rust/src/test/run-pass/variadic-ffi.rs
Alex Crichton 7755ffd013 Remove #[fixed_stack_segment] and #[rust_stack]
These two attributes are no longer useful now that Rust has decided to leave
segmented stacks behind. It is assumed that the rust task's stack is always
large enough to make an FFI call (due to the stack being very large).

There's always the case of stack overflow, however, to consider. This does not
change the behavior of stack overflow in Rust. This is still normally triggered
by the __morestack function and aborts the whole process.

C stack overflow will continue to corrupt the stack, however (as it did before
this commit as well). The future improvement of a guard page at the end of every
rust stack is still unimplemented and is intended to be the mechanism through
which we attempt to detect C stack overflow.

Closes #8822
Closes #10155
2013-11-11 10:40:34 -08:00

66 lines
2.0 KiB
Rust

// Copyright 2013 The Rust Project Developers. See the COPYRIGHT
// file at the top-level directory of this distribution and at
// http://rust-lang.org/COPYRIGHT.
//
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
// option. This file may not be copied, modified, or distributed
// except according to those terms.
use std::c_str::CString;
use std::libc::{c_char, c_int};
extern {
fn sprintf(s: *mut c_char, format: *c_char, ...) -> c_int;
}
unsafe fn check<T>(expected: &str, f: &fn(*mut c_char) -> T) {
let mut x = [0i8, ..50];
f(&mut x[0] as *mut c_char);
let res = CString::new(&x[0], false);
assert_eq!(expected, res.as_str().unwrap());
}
pub fn main() {
unsafe {
// Call with just the named parameter
do "Hello World\n".with_c_str |c| {
check("Hello World\n", |s| sprintf(s, c));
}
// Call with variable number of arguments
do "%d %f %c %s\n".with_c_str |c| {
do check("42 42.500000 a %d %f %c %s\n\n") |s| {
sprintf(s, c, 42i, 42.5f64, 'a' as c_int, c);
}
}
// Make a function pointer
let x: extern "C" unsafe fn(*mut c_char, *c_char, ...) -> c_int = sprintf;
// A function that takes a function pointer
unsafe fn call(p: extern "C" unsafe fn(*mut c_char, *c_char, ...) -> c_int) {
// Call with just the named parameter via fn pointer
do "Hello World\n".with_c_str |c| {
check("Hello World\n", |s| p(s, c));
}
// Call with variable number of arguments
do "%d %f %c %s\n".with_c_str |c| {
do check("42 42.500000 a %d %f %c %s\n\n") |s| {
p(s, c, 42i, 42.5f64, 'a' as c_int, c);
}
}
}
// Pass sprintf directly
call(sprintf);
// Pass sprintf indirectly
call(x);
}
}