Skip to content

Commit 279c399

Browse files
committed
code cleanup
1 parent 273f42b commit 279c399

File tree

11 files changed

+1
-1042
lines changed

11 files changed

+1
-1042
lines changed

src/libstd/sys/vxworks/alloc.rs

-30
Original file line numberDiff line numberDiff line change
@@ -41,36 +41,6 @@ unsafe impl GlobalAlloc for System {
4141
}
4242
}
4343

44-
#[cfg(any(target_os = "android",
45-
target_os = "hermit",
46-
target_os = "redox",
47-
target_os = "solaris"))]
48-
#[inline]
49-
unsafe fn aligned_malloc(layout: &Layout) -> *mut u8 {
50-
// On android we currently target API level 9 which unfortunately
51-
// doesn't have the `posix_memalign` API used below. Instead we use
52-
// `memalign`, but this unfortunately has the property on some systems
53-
// where the memory returned cannot be deallocated by `free`!
54-
//
55-
// Upon closer inspection, however, this appears to work just fine with
56-
// Android, so for this platform we should be fine to call `memalign`
57-
// (which is present in API level 9). Some helpful references could
58-
// possibly be chromium using memalign [1], attempts at documenting that
59-
// memalign + free is ok [2] [3], or the current source of chromium
60-
// which still uses memalign on android [4].
61-
//
62-
// [1]: https://codereview.chromium.org/10796020/
63-
// [2]: https://code.google.com/p/android/issues/detail?id=35391
64-
// [3]: https://bugs.chromium.org/p/chromium/issues/detail?id=138579
65-
// [4]: https://chromium.googlesource.com/chromium/src/base/+/master/
66-
// /memory/aligned_memory.cc
67-
libc::memalign(layout.align(), layout.size()) as *mut u8
68-
}
69-
70-
#[cfg(not(any(target_os = "android",
71-
target_os = "hermit",
72-
target_os = "redox",
73-
target_os = "solaris")))]
7444
#[inline]
7545
unsafe fn aligned_malloc(layout: &Layout) -> *mut u8 {
7646
let mut out = ptr::null_mut();

src/libstd/sys/vxworks/android.rs

-160
This file was deleted.

src/libstd/sys/vxworks/condvar.rs

-73
Original file line numberDiff line numberDiff line change
@@ -62,10 +62,6 @@ impl Condvar {
6262
// where we configure condition variable to use monotonic clock (instead of
6363
// default system clock). This approach avoids all problems that result
6464
// from changes made to the system time.
65-
#[cfg(not(any(target_os = "macos",
66-
target_os = "ios",
67-
target_os = "android",
68-
target_os = "hermit")))]
6965
pub unsafe fn wait_timeout(&self, mutex: &Mutex, dur: Duration) -> bool {
7066
use crate::mem;
7167

@@ -92,78 +88,9 @@ impl Condvar {
9288
}
9389

9490

95-
// This implementation is modeled after libcxx's condition_variable
96-
// https://github.com/llvm-mirror/libcxx/blob/release_35/src/condition_variable.cpp#L46
97-
// https://github.com/llvm-mirror/libcxx/blob/release_35/include/__mutex_base#L367
98-
#[cfg(any(target_os = "macos", target_os = "ios", target_os = "android", target_os = "hermit"))]
99-
pub unsafe fn wait_timeout(&self, mutex: &Mutex, mut dur: Duration) -> bool {
100-
use crate::ptr;
101-
use crate::time::Instant;
102-
103-
// 1000 years
104-
let max_dur = Duration::from_secs(1000 * 365 * 86400);
105-
106-
if dur > max_dur {
107-
// OSX implementation of `pthread_cond_timedwait` is buggy
108-
// with super long durations. When duration is greater than
109-
// 0x100_0000_0000_0000 seconds, `pthread_cond_timedwait`
110-
// in macOS Sierra return error 316.
111-
//
112-
// This program demonstrates the issue:
113-
// https://gist.github.com/stepancheg/198db4623a20aad2ad7cddb8fda4a63c
114-
//
115-
// To work around this issue, and possible bugs of other OSes, timeout
116-
// is clamped to 1000 years, which is allowable per the API of `wait_timeout`
117-
// because of spurious wakeups.
118-
119-
dur = max_dur;
120-
}
121-
122-
// First, figure out what time it currently is, in both system and
123-
// stable time. pthread_cond_timedwait uses system time, but we want to
124-
// report timeout based on stable time.
125-
let mut sys_now = libc::timeval { tv_sec: 0, tv_usec: 0 };
126-
let stable_now = Instant::now();
127-
let r = libc::gettimeofday(&mut sys_now, ptr::null_mut());
128-
debug_assert_eq!(r, 0);
129-
130-
let nsec = dur.subsec_nanos() as libc::c_long +
131-
(sys_now.tv_usec * 1000) as libc::c_long;
132-
let extra = (nsec / 1_000_000_000) as libc::time_t;
133-
let nsec = nsec % 1_000_000_000;
134-
let seconds = saturating_cast_to_time_t(dur.as_secs());
135-
136-
let timeout = sys_now.tv_sec.checked_add(extra).and_then(|s| {
137-
s.checked_add(seconds)
138-
}).map(|s| {
139-
libc::timespec { tv_sec: s, tv_nsec: nsec }
140-
}).unwrap_or(TIMESPEC_MAX);
141-
142-
// And wait!
143-
let r = libc::pthread_cond_timedwait(self.inner.get(), mutex::raw(mutex),
144-
&timeout);
145-
debug_assert!(r == libc::ETIMEDOUT || r == 0);
146-
147-
// ETIMEDOUT is not a totally reliable method of determining timeout due
148-
// to clock shifts, so do the check ourselves
149-
stable_now.elapsed() < dur
150-
}
151-
15291
#[inline]
153-
#[cfg(not(target_os = "dragonfly"))]
15492
pub unsafe fn destroy(&self) {
15593
let r = libc::pthread_cond_destroy(self.inner.get());
15694
debug_assert_eq!(r, 0);
15795
}
158-
159-
#[inline]
160-
#[cfg(target_os = "dragonfly")]
161-
pub unsafe fn destroy(&self) {
162-
let r = libc::pthread_cond_destroy(self.inner.get());
163-
// On DragonFly pthread_cond_destroy() returns EINVAL if called on
164-
// a condvar that was just initialized with
165-
// libc::PTHREAD_COND_INITIALIZER. Once it is used or
166-
// pthread_cond_init() is called, this behaviour no longer occurs.
167-
debug_assert!(r == 0 || r == libc::EINVAL);
168-
}
16996
}

src/libstd/sys/vxworks/ext/net.rs

+1-26
Original file line numberDiff line numberDiff line change
@@ -5,16 +5,6 @@
55
#[cfg(unix)]
66
use libc;
77

8-
// FIXME(#43348): Make libc adapt #[doc(cfg(...))] so we don't need these fake definitions here?
9-
#[cfg(not(unix))]
10-
mod libc {
11-
pub use libc::c_int;
12-
pub type socklen_t = u32;
13-
pub struct sockaddr;
14-
#[derive(Clone)]
15-
pub struct sockaddr_un;
16-
}
17-
188
use crate::ascii;
199
use crate::ffi::OsStr;
2010
use crate::fmt;
@@ -29,15 +19,6 @@ use crate::sys::{self, cvt};
2919
use crate::sys::net::Socket;
3020
use crate::sys_common::{self, AsInner, FromInner, IntoInner};
3121

32-
#[cfg(any(target_os = "linux", target_os = "android",
33-
target_os = "dragonfly", target_os = "freebsd",
34-
target_os = "openbsd", target_os = "netbsd",
35-
target_os = "haiku"))]
36-
use libc::MSG_NOSIGNAL;
37-
#[cfg(not(any(target_os = "linux", target_os = "android",
38-
target_os = "dragonfly", target_os = "freebsd",
39-
target_os = "openbsd", target_os = "netbsd",
40-
target_os = "haiku")))]
4122
const MSG_NOSIGNAL: libc::c_int = 0x0;
4223

4324
fn sun_path_offset(addr: &libc::sockaddr_un) -> usize {
@@ -202,13 +183,7 @@ impl SocketAddr {
202183
let len = self.len as usize - sun_path_offset(&self.addr);
203184
let path = unsafe { mem::transmute::<&[libc::c_char], &[u8]>(&self.addr.sun_path) };
204185

205-
// macOS seems to return a len of 16 and a zeroed sun_path for unnamed addresses
206-
if len == 0
207-
|| (cfg!(not(any(target_os = "linux", target_os = "android")))
208-
&& self.addr.sun_path[0] == 0)
209-
{
210-
AddressKind::Unnamed
211-
} else if self.addr.sun_path[0] == 0 {
186+
if self.addr.sun_path[0] == 0 {
212187
AddressKind::Abstract(&path[1..len])
213188
} else {
214189
AddressKind::Pathname(OsStr::from_bytes(&path[..len - 1]).as_ref())

0 commit comments

Comments
 (0)