feat(cpio): introduce `pio`, a library to write CPIO in `alloc` contexts

This library is in its own directory to maintain as a separate project.
This commit is contained in:
Raito Bezarius 2023-04-30 16:52:28 +02:00
parent f2bc0af580
commit 5a88b8987f
9 changed files with 615 additions and 0 deletions

55
rust/uefi/Cargo.lock generated
View File

@ -29,6 +29,12 @@ version = "1.0.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "baf1de4339761588bc0619e3cbc0120ee582ebb74b53b4efbf79117bd2da40fd"
[[package]]
name = "cpio"
version = "0.2.2"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "27e77cfc4543efb4837662cb7cd53464ae66f0fd5c708d71e0f338b1c11d62d3"
[[package]]
name = "cpufeatures"
version = "0.2.12"
@ -58,6 +64,18 @@ dependencies = [
"crypto-common",
]
[[package]]
name = "doc-comment"
version = "0.3.3"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "fea41bba32d969b513997752735605054bc0dfa92b4c56bf1189f2e174be7a10"
[[package]]
name = "embedded-io"
version = "0.6.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "edd0f118536f44f5ccd48bcb8b111bdc3de888b58c74639dfb034a357d0f206d"
[[package]]
name = "generic-array"
version = "0.14.7"
@ -79,6 +97,12 @@ dependencies = [
"scroll",
]
[[package]]
name = "heck"
version = "0.4.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "95505c38b4572b2d910cecb0281560f54b440a19336cbbcb27bf6ce6adc6f5a8"
[[package]]
name = "lanzaboote_stub"
version = "0.3.0"
@ -112,6 +136,15 @@ version = "0.4.20"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "b5e6163cb8c49088c2c36f57875e58ccd8c87c7427f7fbd50ea6710b2f3f2e8f"
[[package]]
name = "pio"
version = "0.1.0"
dependencies = [
"cpio",
"embedded-io",
"snafu",
]
[[package]]
name = "plain"
version = "0.2.3"
@ -187,6 +220,28 @@ dependencies = [
"digest",
]
[[package]]
name = "snafu"
version = "0.7.5"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "e4de37ad025c587a29e8f3f5605c00f70b98715ef90b9061a815b9e59e9042d6"
dependencies = [
"doc-comment",
"snafu-derive",
]
[[package]]
name = "snafu-derive"
version = "0.7.5"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "990079665f075b699031e9c08fd3ab99be5029b96f3b78dc0709e8f77e4efebf"
dependencies = [
"heck",
"proc-macro2",
"quote",
"syn 1.0.109",
]
[[package]]
name = "syn"
version = "1.0.109"

View File

@ -2,6 +2,7 @@
members = [
"stub",
"pio",
"linux-bootloader",
]

13
rust/uefi/pio/Cargo.toml Normal file
View File

@ -0,0 +1,13 @@
[package]
name = "pio"
version = "0.1.0"
edition = "2021"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies]
embedded-io = { version = "0.6.1", features = [ "alloc" ] }
snafu = { version = "0.7.5", default-features = false }
[dev-dependencies]
cpio = "0.2.2"

View File

@ -0,0 +1,37 @@
use core::convert::Infallible;
use alloc::vec::Vec;
use embedded_io::{ErrorType, Write};
pub struct Cursor {
buffer: Vec<u8>,
}
impl Cursor {
pub fn new(buffer: Vec<u8>) -> Self {
Self { buffer }
}
pub fn into_inner(self) -> Vec<u8> {
self.buffer
}
pub fn get_mut(&mut self) -> &mut Vec<u8> {
&mut self.buffer
}
}
impl ErrorType for Cursor {
type Error = Infallible;
}
impl Write for Cursor {
fn write(&mut self, buf: &[u8]) -> Result<usize, Self::Error> {
self.buffer.extend_from_slice(buf);
Ok(buf.len())
}
fn flush(&mut self) -> Result<(), Self::Error> {
Ok(())
}
}

View File

@ -0,0 +1,19 @@
use snafu::prelude::Snafu;
#[derive(Debug, Snafu)]
pub enum CPIOError<IOError: embedded_io::Error + core::fmt::Debug> {
#[snafu(display("File size does not fit in 32 bits ({got})"))]
TooLargeFileSize { got: usize },
#[snafu(display("This CPIO archive is exceeding the maximum amount of inodes (2^32 - 1)"))]
MaximumInodesReached,
#[snafu(display(
"This CPIO archive is too large to fit inside of a 64 bits integer in terms of buffer size"
))]
MaximumArchiveReached,
#[snafu(display(
"Provided buffer size is too small, expected: {expected} bytes, got: {got} bytes"
))]
InsufficientBufferSize { expected: usize, got: usize },
#[snafu(display("An IO error was encountered: {src:?}"))]
IOError { src: IOError },
}

7
rust/uefi/pio/src/lib.rs Normal file
View File

@ -0,0 +1,7 @@
#![no_std]
extern crate alloc;
pub mod cursor;
pub mod errors;
pub mod writer;
// pub mod packer;

View File

@ -0,0 +1,44 @@
use alloc::vec::Vec;
use uefi::{CStr16, CString16};
use super::writer::Cpio;
pub fn pack_cpio(
fs: &mut uefi::fs::FileSystem,
mut files: Vec<CString16>,
target_dir_prefix: &str,
dir_mode: u32,
access_mode: u32) -> uefi::fs::FileSystemResult<Cpio> {
// Ensure uniform and stability to make TPM measurements independent of the read order.
files.sort();
let mut cpio = Cpio::new();
cpio.pack_prefix(target_dir_prefix, dir_mode).expect("Failed to pack the prefix.");
for filename in files {
let contents = fs.read(filename.as_ref())?;
cpio.pack_one(filename.as_ref(), &contents, target_dir_prefix, access_mode).expect("Failed to pack an element.");
}
cpio.pack_trailer().expect("Failed to pack the trailer.");
Ok(cpio)
}
pub fn pack_cpio_literal(
data: &Vec<u8>,
target_dir_prefix: &str,
target_filename: &CStr16,
dir_mode: u32,
access_mode: u32) -> uefi::Result<Cpio> {
let mut cpio = Cpio::new();
cpio.pack_prefix(target_dir_prefix, dir_mode)?;
cpio.pack_one(
target_filename,
data,
target_dir_prefix,
access_mode)?;
cpio.pack_trailer()?;
Ok(cpio)
}

346
rust/uefi/pio/src/writer.rs Normal file
View File

@ -0,0 +1,346 @@
use core::marker::PhantomData;
use alloc::{
format,
string::{String, ToString},
vec,
vec::Vec,
};
use embedded_io::Write;
use crate::{cursor::Cursor, errors::CPIOError};
const MAGIC_NUMBER: &[u8; 6] = b"070701";
const TRAILER_NAME: &str = "TRAILER!!!";
pub type Result<V, IOError> = core::result::Result<V, CPIOError<IOError>>;
struct Entry {
name: String,
ino: u32,
mode: u32,
uid: u32,
gid: u32,
nlink: u32,
mtime: u32,
file_size: u32,
dev_major: u32,
dev_minor: u32,
rdev_major: u32,
rdev_minor: u32,
}
const STATIC_HEADER_LEN: usize = 6 // c_magic[6]
+ (8 * 13); // c_ino, c_mode, c_uid, c_gid, c_nlink, c_mtime, c_filesize, c_devmajor,
// c_devminor, c_rdevmajor, c_rdevminor, c_namesize, c_check, all of them being &[u8; 8].
/// Compute the necessary padding based on the provided length
/// It returns None if no padding is necessary.
fn compute_pad4(len: usize) -> Option<Vec<u8>> {
let overhang = len % 4;
if overhang != 0 {
let repeat = 4 - overhang;
Some(vec![0u8; repeat])
} else {
None
}
}
/// Align on N-byte boundary a value.
fn align<const A: usize>(value: usize) -> usize {
// Assert if A is a power of 2.
// assert!(A & (A - 1) == 0);
if value > usize::MAX - (A - 1) {
usize::MAX
} else {
(value + A - 1) & !(A - 1)
}
}
trait WriteBytesExt: Write {
fn write_cpio_word(&mut self, word: u32) -> core::result::Result<(), Self::Error> {
// A CPIO word is the hex(word) written as chars.
self.write_all(format!("{:08x}", word).as_bytes())
}
fn write_cpio_header(&mut self, entry: Entry) -> core::result::Result<usize, Self::Error> {
let mut header_size = STATIC_HEADER_LEN;
self.write_all(MAGIC_NUMBER)?;
self.write_cpio_word(entry.ino)?;
self.write_cpio_word(entry.mode)?;
self.write_cpio_word(entry.uid)?;
self.write_cpio_word(entry.gid)?;
self.write_cpio_word(entry.nlink)?;
self.write_cpio_word(entry.mtime)?;
self.write_cpio_word(entry.file_size)?;
self.write_cpio_word(entry.dev_major)?;
self.write_cpio_word(entry.dev_minor)?;
self.write_cpio_word(entry.rdev_major)?;
self.write_cpio_word(entry.rdev_minor)?;
self.write_cpio_word(
(entry.name.len() + 1)
.try_into()
.expect("Filename cannot be longer than a 32-bits size"),
)?;
self.write_cpio_word(0u32)?; // CRC
self.write_all(entry.name.as_bytes())?;
header_size += entry.name.len();
self.write(&[0u8])?; // Write \0 for the string.
header_size += 1;
// Pad to a multiple of 4 bytes
if let Some(pad) = compute_pad4(header_size) {
self.write_all(&pad)?;
header_size += pad.len();
}
assert!(
header_size % 4 == 0,
"CPIO header is not aligned on a 4-bytes boundary!"
);
Ok(header_size)
}
fn write_cpio_contents(
&mut self,
header_size: usize,
contents: &[u8],
) -> core::result::Result<usize, Self::Error> {
let mut total_size = header_size + contents.len();
self.write_all(contents)?;
if let Some(pad) = compute_pad4(contents.len()) {
self.write_all(&pad)?;
total_size += pad.len();
}
assert!(
total_size % 4 == 0,
"CPIO file data is not aligned on a 4-bytes boundary!"
);
Ok(total_size)
}
fn write_cpio_entry(
&mut self,
header: Entry,
contents: &[u8],
) -> core::result::Result<usize, Self::Error> {
let header_size = self.write_cpio_header(header)?;
self.write_cpio_contents(header_size, contents)
}
}
impl<W: Write + ?Sized> WriteBytesExt for W {}
/// A CPIO archive with convenience methods
/// to pack a file hierarchy inside.
pub struct Cpio<IOError: embedded_io::Error + core::fmt::Debug> {
buffer: Vec<u8>,
inode_counter: u32,
_error: PhantomData<IOError>,
}
impl<I: embedded_io::Error + core::fmt::Debug> From<Cpio<I>> for Vec<u8> {
fn from(value: Cpio<I>) -> Self {
value.into_inner()
}
}
impl<I: embedded_io::Error + core::fmt::Debug> AsRef<[u8]> for Cpio<I> {
fn as_ref(&self) -> &[u8] {
self.buffer.as_ref()
}
}
impl<IOError: embedded_io::Error + core::fmt::Debug> Default for Cpio<IOError> {
fn default() -> Self {
Self::new()
}
}
impl<IOError: embedded_io::Error + core::fmt::Debug> Cpio<IOError> {
pub fn new() -> Self {
Self {
buffer: Vec::new(),
inode_counter: 0,
_error: PhantomData,
}
}
pub fn into_inner(self) -> Vec<u8> {
self.buffer
}
/// Pack inside the archive a file named `fname` containing `contents` under
/// `target_dir_prefix` hierarchy of files with access mode specified by `access_mode`.
/// It may return IO errors or error specific to the CPIO archives.
pub fn pack_one(
&mut self,
fname: &str,
contents: &[u8],
target_dir_prefix: &str,
access_mode: u32,
) -> Result<usize, IOError> {
// cpio cannot deal with > 32 bits file sizes
// SAFETY: u32::MAX as usize can wrap if usize < u32.
// hopefully, I will never encounter a usize = u16 in the wild.
if contents.len() > (u32::MAX as usize) {
return Err(CPIOError::TooLargeFileSize {
got: contents.len(),
});
}
// cpio cannot deal with > 2^32 - 1 inodes neither
if self.inode_counter == u32::MAX {
return Err(CPIOError::MaximumInodesReached);
}
let mut current_len = STATIC_HEADER_LEN + 1; // 1 for the `/` separator
if current_len > usize::MAX - target_dir_prefix.len() {
return Err(CPIOError::MaximumArchiveReached);
}
current_len += target_dir_prefix.len();
if current_len > usize::MAX - fname.len() {
return Err(CPIOError::MaximumArchiveReached);
}
current_len += fname.len();
// SAFETY: u32::MAX as usize can wrap if usize < u32.
if target_dir_prefix.len() + fname.len() >= (u32::MAX as usize) {
return Err(CPIOError::MaximumArchiveReached);
}
// Perform 4-byte alignment of current_len
current_len = align::<4>(current_len);
if current_len == usize::MAX {
return Err(CPIOError::MaximumArchiveReached);
}
// Perform 4-byte alignment of contents.len()
let aligned_contents_len = align::<4>(contents.len());
if aligned_contents_len == usize::MAX {
return Err(CPIOError::MaximumArchiveReached);
}
if current_len > usize::MAX - aligned_contents_len {
return Err(CPIOError::MaximumArchiveReached);
}
current_len += aligned_contents_len;
if self.buffer.len() > usize::MAX - current_len {
return Err(CPIOError::MaximumArchiveReached);
}
// Perform re-allocation now.
let mut cur = Cursor::new(Vec::with_capacity(current_len));
self.inode_counter += 1;
// TODO: perform the concat properly
// transform fname to string
let written = cur
.write_cpio_entry(
Entry {
name: if !target_dir_prefix.is_empty() {
format!("{}/{}", target_dir_prefix, fname)
} else {
fname.to_string()
},
ino: self.inode_counter,
mode: access_mode | 0o100000, // S_IFREG
uid: 0,
gid: 0,
nlink: 1,
mtime: 0,
// This was checked previously.
file_size: contents.len().try_into().unwrap(),
dev_major: 0,
dev_minor: 0,
rdev_major: 0,
rdev_minor: 0,
},
contents,
)
.unwrap(); // This is infaillible as long as allocation is not failible.
// Concat the element buffer.
self.buffer.append(cur.get_mut());
Ok(written)
}
pub fn pack_dir(&mut self, path: &str, access_mode: u32) -> Result<(), IOError> {
// cpio cannot deal with > 2^32 - 1 inodes neither
if self.inode_counter == u32::MAX {
return Err(CPIOError::MaximumInodesReached);
}
let mut current_len = STATIC_HEADER_LEN;
if current_len > usize::MAX - path.len() {
return Err(CPIOError::MaximumArchiveReached);
}
current_len += path.len();
// Align the whole header
current_len = align::<4>(current_len);
if self.buffer.len() == usize::MAX || self.buffer.len() > usize::MAX - current_len {
return Err(CPIOError::MaximumArchiveReached);
}
let mut cur = Cursor::new(Vec::with_capacity(current_len));
self.inode_counter += 1;
cur.write_cpio_header(Entry {
name: path.into(),
ino: self.inode_counter,
mode: access_mode | 0o040000, // S_IFDIR
uid: 0,
gid: 0,
nlink: 1,
mtime: 0,
file_size: 0,
dev_major: 0,
dev_minor: 0,
rdev_major: 0,
rdev_minor: 0,
})
.unwrap(); // This is infaillible as long as allocation is not failible.
// Concat the element buffer.
self.buffer.append(cur.get_mut());
Ok(())
}
pub fn pack_prefix(&mut self, path: &str, dir_mode: u32) -> Result<(), IOError> {
// TODO: bring Unix paths inside this crate?
// and just reuse &Path there and iterate over ancestors().rev()?
let mut ancestor = String::new();
// This will serialize all directory inodes of all prefix paths
// until the final directory which will be serialized with the proper `dir_mode`
let components = path.split('/');
let parts = components.clone().count();
if parts == 0 {
// packing the prefix of an empty path is trivial.
return Ok(());
}
let last = components.clone().last().unwrap();
let prefixes = components.take(parts - 1);
for component in prefixes {
ancestor = ancestor + "/" + component;
self.pack_dir(&ancestor, 0o555)?;
}
self.pack_dir(&(ancestor + "/" + last), dir_mode)
}
pub fn pack_trailer(&mut self) -> Result<usize, IOError> {
self.pack_one(TRAILER_NAME, b"", "", 0)
}
}

View File

@ -0,0 +1,93 @@
use std::{
convert::Infallible,
io::{stdout, Cursor, Write},
};
use cpio::NewcReader;
use pio::writer::Cpio;
/*
* This test is not used in practice,
* because this is a interactive debugging test.
* Use it as a model to investigate issues.
*
* #[test]
fn visual_diagnose() {
let mut cpio = Cpio::<Infallible>::new();
let contents = vec![0xAA; 10];
let one_size = cpio.pack_one("test.txt", &contents, "", 0o000)
.expect("Failed to pack a file at the root directory");
let trailer_size = cpio.pack_trailer()
.expect("Failed to pack the trailer of the CPIO archive");
let data = cpio.into_inner();
stdout().write_all(data.as_slice().escape_ascii().collect::<Vec<u8>>().as_ref())
.expect("Failed to write the CPIO textual representation");
print!("\n");
let reader = NewcReader::new(Cursor::new(data)).expect("Failed to read the first entry");
let entry = reader.entry();
println!("entry: {}", entry.name());
assert_eq!(entry.name(), "/test.txt");
let reader = NewcReader::new(reader.finish().expect("To finish reading")).expect("Failed to read the trailer");
let entry = reader.entry();
println!("entry: {}", entry.name());
}
*/
#[test]
fn alignment() {
let mut cpio = Cpio::<Infallible>::new();
let contents = vec![0xAA; 10];
let one_size = cpio
.pack_one("test.txt", &contents, "", 0o000)
.expect("Failed to pack a file at the root directory");
let trailer_size = cpio
.pack_trailer()
.expect("Failed to pack the trailer of the CPIO archive");
assert!(
cpio.into_inner().len() % 4 == 0,
"CPIO is not aligned on a 4 bytes boundary!"
);
}
#[test]
fn write_read_prefix() {
let mut cpio = Cpio::<Infallible>::new();
let contents = vec![0xAA; 10];
cpio.pack_prefix("a/b/c/d/e/f", 0o600)
.expect("Failed to pack prefixes of a directory, including itself");
let data = cpio.into_inner();
stdout()
.write_all(data.as_slice().escape_ascii().collect::<Vec<u8>>().as_ref())
.expect("Failed to write the CPIO textual representation");
print!("\n");
let reader = NewcReader::new(Cursor::new(data)).expect("Failed to read the first entry");
let entry = reader.entry();
println!("entry: {}", entry.name());
assert_eq!(entry.name(), "/a");
let reader = NewcReader::new(reader.finish().expect("To finish reading"))
.expect("Failed to read the trailer");
let entry = reader.entry();
println!("entry: {}", "/a/b");
}
#[test]
fn write_read_basic() {
let mut cpio = Cpio::<Infallible>::new();
let contents = vec![0xAA; 10];
let one_size = cpio
.pack_one("test.txt", &contents, "", 0o000)
.expect("Failed to pack a file at the root directory");
let trailer_size = cpio
.pack_trailer()
.expect("Failed to pack the trailer of the CPIO archive");
assert!(
cpio.into_inner().len() % 4 == 0,
"CPIO is not aligned on a 4 bytes boundary!"
);
}