tech-doc: add technical specification

master
S.J.R. van Schaik 7 years ago
parent 128e860201
commit 46b19eeff6
  1. BIN
      tech-doc/Roboto-Bold.ttf
  2. BIN
      tech-doc/Roboto-Italic.ttf
  3. BIN
      tech-doc/Roboto-Regular.ttf
  4. BIN
      tech-doc/figures/mufs-layout.pdf
  5. BIN
      tech-doc/figures/tbm.pdf
  6. 398
      tech-doc/main.tex

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

@ -0,0 +1,398 @@
\documentclass[twoside,a4paper]{article}
\usepackage{amsmath}
\usepackage{amssymb}
\usepackage{booktabs}
\usepackage{enumitem}
\usepackage{fancyhdr}
\usepackage{float}
\usepackage{fontspec}
\usepackage{hyperref}
\usepackage[margin=2cm,includefoot,footskip=1.5cm]{geometry}
\usepackage{graphicx}
\usepackage{minted}
\usepackage{tikz}
\usepackage{url}
\usetikzlibrary{calc}
\renewcommand{\headrulewidth}{0pt}
\renewcommand{\footrulewidth}{0pt}
%\setmainfont[BoldFont=OpenSans-Bold, ItalicFont=OpenSans-Italic, Ligatures=TeX]{OpenSans-Regular.ttf}
%\setsansfont[BoldFont=OpenSans-Bold, ItalicFont=OpenSans-Italic, Ligatures=TeX]{OpenSans-Regular.ttf}
\newfontfamily\Roboto[BoldFont=Roboto-Bold, Ligatures=TeX]{Roboto-Regular}
\setmainfont[BoldFont=Roboto-Bold, ItalicFont=Roboto-Italic, Ligatures=TeX]{Roboto-Regular}
\setsansfont[BoldFont=Roboto-Bold, ItalicFont=Roboto-Italic, Ligatures=TeX]{Roboto-Regular}
\definecolor{background}{RGB}{58,46,86}
\definecolor{border}{RGB}{234,211,186}
\patchcmd{\section}{\thispagestyle{plain}}{\thispagestyle{fancy}}{}{}
\pagestyle{fancy}
\fancyhf{}
\fancyhead[C]{%
\begin{tikzpicture}[overlay, remember picture]%
\fill[border] (current page.north west) rectangle ($(current page.north east)+(0,-1.5cm)$);
\fill[background] (current page.north west) rectangle ($(current page.north east)+(0,-1.4cm)$);
\node[anchor=north west, text=white, font=\Large\Roboto, minimum size=1.4cm, inner xsep=5mm] at (current page.north west) {\textbf{white}box};
\end{tikzpicture}
}
\fancyfoot[LE,RO]{\thepage}
\newcommand\fancytitlecover {
\begin{tikzpicture}[remember picture, overlay, shorten >= -10pt]
\fill[border] (current page.north west) rectangle (current page.south east);
\fill[background] (current page.north west) rectangle ($(current page.south east)+(0,3mm)$);
\end{tikzpicture}
}
\makeatletter
\renewcommand*{\maketitle}{
\begin{titlepage}
\fancytitlecover
\color{white}
\begin{center}
\sffamily
\vspace*{3cm}
\huge \@title \\[1em]
{\Large\Roboto \textbf{white}box}
\vfill
%\large \@author \\[1em]
%\large \@date
\end{center}
\end{titlepage}
}
\makeatother
\begin{document}
\title{Trusted Boot Module \\[.5em]
\Large Technical Specification}
\author{}
\date{}
\maketitle
\tableofcontents
\newpage
\section{Introduction}
This document covers the specification, the design, the motivation and the implementation of the \emph{Trusted Boot Module} or TBM. The TBM is an additional board that consists of a \emph{microcontroller unit} or MCU to manage the boot procedure of the host device in a secure fashion by managing keys, logs and other files related to trusted boot management. Furthermore, the host device will be restricted to only boot from one read-only storage device that will contain a trusted image. Once this image has been booted, the hosted device is in a \emph{Read-Only Trusted Stage} or ROTS from where it will be able to execute a minimal software stack to enumerate the images to boot, to verify these images and to select what image to boot. Once the image has been booted, the host device will enter an untrusted stage and the TBM will only allow for restricted access. This implementation allows the host device to only boot images that are trusted and prevents attackers from tampering with the host device or the TBM to boot untrusted images as long as they don't have physical access and as long as there are no vulnerabilities.
\begin{figure}[H]
\centering
\includegraphics[width=0.8\linewidth]{figures/tbm.pdf}
\caption{a high-level overview of the interaction between the host device and the Trusted Boot Module}
\label{fig:tbm-overview}
\end{figure}
Figure~\ref{fig:tbm-overview} shows a high-level overview of the design. Once the device receives power the \emph{Trusted Boot Module} will boot and at some point the TBM will power on the host device. The host device will then read the trusted image from the SPI NOR flash. Because the device has been configured to be restricted to boot from the SPI NOR flash and because the SPI NOR flash has been configured to be read-only, the host devices enter a \emph{Read-Only Trusted Stage} or ROTS. The image that has been booted is designed to be minimal and only contains the software necessary to perform the boot procedure. Furthermore, the image does not contain a network stack to reduce the amount of possible vulnerabilities and thus to minimise the attack vector. Once the trusted image has been booted, the host device will enumerate the images to boot and co-operate with the TBM to verify images and to select the image to boot. This co-operation happens by means of serial communication with the TBM, where the TBM will grant access to the key storage to the ROTS. Once an image has been selected to boot, the ROTS will inform the TBM that it will boot this image and enter the untrusted stage. From there on the TBM will only allow for restricted access.
\subsection{Trust Model}
There are different trust models that can be used depending on the use case. These mostly depend on whether the concept of certificate authorities (CAs) is required or not. Furthermore, the key storage also plays an important role in deciding which of the trust models to use.
\begin{itemize}
\item ``Home router.,,
\begin{itemize}
\item \textbf{Certificate Authority}: none
\item \textbf{Replacement}: by re-flashing read-only flash.
\end{itemize}
\item ``Routers in a company with a system administrator.,,
\begin{itemize}
\item \textbf{Certificate Authority}: none
\item \textbf{Replacement}: by re-flashing read-only flash or by signed statements.
\end{itemize}
\item ``Routers with a single certificate authority.,,
\begin{itemize}
\item \textbf{Certificate Authority}: one
\item \textbf{Replacement of CA}: by re-flashing read-only flash.
\item \textbf{Replacement of keys}: by statements signed by the CA.
\end{itemize}
\item ``Routers with multiple certificate authorities.,,
\begin{itemize}
\item \textbf{Certificate Authority}: many
\item \textbf{Replacement of CA}: by threshold.
\item \textbf{Replacement of keys}: by statements signed by the CAs.
\end{itemize}
\item ``Routers with multiple certificate authorities and with an initial certificate authority pre-configured in ROTS,,
\begin{itemize}
\item \textbf{Certificate Authority}: many
\item \textbf{Replacement of CA}: by re-flashing read-only flash.
\item \textbf{Replacement of keys}: by statements signed by the CAs.
\item \textbf{Revoking keys}: not the same as removing.
\end{itemize}
\end{itemize}
\subsection{Key Storage}
\begin{itemize}
\item Read-only flash
\item Trusted Boot Module
\item Box storage (e.g. HDD)
\item Signed statements by embedding keys in images.
\end{itemize}
\section{Reproducible Builds}
The untrusted images to be booted by the Whitebox can be signed by one or more authorities. During the boot procedure of the Whitebox the integrity of the image can be verified. However, a more fine-grained verification can be performed as well. An untrusted image also contains a table of contents listing all the packages that the image consists of together with their hashes allowing for the verification of individual packages within the image. These packages each consist of a manifest that describes where to locate the source code of the package, what tools are needed to build the packages as well as the instructions on how the build the packages, i.e. all the requirements to guarantee the reproducibility of the build.
\section{Protocol}
In the most simplistic model, the boot procedure that will be performed is as follows:
\begin{itemize}
\item The trusted image is read from SPI NOR flash and booted.
\item The read-only trusted stage enumerates the available images.
\item The read-only trusted stage selects an image to boot and verifies this image in co-operation with the TBM.
\item Once an image has been selected and verified, the read-only trusted stage informs the TBM that it will boot this image whereupon the TBM will keep track of the image that was selected and where it will then enter a restrictive state.
\item The read-only trusted stage boots the image.
\end{itemize}
The communication between the host device and the TBM follows a client-server model where the host devices sends requests to the TBM over serial.
\subsection{Clock Drift}
To cope with clock drift the real-time clock has to be synchronised with an external clock. The most straight-forward method to support this within the protocol is to allow an absolute time to be set. However, this should only be allowed from the read-only trusted stage. An alternative method is to allow the clock to be corrected by introducing a limited amount of additional ticks or to stop the clock for a limited amount of ticks. By having limited correction, the clock can still be synchronised while an attacker cannot change the clock by more than a negligible factor each year.
\section{Features}
\subsection{Power Cuts}
Power cuts when very short can cause certain parts of the hardware to be reset, while others still function properly. However, the probability of this happening is negligible.
\subsection{Image Self-Test}
The timers and real-time clock of the microcontroller unit can be used to wait for a response from the untrusted stage that it has managed to boot successfully or to reboot the host device if it fails to provide such a response in a given period of time. This would be useful as a self-test for images to check if they work appropriately or not. Furthermore, this would also allow the ability to rollback to previous versions that are known to work reliably.
\subsection{Forced Reboot}
As it is possible that there is a vulnerability in the untrusted image that has been booted by the TBM and that the image has been compromised by an attacker, it is important to make sure that the time window available to the attacker is limited. Because of this scenario, the TBM has been given full control over the power management of the host device, such that it can reboot the host device by force at any point in time and when the host device fails to co-operate with the TBM. Furthermore, to limit the time window the TBM will periodically reboot where the user can postpone this reboot a few times before the TBM will simply ignore such requests and perform a reboot by force. This design allows the host device to check for new updates and to boot new images where these possible vulnerabilities have been fixed.
\subsection{Upgrading}
One possible attack vector is that when the image that is running has been compromised in such a way that it prevents the system from running the update process. To prevent this the update process should scheduled to happen as early as possible within the image.
\section{Real-Time Clock}
To prevent downgrade attacks to known vulnerable firmware versions it is important to have a \emph{Real-Time Clock} or RTC powered by a battery and a crystal to keep track of the time, even if the TBM is offline. To some extent it is also important to have a RTC or timer to force periodic resets to ensure that the Whitebox is in a known trusted state. However, the microcontroller unit already has an integrated RTC and timers for this.
\subsection{Attack vector}
Assuming that an attack has full control over the drift-correction protocol, the following attacks would be possible:
\begin{itemize}
\item \textbf{Downgrade attacks}: by drifting the clock too far into the past, it might be possible to reboot to a vulernable kernel that would otherwise be blacklisted.
\item \textbf{Denial of service attacks}: by drifting the clock too far into the future, it might be possible that there are no available kernels to boot as they have all been expired. Therefore, it might be possible that the Whitebox can no longer boot.
\item \textbf{Reboot-prevention attacks}: by sufficiently slowing the clock down, it is possible to extend a compromised state. Even though it is not possible to extend this indefinitely, extending the time a system is compromised would allow for enough time to extract sensitive information or to be in the right time-window to capture privacy-sensitive information.
\item \textbf{Reboot-encouraging attacks}: by speeding up the clock, the system will be forced to reboot a lot faster than usual, resulting in a denial of service and a frustrated end-user. This might cause the end-user to not further employ the security practices as encouraged by Whitebox, potentially compromising privacy indirectly.
\end{itemize}
\section{SPI NOR Flash}
SPI NOR flash is one of many storage devices that can be used for both the host device and the \emph{Trusted Boot Module}. Even though it comes at much smaller capacities than other storage device, it is highly reliable and optimised for writing speeds. Furthermore, the write-protect pin combined with a pre-configured region allows that region to be read-only. This is required to guarantee that the \emph{Read-Only Trusted Stage} can indeed be trusted.
Unlike other common storage devices, SPI NOR flash operates with a different granularity depending on the operation. For instance, reading and programming pages have a very fine granularity of 1 byte, whereas erasing pages must be done on at least pages of 4 kiB. Furthermore, there are faster erase operations that operate on 32 kiB and 64 kiB pages, as well as faster read operations with other limitations. In addition to the granularity, some of the operations such as programming pages also suffer from other limitations such as having a wrap-around limit of 256 bytes. When the offset exceeds 256 bytes while programming a page, the offset will wrap-around and continue writing at the beginning of that 256 byte page. To simplify the implementation of the SPI flash device driver only a select subset of the most common operations have been implemented with care.
\subsection{Motivation}
SPI NOR flash is a viable option for the \emph{Trusted Boot Module}, because it is a cheap option that can easily be interfaced using SPI. Even though the capacity of SPI NOR flash seems to be on the low size (2 MiB - 16 MiB), this capacity easily meets the requirements of the \emph{Trusted Boot Module} as it will only be used as a storage for keys, logs and a few other files. Furthermore, with an erase cycle of ±1,000,000 per page, SPI NOR flash only wears out slowly and doesn't ship with bad blocks unlike NAND flash. These properties make SPI NOR flash a reliable option for the \emph{Trusted Boot Module}.
On the host device, SPI NOR flash is a viable option as the host device supports booting from SPI NOR flash, as it can be configured to be read-only and as it is the first option to boot from disabling the ability to boot from other devices as long as a valid image has been flashed to the SPI NOR flash.
\subsection{Write-Protect}
To ensure that the SPI NOR Flash is read-only the write-protected regions should be configured and the $\overline{\text{\texttt{WP}}}$ pin should be pulled down by connecting it to the \texttt{GND} pin. If the $\overline{\text{\texttt{WP}}}$ is not connected to \texttt{GND}, then the pin will be in a floating state and it will be possible to disable the write-protection.
The boot order of the host device is pre-configured in hardware and will boot from the SPI NOR flash device if one is connected to the {\tt BOOT0} pins of the device. Furthermore, to properly boot the host device, an image containing \emph{u-boot} and \emph{Linux} will have to be flashed to the SPI NOR flash. This image will be the ROTS-image that also contains a minimal payload to the enumerate existing images, verify their integrity and boot them.
\section{Virtual NOR Flash}
To be able to quickly develop the current and future subsystems of the software stack that is to be run on the microcontroller unit of the MCU, the code has been designed in such a way that it can be run in a simulated environment. Part of this simulated environment involves simulating a virtual NOR flash device for testing the \emph{Flash Translation Layer} and the file system.
\subsection{Motivation}
To simplify the development and testing process of other subsystems, it is useful to develop a simulated environment. One of the components of such an environment is the virtual NOR flash which emulates a SPI NOR flash device with similar behaviour as the actual SPI NOR flash device used on the \emph{Trusted Boot Module}. Furthermore, by having a virtual NOR flash device, the wide variety of debugging and analysis tools such as \emph{gdb} and \emph{valgrind} can be used to easily verify the correctness of the other subsystems that are being developed for the \emph{Trusted Boot Module}.
\subsection{Design}
The flash driver for this virtual flash device implements the same operations as the the SPI flash driver by mapping a file that acts as the flash storage into memory. Because writing on SPI NOR flash can only toggle ones to zeroes but not zeroes to ones, the write operations performs a bitwise AND to simulate the exact same behaviour. Similarly, the virtual flash device also implements an erase operation that simply sets the bits within a page to ones. In addition, a tool has been developed to easily create the file that acts as the flash storage.
\section{Flash Translation Layer}
Because SPI NOR Flash has some very different characteristics and properties compared to other common storage devices, the \emph{Flash Translation Layer} (FTL) acts a thin layer on top of the SPI NOR Flash to provide an interface that makes the SPI NOR Flash appear more like a common storage device while optimally managing the data pages by maintaining a virtual-address-to-physical-address mapping and keeping these characteristics into account.
\subsection{Motivation}
While many common storage devices are block devices that operate on blocks of a certain fixed size, most commonly 512 bytes to 4 kiB, for all of their operations, SPI NOR Flash is fundamentally different. In the case of SPI NOR flash bits can only be toggled from one to zero during a write operation, but they cannot be toggled from zero to one. Therefore these bits have to be reset back to ones at some point. To achieve this, the SPI NOR Flash has been subdivided into pages of a certain fixed size, most commonly 4 kiB, that can be erased. However, the amount of times a page can be erased is limited to ±1,000,000 times before the pages start to wear. While it takes quite a lot of erasures before the pages start to wear, it makes sense to load-balance I/O over the pages to extend the lifetime of the flash device. Furthermore, by managing erasure implicitly we can achieve an interface that is more similar to those of common block devices where we can simply perform reads and writes on virtual blocks of a fixed size. In fact, this is similar to what \emph{Solid State Drives} or SSDs do for NAND flash, which have similar characteristics.
\subsection{Radix trees}
At the very heart of the FTL is the radix or prefix tree that is used to be able to determine whether a virtual address has been mapped, and if it has been, to locate the physical page that corresponds with that virtual address. Each of the pages encode a virtual address as well as an array of pointers to other pages for each of the bits in the virtual address. When the virtual address of a certain page does not fully match the virtual address, the prefix of $n$ bits that does match is used to select the pointer to the next subtree. This process is repeated until an exact match has been found or until there is no further subtree which is an indication that the virtual address has not been mapped.
\subsection{Page groups}
Because the erase operation only operates on a certain fixed size at minimum, the FTL subdivides the flash device into blocks that are at least large enough to be erased. These blocks are then further subdivided into page groups of $2^n$ pages, starting with $2^n - 1$ user pages followed by a footer page that consists of $2^n - 1$ page descriptors. Because the size of a logical page is fixed by the user, the amount of pages in a page group and thus the amount of page groups in a block is determined by the amount of page descriptors that fit within a single logical page. Each of the page descriptors correspond with a user page within the block and consist of a virtual address as well as an array of pointers to other subtrees. Once the page descriptor that corresponds with a certain virtual address has been found, the user page that corresponds with that virtual address can be easily found as the position of the page descriptor corresponds with the position of the user page within the page group.
\subsection{Journal}
When mounting a flash device with a FTL, a scan is performed on the first few blocks to find the initial block of the FTL. If no such block could be found, the FTL is reset to an initial state where it will start writing at the very first block of the device. Once the initial block has been located, a binary search is performed to locate the last written block on the device and finally a binary search is performed within that block to locate the last written page group. Once the last written page group has been found the magic value can be checked to verify the integrity of this footer and the pointer to the last written page descriptor is extracted from this footer to locate the root of the radix tree for the look up of virtual addresses. Once the root has been found, the head is set to the next free user page that is in a erased state or the next block.
When writing data to the FTL, a user page is allocated by incrementing the head pointer to the next user page, by writing the user data and finally by writing the page descriptor. In case of failure, the FTL may end up with a stall user page. However, because the user page will then be inaccessible the write operations appear to be fully atomic, i.e. the operation has either completed or the operation does not seem to have occurred at all. If the head points to the first user page of a block, the block will be fully erased before writing.
\subsection{Garbage Collection}
Because pages are always written at the head pointer, the head pointer will eventually meet the tail pointer of the FTL leaving no space for further writes. At that point, pages have to be freed from the block the tail pointer points at to be able to claim more space for writing. This is done by copying any pages present within the block at the tail to the head. Furthermore, to guarantee that the garbage collection process can always take place, the FTL always reserves one block of space by reporting a smaller capacity than the actual capacity of the FTL..
\subsection{Trim}
In addition to read and write operations, the FTL supports trimming, i.e. marking pages as being no longer in use. First the page to trim is located by performing a look up of the virtual address. Then the array of pointers is traversed until a subtree is found, this is the subtree with the shortest matching prefix. The reference to the page to be trimmed is then removed from this page descriptor. Finally, this new page descriptor is written to the head and the user data that was previously associated with this page descriptor is copied over.
\subsection{API}
\begin{itemize}
\item {\tt uint32\_t ftl\_get\_size(const struct ftl\_map *map);}
Returns the amount of bytes that are in use by data.
\item {\tt uint32\_t ftl\_get\_capacity(const struct ftl\_map *map);}
Returns the total amount of bytes available for data.
\item {\tt size\_t ftl\_read(struct ftl\_map *map, void *data, size\_t len, uint32\_t va);}
Reads {\tt len} bytes of data from the given virtual address {\tt va} into the buffer at {\tt data}. Returns the amount of bytes that have been read.
\item {\tt size\_t ftl\_write(struct ftl\_map *map, uint32\_t addr, const void *data, size\_t len);}
Writes {\tt len} bytes of data from the buffer {\tt data} to the given virtual address {\tt va}. Returns the amount of bytes that have been written.
\item {\tt int ftl\_trim(struct ftl\_map *map, uint32\_t va);}
Trims the page at {\tt va}. Returns 0 on success. -1 otherwise.
\end{itemize}
\section{µ-Filesystem}
\emph{µ-Filesystem} or \emph{µFS} is a filesystem that has been specifically designed for both the microcontroller in the TBM as well as to meet the requirements set for the TBM. As such, it has been to designed to have a very low memory footprint and it has been designed with simplicity in mind while still being both scalable and extensible. Moreover, the filesystem has been designed to store keys, log files and other files of at most a few kilobytes in an organised fashion.
\subsection{Motivation}
While there are already many file systems to choose from, only a few would be appropriate for the TBM. Primarily because the resources available by the microcontroller unit are very limited. For instance, the STM32F0 discovery board that is used for the development of the software stack for the TBM only ships 8 kiB of RAM. Furthermore, the TBM planned for production will still only have 64 kiB of RAM. Therefore, the implementation of the file system must have a very low memory footprint to run on the microcontroller unit. Furthermore, many of the file systems available support a lot of features that are not needed within the context of the TBM such as file attributes and permissions, symbolic links, hard links, disk quota, sparse files, etc. Moreover, for such a file system to be useful, a library has to be available that has specifically been designed for microcontrollers. Finally, the file system has to be reliable or it should be possible to easily extend the file system to have a journal to guarantee reliability. Because of these very specific requirements, a custom file system, \emph{µFS}, has been designed for the TBM.
\subsection{Disk lay-out}
\begin{figure}[H]
\centering
\includegraphics[width=0.8\linewidth]{figures/mufs-layout.pdf}
\caption{the disk lay-out of µFS.}
\label{fig:mufs-layout}
\end{figure}
Figure~\ref{fig:mufs-layout} shows the disk lay-out of µFS. The disk is subdivided into logical block of a fixed size. The first block is the super block which contains an identifier to recognise the existence of a properly formatted µFS file system together with the information necessary to mount a properly working file system. The next few blocks contain a bitmap to mark logical blocks on the disk as either used or available.
\subsection{Tree objects}
The fundamental data structure of the file system are trees to map virtual addresses within a file to the logical addresses on the disk. The nodes of the tree are logical blocks on the disk that are subdivided into entries that fit a logical address. The intermediate nodes can then be used to map a fragment of the virtual address to a pointer to the next node, whereas the leaf nodes can then be used to map a fragment of the virtual address to the logical address on the disk. Together with the root pointer, the depth of the tree is stored to allow for a scalable virtual address space that can be extended or shrunk to a specific size.
\subsection{Directories}
The super block consists of a pointer to a tree object that represents the root directory. Each of the logical disk blocks used by this tree object consists of a directory bin up to the size of a logical block on the disk that can contain one or more entries containing metadata such as the name of a file, the file type and a pointer to the tree object of that file.
\subsection{API}
Because many programmers are familiar with the POSIX standards, the µFS API tries to resemble the functions of this standard as much as possible.
\begin{itemize}
\item {\tt struct mufs *mufs\_mount(struct flash\_dev *dev);}
Attempts to mount a µFS-formatted flash device. Returns a handle to a filesystem object on success. {\tt NULL} otherwise.
\item {\tt void mufs\_unmount(struct mufs *fs);}
Unmounts the mounted filesystems that corresponds with the filesystem handle.
\item {\tt int mufs\_format(struct flash\_dev *dev);}
Formats µFS on the given flash device. Returns 0 on success. -1 otherwise.
\item {\tt char *mufs\_abspath(const char *path);}
Resolves the given path to an absolute path by removing duplicate slashes and resolving both single dot and double dot nodes. The absolute path returned must be freed by the callee.
\item {\tt int mufs\_stat(struct mufs *fs, const char *path, struct mufs\_stat *stat);}
Gets the file status for a given path including the file type and the size of the file on disk.
\item {\tt int mufs\_rename(struct mufs *fs, const char *old, const char *new);}
Renames a file on the filesystem. If the new path already exists and is a directory and the directory does not contain a file with the same name, the file is moved to the directory. If the new path does not exist, the file is renamed. Returns 0 on success. -1 otherwise.
\item {\tt struct mufs\_dir *mufs\_opendir(struct mufs *fs, const char *path);}
Opens a directory iterator for the given path if it exists and if it is a directory. Returns a directory handle on success. {\tt NULL} otherwise.
\item {\tt void mufs\_closedir(struct mufs\_dir *dir);}
Closes a directory iterator and frees the memory allocated for it.
\item {\tt int mufs\_readdir(struct mufs\_dir *dir, struct mufs\_dirent *dirent);}
Reads the next directory entry of the directory. Returns 0 on success. -1 otherwise.
\item {\tt int mufs\_mkdir(struct mufs *fs, const char *path);}
Creates a directory at the given path if the path does not exist yet and if there is a parent directory. Returns 0 on success. -1 otherwise.
\item {\tt int mufs\_rmdir(struct mufs *fs, const char *path);}
Removes the directory at the given path if the path points to an empty directory. Returns 0 on success. -1 otherwise.
\item {\tt int mufs\_create(struct mufs *fs, const char *path);}
Creates a file at the given path, if there exists no file at the given path. Returns 0 on success. -1 otherwise.
\item {\tt struct mufs\_file *mufs\_open(struct mufs *fs, const char *path, int mode);}
Opens the file at the given path if it is a file. The {\tt mode} arguments accepts the following flags:
\begin{itemize}
\item {\tt MUFS\_READ}: opens the file for reading.
\item {\tt MUFS\_WRITE}: opens the file for writing.
\item {\tt MUFS\_APPEND}: opens the file in append mode where writing to the file will always seek to the end before writing.
\end{itemize}
Returns a handle to the file on success. {\tt NULL} otherwise.
\item {\tt void mufs\_close(struct mufs\_file *file);}
Closes a file handle and frees the memory allocated for it.
\item {\tt long mufs\_seek(struct mufs\_file *file, long offset, int whence);}
Sets the position of the file pointer in the file. The {\tt whence} arguments accepts the following values:
\begin{itemize}
\item {\tt SEEK\_SET}: seek from the beginning.
\item {\tt SEEK\_CUR}: seek from the current position.
\item {\tt SEEK\_END}: seek from the end.
\end{itemize}
The {\tt offset} argument contains the relative position to seek. Returns the position of the file handle.
\item {\tt size\_t mufs\_read(struct mufs\_file *file, void *data, size\_t len);}
Reads {\tt len} bytes from the file into the buffer given by the {\tt data} argument. Returns the amount of bytes that have been read.
\item {\tt size\_t mufs\_write(struct mufs\_file *file, const void *data, size\_t len);}
Writes {\tt len} bytes to the file from the buffer given by the {\tt data} argument. Returns the amount of bytes that have been written.
\item {\tt int mufs\_unlink(struct mufs *fs, const char *path);}
Unlinks a file at the given path. Returns 0 on success. -1 otherwise.
\end{itemize}
\end{document}
Loading…
Cancel
Save