]>
Commit | Line | Data |
---|---|---|
53e1b683 | 1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
8c1be37e LP |
2 | #pragma once |
3 | ||
8c1be37e LP |
4 | #include <stdbool.h> |
5 | ||
dccca82b LP |
6 | #include "sd-id128.h" |
7 | ||
18d73705 | 8 | #include "list.h" |
6aa05ebd | 9 | #include "loop-util.h" |
8c1be37e LP |
10 | #include "macro.h" |
11 | ||
12 | typedef struct DissectedImage DissectedImage; | |
13 | typedef struct DissectedPartition DissectedPartition; | |
18b5886e | 14 | typedef struct DecryptedImage DecryptedImage; |
18d73705 | 15 | typedef struct MountOptions MountOptions; |
8c1be37e LP |
16 | |
17 | struct DissectedPartition { | |
18 | bool found:1; | |
19 | bool rw:1; | |
20 | int partno; /* -1 if there was no partition and the images contains a file system directly */ | |
21 | int architecture; /* Intended architecture: either native, secondary or unset (-1). */ | |
be30ad41 | 22 | sd_id128_t uuid; /* Partition entry UUID as reported by the GPT */ |
8c1be37e LP |
23 | char *fstype; |
24 | char *node; | |
18b5886e LP |
25 | char *decrypted_node; |
26 | char *decrypted_fstype; | |
18d73705 | 27 | char *mount_options; |
8c1be37e LP |
28 | }; |
29 | ||
30 | enum { | |
31 | PARTITION_ROOT, | |
32 | PARTITION_ROOT_SECONDARY, /* Secondary architecture */ | |
33 | PARTITION_HOME, | |
34 | PARTITION_SRV, | |
35 | PARTITION_ESP, | |
a8c47660 | 36 | PARTITION_XBOOTLDR, |
8c1be37e | 37 | PARTITION_SWAP, |
4623e8e6 LP |
38 | PARTITION_ROOT_VERITY, /* verity data for the PARTITION_ROOT partition */ |
39 | PARTITION_ROOT_SECONDARY_VERITY, /* verity data for the PARTITION_ROOT_SECONDARY partition */ | |
d4dffb85 LP |
40 | PARTITION_TMP, |
41 | PARTITION_VAR, | |
8c1be37e LP |
42 | _PARTITION_DESIGNATOR_MAX, |
43 | _PARTITION_DESIGNATOR_INVALID = -1 | |
44 | }; | |
45 | ||
4623e8e6 LP |
46 | static inline int PARTITION_VERITY_OF(int p) { |
47 | if (p == PARTITION_ROOT) | |
48 | return PARTITION_ROOT_VERITY; | |
49 | if (p == PARTITION_ROOT_SECONDARY) | |
50 | return PARTITION_ROOT_SECONDARY_VERITY; | |
51 | return _PARTITION_DESIGNATOR_INVALID; | |
52 | } | |
53 | ||
18b5886e | 54 | typedef enum DissectImageFlags { |
2d3a5a73 LP |
55 | DISSECT_IMAGE_READ_ONLY = 1 << 0, |
56 | DISSECT_IMAGE_DISCARD_ON_LOOP = 1 << 1, /* Turn on "discard" if on a loop device and file system supports it */ | |
57 | DISSECT_IMAGE_DISCARD = 1 << 2, /* Turn on "discard" if file system supports it, on all block devices */ | |
58 | DISSECT_IMAGE_DISCARD_ON_CRYPTO = 1 << 3, /* Turn on "discard" also on crypto devices */ | |
971e2ef0 ZJS |
59 | DISSECT_IMAGE_DISCARD_ANY = DISSECT_IMAGE_DISCARD_ON_LOOP | |
60 | DISSECT_IMAGE_DISCARD | | |
61 | DISSECT_IMAGE_DISCARD_ON_CRYPTO, | |
2d3a5a73 LP |
62 | DISSECT_IMAGE_GPT_ONLY = 1 << 4, /* Only recognize images with GPT partition tables */ |
63 | DISSECT_IMAGE_REQUIRE_ROOT = 1 << 5, /* Don't accept disks without root partition */ | |
64 | DISSECT_IMAGE_MOUNT_ROOT_ONLY = 1 << 6, /* Mount only the root partition */ | |
65 | DISSECT_IMAGE_MOUNT_NON_ROOT_ONLY = 1 << 7, /* Mount only non-root partitions */ | |
5238e957 | 66 | DISSECT_IMAGE_VALIDATE_OS = 1 << 8, /* Refuse mounting images that aren't identifiable as OS images */ |
052eaf5c | 67 | DISSECT_IMAGE_NO_UDEV = 1 << 9, /* Don't wait for udev initializing things */ |
d4dffb85 | 68 | DISSECT_IMAGE_RELAX_VAR_CHECK = 1 << 10, /* Don't insist that the UUID of /var is hashed from /etc/machine-id */ |
cf32c486 | 69 | DISSECT_IMAGE_FSCK = 1 << 11, /* File system check the partition before mounting (no effect when combined with DISSECT_IMAGE_READ_ONLY) */ |
e7cbe5cb | 70 | DISSECT_IMAGE_NO_PARTITION_TABLE = 1 << 12, /* Only recognize single file system images */ |
ac1f3ad0 | 71 | DISSECT_IMAGE_VERITY_SHARE = 1 << 13, /* When activating a verity device, reuse existing one if already open */ |
5c05f062 | 72 | DISSECT_IMAGE_MKDIR = 1 << 14, /* Make directory to mount right before mounting, if missing */ |
18b5886e | 73 | } DissectImageFlags; |
8c1be37e LP |
74 | |
75 | struct DissectedImage { | |
4623e8e6 LP |
76 | bool encrypted:1; |
77 | bool verity:1; /* verity available and usable */ | |
78 | bool can_verity:1; /* verity available, but not necessarily used */ | |
e7cbe5cb | 79 | bool single_file_system:1; /* MBR/GPT or single file system */ |
3b925504 | 80 | |
8c1be37e | 81 | DissectedPartition partitions[_PARTITION_DESIGNATOR_MAX]; |
3b925504 LP |
82 | |
83 | char *hostname; | |
84 | sd_id128_t machine_id; | |
85 | char **machine_info; | |
86 | char **os_release; | |
8c1be37e LP |
87 | }; |
88 | ||
18d73705 LB |
89 | struct MountOptions { |
90 | unsigned partition_number; | |
91 | char *options; | |
92 | LIST_FIELDS(MountOptions, mount_options); | |
93 | }; | |
94 | ||
95 | MountOptions* mount_options_free_all(MountOptions *options); | |
96 | DEFINE_TRIVIAL_CLEANUP_FUNC(MountOptions*, mount_options_free_all); | |
97 | const char* mount_options_from_part(const MountOptions *options, unsigned int partition_number); | |
98 | ||
c34b75a1 | 99 | int probe_filesystem(const char *node, char **ret_fstype); |
18d73705 LB |
100 | int dissect_image(int fd, const void *root_hash, size_t root_hash_size, const char *verity_data, const MountOptions *mount_options, DissectImageFlags flags, DissectedImage **ret); |
101 | int dissect_image_and_warn(int fd, const char *name, const void *root_hash, size_t root_hash_size, const char *verity_data, const MountOptions *mount_options, DissectImageFlags flags, DissectedImage **ret); | |
8c1be37e LP |
102 | |
103 | DissectedImage* dissected_image_unref(DissectedImage *m); | |
104 | DEFINE_TRIVIAL_CLEANUP_FUNC(DissectedImage*, dissected_image_unref); | |
105 | ||
c2923fdc LB |
106 | int dissected_image_decrypt(DissectedImage *m, const char *passphrase, const void *root_hash, size_t root_hash_size, const char *verity_data, const char *root_hash_sig_path, const void *root_hash_sig, size_t root_hash_sig_size, DissectImageFlags flags, DecryptedImage **ret); |
107 | int dissected_image_decrypt_interactively(DissectedImage *m, const char *passphrase, const void *root_hash, size_t root_hash_size, const char *verity_data, const char *root_hash_sig_path, const void *root_hash_sig, size_t root_hash_sig_size, DissectImageFlags flags, DecryptedImage **ret); | |
2d3a5a73 | 108 | int dissected_image_mount(DissectedImage *m, const char *dest, uid_t uid_shift, DissectImageFlags flags); |
af187ab2 | 109 | int dissected_image_mount_and_warn(DissectedImage *m, const char *where, uid_t uid_shift, DissectImageFlags flags); |
18b5886e | 110 | |
3b925504 LP |
111 | int dissected_image_acquire_metadata(DissectedImage *m); |
112 | ||
18b5886e LP |
113 | DecryptedImage* decrypted_image_unref(DecryptedImage *p); |
114 | DEFINE_TRIVIAL_CLEANUP_FUNC(DecryptedImage*, decrypted_image_unref); | |
115 | int decrypted_image_relinquish(DecryptedImage *d); | |
8c1be37e LP |
116 | |
117 | const char* partition_designator_to_string(int i) _const_; | |
118 | int partition_designator_from_string(const char *name) _pure_; | |
78ebe980 | 119 | |
c2923fdc | 120 | int verity_metadata_load(const char *image, const char *root_hash_path, void **ret_roothash, size_t *ret_roothash_size, char **ret_verity_data, char **ret_roothashsig); |
e7cbe5cb LB |
121 | bool dissected_image_can_do_verity(const DissectedImage *image, unsigned partition_designator); |
122 | bool dissected_image_has_verity(const DissectedImage *image, unsigned partition_designator); | |
6aa05ebd LP |
123 | |
124 | int mount_image_privately_interactively(const char *path, DissectImageFlags flags, char **ret_directory, LoopDevice **ret_loop_device, DecryptedImage **ret_decrypted_image); |