]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/shared/dissect-image.h
dissect-image: Return mount point fd if requested
[thirdparty/systemd.git] / src / shared / dissect-image.h
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
8c1be37e
LP
2#pragma once
3
8c1be37e
LP
4#include <stdbool.h>
5
dccca82b
LP
6#include "sd-id128.h"
7
49ae9d91 8#include "architecture.h"
dd894023 9#include "gpt.h"
18d73705 10#include "list.h"
6aa05ebd 11#include "loop-util.h"
8c1be37e
LP
12#include "macro.h"
13
14typedef struct DissectedImage DissectedImage;
15typedef struct DissectedPartition DissectedPartition;
18b5886e 16typedef struct DecryptedImage DecryptedImage;
18d73705 17typedef struct MountOptions MountOptions;
89e62e0b 18typedef struct VeritySettings VeritySettings;
8c1be37e
LP
19
20struct DissectedPartition {
21 bool found:1;
22 bool rw:1;
de98f631 23 bool growfs:1;
6b41a7b2
LP
24 int partno; /* -1 if there was no partition and the images contains a file system directly */
25 Architecture architecture; /* Intended architecture: either native, secondary or unset ARCHITECTURE_INVALID. */
26 sd_id128_t uuid; /* Partition entry UUID as reported by the GPT */
8c1be37e
LP
27 char *fstype;
28 char *node;
08fe0a53 29 char *label;
18b5886e
LP
30 char *decrypted_node;
31 char *decrypted_fstype;
18d73705 32 char *mount_options;
f7725647 33 int mount_node_fd;
88b3300f
LP
34 uint64_t size;
35 uint64_t offset;
d90b03f8 36 uint64_t gpt_flags;
8c1be37e
LP
37};
38
babd5b08
YW
39#define DISSECTED_PARTITION_NULL \
40 ((DissectedPartition) { \
41 .partno = -1, \
42 .architecture = _ARCHITECTURE_INVALID, \
254d1313 43 .mount_node_fd = -EBADF, \
babd5b08 44 })
088377e0
YW
45#define TAKE_PARTITION(p) \
46 ({ \
47 DissectedPartition *_pp = &(p), _p = *_pp; \
48 *_pp = DISSECTED_PARTITION_NULL; \
49 _p; \
50 })
babd5b08 51
18b5886e 52typedef enum DissectImageFlags {
08f14be4
YW
53 DISSECT_IMAGE_DEVICE_READ_ONLY = 1 << 0, /* Make device read-only */
54 DISSECT_IMAGE_DISCARD_ON_LOOP = 1 << 1, /* Turn on "discard" if on a loop device and file system supports it */
55 DISSECT_IMAGE_DISCARD = 1 << 2, /* Turn on "discard" if file system supports it, on all block devices */
56 DISSECT_IMAGE_DISCARD_ON_CRYPTO = 1 << 3, /* Turn on "discard" also on crypto devices */
57 DISSECT_IMAGE_DISCARD_ANY = DISSECT_IMAGE_DISCARD_ON_LOOP |
58 DISSECT_IMAGE_DISCARD |
59 DISSECT_IMAGE_DISCARD_ON_CRYPTO,
60 DISSECT_IMAGE_GPT_ONLY = 1 << 4, /* Only recognize images with GPT partition tables */
61 DISSECT_IMAGE_GENERIC_ROOT = 1 << 5, /* If no partition table or only single generic partition, assume it's the root fs */
62 DISSECT_IMAGE_MOUNT_ROOT_ONLY = 1 << 6, /* Mount only the root and /usr partitions */
63 DISSECT_IMAGE_MOUNT_NON_ROOT_ONLY = 1 << 7, /* Mount only the non-root and non-/usr partitions */
64 DISSECT_IMAGE_VALIDATE_OS = 1 << 8, /* Refuse mounting images that aren't identifiable as OS images */
65 DISSECT_IMAGE_VALIDATE_OS_EXT = 1 << 9, /* Refuse mounting images that aren't identifiable as OS extension images */
66 DISSECT_IMAGE_RELAX_VAR_CHECK = 1 << 10, /* Don't insist that the UUID of /var is hashed from /etc/machine-id */
67 DISSECT_IMAGE_FSCK = 1 << 11, /* File system check the partition before mounting (no effect when combined with DISSECT_IMAGE_READ_ONLY) */
68 DISSECT_IMAGE_NO_PARTITION_TABLE = 1 << 12, /* Only recognize single file system images */
69 DISSECT_IMAGE_VERITY_SHARE = 1 << 13, /* When activating a verity device, reuse existing one if already open */
70 DISSECT_IMAGE_MKDIR = 1 << 14, /* Make top-level directory to mount right before mounting, if missing */
71 DISSECT_IMAGE_USR_NO_ROOT = 1 << 15, /* If no root fs is in the image, but /usr is, then allow this (so that we can mount the rootfs as tmpfs or so */
72 DISSECT_IMAGE_REQUIRE_ROOT = 1 << 16, /* Don't accept disks without root partition (or at least /usr partition if DISSECT_IMAGE_USR_NO_ROOT is set) */
73 DISSECT_IMAGE_MOUNT_READ_ONLY = 1 << 17, /* Make mounts read-only */
74 DISSECT_IMAGE_READ_ONLY = DISSECT_IMAGE_DEVICE_READ_ONLY |
75 DISSECT_IMAGE_MOUNT_READ_ONLY,
76 DISSECT_IMAGE_GROWFS = 1 << 18, /* Grow file systems in partitions marked for that to the size of the partitions after mount */
77 DISSECT_IMAGE_MOUNT_IDMAPPED = 1 << 19, /* Mount mounts with kernel 5.12-style userns ID mapping, if file system type doesn't support uid=/gid= */
73d88b80
LP
78 DISSECT_IMAGE_ADD_PARTITION_DEVICES = 1 << 20, /* Create partition devices via BLKPG_ADD_PARTITION */
79 DISSECT_IMAGE_PIN_PARTITION_DEVICES = 1 << 21, /* Open dissected partitions and decrypted partitions and pin them by fd */
f7725647 80 DISSECT_IMAGE_RELAX_SYSEXT_CHECK = 1 << 22, /* Don't insist that the extension-release file name matches the image name */
1a81ddef 81 DISSECT_IMAGE_DISKSEQ_DEVNODE = 1 << 23, /* Prefer /dev/disk/by-diskseq/… device nodes */
18b5886e 82} DissectImageFlags;
8c1be37e
LP
83
84struct DissectedImage {
4623e8e6 85 bool encrypted:1;
c3c88d67 86 bool has_verity:1; /* verity available in image, but not necessarily used */
8ee9615e 87 bool has_verity_sig:1; /* pkcs#7 signature embedded in image */
c3c88d67 88 bool verity_ready:1; /* verity available, fully specified and usable */
8ee9615e 89 bool verity_sig_ready:1; /* verity signature logic, fully specified and usable */
e7cbe5cb 90 bool single_file_system:1; /* MBR/GPT or single file system */
3b925504 91
1e63dc4f 92 LoopDevice *loop;
8c1be37e 93 DissectedPartition partitions[_PARTITION_DESIGNATOR_MAX];
ac1e1b5f 94 DecryptedImage *decrypted_image;
3b925504 95
22ee78a8
LP
96 uint32_t sector_size;
97
8ee9615e 98 /* Meta information extracted from /etc/os-release and similar */
593fe6c0 99 char *image_name;
b387778c 100 sd_id128_t image_uuid;
3b925504
LP
101 char *hostname;
102 sd_id128_t machine_id;
103 char **machine_info;
104 char **os_release;
fab22946 105 char **initrd_release;
7718ac97 106 char **extension_release;
a4e0d617 107 int has_init_system;
8c1be37e
LP
108};
109
18d73705 110struct MountOptions {
569a0e42 111 PartitionDesignator partition_designator;
18d73705
LB
112 char *options;
113 LIST_FIELDS(MountOptions, mount_options);
114};
115
89e62e0b
LP
116struct VeritySettings {
117 /* Binary root hash for the Verity Merkle tree */
118 void *root_hash;
119 size_t root_hash_size;
120
121 /* PKCS#7 signature of the above */
122 void *root_hash_sig;
123 size_t root_hash_sig_size;
124
125 /* Path to the verity data file, if stored externally */
126 char *data_path;
aee36b4e
LP
127
128 /* PARTITION_ROOT or PARTITION_USR, depending on what these Verity settings are for */
129 PartitionDesignator designator;
89e62e0b
LP
130};
131
aee36b4e
LP
132#define VERITY_SETTINGS_DEFAULT { \
133 .designator = _PARTITION_DESIGNATOR_INVALID \
134 }
135
18d73705
LB
136MountOptions* mount_options_free_all(MountOptions *options);
137DEFINE_TRIVIAL_CLEANUP_FUNC(MountOptions*, mount_options_free_all);
569a0e42 138const char* mount_options_from_designator(const MountOptions *options, PartitionDesignator designator);
18d73705 139
c80c9079 140int probe_filesystem_full(int fd, const char *path, uint64_t offset, uint64_t size, char **ret_fstype);
d2c6e79d 141static inline int probe_filesystem(const char *path, char **ret_fstype) {
c80c9079 142 return probe_filesystem_full(-1, path, 0, UINT64_MAX, ret_fstype);
d2c6e79d 143}
08f14be4
YW
144int dissect_image_file(
145 const char *path,
369de26f
YW
146 const VeritySettings *verity,
147 const MountOptions *mount_options,
369de26f
YW
148 DissectImageFlags flags,
149 DissectedImage **ret);
1e63dc4f
YW
150int dissect_loop_device(LoopDevice *loop, const VeritySettings *verity, const MountOptions *mount_options, DissectImageFlags flags, DissectedImage **ret);
151int dissect_loop_device_and_warn(LoopDevice *loop, const VeritySettings *verity, const MountOptions *mount_options, DissectImageFlags flags, DissectedImage **ret);
8c1be37e
LP
152
153DissectedImage* dissected_image_unref(DissectedImage *m);
154DEFINE_TRIVIAL_CLEANUP_FUNC(DissectedImage*, dissected_image_unref);
155
e330f97a
YW
156int dissected_image_decrypt(DissectedImage *m, const char *passphrase, const VeritySettings *verity, DissectImageFlags flags);
157int dissected_image_decrypt_interactively(DissectedImage *m, const char *passphrase, const VeritySettings *verity, DissectImageFlags flags);
21b61b1d
LP
158int dissected_image_mount(DissectedImage *m, const char *dest, uid_t uid_shift, uid_t uid_range, DissectImageFlags flags);
159int dissected_image_mount_and_warn(DissectedImage *m, const char *where, uid_t uid_shift, uid_t uid_range, DissectImageFlags flags);
18b5886e 160
22847508 161int dissected_image_acquire_metadata(DissectedImage *m, DissectImageFlags extra_flags);
3b925504 162
9321ad51 163DecryptedImage* decrypted_image_ref(DecryptedImage *p);
18b5886e
LP
164DecryptedImage* decrypted_image_unref(DecryptedImage *p);
165DEFINE_TRIVIAL_CLEANUP_FUNC(DecryptedImage*, decrypted_image_unref);
f906075a 166
f906075a 167int dissected_image_relinquish(DissectedImage *m);
8c1be37e 168
89e62e0b
LP
169int verity_settings_load(VeritySettings *verity, const char *image, const char *root_hash_path, const char *root_hash_sig_path);
170void verity_settings_done(VeritySettings *verity);
171
c2534821
LP
172static inline bool verity_settings_data_covers(const VeritySettings *verity, PartitionDesignator d) {
173 /* Returns true if the verity settings contain sufficient information to cover the specified partition */
174 return verity &&
175 ((d >= 0 && verity->designator == d) || (d == PARTITION_ROOT && verity->designator < 0)) &&
176 verity->root_hash &&
177 verity->data_path;
178}
179
88b3300f
LP
180int dissected_image_load_verity_sig_partition(DissectedImage *m, int fd, VeritySettings *verity);
181
49536766
LP
182bool dissected_image_verity_candidate(const DissectedImage *image, PartitionDesignator d);
183bool dissected_image_verity_ready(const DissectedImage *image, PartitionDesignator d);
8ee9615e 184bool dissected_image_verity_sig_ready(const DissectedImage *image, PartitionDesignator d);
6aa05ebd 185
a133d2c3 186int mount_image_privately_interactively(const char *path, DissectImageFlags flags, char **ret_directory, int *ret_dir_fd, LoopDevice **ret_loop_device);
4beda316 187
cedf5b1a 188int verity_dissect_and_mount(int src_fd, const char *src, const char *dest, const MountOptions *options, const char *required_host_os_release_id, const char *required_host_os_release_version_id, const char *required_host_os_release_sysext_level, const char *required_sysext_scope);
80ce8580
LP
189
190int dissect_fstype_ok(const char *fstype);
05c4c59f
LP
191
192int probe_sector_size(int fd, uint32_t *ret);
81dde3d8 193int probe_sector_size_prefer_ioctl(int fd, uint32_t *ret);