summaryrefslogtreecommitdiffstats
path: root/third_party/rust/redox_syscall
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 14:29:10 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 14:29:10 +0000
commit2aa4a82499d4becd2284cdb482213d541b8804dd (patch)
treeb80bf8bf13c3766139fbacc530efd0dd9d54394c /third_party/rust/redox_syscall
parentInitial commit. (diff)
downloadfirefox-2aa4a82499d4becd2284cdb482213d541b8804dd.tar.xz
firefox-2aa4a82499d4becd2284cdb482213d541b8804dd.zip
Adding upstream version 86.0.1.upstream/86.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'third_party/rust/redox_syscall')
-rw-r--r--third_party/rust/redox_syscall/.cargo-checksum.json1
-rw-r--r--third_party/rust/redox_syscall/Cargo.toml23
-rw-r--r--third_party/rust/redox_syscall/LICENSE22
-rw-r--r--third_party/rust/redox_syscall/README.md6
-rw-r--r--third_party/rust/redox_syscall/src/arch/aarch64.rs77
-rw-r--r--third_party/rust/redox_syscall/src/arch/arm.rs73
-rw-r--r--third_party/rust/redox_syscall/src/arch/nonredox.rs31
-rw-r--r--third_party/rust/redox_syscall/src/arch/x86.rs73
-rw-r--r--third_party/rust/redox_syscall/src/arch/x86_64.rs74
-rw-r--r--third_party/rust/redox_syscall/src/call.rs393
-rw-r--r--third_party/rust/redox_syscall/src/data.rs309
-rw-r--r--third_party/rust/redox_syscall/src/error.rs311
-rw-r--r--third_party/rust/redox_syscall/src/flag.rs169
-rw-r--r--third_party/rust/redox_syscall/src/io/dma.rs76
-rw-r--r--third_party/rust/redox_syscall/src/io/io.rs67
-rw-r--r--third_party/rust/redox_syscall/src/io/mmio.rs31
-rw-r--r--third_party/rust/redox_syscall/src/io/mod.rs11
-rw-r--r--third_party/rust/redox_syscall/src/io/pio.rs89
-rw-r--r--third_party/rust/redox_syscall/src/lib.rs59
-rw-r--r--third_party/rust/redox_syscall/src/number.rs76
-rwxr-xr-xthird_party/rust/redox_syscall/src/scheme/generate.sh20
-rw-r--r--third_party/rust/redox_syscall/src/scheme/mod.rs9
-rw-r--r--third_party/rust/redox_syscall/src/scheme/scheme.rs167
-rw-r--r--third_party/rust/redox_syscall/src/scheme/scheme_block.rs167
-rw-r--r--third_party/rust/redox_syscall/src/scheme/scheme_block_mut.rs167
-rw-r--r--third_party/rust/redox_syscall/src/scheme/scheme_mut.rs167
-rw-r--r--third_party/rust/redox_syscall/src/tests.rs129
27 files changed, 2797 insertions, 0 deletions
diff --git a/third_party/rust/redox_syscall/.cargo-checksum.json b/third_party/rust/redox_syscall/.cargo-checksum.json
new file mode 100644
index 0000000000..aa717290c0
--- /dev/null
+++ b/third_party/rust/redox_syscall/.cargo-checksum.json
@@ -0,0 +1 @@
+{"files":{"Cargo.toml":"6a30685e5679812735444beae8fbf0637c43cf65d8d7e74a9a44b7172899edd9","LICENSE":"efcfee7981ff72431fffb06925cad00a23dce079ed4354f61030ad5abdb78829","README.md":"9161f18ba7f69b4ca51e844aee8ffb8237513a468c5c3b1f3a5f989044f895ac","src/arch/aarch64.rs":"3c36537214f8e10331d42ce4c7ac57a472db49fed029193c31982279d08bdad5","src/arch/arm.rs":"44ed9097879fce0ebe85d29e25ba378fb3ee7fcd649b569207495ed601c42a1c","src/arch/nonredox.rs":"de54557f642218b34d451fc52fe3cff97e3e4307304ae02a678a900cab96cdb0","src/arch/x86.rs":"e72a7f653c25b1ea5595af7ce991fe0e5c96547e127fc67e4967d60abbe1d3bd","src/arch/x86_64.rs":"4b809fde77985b335b2f53057d0f13debeb3edae2bc3b18bcc7eb0af4b6d8aef","src/call.rs":"b5b53aab18bb91bfef88d82f1708d05e210a30cde141fce0031dad543d988391","src/data.rs":"84f8beb9d40b753a8c1713b922e99ed9913d35e959694b2c849351b1a92d87c9","src/error.rs":"d832a641ccb1baf10315e2e1ce59b12c30d605a526fc65a31f63bb3a92c3a2f7","src/flag.rs":"1e944be3b134d3776725529e2190e2d1548dd67a631838281b8c5bc829523dbe","src/io/dma.rs":"740cd441f844718a14f77c2fe292d29b7c468d686505810d8b3281f9528a6fe7","src/io/io.rs":"1bcb36d1867e9bab6a8186cd6928efe70ae2655e9f9d0dd3def20bc0fb6a82f6","src/io/mmio.rs":"b9fdb37d37a25a48106d60f1a977c541cb5162b20b12507c7dcd6eb3dff0a2c8","src/io/mod.rs":"4df12af3e82e6b5fe22112c9f51552112ee4811b7d1131d2a43d608d8d1cac09","src/io/pio.rs":"219fcd317d6c490a14794ec4db9de3e305c722dda720043c67076bda60632bb8","src/lib.rs":"907de02434902d35346f7e3b03be652a62e9def472cd1845eeca3da7a0c6bbea","src/number.rs":"4718baa58a0f3e6b9b66d1f328cb2a145e9b1f807654c3079a13b226c4085a29","src/scheme/generate.sh":"b022adacb74f2af1470e691341c37acc1582f428e9b8b6b9dccb790dde594b40","src/scheme/mod.rs":"2679272397bf0247e1a4695853465243ca02960feb4ced1124969f67ebd3e3ce","src/scheme/scheme.rs":"879728e4d4e7d8f3057df5a3a6af1636079135652594ee50ca1b665e876be595","src/scheme/scheme_block.rs":"a8ea17b1101548e9b36f6c9000f68fd5438a796069252f948bde7dda44088a7f","src/scheme/scheme_block_mut.rs":"8b881f84a54e2477967d43eb68dac7c578ff6451dba59eba0d517037b2ac4def","src/scheme/scheme_mut.rs":"30f9b0750437b7f55d5bb24da546fd4afcb3c27b0af06d5f681b8f1c4877e7b4","src/tests.rs":"b9d60e419f7e57bb942756e8011e19704cfd46fb6ec96ffa925fb7deb35c5d43"},"package":"2439c63f3f6139d1b57529d16bc3b8bb855230c8efcc5d3a896c8bea7c3b1e84"} \ No newline at end of file
diff --git a/third_party/rust/redox_syscall/Cargo.toml b/third_party/rust/redox_syscall/Cargo.toml
new file mode 100644
index 0000000000..459b06a524
--- /dev/null
+++ b/third_party/rust/redox_syscall/Cargo.toml
@@ -0,0 +1,23 @@
+# THIS FILE IS AUTOMATICALLY GENERATED BY CARGO
+#
+# When uploading crates to the registry Cargo will automatically
+# "normalize" Cargo.toml files for maximal compatibility
+# with all versions of Cargo and also rewrite `path` dependencies
+# to registry (e.g., crates.io) dependencies
+#
+# If you believe there's an error in this file please file an
+# issue against the rust-lang/cargo repository. If you're
+# editing this file be aware that the upstream Cargo.toml
+# will likely look very different (and much more reasonable)
+
+[package]
+name = "redox_syscall"
+version = "0.1.56"
+authors = ["Jeremy Soller <jackpot51@gmail.com>"]
+description = "A Rust library to access raw Redox system calls"
+documentation = "https://docs.rs/redox_syscall"
+license = "MIT"
+repository = "https://gitlab.redox-os.org/redox-os/syscall"
+
+[lib]
+name = "syscall"
diff --git a/third_party/rust/redox_syscall/LICENSE b/third_party/rust/redox_syscall/LICENSE
new file mode 100644
index 0000000000..1292bb7fbd
--- /dev/null
+++ b/third_party/rust/redox_syscall/LICENSE
@@ -0,0 +1,22 @@
+Copyright (c) 2017 Redox OS Developers
+
+MIT License
+
+Permission is hereby granted, free of charge, to any person obtaining
+a copy of this software and associated documentation files (the
+"Software"), to deal in the Software without restriction, including
+without limitation the rights to use, copy, modify, merge, publish,
+distribute, sublicense, and/or sell copies of the Software, and to
+permit persons to whom the Software is furnished to do so, subject to
+the following conditions:
+
+The above copyright notice and this permission notice shall be
+included in all copies or substantial portions of the Software.
+
+THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
+EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
+MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
+NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
+LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
+OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
+WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
diff --git a/third_party/rust/redox_syscall/README.md b/third_party/rust/redox_syscall/README.md
new file mode 100644
index 0000000000..244c90861a
--- /dev/null
+++ b/third_party/rust/redox_syscall/README.md
@@ -0,0 +1,6 @@
+# syscall
+[Redox OS](https://gitlab.redox-os.org/redox-os/redox)'s syscall API
+
+[![MIT licensed](https://img.shields.io/badge/license-MIT-blue.svg)](./LICENSE)
+[![crates.io](http://meritbadge.herokuapp.com/redox_syscall)](https://crates.io/crates/redox_syscall)
+[![docs.rs](https://docs.rs/redox_syscall/badge.svg)](https://docs.rs/redox_syscall)
diff --git a/third_party/rust/redox_syscall/src/arch/aarch64.rs b/third_party/rust/redox_syscall/src/arch/aarch64.rs
new file mode 100644
index 0000000000..662f428d04
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/arch/aarch64.rs
@@ -0,0 +1,77 @@
+use super::error::{Error, Result};
+
+pub unsafe fn syscall0(mut a: usize) -> Result<usize> {
+ asm!("svc 0"
+ : "={x0}"(a)
+ : "{x8}"(a)
+ : "x0", "x8"
+ : "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall1(mut a: usize, b: usize) -> Result<usize> {
+ asm!("svc 0"
+ : "={x0}"(a)
+ : "{x8}"(a), "{x0}"(b)
+ : "x0", "x8"
+ : "volatile");
+
+ Error::demux(a)
+}
+
+// Clobbers all registers - special for clone
+pub unsafe fn syscall1_clobber(mut a: usize, b: usize) -> Result<usize> {
+ asm!("svc 0"
+ : "={x0}"(a)
+ : "{x8}"(a), "{x0}"(b)
+ : "memory",
+ "x0", "x1", "x2", "x3", "x4", "x5", "x6", "x7",
+ "x8", "x9", "x10", "x11", "x12", "x13", "x14", "x15",
+ "x16", "x17","x18", "x19", "x20", "x21", "x22", "x23",
+ "x24", "x25", "x26", "x27", "x28", "x29", "x30"
+ : "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall2(mut a: usize, b: usize, c: usize) -> Result<usize> {
+ asm!("svc 0"
+ : "={x0}"(a)
+ : "{x8}"(a), "{x0}"(b), "{x1}"(c)
+ : "x0", "x1", "x8"
+ : "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall3(mut a: usize, b: usize, c: usize, d: usize) -> Result<usize> {
+ asm!("svc 0"
+ : "={x0}"(a)
+ : "{x8}"(a), "{x0}"(b), "{x1}"(c), "{x2}"(d)
+ : "x0", "x1", "x2", "x8"
+ : "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall4(mut a: usize, b: usize, c: usize, d: usize, e: usize) -> Result<usize> {
+ asm!("svc 0"
+ : "={x0}"(a)
+ : "{x8}"(a), "{x0}"(b), "{x1}"(c), "{x2}"(d), "{x3}"(e)
+ : "x0", "x1", "x2", "x3", "x8"
+ : "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall5(mut a: usize, b: usize, c: usize, d: usize, e: usize, f: usize)
+ -> Result<usize> {
+ asm!("svc 0"
+ : "={x0}"(a)
+ : "{x8}"(a), "{x0}"(b), "{x1}"(c), "{x2}"(d), "{x3}"(e), "{x4}"(f)
+ : "x0", "x1", "x2", "x3", "x4", "x8"
+ : "volatile");
+
+ Error::demux(a)
+}
diff --git a/third_party/rust/redox_syscall/src/arch/arm.rs b/third_party/rust/redox_syscall/src/arch/arm.rs
new file mode 100644
index 0000000000..e640f7ed37
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/arch/arm.rs
@@ -0,0 +1,73 @@
+use super::error::{Error, Result};
+
+pub unsafe fn syscall0(mut a: usize) -> Result<usize> {
+ asm!("swi $$0"
+ : "={r0}"(a)
+ : "{r7}"(a)
+ : "memory"
+ : "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall1(mut a: usize, b: usize) -> Result<usize> {
+ asm!("swi $$0"
+ : "={r0}"(a)
+ : "{r7}"(a), "{r0}"(b)
+ : "memory"
+ : "volatile");
+
+ Error::demux(a)
+}
+
+// Clobbers all registers - special for clone
+pub unsafe fn syscall1_clobber(mut a: usize, b: usize) -> Result<usize> {
+ asm!("swi $$0"
+ : "={r0}"(a)
+ : "{r7}"(a), "{r0}"(b)
+ : "memory", "r0", "r1", "r2", "r3", "r4"
+ : "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall2(mut a: usize, b: usize, c: usize) -> Result<usize> {
+ asm!("swi $$0"
+ : "={r0}"(a)
+ : "{r7}"(a), "{r0}"(b), "{r1}"(c)
+ : "memory"
+ : "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall3(mut a: usize, b: usize, c: usize, d: usize) -> Result<usize> {
+ asm!("swi $$0"
+ : "={r0}"(a)
+ : "{r7}"(a), "{r0}"(b), "{r1}"(c), "{r2}"(d)
+ : "memory"
+ : "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall4(mut a: usize, b: usize, c: usize, d: usize, e: usize) -> Result<usize> {
+ asm!("swi $$0"
+ : "={r0}"(a)
+ : "{r7}"(a), "{r0}"(b), "{r1}"(c), "{r2}"(d), "{r3}"(e)
+ : "memory"
+ : "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall5(mut a: usize, b: usize, c: usize, d: usize, e: usize, f: usize)
+ -> Result<usize> {
+ asm!("swi $$0"
+ : "={r0}"(a)
+ : "{r7}"(a), "{r0}"(b), "{r1}"(c), "{r2}"(d), "{r3}"(e), "{r4}"(f)
+ : "memory"
+ : "volatile");
+
+ Error::demux(a)
+}
diff --git a/third_party/rust/redox_syscall/src/arch/nonredox.rs b/third_party/rust/redox_syscall/src/arch/nonredox.rs
new file mode 100644
index 0000000000..c99d41ac2c
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/arch/nonredox.rs
@@ -0,0 +1,31 @@
+use super::error::{Error, Result, ENOSYS};
+
+pub unsafe fn syscall0(_a: usize) -> Result<usize> {
+ Err(Error::new(ENOSYS))
+}
+
+pub unsafe fn syscall1(_a: usize, _b: usize) -> Result<usize> {
+ Err(Error::new(ENOSYS))
+}
+
+// Clobbers all registers - special for clone
+pub unsafe fn syscall1_clobber(_a: usize, _b: usize) -> Result<usize> {
+ Err(Error::new(ENOSYS))
+}
+
+pub unsafe fn syscall2(_a: usize, _b: usize, _c: usize) -> Result<usize> {
+ Err(Error::new(ENOSYS))
+}
+
+pub unsafe fn syscall3(_a: usize, _b: usize, _c: usize, _d: usize) -> Result<usize> {
+ Err(Error::new(ENOSYS))
+}
+
+pub unsafe fn syscall4(_a: usize, _b: usize, _c: usize, _d: usize, _e: usize) -> Result<usize> {
+ Err(Error::new(ENOSYS))
+}
+
+pub unsafe fn syscall5(_a: usize, _b: usize, _c: usize, _d: usize, _e: usize, _f: usize)
+ -> Result<usize> {
+ Err(Error::new(ENOSYS))
+}
diff --git a/third_party/rust/redox_syscall/src/arch/x86.rs b/third_party/rust/redox_syscall/src/arch/x86.rs
new file mode 100644
index 0000000000..0cd6409bb0
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/arch/x86.rs
@@ -0,0 +1,73 @@
+use super::error::{Error, Result};
+
+pub unsafe fn syscall0(mut a: usize) -> Result<usize> {
+ asm!("int 0x80"
+ : "={eax}"(a)
+ : "{eax}"(a)
+ : "memory"
+ : "intel", "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall1(mut a: usize, b: usize) -> Result<usize> {
+ asm!("int 0x80"
+ : "={eax}"(a)
+ : "{eax}"(a), "{ebx}"(b)
+ : "memory"
+ : "intel", "volatile");
+
+ Error::demux(a)
+}
+
+// Clobbers all registers - special for clone
+pub unsafe fn syscall1_clobber(mut a: usize, b: usize) -> Result<usize> {
+ asm!("int 0x80"
+ : "={eax}"(a)
+ : "{eax}"(a), "{ebx}"(b)
+ : "memory", "ebx", "ecx", "edx", "esi", "edi"
+ : "intel", "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall2(mut a: usize, b: usize, c: usize) -> Result<usize> {
+ asm!("int 0x80"
+ : "={eax}"(a)
+ : "{eax}"(a), "{ebx}"(b), "{ecx}"(c)
+ : "memory"
+ : "intel", "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall3(mut a: usize, b: usize, c: usize, d: usize) -> Result<usize> {
+ asm!("int 0x80"
+ : "={eax}"(a)
+ : "{eax}"(a), "{ebx}"(b), "{ecx}"(c), "{edx}"(d)
+ : "memory"
+ : "intel", "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall4(mut a: usize, b: usize, c: usize, d: usize, e: usize) -> Result<usize> {
+ asm!("int 0x80"
+ : "={eax}"(a)
+ : "{eax}"(a), "{ebx}"(b), "{ecx}"(c), "{edx}"(d), "{esi}"(e)
+ : "memory"
+ : "intel", "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall5(mut a: usize, b: usize, c: usize, d: usize, e: usize, f: usize)
+ -> Result<usize> {
+ asm!("int 0x80"
+ : "={eax}"(a)
+ : "{eax}"(a), "{ebx}"(b), "{ecx}"(c), "{edx}"(d), "{esi}"(e), "{edi}"(f)
+ : "memory"
+ : "intel", "volatile");
+
+ Error::demux(a)
+}
diff --git a/third_party/rust/redox_syscall/src/arch/x86_64.rs b/third_party/rust/redox_syscall/src/arch/x86_64.rs
new file mode 100644
index 0000000000..76c3da130a
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/arch/x86_64.rs
@@ -0,0 +1,74 @@
+use super::error::{Error, Result};
+
+pub unsafe fn syscall0(mut a: usize) -> Result<usize> {
+ asm!("syscall"
+ : "={rax}"(a)
+ : "{rax}"(a)
+ : "rcx", "r11", "memory"
+ : "intel", "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall1(mut a: usize, b: usize) -> Result<usize> {
+ asm!("syscall"
+ : "={rax}"(a)
+ : "{rax}"(a), "{rdi}"(b)
+ : "rcx", "r11", "memory"
+ : "intel", "volatile");
+
+ Error::demux(a)
+}
+
+// Clobbers all registers - special for clone
+pub unsafe fn syscall1_clobber(mut a: usize, b: usize) -> Result<usize> {
+ asm!("syscall"
+ : "={rax}"(a)
+ : "{rax}"(a), "{rdi}"(b)
+ : "memory", "rbx", "rcx", "rdx", "rsi", "rdi", "r8",
+ "r9", "r10", "r11", "r12", "r13", "r14", "r15"
+ : "intel", "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall2(mut a: usize, b: usize, c: usize) -> Result<usize> {
+ asm!("syscall"
+ : "={rax}"(a)
+ : "{rax}"(a), "{rdi}"(b), "{rsi}"(c)
+ : "rcx", "r11", "memory"
+ : "intel", "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall3(mut a: usize, b: usize, c: usize, d: usize) -> Result<usize> {
+ asm!("syscall"
+ : "={rax}"(a)
+ : "{rax}"(a), "{rdi}"(b), "{rsi}"(c), "{rdx}"(d)
+ : "rcx", "r11", "memory"
+ : "intel", "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall4(mut a: usize, b: usize, c: usize, d: usize, e: usize) -> Result<usize> {
+ asm!("syscall"
+ : "={rax}"(a)
+ : "{rax}"(a), "{rdi}"(b), "{rsi}"(c), "{rdx}"(d), "{r10}"(e)
+ : "rcx", "r11", "memory"
+ : "intel", "volatile");
+
+ Error::demux(a)
+}
+
+pub unsafe fn syscall5(mut a: usize, b: usize, c: usize, d: usize, e: usize, f: usize)
+ -> Result<usize> {
+ asm!("syscall"
+ : "={rax}"(a)
+ : "{rax}"(a), "{rdi}"(b), "{rsi}"(c), "{rdx}"(d), "{r10}"(e), "{r8}"(f)
+ : "rcx", "r11", "memory"
+ : "intel", "volatile");
+
+ Error::demux(a)
+}
diff --git a/third_party/rust/redox_syscall/src/call.rs b/third_party/rust/redox_syscall/src/call.rs
new file mode 100644
index 0000000000..8b56541419
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/call.rs
@@ -0,0 +1,393 @@
+use super::arch::*;
+use super::data::{Map, SigAction, Stat, StatVfs, TimeSpec};
+use super::error::Result;
+use super::number::*;
+
+use core::{mem, ptr};
+
+// Signal restorer
+extern "C" fn restorer() -> ! {
+ sigreturn().unwrap();
+ unreachable!();
+}
+
+/// Set the end of the process's heap
+///
+/// When `addr` is `0`, this function will return the current break.
+///
+/// When `addr` is nonzero, this function will attempt to set the end of the process's
+/// heap to `addr` and return the new program break. The new program break should be
+/// checked by the allocator, it may not be exactly `addr`, as it may be aligned to a page
+/// boundary.
+///
+/// On error, `Err(ENOMEM)` will be returned indicating that no memory is available
+pub unsafe fn brk(addr: usize) -> Result<usize> {
+ syscall1(SYS_BRK, addr)
+}
+
+/// Change the process's working directory
+///
+/// This function will attempt to set the process's working directory to `path`, which can be
+/// either a relative, scheme relative, or absolute path.
+///
+/// On success, `Ok(0)` will be returned. On error, one of the following errors will be returned.
+///
+/// # Errors
+///
+/// * `EACCES` - permission is denied for one of the components of `path`, or `path`
+/// * `EFAULT` - `path` does not point to the process's addressible memory
+/// * `EIO` - an I/O error occurred
+/// * `ENOENT` - `path` does not exit
+/// * `ENOTDIR` - `path` is not a directory
+pub fn chdir<T: AsRef<[u8]>>(path: T) -> Result<usize> {
+ unsafe { syscall2(SYS_CHDIR, path.as_ref().as_ptr() as usize, path.as_ref().len()) }
+}
+
+#[deprecated(
+ since = "0.1.55",
+ note = "use fchmod instead"
+)]
+pub fn chmod<T: AsRef<[u8]>>(path: T, mode: usize) -> Result<usize> {
+ unsafe { syscall3(SYS_CHMOD, path.as_ref().as_ptr() as usize, path.as_ref().len(), mode) }
+}
+
+/// Produce a fork of the current process, or a new process thread
+pub unsafe fn clone(flags: usize) -> Result<usize> {
+ syscall1_clobber(SYS_CLONE, flags)
+}
+
+/// Close a file
+pub fn close(fd: usize) -> Result<usize> {
+ unsafe { syscall1(SYS_CLOSE, fd) }
+}
+
+/// Get the current system time
+pub fn clock_gettime(clock: usize, tp: &mut TimeSpec) -> Result<usize> {
+ unsafe { syscall2(SYS_CLOCK_GETTIME, clock, tp as *mut TimeSpec as usize) }
+}
+
+/// Copy and transform a file descriptor
+pub fn dup(fd: usize, buf: &[u8]) -> Result<usize> {
+ unsafe { syscall3(SYS_DUP, fd, buf.as_ptr() as usize, buf.len()) }
+}
+
+/// Copy and transform a file descriptor
+pub fn dup2(fd: usize, newfd: usize, buf: &[u8]) -> Result<usize> {
+ unsafe { syscall4(SYS_DUP2, fd, newfd, buf.as_ptr() as usize, buf.len()) }
+}
+
+/// Exit the current process
+pub fn exit(status: usize) -> Result<usize> {
+ unsafe { syscall1(SYS_EXIT, status) }
+}
+
+/// Change file permissions
+pub fn fchmod(fd: usize, mode: u16) -> Result<usize> {
+ unsafe { syscall2(SYS_FCHMOD, fd, mode as usize) }
+
+}
+
+/// Change file ownership
+pub fn fchown(fd: usize, uid: u32, gid: u32) -> Result<usize> {
+ unsafe { syscall3(SYS_FCHOWN, fd, uid as usize, gid as usize) }
+
+}
+
+/// Change file descriptor flags
+pub fn fcntl(fd: usize, cmd: usize, arg: usize) -> Result<usize> {
+ unsafe { syscall3(SYS_FCNTL, fd, cmd, arg) }
+}
+
+/// Replace the current process with a new executable
+pub fn fexec(fd: usize, args: &[[usize; 2]], vars: &[[usize; 2]]) -> Result<usize> {
+ unsafe { syscall5(SYS_FEXEC, fd, args.as_ptr() as usize, args.len(), vars.as_ptr() as usize, vars.len()) }
+}
+
+/// Map a file into memory
+pub unsafe fn fmap(fd: usize, map: &Map) -> Result<usize> {
+ syscall3(SYS_FMAP, fd, map as *const Map as usize, mem::size_of::<Map>())
+}
+
+/// Unmap a memory-mapped file
+pub unsafe fn funmap(addr: usize) -> Result<usize> {
+ syscall1(SYS_FUNMAP, addr)
+}
+
+/// Retrieve the canonical path of a file
+pub fn fpath(fd: usize, buf: &mut [u8]) -> Result<usize> {
+ unsafe { syscall3(SYS_FPATH, fd, buf.as_mut_ptr() as usize, buf.len()) }
+}
+
+/// Rename a file
+pub fn frename<T: AsRef<[u8]>>(fd: usize, path: T) -> Result<usize> {
+ unsafe { syscall3(SYS_FRENAME, fd, path.as_ref().as_ptr() as usize, path.as_ref().len()) }
+}
+
+/// Get metadata about a file
+pub fn fstat(fd: usize, stat: &mut Stat) -> Result<usize> {
+ unsafe { syscall3(SYS_FSTAT, fd, stat as *mut Stat as usize, mem::size_of::<Stat>()) }
+}
+
+/// Get metadata about a filesystem
+pub fn fstatvfs(fd: usize, stat: &mut StatVfs) -> Result<usize> {
+ unsafe { syscall3(SYS_FSTATVFS, fd, stat as *mut StatVfs as usize, mem::size_of::<StatVfs>()) }
+}
+
+/// Sync a file descriptor to its underlying medium
+pub fn fsync(fd: usize) -> Result<usize> {
+ unsafe { syscall1(SYS_FSYNC, fd) }
+}
+
+/// Truncate or extend a file to a specified length
+pub fn ftruncate(fd: usize, len: usize) -> Result<usize> {
+ unsafe { syscall2(SYS_FTRUNCATE, fd, len) }
+}
+
+// Change modify and/or access times
+pub fn futimens(fd: usize, times: &[TimeSpec]) -> Result<usize> {
+ unsafe { syscall3(SYS_FUTIMENS, fd, times.as_ptr() as usize, times.len() * mem::size_of::<TimeSpec>()) }
+}
+
+/// Fast userspace mutex
+pub unsafe fn futex(addr: *mut i32, op: usize, val: i32, val2: usize, addr2: *mut i32)
+ -> Result<usize> {
+ syscall5(SYS_FUTEX, addr as usize, op, (val as isize) as usize, val2, addr2 as usize)
+}
+
+/// Get the current working directory
+pub fn getcwd(buf: &mut [u8]) -> Result<usize> {
+ unsafe { syscall2(SYS_GETCWD, buf.as_mut_ptr() as usize, buf.len()) }
+}
+
+/// Get the effective group ID
+pub fn getegid() -> Result<usize> {
+ unsafe { syscall0(SYS_GETEGID) }
+}
+
+/// Get the effective namespace
+pub fn getens() -> Result<usize> {
+ unsafe { syscall0(SYS_GETENS) }
+}
+
+/// Get the effective user ID
+pub fn geteuid() -> Result<usize> {
+ unsafe { syscall0(SYS_GETEUID) }
+}
+
+/// Get the current group ID
+pub fn getgid() -> Result<usize> {
+ unsafe { syscall0(SYS_GETGID) }
+}
+
+/// Get the current namespace
+pub fn getns() -> Result<usize> {
+ unsafe { syscall0(SYS_GETNS) }
+}
+
+/// Get the current process ID
+pub fn getpid() -> Result<usize> {
+ unsafe { syscall0(SYS_GETPID) }
+}
+
+/// Get the process group ID
+pub fn getpgid(pid: usize) -> Result<usize> {
+ unsafe { syscall1(SYS_GETPGID, pid) }
+}
+
+/// Get the parent process ID
+pub fn getppid() -> Result<usize> {
+ unsafe { syscall0(SYS_GETPPID) }
+}
+
+/// Get the current user ID
+pub fn getuid() -> Result<usize> {
+ unsafe { syscall0(SYS_GETUID) }
+}
+
+/// Set the I/O privilege level
+///
+/// # Errors
+///
+/// * `EPERM` - `uid != 0`
+/// * `EINVAL` - `level > 3`
+pub unsafe fn iopl(level: usize) -> Result<usize> {
+ syscall1(SYS_IOPL, level)
+}
+
+/// Send a signal `sig` to the process identified by `pid`
+pub fn kill(pid: usize, sig: usize) -> Result<usize> {
+ unsafe { syscall2(SYS_KILL, pid, sig) }
+}
+
+/// Create a link to a file
+pub unsafe fn link(old: *const u8, new: *const u8) -> Result<usize> {
+ syscall2(SYS_LINK, old as usize, new as usize)
+}
+
+/// Seek to `offset` bytes in a file descriptor
+pub fn lseek(fd: usize, offset: isize, whence: usize) -> Result<usize> {
+ unsafe { syscall3(SYS_LSEEK, fd, offset as usize, whence) }
+}
+
+/// Make a new scheme namespace
+pub fn mkns(schemes: &[[usize; 2]]) -> Result<usize> {
+ unsafe { syscall2(SYS_MKNS, schemes.as_ptr() as usize, schemes.len()) }
+}
+
+/// Change mapping flags
+pub unsafe fn mprotect(addr: usize, size: usize, flags: usize) -> Result<usize> {
+ syscall3(SYS_MPROTECT, addr, size, flags)
+}
+
+/// Sleep for the time specified in `req`
+pub fn nanosleep(req: &TimeSpec, rem: &mut TimeSpec) -> Result<usize> {
+ unsafe { syscall2(SYS_NANOSLEEP, req as *const TimeSpec as usize,
+ rem as *mut TimeSpec as usize) }
+}
+
+/// Open a file
+pub fn open<T: AsRef<[u8]>>(path: T, flags: usize) -> Result<usize> {
+ unsafe { syscall3(SYS_OPEN, path.as_ref().as_ptr() as usize, path.as_ref().len(), flags) }
+}
+
+/// Allocate pages, linearly in physical memory
+///
+/// # Errors
+///
+/// * `EPERM` - `uid != 0`
+/// * `ENOMEM` - the system has run out of available memory
+pub unsafe fn physalloc(size: usize) -> Result<usize> {
+ syscall1(SYS_PHYSALLOC, size)
+}
+
+/// Free physically allocated pages
+///
+/// # Errors
+///
+/// * `EPERM` - `uid != 0`
+pub unsafe fn physfree(physical_address: usize, size: usize) -> Result<usize> {
+ syscall2(SYS_PHYSFREE, physical_address, size)
+}
+
+/// Map physical memory to virtual memory
+///
+/// # Errors
+///
+/// * `EPERM` - `uid != 0`
+pub unsafe fn physmap(physical_address: usize, size: usize, flags: usize) -> Result<usize> {
+ syscall3(SYS_PHYSMAP, physical_address, size, flags)
+}
+
+/// Unmap previously mapped physical memory
+///
+/// # Errors
+///
+/// * `EPERM` - `uid != 0`
+/// * `EFAULT` - `virtual_address` has not been mapped
+pub unsafe fn physunmap(virtual_address: usize) -> Result<usize> {
+ syscall1(SYS_PHYSUNMAP, virtual_address)
+}
+
+/// Create a pair of file descriptors referencing the read and write ends of a pipe
+pub fn pipe2(fds: &mut [usize; 2], flags: usize) -> Result<usize> {
+ unsafe { syscall2(SYS_PIPE2, fds.as_ptr() as usize, flags) }
+}
+
+/// Read from a file descriptor into a buffer
+pub fn read(fd: usize, buf: &mut [u8]) -> Result<usize> {
+ unsafe { syscall3(SYS_READ, fd, buf.as_mut_ptr() as usize, buf.len()) }
+}
+
+/// Remove a directory
+pub fn rmdir<T: AsRef<[u8]>>(path: T) -> Result<usize> {
+ unsafe { syscall2(SYS_RMDIR, path.as_ref().as_ptr() as usize, path.as_ref().len()) }
+}
+
+/// Set the process group ID
+pub fn setpgid(pid: usize, pgid: usize) -> Result<usize> {
+ unsafe { syscall2(SYS_SETPGID, pid, pgid) }
+}
+
+/// Set the current process group IDs
+pub fn setregid(rgid: usize, egid: usize) -> Result<usize> {
+ unsafe { syscall2(SYS_SETREGID, rgid, egid) }
+}
+
+/// Make a new scheme namespace
+pub fn setrens(rns: usize, ens: usize) -> Result<usize> {
+ unsafe { syscall2(SYS_SETRENS, rns, ens) }
+}
+
+/// Set the current process user IDs
+pub fn setreuid(ruid: usize, euid: usize) -> Result<usize> {
+ unsafe { syscall2(SYS_SETREUID, ruid, euid) }
+}
+
+/// Set up a signal handler
+pub fn sigaction(sig: usize, act: Option<&SigAction>, oldact: Option<&mut SigAction>) -> Result<usize> {
+ unsafe { syscall4(SYS_SIGACTION, sig,
+ act.map(|x| x as *const _).unwrap_or_else(ptr::null) as usize,
+ oldact.map(|x| x as *mut _).unwrap_or_else(ptr::null_mut) as usize,
+ restorer as usize) }
+}
+
+/// Get and/or set signal masks
+pub fn sigprocmask(how: usize, set: Option<&[u64; 2]>, oldset: Option<&mut [u64; 2]>) -> Result<usize> {
+ unsafe { syscall3(SYS_SIGPROCMASK, how,
+ set.map(|x| x as *const _).unwrap_or_else(ptr::null) as usize,
+ oldset.map(|x| x as *mut _).unwrap_or_else(ptr::null_mut) as usize) }
+}
+
+// Return from signal handler
+pub fn sigreturn() -> Result<usize> {
+ unsafe { syscall0(SYS_SIGRETURN) }
+}
+
+/// Set the file mode creation mask
+pub fn umask(mask: usize) -> Result<usize> {
+ unsafe { syscall1(SYS_UMASK, mask) }
+}
+
+/// Remove a file
+pub fn unlink<T: AsRef<[u8]>>(path: T) -> Result<usize> {
+ unsafe { syscall2(SYS_UNLINK, path.as_ref().as_ptr() as usize, path.as_ref().len()) }
+}
+
+/// Convert a virtual address to a physical one
+///
+/// # Errors
+///
+/// * `EPERM` - `uid != 0`
+pub unsafe fn virttophys(virtual_address: usize) -> Result<usize> {
+ syscall1(SYS_VIRTTOPHYS, virtual_address)
+}
+
+/// Check if a child process has exited or received a signal
+pub fn waitpid(pid: usize, status: &mut usize, options: usize) -> Result<usize> {
+ unsafe { syscall3(SYS_WAITPID, pid, status as *mut usize as usize, options) }
+}
+
+/// Write a buffer to a file descriptor
+///
+/// The kernel will attempt to write the bytes in `buf` to the file descriptor `fd`, returning
+/// either an `Err`, explained below, or `Ok(count)` where `count` is the number of bytes which
+/// were written.
+///
+/// # Errors
+///
+/// * `EAGAIN` - the file descriptor was opened with `O_NONBLOCK` and writing would block
+/// * `EBADF` - the file descriptor is not valid or is not open for writing
+/// * `EFAULT` - `buf` does not point to the process's addressible memory
+/// * `EIO` - an I/O error occurred
+/// * `ENOSPC` - the device containing the file descriptor has no room for data
+/// * `EPIPE` - the file descriptor refers to a pipe or socket whose reading end is closed
+pub fn write(fd: usize, buf: &[u8]) -> Result<usize> {
+ unsafe { syscall3(SYS_WRITE, fd, buf.as_ptr() as usize, buf.len()) }
+}
+
+/// Yield the process's time slice to the kernel
+///
+/// This function will return Ok(0) on success
+pub fn sched_yield() -> Result<usize> {
+ unsafe { syscall0(SYS_YIELD) }
+}
diff --git a/third_party/rust/redox_syscall/src/data.rs b/third_party/rust/redox_syscall/src/data.rs
new file mode 100644
index 0000000000..f2290e06f5
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/data.rs
@@ -0,0 +1,309 @@
+use core::ops::{Deref, DerefMut};
+use core::{mem, slice};
+
+#[derive(Copy, Clone, Debug, Default)]
+#[repr(C)]
+pub struct Event {
+ pub id: usize,
+ pub flags: usize,
+ pub data: usize
+}
+
+impl Deref for Event {
+ type Target = [u8];
+ fn deref(&self) -> &[u8] {
+ unsafe {
+ slice::from_raw_parts(self as *const Event as *const u8, mem::size_of::<Event>()) as &[u8]
+ }
+ }
+}
+
+impl DerefMut for Event {
+ fn deref_mut(&mut self) -> &mut [u8] {
+ unsafe {
+ slice::from_raw_parts_mut(self as *mut Event as *mut u8, mem::size_of::<Event>()) as &mut [u8]
+ }
+ }
+}
+
+#[derive(Copy, Clone, Debug, Default)]
+#[repr(C)]
+pub struct ITimerSpec {
+ pub it_interval: TimeSpec,
+ pub it_value: TimeSpec,
+}
+
+impl Deref for ITimerSpec {
+ type Target = [u8];
+ fn deref(&self) -> &[u8] {
+ unsafe {
+ slice::from_raw_parts(self as *const ITimerSpec as *const u8,
+ mem::size_of::<ITimerSpec>()) as &[u8]
+ }
+ }
+}
+
+impl DerefMut for ITimerSpec {
+ fn deref_mut(&mut self) -> &mut [u8] {
+ unsafe {
+ slice::from_raw_parts_mut(self as *mut ITimerSpec as *mut u8,
+ mem::size_of::<ITimerSpec>()) as &mut [u8]
+ }
+ }
+}
+
+#[derive(Copy, Clone, Debug, Default)]
+#[repr(C)]
+pub struct Map {
+ pub offset: usize,
+ pub size: usize,
+ pub flags: usize,
+}
+
+impl Deref for Map {
+ type Target = [u8];
+ fn deref(&self) -> &[u8] {
+ unsafe {
+ slice::from_raw_parts(self as *const Map as *const u8, mem::size_of::<Map>()) as &[u8]
+ }
+ }
+}
+
+impl DerefMut for Map {
+ fn deref_mut(&mut self) -> &mut [u8] {
+ unsafe {
+ slice::from_raw_parts_mut(self as *mut Map as *mut u8, mem::size_of::<Map>()) as &mut [u8]
+ }
+ }
+}
+
+#[derive(Copy, Clone, Debug, Default)]
+#[repr(C)]
+pub struct Packet {
+ pub id: u64,
+ pub pid: usize,
+ pub uid: u32,
+ pub gid: u32,
+ pub a: usize,
+ pub b: usize,
+ pub c: usize,
+ pub d: usize
+}
+
+impl Deref for Packet {
+ type Target = [u8];
+ fn deref(&self) -> &[u8] {
+ unsafe {
+ slice::from_raw_parts(self as *const Packet as *const u8, mem::size_of::<Packet>()) as &[u8]
+ }
+ }
+}
+
+impl DerefMut for Packet {
+ fn deref_mut(&mut self) -> &mut [u8] {
+ unsafe {
+ slice::from_raw_parts_mut(self as *mut Packet as *mut u8, mem::size_of::<Packet>()) as &mut [u8]
+ }
+ }
+}
+
+#[derive(Copy, Clone, Debug)]
+#[repr(C)]
+pub struct SigAction {
+ pub sa_handler: extern "C" fn(usize),
+ pub sa_mask: [u64; 2],
+ pub sa_flags: usize,
+}
+
+impl Default for SigAction {
+ fn default() -> Self {
+ Self {
+ sa_handler: unsafe { mem::transmute(0usize) },
+ sa_mask: [0; 2],
+ sa_flags: 0,
+ }
+ }
+}
+
+#[derive(Copy, Clone, Debug, Default)]
+#[repr(C)]
+pub struct Stat {
+ pub st_dev: u64,
+ pub st_ino: u64,
+ pub st_mode: u16,
+ pub st_nlink: u32,
+ pub st_uid: u32,
+ pub st_gid: u32,
+ pub st_size: u64,
+ pub st_blksize: u32,
+ pub st_blocks: u64,
+ pub st_mtime: u64,
+ pub st_mtime_nsec: u32,
+ pub st_atime: u64,
+ pub st_atime_nsec: u32,
+ pub st_ctime: u64,
+ pub st_ctime_nsec: u32,
+}
+
+impl Deref for Stat {
+ type Target = [u8];
+ fn deref(&self) -> &[u8] {
+ unsafe {
+ slice::from_raw_parts(self as *const Stat as *const u8,
+ mem::size_of::<Stat>()) as &[u8]
+ }
+ }
+}
+
+impl DerefMut for Stat {
+ fn deref_mut(&mut self) -> &mut [u8] {
+ unsafe {
+ slice::from_raw_parts_mut(self as *mut Stat as *mut u8,
+ mem::size_of::<Stat>()) as &mut [u8]
+ }
+ }
+}
+
+#[derive(Copy, Clone, Debug, Default)]
+#[repr(C)]
+pub struct StatVfs {
+ pub f_bsize: u32,
+ pub f_blocks: u64,
+ pub f_bfree: u64,
+ pub f_bavail: u64,
+}
+
+impl Deref for StatVfs {
+ type Target = [u8];
+ fn deref(&self) -> &[u8] {
+ unsafe {
+ slice::from_raw_parts(self as *const StatVfs as *const u8,
+ mem::size_of::<StatVfs>()) as &[u8]
+ }
+ }
+}
+
+impl DerefMut for StatVfs {
+ fn deref_mut(&mut self) -> &mut [u8] {
+ unsafe {
+ slice::from_raw_parts_mut(self as *mut StatVfs as *mut u8,
+ mem::size_of::<StatVfs>()) as &mut [u8]
+ }
+ }
+}
+
+#[derive(Copy, Clone, Debug, Default, PartialEq)]
+#[repr(C)]
+pub struct TimeSpec {
+ pub tv_sec: i64,
+ pub tv_nsec: i32,
+}
+
+impl Deref for TimeSpec {
+ type Target = [u8];
+ fn deref(&self) -> &[u8] {
+ unsafe {
+ slice::from_raw_parts(self as *const TimeSpec as *const u8,
+ mem::size_of::<TimeSpec>()) as &[u8]
+ }
+ }
+}
+
+impl DerefMut for TimeSpec {
+ fn deref_mut(&mut self) -> &mut [u8] {
+ unsafe {
+ slice::from_raw_parts_mut(self as *mut TimeSpec as *mut u8,
+ mem::size_of::<TimeSpec>()) as &mut [u8]
+ }
+ }
+}
+
+#[derive(Copy, Clone, Debug, Default)]
+#[repr(C)]
+#[cfg(target_arch = "x86_64")]
+pub struct IntRegisters {
+ pub r15: usize,
+ pub r14: usize,
+ pub r13: usize,
+ pub r12: usize,
+ pub rbp: usize,
+ pub rbx: usize,
+ pub r11: usize,
+ pub r10: usize,
+ pub r9: usize,
+ pub r8: usize,
+ pub rax: usize,
+ pub rcx: usize,
+ pub rdx: usize,
+ pub rsi: usize,
+ pub rdi: usize,
+ // pub orig_rax: usize,
+ pub rip: usize,
+ pub cs: usize,
+ pub eflags: usize,
+ pub rsp: usize,
+ pub ss: usize,
+ pub fs_base: usize,
+ pub gs_base: usize,
+ pub ds: usize,
+ pub es: usize,
+ pub fs: usize,
+ pub gs: usize
+}
+
+impl Deref for IntRegisters {
+ type Target = [u8];
+ fn deref(&self) -> &[u8] {
+ unsafe {
+ slice::from_raw_parts(self as *const IntRegisters as *const u8, mem::size_of::<IntRegisters>()) as &[u8]
+ }
+ }
+}
+
+impl DerefMut for IntRegisters {
+ fn deref_mut(&mut self) -> &mut [u8] {
+ unsafe {
+ slice::from_raw_parts_mut(self as *mut IntRegisters as *mut u8, mem::size_of::<IntRegisters>()) as &mut [u8]
+ }
+ }
+}
+
+#[derive(Clone, Copy)]
+#[repr(C)]
+#[cfg(target_arch = "x86_64")]
+pub struct FloatRegisters {
+ pub cwd: u16,
+ pub swd: u16,
+ pub ftw: u16,
+ pub fop: u16,
+ pub rip: u64,
+ pub rdp: u64,
+ pub mxcsr: u32,
+ pub mxcr_mask: u32,
+ pub st_space: [u32; 32],
+ pub xmm_space: [u32; 64]
+}
+
+impl Default for FloatRegisters {
+ fn default() -> Self {
+ // xmm_space is not Default until const generics
+ unsafe { mem::zeroed() }
+ }
+}
+
+impl Deref for FloatRegisters {
+ type Target = [u8];
+ fn deref(&self) -> &[u8] {
+ unsafe {
+ slice::from_raw_parts(self as *const FloatRegisters as *const u8, mem::size_of::<FloatRegisters>()) as &[u8]
+ }
+ }
+}
+
+impl DerefMut for FloatRegisters {
+ fn deref_mut(&mut self) -> &mut [u8] {
+ unsafe {
+ slice::from_raw_parts_mut(self as *mut FloatRegisters as *mut u8, mem::size_of::<FloatRegisters>()) as &mut [u8]
+ }
+ }
+}
diff --git a/third_party/rust/redox_syscall/src/error.rs b/third_party/rust/redox_syscall/src/error.rs
new file mode 100644
index 0000000000..fde4796a4f
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/error.rs
@@ -0,0 +1,311 @@
+use core::{fmt, result};
+
+#[derive(Eq, PartialEq)]
+pub struct Error {
+ pub errno: i32,
+}
+
+pub type Result<T> = result::Result<T, Error>;
+
+impl Error {
+ pub fn new(errno: i32) -> Error {
+ Error { errno: errno }
+ }
+
+ pub fn mux(result: Result<usize>) -> usize {
+ match result {
+ Ok(value) => value,
+ Err(error) => -error.errno as usize,
+ }
+ }
+
+ pub fn demux(value: usize) -> Result<usize> {
+ let errno = -(value as i32);
+ if errno >= 1 && errno < STR_ERROR.len() as i32 {
+ Err(Error::new(errno))
+ } else {
+ Ok(value)
+ }
+ }
+
+ pub fn text(&self) -> &'static str {
+ STR_ERROR.get(self.errno as usize).map(|&x| x).unwrap_or("Unknown Error")
+ }
+}
+
+impl fmt::Debug for Error {
+ fn fmt(&self, f: &mut fmt::Formatter) -> result::Result<(), fmt::Error> {
+ f.write_str(self.text())
+ }
+}
+
+impl fmt::Display for Error {
+ fn fmt(&self, f: &mut fmt::Formatter) -> result::Result<(), fmt::Error> {
+ f.write_str(self.text())
+ }
+}
+
+pub const EPERM: i32 = 1; /* Operation not permitted */
+pub const ENOENT: i32 = 2; /* No such file or directory */
+pub const ESRCH: i32 = 3; /* No such process */
+pub const EINTR: i32 = 4; /* Interrupted system call */
+pub const EIO: i32 = 5; /* I/O error */
+pub const ENXIO: i32 = 6; /* No such device or address */
+pub const E2BIG: i32 = 7; /* Argument list too long */
+pub const ENOEXEC: i32 = 8; /* Exec format error */
+pub const EBADF: i32 = 9; /* Bad file number */
+pub const ECHILD: i32 = 10; /* No child processes */
+pub const EAGAIN: i32 = 11; /* Try again */
+pub const ENOMEM: i32 = 12; /* Out of memory */
+pub const EACCES: i32 = 13; /* Permission denied */
+pub const EFAULT: i32 = 14; /* Bad address */
+pub const ENOTBLK: i32 = 15; /* Block device required */
+pub const EBUSY: i32 = 16; /* Device or resource busy */
+pub const EEXIST: i32 = 17; /* File exists */
+pub const EXDEV: i32 = 18; /* Cross-device link */
+pub const ENODEV: i32 = 19; /* No such device */
+pub const ENOTDIR: i32 = 20; /* Not a directory */
+pub const EISDIR: i32 = 21; /* Is a directory */
+pub const EINVAL: i32 = 22; /* Invalid argument */
+pub const ENFILE: i32 = 23; /* File table overflow */
+pub const EMFILE: i32 = 24; /* Too many open files */
+pub const ENOTTY: i32 = 25; /* Not a typewriter */
+pub const ETXTBSY: i32 = 26; /* Text file busy */
+pub const EFBIG: i32 = 27; /* File too large */
+pub const ENOSPC: i32 = 28; /* No space left on device */
+pub const ESPIPE: i32 = 29; /* Illegal seek */
+pub const EROFS: i32 = 30; /* Read-only file system */
+pub const EMLINK: i32 = 31; /* Too many links */
+pub const EPIPE: i32 = 32; /* Broken pipe */
+pub const EDOM: i32 = 33; /* Math argument out of domain of func */
+pub const ERANGE: i32 = 34; /* Math result not representable */
+pub const EDEADLK: i32 = 35; /* Resource deadlock would occur */
+pub const ENAMETOOLONG: i32 = 36; /* File name too long */
+pub const ENOLCK: i32 = 37; /* No record locks available */
+pub const ENOSYS: i32 = 38; /* Function not implemented */
+pub const ENOTEMPTY: i32 = 39; /* Directory not empty */
+pub const ELOOP: i32 = 40; /* Too many symbolic links encountered */
+pub const EWOULDBLOCK: i32 = 41; /* Operation would block */
+pub const ENOMSG: i32 = 42; /* No message of desired type */
+pub const EIDRM: i32 = 43; /* Identifier removed */
+pub const ECHRNG: i32 = 44; /* Channel number out of range */
+pub const EL2NSYNC: i32 = 45; /* Level 2 not synchronized */
+pub const EL3HLT: i32 = 46; /* Level 3 halted */
+pub const EL3RST: i32 = 47; /* Level 3 reset */
+pub const ELNRNG: i32 = 48; /* Link number out of range */
+pub const EUNATCH: i32 = 49; /* Protocol driver not attached */
+pub const ENOCSI: i32 = 50; /* No CSI structure available */
+pub const EL2HLT: i32 = 51; /* Level 2 halted */
+pub const EBADE: i32 = 52; /* Invalid exchange */
+pub const EBADR: i32 = 53; /* Invalid request descriptor */
+pub const EXFULL: i32 = 54; /* Exchange full */
+pub const ENOANO: i32 = 55; /* No anode */
+pub const EBADRQC: i32 = 56; /* Invalid request code */
+pub const EBADSLT: i32 = 57; /* Invalid slot */
+pub const EDEADLOCK: i32 = 58; /* Resource deadlock would occur */
+pub const EBFONT: i32 = 59; /* Bad font file format */
+pub const ENOSTR: i32 = 60; /* Device not a stream */
+pub const ENODATA: i32 = 61; /* No data available */
+pub const ETIME: i32 = 62; /* Timer expired */
+pub const ENOSR: i32 = 63; /* Out of streams resources */
+pub const ENONET: i32 = 64; /* Machine is not on the network */
+pub const ENOPKG: i32 = 65; /* Package not installed */
+pub const EREMOTE: i32 = 66; /* Object is remote */
+pub const ENOLINK: i32 = 67; /* Link has been severed */
+pub const EADV: i32 = 68; /* Advertise error */
+pub const ESRMNT: i32 = 69; /* Srmount error */
+pub const ECOMM: i32 = 70; /* Communication error on send */
+pub const EPROTO: i32 = 71; /* Protocol error */
+pub const EMULTIHOP: i32 = 72; /* Multihop attempted */
+pub const EDOTDOT: i32 = 73; /* RFS specific error */
+pub const EBADMSG: i32 = 74; /* Not a data message */
+pub const EOVERFLOW: i32 = 75; /* Value too large for defined data type */
+pub const ENOTUNIQ: i32 = 76; /* Name not unique on network */
+pub const EBADFD: i32 = 77; /* File descriptor in bad state */
+pub const EREMCHG: i32 = 78; /* Remote address changed */
+pub const ELIBACC: i32 = 79; /* Can not access a needed shared library */
+pub const ELIBBAD: i32 = 80; /* Accessing a corrupted shared library */
+pub const ELIBSCN: i32 = 81; /* .lib section in a.out corrupted */
+pub const ELIBMAX: i32 = 82; /* Attempting to link in too many shared libraries */
+pub const ELIBEXEC: i32 = 83; /* Cannot exec a shared library directly */
+pub const EILSEQ: i32 = 84; /* Illegal byte sequence */
+pub const ERESTART: i32 = 85; /* Interrupted system call should be restarted */
+pub const ESTRPIPE: i32 = 86; /* Streams pipe error */
+pub const EUSERS: i32 = 87; /* Too many users */
+pub const ENOTSOCK: i32 = 88; /* Socket operation on non-socket */
+pub const EDESTADDRREQ: i32 = 89; /* Destination address required */
+pub const EMSGSIZE: i32 = 90; /* Message too long */
+pub const EPROTOTYPE: i32 = 91; /* Protocol wrong type for socket */
+pub const ENOPROTOOPT: i32 = 92; /* Protocol not available */
+pub const EPROTONOSUPPORT: i32 = 93; /* Protocol not supported */
+pub const ESOCKTNOSUPPORT: i32 = 94; /* Socket type not supported */
+pub const EOPNOTSUPP: i32 = 95; /* Operation not supported on transport endpoint */
+pub const EPFNOSUPPORT: i32 = 96; /* Protocol family not supported */
+pub const EAFNOSUPPORT: i32 = 97; /* Address family not supported by protocol */
+pub const EADDRINUSE: i32 = 98; /* Address already in use */
+pub const EADDRNOTAVAIL: i32 = 99; /* Cannot assign requested address */
+pub const ENETDOWN: i32 = 100; /* Network is down */
+pub const ENETUNREACH: i32 = 101; /* Network is unreachable */
+pub const ENETRESET: i32 = 102; /* Network dropped connection because of reset */
+pub const ECONNABORTED: i32 = 103; /* Software caused connection abort */
+pub const ECONNRESET: i32 = 104; /* Connection reset by peer */
+pub const ENOBUFS: i32 = 105; /* No buffer space available */
+pub const EISCONN: i32 = 106; /* Transport endpoint is already connected */
+pub const ENOTCONN: i32 = 107; /* Transport endpoint is not connected */
+pub const ESHUTDOWN: i32 = 108; /* Cannot send after transport endpoint shutdown */
+pub const ETOOMANYREFS: i32 = 109; /* Too many references: cannot splice */
+pub const ETIMEDOUT: i32 = 110; /* Connection timed out */
+pub const ECONNREFUSED: i32 = 111; /* Connection refused */
+pub const EHOSTDOWN: i32 = 112; /* Host is down */
+pub const EHOSTUNREACH: i32 = 113; /* No route to host */
+pub const EALREADY: i32 = 114; /* Operation already in progress */
+pub const EINPROGRESS: i32 = 115; /* Operation now in progress */
+pub const ESTALE: i32 = 116; /* Stale NFS file handle */
+pub const EUCLEAN: i32 = 117; /* Structure needs cleaning */
+pub const ENOTNAM: i32 = 118; /* Not a XENIX named type file */
+pub const ENAVAIL: i32 = 119; /* No XENIX semaphores available */
+pub const EISNAM: i32 = 120; /* Is a named type file */
+pub const EREMOTEIO: i32 = 121; /* Remote I/O error */
+pub const EDQUOT: i32 = 122; /* Quota exceeded */
+pub const ENOMEDIUM: i32 = 123; /* No medium found */
+pub const EMEDIUMTYPE: i32 = 124; /* Wrong medium type */
+pub const ECANCELED: i32 = 125; /* Operation Canceled */
+pub const ENOKEY: i32 = 126; /* Required key not available */
+pub const EKEYEXPIRED: i32 = 127; /* Key has expired */
+pub const EKEYREVOKED: i32 = 128; /* Key has been revoked */
+pub const EKEYREJECTED: i32 = 129; /* Key was rejected by service */
+pub const EOWNERDEAD: i32 = 130; /* Owner died */
+pub const ENOTRECOVERABLE: i32 = 131; /* State not recoverable */
+
+pub static STR_ERROR: [&'static str; 132] = ["Success",
+ "Operation not permitted",
+ "No such file or directory",
+ "No such process",
+ "Interrupted system call",
+ "I/O error",
+ "No such device or address",
+ "Argument list too long",
+ "Exec format error",
+ "Bad file number",
+ "No child processes",
+ "Try again",
+ "Out of memory",
+ "Permission denied",
+ "Bad address",
+ "Block device required",
+ "Device or resource busy",
+ "File exists",
+ "Cross-device link",
+ "No such device",
+ "Not a directory",
+ "Is a directory",
+ "Invalid argument",
+ "File table overflow",
+ "Too many open files",
+ "Not a typewriter",
+ "Text file busy",
+ "File too large",
+ "No space left on device",
+ "Illegal seek",
+ "Read-only file system",
+ "Too many links",
+ "Broken pipe",
+ "Math argument out of domain of func",
+ "Math result not representable",
+ "Resource deadlock would occur",
+ "File name too long",
+ "No record locks available",
+ "Function not implemented",
+ "Directory not empty",
+ "Too many symbolic links encountered",
+ "Operation would block",
+ "No message of desired type",
+ "Identifier removed",
+ "Channel number out of range",
+ "Level 2 not synchronized",
+ "Level 3 halted",
+ "Level 3 reset",
+ "Link number out of range",
+ "Protocol driver not attached",
+ "No CSI structure available",
+ "Level 2 halted",
+ "Invalid exchange",
+ "Invalid request descriptor",
+ "Exchange full",
+ "No anode",
+ "Invalid request code",
+ "Invalid slot",
+ "Resource deadlock would occur",
+ "Bad font file format",
+ "Device not a stream",
+ "No data available",
+ "Timer expired",
+ "Out of streams resources",
+ "Machine is not on the network",
+ "Package not installed",
+ "Object is remote",
+ "Link has been severed",
+ "Advertise error",
+ "Srmount error",
+ "Communication error on send",
+ "Protocol error",
+ "Multihop attempted",
+ "RFS specific error",
+ "Not a data message",
+ "Value too large for defined data type",
+ "Name not unique on network",
+ "File descriptor in bad state",
+ "Remote address changed",
+ "Can not access a needed shared library",
+ "Accessing a corrupted shared library",
+ ".lib section in a.out corrupted",
+ "Attempting to link in too many shared libraries",
+ "Cannot exec a shared library directly",
+ "Illegal byte sequence",
+ "Interrupted system call should be restarted",
+ "Streams pipe error",
+ "Too many users",
+ "Socket operation on non-socket",
+ "Destination address required",
+ "Message too long",
+ "Protocol wrong type for socket",
+ "Protocol not available",
+ "Protocol not supported",
+ "Socket type not supported",
+ "Operation not supported on transport endpoint",
+ "Protocol family not supported",
+ "Address family not supported by protocol",
+ "Address already in use",
+ "Cannot assign requested address",
+ "Network is down",
+ "Network is unreachable",
+ "Network dropped connection because of reset",
+ "Software caused connection abort",
+ "Connection reset by peer",
+ "No buffer space available",
+ "Transport endpoint is already connected",
+ "Transport endpoint is not connected",
+ "Cannot send after transport endpoint shutdown",
+ "Too many references: cannot splice",
+ "Connection timed out",
+ "Connection refused",
+ "Host is down",
+ "No route to host",
+ "Operation already in progress",
+ "Operation now in progress",
+ "Stale NFS file handle",
+ "Structure needs cleaning",
+ "Not a XENIX named type file",
+ "No XENIX semaphores available",
+ "Is a named type file",
+ "Remote I/O error",
+ "Quota exceeded",
+ "No medium found",
+ "Wrong medium type",
+ "Operation Canceled",
+ "Required key not available",
+ "Key has expired",
+ "Key has been revoked",
+ "Key was rejected by service",
+ "Owner died",
+ "State not recoverable"];
diff --git a/third_party/rust/redox_syscall/src/flag.rs b/third_party/rust/redox_syscall/src/flag.rs
new file mode 100644
index 0000000000..e6c4cbff4f
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/flag.rs
@@ -0,0 +1,169 @@
+pub const CLONE_VM: usize = 0x100;
+pub const CLONE_FS: usize = 0x200;
+pub const CLONE_FILES: usize = 0x400;
+pub const CLONE_SIGHAND: usize = 0x800;
+pub const CLONE_VFORK: usize = 0x4000;
+pub const CLONE_THREAD: usize = 0x10000;
+pub const CLONE_STACK: usize = 0x1000_0000;
+
+pub const CLOCK_REALTIME: usize = 1;
+pub const CLOCK_MONOTONIC: usize = 4;
+
+pub const EVENT_NONE: usize = 0;
+pub const EVENT_READ: usize = 1;
+pub const EVENT_WRITE: usize = 2;
+
+pub const F_DUPFD: usize = 0;
+pub const F_GETFD: usize = 1;
+pub const F_SETFD: usize = 2;
+pub const F_GETFL: usize = 3;
+pub const F_SETFL: usize = 4;
+
+pub const FUTEX_WAIT: usize = 0;
+pub const FUTEX_WAKE: usize = 1;
+pub const FUTEX_REQUEUE: usize = 2;
+
+pub const MAP_SHARED: usize = 0x0001;
+pub const MAP_PRIVATE: usize = 0x0002;
+
+pub const MODE_TYPE: u16 = 0xF000;
+pub const MODE_DIR: u16 = 0x4000;
+pub const MODE_FILE: u16 = 0x8000;
+pub const MODE_SYMLINK: u16 = 0xA000;
+pub const MODE_FIFO: u16 = 0x1000;
+pub const MODE_CHR: u16 = 0x2000;
+
+pub const MODE_PERM: u16 = 0x0FFF;
+pub const MODE_SETUID: u16 = 0o4000;
+pub const MODE_SETGID: u16 = 0o2000;
+
+pub const O_RDONLY: usize = 0x0001_0000;
+pub const O_WRONLY: usize = 0x0002_0000;
+pub const O_RDWR: usize = 0x0003_0000;
+pub const O_NONBLOCK: usize = 0x0004_0000;
+pub const O_APPEND: usize = 0x0008_0000;
+pub const O_SHLOCK: usize = 0x0010_0000;
+pub const O_EXLOCK: usize = 0x0020_0000;
+pub const O_ASYNC: usize = 0x0040_0000;
+pub const O_FSYNC: usize = 0x0080_0000;
+pub const O_CLOEXEC: usize = 0x0100_0000;
+pub const O_CREAT: usize = 0x0200_0000;
+pub const O_TRUNC: usize = 0x0400_0000;
+pub const O_EXCL: usize = 0x0800_0000;
+pub const O_DIRECTORY: usize = 0x1000_0000;
+pub const O_STAT: usize = 0x2000_0000;
+pub const O_SYMLINK: usize = 0x4000_0000;
+pub const O_NOFOLLOW: usize = 0x8000_0000;
+pub const O_ACCMODE: usize = O_RDONLY | O_WRONLY | O_RDWR;
+
+pub const PHYSMAP_WRITE: usize = 0x0000_0001;
+pub const PHYSMAP_WRITE_COMBINE: usize = 0x0000_0002;
+pub const PHYSMAP_NO_CACHE: usize = 0x0000_0004;
+
+pub const PROT_NONE: usize = 0x0000_0000;
+pub const PROT_EXEC: usize = 0x0001_0000;
+pub const PROT_WRITE: usize = 0x0002_0000;
+pub const PROT_READ: usize = 0x0004_0000;
+
+pub const PTRACE_CONT: u8 = 0b0000_0001;
+pub const PTRACE_SINGLESTEP: u8 = 0b0000_0010;
+pub const PTRACE_SYSCALL: u8 = 0b0000_0011;
+pub const PTRACE_WAIT: u8 = 0b0000_0100;
+pub const PTRACE_OPERATIONMASK: u8 = 0b0000_1111;
+pub const PTRACE_SYSEMU: u8 = 0b0001_0000;
+
+pub const SEEK_SET: usize = 0;
+pub const SEEK_CUR: usize = 1;
+pub const SEEK_END: usize = 2;
+
+pub const SIGHUP: usize = 1;
+pub const SIGINT: usize = 2;
+pub const SIGQUIT: usize = 3;
+pub const SIGILL: usize = 4;
+pub const SIGTRAP: usize = 5;
+pub const SIGABRT: usize = 6;
+pub const SIGBUS: usize = 7;
+pub const SIGFPE: usize = 8;
+pub const SIGKILL: usize = 9;
+pub const SIGUSR1: usize = 10;
+pub const SIGSEGV: usize = 11;
+pub const SIGUSR2: usize = 12;
+pub const SIGPIPE: usize = 13;
+pub const SIGALRM: usize = 14;
+pub const SIGTERM: usize = 15;
+pub const SIGSTKFLT: usize= 16;
+pub const SIGCHLD: usize = 17;
+pub const SIGCONT: usize = 18;
+pub const SIGSTOP: usize = 19;
+pub const SIGTSTP: usize = 20;
+pub const SIGTTIN: usize = 21;
+pub const SIGTTOU: usize = 22;
+pub const SIGURG: usize = 23;
+pub const SIGXCPU: usize = 24;
+pub const SIGXFSZ: usize = 25;
+pub const SIGVTALRM: usize= 26;
+pub const SIGPROF: usize = 27;
+pub const SIGWINCH: usize = 28;
+pub const SIGIO: usize = 29;
+pub const SIGPWR: usize = 30;
+pub const SIGSYS: usize = 31;
+
+pub const SIG_DFL: usize = 0;
+pub const SIG_IGN: usize = 1;
+
+pub const SIG_BLOCK: usize = 0;
+pub const SIG_UNBLOCK: usize = 1;
+pub const SIG_SETMASK: usize = 2;
+
+pub const SA_NOCLDSTOP: usize = 0x00000001;
+pub const SA_NOCLDWAIT: usize = 0x00000002;
+pub const SA_SIGINFO: usize = 0x00000004;
+pub const SA_RESTORER: usize = 0x04000000;
+pub const SA_ONSTACK: usize = 0x08000000;
+pub const SA_RESTART: usize = 0x10000000;
+pub const SA_NODEFER: usize = 0x40000000;
+pub const SA_RESETHAND: usize = 0x80000000;
+
+pub const WNOHANG: usize = 0x01;
+pub const WUNTRACED: usize = 0x02;
+pub const WCONTINUED: usize = 0x08;
+
+/// True if status indicates the child is stopped.
+pub fn wifstopped(status: usize) -> bool {
+ (status & 0xff) == 0x7f
+}
+
+/// If wifstopped(status), the signal that stopped the child.
+pub fn wstopsig(status: usize) -> usize {
+ (status >> 8) & 0xff
+}
+
+/// True if status indicates the child continued after a stop.
+pub fn wifcontinued(status: usize) -> bool {
+ status == 0xffff
+}
+
+/// True if STATUS indicates termination by a signal.
+pub fn wifsignaled(status: usize) -> bool {
+ ((status & 0x7f) + 1) as i8 >= 2
+}
+
+/// If wifsignaled(status), the terminating signal.
+pub fn wtermsig(status: usize) -> usize {
+ status & 0x7f
+}
+
+/// True if status indicates normal termination.
+pub fn wifexited(status: usize) -> bool {
+ wtermsig(status) == 0
+}
+
+/// If wifexited(status), the exit status.
+pub fn wexitstatus(status: usize) -> usize {
+ (status >> 8) & 0xff
+}
+
+/// True if status indicates a core dump was created.
+pub fn wcoredump(status: usize) -> bool {
+ (status & 0x80) != 0
+}
diff --git a/third_party/rust/redox_syscall/src/io/dma.rs b/third_party/rust/redox_syscall/src/io/dma.rs
new file mode 100644
index 0000000000..d5334b843f
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/io/dma.rs
@@ -0,0 +1,76 @@
+use core::{mem, ptr};
+use core::ops::{Deref, DerefMut};
+
+use Result;
+
+struct PhysBox {
+ address: usize,
+ size: usize
+}
+
+impl PhysBox {
+ fn new(size: usize) -> Result<PhysBox> {
+ let address = unsafe { ::physalloc(size)? };
+ Ok(PhysBox {
+ address: address,
+ size: size
+ })
+ }
+}
+
+impl Drop for PhysBox {
+ fn drop(&mut self) {
+ let _ = unsafe { ::physfree(self.address, self.size) };
+ }
+}
+
+pub struct Dma<T> {
+ phys: PhysBox,
+ virt: *mut T
+}
+
+impl<T> Dma<T> {
+ pub fn new(value: T) -> Result<Dma<T>> {
+ let phys = PhysBox::new(mem::size_of::<T>())?;
+ let virt = unsafe { ::physmap(phys.address, phys.size, ::PHYSMAP_WRITE)? } as *mut T;
+ unsafe { ptr::write(virt, value); }
+ Ok(Dma {
+ phys: phys,
+ virt: virt
+ })
+ }
+
+ pub fn zeroed() -> Result<Dma<T>> {
+ let phys = PhysBox::new(mem::size_of::<T>())?;
+ let virt = unsafe { ::physmap(phys.address, phys.size, ::PHYSMAP_WRITE)? } as *mut T;
+ unsafe { ptr::write_bytes(virt as *mut u8, 0, phys.size); }
+ Ok(Dma {
+ phys: phys,
+ virt: virt
+ })
+ }
+
+ pub fn physical(&self) -> usize {
+ self.phys.address
+ }
+}
+
+impl<T> Deref for Dma<T> {
+ type Target = T;
+ fn deref(&self) -> &T {
+ unsafe { &*self.virt }
+ }
+}
+
+impl<T> DerefMut for Dma<T> {
+ fn deref_mut(&mut self) -> &mut T {
+ unsafe { &mut *self.virt }
+ }
+}
+
+impl<T> Drop for Dma<T> {
+ fn drop(&mut self) {
+ unsafe { drop(ptr::read(self.virt)); }
+ let _ = unsafe { ::physunmap(self.virt as usize) };
+ }
+}
diff --git a/third_party/rust/redox_syscall/src/io/io.rs b/third_party/rust/redox_syscall/src/io/io.rs
new file mode 100644
index 0000000000..fb866b581b
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/io/io.rs
@@ -0,0 +1,67 @@
+use core::cmp::PartialEq;
+use core::ops::{BitAnd, BitOr, Not};
+
+pub trait Io {
+ type Value: Copy + PartialEq + BitAnd<Output = Self::Value> + BitOr<Output = Self::Value> + Not<Output = Self::Value>;
+
+ fn read(&self) -> Self::Value;
+ fn write(&mut self, value: Self::Value);
+
+ #[inline(always)]
+ fn readf(&self, flags: Self::Value) -> bool {
+ (self.read() & flags) as Self::Value == flags
+ }
+
+ #[inline(always)]
+ fn writef(&mut self, flags: Self::Value, value: bool) {
+ let tmp: Self::Value = match value {
+ true => self.read() | flags,
+ false => self.read() & !flags,
+ };
+ self.write(tmp);
+ }
+}
+
+pub struct ReadOnly<I: Io> {
+ inner: I
+}
+
+impl<I: Io> ReadOnly<I> {
+ pub const fn new(inner: I) -> ReadOnly<I> {
+ ReadOnly {
+ inner: inner
+ }
+ }
+
+ #[inline(always)]
+ pub fn read(&self) -> I::Value {
+ self.inner.read()
+ }
+
+ #[inline(always)]
+ pub fn readf(&self, flags: I::Value) -> bool {
+ self.inner.readf(flags)
+ }
+}
+
+pub struct WriteOnly<I: Io> {
+ inner: I
+}
+
+impl<I: Io> WriteOnly<I> {
+ pub const fn new(inner: I) -> WriteOnly<I> {
+ WriteOnly {
+ inner: inner
+ }
+ }
+
+ #[inline(always)]
+ pub fn write(&mut self, value: I::Value) {
+ self.inner.write(value)
+ }
+
+ #[inline(always)]
+ pub fn writef(&mut self, flags: I::Value, value: bool) {
+ self.inner.writef(flags, value)
+ }
+}
diff --git a/third_party/rust/redox_syscall/src/io/mmio.rs b/third_party/rust/redox_syscall/src/io/mmio.rs
new file mode 100644
index 0000000000..b8e7727d3c
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/io/mmio.rs
@@ -0,0 +1,31 @@
+use core::ptr::{read_volatile, write_volatile};
+use core::mem::uninitialized;
+use core::ops::{BitAnd, BitOr, Not};
+
+use super::io::Io;
+
+#[repr(packed)]
+pub struct Mmio<T> {
+ value: T,
+}
+
+impl<T> Mmio<T> {
+ /// Create a new Mmio without initializing
+ pub fn new() -> Self {
+ Mmio {
+ value: unsafe { uninitialized() }
+ }
+ }
+}
+
+impl<T> Io for Mmio<T> where T: Copy + PartialEq + BitAnd<Output = T> + BitOr<Output = T> + Not<Output = T> {
+ type Value = T;
+
+ fn read(&self) -> T {
+ unsafe { read_volatile(&self.value) }
+ }
+
+ fn write(&mut self, value: T) {
+ unsafe { write_volatile(&mut self.value, value) };
+ }
+}
diff --git a/third_party/rust/redox_syscall/src/io/mod.rs b/third_party/rust/redox_syscall/src/io/mod.rs
new file mode 100644
index 0000000000..a35456e30a
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/io/mod.rs
@@ -0,0 +1,11 @@
+//! I/O functions
+
+pub use self::dma::*;
+pub use self::io::*;
+pub use self::mmio::*;
+pub use self::pio::*;
+
+mod dma;
+mod io;
+mod mmio;
+mod pio;
diff --git a/third_party/rust/redox_syscall/src/io/pio.rs b/third_party/rust/redox_syscall/src/io/pio.rs
new file mode 100644
index 0000000000..91ae310b62
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/io/pio.rs
@@ -0,0 +1,89 @@
+use core::marker::PhantomData;
+
+use super::io::Io;
+
+/// Generic PIO
+#[derive(Copy, Clone)]
+pub struct Pio<T> {
+ port: u16,
+ value: PhantomData<T>,
+}
+
+impl<T> Pio<T> {
+ /// Create a PIO from a given port
+ pub const fn new(port: u16) -> Self {
+ Pio::<T> {
+ port: port,
+ value: PhantomData,
+ }
+ }
+}
+
+/// Read/Write for byte PIO
+impl Io for Pio<u8> {
+ type Value = u8;
+
+ /// Read
+ #[inline(always)]
+ fn read(&self) -> u8 {
+ let value: u8;
+ unsafe {
+ asm!("in $0, $1" : "={al}"(value) : "{dx}"(self.port) : "memory" : "intel", "volatile");
+ }
+ value
+ }
+
+ /// Write
+ #[inline(always)]
+ fn write(&mut self, value: u8) {
+ unsafe {
+ asm!("out $1, $0" : : "{al}"(value), "{dx}"(self.port) : "memory" : "intel", "volatile");
+ }
+ }
+}
+
+/// Read/Write for word PIO
+impl Io for Pio<u16> {
+ type Value = u16;
+
+ /// Read
+ #[inline(always)]
+ fn read(&self) -> u16 {
+ let value: u16;
+ unsafe {
+ asm!("in $0, $1" : "={ax}"(value) : "{dx}"(self.port) : "memory" : "intel", "volatile");
+ }
+ value
+ }
+
+ /// Write
+ #[inline(always)]
+ fn write(&mut self, value: u16) {
+ unsafe {
+ asm!("out $1, $0" : : "{ax}"(value), "{dx}"(self.port) : "memory" : "intel", "volatile");
+ }
+ }
+}
+
+/// Read/Write for doubleword PIO
+impl Io for Pio<u32> {
+ type Value = u32;
+
+ /// Read
+ #[inline(always)]
+ fn read(&self) -> u32 {
+ let value: u32;
+ unsafe {
+ asm!("in $0, $1" : "={eax}"(value) : "{dx}"(self.port) : "memory" : "intel", "volatile");
+ }
+ value
+ }
+
+ /// Write
+ #[inline(always)]
+ fn write(&mut self, value: u32) {
+ unsafe {
+ asm!("out $1, $0" : : "{eax}"(value), "{dx}"(self.port) : "memory" : "intel", "volatile");
+ }
+ }
+}
diff --git a/third_party/rust/redox_syscall/src/lib.rs b/third_party/rust/redox_syscall/src/lib.rs
new file mode 100644
index 0000000000..6b8d130f01
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/lib.rs
@@ -0,0 +1,59 @@
+#![feature(asm)]
+#![feature(const_fn)]
+#![cfg_attr(not(test), no_std)]
+
+#[cfg(test)]
+extern crate core;
+
+pub use self::arch::*;
+pub use self::call::*;
+pub use self::data::*;
+pub use self::error::*;
+pub use self::flag::*;
+pub use self::io::*;
+pub use self::number::*;
+pub use self::scheme::*;
+
+#[cfg(all(target_os = "redox", target_arch = "arm"))]
+#[path="arch/arm.rs"]
+mod arch;
+
+#[cfg(all(target_os = "redox", target_arch = "aarch64"))]
+#[path="arch/aarch64.rs"]
+mod arch;
+
+#[cfg(all(target_os = "redox", target_arch = "x86"))]
+#[path="arch/x86.rs"]
+mod arch;
+
+#[cfg(all(target_os = "redox", target_arch = "x86_64"))]
+#[path="arch/x86_64.rs"]
+mod arch;
+
+#[cfg(not(target_os = "redox"))]
+#[path="arch/nonredox.rs"]
+mod arch;
+
+/// Function definitions
+pub mod call;
+
+/// Complex structures that are used for some system calls
+pub mod data;
+
+/// All errors that can be generated by a system call
+pub mod error;
+
+/// Flags used as an argument to many system calls
+pub mod flag;
+
+/// Functions for low level hardware control
+pub mod io;
+
+/// Call numbers used by each system call
+pub mod number;
+
+/// A trait useful for scheme handlers
+pub mod scheme;
+
+#[cfg(test)]
+mod tests;
diff --git a/third_party/rust/redox_syscall/src/number.rs b/third_party/rust/redox_syscall/src/number.rs
new file mode 100644
index 0000000000..ec9acfaac2
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/number.rs
@@ -0,0 +1,76 @@
+pub const SYS_CLASS: usize = 0xF000_0000;
+pub const SYS_CLASS_PATH: usize=0x1000_0000;
+pub const SYS_CLASS_FILE: usize=0x2000_0000;
+
+pub const SYS_ARG: usize = 0x0F00_0000;
+pub const SYS_ARG_SLICE: usize =0x0100_0000;
+pub const SYS_ARG_MSLICE: usize=0x0200_0000;
+pub const SYS_ARG_PATH: usize = 0x0300_0000;
+
+pub const SYS_RET: usize = 0x00F0_0000;
+pub const SYS_RET_FILE: usize = 0x0010_0000;
+
+pub const SYS_LINK: usize = SYS_CLASS_PATH | SYS_ARG_PATH | 9;
+pub const SYS_OPEN: usize = SYS_CLASS_PATH | SYS_RET_FILE | 5;
+pub const SYS_CHMOD: usize = SYS_CLASS_PATH | 15;
+pub const SYS_RMDIR: usize = SYS_CLASS_PATH | 84;
+pub const SYS_UNLINK: usize = SYS_CLASS_PATH | 10;
+
+pub const SYS_CLOSE: usize = SYS_CLASS_FILE | 6;
+pub const SYS_DUP: usize = SYS_CLASS_FILE | SYS_RET_FILE | 41;
+pub const SYS_DUP2: usize = SYS_CLASS_FILE | SYS_RET_FILE | 63;
+pub const SYS_READ: usize = SYS_CLASS_FILE | SYS_ARG_MSLICE | 3;
+pub const SYS_WRITE: usize = SYS_CLASS_FILE | SYS_ARG_SLICE | 4;
+pub const SYS_LSEEK: usize = SYS_CLASS_FILE | 19;
+pub const SYS_FCHMOD: usize = SYS_CLASS_FILE | 94;
+pub const SYS_FCHOWN: usize = SYS_CLASS_FILE | 207;
+pub const SYS_FCNTL: usize = SYS_CLASS_FILE | 55;
+pub const SYS_FEVENT: usize = SYS_CLASS_FILE | 927;
+pub const SYS_FEXEC: usize = SYS_CLASS_FILE | 11;
+pub const SYS_FMAP: usize = SYS_CLASS_FILE | SYS_ARG_SLICE | 90;
+pub const SYS_FUNMAP: usize = SYS_CLASS_FILE | 91;
+pub const SYS_FPATH: usize = SYS_CLASS_FILE | SYS_ARG_MSLICE | 928;
+pub const SYS_FRENAME: usize = SYS_CLASS_FILE | SYS_ARG_PATH | 38;
+pub const SYS_FSTAT: usize = SYS_CLASS_FILE | SYS_ARG_MSLICE | 28;
+pub const SYS_FSTATVFS: usize = SYS_CLASS_FILE | SYS_ARG_MSLICE | 100;
+pub const SYS_FSYNC: usize = SYS_CLASS_FILE | 118;
+pub const SYS_FTRUNCATE: usize =SYS_CLASS_FILE | 93;
+pub const SYS_FUTIMENS: usize = SYS_CLASS_FILE | SYS_ARG_SLICE | 320;
+
+pub const SYS_BRK: usize = 45;
+pub const SYS_CHDIR: usize = 12;
+pub const SYS_CLOCK_GETTIME: usize = 265;
+pub const SYS_CLONE: usize = 120;
+pub const SYS_EXIT: usize = 1;
+pub const SYS_FUTEX: usize = 240;
+pub const SYS_GETCWD: usize = 183;
+pub const SYS_GETEGID: usize = 202;
+pub const SYS_GETENS: usize = 951;
+pub const SYS_GETEUID: usize = 201;
+pub const SYS_GETGID: usize = 200;
+pub const SYS_GETNS: usize = 950;
+pub const SYS_GETPID: usize = 20;
+pub const SYS_GETPGID: usize = 132;
+pub const SYS_GETPPID: usize = 64;
+pub const SYS_GETUID: usize = 199;
+pub const SYS_IOPL: usize = 110;
+pub const SYS_KILL: usize = 37;
+pub const SYS_MPROTECT: usize = 125;
+pub const SYS_MKNS: usize = 984;
+pub const SYS_NANOSLEEP: usize =162;
+pub const SYS_PHYSALLOC: usize =945;
+pub const SYS_PHYSFREE: usize = 946;
+pub const SYS_PHYSMAP: usize = 947;
+pub const SYS_PHYSUNMAP: usize =948;
+pub const SYS_VIRTTOPHYS: usize=949;
+pub const SYS_PIPE2: usize = 331;
+pub const SYS_SETPGID: usize = 57;
+pub const SYS_SETREGID: usize = 204;
+pub const SYS_SETRENS: usize = 952;
+pub const SYS_SETREUID: usize = 203;
+pub const SYS_SIGACTION: usize =67;
+pub const SYS_SIGPROCMASK:usize=126;
+pub const SYS_SIGRETURN: usize =119;
+pub const SYS_UMASK: usize = 60;
+pub const SYS_WAITPID: usize = 7;
+pub const SYS_YIELD: usize = 158;
diff --git a/third_party/rust/redox_syscall/src/scheme/generate.sh b/third_party/rust/redox_syscall/src/scheme/generate.sh
new file mode 100755
index 0000000000..e5d11ae300
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/scheme/generate.sh
@@ -0,0 +1,20 @@
+#!/usr/bin/env bash
+
+set -e
+
+echo "Generating SchemeMut from Scheme"
+sed 's/trait Scheme/trait SchemeMut/' scheme.rs \
+| sed 's/\&self/\&mut self/g' \
+> scheme_mut.rs
+
+echo "Generating SchemeBlock from Scheme"
+sed 's/trait Scheme/trait SchemeBlock/' scheme.rs \
+| sed 's/fn handle(\&self, packet: \&mut Packet)/fn handle(\&self, packet: \&Packet) -> Option<usize>/' \
+| sed 's/packet.a = Error::mux(res);/res.transpose().map(Error::mux)/' \
+| sed 's/Result<usize>/Result<Option<usize>>/g' \
+> scheme_block.rs
+
+echo "Generating SchemeBlockMut from SchemeBlock"
+sed 's/trait SchemeBlock/trait SchemeBlockMut/' scheme_block.rs \
+| sed 's/\&self/\&mut self/g' \
+> scheme_block_mut.rs
diff --git a/third_party/rust/redox_syscall/src/scheme/mod.rs b/third_party/rust/redox_syscall/src/scheme/mod.rs
new file mode 100644
index 0000000000..66f8fc76da
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/scheme/mod.rs
@@ -0,0 +1,9 @@
+pub use self::scheme::Scheme;
+pub use self::scheme_mut::SchemeMut;
+pub use self::scheme_block::SchemeBlock;
+pub use self::scheme_block_mut::SchemeBlockMut;
+
+mod scheme;
+mod scheme_mut;
+mod scheme_block;
+mod scheme_block_mut;
diff --git a/third_party/rust/redox_syscall/src/scheme/scheme.rs b/third_party/rust/redox_syscall/src/scheme/scheme.rs
new file mode 100644
index 0000000000..c047e96833
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/scheme/scheme.rs
@@ -0,0 +1,167 @@
+use core::{mem, slice};
+
+use data::*;
+use error::*;
+use number::*;
+
+pub trait Scheme {
+ fn handle(&self, packet: &mut Packet) {
+ let res = match packet.a {
+ SYS_OPEN => self.open(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.d, packet.uid, packet.gid),
+ SYS_CHMOD => self.chmod(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.d as u16, packet.uid, packet.gid),
+ SYS_RMDIR => self.rmdir(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.uid, packet.gid),
+ SYS_UNLINK => self.unlink(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.uid, packet.gid),
+
+ SYS_DUP => self.dup(packet.b, unsafe { slice::from_raw_parts(packet.c as *const u8, packet.d) }),
+ SYS_READ => self.read(packet.b, unsafe { slice::from_raw_parts_mut(packet.c as *mut u8, packet.d) }),
+ SYS_WRITE => self.write(packet.b, unsafe { slice::from_raw_parts(packet.c as *const u8, packet.d) }),
+ SYS_LSEEK => self.seek(packet.b, packet.c, packet.d),
+ SYS_FCHMOD => self.fchmod(packet.b, packet.c as u16),
+ SYS_FCHOWN => self.fchown(packet.b, packet.c as u32, packet.d as u32),
+ SYS_FCNTL => self.fcntl(packet.b, packet.c, packet.d),
+ SYS_FEVENT => self.fevent(packet.b, packet.c),
+ SYS_FMAP => if packet.d >= mem::size_of::<Map>() {
+ self.fmap(packet.b, unsafe { &*(packet.c as *const Map) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_FUNMAP => self.funmap(packet.b),
+ SYS_FPATH => self.fpath(packet.b, unsafe { slice::from_raw_parts_mut(packet.c as *mut u8, packet.d) }),
+ SYS_FRENAME => self.frename(packet.b, unsafe { slice::from_raw_parts(packet.c as *const u8, packet.d) }, packet.uid, packet.gid),
+ SYS_FSTAT => if packet.d >= mem::size_of::<Stat>() {
+ self.fstat(packet.b, unsafe { &mut *(packet.c as *mut Stat) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_FSTATVFS => if packet.d >= mem::size_of::<StatVfs>() {
+ self.fstatvfs(packet.b, unsafe { &mut *(packet.c as *mut StatVfs) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_FSYNC => self.fsync(packet.b),
+ SYS_FTRUNCATE => self.ftruncate(packet.b, packet.c),
+ SYS_FUTIMENS => if packet.d >= mem::size_of::<TimeSpec>() {
+ self.futimens(packet.b, unsafe { slice::from_raw_parts(packet.c as *const TimeSpec, packet.d / mem::size_of::<TimeSpec>()) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_CLOSE => self.close(packet.b),
+ _ => Err(Error::new(ENOSYS))
+ };
+
+ packet.a = Error::mux(res);
+ }
+
+ /* Scheme operations */
+
+ #[allow(unused_variables)]
+ fn open(&self, path: &[u8], flags: usize, uid: u32, gid: u32) -> Result<usize> {
+ Err(Error::new(ENOENT))
+ }
+
+ #[allow(unused_variables)]
+ fn chmod(&self, path: &[u8], mode: u16, uid: u32, gid: u32) -> Result<usize> {
+ Err(Error::new(ENOENT))
+ }
+
+ #[allow(unused_variables)]
+ fn rmdir(&self, path: &[u8], uid: u32, gid: u32) -> Result<usize> {
+ Err(Error::new(ENOENT))
+ }
+
+ #[allow(unused_variables)]
+ fn unlink(&self, path: &[u8], uid: u32, gid: u32) -> Result<usize> {
+ Err(Error::new(ENOENT))
+ }
+
+ /* Resource operations */
+ #[allow(unused_variables)]
+ fn dup(&self, old_id: usize, buf: &[u8]) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn read(&self, id: usize, buf: &mut [u8]) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn write(&self, id: usize, buf: &[u8]) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn seek(&self, id: usize, pos: usize, whence: usize) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fchmod(&self, id: usize, mode: u16) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fchown(&self, id: usize, uid: u32, gid: u32) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fcntl(&self, id: usize, cmd: usize, arg: usize) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fevent(&self, id: usize, flags: usize) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fmap(&self, id: usize, map: &Map) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn funmap(&self, address: usize) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fpath(&self, id: usize, buf: &mut [u8]) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn frename(&self, id: usize, path: &[u8], uid: u32, gid: u32) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fstat(&self, id: usize, stat: &mut Stat) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fstatvfs(&self, id: usize, stat: &mut StatVfs) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fsync(&self, id: usize) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn ftruncate(&self, id: usize, len: usize) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn futimens(&self, id: usize, times: &[TimeSpec]) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn close(&self, id: usize) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+}
diff --git a/third_party/rust/redox_syscall/src/scheme/scheme_block.rs b/third_party/rust/redox_syscall/src/scheme/scheme_block.rs
new file mode 100644
index 0000000000..0407dde61d
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/scheme/scheme_block.rs
@@ -0,0 +1,167 @@
+use core::{mem, slice};
+
+use data::*;
+use error::*;
+use number::*;
+
+pub trait SchemeBlock {
+ fn handle(&self, packet: &Packet) -> Option<usize> {
+ let res = match packet.a {
+ SYS_OPEN => self.open(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.d, packet.uid, packet.gid),
+ SYS_CHMOD => self.chmod(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.d as u16, packet.uid, packet.gid),
+ SYS_RMDIR => self.rmdir(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.uid, packet.gid),
+ SYS_UNLINK => self.unlink(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.uid, packet.gid),
+
+ SYS_DUP => self.dup(packet.b, unsafe { slice::from_raw_parts(packet.c as *const u8, packet.d) }),
+ SYS_READ => self.read(packet.b, unsafe { slice::from_raw_parts_mut(packet.c as *mut u8, packet.d) }),
+ SYS_WRITE => self.write(packet.b, unsafe { slice::from_raw_parts(packet.c as *const u8, packet.d) }),
+ SYS_LSEEK => self.seek(packet.b, packet.c, packet.d),
+ SYS_FCHMOD => self.fchmod(packet.b, packet.c as u16),
+ SYS_FCHOWN => self.fchown(packet.b, packet.c as u32, packet.d as u32),
+ SYS_FCNTL => self.fcntl(packet.b, packet.c, packet.d),
+ SYS_FEVENT => self.fevent(packet.b, packet.c),
+ SYS_FMAP => if packet.d >= mem::size_of::<Map>() {
+ self.fmap(packet.b, unsafe { &*(packet.c as *const Map) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_FUNMAP => self.funmap(packet.b),
+ SYS_FPATH => self.fpath(packet.b, unsafe { slice::from_raw_parts_mut(packet.c as *mut u8, packet.d) }),
+ SYS_FRENAME => self.frename(packet.b, unsafe { slice::from_raw_parts(packet.c as *const u8, packet.d) }, packet.uid, packet.gid),
+ SYS_FSTAT => if packet.d >= mem::size_of::<Stat>() {
+ self.fstat(packet.b, unsafe { &mut *(packet.c as *mut Stat) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_FSTATVFS => if packet.d >= mem::size_of::<StatVfs>() {
+ self.fstatvfs(packet.b, unsafe { &mut *(packet.c as *mut StatVfs) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_FSYNC => self.fsync(packet.b),
+ SYS_FTRUNCATE => self.ftruncate(packet.b, packet.c),
+ SYS_FUTIMENS => if packet.d >= mem::size_of::<TimeSpec>() {
+ self.futimens(packet.b, unsafe { slice::from_raw_parts(packet.c as *const TimeSpec, packet.d / mem::size_of::<TimeSpec>()) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_CLOSE => self.close(packet.b),
+ _ => Err(Error::new(ENOSYS))
+ };
+
+ res.transpose().map(Error::mux)
+ }
+
+ /* Scheme operations */
+
+ #[allow(unused_variables)]
+ fn open(&self, path: &[u8], flags: usize, uid: u32, gid: u32) -> Result<Option<usize>> {
+ Err(Error::new(ENOENT))
+ }
+
+ #[allow(unused_variables)]
+ fn chmod(&self, path: &[u8], mode: u16, uid: u32, gid: u32) -> Result<Option<usize>> {
+ Err(Error::new(ENOENT))
+ }
+
+ #[allow(unused_variables)]
+ fn rmdir(&self, path: &[u8], uid: u32, gid: u32) -> Result<Option<usize>> {
+ Err(Error::new(ENOENT))
+ }
+
+ #[allow(unused_variables)]
+ fn unlink(&self, path: &[u8], uid: u32, gid: u32) -> Result<Option<usize>> {
+ Err(Error::new(ENOENT))
+ }
+
+ /* Resource operations */
+ #[allow(unused_variables)]
+ fn dup(&self, old_id: usize, buf: &[u8]) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn read(&self, id: usize, buf: &mut [u8]) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn write(&self, id: usize, buf: &[u8]) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn seek(&self, id: usize, pos: usize, whence: usize) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fchmod(&self, id: usize, mode: u16) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fchown(&self, id: usize, uid: u32, gid: u32) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fcntl(&self, id: usize, cmd: usize, arg: usize) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fevent(&self, id: usize, flags: usize) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fmap(&self, id: usize, map: &Map) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn funmap(&self, address: usize) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fpath(&self, id: usize, buf: &mut [u8]) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn frename(&self, id: usize, path: &[u8], uid: u32, gid: u32) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fstat(&self, id: usize, stat: &mut Stat) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fstatvfs(&self, id: usize, stat: &mut StatVfs) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fsync(&self, id: usize) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn ftruncate(&self, id: usize, len: usize) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn futimens(&self, id: usize, times: &[TimeSpec]) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn close(&self, id: usize) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+}
diff --git a/third_party/rust/redox_syscall/src/scheme/scheme_block_mut.rs b/third_party/rust/redox_syscall/src/scheme/scheme_block_mut.rs
new file mode 100644
index 0000000000..411035f42f
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/scheme/scheme_block_mut.rs
@@ -0,0 +1,167 @@
+use core::{mem, slice};
+
+use data::*;
+use error::*;
+use number::*;
+
+pub trait SchemeBlockMut {
+ fn handle(&mut self, packet: &Packet) -> Option<usize> {
+ let res = match packet.a {
+ SYS_OPEN => self.open(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.d, packet.uid, packet.gid),
+ SYS_CHMOD => self.chmod(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.d as u16, packet.uid, packet.gid),
+ SYS_RMDIR => self.rmdir(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.uid, packet.gid),
+ SYS_UNLINK => self.unlink(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.uid, packet.gid),
+
+ SYS_DUP => self.dup(packet.b, unsafe { slice::from_raw_parts(packet.c as *const u8, packet.d) }),
+ SYS_READ => self.read(packet.b, unsafe { slice::from_raw_parts_mut(packet.c as *mut u8, packet.d) }),
+ SYS_WRITE => self.write(packet.b, unsafe { slice::from_raw_parts(packet.c as *const u8, packet.d) }),
+ SYS_LSEEK => self.seek(packet.b, packet.c, packet.d),
+ SYS_FCHMOD => self.fchmod(packet.b, packet.c as u16),
+ SYS_FCHOWN => self.fchown(packet.b, packet.c as u32, packet.d as u32),
+ SYS_FCNTL => self.fcntl(packet.b, packet.c, packet.d),
+ SYS_FEVENT => self.fevent(packet.b, packet.c),
+ SYS_FMAP => if packet.d >= mem::size_of::<Map>() {
+ self.fmap(packet.b, unsafe { &*(packet.c as *const Map) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_FUNMAP => self.funmap(packet.b),
+ SYS_FPATH => self.fpath(packet.b, unsafe { slice::from_raw_parts_mut(packet.c as *mut u8, packet.d) }),
+ SYS_FRENAME => self.frename(packet.b, unsafe { slice::from_raw_parts(packet.c as *const u8, packet.d) }, packet.uid, packet.gid),
+ SYS_FSTAT => if packet.d >= mem::size_of::<Stat>() {
+ self.fstat(packet.b, unsafe { &mut *(packet.c as *mut Stat) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_FSTATVFS => if packet.d >= mem::size_of::<StatVfs>() {
+ self.fstatvfs(packet.b, unsafe { &mut *(packet.c as *mut StatVfs) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_FSYNC => self.fsync(packet.b),
+ SYS_FTRUNCATE => self.ftruncate(packet.b, packet.c),
+ SYS_FUTIMENS => if packet.d >= mem::size_of::<TimeSpec>() {
+ self.futimens(packet.b, unsafe { slice::from_raw_parts(packet.c as *const TimeSpec, packet.d / mem::size_of::<TimeSpec>()) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_CLOSE => self.close(packet.b),
+ _ => Err(Error::new(ENOSYS))
+ };
+
+ res.transpose().map(Error::mux)
+ }
+
+ /* Scheme operations */
+
+ #[allow(unused_variables)]
+ fn open(&mut self, path: &[u8], flags: usize, uid: u32, gid: u32) -> Result<Option<usize>> {
+ Err(Error::new(ENOENT))
+ }
+
+ #[allow(unused_variables)]
+ fn chmod(&mut self, path: &[u8], mode: u16, uid: u32, gid: u32) -> Result<Option<usize>> {
+ Err(Error::new(ENOENT))
+ }
+
+ #[allow(unused_variables)]
+ fn rmdir(&mut self, path: &[u8], uid: u32, gid: u32) -> Result<Option<usize>> {
+ Err(Error::new(ENOENT))
+ }
+
+ #[allow(unused_variables)]
+ fn unlink(&mut self, path: &[u8], uid: u32, gid: u32) -> Result<Option<usize>> {
+ Err(Error::new(ENOENT))
+ }
+
+ /* Resource operations */
+ #[allow(unused_variables)]
+ fn dup(&mut self, old_id: usize, buf: &[u8]) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn read(&mut self, id: usize, buf: &mut [u8]) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn write(&mut self, id: usize, buf: &[u8]) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn seek(&mut self, id: usize, pos: usize, whence: usize) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fchmod(&mut self, id: usize, mode: u16) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fchown(&mut self, id: usize, uid: u32, gid: u32) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fcntl(&mut self, id: usize, cmd: usize, arg: usize) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fevent(&mut self, id: usize, flags: usize) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fmap(&mut self, id: usize, map: &Map) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn funmap(&mut self, address: usize) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fpath(&mut self, id: usize, buf: &mut [u8]) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn frename(&mut self, id: usize, path: &[u8], uid: u32, gid: u32) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fstat(&mut self, id: usize, stat: &mut Stat) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fstatvfs(&mut self, id: usize, stat: &mut StatVfs) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fsync(&mut self, id: usize) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn ftruncate(&mut self, id: usize, len: usize) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn futimens(&mut self, id: usize, times: &[TimeSpec]) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn close(&mut self, id: usize) -> Result<Option<usize>> {
+ Err(Error::new(EBADF))
+ }
+}
diff --git a/third_party/rust/redox_syscall/src/scheme/scheme_mut.rs b/third_party/rust/redox_syscall/src/scheme/scheme_mut.rs
new file mode 100644
index 0000000000..abd2e88e5c
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/scheme/scheme_mut.rs
@@ -0,0 +1,167 @@
+use core::{mem, slice};
+
+use data::*;
+use error::*;
+use number::*;
+
+pub trait SchemeMut {
+ fn handle(&mut self, packet: &mut Packet) {
+ let res = match packet.a {
+ SYS_OPEN => self.open(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.d, packet.uid, packet.gid),
+ SYS_CHMOD => self.chmod(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.d as u16, packet.uid, packet.gid),
+ SYS_RMDIR => self.rmdir(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.uid, packet.gid),
+ SYS_UNLINK => self.unlink(unsafe { slice::from_raw_parts(packet.b as *const u8, packet.c) }, packet.uid, packet.gid),
+
+ SYS_DUP => self.dup(packet.b, unsafe { slice::from_raw_parts(packet.c as *const u8, packet.d) }),
+ SYS_READ => self.read(packet.b, unsafe { slice::from_raw_parts_mut(packet.c as *mut u8, packet.d) }),
+ SYS_WRITE => self.write(packet.b, unsafe { slice::from_raw_parts(packet.c as *const u8, packet.d) }),
+ SYS_LSEEK => self.seek(packet.b, packet.c, packet.d),
+ SYS_FCHMOD => self.fchmod(packet.b, packet.c as u16),
+ SYS_FCHOWN => self.fchown(packet.b, packet.c as u32, packet.d as u32),
+ SYS_FCNTL => self.fcntl(packet.b, packet.c, packet.d),
+ SYS_FEVENT => self.fevent(packet.b, packet.c),
+ SYS_FMAP => if packet.d >= mem::size_of::<Map>() {
+ self.fmap(packet.b, unsafe { &*(packet.c as *const Map) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_FUNMAP => self.funmap(packet.b),
+ SYS_FPATH => self.fpath(packet.b, unsafe { slice::from_raw_parts_mut(packet.c as *mut u8, packet.d) }),
+ SYS_FRENAME => self.frename(packet.b, unsafe { slice::from_raw_parts(packet.c as *const u8, packet.d) }, packet.uid, packet.gid),
+ SYS_FSTAT => if packet.d >= mem::size_of::<Stat>() {
+ self.fstat(packet.b, unsafe { &mut *(packet.c as *mut Stat) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_FSTATVFS => if packet.d >= mem::size_of::<StatVfs>() {
+ self.fstatvfs(packet.b, unsafe { &mut *(packet.c as *mut StatVfs) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_FSYNC => self.fsync(packet.b),
+ SYS_FTRUNCATE => self.ftruncate(packet.b, packet.c),
+ SYS_FUTIMENS => if packet.d >= mem::size_of::<TimeSpec>() {
+ self.futimens(packet.b, unsafe { slice::from_raw_parts(packet.c as *const TimeSpec, packet.d / mem::size_of::<TimeSpec>()) })
+ } else {
+ Err(Error::new(EFAULT))
+ },
+ SYS_CLOSE => self.close(packet.b),
+ _ => Err(Error::new(ENOSYS))
+ };
+
+ packet.a = Error::mux(res);
+ }
+
+ /* Scheme operations */
+
+ #[allow(unused_variables)]
+ fn open(&mut self, path: &[u8], flags: usize, uid: u32, gid: u32) -> Result<usize> {
+ Err(Error::new(ENOENT))
+ }
+
+ #[allow(unused_variables)]
+ fn chmod(&mut self, path: &[u8], mode: u16, uid: u32, gid: u32) -> Result<usize> {
+ Err(Error::new(ENOENT))
+ }
+
+ #[allow(unused_variables)]
+ fn rmdir(&mut self, path: &[u8], uid: u32, gid: u32) -> Result<usize> {
+ Err(Error::new(ENOENT))
+ }
+
+ #[allow(unused_variables)]
+ fn unlink(&mut self, path: &[u8], uid: u32, gid: u32) -> Result<usize> {
+ Err(Error::new(ENOENT))
+ }
+
+ /* Resource operations */
+ #[allow(unused_variables)]
+ fn dup(&mut self, old_id: usize, buf: &[u8]) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn read(&mut self, id: usize, buf: &mut [u8]) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn write(&mut self, id: usize, buf: &[u8]) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn seek(&mut self, id: usize, pos: usize, whence: usize) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fchmod(&mut self, id: usize, mode: u16) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fchown(&mut self, id: usize, uid: u32, gid: u32) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fcntl(&mut self, id: usize, cmd: usize, arg: usize) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fevent(&mut self, id: usize, flags: usize) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fmap(&mut self, id: usize, map: &Map) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn funmap(&mut self, address: usize) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fpath(&mut self, id: usize, buf: &mut [u8]) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn frename(&mut self, id: usize, path: &[u8], uid: u32, gid: u32) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fstat(&mut self, id: usize, stat: &mut Stat) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fstatvfs(&mut self, id: usize, stat: &mut StatVfs) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn fsync(&mut self, id: usize) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn ftruncate(&mut self, id: usize, len: usize) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn futimens(&mut self, id: usize, times: &[TimeSpec]) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+
+ #[allow(unused_variables)]
+ fn close(&mut self, id: usize) -> Result<usize> {
+ Err(Error::new(EBADF))
+ }
+}
diff --git a/third_party/rust/redox_syscall/src/tests.rs b/third_party/rust/redox_syscall/src/tests.rs
new file mode 100644
index 0000000000..cf89ec96ae
--- /dev/null
+++ b/third_party/rust/redox_syscall/src/tests.rs
@@ -0,0 +1,129 @@
+#[test]
+fn brk() {
+ unsafe {
+ let start = dbg!(crate::brk(0)).unwrap();
+ let end = start + 4 * 1024 * 1024;
+ assert_eq!(dbg!(crate::brk(end)), Ok(end));
+ }
+}
+
+#[test]
+fn chdir() {
+ //TODO: Verify CWD
+ assert_eq!(dbg!(crate::chdir("file:/")), Ok(0));
+ assert_eq!(dbg!(crate::chdir("file:/root")), Ok(0));
+}
+
+//TODO: chmod
+
+#[test]
+fn clone() {
+ let expected_status = 42;
+ let pid_res = unsafe { crate::clone(0) };
+ if pid_res == Ok(0) {
+ crate::exit(expected_status).unwrap();
+ panic!("failed to exit");
+ } else {
+ let pid = dbg!(pid_res).unwrap();
+ let mut status = 0;
+ assert_eq!(dbg!(crate::waitpid(pid, &mut status, 0)), Ok(pid));
+ assert_eq!(dbg!(crate::wifexited(status)), true);
+ assert_eq!(dbg!(crate::wexitstatus(status)), expected_status);
+ }
+}
+
+//TODO: close
+
+#[test]
+fn clock_gettime() {
+ let mut tp = crate::TimeSpec::default();
+ assert_eq!(dbg!(
+ crate::clock_gettime(crate::CLOCK_MONOTONIC, &mut tp)
+ ), Ok(0));
+ assert_ne!(dbg!(tp), crate::TimeSpec::default());
+
+ tp = crate::TimeSpec::default();
+ assert_eq!(dbg!(
+ crate::clock_gettime(crate::CLOCK_REALTIME, &mut tp)
+ ), Ok(0));
+ assert_ne!(dbg!(tp), crate::TimeSpec::default());
+}
+
+//TODO: dup
+
+//TODO: dup2
+
+//TODO: exit (handled by clone?)
+
+//TODO: fchmod
+
+//TODO: fcntl
+
+#[test]
+fn fexec() {
+ let name = "/bin/ls";
+
+ let fd = dbg!(
+ crate::open(name, crate::O_RDONLY | crate::O_CLOEXEC)
+ ).unwrap();
+
+ let args = &[
+ [name.as_ptr() as usize, name.len()]
+ ];
+
+ let vars = &[];
+
+ let pid_res = unsafe { crate::clone(0) };
+ if pid_res == Ok(0) {
+ crate::fexec(fd, args, vars).unwrap();
+ panic!("failed to fexec");
+ } else {
+ assert_eq!(dbg!(crate::close(fd)), Ok(0));
+
+ let pid = dbg!(pid_res).unwrap();
+ let mut status = 0;
+ assert_eq!(dbg!(crate::waitpid(pid, &mut status, 0)), Ok(pid));
+ assert_eq!(dbg!(crate::wifexited(status)), true);
+ assert_eq!(dbg!(crate::wexitstatus(status)), 0);
+ }
+}
+
+#[test]
+fn fmap() {
+ use std::slice;
+
+ let fd = dbg!(
+ crate::open(
+ "/tmp/syscall-tests-fmap",
+ crate::O_CREAT | crate::O_RDWR | crate::O_CLOEXEC
+ )
+ ).unwrap();
+
+ let map = unsafe {
+ slice::from_raw_parts_mut(
+ dbg!(
+ crate::fmap(fd, &crate::Map {
+ offset: 0,
+ size: 128,
+ flags: crate::PROT_READ | crate::PROT_WRITE
+ })
+ ).unwrap() as *mut u8,
+ 128
+ )
+ };
+
+ // Maps should be available after closing
+ assert_eq!(dbg!(crate::close(fd)), Ok(0));
+
+ for i in 0..128 {
+ map[i as usize] = i;
+ assert_eq!(map[i as usize], i);
+ }
+
+ //TODO: add msync
+ unsafe {
+ assert_eq!(dbg!(
+ crate::funmap(map.as_mut_ptr() as usize)
+ ), Ok(0));
+ }
+}