Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
50 changes: 46 additions & 4 deletions src/safeposix/syscalls/fs_calls.rs
Original file line number Diff line number Diff line change
Expand Up @@ -935,8 +935,8 @@ impl Cage {
/// O_WRONLY flags.
/// There are generally two cases which occur when this syscall happens:
/// Case 1: If the file to be opened doesn't exist, then due to O_CREAT flag,
/// a new file is created at the given location and a new file descriptor is
/// created and returned.
/// a new file is created at the given location and a new file descriptor is
/// created and returned.
/// Case 2: If the file already exists, then due to O_TRUNC flag, the file
/// size gets reduced to 0, and the existing file descriptor is returned.
///
Expand Down Expand Up @@ -3611,16 +3611,56 @@ impl Cage {
}

//------------------GETDENTS SYSCALL------------------
/// ## `getdents_syscall`
///
/// ### Description
/// This function reads directory entries from a directory file descriptor
/// and returns them in a buffer. Reading directory entries using multiple read calls can be less efficient because it
/// involves reading the data in smaller chunks and then parsing it.
/// getdents can often be faster by reading directory entries in a more optimized way.
/// * The function first checks if the provided buffer size is sufficient to store at least one
/// `ClippedDirent` structure.
/// * The function validates the provided file descriptor to ensure it represents a
/// valid file.
/// * The function checks if the file descriptor refers to a directory.
/// * The function iterates over the directory entries in the
/// `filename_to_inode_dict` of the directory inode.
/// * For each entry, the function constructs a `ClippedDirent` structure, which
/// contains the inode number, offset, and record length.
/// * It packs the constructed directory entries into the provided buffer (`dirp`).
/// * Updates the file position to the next directory entry to be read.
///
/// ### Function Arguments
/// * `fd`: A file descriptor representing the directory to read.
/// * `dirp`: A pointer to a buffer where the directory entries will be written.
/// * `bufsize`: The size of the buffer in bytes.
///
/// ### Returns
/// * The number of bytes written to the buffer on success.
///
/// ### Errors
/// * `EINVAL(22)`: If the buffer size is too small or if the file descriptor is invalid.
/// * `ENOTDIR(20)`: If the file descriptor does not refer to a existing directory.
/// * `ESPIPE(29)`: If the file descriptor does not refer to a file.
/// * `EBADF(9)` : If the file descriptor is invalid.
/// ### Panics
/// * There are no panics in this syscall.

pub fn getdents_syscall(&self, fd: i32, dirp: *mut u8, bufsize: u32) -> i32 {
let mut vec: Vec<(interface::ClippedDirent, Vec<u8>)> = Vec::new();

// make sure bufsize is at least greater than size of a ClippedDirent struct
// ClippedDirent is a simplified version of the traditional dirent structure used in POSIX systems
// By using a simpler structure, SafePosix can store and retrieve directory entries more efficiently,
// potentially improving performance compared to using the full dirent structure.
if bufsize <= interface::CLIPPED_DIRENT_SIZE {
return syscall_error(Errno::EINVAL, "getdents", "Result buffer is too small.");
}

let checkedfd = self.get_filedescriptor(fd).unwrap();
let checkedfd = match self.get_filedescriptor(fd) {
Ok(fd) => fd,
Err(_) => return syscall_error(Errno::EBADF, "getdents", "Invalid file descriptor."),
};
Comment thread
rupeshkoushik07 marked this conversation as resolved.
let mut unlocked_fd = checkedfd.write();
if let Some(filedesc_enum) = &mut *unlocked_fd {
match filedesc_enum {
Expand Down Expand Up @@ -3650,7 +3690,7 @@ impl Cage {
// convert filename to a filename vector of u8
let mut vec_filename: Vec<u8> = filename.as_bytes().to_vec();
vec_filename.push(b'\0'); // make filename null-terminated

// Push DT_UNKNOWN as d_type. This is a placeholder for now, as the actual file type is not yet determined.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

some weird whitespace here, have you done a cargo fmt?

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes even with cargo fmt the whitespace is there

vec_filename.push(DT_UNKNOWN); // push DT_UNKNOWN as d_type (for now)
temp_len =
interface::CLIPPED_DIRENT_SIZE + vec_filename.len() as u32; // get length of current filename vector for padding calculation
Expand Down Expand Up @@ -3686,6 +3726,8 @@ impl Cage {
count += 1;
}
// update file position
// keeps track of the current position within the directory. It indicates which directory entry the
// function should read next.
normalfile_filedesc_obj.position = interface::rust_min(
position + count,
dir_inode_obj.filename_to_inode_dict.len(),
Expand Down
129 changes: 129 additions & 0 deletions src/tests/fs_tests.rs
Original file line number Diff line number Diff line change
Expand Up @@ -1408,6 +1408,135 @@ pub mod fs_tests {
assert_eq!(cage.exit_syscall(EXIT_SUCCESS), EXIT_SUCCESS);
lindrustfinalize();
}
#[test]
fn ut_lind_fs_getdents_invalid_fd() {
let _thelock = setup::lock_and_init();
let cage = interface::cagetable_getref(1);

let bufsize = 50;
let mut vec = vec![0u8; bufsize as usize];
let baseptr: *mut u8 = &mut vec[0];

// Create a directory
assert_eq!(cage.mkdir_syscall("/getdents", S_IRWXA), 0);

// Open the directory
let fd = cage.open_syscall("/getdents", O_RDWR, S_IRWXA);

// Attempt to call `getdents_syscall` with an invalid file descriptor
Comment thread
rupeshkoushik07 marked this conversation as resolved.
let result = cage.getdents_syscall(-1, baseptr, bufsize as u32);

// Assert that the return value is EBADF (errno for "Bad file descriptor")
assert_eq!(result, -(Errno::EBADF as i32));

// Close the directory
assert_eq!(cage.close_syscall(fd), 0);

assert_eq!(cage.exit_syscall(EXIT_SUCCESS), EXIT_SUCCESS);
lindrustfinalize();
}

#[test]
fn ut_lind_fs_getdents_out_of_range_fd() {
// Acquire a lock on TESTMUTEX to prevent other tests from running concurrently,
// and also perform clean environment setup.
let _thelock = setup::lock_and_init();

let cage = interface::cagetable_getref(1);

// Allocate a buffer to store directory entries
let bufsize = 1024;
let mut vec = vec![0u8; bufsize as usize];
let baseptr: *mut u8 = &mut vec[0];

// Attempt to call getdents_syscall with a file descriptor out of range
let result = cage.getdents_syscall(MAXFD + 1, baseptr, bufsize as u32);

// Verify that it returns EBADF (errno for "Bad file descriptor")
assert_eq!(result, -(Errno::EBADF as i32));

assert_eq!(cage.exit_syscall(EXIT_SUCCESS), EXIT_SUCCESS);
lindrustfinalize();
}

#[test]
fn ut_lind_fs_getdents_non_existing_fd() {
// Acquire a lock on TESTMUTEX to prevent other tests from running concurrently,
// and also perform clean environment setup.
let _thelock = setup::lock_and_init();

let cage = interface::cagetable_getref(1);

// Allocate a buffer to store directory entries
let bufsize = 1024;
let mut vec = vec![0u8; bufsize as usize];
let baseptr: *mut u8 = &mut vec[0];

// Attempt to call getdents_syscall with a non-existing file descriptor
let result = cage.getdents_syscall(100, baseptr, bufsize as u32);

// Verify that it returns EBADF (errno for "Bad file descriptor")
assert_eq!(result, -(Errno::EBADF as i32));

assert_eq!(cage.exit_syscall(EXIT_SUCCESS), EXIT_SUCCESS);
lindrustfinalize();
}

#[test]
fn ut_lind_fs_getdents_bufsize_too_small() {
let _thelock = setup::lock_and_init();
let cage = interface::cagetable_getref(1);

let bufsize = interface::CLIPPED_DIRENT_SIZE - 1; // Buffer size smaller than CLIPPED_DIRENT_SIZE
let mut vec = vec![0u8; bufsize as usize];
let baseptr: *mut u8 = &mut vec[0];

// Create a directory
assert_eq!(cage.mkdir_syscall("/getdents", S_IRWXA), 0);

// Open the directory
let fd = cage.open_syscall("/getdents", O_RDWR, S_IRWXA);

// Attempt to call `getdents_syscall` with a buffer size smaller than CLIPPED_DIRENT_SIZE
let result = cage.getdents_syscall(fd, baseptr, bufsize as u32);

// Assert that the return value is EINVAL (errno for "Invalid argument")
assert_eq!(result, -(Errno::EINVAL as i32));

// Close the directory
assert_eq!(cage.close_syscall(fd), 0);

assert_eq!(cage.exit_syscall(EXIT_SUCCESS), EXIT_SUCCESS);
lindrustfinalize();
}

#[test]
fn ut_lind_fs_getdents_non_directory_fd() {
// Acquire a lock on TESTMUTEX to prevent other tests from running concurrently,
// and also perform clean environment setup.
let _thelock = setup::lock_and_init();

let cage = interface::cagetable_getref(1);

// Create a regular file
let filepath = "/regularfile";
let fd = cage.open_syscall(filepath, O_CREAT | O_WRONLY, S_IRWXA);
assert!(fd >= 0);
// Allocate a buffer to store directory entries
let bufsize = 1024;
let mut vec = vec![0u8; bufsize as usize];
let baseptr: *mut u8 = &mut vec[0];

// Attempt to call getdents_syscall on the regular file descriptor
let result = cage.getdents_syscall(fd, baseptr, bufsize as u32);
// Verify that it returns ENOTDIR
assert_eq!(result, -(Errno::ENOTDIR as i32));

// Clean up: Close the file descriptor and finalize the test environment
assert_eq!(cage.close_syscall(fd), 0);
assert_eq!(cage.exit_syscall(EXIT_SUCCESS), EXIT_SUCCESS);
lindrustfinalize();
}

#[test]
pub fn ut_lind_fs_dir_chdir_getcwd() {
Expand Down