1 // Copyright 2012-2013 The Rust Project Developers. See the COPYRIGHT
2 // file at the top-level directory of this distribution and at
3 // http://rust-lang.org/COPYRIGHT.
5 // Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
6 // http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
7 // <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
8 // option. This file may not be copied, modified, or distributed
9 // except according to those terms.
12 * Higher-level interfaces to libc::* functions and operating system services.
14 * In general these take and return rust types, use rust idioms (enums,
15 * closures, vectors) rather than C idioms, and do more extensive safety
18 * This module is not meant to only contain 1:1 mappings to libc entries; any
19 * os-interface code that is reasonably useful and broadly applicable can go
20 * here. Including utility routines that merely build on other os code.
22 * We assume the general case is that users do not care, and do not want to
23 * be made to care, which operating system they are on. While they may want
24 * to special case various special cases -- and so we will not _hide_ the
25 * facts of which OS the user is on -- they should be given the opportunity
26 * to write OS-ignorant code by default.
29 #[allow(missing_doc)];
33 use container::Container;
35 use iterator::IteratorUtil;
37 use libc::{c_char, c_void, c_int, size_t};
40 use option::{Some, None};
47 use unstable::finally::Finally;
51 pub use os::consts::*;
53 /// Delegates to the libc close() function, returning the same return value.
54 pub fn close(fd: c_int) -> c_int {
61 use libc::{c_char, c_int};
65 pub unsafe fn rust_get_argc() -> c_int;
66 pub unsafe fn rust_get_argv() -> **c_char;
67 pub unsafe fn rust_path_is_dir(path: *libc::c_char) -> c_int;
68 pub unsafe fn rust_path_exists(path: *libc::c_char) -> c_int;
69 pub unsafe fn rust_set_exit_status(code: libc::intptr_t);
73 pub static TMPBUF_SZ : uint = 1000u;
74 static BUF_BYTES : uint = 2048u;
76 pub fn getcwd() -> Path {
77 let buf = [0 as libc::c_char, ..BUF_BYTES];
79 if(0 as *libc::c_char == libc::getcwd(
81 BUF_BYTES as libc::size_t)) {
84 Path(str::raw::from_c_str(&buf[0]))
88 // FIXME: move these to str perhaps? #2620
90 pub fn as_c_charp<T>(s: &str, f: &fn(*c_char) -> T) -> T {
91 str::as_c_str(s, |b| f(b as *c_char))
94 pub fn fill_charp_buf(f: &fn(*mut c_char, size_t) -> bool)
96 let mut buf = vec::from_elem(TMPBUF_SZ, 0u8 as c_char);
97 do buf.as_mut_buf |b, sz| {
98 if f(b, sz as size_t) {
100 Some(str::raw::from_buf(b as *u8))
113 use option::{None, Option};
116 use libc::types::os::arch::extra::DWORD;
118 pub fn fill_utf16_buf_and_decode(f: &fn(*mut u16, DWORD) -> DWORD)
121 let mut n = TMPBUF_SZ as DWORD;
123 let mut done = false;
125 let mut k: DWORD = 0;
126 let mut buf = vec::from_elem(n as uint, 0u16);
127 do buf.as_mut_buf |b, _sz| {
128 k = f(b, TMPBUF_SZ as DWORD);
129 if k == (0 as DWORD) {
132 libc::GetLastError() ==
133 libc::ERROR_INSUFFICIENT_BUFFER as DWORD) {
140 let sub = buf.slice(0, k as uint);
141 res = option::Some(str::from_utf16(sub));
148 pub fn as_utf16_p<T>(s: &str, f: &fn(*u16) -> T) -> T {
149 let mut t = s.to_utf16();
150 // Null terminate before passing on.
152 t.as_imm_buf(|buf, _len| f(buf))
157 Accessing environment variables is not generally threadsafe.
158 Serialize access through a global lock.
160 fn with_env_lock<T>(f: &fn() -> T) -> T {
161 use unstable::finally::Finally;
165 rust_take_env_lock();
168 rust_drop_env_lock();
174 fn rust_take_env_lock();
176 fn rust_drop_env_lock();
180 /// Returns a vector of (variable, value) pairs for all the environment
181 /// variables of the current process.
182 pub fn env() -> ~[(~str,~str)] {
185 unsafe fn get_env_pairs() -> ~[~str] {
186 use libc::funcs::extra::kernel32::{
187 GetEnvironmentStringsA,
188 FreeEnvironmentStringsA
190 let ch = GetEnvironmentStringsA();
191 if (ch as uint == 0) {
192 fail!("os::env() failure getting env string from OS: %s", os::last_os_error());
194 let mut curr_ptr: uint = ch as uint;
195 let mut result = ~[];
196 while(*(curr_ptr as *libc::c_char) != 0 as libc::c_char) {
197 let env_pair = str::raw::from_c_str(
198 curr_ptr as *libc::c_char);
199 result.push(env_pair);
201 libc::strlen(curr_ptr as *libc::c_char) as uint
204 FreeEnvironmentStringsA(ch);
208 unsafe fn get_env_pairs() -> ~[~str] {
210 unsafe fn rust_env_pairs() -> **libc::c_char;
212 let environ = rust_env_pairs();
213 if (environ as uint == 0) {
214 fail!("os::env() failure getting env string from OS: %s", os::last_os_error());
216 let mut result = ~[];
217 ptr::array_each(environ, |e| {
218 let env_pair = str::raw::from_c_str(e);
219 debug!("get_env_pairs: %s",
221 result.push(env_pair);
226 fn env_convert(input: ~[~str]) -> ~[(~str, ~str)] {
228 for input.iter().advance |p| {
229 let vs: ~[&str] = p.splitn_iter('=', 1).collect();
230 debug!("splitting: len: %u",
232 assert_eq!(vs.len(), 2);
233 pairs.push((vs[0].to_owned(), vs[1].to_owned()));
238 let unparsed_environ = get_env_pairs();
239 env_convert(unparsed_environ)
245 /// Fetches the environment variable `n` from the current process, returning
246 /// None if the variable isn't set.
247 pub fn getenv(n: &str) -> Option<~str> {
250 let s = str::as_c_str(n, |s| libc::getenv(s));
251 if ptr::null::<u8>() == cast::transmute(s) {
254 let s = cast::transmute(s);
255 Some::<~str>(str::raw::from_buf(s))
262 /// Fetches the environment variable `n` from the current process, returning
263 /// None if the variable isn't set.
264 pub fn getenv(n: &str) -> Option<~str> {
267 use os::win32::{as_utf16_p, fill_utf16_buf_and_decode};
268 do as_utf16_p(n) |u| {
269 do fill_utf16_buf_and_decode() |buf, sz| {
270 libc::GetEnvironmentVariableW(u, buf, sz)
279 /// Sets the environment variable `n` to the value `v` for the currently running
281 pub fn setenv(n: &str, v: &str) {
284 do str::as_c_str(n) |nbuf| {
285 do str::as_c_str(v) |vbuf| {
286 libc::funcs::posix01::unistd::setenv(nbuf, vbuf, 1);
295 /// Sets the environment variable `n` to the value `v` for the currently running
297 pub fn setenv(n: &str, v: &str) {
300 use os::win32::as_utf16_p;
301 do as_utf16_p(n) |nbuf| {
302 do as_utf16_p(v) |vbuf| {
303 libc::SetEnvironmentVariableW(nbuf, vbuf);
310 /// Remove a variable from the environment entirely
311 pub fn unsetenv(n: &str) {
313 fn _unsetenv(n: &str) {
316 do str::as_c_str(n) |nbuf| {
317 libc::funcs::posix01::unistd::unsetenv(nbuf);
323 fn _unsetenv(n: &str) {
326 use os::win32::as_utf16_p;
327 do as_utf16_p(n) |nbuf| {
328 libc::SetEnvironmentVariableW(nbuf, ptr::null());
337 pub fn fdopen(fd: c_int) -> *FILE {
339 return do as_c_charp("r") |modebuf| {
340 libc::fdopen(fd, modebuf)
349 pub fn fsync_fd(fd: c_int, _level: io::fsync::Level) -> c_int {
351 use libc::funcs::extra::msvcrt::*;
356 #[cfg(target_os = "linux")]
357 #[cfg(target_os = "android")]
358 pub fn fsync_fd(fd: c_int, level: io::fsync::Level) -> c_int {
360 use libc::funcs::posix01::unistd::*;
363 | io::fsync::FullFSync => return fsync(fd),
364 io::fsync::FDataSync => return fdatasync(fd)
369 #[cfg(target_os = "macos")]
370 pub fn fsync_fd(fd: c_int, level: io::fsync::Level) -> c_int {
372 use libc::consts::os::extra::*;
373 use libc::funcs::posix88::fcntl::*;
374 use libc::funcs::posix01::unistd::*;
376 io::fsync::FSync => return fsync(fd),
378 // According to man fnctl, the ok retval is only specified to be
380 if (fcntl(F_FULLFSYNC as c_int, fd) == -1 as c_int)
381 { return -1 as c_int; }
383 { return 0 as c_int; }
389 #[cfg(target_os = "freebsd")]
390 pub fn fsync_fd(fd: c_int, _l: io::fsync::Level) -> c_int {
392 use libc::funcs::posix01::unistd::*;
403 pub fn pipe() -> Pipe {
405 let mut fds = Pipe {in: 0 as c_int,
407 assert_eq!(libc::pipe(&mut fds.in), (0 as c_int));
408 return Pipe {in: fds.in, out: fds.out};
415 pub fn pipe() -> Pipe {
417 // Windows pipes work subtly differently than unix pipes, and their
418 // inheritance has to be handled in a different way that I do not
419 // fully understand. Here we explicitly make the pipe non-inheritable,
420 // which means to pass it to a subprocess they need to be duplicated
421 // first, as in core::run.
422 let mut fds = Pipe {in: 0 as c_int,
424 let res = libc::pipe(&mut fds.in, 1024 as ::libc::c_uint,
425 (libc::O_BINARY | libc::O_NOINHERIT) as c_int);
426 assert_eq!(res, 0 as c_int);
427 assert!((fds.in != -1 as c_int && fds.in != 0 as c_int));
428 assert!((fds.out != -1 as c_int && fds.in != 0 as c_int));
429 return Pipe {in: fds.in, out: fds.out};
433 fn dup2(src: c_int, dst: c_int) -> c_int {
439 /// Returns the proper dll filename for the given basename of a file.
440 pub fn dll_filename(base: &str) -> ~str {
441 fmt!("%s%s%s", DLL_PREFIX, base, DLL_SUFFIX)
444 /// Optionally returns the filesystem path to the current executable which is
445 /// running. If any failure occurs, None is returned.
446 pub fn self_exe_path() -> Option<Path> {
448 #[cfg(target_os = "freebsd")]
449 fn load_self() -> Option<~str> {
451 use libc::funcs::bsd44::*;
452 use libc::consts::os::extra::*;
453 do fill_charp_buf() |buf, sz| {
454 let mib = ~[CTL_KERN as c_int,
456 KERN_PROC_PATHNAME as c_int, -1 as c_int];
458 sysctl(vec::raw::to_ptr(mib), mib.len() as ::libc::c_uint,
459 buf as *mut c_void, &mut sz, ptr::null(),
460 0u as size_t) == (0 as c_int)
465 #[cfg(target_os = "linux")]
466 #[cfg(target_os = "android")]
467 fn load_self() -> Option<~str> {
469 use libc::funcs::posix01::unistd::readlink;
471 let mut path_str = str::with_capacity(TMPBUF_SZ);
472 let len = do str::as_c_str(path_str) |buf| {
473 let buf = buf as *mut c_char;
474 do as_c_charp("/proc/self/exe") |proc_self_buf| {
475 readlink(proc_self_buf, buf, TMPBUF_SZ as size_t)
481 str::raw::set_len(&mut path_str, len as uint);
487 #[cfg(target_os = "macos")]
488 fn load_self() -> Option<~str> {
490 do fill_charp_buf() |buf, sz| {
491 let mut sz = sz as u32;
492 libc::funcs::extra::_NSGetExecutablePath(
493 buf, &mut sz) == (0 as c_int)
499 fn load_self() -> Option<~str> {
501 use os::win32::fill_utf16_buf_and_decode;
502 do fill_utf16_buf_and_decode() |buf, sz| {
503 libc::GetModuleFileNameW(0u as libc::DWORD, buf, sz)
508 do load_self().map |pth| {
509 Path(*pth).dir_path()
515 * Returns the path to the user's home directory, if known.
517 * On Unix, returns the value of the 'HOME' environment variable if it is set
518 * and not equal to the empty string.
520 * On Windows, returns the value of the 'HOME' environment variable if it is
521 * set and not equal to the empty string. Otherwise, returns the value of the
522 * 'USERPROFILE' environment variable if it is set and not equal to the empty
525 * Otherwise, homedir returns option::none.
527 pub fn homedir() -> Option<Path> {
528 return match getenv("HOME") {
529 Some(ref p) => if !p.is_empty() {
538 fn secondary() -> Option<Path> {
543 fn secondary() -> Option<Path> {
544 do getenv("USERPROFILE").chain |p| {
555 * Returns the path to a temporary directory.
557 * On Unix, returns the value of the 'TMPDIR' environment variable if it is
558 * set and non-empty and '/tmp' otherwise.
560 * On Windows, returns the value of, in order, the 'TMP', 'TEMP',
561 * 'USERPROFILE' environment variable if any are set and not the empty
562 * string. Otherwise, tmpdir returns the path to the Windows directory.
564 pub fn tmpdir() -> Path {
567 fn getenv_nonempty(v: &str) -> Option<Path> {
580 fn lookup() -> Path {
581 getenv_nonempty("TMPDIR").get_or_default(Path("/tmp"))
585 fn lookup() -> Path {
586 getenv_nonempty("TMP").or(
587 getenv_nonempty("TEMP").or(
588 getenv_nonempty("USERPROFILE").or(
589 getenv_nonempty("WINDIR")))).get_or_default(Path("C:\\Windows"))
593 /// Recursively walk a directory structure
594 pub fn walk_dir(p: &Path, f: &fn(&Path) -> bool) -> bool {
596 r.iter().advance(|q| {
597 let path = &p.push(*q);
598 f(path) && (!path_is_dir(path) || walk_dir(path, |p| f(p)))
602 /// Indicates whether a path represents a directory
603 pub fn path_is_dir(p: &Path) -> bool {
605 do str::as_c_str(p.to_str()) |buf| {
606 rustrt::rust_path_is_dir(buf) != 0 as c_int
611 /// Indicates whether a path exists
612 pub fn path_exists(p: &Path) -> bool {
614 do str::as_c_str(p.to_str()) |buf| {
615 rustrt::rust_path_exists(buf) != 0 as c_int
621 * Convert a relative path to an absolute path
623 * If the given path is relative, return it prepended with the current working
624 * directory. If the given path is already an absolute path, return it
627 // NB: this is here rather than in path because it is a form of environment
628 // querying; what it does depends on the process working directory, not just
630 pub fn make_absolute(p: &Path) -> Path {
634 getcwd().push_many(p.components)
639 /// Creates a directory at the specified path
640 pub fn make_dir(p: &Path, mode: c_int) -> bool {
641 return mkdir(p, mode);
644 fn mkdir(p: &Path, _mode: c_int) -> bool {
646 use os::win32::as_utf16_p;
647 // FIXME: turn mode into something useful? #2623
648 do as_utf16_p(p.to_str()) |buf| {
649 libc::CreateDirectoryW(buf, cast::transmute(0))
656 fn mkdir(p: &Path, mode: c_int) -> bool {
658 do as_c_charp(p.to_str()) |c| {
659 libc::mkdir(c, mode as libc::mode_t) == (0 as c_int)
665 /// Creates a directory with a given mode.
666 /// Returns true iff creation
667 /// succeeded. Also creates all intermediate subdirectories
668 /// if they don't already exist, giving all of them the same mode.
670 // tjc: if directory exists but with different permissions,
671 // should we return false?
672 pub fn mkdir_recursive(p: &Path, mode: c_int) -> bool {
676 else if p.components.is_empty() {
679 else if p.components.len() == 1 {
680 // No parent directories to create
681 path_is_dir(p) || make_dir(p, mode)
684 mkdir_recursive(&p.pop(), mode) && make_dir(p, mode)
688 /// Lists the contents of a directory
689 pub fn list_dir(p: &Path) -> ~[~str] {
690 if p.components.is_empty() && !p.is_absolute() {
691 // Not sure what the right behavior is here, but this
692 // prevents a bounds check failure later
696 #[cfg(target_os = "linux")]
697 #[cfg(target_os = "android")]
698 #[cfg(target_os = "freebsd")]
699 #[cfg(target_os = "macos")]
700 unsafe fn get_list(p: &Path) -> ~[~str] {
701 use libc::{dirent_t};
702 use libc::{opendir, readdir, closedir};
704 unsafe fn rust_list_dir_val(ptr: *dirent_t) -> *libc::c_char;
706 let input = p.to_str();
707 let mut strings = ~[];
708 let input_ptr = ::cast::transmute(&input[0]);
709 debug!("os::list_dir -- BEFORE OPENDIR");
710 let dir_ptr = opendir(input_ptr);
711 if (dir_ptr as uint != 0) {
712 debug!("os::list_dir -- opendir() SUCCESS");
713 let mut entry_ptr = readdir(dir_ptr);
714 while (entry_ptr as uint != 0) {
715 strings.push(str::raw::from_c_str(rust_list_dir_val(
717 entry_ptr = readdir(dir_ptr);
722 debug!("os::list_dir -- opendir() FAILURE");
725 "os::list_dir -- AFTER -- #: %?",
730 unsafe fn get_list(p: &Path) -> ~[~str] {
731 use libc::consts::os::extra::INVALID_HANDLE_VALUE;
732 use libc::{wcslen, free};
733 use libc::funcs::extra::kernel32::{
741 use rt::global_heap::malloc_raw;
745 unsafe fn rust_list_dir_wfd_size() -> libc::size_t;
746 unsafe fn rust_list_dir_wfd_fp_buf(wfd: *libc::c_void)
749 fn star(p: &Path) -> Path { p.push("*") }
750 do as_utf16_p(star(p).to_str()) |path_ptr| {
751 let mut strings = ~[];
752 let wfd_ptr = malloc_raw(rust_list_dir_wfd_size() as uint);
756 ::cast::transmute(wfd_ptr));
757 if find_handle as libc::c_int != INVALID_HANDLE_VALUE {
758 let mut more_files = 1 as libc::c_int;
759 while more_files != 0 {
760 let fp_buf = rust_list_dir_wfd_fp_buf(wfd_ptr);
761 if fp_buf as uint == 0 {
762 fail!("os::list_dir() failure: got null ptr from wfd");
765 let fp_vec = vec::from_buf(
766 fp_buf, wcslen(fp_buf) as uint);
767 let fp_str = str::from_utf16(fp_vec);
768 strings.push(fp_str);
770 more_files = FindNextFileW(
772 ::cast::transmute(wfd_ptr));
774 FindClose(find_handle);
780 do get_list(p).consume_iter().filter |filename| {
781 "." != *filename && ".." != *filename
787 * Lists the contents of a directory
789 * This version prepends each entry with the directory.
791 pub fn list_dir_path(p: &Path) -> ~[Path] {
792 list_dir(p).map(|f| p.push(*f))
795 /// Removes a directory at the specified path, after removing
796 /// all its contents. Use carefully!
797 pub fn remove_dir_recursive(p: &Path) -> bool {
798 let mut error_happened = false;
799 for walk_dir(p) |inner| {
801 if path_is_dir(inner) {
802 if !remove_dir_recursive(inner) {
803 error_happened = true;
807 if !remove_file(inner) {
808 error_happened = true;
813 // Directory should now be empty
814 !error_happened && remove_dir(p)
817 /// Removes a directory at the specified path
818 pub fn remove_dir(p: &Path) -> bool {
822 fn rmdir(p: &Path) -> bool {
824 use os::win32::as_utf16_p;
825 return do as_utf16_p(p.to_str()) |buf| {
826 libc::RemoveDirectoryW(buf) != (0 as libc::BOOL)
832 fn rmdir(p: &Path) -> bool {
834 return do as_c_charp(p.to_str()) |buf| {
835 libc::rmdir(buf) == (0 as c_int)
841 /// Changes the current working directory to the specified path, returning
842 /// whether the change was completed successfully or not.
843 pub fn change_dir(p: &Path) -> bool {
847 fn chdir(p: &Path) -> bool {
849 use os::win32::as_utf16_p;
850 return do as_utf16_p(p.to_str()) |buf| {
851 libc::SetCurrentDirectoryW(buf) != (0 as libc::BOOL)
857 fn chdir(p: &Path) -> bool {
859 return do as_c_charp(p.to_str()) |buf| {
860 libc::chdir(buf) == (0 as c_int)
866 /// Changes the current working directory to the specified
867 /// path while acquiring a global lock, then calls `action`.
868 /// If the change is successful, releases the lock and restores the
869 /// CWD to what it was before, returning true.
870 /// Returns false if the directory doesn't exist or if the directory change
871 /// is otherwise unsuccessful.
872 /// FIXME #7870 This probably shouldn't be part of the public API
873 pub fn change_dir_locked(p: &Path, action: &fn()) -> bool {
875 use unstable::finally::Finally;
878 // This is really sketchy. Using a pthread mutex so descheduling
879 // in the `action` callback can cause deadlock. Doing it in
880 // `task::atomically` to try to avoid that, but ... I don't know
881 // this is all bogus.
882 return do task::atomically {
883 rust_take_change_dir_lock();
886 let old_dir = os::getcwd();
895 rust_drop_change_dir_lock();
901 fn rust_take_change_dir_lock();
902 fn rust_drop_change_dir_lock();
906 /// Copies a file from one location to another
907 pub fn copy_file(from: &Path, to: &Path) -> bool {
908 return do_copy_file(from, to);
911 fn do_copy_file(from: &Path, to: &Path) -> bool {
913 use os::win32::as_utf16_p;
914 return do as_utf16_p(from.to_str()) |fromp| {
915 do as_utf16_p(to.to_str()) |top| {
916 libc::CopyFileW(fromp, top, (0 as libc::BOOL)) !=
924 fn do_copy_file(from: &Path, to: &Path) -> bool {
926 let istream = do as_c_charp(from.to_str()) |fromp| {
927 do as_c_charp("rb") |modebuf| {
928 libc::fopen(fromp, modebuf)
931 if istream as uint == 0u {
934 // Preserve permissions
935 let from_mode = from.get_mode().expect("copy_file: couldn't get permissions \
938 let ostream = do as_c_charp(to.to_str()) |top| {
939 do as_c_charp("w+b") |modebuf| {
940 libc::fopen(top, modebuf)
943 if ostream as uint == 0u {
948 let mut buf = vec::with_capacity::<u8>(bufsize);
949 let mut done = false;
952 do buf.as_mut_buf |b, _sz| {
953 let nread = libc::fread(b as *mut c_void, 1u as size_t,
956 if nread > 0 as size_t {
957 if libc::fwrite(b as *c_void, 1u as size_t, nread,
970 // Give the new file the old file's permissions
971 if do str::as_c_str(to.to_str()) |to_buf| {
972 libc::chmod(to_buf, from_mode as libc::mode_t)
974 return false; // should be a condition...
981 /// Deletes an existing file
982 pub fn remove_file(p: &Path) -> bool {
986 fn unlink(p: &Path) -> bool {
988 use os::win32::as_utf16_p;
989 return do as_utf16_p(p.to_str()) |buf| {
990 libc::DeleteFileW(buf) != (0 as libc::BOOL)
996 fn unlink(p: &Path) -> bool {
998 return do as_c_charp(p.to_str()) |buf| {
999 libc::unlink(buf) == (0 as c_int)
1006 /// Returns the platform-specific value of errno
1007 pub fn errno() -> int {
1008 #[cfg(target_os = "macos")]
1009 #[cfg(target_os = "freebsd")]
1010 fn errno_location() -> *c_int {
1013 unsafe fn __error() -> *c_int;
1020 #[cfg(target_os = "linux")]
1021 #[cfg(target_os = "android")]
1022 fn errno_location() -> *c_int {
1025 unsafe fn __errno_location() -> *c_int;
1033 (*errno_location()) as int
1038 /// Returns the platform-specific value of errno
1039 pub fn errno() -> uint {
1040 use libc::types::os::arch::extra::DWORD;
1042 #[link_name = "kernel32"]
1045 unsafe fn GetLastError() -> DWORD;
1049 GetLastError() as uint
1053 /// Get a string representing the platform-dependent last error
1054 pub fn last_os_error() -> ~str {
1056 fn strerror() -> ~str {
1057 #[cfg(target_os = "macos")]
1058 #[cfg(target_os = "android")]
1059 #[cfg(target_os = "freebsd")]
1060 fn strerror_r(errnum: c_int, buf: *mut c_char, buflen: size_t) -> c_int {
1063 unsafe fn strerror_r(errnum: c_int, buf: *mut c_char,
1064 buflen: size_t) -> c_int;
1067 strerror_r(errnum, buf, buflen)
1071 // GNU libc provides a non-compliant version of strerror_r by default
1072 // and requires macros to instead use the POSIX compliant variant.
1073 // So we just use __xpg_strerror_r which is always POSIX compliant
1074 #[cfg(target_os = "linux")]
1075 fn strerror_r(errnum: c_int, buf: *mut c_char, buflen: size_t) -> c_int {
1078 unsafe fn __xpg_strerror_r(errnum: c_int, buf: *mut c_char,
1079 buflen: size_t) -> c_int;
1082 __xpg_strerror_r(errnum, buf, buflen)
1086 let mut buf = [0 as c_char, ..TMPBUF_SZ];
1088 let err = strerror_r(errno() as c_int, &mut buf[0],
1089 TMPBUF_SZ as size_t);
1091 fail!("strerror_r failure");
1094 str::raw::from_c_str(&buf[0])
1099 fn strerror() -> ~str {
1100 use libc::types::os::arch::extra::DWORD;
1101 use libc::types::os::arch::extra::LPSTR;
1102 use libc::types::os::arch::extra::LPVOID;
1104 #[link_name = "kernel32"]
1107 unsafe fn FormatMessageA(flags: DWORD, lpSrc: LPVOID,
1108 msgId: DWORD, langId: DWORD,
1109 buf: LPSTR, nsize: DWORD,
1110 args: *c_void) -> DWORD;
1113 static FORMAT_MESSAGE_FROM_SYSTEM: DWORD = 0x00001000;
1114 static FORMAT_MESSAGE_IGNORE_INSERTS: DWORD = 0x00000200;
1116 let mut buf = [0 as c_char, ..TMPBUF_SZ];
1118 // This value is calculated from the macro
1119 // MAKELANGID(LANG_SYSTEM_DEFAULT, SUBLANG_SYS_DEFAULT)
1120 let langId = 0x0800 as DWORD;
1121 let err = errno() as DWORD;
1123 let res = FormatMessageA(FORMAT_MESSAGE_FROM_SYSTEM |
1124 FORMAT_MESSAGE_IGNORE_INSERTS,
1125 ptr::mut_null(), err, langId,
1126 &mut buf[0], TMPBUF_SZ as DWORD,
1129 fail!("[%?] FormatMessage failure", errno());
1132 str::raw::from_c_str(&buf[0])
1140 * Sets the process exit code
1142 * Sets the exit code returned by the process if all supervised tasks
1143 * terminate successfully (without failing). If the current root task fails
1144 * and is supervised by the scheduler then any user-specified exit status is
1145 * ignored and the process exits with the default failure status
1147 pub fn set_exit_status(code: int) {
1149 use rt::OldTaskContext;
1151 if rt::context() == OldTaskContext {
1153 rustrt::rust_set_exit_status(code as libc::intptr_t);
1156 rt::util::set_exit_status(code);
1160 unsafe fn load_argc_and_argv(argc: c_int, argv: **c_char) -> ~[~str] {
1162 for uint::range(0, argc as uint) |i| {
1163 args.push(str::raw::from_c_str(*argv.offset(i)));
1169 * Returns the command line arguments
1171 * Returns a list of the command line arguments.
1173 #[cfg(target_os = "macos")]
1174 pub fn real_args() -> ~[~str] {
1176 let (argc, argv) = (*_NSGetArgc() as c_int,
1177 *_NSGetArgv() as **c_char);
1178 load_argc_and_argv(argc, argv)
1182 #[cfg(target_os = "linux")]
1183 #[cfg(target_os = "android")]
1184 #[cfg(target_os = "freebsd")]
1185 pub fn real_args() -> ~[~str] {
1187 use rt::TaskContext;
1189 if rt::context() == TaskContext {
1190 match rt::args::clone() {
1192 None => fail!("process arguments not initialized")
1196 let argc = rustrt::rust_get_argc();
1197 let argv = rustrt::rust_get_argv();
1198 load_argc_and_argv(argc, argv)
1204 pub fn real_args() -> ~[~str] {
1205 let mut nArgs: c_int = 0;
1206 let lpArgCount: *mut c_int = &mut nArgs;
1207 let lpCmdLine = unsafe { GetCommandLineW() };
1208 let szArgList = unsafe { CommandLineToArgvW(lpCmdLine, lpArgCount) };
1211 for uint::range(0, nArgs as uint) |i| {
1213 // Determine the length of this argument.
1214 let ptr = *szArgList.offset(i);
1216 while *ptr.offset(len) != 0 { len += 1; }
1218 // Push it onto the list.
1219 args.push(vec::raw::buf_as_slice(ptr, len,
1225 LocalFree(cast::transmute(szArgList));
1231 type LPCWSTR = *u16;
1234 #[link_name="kernel32"]
1237 fn GetCommandLineW() -> LPCWSTR;
1238 fn LocalFree(ptr: *c_void);
1242 #[link_name="shell32"]
1245 fn CommandLineToArgvW(lpCmdLine: LPCWSTR, pNumArgs: *mut c_int) -> **u16;
1248 struct OverriddenArgs {
1252 static overridden_arg_key: local_data::Key<@OverriddenArgs> = &local_data::Key;
1254 /// Returns the arguments which this program was started with (normally passed
1255 /// via the command line).
1257 /// The return value of the function can be changed by invoking the
1258 /// `os::set_args` function.
1259 pub fn args() -> ~[~str] {
1260 match local_data::get(overridden_arg_key, |k| k.map(|&k| *k)) {
1261 None => real_args(),
1262 Some(args) => args.val.clone()
1266 /// For the current task, overrides the task-local cache of the arguments this
1267 /// program had when it started. These new arguments are only available to the
1268 /// current task via the `os::args` method.
1269 pub fn set_args(new_args: ~[~str]) {
1270 let overridden_args = @OverriddenArgs {
1271 val: new_args.clone()
1273 local_data::set(overridden_arg_key, overridden_args);
1276 // FIXME #6100 we should really use an internal implementation of this - using
1277 // the POSIX glob functions isn't portable to windows, probably has slight
1278 // inconsistencies even where it is implemented, and makes extending
1279 // functionality a lot more difficult
1280 // FIXME #6101 also provide a non-allocating version - each_glob or so?
1281 /// Returns a vector of Path objects that match the given glob pattern
1282 #[cfg(target_os = "linux")]
1283 #[cfg(target_os = "android")]
1284 #[cfg(target_os = "freebsd")]
1285 #[cfg(target_os = "macos")]
1286 pub fn glob(pattern: &str) -> ~[Path] {
1287 #[cfg(target_os = "linux")]
1288 #[cfg(target_os = "android")]
1289 fn default_glob_t () -> libc::glob_t {
1292 gl_pathv: ptr::null(),
1294 __unused1: ptr::null(),
1295 __unused2: ptr::null(),
1296 __unused3: ptr::null(),
1297 __unused4: ptr::null(),
1298 __unused5: ptr::null(),
1302 #[cfg(target_os = "freebsd")]
1303 fn default_glob_t () -> libc::glob_t {
1309 gl_pathv: ptr::null(),
1310 __unused3: ptr::null(),
1311 __unused4: ptr::null(),
1312 __unused5: ptr::null(),
1313 __unused6: ptr::null(),
1314 __unused7: ptr::null(),
1315 __unused8: ptr::null(),
1319 #[cfg(target_os = "macos")]
1320 fn default_glob_t () -> libc::glob_t {
1326 gl_pathv: ptr::null(),
1327 __unused3: ptr::null(),
1328 __unused4: ptr::null(),
1329 __unused5: ptr::null(),
1330 __unused6: ptr::null(),
1331 __unused7: ptr::null(),
1332 __unused8: ptr::null(),
1336 let mut g = default_glob_t();
1337 do str::as_c_str(pattern) |c_pattern| {
1338 unsafe { libc::glob(c_pattern, 0, ptr::null(), &mut g) }
1341 let paths = unsafe {
1342 vec::raw::from_buf_raw(g.gl_pathv, g.gl_pathc as uint)
1344 do paths.map |&c_str| {
1345 Path(unsafe { str::raw::from_c_str(c_str) })
1348 unsafe { libc::globfree(&mut g) };
1352 /// Returns a vector of Path objects that match the given glob pattern
1353 #[cfg(target_os = "win32")]
1354 pub fn glob(_pattern: &str) -> ~[Path] {
1355 fail!("glob() is unimplemented on Windows")
1358 #[cfg(target_os = "macos")]
1360 // These functions are in crt_externs.h.
1361 pub fn _NSGetArgc() -> *c_int;
1362 pub fn _NSGetArgv() -> ***c_char;
1365 // Round up `from` to be divisible by `to`
1366 fn round_up(from: uint, to: uint) -> uint {
1367 let r = if from % to == 0 {
1370 from + to - (from % to)
1380 pub fn page_size() -> uint {
1382 libc::sysconf(libc::_SC_PAGESIZE) as uint
1387 pub fn page_size() -> uint {
1389 let mut info = libc::SYSTEM_INFO::new();
1390 libc::GetSystemInfo(&mut info);
1392 return info.dwPageSize as uint;
1396 pub struct MemoryMap {
1402 pub enum MemoryMapKind {
1407 pub enum MapOption {
1417 // Linux-specific errors
1423 ErrUnknown(libc::c_int),
1425 // Windows-specific errors
1430 ErrVirtualAlloc(uint),
1431 ErrCreateFileMappingW(uint),
1432 ErrMapViewOfFile(uint)
1435 impl to_str::ToStr for MapError {
1436 fn to_str(&self) -> ~str {
1438 ErrFdNotAvail => ~"fd not available for reading or writing",
1439 ErrInvalidFd => ~"Invalid fd",
1440 ErrUnaligned => ~"Unaligned address, invalid flags, \
1441 negative length or unaligned offset",
1442 ErrNoMapSupport=> ~"File doesn't support mapping",
1443 ErrNoMem => ~"Invalid address, or not enough available memory",
1444 ErrUnknown(code) => fmt!("Unknown error=%?", code),
1445 ErrUnsupProt => ~"Protection mode unsupported",
1446 ErrUnsupOffset => ~"Offset in virtual memory mode is unsupported",
1447 ErrNeedRW => ~"File mapping should be at least readable/writable",
1448 ErrAlreadyExists => ~"File mapping for specified file already exists",
1449 ErrVirtualAlloc(code) => fmt!("VirtualAlloc failure=%?", code),
1450 ErrCreateFileMappingW(code) => fmt!("CreateFileMappingW failure=%?", code),
1451 ErrMapViewOfFile(code) => fmt!("MapViewOfFile failure=%?", code)
1458 pub fn new(min_len: uint, options: ~[MapOption]) -> Result<~MemoryMap, MapError> {
1461 let mut addr: *c_void = ptr::null();
1462 let mut prot: c_int = 0;
1463 let mut flags: c_int = libc::MAP_PRIVATE;
1464 let mut fd: c_int = -1;
1465 let mut offset: off_t = 0;
1466 let len = round_up(min_len, page_size()) as size_t;
1468 for options.iter().advance |&o| {
1470 MapReadable => { prot |= libc::PROT_READ; },
1471 MapWritable => { prot |= libc::PROT_WRITE; },
1472 MapExecutable => { prot |= libc::PROT_EXEC; },
1474 flags |= libc::MAP_FIXED;
1478 flags |= libc::MAP_FILE;
1481 MapOffset(offset_) => { offset = offset_ as off_t; }
1484 if fd == -1 { flags |= libc::MAP_ANON; }
1487 libc::mmap(addr, len, prot, flags, fd, offset)
1489 if r == libc::MAP_FAILED {
1490 Err(match errno() as c_int {
1491 libc::EACCES => ErrFdNotAvail,
1492 libc::EBADF => ErrInvalidFd,
1493 libc::EINVAL => ErrUnaligned,
1494 libc::ENODEV => ErrNoMapSupport,
1495 libc::ENOMEM => ErrNoMem,
1496 code => ErrUnknown(code)
1505 MapFile(ptr::null())
1513 impl Drop for MemoryMap {
1516 match libc::munmap(self.data as *c_void, self.len) {
1518 -1 => error!(match errno() as c_int {
1519 libc::EINVAL => ~"invalid addr or len",
1520 e => fmt!("unknown errno=%?", e)
1522 r => error!(fmt!("Unexpected result %?", r))
1530 pub fn new(min_len: uint, options: ~[MapOption]) -> Result<~MemoryMap, MapError> {
1531 use libc::types::os::arch::extra::{LPVOID, DWORD, SIZE_T, HANDLE};
1533 let mut lpAddress: LPVOID = ptr::mut_null();
1534 let mut readable = false;
1535 let mut writable = false;
1536 let mut executable = false;
1537 let mut fd: c_int = -1;
1538 let mut offset: uint = 0;
1539 let len = round_up(min_len, page_size()) as SIZE_T;
1541 for options.iter().advance |&o| {
1543 MapReadable => { readable = true; },
1544 MapWritable => { writable = true; },
1545 MapExecutable => { executable = true; }
1546 MapAddr(addr_) => { lpAddress = addr_ as LPVOID; },
1547 MapFd(fd_) => { fd = fd_; },
1548 MapOffset(offset_) => { offset = offset_; }
1552 let flProtect = match (executable, readable, writable) {
1553 (false, false, false) if fd == -1 => libc::PAGE_NOACCESS,
1554 (false, true, false) => libc::PAGE_READONLY,
1555 (false, true, true) => libc::PAGE_READWRITE,
1556 (true, false, false) if fd == -1 => libc::PAGE_EXECUTE,
1557 (true, true, false) => libc::PAGE_EXECUTE_READ,
1558 (true, true, true) => libc::PAGE_EXECUTE_READWRITE,
1559 _ => return Err(ErrUnsupProt)
1564 return Err(ErrUnsupOffset);
1567 libc::VirtualAlloc(lpAddress,
1569 libc::MEM_COMMIT | libc::MEM_RESERVE,
1573 0 => Err(ErrVirtualAlloc(errno())),
1574 _ => Ok(~MemoryMap {
1581 let dwDesiredAccess = match (readable, writable) {
1582 (true, true) => libc::FILE_MAP_ALL_ACCESS,
1583 (true, false) => libc::FILE_MAP_READ,
1584 (false, true) => libc::FILE_MAP_WRITE,
1586 return Err(ErrNeedRW);
1590 let hFile = libc::get_osfhandle(fd) as HANDLE;
1591 let mapping = libc::CreateFileMappingW(hFile,
1594 (len >> 32) as DWORD,
1595 (len & 0xffff_ffff) as DWORD,
1597 if mapping == ptr::mut_null() {
1598 return Err(ErrCreateFileMappingW(errno()));
1600 if errno() as c_int == libc::ERROR_ALREADY_EXISTS {
1601 return Err(ErrAlreadyExists);
1603 let r = libc::MapViewOfFile(mapping,
1605 (offset >> 32) as DWORD,
1606 (offset & 0xffff_ffff) as DWORD,
1609 0 => Err(ErrMapViewOfFile(errno())),
1610 _ => Ok(~MemoryMap {
1613 kind: MapFile(mapping as *c_void)
1622 impl Drop for MemoryMap {
1624 use libc::types::os::arch::extra::{LPCVOID, HANDLE};
1628 MapVirtual => match libc::VirtualFree(self.data as *mut c_void,
1630 libc::MEM_RELEASE) {
1631 0 => error!(fmt!("VirtualFree failed: %?", errno())),
1634 MapFile(mapping) => {
1635 if libc::UnmapViewOfFile(self.data as LPCVOID) != 0 {
1636 error!(fmt!("UnmapViewOfFile failed: %?", errno()));
1638 if libc::CloseHandle(mapping as HANDLE) != 0 {
1639 error!(fmt!("CloseHandle failed: %?", errno()));
1650 pub use os::consts::unix::*;
1653 pub use os::consts::windows::*;
1655 #[cfg(target_os = "macos")]
1656 pub use os::consts::macos::*;
1658 #[cfg(target_os = "freebsd")]
1659 pub use os::consts::freebsd::*;
1661 #[cfg(target_os = "linux")]
1662 pub use os::consts::linux::*;
1664 #[cfg(target_os = "android")]
1665 pub use os::consts::android::*;
1667 #[cfg(target_os = "win32")]
1668 pub use os::consts::win32::*;
1670 #[cfg(target_arch = "x86")]
1671 pub use os::consts::x86::*;
1673 #[cfg(target_arch = "x86_64")]
1674 pub use os::consts::x86_64::*;
1676 #[cfg(target_arch = "arm")]
1677 pub use os::consts::arm::*;
1679 #[cfg(target_arch = "mips")]
1680 use os::consts::mips::*;
1683 pub static FAMILY: &'static str = "unix";
1687 pub static FAMILY: &'static str = "windows";
1691 pub static SYSNAME: &'static str = "macos";
1692 pub static DLL_PREFIX: &'static str = "lib";
1693 pub static DLL_SUFFIX: &'static str = ".dylib";
1694 pub static EXE_SUFFIX: &'static str = "";
1698 pub static SYSNAME: &'static str = "freebsd";
1699 pub static DLL_PREFIX: &'static str = "lib";
1700 pub static DLL_SUFFIX: &'static str = ".so";
1701 pub static EXE_SUFFIX: &'static str = "";
1705 pub static SYSNAME: &'static str = "linux";
1706 pub static DLL_PREFIX: &'static str = "lib";
1707 pub static DLL_SUFFIX: &'static str = ".so";
1708 pub static EXE_SUFFIX: &'static str = "";
1712 pub static SYSNAME: &'static str = "android";
1713 pub static DLL_PREFIX: &'static str = "lib";
1714 pub static DLL_SUFFIX: &'static str = ".so";
1715 pub static EXE_SUFFIX: &'static str = "";
1719 pub static SYSNAME: &'static str = "win32";
1720 pub static DLL_PREFIX: &'static str = "";
1721 pub static DLL_SUFFIX: &'static str = ".dll";
1722 pub static EXE_SUFFIX: &'static str = ".exe";
1727 pub static ARCH: &'static str = "x86";
1730 pub static ARCH: &'static str = "x86_64";
1733 pub static ARCH: &'static str = "arm";
1736 pub static ARCH: &'static str = "mips";
1742 use libc::{c_int, c_void, size_t};
1746 use os::{as_c_charp, env, getcwd, getenv, make_absolute, real_args};
1747 use os::{remove_file, setenv, unsetenv};
1754 use vec::CopyableVector;
1755 use libc::consts::os::posix88::{S_IRUSR, S_IWUSR, S_IXUSR};
1759 pub fn last_os_error() {
1760 debug!(os::last_os_error());
1764 pub fn test_args() {
1765 let a = real_args();
1766 assert!(a.len() >= 1);
1769 fn make_rand_name() -> ~str {
1770 let mut rng = rand::rng();
1771 let n = ~"TEST" + rng.gen_str(10u);
1772 assert!(getenv(n).is_none());
1778 let n = make_rand_name();
1780 assert_eq!(getenv(n), option::Some(~"VALUE"));
1784 fn test_unsetenv() {
1785 let n = make_rand_name();
1788 assert_eq!(getenv(n), option::None);
1792 #[ignore(cfg(windows))]
1794 fn test_setenv_overwrite() {
1795 let n = make_rand_name();
1798 assert_eq!(getenv(n), option::Some(~"2"));
1800 assert_eq!(getenv(n), option::Some(~""));
1803 // Windows GetEnvironmentVariable requires some extra work to make sure
1804 // the buffer the variable is copied into is the right size
1806 #[ignore(cfg(windows))]
1808 fn test_getenv_big() {
1812 s = s + "aaaaaaaaaa";
1815 let n = make_rand_name();
1818 assert_eq!(getenv(n), option::Some(s));
1822 fn test_self_exe_path() {
1823 let path = os::self_exe_path();
1824 assert!(path.is_some());
1825 let path = path.get();
1826 debug!(path.clone());
1828 // Hard to test this function
1829 assert!(path.is_absolute);
1834 fn test_env_getenv() {
1836 assert!(e.len() > 0u);
1837 for e.iter().advance |p| {
1838 let (n, v) = (*p).clone();
1841 // MingW seems to set some funky environment variables like
1842 // "=C:=C:\MinGW\msys\1.0\bin" and "!::=::\" that are returned
1843 // from env() but not visible from getenv().
1844 assert!(v2.is_none() || v2 == option::Some(v));
1849 fn test_env_setenv() {
1850 let n = make_rand_name();
1854 assert!(!e.contains(&(n.clone(), ~"VALUE")));
1857 assert!(e.contains(&(n, ~"VALUE")));
1862 assert!((!Path("test-path").is_absolute));
1864 debug!("Current working directory: %s", getcwd().to_str());
1866 debug!(make_absolute(&Path("test-path")));
1867 debug!(make_absolute(&Path("/usr/bin")));
1873 let oldhome = getenv("HOME");
1875 setenv("HOME", "/home/MountainView");
1876 assert_eq!(os::homedir(), Some(Path("/home/MountainView")));
1879 assert!(os::homedir().is_none());
1881 for oldhome.iter().advance |s| { setenv("HOME", *s) }
1888 let oldhome = getenv("HOME");
1889 let olduserprofile = getenv("USERPROFILE");
1892 setenv("USERPROFILE", "");
1894 assert!(os::homedir().is_none());
1896 setenv("HOME", "/home/MountainView");
1897 assert_eq!(os::homedir(), Some(Path("/home/MountainView")));
1901 setenv("USERPROFILE", "/home/MountainView");
1902 assert_eq!(os::homedir(), Some(Path("/home/MountainView")));
1904 setenv("HOME", "/home/MountainView");
1905 setenv("USERPROFILE", "/home/PaloAlto");
1906 assert_eq!(os::homedir(), Some(Path("/home/MountainView")));
1908 oldhome.iter().advance(|s| { setenv("HOME", *s); true });
1909 olduserprofile.iter().advance(|s| { setenv("USERPROFILE", *s); true });
1914 assert!(!os::tmpdir().to_str().is_empty());
1919 fn test_list_dir_no_invalid_memory_access() {
1920 os::list_dir(&Path("."));
1925 let dirs = os::list_dir(&Path("."));
1926 // Just assuming that we've got some contents in the current directory
1927 assert!(dirs.len() > 0u);
1929 for dirs.iter().advance |dir| {
1930 debug!((*dir).clone());
1935 fn list_dir_empty_path() {
1936 let dirs = os::list_dir(&Path(""));
1937 assert!(dirs.is_empty());
1941 #[cfg(not(windows))]
1942 fn list_dir_root() {
1943 let dirs = os::list_dir(&Path("/"));
1944 assert!(dirs.len() > 1);
1948 fn list_dir_root() {
1949 let dirs = os::list_dir(&Path("C:\\"));
1950 assert!(dirs.len() > 1);
1956 assert!((os::path_is_dir(&Path("."))));
1957 assert!((!os::path_is_dir(&Path("test/stdtest/fs.rs"))));
1962 assert!((os::path_exists(&Path("."))));
1963 assert!((!os::path_exists(&Path(
1964 "test/nonexistent-bogus-path"))));
1968 fn copy_file_does_not_exist() {
1969 assert!(!os::copy_file(&Path("test/nonexistent-bogus-path"),
1970 &Path("test/other-bogus-path")));
1971 assert!(!os::path_exists(&Path("test/other-bogus-path")));
1977 let tempdir = getcwd(); // would like to use $TMPDIR,
1978 // doesn't seem to work on Linux
1979 assert!((tempdir.to_str().len() > 0u));
1980 let in = tempdir.push("in.txt");
1981 let out = tempdir.push("out.txt");
1983 /* Write the temp input file */
1984 let ostream = do as_c_charp(in.to_str()) |fromp| {
1985 do as_c_charp("w+b") |modebuf| {
1986 libc::fopen(fromp, modebuf)
1989 assert!((ostream as uint != 0u));
1991 let mut buf = s.as_bytes_with_null().to_owned();
1992 let len = buf.len();
1993 do buf.as_mut_buf |b, _len| {
1994 assert_eq!(libc::fwrite(b as *c_void, 1u as size_t,
1995 (s.len() + 1u) as size_t, ostream),
1998 assert_eq!(libc::fclose(ostream), (0u as c_int));
1999 let in_mode = in.get_mode();
2000 let rs = os::copy_file(&in, &out);
2001 if (!os::path_exists(&in)) {
2002 fail!("%s doesn't exist", in.to_str());
2005 let rslt = run::process_status("diff", [in.to_str(), out.to_str()]);
2006 assert_eq!(rslt, 0);
2007 assert_eq!(out.get_mode(), in_mode);
2008 assert!((remove_file(&in)));
2009 assert!((remove_file(&out)));
2014 fn recursive_mkdir_slash() {
2015 let path = Path("/");
2016 assert!(os::mkdir_recursive(&path, (S_IRUSR | S_IWUSR | S_IXUSR) as i32));
2020 fn recursive_mkdir_empty() {
2021 let path = Path("");
2022 assert!(!os::mkdir_recursive(&path, (S_IRUSR | S_IWUSR | S_IXUSR) as i32));
2026 fn memory_map_rw() {
2027 use result::{Ok, Err};
2029 let chunk = match os::MemoryMap::new(16, ~[
2034 Err(msg) => fail!(msg.to_str())
2036 assert!(chunk.len >= 16);
2040 assert!(*chunk.data == 0xBE);
2045 fn memory_map_file() {
2046 use result::{Ok, Err};
2051 fn lseek_(fd: c_int, size: uint) {
2053 assert!(lseek(fd, size as off_t, SEEK_SET) == size as off_t);
2057 fn lseek_(fd: c_int, size: uint) {
2059 assert!(lseek(fd, size as c_long, SEEK_SET) == size as c_long);
2063 let p = tmpdir().push("mmap_file.tmp");
2064 let size = page_size() * 2;
2068 let fd = do as_c_charp(p.to_str()) |path| {
2069 open(path, O_CREAT | O_RDWR | O_TRUNC, S_IRUSR | S_IWUSR)
2072 do as_c_charp("x") |x| {
2073 assert!(write(fd, x as *c_void, 1) == 1);
2077 let chunk = match MemoryMap::new(size / 2, ~[
2084 Err(msg) => fail!(msg.to_str())
2086 assert!(chunk.len > 0);
2090 assert!(*chunk.data == 0xbe);
2095 // More recursive_mkdir tests are in extra::tempfile