1 // Copyright 2012 The Rust Project Developers. See the COPYRIGHT
2 // file at the top-level directory of this distribution and at
3 // http://rust-lang.org/COPYRIGHT.
5 // Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
6 // http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
7 // <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
8 // option. This file may not be copied, modified, or distributed
9 // except according to those terms.
11 //! Finds crate binaries and loads their metadata
13 //! Might I be the first to welcome you to a world of platform differences,
14 //! version requirements, dependency graphs, conficting desires, and fun! This
15 //! is the major guts (along with metadata::creader) of the compiler for loading
16 //! crates and resolving dependencies. Let's take a tour!
20 //! Each invocation of the compiler is immediately concerned with one primary
21 //! problem, to connect a set of crates to resolved crates on the filesystem.
22 //! Concretely speaking, the compiler follows roughly these steps to get here:
24 //! 1. Discover a set of `extern crate` statements.
25 //! 2. Transform these directives into crate names. If the directive does not
26 //! have an explicit name, then the identifier is the name.
27 //! 3. For each of these crate names, find a corresponding crate on the
30 //! Sounds easy, right? Let's walk into some of the nuances.
32 //! ## Transitive Dependencies
34 //! Let's say we've got three crates: A, B, and C. A depends on B, and B depends
35 //! on C. When we're compiling A, we primarily need to find and locate B, but we
36 //! also end up needing to find and locate C as well.
38 //! The reason for this is that any of B's types could be composed of C's types,
39 //! any function in B could return a type from C, etc. To be able to guarantee
40 //! that we can always typecheck/translate any function, we have to have
41 //! complete knowledge of the whole ecosystem, not just our immediate
44 //! So now as part of the "find a corresponding crate on the filesystem" step
45 //! above, this involves also finding all crates for *all upstream
46 //! dependencies*. This includes all dependencies transitively.
48 //! ## Rlibs and Dylibs
50 //! The compiler has two forms of intermediate dependencies. These are dubbed
51 //! rlibs and dylibs for the static and dynamic variants, respectively. An rlib
52 //! is a rustc-defined file format (currently just an ar archive) while a dylib
53 //! is a platform-defined dynamic library. Each library has a metadata somewhere
56 //! When translating a crate name to a crate on the filesystem, we all of a
57 //! sudden need to take into account both rlibs and dylibs! Linkage later on may
58 //! use either one of these files, as each has their pros/cons. The job of crate
59 //! loading is to discover what's possible by finding all candidates.
61 //! Most parts of this loading systems keep the dylib/rlib as just separate
66 //! We can't exactly scan your whole hard drive when looking for dependencies,
67 //! so we need to places to look. Currently the compiler will implicitly add the
68 //! target lib search path ($prefix/lib/rustlib/$target/lib) to any compilation,
69 //! and otherwise all -L flags are added to the search paths.
71 //! ## What criterion to select on?
73 //! This a pretty tricky area of loading crates. Given a file, how do we know
74 //! whether it's the right crate? Currently, the rules look along these lines:
76 //! 1. Does the filename match an rlib/dylib pattern? That is to say, does the
77 //! filename have the right prefix/suffix?
78 //! 2. Does the filename have the right prefix for the crate name being queried?
79 //! This is filtering for files like `libfoo*.rlib` and such.
80 //! 3. Is the file an actual rust library? This is done by loading the metadata
81 //! from the library and making sure it's actually there.
82 //! 4. Does the name in the metadata agree with the name of the library?
83 //! 5. Does the target in the metadata agree with the current target?
84 //! 6. Does the SVH match? (more on this later)
86 //! If the file answeres `yes` to all these questions, then the file is
87 //! considered as being *candidate* for being accepted. It is illegal to have
88 //! more than two candidates as the compiler has no method by which to resolve
89 //! this conflict. Additionally, rlib/dylib candidates are considered
92 //! After all this has happened, we have 1 or two files as candidates. These
93 //! represent the rlib/dylib file found for a library, and they're returned as
96 //! ### What about versions?
98 //! A lot of effort has been put forth to remove versioning from the compiler.
99 //! There have been forays in the past to have versioning baked in, but it was
100 //! largely always deemed insufficient to the point that it was recognized that
101 //! it's probably something the compiler shouldn't do anyway due to its
102 //! complicated nature and the state of the half-baked solutions.
104 //! With a departure from versioning, the primary criterion for loading crates
105 //! is just the name of a crate. If we stopped here, it would imply that you
106 //! could never link two crates of the same name from different sources
107 //! together, which is clearly a bad state to be in.
109 //! To resolve this problem, we come to the next section!
113 //! A number of flags have been added to the compiler to solve the "version
114 //! problem" in the previous section, as well as generally enabling more
115 //! powerful usage of the crate loading system of the compiler. The goal of
116 //! these flags and options are to enable third-party tools to drive the
117 //! compiler with prior knowledge about how the world should look.
119 //! ## The `--extern` flag
121 //! The compiler accepts a flag of this form a number of times:
124 //! --extern crate-name=path/to/the/crate.rlib
127 //! This flag is basically the following letter to the compiler:
131 //! > When you are attempting to load the immediate dependency `crate-name`, I
132 //! > would like you too assume that the library is located at
133 //! > `path/to/the/crate.rlib`, and look nowhere else. Also, please do not
134 //! > assume that the path I specified has the name `crate-name`.
136 //! This flag basically overrides most matching logic except for validating that
137 //! the file is indeed a rust library. The same `crate-name` can be specified
138 //! twice to specify the rlib/dylib pair.
140 //! ## Enabling "multiple versions"
142 //! This basically boils down to the ability to specify arbitrary packages to
143 //! the compiler. For example, if crate A wanted to use Bv1 and Bv2, then it
144 //! would look something like:
153 //! and the compiler would be invoked as:
156 //! rustc a.rs --extern b1=path/to/libb1.rlib --extern b2=path/to/libb2.rlib
159 //! In this scenario there are two crates named `b` and the compiler must be
160 //! manually driven to be informed where each crate is.
162 //! ## Frobbing symbols
164 //! One of the immediate problems with linking the same library together twice
165 //! in the same problem is dealing with duplicate symbols. The primary way to
166 //! deal with this in rustc is to add hashes to the end of each symbol.
168 //! In order to force hashes to change between versions of a library, if
169 //! desired, the compiler exposes an option `-C metadata=foo`, which is used to
170 //! initially seed each symbol hash. The string `foo` is prepended to each
171 //! string-to-hash to ensure that symbols change over time.
173 //! ## Loading transitive dependencies
175 //! Dealing with same-named-but-distinct crates is not just a local problem, but
176 //! one that also needs to be dealt with for transitive dependences. Note that
177 //! in the letter above `--extern` flags only apply to the *local* set of
178 //! dependencies, not the upstream transitive dependencies. Consider this
179 //! dependency graph:
191 //! In this scenario, when we compile `D`, we need to be able to distinctly
192 //! resolve `A.1` and `A.2`, but an `--extern` flag cannot apply to these
193 //! transitive dependencies.
195 //! Note that the key idea here is that `B` and `C` are both *already compiled*.
196 //! That is, they have already resolved their dependencies. Due to unrelated
197 //! technical reasons, when a library is compiled, it is only compatible with
198 //! the *exact same* version of the upstream libraries it was compiled against.
199 //! We use the "Strict Version Hash" to identify the exact copy of an upstream
202 //! With this knowledge, we know that `B` and `C` will depend on `A` with
203 //! different SVH values, so we crawl the normal `-L` paths looking for
204 //! `liba*.rlib` and filter based on the contained SVH.
206 //! In the end, this ends up not needing `--extern` to specify upstream
207 //! transitive dependencies.
211 //! That's the general overview of loading crates in the compiler, but it's by
212 //! no means all of the necessary details. Take a look at the rest of
213 //! metadata::loader or metadata::creader for all the juicy details!
215 use back::archive::{METADATA_FILENAME};
217 use driver::session::Session;
219 use llvm::{False, ObjectFile, mk_section_iter};
220 use llvm::archive_ro::ArchiveRO;
221 use metadata::cstore::{MetadataBlob, MetadataVec, MetadataArchive};
222 use metadata::decoder;
223 use metadata::encoder;
224 use metadata::filesearch::{FileSearch, FileMatches, FileDoesntMatch};
226 use syntax::codemap::Span;
227 use syntax::diagnostic::SpanHandler;
230 use std::c_str::ToCStr;
238 use std::collections::{HashMap, HashSet};
242 pub static MACOS_DLL_PREFIX: &'static str = "lib";
243 pub static MACOS_DLL_SUFFIX: &'static str = ".dylib";
245 pub static WIN32_DLL_PREFIX: &'static str = "";
246 pub static WIN32_DLL_SUFFIX: &'static str = ".dll";
248 pub static LINUX_DLL_PREFIX: &'static str = "lib";
249 pub static LINUX_DLL_SUFFIX: &'static str = ".so";
251 pub static FREEBSD_DLL_PREFIX: &'static str = "lib";
252 pub static FREEBSD_DLL_SUFFIX: &'static str = ".so";
254 pub static ANDROID_DLL_PREFIX: &'static str = "lib";
255 pub static ANDROID_DLL_SUFFIX: &'static str = ".so";
257 pub struct CrateMismatch {
262 pub struct Context<'a> {
263 pub sess: &'a Session,
266 pub crate_name: &'a str,
267 pub hash: Option<&'a Svh>,
270 pub filesearch: FileSearch<'a>,
271 pub root: &'a Option<CratePaths>,
272 pub rejected_via_hash: Vec<CrateMismatch>,
273 pub rejected_via_triple: Vec<CrateMismatch>,
274 pub should_match_name: bool,
278 pub dylib: Option<Path>,
279 pub rlib: Option<Path>,
280 pub metadata: MetadataBlob,
283 pub struct ArchiveMetadata {
285 // See comments in ArchiveMetadata::new for why this is static
289 pub struct CratePaths {
291 pub dylib: Option<Path>,
292 pub rlib: Option<Path>
296 fn paths(&self) -> Vec<Path> {
297 match (&self.dylib, &self.rlib) {
298 (&None, &None) => vec!(),
299 (&Some(ref p), &None) |
300 (&None, &Some(ref p)) => vec!(p.clone()),
301 (&Some(ref p1), &Some(ref p2)) => vec!(p1.clone(), p2.clone()),
306 impl<'a> Context<'a> {
307 pub fn maybe_load_library_crate(&mut self) -> Option<Library> {
308 self.find_library_crate()
311 pub fn load_library_crate(&mut self) -> Library {
312 match self.find_library_crate() {
315 self.report_load_errs();
321 pub fn report_load_errs(&mut self) {
322 let message = if self.rejected_via_hash.len() > 0 {
323 format!("found possibly newer version of crate `{}`",
325 } else if self.rejected_via_triple.len() > 0 {
326 format!("found incorrect triple for crate `{}`", self.ident)
328 format!("can't find crate for `{}`", self.ident)
330 let message = match self.root {
332 &Some(ref r) => format!("{} which `{}` depends on",
335 self.sess.span_err(self.span, message.as_slice());
337 let mismatches = self.rejected_via_triple.iter();
338 if self.rejected_via_triple.len() > 0 {
339 self.sess.span_note(self.span,
340 format!("expected triple of {}",
341 self.triple).as_slice());
342 for (i, &CrateMismatch{ ref path, ref got }) in mismatches.enumerate() {
343 self.sess.fileline_note(self.span,
344 format!("crate `{}` path {}{}, triple {}: {}",
345 self.ident, "#", i+1, got, path.display()).as_slice());
348 if self.rejected_via_hash.len() > 0 {
349 self.sess.span_note(self.span, "perhaps this crate needs \
351 let mismatches = self.rejected_via_hash.iter();
352 for (i, &CrateMismatch{ ref path, .. }) in mismatches.enumerate() {
353 self.sess.fileline_note(self.span,
354 format!("crate `{}` path {}{}: {}",
355 self.ident, "#", i+1, path.display()).as_slice());
360 for (i, path) in r.paths().iter().enumerate() {
361 self.sess.fileline_note(self.span,
362 format!("crate `{}` path #{}: {}",
363 r.ident, i+1, path.display()).as_slice());
368 self.sess.abort_if_errors();
371 fn find_library_crate(&mut self) -> Option<Library> {
372 // If an SVH is specified, then this is a transitive dependency that
373 // must be loaded via -L plus some filtering.
374 if self.hash.is_none() {
375 self.should_match_name = false;
376 match self.find_commandline_library() {
377 Some(l) => return Some(l),
380 self.should_match_name = true;
383 let dypair = self.dylibname();
385 // want: crate_name.dir_part() + prefix + crate_name.file_part + "-"
386 let dylib_prefix = dypair.map(|(prefix, _)| {
387 format!("{}{}", prefix, self.crate_name)
389 let rlib_prefix = format!("lib{}", self.crate_name);
391 let mut candidates = HashMap::new();
393 // First, find all possible candidate rlibs and dylibs purely based on
394 // the name of the files themselves. We're trying to match against an
395 // exact crate name and a possibly an exact hash.
397 // During this step, we can filter all found libraries based on the
398 // name and id found in the crate id (we ignore the path portion for
399 // filename matching), as well as the exact hash (if specified). If we
400 // end up having many candidates, we must look at the metadata to
401 // perform exact matches against hashes/crate ids. Note that opening up
402 // the metadata is where we do an exact match against the full contents
403 // of the crate id (path/name/id).
405 // The goal of this step is to look at as little metadata as possible.
406 self.filesearch.search(|path| {
407 let file = match path.filename_str() {
408 None => return FileDoesntMatch,
411 let (hash, rlib) = if file.starts_with(rlib_prefix.as_slice()) &&
412 file.ends_with(".rlib") {
413 (file.slice(rlib_prefix.len(), file.len() - ".rlib".len()),
415 } else if dypair.map_or(false, |(_, suffix)| {
416 file.starts_with(dylib_prefix.get_ref().as_slice()) &&
417 file.ends_with(suffix)
419 let (_, suffix) = dypair.unwrap();
420 let dylib_prefix = dylib_prefix.get_ref().as_slice();
421 (file.slice(dylib_prefix.len(), file.len() - suffix.len()),
424 return FileDoesntMatch
426 info!("lib candidate: {}", path.display());
427 let slot = candidates.find_or_insert_with(hash.to_string(), |_| {
428 (HashSet::new(), HashSet::new())
430 let (ref mut rlibs, ref mut dylibs) = *slot;
432 rlibs.insert(fs::realpath(path).unwrap());
434 dylibs.insert(fs::realpath(path).unwrap());
439 // We have now collected all known libraries into a set of candidates
440 // keyed of the filename hash listed. For each filename, we also have a
441 // list of rlibs/dylibs that apply. Here, we map each of these lists
442 // (per hash), to a Library candidate for returning.
444 // A Library candidate is created if the metadata for the set of
445 // libraries corresponds to the crate id and hash criteria that this
446 // search is being performed for.
447 let mut libraries = Vec::new();
448 for (_hash, (rlibs, dylibs)) in candidates.move_iter() {
449 let mut metadata = None;
450 let rlib = self.extract_one(rlibs, "rlib", &mut metadata);
451 let dylib = self.extract_one(dylibs, "dylib", &mut metadata);
454 libraries.push(Library {
464 // Having now translated all relevant found hashes into libraries, see
465 // what we've got and figure out if we found multiple candidates for
467 match libraries.len() {
469 1 => Some(libraries.move_iter().next().unwrap()),
471 self.sess.span_err(self.span,
472 format!("multiple matching crates for `{}`",
473 self.crate_name).as_slice());
474 self.sess.note("candidates:");
475 for lib in libraries.iter() {
478 self.sess.note(format!("path: {}",
479 p.display()).as_slice());
485 self.sess.note(format!("path: {}",
486 p.display()).as_slice());
490 let data = lib.metadata.as_slice();
491 let name = decoder::get_crate_name(data);
492 note_crate_name(self.sess.diagnostic(), name.as_slice());
499 // Attempts to extract *one* library from the set `m`. If the set has no
500 // elements, `None` is returned. If the set has more than one element, then
501 // the errors and notes are emitted about the set of libraries.
503 // With only one library in the set, this function will extract it, and then
504 // read the metadata from it if `*slot` is `None`. If the metadata couldn't
505 // be read, it is assumed that the file isn't a valid rust library (no
506 // errors are emitted).
507 fn extract_one(&mut self, m: HashSet<Path>, flavor: &str,
508 slot: &mut Option<MetadataBlob>) -> Option<Path> {
509 let mut ret = None::<Path>;
513 // FIXME(#10786): for an optimization, we only read one of the
514 // library's metadata sections. In theory we should
515 // read both, but reading dylib metadata is quite
519 } else if m.len() == 1 {
520 return Some(m.move_iter().next().unwrap())
524 for lib in m.move_iter() {
525 info!("{} reading metadata from: {}", flavor, lib.display());
526 let metadata = match get_metadata_section(self.os, &lib) {
528 if self.crate_matches(blob.as_slice(), &lib) {
531 info!("metadata mismatch");
536 info!("no metadata found");
541 self.sess.span_err(self.span,
542 format!("multiple {} candidates for `{}` \
545 self.crate_name).as_slice());
546 self.sess.span_note(self.span,
547 format!(r"candidate #1: {}",
549 .display()).as_slice());
555 self.sess.span_note(self.span,
556 format!(r"candidate #{}: {}", error,
557 lib.display()).as_slice());
560 *slot = Some(metadata);
563 return if error > 0 {None} else {ret}
566 fn crate_matches(&mut self, crate_data: &[u8], libpath: &Path) -> bool {
567 if self.should_match_name {
568 match decoder::maybe_get_crate_name(crate_data) {
569 Some(ref name) if self.crate_name == name.as_slice() => {}
570 _ => { info!("Rejecting via crate name"); return false }
573 let hash = match decoder::maybe_get_crate_hash(crate_data) {
574 Some(hash) => hash, None => {
575 info!("Rejecting via lack of crate hash");
580 let triple = match decoder::get_crate_triple(crate_data) {
581 None => { debug!("triple not present"); return false }
584 if triple.as_slice() != self.triple {
585 info!("Rejecting via crate triple: expected {} got {}", self.triple, triple);
586 self.rejected_via_triple.push(CrateMismatch {
587 path: libpath.clone(),
588 got: triple.to_string()
597 info!("Rejecting via hash: expected {} got {}", *myhash, hash);
598 self.rejected_via_hash.push(CrateMismatch {
599 path: libpath.clone(),
600 got: myhash.as_str().to_string()
611 // Returns the corresponding (prefix, suffix) that files need to have for
613 fn dylibname(&self) -> Option<(&'static str, &'static str)> {
615 abi::OsWin32 => Some((WIN32_DLL_PREFIX, WIN32_DLL_SUFFIX)),
616 abi::OsMacos => Some((MACOS_DLL_PREFIX, MACOS_DLL_SUFFIX)),
617 abi::OsLinux => Some((LINUX_DLL_PREFIX, LINUX_DLL_SUFFIX)),
618 abi::OsAndroid => Some((ANDROID_DLL_PREFIX, ANDROID_DLL_SUFFIX)),
619 abi::OsFreebsd => Some((FREEBSD_DLL_PREFIX, FREEBSD_DLL_SUFFIX)),
624 fn find_commandline_library(&mut self) -> Option<Library> {
625 let locs = match self.sess.opts.externs.find_equiv(&self.crate_name) {
630 // First, filter out all libraries that look suspicious. We only accept
631 // files which actually exist that have the correct naming scheme for
633 let sess = self.sess;
634 let dylibname = self.dylibname();
635 let mut locs = locs.iter().map(|l| Path::new(l.as_slice())).filter(|loc| {
637 sess.err(format!("extern location does not exist: {}",
638 loc.display()).as_slice());
641 let file = loc.filename_str().unwrap();
642 if file.starts_with("lib") && file.ends_with(".rlib") {
646 Some((prefix, suffix)) => {
647 if file.starts_with(prefix) && file.ends_with(suffix) {
654 sess.err(format!("extern location is of an unknown type: {}",
655 loc.display()).as_slice());
659 // Now that we have an itertor of good candidates, make sure there's at
660 // most one rlib and at most one dylib.
661 let mut rlibs = HashSet::new();
662 let mut dylibs = HashSet::new();
664 if loc.filename_str().unwrap().ends_with(".rlib") {
665 rlibs.insert(loc.clone());
667 dylibs.insert(loc.clone());
671 // Extract the rlib/dylib pair.
672 let mut metadata = None;
673 let rlib = self.extract_one(rlibs, "rlib", &mut metadata);
674 let dylib = self.extract_one(dylibs, "dylib", &mut metadata);
676 if rlib.is_none() && dylib.is_none() { return None }
678 Some(metadata) => Some(Library {
688 pub fn note_crate_name(diag: &SpanHandler, name: &str) {
689 diag.handler().note(format!("crate name: {}", name).as_slice());
692 impl ArchiveMetadata {
693 fn new(ar: ArchiveRO) -> Option<ArchiveMetadata> {
694 let data: &'static [u8] = {
695 let data = match ar.read(METADATA_FILENAME) {
698 debug!("didn't find '{}' in the archive", METADATA_FILENAME);
702 // This data is actually a pointer inside of the archive itself, but
703 // we essentially want to cache it because the lookup inside the
704 // archive is a fairly expensive operation (and it's queried for
705 // *very* frequently). For this reason, we transmute it to the
706 // static lifetime to put into the struct. Note that the buffer is
707 // never actually handed out with a static lifetime, but rather the
708 // buffer is loaned with the lifetime of this containing object.
709 // Hence, we're guaranteed that the buffer will never be used after
710 // this object is dead, so this is a safe operation to transmute and
711 // store the data as a static buffer.
712 unsafe { mem::transmute(data) }
714 Some(ArchiveMetadata {
720 pub fn as_slice<'a>(&'a self) -> &'a [u8] { self.data }
723 // Just a small wrapper to time how long reading metadata takes.
724 fn get_metadata_section(os: abi::Os, filename: &Path) -> Result<MetadataBlob, String> {
725 let start = time::precise_time_ns();
726 let ret = get_metadata_section_imp(os, filename);
727 info!("reading {} => {}ms", filename.filename_display(),
728 (time::precise_time_ns() - start) / 1000000);
732 fn get_metadata_section_imp(os: abi::Os, filename: &Path) -> Result<MetadataBlob, String> {
733 if !filename.exists() {
734 return Err(format!("no such file: '{}'", filename.display()));
736 if filename.filename_str().unwrap().ends_with(".rlib") {
737 // Use ArchiveRO for speed here, it's backed by LLVM and uses mmap
738 // internally to read the file. We also avoid even using a memcpy by
739 // just keeping the archive along while the metadata is in use.
740 let archive = match ArchiveRO::open(filename) {
743 debug!("llvm didn't like `{}`", filename.display());
744 return Err(format!("failed to read rlib metadata: '{}'",
745 filename.display()));
748 return match ArchiveMetadata::new(archive).map(|ar| MetadataArchive(ar)) {
750 return Err((format!("failed to read rlib metadata: '{}'",
751 filename.display())))
753 Some(blob) => return Ok(blob)
757 let mb = filename.with_c_str(|buf| {
758 llvm::LLVMRustCreateMemoryBufferWithContentsOfFile(buf)
761 return Err(format!("error reading library: '{}'",
764 let of = match ObjectFile::new(mb) {
767 return Err((format!("provided path not an object file: '{}'",
768 filename.display())))
771 let si = mk_section_iter(of.llof);
772 while llvm::LLVMIsSectionIteratorAtEnd(of.llof, si.llsi) == False {
773 let mut name_buf = ptr::null();
774 let name_len = llvm::LLVMRustGetSectionName(si.llsi, &mut name_buf);
775 let name = string::raw::from_buf_len(name_buf as *const u8,
777 debug!("get_metadata_section: name {}", name);
778 if read_meta_section_name(os).as_slice() == name.as_slice() {
779 let cbuf = llvm::LLVMGetSectionContents(si.llsi);
780 let csz = llvm::LLVMGetSectionSize(si.llsi) as uint;
782 Err(format!("metadata not found: '{}'", filename.display()));
783 let cvbuf: *const u8 = mem::transmute(cbuf);
784 let vlen = encoder::metadata_encoding_version.len();
785 debug!("checking {} bytes of metadata-version stamp",
787 let minsz = cmp::min(vlen, csz);
788 let version_ok = slice::raw::buf_as_slice(cvbuf, minsz,
789 |buf0| buf0 == encoder::metadata_encoding_version);
791 return Err((format!("incompatible metadata version found: '{}'",
792 filename.display())));
795 let cvbuf1 = cvbuf.offset(vlen as int);
796 debug!("inflating {} bytes of compressed metadata",
798 slice::raw::buf_as_slice(cvbuf1, csz-vlen, |bytes| {
799 match flate::inflate_bytes(bytes) {
800 Some(inflated) => found = Ok(MetadataVec(inflated)),
803 Err(format!("failed to decompress \
813 llvm::LLVMMoveToNextSection(si.llsi);
815 return Err(format!("metadata not found: '{}'", filename.display()));
819 pub fn meta_section_name(os: abi::Os) -> Option<&'static str> {
821 abi::OsMacos => Some("__DATA,__note.rustc"),
822 abi::OsiOS => Some("__DATA,__note.rustc"),
823 abi::OsWin32 => Some(".note.rustc"),
824 abi::OsLinux => Some(".note.rustc"),
825 abi::OsAndroid => Some(".note.rustc"),
826 abi::OsFreebsd => Some(".note.rustc")
830 pub fn read_meta_section_name(os: abi::Os) -> &'static str {
832 abi::OsMacos => "__note.rustc",
833 abi::OsiOS => unreachable!(),
834 abi::OsWin32 => ".note.rustc",
835 abi::OsLinux => ".note.rustc",
836 abi::OsAndroid => ".note.rustc",
837 abi::OsFreebsd => ".note.rustc"
841 // A diagnostic function for dumping crate metadata to an output stream
842 pub fn list_file_metadata(os: abi::Os, path: &Path,
843 out: &mut io::Writer) -> io::IoResult<()> {
844 match get_metadata_section(os, path) {
845 Ok(bytes) => decoder::list_crate_metadata(bytes.as_slice(), out),
847 write!(out, "{}\n", msg)