1#![allow(clippy::cognitive_complexity, clippy::too_many_arguments)]
17
18mod builder;
19mod guard;
20mod pipe;
21mod socket;
22mod types;
23
24pub use self::builder::*;
25pub use self::guard::*;
26pub use self::pipe::*;
27pub use self::socket::*;
28pub use self::types::*;
29use crate::syscalls::types::*;
30use crate::utils::map_io_err;
31use crate::WasiBusProcessId;
32use crate::WasiThread;
33use crate::WasiThreadId;
34use generational_arena::Arena;
35pub use generational_arena::Index as Inode;
36#[cfg(feature = "enable-serde")]
37use serde::{Deserialize, Serialize};
38use std::borrow::Cow;
39use std::collections::HashMap;
40use std::collections::VecDeque;
41use std::sync::mpsc;
42use std::sync::Arc;
43use std::{
44 borrow::Borrow,
45 io::Write,
46 ops::{Deref, DerefMut},
47 path::{Path, PathBuf},
48 sync::{
49 atomic::{AtomicBool, AtomicU32, AtomicU64, Ordering},
50 Mutex, RwLock, RwLockReadGuard, RwLockWriteGuard,
51 },
52};
53use tracing::{debug, trace};
54use wasmer_vbus::BusSpawnedProcess;
55use wasmer_wasi_types::wasi::{
56 Errno, Fd as WasiFd, Fdflags, Fdstat, Filesize, Filestat, Filetype, Preopentype, Rights,
57};
58use wasmer_wasi_types::wasi::{Prestat, PrestatEnum};
59
60use wasmer_vfs::{FileSystem, FsError, OpenOptions, VirtualFile};
61
62pub const VIRTUAL_ROOT_FD: WasiFd = 3;
64pub const ALL_RIGHTS: Rights = Rights::all();
66const STDIN_DEFAULT_RIGHTS: Rights = {
67 Rights::from_bits_truncate(
70 Rights::FD_DATASYNC.bits()
71 | Rights::FD_READ.bits()
72 | Rights::FD_SYNC.bits()
73 | Rights::FD_ADVISE.bits()
74 | Rights::FD_FILESTAT_GET.bits()
75 | Rights::POLL_FD_READWRITE.bits(),
76 )
77};
78const STDOUT_DEFAULT_RIGHTS: Rights = {
79 Rights::from_bits_truncate(
82 Rights::FD_DATASYNC.bits()
83 | Rights::FD_SYNC.bits()
84 | Rights::FD_WRITE.bits()
85 | Rights::FD_ADVISE.bits()
86 | Rights::FD_FILESTAT_GET.bits()
87 | Rights::POLL_FD_READWRITE.bits(),
88 )
89};
90const STDERR_DEFAULT_RIGHTS: Rights = STDOUT_DEFAULT_RIGHTS;
91
92pub const MAX_SYMLINKS: u32 = 128;
95
96#[derive(Debug)]
98#[cfg_attr(feature = "enable-serde", derive(Serialize, Deserialize))]
99pub struct InodeVal {
100 pub stat: RwLock<Filestat>,
101 pub is_preopened: bool,
102 pub name: String,
103 pub kind: RwLock<Kind>,
104}
105
106impl InodeVal {
107 pub fn read(&self) -> RwLockReadGuard<Kind> {
108 self.kind.read().unwrap()
109 }
110
111 pub fn write(&self) -> RwLockWriteGuard<Kind> {
112 self.kind.write().unwrap()
113 }
114}
115
116#[derive(Debug)]
119#[cfg_attr(feature = "enable-serde", derive(Serialize, Deserialize))]
120pub enum Kind {
121 File {
122 #[cfg_attr(feature = "enable-serde", serde(skip))]
124 handle: Option<Box<dyn VirtualFile + Send + Sync + 'static>>,
125 path: PathBuf,
128 fd: Option<u32>,
133 },
134 #[cfg_attr(feature = "enable-serde", serde(skip))]
135 Socket {
136 socket: InodeSocket,
138 },
139 #[cfg_attr(feature = "enable-serde", serde(skip))]
140 Pipe {
141 pipe: WasiPipe,
143 },
144 Dir {
145 parent: Option<Inode>,
147 path: PathBuf,
150 entries: HashMap<String, Inode>,
152 },
153 Root {
158 entries: HashMap<String, Inode>,
159 },
160 Symlink {
167 base_po_dir: WasiFd,
169 path_to_symlink: PathBuf,
171 relative_path: PathBuf,
173 },
174 Buffer {
175 buffer: Vec<u8>,
176 },
177 EventNotifications {
178 counter: Arc<AtomicU64>,
180 is_semaphore: bool,
182 #[cfg_attr(feature = "enable-serde", serde(skip))]
184 wakers: Arc<Mutex<VecDeque<mpsc::Sender<()>>>>,
185 },
186}
187
188#[derive(Debug, Clone)]
189#[cfg_attr(feature = "enable-serde", derive(Serialize, Deserialize))]
190pub struct Fd {
191 pub rights: Rights,
192 pub rights_inheriting: Rights,
193 pub flags: Fdflags,
194 pub offset: u64,
195 pub open_flags: u16,
199 pub inode: Inode,
200}
201
202impl Fd {
203 pub const READ: u16 = 1;
205 pub const WRITE: u16 = 2;
207 pub const APPEND: u16 = 4;
210 pub const TRUNCATE: u16 = 8;
215 pub const CREATE: u16 = 16;
220}
221
222#[derive(Debug)]
223#[cfg_attr(feature = "enable-serde", derive(Serialize, Deserialize))]
224pub struct WasiInodes {
225 pub arena: Arena<InodeVal>,
226 pub orphan_fds: HashMap<Inode, InodeVal>,
227}
228
229impl WasiInodes {
230 pub fn get_inodeval(&self, inode: generational_arena::Index) -> Result<&InodeVal, Errno> {
232 if let Some(iv) = self.arena.get(inode) {
233 Ok(iv)
234 } else {
235 self.orphan_fds.get(&inode).ok_or(Errno::Badf)
236 }
237 }
238
239 pub fn get_inodeval_mut(
241 &mut self,
242 inode: generational_arena::Index,
243 ) -> Result<&mut InodeVal, Errno> {
244 if let Some(iv) = self.arena.get_mut(inode) {
245 Ok(iv)
246 } else {
247 self.orphan_fds.get_mut(&inode).ok_or(Errno::Badf)
248 }
249 }
250
251 pub(crate) fn stdout(
253 &self,
254 fd_map: &RwLock<HashMap<u32, Fd>>,
255 ) -> Result<InodeValFileReadGuard, FsError> {
256 self.std_dev_get(fd_map, __WASI_STDOUT_FILENO)
257 }
258 pub(crate) fn stdout_mut(
260 &self,
261 fd_map: &RwLock<HashMap<u32, Fd>>,
262 ) -> Result<InodeValFileWriteGuard, FsError> {
263 self.std_dev_get_mut(fd_map, __WASI_STDOUT_FILENO)
264 }
265
266 pub(crate) fn stderr(
268 &self,
269 fd_map: &RwLock<HashMap<u32, Fd>>,
270 ) -> Result<InodeValFileReadGuard, FsError> {
271 self.std_dev_get(fd_map, __WASI_STDERR_FILENO)
272 }
273 pub(crate) fn stderr_mut(
275 &self,
276 fd_map: &RwLock<HashMap<u32, Fd>>,
277 ) -> Result<InodeValFileWriteGuard, FsError> {
278 self.std_dev_get_mut(fd_map, __WASI_STDERR_FILENO)
279 }
280
281 pub(crate) fn stdin(
283 &self,
284 fd_map: &RwLock<HashMap<u32, Fd>>,
285 ) -> Result<InodeValFileReadGuard, FsError> {
286 self.std_dev_get(fd_map, __WASI_STDIN_FILENO)
287 }
288 pub(crate) fn stdin_mut(
290 &self,
291 fd_map: &RwLock<HashMap<u32, Fd>>,
292 ) -> Result<InodeValFileWriteGuard, FsError> {
293 self.std_dev_get_mut(fd_map, __WASI_STDIN_FILENO)
294 }
295
296 fn std_dev_get<'a>(
299 &'a self,
300 fd_map: &RwLock<HashMap<u32, Fd>>,
301 fd: WasiFd,
302 ) -> Result<InodeValFileReadGuard<'a>, FsError> {
303 if let Some(fd) = fd_map.read().unwrap().get(&fd) {
304 let guard = self.arena[fd.inode].read();
305 if let Kind::File { .. } = guard.deref() {
306 Ok(InodeValFileReadGuard { guard })
307 } else {
308 Err(FsError::NotAFile)
310 }
311 } else {
312 Err(FsError::NoDevice)
314 }
315 }
316 fn std_dev_get_mut<'a>(
319 &'a self,
320 fd_map: &RwLock<HashMap<u32, Fd>>,
321 fd: WasiFd,
322 ) -> Result<InodeValFileWriteGuard<'a>, FsError> {
323 if let Some(fd) = fd_map.read().unwrap().get(&fd) {
324 let guard = self.arena[fd.inode].write();
325 if let Kind::File { .. } = guard.deref() {
326 Ok(InodeValFileWriteGuard { guard })
327 } else {
328 Err(FsError::NotAFile)
330 }
331 } else {
332 Err(FsError::NoDevice)
334 }
335 }
336}
337
338#[derive(Debug)]
341#[cfg_attr(feature = "enable-serde", derive(Serialize, Deserialize))]
342pub struct WasiFs {
343 pub preopen_fds: RwLock<Vec<u32>>,
345 pub name_map: HashMap<String, Inode>,
346 pub fd_map: RwLock<HashMap<u32, Fd>>,
347 pub next_fd: AtomicU32,
348 inode_counter: AtomicU64,
349 pub current_dir: Mutex<String>,
350 pub is_wasix: AtomicBool,
351 #[cfg_attr(feature = "enable-serde", serde(skip, default = "default_fs_backing"))]
352 pub fs_backing: Box<dyn FileSystem>,
353}
354
355pub(crate) fn default_fs_backing() -> Box<dyn wasmer_vfs::FileSystem> {
357 cfg_if::cfg_if! {
358 if #[cfg(feature = "host-fs")] {
359 Box::new(wasmer_vfs::host_fs::FileSystem::default())
360 } else if #[cfg(feature = "mem-fs")] {
361 Box::new(wasmer_vfs::mem_fs::FileSystem::default())
362 } else {
363 Box::new(FallbackFileSystem::default())
364 }
365 }
366}
367
368#[derive(Debug, Default)]
369pub struct FallbackFileSystem;
370
371impl FallbackFileSystem {
372 fn fail() -> ! {
373 panic!("No filesystem set for wasmer-wasi, please enable either the `host-fs` or `mem-fs` feature or set your custom filesystem with `WasiStateBuilder::set_fs`");
374 }
375}
376
377impl FileSystem for FallbackFileSystem {
378 fn read_dir(&self, _path: &Path) -> Result<wasmer_vfs::ReadDir, FsError> {
379 Self::fail();
380 }
381 fn create_dir(&self, _path: &Path) -> Result<(), FsError> {
382 Self::fail();
383 }
384 fn remove_dir(&self, _path: &Path) -> Result<(), FsError> {
385 Self::fail();
386 }
387 fn rename(&self, _from: &Path, _to: &Path) -> Result<(), FsError> {
388 Self::fail();
389 }
390 fn metadata(&self, _path: &Path) -> Result<wasmer_vfs::Metadata, FsError> {
391 Self::fail();
392 }
393 fn symlink_metadata(&self, _path: &Path) -> Result<wasmer_vfs::Metadata, FsError> {
394 Self::fail();
395 }
396 fn remove_file(&self, _path: &Path) -> Result<(), FsError> {
397 Self::fail();
398 }
399 fn new_open_options(&self) -> wasmer_vfs::OpenOptions {
400 Self::fail();
401 }
402}
403
404impl WasiFs {
405 pub(crate) fn new_with_preopen(
407 inodes: &mut WasiInodes,
408 preopens: &[PreopenedDir],
409 vfs_preopens: &[String],
410 fs_backing: Box<dyn FileSystem>,
411 ) -> Result<Self, String> {
412 let (wasi_fs, root_inode) = Self::new_init(fs_backing, inodes)?;
413
414 for preopen_name in vfs_preopens {
415 let kind = Kind::Dir {
416 parent: Some(root_inode),
417 path: PathBuf::from(preopen_name),
418 entries: Default::default(),
419 };
420 let rights = Rights::FD_ADVISE
421 | Rights::FD_TELL
422 | Rights::FD_SEEK
423 | Rights::FD_READ
424 | Rights::PATH_OPEN
425 | Rights::FD_READDIR
426 | Rights::PATH_READLINK
427 | Rights::PATH_FILESTAT_GET
428 | Rights::FD_FILESTAT_GET
429 | Rights::PATH_LINK_SOURCE
430 | Rights::PATH_RENAME_SOURCE
431 | Rights::POLL_FD_READWRITE
432 | Rights::SOCK_SHUTDOWN;
433 let inode = wasi_fs
434 .create_inode(inodes, kind, true, preopen_name.clone())
435 .map_err(|e| {
436 format!(
437 "Failed to create inode for preopened dir (name `{}`): WASI error code: {}",
438 preopen_name, e
439 )
440 })?;
441 let fd_flags = Fd::READ;
442 let fd = wasi_fs
443 .create_fd(rights, rights, Fdflags::empty(), fd_flags, inode)
444 .map_err(|e| format!("Could not open fd for file {:?}: {}", preopen_name, e))?;
445 {
446 let mut guard = inodes.arena[root_inode].write();
447 if let Kind::Root { entries } = guard.deref_mut() {
448 let existing_entry = entries.insert(preopen_name.clone(), inode);
449 if existing_entry.is_some() {
450 return Err(format!(
451 "Found duplicate entry for alias `{}`",
452 preopen_name
453 ));
454 }
455 assert!(existing_entry.is_none())
456 }
457 }
458 wasi_fs.preopen_fds.write().unwrap().push(fd);
459 }
460
461 for PreopenedDir {
462 path,
463 alias,
464 read,
465 write,
466 create,
467 } in preopens
468 {
469 debug!(
470 "Attempting to preopen {} with alias {:?}",
471 &path.to_string_lossy(),
472 &alias
473 );
474 let cur_dir_metadata = wasi_fs
475 .fs_backing
476 .metadata(path)
477 .map_err(|e| format!("Could not get metadata for file {:?}: {}", path, e))?;
478
479 let kind = if cur_dir_metadata.is_dir() {
480 Kind::Dir {
481 parent: Some(root_inode),
482 path: path.clone(),
483 entries: Default::default(),
484 }
485 } else {
486 return Err(format!(
487 "WASI only supports pre-opened directories right now; found \"{}\"",
488 &path.to_string_lossy()
489 ));
490 };
491
492 let rights = {
493 let mut rights = Rights::FD_ADVISE | Rights::FD_TELL | Rights::FD_SEEK;
495 if *read {
496 rights |= Rights::FD_READ
497 | Rights::PATH_OPEN
498 | Rights::FD_READDIR
499 | Rights::PATH_READLINK
500 | Rights::PATH_FILESTAT_GET
501 | Rights::FD_FILESTAT_GET
502 | Rights::PATH_LINK_SOURCE
503 | Rights::PATH_RENAME_SOURCE
504 | Rights::POLL_FD_READWRITE
505 | Rights::SOCK_SHUTDOWN;
506 }
507 if *write {
508 rights |= Rights::FD_DATASYNC
509 | Rights::FD_FDSTAT_SET_FLAGS
510 | Rights::FD_WRITE
511 | Rights::FD_SYNC
512 | Rights::FD_ALLOCATE
513 | Rights::PATH_OPEN
514 | Rights::PATH_RENAME_TARGET
515 | Rights::PATH_FILESTAT_SET_SIZE
516 | Rights::PATH_FILESTAT_SET_TIMES
517 | Rights::FD_FILESTAT_SET_SIZE
518 | Rights::FD_FILESTAT_SET_TIMES
519 | Rights::PATH_REMOVE_DIRECTORY
520 | Rights::PATH_UNLINK_FILE
521 | Rights::POLL_FD_READWRITE
522 | Rights::SOCK_SHUTDOWN;
523 }
524 if *create {
525 rights |= Rights::PATH_CREATE_DIRECTORY
526 | Rights::PATH_CREATE_FILE
527 | Rights::PATH_LINK_TARGET
528 | Rights::PATH_OPEN
529 | Rights::PATH_RENAME_TARGET
530 | Rights::PATH_SYMLINK;
531 }
532
533 rights
534 };
535 let inode = if let Some(alias) = &alias {
536 wasi_fs.create_inode(inodes, kind, true, alias.clone())
537 } else {
538 wasi_fs.create_inode(inodes, kind, true, path.to_string_lossy().into_owned())
539 }
540 .map_err(|e| {
541 format!(
542 "Failed to create inode for preopened dir: WASI error code: {}",
543 e
544 )
545 })?;
546 let fd_flags = {
547 let mut fd_flags = 0;
548 if *read {
549 fd_flags |= Fd::READ;
550 }
551 if *write {
552 fd_flags |= Fd::WRITE | Fd::APPEND | Fd::TRUNCATE;
554 }
555 if *create {
556 fd_flags |= Fd::CREATE;
557 }
558 fd_flags
559 };
560 let fd = wasi_fs
561 .create_fd(rights, rights, Fdflags::empty(), fd_flags, inode)
562 .map_err(|e| format!("Could not open fd for file {:?}: {}", path, e))?;
563 {
564 let mut guard = inodes.arena[root_inode].write();
565 if let Kind::Root { entries } = guard.deref_mut() {
566 let key = if let Some(alias) = &alias {
567 alias.clone()
568 } else {
569 path.to_string_lossy().into_owned()
570 };
571 let existing_entry = entries.insert(key.clone(), inode);
572 if existing_entry.is_some() {
573 return Err(format!("Found duplicate entry for alias `{}`", key));
574 }
575 assert!(existing_entry.is_none())
576 }
577 }
578 wasi_fs.preopen_fds.write().unwrap().push(fd);
579 }
580
581 Ok(wasi_fs)
582 }
583
584 fn new_init(
587 fs_backing: Box<dyn FileSystem>,
588 inodes: &mut WasiInodes,
589 ) -> Result<(Self, Inode), String> {
590 debug!("Initializing WASI filesystem");
591 let wasi_fs = Self {
592 preopen_fds: RwLock::new(vec![]),
593 name_map: HashMap::new(),
594 fd_map: RwLock::new(HashMap::new()),
595 next_fd: AtomicU32::new(3),
596 inode_counter: AtomicU64::new(1024),
597 current_dir: Mutex::new("/".to_string()),
598 is_wasix: AtomicBool::new(false),
599 fs_backing,
600 };
601 wasi_fs.create_stdin(inodes);
602 wasi_fs.create_stdout(inodes);
603 wasi_fs.create_stderr(inodes);
604
605 let root_inode = {
607 let all_rights = ALL_RIGHTS;
608 let root_rights = all_rights
611 ;
627 let inode = wasi_fs.create_virtual_root(inodes);
628 let fd = wasi_fs
629 .create_fd(root_rights, root_rights, Fdflags::empty(), Fd::READ, inode)
630 .map_err(|e| format!("Could not create root fd: {}", e))?;
631 wasi_fs.preopen_fds.write().unwrap().push(fd);
632 inode
633 };
634
635 Ok((wasi_fs, root_inode))
636 }
637
638 fn get_next_inode_index(&self) -> u64 {
640 self.inode_counter.fetch_add(1, Ordering::AcqRel)
641 }
642
643 #[allow(dead_code)]
653 pub unsafe fn open_dir_all(
654 &mut self,
655 inodes: &mut WasiInodes,
656 base: WasiFd,
657 name: String,
658 rights: Rights,
659 rights_inheriting: Rights,
660 flags: Fdflags,
661 ) -> Result<WasiFd, FsError> {
662 let mut cur_inode = self.get_fd_inode(base).map_err(fs_error_from_wasi_err)?;
665
666 let path: &Path = Path::new(&name);
667 for c in path.components() {
669 let segment_name = c.as_os_str().to_string_lossy().to_string();
670 let guard = inodes.arena[cur_inode].read();
671 let deref = guard.deref();
672 match deref {
673 Kind::Dir { ref entries, .. } | Kind::Root { ref entries } => {
674 if let Some(_entry) = entries.get(&segment_name) {
675 return Err(FsError::AlreadyExists);
677 }
678
679 let kind = Kind::Dir {
680 parent: Some(cur_inode),
681 path: PathBuf::from(""),
682 entries: HashMap::new(),
683 };
684
685 drop(guard);
686 let inode = self.create_inode_with_default_stat(
687 inodes,
688 kind,
689 false,
690 segment_name.clone(),
691 );
692
693 {
695 let mut guard = inodes.arena[cur_inode].write();
696 let deref_mut = guard.deref_mut();
697 match deref_mut {
698 Kind::Dir {
699 ref mut entries, ..
700 }
701 | Kind::Root { ref mut entries } => {
702 entries.insert(segment_name, inode);
703 }
704 _ => unreachable!("Dir or Root became not Dir or Root"),
705 }
706 }
707 cur_inode = inode;
708 }
709 _ => return Err(FsError::BaseNotDirectory),
710 }
711 }
712
713 self.create_fd(
715 rights,
716 rights_inheriting,
717 flags,
718 Fd::READ | Fd::WRITE,
719 cur_inode,
720 )
721 .map_err(fs_error_from_wasi_err)
722 }
723
724 #[allow(dead_code)]
728 pub fn open_file_at(
729 &mut self,
730 inodes: &mut WasiInodes,
731 base: WasiFd,
732 file: Box<dyn VirtualFile + Send + Sync + 'static>,
733 open_flags: u16,
734 name: String,
735 rights: Rights,
736 rights_inheriting: Rights,
737 flags: Fdflags,
738 ) -> Result<WasiFd, FsError> {
739 let base_inode = self.get_fd_inode(base).map_err(fs_error_from_wasi_err)?;
742
743 let guard = inodes.arena[base_inode].read();
744 let deref = guard.deref();
745 match deref {
746 Kind::Dir { ref entries, .. } | Kind::Root { ref entries } => {
747 if let Some(_entry) = entries.get(&name) {
748 return Err(FsError::AlreadyExists);
750 }
751
752 let kind = Kind::File {
753 handle: Some(file),
754 path: PathBuf::from(""),
755 fd: Some(self.next_fd.load(Ordering::Acquire)),
756 };
757
758 drop(guard);
759 let inode = self
760 .create_inode(inodes, kind, false, name.clone())
761 .map_err(|_| FsError::IOError)?;
762
763 {
764 let mut guard = inodes.arena[base_inode].write();
765 let deref_mut = guard.deref_mut();
766 match deref_mut {
767 Kind::Dir {
768 ref mut entries, ..
769 }
770 | Kind::Root { ref mut entries } => {
771 entries.insert(name, inode);
772 }
773 _ => unreachable!("Dir or Root became not Dir or Root"),
774 }
775 }
776
777 self.create_fd(rights, rights_inheriting, flags, open_flags, inode)
778 .map_err(fs_error_from_wasi_err)
779 }
780 _ => Err(FsError::BaseNotDirectory),
781 }
782 }
783
784 #[allow(dead_code)]
788 pub fn swap_file(
789 &self,
790 inodes: &WasiInodes,
791 fd: WasiFd,
792 file: Box<dyn VirtualFile + Send + Sync + 'static>,
793 ) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
794 let mut ret = Some(file);
795 match fd {
796 __WASI_STDIN_FILENO => {
797 let mut target = inodes.stdin_mut(&self.fd_map)?;
798 std::mem::swap(target.deref_mut(), &mut ret);
799 }
800 __WASI_STDOUT_FILENO => {
801 let mut target = inodes.stdout_mut(&self.fd_map)?;
802 std::mem::swap(target.deref_mut(), &mut ret);
803 }
804 __WASI_STDERR_FILENO => {
805 let mut target = inodes.stderr_mut(&self.fd_map)?;
806 std::mem::swap(target.deref_mut(), &mut ret);
807 }
808 _ => {
809 let base_inode = self.get_fd_inode(fd).map_err(fs_error_from_wasi_err)?;
810 let mut guard = inodes.arena[base_inode].write();
811 let deref_mut = guard.deref_mut();
812 match deref_mut {
813 Kind::File { ref mut handle, .. } => {
814 std::mem::swap(handle, &mut ret);
815 }
816 _ => return Err(FsError::NotAFile),
817 }
818 }
819 }
820
821 Ok(ret)
822 }
823
824 pub(crate) fn filestat_resync_size(
826 &self,
827 inodes: &WasiInodes,
828 fd: WasiFd,
829 ) -> Result<Filesize, Errno> {
830 let inode = self.get_fd_inode(fd)?;
831 let mut guard = inodes.arena[inode].write();
832 let deref_mut = guard.deref_mut();
833 match deref_mut {
834 Kind::File { handle, .. } => {
835 if let Some(h) = handle {
836 let new_size = h.size();
837 drop(guard);
838
839 inodes.arena[inode].stat.write().unwrap().st_size = new_size;
840 Ok(new_size as Filesize)
841 } else {
842 Err(Errno::Badf)
843 }
844 }
845 Kind::Dir { .. } | Kind::Root { .. } => Err(Errno::Isdir),
846 _ => Err(Errno::Inval),
847 }
848 }
849
850 pub fn set_current_dir(&self, path: &str) {
852 let mut guard = self.current_dir.lock().unwrap();
853 *guard = path.to_string();
854 }
855
856 pub fn get_current_dir(
858 &self,
859 inodes: &mut WasiInodes,
860 base: WasiFd,
861 ) -> Result<(Inode, String), Errno> {
862 self.get_current_dir_inner(inodes, base, 0)
863 }
864
865 pub(crate) fn get_current_dir_inner(
866 &self,
867 inodes: &mut WasiInodes,
868 base: WasiFd,
869 symlink_count: u32,
870 ) -> Result<(Inode, String), Errno> {
871 let current_dir = {
872 let guard = self.current_dir.lock().unwrap();
873 guard.clone()
874 };
875 let cur_inode = self.get_fd_inode(base)?;
876 let inode = self.get_inode_at_path_inner(
877 inodes,
878 cur_inode,
879 current_dir.as_str(),
880 symlink_count,
881 true,
882 )?;
883 Ok((inode, current_dir))
884 }
885
886 fn get_inode_at_path_inner(
900 &self,
901 inodes: &mut WasiInodes,
902 mut cur_inode: generational_arena::Index,
903 path: &str,
904 mut symlink_count: u32,
905 follow_symlinks: bool,
906 ) -> Result<Inode, Errno> {
907 if symlink_count > MAX_SYMLINKS {
908 return Err(Errno::Mlink);
909 }
910
911 let path: &Path = Path::new(path);
912 let n_components = path.components().count();
913
914 'path_iter: for (i, component) in path.components().enumerate() {
916 let last_component = i + 1 == n_components;
918 'symlink_resolution: while symlink_count < MAX_SYMLINKS {
921 let mut guard = inodes.arena[cur_inode].write();
922 let deref_mut = guard.deref_mut();
923 match deref_mut {
924 Kind::Buffer { .. } => unimplemented!("state::get_inode_at_path for buffers"),
925 Kind::Dir {
926 ref mut entries,
927 ref path,
928 ref parent,
929 ..
930 } => {
931 match component.as_os_str().to_string_lossy().borrow() {
932 ".." => {
933 if let Some(p) = parent {
934 cur_inode = *p;
935 continue 'path_iter;
936 } else {
937 return Err(Errno::Access);
938 }
939 }
940 "." => continue 'path_iter,
941 _ => (),
942 }
943 let mut loop_for_symlink = false;
945 if let Some(entry) =
946 entries.get(component.as_os_str().to_string_lossy().as_ref())
947 {
948 cur_inode = *entry;
949 } else {
950 let file = {
951 let mut cd = path.clone();
952 cd.push(component);
953 cd
954 };
955 let metadata = self
956 .fs_backing
957 .symlink_metadata(&file)
958 .ok()
959 .ok_or(Errno::Noent)?;
960 let file_type = metadata.file_type();
961 let should_insert;
964
965 let kind = if file_type.is_dir() {
966 should_insert = true;
967 Kind::Dir {
969 parent: Some(cur_inode),
970 path: file.clone(),
971 entries: Default::default(),
972 }
973 } else if file_type.is_file() {
974 should_insert = true;
975 Kind::File {
977 handle: None,
978 path: file.clone(),
979 fd: None,
980 }
981 } else if file_type.is_symlink() {
982 should_insert = false;
983 let link_value = file.read_link().map_err(map_io_err)?;
984 debug!("attempting to decompose path {:?}", link_value);
985
986 let (pre_open_dir_fd, relative_path) = if link_value.is_relative() {
987 self.path_into_pre_open_and_relative_path(inodes, &file)?
988 } else {
989 unimplemented!("Absolute symlinks are not yet supported");
990 };
991 loop_for_symlink = true;
992 symlink_count += 1;
993 Kind::Symlink {
994 base_po_dir: pre_open_dir_fd,
995 path_to_symlink: relative_path.to_owned(),
996 relative_path: link_value,
997 }
998 } else {
999 #[cfg(unix)]
1000 {
1001 let file_type: Filetype = if file_type.is_char_device() {
1003 Filetype::CharacterDevice
1004 } else if file_type.is_block_device() {
1005 Filetype::BlockDevice
1006 } else if file_type.is_fifo() {
1007 Filetype::Unknown
1009 } else if file_type.is_socket() {
1010 Filetype::SocketStream
1013 } else {
1014 unimplemented!("state::get_inode_at_path unknown file type: not file, directory, symlink, char device, block device, fifo, or socket");
1015 };
1016
1017 let kind = Kind::File {
1018 handle: None,
1019 path: file.clone(),
1020 fd: None,
1021 };
1022 drop(guard);
1023 let new_inode = self.create_inode_with_stat(
1024 inodes,
1025 kind,
1026 false,
1027 file.to_string_lossy().to_string(),
1028 Filestat {
1029 st_filetype: file_type,
1030 ..Filestat::default()
1031 },
1032 );
1033
1034 let mut guard = inodes.arena[cur_inode].write();
1035 if let Kind::Dir {
1036 ref mut entries, ..
1037 } = guard.deref_mut()
1038 {
1039 entries.insert(
1040 component.as_os_str().to_string_lossy().to_string(),
1041 new_inode,
1042 );
1043 } else {
1044 unreachable!(
1045 "Attempted to insert special device into non-directory"
1046 );
1047 }
1048 return Ok(new_inode);
1050 }
1051 #[cfg(not(unix))]
1052 unimplemented!("state::get_inode_at_path unknown file type: not file, directory, or symlink");
1053 };
1054
1055 drop(guard);
1056 let new_inode = self.create_inode(
1057 inodes,
1058 kind,
1059 false,
1060 file.to_string_lossy().to_string(),
1061 )?;
1062 if should_insert {
1063 let mut guard = inodes.arena[cur_inode].write();
1064 if let Kind::Dir {
1065 ref mut entries, ..
1066 } = guard.deref_mut()
1067 {
1068 entries.insert(
1069 component.as_os_str().to_string_lossy().to_string(),
1070 new_inode,
1071 );
1072 }
1073 }
1074 cur_inode = new_inode;
1075
1076 if loop_for_symlink && follow_symlinks {
1077 debug!("Following symlink to {:?}", cur_inode);
1078 continue 'symlink_resolution;
1079 }
1080 }
1081 }
1082 Kind::Root { entries } => {
1083 match component.as_os_str().to_string_lossy().borrow() {
1084 ".." => continue 'path_iter,
1086 "." => continue 'path_iter,
1088 _ => (),
1089 }
1090
1091 if let Some(entry) =
1092 entries.get(component.as_os_str().to_string_lossy().as_ref())
1093 {
1094 cur_inode = *entry;
1095 } else {
1096 return Err(Errno::Notcapable);
1098 }
1099 }
1100 Kind::File { .. }
1101 | Kind::Socket { .. }
1102 | Kind::Pipe { .. }
1103 | Kind::EventNotifications { .. } => {
1104 return Err(Errno::Notdir);
1105 }
1106 Kind::Symlink {
1107 base_po_dir,
1108 path_to_symlink,
1109 relative_path,
1110 } => {
1111 let new_base_dir = *base_po_dir;
1112 let new_base_inode = self.get_fd_inode(new_base_dir)?;
1113
1114 let new_path = {
1116 let mut base = path_to_symlink.clone();
1120 base.pop();
1123 base.push(relative_path);
1124 base.to_string_lossy().to_string()
1125 };
1126 debug!("Following symlink recursively");
1127 drop(guard);
1128 let symlink_inode = self.get_inode_at_path_inner(
1129 inodes,
1130 new_base_inode,
1131 &new_path,
1132 symlink_count + 1,
1133 follow_symlinks,
1134 )?;
1135 cur_inode = symlink_inode;
1136 let guard = inodes.arena[cur_inode].read();
1139 if let Kind::File { .. } = guard.deref() {
1140 if last_component {
1142 break 'symlink_resolution;
1143 }
1144 }
1145 continue 'symlink_resolution;
1146 }
1147 }
1148 break 'symlink_resolution;
1149 }
1150 }
1151
1152 Ok(cur_inode)
1153 }
1154
1155 fn path_into_pre_open_and_relative_path<'path>(
1165 &self,
1166 inodes: &WasiInodes,
1167 path: &'path Path,
1168 ) -> Result<(WasiFd, &'path Path), Errno> {
1169 enum BaseFdAndRelPath<'a> {
1170 None,
1171 BestMatch {
1172 fd: WasiFd,
1173 rel_path: &'a Path,
1174 max_seen: usize,
1175 },
1176 }
1177
1178 impl<'a> BaseFdAndRelPath<'a> {
1179 const fn max_seen(&self) -> usize {
1180 match self {
1181 Self::None => 0,
1182 Self::BestMatch { max_seen, .. } => *max_seen,
1183 }
1184 }
1185 }
1186 let mut res = BaseFdAndRelPath::None;
1187 let preopen_fds = self.preopen_fds.read().unwrap();
1189 let deref = preopen_fds.deref();
1190 for po_fd in deref {
1191 let po_inode = self.fd_map.read().unwrap()[po_fd].inode;
1192 let guard = inodes.arena[po_inode].read();
1193 let deref = guard.deref();
1194 let po_path = match deref {
1195 Kind::Dir { path, .. } => &**path,
1196 Kind::Root { .. } => Path::new("/"),
1197 _ => unreachable!("Preopened FD that's not a directory or the root"),
1198 };
1199 if let Ok(stripped_path) = path.strip_prefix(po_path) {
1201 let new_prefix_len = po_path.as_os_str().len();
1203 if new_prefix_len >= res.max_seen() {
1206 res = BaseFdAndRelPath::BestMatch {
1207 fd: *po_fd,
1208 rel_path: stripped_path,
1209 max_seen: new_prefix_len,
1210 };
1211 }
1212 }
1213 }
1214 match res {
1215 BaseFdAndRelPath::None => Err(Errno::Inval),
1217 BaseFdAndRelPath::BestMatch { fd, rel_path, .. } => Ok((fd, rel_path)),
1218 }
1219 }
1220
1221 pub(crate) fn path_depth_from_fd(
1224 &self,
1225 inodes: &WasiInodes,
1226 fd: WasiFd,
1227 inode: Inode,
1228 ) -> Result<usize, Errno> {
1229 let mut counter = 0;
1230 let base_inode = self.get_fd_inode(fd)?;
1231 let mut cur_inode = inode;
1232
1233 while cur_inode != base_inode {
1234 counter += 1;
1235 let guard = inodes.arena[cur_inode].read();
1236 let deref = guard.deref();
1237 match deref {
1238 Kind::Dir { parent, .. } => {
1239 if let Some(p) = parent {
1240 cur_inode = *p;
1241 }
1242 }
1243 _ => return Err(Errno::Inval),
1244 }
1245 }
1246
1247 Ok(counter)
1248 }
1249
1250 pub(crate) fn get_inode_at_path(
1257 &self,
1258 inodes: &mut WasiInodes,
1259 base: WasiFd,
1260 path: &str,
1261 follow_symlinks: bool,
1262 ) -> Result<Inode, Errno> {
1263 let start_inode = if !path.starts_with('/') && self.is_wasix.load(Ordering::Acquire) {
1264 let (cur_inode, _) = self.get_current_dir(inodes, base)?;
1265 cur_inode
1266 } else {
1267 self.get_fd_inode(base)?
1268 };
1269
1270 self.get_inode_at_path_inner(inodes, start_inode, path, 0, follow_symlinks)
1271 }
1272
1273 pub(crate) fn get_parent_inode_at_path(
1276 &self,
1277 inodes: &mut WasiInodes,
1278 base: WasiFd,
1279 path: &Path,
1280 follow_symlinks: bool,
1281 ) -> Result<(Inode, String), Errno> {
1282 let mut parent_dir = std::path::PathBuf::new();
1283 let mut components = path.components().rev();
1284 let new_entity_name = components
1285 .next()
1286 .ok_or(Errno::Inval)?
1287 .as_os_str()
1288 .to_string_lossy()
1289 .to_string();
1290 for comp in components.rev() {
1291 parent_dir.push(comp);
1292 }
1293 self.get_inode_at_path(inodes, base, &parent_dir.to_string_lossy(), follow_symlinks)
1294 .map(|v| (v, new_entity_name))
1295 }
1296
1297 pub fn get_fd(&self, fd: WasiFd) -> Result<Fd, Errno> {
1298 self.fd_map
1299 .read()
1300 .unwrap()
1301 .get(&fd)
1302 .ok_or(Errno::Badf)
1303 .map(|a| a.clone())
1304 }
1305
1306 pub fn get_fd_inode(&self, fd: WasiFd) -> Result<generational_arena::Index, Errno> {
1307 self.fd_map
1308 .read()
1309 .unwrap()
1310 .get(&fd)
1311 .ok_or(Errno::Badf)
1312 .map(|a| a.inode)
1313 }
1314
1315 pub fn filestat_fd(&self, inodes: &WasiInodes, fd: WasiFd) -> Result<Filestat, Errno> {
1316 let inode = self.get_fd_inode(fd)?;
1317 Ok(*inodes.arena[inode].stat.read().unwrap().deref())
1318 }
1319
1320 pub fn fdstat(&self, inodes: &WasiInodes, fd: WasiFd) -> Result<Fdstat, Errno> {
1321 match fd {
1322 __WASI_STDIN_FILENO => {
1323 return Ok(Fdstat {
1324 fs_filetype: Filetype::CharacterDevice,
1325 fs_flags: Fdflags::empty(),
1326 fs_rights_base: STDIN_DEFAULT_RIGHTS,
1327 fs_rights_inheriting: Rights::empty(),
1328 })
1329 }
1330 __WASI_STDOUT_FILENO => {
1331 return Ok(Fdstat {
1332 fs_filetype: Filetype::CharacterDevice,
1333 fs_flags: Fdflags::APPEND,
1334 fs_rights_base: STDOUT_DEFAULT_RIGHTS,
1335 fs_rights_inheriting: Rights::empty(),
1336 })
1337 }
1338 __WASI_STDERR_FILENO => {
1339 return Ok(Fdstat {
1340 fs_filetype: Filetype::CharacterDevice,
1341 fs_flags: Fdflags::APPEND,
1342 fs_rights_base: STDERR_DEFAULT_RIGHTS,
1343 fs_rights_inheriting: Rights::empty(),
1344 })
1345 }
1346 VIRTUAL_ROOT_FD => {
1347 return Ok(Fdstat {
1348 fs_filetype: Filetype::Directory,
1349 fs_flags: Fdflags::empty(),
1350 fs_rights_base: ALL_RIGHTS,
1352 fs_rights_inheriting: ALL_RIGHTS,
1353 });
1354 }
1355 _ => (),
1356 }
1357 let fd = self.get_fd(fd)?;
1358 debug!("fdstat: {:?}", fd);
1359
1360 let guard = inodes.arena[fd.inode].read();
1361 let deref = guard.deref();
1362 Ok(Fdstat {
1363 fs_filetype: match deref {
1364 Kind::File { .. } => Filetype::RegularFile,
1365 Kind::Dir { .. } => Filetype::Directory,
1366 Kind::Symlink { .. } => Filetype::SymbolicLink,
1367 _ => Filetype::Unknown,
1368 },
1369 fs_flags: fd.flags,
1370 fs_rights_base: fd.rights,
1371 fs_rights_inheriting: fd.rights_inheriting, })
1373 }
1374
1375 pub fn prestat_fd(&self, inodes: &WasiInodes, fd: WasiFd) -> Result<Prestat, Errno> {
1376 let inode = self.get_fd_inode(fd)?;
1377 trace!("in prestat_fd {:?}", self.get_fd(fd)?);
1378
1379 let inode_val = &inodes.arena[inode];
1380
1381 if inode_val.is_preopened {
1382 Ok(self.prestat_fd_inner(inode_val))
1383 } else {
1384 Err(Errno::Badf)
1385 }
1386 }
1387
1388 pub(crate) fn prestat_fd_inner(&self, inode_val: &InodeVal) -> Prestat {
1389 Prestat {
1390 pr_type: Preopentype::Dir,
1391 u: PrestatEnum::Dir {
1392 pr_name_len: inode_val.name.len() as u32, }
1395 .untagged(),
1396 }
1397 }
1398
1399 pub fn flush(&self, inodes: &WasiInodes, fd: WasiFd) -> Result<(), Errno> {
1400 match fd {
1401 __WASI_STDIN_FILENO => (),
1402 __WASI_STDOUT_FILENO => inodes
1403 .stdout_mut(&self.fd_map)
1404 .map_err(fs_error_into_wasi_err)?
1405 .as_mut()
1406 .map(|f| f.flush().map_err(map_io_err))
1407 .unwrap_or_else(|| Err(Errno::Io))?,
1408 __WASI_STDERR_FILENO => inodes
1409 .stderr_mut(&self.fd_map)
1410 .map_err(fs_error_into_wasi_err)?
1411 .as_mut()
1412 .and_then(|f| f.flush().ok())
1413 .ok_or(Errno::Io)?,
1414 _ => {
1415 let fd = self.get_fd(fd)?;
1416 if !fd.rights.contains(Rights::FD_DATASYNC) {
1417 return Err(Errno::Access);
1418 }
1419
1420 let mut guard = inodes.arena[fd.inode].write();
1421 let deref_mut = guard.deref_mut();
1422 match deref_mut {
1423 Kind::File {
1424 handle: Some(file), ..
1425 } => file.flush().map_err(|_| Errno::Io)?,
1426 Kind::Dir { .. } => return Err(Errno::Isdir),
1428 Kind::Symlink { .. } => unimplemented!("WasiFs::flush Kind::Symlink"),
1429 Kind::Buffer { .. } => (),
1430 _ => return Err(Errno::Io),
1431 }
1432 }
1433 }
1434 Ok(())
1435 }
1436
1437 pub(crate) fn create_inode(
1439 &self,
1440 inodes: &mut WasiInodes,
1441 kind: Kind,
1442 is_preopened: bool,
1443 name: String,
1444 ) -> Result<Inode, Errno> {
1445 let stat = self.get_stat_for_kind(inodes, &kind)?;
1446 Ok(self.create_inode_with_stat(inodes, kind, is_preopened, name, stat))
1447 }
1448
1449 pub(crate) fn create_inode_with_default_stat(
1451 &self,
1452 inodes: &mut WasiInodes,
1453 kind: Kind,
1454 is_preopened: bool,
1455 name: String,
1456 ) -> Inode {
1457 let stat = Filestat::default();
1458 self.create_inode_with_stat(inodes, kind, is_preopened, name, stat)
1459 }
1460
1461 pub(crate) fn create_inode_with_stat(
1463 &self,
1464 inodes: &mut WasiInodes,
1465 kind: Kind,
1466 is_preopened: bool,
1467 name: String,
1468 mut stat: Filestat,
1469 ) -> Inode {
1470 stat.st_ino = self.get_next_inode_index();
1471
1472 inodes.arena.insert(InodeVal {
1473 stat: RwLock::new(stat),
1474 is_preopened,
1475 name,
1476 kind: RwLock::new(kind),
1477 })
1478 }
1479
1480 pub fn create_fd(
1481 &self,
1482 rights: Rights,
1483 rights_inheriting: Rights,
1484 flags: Fdflags,
1485 open_flags: u16,
1486 inode: Inode,
1487 ) -> Result<WasiFd, Errno> {
1488 let idx = self.next_fd.fetch_add(1, Ordering::AcqRel);
1489 self.fd_map.write().unwrap().insert(
1490 idx,
1491 Fd {
1492 rights,
1493 rights_inheriting,
1494 flags,
1495 offset: 0,
1496 open_flags,
1497 inode,
1498 },
1499 );
1500 Ok(idx)
1501 }
1502
1503 pub fn clone_fd(&self, fd: WasiFd) -> Result<WasiFd, Errno> {
1504 let fd = self.get_fd(fd)?;
1505 let idx = self.next_fd.fetch_add(1, Ordering::AcqRel);
1506 self.fd_map.write().unwrap().insert(
1507 idx,
1508 Fd {
1509 rights: fd.rights,
1510 rights_inheriting: fd.rights_inheriting,
1511 flags: fd.flags,
1512 offset: fd.offset,
1513 open_flags: fd.open_flags,
1514 inode: fd.inode,
1515 },
1516 );
1517 Ok(idx)
1518 }
1519
1520 pub unsafe fn remove_inode(&self, inodes: &mut WasiInodes, inode: Inode) -> Option<InodeVal> {
1529 inodes.arena.remove(inode)
1530 }
1531
1532 fn create_virtual_root(&self, inodes: &mut WasiInodes) -> Inode {
1533 let stat = Filestat {
1534 st_filetype: Filetype::Directory,
1535 st_ino: self.get_next_inode_index(),
1536 ..Filestat::default()
1537 };
1538 let root_kind = Kind::Root {
1539 entries: HashMap::new(),
1540 };
1541
1542 inodes.arena.insert(InodeVal {
1543 stat: RwLock::new(stat),
1544 is_preopened: true,
1545 name: "/".to_string(),
1546 kind: RwLock::new(root_kind),
1547 })
1548 }
1549
1550 fn create_stdout(&self, inodes: &mut WasiInodes) {
1551 self.create_std_dev_inner(
1552 inodes,
1553 Box::new(Stdout::default()),
1554 "stdout",
1555 __WASI_STDOUT_FILENO,
1556 STDOUT_DEFAULT_RIGHTS,
1557 Fdflags::APPEND,
1558 );
1559 }
1560 fn create_stdin(&self, inodes: &mut WasiInodes) {
1561 self.create_std_dev_inner(
1562 inodes,
1563 Box::new(Stdin::default()),
1564 "stdin",
1565 __WASI_STDIN_FILENO,
1566 STDIN_DEFAULT_RIGHTS,
1567 Fdflags::empty(),
1568 );
1569 }
1570 fn create_stderr(&self, inodes: &mut WasiInodes) {
1571 self.create_std_dev_inner(
1572 inodes,
1573 Box::new(Stderr::default()),
1574 "stderr",
1575 __WASI_STDERR_FILENO,
1576 STDERR_DEFAULT_RIGHTS,
1577 Fdflags::APPEND,
1578 );
1579 }
1580
1581 fn create_std_dev_inner(
1582 &self,
1583 inodes: &mut WasiInodes,
1584 handle: Box<dyn VirtualFile + Send + Sync + 'static>,
1585 name: &'static str,
1586 raw_fd: WasiFd,
1587 rights: Rights,
1588 fd_flags: Fdflags,
1589 ) {
1590 let stat = Filestat {
1591 st_filetype: Filetype::CharacterDevice,
1592 st_ino: self.get_next_inode_index(),
1593 ..Filestat::default()
1594 };
1595 let kind = Kind::File {
1596 fd: Some(raw_fd),
1597 handle: Some(handle),
1598 path: "".into(),
1599 };
1600 let inode = {
1601 inodes.arena.insert(InodeVal {
1602 stat: RwLock::new(stat),
1603 is_preopened: true,
1604 name: name.to_string(),
1605 kind: RwLock::new(kind),
1606 })
1607 };
1608 self.fd_map.write().unwrap().insert(
1609 raw_fd,
1610 Fd {
1611 rights,
1612 rights_inheriting: Rights::empty(),
1613 flags: fd_flags,
1614 open_flags: 0,
1616 offset: 0,
1617 inode,
1618 },
1619 );
1620 }
1621
1622 pub fn get_stat_for_kind(&self, inodes: &WasiInodes, kind: &Kind) -> Result<Filestat, Errno> {
1623 let md = match kind {
1624 Kind::File { handle, path, .. } => match handle {
1625 Some(wf) => {
1626 return Ok(Filestat {
1627 st_filetype: Filetype::RegularFile,
1628 st_size: wf.size(),
1629 st_atim: wf.last_accessed(),
1630 st_mtim: wf.last_modified(),
1631 st_ctim: wf.created_time(),
1632
1633 ..Filestat::default()
1634 })
1635 }
1636 None => self
1637 .fs_backing
1638 .metadata(path)
1639 .map_err(fs_error_into_wasi_err)?,
1640 },
1641 Kind::Dir { path, .. } => self
1642 .fs_backing
1643 .metadata(path)
1644 .map_err(fs_error_into_wasi_err)?,
1645 Kind::Symlink {
1646 base_po_dir,
1647 path_to_symlink,
1648 ..
1649 } => {
1650 let base_po_inode = &self.fd_map.read().unwrap()[base_po_dir].inode;
1651 let base_po_inode_v = &inodes.arena[*base_po_inode];
1652 let guard = base_po_inode_v.read();
1653 let deref = guard.deref();
1654 match deref {
1655 Kind::Root { .. } => {
1656 self.fs_backing.symlink_metadata(path_to_symlink).map_err(fs_error_into_wasi_err)?
1657 }
1658 Kind::Dir { path, .. } => {
1659 let mut real_path = path.clone();
1660 real_path.push(path_to_symlink);
1667 self.fs_backing.symlink_metadata(&real_path).map_err(fs_error_into_wasi_err)?
1668 }
1669 _ => unreachable!("Symlink pointing to something that's not a directory as its base preopened directory"),
1671 }
1672 }
1673 _ => return Err(Errno::Io),
1674 };
1675 Ok(Filestat {
1676 st_filetype: virtual_file_type_to_wasi_file_type(md.file_type()),
1677 st_size: md.len(),
1678 st_atim: md.accessed(),
1679 st_mtim: md.modified(),
1680 st_ctim: md.created(),
1681 ..Filestat::default()
1682 })
1683 }
1684
1685 pub(crate) fn close_fd(&self, inodes: &WasiInodes, fd: WasiFd) -> Result<(), Errno> {
1687 let inode = self.get_fd_inode(fd)?;
1688 let inodeval = inodes.get_inodeval(inode)?;
1689 let is_preopened = inodeval.is_preopened;
1690
1691 let mut guard = inodeval.write();
1692 let deref_mut = guard.deref_mut();
1693 match deref_mut {
1694 Kind::File { ref mut handle, .. } => {
1695 let mut empty_handle = None;
1696 std::mem::swap(handle, &mut empty_handle);
1697 }
1698 Kind::Socket { ref mut socket, .. } => {
1699 let mut closed_socket = InodeSocket::new(InodeSocketKind::Closed);
1700 std::mem::swap(socket, &mut closed_socket);
1701 }
1702 Kind::Pipe { ref mut pipe } => {
1703 pipe.close();
1704 }
1705 Kind::Dir { parent, path, .. } => {
1706 debug!("Closing dir {:?}", &path);
1707 let key = path
1708 .file_name()
1709 .ok_or(Errno::Inval)?
1710 .to_string_lossy()
1711 .to_string();
1712 if let Some(p) = *parent {
1713 drop(guard);
1714 let mut guard = inodes.arena[p].write();
1715 let deref_mut = guard.deref_mut();
1716 match deref_mut {
1717 Kind::Dir { entries, .. } | Kind::Root { entries } => {
1718 self.fd_map.write().unwrap().remove(&fd).unwrap();
1719 if is_preopened {
1720 let mut idx = None;
1721 {
1722 let preopen_fds = self.preopen_fds.read().unwrap();
1723 let preopen_fds_iter = preopen_fds.iter().enumerate();
1724 for (i, po_fd) in preopen_fds_iter {
1725 if *po_fd == fd {
1726 idx = Some(i);
1727 break;
1728 }
1729 }
1730 }
1731 if let Some(i) = idx {
1732 entries.remove(&key);
1735 self.preopen_fds.write().unwrap().remove(i);
1736 }
1738 }
1739 }
1740 _ => unreachable!(
1741 "Fatal internal logic error, directory's parent is not a directory"
1742 ),
1743 }
1744 } else {
1745 debug!("HIT UNREACHABLE CODE! Non-root directory does not have a parent");
1747 return Err(Errno::Inval);
1748 }
1749 }
1750 Kind::EventNotifications { .. } => {}
1751 Kind::Root { .. } => return Err(Errno::Access),
1752 Kind::Symlink { .. } | Kind::Buffer { .. } => return Err(Errno::Inval),
1753 }
1754
1755 Ok(())
1756 }
1757}
1758
1759impl WasiState {
1761 pub(crate) fn fs_read_dir<P: AsRef<Path>>(
1762 &self,
1763 path: P,
1764 ) -> Result<wasmer_vfs::ReadDir, Errno> {
1765 self.fs
1766 .fs_backing
1767 .read_dir(path.as_ref())
1768 .map_err(fs_error_into_wasi_err)
1769 }
1770
1771 pub(crate) fn fs_create_dir<P: AsRef<Path>>(&self, path: P) -> Result<(), Errno> {
1772 self.fs
1773 .fs_backing
1774 .create_dir(path.as_ref())
1775 .map_err(fs_error_into_wasi_err)
1776 }
1777
1778 pub(crate) fn fs_remove_dir<P: AsRef<Path>>(&self, path: P) -> Result<(), Errno> {
1779 self.fs
1780 .fs_backing
1781 .remove_dir(path.as_ref())
1782 .map_err(fs_error_into_wasi_err)
1783 }
1784
1785 pub(crate) fn fs_rename<P: AsRef<Path>, Q: AsRef<Path>>(
1786 &self,
1787 from: P,
1788 to: Q,
1789 ) -> Result<(), Errno> {
1790 self.fs
1791 .fs_backing
1792 .rename(from.as_ref(), to.as_ref())
1793 .map_err(fs_error_into_wasi_err)
1794 }
1795
1796 pub(crate) fn fs_remove_file<P: AsRef<Path>>(&self, path: P) -> Result<(), Errno> {
1797 self.fs
1798 .fs_backing
1799 .remove_file(path.as_ref())
1800 .map_err(fs_error_into_wasi_err)
1801 }
1802
1803 pub(crate) fn fs_new_open_options(&self) -> OpenOptions {
1804 self.fs.fs_backing.new_open_options()
1805 }
1806}
1807
1808#[derive(Debug, Default)]
1813#[cfg_attr(feature = "enable-serde", derive(Serialize, Deserialize))]
1814pub(crate) struct WasiStateThreading {
1815 #[cfg_attr(feature = "enable-serde", serde(skip))]
1816 pub threads: HashMap<WasiThreadId, WasiThread>,
1817 pub thread_seed: u32,
1818 #[cfg_attr(feature = "enable-serde", serde(skip))]
1819 pub processes: HashMap<WasiBusProcessId, BusSpawnedProcess>,
1820 #[cfg_attr(feature = "enable-serde", serde(skip))]
1821 pub process_reuse: HashMap<Cow<'static, str>, WasiBusProcessId>,
1822 pub process_seed: u32,
1823}
1824
1825#[derive(Debug)]
1854#[cfg_attr(feature = "enable-serde", derive(Serialize, Deserialize))]
1855pub struct WasiState {
1856 pub fs: WasiFs,
1857 pub inodes: Arc<RwLock<WasiInodes>>,
1858 pub(crate) threading: Mutex<WasiStateThreading>,
1859 pub args: Vec<Vec<u8>>,
1860 pub envs: Vec<Vec<u8>>,
1861}
1862
1863impl WasiState {
1864 #[allow(clippy::new_ret_no_self)]
1867 pub fn new(program_name: impl AsRef<str>) -> WasiStateBuilder {
1868 create_wasi_state(program_name.as_ref())
1869 }
1870
1871 #[cfg(feature = "enable-serde")]
1873 pub fn freeze(&self) -> Option<Vec<u8>> {
1874 bincode::serialize(self).ok()
1875 }
1876
1877 #[cfg(feature = "enable-serde")]
1879 pub fn unfreeze(bytes: &[u8]) -> Option<Self> {
1880 bincode::deserialize(bytes).ok()
1881 }
1882
1883 pub fn stdout(&self) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
1885 self.std_dev_get(__WASI_STDOUT_FILENO)
1886 }
1887
1888 #[deprecated(
1889 since = "3.0.0",
1890 note = "stdout_mut() is no longer needed - just use stdout() instead"
1891 )]
1892 pub fn stdout_mut(
1893 &self,
1894 ) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
1895 self.stdout()
1896 }
1897
1898 pub fn stderr(&self) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
1900 self.std_dev_get(__WASI_STDERR_FILENO)
1901 }
1902
1903 #[deprecated(
1904 since = "3.0.0",
1905 note = "stderr_mut() is no longer needed - just use stderr() instead"
1906 )]
1907 pub fn stderr_mut(
1908 &self,
1909 ) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
1910 self.stderr()
1911 }
1912
1913 pub fn stdin(&self) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
1915 self.std_dev_get(__WASI_STDIN_FILENO)
1916 }
1917
1918 #[deprecated(
1919 since = "3.0.0",
1920 note = "stdin_mut() is no longer needed - just use stdin() instead"
1921 )]
1922 pub fn stdin_mut(
1923 &self,
1924 ) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
1925 self.stdin()
1926 }
1927
1928 fn std_dev_get(
1931 &self,
1932 fd: WasiFd,
1933 ) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
1934 let ret = WasiStateFileGuard::new(self, fd)?.map(|a| {
1935 let ret = Box::new(a);
1936 let ret: Box<dyn VirtualFile + Send + Sync + 'static> = ret;
1937 ret
1938 });
1939 Ok(ret)
1940 }
1941}
1942
1943pub fn virtual_file_type_to_wasi_file_type(file_type: wasmer_vfs::FileType) -> Filetype {
1944 if file_type.is_dir() {
1946 Filetype::Directory
1947 } else if file_type.is_file() {
1948 Filetype::RegularFile
1949 } else if file_type.is_symlink() {
1950 Filetype::SymbolicLink
1951 } else {
1952 Filetype::Unknown
1953 }
1954}