Merge pull request #784 from marmistrz/path_open_doc
Document the behavior of some rights-related functions.
This commit is contained in:
@@ -610,10 +610,8 @@ pub(crate) unsafe fn path_open(
|
|||||||
let fd = hostcalls_impl::path_open(resolved, read, write, oflags, fs_flags)?;
|
let fd = hostcalls_impl::path_open(resolved, read, write, oflags, fs_flags)?;
|
||||||
|
|
||||||
let mut fe = FdEntry::from(fd)?;
|
let mut fe = FdEntry::from(fd)?;
|
||||||
// We need to manually deny the rights which are not explicitly requested.
|
// We need to manually deny the rights which are not explicitly requested
|
||||||
// This should not be needed, but currently determine_type_and_access_rights,
|
// because FdEntry::from will assign maximal consistent rights.
|
||||||
// which is used by FdEntry::from, may grant extra rights while inferring it
|
|
||||||
// from the open mode.
|
|
||||||
fe.rights_base &= fs_rights_base;
|
fe.rights_base &= fs_rights_base;
|
||||||
fe.rights_inheriting &= fs_rights_inheriting;
|
fe.rights_inheriting &= fs_rights_inheriting;
|
||||||
let guest_fd = wasi_ctx.insert_fd_entry(fe)?;
|
let guest_fd = wasi_ctx.insert_fd_entry(fe)?;
|
||||||
|
|||||||
@@ -61,6 +61,9 @@ pub(crate) struct FdEntry {
|
|||||||
}
|
}
|
||||||
|
|
||||||
impl FdEntry {
|
impl FdEntry {
|
||||||
|
/// Create an FdEntry with *maximal* possible rights from a given `File`.
|
||||||
|
/// If this is not desired, the rights of the resulting `FdEntry` should
|
||||||
|
/// be manually restricted.
|
||||||
pub(crate) fn from(file: fs::File) -> Result<Self> {
|
pub(crate) fn from(file: fs::File) -> Result<Self> {
|
||||||
unsafe { determine_type_and_access_rights(&file) }.map(
|
unsafe { determine_type_and_access_rights(&file) }.map(
|
||||||
|(file_type, rights_base, rights_inheriting)| Self {
|
|(file_type, rights_base, rights_inheriting)| Self {
|
||||||
|
|||||||
@@ -26,6 +26,9 @@ pub(crate) fn descriptor_as_oshandle<'lifetime>(
|
|||||||
})))
|
})))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Returns the set of all possible rights that are both relevant for the file
|
||||||
|
/// type and consistent with the open mode.
|
||||||
|
///
|
||||||
/// This function is unsafe because it operates on a raw file descriptor.
|
/// This function is unsafe because it operates on a raw file descriptor.
|
||||||
pub(crate) unsafe fn determine_type_and_access_rights<Fd: AsRawFd>(
|
pub(crate) unsafe fn determine_type_and_access_rights<Fd: AsRawFd>(
|
||||||
fd: &Fd,
|
fd: &Fd,
|
||||||
@@ -48,6 +51,8 @@ pub(crate) unsafe fn determine_type_and_access_rights<Fd: AsRawFd>(
|
|||||||
Ok((file_type, rights_base, rights_inheriting))
|
Ok((file_type, rights_base, rights_inheriting))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Returns the set of all possible rights that are relevant for file type.
|
||||||
|
///
|
||||||
/// This function is unsafe because it operates on a raw file descriptor.
|
/// This function is unsafe because it operates on a raw file descriptor.
|
||||||
pub(crate) unsafe fn determine_type_rights<Fd: AsRawFd>(
|
pub(crate) unsafe fn determine_type_rights<Fd: AsRawFd>(
|
||||||
fd: &Fd,
|
fd: &Fd,
|
||||||
|
|||||||
@@ -54,7 +54,10 @@ pub(crate) fn descriptor_as_oshandle<'lifetime>(
|
|||||||
})))
|
})))
|
||||||
}
|
}
|
||||||
|
|
||||||
/// This function is unsafe because it operates on a raw file handle.
|
/// Returns the set of all possible rights that are both relevant for the file
|
||||||
|
/// type and consistent with the open mode.
|
||||||
|
///
|
||||||
|
/// This function is unsafe because it operates on a raw file descriptor.
|
||||||
pub(crate) unsafe fn determine_type_and_access_rights<Handle: AsRawHandle>(
|
pub(crate) unsafe fn determine_type_and_access_rights<Handle: AsRawHandle>(
|
||||||
handle: &Handle,
|
handle: &Handle,
|
||||||
) -> Result<(
|
) -> Result<(
|
||||||
@@ -85,7 +88,9 @@ pub(crate) unsafe fn determine_type_and_access_rights<Handle: AsRawHandle>(
|
|||||||
Ok((file_type, rights_base, rights_inheriting))
|
Ok((file_type, rights_base, rights_inheriting))
|
||||||
}
|
}
|
||||||
|
|
||||||
/// This function is unsafe because it operates on a raw file handle.
|
/// Returns the set of all possible rights that are relevant for file type.
|
||||||
|
///
|
||||||
|
/// This function is unsafe because it operates on a raw file descriptor.
|
||||||
pub(crate) unsafe fn determine_type_rights<Handle: AsRawHandle>(
|
pub(crate) unsafe fn determine_type_rights<Handle: AsRawHandle>(
|
||||||
handle: &Handle,
|
handle: &Handle,
|
||||||
) -> Result<(
|
) -> Result<(
|
||||||
|
|||||||
Reference in New Issue
Block a user