]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/shared/dissect-image.h
dissect: rename mount_options_from_part() → mount_options_from_designator()
[thirdparty/systemd.git] / src / shared / dissect-image.h
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
8c1be37e
LP
2#pragma once
3
8c1be37e
LP
4#include <stdbool.h>
5
dccca82b
LP
6#include "sd-id128.h"
7
18d73705 8#include "list.h"
6aa05ebd 9#include "loop-util.h"
8c1be37e
LP
10#include "macro.h"
11
12typedef struct DissectedImage DissectedImage;
13typedef struct DissectedPartition DissectedPartition;
18b5886e 14typedef struct DecryptedImage DecryptedImage;
18d73705 15typedef struct MountOptions MountOptions;
8c1be37e
LP
16
17struct DissectedPartition {
18 bool found:1;
19 bool rw:1;
20 int partno; /* -1 if there was no partition and the images contains a file system directly */
21 int architecture; /* Intended architecture: either native, secondary or unset (-1). */
be30ad41 22 sd_id128_t uuid; /* Partition entry UUID as reported by the GPT */
8c1be37e
LP
23 char *fstype;
24 char *node;
18b5886e
LP
25 char *decrypted_node;
26 char *decrypted_fstype;
18d73705 27 char *mount_options;
8c1be37e
LP
28};
29
30enum {
31 PARTITION_ROOT,
32 PARTITION_ROOT_SECONDARY, /* Secondary architecture */
33 PARTITION_HOME,
34 PARTITION_SRV,
35 PARTITION_ESP,
a8c47660 36 PARTITION_XBOOTLDR,
8c1be37e 37 PARTITION_SWAP,
4623e8e6
LP
38 PARTITION_ROOT_VERITY, /* verity data for the PARTITION_ROOT partition */
39 PARTITION_ROOT_SECONDARY_VERITY, /* verity data for the PARTITION_ROOT_SECONDARY partition */
d4dffb85
LP
40 PARTITION_TMP,
41 PARTITION_VAR,
8c1be37e
LP
42 _PARTITION_DESIGNATOR_MAX,
43 _PARTITION_DESIGNATOR_INVALID = -1
44};
45
4623e8e6
LP
46static inline int PARTITION_VERITY_OF(int p) {
47 if (p == PARTITION_ROOT)
48 return PARTITION_ROOT_VERITY;
49 if (p == PARTITION_ROOT_SECONDARY)
50 return PARTITION_ROOT_SECONDARY_VERITY;
51 return _PARTITION_DESIGNATOR_INVALID;
52}
53
18b5886e 54typedef enum DissectImageFlags {
2d3a5a73
LP
55 DISSECT_IMAGE_READ_ONLY = 1 << 0,
56 DISSECT_IMAGE_DISCARD_ON_LOOP = 1 << 1, /* Turn on "discard" if on a loop device and file system supports it */
57 DISSECT_IMAGE_DISCARD = 1 << 2, /* Turn on "discard" if file system supports it, on all block devices */
58 DISSECT_IMAGE_DISCARD_ON_CRYPTO = 1 << 3, /* Turn on "discard" also on crypto devices */
971e2ef0
ZJS
59 DISSECT_IMAGE_DISCARD_ANY = DISSECT_IMAGE_DISCARD_ON_LOOP |
60 DISSECT_IMAGE_DISCARD |
61 DISSECT_IMAGE_DISCARD_ON_CRYPTO,
2d3a5a73
LP
62 DISSECT_IMAGE_GPT_ONLY = 1 << 4, /* Only recognize images with GPT partition tables */
63 DISSECT_IMAGE_REQUIRE_ROOT = 1 << 5, /* Don't accept disks without root partition */
64 DISSECT_IMAGE_MOUNT_ROOT_ONLY = 1 << 6, /* Mount only the root partition */
65 DISSECT_IMAGE_MOUNT_NON_ROOT_ONLY = 1 << 7, /* Mount only non-root partitions */
5238e957 66 DISSECT_IMAGE_VALIDATE_OS = 1 << 8, /* Refuse mounting images that aren't identifiable as OS images */
052eaf5c 67 DISSECT_IMAGE_NO_UDEV = 1 << 9, /* Don't wait for udev initializing things */
d4dffb85 68 DISSECT_IMAGE_RELAX_VAR_CHECK = 1 << 10, /* Don't insist that the UUID of /var is hashed from /etc/machine-id */
cf32c486 69 DISSECT_IMAGE_FSCK = 1 << 11, /* File system check the partition before mounting (no effect when combined with DISSECT_IMAGE_READ_ONLY) */
e7cbe5cb 70 DISSECT_IMAGE_NO_PARTITION_TABLE = 1 << 12, /* Only recognize single file system images */
ac1f3ad0 71 DISSECT_IMAGE_VERITY_SHARE = 1 << 13, /* When activating a verity device, reuse existing one if already open */
5c05f062 72 DISSECT_IMAGE_MKDIR = 1 << 14, /* Make directory to mount right before mounting, if missing */
18b5886e 73} DissectImageFlags;
8c1be37e
LP
74
75struct DissectedImage {
4623e8e6
LP
76 bool encrypted:1;
77 bool verity:1; /* verity available and usable */
78 bool can_verity:1; /* verity available, but not necessarily used */
e7cbe5cb 79 bool single_file_system:1; /* MBR/GPT or single file system */
3b925504 80
8c1be37e 81 DissectedPartition partitions[_PARTITION_DESIGNATOR_MAX];
3b925504
LP
82
83 char *hostname;
84 sd_id128_t machine_id;
85 char **machine_info;
86 char **os_release;
8c1be37e
LP
87};
88
18d73705 89struct MountOptions {
9ece6444 90 int partition_designator;
18d73705
LB
91 char *options;
92 LIST_FIELDS(MountOptions, mount_options);
93};
94
95MountOptions* mount_options_free_all(MountOptions *options);
96DEFINE_TRIVIAL_CLEANUP_FUNC(MountOptions*, mount_options_free_all);
f5215bc8 97const char* mount_options_from_designator(const MountOptions *options, int designator);
18d73705 98
c34b75a1 99int probe_filesystem(const char *node, char **ret_fstype);
18d73705
LB
100int dissect_image(int fd, const void *root_hash, size_t root_hash_size, const char *verity_data, const MountOptions *mount_options, DissectImageFlags flags, DissectedImage **ret);
101int dissect_image_and_warn(int fd, const char *name, const void *root_hash, size_t root_hash_size, const char *verity_data, const MountOptions *mount_options, DissectImageFlags flags, DissectedImage **ret);
8c1be37e
LP
102
103DissectedImage* dissected_image_unref(DissectedImage *m);
104DEFINE_TRIVIAL_CLEANUP_FUNC(DissectedImage*, dissected_image_unref);
105
c2923fdc
LB
106int dissected_image_decrypt(DissectedImage *m, const char *passphrase, const void *root_hash, size_t root_hash_size, const char *verity_data, const char *root_hash_sig_path, const void *root_hash_sig, size_t root_hash_sig_size, DissectImageFlags flags, DecryptedImage **ret);
107int dissected_image_decrypt_interactively(DissectedImage *m, const char *passphrase, const void *root_hash, size_t root_hash_size, const char *verity_data, const char *root_hash_sig_path, const void *root_hash_sig, size_t root_hash_sig_size, DissectImageFlags flags, DecryptedImage **ret);
2d3a5a73 108int dissected_image_mount(DissectedImage *m, const char *dest, uid_t uid_shift, DissectImageFlags flags);
af187ab2 109int dissected_image_mount_and_warn(DissectedImage *m, const char *where, uid_t uid_shift, DissectImageFlags flags);
18b5886e 110
3b925504
LP
111int dissected_image_acquire_metadata(DissectedImage *m);
112
18b5886e
LP
113DecryptedImage* decrypted_image_unref(DecryptedImage *p);
114DEFINE_TRIVIAL_CLEANUP_FUNC(DecryptedImage*, decrypted_image_unref);
115int decrypted_image_relinquish(DecryptedImage *d);
8c1be37e
LP
116
117const char* partition_designator_to_string(int i) _const_;
118int partition_designator_from_string(const char *name) _pure_;
78ebe980 119
c2923fdc 120int verity_metadata_load(const char *image, const char *root_hash_path, void **ret_roothash, size_t *ret_roothash_size, char **ret_verity_data, char **ret_roothashsig);
e7cbe5cb
LB
121bool dissected_image_can_do_verity(const DissectedImage *image, unsigned partition_designator);
122bool dissected_image_has_verity(const DissectedImage *image, unsigned partition_designator);
6aa05ebd
LP
123
124int mount_image_privately_interactively(const char *path, DissectImageFlags flags, char **ret_directory, LoopDevice **ret_loop_device, DecryptedImage **ret_decrypted_image);