1 /* SPDX-License-Identifier: LGPL-2.1+ */
12 typedef struct DissectedImage DissectedImage
;
13 typedef struct DissectedPartition DissectedPartition
;
14 typedef struct DecryptedImage DecryptedImage
;
15 typedef struct MountOptions MountOptions
;
17 struct DissectedPartition
{
20 int partno
; /* -1 if there was no partition and the images contains a file system directly */
21 int architecture
; /* Intended architecture: either native, secondary or unset (-1). */
22 sd_id128_t uuid
; /* Partition entry UUID as reported by the GPT */
26 char *decrypted_fstype
;
32 PARTITION_ROOT_SECONDARY
, /* Secondary architecture */
38 PARTITION_ROOT_VERITY
, /* verity data for the PARTITION_ROOT partition */
39 PARTITION_ROOT_SECONDARY_VERITY
, /* verity data for the PARTITION_ROOT_SECONDARY partition */
42 _PARTITION_DESIGNATOR_MAX
,
43 _PARTITION_DESIGNATOR_INVALID
= -1
46 static inline int PARTITION_VERITY_OF(int p
) {
47 if (p
== PARTITION_ROOT
)
48 return PARTITION_ROOT_VERITY
;
49 if (p
== PARTITION_ROOT_SECONDARY
)
50 return PARTITION_ROOT_SECONDARY_VERITY
;
51 return _PARTITION_DESIGNATOR_INVALID
;
54 typedef enum DissectImageFlags
{
55 DISSECT_IMAGE_READ_ONLY
= 1 << 0,
56 DISSECT_IMAGE_DISCARD_ON_LOOP
= 1 << 1, /* Turn on "discard" if on a loop device and file system supports it */
57 DISSECT_IMAGE_DISCARD
= 1 << 2, /* Turn on "discard" if file system supports it, on all block devices */
58 DISSECT_IMAGE_DISCARD_ON_CRYPTO
= 1 << 3, /* Turn on "discard" also on crypto devices */
59 DISSECT_IMAGE_DISCARD_ANY
= DISSECT_IMAGE_DISCARD_ON_LOOP
|
60 DISSECT_IMAGE_DISCARD
|
61 DISSECT_IMAGE_DISCARD_ON_CRYPTO
,
62 DISSECT_IMAGE_GPT_ONLY
= 1 << 4, /* Only recognize images with GPT partition tables */
63 DISSECT_IMAGE_REQUIRE_ROOT
= 1 << 5, /* Don't accept disks without root partition */
64 DISSECT_IMAGE_MOUNT_ROOT_ONLY
= 1 << 6, /* Mount only the root partition */
65 DISSECT_IMAGE_MOUNT_NON_ROOT_ONLY
= 1 << 7, /* Mount only non-root partitions */
66 DISSECT_IMAGE_VALIDATE_OS
= 1 << 8, /* Refuse mounting images that aren't identifiable as OS images */
67 DISSECT_IMAGE_NO_UDEV
= 1 << 9, /* Don't wait for udev initializing things */
68 DISSECT_IMAGE_RELAX_VAR_CHECK
= 1 << 10, /* Don't insist that the UUID of /var is hashed from /etc/machine-id */
69 DISSECT_IMAGE_FSCK
= 1 << 11, /* File system check the partition before mounting (no effect when combined with DISSECT_IMAGE_READ_ONLY) */
70 DISSECT_IMAGE_NO_PARTITION_TABLE
= 1 << 12, /* Only recognize single file system images */
71 DISSECT_IMAGE_VERITY_SHARE
= 1 << 13, /* When activating a verity device, reuse existing one if already open */
72 DISSECT_IMAGE_MKDIR
= 1 << 14, /* Make directory to mount right before mounting, if missing */
75 struct DissectedImage
{
77 bool verity
:1; /* verity available and usable */
78 bool can_verity
:1; /* verity available, but not necessarily used */
79 bool single_file_system
:1; /* MBR/GPT or single file system */
81 DissectedPartition partitions
[_PARTITION_DESIGNATOR_MAX
];
84 sd_id128_t machine_id
;
90 int partition_designator
;
92 LIST_FIELDS(MountOptions
, mount_options
);
95 MountOptions
* mount_options_free_all(MountOptions
*options
);
96 DEFINE_TRIVIAL_CLEANUP_FUNC(MountOptions
*, mount_options_free_all
);
97 const char* mount_options_from_designator(const MountOptions
*options
, int designator
);
99 int probe_filesystem(const char *node
, char **ret_fstype
);
100 int dissect_image(int fd
, const void *root_hash
, size_t root_hash_size
, const char *verity_data
, const MountOptions
*mount_options
, DissectImageFlags flags
, DissectedImage
**ret
);
101 int dissect_image_and_warn(int fd
, const char *name
, const void *root_hash
, size_t root_hash_size
, const char *verity_data
, const MountOptions
*mount_options
, DissectImageFlags flags
, DissectedImage
**ret
);
103 DissectedImage
* dissected_image_unref(DissectedImage
*m
);
104 DEFINE_TRIVIAL_CLEANUP_FUNC(DissectedImage
*, dissected_image_unref
);
106 int dissected_image_decrypt(DissectedImage
*m
, const char *passphrase
, const void *root_hash
, size_t root_hash_size
, const char *verity_data
, const char *root_hash_sig_path
, const void *root_hash_sig
, size_t root_hash_sig_size
, DissectImageFlags flags
, DecryptedImage
**ret
);
107 int dissected_image_decrypt_interactively(DissectedImage
*m
, const char *passphrase
, const void *root_hash
, size_t root_hash_size
, const char *verity_data
, const char *root_hash_sig_path
, const void *root_hash_sig
, size_t root_hash_sig_size
, DissectImageFlags flags
, DecryptedImage
**ret
);
108 int dissected_image_mount(DissectedImage
*m
, const char *dest
, uid_t uid_shift
, DissectImageFlags flags
);
109 int dissected_image_mount_and_warn(DissectedImage
*m
, const char *where
, uid_t uid_shift
, DissectImageFlags flags
);
111 int dissected_image_acquire_metadata(DissectedImage
*m
);
113 DecryptedImage
* decrypted_image_unref(DecryptedImage
*p
);
114 DEFINE_TRIVIAL_CLEANUP_FUNC(DecryptedImage
*, decrypted_image_unref
);
115 int decrypted_image_relinquish(DecryptedImage
*d
);
117 const char* partition_designator_to_string(int i
) _const_
;
118 int partition_designator_from_string(const char *name
) _pure_
;
120 int verity_metadata_load(const char *image
, const char *root_hash_path
, void **ret_roothash
, size_t *ret_roothash_size
, char **ret_verity_data
, char **ret_roothashsig
);
121 bool dissected_image_can_do_verity(const DissectedImage
*image
, unsigned partition_designator
);
122 bool dissected_image_has_verity(const DissectedImage
*image
, unsigned partition_designator
);
124 int mount_image_privately_interactively(const char *path
, DissectImageFlags flags
, char **ret_directory
, LoopDevice
**ret_loop_device
, DecryptedImage
**ret_decrypted_image
);