nix/sys/
mman.rs

1//! Memory management declarations.
2
3use crate::errno::Errno;
4#[cfg(not(target_os = "android"))]
5use crate::NixPath;
6use crate::Result;
7#[cfg(not(target_os = "android"))]
8#[cfg(feature = "fs")]
9use crate::{fcntl::OFlag, sys::stat::Mode};
10use libc::{self, c_int, c_void, off_t, size_t};
11use std::ptr::NonNull;
12use std::{
13    num::NonZeroUsize,
14    os::unix::io::{AsFd, AsRawFd},
15};
16
17libc_bitflags! {
18    /// Desired memory protection of a memory mapping.
19    pub struct ProtFlags: c_int {
20        /// Pages cannot be accessed.
21        PROT_NONE;
22        /// Pages can be read.
23        PROT_READ;
24        /// Pages can be written.
25        PROT_WRITE;
26        /// Pages can be executed
27        PROT_EXEC;
28        /// Apply protection up to the end of a mapping that grows upwards.
29        #[cfg(linux_android)]
30        PROT_GROWSDOWN;
31        /// Apply protection down to the beginning of a mapping that grows downwards.
32        #[cfg(linux_android)]
33        PROT_GROWSUP;
34    }
35}
36
37libc_bitflags! {
38    /// Additional parameters for [`mmap`].
39    pub struct MapFlags: c_int {
40        /// Compatibility flag. Ignored.
41        MAP_FILE;
42        /// Share this mapping. Mutually exclusive with `MAP_PRIVATE`.
43        MAP_SHARED;
44        /// Create a private copy-on-write mapping. Mutually exclusive with `MAP_SHARED`.
45        MAP_PRIVATE;
46        /// Place the mapping at exactly the address specified in `addr`.
47        MAP_FIXED;
48        /// Place the mapping at exactly the address specified in `addr`, but never clobber an existing range.
49        #[cfg(target_os = "linux")]
50        MAP_FIXED_NOREPLACE;
51        /// To be used with `MAP_FIXED`, to forbid the system
52        /// to select a different address than the one specified.
53        #[cfg(target_os = "freebsd")]
54        MAP_EXCL;
55        /// Synonym for `MAP_ANONYMOUS`.
56        MAP_ANON;
57        /// The mapping is not backed by any file.
58        MAP_ANONYMOUS;
59        /// Put the mapping into the first 2GB of the process address space.
60        #[cfg(any(all(linux_android,
61                      any(target_arch = "x86", target_arch = "x86_64")),
62                  all(target_os = "linux", target_env = "musl", any(target_arch = "x86", target_arch = "x86_64")),
63                  all(target_os = "freebsd", target_pointer_width = "64")))]
64        MAP_32BIT;
65        /// Used for stacks; indicates to the kernel that the mapping should extend downward in memory.
66        #[cfg(linux_android)]
67        MAP_GROWSDOWN;
68        /// Compatibility flag. Ignored.
69        #[cfg(linux_android)]
70        MAP_DENYWRITE;
71        /// Compatibility flag. Ignored.
72        #[cfg(linux_android)]
73        MAP_EXECUTABLE;
74        /// Mark the mmaped region to be locked in the same way as `mlock(2)`.
75        #[cfg(linux_android)]
76        MAP_LOCKED;
77        /// Do not reserve swap space for this mapping.
78        ///
79        /// This was removed in FreeBSD 11 and is unused in DragonFlyBSD.
80        #[cfg(not(any(freebsdlike, target_os = "aix", target_os = "hurd")))]
81        MAP_NORESERVE;
82        /// Populate page tables for a mapping.
83        #[cfg(linux_android)]
84        MAP_POPULATE;
85        /// Only meaningful when used with `MAP_POPULATE`. Don't perform read-ahead.
86        #[cfg(linux_android)]
87        MAP_NONBLOCK;
88        /// Allocate the mapping using "huge pages."
89        #[cfg(linux_android)]
90        MAP_HUGETLB;
91        /// Make use of 64KB huge page (must be supported by the system)
92        #[cfg(target_os = "linux")]
93        MAP_HUGE_64KB;
94        /// Make use of 512KB huge page (must be supported by the system)
95        #[cfg(target_os = "linux")]
96        MAP_HUGE_512KB;
97        /// Make use of 1MB huge page (must be supported by the system)
98        #[cfg(target_os = "linux")]
99        MAP_HUGE_1MB;
100        /// Make use of 2MB huge page (must be supported by the system)
101        #[cfg(target_os = "linux")]
102        MAP_HUGE_2MB;
103        /// Make use of 8MB huge page (must be supported by the system)
104        #[cfg(target_os = "linux")]
105        MAP_HUGE_8MB;
106        /// Make use of 16MB huge page (must be supported by the system)
107        #[cfg(target_os = "linux")]
108        MAP_HUGE_16MB;
109        /// Make use of 32MB huge page (must be supported by the system)
110        #[cfg(target_os = "linux")]
111        MAP_HUGE_32MB;
112        /// Make use of 256MB huge page (must be supported by the system)
113        #[cfg(target_os = "linux")]
114        MAP_HUGE_256MB;
115        /// Make use of 512MB huge page (must be supported by the system)
116        #[cfg(target_os = "linux")]
117        MAP_HUGE_512MB;
118        /// Make use of 1GB huge page (must be supported by the system)
119        #[cfg(target_os = "linux")]
120        MAP_HUGE_1GB;
121        /// Make use of 2GB huge page (must be supported by the system)
122        #[cfg(target_os = "linux")]
123        MAP_HUGE_2GB;
124        /// Make use of 16GB huge page (must be supported by the system)
125        #[cfg(target_os = "linux")]
126        MAP_HUGE_16GB;
127
128        /// Lock the mapped region into memory as with `mlock(2)`.
129        #[cfg(target_os = "netbsd")]
130        MAP_WIRED;
131        /// Causes dirtied data in the specified range to be flushed to disk only when necessary.
132        #[cfg(freebsdlike)]
133        MAP_NOSYNC;
134        /// Rename private pages to a file.
135        ///
136        /// This was removed in FreeBSD 11 and is unused in DragonFlyBSD.
137        #[cfg(netbsdlike)]
138        MAP_RENAME;
139        /// Region may contain semaphores.
140        #[cfg(any(freebsdlike, netbsdlike))]
141        MAP_HASSEMAPHORE;
142        /// Region grows down, like a stack.
143        #[cfg(any(linux_android, freebsdlike, target_os = "openbsd"))]
144        MAP_STACK;
145        /// Pages in this mapping are not retained in the kernel's memory cache.
146        #[cfg(apple_targets)]
147        MAP_NOCACHE;
148        /// Allows the W/X bit on the page, it's necessary on aarch64 architecture.
149        #[cfg(apple_targets)]
150        MAP_JIT;
151        /// Allows to use large pages, underlying alignment based on size.
152        #[cfg(target_os = "freebsd")]
153        MAP_ALIGNED_SUPER;
154        /// Pages will be discarded in the core dumps.
155        #[cfg(target_os = "openbsd")]
156        MAP_CONCEAL;
157        /// Attempt to place the mapping at exactly the address specified in `addr`.
158        /// it's a default behavior on OpenBSD.
159        #[cfg(netbsdlike)]
160        MAP_TRYFIXED;
161    }
162}
163
164impl MapFlags {
165    /// Create `MAP_HUGETLB` with provided size of huge page.
166    ///
167    /// Under the hood it computes `MAP_HUGETLB | (huge_page_size_log2 << libc::MAP_HUGE_SHIFT`).
168    /// `huge_page_size_log2` denotes logarithm of huge page size to use and should be
169    /// between 16 and 63 (inclusively).
170    ///
171    /// ```
172    /// # use nix::sys::mman::MapFlags;
173    /// let f = MapFlags::map_hugetlb_with_size_log2(30).unwrap();
174    /// assert_eq!(f, MapFlags::MAP_HUGETLB | MapFlags::MAP_HUGE_1GB);
175    /// ```
176    #[cfg(any(linux_android, target_os = "fuchsia"))]
177    pub fn map_hugetlb_with_size_log2(
178        huge_page_size_log2: u32,
179    ) -> Option<Self> {
180        if (16..=63).contains(&huge_page_size_log2) {
181            let flag = libc::MAP_HUGETLB
182                | (huge_page_size_log2 << libc::MAP_HUGE_SHIFT) as i32;
183            Some(Self(flag.into()))
184        } else {
185            None
186        }
187    }
188}
189
190#[cfg(any(target_os = "linux", target_os = "netbsd"))]
191libc_bitflags! {
192    /// Options for [`mremap`].
193    pub struct MRemapFlags: c_int {
194        /// Permit the kernel to relocate the mapping to a new virtual address, if necessary.
195        #[cfg(target_os = "linux")]
196        MREMAP_MAYMOVE;
197        /// Place the mapping at exactly the address specified in `new_address`.
198        #[cfg(target_os = "linux")]
199        MREMAP_FIXED;
200        /// Place the mapping at exactly the address specified in `new_address`.
201        #[cfg(target_os = "netbsd")]
202        MAP_FIXED;
203        /// Allows to duplicate the mapping to be able to apply different flags on the copy.
204        #[cfg(target_os = "netbsd")]
205        MAP_REMAPDUP;
206    }
207}
208
209libc_enum! {
210    /// Usage information for a range of memory to allow for performance optimizations by the kernel.
211    ///
212    /// Used by [`madvise`].
213    #[repr(i32)]
214    #[non_exhaustive]
215    pub enum MmapAdvise {
216        /// No further special treatment. This is the default.
217        MADV_NORMAL,
218        /// Expect random page references.
219        MADV_RANDOM,
220        /// Expect sequential page references.
221        MADV_SEQUENTIAL,
222        /// Expect access in the near future.
223        MADV_WILLNEED,
224        /// Do not expect access in the near future.
225        MADV_DONTNEED,
226        /// Free up a given range of pages and its associated backing store.
227        #[cfg(linux_android)]
228        MADV_REMOVE,
229        /// Do not make pages in this range available to the child after a `fork(2)`.
230        #[cfg(linux_android)]
231        MADV_DONTFORK,
232        /// Undo the effect of `MADV_DONTFORK`.
233        #[cfg(linux_android)]
234        MADV_DOFORK,
235        /// Poison the given pages.
236        ///
237        /// Subsequent references to those pages are treated like hardware memory corruption.
238        #[cfg(linux_android)]
239        MADV_HWPOISON,
240        /// Enable Kernel Samepage Merging (KSM) for the given pages.
241        #[cfg(linux_android)]
242        MADV_MERGEABLE,
243        /// Undo the effect of `MADV_MERGEABLE`
244        #[cfg(linux_android)]
245        MADV_UNMERGEABLE,
246        /// Preserve the memory of each page but offline the original page.
247        #[cfg(any(target_os = "android",
248            all(target_os = "linux", any(
249                target_arch = "aarch64",
250                target_arch = "arm",
251                target_arch = "powerpc",
252                target_arch = "powerpc64",
253                target_arch = "s390x",
254                target_arch = "x86",
255                target_arch = "x86_64",
256                target_arch = "sparc64"))))]
257        MADV_SOFT_OFFLINE,
258        /// Enable Transparent Huge Pages (THP) for pages in the given range.
259        #[cfg(linux_android)]
260        MADV_HUGEPAGE,
261        /// Undo the effect of `MADV_HUGEPAGE`.
262        #[cfg(linux_android)]
263        MADV_NOHUGEPAGE,
264        /// Exclude the given range from a core dump.
265        #[cfg(linux_android)]
266        MADV_DONTDUMP,
267        /// Undo the effect of an earlier `MADV_DONTDUMP`.
268        #[cfg(linux_android)]
269        MADV_DODUMP,
270        /// Specify that the application no longer needs the pages in the given range.
271        #[cfg(not(any(target_os = "aix", target_os = "hurd")))]
272        MADV_FREE,
273        /// Request that the system not flush the current range to disk unless it needs to.
274        #[cfg(freebsdlike)]
275        MADV_NOSYNC,
276        /// Undoes the effects of `MADV_NOSYNC` for any future pages dirtied within the given range.
277        #[cfg(freebsdlike)]
278        MADV_AUTOSYNC,
279        /// Region is not included in a core file.
280        #[cfg(freebsdlike)]
281        MADV_NOCORE,
282        /// Include region in a core file
283        #[cfg(freebsdlike)]
284        MADV_CORE,
285        /// This process should not be killed when swap space is exhausted.
286        #[cfg(any(target_os = "freebsd"))]
287        MADV_PROTECT,
288        /// Invalidate the hardware page table for the given region.
289        #[cfg(target_os = "dragonfly")]
290        MADV_INVAL,
291        /// Set the offset of the page directory page to `value` for the virtual page table.
292        #[cfg(target_os = "dragonfly")]
293        MADV_SETMAP,
294        /// Indicates that the application will not need the data in the given range.
295        #[cfg(apple_targets)]
296        MADV_ZERO_WIRED_PAGES,
297        /// Pages can be reused (by anyone).
298        #[cfg(apple_targets)]
299        MADV_FREE_REUSABLE,
300        /// Caller wants to reuse those pages.
301        #[cfg(apple_targets)]
302        MADV_FREE_REUSE,
303        // Darwin doesn't document this flag's behavior.
304        #[cfg(apple_targets)]
305        #[allow(missing_docs)]
306        MADV_CAN_REUSE,
307    }
308}
309
310libc_bitflags! {
311    /// Configuration flags for [`msync`].
312    pub struct MsFlags: c_int {
313        /// Schedule an update but return immediately.
314        MS_ASYNC;
315        /// Invalidate all cached data.
316        MS_INVALIDATE;
317        /// Invalidate pages, but leave them mapped.
318        #[cfg(apple_targets)]
319        MS_KILLPAGES;
320        /// Deactivate pages, but leave them mapped.
321        #[cfg(apple_targets)]
322        MS_DEACTIVATE;
323        /// Perform an update and wait for it to complete.
324        MS_SYNC;
325    }
326}
327
328#[cfg(not(target_os = "haiku"))]
329libc_bitflags! {
330    /// Flags for [`mlockall`].
331    pub struct MlockAllFlags: c_int {
332        /// Lock pages that are currently mapped into the address space of the process.
333        MCL_CURRENT;
334        /// Lock pages which will become mapped into the address space of the process in the future.
335        MCL_FUTURE;
336    }
337}
338
339/// Locks all memory pages that contain part of the address range with `length`
340/// bytes starting at `addr`.
341///
342/// Locked pages never move to the swap area.
343///
344/// # Safety
345///
346/// `addr` must meet all the requirements described in the [`mlock(2)`] man page.
347///
348/// [`mlock(2)`]: https://man7.org/linux/man-pages/man2/mlock.2.html
349pub unsafe fn mlock(addr: NonNull<c_void>, length: size_t) -> Result<()> {
350    unsafe { Errno::result(libc::mlock(addr.as_ptr(), length)).map(drop) }
351}
352
353/// Unlocks all memory pages that contain part of the address range with
354/// `length` bytes starting at `addr`.
355///
356/// # Safety
357///
358/// `addr` must meet all the requirements described in the [`munlock(2)`] man
359/// page.
360///
361/// [`munlock(2)`]: https://man7.org/linux/man-pages/man2/munlock.2.html
362pub unsafe fn munlock(addr: NonNull<c_void>, length: size_t) -> Result<()> {
363    unsafe { Errno::result(libc::munlock(addr.as_ptr(), length)).map(drop) }
364}
365
366/// Locks all memory pages mapped into this process' address space.
367///
368/// Locked pages never move to the swap area. For more information, see [`mlockall(2)`].
369///
370/// [`mlockall(2)`]: https://man7.org/linux/man-pages/man2/mlockall.2.html
371#[cfg(not(target_os = "haiku"))]
372pub fn mlockall(flags: MlockAllFlags) -> Result<()> {
373    unsafe { Errno::result(libc::mlockall(flags.bits())) }.map(drop)
374}
375
376/// Unlocks all memory pages mapped into this process' address space.
377///
378/// For more information, see [`munlockall(2)`].
379///
380/// [`munlockall(2)`]: https://man7.org/linux/man-pages/man2/munlockall.2.html
381#[cfg(not(target_os = "haiku"))]
382pub fn munlockall() -> Result<()> {
383    unsafe { Errno::result(libc::munlockall()) }.map(drop)
384}
385
386/// Allocate memory, or map files or devices into memory
387///
388/// For anonymous mappings (`MAP_ANON`/`MAP_ANONYMOUS`), see [mmap_anonymous].
389///
390/// # Safety
391///
392/// See the [`mmap(2)`] man page for detailed requirements.
393///
394/// [`mmap(2)`]: https://man7.org/linux/man-pages/man2/mmap.2.html
395pub unsafe fn mmap<F: AsFd>(
396    addr: Option<NonZeroUsize>,
397    length: NonZeroUsize,
398    prot: ProtFlags,
399    flags: MapFlags,
400    f: F,
401    offset: off_t,
402) -> Result<NonNull<c_void>> {
403    let ptr = addr.map_or(std::ptr::null_mut(), |a| a.get() as *mut c_void);
404
405    let fd = f.as_fd().as_raw_fd();
406    let ret = unsafe {
407        libc::mmap(ptr, length.into(), prot.bits(), flags.bits(), fd, offset)
408    };
409
410    if ret == libc::MAP_FAILED {
411        Err(Errno::last())
412    } else {
413        // SAFETY: `libc::mmap` returns a valid non-null pointer or `libc::MAP_FAILED`, thus `ret`
414        // will be non-null here.
415        Ok(unsafe { NonNull::new_unchecked(ret) })
416    }
417}
418
419/// Create an anonymous memory mapping.
420///
421/// This function is a wrapper around [`mmap`]:
422/// `mmap(ptr, len, prot, MAP_ANONYMOUS | flags, -1, 0)`.
423///
424/// # Safety
425///
426/// See the [`mmap(2)`] man page for detailed requirements.
427///
428/// [`mmap(2)`]: https://man7.org/linux/man-pages/man2/mmap.2.html
429pub unsafe fn mmap_anonymous(
430    addr: Option<NonZeroUsize>,
431    length: NonZeroUsize,
432    prot: ProtFlags,
433    flags: MapFlags,
434) -> Result<NonNull<c_void>> {
435    let ptr = addr.map_or(std::ptr::null_mut(), |a| a.get() as *mut c_void);
436
437    let flags = MapFlags::MAP_ANONYMOUS | flags;
438    let ret = unsafe {
439        libc::mmap(ptr, length.into(), prot.bits(), flags.bits(), -1, 0)
440    };
441
442    if ret == libc::MAP_FAILED {
443        Err(Errno::last())
444    } else {
445        // SAFETY: `libc::mmap` returns a valid non-null pointer or `libc::MAP_FAILED`, thus `ret`
446        // will be non-null here.
447        Ok(unsafe { NonNull::new_unchecked(ret) })
448    }
449}
450
451/// Expands (or shrinks) an existing memory mapping, potentially moving it at
452/// the same time.
453///
454/// # Safety
455///
456/// See the `mremap(2)` [man page](https://man7.org/linux/man-pages/man2/mremap.2.html) for
457/// detailed requirements.
458#[cfg(any(target_os = "linux", target_os = "netbsd"))]
459pub unsafe fn mremap(
460    addr: NonNull<c_void>,
461    old_size: size_t,
462    new_size: size_t,
463    flags: MRemapFlags,
464    new_address: Option<NonNull<c_void>>,
465) -> Result<NonNull<c_void>> {
466    #[cfg(target_os = "linux")]
467    let ret = unsafe {
468        libc::mremap(
469            addr.as_ptr(),
470            old_size,
471            new_size,
472            flags.bits(),
473            new_address
474                .map(NonNull::as_ptr)
475                .unwrap_or(std::ptr::null_mut()),
476        )
477    };
478    #[cfg(target_os = "netbsd")]
479    let ret = unsafe {
480        libc::mremap(
481            addr.as_ptr(),
482            old_size,
483            new_address
484                .map(NonNull::as_ptr)
485                .unwrap_or(std::ptr::null_mut()),
486            new_size,
487            flags.bits(),
488        )
489    };
490
491    if ret == libc::MAP_FAILED {
492        Err(Errno::last())
493    } else {
494        // SAFETY: `libc::mremap` returns a valid non-null pointer or `libc::MAP_FAILED`, thus `ret`
495        // will be non-null here.
496        Ok(unsafe { NonNull::new_unchecked(ret) })
497    }
498}
499
500/// remove a mapping
501///
502/// # Safety
503///
504/// `addr` must meet all the requirements described in the [`munmap(2)`] man
505/// page.
506///
507/// [`munmap(2)`]: https://man7.org/linux/man-pages/man2/munmap.2.html
508pub unsafe fn munmap(addr: NonNull<c_void>, len: size_t) -> Result<()> {
509    unsafe { Errno::result(libc::munmap(addr.as_ptr(), len)).map(drop) }
510}
511
512/// give advice about use of memory
513///
514/// # Safety
515///
516/// See the [`madvise(2)`] man page.  Take special care when using
517/// [`MmapAdvise::MADV_FREE`].
518///
519/// [`madvise(2)`]: https://man7.org/linux/man-pages/man2/madvise.2.html
520#[allow(rustdoc::broken_intra_doc_links)] // For Hurd as `MADV_FREE` is not available on it
521pub unsafe fn madvise(
522    addr: NonNull<c_void>,
523    length: size_t,
524    advise: MmapAdvise,
525) -> Result<()> {
526    unsafe {
527        Errno::result(libc::madvise(addr.as_ptr(), length, advise as i32))
528            .map(drop)
529    }
530}
531
532/// Set protection of memory mapping.
533///
534/// See [`mprotect(3)`](https://pubs.opengroup.org/onlinepubs/9699919799/functions/mprotect.html) for
535/// details.
536///
537/// # Safety
538///
539/// Calls to `mprotect` are inherently unsafe, as changes to memory protections can lead to
540/// SIGSEGVs.
541///
542/// ```
543/// # use nix::libc::size_t;
544/// # use nix::sys::mman::{mmap_anonymous, mprotect, MapFlags, ProtFlags};
545/// # use std::ptr;
546/// # use std::os::unix::io::BorrowedFd;
547/// const ONE_K: size_t = 1024;
548/// let one_k_non_zero = std::num::NonZeroUsize::new(ONE_K).unwrap();
549/// let mut slice: &mut [u8] = unsafe {
550///     let mem = mmap_anonymous(None, one_k_non_zero, ProtFlags::PROT_NONE, MapFlags::MAP_PRIVATE)
551///         .unwrap();
552///     mprotect(mem, ONE_K, ProtFlags::PROT_READ | ProtFlags::PROT_WRITE).unwrap();
553///     std::slice::from_raw_parts_mut(mem.as_ptr().cast(), ONE_K)
554/// };
555/// assert_eq!(slice[0], 0x00);
556/// slice[0] = 0xFF;
557/// assert_eq!(slice[0], 0xFF);
558/// ```
559pub unsafe fn mprotect(
560    addr: NonNull<c_void>,
561    length: size_t,
562    prot: ProtFlags,
563) -> Result<()> {
564    unsafe {
565        Errno::result(libc::mprotect(addr.as_ptr(), length, prot.bits()))
566            .map(drop)
567    }
568}
569
570/// synchronize a mapped region
571///
572/// # Safety
573///
574/// `addr` must meet all the requirements described in the [`msync(2)`] man
575/// page.
576///
577/// [`msync(2)`]: https://man7.org/linux/man-pages/man2/msync.2.html
578pub unsafe fn msync(
579    addr: NonNull<c_void>,
580    length: size_t,
581    flags: MsFlags,
582) -> Result<()> {
583    unsafe {
584        Errno::result(libc::msync(addr.as_ptr(), length, flags.bits()))
585            .map(drop)
586    }
587}
588
589#[cfg(not(target_os = "android"))]
590feature! {
591#![feature = "fs"]
592/// Creates and opens a new, or opens an existing, POSIX shared memory object.
593///
594/// For more information, see [`shm_open(3)`].
595///
596/// [`shm_open(3)`]: https://man7.org/linux/man-pages/man3/shm_open.3.html
597pub fn shm_open<P>(
598    name: &P,
599    flag: OFlag,
600    mode: Mode
601    ) -> Result<std::os::unix::io::OwnedFd>
602    where P: ?Sized + NixPath
603{
604    use std::os::unix::io::{FromRawFd, OwnedFd};
605
606    let ret = name.with_nix_path(|cstr| {
607        #[cfg(apple_targets)]
608        unsafe {
609            libc::shm_open(cstr.as_ptr(), flag.bits(), mode.bits() as libc::c_uint)
610        }
611        #[cfg(not(apple_targets))]
612        unsafe {
613            libc::shm_open(cstr.as_ptr(), flag.bits(), mode.bits() as libc::mode_t)
614        }
615    })?;
616
617    match ret {
618        -1 => Err(Errno::last()),
619        fd => Ok(unsafe{ OwnedFd::from_raw_fd(fd) })
620    }
621}
622}
623
624/// Performs the converse of [`shm_open`], removing an object previously created.
625///
626/// For more information, see [`shm_unlink(3)`].
627///
628/// [`shm_unlink(3)`]: https://man7.org/linux/man-pages/man3/shm_unlink.3.html
629#[cfg(not(target_os = "android"))]
630pub fn shm_unlink<P: ?Sized + NixPath>(name: &P) -> Result<()> {
631    let ret =
632        name.with_nix_path(|cstr| unsafe { libc::shm_unlink(cstr.as_ptr()) })?;
633
634    Errno::result(ret).map(drop)
635}