sys::socket::GetSockOpt`](sys/socket/trait.GetSockOpt.html) and -+/// [`::sys::socket::SetSockOpt`](sys/socket/trait.SetSockOpt.html). -+/// -+/// This macro aims to help implementing `GetSockOpt` and `SetSockOpt` for different socket options -+/// that accept different kinds of data to be use with `getsockopt` and `setsockopt` respectively. -+/// -+/// Basically this macro wraps up the [`getsockopt_impl!`](macro.getsockopt_impl.html) and -+/// [`setsockopt_impl!`](macro.setsockopt_impl.html) macros. -+/// -+/// # Arguments -+/// -+/// * `GetOnly`, `SetOnly` or `Both`: whether you want to implement only getter, only setter or -+/// both of them. -+/// * `$name:ident`: name of type `GetSockOpt`/`SetSockOpt` will be implemented for. -+/// * `$level:path` : socket layer, or a `protocol level`: could be *raw sockets* -+/// (`lic::SOL_SOCKET`), *ip protocol* (libc::IPPROTO_IP), *tcp protocol* (`libc::IPPROTO_TCP`), -+/// and more. Please refer to your system manual for more options. Will be passed as the second -+/// argument (`level`) to the `getsockopt`/`setsockopt` call. -+/// * `$flag:path`: a flag name to set. Some examples: `libc::SO_REUSEADDR`, `libc::TCP_NODELAY`, -+/// `libc::IP_ADD_MEMBERSHIP` and others. Will be passed as the third argument (`option_name`) -+/// to the `setsockopt`/`getsockopt` call. -+/// * `$ty:ty`: type of the value that will be get/set. -+/// * `$getter:ty`: `Get` implementation; optional; only for `GetOnly` and `Both`. -+/// * `$setter:ty`: `Set` implementation; optional; only for `SetOnly` and `Both`. -+macro_rules! sockopt_impl { -+ (GetOnly, $name:ident, $level:path, $flag:path, bool) => { -+ sockopt_impl!(GetOnly, $name, $level, $flag, bool, GetBool); -+ }; -+ -+ (GetOnly, $name:ident, $level:path, $flag:path, u8) => { -+ sockopt_impl!(GetOnly, $name, $level, $flag, u8, GetU8); -+ }; -+ -+ (GetOnly, $name:ident, $level:path, $flag:path, usize) => { -+ sockopt_impl!(GetOnly, $name, $level, $flag, usize, GetUsize); -+ }; -+ -+ (SetOnly, $name:ident, $level:path, $flag:path, bool) => { -+ sockopt_impl!(SetOnly, $name, $level, $flag, bool, SetBool); -+ }; -+ -+ (SetOnly, $name:ident, $level:path, $flag:path, u8) => { -+ sockopt_impl!(SetOnly, $name, $level, $flag, u8, SetU8); -+ }; -+ -+ (SetOnly, $name:ident, $level:path, $flag:path, usize) => { -+ sockopt_impl!(SetOnly, $name, $level, $flag, usize, SetUsize); -+ }; -+ -+ (Both, $name:ident, $level:path, $flag:path, bool) => { -+ sockopt_impl!(Both, $name, $level, $flag, bool, GetBool, SetBool); -+ }; -+ -+ (Both, $name:ident, $level:path, $flag:path, u8) => { -+ sockopt_impl!(Both, $name, $level, $flag, u8, GetU8, SetU8); -+ }; -+ -+ (Both, $name:ident, $level:path, $flag:path, usize) => { -+ sockopt_impl!(Both, $name, $level, $flag, usize, GetUsize, SetUsize); -+ }; -+ -+ (Both, $name:ident, $level:path, $flag:path, OsString<$array:ty>) => { -+ sockopt_impl!(Both, $name, $level, $flag, OsString, GetOsString<$array>, SetOsString); -+ }; -+ -+ /* -+ * Matchers with generic getter types must be placed at the end, so -+ * they'll only match _after_ specialized matchers fail -+ */ -+ (GetOnly, $name:ident, $level:path, $flag:path, $ty:ty) => { -+ sockopt_impl!(GetOnly, $name, $level, $flag, $ty, GetStruct<$ty>); -+ }; -+ -+ (GetOnly, $name:ident, $level:path, $flag:path, $ty:ty, $getter:ty) => { -+ #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+ pub struct $name; -+ -+ getsockopt_impl!($name, $level, $flag, $ty, $getter); -+ }; -+ -+ (SetOnly, $name:ident, $level:path, $flag:path, $ty:ty) => { -+ sockopt_impl!(SetOnly, $name, $level, $flag, $ty, SetStruct<$ty>); -+ }; -+ -+ (SetOnly, $name:ident, $level:path, $flag:path, $ty:ty, $setter:ty) => { -+ #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+ pub struct $name; -+ -+ setsockopt_impl!($name, $level, $flag, $ty, $setter); -+ }; -+ -+ (Both, $name:ident, $level:path, $flag:path, $ty:ty, $getter:ty, $setter:ty) => { -+ #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+ pub struct $name; -+ -+ setsockopt_impl!($name, $level, $flag, $ty, $setter); -+ getsockopt_impl!($name, $level, $flag, $ty, $getter); -+ }; -+ -+ (Both, $name:ident, $level:path, $flag:path, $ty:ty) => { -+ sockopt_impl!(Both, $name, $level, $flag, $ty, GetStruct<$ty>, SetStruct<$ty>); -+ }; -+} -+ -+/* -+ * -+ * ===== Define sockopts ===== -+ * -+ */ -+ -+sockopt_impl!(Both, ReuseAddr, libc::SOL_SOCKET, libc::SO_REUSEADDR, bool); -+sockopt_impl!(Both, ReusePort, libc::SOL_SOCKET, libc::SO_REUSEPORT, bool); -+sockopt_impl!(Both, TcpNoDelay, libc::IPPROTO_TCP, libc::TCP_NODELAY, bool); -+sockopt_impl!(Both, Linger, libc::SOL_SOCKET, libc::SO_LINGER, libc::linger); -+sockopt_impl!(SetOnly, IpAddMembership, libc::IPPROTO_IP, libc::IP_ADD_MEMBERSHIP, super::IpMembershipRequest); -+sockopt_impl!(SetOnly, IpDropMembership, libc::IPPROTO_IP, libc::IP_DROP_MEMBERSHIP, super::IpMembershipRequest); -+cfg_if! { -+ if #[cfg(any(target_os = "android", target_os = "linux"))] { -+ sockopt_impl!(SetOnly, Ipv6AddMembership, libc::IPPROTO_IPV6, libc::IPV6_ADD_MEMBERSHIP, super::Ipv6MembershipRequest); -+ sockopt_impl!(SetOnly, Ipv6DropMembership, libc::IPPROTO_IPV6, libc::IPV6_DROP_MEMBERSHIP, super::Ipv6MembershipRequest); -+ } else if #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] { -+ sockopt_impl!(SetOnly, Ipv6AddMembership, libc::IPPROTO_IPV6, libc::IPV6_JOIN_GROUP, super::Ipv6MembershipRequest); -+ sockopt_impl!(SetOnly, Ipv6DropMembership, libc::IPPROTO_IPV6, libc::IPV6_LEAVE_GROUP, super::Ipv6MembershipRequest); -+ } -+} -+sockopt_impl!(Both, IpMulticastTtl, libc::IPPROTO_IP, libc::IP_MULTICAST_TTL, u8); -+sockopt_impl!(Both, IpMulticastLoop, libc::IPPROTO_IP, libc::IP_MULTICAST_LOOP, bool); -+sockopt_impl!(Both, ReceiveTimeout, libc::SOL_SOCKET, libc::SO_RCVTIMEO, TimeVal); -+sockopt_impl!(Both, SendTimeout, libc::SOL_SOCKET, libc::SO_SNDTIMEO, TimeVal); -+sockopt_impl!(Both, Broadcast, libc::SOL_SOCKET, libc::SO_BROADCAST, bool); -+sockopt_impl!(Both, OobInline, libc::SOL_SOCKET, libc::SO_OOBINLINE, bool); -+sockopt_impl!(GetOnly, SocketError, libc::SOL_SOCKET, libc::SO_ERROR, i32); -+sockopt_impl!(Both, KeepAlive, libc::SOL_SOCKET, libc::SO_KEEPALIVE, bool); -+#[cfg(any(target_os = "android", target_os = "linux"))] -+sockopt_impl!(GetOnly, PeerCredentials, libc::SOL_SOCKET, libc::SO_PEERCRED, super::UnixCredentials); -+#[cfg(any(target_os = "ios", -+ target_os = "macos"))] -+sockopt_impl!(Both, TcpKeepAlive, libc::IPPROTO_TCP, libc::TCP_KEEPALIVE, u32); -+#[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "nacl"))] -+sockopt_impl!(Both, TcpKeepIdle, libc::IPPROTO_TCP, libc::TCP_KEEPIDLE, u32); -+sockopt_impl!(Both, RcvBuf, libc::SOL_SOCKET, libc::SO_RCVBUF, usize); -+sockopt_impl!(Both, SndBuf, libc::SOL_SOCKET, libc::SO_SNDBUF, usize); -+#[cfg(any(target_os = "android", target_os = "linux"))] -+sockopt_impl!(SetOnly, RcvBufForce, libc::SOL_SOCKET, libc::SO_RCVBUFFORCE, usize); -+#[cfg(any(target_os = "android", target_os = "linux"))] -+sockopt_impl!(SetOnly, SndBufForce, libc::SOL_SOCKET, libc::SO_SNDBUFFORCE, usize); -+sockopt_impl!(GetOnly, SockType, libc::SOL_SOCKET, libc::SO_TYPE, super::SockType); -+sockopt_impl!(GetOnly, AcceptConn, libc::SOL_SOCKET, libc::SO_ACCEPTCONN, bool); -+#[cfg(any(target_os = "android", target_os = "linux"))] -+sockopt_impl!(GetOnly, OriginalDst, libc::SOL_IP, libc::SO_ORIGINAL_DST, libc::sockaddr_in); -+sockopt_impl!(Both, ReceiveTimestamp, libc::SOL_SOCKET, libc::SO_TIMESTAMP, bool); -+#[cfg(any(target_os = "android", target_os = "linux"))] -+sockopt_impl!(Both, IpTransparent, libc::SOL_IP, libc::IP_TRANSPARENT, bool); -+#[cfg(target_os = "openbsd")] -+sockopt_impl!(Both, BindAny, libc::SOL_SOCKET, libc::SO_BINDANY, bool); -+#[cfg(target_os = "freebsd")] -+sockopt_impl!(Both, BindAny, libc::IPPROTO_IP, libc::IP_BINDANY, bool); -+#[cfg(target_os = "linux")] -+sockopt_impl!(Both, Mark, libc::SOL_SOCKET, libc::SO_MARK, u32); -+#[cfg(any(target_os = "android", target_os = "linux"))] -+sockopt_impl!(Both, PassCred, libc::SOL_SOCKET, libc::SO_PASSCRED, bool); -+#[cfg(any(target_os = "freebsd", target_os = "linux"))] -+sockopt_impl!(Both, TcpCongestion, libc::IPPROTO_TCP, libc::TCP_CONGESTION, OsString<[u8; TCP_CA_NAME_MAX]>); -+#[cfg(any( -+ target_os = "android", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+))] -+sockopt_impl!(Both, Ipv4PacketInfo, libc::IPPROTO_IP, libc::IP_PKTINFO, bool); -+#[cfg(any( -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+))] -+sockopt_impl!(Both, Ipv6RecvPacketInfo, libc::IPPROTO_IPV6, libc::IPV6_RECVPKTINFO, bool); -+#[cfg(any( -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+))] -+sockopt_impl!(Both, Ipv4RecvIf, libc::IPPROTO_IP, libc::IP_RECVIF, bool); -+#[cfg(any( -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+))] -+sockopt_impl!(Both, Ipv4RecvDstAddr, libc::IPPROTO_IP, libc::IP_RECVDSTADDR, bool); -+ -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+#[derive(Copy, Clone, Debug)] -+pub struct AlgSetAeadAuthSize; -+ -+// ALG_SET_AEAD_AUTH_SIZE read the length from passed `option_len` -+// See https://elixir.bootlin.com/linux/v4.4/source/crypto/af_alg.c#L222 -+#[cfg(any(target_os = "android", target_os = "linux"))] -+impl SetSockOpt for AlgSetAeadAuthSize { -+ type Val = usize; -+ -+ fn set(&self, fd: RawFd, val: &usize) -> Result<()> { -+ unsafe { -+ let res = libc::setsockopt(fd, -+ libc::SOL_ALG, -+ libc::ALG_SET_AEAD_AUTHSIZE, -+ ::std::ptr::null(), -+ *val as libc::socklen_t); -+ Errno::result(res).map(drop) -+ } -+ } -+} -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+#[derive(Clone, Debug)] -+pub struct AlgSetKey<T>(::std::marker::PhantomData<T>); -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+impl<T> Default for AlgSetKey<T> { -+ fn default() -> Self { -+ AlgSetKey(Default::default()) -+ } -+} -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+impl<T> SetSockOpt for AlgSetKey<T> where T: AsRef<[u8]> + Clone { -+ type Val = T; -+ -+ fn set(&self, fd: RawFd, val: &T) -> Result<()> { -+ unsafe { -+ let res = libc::setsockopt(fd, -+ libc::SOL_ALG, -+ libc::ALG_SET_KEY, -+ val.as_ref().as_ptr() as *const _, -+ val.as_ref().len() as libc::socklen_t); -+ Errno::result(res).map(drop) -+ } -+ } -+} -+ -+/* -+ * -+ * ===== Accessor helpers ===== -+ * -+ */ -+ -+/// Helper trait that describes what is expected from a `GetSockOpt` getter. -+unsafe trait Get<T> { -+ /// Returns an empty value. -+ unsafe fn blank() -> Self; -+ /// Returns a pointer to the stored value. This pointer will be passed to the system's -+ /// `getsockopt` call (`man 3p getsockopt`, argument `option_value`). -+ fn ffi_ptr(&mut self) -> *mut c_void; -+ /// Returns length of the stored value. This pointer will be passed to the system's -+ /// `getsockopt` call (`man 3p getsockopt`, argument `option_len`). -+ fn ffi_len(&mut self) -> *mut socklen_t; -+ /// Returns the stored value. -+ unsafe fn unwrap(self) -> T; -+} -+ -+/// Helper trait that describes what is expected from a `SetSockOpt` setter. -+unsafe trait Set<'a, T> { -+ /// Initialize the setter with a given value. -+ fn new(val: &'a T) -> Self; -+ /// Returns a pointer to the stored value. This pointer will be passed to the system's -+ /// `setsockopt` call (`man 3p setsockopt`, argument `option_value`). -+ fn ffi_ptr(&self) -> *const c_void; -+ /// Returns length of the stored value. This pointer will be passed to the system's -+ /// `setsockopt` call (`man 3p setsockopt`, argument `option_len`). -+ fn ffi_len(&self) -> socklen_t; -+} -+ -+/// Getter for an arbitrary `struct`. -+struct GetStruct<T> { -+ len: socklen_t, -+ val: T, -+} -+ -+unsafe impl<T> Get<T> for GetStruct<T> { -+ unsafe fn blank() -> Self { -+ GetStruct { -+ len: mem::size_of::<T>() as socklen_t, -+ val: mem::zeroed(), -+ } -+ } -+ -+ fn ffi_ptr(&mut self) -> *mut c_void { -+ &mut self.val as *mut T as *mut c_void -+ } -+ -+ fn ffi_len(&mut self) -> *mut socklen_t { -+ &mut self.len -+ } -+ -+ unsafe fn unwrap(self) -> T { -+ assert!(self.len as usize == mem::size_of::<T>(), "invalid getsockopt implementation"); -+ self.val -+ } -+} -+ -+/// Setter for an arbitrary `struct`. -+struct SetStruct<'a, T: 'static> { -+ ptr: &'a T, -+} -+ -+unsafe impl<'a, T> Set<'a, T> for SetStruct<'a, T> { -+ fn new(ptr: &'a T) -> SetStruct<'a, T> { -+ SetStruct { ptr: ptr } -+ } -+ -+ fn ffi_ptr(&self) -> *const c_void { -+ self.ptr as *const T as *const c_void -+ } -+ -+ fn ffi_len(&self) -> socklen_t { -+ mem::size_of::<T>() as socklen_t -+ } -+} -+ -+/// Getter for a boolean value. -+struct GetBool { -+ len: socklen_t, -+ val: c_int, -+} -+ -+unsafe impl Get<bool> for GetBool { -+ unsafe fn blank() -> Self { -+ GetBool { -+ len: mem::size_of::<c_int>() as socklen_t, -+ val: mem::zeroed(), -+ } -+ } -+ -+ fn ffi_ptr(&mut self) -> *mut c_void { -+ &mut self.val as *mut c_int as *mut c_void -+ } -+ -+ fn ffi_len(&mut self) -> *mut socklen_t { -+ &mut self.len -+ } -+ -+ unsafe fn unwrap(self) -> bool { -+ assert!(self.len as usize == mem::size_of::<c_int>(), "invalid getsockopt implementation"); -+ self.val != 0 -+ } -+} -+ -+/// Setter for a boolean value. -+struct SetBool { -+ val: c_int, -+} -+ -+unsafe impl<'a> Set<'a, bool> for SetBool { -+ fn new(val: &'a bool) -> SetBool { -+ SetBool { val: if *val { 1 } else { 0 } } -+ } -+ -+ fn ffi_ptr(&self) -> *const c_void { -+ &self.val as *const c_int as *const c_void -+ } -+ -+ fn ffi_len(&self) -> socklen_t { -+ mem::size_of::<c_int>() as socklen_t -+ } -+} -+ -+/// Getter for an `u8` value. -+struct GetU8 { -+ len: socklen_t, -+ val: u8, -+} -+ -+unsafe impl Get<u8> for GetU8 { -+ unsafe fn blank() -> Self { -+ GetU8 { -+ len: mem::size_of::<u8>() as socklen_t, -+ val: mem::zeroed(), -+ } -+ } -+ -+ fn ffi_ptr(&mut self) -> *mut c_void { -+ &mut self.val as *mut u8 as *mut c_void -+ } -+ -+ fn ffi_len(&mut self) -> *mut socklen_t { -+ &mut self.len -+ } -+ -+ unsafe fn unwrap(self) -> u8 { -+ assert!(self.len as usize == mem::size_of::<u8>(), "invalid getsockopt implementation"); -+ self.val as u8 -+ } -+} -+ -+/// Setter for an `u8` value. -+struct SetU8 { -+ val: u8, -+} -+ -+unsafe impl<'a> Set<'a, u8> for SetU8 { -+ fn new(val: &'a u8) -> SetU8 { -+ SetU8 { val: *val as u8 } -+ } -+ -+ fn ffi_ptr(&self) -> *const c_void { -+ &self.val as *const u8 as *const c_void -+ } -+ -+ fn ffi_len(&self) -> socklen_t { -+ mem::size_of::<c_int>() as socklen_t -+ } -+} -+ -+/// Getter for an `usize` value. -+struct GetUsize { -+ len: socklen_t, -+ val: c_int, -+} -+ -+unsafe impl Get<usize> for GetUsize { -+ unsafe fn blank() -> Self { -+ GetUsize { -+ len: mem::size_of::<c_int>() as socklen_t, -+ val: mem::zeroed(), -+ } -+ } -+ -+ fn ffi_ptr(&mut self) -> *mut c_void { -+ &mut self.val as *mut c_int as *mut c_void -+ } -+ -+ fn ffi_len(&mut self) -> *mut socklen_t { -+ &mut self.len -+ } -+ -+ unsafe fn unwrap(self) -> usize { -+ assert!(self.len as usize == mem::size_of::<c_int>(), "invalid getsockopt implementation"); -+ self.val as usize -+ } -+} -+ -+/// Setter for an `usize` value. -+struct SetUsize { -+ val: c_int, -+} -+ -+unsafe impl<'a> Set<'a, usize> for SetUsize { -+ fn new(val: &'a usize) -> SetUsize { -+ SetUsize { val: *val as c_int } -+ } -+ -+ fn ffi_ptr(&self) -> *const c_void { -+ &self.val as *const c_int as *const c_void -+ } -+ -+ fn ffi_len(&self) -> socklen_t { -+ mem::size_of::<c_int>() as socklen_t -+ } -+} -+ -+/// Getter for a `OsString` value. -+struct GetOsString<T: AsMut<[u8]>> { -+ len: socklen_t, -+ val: T, -+} -+ -+unsafe impl<T: AsMut<[u8]>> Get<OsString> for GetOsString<T> { -+ unsafe fn blank() -> Self { -+ GetOsString { -+ len: mem::size_of::<T>() as socklen_t, -+ val: mem::zeroed(), -+ } -+ } -+ -+ fn ffi_ptr(&mut self) -> *mut c_void { -+ &mut self.val as *mut T as *mut c_void -+ } -+ -+ fn ffi_len(&mut self) -> *mut socklen_t { -+ &mut self.len -+ } -+ -+ unsafe fn unwrap(mut self) -> OsString { -+ OsStr::from_bytes(self.val.as_mut()).to_owned() -+ } -+} -+ -+/// Setter for a `OsString` value. -+struct SetOsString<'a> { -+ val: &'a OsStr, -+} -+ -+unsafe impl<'a> Set<'a, OsString> for SetOsString<'a> { -+ fn new(val: &'a OsString) -> SetOsString { -+ SetOsString { val: val.as_os_str() } -+ } -+ -+ fn ffi_ptr(&self) -> *const c_void { -+ self.val.as_bytes().as_ptr() as *const c_void -+ } -+ -+ fn ffi_len(&self) -> socklen_t { -+ self.val.len() as socklen_t -+ } -+} -+ -+ -+#[cfg(test)] -+mod test { -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ #[test] -+ fn can_get_peercred_on_unix_socket() { -+ use super::super::*; -+ -+ let (a, b) = socketpair(AddressFamily::Unix, SockType::Stream, None, SockFlag::empty()).unwrap(); -+ let a_cred = getsockopt(a, super::PeerCredentials).unwrap(); -+ let b_cred = getsockopt(b, super::PeerCredentials).unwrap(); -+ assert_eq!(a_cred, b_cred); -+ assert!(a_cred.pid() != 0); -+ } -+ -+ #[test] -+ fn is_socket_type_unix() { -+ use super::super::*; -+ use ::unistd::close; -+ -+ let (a, b) = socketpair(AddressFamily::Unix, SockType::Stream, None, SockFlag::empty()).unwrap(); -+ let a_type = getsockopt(a, super::SockType).unwrap(); -+ assert!(a_type == SockType::Stream); -+ close(a).unwrap(); -+ close(b).unwrap(); -+ } -+ -+ #[test] -+ fn is_socket_type_dgram() { -+ use super::super::*; -+ use ::unistd::close; -+ -+ let s = socket(AddressFamily::Inet, SockType::Datagram, SockFlag::empty(), None).unwrap(); -+ let s_type = getsockopt(s, super::SockType).unwrap(); -+ assert!(s_type == SockType::Datagram); -+ close(s).unwrap(); -+ } -+ -+ #[cfg(any(target_os = "freebsd", -+ target_os = "linux", -+ target_os = "nacl"))] -+ #[test] -+ fn can_get_listen_on_tcp_socket() { -+ use super::super::*; -+ use ::unistd::close; -+ -+ let s = socket(AddressFamily::Inet, SockType::Stream, SockFlag::empty(), None).unwrap(); -+ let s_listening = getsockopt(s, super::AcceptConn).unwrap(); -+ assert!(!s_listening); -+ listen(s, 10).unwrap(); -+ let s_listening2 = getsockopt(s, super::AcceptConn).unwrap(); -+ assert!(s_listening2); -+ close(s).unwrap(); -+ } -+ -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/stat.rs b/third_party/rust/nix-0.15.0/src/sys/stat.rs -new file mode 100644 -index 0000000000000..66c8c9dd1b720 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/stat.rs -@@ -0,0 +1,294 @@ -+pub use libc::{dev_t, mode_t}; -+pub use libc::stat as FileStat; -+ -+use {Result, NixPath}; -+use errno::Errno; -+use fcntl::{AtFlags, at_rawfd}; -+use libc; -+use std::mem; -+use std::os::unix::io::RawFd; -+use sys::time::{TimeSpec, TimeVal}; -+ -+libc_bitflags!( -+ pub struct SFlag: mode_t { -+ S_IFIFO; -+ S_IFCHR; -+ S_IFDIR; -+ S_IFBLK; -+ S_IFREG; -+ S_IFLNK; -+ S_IFSOCK; -+ S_IFMT; -+ } -+); -+ -+libc_bitflags! { -+ pub struct Mode: mode_t { -+ S_IRWXU; -+ S_IRUSR; -+ S_IWUSR; -+ S_IXUSR; -+ S_IRWXG; -+ S_IRGRP; -+ S_IWGRP; -+ S_IXGRP; -+ S_IRWXO; -+ S_IROTH; -+ S_IWOTH; -+ S_IXOTH; -+ S_ISUID as mode_t; -+ S_ISGID as mode_t; -+ S_ISVTX as mode_t; -+ } -+} -+ -+pub fn mknod<P: ?Sized + NixPath>(path: &P, kind: SFlag, perm: Mode, dev: dev_t) -> Result<()> { -+ let res = path.with_nix_path(|cstr| { -+ unsafe { -+ libc::mknod(cstr.as_ptr(), kind.bits | perm.bits() as mode_t, dev) -+ } -+ })?; -+ -+ Errno::result(res).map(drop) -+} -+ -+#[cfg(target_os = "linux")] -+pub fn major(dev: dev_t) -> u64 { -+ ((dev >> 32) & 0xffff_f000) | -+ ((dev >> 8) & 0x0000_0fff) -+} -+ -+#[cfg(target_os = "linux")] -+pub fn minor(dev: dev_t) -> u64 { -+ ((dev >> 12) & 0xffff_ff00) | -+ ((dev ) & 0x0000_00ff) -+} -+ -+#[cfg(target_os = "linux")] -+pub fn makedev(major: u64, minor: u64) -> dev_t { -+ ((major & 0xffff_f000) << 32) | -+ ((major & 0x0000_0fff) << 8) | -+ ((minor & 0xffff_ff00) << 12) | -+ (minor & 0x0000_00ff) -+} -+ -+pub fn umask(mode: Mode) -> Mode { -+ let prev = unsafe { libc::umask(mode.bits() as mode_t) }; -+ Mode::from_bits(prev).expect("[BUG] umask returned invalid Mode") -+} -+ -+pub fn stat<P: ?Sized + NixPath>(path: &P) -> Result<FileStat> { -+ let mut dst = unsafe { mem::uninitialized() }; -+ let res = path.with_nix_path(|cstr| { -+ unsafe { -+ libc::stat(cstr.as_ptr(), &mut dst as *mut FileStat) -+ } -+ })?; -+ -+ Errno::result(res)?; -+ -+ Ok(dst) -+} -+ -+pub fn lstat<P: ?Sized + NixPath>(path: &P) -> Result<FileStat> { -+ let mut dst = unsafe { mem::uninitialized() }; -+ let res = path.with_nix_path(|cstr| { -+ unsafe { -+ libc::lstat(cstr.as_ptr(), &mut dst as *mut FileStat) -+ } -+ })?; -+ -+ Errno::result(res)?; -+ -+ Ok(dst) -+} -+ -+pub fn fstat(fd: RawFd) -> Result<FileStat> { -+ let mut dst = unsafe { mem::uninitialized() }; -+ let res = unsafe { libc::fstat(fd, &mut dst as *mut FileStat) }; -+ -+ Errno::result(res)?; -+ -+ Ok(dst) -+} -+ -+pub fn fstatat<P: ?Sized + NixPath>(dirfd: RawFd, pathname: &P, f: AtFlags) -> Result<FileStat> { -+ let mut dst = unsafe { mem::uninitialized() }; -+ let res = pathname.with_nix_path(|cstr| { -+ unsafe { libc::fstatat(dirfd, cstr.as_ptr(), &mut dst as *mut FileStat, f.bits() as libc::c_int) } -+ })?; -+ -+ Errno::result(res)?; -+ -+ Ok(dst) -+} -+ -+/// Change the file permission bits of the file specified by a file descriptor. -+/// -+/// # References -+/// -+/// [fchmod(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/fchmod.html). -+pub fn fchmod(fd: RawFd, mode: Mode) -> Result<()> { -+ let res = unsafe { libc::fchmod(fd, mode.bits() as mode_t) }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Flags for `fchmodat` function. -+#[derive(Clone, Copy, Debug)] -+pub enum FchmodatFlags { -+ FollowSymlink, -+ NoFollowSymlink, -+} -+ -+/// Change the file permission bits. -+/// -+/// The file to be changed is determined relative to the directory associated -+/// with the file descriptor `dirfd` or the current working directory -+/// if `dirfd` is `None`. -+/// -+/// If `flag` is `FchmodatFlags::NoFollowSymlink` and `path` names a symbolic link, -+/// then the mode of the symbolic link is changed. -+/// -+/// `fchmod(None, path, mode, FchmodatFlags::FollowSymlink)` is identical to -+/// a call `libc::chmod(path, mode)`. That's why `chmod` is unimplemented -+/// in the `nix` crate. -+/// -+/// # References -+/// -+/// [fchmodat(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/fchmodat.html). -+pub fn fchmodat<P: ?Sized + NixPath>( -+ dirfd: Option<RawFd>, -+ path: &P, -+ mode: Mode, -+ flag: FchmodatFlags, -+) -> Result<()> { -+ let atflag = -+ match flag { -+ FchmodatFlags::FollowSymlink => AtFlags::empty(), -+ FchmodatFlags::NoFollowSymlink => AtFlags::AT_SYMLINK_NOFOLLOW, -+ }; -+ let res = path.with_nix_path(|cstr| unsafe { -+ libc::fchmodat( -+ at_rawfd(dirfd), -+ cstr.as_ptr(), -+ mode.bits() as mode_t, -+ atflag.bits() as libc::c_int, -+ ) -+ })?; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Change the access and modification times of a file. -+/// -+/// `utimes(path, times)` is identical to -+/// `utimensat(None, path, times, UtimensatFlags::FollowSymlink)`. The former -+/// is a deprecated API so prefer using the latter if the platforms you care -+/// about support it. -+/// -+/// # References -+/// -+/// [utimes(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/utimes.html). -+pub fn utimes<P: ?Sized + NixPath>(path: &P, atime: &TimeVal, mtime: &TimeVal) -> Result<()> { -+ let times: [libc::timeval; 2] = [*atime.as_ref(), *mtime.as_ref()]; -+ let res = path.with_nix_path(|cstr| unsafe { -+ libc::utimes(cstr.as_ptr(), ×[0]) -+ })?; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Change the access and modification times of a file without following symlinks. -+/// -+/// `lutimes(path, times)` is identical to -+/// `utimensat(None, path, times, UtimensatFlags::NoFollowSymlink)`. The former -+/// is a deprecated API so prefer using the latter if the platforms you care -+/// about support it. -+/// -+/// # References -+/// -+/// [lutimes(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/lutimes.html). -+#[cfg(any(target_os = "linux", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "freebsd", -+ target_os = "netbsd"))] -+pub fn lutimes<P: ?Sized + NixPath>(path: &P, atime: &TimeVal, mtime: &TimeVal) -> Result<()> { -+ let times: [libc::timeval; 2] = [*atime.as_ref(), *mtime.as_ref()]; -+ let res = path.with_nix_path(|cstr| unsafe { -+ libc::lutimes(cstr.as_ptr(), ×[0]) -+ })?; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Change the access and modification times of the file specified by a file descriptor. -+/// -+/// # References -+/// -+/// [futimens(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/futimens.html). -+#[inline] -+pub fn futimens(fd: RawFd, atime: &TimeSpec, mtime: &TimeSpec) -> Result<()> { -+ let times: [libc::timespec; 2] = [*atime.as_ref(), *mtime.as_ref()]; -+ let res = unsafe { libc::futimens(fd, ×[0]) }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Flags for `utimensat` function. -+#[derive(Clone, Copy, Debug)] -+pub enum UtimensatFlags { -+ FollowSymlink, -+ NoFollowSymlink, -+} -+ -+/// Change the access and modification times of a file. -+/// -+/// The file to be changed is determined relative to the directory associated -+/// with the file descriptor `dirfd` or the current working directory -+/// if `dirfd` is `None`. -+/// -+/// If `flag` is `UtimensatFlags::NoFollowSymlink` and `path` names a symbolic link, -+/// then the mode of the symbolic link is changed. -+/// -+/// `utimensat(None, path, times, UtimensatFlags::FollowSymlink)` is identical to -+/// `utimes(path, times)`. The latter is a deprecated API so prefer using the -+/// former if the platforms you care about support it. -+/// -+/// # References -+/// -+/// [utimensat(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/utimens.html). -+pub fn utimensat<P: ?Sized + NixPath>( -+ dirfd: Option<RawFd>, -+ path: &P, -+ atime: &TimeSpec, -+ mtime: &TimeSpec, -+ flag: UtimensatFlags -+) -> Result<()> { -+ let atflag = -+ match flag { -+ UtimensatFlags::FollowSymlink => AtFlags::empty(), -+ UtimensatFlags::NoFollowSymlink => AtFlags::AT_SYMLINK_NOFOLLOW, -+ }; -+ let times: [libc::timespec; 2] = [*atime.as_ref(), *mtime.as_ref()]; -+ let res = path.with_nix_path(|cstr| unsafe { -+ libc::utimensat( -+ at_rawfd(dirfd), -+ cstr.as_ptr(), -+ ×[0], -+ atflag.bits() as libc::c_int, -+ ) -+ })?; -+ -+ Errno::result(res).map(drop) -+} -+ -+pub fn mkdirat<P: ?Sized + NixPath>(fd: RawFd, path: &P, mode: Mode) -> Result<()> { -+ let res = path.with_nix_path(|cstr| { -+ unsafe { libc::mkdirat(fd, cstr.as_ptr(), mode.bits() as mode_t) } -+ })?; -+ -+ Errno::result(res).map(drop) -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/statfs.rs b/third_party/rust/nix-0.15.0/src/sys/statfs.rs -new file mode 100644 -index 0000000000000..d4596bf336958 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/statfs.rs -@@ -0,0 +1,548 @@ -+use std::fmt::{self, Debug}; -+use std::mem; -+use std::os::unix::io::AsRawFd; -+#[cfg(not(any(target_os = "linux", target_os = "android")))] -+use std::ffi::CStr; -+ -+use libc; -+ -+use {NixPath, Result}; -+use errno::Errno; -+ -+#[cfg(target_os = "android")] -+pub type fsid_t = libc::__fsid_t; -+#[cfg(not(target_os = "android"))] -+pub type fsid_t = libc::fsid_t; -+ -+#[derive(Clone, Copy)] -+pub struct Statfs(libc::statfs); -+ -+#[cfg(target_os = "freebsd")] -+#[derive(Eq, Copy, Clone, PartialEq, Debug)] -+pub struct FsType(u32); -+#[cfg(target_os = "android")] -+#[derive(Eq, Copy, Clone, PartialEq, Debug)] -+pub struct FsType(libc::c_ulong); -+#[cfg(all(target_os = "linux", target_arch = "s390x"))] -+#[derive(Eq, Copy, Clone, PartialEq, Debug)] -+pub struct FsType(u32); -+#[cfg(all(target_os = "linux", target_env = "musl"))] -+#[derive(Eq, Copy, Clone, PartialEq, Debug)] -+pub struct FsType(libc::c_ulong); -+#[cfg(all(target_os = "linux", not(any(target_arch = "s390x", target_env = "musl"))))] -+#[derive(Eq, Copy, Clone, PartialEq, Debug)] -+pub struct FsType(libc::c_long); -+ -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const ADFS_SUPER_MAGIC: FsType = FsType(libc::ADFS_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const AFFS_SUPER_MAGIC: FsType = FsType(libc::AFFS_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const CODA_SUPER_MAGIC: FsType = FsType(libc::CODA_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const CRAMFS_MAGIC: FsType = FsType(libc::CRAMFS_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const EFS_SUPER_MAGIC: FsType = FsType(libc::EFS_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const EXT2_SUPER_MAGIC: FsType = FsType(libc::EXT2_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const EXT3_SUPER_MAGIC: FsType = FsType(libc::EXT3_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const EXT4_SUPER_MAGIC: FsType = FsType(libc::EXT4_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const HPFS_SUPER_MAGIC: FsType = FsType(libc::HPFS_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const HUGETLBFS_MAGIC: FsType = FsType(libc::HUGETLBFS_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const ISOFS_SUPER_MAGIC: FsType = FsType(libc::ISOFS_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const JFFS2_SUPER_MAGIC: FsType = FsType(libc::JFFS2_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const MINIX_SUPER_MAGIC: FsType = FsType(libc::MINIX_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const MINIX_SUPER_MAGIC2: FsType = FsType(libc::MINIX_SUPER_MAGIC2); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const MINIX2_SUPER_MAGIC: FsType = FsType(libc::MINIX2_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const MINIX2_SUPER_MAGIC2: FsType = FsType(libc::MINIX2_SUPER_MAGIC2); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const MSDOS_SUPER_MAGIC: FsType = FsType(libc::MSDOS_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const NCP_SUPER_MAGIC: FsType = FsType(libc::NCP_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const NFS_SUPER_MAGIC: FsType = FsType(libc::NFS_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const OPENPROM_SUPER_MAGIC: FsType = FsType(libc::OPENPROM_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const PROC_SUPER_MAGIC: FsType = FsType(libc::PROC_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const QNX4_SUPER_MAGIC: FsType = FsType(libc::QNX4_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const REISERFS_SUPER_MAGIC: FsType = FsType(libc::REISERFS_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const SMB_SUPER_MAGIC: FsType = FsType(libc::SMB_SUPER_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const TMPFS_MAGIC: FsType = FsType(libc::TMPFS_MAGIC); -+#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] -+pub const USBDEVICE_SUPER_MAGIC: FsType = FsType(libc::USBDEVICE_SUPER_MAGIC); -+ -+impl Statfs { -+ /// Magic code defining system type -+ #[cfg(not(any( -+ target_os = "openbsd", -+ target_os = "ios", -+ target_os = "macos" -+ )))] -+ pub fn filesystem_type(&self) -> FsType { -+ FsType(self.0.f_type) -+ } -+ -+ /// Magic code defining system type -+ #[cfg(not(any(target_os = "linux", target_os = "android")))] -+ pub fn filesystem_type_name(&self) -> &str { -+ let c_str = unsafe { CStr::from_ptr(self.0.f_fstypename.as_ptr()) }; -+ c_str.to_str().unwrap() -+ } -+ -+ /// Optimal transfer block size -+ #[cfg(any(target_os = "ios", target_os = "macos", target_os = "openbsd"))] -+ pub fn optimal_transfer_size(&self) -> i32 { -+ self.0.f_iosize -+ } -+ -+ /// Optimal transfer block size -+ #[cfg(all(target_os = "linux", target_arch = "s390x"))] -+ pub fn optimal_transfer_size(&self) -> u32 { -+ self.0.f_bsize -+ } -+ -+ /// Optimal transfer block size -+ #[cfg(all(target_os = "linux", target_env = "musl"))] -+ pub fn optimal_transfer_size(&self) -> libc::c_ulong { -+ self.0.f_bsize -+ } -+ -+ /// Optimal transfer block size -+ #[cfg(all(target_os = "linux", not(any(target_arch = "s390x", target_env = "musl"))))] -+ pub fn optimal_transfer_size(&self) -> libc::c_long { -+ self.0.f_bsize -+ } -+ -+ /// Optimal transfer block size -+ #[cfg(target_os = "android")] -+ pub fn optimal_transfer_size(&self) -> libc::c_ulong { -+ self.0.f_bsize -+ } -+ -+ /// Optimal transfer block size -+ #[cfg(target_os = "dragonfly")] -+ pub fn optimal_transfer_size(&self) -> libc::c_long { -+ self.0.f_iosize -+ } -+ -+ /// Optimal transfer block size -+ #[cfg(target_os = "freebsd")] -+ pub fn optimal_transfer_size(&self) -> u64 { -+ self.0.f_iosize -+ } -+ -+ /// Size of a block -+ #[cfg(any(target_os = "ios", target_os = "macos", target_os = "openbsd"))] -+ pub fn block_size(&self) -> u32 { -+ self.0.f_bsize -+ } -+ -+ /// Size of a block -+ // f_bsize on linux: https://github.com/torvalds/linux/blob/master/fs/nfs/super.c#L471 -+ #[cfg(all(target_os = "linux", target_arch = "s390x"))] -+ pub fn block_size(&self) -> u32 { -+ self.0.f_bsize -+ } -+ -+ /// Size of a block -+ // f_bsize on linux: https://github.com/torvalds/linux/blob/master/fs/nfs/super.c#L471 -+ #[cfg(all(target_os = "linux", target_env = "musl"))] -+ pub fn block_size(&self) -> libc::c_ulong { -+ self.0.f_bsize -+ } -+ -+ /// Size of a block -+ // f_bsize on linux: https://github.com/torvalds/linux/blob/master/fs/nfs/super.c#L471 -+ #[cfg(all(target_os = "linux", not(any(target_arch = "s390x", target_env = "musl"))))] -+ pub fn block_size(&self) -> libc::c_long { -+ self.0.f_bsize -+ } -+ -+ /// Size of a block -+ #[cfg(target_os = "freebsd")] -+ pub fn block_size(&self) -> u64 { -+ self.0.f_bsize -+ } -+ -+ /// Size of a block -+ #[cfg(target_os = "android")] -+ pub fn block_size(&self) -> libc::c_ulong { -+ self.0.f_bsize -+ } -+ -+ /// Size of a block -+ #[cfg(target_os = "dragonfly")] -+ pub fn block_size(&self) -> libc::c_long { -+ self.0.f_bsize -+ } -+ -+ /// Maximum length of filenames -+ #[cfg(any(target_os = "freebsd", target_os = "openbsd"))] -+ pub fn maximum_name_length(&self) -> u32 { -+ self.0.f_namemax -+ } -+ -+ /// Maximum length of filenames -+ #[cfg(all(target_os = "linux", target_arch = "s390x"))] -+ pub fn maximum_name_length(&self) -> u32 { -+ self.0.f_namelen -+ } -+ -+ /// Maximum length of filenames -+ #[cfg(all(target_os = "linux", target_env = "musl"))] -+ pub fn maximum_name_length(&self) -> libc::c_ulong { -+ self.0.f_namelen -+ } -+ -+ /// Maximum length of filenames -+ #[cfg(all(target_os = "linux", not(any(target_arch = "s390x", target_env = "musl"))))] -+ pub fn maximum_name_length(&self) -> libc::c_long { -+ self.0.f_namelen -+ } -+ -+ /// Maximum length of filenames -+ #[cfg(target_os = "android")] -+ pub fn maximum_name_length(&self) -> libc::c_ulong { -+ self.0.f_namelen -+ } -+ -+ /// Total data blocks in filesystem -+ #[cfg(any( -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "openbsd", -+ ))] -+ pub fn blocks(&self) -> u64 { -+ self.0.f_blocks -+ } -+ -+ /// Total data blocks in filesystem -+ #[cfg(target_os = "dragonfly")] -+ pub fn blocks(&self) -> libc::c_long { -+ self.0.f_blocks -+ } -+ -+ /// Total data blocks in filesystem -+ #[cfg(all(target_os = "linux", target_env = "musl"))] -+ pub fn blocks(&self) -> u64 { -+ self.0.f_blocks -+ } -+ -+ /// Total data blocks in filesystem -+ #[cfg(not(any( -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "openbsd", -+ target_os = "dragonfly", -+ all(target_os = "linux", target_env = "musl") -+ )))] -+ pub fn blocks(&self) -> libc::c_ulong { -+ self.0.f_blocks -+ } -+ -+ /// Free blocks in filesystem -+ #[cfg(any( -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "openbsd", -+ ))] -+ pub fn blocks_free(&self) -> u64 { -+ self.0.f_bfree -+ } -+ -+ /// Free blocks in filesystem -+ #[cfg(target_os = "dragonfly")] -+ pub fn blocks_free(&self) -> libc::c_long { -+ self.0.f_bfree -+ } -+ -+ /// Free blocks in filesystem -+ #[cfg(all(target_os = "linux", target_env = "musl"))] -+ pub fn blocks_free(&self) -> u64 { -+ self.0.f_bfree -+ } -+ -+ /// Free blocks in filesystem -+ #[cfg(not(any( -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "openbsd", -+ target_os = "dragonfly", -+ all(target_os = "linux", target_env = "musl") -+ )))] -+ pub fn blocks_free(&self) -> libc::c_ulong { -+ self.0.f_bfree -+ } -+ -+ /// Free blocks available to unprivileged user -+ #[cfg(any(target_os = "ios", target_os = "macos", target_os = "android"))] -+ pub fn blocks_available(&self) -> u64 { -+ self.0.f_bavail -+ } -+ -+ /// Free blocks available to unprivileged user -+ #[cfg(target_os = "dragonfly")] -+ pub fn blocks_available(&self) -> libc::c_long { -+ self.0.f_bavail -+ } -+ -+ /// Free blocks available to unprivileged user -+ #[cfg(any(target_os = "freebsd", target_os = "openbsd"))] -+ pub fn blocks_available(&self) -> i64 { -+ self.0.f_bavail -+ } -+ -+ /// Free blocks available to unprivileged user -+ #[cfg(all(target_os = "linux", target_env = "musl"))] -+ pub fn blocks_available(&self) -> u64 { -+ self.0.f_bavail -+ } -+ -+ /// Free blocks available to unprivileged user -+ #[cfg(not(any( -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "openbsd", -+ target_os = "dragonfly", -+ all(target_os = "linux", target_env = "musl") -+ )))] -+ pub fn blocks_available(&self) -> libc::c_ulong { -+ self.0.f_bavail -+ } -+ -+ /// Total file nodes in filesystem -+ #[cfg(any( -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "openbsd", -+ ))] -+ pub fn files(&self) -> u64 { -+ self.0.f_files -+ } -+ -+ /// Total file nodes in filesystem -+ #[cfg(target_os = "dragonfly")] -+ pub fn files(&self) -> libc::c_long { -+ self.0.f_files -+ } -+ -+ /// Total file nodes in filesystem -+ #[cfg(all(target_os = "linux", target_env = "musl"))] -+ pub fn files(&self) -> u64 { -+ self.0.f_files -+ } -+ -+ /// Total file nodes in filesystem -+ #[cfg(not(any( -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "openbsd", -+ target_os = "dragonfly", -+ all(target_os = "linux", target_env = "musl") -+ )))] -+ pub fn files(&self) -> libc::c_ulong { -+ self.0.f_files -+ } -+ -+ /// Free file nodes in filesystem -+ #[cfg(any(target_os = "ios", target_os = "macos", target_os = "android"))] -+ pub fn files_free(&self) -> u64 { -+ self.0.f_ffree -+ } -+ -+ /// Free file nodes in filesystem -+ #[cfg(target_os = "dragonfly")] -+ pub fn files_free(&self) -> libc::c_long { -+ self.0.f_ffree -+ } -+ -+ /// Free file nodes in filesystem -+ #[cfg(any(target_os = "freebsd", target_os = "openbsd"))] -+ pub fn files_free(&self) -> i64 { -+ self.0.f_ffree -+ } -+ -+ /// Free file nodes in filesystem -+ #[cfg(all(target_os = "linux", target_env = "musl"))] -+ pub fn files_free(&self) -> u64 { -+ self.0.f_ffree -+ } -+ -+ /// Free file nodes in filesystem -+ #[cfg(not(any( -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "openbsd", -+ target_os = "dragonfly", -+ all(target_os = "linux", target_env = "musl") -+ )))] -+ pub fn files_free(&self) -> libc::c_ulong { -+ self.0.f_ffree -+ } -+ -+ /// Filesystem ID -+ pub fn filesystem_id(&self) -> fsid_t { -+ self.0.f_fsid -+ } -+} -+ -+impl Debug for Statfs { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ f.debug_struct("Statfs") -+ .field("optimal_transfer_size", &self.optimal_transfer_size()) -+ .field("block_size", &self.block_size()) -+ .field("blocks", &self.blocks()) -+ .field("blocks_free", &self.blocks_free()) -+ .field("blocks_available", &self.blocks_available()) -+ .field("files", &self.files()) -+ .field("files_free", &self.files_free()) -+ .field("filesystem_id", &self.filesystem_id()) -+ .finish() -+ } -+} -+ -+pub fn statfs<P: ?Sized + NixPath>(path: &P) -> Result<Statfs> { -+ unsafe { -+ let mut stat: Statfs = mem::uninitialized(); -+ let res = path.with_nix_path(|path| libc::statfs(path.as_ptr(), &mut stat.0))?; -+ Errno::result(res).map(|_| stat) -+ } -+} -+ -+pub fn fstatfs<T: AsRawFd>(fd: &T) -> Result<Statfs> { -+ unsafe { -+ let mut stat: Statfs = mem::uninitialized(); -+ Errno::result(libc::fstatfs(fd.as_raw_fd(), &mut stat.0)).map(|_| stat) -+ } -+} -+ -+#[cfg(test)] -+mod test { -+ use std::fs::File; -+ -+ use sys::statfs::*; -+ use sys::statvfs::*; -+ use std::path::Path; -+ -+ #[test] -+ fn statfs_call() { -+ check_statfs("/tmp"); -+ check_statfs("/dev"); -+ check_statfs("/run"); -+ check_statfs("/"); -+ } -+ -+ #[test] -+ fn fstatfs_call() { -+ check_fstatfs("/tmp"); -+ check_fstatfs("/dev"); -+ check_fstatfs("/run"); -+ check_fstatfs("/"); -+ } -+ -+ fn check_fstatfs(path: &str) { -+ if !Path::new(path).exists() { -+ return; -+ } -+ let vfs = statvfs(path.as_bytes()).unwrap(); -+ let file = File::open(path).unwrap(); -+ let fs = fstatfs(&file).unwrap(); -+ assert_fs_equals(fs, vfs); -+ } -+ -+ fn check_statfs(path: &str) { -+ if !Path::new(path).exists() { -+ return; -+ } -+ let vfs = statvfs(path.as_bytes()).unwrap(); -+ let fs = statfs(path.as_bytes()).unwrap(); -+ assert_fs_equals(fs, vfs); -+ } -+ -+ fn assert_fs_equals(fs: Statfs, vfs: Statvfs) { -+ assert_eq!(fs.files() as u64, vfs.files() as u64); -+ assert_eq!(fs.blocks() as u64, vfs.blocks() as u64); -+ assert_eq!(fs.block_size() as u64, vfs.fragment_size() as u64); -+ } -+ -+ // This test is ignored because files_free/blocks_free can change after statvfs call and before -+ // statfs call. -+ #[test] -+ #[ignore] -+ fn statfs_call_strict() { -+ check_statfs_strict("/tmp"); -+ check_statfs_strict("/dev"); -+ check_statfs_strict("/run"); -+ check_statfs_strict("/"); -+ } -+ -+ // This test is ignored because files_free/blocks_free can change after statvfs call and before -+ // fstatfs call. -+ #[test] -+ #[ignore] -+ fn fstatfs_call_strict() { -+ check_fstatfs_strict("/tmp"); -+ check_fstatfs_strict("/dev"); -+ check_fstatfs_strict("/run"); -+ check_fstatfs_strict("/"); -+ } -+ -+ fn check_fstatfs_strict(path: &str) { -+ if !Path::new(path).exists() { -+ return; -+ } -+ let vfs = statvfs(path.as_bytes()); -+ let file = File::open(path).unwrap(); -+ let fs = fstatfs(&file); -+ assert_fs_equals_strict(fs.unwrap(), vfs.unwrap()) -+ } -+ -+ fn check_statfs_strict(path: &str) { -+ if !Path::new(path).exists() { -+ return; -+ } -+ let vfs = statvfs(path.as_bytes()); -+ let fs = statfs(path.as_bytes()); -+ assert_fs_equals_strict(fs.unwrap(), vfs.unwrap()) -+ } -+ -+ fn assert_fs_equals_strict(fs: Statfs, vfs: Statvfs) { -+ assert_eq!(fs.files_free() as u64, vfs.files_free() as u64); -+ assert_eq!(fs.blocks_free() as u64, vfs.blocks_free() as u64); -+ assert_eq!(fs.blocks_available() as u64, vfs.blocks_available() as u64); -+ assert_eq!(fs.files() as u64, vfs.files() as u64); -+ assert_eq!(fs.blocks() as u64, vfs.blocks() as u64); -+ assert_eq!(fs.block_size() as u64, vfs.fragment_size() as u64); -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/statvfs.rs b/third_party/rust/nix-0.15.0/src/sys/statvfs.rs -new file mode 100644 -index 0000000000000..e5980369d5119 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/statvfs.rs -@@ -0,0 +1,160 @@ -+//! Get filesystem statistics -+//! -+//! See [the man pages](http://pubs.opengroup.org/onlinepubs/9699919799/functions/fstatvfs.html) -+//! for more details. -+use std::mem; -+use std::os::unix::io::AsRawFd; -+ -+use libc::{self, c_ulong}; -+ -+use {Result, NixPath}; -+use errno::Errno; -+ -+libc_bitflags!( -+ /// File system mount Flags -+ #[repr(C)] -+ #[derive(Default)] -+ pub struct FsFlags: c_ulong { -+ /// Read Only -+ ST_RDONLY; -+ /// Do not allow the set-uid bits to have an effect -+ ST_NOSUID; -+ /// Do not interpret character or block-special devices -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ ST_NODEV; -+ /// Do not allow execution of binaries on the filesystem -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ ST_NOEXEC; -+ /// All IO should be done synchronously -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ ST_SYNCHRONOUS; -+ /// Allow mandatory locks on the filesystem -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ ST_MANDLOCK; -+ /// Write on file/directory/symlink -+ #[cfg(target_os = "linux")] -+ ST_WRITE; -+ /// Append-only file -+ #[cfg(target_os = "linux")] -+ ST_APPEND; -+ /// Immutable file -+ #[cfg(target_os = "linux")] -+ ST_IMMUTABLE; -+ /// Do not update access times on files -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ ST_NOATIME; -+ /// Do not update access times on files -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ ST_NODIRATIME; -+ /// Update access time relative to modify/change time -+ #[cfg(any(target_os = "android", all(target_os = "linux", not(target_env = "musl"))))] -+ ST_RELATIME; -+ } -+); -+ -+/// Wrapper around the POSIX `statvfs` struct -+/// -+/// For more information see the [`statvfs(3)` man pages](http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/sys_statvfs.h.html). -+// FIXME: Replace with repr(transparent) -+#[repr(C)] -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct Statvfs(libc::statvfs); -+ -+impl Statvfs { -+ /// get the file system block size -+ pub fn block_size(&self) -> c_ulong { -+ self.0.f_bsize -+ } -+ -+ /// Get the fundamental file system block size -+ pub fn fragment_size(&self) -> c_ulong { -+ self.0.f_frsize -+ } -+ -+ /// Get the number of blocks. -+ /// -+ /// Units are in units of `fragment_size()` -+ pub fn blocks(&self) -> libc::fsblkcnt_t { -+ self.0.f_blocks -+ } -+ -+ /// Get the number of free blocks in the file system -+ pub fn blocks_free(&self) -> libc::fsblkcnt_t { -+ self.0.f_bfree -+ } -+ -+ /// Get the number of free blocks for unprivileged users -+ pub fn blocks_available(&self) -> libc::fsblkcnt_t { -+ self.0.f_bavail -+ } -+ -+ /// Get the total number of file inodes -+ pub fn files(&self) -> libc::fsfilcnt_t { -+ self.0.f_files -+ } -+ -+ /// Get the number of free file inodes -+ pub fn files_free(&self) -> libc::fsfilcnt_t { -+ self.0.f_ffree -+ } -+ -+ /// Get the number of free file inodes for unprivileged users -+ pub fn files_available(&self) -> libc::fsfilcnt_t { -+ self.0.f_favail -+ } -+ -+ /// Get the file system id -+ pub fn filesystem_id(&self) -> c_ulong { -+ self.0.f_fsid -+ } -+ -+ /// Get the mount flags -+ pub fn flags(&self) -> FsFlags { -+ FsFlags::from_bits_truncate(self.0.f_flag) -+ } -+ -+ /// Get the maximum filename length -+ pub fn name_max(&self) -> c_ulong { -+ self.0.f_namemax -+ } -+ -+} -+ -+/// Return a `Statvfs` object with information about the `path` -+pub fn statvfs<P: ?Sized + NixPath>(path: &P) -> Result<Statvfs> { -+ unsafe { -+ Errno::clear(); -+ let mut stat: Statvfs = mem::uninitialized(); -+ let res = path.with_nix_path(|path| -+ libc::statvfs(path.as_ptr(), &mut stat.0) -+ )?; -+ -+ Errno::result(res).map(|_| stat) -+ } -+} -+ -+/// Return a `Statvfs` object with information about `fd` -+pub fn fstatvfs<T: AsRawFd>(fd: &T) -> Result<Statvfs> { -+ unsafe { -+ Errno::clear(); -+ let mut stat: Statvfs = mem::uninitialized(); -+ Errno::result(libc::fstatvfs(fd.as_raw_fd(), &mut stat.0)).map(|_| stat) -+ } -+} -+ -+#[cfg(test)] -+mod test { -+ use std::fs::File; -+ use sys::statvfs::*; -+ -+ #[test] -+ fn statvfs_call() { -+ statvfs("/".as_bytes()).unwrap(); -+ } -+ -+ #[test] -+ fn fstatvfs_call() { -+ let root = File::open("/").unwrap(); -+ fstatvfs(&root).unwrap(); -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/sysinfo.rs b/third_party/rust/nix-0.15.0/src/sys/sysinfo.rs -new file mode 100644 -index 0000000000000..4c8e38988886d ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/sysinfo.rs -@@ -0,0 +1,72 @@ -+use libc::{self, SI_LOAD_SHIFT}; -+use std::{cmp, mem}; -+use std::time::Duration; -+ -+use Result; -+use errno::Errno; -+ -+/// System info structure returned by `sysinfo`. -+#[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)] -+pub struct SysInfo(libc::sysinfo); -+ -+impl SysInfo { -+ /// Returns the load average tuple. -+ /// -+ /// The returned values represent the load average over time intervals of -+ /// 1, 5, and 15 minutes, respectively. -+ pub fn load_average(&self) -> (f64, f64, f64) { -+ ( -+ self.0.loads[0] as f64 / (1 << SI_LOAD_SHIFT) as f64, -+ self.0.loads[1] as f64 / (1 << SI_LOAD_SHIFT) as f64, -+ self.0.loads[2] as f64 / (1 << SI_LOAD_SHIFT) as f64, -+ ) -+ } -+ -+ /// Returns the time since system boot. -+ pub fn uptime(&self) -> Duration { -+ // Truncate negative values to 0 -+ Duration::from_secs(cmp::max(self.0.uptime, 0) as u64) -+ } -+ -+ /// Current number of processes. -+ pub fn process_count(&self) -> u16 { -+ self.0.procs -+ } -+ -+ /// Returns the amount of swap memory in Bytes. -+ pub fn swap_total(&self) -> u64 { -+ self.scale_mem(self.0.totalswap) -+ } -+ -+ /// Returns the amount of unused swap memory in Bytes. -+ pub fn swap_free(&self) -> u64 { -+ self.scale_mem(self.0.freeswap) -+ } -+ -+ /// Returns the total amount of installed RAM in Bytes. -+ pub fn ram_total(&self) -> u64 { -+ self.scale_mem(self.0.totalram) -+ } -+ -+ /// Returns the amount of completely unused RAM in Bytes. -+ /// -+ /// "Unused" in this context means that the RAM in neither actively used by -+ /// programs, nor by the operating system as disk cache or buffer. It is -+ /// "wasted" RAM since it currently serves no purpose. -+ pub fn ram_unused(&self) -> u64 { -+ self.scale_mem(self.0.freeram) -+ } -+ -+ fn scale_mem(&self, units: libc::c_ulong) -> u64 { -+ units as u64 * self.0.mem_unit as u64 -+ } -+} -+ -+/// Returns system information. -+/// -+/// [See `sysinfo(2)`](http://man7.org/linux/man-pages/man2/sysinfo.2.html). -+pub fn sysinfo() -> Result<SysInfo> { -+ let mut info: libc::sysinfo = unsafe { mem::uninitialized() }; -+ let res = unsafe { libc::sysinfo(&mut info) }; -+ Errno::result(res).map(|_| SysInfo(info)) -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/termios.rs b/third_party/rust/nix-0.15.0/src/sys/termios.rs -new file mode 100644 -index 0000000000000..c7cdf10b461c1 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/termios.rs -@@ -0,0 +1,1107 @@ -+//! An interface for controlling asynchronous communication ports -+//! -+//! This interface provides a safe wrapper around the termios subsystem defined by POSIX. The -+//! underlying types are all implemented in libc for most platforms and either wrapped in safer -+//! types here or exported directly. -+//! -+//! If you are unfamiliar with the `termios` API, you should first read the -+//! [API documentation](http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/termios.h.html) and -+//! then come back to understand how `nix` safely wraps it. -+//! -+//! It should be noted that this API incurs some runtime overhead above the base `libc` definitions. -+//! As this interface is not used with high-bandwidth information, this should be fine in most -+//! cases. The primary cost when using this API is that the `Termios` datatype here duplicates the -+//! standard fields of the underlying `termios` struct and uses safe type wrappers for those fields. -+//! This means that when crossing the FFI interface to the underlying C library, data is first -+//! copied into the underlying `termios` struct, then the operation is done, and the data is copied -+//! back (with additional sanity checking) into the safe wrapper types. The `termios` struct is -+//! relatively small across all platforms (on the order of 32-64 bytes). -+//! -+//! The following examples highlight some of the API use cases such that users coming from using C -+//! or reading the standard documentation will understand how to use the safe API exposed here. -+//! -+//! Example disabling processing of the end-of-file control character: -+//! -+//! ``` -+//! # use self::nix::sys::termios::SpecialCharacterIndices::VEOF; -+//! # use self::nix::sys::termios::{_POSIX_VDISABLE, Termios}; -+//! # let mut termios = unsafe { Termios::default_uninit() }; -+//! termios.control_chars[VEOF as usize] = _POSIX_VDISABLE; -+//! ``` -+//! -+//! The flags within `Termios` are defined as bitfields using the `bitflags` crate. This provides -+//! an interface for working with bitfields that is similar to working with the raw unsigned -+//! integer types but offers type safety because of the internal checking that values will always -+//! be a valid combination of the defined flags. -+//! -+//! An example showing some of the basic operations for interacting with the control flags: -+//! -+//! ``` -+//! # use self::nix::sys::termios::{ControlFlags, Termios}; -+//! # let mut termios = unsafe { Termios::default_uninit() }; -+//! termios.control_flags & ControlFlags::CSIZE == ControlFlags::CS5; -+//! termios.control_flags |= ControlFlags::CS5; -+//! ``` -+//! -+//! # Baud rates -+//! -+//! This API is not consistent across platforms when it comes to `BaudRate`: Android and Linux both -+//! only support the rates specified by the `BaudRate` enum through their termios API while the BSDs -+//! support arbitrary baud rates as the values of the `BaudRate` enum constants are the same integer -+//! value of the constant (`B9600` == `9600`). Therefore the `nix::termios` API uses the following -+//! conventions: -+//! -+//! * `cfgetispeed()` - Returns `u32` on BSDs, `BaudRate` on Android/Linux -+//! * `cfgetospeed()` - Returns `u32` on BSDs, `BaudRate` on Android/Linux -+//! * `cfsetispeed()` - Takes `u32` or `BaudRate` on BSDs, `BaudRate` on Android/Linux -+//! * `cfsetospeed()` - Takes `u32` or `BaudRate` on BSDs, `BaudRate` on Android/Linux -+//! * `cfsetspeed()` - Takes `u32` or `BaudRate` on BSDs, `BaudRate` on Android/Linux -+//! -+//! The most common use case of specifying a baud rate using the enum will work the same across -+//! platforms: -+//! -+//! ```rust -+//! # #[macro_use] extern crate nix; -+//! # use nix::sys::termios::{BaudRate, cfsetispeed, cfsetospeed, cfsetspeed, Termios}; -+//! # fn main() { -+//! # let mut t = unsafe { Termios::default_uninit() }; -+//! cfsetispeed(&mut t, BaudRate::B9600); -+//! cfsetospeed(&mut t, BaudRate::B9600); -+//! cfsetspeed(&mut t, BaudRate::B9600); -+//! # } -+//! ``` -+//! -+//! Additionally round-tripping baud rates is consistent across platforms: -+//! -+//! ```rust -+//! # extern crate nix; -+//! # use nix::sys::termios::{BaudRate, cfgetispeed, cfgetospeed, cfsetispeed, cfsetspeed, Termios}; -+//! # fn main() { -+//! # let mut t = unsafe { Termios::default_uninit() }; -+//! # cfsetspeed(&mut t, BaudRate::B9600); -+//! let speed = cfgetispeed(&t); -+//! assert!(speed == cfgetospeed(&t)); -+//! cfsetispeed(&mut t, speed); -+//! # } -+//! ``` -+//! -+//! On non-BSDs, `cfgetispeed()` and `cfgetospeed()` both return a `BaudRate`: -+//! -+// FIXME: Replace `ignore` with `compile_fail` once 1.22 is the minimum support Rust version -+#![cfg_attr(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", -+ target_os = "macos", target_os = "netbsd", target_os = "openbsd"), -+ doc = " ```rust,ignore")] -+#![cfg_attr(not(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", -+ target_os = "macos", target_os = "netbsd", target_os = "openbsd")), -+ doc = " ```rust")] -+//! # extern crate nix; -+//! # use nix::sys::termios::{BaudRate, cfgetispeed, cfgetospeed, cfsetspeed, Termios}; -+//! # fn main() { -+//! # let mut t = unsafe { Termios::default_uninit() }; -+//! # cfsetspeed(&mut t, BaudRate::B9600); -+//! assert!(cfgetispeed(&t) == BaudRate::B9600); -+//! assert!(cfgetospeed(&t) == BaudRate::B9600); -+//! # } -+//! ``` -+//! -+//! But on the BSDs, `cfgetispeed()` and `cfgetospeed()` both return `u32`s: -+//! -+// FIXME: Replace `ignore` with `compile_fail` once 1.22 is the minimum support Rust version -+#![cfg_attr(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", -+ target_os = "macos", target_os = "netbsd", target_os = "openbsd"), -+ doc = " ```rust")] -+#![cfg_attr(not(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", -+ target_os = "macos", target_os = "netbsd", target_os = "openbsd")), -+ doc = " ```rust,ignore")] -+//! # extern crate nix; -+//! # use nix::sys::termios::{BaudRate, cfgetispeed, cfgetospeed, cfsetspeed, Termios}; -+//! # fn main() { -+//! # let mut t = unsafe { Termios::default_uninit() }; -+//! # cfsetspeed(&mut t, 9600u32); -+//! assert!(cfgetispeed(&t) == 9600u32); -+//! assert!(cfgetospeed(&t) == 9600u32); -+//! # } -+//! ``` -+//! -+//! It's trivial to convert from a `BaudRate` to a `u32` on BSDs: -+//! -+// FIXME: Replace `ignore` with `compile_fail` once 1.22 is the minimum support Rust version -+#![cfg_attr(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", -+ target_os = "macos", target_os = "netbsd", target_os = "openbsd"), -+ doc = " ```rust")] -+#![cfg_attr(not(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", -+ target_os = "macos", target_os = "netbsd", target_os = "openbsd")), -+ doc = " ```rust,ignore")] -+//! # extern crate nix; -+//! # use nix::sys::termios::{BaudRate, cfgetispeed, cfsetspeed, Termios}; -+//! # fn main() { -+//! # let mut t = unsafe { Termios::default_uninit() }; -+//! # cfsetspeed(&mut t, 9600u32); -+//! assert!(cfgetispeed(&t) == BaudRate::B9600.into()); -+//! assert!(u32::from(BaudRate::B9600) == 9600u32); -+//! # } -+//! ``` -+//! -+//! And on BSDs you can specify arbitrary baud rates (**note** this depends on hardware support) -+//! by specifying baud rates directly using `u32`s: -+//! -+// FIXME: Replace `ignore` with `compile_fail` once 1.22 is the minimum support Rust version -+#![cfg_attr(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", -+ target_os = "macos", target_os = "netbsd", target_os = "openbsd"), -+ doc = " ```rust")] -+#![cfg_attr(not(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", -+ target_os = "macos", target_os = "netbsd", target_os = "openbsd")), -+ doc = " ```rust,ignore")] -+//! # extern crate nix; -+//! # use nix::sys::termios::{cfsetispeed, cfsetospeed, cfsetspeed, Termios}; -+//! # fn main() { -+//! # let mut t = unsafe { Termios::default_uninit() }; -+//! cfsetispeed(&mut t, 9600u32); -+//! cfsetospeed(&mut t, 9600u32); -+//! cfsetspeed(&mut t, 9600u32); -+//! # } -+//! ``` -+use Result; -+use errno::Errno; -+use libc::{self, c_int, tcflag_t}; -+use std::cell::{Ref, RefCell}; -+use std::convert::From; -+use std::mem; -+use std::os::unix::io::RawFd; -+ -+use ::unistd::Pid; -+ -+/// Stores settings for the termios API -+/// -+/// This is a wrapper around the `libc::termios` struct that provides a safe interface for the -+/// standard fields. The only safe way to obtain an instance of this struct is to extract it from -+/// an open port using `tcgetattr()`. -+#[derive(Clone, Debug, Eq, PartialEq)] -+pub struct Termios { -+ inner: RefCell<libc::termios>, -+ /// Input mode flags (see `termios.c_iflag` documentation) -+ pub input_flags: InputFlags, -+ /// Output mode flags (see `termios.c_oflag` documentation) -+ pub output_flags: OutputFlags, -+ /// Control mode flags (see `termios.c_cflag` documentation) -+ pub control_flags: ControlFlags, -+ /// Local mode flags (see `termios.c_lflag` documentation) -+ pub local_flags: LocalFlags, -+ /// Control characters (see `termios.c_cc` documentation) -+ pub control_chars: [libc::cc_t; NCCS], -+} -+ -+impl Termios { -+ /// Exposes an immutable reference to the underlying `libc::termios` data structure. -+ /// -+ /// This can be used for interfacing with other FFI functions like: -+ /// -+ /// ```rust -+ /// # extern crate libc; -+ /// # extern crate nix; -+ /// # fn main() { -+ /// # use nix::sys::termios::Termios; -+ /// # let mut termios = unsafe { Termios::default_uninit() }; -+ /// let inner_termios = termios.get_libc_termios(); -+ /// unsafe { libc::cfgetispeed(&*inner_termios) }; -+ /// # } -+ /// ``` -+ /// -+ /// There is no public API exposed for functions that modify the underlying `libc::termios` -+ /// data because it requires additional work to maintain type safety. -+ // FIXME: Switch this over to use pub(crate) -+ #[doc(hidden)] -+ pub fn get_libc_termios(&self) -> Ref<libc::termios> { -+ { -+ let mut termios = self.inner.borrow_mut(); -+ termios.c_iflag = self.input_flags.bits(); -+ termios.c_oflag = self.output_flags.bits(); -+ termios.c_cflag = self.control_flags.bits(); -+ termios.c_lflag = self.local_flags.bits(); -+ termios.c_cc = self.control_chars; -+ } -+ self.inner.borrow() -+ } -+ -+ /// Exposes the inner `libc::termios` datastore within `Termios`. -+ /// -+ /// This is unsafe because if this is used to modify the inner libc::termios struct, it will not -+ /// automatically update the safe wrapper type around it. Therefore we disable docs to -+ /// effectively limit its use to nix internals. In this case it should also be paired with a -+ /// call to `update_wrapper()` so that the wrapper-type and internal representation stay -+ /// consistent. -+ unsafe fn get_libc_termios_mut(&mut self) -> *mut libc::termios { -+ { -+ let mut termios = self.inner.borrow_mut(); -+ termios.c_iflag = self.input_flags.bits(); -+ termios.c_oflag = self.output_flags.bits(); -+ termios.c_cflag = self.control_flags.bits(); -+ termios.c_lflag = self.local_flags.bits(); -+ termios.c_cc = self.control_chars; -+ } -+ self.inner.as_ptr() -+ } -+ -+ /// Allows for easily creating new `Termios` structs that will be overwritten with real data. -+ /// -+ /// This should only be used when the inner libc::termios struct will be overwritten before it's -+ /// read. -+ // FIXME: Switch this over to use pub(crate) -+ #[doc(hidden)] -+ pub unsafe fn default_uninit() -> Self { -+ Termios { -+ inner: RefCell::new(mem::uninitialized()), -+ input_flags: InputFlags::empty(), -+ output_flags: OutputFlags::empty(), -+ control_flags: ControlFlags::empty(), -+ local_flags: LocalFlags::empty(), -+ control_chars: [0 as libc::cc_t; NCCS], -+ } -+ } -+ -+ /// Updates the wrapper values from the internal `libc::termios` data structure. -+ #[doc(hidden)] -+ pub fn update_wrapper(&mut self) { -+ let termios = *self.inner.borrow_mut(); -+ self.input_flags = InputFlags::from_bits_truncate(termios.c_iflag); -+ self.output_flags = OutputFlags::from_bits_truncate(termios.c_oflag); -+ self.control_flags = ControlFlags::from_bits_truncate(termios.c_cflag); -+ self.local_flags = LocalFlags::from_bits_truncate(termios.c_lflag); -+ self.control_chars = termios.c_cc; -+ } -+} -+ -+impl From<libc::termios> for Termios { -+ fn from(termios: libc::termios) -> Self { -+ Termios { -+ inner: RefCell::new(termios), -+ input_flags: InputFlags::from_bits_truncate(termios.c_iflag), -+ output_flags: OutputFlags::from_bits_truncate(termios.c_oflag), -+ control_flags: ControlFlags::from_bits_truncate(termios.c_cflag), -+ local_flags: LocalFlags::from_bits_truncate(termios.c_lflag), -+ control_chars: termios.c_cc, -+ } -+ } -+} -+ -+impl From<Termios> for libc::termios { -+ fn from(termios: Termios) -> Self { -+ termios.inner.into_inner() -+ } -+} -+ -+libc_enum!{ -+ /// Baud rates supported by the system. -+ /// -+ /// For the BSDs, arbitrary baud rates can be specified by using `u32`s directly instead of this -+ /// enum. -+ /// -+ /// B0 is special and will disable the port. -+ #[cfg_attr(all(any(target_os = "ios", target_os = "macos"), target_pointer_width = "64"), repr(u64))] -+ #[cfg_attr(not(all(any(target_os = "ios", target_os = "macos"), target_pointer_width = "64")), repr(u32))] -+ pub enum BaudRate { -+ B0, -+ B50, -+ B75, -+ B110, -+ B134, -+ B150, -+ B200, -+ B300, -+ B600, -+ B1200, -+ B1800, -+ B2400, -+ B4800, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ B7200, -+ B9600, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ B14400, -+ B19200, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ B28800, -+ B38400, -+ B57600, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ B76800, -+ B115200, -+ B230400, -+ #[cfg(any(target_os = "android", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "netbsd"))] -+ B460800, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ B500000, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ B576000, -+ #[cfg(any(target_os = "android", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "netbsd"))] -+ B921600, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ B1000000, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ B1152000, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ B1500000, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ B2000000, -+ #[cfg(any(target_os = "android", all(target_os = "linux", not(target_arch = "sparc64"))))] -+ B2500000, -+ #[cfg(any(target_os = "android", all(target_os = "linux", not(target_arch = "sparc64"))))] -+ B3000000, -+ #[cfg(any(target_os = "android", all(target_os = "linux", not(target_arch = "sparc64"))))] -+ B3500000, -+ #[cfg(any(target_os = "android", all(target_os = "linux", not(target_arch = "sparc64"))))] -+ B4000000, -+ } -+} -+ -+impl From<libc::speed_t> for BaudRate { -+ fn from(s: libc::speed_t) -> BaudRate { -+ -+ use libc::{B0, B50, B75, B110, B134, B150, B200, B300, B600, B1200, B1800, B2400, B4800, -+ B9600, B19200, B38400, B57600, B115200, B230400}; -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ use libc::{B500000, B576000, B1000000, B1152000, B1500000, B2000000}; -+ #[cfg(any(target_os = "android", all(target_os = "linux", not(target_arch = "sparc64"))))] -+ use libc::{B2500000, B3000000, B3500000, B4000000}; -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ use libc::{B7200, B14400, B28800, B76800}; -+ #[cfg(any(target_os = "android", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "netbsd"))] -+ use libc::{B460800, B921600}; -+ -+ match s { -+ B0 => BaudRate::B0, -+ B50 => BaudRate::B50, -+ B75 => BaudRate::B75, -+ B110 => BaudRate::B110, -+ B134 => BaudRate::B134, -+ B150 => BaudRate::B150, -+ B200 => BaudRate::B200, -+ B300 => BaudRate::B300, -+ B600 => BaudRate::B600, -+ B1200 => BaudRate::B1200, -+ B1800 => BaudRate::B1800, -+ B2400 => BaudRate::B2400, -+ B4800 => BaudRate::B4800, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ B7200 => BaudRate::B7200, -+ B9600 => BaudRate::B9600, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ B14400 => BaudRate::B14400, -+ B19200 => BaudRate::B19200, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ B28800 => BaudRate::B28800, -+ B38400 => BaudRate::B38400, -+ B57600 => BaudRate::B57600, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ B76800 => BaudRate::B76800, -+ B115200 => BaudRate::B115200, -+ B230400 => BaudRate::B230400, -+ #[cfg(any(target_os = "android", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "netbsd"))] -+ B460800 => BaudRate::B460800, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ B500000 => BaudRate::B500000, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ B576000 => BaudRate::B576000, -+ #[cfg(any(target_os = "android", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "netbsd"))] -+ B921600 => BaudRate::B921600, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ B1000000 => BaudRate::B1000000, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ B1152000 => BaudRate::B1152000, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ B1500000 => BaudRate::B1500000, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ B2000000 => BaudRate::B2000000, -+ #[cfg(any(target_os = "android", all(target_os = "linux", not(target_arch = "sparc64"))))] -+ B2500000 => BaudRate::B2500000, -+ #[cfg(any(target_os = "android", all(target_os = "linux", not(target_arch = "sparc64"))))] -+ B3000000 => BaudRate::B3000000, -+ #[cfg(any(target_os = "android", all(target_os = "linux", not(target_arch = "sparc64"))))] -+ B3500000 => BaudRate::B3500000, -+ #[cfg(any(target_os = "android", all(target_os = "linux", not(target_arch = "sparc64"))))] -+ B4000000 => BaudRate::B4000000, -+ b => unreachable!("Invalid baud constant: {}", b), -+ } -+ } -+} -+ -+// TODO: Include `TryFrom<u32> for BaudRate` once that API stabilizes -+#[cfg(any(target_os = "freebsd", -+ target_os = "dragonfly", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+impl From<BaudRate> for u32 { -+ fn from(b: BaudRate) -> u32 { -+ b as u32 -+ } -+} -+ -+// TODO: Add TCSASOFT, which will require treating this as a bitfield. -+libc_enum! { -+ /// Specify when a port configuration change should occur. -+ /// -+ /// Used as an argument to `tcsetattr()` -+ #[repr(i32)] -+ pub enum SetArg { -+ /// The change will occur immediately -+ TCSANOW, -+ /// The change occurs after all output has been written -+ TCSADRAIN, -+ /// Same as `TCSADRAIN`, but will also flush the input buffer -+ TCSAFLUSH, -+ } -+} -+ -+libc_enum! { -+ /// Specify a combination of the input and output buffers to flush -+ /// -+ /// Used as an argument to `tcflush()`. -+ #[repr(i32)] -+ pub enum FlushArg { -+ /// Flush data that was received but not read -+ TCIFLUSH, -+ /// Flush data written but not transmitted -+ TCOFLUSH, -+ /// Flush both received data not read and written data not transmitted -+ TCIOFLUSH, -+ } -+} -+ -+libc_enum! { -+ /// Specify how transmission flow should be altered -+ /// -+ /// Used as an argument to `tcflow()`. -+ #[repr(i32)] -+ pub enum FlowArg { -+ /// Suspend transmission -+ TCOOFF, -+ /// Resume transmission -+ TCOON, -+ /// Transmit a STOP character, which should disable a connected terminal device -+ TCIOFF, -+ /// Transmit a START character, which should re-enable a connected terminal device -+ TCION, -+ } -+} -+ -+// TODO: Make this usable directly as a slice index. -+libc_enum! { -+ /// Indices into the `termios.c_cc` array for special characters. -+ #[repr(usize)] -+ pub enum SpecialCharacterIndices { -+ VDISCARD, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ VDSUSP, -+ VEOF, -+ VEOL, -+ VEOL2, -+ VERASE, -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] -+ VERASE2, -+ VINTR, -+ VKILL, -+ VLNEXT, -+ #[cfg(not(all(target_os = "linux", target_arch = "sparc64")))] -+ VMIN, -+ VQUIT, -+ VREPRINT, -+ VSTART, -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ VSTATUS, -+ VSTOP, -+ VSUSP, -+ #[cfg(target_os = "linux")] -+ VSWTC, -+ #[cfg(target_os = "haiku")] -+ VSWTCH, -+ #[cfg(not(all(target_os = "linux", target_arch = "sparc64")))] -+ VTIME, -+ VWERASE, -+ #[cfg(target_os = "dragonfly")] -+ VCHECKPT, -+ } -+} -+ -+pub use libc::NCCS; -+#[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+pub use libc::_POSIX_VDISABLE; -+ -+libc_bitflags! { -+ /// Flags for configuring the input mode of a terminal -+ pub struct InputFlags: tcflag_t { -+ IGNBRK; -+ BRKINT; -+ IGNPAR; -+ PARMRK; -+ INPCK; -+ ISTRIP; -+ INLCR; -+ IGNCR; -+ ICRNL; -+ IXON; -+ IXOFF; -+ IXANY; -+ IMAXBEL; -+ #[cfg(any(target_os = "android", target_os = "linux", target_os = "macos"))] -+ IUTF8; -+ } -+} -+ -+libc_bitflags! { -+ /// Flags for configuring the output mode of a terminal -+ pub struct OutputFlags: tcflag_t { -+ OPOST; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "linux", -+ target_os = "openbsd"))] -+ OLCUC; -+ ONLCR; -+ OCRNL as tcflag_t; -+ ONOCR as tcflag_t; -+ ONLRET as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ OFILL as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ OFDEL as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ NL0 as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ NL1 as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ CR0 as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ CR1 as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ CR2 as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ CR3 as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "freebsd", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ TAB0 as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ TAB1 as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ TAB2 as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "freebsd", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ TAB3 as tcflag_t; -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ XTABS; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ BS0 as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ BS1 as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ VT0 as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ VT1 as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ FF0 as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ FF1 as tcflag_t; -+ #[cfg(any(target_os = "freebsd", -+ target_os = "dragonfly", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ OXTABS; -+ #[cfg(any(target_os = "freebsd", -+ target_os = "dragonfly", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ ONOEOT as tcflag_t; -+ -+ // Bitmasks for use with OutputFlags to select specific settings -+ // These should be moved to be a mask once https://github.com/rust-lang-nursery/bitflags/issues/110 -+ // is resolved. -+ -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ NLDLY as tcflag_t; // FIXME: Datatype needs to be corrected in libc for mac -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ CRDLY as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "freebsd", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ TABDLY as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ BSDLY as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ VTDLY as tcflag_t; -+ #[cfg(any(target_os = "android", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+ FFDLY as tcflag_t; -+ } -+} -+ -+libc_bitflags! { -+ /// Flags for setting the control mode of a terminal -+ pub struct ControlFlags: tcflag_t { -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ CIGNORE; -+ CS5; -+ CS6; -+ CS7; -+ CS8; -+ CSTOPB; -+ CREAD; -+ PARENB; -+ PARODD; -+ HUPCL; -+ CLOCAL; -+ CRTSCTS; -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ CBAUD; -+ #[cfg(any(target_os = "android", all(target_os = "linux", not(target_arch = "mips"))))] -+ CMSPAR; -+ #[cfg(any(target_os = "android", -+ all(target_os = "linux", -+ not(any(target_arch = "powerpc", target_arch = "powerpc64")))))] -+ CIBAUD; -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ CBAUDEX; -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ MDMBUF; -+ #[cfg(any(target_os = "netbsd", target_os = "openbsd"))] -+ CHWFLOW; -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ CCTS_OFLOW; -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ CRTS_IFLOW; -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd"))] -+ CDTR_IFLOW; -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd"))] -+ CDSR_OFLOW; -+ #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd"))] -+ CCAR_OFLOW; -+ -+ // Bitmasks for use with ControlFlags to select specific settings -+ // These should be moved to be a mask once https://github.com/rust-lang-nursery/bitflags/issues/110 -+ // is resolved. -+ -+ CSIZE; -+ } -+} -+ -+libc_bitflags! { -+ /// Flags for setting any local modes -+ pub struct LocalFlags: tcflag_t { -+ ECHOKE; -+ ECHOE; -+ ECHOK; -+ ECHO; -+ ECHONL; -+ ECHOPRT; -+ ECHOCTL; -+ ISIG; -+ ICANON; -+ #[cfg(any(target_os = "freebsd", -+ target_os = "dragonfly", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ ALTWERASE; -+ IEXTEN; -+ EXTPROC; -+ TOSTOP; -+ FLUSHO; -+ #[cfg(any(target_os = "freebsd", -+ target_os = "dragonfly", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+ NOKERNINFO; -+ PENDIN; -+ NOFLSH; -+ } -+} -+ -+cfg_if!{ -+ if #[cfg(any(target_os = "freebsd", -+ target_os = "dragonfly", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] { -+ /// Get input baud rate (see -+ /// [cfgetispeed(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/cfgetispeed.html)). -+ /// -+ /// `cfgetispeed()` extracts the input baud rate from the given `Termios` structure. -+ pub fn cfgetispeed(termios: &Termios) -> u32 { -+ let inner_termios = termios.get_libc_termios(); -+ unsafe { libc::cfgetispeed(&*inner_termios) as u32 } -+ } -+ -+ /// Get output baud rate (see -+ /// [cfgetospeed(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/cfgetospeed.html)). -+ /// -+ /// `cfgetospeed()` extracts the output baud rate from the given `Termios` structure. -+ pub fn cfgetospeed(termios: &Termios) -> u32 { -+ let inner_termios = termios.get_libc_termios(); -+ unsafe { libc::cfgetospeed(&*inner_termios) as u32 } -+ } -+ -+ /// Set input baud rate (see -+ /// [cfsetispeed(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/cfsetispeed.html)). -+ /// -+ /// `cfsetispeed()` sets the intput baud rate in the given `Termios` structure. -+ pub fn cfsetispeed<T: Into<u32>>(termios: &mut Termios, baud: T) -> Result<()> { -+ let inner_termios = unsafe { termios.get_libc_termios_mut() }; -+ let res = unsafe { libc::cfsetispeed(inner_termios, baud.into() as libc::speed_t) }; -+ termios.update_wrapper(); -+ Errno::result(res).map(drop) -+ } -+ -+ /// Set output baud rate (see -+ /// [cfsetospeed(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/cfsetospeed.html)). -+ /// -+ /// `cfsetospeed()` sets the output baud rate in the given termios structure. -+ pub fn cfsetospeed<T: Into<u32>>(termios: &mut Termios, baud: T) -> Result<()> { -+ let inner_termios = unsafe { termios.get_libc_termios_mut() }; -+ let res = unsafe { libc::cfsetospeed(inner_termios, baud.into() as libc::speed_t) }; -+ termios.update_wrapper(); -+ Errno::result(res).map(drop) -+ } -+ -+ /// Set both the input and output baud rates (see -+ /// [termios(3)](https://www.freebsd.org/cgi/man.cgi?query=cfsetspeed)). -+ /// -+ /// `cfsetspeed()` sets the input and output baud rate in the given termios structure. Note that -+ /// this is part of the 4.4BSD standard and not part of POSIX. -+ pub fn cfsetspeed<T: Into<u32>>(termios: &mut Termios, baud: T) -> Result<()> { -+ let inner_termios = unsafe { termios.get_libc_termios_mut() }; -+ let res = unsafe { libc::cfsetspeed(inner_termios, baud.into() as libc::speed_t) }; -+ termios.update_wrapper(); -+ Errno::result(res).map(drop) -+ } -+ } else { -+ /// Get input baud rate (see -+ /// [cfgetispeed(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/cfgetispeed.html)). -+ /// -+ /// `cfgetispeed()` extracts the input baud rate from the given `Termios` structure. -+ pub fn cfgetispeed(termios: &Termios) -> BaudRate { -+ let inner_termios = termios.get_libc_termios(); -+ unsafe { libc::cfgetispeed(&*inner_termios) }.into() -+ } -+ -+ /// Get output baud rate (see -+ /// [cfgetospeed(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/cfgetospeed.html)). -+ /// -+ /// `cfgetospeed()` extracts the output baud rate from the given `Termios` structure. -+ pub fn cfgetospeed(termios: &Termios) -> BaudRate { -+ let inner_termios = termios.get_libc_termios(); -+ unsafe { libc::cfgetospeed(&*inner_termios) }.into() -+ } -+ -+ /// Set input baud rate (see -+ /// [cfsetispeed(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/cfsetispeed.html)). -+ /// -+ /// `cfsetispeed()` sets the intput baud rate in the given `Termios` structure. -+ pub fn cfsetispeed(termios: &mut Termios, baud: BaudRate) -> Result<()> { -+ let inner_termios = unsafe { termios.get_libc_termios_mut() }; -+ let res = unsafe { libc::cfsetispeed(inner_termios, baud as libc::speed_t) }; -+ termios.update_wrapper(); -+ Errno::result(res).map(drop) -+ } -+ -+ /// Set output baud rate (see -+ /// [cfsetospeed(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/cfsetospeed.html)). -+ /// -+ /// `cfsetospeed()` sets the output baud rate in the given `Termios` structure. -+ pub fn cfsetospeed(termios: &mut Termios, baud: BaudRate) -> Result<()> { -+ let inner_termios = unsafe { termios.get_libc_termios_mut() }; -+ let res = unsafe { libc::cfsetospeed(inner_termios, baud as libc::speed_t) }; -+ termios.update_wrapper(); -+ Errno::result(res).map(drop) -+ } -+ -+ /// Set both the input and output baud rates (see -+ /// [termios(3)](https://www.freebsd.org/cgi/man.cgi?query=cfsetspeed)). -+ /// -+ /// `cfsetspeed()` sets the input and output baud rate in the given `Termios` structure. Note that -+ /// this is part of the 4.4BSD standard and not part of POSIX. -+ pub fn cfsetspeed(termios: &mut Termios, baud: BaudRate) -> Result<()> { -+ let inner_termios = unsafe { termios.get_libc_termios_mut() }; -+ let res = unsafe { libc::cfsetspeed(inner_termios, baud as libc::speed_t) }; -+ termios.update_wrapper(); -+ Errno::result(res).map(drop) -+ } -+ } -+} -+ -+/// Configures the port to something like the "raw" mode of the old Version 7 terminal driver (see -+/// [termios(3)](http://man7.org/linux/man-pages/man3/termios.3.html)). -+/// -+/// `cfmakeraw()` configures the termios structure such that input is available character-by- -+/// character, echoing is disabled, and all special input and output processing is disabled. Note -+/// that this is a non-standard function, but is available on Linux and BSDs. -+pub fn cfmakeraw(termios: &mut Termios) { -+ let inner_termios = unsafe { termios.get_libc_termios_mut() }; -+ unsafe { -+ libc::cfmakeraw(inner_termios); -+ } -+ termios.update_wrapper(); -+} -+ -+/// Configures the port to "sane" mode (like the configuration of a newly created terminal) (see -+/// [tcsetattr(3)](https://www.freebsd.org/cgi/man.cgi?query=tcsetattr)). -+/// -+/// Note that this is a non-standard function, available on FreeBSD. -+#[cfg(target_os = "freebsd")] -+pub fn cfmakesane(termios: &mut Termios) { -+ let inner_termios = unsafe { termios.get_libc_termios_mut() }; -+ unsafe { -+ libc::cfmakesane(inner_termios); -+ } -+ termios.update_wrapper(); -+} -+ -+/// Return the configuration of a port -+/// [tcgetattr(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/tcgetattr.html)). -+/// -+/// `tcgetattr()` returns a `Termios` structure with the current configuration for a port. Modifying -+/// this structure *will not* reconfigure the port, instead the modifications should be done to -+/// the `Termios` structure and then the port should be reconfigured using `tcsetattr()`. -+pub fn tcgetattr(fd: RawFd) -> Result<Termios> { -+ let mut termios: libc::termios = unsafe { mem::uninitialized() }; -+ -+ let res = unsafe { libc::tcgetattr(fd, &mut termios) }; -+ -+ Errno::result(res)?; -+ -+ Ok(termios.into()) -+} -+ -+/// Set the configuration for a terminal (see -+/// [tcsetattr(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/tcsetattr.html)). -+/// -+/// `tcsetattr()` reconfigures the given port based on a given `Termios` structure. This change -+/// takes affect at a time specified by `actions`. Note that this function may return success if -+/// *any* of the parameters were successfully set, not only if all were set successfully. -+pub fn tcsetattr(fd: RawFd, actions: SetArg, termios: &Termios) -> Result<()> { -+ let inner_termios = termios.get_libc_termios(); -+ Errno::result(unsafe { libc::tcsetattr(fd, actions as c_int, &*inner_termios) }).map(drop) -+} -+ -+/// Block until all output data is written (see -+/// [tcdrain(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/tcdrain.html)). -+pub fn tcdrain(fd: RawFd) -> Result<()> { -+ Errno::result(unsafe { libc::tcdrain(fd) }).map(drop) -+} -+ -+/// Suspend or resume the transmission or reception of data (see -+/// [tcflow(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/tcflow.html)). -+/// -+/// `tcflow()` suspends of resumes the transmission or reception of data for the given port -+/// depending on the value of `action`. -+pub fn tcflow(fd: RawFd, action: FlowArg) -> Result<()> { -+ Errno::result(unsafe { libc::tcflow(fd, action as c_int) }).map(drop) -+} -+ -+/// Discard data in the output or input queue (see -+/// [tcflush(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/tcflush.html)). -+/// -+/// `tcflush()` will discard data for a terminal port in the input queue, output queue, or both -+/// depending on the value of `action`. -+pub fn tcflush(fd: RawFd, action: FlushArg) -> Result<()> { -+ Errno::result(unsafe { libc::tcflush(fd, action as c_int) }).map(drop) -+} -+ -+/// Send a break for a specific duration (see -+/// [tcsendbreak(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/tcsendbreak.html)). -+/// -+/// When using asynchronous data transmission `tcsendbreak()` will transmit a continuous stream -+/// of zero-valued bits for an implementation-defined duration. -+pub fn tcsendbreak(fd: RawFd, duration: c_int) -> Result<()> { -+ Errno::result(unsafe { libc::tcsendbreak(fd, duration) }).map(drop) -+} -+ -+/// Get the session controlled by the given terminal (see -+/// [tcgetsid(3)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/tcgetsid.html)). -+pub fn tcgetsid(fd: RawFd) -> Result<Pid> { -+ let res = unsafe { libc::tcgetsid(fd) }; -+ -+ Errno::result(res).map(Pid::from_raw) -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/time.rs b/third_party/rust/nix-0.15.0/src/sys/time.rs -new file mode 100644 -index 0000000000000..3ad57543b18a7 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/time.rs -@@ -0,0 +1,542 @@ -+use std::{cmp, fmt, ops}; -+use std::convert::From; -+use libc::{c_long, timespec, timeval}; -+pub use libc::{time_t, suseconds_t}; -+ -+pub trait TimeValLike: Sized { -+ #[inline] -+ fn zero() -> Self { -+ Self::seconds(0) -+ } -+ -+ #[inline] -+ fn hours(hours: i64) -> Self { -+ let secs = hours.checked_mul(SECS_PER_HOUR) -+ .expect("TimeValLike::hours ouf of bounds"); -+ Self::seconds(secs) -+ } -+ -+ #[inline] -+ fn minutes(minutes: i64) -> Self { -+ let secs = minutes.checked_mul(SECS_PER_MINUTE) -+ .expect("TimeValLike::minutes out of bounds"); -+ Self::seconds(secs) -+ } -+ -+ fn seconds(seconds: i64) -> Self; -+ fn milliseconds(milliseconds: i64) -> Self; -+ fn microseconds(microseconds: i64) -> Self; -+ fn nanoseconds(nanoseconds: i64) -> Self; -+ -+ #[inline] -+ fn num_hours(&self) -> i64 { -+ self.num_seconds() / 3600 -+ } -+ -+ #[inline] -+ fn num_minutes(&self) -> i64 { -+ self.num_seconds() / 60 -+ } -+ -+ fn num_seconds(&self) -> i64; -+ fn num_milliseconds(&self) -> i64; -+ fn num_microseconds(&self) -> i64; -+ fn num_nanoseconds(&self) -> i64; -+} -+ -+#[repr(C)] -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct TimeSpec(timespec); -+ -+const NANOS_PER_SEC: i64 = 1_000_000_000; -+const SECS_PER_MINUTE: i64 = 60; -+const SECS_PER_HOUR: i64 = 3600; -+ -+#[cfg(target_pointer_width = "64")] -+const TS_MAX_SECONDS: i64 = (::std::i64::MAX / NANOS_PER_SEC) - 1; -+ -+#[cfg(target_pointer_width = "32")] -+const TS_MAX_SECONDS: i64 = ::std::isize::MAX as i64; -+ -+const TS_MIN_SECONDS: i64 = -TS_MAX_SECONDS; -+ -+ -+impl AsRef<timespec> for TimeSpec { -+ fn as_ref(&self) -> ×pec { -+ &self.0 -+ } -+} -+ -+impl Ord for TimeSpec { -+ // The implementation of cmp is simplified by assuming that the struct is -+ // normalized. That is, tv_nsec must always be within [0, 1_000_000_000) -+ fn cmp(&self, other: &TimeSpec) -> cmp::Ordering { -+ if self.tv_sec() == other.tv_sec() { -+ self.tv_nsec().cmp(&other.tv_nsec()) -+ } else { -+ self.tv_sec().cmp(&other.tv_sec()) -+ } -+ } -+} -+ -+impl PartialOrd for TimeSpec { -+ fn partial_cmp(&self, other: &TimeSpec) -> Option<cmp::Ordering> { -+ Some(self.cmp(other)) -+ } -+} -+ -+impl TimeValLike for TimeSpec { -+ #[inline] -+ fn seconds(seconds: i64) -> TimeSpec { -+ assert!(seconds >= TS_MIN_SECONDS && seconds <= TS_MAX_SECONDS, -+ "TimeSpec out of bounds; seconds={}", seconds); -+ TimeSpec(timespec {tv_sec: seconds as time_t, tv_nsec: 0 }) -+ } -+ -+ #[inline] -+ fn milliseconds(milliseconds: i64) -> TimeSpec { -+ let nanoseconds = milliseconds.checked_mul(1_000_000) -+ .expect("TimeSpec::milliseconds out of bounds"); -+ -+ TimeSpec::nanoseconds(nanoseconds) -+ } -+ -+ /// Makes a new `TimeSpec` with given number of microseconds. -+ #[inline] -+ fn microseconds(microseconds: i64) -> TimeSpec { -+ let nanoseconds = microseconds.checked_mul(1_000) -+ .expect("TimeSpec::milliseconds out of bounds"); -+ -+ TimeSpec::nanoseconds(nanoseconds) -+ } -+ -+ /// Makes a new `TimeSpec` with given number of nanoseconds. -+ #[inline] -+ fn nanoseconds(nanoseconds: i64) -> TimeSpec { -+ let (secs, nanos) = div_mod_floor_64(nanoseconds, NANOS_PER_SEC); -+ assert!(secs >= TS_MIN_SECONDS && secs <= TS_MAX_SECONDS, -+ "TimeSpec out of bounds"); -+ TimeSpec(timespec {tv_sec: secs as time_t, -+ tv_nsec: nanos as c_long }) -+ } -+ -+ fn num_seconds(&self) -> i64 { -+ if self.tv_sec() < 0 && self.tv_nsec() > 0 { -+ (self.tv_sec() + 1) as i64 -+ } else { -+ self.tv_sec() as i64 -+ } -+ } -+ -+ fn num_milliseconds(&self) -> i64 { -+ self.num_nanoseconds() / 1_000_000 -+ } -+ -+ fn num_microseconds(&self) -> i64 { -+ self.num_nanoseconds() / 1_000_000_000 -+ } -+ -+ fn num_nanoseconds(&self) -> i64 { -+ let secs = self.num_seconds() * 1_000_000_000; -+ let nsec = self.nanos_mod_sec(); -+ secs + nsec as i64 -+ } -+} -+ -+impl TimeSpec { -+ fn nanos_mod_sec(&self) -> c_long { -+ if self.tv_sec() < 0 && self.tv_nsec() > 0 { -+ self.tv_nsec() - NANOS_PER_SEC as c_long -+ } else { -+ self.tv_nsec() -+ } -+ } -+ -+ pub fn tv_sec(&self) -> time_t { -+ self.0.tv_sec -+ } -+ -+ pub fn tv_nsec(&self) -> c_long { -+ self.0.tv_nsec -+ } -+} -+ -+impl ops::Neg for TimeSpec { -+ type Output = TimeSpec; -+ -+ fn neg(self) -> TimeSpec { -+ TimeSpec::nanoseconds(-self.num_nanoseconds()) -+ } -+} -+ -+impl ops::Add for TimeSpec { -+ type Output = TimeSpec; -+ -+ fn add(self, rhs: TimeSpec) -> TimeSpec { -+ TimeSpec::nanoseconds( -+ self.num_nanoseconds() + rhs.num_nanoseconds()) -+ } -+} -+ -+impl ops::Sub for TimeSpec { -+ type Output = TimeSpec; -+ -+ fn sub(self, rhs: TimeSpec) -> TimeSpec { -+ TimeSpec::nanoseconds( -+ self.num_nanoseconds() - rhs.num_nanoseconds()) -+ } -+} -+ -+impl ops::Mul<i32> for TimeSpec { -+ type Output = TimeSpec; -+ -+ fn mul(self, rhs: i32) -> TimeSpec { -+ let usec = self.num_nanoseconds().checked_mul(rhs as i64) -+ .expect("TimeSpec multiply out of bounds"); -+ -+ TimeSpec::nanoseconds(usec) -+ } -+} -+ -+impl ops::Div<i32> for TimeSpec { -+ type Output = TimeSpec; -+ -+ fn div(self, rhs: i32) -> TimeSpec { -+ let usec = self.num_nanoseconds() / rhs as i64; -+ TimeSpec::nanoseconds(usec) -+ } -+} -+ -+impl fmt::Display for TimeSpec { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ let (abs, sign) = if self.tv_sec() < 0 { -+ (-*self, "-") -+ } else { -+ (*self, "") -+ }; -+ -+ let sec = abs.tv_sec(); -+ -+ write!(f, "{}", sign)?; -+ -+ if abs.tv_nsec() == 0 { -+ if abs.tv_sec() == 1 { -+ write!(f, "{} second", sec)?; -+ } else { -+ write!(f, "{} seconds", sec)?; -+ } -+ } else if abs.tv_nsec() % 1_000_000 == 0 { -+ write!(f, "{}.{:03} seconds", sec, abs.tv_nsec() / 1_000_000)?; -+ } else if abs.tv_nsec() % 1_000 == 0 { -+ write!(f, "{}.{:06} seconds", sec, abs.tv_nsec() / 1_000)?; -+ } else { -+ write!(f, "{}.{:09} seconds", sec, abs.tv_nsec())?; -+ } -+ -+ Ok(()) -+ } -+} -+ -+ -+ -+#[repr(C)] -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct TimeVal(timeval); -+ -+const MICROS_PER_SEC: i64 = 1_000_000; -+ -+#[cfg(target_pointer_width = "64")] -+const TV_MAX_SECONDS: i64 = (::std::i64::MAX / MICROS_PER_SEC) - 1; -+ -+#[cfg(target_pointer_width = "32")] -+const TV_MAX_SECONDS: i64 = ::std::isize::MAX as i64; -+ -+const TV_MIN_SECONDS: i64 = -TV_MAX_SECONDS; -+ -+impl AsRef<timeval> for TimeVal { -+ fn as_ref(&self) -> &timeval { -+ &self.0 -+ } -+} -+ -+impl Ord for TimeVal { -+ // The implementation of cmp is simplified by assuming that the struct is -+ // normalized. That is, tv_usec must always be within [0, 1_000_000) -+ fn cmp(&self, other: &TimeVal) -> cmp::Ordering { -+ if self.tv_sec() == other.tv_sec() { -+ self.tv_usec().cmp(&other.tv_usec()) -+ } else { -+ self.tv_sec().cmp(&other.tv_sec()) -+ } -+ } -+} -+ -+impl PartialOrd for TimeVal { -+ fn partial_cmp(&self, other: &TimeVal) -> Option<cmp::Ordering> { -+ Some(self.cmp(other)) -+ } -+} -+ -+impl TimeValLike for TimeVal { -+ #[inline] -+ fn seconds(seconds: i64) -> TimeVal { -+ assert!(seconds >= TV_MIN_SECONDS && seconds <= TV_MAX_SECONDS, -+ "TimeVal out of bounds; seconds={}", seconds); -+ TimeVal(timeval {tv_sec: seconds as time_t, tv_usec: 0 }) -+ } -+ -+ #[inline] -+ fn milliseconds(milliseconds: i64) -> TimeVal { -+ let microseconds = milliseconds.checked_mul(1_000) -+ .expect("TimeVal::milliseconds out of bounds"); -+ -+ TimeVal::microseconds(microseconds) -+ } -+ -+ /// Makes a new `TimeVal` with given number of microseconds. -+ #[inline] -+ fn microseconds(microseconds: i64) -> TimeVal { -+ let (secs, micros) = div_mod_floor_64(microseconds, MICROS_PER_SEC); -+ assert!(secs >= TV_MIN_SECONDS && secs <= TV_MAX_SECONDS, -+ "TimeVal out of bounds"); -+ TimeVal(timeval {tv_sec: secs as time_t, -+ tv_usec: micros as suseconds_t }) -+ } -+ -+ /// Makes a new `TimeVal` with given number of nanoseconds. Some precision -+ /// will be lost -+ #[inline] -+ fn nanoseconds(nanoseconds: i64) -> TimeVal { -+ let microseconds = nanoseconds / 1000; -+ let (secs, micros) = div_mod_floor_64(microseconds, MICROS_PER_SEC); -+ assert!(secs >= TV_MIN_SECONDS && secs <= TV_MAX_SECONDS, -+ "TimeVal out of bounds"); -+ TimeVal(timeval {tv_sec: secs as time_t, -+ tv_usec: micros as suseconds_t }) -+ } -+ -+ fn num_seconds(&self) -> i64 { -+ if self.tv_sec() < 0 && self.tv_usec() > 0 { -+ (self.tv_sec() + 1) as i64 -+ } else { -+ self.tv_sec() as i64 -+ } -+ } -+ -+ fn num_milliseconds(&self) -> i64 { -+ self.num_microseconds() / 1_000 -+ } -+ -+ fn num_microseconds(&self) -> i64 { -+ let secs = self.num_seconds() * 1_000_000; -+ let usec = self.micros_mod_sec(); -+ secs + usec as i64 -+ } -+ -+ fn num_nanoseconds(&self) -> i64 { -+ self.num_microseconds() * 1_000 -+ } -+} -+ -+impl TimeVal { -+ fn micros_mod_sec(&self) -> suseconds_t { -+ if self.tv_sec() < 0 && self.tv_usec() > 0 { -+ self.tv_usec() - MICROS_PER_SEC as suseconds_t -+ } else { -+ self.tv_usec() -+ } -+ } -+ -+ pub fn tv_sec(&self) -> time_t { -+ self.0.tv_sec -+ } -+ -+ pub fn tv_usec(&self) -> suseconds_t { -+ self.0.tv_usec -+ } -+} -+ -+impl ops::Neg for TimeVal { -+ type Output = TimeVal; -+ -+ fn neg(self) -> TimeVal { -+ TimeVal::microseconds(-self.num_microseconds()) -+ } -+} -+ -+impl ops::Add for TimeVal { -+ type Output = TimeVal; -+ -+ fn add(self, rhs: TimeVal) -> TimeVal { -+ TimeVal::microseconds( -+ self.num_microseconds() + rhs.num_microseconds()) -+ } -+} -+ -+impl ops::Sub for TimeVal { -+ type Output = TimeVal; -+ -+ fn sub(self, rhs: TimeVal) -> TimeVal { -+ TimeVal::microseconds( -+ self.num_microseconds() - rhs.num_microseconds()) -+ } -+} -+ -+impl ops::Mul<i32> for TimeVal { -+ type Output = TimeVal; -+ -+ fn mul(self, rhs: i32) -> TimeVal { -+ let usec = self.num_microseconds().checked_mul(rhs as i64) -+ .expect("TimeVal multiply out of bounds"); -+ -+ TimeVal::microseconds(usec) -+ } -+} -+ -+impl ops::Div<i32> for TimeVal { -+ type Output = TimeVal; -+ -+ fn div(self, rhs: i32) -> TimeVal { -+ let usec = self.num_microseconds() / rhs as i64; -+ TimeVal::microseconds(usec) -+ } -+} -+ -+impl fmt::Display for TimeVal { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ let (abs, sign) = if self.tv_sec() < 0 { -+ (-*self, "-") -+ } else { -+ (*self, "") -+ }; -+ -+ let sec = abs.tv_sec(); -+ -+ write!(f, "{}", sign)?; -+ -+ if abs.tv_usec() == 0 { -+ if abs.tv_sec() == 1 { -+ write!(f, "{} second", sec)?; -+ } else { -+ write!(f, "{} seconds", sec)?; -+ } -+ } else if abs.tv_usec() % 1000 == 0 { -+ write!(f, "{}.{:03} seconds", sec, abs.tv_usec() / 1000)?; -+ } else { -+ write!(f, "{}.{:06} seconds", sec, abs.tv_usec())?; -+ } -+ -+ Ok(()) -+ } -+} -+ -+impl From<timeval> for TimeVal { -+ fn from(tv: timeval) -> Self { -+ TimeVal(tv) -+ } -+} -+ -+#[inline] -+fn div_mod_floor_64(this: i64, other: i64) -> (i64, i64) { -+ (div_floor_64(this, other), mod_floor_64(this, other)) -+} -+ -+#[inline] -+fn div_floor_64(this: i64, other: i64) -> i64 { -+ match div_rem_64(this, other) { -+ (d, r) if (r > 0 && other < 0) -+ || (r < 0 && other > 0) => d - 1, -+ (d, _) => d, -+ } -+} -+ -+#[inline] -+fn mod_floor_64(this: i64, other: i64) -> i64 { -+ match this % other { -+ r if (r > 0 && other < 0) -+ || (r < 0 && other > 0) => r + other, -+ r => r, -+ } -+} -+ -+#[inline] -+fn div_rem_64(this: i64, other: i64) -> (i64, i64) { -+ (this / other, this % other) -+} -+ -+#[cfg(test)] -+mod test { -+ use super::{TimeSpec, TimeVal, TimeValLike}; -+ -+ #[test] -+ pub fn test_timespec() { -+ assert!(TimeSpec::seconds(1) != TimeSpec::zero()); -+ assert_eq!(TimeSpec::seconds(1) + TimeSpec::seconds(2), -+ TimeSpec::seconds(3)); -+ assert_eq!(TimeSpec::minutes(3) + TimeSpec::seconds(2), -+ TimeSpec::seconds(182)); -+ } -+ -+ #[test] -+ pub fn test_timespec_neg() { -+ let a = TimeSpec::seconds(1) + TimeSpec::nanoseconds(123); -+ let b = TimeSpec::seconds(-1) + TimeSpec::nanoseconds(-123); -+ -+ assert_eq!(a, -b); -+ } -+ -+ #[test] -+ pub fn test_timespec_ord() { -+ assert!(TimeSpec::seconds(1) == TimeSpec::nanoseconds(1_000_000_000)); -+ assert!(TimeSpec::seconds(1) < TimeSpec::nanoseconds(1_000_000_001)); -+ assert!(TimeSpec::seconds(1) > TimeSpec::nanoseconds(999_999_999)); -+ assert!(TimeSpec::seconds(-1) < TimeSpec::nanoseconds(-999_999_999)); -+ assert!(TimeSpec::seconds(-1) > TimeSpec::nanoseconds(-1_000_000_001)); -+ } -+ -+ #[test] -+ pub fn test_timespec_fmt() { -+ assert_eq!(TimeSpec::zero().to_string(), "0 seconds"); -+ assert_eq!(TimeSpec::seconds(42).to_string(), "42 seconds"); -+ assert_eq!(TimeSpec::milliseconds(42).to_string(), "0.042 seconds"); -+ assert_eq!(TimeSpec::microseconds(42).to_string(), "0.000042 seconds"); -+ assert_eq!(TimeSpec::nanoseconds(42).to_string(), "0.000000042 seconds"); -+ assert_eq!(TimeSpec::seconds(-86401).to_string(), "-86401 seconds"); -+ } -+ -+ #[test] -+ pub fn test_timeval() { -+ assert!(TimeVal::seconds(1) != TimeVal::zero()); -+ assert_eq!(TimeVal::seconds(1) + TimeVal::seconds(2), -+ TimeVal::seconds(3)); -+ assert_eq!(TimeVal::minutes(3) + TimeVal::seconds(2), -+ TimeVal::seconds(182)); -+ } -+ -+ #[test] -+ pub fn test_timeval_ord() { -+ assert!(TimeVal::seconds(1) == TimeVal::microseconds(1_000_000)); -+ assert!(TimeVal::seconds(1) < TimeVal::microseconds(1_000_001)); -+ assert!(TimeVal::seconds(1) > TimeVal::microseconds(999_999)); -+ assert!(TimeVal::seconds(-1) < TimeVal::microseconds(-999_999)); -+ assert!(TimeVal::seconds(-1) > TimeVal::microseconds(-1_000_001)); -+ } -+ -+ #[test] -+ pub fn test_timeval_neg() { -+ let a = TimeVal::seconds(1) + TimeVal::microseconds(123); -+ let b = TimeVal::seconds(-1) + TimeVal::microseconds(-123); -+ -+ assert_eq!(a, -b); -+ } -+ -+ #[test] -+ pub fn test_timeval_fmt() { -+ assert_eq!(TimeVal::zero().to_string(), "0 seconds"); -+ assert_eq!(TimeVal::seconds(42).to_string(), "42 seconds"); -+ assert_eq!(TimeVal::milliseconds(42).to_string(), "0.042 seconds"); -+ assert_eq!(TimeVal::microseconds(42).to_string(), "0.000042 seconds"); -+ assert_eq!(TimeVal::nanoseconds(1402).to_string(), "0.000001 seconds"); -+ assert_eq!(TimeVal::seconds(-86401).to_string(), "-86401 seconds"); -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/uio.rs b/third_party/rust/nix-0.15.0/src/sys/uio.rs -new file mode 100644 -index 0000000000000..d089084eed711 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/uio.rs -@@ -0,0 +1,194 @@ -+// Silence invalid warnings due to rust-lang/rust#16719 -+#![allow(improper_ctypes)] -+ -+use Result; -+use errno::Errno; -+use libc::{self, c_int, c_void, size_t, off_t}; -+use std::marker::PhantomData; -+use std::os::unix::io::RawFd; -+ -+pub fn writev(fd: RawFd, iov: &[IoVec<&[u8]>]) -> Result<usize> { -+ let res = unsafe { libc::writev(fd, iov.as_ptr() as *const libc::iovec, iov.len() as c_int) }; -+ -+ Errno::result(res).map(|r| r as usize) -+} -+ -+pub fn readv(fd: RawFd, iov: &mut [IoVec<&mut [u8]>]) -> Result<usize> { -+ let res = unsafe { libc::readv(fd, iov.as_ptr() as *const libc::iovec, iov.len() as c_int) }; -+ -+ Errno::result(res).map(|r| r as usize) -+} -+ -+/// Write to `fd` at `offset` from buffers in `iov`. -+/// -+/// Buffers in `iov` will be written in order until all buffers have been written -+/// or an error occurs. The file offset is not changed. -+/// -+/// See also: [`writev`](fn.writev.html) and [`pwrite`](fn.pwrite.html) -+#[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+pub fn pwritev(fd: RawFd, iov: &[IoVec<&[u8]>], -+ offset: off_t) -> Result<usize> { -+ let res = unsafe { -+ libc::pwritev(fd, iov.as_ptr() as *const libc::iovec, iov.len() as c_int, offset) -+ }; -+ -+ Errno::result(res).map(|r| r as usize) -+} -+ -+/// Read from `fd` at `offset` filling buffers in `iov`. -+/// -+/// Buffers in `iov` will be filled in order until all buffers have been filled, -+/// no more bytes are available, or an error occurs. The file offset is not -+/// changed. -+/// -+/// See also: [`readv`](fn.readv.html) and [`pread`](fn.pread.html) -+#[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+pub fn preadv(fd: RawFd, iov: &[IoVec<&mut [u8]>], -+ offset: off_t) -> Result<usize> { -+ let res = unsafe { -+ libc::preadv(fd, iov.as_ptr() as *const libc::iovec, iov.len() as c_int, offset) -+ }; -+ -+ Errno::result(res).map(|r| r as usize) -+} -+ -+pub fn pwrite(fd: RawFd, buf: &[u8], offset: off_t) -> Result<usize> { -+ let res = unsafe { -+ libc::pwrite(fd, buf.as_ptr() as *const c_void, buf.len() as size_t, -+ offset) -+ }; -+ -+ Errno::result(res).map(|r| r as usize) -+} -+ -+pub fn pread(fd: RawFd, buf: &mut [u8], offset: off_t) -> Result<usize>{ -+ let res = unsafe { -+ libc::pread(fd, buf.as_mut_ptr() as *mut c_void, buf.len() as size_t, -+ offset) -+ }; -+ -+ Errno::result(res).map(|r| r as usize) -+} -+ -+/// A slice of memory in a remote process, starting at address `base` -+/// and consisting of `len` bytes. -+/// -+/// This is the same underlying C structure as [`IoVec`](struct.IoVec.html), -+/// except that it refers to memory in some other process, and is -+/// therefore not represented in Rust by an actual slice as `IoVec` is. It -+/// is used with [`process_vm_readv`](fn.process_vm_readv.html) -+/// and [`process_vm_writev`](fn.process_vm_writev.html). -+#[cfg(target_os = "linux")] -+#[repr(C)] -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct RemoteIoVec { -+ /// The starting address of this slice (`iov_base`). -+ pub base: usize, -+ /// The number of bytes in this slice (`iov_len`). -+ pub len: usize, -+} -+ -+/// Write data directly to another process's virtual memory -+/// (see [`process_vm_writev`(2)]). -+/// -+/// `local_iov` is a list of [`IoVec`]s containing the data to be written, -+/// and `remote_iov` is a list of [`RemoteIoVec`]s identifying where the -+/// data should be written in the target process. On success, returns the -+/// number of bytes written, which will always be a whole -+/// number of `remote_iov` chunks. -+/// -+/// This requires the same permissions as debugging the process using -+/// [ptrace]: you must either be a privileged process (with -+/// `CAP_SYS_PTRACE`), or you must be running as the same user as the -+/// target process and the OS must have unprivileged debugging enabled. -+/// -+/// This function is only available on Linux. -+/// -+/// [`process_vm_writev`(2)]: http://man7.org/linux/man-pages/man2/process_vm_writev.2.html -+/// [ptrace]: ../ptrace/index.html -+/// [`IoVec`]: struct.IoVec.html -+/// [`RemoteIoVec`]: struct.RemoteIoVec.html -+#[cfg(target_os = "linux")] -+pub fn process_vm_writev(pid: ::unistd::Pid, local_iov: &[IoVec<&[u8]>], remote_iov: &[RemoteIoVec]) -> Result<usize> { -+ let res = unsafe { -+ libc::process_vm_writev(pid.into(), -+ local_iov.as_ptr() as *const libc::iovec, local_iov.len() as libc::c_ulong, -+ remote_iov.as_ptr() as *const libc::iovec, remote_iov.len() as libc::c_ulong, 0) -+ }; -+ -+ Errno::result(res).map(|r| r as usize) -+} -+ -+/// Read data directly from another process's virtual memory -+/// (see [`process_vm_readv`(2)]). -+/// -+/// `local_iov` is a list of [`IoVec`]s containing the buffer to copy -+/// data into, and `remote_iov` is a list of [`RemoteIoVec`]s identifying -+/// where the source data is in the target process. On success, -+/// returns the number of bytes written, which will always be a whole -+/// number of `remote_iov` chunks. -+/// -+/// This requires the same permissions as debugging the process using -+/// [`ptrace`]: you must either be a privileged process (with -+/// `CAP_SYS_PTRACE`), or you must be running as the same user as the -+/// target process and the OS must have unprivileged debugging enabled. -+/// -+/// This function is only available on Linux. -+/// -+/// [`process_vm_readv`(2)]: http://man7.org/linux/man-pages/man2/process_vm_readv.2.html -+/// [`ptrace`]: ../ptrace/index.html -+/// [`IoVec`]: struct.IoVec.html -+/// [`RemoteIoVec`]: struct.RemoteIoVec.html -+#[cfg(any(target_os = "linux"))] -+pub fn process_vm_readv(pid: ::unistd::Pid, local_iov: &[IoVec<&mut [u8]>], remote_iov: &[RemoteIoVec]) -> Result<usize> { -+ let res = unsafe { -+ libc::process_vm_readv(pid.into(), -+ local_iov.as_ptr() as *const libc::iovec, local_iov.len() as libc::c_ulong, -+ remote_iov.as_ptr() as *const libc::iovec, remote_iov.len() as libc::c_ulong, 0) -+ }; -+ -+ Errno::result(res).map(|r| r as usize) -+} -+ -+#[repr(C)] -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct IoVec<T>(libc::iovec, PhantomData<T>); -+ -+impl<T> IoVec<T> { -+ #[inline] -+ pub fn as_slice(&self) -> &[u8] { -+ use std::slice; -+ -+ unsafe { -+ slice::from_raw_parts( -+ self.0.iov_base as *const u8, -+ self.0.iov_len as usize) -+ } -+ } -+} -+ -+impl<'a> IoVec<&'a [u8]> { -+ pub fn from_slice(buf: &'a [u8]) -> IoVec<&'a [u8]> { -+ IoVec(libc::iovec { -+ iov_base: buf.as_ptr() as *mut c_void, -+ iov_len: buf.len() as size_t, -+ }, PhantomData) -+ } -+} -+ -+impl<'a> IoVec<&'a mut [u8]> { -+ pub fn from_mut_slice(buf: &'a mut [u8]) -> IoVec<&'a mut [u8]> { -+ IoVec(libc::iovec { -+ iov_base: buf.as_ptr() as *mut c_void, -+ iov_len: buf.len() as size_t, -+ }, PhantomData) -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/utsname.rs b/third_party/rust/nix-0.15.0/src/sys/utsname.rs -new file mode 100644 -index 0000000000000..ab09c7d23232a ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/utsname.rs -@@ -0,0 +1,67 @@ -+use std::mem; -+use libc::{self, c_char}; -+use std::ffi::CStr; -+use std::str::from_utf8_unchecked; -+ -+#[repr(C)] -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct UtsName(libc::utsname); -+ -+impl UtsName { -+ pub fn sysname(&self) -> &str { -+ to_str(&(&self.0.sysname as *const c_char ) as *const *const c_char) -+ } -+ -+ pub fn nodename(&self) -> &str { -+ to_str(&(&self.0.nodename as *const c_char ) as *const *const c_char) -+ } -+ -+ pub fn release(&self) -> &str { -+ to_str(&(&self.0.release as *const c_char ) as *const *const c_char) -+ } -+ -+ pub fn version(&self) -> &str { -+ to_str(&(&self.0.version as *const c_char ) as *const *const c_char) -+ } -+ -+ pub fn machine(&self) -> &str { -+ to_str(&(&self.0.machine as *const c_char ) as *const *const c_char) -+ } -+} -+ -+pub fn uname() -> UtsName { -+ unsafe { -+ let mut ret: UtsName = mem::uninitialized(); -+ libc::uname(&mut ret.0); -+ ret -+ } -+} -+ -+#[inline] -+fn to_str<'a>(s: *const *const c_char) -> &'a str { -+ unsafe { -+ let res = CStr::from_ptr(*s).to_bytes(); -+ from_utf8_unchecked(res) -+ } -+} -+ -+#[cfg(test)] -+mod test { -+ #[cfg(target_os = "linux")] -+ #[test] -+ pub fn test_uname_linux() { -+ assert_eq!(super::uname().sysname(), "Linux"); -+ } -+ -+ #[cfg(any(target_os = "macos", target_os = "ios"))] -+ #[test] -+ pub fn test_uname_darwin() { -+ assert_eq!(super::uname().sysname(), "Darwin"); -+ } -+ -+ #[cfg(target_os = "freebsd")] -+ #[test] -+ pub fn test_uname_freebsd() { -+ assert_eq!(super::uname().sysname(), "FreeBSD"); -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/sys/wait.rs b/third_party/rust/nix-0.15.0/src/sys/wait.rs -new file mode 100644 -index 0000000000000..c54f7ec579667 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/sys/wait.rs -@@ -0,0 +1,239 @@ -+use libc::{self, c_int}; -+use Result; -+use errno::Errno; -+use unistd::Pid; -+ -+use sys::signal::Signal; -+ -+libc_bitflags!( -+ pub struct WaitPidFlag: c_int { -+ WNOHANG; -+ WUNTRACED; -+ #[cfg(any(target_os = "android", -+ target_os = "freebsd", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd"))] -+ WEXITED; -+ WCONTINUED; -+ #[cfg(any(target_os = "android", -+ target_os = "freebsd", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd"))] -+ WSTOPPED; -+ /// Don't reap, just poll status. -+ #[cfg(any(target_os = "android", -+ target_os = "freebsd", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd"))] -+ WNOWAIT; -+ /// Don't wait on children of other threads in this group -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ __WNOTHREAD; -+ /// Wait on all children, regardless of type -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ __WALL; -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ __WCLONE; -+ } -+); -+ -+/// Possible return values from `wait()` or `waitpid()`. -+/// -+/// Each status (other than `StillAlive`) describes a state transition -+/// in a child process `Pid`, such as the process exiting or stopping, -+/// plus additional data about the transition if any. -+/// -+/// Note that there are two Linux-specific enum variants, `PtraceEvent` -+/// and `PtraceSyscall`. Portable code should avoid exhaustively -+/// matching on `WaitStatus`. -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub enum WaitStatus { -+ /// The process exited normally (as with `exit()` or returning from -+ /// `main`) with the given exit code. This case matches the C macro -+ /// `WIFEXITED(status)`; the second field is `WEXITSTATUS(status)`. -+ Exited(Pid, i32), -+ /// The process was killed by the given signal. The third field -+ /// indicates whether the signal generated a core dump. This case -+ /// matches the C macro `WIFSIGNALED(status)`; the last two fields -+ /// correspond to `WTERMSIG(status)` and `WCOREDUMP(status)`. -+ Signaled(Pid, Signal, bool), -+ /// The process is alive, but was stopped by the given signal. This -+ /// is only reported if `WaitPidFlag::WUNTRACED` was passed. This -+ /// case matches the C macro `WIFSTOPPED(status)`; the second field -+ /// is `WSTOPSIG(status)`. -+ Stopped(Pid, Signal), -+ /// The traced process was stopped by a `PTRACE_EVENT_*` event. See -+ /// [`nix::sys::ptrace`] and [`ptrace`(2)] for more information. All -+ /// currently-defined events use `SIGTRAP` as the signal; the third -+ /// field is the `PTRACE_EVENT_*` value of the event. -+ /// -+ /// [`nix::sys::ptrace`]: ../ptrace/index.html -+ /// [`ptrace`(2)]: http://man7.org/linux/man-pages/man2/ptrace.2.html -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ PtraceEvent(Pid, Signal, c_int), -+ /// The traced process was stopped by execution of a system call, -+ /// and `PTRACE_O_TRACESYSGOOD` is in effect. See [`ptrace`(2)] for -+ /// more information. -+ /// -+ /// [`ptrace`(2)]: http://man7.org/linux/man-pages/man2/ptrace.2.html -+ #[cfg(any(target_os = "linux", target_os = "android"))] -+ PtraceSyscall(Pid), -+ /// The process was previously stopped but has resumed execution -+ /// after receiving a `SIGCONT` signal. This is only reported if -+ /// `WaitPidFlag::WCONTINUED` was passed. This case matches the C -+ /// macro `WIFCONTINUED(status)`. -+ Continued(Pid), -+ /// There are currently no state changes to report in any awaited -+ /// child process. This is only returned if `WaitPidFlag::WNOHANG` -+ /// was used (otherwise `wait()` or `waitpid()` would block until -+ /// there was something to report). -+ StillAlive, -+} -+ -+impl WaitStatus { -+ /// Extracts the PID from the WaitStatus unless it equals StillAlive. -+ pub fn pid(&self) -> Option<Pid> { -+ use self::WaitStatus::*; -+ match *self { -+ Exited(p, _) | Signaled(p, _, _) | -+ Stopped(p, _) | Continued(p) => Some(p), -+ StillAlive => None, -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ PtraceEvent(p, _, _) | PtraceSyscall(p) => Some(p), -+ } -+ } -+} -+ -+fn exited(status: i32) -> bool { -+ unsafe { libc::WIFEXITED(status) } -+} -+ -+fn exit_status(status: i32) -> i32 { -+ unsafe { libc::WEXITSTATUS(status) } -+} -+ -+fn signaled(status: i32) -> bool { -+ unsafe { libc::WIFSIGNALED(status) } -+} -+ -+fn term_signal(status: i32) -> Result<Signal> { -+ Signal::from_c_int(unsafe { libc::WTERMSIG(status) }) -+} -+ -+fn dumped_core(status: i32) -> bool { -+ unsafe { libc::WCOREDUMP(status) } -+} -+ -+fn stopped(status: i32) -> bool { -+ unsafe { libc::WIFSTOPPED(status) } -+} -+ -+fn stop_signal(status: i32) -> Result<Signal> { -+ Signal::from_c_int(unsafe { libc::WSTOPSIG(status) }) -+} -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+fn syscall_stop(status: i32) -> bool { -+ // From ptrace(2), setting PTRACE_O_TRACESYSGOOD has the effect -+ // of delivering SIGTRAP | 0x80 as the signal number for syscall -+ // stops. This allows easily distinguishing syscall stops from -+ // genuine SIGTRAP signals. -+ unsafe { libc::WSTOPSIG(status) == libc::SIGTRAP | 0x80 } -+} -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+fn stop_additional(status: i32) -> c_int { -+ (status >> 16) as c_int -+} -+ -+fn continued(status: i32) -> bool { -+ unsafe { libc::WIFCONTINUED(status) } -+} -+ -+impl WaitStatus { -+ /// Convert a raw `wstatus` as returned by `waitpid`/`wait` into a `WaitStatus` -+ /// -+ /// # Errors -+ /// -+ /// Returns an `Error` corresponding to `EINVAL` for invalid status values. -+ /// -+ /// # Examples -+ /// -+ /// Convert a `wstatus` obtained from `libc::waitpid` into a `WaitStatus`: -+ /// -+ /// ``` -+ /// use nix::sys::wait::WaitStatus; -+ /// use nix::sys::signal::Signal; -+ /// let pid = nix::unistd::Pid::from_raw(1); -+ /// let status = WaitStatus::from_raw(pid, 0x0002); -+ /// assert_eq!(status, Ok(WaitStatus::Signaled(pid, Signal::SIGINT, false))); -+ /// ``` -+ pub fn from_raw(pid: Pid, status: i32) -> Result<WaitStatus> { -+ Ok(if exited(status) { -+ WaitStatus::Exited(pid, exit_status(status)) -+ } else if signaled(status) { -+ WaitStatus::Signaled(pid, term_signal(status)?, dumped_core(status)) -+ } else if stopped(status) { -+ cfg_if! { -+ if #[cfg(any(target_os = "android", target_os = "linux"))] { -+ fn decode_stopped(pid: Pid, status: i32) -> Result<WaitStatus> { -+ let status_additional = stop_additional(status); -+ Ok(if syscall_stop(status) { -+ WaitStatus::PtraceSyscall(pid) -+ } else if status_additional == 0 { -+ WaitStatus::Stopped(pid, stop_signal(status)?) -+ } else { -+ WaitStatus::PtraceEvent(pid, stop_signal(status)?, -+ stop_additional(status)) -+ }) -+ } -+ } else { -+ fn decode_stopped(pid: Pid, status: i32) -> Result<WaitStatus> { -+ Ok(WaitStatus::Stopped(pid, stop_signal(status)?)) -+ } -+ } -+ } -+ return decode_stopped(pid, status); -+ } else { -+ assert!(continued(status)); -+ WaitStatus::Continued(pid) -+ }) -+ } -+} -+ -+pub fn waitpid<P: Into<Option<Pid>>>(pid: P, options: Option<WaitPidFlag>) -> Result<WaitStatus> { -+ use self::WaitStatus::*; -+ -+ let mut status: i32 = 0; -+ -+ let option_bits = match options { -+ Some(bits) => bits.bits(), -+ None => 0, -+ }; -+ -+ let res = unsafe { -+ libc::waitpid( -+ pid.into().unwrap_or(Pid::from_raw(-1)).into(), -+ &mut status as *mut c_int, -+ option_bits, -+ ) -+ }; -+ -+ match Errno::result(res)? { -+ 0 => Ok(StillAlive), -+ res => WaitStatus::from_raw(Pid::from_raw(res), status), -+ } -+} -+ -+pub fn wait() -> Result<WaitStatus> { -+ waitpid(None, None) -+} -diff --git a/third_party/rust/nix-0.15.0/src/ucontext.rs b/third_party/rust/nix-0.15.0/src/ucontext.rs -new file mode 100644 -index 0000000000000..5e10e7d1f8934 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/ucontext.rs -@@ -0,0 +1,39 @@ -+use libc; -+#[cfg(not(target_env = "musl"))] -+use Result; -+#[cfg(not(target_env = "musl"))] -+use errno::Errno; -+use std::mem; -+use sys::signal::SigSet; -+ -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+pub struct UContext { -+ context: libc::ucontext_t, -+} -+ -+impl UContext { -+ #[cfg(not(target_env = "musl"))] -+ pub fn get() -> Result<UContext> { -+ let mut context: libc::ucontext_t = unsafe { mem::uninitialized() }; -+ let res = unsafe { -+ libc::getcontext(&mut context as *mut libc::ucontext_t) -+ }; -+ Errno::result(res).map(|_| UContext { context: context }) -+ } -+ -+ #[cfg(not(target_env = "musl"))] -+ pub fn set(&self) -> Result<()> { -+ let res = unsafe { -+ libc::setcontext(&self.context as *const libc::ucontext_t) -+ }; -+ Errno::result(res).map(drop) -+ } -+ -+ pub fn sigmask_mut(&mut self) -> &mut SigSet { -+ unsafe { mem::transmute(&mut self.context.uc_sigmask) } -+ } -+ -+ pub fn sigmask(&self) -> &SigSet { -+ unsafe { mem::transmute(&self.context.uc_sigmask) } -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/src/unistd.rs b/third_party/rust/nix-0.15.0/src/unistd.rs -new file mode 100644 -index 0000000000000..f422f09198655 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/src/unistd.rs -@@ -0,0 +1,2394 @@ -+//! Safe wrappers around functions found in libc "unistd.h" header -+ -+use errno::{self, Errno}; -+use {Error, Result, NixPath}; -+use fcntl::{AtFlags, at_rawfd, fcntl, FdFlag, OFlag}; -+use fcntl::FcntlArg::F_SETFD; -+use libc::{self, c_char, c_void, c_int, c_long, c_uint, size_t, pid_t, off_t, -+ uid_t, gid_t, mode_t}; -+use std::{fmt, mem, ptr}; -+use std::ffi::{CString, CStr, OsString, OsStr}; -+use std::os::unix::ffi::{OsStringExt, OsStrExt}; -+use std::os::unix::io::RawFd; -+use std::path::PathBuf; -+use void::Void; -+use sys::stat::Mode; -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+pub use self::pivot_root::*; -+ -+#[cfg(any(target_os = "android", target_os = "freebsd", -+ target_os = "linux", target_os = "openbsd"))] -+pub use self::setres::*; -+ -+/// User identifier -+/// -+/// Newtype pattern around `uid_t` (which is just alias). It prevents bugs caused by accidentally -+/// passing wrong value. -+#[derive(Debug, Copy, Clone, Eq, PartialEq, Hash)] -+pub struct Uid(uid_t); -+ -+impl Uid { -+ /// Creates `Uid` from raw `uid_t`. -+ pub fn from_raw(uid: uid_t) -> Self { -+ Uid(uid) -+ } -+ -+ /// Returns Uid of calling process. This is practically a more Rusty alias for `getuid`. -+ pub fn current() -> Self { -+ getuid() -+ } -+ -+ /// Returns effective Uid of calling process. This is practically a more Rusty alias for `geteuid`. -+ pub fn effective() -> Self { -+ geteuid() -+ } -+ -+ /// Returns true if the `Uid` represents privileged user - root. (If it equals zero.) -+ pub fn is_root(&self) -> bool { -+ *self == ROOT -+ } -+ -+ /// Get the raw `uid_t` wrapped by `self`. -+ pub fn as_raw(&self) -> uid_t { -+ self.0 -+ } -+} -+ -+impl From<Uid> for uid_t { -+ fn from(uid: Uid) -> Self { -+ uid.0 -+ } -+} -+ -+impl fmt::Display for Uid { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ fmt::Display::fmt(&self.0, f) -+ } -+} -+ -+/// Constant for UID = 0 -+pub const ROOT: Uid = Uid(0); -+ -+/// Group identifier -+/// -+/// Newtype pattern around `gid_t` (which is just alias). It prevents bugs caused by accidentally -+/// passing wrong value. -+#[derive(Debug, Copy, Clone, Eq, PartialEq, Hash)] -+pub struct Gid(gid_t); -+ -+impl Gid { -+ /// Creates `Gid` from raw `gid_t`. -+ pub fn from_raw(gid: gid_t) -> Self { -+ Gid(gid) -+ } -+ -+ /// Returns Gid of calling process. This is practically a more Rusty alias for `getgid`. -+ pub fn current() -> Self { -+ getgid() -+ } -+ -+ /// Returns effective Gid of calling process. This is practically a more Rusty alias for `getgid`. -+ pub fn effective() -> Self { -+ getegid() -+ } -+ -+ /// Get the raw `gid_t` wrapped by `self`. -+ pub fn as_raw(&self) -> gid_t { -+ self.0 -+ } -+} -+ -+impl From<Gid> for gid_t { -+ fn from(gid: Gid) -> Self { -+ gid.0 -+ } -+} -+ -+impl fmt::Display for Gid { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ fmt::Display::fmt(&self.0, f) -+ } -+} -+ -+/// Process identifier -+/// -+/// Newtype pattern around `pid_t` (which is just alias). It prevents bugs caused by accidentally -+/// passing wrong value. -+#[derive(Debug, Copy, Clone, Eq, PartialEq, Hash)] -+pub struct Pid(pid_t); -+ -+impl Pid { -+ /// Creates `Pid` from raw `pid_t`. -+ pub fn from_raw(pid: pid_t) -> Self { -+ Pid(pid) -+ } -+ -+ /// Returns PID of calling process -+ pub fn this() -> Self { -+ getpid() -+ } -+ -+ /// Returns PID of parent of calling process -+ pub fn parent() -> Self { -+ getppid() -+ } -+ -+ /// Get the raw `pid_t` wrapped by `self`. -+ pub fn as_raw(&self) -> pid_t { -+ self.0 -+ } -+} -+ -+impl From<Pid> for pid_t { -+ fn from(pid: Pid) -> Self { -+ pid.0 -+ } -+} -+ -+impl fmt::Display for Pid { -+ fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -+ fmt::Display::fmt(&self.0, f) -+ } -+} -+ -+ -+/// Represents the successful result of calling `fork` -+/// -+/// When `fork` is called, the process continues execution in the parent process -+/// and in the new child. This return type can be examined to determine whether -+/// you are now executing in the parent process or in the child. -+#[derive(Clone, Copy, Debug)] -+pub enum ForkResult { -+ Parent { child: Pid }, -+ Child, -+} -+ -+impl ForkResult { -+ -+ /// Return `true` if this is the child process of the `fork()` -+ #[inline] -+ pub fn is_child(&self) -> bool { -+ match *self { -+ ForkResult::Child => true, -+ _ => false -+ } -+ } -+ -+ /// Returns `true` if this is the parent process of the `fork()` -+ #[inline] -+ pub fn is_parent(&self) -> bool { -+ !self.is_child() -+ } -+} -+ -+/// Create a new child process duplicating the parent process ([see -+/// fork(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/fork.html)). -+/// -+/// After calling the fork system call (successfully) two processes will -+/// be created that are identical with the exception of their pid and the -+/// return value of this function. As an example: -+/// -+/// ```no_run -+/// use nix::unistd::{fork, ForkResult}; -+/// -+/// match fork() { -+/// Ok(ForkResult::Parent { child, .. }) => { -+/// println!("Continuing execution in parent process, new child has pid: {}", child); -+/// } -+/// Ok(ForkResult::Child) => println!("I'm a new child process"), -+/// Err(_) => println!("Fork failed"), -+/// } -+/// ``` -+/// -+/// This will print something like the following (order indeterministic). The -+/// thing to note is that you end up with two processes continuing execution -+/// immediately after the fork call but with different match arms. -+/// -+/// ```text -+/// Continuing execution in parent process, new child has pid: 1234 -+/// I'm a new child process -+/// ``` -+/// -+/// # Safety -+/// -+/// In a multithreaded program, only [async-signal-safe] functions like `pause` -+/// and `_exit` may be called by the child (the parent isn't restricted). Note -+/// that memory allocation may **not** be async-signal-safe and thus must be -+/// prevented. -+/// -+/// Those functions are only a small subset of your operating system's API, so -+/// special care must be taken to only invoke code you can control and audit. -+/// -+/// [async-signal-safe]: http://man7.org/linux/man-pages/man7/signal-safety.7.html -+#[inline] -+pub fn fork() -> Result<ForkResult> { -+ use self::ForkResult::*; -+ let res = unsafe { libc::fork() }; -+ -+ Errno::result(res).map(|res| match res { -+ 0 => Child, -+ res => Parent { child: Pid(res) }, -+ }) -+} -+ -+/// Get the pid of this process (see -+/// [getpid(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getpid.html)). -+/// -+/// Since you are running code, there is always a pid to return, so there -+/// is no error case that needs to be handled. -+#[inline] -+pub fn getpid() -> Pid { -+ Pid(unsafe { libc::getpid() }) -+} -+ -+/// Get the pid of this processes' parent (see -+/// [getpid(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getppid.html)). -+/// -+/// There is always a parent pid to return, so there is no error case that needs -+/// to be handled. -+#[inline] -+pub fn getppid() -> Pid { -+ Pid(unsafe { libc::getppid() }) // no error handling, according to man page: "These functions are always successful." -+} -+ -+/// Set a process group ID (see -+/// [setpgid(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/setpgid.html)). -+/// -+/// Set the process group id (PGID) of a particular process. If a pid of zero -+/// is specified, then the pid of the calling process is used. Process groups -+/// may be used to group together a set of processes in order for the OS to -+/// apply some operations across the group. -+/// -+/// `setsid()` may be used to create a new process group. -+#[inline] -+pub fn setpgid(pid: Pid, pgid: Pid) -> Result<()> { -+ let res = unsafe { libc::setpgid(pid.into(), pgid.into()) }; -+ Errno::result(res).map(drop) -+} -+#[inline] -+pub fn getpgid(pid: Option<Pid>) -> Result<Pid> { -+ let res = unsafe { libc::getpgid(pid.unwrap_or(Pid(0)).into()) }; -+ Errno::result(res).map(Pid) -+} -+ -+/// Create new session and set process group id (see -+/// [setsid(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/setsid.html)). -+#[inline] -+pub fn setsid() -> Result<Pid> { -+ Errno::result(unsafe { libc::setsid() }).map(Pid) -+} -+ -+/// Get the process group ID of a session leader -+/// [getsid(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getsid.html). -+/// -+/// Obtain the process group ID of the process that is the session leader of the process specified -+/// by pid. If pid is zero, it specifies the calling process. -+#[inline] -+pub fn getsid(pid: Option<Pid>) -> Result<Pid> { -+ let res = unsafe { libc::getsid(pid.unwrap_or(Pid(0)).into()) }; -+ Errno::result(res).map(Pid) -+} -+ -+ -+/// Get the terminal foreground process group (see -+/// [tcgetpgrp(3)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/tcgetpgrp.html)). -+/// -+/// Get the group process id (GPID) of the foreground process group on the -+/// terminal associated to file descriptor (FD). -+#[inline] -+pub fn tcgetpgrp(fd: c_int) -> Result<Pid> { -+ let res = unsafe { libc::tcgetpgrp(fd) }; -+ Errno::result(res).map(Pid) -+} -+/// Set the terminal foreground process group (see -+/// [tcgetpgrp(3)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/tcsetpgrp.html)). -+/// -+/// Get the group process id (PGID) to the foreground process group on the -+/// terminal associated to file descriptor (FD). -+#[inline] -+pub fn tcsetpgrp(fd: c_int, pgrp: Pid) -> Result<()> { -+ let res = unsafe { libc::tcsetpgrp(fd, pgrp.into()) }; -+ Errno::result(res).map(drop) -+} -+ -+ -+/// Get the group id of the calling process (see -+///[getpgrp(3)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getpgrp.html)). -+/// -+/// Get the process group id (PGID) of the calling process. -+/// According to the man page it is always successful. -+#[inline] -+pub fn getpgrp() -> Pid { -+ Pid(unsafe { libc::getpgrp() }) -+} -+ -+/// Get the caller's thread ID (see -+/// [gettid(2)](http://man7.org/linux/man-pages/man2/gettid.2.html). -+/// -+/// This function is only available on Linux based systems. In a single -+/// threaded process, the main thread will have the same ID as the process. In -+/// a multithreaded process, each thread will have a unique thread id but the -+/// same process ID. -+/// -+/// No error handling is required as a thread id should always exist for any -+/// process, even if threads are not being used. -+#[cfg(any(target_os = "linux", target_os = "android"))] -+#[inline] -+pub fn gettid() -> Pid { -+ Pid(unsafe { libc::syscall(libc::SYS_gettid) as pid_t }) -+} -+ -+/// Create a copy of the specified file descriptor (see -+/// [dup(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/dup.html)). -+/// -+/// The new file descriptor will be have a new index but refer to the same -+/// resource as the old file descriptor and the old and new file descriptors may -+/// be used interchangeably. The new and old file descriptor share the same -+/// underlying resource, offset, and file status flags. The actual index used -+/// for the file descriptor will be the lowest fd index that is available. -+/// -+/// The two file descriptors do not share file descriptor flags (e.g. `OFlag::FD_CLOEXEC`). -+#[inline] -+pub fn dup(oldfd: RawFd) -> Result<RawFd> { -+ let res = unsafe { libc::dup(oldfd) }; -+ -+ Errno::result(res) -+} -+ -+/// Create a copy of the specified file descriptor using the specified fd (see -+/// [dup(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/dup.html)). -+/// -+/// This function behaves similar to `dup()` except that it will try to use the -+/// specified fd instead of allocating a new one. See the man pages for more -+/// detail on the exact behavior of this function. -+#[inline] -+pub fn dup2(oldfd: RawFd, newfd: RawFd) -> Result<RawFd> { -+ let res = unsafe { libc::dup2(oldfd, newfd) }; -+ -+ Errno::result(res) -+} -+ -+/// Create a new copy of the specified file descriptor using the specified fd -+/// and flags (see [dup(2)](http://man7.org/linux/man-pages/man2/dup.2.html)). -+/// -+/// This function behaves similar to `dup2()` but allows for flags to be -+/// specified. -+pub fn dup3(oldfd: RawFd, newfd: RawFd, flags: OFlag) -> Result<RawFd> { -+ dup3_polyfill(oldfd, newfd, flags) -+} -+ -+#[inline] -+fn dup3_polyfill(oldfd: RawFd, newfd: RawFd, flags: OFlag) -> Result<RawFd> { -+ if oldfd == newfd { -+ return Err(Error::Sys(Errno::EINVAL)); -+ } -+ -+ let fd = dup2(oldfd, newfd)?; -+ -+ if flags.contains(OFlag::O_CLOEXEC) { -+ if let Err(e) = fcntl(fd, F_SETFD(FdFlag::FD_CLOEXEC)) { -+ let _ = close(fd); -+ return Err(e); -+ } -+ } -+ -+ Ok(fd) -+} -+ -+/// Change the current working directory of the calling process (see -+/// [chdir(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/chdir.html)). -+/// -+/// This function may fail in a number of different scenarios. See the man -+/// pages for additional details on possible failure cases. -+#[inline] -+pub fn chdir<P: ?Sized + NixPath>(path: &P) -> Result<()> { -+ let res = path.with_nix_path(|cstr| { -+ unsafe { libc::chdir(cstr.as_ptr()) } -+ })?; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Change the current working directory of the process to the one -+/// given as an open file descriptor (see -+/// [fchdir(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/fchdir.html)). -+/// -+/// This function may fail in a number of different scenarios. See the man -+/// pages for additional details on possible failure cases. -+#[inline] -+pub fn fchdir(dirfd: RawFd) -> Result<()> { -+ let res = unsafe { libc::fchdir(dirfd) }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Creates new directory `path` with access rights `mode`. (see [mkdir(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/mkdir.html)) -+/// -+/// # Errors -+/// -+/// There are several situations where mkdir might fail: -+/// -+/// - current user has insufficient rights in the parent directory -+/// - the path already exists -+/// - the path name is too long (longer than `PATH_MAX`, usually 4096 on linux, 1024 on OS X) -+/// -+/// # Example -+/// -+/// ```rust -+/// extern crate tempfile; -+/// extern crate nix; -+/// -+/// use nix::unistd; -+/// use nix::sys::stat; -+/// use tempfile::tempdir; -+/// -+/// fn main() { -+/// let tmp_dir1 = tempdir().unwrap(); -+/// let tmp_dir2 = tmp_dir1.path().join("new_dir"); -+/// -+/// // create new directory and give read, write and execute rights to the owner -+/// match unistd::mkdir(&tmp_dir2, stat::Mode::S_IRWXU) { -+/// Ok(_) => println!("created {:?}", tmp_dir2), -+/// Err(err) => println!("Error creating directory: {}", err), -+/// } -+/// } -+/// ``` -+#[inline] -+pub fn mkdir<P: ?Sized + NixPath>(path: &P, mode: Mode) -> Result<()> { -+ let res = path.with_nix_path(|cstr| { -+ unsafe { libc::mkdir(cstr.as_ptr(), mode.bits() as mode_t) } -+ })?; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Creates new fifo special file (named pipe) with path `path` and access rights `mode`. -+/// -+/// # Errors -+/// -+/// There are several situations where mkfifo might fail: -+/// -+/// - current user has insufficient rights in the parent directory -+/// - the path already exists -+/// - the path name is too long (longer than `PATH_MAX`, usually 4096 on linux, 1024 on OS X) -+/// -+/// For a full list consult -+/// [posix specification](http://pubs.opengroup.org/onlinepubs/9699919799/functions/mkfifo.html) -+/// -+/// # Example -+/// -+/// ```rust -+/// extern crate tempfile; -+/// extern crate nix; -+/// -+/// use nix::unistd; -+/// use nix::sys::stat; -+/// use tempfile::tempdir; -+/// -+/// fn main() { -+/// let tmp_dir = tempdir().unwrap(); -+/// let fifo_path = tmp_dir.path().join("foo.pipe"); -+/// -+/// // create new fifo and give read, write and execute rights to the owner -+/// match unistd::mkfifo(&fifo_path, stat::Mode::S_IRWXU) { -+/// Ok(_) => println!("created {:?}", fifo_path), -+/// Err(err) => println!("Error creating fifo: {}", err), -+/// } -+/// } -+/// ``` -+#[inline] -+pub fn mkfifo<P: ?Sized + NixPath>(path: &P, mode: Mode) -> Result<()> { -+ let res = path.with_nix_path(|cstr| { -+ unsafe { libc::mkfifo(cstr.as_ptr(), mode.bits() as mode_t) } -+ })?; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Creates a symbolic link at `path2` which points to `path1`. -+/// -+/// If `dirfd` has a value, then `path2` is relative to directory associated -+/// with the file descriptor. -+/// -+/// If `dirfd` is `None`, then `path2` is relative to the current working -+/// directory. This is identical to `libc::symlink(path1, path2)`. -+/// -+/// See also [symlinkat(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/symlinkat.html). -+pub fn symlinkat<P1: ?Sized + NixPath, P2: ?Sized + NixPath>( -+ path1: &P1, -+ dirfd: Option<RawFd>, -+ path2: &P2) -> Result<()> { -+ let res = -+ path1.with_nix_path(|path1| { -+ path2.with_nix_path(|path2| { -+ unsafe { -+ libc::symlinkat( -+ path1.as_ptr(), -+ dirfd.unwrap_or(libc::AT_FDCWD), -+ path2.as_ptr() -+ ) -+ } -+ }) -+ })??; -+ Errno::result(res).map(drop) -+} -+ -+/// Returns the current directory as a `PathBuf` -+/// -+/// Err is returned if the current user doesn't have the permission to read or search a component -+/// of the current path. -+/// -+/// # Example -+/// -+/// ```rust -+/// extern crate nix; -+/// -+/// use nix::unistd; -+/// -+/// fn main() { -+/// // assume that we are allowed to get current directory -+/// let dir = unistd::getcwd().unwrap(); -+/// println!("The current directory is {:?}", dir); -+/// } -+/// ``` -+#[inline] -+pub fn getcwd() -> Result<PathBuf> { -+ let mut buf = Vec::with_capacity(512); -+ loop { -+ unsafe { -+ let ptr = buf.as_mut_ptr() as *mut c_char; -+ -+ // The buffer must be large enough to store the absolute pathname plus -+ // a terminating null byte, or else null is returned. -+ // To safely handle this we start with a reasonable size (512 bytes) -+ // and double the buffer size upon every error -+ if !libc::getcwd(ptr, buf.capacity()).is_null() { -+ let len = CStr::from_ptr(buf.as_ptr() as *const c_char).to_bytes().len(); -+ buf.set_len(len); -+ buf.shrink_to_fit(); -+ return Ok(PathBuf::from(OsString::from_vec(buf))); -+ } else { -+ let error = Errno::last(); -+ // ERANGE means buffer was too small to store directory name -+ if error != Errno::ERANGE { -+ return Err(Error::Sys(error)); -+ } -+ } -+ -+ // Trigger the internal buffer resizing logic of `Vec` by requiring -+ // more space than the current capacity. -+ let cap = buf.capacity(); -+ buf.set_len(cap); -+ buf.reserve(1); -+ } -+ } -+} -+ -+/// Computes the raw UID and GID values to pass to a `*chown` call. -+fn chown_raw_ids(owner: Option<Uid>, group: Option<Gid>) -> (libc::uid_t, libc::gid_t) { -+ // According to the POSIX specification, -1 is used to indicate that owner and group -+ // are not to be changed. Since uid_t and gid_t are unsigned types, we have to wrap -+ // around to get -1. -+ let uid = owner.map(Into::into).unwrap_or((0 as uid_t).wrapping_sub(1)); -+ let gid = group.map(Into::into).unwrap_or((0 as gid_t).wrapping_sub(1)); -+ (uid, gid) -+} -+ -+/// Change the ownership of the file at `path` to be owned by the specified -+/// `owner` (user) and `group` (see -+/// [chown(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/chown.html)). -+/// -+/// The owner/group for the provided path name will not be modified if `None` is -+/// provided for that argument. Ownership change will be attempted for the path -+/// only if `Some` owner/group is provided. -+#[inline] -+pub fn chown<P: ?Sized + NixPath>(path: &P, owner: Option<Uid>, group: Option<Gid>) -> Result<()> { -+ let res = path.with_nix_path(|cstr| { -+ let (uid, gid) = chown_raw_ids(owner, group); -+ unsafe { libc::chown(cstr.as_ptr(), uid, gid) } -+ })?; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Flags for `fchownat` function. -+#[derive(Clone, Copy, Debug)] -+pub enum FchownatFlags { -+ FollowSymlink, -+ NoFollowSymlink, -+} -+ -+/// Change the ownership of the file at `path` to be owned by the specified -+/// `owner` (user) and `group`. -+/// -+/// The owner/group for the provided path name will not be modified if `None` is -+/// provided for that argument. Ownership change will be attempted for the path -+/// only if `Some` owner/group is provided. -+/// -+/// The file to be changed is determined relative to the directory associated -+/// with the file descriptor `dirfd` or the current working directory -+/// if `dirfd` is `None`. -+/// -+/// If `flag` is `FchownatFlags::NoFollowSymlink` and `path` names a symbolic link, -+/// then the mode of the symbolic link is changed. -+/// -+/// `fchownat(None, path, mode, FchownatFlags::NoFollowSymlink)` is identical to -+/// a call `libc::lchown(path, mode)`. That's why `lchmod` is unimplemented in -+/// the `nix` crate. -+/// -+/// # References -+/// -+/// [fchownat(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/fchownat.html). -+pub fn fchownat<P: ?Sized + NixPath>( -+ dirfd: Option<RawFd>, -+ path: &P, -+ owner: Option<Uid>, -+ group: Option<Gid>, -+ flag: FchownatFlags, -+) -> Result<()> { -+ let atflag = -+ match flag { -+ FchownatFlags::FollowSymlink => AtFlags::empty(), -+ FchownatFlags::NoFollowSymlink => AtFlags::AT_SYMLINK_NOFOLLOW, -+ }; -+ let res = path.with_nix_path(|cstr| unsafe { -+ let (uid, gid) = chown_raw_ids(owner, group); -+ libc::fchownat(at_rawfd(dirfd), cstr.as_ptr(), uid, gid, -+ atflag.bits() as libc::c_int) -+ })?; -+ -+ Errno::result(res).map(drop) -+} -+ -+fn to_exec_array(args: &[CString]) -> Vec<*const c_char> { -+ let mut args_p: Vec<*const c_char> = args.iter().map(|s| s.as_ptr()).collect(); -+ args_p.push(ptr::null()); -+ args_p -+} -+ -+/// Replace the current process image with a new one (see -+/// [exec(3)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/exec.html)). -+/// -+/// See the `::nix::unistd::execve` system call for additional details. `execv` -+/// performs the same action but does not allow for customization of the -+/// environment for the new process. -+#[inline] -+pub fn execv(path: &CString, argv: &[CString]) -> Result<Void> { -+ let args_p = to_exec_array(argv); -+ -+ unsafe { -+ libc::execv(path.as_ptr(), args_p.as_ptr()) -+ }; -+ -+ Err(Error::Sys(Errno::last())) -+} -+ -+ -+/// Replace the current process image with a new one (see -+/// [execve(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/exec.html)). -+/// -+/// The execve system call allows for another process to be "called" which will -+/// replace the current process image. That is, this process becomes the new -+/// command that is run. On success, this function will not return. Instead, -+/// the new program will run until it exits. -+/// -+/// `::nix::unistd::execv` and `::nix::unistd::execve` take as arguments a slice -+/// of `::std::ffi::CString`s for `args` and `env` (for `execve`). Each element -+/// in the `args` list is an argument to the new process. Each element in the -+/// `env` list should be a string in the form "key=value". -+#[inline] -+pub fn execve(path: &CString, args: &[CString], env: &[CString]) -> Result<Void> { -+ let args_p = to_exec_array(args); -+ let env_p = to_exec_array(env); -+ -+ unsafe { -+ libc::execve(path.as_ptr(), args_p.as_ptr(), env_p.as_ptr()) -+ }; -+ -+ Err(Error::Sys(Errno::last())) -+} -+ -+/// Replace the current process image with a new one and replicate shell `PATH` -+/// searching behavior (see -+/// [exec(3)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/exec.html)). -+/// -+/// See `::nix::unistd::execve` for additional details. `execvp` behaves the -+/// same as execv except that it will examine the `PATH` environment variables -+/// for file names not specified with a leading slash. For example, `execv` -+/// would not work if "bash" was specified for the path argument, but `execvp` -+/// would assuming that a bash executable was on the system `PATH`. -+#[inline] -+pub fn execvp(filename: &CString, args: &[CString]) -> Result<Void> { -+ let args_p = to_exec_array(args); -+ -+ unsafe { -+ libc::execvp(filename.as_ptr(), args_p.as_ptr()) -+ }; -+ -+ Err(Error::Sys(Errno::last())) -+} -+ -+/// Replace the current process image with a new one and replicate shell `PATH` -+/// searching behavior (see -+/// [`execvpe(3)`](http://man7.org/linux/man-pages/man3/exec.3.html)). -+/// -+/// This functions like a combination of `execvp(2)` and `execve(2)` to pass an -+/// environment and have a search path. See these two for additional -+/// information. -+#[cfg(any(target_os = "haiku", -+ target_os = "linux", -+ target_os = "openbsd"))] -+pub fn execvpe(filename: &CString, args: &[CString], env: &[CString]) -> Result<Void> { -+ let args_p = to_exec_array(args); -+ let env_p = to_exec_array(env); -+ -+ unsafe { -+ libc::execvpe(filename.as_ptr(), args_p.as_ptr(), env_p.as_ptr()) -+ }; -+ -+ Err(Error::Sys(Errno::last())) -+} -+ -+/// Replace the current process image with a new one (see -+/// [fexecve(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/fexecve.html)). -+/// -+/// The `fexecve` function allows for another process to be "called" which will -+/// replace the current process image. That is, this process becomes the new -+/// command that is run. On success, this function will not return. Instead, -+/// the new program will run until it exits. -+/// -+/// This function is similar to `execve`, except that the program to be executed -+/// is referenced as a file descriptor instead of a path. -+// Note for NetBSD and OpenBSD: although rust-lang/libc includes it (under -+// unix/bsd/netbsdlike/) fexecve is not currently implemented on NetBSD nor on -+// OpenBSD. -+#[cfg(any(target_os = "android", -+ target_os = "linux", -+ target_os = "freebsd"))] -+#[inline] -+pub fn fexecve(fd: RawFd, args: &[CString], env: &[CString]) -> Result<Void> { -+ let args_p = to_exec_array(args); -+ let env_p = to_exec_array(env); -+ -+ unsafe { -+ libc::fexecve(fd, args_p.as_ptr(), env_p.as_ptr()) -+ }; -+ -+ Err(Error::Sys(Errno::last())) -+} -+ -+/// Execute program relative to a directory file descriptor (see -+/// [execveat(2)](http://man7.org/linux/man-pages/man2/execveat.2.html)). -+/// -+/// The `execveat` function allows for another process to be "called" which will -+/// replace the current process image. That is, this process becomes the new -+/// command that is run. On success, this function will not return. Instead, -+/// the new program will run until it exits. -+/// -+/// This function is similar to `execve`, except that the program to be executed -+/// is referenced as a file descriptor to the base directory plus a path. -+#[cfg(any(target_os = "android", target_os = "linux"))] -+#[inline] -+pub fn execveat(dirfd: RawFd, pathname: &CString, args: &[CString], -+ env: &[CString], flags: super::fcntl::AtFlags) -> Result<Void> { -+ let args_p = to_exec_array(args); -+ let env_p = to_exec_array(env); -+ -+ unsafe { -+ libc::syscall(libc::SYS_execveat, dirfd, pathname.as_ptr(), -+ args_p.as_ptr(), env_p.as_ptr(), flags); -+ }; -+ -+ Err(Error::Sys(Errno::last())) -+} -+ -+/// Daemonize this process by detaching from the controlling terminal (see -+/// [daemon(3)](http://man7.org/linux/man-pages/man3/daemon.3.html)). -+/// -+/// When a process is launched it is typically associated with a parent and it, -+/// in turn, by its controlling terminal/process. In order for a process to run -+/// in the "background" it must daemonize itself by detaching itself. Under -+/// posix, this is done by doing the following: -+/// -+/// 1. Parent process (this one) forks -+/// 2. Parent process exits -+/// 3. Child process continues to run. -+/// -+/// `nochdir`: -+/// -+/// * `nochdir = true`: The current working directory after daemonizing will -+/// be the current working directory. -+/// * `nochdir = false`: The current working directory after daemonizing will -+/// be the root direcory, `/`. -+/// -+/// `noclose`: -+/// -+/// * `noclose = true`: The process' current stdin, stdout, and stderr file -+/// descriptors will remain identical after daemonizing. -+/// * `noclose = false`: The process' stdin, stdout, and stderr will point to -+/// `/dev/null` after daemonizing. -+#[cfg_attr(any(target_os = "macos", target_os = "ios"), deprecated( -+ since="0.14.0", -+ note="Deprecated in MacOSX 10.5" -+))] -+#[cfg_attr(any(target_os = "macos", target_os = "ios"), allow(deprecated))] -+pub fn daemon(nochdir: bool, noclose: bool) -> Result<()> { -+ let res = unsafe { libc::daemon(nochdir as c_int, noclose as c_int) }; -+ Errno::result(res).map(drop) -+} -+ -+/// Set the system host name (see -+/// [sethostname(2)](http://man7.org/linux/man-pages/man2/gethostname.2.html)). -+/// -+/// Given a name, attempt to update the system host name to the given string. -+/// On some systems, the host name is limited to as few as 64 bytes. An error -+/// will be return if the name is not valid or the current process does not have -+/// permissions to update the host name. -+pub fn sethostname<S: AsRef<OsStr>>(name: S) -> Result<()> { -+ // Handle some differences in type of the len arg across platforms. -+ cfg_if! { -+ if #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", ))] { -+ type sethostname_len_t = c_int; -+ } else { -+ type sethostname_len_t = size_t; -+ } -+ } -+ let ptr = name.as_ref().as_bytes().as_ptr() as *const c_char; -+ let len = name.as_ref().len() as sethostname_len_t; -+ -+ let res = unsafe { libc::sethostname(ptr, len) }; -+ Errno::result(res).map(drop) -+} -+ -+/// Get the host name and store it in the provided buffer, returning a pointer -+/// the `CStr` in that buffer on success (see -+/// [gethostname(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/gethostname.html)). -+/// -+/// This function call attempts to get the host name for the running system and -+/// store it in a provided buffer. The buffer will be populated with bytes up -+/// to the length of the provided slice including a NUL terminating byte. If -+/// the hostname is longer than the length provided, no error will be provided. -+/// The posix specification does not specify whether implementations will -+/// null-terminate in this case, but the nix implementation will ensure that the -+/// buffer is null terminated in this case. -+/// -+/// ```no_run -+/// use nix::unistd; -+/// -+/// let mut buf = [0u8; 64]; -+/// let hostname_cstr = unistd::gethostname(&mut buf).expect("Failed getting hostname"); -+/// let hostname = hostname_cstr.to_str().expect("Hostname wasn't valid UTF-8"); -+/// println!("Hostname: {}", hostname); -+/// ``` -+pub fn gethostname(buffer: &mut [u8]) -> Result<&CStr> { -+ let ptr = buffer.as_mut_ptr() as *mut c_char; -+ let len = buffer.len() as size_t; -+ -+ let res = unsafe { libc::gethostname(ptr, len) }; -+ Errno::result(res).map(|_| { -+ buffer[len - 1] = 0; // ensure always null-terminated -+ unsafe { CStr::from_ptr(buffer.as_ptr() as *const c_char) } -+ }) -+} -+ -+/// Close a raw file descriptor -+/// -+/// Be aware that many Rust types implicitly close-on-drop, including -+/// `std::fs::File`. Explicitly closing them with this method too can result in -+/// a double-close condition, which can cause confusing `EBADF` errors in -+/// seemingly unrelated code. Caveat programmer. See also -+/// [close(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/close.html). -+/// -+/// # Examples -+/// -+/// ```no_run -+/// extern crate tempfile; -+/// extern crate nix; -+/// -+/// use std::os::unix::io::AsRawFd; -+/// use nix::unistd::close; -+/// -+/// fn main() { -+/// let f = tempfile::tempfile().unwrap(); -+/// close(f.as_raw_fd()).unwrap(); // Bad! f will also close on drop! -+/// } -+/// ``` -+/// -+/// ```rust -+/// extern crate tempfile; -+/// extern crate nix; -+/// -+/// use std::os::unix::io::IntoRawFd; -+/// use nix::unistd::close; -+/// -+/// fn main() { -+/// let f = tempfile::tempfile().unwrap(); -+/// close(f.into_raw_fd()).unwrap(); // Good. into_raw_fd consumes f -+/// } -+/// ``` -+pub fn close(fd: RawFd) -> Result<()> { -+ let res = unsafe { libc::close(fd) }; -+ Errno::result(res).map(drop) -+} -+ -+/// Read from a raw file descriptor. -+/// -+/// See also [read(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/read.html) -+pub fn read(fd: RawFd, buf: &mut [u8]) -> Result<usize> { -+ let res = unsafe { libc::read(fd, buf.as_mut_ptr() as *mut c_void, buf.len() as size_t) }; -+ -+ Errno::result(res).map(|r| r as usize) -+} -+ -+/// Write to a raw file descriptor. -+/// -+/// See also [write(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/write.html) -+pub fn write(fd: RawFd, buf: &[u8]) -> Result<usize> { -+ let res = unsafe { libc::write(fd, buf.as_ptr() as *const c_void, buf.len() as size_t) }; -+ -+ Errno::result(res).map(|r| r as usize) -+} -+ -+/// Directive that tells [`lseek`] and [`lseek64`] what the offset is relative to. -+/// -+/// [`lseek`]: ./fn.lseek.html -+/// [`lseek64`]: ./fn.lseek64.html -+#[repr(i32)] -+#[derive(Clone, Copy, Debug)] -+pub enum Whence { -+ /// Specify an offset relative to the start of the file. -+ SeekSet = libc::SEEK_SET, -+ /// Specify an offset relative to the current file location. -+ SeekCur = libc::SEEK_CUR, -+ /// Specify an offset relative to the end of the file. -+ SeekEnd = libc::SEEK_END, -+ /// Specify an offset relative to the next location in the file greater than or -+ /// equal to offset that contains some data. If offset points to -+ /// some data, then the file offset is set to offset. -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd", -+ all(target_os = "linux", not(any(target_env = "musl", -+ target_arch = "mips", -+ target_arch = "mips64")))))] -+ SeekData = libc::SEEK_DATA, -+ /// Specify an offset relative to the next hole in the file greater than -+ /// or equal to offset. If offset points into the middle of a hole, then -+ /// the file offset should be set to offset. If there is no hole past offset, -+ /// then the file offset should be adjusted to the end of the file (i.e., there -+ /// is an implicit hole at the end of any file). -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd", -+ all(target_os = "linux", not(any(target_env = "musl", -+ target_arch = "mips", -+ target_arch = "mips64")))))] -+ SeekHole = libc::SEEK_HOLE -+} -+ -+/// Move the read/write file offset. -+/// -+/// See also [lseek(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/lseek.html) -+pub fn lseek(fd: RawFd, offset: off_t, whence: Whence) -> Result<off_t> { -+ let res = unsafe { libc::lseek(fd, offset, whence as i32) }; -+ -+ Errno::result(res).map(|r| r as off_t) -+} -+ -+#[cfg(any(target_os = "linux", target_os = "android"))] -+pub fn lseek64(fd: RawFd, offset: libc::off64_t, whence: Whence) -> Result<libc::off64_t> { -+ let res = unsafe { libc::lseek64(fd, offset, whence as i32) }; -+ -+ Errno::result(res).map(|r| r as libc::off64_t) -+} -+ -+/// Create an interprocess channel. -+/// -+/// See also [pipe(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/pipe.html) -+pub fn pipe() -> Result<(RawFd, RawFd)> { -+ unsafe { -+ let mut fds: [c_int; 2] = mem::uninitialized(); -+ -+ let res = libc::pipe(fds.as_mut_ptr()); -+ -+ Errno::result(res)?; -+ -+ Ok((fds[0], fds[1])) -+ } -+} -+ -+/// Like `pipe`, but allows setting certain file descriptor flags. -+/// -+/// The following flags are supported, and will be set atomically as the pipe is -+/// created: -+/// -+/// `O_CLOEXEC`: Set the close-on-exec flag for the new file descriptors. -+/// `O_NONBLOCK`: Set the non-blocking flag for the ends of the pipe. -+/// -+/// See also [pipe(2)](http://man7.org/linux/man-pages/man2/pipe.2.html) -+#[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "emscripten", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+pub fn pipe2(flags: OFlag) -> Result<(RawFd, RawFd)> { -+ let mut fds: [c_int; 2] = unsafe { mem::uninitialized() }; -+ -+ let res = unsafe { libc::pipe2(fds.as_mut_ptr(), flags.bits()) }; -+ -+ Errno::result(res)?; -+ -+ Ok((fds[0], fds[1])) -+} -+ -+/// Like `pipe`, but allows setting certain file descriptor flags. -+/// -+/// The following flags are supported, and will be set after the pipe is -+/// created: -+/// -+/// `O_CLOEXEC`: Set the close-on-exec flag for the new file descriptors. -+/// `O_NONBLOCK`: Set the non-blocking flag for the ends of the pipe. -+#[cfg(any(target_os = "ios", target_os = "macos"))] -+#[deprecated( -+ since="0.10.0", -+ note="pipe2(2) is not actually atomic on these platforms. Use pipe(2) and fcntl(2) instead" -+)] -+pub fn pipe2(flags: OFlag) -> Result<(RawFd, RawFd)> { -+ let mut fds: [c_int; 2] = unsafe { mem::uninitialized() }; -+ -+ let res = unsafe { libc::pipe(fds.as_mut_ptr()) }; -+ -+ Errno::result(res)?; -+ -+ pipe2_setflags(fds[0], fds[1], flags)?; -+ -+ Ok((fds[0], fds[1])) -+} -+ -+#[cfg(any(target_os = "ios", target_os = "macos"))] -+fn pipe2_setflags(fd1: RawFd, fd2: RawFd, flags: OFlag) -> Result<()> { -+ use fcntl::FcntlArg::F_SETFL; -+ -+ let mut res = Ok(0); -+ -+ if flags.contains(OFlag::O_CLOEXEC) { -+ res = res -+ .and_then(|_| fcntl(fd1, F_SETFD(FdFlag::FD_CLOEXEC))) -+ .and_then(|_| fcntl(fd2, F_SETFD(FdFlag::FD_CLOEXEC))); -+ } -+ -+ if flags.contains(OFlag::O_NONBLOCK) { -+ res = res -+ .and_then(|_| fcntl(fd1, F_SETFL(OFlag::O_NONBLOCK))) -+ .and_then(|_| fcntl(fd2, F_SETFL(OFlag::O_NONBLOCK))); -+ } -+ -+ match res { -+ Ok(_) => Ok(()), -+ Err(e) => { -+ let _ = close(fd1); -+ let _ = close(fd2); -+ Err(e) -+ } -+ } -+} -+ -+/// Truncate a file to a specified length -+/// -+/// See also -+/// [truncate(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/truncate.html) -+pub fn truncate<P: ?Sized + NixPath>(path: &P, len: off_t) -> Result<()> { -+ let res = path.with_nix_path(|cstr| { -+ unsafe { -+ libc::truncate(cstr.as_ptr(), len) -+ } -+ })?; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Truncate a file to a specified length -+/// -+/// See also -+/// [ftruncate(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/ftruncate.html) -+pub fn ftruncate(fd: RawFd, len: off_t) -> Result<()> { -+ Errno::result(unsafe { libc::ftruncate(fd, len) }).map(drop) -+} -+ -+pub fn isatty(fd: RawFd) -> Result<bool> { -+ unsafe { -+ // ENOTTY means `fd` is a valid file descriptor, but not a TTY, so -+ // we return `Ok(false)` -+ if libc::isatty(fd) == 1 { -+ Ok(true) -+ } else { -+ match Errno::last() { -+ Errno::ENOTTY => Ok(false), -+ err => Err(Error::Sys(err)), -+ } -+ } -+ } -+} -+ -+/// Remove a directory entry -+/// -+/// See also [unlink(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/unlink.html) -+pub fn unlink<P: ?Sized + NixPath>(path: &P) -> Result<()> { -+ let res = path.with_nix_path(|cstr| { -+ unsafe { -+ libc::unlink(cstr.as_ptr()) -+ } -+ })?; -+ Errno::result(res).map(drop) -+} -+ -+/// Flags for `unlinkat` function. -+#[derive(Clone, Copy, Debug)] -+pub enum UnlinkatFlags { -+ RemoveDir, -+ NoRemoveDir, -+} -+ -+/// Remove a directory entry -+/// -+/// In the case of a relative path, the directory entry to be removed is determined relative to -+/// the directory associated with the file descriptor `dirfd` or the current working directory -+/// if `dirfd` is `None`. In the case of an absolute `path` `dirfd` is ignored. If `flag` is -+/// `UnlinkatFlags::RemoveDir` then removal of the directory entry specified by `dirfd` and `path` -+/// is performed. -+/// -+/// # References -+/// See also [unlinkat(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/unlinkat.html) -+pub fn unlinkat<P: ?Sized + NixPath>( -+ dirfd: Option<RawFd>, -+ path: &P, -+ flag: UnlinkatFlags, -+) -> Result<()> { -+ let atflag = -+ match flag { -+ UnlinkatFlags::RemoveDir => AtFlags::AT_REMOVEDIR, -+ UnlinkatFlags::NoRemoveDir => AtFlags::empty(), -+ }; -+ let res = path.with_nix_path(|cstr| { -+ unsafe { -+ libc::unlinkat(at_rawfd(dirfd), cstr.as_ptr(), atflag.bits() as libc::c_int) -+ } -+ })?; -+ Errno::result(res).map(drop) -+} -+ -+ -+#[inline] -+pub fn chroot<P: ?Sized + NixPath>(path: &P) -> Result<()> { -+ let res = path.with_nix_path(|cstr| { -+ unsafe { libc::chroot(cstr.as_ptr()) } -+ })?; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Commit filesystem caches to disk -+/// -+/// See also [sync(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/sync.html) -+#[cfg(any( -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "netbsd", -+ target_os = "openbsd" -+))] -+pub fn sync() -> () { -+ unsafe { libc::sync() }; -+} -+ -+/// Synchronize changes to a file -+/// -+/// See also [fsync(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/fsync.html) -+#[inline] -+pub fn fsync(fd: RawFd) -> Result<()> { -+ let res = unsafe { libc::fsync(fd) }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Synchronize the data of a file -+/// -+/// See also -+/// [fdatasync(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/fdatasync.html) -+// `fdatasync(2) is in POSIX, but in libc it is only defined in `libc::notbsd`. -+// TODO: exclude only Apple systems after https://github.com/rust-lang/libc/pull/211 -+#[cfg(any(target_os = "linux", -+ target_os = "android", -+ target_os = "emscripten"))] -+#[inline] -+pub fn fdatasync(fd: RawFd) -> Result<()> { -+ let res = unsafe { libc::fdatasync(fd) }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Get a real user ID -+/// -+/// See also [getuid(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getuid.html) -+// POSIX requires that getuid is always successful, so no need to check return -+// value or errno. -+#[inline] -+pub fn getuid() -> Uid { -+ Uid(unsafe { libc::getuid() }) -+} -+ -+/// Get the effective user ID -+/// -+/// See also [geteuid(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/geteuid.html) -+// POSIX requires that geteuid is always successful, so no need to check return -+// value or errno. -+#[inline] -+pub fn geteuid() -> Uid { -+ Uid(unsafe { libc::geteuid() }) -+} -+ -+/// Get the real group ID -+/// -+/// See also [getgid(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getgid.html) -+// POSIX requires that getgid is always successful, so no need to check return -+// value or errno. -+#[inline] -+pub fn getgid() -> Gid { -+ Gid(unsafe { libc::getgid() }) -+} -+ -+/// Get the effective group ID -+/// -+/// See also [getegid(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getegid.html) -+// POSIX requires that getegid is always successful, so no need to check return -+// value or errno. -+#[inline] -+pub fn getegid() -> Gid { -+ Gid(unsafe { libc::getegid() }) -+} -+ -+/// Set the effective user ID -+/// -+/// See also [seteuid(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/seteuid.html) -+#[inline] -+pub fn seteuid(euid: Uid) -> Result<()> { -+ let res = unsafe { libc::seteuid(euid.into()) }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Set the effective group ID -+/// -+/// See also [setegid(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/setegid.html) -+#[inline] -+pub fn setegid(egid: Gid) -> Result<()> { -+ let res = unsafe { libc::setegid(egid.into()) }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Set the user ID -+/// -+/// See also [setuid(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/setuid.html) -+#[inline] -+pub fn setuid(uid: Uid) -> Result<()> { -+ let res = unsafe { libc::setuid(uid.into()) }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Set the group ID -+/// -+/// See also [setgid(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/setgid.html) -+#[inline] -+pub fn setgid(gid: Gid) -> Result<()> { -+ let res = unsafe { libc::setgid(gid.into()) }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Get the list of supplementary group IDs of the calling process. -+/// -+/// [Further reading](http://pubs.opengroup.org/onlinepubs/009695399/functions/getgroups.html) -+/// -+/// **Note:** This function is not available for Apple platforms. On those -+/// platforms, checking group membership should be achieved via communication -+/// with the `opendirectoryd` service. -+#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+pub fn getgroups() -> Result<Vec<Gid>> { -+ // First get the number of groups so we can size our Vec -+ let ret = unsafe { libc::getgroups(0, ptr::null_mut()) }; -+ -+ // Now actually get the groups. We try multiple times in case the number of -+ // groups has changed since the first call to getgroups() and the buffer is -+ // now too small. -+ let mut groups = Vec::<Gid>::with_capacity(Errno::result(ret)? as usize); -+ loop { -+ // FIXME: On the platforms we currently support, the `Gid` struct has -+ // the same representation in memory as a bare `gid_t`. This is not -+ // necessarily the case on all Rust platforms, though. See RFC 1785. -+ let ret = unsafe { -+ libc::getgroups(groups.capacity() as c_int, groups.as_mut_ptr() as *mut gid_t) -+ }; -+ -+ match Errno::result(ret) { -+ Ok(s) => { -+ unsafe { groups.set_len(s as usize) }; -+ return Ok(groups); -+ }, -+ Err(Error::Sys(Errno::EINVAL)) => { -+ // EINVAL indicates that the buffer size was too small. Trigger -+ // the internal buffer resizing logic of `Vec` by requiring -+ // more space than the current capacity. -+ let cap = groups.capacity(); -+ unsafe { groups.set_len(cap) }; -+ groups.reserve(1); -+ }, -+ Err(e) => return Err(e) -+ } -+ } -+} -+ -+/// Set the list of supplementary group IDs for the calling process. -+/// -+/// [Further reading](http://man7.org/linux/man-pages/man2/getgroups.2.html) -+/// -+/// **Note:** This function is not available for Apple platforms. On those -+/// platforms, group membership management should be achieved via communication -+/// with the `opendirectoryd` service. -+/// -+/// # Examples -+/// -+/// `setgroups` can be used when dropping privileges from the root user to a -+/// specific user and group. For example, given the user `www-data` with UID -+/// `33` and the group `backup` with the GID `34`, one could switch the user as -+/// follows: -+/// -+/// ```rust,no_run -+/// # use std::error::Error; -+/// # use nix::unistd::*; -+/// # -+/// # fn try_main() -> Result<(), Box<Error>> { -+/// let uid = Uid::from_raw(33); -+/// let gid = Gid::from_raw(34); -+/// setgroups(&[gid])?; -+/// setgid(gid)?; -+/// setuid(uid)?; -+/// # -+/// # Ok(()) -+/// # } -+/// # -+/// # fn main() { -+/// # try_main().unwrap(); -+/// # } -+/// ``` -+#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+pub fn setgroups(groups: &[Gid]) -> Result<()> { -+ cfg_if! { -+ if #[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] { -+ type setgroups_ngroups_t = c_int; -+ } else { -+ type setgroups_ngroups_t = size_t; -+ } -+ } -+ // FIXME: On the platforms we currently support, the `Gid` struct has the -+ // same representation in memory as a bare `gid_t`. This is not necessarily -+ // the case on all Rust platforms, though. See RFC 1785. -+ let res = unsafe { -+ libc::setgroups(groups.len() as setgroups_ngroups_t, groups.as_ptr() as *const gid_t) -+ }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Calculate the supplementary group access list. -+/// -+/// Gets the group IDs of all groups that `user` is a member of. The additional -+/// group `group` is also added to the list. -+/// -+/// [Further reading](http://man7.org/linux/man-pages/man3/getgrouplist.3.html) -+/// -+/// **Note:** This function is not available for Apple platforms. On those -+/// platforms, checking group membership should be achieved via communication -+/// with the `opendirectoryd` service. -+/// -+/// # Errors -+/// -+/// Although the `getgrouplist()` call does not return any specific -+/// errors on any known platforms, this implementation will return a system -+/// error of `EINVAL` if the number of groups to be fetched exceeds the -+/// `NGROUPS_MAX` sysconf value. This mimics the behaviour of `getgroups()` -+/// and `setgroups()`. Additionally, while some implementations will return a -+/// partial list of groups when `NGROUPS_MAX` is exceeded, this implementation -+/// will only ever return the complete list or else an error. -+#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+pub fn getgrouplist(user: &CStr, group: Gid) -> Result<Vec<Gid>> { -+ let ngroups_max = match sysconf(SysconfVar::NGROUPS_MAX) { -+ Ok(Some(n)) => n as c_int, -+ Ok(None) | Err(_) => <c_int>::max_value(), -+ }; -+ use std::cmp::min; -+ let mut ngroups = min(ngroups_max, 8); -+ let mut groups = Vec::<Gid>::with_capacity(ngroups as usize); -+ cfg_if! { -+ if #[cfg(any(target_os = "ios", target_os = "macos"))] { -+ type getgrouplist_group_t = c_int; -+ } else { -+ type getgrouplist_group_t = gid_t; -+ } -+ } -+ let gid: gid_t = group.into(); -+ loop { -+ let ret = unsafe { -+ libc::getgrouplist(user.as_ptr(), -+ gid as getgrouplist_group_t, -+ groups.as_mut_ptr() as *mut getgrouplist_group_t, -+ &mut ngroups) -+ }; -+ -+ // BSD systems only return 0 or -1, Linux returns ngroups on success. -+ if ret >= 0 { -+ unsafe { groups.set_len(ngroups as usize) }; -+ return Ok(groups); -+ } else if ret == -1 { -+ // Returns -1 if ngroups is too small, but does not set errno. -+ // BSD systems will still fill the groups buffer with as many -+ // groups as possible, but Linux manpages do not mention this -+ // behavior. -+ -+ let cap = groups.capacity(); -+ if cap >= ngroups_max as usize { -+ // We already have the largest capacity we can, give up -+ return Err(Error::invalid_argument()); -+ } -+ -+ // Reserve space for at least ngroups -+ groups.reserve(ngroups as usize); -+ -+ // Even if the buffer gets resized to bigger than ngroups_max, -+ // don't ever ask for more than ngroups_max groups -+ ngroups = min(ngroups_max, groups.capacity() as c_int); -+ } -+ } -+} -+ -+/// Initialize the supplementary group access list. -+/// -+/// Sets the supplementary group IDs for the calling process using all groups -+/// that `user` is a member of. The additional group `group` is also added to -+/// the list. -+/// -+/// [Further reading](http://man7.org/linux/man-pages/man3/initgroups.3.html) -+/// -+/// **Note:** This function is not available for Apple platforms. On those -+/// platforms, group membership management should be achieved via communication -+/// with the `opendirectoryd` service. -+/// -+/// # Examples -+/// -+/// `initgroups` can be used when dropping privileges from the root user to -+/// another user. For example, given the user `www-data`, we could look up the -+/// UID and GID for the user in the system's password database (usually found -+/// in `/etc/passwd`). If the `www-data` user's UID and GID were `33` and `33`, -+/// respectively, one could switch the user as follows: -+/// -+/// ```rust,no_run -+/// # use std::error::Error; -+/// # use std::ffi::CString; -+/// # use nix::unistd::*; -+/// # -+/// # fn try_main() -> Result<(), Box<Error>> { -+/// let user = CString::new("www-data").unwrap(); -+/// let uid = Uid::from_raw(33); -+/// let gid = Gid::from_raw(33); -+/// initgroups(&user, gid)?; -+/// setgid(gid)?; -+/// setuid(uid)?; -+/// # -+/// # Ok(()) -+/// # } -+/// # -+/// # fn main() { -+/// # try_main().unwrap(); -+/// # } -+/// ``` -+#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+pub fn initgroups(user: &CStr, group: Gid) -> Result<()> { -+ cfg_if! { -+ if #[cfg(any(target_os = "ios", target_os = "macos"))] { -+ type initgroups_group_t = c_int; -+ } else { -+ type initgroups_group_t = gid_t; -+ } -+ } -+ let gid: gid_t = group.into(); -+ let res = unsafe { libc::initgroups(user.as_ptr(), gid as initgroups_group_t) }; -+ -+ Errno::result(res).map(drop) -+} -+ -+/// Suspend the thread until a signal is received. -+/// -+/// See also [pause(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/pause.html). -+#[inline] -+pub fn pause() { -+ unsafe { libc::pause() }; -+} -+ -+pub mod alarm { -+ //! Alarm signal scheduling. -+ //! -+ //! Scheduling an alarm will trigger a `SIGALRM` signal when the time has -+ //! elapsed, which has to be caught, because the default action for the -+ //! signal is to terminate the program. This signal also can't be ignored -+ //! because the system calls like `pause` will not be interrupted, see the -+ //! second example below. -+ //! -+ //! # Examples -+ //! -+ //! Canceling an alarm: -+ //! -+ //! ``` -+ //! use nix::unistd::alarm; -+ //! -+ //! // Set an alarm for 60 seconds from now. -+ //! alarm::set(60); -+ //! -+ //! // Cancel the above set alarm, which returns the number of seconds left -+ //! // of the previously set alarm. -+ //! assert_eq!(alarm::cancel(), Some(60)); -+ //! ``` -+ //! -+ //! Scheduling an alarm and waiting for the signal: -+ //! -+ //! ``` -+ //! use std::time::{Duration, Instant}; -+ //! -+ //! use nix::unistd::{alarm, pause}; -+ //! use nix::sys::signal::*; -+ //! -+ //! // We need to setup an empty signal handler to catch the alarm signal, -+ //! // otherwise the program will be terminated once the signal is delivered. -+ //! extern fn signal_handler(_: nix::libc::c_int) { } -+ //! unsafe { sigaction(Signal::SIGALRM, &SigAction::new(SigHandler::Handler(signal_handler), SaFlags::empty(), SigSet::empty())); } -+ //! -+ //! // Set an alarm for 1 second from now. -+ //! alarm::set(1); -+ //! -+ //! let start = Instant::now(); -+ //! // Pause the process until the alarm signal is received. -+ //! pause(); -+ //! -+ //! assert!(start.elapsed() >= Duration::from_secs(1)); -+ //! ``` -+ //! -+ //! # References -+ //! -+ //! See also [alarm(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/alarm.html). -+ -+ use libc; -+ -+ /// Schedule an alarm signal. -+ /// -+ /// This will cause the system to generate a `SIGALRM` signal for the -+ /// process after the specified number of seconds have elapsed. -+ /// -+ /// Returns the leftover time of a previously set alarm if there was one. -+ pub fn set(secs: libc::c_uint) -> Option<libc::c_uint> { -+ assert!(secs != 0, "passing 0 to `alarm::set` is not allowed, to cancel an alarm use `alarm::cancel`"); -+ alarm(secs) -+ } -+ -+ /// Cancel an previously set alarm signal. -+ /// -+ /// Returns the leftover time of a previously set alarm if there was one. -+ pub fn cancel() -> Option<libc::c_uint> { -+ alarm(0) -+ } -+ -+ fn alarm(secs: libc::c_uint) -> Option<libc::c_uint> { -+ match unsafe { libc::alarm(secs) } { -+ 0 => None, -+ secs => Some(secs), -+ } -+ } -+} -+ -+/// Suspend execution for an interval of time -+/// -+/// See also [sleep(2)](http://pubs.opengroup.org/onlinepubs/009695399/functions/sleep.html#tag_03_705_05) -+// Per POSIX, does not fail -+#[inline] -+pub fn sleep(seconds: c_uint) -> c_uint { -+ unsafe { libc::sleep(seconds) } -+} -+ -+pub mod acct { -+ use libc; -+ use {Result, NixPath}; -+ use errno::Errno; -+ use std::ptr; -+ -+ /// Enable process accounting -+ /// -+ /// See also [acct(2)](https://linux.die.net/man/2/acct) -+ pub fn enable<P: ?Sized + NixPath>(filename: &P) -> Result<()> { -+ let res = filename.with_nix_path(|cstr| { -+ unsafe { libc::acct(cstr.as_ptr()) } -+ })?; -+ -+ Errno::result(res).map(drop) -+ } -+ -+ /// Disable process accounting -+ pub fn disable() -> Result<()> { -+ let res = unsafe { libc::acct(ptr::null()) }; -+ -+ Errno::result(res).map(drop) -+ } -+} -+ -+/// Creates a regular file which persists even after process termination -+/// -+/// * `template`: a path whose 6 rightmost characters must be X, e.g. `/tmp/tmpfile_XXXXXX` -+/// * returns: tuple of file descriptor and filename -+/// -+/// Err is returned either if no temporary filename could be created or the template doesn't -+/// end with XXXXXX -+/// -+/// See also [mkstemp(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/mkstemp.html) -+/// -+/// # Example -+/// -+/// ```rust -+/// use nix::unistd; -+/// -+/// let _ = match unistd::mkstemp("/tmp/tempfile_XXXXXX") { -+/// Ok((fd, path)) => { -+/// unistd::unlink(path.as_path()).unwrap(); // flag file to be deleted at app termination -+/// fd -+/// } -+/// Err(e) => panic!("mkstemp failed: {}", e) -+/// }; -+/// // do something with fd -+/// ``` -+#[inline] -+pub fn mkstemp<P: ?Sized + NixPath>(template: &P) -> Result<(RawFd, PathBuf)> { -+ let mut path = template.with_nix_path(|path| {path.to_bytes_with_nul().to_owned()})?; -+ let p = path.as_mut_ptr() as *mut _; -+ let fd = unsafe { libc::mkstemp(p) }; -+ let last = path.pop(); // drop the trailing nul -+ debug_assert!(last == Some(b'\0')); -+ let pathname = OsString::from_vec(path); -+ Errno::result(fd)?; -+ Ok((fd, PathBuf::from(pathname))) -+} -+ -+/// Variable names for `pathconf` -+/// -+/// Nix uses the same naming convention for these variables as the -+/// [getconf(1)](http://pubs.opengroup.org/onlinepubs/9699919799/utilities/getconf.html) utility. -+/// That is, `PathconfVar` variables have the same name as the abstract -+/// variables shown in the `pathconf(2)` man page. Usually, it's the same as -+/// the C variable name without the leading `_PC_`. -+/// -+/// POSIX 1003.1-2008 standardizes all of these variables, but some OSes choose -+/// not to implement variables that cannot change at runtime. -+/// -+/// # References -+/// -+/// - [pathconf(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/pathconf.html) -+/// - [limits.h](http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/limits.h.html) -+/// - [unistd.h](http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/unistd.h.html) -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+#[repr(i32)] -+pub enum PathconfVar { -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd", target_os = "linux", -+ target_os = "netbsd", target_os = "openbsd"))] -+ /// Minimum number of bits needed to represent, as a signed integer value, -+ /// the maximum size of a regular file allowed in the specified directory. -+ FILESIZEBITS = libc::_PC_FILESIZEBITS, -+ /// Maximum number of links to a single file. -+ LINK_MAX = libc::_PC_LINK_MAX, -+ /// Maximum number of bytes in a terminal canonical input line. -+ MAX_CANON = libc::_PC_MAX_CANON, -+ /// Minimum number of bytes for which space is available in a terminal input -+ /// queue; therefore, the maximum number of bytes a conforming application -+ /// may require to be typed as input before reading them. -+ MAX_INPUT = libc::_PC_MAX_INPUT, -+ /// Maximum number of bytes in a filename (not including the terminating -+ /// null of a filename string). -+ NAME_MAX = libc::_PC_NAME_MAX, -+ /// Maximum number of bytes the implementation will store as a pathname in a -+ /// user-supplied buffer of unspecified size, including the terminating null -+ /// character. Minimum number the implementation will accept as the maximum -+ /// number of bytes in a pathname. -+ PATH_MAX = libc::_PC_PATH_MAX, -+ /// Maximum number of bytes that is guaranteed to be atomic when writing to -+ /// a pipe. -+ PIPE_BUF = libc::_PC_PIPE_BUF, -+ #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "linux", -+ target_os = "netbsd", target_os = "openbsd"))] -+ /// Symbolic links can be created. -+ POSIX2_SYMLINKS = libc::_PC_2_SYMLINKS, -+ #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -+ target_os = "linux", target_os = "openbsd"))] -+ /// Minimum number of bytes of storage actually allocated for any portion of -+ /// a file. -+ POSIX_ALLOC_SIZE_MIN = libc::_PC_ALLOC_SIZE_MIN, -+ #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -+ target_os = "linux", target_os = "openbsd"))] -+ /// Recommended increment for file transfer sizes between the -+ /// `POSIX_REC_MIN_XFER_SIZE` and `POSIX_REC_MAX_XFER_SIZE` values. -+ POSIX_REC_INCR_XFER_SIZE = libc::_PC_REC_INCR_XFER_SIZE, -+ #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -+ target_os = "linux", target_os = "openbsd"))] -+ /// Maximum recommended file transfer size. -+ POSIX_REC_MAX_XFER_SIZE = libc::_PC_REC_MAX_XFER_SIZE, -+ #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -+ target_os = "linux", target_os = "openbsd"))] -+ /// Minimum recommended file transfer size. -+ POSIX_REC_MIN_XFER_SIZE = libc::_PC_REC_MIN_XFER_SIZE, -+ #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -+ target_os = "linux", target_os = "openbsd"))] -+ /// Recommended file transfer buffer alignment. -+ POSIX_REC_XFER_ALIGN = libc::_PC_REC_XFER_ALIGN, -+ #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -+ target_os = "linux", target_os = "netbsd", target_os = "openbsd"))] -+ /// Maximum number of bytes in a symbolic link. -+ SYMLINK_MAX = libc::_PC_SYMLINK_MAX, -+ /// The use of `chown` and `fchown` is restricted to a process with -+ /// appropriate privileges, and to changing the group ID of a file only to -+ /// the effective group ID of the process or to one of its supplementary -+ /// group IDs. -+ _POSIX_CHOWN_RESTRICTED = libc::_PC_CHOWN_RESTRICTED, -+ /// Pathname components longer than {NAME_MAX} generate an error. -+ _POSIX_NO_TRUNC = libc::_PC_NO_TRUNC, -+ /// This symbol shall be defined to be the value of a character that shall -+ /// disable terminal special character handling. -+ _POSIX_VDISABLE = libc::_PC_VDISABLE, -+ #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -+ target_os = "linux", target_os = "openbsd"))] -+ /// Asynchronous input or output operations may be performed for the -+ /// associated file. -+ _POSIX_ASYNC_IO = libc::_PC_ASYNC_IO, -+ #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -+ target_os = "linux", target_os = "openbsd"))] -+ /// Prioritized input or output operations may be performed for the -+ /// associated file. -+ _POSIX_PRIO_IO = libc::_PC_PRIO_IO, -+ #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -+ target_os = "linux", target_os = "netbsd", target_os = "openbsd"))] -+ /// Synchronized input or output operations may be performed for the -+ /// associated file. -+ _POSIX_SYNC_IO = libc::_PC_SYNC_IO, -+ #[cfg(any(target_os = "dragonfly", target_os = "openbsd"))] -+ /// The resolution in nanoseconds for all file timestamps. -+ _POSIX_TIMESTAMP_RESOLUTION = libc::_PC_TIMESTAMP_RESOLUTION -+} -+ -+/// Like `pathconf`, but works with file descriptors instead of paths (see -+/// [fpathconf(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/pathconf.html)) -+/// -+/// # Parameters -+/// -+/// - `fd`: The file descriptor whose variable should be interrogated -+/// - `var`: The pathconf variable to lookup -+/// -+/// # Returns -+/// -+/// - `Ok(Some(x))`: the variable's limit (for limit variables) or its -+/// implementation level (for option variables). Implementation levels are -+/// usually a decimal-coded date, such as 200112 for POSIX 2001.12 -+/// - `Ok(None)`: the variable has no limit (for limit variables) or is -+/// unsupported (for option variables) -+/// - `Err(x)`: an error occurred -+pub fn fpathconf(fd: RawFd, var: PathconfVar) -> Result<Option<c_long>> { -+ let raw = unsafe { -+ Errno::clear(); -+ libc::fpathconf(fd, var as c_int) -+ }; -+ if raw == -1 { -+ if errno::errno() == 0 { -+ Ok(None) -+ } else { -+ Err(Error::Sys(Errno::last())) -+ } -+ } else { -+ Ok(Some(raw)) -+ } -+} -+ -+/// Get path-dependent configurable system variables (see -+/// [pathconf(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/pathconf.html)) -+/// -+/// Returns the value of a path-dependent configurable system variable. Most -+/// supported variables also have associated compile-time constants, but POSIX -+/// allows their values to change at runtime. There are generally two types of -+/// `pathconf` variables: options and limits. See [pathconf(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/pathconf.html) for more details. -+/// -+/// # Parameters -+/// -+/// - `path`: Lookup the value of `var` for this file or directory -+/// - `var`: The `pathconf` variable to lookup -+/// -+/// # Returns -+/// -+/// - `Ok(Some(x))`: the variable's limit (for limit variables) or its -+/// implementation level (for option variables). Implementation levels are -+/// usually a decimal-coded date, such as 200112 for POSIX 2001.12 -+/// - `Ok(None)`: the variable has no limit (for limit variables) or is -+/// unsupported (for option variables) -+/// - `Err(x)`: an error occurred -+pub fn pathconf<P: ?Sized + NixPath>(path: &P, var: PathconfVar) -> Result<Option<c_long>> { -+ let raw = path.with_nix_path(|cstr| { -+ unsafe { -+ Errno::clear(); -+ libc::pathconf(cstr.as_ptr(), var as c_int) -+ } -+ })?; -+ if raw == -1 { -+ if errno::errno() == 0 { -+ Ok(None) -+ } else { -+ Err(Error::Sys(Errno::last())) -+ } -+ } else { -+ Ok(Some(raw)) -+ } -+} -+ -+/// Variable names for `sysconf` -+/// -+/// Nix uses the same naming convention for these variables as the -+/// [getconf(1)](http://pubs.opengroup.org/onlinepubs/9699919799/utilities/getconf.html) utility. -+/// That is, `SysconfVar` variables have the same name as the abstract variables -+/// shown in the `sysconf(3)` man page. Usually, it's the same as the C -+/// variable name without the leading `_SC_`. -+/// -+/// All of these symbols are standardized by POSIX 1003.1-2008, but haven't been -+/// implemented by all platforms. -+/// -+/// # References -+/// -+/// - [sysconf(3)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/sysconf.html) -+/// - [unistd.h](http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/unistd.h.html) -+/// - [limits.h](http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/limits.h.html) -+#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+#[repr(i32)] -+pub enum SysconfVar { -+ /// Maximum number of I/O operations in a single list I/O call supported by -+ /// the implementation. -+ AIO_LISTIO_MAX = libc::_SC_AIO_LISTIO_MAX, -+ /// Maximum number of outstanding asynchronous I/O operations supported by -+ /// the implementation. -+ AIO_MAX = libc::_SC_AIO_MAX, -+ #[cfg(any(target_os="android", target_os="dragonfly", target_os="freebsd", -+ target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ /// The maximum amount by which a process can decrease its asynchronous I/O -+ /// priority level from its own scheduling priority. -+ AIO_PRIO_DELTA_MAX = libc::_SC_AIO_PRIO_DELTA_MAX, -+ /// Maximum length of argument to the exec functions including environment data. -+ ARG_MAX = libc::_SC_ARG_MAX, -+ /// Maximum number of functions that may be registered with `atexit`. -+ ATEXIT_MAX = libc::_SC_ATEXIT_MAX, -+ /// Maximum obase values allowed by the bc utility. -+ BC_BASE_MAX = libc::_SC_BC_BASE_MAX, -+ /// Maximum number of elements permitted in an array by the bc utility. -+ BC_DIM_MAX = libc::_SC_BC_DIM_MAX, -+ /// Maximum scale value allowed by the bc utility. -+ BC_SCALE_MAX = libc::_SC_BC_SCALE_MAX, -+ /// Maximum length of a string constant accepted by the bc utility. -+ BC_STRING_MAX = libc::_SC_BC_STRING_MAX, -+ /// Maximum number of simultaneous processes per real user ID. -+ CHILD_MAX = libc::_SC_CHILD_MAX, -+ // _SC_CLK_TCK is obsolete -+ /// Maximum number of weights that can be assigned to an entry of the -+ /// LC_COLLATE order keyword in the locale definition file -+ COLL_WEIGHTS_MAX = libc::_SC_COLL_WEIGHTS_MAX, -+ /// Maximum number of timer expiration overruns. -+ DELAYTIMER_MAX = libc::_SC_DELAYTIMER_MAX, -+ /// Maximum number of expressions that can be nested within parentheses by -+ /// the expr utility. -+ EXPR_NEST_MAX = libc::_SC_EXPR_NEST_MAX, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// Maximum length of a host name (not including the terminating null) as -+ /// returned from the `gethostname` function -+ HOST_NAME_MAX = libc::_SC_HOST_NAME_MAX, -+ /// Maximum number of iovec structures that one process has available for -+ /// use with `readv` or `writev`. -+ IOV_MAX = libc::_SC_IOV_MAX, -+ /// Unless otherwise noted, the maximum length, in bytes, of a utility's -+ /// input line (either standard input or another file), when the utility is -+ /// described as processing text files. The length includes room for the -+ /// trailing <newline>. -+ LINE_MAX = libc::_SC_LINE_MAX, -+ /// Maximum length of a login name. -+ LOGIN_NAME_MAX = libc::_SC_LOGIN_NAME_MAX, -+ /// Maximum number of simultaneous supplementary group IDs per process. -+ NGROUPS_MAX = libc::_SC_NGROUPS_MAX, -+ /// Initial size of `getgrgid_r` and `getgrnam_r` data buffers -+ GETGR_R_SIZE_MAX = libc::_SC_GETGR_R_SIZE_MAX, -+ /// Initial size of `getpwuid_r` and `getpwnam_r` data buffers -+ GETPW_R_SIZE_MAX = libc::_SC_GETPW_R_SIZE_MAX, -+ /// The maximum number of open message queue descriptors a process may hold. -+ MQ_OPEN_MAX = libc::_SC_MQ_OPEN_MAX, -+ /// The maximum number of message priorities supported by the implementation. -+ MQ_PRIO_MAX = libc::_SC_MQ_PRIO_MAX, -+ /// A value one greater than the maximum value that the system may assign to -+ /// a newly-created file descriptor. -+ OPEN_MAX = libc::_SC_OPEN_MAX, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="openbsd"))] -+ /// The implementation supports the Advisory Information option. -+ _POSIX_ADVISORY_INFO = libc::_SC_ADVISORY_INFO, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation supports barriers. -+ _POSIX_BARRIERS = libc::_SC_BARRIERS, -+ /// The implementation supports asynchronous input and output. -+ _POSIX_ASYNCHRONOUS_IO = libc::_SC_ASYNCHRONOUS_IO, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation supports clock selection. -+ _POSIX_CLOCK_SELECTION = libc::_SC_CLOCK_SELECTION, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation supports the Process CPU-Time Clocks option. -+ _POSIX_CPUTIME = libc::_SC_CPUTIME, -+ /// The implementation supports the File Synchronization option. -+ _POSIX_FSYNC = libc::_SC_FSYNC, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="openbsd"))] -+ /// The implementation supports the IPv6 option. -+ _POSIX_IPV6 = libc::_SC_IPV6, -+ /// The implementation supports job control. -+ _POSIX_JOB_CONTROL = libc::_SC_JOB_CONTROL, -+ /// The implementation supports memory mapped Files. -+ _POSIX_MAPPED_FILES = libc::_SC_MAPPED_FILES, -+ /// The implementation supports the Process Memory Locking option. -+ _POSIX_MEMLOCK = libc::_SC_MEMLOCK, -+ /// The implementation supports the Range Memory Locking option. -+ _POSIX_MEMLOCK_RANGE = libc::_SC_MEMLOCK_RANGE, -+ /// The implementation supports memory protection. -+ _POSIX_MEMORY_PROTECTION = libc::_SC_MEMORY_PROTECTION, -+ /// The implementation supports the Message Passing option. -+ _POSIX_MESSAGE_PASSING = libc::_SC_MESSAGE_PASSING, -+ /// The implementation supports the Monotonic Clock option. -+ _POSIX_MONOTONIC_CLOCK = libc::_SC_MONOTONIC_CLOCK, -+ #[cfg(any(target_os="android", target_os="dragonfly", target_os="freebsd", -+ target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ /// The implementation supports the Prioritized Input and Output option. -+ _POSIX_PRIORITIZED_IO = libc::_SC_PRIORITIZED_IO, -+ /// The implementation supports the Process Scheduling option. -+ _POSIX_PRIORITY_SCHEDULING = libc::_SC_PRIORITY_SCHEDULING, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="openbsd"))] -+ /// The implementation supports the Raw Sockets option. -+ _POSIX_RAW_SOCKETS = libc::_SC_RAW_SOCKETS, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation supports read-write locks. -+ _POSIX_READER_WRITER_LOCKS = libc::_SC_READER_WRITER_LOCKS, -+ #[cfg(any(target_os = "android", target_os="dragonfly", target_os="freebsd", -+ target_os = "ios", target_os="linux", target_os = "macos", -+ target_os = "openbsd"))] -+ /// The implementation supports realtime signals. -+ _POSIX_REALTIME_SIGNALS = libc::_SC_REALTIME_SIGNALS, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation supports the Regular Expression Handling option. -+ _POSIX_REGEXP = libc::_SC_REGEXP, -+ /// Each process has a saved set-user-ID and a saved set-group-ID. -+ _POSIX_SAVED_IDS = libc::_SC_SAVED_IDS, -+ /// The implementation supports semaphores. -+ _POSIX_SEMAPHORES = libc::_SC_SEMAPHORES, -+ /// The implementation supports the Shared Memory Objects option. -+ _POSIX_SHARED_MEMORY_OBJECTS = libc::_SC_SHARED_MEMORY_OBJECTS, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation supports the POSIX shell. -+ _POSIX_SHELL = libc::_SC_SHELL, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation supports the Spawn option. -+ _POSIX_SPAWN = libc::_SC_SPAWN, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation supports spin locks. -+ _POSIX_SPIN_LOCKS = libc::_SC_SPIN_LOCKS, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="openbsd"))] -+ /// The implementation supports the Process Sporadic Server option. -+ _POSIX_SPORADIC_SERVER = libc::_SC_SPORADIC_SERVER, -+ #[cfg(any(target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ _POSIX_SS_REPL_MAX = libc::_SC_SS_REPL_MAX, -+ /// The implementation supports the Synchronized Input and Output option. -+ _POSIX_SYNCHRONIZED_IO = libc::_SC_SYNCHRONIZED_IO, -+ /// The implementation supports the Thread Stack Address Attribute option. -+ _POSIX_THREAD_ATTR_STACKADDR = libc::_SC_THREAD_ATTR_STACKADDR, -+ /// The implementation supports the Thread Stack Size Attribute option. -+ _POSIX_THREAD_ATTR_STACKSIZE = libc::_SC_THREAD_ATTR_STACKSIZE, -+ #[cfg(any(target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="netbsd", target_os="openbsd"))] -+ /// The implementation supports the Thread CPU-Time Clocks option. -+ _POSIX_THREAD_CPUTIME = libc::_SC_THREAD_CPUTIME, -+ /// The implementation supports the Non-Robust Mutex Priority Inheritance -+ /// option. -+ _POSIX_THREAD_PRIO_INHERIT = libc::_SC_THREAD_PRIO_INHERIT, -+ /// The implementation supports the Non-Robust Mutex Priority Protection option. -+ _POSIX_THREAD_PRIO_PROTECT = libc::_SC_THREAD_PRIO_PROTECT, -+ /// The implementation supports the Thread Execution Scheduling option. -+ _POSIX_THREAD_PRIORITY_SCHEDULING = libc::_SC_THREAD_PRIORITY_SCHEDULING, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation supports the Thread Process-Shared Synchronization -+ /// option. -+ _POSIX_THREAD_PROCESS_SHARED = libc::_SC_THREAD_PROCESS_SHARED, -+ #[cfg(any(target_os="dragonfly", target_os="linux", target_os="openbsd"))] -+ /// The implementation supports the Robust Mutex Priority Inheritance option. -+ _POSIX_THREAD_ROBUST_PRIO_INHERIT = libc::_SC_THREAD_ROBUST_PRIO_INHERIT, -+ #[cfg(any(target_os="dragonfly", target_os="linux", target_os="openbsd"))] -+ /// The implementation supports the Robust Mutex Priority Protection option. -+ _POSIX_THREAD_ROBUST_PRIO_PROTECT = libc::_SC_THREAD_ROBUST_PRIO_PROTECT, -+ /// The implementation supports thread-safe functions. -+ _POSIX_THREAD_SAFE_FUNCTIONS = libc::_SC_THREAD_SAFE_FUNCTIONS, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="openbsd"))] -+ /// The implementation supports the Thread Sporadic Server option. -+ _POSIX_THREAD_SPORADIC_SERVER = libc::_SC_THREAD_SPORADIC_SERVER, -+ /// The implementation supports threads. -+ _POSIX_THREADS = libc::_SC_THREADS, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="openbsd"))] -+ /// The implementation supports timeouts. -+ _POSIX_TIMEOUTS = libc::_SC_TIMEOUTS, -+ /// The implementation supports timers. -+ _POSIX_TIMERS = libc::_SC_TIMERS, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="openbsd"))] -+ /// The implementation supports the Trace option. -+ _POSIX_TRACE = libc::_SC_TRACE, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="openbsd"))] -+ /// The implementation supports the Trace Event Filter option. -+ _POSIX_TRACE_EVENT_FILTER = libc::_SC_TRACE_EVENT_FILTER, -+ #[cfg(any(target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ _POSIX_TRACE_EVENT_NAME_MAX = libc::_SC_TRACE_EVENT_NAME_MAX, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="openbsd"))] -+ /// The implementation supports the Trace Inherit option. -+ _POSIX_TRACE_INHERIT = libc::_SC_TRACE_INHERIT, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="openbsd"))] -+ /// The implementation supports the Trace Log option. -+ _POSIX_TRACE_LOG = libc::_SC_TRACE_LOG, -+ #[cfg(any(target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ _POSIX_TRACE_NAME_MAX = libc::_SC_TRACE_NAME_MAX, -+ #[cfg(any(target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ _POSIX_TRACE_SYS_MAX = libc::_SC_TRACE_SYS_MAX, -+ #[cfg(any(target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ _POSIX_TRACE_USER_EVENT_MAX = libc::_SC_TRACE_USER_EVENT_MAX, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="openbsd"))] -+ /// The implementation supports the Typed Memory Objects option. -+ _POSIX_TYPED_MEMORY_OBJECTS = libc::_SC_TYPED_MEMORY_OBJECTS, -+ /// Integer value indicating version of this standard (C-language binding) -+ /// to which the implementation conforms. For implementations conforming to -+ /// POSIX.1-2008, the value shall be 200809L. -+ _POSIX_VERSION = libc::_SC_VERSION, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation provides a C-language compilation environment with -+ /// 32-bit `int`, `long`, `pointer`, and `off_t` types. -+ _POSIX_V6_ILP32_OFF32 = libc::_SC_V6_ILP32_OFF32, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation provides a C-language compilation environment with -+ /// 32-bit `int`, `long`, and pointer types and an `off_t` type using at -+ /// least 64 bits. -+ _POSIX_V6_ILP32_OFFBIG = libc::_SC_V6_ILP32_OFFBIG, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation provides a C-language compilation environment with -+ /// 32-bit `int` and 64-bit `long`, `pointer`, and `off_t` types. -+ _POSIX_V6_LP64_OFF64 = libc::_SC_V6_LP64_OFF64, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation provides a C-language compilation environment with an -+ /// `int` type using at least 32 bits and `long`, pointer, and `off_t` types -+ /// using at least 64 bits. -+ _POSIX_V6_LPBIG_OFFBIG = libc::_SC_V6_LPBIG_OFFBIG, -+ /// The implementation supports the C-Language Binding option. -+ _POSIX2_C_BIND = libc::_SC_2_C_BIND, -+ /// The implementation supports the C-Language Development Utilities option. -+ _POSIX2_C_DEV = libc::_SC_2_C_DEV, -+ /// The implementation supports the Terminal Characteristics option. -+ _POSIX2_CHAR_TERM = libc::_SC_2_CHAR_TERM, -+ /// The implementation supports the FORTRAN Development Utilities option. -+ _POSIX2_FORT_DEV = libc::_SC_2_FORT_DEV, -+ /// The implementation supports the FORTRAN Runtime Utilities option. -+ _POSIX2_FORT_RUN = libc::_SC_2_FORT_RUN, -+ /// The implementation supports the creation of locales by the localedef -+ /// utility. -+ _POSIX2_LOCALEDEF = libc::_SC_2_LOCALEDEF, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation supports the Batch Environment Services and Utilities -+ /// option. -+ _POSIX2_PBS = libc::_SC_2_PBS, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation supports the Batch Accounting option. -+ _POSIX2_PBS_ACCOUNTING = libc::_SC_2_PBS_ACCOUNTING, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation supports the Batch Checkpoint/Restart option. -+ _POSIX2_PBS_CHECKPOINT = libc::_SC_2_PBS_CHECKPOINT, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation supports the Locate Batch Job Request option. -+ _POSIX2_PBS_LOCATE = libc::_SC_2_PBS_LOCATE, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation supports the Batch Job Message Request option. -+ _POSIX2_PBS_MESSAGE = libc::_SC_2_PBS_MESSAGE, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ /// The implementation supports the Track Batch Job Request option. -+ _POSIX2_PBS_TRACK = libc::_SC_2_PBS_TRACK, -+ /// The implementation supports the Software Development Utilities option. -+ _POSIX2_SW_DEV = libc::_SC_2_SW_DEV, -+ /// The implementation supports the User Portability Utilities option. -+ _POSIX2_UPE = libc::_SC_2_UPE, -+ /// Integer value indicating version of the Shell and Utilities volume of -+ /// POSIX.1 to which the implementation conforms. -+ _POSIX2_VERSION = libc::_SC_2_VERSION, -+ /// The size of a system page in bytes. -+ /// -+ /// POSIX also defines an alias named `PAGESIZE`, but Rust does not allow two -+ /// enum constants to have the same value, so nix omits `PAGESIZE`. -+ PAGE_SIZE = libc::_SC_PAGE_SIZE, -+ PTHREAD_DESTRUCTOR_ITERATIONS = libc::_SC_THREAD_DESTRUCTOR_ITERATIONS, -+ PTHREAD_KEYS_MAX = libc::_SC_THREAD_KEYS_MAX, -+ PTHREAD_STACK_MIN = libc::_SC_THREAD_STACK_MIN, -+ PTHREAD_THREADS_MAX = libc::_SC_THREAD_THREADS_MAX, -+ RE_DUP_MAX = libc::_SC_RE_DUP_MAX, -+ #[cfg(any(target_os="android", target_os="dragonfly", target_os="freebsd", -+ target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ RTSIG_MAX = libc::_SC_RTSIG_MAX, -+ SEM_NSEMS_MAX = libc::_SC_SEM_NSEMS_MAX, -+ #[cfg(any(target_os="android", target_os="dragonfly", target_os="freebsd", -+ target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ SEM_VALUE_MAX = libc::_SC_SEM_VALUE_MAX, -+ #[cfg(any(target_os = "android", target_os="dragonfly", target_os="freebsd", -+ target_os = "ios", target_os="linux", target_os = "macos", -+ target_os = "openbsd"))] -+ SIGQUEUE_MAX = libc::_SC_SIGQUEUE_MAX, -+ STREAM_MAX = libc::_SC_STREAM_MAX, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="netbsd", -+ target_os="openbsd"))] -+ SYMLOOP_MAX = libc::_SC_SYMLOOP_MAX, -+ TIMER_MAX = libc::_SC_TIMER_MAX, -+ TTY_NAME_MAX = libc::_SC_TTY_NAME_MAX, -+ TZNAME_MAX = libc::_SC_TZNAME_MAX, -+ #[cfg(any(target_os="android", target_os="dragonfly", target_os="freebsd", -+ target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ /// The implementation supports the X/Open Encryption Option Group. -+ _XOPEN_CRYPT = libc::_SC_XOPEN_CRYPT, -+ #[cfg(any(target_os="android", target_os="dragonfly", target_os="freebsd", -+ target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ /// The implementation supports the Issue 4, Version 2 Enhanced -+ /// Internationalization Option Group. -+ _XOPEN_ENH_I18N = libc::_SC_XOPEN_ENH_I18N, -+ #[cfg(any(target_os="android", target_os="dragonfly", target_os="freebsd", -+ target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ _XOPEN_LEGACY = libc::_SC_XOPEN_LEGACY, -+ #[cfg(any(target_os="android", target_os="dragonfly", target_os="freebsd", -+ target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ /// The implementation supports the X/Open Realtime Option Group. -+ _XOPEN_REALTIME = libc::_SC_XOPEN_REALTIME, -+ #[cfg(any(target_os="android", target_os="dragonfly", target_os="freebsd", -+ target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ /// The implementation supports the X/Open Realtime Threads Option Group. -+ _XOPEN_REALTIME_THREADS = libc::_SC_XOPEN_REALTIME_THREADS, -+ /// The implementation supports the Issue 4, Version 2 Shared Memory Option -+ /// Group. -+ _XOPEN_SHM = libc::_SC_XOPEN_SHM, -+ #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", -+ target_os="linux", target_os = "macos", target_os="openbsd"))] -+ /// The implementation supports the XSI STREAMS Option Group. -+ _XOPEN_STREAMS = libc::_SC_XOPEN_STREAMS, -+ #[cfg(any(target_os="android", target_os="dragonfly", target_os="freebsd", -+ target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ /// The implementation supports the XSI option -+ _XOPEN_UNIX = libc::_SC_XOPEN_UNIX, -+ #[cfg(any(target_os="android", target_os="dragonfly", target_os="freebsd", -+ target_os = "ios", target_os="linux", target_os = "macos", -+ target_os="openbsd"))] -+ /// Integer value indicating version of the X/Open Portability Guide to -+ /// which the implementation conforms. -+ _XOPEN_VERSION = libc::_SC_XOPEN_VERSION, -+} -+ -+/// Get configurable system variables (see -+/// [sysconf(3)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/sysconf.html)) -+/// -+/// Returns the value of a configurable system variable. Most supported -+/// variables also have associated compile-time constants, but POSIX -+/// allows their values to change at runtime. There are generally two types of -+/// sysconf variables: options and limits. See sysconf(3) for more details. -+/// -+/// # Returns -+/// -+/// - `Ok(Some(x))`: the variable's limit (for limit variables) or its -+/// implementation level (for option variables). Implementation levels are -+/// usually a decimal-coded date, such as 200112 for POSIX 2001.12 -+/// - `Ok(None)`: the variable has no limit (for limit variables) or is -+/// unsupported (for option variables) -+/// - `Err(x)`: an error occurred -+pub fn sysconf(var: SysconfVar) -> Result<Option<c_long>> { -+ let raw = unsafe { -+ Errno::clear(); -+ libc::sysconf(var as c_int) -+ }; -+ if raw == -1 { -+ if errno::errno() == 0 { -+ Ok(None) -+ } else { -+ Err(Error::Sys(Errno::last())) -+ } -+ } else { -+ Ok(Some(raw)) -+ } -+} -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+mod pivot_root { -+ use libc; -+ use {Result, NixPath}; -+ use errno::Errno; -+ -+ pub fn pivot_root<P1: ?Sized + NixPath, P2: ?Sized + NixPath>( -+ new_root: &P1, put_old: &P2) -> Result<()> { -+ let res = new_root.with_nix_path(|new_root| { -+ put_old.with_nix_path(|put_old| { -+ unsafe { -+ libc::syscall(libc::SYS_pivot_root, new_root.as_ptr(), put_old.as_ptr()) -+ } -+ }) -+ })??; -+ -+ Errno::result(res).map(drop) -+ } -+} -+ -+#[cfg(any(target_os = "android", target_os = "freebsd", -+ target_os = "linux", target_os = "openbsd"))] -+mod setres { -+ use libc; -+ use Result; -+ use errno::Errno; -+ use super::{Uid, Gid}; -+ -+ /// Sets the real, effective, and saved uid. -+ /// ([see setresuid(2)](http://man7.org/linux/man-pages/man2/setresuid.2.html)) -+ /// -+ /// * `ruid`: real user id -+ /// * `euid`: effective user id -+ /// * `suid`: saved user id -+ /// * returns: Ok or libc error code. -+ /// -+ /// Err is returned if the user doesn't have permission to set this UID. -+ #[inline] -+ pub fn setresuid(ruid: Uid, euid: Uid, suid: Uid) -> Result<()> { -+ let res = unsafe { libc::setresuid(ruid.into(), euid.into(), suid.into()) }; -+ -+ Errno::result(res).map(drop) -+ } -+ -+ /// Sets the real, effective, and saved gid. -+ /// ([see setresuid(2)](http://man7.org/linux/man-pages/man2/setresuid.2.html)) -+ /// -+ /// * `rgid`: real group id -+ /// * `egid`: effective group id -+ /// * `sgid`: saved group id -+ /// * returns: Ok or libc error code. -+ /// -+ /// Err is returned if the user doesn't have permission to set this GID. -+ #[inline] -+ pub fn setresgid(rgid: Gid, egid: Gid, sgid: Gid) -> Result<()> { -+ let res = unsafe { libc::setresgid(rgid.into(), egid.into(), sgid.into()) }; -+ -+ Errno::result(res).map(drop) -+ } -+} -+ -+libc_bitflags!{ -+ /// Options for access() -+ pub struct AccessFlags : c_int { -+ /// Test for existence of file. -+ F_OK; -+ /// Test for read permission. -+ R_OK; -+ /// Test for write permission. -+ W_OK; -+ /// Test for execute (search) permission. -+ X_OK; -+ } -+} -+ -+/// Checks the file named by `path` for accessibility according to the flags given by `amode` -+/// See [access(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/access.html) -+pub fn access<P: ?Sized + NixPath>(path: &P, amode: AccessFlags) -> Result<()> { -+ let res = path.with_nix_path(|cstr| { -+ unsafe { -+ libc::access(cstr.as_ptr(), amode.bits) -+ } -+ })?; -+ Errno::result(res).map(drop) -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/mod.rs b/third_party/rust/nix-0.15.0/test/sys/mod.rs -new file mode 100644 -index 0000000000000..60a58dd106f19 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/mod.rs -@@ -0,0 +1,38 @@ -+mod test_signal; -+ -+// NOTE: DragonFly lacks a kernel-level implementation of Posix AIO as of -+// this writing. There is an user-level implementation, but whether aio -+// works or not heavily depends on which pthread implementation is chosen -+// by the user at link time. For this reason we do not want to run aio test -+// cases on DragonFly. -+#[cfg(any(target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd"))] -+mod test_aio; -+#[cfg(target_os = "linux")] -+mod test_signalfd; -+mod test_socket; -+mod test_sockopt; -+mod test_select; -+#[cfg(any(target_os = "android", target_os = "linux"))] -+mod test_sysinfo; -+mod test_termios; -+mod test_ioctl; -+mod test_wait; -+mod test_uio; -+ -+#[cfg(target_os = "linux")] -+mod test_epoll; -+#[cfg(target_os = "linux")] -+mod test_inotify; -+mod test_pthread; -+#[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+mod test_ptrace; -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_aio.rs b/third_party/rust/nix-0.15.0/test/sys/test_aio.rs -new file mode 100644 -index 0000000000000..d4b09b0b81905 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_aio.rs -@@ -0,0 +1,654 @@ -+use bytes::{Bytes, BytesMut}; -+use libc::{c_int, c_void}; -+use nix::{Error, Result}; -+use nix::errno::*; -+use nix::sys::aio::*; -+use nix::sys::signal::{SaFlags, SigAction, sigaction, SigevNotify, SigHandler, Signal, SigSet}; -+use nix::sys::time::{TimeSpec, TimeValLike}; -+use std::io::{Write, Read, Seek, SeekFrom}; -+use std::ops::Deref; -+use std::os::unix::io::AsRawFd; -+use std::sync::atomic::{AtomicBool, Ordering}; -+use std::{thread, time}; -+use tempfile::tempfile; -+ -+// Helper that polls an AioCb for completion or error -+fn poll_aio(aiocb: &mut AioCb) -> Result<()> { -+ loop { -+ let err = aiocb.error(); -+ if err != Err(Error::from(Errno::EINPROGRESS)) { return err; }; -+ thread::sleep(time::Duration::from_millis(10)); -+ } -+} -+ -+#[test] -+fn test_accessors() { -+ let mut rbuf = vec![0; 4]; -+ let aiocb = AioCb::from_mut_slice( 1001, -+ 2, //offset -+ &mut rbuf, -+ 42, //priority -+ SigevNotify::SigevSignal { -+ signal: Signal::SIGUSR2, -+ si_value: 99 -+ }, -+ LioOpcode::LIO_NOP); -+ assert_eq!(1001, aiocb.fd()); -+ assert_eq!(Some(LioOpcode::LIO_NOP), aiocb.lio_opcode()); -+ assert_eq!(4, aiocb.nbytes()); -+ assert_eq!(2, aiocb.offset()); -+ assert_eq!(42, aiocb.priority()); -+ let sev = aiocb.sigevent().sigevent(); -+ assert_eq!(Signal::SIGUSR2 as i32, sev.sigev_signo); -+ assert_eq!(99, sev.sigev_value.sival_ptr as i64); -+} -+ -+// Tests AioCb.cancel. We aren't trying to test the OS's implementation, only -+// our bindings. So it's sufficient to check that AioCb.cancel returned any -+// AioCancelStat value. -+#[test] -+#[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+fn test_cancel() { -+ let wbuf: &[u8] = b"CDEF"; -+ -+ let f = tempfile().unwrap(); -+ let mut aiocb = AioCb::from_slice( f.as_raw_fd(), -+ 0, //offset -+ wbuf, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_NOP); -+ aiocb.write().unwrap(); -+ let err = aiocb.error(); -+ assert!(err == Ok(()) || err == Err(Error::from(Errno::EINPROGRESS))); -+ -+ let cancelstat = aiocb.cancel(); -+ assert!(cancelstat.is_ok()); -+ -+ // Wait for aiocb to complete, but don't care whether it succeeded -+ let _ = poll_aio(&mut aiocb); -+ let _ = aiocb.aio_return(); -+} -+ -+// Tests using aio_cancel_all for all outstanding IOs. -+#[test] -+#[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+fn test_aio_cancel_all() { -+ let wbuf: &[u8] = b"CDEF"; -+ -+ let f = tempfile().unwrap(); -+ let mut aiocb = AioCb::from_slice(f.as_raw_fd(), -+ 0, //offset -+ wbuf, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_NOP); -+ aiocb.write().unwrap(); -+ let err = aiocb.error(); -+ assert!(err == Ok(()) || err == Err(Error::from(Errno::EINPROGRESS))); -+ -+ let cancelstat = aio_cancel_all(f.as_raw_fd()); -+ assert!(cancelstat.is_ok()); -+ -+ // Wait for aiocb to complete, but don't care whether it succeeded -+ let _ = poll_aio(&mut aiocb); -+ let _ = aiocb.aio_return(); -+} -+ -+#[test] -+#[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+fn test_fsync() { -+ const INITIAL: &[u8] = b"abcdef123456"; -+ let mut f = tempfile().unwrap(); -+ f.write_all(INITIAL).unwrap(); -+ let mut aiocb = AioCb::from_fd( f.as_raw_fd(), -+ 0, //priority -+ SigevNotify::SigevNone); -+ let err = aiocb.fsync(AioFsyncMode::O_SYNC); -+ assert!(err.is_ok()); -+ poll_aio(&mut aiocb).unwrap(); -+ aiocb.aio_return().unwrap(); -+} -+ -+/// `AioCb::fsync` should not modify the `AioCb` object if `libc::aio_fsync` returns -+/// an error -+// Skip on Linux, because Linux's AIO implementation can't detect errors -+// synchronously -+#[test] -+#[cfg(any(target_os = "freebsd", target_os = "macos"))] -+fn test_fsync_error() { -+ use std::mem; -+ -+ const INITIAL: &[u8] = b"abcdef123456"; -+ // Create an invalid AioFsyncMode -+ let mode = unsafe { mem::transmute(666) }; -+ let mut f = tempfile().unwrap(); -+ f.write_all(INITIAL).unwrap(); -+ let mut aiocb = AioCb::from_fd( f.as_raw_fd(), -+ 0, //priority -+ SigevNotify::SigevNone); -+ let err = aiocb.fsync(mode); -+ assert!(err.is_err()); -+} -+ -+#[test] -+#[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+fn test_aio_suspend() { -+ const INITIAL: &[u8] = b"abcdef123456"; -+ const WBUF: &[u8] = b"CDEFG"; -+ let timeout = TimeSpec::seconds(10); -+ let mut rbuf = vec![0; 4]; -+ let rlen = rbuf.len(); -+ let mut f = tempfile().unwrap(); -+ f.write_all(INITIAL).unwrap(); -+ -+ let mut wcb = AioCb::from_slice( f.as_raw_fd(), -+ 2, //offset -+ WBUF, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_WRITE); -+ -+ let mut rcb = AioCb::from_mut_slice( f.as_raw_fd(), -+ 8, //offset -+ &mut rbuf, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_READ); -+ wcb.write().unwrap(); -+ rcb.read().unwrap(); -+ loop { -+ { -+ let cbbuf = [&wcb, &rcb]; -+ assert!(aio_suspend(&cbbuf[..], Some(timeout)).is_ok()); -+ } -+ if rcb.error() != Err(Error::from(Errno::EINPROGRESS)) && -+ wcb.error() != Err(Error::from(Errno::EINPROGRESS)) { -+ break -+ } -+ } -+ -+ assert!(wcb.aio_return().unwrap() as usize == WBUF.len()); -+ assert!(rcb.aio_return().unwrap() as usize == rlen); -+} -+ -+// Test a simple aio operation with no completion notification. We must poll -+// for completion -+#[test] -+#[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+fn test_read() { -+ const INITIAL: &[u8] = b"abcdef123456"; -+ let mut rbuf = vec![0; 4]; -+ const EXPECT: &[u8] = b"cdef"; -+ let mut f = tempfile().unwrap(); -+ f.write_all(INITIAL).unwrap(); -+ { -+ let mut aiocb = AioCb::from_mut_slice( f.as_raw_fd(), -+ 2, //offset -+ &mut rbuf, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_NOP); -+ aiocb.read().unwrap(); -+ -+ let err = poll_aio(&mut aiocb); -+ assert!(err == Ok(())); -+ assert!(aiocb.aio_return().unwrap() as usize == EXPECT.len()); -+ } -+ -+ assert!(EXPECT == rbuf.deref().deref()); -+} -+ -+/// `AioCb::read` should not modify the `AioCb` object if `libc::aio_read` -+/// returns an error -+// Skip on Linux, because Linux's AIO implementation can't detect errors -+// synchronously -+#[test] -+#[cfg(any(target_os = "freebsd", target_os = "macos"))] -+fn test_read_error() { -+ const INITIAL: &[u8] = b"abcdef123456"; -+ let mut rbuf = vec![0; 4]; -+ let mut f = tempfile().unwrap(); -+ f.write_all(INITIAL).unwrap(); -+ let mut aiocb = AioCb::from_mut_slice( f.as_raw_fd(), -+ -1, //an invalid offset -+ &mut rbuf, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_NOP); -+ assert!(aiocb.read().is_err()); -+} -+ -+// Tests from_mut_slice -+#[test] -+#[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+fn test_read_into_mut_slice() { -+ const INITIAL: &[u8] = b"abcdef123456"; -+ let mut rbuf = vec![0; 4]; -+ const EXPECT: &[u8] = b"cdef"; -+ let mut f = tempfile().unwrap(); -+ f.write_all(INITIAL).unwrap(); -+ { -+ let mut aiocb = AioCb::from_mut_slice( f.as_raw_fd(), -+ 2, //offset -+ &mut rbuf, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_NOP); -+ aiocb.read().unwrap(); -+ -+ let err = poll_aio(&mut aiocb); -+ assert!(err == Ok(())); -+ assert!(aiocb.aio_return().unwrap() as usize == EXPECT.len()); -+ } -+ -+ assert!(rbuf == EXPECT); -+} -+ -+// Tests from_ptr -+#[test] -+#[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+fn test_read_into_pointer() { -+ const INITIAL: &[u8] = b"abcdef123456"; -+ let mut rbuf = vec![0; 4]; -+ const EXPECT: &[u8] = b"cdef"; -+ let mut f = tempfile().unwrap(); -+ f.write_all(INITIAL).unwrap(); -+ { -+ // Safety: ok because rbuf lives until after poll_aio -+ let mut aiocb = unsafe { -+ AioCb::from_mut_ptr( f.as_raw_fd(), -+ 2, //offset -+ rbuf.as_mut_ptr() as *mut c_void, -+ rbuf.len(), -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_NOP) -+ }; -+ aiocb.read().unwrap(); -+ -+ let err = poll_aio(&mut aiocb); -+ assert!(err == Ok(())); -+ assert!(aiocb.aio_return().unwrap() as usize == EXPECT.len()); -+ } -+ -+ assert!(rbuf == EXPECT); -+} -+ -+// Test reading into an immutable buffer. It should fail -+// FIXME: This test fails to panic on Linux/musl -+#[test] -+#[should_panic(expected = "Can't read into an immutable buffer")] -+#[cfg_attr(target_env = "musl", ignore)] -+fn test_read_immutable_buffer() { -+ let rbuf: &[u8] = b"CDEF"; -+ let f = tempfile().unwrap(); -+ let mut aiocb = AioCb::from_slice( f.as_raw_fd(), -+ 2, //offset -+ rbuf, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_NOP); -+ aiocb.read().unwrap(); -+} -+ -+ -+// Test a simple aio operation with no completion notification. We must poll -+// for completion. Unlike test_aio_read, this test uses AioCb::from_slice -+#[test] -+#[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+fn test_write() { -+ const INITIAL: &[u8] = b"abcdef123456"; -+ let wbuf = "CDEF".to_string().into_bytes(); -+ let mut rbuf = Vec::new(); -+ const EXPECT: &[u8] = b"abCDEF123456"; -+ -+ let mut f = tempfile().unwrap(); -+ f.write_all(INITIAL).unwrap(); -+ let mut aiocb = AioCb::from_slice( f.as_raw_fd(), -+ 2, //offset -+ &wbuf, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_NOP); -+ aiocb.write().unwrap(); -+ -+ let err = poll_aio(&mut aiocb); -+ assert!(err == Ok(())); -+ assert!(aiocb.aio_return().unwrap() as usize == wbuf.len()); -+ -+ f.seek(SeekFrom::Start(0)).unwrap(); -+ let len = f.read_to_end(&mut rbuf).unwrap(); -+ assert!(len == EXPECT.len()); -+ assert!(rbuf == EXPECT); -+} -+ -+// Tests `AioCb::from_boxed_slice` with `Bytes` -+#[test] -+#[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+fn test_write_bytes() { -+ const INITIAL: &[u8] = b"abcdef123456"; -+ let wbuf = Box::new(Bytes::from(&b"CDEF"[..])); -+ let mut rbuf = Vec::new(); -+ const EXPECT: &[u8] = b"abCDEF123456"; -+ let expected_len = wbuf.len(); -+ -+ let mut f = tempfile().unwrap(); -+ f.write_all(INITIAL).unwrap(); -+ let mut aiocb = AioCb::from_boxed_slice( f.as_raw_fd(), -+ 2, //offset -+ wbuf, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_NOP); -+ aiocb.write().unwrap(); -+ -+ let err = poll_aio(&mut aiocb); -+ assert!(err == Ok(())); -+ assert!(aiocb.aio_return().unwrap() as usize == expected_len); -+ -+ f.seek(SeekFrom::Start(0)).unwrap(); -+ let len = f.read_to_end(&mut rbuf).unwrap(); -+ assert!(len == EXPECT.len()); -+ assert!(rbuf == EXPECT); -+} -+ -+// Tests `AioCb::from_boxed_mut_slice` with `BytesMut` -+#[test] -+#[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+fn test_read_bytes_mut_small() { -+ const INITIAL: &[u8] = b"abcdef"; -+ let rbuf = Box::new(BytesMut::from(vec![0; 4])); -+ const EXPECT: &[u8] = b"cdef"; -+ let mut f = tempfile().unwrap(); -+ f.write_all(INITIAL).unwrap(); -+ -+ let mut aiocb = AioCb::from_boxed_mut_slice( f.as_raw_fd(), -+ 2, //offset -+ rbuf, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_NOP); -+ aiocb.read().unwrap(); -+ -+ let err = poll_aio(&mut aiocb); -+ assert_eq!(err, Ok(())); -+ assert_eq!(aiocb.aio_return().unwrap() as usize, EXPECT.len()); -+ let buffer = aiocb.boxed_mut_slice().unwrap(); -+ assert_eq!(buffer.borrow(), EXPECT); -+} -+ -+// Tests `AioCb::from_ptr` -+#[test] -+#[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+fn test_write_from_pointer() { -+ const INITIAL: &[u8] = b"abcdef123456"; -+ let wbuf = "CDEF".to_string().into_bytes(); -+ let mut rbuf = Vec::new(); -+ const EXPECT: &[u8] = b"abCDEF123456"; -+ -+ let mut f = tempfile().unwrap(); -+ f.write_all(INITIAL).unwrap(); -+ // Safety: ok because aiocb outlives poll_aio -+ let mut aiocb = unsafe { -+ AioCb::from_ptr( f.as_raw_fd(), -+ 2, //offset -+ wbuf.as_ptr() as *const c_void, -+ wbuf.len(), -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_NOP) -+ }; -+ aiocb.write().unwrap(); -+ -+ let err = poll_aio(&mut aiocb); -+ assert!(err == Ok(())); -+ assert!(aiocb.aio_return().unwrap() as usize == wbuf.len()); -+ -+ f.seek(SeekFrom::Start(0)).unwrap(); -+ let len = f.read_to_end(&mut rbuf).unwrap(); -+ assert!(len == EXPECT.len()); -+ assert!(rbuf == EXPECT); -+} -+ -+/// `AioCb::write` should not modify the `AioCb` object if `libc::aio_write` -+/// returns an error -+// Skip on Linux, because Linux's AIO implementation can't detect errors -+// synchronously -+#[test] -+#[cfg(any(target_os = "freebsd", target_os = "macos"))] -+fn test_write_error() { -+ let wbuf = "CDEF".to_string().into_bytes(); -+ let mut aiocb = AioCb::from_slice( 666, // An invalid file descriptor -+ 0, //offset -+ &wbuf, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_NOP); -+ assert!(aiocb.write().is_err()); -+} -+ -+lazy_static! { -+ pub static ref SIGNALED: AtomicBool = AtomicBool::new(false); -+} -+ -+extern fn sigfunc(_: c_int) { -+ SIGNALED.store(true, Ordering::Relaxed); -+} -+ -+// Test an aio operation with completion delivered by a signal -+// FIXME: This test is ignored on mips because of failures in qemu in CI -+#[test] -+#[cfg_attr(any(all(target_env = "musl", target_arch = "x86_64"), target_arch = "mips", target_arch = "mips64"), ignore)] -+fn test_write_sigev_signal() { -+ let _m = ::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ let sa = SigAction::new(SigHandler::Handler(sigfunc), -+ SaFlags::SA_RESETHAND, -+ SigSet::empty()); -+ SIGNALED.store(false, Ordering::Relaxed); -+ unsafe { sigaction(Signal::SIGUSR2, &sa) }.unwrap(); -+ -+ const INITIAL: &[u8] = b"abcdef123456"; -+ const WBUF: &[u8] = b"CDEF"; -+ let mut rbuf = Vec::new(); -+ const EXPECT: &[u8] = b"abCDEF123456"; -+ -+ let mut f = tempfile().unwrap(); -+ f.write_all(INITIAL).unwrap(); -+ let mut aiocb = AioCb::from_slice( f.as_raw_fd(), -+ 2, //offset -+ WBUF, -+ 0, //priority -+ SigevNotify::SigevSignal { -+ signal: Signal::SIGUSR2, -+ si_value: 0 //TODO: validate in sigfunc -+ }, -+ LioOpcode::LIO_NOP); -+ aiocb.write().unwrap(); -+ while !SIGNALED.load(Ordering::Relaxed) { -+ thread::sleep(time::Duration::from_millis(10)); -+ } -+ -+ assert!(aiocb.aio_return().unwrap() as usize == WBUF.len()); -+ f.seek(SeekFrom::Start(0)).unwrap(); -+ let len = f.read_to_end(&mut rbuf).unwrap(); -+ assert!(len == EXPECT.len()); -+ assert!(rbuf == EXPECT); -+} -+ -+// Test LioCb::listio with LIO_WAIT, so all AIO ops should be complete by the -+// time listio returns. -+#[test] -+#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+#[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+fn test_liocb_listio_wait() { -+ const INITIAL: &[u8] = b"abcdef123456"; -+ const WBUF: &[u8] = b"CDEF"; -+ let mut rbuf = vec![0; 4]; -+ let rlen = rbuf.len(); -+ let mut rbuf2 = Vec::new(); -+ const EXPECT: &[u8] = b"abCDEF123456"; -+ let mut f = tempfile().unwrap(); -+ -+ f.write_all(INITIAL).unwrap(); -+ -+ { -+ let wcb = AioCb::from_slice( f.as_raw_fd(), -+ 2, //offset -+ WBUF, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_WRITE); -+ -+ let rcb = AioCb::from_mut_slice( f.as_raw_fd(), -+ 8, //offset -+ &mut rbuf, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_READ); -+ let mut liocb = LioCb::with_capacity(2); -+ liocb.aiocbs.push(wcb); -+ liocb.aiocbs.push(rcb); -+ let err = liocb.listio(LioMode::LIO_WAIT, SigevNotify::SigevNone); -+ err.expect("lio_listio"); -+ -+ assert!(liocb.aio_return(0).unwrap() as usize == WBUF.len()); -+ assert!(liocb.aio_return(1).unwrap() as usize == rlen); -+ } -+ assert!(rbuf.deref().deref() == b"3456"); -+ -+ f.seek(SeekFrom::Start(0)).unwrap(); -+ let len = f.read_to_end(&mut rbuf2).unwrap(); -+ assert!(len == EXPECT.len()); -+ assert!(rbuf2 == EXPECT); -+} -+ -+// Test LioCb::listio with LIO_NOWAIT and no SigEvent, so we must use some other -+// mechanism to check for the individual AioCb's completion. -+#[test] -+#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+#[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+fn test_liocb_listio_nowait() { -+ const INITIAL: &[u8] = b"abcdef123456"; -+ const WBUF: &[u8] = b"CDEF"; -+ let mut rbuf = vec![0; 4]; -+ let rlen = rbuf.len(); -+ let mut rbuf2 = Vec::new(); -+ const EXPECT: &[u8] = b"abCDEF123456"; -+ let mut f = tempfile().unwrap(); -+ -+ f.write_all(INITIAL).unwrap(); -+ -+ { -+ let wcb = AioCb::from_slice( f.as_raw_fd(), -+ 2, //offset -+ WBUF, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_WRITE); -+ -+ let rcb = AioCb::from_mut_slice( f.as_raw_fd(), -+ 8, //offset -+ &mut rbuf, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_READ); -+ let mut liocb = LioCb::with_capacity(2); -+ liocb.aiocbs.push(wcb); -+ liocb.aiocbs.push(rcb); -+ let err = liocb.listio(LioMode::LIO_NOWAIT, SigevNotify::SigevNone); -+ err.expect("lio_listio"); -+ -+ poll_aio(&mut liocb.aiocbs[0]).unwrap(); -+ poll_aio(&mut liocb.aiocbs[1]).unwrap(); -+ assert!(liocb.aiocbs[0].aio_return().unwrap() as usize == WBUF.len()); -+ assert!(liocb.aiocbs[1].aio_return().unwrap() as usize == rlen); -+ } -+ assert!(rbuf.deref().deref() == b"3456"); -+ -+ f.seek(SeekFrom::Start(0)).unwrap(); -+ let len = f.read_to_end(&mut rbuf2).unwrap(); -+ assert!(len == EXPECT.len()); -+ assert!(rbuf2 == EXPECT); -+} -+ -+// Test LioCb::listio with LIO_NOWAIT and a SigEvent to indicate when all -+// AioCb's are complete. -+// FIXME: This test is ignored on mips/mips64 because of failures in qemu in CI. -+#[test] -+#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+#[cfg_attr(any(target_arch = "mips", target_arch = "mips64", target_env = "musl"), ignore)] -+fn test_liocb_listio_signal() { -+ let _m = ::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ const INITIAL: &[u8] = b"abcdef123456"; -+ const WBUF: &[u8] = b"CDEF"; -+ let mut rbuf = vec![0; 4]; -+ let rlen = rbuf.len(); -+ let mut rbuf2 = Vec::new(); -+ const EXPECT: &[u8] = b"abCDEF123456"; -+ let mut f = tempfile().unwrap(); -+ let sa = SigAction::new(SigHandler::Handler(sigfunc), -+ SaFlags::SA_RESETHAND, -+ SigSet::empty()); -+ let sigev_notify = SigevNotify::SigevSignal { signal: Signal::SIGUSR2, -+ si_value: 0 }; -+ -+ f.write_all(INITIAL).unwrap(); -+ -+ { -+ let wcb = AioCb::from_slice( f.as_raw_fd(), -+ 2, //offset -+ WBUF, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_WRITE); -+ -+ let rcb = AioCb::from_mut_slice( f.as_raw_fd(), -+ 8, //offset -+ &mut rbuf, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_READ); -+ let mut liocb = LioCb::with_capacity(2); -+ liocb.aiocbs.push(wcb); -+ liocb.aiocbs.push(rcb); -+ SIGNALED.store(false, Ordering::Relaxed); -+ unsafe { sigaction(Signal::SIGUSR2, &sa) }.unwrap(); -+ let err = liocb.listio(LioMode::LIO_NOWAIT, sigev_notify); -+ err.expect("lio_listio"); -+ while !SIGNALED.load(Ordering::Relaxed) { -+ thread::sleep(time::Duration::from_millis(10)); -+ } -+ -+ assert!(liocb.aiocbs[0].aio_return().unwrap() as usize == WBUF.len()); -+ assert!(liocb.aiocbs[1].aio_return().unwrap() as usize == rlen); -+ } -+ assert!(rbuf.deref().deref() == b"3456"); -+ -+ f.seek(SeekFrom::Start(0)).unwrap(); -+ let len = f.read_to_end(&mut rbuf2).unwrap(); -+ assert!(len == EXPECT.len()); -+ assert!(rbuf2 == EXPECT); -+} -+ -+// Try to use LioCb::listio to read into an immutable buffer. It should fail -+// FIXME: This test fails to panic on Linux/musl -+#[test] -+#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+#[should_panic(expected = "Can't read into an immutable buffer")] -+#[cfg_attr(target_env = "musl", ignore)] -+fn test_liocb_listio_read_immutable() { -+ let rbuf: &[u8] = b"abcd"; -+ let f = tempfile().unwrap(); -+ -+ -+ let mut liocb = LioCb::from(vec![ -+ AioCb::from_slice( f.as_raw_fd(), -+ 2, //offset -+ rbuf, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_READ) -+ ]); -+ let _ = liocb.listio(LioMode::LIO_NOWAIT, SigevNotify::SigevNone); -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_aio_drop.rs b/third_party/rust/nix-0.15.0/test/sys/test_aio_drop.rs -new file mode 100644 -index 0000000000000..492da401ef726 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_aio_drop.rs -@@ -0,0 +1,32 @@ -+extern crate nix; -+extern crate tempfile; -+ -+// Test dropping an AioCb that hasn't yet finished. -+// This must happen in its own process, because on OSX this test seems to hose -+// the AIO subsystem and causes subsequent tests to fail -+#[test] -+#[should_panic(expected = "Dropped an in-progress AioCb")] -+#[cfg(all(not(target_env = "musl"), -+ any(target_os = "linux", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "freebsd", -+ target_os = "netbsd")))] -+fn test_drop() { -+ use nix::sys::aio::*; -+ use nix::sys::signal::*; -+ use std::os::unix::io::AsRawFd; -+ use tempfile::tempfile; -+ -+ const WBUF: &[u8] = b"CDEF"; -+ -+ let f = tempfile().unwrap(); -+ f.set_len(6).unwrap(); -+ let mut aiocb = AioCb::from_slice( f.as_raw_fd(), -+ 2, //offset -+ WBUF, -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_NOP); -+ aiocb.write().unwrap(); -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_epoll.rs b/third_party/rust/nix-0.15.0/test/sys/test_epoll.rs -new file mode 100644 -index 0000000000000..e0dc5131defe0 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_epoll.rs -@@ -0,0 +1,24 @@ -+use nix::sys::epoll::{EpollCreateFlags, EpollFlags, EpollOp, EpollEvent}; -+use nix::sys::epoll::{epoll_create1, epoll_ctl}; -+use nix::Error; -+use nix::errno::Errno; -+ -+#[test] -+pub fn test_epoll_errno() { -+ let efd = epoll_create1(EpollCreateFlags::empty()).unwrap(); -+ let result = epoll_ctl(efd, EpollOp::EpollCtlDel, 1, None); -+ assert!(result.is_err()); -+ assert_eq!(result.unwrap_err(), Error::Sys(Errno::ENOENT)); -+ -+ let result = epoll_ctl(efd, EpollOp::EpollCtlAdd, 1, None); -+ assert!(result.is_err()); -+ assert_eq!(result.unwrap_err(), Error::Sys(Errno::EINVAL)); -+} -+ -+#[test] -+pub fn test_epoll_ctl() { -+ let efd = epoll_create1(EpollCreateFlags::empty()).unwrap(); -+ let mut event = EpollEvent::new(EpollFlags::EPOLLIN | EpollFlags::EPOLLERR, 1); -+ epoll_ctl(efd, EpollOp::EpollCtlAdd, 1, &mut event).unwrap(); -+ epoll_ctl(efd, EpollOp::EpollCtlDel, 1, None).unwrap(); -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_inotify.rs b/third_party/rust/nix-0.15.0/test/sys/test_inotify.rs -new file mode 100644 -index 0000000000000..a8ead46d487ba ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_inotify.rs -@@ -0,0 +1,65 @@ -+use nix::sys::inotify::{AddWatchFlags,InitFlags,Inotify}; -+use nix::Error; -+use nix::errno::Errno; -+use tempfile; -+use std::ffi::OsString; -+use std::fs::{rename, File}; -+ -+#[test] -+pub fn test_inotify() { -+ let instance = Inotify::init(InitFlags::IN_NONBLOCK) -+ .unwrap(); -+ let tempdir = tempfile::tempdir().unwrap(); -+ -+ instance.add_watch(tempdir.path(), AddWatchFlags::IN_ALL_EVENTS).unwrap(); -+ -+ let events = instance.read_events(); -+ assert_eq!(events.unwrap_err(), Error::Sys(Errno::EAGAIN)); -+ -+ File::create(tempdir.path().join("test")).unwrap(); -+ -+ let events = instance.read_events().unwrap(); -+ assert_eq!(events[0].name, Some(OsString::from("test"))); -+} -+ -+#[test] -+pub fn test_inotify_multi_events() { -+ let instance = Inotify::init(InitFlags::IN_NONBLOCK) -+ .unwrap(); -+ let tempdir = tempfile::tempdir().unwrap(); -+ -+ instance.add_watch(tempdir.path(), AddWatchFlags::IN_ALL_EVENTS).unwrap(); -+ -+ let events = instance.read_events(); -+ assert_eq!(events.unwrap_err(), Error::Sys(Errno::EAGAIN)); -+ -+ File::create(tempdir.path().join("test")).unwrap(); -+ rename(tempdir.path().join("test"), tempdir.path().join("test2")).unwrap(); -+ -+ // Now there should be 5 events in queue: -+ // - IN_CREATE on test -+ // - IN_OPEN on test -+ // - IN_CLOSE_WRITE on test -+ // - IN_MOVED_FROM on test with a cookie -+ // - IN_MOVED_TO on test2 with the same cookie -+ -+ let events = instance.read_events().unwrap(); -+ assert_eq!(events.len(), 5); -+ -+ assert_eq!(events[0].mask, AddWatchFlags::IN_CREATE); -+ assert_eq!(events[0].name, Some(OsString::from("test"))); -+ -+ assert_eq!(events[1].mask, AddWatchFlags::IN_OPEN); -+ assert_eq!(events[1].name, Some(OsString::from("test"))); -+ -+ assert_eq!(events[2].mask, AddWatchFlags::IN_CLOSE_WRITE); -+ assert_eq!(events[2].name, Some(OsString::from("test"))); -+ -+ assert_eq!(events[3].mask, AddWatchFlags::IN_MOVED_FROM); -+ assert_eq!(events[3].name, Some(OsString::from("test"))); -+ -+ assert_eq!(events[4].mask, AddWatchFlags::IN_MOVED_TO); -+ assert_eq!(events[4].name, Some(OsString::from("test2"))); -+ -+ assert_eq!(events[3].cookie, events[4].cookie); -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_ioctl.rs b/third_party/rust/nix-0.15.0/test/sys/test_ioctl.rs -new file mode 100644 -index 0000000000000..0a439b3346f53 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_ioctl.rs -@@ -0,0 +1,334 @@ -+#![allow(dead_code)] -+ -+// Simple tests to ensure macro generated fns compile -+ioctl_none_bad!(do_bad, 0x1234); -+ioctl_read_bad!(do_bad_read, 0x1234, u16); -+ioctl_write_int_bad!(do_bad_write_int, 0x1234); -+ioctl_write_ptr_bad!(do_bad_write_ptr, 0x1234, u8); -+ioctl_readwrite_bad!(do_bad_readwrite, 0x1234, u32); -+ioctl_none!(do_none, 0, 0); -+ioctl_read!(read_test, 0, 0, u32); -+ioctl_write_int!(write_ptr_int, 0, 0); -+ioctl_write_ptr!(write_ptr_u8, 0, 0, u8); -+ioctl_write_ptr!(write_ptr_u32, 0, 0, u32); -+ioctl_write_ptr!(write_ptr_u64, 0, 0, u64); -+ioctl_readwrite!(readwrite_test, 0, 0, u64); -+ioctl_read_buf!(readbuf_test, 0, 0, u32); -+const SPI_IOC_MAGIC: u8 = b'k'; -+const SPI_IOC_MESSAGE: u8 = 0; -+ioctl_write_buf!(writebuf_test_consts, SPI_IOC_MAGIC, SPI_IOC_MESSAGE, u8); -+ioctl_write_buf!(writebuf_test_u8, 0, 0, u8); -+ioctl_write_buf!(writebuf_test_u32, 0, 0, u32); -+ioctl_write_buf!(writebuf_test_u64, 0, 0, u64); -+ioctl_readwrite_buf!(readwritebuf_test, 0, 0, u32); -+ -+// See C code for source of values for op calculations (does NOT work for mips/powerpc): -+// https://gist.github.com/posborne/83ea6880770a1aef332e -+// -+// TODO: Need a way to compute these constants at test time. Using precomputed -+// values is fragile and needs to be maintained. -+ -+#[cfg(any(target_os = "linux", target_os = "android"))] -+mod linux { -+ #[test] -+ fn test_op_none() { -+ if cfg!(any(target_arch = "mips", target_arch = "mips64", target_arch="powerpc", target_arch="powerpc64")){ -+ assert_eq!(request_code_none!(b'q', 10), 0x2000_710A); -+ assert_eq!(request_code_none!(b'a', 255), 0x2000_61FF); -+ } else { -+ assert_eq!(request_code_none!(b'q', 10), 0x0000_710A); -+ assert_eq!(request_code_none!(b'a', 255), 0x0000_61FF); -+ } -+ } -+ -+ #[test] -+ fn test_op_write() { -+ if cfg!(any(target_arch = "mips", target_arch = "mips64", target_arch="powerpc", target_arch="powerpc64")){ -+ assert_eq!(request_code_write!(b'z', 10, 1), 0x8001_7A0A); -+ assert_eq!(request_code_write!(b'z', 10, 512), 0x8200_7A0A); -+ } else { -+ assert_eq!(request_code_write!(b'z', 10, 1), 0x4001_7A0A); -+ assert_eq!(request_code_write!(b'z', 10, 512), 0x4200_7A0A); -+ } -+ } -+ -+ #[cfg(target_pointer_width = "64")] -+ #[test] -+ fn test_op_write_64() { -+ if cfg!(any(target_arch = "mips64", target_arch="powerpc64")){ -+ assert_eq!(request_code_write!(b'z', 10, (1 as u64) << 32), 0x8000_7A0A); -+ } else { -+ assert_eq!(request_code_write!(b'z', 10, (1 as u64) << 32), 0x4000_7A0A); -+ } -+ -+ } -+ -+ #[test] -+ fn test_op_read() { -+ if cfg!(any(target_arch = "mips", target_arch = "mips64", target_arch="powerpc", target_arch="powerpc64")){ -+ assert_eq!(request_code_read!(b'z', 10, 1), 0x4001_7A0A); -+ assert_eq!(request_code_read!(b'z', 10, 512), 0x4200_7A0A); -+ } else { -+ assert_eq!(request_code_read!(b'z', 10, 1), 0x8001_7A0A); -+ assert_eq!(request_code_read!(b'z', 10, 512), 0x8200_7A0A); -+ } -+ } -+ -+ #[cfg(target_pointer_width = "64")] -+ #[test] -+ fn test_op_read_64() { -+ if cfg!(any(target_arch = "mips64", target_arch="powerpc64")){ -+ assert_eq!(request_code_read!(b'z', 10, (1 as u64) << 32), 0x4000_7A0A); -+ } else { -+ assert_eq!(request_code_read!(b'z', 10, (1 as u64) << 32), 0x8000_7A0A); -+ } -+ } -+ -+ #[test] -+ fn test_op_read_write() { -+ assert_eq!(request_code_readwrite!(b'z', 10, 1), 0xC001_7A0A); -+ assert_eq!(request_code_readwrite!(b'z', 10, 512), 0xC200_7A0A); -+ } -+ -+ #[cfg(target_pointer_width = "64")] -+ #[test] -+ fn test_op_read_write_64() { -+ assert_eq!(request_code_readwrite!(b'z', 10, (1 as u64) << 32), 0xC000_7A0A); -+ } -+} -+ -+#[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] -+mod bsd { -+ #[test] -+ fn test_op_none() { -+ assert_eq!(request_code_none!(b'q', 10), 0x2000_710A); -+ assert_eq!(request_code_none!(b'a', 255), 0x2000_61FF); -+ } -+ -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd"))] -+ #[test] -+ fn test_op_write_int() { -+ assert_eq!(request_code_write_int!(b'v', 4), 0x2004_7604); -+ assert_eq!(request_code_write_int!(b'p', 2), 0x2004_7002); -+ } -+ -+ #[test] -+ fn test_op_write() { -+ assert_eq!(request_code_write!(b'z', 10, 1), 0x8001_7A0A); -+ assert_eq!(request_code_write!(b'z', 10, 512), 0x8200_7A0A); -+ } -+ -+ #[cfg(target_pointer_width = "64")] -+ #[test] -+ fn test_op_write_64() { -+ assert_eq!(request_code_write!(b'z', 10, (1 as u64) << 32), 0x8000_7A0A); -+ } -+ -+ #[test] -+ fn test_op_read() { -+ assert_eq!(request_code_read!(b'z', 10, 1), 0x4001_7A0A); -+ assert_eq!(request_code_read!(b'z', 10, 512), 0x4200_7A0A); -+ } -+ -+ #[cfg(target_pointer_width = "64")] -+ #[test] -+ fn test_op_read_64() { -+ assert_eq!(request_code_read!(b'z', 10, (1 as u64) << 32), 0x4000_7A0A); -+ } -+ -+ #[test] -+ fn test_op_read_write() { -+ assert_eq!(request_code_readwrite!(b'z', 10, 1), 0xC001_7A0A); -+ assert_eq!(request_code_readwrite!(b'z', 10, 512), 0xC200_7A0A); -+ } -+ -+ #[cfg(target_pointer_width = "64")] -+ #[test] -+ fn test_op_read_write_64() { -+ assert_eq!(request_code_readwrite!(b'z', 10, (1 as u64) << 32), 0xC000_7A0A); -+ } -+} -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+mod linux_ioctls { -+ use std::mem; -+ use std::os::unix::io::AsRawFd; -+ -+ use tempfile::tempfile; -+ use libc::{TCGETS, TCSBRK, TCSETS, TIOCNXCL, termios}; -+ -+ use nix::Error::Sys; -+ use nix::errno::Errno::{ENOTTY, ENOSYS}; -+ -+ ioctl_none_bad!(tiocnxcl, TIOCNXCL); -+ #[test] -+ fn test_ioctl_none_bad() { -+ let file = tempfile().unwrap(); -+ let res = unsafe { tiocnxcl(file.as_raw_fd()) }; -+ assert_eq!(res, Err(Sys(ENOTTY))); -+ } -+ -+ ioctl_read_bad!(tcgets, TCGETS, termios); -+ #[test] -+ fn test_ioctl_read_bad() { -+ let file = tempfile().unwrap(); -+ let mut termios = unsafe { mem::uninitialized() }; -+ let res = unsafe { tcgets(file.as_raw_fd(), &mut termios) }; -+ assert_eq!(res, Err(Sys(ENOTTY))); -+ } -+ -+ ioctl_write_int_bad!(tcsbrk, TCSBRK); -+ #[test] -+ fn test_ioctl_write_int_bad() { -+ let file = tempfile().unwrap(); -+ let res = unsafe { tcsbrk(file.as_raw_fd(), 0) }; -+ assert_eq!(res, Err(Sys(ENOTTY))); -+ } -+ -+ ioctl_write_ptr_bad!(tcsets, TCSETS, termios); -+ #[test] -+ fn test_ioctl_write_ptr_bad() { -+ let file = tempfile().unwrap(); -+ let termios: termios = unsafe { mem::uninitialized() }; -+ let res = unsafe { tcsets(file.as_raw_fd(), &termios) }; -+ assert_eq!(res, Err(Sys(ENOTTY))); -+ } -+ -+ // FIXME: Find a suitable example for `ioctl_readwrite_bad` -+ -+ // From linux/videodev2.h -+ ioctl_none!(log_status, b'V', 70); -+ #[test] -+ fn test_ioctl_none() { -+ let file = tempfile().unwrap(); -+ let res = unsafe { log_status(file.as_raw_fd()) }; -+ assert!(res == Err(Sys(ENOTTY)) || res == Err(Sys(ENOSYS))); -+ } -+ -+ #[repr(C)] -+ pub struct v4l2_audio { -+ index: u32, -+ name: [u8; 32], -+ capability: u32, -+ mode: u32, -+ reserved: [u32; 2], -+ } -+ -+ // From linux/videodev2.h -+ ioctl_write_ptr!(s_audio, b'V', 34, v4l2_audio); -+ #[test] -+ fn test_ioctl_write_ptr() { -+ let file = tempfile().unwrap(); -+ let data: v4l2_audio = unsafe { mem::zeroed() }; -+ let res = unsafe { s_audio(file.as_raw_fd(), &data) }; -+ assert!(res == Err(Sys(ENOTTY)) || res == Err(Sys(ENOSYS))); -+ } -+ -+ // From linux/net/bluetooth/hci_sock.h -+ const HCI_IOC_MAGIC: u8 = b'H'; -+ const HCI_IOC_HCIDEVUP: u8 = 201; -+ ioctl_write_int!(hcidevup, HCI_IOC_MAGIC, HCI_IOC_HCIDEVUP); -+ #[test] -+ fn test_ioctl_write_int() { -+ let file = tempfile().unwrap(); -+ let res = unsafe { hcidevup(file.as_raw_fd(), 0) }; -+ assert!(res == Err(Sys(ENOTTY)) || res == Err(Sys(ENOSYS))); -+ } -+ -+ // From linux/videodev2.h -+ ioctl_read!(g_audio, b'V', 33, v4l2_audio); -+ #[test] -+ fn test_ioctl_read() { -+ let file = tempfile().unwrap(); -+ let mut data: v4l2_audio = unsafe { mem::uninitialized() }; -+ let res = unsafe { g_audio(file.as_raw_fd(), &mut data) }; -+ assert!(res == Err(Sys(ENOTTY)) || res == Err(Sys(ENOSYS))); -+ } -+ -+ // From linux/videodev2.h -+ ioctl_readwrite!(enum_audio, b'V', 65, v4l2_audio); -+ #[test] -+ fn test_ioctl_readwrite() { -+ let file = tempfile().unwrap(); -+ let mut data: v4l2_audio = unsafe { mem::uninitialized() }; -+ let res = unsafe { enum_audio(file.as_raw_fd(), &mut data) }; -+ assert!(res == Err(Sys(ENOTTY)) || res == Err(Sys(ENOSYS))); -+ } -+ -+ // FIXME: Find a suitable example for `ioctl_read_buf`. -+ -+ #[repr(C)] -+ pub struct spi_ioc_transfer { -+ tx_buf: u64, -+ rx_buf: u64, -+ len: u32, -+ speed_hz: u32, -+ delay_usecs: u16, -+ bits_per_word: u8, -+ cs_change: u8, -+ tx_nbits: u8, -+ rx_nbits: u8, -+ pad: u16, -+ } -+ -+ // From linux/spi/spidev.h -+ ioctl_write_buf!(spi_ioc_message, super::SPI_IOC_MAGIC, super::SPI_IOC_MESSAGE, spi_ioc_transfer); -+ #[test] -+ fn test_ioctl_write_buf() { -+ let file = tempfile().unwrap(); -+ let data: [spi_ioc_transfer; 4] = unsafe { mem::zeroed() }; -+ let res = unsafe { spi_ioc_message(file.as_raw_fd(), &data[..]) }; -+ assert!(res == Err(Sys(ENOTTY)) || res == Err(Sys(ENOSYS))); -+ } -+ -+ // FIXME: Find a suitable example for `ioctl_readwrite_buf`. -+} -+ -+#[cfg(target_os = "freebsd")] -+mod freebsd_ioctls { -+ use std::mem; -+ use std::os::unix::io::AsRawFd; -+ -+ use tempfile::tempfile; -+ use libc::termios; -+ -+ use nix::Error::Sys; -+ use nix::errno::Errno::ENOTTY; -+ -+ // From sys/sys/ttycom.h -+ const TTY_IOC_MAGIC: u8 = b't'; -+ const TTY_IOC_TYPE_NXCL: u8 = 14; -+ const TTY_IOC_TYPE_GETA: u8 = 19; -+ const TTY_IOC_TYPE_SETA: u8 = 20; -+ -+ ioctl_none!(tiocnxcl, TTY_IOC_MAGIC, TTY_IOC_TYPE_NXCL); -+ #[test] -+ fn test_ioctl_none() { -+ let file = tempfile().unwrap(); -+ let res = unsafe { tiocnxcl(file.as_raw_fd()) }; -+ assert_eq!(res, Err(Sys(ENOTTY))); -+ } -+ -+ ioctl_read!(tiocgeta, TTY_IOC_MAGIC, TTY_IOC_TYPE_GETA, termios); -+ #[test] -+ fn test_ioctl_read() { -+ let file = tempfile().unwrap(); -+ let mut termios = unsafe { mem::uninitialized() }; -+ let res = unsafe { tiocgeta(file.as_raw_fd(), &mut termios) }; -+ assert_eq!(res, Err(Sys(ENOTTY))); -+ } -+ -+ ioctl_write_ptr!(tiocseta, TTY_IOC_MAGIC, TTY_IOC_TYPE_SETA, termios); -+ #[test] -+ fn test_ioctl_write_ptr() { -+ let file = tempfile().unwrap(); -+ let termios: termios = unsafe { mem::uninitialized() }; -+ let res = unsafe { tiocseta(file.as_raw_fd(), &termios) }; -+ assert_eq!(res, Err(Sys(ENOTTY))); -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_lio_listio_resubmit.rs b/third_party/rust/nix-0.15.0/test/sys/test_lio_listio_resubmit.rs -new file mode 100644 -index 0000000000000..19ee3facf87d7 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_lio_listio_resubmit.rs -@@ -0,0 +1,111 @@ -+// vim: tw=80 -+ -+// Annoyingly, Cargo is unable to conditionally build an entire test binary. So -+// we must disable the test here rather than in Cargo.toml -+#![cfg(target_os = "freebsd")] -+ -+extern crate nix; -+extern crate sysctl; -+extern crate tempfile; -+ -+use nix::Error; -+use nix::errno::*; -+use nix::libc::off_t; -+use nix::sys::aio::*; -+use nix::sys::signal::SigevNotify; -+use nix::unistd::{SysconfVar, sysconf}; -+use std::os::unix::io::AsRawFd; -+use std::{thread, time}; -+use sysctl::CtlValue; -+use tempfile::tempfile; -+ -+const BYTES_PER_OP: usize = 512; -+ -+/// Attempt to collect final status for all of `liocb`'s operations, freeing -+/// system resources -+fn finish_liocb(liocb: &mut LioCb) { -+ for j in 0..liocb.aiocbs.len() { -+ loop { -+ let e = liocb.error(j); -+ match e { -+ Ok(()) => break, -+ Err(Error::Sys(Errno::EINPROGRESS)) => -+ thread::sleep(time::Duration::from_millis(10)), -+ Err(x) => panic!("aio_error({:?})", x) -+ } -+ } -+ assert_eq!(liocb.aio_return(j).unwrap(), BYTES_PER_OP as isize); -+ } -+} -+ -+// Deliberately exceed system resource limits, causing lio_listio to return EIO. -+// This test must run in its own process since it deliberately uses all AIO -+// resources. ATM it is only enabled on FreeBSD, because I don't know how to -+// check system AIO limits on other operating systems. -+#[test] -+fn test_lio_listio_resubmit() { -+ let mut resubmit_count = 0; -+ -+ // Lookup system resource limits -+ let alm = sysconf(SysconfVar::AIO_LISTIO_MAX) -+ .expect("sysconf").unwrap() as usize; -+ let maqpp = if let CtlValue::Int(x) = sysctl::value( -+ "vfs.aio.max_aio_queue_per_proc").unwrap(){ -+ x as usize -+ } else { -+ panic!("unknown sysctl"); -+ }; -+ -+ // Find lio_listio sizes that satisfy the AIO_LISTIO_MAX constraint and also -+ // result in a final lio_listio call that can only partially be queued -+ let target_ops = maqpp + alm / 2; -+ let num_listios = (target_ops + alm - 3) / (alm - 2); -+ let ops_per_listio = (target_ops + num_listios - 1) / num_listios; -+ assert!((num_listios - 1) * ops_per_listio < maqpp, -+ "the last lio_listio won't make any progress; fix the algorithm"); -+ println!("Using {:?} LioCbs of {:?} operations apiece", num_listios, -+ ops_per_listio); -+ -+ let f = tempfile().unwrap(); -+ let buffer_set = (0..num_listios).map(|_| { -+ (0..ops_per_listio).map(|_| { -+ vec![0u8; BYTES_PER_OP] -+ }).collect::<Vec<_>>() -+ }).collect::<Vec<_>>(); -+ -+ let mut liocbs = (0..num_listios).map(|i| { -+ let mut liocb = LioCb::with_capacity(ops_per_listio); -+ for j in 0..ops_per_listio { -+ let offset = (BYTES_PER_OP * (i * ops_per_listio + j)) as off_t; -+ let wcb = AioCb::from_slice( f.as_raw_fd(), -+ offset, -+ &buffer_set[i][j][..], -+ 0, //priority -+ SigevNotify::SigevNone, -+ LioOpcode::LIO_WRITE); -+ liocb.aiocbs.push(wcb); -+ } -+ let mut err = liocb.listio(LioMode::LIO_NOWAIT, SigevNotify::SigevNone); -+ while err == Err(Error::Sys(Errno::EIO)) || -+ err == Err(Error::Sys(Errno::EAGAIN)) || -+ err == Err(Error::Sys(Errno::EINTR)) { -+ // -+ thread::sleep(time::Duration::from_millis(10)); -+ resubmit_count += 1; -+ err = liocb.listio_resubmit(LioMode::LIO_NOWAIT, -+ SigevNotify::SigevNone); -+ } -+ liocb -+ }).collect::<Vec<_>>(); -+ -+ // Ensure that every AioCb completed -+ for liocb in liocbs.iter_mut() { -+ finish_liocb(liocb); -+ } -+ -+ if resubmit_count > 0 { -+ println!("Resubmitted {:?} times, test passed", resubmit_count); -+ } else { -+ println!("Never resubmitted. Test ambiguous"); -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_pthread.rs b/third_party/rust/nix-0.15.0/test/sys/test_pthread.rs -new file mode 100644 -index 0000000000000..8928010087a13 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_pthread.rs -@@ -0,0 +1,15 @@ -+use nix::sys::pthread::*; -+ -+#[cfg(target_env = "musl")] -+#[test] -+fn test_pthread_self() { -+ let tid = pthread_self(); -+ assert!(tid != ::std::ptr::null_mut()); -+} -+ -+#[cfg(not(target_env = "musl"))] -+#[test] -+fn test_pthread_self() { -+ let tid = pthread_self(); -+ assert!(tid != 0); -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_ptrace.rs b/third_party/rust/nix-0.15.0/test/sys/test_ptrace.rs -new file mode 100644 -index 0000000000000..24d9b522ee4e5 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_ptrace.rs -@@ -0,0 +1,107 @@ -+use nix::Error; -+use nix::errno::Errno; -+use nix::unistd::getpid; -+use nix::sys::ptrace; -+#[cfg(any(target_os = "android", target_os = "linux"))] -+use nix::sys::ptrace::Options; -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+use std::mem; -+ -+#[test] -+fn test_ptrace() { -+ // Just make sure ptrace can be called at all, for now. -+ // FIXME: qemu-user doesn't implement ptrace on all arches, so permit ENOSYS -+ let err = ptrace::attach(getpid()).unwrap_err(); -+ assert!(err == Error::Sys(Errno::EPERM) || err == Error::Sys(Errno::EINVAL) || -+ err == Error::Sys(Errno::ENOSYS)); -+} -+ -+// Just make sure ptrace_setoptions can be called at all, for now. -+#[test] -+#[cfg(any(target_os = "android", target_os = "linux"))] -+fn test_ptrace_setoptions() { -+ let err = ptrace::setoptions(getpid(), Options::PTRACE_O_TRACESYSGOOD).unwrap_err(); -+ assert!(err != Error::UnsupportedOperation); -+} -+ -+// Just make sure ptrace_getevent can be called at all, for now. -+#[test] -+#[cfg(any(target_os = "android", target_os = "linux"))] -+fn test_ptrace_getevent() { -+ let err = ptrace::getevent(getpid()).unwrap_err(); -+ assert!(err != Error::UnsupportedOperation); -+} -+ -+// Just make sure ptrace_getsiginfo can be called at all, for now. -+#[test] -+#[cfg(any(target_os = "android", target_os = "linux"))] -+fn test_ptrace_getsiginfo() { -+ if let Err(Error::UnsupportedOperation) = ptrace::getsiginfo(getpid()) { -+ panic!("ptrace_getsiginfo returns Error::UnsupportedOperation!"); -+ } -+} -+ -+// Just make sure ptrace_setsiginfo can be called at all, for now. -+#[test] -+#[cfg(any(target_os = "android", target_os = "linux"))] -+fn test_ptrace_setsiginfo() { -+ let siginfo = unsafe { mem::uninitialized() }; -+ if let Err(Error::UnsupportedOperation) = ptrace::setsiginfo(getpid(), &siginfo) { -+ panic!("ptrace_setsiginfo returns Error::UnsupportedOperation!"); -+ } -+} -+ -+ -+#[test] -+fn test_ptrace_cont() { -+ use nix::sys::ptrace; -+ use nix::sys::signal::{raise, Signal}; -+ use nix::sys::wait::{waitpid, WaitPidFlag, WaitStatus}; -+ use nix::unistd::fork; -+ use nix::unistd::ForkResult::*; -+ -+ let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // FIXME: qemu-user doesn't implement ptrace on all architectures -+ // and retunrs ENOSYS in this case. -+ // We (ab)use this behavior to detect the affected platforms -+ // and skip the test then. -+ // On valid platforms the ptrace call should return Errno::EPERM, this -+ // is already tested by `test_ptrace`. -+ let err = ptrace::attach(getpid()).unwrap_err(); -+ if err == Error::Sys(Errno::ENOSYS) { -+ return; -+ } -+ -+ match fork().expect("Error: Fork Failed") { -+ Child => { -+ ptrace::traceme().unwrap(); -+ // As recommended by ptrace(2), raise SIGTRAP to pause the child -+ // until the parent is ready to continue -+ loop { -+ raise(Signal::SIGTRAP).unwrap(); -+ } -+ -+ }, -+ Parent { child } => { -+ assert_eq!(waitpid(child, None), Ok(WaitStatus::Stopped(child, Signal::SIGTRAP))); -+ ptrace::cont(child, None).unwrap(); -+ assert_eq!(waitpid(child, None), Ok(WaitStatus::Stopped(child, Signal::SIGTRAP))); -+ ptrace::cont(child, Some(Signal::SIGKILL)).unwrap(); -+ match waitpid(child, None) { -+ Ok(WaitStatus::Signaled(pid, Signal::SIGKILL, _)) if pid == child => { -+ // FIXME It's been observed on some systems (apple) the -+ // tracee may not be killed but remain as a zombie process -+ // affecting other wait based tests. Add an extra kill just -+ // to make sure there are no zombies. -+ let _ = waitpid(child, Some(WaitPidFlag::WNOHANG)); -+ while ptrace::cont(child, Some(Signal::SIGKILL)).is_ok() { -+ let _ = waitpid(child, Some(WaitPidFlag::WNOHANG)); -+ } -+ } -+ _ => panic!("The process should have been killed"), -+ } -+ }, -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_select.rs b/third_party/rust/nix-0.15.0/test/sys/test_select.rs -new file mode 100644 -index 0000000000000..cf68700c5e16f ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_select.rs -@@ -0,0 +1,54 @@ -+use nix::sys::select::*; -+use nix::unistd::{pipe, write}; -+use nix::sys::signal::SigSet; -+use nix::sys::time::{TimeSpec, TimeValLike}; -+ -+#[test] -+pub fn test_pselect() { -+ let _mtx = ::SIGNAL_MTX -+ .lock() -+ .expect("Mutex got poisoned by another test"); -+ -+ let (r1, w1) = pipe().unwrap(); -+ write(w1, b"hi!").unwrap(); -+ let (r2, _w2) = pipe().unwrap(); -+ -+ let mut fd_set = FdSet::new(); -+ fd_set.insert(r1); -+ fd_set.insert(r2); -+ -+ let timeout = TimeSpec::seconds(10); -+ let sigmask = SigSet::empty(); -+ assert_eq!( -+ 1, -+ pselect(None, &mut fd_set, None, None, &timeout, &sigmask).unwrap() -+ ); -+ assert!(fd_set.contains(r1)); -+ assert!(!fd_set.contains(r2)); -+} -+ -+#[test] -+pub fn test_pselect_nfds2() { -+ let (r1, w1) = pipe().unwrap(); -+ write(w1, b"hi!").unwrap(); -+ let (r2, _w2) = pipe().unwrap(); -+ -+ let mut fd_set = FdSet::new(); -+ fd_set.insert(r1); -+ fd_set.insert(r2); -+ -+ let timeout = TimeSpec::seconds(10); -+ assert_eq!( -+ 1, -+ pselect( -+ ::std::cmp::max(r1, r2) + 1, -+ &mut fd_set, -+ None, -+ None, -+ &timeout, -+ None -+ ).unwrap() -+ ); -+ assert!(fd_set.contains(r1)); -+ assert!(!fd_set.contains(r2)); -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_signal.rs b/third_party/rust/nix-0.15.0/test/sys/test_signal.rs -new file mode 100644 -index 0000000000000..8780763f773ef ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_signal.rs -@@ -0,0 +1,104 @@ -+use libc; -+use nix::Error; -+use nix::sys::signal::*; -+use nix::unistd::*; -+use std::sync::atomic::{AtomicBool, Ordering}; -+ -+#[test] -+fn test_kill_none() { -+ kill(getpid(), None).expect("Should be able to send signal to myself."); -+} -+ -+#[test] -+fn test_killpg_none() { -+ killpg(getpgrp(), None) -+ .expect("Should be able to send signal to my process group."); -+} -+ -+#[test] -+fn test_old_sigaction_flags() { -+ extern "C" fn handler(_: ::libc::c_int) {} -+ let act = SigAction::new( -+ SigHandler::Handler(handler), -+ SaFlags::empty(), -+ SigSet::empty(), -+ ); -+ let oact = unsafe { sigaction(SIGINT, &act) }.unwrap(); -+ let _flags = oact.flags(); -+ let oact = unsafe { sigaction(SIGINT, &act) }.unwrap(); -+ let _flags = oact.flags(); -+} -+ -+#[test] -+fn test_sigprocmask_noop() { -+ sigprocmask(SigmaskHow::SIG_BLOCK, None, None) -+ .expect("this should be an effective noop"); -+} -+ -+#[test] -+fn test_sigprocmask() { -+ let _m = ::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // This needs to be a signal that rust doesn't use in the test harness. -+ const SIGNAL: Signal = Signal::SIGCHLD; -+ -+ let mut old_signal_set = SigSet::empty(); -+ sigprocmask(SigmaskHow::SIG_BLOCK, None, Some(&mut old_signal_set)) -+ .expect("expect to be able to retrieve old signals"); -+ -+ // Make sure the old set doesn't contain the signal, otherwise the following -+ // test don't make sense. -+ assert_eq!(old_signal_set.contains(SIGNAL), false, -+ "the {:?} signal is already blocked, please change to a \ -+ different one", SIGNAL); -+ -+ // Now block the signal. -+ let mut signal_set = SigSet::empty(); -+ signal_set.add(SIGNAL); -+ sigprocmask(SigmaskHow::SIG_BLOCK, Some(&signal_set), None) -+ .expect("expect to be able to block signals"); -+ -+ // And test it again, to make sure the change was effective. -+ old_signal_set.clear(); -+ sigprocmask(SigmaskHow::SIG_BLOCK, None, Some(&mut old_signal_set)) -+ .expect("expect to be able to retrieve old signals"); -+ assert_eq!(old_signal_set.contains(SIGNAL), true, -+ "expected the {:?} to be blocked", SIGNAL); -+ -+ // Reset the signal. -+ sigprocmask(SigmaskHow::SIG_UNBLOCK, Some(&signal_set), None) -+ .expect("expect to be able to block signals"); -+} -+ -+lazy_static! { -+ static ref SIGNALED: AtomicBool = AtomicBool::new(false); -+} -+ -+extern fn test_sigaction_handler(signal: libc::c_int) { -+ let signal = Signal::from_c_int(signal).unwrap(); -+ SIGNALED.store(signal == Signal::SIGINT, Ordering::Relaxed); -+} -+ -+extern fn test_sigaction_action(_: libc::c_int, _: *mut libc::siginfo_t, _: *mut libc::c_void) { -+} -+ -+#[test] -+fn test_signal() { -+ let _m = ::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ unsafe { signal(Signal::SIGINT, SigHandler::SigIgn) }.unwrap(); -+ raise(Signal::SIGINT).unwrap(); -+ assert_eq!(unsafe { signal(Signal::SIGINT, SigHandler::SigDfl) }.unwrap(), SigHandler::SigIgn); -+ -+ let handler = SigHandler::Handler(test_sigaction_handler); -+ assert_eq!(unsafe { signal(Signal::SIGINT, handler) }.unwrap(), SigHandler::SigDfl); -+ raise(Signal::SIGINT).unwrap(); -+ assert!(SIGNALED.load(Ordering::Relaxed)); -+ assert_eq!(unsafe { signal(Signal::SIGINT, SigHandler::SigDfl) }.unwrap(), handler); -+ -+ let action_handler = SigHandler::SigAction(test_sigaction_action); -+ assert_eq!(unsafe { signal(Signal::SIGINT, action_handler) }.unwrap_err(), Error::UnsupportedOperation); -+ -+ // Restore default signal handler -+ unsafe { signal(Signal::SIGINT, SigHandler::SigDfl) }.unwrap(); -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_signalfd.rs b/third_party/rust/nix-0.15.0/test/sys/test_signalfd.rs -new file mode 100644 -index 0000000000000..a3b6098841f1c ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_signalfd.rs -@@ -0,0 +1,25 @@ -+#[test] -+fn test_signalfd() { -+ use nix::sys::signalfd::SignalFd; -+ use nix::sys::signal::{self, raise, Signal, SigSet}; -+ -+ // Grab the mutex for altering signals so we don't interfere with other tests. -+ let _m = ::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // Block the SIGUSR1 signal from automatic processing for this thread -+ let mut mask = SigSet::empty(); -+ mask.add(signal::SIGUSR1); -+ mask.thread_block().unwrap(); -+ -+ let mut fd = SignalFd::new(&mask).unwrap(); -+ -+ // Send a SIGUSR1 signal to the current process. Note that this uses `raise` instead of `kill` -+ // because `kill` with `getpid` isn't correct during multi-threaded execution like during a -+ // cargo test session. Instead use `raise` which does the correct thing by default. -+ raise(signal::SIGUSR1).expect("Error: raise(SIGUSR1) failed"); -+ -+ // And now catch that same signal. -+ let res = fd.read_signal().unwrap().unwrap(); -+ let signo = Signal::from_c_int(res.ssi_signo as i32).unwrap(); -+ assert_eq!(signo, signal::SIGUSR1); -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_socket.rs b/third_party/rust/nix-0.15.0/test/sys/test_socket.rs -new file mode 100644 -index 0000000000000..7e64d2b77f071 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_socket.rs -@@ -0,0 +1,1066 @@ -+use nix::ifaddrs::InterfaceAddress; -+use nix::sys::socket::{AddressFamily, InetAddr, UnixAddr, getsockname}; -+use std::collections::hash_map::DefaultHasher; -+use std::hash::{Hash, Hasher}; -+use std::net::{self, Ipv6Addr, SocketAddr, SocketAddrV6}; -+use std::os::unix::io::RawFd; -+use std::path::Path; -+use std::slice; -+use std::str::FromStr; -+use libc::c_char; -+use tempfile; -+ -+#[test] -+pub fn test_inetv4_addr_to_sock_addr() { -+ let actual: net::SocketAddr = FromStr::from_str("127.0.0.1:3000").unwrap(); -+ let addr = InetAddr::from_std(&actual); -+ -+ match addr { -+ InetAddr::V4(addr) => { -+ let ip: u32 = 0x7f00_0001; -+ let port: u16 = 3000; -+ let saddr = addr.sin_addr.s_addr; -+ -+ assert_eq!(saddr, ip.to_be()); -+ assert_eq!(addr.sin_port, port.to_be()); -+ } -+ _ => panic!("nope"), -+ } -+ -+ assert_eq!(addr.to_str(), "127.0.0.1:3000"); -+ -+ let inet = addr.to_std(); -+ assert_eq!(actual, inet); -+} -+ -+#[test] -+pub fn test_inetv6_addr_to_sock_addr() { -+ let port: u16 = 3000; -+ let flowinfo: u32 = 1; -+ let scope_id: u32 = 2; -+ let ip: Ipv6Addr = "fe80::1".parse().unwrap(); -+ -+ let actual = SocketAddr::V6(SocketAddrV6::new(ip, port, flowinfo, scope_id)); -+ let addr = InetAddr::from_std(&actual); -+ -+ match addr { -+ InetAddr::V6(addr) => { -+ assert_eq!(addr.sin6_port, port.to_be()); -+ assert_eq!(addr.sin6_flowinfo, flowinfo); -+ assert_eq!(addr.sin6_scope_id, scope_id); -+ } -+ _ => panic!("nope"), -+ } -+ -+ assert_eq!(actual, addr.to_std()); -+} -+ -+#[test] -+pub fn test_path_to_sock_addr() { -+ let path = "/foo/bar"; -+ let actual = Path::new(path); -+ let addr = UnixAddr::new(actual).unwrap(); -+ -+ let expect: &[c_char] = unsafe { -+ slice::from_raw_parts(path.as_bytes().as_ptr() as *const c_char, path.len()) -+ }; -+ assert_eq!(&addr.0.sun_path[..8], expect); -+ -+ assert_eq!(addr.path(), Some(actual)); -+} -+ -+fn calculate_hash<T: Hash>(t: &T) -> u64 { -+ let mut s = DefaultHasher::new(); -+ t.hash(&mut s); -+ s.finish() -+} -+ -+#[test] -+pub fn test_addr_equality_path() { -+ let path = "/foo/bar"; -+ let actual = Path::new(path); -+ let addr1 = UnixAddr::new(actual).unwrap(); -+ let mut addr2 = addr1.clone(); -+ -+ addr2.0.sun_path[10] = 127; -+ -+ assert_eq!(addr1, addr2); -+ assert_eq!(calculate_hash(&addr1), calculate_hash(&addr2)); -+} -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+#[test] -+pub fn test_abstract_sun_path_too_long() { -+ let name = String::from("nix\0abstract\0tesnix\0abstract\0tesnix\0abstract\0tesnix\0abstract\0tesnix\0abstract\0testttttnix\0abstract\0test\0make\0sure\0this\0is\0long\0enough"); -+ let addr = UnixAddr::new_abstract(name.as_bytes()); -+ assert!(addr.is_err()); -+} -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+#[test] -+pub fn test_addr_equality_abstract() { -+ let name = String::from("nix\0abstract\0test"); -+ let addr1 = UnixAddr::new_abstract(name.as_bytes()).unwrap(); -+ let mut addr2 = addr1.clone(); -+ -+ assert_eq!(addr1, addr2); -+ assert_eq!(calculate_hash(&addr1), calculate_hash(&addr2)); -+ -+ addr2.0.sun_path[18] = 127; -+ assert_ne!(addr1, addr2); -+ assert_ne!(calculate_hash(&addr1), calculate_hash(&addr2)); -+} -+ -+// Test getting/setting abstract addresses (without unix socket creation) -+#[cfg(target_os = "linux")] -+#[test] -+pub fn test_abstract_uds_addr() { -+ let empty = String::new(); -+ let addr = UnixAddr::new_abstract(empty.as_bytes()).unwrap(); -+ let sun_path = [0u8; 107]; -+ assert_eq!(addr.as_abstract(), Some(&sun_path[..])); -+ -+ let name = String::from("nix\0abstract\0test"); -+ let addr = UnixAddr::new_abstract(name.as_bytes()).unwrap(); -+ let sun_path = [ -+ 110u8, 105, 120, 0, 97, 98, 115, 116, 114, 97, 99, 116, 0, 116, 101, 115, 116, 0, 0, 0, 0, -+ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -+ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -+ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -+ ]; -+ assert_eq!(addr.as_abstract(), Some(&sun_path[..])); -+ assert_eq!(addr.path(), None); -+ -+ // Internally, name is null-prefixed (abstract namespace) -+ assert_eq!(addr.0.sun_path[0], 0); -+} -+ -+#[test] -+pub fn test_getsockname() { -+ use nix::sys::socket::{socket, AddressFamily, SockType, SockFlag}; -+ use nix::sys::socket::{bind, SockAddr}; -+ -+ let tempdir = tempfile::tempdir().unwrap(); -+ let sockname = tempdir.path().join("sock"); -+ let sock = socket(AddressFamily::Unix, SockType::Stream, SockFlag::empty(), None) -+ .expect("socket failed"); -+ let sockaddr = SockAddr::new_unix(&sockname).unwrap(); -+ bind(sock, &sockaddr).expect("bind failed"); -+ assert_eq!(sockaddr.to_str(), -+ getsockname(sock).expect("getsockname failed").to_str()); -+} -+ -+#[test] -+pub fn test_socketpair() { -+ use nix::unistd::{read, write}; -+ use nix::sys::socket::{socketpair, AddressFamily, SockType, SockFlag}; -+ -+ let (fd1, fd2) = socketpair(AddressFamily::Unix, SockType::Stream, None, SockFlag::empty()) -+ .unwrap(); -+ write(fd1, b"hello").unwrap(); -+ let mut buf = [0;5]; -+ read(fd2, &mut buf).unwrap(); -+ -+ assert_eq!(&buf[..], b"hello"); -+} -+ -+// Test error handling of our recvmsg wrapper -+#[test] -+pub fn test_recvmsg_ebadf() { -+ use nix::Error; -+ use nix::errno::Errno; -+ use nix::sys::socket::{MsgFlags, recvmsg}; -+ use nix::sys::uio::IoVec; -+ -+ let mut buf = [0u8; 5]; -+ let iov = [IoVec::from_mut_slice(&mut buf[..])]; -+ let fd = -1; // Bad file descriptor -+ let r = recvmsg(fd, &iov, None, MsgFlags::empty()); -+ assert_eq!(r.err().unwrap(), Error::Sys(Errno::EBADF)); -+} -+ -+// Disable the test on emulated platforms due to a bug in QEMU versions < -+// 2.12.0. https://bugs.launchpad.net/qemu/+bug/1701808 -+#[cfg_attr(not(any(target_arch = "x86_64", target_arch="i686")), ignore)] -+#[test] -+pub fn test_scm_rights() { -+ use nix::sys::uio::IoVec; -+ use nix::unistd::{pipe, read, write, close}; -+ use nix::sys::socket::{socketpair, sendmsg, recvmsg, -+ AddressFamily, SockType, SockFlag, -+ ControlMessage, ControlMessageOwned, MsgFlags}; -+ -+ let (fd1, fd2) = socketpair(AddressFamily::Unix, SockType::Stream, None, SockFlag::empty()) -+ .unwrap(); -+ let (r, w) = pipe().unwrap(); -+ let mut received_r: Option<RawFd> = None; -+ -+ { -+ let iov = [IoVec::from_slice(b"hello")]; -+ let fds = [r]; -+ let cmsg = ControlMessage::ScmRights(&fds); -+ assert_eq!(sendmsg(fd1, &iov, &[cmsg], MsgFlags::empty(), None).unwrap(), 5); -+ close(r).unwrap(); -+ close(fd1).unwrap(); -+ } -+ -+ { -+ let mut buf = [0u8; 5]; -+ let iov = [IoVec::from_mut_slice(&mut buf[..])]; -+ let mut cmsgspace = cmsg_space!([RawFd; 1]); -+ let msg = recvmsg(fd2, &iov, Some(&mut cmsgspace), MsgFlags::empty()).unwrap(); -+ -+ for cmsg in msg.cmsgs() { -+ if let ControlMessageOwned::ScmRights(fd) = cmsg { -+ assert_eq!(received_r, None); -+ assert_eq!(fd.len(), 1); -+ received_r = Some(fd[0]); -+ } else { -+ panic!("unexpected cmsg"); -+ } -+ } -+ assert_eq!(msg.bytes, 5); -+ assert!(!msg.flags.intersects(MsgFlags::MSG_TRUNC | MsgFlags::MSG_CTRUNC)); -+ close(fd2).unwrap(); -+ } -+ -+ let received_r = received_r.expect("Did not receive passed fd"); -+ // Ensure that the received file descriptor works -+ write(w, b"world").unwrap(); -+ let mut buf = [0u8; 5]; -+ read(received_r, &mut buf).unwrap(); -+ assert_eq!(&buf[..], b"world"); -+ close(received_r).unwrap(); -+ close(w).unwrap(); -+} -+ -+// Disable the test on emulated platforms due to not enabled support of AF_ALG in QEMU from rust cross -+#[cfg_attr(not(any(target_arch = "x86_64", target_arch = "i686")), ignore)] -+#[cfg(any(target_os = "linux", target_os= "android"))] -+#[test] -+pub fn test_af_alg_cipher() { -+ use libc; -+ use nix::sys::uio::IoVec; -+ use nix::unistd::read; -+ use nix::sys::socket::{socket, sendmsg, bind, accept, setsockopt, -+ AddressFamily, SockType, SockFlag, SockAddr, -+ ControlMessage, MsgFlags}; -+ use nix::sys::socket::sockopt::AlgSetKey; -+ -+ let alg_type = "skcipher"; -+ let alg_name = "ctr(aes)"; -+ // 256-bits secret key -+ let key = vec![0u8; 32]; -+ // 16-bytes IV -+ let iv_len = 16; -+ let iv = vec![1u8; iv_len]; -+ // 256-bytes plain payload -+ let payload_len = 256; -+ let payload = vec![2u8; payload_len]; -+ -+ let sock = socket(AddressFamily::Alg, SockType::SeqPacket, SockFlag::empty(), None) -+ .expect("socket failed"); -+ -+ let sockaddr = SockAddr::new_alg(alg_type, alg_name); -+ bind(sock, &sockaddr).expect("bind failed"); -+ -+ if let SockAddr::Alg(alg) = sockaddr { -+ assert_eq!(alg.alg_name().to_string_lossy(), alg_name); -+ assert_eq!(alg.alg_type().to_string_lossy(), alg_type); -+ } else { -+ panic!("unexpected SockAddr"); -+ } -+ -+ setsockopt(sock, AlgSetKey::default(), &key).expect("setsockopt"); -+ let session_socket = accept(sock).expect("accept failed"); -+ -+ let msgs = [ControlMessage::AlgSetOp(&libc::ALG_OP_ENCRYPT), ControlMessage::AlgSetIv(iv.as_slice())]; -+ let iov = IoVec::from_slice(&payload); -+ sendmsg(session_socket, &[iov], &msgs, MsgFlags::empty(), None).expect("sendmsg encrypt"); -+ -+ // allocate buffer for encrypted data -+ let mut encrypted = vec![0u8; payload_len]; -+ let num_bytes = read(session_socket, &mut encrypted).expect("read encrypt"); -+ assert_eq!(num_bytes, payload_len); -+ -+ let iov = IoVec::from_slice(&encrypted); -+ -+ let iv = vec![1u8; iv_len]; -+ -+ let msgs = [ControlMessage::AlgSetOp(&libc::ALG_OP_DECRYPT), ControlMessage::AlgSetIv(iv.as_slice())]; -+ sendmsg(session_socket, &[iov], &msgs, MsgFlags::empty(), None).expect("sendmsg decrypt"); -+ -+ // allocate buffer for decrypted data -+ let mut decrypted = vec![0u8; payload_len]; -+ let num_bytes = read(session_socket, &mut decrypted).expect("read decrypt"); -+ -+ assert_eq!(num_bytes, payload_len); -+ assert_eq!(decrypted, payload); -+} -+ -+// Disable the test on emulated platforms due to not enabled support of AF_ALG in QEMU from rust cross -+#[cfg_attr(not(any(target_arch = "x86_64", target_arch = "i686")), ignore)] -+#[cfg(any(target_os = "linux", target_os= "android"))] -+#[test] -+pub fn test_af_alg_aead() { -+ use libc::{ALG_OP_DECRYPT, ALG_OP_ENCRYPT}; -+ use nix::sys::uio::IoVec; -+ use nix::unistd::{read, close}; -+ use nix::sys::socket::{socket, sendmsg, bind, accept, setsockopt, -+ AddressFamily, SockType, SockFlag, SockAddr, -+ ControlMessage, MsgFlags}; -+ use nix::sys::socket::sockopt::{AlgSetKey, AlgSetAeadAuthSize}; -+ -+ let auth_size = 4usize; -+ let assoc_size = 16u32; -+ -+ let alg_type = "aead"; -+ let alg_name = "gcm(aes)"; -+ // 256-bits secret key -+ let key = vec![0u8; 32]; -+ // 12-bytes IV -+ let iv_len = 12; -+ let iv = vec![1u8; iv_len]; -+ // 256-bytes plain payload -+ let payload_len = 256; -+ let mut payload = vec![2u8; payload_len + (assoc_size as usize) + auth_size]; -+ -+ for i in 0..assoc_size { -+ payload[i as usize] = 10; -+ } -+ -+ let len = payload.len(); -+ -+ for i in 0..auth_size { -+ payload[len - 1 - i] = 0; -+ } -+ -+ let sock = socket(AddressFamily::Alg, SockType::SeqPacket, SockFlag::empty(), None) -+ .expect("socket failed"); -+ -+ let sockaddr = SockAddr::new_alg(alg_type, alg_name); -+ bind(sock, &sockaddr).expect("bind failed"); -+ -+ setsockopt(sock, AlgSetAeadAuthSize, &auth_size).expect("setsockopt AlgSetAeadAuthSize"); -+ setsockopt(sock, AlgSetKey::default(), &key).expect("setsockopt AlgSetKey"); -+ let session_socket = accept(sock).expect("accept failed"); -+ -+ let msgs = [ -+ ControlMessage::AlgSetOp(&ALG_OP_ENCRYPT), -+ ControlMessage::AlgSetIv(iv.as_slice()), -+ ControlMessage::AlgSetAeadAssoclen(&assoc_size)]; -+ let iov = IoVec::from_slice(&payload); -+ sendmsg(session_socket, &[iov], &msgs, MsgFlags::empty(), None).expect("sendmsg encrypt"); -+ -+ // allocate buffer for encrypted data -+ let mut encrypted = vec![0u8; (assoc_size as usize) + payload_len + auth_size]; -+ let num_bytes = read(session_socket, &mut encrypted).expect("read encrypt"); -+ assert_eq!(num_bytes, payload_len + auth_size + (assoc_size as usize)); -+ close(session_socket).expect("close"); -+ -+ for i in 0..assoc_size { -+ encrypted[i as usize] = 10; -+ } -+ -+ let iov = IoVec::from_slice(&encrypted); -+ -+ let iv = vec![1u8; iv_len]; -+ -+ let session_socket = accept(sock).expect("accept failed"); -+ -+ let msgs = [ -+ ControlMessage::AlgSetOp(&ALG_OP_DECRYPT), -+ ControlMessage::AlgSetIv(iv.as_slice()), -+ ControlMessage::AlgSetAeadAssoclen(&assoc_size), -+ ]; -+ sendmsg(session_socket, &[iov], &msgs, MsgFlags::empty(), None).expect("sendmsg decrypt"); -+ -+ // allocate buffer for decrypted data -+ let mut decrypted = vec![0u8; payload_len + (assoc_size as usize) + auth_size]; -+ let num_bytes = read(session_socket, &mut decrypted).expect("read decrypt"); -+ -+ assert!(num_bytes >= payload_len + (assoc_size as usize)); -+ assert_eq!(decrypted[(assoc_size as usize)..(payload_len + (assoc_size as usize))], payload[(assoc_size as usize)..payload_len + (assoc_size as usize)]); -+} -+ -+/// Tests that passing multiple fds using a single `ControlMessage` works. -+// Disable the test on emulated platforms due to a bug in QEMU versions < -+// 2.12.0. https://bugs.launchpad.net/qemu/+bug/1701808 -+#[cfg_attr(not(any(target_arch = "x86_64", target_arch="i686")), ignore)] -+#[test] -+fn test_scm_rights_single_cmsg_multiple_fds() { -+ use std::os::unix::net::UnixDatagram; -+ use std::os::unix::io::{RawFd, AsRawFd}; -+ use std::thread; -+ use nix::sys::socket::{ControlMessage, ControlMessageOwned, MsgFlags, -+ sendmsg, recvmsg}; -+ use nix::sys::uio::IoVec; -+ use libc; -+ -+ let (send, receive) = UnixDatagram::pair().unwrap(); -+ let thread = thread::spawn(move || { -+ let mut buf = [0u8; 8]; -+ let iovec = [IoVec::from_mut_slice(&mut buf)]; -+ let mut space = cmsg_space!([RawFd; 2]); -+ let msg = recvmsg( -+ receive.as_raw_fd(), -+ &iovec, -+ Some(&mut space), -+ MsgFlags::empty() -+ ).unwrap(); -+ assert!(!msg.flags.intersects(MsgFlags::MSG_TRUNC | MsgFlags::MSG_CTRUNC)); -+ -+ let mut cmsgs = msg.cmsgs(); -+ match cmsgs.next() { -+ Some(ControlMessageOwned::ScmRights(fds)) => { -+ assert_eq!(fds.len(), 2, -+ "unexpected fd count (expected 2 fds, got {})", -+ fds.len()); -+ }, -+ _ => panic!(), -+ } -+ assert!(cmsgs.next().is_none(), "unexpected control msg"); -+ -+ assert_eq!(msg.bytes, 8); -+ assert_eq!(iovec[0].as_slice(), [1u8, 2, 3, 4, 5, 6, 7, 8]); -+ }); -+ -+ let slice = [1u8, 2, 3, 4, 5, 6, 7, 8]; -+ let iov = [IoVec::from_slice(&slice)]; -+ let fds = [libc::STDIN_FILENO, libc::STDOUT_FILENO]; // pass stdin and stdout -+ let cmsg = [ControlMessage::ScmRights(&fds)]; -+ sendmsg(send.as_raw_fd(), &iov, &cmsg, MsgFlags::empty(), None).unwrap(); -+ thread.join().unwrap(); -+} -+ -+// Verify `sendmsg` builds a valid `msghdr` when passing an empty -+// `cmsgs` argument. This should result in a msghdr with a nullptr -+// msg_control field and a msg_controllen of 0 when calling into the -+// raw `sendmsg`. -+#[test] -+pub fn test_sendmsg_empty_cmsgs() { -+ use nix::sys::uio::IoVec; -+ use nix::unistd::close; -+ use nix::sys::socket::{socketpair, sendmsg, recvmsg, -+ AddressFamily, SockType, SockFlag, MsgFlags}; -+ -+ let (fd1, fd2) = socketpair(AddressFamily::Unix, SockType::Stream, None, SockFlag::empty()) -+ .unwrap(); -+ -+ { -+ let iov = [IoVec::from_slice(b"hello")]; -+ assert_eq!(sendmsg(fd1, &iov, &[], MsgFlags::empty(), None).unwrap(), 5); -+ close(fd1).unwrap(); -+ } -+ -+ { -+ let mut buf = [0u8; 5]; -+ let iov = [IoVec::from_mut_slice(&mut buf[..])]; -+ let mut cmsgspace = cmsg_space!([RawFd; 1]); -+ let msg = recvmsg(fd2, &iov, Some(&mut cmsgspace), MsgFlags::empty()).unwrap(); -+ -+ for _ in msg.cmsgs() { -+ panic!("unexpected cmsg"); -+ } -+ assert!(!msg.flags.intersects(MsgFlags::MSG_TRUNC | MsgFlags::MSG_CTRUNC)); -+ assert_eq!(msg.bytes, 5); -+ close(fd2).unwrap(); -+ } -+} -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+#[test] -+fn test_scm_credentials() { -+ use libc; -+ use nix::sys::uio::IoVec; -+ use nix::unistd::{close, getpid, getuid, getgid}; -+ use nix::sys::socket::{socketpair, sendmsg, recvmsg, setsockopt, -+ AddressFamily, SockType, SockFlag, -+ ControlMessage, ControlMessageOwned, MsgFlags}; -+ use nix::sys::socket::sockopt::PassCred; -+ -+ let (send, recv) = socketpair(AddressFamily::Unix, SockType::Stream, None, SockFlag::empty()) -+ .unwrap(); -+ setsockopt(recv, PassCred, &true).unwrap(); -+ -+ { -+ let iov = [IoVec::from_slice(b"hello")]; -+ let cred = libc::ucred { -+ pid: getpid().as_raw(), -+ uid: getuid().as_raw(), -+ gid: getgid().as_raw(), -+ }; -+ let cmsg = ControlMessage::ScmCredentials(&cred); -+ assert_eq!(sendmsg(send, &iov, &[cmsg], MsgFlags::empty(), None).unwrap(), 5); -+ close(send).unwrap(); -+ } -+ -+ { -+ let mut buf = [0u8; 5]; -+ let iov = [IoVec::from_mut_slice(&mut buf[..])]; -+ let mut cmsgspace = cmsg_space!(libc::ucred); -+ let msg = recvmsg(recv, &iov, Some(&mut cmsgspace), MsgFlags::empty()).unwrap(); -+ let mut received_cred = None; -+ -+ for cmsg in msg.cmsgs() { -+ if let ControlMessageOwned::ScmCredentials(cred) = cmsg { -+ assert!(received_cred.is_none()); -+ assert_eq!(cred.pid, getpid().as_raw()); -+ assert_eq!(cred.uid, getuid().as_raw()); -+ assert_eq!(cred.gid, getgid().as_raw()); -+ received_cred = Some(cred); -+ } else { -+ panic!("unexpected cmsg"); -+ } -+ } -+ received_cred.expect("no creds received"); -+ assert_eq!(msg.bytes, 5); -+ assert!(!msg.flags.intersects(MsgFlags::MSG_TRUNC | MsgFlags::MSG_CTRUNC)); -+ close(recv).unwrap(); -+ } -+} -+ -+/// Ensure that we can send `SCM_CREDENTIALS` and `SCM_RIGHTS` with a single -+/// `sendmsg` call. -+#[cfg(any(target_os = "android", target_os = "linux"))] -+// qemu's handling of multiple cmsgs is bugged, ignore tests on non-x86 -+// see https://bugs.launchpad.net/qemu/+bug/1781280 -+#[cfg_attr(not(any(target_arch = "x86_64", target_arch = "x86")), ignore)] -+#[test] -+fn test_scm_credentials_and_rights() { -+ use libc; -+ -+ let space = cmsg_space!(libc::ucred, RawFd); -+ test_impl_scm_credentials_and_rights(space); -+} -+ -+/// Ensure that passing a an oversized control message buffer to recvmsg -+/// still works. -+#[cfg(any(target_os = "android", target_os = "linux"))] -+// qemu's handling of multiple cmsgs is bugged, ignore tests on non-x86 -+// see https://bugs.launchpad.net/qemu/+bug/1781280 -+#[cfg_attr(not(any(target_arch = "x86_64", target_arch = "x86")), ignore)] -+#[test] -+fn test_too_large_cmsgspace() { -+ let space = vec![0u8; 1024]; -+ test_impl_scm_credentials_and_rights(space); -+} -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+fn test_impl_scm_credentials_and_rights(mut space: Vec<u8>) { -+ use libc::ucred; -+ use nix::sys::uio::IoVec; -+ use nix::unistd::{pipe, read, write, close, getpid, getuid, getgid}; -+ use nix::sys::socket::{socketpair, sendmsg, recvmsg, setsockopt, -+ SockType, SockFlag, -+ ControlMessage, ControlMessageOwned, MsgFlags}; -+ use nix::sys::socket::sockopt::PassCred; -+ -+ let (send, recv) = socketpair(AddressFamily::Unix, SockType::Stream, None, SockFlag::empty()) -+ .unwrap(); -+ setsockopt(recv, PassCred, &true).unwrap(); -+ -+ let (r, w) = pipe().unwrap(); -+ let mut received_r: Option<RawFd> = None; -+ -+ { -+ let iov = [IoVec::from_slice(b"hello")]; -+ let cred = ucred { -+ pid: getpid().as_raw(), -+ uid: getuid().as_raw(), -+ gid: getgid().as_raw(), -+ }; -+ let fds = [r]; -+ let cmsgs = [ -+ ControlMessage::ScmCredentials(&cred), -+ ControlMessage::ScmRights(&fds), -+ ]; -+ assert_eq!(sendmsg(send, &iov, &cmsgs, MsgFlags::empty(), None).unwrap(), 5); -+ close(r).unwrap(); -+ close(send).unwrap(); -+ } -+ -+ { -+ let mut buf = [0u8; 5]; -+ let iov = [IoVec::from_mut_slice(&mut buf[..])]; -+ let msg = recvmsg(recv, &iov, Some(&mut space), MsgFlags::empty()).unwrap(); -+ let mut received_cred = None; -+ -+ assert_eq!(msg.cmsgs().count(), 2, "expected 2 cmsgs"); -+ -+ for cmsg in msg.cmsgs() { -+ match cmsg { -+ ControlMessageOwned::ScmRights(fds) => { -+ assert_eq!(received_r, None, "already received fd"); -+ assert_eq!(fds.len(), 1); -+ received_r = Some(fds[0]); -+ } -+ ControlMessageOwned::ScmCredentials(cred) => { -+ assert!(received_cred.is_none()); -+ assert_eq!(cred.pid, getpid().as_raw()); -+ assert_eq!(cred.uid, getuid().as_raw()); -+ assert_eq!(cred.gid, getgid().as_raw()); -+ received_cred = Some(cred); -+ } -+ _ => panic!("unexpected cmsg"), -+ } -+ } -+ received_cred.expect("no creds received"); -+ assert_eq!(msg.bytes, 5); -+ assert!(!msg.flags.intersects(MsgFlags::MSG_TRUNC | MsgFlags::MSG_CTRUNC)); -+ close(recv).unwrap(); -+ } -+ -+ let received_r = received_r.expect("Did not receive passed fd"); -+ // Ensure that the received file descriptor works -+ write(w, b"world").unwrap(); -+ let mut buf = [0u8; 5]; -+ read(received_r, &mut buf).unwrap(); -+ assert_eq!(&buf[..], b"world"); -+ close(received_r).unwrap(); -+ close(w).unwrap(); -+} -+ -+// Test creating and using named unix domain sockets -+#[test] -+pub fn test_unixdomain() { -+ use nix::sys::socket::{SockType, SockFlag}; -+ use nix::sys::socket::{bind, socket, connect, listen, accept, SockAddr}; -+ use nix::unistd::{read, write, close}; -+ use std::thread; -+ -+ let tempdir = tempfile::tempdir().unwrap(); -+ let sockname = tempdir.path().join("sock"); -+ let s1 = socket(AddressFamily::Unix, SockType::Stream, -+ SockFlag::empty(), None).expect("socket failed"); -+ let sockaddr = SockAddr::new_unix(&sockname).unwrap(); -+ bind(s1, &sockaddr).expect("bind failed"); -+ listen(s1, 10).expect("listen failed"); -+ -+ let thr = thread::spawn(move || { -+ let s2 = socket(AddressFamily::Unix, SockType::Stream, SockFlag::empty(), None) -+ .expect("socket failed"); -+ connect(s2, &sockaddr).expect("connect failed"); -+ write(s2, b"hello").expect("write failed"); -+ close(s2).unwrap(); -+ }); -+ -+ let s3 = accept(s1).expect("accept failed"); -+ -+ let mut buf = [0;5]; -+ read(s3, &mut buf).unwrap(); -+ close(s3).unwrap(); -+ close(s1).unwrap(); -+ thr.join().unwrap(); -+ -+ assert_eq!(&buf[..], b"hello"); -+} -+ -+// Test creating and using named system control sockets -+#[cfg(any(target_os = "macos", target_os = "ios"))] -+#[test] -+pub fn test_syscontrol() { -+ use nix::Error; -+ use nix::errno::Errno; -+ use nix::sys::socket::{socket, SockAddr, SockType, SockFlag, SockProtocol}; -+ -+ let fd = socket(AddressFamily::System, SockType::Datagram, -+ SockFlag::empty(), SockProtocol::KextControl) -+ .expect("socket failed"); -+ let _sockaddr = SockAddr::new_sys_control(fd, "com.apple.net.utun_control", 0).expect("resolving sys_control name failed"); -+ assert_eq!(SockAddr::new_sys_control(fd, "foo.bar.lol", 0).err(), Some(Error::Sys(Errno::ENOENT))); -+ -+ // requires root privileges -+ // connect(fd, &sockaddr).expect("connect failed"); -+} -+ -+#[cfg(any( -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+))] -+fn loopback_address(family: AddressFamily) -> Option<InterfaceAddress> { -+ use std::io; -+ use std::io::Write; -+ use nix::ifaddrs::getifaddrs; -+ use nix::sys::socket::SockAddr; -+ use nix::net::if_::*; -+ -+ let addrs = match getifaddrs() { -+ Ok(iter) => iter, -+ Err(e) => { -+ let stdioerr = io::stderr(); -+ let mut handle = stdioerr.lock(); -+ writeln!(handle, "getifaddrs: {:?}", e).unwrap(); -+ return None; -+ }, -+ }; -+ // return first address matching family -+ for ifaddr in addrs { -+ if ifaddr.flags.contains(InterfaceFlags::IFF_LOOPBACK) { -+ match ifaddr.address { -+ Some(SockAddr::Inet(InetAddr::V4(..))) => { -+ match family { -+ AddressFamily::Inet => return Some(ifaddr), -+ _ => continue -+ } -+ }, -+ Some(SockAddr::Inet(InetAddr::V6(..))) => { -+ match family { -+ AddressFamily::Inet6 => return Some(ifaddr), -+ _ => continue -+ } -+ }, -+ _ => continue, -+ } -+ } -+ } -+ None -+} -+ -+#[cfg(any( -+ target_os = "android", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+))] -+// qemu doesn't seem to be emulating this correctly in these architectures -+#[cfg_attr(any( -+ target_arch = "mips", -+ target_arch = "mips64", -+ target_arch = "powerpc64", -+), ignore)] -+#[test] -+pub fn test_recv_ipv4pktinfo() { -+ use libc; -+ use nix::sys::socket::sockopt::Ipv4PacketInfo; -+ use nix::sys::socket::{bind, SockFlag, SockType}; -+ use nix::sys::socket::{getsockname, setsockopt, socket}; -+ use nix::sys::socket::{recvmsg, sendmsg, ControlMessageOwned, MsgFlags}; -+ use nix::sys::uio::IoVec; -+ use nix::net::if_::*; -+ -+ let lo_ifaddr = loopback_address(AddressFamily::Inet); -+ let (lo_name, lo) = match lo_ifaddr { -+ Some(ifaddr) => (ifaddr.interface_name, -+ ifaddr.address.expect("Expect IPv4 address on interface")), -+ None => return, -+ }; -+ let receive = socket( -+ AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None, -+ ).expect("receive socket failed"); -+ bind(receive, &lo).expect("bind failed"); -+ let sa = getsockname(receive).expect("getsockname failed"); -+ setsockopt(receive, Ipv4PacketInfo, &true).expect("setsockopt failed"); -+ -+ { -+ let slice = [1u8, 2, 3, 4, 5, 6, 7, 8]; -+ let iov = [IoVec::from_slice(&slice)]; -+ -+ let send = socket( -+ AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None, -+ ).expect("send socket failed"); -+ sendmsg(send, &iov, &[], MsgFlags::empty(), Some(&sa)).expect("sendmsg failed"); -+ } -+ -+ { -+ let mut buf = [0u8; 8]; -+ let iovec = [IoVec::from_mut_slice(&mut buf)]; -+ let mut space = cmsg_space!(libc::in_pktinfo); -+ let msg = recvmsg( -+ receive, -+ &iovec, -+ Some(&mut space), -+ MsgFlags::empty(), -+ ).expect("recvmsg failed"); -+ assert!( -+ !msg.flags -+ .intersects(MsgFlags::MSG_TRUNC | MsgFlags::MSG_CTRUNC) -+ ); -+ -+ let mut cmsgs = msg.cmsgs(); -+ match cmsgs.next() { -+ Some(ControlMessageOwned::Ipv4PacketInfo(pktinfo)) => { -+ let i = if_nametoindex(lo_name.as_bytes()).expect("if_nametoindex"); -+ assert_eq!( -+ pktinfo.ipi_ifindex as libc::c_uint, -+ i, -+ "unexpected ifindex (expected {}, got {})", -+ i, -+ pktinfo.ipi_ifindex -+ ); -+ } -+ _ => (), -+ } -+ assert!(cmsgs.next().is_none(), "unexpected additional control msg"); -+ assert_eq!(msg.bytes, 8); -+ assert_eq!( -+ iovec[0].as_slice(), -+ [1u8, 2, 3, 4, 5, 6, 7, 8] -+ ); -+ } -+} -+ -+#[cfg(any( -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+))] -+// qemu doesn't seem to be emulating this correctly in these architectures -+#[cfg_attr(any( -+ target_arch = "mips", -+ target_arch = "mips64", -+ target_arch = "powerpc64", -+), ignore)] -+#[test] -+pub fn test_recvif() { -+ use libc; -+ use nix::net::if_::*; -+ use nix::sys::socket::sockopt::{Ipv4RecvIf, Ipv4RecvDstAddr}; -+ use nix::sys::socket::{bind, SockFlag, SockType}; -+ use nix::sys::socket::{getsockname, setsockopt, socket, SockAddr}; -+ use nix::sys::socket::{recvmsg, sendmsg, ControlMessageOwned, MsgFlags}; -+ use nix::sys::uio::IoVec; -+ -+ let lo_ifaddr = loopback_address(AddressFamily::Inet); -+ let (lo_name, lo) = match lo_ifaddr { -+ Some(ifaddr) => (ifaddr.interface_name, -+ ifaddr.address.expect("Expect IPv4 address on interface")), -+ None => return, -+ }; -+ let receive = socket( -+ AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None, -+ ).expect("receive socket failed"); -+ bind(receive, &lo).expect("bind failed"); -+ let sa = getsockname(receive).expect("getsockname failed"); -+ setsockopt(receive, Ipv4RecvIf, &true).expect("setsockopt IP_RECVIF failed"); -+ setsockopt(receive, Ipv4RecvDstAddr, &true).expect("setsockopt IP_RECVDSTADDR failed"); -+ -+ { -+ let slice = [1u8, 2, 3, 4, 5, 6, 7, 8]; -+ let iov = [IoVec::from_slice(&slice)]; -+ -+ let send = socket( -+ AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None, -+ ).expect("send socket failed"); -+ sendmsg(send, &iov, &[], MsgFlags::empty(), Some(&sa)).expect("sendmsg failed"); -+ } -+ -+ { -+ let mut buf = [0u8; 8]; -+ let iovec = [IoVec::from_mut_slice(&mut buf)]; -+ let mut space = cmsg_space!(libc::sockaddr_dl, libc::in_addr); -+ let msg = recvmsg( -+ receive, -+ &iovec, -+ Some(&mut space), -+ MsgFlags::empty(), -+ ).expect("recvmsg failed"); -+ assert!( -+ !msg.flags -+ .intersects(MsgFlags::MSG_TRUNC | MsgFlags::MSG_CTRUNC) -+ ); -+ assert_eq!(msg.cmsgs().count(), 2, "expected 2 cmsgs"); -+ -+ let mut rx_recvif = false; -+ let mut rx_recvdstaddr = false; -+ for cmsg in msg.cmsgs() { -+ match cmsg { -+ ControlMessageOwned::Ipv4RecvIf(dl) => { -+ rx_recvif = true; -+ let i = if_nametoindex(lo_name.as_bytes()).expect("if_nametoindex"); -+ assert_eq!( -+ dl.sdl_index as libc::c_uint, -+ i, -+ "unexpected ifindex (expected {}, got {})", -+ i, -+ dl.sdl_index -+ ); -+ }, -+ ControlMessageOwned::Ipv4RecvDstAddr(addr) => { -+ rx_recvdstaddr = true; -+ if let SockAddr::Inet(InetAddr::V4(a)) = lo { -+ assert_eq!(a.sin_addr.s_addr, -+ addr.s_addr, -+ "unexpected destination address (expected {}, got {})", -+ a.sin_addr.s_addr, -+ addr.s_addr); -+ } else { -+ panic!("unexpected Sockaddr"); -+ } -+ }, -+ _ => panic!("unexpected additional control msg"), -+ } -+ } -+ assert_eq!(rx_recvif, true); -+ assert_eq!(rx_recvdstaddr, true); -+ assert_eq!(msg.bytes, 8); -+ assert_eq!( -+ iovec[0].as_slice(), -+ [1u8, 2, 3, 4, 5, 6, 7, 8] -+ ); -+ } -+} -+ -+#[cfg(any( -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd", -+))] -+// qemu doesn't seem to be emulating this correctly in these architectures -+#[cfg_attr(any( -+ target_arch = "mips", -+ target_arch = "mips64", -+ target_arch = "powerpc64", -+), ignore)] -+#[test] -+pub fn test_recv_ipv6pktinfo() { -+ use libc; -+ use nix::net::if_::*; -+ use nix::sys::socket::sockopt::Ipv6RecvPacketInfo; -+ use nix::sys::socket::{bind, SockFlag, SockType}; -+ use nix::sys::socket::{getsockname, setsockopt, socket}; -+ use nix::sys::socket::{recvmsg, sendmsg, ControlMessageOwned, MsgFlags}; -+ use nix::sys::uio::IoVec; -+ -+ let lo_ifaddr = loopback_address(AddressFamily::Inet6); -+ let (lo_name, lo) = match lo_ifaddr { -+ Some(ifaddr) => (ifaddr.interface_name, -+ ifaddr.address.expect("Expect IPv4 address on interface")), -+ None => return, -+ }; -+ let receive = socket( -+ AddressFamily::Inet6, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None, -+ ).expect("receive socket failed"); -+ bind(receive, &lo).expect("bind failed"); -+ let sa = getsockname(receive).expect("getsockname failed"); -+ setsockopt(receive, Ipv6RecvPacketInfo, &true).expect("setsockopt failed"); -+ -+ { -+ let slice = [1u8, 2, 3, 4, 5, 6, 7, 8]; -+ let iov = [IoVec::from_slice(&slice)]; -+ -+ let send = socket( -+ AddressFamily::Inet6, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None, -+ ).expect("send socket failed"); -+ sendmsg(send, &iov, &[], MsgFlags::empty(), Some(&sa)).expect("sendmsg failed"); -+ } -+ -+ { -+ let mut buf = [0u8; 8]; -+ let iovec = [IoVec::from_mut_slice(&mut buf)]; -+ let mut space = cmsg_space!(libc::in6_pktinfo); -+ let msg = recvmsg( -+ receive, -+ &iovec, -+ Some(&mut space), -+ MsgFlags::empty(), -+ ).expect("recvmsg failed"); -+ assert!( -+ !msg.flags -+ .intersects(MsgFlags::MSG_TRUNC | MsgFlags::MSG_CTRUNC) -+ ); -+ -+ let mut cmsgs = msg.cmsgs(); -+ match cmsgs.next() { -+ Some(ControlMessageOwned::Ipv6PacketInfo(pktinfo)) => { -+ let i = if_nametoindex(lo_name.as_bytes()).expect("if_nametoindex"); -+ assert_eq!( -+ pktinfo.ipi6_ifindex, -+ i, -+ "unexpected ifindex (expected {}, got {})", -+ i, -+ pktinfo.ipi6_ifindex -+ ); -+ } -+ _ => (), -+ } -+ assert!(cmsgs.next().is_none(), "unexpected additional control msg"); -+ assert_eq!(msg.bytes, 8); -+ assert_eq!( -+ iovec[0].as_slice(), -+ [1u8, 2, 3, 4, 5, 6, 7, 8] -+ ); -+ } -+} -+ -+#[cfg(target_os = "linux")] -+#[test] -+pub fn test_vsock() { -+ use libc; -+ use nix::Error; -+ use nix::errno::Errno; -+ use nix::sys::socket::{AddressFamily, socket, bind, connect, listen, -+ SockAddr, SockType, SockFlag}; -+ use nix::unistd::{close}; -+ use std::thread; -+ -+ let port: u32 = 3000; -+ -+ let s1 = socket(AddressFamily::Vsock, SockType::Stream, -+ SockFlag::empty(), None) -+ .expect("socket failed"); -+ -+ // VMADDR_CID_HYPERVISOR and VMADDR_CID_RESERVED are reserved, so we expect -+ // an EADDRNOTAVAIL error. -+ let sockaddr = SockAddr::new_vsock(libc::VMADDR_CID_HYPERVISOR, port); -+ assert_eq!(bind(s1, &sockaddr).err(), -+ Some(Error::Sys(Errno::EADDRNOTAVAIL))); -+ -+ let sockaddr = SockAddr::new_vsock(libc::VMADDR_CID_RESERVED, port); -+ assert_eq!(bind(s1, &sockaddr).err(), -+ Some(Error::Sys(Errno::EADDRNOTAVAIL))); -+ -+ -+ let sockaddr = SockAddr::new_vsock(libc::VMADDR_CID_ANY, port); -+ assert_eq!(bind(s1, &sockaddr), Ok(())); -+ listen(s1, 10).expect("listen failed"); -+ -+ let thr = thread::spawn(move || { -+ let cid: u32 = libc::VMADDR_CID_HOST; -+ -+ let s2 = socket(AddressFamily::Vsock, SockType::Stream, -+ SockFlag::empty(), None) -+ .expect("socket failed"); -+ -+ let sockaddr = SockAddr::new_vsock(cid, port); -+ -+ // The current implementation does not support loopback devices, so, -+ // for now, we expect a failure on the connect. -+ assert_ne!(connect(s2, &sockaddr), Ok(())); -+ -+ close(s2).unwrap(); -+ }); -+ -+ close(s1).unwrap(); -+ thr.join().unwrap(); -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_sockopt.rs b/third_party/rust/nix-0.15.0/test/sys/test_sockopt.rs -new file mode 100644 -index 0000000000000..c4860c0d61d3d ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_sockopt.rs -@@ -0,0 +1,53 @@ -+use rand::{thread_rng, Rng}; -+use nix::sys::socket::{socket, sockopt, getsockopt, setsockopt, AddressFamily, SockType, SockFlag, SockProtocol}; -+ -+#[cfg(target_os = "linux")] -+#[test] -+fn is_so_mark_functional() { -+ use nix::sys::socket::sockopt; -+ -+ require_capability!(CAP_NET_ADMIN); -+ -+ let s = socket(AddressFamily::Inet, SockType::Stream, SockFlag::empty(), None).unwrap(); -+ setsockopt(s, sockopt::Mark, &1337).unwrap(); -+ let mark = getsockopt(s, sockopt::Mark).unwrap(); -+ assert_eq!(mark, 1337); -+} -+ -+#[test] -+fn test_so_buf() { -+ let fd = socket(AddressFamily::Inet, SockType::Datagram, SockFlag::empty(), SockProtocol::Udp) -+ .unwrap(); -+ let bufsize: usize = thread_rng().gen_range(4096, 131_072); -+ setsockopt(fd, sockopt::SndBuf, &bufsize).unwrap(); -+ let actual = getsockopt(fd, sockopt::SndBuf).unwrap(); -+ assert!(actual >= bufsize); -+ setsockopt(fd, sockopt::RcvBuf, &bufsize).unwrap(); -+ let actual = getsockopt(fd, sockopt::RcvBuf).unwrap(); -+ assert!(actual >= bufsize); -+} -+ -+// The CI doesn't supported getsockopt and setsockopt on emulated processors. -+// It's beleived that a QEMU issue, the tests run ok on a fully emulated system. -+// Current CI just run the binary with QEMU but the Kernel remains the same as the host. -+// So the syscall doesn't work properly unless the kernel is also emulated. -+#[test] -+#[cfg(all( -+ any(target_arch = "x86", target_arch = "x86_64"), -+ any(target_os = "freebsd", target_os = "linux") -+))] -+fn test_tcp_congestion() { -+ use std::ffi::OsString; -+ -+ let fd = socket(AddressFamily::Inet, SockType::Stream, SockFlag::empty(), None).unwrap(); -+ -+ let val = getsockopt(fd, sockopt::TcpCongestion).unwrap(); -+ setsockopt(fd, sockopt::TcpCongestion, &val).unwrap(); -+ -+ setsockopt(fd, sockopt::TcpCongestion, &OsString::from("tcp_congestion_does_not_exist")).unwrap_err(); -+ -+ assert_eq!( -+ getsockopt(fd, sockopt::TcpCongestion).unwrap(), -+ val -+ ); -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_sysinfo.rs b/third_party/rust/nix-0.15.0/test/sys/test_sysinfo.rs -new file mode 100644 -index 0000000000000..73e6586f6223e ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_sysinfo.rs -@@ -0,0 +1,18 @@ -+use nix::sys::sysinfo::*; -+ -+#[test] -+fn sysinfo_works() { -+ let info = sysinfo().unwrap(); -+ -+ let (l1, l5, l15) = info.load_average(); -+ assert!(l1 >= 0.0); -+ assert!(l5 >= 0.0); -+ assert!(l15 >= 0.0); -+ -+ info.uptime(); // just test Duration construction -+ -+ assert!(info.swap_free() <= info.swap_total(), -+ "more swap available than installed (free: {}, total: {})", -+ info.swap_free(), -+ info.swap_total()); -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_termios.rs b/third_party/rust/nix-0.15.0/test/sys/test_termios.rs -new file mode 100644 -index 0000000000000..a14b8ce1a23cb ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_termios.rs -@@ -0,0 +1,136 @@ -+use std::os::unix::prelude::*; -+use tempfile::tempfile; -+ -+use nix::{Error, fcntl}; -+use nix::errno::Errno; -+use nix::pty::openpty; -+use nix::sys::termios::{self, LocalFlags, OutputFlags, Termios, tcgetattr}; -+use nix::unistd::{read, write, close}; -+ -+/// Helper function analogous to `std::io::Write::write_all`, but for `RawFd`s -+fn write_all(f: RawFd, buf: &[u8]) { -+ let mut len = 0; -+ while len < buf.len() { -+ len += write(f, &buf[len..]).unwrap(); -+ } -+} -+ -+// Test tcgetattr on a terminal -+#[test] -+fn test_tcgetattr_pty() { -+ // openpty uses ptname(3) internally -+ let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ let pty = openpty(None, None).expect("openpty failed"); -+ assert!(termios::tcgetattr(pty.master).is_ok()); -+ close(pty.master).expect("closing the master failed"); -+ close(pty.slave).expect("closing the slave failed"); -+} -+ -+// Test tcgetattr on something that isn't a terminal -+#[test] -+fn test_tcgetattr_enotty() { -+ let file = tempfile().unwrap(); -+ assert_eq!(termios::tcgetattr(file.as_raw_fd()).err(), -+ Some(Error::Sys(Errno::ENOTTY))); -+} -+ -+// Test tcgetattr on an invalid file descriptor -+#[test] -+fn test_tcgetattr_ebadf() { -+ assert_eq!(termios::tcgetattr(-1).err(), -+ Some(Error::Sys(Errno::EBADF))); -+} -+ -+// Test modifying output flags -+#[test] -+fn test_output_flags() { -+ // openpty uses ptname(3) internally -+ let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // Open one pty to get attributes for the second one -+ let mut termios = { -+ let pty = openpty(None, None).expect("openpty failed"); -+ assert!(pty.master > 0); -+ assert!(pty.slave > 0); -+ let termios = tcgetattr(pty.master).expect("tcgetattr failed"); -+ close(pty.master).unwrap(); -+ close(pty.slave).unwrap(); -+ termios -+ }; -+ -+ // Make sure postprocessing '\r' isn't specified by default or this test is useless. -+ assert!(!termios.output_flags.contains(OutputFlags::OPOST | OutputFlags::OCRNL)); -+ -+ // Specify that '\r' characters should be transformed to '\n' -+ // OPOST is specified to enable post-processing -+ termios.output_flags.insert(OutputFlags::OPOST | OutputFlags::OCRNL); -+ -+ // Open a pty -+ let pty = openpty(None, &termios).unwrap(); -+ assert!(pty.master > 0); -+ assert!(pty.slave > 0); -+ -+ // Write into the master -+ let string = "foofoofoo\r"; -+ write_all(pty.master, string.as_bytes()); -+ -+ // Read from the slave verifying that the output has been properly transformed -+ let mut buf = [0u8; 10]; -+ ::read_exact(pty.slave, &mut buf); -+ let transformed_string = "foofoofoo\n"; -+ close(pty.master).unwrap(); -+ close(pty.slave).unwrap(); -+ assert_eq!(&buf, transformed_string.as_bytes()); -+} -+ -+// Test modifying local flags -+#[test] -+fn test_local_flags() { -+ // openpty uses ptname(3) internally -+ let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // Open one pty to get attributes for the second one -+ let mut termios = { -+ let pty = openpty(None, None).unwrap(); -+ assert!(pty.master > 0); -+ assert!(pty.slave > 0); -+ let termios = tcgetattr(pty.master).unwrap(); -+ close(pty.master).unwrap(); -+ close(pty.slave).unwrap(); -+ termios -+ }; -+ -+ // Make sure echo is specified by default or this test is useless. -+ assert!(termios.local_flags.contains(LocalFlags::ECHO)); -+ -+ // Disable local echo -+ termios.local_flags.remove(LocalFlags::ECHO); -+ -+ // Open a new pty with our modified termios settings -+ let pty = openpty(None, &termios).unwrap(); -+ assert!(pty.master > 0); -+ assert!(pty.slave > 0); -+ -+ // Set the master is in nonblocking mode or reading will never return. -+ let flags = fcntl::fcntl(pty.master, fcntl::F_GETFL).unwrap(); -+ let new_flags = fcntl::OFlag::from_bits_truncate(flags) | fcntl::OFlag::O_NONBLOCK; -+ fcntl::fcntl(pty.master, fcntl::F_SETFL(new_flags)).unwrap(); -+ -+ // Write into the master -+ let string = "foofoofoo\r"; -+ write_all(pty.master, string.as_bytes()); -+ -+ // Try to read from the master, which should not have anything as echoing was disabled. -+ let mut buf = [0u8; 10]; -+ let read = read(pty.master, &mut buf).unwrap_err(); -+ close(pty.master).unwrap(); -+ close(pty.slave).unwrap(); -+ assert_eq!(read, Error::Sys(Errno::EAGAIN)); -+} -+ -+#[test] -+fn test_cfmakeraw() { -+ let mut termios = unsafe { Termios::default_uninit() }; -+ termios::cfmakeraw(&mut termios); -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_uio.rs b/third_party/rust/nix-0.15.0/test/sys/test_uio.rs -new file mode 100644 -index 0000000000000..3e4fc28ceb0e4 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_uio.rs -@@ -0,0 +1,241 @@ -+use nix::sys::uio::*; -+use nix::unistd::*; -+use rand::{thread_rng, Rng}; -+use rand::distributions::Alphanumeric; -+use std::{cmp, iter}; -+use std::fs::{OpenOptions}; -+use std::os::unix::io::AsRawFd; -+ -+use tempfile::{tempfile, tempdir}; -+ -+#[test] -+fn test_writev() { -+ let mut to_write = Vec::with_capacity(16 * 128); -+ for _ in 0..16 { -+ let s: String = thread_rng().sample_iter(&Alphanumeric).take(128).collect(); -+ let b = s.as_bytes(); -+ to_write.extend(b.iter().cloned()); -+ } -+ // Allocate and fill iovecs -+ let mut iovecs = Vec::new(); -+ let mut consumed = 0; -+ while consumed < to_write.len() { -+ let left = to_write.len() - consumed; -+ let slice_len = if left <= 64 { left } else { thread_rng().gen_range(64, cmp::min(256, left)) }; -+ let b = &to_write[consumed..consumed+slice_len]; -+ iovecs.push(IoVec::from_slice(b)); -+ consumed += slice_len; -+ } -+ let pipe_res = pipe(); -+ assert!(pipe_res.is_ok()); -+ let (reader, writer) = pipe_res.ok().unwrap(); -+ // FileDesc will close its filedesc (reader). -+ let mut read_buf: Vec<u8> = iter::repeat(0u8).take(128 * 16).collect(); -+ // Blocking io, should write all data. -+ let write_res = writev(writer, &iovecs); -+ // Successful write -+ assert!(write_res.is_ok()); -+ let written = write_res.ok().unwrap(); -+ // Check whether we written all data -+ assert_eq!(to_write.len(), written); -+ let read_res = read(reader, &mut read_buf[..]); -+ // Successful read -+ assert!(read_res.is_ok()); -+ let read = read_res.ok().unwrap() as usize; -+ // Check we have read as much as we written -+ assert_eq!(read, written); -+ // Check equality of written and read data -+ assert_eq!(&to_write, &read_buf); -+ let close_res = close(writer); -+ assert!(close_res.is_ok()); -+ let close_res = close(reader); -+ assert!(close_res.is_ok()); -+} -+ -+#[test] -+fn test_readv() { -+ let s:String = thread_rng().sample_iter(&Alphanumeric).take(128).collect(); -+ let to_write = s.as_bytes().to_vec(); -+ let mut storage = Vec::new(); -+ let mut allocated = 0; -+ while allocated < to_write.len() { -+ let left = to_write.len() - allocated; -+ let vec_len = if left <= 64 { left } else { thread_rng().gen_range(64, cmp::min(256, left)) }; -+ let v: Vec<u8> = iter::repeat(0u8).take(vec_len).collect(); -+ storage.push(v); -+ allocated += vec_len; -+ } -+ let mut iovecs = Vec::with_capacity(storage.len()); -+ for v in &mut storage { -+ iovecs.push(IoVec::from_mut_slice(&mut v[..])); -+ } -+ let pipe_res = pipe(); -+ assert!(pipe_res.is_ok()); -+ let (reader, writer) = pipe_res.ok().unwrap(); -+ // Blocking io, should write all data. -+ let write_res = write(writer, &to_write); -+ // Successful write -+ assert!(write_res.is_ok()); -+ let read_res = readv(reader, &mut iovecs[..]); -+ assert!(read_res.is_ok()); -+ let read = read_res.ok().unwrap(); -+ // Check whether we've read all data -+ assert_eq!(to_write.len(), read); -+ // Cccumulate data from iovecs -+ let mut read_buf = Vec::with_capacity(to_write.len()); -+ for iovec in &iovecs { -+ read_buf.extend(iovec.as_slice().iter().cloned()); -+ } -+ // Check whether iovecs contain all written data -+ assert_eq!(read_buf.len(), to_write.len()); -+ // Check equality of written and read data -+ assert_eq!(&read_buf, &to_write); -+ let close_res = close(reader); -+ assert!(close_res.is_ok()); -+ let close_res = close(writer); -+ assert!(close_res.is_ok()); -+} -+ -+#[test] -+fn test_pwrite() { -+ use std::io::Read; -+ -+ let mut file = tempfile().unwrap(); -+ let buf = [1u8;8]; -+ assert_eq!(Ok(8), pwrite(file.as_raw_fd(), &buf, 8)); -+ let mut file_content = Vec::new(); -+ file.read_to_end(&mut file_content).unwrap(); -+ let mut expected = vec![0u8;8]; -+ expected.extend(vec![1;8]); -+ assert_eq!(file_content, expected); -+} -+ -+#[test] -+fn test_pread() { -+ use std::io::Write; -+ -+ let tempdir = tempdir().unwrap(); -+ -+ let path = tempdir.path().join("pread_test_file"); -+ let mut file = OpenOptions::new().write(true).read(true).create(true) -+ .truncate(true).open(path).unwrap(); -+ let file_content: Vec<u8> = (0..64).collect(); -+ file.write_all(&file_content).unwrap(); -+ -+ let mut buf = [0u8;16]; -+ assert_eq!(Ok(16), pread(file.as_raw_fd(), &mut buf, 16)); -+ let expected: Vec<_> = (16..32).collect(); -+ assert_eq!(&buf[..], &expected[..]); -+} -+ -+#[test] -+#[cfg(target_os = "linux")] -+fn test_pwritev() { -+ use std::io::Read; -+ -+ let to_write: Vec<u8> = (0..128).collect(); -+ let expected: Vec<u8> = [vec![0;100], to_write.clone()].concat(); -+ -+ let iovecs = [ -+ IoVec::from_slice(&to_write[0..17]), -+ IoVec::from_slice(&to_write[17..64]), -+ IoVec::from_slice(&to_write[64..128]), -+ ]; -+ -+ let tempdir = tempdir().unwrap(); -+ -+ // pwritev them into a temporary file -+ let path = tempdir.path().join("pwritev_test_file"); -+ let mut file = OpenOptions::new().write(true).read(true).create(true) -+ .truncate(true).open(path).unwrap(); -+ -+ let written = pwritev(file.as_raw_fd(), &iovecs, 100).ok().unwrap(); -+ assert_eq!(written, to_write.len()); -+ -+ // Read the data back and make sure it matches -+ let mut contents = Vec::new(); -+ file.read_to_end(&mut contents).unwrap(); -+ assert_eq!(contents, expected); -+} -+ -+#[test] -+#[cfg(target_os = "linux")] -+fn test_preadv() { -+ use std::io::Write; -+ -+ let to_write: Vec<u8> = (0..200).collect(); -+ let expected: Vec<u8> = (100..200).collect(); -+ -+ let tempdir = tempdir().unwrap(); -+ -+ let path = tempdir.path().join("preadv_test_file"); -+ -+ let mut file = OpenOptions::new().read(true).write(true).create(true) -+ .truncate(true).open(path).unwrap(); -+ file.write_all(&to_write).unwrap(); -+ -+ let mut buffers: Vec<Vec<u8>> = vec![ -+ vec![0; 24], -+ vec![0; 1], -+ vec![0; 75], -+ ]; -+ -+ { -+ // Borrow the buffers into IoVecs and preadv into them -+ let iovecs: Vec<_> = buffers.iter_mut().map( -+ |buf| IoVec::from_mut_slice(&mut buf[..])).collect(); -+ assert_eq!(Ok(100), preadv(file.as_raw_fd(), &iovecs, 100)); -+ } -+ -+ let all = buffers.concat(); -+ assert_eq!(all, expected); -+} -+ -+#[test] -+#[cfg(target_os = "linux")] -+// FIXME: qemu-user doesn't implement process_vm_readv/writev on most arches -+#[cfg_attr(not(any(target_arch = "x86", target_arch = "x86_64")), ignore)] -+fn test_process_vm_readv() { -+ use nix::unistd::ForkResult::*; -+ use nix::sys::signal::*; -+ use nix::sys::wait::*; -+ -+ let _ = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // Pre-allocate memory in the child, since allocation isn't safe -+ // post-fork (~= async-signal-safe) -+ let mut vector = vec![1u8, 2, 3, 4, 5]; -+ -+ let (r, w) = pipe().unwrap(); -+ match fork().expect("Error: Fork Failed") { -+ Parent { child } => { -+ close(w).unwrap(); -+ // wait for child -+ read(r, &mut [0u8]).unwrap(); -+ close(r).unwrap(); -+ -+ let ptr = vector.as_ptr() as usize; -+ let remote_iov = RemoteIoVec { base: ptr, len: 5 }; -+ let mut buf = vec![0u8; 5]; -+ -+ let ret = process_vm_readv(child, -+ &[IoVec::from_mut_slice(&mut buf)], -+ &[remote_iov]); -+ -+ kill(child, SIGTERM).unwrap(); -+ waitpid(child, None).unwrap(); -+ -+ assert_eq!(Ok(5), ret); -+ assert_eq!(20u8, buf.iter().sum()); -+ }, -+ Child => { -+ let _ = close(r); -+ for i in &mut vector { -+ *i += 1; -+ } -+ let _ = write(w, b"\0"); -+ let _ = close(w); -+ loop { let _ = pause(); } -+ }, -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/test/sys/test_wait.rs b/third_party/rust/nix-0.15.0/test/sys/test_wait.rs -new file mode 100644 -index 0000000000000..d07d82f0d9075 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/sys/test_wait.rs -@@ -0,0 +1,104 @@ -+use nix::Error; -+use nix::unistd::*; -+use nix::unistd::ForkResult::*; -+use nix::sys::signal::*; -+use nix::sys::wait::*; -+use libc::_exit; -+ -+#[test] -+fn test_wait_signal() { -+ let _ = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // Safe: The child only calls `pause` and/or `_exit`, which are async-signal-safe. -+ match fork().expect("Error: Fork Failed") { -+ Child => { -+ pause(); -+ unsafe { _exit(123) } -+ }, -+ Parent { child } => { -+ kill(child, Some(SIGKILL)).expect("Error: Kill Failed"); -+ assert_eq!(waitpid(child, None), Ok(WaitStatus::Signaled(child, SIGKILL, false))); -+ }, -+ } -+} -+ -+#[test] -+fn test_wait_exit() { -+ let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // Safe: Child only calls `_exit`, which is async-signal-safe. -+ match fork().expect("Error: Fork Failed") { -+ Child => unsafe { _exit(12); }, -+ Parent { child } => { -+ assert_eq!(waitpid(child, None), Ok(WaitStatus::Exited(child, 12))); -+ }, -+ } -+} -+ -+#[test] -+fn test_waitstatus_from_raw() { -+ let pid = Pid::from_raw(1); -+ assert_eq!(WaitStatus::from_raw(pid, 0x0002), Ok(WaitStatus::Signaled(pid, Signal::SIGINT, false))); -+ assert_eq!(WaitStatus::from_raw(pid, 0x0200), Ok(WaitStatus::Exited(pid, 2))); -+ assert_eq!(WaitStatus::from_raw(pid, 0x7f7f), Err(Error::invalid_argument())); -+} -+ -+#[test] -+fn test_waitstatus_pid() { -+ let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ match fork().unwrap() { -+ Child => unsafe { _exit(0) }, -+ Parent { child } => { -+ let status = waitpid(child, None).unwrap(); -+ assert_eq!(status.pid(), Some(child)); -+ } -+ } -+} -+ -+#[cfg(any(target_os = "linux", target_os = "android"))] -+// FIXME: qemu-user doesn't implement ptrace on most arches -+#[cfg(any(target_arch = "x86", target_arch = "x86_64"))] -+mod ptrace { -+ use nix::sys::ptrace::{self, Options, Event}; -+ use nix::sys::signal::*; -+ use nix::sys::wait::*; -+ use nix::unistd::*; -+ use nix::unistd::ForkResult::*; -+ use libc::_exit; -+ -+ fn ptrace_child() -> ! { -+ ptrace::traceme().unwrap(); -+ // As recommended by ptrace(2), raise SIGTRAP to pause the child -+ // until the parent is ready to continue -+ raise(SIGTRAP).unwrap(); -+ unsafe { _exit(0) } -+ } -+ -+ fn ptrace_parent(child: Pid) { -+ // Wait for the raised SIGTRAP -+ assert_eq!(waitpid(child, None), Ok(WaitStatus::Stopped(child, SIGTRAP))); -+ // We want to test a syscall stop and a PTRACE_EVENT stop -+ assert!(ptrace::setoptions(child, Options::PTRACE_O_TRACESYSGOOD | Options::PTRACE_O_TRACEEXIT).is_ok()); -+ -+ // First, stop on the next system call, which will be exit() -+ assert!(ptrace::syscall(child).is_ok()); -+ assert_eq!(waitpid(child, None), Ok(WaitStatus::PtraceSyscall(child))); -+ // Then get the ptrace event for the process exiting -+ assert!(ptrace::cont(child, None).is_ok()); -+ assert_eq!(waitpid(child, None), Ok(WaitStatus::PtraceEvent(child, SIGTRAP, Event::PTRACE_EVENT_EXIT as i32))); -+ // Finally get the normal wait() result, now that the process has exited -+ assert!(ptrace::cont(child, None).is_ok()); -+ assert_eq!(waitpid(child, None), Ok(WaitStatus::Exited(child, 0))); -+ } -+ -+ #[test] -+ fn test_wait_ptrace() { -+ let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ match fork().expect("Error: Fork Failed") { -+ Child => ptrace_child(), -+ Parent { child } => ptrace_parent(child), -+ } -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/test/test.rs b/third_party/rust/nix-0.15.0/test/test.rs -new file mode 100644 -index 0000000000000..6a71d261b5712 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/test.rs -@@ -0,0 +1,149 @@ -+// XXX Allow deprecated items until release 0.16.0. See issue #1096. -+#![allow(deprecated)] -+extern crate bytes; -+#[cfg(any(target_os = "android", target_os = "linux"))] -+extern crate caps; -+#[macro_use] -+extern crate cfg_if; -+#[macro_use] -+extern crate nix; -+#[macro_use] -+extern crate lazy_static; -+extern crate libc; -+extern crate rand; -+#[cfg(target_os = "freebsd")] -+extern crate sysctl; -+extern crate tempfile; -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+macro_rules! require_capability { -+ ($capname:ident) => { -+ use ::caps::{Capability, CapSet, has_cap}; -+ use ::std::io::{self, Write}; -+ -+ if !has_cap(None, CapSet::Effective, Capability::$capname).unwrap() { -+ let stderr = io::stderr(); -+ let mut handle = stderr.lock(); -+ writeln!(handle, "Insufficient capabilities. Skipping test.") -+ .unwrap(); -+ return; -+ } -+ } -+} -+ -+#[cfg(target_os = "freebsd")] -+macro_rules! skip_if_jailed { -+ ($name:expr) => { -+ use ::sysctl::CtlValue; -+ -+ if let CtlValue::Int(1) = ::sysctl::value("security.jail.jailed") -+ .unwrap() -+ { -+ use ::std::io::Write; -+ let stderr = ::std::io::stderr(); -+ let mut handle = stderr.lock(); -+ writeln!(handle, "{} cannot run in a jail. Skipping test.", $name) -+ .unwrap(); -+ return; -+ } -+ } -+} -+ -+macro_rules! skip_if_not_root { -+ ($name:expr) => { -+ use nix::unistd::Uid; -+ -+ if !Uid::current().is_root() { -+ use ::std::io::Write; -+ let stderr = ::std::io::stderr(); -+ let mut handle = stderr.lock(); -+ writeln!(handle, "{} requires root privileges. Skipping test.", $name).unwrap(); -+ return; -+ } -+ }; -+} -+ -+mod sys; -+mod test_dir; -+mod test_fcntl; -+#[cfg(any(target_os = "android", -+ target_os = "linux"))] -+mod test_kmod; -+#[cfg(any(target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "fushsia", -+ target_os = "linux", -+ target_os = "netbsd"))] -+mod test_mq; -+mod test_net; -+mod test_nix_path; -+mod test_poll; -+mod test_pty; -+#[cfg(any(target_os = "android", -+ target_os = "freebsd", -+ target_os = "ios", -+ target_os = "linux", -+ target_os = "macos"))] -+mod test_sendfile; -+mod test_stat; -+mod test_unistd; -+ -+use std::os::unix::io::RawFd; -+use std::path::PathBuf; -+use std::sync::{Mutex, RwLock, RwLockWriteGuard}; -+use nix::unistd::{chdir, getcwd, read}; -+ -+/// Helper function analogous to `std::io::Read::read_exact`, but for `RawFD`s -+fn read_exact(f: RawFd, buf: &mut [u8]) { -+ let mut len = 0; -+ while len < buf.len() { -+ // get_mut would be better than split_at_mut, but it requires nightly -+ let (_, remaining) = buf.split_at_mut(len); -+ len += read(f, remaining).unwrap(); -+ } -+} -+ -+lazy_static! { -+ /// Any test that changes the process's current working directory must grab -+ /// the RwLock exclusively. Any process that cares about the current -+ /// working directory must grab it shared. -+ pub static ref CWD_LOCK: RwLock<()> = RwLock::new(()); -+ /// Any test that creates child processes must grab this mutex, regardless -+ /// of what it does with those children. -+ pub static ref FORK_MTX: Mutex<()> = Mutex::new(()); -+ /// Any test that changes the process's supplementary groups must grab this -+ /// mutex -+ pub static ref GROUPS_MTX: Mutex<()> = Mutex::new(()); -+ /// Any tests that loads or unloads kernel modules must grab this mutex -+ pub static ref KMOD_MTX: Mutex<()> = Mutex::new(()); -+ /// Any test that calls ptsname(3) must grab this mutex. -+ pub static ref PTSNAME_MTX: Mutex<()> = Mutex::new(()); -+ /// Any test that alters signal handling must grab this mutex. -+ pub static ref SIGNAL_MTX: Mutex<()> = Mutex::new(()); -+} -+ -+/// RAII object that restores a test's original directory on drop -+struct DirRestore<'a> { -+ d: PathBuf, -+ _g: RwLockWriteGuard<'a, ()> -+} -+ -+impl<'a> DirRestore<'a> { -+ fn new() -> Self { -+ let guard = ::CWD_LOCK.write() -+ .expect("Lock got poisoned by another test"); -+ DirRestore{ -+ _g: guard, -+ d: getcwd().unwrap(), -+ } -+ } -+} -+ -+impl<'a> Drop for DirRestore<'a> { -+ fn drop(&mut self) { -+ let r = chdir(&self.d); -+ if std::thread::panicking() { -+ r.unwrap(); -+ } -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/test/test_dir.rs b/third_party/rust/nix-0.15.0/test/test_dir.rs -new file mode 100644 -index 0000000000000..c42fbcd18a29d ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/test_dir.rs -@@ -0,0 +1,46 @@ -+extern crate nix; -+extern crate tempfile; -+ -+use nix::dir::{Dir, Type}; -+use nix::fcntl::OFlag; -+use nix::sys::stat::Mode; -+use std::fs::File; -+use self::tempfile::tempdir; -+ -+#[test] -+fn read() { -+ let tmp = tempdir().unwrap(); -+ File::create(&tmp.path().join("foo")).unwrap(); -+ ::std::os::unix::fs::symlink("foo", tmp.path().join("bar")).unwrap(); -+ let mut dir = Dir::open(tmp.path(), OFlag::O_DIRECTORY | OFlag::O_RDONLY | OFlag::O_CLOEXEC, -+ Mode::empty()).unwrap(); -+ let mut entries: Vec<_> = dir.iter().map(|e| e.unwrap()).collect(); -+ entries.sort_by(|a, b| a.file_name().cmp(b.file_name())); -+ let entry_names: Vec<_> = entries -+ .iter() -+ .map(|e| e.file_name().to_str().unwrap().to_owned()) -+ .collect(); -+ assert_eq!(&entry_names[..], &[".", "..", "bar", "foo"]); -+ -+ // Check file types. The system is allowed to return DT_UNKNOWN (aka None here) but if it does -+ // return a type, ensure it's correct. -+ assert!(&[Some(Type::Directory), None].contains(&entries[0].file_type())); // .: dir -+ assert!(&[Some(Type::Directory), None].contains(&entries[1].file_type())); // ..: dir -+ assert!(&[Some(Type::Symlink), None].contains(&entries[2].file_type())); // bar: symlink -+ assert!(&[Some(Type::File), None].contains(&entries[3].file_type())); // foo: regular file -+} -+ -+#[test] -+fn rewind() { -+ let tmp = tempdir().unwrap(); -+ let mut dir = Dir::open(tmp.path(), OFlag::O_DIRECTORY | OFlag::O_RDONLY | OFlag::O_CLOEXEC, -+ Mode::empty()).unwrap(); -+ let entries1: Vec<_> = dir.iter().map(|e| e.unwrap().file_name().to_owned()).collect(); -+ let entries2: Vec<_> = dir.iter().map(|e| e.unwrap().file_name().to_owned()).collect(); -+ assert_eq!(entries1, entries2); -+} -+ -+#[test] -+fn ebadf() { -+ assert_eq!(Dir::from_fd(-1).unwrap_err(), nix::Error::Sys(nix::errno::Errno::EBADF)); -+} -diff --git a/third_party/rust/nix-0.15.0/test/test_fcntl.rs b/third_party/rust/nix-0.15.0/test/test_fcntl.rs -new file mode 100644 -index 0000000000000..6b2bbd679fc31 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/test_fcntl.rs -@@ -0,0 +1,234 @@ -+use nix::Error; -+use nix::errno::*; -+use nix::fcntl::{openat, open, OFlag, readlink, readlinkat, renameat}; -+use nix::sys::stat::Mode; -+use nix::unistd::{close, read}; -+use tempfile::{self, NamedTempFile}; -+use std::fs::File; -+use std::io::prelude::*; -+use std::os::unix::fs; -+ -+#[test] -+fn test_openat() { -+ const CONTENTS: &[u8] = b"abcd"; -+ let mut tmp = NamedTempFile::new().unwrap(); -+ tmp.write_all(CONTENTS).unwrap(); -+ -+ let dirfd = open(tmp.path().parent().unwrap(), -+ OFlag::empty(), -+ Mode::empty()).unwrap(); -+ let fd = openat(dirfd, -+ tmp.path().file_name().unwrap(), -+ OFlag::O_RDONLY, -+ Mode::empty()).unwrap(); -+ -+ let mut buf = [0u8; 1024]; -+ assert_eq!(4, read(fd, &mut buf).unwrap()); -+ assert_eq!(CONTENTS, &buf[0..4]); -+ -+ close(fd).unwrap(); -+ close(dirfd).unwrap(); -+} -+ -+#[test] -+fn test_renameat() { -+ let old_dir = tempfile::tempdir().unwrap(); -+ let old_dirfd = open(old_dir.path(), OFlag::empty(), Mode::empty()).unwrap(); -+ let old_path = old_dir.path().join("old"); -+ File::create(&old_path).unwrap(); -+ let new_dir = tempfile::tempdir().unwrap(); -+ let new_dirfd = open(new_dir.path(), OFlag::empty(), Mode::empty()).unwrap(); -+ renameat(Some(old_dirfd), "old", Some(new_dirfd), "new").unwrap(); -+ assert_eq!(renameat(Some(old_dirfd), "old", Some(new_dirfd), "new").unwrap_err(), -+ Error::Sys(Errno::ENOENT)); -+ close(old_dirfd).unwrap(); -+ close(new_dirfd).unwrap(); -+ assert!(new_dir.path().join("new").exists()); -+} -+ -+#[test] -+fn test_readlink() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let src = tempdir.path().join("a"); -+ let dst = tempdir.path().join("b"); -+ println!("a: {:?}, b: {:?}", &src, &dst); -+ fs::symlink(&src.as_path(), &dst.as_path()).unwrap(); -+ let dirfd = open(tempdir.path(), -+ OFlag::empty(), -+ Mode::empty()).unwrap(); -+ -+ let mut buf = vec![0; src.to_str().unwrap().len() + 1]; -+ assert_eq!(readlink(&dst, &mut buf).unwrap().to_str().unwrap(), -+ src.to_str().unwrap()); -+ assert_eq!(readlinkat(dirfd, "b", &mut buf).unwrap().to_str().unwrap(), -+ src.to_str().unwrap()); -+} -+ -+#[cfg(any(target_os = "linux", target_os = "android"))] -+mod linux_android { -+ use std::io::prelude::*; -+ use std::io::SeekFrom; -+ use std::os::unix::prelude::*; -+ -+ use libc::loff_t; -+ -+ use nix::fcntl::*; -+ use nix::sys::uio::IoVec; -+ use nix::unistd::{close, pipe, read, write}; -+ -+ use tempfile::{tempfile, NamedTempFile}; -+ -+ /// This test creates a temporary file containing the contents -+ /// 'foobarbaz' and uses the `copy_file_range` call to transfer -+ /// 3 bytes at offset 3 (`bar`) to another empty file at offset 0. The -+ /// resulting file is read and should contain the contents `bar`. -+ /// The from_offset should be updated by the call to reflect -+ /// the 3 bytes read (6). -+ /// -+ /// FIXME: This test is disabled for linux based builds, because Travis -+ /// Linux version is too old for `copy_file_range`. -+ #[test] -+ #[ignore] -+ fn test_copy_file_range() { -+ const CONTENTS: &[u8] = b"foobarbaz"; -+ -+ let mut tmp1 = tempfile().unwrap(); -+ let mut tmp2 = tempfile().unwrap(); -+ -+ tmp1.write_all(CONTENTS).unwrap(); -+ tmp1.flush().unwrap(); -+ -+ let mut from_offset: i64 = 3; -+ copy_file_range( -+ tmp1.as_raw_fd(), -+ Some(&mut from_offset), -+ tmp2.as_raw_fd(), -+ None, -+ 3, -+ ) -+ .unwrap(); -+ -+ let mut res: String = String::new(); -+ tmp2.seek(SeekFrom::Start(0)).unwrap(); -+ tmp2.read_to_string(&mut res).unwrap(); -+ -+ assert_eq!(res, String::from("bar")); -+ assert_eq!(from_offset, 6); -+ } -+ -+ #[test] -+ fn test_splice() { -+ const CONTENTS: &[u8] = b"abcdef123456"; -+ let mut tmp = tempfile().unwrap(); -+ tmp.write_all(CONTENTS).unwrap(); -+ -+ let (rd, wr) = pipe().unwrap(); -+ let mut offset: loff_t = 5; -+ let res = splice(tmp.as_raw_fd(), Some(&mut offset), -+ wr, None, 2, SpliceFFlags::empty()).unwrap(); -+ -+ assert_eq!(2, res); -+ -+ let mut buf = [0u8; 1024]; -+ assert_eq!(2, read(rd, &mut buf).unwrap()); -+ assert_eq!(b"f1", &buf[0..2]); -+ assert_eq!(7, offset); -+ -+ close(rd).unwrap(); -+ close(wr).unwrap(); -+ } -+ -+ #[test] -+ fn test_tee() { -+ let (rd1, wr1) = pipe().unwrap(); -+ let (rd2, wr2) = pipe().unwrap(); -+ -+ write(wr1, b"abc").unwrap(); -+ let res = tee(rd1, wr2, 2, SpliceFFlags::empty()).unwrap(); -+ -+ assert_eq!(2, res); -+ -+ let mut buf = [0u8; 1024]; -+ -+ // Check the tee'd bytes are at rd2. -+ assert_eq!(2, read(rd2, &mut buf).unwrap()); -+ assert_eq!(b"ab", &buf[0..2]); -+ -+ // Check all the bytes are still at rd1. -+ assert_eq!(3, read(rd1, &mut buf).unwrap()); -+ assert_eq!(b"abc", &buf[0..3]); -+ -+ close(rd1).unwrap(); -+ close(wr1).unwrap(); -+ close(rd2).unwrap(); -+ close(wr2).unwrap(); -+ } -+ -+ #[test] -+ fn test_vmsplice() { -+ let (rd, wr) = pipe().unwrap(); -+ -+ let buf1 = b"abcdef"; -+ let buf2 = b"defghi"; -+ let mut iovecs = Vec::with_capacity(2); -+ iovecs.push(IoVec::from_slice(&buf1[0..3])); -+ iovecs.push(IoVec::from_slice(&buf2[0..3])); -+ -+ let res = vmsplice(wr, &iovecs[..], SpliceFFlags::empty()).unwrap(); -+ -+ assert_eq!(6, res); -+ -+ // Check the bytes can be read at rd. -+ let mut buf = [0u8; 32]; -+ assert_eq!(6, read(rd, &mut buf).unwrap()); -+ assert_eq!(b"abcdef", &buf[0..6]); -+ -+ close(rd).unwrap(); -+ close(wr).unwrap(); -+ } -+ -+ #[test] -+ fn test_fallocate() { -+ let tmp = NamedTempFile::new().unwrap(); -+ -+ let fd = tmp.as_raw_fd(); -+ fallocate(fd, FallocateFlags::empty(), 0, 100).unwrap(); -+ -+ // Check if we read exactly 100 bytes -+ let mut buf = [0u8; 200]; -+ assert_eq!(100, read(fd, &mut buf).unwrap()); -+ } -+} -+ -+#[cfg(any(target_os = "linux", -+ target_os = "android", -+ target_os = "emscripten", -+ target_os = "fuchsia", -+ any(target_os = "wasi", target_env = "wasi"), -+ target_env = "uclibc", -+ target_env = "freebsd"))] -+mod test_posix_fadvise { -+ -+ use tempfile::NamedTempFile; -+ use std::os::unix::io::{RawFd, AsRawFd}; -+ use nix::errno::Errno; -+ use nix::fcntl::*; -+ use nix::unistd::pipe; -+ -+ #[test] -+ fn test_success() { -+ let tmp = NamedTempFile::new().unwrap(); -+ let fd = tmp.as_raw_fd(); -+ let res = posix_fadvise(fd, 0, 100, PosixFadviseAdvice::POSIX_FADV_WILLNEED).unwrap(); -+ -+ assert_eq!(res, 0); -+ } -+ -+ #[test] -+ fn test_errno() { -+ let (rd, _wr) = pipe().unwrap(); -+ let errno = posix_fadvise(rd as RawFd, 0, 100, PosixFadviseAdvice::POSIX_FADV_WILLNEED) -+ .unwrap(); -+ assert_eq!(errno, Errno::ESPIPE as i32); -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/test/test_kmod/hello_mod/Makefile b/third_party/rust/nix-0.15.0/test/test_kmod/hello_mod/Makefile -new file mode 100644 -index 0000000000000..74c99b77e96e1 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/test_kmod/hello_mod/Makefile -@@ -0,0 +1,7 @@ -+obj-m += hello.o -+ -+all: -+ make -C /lib/modules/$(shell uname -r)/build M=$(shell pwd) modules -+ -+clean: -+ make -C /lib/modules/$(shell uname -r)/build M=$(shell pwd) clean -diff --git a/third_party/rust/nix-0.15.0/test/test_kmod/hello_mod/hello.c b/third_party/rust/nix-0.15.0/test/test_kmod/hello_mod/hello.c -new file mode 100644 -index 0000000000000..1c34987d2ac39 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/test_kmod/hello_mod/hello.c -@@ -0,0 +1,26 @@ -+/* -+ * SPDX-License-Identifier: GPL-2.0+ or MIT -+ */ -+#include <linux/module.h> -+#include <linux/kernel.h> -+ -+static int number= 1; -+static char *who = "World"; -+ -+module_param(number, int, S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH); -+MODULE_PARM_DESC(myint, "Just some number"); -+module_param(who, charp, 0000); -+MODULE_PARM_DESC(who, "Whot to greet"); -+ -+int init_module(void) -+{ -+ printk(KERN_INFO "Hello %s (%d)!\n", who, number); -+ return 0; -+} -+ -+void cleanup_module(void) -+{ -+ printk(KERN_INFO "Goodbye %s (%d)!\n", who, number); -+} -+ -+MODULE_LICENSE("Dual MIT/GPL"); -diff --git a/third_party/rust/nix-0.15.0/test/test_kmod/mod.rs b/third_party/rust/nix-0.15.0/test/test_kmod/mod.rs -new file mode 100644 -index 0000000000000..ad406357b06d2 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/test_kmod/mod.rs -@@ -0,0 +1,166 @@ -+use std::fs::copy; -+use std::path::PathBuf; -+use std::process::Command; -+use tempfile::{tempdir, TempDir}; -+ -+fn compile_kernel_module() -> (PathBuf, String, TempDir) { -+ let _m = ::FORK_MTX -+ .lock() -+ .expect("Mutex got poisoned by another test"); -+ -+ let tmp_dir = tempdir().expect("unable to create temporary build directory"); -+ -+ copy( -+ "test/test_kmod/hello_mod/hello.c", -+ &tmp_dir.path().join("hello.c"), -+ ).expect("unable to copy hello.c to temporary build directory"); -+ copy( -+ "test/test_kmod/hello_mod/Makefile", -+ &tmp_dir.path().join("Makefile"), -+ ).expect("unable to copy Makefile to temporary build directory"); -+ -+ let status = Command::new("make") -+ .current_dir(tmp_dir.path()) -+ .status() -+ .expect("failed to run make"); -+ -+ assert!(status.success()); -+ -+ // Return the relative path of the build kernel module -+ (tmp_dir.path().join("hello.ko"), "hello".to_owned(), tmp_dir) -+} -+ -+use nix::errno::Errno; -+use nix::kmod::{delete_module, DeleteModuleFlags}; -+use nix::kmod::{finit_module, init_module, ModuleInitFlags}; -+use nix::Error; -+use std::ffi::CString; -+use std::fs::File; -+use std::io::Read; -+ -+#[test] -+fn test_finit_and_delete_module() { -+ require_capability!(CAP_SYS_MODULE); -+ let _m0 = ::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m1 = ::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ -+ let (kmod_path, kmod_name, _kmod_dir) = compile_kernel_module(); -+ -+ let f = File::open(kmod_path).expect("unable to open kernel module"); -+ finit_module(&f, &CString::new("").unwrap(), ModuleInitFlags::empty()) -+ .expect("unable to load kernel module"); -+ -+ delete_module( -+ &CString::new(kmod_name).unwrap(), -+ DeleteModuleFlags::empty(), -+ ).expect("unable to unload kernel module"); -+} -+ -+#[test] -+fn test_finit_and_delete_modul_with_params() { -+ require_capability!(CAP_SYS_MODULE); -+ let _m0 = ::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m1 = ::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ -+ let (kmod_path, kmod_name, _kmod_dir) = compile_kernel_module(); -+ -+ let f = File::open(kmod_path).expect("unable to open kernel module"); -+ finit_module( -+ &f, -+ &CString::new("who=Rust number=2018").unwrap(), -+ ModuleInitFlags::empty(), -+ ).expect("unable to load kernel module"); -+ -+ delete_module( -+ &CString::new(kmod_name).unwrap(), -+ DeleteModuleFlags::empty(), -+ ).expect("unable to unload kernel module"); -+} -+ -+#[test] -+fn test_init_and_delete_module() { -+ require_capability!(CAP_SYS_MODULE); -+ let _m0 = ::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m1 = ::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ -+ let (kmod_path, kmod_name, _kmod_dir) = compile_kernel_module(); -+ -+ let mut f = File::open(kmod_path).expect("unable to open kernel module"); -+ let mut contents: Vec<u8> = Vec::new(); -+ f.read_to_end(&mut contents) -+ .expect("unable to read kernel module content to buffer"); -+ init_module(&mut contents, &CString::new("").unwrap()).expect("unable to load kernel module"); -+ -+ delete_module( -+ &CString::new(kmod_name).unwrap(), -+ DeleteModuleFlags::empty(), -+ ).expect("unable to unload kernel module"); -+} -+ -+#[test] -+fn test_init_and_delete_module_with_params() { -+ require_capability!(CAP_SYS_MODULE); -+ let _m0 = ::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m1 = ::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ -+ let (kmod_path, kmod_name, _kmod_dir) = compile_kernel_module(); -+ -+ let mut f = File::open(kmod_path).expect("unable to open kernel module"); -+ let mut contents: Vec<u8> = Vec::new(); -+ f.read_to_end(&mut contents) -+ .expect("unable to read kernel module content to buffer"); -+ init_module(&mut contents, &CString::new("who=Nix number=2015").unwrap()) -+ .expect("unable to load kernel module"); -+ -+ delete_module( -+ &CString::new(kmod_name).unwrap(), -+ DeleteModuleFlags::empty(), -+ ).expect("unable to unload kernel module"); -+} -+ -+#[test] -+fn test_finit_module_invalid() { -+ require_capability!(CAP_SYS_MODULE); -+ let _m0 = ::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m1 = ::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ -+ let kmod_path = "/dev/zero"; -+ -+ let f = File::open(kmod_path).expect("unable to open kernel module"); -+ let result = finit_module(&f, &CString::new("").unwrap(), ModuleInitFlags::empty()); -+ -+ assert_eq!(result.unwrap_err(), Error::Sys(Errno::EINVAL)); -+} -+ -+#[test] -+fn test_finit_module_twice_and_delete_module() { -+ require_capability!(CAP_SYS_MODULE); -+ let _m0 = ::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m1 = ::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ -+ let (kmod_path, kmod_name, _kmod_dir) = compile_kernel_module(); -+ -+ let f = File::open(kmod_path).expect("unable to open kernel module"); -+ finit_module(&f, &CString::new("").unwrap(), ModuleInitFlags::empty()) -+ .expect("unable to load kernel module"); -+ -+ let result = finit_module(&f, &CString::new("").unwrap(), ModuleInitFlags::empty()); -+ -+ assert_eq!(result.unwrap_err(), Error::Sys(Errno::EEXIST)); -+ -+ delete_module( -+ &CString::new(kmod_name).unwrap(), -+ DeleteModuleFlags::empty(), -+ ).expect("unable to unload kernel module"); -+} -+ -+#[test] -+fn test_delete_module_not_loaded() { -+ require_capability!(CAP_SYS_MODULE); -+ let _m0 = ::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m1 = ::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ -+ let result = delete_module(&CString::new("hello").unwrap(), DeleteModuleFlags::empty()); -+ -+ assert_eq!(result.unwrap_err(), Error::Sys(Errno::ENOENT)); -+} -diff --git a/third_party/rust/nix-0.15.0/test/test_mount.rs b/third_party/rust/nix-0.15.0/test/test_mount.rs -new file mode 100644 -index 0000000000000..d2e08bc42855d ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/test_mount.rs -@@ -0,0 +1,238 @@ -+// Impelmentation note: to allow unprivileged users to run it, this test makes -+// use of user and mount namespaces. On systems that allow unprivileged user -+// namespaces (Linux >= 3.8 compiled with CONFIG_USER_NS), the test should run -+// without root. -+ -+extern crate libc; -+extern crate nix; -+extern crate tempfile; -+ -+#[cfg(target_os = "linux")] -+mod test_mount { -+ use std::fs::{self, File}; -+ use std::io::{self, Read, Write}; -+ use std::os::unix::fs::OpenOptionsExt; -+ use std::os::unix::fs::PermissionsExt; -+ use std::process::{self, Command}; -+ -+ use libc::{EACCES, EROFS}; -+ -+ use nix::errno::Errno; -+ use nix::mount::{mount, umount, MsFlags}; -+ use nix::sched::{unshare, CloneFlags}; -+ use nix::sys::stat::{self, Mode}; -+ use nix::unistd::getuid; -+ -+ use tempfile; -+ -+ static SCRIPT_CONTENTS: &'static [u8] = b"#!/bin/sh -+exit 23"; -+ -+ const EXPECTED_STATUS: i32 = 23; -+ -+ const NONE: Option<&'static [u8]> = None; -+ pub fn test_mount_tmpfs_without_flags_allows_rwx() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ -+ mount(NONE, -+ tempdir.path(), -+ Some(b"tmpfs".as_ref()), -+ MsFlags::empty(), -+ NONE) -+ .unwrap_or_else(|e| panic!("mount failed: {}", e)); -+ -+ let test_path = tempdir.path().join("test"); -+ -+ // Verify write. -+ fs::OpenOptions::new() -+ .create(true) -+ .write(true) -+ .mode((Mode::S_IRWXU | Mode::S_IRWXG | Mode::S_IRWXO).bits()) -+ .open(&test_path) -+ .or_else(|e| -+ if Errno::from_i32(e.raw_os_error().unwrap()) == Errno::EOVERFLOW { -+ // Skip tests on certain Linux kernels which have a bug -+ // regarding tmpfs in namespaces. -+ // Ubuntu 14.04 and 16.04 are known to be affected; 16.10 is -+ // not. There is no legitimate reason for open(2) to return -+ // EOVERFLOW here. -+ // https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1659087 -+ let stderr = io::stderr(); -+ let mut handle = stderr.lock(); -+ writeln!(handle, "Buggy Linux kernel detected. Skipping test.") -+ .unwrap(); -+ process::exit(0); -+ } else { -+ panic!("open failed: {}", e); -+ } -+ ) -+ .and_then(|mut f| f.write(SCRIPT_CONTENTS)) -+ .unwrap_or_else(|e| panic!("write failed: {}", e)); -+ -+ // Verify read. -+ let mut buf = Vec::new(); -+ File::open(&test_path) -+ .and_then(|mut f| f.read_to_end(&mut buf)) -+ .unwrap_or_else(|e| panic!("read failed: {}", e)); -+ assert_eq!(buf, SCRIPT_CONTENTS); -+ -+ // Verify execute. -+ assert_eq!(EXPECTED_STATUS, -+ Command::new(&test_path) -+ .status() -+ .unwrap_or_else(|e| panic!("exec failed: {}", e)) -+ .code() -+ .unwrap_or_else(|| panic!("child killed by signal"))); -+ -+ umount(tempdir.path()).unwrap_or_else(|e| panic!("umount failed: {}", e)); -+ } -+ -+ pub fn test_mount_rdonly_disallows_write() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ -+ mount(NONE, -+ tempdir.path(), -+ Some(b"tmpfs".as_ref()), -+ MsFlags::MS_RDONLY, -+ NONE) -+ .unwrap_or_else(|e| panic!("mount failed: {}", e)); -+ -+ // EROFS: Read-only file system -+ assert_eq!(EROFS as i32, -+ File::create(tempdir.path().join("test")).unwrap_err().raw_os_error().unwrap()); -+ -+ umount(tempdir.path()).unwrap_or_else(|e| panic!("umount failed: {}", e)); -+ } -+ -+ pub fn test_mount_noexec_disallows_exec() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ -+ mount(NONE, -+ tempdir.path(), -+ Some(b"tmpfs".as_ref()), -+ MsFlags::MS_NOEXEC, -+ NONE) -+ .unwrap_or_else(|e| panic!("mount failed: {}", e)); -+ -+ let test_path = tempdir.path().join("test"); -+ -+ fs::OpenOptions::new() -+ .create(true) -+ .write(true) -+ .mode((Mode::S_IRWXU | Mode::S_IRWXG | Mode::S_IRWXO).bits()) -+ .open(&test_path) -+ .and_then(|mut f| f.write(SCRIPT_CONTENTS)) -+ .unwrap_or_else(|e| panic!("write failed: {}", e)); -+ -+ // Verify that we cannot execute despite a+x permissions being set. -+ let mode = stat::Mode::from_bits_truncate(fs::metadata(&test_path) -+ .map(|md| md.permissions().mode()) -+ .unwrap_or_else(|e| { -+ panic!("metadata failed: {}", e) -+ })); -+ -+ assert!(mode.contains(Mode::S_IXUSR | Mode::S_IXGRP | Mode::S_IXOTH), -+ "{:?} did not have execute permissions", -+ &test_path); -+ -+ // EACCES: Permission denied -+ assert_eq!(EACCES as i32, -+ Command::new(&test_path).status().unwrap_err().raw_os_error().unwrap()); -+ -+ umount(tempdir.path()).unwrap_or_else(|e| panic!("umount failed: {}", e)); -+ } -+ -+ pub fn test_mount_bind() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let file_name = "test"; -+ -+ { -+ let mount_point = tempfile::tempdir().unwrap(); -+ -+ mount(Some(tempdir.path()), -+ mount_point.path(), -+ NONE, -+ MsFlags::MS_BIND, -+ NONE) -+ .unwrap_or_else(|e| panic!("mount failed: {}", e)); -+ -+ fs::OpenOptions::new() -+ .create(true) -+ .write(true) -+ .mode((Mode::S_IRWXU | Mode::S_IRWXG | Mode::S_IRWXO).bits()) -+ .open(mount_point.path().join(file_name)) -+ .and_then(|mut f| f.write(SCRIPT_CONTENTS)) -+ .unwrap_or_else(|e| panic!("write failed: {}", e)); -+ -+ umount(mount_point.path()).unwrap_or_else(|e| panic!("umount failed: {}", e)); -+ } -+ -+ // Verify the file written in the mount shows up in source directory, even -+ // after unmounting. -+ -+ let mut buf = Vec::new(); -+ File::open(tempdir.path().join(file_name)) -+ .and_then(|mut f| f.read_to_end(&mut buf)) -+ .unwrap_or_else(|e| panic!("read failed: {}", e)); -+ assert_eq!(buf, SCRIPT_CONTENTS); -+ } -+ -+ pub fn setup_namespaces() { -+ // Hold on to the uid in the parent namespace. -+ let uid = getuid(); -+ -+ unshare(CloneFlags::CLONE_NEWNS | CloneFlags::CLONE_NEWUSER).unwrap_or_else(|e| { -+ let stderr = io::stderr(); -+ let mut handle = stderr.lock(); -+ writeln!(handle, -+ "unshare failed: {}. Are unprivileged user namespaces available?", -+ e).unwrap(); -+ writeln!(handle, "mount is not being tested").unwrap(); -+ // Exit with success because not all systems support unprivileged user namespaces, and -+ // that's not what we're testing for. -+ process::exit(0); -+ }); -+ -+ // Map user as uid 1000. -+ fs::OpenOptions::new() -+ .write(true) -+ .open("/proc/self/uid_map") -+ .and_then(|mut f| f.write(format!("1000 {} 1\n", uid).as_bytes())) -+ .unwrap_or_else(|e| panic!("could not write uid map: {}", e)); -+ } -+} -+ -+ -+// Test runner -+ -+/// Mimic normal test output (hackishly). -+#[cfg(target_os = "linux")] -+macro_rules! run_tests { -+ ( $($test_fn:ident),* ) => {{ -+ println!(); -+ -+ $( -+ print!("test test_mount::{} ... ", stringify!($test_fn)); -+ $test_fn(); -+ println!("ok"); -+ )* -+ -+ println!(); -+ }} -+} -+ -+#[cfg(target_os = "linux")] -+fn main() { -+ use test_mount::{setup_namespaces, test_mount_tmpfs_without_flags_allows_rwx, -+ test_mount_rdonly_disallows_write, test_mount_noexec_disallows_exec, -+ test_mount_bind}; -+ setup_namespaces(); -+ -+ run_tests!(test_mount_tmpfs_without_flags_allows_rwx, -+ test_mount_rdonly_disallows_write, -+ test_mount_noexec_disallows_exec, -+ test_mount_bind); -+} -+ -+#[cfg(not(target_os = "linux"))] -+fn main() {} -diff --git a/third_party/rust/nix-0.15.0/test/test_mq.rs b/third_party/rust/nix-0.15.0/test/test_mq.rs -new file mode 100644 -index 0000000000000..caac4fc261cd6 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/test_mq.rs -@@ -0,0 +1,152 @@ -+use libc::c_long; -+ -+use std::ffi::CString; -+use std::str; -+ -+use nix::errno::Errno::*; -+use nix::Error::Sys; -+use nix::mqueue::{mq_open, mq_close, mq_send, mq_receive}; -+use nix::mqueue::{MqAttr, MQ_OFlag}; -+use nix::sys::stat::Mode; -+ -+#[test] -+fn test_mq_send_and_receive() { -+ const MSG_SIZE: c_long = 32; -+ let attr = MqAttr::new(0, 10, MSG_SIZE, 0); -+ let mq_name= &CString::new(b"/a_nix_test_queue".as_ref()).unwrap(); -+ -+ let oflag0 = MQ_OFlag::O_CREAT | MQ_OFlag::O_WRONLY; -+ let mode = Mode::S_IWUSR | Mode::S_IRUSR | Mode::S_IRGRP | Mode::S_IROTH; -+ let r0 = mq_open(mq_name, oflag0, mode, Some(&attr)); -+ if let Err(Sys(ENOSYS)) = r0 { -+ println!("message queues not supported or module not loaded?"); -+ return; -+ }; -+ let mqd0 = r0.unwrap(); -+ let msg_to_send = "msg_1"; -+ mq_send(mqd0, msg_to_send.as_bytes(), 1).unwrap(); -+ -+ let oflag1 = MQ_OFlag::O_CREAT | MQ_OFlag::O_RDONLY; -+ let mqd1 = mq_open(mq_name, oflag1, mode, Some(&attr)).unwrap(); -+ let mut buf = [0u8; 32]; -+ let mut prio = 0u32; -+ let len = mq_receive(mqd1, &mut buf, &mut prio).unwrap(); -+ assert!(prio == 1); -+ -+ mq_close(mqd1).unwrap(); -+ mq_close(mqd0).unwrap(); -+ assert_eq!(msg_to_send, str::from_utf8(&buf[0..len]).unwrap()); -+} -+ -+ -+#[test] -+#[cfg(not(any(target_os = "netbsd")))] -+fn test_mq_getattr() { -+ use nix::mqueue::mq_getattr; -+ const MSG_SIZE: c_long = 32; -+ let initial_attr = MqAttr::new(0, 10, MSG_SIZE, 0); -+ let mq_name = &CString::new(b"/attr_test_get_attr".as_ref()).unwrap(); -+ let oflag = MQ_OFlag::O_CREAT | MQ_OFlag::O_WRONLY; -+ let mode = Mode::S_IWUSR | Mode::S_IRUSR | Mode::S_IRGRP | Mode::S_IROTH; -+ let r = mq_open(mq_name, oflag, mode, Some(&initial_attr)); -+ if let Err(Sys(ENOSYS)) = r { -+ println!("message queues not supported or module not loaded?"); -+ return; -+ }; -+ let mqd = r.unwrap(); -+ -+ let read_attr = mq_getattr(mqd).unwrap(); -+ assert_eq!(read_attr, initial_attr); -+ mq_close(mqd).unwrap(); -+} -+ -+// FIXME: Fix failures for mips in QEMU -+#[test] -+#[cfg(not(any(target_os = "netbsd")))] -+#[cfg_attr(any(target_arch = "mips", target_arch = "mips64"), ignore)] -+fn test_mq_setattr() { -+ use nix::mqueue::{mq_getattr, mq_setattr}; -+ const MSG_SIZE: c_long = 32; -+ let initial_attr = MqAttr::new(0, 10, MSG_SIZE, 0); -+ let mq_name = &CString::new(b"/attr_test_get_attr".as_ref()).unwrap(); -+ let oflag = MQ_OFlag::O_CREAT | MQ_OFlag::O_WRONLY; -+ let mode = Mode::S_IWUSR | Mode::S_IRUSR | Mode::S_IRGRP | Mode::S_IROTH; -+ let r = mq_open(mq_name, oflag, mode, Some(&initial_attr)); -+ if let Err(Sys(ENOSYS)) = r { -+ println!("message queues not supported or module not loaded?"); -+ return; -+ }; -+ let mqd = r.unwrap(); -+ -+ let new_attr = MqAttr::new(0, 20, MSG_SIZE * 2, 100); -+ let old_attr = mq_setattr(mqd, &new_attr).unwrap(); -+ assert_eq!(old_attr, initial_attr); -+ -+ let new_attr_get = mq_getattr(mqd).unwrap(); -+ // The following tests make sense. No changes here because according to the Linux man page only -+ // O_NONBLOCK can be set (see tests below) -+ assert_ne!(new_attr_get, new_attr); -+ -+ let new_attr_non_blocking = MqAttr::new(MQ_OFlag::O_NONBLOCK.bits() as c_long, 10, MSG_SIZE, 0); -+ mq_setattr(mqd, &new_attr_non_blocking).unwrap(); -+ let new_attr_get = mq_getattr(mqd).unwrap(); -+ -+ // now the O_NONBLOCK flag has been set -+ assert_ne!(new_attr_get, initial_attr); -+ assert_eq!(new_attr_get, new_attr_non_blocking); -+ mq_close(mqd).unwrap(); -+} -+ -+// FIXME: Fix failures for mips in QEMU -+#[test] -+#[cfg(not(any(target_os = "netbsd")))] -+#[cfg_attr(any(target_arch = "mips", target_arch = "mips64"), ignore)] -+fn test_mq_set_nonblocking() { -+ use nix::mqueue::{mq_getattr, mq_set_nonblock, mq_remove_nonblock}; -+ const MSG_SIZE: c_long = 32; -+ let initial_attr = MqAttr::new(0, 10, MSG_SIZE, 0); -+ let mq_name = &CString::new(b"/attr_test_get_attr".as_ref()).unwrap(); -+ let oflag = MQ_OFlag::O_CREAT | MQ_OFlag::O_WRONLY; -+ let mode = Mode::S_IWUSR | Mode::S_IRUSR | Mode::S_IRGRP | Mode::S_IROTH; -+ let r = mq_open(mq_name, oflag, mode, Some(&initial_attr)); -+ if let Err(Sys(ENOSYS)) = r { -+ println!("message queues not supported or module not loaded?"); -+ return; -+ }; -+ let mqd = r.unwrap(); -+ mq_set_nonblock(mqd).unwrap(); -+ let new_attr = mq_getattr(mqd); -+ assert!(new_attr.unwrap().flags() == MQ_OFlag::O_NONBLOCK.bits() as c_long); -+ mq_remove_nonblock(mqd).unwrap(); -+ let new_attr = mq_getattr(mqd); -+ assert!(new_attr.unwrap().flags() == 0); -+ mq_close(mqd).unwrap(); -+} -+ -+#[test] -+#[cfg(not(any(target_os = "netbsd")))] -+fn test_mq_unlink() { -+ use nix::mqueue::mq_unlink; -+ const MSG_SIZE: c_long = 32; -+ let initial_attr = MqAttr::new(0, 10, MSG_SIZE, 0); -+ let mq_name_opened = &CString::new(b"/mq_unlink_test".as_ref()).unwrap(); -+ let mq_name_not_opened = &CString::new(b"/mq_unlink_test".as_ref()).unwrap(); -+ let oflag = MQ_OFlag::O_CREAT | MQ_OFlag::O_WRONLY; -+ let mode = Mode::S_IWUSR | Mode::S_IRUSR | Mode::S_IRGRP | Mode::S_IROTH; -+ let r = mq_open(mq_name_opened, oflag, mode, Some(&initial_attr)); -+ if let Err(Sys(ENOSYS)) = r { -+ println!("message queues not supported or module not loaded?"); -+ return; -+ }; -+ let mqd = r.unwrap(); -+ -+ let res_unlink = mq_unlink(mq_name_opened); -+ assert!(res_unlink == Ok(()) ); -+ -+ let res_unlink_not_opened = mq_unlink(mq_name_not_opened); -+ assert!(res_unlink_not_opened == Err(Sys(ENOENT)) ); -+ -+ mq_close(mqd).unwrap(); -+ let res_unlink_after_close = mq_unlink(mq_name_opened); -+ assert!(res_unlink_after_close == Err(Sys(ENOENT)) ); -+} -diff --git a/third_party/rust/nix-0.15.0/test/test_net.rs b/third_party/rust/nix-0.15.0/test/test_net.rs -new file mode 100644 -index 0000000000000..b8940e718bdf3 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/test_net.rs -@@ -0,0 +1,12 @@ -+use nix::net::if_::*; -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+const LOOPBACK: &[u8] = b"lo"; -+ -+#[cfg(not(any(target_os = "android", target_os = "linux")))] -+const LOOPBACK: &[u8] = b"lo0"; -+ -+#[test] -+fn test_if_nametoindex() { -+ assert!(if_nametoindex(&LOOPBACK[..]).is_ok()); -+} -diff --git a/third_party/rust/nix-0.15.0/test/test_nix_path.rs b/third_party/rust/nix-0.15.0/test/test_nix_path.rs -new file mode 100644 -index 0000000000000..e69de29bb2d1d -diff --git a/third_party/rust/nix-0.15.0/test/test_poll.rs b/third_party/rust/nix-0.15.0/test/test_poll.rs -new file mode 100644 -index 0000000000000..aef40e4792b5a ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/test_poll.rs -@@ -0,0 +1,50 @@ -+use nix::poll::{PollFlags, poll, PollFd}; -+use nix::unistd::{write, pipe}; -+ -+#[test] -+fn test_poll() { -+ let (r, w) = pipe().unwrap(); -+ let mut fds = [PollFd::new(r, PollFlags::POLLIN)]; -+ -+ // Poll an idle pipe. Should timeout -+ let nfds = poll(&mut fds, 100).unwrap(); -+ assert_eq!(nfds, 0); -+ assert!(!fds[0].revents().unwrap().contains(PollFlags::POLLIN)); -+ -+ write(w, b".").unwrap(); -+ -+ // Poll a readable pipe. Should return an event. -+ let nfds = poll(&mut fds, 100).unwrap(); -+ assert_eq!(nfds, 1); -+ assert!(fds[0].revents().unwrap().contains(PollFlags::POLLIN)); -+} -+ -+// ppoll(2) is the same as poll except for how it handles timeouts and signals. -+// Repeating the test for poll(2) should be sufficient to check that our -+// bindings are correct. -+#[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "linux"))] -+#[test] -+fn test_ppoll() { -+ use nix::poll::ppoll; -+ use nix::sys::signal::SigSet; -+ use nix::sys::time::{TimeSpec, TimeValLike}; -+ -+ let timeout = TimeSpec::milliseconds(1); -+ let (r, w) = pipe().unwrap(); -+ let mut fds = [PollFd::new(r, PollFlags::POLLIN)]; -+ -+ // Poll an idle pipe. Should timeout -+ let nfds = ppoll(&mut fds, timeout, SigSet::empty()).unwrap(); -+ assert_eq!(nfds, 0); -+ assert!(!fds[0].revents().unwrap().contains(PollFlags::POLLIN)); -+ -+ write(w, b".").unwrap(); -+ -+ // Poll a readable pipe. Should return an event. -+ let nfds = ppoll(&mut fds, timeout, SigSet::empty()).unwrap(); -+ assert_eq!(nfds, 1); -+ assert!(fds[0].revents().unwrap().contains(PollFlags::POLLIN)); -+} -diff --git a/third_party/rust/nix-0.15.0/test/test_pty.rs b/third_party/rust/nix-0.15.0/test/test_pty.rs -new file mode 100644 -index 0000000000000..476b15c10128c ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/test_pty.rs -@@ -0,0 +1,235 @@ -+use std::io::Write; -+use std::path::Path; -+use std::os::unix::prelude::*; -+use tempfile::tempfile; -+ -+use libc::{_exit, STDOUT_FILENO}; -+use nix::fcntl::{OFlag, open}; -+use nix::pty::*; -+use nix::sys::stat; -+use nix::sys::termios::*; -+use nix::unistd::{write, close, pause}; -+ -+/// Regression test for Issue #659 -+/// This is the correct way to explicitly close a `PtyMaster` -+#[test] -+fn test_explicit_close() { -+ let mut f = { -+ let m = posix_openpt(OFlag::O_RDWR).unwrap(); -+ close(m.into_raw_fd()).unwrap(); -+ tempfile().unwrap() -+ }; -+ // This should work. But if there's been a double close, then it will -+ // return EBADF -+ f.write_all(b"whatever").unwrap(); -+} -+ -+/// Test equivalence of `ptsname` and `ptsname_r` -+#[test] -+#[cfg(any(target_os = "android", target_os = "linux"))] -+fn test_ptsname_equivalence() { -+ let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // Open a new PTTY master -+ let master_fd = posix_openpt(OFlag::O_RDWR).unwrap(); -+ assert!(master_fd.as_raw_fd() > 0); -+ -+ // Get the name of the slave -+ let slave_name = unsafe { ptsname(&master_fd) }.unwrap() ; -+ let slave_name_r = ptsname_r(&master_fd).unwrap(); -+ assert_eq!(slave_name, slave_name_r); -+} -+ -+/// Test data copying of `ptsname` -+// TODO need to run in a subprocess, since ptsname is non-reentrant -+#[test] -+#[cfg(any(target_os = "android", target_os = "linux"))] -+fn test_ptsname_copy() { -+ let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // Open a new PTTY master -+ let master_fd = posix_openpt(OFlag::O_RDWR).unwrap(); -+ assert!(master_fd.as_raw_fd() > 0); -+ -+ // Get the name of the slave -+ let slave_name1 = unsafe { ptsname(&master_fd) }.unwrap(); -+ let slave_name2 = unsafe { ptsname(&master_fd) }.unwrap(); -+ assert!(slave_name1 == slave_name2); -+ // Also make sure that the string was actually copied and they point to different parts of -+ // memory. -+ assert!(slave_name1.as_ptr() != slave_name2.as_ptr()); -+} -+ -+/// Test data copying of `ptsname_r` -+#[test] -+#[cfg(any(target_os = "android", target_os = "linux"))] -+fn test_ptsname_r_copy() { -+ // Open a new PTTY master -+ let master_fd = posix_openpt(OFlag::O_RDWR).unwrap(); -+ assert!(master_fd.as_raw_fd() > 0); -+ -+ // Get the name of the slave -+ let slave_name1 = ptsname_r(&master_fd).unwrap(); -+ let slave_name2 = ptsname_r(&master_fd).unwrap(); -+ assert!(slave_name1 == slave_name2); -+ assert!(slave_name1.as_ptr() != slave_name2.as_ptr()); -+} -+ -+/// Test that `ptsname` returns different names for different devices -+#[test] -+#[cfg(any(target_os = "android", target_os = "linux"))] -+fn test_ptsname_unique() { -+ let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // Open a new PTTY master -+ let master1_fd = posix_openpt(OFlag::O_RDWR).unwrap(); -+ assert!(master1_fd.as_raw_fd() > 0); -+ -+ // Open a second PTTY master -+ let master2_fd = posix_openpt(OFlag::O_RDWR).unwrap(); -+ assert!(master2_fd.as_raw_fd() > 0); -+ -+ // Get the name of the slave -+ let slave_name1 = unsafe { ptsname(&master1_fd) }.unwrap(); -+ let slave_name2 = unsafe { ptsname(&master2_fd) }.unwrap(); -+ assert!(slave_name1 != slave_name2); -+} -+ -+/// Test opening a master/slave PTTY pair -+/// -+/// This is a single larger test because much of these functions aren't useful by themselves. So for -+/// this test we perform the basic act of getting a file handle for a connect master/slave PTTY -+/// pair. -+#[test] -+fn test_open_ptty_pair() { -+ let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // Open a new PTTY master -+ let master_fd = posix_openpt(OFlag::O_RDWR).expect("posix_openpt failed"); -+ assert!(master_fd.as_raw_fd() > 0); -+ -+ // Allow a slave to be generated for it -+ grantpt(&master_fd).expect("grantpt failed"); -+ unlockpt(&master_fd).expect("unlockpt failed"); -+ -+ // Get the name of the slave -+ let slave_name = unsafe { ptsname(&master_fd) }.expect("ptsname failed"); -+ -+ // Open the slave device -+ let slave_fd = open(Path::new(&slave_name), OFlag::O_RDWR, stat::Mode::empty()).unwrap(); -+ assert!(slave_fd > 0); -+} -+ -+#[test] -+fn test_openpty() { -+ // openpty uses ptname(3) internally -+ let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ let pty = openpty(None, None).unwrap(); -+ assert!(pty.master > 0); -+ assert!(pty.slave > 0); -+ -+ // Writing to one should be readable on the other one -+ let string = "foofoofoo\n"; -+ let mut buf = [0u8; 10]; -+ write(pty.master, string.as_bytes()).unwrap(); -+ ::read_exact(pty.slave, &mut buf); -+ -+ assert_eq!(&buf, string.as_bytes()); -+ -+ // Read the echo as well -+ let echoed_string = "foofoofoo\r\n"; -+ let mut buf = [0u8; 11]; -+ ::read_exact(pty.master, &mut buf); -+ assert_eq!(&buf, echoed_string.as_bytes()); -+ -+ let string2 = "barbarbarbar\n"; -+ let echoed_string2 = "barbarbarbar\r\n"; -+ let mut buf = [0u8; 14]; -+ write(pty.slave, string2.as_bytes()).unwrap(); -+ ::read_exact(pty.master, &mut buf); -+ -+ assert_eq!(&buf, echoed_string2.as_bytes()); -+ -+ close(pty.master).unwrap(); -+ close(pty.slave).unwrap(); -+} -+ -+#[test] -+fn test_openpty_with_termios() { -+ // openpty uses ptname(3) internally -+ let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // Open one pty to get attributes for the second one -+ let mut termios = { -+ let pty = openpty(None, None).unwrap(); -+ assert!(pty.master > 0); -+ assert!(pty.slave > 0); -+ let termios = tcgetattr(pty.master).unwrap(); -+ close(pty.master).unwrap(); -+ close(pty.slave).unwrap(); -+ termios -+ }; -+ // Make sure newlines are not transformed so the data is preserved when sent. -+ termios.output_flags.remove(OutputFlags::ONLCR); -+ -+ let pty = openpty(None, &termios).unwrap(); -+ // Must be valid file descriptors -+ assert!(pty.master > 0); -+ assert!(pty.slave > 0); -+ -+ // Writing to one should be readable on the other one -+ let string = "foofoofoo\n"; -+ let mut buf = [0u8; 10]; -+ write(pty.master, string.as_bytes()).unwrap(); -+ ::read_exact(pty.slave, &mut buf); -+ -+ assert_eq!(&buf, string.as_bytes()); -+ -+ // read the echo as well -+ let echoed_string = "foofoofoo\n"; -+ ::read_exact(pty.master, &mut buf); -+ assert_eq!(&buf, echoed_string.as_bytes()); -+ -+ let string2 = "barbarbarbar\n"; -+ let echoed_string2 = "barbarbarbar\n"; -+ let mut buf = [0u8; 13]; -+ write(pty.slave, string2.as_bytes()).unwrap(); -+ ::read_exact(pty.master, &mut buf); -+ -+ assert_eq!(&buf, echoed_string2.as_bytes()); -+ -+ close(pty.master).unwrap(); -+ close(pty.slave).unwrap(); -+} -+ -+#[test] -+fn test_forkpty() { -+ use nix::unistd::ForkResult::*; -+ use nix::sys::signal::*; -+ use nix::sys::wait::wait; -+ // forkpty calls openpty which uses ptname(3) internally. -+ let _m0 = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ // forkpty spawns a child process -+ let _m1 = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ let string = "naninani\n"; -+ let echoed_string = "naninani\r\n"; -+ let pty = forkpty(None, None).unwrap(); -+ match pty.fork_result { -+ Child => { -+ write(STDOUT_FILENO, string.as_bytes()).unwrap(); -+ pause(); // we need the child to stay alive until the parent calls read -+ unsafe { _exit(0); } -+ }, -+ Parent { child } => { -+ let mut buf = [0u8; 10]; -+ assert!(child.as_raw() > 0); -+ ::read_exact(pty.master, &mut buf); -+ kill(child, SIGTERM).unwrap(); -+ wait().unwrap(); // keep other tests using generic wait from getting our child -+ assert_eq!(&buf, echoed_string.as_bytes()); -+ close(pty.master).unwrap(); -+ }, -+ } -+} -diff --git a/third_party/rust/nix-0.15.0/test/test_ptymaster_drop.rs b/third_party/rust/nix-0.15.0/test/test_ptymaster_drop.rs -new file mode 100644 -index 0000000000000..9b59d66435ed0 ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/test_ptymaster_drop.rs -@@ -0,0 +1,21 @@ -+extern crate nix; -+ -+use nix::fcntl::OFlag; -+use nix::pty::*; -+use nix::unistd::close; -+use std::os::unix::io::AsRawFd; -+ -+/// Regression test for Issue #659 -+/// `PtyMaster` should panic rather than double close the file descriptor -+/// This must run in its own test process because it deliberately creates a race -+/// condition. -+#[test] -+#[should_panic(expected = "Closing an invalid file descriptor!")] -+// In Travis on i686-unknown-linux-musl, this test gets SIGABRT. I don't know -+// why. It doesn't happen on any other target, and it doesn't happen on my PC. -+#[cfg_attr(all(target_env = "musl", target_arch = "x86"), ignore)] -+fn test_double_close() { -+ let m = posix_openpt(OFlag::O_RDWR).unwrap(); -+ close(m.as_raw_fd()).unwrap(); -+ drop(m); // should panic here -+} -diff --git a/third_party/rust/nix-0.15.0/test/test_sendfile.rs b/third_party/rust/nix-0.15.0/test/test_sendfile.rs -new file mode 100644 -index 0000000000000..3bc7932f4c84f ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/test_sendfile.rs -@@ -0,0 +1,129 @@ -+use std::io::prelude::*; -+use std::os::unix::prelude::*; -+ -+use libc::off_t; -+use nix::sys::sendfile::*; -+use tempfile::tempfile; -+ -+cfg_if! { -+ if #[cfg(any(target_os = "android", target_os = "linux"))] { -+ use nix::unistd::{close, pipe, read}; -+ } else if #[cfg(any(target_os = "freebsd", target_os = "ios", target_os = "macos"))] { -+ use std::net::Shutdown; -+ use std::os::unix::net::UnixStream; -+ } -+} -+ -+#[cfg(any(target_os = "android", target_os = "linux"))] -+#[test] -+fn test_sendfile_linux() { -+ const CONTENTS: &[u8] = b"abcdef123456"; -+ let mut tmp = tempfile().unwrap(); -+ tmp.write_all(CONTENTS).unwrap(); -+ -+ let (rd, wr) = pipe().unwrap(); -+ let mut offset: off_t = 5; -+ let res = sendfile(wr, tmp.as_raw_fd(), Some(&mut offset), 2).unwrap(); -+ -+ assert_eq!(2, res); -+ -+ let mut buf = [0u8; 1024]; -+ assert_eq!(2, read(rd, &mut buf).unwrap()); -+ assert_eq!(b"f1", &buf[0..2]); -+ assert_eq!(7, offset); -+ -+ close(rd).unwrap(); -+ close(wr).unwrap(); -+} -+ -+#[cfg(target_os = "freebsd")] -+#[test] -+fn test_sendfile_freebsd() { -+ // Declare the content -+ let header_strings = vec!["HTTP/1.1 200 OK\n", "Content-Type: text/plain\n", "\n"]; -+ let body = "Xabcdef123456"; -+ let body_offset = 1; -+ let trailer_strings = vec!["\n", "Served by Make Believe\n"]; -+ -+ // Write the body to a file -+ let mut tmp = tempfile().unwrap(); -+ tmp.write_all(body.as_bytes()).unwrap(); -+ -+ // Prepare headers and trailers for sendfile -+ let headers: Vec<&[u8]> = header_strings.iter().map(|s| s.as_bytes()).collect(); -+ let trailers: Vec<&[u8]> = trailer_strings.iter().map(|s| s.as_bytes()).collect(); -+ -+ // Prepare socket pair -+ let (mut rd, wr) = UnixStream::pair().unwrap(); -+ -+ // Call the test method -+ let (res, bytes_written) = sendfile( -+ tmp.as_raw_fd(), -+ wr.as_raw_fd(), -+ body_offset as off_t, -+ None, -+ Some(headers.as_slice()), -+ Some(trailers.as_slice()), -+ SfFlags::empty(), -+ 0, -+ ); -+ assert!(res.is_ok()); -+ wr.shutdown(Shutdown::Both).unwrap(); -+ -+ // Prepare the expected result -+ let expected_string = -+ header_strings.concat() + &body[body_offset..] + &trailer_strings.concat(); -+ -+ // Verify the message that was sent -+ assert_eq!(bytes_written as usize, expected_string.as_bytes().len()); -+ -+ let mut read_string = String::new(); -+ let bytes_read = rd.read_to_string(&mut read_string).unwrap(); -+ assert_eq!(bytes_written as usize, bytes_read); -+ assert_eq!(expected_string, read_string); -+} -+ -+#[cfg(any(target_os = "ios", target_os = "macos"))] -+#[test] -+fn test_sendfile_darwin() { -+ // Declare the content -+ let header_strings = vec!["HTTP/1.1 200 OK\n", "Content-Type: text/plain\n", "\n"]; -+ let body = "Xabcdef123456"; -+ let body_offset = 1; -+ let trailer_strings = vec!["\n", "Served by Make Believe\n"]; -+ -+ // Write the body to a file -+ let mut tmp = tempfile().unwrap(); -+ tmp.write_all(body.as_bytes()).unwrap(); -+ -+ // Prepare headers and trailers for sendfile -+ let headers: Vec<&[u8]> = header_strings.iter().map(|s| s.as_bytes()).collect(); -+ let trailers: Vec<&[u8]> = trailer_strings.iter().map(|s| s.as_bytes()).collect(); -+ -+ // Prepare socket pair -+ let (mut rd, wr) = UnixStream::pair().unwrap(); -+ -+ // Call the test method -+ let (res, bytes_written) = sendfile( -+ tmp.as_raw_fd(), -+ wr.as_raw_fd(), -+ body_offset as off_t, -+ None, -+ Some(headers.as_slice()), -+ Some(trailers.as_slice()), -+ ); -+ assert!(res.is_ok()); -+ wr.shutdown(Shutdown::Both).unwrap(); -+ -+ // Prepare the expected result -+ let expected_string = -+ header_strings.concat() + &body[body_offset..] + &trailer_strings.concat(); -+ -+ // Verify the message that was sent -+ assert_eq!(bytes_written as usize, expected_string.as_bytes().len()); -+ -+ let mut read_string = String::new(); -+ let bytes_read = rd.read_to_string(&mut read_string).unwrap(); -+ assert_eq!(bytes_written as usize, bytes_read); -+ assert_eq!(expected_string, read_string); -+} -diff --git a/third_party/rust/nix-0.15.0/test/test_stat.rs b/third_party/rust/nix-0.15.0/test/test_stat.rs -new file mode 100644 -index 0000000000000..1173455fae8db ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/test_stat.rs -@@ -0,0 +1,296 @@ -+use std::fs::{self, File}; -+use std::os::unix::fs::{symlink, PermissionsExt}; -+use std::os::unix::prelude::AsRawFd; -+use std::time::{Duration, UNIX_EPOCH}; -+use std::path::Path; -+ -+#[cfg(not(any(target_os = "netbsd")))] -+use libc::{S_IFMT, S_IFLNK, mode_t}; -+ -+use nix::{fcntl, Error}; -+use nix::errno::{Errno}; -+use nix::sys::stat::{self, fchmod, fchmodat, futimens, stat, utimes, utimensat, mkdirat}; -+#[cfg(any(target_os = "linux", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "freebsd", -+ target_os = "netbsd"))] -+use nix::sys::stat::lutimes; -+use nix::sys::stat::{Mode, FchmodatFlags, UtimensatFlags}; -+ -+#[cfg(not(any(target_os = "netbsd")))] -+use nix::sys::stat::FileStat; -+ -+use nix::sys::time::{TimeSpec, TimeVal, TimeValLike}; -+use nix::unistd::chdir; -+ -+#[cfg(not(any(target_os = "netbsd")))] -+use nix::Result; -+use tempfile; -+ -+#[allow(unused_comparisons)] -+// uid and gid are signed on Windows, but not on other platforms. This function -+// allows warning free compiles on all platforms, and can be removed when -+// expression-level #[allow] is available. -+#[cfg(not(any(target_os = "netbsd")))] -+fn valid_uid_gid(stat: FileStat) -> bool { -+ // uid could be 0 for the `root` user. This quite possible when -+ // the tests are being run on a rooted Android device. -+ stat.st_uid >= 0 && stat.st_gid >= 0 -+} -+ -+#[cfg(not(any(target_os = "netbsd")))] -+fn assert_stat_results(stat_result: Result<FileStat>) { -+ let stats = stat_result.expect("stat call failed"); -+ assert!(stats.st_dev > 0); // must be positive integer, exact number machine dependent -+ assert!(stats.st_ino > 0); // inode is positive integer, exact number machine dependent -+ assert!(stats.st_mode > 0); // must be positive integer -+ assert!(stats.st_nlink == 1); // there links created, must be 1 -+ assert!(valid_uid_gid(stats)); // must be positive integers -+ assert!(stats.st_size == 0); // size is 0 because we did not write anything to the file -+ assert!(stats.st_blksize > 0); // must be positive integer, exact number machine dependent -+ assert!(stats.st_blocks <= 16); // Up to 16 blocks can be allocated for a blank file -+} -+ -+#[cfg(not(any(target_os = "netbsd")))] -+fn assert_lstat_results(stat_result: Result<FileStat>) { -+ let stats = stat_result.expect("stat call failed"); -+ assert!(stats.st_dev > 0); // must be positive integer, exact number machine dependent -+ assert!(stats.st_ino > 0); // inode is positive integer, exact number machine dependent -+ assert!(stats.st_mode > 0); // must be positive integer -+ -+ // st_mode is c_uint (u32 on Android) while S_IFMT is mode_t -+ // (u16 on Android), and that will be a compile error. -+ // On other platforms they are the same (either both are u16 or u32). -+ assert!((stats.st_mode as usize) & (S_IFMT as usize) == S_IFLNK as usize); // should be a link -+ assert!(stats.st_nlink == 1); // there links created, must be 1 -+ assert!(valid_uid_gid(stats)); // must be positive integers -+ assert!(stats.st_size > 0); // size is > 0 because it points to another file -+ assert!(stats.st_blksize > 0); // must be positive integer, exact number machine dependent -+ -+ // st_blocks depends on whether the machine's file system uses fast -+ // or slow symlinks, so just make sure it's not negative -+ // (Android's st_blocks is ulonglong which is always non-negative.) -+ assert!(stats.st_blocks >= 0); -+} -+ -+#[test] -+#[cfg(not(any(target_os = "netbsd")))] -+fn test_stat_and_fstat() { -+ use nix::sys::stat::fstat; -+ -+ let tempdir = tempfile::tempdir().unwrap(); -+ let filename = tempdir.path().join("foo.txt"); -+ let file = File::create(&filename).unwrap(); -+ -+ let stat_result = stat(&filename); -+ assert_stat_results(stat_result); -+ -+ let fstat_result = fstat(file.as_raw_fd()); -+ assert_stat_results(fstat_result); -+} -+ -+#[test] -+#[cfg(not(any(target_os = "netbsd")))] -+fn test_fstatat() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let filename = tempdir.path().join("foo.txt"); -+ File::create(&filename).unwrap(); -+ let dirfd = fcntl::open(tempdir.path(), -+ fcntl::OFlag::empty(), -+ stat::Mode::empty()); -+ -+ let result = stat::fstatat(dirfd.unwrap(), -+ &filename, -+ fcntl::AtFlags::empty()); -+ assert_stat_results(result); -+} -+ -+#[test] -+#[cfg(not(any(target_os = "netbsd")))] -+fn test_stat_fstat_lstat() { -+ use nix::sys::stat::{fstat, lstat}; -+ -+ let tempdir = tempfile::tempdir().unwrap(); -+ let filename = tempdir.path().join("bar.txt"); -+ let linkname = tempdir.path().join("barlink"); -+ -+ File::create(&filename).unwrap(); -+ symlink("bar.txt", &linkname).unwrap(); -+ let link = File::open(&linkname).unwrap(); -+ -+ // should be the same result as calling stat, -+ // since it's a regular file -+ let stat_result = stat(&filename); -+ assert_stat_results(stat_result); -+ -+ let lstat_result = lstat(&linkname); -+ assert_lstat_results(lstat_result); -+ -+ let fstat_result = fstat(link.as_raw_fd()); -+ assert_stat_results(fstat_result); -+} -+ -+#[test] -+fn test_fchmod() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let filename = tempdir.path().join("foo.txt"); -+ let file = File::create(&filename).unwrap(); -+ -+ let mut mode1 = Mode::empty(); -+ mode1.insert(Mode::S_IRUSR); -+ mode1.insert(Mode::S_IWUSR); -+ fchmod(file.as_raw_fd(), mode1).unwrap(); -+ -+ let file_stat1 = stat(&filename).unwrap(); -+ assert_eq!(file_stat1.st_mode & 0o7777, mode1.bits()); -+ -+ let mut mode2 = Mode::empty(); -+ mode2.insert(Mode::S_IROTH); -+ fchmod(file.as_raw_fd(), mode2).unwrap(); -+ -+ let file_stat2 = stat(&filename).unwrap(); -+ assert_eq!(file_stat2.st_mode & 0o7777, mode2.bits()); -+} -+ -+#[test] -+fn test_fchmodat() { -+ let _dr = ::DirRestore::new(); -+ let tempdir = tempfile::tempdir().unwrap(); -+ let filename = "foo.txt"; -+ let fullpath = tempdir.path().join(filename); -+ File::create(&fullpath).unwrap(); -+ -+ let dirfd = fcntl::open(tempdir.path(), fcntl::OFlag::empty(), stat::Mode::empty()).unwrap(); -+ -+ let mut mode1 = Mode::empty(); -+ mode1.insert(Mode::S_IRUSR); -+ mode1.insert(Mode::S_IWUSR); -+ fchmodat(Some(dirfd), filename, mode1, FchmodatFlags::FollowSymlink).unwrap(); -+ -+ let file_stat1 = stat(&fullpath).unwrap(); -+ assert_eq!(file_stat1.st_mode & 0o7777, mode1.bits()); -+ -+ chdir(tempdir.path()).unwrap(); -+ -+ let mut mode2 = Mode::empty(); -+ mode2.insert(Mode::S_IROTH); -+ fchmodat(None, filename, mode2, FchmodatFlags::FollowSymlink).unwrap(); -+ -+ let file_stat2 = stat(&fullpath).unwrap(); -+ assert_eq!(file_stat2.st_mode & 0o7777, mode2.bits()); -+} -+ -+/// Asserts that the atime and mtime in a file's metadata match expected values. -+/// -+/// The atime and mtime are expressed with a resolution of seconds because some file systems -+/// (like macOS's HFS+) do not have higher granularity. -+fn assert_times_eq(exp_atime_sec: u64, exp_mtime_sec: u64, attr: &fs::Metadata) { -+ assert_eq!( -+ Duration::new(exp_atime_sec, 0), -+ attr.accessed().unwrap().duration_since(UNIX_EPOCH).unwrap()); -+ assert_eq!( -+ Duration::new(exp_mtime_sec, 0), -+ attr.modified().unwrap().duration_since(UNIX_EPOCH).unwrap()); -+} -+ -+#[test] -+fn test_utimes() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let fullpath = tempdir.path().join("file"); -+ drop(File::create(&fullpath).unwrap()); -+ -+ utimes(&fullpath, &TimeVal::seconds(9990), &TimeVal::seconds(5550)).unwrap(); -+ assert_times_eq(9990, 5550, &fs::metadata(&fullpath).unwrap()); -+} -+ -+#[test] -+#[cfg(any(target_os = "linux", -+ target_os = "haiku", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "freebsd", -+ target_os = "netbsd"))] -+fn test_lutimes() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let target = tempdir.path().join("target"); -+ let fullpath = tempdir.path().join("symlink"); -+ drop(File::create(&target).unwrap()); -+ symlink(&target, &fullpath).unwrap(); -+ -+ let exp_target_metadata = fs::symlink_metadata(&target).unwrap(); -+ lutimes(&fullpath, &TimeVal::seconds(4560), &TimeVal::seconds(1230)).unwrap(); -+ assert_times_eq(4560, 1230, &fs::symlink_metadata(&fullpath).unwrap()); -+ -+ let target_metadata = fs::symlink_metadata(&target).unwrap(); -+ assert_eq!(exp_target_metadata.accessed().unwrap(), target_metadata.accessed().unwrap(), -+ "atime of symlink target was unexpectedly modified"); -+ assert_eq!(exp_target_metadata.modified().unwrap(), target_metadata.modified().unwrap(), -+ "mtime of symlink target was unexpectedly modified"); -+} -+ -+#[test] -+fn test_futimens() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let fullpath = tempdir.path().join("file"); -+ drop(File::create(&fullpath).unwrap()); -+ -+ let fd = fcntl::open(&fullpath, fcntl::OFlag::empty(), stat::Mode::empty()).unwrap(); -+ -+ futimens(fd, &TimeSpec::seconds(10), &TimeSpec::seconds(20)).unwrap(); -+ assert_times_eq(10, 20, &fs::metadata(&fullpath).unwrap()); -+} -+ -+#[test] -+fn test_utimensat() { -+ let _dr = ::DirRestore::new(); -+ let tempdir = tempfile::tempdir().unwrap(); -+ let filename = "foo.txt"; -+ let fullpath = tempdir.path().join(filename); -+ drop(File::create(&fullpath).unwrap()); -+ -+ let dirfd = fcntl::open(tempdir.path(), fcntl::OFlag::empty(), stat::Mode::empty()).unwrap(); -+ -+ utimensat(Some(dirfd), filename, &TimeSpec::seconds(12345), &TimeSpec::seconds(678), -+ UtimensatFlags::FollowSymlink).unwrap(); -+ assert_times_eq(12345, 678, &fs::metadata(&fullpath).unwrap()); -+ -+ chdir(tempdir.path()).unwrap(); -+ -+ utimensat(None, filename, &TimeSpec::seconds(500), &TimeSpec::seconds(800), -+ UtimensatFlags::FollowSymlink).unwrap(); -+ assert_times_eq(500, 800, &fs::metadata(&fullpath).unwrap()); -+} -+ -+#[test] -+fn test_mkdirat_success_path() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let filename = "example_subdir"; -+ let dirfd = fcntl::open(tempdir.path(), fcntl::OFlag::empty(), stat::Mode::empty()).unwrap(); -+ assert!((mkdirat(dirfd, filename, Mode::S_IRWXU)).is_ok()); -+ assert!(Path::exists(&tempdir.path().join(filename))); -+} -+ -+#[test] -+fn test_mkdirat_success_mode() { -+ let expected_bits = stat::SFlag::S_IFDIR.bits() | stat::Mode::S_IRWXU.bits(); -+ let tempdir = tempfile::tempdir().unwrap(); -+ let filename = "example_subdir"; -+ let dirfd = fcntl::open(tempdir.path(), fcntl::OFlag::empty(), stat::Mode::empty()).unwrap(); -+ assert!((mkdirat(dirfd, filename, Mode::S_IRWXU)).is_ok()); -+ let permissions = fs::metadata(tempdir.path().join(filename)).unwrap().permissions(); -+ let mode = permissions.mode(); -+ assert_eq!(mode as mode_t, expected_bits) -+} -+ -+#[test] -+fn test_mkdirat_fail() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let not_dir_filename= "example_not_dir"; -+ let filename = "example_subdir_dir"; -+ let dirfd = fcntl::open(&tempdir.path().join(not_dir_filename), fcntl::OFlag::O_CREAT, -+ stat::Mode::empty()).unwrap(); -+ let result = mkdirat(dirfd, filename, Mode::S_IRWXU).unwrap_err(); -+ assert_eq!(result, Error::Sys(Errno::ENOTDIR)); -+} -diff --git a/third_party/rust/nix-0.15.0/test/test_unistd.rs b/third_party/rust/nix-0.15.0/test/test_unistd.rs -new file mode 100644 -index 0000000000000..46196dec7ccce ---- /dev/null -+++ b/third_party/rust/nix-0.15.0/test/test_unistd.rs -@@ -0,0 +1,669 @@ -+use nix::fcntl::{self, fcntl, FcntlArg, FdFlag, open, OFlag, readlink}; -+use nix::unistd::*; -+use nix::unistd::ForkResult::*; -+use nix::sys::signal::{SaFlags, SigAction, SigHandler, SigSet, Signal, sigaction}; -+use nix::sys::wait::*; -+use nix::sys::stat::{self, Mode, SFlag}; -+use nix::errno::Errno; -+use nix::Error; -+use std::{env, iter}; -+use std::ffi::CString; -+use std::fs::{self, DirBuilder, File}; -+use std::io::Write; -+use std::os::unix::prelude::*; -+use tempfile::{self, tempfile}; -+use libc::{self, _exit, off_t}; -+ -+#[test] -+#[cfg(not(any(target_os = "netbsd")))] -+fn test_fork_and_waitpid() { -+ let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // Safe: Child only calls `_exit`, which is signal-safe -+ match fork().expect("Error: Fork Failed") { -+ Child => unsafe { _exit(0) }, -+ Parent { child } => { -+ // assert that child was created and pid > 0 -+ let child_raw: ::libc::pid_t = child.into(); -+ assert!(child_raw > 0); -+ let wait_status = waitpid(child, None); -+ match wait_status { -+ // assert that waitpid returned correct status and the pid is the one of the child -+ Ok(WaitStatus::Exited(pid_t, _)) => assert!(pid_t == child), -+ -+ // panic, must never happen -+ s @ Ok(_) => panic!("Child exited {:?}, should never happen", s), -+ -+ // panic, waitpid should never fail -+ Err(s) => panic!("Error: waitpid returned Err({:?}", s) -+ } -+ -+ }, -+ } -+} -+ -+#[test] -+fn test_wait() { -+ // Grab FORK_MTX so wait doesn't reap a different test's child process -+ let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // Safe: Child only calls `_exit`, which is signal-safe -+ match fork().expect("Error: Fork Failed") { -+ Child => unsafe { _exit(0) }, -+ Parent { child } => { -+ let wait_status = wait(); -+ -+ // just assert that (any) one child returns with WaitStatus::Exited -+ assert_eq!(wait_status, Ok(WaitStatus::Exited(child, 0))); -+ }, -+ } -+} -+ -+#[test] -+fn test_mkstemp() { -+ let mut path = env::temp_dir(); -+ path.push("nix_tempfile.XXXXXX"); -+ -+ let result = mkstemp(&path); -+ match result { -+ Ok((fd, path)) => { -+ close(fd).unwrap(); -+ unlink(path.as_path()).unwrap(); -+ }, -+ Err(e) => panic!("mkstemp failed: {}", e) -+ } -+} -+ -+#[test] -+fn test_mkstemp_directory() { -+ // mkstemp should fail if a directory is given -+ assert!(mkstemp(&env::temp_dir()).is_err()); -+} -+ -+#[test] -+fn test_mkfifo() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let mkfifo_fifo = tempdir.path().join("mkfifo_fifo"); -+ -+ mkfifo(&mkfifo_fifo, Mode::S_IRUSR).unwrap(); -+ -+ let stats = stat::stat(&mkfifo_fifo).unwrap(); -+ let typ = stat::SFlag::from_bits_truncate(stats.st_mode); -+ assert!(typ == SFlag::S_IFIFO); -+} -+ -+#[test] -+fn test_mkfifo_directory() { -+ // mkfifo should fail if a directory is given -+ assert!(mkfifo(&env::temp_dir(), Mode::S_IRUSR).is_err()); -+} -+ -+#[test] -+fn test_getpid() { -+ let pid: ::libc::pid_t = getpid().into(); -+ let ppid: ::libc::pid_t = getppid().into(); -+ assert!(pid > 0); -+ assert!(ppid > 0); -+} -+ -+#[test] -+fn test_getsid() { -+ let none_sid: ::libc::pid_t = getsid(None).unwrap().into(); -+ let pid_sid: ::libc::pid_t = getsid(Some(getpid())).unwrap().into(); -+ assert!(none_sid > 0); -+ assert!(none_sid == pid_sid); -+} -+ -+#[cfg(any(target_os = "linux", target_os = "android"))] -+mod linux_android { -+ use nix::unistd::gettid; -+ -+ #[test] -+ fn test_gettid() { -+ let tid: ::libc::pid_t = gettid().into(); -+ assert!(tid > 0); -+ } -+} -+ -+#[test] -+// `getgroups()` and `setgroups()` do not behave as expected on Apple platforms -+#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+fn test_setgroups() { -+ // Skip this test when not run as root as `setgroups()` requires root. -+ skip_if_not_root!("test_setgroups"); -+ -+ let _m = ::GROUPS_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // Save the existing groups -+ let old_groups = getgroups().unwrap(); -+ -+ // Set some new made up groups -+ let groups = [Gid::from_raw(123), Gid::from_raw(456)]; -+ setgroups(&groups).unwrap(); -+ -+ let new_groups = getgroups().unwrap(); -+ assert_eq!(new_groups, groups); -+ -+ // Revert back to the old groups -+ setgroups(&old_groups).unwrap(); -+} -+ -+#[test] -+// `getgroups()` and `setgroups()` do not behave as expected on Apple platforms -+#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+fn test_initgroups() { -+ // Skip this test when not run as root as `initgroups()` and `setgroups()` -+ // require root. -+ skip_if_not_root!("test_initgroups"); -+ -+ let _m = ::GROUPS_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ // Save the existing groups -+ let old_groups = getgroups().unwrap(); -+ -+ // It doesn't matter if the root user is not called "root" or if a user -+ // called "root" doesn't exist. We are just checking that the extra, -+ // made-up group, `123`, is set. -+ // FIXME: Test the other half of initgroups' functionality: whether the -+ // groups that the user belongs to are also set. -+ let user = CString::new("root").unwrap(); -+ let group = Gid::from_raw(123); -+ let group_list = getgrouplist(&user, group).unwrap(); -+ assert!(group_list.contains(&group)); -+ -+ initgroups(&user, group).unwrap(); -+ -+ let new_groups = getgroups().unwrap(); -+ assert_eq!(new_groups, group_list); -+ -+ // Revert back to the old groups -+ setgroups(&old_groups).unwrap(); -+} -+ -+macro_rules! execve_test_factory( -+ ($test_name:ident, $syscall:ident, $exe: expr $(, $pathname:expr, $flags:expr)*) => ( -+ #[test] -+ fn $test_name() { -+ let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ // The `exec`d process will write to `writer`, and we'll read that -+ // data from `reader`. -+ let (reader, writer) = pipe().unwrap(); -+ -+ // Safe: Child calls `exit`, `dup`, `close` and the provided `exec*` family function. -+ // NOTE: Technically, this makes the macro unsafe to use because you could pass anything. -+ // The tests make sure not to do that, though. -+ match fork().unwrap() { -+ Child => { -+ // Close stdout. -+ close(1).unwrap(); -+ // Make `writer` be the stdout of the new process. -+ dup(writer).unwrap(); -+ // exec! -+ $syscall( -+ $exe, -+ $(&CString::new($pathname).unwrap(), )* -+ &[CString::new(b"".as_ref()).unwrap(), -+ CString::new(b"-c".as_ref()).unwrap(), -+ CString::new(b"echo nix!!! && echo foo=$foo && echo baz=$baz" -+ .as_ref()).unwrap()], -+ &[CString::new(b"foo=bar".as_ref()).unwrap(), -+ CString::new(b"baz=quux".as_ref()).unwrap()] -+ $(, $flags)*).unwrap(); -+ }, -+ Parent { child } => { -+ // Wait for the child to exit. -+ waitpid(child, None).unwrap(); -+ // Read 1024 bytes. -+ let mut buf = [0u8; 1024]; -+ read(reader, &mut buf).unwrap(); -+ // It should contain the things we printed using `/bin/sh`. -+ let string = String::from_utf8_lossy(&buf); -+ assert!(string.contains("nix!!!")); -+ assert!(string.contains("foo=bar")); -+ assert!(string.contains("baz=quux")); -+ } -+ } -+ } -+ ) -+); -+ -+cfg_if!{ -+ if #[cfg(target_os = "android")] { -+ execve_test_factory!(test_execve, execve, &CString::new("/system/bin/sh").unwrap()); -+ execve_test_factory!(test_fexecve, fexecve, File::open("/system/bin/sh").unwrap().into_raw_fd()); -+ } else if #[cfg(any(target_os = "freebsd", -+ target_os = "linux"))] { -+ execve_test_factory!(test_execve, execve, &CString::new("/bin/sh").unwrap()); -+ execve_test_factory!(test_fexecve, fexecve, File::open("/bin/sh").unwrap().into_raw_fd()); -+ } else if #[cfg(any(target_os = "dragonfly", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "openbsd"))] { -+ execve_test_factory!(test_execve, execve, &CString::new("/bin/sh").unwrap()); -+ // No fexecve() on DragonFly, ios, macos, NetBSD, OpenBSD. -+ // -+ // Note for NetBSD and OpenBSD: although rust-lang/libc includes it -+ // (under unix/bsd/netbsdlike/) fexecve is not currently implemented on -+ // NetBSD nor on OpenBSD. -+ } -+} -+ -+#[cfg(any(target_os = "haiku", target_os = "linux", target_os = "openbsd"))] -+execve_test_factory!(test_execvpe, execvpe, &CString::new("sh").unwrap()); -+ -+cfg_if!{ -+ if #[cfg(target_os = "android")] { -+ use nix::fcntl::AtFlags; -+ execve_test_factory!(test_execveat_empty, execveat, File::open("/system/bin/sh").unwrap().into_raw_fd(), -+ "", AtFlags::AT_EMPTY_PATH); -+ execve_test_factory!(test_execveat_relative, execveat, File::open("/system/bin/").unwrap().into_raw_fd(), -+ "./sh", AtFlags::empty()); -+ execve_test_factory!(test_execveat_absolute, execveat, File::open("/").unwrap().into_raw_fd(), -+ "/system/bin/sh", AtFlags::empty()); -+ } else if #[cfg(all(target_os = "linux"), any(target_arch ="x86_64", target_arch ="x86"))] { -+ use nix::fcntl::AtFlags; -+ execve_test_factory!(test_execveat_empty, execveat, File::open("/bin/sh").unwrap().into_raw_fd(), -+ "", AtFlags::AT_EMPTY_PATH); -+ execve_test_factory!(test_execveat_relative, execveat, File::open("/bin/").unwrap().into_raw_fd(), -+ "./sh", AtFlags::empty()); -+ execve_test_factory!(test_execveat_absolute, execveat, File::open("/").unwrap().into_raw_fd(), -+ "/bin/sh", AtFlags::empty()); -+ } -+} -+ -+#[test] -+fn test_fchdir() { -+ // fchdir changes the process's cwd -+ let _dr = ::DirRestore::new(); -+ -+ let tmpdir = tempfile::tempdir().unwrap(); -+ let tmpdir_path = tmpdir.path().canonicalize().unwrap(); -+ let tmpdir_fd = File::open(&tmpdir_path).unwrap().into_raw_fd(); -+ -+ assert!(fchdir(tmpdir_fd).is_ok()); -+ assert_eq!(getcwd().unwrap(), tmpdir_path); -+ -+ assert!(close(tmpdir_fd).is_ok()); -+} -+ -+#[test] -+fn test_getcwd() { -+ // chdir changes the process's cwd -+ let _dr = ::DirRestore::new(); -+ -+ let tmpdir = tempfile::tempdir().unwrap(); -+ let tmpdir_path = tmpdir.path().canonicalize().unwrap(); -+ assert!(chdir(&tmpdir_path).is_ok()); -+ assert_eq!(getcwd().unwrap(), tmpdir_path); -+ -+ // make path 500 chars longer so that buffer doubling in getcwd -+ // kicks in. Note: One path cannot be longer than 255 bytes -+ // (NAME_MAX) whole path cannot be longer than PATH_MAX (usually -+ // 4096 on linux, 1024 on macos) -+ let mut inner_tmp_dir = tmpdir_path.to_path_buf(); -+ for _ in 0..5 { -+ let newdir = iter::repeat("a").take(100).collect::<String>(); -+ inner_tmp_dir.push(newdir); -+ assert!(mkdir(inner_tmp_dir.as_path(), Mode::S_IRWXU).is_ok()); -+ } -+ assert!(chdir(inner_tmp_dir.as_path()).is_ok()); -+ assert_eq!(getcwd().unwrap(), inner_tmp_dir.as_path()); -+} -+ -+#[test] -+fn test_chown() { -+ // Testing for anything other than our own UID/GID is hard. -+ let uid = Some(getuid()); -+ let gid = Some(getgid()); -+ -+ let tempdir = tempfile::tempdir().unwrap(); -+ let path = tempdir.path().join("file"); -+ { -+ File::create(&path).unwrap(); -+ } -+ -+ chown(&path, uid, gid).unwrap(); -+ chown(&path, uid, None).unwrap(); -+ chown(&path, None, gid).unwrap(); -+ -+ fs::remove_file(&path).unwrap(); -+ chown(&path, uid, gid).unwrap_err(); -+} -+ -+#[test] -+fn test_fchownat() { -+ let _dr = ::DirRestore::new(); -+ // Testing for anything other than our own UID/GID is hard. -+ let uid = Some(getuid()); -+ let gid = Some(getgid()); -+ -+ let tempdir = tempfile::tempdir().unwrap(); -+ let path = tempdir.path().join("file"); -+ { -+ File::create(&path).unwrap(); -+ } -+ -+ let dirfd = open(tempdir.path(), OFlag::empty(), Mode::empty()).unwrap(); -+ -+ fchownat(Some(dirfd), "file", uid, gid, FchownatFlags::FollowSymlink).unwrap(); -+ -+ chdir(tempdir.path()).unwrap(); -+ fchownat(None, "file", uid, gid, FchownatFlags::FollowSymlink).unwrap(); -+ -+ fs::remove_file(&path).unwrap(); -+ fchownat(None, "file", uid, gid, FchownatFlags::FollowSymlink).unwrap_err(); -+} -+ -+#[test] -+fn test_lseek() { -+ const CONTENTS: &[u8] = b"abcdef123456"; -+ let mut tmp = tempfile().unwrap(); -+ tmp.write_all(CONTENTS).unwrap(); -+ let tmpfd = tmp.into_raw_fd(); -+ -+ let offset: off_t = 5; -+ lseek(tmpfd, offset, Whence::SeekSet).unwrap(); -+ -+ let mut buf = [0u8; 7]; -+ ::read_exact(tmpfd, &mut buf); -+ assert_eq!(b"f123456", &buf); -+ -+ close(tmpfd).unwrap(); -+} -+ -+#[cfg(any(target_os = "linux", target_os = "android"))] -+#[test] -+fn test_lseek64() { -+ const CONTENTS: &[u8] = b"abcdef123456"; -+ let mut tmp = tempfile().unwrap(); -+ tmp.write_all(CONTENTS).unwrap(); -+ let tmpfd = tmp.into_raw_fd(); -+ -+ lseek64(tmpfd, 5, Whence::SeekSet).unwrap(); -+ -+ let mut buf = [0u8; 7]; -+ ::read_exact(tmpfd, &mut buf); -+ assert_eq!(b"f123456", &buf); -+ -+ close(tmpfd).unwrap(); -+} -+ -+cfg_if!{ -+ if #[cfg(any(target_os = "android", target_os = "linux"))] { -+ macro_rules! require_acct{ -+ () => { -+ require_capability!(CAP_SYS_PACCT); -+ } -+ } -+ } else if #[cfg(target_os = "freebsd")] { -+ macro_rules! require_acct{ -+ () => { -+ skip_if_not_root!("test_acct"); -+ skip_if_jailed!("test_acct"); -+ } -+ } -+ } else { -+ macro_rules! require_acct{ -+ () => { -+ skip_if_not_root!("test_acct"); -+ } -+ } -+ } -+} -+ -+#[test] -+fn test_acct() { -+ use tempfile::NamedTempFile; -+ use std::process::Command; -+ use std::{thread, time}; -+ -+ let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ require_acct!(); -+ -+ let file = NamedTempFile::new().unwrap(); -+ let path = file.path().to_str().unwrap(); -+ -+ acct::enable(path).unwrap(); -+ -+ loop { -+ Command::new("echo").arg("Hello world"); -+ let len = fs::metadata(path).unwrap().len(); -+ if len > 0 { break; } -+ thread::sleep(time::Duration::from_millis(10)); -+ } -+ acct::disable().unwrap(); -+} -+ -+#[test] -+fn test_fpathconf_limited() { -+ let f = tempfile().unwrap(); -+ // AFAIK, PATH_MAX is limited on all platforms, so it makes a good test -+ let path_max = fpathconf(f.as_raw_fd(), PathconfVar::PATH_MAX); -+ assert!(path_max.expect("fpathconf failed").expect("PATH_MAX is unlimited") > 0); -+} -+ -+#[test] -+fn test_pathconf_limited() { -+ // AFAIK, PATH_MAX is limited on all platforms, so it makes a good test -+ let path_max = pathconf("/", PathconfVar::PATH_MAX); -+ assert!(path_max.expect("pathconf failed").expect("PATH_MAX is unlimited") > 0); -+} -+ -+#[test] -+fn test_sysconf_limited() { -+ // AFAIK, OPEN_MAX is limited on all platforms, so it makes a good test -+ let open_max = sysconf(SysconfVar::OPEN_MAX); -+ assert!(open_max.expect("sysconf failed").expect("OPEN_MAX is unlimited") > 0); -+} -+ -+#[cfg(target_os = "freebsd")] -+#[test] -+fn test_sysconf_unsupported() { -+ // I know of no sysconf variables that are unsupported everywhere, but -+ // _XOPEN_CRYPT is unsupported on FreeBSD 11.0, which is one of the platforms -+ // we test. -+ let open_max = sysconf(SysconfVar::_XOPEN_CRYPT); -+ assert!(open_max.expect("sysconf failed").is_none()) -+} -+ -+// Test that we can create a pair of pipes. No need to verify that they pass -+// data; that's the domain of the OS, not nix. -+#[test] -+fn test_pipe() { -+ let (fd0, fd1) = pipe().unwrap(); -+ let m0 = stat::SFlag::from_bits_truncate(stat::fstat(fd0).unwrap().st_mode); -+ // S_IFIFO means it's a pipe -+ assert_eq!(m0, SFlag::S_IFIFO); -+ let m1 = stat::SFlag::from_bits_truncate(stat::fstat(fd1).unwrap().st_mode); -+ assert_eq!(m1, SFlag::S_IFIFO); -+} -+ -+// pipe2(2) is the same as pipe(2), except it allows setting some flags. Check -+// that we can set a flag. -+#[test] -+fn test_pipe2() { -+ let (fd0, fd1) = pipe2(OFlag::O_CLOEXEC).unwrap(); -+ let f0 = FdFlag::from_bits_truncate(fcntl(fd0, FcntlArg::F_GETFD).unwrap()); -+ assert!(f0.contains(FdFlag::FD_CLOEXEC)); -+ let f1 = FdFlag::from_bits_truncate(fcntl(fd1, FcntlArg::F_GETFD).unwrap()); -+ assert!(f1.contains(FdFlag::FD_CLOEXEC)); -+} -+ -+#[test] -+fn test_truncate() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let path = tempdir.path().join("file"); -+ -+ { -+ let mut tmp = File::create(&path).unwrap(); -+ const CONTENTS: &[u8] = b"12345678"; -+ tmp.write_all(CONTENTS).unwrap(); -+ } -+ -+ truncate(&path, 4).unwrap(); -+ -+ let metadata = fs::metadata(&path).unwrap(); -+ assert_eq!(4, metadata.len()); -+} -+ -+#[test] -+fn test_ftruncate() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let path = tempdir.path().join("file"); -+ -+ let tmpfd = { -+ let mut tmp = File::create(&path).unwrap(); -+ const CONTENTS: &[u8] = b"12345678"; -+ tmp.write_all(CONTENTS).unwrap(); -+ tmp.into_raw_fd() -+ }; -+ -+ ftruncate(tmpfd, 2).unwrap(); -+ close(tmpfd).unwrap(); -+ -+ let metadata = fs::metadata(&path).unwrap(); -+ assert_eq!(2, metadata.len()); -+} -+ -+// Used in `test_alarm`. -+static mut ALARM_CALLED: bool = false; -+ -+// Used in `test_alarm`. -+pub extern fn alarm_signal_handler(raw_signal: libc::c_int) { -+ assert_eq!(raw_signal, libc::SIGALRM, "unexpected signal: {}", raw_signal); -+ unsafe { ALARM_CALLED = true }; -+} -+ -+#[test] -+fn test_alarm() { -+ let _m = ::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ let handler = SigHandler::Handler(alarm_signal_handler); -+ let signal_action = SigAction::new(handler, SaFlags::SA_RESTART, SigSet::empty()); -+ let old_handler = unsafe { -+ sigaction(Signal::SIGALRM, &signal_action) -+ .expect("unable to set signal handler for alarm") -+ }; -+ -+ // Set an alarm. -+ assert_eq!(alarm::set(60), None); -+ -+ // Overwriting an alarm should return the old alarm. -+ assert_eq!(alarm::set(1), Some(60)); -+ -+ // We should be woken up after 1 second by the alarm, so we'll sleep for 2 -+ // seconds to be sure. -+ sleep(2); -+ assert_eq!(unsafe { ALARM_CALLED }, true, "expected our alarm signal handler to be called"); -+ -+ // Reset the signal. -+ unsafe { -+ sigaction(Signal::SIGALRM, &old_handler) -+ .expect("unable to set signal handler for alarm"); -+ } -+} -+ -+#[test] -+fn test_canceling_alarm() { -+ let _m = ::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ assert_eq!(alarm::cancel(), None); -+ -+ assert_eq!(alarm::set(60), None); -+ assert_eq!(alarm::cancel(), Some(60)); -+} -+ -+#[test] -+fn test_symlinkat() { -+ let mut buf = [0; 1024]; -+ let tempdir = tempfile::tempdir().unwrap(); -+ -+ let target = tempdir.path().join("a"); -+ let linkpath = tempdir.path().join("b"); -+ symlinkat(&target, None, &linkpath).unwrap(); -+ assert_eq!( -+ readlink(&linkpath, &mut buf).unwrap().to_str().unwrap(), -+ target.to_str().unwrap() -+ ); -+ -+ let dirfd = open(tempdir.path(), OFlag::empty(), Mode::empty()).unwrap(); -+ let target = "c"; -+ let linkpath = "d"; -+ symlinkat(target, Some(dirfd), linkpath).unwrap(); -+ assert_eq!( -+ readlink(&tempdir.path().join(linkpath), &mut buf) -+ .unwrap() -+ .to_str() -+ .unwrap(), -+ target -+ ); -+} -+ -+ -+#[test] -+fn test_unlinkat_dir_noremovedir() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let dirname = "foo_dir"; -+ let dirpath = tempdir.path().join(dirname); -+ -+ // Create dir -+ DirBuilder::new().recursive(true).create(&dirpath).unwrap(); -+ -+ // Get file descriptor for base directory -+ let dirfd = fcntl::open(tempdir.path(), fcntl::OFlag::empty(), stat::Mode::empty()).unwrap(); -+ -+ // Attempt unlink dir at relative path without proper flag -+ let err_result = unlinkat(Some(dirfd), dirname, UnlinkatFlags::NoRemoveDir).unwrap_err(); -+ assert!(err_result == Error::Sys(Errno::EISDIR) || err_result == Error::Sys(Errno::EPERM)); -+ } -+ -+#[test] -+fn test_unlinkat_dir_removedir() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let dirname = "foo_dir"; -+ let dirpath = tempdir.path().join(dirname); -+ -+ // Create dir -+ DirBuilder::new().recursive(true).create(&dirpath).unwrap(); -+ -+ // Get file descriptor for base directory -+ let dirfd = fcntl::open(tempdir.path(), fcntl::OFlag::empty(), stat::Mode::empty()).unwrap(); -+ -+ // Attempt unlink dir at relative path with proper flag -+ unlinkat(Some(dirfd), dirname, UnlinkatFlags::RemoveDir).unwrap(); -+ assert!(!dirpath.exists()); -+ } -+ -+#[test] -+fn test_unlinkat_file() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let filename = "foo.txt"; -+ let filepath = tempdir.path().join(filename); -+ -+ // Create file -+ File::create(&filepath).unwrap(); -+ -+ // Get file descriptor for base directory -+ let dirfd = fcntl::open(tempdir.path(), fcntl::OFlag::empty(), stat::Mode::empty()).unwrap(); -+ -+ // Attempt unlink file at relative path -+ unlinkat(Some(dirfd), filename, UnlinkatFlags::NoRemoveDir).unwrap(); -+ assert!(!filepath.exists()); -+ } -+ -+#[test] -+fn test_access_not_existing() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let dir = tempdir.path().join("does_not_exist.txt"); -+ assert_eq!(access(&dir, AccessFlags::F_OK).err().unwrap().as_errno().unwrap(), -+ Errno::ENOENT); -+} -+ -+#[test] -+fn test_access_file_exists() { -+ let tempdir = tempfile::tempdir().unwrap(); -+ let path = tempdir.path().join("does_exist.txt"); -+ let _file = File::create(path.clone()).unwrap(); -+ assert!(access(&path, AccessFlags::R_OK | AccessFlags::W_OK).is_ok()); -+} -diff --git a/third_party/rust/nix/.cargo-checksum.json b/third_party/rust/nix/.cargo-checksum.json -index e5f2bc789185a..85adbc1eae931 100644 ---- a/third_party/rust/nix/.cargo-checksum.json -+++ b/third_party/rust/nix/.cargo-checksum.json -@@ -1 +1 @@ --{"files":{"CHANGELOG.md":"91af9fd5f2d9cdb9c8bb750e24b625742e95a6c74bcff419f3de70eb26578281","CONTRIBUTING.md":"a9101e3d1487170d691d5f062ff49a433c167582ac8984dd41a744be92652f74","CONVENTIONS.md":"e150ce43c1d188c392c1a3bf7f2e08e3cf84906705c7bef43f319037d29ea385","Cargo.toml":"af0cc0ae7ff4bf6c2e5b35fe062f54fe2d619f70ba67795f4f43a981420b5de0","LICENSE":"66e3ee1fa7f909ad3c612d556f2a0cdabcd809ad6e66f3b0605015ac64841b70","README.md":"80d71b9eaac7bf7f0d307372592ed1467f994291e6fad816a44f3c70e2887d0f","build.rs":"14c9c678c33f5894509da47f77d6a326b14aecb4190ce87a24cce98687ca63b2","src/dir.rs":"21e330cbe6594274335b94d9e9b6059f1fa8e53d2e5b5c697058c52ec6b3c5ff","src/errno.rs":"a009ccf18b45c0a4c9319c65b0dc5bc322d9ad43cfe462ec4661559f44162451","src/errno_dragonfly.c":"a857e47b114acb85fddcb252a610ab5734d225c26b7bedd7c35d7789d46c8526","src/fcntl.rs":"6ae2f7f01dd2568b82a4e57f86e02b1d63eec6c26111c5adb2ca5d78a2a99fe7","src/features.rs":"22ff626ff8287a07dd55bcfc63c9f518c19c56144e15f9b6f9e3bbdcda51c2a8","src/ifaddrs.rs":"9a93de176edcca4613e668b8ccc2c3e3b6b711aa2d8d94ccb0ba08694d1ef35f","src/kmod.rs":"4d8a695d3d761f351a39d654303a1bd168e74295b7d142b918737e355b24f34d","src/lib.rs":"fdd8049a79ffb92384c72f0a6b0bab717001ddfa9b01f2b33413c83f424f2ac8","src/macros.rs":"aec27fa0fd98900913fada926c9a4581cd28f2640e3a7b5480707f923c9200f8","src/mount.rs":"cdf5db8409017483132db9d7493b5d6cc96df5560d0fa5ad8f385aff72db10ca","src/mqueue.rs":"82af42b31381af73e7966f845d1ed93957f0b9976bf2da524b178fad15b2b08d","src/net/if_.rs":"f7e02076fcf3cadf3fdf141884c9bd2c468a7047ba60bc490f0057df802b53ce","src/net/mod.rs":"577f70170e53d4a6de1abb70bf8f1031ec3e65c0e63ef5fcf05c907125e7ac17","src/poll.rs":"7305e250066cd1a7318cd239ed3db787937ee98426fe9289cf00fa874d76b6c7","src/pty.rs":"6b965b586579933af47d4efef4c82c391b927037eaa08d8c83fc974ef17fc7c8","src/sched.rs":"f9b214fa60006b5450ffb3589a55ec59c3694bd49597c65c38ac813fcd96c7dd","src/sys/aio.rs":"a1ba629258b3ce1268e5fe8e5b41dce3581f77d415dc5e2455c1f82f26dd3085","src/sys/epoll.rs":"f0b539e0645569657f2142db91a38c94ebe1925f44852d64c61c818758dbbf0b","src/sys/event.rs":"ef8bc02a08d9ce7924c87f8f891fa051587b195a36913712fe85237a2fe0685b","src/sys/eventfd.rs":"08008cf3dc64c2216847c02c0dd8d7189cf08edbaafe35ba2c57c053fde09ef4","src/sys/inotify.rs":"687c8417d737939aa93f805d6003afc4f84f50828b1bd9429ef5d00bef0e0955","src/sys/ioctl/bsd.rs":"56ca6ecf5f7cfb566f4f3ba589fcc778f747a517dd45e13780981922e6215344","src/sys/ioctl/linux.rs":"6cfbdff4dbfa1a3782acdedebe89ffa9f000fdfc4ab68cb46f52890ebc1c6f2d","src/sys/ioctl/mod.rs":"20bc3cf1fcbbc7c31e4d507baa4e576a793ea42fb33618d2e7afeda730c4324f","src/sys/memfd.rs":"11cd93c867fdbdbc9588cecb94268691de42b2ef2a38fe33525be7c7f60c85d5","src/sys/mman.rs":"f77d28611a7ff3bf62784a3c4f26d7d79969395b1d9bbc6ff15e734f52dc404f","src/sys/mod.rs":"f39a08c72e37638c7cecfb9c087e0a41e2b69409aa545b0ef7bbd59c0a063ee2","src/sys/pthread.rs":"cfa9ccd6f3b86c0c3fe012773c9c82a7813b298c2f20f8ab629781db627ce56b","src/sys/ptrace/bsd.rs":"8a7eacfc172b55763ae32109bf9b252669ba68b72cd5122f7504eb35c0c08345","src/sys/ptrace/linux.rs":"f09b45148004f4b28d8503c397a8d112d31046c98e68335bf4e89425d5b33f07","src/sys/ptrace/mod.rs":"671a6ccac955e75d5998f7e53ffc45ed4c7b6522a0f24a0937d60141f692dd39","src/sys/quota.rs":"7eb8e797466b506f6ed882f18eda92c4639cf43d9384a19bc39cd1bf982989c9","src/sys/reboot.rs":"fde9da27c2928f7026231430fa14fec2058df4e49a0aeda2a237a60524f11241","src/sys/select.rs":"57d6c4403d1bf788bd52ab6f03cfc16a189d31b6bfb338b135cb775fe369121f","src/sys/sendfile.rs":"ea386e83baf9b5b23488aca26635aacdc92f2bfe238e4399a7380bd0331e0ef7","src/sys/signal.rs":"9216cdd609b4dfb9c2e559c411be6b7c722f7ddd8024682c0895a32126b488aa","src/sys/signalfd.rs":"bfcfce619bf199e50f9cc80a3eb778d48474a015cfdafc64a0c3517373a225a9","src/sys/socket/addr.rs":"8b297ce13cd8ad200b3e764888c26ceb582ee505385d1e172440de94ade99644","src/sys/socket/mod.rs":"e0353f04f3d098a8bf5e2aae431645897b96e0889fb76537dc0330159c6f233d","src/sys/socket/sockopt.rs":"c663505d6a7a7ae9d76e03fbc17e53d308ea6b1eae92212812e1d76b2bf2916f","src/sys/stat.rs":"c4807048f86be67026756737cf81f448ec23c2a4745776cb40f40b533a88e0c8","src/sys/statfs.rs":"d2b72069f20aa7782ce5de4ec2d00c76a82a92376c2066bbb270cdac2167719e","src/sys/statvfs.rs":"2d328cf525ba04ab1e1351128624a7df7d0c55ea91fda6c8d620d13710d61606","src/sys/sysinfo.rs":"0c05244655aa9e6dff5138392c5c1ae97630d35bae0e5510d7f51a75c31fd425","src/sys/termios.rs":"a2e99afdfc3526641a2cb82b57bfd0a25a362fb9be5ad37ff9f11acaeb0b9439","src/sys/time.rs":"8a1224b9262026086af698630aedbed21b45d661fbd045fc6c6af41a16a23374","src/sys/uio.rs":"60a974275ff8c485ea183bdd6f7e25894e6f2360a5bfb25442391a825a3b9b8c","src/sys/utsname.rs":"c977a1aec6e051c72b27506395e942abab9cbd9523e6d345ea66dc10875ee87d","src/sys/wait.rs":"30b14a8f518d031805cae6c6ff644116f162d8c8a75fddcfce4479d8d55fd1c0","src/ucontext.rs":"075560ec08a362881534211f8c6b78844886d6b767c2f7067174600e38ed3f63","src/unistd.rs":"82308ec31b6293b55f86fafd04e976a41127fedebb8f158abd1399c7399af947","test/sys/mod.rs":"e0821cbc289ad952f17229609c7de4282cca1e44cd13e1a7494a6378ecbc12f8","test/sys/test_aio.rs":"b2544bfb321ca7fbed276ee637c769fb438156d14666cdc1e1d547b3514a44e3","test/sys/test_aio_drop.rs":"30dd1d238269d00381fa50f6d3cb2b13794b7cceb9f6455f3878fcbffa9aa62d","test/sys/test_epoll.rs":"35093d0cb1096a934dfc4f6efc737eadc4bdc2e2134d2a879061374a51b10c97","test/sys/test_inotify.rs":"a4f804bcf414b6635d9863c8534769a609009c451c3476cc839cdc30c439b3b1","test/sys/test_ioctl.rs":"eea690ed386da0a666df5eb23a417421fddb99dc8e39556f63b30969bb6cf779","test/sys/test_lio_listio_resubmit.rs":"203a583313542593148f375b087ae30620222a745680173fa98fc448d1e5ae7f","test/sys/test_pthread.rs":"3890e5ecbf2082e0d05d102cc9cec6e76ede3c15f250d104e3483b1c1c3400b1","test/sys/test_ptrace.rs":"4e8d5dff5fe6bc56e4ae53bdfd10f5e8ea567d8099576d1c690cf7a6b2bc955f","test/sys/test_select.rs":"bdb20211fc6ec1e3f186337eac51e08757acb6901d307d67c71bf9011f0d54bd","test/sys/test_signal.rs":"84ae63c2baa49eebeabe5bbd347b9c5417e14ba97f342719d753dc1c1c768d60","test/sys/test_signalfd.rs":"71b5d6d782283f6db64ca90f7fb06617faec71091d59d2587e41bbc9d8c43d5c","test/sys/test_socket.rs":"09a7ef0322e07b4579893e0307a7c4f81fbbc653d005b827a519c33a33e185ce","test/sys/test_sockopt.rs":"b3d386c8279f86bf9439c772317bafcdba5630fa806c8319e87ddac0ccfa3a03","test/sys/test_sysinfo.rs":"1e1bea9130fe38ccb07cd0ad7334c7be1e45efc33f7656a5973f8cad7126f225","test/sys/test_termios.rs":"fa4be3ade859b527bf33408f85a6f57b127917cf5f2afb662d09f6019d07913a","test/sys/test_uio.rs":"9da234e3bd5003fd200cc37c4a5be147ecda1a7670feb1d505f23d646d3e1c57","test/sys/test_wait.rs":"e6c5147e213daa93892cd828f53214995d2e019ff2372cc48d85ce9b93d26ec9","test/test.rs":"e6307f82a39426a949b8e925a2df4a62e31c0e43081d7a33d23759bdfeeece1f","test/test_dir.rs":"5d137a62f11d1a4993b4bb35dccc38a4c4416b7da374887f2335a9895b4fdee4","test/test_fcntl.rs":"730e64e99dc867ba5af7cc4ca83a4489c8b96b1a52f8937bcc666d673af27002","test/test_kmod/hello_mod/Makefile":"0219f7bce0603f97d997fb377ca071966c90333ecc665e78a54dfeb97a9c811b","test/test_kmod/hello_mod/hello.c":"bcac6b19c5bd807e1f3878c15e426acc85785a8ade9840c3bb4d068635c9188c","test/test_kmod/mod.rs":"f4754f028402a8ba788c87686288424cd3784e77c7eb5d96682ef491b1dd5262","test/test_mount.rs":"78ddc657f5098360c764fffa3a7d844503e4b6b65b44bfd42d9aa9045b415cb6","test/test_mq.rs":"5806f8825e91edc79dd0e2bc81d8be3ba094c2de6c0b2ac0268221ae2ad22701","test/test_net.rs":"ec6d580b87292519d514b0236bdd5abdd576fcf4835cfe49ed1ddb47c5f1aea3","test/test_nix_path.rs":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","test/test_poll.rs":"46c71ee988fe1b85561ea0530d099750be8c1b8f95ab6e845c8a9f46f16f060c","test/test_pty.rs":"be04f99904fa47b60400c2bd156a388b73df4b9aec2eebf13df7dcdfc9aacf45","test/test_ptymaster_drop.rs":"5cfbbb79551c205ab510c2d4ef497bf937ceac9151fbe2f2e543d6515e406990","test/test_sendfile.rs":"e0cbabbd34052ccaa03d6555d5631686aa076728f6378ee90f7ecec68f891144","test/test_stat.rs":"1dc420d3119bf4d863a7ae0ba63efa7f1416f6e46e4100ea161003fe1c3f66ba","test/test_unistd.rs":"0325c998acca1e826e9e2b3d351d55ab9723a6cb2ca2072245978e7f5a9acee8"},"package":"3b2e0b4f3320ed72aaedb9a5ac838690a8047c7b275da22711fddff4f8a14229"} -\ No newline at end of file -+{"files":{"CHANGELOG.md":"9294216482039acf0dd5911548feaaf04d410298fc5cd3df450d8d36c914756e","CONTRIBUTING.md":"7da4f8c2ff8e06850bdd9ebc0a3552419fd21d2c6bb0c6f0719566e263b0a1b9","CONVENTIONS.md":"df0d4fe9fe65af0bfa4723dc7b641d5130087259799e6b404ad63884f79031cb","Cargo.toml":"03e8c7ae8afb88e9d698712e2428d19a367c19079e994a170cb16dca985cc48d","LICENSE":"66e3ee1fa7f909ad3c612d556f2a0cdabcd809ad6e66f3b0605015ac64841b70","README.md":"d7a8568ffb72d76acc2812d8f545ad71b24a7c1301d2a258f49057fcaded0b9f","src/dir.rs":"52170e8bfc8c4bc1996db2f5cd5a2aace71beac59e4a0e7c1817fdecbf8bd6a7","src/env.rs":"bc52e80d3fa6c5388e3e23767d214a72f88d2927c5604246016c4cf978bbbeb7","src/errno.rs":"1aab33e5dcab9c6f83e48e452f361840645ce6a434bc13bd8ab9abb0e0ef25c3","src/fcntl.rs":"7f3f95baad70ceb1231b8a647988a8e54292d84176820eb6a9f89d40f309c3a6","src/features.rs":"2cb080da3f26eca2d2e18282a41afec921426423a6354a50b840cf20f3f153f6","src/ifaddrs.rs":"4f19ed3b15f5059c2859958c6aa313d6fa75703e68f8608359ef8e0089508ed3","src/kmod.rs":"873bec7f32e30a552a4fd86d5f884c2b3a0cd73012121dfe1587b508475beb0a","src/lib.rs":"ae1a16e142c47afc3f52a07a2afb2fc013cfd427df955aa42e4bd372c77c49d5","src/macros.rs":"7c6c81441c967d73a75a975bb660ae48efde22c6f5ae2705c62a8db446ce0d39","src/mount.rs":"cde7c59b79a8e535c4d8c57c53d7825384b110be244803b1f895d5a3b97bc72f","src/mqueue.rs":"3520495f6a881a7239fba19e90234f7fc9df6729b6bc150bd2e6664b7c98d6a1","src/net/if_.rs":"928066a6ec473ce565e2323858ff64e179e4b81b80768d830dd29008f2fafb7f","src/net/mod.rs":"577f70170e53d4a6de1abb70bf8f1031ec3e65c0e63ef5fcf05c907125e7ac17","src/poll.rs":"ba635fbed688a165279a9851269310220befd211c8fcf5761d1a62dab39ba52b","src/pty.rs":"7a73ba21b2ec8910f7932e456d2fb097a0553c5fe07717238c58455e3de7b275","src/sched.rs":"2bdb5ce449bc093a8eecdd8964e5d05feee3e7b804e4271e40d674178295df79","src/sys/aio.rs":"bbcc1d8639a9c89c66c00357353dde94d0f48b516b4354ab3d3dcfc16a2e0b56","src/sys/epoll.rs":"a3ace2282e77989e9b927dcdca8ad2070d4fb7710398af0763ea6eb26d431968","src/sys/event.rs":"075e84e5a5d1fd922fbcac8c01c8e7cd7f1a1c1f8f60ede8f7ebc5fe6d5e76ac","src/sys/eventfd.rs":"b5301029e95f77f280cc169bb8aa247352efbb600c749f26e2fffa0474c872bb","src/sys/inotify.rs":"114be3860c9daaee1c781df90b63abb87cd82d677c4470b359bbf0787a25d302","src/sys/ioctl/bsd.rs":"853b50c3539dc4a1284c847f2689fde3dbed5dca7a8599db36193048e030296a","src/sys/ioctl/linux.rs":"642b25d3997518815dea454fa976e9067ad5fe4ed75622e7540e3f0d0c7d320a","src/sys/ioctl/mod.rs":"dd3435e44c42f55a600e40599038bebc7417934dade00113ef0f3b6318bf54de","src/sys/memfd.rs":"35dba6c3eeb4f74edbf86530ba1696d9251495b82b814a36b76e6d2b26490e3c","src/sys/mman.rs":"bdca4a151dc31d27c7435e30a5030ad2edef9dd3ac69a33363454cada8466ca3","src/sys/mod.rs":"b8d7d9e3cb331f1d972699cfbaa54fff34a9f26eaba38b8ee49e84bfeee22bd3","src/sys/personality.rs":"2019e58aa69c5ad68ae060e1b9a399138a2e4742f37a868e2681588963ca8acf","src/sys/pthread.rs":"cfa9ccd6f3b86c0c3fe012773c9c82a7813b298c2f20f8ab629781db627ce56b","src/sys/ptrace/bsd.rs":"feced79575c5dbeaf0a0877ba888761675310b277f477acee820c785e132dbe9","src/sys/ptrace/linux.rs":"34524ad4911d2ef7ec0e21a49e479d6fd91d4ef5c660e0b7e2afa4878b27367a","src/sys/ptrace/mod.rs":"671a6ccac955e75d5998f7e53ffc45ed4c7b6522a0f24a0937d60141f692dd39","src/sys/quota.rs":"4ceb895896bbd0bb67ce98e91dec3bd40c9a7d5936abbe13b74691c6afa07f9f","src/sys/reboot.rs":"1fd26955bc095bd4f8804c850183f527560803cbceaf345c3760c8f32fe1224f","src/sys/select.rs":"02226a733d160701f07d27384f87bf21032f3cc4d5a6214dc61e398dd1606b60","src/sys/sendfile.rs":"110955788e3f5f36a7e563c334c6fe400edfb93d6cb2fdce6b8a79d2e892f8ce","src/sys/signal.rs":"53232ef1165272d109173fbba769cde77f3446050dbdaf36e56c4c0fde084348","src/sys/signalfd.rs":"37704804eb75571d03bbc1c99bd90846ae50ce361cc9998777744f8265d51074","src/sys/socket/addr.rs":"0513e0fbe57c19f8f9538e31074a4ed50c443fd45dd66ce1fa56db2dee46b371","src/sys/socket/mod.rs":"7d0d0b2da45d45493c494ad8669f53577439510914777b03febb6d2f18dcc787","src/sys/socket/sockopt.rs":"42b335e7a2e2b8cf160506524490bb685bd2488ebff65921aa10f60363ffda7b","src/sys/stat.rs":"a969ae88221a50c89d54f97987d108d3c017339d7eedd66ac7218463d2bb07db","src/sys/statfs.rs":"6bd23f941107dc79ec34dc50516ff5eb18d9fad108ad976796669505692c1582","src/sys/statvfs.rs":"09a7268f3f6f321961e4f25943236fe103fe8c7661ea841f4e71014fda0d8952","src/sys/sysinfo.rs":"1aa6f402bc10689c5dd7ad454ecb60834e2b065dddbd3d87d1daecf88cb2b3ee","src/sys/termios.rs":"c3c310cdec9c7c80e7b11ada25d3dc87c0d0fc6c30fcda8f94edab1d27132300","src/sys/time.rs":"cc955b6b6647ca1db33ac076780ca6c984200e3cc47df5d836b1528489cdef70","src/sys/timerfd.rs":"51443f37b1dd4b03f16e1b569945f0ae715db4028f69e3ddd6c311db00e67ab3","src/sys/uio.rs":"a25dd7a84135ea50a671a7a06a8989dc9d53d3e755d36cef9f37cdc79a123d9d","src/sys/utsname.rs":"9509a092c837d1700f9f4ac30e4568e5b9b63ad8925a56cd8ad7add05d0ac452","src/sys/wait.rs":"ab18e66acaf161750394d802409ee8c95707dbd68d2fb59c88f7d4ed8936a1be","src/time.rs":"957845f8c689aec3c5dcf1af8bbc274a28ed5a214e4ee31ec8a89ed5eea0d3f1","src/ucontext.rs":"10fdfebcecafa8d1c6cf573a5768adc07b87e9ff52a0bdc2527e77f73608f264","src/unistd.rs":"9c2b170f2b217393e571fb8021e000dfec4a5d99e170e11532a665163ecf3d54","test/common/mod.rs":"a26ecf30fc06008bab21d96eabf711bb0c41e8b50fe4c1f35cb2797ef405296c","test/sys/mod.rs":"c6f6a376fca73025bd76043a1739f54d24e856d4d0af9c58cc2b9d730ab87144","test/sys/test_aio.rs":"f21c157a07a29d60b0d68baa78ce24b352a19a35eaced0a792f62fa16d38617f","test/sys/test_aio_drop.rs":"eb086fcebd53ec82359ed7323f039b16ef7abced66b111f4876486fb058476e5","test/sys/test_epoll.rs":"35093d0cb1096a934dfc4f6efc737eadc4bdc2e2134d2a879061374a51b10c97","test/sys/test_inotify.rs":"a4f804bcf414b6635d9863c8534769a609009c451c3476cc839cdc30c439b3b1","test/sys/test_ioctl.rs":"39ddd52b27d942ab1b4018d213a378fb221598febc8fc7759ae5e6f746364396","test/sys/test_lio_listio_resubmit.rs":"29718e5fd04ef041125db4963f518f6f518b50436ea2df91e44c9c6b9418b704","test/sys/test_mman.rs":"b129b1d40d7a6e23cfc10956f9aa689d578a745f82fa267d24c40475063b592c","test/sys/test_pthread.rs":"891726053083bf488655eca1518630b08fa7c5937433fb5e446a9eed181ff7c5","test/sys/test_ptrace.rs":"46e51267cc93e45894a1e5a194563af5fb65a170dca95ad7cf9110520d764703","test/sys/test_select.rs":"7ece285a78cb66852ba8e89cac82c2d4fcff7d17a5f35e282cc52a09f5820daf","test/sys/test_signal.rs":"753f2ccbfcf2c5353a75b1e48d746a07c1949defba515c0ceee589ad1ed0aff6","test/sys/test_signalfd.rs":"2068a028c88395ff51c09e43b18c03d16e2d851f1d26ca1d121cdb5cb050f5c5","test/sys/test_socket.rs":"0f5fe9637f196cef459aadee27e449e5f9f968c10bf8dd017763c607cb6261d3","test/sys/test_sockopt.rs":"3334e12322e8b4e7c095ddc4a40a2d0e73a0d3a6e1820a6e0970eb8e1136c6de","test/sys/test_sysinfo.rs":"1e1bea9130fe38ccb07cd0ad7334c7be1e45efc33f7656a5973f8cad7126f225","test/sys/test_termios.rs":"93cd5cc181f1d8cef5c69aa23ddfabbf0480369cffab523e677c81e208998328","test/sys/test_timerfd.rs":"fcada956abd981e4d846da58e5640c5705b16026d47bccd1d603fae765ad10db","test/sys/test_uio.rs":"ae915c03e4f64ce370ae46f5dbe37834dae2849bb9fa7961872cec50f45de1f4","test/sys/test_wait.rs":"1fefed60ea3f9c5d8d4518e1d7a122d50aad44c2bd87873ac9ddc31ecdcc5a39","test/test.rs":"be9c29b8a8c9669b6674746ac8065c828a5d1d40ba41226846fe964310a18188","test/test_clearenv.rs":"45ca548035b3c20ec87314715feaba2be973709a635d85b8cde46fd1d9f1ecd4","test/test_dir.rs":"e0dc7c317871eda3873a5d9df801c2ebb34cd958210c42a15f8dff623f05cae0","test/test_fcntl.rs":"e60c1dde6d0a6fde7a52cf98332e5b96fef5749868f0313cb7082bda7a66adb9","test/test_kmod/hello_mod/Makefile":"0219f7bce0603f97d997fb377ca071966c90333ecc665e78a54dfeb97a9c811b","test/test_kmod/hello_mod/hello.c":"bcac6b19c5bd807e1f3878c15e426acc85785a8ade9840c3bb4d068635c9188c","test/test_kmod/mod.rs":"07f5445812593c994d1c25d5c8669aa3c4b1750f3b8ed2c1ddb1c661809983dc","test/test_mount.rs":"55503e8b28f77b45d755d549375cab34fa3a3cc9b94cbb23cfbd4426c5d9cb9c","test/test_mq.rs":"1020a4eb2f88cc29c59c44ad965d0573fba2beeb4c8986060aac56de99eea63c","test/test_net.rs":"ec6d580b87292519d514b0236bdd5abdd576fcf4835cfe49ed1ddb47c5f1aea3","test/test_nix_path.rs":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","test/test_poll.rs":"fbcf1780447f75a0177b4f47ba3d99b68f4324059ff66d993034ae5035c6d3ef","test/test_pty.rs":"56198cb9537ec3409717acecb133a49eb48bfc180c135ff0296974ec466d1171","test/test_ptymaster_drop.rs":"d162510cc96b8b7389d8bc34e097db1c80b84b5070c1d16f15b053ffd20cfa17","test/test_sched.rs":"f8ad92eb554164b0f92428f716db99040186d741cc6e1976f7930f099652f70c","test/test_sendfile.rs":"e0cbabbd34052ccaa03d6555d5631686aa076728f6378ee90f7ecec68f891144","test/test_stat.rs":"9668fc1f894b7f8a60dfddbdaef4bc833463e4e0cf04c1cff7f8c0569a226ad2","test/test_time.rs":"199b1c89d373e9398cca97f83ecd6459c6bd5ba7adca28013d9109d5cbad03f3","test/test_unistd.rs":"9bf047d877fd7c0826a2241737574923c3fd102a6b143b6d9710f52af5655588"},"package":"f5e06129fb611568ef4e868c14b326274959aa70ff7776e9d55323531c374945"} -\ No newline at end of file -diff --git a/third_party/rust/nix/CHANGELOG.md b/third_party/rust/nix/CHANGELOG.md -index d93a5ce6bbfc9..234f2307c6d36 100644 ---- a/third_party/rust/nix/CHANGELOG.md -+++ b/third_party/rust/nix/CHANGELOG.md -@@ -2,12 +2,316 @@ - - All notable changes to this project will be documented in this file. - This project adheres to [Semantic Versioning](http://semver.org/). -+This project adheres to [Semantic Versioning](https://semver.org/). - --## [Unreleased] - ReleaseDate -+## [0.20.2] - 28 September 2021 - ### Added - ### Changed - ### Fixed -+ -+- Fixed buffer overflow in `unistd::getgrouplist`. -+ (#[1545](https://github.com/nix-rust/nix/pull/1545)) -+ -+## [0.20.1] - 13 August 2021 -+### Added -+### Changed -+### Fixed -+ -+- Locked bitflags to < 1.3.0 to fix the build with rust < 1.46.0. -+ -+### Removed -+ -+- Removed a couple of termios constants on redox that were never actually -+ supported. -+ (#[1483](https://github.com/nix-rust/nix/pull/1483)) -+ -+## [0.20.0] - 20 February 2021 -+### Added -+ -+- Added a `passwd` field to `Group` (#[1338](https://github.com/nix-rust/nix/pull/1338)) -+- Added `mremap` (#[1306](https://github.com/nix-rust/nix/pull/1306)) -+- Added `personality` (#[1331](https://github.com/nix-rust/nix/pull/1331)) -+- Added limited Fuchsia support (#[1285](https://github.com/nix-rust/nix/pull/1285)) -+- Added `getpeereid` (#[1342](https://github.com/nix-rust/nix/pull/1342)) -+- Implemented `IntoIterator` for `Dir` -+ (#[1333](https://github.com/nix-rust/nix/pull/1333)). -+ -+### Changed -+ -+- Minimum supported Rust version is now 1.40.0. -+ ([#1356](https://github.com/nix-rust/nix/pull/1356)) -+- i686-apple-darwin has been demoted to Tier 2 support, because it's deprecated -+ by Xcode. -+ (#[1350](https://github.com/nix-rust/nix/pull/1350)) -+- Fixed calling `recvfrom` on an `AddrFamily::Packet` socket -+ (#[1344](https://github.com/nix-rust/nix/pull/1344)) -+ -+### Fixed -+- `TimerFd` now closes the underlying fd on drop. -+ ([#1381](https://github.com/nix-rust/nix/pull/1381)) -+- Define `*_MAGIC` filesystem constants on Linux s390x -+ (#[1372](https://github.com/nix-rust/nix/pull/1372)) -+- mqueue, sysinfo, timespec, statfs, test_ptrace_syscall() on x32 -+ (#[1366](https://github.com/nix-rust/nix/pull/1366)) -+ -+### Removed -+ -+- `Dir`, `SignalFd`, and `PtyMaster` are no longer `Clone`. -+ (#[1382](https://github.com/nix-rust/nix/pull/1382)) -+- Removed `SockLevel`, which hasn't been used for a few years -+ (#[1362](https://github.com/nix-rust/nix/pull/1362)) -+- Removed both `Copy` and `Clone` from `TimerFd`. -+ ([#1381](https://github.com/nix-rust/nix/pull/1381)) -+ -+## [0.19.1] - 28 November 2020 -+### Fixed -+- Fixed bugs in `recvmmsg`. -+ (#[1341](https://github.com/nix-rust/nix/pull/1341)) -+ -+## [0.19.0] - 6 October 2020 -+### Added -+- Added Netlink protocol families to the `SockProtocol` enum -+ (#[1289](https://github.com/nix-rust/nix/pull/1289)) -+- Added `clock_gettime`, `clock_settime`, `clock_getres`, -+ `clock_getcpuclockid` functions and `ClockId` struct. -+ (#[1281](https://github.com/nix-rust/nix/pull/1281)) -+- Added wrapper functions for `PTRACE_SYSEMU` and `PTRACE_SYSEMU_SINGLESTEP`. -+ (#[1300](https://github.com/nix-rust/nix/pull/1300)) -+- Add support for Vsock on Android rather than just Linux. -+ (#[1301](https://github.com/nix-rust/nix/pull/1301)) -+- Added `TCP_KEEPCNT` and `TCP_KEEPINTVL` TCP keepalive options. -+ (#[1283](https://github.com/nix-rust/nix/pull/1283)) -+### Changed -+- Expose `SeekData` and `SeekHole` on all Linux targets -+ (#[1284](https://github.com/nix-rust/nix/pull/1284)) -+- Changed unistd::{execv,execve,execvp,execvpe,fexecve,execveat} to take both `&[&CStr]` and `&[CString]` as its list argument(s). -+ (#[1278](https://github.com/nix-rust/nix/pull/1278)) -+- Made `unistd::fork` an unsafe funtion, bringing it in line with [libstd's decision](https://github.com/rust-lang/rust/pull/58059). -+ (#[1293](https://github.com/nix-rust/nix/pull/1293)) -+### Fixed -+### Removed -+ -+## [0.18.0] - 26 July 2020 -+### Added -+- Added `fchown(2)` wrapper. -+ (#[1257](https://github.com/nix-rust/nix/pull/1257)) -+- Added support on linux systems for `MAP_HUGE_`_`SIZE`_ family of flags. -+ (#[1211](https://github.com/nix-rust/nix/pull/1211)) -+- Added support for `F_OFD_*` `fcntl` commands on Linux and Android. -+ (#[1195](https://github.com/nix-rust/nix/pull/1195)) -+- Added `env::clearenv()`: calls `libc::clearenv` on platforms -+ where it's available, and clears the environment of all variables -+ via `std::env::vars` and `std::env::remove_var` on others. -+ (#[1185](https://github.com/nix-rust/nix/pull/1185)) -+- `FsType` inner value made public. -+ (#[1187](https://github.com/nix-rust/nix/pull/1187)) -+- Added `unistd::setfsuid` and `unistd::setfsgid` to set the user or group -+ identity for filesystem checks per-thread. -+ (#[1163](https://github.com/nix-rust/nix/pull/1163)) -+- Derived `Ord`, `PartialOrd` for `unistd::Pid` (#[1189](https://github.com/nix-rust/nix/pull/1189)) -+- Added `select::FdSet::fds` method to iterate over file descriptors in a set. -+ ([#1207](https://github.com/nix-rust/nix/pull/1207)) -+- Added support for UDP generic segmentation offload (GSO) and generic -+ receive offload (GRO) ([#1209](https://github.com/nix-rust/nix/pull/1209)) -+- Added support for `sendmmsg` and `recvmmsg` calls -+ (#[1208](https://github.com/nix-rust/nix/pull/1208)) -+- Added support for `SCM_CREDS` messages (`UnixCredentials`) on FreeBSD/DragonFly -+ (#[1216](https://github.com/nix-rust/nix/pull/1216)) -+- Added `BindToDevice` socket option (sockopt) on Linux -+ (#[1233](https://github.com/nix-rust/nix/pull/1233)) -+- Added `EventFilter` bitflags for `EV_DISPATCH` and `EV_RECEIPT` on OpenBSD. -+ (#[1252](https://github.com/nix-rust/nix/pull/1252)) -+- Added support for `Ipv4PacketInfo` and `Ipv6PacketInfo` to `ControlMessage`. -+ (#[1222](https://github.com/nix-rust/nix/pull/1222)) -+- `CpuSet` and `UnixCredentials` now implement `Default`. -+ (#[1244](https://github.com/nix-rust/nix/pull/1244)) -+- Added `unistd::ttyname` -+ (#[1259](https://github.com/nix-rust/nix/pull/1259)) -+- Added support for `Ipv4PacketInfo` and `Ipv6PacketInfo` to `ControlMessage` for iOS and Android. -+ (#[1265](https://github.com/nix-rust/nix/pull/1265)) -+- Added support for `TimerFd`. -+ (#[1261](https://github.com/nix-rust/nix/pull/1261)) -+ -+### Changed -+- Changed `fallocate` return type from `c_int` to `()` (#[1201](https://github.com/nix-rust/nix/pull/1201)) -+- Enabled `sys::ptrace::setregs` and `sys::ptrace::getregs` on x86_64-unknown-linux-musl target -+ (#[1198](https://github.com/nix-rust/nix/pull/1198)) -+- On Linux, `ptrace::write` is now an `unsafe` function. Caveat programmer. -+ (#[1245](https://github.com/nix-rust/nix/pull/1245)) -+- `execv`, `execve`, `execvp` and `execveat` in `::nix::unistd` and `reboot` in -+ `::nix::sys::reboot` now return `Result<Infallible>` instead of `Result<Void>` (#[1239](https://github.com/nix-rust/nix/pull/1239)) -+- `sys::socket::sockaddr_storage_to_addr` is no longer `unsafe`. So is -+ `offset_of!`. -+- `sys::socket::sockaddr_storage_to_addr`, `offset_of!`, and `Errno::clear` are -+ no longer `unsafe`. -+- `SockAddr::as_ffi_pair`,`sys::socket::sockaddr_storage_to_addr`, `offset_of!`, -+ and `Errno::clear` are no longer `unsafe`. -+ (#[1244](https://github.com/nix-rust/nix/pull/1244)) -+- Several `Inotify` methods now take `self` by value instead of by reference -+ (#[1244](https://github.com/nix-rust/nix/pull/1244)) -+- `nix::poll::ppoll`: `timeout` parameter is now optional, None is equivalent for infinite timeout. -+ -+### Fixed -+ -+- Fixed `getsockopt`. The old code produced UB which triggers a panic with -+ Rust 1.44.0. -+ (#[1214](https://github.com/nix-rust/nix/pull/1214)) -+ -+- Fixed a bug in nix::unistd that would result in an infinite loop -+ when a group or user lookup required a buffer larger than -+ 16KB. (#[1198](https://github.com/nix-rust/nix/pull/1198)) -+- Fixed unaligned casting of `cmsg_data` to `af_alg_iv` (#[1206](https://github.com/nix-rust/nix/pull/1206)) -+- Fixed `readlink`/`readlinkat` when reading symlinks longer than `PATH_MAX` (#[1231](https://github.com/nix-rust/nix/pull/1231)) -+- `PollFd`, `EpollEvent`, `IpMembershipRequest`, `Ipv6MembershipRequest`, -+ `TimeVal`, and `IoVec` are now `repr(transparent)`. This is required for -+ correctness's sake across all architectures and compilers, though now bugs -+ have been reported so far. -+ (#[1243](https://github.com/nix-rust/nix/pull/1243)) -+- Fixed unaligned pointer read in `Inotify::read_events`. -+ (#[1244](https://github.com/nix-rust/nix/pull/1244)) -+ -+### Removed -+ -+- Removed `sys::socket::addr::from_libc_sockaddr` from the public API. -+ (#[1215](https://github.com/nix-rust/nix/pull/1215)) -+- Removed `sys::termios::{get_libc_termios, get_libc_termios_mut, update_wrapper` -+ from the public API. These were previously hidden in the docs but still usable -+ by downstream. -+ (#[1235](https://github.com/nix-rust/nix/pull/1235)) -+ -+- Nix no longer implements `NixPath` for `Option<P> where P: NixPath`. Most -+ Nix functions that accept `NixPath` arguments can't do anything useful with -+ `None`. The exceptions (`mount` and `quotactl_sync`) already take explicitly -+ optional arguments. -+ (#[1242](https://github.com/nix-rust/nix/pull/1242)) -+ -+- Removed `unistd::daemon` and `unistd::pipe2` on OSX and ios -+ (#[1255](https://github.com/nix-rust/nix/pull/1255)) -+ -+- Removed `sys::event::FilterFlag::NOTE_EXIT_REPARENTED` and -+ `sys::event::FilterFlag::NOTE_REAP` on OSX and ios. -+ (#[1255](https://github.com/nix-rust/nix/pull/1255)) -+ -+- Removed `sys::ptrace::ptrace` on Android and Linux. -+ (#[1255](https://github.com/nix-rust/nix/pull/1255)) -+ -+- Dropped support for powerpc64-unknown-linux-gnu -+ (#[1266](https://github.com/nix-rust/nix/pull/1268)) -+ -+## [0.17.0] - 3 February 2020 -+### Added -+- Add `CLK_TCK` to `SysconfVar` -+ (#[1177](https://github.com/nix-rust/nix/pull/1177)) -+### Changed -+### Fixed -+### Removed -+- Removed deprecated Error::description from error types -+ (#[1175](https://github.com/nix-rust/nix/pull/1175)) -+ -+## [0.16.1] - 23 December 2019 -+### Added -+### Changed -+### Fixed -+ -+- Fixed the build for OpenBSD -+ (#[1168](https://github.com/nix-rust/nix/pull/1168)) -+ -+### Removed -+ -+## [0.16.0] - 1 December 2019 -+### Added -+- Added `ptrace::seize()`: similar to `attach()` on Linux -+ but with better-defined semantics. -+ (#[1154](https://github.com/nix-rust/nix/pull/1154)) -+ -+- Added `Signal::as_str()`: returns signal name as `&'static str` -+ (#[1138](https://github.com/nix-rust/nix/pull/1138)) -+ -+- Added `posix_fallocate`. -+ ([#1105](https://github.com/nix-rust/nix/pull/1105)) -+ -+- Implemented `Default` for `FdSet` -+ ([#1107](https://github.com/nix-rust/nix/pull/1107)) -+ -+- Added `NixPath::is_empty`. -+ ([#1107](https://github.com/nix-rust/nix/pull/1107)) -+ -+- Added `mkfifoat` -+ ([#1133](https://github.com/nix-rust/nix/pull/1133)) -+ -+- Added `User::from_uid`, `User::from_name`, `User::from_gid` and -+ `Group::from_name`, -+ ([#1139](https://github.com/nix-rust/nix/pull/1139)) -+ -+- Added `linkat` -+ ([#1101](https://github.com/nix-rust/nix/pull/1101)) -+ -+- Added `sched_getaffinity`. -+ ([#1148](https://github.com/nix-rust/nix/pull/1148)) -+ -+- Added optional `Signal` argument to `ptrace::{detach, syscall}` for signal -+ injection. ([#1083](https://github.com/nix-rust/nix/pull/1083)) -+ -+### Changed -+- `sys::termios::BaudRate` now implements `TryFrom<speed_t>` instead of -+ `From<speed_t>`. The old `From` implementation would panic on failure. -+ ([#1159](https://github.com/nix-rust/nix/pull/1159)) -+ -+- `sys::socket::ControlMessage::ScmCredentials` and -+ `sys::socket::ControlMessageOwned::ScmCredentials` now wrap `UnixCredentials` -+ rather than `libc::ucred`. -+ ([#1160](https://github.com/nix-rust/nix/pull/1160)) -+ -+- `sys::socket::recvmsg` now takes a plain `Vec` instead of a `CmsgBuffer` -+ implementor. If you were already using `cmsg_space!`, then you needn't worry. -+ ([#1156](https://github.com/nix-rust/nix/pull/1156)) -+ -+- `sys::socket::recvfrom` now returns -+ `Result<(usize, Option<SockAddr>)>` instead of `Result<(usize, SockAddr)>`. -+ ([#1145](https://github.com/nix-rust/nix/pull/1145)) -+ -+- `Signal::from_c_int` has been replaced by `Signal::try_from` -+ ([#1113](https://github.com/nix-rust/nix/pull/1113)) -+ -+- Changed `readlink` and `readlinkat` to return `OsString` -+ ([#1109](https://github.com/nix-rust/nix/pull/1109)) -+ -+ ```rust -+ # use nix::fcntl::{readlink, readlinkat}; -+ // the buffer argument of `readlink` and `readlinkat` has been removed, -+ // and the return value is now an owned type (`OsString`). -+ // Existing code can be updated by removing the buffer argument -+ // and removing any clone or similar operation on the output -+ -+ // old code `readlink(&path, &mut buf)` can be replaced with the following -+ let _: OsString = readlink(&path); -+ -+ // old code `readlinkat(dirfd, &path, &mut buf)` can be replaced with the following -+ let _: OsString = readlinkat(dirfd, &path); -+ ``` -+ -+- Minimum supported Rust version is now 1.36.0. -+ ([#1108](https://github.com/nix-rust/nix/pull/1108)) -+ -+- `Ipv4Addr::octets`, `Ipv4Addr::to_std`, `Error::as_errno`, -+ `ForkResult::is_child`, `ForkResult::is_parent`, `Gid::as_raw`, -+ `Uid::is_root`, `Uid::as_raw`, `Pid::as_raw`, and `PollFd::revents` now take -+ `self` by value. -+ ([#1107](https://github.com/nix-rust/nix/pull/1107)) -+ -+- Type `&CString` for parameters of `exec(v|ve|vp|vpe|veat)` are changed to `&CStr`. -+ ([#1121](https://github.com/nix-rust/nix/pull/1121)) -+ -+### Fixed -+- Fix length of abstract socket addresses -+ ([#1120](https://github.com/nix-rust/nix/pull/1120)) -+ -+- Fix initialization of msghdr in recvmsg/sendmsg when built with musl -+ ([#1136](https://github.com/nix-rust/nix/pull/1136)) -+ - ### Removed -+- Remove the deprecated `CmsgSpace`. -+ ([#1156](https://github.com/nix-rust/nix/pull/1156)) - - ## [0.15.0] - 10 August 2019 - ### Added -diff --git a/third_party/rust/nix/CONTRIBUTING.md b/third_party/rust/nix/CONTRIBUTING.md -index 03a1f630dbb06..55990c4f1a24f 100644 ---- a/third_party/rust/nix/CONTRIBUTING.md -+++ b/third_party/rust/nix/CONTRIBUTING.md -@@ -76,21 +76,21 @@ add a test that would have failed without the fix. - - After you've made your change, make sure the tests pass in your development - environment. We also have [continuous integration set up on --Travis-CI][travis-ci], which might find some issues on other platforms. The CI -+Cirrus-CI][cirrus-ci], which might find some issues on other platforms. The CI - will run once you open a pull request. - - There is also infrastructure for running tests for other targets - locally. More information is available in the [CI Readme][ci-readme]. - --[travis-ci]: https://travis-ci.org/nix-rust/nix -+[cirrus-ci]: https://cirrus-ci.com/github/nix-rust/nix - [ci-readme]: ci/README.md - - ### Disabling a test in the CI environment - - Sometimes there are features that cannot be tested in the CI environment. --To stop a test from running under CI, add `#[cfg_attr(travis, ignore)]` --to it. Please include a comment describing the reason it shouldn't run --under CI, and a link to an upstream issue if possible! -+To stop a test from running under CI, add `skip_if_cirrus!()` to it. Please -+describe the reason it shouldn't run under CI, and a link to an issue if -+possible! - - ## bors, the bot who merges all the PRs - -diff --git a/third_party/rust/nix/CONVENTIONS.md b/third_party/rust/nix/CONVENTIONS.md -index 48daa937345d2..2461085eb664a 100644 ---- a/third_party/rust/nix/CONVENTIONS.md -+++ b/third_party/rust/nix/CONVENTIONS.md -@@ -76,12 +76,11 @@ to parameters of functions by [enumerations][enum]. - - Whenever we need to use a [libc][libc] function to properly initialize a - variable and said function allows us to use uninitialized memory, we use --[`std::mem::uninitialized`][std_uninitialized] (or [`core::mem::uninitialized`][core_uninitialized]) --when defining the variable. This allows us to avoid the overhead incurred by --zeroing or otherwise initializing the variable. -+[`std::mem::MaybeUninit`][std_MaybeUninit] when defining the variable. This -+allows us to avoid the overhead incurred by zeroing or otherwise initializing -+the variable. - - [bitflags]: https://crates.io/crates/bitflags/ --[core_uninitialized]: https://doc.rust-lang.org/core/mem/fn.uninitialized.html - [enum]: https://doc.rust-lang.org/reference.html#enumerations - [libc]: https://crates.io/crates/libc/ --[std_uninitialized]: https://doc.rust-lang.org/std/mem/fn.uninitialized.html -+[std_MaybeUninit]: https://doc.rust-lang.org/stable/std/mem/union.MaybeUninit.html -diff --git a/third_party/rust/nix/Cargo.toml b/third_party/rust/nix/Cargo.toml -index 555b99020d68f..456bdca9c2599 100644 ---- a/third_party/rust/nix/Cargo.toml -+++ b/third_party/rust/nix/Cargo.toml -@@ -3,22 +3,24 @@ - # When uploading crates to the registry Cargo will automatically - # "normalize" Cargo.toml files for maximal compatibility - # with all versions of Cargo and also rewrite `path` dependencies --# to registry (e.g., crates.io) dependencies -+# to registry (e.g., crates.io) dependencies. - # --# If you believe there's an error in this file please file an --# issue against the rust-lang/cargo repository. If you're --# editing this file be aware that the upstream Cargo.toml --# will likely look very different (and much more reasonable) -+# If you are reading this file be aware that the original Cargo.toml -+# will likely look very different (and much more reasonable). -+# See Cargo.toml.orig for the original contents. - - [package] -+edition = "2018" - name = "nix" --version = "0.15.0" -+version = "0.20.2" - authors = ["The nix-rust Project Developers"] --exclude = ["/.gitignore", "/.travis.yml", "/ci/*", "/Cross.toml", "/RELEASE_PROCEDURE.md", "/bors.toml"] -+exclude = ["/.gitignore", "/.cirrus.yml", "/ci/*", "/Cross.toml", "/RELEASE_PROCEDURE.md", "/bors.toml"] - description = "Rust friendly bindings to *nix APIs" - categories = ["os::unix-apis"] - license = "MIT" - repository = "https://github.com/nix-rust/nix" -+[package.metadata.docs.rs] -+targets = ["x86_64-unknown-linux-gnu", "aarch64-linux-android", "x86_64-apple-darwin", "aarch64-apple-ios", "x86_64-unknown-freebsd", "x86_64-unknown-openbsd", "x86_64-unknown-netbsd", "x86_64-unknown-dragonfly", "x86_64-fuchsia", "x86_64-unknown-redox"] - - [[test]] - name = "test" -@@ -28,6 +30,10 @@ path = "test/test.rs" - name = "test-aio-drop" - path = "test/sys/test_aio_drop.rs" - -+[[test]] -+name = "test-clearenv" -+path = "test/test_clearenv.rs" -+ - [[test]] - name = "test-lio-listio-resubmit" - path = "test/sys/test_lio_listio_resubmit.rs" -@@ -41,17 +47,14 @@ harness = false - name = "test-ptymaster-drop" - path = "test/test_ptymaster_drop.rs" - [dependencies.bitflags] --version = "1.0" -+version = ">= 1.1.0, < 1.3.0" - - [dependencies.cfg-if] --version = "0.1.2" -+version = "1.0" - - [dependencies.libc] --version = "0.2.60" -+version = "0.2.99" - features = ["extra_traits"] -- --[dependencies.void] --version = "1.0.2" - [dev-dependencies.bytes] - version = "0.4.8" - -@@ -59,12 +62,17 @@ version = "0.4.8" - version = "1.2" - - [dev-dependencies.rand] --version = ">= 0.6, < 0.7" -+version = "0.6" -+ -+[dev-dependencies.semver] -+version = "0.9.0" - - [dev-dependencies.tempfile] --version = ">= 3.0.5, < 3.0.9" -+version = "3.0.5" - [target."cfg(any(target_os = \"android\", target_os = \"linux\"))".dev-dependencies.caps] --version = "0.3.1" -+version = "0.5.1" -+[target."cfg(not(target_os = \"redox\"))".dependencies.memoffset] -+version = "0.6.3" - [target."cfg(target_os = \"dragonfly\")".build-dependencies.cc] - version = "1" - [target."cfg(target_os = \"freebsd\")".dev-dependencies.sysctl] -diff --git a/third_party/rust/nix/README.md b/third_party/rust/nix/README.md -index 0e540ba5b968e..b4909ea4345cc 100644 ---- a/third_party/rust/nix/README.md -+++ b/third_party/rust/nix/README.md -@@ -1,6 +1,6 @@ - # Rust bindings to *nix APIs - --[![Build Status](https://travis-ci.org/nix-rust/nix.svg?branch=master)](https://travis-ci.org/nix-rust/nix) -+[![Cirrus Build Status](https://api.cirrus-ci.com/github/nix-rust/nix.svg)](https://cirrus-ci.com/github/nix-rust/nix) - [![crates.io](http://meritbadge.herokuapp.com/nix)](https://crates.io/crates/nix) - - [Documentation (Releases)](https://docs.rs/nix/) -@@ -50,7 +50,6 @@ Tier 1: - * aarch64-unknown-linux-gnu - * arm-unknown-linux-gnueabi - * armv7-unknown-linux-gnueabihf -- * i686-apple-darwin - * i686-unknown-freebsd - * i686-unknown-linux-gnu - * i686-unknown-linux-musl -@@ -58,7 +57,6 @@ Tier 1: - * mips64-unknown-linux-gnuabi64 - * mips64el-unknown-linux-gnuabi64 - * mipsel-unknown-linux-gnu -- * powerpc64-unknown-linux-gnu - * powerpc64le-unknown-linux-gnu - * x86_64-apple-darwin - * x86_64-unknown-freebsd -@@ -74,6 +72,7 @@ Tier 2: - * armv7-linux-androideabi - * armv7s-apple-ios - * i386-apple-ios -+ * i686-apple-darwin - * i686-linux-android - * powerpc-unknown-linux-gnu - * s390x-unknown-linux-gnu -@@ -81,21 +80,20 @@ Tier 2: - * x86_64-linux-android - * x86_64-unknown-netbsd - -+Tier 3: -+ * x86_64-fuchsia -+ * x86_64-unknown-redox -+ * x86_64-unknown-linux-gnux32 -+ - ## Usage - --`nix` requires Rust 1.31.0 or newer. -+`nix` requires Rust 1.40.0 or newer. - --To use `nix`, first add this to your `Cargo.toml`: -+To use `nix`, add this to your `Cargo.toml`: - - ```toml - [dependencies] --nix = "0.15.0" --``` -- --Then, add this to your crate root: -- --```rust,ignore --extern crate nix; -+nix = "0.20.2" - ``` - - ## Contributing -diff --git a/third_party/rust/nix/src/dir.rs b/third_party/rust/nix/src/dir.rs -index 1820b5330ff60..7d4ab82f79e0d 100644 ---- a/third_party/rust/nix/src/dir.rs -+++ b/third_party/rust/nix/src/dir.rs -@@ -1,10 +1,10 @@ --use {Error, NixPath, Result}; --use errno::Errno; --use fcntl::{self, OFlag}; --use libc; -+use crate::{Error, NixPath, Result}; -+use crate::errno::Errno; -+use crate::fcntl::{self, OFlag}; - use std::os::unix::io::{AsRawFd, IntoRawFd, RawFd}; --use std::{ffi, ptr}; --use sys; -+use std::ptr; -+use std::ffi; -+use crate::sys; - - #[cfg(target_os = "linux")] - use libc::{dirent64 as dirent, readdir64_r as readdir_r}; -@@ -25,7 +25,7 @@ use libc::{dirent, readdir_r}; - /// * returns entries for `.` (current directory) and `..` (parent directory). - /// * returns entries' names as a `CStr` (no allocation or conversion beyond whatever libc - /// does). --#[derive(Clone, Debug, Eq, Hash, PartialEq)] -+#[derive(Debug, Eq, Hash, PartialEq)] - pub struct Dir( - ptr::NonNull<libc::DIR> - ); -@@ -85,7 +85,32 @@ impl AsRawFd for Dir { - - impl Drop for Dir { - fn drop(&mut self) { -- unsafe { libc::closedir(self.0.as_ptr()) }; -+ let e = Errno::result(unsafe { libc::closedir(self.0.as_ptr()) }); -+ if !std::thread::panicking() && e == Err(Error::Sys(Errno::EBADF)) { -+ panic!("Closing an invalid file descriptor!"); -+ }; -+ } -+} -+ -+fn next(dir: &mut Dir) -> Option<Result<Entry>> { -+ unsafe { -+ // Note: POSIX specifies that portable applications should dynamically allocate a -+ // buffer with room for a `d_name` field of size `pathconf(..., _PC_NAME_MAX)` plus 1 -+ // for the NUL byte. It doesn't look like the std library does this; it just uses -+ // fixed-sized buffers (and libc's dirent seems to be sized so this is appropriate). -+ // Probably fine here too then. -+ let mut ent = std::mem::MaybeUninit::<dirent>::uninit(); -+ let mut result = ptr::null_mut(); -+ if let Err(e) = Errno::result( -+ readdir_r(dir.0.as_ptr(), ent.as_mut_ptr(), &mut result)) -+ { -+ return Some(Err(e)); -+ } -+ if result.is_null() { -+ return None; -+ } -+ assert_eq!(result, ent.as_mut_ptr()); -+ Some(Ok(Entry(ent.assume_init()))) - } - } - -@@ -96,23 +121,7 @@ impl<'d> Iterator for Iter<'d> { - type Item = Result<Entry>; - - fn next(&mut self) -> Option<Self::Item> { -- unsafe { -- // Note: POSIX specifies that portable applications should dynamically allocate a -- // buffer with room for a `d_name` field of size `pathconf(..., _PC_NAME_MAX)` plus 1 -- // for the NUL byte. It doesn't look like the std library does this; it just uses -- // fixed-sized buffers (and libc's dirent seems to be sized so this is appropriate). -- // Probably fine here too then. -- let mut ent: Entry = Entry(::std::mem::uninitialized()); -- let mut result = ptr::null_mut(); -- if let Err(e) = Errno::result(readdir_r((self.0).0.as_ptr(), &mut ent.0, &mut result)) { -- return Some(Err(e)); -- } -- if result == ptr::null_mut() { -- return None; -- } -- assert_eq!(result, &mut ent.0 as *mut dirent); -- return Some(Ok(ent)); -- } -+ next(self.0) - } - } - -@@ -122,10 +131,48 @@ impl<'d> Drop for Iter<'d> { - } - } - -+/// The return type of [Dir::into_iter] -+#[derive(Debug, Eq, Hash, PartialEq)] -+pub struct OwningIter(Dir); -+ -+impl Iterator for OwningIter { -+ type Item = Result<Entry>; -+ -+ fn next(&mut self) -> Option<Self::Item> { -+ next(&mut self.0) -+ } -+} -+ -+impl IntoIterator for Dir { -+ type Item = Result<Entry>; -+ type IntoIter = OwningIter; -+ -+ /// Creates a owning iterator, that is, one that takes ownership of the -+ /// `Dir`. The `Dir` cannot be used after calling this. This can be useful -+ /// when you have a function that both creates a `Dir` instance and returns -+ /// an `Iterator`. -+ /// -+ /// Example: -+ /// -+ /// ``` -+ /// use nix::{dir::Dir, fcntl::OFlag, sys::stat::Mode}; -+ /// use std::{iter::Iterator, string::String}; -+ /// -+ /// fn ls_upper(dirname: &str) -> impl Iterator<Item=String> { -+ /// let d = Dir::open(dirname, OFlag::O_DIRECTORY, Mode::S_IXUSR).unwrap(); -+ /// d.into_iter().map(|x| x.unwrap().file_name().as_ref().to_string_lossy().to_ascii_uppercase()) -+ /// } -+ /// ``` -+ fn into_iter(self) -> Self::IntoIter { -+ OwningIter(self) -+ } -+} -+ - /// A directory entry, similar to `std::fs::DirEntry`. - /// - /// Note that unlike the std version, this may represent the `.` or `..` entries. - #[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)] -+#[repr(transparent)] - pub struct Entry(dirent); - - #[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)] -@@ -165,7 +212,7 @@ impl Entry { - target_os = "macos", - target_os = "solaris")))] - pub fn ino(&self) -> u64 { -- self.0.d_fileno as u64 -+ u64::from(self.0.d_fileno) - } - - /// Returns the bare file name of this directory entry without any other leading path component. -diff --git a/third_party/rust/nix/src/env.rs b/third_party/rust/nix/src/env.rs -new file mode 100644 -index 0000000000000..f144dfedd0c1a ---- /dev/null -+++ b/third_party/rust/nix/src/env.rs -@@ -0,0 +1,53 @@ -+use cfg_if::cfg_if; -+use crate::{Error, Result}; -+ -+/// Clear the environment of all name-value pairs. -+/// -+/// On platforms where libc provides `clearenv()`, it will be used. libc's -+/// `clearenv()` is documented to return an error code but not set errno; if the -+/// return value indicates a failure, this function will return -+/// `Error::UnsupportedOperation`. -+/// -+/// On platforms where libc does not provide `clearenv()`, a fallback -+/// implementation will be used that iterates over all environment variables and -+/// removes them one-by-one. -+/// -+/// # Safety -+/// -+/// This function is not threadsafe and can cause undefined behavior in -+/// combination with `std::env` or other program components that access the -+/// environment. See, for example, the discussion on `std::env::remove_var`; this -+/// function is a case of an "inherently unsafe non-threadsafe API" dealing with -+/// the environment. -+/// -+/// The caller must ensure no other threads access the process environment while -+/// this function executes and that no raw pointers to an element of libc's -+/// `environ` is currently held. The latter is not an issue if the only other -+/// environment access in the program is via `std::env`, but the requirement on -+/// thread safety must still be upheld. -+pub unsafe fn clearenv() -> Result<()> { -+ let ret; -+ cfg_if! { -+ if #[cfg(any(target_os = "fuchsia", -+ target_os = "wasi", -+ target_env = "wasi", -+ target_env = "uclibc", -+ target_os = "linux", -+ target_os = "android", -+ target_os = "emscripten"))] { -+ ret = libc::clearenv(); -+ } else { -+ use std::env; -+ for (name, _) in env::vars_os() { -+ env::remove_var(name); -+ } -+ ret = 0; -+ } -+ } -+ -+ if ret == 0 { -+ Ok(()) -+ } else { -+ Err(Error::UnsupportedOperation) -+ } -+} -diff --git a/third_party/rust/nix/src/errno.rs b/third_party/rust/nix/src/errno.rs -index 6a2447bc52675..e5c709252025c 100644 ---- a/third_party/rust/nix/src/errno.rs -+++ b/third_party/rust/nix/src/errno.rs -@@ -1,8 +1,7 @@ --#[cfg(not(target_os = "dragonfly"))] --use libc; -+use cfg_if::cfg_if; - use libc::{c_int, c_void}; - use std::{fmt, io, error}; --use {Error, Result}; -+use crate::{Error, Result}; - - pub use self::consts::*; - -@@ -13,32 +12,16 @@ cfg_if! { - unsafe fn errno_location() -> *mut c_int { - libc::__error() - } -- } else if #[cfg(target_os = "dragonfly")] { -- // DragonFly uses a thread-local errno variable, but #[thread_local] is -- // feature-gated and not available in stable Rust as of this writing -- // (Rust 1.21.0). We have to use a C extension to access it -- // (src/errno_dragonfly.c). -- // -- // Tracking issue for `thread_local` stabilization: -- // -- // https://github.com/rust-lang/rust/issues/29594 -- // -- // Once this becomes stable, we can remove build.rs, -- // src/errno_dragonfly.c, and use: -- // -- // extern { #[thread_local] static errno: c_int; } -- // -- #[link(name="errno_dragonfly", kind="static")] -- extern { -- pub fn errno_location() -> *mut c_int; -- } - } else if #[cfg(any(target_os = "android", - target_os = "netbsd", - target_os = "openbsd"))] { - unsafe fn errno_location() -> *mut c_int { - libc::__errno() - } -- } else if #[cfg(target_os = "linux")] { -+ } else if #[cfg(any(target_os = "linux", -+ target_os = "redox", -+ target_os = "dragonfly", -+ target_os = "fuchsia"))] { - unsafe fn errno_location() -> *mut c_int { - libc::__errno_location() - } -@@ -46,8 +29,11 @@ cfg_if! { - } - - /// Sets the platform-specific errno to no-error --unsafe fn clear() -> () { -- *errno_location() = 0; -+fn clear() { -+ // Safe because errno is a thread-local variable -+ unsafe { -+ *errno_location() = 0; -+ } - } - - /// Returns the platform-specific value of errno -@@ -70,7 +56,7 @@ impl Errno { - from_i32(err) - } - -- pub unsafe fn clear() -> () { -+ pub fn clear() { - clear() - } - -@@ -111,11 +97,7 @@ impl ErrnoSentinel for libc::sighandler_t { - fn sentinel() -> Self { libc::SIG_ERR } - } - --impl error::Error for Errno { -- fn description(&self) -> &str { -- self.desc() -- } --} -+impl error::Error for Errno {} - - impl fmt::Display for Errno { - fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -@@ -207,200 +189,263 @@ fn desc(errno: Errno) -> &'static str { - EHOSTDOWN => "Host is down", - EHOSTUNREACH => "No route to host", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ECHRNG => "Channel number out of range", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EL2NSYNC => "Level 2 not synchronized", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EL3HLT => "Level 3 halted", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EL3RST => "Level 3 reset", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ELNRNG => "Link number out of range", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EUNATCH => "Protocol driver not attached", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ENOCSI => "No CSI structure available", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EL2HLT => "Level 2 halted", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EBADE => "Invalid exchange", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EBADR => "Invalid request descriptor", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EXFULL => "Exchange full", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ENOANO => "No anode", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EBADRQC => "Invalid request code", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EBADSLT => "Invalid slot", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EBFONT => "Bad font file format", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ENOSTR => "Device not a stream", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ENODATA => "No data available", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ETIME => "Timer expired", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ENOSR => "Out of streams resources", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ENONET => "Machine is not on the network", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ENOPKG => "Package not installed", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EREMOTE => "Object is remote", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ENOLINK => "Link has been severed", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EADV => "Advertise error", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ESRMNT => "Srmount error", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ECOMM => "Communication error on send", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EPROTO => "Protocol error", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EMULTIHOP => "Multihop attempted", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EDOTDOT => "RFS specific error", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EBADMSG => "Not a data message", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EOVERFLOW => "Value too large for defined data type", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ENOTUNIQ => "Name not unique on network", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EBADFD => "File descriptor in bad state", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EREMCHG => "Remote address changed", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ELIBACC => "Can not access a needed shared library", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ELIBBAD => "Accessing a corrupted shared library", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ELIBSCN => ".lib section in a.out corrupted", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ELIBMAX => "Attempting to link in too many shared libraries", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ELIBEXEC => "Cannot exec a shared library directly", - -- #[cfg(any(target_os = "linux", target_os = "android", target_os = "openbsd"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia", target_os = "openbsd"))] - EILSEQ => "Illegal byte sequence", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ERESTART => "Interrupted system call should be restarted", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ESTRPIPE => "Streams pipe error", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EUSERS => "Too many users", - -- #[cfg(any(target_os = "linux", target_os = "android", target_os = "netbsd"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia", target_os = "netbsd", -+ target_os = "redox"))] - EOPNOTSUPP => "Operation not supported on transport endpoint", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ESTALE => "Stale file handle", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EUCLEAN => "Structure needs cleaning", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ENOTNAM => "Not a XENIX named type file", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ENAVAIL => "No XENIX semaphores available", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EISNAM => "Is a named type file", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EREMOTEIO => "Remote I/O error", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EDQUOT => "Quota exceeded", - - #[cfg(any(target_os = "linux", target_os = "android", -- target_os = "openbsd", target_os = "dragonfly"))] -+ target_os = "fuchsia", target_os = "openbsd", -+ target_os = "dragonfly"))] - ENOMEDIUM => "No medium found", - -- #[cfg(any(target_os = "linux", target_os = "android", target_os = "openbsd"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia", target_os = "openbsd"))] - EMEDIUMTYPE => "Wrong medium type", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ECANCELED => "Operation canceled", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ENOKEY => "Required key not available", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EKEYEXPIRED => "Key has expired", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EKEYREVOKED => "Key has been revoked", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EKEYREJECTED => "Key was rejected by service", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - EOWNERDEAD => "Owner died", - -- #[cfg(any(target_os = "linux", target_os = "android"))] -+ #[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - ENOTRECOVERABLE => "State not recoverable", - -- #[cfg(all(target_os = "linux", not(target_arch="mips")))] -+ #[cfg(any(all(target_os = "linux", not(target_arch="mips")), -+ target_os = "fuchsia"))] - ERFKILL => "Operation not possible due to RF-kill", - -- #[cfg(all(target_os = "linux", not(target_arch="mips")))] -+ #[cfg(any(all(target_os = "linux", not(target_arch="mips")), -+ target_os = "fuchsia"))] - EHWPOISON => "Memory page has hardware error", - - #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] - EDOOFUS => "Programming error", - -- #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly", target_os = "redox"))] - EMULTIHOP => "Multihop attempted", - -- #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly", target_os = "redox"))] - ENOLINK => "Link has been severed", - - #[cfg(target_os = "freebsd")] -@@ -416,12 +461,13 @@ fn desc(errno: Errno) -> &'static str { - - #[cfg(any(target_os = "macos", target_os = "freebsd", - target_os = "dragonfly", target_os = "ios", -- target_os = "openbsd", target_os = "netbsd"))] -+ target_os = "openbsd", target_os = "netbsd", -+ target_os = "redox"))] - EOVERFLOW => "Value too large to be stored in data type", - - #[cfg(any(target_os = "macos", target_os = "freebsd", - target_os = "dragonfly", target_os = "ios", -- target_os = "netbsd"))] -+ target_os = "netbsd", target_os = "redox"))] - EILSEQ => "Illegal byte sequence", - - #[cfg(any(target_os = "macos", target_os = "freebsd", -@@ -431,12 +477,14 @@ fn desc(errno: Errno) -> &'static str { - - #[cfg(any(target_os = "macos", target_os = "freebsd", - target_os = "dragonfly", target_os = "ios", -- target_os = "openbsd", target_os = "netbsd"))] -+ target_os = "openbsd", target_os = "netbsd", -+ target_os = "redox"))] - EBADMSG => "Bad message", - - #[cfg(any(target_os = "macos", target_os = "freebsd", - target_os = "dragonfly", target_os = "ios", -- target_os = "openbsd", target_os = "netbsd"))] -+ target_os = "openbsd", target_os = "netbsd", -+ target_os = "redox"))] - EPROTO => "Protocol error", - - #[cfg(any(target_os = "macos", target_os = "freebsd", -@@ -459,22 +507,26 @@ fn desc(errno: Errno) -> &'static str { - - #[cfg(any(target_os = "macos", target_os = "freebsd", - target_os = "dragonfly", target_os = "ios", -- target_os = "openbsd", target_os = "netbsd"))] -+ target_os = "openbsd", target_os = "netbsd", -+ target_os = "redox"))] - EUSERS => "Too many users", - - #[cfg(any(target_os = "macos", target_os = "freebsd", - target_os = "dragonfly", target_os = "ios", -- target_os = "openbsd", target_os = "netbsd"))] -+ target_os = "openbsd", target_os = "netbsd", -+ target_os = "redox"))] - EDQUOT => "Disc quota exceeded", - - #[cfg(any(target_os = "macos", target_os = "freebsd", - target_os = "dragonfly", target_os = "ios", -- target_os = "openbsd", target_os = "netbsd"))] -+ target_os = "openbsd", target_os = "netbsd", -+ target_os = "redox"))] - ESTALE => "Stale NFS file handle", - - #[cfg(any(target_os = "macos", target_os = "freebsd", - target_os = "dragonfly", target_os = "ios", -- target_os = "openbsd", target_os = "netbsd"))] -+ target_os = "openbsd", target_os = "netbsd", -+ target_os = "redox"))] - EREMOTE => "Too many levels of remote in path", - - #[cfg(any(target_os = "macos", target_os = "freebsd", -@@ -514,7 +566,8 @@ fn desc(errno: Errno) -> &'static str { - - #[cfg(any(target_os = "macos", target_os = "freebsd", - target_os = "dragonfly", target_os = "ios", -- target_os = "openbsd", target_os = "netbsd"))] -+ target_os = "openbsd", target_os = "netbsd", -+ target_os = "redox"))] - ECANCELED => "Operation canceled", - - #[cfg(any(target_os = "macos", target_os = "ios"))] -@@ -538,19 +591,23 @@ fn desc(errno: Errno) -> &'static str { - #[cfg(any(target_os = "macos", target_os = "ios", target_os = "netbsd"))] - EMULTIHOP => "Reserved", - -- #[cfg(any(target_os = "macos", target_os = "ios", target_os = "netbsd"))] -+ #[cfg(any(target_os = "macos", target_os = "ios", -+ target_os = "netbsd", target_os = "redox"))] - ENODATA => "No message available on STREAM", - - #[cfg(any(target_os = "macos", target_os = "ios", target_os = "netbsd"))] - ENOLINK => "Reserved", - -- #[cfg(any(target_os = "macos", target_os = "ios", target_os = "netbsd"))] -+ #[cfg(any(target_os = "macos", target_os = "ios", -+ target_os = "netbsd", target_os = "redox"))] - ENOSR => "No STREAM resources", - -- #[cfg(any(target_os = "macos", target_os = "ios", target_os = "netbsd"))] -+ #[cfg(any(target_os = "macos", target_os = "ios", -+ target_os = "netbsd", target_os = "redox"))] - ENOSTR => "Not a STREAM", - -- #[cfg(any(target_os = "macos", target_os = "ios", target_os = "netbsd"))] -+ #[cfg(any(target_os = "macos", target_os = "ios", -+ target_os = "netbsd", target_os = "redox"))] - ETIME => "STREAM ioctl timeout", - - #[cfg(any(target_os = "macos", target_os = "ios"))] -@@ -573,10 +630,9 @@ fn desc(errno: Errno) -> &'static str { - } - } - --#[cfg(any(target_os = "linux", target_os = "android"))] -+#[cfg(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia"))] - mod consts { -- use libc; -- - #[derive(Clone, Copy, Debug, Eq, PartialEq)] - #[repr(i32)] - pub enum Errno { -@@ -864,8 +920,6 @@ mod consts { - - #[cfg(any(target_os = "macos", target_os = "ios"))] - mod consts { -- use libc; -- - #[derive(Clone, Copy, Debug, Eq, PartialEq)] - #[repr(i32)] - pub enum Errno { -@@ -1101,8 +1155,6 @@ mod consts { - - #[cfg(target_os = "freebsd")] - mod consts { -- use libc; -- - #[derive(Clone, Copy, Debug, Eq, PartialEq)] - #[repr(i32)] - pub enum Errno { -@@ -1319,8 +1371,6 @@ mod consts { - - #[cfg(target_os = "dragonfly")] - mod consts { -- use libc; -- - #[derive(Clone, Copy, Debug, Eq, PartialEq)] - #[repr(i32)] - pub enum Errno { -@@ -1534,8 +1584,6 @@ mod consts { - - #[cfg(target_os = "openbsd")] - mod consts { -- use libc; -- - #[derive(Clone, Copy, Debug, Eq, PartialEq)] - #[repr(i32)] - pub enum Errno { -@@ -1748,8 +1796,6 @@ mod consts { - - #[cfg(target_os = "netbsd")] - mod consts { -- use libc; -- - #[derive(Clone, Copy, Debug, Eq, PartialEq)] - #[repr(i32)] - pub enum Errno { -@@ -1961,3 +2007,195 @@ mod consts { - } - } - } -+ -+#[cfg(target_os = "redox")] -+mod consts { -+ #[derive(Clone, Copy, Debug, Eq, PartialEq)] -+ #[repr(i32)] -+ pub enum Errno { -+ UnknownErrno = 0, -+ EPERM = libc::EPERM, -+ ENOENT = libc::ENOENT, -+ ESRCH = libc::ESRCH, -+ EINTR = libc::EINTR, -+ EIO = libc::EIO, -+ ENXIO = libc::ENXIO, -+ E2BIG = libc::E2BIG, -+ ENOEXEC = libc::ENOEXEC, -+ EBADF = libc::EBADF, -+ ECHILD = libc::ECHILD, -+ EDEADLK = libc::EDEADLK, -+ ENOMEM = libc::ENOMEM, -+ EACCES = libc::EACCES, -+ EFAULT = libc::EFAULT, -+ ENOTBLK = libc::ENOTBLK, -+ EBUSY = libc::EBUSY, -+ EEXIST = libc::EEXIST, -+ EXDEV = libc::EXDEV, -+ ENODEV = libc::ENODEV, -+ ENOTDIR = libc::ENOTDIR, -+ EISDIR = libc::EISDIR, -+ EINVAL = libc::EINVAL, -+ ENFILE = libc::ENFILE, -+ EMFILE = libc::EMFILE, -+ ENOTTY = libc::ENOTTY, -+ ETXTBSY = libc::ETXTBSY, -+ EFBIG = libc::EFBIG, -+ ENOSPC = libc::ENOSPC, -+ ESPIPE = libc::ESPIPE, -+ EROFS = libc::EROFS, -+ EMLINK = libc::EMLINK, -+ EPIPE = libc::EPIPE, -+ EDOM = libc::EDOM, -+ ERANGE = libc::ERANGE, -+ EAGAIN = libc::EAGAIN, -+ EINPROGRESS = libc::EINPROGRESS, -+ EALREADY = libc::EALREADY, -+ ENOTSOCK = libc::ENOTSOCK, -+ EDESTADDRREQ = libc::EDESTADDRREQ, -+ EMSGSIZE = libc::EMSGSIZE, -+ EPROTOTYPE = libc::EPROTOTYPE, -+ ENOPROTOOPT = libc::ENOPROTOOPT, -+ EPROTONOSUPPORT = libc::EPROTONOSUPPORT, -+ ESOCKTNOSUPPORT = libc::ESOCKTNOSUPPORT, -+ EOPNOTSUPP = libc::EOPNOTSUPP, -+ EPFNOSUPPORT = libc::EPFNOSUPPORT, -+ EAFNOSUPPORT = libc::EAFNOSUPPORT, -+ EADDRINUSE = libc::EADDRINUSE, -+ EADDRNOTAVAIL = libc::EADDRNOTAVAIL, -+ ENETDOWN = libc::ENETDOWN, -+ ENETUNREACH = libc::ENETUNREACH, -+ ENETRESET = libc::ENETRESET, -+ ECONNABORTED = libc::ECONNABORTED, -+ ECONNRESET = libc::ECONNRESET, -+ ENOBUFS = libc::ENOBUFS, -+ EISCONN = libc::EISCONN, -+ ENOTCONN = libc::ENOTCONN, -+ ESHUTDOWN = libc::ESHUTDOWN, -+ ETOOMANYREFS = libc::ETOOMANYREFS, -+ ETIMEDOUT = libc::ETIMEDOUT, -+ ECONNREFUSED = libc::ECONNREFUSED, -+ ELOOP = libc::ELOOP, -+ ENAMETOOLONG = libc::ENAMETOOLONG, -+ EHOSTDOWN = libc::EHOSTDOWN, -+ EHOSTUNREACH = libc::EHOSTUNREACH, -+ ENOTEMPTY = libc::ENOTEMPTY, -+ EUSERS = libc::EUSERS, -+ EDQUOT = libc::EDQUOT, -+ ESTALE = libc::ESTALE, -+ EREMOTE = libc::EREMOTE, -+ ENOLCK = libc::ENOLCK, -+ ENOSYS = libc::ENOSYS, -+ EIDRM = libc::EIDRM, -+ ENOMSG = libc::ENOMSG, -+ EOVERFLOW = libc::EOVERFLOW, -+ EILSEQ = libc::EILSEQ, -+ ECANCELED = libc::ECANCELED, -+ EBADMSG = libc::EBADMSG, -+ ENODATA = libc::ENODATA, -+ ENOSR = libc::ENOSR, -+ ENOSTR = libc::ENOSTR, -+ ETIME = libc::ETIME, -+ EMULTIHOP = libc::EMULTIHOP, -+ ENOLINK = libc::ENOLINK, -+ EPROTO = libc::EPROTO, -+ } -+ -+ pub const ELAST: Errno = Errno::UnknownErrno; -+ pub const EWOULDBLOCK: Errno = Errno::EAGAIN; -+ -+ pub const EL2NSYNC: Errno = Errno::UnknownErrno; -+ -+ pub fn from_i32(e: i32) -> Errno { -+ use self::Errno::*; -+ -+ match e { -+ libc::EPERM => EPERM, -+ libc::ENOENT => ENOENT, -+ libc::ESRCH => ESRCH, -+ libc::EINTR => EINTR, -+ libc::EIO => EIO, -+ libc::ENXIO => ENXIO, -+ libc::E2BIG => E2BIG, -+ libc::ENOEXEC => ENOEXEC, -+ libc::EBADF => EBADF, -+ libc::ECHILD => ECHILD, -+ libc::EDEADLK => EDEADLK, -+ libc::ENOMEM => ENOMEM, -+ libc::EACCES => EACCES, -+ libc::EFAULT => EFAULT, -+ libc::ENOTBLK => ENOTBLK, -+ libc::EBUSY => EBUSY, -+ libc::EEXIST => EEXIST, -+ libc::EXDEV => EXDEV, -+ libc::ENODEV => ENODEV, -+ libc::ENOTDIR => ENOTDIR, -+ libc::EISDIR => EISDIR, -+ libc::EINVAL => EINVAL, -+ libc::ENFILE => ENFILE, -+ libc::EMFILE => EMFILE, -+ libc::ENOTTY => ENOTTY, -+ libc::ETXTBSY => ETXTBSY, -+ libc::EFBIG => EFBIG, -+ libc::ENOSPC => ENOSPC, -+ libc::ESPIPE => ESPIPE, -+ libc::EROFS => EROFS, -+ libc::EMLINK => EMLINK, -+ libc::EPIPE => EPIPE, -+ libc::EDOM => EDOM, -+ libc::ERANGE => ERANGE, -+ libc::EAGAIN => EAGAIN, -+ libc::EINPROGRESS => EINPROGRESS, -+ libc::EALREADY => EALREADY, -+ libc::ENOTSOCK => ENOTSOCK, -+ libc::EDESTADDRREQ => EDESTADDRREQ, -+ libc::EMSGSIZE => EMSGSIZE, -+ libc::EPROTOTYPE => EPROTOTYPE, -+ libc::ENOPROTOOPT => ENOPROTOOPT, -+ libc::EPROTONOSUPPORT => EPROTONOSUPPORT, -+ libc::ESOCKTNOSUPPORT => ESOCKTNOSUPPORT, -+ libc::EOPNOTSUPP => EOPNOTSUPP, -+ libc::EPFNOSUPPORT => EPFNOSUPPORT, -+ libc::EAFNOSUPPORT => EAFNOSUPPORT, -+ libc::EADDRINUSE => EADDRINUSE, -+ libc::EADDRNOTAVAIL => EADDRNOTAVAIL, -+ libc::ENETDOWN => ENETDOWN, -+ libc::ENETUNREACH => ENETUNREACH, -+ libc::ENETRESET => ENETRESET, -+ libc::ECONNABORTED => ECONNABORTED, -+ libc::ECONNRESET => ECONNRESET, -+ libc::ENOBUFS => ENOBUFS, -+ libc::EISCONN => EISCONN, -+ libc::ENOTCONN => ENOTCONN, -+ libc::ESHUTDOWN => ESHUTDOWN, -+ libc::ETOOMANYREFS => ETOOMANYREFS, -+ libc::ETIMEDOUT => ETIMEDOUT, -+ libc::ECONNREFUSED => ECONNREFUSED, -+ libc::ELOOP => ELOOP, -+ libc::ENAMETOOLONG => ENAMETOOLONG, -+ libc::EHOSTDOWN => EHOSTDOWN, -+ libc::EHOSTUNREACH => EHOSTUNREACH, -+ libc::ENOTEMPTY => ENOTEMPTY, -+ libc::EUSERS => EUSERS, -+ libc::EDQUOT => EDQUOT, -+ libc::ESTALE => ESTALE, -+ libc::EREMOTE => EREMOTE, -+ libc::ENOLCK => ENOLCK, -+ libc::ENOSYS => ENOSYS, -+ libc::EIDRM => EIDRM, -+ libc::ENOMSG => ENOMSG, -+ libc::EOVERFLOW => EOVERFLOW, -+ libc::EILSEQ => EILSEQ, -+ libc::ECANCELED => ECANCELED, -+ libc::EBADMSG => EBADMSG, -+ libc::ENODATA => ENODATA, -+ libc::ENOSR => ENOSR, -+ libc::ENOSTR => ENOSTR, -+ libc::ETIME => ETIME, -+ libc::EMULTIHOP => EMULTIHOP, -+ libc::ENOLINK => ENOLINK, -+ libc::EPROTO => EPROTO, -+ _ => UnknownErrno, -+ } -+ } -+} -diff --git a/third_party/rust/nix/src/fcntl.rs b/third_party/rust/nix/src/fcntl.rs -index be6ee0f73a8be..d2242dacd61b0 100644 ---- a/third_party/rust/nix/src/fcntl.rs -+++ b/third_party/rust/nix/src/fcntl.rs -@@ -1,29 +1,34 @@ --use {Error, Result, NixPath}; --use errno::Errno; --use libc::{self, c_int, c_uint, c_char, size_t, ssize_t}; --use sys::stat::Mode; -+use crate::errno::Errno; -+use libc::{self, c_char, c_int, c_uint, size_t, ssize_t}; -+use std::ffi::OsString; -+#[cfg(not(target_os = "redox"))] - use std::os::raw; -+use std::os::unix::ffi::OsStringExt; - use std::os::unix::io::RawFd; --use std::ffi::OsStr; --use std::os::unix::ffi::OsStrExt; -+use crate::sys::stat::Mode; -+use crate::{NixPath, Result}; - - #[cfg(any(target_os = "android", target_os = "linux"))] - use std::ptr; // For splice and copy_file_range - #[cfg(any(target_os = "android", target_os = "linux"))] --use sys::uio::IoVec; // For vmsplice -- --#[cfg(any(target_os = "linux", -- target_os = "android", -- target_os = "emscripten", -- target_os = "fuchsia", -- any(target_os = "wasi", target_env = "wasi"), -- target_env = "uclibc", -- target_env = "freebsd"))] -+use crate::sys::uio::IoVec; // For vmsplice -+ -+#[cfg(any( -+ target_os = "linux", -+ target_os = "android", -+ target_os = "emscripten", -+ target_os = "fuchsia", -+ any(target_os = "wasi", target_env = "wasi"), -+ target_env = "uclibc", -+ target_os = "freebsd" -+))] - pub use self::posix_fadvise::*; - --libc_bitflags!{ -+#[cfg(not(target_os = "redox"))] -+libc_bitflags! { - pub struct AtFlags: c_int { - AT_REMOVEDIR; -+ AT_SYMLINK_FOLLOW; - AT_SYMLINK_NOFOLLOW; - #[cfg(any(target_os = "android", target_os = "linux"))] - AT_NO_AUTOMOUNT; -@@ -78,7 +83,8 @@ libc_bitflags!( - target_os = "ios", - target_os = "macos", - target_os = "netbsd", -- target_os = "openbsd"))] -+ target_os = "openbsd", -+ target_os = "redox"))] - O_EXLOCK; - /// Same as `O_SYNC`. - #[cfg(any(target_os = "dragonfly", -@@ -87,7 +93,8 @@ libc_bitflags!( - all(target_os = "linux", not(target_env = "musl")), - target_os = "macos", - target_os = "netbsd", -- target_os = "openbsd"))] -+ target_os = "openbsd", -+ target_os = "redox"))] - O_FSYNC; - /// Allow files whose sizes can't be represented in an `off_t` to be opened. - #[cfg(any(target_os = "android", target_os = "linux"))] -@@ -96,8 +103,10 @@ libc_bitflags!( - #[cfg(any(target_os = "android", target_os = "linux"))] - O_NOATIME; - /// Don't attach the device as the process' controlling terminal. -+ #[cfg(not(target_os = "redox"))] - O_NOCTTY; - /// Same as `O_NONBLOCK`. -+ #[cfg(not(target_os = "redox"))] - O_NDELAY; - /// `open()` will fail if the given path is a symbolic link. - O_NOFOLLOW; -@@ -109,7 +118,7 @@ libc_bitflags!( - /// Obtain a file descriptor for low-level access. - /// - /// The file itself is not opened and other file operations will fail. -- #[cfg(any(target_os = "android", target_os = "linux"))] -+ #[cfg(any(target_os = "android", target_os = "linux", target_os = "redox"))] - O_PATH; - /// Only allow reading. - /// -@@ -131,9 +140,11 @@ libc_bitflags!( - target_os = "ios", - target_os = "macos", - target_os = "netbsd", -- target_os = "openbsd"))] -+ target_os = "openbsd", -+ target_os = "redox"))] - O_SHLOCK; - /// Implicitly follow each `write()` with an `fsync()`. -+ #[cfg(not(target_os = "redox"))] - O_SYNC; - /// Create an unnamed temporary file. - #[cfg(any(target_os = "android", target_os = "linux"))] -@@ -150,6 +161,8 @@ libc_bitflags!( - } - ); - -+// The conversion is not identical on all operating systems. -+#[allow(clippy::identity_conversion)] - pub fn open<P: ?Sized + NixPath>(path: &P, oflag: OFlag, mode: Mode) -> Result<RawFd> { - let fd = path.with_nix_path(|cstr| { - unsafe { libc::open(cstr.as_ptr(), oflag.bits(), mode.bits() as c_uint) } -@@ -158,56 +171,125 @@ pub fn open<P: ?Sized + NixPath>(path: &P, oflag: OFlag, mode: Mode) -> Result<R - Errno::result(fd) - } - --pub fn openat<P: ?Sized + NixPath>(dirfd: RawFd, path: &P, oflag: OFlag, mode: Mode) -> Result<RawFd> { -+// The conversion is not identical on all operating systems. -+#[allow(clippy::identity_conversion)] -+#[cfg(not(target_os = "redox"))] -+pub fn openat<P: ?Sized + NixPath>( -+ dirfd: RawFd, -+ path: &P, -+ oflag: OFlag, -+ mode: Mode, -+) -> Result<RawFd> { - let fd = path.with_nix_path(|cstr| { - unsafe { libc::openat(dirfd, cstr.as_ptr(), oflag.bits(), mode.bits() as c_uint) } - })?; - Errno::result(fd) - } - --pub fn renameat<P1: ?Sized + NixPath, P2: ?Sized + NixPath>(old_dirfd: Option<RawFd>, old_path: &P1, -- new_dirfd: Option<RawFd>, new_path: &P2) -- -> Result<()> { -+#[cfg(not(target_os = "redox"))] -+pub fn renameat<P1: ?Sized + NixPath, P2: ?Sized + NixPath>( -+ old_dirfd: Option<RawFd>, -+ old_path: &P1, -+ new_dirfd: Option<RawFd>, -+ new_path: &P2, -+) -> Result<()> { - let res = old_path.with_nix_path(|old_cstr| { - new_path.with_nix_path(|new_cstr| unsafe { -- libc::renameat(at_rawfd(old_dirfd), old_cstr.as_ptr(), -- at_rawfd(new_dirfd), new_cstr.as_ptr()) -+ libc::renameat( -+ at_rawfd(old_dirfd), -+ old_cstr.as_ptr(), -+ at_rawfd(new_dirfd), -+ new_cstr.as_ptr(), -+ ) - }) - })??; - Errno::result(res).map(drop) - } - --fn wrap_readlink_result(buffer: &mut[u8], res: ssize_t) -> Result<&OsStr> { -- match Errno::result(res) { -- Err(err) => Err(err), -- Ok(len) => { -- if (len as usize) >= buffer.len() { -- Err(Error::Sys(Errno::ENAMETOOLONG)) -- } else { -- Ok(OsStr::from_bytes(&buffer[..(len as usize)])) -+fn wrap_readlink_result(mut v: Vec<u8>, len: ssize_t) -> Result<OsString> { -+ unsafe { v.set_len(len as usize) } -+ v.shrink_to_fit(); -+ Ok(OsString::from_vec(v.to_vec())) -+} -+ -+fn readlink_maybe_at<P: ?Sized + NixPath>( -+ dirfd: Option<RawFd>, -+ path: &P, -+ v: &mut Vec<u8>, -+) -> Result<libc::ssize_t> { -+ path.with_nix_path(|cstr| unsafe { -+ match dirfd { -+ #[cfg(target_os = "redox")] -+ Some(_) => unreachable!(), -+ #[cfg(not(target_os = "redox"))] -+ Some(dirfd) => libc::readlinkat( -+ dirfd, -+ cstr.as_ptr(), -+ v.as_mut_ptr() as *mut c_char, -+ v.capacity() as size_t, -+ ), -+ None => libc::readlink( -+ cstr.as_ptr(), -+ v.as_mut_ptr() as *mut c_char, -+ v.capacity() as size_t, -+ ), -+ } -+ }) -+} -+ -+fn inner_readlink<P: ?Sized + NixPath>(dirfd: Option<RawFd>, path: &P) -> Result<OsString> { -+ let mut v = Vec::with_capacity(libc::PATH_MAX as usize); -+ // simple case: result is strictly less than `PATH_MAX` -+ let res = readlink_maybe_at(dirfd, path, &mut v)?; -+ let len = Errno::result(res)?; -+ debug_assert!(len >= 0); -+ if (len as usize) < v.capacity() { -+ return wrap_readlink_result(v, res); -+ } -+ // Uh oh, the result is too long... -+ // Let's try to ask lstat how many bytes to allocate. -+ let reported_size = super::sys::stat::lstat(path) -+ .and_then(|x| Ok(x.st_size)) -+ .unwrap_or(0); -+ let mut try_size = if reported_size > 0 { -+ // Note: even if `lstat`'s apparently valid answer turns out to be -+ // wrong, we will still read the full symlink no matter what. -+ reported_size as usize + 1 -+ } else { -+ // If lstat doesn't cooperate, or reports an error, be a little less -+ // precise. -+ (libc::PATH_MAX as usize).max(128) << 1 -+ }; -+ loop { -+ v.reserve_exact(try_size); -+ let res = readlink_maybe_at(dirfd, path, &mut v)?; -+ let len = Errno::result(res)?; -+ debug_assert!(len >= 0); -+ if (len as usize) < v.capacity() { -+ break wrap_readlink_result(v, res); -+ } else { -+ // Ugh! Still not big enough! -+ match try_size.checked_shl(1) { -+ Some(next_size) => try_size = next_size, -+ // It's absurd that this would happen, but handle it sanely -+ // anyway. -+ None => break Err(super::Error::Sys(Errno::ENAMETOOLONG)), - } - } - } - } - --pub fn readlink<'a, P: ?Sized + NixPath>(path: &P, buffer: &'a mut [u8]) -> Result<&'a OsStr> { -- let res = path.with_nix_path(|cstr| { -- unsafe { libc::readlink(cstr.as_ptr(), buffer.as_mut_ptr() as *mut c_char, buffer.len() as size_t) } -- })?; -- -- wrap_readlink_result(buffer, res) -+pub fn readlink<P: ?Sized + NixPath>(path: &P) -> Result<OsString> { -+ inner_readlink(None, path) - } - -- --pub fn readlinkat<'a, P: ?Sized + NixPath>(dirfd: RawFd, path: &P, buffer: &'a mut [u8]) -> Result<&'a OsStr> { -- let res = path.with_nix_path(|cstr| { -- unsafe { libc::readlinkat(dirfd, cstr.as_ptr(), buffer.as_mut_ptr() as *mut c_char, buffer.len() as size_t) } -- })?; -- -- wrap_readlink_result(buffer, res) -+#[cfg(not(target_os = "redox"))] -+pub fn readlinkat<P: ?Sized + NixPath>(dirfd: RawFd, path: &P) -> Result<OsString> { -+ inner_readlink(Some(dirfd), path) - } - - /// Computes the raw fd consumed by a function of the form `*at`. -+#[cfg(not(target_os = "redox"))] - pub(crate) fn at_rawfd(fd: Option<RawFd>) -> raw::c_int { - match fd { - None => libc::AT_FDCWD, -@@ -238,6 +320,7 @@ libc_bitflags!( - } - ); - -+#[cfg(not(target_os = "redox"))] - #[derive(Debug, Eq, Hash, PartialEq)] - pub enum FcntlArg<'a> { - F_DUPFD(RawFd), -@@ -265,9 +348,19 @@ pub enum FcntlArg<'a> { - F_GETPIPE_SZ, - #[cfg(any(target_os = "linux", target_os = "android"))] - F_SETPIPE_SZ(c_int), -- - // TODO: Rest of flags - } -+ -+#[cfg(target_os = "redox")] -+#[derive(Debug, Clone, Copy, Eq, Hash, PartialEq)] -+pub enum FcntlArg { -+ F_DUPFD(RawFd), -+ F_DUPFD_CLOEXEC(RawFd), -+ F_GETFD, -+ F_SETFD(FdFlag), // FD_FLAGS -+ F_GETFL, -+ F_SETFL(OFlag), // O_NONBLOCK -+} - pub use self::FcntlArg::*; - - // TODO: Figure out how to handle value fcntl returns -@@ -280,10 +373,19 @@ pub fn fcntl(fd: RawFd, arg: FcntlArg) -> Result<c_int> { - F_SETFD(flag) => libc::fcntl(fd, libc::F_SETFD, flag.bits()), - F_GETFL => libc::fcntl(fd, libc::F_GETFL), - F_SETFL(flag) => libc::fcntl(fd, libc::F_SETFL, flag.bits()), -+ #[cfg(not(target_os = "redox"))] - F_SETLK(flock) => libc::fcntl(fd, libc::F_SETLK, flock), -+ #[cfg(not(target_os = "redox"))] - F_SETLKW(flock) => libc::fcntl(fd, libc::F_SETLKW, flock), -+ #[cfg(not(target_os = "redox"))] - F_GETLK(flock) => libc::fcntl(fd, libc::F_GETLK, flock), - #[cfg(any(target_os = "android", target_os = "linux"))] -+ F_OFD_SETLK(flock) => libc::fcntl(fd, libc::F_OFD_SETLK, flock), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ F_OFD_SETLKW(flock) => libc::fcntl(fd, libc::F_OFD_SETLKW, flock), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ F_OFD_GETLK(flock) => libc::fcntl(fd, libc::F_OFD_GETLK, flock), -+ #[cfg(any(target_os = "android", target_os = "linux"))] - F_ADD_SEALS(flag) => libc::fcntl(fd, libc::F_ADD_SEALS, flag.bits()), - #[cfg(any(target_os = "android", target_os = "linux"))] - F_GET_SEALS => libc::fcntl(fd, libc::F_GET_SEALS), -@@ -293,8 +395,6 @@ pub fn fcntl(fd: RawFd, arg: FcntlArg) -> Result<c_int> { - F_GETPIPE_SZ => libc::fcntl(fd, libc::F_GETPIPE_SZ), - #[cfg(any(target_os = "linux", target_os = "android"))] - F_SETPIPE_SZ(size) => libc::fcntl(fd, libc::F_SETPIPE_SZ, size), -- #[cfg(any(target_os = "linux", target_os = "android"))] -- _ => unimplemented!() - } - }; - -@@ -311,6 +411,7 @@ pub enum FlockArg { - UnlockNonblock, - } - -+#[cfg(not(target_os = "redox"))] - pub fn flock(fd: RawFd, arg: FlockArg) -> Result<()> { - use self::FlockArg::*; - -@@ -410,9 +511,7 @@ pub fn splice( - .map(|offset| offset as *mut libc::loff_t) - .unwrap_or(ptr::null_mut()); - -- let ret = unsafe { -- libc::splice(fd_in, off_in, fd_out, off_out, len, flags.bits()) -- }; -+ let ret = unsafe { libc::splice(fd_in, off_in, fd_out, off_out, len, flags.bits()) }; - Errno::result(ret).map(|r| r as usize) - } - -@@ -425,7 +524,12 @@ pub fn tee(fd_in: RawFd, fd_out: RawFd, len: usize, flags: SpliceFFlags) -> Resu - #[cfg(any(target_os = "linux", target_os = "android"))] - pub fn vmsplice(fd: RawFd, iov: &[IoVec<&[u8]>], flags: SpliceFFlags) -> Result<usize> { - let ret = unsafe { -- libc::vmsplice(fd, iov.as_ptr() as *const libc::iovec, iov.len(), flags.bits()) -+ libc::vmsplice( -+ fd, -+ iov.as_ptr() as *const libc::iovec, -+ iov.len(), -+ flags.bits(), -+ ) - }; - Errno::result(ret).map(|r| r as usize) - } -@@ -466,23 +570,30 @@ libc_bitflags!( - /// Allows the caller to directly manipulate the allocated disk space for the - /// file referred to by fd. - #[cfg(any(target_os = "linux"))] --pub fn fallocate(fd: RawFd, mode: FallocateFlags, offset: libc::off_t, len: libc::off_t) -> Result<c_int> { -+pub fn fallocate( -+ fd: RawFd, -+ mode: FallocateFlags, -+ offset: libc::off_t, -+ len: libc::off_t, -+) -> Result<()> { - let res = unsafe { libc::fallocate(fd, mode.bits(), offset, len) }; -- Errno::result(res) -+ Errno::result(res).map(drop) - } - --#[cfg(any(target_os = "linux", -- target_os = "android", -- target_os = "emscripten", -- target_os = "fuchsia", -- any(target_os = "wasi", target_env = "wasi"), -- target_env = "uclibc", -- target_env = "freebsd"))] -+#[cfg(any( -+ target_os = "linux", -+ target_os = "android", -+ target_os = "emscripten", -+ target_os = "fuchsia", -+ any(target_os = "wasi", target_env = "wasi"), -+ target_env = "uclibc", -+ target_os = "freebsd" -+))] - mod posix_fadvise { -- use Result; -+ use crate::errno::Errno; - use libc; -- use errno::Errno; - use std::os::unix::io::RawFd; -+ use crate::Result; - - libc_enum! { - #[repr(i32)] -@@ -496,11 +607,30 @@ mod posix_fadvise { - } - } - -- pub fn posix_fadvise(fd: RawFd, -- offset: libc::off_t, -- len: libc::off_t, -- advice: PosixFadviseAdvice) -> Result<libc::c_int> { -+ pub fn posix_fadvise( -+ fd: RawFd, -+ offset: libc::off_t, -+ len: libc::off_t, -+ advice: PosixFadviseAdvice, -+ ) -> Result<libc::c_int> { - let res = unsafe { libc::posix_fadvise(fd, offset, len, advice as libc::c_int) }; - Errno::result(res) - } - } -+ -+#[cfg(any( -+ target_os = "linux", -+ target_os = "android", -+ target_os = "emscripten", -+ target_os = "fuchsia", -+ any(target_os = "wasi", target_env = "wasi"), -+ target_os = "freebsd" -+))] -+pub fn posix_fallocate(fd: RawFd, offset: libc::off_t, len: libc::off_t) -> Result<()> { -+ let res = unsafe { libc::posix_fallocate(fd, offset, len) }; -+ match Errno::result(res) { -+ Err(err) => Err(err), -+ Ok(0) => Ok(()), -+ Ok(errno) => Err(crate::Error::Sys(Errno::from_i32(errno))), -+ } -+} -diff --git a/third_party/rust/nix/src/features.rs b/third_party/rust/nix/src/features.rs -index 76cdfd3a1a6f1..6b1cff5deed1d 100644 ---- a/third_party/rust/nix/src/features.rs -+++ b/third_party/rust/nix/src/features.rs -@@ -3,7 +3,7 @@ pub use self::os::*; - - #[cfg(any(target_os = "linux", target_os = "android"))] - mod os { -- use sys::utsname::uname; -+ use crate::sys::utsname::uname; - - // Features: - // * atomic cloexec on socket: 2.6.27 -@@ -94,7 +94,10 @@ mod os { - } - } - --#[cfg(any(target_os = "macos", target_os = "freebsd", target_os = "dragonfly", target_os = "ios", target_os = "openbsd", target_os = "netbsd"))] -+#[cfg(any(target_os = "macos", target_os = "freebsd", -+ target_os = "dragonfly", target_os = "ios", -+ target_os = "openbsd", target_os = "netbsd", -+ target_os = "redox", target_os = "fuchsia"))] - mod os { - /// Check if the OS supports atomic close-on-exec for sockets - pub fn socket_atomic_cloexec() -> bool { -diff --git a/third_party/rust/nix/src/ifaddrs.rs b/third_party/rust/nix/src/ifaddrs.rs -index 12b59bcc92bef..ed6328f3efab2 100644 ---- a/third_party/rust/nix/src/ifaddrs.rs -+++ b/third_party/rust/nix/src/ifaddrs.rs -@@ -3,16 +3,15 @@ - //! Uses the Linux and/or BSD specific function `getifaddrs` to query the list - //! of interfaces and their associated addresses. - -+use cfg_if::cfg_if; - use std::ffi; - use std::iter::Iterator; - use std::mem; - use std::option::Option; - --use libc; -- --use {Result, Errno}; --use sys::socket::SockAddr; --use net::if_::*; -+use crate::{Result, Errno}; -+use crate::sys::socket::SockAddr; -+use crate::net::if_::*; - - /// Describes a single address for an interface as returned by `getifaddrs`. - #[derive(Clone, Debug, Eq, Hash, PartialEq)] -@@ -52,8 +51,8 @@ impl InterfaceAddress { - let mut addr = InterfaceAddress { - interface_name: ifname.to_string_lossy().to_string(), - flags: InterfaceFlags::from_bits_truncate(info.ifa_flags as i32), -- address: address, -- netmask: netmask, -+ address, -+ netmask, - broadcast: None, - destination: None, - }; -@@ -125,13 +124,15 @@ impl Iterator for InterfaceAddressIterator { - /// } - /// ``` - pub fn getifaddrs() -> Result<InterfaceAddressIterator> { -- let mut addrs: *mut libc::ifaddrs = unsafe { mem::uninitialized() }; -- Errno::result(unsafe { libc::getifaddrs(&mut addrs) }).map(|_| { -- InterfaceAddressIterator { -- base: addrs, -- next: addrs, -- } -- }) -+ let mut addrs = mem::MaybeUninit::<*mut libc::ifaddrs>::uninit(); -+ unsafe { -+ Errno::result(libc::getifaddrs(addrs.as_mut_ptr())).map(|_| { -+ InterfaceAddressIterator { -+ base: addrs.assume_init(), -+ next: addrs.assume_init(), -+ } -+ }) -+ } - } - - #[cfg(test)] -diff --git a/third_party/rust/nix/src/kmod.rs b/third_party/rust/nix/src/kmod.rs -index e853261b14f9d..8789cb69f4617 100644 ---- a/third_party/rust/nix/src/kmod.rs -+++ b/third_party/rust/nix/src/kmod.rs -@@ -6,8 +6,8 @@ use libc; - use std::ffi::CStr; - use std::os::unix::io::AsRawFd; - --use errno::Errno; --use Result; -+use crate::errno::Errno; -+use crate::Result; - - /// Loads a kernel module from a buffer. - /// -diff --git a/third_party/rust/nix/src/lib.rs b/third_party/rust/nix/src/lib.rs -index 71485d2af1824..e62c158c8bc9b 100644 ---- a/third_party/rust/nix/src/lib.rs -+++ b/third_party/rust/nix/src/lib.rs -@@ -14,24 +14,17 @@ - #![deny(unstable_features)] - #![deny(missing_copy_implementations)] - #![deny(missing_debug_implementations)] --// XXX Allow deprecated items until release 0.16.0. See issue #1096. --#![allow(deprecated)] -- --// External crates --#[macro_use] --extern crate bitflags; --#[macro_use] --extern crate cfg_if; --extern crate void; - - // Re-exported external crates --pub extern crate libc; -+pub use libc; - - // Private internal modules - #[macro_use] mod macros; - - // Public crates -+#[cfg(not(target_os = "redox"))] - pub mod dir; -+pub mod env; - pub mod errno; - #[deny(missing_docs)] - pub mod features; -@@ -59,13 +52,16 @@ pub mod mount; - target_os = "netbsd"))] - pub mod mqueue; - #[deny(missing_docs)] -+#[cfg(not(target_os = "redox"))] - pub mod net; - #[deny(missing_docs)] - pub mod poll; - #[deny(missing_docs)] -+#[cfg(not(any(target_os = "redox", target_os = "fuchsia")))] - pub mod pty; - pub mod sched; - pub mod sys; -+pub mod time; - // This can be implemented for other platforms as soon as libc - // provides bindings for them. - #[cfg(all(target_os = "linux", -@@ -121,9 +117,9 @@ impl Error { - /// let e = Error::from(Errno::EPERM); - /// assert_eq!(Some(Errno::EPERM), e.as_errno()); - /// ``` -- pub fn as_errno(&self) -> Option<Errno> { -- if let &Error::Sys(ref e) = self { -- Some(*e) -+ pub fn as_errno(self) -> Option<Errno> { -+ if let Error::Sys(e) = self { -+ Some(e) - } else { - None - } -@@ -154,16 +150,7 @@ impl From<std::string::FromUtf8Error> for Error { - fn from(_: std::string::FromUtf8Error) -> Error { Error::InvalidUtf8 } - } - --impl error::Error for Error { -- fn description(&self) -> &str { -- match *self { -- Error::InvalidPath => "Invalid path", -- Error::InvalidUtf8 => "Invalid UTF-8 string", -- Error::UnsupportedOperation => "Unsupported Operation", -- Error::Sys(ref errno) => errno.desc(), -- } -- } --} -+impl error::Error for Error {} - - impl fmt::Display for Error { - fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { -@@ -177,6 +164,8 @@ impl fmt::Display for Error { - } - - pub trait NixPath { -+ fn is_empty(&self) -> bool; -+ - fn len(&self) -> usize; - - fn with_nix_path<T, F>(&self, f: F) -> Result<T> -@@ -184,6 +173,10 @@ pub trait NixPath { - } - - impl NixPath for str { -+ fn is_empty(&self) -> bool { -+ NixPath::is_empty(OsStr::new(self)) -+ } -+ - fn len(&self) -> usize { - NixPath::len(OsStr::new(self)) - } -@@ -195,6 +188,10 @@ impl NixPath for str { - } - - impl NixPath for OsStr { -+ fn is_empty(&self) -> bool { -+ self.as_bytes().is_empty() -+ } -+ - fn len(&self) -> usize { - self.as_bytes().len() - } -@@ -206,6 +203,10 @@ impl NixPath for OsStr { - } - - impl NixPath for CStr { -+ fn is_empty(&self) -> bool { -+ self.to_bytes().is_empty() -+ } -+ - fn len(&self) -> usize { - self.to_bytes().len() - } -@@ -222,6 +223,10 @@ impl NixPath for CStr { - } - - impl NixPath for [u8] { -+ fn is_empty(&self) -> bool { -+ self.is_empty() -+ } -+ - fn len(&self) -> usize { - self.len() - } -@@ -249,6 +254,10 @@ impl NixPath for [u8] { - } - - impl NixPath for Path { -+ fn is_empty(&self) -> bool { -+ NixPath::is_empty(self.as_os_str()) -+ } -+ - fn len(&self) -> usize { - NixPath::len(self.as_os_str()) - } -@@ -259,26 +268,15 @@ impl NixPath for Path { - } - - impl NixPath for PathBuf { -- fn len(&self) -> usize { -- NixPath::len(self.as_os_str()) -+ fn is_empty(&self) -> bool { -+ NixPath::is_empty(self.as_os_str()) - } - -- fn with_nix_path<T, F>(&self, f: F) -> Result<T> where F: FnOnce(&CStr) -> T { -- self.as_os_str().with_nix_path(f) -- } --} -- --/// Treats `None` as an empty string. --impl<'a, NP: ?Sized + NixPath> NixPath for Option<&'a NP> { - fn len(&self) -> usize { -- self.map_or(0, NixPath::len) -+ NixPath::len(self.as_os_str()) - } - - fn with_nix_path<T, F>(&self, f: F) -> Result<T> where F: FnOnce(&CStr) -> T { -- if let Some(nix_path) = *self { -- nix_path.with_nix_path(f) -- } else { -- unsafe { CStr::from_ptr("\0".as_ptr() as *const _).with_nix_path(f) } -- } -+ self.as_os_str().with_nix_path(f) - } - } -diff --git a/third_party/rust/nix/src/macros.rs b/third_party/rust/nix/src/macros.rs -index 3d1b0e4b7699c..7d6ac8dfbf5f7 100644 ---- a/third_party/rust/nix/src/macros.rs -+++ b/third_party/rust/nix/src/macros.rs -@@ -48,7 +48,7 @@ macro_rules! libc_bitflags { - )+ - } - ) => { -- bitflags! { -+ ::bitflags::bitflags! { - $(#[$outer])* - pub struct $BitFlags: $T { - $( -@@ -81,9 +81,10 @@ macro_rules! libc_bitflags { - /// } - /// ``` - macro_rules! libc_enum { -- // (non-pub) Exit rule. -+ // Exit rule. - (@make_enum - { -+ $v:vis - name: $BitFlags:ident, - attrs: [$($attrs:tt)*], - entries: [$($entries:tt)*], -@@ -91,49 +92,15 @@ macro_rules! libc_enum { - ) => { - $($attrs)* - #[derive(Clone, Copy, Debug, Eq, Hash, Ord, PartialEq, PartialOrd)] -- enum $BitFlags { -+ $v enum $BitFlags { - $($entries)* - } - }; - -- // (pub) Exit rule. -- (@make_enum -- { -- pub, -- name: $BitFlags:ident, -- attrs: [$($attrs:tt)*], -- entries: [$($entries:tt)*], -- } -- ) => { -- $($attrs)* -- #[derive(Clone, Copy, Debug, Eq, Hash, Ord, PartialEq, PartialOrd)] -- pub enum $BitFlags { -- $($entries)* -- } -- }; -- -- // (non-pub) Done accumulating. -- (@accumulate_entries -- { -- name: $BitFlags:ident, -- attrs: $attrs:tt, -- }, -- $entries:tt; -- ) => { -- libc_enum! { -- @make_enum -- { -- name: $BitFlags, -- attrs: $attrs, -- entries: $entries, -- } -- } -- }; -- -- // (pub) Done accumulating. -+ // Done accumulating. - (@accumulate_entries - { -- pub, -+ $v:vis - name: $BitFlags:ident, - attrs: $attrs:tt, - }, -@@ -142,7 +109,7 @@ macro_rules! libc_enum { - libc_enum! { - @make_enum - { -- pub, -+ $v - name: $BitFlags, - attrs: $attrs, - entries: $entries, -@@ -217,35 +184,17 @@ macro_rules! libc_enum { - } - }; - -- // (non-pub) Entry rule. -- ( -- $(#[$attr:meta])* -- enum $BitFlags:ident { -- $($vals:tt)* -- } -- ) => { -- libc_enum! { -- @accumulate_entries -- { -- name: $BitFlags, -- attrs: [$(#[$attr])*], -- }, -- []; -- $($vals)* -- } -- }; -- -- // (pub) Entry rule. -+ // Entry rule. - ( - $(#[$attr:meta])* -- pub enum $BitFlags:ident { -+ $v:vis enum $BitFlags:ident { - $($vals:tt)* - } - ) => { - libc_enum! { - @accumulate_entries - { -- pub, -+ $v - name: $BitFlags, - attrs: [$(#[$attr])*], - }, -@@ -254,11 +203,3 @@ macro_rules! libc_enum { - } - }; - } -- --/// A Rust version of the familiar C `offset_of` macro. It returns the byte --/// offset of `field` within struct `ty` --macro_rules! offset_of { -- ($ty:ty, $field:ident) => { -- &(*(0 as *const $ty)).$field as *const _ as usize -- } --} -diff --git a/third_party/rust/nix/src/mount.rs b/third_party/rust/nix/src/mount.rs -index a9902b170ace8..2c54761e2bb0c 100644 ---- a/third_party/rust/nix/src/mount.rs -+++ b/third_party/rust/nix/src/mount.rs -@@ -1,6 +1,6 @@ - use libc::{self, c_ulong, c_int}; --use {Result, NixPath}; --use errno::Errno; -+use crate::{Result, NixPath}; -+use crate::errno::Errno; - - libc_bitflags!( - pub struct MsFlags: c_ulong { -@@ -61,22 +61,33 @@ pub fn mount<P1: ?Sized + NixPath, P2: ?Sized + NixPath, P3: ?Sized + NixPath, P - flags: MsFlags, - data: Option<&P4>) -> Result<()> { - -- let res = -- source.with_nix_path(|source| { -- target.with_nix_path(|target| { -- fstype.with_nix_path(|fstype| { -- data.with_nix_path(|data| { -- unsafe { -- libc::mount(source.as_ptr(), -- target.as_ptr(), -- fstype.as_ptr(), -- flags.bits, -- data.as_ptr() as *const libc::c_void) -- } -- }) -+ fn with_opt_nix_path<P, T, F>(p: Option<&P>, f: F) -> Result<T> -+ where P: ?Sized + NixPath, -+ F: FnOnce(*const libc::c_char) -> T -+ { -+ match p { -+ Some(path) => path.with_nix_path(|p_str| f(p_str.as_ptr())), -+ None => Ok(f(std::ptr::null())) -+ } -+ } -+ -+ let res = with_opt_nix_path(source, |s| { -+ target.with_nix_path(|t| { -+ with_opt_nix_path(fstype, |ty| { -+ with_opt_nix_path(data, |d| { -+ unsafe { -+ libc::mount( -+ s, -+ t.as_ptr(), -+ ty, -+ flags.bits, -+ d as *const libc::c_void -+ ) -+ } - }) - }) -- })????; -+ }) -+ })????; - - Errno::result(res).map(drop) - } -diff --git a/third_party/rust/nix/src/mqueue.rs b/third_party/rust/nix/src/mqueue.rs -index b958b71cddb46..0215de5af214b 100644 ---- a/third_party/rust/nix/src/mqueue.rs -+++ b/third_party/rust/nix/src/mqueue.rs -@@ -2,12 +2,12 @@ - //! - //! [Further reading and details on the C API](http://man7.org/linux/man-pages/man7/mq_overview.7.html) - --use Result; --use errno::Errno; -+use crate::Result; -+use crate::errno::Errno; - --use libc::{self, c_char, c_long, mqd_t, size_t}; -+use libc::{self, c_char, mqd_t, size_t}; - use std::ffi::CString; --use sys::stat::Mode; -+use crate::sys::stat::Mode; - use std::mem; - - libc_bitflags!{ -@@ -34,21 +34,32 @@ pub struct MqAttr { - mq_attr: libc::mq_attr, - } - -+// x32 compatibility -+// See https://sourceware.org/bugzilla/show_bug.cgi?id=21279 -+#[cfg(all(target_arch = "x86_64", target_pointer_width = "32"))] -+pub type mq_attr_member_t = i64; -+#[cfg(not(all(target_arch = "x86_64", target_pointer_width = "32")))] -+pub type mq_attr_member_t = libc::c_long; -+ - impl MqAttr { -- pub fn new(mq_flags: c_long, -- mq_maxmsg: c_long, -- mq_msgsize: c_long, -- mq_curmsgs: c_long) -- -> MqAttr { -- let mut attr = unsafe { mem::uninitialized::<libc::mq_attr>() }; -- attr.mq_flags = mq_flags; -- attr.mq_maxmsg = mq_maxmsg; -- attr.mq_msgsize = mq_msgsize; -- attr.mq_curmsgs = mq_curmsgs; -- MqAttr { mq_attr: attr } -+ pub fn new(mq_flags: mq_attr_member_t, -+ mq_maxmsg: mq_attr_member_t, -+ mq_msgsize: mq_attr_member_t, -+ mq_curmsgs: mq_attr_member_t) -+ -> MqAttr -+ { -+ let mut attr = mem::MaybeUninit::<libc::mq_attr>::uninit(); -+ unsafe { -+ let p = attr.as_mut_ptr(); -+ (*p).mq_flags = mq_flags; -+ (*p).mq_maxmsg = mq_maxmsg; -+ (*p).mq_msgsize = mq_msgsize; -+ (*p).mq_curmsgs = mq_curmsgs; -+ MqAttr { mq_attr: attr.assume_init() } -+ } - } - -- pub fn flags(&self) -> c_long { -+ pub fn flags(&self) -> mq_attr_member_t { - self.mq_attr.mq_flags - } - } -@@ -57,6 +68,8 @@ impl MqAttr { - /// Open a message queue - /// - /// See also [`mq_open(2)`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/mq_open.html) -+// The mode.bits cast is only lossless on some OSes -+#[allow(clippy::cast_lossless)] - pub fn mq_open(name: &CString, - oflag: MQ_OFlag, - mode: Mode, -@@ -121,9 +134,9 @@ pub fn mq_send(mqdes: mqd_t, message: &[u8], msq_prio: u32) -> Result<()> { - /// - /// See also [`mq_getattr(2)`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/mq_getattr.html) - pub fn mq_getattr(mqd: mqd_t) -> Result<MqAttr> { -- let mut attr = unsafe { mem::uninitialized::<libc::mq_attr>() }; -- let res = unsafe { libc::mq_getattr(mqd, &mut attr) }; -- Errno::result(res).map(|_| MqAttr { mq_attr: attr }) -+ let mut attr = mem::MaybeUninit::<libc::mq_attr>::uninit(); -+ let res = unsafe { libc::mq_getattr(mqd, attr.as_mut_ptr()) }; -+ Errno::result(res).map(|_| unsafe{MqAttr { mq_attr: attr.assume_init() }}) - } - - /// Set the attributes of the message queue. Only `O_NONBLOCK` can be set, everything else will be ignored -@@ -132,17 +145,19 @@ pub fn mq_getattr(mqd: mqd_t) -> Result<MqAttr> { - /// - /// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/mq_setattr.html) - pub fn mq_setattr(mqd: mqd_t, newattr: &MqAttr) -> Result<MqAttr> { -- let mut attr = unsafe { mem::uninitialized::<libc::mq_attr>() }; -- let res = unsafe { libc::mq_setattr(mqd, &newattr.mq_attr as *const libc::mq_attr, &mut attr) }; -- Errno::result(res).map(|_| MqAttr { mq_attr: attr }) -+ let mut attr = mem::MaybeUninit::<libc::mq_attr>::uninit(); -+ let res = unsafe { -+ libc::mq_setattr(mqd, &newattr.mq_attr as *const libc::mq_attr, attr.as_mut_ptr()) -+ }; -+ Errno::result(res).map(|_| unsafe{ MqAttr { mq_attr: attr.assume_init() }}) - } - - /// Convenience function. - /// Sets the `O_NONBLOCK` attribute for a given message queue descriptor - /// Returns the old attributes --pub fn mq_set_nonblock(mqd: mqd_t) -> Result<(MqAttr)> { -+pub fn mq_set_nonblock(mqd: mqd_t) -> Result<MqAttr> { - let oldattr = mq_getattr(mqd)?; -- let newattr = MqAttr::new(MQ_OFlag::O_NONBLOCK.bits() as c_long, -+ let newattr = MqAttr::new(mq_attr_member_t::from(MQ_OFlag::O_NONBLOCK.bits()), - oldattr.mq_attr.mq_maxmsg, - oldattr.mq_attr.mq_msgsize, - oldattr.mq_attr.mq_curmsgs); -@@ -152,7 +167,7 @@ pub fn mq_set_nonblock(mqd: mqd_t) -> Result<(MqAttr)> { - /// Convenience function. - /// Removes `O_NONBLOCK` attribute for a given message queue descriptor - /// Returns the old attributes --pub fn mq_remove_nonblock(mqd: mqd_t) -> Result<(MqAttr)> { -+pub fn mq_remove_nonblock(mqd: mqd_t) -> Result<MqAttr> { - let oldattr = mq_getattr(mqd)?; - let newattr = MqAttr::new(0, - oldattr.mq_attr.mq_maxmsg, -diff --git a/third_party/rust/nix/src/net/if_.rs b/third_party/rust/nix/src/net/if_.rs -index 58d677ae343d1..96364884e39cb 100644 ---- a/third_party/rust/nix/src/net/if_.rs -+++ b/third_party/rust/nix/src/net/if_.rs -@@ -3,9 +3,8 @@ - //! Uses Linux and/or POSIX functions to resolve interface names like "eth0" - //! or "socan1" into device numbers. - --use libc; - use libc::c_uint; --use {Result, Error, NixPath}; -+use crate::{Result, Error, NixPath}; - - /// Resolve an interface into a interface number. - pub fn if_nametoindex<P: ?Sized + NixPath>(name: &P) -> Result<c_uint> { -diff --git a/third_party/rust/nix/src/poll.rs b/third_party/rust/nix/src/poll.rs -index c603611e3176f..be5bf224990f2 100644 ---- a/third_party/rust/nix/src/poll.rs -+++ b/third_party/rust/nix/src/poll.rs -@@ -1,13 +1,12 @@ - //! Wait for events to trigger on specific file descriptors - #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", target_os = "linux"))] --use sys::time::TimeSpec; -+use crate::sys::time::TimeSpec; - #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", target_os = "linux"))] --use sys::signal::SigSet; -+use crate::sys::signal::SigSet; - use std::os::unix::io::RawFd; - --use libc; --use Result; --use errno::Errno; -+use crate::Result; -+use crate::errno::Errno; - - /// This is a wrapper around `libc::pollfd`. - /// -@@ -17,7 +16,7 @@ use errno::Errno; - /// - /// After a call to `poll` or `ppoll`, the events that occured can be - /// retrieved by calling [`revents()`](#method.revents) on the `PollFd`. --#[repr(C)] -+#[repr(transparent)] - #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] - pub struct PollFd { - pollfd: libc::pollfd, -@@ -29,7 +28,7 @@ impl PollFd { - pub fn new(fd: RawFd, events: PollFlags) -> PollFd { - PollFd { - pollfd: libc::pollfd { -- fd: fd, -+ fd, - events: events.bits(), - revents: PollFlags::empty().bits(), - }, -@@ -37,7 +36,7 @@ impl PollFd { - } - - /// Returns the events that occured in the last call to `poll` or `ppoll`. -- pub fn revents(&self) -> Option<PollFlags> { -+ pub fn revents(self) -> Option<PollFlags> { - PollFlags::from_bits(self.pollfd.revents) - } - } -@@ -64,12 +63,16 @@ libc_bitflags! { - /// `O_NONBLOCK` is set). - POLLOUT; - /// Equivalent to [`POLLIN`](constant.POLLIN.html) -+ #[cfg(not(target_os = "redox"))] - POLLRDNORM; -+ #[cfg(not(target_os = "redox"))] - /// Equivalent to [`POLLOUT`](constant.POLLOUT.html) - POLLWRNORM; - /// Priority band data can be read (generally unused on Linux). -+ #[cfg(not(target_os = "redox"))] - POLLRDBAND; - /// Priority data may be written. -+ #[cfg(not(target_os = "redox"))] - POLLWRBAND; - /// Error condition (only returned in - /// [`PollFd::revents`](struct.PollFd.html#method.revents); -@@ -127,16 +130,16 @@ pub fn poll(fds: &mut [PollFd], timeout: libc::c_int) -> Result<libc::c_int> { - /// ([`poll(2)`](http://man7.org/linux/man-pages/man2/poll.2.html)) - /// - /// `ppoll` behaves like `poll`, but let you specify what signals may interrupt it --/// with the `sigmask` argument. -+/// with the `sigmask` argument. If you want `ppoll` to block indefinitely, -+/// specify `None` as `timeout` (it is like `timeout = -1` for `poll`). - /// - #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", target_os = "linux"))] --pub fn ppoll(fds: &mut [PollFd], timeout: TimeSpec, sigmask: SigSet) -> Result<libc::c_int> { -- -- -+pub fn ppoll(fds: &mut [PollFd], timeout: Option<TimeSpec>, sigmask: SigSet) -> Result<libc::c_int> { -+ let timeout = timeout.as_ref().map_or(core::ptr::null(), |r| r.as_ref()); - let res = unsafe { - libc::ppoll(fds.as_mut_ptr() as *mut libc::pollfd, - fds.len() as libc::nfds_t, -- timeout.as_ref(), -+ timeout, - sigmask.as_ref()) - }; - Errno::result(res) -diff --git a/third_party/rust/nix/src/pty.rs b/third_party/rust/nix/src/pty.rs -index db012d8158c53..d67518f4744f3 100644 ---- a/third_party/rust/nix/src/pty.rs -+++ b/third_party/rust/nix/src/pty.rs -@@ -1,18 +1,17 @@ - //! Create master and slave virtual pseudo-terminals (PTYs) - --use libc; -- - pub use libc::pid_t as SessionId; - pub use libc::winsize as Winsize; - - use std::ffi::CStr; -+use std::io; - use std::mem; - use std::os::unix::prelude::*; - --use sys::termios::Termios; --use unistd::ForkResult; --use {Result, Error, fcntl}; --use errno::Errno; -+use crate::sys::termios::Termios; -+use crate::unistd::{self, ForkResult, Pid}; -+use crate::{Result, Error, fcntl}; -+use crate::errno::Errno; - - /// Representation of a master/slave pty pair - /// -@@ -44,7 +43,7 @@ pub struct ForkptyResult { - /// While this datatype is a thin wrapper around `RawFd`, it enforces that the available PTY - /// functions are given the correct file descriptor. Additionally this type implements `Drop`, - /// so that when it's consumed or goes out of scope, it's automatically cleaned-up. --#[derive(Clone, Debug, Eq, Hash, PartialEq)] -+#[derive(Debug, Eq, Hash, PartialEq)] - pub struct PtyMaster(RawFd); - - impl AsRawFd for PtyMaster { -@@ -70,13 +69,28 @@ impl Drop for PtyMaster { - // invalid file descriptor. That frequently indicates a double-close - // condition, which can cause confusing errors for future I/O - // operations. -- let e = ::unistd::close(self.0); -+ let e = unistd::close(self.0); - if e == Err(Error::Sys(Errno::EBADF)) { - panic!("Closing an invalid file descriptor!"); - }; - } - } - -+impl io::Read for PtyMaster { -+ fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> { -+ unistd::read(self.0, buf).map_err(|e| e.as_errno().unwrap().into()) -+ } -+} -+ -+impl io::Write for PtyMaster { -+ fn write(&mut self, buf: &[u8]) -> io::Result<usize> { -+ unistd::write(self.0, buf).map_err(|e| e.as_errno().unwrap().into()) -+ } -+ fn flush(&mut self) -> io::Result<()> { -+ Ok(()) -+ } -+} -+ - /// Grant access to a slave pseudoterminal (see - /// [`grantpt(3)`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/grantpt.html)) - /// -@@ -218,16 +232,16 @@ pub fn unlockpt(fd: &PtyMaster) -> Result<()> { - pub fn openpty<'a, 'b, T: Into<Option<&'a Winsize>>, U: Into<Option<&'b Termios>>>(winsize: T, termios: U) -> Result<OpenptyResult> { - use std::ptr; - -- let mut slave: libc::c_int = unsafe { mem::uninitialized() }; -- let mut master: libc::c_int = unsafe { mem::uninitialized() }; -+ let mut slave = mem::MaybeUninit::<libc::c_int>::uninit(); -+ let mut master = mem::MaybeUninit::<libc::c_int>::uninit(); - let ret = { - match (termios.into(), winsize.into()) { - (Some(termios), Some(winsize)) => { - let inner_termios = termios.get_libc_termios(); - unsafe { - libc::openpty( -- &mut master, -- &mut slave, -+ master.as_mut_ptr(), -+ slave.as_mut_ptr(), - ptr::null_mut(), - &*inner_termios as *const libc::termios as *mut _, - winsize as *const Winsize as *mut _, -@@ -237,8 +251,8 @@ pub fn openpty<'a, 'b, T: Into<Option<&'a Winsize>>, U: Into<Option<&'b Termios> - (None, Some(winsize)) => { - unsafe { - libc::openpty( -- &mut master, -- &mut slave, -+ master.as_mut_ptr(), -+ slave.as_mut_ptr(), - ptr::null_mut(), - ptr::null_mut(), - winsize as *const Winsize as *mut _, -@@ -249,8 +263,8 @@ pub fn openpty<'a, 'b, T: Into<Option<&'a Winsize>>, U: Into<Option<&'b Termios> - let inner_termios = termios.get_libc_termios(); - unsafe { - libc::openpty( -- &mut master, -- &mut slave, -+ master.as_mut_ptr(), -+ slave.as_mut_ptr(), - ptr::null_mut(), - &*inner_termios as *const libc::termios as *mut _, - ptr::null_mut(), -@@ -260,8 +274,8 @@ pub fn openpty<'a, 'b, T: Into<Option<&'a Winsize>>, U: Into<Option<&'b Termios> - (None, None) => { - unsafe { - libc::openpty( -- &mut master, -- &mut slave, -+ master.as_mut_ptr(), -+ slave.as_mut_ptr(), - ptr::null_mut(), - ptr::null_mut(), - ptr::null_mut(), -@@ -273,10 +287,12 @@ pub fn openpty<'a, 'b, T: Into<Option<&'a Winsize>>, U: Into<Option<&'b Termios> - - Errno::result(ret)?; - -- Ok(OpenptyResult { -- master: master, -- slave: slave, -- }) -+ unsafe { -+ Ok(OpenptyResult { -+ master: master.assume_init(), -+ slave: slave.assume_init(), -+ }) -+ } - } - - /// Create a new pseudoterminal, returning the master file descriptor and forked pid. -@@ -291,10 +307,8 @@ pub fn forkpty<'a, 'b, T: Into<Option<&'a Winsize>>, U: Into<Option<&'b Termios> - termios: U, - ) -> Result<ForkptyResult> { - use std::ptr; -- use unistd::Pid; -- use unistd::ForkResult::*; - -- let mut master: libc::c_int = unsafe { mem::uninitialized() }; -+ let mut master = mem::MaybeUninit::<libc::c_int>::uninit(); - - let term = match termios.into() { - Some(termios) => { -@@ -310,17 +324,19 @@ pub fn forkpty<'a, 'b, T: Into<Option<&'a Winsize>>, U: Into<Option<&'b Termios> - .unwrap_or(ptr::null_mut()); - - let res = unsafe { -- libc::forkpty(&mut master, ptr::null_mut(), term, win) -+ libc::forkpty(master.as_mut_ptr(), ptr::null_mut(), term, win) - }; - - let fork_result = Errno::result(res).map(|res| match res { -- 0 => Child, -- res => Parent { child: Pid::from_raw(res) }, -+ 0 => ForkResult::Child, -+ res => ForkResult::Parent { child: Pid::from_raw(res) }, - })?; - -- Ok(ForkptyResult { -- master: master, -- fork_result: fork_result, -- }) -+ unsafe { -+ Ok(ForkptyResult { -+ master: master.assume_init(), -+ fork_result, -+ }) -+ } - } - -diff --git a/third_party/rust/nix/src/sched.rs b/third_party/rust/nix/src/sched.rs -index 67188c57eef7d..3b48b4adf6d05 100644 ---- a/third_party/rust/nix/src/sched.rs -+++ b/third_party/rust/nix/src/sched.rs -@@ -1,18 +1,17 @@ --use libc; --use {Errno, Result}; -+use crate::{Errno, Result}; - - #[cfg(any(target_os = "android", target_os = "linux"))] - pub use self::sched_linux_like::*; - - #[cfg(any(target_os = "android", target_os = "linux"))] - mod sched_linux_like { -- use errno::Errno; -+ use crate::errno::Errno; - use libc::{self, c_int, c_void}; - use std::mem; - use std::option::Option; - use std::os::unix::io::RawFd; -- use unistd::Pid; -- use {Error, Result}; -+ use crate::unistd::Pid; -+ use crate::{Error, Result}; - - // For some functions taking with a parameter of type CloneFlags, - // only a subset of these flags have an effect. -@@ -46,6 +45,11 @@ mod sched_linux_like { - - pub type CloneCb<'a> = Box<dyn FnMut() -> isize + 'a>; - -+ /// CpuSet represent a bit-mask of CPUs. -+ /// CpuSets are used by sched_setaffinity and -+ /// sched_getaffinity for example. -+ /// -+ /// This is a wrapper around `libc::cpu_set_t`. - #[repr(C)] - #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] - pub struct CpuSet { -@@ -53,37 +57,78 @@ mod sched_linux_like { - } - - impl CpuSet { -+ /// Create a new and empty CpuSet. - pub fn new() -> CpuSet { - CpuSet { - cpu_set: unsafe { mem::zeroed() }, - } - } - -+ /// Test to see if a CPU is in the CpuSet. -+ /// `field` is the CPU id to test - pub fn is_set(&self, field: usize) -> Result<bool> { -- if field >= 8 * mem::size_of::<libc::cpu_set_t>() { -+ if field >= CpuSet::count() { - Err(Error::Sys(Errno::EINVAL)) - } else { - Ok(unsafe { libc::CPU_ISSET(field, &self.cpu_set) }) - } - } - -+ /// Add a CPU to CpuSet. -+ /// `field` is the CPU id to add - pub fn set(&mut self, field: usize) -> Result<()> { -- if field >= 8 * mem::size_of::<libc::cpu_set_t>() { -+ if field >= CpuSet::count() { - Err(Error::Sys(Errno::EINVAL)) - } else { -- Ok(unsafe { libc::CPU_SET(field, &mut self.cpu_set) }) -+ unsafe { libc::CPU_SET(field, &mut self.cpu_set); } -+ Ok(()) - } - } - -+ /// Remove a CPU from CpuSet. -+ /// `field` is the CPU id to remove - pub fn unset(&mut self, field: usize) -> Result<()> { -- if field >= 8 * mem::size_of::<libc::cpu_set_t>() { -+ if field >= CpuSet::count() { - Err(Error::Sys(Errno::EINVAL)) - } else { -- Ok(unsafe { libc::CPU_CLR(field, &mut self.cpu_set) }) -+ unsafe { libc::CPU_CLR(field, &mut self.cpu_set);} -+ Ok(()) - } - } -+ -+ /// Return the maximum number of CPU in CpuSet -+ pub fn count() -> usize { -+ 8 * mem::size_of::<libc::cpu_set_t>() -+ } - } - -+ impl Default for CpuSet { -+ fn default() -> Self { -+ Self::new() -+ } -+ } -+ -+ /// `sched_setaffinity` set a thread's CPU affinity mask -+ /// ([`sched_setaffinity(2)`](http://man7.org/linux/man-pages/man2/sched_setaffinity.2.html)) -+ /// -+ /// `pid` is the thread ID to update. -+ /// If pid is zero, then the calling thread is updated. -+ /// -+ /// The `cpuset` argument specifies the set of CPUs on which the thread -+ /// will be eligible to run. -+ /// -+ /// # Example -+ /// -+ /// Binding the current thread to CPU 0 can be done as follows: -+ /// -+ /// ```rust,no_run -+ /// use nix::sched::{CpuSet, sched_setaffinity}; -+ /// use nix::unistd::Pid; -+ /// -+ /// let mut cpu_set = CpuSet::new(); -+ /// cpu_set.set(0); -+ /// sched_setaffinity(Pid::from_raw(0), &cpu_set); -+ /// ``` - pub fn sched_setaffinity(pid: Pid, cpuset: &CpuSet) -> Result<()> { - let res = unsafe { - libc::sched_setaffinity( -@@ -96,6 +141,41 @@ mod sched_linux_like { - Errno::result(res).map(drop) - } - -+ /// `sched_getaffinity` get a thread's CPU affinity mask -+ /// ([`sched_getaffinity(2)`](http://man7.org/linux/man-pages/man2/sched_getaffinity.2.html)) -+ /// -+ /// `pid` is the thread ID to check. -+ /// If pid is zero, then the calling thread is checked. -+ /// -+ /// Returned `cpuset` is the set of CPUs on which the thread -+ /// is eligible to run. -+ /// -+ /// # Example -+ /// -+ /// Checking if the current thread can run on CPU 0 can be done as follows: -+ /// -+ /// ```rust,no_run -+ /// use nix::sched::sched_getaffinity; -+ /// use nix::unistd::Pid; -+ /// -+ /// let cpu_set = sched_getaffinity(Pid::from_raw(0)).unwrap(); -+ /// if cpu_set.is_set(0).unwrap() { -+ /// println!("Current thread can run on CPU 0"); -+ /// } -+ /// ``` -+ pub fn sched_getaffinity(pid: Pid) -> Result<CpuSet> { -+ let mut cpuset = CpuSet::new(); -+ let res = unsafe { -+ libc::sched_getaffinity( -+ pid.into(), -+ mem::size_of::<CpuSet>() as libc::size_t, -+ &mut cpuset.cpu_set, -+ ) -+ }; -+ -+ Errno::result(res).and(Ok(cpuset)) -+ } -+ - pub fn clone( - mut cb: CloneCb, - stack: &mut [u8], -@@ -109,8 +189,8 @@ mod sched_linux_like { - - let res = unsafe { - let combined = flags.bits() | signal.unwrap_or(0); -- let ptr = stack.as_mut_ptr().offset(stack.len() as isize); -- let ptr_aligned = ptr.offset((ptr as usize % 16) as isize * -1); -+ let ptr = stack.as_mut_ptr().add(stack.len()); -+ let ptr_aligned = ptr.sub(ptr as usize % 16); - libc::clone( - mem::transmute( - callback as extern "C" fn(*mut Box<dyn FnMut() -> isize>) -> i32, -diff --git a/third_party/rust/nix/src/sys/aio.rs b/third_party/rust/nix/src/sys/aio.rs -index 9258a0657cc8a..1afdb35866c28 100644 ---- a/third_party/rust/nix/src/sys/aio.rs -+++ b/third_party/rust/nix/src/sys/aio.rs -@@ -21,20 +21,19 @@ - //! [`aio_cancel_all`](fn.aio_cancel_all.html), though the operating system may - //! not support this for all filesystems and devices. - --use {Error, Result}; --use errno::Errno; -+use crate::{Error, Result}; -+use crate::errno::Errno; - use std::os::unix::io::RawFd; - use libc::{c_void, off_t, size_t}; --use libc; - use std::borrow::{Borrow, BorrowMut}; - use std::fmt; - use std::fmt::Debug; - use std::marker::PhantomData; - use std::mem; - use std::ptr::{null, null_mut}; --use sys::signal::*; -+use crate::sys::signal::*; - use std::thread; --use sys::time::TimeSpec; -+use crate::sys::time::TimeSpec; - - libc_enum! { - /// Mode for `AioCb::fsync`. Controls whether only data or both data and -@@ -226,8 +225,6 @@ impl<'a> AioCb<'a> { - /// [`fsync`](#method.fsync) operation. - /// - /// ``` -- /// # extern crate tempfile; -- /// # extern crate nix; - /// # use nix::errno::Errno; - /// # use nix::Error; - /// # use nix::sys::aio::*; -@@ -287,8 +284,6 @@ impl<'a> AioCb<'a> { - /// Create an `AioCb` from a mutable slice and read into it. - /// - /// ``` -- /// # extern crate tempfile; -- /// # extern crate nix; - /// # use nix::errno::Errno; - /// # use nix::Error; - /// # use nix::sys::aio::*; -@@ -363,8 +358,6 @@ impl<'a> AioCb<'a> { - /// Create an `AioCb` from a Vector and use it for writing - /// - /// ``` -- /// # extern crate tempfile; -- /// # extern crate nix; - /// # use nix::errno::Errno; - /// # use nix::Error; - /// # use nix::sys::aio::*; -@@ -394,9 +387,6 @@ impl<'a> AioCb<'a> { - /// Create an `AioCb` from a `Bytes` object - /// - /// ``` -- /// # extern crate bytes; -- /// # extern crate tempfile; -- /// # extern crate nix; - /// # use bytes::Bytes; - /// # use nix::sys::aio::*; - /// # use nix::sys::signal::SigevNotify; -@@ -419,9 +409,6 @@ impl<'a> AioCb<'a> { - /// using an un`Box`ed `Bytes` object. - /// - /// ``` -- /// # extern crate bytes; -- /// # extern crate tempfile; -- /// # extern crate nix; - /// # use bytes::Bytes; - /// # use nix::sys::aio::*; - /// # use nix::sys::signal::SigevNotify; -@@ -480,8 +467,6 @@ impl<'a> AioCb<'a> { - /// Create an `AioCb` from a Vector and use it for reading - /// - /// ``` -- /// # extern crate tempfile; -- /// # extern crate nix; - /// # use nix::errno::Errno; - /// # use nix::Error; - /// # use nix::sys::aio::*; -@@ -642,8 +627,6 @@ impl<'a> AioCb<'a> { - /// Construct an `AioCb` from a slice and use it for writing. - /// - /// ``` -- /// # extern crate tempfile; -- /// # extern crate nix; - /// # use nix::errno::Errno; - /// # use nix::Error; - /// # use nix::sys::aio::*; -@@ -726,8 +709,6 @@ impl<'a> AioCb<'a> { - /// result. - /// - /// ``` -- /// # extern crate tempfile; -- /// # extern crate nix; - /// # use nix::errno::Errno; - /// # use nix::Error; - /// # use nix::sys::aio::*; -@@ -781,8 +762,6 @@ impl<'a> AioCb<'a> { - /// is an alternative to `aio_suspend`, used by most of the other examples. - /// - /// ``` -- /// # extern crate tempfile; -- /// # extern crate nix; - /// # use nix::errno::Errno; - /// # use nix::Error; - /// # use nix::sys::aio::*; -@@ -925,8 +904,6 @@ impl<'a> AioCb<'a> { - /// descriptor. - /// - /// ``` --/// # extern crate tempfile; --/// # extern crate nix; - /// # use nix::errno::Errno; - /// # use nix::Error; - /// # use nix::sys::aio::*; -@@ -978,13 +955,7 @@ pub fn aio_cancel_all(fd: RawFd) -> Result<AioCancelStat> { - /// - /// Use `aio_suspend` to block until an aio operation completes. - /// --// Disable doctest due to a known bug in FreeBSD's 32-bit emulation. The fix --// will be included in release 11.2. --// FIXME reenable the doc test when the CI machine gets upgraded to that release. --// https://svnweb.freebsd.org/base?view=revision&revision=325018 --/// ```no_run --/// # extern crate tempfile; --/// # extern crate nix; -+/// ``` - /// # use nix::sys::aio::*; - /// # use nix::sys::signal::SigevNotify; - /// # use std::os::unix::io::AsRawFd; -@@ -1091,8 +1062,6 @@ impl<'a> LioCb<'a> { - /// [`AioCb::error`] to poll. - /// - /// ``` -- /// # extern crate tempfile; -- /// # extern crate nix; - /// # use nix::sys::aio::*; - /// # use nix::sys::signal::SigevNotify; - /// # use std::os::unix::io::AsRawFd; -@@ -1148,8 +1117,6 @@ impl<'a> LioCb<'a> { - /// - /// # Examples - /// ```no_run -- /// # extern crate tempfile; -- /// # extern crate nix; - /// # use nix::Error; - /// # use nix::errno::Errno; - /// # use nix::sys::aio::*; -@@ -1213,7 +1180,6 @@ impl<'a> LioCb<'a> { - }, - Err(Error::Sys(Errno::EINPROGRESS)) => { - // aiocb is was successfully queued; no need to do anything -- () - }, - Err(Error::Sys(Errno::EINVAL)) => panic!( - "AioCb was never submitted, or already finalized"), -diff --git a/third_party/rust/nix/src/sys/epoll.rs b/third_party/rust/nix/src/sys/epoll.rs -index fef6f4e3ec92c..2437bbe2ddb3b 100644 ---- a/third_party/rust/nix/src/sys/epoll.rs -+++ b/third_party/rust/nix/src/sys/epoll.rs -@@ -1,10 +1,10 @@ --use Result; --use errno::Errno; -+use crate::Result; -+use crate::errno::Errno; - use libc::{self, c_int}; - use std::os::unix::io::RawFd; - use std::ptr; - use std::mem; --use ::Error; -+use crate::Error; - - libc_bitflags!( - pub struct EpollFlags: c_int { -@@ -43,7 +43,7 @@ libc_bitflags!{ - } - - #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] --#[repr(C)] -+#[repr(transparent)] - pub struct EpollEvent { - event: libc::epoll_event, - } -diff --git a/third_party/rust/nix/src/sys/event.rs b/third_party/rust/nix/src/sys/event.rs -index 8cd7372f88188..8050af313245d 100644 ---- a/third_party/rust/nix/src/sys/event.rs -+++ b/third_party/rust/nix/src/sys/event.rs -@@ -1,12 +1,11 @@ - /* TOOD: Implement for other kqueue based systems - */ - --use {Errno, Result}; -+use crate::{Errno, Result}; - #[cfg(not(target_os = "netbsd"))] - use libc::{timespec, time_t, c_int, c_long, intptr_t, uintptr_t}; - #[cfg(target_os = "netbsd")] - use libc::{timespec, time_t, c_long, intptr_t, uintptr_t, size_t}; --use libc; - use std::os::unix::io::RawFd; - use std::ptr; - use std::mem; -@@ -28,7 +27,7 @@ type type_of_data = intptr_t; - #[cfg(any(target_os = "netbsd"))] - type type_of_udata = intptr_t; - #[cfg(any(target_os = "netbsd", target_os = "openbsd"))] --type type_of_data = libc::int64_t; -+type type_of_data = i64; - - #[cfg(target_os = "netbsd")] - type type_of_event_filter = u32; -@@ -90,14 +89,9 @@ libc_bitflags!{ - EV_CLEAR; - EV_DELETE; - EV_DISABLE; -- // No released version of OpenBSD supports EV_DISPATCH or EV_RECEIPT. -- // These have been commited to the -current branch though and are -- // expected to be part of the OpenBSD 6.2 release in Nov 2017. -- // See: https://marc.info/?l=openbsd-tech&m=149621427511219&w=2 -- // https://github.com/rust-lang/libc/pull/613 - #[cfg(any(target_os = "dragonfly", target_os = "freebsd", - target_os = "ios", target_os = "macos", -- target_os = "netbsd"))] -+ target_os = "netbsd", target_os = "openbsd"))] - EV_DISPATCH; - #[cfg(target_os = "freebsd")] - EV_DROP; -@@ -116,7 +110,7 @@ libc_bitflags!{ - EV_POLL; - #[cfg(any(target_os = "dragonfly", target_os = "freebsd", - target_os = "ios", target_os = "macos", -- target_os = "netbsd"))] -+ target_os = "netbsd", target_os = "openbsd"))] - EV_RECEIPT; - EV_SYSFLAGS; - } -@@ -134,10 +128,6 @@ libc_bitflags!( - NOTE_EXEC; - NOTE_EXIT; - #[cfg(any(target_os = "macos", target_os = "ios"))] -- #[deprecated( since="0.14.0", note="Deprecated since OSX 10.9")] -- #[allow(deprecated)] -- NOTE_EXIT_REPARENTED; -- #[cfg(any(target_os = "macos", target_os = "ios"))] - NOTE_EXITSTATUS; - NOTE_EXTEND; - #[cfg(any(target_os = "macos", -@@ -183,11 +173,6 @@ libc_bitflags!( - NOTE_OOB; - NOTE_PCTRLMASK; - NOTE_PDATAMASK; -- #[cfg(any(target_os = "macos", target_os = "ios"))] -- #[cfg(any(target_os = "macos", target_os = "ios"))] -- #[deprecated( since="0.14.0", note="Deprecated since OSX 10.9")] -- #[allow(deprecated)] -- NOTE_REAP; - NOTE_RENAME; - NOTE_REVOKE; - #[cfg(any(target_os = "macos", target_os = "ios", target_os = "freebsd"))] -@@ -234,7 +219,7 @@ impl KEvent { - pub fn new(ident: uintptr_t, filter: EventFilter, flags: EventFlag, - fflags:FilterFlag, data: intptr_t, udata: intptr_t) -> KEvent { - KEvent { kevent: libc::kevent { -- ident: ident, -+ ident, - filter: filter as type_of_event_filter, - flags: flags.bits(), - fflags: fflags.bits(), -@@ -329,23 +314,17 @@ pub fn ev_set(ev: &mut KEvent, - fn test_struct_kevent() { - let udata : intptr_t = 12345; - -- let expected = libc::kevent{ident: 0xdead_beef, -- filter: libc::EVFILT_READ, -- flags: libc::EV_ONESHOT | libc::EV_ADD, -- fflags: libc::NOTE_CHILD | libc::NOTE_EXIT, -- data: 0x1337, -- udata: udata as type_of_udata}; - let actual = KEvent::new(0xdead_beef, - EventFilter::EVFILT_READ, - EventFlag::EV_ONESHOT | EventFlag::EV_ADD, - FilterFlag::NOTE_CHILD | FilterFlag::NOTE_EXIT, - 0x1337, - udata); -- assert!(expected.ident == actual.ident()); -- assert!(expected.filter == actual.filter() as type_of_event_filter); -- assert!(expected.flags == actual.flags().bits()); -- assert!(expected.fflags == actual.fflags().bits()); -- assert!(expected.data == actual.data() as type_of_data); -- assert!(expected.udata == actual.udata() as type_of_udata); -- assert!(mem::size_of::<libc::kevent>() == mem::size_of::<KEvent>()); -+ assert_eq!(0xdead_beef, actual.ident()); -+ assert_eq!(libc::EVFILT_READ, actual.filter() as type_of_event_filter); -+ assert_eq!(libc::EV_ONESHOT | libc::EV_ADD, actual.flags().bits()); -+ assert_eq!(libc::NOTE_CHILD | libc::NOTE_EXIT, actual.fflags().bits()); -+ assert_eq!(0x1337, actual.data() as type_of_data); -+ assert_eq!(udata as type_of_udata, actual.udata() as type_of_udata); -+ assert_eq!(mem::size_of::<libc::kevent>(), mem::size_of::<KEvent>()); - } -diff --git a/third_party/rust/nix/src/sys/eventfd.rs b/third_party/rust/nix/src/sys/eventfd.rs -index c5a54e46a1735..baaaa89ddd52e 100644 ---- a/third_party/rust/nix/src/sys/eventfd.rs -+++ b/third_party/rust/nix/src/sys/eventfd.rs -@@ -1,7 +1,7 @@ - use libc; - use std::os::unix::io::RawFd; --use Result; --use errno::Errno; -+use crate::Result; -+use crate::errno::Errno; - - libc_bitflags! { - pub struct EfdFlags: libc::c_int { -diff --git a/third_party/rust/nix/src/sys/inotify.rs b/third_party/rust/nix/src/sys/inotify.rs -index e6c2cf64d29dc..4880a4a514e77 100644 ---- a/third_party/rust/nix/src/sys/inotify.rs -+++ b/third_party/rust/nix/src/sys/inotify.rs -@@ -23,19 +23,19 @@ - //! } - //! ``` - --use libc; - use libc::{ - c_char, - c_int, - }; - use std::ffi::{OsString,OsStr,CStr}; - use std::os::unix::ffi::OsStrExt; --use std::mem::size_of; -+use std::mem::{MaybeUninit, size_of}; - use std::os::unix::io::{RawFd,AsRawFd,FromRawFd}; --use unistd::read; --use Result; --use NixPath; --use errno::Errno; -+use std::ptr; -+use crate::unistd::read; -+use crate::Result; -+use crate::NixPath; -+use crate::errno::Errno; - - libc_bitflags! { - /// Configuration options for [`inotify_add_watch`](fn.inotify_add_watch.html). -@@ -131,7 +131,7 @@ impl Inotify { - /// Returns a watch descriptor. This is not a File Descriptor! - /// - /// For more information see, [inotify_add_watch(2)](http://man7.org/linux/man-pages/man2/inotify_add_watch.2.html). -- pub fn add_watch<P: ?Sized + NixPath>(&self, -+ pub fn add_watch<P: ?Sized + NixPath>(self, - path: &P, - mask: AddWatchFlags) - -> Result<WatchDescriptor> -@@ -152,14 +152,14 @@ impl Inotify { - /// - /// For more information see, [inotify_rm_watch(2)](http://man7.org/linux/man-pages/man2/inotify_rm_watch.2.html). - #[cfg(target_os = "linux")] -- pub fn rm_watch(&self, wd: WatchDescriptor) -> Result<()> { -+ pub fn rm_watch(self, wd: WatchDescriptor) -> Result<()> { - let res = unsafe { libc::inotify_rm_watch(self.fd, wd.wd) }; - - Errno::result(res).map(drop) - } - - #[cfg(target_os = "android")] -- pub fn rm_watch(&self, wd: WatchDescriptor) -> Result<()> { -+ pub fn rm_watch(self, wd: WatchDescriptor) -> Result<()> { - let res = unsafe { libc::inotify_rm_watch(self.fd, wd.wd as u32) }; - - Errno::result(res).map(drop) -@@ -171,9 +171,10 @@ impl Inotify { - /// - /// Returns as many events as available. If the call was non blocking and no - /// events could be read then the EAGAIN error is returned. -- pub fn read_events(&self) -> Result<Vec<InotifyEvent>> { -+ pub fn read_events(self) -> Result<Vec<InotifyEvent>> { - let header_size = size_of::<libc::inotify_event>(); -- let mut buffer = [0u8; 4096]; -+ const BUFSIZ: usize = 4096; -+ let mut buffer = [0u8; BUFSIZ]; - let mut events = Vec::new(); - let mut offset = 0; - -@@ -181,11 +182,13 @@ impl Inotify { - - while (nread - offset) >= header_size { - let event = unsafe { -- &*( -- buffer -- .as_ptr() -- .offset(offset as isize) as *const libc::inotify_event -- ) -+ let mut event = MaybeUninit::<libc::inotify_event>::uninit(); -+ ptr::copy_nonoverlapping( -+ buffer.as_ptr().add(offset), -+ event.as_mut_ptr() as *mut u8, -+ (BUFSIZ - offset).min(header_size) -+ ); -+ event.assume_init() - }; - - let name = match event.len { -@@ -194,7 +197,7 @@ impl Inotify { - let ptr = unsafe { - buffer - .as_ptr() -- .offset(offset as isize + header_size as isize) -+ .add(offset + header_size) - as *const c_char - }; - let cstr = unsafe { CStr::from_ptr(ptr) }; -diff --git a/third_party/rust/nix/src/sys/ioctl/bsd.rs b/third_party/rust/nix/src/sys/ioctl/bsd.rs -index 9b8b0ff1a155f..f39c0eb688f8a 100644 ---- a/third_party/rust/nix/src/sys/ioctl/bsd.rs -+++ b/third_party/rust/nix/src/sys/ioctl/bsd.rs -@@ -6,7 +6,7 @@ pub type ioctl_num_type = ::libc::c_ulong; - pub type ioctl_param_type = ::libc::c_int; - - mod consts { -- use ::sys::ioctl::ioctl_num_type; -+ use crate::sys::ioctl::ioctl_num_type; - #[doc(hidden)] - pub const VOID: ioctl_num_type = 0x2000_0000; - #[doc(hidden)] -@@ -14,7 +14,7 @@ mod consts { - #[doc(hidden)] - pub const IN: ioctl_num_type = 0x8000_0000; - #[doc(hidden)] -- pub const INOUT: ioctl_num_type = (IN|OUT); -+ pub const INOUT: ioctl_num_type = IN|OUT; - #[doc(hidden)] - pub const IOCPARM_MASK: ioctl_num_type = 0x1fff; - } -diff --git a/third_party/rust/nix/src/sys/ioctl/linux.rs b/third_party/rust/nix/src/sys/ioctl/linux.rs -index 9cdac72a4b80b..68ebaba9bf496 100644 ---- a/third_party/rust/nix/src/sys/ioctl/linux.rs -+++ b/third_party/rust/nix/src/sys/ioctl/linux.rs -@@ -33,7 +33,8 @@ mod consts { - target_arch = "arm", - target_arch = "s390x", - target_arch = "x86_64", -- target_arch = "aarch64"))] -+ target_arch = "aarch64", -+ target_arch = "riscv64"))] - mod consts { - #[doc(hidden)] - pub const NONE: u8 = 0; -diff --git a/third_party/rust/nix/src/sys/ioctl/mod.rs b/third_party/rust/nix/src/sys/ioctl/mod.rs -index 4513bf877434a..8858a9d57779f 100644 ---- a/third_party/rust/nix/src/sys/ioctl/mod.rs -+++ b/third_party/rust/nix/src/sys/ioctl/mod.rs -@@ -29,7 +29,7 @@ - //! Historically `ioctl` numbers were arbitrary hard-coded values. In Linux (before 2.6) and some - //! unices this has changed to a more-ordered system where the ioctl numbers are partitioned into - //! subcomponents (For linux this is documented in --//! [`Documentation/ioctl/ioctl-number.txt`](http://elixir.free-electrons.com/linux/latest/source/Documentation/ioctl/ioctl-number.txt)): -+//! [`Documentation/ioctl/ioctl-number.rst`](https://elixir.bootlin.com/linux/latest/source/Documentation/userspace-api/ioctl/ioctl-number.rst)): - //! - //! * Number: The actual ioctl ID - //! * Type: A grouping of ioctls for a common purpose or driver -@@ -221,11 +221,13 @@ - //! - //! # fn main() {} - //! ``` --#[cfg(any(target_os = "android", target_os = "linux"))] -+use cfg_if::cfg_if; -+ -+#[cfg(any(target_os = "android", target_os = "linux", target_os = "redox"))] - #[macro_use] - mod linux; - --#[cfg(any(target_os = "android", target_os = "linux"))] -+#[cfg(any(target_os = "android", target_os = "linux", target_os = "redox"))] - pub use self::linux::*; - - #[cfg(any(target_os = "dragonfly", -@@ -317,7 +319,6 @@ macro_rules! ioctl_none { - /// - /// ```no_run - /// # #[macro_use] extern crate nix; --/// # extern crate libc; - /// # use libc::TIOCNXCL; - /// # use std::fs::File; - /// # use std::os::unix::io::AsRawFd; -@@ -396,7 +397,6 @@ macro_rules! ioctl_read { - /// # Example - /// - /// ``` --/// # extern crate libc; - /// # #[macro_use] extern crate nix; - /// # #[cfg(any(target_os = "android", target_os = "linux"))] - /// ioctl_read_bad!(tcgets, libc::TCGETS, libc::termios); -@@ -470,7 +470,6 @@ macro_rules! ioctl_write_ptr { - /// # Example - /// - /// ``` --/// # extern crate libc; - /// # #[macro_use] extern crate nix; - /// # #[cfg(any(target_os = "android", target_os = "linux"))] - /// ioctl_write_ptr_bad!(tcsets, libc::TCSETS, libc::termios); -@@ -590,7 +589,6 @@ cfg_if!{ - /// # Examples - /// - /// ``` --/// # extern crate libc; - /// # #[macro_use] extern crate nix; - /// # #[cfg(any(target_os = "android", target_os = "linux"))] - /// ioctl_write_int_bad!(tcsbrk, libc::TCSBRK); -diff --git a/third_party/rust/nix/src/sys/memfd.rs b/third_party/rust/nix/src/sys/memfd.rs -index 9672429b31e7f..51b7e6b18849b 100644 ---- a/third_party/rust/nix/src/sys/memfd.rs -+++ b/third_party/rust/nix/src/sys/memfd.rs -@@ -1,7 +1,7 @@ - use libc; - use std::os::unix::io::RawFd; --use Result; --use errno::Errno; -+use crate::Result; -+use crate::errno::Errno; - use std::ffi::CStr; - - libc_bitflags!( -diff --git a/third_party/rust/nix/src/sys/mman.rs b/third_party/rust/nix/src/sys/mman.rs -index 4e250501dd0f0..63a0779c19382 100644 ---- a/third_party/rust/nix/src/sys/mman.rs -+++ b/third_party/rust/nix/src/sys/mman.rs -@@ -1,12 +1,12 @@ --use {Error, Result}; -+use crate::{Error, Result}; - #[cfg(not(target_os = "android"))] --use NixPath; --use errno::Errno; -+use crate::NixPath; -+use crate::errno::Errno; - #[cfg(not(target_os = "android"))] --use fcntl::OFlag; -+use crate::fcntl::OFlag; - use libc::{self, c_int, c_void, size_t, off_t}; - #[cfg(not(target_os = "android"))] --use sys::stat::Mode; -+use crate::sys::stat::Mode; - use std::os::unix::io::RawFd; - - libc_bitflags!{ -@@ -77,6 +77,43 @@ libc_bitflags!{ - /// Allocate the mapping using "huge pages." - #[cfg(any(target_os = "android", target_os = "linux"))] - MAP_HUGETLB; -+ /// Make use of 64KB huge page (must be supported by the system) -+ #[cfg(target_os = "linux")] -+ MAP_HUGE_64KB; -+ /// Make use of 512KB huge page (must be supported by the system) -+ #[cfg(target_os = "linux")] -+ MAP_HUGE_512KB; -+ /// Make use of 1MB huge page (must be supported by the system) -+ #[cfg(target_os = "linux")] -+ MAP_HUGE_1MB; -+ /// Make use of 2MB huge page (must be supported by the system) -+ #[cfg(target_os = "linux")] -+ MAP_HUGE_2MB; -+ /// Make use of 8MB huge page (must be supported by the system) -+ #[cfg(target_os = "linux")] -+ MAP_HUGE_8MB; -+ /// Make use of 16MB huge page (must be supported by the system) -+ #[cfg(target_os = "linux")] -+ MAP_HUGE_16MB; -+ /// Make use of 32MB huge page (must be supported by the system) -+ #[cfg(target_os = "linux")] -+ MAP_HUGE_32MB; -+ /// Make use of 256MB huge page (must be supported by the system) -+ #[cfg(target_os = "linux")] -+ MAP_HUGE_256MB; -+ /// Make use of 512MB huge page (must be supported by the system) -+ #[cfg(target_os = "linux")] -+ MAP_HUGE_512MB; -+ /// Make use of 1GB huge page (must be supported by the system) -+ #[cfg(target_os = "linux")] -+ MAP_HUGE_1GB; -+ /// Make use of 2GB huge page (must be supported by the system) -+ #[cfg(target_os = "linux")] -+ MAP_HUGE_2GB; -+ /// Make use of 16GB huge page (must be supported by the system) -+ #[cfg(target_os = "linux")] -+ MAP_HUGE_16GB; -+ - /// Lock the mapped region into memory as with `mlock(2)`. - #[cfg(target_os = "netbsd")] - MAP_WIRED; -@@ -102,6 +139,17 @@ libc_bitflags!{ - } - } - -+#[cfg(target_os = "linux")] -+libc_bitflags!{ -+ /// Options for `mremap()`. -+ pub struct MRemapFlags: c_int { -+ /// Permit the kernel to relocate the mapping to a new virtual address, if necessary. -+ MREMAP_MAYMOVE; -+ /// Place the mapping at exactly the address specified in `new_address`. -+ MREMAP_FIXED; -+ } -+} -+ - libc_enum!{ - /// Usage information for a range of memory to allow for performance optimizations by the kernel. - /// -@@ -223,20 +271,37 @@ libc_bitflags!{ - } - } - --/// Locks all memory pages that contain part of the address range with `length` bytes starting at --/// `addr`. Locked pages never move to the swap area. -+/// Locks all memory pages that contain part of the address range with `length` -+/// bytes starting at `addr`. -+/// -+/// Locked pages never move to the swap area. -+/// -+/// # Safety -+/// -+/// `addr` must meet all the requirements described in the `mlock(2)` man page. - pub unsafe fn mlock(addr: *const c_void, length: size_t) -> Result<()> { - Errno::result(libc::mlock(addr, length)).map(drop) - } - --/// Unlocks all memory pages that contain part of the address range with `length` bytes starting at --/// `addr`. -+/// Unlocks all memory pages that contain part of the address range with -+/// `length` bytes starting at `addr`. -+/// -+/// # Safety -+/// -+/// `addr` must meet all the requirements described in the `munlock(2)` man -+/// page. - pub unsafe fn munlock(addr: *const c_void, length: size_t) -> Result<()> { - Errno::result(libc::munlock(addr, length)).map(drop) - } - --/// Locks all memory pages mapped into this process' address space. Locked pages never move to the --/// swap area. -+/// Locks all memory pages mapped into this process' address space. -+/// -+/// Locked pages never move to the swap area. -+/// -+/// # Safety -+/// -+/// `addr` must meet all the requirements described in the `mlockall(2)` man -+/// page. - pub fn mlockall(flags: MlockAllFlags) -> Result<()> { - unsafe { Errno::result(libc::mlockall(flags.bits())) }.map(drop) - } -@@ -246,8 +311,11 @@ pub fn munlockall() -> Result<()> { - unsafe { Errno::result(libc::munlockall()) }.map(drop) - } - --/// Calls to mmap are inherently unsafe, so they must be made in an unsafe block. Typically --/// a higher-level abstraction will hide the unsafe interactions with the mmap'd region. -+/// allocate memory, or map files or devices into memory -+/// -+/// # Safety -+/// -+/// See the `mmap(2)` man page for detailed requirements. - pub unsafe fn mmap(addr: *mut c_void, length: size_t, prot: ProtFlags, flags: MapFlags, fd: RawFd, offset: off_t) -> Result<*mut c_void> { - let ret = libc::mmap(addr, length, prot.bits(), flags.bits(), fd, offset); - -@@ -258,10 +326,46 @@ pub unsafe fn mmap(addr: *mut c_void, length: size_t, prot: ProtFlags, flags: Ma - } - } - -+/// Expands (or shrinks) an existing memory mapping, potentially moving it at -+/// the same time. -+/// -+/// # Safety -+/// -+/// See the `mremap(2)` [man page](https://man7.org/linux/man-pages/man2/mremap.2.html) for -+/// detailed requirements. -+#[cfg(target_os = "linux")] -+pub unsafe fn mremap( -+ addr: *mut c_void, -+ old_size: size_t, -+ new_size: size_t, -+ flags: MRemapFlags, -+ new_address: Option<* mut c_void>, -+) -> Result<*mut c_void> { -+ let ret = libc::mremap(addr, old_size, new_size, flags.bits(), new_address.unwrap_or(std::ptr::null_mut())); -+ -+ if ret == libc::MAP_FAILED { -+ Err(Error::Sys(Errno::last())) -+ } else { -+ Ok(ret) -+ } -+} -+ -+/// remove a mapping -+/// -+/// # Safety -+/// -+/// `addr` must meet all the requirements described in the `munmap(2)` man -+/// page. - pub unsafe fn munmap(addr: *mut c_void, len: size_t) -> Result<()> { - Errno::result(libc::munmap(addr, len)).map(drop) - } - -+/// give advice about use of memory -+/// -+/// # Safety -+/// -+/// See the `madvise(2)` man page. Take special care when using -+/// `MmapAdvise::MADV_FREE`. - pub unsafe fn madvise(addr: *mut c_void, length: size_t, advise: MmapAdvise) -> Result<()> { - Errno::result(libc::madvise(addr, length, advise as i32)).map(drop) - } -@@ -295,6 +399,12 @@ pub unsafe fn mprotect(addr: *mut c_void, length: size_t, prot: ProtFlags) -> Re - Errno::result(libc::mprotect(addr, length, prot.bits())).map(drop) - } - -+/// synchronize a mapped region -+/// -+/// # Safety -+/// -+/// `addr` must meet all the requirements described in the `msync(2)` man -+/// page. - pub unsafe fn msync(addr: *mut c_void, length: size_t, flags: MsFlags) -> Result<()> { - Errno::result(libc::msync(addr, length, flags.bits())).map(drop) - } -diff --git a/third_party/rust/nix/src/sys/mod.rs b/third_party/rust/nix/src/sys/mod.rs -index d3c2f92bbaaea..438fb4fdcb438 100644 ---- a/third_party/rust/nix/src/sys/mod.rs -+++ b/third_party/rust/nix/src/sys/mod.rs -@@ -25,6 +25,7 @@ pub mod eventfd; - target_os = "freebsd", - target_os = "ios", - target_os = "linux", -+ target_os = "redox", - target_os = "macos", - target_os = "netbsd", - target_os = "openbsd"))] -@@ -34,8 +35,12 @@ pub mod ioctl; - #[cfg(target_os = "linux")] - pub mod memfd; - -+#[cfg(not(target_os = "redox"))] - pub mod mman; - -+#[cfg(target_os = "linux")] -+pub mod personality; -+ - pub mod pthread; - - #[cfg(any(target_os = "android", -@@ -53,6 +58,7 @@ pub mod quota; - #[cfg(any(target_os = "linux"))] - pub mod reboot; - -+#[cfg(not(target_os = "redox"))] - pub mod select; - - #[cfg(any(target_os = "android", -@@ -67,6 +73,7 @@ pub mod signal; - #[cfg(any(target_os = "android", target_os = "linux"))] - pub mod signalfd; - -+#[cfg(not(target_os = "redox"))] - pub mod socket; - - pub mod stat; -@@ -98,3 +105,6 @@ pub mod wait; - - #[cfg(any(target_os = "android", target_os = "linux"))] - pub mod inotify; -+ -+#[cfg(target_os = "linux")] -+pub mod timerfd; -diff --git a/third_party/rust/nix/src/sys/personality.rs b/third_party/rust/nix/src/sys/personality.rs -new file mode 100644 -index 0000000000000..6548b654aa1f4 ---- /dev/null -+++ b/third_party/rust/nix/src/sys/personality.rs -@@ -0,0 +1,70 @@ -+use crate::Result; -+use crate::errno::Errno; -+ -+use libc::{self, c_int, c_ulong}; -+ -+libc_bitflags! { -+ /// Flags used and returned by [`get()`](fn.get.html) and -+ /// [`set()`](fn.set.html). -+ pub struct Persona: c_int { -+ ADDR_COMPAT_LAYOUT; -+ ADDR_NO_RANDOMIZE; -+ ADDR_LIMIT_32BIT; -+ ADDR_LIMIT_3GB; -+ #[cfg(not(target_env = "musl"))] -+ FDPIC_FUNCPTRS; -+ MMAP_PAGE_ZERO; -+ READ_IMPLIES_EXEC; -+ SHORT_INODE; -+ STICKY_TIMEOUTS; -+ #[cfg(not(target_env = "musl"))] -+ UNAME26; -+ WHOLE_SECONDS; -+ } -+} -+ -+/// Retrieve the current process personality. -+/// -+/// Returns a Result containing a Persona instance. -+/// -+/// Example: -+/// -+/// ``` -+/// # use nix::sys::personality::{self, Persona}; -+/// let pers = personality::get().unwrap(); -+/// assert!(!pers.contains(Persona::WHOLE_SECONDS)); -+/// ``` -+pub fn get() -> Result<Persona> { -+ let res = unsafe { -+ libc::personality(0xFFFFFFFF) -+ }; -+ -+ Errno::result(res).map(|r| Persona::from_bits_truncate(r)) -+} -+ -+/// Set the current process personality. -+/// -+/// Returns a Result containing the *previous* personality for the -+/// process, as a Persona. -+/// -+/// For more information, see [personality(2)](https://man7.org/linux/man-pages/man2/personality.2.html) -+/// -+/// **NOTE**: This call **replaces** the current personality entirely. -+/// To **update** the personality, first call `get()` and then `set()` -+/// with the modified persona. -+/// -+/// Example: -+/// -+/// ``` -+/// # use nix::sys::personality::{self, Persona}; -+/// let mut pers = personality::get().unwrap(); -+/// assert!(!pers.contains(Persona::ADDR_NO_RANDOMIZE)); -+/// personality::set(pers | Persona::ADDR_NO_RANDOMIZE); -+/// ``` -+pub fn set(persona: Persona) -> Result<Persona> { -+ let res = unsafe { -+ libc::personality(persona.bits() as c_ulong) -+ }; -+ -+ Errno::result(res).map(|r| Persona::from_bits_truncate(r)) -+} -diff --git a/third_party/rust/nix/src/sys/ptrace/bsd.rs b/third_party/rust/nix/src/sys/ptrace/bsd.rs -index 7797d10647ef4..e85afc761198b 100644 ---- a/third_party/rust/nix/src/sys/ptrace/bsd.rs -+++ b/third_party/rust/nix/src/sys/ptrace/bsd.rs -@@ -1,9 +1,10 @@ --use errno::Errno; -+use cfg_if::cfg_if; -+use crate::errno::Errno; - use libc::{self, c_int}; - use std::ptr; --use sys::signal::Signal; --use unistd::Pid; --use Result; -+use crate::sys::signal::Signal; -+use crate::unistd::Pid; -+use crate::Result; - - pub type RequestType = c_int; - -@@ -77,16 +78,23 @@ pub fn traceme() -> Result<()> { - - /// Attach to a running process, as with `ptrace(PT_ATTACH, ...)` - /// --/// Attaches to the process specified in pid, making it a tracee of the calling process. -+/// Attaches to the process specified by `pid`, making it a tracee of the calling process. - pub fn attach(pid: Pid) -> Result<()> { - unsafe { ptrace_other(Request::PT_ATTACH, pid, ptr::null_mut(), 0).map(drop) } - } - - /// Detaches the current running process, as with `ptrace(PT_DETACH, ...)` - /// --/// Detaches from the process specified in pid allowing it to run freely --pub fn detach(pid: Pid) -> Result<()> { -- unsafe { ptrace_other(Request::PT_DETACH, pid, ptr::null_mut(), 0).map(drop) } -+/// Detaches from the process specified by `pid` allowing it to run freely, optionally delivering a -+/// signal specified by `sig`. -+pub fn detach<T: Into<Option<Signal>>>(pid: Pid, sig: T) -> Result<()> { -+ let data = match sig.into() { -+ Some(s) => s as c_int, -+ None => 0, -+ }; -+ unsafe { -+ ptrace_other(Request::PT_DETACH, pid, ptr::null_mut(), data).map(drop) -+ } - } - - /// Restart the stopped tracee process, as with `ptrace(PTRACE_CONT, ...)` -@@ -121,7 +129,6 @@ pub fn kill(pid: Pid) -> Result<()> { - /// - /// # Example - /// ```rust --/// extern crate nix; - /// use nix::sys::ptrace::step; - /// use nix::unistd::Pid; - /// use nix::sys::signal::Signal; -diff --git a/third_party/rust/nix/src/sys/ptrace/linux.rs b/third_party/rust/nix/src/sys/ptrace/linux.rs -index df15e66527562..8d1dd16e5dd76 100644 ---- a/third_party/rust/nix/src/sys/ptrace/linux.rs -+++ b/third_party/rust/nix/src/sys/ptrace/linux.rs -@@ -1,18 +1,21 @@ - //! For detailed description of the ptrace requests, consult `man ptrace`. - -+use cfg_if::cfg_if; - use std::{mem, ptr}; --use {Error, Result}; --use errno::Errno; -+use crate::{Error, Result}; -+use crate::errno::Errno; - use libc::{self, c_void, c_long, siginfo_t}; --use ::unistd::Pid; --use sys::signal::Signal; -+use crate::unistd::Pid; -+use crate::sys::signal::Signal; - - pub type AddressType = *mut ::libc::c_void; - --#[cfg(all(target_os = "linux", -- any(target_arch = "x86_64", -- target_arch = "x86"), -- target_env = "gnu"))] -+#[cfg(all( -+ target_os = "linux", -+ any(all(target_arch = "x86_64", -+ any(target_env = "gnu", target_env = "musl")), -+ all(target_arch = "x86", target_env = "gnu")) -+))] - use libc::user_regs_struct; - - cfg_if! { -@@ -106,6 +109,12 @@ libc_enum!{ - #[cfg(all(target_os = "linux", not(any(target_arch = "mips", - target_arch = "mips64"))))] - PTRACE_PEEKSIGINFO, -+ #[cfg(all(target_os = "linux", target_env = "gnu", -+ any(target_arch = "x86", target_arch = "x86_64")))] -+ PTRACE_SYSEMU, -+ #[cfg(all(target_os = "linux", target_env = "gnu", -+ any(target_arch = "x86", target_arch = "x86_64")))] -+ PTRACE_SYSEMU_SINGLESTEP, - } - } - -@@ -165,22 +174,6 @@ libc_bitflags! { - } - } - --/// Performs a ptrace request. If the request in question is provided by a specialised function --/// this function will return an unsupported operation error. --#[deprecated( -- since="0.10.0", -- note="usages of `ptrace()` should be replaced with the specialized helper functions instead" --)] --pub unsafe fn ptrace(request: Request, pid: Pid, addr: AddressType, data: *mut c_void) -> Result<c_long> { -- use self::Request::*; -- match request { -- PTRACE_PEEKTEXT | PTRACE_PEEKDATA | PTRACE_GETSIGINFO | -- PTRACE_GETEVENTMSG | PTRACE_SETSIGINFO | PTRACE_SETOPTIONS | -- PTRACE_POKETEXT | PTRACE_POKEDATA | PTRACE_KILL => Err(Error::UnsupportedOperation), -- _ => ptrace_other(request, pid, addr, data) -- } --} -- - fn ptrace_peek(request: Request, pid: Pid, addr: AddressType, data: *mut c_void) -> Result<c_long> { - let ret = unsafe { - Errno::clear(); -@@ -193,19 +186,23 @@ fn ptrace_peek(request: Request, pid: Pid, addr: AddressType, data: *mut c_void) - } - - /// Get user registers, as with `ptrace(PTRACE_GETREGS, ...)` --#[cfg(all(target_os = "linux", -- any(target_arch = "x86_64", -- target_arch = "x86"), -- target_env = "gnu"))] -+#[cfg(all( -+ target_os = "linux", -+ any(all(target_arch = "x86_64", -+ any(target_env = "gnu", target_env = "musl")), -+ all(target_arch = "x86", target_env = "gnu")) -+))] - pub fn getregs(pid: Pid) -> Result<user_regs_struct> { - ptrace_get_data::<user_regs_struct>(Request::PTRACE_GETREGS, pid) - } - - /// Set user registers, as with `ptrace(PTRACE_SETREGS, ...)` --#[cfg(all(target_os = "linux", -- any(target_arch = "x86_64", -- target_arch = "x86"), -- target_env = "gnu"))] -+#[cfg(all( -+ target_os = "linux", -+ any(all(target_arch = "x86_64", -+ any(target_env = "gnu", target_env = "musl")), -+ all(target_arch = "x86", target_env = "gnu")) -+))] - pub fn setregs(pid: Pid, regs: user_regs_struct) -> Result<()> { - let res = unsafe { - libc::ptrace(Request::PTRACE_SETREGS as RequestType, -@@ -221,16 +218,15 @@ pub fn setregs(pid: Pid, regs: user_regs_struct) -> Result<()> { - /// and therefore use the data field to return values. This function handles these - /// requests. - fn ptrace_get_data<T>(request: Request, pid: Pid) -> Result<T> { -- // Creates an uninitialized pointer to store result in -- let data: T = unsafe { mem::uninitialized() }; -+ let mut data = mem::MaybeUninit::uninit(); - let res = unsafe { - libc::ptrace(request as RequestType, - libc::pid_t::from(pid), - ptr::null_mut::<T>(), -- &data as *const _ as *const c_void) -+ data.as_mut_ptr() as *const _ as *const c_void) - }; - Errno::result(res)?; -- Ok(data) -+ Ok(unsafe{ data.assume_init() }) - } - - unsafe fn ptrace_other(request: Request, pid: Pid, addr: AddressType, data: *mut c_void) -> Result<c_long> { -@@ -288,23 +284,45 @@ pub fn traceme() -> Result<()> { - } - } - --/// Ask for next syscall, as with `ptrace(PTRACE_SYSCALL, ...)` -+/// Continue execution until the next syscall, as with `ptrace(PTRACE_SYSCALL, ...)` - /// --/// Arranges for the tracee to be stopped at the next entry to or exit from a system call. --pub fn syscall(pid: Pid) -> Result<()> { -+/// Arranges for the tracee to be stopped at the next entry to or exit from a system call, -+/// optionally delivering a signal specified by `sig`. -+pub fn syscall<T: Into<Option<Signal>>>(pid: Pid, sig: T) -> Result<()> { -+ let data = match sig.into() { -+ Some(s) => s as i32 as *mut c_void, -+ None => ptr::null_mut(), -+ }; - unsafe { - ptrace_other( - Request::PTRACE_SYSCALL, - pid, - ptr::null_mut(), -- ptr::null_mut(), -+ data, - ).map(drop) // ignore the useless return value - } - } - -+/// Continue execution until the next syscall, as with `ptrace(PTRACE_SYSEMU, ...)` -+/// -+/// In contrast to the `syscall` function, the syscall stopped at will not be executed. -+/// Thus the the tracee will only be stopped once per syscall, -+/// optionally delivering a signal specified by `sig`. -+#[cfg(all(target_os = "linux", target_env = "gnu", any(target_arch = "x86", target_arch = "x86_64")))] -+pub fn sysemu<T: Into<Option<Signal>>>(pid: Pid, sig: T) -> Result<()> { -+ let data = match sig.into() { -+ Some(s) => s as i32 as *mut c_void, -+ None => ptr::null_mut(), -+ }; -+ unsafe { -+ ptrace_other(Request::PTRACE_SYSEMU, pid, ptr::null_mut(), data).map(drop) -+ // ignore the useless return value -+ } -+} -+ - /// Attach to a running process, as with `ptrace(PTRACE_ATTACH, ...)` - /// --/// Attaches to the process specified in pid, making it a tracee of the calling process. -+/// Attaches to the process specified by `pid`, making it a tracee of the calling process. - pub fn attach(pid: Pid) -> Result<()> { - unsafe { - ptrace_other( -@@ -316,16 +334,36 @@ pub fn attach(pid: Pid) -> Result<()> { - } - } - -+/// Attach to a running process, as with `ptrace(PTRACE_SEIZE, ...)` -+/// -+/// Attaches to the process specified in pid, making it a tracee of the calling process. -+#[cfg(all(target_os = "linux", not(any(target_arch = "mips", target_arch = "mips64"))))] -+pub fn seize(pid: Pid, options: Options) -> Result<()> { -+ unsafe { -+ ptrace_other( -+ Request::PTRACE_SEIZE, -+ pid, -+ ptr::null_mut(), -+ options.bits() as *mut c_void, -+ ).map(drop) // ignore the useless return value -+ } -+} -+ - /// Detaches the current running process, as with `ptrace(PTRACE_DETACH, ...)` - /// --/// Detaches from the process specified in pid allowing it to run freely --pub fn detach(pid: Pid) -> Result<()> { -+/// Detaches from the process specified by `pid` allowing it to run freely, optionally delivering a -+/// signal specified by `sig`. -+pub fn detach<T: Into<Option<Signal>>>(pid: Pid, sig: T) -> Result<()> { -+ let data = match sig.into() { -+ Some(s) => s as i32 as *mut c_void, -+ None => ptr::null_mut(), -+ }; - unsafe { - ptrace_other( - Request::PTRACE_DETACH, - pid, - ptr::null_mut(), -- ptr::null_mut() -+ data - ).map(drop) - } - } -@@ -361,7 +399,6 @@ pub fn kill(pid: Pid) -> Result<()> { - /// - /// # Example - /// ```rust --/// extern crate nix; - /// use nix::sys::ptrace::step; - /// use nix::unistd::Pid; - /// use nix::sys::signal::Signal; -@@ -388,6 +425,28 @@ pub fn step<T: Into<Option<Signal>>>(pid: Pid, sig: T) -> Result<()> { - } - } - -+/// Move the stopped tracee process forward by a single step or stop at the next syscall -+/// as with `ptrace(PTRACE_SYSEMU_SINGLESTEP, ...)` -+/// -+/// Advances the execution by a single step or until the next syscall. -+/// In case the tracee is stopped at a syscall, the syscall will not be executed. -+/// Optionally, the signal specified by `sig` is delivered to the tracee upon continuation. -+#[cfg(all(target_os = "linux", target_env = "gnu", any(target_arch = "x86", target_arch = "x86_64")))] -+pub fn sysemu_step<T: Into<Option<Signal>>>(pid: Pid, sig: T) -> Result<()> { -+ let data = match sig.into() { -+ Some(s) => s as i32 as *mut c_void, -+ None => ptr::null_mut(), -+ }; -+ unsafe { -+ ptrace_other( -+ Request::PTRACE_SYSEMU_SINGLESTEP, -+ pid, -+ ptr::null_mut(), -+ data, -+ ) -+ .map(drop) // ignore the useless return value -+ } -+} - - /// Reads a word from a processes memory at the given address - pub fn read(pid: Pid, addr: AddressType) -> Result<c_long> { -@@ -395,8 +454,15 @@ pub fn read(pid: Pid, addr: AddressType) -> Result<c_long> { - } - - /// Writes a word into the processes memory at the given address --pub fn write(pid: Pid, addr: AddressType, data: *mut c_void) -> Result<()> { -- unsafe { -- ptrace_other(Request::PTRACE_POKEDATA, pid, addr, data).map(drop) -- } -+/// -+/// # Safety -+/// -+/// The `data` argument is passed directly to `ptrace(2)`. Read that man page -+/// for guidance. -+pub unsafe fn write( -+ pid: Pid, -+ addr: AddressType, -+ data: *mut c_void) -> Result<()> -+{ -+ ptrace_other(Request::PTRACE_POKEDATA, pid, addr, data).map(drop) - } -diff --git a/third_party/rust/nix/src/sys/quota.rs b/third_party/rust/nix/src/sys/quota.rs -index 8946fca2213c8..1933013219102 100644 ---- a/third_party/rust/nix/src/sys/quota.rs -+++ b/third_party/rust/nix/src/sys/quota.rs -@@ -15,12 +15,13 @@ - use std::default::Default; - use std::{mem, ptr}; - use libc::{self, c_int, c_char}; --use {Result, NixPath}; --use errno::Errno; -+use crate::{Result, NixPath}; -+use crate::errno::Errno; - - struct QuotaCmd(QuotaSubCmd, QuotaType); - - impl QuotaCmd { -+ #[allow(unused_unsafe)] - fn as_int(&self) -> c_int { - unsafe { libc::QCMD(self.0 as i32, self.1 as i32) } - } -@@ -94,8 +95,7 @@ libc_bitflags!( - ); - - /// Wrapper type for `if_dqblk` --// FIXME: Change to repr(transparent) --#[repr(C)] -+#[repr(transparent)] - #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] - pub struct Dqblk(libc::dqblk); - -@@ -254,15 +254,17 @@ pub fn quotactl_off<P: ?Sized + NixPath>(which: QuotaType, special: &P) -> Resul - } - - /// Update the on-disk copy of quota usages for a filesystem. -+/// -+/// If `special` is `None`, then all file systems with active quotas are sync'd. - pub fn quotactl_sync<P: ?Sized + NixPath>(which: QuotaType, special: Option<&P>) -> Result<()> { - quotactl(QuotaCmd(QuotaSubCmd::Q_SYNC, which), special, 0, ptr::null_mut()) - } - - /// Get disk quota limits and current usage for the given user/group id. - pub fn quotactl_get<P: ?Sized + NixPath>(which: QuotaType, special: &P, id: c_int) -> Result<Dqblk> { -- let mut dqblk = unsafe { mem::uninitialized() }; -- quotactl(QuotaCmd(QuotaSubCmd::Q_GETQUOTA, which), Some(special), id, &mut dqblk as *mut _ as *mut c_char)?; -- dqblk -+ let mut dqblk = mem::MaybeUninit::uninit(); -+ quotactl(QuotaCmd(QuotaSubCmd::Q_GETQUOTA, which), Some(special), id, dqblk.as_mut_ptr() as *mut c_char)?; -+ Ok(unsafe{ Dqblk(dqblk.assume_init())}) - } - - /// Configure quota values for the specified fields for a given user/group id. -diff --git a/third_party/rust/nix/src/sys/reboot.rs b/third_party/rust/nix/src/sys/reboot.rs -index bafa8fc11996d..e319130698e82 100644 ---- a/third_party/rust/nix/src/sys/reboot.rs -+++ b/third_party/rust/nix/src/sys/reboot.rs -@@ -1,9 +1,9 @@ - //! Reboot/shutdown or enable/disable Ctrl-Alt-Delete. - --use {Error, Result}; --use errno::Errno; -+use crate::{Error, Result}; -+use crate::errno::Errno; - use libc; --use void::Void; -+use std::convert::Infallible; - use std::mem::drop; - - libc_enum! { -@@ -22,7 +22,7 @@ libc_enum! { - } - } - --pub fn reboot(how: RebootMode) -> Result<Void> { -+pub fn reboot(how: RebootMode) -> Result<Infallible> { - unsafe { - libc::reboot(how as libc::c_int) - }; -diff --git a/third_party/rust/nix/src/sys/select.rs b/third_party/rust/nix/src/sys/select.rs -index 1b518e29f67a6..a576c7e4929c4 100644 ---- a/third_party/rust/nix/src/sys/select.rs -+++ b/third_party/rust/nix/src/sys/select.rs -@@ -1,24 +1,27 @@ -+use std::iter::FusedIterator; - use std::mem; -+use std::ops::Range; - use std::os::unix::io::RawFd; - use std::ptr::{null, null_mut}; - use libc::{self, c_int}; --use Result; --use errno::Errno; --use sys::signal::SigSet; --use sys::time::{TimeSpec, TimeVal}; -+use crate::Result; -+use crate::errno::Errno; -+use crate::sys::signal::SigSet; -+use crate::sys::time::{TimeSpec, TimeVal}; - - pub use libc::FD_SETSIZE; - --// FIXME: Change to repr(transparent) once it's stable --#[repr(C)] -+#[repr(transparent)] - #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] - pub struct FdSet(libc::fd_set); - - impl FdSet { - pub fn new() -> FdSet { -- let mut fdset = unsafe { mem::uninitialized() }; -- unsafe { libc::FD_ZERO(&mut fdset) }; -- FdSet(fdset) -+ let mut fdset = mem::MaybeUninit::uninit(); -+ unsafe { -+ libc::FD_ZERO(fdset.as_mut_ptr()); -+ FdSet(fdset.assume_init()) -+ } - } - - pub fn insert(&mut self, fd: RawFd) { -@@ -46,7 +49,6 @@ impl FdSet { - /// # Example - /// - /// ``` -- /// # extern crate nix; - /// # use nix::sys::select::FdSet; - /// # fn main() { - /// let mut set = FdSet::new(); -@@ -58,17 +60,81 @@ impl FdSet { - /// - /// [`select`]: fn.select.html - pub fn highest(&mut self) -> Option<RawFd> { -- for i in (0..FD_SETSIZE).rev() { -- let i = i as RawFd; -- if unsafe { libc::FD_ISSET(i, self as *mut _ as *mut libc::fd_set) } { -- return Some(i) -+ self.fds(None).next_back() -+ } -+ -+ /// Returns an iterator over the file descriptors in the set. -+ /// -+ /// For performance, it takes an optional higher bound: the iterator will -+ /// not return any elements of the set greater than the given file -+ /// descriptor. -+ /// -+ /// # Examples -+ /// -+ /// ``` -+ /// # use nix::sys::select::FdSet; -+ /// # use std::os::unix::io::RawFd; -+ /// let mut set = FdSet::new(); -+ /// set.insert(4); -+ /// set.insert(9); -+ /// let fds: Vec<RawFd> = set.fds(None).collect(); -+ /// assert_eq!(fds, vec![4, 9]); -+ /// ``` -+ #[inline] -+ pub fn fds(&mut self, highest: Option<RawFd>) -> Fds { -+ Fds { -+ set: self, -+ range: 0..highest.map(|h| h as usize + 1).unwrap_or(FD_SETSIZE), -+ } -+ } -+} -+ -+impl Default for FdSet { -+ fn default() -> Self { -+ Self::new() -+ } -+} -+ -+/// Iterator over `FdSet`. -+#[derive(Debug)] -+pub struct Fds<'a> { -+ set: &'a mut FdSet, -+ range: Range<usize>, -+} -+ -+impl<'a> Iterator for Fds<'a> { -+ type Item = RawFd; -+ -+ fn next(&mut self) -> Option<RawFd> { -+ while let Some(i) = self.range.next() { -+ if self.set.contains(i as RawFd) { -+ return Some(i as RawFd); - } - } -+ None -+ } -+ -+ #[inline] -+ fn size_hint(&self) -> (usize, Option<usize>) { -+ let (_, upper) = self.range.size_hint(); -+ (0, upper) -+ } -+} - -+impl<'a> DoubleEndedIterator for Fds<'a> { -+ #[inline] -+ fn next_back(&mut self) -> Option<RawFd> { -+ while let Some(i) = self.range.next_back() { -+ if self.set.contains(i as RawFd) { -+ return Some(i as RawFd); -+ } -+ } - None - } - } - -+impl<'a> FusedIterator for Fds<'a> {} -+ - /// Monitors file descriptors for readiness - /// - /// Returns the total number of ready file descriptors in all sets. The sets are changed so that all -@@ -93,9 +159,9 @@ impl FdSet { - /// - /// [`FdSet::highest`]: struct.FdSet.html#method.highest - pub fn select<'a, N, R, W, E, T>(nfds: N, -- readfds: R, -- writefds: W, -- errorfds: E, -+ readfds: R, -+ writefds: W, -+ errorfds: E, - timeout: T) -> Result<c_int> - where - N: Into<Option<c_int>>, -@@ -122,7 +188,7 @@ where - let writefds = writefds.map(|set| set as *mut _ as *mut libc::fd_set).unwrap_or(null_mut()); - let errorfds = errorfds.map(|set| set as *mut _ as *mut libc::fd_set).unwrap_or(null_mut()); - let timeout = timeout.map(|tv| tv as *mut _ as *mut libc::timeval) -- .unwrap_or(null_mut()); -+ .unwrap_or(null_mut()); - - let res = unsafe { - libc::select(nfds, readfds, writefds, errorfds, timeout) -@@ -161,10 +227,10 @@ where - /// - /// [`FdSet::highest`]: struct.FdSet.html#method.highest - pub fn pselect<'a, N, R, W, E, T, S>(nfds: N, -- readfds: R, -- writefds: W, -- errorfds: E, -- timeout: T, -+ readfds: R, -+ writefds: W, -+ errorfds: E, -+ timeout: T, - sigmask: S) -> Result<c_int> - where - N: Into<Option<c_int>>, -@@ -207,8 +273,8 @@ where - mod tests { - use super::*; - use std::os::unix::io::RawFd; -- use sys::time::{TimeVal, TimeValLike}; -- use unistd::{write, pipe}; -+ use crate::sys::time::{TimeVal, TimeValLike}; -+ use crate::unistd::{write, pipe}; - - #[test] - fn fdset_insert() { -@@ -272,6 +338,20 @@ mod tests { - assert_eq!(set.highest(), Some(7)); - } - -+ #[test] -+ fn fdset_fds() { -+ let mut set = FdSet::new(); -+ assert_eq!(set.fds(None).collect::<Vec<_>>(), vec![]); -+ set.insert(0); -+ assert_eq!(set.fds(None).collect::<Vec<_>>(), vec![0]); -+ set.insert(90); -+ assert_eq!(set.fds(None).collect::<Vec<_>>(), vec![0, 90]); -+ -+ // highest limit -+ assert_eq!(set.fds(Some(89)).collect::<Vec<_>>(), vec![0]); -+ assert_eq!(set.fds(Some(90)).collect::<Vec<_>>(), vec![0, 90]); -+ } -+ - #[test] - fn test_select() { - let (r1, w1) = pipe().unwrap(); -@@ -304,9 +384,9 @@ mod tests { - - let mut timeout = TimeVal::seconds(10); - assert_eq!(1, select(Some(fd_set.highest().unwrap() + 1), -- &mut fd_set, -- None, -- None, -+ &mut fd_set, -+ None, -+ None, - &mut timeout).unwrap()); - assert!(fd_set.contains(r1)); - assert!(!fd_set.contains(r2)); -@@ -324,9 +404,9 @@ mod tests { - - let mut timeout = TimeVal::seconds(10); - assert_eq!(1, select(::std::cmp::max(r1, r2) + 1, -- &mut fd_set, -- None, -- None, -+ &mut fd_set, -+ None, -+ None, - &mut timeout).unwrap()); - assert!(fd_set.contains(r1)); - assert!(!fd_set.contains(r2)); -diff --git a/third_party/rust/nix/src/sys/sendfile.rs b/third_party/rust/nix/src/sys/sendfile.rs -index a47d8962f73fb..84fe2a919e8b4 100644 ---- a/third_party/rust/nix/src/sys/sendfile.rs -+++ b/third_party/rust/nix/src/sys/sendfile.rs -@@ -1,10 +1,11 @@ -+use cfg_if::cfg_if; - use std::os::unix::io::RawFd; - use std::ptr; - - use libc::{self, off_t}; - --use Result; --use errno::Errno; -+use crate::Result; -+use crate::errno::Errno; - - /// Copy up to `count` bytes to `out_fd` from `in_fd` starting at `offset`. - /// -@@ -36,7 +37,7 @@ cfg_if! { - if #[cfg(any(target_os = "freebsd", - target_os = "ios", - target_os = "macos"))] { -- use sys::uio::IoVec; -+ use crate::sys::uio::IoVec; - - #[derive(Clone, Debug, Eq, Hash, PartialEq)] - struct SendfileHeaderTrailer<'a>( -@@ -123,6 +124,7 @@ cfg_if! { - /// - /// For more information, see - /// [the sendfile(2) man page.](https://www.freebsd.org/cgi/man.cgi?query=sendfile&sektion=2) -+ #[allow(clippy::too_many_arguments)] - pub fn sendfile( - in_fd: RawFd, - out_sock: RawFd, -@@ -136,7 +138,8 @@ cfg_if! { - // Readahead goes in upper 16 bits - // Flags goes in lower 16 bits - // see `man 2 sendfile` -- let flags: u32 = ((readahead as u32) << 16) | (flags.bits() as u32); -+ let ra32 = u32::from(readahead); -+ let flags: u32 = (ra32 << 16) | (flags.bits() as u32); - let mut bytes_sent: off_t = 0; - let hdtr = headers.or(trailers).map(|_| SendfileHeaderTrailer::new(headers, trailers)); - let hdtr_ptr = hdtr.as_ref().map_or(ptr::null(), |s| &s.0 as *const libc::sf_hdtr); -diff --git a/third_party/rust/nix/src/sys/signal.rs b/third_party/rust/nix/src/sys/signal.rs -index 1013a77fd4b40..2f8b5fa88823d 100644 ---- a/third_party/rust/nix/src/sys/signal.rs -+++ b/third_party/rust/nix/src/sys/signal.rs -@@ -3,9 +3,10 @@ - - ///! Operating system signals. - --use libc; --use {Error, Result}; --use errno::Errno; -+use crate::{Error, Result}; -+use crate::errno::Errno; -+use crate::unistd::Pid; -+use std::convert::TryFrom; - use std::mem; - use std::fmt; - use std::str::FromStr; -@@ -13,7 +14,7 @@ use std::str::FromStr; - use std::os::unix::io::RawFd; - use std::ptr; - --#[cfg(not(target_os = "openbsd"))] -+#[cfg(not(any(target_os = "openbsd", target_os = "redox")))] - pub use self::sigevent::*; - - libc_enum!{ -@@ -38,8 +39,10 @@ libc_enum!{ - SIGPIPE, - SIGALRM, - SIGTERM, -- #[cfg(all(any(target_os = "android", target_os = "emscripten", target_os = "linux"), -- not(any(target_arch = "mips", target_arch = "mips64", target_arch = "sparc64"))))] -+ #[cfg(all(any(target_os = "android", target_os = "emscripten", -+ target_os = "fuchsia", target_os = "linux"), -+ not(any(target_arch = "mips", target_arch = "mips64", -+ target_arch = "sparc64"))))] - SIGSTKFLT, - SIGCHLD, - SIGCONT, -@@ -54,12 +57,17 @@ libc_enum!{ - SIGPROF, - SIGWINCH, - SIGIO, -- #[cfg(any(target_os = "android", target_os = "emscripten", target_os = "linux"))] -+ #[cfg(any(target_os = "android", target_os = "emscripten", -+ target_os = "fuchsia", target_os = "linux"))] - SIGPWR, - SIGSYS, -- #[cfg(not(any(target_os = "android", target_os = "emscripten", target_os = "linux")))] -+ #[cfg(not(any(target_os = "android", target_os = "emscripten", -+ target_os = "fuchsia", target_os = "linux", -+ target_os = "redox")))] - SIGEMT, -- #[cfg(not(any(target_os = "android", target_os = "emscripten", target_os = "linux")))] -+ #[cfg(not(any(target_os = "android", target_os = "emscripten", -+ target_os = "fuchsia", target_os = "linux", -+ target_os = "redox")))] - SIGINFO, - } - } -@@ -83,8 +91,10 @@ impl FromStr for Signal { - "SIGPIPE" => Signal::SIGPIPE, - "SIGALRM" => Signal::SIGALRM, - "SIGTERM" => Signal::SIGTERM, -- #[cfg(all(any(target_os = "android", target_os = "emscripten", target_os = "linux"), -- not(any(target_arch = "mips", target_arch = "mips64", target_arch = "sparc64"))))] -+ #[cfg(all(any(target_os = "android", target_os = "emscripten", -+ target_os = "fuchsia", target_os = "linux"), -+ not(any(target_arch = "mips", target_arch = "mips64", -+ target_arch = "sparc64"))))] - "SIGSTKFLT" => Signal::SIGSTKFLT, - "SIGCHLD" => Signal::SIGCHLD, - "SIGCONT" => Signal::SIGCONT, -@@ -99,21 +109,31 @@ impl FromStr for Signal { - "SIGPROF" => Signal::SIGPROF, - "SIGWINCH" => Signal::SIGWINCH, - "SIGIO" => Signal::SIGIO, -- #[cfg(any(target_os = "android", target_os = "emscripten", target_os = "linux"))] -+ #[cfg(any(target_os = "android", target_os = "emscripten", -+ target_os = "fuchsia", target_os = "linux"))] - "SIGPWR" => Signal::SIGPWR, - "SIGSYS" => Signal::SIGSYS, -- #[cfg(not(any(target_os = "android", target_os = "emscripten", target_os = "linux")))] -+ #[cfg(not(any(target_os = "android", target_os = "emscripten", -+ target_os = "fuchsia", target_os = "linux", -+ target_os = "redox")))] - "SIGEMT" => Signal::SIGEMT, -- #[cfg(not(any(target_os = "android", target_os = "emscripten", target_os = "linux")))] -+ #[cfg(not(any(target_os = "android", target_os = "emscripten", -+ target_os = "fuchsia", target_os = "linux", -+ target_os = "redox")))] - "SIGINFO" => Signal::SIGINFO, - _ => return Err(Error::invalid_argument()), - }) - } - } - --impl AsRef<str> for Signal { -- fn as_ref(&self) -> &str { -- match *self { -+impl Signal { -+ /// Returns name of signal. -+ /// -+ /// This function is equivalent to `<Signal as AsRef<str>>::as_ref()`, -+ /// with difference that returned string is `'static` -+ /// and not bound to `self`'s lifetime. -+ pub fn as_str(self) -> &'static str { -+ match self { - Signal::SIGHUP => "SIGHUP", - Signal::SIGINT => "SIGINT", - Signal::SIGQUIT => "SIGQUIT", -@@ -129,7 +149,8 @@ impl AsRef<str> for Signal { - Signal::SIGPIPE => "SIGPIPE", - Signal::SIGALRM => "SIGALRM", - Signal::SIGTERM => "SIGTERM", -- #[cfg(all(any(target_os = "android", target_os = "emscripten", target_os = "linux"), -+ #[cfg(all(any(target_os = "android", target_os = "emscripten", -+ target_os = "fuchsia", target_os = "linux"), - not(any(target_arch = "mips", target_arch = "mips64", target_arch = "sparc64"))))] - Signal::SIGSTKFLT => "SIGSTKFLT", - Signal::SIGCHLD => "SIGCHLD", -@@ -145,17 +166,28 @@ impl AsRef<str> for Signal { - Signal::SIGPROF => "SIGPROF", - Signal::SIGWINCH => "SIGWINCH", - Signal::SIGIO => "SIGIO", -- #[cfg(any(target_os = "android", target_os = "emscripten", target_os = "linux"))] -+ #[cfg(any(target_os = "android", target_os = "emscripten", -+ target_os = "fuchsia", target_os = "linux"))] - Signal::SIGPWR => "SIGPWR", - Signal::SIGSYS => "SIGSYS", -- #[cfg(not(any(target_os = "android", target_os = "emscripten", target_os = "linux")))] -+ #[cfg(not(any(target_os = "android", target_os = "emscripten", -+ target_os = "fuchsia", target_os = "linux", -+ target_os = "redox")))] - Signal::SIGEMT => "SIGEMT", -- #[cfg(not(any(target_os = "android", target_os = "emscripten", target_os = "linux")))] -+ #[cfg(not(any(target_os = "android", target_os = "emscripten", -+ target_os = "fuchsia", target_os = "linux", -+ target_os = "redox")))] - Signal::SIGINFO => "SIGINFO", - } - } - } - -+impl AsRef<str> for Signal { -+ fn as_ref(&self) -> &str { -+ self.as_str() -+ } -+} -+ - impl fmt::Display for Signal { - fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { - f.write_str(self.as_ref()) -@@ -164,7 +196,41 @@ impl fmt::Display for Signal { - - pub use self::Signal::*; - --#[cfg(all(any(target_os = "linux", target_os = "android", target_os = "emscripten"), not(any(target_arch = "mips", target_arch = "mips64", target_arch = "sparc64"))))] -+#[cfg(target_os = "redox")] -+const SIGNALS: [Signal; 29] = [ -+ SIGHUP, -+ SIGINT, -+ SIGQUIT, -+ SIGILL, -+ SIGTRAP, -+ SIGABRT, -+ SIGBUS, -+ SIGFPE, -+ SIGKILL, -+ SIGUSR1, -+ SIGSEGV, -+ SIGUSR2, -+ SIGPIPE, -+ SIGALRM, -+ SIGTERM, -+ SIGCHLD, -+ SIGCONT, -+ SIGSTOP, -+ SIGTSTP, -+ SIGTTIN, -+ SIGTTOU, -+ SIGURG, -+ SIGXCPU, -+ SIGXFSZ, -+ SIGVTALRM, -+ SIGPROF, -+ SIGWINCH, -+ SIGIO, -+ SIGSYS]; -+#[cfg(all(any(target_os = "linux", target_os = "android", -+ target_os = "emscripten", target_os = "fuchsia"), -+ not(any(target_arch = "mips", target_arch = "mips64", -+ target_arch = "sparc64"))))] - const SIGNALS: [Signal; 31] = [ - SIGHUP, - SIGINT, -@@ -197,7 +263,10 @@ const SIGNALS: [Signal; 31] = [ - SIGIO, - SIGPWR, - SIGSYS]; --#[cfg(all(any(target_os = "linux", target_os = "android", target_os = "emscripten"), any(target_arch = "mips", target_arch = "mips64", target_arch = "sparc64")))] -+#[cfg(all(any(target_os = "linux", target_os = "android", -+ target_os = "emscripten", target_os = "fuchsia"), -+ any(target_arch = "mips", target_arch = "mips64", -+ target_arch = "sparc64")))] - const SIGNALS: [Signal; 30] = [ - SIGHUP, - SIGINT, -@@ -229,7 +298,9 @@ const SIGNALS: [Signal; 30] = [ - SIGIO, - SIGPWR, - SIGSYS]; --#[cfg(not(any(target_os = "linux", target_os = "android", target_os = "emscripten")))] -+#[cfg(not(any(target_os = "linux", target_os = "android", -+ target_os = "fuchsia", target_os = "emscripten", -+ target_os = "redox")))] - const SIGNALS: [Signal; 31] = [ - SIGHUP, - SIGINT, -@@ -288,12 +359,12 @@ impl Signal { - pub fn iterator() -> SignalIterator { - SignalIterator{next: 0} - } -+} -+ -+impl TryFrom<libc::c_int> for Signal { -+ type Error = Error; - -- // We do not implement the From trait, because it is supposed to be infallible. -- // With Rust RFC 1542 comes the appropriate trait TryFrom. Once it is -- // implemented, we'll replace this function. -- #[inline] -- pub fn from_c_int(signum: libc::c_int) -> Result<Signal> { -+ fn try_from(signum: libc::c_int) -> Result<Signal> { - if 0 < signum && signum < NSIG { - Ok(unsafe { mem::transmute(signum) }) - } else { -@@ -306,8 +377,13 @@ pub const SIGIOT : Signal = SIGABRT; - pub const SIGPOLL : Signal = SIGIO; - pub const SIGUNUSED : Signal = SIGSYS; - -+#[cfg(not(target_os = "redox"))] -+type SaFlags_t = libc::c_int; -+#[cfg(target_os = "redox")] -+type SaFlags_t = libc::c_ulong; -+ - libc_bitflags!{ -- pub struct SaFlags: libc::c_int { -+ pub struct SaFlags: SaFlags_t { - SA_NOCLDSTOP; - SA_NOCLDWAIT; - SA_NODEFER; -@@ -335,17 +411,17 @@ pub struct SigSet { - - impl SigSet { - pub fn all() -> SigSet { -- let mut sigset: libc::sigset_t = unsafe { mem::uninitialized() }; -- let _ = unsafe { libc::sigfillset(&mut sigset as *mut libc::sigset_t) }; -+ let mut sigset = mem::MaybeUninit::uninit(); -+ let _ = unsafe { libc::sigfillset(sigset.as_mut_ptr()) }; - -- SigSet { sigset: sigset } -+ unsafe{ SigSet { sigset: sigset.assume_init() } } - } - - pub fn empty() -> SigSet { -- let mut sigset: libc::sigset_t = unsafe { mem::uninitialized() }; -- let _ = unsafe { libc::sigemptyset(&mut sigset as *mut libc::sigset_t) }; -+ let mut sigset = mem::MaybeUninit::uninit(); -+ let _ = unsafe { libc::sigemptyset(sigset.as_mut_ptr()) }; - -- SigSet { sigset: sigset } -+ unsafe{ SigSet { sigset: sigset.assume_init() } } - } - - pub fn add(&mut self, signal: Signal) { -@@ -380,9 +456,9 @@ impl SigSet { - - /// Gets the currently blocked (masked) set of signals for the calling thread. - pub fn thread_get_mask() -> Result<SigSet> { -- let mut oldmask: SigSet = unsafe { mem::uninitialized() }; -- pthread_sigmask(SigmaskHow::SIG_SETMASK, None, Some(&mut oldmask))?; -- Ok(oldmask) -+ let mut oldmask = mem::MaybeUninit::uninit(); -+ do_pthread_sigmask(SigmaskHow::SIG_SETMASK, None, Some(oldmask.as_mut_ptr()))?; -+ Ok(unsafe{ SigSet{sigset: oldmask.assume_init()}}) - } - - /// Sets the set of signals as the signal mask for the calling thread. -@@ -402,18 +478,21 @@ impl SigSet { - - /// Sets the set of signals as the signal mask, and returns the old mask. - pub fn thread_swap_mask(&self, how: SigmaskHow) -> Result<SigSet> { -- let mut oldmask: SigSet = unsafe { mem::uninitialized() }; -- pthread_sigmask(how, Some(self), Some(&mut oldmask))?; -- Ok(oldmask) -+ let mut oldmask = mem::MaybeUninit::uninit(); -+ do_pthread_sigmask(how, Some(self), Some(oldmask.as_mut_ptr()))?; -+ Ok(unsafe{ SigSet{sigset: oldmask.assume_init()}}) - } - - /// Suspends execution of the calling thread until one of the signals in the - /// signal mask becomes pending, and returns the accepted signal. -+ #[cfg(not(target_os = "redox"))] // RedoxFS does not yet support sigwait - pub fn wait(&self) -> Result<Signal> { -- let mut signum: libc::c_int = unsafe { mem::uninitialized() }; -- let res = unsafe { libc::sigwait(&self.sigset as *const libc::sigset_t, &mut signum) }; -+ let mut signum = mem::MaybeUninit::uninit(); -+ let res = unsafe { libc::sigwait(&self.sigset as *const libc::sigset_t, signum.as_mut_ptr()) }; - -- Errno::result(res).map(|_| Signal::from_c_int(signum).unwrap()) -+ Errno::result(res).map(|_| unsafe { -+ Signal::try_from(signum.assume_init()).unwrap() -+ }) - } - } - -@@ -435,6 +514,7 @@ pub enum SigHandler { - Handler(extern fn(libc::c_int)), - /// Use the given signal-catching function, which takes in the signal, information about how - /// the signal was generated, and a pointer to the threads `ucontext_t`. -+ #[cfg(not(target_os = "redox"))] - SigAction(extern fn(libc::c_int, *mut libc::siginfo_t, *mut libc::c_void)) - } - -@@ -451,20 +531,38 @@ impl SigAction { - /// is the `SigAction` variant). `mask` specifies other signals to block during execution of - /// the signal-catching function. - pub fn new(handler: SigHandler, flags: SaFlags, mask: SigSet) -> SigAction { -- let mut s = unsafe { mem::uninitialized::<libc::sigaction>() }; -- s.sa_sigaction = match handler { -- SigHandler::SigDfl => libc::SIG_DFL, -- SigHandler::SigIgn => libc::SIG_IGN, -- SigHandler::Handler(f) => f as *const extern fn(libc::c_int) as usize, -- SigHandler::SigAction(f) => f as *const extern fn(libc::c_int, *mut libc::siginfo_t, *mut libc::c_void) as usize, -- }; -- s.sa_flags = match handler { -- SigHandler::SigAction(_) => (flags | SaFlags::SA_SIGINFO).bits(), -- _ => (flags - SaFlags::SA_SIGINFO).bits(), -- }; -- s.sa_mask = mask.sigset; -- -- SigAction { sigaction: s } -+ #[cfg(target_os = "redox")] -+ unsafe fn install_sig(p: *mut libc::sigaction, handler: SigHandler) { -+ (*p).sa_handler = match handler { -+ SigHandler::SigDfl => libc::SIG_DFL, -+ SigHandler::SigIgn => libc::SIG_IGN, -+ SigHandler::Handler(f) => f as *const extern fn(libc::c_int) as usize, -+ }; -+ } -+ -+ #[cfg(not(target_os = "redox"))] -+ unsafe fn install_sig(p: *mut libc::sigaction, handler: SigHandler) { -+ (*p).sa_sigaction = match handler { -+ SigHandler::SigDfl => libc::SIG_DFL, -+ SigHandler::SigIgn => libc::SIG_IGN, -+ SigHandler::Handler(f) => f as *const extern fn(libc::c_int) as usize, -+ SigHandler::SigAction(f) => f as *const extern fn(libc::c_int, *mut libc::siginfo_t, *mut libc::c_void) as usize, -+ }; -+ } -+ -+ let mut s = mem::MaybeUninit::<libc::sigaction>::uninit(); -+ unsafe { -+ let p = s.as_mut_ptr(); -+ install_sig(p, handler); -+ (*p).sa_flags = match handler { -+ #[cfg(not(target_os = "redox"))] -+ SigHandler::SigAction(_) => (flags | SaFlags::SA_SIGINFO).bits(), -+ _ => (flags - SaFlags::SA_SIGINFO).bits(), -+ }; -+ (*p).sa_mask = mask.sigset; -+ -+ SigAction { sigaction: s.assume_init() } -+ } - } - - /// Returns the flags set on the action. -@@ -479,6 +577,7 @@ impl SigAction { - } - - /// Returns the action's handler. -+ #[cfg(not(target_os = "redox"))] - pub fn handler(&self) -> SigHandler { - match self.sigaction.sa_sigaction { - libc::SIG_DFL => SigHandler::SigDfl, -@@ -488,6 +587,16 @@ impl SigAction { - f => SigHandler::Handler( unsafe { mem::transmute(f) } ), - } - } -+ -+ /// Returns the action's handler. -+ #[cfg(target_os = "redox")] -+ pub fn handler(&self) -> SigHandler { -+ match self.sigaction.sa_handler { -+ libc::SIG_DFL => SigHandler::SigDfl, -+ libc::SIG_IGN => SigHandler::SigIgn, -+ f => SigHandler::Handler( unsafe { mem::transmute(f) } ), -+ } -+ } - } - - /// Changes the action taken by a process on receipt of a specific signal. -@@ -501,12 +610,13 @@ impl SigAction { - /// the body of the signal-catching function. Be certain to only make syscalls that are explicitly - /// marked safe for signal handlers and only share global data using atomics. - pub unsafe fn sigaction(signal: Signal, sigaction: &SigAction) -> Result<SigAction> { -- let mut oldact = mem::uninitialized::<libc::sigaction>(); -+ let mut oldact = mem::MaybeUninit::<libc::sigaction>::uninit(); - -- let res = -- libc::sigaction(signal as libc::c_int, &sigaction.sigaction as *const libc::sigaction, &mut oldact as *mut libc::sigaction); -+ let res = libc::sigaction(signal as libc::c_int, -+ &sigaction.sigaction as *const libc::sigaction, -+ oldact.as_mut_ptr()); - -- Errno::result(res).map(|_| SigAction { sigaction: oldact }) -+ Errno::result(res).map(|_| SigAction { sigaction: oldact.assume_init() }) - } - - /// Signal management (see [signal(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/signal.html)) -@@ -534,8 +644,7 @@ pub unsafe fn sigaction(signal: Signal, sigaction: &SigAction) -> Result<SigActi - /// - /// ```no_run - /// # #[macro_use] extern crate lazy_static; --/// # extern crate libc; --/// # extern crate nix; -+/// # use std::convert::TryFrom; - /// # use std::sync::atomic::{AtomicBool, Ordering}; - /// # use nix::sys::signal::{self, Signal, SigHandler}; - /// lazy_static! { -@@ -543,7 +652,7 @@ pub unsafe fn sigaction(signal: Signal, sigaction: &SigAction) -> Result<SigActi - /// } - /// - /// extern fn handle_sigint(signal: libc::c_int) { --/// let signal = Signal::from_c_int(signal).unwrap(); -+/// let signal = Signal::try_from(signal).unwrap(); - /// SIGNALED.store(signal == Signal::SIGINT, Ordering::Relaxed); - /// } - /// -@@ -571,6 +680,7 @@ pub unsafe fn signal(signal: Signal, handler: SigHandler) -> Result<SigHandler> - SigHandler::SigDfl => libc::signal(signal, libc::SIG_DFL), - SigHandler::SigIgn => libc::signal(signal, libc::SIG_IGN), - SigHandler::Handler(handler) => libc::signal(signal, handler as libc::sighandler_t), -+ #[cfg(not(target_os = "redox"))] - SigHandler::SigAction(_) => return Err(Error::UnsupportedOperation), - }; - Errno::result(res).map(|oldhandler| { -@@ -582,6 +692,25 @@ pub unsafe fn signal(signal: Signal, handler: SigHandler) -> Result<SigHandler> - }) - } - -+fn do_pthread_sigmask(how: SigmaskHow, -+ set: Option<&SigSet>, -+ oldset: Option<*mut libc::sigset_t>) -> Result<()> { -+ if set.is_none() && oldset.is_none() { -+ return Ok(()) -+ } -+ -+ let res = unsafe { -+ // if set or oldset is None, pass in null pointers instead -+ libc::pthread_sigmask(how as libc::c_int, -+ set.map_or_else(ptr::null::<libc::sigset_t>, -+ |s| &s.sigset as *const libc::sigset_t), -+ oldset.unwrap_or(ptr::null_mut()) -+ ) -+ }; -+ -+ Errno::result(res).map(drop) -+} -+ - /// Manages the signal mask (set of blocked signals) for the calling thread. - /// - /// If the `set` parameter is `Some(..)`, then the signal mask will be updated with the signal set. -@@ -599,21 +728,9 @@ pub unsafe fn signal(signal: Signal, handler: SigHandler) -> Result<SigHandler> - /// or [`sigprocmask`](http://pubs.opengroup.org/onlinepubs/9699919799/functions/sigprocmask.html) man pages. - pub fn pthread_sigmask(how: SigmaskHow, - set: Option<&SigSet>, -- oldset: Option<&mut SigSet>) -> Result<()> { -- if set.is_none() && oldset.is_none() { -- return Ok(()) -- } -- -- let res = unsafe { -- // if set or oldset is None, pass in null pointers instead -- libc::pthread_sigmask(how as libc::c_int, -- set.map_or_else(ptr::null::<libc::sigset_t>, -- |s| &s.sigset as *const libc::sigset_t), -- oldset.map_or_else(ptr::null_mut::<libc::sigset_t>, -- |os| &mut os.sigset as *mut libc::sigset_t)) -- }; -- -- Errno::result(res).map(drop) -+ oldset: Option<&mut SigSet>) -> Result<()> -+{ -+ do_pthread_sigmask(how, set, oldset.map(|os| &mut os.sigset as *mut _ )) - } - - /// Examine and change blocked signals. -@@ -637,7 +754,7 @@ pub fn sigprocmask(how: SigmaskHow, set: Option<&SigSet>, oldset: Option<&mut Si - Errno::result(res).map(drop) - } - --pub fn kill<T: Into<Option<Signal>>>(pid: ::unistd::Pid, signal: T) -> Result<()> { -+pub fn kill<T: Into<Option<Signal>>>(pid: Pid, signal: T) -> Result<()> { - let res = unsafe { libc::kill(pid.into(), - match signal.into() { - Some(s) => s as libc::c_int, -@@ -653,7 +770,8 @@ pub fn kill<T: Into<Option<Signal>>>(pid: ::unistd::Pid, signal: T) -> Result<() - /// If `pgrp` less then or equal 1, the behavior is platform-specific. - /// If `signal` is `None`, `killpg` will only preform error checking and won't - /// send any signal. --pub fn killpg<T: Into<Option<Signal>>>(pgrp: ::unistd::Pid, signal: T) -> Result<()> { -+#[cfg(not(target_os = "fuchsia"))] -+pub fn killpg<T: Into<Option<Signal>>>(pgrp: Pid, signal: T) -> Result<()> { - let res = unsafe { libc::killpg(pgrp.into(), - match signal.into() { - Some(s) => s as libc::c_int, -@@ -702,9 +820,8 @@ pub enum SigevNotify { - si_value: libc::intptr_t }, - } - --#[cfg(not(target_os = "openbsd"))] -+#[cfg(not(any(target_os = "openbsd", target_os = "redox")))] - mod sigevent { -- use libc; - use std::mem; - use std::ptr; - use super::SigevNotify; -@@ -734,7 +851,10 @@ mod sigevent { - /// `SIGEV_SIGNAL`. That field is part of a union that shares space with the - /// more genuinely useful `sigev_notify_thread_id` - pub fn new(sigev_notify: SigevNotify) -> SigEvent { -- let mut sev = unsafe { mem::zeroed::<libc::sigevent>()}; -+ // NB: This uses MaybeUninit rather than mem::zeroed because libc::sigevent contains a -+ // function pointer on Fuchsia as of https://github.com/rust-lang/libc/commit/2f59370, -+ // and function pointers must not be null. -+ let mut sev = unsafe { mem::MaybeUninit::<libc::sigevent>::zeroed().assume_init() }; - sev.sigev_notify = match sigev_notify { - SigevNotify::SigevNone => libc::SIGEV_NONE, - SigevNotify::SigevSignal{..} => libc::SIGEV_SIGNAL, -@@ -793,6 +913,7 @@ mod sigevent { - - #[cfg(test)] - mod tests { -+ #[cfg(not(target_os = "redox"))] - use std::thread; - use super::*; - -@@ -848,6 +969,7 @@ mod tests { - } - - #[test] -+ #[cfg(not(target_os = "redox"))] - fn test_thread_signal_set_mask() { - thread::spawn(|| { - let prev_mask = SigSet::thread_get_mask() -@@ -868,6 +990,7 @@ mod tests { - } - - #[test] -+ #[cfg(not(target_os = "redox"))] - fn test_thread_signal_block() { - thread::spawn(|| { - let mut mask = SigSet::empty(); -@@ -880,6 +1003,7 @@ mod tests { - } - - #[test] -+ #[cfg(not(target_os = "redox"))] - fn test_thread_signal_unblock() { - thread::spawn(|| { - let mut mask = SigSet::empty(); -@@ -892,6 +1016,7 @@ mod tests { - } - - #[test] -+ #[cfg(not(target_os = "redox"))] - fn test_thread_signal_swap() { - thread::spawn(|| { - let mut mask = SigSet::empty(); -@@ -914,8 +1039,8 @@ mod tests { - } - - #[test] -+ #[cfg(not(target_os = "redox"))] - fn test_sigaction() { -- use libc; - thread::spawn(|| { - extern fn test_sigaction_handler(_: libc::c_int) {} - extern fn test_sigaction_action(_: libc::c_int, -@@ -952,6 +1077,7 @@ mod tests { - } - - #[test] -+ #[cfg(not(target_os = "redox"))] - fn test_sigwait() { - thread::spawn(|| { - let mut mask = SigSet::empty(); -diff --git a/third_party/rust/nix/src/sys/signalfd.rs b/third_party/rust/nix/src/sys/signalfd.rs -index 5425a27be9e52..c43b45046f719 100644 ---- a/third_party/rust/nix/src/sys/signalfd.rs -+++ b/third_party/rust/nix/src/sys/signalfd.rs -@@ -16,10 +16,10 @@ - //! Please note that signal discarding is not specific to `signalfd`, but also happens with regular - //! signal handlers. - use libc; --use unistd; --use {Error, Result}; --use errno::Errno; --pub use sys::signal::{self, SigSet}; -+use crate::unistd; -+use crate::{Error, Result}; -+use crate::errno::Errno; -+pub use crate::sys::signal::{self, SigSet}; - pub use libc::signalfd_siginfo as siginfo; - - use std::os::unix::io::{RawFd, AsRawFd}; -@@ -79,7 +79,7 @@ pub fn signalfd(fd: RawFd, mask: &SigSet, flags: SfdFlags) -> Result<RawFd> { - /// Err(err) => (), // some error happend - /// } - /// ``` --#[derive(Clone, Debug, Eq, Hash, PartialEq)] -+#[derive(Debug, Eq, Hash, PartialEq)] - pub struct SignalFd(RawFd); - - impl SignalFd { -@@ -98,10 +98,15 @@ impl SignalFd { - } - - pub fn read_signal(&mut self) -> Result<Option<siginfo>> { -- let mut buffer: [u8; SIGNALFD_SIGINFO_SIZE] = unsafe { mem::uninitialized() }; -- -- match unistd::read(self.0, &mut buffer) { -- Ok(SIGNALFD_SIGINFO_SIZE) => Ok(Some(unsafe { mem::transmute(buffer) })), -+ let mut buffer = mem::MaybeUninit::<[u8; SIGNALFD_SIGINFO_SIZE]>::uninit(); -+ -+ let res = Errno::result(unsafe { -+ libc::read(self.0, -+ buffer.as_mut_ptr() as *mut libc::c_void, -+ SIGNALFD_SIGINFO_SIZE as libc::size_t) -+ }).map(|r| r as usize); -+ match res { -+ Ok(SIGNALFD_SIGINFO_SIZE) => Ok(Some(unsafe { mem::transmute(buffer.assume_init()) })), - Ok(_) => unreachable!("partial read on signalfd"), - Err(Error::Sys(Errno::EAGAIN)) => Ok(None), - Err(error) => Err(error) -@@ -111,7 +116,10 @@ impl SignalFd { - - impl Drop for SignalFd { - fn drop(&mut self) { -- let _ = unistd::close(self.0); -+ let e = unistd::close(self.0); -+ if !std::thread::panicking() && e == Err(Error::Sys(Errno::EBADF)) { -+ panic!("Closing an invalid file descriptor!"); -+ }; - } - } - -diff --git a/third_party/rust/nix/src/sys/socket/addr.rs b/third_party/rust/nix/src/sys/socket/addr.rs -index ed41441155361..5a2739bd10194 100644 ---- a/third_party/rust/nix/src/sys/socket/addr.rs -+++ b/third_party/rust/nix/src/sys/socket/addr.rs -@@ -1,20 +1,20 @@ - use super::sa_family_t; --use {Error, Result, NixPath}; --use errno::Errno; --use libc; -+use crate::{Error, Result, NixPath}; -+use crate::errno::Errno; -+use memoffset::offset_of; - use std::{fmt, mem, net, ptr, slice}; - use std::ffi::OsStr; - use std::hash::{Hash, Hasher}; - use std::path::Path; - use std::os::unix::ffi::OsStrExt; - #[cfg(any(target_os = "android", target_os = "linux"))] --use ::sys::socket::addr::netlink::NetlinkAddr; -+use crate::sys::socket::addr::netlink::NetlinkAddr; - #[cfg(any(target_os = "android", target_os = "linux"))] --use ::sys::socket::addr::alg::AlgAddr; -+use crate::sys::socket::addr::alg::AlgAddr; - #[cfg(any(target_os = "ios", target_os = "macos"))] - use std::os::unix::io::RawFd; - #[cfg(any(target_os = "ios", target_os = "macos"))] --use ::sys::socket::addr::sys_control::SysControlAddr; -+use crate::sys::socket::addr::sys_control::SysControlAddr; - #[cfg(any(target_os = "android", - target_os = "dragonfly", - target_os = "freebsd", -@@ -22,9 +22,10 @@ use ::sys::socket::addr::sys_control::SysControlAddr; - target_os = "linux", - target_os = "macos", - target_os = "netbsd", -- target_os = "openbsd"))] -+ target_os = "openbsd", -+ target_os = "fuchsia"))] - pub use self::datalink::LinkAddr; --#[cfg(target_os = "linux")] -+#[cfg(any(target_os = "android", target_os = "linux"))] - pub use self::vsock::VsockAddr; - - /// These constants specify the protocol family to be used -@@ -42,7 +43,7 @@ pub enum AddressFamily { - #[cfg(any(target_os = "android", target_os = "linux"))] - Netlink = libc::AF_NETLINK, - /// Low level packet interface (see [`packet(7)`](http://man7.org/linux/man-pages/man7/packet.7.html)) -- #[cfg(any(target_os = "android", target_os = "linux"))] -+ #[cfg(any(target_os = "android", target_os = "linux", target_os = "fuchsia"))] - Packet = libc::AF_PACKET, - /// KEXT Controls and Notifications - #[cfg(any(target_os = "ios", target_os = "macos"))] -@@ -116,7 +117,7 @@ pub enum AddressFamily { - Alg = libc::AF_ALG, - #[cfg(target_os = "linux")] - Nfc = libc::AF_NFC, -- #[cfg(target_os = "linux")] -+ #[cfg(any(target_os = "android", target_os = "linux"))] - Vsock = libc::AF_VSOCK, - #[cfg(any(target_os = "dragonfly", - target_os = "freebsd", -@@ -243,7 +244,7 @@ impl AddressFamily { - target_os = "netbsd", - target_os = "openbsd"))] - libc::AF_LINK => Some(AddressFamily::Link), -- #[cfg(target_os = "linux")] -+ #[cfg(any(target_os = "android", target_os = "linux"))] - libc::AF_VSOCK => Some(AddressFamily::Vsock), - _ => None - } -@@ -367,6 +368,8 @@ impl IpAddr { - /// Create a new IpAddr that contains an IPv6 address. - /// - /// The result will represent the IP address a:b:c:d:e:f -+ #[allow(clippy::many_single_char_names)] -+ #[allow(clippy::too_many_arguments)] - pub fn new_v6(a: u16, b: u16, c: u16, d: u16, e: u16, f: u16, g: u16, h: u16) -> IpAddr { - IpAddr::V6(Ipv6Addr::new(a, b, c, d, e, f, g, h)) - } -@@ -405,15 +408,18 @@ impl fmt::Display for IpAddr { - pub struct Ipv4Addr(pub libc::in_addr); - - impl Ipv4Addr { -+ #[allow(clippy::identity_op)] // More readable this way - pub fn new(a: u8, b: u8, c: u8, d: u8) -> Ipv4Addr { -- let ip = (((a as u32) << 24) | -- ((b as u32) << 16) | -- ((c as u32) << 8) | -- ((d as u32) << 0)).to_be(); -+ let ip = ((u32::from(a) << 24) | -+ (u32::from(b) << 16) | -+ (u32::from(c) << 8) | -+ (u32::from(d) << 0)).to_be(); - - Ipv4Addr(libc::in_addr { s_addr: ip }) - } - -+ // Use pass by reference for symmetry with Ipv6Addr::from_std -+ #[allow(clippy::trivially_copy_pass_by_ref)] - pub fn from_std(std: &net::Ipv4Addr) -> Ipv4Addr { - let bits = std.octets(); - Ipv4Addr::new(bits[0], bits[1], bits[2], bits[3]) -@@ -423,12 +429,12 @@ impl Ipv4Addr { - Ipv4Addr(libc::in_addr { s_addr: libc::INADDR_ANY }) - } - -- pub fn octets(&self) -> [u8; 4] { -+ pub fn octets(self) -> [u8; 4] { - let bits = u32::from_be(self.0.s_addr); - [(bits >> 24) as u8, (bits >> 16) as u8, (bits >> 8) as u8, bits as u8] - } - -- pub fn to_std(&self) -> net::Ipv4Addr { -+ pub fn to_std(self) -> net::Ipv4Addr { - let bits = self.octets(); - net::Ipv4Addr::new(bits[0], bits[1], bits[2], bits[3]) - } -@@ -467,10 +473,10 @@ macro_rules! to_u16_array { - } - - impl Ipv6Addr { -+ #[allow(clippy::many_single_char_names)] -+ #[allow(clippy::too_many_arguments)] - pub fn new(a: u16, b: u16, c: u16, d: u16, e: u16, f: u16, g: u16, h: u16) -> Ipv6Addr { -- let mut in6_addr_var: libc::in6_addr = unsafe{mem::uninitialized()}; -- in6_addr_var.s6_addr = to_u8_array!(a,b,c,d,e,f,g,h); -- Ipv6Addr(in6_addr_var) -+ Ipv6Addr(libc::in6_addr{s6_addr: to_u8_array!(a,b,c,d,e,f,g,h)}) - } - - pub fn from_std(std: &net::Ipv6Addr) -> Ipv6Addr { -@@ -555,7 +561,7 @@ impl UnixAddr { - ret.sun_path.as_mut_ptr().offset(1) as *mut u8, - path.len()); - -- Ok(UnixAddr(ret, ret.sun_path.len())) -+ Ok(UnixAddr(ret, path.len() + 1)) - } - } - -@@ -643,7 +649,7 @@ pub enum SockAddr { - target_os = "netbsd", - target_os = "openbsd"))] - Link(LinkAddr), -- #[cfg(target_os = "linux")] -+ #[cfg(any(target_os = "android", target_os = "linux"))] - Vsock(VsockAddr), - } - -@@ -671,7 +677,7 @@ impl SockAddr { - SysControlAddr::from_name(sockfd, name, unit).map(|a| SockAddr::SysControl(a)) - } - -- #[cfg(target_os = "linux")] -+ #[cfg(any(target_os = "android", target_os = "linux"))] - pub fn new_vsock(cid: u32, port: u32) -> SockAddr { - SockAddr::Vsock(VsockAddr::new(cid, port)) - } -@@ -696,7 +702,7 @@ impl SockAddr { - target_os = "netbsd", - target_os = "openbsd"))] - SockAddr::Link(..) => AddressFamily::Link, -- #[cfg(target_os = "linux")] -+ #[cfg(any(target_os = "android", target_os = "linux"))] - SockAddr::Vsock(..) => AddressFamily::Vsock, - } - } -@@ -709,11 +715,17 @@ impl SockAddr { - /// - /// Supports only the following address families: Unix, Inet (v4 & v6), Netlink and System. - /// Returns None for unsupported families. -- pub unsafe fn from_libc_sockaddr(addr: *const libc::sockaddr) -> Option<SockAddr> { -+ /// -+ /// # Safety -+ /// -+ /// unsafe because it takes a raw pointer as argument. The caller must -+ /// ensure that the pointer is valid. -+ #[cfg(not(target_os = "fuchsia"))] -+ pub(crate) unsafe fn from_libc_sockaddr(addr: *const libc::sockaddr) -> Option<SockAddr> { - if addr.is_null() { - None - } else { -- match AddressFamily::from_i32((*addr).sa_family as i32) { -+ match AddressFamily::from_i32(i32::from((*addr).sa_family)) { - Some(AddressFamily::Unix) => None, - Some(AddressFamily::Inet) => Some(SockAddr::Inet( - InetAddr::V4(*(addr as *const libc::sockaddr_in)))), -@@ -742,7 +754,7 @@ impl SockAddr { - Some(SockAddr::Link(ether_addr)) - } - }, -- #[cfg(target_os = "linux")] -+ #[cfg(any(target_os = "android", target_os = "linux"))] - Some(AddressFamily::Vsock) => Some(SockAddr::Vsock( - VsockAddr(*(addr as *const libc::sockaddr_vm)))), - // Other address families are currently not supported and simply yield a None -@@ -759,28 +771,83 @@ impl SockAddr { - /// with the size of the actual data type. sockaddr is commonly used as a proxy for - /// a superclass as C doesn't support inheritance, so many functions that take - /// a sockaddr * need to take the size of the underlying type as well and then internally cast it back. -- pub unsafe fn as_ffi_pair(&self) -> (&libc::sockaddr, libc::socklen_t) { -+ pub fn as_ffi_pair(&self) -> (&libc::sockaddr, libc::socklen_t) { - match *self { -- SockAddr::Inet(InetAddr::V4(ref addr)) => (mem::transmute(addr), mem::size_of::<libc::sockaddr_in>() as libc::socklen_t), -- SockAddr::Inet(InetAddr::V6(ref addr)) => (mem::transmute(addr), mem::size_of::<libc::sockaddr_in6>() as libc::socklen_t), -- SockAddr::Unix(UnixAddr(ref addr, len)) => (mem::transmute(addr), (len + offset_of!(libc::sockaddr_un, sun_path)) as libc::socklen_t), -+ SockAddr::Inet(InetAddr::V4(ref addr)) => ( -+ // This cast is always allowed in C -+ unsafe { -+ &*(addr as *const libc::sockaddr_in as *const libc::sockaddr) -+ }, -+ mem::size_of_val(addr) as libc::socklen_t -+ ), -+ SockAddr::Inet(InetAddr::V6(ref addr)) => ( -+ // This cast is always allowed in C -+ unsafe { -+ &*(addr as *const libc::sockaddr_in6 as *const libc::sockaddr) -+ }, -+ mem::size_of_val(addr) as libc::socklen_t -+ ), -+ SockAddr::Unix(UnixAddr(ref addr, len)) => ( -+ // This cast is always allowed in C -+ unsafe { -+ &*(addr as *const libc::sockaddr_un as *const libc::sockaddr) -+ }, -+ (len + offset_of!(libc::sockaddr_un, sun_path)) as libc::socklen_t -+ ), - #[cfg(any(target_os = "android", target_os = "linux"))] -- SockAddr::Netlink(NetlinkAddr(ref sa)) => (mem::transmute(sa), mem::size_of::<libc::sockaddr_nl>() as libc::socklen_t), -+ SockAddr::Netlink(NetlinkAddr(ref sa)) => ( -+ // This cast is always allowed in C -+ unsafe { -+ &*(sa as *const libc::sockaddr_nl as *const libc::sockaddr) -+ }, -+ mem::size_of_val(sa) as libc::socklen_t -+ ), - #[cfg(any(target_os = "android", target_os = "linux"))] -- SockAddr::Alg(AlgAddr(ref sa)) => (mem::transmute(sa), mem::size_of::<libc::sockaddr_alg>() as libc::socklen_t), -+ SockAddr::Alg(AlgAddr(ref sa)) => ( -+ // This cast is always allowed in C -+ unsafe { -+ &*(sa as *const libc::sockaddr_alg as *const libc::sockaddr) -+ }, -+ mem::size_of_val(sa) as libc::socklen_t -+ ), - #[cfg(any(target_os = "ios", target_os = "macos"))] -- SockAddr::SysControl(SysControlAddr(ref sa)) => (mem::transmute(sa), mem::size_of::<libc::sockaddr_ctl>() as libc::socklen_t), -+ SockAddr::SysControl(SysControlAddr(ref sa)) => ( -+ // This cast is always allowed in C -+ unsafe { -+ &*(sa as *const libc::sockaddr_ctl as *const libc::sockaddr) -+ }, -+ mem::size_of_val(sa) as libc::socklen_t -+ -+ ), - #[cfg(any(target_os = "android", target_os = "linux"))] -- SockAddr::Link(LinkAddr(ref ether_addr)) => (mem::transmute(ether_addr), mem::size_of::<libc::sockaddr_ll>() as libc::socklen_t), -+ SockAddr::Link(LinkAddr(ref addr)) => ( -+ // This cast is always allowed in C -+ unsafe { -+ &*(addr as *const libc::sockaddr_ll as *const libc::sockaddr) -+ }, -+ mem::size_of_val(addr) as libc::socklen_t -+ ), - #[cfg(any(target_os = "dragonfly", - target_os = "freebsd", - target_os = "ios", - target_os = "macos", - target_os = "netbsd", - target_os = "openbsd"))] -- SockAddr::Link(LinkAddr(ref ether_addr)) => (mem::transmute(ether_addr), mem::size_of::<libc::sockaddr_dl>() as libc::socklen_t), -- #[cfg(target_os = "linux")] -- SockAddr::Vsock(VsockAddr(ref sa)) => (mem::transmute(sa), mem::size_of::<libc::sockaddr_vm>() as libc::socklen_t), -+ SockAddr::Link(LinkAddr(ref addr)) => ( -+ // This cast is always allowed in C -+ unsafe { -+ &*(addr as *const libc::sockaddr_dl as *const libc::sockaddr) -+ }, -+ mem::size_of_val(addr) as libc::socklen_t -+ ), -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ SockAddr::Vsock(VsockAddr(ref sa)) => ( -+ // This cast is always allowed in C -+ unsafe { -+ &*(sa as *const libc::sockaddr_vm as *const libc::sockaddr) -+ }, -+ mem::size_of_val(sa) as libc::socklen_t -+ ), - } - } - } -@@ -805,7 +872,7 @@ impl fmt::Display for SockAddr { - target_os = "netbsd", - target_os = "openbsd"))] - SockAddr::Link(ref ether_addr) => ether_addr.fmt(f), -- #[cfg(target_os = "linux")] -+ #[cfg(any(target_os = "android", target_os = "linux"))] - SockAddr::Vsock(ref svm) => svm.fmt(f), - } - } -@@ -813,7 +880,7 @@ impl fmt::Display for SockAddr { - - #[cfg(any(target_os = "android", target_os = "linux"))] - pub mod netlink { -- use ::sys::socket::addr::AddressFamily; -+ use crate::sys::socket::addr::AddressFamily; - use libc::{sa_family_t, sockaddr_nl}; - use std::{fmt, mem}; - -@@ -911,11 +978,11 @@ pub mod alg { - - #[cfg(any(target_os = "ios", target_os = "macos"))] - pub mod sys_control { -- use ::sys::socket::addr::AddressFamily; -+ use crate::sys::socket::addr::AddressFamily; - use libc::{self, c_uchar}; - use std::{fmt, mem}; - use std::os::unix::io::RawFd; -- use {Errno, Error, Result}; -+ use crate::{Errno, Error, Result}; - - // FIXME: Move type into `libc` - #[repr(C)] -@@ -957,7 +1024,7 @@ pub mod sys_control { - - let mut ctl_name = [0; MAX_KCTL_NAME]; - ctl_name[..name.len()].clone_from_slice(name.as_bytes()); -- let mut info = ctl_ioc_info { ctl_id: 0, ctl_name: ctl_name }; -+ let mut info = ctl_ioc_info { ctl_id: 0, ctl_name }; - - unsafe { ctl_info(sockfd, &mut info)?; } - -@@ -981,9 +1048,9 @@ pub mod sys_control { - } - - --#[cfg(any(target_os = "android", target_os = "linux"))] -+#[cfg(any(target_os = "android", target_os = "linux", target_os = "fuchsia"))] - mod datalink { -- use super::{libc, fmt, AddressFamily}; -+ use super::{fmt, AddressFamily}; - - /// Hardware Address - #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -@@ -1023,14 +1090,14 @@ mod datalink { - - /// Physical-layer address (MAC) - pub fn addr(&self) -> [u8; 6] { -- let a = self.0.sll_addr[0] as u8; -- let b = self.0.sll_addr[1] as u8; -- let c = self.0.sll_addr[2] as u8; -- let d = self.0.sll_addr[3] as u8; -- let e = self.0.sll_addr[4] as u8; -- let f = self.0.sll_addr[5] as u8; -- -- [a, b, c, d, e, f] -+ [ -+ self.0.sll_addr[0] as u8, -+ self.0.sll_addr[1] as u8, -+ self.0.sll_addr[2] as u8, -+ self.0.sll_addr[3] as u8, -+ self.0.sll_addr[4] as u8, -+ self.0.sll_addr[5] as u8, -+ ] - } - } - -@@ -1055,7 +1122,7 @@ mod datalink { - target_os = "netbsd", - target_os = "openbsd"))] - mod datalink { -- use super::{libc, fmt, AddressFamily}; -+ use super::{fmt, AddressFamily}; - - /// Hardware Address - #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -@@ -1069,7 +1136,7 @@ mod datalink { - - /// always == AF_LINK - pub fn family(&self) -> AddressFamily { -- assert_eq!(self.0.sdl_family as i32, libc::AF_LINK); -+ assert_eq!(i32::from(self.0.sdl_family), libc::AF_LINK); - AddressFamily::Link - } - -@@ -1105,11 +1172,7 @@ mod datalink { - let alen = self.alen(); - let data_len = self.0.sdl_data.len(); - -- if alen > 0 && nlen + alen < data_len { -- false -- } else { -- true -- } -+ alen == 0 || nlen + alen >= data_len - } - - /// Physical-layer address (MAC) -@@ -1119,14 +1182,14 @@ mod datalink { - - assert!(!self.is_empty()); - -- let a = data[nlen] as u8; -- let b = data[nlen + 1] as u8; -- let c = data[nlen + 2] as u8; -- let d = data[nlen + 3] as u8; -- let e = data[nlen + 4] as u8; -- let f = data[nlen + 5] as u8; -- -- [a, b, c, d, e, f] -+ [ -+ data[nlen] as u8, -+ data[nlen + 1] as u8, -+ data[nlen + 2] as u8, -+ data[nlen + 3] as u8, -+ data[nlen + 4] as u8, -+ data[nlen + 5] as u8, -+ ] - } - } - -@@ -1144,9 +1207,9 @@ mod datalink { - } - } - --#[cfg(target_os = "linux")] -+#[cfg(any(target_os = "android", target_os = "linux"))] - pub mod vsock { -- use ::sys::socket::addr::AddressFamily; -+ use crate::sys::socket::addr::AddressFamily; - use libc::{sa_family_t, sockaddr_vm}; - use std::{fmt, mem}; - use std::hash::{Hash, Hasher}; -@@ -1269,7 +1332,7 @@ mod tests { - let addr = UnixAddr::new_abstract(name.as_bytes()).unwrap(); - - let sun_path1 = addr.sun_path(); -- let sun_path2 = [0u8, 110, 105, 120, 0, 97, 98, 115, 116, 114, 97, 99, 116, 0, 116, 101, 115, 116, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]; -+ let sun_path2 = [0u8, 110, 105, 120, 0, 97, 98, 115, 116, 114, 97, 99, 116, 0, 116, 101, 115, 116]; - assert_eq!(sun_path1.len(), sun_path2.len()); - for i in 0..sun_path1.len() { - assert_eq!(sun_path1[i], sun_path2[i]); -diff --git a/third_party/rust/nix/src/sys/socket/mod.rs b/third_party/rust/nix/src/sys/socket/mod.rs -index 1c12c5f851734..631d281ed16af 100644 ---- a/third_party/rust/nix/src/sys/socket/mod.rs -+++ b/third_party/rust/nix/src/sys/socket/mod.rs -@@ -1,14 +1,15 @@ - //! Socket interface functions - //! - //! [Further reading](http://man7.org/linux/man-pages/man7/socket.7.html) --use {Error, Result}; --use errno::Errno; -+use cfg_if::cfg_if; -+use crate::{Error, Result, errno::Errno}; - use libc::{self, c_void, c_int, iovec, socklen_t, size_t, - CMSG_FIRSTHDR, CMSG_NXTHDR, CMSG_DATA, CMSG_LEN}; -+use memoffset::offset_of; - use std::{mem, ptr, slice}; - use std::os::unix::io::RawFd; --use sys::time::TimeVal; --use sys::uio::IoVec; -+use crate::sys::time::TimeVal; -+use crate::sys::uio::IoVec; - - mod addr; - pub mod sockopt; -@@ -30,11 +31,11 @@ pub use self::addr::{ - LinkAddr, - }; - #[cfg(any(target_os = "android", target_os = "linux"))] --pub use ::sys::socket::addr::netlink::NetlinkAddr; -+pub use crate::sys::socket::addr::netlink::NetlinkAddr; - #[cfg(any(target_os = "android", target_os = "linux"))] --pub use sys::socket::addr::alg::AlgAddr; --#[cfg(target_os = "linux")] --pub use sys::socket::addr::vsock::VsockAddr; -+pub use crate::sys::socket::addr::alg::AlgAddr; -+#[cfg(any(target_os = "android", target_os = "linux"))] -+pub use crate::sys::socket::addr::vsock::VsockAddr; - - pub use libc::{ - cmsghdr, -@@ -92,6 +93,64 @@ pub enum SockProtocol { - /// ([ref](https://developer.apple.com/library/content/documentation/Darwin/Conceptual/NKEConceptual/control/control.html)) - #[cfg(any(target_os = "ios", target_os = "macos"))] - KextControl = libc::SYSPROTO_CONTROL, -+ /// Receives routing and link updates and may be used to modify the routing tables (both IPv4 and IPv6), IP addresses, link -+ // parameters, neighbor setups, queueing disciplines, traffic classes and packet classifiers -+ /// ([ref](https://www.man7.org/linux/man-pages/man7/netlink.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetlinkRoute = libc::NETLINK_ROUTE, -+ /// Reserved for user-mode socket protocols -+ /// ([ref](https://www.man7.org/linux/man-pages/man7/netlink.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetlinkUserSock = libc::NETLINK_USERSOCK, -+ /// Query information about sockets of various protocol families from the kernel -+ /// ([ref](https://www.man7.org/linux/man-pages/man7/netlink.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetlinkSockDiag = libc::NETLINK_SOCK_DIAG, -+ /// SELinux event notifications. -+ /// ([ref](https://www.man7.org/linux/man-pages/man7/netlink.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetlinkSELinux = libc::NETLINK_SELINUX, -+ /// Open-iSCSI -+ /// ([ref](https://www.man7.org/linux/man-pages/man7/netlink.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetlinkISCSI = libc::NETLINK_ISCSI, -+ /// Auditing -+ /// ([ref](https://www.man7.org/linux/man-pages/man7/netlink.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetlinkAudit = libc::NETLINK_AUDIT, -+ /// Access to FIB lookup from user space -+ /// ([ref](https://www.man7.org/linux/man-pages/man7/netlink.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetlinkFIBLookup = libc::NETLINK_FIB_LOOKUP, -+ /// Netfilter subsystem -+ /// ([ref](https://www.man7.org/linux/man-pages/man7/netlink.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetlinkNetFilter = libc::NETLINK_NETFILTER, -+ /// SCSI Transports -+ /// ([ref](https://www.man7.org/linux/man-pages/man7/netlink.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetlinkSCSITransport = libc::NETLINK_SCSITRANSPORT, -+ /// Infiniband RDMA -+ /// ([ref](https://www.man7.org/linux/man-pages/man7/netlink.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetlinkRDMA = libc::NETLINK_RDMA, -+ /// Transport IPv6 packets from netfilter to user space. Used by ip6_queue kernel module. -+ /// ([ref](https://www.man7.org/linux/man-pages/man7/netlink.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetlinkIPv6Firewall = libc::NETLINK_IP6_FW, -+ /// DECnet routing messages -+ /// ([ref](https://www.man7.org/linux/man-pages/man7/netlink.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetlinkDECNetRoutingMessage = libc::NETLINK_DNRTMSG, -+ /// Kernel messages to user space -+ /// ([ref](https://www.man7.org/linux/man-pages/man7/netlink.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetlinkKObjectUEvent = libc::NETLINK_KOBJECT_UEVENT, -+ /// Netlink interface to request information about ciphers registered with the kernel crypto API as well as allow -+ /// configuration of the kernel crypto API. -+ /// ([ref](https://www.man7.org/linux/man-pages/man7/netlink.7.html)) -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ NetlinkCrypto = libc::NETLINK_CRYPTO, - } - - libc_bitflags!{ -@@ -189,12 +248,22 @@ cfg_if! { - if #[cfg(any(target_os = "android", target_os = "linux"))] { - /// Unix credentials of the sending process. - /// -- /// This struct is used with the `SO_PEERCRED` ancillary message for UNIX sockets. -- #[repr(C)] -+ /// This struct is used with the `SO_PEERCRED` ancillary message -+ /// and the `SCM_CREDENTIALS` control message for UNIX sockets. -+ #[repr(transparent)] - #[derive(Clone, Copy, Debug, Eq, PartialEq)] - pub struct UnixCredentials(libc::ucred); - - impl UnixCredentials { -+ /// Creates a new instance with the credentials of the current process -+ pub fn new() -> Self { -+ UnixCredentials(libc::ucred { -+ pid: crate::unistd::getpid().as_raw(), -+ uid: crate::unistd::getuid().as_raw(), -+ gid: crate::unistd::getgid().as_raw(), -+ }) -+ } -+ - /// Returns the process identifier - pub fn pid(&self) -> libc::pid_t { - self.0.pid -@@ -211,6 +280,12 @@ cfg_if! { - } - } - -+ impl Default for UnixCredentials { -+ fn default() -> Self { -+ Self::new() -+ } -+ } -+ - impl From<libc::ucred> for UnixCredentials { - fn from(cred: libc::ucred) -> Self { - UnixCredentials(cred) -@@ -222,13 +297,53 @@ cfg_if! { - self.0 - } - } -+ } else if #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] { -+ /// Unix credentials of the sending process. -+ /// -+ /// This struct is used with the `SCM_CREDS` ancillary message for UNIX sockets. -+ #[repr(transparent)] -+ #[derive(Clone, Copy, Debug, Eq, PartialEq)] -+ pub struct UnixCredentials(libc::cmsgcred); -+ -+ impl UnixCredentials { -+ /// Returns the process identifier -+ pub fn pid(&self) -> libc::pid_t { -+ self.0.cmcred_pid -+ } -+ -+ /// Returns the real user identifier -+ pub fn uid(&self) -> libc::uid_t { -+ self.0.cmcred_uid -+ } -+ -+ /// Returns the effective user identifier -+ pub fn euid(&self) -> libc::uid_t { -+ self.0.cmcred_euid -+ } -+ -+ /// Returns the real group identifier -+ pub fn gid(&self) -> libc::gid_t { -+ self.0.cmcred_gid -+ } -+ -+ /// Returns a list group identifiers (the first one being the effective GID) -+ pub fn groups(&self) -> &[libc::gid_t] { -+ unsafe { slice::from_raw_parts(self.0.cmcred_groups.as_ptr() as *const libc::gid_t, self.0.cmcred_ngroups as _) } -+ } -+ } -+ -+ impl From<libc::cmsgcred> for UnixCredentials { -+ fn from(cred: libc::cmsgcred) -> Self { -+ UnixCredentials(cred) -+ } -+ } - } - } - - /// Request for multicast socket operations - /// - /// This is a wrapper type around `ip_mreq`. --#[repr(C)] -+#[repr(transparent)] - #[derive(Clone, Copy, Debug, Eq, PartialEq)] - pub struct IpMembershipRequest(libc::ip_mreq); - -@@ -247,7 +362,7 @@ impl IpMembershipRequest { - /// Request for ipv6 multicast socket operations - /// - /// This is a wrapper type around `ipv6_mreq`. --#[repr(C)] -+#[repr(transparent)] - #[derive(Clone, Copy, Debug, Eq, PartialEq)] - pub struct Ipv6MembershipRequest(libc::ipv6_mreq); - -@@ -261,21 +376,6 @@ impl Ipv6MembershipRequest { - } - } - --cfg_if! { -- // Darwin and DragonFly BSD always align struct cmsghdr to 32-bit only. -- if #[cfg(any(target_os = "dragonfly", target_os = "ios", target_os = "macos"))] { -- type align_of_cmsg_data = u32; -- } else { -- type align_of_cmsg_data = size_t; -- } --} -- --/// A type that can be used to store ancillary data received by --/// [`recvmsg`](fn.recvmsg.html) --pub trait CmsgBuffer { -- fn as_bytes_mut(&mut self) -> &mut [u8]; --} -- - /// Create a buffer large enough for storing some control messages as returned - /// by [`recvmsg`](fn.recvmsg.html). - /// -@@ -311,61 +411,11 @@ macro_rules! cmsg_space { - CMSG_SPACE(mem::size_of::<$x>() as c_uint) - } as usize; - )* -- let mut v = Vec::<u8>::with_capacity(space); -- // safe because any bit pattern is a valid u8 -- unsafe {v.set_len(space)}; -- v -+ Vec::<u8>::with_capacity(space) - } - } - } - --/// A structure used to make room in a cmsghdr passed to recvmsg. The --/// size and alignment match that of a cmsghdr followed by a T, but the --/// fields are not accessible, as the actual types will change on a call --/// to recvmsg. --/// --/// To make room for multiple messages, nest the type parameter with --/// tuples: --/// --/// ``` --/// use std::os::unix::io::RawFd; --/// use nix::sys::socket::CmsgSpace; --/// let cmsg: CmsgSpace<([RawFd; 3], CmsgSpace<[RawFd; 2]>)> = CmsgSpace::new(); --/// ``` --#[repr(C)] --#[derive(Clone, Copy, Debug, Eq, PartialEq)] --pub struct CmsgSpace<T> { -- _hdr: cmsghdr, -- _pad: [align_of_cmsg_data; 0], -- _data: T, --} -- --impl<T> CmsgSpace<T> { -- /// Create a CmsgSpace<T>. The structure is used only for space, so -- /// the fields are uninitialized. -- #[deprecated( since="0.14.0", note="Use the cmsg_space! macro instead")] -- pub fn new() -> Self { -- // Safe because the fields themselves aren't accessible. -- unsafe { mem::uninitialized() } -- } --} -- --impl<T> CmsgBuffer for CmsgSpace<T> { -- fn as_bytes_mut(&mut self) -> &mut [u8] { -- // Safe because nothing ever attempts to access CmsgSpace's fields -- unsafe { -- slice::from_raw_parts_mut(self as *mut CmsgSpace<T> as *mut u8, -- mem::size_of::<Self>()) -- } -- } --} -- --impl CmsgBuffer for Vec<u8> { -- fn as_bytes_mut(&mut self) -> &mut [u8] { -- &mut self[..] -- } --} -- - #[derive(Clone, Copy, Debug, Eq, PartialEq)] - pub struct RecvMsg<'a> { - pub bytes: usize, -@@ -433,7 +483,11 @@ pub enum ControlMessageOwned { - /// Received version of - /// [`ControlMessage::ScmCredentials`][#enum.ControlMessage.html#variant.ScmCredentials] - #[cfg(any(target_os = "android", target_os = "linux"))] -- ScmCredentials(libc::ucred), -+ ScmCredentials(UnixCredentials), -+ /// Received version of -+ /// [`ControlMessage::ScmCreds`][#enum.ControlMessage.html#variant.ScmCreds] -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ ScmCreds(UnixCredentials), - /// A message of type `SCM_TIMESTAMP`, containing the time the - /// packet was received by the kernel. - /// -@@ -442,10 +496,6 @@ pub enum ControlMessageOwned { - /// - /// # Examples - /// -- // Disable this test on FreeBSD i386 -- // https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=222039 -- #[cfg_attr(not(all(target_os = "freebsd", target_arch = "x86")), doc = " ```")] -- #[cfg_attr(all(target_os = "freebsd", target_arch = "x86"), doc = " ```no_run")] - /// # #[macro_use] extern crate nix; - /// # use nix::sys::socket::*; - /// # use nix::sys::uio::IoVec; -@@ -528,6 +578,18 @@ pub enum ControlMessageOwned { - target_os = "openbsd", - ))] - Ipv4RecvDstAddr(libc::in_addr), -+ -+ /// UDP Generic Receive Offload (GRO) allows receiving multiple UDP -+ /// packets from a single sender. -+ /// Fixed-size payloads are following one by one in a receive buffer. -+ /// This Control Message indicates the size of all smaller packets, -+ /// except, maybe, the last one. -+ /// -+ /// `UdpGroSegment` socket option should be enabled on a socket -+ /// to allow receiving GRO packets. -+ #[cfg(target_os = "linux")] -+ UdpGroSegments(u16), -+ - /// Catch-all variant for unimplemented cmsg types. - #[doc(hidden)] - Unknown(UnknownCmsg), -@@ -540,9 +602,9 @@ impl ControlMessageOwned { - /// specified in the header. Normally, the kernel ensures that this is the - /// case. "Correct" in this case includes correct length, alignment and - /// actual content. -- /// -- /// Returns `None` if the data may be unaligned. In that case use -- /// `ControlMessageOwned::decode_from`. -+ // Clippy complains about the pointer alignment of `p`, not understanding -+ // that it's being fed to a function that can handle that. -+ #[allow(clippy::cast_ptr_alignment)] - unsafe fn decode_from(header: &cmsghdr) -> ControlMessageOwned - { - let p = CMSG_DATA(header); -@@ -553,16 +615,20 @@ impl ControlMessageOwned { - let n = len / mem::size_of::<RawFd>(); - let mut fds = Vec::with_capacity(n); - for i in 0..n { -- let fdp = (p as *const RawFd).offset(i as isize); -+ let fdp = (p as *const RawFd).add(i); - fds.push(ptr::read_unaligned(fdp)); - } -- let cmo = ControlMessageOwned::ScmRights(fds); -- cmo -+ ControlMessageOwned::ScmRights(fds) - }, - #[cfg(any(target_os = "android", target_os = "linux"))] - (libc::SOL_SOCKET, libc::SCM_CREDENTIALS) => { - let cred: libc::ucred = ptr::read_unaligned(p as *const _); -- ControlMessageOwned::ScmCredentials(cred) -+ ControlMessageOwned::ScmCredentials(cred.into()) -+ } -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ (libc::SOL_SOCKET, libc::SCM_CREDS) => { -+ let cred: libc::cmsgcred = ptr::read_unaligned(p as *const _); -+ ControlMessageOwned::ScmCreds(cred.into()) - } - (libc::SOL_SOCKET, libc::SCM_TIMESTAMP) => { - let tv: libc::timeval = ptr::read_unaligned(p as *const _); -@@ -612,6 +678,11 @@ impl ControlMessageOwned { - let dl = ptr::read_unaligned(p as *const libc::in_addr); - ControlMessageOwned::Ipv4RecvDstAddr(dl) - }, -+ #[cfg(target_os = "linux")] -+ (libc::SOL_UDP, libc::UDP_GRO) => { -+ let gso_size: u16 = ptr::read_unaligned(p as *const _); -+ ControlMessageOwned::UdpGroSegments(gso_size) -+ }, - (_, _) => { - let sl = slice::from_raw_parts(p, len); - let ucmsg = UnknownCmsg(*header, Vec::<u8>::from(&sl[..])); -@@ -650,10 +721,22 @@ pub enum ControlMessage<'a> { - /// - /// For further information, please refer to the - /// [`unix(7)`](http://man7.org/linux/man-pages/man7/unix.7.html) man page. -- // FIXME: When `#[repr(transparent)]` is stable, use it on `UnixCredentials` -- // and put that in here instead of a raw ucred. - #[cfg(any(target_os = "android", target_os = "linux"))] -- ScmCredentials(&'a libc::ucred), -+ ScmCredentials(&'a UnixCredentials), -+ /// A message of type `SCM_CREDS`, containing the pid, uid, euid, gid and groups of -+ /// a process connected to the socket. -+ /// -+ /// This is similar to the socket options `LOCAL_CREDS` and `LOCAL_PEERCRED`, but -+ /// requires a process to explicitly send its credentials. -+ /// -+ /// Credentials are always overwritten by the kernel, so this variant does have -+ /// any data, unlike the receive-side -+ /// [`ControlMessageOwned::ScmCreds`][#enum.ControlMessageOwned.html#variant.ScmCreds]. -+ /// -+ /// For further information, please refer to the -+ /// [`unix(4)`](https://www.freebsd.org/cgi/man.cgi?query=unix) man page. -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ ScmCreds, - - /// Set IV for `AF_ALG` crypto API. - /// -@@ -685,6 +768,39 @@ pub enum ControlMessage<'a> { - ))] - AlgSetAeadAssoclen(&'a u32), - -+ /// UDP GSO makes it possible for applications to generate network packets -+ /// for a virtual MTU much greater than the real one. -+ /// The length of the send data no longer matches the expected length on -+ /// the wire. -+ /// The size of the datagram payload as it should appear on the wire may be -+ /// passed through this control message. -+ /// Send buffer should consist of multiple fixed-size wire payloads -+ /// following one by one, and the last, possibly smaller one. -+ #[cfg(target_os = "linux")] -+ UdpGsoSegments(&'a u16), -+ -+ /// Configure the sending addressing and interface for v4 -+ /// -+ /// For further information, please refer to the -+ /// [`ip(7)`](http://man7.org/linux/man-pages/man7/ip.7.html) man page. -+ #[cfg(any(target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "android", -+ target_os = "ios",))] -+ Ipv4PacketInfo(&'a libc::in_pktinfo), -+ -+ /// Configure the sending addressing and interface for v6 -+ /// -+ /// For further information, please refer to the -+ /// [`ipv6(7)`](http://man7.org/linux/man-pages/man7/ipv6.7.html) man page. -+ #[cfg(any(target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "freebsd", -+ target_os = "android", -+ target_os = "ios",))] -+ Ipv6PacketInfo(&'a libc::in6_pktinfo), - } - - // An opaque structure used to prevent cmsghdr from being a public type -@@ -715,35 +831,66 @@ impl<'a> ControlMessage<'a> { - - /// Return a reference to the payload data as a byte pointer - fn copy_to_cmsg_data(&self, cmsg_data: *mut u8) { -- let data_ptr = match self { -- &ControlMessage::ScmRights(fds) => { -+ let data_ptr = match *self { -+ ControlMessage::ScmRights(fds) => { - fds as *const _ as *const u8 - }, - #[cfg(any(target_os = "android", target_os = "linux"))] -- &ControlMessage::ScmCredentials(creds) => { -- creds as *const libc::ucred as *const u8 -+ ControlMessage::ScmCredentials(creds) => { -+ &creds.0 as *const libc::ucred as *const u8 -+ } -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ ControlMessage::ScmCreds => { -+ // The kernel overwrites the data, we just zero it -+ // to make sure it's not uninitialized memory -+ unsafe { ptr::write_bytes(cmsg_data, 0, self.len()) }; -+ return - } - #[cfg(any(target_os = "android", target_os = "linux"))] -- &ControlMessage::AlgSetIv(iv) => { -+ ControlMessage::AlgSetIv(iv) => { -+ #[allow(deprecated)] // https://github.com/rust-lang/libc/issues/1501 -+ let af_alg_iv = libc::af_alg_iv { -+ ivlen: iv.len() as u32, -+ iv: [0u8; 0], -+ }; -+ -+ let size = mem::size_of_val(&af_alg_iv); -+ - unsafe { -- let alg_iv = cmsg_data as *mut libc::af_alg_iv; -- (*alg_iv).ivlen = iv.len() as u32; -+ ptr::copy_nonoverlapping( -+ &af_alg_iv as *const _ as *const u8, -+ cmsg_data, -+ size, -+ ); - ptr::copy_nonoverlapping( - iv.as_ptr(), -- (*alg_iv).iv.as_mut_ptr(), -+ cmsg_data.add(size), - iv.len() - ); - }; -+ - return - }, - #[cfg(any(target_os = "android", target_os = "linux"))] -- &ControlMessage::AlgSetOp(op) => { -+ ControlMessage::AlgSetOp(op) => { - op as *const _ as *const u8 - }, - #[cfg(any(target_os = "android", target_os = "linux"))] -- &ControlMessage::AlgSetAeadAssoclen(len) => { -+ ControlMessage::AlgSetAeadAssoclen(len) => { - len as *const _ as *const u8 - }, -+ #[cfg(target_os = "linux")] -+ ControlMessage::UdpGsoSegments(gso_size) => { -+ gso_size as *const _ as *const u8 -+ }, -+ #[cfg(any(target_os = "linux", target_os = "macos", -+ target_os = "netbsd", target_os = "android", -+ target_os = "ios",))] -+ ControlMessage::Ipv4PacketInfo(info) => info as *const _ as *const u8, -+ #[cfg(any(target_os = "linux", target_os = "macos", -+ target_os = "netbsd", target_os = "freebsd", -+ target_os = "android", target_os = "ios",))] -+ ControlMessage::Ipv6PacketInfo(info) => info as *const _ as *const u8, - }; - unsafe { - ptr::copy_nonoverlapping( -@@ -756,60 +903,101 @@ impl<'a> ControlMessage<'a> { - - /// The size of the payload, excluding its cmsghdr - fn len(&self) -> usize { -- match self { -- &ControlMessage::ScmRights(fds) => { -+ match *self { -+ ControlMessage::ScmRights(fds) => { - mem::size_of_val(fds) - }, - #[cfg(any(target_os = "android", target_os = "linux"))] -- &ControlMessage::ScmCredentials(creds) => { -+ ControlMessage::ScmCredentials(creds) => { - mem::size_of_val(creds) - } -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ ControlMessage::ScmCreds => { -+ mem::size_of::<libc::cmsgcred>() -+ } - #[cfg(any(target_os = "android", target_os = "linux"))] -- &ControlMessage::AlgSetIv(iv) => { -- mem::size_of::<libc::af_alg_iv>() + iv.len() -+ ControlMessage::AlgSetIv(iv) => { -+ mem::size_of_val(&iv) + iv.len() - }, - #[cfg(any(target_os = "android", target_os = "linux"))] -- &ControlMessage::AlgSetOp(op) => { -+ ControlMessage::AlgSetOp(op) => { - mem::size_of_val(op) - }, - #[cfg(any(target_os = "android", target_os = "linux"))] -- &ControlMessage::AlgSetAeadAssoclen(len) => { -+ ControlMessage::AlgSetAeadAssoclen(len) => { - mem::size_of_val(len) - }, -+ #[cfg(target_os = "linux")] -+ ControlMessage::UdpGsoSegments(gso_size) => { -+ mem::size_of_val(gso_size) -+ }, -+ #[cfg(any(target_os = "linux", target_os = "macos", -+ target_os = "netbsd", target_os = "android", -+ target_os = "ios",))] -+ ControlMessage::Ipv4PacketInfo(info) => mem::size_of_val(info), -+ #[cfg(any(target_os = "linux", target_os = "macos", -+ target_os = "netbsd", target_os = "freebsd", -+ target_os = "android", target_os = "ios",))] -+ ControlMessage::Ipv6PacketInfo(info) => mem::size_of_val(info), - } - } - - /// Returns the value to put into the `cmsg_level` field of the header. - fn cmsg_level(&self) -> libc::c_int { -- match self { -- &ControlMessage::ScmRights(_) => libc::SOL_SOCKET, -+ match *self { -+ ControlMessage::ScmRights(_) => libc::SOL_SOCKET, - #[cfg(any(target_os = "android", target_os = "linux"))] -- &ControlMessage::ScmCredentials(_) => libc::SOL_SOCKET, -+ ControlMessage::ScmCredentials(_) => libc::SOL_SOCKET, -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ ControlMessage::ScmCreds => libc::SOL_SOCKET, - #[cfg(any(target_os = "android", target_os = "linux"))] -- &ControlMessage::AlgSetIv(_) | &ControlMessage::AlgSetOp(_) | &ControlMessage::AlgSetAeadAssoclen(_) => { -- libc::SOL_ALG -- }, -+ ControlMessage::AlgSetIv(_) | ControlMessage::AlgSetOp(_) | -+ ControlMessage::AlgSetAeadAssoclen(_) => libc::SOL_ALG, -+ #[cfg(target_os = "linux")] -+ ControlMessage::UdpGsoSegments(_) => libc::SOL_UDP, -+ #[cfg(any(target_os = "linux", target_os = "macos", -+ target_os = "netbsd", target_os = "android", -+ target_os = "ios",))] -+ ControlMessage::Ipv4PacketInfo(_) => libc::IPPROTO_IP, -+ #[cfg(any(target_os = "linux", target_os = "macos", -+ target_os = "netbsd", target_os = "freebsd", -+ target_os = "android", target_os = "ios",))] -+ ControlMessage::Ipv6PacketInfo(_) => libc::IPPROTO_IPV6, - } - } - - /// Returns the value to put into the `cmsg_type` field of the header. - fn cmsg_type(&self) -> libc::c_int { -- match self { -- &ControlMessage::ScmRights(_) => libc::SCM_RIGHTS, -+ match *self { -+ ControlMessage::ScmRights(_) => libc::SCM_RIGHTS, - #[cfg(any(target_os = "android", target_os = "linux"))] -- &ControlMessage::ScmCredentials(_) => libc::SCM_CREDENTIALS, -+ ControlMessage::ScmCredentials(_) => libc::SCM_CREDENTIALS, -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ ControlMessage::ScmCreds => libc::SCM_CREDS, - #[cfg(any(target_os = "android", target_os = "linux"))] -- &ControlMessage::AlgSetIv(_) => { -+ ControlMessage::AlgSetIv(_) => { - libc::ALG_SET_IV - }, - #[cfg(any(target_os = "android", target_os = "linux"))] -- &ControlMessage::AlgSetOp(_) => { -+ ControlMessage::AlgSetOp(_) => { - libc::ALG_SET_OP - }, - #[cfg(any(target_os = "android", target_os = "linux"))] -- &ControlMessage::AlgSetAeadAssoclen(_) => { -+ ControlMessage::AlgSetAeadAssoclen(_) => { - libc::ALG_SET_AEAD_ASSOCLEN - }, -+ #[cfg(target_os = "linux")] -+ ControlMessage::UdpGsoSegments(_) => { -+ libc::UDP_SEGMENT -+ }, -+ #[cfg(any(target_os = "linux", target_os = "macos", -+ target_os = "netbsd", target_os = "android", -+ target_os = "ios",))] -+ ControlMessage::Ipv4PacketInfo(_) => libc::IP_PKTINFO, -+ #[cfg(any(target_os = "linux", target_os = "macos", -+ target_os = "netbsd", target_os = "freebsd", -+ target_os = "android", target_os = "ios",))] -+ ControlMessage::Ipv6PacketInfo(_) => libc::IPV6_PKTINFO, - } - } - -@@ -836,12 +1024,303 @@ pub fn sendmsg(fd: RawFd, iov: &[IoVec<&[u8]>], cmsgs: &[ControlMessage], - - // First size the buffer needed to hold the cmsgs. It must be zeroed, - // because subsequent code will not clear the padding bytes. -- let cmsg_buffer = vec![0u8; capacity]; -+ let mut cmsg_buffer = vec![0u8; capacity]; -+ -+ let mhdr = pack_mhdr_to_send(&mut cmsg_buffer[..], &iov, &cmsgs, addr); -+ -+ let ret = unsafe { libc::sendmsg(fd, &mhdr, flags.bits()) }; -+ -+ Errno::result(ret).map(|r| r as usize) -+} -+ -+#[cfg(any( -+ target_os = "linux", -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "netbsd", -+))] -+#[derive(Debug)] -+pub struct SendMmsgData<'a, I, C> -+ where -+ I: AsRef<[IoVec<&'a [u8]>]>, -+ C: AsRef<[ControlMessage<'a>]> -+{ -+ pub iov: I, -+ pub cmsgs: C, -+ pub addr: Option<SockAddr>, -+ pub _lt: std::marker::PhantomData<&'a I>, -+} -+ -+/// An extension of `sendmsg` that allows the caller to transmit multiple -+/// messages on a socket using a single system call. This has performance -+/// benefits for some applications. -+/// -+/// Allocations are performed for cmsgs and to build `msghdr` buffer -+/// -+/// # Arguments -+/// -+/// * `fd`: Socket file descriptor -+/// * `data`: Struct that implements `IntoIterator` with `SendMmsgData` items -+/// * `flags`: Optional flags passed directly to the operating system. -+/// -+/// # Returns -+/// `Vec` with numbers of sent bytes on each sent message. -+/// -+/// # References -+/// [`sendmsg`](fn.sendmsg.html) -+#[cfg(any( -+ target_os = "linux", -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "netbsd", -+))] -+pub fn sendmmsg<'a, I, C>( -+ fd: RawFd, -+ data: impl std::iter::IntoIterator<Item=&'a SendMmsgData<'a, I, C>>, -+ flags: MsgFlags -+) -> Result<Vec<usize>> -+ where -+ I: AsRef<[IoVec<&'a [u8]>]> + 'a, -+ C: AsRef<[ControlMessage<'a>]> + 'a, -+{ -+ let iter = data.into_iter(); -+ -+ let size_hint = iter.size_hint(); -+ let reserve_items = size_hint.1.unwrap_or(size_hint.0); -+ -+ let mut output = Vec::<libc::mmsghdr>::with_capacity(reserve_items); -+ -+ let mut cmsgs_buffer = vec![0u8; 0]; -+ -+ for d in iter { -+ let cmsgs_start = cmsgs_buffer.len(); -+ let cmsgs_required_capacity: usize = d.cmsgs.as_ref().iter().map(|c| c.space()).sum(); -+ let cmsgs_buffer_need_capacity = cmsgs_start + cmsgs_required_capacity; -+ cmsgs_buffer.resize(cmsgs_buffer_need_capacity, 0); -+ -+ output.push(libc::mmsghdr { -+ msg_hdr: pack_mhdr_to_send( -+ &mut cmsgs_buffer[cmsgs_start..], -+ &d.iov, -+ &d.cmsgs, -+ d.addr.as_ref() -+ ), -+ msg_len: 0, -+ }); -+ }; -+ -+ let ret = unsafe { libc::sendmmsg(fd, output.as_mut_ptr(), output.len() as _, flags.bits() as _) }; -+ -+ let sent_messages = Errno::result(ret)? as usize; -+ let mut sent_bytes = Vec::with_capacity(sent_messages); -+ -+ for item in &output { -+ sent_bytes.push(item.msg_len as usize); -+ } -+ -+ Ok(sent_bytes) -+} -+ -+ -+#[cfg(any( -+ target_os = "linux", -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "netbsd", -+))] -+#[derive(Debug)] -+pub struct RecvMmsgData<'a, I> -+ where -+ I: AsRef<[IoVec<&'a mut [u8]>]> + 'a, -+{ -+ pub iov: I, -+ pub cmsg_buffer: Option<&'a mut Vec<u8>>, -+} -+ -+/// An extension of `recvmsg` that allows the caller to receive multiple -+/// messages from a socket using a single system call. This has -+/// performance benefits for some applications. -+/// -+/// `iov` and `cmsg_buffer` should be constructed similarly to `recvmsg` -+/// -+/// Multiple allocations are performed -+/// -+/// # Arguments -+/// -+/// * `fd`: Socket file descriptor -+/// * `data`: Struct that implements `IntoIterator` with `RecvMmsgData` items -+/// * `flags`: Optional flags passed directly to the operating system. -+/// -+/// # RecvMmsgData -+/// -+/// * `iov`: Scatter-gather list of buffers to receive the message -+/// * `cmsg_buffer`: Space to receive ancillary data. Should be created by -+/// [`cmsg_space!`](macro.cmsg_space.html) -+/// -+/// # Returns -+/// A `Vec` with multiple `RecvMsg`, one per received message -+/// -+/// # References -+/// - [`recvmsg`](fn.recvmsg.html) -+/// - [`RecvMsg`](struct.RecvMsg.html) -+#[cfg(any( -+ target_os = "linux", -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "netbsd", -+))] -+pub fn recvmmsg<'a, I>( -+ fd: RawFd, -+ data: impl std::iter::IntoIterator<Item=&'a mut RecvMmsgData<'a, I>, -+ IntoIter=impl ExactSizeIterator + Iterator<Item=&'a mut RecvMmsgData<'a, I>>>, -+ flags: MsgFlags, -+ timeout: Option<crate::sys::time::TimeSpec> -+) -> Result<Vec<RecvMsg<'a>>> -+ where -+ I: AsRef<[IoVec<&'a mut [u8]>]> + 'a, -+{ -+ let iter = data.into_iter(); -+ -+ let num_messages = iter.len(); -+ -+ let mut output: Vec<libc::mmsghdr> = Vec::with_capacity(num_messages); -+ -+ // Addresses should be pre-allocated. pack_mhdr_to_receive will store them -+ // as raw pointers, so we may not move them. Turn the vec into a boxed -+ // slice so we won't inadvertently reallocate the vec. -+ let mut addresses = vec![mem::MaybeUninit::uninit(); num_messages] -+ .into_boxed_slice(); -+ -+ let results: Vec<_> = iter.enumerate().map(|(i, d)| { -+ let (msg_controllen, mhdr) = unsafe { -+ pack_mhdr_to_receive( -+ d.iov.as_ref(), -+ &mut d.cmsg_buffer, -+ addresses[i].as_mut_ptr(), -+ ) -+ }; -+ -+ output.push( -+ libc::mmsghdr { -+ msg_hdr: mhdr, -+ msg_len: 0, -+ } -+ ); -+ -+ (msg_controllen as usize, &mut d.cmsg_buffer) -+ }).collect(); -+ -+ let timeout = if let Some(mut t) = timeout { -+ t.as_mut() as *mut libc::timespec -+ } else { -+ ptr::null_mut() -+ }; -+ -+ let ret = unsafe { libc::recvmmsg(fd, output.as_mut_ptr(), output.len() as _, flags.bits() as _, timeout) }; -+ -+ let _ = Errno::result(ret)?; -+ -+ Ok(output -+ .into_iter() -+ .take(ret as usize) -+ .zip(addresses.iter().map(|addr| unsafe{addr.assume_init()})) -+ .zip(results.into_iter()) -+ .map(|((mmsghdr, address), (msg_controllen, cmsg_buffer))| { -+ unsafe { -+ read_mhdr( -+ mmsghdr.msg_hdr, -+ mmsghdr.msg_len as isize, -+ msg_controllen, -+ address, -+ cmsg_buffer -+ ) -+ } -+ }) -+ .collect()) -+} -+ -+unsafe fn read_mhdr<'a, 'b>( -+ mhdr: msghdr, -+ r: isize, -+ msg_controllen: usize, -+ address: sockaddr_storage, -+ cmsg_buffer: &'a mut Option<&'b mut Vec<u8>> -+) -> RecvMsg<'b> { -+ let cmsghdr = { -+ if mhdr.msg_controllen > 0 { -+ // got control message(s) -+ cmsg_buffer -+ .as_mut() -+ .unwrap() -+ .set_len(mhdr.msg_controllen as usize); -+ debug_assert!(!mhdr.msg_control.is_null()); -+ debug_assert!(msg_controllen >= mhdr.msg_controllen as usize); -+ CMSG_FIRSTHDR(&mhdr as *const msghdr) -+ } else { -+ ptr::null() -+ }.as_ref() -+ }; -+ -+ let address = sockaddr_storage_to_addr( -+ &address , -+ mhdr.msg_namelen as usize -+ ).ok(); -+ -+ RecvMsg { -+ bytes: r as usize, -+ cmsghdr, -+ address, -+ flags: MsgFlags::from_bits_truncate(mhdr.msg_flags), -+ mhdr, -+ } -+} -+ -+unsafe fn pack_mhdr_to_receive<'a, I>( -+ iov: I, -+ cmsg_buffer: &mut Option<&mut Vec<u8>>, -+ address: *mut sockaddr_storage, -+) -> (usize, msghdr) -+ where -+ I: AsRef<[IoVec<&'a mut [u8]>]> + 'a, -+{ -+ let (msg_control, msg_controllen) = cmsg_buffer.as_mut() -+ .map(|v| (v.as_mut_ptr(), v.capacity())) -+ .unwrap_or((ptr::null_mut(), 0)); -+ -+ let mhdr = { -+ // Musl's msghdr has private fields, so this is the only way to -+ // initialize it. -+ let mut mhdr = mem::MaybeUninit::<msghdr>::zeroed(); -+ let p = mhdr.as_mut_ptr(); -+ (*p).msg_name = address as *mut c_void; -+ (*p).msg_namelen = mem::size_of::<sockaddr_storage>() as socklen_t; -+ (*p).msg_iov = iov.as_ref().as_ptr() as *mut iovec; -+ (*p).msg_iovlen = iov.as_ref().len() as _; -+ (*p).msg_control = msg_control as *mut c_void; -+ (*p).msg_controllen = msg_controllen as _; -+ (*p).msg_flags = 0; -+ mhdr.assume_init() -+ }; -+ -+ (msg_controllen, mhdr) -+} -+ -+fn pack_mhdr_to_send<'a, I, C>( -+ cmsg_buffer: &mut [u8], -+ iov: I, -+ cmsgs: C, -+ addr: Option<&SockAddr> -+) -> msghdr -+ where -+ I: AsRef<[IoVec<&'a [u8]>]>, -+ C: AsRef<[ControlMessage<'a>]> -+{ -+ let capacity = cmsg_buffer.len(); - - // Next encode the sending address, if provided - let (name, namelen) = match addr { - Some(addr) => { -- let (x, y) = unsafe { addr.as_ffi_pair() }; -+ let (x, y) = addr.as_ffi_pair(); - (x as *const _, y) - }, - None => (ptr::null(), 0), -@@ -854,97 +1333,68 @@ pub fn sendmsg(fd: RawFd, iov: &[IoVec<&[u8]>], cmsgs: &[ControlMessage], - ptr::null_mut() - }; - -- let mhdr = { -+ let mhdr = unsafe { - // Musl's msghdr has private fields, so this is the only way to - // initialize it. -- let mut mhdr: msghdr = unsafe{mem::uninitialized()}; -- mhdr.msg_name = name as *mut _; -- mhdr.msg_namelen = namelen; -+ let mut mhdr = mem::MaybeUninit::<msghdr>::zeroed(); -+ let p = mhdr.as_mut_ptr(); -+ (*p).msg_name = name as *mut _; -+ (*p).msg_namelen = namelen; - // transmute iov into a mutable pointer. sendmsg doesn't really mutate - // the buffer, but the standard says that it takes a mutable pointer -- mhdr.msg_iov = iov.as_ptr() as *mut _; -- mhdr.msg_iovlen = iov.len() as _; -- mhdr.msg_control = cmsg_ptr; -- mhdr.msg_controllen = capacity as _; -- mhdr.msg_flags = 0; -- mhdr -+ (*p).msg_iov = iov.as_ref().as_ptr() as *mut _; -+ (*p).msg_iovlen = iov.as_ref().len() as _; -+ (*p).msg_control = cmsg_ptr; -+ (*p).msg_controllen = capacity as _; -+ (*p).msg_flags = 0; -+ mhdr.assume_init() - }; - - // Encode each cmsg. This must happen after initializing the header because - // CMSG_NEXT_HDR and friends read the msg_control and msg_controllen fields. - // CMSG_FIRSTHDR is always safe -- let mut pmhdr: *mut cmsghdr = unsafe{CMSG_FIRSTHDR(&mhdr as *const msghdr)}; -- for cmsg in cmsgs { -+ let mut pmhdr: *mut cmsghdr = unsafe { CMSG_FIRSTHDR(&mhdr as *const msghdr) }; -+ for cmsg in cmsgs.as_ref() { - assert_ne!(pmhdr, ptr::null_mut()); - // Safe because we know that pmhdr is valid, and we initialized it with - // sufficient space - unsafe { cmsg.encode_into(pmhdr) }; - // Safe because mhdr is valid -- pmhdr = unsafe{CMSG_NXTHDR(&mhdr as *const msghdr, pmhdr)}; -+ pmhdr = unsafe { CMSG_NXTHDR(&mhdr as *const msghdr, pmhdr) }; - } - -- let ret = unsafe { libc::sendmsg(fd, &mhdr, flags.bits()) }; -- -- Errno::result(ret).map(|r| r as usize) -+ mhdr - } - - /// Receive message in scatter-gather vectors from a socket, and - /// optionally receive ancillary data into the provided buffer. - /// If no ancillary data is desired, use () as the type parameter. - /// -+/// # Arguments -+/// -+/// * `fd`: Socket file descriptor -+/// * `iov`: Scatter-gather list of buffers to receive the message -+/// * `cmsg_buffer`: Space to receive ancillary data. Should be created by -+/// [`cmsg_space!`](macro.cmsg_space.html) -+/// * `flags`: Optional flags passed directly to the operating system. -+/// - /// # References - /// [recvmsg(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/recvmsg.html) - pub fn recvmsg<'a>(fd: RawFd, iov: &[IoVec<&mut [u8]>], -- cmsg_buffer: Option<&'a mut dyn CmsgBuffer>, -+ mut cmsg_buffer: Option<&'a mut Vec<u8>>, - flags: MsgFlags) -> Result<RecvMsg<'a>> - { -- let mut address: sockaddr_storage = unsafe { mem::uninitialized() }; -- let (msg_control, msg_controllen) = match cmsg_buffer { -- Some(cmsgspace) => { -- let msg_buf = cmsgspace.as_bytes_mut(); -- (msg_buf.as_mut_ptr(), msg_buf.len()) -- }, -- None => (ptr::null_mut(), 0), -- }; -- let mut mhdr = { -- // Musl's msghdr has private fields, so this is the only way to -- // initialize it. -- let mut mhdr: msghdr = unsafe{mem::uninitialized()}; -- mhdr.msg_name = &mut address as *mut sockaddr_storage as *mut c_void; -- mhdr.msg_namelen = mem::size_of::<sockaddr_storage>() as socklen_t; -- mhdr.msg_iov = iov.as_ptr() as *mut iovec; -- mhdr.msg_iovlen = iov.len() as _; -- mhdr.msg_control = msg_control as *mut c_void; -- mhdr.msg_controllen = msg_controllen as _; -- mhdr.msg_flags = 0; -- mhdr -+ let mut address = mem::MaybeUninit::uninit(); -+ -+ let (msg_controllen, mut mhdr) = unsafe { -+ pack_mhdr_to_receive(&iov, &mut cmsg_buffer, address.as_mut_ptr()) - }; - - let ret = unsafe { libc::recvmsg(fd, &mut mhdr, flags.bits()) }; - -- Errno::result(ret).map(|r| { -- let cmsghdr = unsafe { -- if mhdr.msg_controllen > 0 { -- // got control message(s) -- debug_assert!(!mhdr.msg_control.is_null()); -- debug_assert!(msg_controllen >= mhdr.msg_controllen as usize); -- CMSG_FIRSTHDR(&mhdr as *const msghdr) -- } else { -- ptr::null() -- }.as_ref() -- }; -+ let r = Errno::result(ret)?; - -- let address = unsafe { -- sockaddr_storage_to_addr(&address, mhdr.msg_namelen as usize).ok() -- }; -- RecvMsg { -- bytes: r as usize, -- cmsghdr, -- address, -- flags: MsgFlags::from_bits_truncate(mhdr.msg_flags), -- mhdr, -- } -- }) -+ Ok(unsafe { read_mhdr(mhdr, r, msg_controllen, address.assume_init(), &mut cmsg_buffer) }) - } - - -@@ -1071,12 +1521,15 @@ pub fn recv(sockfd: RawFd, buf: &mut [u8], flags: MsgFlags) -> Result<usize> { - } - - /// Receive data from a connectionless or connection-oriented socket. Returns --/// the number of bytes read and the socket address of the sender. -+/// the number of bytes read and, for connectionless sockets, the socket -+/// address of the sender. - /// - /// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/recvfrom.html) --pub fn recvfrom(sockfd: RawFd, buf: &mut [u8]) -> Result<(usize, SockAddr)> { -+pub fn recvfrom(sockfd: RawFd, buf: &mut [u8]) -+ -> Result<(usize, Option<SockAddr>)> -+{ - unsafe { -- let addr: sockaddr_storage = mem::zeroed(); -+ let mut addr: sockaddr_storage = mem::zeroed(); - let mut len = mem::size_of::<sockaddr_storage>() as socklen_t; - - let ret = Errno::result(libc::recvfrom( -@@ -1084,11 +1537,14 @@ pub fn recvfrom(sockfd: RawFd, buf: &mut [u8]) -> Result<(usize, SockAddr)> { - buf.as_ptr() as *mut c_void, - buf.len() as size_t, - 0, -- mem::transmute(&addr), -- &mut len as *mut socklen_t))?; -+ &mut addr as *mut libc::sockaddr_storage as *mut libc::sockaddr, -+ &mut len as *mut socklen_t))? as usize; - -- sockaddr_storage_to_addr(&addr, len as usize) -- .map(|addr| (ret as usize, addr)) -+ match sockaddr_storage_to_addr(&addr, len as usize) { -+ Err(Error::Sys(Errno::ENOTCONN)) => Ok((ret, None)), -+ Ok(addr) => Ok((ret, Some(addr))), -+ Err(e) => Err(e) -+ } - } - } - -@@ -1121,24 +1577,6 @@ pub fn send(fd: RawFd, buf: &[u8], flags: MsgFlags) -> Result<usize> { - * - */ - --/// The protocol level at which to get / set socket options. Used as an --/// argument to `getsockopt` and `setsockopt`. --/// --/// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/setsockopt.html) --#[repr(i32)] --#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] --pub enum SockLevel { -- Socket = libc::SOL_SOCKET, -- Tcp = libc::IPPROTO_TCP, -- Ip = libc::IPPROTO_IP, -- Ipv6 = libc::IPPROTO_IPV6, -- Udp = libc::IPPROTO_UDP, -- #[cfg(any(target_os = "android", target_os = "linux"))] -- Netlink = libc::SOL_NETLINK, -- #[cfg(any(target_os = "android", target_os = "linux"))] -- Alg = libc::SOL_ALG, --} -- - /// Represents a socket option that can be accessed or set. Used as an argument - /// to `getsockopt` - pub trait GetSockOpt : Copy { -@@ -1190,14 +1628,18 @@ pub fn setsockopt<O: SetSockOpt>(fd: RawFd, opt: O, val: &O::Val) -> Result<()> - /// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getpeername.html) - pub fn getpeername(fd: RawFd) -> Result<SockAddr> { - unsafe { -- let addr: sockaddr_storage = mem::uninitialized(); -+ let mut addr = mem::MaybeUninit::uninit(); - let mut len = mem::size_of::<sockaddr_storage>() as socklen_t; - -- let ret = libc::getpeername(fd, mem::transmute(&addr), &mut len); -+ let ret = libc::getpeername( -+ fd, -+ addr.as_mut_ptr() as *mut libc::sockaddr, -+ &mut len -+ ); - - Errno::result(ret)?; - -- sockaddr_storage_to_addr(&addr, len as usize) -+ sockaddr_storage_to_addr(&addr.assume_init(), len as usize) - } - } - -@@ -1206,60 +1648,92 @@ pub fn getpeername(fd: RawFd) -> Result<SockAddr> { - /// [Further reading](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getsockname.html) - pub fn getsockname(fd: RawFd) -> Result<SockAddr> { - unsafe { -- let addr: sockaddr_storage = mem::uninitialized(); -+ let mut addr = mem::MaybeUninit::uninit(); - let mut len = mem::size_of::<sockaddr_storage>() as socklen_t; - -- let ret = libc::getsockname(fd, mem::transmute(&addr), &mut len); -+ let ret = libc::getsockname( -+ fd, -+ addr.as_mut_ptr() as *mut libc::sockaddr, -+ &mut len -+ ); - - Errno::result(ret)?; - -- sockaddr_storage_to_addr(&addr, len as usize) -+ sockaddr_storage_to_addr(&addr.assume_init(), len as usize) - } - } - --/// Return the appropriate `SockAddr` type from a `sockaddr_storage` of a certain --/// size. In C this would usually be done by casting. The `len` argument -+/// Return the appropriate `SockAddr` type from a `sockaddr_storage` of a -+/// certain size. -+/// -+/// In C this would usually be done by casting. The `len` argument - /// should be the number of bytes in the `sockaddr_storage` that are actually - /// allocated and valid. It must be at least as large as all the useful parts - /// of the structure. Note that in the case of a `sockaddr_un`, `len` need not - /// include the terminating null. --pub unsafe fn sockaddr_storage_to_addr( -+pub fn sockaddr_storage_to_addr( - addr: &sockaddr_storage, - len: usize) -> Result<SockAddr> { - -+ assert!(len <= mem::size_of::<sockaddr_un>()); - if len < mem::size_of_val(&addr.ss_family) { - return Err(Error::Sys(Errno::ENOTCONN)); - } - -- match addr.ss_family as c_int { -+ match c_int::from(addr.ss_family) { - libc::AF_INET => { -- assert!(len as usize == mem::size_of::<sockaddr_in>()); -- let ret = *(addr as *const _ as *const sockaddr_in); -- Ok(SockAddr::Inet(InetAddr::V4(ret))) -+ assert_eq!(len as usize, mem::size_of::<sockaddr_in>()); -+ let sin = unsafe { -+ *(addr as *const sockaddr_storage as *const sockaddr_in) -+ }; -+ Ok(SockAddr::Inet(InetAddr::V4(sin))) - } - libc::AF_INET6 => { -- assert!(len as usize == mem::size_of::<sockaddr_in6>()); -- Ok(SockAddr::Inet(InetAddr::V6(*(addr as *const _ as *const sockaddr_in6)))) -+ assert_eq!(len as usize, mem::size_of::<sockaddr_in6>()); -+ let sin6 = unsafe { -+ *(addr as *const _ as *const sockaddr_in6) -+ }; -+ Ok(SockAddr::Inet(InetAddr::V6(sin6))) - } - libc::AF_UNIX => { -- let sun = *(addr as *const _ as *const sockaddr_un); - let pathlen = len - offset_of!(sockaddr_un, sun_path); -+ let sun = unsafe { -+ *(addr as *const _ as *const sockaddr_un) -+ }; - Ok(SockAddr::Unix(UnixAddr(sun, pathlen))) - } - #[cfg(any(target_os = "android", target_os = "linux"))] -+ libc::AF_PACKET => { -+ use libc::sockaddr_ll; -+ assert_eq!(len as usize, mem::size_of::<sockaddr_ll>()); -+ let sll = unsafe { -+ *(addr as *const _ as *const sockaddr_ll) -+ }; -+ Ok(SockAddr::Link(LinkAddr(sll))) -+ } -+ #[cfg(any(target_os = "android", target_os = "linux"))] - libc::AF_NETLINK => { - use libc::sockaddr_nl; -- Ok(SockAddr::Netlink(NetlinkAddr(*(addr as *const _ as *const sockaddr_nl)))) -+ let snl = unsafe { -+ *(addr as *const _ as *const sockaddr_nl) -+ }; -+ Ok(SockAddr::Netlink(NetlinkAddr(snl))) - } - #[cfg(any(target_os = "android", target_os = "linux"))] - libc::AF_ALG => { - use libc::sockaddr_alg; -- Ok(SockAddr::Alg(AlgAddr(*(addr as *const _ as *const sockaddr_alg)))) -+ let salg = unsafe { -+ *(addr as *const _ as *const sockaddr_alg) -+ }; -+ Ok(SockAddr::Alg(AlgAddr(salg))) - } -- #[cfg(target_os = "linux")] -+ #[cfg(any(target_os = "android", target_os = "linux"))] - libc::AF_VSOCK => { - use libc::sockaddr_vm; -- Ok(SockAddr::Vsock(VsockAddr(*(addr as *const _ as *const sockaddr_vm)))) -+ let svm = unsafe { -+ *(addr as *const _ as *const sockaddr_vm) -+ }; -+ Ok(SockAddr::Vsock(VsockAddr(svm))) - } - af => panic!("unexpected address family {}", af), - } -diff --git a/third_party/rust/nix/src/sys/socket/sockopt.rs b/third_party/rust/nix/src/sys/socket/sockopt.rs -index a996010018d5b..5b7b4feafb49a 100644 ---- a/third_party/rust/nix/src/sys/socket/sockopt.rs -+++ b/third_party/rust/nix/src/sys/socket/sockopt.rs -@@ -1,9 +1,13 @@ -+use cfg_if::cfg_if; - use super::{GetSockOpt, SetSockOpt}; --use Result; --use errno::Errno; --use sys::time::TimeVal; -+use crate::Result; -+use crate::errno::Errno; -+use crate::sys::time::TimeVal; - use libc::{self, c_int, c_void, socklen_t}; --use std::mem; -+use std::mem::{ -+ self, -+ MaybeUninit -+}; - use std::os::unix::io::RawFd; - use std::ffi::{OsStr, OsString}; - #[cfg(target_family = "unix")] -@@ -84,14 +88,14 @@ macro_rules! getsockopt_impl { - - fn get(&self, fd: RawFd) -> Result<$ty> { - unsafe { -- let mut getter: $getter = Get::blank(); -+ let mut getter: $getter = Get::uninit(); - - let res = libc::getsockopt(fd, $level, $flag, - getter.ffi_ptr(), - getter.ffi_len()); - Errno::result(res)?; - -- Ok(getter.unwrap()) -+ Ok(getter.assume_init()) - } - } - } -@@ -248,6 +252,10 @@ sockopt_impl!(Both, TcpKeepAlive, libc::IPPROTO_TCP, libc::TCP_KEEPALIVE, u32); - target_os = "linux", - target_os = "nacl"))] - sockopt_impl!(Both, TcpKeepIdle, libc::IPPROTO_TCP, libc::TCP_KEEPIDLE, u32); -+#[cfg(not(target_os = "openbsd"))] -+sockopt_impl!(Both, TcpKeepCount, libc::IPPROTO_TCP, libc::TCP_KEEPCNT, u32); -+#[cfg(not(target_os = "openbsd"))] -+sockopt_impl!(Both, TcpKeepInterval, libc::IPPROTO_TCP, libc::TCP_KEEPINTVL, u32); - sockopt_impl!(Both, RcvBuf, libc::SOL_SOCKET, libc::SO_RCVBUF, usize); - sockopt_impl!(Both, SndBuf, libc::SOL_SOCKET, libc::SO_SNDBUF, usize); - #[cfg(any(target_os = "android", target_os = "linux"))] -@@ -257,6 +265,8 @@ sockopt_impl!(SetOnly, SndBufForce, libc::SOL_SOCKET, libc::SO_SNDBUFFORCE, usiz - sockopt_impl!(GetOnly, SockType, libc::SOL_SOCKET, libc::SO_TYPE, super::SockType); - sockopt_impl!(GetOnly, AcceptConn, libc::SOL_SOCKET, libc::SO_ACCEPTCONN, bool); - #[cfg(any(target_os = "android", target_os = "linux"))] -+sockopt_impl!(Both, BindToDevice, libc::SOL_SOCKET, libc::SO_BINDTODEVICE, OsString<[u8; libc::IFNAMSIZ]>); -+#[cfg(any(target_os = "android", target_os = "linux"))] - sockopt_impl!(GetOnly, OriginalDst, libc::SOL_IP, libc::SO_ORIGINAL_DST, libc::sockaddr_in); - sockopt_impl!(Both, ReceiveTimestamp, libc::SOL_SOCKET, libc::SO_TIMESTAMP, bool); - #[cfg(any(target_os = "android", target_os = "linux"))] -@@ -305,7 +315,10 @@ sockopt_impl!(Both, Ipv4RecvIf, libc::IPPROTO_IP, libc::IP_RECVIF, bool); - target_os = "openbsd", - ))] - sockopt_impl!(Both, Ipv4RecvDstAddr, libc::IPPROTO_IP, libc::IP_RECVDSTADDR, bool); -- -+#[cfg(target_os = "linux")] -+sockopt_impl!(Both, UdpGsoSegment, libc::SOL_UDP, libc::UDP_SEGMENT, libc::c_int); -+#[cfg(target_os = "linux")] -+sockopt_impl!(Both, UdpGroSegment, libc::IPPROTO_UDP, libc::UDP_GRO, bool); - - #[cfg(any(target_os = "android", target_os = "linux"))] - #[derive(Copy, Clone, Debug)] -@@ -364,16 +377,16 @@ impl<T> SetSockOpt for AlgSetKey<T> where T: AsRef<[u8]> + Clone { - - /// Helper trait that describes what is expected from a `GetSockOpt` getter. - unsafe trait Get<T> { -- /// Returns an empty value. -- unsafe fn blank() -> Self; -+ /// Returns an uninitialized value. -+ unsafe fn uninit() -> Self; - /// Returns a pointer to the stored value. This pointer will be passed to the system's - /// `getsockopt` call (`man 3p getsockopt`, argument `option_value`). - fn ffi_ptr(&mut self) -> *mut c_void; - /// Returns length of the stored value. This pointer will be passed to the system's - /// `getsockopt` call (`man 3p getsockopt`, argument `option_len`). - fn ffi_len(&mut self) -> *mut socklen_t; -- /// Returns the stored value. -- unsafe fn unwrap(self) -> T; -+ /// Returns the hopefully initialized inner value. -+ unsafe fn assume_init(self) -> T; - } - - /// Helper trait that describes what is expected from a `SetSockOpt` setter. -@@ -391,28 +404,28 @@ unsafe trait Set<'a, T> { - /// Getter for an arbitrary `struct`. - struct GetStruct<T> { - len: socklen_t, -- val: T, -+ val: MaybeUninit<T>, - } - - unsafe impl<T> Get<T> for GetStruct<T> { -- unsafe fn blank() -> Self { -+ unsafe fn uninit() -> Self { - GetStruct { - len: mem::size_of::<T>() as socklen_t, -- val: mem::zeroed(), -+ val: MaybeUninit::uninit(), - } - } - - fn ffi_ptr(&mut self) -> *mut c_void { -- &mut self.val as *mut T as *mut c_void -+ self.val.as_mut_ptr() as *mut c_void - } - - fn ffi_len(&mut self) -> *mut socklen_t { - &mut self.len - } - -- unsafe fn unwrap(self) -> T { -- assert!(self.len as usize == mem::size_of::<T>(), "invalid getsockopt implementation"); -- self.val -+ unsafe fn assume_init(self) -> T { -+ assert_eq!(self.len as usize, mem::size_of::<T>(), "invalid getsockopt implementation"); -+ self.val.assume_init() - } - } - -@@ -423,7 +436,7 @@ struct SetStruct<'a, T: 'static> { - - unsafe impl<'a, T> Set<'a, T> for SetStruct<'a, T> { - fn new(ptr: &'a T) -> SetStruct<'a, T> { -- SetStruct { ptr: ptr } -+ SetStruct { ptr } - } - - fn ffi_ptr(&self) -> *const c_void { -@@ -438,28 +451,28 @@ unsafe impl<'a, T> Set<'a, T> for SetStruct<'a, T> { - /// Getter for a boolean value. - struct GetBool { - len: socklen_t, -- val: c_int, -+ val: MaybeUninit<c_int>, - } - - unsafe impl Get<bool> for GetBool { -- unsafe fn blank() -> Self { -+ unsafe fn uninit() -> Self { - GetBool { - len: mem::size_of::<c_int>() as socklen_t, -- val: mem::zeroed(), -+ val: MaybeUninit::uninit(), - } - } - - fn ffi_ptr(&mut self) -> *mut c_void { -- &mut self.val as *mut c_int as *mut c_void -+ self.val.as_mut_ptr() as *mut c_void - } - - fn ffi_len(&mut self) -> *mut socklen_t { - &mut self.len - } - -- unsafe fn unwrap(self) -> bool { -- assert!(self.len as usize == mem::size_of::<c_int>(), "invalid getsockopt implementation"); -- self.val != 0 -+ unsafe fn assume_init(self) -> bool { -+ assert_eq!(self.len as usize, mem::size_of::<c_int>(), "invalid getsockopt implementation"); -+ self.val.assume_init() != 0 - } - } - -@@ -485,28 +498,28 @@ unsafe impl<'a> Set<'a, bool> for SetBool { - /// Getter for an `u8` value. - struct GetU8 { - len: socklen_t, -- val: u8, -+ val: MaybeUninit<u8>, - } - - unsafe impl Get<u8> for GetU8 { -- unsafe fn blank() -> Self { -+ unsafe fn uninit() -> Self { - GetU8 { - len: mem::size_of::<u8>() as socklen_t, -- val: mem::zeroed(), -+ val: MaybeUninit::uninit(), - } - } - - fn ffi_ptr(&mut self) -> *mut c_void { -- &mut self.val as *mut u8 as *mut c_void -+ self.val.as_mut_ptr() as *mut c_void - } - - fn ffi_len(&mut self) -> *mut socklen_t { - &mut self.len - } - -- unsafe fn unwrap(self) -> u8 { -- assert!(self.len as usize == mem::size_of::<u8>(), "invalid getsockopt implementation"); -- self.val as u8 -+ unsafe fn assume_init(self) -> u8 { -+ assert_eq!(self.len as usize, mem::size_of::<u8>(), "invalid getsockopt implementation"); -+ self.val.assume_init() - } - } - -@@ -532,28 +545,28 @@ unsafe impl<'a> Set<'a, u8> for SetU8 { - /// Getter for an `usize` value. - struct GetUsize { - len: socklen_t, -- val: c_int, -+ val: MaybeUninit<c_int>, - } - - unsafe impl Get<usize> for GetUsize { -- unsafe fn blank() -> Self { -+ unsafe fn uninit() -> Self { - GetUsize { - len: mem::size_of::<c_int>() as socklen_t, -- val: mem::zeroed(), -+ val: MaybeUninit::uninit(), - } - } - - fn ffi_ptr(&mut self) -> *mut c_void { -- &mut self.val as *mut c_int as *mut c_void -+ self.val.as_mut_ptr() as *mut c_void - } - - fn ffi_len(&mut self) -> *mut socklen_t { - &mut self.len - } - -- unsafe fn unwrap(self) -> usize { -- assert!(self.len as usize == mem::size_of::<c_int>(), "invalid getsockopt implementation"); -- self.val as usize -+ unsafe fn assume_init(self) -> usize { -+ assert_eq!(self.len as usize, mem::size_of::<c_int>(), "invalid getsockopt implementation"); -+ self.val.assume_init() as usize - } - } - -@@ -579,27 +592,29 @@ unsafe impl<'a> Set<'a, usize> for SetUsize { - /// Getter for a `OsString` value. - struct GetOsString<T: AsMut<[u8]>> { - len: socklen_t, -- val: T, -+ val: MaybeUninit<T>, - } - - unsafe impl<T: AsMut<[u8]>> Get<OsString> for GetOsString<T> { -- unsafe fn blank() -> Self { -+ unsafe fn uninit() -> Self { - GetOsString { - len: mem::size_of::<T>() as socklen_t, -- val: mem::zeroed(), -+ val: MaybeUninit::uninit(), - } - } - - fn ffi_ptr(&mut self) -> *mut c_void { -- &mut self.val as *mut T as *mut c_void -+ self.val.as_mut_ptr() as *mut c_void - } - - fn ffi_len(&mut self) -> *mut socklen_t { - &mut self.len - } - -- unsafe fn unwrap(mut self) -> OsString { -- OsStr::from_bytes(self.val.as_mut()).to_owned() -+ unsafe fn assume_init(self) -> OsString { -+ let len = self.len as usize; -+ let mut v = self.val.assume_init(); -+ OsStr::from_bytes(&v.as_mut()[0..len]).to_owned() - } - } - -@@ -640,11 +655,11 @@ mod test { - #[test] - fn is_socket_type_unix() { - use super::super::*; -- use ::unistd::close; -+ use crate::unistd::close; - - let (a, b) = socketpair(AddressFamily::Unix, SockType::Stream, None, SockFlag::empty()).unwrap(); - let a_type = getsockopt(a, super::SockType).unwrap(); -- assert!(a_type == SockType::Stream); -+ assert_eq!(a_type, SockType::Stream); - close(a).unwrap(); - close(b).unwrap(); - } -@@ -652,11 +667,11 @@ mod test { - #[test] - fn is_socket_type_dgram() { - use super::super::*; -- use ::unistd::close; -+ use crate::unistd::close; - - let s = socket(AddressFamily::Inet, SockType::Datagram, SockFlag::empty(), None).unwrap(); - let s_type = getsockopt(s, super::SockType).unwrap(); -- assert!(s_type == SockType::Datagram); -+ assert_eq!(s_type, SockType::Datagram); - close(s).unwrap(); - } - -@@ -666,7 +681,7 @@ mod test { - #[test] - fn can_get_listen_on_tcp_socket() { - use super::super::*; -- use ::unistd::close; -+ use crate::unistd::close; - - let s = socket(AddressFamily::Inet, SockType::Stream, SockFlag::empty(), None).unwrap(); - let s_listening = getsockopt(s, super::AcceptConn).unwrap(); -diff --git a/third_party/rust/nix/src/sys/stat.rs b/third_party/rust/nix/src/sys/stat.rs -index 66c8c9dd1b720..df81a2cb329d6 100644 ---- a/third_party/rust/nix/src/sys/stat.rs -+++ b/third_party/rust/nix/src/sys/stat.rs -@@ -1,13 +1,12 @@ - pub use libc::{dev_t, mode_t}; - pub use libc::stat as FileStat; - --use {Result, NixPath}; --use errno::Errno; --use fcntl::{AtFlags, at_rawfd}; --use libc; -+use crate::{Result, NixPath, errno::Errno}; -+#[cfg(not(target_os = "redox"))] -+use crate::fcntl::{AtFlags, at_rawfd}; - use std::mem; - use std::os::unix::io::RawFd; --use sys::time::{TimeSpec, TimeVal}; -+use crate::sys::time::{TimeSpec, TimeVal}; - - libc_bitflags!( - pub struct SFlag: mode_t { -@@ -78,49 +77,50 @@ pub fn umask(mode: Mode) -> Mode { - } - - pub fn stat<P: ?Sized + NixPath>(path: &P) -> Result<FileStat> { -- let mut dst = unsafe { mem::uninitialized() }; -+ let mut dst = mem::MaybeUninit::uninit(); - let res = path.with_nix_path(|cstr| { - unsafe { -- libc::stat(cstr.as_ptr(), &mut dst as *mut FileStat) -+ libc::stat(cstr.as_ptr(), dst.as_mut_ptr()) - } - })?; - - Errno::result(res)?; - -- Ok(dst) -+ Ok(unsafe{dst.assume_init()}) - } - - pub fn lstat<P: ?Sized + NixPath>(path: &P) -> Result<FileStat> { -- let mut dst = unsafe { mem::uninitialized() }; -+ let mut dst = mem::MaybeUninit::uninit(); - let res = path.with_nix_path(|cstr| { - unsafe { -- libc::lstat(cstr.as_ptr(), &mut dst as *mut FileStat) -+ libc::lstat(cstr.as_ptr(), dst.as_mut_ptr()) - } - })?; - - Errno::result(res)?; - -- Ok(dst) -+ Ok(unsafe{dst.assume_init()}) - } - - pub fn fstat(fd: RawFd) -> Result<FileStat> { -- let mut dst = unsafe { mem::uninitialized() }; -- let res = unsafe { libc::fstat(fd, &mut dst as *mut FileStat) }; -+ let mut dst = mem::MaybeUninit::uninit(); -+ let res = unsafe { libc::fstat(fd, dst.as_mut_ptr()) }; - - Errno::result(res)?; - -- Ok(dst) -+ Ok(unsafe{dst.assume_init()}) - } - -+#[cfg(not(target_os = "redox"))] - pub fn fstatat<P: ?Sized + NixPath>(dirfd: RawFd, pathname: &P, f: AtFlags) -> Result<FileStat> { -- let mut dst = unsafe { mem::uninitialized() }; -+ let mut dst = mem::MaybeUninit::uninit(); - let res = pathname.with_nix_path(|cstr| { -- unsafe { libc::fstatat(dirfd, cstr.as_ptr(), &mut dst as *mut FileStat, f.bits() as libc::c_int) } -+ unsafe { libc::fstatat(dirfd, cstr.as_ptr(), dst.as_mut_ptr(), f.bits() as libc::c_int) } - })?; - - Errno::result(res)?; - -- Ok(dst) -+ Ok(unsafe{dst.assume_init()}) - } - - /// Change the file permission bits of the file specified by a file descriptor. -@@ -150,13 +150,14 @@ pub enum FchmodatFlags { - /// If `flag` is `FchmodatFlags::NoFollowSymlink` and `path` names a symbolic link, - /// then the mode of the symbolic link is changed. - /// --/// `fchmod(None, path, mode, FchmodatFlags::FollowSymlink)` is identical to -+/// `fchmodat(None, path, mode, FchmodatFlags::FollowSymlink)` is identical to - /// a call `libc::chmod(path, mode)`. That's why `chmod` is unimplemented - /// in the `nix` crate. - /// - /// # References - /// - /// [fchmodat(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/fchmodat.html). -+#[cfg(not(target_os = "redox"))] - pub fn fchmodat<P: ?Sized + NixPath>( - dirfd: Option<RawFd>, - path: &P, -@@ -260,6 +261,7 @@ pub enum UtimensatFlags { - /// # References - /// - /// [utimensat(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/utimens.html). -+#[cfg(not(target_os = "redox"))] - pub fn utimensat<P: ?Sized + NixPath>( - dirfd: Option<RawFd>, - path: &P, -@@ -285,6 +287,7 @@ pub fn utimensat<P: ?Sized + NixPath>( - Errno::result(res).map(drop) - } - -+#[cfg(not(target_os = "redox"))] - pub fn mkdirat<P: ?Sized + NixPath>(fd: RawFd, path: &P, mode: Mode) -> Result<()> { - let res = path.with_nix_path(|cstr| { - unsafe { libc::mkdirat(fd, cstr.as_ptr(), mode.bits() as mode_t) } -diff --git a/third_party/rust/nix/src/sys/statfs.rs b/third_party/rust/nix/src/sys/statfs.rs -index d4596bf336958..27b72592b9a30 100644 ---- a/third_party/rust/nix/src/sys/statfs.rs -+++ b/third_party/rust/nix/src/sys/statfs.rs -@@ -4,10 +4,7 @@ use std::os::unix::io::AsRawFd; - #[cfg(not(any(target_os = "linux", target_os = "android")))] - use std::ffi::CStr; - --use libc; -- --use {NixPath, Result}; --use errno::Errno; -+use crate::{NixPath, Result, errno::Errno}; - - #[cfg(target_os = "android")] - pub type fsid_t = libc::__fsid_t; -@@ -15,81 +12,95 @@ pub type fsid_t = libc::__fsid_t; - pub type fsid_t = libc::fsid_t; - - #[derive(Clone, Copy)] -+#[repr(transparent)] - pub struct Statfs(libc::statfs); - - #[cfg(target_os = "freebsd")] --#[derive(Eq, Copy, Clone, PartialEq, Debug)] --pub struct FsType(u32); -+type fs_type_t = u32; - #[cfg(target_os = "android")] --#[derive(Eq, Copy, Clone, PartialEq, Debug)] --pub struct FsType(libc::c_ulong); -+type fs_type_t = libc::c_ulong; - #[cfg(all(target_os = "linux", target_arch = "s390x"))] --#[derive(Eq, Copy, Clone, PartialEq, Debug)] --pub struct FsType(u32); -+type fs_type_t = libc::c_uint; - #[cfg(all(target_os = "linux", target_env = "musl"))] --#[derive(Eq, Copy, Clone, PartialEq, Debug)] --pub struct FsType(libc::c_ulong); -+type fs_type_t = libc::c_ulong; - #[cfg(all(target_os = "linux", not(any(target_arch = "s390x", target_env = "musl"))))] -+type fs_type_t = libc::__fsword_t; -+ -+#[cfg(any( -+ target_os = "freebsd", -+ target_os = "android", -+ all(target_os = "linux", target_arch = "s390x"), -+ all(target_os = "linux", target_env = "musl"), -+ all(target_os = "linux", not(any(target_arch = "s390x", target_env = "musl"))), -+))] - #[derive(Eq, Copy, Clone, PartialEq, Debug)] --pub struct FsType(libc::c_long); -- --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const ADFS_SUPER_MAGIC: FsType = FsType(libc::ADFS_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const AFFS_SUPER_MAGIC: FsType = FsType(libc::AFFS_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const CODA_SUPER_MAGIC: FsType = FsType(libc::CODA_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const CRAMFS_MAGIC: FsType = FsType(libc::CRAMFS_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const EFS_SUPER_MAGIC: FsType = FsType(libc::EFS_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const EXT2_SUPER_MAGIC: FsType = FsType(libc::EXT2_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const EXT3_SUPER_MAGIC: FsType = FsType(libc::EXT3_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const EXT4_SUPER_MAGIC: FsType = FsType(libc::EXT4_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const HPFS_SUPER_MAGIC: FsType = FsType(libc::HPFS_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const HUGETLBFS_MAGIC: FsType = FsType(libc::HUGETLBFS_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const ISOFS_SUPER_MAGIC: FsType = FsType(libc::ISOFS_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const JFFS2_SUPER_MAGIC: FsType = FsType(libc::JFFS2_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const MINIX_SUPER_MAGIC: FsType = FsType(libc::MINIX_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const MINIX_SUPER_MAGIC2: FsType = FsType(libc::MINIX_SUPER_MAGIC2); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const MINIX2_SUPER_MAGIC: FsType = FsType(libc::MINIX2_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const MINIX2_SUPER_MAGIC2: FsType = FsType(libc::MINIX2_SUPER_MAGIC2); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const MSDOS_SUPER_MAGIC: FsType = FsType(libc::MSDOS_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const NCP_SUPER_MAGIC: FsType = FsType(libc::NCP_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const NFS_SUPER_MAGIC: FsType = FsType(libc::NFS_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const OPENPROM_SUPER_MAGIC: FsType = FsType(libc::OPENPROM_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const PROC_SUPER_MAGIC: FsType = FsType(libc::PROC_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const QNX4_SUPER_MAGIC: FsType = FsType(libc::QNX4_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const REISERFS_SUPER_MAGIC: FsType = FsType(libc::REISERFS_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const SMB_SUPER_MAGIC: FsType = FsType(libc::SMB_SUPER_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const TMPFS_MAGIC: FsType = FsType(libc::TMPFS_MAGIC); --#[cfg(all(target_os = "linux", not(target_env = "musl"), not(target_arch = "s390x")))] --pub const USBDEVICE_SUPER_MAGIC: FsType = FsType(libc::USBDEVICE_SUPER_MAGIC); -+pub struct FsType(pub fs_type_t); -+ -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const ADFS_SUPER_MAGIC: FsType = FsType(libc::ADFS_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const AFFS_SUPER_MAGIC: FsType = FsType(libc::AFFS_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const CODA_SUPER_MAGIC: FsType = FsType(libc::CODA_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const CRAMFS_MAGIC: FsType = FsType(libc::CRAMFS_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const EFS_SUPER_MAGIC: FsType = FsType(libc::EFS_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const EXT2_SUPER_MAGIC: FsType = FsType(libc::EXT2_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const EXT3_SUPER_MAGIC: FsType = FsType(libc::EXT3_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const EXT4_SUPER_MAGIC: FsType = FsType(libc::EXT4_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const HPFS_SUPER_MAGIC: FsType = FsType(libc::HPFS_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const HUGETLBFS_MAGIC: FsType = FsType(libc::HUGETLBFS_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const ISOFS_SUPER_MAGIC: FsType = FsType(libc::ISOFS_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const JFFS2_SUPER_MAGIC: FsType = FsType(libc::JFFS2_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const MINIX_SUPER_MAGIC: FsType = FsType(libc::MINIX_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const MINIX_SUPER_MAGIC2: FsType = FsType(libc::MINIX_SUPER_MAGIC2 as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const MINIX2_SUPER_MAGIC: FsType = FsType(libc::MINIX2_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const MINIX2_SUPER_MAGIC2: FsType = FsType(libc::MINIX2_SUPER_MAGIC2 as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const MSDOS_SUPER_MAGIC: FsType = FsType(libc::MSDOS_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const NCP_SUPER_MAGIC: FsType = FsType(libc::NCP_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const NFS_SUPER_MAGIC: FsType = FsType(libc::NFS_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const OPENPROM_SUPER_MAGIC: FsType = FsType(libc::OPENPROM_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const OVERLAYFS_SUPER_MAGIC: FsType = FsType(libc::OVERLAYFS_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const PROC_SUPER_MAGIC: FsType = FsType(libc::PROC_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const QNX4_SUPER_MAGIC: FsType = FsType(libc::QNX4_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const REISERFS_SUPER_MAGIC: FsType = FsType(libc::REISERFS_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const SMB_SUPER_MAGIC: FsType = FsType(libc::SMB_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const TMPFS_MAGIC: FsType = FsType(libc::TMPFS_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const USBDEVICE_SUPER_MAGIC: FsType = FsType(libc::USBDEVICE_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const CGROUP_SUPER_MAGIC: FsType = FsType(libc::CGROUP_SUPER_MAGIC as fs_type_t); -+#[cfg(all(target_os = "linux", not(target_env = "musl")))] -+pub const CGROUP2_SUPER_MAGIC: FsType = FsType(libc::CGROUP2_SUPER_MAGIC as fs_type_t); -+ - - impl Statfs { - /// Magic code defining system type - #[cfg(not(any( - target_os = "openbsd", -+ target_os = "dragonfly", - target_os = "ios", - target_os = "macos" - )))] -@@ -105,32 +116,35 @@ impl Statfs { - } - - /// Optimal transfer block size -- #[cfg(any(target_os = "ios", target_os = "macos", target_os = "openbsd"))] -+ #[cfg(any(target_os = "ios", target_os = "macos"))] - pub fn optimal_transfer_size(&self) -> i32 { - self.0.f_iosize - } - - /// Optimal transfer block size -- #[cfg(all(target_os = "linux", target_arch = "s390x"))] -+ #[cfg(target_os = "openbsd")] - pub fn optimal_transfer_size(&self) -> u32 { -- self.0.f_bsize -+ self.0.f_iosize - } - - /// Optimal transfer block size -- #[cfg(all(target_os = "linux", target_env = "musl"))] -- pub fn optimal_transfer_size(&self) -> libc::c_ulong { -+ #[cfg(all(target_os = "linux", target_arch = "s390x"))] -+ pub fn optimal_transfer_size(&self) -> u32 { - self.0.f_bsize - } - - /// Optimal transfer block size -- #[cfg(all(target_os = "linux", not(any(target_arch = "s390x", target_env = "musl"))))] -- pub fn optimal_transfer_size(&self) -> libc::c_long { -+ #[cfg(any( -+ target_os = "android", -+ all(target_os = "linux", target_env = "musl") -+ ))] -+ pub fn optimal_transfer_size(&self) -> libc::c_ulong { - self.0.f_bsize - } - - /// Optimal transfer block size -- #[cfg(target_os = "android")] -- pub fn optimal_transfer_size(&self) -> libc::c_ulong { -+ #[cfg(all(target_os = "linux", not(any(target_arch = "s390x", target_env = "musl"))))] -+ pub fn optimal_transfer_size(&self) -> libc::__fsword_t { - self.0.f_bsize - } - -@@ -169,7 +183,7 @@ impl Statfs { - /// Size of a block - // f_bsize on linux: https://github.com/torvalds/linux/blob/master/fs/nfs/super.c#L471 - #[cfg(all(target_os = "linux", not(any(target_arch = "s390x", target_env = "musl"))))] -- pub fn block_size(&self) -> libc::c_long { -+ pub fn block_size(&self) -> libc::__fsword_t { - self.0.f_bsize - } - -@@ -211,7 +225,7 @@ impl Statfs { - - /// Maximum length of filenames - #[cfg(all(target_os = "linux", not(any(target_arch = "s390x", target_env = "musl"))))] -- pub fn maximum_name_length(&self) -> libc::c_long { -+ pub fn maximum_name_length(&self) -> libc::__fsword_t { - self.0.f_namelen - } - -@@ -240,7 +254,7 @@ impl Statfs { - } - - /// Total data blocks in filesystem -- #[cfg(all(target_os = "linux", target_env = "musl"))] -+ #[cfg(all(target_os = "linux", any(target_env = "musl", all(target_arch = "x86_64", target_pointer_width = "32"))))] - pub fn blocks(&self) -> u64 { - self.0.f_blocks - } -@@ -253,7 +267,7 @@ impl Statfs { - target_os = "freebsd", - target_os = "openbsd", - target_os = "dragonfly", -- all(target_os = "linux", target_env = "musl") -+ all(target_os = "linux", any(target_env = "musl", all(target_arch = "x86_64", target_pointer_width = "32"))) - )))] - pub fn blocks(&self) -> libc::c_ulong { - self.0.f_blocks -@@ -278,7 +292,7 @@ impl Statfs { - } - - /// Free blocks in filesystem -- #[cfg(all(target_os = "linux", target_env = "musl"))] -+ #[cfg(all(target_os = "linux", any(target_env = "musl", all(target_arch = "x86_64", target_pointer_width = "32"))))] - pub fn blocks_free(&self) -> u64 { - self.0.f_bfree - } -@@ -291,7 +305,7 @@ impl Statfs { - target_os = "freebsd", - target_os = "openbsd", - target_os = "dragonfly", -- all(target_os = "linux", target_env = "musl") -+ all(target_os = "linux", any(target_env = "musl", all(target_arch = "x86_64", target_pointer_width = "32"))) - )))] - pub fn blocks_free(&self) -> libc::c_ulong { - self.0.f_bfree -@@ -316,7 +330,7 @@ impl Statfs { - } - - /// Free blocks available to unprivileged user -- #[cfg(all(target_os = "linux", target_env = "musl"))] -+ #[cfg(all(target_os = "linux", any(target_env = "musl", all(target_arch = "x86_64", target_pointer_width = "32"))))] - pub fn blocks_available(&self) -> u64 { - self.0.f_bavail - } -@@ -329,7 +343,7 @@ impl Statfs { - target_os = "freebsd", - target_os = "openbsd", - target_os = "dragonfly", -- all(target_os = "linux", target_env = "musl") -+ all(target_os = "linux", any(target_env = "musl", all(target_arch = "x86_64", target_pointer_width = "32"))) - )))] - pub fn blocks_available(&self) -> libc::c_ulong { - self.0.f_bavail -@@ -354,8 +368,8 @@ impl Statfs { - } - - /// Total file nodes in filesystem -- #[cfg(all(target_os = "linux", target_env = "musl"))] -- pub fn files(&self) -> u64 { -+ #[cfg(all(target_os = "linux", any(target_env = "musl", all(target_arch = "x86_64", target_pointer_width = "32"))))] -+ pub fn files(&self) -> libc::fsfilcnt_t { - self.0.f_files - } - -@@ -367,14 +381,19 @@ impl Statfs { - target_os = "freebsd", - target_os = "openbsd", - target_os = "dragonfly", -- all(target_os = "linux", target_env = "musl") -+ all(target_os = "linux", any(target_env = "musl", all(target_arch = "x86_64", target_pointer_width = "32"))) - )))] - pub fn files(&self) -> libc::c_ulong { - self.0.f_files - } - - /// Free file nodes in filesystem -- #[cfg(any(target_os = "ios", target_os = "macos", target_os = "android"))] -+ #[cfg(any( -+ target_os = "android", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "openbsd" -+ ))] - pub fn files_free(&self) -> u64 { - self.0.f_ffree - } -@@ -386,14 +405,14 @@ impl Statfs { - } - - /// Free file nodes in filesystem -- #[cfg(any(target_os = "freebsd", target_os = "openbsd"))] -+ #[cfg(target_os = "freebsd")] - pub fn files_free(&self) -> i64 { - self.0.f_ffree - } - - /// Free file nodes in filesystem -- #[cfg(all(target_os = "linux", target_env = "musl"))] -- pub fn files_free(&self) -> u64 { -+ #[cfg(all(target_os = "linux", any(target_env = "musl", all(target_arch = "x86_64", target_pointer_width = "32"))))] -+ pub fn files_free(&self) -> libc::fsfilcnt_t { - self.0.f_ffree - } - -@@ -405,7 +424,7 @@ impl Statfs { - target_os = "freebsd", - target_os = "openbsd", - target_os = "dragonfly", -- all(target_os = "linux", target_env = "musl") -+ all(target_os = "linux", any(target_env = "musl", all(target_arch = "x86_64", target_pointer_width = "32"))) - )))] - pub fn files_free(&self) -> libc::c_ulong { - self.0.f_ffree -@@ -434,16 +453,17 @@ impl Debug for Statfs { - - pub fn statfs<P: ?Sized + NixPath>(path: &P) -> Result<Statfs> { - unsafe { -- let mut stat: Statfs = mem::uninitialized(); -- let res = path.with_nix_path(|path| libc::statfs(path.as_ptr(), &mut stat.0))?; -- Errno::result(res).map(|_| stat) -+ let mut stat = mem::MaybeUninit::<libc::statfs>::uninit(); -+ let res = path.with_nix_path(|path| libc::statfs(path.as_ptr(), stat.as_mut_ptr()))?; -+ Errno::result(res).map(|_| Statfs(stat.assume_init())) - } - } - - pub fn fstatfs<T: AsRawFd>(fd: &T) -> Result<Statfs> { - unsafe { -- let mut stat: Statfs = mem::uninitialized(); -- Errno::result(libc::fstatfs(fd.as_raw_fd(), &mut stat.0)).map(|_| stat) -+ let mut stat = mem::MaybeUninit::<libc::statfs>::uninit(); -+ Errno::result(libc::fstatfs(fd.as_raw_fd(), stat.as_mut_ptr())) -+ .map(|_| Statfs(stat.assume_init())) - } - } - -@@ -451,8 +471,8 @@ pub fn fstatfs<T: AsRawFd>(fd: &T) -> Result<Statfs> { - mod test { - use std::fs::File; - -- use sys::statfs::*; -- use sys::statvfs::*; -+ use crate::sys::statfs::*; -+ use crate::sys::statvfs::*; - use std::path::Path; - - #[test] -diff --git a/third_party/rust/nix/src/sys/statvfs.rs b/third_party/rust/nix/src/sys/statvfs.rs -index e5980369d5119..9bea9734925f0 100644 ---- a/third_party/rust/nix/src/sys/statvfs.rs -+++ b/third_party/rust/nix/src/sys/statvfs.rs -@@ -7,9 +7,9 @@ use std::os::unix::io::AsRawFd; - - use libc::{self, c_ulong}; - --use {Result, NixPath}; --use errno::Errno; -+use crate::{Result, NixPath, errno::Errno}; - -+#[cfg(not(target_os = "redox"))] - libc_bitflags!( - /// File system mount Flags - #[repr(C)] -@@ -55,8 +55,7 @@ libc_bitflags!( - /// Wrapper around the POSIX `statvfs` struct - /// - /// For more information see the [`statvfs(3)` man pages](http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/sys_statvfs.h.html). --// FIXME: Replace with repr(transparent) --#[repr(C)] -+#[repr(transparent)] - #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] - pub struct Statvfs(libc::statvfs); - -@@ -109,6 +108,7 @@ impl Statvfs { - } - - /// Get the mount flags -+ #[cfg(not(target_os = "redox"))] - pub fn flags(&self) -> FsFlags { - FsFlags::from_bits_truncate(self.0.f_flag) - } -@@ -124,12 +124,12 @@ impl Statvfs { - pub fn statvfs<P: ?Sized + NixPath>(path: &P) -> Result<Statvfs> { - unsafe { - Errno::clear(); -- let mut stat: Statvfs = mem::uninitialized(); -+ let mut stat = mem::MaybeUninit::<libc::statvfs>::uninit(); - let res = path.with_nix_path(|path| -- libc::statvfs(path.as_ptr(), &mut stat.0) -+ libc::statvfs(path.as_ptr(), stat.as_mut_ptr()) - )?; - -- Errno::result(res).map(|_| stat) -+ Errno::result(res).map(|_| Statvfs(stat.assume_init())) - } - } - -@@ -137,15 +137,16 @@ pub fn statvfs<P: ?Sized + NixPath>(path: &P) -> Result<Statvfs> { - pub fn fstatvfs<T: AsRawFd>(fd: &T) -> Result<Statvfs> { - unsafe { - Errno::clear(); -- let mut stat: Statvfs = mem::uninitialized(); -- Errno::result(libc::fstatvfs(fd.as_raw_fd(), &mut stat.0)).map(|_| stat) -+ let mut stat = mem::MaybeUninit::<libc::statvfs>::uninit(); -+ Errno::result(libc::fstatvfs(fd.as_raw_fd(), stat.as_mut_ptr())) -+ .map(|_| Statvfs(stat.assume_init())) - } - } - - #[cfg(test)] - mod test { - use std::fs::File; -- use sys::statvfs::*; -+ use crate::sys::statvfs::*; - - #[test] - fn statvfs_call() { -diff --git a/third_party/rust/nix/src/sys/sysinfo.rs b/third_party/rust/nix/src/sys/sysinfo.rs -index 4c8e38988886d..222a2fc0480c3 100644 ---- a/third_party/rust/nix/src/sys/sysinfo.rs -+++ b/third_party/rust/nix/src/sys/sysinfo.rs -@@ -2,13 +2,20 @@ use libc::{self, SI_LOAD_SHIFT}; - use std::{cmp, mem}; - use std::time::Duration; - --use Result; --use errno::Errno; -+use crate::Result; -+use crate::errno::Errno; - - /// System info structure returned by `sysinfo`. - #[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)] -+#[repr(transparent)] - pub struct SysInfo(libc::sysinfo); - -+// The fields are c_ulong on 32-bit linux, u64 on 64-bit linux; x32's ulong is u32 -+#[cfg(all(target_arch = "x86_64", target_pointer_width = "32"))] -+type mem_blocks_t = u64; -+#[cfg(not(all(target_arch = "x86_64", target_pointer_width = "32")))] -+type mem_blocks_t = libc::c_ulong; -+ - impl SysInfo { - /// Returns the load average tuple. - /// -@@ -57,7 +64,7 @@ impl SysInfo { - self.scale_mem(self.0.freeram) - } - -- fn scale_mem(&self, units: libc::c_ulong) -> u64 { -+ fn scale_mem(&self, units: mem_blocks_t) -> u64 { - units as u64 * self.0.mem_unit as u64 - } - } -@@ -66,7 +73,7 @@ impl SysInfo { - /// - /// [See `sysinfo(2)`](http://man7.org/linux/man-pages/man2/sysinfo.2.html). - pub fn sysinfo() -> Result<SysInfo> { -- let mut info: libc::sysinfo = unsafe { mem::uninitialized() }; -- let res = unsafe { libc::sysinfo(&mut info) }; -- Errno::result(res).map(|_| SysInfo(info)) -+ let mut info = mem::MaybeUninit::uninit(); -+ let res = unsafe { libc::sysinfo(info.as_mut_ptr()) }; -+ Errno::result(res).map(|_| unsafe{ SysInfo(info.assume_init()) }) - } -diff --git a/third_party/rust/nix/src/sys/termios.rs b/third_party/rust/nix/src/sys/termios.rs -index c7cdf10b461c1..95148360495f1 100644 ---- a/third_party/rust/nix/src/sys/termios.rs -+++ b/third_party/rust/nix/src/sys/termios.rs -@@ -25,7 +25,7 @@ - //! ``` - //! # use self::nix::sys::termios::SpecialCharacterIndices::VEOF; - //! # use self::nix::sys::termios::{_POSIX_VDISABLE, Termios}; --//! # let mut termios = unsafe { Termios::default_uninit() }; -+//! # let mut termios: Termios = unsafe { std::mem::zeroed() }; - //! termios.control_chars[VEOF as usize] = _POSIX_VDISABLE; - //! ``` - //! -@@ -38,7 +38,7 @@ - //! - //! ``` - //! # use self::nix::sys::termios::{ControlFlags, Termios}; --//! # let mut termios = unsafe { Termios::default_uninit() }; -+//! # let mut termios: Termios = unsafe { std::mem::zeroed() }; - //! termios.control_flags & ControlFlags::CSIZE == ControlFlags::CS5; - //! termios.control_flags |= ControlFlags::CS5; - //! ``` -@@ -61,10 +61,9 @@ - //! platforms: - //! - //! ```rust --//! # #[macro_use] extern crate nix; - //! # use nix::sys::termios::{BaudRate, cfsetispeed, cfsetospeed, cfsetspeed, Termios}; - //! # fn main() { --//! # let mut t = unsafe { Termios::default_uninit() }; -+//! # let mut t: Termios = unsafe { std::mem::zeroed() }; - //! cfsetispeed(&mut t, BaudRate::B9600); - //! cfsetospeed(&mut t, BaudRate::B9600); - //! cfsetspeed(&mut t, BaudRate::B9600); -@@ -74,102 +73,94 @@ - //! Additionally round-tripping baud rates is consistent across platforms: - //! - //! ```rust --//! # extern crate nix; - //! # use nix::sys::termios::{BaudRate, cfgetispeed, cfgetospeed, cfsetispeed, cfsetspeed, Termios}; - //! # fn main() { --//! # let mut t = unsafe { Termios::default_uninit() }; -+//! # let mut t: Termios = unsafe { std::mem::zeroed() }; - //! # cfsetspeed(&mut t, BaudRate::B9600); - //! let speed = cfgetispeed(&t); --//! assert!(speed == cfgetospeed(&t)); -+//! assert_eq!(speed, cfgetospeed(&t)); - //! cfsetispeed(&mut t, speed); - //! # } - //! ``` - //! - //! On non-BSDs, `cfgetispeed()` and `cfgetospeed()` both return a `BaudRate`: - //! --// FIXME: Replace `ignore` with `compile_fail` once 1.22 is the minimum support Rust version - #![cfg_attr(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", - target_os = "macos", target_os = "netbsd", target_os = "openbsd"), - doc = " ```rust,ignore")] - #![cfg_attr(not(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", - target_os = "macos", target_os = "netbsd", target_os = "openbsd")), - doc = " ```rust")] --//! # extern crate nix; - //! # use nix::sys::termios::{BaudRate, cfgetispeed, cfgetospeed, cfsetspeed, Termios}; - //! # fn main() { --//! # let mut t = unsafe { Termios::default_uninit() }; -+//! # let mut t: Termios = unsafe { std::mem::zeroed() }; - //! # cfsetspeed(&mut t, BaudRate::B9600); --//! assert!(cfgetispeed(&t) == BaudRate::B9600); --//! assert!(cfgetospeed(&t) == BaudRate::B9600); -+//! assert_eq!(cfgetispeed(&t), BaudRate::B9600); -+//! assert_eq!(cfgetospeed(&t), BaudRate::B9600); - //! # } - //! ``` - //! - //! But on the BSDs, `cfgetispeed()` and `cfgetospeed()` both return `u32`s: - //! --// FIXME: Replace `ignore` with `compile_fail` once 1.22 is the minimum support Rust version - #![cfg_attr(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", - target_os = "macos", target_os = "netbsd", target_os = "openbsd"), - doc = " ```rust")] - #![cfg_attr(not(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", - target_os = "macos", target_os = "netbsd", target_os = "openbsd")), - doc = " ```rust,ignore")] --//! # extern crate nix; - //! # use nix::sys::termios::{BaudRate, cfgetispeed, cfgetospeed, cfsetspeed, Termios}; - //! # fn main() { --//! # let mut t = unsafe { Termios::default_uninit() }; -+//! # let mut t: Termios = unsafe { std::mem::zeroed() }; - //! # cfsetspeed(&mut t, 9600u32); --//! assert!(cfgetispeed(&t) == 9600u32); --//! assert!(cfgetospeed(&t) == 9600u32); -+//! assert_eq!(cfgetispeed(&t), 9600u32); -+//! assert_eq!(cfgetospeed(&t), 9600u32); - //! # } - //! ``` - //! - //! It's trivial to convert from a `BaudRate` to a `u32` on BSDs: - //! --// FIXME: Replace `ignore` with `compile_fail` once 1.22 is the minimum support Rust version - #![cfg_attr(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", - target_os = "macos", target_os = "netbsd", target_os = "openbsd"), - doc = " ```rust")] - #![cfg_attr(not(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", - target_os = "macos", target_os = "netbsd", target_os = "openbsd")), - doc = " ```rust,ignore")] --//! # extern crate nix; - //! # use nix::sys::termios::{BaudRate, cfgetispeed, cfsetspeed, Termios}; - //! # fn main() { --//! # let mut t = unsafe { Termios::default_uninit() }; -+//! # let mut t: Termios = unsafe { std::mem::zeroed() }; - //! # cfsetspeed(&mut t, 9600u32); --//! assert!(cfgetispeed(&t) == BaudRate::B9600.into()); --//! assert!(u32::from(BaudRate::B9600) == 9600u32); -+//! assert_eq!(cfgetispeed(&t), BaudRate::B9600.into()); -+//! assert_eq!(u32::from(BaudRate::B9600), 9600u32); - //! # } - //! ``` - //! - //! And on BSDs you can specify arbitrary baud rates (**note** this depends on hardware support) - //! by specifying baud rates directly using `u32`s: - //! --// FIXME: Replace `ignore` with `compile_fail` once 1.22 is the minimum support Rust version - #![cfg_attr(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", - target_os = "macos", target_os = "netbsd", target_os = "openbsd"), - doc = " ```rust")] - #![cfg_attr(not(any(target_os = "freebsd", target_os = "dragonfly", target_os = "ios", - target_os = "macos", target_os = "netbsd", target_os = "openbsd")), - doc = " ```rust,ignore")] --//! # extern crate nix; - //! # use nix::sys::termios::{cfsetispeed, cfsetospeed, cfsetspeed, Termios}; - //! # fn main() { --//! # let mut t = unsafe { Termios::default_uninit() }; -+//! # let mut t: Termios = unsafe { std::mem::zeroed() }; - //! cfsetispeed(&mut t, 9600u32); - //! cfsetospeed(&mut t, 9600u32); - //! cfsetspeed(&mut t, 9600u32); - //! # } - //! ``` --use Result; --use errno::Errno; -+use cfg_if::cfg_if; -+use crate::{Error, Result}; -+use crate::errno::Errno; - use libc::{self, c_int, tcflag_t}; - use std::cell::{Ref, RefCell}; --use std::convert::From; -+use std::convert::{From, TryFrom}; - use std::mem; - use std::os::unix::io::RawFd; - --use ::unistd::Pid; -+use crate::unistd::Pid; - - /// Stores settings for the termios API - /// -@@ -194,24 +185,9 @@ pub struct Termios { - impl Termios { - /// Exposes an immutable reference to the underlying `libc::termios` data structure. - /// -- /// This can be used for interfacing with other FFI functions like: -- /// -- /// ```rust -- /// # extern crate libc; -- /// # extern crate nix; -- /// # fn main() { -- /// # use nix::sys::termios::Termios; -- /// # let mut termios = unsafe { Termios::default_uninit() }; -- /// let inner_termios = termios.get_libc_termios(); -- /// unsafe { libc::cfgetispeed(&*inner_termios) }; -- /// # } -- /// ``` -- /// -- /// There is no public API exposed for functions that modify the underlying `libc::termios` -- /// data because it requires additional work to maintain type safety. -- // FIXME: Switch this over to use pub(crate) -- #[doc(hidden)] -- pub fn get_libc_termios(&self) -> Ref<libc::termios> { -+ /// This is not part of `nix`'s public API because it requires additional work to maintain type -+ /// safety. -+ pub(crate) fn get_libc_termios(&self) -> Ref<libc::termios> { - { - let mut termios = self.inner.borrow_mut(); - termios.c_iflag = self.input_flags.bits(); -@@ -225,12 +201,11 @@ impl Termios { - - /// Exposes the inner `libc::termios` datastore within `Termios`. - /// -- /// This is unsafe because if this is used to modify the inner libc::termios struct, it will not -- /// automatically update the safe wrapper type around it. Therefore we disable docs to -- /// effectively limit its use to nix internals. In this case it should also be paired with a -- /// call to `update_wrapper()` so that the wrapper-type and internal representation stay -- /// consistent. -- unsafe fn get_libc_termios_mut(&mut self) -> *mut libc::termios { -+ /// This is unsafe because if this is used to modify the inner `libc::termios` struct, it will -+ /// not automatically update the safe wrapper type around it. In this case it should also be -+ /// paired with a call to `update_wrapper()` so that the wrapper-type and internal -+ /// representation stay consistent. -+ pub(crate) unsafe fn get_libc_termios_mut(&mut self) -> *mut libc::termios { - { - let mut termios = self.inner.borrow_mut(); - termios.c_iflag = self.input_flags.bits(); -@@ -242,26 +217,8 @@ impl Termios { - self.inner.as_ptr() - } - -- /// Allows for easily creating new `Termios` structs that will be overwritten with real data. -- /// -- /// This should only be used when the inner libc::termios struct will be overwritten before it's -- /// read. -- // FIXME: Switch this over to use pub(crate) -- #[doc(hidden)] -- pub unsafe fn default_uninit() -> Self { -- Termios { -- inner: RefCell::new(mem::uninitialized()), -- input_flags: InputFlags::empty(), -- output_flags: OutputFlags::empty(), -- control_flags: ControlFlags::empty(), -- local_flags: LocalFlags::empty(), -- control_chars: [0 as libc::cc_t; NCCS], -- } -- } -- - /// Updates the wrapper values from the internal `libc::termios` data structure. -- #[doc(hidden)] -- pub fn update_wrapper(&mut self) { -+ pub(crate) fn update_wrapper(&mut self) { - let termios = *self.inner.borrow_mut(); - self.input_flags = InputFlags::from_bits_truncate(termios.c_iflag); - self.output_flags = OutputFlags::from_bits_truncate(termios.c_oflag); -@@ -376,9 +333,10 @@ libc_enum!{ - } - } - --impl From<libc::speed_t> for BaudRate { -- fn from(s: libc::speed_t) -> BaudRate { -+impl TryFrom<libc::speed_t> for BaudRate { -+ type Error = Error; - -+ fn try_from(s: libc::speed_t) -> Result<BaudRate> { - use libc::{B0, B50, B75, B110, B134, B150, B200, B300, B600, B1200, B1800, B2400, B4800, - B9600, B19200, B38400, B57600, B115200, B230400}; - #[cfg(any(target_os = "android", target_os = "linux"))] -@@ -398,85 +356,84 @@ impl From<libc::speed_t> for BaudRate { - use libc::{B460800, B921600}; - - match s { -- B0 => BaudRate::B0, -- B50 => BaudRate::B50, -- B75 => BaudRate::B75, -- B110 => BaudRate::B110, -- B134 => BaudRate::B134, -- B150 => BaudRate::B150, -- B200 => BaudRate::B200, -- B300 => BaudRate::B300, -- B600 => BaudRate::B600, -- B1200 => BaudRate::B1200, -- B1800 => BaudRate::B1800, -- B2400 => BaudRate::B2400, -- B4800 => BaudRate::B4800, -+ B0 => Ok(BaudRate::B0), -+ B50 => Ok(BaudRate::B50), -+ B75 => Ok(BaudRate::B75), -+ B110 => Ok(BaudRate::B110), -+ B134 => Ok(BaudRate::B134), -+ B150 => Ok(BaudRate::B150), -+ B200 => Ok(BaudRate::B200), -+ B300 => Ok(BaudRate::B300), -+ B600 => Ok(BaudRate::B600), -+ B1200 => Ok(BaudRate::B1200), -+ B1800 => Ok(BaudRate::B1800), -+ B2400 => Ok(BaudRate::B2400), -+ B4800 => Ok(BaudRate::B4800), - #[cfg(any(target_os = "dragonfly", - target_os = "freebsd", - target_os = "macos", - target_os = "netbsd", - target_os = "openbsd"))] -- B7200 => BaudRate::B7200, -- B9600 => BaudRate::B9600, -+ B7200 => Ok(BaudRate::B7200), -+ B9600 => Ok(BaudRate::B9600), - #[cfg(any(target_os = "dragonfly", - target_os = "freebsd", - target_os = "macos", - target_os = "netbsd", - target_os = "openbsd"))] -- B14400 => BaudRate::B14400, -- B19200 => BaudRate::B19200, -+ B14400 => Ok(BaudRate::B14400), -+ B19200 => Ok(BaudRate::B19200), - #[cfg(any(target_os = "dragonfly", - target_os = "freebsd", - target_os = "macos", - target_os = "netbsd", - target_os = "openbsd"))] -- B28800 => BaudRate::B28800, -- B38400 => BaudRate::B38400, -- B57600 => BaudRate::B57600, -+ B28800 => Ok(BaudRate::B28800), -+ B38400 => Ok(BaudRate::B38400), -+ B57600 => Ok(BaudRate::B57600), - #[cfg(any(target_os = "dragonfly", - target_os = "freebsd", - target_os = "macos", - target_os = "netbsd", - target_os = "openbsd"))] -- B76800 => BaudRate::B76800, -- B115200 => BaudRate::B115200, -- B230400 => BaudRate::B230400, -+ B76800 => Ok(BaudRate::B76800), -+ B115200 => Ok(BaudRate::B115200), -+ B230400 => Ok(BaudRate::B230400), - #[cfg(any(target_os = "android", - target_os = "freebsd", - target_os = "linux", - target_os = "netbsd"))] -- B460800 => BaudRate::B460800, -+ B460800 => Ok(BaudRate::B460800), - #[cfg(any(target_os = "android", target_os = "linux"))] -- B500000 => BaudRate::B500000, -+ B500000 => Ok(BaudRate::B500000), - #[cfg(any(target_os = "android", target_os = "linux"))] -- B576000 => BaudRate::B576000, -+ B576000 => Ok(BaudRate::B576000), - #[cfg(any(target_os = "android", - target_os = "freebsd", - target_os = "linux", - target_os = "netbsd"))] -- B921600 => BaudRate::B921600, -+ B921600 => Ok(BaudRate::B921600), - #[cfg(any(target_os = "android", target_os = "linux"))] -- B1000000 => BaudRate::B1000000, -+ B1000000 => Ok(BaudRate::B1000000), - #[cfg(any(target_os = "android", target_os = "linux"))] -- B1152000 => BaudRate::B1152000, -+ B1152000 => Ok(BaudRate::B1152000), - #[cfg(any(target_os = "android", target_os = "linux"))] -- B1500000 => BaudRate::B1500000, -+ B1500000 => Ok(BaudRate::B1500000), - #[cfg(any(target_os = "android", target_os = "linux"))] -- B2000000 => BaudRate::B2000000, -+ B2000000 => Ok(BaudRate::B2000000), - #[cfg(any(target_os = "android", all(target_os = "linux", not(target_arch = "sparc64"))))] -- B2500000 => BaudRate::B2500000, -+ B2500000 => Ok(BaudRate::B2500000), - #[cfg(any(target_os = "android", all(target_os = "linux", not(target_arch = "sparc64"))))] -- B3000000 => BaudRate::B3000000, -+ B3000000 => Ok(BaudRate::B3000000), - #[cfg(any(target_os = "android", all(target_os = "linux", not(target_arch = "sparc64"))))] -- B3500000 => BaudRate::B3500000, -+ B3500000 => Ok(BaudRate::B3500000), - #[cfg(any(target_os = "android", all(target_os = "linux", not(target_arch = "sparc64"))))] -- B4000000 => BaudRate::B4000000, -- b => unreachable!("Invalid baud constant: {}", b), -+ B4000000 => Ok(BaudRate::B4000000), -+ _ => Err(Error::invalid_argument()) - } - } - } - --// TODO: Include `TryFrom<u32> for BaudRate` once that API stabilizes - #[cfg(any(target_os = "freebsd", - target_os = "dragonfly", - target_os = "ios", -@@ -583,6 +540,12 @@ libc_enum! { - } - } - -+#[cfg(all(target_os = "linux", target_arch = "sparc64"))] -+impl SpecialCharacterIndices { -+ pub const VMIN: SpecialCharacterIndices = SpecialCharacterIndices::VEOF; -+ pub const VTIME: SpecialCharacterIndices = SpecialCharacterIndices::VEOL; -+} -+ - pub use libc::NCCS; - #[cfg(any(target_os = "dragonfly", - target_os = "freebsd", -@@ -606,7 +569,9 @@ libc_bitflags! { - ICRNL; - IXON; - IXOFF; -+ #[cfg(not(target_os = "redox"))] - IXANY; -+ #[cfg(not(target_os = "redox"))] - IMAXBEL; - #[cfg(any(target_os = "android", target_os = "linux", target_os = "macos"))] - IUTF8; -@@ -816,6 +781,7 @@ libc_bitflags! { - PARODD; - HUPCL; - CLOCAL; -+ #[cfg(not(target_os = "redox"))] - CRTSCTS; - #[cfg(any(target_os = "android", target_os = "linux"))] - CBAUD; -@@ -866,12 +832,15 @@ libc_bitflags! { - libc_bitflags! { - /// Flags for setting any local modes - pub struct LocalFlags: tcflag_t { -+ #[cfg(not(target_os = "redox"))] - ECHOKE; - ECHOE; - ECHOK; - ECHO; - ECHONL; -+ #[cfg(not(target_os = "redox"))] - ECHOPRT; -+ #[cfg(not(target_os = "redox"))] - ECHOCTL; - ISIG; - ICANON; -@@ -883,8 +852,10 @@ libc_bitflags! { - target_os = "openbsd"))] - ALTWERASE; - IEXTEN; -+ #[cfg(not(target_os = "redox"))] - EXTPROC; - TOSTOP; -+ #[cfg(not(target_os = "redox"))] - FLUSHO; - #[cfg(any(target_os = "freebsd", - target_os = "dragonfly", -@@ -893,6 +864,7 @@ libc_bitflags! { - target_os = "netbsd", - target_os = "openbsd"))] - NOKERNINFO; -+ #[cfg(not(target_os = "redox"))] - PENDIN; - NOFLSH; - } -@@ -957,13 +929,15 @@ cfg_if!{ - Errno::result(res).map(drop) - } - } else { -+ use std::convert::TryInto; -+ - /// Get input baud rate (see - /// [cfgetispeed(3p)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/cfgetispeed.html)). - /// - /// `cfgetispeed()` extracts the input baud rate from the given `Termios` structure. - pub fn cfgetispeed(termios: &Termios) -> BaudRate { - let inner_termios = termios.get_libc_termios(); -- unsafe { libc::cfgetispeed(&*inner_termios) }.into() -+ unsafe { libc::cfgetispeed(&*inner_termios) }.try_into().unwrap() - } - - /// Get output baud rate (see -@@ -972,7 +946,7 @@ cfg_if!{ - /// `cfgetospeed()` extracts the output baud rate from the given `Termios` structure. - pub fn cfgetospeed(termios: &Termios) -> BaudRate { - let inner_termios = termios.get_libc_termios(); -- unsafe { libc::cfgetospeed(&*inner_termios) }.into() -+ unsafe { libc::cfgetospeed(&*inner_termios) }.try_into().unwrap() - } - - /// Set input baud rate (see -@@ -1045,13 +1019,13 @@ pub fn cfmakesane(termios: &mut Termios) { - /// this structure *will not* reconfigure the port, instead the modifications should be done to - /// the `Termios` structure and then the port should be reconfigured using `tcsetattr()`. - pub fn tcgetattr(fd: RawFd) -> Result<Termios> { -- let mut termios: libc::termios = unsafe { mem::uninitialized() }; -+ let mut termios = mem::MaybeUninit::uninit(); - -- let res = unsafe { libc::tcgetattr(fd, &mut termios) }; -+ let res = unsafe { libc::tcgetattr(fd, termios.as_mut_ptr()) }; - - Errno::result(res)?; - -- Ok(termios.into()) -+ unsafe { Ok(termios.assume_init().into()) } - } - - /// Set the configuration for a terminal (see -@@ -1105,3 +1079,14 @@ pub fn tcgetsid(fd: RawFd) -> Result<Pid> { - - Errno::result(res).map(Pid::from_raw) - } -+ -+#[cfg(test)] -+mod test { -+ use super::*; -+ -+ #[test] -+ fn try_from() { -+ assert_eq!(Ok(BaudRate::B0), BaudRate::try_from(libc::B0)); -+ assert!(BaudRate::try_from(999999999).is_err()); -+ } -+} -diff --git a/third_party/rust/nix/src/sys/time.rs b/third_party/rust/nix/src/sys/time.rs -index 3ad57543b18a7..7546d1b367c5e 100644 ---- a/third_party/rust/nix/src/sys/time.rs -+++ b/third_party/rust/nix/src/sys/time.rs -@@ -1,6 +1,8 @@ - use std::{cmp, fmt, ops}; -+use std::time::Duration; - use std::convert::From; --use libc::{c_long, timespec, timeval}; -+use libc::{timespec, timeval}; -+#[cfg_attr(target_env = "musl", allow(deprecated))] // https://github.com/rust-lang/libc/issues/1848 - pub use libc::{time_t, suseconds_t}; - - pub trait TimeValLike: Sized { -@@ -60,6 +62,34 @@ const TS_MAX_SECONDS: i64 = ::std::isize::MAX as i64; - - const TS_MIN_SECONDS: i64 = -TS_MAX_SECONDS; - -+// x32 compatibility -+// See https://sourceware.org/bugzilla/show_bug.cgi?id=16437 -+#[cfg(all(target_arch = "x86_64", target_pointer_width = "32"))] -+type timespec_tv_nsec_t = i64; -+#[cfg(not(all(target_arch = "x86_64", target_pointer_width = "32")))] -+type timespec_tv_nsec_t = libc::c_long; -+ -+impl From<timespec> for TimeSpec { -+ fn from(ts: timespec) -> Self { -+ Self(ts) -+ } -+} -+ -+impl From<Duration> for TimeSpec { -+ fn from(duration: Duration) -> Self { -+ #[cfg_attr(target_env = "musl", allow(deprecated))] // https://github.com/rust-lang/libc/issues/1848 -+ TimeSpec(timespec { -+ tv_sec: duration.as_secs() as time_t, -+ tv_nsec: duration.subsec_nanos() as timespec_tv_nsec_t -+ }) -+ } -+} -+ -+impl From<TimeSpec> for Duration { -+ fn from(timespec: TimeSpec) -> Self { -+ Duration::new(timespec.0.tv_sec as u64, timespec.0.tv_nsec as u32) -+ } -+} - - impl AsRef<timespec> for TimeSpec { - fn as_ref(&self) -> ×pec { -@@ -67,6 +97,12 @@ impl AsRef<timespec> for TimeSpec { - } - } - -+impl AsMut<timespec> for TimeSpec { -+ fn as_mut(&mut self) -> &mut timespec { -+ &mut self.0 -+ } -+} -+ - impl Ord for TimeSpec { - // The implementation of cmp is simplified by assuming that the struct is - // normalized. That is, tv_nsec must always be within [0, 1_000_000_000) -@@ -90,6 +126,7 @@ impl TimeValLike for TimeSpec { - fn seconds(seconds: i64) -> TimeSpec { - assert!(seconds >= TS_MIN_SECONDS && seconds <= TS_MAX_SECONDS, - "TimeSpec out of bounds; seconds={}", seconds); -+ #[cfg_attr(target_env = "musl", allow(deprecated))] // https://github.com/rust-lang/libc/issues/1848 - TimeSpec(timespec {tv_sec: seconds as time_t, tv_nsec: 0 }) - } - -@@ -116,8 +153,9 @@ impl TimeValLike for TimeSpec { - let (secs, nanos) = div_mod_floor_64(nanoseconds, NANOS_PER_SEC); - assert!(secs >= TS_MIN_SECONDS && secs <= TS_MAX_SECONDS, - "TimeSpec out of bounds"); -+ #[cfg_attr(target_env = "musl", allow(deprecated))] // https://github.com/rust-lang/libc/issues/1848 - TimeSpec(timespec {tv_sec: secs as time_t, -- tv_nsec: nanos as c_long }) -+ tv_nsec: nanos as timespec_tv_nsec_t }) - } - - fn num_seconds(&self) -> i64 { -@@ -144,19 +182,20 @@ impl TimeValLike for TimeSpec { - } - - impl TimeSpec { -- fn nanos_mod_sec(&self) -> c_long { -+ fn nanos_mod_sec(&self) -> timespec_tv_nsec_t { - if self.tv_sec() < 0 && self.tv_nsec() > 0 { -- self.tv_nsec() - NANOS_PER_SEC as c_long -+ self.tv_nsec() - NANOS_PER_SEC as timespec_tv_nsec_t - } else { - self.tv_nsec() - } - } - -+ #[cfg_attr(target_env = "musl", allow(deprecated))] // https://github.com/rust-lang/libc/issues/1848 - pub fn tv_sec(&self) -> time_t { - self.0.tv_sec - } - -- pub fn tv_nsec(&self) -> c_long { -+ pub fn tv_nsec(&self) -> timespec_tv_nsec_t { - self.0.tv_nsec - } - } -@@ -191,7 +230,7 @@ impl ops::Mul<i32> for TimeSpec { - type Output = TimeSpec; - - fn mul(self, rhs: i32) -> TimeSpec { -- let usec = self.num_nanoseconds().checked_mul(rhs as i64) -+ let usec = self.num_nanoseconds().checked_mul(i64::from(rhs)) - .expect("TimeSpec multiply out of bounds"); - - TimeSpec::nanoseconds(usec) -@@ -202,7 +241,7 @@ impl ops::Div<i32> for TimeSpec { - type Output = TimeSpec; - - fn div(self, rhs: i32) -> TimeSpec { -- let usec = self.num_nanoseconds() / rhs as i64; -+ let usec = self.num_nanoseconds() / i64::from(rhs); - TimeSpec::nanoseconds(usec) - } - } -@@ -239,7 +278,7 @@ impl fmt::Display for TimeSpec { - - - --#[repr(C)] -+#[repr(transparent)] - #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] - pub struct TimeVal(timeval); - -@@ -259,6 +298,12 @@ impl AsRef<timeval> for TimeVal { - } - } - -+impl AsMut<timeval> for TimeVal { -+ fn as_mut(&mut self) -> &mut timeval { -+ &mut self.0 -+ } -+} -+ - impl Ord for TimeVal { - // The implementation of cmp is simplified by assuming that the struct is - // normalized. That is, tv_usec must always be within [0, 1_000_000) -@@ -282,6 +327,7 @@ impl TimeValLike for TimeVal { - fn seconds(seconds: i64) -> TimeVal { - assert!(seconds >= TV_MIN_SECONDS && seconds <= TV_MAX_SECONDS, - "TimeVal out of bounds; seconds={}", seconds); -+ #[cfg_attr(target_env = "musl", allow(deprecated))] // https://github.com/rust-lang/libc/issues/1848 - TimeVal(timeval {tv_sec: seconds as time_t, tv_usec: 0 }) - } - -@@ -299,6 +345,7 @@ impl TimeValLike for TimeVal { - let (secs, micros) = div_mod_floor_64(microseconds, MICROS_PER_SEC); - assert!(secs >= TV_MIN_SECONDS && secs <= TV_MAX_SECONDS, - "TimeVal out of bounds"); -+ #[cfg_attr(target_env = "musl", allow(deprecated))] // https://github.com/rust-lang/libc/issues/1848 - TimeVal(timeval {tv_sec: secs as time_t, - tv_usec: micros as suseconds_t }) - } -@@ -311,6 +358,7 @@ impl TimeValLike for TimeVal { - let (secs, micros) = div_mod_floor_64(microseconds, MICROS_PER_SEC); - assert!(secs >= TV_MIN_SECONDS && secs <= TV_MAX_SECONDS, - "TimeVal out of bounds"); -+ #[cfg_attr(target_env = "musl", allow(deprecated))] // https://github.com/rust-lang/libc/issues/1848 - TimeVal(timeval {tv_sec: secs as time_t, - tv_usec: micros as suseconds_t }) - } -@@ -347,6 +395,7 @@ impl TimeVal { - } - } - -+ #[cfg_attr(target_env = "musl", allow(deprecated))] // https://github.com/rust-lang/libc/issues/1848 - pub fn tv_sec(&self) -> time_t { - self.0.tv_sec - } -@@ -386,7 +435,7 @@ impl ops::Mul<i32> for TimeVal { - type Output = TimeVal; - - fn mul(self, rhs: i32) -> TimeVal { -- let usec = self.num_microseconds().checked_mul(rhs as i64) -+ let usec = self.num_microseconds().checked_mul(i64::from(rhs)) - .expect("TimeVal multiply out of bounds"); - - TimeVal::microseconds(usec) -@@ -397,7 +446,7 @@ impl ops::Div<i32> for TimeVal { - type Output = TimeVal; - - fn div(self, rhs: i32) -> TimeVal { -- let usec = self.num_microseconds() / rhs as i64; -+ let usec = self.num_microseconds() / i64::from(rhs); - TimeVal::microseconds(usec) - } - } -@@ -467,6 +516,7 @@ fn div_rem_64(this: i64, other: i64) -> (i64, i64) { - #[cfg(test)] - mod test { - use super::{TimeSpec, TimeVal, TimeValLike}; -+ use std::time::Duration; - - #[test] - pub fn test_timespec() { -@@ -477,6 +527,15 @@ mod test { - TimeSpec::seconds(182)); - } - -+ #[test] -+ pub fn test_timespec_from() { -+ let duration = Duration::new(123, 123_456_789); -+ let timespec = TimeSpec::nanoseconds(123_123_456_789); -+ -+ assert_eq!(TimeSpec::from(duration), timespec); -+ assert_eq!(Duration::from(timespec), duration); -+ } -+ - #[test] - pub fn test_timespec_neg() { - let a = TimeSpec::seconds(1) + TimeSpec::nanoseconds(123); -diff --git a/third_party/rust/nix/src/sys/timerfd.rs b/third_party/rust/nix/src/sys/timerfd.rs -new file mode 100644 -index 0000000000000..4a24719498602 ---- /dev/null -+++ b/third_party/rust/nix/src/sys/timerfd.rs -@@ -0,0 +1,285 @@ -+//! Timer API via file descriptors. -+//! -+//! Timer FD is a Linux-only API to create timers and get expiration -+//! notifications through file descriptors. -+//! -+//! For more documentation, please read [timerfd_create(2)](http://man7.org/linux/man-pages/man2/timerfd_create.2.html). -+//! -+//! # Examples -+//! -+//! Create a new one-shot timer that expires after 1 second. -+//! ``` -+//! # use std::os::unix::io::AsRawFd; -+//! # use nix::sys::timerfd::{TimerFd, ClockId, TimerFlags, TimerSetTimeFlags, -+//! # Expiration}; -+//! # use nix::sys::time::{TimeSpec, TimeValLike}; -+//! # use nix::unistd::read; -+//! # -+//! // We create a new monotonic timer. -+//! let timer = TimerFd::new(ClockId::CLOCK_MONOTONIC, TimerFlags::empty()) -+//! .unwrap(); -+//! -+//! // We set a new one-shot timer in 1 seconds. -+//! timer.set( -+//! Expiration::OneShot(TimeSpec::seconds(1)), -+//! TimerSetTimeFlags::empty() -+//! ).unwrap(); -+//! -+//! // We wait for the timer to expire. -+//! timer.wait().unwrap(); -+//! ``` -+use crate::sys::time::TimeSpec; -+use crate::unistd::read; -+use crate::{errno::Errno, Error, Result}; -+use bitflags::bitflags; -+use libc::c_int; -+use std::os::unix::io::{AsRawFd, FromRawFd, RawFd}; -+ -+/// A timerfd instance. This is also a file descriptor, you can feed it to -+/// other interfaces consuming file descriptors, epoll for example. -+#[derive(Debug)] -+pub struct TimerFd { -+ fd: RawFd, -+} -+ -+impl AsRawFd for TimerFd { -+ fn as_raw_fd(&self) -> RawFd { -+ self.fd -+ } -+} -+ -+impl FromRawFd for TimerFd { -+ unsafe fn from_raw_fd(fd: RawFd) -> Self { -+ TimerFd { fd } -+ } -+} -+ -+libc_enum! { -+ /// The type of the clock used to mark the progress of the timer. For more -+ /// details on each kind of clock, please refer to [timerfd_create(2)](http://man7.org/linux/man-pages/man2/timerfd_create.2.html). -+ #[repr(i32)] -+ pub enum ClockId { -+ CLOCK_REALTIME, -+ CLOCK_MONOTONIC, -+ CLOCK_BOOTTIME, -+ CLOCK_REALTIME_ALARM, -+ CLOCK_BOOTTIME_ALARM, -+ } -+} -+ -+libc_bitflags! { -+ /// Additional flags to change the behaviour of the file descriptor at the -+ /// time of creation. -+ pub struct TimerFlags: c_int { -+ TFD_NONBLOCK; -+ TFD_CLOEXEC; -+ } -+} -+ -+bitflags! { -+ /// Flags that are used for arming the timer. -+ pub struct TimerSetTimeFlags: libc::c_int { -+ const TFD_TIMER_ABSTIME = libc::TFD_TIMER_ABSTIME; -+ } -+} -+ -+#[derive(Debug, Clone, Copy)] -+struct TimerSpec(libc::itimerspec); -+ -+impl TimerSpec { -+ pub fn none() -> Self { -+ Self(libc::itimerspec { -+ it_interval: libc::timespec { -+ tv_sec: 0, -+ tv_nsec: 0, -+ }, -+ it_value: libc::timespec { -+ tv_sec: 0, -+ tv_nsec: 0, -+ }, -+ }) -+ } -+} -+ -+impl AsRef<libc::itimerspec> for TimerSpec { -+ fn as_ref(&self) -> &libc::itimerspec { -+ &self.0 -+ } -+} -+ -+impl From<Expiration> for TimerSpec { -+ fn from(expiration: Expiration) -> TimerSpec { -+ match expiration { -+ Expiration::OneShot(t) => TimerSpec(libc::itimerspec { -+ it_interval: libc::timespec { -+ tv_sec: 0, -+ tv_nsec: 0, -+ }, -+ it_value: *t.as_ref(), -+ }), -+ Expiration::IntervalDelayed(start, interval) => TimerSpec(libc::itimerspec { -+ it_interval: *interval.as_ref(), -+ it_value: *start.as_ref(), -+ }), -+ Expiration::Interval(t) => TimerSpec(libc::itimerspec { -+ it_interval: *t.as_ref(), -+ it_value: *t.as_ref(), -+ }), -+ } -+ } -+} -+ -+impl From<TimerSpec> for Expiration { -+ fn from(timerspec: TimerSpec) -> Expiration { -+ match timerspec { -+ TimerSpec(libc::itimerspec { -+ it_interval: -+ libc::timespec { -+ tv_sec: 0, -+ tv_nsec: 0, -+ }, -+ it_value: ts, -+ }) => Expiration::OneShot(ts.into()), -+ TimerSpec(libc::itimerspec { -+ it_interval: int_ts, -+ it_value: val_ts, -+ }) => { -+ if (int_ts.tv_sec == val_ts.tv_sec) && (int_ts.tv_nsec == val_ts.tv_nsec) { -+ Expiration::Interval(int_ts.into()) -+ } else { -+ Expiration::IntervalDelayed(val_ts.into(), int_ts.into()) -+ } -+ } -+ } -+ } -+} -+ -+/// An enumeration allowing the definition of the expiration time of an alarm, -+/// recurring or not. -+#[derive(Debug, Clone, Copy, PartialEq)] -+pub enum Expiration { -+ OneShot(TimeSpec), -+ IntervalDelayed(TimeSpec, TimeSpec), -+ Interval(TimeSpec), -+} -+ -+impl TimerFd { -+ /// Creates a new timer based on the clock defined by `clockid`. The -+ /// underlying fd can be assigned specific flags with `flags` (CLOEXEC, -+ /// NONBLOCK). The underlying fd will be closed on drop. -+ pub fn new(clockid: ClockId, flags: TimerFlags) -> Result<Self> { -+ Errno::result(unsafe { libc::timerfd_create(clockid as i32, flags.bits()) }) -+ .map(|fd| Self { fd }) -+ } -+ -+ /// Sets a new alarm on the timer. -+ /// -+ /// # Types of alarm -+ /// -+ /// There are 3 types of alarms you can set: -+ /// -+ /// - one shot: the alarm will trigger once after the specified amount of -+ /// time. -+ /// Example: I want an alarm to go off in 60s and then disables itself. -+ /// -+ /// - interval: the alarm will trigger every specified interval of time. -+ /// Example: I want an alarm to go off every 60s. The alarm will first -+ /// go off 60s after I set it and every 60s after that. The alarm will -+ /// not disable itself. -+ /// -+ /// - interval delayed: the alarm will trigger after a certain amount of -+ /// time and then trigger at a specified interval. -+ /// Example: I want an alarm to go off every 60s but only start in 1h. -+ /// The alarm will first trigger 1h after I set it and then every 60s -+ /// after that. The alarm will not disable itself. -+ /// -+ /// # Relative vs absolute alarm -+ /// -+ /// If you do not set any `TimerSetTimeFlags`, then the `TimeSpec` you pass -+ /// to the `Expiration` you want is relative. If however you want an alarm -+ /// to go off at a certain point in time, you can set `TFD_TIMER_ABSTIME`. -+ /// Then the one shot TimeSpec and the delay TimeSpec of the delayed -+ /// interval are going to be interpreted as absolute. -+ /// -+ /// # Disabling alarms -+ /// -+ /// Note: Only one alarm can be set for any given timer. Setting a new alarm -+ /// actually removes the previous one. -+ /// -+ /// Note: Setting a one shot alarm with a 0s TimeSpec disables the alarm -+ /// altogether. -+ pub fn set(&self, expiration: Expiration, flags: TimerSetTimeFlags) -> Result<()> { -+ let timerspec: TimerSpec = expiration.into(); -+ Errno::result(unsafe { -+ libc::timerfd_settime( -+ self.fd, -+ flags.bits(), -+ timerspec.as_ref(), -+ std::ptr::null_mut(), -+ ) -+ }) -+ .map(drop) -+ } -+ -+ /// Get the parameters for the alarm currently set, if any. -+ pub fn get(&self) -> Result<Option<Expiration>> { -+ let mut timerspec = TimerSpec::none(); -+ let timerspec_ptr: *mut libc::itimerspec = &mut timerspec.0; -+ -+ Errno::result(unsafe { libc::timerfd_gettime(self.fd, timerspec_ptr) }).map(|_| { -+ if timerspec.0.it_interval.tv_sec == 0 -+ && timerspec.0.it_interval.tv_nsec == 0 -+ && timerspec.0.it_value.tv_sec == 0 -+ && timerspec.0.it_value.tv_nsec == 0 -+ { -+ None -+ } else { -+ Some(timerspec.into()) -+ } -+ }) -+ } -+ -+ /// Remove the alarm if any is set. -+ pub fn unset(&self) -> Result<()> { -+ Errno::result(unsafe { -+ libc::timerfd_settime( -+ self.fd, -+ TimerSetTimeFlags::empty().bits(), -+ TimerSpec::none().as_ref(), -+ std::ptr::null_mut(), -+ ) -+ }) -+ .map(drop) -+ } -+ -+ /// Wait for the configured alarm to expire. -+ /// -+ /// Note: If the alarm is unset, then you will wait forever. -+ pub fn wait(&self) -> Result<()> { -+ loop { -+ if let Err(e) = read(self.fd, &mut [0u8; 8]) { -+ match e { -+ Error::Sys(Errno::EINTR) => continue, -+ _ => return Err(e), -+ } -+ } else { -+ break; -+ } -+ } -+ -+ Ok(()) -+ } -+} -+ -+impl Drop for TimerFd { -+ fn drop(&mut self) { -+ if !std::thread::panicking() { -+ let result = Errno::result(unsafe { -+ libc::close(self.fd) -+ }); -+ if let Err(Error::Sys(Errno::EBADF)) = result { -+ panic!("close of TimerFd encountered EBADF"); -+ } -+ } -+ } -+} -diff --git a/third_party/rust/nix/src/sys/uio.rs b/third_party/rust/nix/src/sys/uio.rs -index d089084eed711..65334227b4d1d 100644 ---- a/third_party/rust/nix/src/sys/uio.rs -+++ b/third_party/rust/nix/src/sys/uio.rs -@@ -1,8 +1,8 @@ - // Silence invalid warnings due to rust-lang/rust#16719 - #![allow(improper_ctypes)] - --use Result; --use errno::Errno; -+use crate::Result; -+use crate::errno::Errno; - use libc::{self, c_int, c_void, size_t, off_t}; - use std::marker::PhantomData; - use std::os::unix::io::RawFd; -@@ -117,7 +117,11 @@ pub struct RemoteIoVec { - /// [`IoVec`]: struct.IoVec.html - /// [`RemoteIoVec`]: struct.RemoteIoVec.html - #[cfg(target_os = "linux")] --pub fn process_vm_writev(pid: ::unistd::Pid, local_iov: &[IoVec<&[u8]>], remote_iov: &[RemoteIoVec]) -> Result<usize> { -+pub fn process_vm_writev( -+ pid: crate::unistd::Pid, -+ local_iov: &[IoVec<&[u8]>], -+ remote_iov: &[RemoteIoVec]) -> Result<usize> -+{ - let res = unsafe { - libc::process_vm_writev(pid.into(), - local_iov.as_ptr() as *const libc::iovec, local_iov.len() as libc::c_ulong, -@@ -148,7 +152,11 @@ pub fn process_vm_writev(pid: ::unistd::Pid, local_iov: &[IoVec<&[u8]>], remote_ - /// [`IoVec`]: struct.IoVec.html - /// [`RemoteIoVec`]: struct.RemoteIoVec.html - #[cfg(any(target_os = "linux"))] --pub fn process_vm_readv(pid: ::unistd::Pid, local_iov: &[IoVec<&mut [u8]>], remote_iov: &[RemoteIoVec]) -> Result<usize> { -+pub fn process_vm_readv( -+ pid: crate::unistd::Pid, -+ local_iov: &[IoVec<&mut [u8]>], -+ remote_iov: &[RemoteIoVec]) -> Result<usize> -+{ - let res = unsafe { - libc::process_vm_readv(pid.into(), - local_iov.as_ptr() as *const libc::iovec, local_iov.len() as libc::c_ulong, -@@ -158,7 +166,7 @@ pub fn process_vm_readv(pid: ::unistd::Pid, local_iov: &[IoVec<&mut [u8]>], remo - Errno::result(res).map(|r| r as usize) - } - --#[repr(C)] -+#[repr(transparent)] - #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] - pub struct IoVec<T>(libc::iovec, PhantomData<T>); - -diff --git a/third_party/rust/nix/src/sys/utsname.rs b/third_party/rust/nix/src/sys/utsname.rs -index ab09c7d23232a..bf1a814d6d863 100644 ---- a/third_party/rust/nix/src/sys/utsname.rs -+++ b/third_party/rust/nix/src/sys/utsname.rs -@@ -3,8 +3,8 @@ use libc::{self, c_char}; - use std::ffi::CStr; - use std::str::from_utf8_unchecked; - --#[repr(C)] - #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] -+#[repr(transparent)] - pub struct UtsName(libc::utsname); - - impl UtsName { -@@ -31,9 +31,9 @@ impl UtsName { - - pub fn uname() -> UtsName { - unsafe { -- let mut ret: UtsName = mem::uninitialized(); -- libc::uname(&mut ret.0); -- ret -+ let mut ret = mem::MaybeUninit::uninit(); -+ libc::uname(ret.as_mut_ptr()); -+ UtsName(ret.assume_init()) - } - } - -diff --git a/third_party/rust/nix/src/sys/wait.rs b/third_party/rust/nix/src/sys/wait.rs -index c54f7ec579667..faf8543cb1589 100644 ---- a/third_party/rust/nix/src/sys/wait.rs -+++ b/third_party/rust/nix/src/sys/wait.rs -@@ -1,9 +1,10 @@ -+use crate::errno::Errno; -+use crate::sys::signal::Signal; -+use crate::unistd::Pid; -+use crate::Result; -+use cfg_if::cfg_if; - use libc::{self, c_int}; --use Result; --use errno::Errno; --use unistd::Pid; -- --use sys::signal::Signal; -+use std::convert::TryFrom; - - libc_bitflags!( - pub struct WaitPidFlag: c_int { -@@ -14,6 +15,7 @@ libc_bitflags!( - target_os = "haiku", - target_os = "ios", - target_os = "linux", -+ target_os = "redox", - target_os = "macos", - target_os = "netbsd"))] - WEXITED; -@@ -23,6 +25,7 @@ libc_bitflags!( - target_os = "haiku", - target_os = "ios", - target_os = "linux", -+ target_os = "redox", - target_os = "macos", - target_os = "netbsd"))] - WSTOPPED; -@@ -32,16 +35,17 @@ libc_bitflags!( - target_os = "haiku", - target_os = "ios", - target_os = "linux", -+ target_os = "redox", - target_os = "macos", - target_os = "netbsd"))] - WNOWAIT; - /// Don't wait on children of other threads in this group -- #[cfg(any(target_os = "android", target_os = "linux"))] -+ #[cfg(any(target_os = "android", target_os = "linux", target_os = "redox"))] - __WNOTHREAD; - /// Wait on all children, regardless of type -- #[cfg(any(target_os = "android", target_os = "linux"))] -+ #[cfg(any(target_os = "android", target_os = "linux", target_os = "redox"))] - __WALL; -- #[cfg(any(target_os = "android", target_os = "linux"))] -+ #[cfg(any(target_os = "android", target_os = "linux", target_os = "redox"))] - __WCLONE; - } - ); -@@ -104,8 +108,7 @@ impl WaitStatus { - pub fn pid(&self) -> Option<Pid> { - use self::WaitStatus::*; - match *self { -- Exited(p, _) | Signaled(p, _, _) | -- Stopped(p, _) | Continued(p) => Some(p), -+ Exited(p, _) | Signaled(p, _, _) | Stopped(p, _) | Continued(p) => Some(p), - StillAlive => None, - #[cfg(any(target_os = "android", target_os = "linux"))] - PtraceEvent(p, _, _) | PtraceSyscall(p) => Some(p), -@@ -114,31 +117,31 @@ impl WaitStatus { - } - - fn exited(status: i32) -> bool { -- unsafe { libc::WIFEXITED(status) } -+ libc::WIFEXITED(status) - } - - fn exit_status(status: i32) -> i32 { -- unsafe { libc::WEXITSTATUS(status) } -+ libc::WEXITSTATUS(status) - } - - fn signaled(status: i32) -> bool { -- unsafe { libc::WIFSIGNALED(status) } -+ libc::WIFSIGNALED(status) - } - - fn term_signal(status: i32) -> Result<Signal> { -- Signal::from_c_int(unsafe { libc::WTERMSIG(status) }) -+ Signal::try_from(libc::WTERMSIG(status)) - } - - fn dumped_core(status: i32) -> bool { -- unsafe { libc::WCOREDUMP(status) } -+ libc::WCOREDUMP(status) - } - - fn stopped(status: i32) -> bool { -- unsafe { libc::WIFSTOPPED(status) } -+ libc::WIFSTOPPED(status) - } - - fn stop_signal(status: i32) -> Result<Signal> { -- Signal::from_c_int(unsafe { libc::WSTOPSIG(status) }) -+ Signal::try_from(libc::WSTOPSIG(status)) - } - - #[cfg(any(target_os = "android", target_os = "linux"))] -@@ -147,7 +150,7 @@ fn syscall_stop(status: i32) -> bool { - // of delivering SIGTRAP | 0x80 as the signal number for syscall - // stops. This allows easily distinguishing syscall stops from - // genuine SIGTRAP signals. -- unsafe { libc::WSTOPSIG(status) == libc::SIGTRAP | 0x80 } -+ libc::WSTOPSIG(status) == libc::SIGTRAP | 0x80 - } - - #[cfg(any(target_os = "android", target_os = "linux"))] -@@ -156,7 +159,7 @@ fn stop_additional(status: i32) -> c_int { - } - - fn continued(status: i32) -> bool { -- unsafe { libc::WIFCONTINUED(status) } -+ libc::WIFCONTINUED(status) - } - - impl WaitStatus { -@@ -222,7 +225,7 @@ pub fn waitpid<P: Into<Option<Pid>>>(pid: P, options: Option<WaitPidFlag>) -> Re - - let res = unsafe { - libc::waitpid( -- pid.into().unwrap_or(Pid::from_raw(-1)).into(), -+ pid.into().unwrap_or_else(|| Pid::from_raw(-1)).into(), - &mut status as *mut c_int, - option_bits, - ) -diff --git a/third_party/rust/nix/src/time.rs b/third_party/rust/nix/src/time.rs -new file mode 100644 -index 0000000000000..e6c3f8ded5a52 ---- /dev/null -+++ b/third_party/rust/nix/src/time.rs -@@ -0,0 +1,260 @@ -+use crate::sys::time::TimeSpec; -+#[cfg(any( -+ target_os = "freebsd", -+ target_os = "dragonfly", -+ target_os = "linux", -+ target_os = "android", -+ target_os = "emscripten", -+))] -+use crate::{unistd::Pid, Error}; -+use crate::{Errno, Result}; -+use libc::{self, clockid_t}; -+use std::mem::MaybeUninit; -+ -+/// Clock identifier -+/// -+/// Newtype pattern around `clockid_t` (which is just alias). It pervents bugs caused by -+/// accidentally passing wrong value. -+#[derive(Debug, Copy, Clone, Eq, PartialEq, Ord, PartialOrd, Hash)] -+pub struct ClockId(clockid_t); -+ -+impl ClockId { -+ /// Creates `ClockId` from raw `clockid_t` -+ pub fn from_raw(clk_id: clockid_t) -> Self { -+ ClockId(clk_id) -+ } -+ -+ /// Returns `ClockId` of a `pid` CPU-time clock -+ #[cfg(any( -+ target_os = "freebsd", -+ target_os = "dragonfly", -+ target_os = "linux", -+ target_os = "android", -+ target_os = "emscripten", -+ ))] -+ pub fn pid_cpu_clock_id(pid: Pid) -> Result<Self> { -+ clock_getcpuclockid(pid) -+ } -+ -+ /// Returns resolution of the clock id -+ #[cfg(not(target_os = "redox"))] -+ pub fn res(self) -> Result<TimeSpec> { -+ clock_getres(self) -+ } -+ -+ /// Returns the current time on the clock id -+ pub fn now(self) -> Result<TimeSpec> { -+ clock_gettime(self) -+ } -+ -+ /// Sets time to `timespec` on the clock id -+ #[cfg(not(any( -+ target_os = "macos", -+ target_os = "ios", -+ all( -+ not(any(target_env = "uclibc", target_env = "newlibc")), -+ any(target_os = "redox", target_os = "hermit",), -+ ), -+ )))] -+ pub fn set_time(self, timespec: TimeSpec) -> Result<()> { -+ clock_settime(self, timespec) -+ } -+ -+ /// Gets the raw `clockid_t` wrapped by `self` -+ pub fn as_raw(self) -> clockid_t { -+ self.0 -+ } -+ -+ #[cfg(any( -+ target_os = "fuchsia", -+ all( -+ not(any(target_env = "uclibc", target_env = "newlib")), -+ any(target_os = "linux", target_os = "android", target_os = "emscripten"), -+ ) -+ ))] -+ pub const CLOCK_BOOTTIME: ClockId = ClockId(libc::CLOCK_BOOTTIME); -+ #[cfg(any( -+ target_os = "fuchsia", -+ all( -+ not(any(target_env = "uclibc", target_env = "newlib")), -+ any(target_os = "linux", target_os = "android", target_os = "emscripten") -+ ) -+ ))] -+ pub const CLOCK_BOOTTIME_ALARM: ClockId = ClockId(libc::CLOCK_BOOTTIME_ALARM); -+ pub const CLOCK_MONOTONIC: ClockId = ClockId(libc::CLOCK_MONOTONIC); -+ #[cfg(any( -+ target_os = "fuchsia", -+ all( -+ not(any(target_env = "uclibc", target_env = "newlib")), -+ any(target_os = "linux", target_os = "android", target_os = "emscripten") -+ ) -+ ))] -+ pub const CLOCK_MONOTONIC_COARSE: ClockId = ClockId(libc::CLOCK_MONOTONIC_COARSE); -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ pub const CLOCK_MONOTONIC_FAST: ClockId = ClockId(libc::CLOCK_MONOTONIC_FAST); -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ pub const CLOCK_MONOTONIC_PRECISE: ClockId = ClockId(libc::CLOCK_MONOTONIC_PRECISE); -+ #[cfg(any( -+ target_os = "fuchsia", -+ all( -+ not(any(target_env = "uclibc", target_env = "newlib")), -+ any(target_os = "linux", target_os = "android", target_os = "emscripten") -+ ) -+ ))] -+ pub const CLOCK_MONOTONIC_RAW: ClockId = ClockId(libc::CLOCK_MONOTONIC_RAW); -+ #[cfg(any( -+ target_os = "fuchsia", -+ target_env = "uclibc", -+ target_os = "macos", -+ target_os = "ios", -+ target_os = "freebsd", -+ target_os = "dragonfly", -+ all( -+ not(target_env = "newlib"), -+ any(target_os = "linux", target_os = "android", target_os = "emscripten") -+ ) -+ ))] -+ pub const CLOCK_PROCESS_CPUTIME_ID: ClockId = ClockId(libc::CLOCK_PROCESS_CPUTIME_ID); -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ pub const CLOCK_PROF: ClockId = ClockId(libc::CLOCK_PROF); -+ pub const CLOCK_REALTIME: ClockId = ClockId(libc::CLOCK_REALTIME); -+ #[cfg(any( -+ target_os = "fuchsia", -+ all( -+ not(any(target_env = "uclibc", target_env = "newlib")), -+ any(target_os = "linux", target_os = "android", target_os = "emscripten") -+ ) -+ ))] -+ pub const CLOCK_REALTIME_ALARM: ClockId = ClockId(libc::CLOCK_REALTIME_ALARM); -+ #[cfg(any( -+ target_os = "fuchsia", -+ all( -+ not(any(target_env = "uclibc", target_env = "newlib")), -+ any(target_os = "linux", target_os = "android", target_os = "emscripten") -+ ) -+ ))] -+ pub const CLOCK_REALTIME_COARSE: ClockId = ClockId(libc::CLOCK_REALTIME_COARSE); -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ pub const CLOCK_REALTIME_FAST: ClockId = ClockId(libc::CLOCK_REALTIME_FAST); -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ pub const CLOCK_REALTIME_PRECISE: ClockId = ClockId(libc::CLOCK_REALTIME_PRECISE); -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ pub const CLOCK_SECOND: ClockId = ClockId(libc::CLOCK_SECOND); -+ #[cfg(any( -+ target_os = "fuchsia", -+ all( -+ not(any(target_env = "uclibc", target_env = "newlib")), -+ any( -+ target_os = "emscripten", -+ all(target_os = "linux", target_env = "musl") -+ ) -+ ) -+ ))] -+ pub const CLOCK_SGI_CYCLE: ClockId = ClockId(libc::CLOCK_SGI_CYCLE); -+ #[cfg(any( -+ target_os = "fuchsia", -+ all( -+ not(any(target_env = "uclibc", target_env = "newlib")), -+ any( -+ target_os = "emscripten", -+ all(target_os = "linux", target_env = "musl") -+ ) -+ ) -+ ))] -+ pub const CLOCK_TAI: ClockId = ClockId(libc::CLOCK_TAI); -+ #[cfg(any( -+ target_env = "uclibc", -+ target_os = "fuchsia", -+ target_os = "ios", -+ target_os = "macos", -+ target_os = "freebsd", -+ target_os = "dragonfly", -+ all( -+ not(target_env = "newlib"), -+ any(target_os = "linux", target_os = "android", target_os = "emscripten",), -+ ), -+ ))] -+ pub const CLOCK_THREAD_CPUTIME_ID: ClockId = ClockId(libc::CLOCK_THREAD_CPUTIME_ID); -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ pub const CLOCK_UPTIME: ClockId = ClockId(libc::CLOCK_UPTIME); -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ pub const CLOCK_UPTIME_FAST: ClockId = ClockId(libc::CLOCK_UPTIME_FAST); -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ pub const CLOCK_UPTIME_PRECISE: ClockId = ClockId(libc::CLOCK_UPTIME_PRECISE); -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ pub const CLOCK_VIRTUAL: ClockId = ClockId(libc::CLOCK_VIRTUAL); -+} -+ -+impl Into<clockid_t> for ClockId { -+ fn into(self) -> clockid_t { -+ self.as_raw() -+ } -+} -+ -+impl From<clockid_t> for ClockId { -+ fn from(clk_id: clockid_t) -> Self { -+ ClockId::from_raw(clk_id) -+ } -+} -+ -+impl std::fmt::Display for ClockId { -+ fn fmt(&self, f: &mut std::fmt::Formatter) -> std::fmt::Result { -+ std::fmt::Display::fmt(&self.0, f) -+ } -+} -+ -+/// Get the resolution of the specified clock, (see -+/// [clock_getres(2)](https://pubs.opengroup.org/onlinepubs/7908799/xsh/clock_getres.html)). -+#[cfg(not(target_os = "redox"))] -+pub fn clock_getres(clock_id: ClockId) -> Result<TimeSpec> { -+ let mut c_time: MaybeUninit<libc::timespec> = MaybeUninit::uninit(); -+ let ret = unsafe { libc::clock_getres(clock_id.as_raw(), c_time.as_mut_ptr()) }; -+ Errno::result(ret)?; -+ let res = unsafe { c_time.assume_init() }; -+ Ok(TimeSpec::from(res)) -+} -+ -+/// Get the time of the specified clock, (see -+/// [clock_gettime(2)](https://pubs.opengroup.org/onlinepubs/7908799/xsh/clock_gettime.html)). -+pub fn clock_gettime(clock_id: ClockId) -> Result<TimeSpec> { -+ let mut c_time: MaybeUninit<libc::timespec> = MaybeUninit::uninit(); -+ let ret = unsafe { libc::clock_gettime(clock_id.as_raw(), c_time.as_mut_ptr()) }; -+ Errno::result(ret)?; -+ let res = unsafe { c_time.assume_init() }; -+ Ok(TimeSpec::from(res)) -+} -+ -+/// Set the time of the specified clock, (see -+/// [clock_settime(2)](https://pubs.opengroup.org/onlinepubs/7908799/xsh/clock_settime.html)). -+#[cfg(not(any( -+ target_os = "macos", -+ target_os = "ios", -+ all( -+ not(any(target_env = "uclibc", target_env = "newlibc")), -+ any(target_os = "redox", target_os = "hermit",), -+ ), -+)))] -+pub fn clock_settime(clock_id: ClockId, timespec: TimeSpec) -> Result<()> { -+ let ret = unsafe { libc::clock_settime(clock_id.as_raw(), timespec.as_ref()) }; -+ Errno::result(ret).map(drop) -+} -+ -+/// Get the clock id of the specified process id, (see -+/// [clock_getcpuclockid(3)](https://pubs.opengroup.org/onlinepubs/009695399/functions/clock_getcpuclockid.html)). -+#[cfg(any( -+ target_os = "freebsd", -+ target_os = "dragonfly", -+ target_os = "linux", -+ target_os = "android", -+ target_os = "emscripten", -+))] -+pub fn clock_getcpuclockid(pid: Pid) -> Result<ClockId> { -+ let mut clk_id: MaybeUninit<libc::clockid_t> = MaybeUninit::uninit(); -+ let ret = unsafe { libc::clock_getcpuclockid(pid.into(), clk_id.as_mut_ptr()) }; -+ if ret == 0 { -+ let res = unsafe { clk_id.assume_init() }; -+ Ok(ClockId::from(res)) -+ } else { -+ Err(Error::Sys(Errno::from_i32(ret))) -+ } -+} -diff --git a/third_party/rust/nix/src/ucontext.rs b/third_party/rust/nix/src/ucontext.rs -index 5e10e7d1f8934..a5b8cc75cb330 100644 ---- a/third_party/rust/nix/src/ucontext.rs -+++ b/third_party/rust/nix/src/ucontext.rs -@@ -1,10 +1,11 @@ - use libc; - #[cfg(not(target_env = "musl"))] --use Result; -+use crate::Result; -+#[cfg(not(target_env = "musl"))] -+use crate::errno::Errno; - #[cfg(not(target_env = "musl"))] --use errno::Errno; - use std::mem; --use sys::signal::SigSet; -+use crate::sys::signal::SigSet; - - #[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)] - pub struct UContext { -@@ -14,11 +15,11 @@ pub struct UContext { - impl UContext { - #[cfg(not(target_env = "musl"))] - pub fn get() -> Result<UContext> { -- let mut context: libc::ucontext_t = unsafe { mem::uninitialized() }; -- let res = unsafe { -- libc::getcontext(&mut context as *mut libc::ucontext_t) -- }; -- Errno::result(res).map(|_| UContext { context: context }) -+ let mut context = mem::MaybeUninit::<libc::ucontext_t>::uninit(); -+ let res = unsafe { libc::getcontext(context.as_mut_ptr()) }; -+ Errno::result(res).map(|_| unsafe { -+ UContext { context: context.assume_init()} -+ }) - } - - #[cfg(not(target_env = "musl"))] -@@ -30,10 +31,14 @@ impl UContext { - } - - pub fn sigmask_mut(&mut self) -> &mut SigSet { -- unsafe { mem::transmute(&mut self.context.uc_sigmask) } -+ unsafe { -+ &mut *(&mut self.context.uc_sigmask as *mut libc::sigset_t as *mut SigSet) -+ } - } - - pub fn sigmask(&self) -> &SigSet { -- unsafe { mem::transmute(&self.context.uc_sigmask) } -+ unsafe { -+ &*(&self.context.uc_sigmask as *const libc::sigset_t as *const SigSet) -+ } - } - } -diff --git a/third_party/rust/nix/src/unistd.rs b/third_party/rust/nix/src/unistd.rs -index f422f09198655..59cb1ed8b5901 100644 ---- a/third_party/rust/nix/src/unistd.rs -+++ b/third_party/rust/nix/src/unistd.rs -@@ -1,18 +1,26 @@ - //! Safe wrappers around functions found in libc "unistd.h" header - --use errno::{self, Errno}; --use {Error, Result, NixPath}; --use fcntl::{AtFlags, at_rawfd, fcntl, FdFlag, OFlag}; --use fcntl::FcntlArg::F_SETFD; -+#[cfg(not(target_os = "redox"))] -+use cfg_if::cfg_if; -+use crate::errno::{self, Errno}; -+use crate::{Error, Result, NixPath}; -+#[cfg(not(target_os = "redox"))] -+use crate::fcntl::{AtFlags, at_rawfd}; -+use crate::fcntl::{FdFlag, OFlag, fcntl}; -+use crate::fcntl::FcntlArg::F_SETFD; - use libc::{self, c_char, c_void, c_int, c_long, c_uint, size_t, pid_t, off_t, -- uid_t, gid_t, mode_t}; -+ uid_t, gid_t, mode_t, PATH_MAX}; - use std::{fmt, mem, ptr}; --use std::ffi::{CString, CStr, OsString, OsStr}; --use std::os::unix::ffi::{OsStringExt, OsStrExt}; -+use std::convert::Infallible; -+use std::ffi::{CStr, OsString}; -+#[cfg(not(target_os = "redox"))] -+use std::ffi::{CString, OsStr}; -+use std::os::unix::ffi::OsStringExt; -+#[cfg(not(target_os = "redox"))] -+use std::os::unix::ffi::OsStrExt; - use std::os::unix::io::RawFd; - use std::path::PathBuf; --use void::Void; --use sys::stat::Mode; -+use crate::sys::stat::Mode; - - #[cfg(any(target_os = "android", target_os = "linux"))] - pub use self::pivot_root::*; -@@ -45,12 +53,12 @@ impl Uid { - } - - /// Returns true if the `Uid` represents privileged user - root. (If it equals zero.) -- pub fn is_root(&self) -> bool { -- *self == ROOT -+ pub fn is_root(self) -> bool { -+ self == ROOT - } - - /// Get the raw `uid_t` wrapped by `self`. -- pub fn as_raw(&self) -> uid_t { -+ pub fn as_raw(self) -> uid_t { - self.0 - } - } -@@ -88,13 +96,13 @@ impl Gid { - getgid() - } - -- /// Returns effective Gid of calling process. This is practically a more Rusty alias for `getgid`. -+ /// Returns effective Gid of calling process. This is practically a more Rusty alias for `getegid`. - pub fn effective() -> Self { - getegid() - } - - /// Get the raw `gid_t` wrapped by `self`. -- pub fn as_raw(&self) -> gid_t { -+ pub fn as_raw(self) -> gid_t { - self.0 - } - } -@@ -115,7 +123,7 @@ impl fmt::Display for Gid { - /// - /// Newtype pattern around `pid_t` (which is just alias). It prevents bugs caused by accidentally - /// passing wrong value. --#[derive(Debug, Copy, Clone, Eq, PartialEq, Hash)] -+#[derive(Debug, Copy, Clone, Eq, PartialEq, Ord, PartialOrd, Hash)] - pub struct Pid(pid_t); - - impl Pid { -@@ -135,7 +143,7 @@ impl Pid { - } - - /// Get the raw `pid_t` wrapped by `self`. -- pub fn as_raw(&self) -> pid_t { -+ pub fn as_raw(self) -> pid_t { - self.0 - } - } -@@ -168,8 +176,8 @@ impl ForkResult { - - /// Return `true` if this is the child process of the `fork()` - #[inline] -- pub fn is_child(&self) -> bool { -- match *self { -+ pub fn is_child(self) -> bool { -+ match self { - ForkResult::Child => true, - _ => false - } -@@ -177,7 +185,7 @@ impl ForkResult { - - /// Returns `true` if this is the parent process of the `fork()` - #[inline] -- pub fn is_parent(&self) -> bool { -+ pub fn is_parent(self) -> bool { - !self.is_child() - } - } -@@ -192,7 +200,7 @@ impl ForkResult { - /// ```no_run - /// use nix::unistd::{fork, ForkResult}; - /// --/// match fork() { -+/// match unsafe{fork()} { - /// Ok(ForkResult::Parent { child, .. }) => { - /// println!("Continuing execution in parent process, new child has pid: {}", child); - /// } -@@ -222,9 +230,9 @@ impl ForkResult { - /// - /// [async-signal-safe]: http://man7.org/linux/man-pages/man7/signal-safety.7.html - #[inline] --pub fn fork() -> Result<ForkResult> { -+pub unsafe fn fork() -> Result<ForkResult> { - use self::ForkResult::*; -- let res = unsafe { libc::fork() }; -+ let res = libc::fork(); - - Errno::result(res).map(|res| match res { - 0 => Child, -@@ -285,6 +293,7 @@ pub fn setsid() -> Result<Pid> { - /// Obtain the process group ID of the process that is the session leader of the process specified - /// by pid. If pid is zero, it specifies the calling process. - #[inline] -+#[cfg(not(target_os = "redox"))] - pub fn getsid(pid: Option<Pid>) -> Result<Pid> { - let res = unsafe { libc::getsid(pid.unwrap_or(Pid(0)).into()) }; - Errno::result(res).map(Pid) -@@ -417,6 +426,7 @@ pub fn chdir<P: ?Sized + NixPath>(path: &P) -> Result<()> { - /// This function may fail in a number of different scenarios. See the man - /// pages for additional details on possible failure cases. - #[inline] -+#[cfg(not(target_os = "fuchsia"))] - pub fn fchdir(dirfd: RawFd) -> Result<()> { - let res = unsafe { libc::fchdir(dirfd) }; - -@@ -436,9 +446,6 @@ pub fn fchdir(dirfd: RawFd) -> Result<()> { - /// # Example - /// - /// ```rust --/// extern crate tempfile; --/// extern crate nix; --/// - /// use nix::unistd; - /// use nix::sys::stat; - /// use tempfile::tempdir; -@@ -479,9 +486,6 @@ pub fn mkdir<P: ?Sized + NixPath>(path: &P, mode: Mode) -> Result<()> { - /// # Example - /// - /// ```rust --/// extern crate tempfile; --/// extern crate nix; --/// - /// use nix::unistd; - /// use nix::sys::stat; - /// use tempfile::tempdir; -@@ -498,6 +502,7 @@ pub fn mkdir<P: ?Sized + NixPath>(path: &P, mode: Mode) -> Result<()> { - /// } - /// ``` - #[inline] -+#[cfg(not(target_os = "redox"))] // RedoxFS does not support fifo yet - pub fn mkfifo<P: ?Sized + NixPath>(path: &P, mode: Mode) -> Result<()> { - let res = path.with_nix_path(|cstr| { - unsafe { libc::mkfifo(cstr.as_ptr(), mode.bits() as mode_t) } -@@ -506,6 +511,28 @@ pub fn mkfifo<P: ?Sized + NixPath>(path: &P, mode: Mode) -> Result<()> { - Errno::result(res).map(drop) - } - -+/// Creates new fifo special file (named pipe) with path `path` and access rights `mode`. -+/// -+/// If `dirfd` has a value, then `path` is relative to directory associated with the file descriptor. -+/// -+/// If `dirfd` is `None`, then `path` is relative to the current working directory. -+/// -+/// # References -+/// -+/// [mkfifoat(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/mkfifoat.html). -+// mkfifoat is not implemented in OSX or android -+#[inline] -+#[cfg(not(any( -+ target_os = "macos", target_os = "ios", -+ target_os = "android", target_os = "redox")))] -+pub fn mkfifoat<P: ?Sized + NixPath>(dirfd: Option<RawFd>, path: &P, mode: Mode) -> Result<()> { -+ let res = path.with_nix_path(|cstr| unsafe { -+ libc::mkfifoat(at_rawfd(dirfd), cstr.as_ptr(), mode.bits() as mode_t) -+ })?; -+ -+ Errno::result(res).map(drop) -+} -+ - /// Creates a symbolic link at `path2` which points to `path1`. - /// - /// If `dirfd` has a value, then `path2` is relative to directory associated -@@ -515,6 +542,7 @@ pub fn mkfifo<P: ?Sized + NixPath>(path: &P, mode: Mode) -> Result<()> { - /// directory. This is identical to `libc::symlink(path1, path2)`. - /// - /// See also [symlinkat(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/symlinkat.html). -+#[cfg(not(target_os = "redox"))] - pub fn symlinkat<P1: ?Sized + NixPath, P2: ?Sized + NixPath>( - path1: &P1, - dirfd: Option<RawFd>, -@@ -534,6 +562,21 @@ pub fn symlinkat<P1: ?Sized + NixPath, P2: ?Sized + NixPath>( - Errno::result(res).map(drop) - } - -+// Double the buffer capacity up to limit. In case it already has -+// reached the limit, return Errno::ERANGE. -+fn reserve_double_buffer_size<T>(buf: &mut Vec<T>, limit: usize) -> Result<()> { -+ use std::cmp::min; -+ -+ if buf.capacity() >= limit { -+ return Err(Error::Sys(Errno::ERANGE)) -+ } -+ -+ let capacity = min(buf.capacity() * 2, limit); -+ buf.reserve(capacity); -+ -+ Ok(()) -+} -+ - /// Returns the current directory as a `PathBuf` - /// - /// Err is returned if the current user doesn't have the permission to read or search a component -@@ -542,8 +585,6 @@ pub fn symlinkat<P1: ?Sized + NixPath, P2: ?Sized + NixPath>( - /// # Example - /// - /// ```rust --/// extern crate nix; --/// - /// use nix::unistd; - /// - /// fn main() { -@@ -576,11 +617,8 @@ pub fn getcwd() -> Result<PathBuf> { - } - } - -- // Trigger the internal buffer resizing logic of `Vec` by requiring -- // more space than the current capacity. -- let cap = buf.capacity(); -- buf.set_len(cap); -- buf.reserve(1); -+ // Trigger the internal buffer resizing logic. -+ reserve_double_buffer_size(&mut buf, PATH_MAX as usize)?; - } - } - } -@@ -590,8 +628,10 @@ fn chown_raw_ids(owner: Option<Uid>, group: Option<Gid>) -> (libc::uid_t, libc:: - // According to the POSIX specification, -1 is used to indicate that owner and group - // are not to be changed. Since uid_t and gid_t are unsigned types, we have to wrap - // around to get -1. -- let uid = owner.map(Into::into).unwrap_or((0 as uid_t).wrapping_sub(1)); -- let gid = group.map(Into::into).unwrap_or((0 as gid_t).wrapping_sub(1)); -+ let uid = owner.map(Into::into) -+ .unwrap_or_else(|| (0 as uid_t).wrapping_sub(1)); -+ let gid = group.map(Into::into) -+ .unwrap_or_else(|| (0 as gid_t).wrapping_sub(1)); - (uid, gid) - } - -@@ -612,6 +652,20 @@ pub fn chown<P: ?Sized + NixPath>(path: &P, owner: Option<Uid>, group: Option<Gi - Errno::result(res).map(drop) - } - -+/// Change the ownership of the file referred to by the open file descriptor `fd` to be owned by -+/// the specified `owner` (user) and `group` (see -+/// [fchown(2)](https://pubs.opengroup.org/onlinepubs/9699919799/functions/fchown.html)). -+/// -+/// The owner/group for the provided file will not be modified if `None` is -+/// provided for that argument. Ownership change will be attempted for the path -+/// only if `Some` owner/group is provided. -+#[inline] -+pub fn fchown(fd: RawFd, owner: Option<Uid>, group: Option<Gid>) -> Result<()> { -+ let (uid, gid) = chown_raw_ids(owner, group); -+ let res = unsafe { libc::fchown(fd, uid, gid) }; -+ Errno::result(res).map(drop) -+} -+ - /// Flags for `fchownat` function. - #[derive(Clone, Copy, Debug)] - pub enum FchownatFlags { -@@ -640,6 +694,7 @@ pub enum FchownatFlags { - /// # References - /// - /// [fchownat(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/fchownat.html). -+#[cfg(not(target_os = "redox"))] - pub fn fchownat<P: ?Sized + NixPath>( - dirfd: Option<RawFd>, - path: &P, -@@ -661,10 +716,9 @@ pub fn fchownat<P: ?Sized + NixPath>( - Errno::result(res).map(drop) - } - --fn to_exec_array(args: &[CString]) -> Vec<*const c_char> { -- let mut args_p: Vec<*const c_char> = args.iter().map(|s| s.as_ptr()).collect(); -- args_p.push(ptr::null()); -- args_p -+fn to_exec_array<S: AsRef<CStr>>(args: &[S]) -> Vec<*const c_char> { -+ use std::iter::once; -+ args.iter().map(|s| s.as_ref().as_ptr()).chain(once(ptr::null())).collect() - } - - /// Replace the current process image with a new one (see -@@ -674,7 +728,7 @@ fn to_exec_array(args: &[CString]) -> Vec<*const c_char> { - /// performs the same action but does not allow for customization of the - /// environment for the new process. - #[inline] --pub fn execv(path: &CString, argv: &[CString]) -> Result<Void> { -+pub fn execv<S: AsRef<CStr>>(path: &CStr, argv: &[S]) -> Result<Infallible> { - let args_p = to_exec_array(argv); - - unsafe { -@@ -698,7 +752,7 @@ pub fn execv(path: &CString, argv: &[CString]) -> Result<Void> { - /// in the `args` list is an argument to the new process. Each element in the - /// `env` list should be a string in the form "key=value". - #[inline] --pub fn execve(path: &CString, args: &[CString], env: &[CString]) -> Result<Void> { -+pub fn execve<SA: AsRef<CStr>, SE: AsRef<CStr>>(path: &CStr, args: &[SA], env: &[SE]) -> Result<Infallible> { - let args_p = to_exec_array(args); - let env_p = to_exec_array(env); - -@@ -719,7 +773,7 @@ pub fn execve(path: &CString, args: &[CString], env: &[CString]) -> Result<Void> - /// would not work if "bash" was specified for the path argument, but `execvp` - /// would assuming that a bash executable was on the system `PATH`. - #[inline] --pub fn execvp(filename: &CString, args: &[CString]) -> Result<Void> { -+pub fn execvp<S: AsRef<CStr>>(filename: &CStr, args: &[S]) -> Result<Infallible> { - let args_p = to_exec_array(args); - - unsafe { -@@ -739,7 +793,7 @@ pub fn execvp(filename: &CString, args: &[CString]) -> Result<Void> { - #[cfg(any(target_os = "haiku", - target_os = "linux", - target_os = "openbsd"))] --pub fn execvpe(filename: &CString, args: &[CString], env: &[CString]) -> Result<Void> { -+pub fn execvpe<SA: AsRef<CStr>, SE: AsRef<CStr>>(filename: &CStr, args: &[SA], env: &[SE]) -> Result<Infallible> { - let args_p = to_exec_array(args); - let env_p = to_exec_array(env); - -@@ -767,7 +821,7 @@ pub fn execvpe(filename: &CString, args: &[CString], env: &[CString]) -> Result< - target_os = "linux", - target_os = "freebsd"))] - #[inline] --pub fn fexecve(fd: RawFd, args: &[CString], env: &[CString]) -> Result<Void> { -+pub fn fexecve<SA: AsRef<CStr> ,SE: AsRef<CStr>>(fd: RawFd, args: &[SA], env: &[SE]) -> Result<Infallible> { - let args_p = to_exec_array(args); - let env_p = to_exec_array(env); - -@@ -790,8 +844,8 @@ pub fn fexecve(fd: RawFd, args: &[CString], env: &[CString]) -> Result<Void> { - /// is referenced as a file descriptor to the base directory plus a path. - #[cfg(any(target_os = "android", target_os = "linux"))] - #[inline] --pub fn execveat(dirfd: RawFd, pathname: &CString, args: &[CString], -- env: &[CString], flags: super::fcntl::AtFlags) -> Result<Void> { -+pub fn execveat<SA: AsRef<CStr>,SE: AsRef<CStr>>(dirfd: RawFd, pathname: &CStr, args: &[SA], -+ env: &[SE], flags: super::fcntl::AtFlags) -> Result<Infallible> { - let args_p = to_exec_array(args); - let env_p = to_exec_array(env); - -@@ -828,11 +882,12 @@ pub fn execveat(dirfd: RawFd, pathname: &CString, args: &[CString], - /// descriptors will remain identical after daemonizing. - /// * `noclose = false`: The process' stdin, stdout, and stderr will point to - /// `/dev/null` after daemonizing. --#[cfg_attr(any(target_os = "macos", target_os = "ios"), deprecated( -- since="0.14.0", -- note="Deprecated in MacOSX 10.5" --))] --#[cfg_attr(any(target_os = "macos", target_os = "ios"), allow(deprecated))] -+#[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "netbsd", -+ target_os = "openbsd"))] - pub fn daemon(nochdir: bool, noclose: bool) -> Result<()> { - let res = unsafe { libc::daemon(nochdir as c_int, noclose as c_int) }; - Errno::result(res).map(drop) -@@ -845,6 +900,7 @@ pub fn daemon(nochdir: bool, noclose: bool) -> Result<()> { - /// On some systems, the host name is limited to as few as 64 bytes. An error - /// will be return if the name is not valid or the current process does not have - /// permissions to update the host name. -+#[cfg(not(target_os = "redox"))] - pub fn sethostname<S: AsRef<OsStr>>(name: S) -> Result<()> { - // Handle some differences in type of the len arg across platforms. - cfg_if! { -@@ -906,9 +962,6 @@ pub fn gethostname(buffer: &mut [u8]) -> Result<&CStr> { - /// # Examples - /// - /// ```no_run --/// extern crate tempfile; --/// extern crate nix; --/// - /// use std::os::unix::io::AsRawFd; - /// use nix::unistd::close; - /// -@@ -919,9 +972,6 @@ pub fn gethostname(buffer: &mut [u8]) -> Result<&CStr> { - /// ``` - /// - /// ```rust --/// extern crate tempfile; --/// extern crate nix; --/// - /// use std::os::unix::io::IntoRawFd; - /// use nix::unistd::close; - /// -@@ -969,20 +1019,14 @@ pub enum Whence { - /// Specify an offset relative to the next location in the file greater than or - /// equal to offset that contains some data. If offset points to - /// some data, then the file offset is set to offset. -- #[cfg(any(target_os = "dragonfly", target_os = "freebsd", -- all(target_os = "linux", not(any(target_env = "musl", -- target_arch = "mips", -- target_arch = "mips64")))))] -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd", target_os = "linux"))] - SeekData = libc::SEEK_DATA, - /// Specify an offset relative to the next hole in the file greater than - /// or equal to offset. If offset points into the middle of a hole, then - /// the file offset should be set to offset. If there is no hole past offset, - /// then the file offset should be adjusted to the end of the file (i.e., there - /// is an implicit hole at the end of any file). -- #[cfg(any(target_os = "dragonfly", target_os = "freebsd", -- all(target_os = "linux", not(any(target_env = "musl", -- target_arch = "mips", -- target_arch = "mips64")))))] -+ #[cfg(any(target_os = "dragonfly", target_os = "freebsd", target_os = "linux"))] - SeekHole = libc::SEEK_HOLE - } - -@@ -1007,13 +1051,13 @@ pub fn lseek64(fd: RawFd, offset: libc::off64_t, whence: Whence) -> Result<libc: - /// See also [pipe(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/pipe.html) - pub fn pipe() -> Result<(RawFd, RawFd)> { - unsafe { -- let mut fds: [c_int; 2] = mem::uninitialized(); -+ let mut fds = mem::MaybeUninit::<[c_int; 2]>::uninit(); - -- let res = libc::pipe(fds.as_mut_ptr()); -+ let res = libc::pipe(fds.as_mut_ptr() as *mut c_int); - - Errno::result(res)?; - -- Ok((fds[0], fds[1])) -+ Ok((fds.assume_init()[0], fds.assume_init()[1])) - } - } - -@@ -1022,7 +1066,9 @@ pub fn pipe() -> Result<(RawFd, RawFd)> { - /// The following flags are supported, and will be set atomically as the pipe is - /// created: - /// --/// `O_CLOEXEC`: Set the close-on-exec flag for the new file descriptors. -+/// `O_CLOEXEC`: Set the close-on-exec flag for the new file descriptors. -+#[cfg_attr(target_os = "linux", doc = "`O_DIRECT`: Create a pipe that performs I/O in \"packet\" mode. ")] -+#[cfg_attr(target_os = "netbsd", doc = "`O_NOSIGPIPE`: Return `EPIPE` instead of raising `SIGPIPE`. ")] - /// `O_NONBLOCK`: Set the non-blocking flag for the ends of the pipe. - /// - /// See also [pipe(2)](http://man7.org/linux/man-pages/man2/pipe.2.html) -@@ -1031,74 +1077,26 @@ pub fn pipe() -> Result<(RawFd, RawFd)> { - target_os = "emscripten", - target_os = "freebsd", - target_os = "linux", -+ target_os = "redox", - target_os = "netbsd", - target_os = "openbsd"))] - pub fn pipe2(flags: OFlag) -> Result<(RawFd, RawFd)> { -- let mut fds: [c_int; 2] = unsafe { mem::uninitialized() }; -- -- let res = unsafe { libc::pipe2(fds.as_mut_ptr(), flags.bits()) }; -- -- Errno::result(res)?; -- -- Ok((fds[0], fds[1])) --} -+ let mut fds = mem::MaybeUninit::<[c_int; 2]>::uninit(); - --/// Like `pipe`, but allows setting certain file descriptor flags. --/// --/// The following flags are supported, and will be set after the pipe is --/// created: --/// --/// `O_CLOEXEC`: Set the close-on-exec flag for the new file descriptors. --/// `O_NONBLOCK`: Set the non-blocking flag for the ends of the pipe. --#[cfg(any(target_os = "ios", target_os = "macos"))] --#[deprecated( -- since="0.10.0", -- note="pipe2(2) is not actually atomic on these platforms. Use pipe(2) and fcntl(2) instead" --)] --pub fn pipe2(flags: OFlag) -> Result<(RawFd, RawFd)> { -- let mut fds: [c_int; 2] = unsafe { mem::uninitialized() }; -- -- let res = unsafe { libc::pipe(fds.as_mut_ptr()) }; -+ let res = unsafe { -+ libc::pipe2(fds.as_mut_ptr() as *mut c_int, flags.bits()) -+ }; - - Errno::result(res)?; - -- pipe2_setflags(fds[0], fds[1], flags)?; -- -- Ok((fds[0], fds[1])) --} -- --#[cfg(any(target_os = "ios", target_os = "macos"))] --fn pipe2_setflags(fd1: RawFd, fd2: RawFd, flags: OFlag) -> Result<()> { -- use fcntl::FcntlArg::F_SETFL; -- -- let mut res = Ok(0); -- -- if flags.contains(OFlag::O_CLOEXEC) { -- res = res -- .and_then(|_| fcntl(fd1, F_SETFD(FdFlag::FD_CLOEXEC))) -- .and_then(|_| fcntl(fd2, F_SETFD(FdFlag::FD_CLOEXEC))); -- } -- -- if flags.contains(OFlag::O_NONBLOCK) { -- res = res -- .and_then(|_| fcntl(fd1, F_SETFL(OFlag::O_NONBLOCK))) -- .and_then(|_| fcntl(fd2, F_SETFL(OFlag::O_NONBLOCK))); -- } -- -- match res { -- Ok(_) => Ok(()), -- Err(e) => { -- let _ = close(fd1); -- let _ = close(fd2); -- Err(e) -- } -- } -+ unsafe { Ok((fds.assume_init()[0], fds.assume_init()[1])) } - } - - /// Truncate a file to a specified length - /// - /// See also - /// [truncate(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/truncate.html) -+#[cfg(not(any(target_os = "redox", target_os = "fuchsia")))] - pub fn truncate<P: ?Sized + NixPath>(path: &P, len: off_t) -> Result<()> { - let res = path.with_nix_path(|cstr| { - unsafe { -@@ -1132,6 +1130,59 @@ pub fn isatty(fd: RawFd) -> Result<bool> { - } - } - -+/// Flags for `linkat` function. -+#[derive(Clone, Copy, Debug)] -+pub enum LinkatFlags { -+ SymlinkFollow, -+ NoSymlinkFollow, -+} -+ -+/// Link one file to another file -+/// -+/// Creates a new link (directory entry) at `newpath` for the existing file at `oldpath`. In the -+/// case of a relative `oldpath`, the path is interpreted relative to the directory associated -+/// with file descriptor `olddirfd` instead of the current working directory and similiarly for -+/// `newpath` and file descriptor `newdirfd`. In case `flag` is LinkatFlags::SymlinkFollow and -+/// `oldpath` names a symoblic link, a new link for the target of the symbolic link is created. -+/// If either `olddirfd` or `newdirfd` is `None`, `AT_FDCWD` is used respectively where `oldpath` -+/// and/or `newpath` is then interpreted relative to the current working directory of the calling -+/// process. If either `oldpath` or `newpath` is absolute, then `dirfd` is ignored. -+/// -+/// # References -+/// See also [linkat(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/linkat.html) -+#[cfg(not(target_os = "redox"))] // RedoxFS does not support symlinks yet -+pub fn linkat<P: ?Sized + NixPath>( -+ olddirfd: Option<RawFd>, -+ oldpath: &P, -+ newdirfd: Option<RawFd>, -+ newpath: &P, -+ flag: LinkatFlags, -+) -> Result<()> { -+ -+ let atflag = -+ match flag { -+ LinkatFlags::SymlinkFollow => AtFlags::AT_SYMLINK_FOLLOW, -+ LinkatFlags::NoSymlinkFollow => AtFlags::empty(), -+ }; -+ -+ let res = -+ oldpath.with_nix_path(|oldcstr| { -+ newpath.with_nix_path(|newcstr| { -+ unsafe { -+ libc::linkat( -+ at_rawfd(olddirfd), -+ oldcstr.as_ptr(), -+ at_rawfd(newdirfd), -+ newcstr.as_ptr(), -+ atflag.bits() as libc::c_int -+ ) -+ } -+ }) -+ })??; -+ Errno::result(res).map(drop) -+} -+ -+ - /// Remove a directory entry - /// - /// See also [unlink(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/unlink.html) -@@ -1161,6 +1212,7 @@ pub enum UnlinkatFlags { - /// - /// # References - /// See also [unlinkat(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/unlinkat.html) -+#[cfg(not(target_os = "redox"))] - pub fn unlinkat<P: ?Sized + NixPath>( - dirfd: Option<RawFd>, - path: &P, -@@ -1181,6 +1233,7 @@ pub fn unlinkat<P: ?Sized + NixPath>( - - - #[inline] -+#[cfg(not(target_os = "fuchsia"))] - pub fn chroot<P: ?Sized + NixPath>(path: &P) -> Result<()> { - let res = path.with_nix_path(|cstr| { - unsafe { libc::chroot(cstr.as_ptr()) } -@@ -1199,7 +1252,7 @@ pub fn chroot<P: ?Sized + NixPath>(path: &P) -> Result<()> { - target_os = "netbsd", - target_os = "openbsd" - ))] --pub fn sync() -> () { -+pub fn sync() { - unsafe { libc::sync() }; - } - -@@ -1309,6 +1362,28 @@ pub fn setgid(gid: Gid) -> Result<()> { - Errno::result(res).map(drop) - } - -+/// Set the user identity used for filesystem checks per-thread. -+/// On both success and failure, this call returns the previous filesystem user -+/// ID of the caller. -+/// -+/// See also [setfsuid(2)](http://man7.org/linux/man-pages/man2/setfsuid.2.html) -+#[cfg(any(target_os = "linux", target_os = "android"))] -+pub fn setfsuid(uid: Uid) -> Uid { -+ let prev_fsuid = unsafe { libc::setfsuid(uid.into()) }; -+ Uid::from_raw(prev_fsuid as uid_t) -+} -+ -+/// Set the group identity used for filesystem checks per-thread. -+/// On both success and failure, this call returns the previous filesystem group -+/// ID of the caller. -+/// -+/// See also [setfsgid(2)](http://man7.org/linux/man-pages/man2/setfsgid.2.html) -+#[cfg(any(target_os = "linux", target_os = "android"))] -+pub fn setfsgid(gid: Gid) -> Gid { -+ let prev_fsgid = unsafe { libc::setfsgid(gid.into()) }; -+ Gid::from_raw(prev_fsgid as gid_t) -+} -+ - /// Get the list of supplementary group IDs of the calling process. - /// - /// [Further reading](http://pubs.opengroup.org/onlinepubs/009695399/functions/getgroups.html) -@@ -1318,33 +1393,39 @@ pub fn setgid(gid: Gid) -> Result<()> { - /// with the `opendirectoryd` service. - #[cfg(not(any(target_os = "ios", target_os = "macos")))] - pub fn getgroups() -> Result<Vec<Gid>> { -- // First get the number of groups so we can size our Vec -- let ret = unsafe { libc::getgroups(0, ptr::null_mut()) }; -+ // First get the maximum number of groups. The value returned -+ // shall always be greater than or equal to one and less than or -+ // equal to the value of {NGROUPS_MAX} + 1. -+ let ngroups_max = match sysconf(SysconfVar::NGROUPS_MAX) { -+ Ok(Some(n)) => (n + 1) as usize, -+ Ok(None) | Err(_) => <usize>::max_value(), -+ }; -+ -+ // Next, get the number of groups so we can size our Vec -+ let ngroups = unsafe { libc::getgroups(0, ptr::null_mut()) }; - - // Now actually get the groups. We try multiple times in case the number of - // groups has changed since the first call to getgroups() and the buffer is - // now too small. -- let mut groups = Vec::<Gid>::with_capacity(Errno::result(ret)? as usize); -+ let mut groups = Vec::<Gid>::with_capacity(Errno::result(ngroups)? as usize); - loop { - // FIXME: On the platforms we currently support, the `Gid` struct has - // the same representation in memory as a bare `gid_t`. This is not - // necessarily the case on all Rust platforms, though. See RFC 1785. -- let ret = unsafe { -+ let ngroups = unsafe { - libc::getgroups(groups.capacity() as c_int, groups.as_mut_ptr() as *mut gid_t) - }; - -- match Errno::result(ret) { -+ match Errno::result(ngroups) { - Ok(s) => { - unsafe { groups.set_len(s as usize) }; - return Ok(groups); - }, - Err(Error::Sys(Errno::EINVAL)) => { -- // EINVAL indicates that the buffer size was too small. Trigger -- // the internal buffer resizing logic of `Vec` by requiring -- // more space than the current capacity. -- let cap = groups.capacity(); -- unsafe { groups.set_len(cap) }; -- groups.reserve(1); -+ // EINVAL indicates that the buffer size was too -+ // small, resize it up to ngroups_max as limit. -+ reserve_double_buffer_size(&mut groups, ngroups_max) -+ .or(Err(Error::Sys(Errno::EINVAL)))?; - }, - Err(e) => return Err(e) - } -@@ -1380,11 +1461,9 @@ pub fn getgroups() -> Result<Vec<Gid>> { - /// # Ok(()) - /// # } - /// # --/// # fn main() { --/// # try_main().unwrap(); --/// # } -+/// # try_main().unwrap(); - /// ``` --#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+#[cfg(not(any(target_os = "ios", target_os = "macos", target_os = "redox")))] - pub fn setgroups(groups: &[Gid]) -> Result<()> { - cfg_if! { - if #[cfg(any(target_os = "dragonfly", -@@ -1428,15 +1507,14 @@ pub fn setgroups(groups: &[Gid]) -> Result<()> { - /// and `setgroups()`. Additionally, while some implementations will return a - /// partial list of groups when `NGROUPS_MAX` is exceeded, this implementation - /// will only ever return the complete list or else an error. --#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+#[cfg(not(any(target_os = "ios", target_os = "macos", target_os = "redox")))] - pub fn getgrouplist(user: &CStr, group: Gid) -> Result<Vec<Gid>> { - let ngroups_max = match sysconf(SysconfVar::NGROUPS_MAX) { - Ok(Some(n)) => n as c_int, - Ok(None) | Err(_) => <c_int>::max_value(), - }; - use std::cmp::min; -- let mut ngroups = min(ngroups_max, 8); -- let mut groups = Vec::<Gid>::with_capacity(ngroups as usize); -+ let mut groups = Vec::<Gid>::with_capacity(min(ngroups_max, 8) as usize); - cfg_if! { - if #[cfg(any(target_os = "ios", target_os = "macos"))] { - type getgrouplist_group_t = c_int; -@@ -1446,6 +1524,7 @@ pub fn getgrouplist(user: &CStr, group: Gid) -> Result<Vec<Gid>> { - } - let gid: gid_t = group.into(); - loop { -+ let mut ngroups = groups.capacity() as i32; - let ret = unsafe { - libc::getgrouplist(user.as_ptr(), - gid as getgrouplist_group_t, -@@ -1462,19 +1541,8 @@ pub fn getgrouplist(user: &CStr, group: Gid) -> Result<Vec<Gid>> { - // BSD systems will still fill the groups buffer with as many - // groups as possible, but Linux manpages do not mention this - // behavior. -- -- let cap = groups.capacity(); -- if cap >= ngroups_max as usize { -- // We already have the largest capacity we can, give up -- return Err(Error::invalid_argument()); -- } -- -- // Reserve space for at least ngroups -- groups.reserve(ngroups as usize); -- -- // Even if the buffer gets resized to bigger than ngroups_max, -- // don't ever ask for more than ngroups_max groups -- ngroups = min(ngroups_max, groups.capacity() as c_int); -+ reserve_double_buffer_size(&mut groups, ngroups_max as usize) -+ .or_else(|_| Err(Error::invalid_argument()))?; - } - } - } -@@ -1515,11 +1583,9 @@ pub fn getgrouplist(user: &CStr, group: Gid) -> Result<Vec<Gid>> { - /// # Ok(()) - /// # } - /// # --/// # fn main() { --/// # try_main().unwrap(); --/// # } -+/// # try_main().unwrap(); - /// ``` --#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+#[cfg(not(any(target_os = "ios", target_os = "macos", target_os = "redox")))] - pub fn initgroups(user: &CStr, group: Gid) -> Result<()> { - cfg_if! { - if #[cfg(any(target_os = "ios", target_os = "macos"))] { -@@ -1538,6 +1604,7 @@ pub fn initgroups(user: &CStr, group: Gid) -> Result<()> { - /// - /// See also [pause(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/pause.html). - #[inline] -+#[cfg(not(target_os = "redox"))] - pub fn pause() { - unsafe { libc::pause() }; - } -@@ -1568,7 +1635,8 @@ pub mod alarm { - //! - //! Scheduling an alarm and waiting for the signal: - //! -- //! ``` -+#![cfg_attr(target_os = "redox", doc = " ```rust,ignore")] -+#![cfg_attr(not(target_os = "redox"), doc = " ```rust")] - //! use std::time::{Duration, Instant}; - //! - //! use nix::unistd::{alarm, pause}; -@@ -1577,14 +1645,23 @@ pub mod alarm { - //! // We need to setup an empty signal handler to catch the alarm signal, - //! // otherwise the program will be terminated once the signal is delivered. - //! extern fn signal_handler(_: nix::libc::c_int) { } -- //! unsafe { sigaction(Signal::SIGALRM, &SigAction::new(SigHandler::Handler(signal_handler), SaFlags::empty(), SigSet::empty())); } -+ //! let sa = SigAction::new( -+ //! SigHandler::Handler(signal_handler), -+ //! SaFlags::empty(), -+ //! SigSet::empty() -+ //! ); -+ //! unsafe { -+ //! sigaction(Signal::SIGALRM, &sa); -+ //! } - //! - //! // Set an alarm for 1 second from now. - //! alarm::set(1); - //! - //! let start = Instant::now(); - //! // Pause the process until the alarm signal is received. -- //! pause(); -+ //! let mut sigset = SigSet::empty(); -+ //! sigset.add(Signal::SIGALRM); -+ //! sigset.wait(); - //! - //! assert!(start.elapsed() >= Duration::from_secs(1)); - //! ``` -@@ -1593,8 +1670,6 @@ pub mod alarm { - //! - //! See also [alarm(2)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/alarm.html). - -- use libc; -- - /// Schedule an alarm signal. - /// - /// This will cause the system to generate a `SIGALRM` signal for the -@@ -1630,10 +1705,10 @@ pub fn sleep(seconds: c_uint) -> c_uint { - unsafe { libc::sleep(seconds) } - } - -+#[cfg(not(target_os = "redox"))] - pub mod acct { -- use libc; -- use {Result, NixPath}; -- use errno::Errno; -+ use crate::{Result, NixPath}; -+ use crate::errno::Errno; - use std::ptr; - - /// Enable process accounting -@@ -1711,7 +1786,7 @@ pub fn mkstemp<P: ?Sized + NixPath>(template: &P) -> Result<(RawFd, PathBuf)> { - #[repr(i32)] - pub enum PathconfVar { - #[cfg(any(target_os = "dragonfly", target_os = "freebsd", target_os = "linux", -- target_os = "netbsd", target_os = "openbsd"))] -+ target_os = "netbsd", target_os = "openbsd", target_os = "redox"))] - /// Minimum number of bits needed to represent, as a signed integer value, - /// the maximum size of a regular file allowed in the specified directory. - FILESIZEBITS = libc::_PC_FILESIZEBITS, -@@ -1735,11 +1810,11 @@ pub enum PathconfVar { - /// a pipe. - PIPE_BUF = libc::_PC_PIPE_BUF, - #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "linux", -- target_os = "netbsd", target_os = "openbsd"))] -+ target_os = "netbsd", target_os = "openbsd", target_os = "redox"))] - /// Symbolic links can be created. - POSIX2_SYMLINKS = libc::_PC_2_SYMLINKS, - #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -- target_os = "linux", target_os = "openbsd"))] -+ target_os = "linux", target_os = "openbsd", target_os = "redox"))] - /// Minimum number of bytes of storage actually allocated for any portion of - /// a file. - POSIX_ALLOC_SIZE_MIN = libc::_PC_ALLOC_SIZE_MIN, -@@ -1749,19 +1824,20 @@ pub enum PathconfVar { - /// `POSIX_REC_MIN_XFER_SIZE` and `POSIX_REC_MAX_XFER_SIZE` values. - POSIX_REC_INCR_XFER_SIZE = libc::_PC_REC_INCR_XFER_SIZE, - #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -- target_os = "linux", target_os = "openbsd"))] -+ target_os = "linux", target_os = "openbsd", target_os = "redox"))] - /// Maximum recommended file transfer size. - POSIX_REC_MAX_XFER_SIZE = libc::_PC_REC_MAX_XFER_SIZE, - #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -- target_os = "linux", target_os = "openbsd"))] -+ target_os = "linux", target_os = "openbsd", target_os = "redox"))] - /// Minimum recommended file transfer size. - POSIX_REC_MIN_XFER_SIZE = libc::_PC_REC_MIN_XFER_SIZE, - #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -- target_os = "linux", target_os = "openbsd"))] -+ target_os = "linux", target_os = "openbsd", target_os = "redox"))] - /// Recommended file transfer buffer alignment. - POSIX_REC_XFER_ALIGN = libc::_PC_REC_XFER_ALIGN, - #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -- target_os = "linux", target_os = "netbsd", target_os = "openbsd"))] -+ target_os = "linux", target_os = "netbsd", target_os = "openbsd", -+ target_os = "redox"))] - /// Maximum number of bytes in a symbolic link. - SYMLINK_MAX = libc::_PC_SYMLINK_MAX, - /// The use of `chown` and `fchown` is restricted to a process with -@@ -1775,17 +1851,18 @@ pub enum PathconfVar { - /// disable terminal special character handling. - _POSIX_VDISABLE = libc::_PC_VDISABLE, - #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -- target_os = "linux", target_os = "openbsd"))] -+ target_os = "linux", target_os = "openbsd", target_os = "redox"))] - /// Asynchronous input or output operations may be performed for the - /// associated file. - _POSIX_ASYNC_IO = libc::_PC_ASYNC_IO, - #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -- target_os = "linux", target_os = "openbsd"))] -+ target_os = "linux", target_os = "openbsd", target_os = "redox"))] - /// Prioritized input or output operations may be performed for the - /// associated file. - _POSIX_PRIO_IO = libc::_PC_PRIO_IO, - #[cfg(any(target_os = "android", target_os = "dragonfly", target_os = "freebsd", -- target_os = "linux", target_os = "netbsd", target_os = "openbsd"))] -+ target_os = "linux", target_os = "netbsd", target_os = "openbsd", -+ target_os = "redox"))] - /// Synchronized input or output operations may be performed for the - /// associated file. - _POSIX_SYNC_IO = libc::_PC_SYNC_IO, -@@ -1886,9 +1963,11 @@ pub fn pathconf<P: ?Sized + NixPath>(path: &P, var: PathconfVar) -> Result<Optio - pub enum SysconfVar { - /// Maximum number of I/O operations in a single list I/O call supported by - /// the implementation. -+ #[cfg(not(target_os = "redox"))] - AIO_LISTIO_MAX = libc::_SC_AIO_LISTIO_MAX, - /// Maximum number of outstanding asynchronous I/O operations supported by - /// the implementation. -+ #[cfg(not(target_os = "redox"))] - AIO_MAX = libc::_SC_AIO_MAX, - #[cfg(any(target_os="android", target_os="dragonfly", target_os="freebsd", - target_os = "ios", target_os="linux", target_os = "macos", -@@ -1899,25 +1978,34 @@ pub enum SysconfVar { - /// Maximum length of argument to the exec functions including environment data. - ARG_MAX = libc::_SC_ARG_MAX, - /// Maximum number of functions that may be registered with `atexit`. -+ #[cfg(not(target_os = "redox"))] - ATEXIT_MAX = libc::_SC_ATEXIT_MAX, - /// Maximum obase values allowed by the bc utility. -+ #[cfg(not(target_os = "redox"))] - BC_BASE_MAX = libc::_SC_BC_BASE_MAX, - /// Maximum number of elements permitted in an array by the bc utility. -+ #[cfg(not(target_os = "redox"))] - BC_DIM_MAX = libc::_SC_BC_DIM_MAX, - /// Maximum scale value allowed by the bc utility. -+ #[cfg(not(target_os = "redox"))] - BC_SCALE_MAX = libc::_SC_BC_SCALE_MAX, - /// Maximum length of a string constant accepted by the bc utility. -+ #[cfg(not(target_os = "redox"))] - BC_STRING_MAX = libc::_SC_BC_STRING_MAX, - /// Maximum number of simultaneous processes per real user ID. - CHILD_MAX = libc::_SC_CHILD_MAX, -- // _SC_CLK_TCK is obsolete -+ // The number of clock ticks per second. -+ CLK_TCK = libc::_SC_CLK_TCK, - /// Maximum number of weights that can be assigned to an entry of the - /// LC_COLLATE order keyword in the locale definition file -+ #[cfg(not(target_os = "redox"))] - COLL_WEIGHTS_MAX = libc::_SC_COLL_WEIGHTS_MAX, - /// Maximum number of timer expiration overruns. -+ #[cfg(not(target_os = "redox"))] - DELAYTIMER_MAX = libc::_SC_DELAYTIMER_MAX, - /// Maximum number of expressions that can be nested within parentheses by - /// the expr utility. -+ #[cfg(not(target_os = "redox"))] - EXPR_NEST_MAX = libc::_SC_EXPR_NEST_MAX, - #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", - target_os="linux", target_os = "macos", target_os="netbsd", -@@ -1927,23 +2015,29 @@ pub enum SysconfVar { - HOST_NAME_MAX = libc::_SC_HOST_NAME_MAX, - /// Maximum number of iovec structures that one process has available for - /// use with `readv` or `writev`. -+ #[cfg(not(target_os = "redox"))] - IOV_MAX = libc::_SC_IOV_MAX, - /// Unless otherwise noted, the maximum length, in bytes, of a utility's - /// input line (either standard input or another file), when the utility is - /// described as processing text files. The length includes room for the - /// trailing <newline>. -+ #[cfg(not(target_os = "redox"))] - LINE_MAX = libc::_SC_LINE_MAX, - /// Maximum length of a login name. - LOGIN_NAME_MAX = libc::_SC_LOGIN_NAME_MAX, - /// Maximum number of simultaneous supplementary group IDs per process. - NGROUPS_MAX = libc::_SC_NGROUPS_MAX, - /// Initial size of `getgrgid_r` and `getgrnam_r` data buffers -+ #[cfg(not(target_os = "redox"))] - GETGR_R_SIZE_MAX = libc::_SC_GETGR_R_SIZE_MAX, - /// Initial size of `getpwuid_r` and `getpwnam_r` data buffers -+ #[cfg(not(target_os = "redox"))] - GETPW_R_SIZE_MAX = libc::_SC_GETPW_R_SIZE_MAX, - /// The maximum number of open message queue descriptors a process may hold. -+ #[cfg(not(target_os = "redox"))] - MQ_OPEN_MAX = libc::_SC_MQ_OPEN_MAX, - /// The maximum number of message priorities supported by the implementation. -+ #[cfg(not(target_os = "redox"))] - MQ_PRIO_MAX = libc::_SC_MQ_PRIO_MAX, - /// A value one greater than the maximum value that the system may assign to - /// a newly-created file descriptor. -@@ -1958,6 +2052,7 @@ pub enum SysconfVar { - /// The implementation supports barriers. - _POSIX_BARRIERS = libc::_SC_BARRIERS, - /// The implementation supports asynchronous input and output. -+ #[cfg(not(target_os = "redox"))] - _POSIX_ASYNCHRONOUS_IO = libc::_SC_ASYNCHRONOUS_IO, - #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", - target_os="linux", target_os = "macos", target_os="netbsd", -@@ -1970,24 +2065,32 @@ pub enum SysconfVar { - /// The implementation supports the Process CPU-Time Clocks option. - _POSIX_CPUTIME = libc::_SC_CPUTIME, - /// The implementation supports the File Synchronization option. -+ #[cfg(not(target_os = "redox"))] - _POSIX_FSYNC = libc::_SC_FSYNC, - #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", - target_os="linux", target_os = "macos", target_os="openbsd"))] - /// The implementation supports the IPv6 option. - _POSIX_IPV6 = libc::_SC_IPV6, - /// The implementation supports job control. -+ #[cfg(not(target_os = "redox"))] - _POSIX_JOB_CONTROL = libc::_SC_JOB_CONTROL, - /// The implementation supports memory mapped Files. -+ #[cfg(not(target_os = "redox"))] - _POSIX_MAPPED_FILES = libc::_SC_MAPPED_FILES, - /// The implementation supports the Process Memory Locking option. -+ #[cfg(not(target_os = "redox"))] - _POSIX_MEMLOCK = libc::_SC_MEMLOCK, - /// The implementation supports the Range Memory Locking option. -+ #[cfg(not(target_os = "redox"))] - _POSIX_MEMLOCK_RANGE = libc::_SC_MEMLOCK_RANGE, - /// The implementation supports memory protection. -+ #[cfg(not(target_os = "redox"))] - _POSIX_MEMORY_PROTECTION = libc::_SC_MEMORY_PROTECTION, - /// The implementation supports the Message Passing option. -+ #[cfg(not(target_os = "redox"))] - _POSIX_MESSAGE_PASSING = libc::_SC_MESSAGE_PASSING, - /// The implementation supports the Monotonic Clock option. -+ #[cfg(not(target_os = "redox"))] - _POSIX_MONOTONIC_CLOCK = libc::_SC_MONOTONIC_CLOCK, - #[cfg(any(target_os="android", target_os="dragonfly", target_os="freebsd", - target_os = "ios", target_os="linux", target_os = "macos", -@@ -1995,6 +2098,7 @@ pub enum SysconfVar { - /// The implementation supports the Prioritized Input and Output option. - _POSIX_PRIORITIZED_IO = libc::_SC_PRIORITIZED_IO, - /// The implementation supports the Process Scheduling option. -+ #[cfg(not(target_os = "redox"))] - _POSIX_PRIORITY_SCHEDULING = libc::_SC_PRIORITY_SCHEDULING, - #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", - target_os="linux", target_os = "macos", target_os="openbsd"))] -@@ -2016,10 +2120,13 @@ pub enum SysconfVar { - /// The implementation supports the Regular Expression Handling option. - _POSIX_REGEXP = libc::_SC_REGEXP, - /// Each process has a saved set-user-ID and a saved set-group-ID. -+ #[cfg(not(target_os = "redox"))] - _POSIX_SAVED_IDS = libc::_SC_SAVED_IDS, - /// The implementation supports semaphores. -+ #[cfg(not(target_os = "redox"))] - _POSIX_SEMAPHORES = libc::_SC_SEMAPHORES, - /// The implementation supports the Shared Memory Objects option. -+ #[cfg(not(target_os = "redox"))] - _POSIX_SHARED_MEMORY_OBJECTS = libc::_SC_SHARED_MEMORY_OBJECTS, - #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", - target_os="linux", target_os = "macos", target_os="netbsd", -@@ -2044,10 +2151,13 @@ pub enum SysconfVar { - target_os="openbsd"))] - _POSIX_SS_REPL_MAX = libc::_SC_SS_REPL_MAX, - /// The implementation supports the Synchronized Input and Output option. -+ #[cfg(not(target_os = "redox"))] - _POSIX_SYNCHRONIZED_IO = libc::_SC_SYNCHRONIZED_IO, - /// The implementation supports the Thread Stack Address Attribute option. -+ #[cfg(not(target_os = "redox"))] - _POSIX_THREAD_ATTR_STACKADDR = libc::_SC_THREAD_ATTR_STACKADDR, - /// The implementation supports the Thread Stack Size Attribute option. -+ #[cfg(not(target_os = "redox"))] - _POSIX_THREAD_ATTR_STACKSIZE = libc::_SC_THREAD_ATTR_STACKSIZE, - #[cfg(any(target_os = "ios", target_os="linux", target_os = "macos", - target_os="netbsd", target_os="openbsd"))] -@@ -2055,10 +2165,13 @@ pub enum SysconfVar { - _POSIX_THREAD_CPUTIME = libc::_SC_THREAD_CPUTIME, - /// The implementation supports the Non-Robust Mutex Priority Inheritance - /// option. -+ #[cfg(not(target_os = "redox"))] - _POSIX_THREAD_PRIO_INHERIT = libc::_SC_THREAD_PRIO_INHERIT, - /// The implementation supports the Non-Robust Mutex Priority Protection option. -+ #[cfg(not(target_os = "redox"))] - _POSIX_THREAD_PRIO_PROTECT = libc::_SC_THREAD_PRIO_PROTECT, - /// The implementation supports the Thread Execution Scheduling option. -+ #[cfg(not(target_os = "redox"))] - _POSIX_THREAD_PRIORITY_SCHEDULING = libc::_SC_THREAD_PRIORITY_SCHEDULING, - #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", - target_os="linux", target_os = "macos", target_os="netbsd", -@@ -2073,18 +2186,21 @@ pub enum SysconfVar { - /// The implementation supports the Robust Mutex Priority Protection option. - _POSIX_THREAD_ROBUST_PRIO_PROTECT = libc::_SC_THREAD_ROBUST_PRIO_PROTECT, - /// The implementation supports thread-safe functions. -+ #[cfg(not(target_os = "redox"))] - _POSIX_THREAD_SAFE_FUNCTIONS = libc::_SC_THREAD_SAFE_FUNCTIONS, - #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", - target_os="linux", target_os = "macos", target_os="openbsd"))] - /// The implementation supports the Thread Sporadic Server option. - _POSIX_THREAD_SPORADIC_SERVER = libc::_SC_THREAD_SPORADIC_SERVER, - /// The implementation supports threads. -+ #[cfg(not(target_os = "redox"))] - _POSIX_THREADS = libc::_SC_THREADS, - #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", - target_os="linux", target_os = "macos", target_os="openbsd"))] - /// The implementation supports timeouts. - _POSIX_TIMEOUTS = libc::_SC_TIMEOUTS, - /// The implementation supports timers. -+ #[cfg(not(target_os = "redox"))] - _POSIX_TIMERS = libc::_SC_TIMERS, - #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", - target_os="linux", target_os = "macos", target_os="openbsd"))] -@@ -2149,17 +2265,23 @@ pub enum SysconfVar { - /// using at least 64 bits. - _POSIX_V6_LPBIG_OFFBIG = libc::_SC_V6_LPBIG_OFFBIG, - /// The implementation supports the C-Language Binding option. -+ #[cfg(not(target_os = "redox"))] - _POSIX2_C_BIND = libc::_SC_2_C_BIND, - /// The implementation supports the C-Language Development Utilities option. -+ #[cfg(not(target_os = "redox"))] - _POSIX2_C_DEV = libc::_SC_2_C_DEV, - /// The implementation supports the Terminal Characteristics option. -+ #[cfg(not(target_os = "redox"))] - _POSIX2_CHAR_TERM = libc::_SC_2_CHAR_TERM, - /// The implementation supports the FORTRAN Development Utilities option. -+ #[cfg(not(target_os = "redox"))] - _POSIX2_FORT_DEV = libc::_SC_2_FORT_DEV, - /// The implementation supports the FORTRAN Runtime Utilities option. -+ #[cfg(not(target_os = "redox"))] - _POSIX2_FORT_RUN = libc::_SC_2_FORT_RUN, - /// The implementation supports the creation of locales by the localedef - /// utility. -+ #[cfg(not(target_os = "redox"))] - _POSIX2_LOCALEDEF = libc::_SC_2_LOCALEDEF, - #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", - target_os="linux", target_os = "macos", target_os="netbsd", -@@ -2193,26 +2315,34 @@ pub enum SysconfVar { - /// The implementation supports the Track Batch Job Request option. - _POSIX2_PBS_TRACK = libc::_SC_2_PBS_TRACK, - /// The implementation supports the Software Development Utilities option. -+ #[cfg(not(target_os = "redox"))] - _POSIX2_SW_DEV = libc::_SC_2_SW_DEV, - /// The implementation supports the User Portability Utilities option. -+ #[cfg(not(target_os = "redox"))] - _POSIX2_UPE = libc::_SC_2_UPE, - /// Integer value indicating version of the Shell and Utilities volume of - /// POSIX.1 to which the implementation conforms. -+ #[cfg(not(target_os = "redox"))] - _POSIX2_VERSION = libc::_SC_2_VERSION, - /// The size of a system page in bytes. - /// - /// POSIX also defines an alias named `PAGESIZE`, but Rust does not allow two - /// enum constants to have the same value, so nix omits `PAGESIZE`. - PAGE_SIZE = libc::_SC_PAGE_SIZE, -+ #[cfg(not(target_os = "redox"))] - PTHREAD_DESTRUCTOR_ITERATIONS = libc::_SC_THREAD_DESTRUCTOR_ITERATIONS, -+ #[cfg(not(target_os = "redox"))] - PTHREAD_KEYS_MAX = libc::_SC_THREAD_KEYS_MAX, -+ #[cfg(not(target_os = "redox"))] - PTHREAD_STACK_MIN = libc::_SC_THREAD_STACK_MIN, -+ #[cfg(not(target_os = "redox"))] - PTHREAD_THREADS_MAX = libc::_SC_THREAD_THREADS_MAX, - RE_DUP_MAX = libc::_SC_RE_DUP_MAX, - #[cfg(any(target_os="android", target_os="dragonfly", target_os="freebsd", - target_os = "ios", target_os="linux", target_os = "macos", - target_os="openbsd"))] - RTSIG_MAX = libc::_SC_RTSIG_MAX, -+ #[cfg(not(target_os = "redox"))] - SEM_NSEMS_MAX = libc::_SC_SEM_NSEMS_MAX, - #[cfg(any(target_os="android", target_os="dragonfly", target_os="freebsd", - target_os = "ios", target_os="linux", target_os = "macos", -@@ -2227,6 +2357,7 @@ pub enum SysconfVar { - target_os="linux", target_os = "macos", target_os="netbsd", - target_os="openbsd"))] - SYMLOOP_MAX = libc::_SC_SYMLOOP_MAX, -+ #[cfg(not(target_os = "redox"))] - TIMER_MAX = libc::_SC_TIMER_MAX, - TTY_NAME_MAX = libc::_SC_TTY_NAME_MAX, - TZNAME_MAX = libc::_SC_TZNAME_MAX, -@@ -2257,6 +2388,7 @@ pub enum SysconfVar { - _XOPEN_REALTIME_THREADS = libc::_SC_XOPEN_REALTIME_THREADS, - /// The implementation supports the Issue 4, Version 2 Shared Memory Option - /// Group. -+ #[cfg(not(target_os = "redox"))] - _XOPEN_SHM = libc::_SC_XOPEN_SHM, - #[cfg(any(target_os="dragonfly", target_os="freebsd", target_os = "ios", - target_os="linux", target_os = "macos", target_os="openbsd"))] -@@ -2309,9 +2441,8 @@ pub fn sysconf(var: SysconfVar) -> Result<Option<c_long>> { - - #[cfg(any(target_os = "android", target_os = "linux"))] - mod pivot_root { -- use libc; -- use {Result, NixPath}; -- use errno::Errno; -+ use crate::{Result, NixPath}; -+ use crate::errno::Errno; - - pub fn pivot_root<P1: ?Sized + NixPath, P2: ?Sized + NixPath>( - new_root: &P1, put_old: &P2) -> Result<()> { -@@ -2330,9 +2461,8 @@ mod pivot_root { - #[cfg(any(target_os = "android", target_os = "freebsd", - target_os = "linux", target_os = "openbsd"))] - mod setres { -- use libc; -- use Result; -- use errno::Errno; -+ use crate::Result; -+ use crate::errno::Errno; - use super::{Uid, Gid}; - - /// Sets the real, effective, and saved uid. -@@ -2392,3 +2522,308 @@ pub fn access<P: ?Sized + NixPath>(path: &P, amode: AccessFlags) -> Result<()> { - })?; - Errno::result(res).map(drop) - } -+ -+/// Representation of a User, based on `libc::passwd` -+/// -+/// The reason some fields in this struct are `String` and others are `CString` is because some -+/// fields are based on the user's locale, which could be non-UTF8, while other fields are -+/// guaranteed to conform to [`NAME_REGEX`](https://serverfault.com/a/73101/407341), which only -+/// contains ASCII. -+#[cfg(not(target_os = "redox"))] // RedoxFS does not support passwd -+#[derive(Debug, Clone, PartialEq)] -+pub struct User { -+ /// Username -+ pub name: String, -+ /// User password (probably encrypted) -+ pub passwd: CString, -+ /// User ID -+ pub uid: Uid, -+ /// Group ID -+ pub gid: Gid, -+ /// User information -+ #[cfg(not(target_os = "android"))] -+ pub gecos: CString, -+ /// Home directory -+ pub dir: PathBuf, -+ /// Path to shell -+ pub shell: PathBuf, -+ /// Login class -+ #[cfg(not(any(target_os = "android", target_os = "fuchsia", -+ target_os = "linux")))] -+ pub class: CString, -+ /// Last password change -+ #[cfg(not(any(target_os = "android", target_os = "fuchsia", -+ target_os = "linux")))] -+ pub change: libc::time_t, -+ /// Expiration time of account -+ #[cfg(not(any(target_os = "android", target_os = "fuchsia", -+ target_os = "linux")))] -+ pub expire: libc::time_t -+} -+ -+#[cfg(not(target_os = "redox"))] // RedoxFS does not support passwd -+impl From<&libc::passwd> for User { -+ fn from(pw: &libc::passwd) -> User { -+ unsafe { -+ User { -+ name: CStr::from_ptr((*pw).pw_name).to_string_lossy().into_owned(), -+ passwd: CString::new(CStr::from_ptr((*pw).pw_passwd).to_bytes()).unwrap(), -+ #[cfg(not(target_os = "android"))] -+ gecos: CString::new(CStr::from_ptr((*pw).pw_gecos).to_bytes()).unwrap(), -+ dir: PathBuf::from(OsStr::from_bytes(CStr::from_ptr((*pw).pw_dir).to_bytes())), -+ shell: PathBuf::from(OsStr::from_bytes(CStr::from_ptr((*pw).pw_shell).to_bytes())), -+ uid: Uid::from_raw((*pw).pw_uid), -+ gid: Gid::from_raw((*pw).pw_gid), -+ #[cfg(not(any(target_os = "android", target_os = "fuchsia", -+ target_os = "linux")))] -+ class: CString::new(CStr::from_ptr((*pw).pw_class).to_bytes()).unwrap(), -+ #[cfg(not(any(target_os = "android", target_os = "fuchsia", -+ target_os = "linux")))] -+ change: (*pw).pw_change, -+ #[cfg(not(any(target_os = "android", target_os = "fuchsia", -+ target_os = "linux")))] -+ expire: (*pw).pw_expire -+ } -+ } -+ } -+} -+ -+#[cfg(not(target_os = "redox"))] // RedoxFS does not support passwd -+impl User { -+ fn from_anything<F>(f: F) -> Result<Option<Self>> -+ where -+ F: Fn(*mut libc::passwd, -+ *mut libc::c_char, -+ libc::size_t, -+ *mut *mut libc::passwd) -> libc::c_int -+ { -+ let buflimit = 16384; -+ let bufsize = match sysconf(SysconfVar::GETPW_R_SIZE_MAX) { -+ Ok(Some(n)) => n as usize, -+ Ok(None) | Err(_) => buflimit as usize, -+ }; -+ -+ let mut cbuf = Vec::with_capacity(bufsize); -+ let mut pwd = mem::MaybeUninit::<libc::passwd>::uninit(); -+ let mut res = ptr::null_mut(); -+ -+ loop { -+ let error = f(pwd.as_mut_ptr(), cbuf.as_mut_ptr(), cbuf.capacity(), &mut res); -+ if error == 0 { -+ if res.is_null() { -+ return Ok(None); -+ } else { -+ let pwd = unsafe { pwd.assume_init() }; -+ return Ok(Some(User::from(&pwd))); -+ } -+ } else if Errno::last() == Errno::ERANGE { -+ // Trigger the internal buffer resizing logic. -+ reserve_double_buffer_size(&mut cbuf, buflimit)?; -+ } else { -+ return Err(Error::Sys(Errno::last())); -+ } -+ } -+ } -+ -+ /// Get a user by UID. -+ /// -+ /// Internally, this function calls -+ /// [getpwuid_r(3)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getpwuid_r.html) -+ /// -+ /// # Examples -+ /// -+ /// ``` -+ /// use nix::unistd::{Uid, User}; -+ /// // Returns an Result<Option<User>>, thus the double unwrap. -+ /// let res = User::from_uid(Uid::from_raw(0)).unwrap().unwrap(); -+ /// assert!(res.name == "root"); -+ /// ``` -+ pub fn from_uid(uid: Uid) -> Result<Option<Self>> { -+ User::from_anything(|pwd, cbuf, cap, res| { -+ unsafe { libc::getpwuid_r(uid.0, pwd, cbuf, cap, res) } -+ }) -+ } -+ -+ /// Get a user by name. -+ /// -+ /// Internally, this function calls -+ /// [getpwnam_r(3)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getpwuid_r.html) -+ /// -+ /// # Examples -+ /// -+ /// ``` -+ /// use nix::unistd::User; -+ /// // Returns an Result<Option<User>>, thus the double unwrap. -+ /// let res = User::from_name("root").unwrap().unwrap(); -+ /// assert!(res.name == "root"); -+ /// ``` -+ pub fn from_name(name: &str) -> Result<Option<Self>> { -+ let name = CString::new(name).unwrap(); -+ User::from_anything(|pwd, cbuf, cap, res| { -+ unsafe { libc::getpwnam_r(name.as_ptr(), pwd, cbuf, cap, res) } -+ }) -+ } -+} -+ -+/// Representation of a Group, based on `libc::group` -+#[cfg(not(target_os = "redox"))] // RedoxFS does not support passwd -+#[derive(Debug, Clone, PartialEq)] -+pub struct Group { -+ /// Group name -+ pub name: String, -+ /// Group password -+ pub passwd: CString, -+ /// Group ID -+ pub gid: Gid, -+ /// List of Group members -+ pub mem: Vec<String> -+} -+ -+#[cfg(not(target_os = "redox"))] // RedoxFS does not support passwd -+impl From<&libc::group> for Group { -+ fn from(gr: &libc::group) -> Group { -+ unsafe { -+ Group { -+ name: CStr::from_ptr((*gr).gr_name).to_string_lossy().into_owned(), -+ passwd: CString::new(CStr::from_ptr((*gr).gr_passwd).to_bytes()).unwrap(), -+ gid: Gid::from_raw((*gr).gr_gid), -+ mem: Group::members((*gr).gr_mem) -+ } -+ } -+ } -+} -+ -+#[cfg(not(target_os = "redox"))] // RedoxFS does not support passwd -+impl Group { -+ unsafe fn members(mem: *mut *mut c_char) -> Vec<String> { -+ let mut ret = Vec::new(); -+ -+ for i in 0.. { -+ let u = mem.offset(i); -+ if (*u).is_null() { -+ break; -+ } else { -+ let s = CStr::from_ptr(*u).to_string_lossy().into_owned(); -+ ret.push(s); -+ } -+ } -+ -+ ret -+ } -+ -+ fn from_anything<F>(f: F) -> Result<Option<Self>> -+ where -+ F: Fn(*mut libc::group, -+ *mut libc::c_char, -+ libc::size_t, -+ *mut *mut libc::group) -> libc::c_int -+ { -+ let buflimit = 16384; -+ let bufsize = match sysconf(SysconfVar::GETGR_R_SIZE_MAX) { -+ Ok(Some(n)) => n as usize, -+ Ok(None) | Err(_) => buflimit as usize, -+ }; -+ -+ let mut cbuf = Vec::with_capacity(bufsize); -+ let mut grp = mem::MaybeUninit::<libc::group>::uninit(); -+ let mut res = ptr::null_mut(); -+ -+ loop { -+ let error = f(grp.as_mut_ptr(), cbuf.as_mut_ptr(), cbuf.capacity(), &mut res); -+ if error == 0 { -+ if res.is_null() { -+ return Ok(None); -+ } else { -+ let grp = unsafe { grp.assume_init() }; -+ return Ok(Some(Group::from(&grp))); -+ } -+ } else if Errno::last() == Errno::ERANGE { -+ // Trigger the internal buffer resizing logic. -+ reserve_double_buffer_size(&mut cbuf, buflimit)?; -+ } else { -+ return Err(Error::Sys(Errno::last())); -+ } -+ } -+ } -+ -+ /// Get a group by GID. -+ /// -+ /// Internally, this function calls -+ /// [getgrgid_r(3)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getpwuid_r.html) -+ /// -+ /// # Examples -+ /// -+ // Disable this test on all OS except Linux as root group may not exist. -+ #[cfg_attr(not(target_os = "linux"), doc = " ```no_run")] -+ #[cfg_attr(target_os = "linux", doc = " ```")] -+ /// use nix::unistd::{Gid, Group}; -+ /// // Returns an Result<Option<Group>>, thus the double unwrap. -+ /// let res = Group::from_gid(Gid::from_raw(0)).unwrap().unwrap(); -+ /// assert!(res.name == "root"); -+ /// ``` -+ pub fn from_gid(gid: Gid) -> Result<Option<Self>> { -+ Group::from_anything(|grp, cbuf, cap, res| { -+ unsafe { libc::getgrgid_r(gid.0, grp, cbuf, cap, res) } -+ }) -+ } -+ -+ /// Get a group by name. -+ /// -+ /// Internally, this function calls -+ /// [getgrnam_r(3)](http://pubs.opengroup.org/onlinepubs/9699919799/functions/getpwuid_r.html) -+ /// -+ /// # Examples -+ /// -+ // Disable this test on all OS except Linux as root group may not exist. -+ #[cfg_attr(not(target_os = "linux"), doc = " ```no_run")] -+ #[cfg_attr(target_os = "linux", doc = " ```")] -+ /// use nix::unistd::Group; -+ /// // Returns an Result<Option<Group>>, thus the double unwrap. -+ /// let res = Group::from_name("root").unwrap().unwrap(); -+ /// assert!(res.name == "root"); -+ /// ``` -+ pub fn from_name(name: &str) -> Result<Option<Self>> { -+ let name = CString::new(name).unwrap(); -+ Group::from_anything(|grp, cbuf, cap, res| { -+ unsafe { libc::getgrnam_r(name.as_ptr(), grp, cbuf, cap, res) } -+ }) -+ } -+} -+ -+/// Get the name of the terminal device that is open on file descriptor fd -+/// (see [`ttyname(3)`](http://man7.org/linux/man-pages/man3/ttyname.3.html)). -+#[cfg(not(target_os = "fuchsia"))] -+pub fn ttyname(fd: RawFd) -> Result<PathBuf> { -+ const PATH_MAX: usize = libc::PATH_MAX as usize; -+ let mut buf = vec![0_u8; PATH_MAX]; -+ let c_buf = buf.as_mut_ptr() as *mut libc::c_char; -+ -+ let ret = unsafe { libc::ttyname_r(fd, c_buf, buf.len()) }; -+ if ret != 0 { -+ return Err(Error::Sys(Errno::from_i32(ret))); -+ } -+ -+ let nul = buf.iter().position(|c| *c == b'\0').unwrap(); -+ buf.truncate(nul); -+ Ok(OsString::from_vec(buf).into()) -+} -+ -+/// Get the effective user ID and group ID associated with a Unix domain socket. -+/// -+/// See also [getpeereid(3)](https://www.freebsd.org/cgi/man.cgi?query=getpeereid) -+#[cfg(any( -+ target_os = "macos", -+ target_os = "ios", -+ target_os = "freebsd", -+ target_os = "openbsd", -+ target_os = "netbsd", -+ target_os = "dragonfly", -+))] -+pub fn getpeereid(fd: RawFd) -> Result<(Uid, Gid)> { -+ let mut uid = 1; -+ let mut gid = 1; -+ -+ let ret = unsafe { libc::getpeereid(fd, &mut uid, &mut gid) }; -+ -+ Errno::result(ret).map(|_| (Uid(uid), Gid(gid))) -+} -diff --git a/third_party/rust/nix/test/common/mod.rs b/third_party/rust/nix/test/common/mod.rs -new file mode 100644 -index 0000000000000..a871b47041d3e ---- /dev/null -+++ b/third_party/rust/nix/test/common/mod.rs -@@ -0,0 +1,127 @@ -+use cfg_if::cfg_if; -+ -+#[macro_export] macro_rules! skip { -+ ($($reason: expr),+) => { -+ use ::std::io::{self, Write}; -+ -+ let stderr = io::stderr(); -+ let mut handle = stderr.lock(); -+ writeln!(handle, $($reason),+).unwrap(); -+ return; -+ } -+} -+ -+cfg_if! { -+ if #[cfg(any(target_os = "android", target_os = "linux"))] { -+ #[macro_export] macro_rules! require_capability { -+ ($capname:ident) => { -+ use ::caps::{Capability, CapSet, has_cap}; -+ -+ if !has_cap(None, CapSet::Effective, Capability::$capname) -+ .unwrap() -+ { -+ skip!("Insufficient capabilities. Skipping test."); -+ } -+ } -+ } -+ } else if #[cfg(not(target_os = "redox"))] { -+ #[macro_export] macro_rules! require_capability { -+ ($capname:ident) => {} -+ } -+ } -+} -+ -+#[cfg(any(target_os = "linux", target_os= "android"))] -+#[macro_export] macro_rules! skip_if_cirrus { -+ ($reason:expr) => { -+ if std::env::var_os("CIRRUS_CI").is_some() { -+ skip!("{}", $reason); -+ } -+ } -+} -+ -+#[cfg(target_os = "freebsd")] -+#[macro_export] macro_rules! skip_if_jailed { -+ ($name:expr) => { -+ use ::sysctl::CtlValue; -+ -+ if let CtlValue::Int(1) = ::sysctl::value("security.jail.jailed") -+ .unwrap() -+ { -+ skip!("{} cannot run in a jail. Skipping test.", $name); -+ } -+ } -+} -+ -+#[cfg(not(any(target_os = "redox", target_os = "fuchsia")))] -+#[macro_export] macro_rules! skip_if_not_root { -+ ($name:expr) => { -+ use nix::unistd::Uid; -+ -+ if !Uid::current().is_root() { -+ skip!("{} requires root privileges. Skipping test.", $name); -+ } -+ }; -+} -+ -+cfg_if! { -+ if #[cfg(any(target_os = "android", target_os = "linux"))] { -+ #[macro_export] macro_rules! skip_if_seccomp { -+ ($name:expr) => { -+ if let Ok(s) = std::fs::read_to_string("/proc/self/status") { -+ for l in s.lines() { -+ let mut fields = l.split_whitespace(); -+ if fields.next() == Some("Seccomp:") && -+ fields.next() != Some("0") -+ { -+ skip!("{} cannot be run in Seccomp mode. Skipping test.", -+ stringify!($name)); -+ } -+ } -+ } -+ } -+ } -+ } else if #[cfg(not(target_os = "redox"))] { -+ #[macro_export] macro_rules! skip_if_seccomp { -+ ($name:expr) => {} -+ } -+ } -+} -+ -+cfg_if! { -+ if #[cfg(target_os = "linux")] { -+ #[macro_export] macro_rules! require_kernel_version { -+ ($name:expr, $version_requirement:expr) => { -+ use semver::{Version, VersionReq}; -+ -+ let version_requirement = VersionReq::parse($version_requirement) -+ .expect("Bad match_version provided"); -+ -+ let uname = nix::sys::utsname::uname(); -+ println!("{}", uname.sysname()); -+ println!("{}", uname.nodename()); -+ println!("{}", uname.release()); -+ println!("{}", uname.version()); -+ println!("{}", uname.machine()); -+ -+ // Fix stuff that the semver parser can't handle -+ let fixed_release = &uname.release().to_string() -+ // Fedora 33 reports version as 4.18.el8_2.x86_64 or -+ // 5.18.200-fc33.x86_64. Remove the underscore. -+ .replace("_", "-") -+ // Cirrus-CI reports version as 4.19.112+ . Remove the + -+ .replace("+", ""); -+ let mut version = Version::parse(fixed_release).unwrap(); -+ -+ //Keep only numeric parts -+ version.pre.clear(); -+ version.build.clear(); -+ -+ if !version_requirement.matches(&version) { -+ skip!("Skip {} because kernel version `{}` doesn't match the requirement `{}`", -+ stringify!($name), version, version_requirement); -+ } -+ } -+ } -+ } -+} -diff --git a/third_party/rust/nix/test/sys/mod.rs b/third_party/rust/nix/test/sys/mod.rs -index 60a58dd106f19..14b03784a0a57 100644 ---- a/third_party/rust/nix/test/sys/mod.rs -+++ b/third_party/rust/nix/test/sys/mod.rs -@@ -13,12 +13,17 @@ mod test_signal; - mod test_aio; - #[cfg(target_os = "linux")] - mod test_signalfd; -+#[cfg(not(target_os = "redox"))] - mod test_socket; -+#[cfg(not(target_os = "redox"))] - mod test_sockopt; -+#[cfg(not(target_os = "redox"))] - mod test_select; - #[cfg(any(target_os = "android", target_os = "linux"))] - mod test_sysinfo; -+#[cfg(not(any(target_os = "redox", target_os = "fuchsia")))] - mod test_termios; -+#[cfg(not(any(target_os = "redox", target_os = "fuchsia")))] - mod test_ioctl; - mod test_wait; - mod test_uio; -@@ -36,3 +41,5 @@ mod test_pthread; - target_os = "netbsd", - target_os = "openbsd"))] - mod test_ptrace; -+#[cfg(any(target_os = "android", target_os = "linux"))] -+mod test_timerfd; -diff --git a/third_party/rust/nix/test/sys/test_aio.rs b/third_party/rust/nix/test/sys/test_aio.rs -index d4b09b0b81905..3878da94a6ef6 100644 ---- a/third_party/rust/nix/test/sys/test_aio.rs -+++ b/third_party/rust/nix/test/sys/test_aio.rs -@@ -47,7 +47,7 @@ fn test_accessors() { - // our bindings. So it's sufficient to check that AioCb.cancel returned any - // AioCancelStat value. - #[test] --#[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+#[cfg_attr(target_env = "musl", ignore)] - fn test_cancel() { - let wbuf: &[u8] = b"CDEF"; - -@@ -72,7 +72,7 @@ fn test_cancel() { - - // Tests using aio_cancel_all for all outstanding IOs. - #[test] --#[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+#[cfg_attr(target_env = "musl", ignore)] - fn test_aio_cancel_all() { - let wbuf: &[u8] = b"CDEF"; - -@@ -133,6 +133,13 @@ fn test_fsync_error() { - - #[test] - #[cfg_attr(all(target_env = "musl", target_arch = "x86_64"), ignore)] -+// On Travis, aio_suspend hits an assertion within glibc. This is either a bug -+// in Travis's version of glibc or Linux. Either way, we must skip the test. -+// https://github.com/nix-rust/nix/issues/1099 -+#[cfg_attr(target_os = "linux", ignore)] -+// On Cirrus, aio_suspend is failing with EINVAL -+// https://github.com/nix-rust/nix/issues/1361 -+#[cfg_attr(target_os = "macos", ignore)] - fn test_aio_suspend() { - const INITIAL: &[u8] = b"abcdef123456"; - const WBUF: &[u8] = b"CDEFG"; -@@ -160,7 +167,12 @@ fn test_aio_suspend() { - loop { - { - let cbbuf = [&wcb, &rcb]; -- assert!(aio_suspend(&cbbuf[..], Some(timeout)).is_ok()); -+ let r = aio_suspend(&cbbuf[..], Some(timeout)); -+ match r { -+ Err(Error::Sys(Errno::EINTR)) => continue, -+ Err(e) => panic!("aio_suspend returned {:?}", e), -+ Ok(_) => () -+ }; - } - if rcb.error() != Err(Error::from(Errno::EINPROGRESS)) && - wcb.error() != Err(Error::from(Errno::EINPROGRESS)) { -@@ -168,8 +180,8 @@ fn test_aio_suspend() { - } - } - -- assert!(wcb.aio_return().unwrap() as usize == WBUF.len()); -- assert!(rcb.aio_return().unwrap() as usize == rlen); -+ assert_eq!(wcb.aio_return().unwrap() as usize, WBUF.len()); -+ assert_eq!(rcb.aio_return().unwrap() as usize, rlen); - } - - // Test a simple aio operation with no completion notification. We must poll -@@ -192,11 +204,11 @@ fn test_read() { - aiocb.read().unwrap(); - - let err = poll_aio(&mut aiocb); -- assert!(err == Ok(())); -- assert!(aiocb.aio_return().unwrap() as usize == EXPECT.len()); -+ assert_eq!(err, Ok(())); -+ assert_eq!(aiocb.aio_return().unwrap() as usize, EXPECT.len()); - } - -- assert!(EXPECT == rbuf.deref().deref()); -+ assert_eq!(EXPECT, rbuf.deref().deref()); - } - - /// `AioCb::read` should not modify the `AioCb` object if `libc::aio_read` -@@ -238,11 +250,11 @@ fn test_read_into_mut_slice() { - aiocb.read().unwrap(); - - let err = poll_aio(&mut aiocb); -- assert!(err == Ok(())); -- assert!(aiocb.aio_return().unwrap() as usize == EXPECT.len()); -+ assert_eq!(err, Ok(())); -+ assert_eq!(aiocb.aio_return().unwrap() as usize, EXPECT.len()); - } - -- assert!(rbuf == EXPECT); -+ assert_eq!(rbuf, EXPECT); - } - - // Tests from_ptr -@@ -268,11 +280,11 @@ fn test_read_into_pointer() { - aiocb.read().unwrap(); - - let err = poll_aio(&mut aiocb); -- assert!(err == Ok(())); -- assert!(aiocb.aio_return().unwrap() as usize == EXPECT.len()); -+ assert_eq!(err, Ok(())); -+ assert_eq!(aiocb.aio_return().unwrap() as usize, EXPECT.len()); - } - -- assert!(rbuf == EXPECT); -+ assert_eq!(rbuf, EXPECT); - } - - // Test reading into an immutable buffer. It should fail -@@ -314,13 +326,13 @@ fn test_write() { - aiocb.write().unwrap(); - - let err = poll_aio(&mut aiocb); -- assert!(err == Ok(())); -- assert!(aiocb.aio_return().unwrap() as usize == wbuf.len()); -+ assert_eq!(err, Ok(())); -+ assert_eq!(aiocb.aio_return().unwrap() as usize, wbuf.len()); - - f.seek(SeekFrom::Start(0)).unwrap(); - let len = f.read_to_end(&mut rbuf).unwrap(); -- assert!(len == EXPECT.len()); -- assert!(rbuf == EXPECT); -+ assert_eq!(len, EXPECT.len()); -+ assert_eq!(rbuf, EXPECT); - } - - // Tests `AioCb::from_boxed_slice` with `Bytes` -@@ -344,13 +356,13 @@ fn test_write_bytes() { - aiocb.write().unwrap(); - - let err = poll_aio(&mut aiocb); -- assert!(err == Ok(())); -- assert!(aiocb.aio_return().unwrap() as usize == expected_len); -+ assert_eq!(err, Ok(())); -+ assert_eq!(aiocb.aio_return().unwrap() as usize, expected_len); - - f.seek(SeekFrom::Start(0)).unwrap(); - let len = f.read_to_end(&mut rbuf).unwrap(); -- assert!(len == EXPECT.len()); -- assert!(rbuf == EXPECT); -+ assert_eq!(len, EXPECT.len()); -+ assert_eq!(rbuf, EXPECT); - } - - // Tests `AioCb::from_boxed_mut_slice` with `BytesMut` -@@ -402,13 +414,13 @@ fn test_write_from_pointer() { - aiocb.write().unwrap(); - - let err = poll_aio(&mut aiocb); -- assert!(err == Ok(())); -- assert!(aiocb.aio_return().unwrap() as usize == wbuf.len()); -+ assert_eq!(err, Ok(())); -+ assert_eq!(aiocb.aio_return().unwrap() as usize, wbuf.len()); - - f.seek(SeekFrom::Start(0)).unwrap(); - let len = f.read_to_end(&mut rbuf).unwrap(); -- assert!(len == EXPECT.len()); -- assert!(rbuf == EXPECT); -+ assert_eq!(len, EXPECT.len()); -+ assert_eq!(rbuf, EXPECT); - } - - /// `AioCb::write` should not modify the `AioCb` object if `libc::aio_write` -@@ -441,7 +453,7 @@ extern fn sigfunc(_: c_int) { - #[test] - #[cfg_attr(any(all(target_env = "musl", target_arch = "x86_64"), target_arch = "mips", target_arch = "mips64"), ignore)] - fn test_write_sigev_signal() { -- let _m = ::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); - let sa = SigAction::new(SigHandler::Handler(sigfunc), - SaFlags::SA_RESETHAND, - SigSet::empty()); -@@ -469,11 +481,11 @@ fn test_write_sigev_signal() { - thread::sleep(time::Duration::from_millis(10)); - } - -- assert!(aiocb.aio_return().unwrap() as usize == WBUF.len()); -+ assert_eq!(aiocb.aio_return().unwrap() as usize, WBUF.len()); - f.seek(SeekFrom::Start(0)).unwrap(); - let len = f.read_to_end(&mut rbuf).unwrap(); -- assert!(len == EXPECT.len()); -- assert!(rbuf == EXPECT); -+ assert_eq!(len, EXPECT.len()); -+ assert_eq!(rbuf, EXPECT); - } - - // Test LioCb::listio with LIO_WAIT, so all AIO ops should be complete by the -@@ -512,15 +524,15 @@ fn test_liocb_listio_wait() { - let err = liocb.listio(LioMode::LIO_WAIT, SigevNotify::SigevNone); - err.expect("lio_listio"); - -- assert!(liocb.aio_return(0).unwrap() as usize == WBUF.len()); -- assert!(liocb.aio_return(1).unwrap() as usize == rlen); -+ assert_eq!(liocb.aio_return(0).unwrap() as usize, WBUF.len()); -+ assert_eq!(liocb.aio_return(1).unwrap() as usize, rlen); - } -- assert!(rbuf.deref().deref() == b"3456"); -+ assert_eq!(rbuf.deref().deref(), b"3456"); - - f.seek(SeekFrom::Start(0)).unwrap(); - let len = f.read_to_end(&mut rbuf2).unwrap(); -- assert!(len == EXPECT.len()); -- assert!(rbuf2 == EXPECT); -+ assert_eq!(len, EXPECT.len()); -+ assert_eq!(rbuf2, EXPECT); - } - - // Test LioCb::listio with LIO_NOWAIT and no SigEvent, so we must use some other -@@ -561,15 +573,15 @@ fn test_liocb_listio_nowait() { - - poll_aio(&mut liocb.aiocbs[0]).unwrap(); - poll_aio(&mut liocb.aiocbs[1]).unwrap(); -- assert!(liocb.aiocbs[0].aio_return().unwrap() as usize == WBUF.len()); -- assert!(liocb.aiocbs[1].aio_return().unwrap() as usize == rlen); -+ assert_eq!(liocb.aiocbs[0].aio_return().unwrap() as usize, WBUF.len()); -+ assert_eq!(liocb.aiocbs[1].aio_return().unwrap() as usize, rlen); - } -- assert!(rbuf.deref().deref() == b"3456"); -+ assert_eq!(rbuf.deref().deref(), b"3456"); - - f.seek(SeekFrom::Start(0)).unwrap(); - let len = f.read_to_end(&mut rbuf2).unwrap(); -- assert!(len == EXPECT.len()); -- assert!(rbuf2 == EXPECT); -+ assert_eq!(len, EXPECT.len()); -+ assert_eq!(rbuf2, EXPECT); - } - - // Test LioCb::listio with LIO_NOWAIT and a SigEvent to indicate when all -@@ -579,7 +591,7 @@ fn test_liocb_listio_nowait() { - #[cfg(not(any(target_os = "ios", target_os = "macos")))] - #[cfg_attr(any(target_arch = "mips", target_arch = "mips64", target_env = "musl"), ignore)] - fn test_liocb_listio_signal() { -- let _m = ::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); - const INITIAL: &[u8] = b"abcdef123456"; - const WBUF: &[u8] = b"CDEF"; - let mut rbuf = vec![0; 4]; -@@ -620,15 +632,15 @@ fn test_liocb_listio_signal() { - thread::sleep(time::Duration::from_millis(10)); - } - -- assert!(liocb.aiocbs[0].aio_return().unwrap() as usize == WBUF.len()); -- assert!(liocb.aiocbs[1].aio_return().unwrap() as usize == rlen); -+ assert_eq!(liocb.aiocbs[0].aio_return().unwrap() as usize, WBUF.len()); -+ assert_eq!(liocb.aiocbs[1].aio_return().unwrap() as usize, rlen); - } -- assert!(rbuf.deref().deref() == b"3456"); -+ assert_eq!(rbuf.deref().deref(), b"3456"); - - f.seek(SeekFrom::Start(0)).unwrap(); - let len = f.read_to_end(&mut rbuf2).unwrap(); -- assert!(len == EXPECT.len()); -- assert!(rbuf2 == EXPECT); -+ assert_eq!(len, EXPECT.len()); -+ assert_eq!(rbuf2, EXPECT); - } - - // Try to use LioCb::listio to read into an immutable buffer. It should fail -diff --git a/third_party/rust/nix/test/sys/test_aio_drop.rs b/third_party/rust/nix/test/sys/test_aio_drop.rs -index 492da401ef726..784ee3ef6c75e 100644 ---- a/third_party/rust/nix/test/sys/test_aio_drop.rs -+++ b/third_party/rust/nix/test/sys/test_aio_drop.rs -@@ -1,6 +1,3 @@ --extern crate nix; --extern crate tempfile; -- - // Test dropping an AioCb that hasn't yet finished. - // This must happen in its own process, because on OSX this test seems to hose - // the AIO subsystem and causes subsequent tests to fail -@@ -12,6 +9,7 @@ extern crate tempfile; - target_os = "macos", - target_os = "freebsd", - target_os = "netbsd")))] -+#[cfg_attr(target_env = "gnu", ignore = "Occasionally fails in Travis; glibc bug suspected")] - fn test_drop() { - use nix::sys::aio::*; - use nix::sys::signal::*; -diff --git a/third_party/rust/nix/test/sys/test_ioctl.rs b/third_party/rust/nix/test/sys/test_ioctl.rs -index 0a439b3346f53..fa4510a69c089 100644 ---- a/third_party/rust/nix/test/sys/test_ioctl.rs -+++ b/third_party/rust/nix/test/sys/test_ioctl.rs -@@ -33,22 +33,22 @@ mod linux { - #[test] - fn test_op_none() { - if cfg!(any(target_arch = "mips", target_arch = "mips64", target_arch="powerpc", target_arch="powerpc64")){ -- assert_eq!(request_code_none!(b'q', 10), 0x2000_710A); -- assert_eq!(request_code_none!(b'a', 255), 0x2000_61FF); -+ assert_eq!(request_code_none!(b'q', 10) as u32, 0x2000_710A); -+ assert_eq!(request_code_none!(b'a', 255) as u32, 0x2000_61FF); - } else { -- assert_eq!(request_code_none!(b'q', 10), 0x0000_710A); -- assert_eq!(request_code_none!(b'a', 255), 0x0000_61FF); -+ assert_eq!(request_code_none!(b'q', 10) as u32, 0x0000_710A); -+ assert_eq!(request_code_none!(b'a', 255) as u32, 0x0000_61FF); - } - } - - #[test] - fn test_op_write() { - if cfg!(any(target_arch = "mips", target_arch = "mips64", target_arch="powerpc", target_arch="powerpc64")){ -- assert_eq!(request_code_write!(b'z', 10, 1), 0x8001_7A0A); -- assert_eq!(request_code_write!(b'z', 10, 512), 0x8200_7A0A); -+ assert_eq!(request_code_write!(b'z', 10, 1) as u32, 0x8001_7A0A); -+ assert_eq!(request_code_write!(b'z', 10, 512) as u32, 0x8200_7A0A); - } else { -- assert_eq!(request_code_write!(b'z', 10, 1), 0x4001_7A0A); -- assert_eq!(request_code_write!(b'z', 10, 512), 0x4200_7A0A); -+ assert_eq!(request_code_write!(b'z', 10, 1) as u32, 0x4001_7A0A); -+ assert_eq!(request_code_write!(b'z', 10, 512) as u32, 0x4200_7A0A); - } - } - -@@ -56,9 +56,11 @@ mod linux { - #[test] - fn test_op_write_64() { - if cfg!(any(target_arch = "mips64", target_arch="powerpc64")){ -- assert_eq!(request_code_write!(b'z', 10, (1 as u64) << 32), 0x8000_7A0A); -+ assert_eq!(request_code_write!(b'z', 10, (1 as u64) << 32) as u32, -+ 0x8000_7A0A); - } else { -- assert_eq!(request_code_write!(b'z', 10, (1 as u64) << 32), 0x4000_7A0A); -+ assert_eq!(request_code_write!(b'z', 10, (1 as u64) << 32) as u32, -+ 0x4000_7A0A); - } - - } -@@ -66,11 +68,11 @@ mod linux { - #[test] - fn test_op_read() { - if cfg!(any(target_arch = "mips", target_arch = "mips64", target_arch="powerpc", target_arch="powerpc64")){ -- assert_eq!(request_code_read!(b'z', 10, 1), 0x4001_7A0A); -- assert_eq!(request_code_read!(b'z', 10, 512), 0x4200_7A0A); -+ assert_eq!(request_code_read!(b'z', 10, 1) as u32, 0x4001_7A0A); -+ assert_eq!(request_code_read!(b'z', 10, 512) as u32, 0x4200_7A0A); - } else { -- assert_eq!(request_code_read!(b'z', 10, 1), 0x8001_7A0A); -- assert_eq!(request_code_read!(b'z', 10, 512), 0x8200_7A0A); -+ assert_eq!(request_code_read!(b'z', 10, 1) as u32, 0x8001_7A0A); -+ assert_eq!(request_code_read!(b'z', 10, 512) as u32, 0x8200_7A0A); - } - } - -@@ -78,22 +80,25 @@ mod linux { - #[test] - fn test_op_read_64() { - if cfg!(any(target_arch = "mips64", target_arch="powerpc64")){ -- assert_eq!(request_code_read!(b'z', 10, (1 as u64) << 32), 0x4000_7A0A); -+ assert_eq!(request_code_read!(b'z', 10, (1 as u64) << 32) as u32, -+ 0x4000_7A0A); - } else { -- assert_eq!(request_code_read!(b'z', 10, (1 as u64) << 32), 0x8000_7A0A); -+ assert_eq!(request_code_read!(b'z', 10, (1 as u64) << 32) as u32, -+ 0x8000_7A0A); - } - } - - #[test] - fn test_op_read_write() { -- assert_eq!(request_code_readwrite!(b'z', 10, 1), 0xC001_7A0A); -- assert_eq!(request_code_readwrite!(b'z', 10, 512), 0xC200_7A0A); -+ assert_eq!(request_code_readwrite!(b'z', 10, 1) as u32, 0xC001_7A0A); -+ assert_eq!(request_code_readwrite!(b'z', 10, 512) as u32, 0xC200_7A0A); - } - - #[cfg(target_pointer_width = "64")] - #[test] - fn test_op_read_write_64() { -- assert_eq!(request_code_readwrite!(b'z', 10, (1 as u64) << 32), 0xC000_7A0A); -+ assert_eq!(request_code_readwrite!(b'z', 10, (1 as u64) << 32) as u32, -+ 0xC000_7A0A); - } - } - -@@ -177,7 +182,7 @@ mod linux_ioctls { - #[test] - fn test_ioctl_read_bad() { - let file = tempfile().unwrap(); -- let mut termios = unsafe { mem::uninitialized() }; -+ let mut termios = unsafe { mem::zeroed() }; - let res = unsafe { tcgets(file.as_raw_fd(), &mut termios) }; - assert_eq!(res, Err(Sys(ENOTTY))); - } -@@ -194,7 +199,7 @@ mod linux_ioctls { - #[test] - fn test_ioctl_write_ptr_bad() { - let file = tempfile().unwrap(); -- let termios: termios = unsafe { mem::uninitialized() }; -+ let termios: termios = unsafe { mem::zeroed() }; - let res = unsafe { tcsets(file.as_raw_fd(), &termios) }; - assert_eq!(res, Err(Sys(ENOTTY))); - } -@@ -245,7 +250,7 @@ mod linux_ioctls { - #[test] - fn test_ioctl_read() { - let file = tempfile().unwrap(); -- let mut data: v4l2_audio = unsafe { mem::uninitialized() }; -+ let mut data: v4l2_audio = unsafe { mem::zeroed() }; - let res = unsafe { g_audio(file.as_raw_fd(), &mut data) }; - assert!(res == Err(Sys(ENOTTY)) || res == Err(Sys(ENOSYS))); - } -@@ -255,7 +260,7 @@ mod linux_ioctls { - #[test] - fn test_ioctl_readwrite() { - let file = tempfile().unwrap(); -- let mut data: v4l2_audio = unsafe { mem::uninitialized() }; -+ let mut data: v4l2_audio = unsafe { mem::zeroed() }; - let res = unsafe { enum_audio(file.as_raw_fd(), &mut data) }; - assert!(res == Err(Sys(ENOTTY)) || res == Err(Sys(ENOSYS))); - } -@@ -318,7 +323,7 @@ mod freebsd_ioctls { - #[test] - fn test_ioctl_read() { - let file = tempfile().unwrap(); -- let mut termios = unsafe { mem::uninitialized() }; -+ let mut termios = unsafe { mem::zeroed() }; - let res = unsafe { tiocgeta(file.as_raw_fd(), &mut termios) }; - assert_eq!(res, Err(Sys(ENOTTY))); - } -@@ -327,7 +332,7 @@ mod freebsd_ioctls { - #[test] - fn test_ioctl_write_ptr() { - let file = tempfile().unwrap(); -- let termios: termios = unsafe { mem::uninitialized() }; -+ let termios: termios = unsafe { mem::zeroed() }; - let res = unsafe { tiocseta(file.as_raw_fd(), &termios) }; - assert_eq!(res, Err(Sys(ENOTTY))); - } -diff --git a/third_party/rust/nix/test/sys/test_lio_listio_resubmit.rs b/third_party/rust/nix/test/sys/test_lio_listio_resubmit.rs -index 19ee3facf87d7..0795370b8c448 100644 ---- a/third_party/rust/nix/test/sys/test_lio_listio_resubmit.rs -+++ b/third_party/rust/nix/test/sys/test_lio_listio_resubmit.rs -@@ -4,10 +4,6 @@ - // we must disable the test here rather than in Cargo.toml - #![cfg(target_os = "freebsd")] - --extern crate nix; --extern crate sysctl; --extern crate tempfile; -- - use nix::Error; - use nix::errno::*; - use nix::libc::off_t; -diff --git a/third_party/rust/nix/test/sys/test_mman.rs b/third_party/rust/nix/test/sys/test_mman.rs -new file mode 100644 -index 0000000000000..152fff69c24de ---- /dev/null -+++ b/third_party/rust/nix/test/sys/test_mman.rs -@@ -0,0 +1,80 @@ -+use nix::Error; -+use nix::libc::{c_void, size_t}; -+use nix::sys::mman::{mmap, MapFlags, ProtFlags}; -+ -+#[cfg(target_os = "linux")] -+use nix::sys::mman::{mremap, MRemapFlags}; -+ -+#[test] -+fn test_mmap_anonymous() { -+ let ref mut byte = unsafe { -+ let ptr = mmap(std::ptr::null_mut(), 1, -+ ProtFlags::PROT_READ | ProtFlags::PROT_WRITE, -+ MapFlags::MAP_PRIVATE | MapFlags::MAP_ANONYMOUS, -1, 0) -+ .unwrap(); -+ *(ptr as * mut u8) -+ }; -+ assert_eq !(*byte, 0x00u8); -+ *byte = 0xffu8; -+ assert_eq !(*byte, 0xffu8); -+} -+ -+#[test] -+#[cfg(target_os = "linux")] -+fn test_mremap_grow() { -+ const ONE_K : size_t = 1024; -+ let slice : &mut[u8] = unsafe { -+ let mem = mmap(std::ptr::null_mut(), ONE_K, -+ ProtFlags::PROT_READ | ProtFlags::PROT_WRITE, -+ MapFlags::MAP_ANONYMOUS | MapFlags::MAP_PRIVATE, -1, 0) -+ .unwrap(); -+ std::slice::from_raw_parts_mut(mem as * mut u8, ONE_K) -+ }; -+ assert_eq !(slice[ONE_K - 1], 0x00); -+ slice[ONE_K - 1] = 0xFF; -+ assert_eq !(slice[ONE_K - 1], 0xFF); -+ -+ let slice : &mut[u8] = unsafe { -+ let mem = mremap(slice.as_mut_ptr() as * mut c_void, ONE_K, 10 * ONE_K, -+ MRemapFlags::MREMAP_MAYMOVE, None) -+ .unwrap(); -+ std::slice::from_raw_parts_mut(mem as * mut u8, 10 * ONE_K) -+ }; -+ -+ // The first KB should still have the old data in it. -+ assert_eq !(slice[ONE_K - 1], 0xFF); -+ -+ // The additional range should be zero-init'd and accessible. -+ assert_eq !(slice[10 * ONE_K - 1], 0x00); -+ slice[10 * ONE_K - 1] = 0xFF; -+ assert_eq !(slice[10 * ONE_K - 1], 0xFF); -+} -+ -+#[test] -+#[cfg(target_os = "linux")] -+fn test_mremap_shrink() { -+ const ONE_K : size_t = 1024; -+ let slice : &mut[u8] = unsafe { -+ let mem = mmap(std::ptr::null_mut(), 10 * ONE_K, -+ ProtFlags::PROT_READ | ProtFlags::PROT_WRITE, -+ MapFlags::MAP_ANONYMOUS | MapFlags::MAP_PRIVATE, -1, 0) -+ .unwrap(); -+ std::slice::from_raw_parts_mut(mem as * mut u8, ONE_K) -+ }; -+ assert_eq !(slice[ONE_K - 1], 0x00); -+ slice[ONE_K - 1] = 0xFF; -+ assert_eq !(slice[ONE_K - 1], 0xFF); -+ -+ let slice : &mut[u8] = unsafe { -+ let mem = mremap(slice.as_mut_ptr() as * mut c_void, 10 * ONE_K, ONE_K, -+ MRemapFlags::empty(), None) -+ .unwrap(); -+ // Since we didn't supply MREMAP_MAYMOVE, the address should be the -+ // same. -+ assert_eq !(mem, slice.as_mut_ptr() as * mut c_void); -+ std::slice::from_raw_parts_mut(mem as * mut u8, ONE_K) -+ }; -+ -+ // The first KB should still be accessible and have the old data in it. -+ assert_eq !(slice[ONE_K - 1], 0xFF); -+} -diff --git a/third_party/rust/nix/test/sys/test_pthread.rs b/third_party/rust/nix/test/sys/test_pthread.rs -index 8928010087a13..1fc3dd900f382 100644 ---- a/third_party/rust/nix/test/sys/test_pthread.rs -+++ b/third_party/rust/nix/test/sys/test_pthread.rs -@@ -1,13 +1,13 @@ - use nix::sys::pthread::*; - --#[cfg(target_env = "musl")] -+#[cfg(any(target_env = "musl", target_os = "redox"))] - #[test] - fn test_pthread_self() { - let tid = pthread_self(); - assert!(tid != ::std::ptr::null_mut()); - } - --#[cfg(not(target_env = "musl"))] -+#[cfg(not(any(target_env = "musl", target_os = "redox")))] - #[test] - fn test_pthread_self() { - let tid = pthread_self(); -diff --git a/third_party/rust/nix/test/sys/test_ptrace.rs b/third_party/rust/nix/test/sys/test_ptrace.rs -index 24d9b522ee4e5..b9793b39c54ae 100644 ---- a/third_party/rust/nix/test/sys/test_ptrace.rs -+++ b/third_party/rust/nix/test/sys/test_ptrace.rs -@@ -8,10 +8,13 @@ use nix::sys::ptrace::Options; - #[cfg(any(target_os = "android", target_os = "linux"))] - use std::mem; - -+use crate::*; -+ - #[test] - fn test_ptrace() { - // Just make sure ptrace can be called at all, for now. - // FIXME: qemu-user doesn't implement ptrace on all arches, so permit ENOSYS -+ require_capability!(CAP_SYS_PTRACE); - let err = ptrace::attach(getpid()).unwrap_err(); - assert!(err == Error::Sys(Errno::EPERM) || err == Error::Sys(Errno::EINVAL) || - err == Error::Sys(Errno::ENOSYS)); -@@ -21,6 +24,7 @@ fn test_ptrace() { - #[test] - #[cfg(any(target_os = "android", target_os = "linux"))] - fn test_ptrace_setoptions() { -+ require_capability!(CAP_SYS_PTRACE); - let err = ptrace::setoptions(getpid(), Options::PTRACE_O_TRACESYSGOOD).unwrap_err(); - assert!(err != Error::UnsupportedOperation); - } -@@ -29,6 +33,7 @@ fn test_ptrace_setoptions() { - #[test] - #[cfg(any(target_os = "android", target_os = "linux"))] - fn test_ptrace_getevent() { -+ require_capability!(CAP_SYS_PTRACE); - let err = ptrace::getevent(getpid()).unwrap_err(); - assert!(err != Error::UnsupportedOperation); - } -@@ -37,6 +42,7 @@ fn test_ptrace_getevent() { - #[test] - #[cfg(any(target_os = "android", target_os = "linux"))] - fn test_ptrace_getsiginfo() { -+ require_capability!(CAP_SYS_PTRACE); - if let Err(Error::UnsupportedOperation) = ptrace::getsiginfo(getpid()) { - panic!("ptrace_getsiginfo returns Error::UnsupportedOperation!"); - } -@@ -46,7 +52,8 @@ fn test_ptrace_getsiginfo() { - #[test] - #[cfg(any(target_os = "android", target_os = "linux"))] - fn test_ptrace_setsiginfo() { -- let siginfo = unsafe { mem::uninitialized() }; -+ require_capability!(CAP_SYS_PTRACE); -+ let siginfo = unsafe { mem::zeroed() }; - if let Err(Error::UnsupportedOperation) = ptrace::setsiginfo(getpid(), &siginfo) { - panic!("ptrace_setsiginfo returns Error::UnsupportedOperation!"); - } -@@ -61,7 +68,9 @@ fn test_ptrace_cont() { - use nix::unistd::fork; - use nix::unistd::ForkResult::*; - -- let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ require_capability!(CAP_SYS_PTRACE); -+ -+ let _m = crate::FORK_MTX.lock().expect("Mutex got poisoned by another test"); - - // FIXME: qemu-user doesn't implement ptrace on all architectures - // and retunrs ENOSYS in this case. -@@ -74,7 +83,7 @@ fn test_ptrace_cont() { - return; - } - -- match fork().expect("Error: Fork Failed") { -+ match unsafe{fork()}.expect("Error: Fork Failed") { - Child => { - ptrace::traceme().unwrap(); - // As recommended by ptrace(2), raise SIGTRAP to pause the child -@@ -91,7 +100,7 @@ fn test_ptrace_cont() { - ptrace::cont(child, Some(Signal::SIGKILL)).unwrap(); - match waitpid(child, None) { - Ok(WaitStatus::Signaled(pid, Signal::SIGKILL, _)) if pid == child => { -- // FIXME It's been observed on some systems (apple) the -+ // FIXME It's been observed on some systems (apple) the - // tracee may not be killed but remain as a zombie process - // affecting other wait based tests. Add an extra kill just - // to make sure there are no zombies. -@@ -105,3 +114,65 @@ fn test_ptrace_cont() { - }, - } - } -+ -+// ptrace::{setoptions, getregs} are only available in these platforms -+#[cfg(all(target_os = "linux", -+ any(target_arch = "x86_64", -+ target_arch = "x86"), -+ target_env = "gnu"))] -+#[test] -+fn test_ptrace_syscall() { -+ use nix::sys::signal::kill; -+ use nix::sys::ptrace; -+ use nix::sys::signal::Signal; -+ use nix::sys::wait::{waitpid, WaitStatus}; -+ use nix::unistd::fork; -+ use nix::unistd::getpid; -+ use nix::unistd::ForkResult::*; -+ -+ require_capability!(CAP_SYS_PTRACE); -+ -+ let _m = crate::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ match unsafe{fork()}.expect("Error: Fork Failed") { -+ Child => { -+ ptrace::traceme().unwrap(); -+ // first sigstop until parent is ready to continue -+ let pid = getpid(); -+ kill(pid, Signal::SIGSTOP).unwrap(); -+ kill(pid, Signal::SIGTERM).unwrap(); -+ unsafe { ::libc::_exit(0); } -+ }, -+ -+ Parent { child } => { -+ assert_eq!(waitpid(child, None), Ok(WaitStatus::Stopped(child, Signal::SIGSTOP))); -+ -+ // set this option to recognize syscall-stops -+ ptrace::setoptions(child, ptrace::Options::PTRACE_O_TRACESYSGOOD).unwrap(); -+ -+ #[cfg(target_arch = "x86_64")] -+ let get_syscall_id = || ptrace::getregs(child).unwrap().orig_rax as libc::c_long; -+ -+ #[cfg(target_arch = "x86")] -+ let get_syscall_id = || ptrace::getregs(child).unwrap().orig_eax as libc::c_long; -+ -+ // kill entry -+ ptrace::syscall(child, None).unwrap(); -+ assert_eq!(waitpid(child, None), Ok(WaitStatus::PtraceSyscall(child))); -+ assert_eq!(get_syscall_id(), ::libc::SYS_kill); -+ -+ // kill exit -+ ptrace::syscall(child, None).unwrap(); -+ assert_eq!(waitpid(child, None), Ok(WaitStatus::PtraceSyscall(child))); -+ assert_eq!(get_syscall_id(), ::libc::SYS_kill); -+ -+ // receive signal -+ ptrace::syscall(child, None).unwrap(); -+ assert_eq!(waitpid(child, None), Ok(WaitStatus::Stopped(child, Signal::SIGTERM))); -+ -+ // inject signal -+ ptrace::syscall(child, Signal::SIGTERM).unwrap(); -+ assert_eq!(waitpid(child, None), Ok(WaitStatus::Signaled(child, Signal::SIGTERM, false))); -+ }, -+ } -+} -diff --git a/third_party/rust/nix/test/sys/test_select.rs b/third_party/rust/nix/test/sys/test_select.rs -index cf68700c5e16f..37951086c2d8d 100644 ---- a/third_party/rust/nix/test/sys/test_select.rs -+++ b/third_party/rust/nix/test/sys/test_select.rs -@@ -5,7 +5,7 @@ use nix::sys::time::{TimeSpec, TimeValLike}; - - #[test] - pub fn test_pselect() { -- let _mtx = ::SIGNAL_MTX -+ let _mtx = crate::SIGNAL_MTX - .lock() - .expect("Mutex got poisoned by another test"); - -diff --git a/third_party/rust/nix/test/sys/test_signal.rs b/third_party/rust/nix/test/sys/test_signal.rs -index 8780763f773ef..ae22527fde278 100644 ---- a/third_party/rust/nix/test/sys/test_signal.rs -+++ b/third_party/rust/nix/test/sys/test_signal.rs -@@ -1,7 +1,9 @@ - use libc; -+#[cfg(not(target_os = "redox"))] - use nix::Error; - use nix::sys::signal::*; - use nix::unistd::*; -+use std::convert::TryFrom; - use std::sync::atomic::{AtomicBool, Ordering}; - - #[test] -@@ -10,6 +12,7 @@ fn test_kill_none() { - } - - #[test] -+#[cfg(not(target_os = "fuchsia"))] - fn test_killpg_none() { - killpg(getpgrp(), None) - .expect("Should be able to send signal to my process group."); -@@ -17,6 +20,8 @@ fn test_killpg_none() { - - #[test] - fn test_old_sigaction_flags() { -+ let _m = crate::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ - extern "C" fn handler(_: ::libc::c_int) {} - let act = SigAction::new( - SigHandler::Handler(handler), -@@ -37,7 +42,7 @@ fn test_sigprocmask_noop() { - - #[test] - fn test_sigprocmask() { -- let _m = ::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); - - // This needs to be a signal that rust doesn't use in the test harness. - const SIGNAL: Signal = Signal::SIGCHLD; -@@ -75,16 +80,25 @@ lazy_static! { - } - - extern fn test_sigaction_handler(signal: libc::c_int) { -- let signal = Signal::from_c_int(signal).unwrap(); -+ let signal = Signal::try_from(signal).unwrap(); - SIGNALED.store(signal == Signal::SIGINT, Ordering::Relaxed); - } - --extern fn test_sigaction_action(_: libc::c_int, _: *mut libc::siginfo_t, _: *mut libc::c_void) { -+#[cfg(not(target_os = "redox"))] -+extern fn test_sigaction_action(_: libc::c_int, _: *mut libc::siginfo_t, _: *mut libc::c_void) {} -+ -+#[test] -+#[cfg(not(target_os = "redox"))] -+fn test_signal_sigaction() { -+ let _m = crate::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ let action_handler = SigHandler::SigAction(test_sigaction_action); -+ assert_eq!(unsafe { signal(Signal::SIGINT, action_handler) }.unwrap_err(), Error::UnsupportedOperation); - } - - #[test] - fn test_signal() { -- let _m = ::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); - - unsafe { signal(Signal::SIGINT, SigHandler::SigIgn) }.unwrap(); - raise(Signal::SIGINT).unwrap(); -@@ -96,9 +110,6 @@ fn test_signal() { - assert!(SIGNALED.load(Ordering::Relaxed)); - assert_eq!(unsafe { signal(Signal::SIGINT, SigHandler::SigDfl) }.unwrap(), handler); - -- let action_handler = SigHandler::SigAction(test_sigaction_action); -- assert_eq!(unsafe { signal(Signal::SIGINT, action_handler) }.unwrap_err(), Error::UnsupportedOperation); -- - // Restore default signal handler - unsafe { signal(Signal::SIGINT, SigHandler::SigDfl) }.unwrap(); - } -diff --git a/third_party/rust/nix/test/sys/test_signalfd.rs b/third_party/rust/nix/test/sys/test_signalfd.rs -index a3b6098841f1c..af04c222852d8 100644 ---- a/third_party/rust/nix/test/sys/test_signalfd.rs -+++ b/third_party/rust/nix/test/sys/test_signalfd.rs -@@ -1,10 +1,12 @@ -+use std::convert::TryFrom; -+ - #[test] - fn test_signalfd() { - use nix::sys::signalfd::SignalFd; - use nix::sys::signal::{self, raise, Signal, SigSet}; - - // Grab the mutex for altering signals so we don't interfere with other tests. -- let _m = ::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); - - // Block the SIGUSR1 signal from automatic processing for this thread - let mut mask = SigSet::empty(); -@@ -20,6 +22,6 @@ fn test_signalfd() { - - // And now catch that same signal. - let res = fd.read_signal().unwrap().unwrap(); -- let signo = Signal::from_c_int(res.ssi_signo as i32).unwrap(); -+ let signo = Signal::try_from(res.ssi_signo as i32).unwrap(); - assert_eq!(signo, signal::SIGUSR1); - } -diff --git a/third_party/rust/nix/test/sys/test_socket.rs b/third_party/rust/nix/test/sys/test_socket.rs -index 7e64d2b77f071..2b89a45336f3e 100644 ---- a/third_party/rust/nix/test/sys/test_socket.rs -+++ b/third_party/rust/nix/test/sys/test_socket.rs -@@ -1,4 +1,3 @@ --use nix::ifaddrs::InterfaceAddress; - use nix::sys::socket::{AddressFamily, InetAddr, UnixAddr, getsockname}; - use std::collections::hash_map::DefaultHasher; - use std::hash::{Hash, Hasher}; -@@ -9,6 +8,8 @@ use std::slice; - use std::str::FromStr; - use libc::c_char; - use tempfile; -+#[cfg(any(target_os = "linux", target_os= "android"))] -+use crate::*; - - #[test] - pub fn test_inetv4_addr_to_sock_addr() { -@@ -106,7 +107,7 @@ pub fn test_addr_equality_abstract() { - assert_eq!(addr1, addr2); - assert_eq!(calculate_hash(&addr1), calculate_hash(&addr2)); - -- addr2.0.sun_path[18] = 127; -+ addr2.0.sun_path[17] = 127; - assert_ne!(addr1, addr2); - assert_ne!(calculate_hash(&addr1), calculate_hash(&addr2)); - } -@@ -117,16 +118,13 @@ pub fn test_addr_equality_abstract() { - pub fn test_abstract_uds_addr() { - let empty = String::new(); - let addr = UnixAddr::new_abstract(empty.as_bytes()).unwrap(); -- let sun_path = [0u8; 107]; -+ let sun_path: [u8; 0] = []; - assert_eq!(addr.as_abstract(), Some(&sun_path[..])); - - let name = String::from("nix\0abstract\0test"); - let addr = UnixAddr::new_abstract(name.as_bytes()).unwrap(); - let sun_path = [ -- 110u8, 105, 120, 0, 97, 98, 115, 116, 114, 97, 99, 116, 0, 116, 101, 115, 116, 0, 0, 0, 0, -- 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -- 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -- 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -+ 110u8, 105, 120, 0, 97, 98, 115, 116, 114, 97, 99, 116, 0, 116, 101, 115, 116 - ]; - assert_eq!(addr.as_abstract(), Some(&sun_path[..])); - assert_eq!(addr.path(), None); -@@ -164,6 +162,360 @@ pub fn test_socketpair() { - assert_eq!(&buf[..], b"hello"); - } - -+mod recvfrom { -+ use nix::Result; -+ use nix::sys::socket::*; -+ use std::thread; -+ use super::*; -+ -+ const MSG: &'static [u8] = b"Hello, World!"; -+ -+ fn sendrecv<Fs, Fr>(rsock: RawFd, ssock: RawFd, f_send: Fs, mut f_recv: Fr) -> Option<SockAddr> -+ where -+ Fs: Fn(RawFd, &[u8], MsgFlags) -> Result<usize> + Send + 'static, -+ Fr: FnMut(usize, Option<SockAddr>), -+ { -+ let mut buf: [u8; 13] = [0u8; 13]; -+ let mut l = 0; -+ let mut from = None; -+ -+ let send_thread = thread::spawn(move || { -+ let mut l = 0; -+ while l < std::mem::size_of_val(MSG) { -+ l += f_send(ssock, &MSG[l..], MsgFlags::empty()).unwrap(); -+ } -+ }); -+ -+ while l < std::mem::size_of_val(MSG) { -+ let (len, from_) = recvfrom(rsock, &mut buf[l..]).unwrap(); -+ f_recv(len, from_); -+ from = from_; -+ l += len; -+ } -+ assert_eq!(&buf, MSG); -+ send_thread.join().unwrap(); -+ from -+ } -+ -+ #[test] -+ pub fn stream() { -+ let (fd2, fd1) = socketpair(AddressFamily::Unix, SockType::Stream, -+ None, SockFlag::empty()).unwrap(); -+ // Ignore from for stream sockets -+ let _ = sendrecv(fd1, fd2, |s, m, flags| { -+ send(s, m, flags) -+ }, |_, _| {}); -+ } -+ -+ #[test] -+ pub fn udp() { -+ let std_sa = SocketAddr::from_str("127.0.0.1:6789").unwrap(); -+ let inet_addr = InetAddr::from_std(&std_sa); -+ let sock_addr = SockAddr::new_inet(inet_addr); -+ let rsock = socket(AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None -+ ).unwrap(); -+ bind(rsock, &sock_addr).unwrap(); -+ let ssock = socket( -+ AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None, -+ ).expect("send socket failed"); -+ let from = sendrecv(rsock, ssock, move |s, m, flags| { -+ sendto(s, m, &sock_addr, flags) -+ },|_, _| {}); -+ // UDP sockets should set the from address -+ assert_eq!(AddressFamily::Inet, from.unwrap().family()); -+ } -+ -+ #[cfg(target_os = "linux")] -+ mod udp_offload { -+ use super::*; -+ use nix::sys::uio::IoVec; -+ use nix::sys::socket::sockopt::{UdpGroSegment, UdpGsoSegment}; -+ -+ #[test] -+ // Disable the test on emulated platforms because it fails in Cirrus-CI. Lack of QEMU -+ // support is suspected. -+ #[cfg_attr(not(any(target_arch = "x86_64", target_arch="i686")), ignore)] -+ pub fn gso() { -+ require_kernel_version!(udp_offload::gso, ">= 4.18"); -+ -+ // In this test, we send the data and provide a GSO segment size. -+ // Since we are sending the buffer of size 13, six UDP packets -+ // with size 2 and two UDP packet with size 1 will be sent. -+ let segment_size: u16 = 2; -+ -+ let std_sa = SocketAddr::from_str("127.0.0.1:6791").unwrap(); -+ let inet_addr = InetAddr::from_std(&std_sa); -+ let sock_addr = SockAddr::new_inet(inet_addr); -+ let rsock = socket(AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None -+ ).unwrap(); -+ -+ setsockopt(rsock, UdpGsoSegment, &(segment_size as _)) -+ .expect("setsockopt UDP_SEGMENT failed"); -+ -+ bind(rsock, &sock_addr).unwrap(); -+ let ssock = socket( -+ AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None, -+ ).expect("send socket failed"); -+ -+ let mut num_packets_received: i32 = 0; -+ -+ sendrecv(rsock, ssock, move |s, m, flags| { -+ let iov = [IoVec::from_slice(m)]; -+ let cmsg = ControlMessage::UdpGsoSegments(&segment_size); -+ sendmsg(s, &iov, &[cmsg], flags, Some(&sock_addr)) -+ }, { -+ let num_packets_received_ref = &mut num_packets_received; -+ -+ move |len, _| { -+ // check that we receive UDP packets with payload size -+ // less or equal to segment size -+ assert!(len <= segment_size as usize); -+ *num_packets_received_ref += 1; -+ } -+ }); -+ -+ // Buffer size is 13, we will receive six packets of size 2, -+ // and one packet of size 1. -+ assert_eq!(7, num_packets_received); -+ } -+ -+ #[test] -+ // Disable the test on emulated platforms because it fails in Cirrus-CI. Lack of QEMU -+ // support is suspected. -+ #[cfg_attr(not(any(target_arch = "x86_64", target_arch="i686")), ignore)] -+ pub fn gro() { -+ require_kernel_version!(udp_offload::gro, ">= 5.3"); -+ -+ // It's hard to guarantee receiving GRO packets. Just checking -+ // that `setsockopt` doesn't fail with error -+ -+ let rsock = socket(AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None -+ ).unwrap(); -+ -+ setsockopt(rsock, UdpGroSegment, &true) -+ .expect("setsockopt UDP_GRO failed"); -+ } -+ } -+ -+ #[cfg(any( -+ target_os = "linux", -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "netbsd", -+ ))] -+ #[test] -+ pub fn udp_sendmmsg() { -+ use nix::sys::uio::IoVec; -+ -+ let std_sa = SocketAddr::from_str("127.0.0.1:6793").unwrap(); -+ let std_sa2 = SocketAddr::from_str("127.0.0.1:6794").unwrap(); -+ let inet_addr = InetAddr::from_std(&std_sa); -+ let inet_addr2 = InetAddr::from_std(&std_sa2); -+ let sock_addr = SockAddr::new_inet(inet_addr); -+ let sock_addr2 = SockAddr::new_inet(inet_addr2); -+ -+ let rsock = socket(AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None -+ ).unwrap(); -+ bind(rsock, &sock_addr).unwrap(); -+ let ssock = socket( -+ AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None, -+ ).expect("send socket failed"); -+ -+ let from = sendrecv(rsock, ssock, move |s, m, flags| { -+ let iov = [IoVec::from_slice(m)]; -+ let mut msgs = Vec::new(); -+ msgs.push( -+ SendMmsgData { -+ iov: &iov, -+ cmsgs: &[], -+ addr: Some(sock_addr), -+ _lt: Default::default(), -+ }); -+ -+ let batch_size = 15; -+ -+ for _ in 0..batch_size { -+ msgs.push( -+ SendMmsgData { -+ iov: &iov, -+ cmsgs: &[], -+ addr: Some(sock_addr2), -+ _lt: Default::default(), -+ } -+ ); -+ } -+ sendmmsg(s, msgs.iter(), flags) -+ .map(move |sent_bytes| { -+ assert!(sent_bytes.len() >= 1); -+ for sent in &sent_bytes { -+ assert_eq!(*sent, m.len()); -+ } -+ sent_bytes.len() -+ }) -+ }, |_, _ | {}); -+ // UDP sockets should set the from address -+ assert_eq!(AddressFamily::Inet, from.unwrap().family()); -+ } -+ -+ #[cfg(any( -+ target_os = "linux", -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "netbsd", -+ ))] -+ #[test] -+ pub fn udp_recvmmsg() { -+ use nix::sys::uio::IoVec; -+ use nix::sys::socket::{MsgFlags, recvmmsg}; -+ -+ const NUM_MESSAGES_SENT: usize = 2; -+ const DATA: [u8; 2] = [1,2]; -+ -+ let std_sa = SocketAddr::from_str("127.0.0.1:6798").unwrap(); -+ let inet_addr = InetAddr::from_std(&std_sa); -+ let sock_addr = SockAddr::new_inet(inet_addr); -+ -+ let rsock = socket(AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None -+ ).unwrap(); -+ bind(rsock, &sock_addr).unwrap(); -+ let ssock = socket( -+ AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None, -+ ).expect("send socket failed"); -+ -+ let send_thread = thread::spawn(move || { -+ for _ in 0..NUM_MESSAGES_SENT { -+ sendto(ssock, &DATA[..], &sock_addr, MsgFlags::empty()).unwrap(); -+ } -+ }); -+ -+ let mut msgs = std::collections::LinkedList::new(); -+ -+ // Buffers to receive exactly `NUM_MESSAGES_SENT` messages -+ let mut receive_buffers = [[0u8; 32]; NUM_MESSAGES_SENT]; -+ let iovs: Vec<_> = receive_buffers.iter_mut().map(|buf| { -+ [IoVec::from_mut_slice(&mut buf[..])] -+ }).collect(); -+ -+ for iov in &iovs { -+ msgs.push_back(RecvMmsgData { -+ iov: iov, -+ cmsg_buffer: None, -+ }) -+ }; -+ -+ let res = recvmmsg(rsock, &mut msgs, MsgFlags::empty(), None).expect("recvmmsg"); -+ assert_eq!(res.len(), DATA.len()); -+ -+ for RecvMsg { address, bytes, .. } in res.into_iter() { -+ assert_eq!(AddressFamily::Inet, address.unwrap().family()); -+ assert_eq!(DATA.len(), bytes); -+ } -+ -+ for buf in &receive_buffers { -+ assert_eq!(&buf[..DATA.len()], DATA); -+ } -+ -+ send_thread.join().unwrap(); -+ } -+ -+ #[cfg(any( -+ target_os = "linux", -+ target_os = "android", -+ target_os = "freebsd", -+ target_os = "netbsd", -+ ))] -+ #[test] -+ pub fn udp_recvmmsg_dontwait_short_read() { -+ use nix::sys::uio::IoVec; -+ use nix::sys::socket::{MsgFlags, recvmmsg}; -+ -+ const NUM_MESSAGES_SENT: usize = 2; -+ const DATA: [u8; 4] = [1,2,3,4]; -+ -+ let std_sa = SocketAddr::from_str("127.0.0.1:6799").unwrap(); -+ let inet_addr = InetAddr::from_std(&std_sa); -+ let sock_addr = SockAddr::new_inet(inet_addr); -+ -+ let rsock = socket(AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None -+ ).unwrap(); -+ bind(rsock, &sock_addr).unwrap(); -+ let ssock = socket( -+ AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None, -+ ).expect("send socket failed"); -+ -+ let send_thread = thread::spawn(move || { -+ for _ in 0..NUM_MESSAGES_SENT { -+ sendto(ssock, &DATA[..], &sock_addr, MsgFlags::empty()).unwrap(); -+ } -+ }); -+ // Ensure we've sent all the messages before continuing so `recvmmsg` -+ // will return right away -+ send_thread.join().unwrap(); -+ -+ let mut msgs = std::collections::LinkedList::new(); -+ -+ // Buffers to receive >`NUM_MESSAGES_SENT` messages to ensure `recvmmsg` -+ // will return when there are fewer than requested messages in the -+ // kernel buffers when using `MSG_DONTWAIT`. -+ let mut receive_buffers = [[0u8; 32]; NUM_MESSAGES_SENT + 2]; -+ let iovs: Vec<_> = receive_buffers.iter_mut().map(|buf| { -+ [IoVec::from_mut_slice(&mut buf[..])] -+ }).collect(); -+ -+ for iov in &iovs { -+ msgs.push_back(RecvMmsgData { -+ iov: iov, -+ cmsg_buffer: None, -+ }) -+ }; -+ -+ let res = recvmmsg(rsock, &mut msgs, MsgFlags::MSG_DONTWAIT, None).expect("recvmmsg"); -+ assert_eq!(res.len(), NUM_MESSAGES_SENT); -+ -+ for RecvMsg { address, bytes, .. } in res.into_iter() { -+ assert_eq!(AddressFamily::Inet, address.unwrap().family()); -+ assert_eq!(DATA.len(), bytes); -+ } -+ -+ for buf in &receive_buffers[..NUM_MESSAGES_SENT] { -+ assert_eq!(&buf[..DATA.len()], DATA); -+ } -+ } -+} -+ - // Test error handling of our recvmsg wrapper - #[test] - pub fn test_recvmsg_ebadf() { -@@ -247,8 +599,13 @@ pub fn test_af_alg_cipher() { - ControlMessage, MsgFlags}; - use nix::sys::socket::sockopt::AlgSetKey; - -+ skip_if_cirrus!("Fails for an unknown reason Cirrus CI. Bug #1352"); -+ // Travis's seccomp profile blocks AF_ALG -+ // https://docs.docker.com/engine/security/seccomp/ -+ skip_if_seccomp!(test_af_alg_cipher); -+ - let alg_type = "skcipher"; -- let alg_name = "ctr(aes)"; -+ let alg_name = "ctr-aes-aesni"; - // 256-bits secret key - let key = vec![0u8; 32]; - // 16-bytes IV -@@ -311,6 +668,11 @@ pub fn test_af_alg_aead() { - ControlMessage, MsgFlags}; - use nix::sys::socket::sockopt::{AlgSetKey, AlgSetAeadAuthSize}; - -+ skip_if_cirrus!("Fails for an unknown reason Cirrus CI. Bug #1352"); -+ // Travis's seccomp profile blocks AF_ALG -+ // https://docs.docker.com/engine/security/seccomp/ -+ skip_if_seccomp!(test_af_alg_aead); -+ - let auth_size = 4usize; - let assoc_size = 16u32; - -@@ -383,6 +745,111 @@ pub fn test_af_alg_aead() { - assert_eq!(decrypted[(assoc_size as usize)..(payload_len + (assoc_size as usize))], payload[(assoc_size as usize)..payload_len + (assoc_size as usize)]); - } - -+// Verify `ControlMessage::Ipv4PacketInfo` for `sendmsg`. -+// This creates a (udp) socket bound to localhost, then sends a message to -+// itself but uses Ipv4PacketInfo to force the source address to be localhost. -+// -+// This would be a more interesting test if we could assume that the test host -+// has more than one IP address (since we could select a different address to -+// test from). -+#[cfg(any(target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd"))] -+#[test] -+pub fn test_sendmsg_ipv4packetinfo() { -+ use nix::sys::uio::IoVec; -+ use nix::sys::socket::{socket, sendmsg, bind, -+ AddressFamily, SockType, SockFlag, SockAddr, -+ ControlMessage, MsgFlags}; -+ -+ let sock = socket(AddressFamily::Inet, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None) -+ .expect("socket failed"); -+ -+ let std_sa = SocketAddr::from_str("127.0.0.1:4000").unwrap(); -+ let inet_addr = InetAddr::from_std(&std_sa); -+ let sock_addr = SockAddr::new_inet(inet_addr); -+ -+ bind(sock, &sock_addr).expect("bind failed"); -+ -+ let slice = [1u8, 2, 3, 4, 5, 6, 7, 8]; -+ let iov = [IoVec::from_slice(&slice)]; -+ -+ if let InetAddr::V4(sin) = inet_addr { -+ let pi = libc::in_pktinfo { -+ ipi_ifindex: 0, /* Unspecified interface */ -+ ipi_addr: libc::in_addr { s_addr: 0 }, -+ ipi_spec_dst: sin.sin_addr, -+ }; -+ -+ let cmsg = [ControlMessage::Ipv4PacketInfo(&pi)]; -+ -+ sendmsg(sock, &iov, &cmsg, MsgFlags::empty(), Some(&sock_addr)) -+ .expect("sendmsg"); -+ } else { -+ panic!("No IPv4 addresses available for testing?"); -+ } -+} -+ -+// Verify `ControlMessage::Ipv6PacketInfo` for `sendmsg`. -+// This creates a (udp) socket bound to ip6-localhost, then sends a message to -+// itself but uses Ipv6PacketInfo to force the source address to be -+// ip6-localhost. -+// -+// This would be a more interesting test if we could assume that the test host -+// has more than one IP address (since we could select a different address to -+// test from). -+#[cfg(any(target_os = "linux", -+ target_os = "macos", -+ target_os = "netbsd", -+ target_os = "freebsd"))] -+#[test] -+pub fn test_sendmsg_ipv6packetinfo() { -+ use nix::Error; -+ use nix::errno::Errno; -+ use nix::sys::uio::IoVec; -+ use nix::sys::socket::{socket, sendmsg, bind, -+ AddressFamily, SockType, SockFlag, SockAddr, -+ ControlMessage, MsgFlags}; -+ -+ let sock = socket(AddressFamily::Inet6, -+ SockType::Datagram, -+ SockFlag::empty(), -+ None) -+ .expect("socket failed"); -+ -+ let std_sa = SocketAddr::from_str("[::1]:6000").unwrap(); -+ let inet_addr = InetAddr::from_std(&std_sa); -+ let sock_addr = SockAddr::new_inet(inet_addr); -+ -+ match bind(sock, &sock_addr) { -+ Err(Error::Sys(Errno::EADDRNOTAVAIL)) => { -+ println!("IPv6 not available, skipping test."); -+ return; -+ }, -+ _ => (), -+ } -+ -+ let slice = [1u8, 2, 3, 4, 5, 6, 7, 8]; -+ let iov = [IoVec::from_slice(&slice)]; -+ -+ if let InetAddr::V6(sin) = inet_addr { -+ let pi = libc::in6_pktinfo { -+ ipi6_ifindex: 0, /* Unspecified interface */ -+ ipi6_addr: sin.sin6_addr, -+ }; -+ -+ let cmsg = [ControlMessage::Ipv6PacketInfo(&pi)]; -+ -+ sendmsg(sock, &iov, &cmsg, MsgFlags::empty(), Some(&sock_addr)) -+ .expect("sendmsg"); -+ } else { -+ println!("No IPv6 addresses available for testing: skipping testing Ipv6PacketInfo"); -+ } -+} -+ - /// Tests that passing multiple fds using a single `ControlMessage` works. - // Disable the test on emulated platforms due to a bug in QEMU versions < - // 2.12.0. https://bugs.launchpad.net/qemu/+bug/1701808 -@@ -468,29 +935,36 @@ pub fn test_sendmsg_empty_cmsgs() { - } - } - --#[cfg(any(target_os = "android", target_os = "linux"))] -+#[cfg(any( -+ target_os = "android", -+ target_os = "linux", -+ target_os = "freebsd", -+ target_os = "dragonfly", -+))] - #[test] - fn test_scm_credentials() { -- use libc; - use nix::sys::uio::IoVec; - use nix::unistd::{close, getpid, getuid, getgid}; -- use nix::sys::socket::{socketpair, sendmsg, recvmsg, setsockopt, -+ use nix::sys::socket::{socketpair, sendmsg, recvmsg, - AddressFamily, SockType, SockFlag, -- ControlMessage, ControlMessageOwned, MsgFlags}; -- use nix::sys::socket::sockopt::PassCred; -+ ControlMessage, ControlMessageOwned, MsgFlags, -+ UnixCredentials}; -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ use nix::sys::socket::{setsockopt, sockopt::PassCred}; - - let (send, recv) = socketpair(AddressFamily::Unix, SockType::Stream, None, SockFlag::empty()) - .unwrap(); -+ #[cfg(any(target_os = "android", target_os = "linux"))] - setsockopt(recv, PassCred, &true).unwrap(); - - { - let iov = [IoVec::from_slice(b"hello")]; -- let cred = libc::ucred { -- pid: getpid().as_raw(), -- uid: getuid().as_raw(), -- gid: getgid().as_raw(), -- }; -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ let cred = UnixCredentials::new(); -+ #[cfg(any(target_os = "android", target_os = "linux"))] - let cmsg = ControlMessage::ScmCredentials(&cred); -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ let cmsg = ControlMessage::ScmCreds; - assert_eq!(sendmsg(send, &iov, &[cmsg], MsgFlags::empty(), None).unwrap(), 5); - close(send).unwrap(); - } -@@ -498,20 +972,23 @@ fn test_scm_credentials() { - { - let mut buf = [0u8; 5]; - let iov = [IoVec::from_mut_slice(&mut buf[..])]; -- let mut cmsgspace = cmsg_space!(libc::ucred); -+ let mut cmsgspace = cmsg_space!(UnixCredentials); - let msg = recvmsg(recv, &iov, Some(&mut cmsgspace), MsgFlags::empty()).unwrap(); - let mut received_cred = None; - - for cmsg in msg.cmsgs() { -- if let ControlMessageOwned::ScmCredentials(cred) = cmsg { -- assert!(received_cred.is_none()); -- assert_eq!(cred.pid, getpid().as_raw()); -- assert_eq!(cred.uid, getuid().as_raw()); -- assert_eq!(cred.gid, getgid().as_raw()); -- received_cred = Some(cred); -- } else { -- panic!("unexpected cmsg"); -- } -+ let cred = match cmsg { -+ #[cfg(any(target_os = "android", target_os = "linux"))] -+ ControlMessageOwned::ScmCredentials(cred) => cred, -+ #[cfg(any(target_os = "freebsd", target_os = "dragonfly"))] -+ ControlMessageOwned::ScmCreds(cred) => cred, -+ other => panic!("unexpected cmsg {:?}", other), -+ }; -+ assert!(received_cred.is_none()); -+ assert_eq!(cred.pid(), getpid().as_raw()); -+ assert_eq!(cred.uid(), getuid().as_raw()); -+ assert_eq!(cred.gid(), getgid().as_raw()); -+ received_cred = Some(cred); - } - received_cred.expect("no creds received"); - assert_eq!(msg.bytes, 5); -@@ -550,7 +1027,7 @@ fn test_too_large_cmsgspace() { - fn test_impl_scm_credentials_and_rights(mut space: Vec<u8>) { - use libc::ucred; - use nix::sys::uio::IoVec; -- use nix::unistd::{pipe, read, write, close, getpid, getuid, getgid}; -+ use nix::unistd::{pipe, write, close, getpid, getuid, getgid}; - use nix::sys::socket::{socketpair, sendmsg, recvmsg, setsockopt, - SockType, SockFlag, - ControlMessage, ControlMessageOwned, MsgFlags}; -@@ -569,7 +1046,7 @@ fn test_impl_scm_credentials_and_rights(mut space: Vec<u8>) { - pid: getpid().as_raw(), - uid: getuid().as_raw(), - gid: getgid().as_raw(), -- }; -+ }.into(); - let fds = [r]; - let cmsgs = [ - ControlMessage::ScmCredentials(&cred), -@@ -597,9 +1074,9 @@ fn test_impl_scm_credentials_and_rights(mut space: Vec<u8>) { - } - ControlMessageOwned::ScmCredentials(cred) => { - assert!(received_cred.is_none()); -- assert_eq!(cred.pid, getpid().as_raw()); -- assert_eq!(cred.uid, getuid().as_raw()); -- assert_eq!(cred.gid, getgid().as_raw()); -+ assert_eq!(cred.pid(), getpid().as_raw()); -+ assert_eq!(cred.uid(), getuid().as_raw()); -+ assert_eq!(cred.gid(), getgid().as_raw()); - received_cred = Some(cred); - } - _ => panic!("unexpected cmsg"), -@@ -683,7 +1160,7 @@ pub fn test_syscontrol() { - target_os = "netbsd", - target_os = "openbsd", - ))] --fn loopback_address(family: AddressFamily) -> Option<InterfaceAddress> { -+fn loopback_address(family: AddressFamily) -> Option<nix::ifaddrs::InterfaceAddress> { - use std::io; - use std::io::Write; - use nix::ifaddrs::getifaddrs; -@@ -1013,7 +1490,7 @@ pub fn test_recv_ipv6pktinfo() { - } - } - --#[cfg(target_os = "linux")] -+#[cfg(any(target_os = "android", target_os = "linux"))] - #[test] - pub fn test_vsock() { - use libc; -@@ -1030,17 +1507,11 @@ pub fn test_vsock() { - SockFlag::empty(), None) - .expect("socket failed"); - -- // VMADDR_CID_HYPERVISOR and VMADDR_CID_RESERVED are reserved, so we expect -- // an EADDRNOTAVAIL error. -+ // VMADDR_CID_HYPERVISOR is reserved, so we expect an EADDRNOTAVAIL error. - let sockaddr = SockAddr::new_vsock(libc::VMADDR_CID_HYPERVISOR, port); - assert_eq!(bind(s1, &sockaddr).err(), - Some(Error::Sys(Errno::EADDRNOTAVAIL))); - -- let sockaddr = SockAddr::new_vsock(libc::VMADDR_CID_RESERVED, port); -- assert_eq!(bind(s1, &sockaddr).err(), -- Some(Error::Sys(Errno::EADDRNOTAVAIL))); -- -- - let sockaddr = SockAddr::new_vsock(libc::VMADDR_CID_ANY, port); - assert_eq!(bind(s1, &sockaddr), Ok(())); - listen(s1, 10).expect("listen failed"); -diff --git a/third_party/rust/nix/test/sys/test_sockopt.rs b/third_party/rust/nix/test/sys/test_sockopt.rs -index c4860c0d61d3d..56065931322ec 100644 ---- a/third_party/rust/nix/test/sys/test_sockopt.rs -+++ b/third_party/rust/nix/test/sys/test_sockopt.rs -@@ -1,5 +1,7 @@ - use rand::{thread_rng, Rng}; - use nix::sys::socket::{socket, sockopt, getsockopt, setsockopt, AddressFamily, SockType, SockFlag, SockProtocol}; -+#[cfg(any(target_os = "android", target_os = "linux"))] -+use crate::*; - - #[cfg(target_os = "linux")] - #[test] -@@ -51,3 +53,44 @@ fn test_tcp_congestion() { - val - ); - } -+ -+#[test] -+#[cfg(any(target_os = "android", target_os = "linux"))] -+fn test_bindtodevice() { -+ skip_if_not_root!("test_bindtodevice"); -+ -+ let fd = socket(AddressFamily::Inet, SockType::Stream, SockFlag::empty(), None).unwrap(); -+ -+ let val = getsockopt(fd, sockopt::BindToDevice).unwrap(); -+ setsockopt(fd, sockopt::BindToDevice, &val).unwrap(); -+ -+ assert_eq!( -+ getsockopt(fd, sockopt::BindToDevice).unwrap(), -+ val -+ ); -+} -+ -+#[test] -+fn test_so_tcp_keepalive() { -+ let fd = socket(AddressFamily::Inet, SockType::Stream, SockFlag::empty(), SockProtocol::Tcp).unwrap(); -+ setsockopt(fd, sockopt::KeepAlive, &true).unwrap(); -+ assert_eq!(getsockopt(fd, sockopt::KeepAlive).unwrap(), true); -+ -+ #[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "nacl"))] { -+ let x = getsockopt(fd, sockopt::TcpKeepIdle).unwrap(); -+ setsockopt(fd, sockopt::TcpKeepIdle, &(x + 1)).unwrap(); -+ assert_eq!(getsockopt(fd, sockopt::TcpKeepIdle).unwrap(), x + 1); -+ -+ let x = getsockopt(fd, sockopt::TcpKeepCount).unwrap(); -+ setsockopt(fd, sockopt::TcpKeepCount, &(x + 1)).unwrap(); -+ assert_eq!(getsockopt(fd, sockopt::TcpKeepCount).unwrap(), x + 1); -+ -+ let x = getsockopt(fd, sockopt::TcpKeepInterval).unwrap(); -+ setsockopt(fd, sockopt::TcpKeepInterval, &(x + 1)).unwrap(); -+ assert_eq!(getsockopt(fd, sockopt::TcpKeepInterval).unwrap(), x + 1); -+ } -+} -diff --git a/third_party/rust/nix/test/sys/test_termios.rs b/third_party/rust/nix/test/sys/test_termios.rs -index a14b8ce1a23cb..00aeb2fc57f15 100644 ---- a/third_party/rust/nix/test/sys/test_termios.rs -+++ b/third_party/rust/nix/test/sys/test_termios.rs -@@ -4,7 +4,7 @@ use tempfile::tempfile; - use nix::{Error, fcntl}; - use nix::errno::Errno; - use nix::pty::openpty; --use nix::sys::termios::{self, LocalFlags, OutputFlags, Termios, tcgetattr}; -+use nix::sys::termios::{self, LocalFlags, OutputFlags, tcgetattr}; - use nix::unistd::{read, write, close}; - - /// Helper function analogous to `std::io::Write::write_all`, but for `RawFd`s -@@ -19,10 +19,10 @@ fn write_all(f: RawFd, buf: &[u8]) { - #[test] - fn test_tcgetattr_pty() { - // openpty uses ptname(3) internally -- let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); - - let pty = openpty(None, None).expect("openpty failed"); -- assert!(termios::tcgetattr(pty.master).is_ok()); -+ assert!(termios::tcgetattr(pty.slave).is_ok()); - close(pty.master).expect("closing the master failed"); - close(pty.slave).expect("closing the slave failed"); - } -@@ -46,14 +46,14 @@ fn test_tcgetattr_ebadf() { - #[test] - fn test_output_flags() { - // openpty uses ptname(3) internally -- let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); - - // Open one pty to get attributes for the second one - let mut termios = { - let pty = openpty(None, None).expect("openpty failed"); - assert!(pty.master > 0); - assert!(pty.slave > 0); -- let termios = tcgetattr(pty.master).expect("tcgetattr failed"); -+ let termios = tcgetattr(pty.slave).expect("tcgetattr failed"); - close(pty.master).unwrap(); - close(pty.slave).unwrap(); - termios -@@ -77,7 +77,7 @@ fn test_output_flags() { - - // Read from the slave verifying that the output has been properly transformed - let mut buf = [0u8; 10]; -- ::read_exact(pty.slave, &mut buf); -+ crate::read_exact(pty.slave, &mut buf); - let transformed_string = "foofoofoo\n"; - close(pty.master).unwrap(); - close(pty.slave).unwrap(); -@@ -88,14 +88,14 @@ fn test_output_flags() { - #[test] - fn test_local_flags() { - // openpty uses ptname(3) internally -- let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); - - // Open one pty to get attributes for the second one - let mut termios = { - let pty = openpty(None, None).unwrap(); - assert!(pty.master > 0); - assert!(pty.slave > 0); -- let termios = tcgetattr(pty.master).unwrap(); -+ let termios = tcgetattr(pty.slave).unwrap(); - close(pty.master).unwrap(); - close(pty.slave).unwrap(); - termios -@@ -128,9 +128,3 @@ fn test_local_flags() { - close(pty.slave).unwrap(); - assert_eq!(read, Error::Sys(Errno::EAGAIN)); - } -- --#[test] --fn test_cfmakeraw() { -- let mut termios = unsafe { Termios::default_uninit() }; -- termios::cfmakeraw(&mut termios); --} -diff --git a/third_party/rust/nix/test/sys/test_timerfd.rs b/third_party/rust/nix/test/sys/test_timerfd.rs -new file mode 100644 -index 0000000000000..24fb2ac002e1d ---- /dev/null -+++ b/third_party/rust/nix/test/sys/test_timerfd.rs -@@ -0,0 +1,61 @@ -+use nix::sys::time::{TimeSpec, TimeValLike}; -+use nix::sys::timerfd::{ClockId, Expiration, TimerFd, TimerFlags, TimerSetTimeFlags}; -+use std::time::Instant; -+ -+#[test] -+pub fn test_timerfd_oneshot() { -+ let timer = TimerFd::new(ClockId::CLOCK_MONOTONIC, TimerFlags::empty()).unwrap(); -+ -+ let before = Instant::now(); -+ -+ timer -+ .set( -+ Expiration::OneShot(TimeSpec::seconds(1)), -+ TimerSetTimeFlags::empty(), -+ ) -+ .unwrap(); -+ -+ timer.wait().unwrap(); -+ -+ let millis = before.elapsed().as_millis(); -+ assert!(millis > 900); -+} -+ -+#[test] -+pub fn test_timerfd_interval() { -+ let timer = TimerFd::new(ClockId::CLOCK_MONOTONIC, TimerFlags::empty()).unwrap(); -+ -+ let before = Instant::now(); -+ timer -+ .set( -+ Expiration::IntervalDelayed(TimeSpec::seconds(1), TimeSpec::seconds(2)), -+ TimerSetTimeFlags::empty(), -+ ) -+ .unwrap(); -+ -+ timer.wait().unwrap(); -+ -+ let start_delay = before.elapsed().as_millis(); -+ assert!(start_delay > 900); -+ -+ timer.wait().unwrap(); -+ -+ let interval_delay = before.elapsed().as_millis(); -+ assert!(interval_delay > 2900); -+} -+ -+#[test] -+pub fn test_timerfd_unset() { -+ let timer = TimerFd::new(ClockId::CLOCK_MONOTONIC, TimerFlags::empty()).unwrap(); -+ -+ timer -+ .set( -+ Expiration::OneShot(TimeSpec::seconds(1)), -+ TimerSetTimeFlags::empty(), -+ ) -+ .unwrap(); -+ -+ timer.unset().unwrap(); -+ -+ assert!(timer.get().unwrap() == None); -+} -diff --git a/third_party/rust/nix/test/sys/test_uio.rs b/third_party/rust/nix/test/sys/test_uio.rs -index 3e4fc28ceb0e4..8d22bf1755a2c 100644 ---- a/third_party/rust/nix/test/sys/test_uio.rs -+++ b/third_party/rust/nix/test/sys/test_uio.rs -@@ -6,7 +6,9 @@ use std::{cmp, iter}; - use std::fs::{OpenOptions}; - use std::os::unix::io::AsRawFd; - --use tempfile::{tempfile, tempdir}; -+#[cfg(not(target_os = "redox"))] -+use tempfile::tempfile; -+use tempfile::tempdir; - - #[test] - fn test_writev() { -@@ -53,6 +55,7 @@ fn test_writev() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_readv() { - let s:String = thread_rng().sample_iter(&Alphanumeric).take(128).collect(); - let to_write = s.as_bytes().to_vec(); -@@ -97,6 +100,7 @@ fn test_readv() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_pwrite() { - use std::io::Read; - -@@ -199,15 +203,17 @@ fn test_process_vm_readv() { - use nix::unistd::ForkResult::*; - use nix::sys::signal::*; - use nix::sys::wait::*; -+ use crate::*; - -- let _ = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ require_capability!(CAP_SYS_PTRACE); -+ let _ = crate::FORK_MTX.lock().expect("Mutex got poisoned by another test"); - - // Pre-allocate memory in the child, since allocation isn't safe - // post-fork (~= async-signal-safe) - let mut vector = vec![1u8, 2, 3, 4, 5]; - - let (r, w) = pipe().unwrap(); -- match fork().expect("Error: Fork Failed") { -+ match unsafe{fork()}.expect("Error: Fork Failed") { - Parent { child } => { - close(w).unwrap(); - // wait for child -diff --git a/third_party/rust/nix/test/sys/test_wait.rs b/third_party/rust/nix/test/sys/test_wait.rs -index d07d82f0d9075..5bb298eba4d29 100644 ---- a/third_party/rust/nix/test/sys/test_wait.rs -+++ b/third_party/rust/nix/test/sys/test_wait.rs -@@ -6,11 +6,12 @@ use nix::sys::wait::*; - use libc::_exit; - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_wait_signal() { -- let _ = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _ = crate::FORK_MTX.lock().expect("Mutex got poisoned by another test"); - - // Safe: The child only calls `pause` and/or `_exit`, which are async-signal-safe. -- match fork().expect("Error: Fork Failed") { -+ match unsafe{fork()}.expect("Error: Fork Failed") { - Child => { - pause(); - unsafe { _exit(123) } -@@ -24,10 +25,10 @@ fn test_wait_signal() { - - #[test] - fn test_wait_exit() { -- let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::FORK_MTX.lock().expect("Mutex got poisoned by another test"); - - // Safe: Child only calls `_exit`, which is async-signal-safe. -- match fork().expect("Error: Fork Failed") { -+ match unsafe{fork()}.expect("Error: Fork Failed") { - Child => unsafe { _exit(12); }, - Parent { child } => { - assert_eq!(waitpid(child, None), Ok(WaitStatus::Exited(child, 12))); -@@ -45,9 +46,9 @@ fn test_waitstatus_from_raw() { - - #[test] - fn test_waitstatus_pid() { -- let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::FORK_MTX.lock().expect("Mutex got poisoned by another test"); - -- match fork().unwrap() { -+ match unsafe{fork()}.unwrap() { - Child => unsafe { _exit(0) }, - Parent { child } => { - let status = waitpid(child, None).unwrap(); -@@ -66,6 +67,7 @@ mod ptrace { - use nix::unistd::*; - use nix::unistd::ForkResult::*; - use libc::_exit; -+ use crate::*; - - fn ptrace_child() -> ! { - ptrace::traceme().unwrap(); -@@ -82,7 +84,7 @@ mod ptrace { - assert!(ptrace::setoptions(child, Options::PTRACE_O_TRACESYSGOOD | Options::PTRACE_O_TRACEEXIT).is_ok()); - - // First, stop on the next system call, which will be exit() -- assert!(ptrace::syscall(child).is_ok()); -+ assert!(ptrace::syscall(child, None).is_ok()); - assert_eq!(waitpid(child, None), Ok(WaitStatus::PtraceSyscall(child))); - // Then get the ptrace event for the process exiting - assert!(ptrace::cont(child, None).is_ok()); -@@ -94,9 +96,10 @@ mod ptrace { - - #[test] - fn test_wait_ptrace() { -- let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ require_capability!(CAP_SYS_PTRACE); -+ let _m = crate::FORK_MTX.lock().expect("Mutex got poisoned by another test"); - -- match fork().expect("Error: Fork Failed") { -+ match unsafe{fork()}.expect("Error: Fork Failed") { - Child => ptrace_child(), - Parent { child } => ptrace_parent(child), - } -diff --git a/third_party/rust/nix/test/test.rs b/third_party/rust/nix/test/test.rs -index 6a71d261b5712..5a5330b7e4010 100644 ---- a/third_party/rust/nix/test/test.rs -+++ b/third_party/rust/nix/test/test.rs -@@ -1,69 +1,13 @@ --// XXX Allow deprecated items until release 0.16.0. See issue #1096. --#![allow(deprecated)] --extern crate bytes; --#[cfg(any(target_os = "android", target_os = "linux"))] --extern crate caps; - #[macro_use] - extern crate cfg_if; --#[macro_use] -+#[cfg_attr(not(target_os = "redox"), macro_use)] - extern crate nix; - #[macro_use] - extern crate lazy_static; --extern crate libc; --extern crate rand; --#[cfg(target_os = "freebsd")] --extern crate sysctl; --extern crate tempfile; -- --#[cfg(any(target_os = "android", target_os = "linux"))] --macro_rules! require_capability { -- ($capname:ident) => { -- use ::caps::{Capability, CapSet, has_cap}; -- use ::std::io::{self, Write}; -- -- if !has_cap(None, CapSet::Effective, Capability::$capname).unwrap() { -- let stderr = io::stderr(); -- let mut handle = stderr.lock(); -- writeln!(handle, "Insufficient capabilities. Skipping test.") -- .unwrap(); -- return; -- } -- } --} -- --#[cfg(target_os = "freebsd")] --macro_rules! skip_if_jailed { -- ($name:expr) => { -- use ::sysctl::CtlValue; -- -- if let CtlValue::Int(1) = ::sysctl::value("security.jail.jailed") -- .unwrap() -- { -- use ::std::io::Write; -- let stderr = ::std::io::stderr(); -- let mut handle = stderr.lock(); -- writeln!(handle, "{} cannot run in a jail. Skipping test.", $name) -- .unwrap(); -- return; -- } -- } --} -- --macro_rules! skip_if_not_root { -- ($name:expr) => { -- use nix::unistd::Uid; -- -- if !Uid::current().is_root() { -- use ::std::io::Write; -- let stderr = ::std::io::stderr(); -- let mut handle = stderr.lock(); -- writeln!(handle, "{} requires root privileges. Skipping test.", $name).unwrap(); -- return; -- } -- }; --} - -+mod common; - mod sys; -+#[cfg(not(target_os = "redox"))] - mod test_dir; - mod test_fcntl; - #[cfg(any(target_os = "android", -@@ -75,10 +19,15 @@ mod test_kmod; - target_os = "linux", - target_os = "netbsd"))] - mod test_mq; -+#[cfg(not(target_os = "redox"))] - mod test_net; - mod test_nix_path; - mod test_poll; -+#[cfg(not(any(target_os = "redox", target_os = "fuchsia")))] - mod test_pty; -+#[cfg(any(target_os = "android", -+ target_os = "linux"))] -+mod test_sched; - #[cfg(any(target_os = "android", - target_os = "freebsd", - target_os = "ios", -@@ -86,6 +35,7 @@ mod test_pty; - target_os = "macos"))] - mod test_sendfile; - mod test_stat; -+mod test_time; - mod test_unistd; - - use std::os::unix::io::RawFd; -@@ -93,6 +43,7 @@ use std::path::PathBuf; - use std::sync::{Mutex, RwLock, RwLockWriteGuard}; - use nix::unistd::{chdir, getcwd, read}; - -+ - /// Helper function analogous to `std::io::Read::read_exact`, but for `RawFD`s - fn read_exact(f: RawFd, buf: &mut [u8]) { - let mut len = 0; -@@ -130,7 +81,7 @@ struct DirRestore<'a> { - - impl<'a> DirRestore<'a> { - fn new() -> Self { -- let guard = ::CWD_LOCK.write() -+ let guard = crate::CWD_LOCK.write() - .expect("Lock got poisoned by another test"); - DirRestore{ - _g: guard, -diff --git a/third_party/rust/nix/test/test_clearenv.rs b/third_party/rust/nix/test/test_clearenv.rs -new file mode 100644 -index 0000000000000..28a77680498ca ---- /dev/null -+++ b/third_party/rust/nix/test/test_clearenv.rs -@@ -0,0 +1,9 @@ -+use std::env; -+ -+#[test] -+fn clearenv() { -+ env::set_var("FOO", "BAR"); -+ unsafe { nix::env::clearenv() }.unwrap(); -+ assert_eq!(env::var("FOO").unwrap_err(), env::VarError::NotPresent); -+ assert_eq!(env::vars().count(), 0); -+} -diff --git a/third_party/rust/nix/test/test_dir.rs b/third_party/rust/nix/test/test_dir.rs -index c42fbcd18a29d..505277e7143b7 100644 ---- a/third_party/rust/nix/test/test_dir.rs -+++ b/third_party/rust/nix/test/test_dir.rs -@@ -1,11 +1,8 @@ --extern crate nix; --extern crate tempfile; -- - use nix::dir::{Dir, Type}; - use nix::fcntl::OFlag; - use nix::sys::stat::Mode; - use std::fs::File; --use self::tempfile::tempdir; -+use tempfile::tempdir; - - #[test] - fn read() { -@@ -37,7 +34,9 @@ fn rewind() { - Mode::empty()).unwrap(); - let entries1: Vec<_> = dir.iter().map(|e| e.unwrap().file_name().to_owned()).collect(); - let entries2: Vec<_> = dir.iter().map(|e| e.unwrap().file_name().to_owned()).collect(); -+ let entries3: Vec<_> = dir.into_iter().map(|e| e.unwrap().file_name().to_owned()).collect(); - assert_eq!(entries1, entries2); -+ assert_eq!(entries2, entries3); - } - - #[test] -diff --git a/third_party/rust/nix/test/test_fcntl.rs b/third_party/rust/nix/test/test_fcntl.rs -index 6b2bbd679fc31..5d1bafebe195f 100644 ---- a/third_party/rust/nix/test/test_fcntl.rs -+++ b/third_party/rust/nix/test/test_fcntl.rs -@@ -1,14 +1,28 @@ -+#[cfg(not(target_os = "redox"))] - use nix::Error; -+#[cfg(not(target_os = "redox"))] - use nix::errno::*; --use nix::fcntl::{openat, open, OFlag, readlink, readlinkat, renameat}; -+#[cfg(not(target_os = "redox"))] -+use nix::fcntl::{open, OFlag, readlink}; -+#[cfg(not(target_os = "redox"))] -+use nix::fcntl::{openat, readlinkat, renameat}; -+#[cfg(not(target_os = "redox"))] - use nix::sys::stat::Mode; -+#[cfg(not(target_os = "redox"))] - use nix::unistd::{close, read}; -+#[cfg(not(target_os = "redox"))] - use tempfile::{self, NamedTempFile}; -+#[cfg(not(target_os = "redox"))] - use std::fs::File; -+#[cfg(not(target_os = "redox"))] - use std::io::prelude::*; -+#[cfg(not(target_os = "redox"))] - use std::os::unix::fs; - -+use crate::*; -+ - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_openat() { - const CONTENTS: &[u8] = b"abcd"; - let mut tmp = NamedTempFile::new().unwrap(); -@@ -31,6 +45,7 @@ fn test_openat() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_renameat() { - let old_dir = tempfile::tempdir().unwrap(); - let old_dirfd = open(old_dir.path(), OFlag::empty(), Mode::empty()).unwrap(); -@@ -47,6 +62,7 @@ fn test_renameat() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_readlink() { - let tempdir = tempfile::tempdir().unwrap(); - let src = tempdir.path().join("a"); -@@ -56,28 +72,31 @@ fn test_readlink() { - let dirfd = open(tempdir.path(), - OFlag::empty(), - Mode::empty()).unwrap(); -+ let expected_dir = src.to_str().unwrap(); -+ -+ assert_eq!(readlink(&dst).unwrap().to_str().unwrap(), expected_dir); -+ assert_eq!(readlinkat(dirfd, "b").unwrap().to_str().unwrap(), expected_dir); - -- let mut buf = vec![0; src.to_str().unwrap().len() + 1]; -- assert_eq!(readlink(&dst, &mut buf).unwrap().to_str().unwrap(), -- src.to_str().unwrap()); -- assert_eq!(readlinkat(dirfd, "b", &mut buf).unwrap().to_str().unwrap(), -- src.to_str().unwrap()); - } - - #[cfg(any(target_os = "linux", target_os = "android"))] - mod linux_android { -+ use std::fs::File; - use std::io::prelude::*; -- use std::io::SeekFrom; -+ use std::io::{BufRead, BufReader, SeekFrom}; - use std::os::unix::prelude::*; - - use libc::loff_t; - - use nix::fcntl::*; -+ use nix::sys::stat::fstat; - use nix::sys::uio::IoVec; - use nix::unistd::{close, pipe, read, write}; - - use tempfile::{tempfile, NamedTempFile}; - -+ use crate::*; -+ - /// This test creates a temporary file containing the contents - /// 'foobarbaz' and uses the `copy_file_range` call to transfer - /// 3 bytes at offset 3 (`bar`) to another empty file at offset 0. The -@@ -198,6 +217,113 @@ mod linux_android { - let mut buf = [0u8; 200]; - assert_eq!(100, read(fd, &mut buf).unwrap()); - } -+ -+ // The tests below are disabled for the listed targets -+ // due to OFD locks not being available in the kernel/libc -+ // versions used in the CI environment, probably because -+ // they run under QEMU. -+ -+ #[test] -+ #[cfg(not(any(target_arch = "aarch64", -+ target_arch = "arm", -+ target_arch = "armv7", -+ target_arch = "x86", -+ target_arch = "mips", -+ target_arch = "mips64", -+ target_arch = "mips64el", -+ target_arch = "powerpc64", -+ target_arch = "powerpc64le", -+ target_env = "musl")))] -+ fn test_ofd_write_lock() { -+ let tmp = NamedTempFile::new().unwrap(); -+ -+ let fd = tmp.as_raw_fd(); -+ let statfs = nix::sys::statfs::fstatfs(&tmp).unwrap(); -+ if statfs.filesystem_type() == nix::sys::statfs::OVERLAYFS_SUPER_MAGIC { -+ // OverlayFS is a union file system. It returns one inode value in -+ // stat(2), but a different one shows up in /proc/locks. So we must -+ // skip the test. -+ skip!("/proc/locks does not work on overlayfs"); -+ } -+ let inode = fstat(fd).expect("fstat failed").st_ino as usize; -+ -+ let mut flock = libc::flock { -+ l_type: libc::F_WRLCK as libc::c_short, -+ l_whence: libc::SEEK_SET as libc::c_short, -+ l_start: 0, -+ l_len: 0, -+ l_pid: 0, -+ }; -+ fcntl(fd, FcntlArg::F_OFD_SETLKW(&flock)).expect("write lock failed"); -+ assert_eq!( -+ Some(("OFDLCK".to_string(), "WRITE".to_string())), -+ lock_info(inode) -+ ); -+ -+ flock.l_type = libc::F_UNLCK as libc::c_short; -+ fcntl(fd, FcntlArg::F_OFD_SETLKW(&flock)).expect("write unlock failed"); -+ assert_eq!(None, lock_info(inode)); -+ } -+ -+ #[test] -+ #[cfg(not(any(target_arch = "aarch64", -+ target_arch = "arm", -+ target_arch = "armv7", -+ target_arch = "x86", -+ target_arch = "mips", -+ target_arch = "mips64", -+ target_arch = "mips64el", -+ target_arch = "powerpc64", -+ target_arch = "powerpc64le", -+ target_env = "musl")))] -+ fn test_ofd_read_lock() { -+ let tmp = NamedTempFile::new().unwrap(); -+ -+ let fd = tmp.as_raw_fd(); -+ let statfs = nix::sys::statfs::fstatfs(&tmp).unwrap(); -+ if statfs.filesystem_type() == nix::sys::statfs::OVERLAYFS_SUPER_MAGIC { -+ // OverlayFS is a union file system. It returns one inode value in -+ // stat(2), but a different one shows up in /proc/locks. So we must -+ // skip the test. -+ skip!("/proc/locks does not work on overlayfs"); -+ } -+ let inode = fstat(fd).expect("fstat failed").st_ino as usize; -+ -+ let mut flock = libc::flock { -+ l_type: libc::F_RDLCK as libc::c_short, -+ l_whence: libc::SEEK_SET as libc::c_short, -+ l_start: 0, -+ l_len: 0, -+ l_pid: 0, -+ }; -+ fcntl(fd, FcntlArg::F_OFD_SETLKW(&flock)).expect("read lock failed"); -+ assert_eq!( -+ Some(("OFDLCK".to_string(), "READ".to_string())), -+ lock_info(inode) -+ ); -+ -+ flock.l_type = libc::F_UNLCK as libc::c_short; -+ fcntl(fd, FcntlArg::F_OFD_SETLKW(&flock)).expect("read unlock failed"); -+ assert_eq!(None, lock_info(inode)); -+ } -+ -+ fn lock_info(inode: usize) -> Option<(String, String)> { -+ let file = File::open("/proc/locks").expect("open /proc/locks failed"); -+ let buf = BufReader::new(file); -+ -+ for line in buf.lines() { -+ let line = line.unwrap(); -+ let parts: Vec<_> = line.split_whitespace().collect(); -+ let lock_type = parts[1]; -+ let lock_access = parts[3]; -+ let ino_parts: Vec<_> = parts[5].split(':').collect(); -+ let ino: usize = ino_parts[2].parse().unwrap(); -+ if ino == inode { -+ return Some((lock_type.to_string(), lock_access.to_string())); -+ } -+ } -+ None -+ } - } - - #[cfg(any(target_os = "linux", -@@ -206,7 +332,7 @@ mod linux_android { - target_os = "fuchsia", - any(target_os = "wasi", target_env = "wasi"), - target_env = "uclibc", -- target_env = "freebsd"))] -+ target_os = "freebsd"))] - mod test_posix_fadvise { - - use tempfile::NamedTempFile; -@@ -232,3 +358,60 @@ mod test_posix_fadvise { - assert_eq!(errno, Errno::ESPIPE as i32); - } - } -+ -+#[cfg(any(target_os = "linux", -+ target_os = "android", -+ target_os = "emscripten", -+ target_os = "fuchsia", -+ any(target_os = "wasi", target_env = "wasi"), -+ target_os = "freebsd"))] -+mod test_posix_fallocate { -+ -+ use tempfile::NamedTempFile; -+ use std::{io::Read, os::unix::io::{RawFd, AsRawFd}}; -+ use nix::errno::Errno; -+ use nix::fcntl::*; -+ use nix::unistd::pipe; -+ -+ #[test] -+ fn success() { -+ const LEN: usize = 100; -+ let mut tmp = NamedTempFile::new().unwrap(); -+ let fd = tmp.as_raw_fd(); -+ let res = posix_fallocate(fd, 0, LEN as libc::off_t); -+ match res { -+ Ok(_) => { -+ let mut data = [1u8; LEN]; -+ assert_eq!(tmp.read(&mut data).expect("read failure"), LEN); -+ assert_eq!(&data[..], &[0u8; LEN][..]); -+ } -+ Err(nix::Error::Sys(Errno::EINVAL)) => { -+ // POSIX requires posix_fallocate to return EINVAL both for -+ // invalid arguments (i.e. len < 0) and if the operation is not -+ // supported by the file system. -+ // There's no way to tell for sure whether the file system -+ // supports posix_fallocate, so we must pass the test if it -+ // returns EINVAL. -+ } -+ _ => res.unwrap(), -+ } -+ } -+ -+ #[test] -+ fn errno() { -+ let (rd, _wr) = pipe().unwrap(); -+ let err = posix_fallocate(rd as RawFd, 0, 100).unwrap_err(); -+ use nix::Error::Sys; -+ match err { -+ Sys(Errno::EINVAL) -+ | Sys(Errno::ENODEV) -+ | Sys(Errno::ESPIPE) -+ | Sys(Errno::EBADF) => (), -+ errno => -+ panic!( -+ "unexpected errno {}", -+ errno, -+ ), -+ } -+ } -+} -diff --git a/third_party/rust/nix/test/test_kmod/mod.rs b/third_party/rust/nix/test/test_kmod/mod.rs -index ad406357b06d2..fb7260ba9c9d9 100644 ---- a/third_party/rust/nix/test/test_kmod/mod.rs -+++ b/third_party/rust/nix/test/test_kmod/mod.rs -@@ -2,9 +2,10 @@ use std::fs::copy; - use std::path::PathBuf; - use std::process::Command; - use tempfile::{tempdir, TempDir}; -+use crate::*; - - fn compile_kernel_module() -> (PathBuf, String, TempDir) { -- let _m = ::FORK_MTX -+ let _m = crate::FORK_MTX - .lock() - .expect("Mutex got poisoned by another test"); - -@@ -41,8 +42,8 @@ use std::io::Read; - #[test] - fn test_finit_and_delete_module() { - require_capability!(CAP_SYS_MODULE); -- let _m0 = ::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -- let _m1 = ::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ let _m0 = crate::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m1 = crate::CWD_LOCK.read().expect("Mutex got poisoned by another test"); - - let (kmod_path, kmod_name, _kmod_dir) = compile_kernel_module(); - -@@ -59,8 +60,8 @@ fn test_finit_and_delete_module() { - #[test] - fn test_finit_and_delete_modul_with_params() { - require_capability!(CAP_SYS_MODULE); -- let _m0 = ::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -- let _m1 = ::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ let _m0 = crate::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m1 = crate::CWD_LOCK.read().expect("Mutex got poisoned by another test"); - - let (kmod_path, kmod_name, _kmod_dir) = compile_kernel_module(); - -@@ -80,8 +81,8 @@ fn test_finit_and_delete_modul_with_params() { - #[test] - fn test_init_and_delete_module() { - require_capability!(CAP_SYS_MODULE); -- let _m0 = ::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -- let _m1 = ::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ let _m0 = crate::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m1 = crate::CWD_LOCK.read().expect("Mutex got poisoned by another test"); - - let (kmod_path, kmod_name, _kmod_dir) = compile_kernel_module(); - -@@ -100,8 +101,8 @@ fn test_init_and_delete_module() { - #[test] - fn test_init_and_delete_module_with_params() { - require_capability!(CAP_SYS_MODULE); -- let _m0 = ::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -- let _m1 = ::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ let _m0 = crate::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m1 = crate::CWD_LOCK.read().expect("Mutex got poisoned by another test"); - - let (kmod_path, kmod_name, _kmod_dir) = compile_kernel_module(); - -@@ -121,8 +122,8 @@ fn test_init_and_delete_module_with_params() { - #[test] - fn test_finit_module_invalid() { - require_capability!(CAP_SYS_MODULE); -- let _m0 = ::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -- let _m1 = ::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ let _m0 = crate::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m1 = crate::CWD_LOCK.read().expect("Mutex got poisoned by another test"); - - let kmod_path = "/dev/zero"; - -@@ -135,8 +136,8 @@ fn test_finit_module_invalid() { - #[test] - fn test_finit_module_twice_and_delete_module() { - require_capability!(CAP_SYS_MODULE); -- let _m0 = ::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -- let _m1 = ::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ let _m0 = crate::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m1 = crate::CWD_LOCK.read().expect("Mutex got poisoned by another test"); - - let (kmod_path, kmod_name, _kmod_dir) = compile_kernel_module(); - -@@ -157,8 +158,8 @@ fn test_finit_module_twice_and_delete_module() { - #[test] - fn test_delete_module_not_loaded() { - require_capability!(CAP_SYS_MODULE); -- let _m0 = ::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -- let _m1 = ::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ let _m0 = crate::KMOD_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m1 = crate::CWD_LOCK.read().expect("Mutex got poisoned by another test"); - - let result = delete_module(&CString::new("hello").unwrap(), DeleteModuleFlags::empty()); - -diff --git a/third_party/rust/nix/test/test_mount.rs b/third_party/rust/nix/test/test_mount.rs -index d2e08bc42855d..c1b6c8a3bf2d2 100644 ---- a/third_party/rust/nix/test/test_mount.rs -+++ b/third_party/rust/nix/test/test_mount.rs -@@ -1,12 +1,10 @@ -+mod common; -+ - // Impelmentation note: to allow unprivileged users to run it, this test makes - // use of user and mount namespaces. On systems that allow unprivileged user - // namespaces (Linux >= 3.8 compiled with CONFIG_USER_NS), the test should run - // without root. - --extern crate libc; --extern crate nix; --extern crate tempfile; -- - #[cfg(target_os = "linux")] - mod test_mount { - use std::fs::{self, File}; -@@ -226,6 +224,7 @@ fn main() { - use test_mount::{setup_namespaces, test_mount_tmpfs_without_flags_allows_rwx, - test_mount_rdonly_disallows_write, test_mount_noexec_disallows_exec, - test_mount_bind}; -+ skip_if_cirrus!("Fails for an unknown reason Cirrus CI. Bug #1351"); - setup_namespaces(); - - run_tests!(test_mount_tmpfs_without_flags_allows_rwx, -diff --git a/third_party/rust/nix/test/test_mq.rs b/third_party/rust/nix/test/test_mq.rs -index caac4fc261cd6..1667a35b1a04b 100644 ---- a/third_party/rust/nix/test/test_mq.rs -+++ b/third_party/rust/nix/test/test_mq.rs -@@ -1,17 +1,15 @@ --use libc::c_long; -- - use std::ffi::CString; - use std::str; - - use nix::errno::Errno::*; - use nix::Error::Sys; --use nix::mqueue::{mq_open, mq_close, mq_send, mq_receive}; -+use nix::mqueue::{mq_open, mq_close, mq_send, mq_receive, mq_attr_member_t}; - use nix::mqueue::{MqAttr, MQ_OFlag}; - use nix::sys::stat::Mode; - - #[test] - fn test_mq_send_and_receive() { -- const MSG_SIZE: c_long = 32; -+ const MSG_SIZE: mq_attr_member_t = 32; - let attr = MqAttr::new(0, 10, MSG_SIZE, 0); - let mq_name= &CString::new(b"/a_nix_test_queue".as_ref()).unwrap(); - -@@ -31,7 +29,7 @@ fn test_mq_send_and_receive() { - let mut buf = [0u8; 32]; - let mut prio = 0u32; - let len = mq_receive(mqd1, &mut buf, &mut prio).unwrap(); -- assert!(prio == 1); -+ assert_eq!(prio, 1); - - mq_close(mqd1).unwrap(); - mq_close(mqd0).unwrap(); -@@ -43,7 +41,7 @@ fn test_mq_send_and_receive() { - #[cfg(not(any(target_os = "netbsd")))] - fn test_mq_getattr() { - use nix::mqueue::mq_getattr; -- const MSG_SIZE: c_long = 32; -+ const MSG_SIZE: mq_attr_member_t = 32; - let initial_attr = MqAttr::new(0, 10, MSG_SIZE, 0); - let mq_name = &CString::new(b"/attr_test_get_attr".as_ref()).unwrap(); - let oflag = MQ_OFlag::O_CREAT | MQ_OFlag::O_WRONLY; -@@ -66,7 +64,7 @@ fn test_mq_getattr() { - #[cfg_attr(any(target_arch = "mips", target_arch = "mips64"), ignore)] - fn test_mq_setattr() { - use nix::mqueue::{mq_getattr, mq_setattr}; -- const MSG_SIZE: c_long = 32; -+ const MSG_SIZE: mq_attr_member_t = 32; - let initial_attr = MqAttr::new(0, 10, MSG_SIZE, 0); - let mq_name = &CString::new(b"/attr_test_get_attr".as_ref()).unwrap(); - let oflag = MQ_OFlag::O_CREAT | MQ_OFlag::O_WRONLY; -@@ -87,7 +85,7 @@ fn test_mq_setattr() { - // O_NONBLOCK can be set (see tests below) - assert_ne!(new_attr_get, new_attr); - -- let new_attr_non_blocking = MqAttr::new(MQ_OFlag::O_NONBLOCK.bits() as c_long, 10, MSG_SIZE, 0); -+ let new_attr_non_blocking = MqAttr::new(MQ_OFlag::O_NONBLOCK.bits() as mq_attr_member_t, 10, MSG_SIZE, 0); - mq_setattr(mqd, &new_attr_non_blocking).unwrap(); - let new_attr_get = mq_getattr(mqd).unwrap(); - -@@ -103,7 +101,7 @@ fn test_mq_setattr() { - #[cfg_attr(any(target_arch = "mips", target_arch = "mips64"), ignore)] - fn test_mq_set_nonblocking() { - use nix::mqueue::{mq_getattr, mq_set_nonblock, mq_remove_nonblock}; -- const MSG_SIZE: c_long = 32; -+ const MSG_SIZE: mq_attr_member_t = 32; - let initial_attr = MqAttr::new(0, 10, MSG_SIZE, 0); - let mq_name = &CString::new(b"/attr_test_get_attr".as_ref()).unwrap(); - let oflag = MQ_OFlag::O_CREAT | MQ_OFlag::O_WRONLY; -@@ -116,10 +114,10 @@ fn test_mq_set_nonblocking() { - let mqd = r.unwrap(); - mq_set_nonblock(mqd).unwrap(); - let new_attr = mq_getattr(mqd); -- assert!(new_attr.unwrap().flags() == MQ_OFlag::O_NONBLOCK.bits() as c_long); -+ assert_eq!(new_attr.unwrap().flags(), MQ_OFlag::O_NONBLOCK.bits() as mq_attr_member_t); - mq_remove_nonblock(mqd).unwrap(); - let new_attr = mq_getattr(mqd); -- assert!(new_attr.unwrap().flags() == 0); -+ assert_eq!(new_attr.unwrap().flags(), 0); - mq_close(mqd).unwrap(); - } - -@@ -127,7 +125,7 @@ fn test_mq_set_nonblocking() { - #[cfg(not(any(target_os = "netbsd")))] - fn test_mq_unlink() { - use nix::mqueue::mq_unlink; -- const MSG_SIZE: c_long = 32; -+ const MSG_SIZE: mq_attr_member_t = 32; - let initial_attr = MqAttr::new(0, 10, MSG_SIZE, 0); - let mq_name_opened = &CString::new(b"/mq_unlink_test".as_ref()).unwrap(); - let mq_name_not_opened = &CString::new(b"/mq_unlink_test".as_ref()).unwrap(); -@@ -141,12 +139,12 @@ fn test_mq_unlink() { - let mqd = r.unwrap(); - - let res_unlink = mq_unlink(mq_name_opened); -- assert!(res_unlink == Ok(()) ); -+ assert_eq!(res_unlink, Ok(()) ); - - let res_unlink_not_opened = mq_unlink(mq_name_not_opened); -- assert!(res_unlink_not_opened == Err(Sys(ENOENT)) ); -+ assert_eq!(res_unlink_not_opened, Err(Sys(ENOENT)) ); - - mq_close(mqd).unwrap(); - let res_unlink_after_close = mq_unlink(mq_name_opened); -- assert!(res_unlink_after_close == Err(Sys(ENOENT)) ); -+ assert_eq!(res_unlink_after_close, Err(Sys(ENOENT)) ); - } -diff --git a/third_party/rust/nix/test/test_poll.rs b/third_party/rust/nix/test/test_poll.rs -index aef40e4792b5a..acfaad8bea6c0 100644 ---- a/third_party/rust/nix/test/test_poll.rs -+++ b/third_party/rust/nix/test/test_poll.rs -@@ -1,5 +1,21 @@ --use nix::poll::{PollFlags, poll, PollFd}; --use nix::unistd::{write, pipe}; -+use nix::{ -+ Error, -+ errno::Errno, -+ poll::{PollFlags, poll, PollFd}, -+ unistd::{write, pipe} -+}; -+ -+macro_rules! loop_while_eintr { -+ ($poll_expr: expr) => { -+ loop { -+ match $poll_expr { -+ Ok(nfds) => break nfds, -+ Err(Error::Sys(Errno::EINTR)) => (), -+ Err(e) => panic!("{}", e) -+ } -+ } -+ } -+} - - #[test] - fn test_poll() { -@@ -7,7 +23,7 @@ fn test_poll() { - let mut fds = [PollFd::new(r, PollFlags::POLLIN)]; - - // Poll an idle pipe. Should timeout -- let nfds = poll(&mut fds, 100).unwrap(); -+ let nfds = loop_while_eintr!(poll(&mut fds, 100)); - assert_eq!(nfds, 0); - assert!(!fds[0].revents().unwrap().contains(PollFlags::POLLIN)); - -@@ -37,14 +53,15 @@ fn test_ppoll() { - let mut fds = [PollFd::new(r, PollFlags::POLLIN)]; - - // Poll an idle pipe. Should timeout -- let nfds = ppoll(&mut fds, timeout, SigSet::empty()).unwrap(); -+ let sigset = SigSet::empty(); -+ let nfds = loop_while_eintr!(ppoll(&mut fds, Some(timeout), sigset)); - assert_eq!(nfds, 0); - assert!(!fds[0].revents().unwrap().contains(PollFlags::POLLIN)); - - write(w, b".").unwrap(); - - // Poll a readable pipe. Should return an event. -- let nfds = ppoll(&mut fds, timeout, SigSet::empty()).unwrap(); -+ let nfds = ppoll(&mut fds, Some(timeout), SigSet::empty()).unwrap(); - assert_eq!(nfds, 1); - assert!(fds[0].revents().unwrap().contains(PollFlags::POLLIN)); - } -diff --git a/third_party/rust/nix/test/test_pty.rs b/third_party/rust/nix/test/test_pty.rs -index 476b15c10128c..ab347bb040f5f 100644 ---- a/third_party/rust/nix/test/test_pty.rs -+++ b/third_party/rust/nix/test/test_pty.rs -@@ -1,4 +1,5 @@ --use std::io::Write; -+use std::fs::File; -+use std::io::{Read, Write}; - use std::path::Path; - use std::os::unix::prelude::*; - use tempfile::tempfile; -@@ -28,7 +29,7 @@ fn test_explicit_close() { - #[test] - #[cfg(any(target_os = "android", target_os = "linux"))] - fn test_ptsname_equivalence() { -- let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); - - // Open a new PTTY master - let master_fd = posix_openpt(OFlag::O_RDWR).unwrap(); -@@ -45,7 +46,7 @@ fn test_ptsname_equivalence() { - #[test] - #[cfg(any(target_os = "android", target_os = "linux"))] - fn test_ptsname_copy() { -- let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); - - // Open a new PTTY master - let master_fd = posix_openpt(OFlag::O_RDWR).unwrap(); -@@ -54,7 +55,7 @@ fn test_ptsname_copy() { - // Get the name of the slave - let slave_name1 = unsafe { ptsname(&master_fd) }.unwrap(); - let slave_name2 = unsafe { ptsname(&master_fd) }.unwrap(); -- assert!(slave_name1 == slave_name2); -+ assert_eq!(slave_name1, slave_name2); - // Also make sure that the string was actually copied and they point to different parts of - // memory. - assert!(slave_name1.as_ptr() != slave_name2.as_ptr()); -@@ -71,7 +72,7 @@ fn test_ptsname_r_copy() { - // Get the name of the slave - let slave_name1 = ptsname_r(&master_fd).unwrap(); - let slave_name2 = ptsname_r(&master_fd).unwrap(); -- assert!(slave_name1 == slave_name2); -+ assert_eq!(slave_name1, slave_name2); - assert!(slave_name1.as_ptr() != slave_name2.as_ptr()); - } - -@@ -79,7 +80,7 @@ fn test_ptsname_r_copy() { - #[test] - #[cfg(any(target_os = "android", target_os = "linux"))] - fn test_ptsname_unique() { -- let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); - - // Open a new PTTY master - let master1_fd = posix_openpt(OFlag::O_RDWR).unwrap(); -@@ -95,35 +96,74 @@ fn test_ptsname_unique() { - assert!(slave_name1 != slave_name2); - } - --/// Test opening a master/slave PTTY pair --/// --/// This is a single larger test because much of these functions aren't useful by themselves. So for --/// this test we perform the basic act of getting a file handle for a connect master/slave PTTY --/// pair. --#[test] --fn test_open_ptty_pair() { -- let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+/// Common setup for testing PTTY pairs -+fn open_ptty_pair() -> (PtyMaster, File) { -+ let _m = crate::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); - - // Open a new PTTY master -- let master_fd = posix_openpt(OFlag::O_RDWR).expect("posix_openpt failed"); -- assert!(master_fd.as_raw_fd() > 0); -+ let master = posix_openpt(OFlag::O_RDWR).expect("posix_openpt failed"); - - // Allow a slave to be generated for it -- grantpt(&master_fd).expect("grantpt failed"); -- unlockpt(&master_fd).expect("unlockpt failed"); -+ grantpt(&master).expect("grantpt failed"); -+ unlockpt(&master).expect("unlockpt failed"); - - // Get the name of the slave -- let slave_name = unsafe { ptsname(&master_fd) }.expect("ptsname failed"); -+ let slave_name = unsafe { ptsname(&master) }.expect("ptsname failed"); - - // Open the slave device - let slave_fd = open(Path::new(&slave_name), OFlag::O_RDWR, stat::Mode::empty()).unwrap(); -- assert!(slave_fd > 0); -+ let slave = unsafe { File::from_raw_fd(slave_fd) }; -+ -+ (master, slave) -+} -+ -+/// Test opening a master/slave PTTY pair -+/// -+/// This uses a common `open_ptty_pair` because much of these functions aren't useful by -+/// themselves. So for this test we perform the basic act of getting a file handle for a -+/// master/slave PTTY pair, then just sanity-check the raw values. -+#[test] -+fn test_open_ptty_pair() { -+ let (master, slave) = open_ptty_pair(); -+ assert!(master.as_raw_fd() > 0); -+ assert!(slave.as_raw_fd() > 0); -+} -+ -+/// Put the terminal in raw mode. -+fn make_raw(fd: RawFd) { -+ let mut termios = tcgetattr(fd).unwrap(); -+ cfmakeraw(&mut termios); -+ tcsetattr(fd, SetArg::TCSANOW, &termios).unwrap(); -+} -+ -+/// Test `io::Read` on the PTTY master -+#[test] -+fn test_read_ptty_pair() { -+ let (mut master, mut slave) = open_ptty_pair(); -+ make_raw(slave.as_raw_fd()); -+ -+ let mut buf = [0u8; 5]; -+ slave.write_all(b"hello").unwrap(); -+ master.read_exact(&mut buf).unwrap(); -+ assert_eq!(&buf, b"hello"); -+} -+ -+/// Test `io::Write` on the PTTY master -+#[test] -+fn test_write_ptty_pair() { -+ let (mut master, mut slave) = open_ptty_pair(); -+ make_raw(slave.as_raw_fd()); -+ -+ let mut buf = [0u8; 5]; -+ master.write_all(b"adios").unwrap(); -+ slave.read_exact(&mut buf).unwrap(); -+ assert_eq!(&buf, b"adios"); - } - - #[test] - fn test_openpty() { - // openpty uses ptname(3) internally -- let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); - - let pty = openpty(None, None).unwrap(); - assert!(pty.master > 0); -@@ -133,21 +173,21 @@ fn test_openpty() { - let string = "foofoofoo\n"; - let mut buf = [0u8; 10]; - write(pty.master, string.as_bytes()).unwrap(); -- ::read_exact(pty.slave, &mut buf); -+ crate::read_exact(pty.slave, &mut buf); - - assert_eq!(&buf, string.as_bytes()); - - // Read the echo as well - let echoed_string = "foofoofoo\r\n"; - let mut buf = [0u8; 11]; -- ::read_exact(pty.master, &mut buf); -+ crate::read_exact(pty.master, &mut buf); - assert_eq!(&buf, echoed_string.as_bytes()); - - let string2 = "barbarbarbar\n"; - let echoed_string2 = "barbarbarbar\r\n"; - let mut buf = [0u8; 14]; - write(pty.slave, string2.as_bytes()).unwrap(); -- ::read_exact(pty.master, &mut buf); -+ crate::read_exact(pty.master, &mut buf); - - assert_eq!(&buf, echoed_string2.as_bytes()); - -@@ -158,14 +198,14 @@ fn test_openpty() { - #[test] - fn test_openpty_with_termios() { - // openpty uses ptname(3) internally -- let _m = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); - - // Open one pty to get attributes for the second one - let mut termios = { - let pty = openpty(None, None).unwrap(); - assert!(pty.master > 0); - assert!(pty.slave > 0); -- let termios = tcgetattr(pty.master).unwrap(); -+ let termios = tcgetattr(pty.slave).unwrap(); - close(pty.master).unwrap(); - close(pty.slave).unwrap(); - termios -@@ -182,20 +222,20 @@ fn test_openpty_with_termios() { - let string = "foofoofoo\n"; - let mut buf = [0u8; 10]; - write(pty.master, string.as_bytes()).unwrap(); -- ::read_exact(pty.slave, &mut buf); -+ crate::read_exact(pty.slave, &mut buf); - - assert_eq!(&buf, string.as_bytes()); - - // read the echo as well - let echoed_string = "foofoofoo\n"; -- ::read_exact(pty.master, &mut buf); -+ crate::read_exact(pty.master, &mut buf); - assert_eq!(&buf, echoed_string.as_bytes()); - - let string2 = "barbarbarbar\n"; - let echoed_string2 = "barbarbarbar\n"; - let mut buf = [0u8; 13]; - write(pty.slave, string2.as_bytes()).unwrap(); -- ::read_exact(pty.master, &mut buf); -+ crate::read_exact(pty.master, &mut buf); - - assert_eq!(&buf, echoed_string2.as_bytes()); - -@@ -209,9 +249,9 @@ fn test_forkpty() { - use nix::sys::signal::*; - use nix::sys::wait::wait; - // forkpty calls openpty which uses ptname(3) internally. -- let _m0 = ::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m0 = crate::PTSNAME_MTX.lock().expect("Mutex got poisoned by another test"); - // forkpty spawns a child process -- let _m1 = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m1 = crate::FORK_MTX.lock().expect("Mutex got poisoned by another test"); - - let string = "naninani\n"; - let echoed_string = "naninani\r\n"; -@@ -225,7 +265,7 @@ fn test_forkpty() { - Parent { child } => { - let mut buf = [0u8; 10]; - assert!(child.as_raw() > 0); -- ::read_exact(pty.master, &mut buf); -+ crate::read_exact(pty.master, &mut buf); - kill(child, SIGTERM).unwrap(); - wait().unwrap(); // keep other tests using generic wait from getting our child - assert_eq!(&buf, echoed_string.as_bytes()); -diff --git a/third_party/rust/nix/test/test_ptymaster_drop.rs b/third_party/rust/nix/test/test_ptymaster_drop.rs -index 9b59d66435ed0..ff939b9c63e76 100644 ---- a/third_party/rust/nix/test/test_ptymaster_drop.rs -+++ b/third_party/rust/nix/test/test_ptymaster_drop.rs -@@ -1,21 +1,24 @@ --extern crate nix; -+#[cfg(not(any(target_os = "redox", target_os = "fuchsia")))] -+mod t { -+ use nix::fcntl::OFlag; -+ use nix::pty::*; -+ use nix::unistd::close; -+ use std::os::unix::io::AsRawFd; - --use nix::fcntl::OFlag; --use nix::pty::*; --use nix::unistd::close; --use std::os::unix::io::AsRawFd; -- --/// Regression test for Issue #659 --/// `PtyMaster` should panic rather than double close the file descriptor --/// This must run in its own test process because it deliberately creates a race --/// condition. --#[test] --#[should_panic(expected = "Closing an invalid file descriptor!")] --// In Travis on i686-unknown-linux-musl, this test gets SIGABRT. I don't know --// why. It doesn't happen on any other target, and it doesn't happen on my PC. --#[cfg_attr(all(target_env = "musl", target_arch = "x86"), ignore)] --fn test_double_close() { -- let m = posix_openpt(OFlag::O_RDWR).unwrap(); -- close(m.as_raw_fd()).unwrap(); -- drop(m); // should panic here -+ /// Regression test for Issue #659 -+ /// -+ /// `PtyMaster` should panic rather than double close the file descriptor -+ /// This must run in its own test process because it deliberately creates a -+ /// race condition. -+ #[test] -+ #[should_panic(expected = "Closing an invalid file descriptor!")] -+ // In Travis on i686-unknown-linux-musl, this test gets SIGABRT. I don't -+ // know why. It doesn't happen on any other target, and it doesn't happen -+ // on my PC. -+ #[cfg_attr(all(target_env = "musl", target_arch = "x86"), ignore)] -+ fn test_double_close() { -+ let m = posix_openpt(OFlag::O_RDWR).unwrap(); -+ close(m.as_raw_fd()).unwrap(); -+ drop(m); // should panic here -+ } - } -diff --git a/third_party/rust/nix/test/test_sched.rs b/third_party/rust/nix/test/test_sched.rs -new file mode 100644 -index 0000000000000..922196a3dba73 ---- /dev/null -+++ b/third_party/rust/nix/test/test_sched.rs -@@ -0,0 +1,32 @@ -+use nix::sched::{sched_getaffinity, sched_setaffinity, CpuSet}; -+use nix::unistd::Pid; -+ -+#[test] -+fn test_sched_affinity() { -+ // If pid is zero, then the mask of the calling process is returned. -+ let initial_affinity = sched_getaffinity(Pid::from_raw(0)).unwrap(); -+ let mut at_least_one_cpu = false; -+ let mut last_valid_cpu = 0; -+ for field in 0..CpuSet::count() { -+ if initial_affinity.is_set(field).unwrap() { -+ at_least_one_cpu = true; -+ last_valid_cpu = field; -+ } -+ } -+ assert!(at_least_one_cpu); -+ -+ // Now restrict the running CPU -+ let mut new_affinity = CpuSet::new(); -+ new_affinity.set(last_valid_cpu).unwrap(); -+ sched_setaffinity(Pid::from_raw(0), &new_affinity).unwrap(); -+ -+ // And now re-check the affinity which should be only the one we set. -+ let updated_affinity = sched_getaffinity(Pid::from_raw(0)).unwrap(); -+ for field in 0..CpuSet::count() { -+ // Should be set only for the CPU we set previously -+ assert_eq!(updated_affinity.is_set(field).unwrap(), field==last_valid_cpu) -+ } -+ -+ // Finally, reset the initial CPU set -+ sched_setaffinity(Pid::from_raw(0), &initial_affinity).unwrap(); -+} -diff --git a/third_party/rust/nix/test/test_stat.rs b/third_party/rust/nix/test/test_stat.rs -index 1173455fae8db..0b9466685607b 100644 ---- a/third_party/rust/nix/test/test_stat.rs -+++ b/third_party/rust/nix/test/test_stat.rs -@@ -1,15 +1,26 @@ --use std::fs::{self, File}; -+#[cfg(not(target_os = "redox"))] -+use std::fs; -+use std::fs::File; -+#[cfg(not(target_os = "redox"))] - use std::os::unix::fs::{symlink, PermissionsExt}; - use std::os::unix::prelude::AsRawFd; -+#[cfg(not(target_os = "redox"))] - use std::time::{Duration, UNIX_EPOCH}; -+#[cfg(not(target_os = "redox"))] - use std::path::Path; - --#[cfg(not(any(target_os = "netbsd")))] -+#[cfg(not(any(target_os = "netbsd", target_os = "redox")))] - use libc::{S_IFMT, S_IFLNK, mode_t}; - -+#[cfg(not(target_os = "redox"))] - use nix::{fcntl, Error}; --use nix::errno::{Errno}; --use nix::sys::stat::{self, fchmod, fchmodat, futimens, stat, utimes, utimensat, mkdirat}; -+#[cfg(not(target_os = "redox"))] -+use nix::errno::Errno; -+#[cfg(not(target_os = "redox"))] -+use nix::sys::stat::{self, futimens, utimes}; -+use nix::sys::stat::{fchmod, stat}; -+#[cfg(not(target_os = "redox"))] -+use nix::sys::stat::{fchmodat, utimensat, mkdirat}; - #[cfg(any(target_os = "linux", - target_os = "haiku", - target_os = "ios", -@@ -17,15 +28,19 @@ use nix::sys::stat::{self, fchmod, fchmodat, futimens, stat, utimes, utimensat, - target_os = "freebsd", - target_os = "netbsd"))] - use nix::sys::stat::lutimes; --use nix::sys::stat::{Mode, FchmodatFlags, UtimensatFlags}; -+#[cfg(not(target_os = "redox"))] -+use nix::sys::stat::{FchmodatFlags, UtimensatFlags}; -+use nix::sys::stat::Mode; - --#[cfg(not(any(target_os = "netbsd")))] -+#[cfg(not(any(target_os = "netbsd", target_os = "redox")))] - use nix::sys::stat::FileStat; - -+#[cfg(not(target_os = "redox"))] - use nix::sys::time::{TimeSpec, TimeVal, TimeValLike}; -+#[cfg(not(target_os = "redox"))] - use nix::unistd::chdir; - --#[cfg(not(any(target_os = "netbsd")))] -+#[cfg(not(any(target_os = "netbsd", target_os = "redox")))] - use nix::Result; - use tempfile; - -@@ -33,27 +48,27 @@ use tempfile; - // uid and gid are signed on Windows, but not on other platforms. This function - // allows warning free compiles on all platforms, and can be removed when - // expression-level #[allow] is available. --#[cfg(not(any(target_os = "netbsd")))] -+#[cfg(not(any(target_os = "netbsd", target_os = "redox")))] - fn valid_uid_gid(stat: FileStat) -> bool { - // uid could be 0 for the `root` user. This quite possible when - // the tests are being run on a rooted Android device. - stat.st_uid >= 0 && stat.st_gid >= 0 - } - --#[cfg(not(any(target_os = "netbsd")))] -+#[cfg(not(any(target_os = "netbsd", target_os = "redox")))] - fn assert_stat_results(stat_result: Result<FileStat>) { - let stats = stat_result.expect("stat call failed"); - assert!(stats.st_dev > 0); // must be positive integer, exact number machine dependent - assert!(stats.st_ino > 0); // inode is positive integer, exact number machine dependent - assert!(stats.st_mode > 0); // must be positive integer -- assert!(stats.st_nlink == 1); // there links created, must be 1 -+ assert_eq!(stats.st_nlink, 1); // there links created, must be 1 - assert!(valid_uid_gid(stats)); // must be positive integers -- assert!(stats.st_size == 0); // size is 0 because we did not write anything to the file -+ assert_eq!(stats.st_size, 0); // size is 0 because we did not write anything to the file - assert!(stats.st_blksize > 0); // must be positive integer, exact number machine dependent - assert!(stats.st_blocks <= 16); // Up to 16 blocks can be allocated for a blank file - } - --#[cfg(not(any(target_os = "netbsd")))] -+#[cfg(not(any(target_os = "netbsd", target_os = "redox")))] - fn assert_lstat_results(stat_result: Result<FileStat>) { - let stats = stat_result.expect("stat call failed"); - assert!(stats.st_dev > 0); // must be positive integer, exact number machine dependent -@@ -63,8 +78,8 @@ fn assert_lstat_results(stat_result: Result<FileStat>) { - // st_mode is c_uint (u32 on Android) while S_IFMT is mode_t - // (u16 on Android), and that will be a compile error. - // On other platforms they are the same (either both are u16 or u32). -- assert!((stats.st_mode as usize) & (S_IFMT as usize) == S_IFLNK as usize); // should be a link -- assert!(stats.st_nlink == 1); // there links created, must be 1 -+ assert_eq!((stats.st_mode as usize) & (S_IFMT as usize), S_IFLNK as usize); // should be a link -+ assert_eq!(stats.st_nlink, 1); // there links created, must be 1 - assert!(valid_uid_gid(stats)); // must be positive integers - assert!(stats.st_size > 0); // size is > 0 because it points to another file - assert!(stats.st_blksize > 0); // must be positive integer, exact number machine dependent -@@ -76,7 +91,7 @@ fn assert_lstat_results(stat_result: Result<FileStat>) { - } - - #[test] --#[cfg(not(any(target_os = "netbsd")))] -+#[cfg(not(any(target_os = "netbsd", target_os = "redox")))] - fn test_stat_and_fstat() { - use nix::sys::stat::fstat; - -@@ -92,7 +107,7 @@ fn test_stat_and_fstat() { - } - - #[test] --#[cfg(not(any(target_os = "netbsd")))] -+#[cfg(not(any(target_os = "netbsd", target_os = "redox")))] - fn test_fstatat() { - let tempdir = tempfile::tempdir().unwrap(); - let filename = tempdir.path().join("foo.txt"); -@@ -108,7 +123,7 @@ fn test_fstatat() { - } - - #[test] --#[cfg(not(any(target_os = "netbsd")))] -+#[cfg(not(any(target_os = "netbsd", target_os = "redox")))] - fn test_stat_fstat_lstat() { - use nix::sys::stat::{fstat, lstat}; - -@@ -155,8 +170,9 @@ fn test_fchmod() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_fchmodat() { -- let _dr = ::DirRestore::new(); -+ let _dr = crate::DirRestore::new(); - let tempdir = tempfile::tempdir().unwrap(); - let filename = "foo.txt"; - let fullpath = tempdir.path().join(filename); -@@ -186,6 +202,7 @@ fn test_fchmodat() { - /// - /// The atime and mtime are expressed with a resolution of seconds because some file systems - /// (like macOS's HFS+) do not have higher granularity. -+#[cfg(not(target_os = "redox"))] - fn assert_times_eq(exp_atime_sec: u64, exp_mtime_sec: u64, attr: &fs::Metadata) { - assert_eq!( - Duration::new(exp_atime_sec, 0), -@@ -196,6 +213,7 @@ fn assert_times_eq(exp_atime_sec: u64, exp_mtime_sec: u64, attr: &fs::Metadata) - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_utimes() { - let tempdir = tempfile::tempdir().unwrap(); - let fullpath = tempdir.path().join("file"); -@@ -231,6 +249,7 @@ fn test_lutimes() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_futimens() { - let tempdir = tempfile::tempdir().unwrap(); - let fullpath = tempdir.path().join("file"); -@@ -243,8 +262,9 @@ fn test_futimens() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_utimensat() { -- let _dr = ::DirRestore::new(); -+ let _dr = crate::DirRestore::new(); - let tempdir = tempfile::tempdir().unwrap(); - let filename = "foo.txt"; - let fullpath = tempdir.path().join(filename); -@@ -264,6 +284,7 @@ fn test_utimensat() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_mkdirat_success_path() { - let tempdir = tempfile::tempdir().unwrap(); - let filename = "example_subdir"; -@@ -273,6 +294,7 @@ fn test_mkdirat_success_path() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_mkdirat_success_mode() { - let expected_bits = stat::SFlag::S_IFDIR.bits() | stat::Mode::S_IRWXU.bits(); - let tempdir = tempfile::tempdir().unwrap(); -@@ -285,6 +307,7 @@ fn test_mkdirat_success_mode() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_mkdirat_fail() { - let tempdir = tempfile::tempdir().unwrap(); - let not_dir_filename= "example_not_dir"; -diff --git a/third_party/rust/nix/test/test_time.rs b/third_party/rust/nix/test/test_time.rs -new file mode 100644 -index 0000000000000..c321352d79c16 ---- /dev/null -+++ b/third_party/rust/nix/test/test_time.rs -@@ -0,0 +1,56 @@ -+#[cfg(any( -+ target_os = "freebsd", -+ target_os = "dragonfly", -+ target_os = "linux", -+ target_os = "android", -+ target_os = "emscripten", -+))] -+use nix::time::clock_getcpuclockid; -+use nix::time::{clock_getres, clock_gettime, ClockId}; -+ -+#[test] -+pub fn test_clock_getres() { -+ assert!(clock_getres(ClockId::CLOCK_REALTIME).is_ok()); -+} -+ -+#[test] -+pub fn test_clock_gettime() { -+ assert!(clock_gettime(ClockId::CLOCK_REALTIME).is_ok()); -+} -+ -+#[cfg(any( -+ target_os = "freebsd", -+ target_os = "dragonfly", -+ target_os = "linux", -+ target_os = "android", -+ target_os = "emscripten", -+))] -+#[test] -+pub fn test_clock_getcpuclockid() { -+ let clock_id = clock_getcpuclockid(nix::unistd::Pid::this()).unwrap(); -+ assert!(clock_gettime(clock_id).is_ok()); -+} -+ -+#[test] -+pub fn test_clock_id_res() { -+ assert!(ClockId::CLOCK_REALTIME.res().is_ok()); -+} -+ -+#[test] -+pub fn test_clock_id_now() { -+ assert!(ClockId::CLOCK_REALTIME.now().is_ok()); -+} -+ -+#[cfg(any( -+ target_os = "freebsd", -+ target_os = "dragonfly", -+ target_os = "linux", -+ target_os = "android", -+ target_os = "emscripten", -+))] -+#[test] -+pub fn test_clock_id_pid_cpu_clock_id() { -+ assert!(ClockId::pid_cpu_clock_id(nix::unistd::Pid::this()) -+ .map(ClockId::now) -+ .is_ok()); -+} -diff --git a/third_party/rust/nix/test/test_unistd.rs b/third_party/rust/nix/test/test_unistd.rs -index 46196dec7ccce..16a8a05dd6d08 100644 ---- a/third_party/rust/nix/test/test_unistd.rs -+++ b/third_party/rust/nix/test/test_unistd.rs -@@ -1,26 +1,39 @@ --use nix::fcntl::{self, fcntl, FcntlArg, FdFlag, open, OFlag, readlink}; -+#[cfg(not(target_os = "redox"))] -+use nix::fcntl::{self, open, readlink}; -+use nix::fcntl::{fcntl, FcntlArg, FdFlag, OFlag}; - use nix::unistd::*; - use nix::unistd::ForkResult::*; -+#[cfg(not(target_os = "redox"))] - use nix::sys::signal::{SaFlags, SigAction, SigHandler, SigSet, Signal, sigaction}; - use nix::sys::wait::*; - use nix::sys::stat::{self, Mode, SFlag}; -+#[cfg(not(any(target_os = "redox", target_os = "fuchsia")))] -+use nix::pty::{posix_openpt, grantpt, unlockpt, ptsname}; - use nix::errno::Errno; -+#[cfg(not(target_os = "redox"))] - use nix::Error; - use std::{env, iter}; -+#[cfg(not(target_os = "redox"))] - use std::ffi::CString; --use std::fs::{self, DirBuilder, File}; -+#[cfg(not(target_os = "redox"))] -+use std::fs::DirBuilder; -+use std::fs::{self, File}; - use std::io::Write; - use std::os::unix::prelude::*; --use tempfile::{self, tempfile}; --use libc::{self, _exit, off_t}; -+#[cfg(not(target_os = "redox"))] -+use std::path::Path; -+use tempfile::{tempdir, tempfile}; -+use libc::{_exit, off_t}; -+ -+use crate::*; - - #[test] - #[cfg(not(any(target_os = "netbsd")))] - fn test_fork_and_waitpid() { -- let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::FORK_MTX.lock().expect("Mutex got poisoned by another test"); - - // Safe: Child only calls `_exit`, which is signal-safe -- match fork().expect("Error: Fork Failed") { -+ match unsafe{fork()}.expect("Error: Fork Failed") { - Child => unsafe { _exit(0) }, - Parent { child } => { - // assert that child was created and pid > 0 -@@ -29,7 +42,7 @@ fn test_fork_and_waitpid() { - let wait_status = waitpid(child, None); - match wait_status { - // assert that waitpid returned correct status and the pid is the one of the child -- Ok(WaitStatus::Exited(pid_t, _)) => assert!(pid_t == child), -+ Ok(WaitStatus::Exited(pid_t, _)) => assert_eq!(pid_t, child), - - // panic, must never happen - s @ Ok(_) => panic!("Child exited {:?}, should never happen", s), -@@ -45,10 +58,10 @@ fn test_fork_and_waitpid() { - #[test] - fn test_wait() { - // Grab FORK_MTX so wait doesn't reap a different test's child process -- let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::FORK_MTX.lock().expect("Mutex got poisoned by another test"); - - // Safe: Child only calls `_exit`, which is signal-safe -- match fork().expect("Error: Fork Failed") { -+ match unsafe{fork()}.expect("Error: Fork Failed") { - Child => unsafe { _exit(0) }, - Parent { child } => { - let wait_status = wait(); -@@ -81,8 +94,9 @@ fn test_mkstemp_directory() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_mkfifo() { -- let tempdir = tempfile::tempdir().unwrap(); -+ let tempdir = tempdir().unwrap(); - let mkfifo_fifo = tempdir.path().join("mkfifo_fifo"); - - mkfifo(&mkfifo_fifo, Mode::S_IRUSR).unwrap(); -@@ -93,11 +107,70 @@ fn test_mkfifo() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_mkfifo_directory() { - // mkfifo should fail if a directory is given - assert!(mkfifo(&env::temp_dir(), Mode::S_IRUSR).is_err()); - } - -+#[test] -+#[cfg(not(any( -+ target_os = "macos", target_os = "ios", -+ target_os = "android", target_os = "redox")))] -+fn test_mkfifoat_none() { -+ let _m = crate::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ -+ let tempdir = tempdir().unwrap(); -+ let mkfifoat_fifo = tempdir.path().join("mkfifoat_fifo"); -+ -+ mkfifoat(None, &mkfifoat_fifo, Mode::S_IRUSR).unwrap(); -+ -+ let stats = stat::stat(&mkfifoat_fifo).unwrap(); -+ let typ = stat::SFlag::from_bits_truncate(stats.st_mode); -+ assert_eq!(typ, SFlag::S_IFIFO); -+} -+ -+#[test] -+#[cfg(not(any( -+ target_os = "macos", target_os = "ios", -+ target_os = "android", target_os = "redox")))] -+fn test_mkfifoat() { -+ let tempdir = tempdir().unwrap(); -+ let dirfd = open(tempdir.path(), OFlag::empty(), Mode::empty()).unwrap(); -+ let mkfifoat_name = "mkfifoat_name"; -+ -+ mkfifoat(Some(dirfd), mkfifoat_name, Mode::S_IRUSR).unwrap(); -+ -+ let stats = stat::fstatat(dirfd, mkfifoat_name, fcntl::AtFlags::empty()).unwrap(); -+ let typ = stat::SFlag::from_bits_truncate(stats.st_mode); -+ assert_eq!(typ, SFlag::S_IFIFO); -+} -+ -+#[test] -+#[cfg(not(any( -+ target_os = "macos", target_os = "ios", -+ target_os = "android", target_os = "redox")))] -+fn test_mkfifoat_directory_none() { -+ let _m = crate::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ -+ // mkfifoat should fail if a directory is given -+ assert!(!mkfifoat(None, &env::temp_dir(), Mode::S_IRUSR).is_ok()); -+} -+ -+#[test] -+#[cfg(not(any( -+ target_os = "macos", target_os = "ios", -+ target_os = "android", target_os = "redox")))] -+fn test_mkfifoat_directory() { -+ // mkfifoat should fail if a directory is given -+ let tempdir = tempdir().unwrap(); -+ let dirfd = open(tempdir.path(), OFlag::empty(), Mode::empty()).unwrap(); -+ let mkfifoat_dir = "mkfifoat_dir"; -+ stat::mkdirat(dirfd, mkfifoat_dir, Mode::S_IRUSR).unwrap(); -+ -+ assert!(!mkfifoat(Some(dirfd), mkfifoat_dir, Mode::S_IRUSR).is_ok()); -+} -+ - #[test] - fn test_getpid() { - let pid: ::libc::pid_t = getpid().into(); -@@ -107,11 +180,12 @@ fn test_getpid() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_getsid() { - let none_sid: ::libc::pid_t = getsid(None).unwrap().into(); - let pid_sid: ::libc::pid_t = getsid(Some(getpid())).unwrap().into(); - assert!(none_sid > 0); -- assert!(none_sid == pid_sid); -+ assert_eq!(none_sid, pid_sid); - } - - #[cfg(any(target_os = "linux", target_os = "android"))] -@@ -127,12 +201,12 @@ mod linux_android { - - #[test] - // `getgroups()` and `setgroups()` do not behave as expected on Apple platforms --#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+#[cfg(not(any(target_os = "ios", target_os = "macos", target_os = "redox", target_os = "fuchsia")))] - fn test_setgroups() { - // Skip this test when not run as root as `setgroups()` requires root. - skip_if_not_root!("test_setgroups"); - -- let _m = ::GROUPS_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::GROUPS_MTX.lock().expect("Mutex got poisoned by another test"); - - // Save the existing groups - let old_groups = getgroups().unwrap(); -@@ -150,13 +224,13 @@ fn test_setgroups() { - - #[test] - // `getgroups()` and `setgroups()` do not behave as expected on Apple platforms --#[cfg(not(any(target_os = "ios", target_os = "macos")))] -+#[cfg(not(any(target_os = "ios", target_os = "macos", target_os = "redox", target_os = "fuchsia")))] - fn test_initgroups() { - // Skip this test when not run as root as `initgroups()` and `setgroups()` - // require root. - skip_if_not_root!("test_initgroups"); - -- let _m = ::GROUPS_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::GROUPS_MTX.lock().expect("Mutex got poisoned by another test"); - - // Save the existing groups - let old_groups = getgroups().unwrap(); -@@ -180,11 +254,53 @@ fn test_initgroups() { - setgroups(&old_groups).unwrap(); - } - -+#[cfg(not(target_os = "redox"))] - macro_rules! execve_test_factory( - ($test_name:ident, $syscall:ident, $exe: expr $(, $pathname:expr, $flags:expr)*) => ( -- #[test] -- fn $test_name() { -- let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ -+ #[cfg(test)] -+ mod $test_name { -+ use std::ffi::CStr; -+ use super::*; -+ -+ const EMPTY: &'static [u8] = b"\0"; -+ const DASH_C: &'static [u8] = b"-c\0"; -+ const BIGARG: &'static [u8] = b"echo nix!!! && echo foo=$foo && echo baz=$baz\0"; -+ const FOO: &'static [u8] = b"foo=bar\0"; -+ const BAZ: &'static [u8] = b"baz=quux\0"; -+ -+ fn syscall_cstr_ref() -> Result<std::convert::Infallible, nix::Error> { -+ $syscall( -+ $exe, -+ $(CString::new($pathname).unwrap().as_c_str(), )* -+ &[CStr::from_bytes_with_nul(EMPTY).unwrap(), -+ CStr::from_bytes_with_nul(DASH_C).unwrap(), -+ CStr::from_bytes_with_nul(BIGARG).unwrap()], -+ &[CStr::from_bytes_with_nul(FOO).unwrap(), -+ CStr::from_bytes_with_nul(BAZ).unwrap()] -+ $(, $flags)*) -+ } -+ -+ fn syscall_cstring() -> Result<std::convert::Infallible, nix::Error> { -+ $syscall( -+ $exe, -+ $(CString::new($pathname).unwrap().as_c_str(), )* -+ &[CString::from(CStr::from_bytes_with_nul(EMPTY).unwrap()), -+ CString::from(CStr::from_bytes_with_nul(DASH_C).unwrap()), -+ CString::from(CStr::from_bytes_with_nul(BIGARG).unwrap())], -+ &[CString::from(CStr::from_bytes_with_nul(FOO).unwrap()), -+ CString::from(CStr::from_bytes_with_nul(BAZ).unwrap())] -+ $(, $flags)*) -+ } -+ -+ fn common_test(syscall: fn() -> Result<std::convert::Infallible, nix::Error>) { -+ if "execveat" == stringify!($syscall) { -+ // Though undocumented, Docker's default seccomp profile seems to -+ // block this syscall. https://github.com/nix-rust/nix/issues/1122 -+ skip_if_seccomp!($test_name); -+ } -+ -+ let m = crate::FORK_MTX.lock().expect("Mutex got poisoned by another test"); - // The `exec`d process will write to `writer`, and we'll read that - // data from `reader`. - let (reader, writer) = pipe().unwrap(); -@@ -192,27 +308,21 @@ macro_rules! execve_test_factory( - // Safe: Child calls `exit`, `dup`, `close` and the provided `exec*` family function. - // NOTE: Technically, this makes the macro unsafe to use because you could pass anything. - // The tests make sure not to do that, though. -- match fork().unwrap() { -+ match unsafe{fork()}.unwrap() { - Child => { -- // Close stdout. -- close(1).unwrap(); - // Make `writer` be the stdout of the new process. -- dup(writer).unwrap(); -- // exec! -- $syscall( -- $exe, -- $(&CString::new($pathname).unwrap(), )* -- &[CString::new(b"".as_ref()).unwrap(), -- CString::new(b"-c".as_ref()).unwrap(), -- CString::new(b"echo nix!!! && echo foo=$foo && echo baz=$baz" -- .as_ref()).unwrap()], -- &[CString::new(b"foo=bar".as_ref()).unwrap(), -- CString::new(b"baz=quux".as_ref()).unwrap()] -- $(, $flags)*).unwrap(); -+ dup2(writer, 1).unwrap(); -+ let r = syscall(); -+ let _ = std::io::stderr() -+ .write_all(format!("{:?}", r).as_bytes()); -+ // Should only get here in event of error -+ unsafe{ _exit(1) }; - }, - Parent { child } => { - // Wait for the child to exit. -- waitpid(child, None).unwrap(); -+ let ws = waitpid(child, None); -+ drop(m); -+ assert_eq!(ws, Ok(WaitStatus::Exited(child, 0))); - // Read 1024 bytes. - let mut buf = [0u8; 1024]; - read(reader, &mut buf).unwrap(); -@@ -224,23 +334,43 @@ macro_rules! execve_test_factory( - } - } - } -+ -+ // These tests frequently fail on musl, probably due to -+ // https://github.com/nix-rust/nix/issues/555 -+ #[cfg_attr(target_env = "musl", ignore)] -+ #[test] -+ fn test_cstr_ref() { -+ common_test(syscall_cstr_ref); -+ } -+ -+ // These tests frequently fail on musl, probably due to -+ // https://github.com/nix-rust/nix/issues/555 -+ #[cfg_attr(target_env = "musl", ignore)] -+ #[test] -+ fn test_cstring() { -+ common_test(syscall_cstring); -+ } -+ } -+ - ) - ); - - cfg_if!{ - if #[cfg(target_os = "android")] { -- execve_test_factory!(test_execve, execve, &CString::new("/system/bin/sh").unwrap()); -+ execve_test_factory!(test_execve, execve, CString::new("/system/bin/sh").unwrap().as_c_str()); - execve_test_factory!(test_fexecve, fexecve, File::open("/system/bin/sh").unwrap().into_raw_fd()); - } else if #[cfg(any(target_os = "freebsd", - target_os = "linux"))] { -- execve_test_factory!(test_execve, execve, &CString::new("/bin/sh").unwrap()); -+ // These tests frequently fail on musl, probably due to -+ // https://github.com/nix-rust/nix/issues/555 -+ execve_test_factory!(test_execve, execve, CString::new("/bin/sh").unwrap().as_c_str()); - execve_test_factory!(test_fexecve, fexecve, File::open("/bin/sh").unwrap().into_raw_fd()); - } else if #[cfg(any(target_os = "dragonfly", - target_os = "ios", - target_os = "macos", - target_os = "netbsd", - target_os = "openbsd"))] { -- execve_test_factory!(test_execve, execve, &CString::new("/bin/sh").unwrap()); -+ execve_test_factory!(test_execve, execve, CString::new("/bin/sh").unwrap().as_c_str()); - // No fexecve() on DragonFly, ios, macos, NetBSD, OpenBSD. - // - // Note for NetBSD and OpenBSD: although rust-lang/libc includes it -@@ -255,13 +385,16 @@ execve_test_factory!(test_execvpe, execvpe, &CString::new("sh").unwrap()); - cfg_if!{ - if #[cfg(target_os = "android")] { - use nix::fcntl::AtFlags; -- execve_test_factory!(test_execveat_empty, execveat, File::open("/system/bin/sh").unwrap().into_raw_fd(), -+ execve_test_factory!(test_execveat_empty, execveat, -+ File::open("/system/bin/sh").unwrap().into_raw_fd(), - "", AtFlags::AT_EMPTY_PATH); -- execve_test_factory!(test_execveat_relative, execveat, File::open("/system/bin/").unwrap().into_raw_fd(), -+ execve_test_factory!(test_execveat_relative, execveat, -+ File::open("/system/bin/").unwrap().into_raw_fd(), - "./sh", AtFlags::empty()); -- execve_test_factory!(test_execveat_absolute, execveat, File::open("/").unwrap().into_raw_fd(), -+ execve_test_factory!(test_execveat_absolute, execveat, -+ File::open("/").unwrap().into_raw_fd(), - "/system/bin/sh", AtFlags::empty()); -- } else if #[cfg(all(target_os = "linux"), any(target_arch ="x86_64", target_arch ="x86"))] { -+ } else if #[cfg(all(target_os = "linux", any(target_arch ="x86_64", target_arch ="x86")))] { - use nix::fcntl::AtFlags; - execve_test_factory!(test_execveat_empty, execveat, File::open("/bin/sh").unwrap().into_raw_fd(), - "", AtFlags::AT_EMPTY_PATH); -@@ -273,11 +406,12 @@ cfg_if!{ - } - - #[test] -+#[cfg(not(target_os = "fuchsia"))] - fn test_fchdir() { - // fchdir changes the process's cwd -- let _dr = ::DirRestore::new(); -+ let _dr = crate::DirRestore::new(); - -- let tmpdir = tempfile::tempdir().unwrap(); -+ let tmpdir = tempdir().unwrap(); - let tmpdir_path = tmpdir.path().canonicalize().unwrap(); - let tmpdir_fd = File::open(&tmpdir_path).unwrap().into_raw_fd(); - -@@ -290,9 +424,9 @@ fn test_fchdir() { - #[test] - fn test_getcwd() { - // chdir changes the process's cwd -- let _dr = ::DirRestore::new(); -+ let _dr = crate::DirRestore::new(); - -- let tmpdir = tempfile::tempdir().unwrap(); -+ let tmpdir = tempdir().unwrap(); - let tmpdir_path = tmpdir.path().canonicalize().unwrap(); - assert!(chdir(&tmpdir_path).is_ok()); - assert_eq!(getcwd().unwrap(), tmpdir_path); -@@ -317,7 +451,7 @@ fn test_chown() { - let uid = Some(getuid()); - let gid = Some(getgid()); - -- let tempdir = tempfile::tempdir().unwrap(); -+ let tempdir = tempdir().unwrap(); - let path = tempdir.path().join("file"); - { - File::create(&path).unwrap(); -@@ -332,13 +466,29 @@ fn test_chown() { - } - - #[test] -+fn test_fchown() { -+ // Testing for anything other than our own UID/GID is hard. -+ let uid = Some(getuid()); -+ let gid = Some(getgid()); -+ -+ let path = tempfile().unwrap(); -+ let fd = path.as_raw_fd(); -+ -+ fchown(fd, uid, gid).unwrap(); -+ fchown(fd, uid, None).unwrap(); -+ fchown(fd, None, gid).unwrap(); -+ fchown(999999999, uid, gid).unwrap_err(); -+} -+ -+#[test] -+#[cfg(not(target_os = "redox"))] - fn test_fchownat() { -- let _dr = ::DirRestore::new(); -+ let _dr = crate::DirRestore::new(); - // Testing for anything other than our own UID/GID is hard. - let uid = Some(getuid()); - let gid = Some(getgid()); - -- let tempdir = tempfile::tempdir().unwrap(); -+ let tempdir = tempdir().unwrap(); - let path = tempdir.path().join("file"); - { - File::create(&path).unwrap(); -@@ -366,7 +516,7 @@ fn test_lseek() { - lseek(tmpfd, offset, Whence::SeekSet).unwrap(); - - let mut buf = [0u8; 7]; -- ::read_exact(tmpfd, &mut buf); -+ crate::read_exact(tmpfd, &mut buf); - assert_eq!(b"f123456", &buf); - - close(tmpfd).unwrap(); -@@ -383,7 +533,7 @@ fn test_lseek64() { - lseek64(tmpfd, 5, Whence::SeekSet).unwrap(); - - let mut buf = [0u8; 7]; -- ::read_exact(tmpfd, &mut buf); -+ crate::read_exact(tmpfd, &mut buf); - assert_eq!(b"f123456", &buf); - - close(tmpfd).unwrap(); -@@ -403,7 +553,7 @@ cfg_if!{ - skip_if_jailed!("test_acct"); - } - } -- } else { -+ } else if #[cfg(not(any(target_os = "redox", target_os = "fuchsia")))] { - macro_rules! require_acct{ - () => { - skip_if_not_root!("test_acct"); -@@ -413,12 +563,13 @@ cfg_if!{ - } - - #[test] -+#[cfg(not(any(target_os = "redox", target_os = "fuchsia")))] - fn test_acct() { - use tempfile::NamedTempFile; - use std::process::Command; - use std::{thread, time}; - -- let _m = ::FORK_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::FORK_MTX.lock().expect("Mutex got poisoned by another test"); - require_acct!(); - - let file = NamedTempFile::new().unwrap(); -@@ -481,6 +632,14 @@ fn test_pipe() { - - // pipe2(2) is the same as pipe(2), except it allows setting some flags. Check - // that we can set a flag. -+#[cfg(any(target_os = "android", -+ target_os = "dragonfly", -+ target_os = "emscripten", -+ target_os = "freebsd", -+ target_os = "linux", -+ target_os = "netbsd", -+ target_os = "openbsd", -+ target_os = "redox"))] - #[test] - fn test_pipe2() { - let (fd0, fd1) = pipe2(OFlag::O_CLOEXEC).unwrap(); -@@ -491,8 +650,9 @@ fn test_pipe2() { - } - - #[test] -+#[cfg(not(any(target_os = "redox", target_os = "fuchsia")))] - fn test_truncate() { -- let tempdir = tempfile::tempdir().unwrap(); -+ let tempdir = tempdir().unwrap(); - let path = tempdir.path().join("file"); - - { -@@ -509,7 +669,7 @@ fn test_truncate() { - - #[test] - fn test_ftruncate() { -- let tempdir = tempfile::tempdir().unwrap(); -+ let tempdir = tempdir().unwrap(); - let path = tempdir.path().join("file"); - - let tmpfd = { -@@ -527,17 +687,26 @@ fn test_ftruncate() { - } - - // Used in `test_alarm`. -+#[cfg(not(target_os = "redox"))] - static mut ALARM_CALLED: bool = false; - - // Used in `test_alarm`. -+#[cfg(not(target_os = "redox"))] - pub extern fn alarm_signal_handler(raw_signal: libc::c_int) { - assert_eq!(raw_signal, libc::SIGALRM, "unexpected signal: {}", raw_signal); - unsafe { ALARM_CALLED = true }; - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_alarm() { -- let _m = ::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ use std::{ -+ time::{Duration, Instant,}, -+ thread -+ }; -+ -+ // Maybe other tests that fork interfere with this one? -+ let _m = crate::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); - - let handler = SigHandler::Handler(alarm_signal_handler); - let signal_action = SigAction::new(handler, SaFlags::SA_RESTART, SigSet::empty()); -@@ -554,8 +723,16 @@ fn test_alarm() { - - // We should be woken up after 1 second by the alarm, so we'll sleep for 2 - // seconds to be sure. -- sleep(2); -- assert_eq!(unsafe { ALARM_CALLED }, true, "expected our alarm signal handler to be called"); -+ let starttime = Instant::now(); -+ loop { -+ thread::sleep(Duration::from_millis(100)); -+ if unsafe { ALARM_CALLED} { -+ break; -+ } -+ if starttime.elapsed() > Duration::from_secs(3) { -+ panic!("Timeout waiting for SIGALRM"); -+ } -+ } - - // Reset the signal. - unsafe { -@@ -565,8 +742,9 @@ fn test_alarm() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_canceling_alarm() { -- let _m = ::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); -+ let _m = crate::SIGNAL_MTX.lock().expect("Mutex got poisoned by another test"); - - assert_eq!(alarm::cancel(), None); - -@@ -575,15 +753,17 @@ fn test_canceling_alarm() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_symlinkat() { -- let mut buf = [0; 1024]; -- let tempdir = tempfile::tempdir().unwrap(); -+ let _m = crate::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ -+ let tempdir = tempdir().unwrap(); - - let target = tempdir.path().join("a"); - let linkpath = tempdir.path().join("b"); - symlinkat(&target, None, &linkpath).unwrap(); - assert_eq!( -- readlink(&linkpath, &mut buf).unwrap().to_str().unwrap(), -+ readlink(&linkpath).unwrap().to_str().unwrap(), - target.to_str().unwrap() - ); - -@@ -592,7 +772,7 @@ fn test_symlinkat() { - let linkpath = "d"; - symlinkat(target, Some(dirfd), linkpath).unwrap(); - assert_eq!( -- readlink(&tempdir.path().join(linkpath), &mut buf) -+ readlink(&tempdir.path().join(linkpath)) - .unwrap() - .to_str() - .unwrap(), -@@ -600,10 +780,154 @@ fn test_symlinkat() { - ); - } - -+#[test] -+#[cfg(not(target_os = "redox"))] -+fn test_linkat_file() { -+ let tempdir = tempdir().unwrap(); -+ let oldfilename = "foo.txt"; -+ let oldfilepath = tempdir.path().join(oldfilename); -+ -+ let newfilename = "bar.txt"; -+ let newfilepath = tempdir.path().join(newfilename); -+ -+ // Create file -+ File::create(&oldfilepath).unwrap(); -+ -+ // Get file descriptor for base directory -+ let dirfd = fcntl::open(tempdir.path(), fcntl::OFlag::empty(), stat::Mode::empty()).unwrap(); -+ -+ // Attempt hard link file at relative path -+ linkat(Some(dirfd), oldfilename, Some(dirfd), newfilename, LinkatFlags::SymlinkFollow).unwrap(); -+ assert!(newfilepath.exists()); -+} -+ -+#[test] -+#[cfg(not(target_os = "redox"))] -+fn test_linkat_olddirfd_none() { -+ let _dr = crate::DirRestore::new(); -+ -+ let tempdir_oldfile = tempdir().unwrap(); -+ let oldfilename = "foo.txt"; -+ let oldfilepath = tempdir_oldfile.path().join(oldfilename); -+ -+ let tempdir_newfile = tempdir().unwrap(); -+ let newfilename = "bar.txt"; -+ let newfilepath = tempdir_newfile.path().join(newfilename); -+ -+ // Create file -+ File::create(&oldfilepath).unwrap(); -+ -+ // Get file descriptor for base directory of new file -+ let dirfd = fcntl::open(tempdir_newfile.path(), fcntl::OFlag::empty(), stat::Mode::empty()).unwrap(); -+ -+ // Attempt hard link file using curent working directory as relative path for old file path -+ chdir(tempdir_oldfile.path()).unwrap(); -+ linkat(None, oldfilename, Some(dirfd), newfilename, LinkatFlags::SymlinkFollow).unwrap(); -+ assert!(newfilepath.exists()); -+} -+ -+#[test] -+#[cfg(not(target_os = "redox"))] -+fn test_linkat_newdirfd_none() { -+ let _dr = crate::DirRestore::new(); -+ -+ let tempdir_oldfile = tempdir().unwrap(); -+ let oldfilename = "foo.txt"; -+ let oldfilepath = tempdir_oldfile.path().join(oldfilename); -+ -+ let tempdir_newfile = tempdir().unwrap(); -+ let newfilename = "bar.txt"; -+ let newfilepath = tempdir_newfile.path().join(newfilename); -+ -+ // Create file -+ File::create(&oldfilepath).unwrap(); -+ -+ // Get file descriptor for base directory of old file -+ let dirfd = fcntl::open(tempdir_oldfile.path(), fcntl::OFlag::empty(), stat::Mode::empty()).unwrap(); -+ -+ // Attempt hard link file using current working directory as relative path for new file path -+ chdir(tempdir_newfile.path()).unwrap(); -+ linkat(Some(dirfd), oldfilename, None, newfilename, LinkatFlags::SymlinkFollow).unwrap(); -+ assert!(newfilepath.exists()); -+} -+ -+#[test] -+#[cfg(not(any(target_os = "ios", target_os = "macos", target_os = "redox")))] -+fn test_linkat_no_follow_symlink() { -+ let _m = crate::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ -+ let tempdir = tempdir().unwrap(); -+ let oldfilename = "foo.txt"; -+ let oldfilepath = tempdir.path().join(oldfilename); -+ -+ let symoldfilename = "symfoo.txt"; -+ let symoldfilepath = tempdir.path().join(symoldfilename); -+ -+ let newfilename = "nofollowsymbar.txt"; -+ let newfilepath = tempdir.path().join(newfilename); -+ -+ // Create file -+ File::create(&oldfilepath).unwrap(); -+ -+ // Create symlink to file -+ symlinkat(&oldfilepath, None, &symoldfilepath).unwrap(); -+ -+ // Get file descriptor for base directory -+ let dirfd = fcntl::open(tempdir.path(), fcntl::OFlag::empty(), stat::Mode::empty()).unwrap(); -+ -+ // Attempt link symlink of file at relative path -+ linkat(Some(dirfd), symoldfilename, Some(dirfd), newfilename, LinkatFlags::NoSymlinkFollow).unwrap(); -+ -+ // Assert newfile is actually a symlink to oldfile. -+ assert_eq!( -+ readlink(&newfilepath) -+ .unwrap() -+ .to_str() -+ .unwrap(), -+ oldfilepath.to_str().unwrap() -+ ); -+} -+ -+#[test] -+#[cfg(not(target_os = "redox"))] -+fn test_linkat_follow_symlink() { -+ let _m = crate::CWD_LOCK.read().expect("Mutex got poisoned by another test"); -+ -+ let tempdir = tempdir().unwrap(); -+ let oldfilename = "foo.txt"; -+ let oldfilepath = tempdir.path().join(oldfilename); -+ -+ let symoldfilename = "symfoo.txt"; -+ let symoldfilepath = tempdir.path().join(symoldfilename); -+ -+ let newfilename = "nofollowsymbar.txt"; -+ let newfilepath = tempdir.path().join(newfilename); -+ -+ // Create file -+ File::create(&oldfilepath).unwrap(); -+ -+ // Create symlink to file -+ symlinkat(&oldfilepath, None, &symoldfilepath).unwrap(); -+ -+ // Get file descriptor for base directory -+ let dirfd = fcntl::open(tempdir.path(), fcntl::OFlag::empty(), stat::Mode::empty()).unwrap(); -+ -+ // Attempt link target of symlink of file at relative path -+ linkat(Some(dirfd), symoldfilename, Some(dirfd), newfilename, LinkatFlags::SymlinkFollow).unwrap(); -+ -+ let newfilestat = stat::stat(&newfilepath).unwrap(); -+ -+ // Check the file type of the new link -+ assert!((stat::SFlag::from_bits_truncate(newfilestat.st_mode) & SFlag::S_IFMT) == SFlag::S_IFREG); -+ -+ // Check the number of hard links to the original file -+ assert_eq!(newfilestat.st_nlink, 2); -+} - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_unlinkat_dir_noremovedir() { -- let tempdir = tempfile::tempdir().unwrap(); -+ let tempdir = tempdir().unwrap(); - let dirname = "foo_dir"; - let dirpath = tempdir.path().join(dirname); - -@@ -619,8 +943,9 @@ fn test_unlinkat_dir_noremovedir() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_unlinkat_dir_removedir() { -- let tempdir = tempfile::tempdir().unwrap(); -+ let tempdir = tempdir().unwrap(); - let dirname = "foo_dir"; - let dirpath = tempdir.path().join(dirname); - -@@ -636,8 +961,9 @@ fn test_unlinkat_dir_removedir() { - } - - #[test] -+#[cfg(not(target_os = "redox"))] - fn test_unlinkat_file() { -- let tempdir = tempfile::tempdir().unwrap(); -+ let tempdir = tempdir().unwrap(); - let filename = "foo.txt"; - let filepath = tempdir.path().join(filename); - -@@ -654,7 +980,7 @@ fn test_unlinkat_file() { - - #[test] - fn test_access_not_existing() { -- let tempdir = tempfile::tempdir().unwrap(); -+ let tempdir = tempdir().unwrap(); - let dir = tempdir.path().join("does_not_exist.txt"); - assert_eq!(access(&dir, AccessFlags::F_OK).err().unwrap().as_errno().unwrap(), - Errno::ENOENT); -@@ -662,8 +988,123 @@ fn test_access_not_existing() { - - #[test] - fn test_access_file_exists() { -- let tempdir = tempfile::tempdir().unwrap(); -+ let tempdir = tempdir().unwrap(); - let path = tempdir.path().join("does_exist.txt"); - let _file = File::create(path.clone()).unwrap(); - assert!(access(&path, AccessFlags::R_OK | AccessFlags::W_OK).is_ok()); - } -+ -+/// Tests setting the filesystem UID with `setfsuid`. -+#[cfg(any(target_os = "linux", target_os = "android"))] -+#[test] -+fn test_setfsuid() { -+ use std::os::unix::fs::PermissionsExt; -+ use std::{fs, io, thread}; -+ require_capability!(CAP_SETUID); -+ -+ // get the UID of the "nobody" user -+ let nobody = User::from_name("nobody").unwrap().unwrap(); -+ -+ // create a temporary file with permissions '-rw-r-----' -+ let file = tempfile::NamedTempFile::new_in("/var/tmp").unwrap(); -+ let temp_path = file.into_temp_path(); -+ dbg!(&temp_path); -+ let temp_path_2 = (&temp_path).to_path_buf(); -+ let mut permissions = fs::metadata(&temp_path).unwrap().permissions(); -+ permissions.set_mode(640); -+ -+ // spawn a new thread where to test setfsuid -+ thread::spawn(move || { -+ // set filesystem UID -+ let fuid = setfsuid(nobody.uid); -+ // trying to open the temporary file should fail with EACCES -+ let res = fs::File::open(&temp_path); -+ assert!(res.is_err()); -+ assert_eq!(res.err().unwrap().kind(), io::ErrorKind::PermissionDenied); -+ -+ // assert fuid actually changes -+ let prev_fuid = setfsuid(Uid::from_raw(-1i32 as u32)); -+ assert_ne!(prev_fuid, fuid); -+ }) -+ .join() -+ .unwrap(); -+ -+ // open the temporary file with the current thread filesystem UID -+ fs::File::open(temp_path_2).unwrap(); -+} -+ -+#[test] -+#[cfg(not(any(target_os = "redox", target_os = "fuchsia")))] -+fn test_ttyname() { -+ let fd = posix_openpt(OFlag::O_RDWR).expect("posix_openpt failed"); -+ assert!(fd.as_raw_fd() > 0); -+ -+ // on linux, we can just call ttyname on the pty master directly, but -+ // apparently osx requires that ttyname is called on a slave pty (can't -+ // find this documented anywhere, but it seems to empirically be the case) -+ grantpt(&fd).expect("grantpt failed"); -+ unlockpt(&fd).expect("unlockpt failed"); -+ let sname = unsafe { ptsname(&fd) }.expect("ptsname failed"); -+ let fds = open( -+ Path::new(&sname), -+ OFlag::O_RDWR, -+ stat::Mode::empty(), -+ ).expect("open failed"); -+ assert!(fds > 0); -+ -+ let name = ttyname(fds).expect("ttyname failed"); -+ assert!(name.starts_with("/dev")); -+} -+ -+#[test] -+#[cfg(not(any(target_os = "redox", target_os = "fuchsia")))] -+fn test_ttyname_not_pty() { -+ let fd = File::open("/dev/zero").unwrap(); -+ assert!(fd.as_raw_fd() > 0); -+ assert_eq!(ttyname(fd.as_raw_fd()), Err(Error::Sys(Errno::ENOTTY))); -+} -+ -+#[test] -+#[cfg(not(any(target_os = "redox", target_os = "fuchsia")))] -+fn test_ttyname_invalid_fd() { -+ assert_eq!(ttyname(-1), Err(Error::Sys(Errno::EBADF))); -+} -+ -+#[test] -+#[cfg(any( -+ target_os = "macos", -+ target_os = "ios", -+ target_os = "freebsd", -+ target_os = "openbsd", -+ target_os = "netbsd", -+ target_os = "dragonfly", -+))] -+fn test_getpeereid() { -+ use std::os::unix::net::UnixStream; -+ let (sock_a, sock_b) = UnixStream::pair().unwrap(); -+ -+ let (uid_a, gid_a) = getpeereid(sock_a.as_raw_fd()).unwrap(); -+ let (uid_b, gid_b) = getpeereid(sock_b.as_raw_fd()).unwrap(); -+ -+ let uid = geteuid(); -+ let gid = getegid(); -+ -+ assert_eq!(uid, uid_a); -+ assert_eq!(gid, gid_a); -+ assert_eq!(uid_a, uid_b); -+ assert_eq!(gid_a, gid_b); -+} -+ -+#[test] -+#[cfg(any( -+ target_os = "macos", -+ target_os = "ios", -+ target_os = "freebsd", -+ target_os = "openbsd", -+ target_os = "netbsd", -+ target_os = "dragonfly", -+))] -+fn test_getpeereid_invalid_fd() { -+ // getpeereid is not POSIX, so error codes are inconsistent between different Unices. -+ assert!(getpeereid(-1).is_err()); -+} |