Page MenuHomePhabricator

No OneTemporary

Size
132 KB
Referenced Files
None
Subscribers
None
diff --git a/trunk/BuildLibs.sh b/trunk/BuildLibs.sh
index b599d9c..48d6fee 100755
--- a/trunk/BuildLibs.sh
+++ b/trunk/BuildLibs.sh
@@ -1,47 +1,47 @@
#!/bin/bash
control_c() {
echo
echo Exiting
exit 0
}
trap control_c SIGINT
if [ -z "$1" ]; then
echo "Usage: $0 <jobs>"
exit 1
fi
JOBS=$1
(
cd libxmount_input/libxmount_input_aff/
echo
echo "Extracting libaff"
rm -rf libaff &>/dev/null
tar xfz libaff-*.tar.gz
echo
read -p "Ready to configure LIBAFF?"
cd libaff
./bootstrap.sh
- CFLAGS="-fPIC" CXXFLAGS="-fPIC" ./configure --disable-qemu --disable-libewf --disable-fuse --disable-shared --enable-static --disable-s3 --enable-threading
+ CFLAGS="-fPIC" CXXFLAGS="-fPIC" ./configure --disable-qemu --disable-libewf --disable-fuse --disable-s3 --disable-shared --enable-static --enable-threading
echo
read -p "Ready to compile LIBAFF?"
make -j$JOBS
)
(
cd libxmount_input/libxmount_input_ewf
echo
echo "Extracting libewf"
rm -rf libewf &>/dev/null
tar xfz libewf-*.tar.gz
echo
read -p "Ready to configure LIBEWF?"
cd libewf
CFLAGS="-fPIC" ./configure --disable-v1-api --disable-shared --enable-static --without-libbfio --without-libfuse --without-openssl
echo
read -p "Ready to compile LIBEWF?"
make -j$JOBS
)
diff --git a/trunk/CMakeLists.txt b/trunk/CMakeLists.txt
index 1579a25..69c0400 100644
--- a/trunk/CMakeLists.txt
+++ b/trunk/CMakeLists.txt
@@ -1,90 +1,93 @@
cmake_minimum_required(VERSION 2.8)
project(xmount C)
include(CheckIncludeFiles)
#include(CheckCSourceCompiles)
# Only for internal packaging
#set(STATIC_EWF 1)
#set(STATIC_AFF 1)
+if(APPLE)
+ # On OSx, do not try to find frameworks but only std headers / libraries
+ set(CMAKE_FIND_FRAMEWORK "NEVER")
+endif(APPLE)
+
# Make sure CMAKE_BUILD_TYPE is set
if(NOT CMAKE_BUILD_TYPE)
set(CMAKE_BUILD_TYPE "Release")
else(NOT CMAKE_BUILD_TYPE)
if(NOT (CMAKE_BUILD_TYPE STREQUAL "Release" OR
CMAKE_BUILD_TYPE STREQUAL "Debug"))
message(FATAL_ERROR "Only build types 'Release' and 'Debug' are supported!")
endif(NOT (CMAKE_BUILD_TYPE STREQUAL "Release" OR
CMAKE_BUILD_TYPE STREQUAL "Debug"))
endif(NOT CMAKE_BUILD_TYPE)
# Add cmake_modules dir to CMAKE_MODULE_PATH
set(CMAKE_MODULE_PATH ${CMAKE_MODULE_PATH} "${CMAKE_SOURCE_DIR}/cmake_modules/")
# Check required headers
check_include_files(stdlib.h HAVE_STDLIB_H)
check_include_files(stdio.h HAVE_STDIO_H)
check_include_files(stdint.h HAVE_STDINT_H)
check_include_files(stdarg.h HAVE_STDARG_H)
check_include_files(string.h HAVE_STRING_H)
check_include_files(errno.h HAVE_ERRNO_H)
check_include_files(fcntl.h HAVE_FCNTL_H)
check_include_files(dlfcn.h HAVE_DLFCN_H)
check_include_files(dirent.h HAVE_DIRENT_H)
check_include_files(unistd.h HAVE_UNISTD_H)
check_include_files(sys/ioctl.h HAVE_SYS_IOCTL_H)
check_include_files(sys/stat.h HAVE_SYS_STAT_H)
check_include_files(sys/types.h HAVE_SYS_TYPES_H)
check_include_files(linux/fs.h HAVE_LINUX_FS_H)
check_include_files(grp.h HAVE_GRP_H)
+check_include_files(pwd.h HAVE_PWD_H)
check_include_files(pthread.h HAVE_PTHREAD_H)
check_include_files(time.h HAVE_TIME_H)
check_include_files(inttypes.h HAVE_INTTYPES_H)
check_include_files(byteswap.h HAVE_BYTESWAP_H)
check_include_files(endian.h HAVE_ENDIAN_H)
check_include_files(libkern/OSByteOrder.h HAVE_LIBKERN_OSBYTEORDER_H)
# Check for required libs
if(NOT APPLE)
find_package(LibFUSE REQUIRED)
- include_directories(${LIBFUSE_INCLUDE_DIRS})
- set(LIBS ${LIBS} ${LIBFUSE_LIBRARIES})
else(NOT APPLE)
+ # On OSx, search for osxfuse
find_package(LibOSXFUSE REQUIRED)
- include_directories(${LIBOSXFUSE_INCLUDE_DIRS})
- set(LIBS ${LIBS} ${LIBOSXFUSE_LIBRARIES})
endif(NOT APPLE)
# Generate config.h and add it's path to the include dirs
configure_file(${CMAKE_CURRENT_SOURCE_DIR}/config.h.in
${CMAKE_CURRENT_BINARY_DIR}/config.h)
include_directories(${CMAKE_CURRENT_BINARY_DIR})
# Add preprocessor definitions
add_definitions(-D_LARGEFILE64_SOURCE)
add_definitions(-D_FILE_OFFSET_BITS=64)
add_definitions(-D_GNU_SOURCE)
set(CMAKE_C_FLAGS "-fno-strict-aliasing -std=c99 -Wall")
set(CMAKE_C_FLAGS_RELEASE "-O2 ${CMAKE_C_FLAGS}")
set(CMAKE_C_FLAGS_DEBUG "-ggdb -O0 ${CMAKE_C_FLAGS}")
# Check that off_t can represent 2**63 - 1 correctly.
# If it can't, we need to set _FILE_OFFSET_BITS=64
#check_c_source_compiles("
# #include <sys/types.h>
# #define LARGE_OFF_T (((off_t) 1 << 62) - 1 + ((off_t) 1 << 62))
# int off_t_is_large[(LARGE_OFF_T % 2147483629 == 721 && LARGE_OFF_T % 2147483647 == 1) ? 1 : -1];
# int main() { return 0; }
#" _OFFT_IS_64BIT)
#if(NOT ${_OFFT_IS_64BIT})
# set(CMAKE_C_FLAGS ${CMAKE_C_FLAGS} "-D_FILE_OFFSET_BITS=64")
#endif(NOT ${_OFFT_IS_64BIT})
# Compile stuff in sub dirs
add_subdirectory(libxmount_input)
add_subdirectory(src)
# Install man page
INSTALL(FILES ${CMAKE_CURRENT_SOURCE_DIR}/xmount.1 DESTINATION share/man/man1)
diff --git a/trunk/config.h.in b/trunk/config.h.in
index 50a71c7..dc1d9fe 100644
--- a/trunk/config.h.in
+++ b/trunk/config.h.in
@@ -1,45 +1,47 @@
/*******************************************************************************
* xmount Copyright (c) 2008-2014 by Gillen Daniel <gillen.dan@pinguin.lu> *
* *
* xmount is a small tool to "fuse mount" various harddisk image formats as dd, *
* vdi, vhd or vmdk files and enable virtual write access to them. *
* *
* This program is free software: you can redistribute it and/or modify it *
* under the terms of the GNU General Public License as published by the Free *
* Software Foundation, either version 3 of the License, or (at your option) *
* any later version. *
* *
* This program is distributed in the hope that it will be useful, but WITHOUT *
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or *
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for *
* more details. *
* *
* You should have received a copy of the GNU General Public License along with *
* this program. If not, see <http://www.gnu.org/licenses/>. *
*******************************************************************************/
#ifndef CONFIG_H
#define CONFIG_H
#cmakedefine HAVE_STDLIB_H 1
#cmakedefine HAVE_STDIO_H 1
#cmakedefine HAVE_STDINT_H 1
#cmakedefine HAVE_STDARG_H 1
#cmakedefine HAVE_STRING_H 1
#cmakedefine HAVE_ERRNO_H 1
#cmakedefine HAVE_FCNTL_H 1
#cmakedefine HAVE_DLFCN_H 1
#cmakedefine HAVE_DIRENT_H 1
#cmakedefine HAVE_UNISTD_H 1
#cmakedefine HAVE_SYS_IOCTL_H 1
#cmakedefine HAVE_SYS_TYPES_H 1
#cmakedefine HAVE_LINUX_FS_H 1
+#cmakedefine HAVE_GRP_H 1
+#cmakedefine HAVE_PWD_H 1
#cmakedefine HAVE_PTHREAD_H 1
#cmakedefine HAVE_TIME_H 1
#cmakedefine HAVE_INTTYPES_H 1
#cmakedefine HAVE_BYTESWAP_H 1
#cmakedefine HAVE_ENDIAN_H 1
#cmakedefine HAVE_LIBKERN_OSBYTEORDER_H 1
#endif // CONFIG_H
diff --git a/trunk/libxmount_input/CMakeLists.txt b/trunk/libxmount_input/CMakeLists.txt
index c8186ae..b6b8293 100644
--- a/trunk/libxmount_input/CMakeLists.txt
+++ b/trunk/libxmount_input/CMakeLists.txt
@@ -1,27 +1,29 @@
add_subdirectory(libxmount_input_dd)
if(NOT STATIC_EWF)
find_package(LibEWF)
if(LIBEWF_FOUND)
add_subdirectory(libxmount_input_ewf)
endif(LIBEWF_FOUND)
else(NOT STATIC_EWF)
+ message("-- Not checking for LibEWF (STATIC_EWF = 1)")
add_subdirectory(libxmount_input_ewf)
endif(NOT STATIC_EWF)
if(NOT STATIC_AFF)
find_package(LibAFF)
find_package(OpenSSL)
if(LIBAFF_FOUND AND OPENSSL_FOUND)
add_subdirectory(libxmount_input_aff)
endif(LIBAFF_FOUND AND OPENSSL_FOUND)
else(NOT STATIC_AFF)
+ message("-- Not checking for LibAFF (STATIC_AFF = 1)")
add_subdirectory(libxmount_input_aff)
endif(NOT STATIC_AFF)
#find_package(LibZ)
#if(LIBZ_FOUND)
# add_subdirectory(libxmount_input_aewf)
# add_subdirectory(libxmount_input_aaff)
#endif(LIBZ_FOUND)
diff --git a/trunk/libxmount_input/libxmount_input_aff/CMakeLists.txt b/trunk/libxmount_input/libxmount_input_aff/CMakeLists.txt
index 5f4de19..1825382 100644
--- a/trunk/libxmount_input/libxmount_input_aff/CMakeLists.txt
+++ b/trunk/libxmount_input/libxmount_input_aff/CMakeLists.txt
@@ -1,24 +1,36 @@
if(POLICY CMP0042)
cmake_policy(SET CMP0042 NEW) # CMake 3.0
endif(POLICY CMP0042)
project(libxmount_input_aff C)
add_library(xmount_input_aff SHARED libxmount_input_aff.c)
if(NOT STATIC_AFF)
include_directories(${LIBAFF_INCLUDE_DIRS})
include_directories(${OPENSSL_INCLUDE_DIRS})
set(LIBS ${LIBS} ${LIBAFF_LIBRARIES})
set(LIBS ${LIBS} ${OPENSSL_LIBRARIES})
else(NOT STATIC_AFF)
+ add_definitions(-DHAVE_LIBAFF_STATIC)
include_directories(${CMAKE_CURRENT_SOURCE_DIR}/libaff/lib)
set(LIBS ${LIBS} ${CMAKE_CURRENT_SOURCE_DIR}/libaff/lib/.libs/libafflib.a)
- set(LIBS ${LIBS} "-lstdc++ -lcrypto -lssl -lrt -lz")
- add_definitions(-DHAVE_LIBAFF_STATIC)
+ if(NOT APPLE)
+ set(LIBS ${LIBS} "-lstdc++ -lcrypto -lssl -lrt -lz")
+ else(NOT APPLE)
+ # As most of afflib's deps on OSx come from MacPorts, better link in
+ # everything statically
+ set(LIBS ${LIBS} "/opt/local/lib/libcrypto.a")
+ set(LIBS ${LIBS} "/opt/local/lib/libssl.a")
+ set(LIBS ${LIBS} "/opt/local/lib/libexpat.a")
+ set(LIBS ${LIBS} "/opt/local/lib/libncurses.a")
+ set(LIBS ${LIBS} "/opt/local/lib/libreadline.a")
+ set(LIBS ${LIBS} "/opt/local/lib/libz.a")
+ set(LIBS ${LIBS} "-lstdc++")
+ endif(NOT APPLE)
endif(NOT STATIC_AFF)
target_link_libraries(xmount_input_aff ${LIBS})
install(TARGETS xmount_input_aff DESTINATION lib/xmount)
diff --git a/trunk/libxmount_input/libxmount_input_ewf/CMakeLists.txt b/trunk/libxmount_input/libxmount_input_ewf/CMakeLists.txt
index 1fca957..84fc848 100644
--- a/trunk/libxmount_input/libxmount_input_ewf/CMakeLists.txt
+++ b/trunk/libxmount_input/libxmount_input_ewf/CMakeLists.txt
@@ -1,22 +1,28 @@
if(POLICY CMP0042)
cmake_policy(SET CMP0042 NEW) # CMake 3.0
endif(POLICY CMP0042)
project(libxmount_input_ewf C)
add_library(xmount_input_ewf SHARED libxmount_input_ewf.c)
if(NOT STATIC_EWF)
include_directories(${LIBEWF_INCLUDE_DIRS})
set(LIBS ${LIBS} ${LIBEWF_LIBRARIES})
else(NOT STATIC_EWF)
+ add_definitions(-DHAVE_LIBEWF_STATIC)
include_directories(${CMAKE_CURRENT_SOURCE_DIR}/libewf/include)
set(LIBS ${LIBS} ${CMAKE_CURRENT_SOURCE_DIR}/libewf/libewf/.libs/libewf.a)
- set(LIBS ${LIBS} -lz)
- add_definitions(-DHAVE_LIBEWF_STATIC)
+ if(NOT APPLE)
+ set(LIBS ${LIBS} -lz)
+ else(NOT APPLE)
+ # As most of libewf's deps on OSx come from MacPorts, better link in
+ # everything statically
+ set(LIBS ${LIBS} "/opt/local/lib/libz.a")
+ endif(NOT APPLE)
endif(NOT STATIC_EWF)
target_link_libraries(xmount_input_ewf ${LIBS})
install(TARGETS xmount_input_ewf DESTINATION lib/xmount)
diff --git a/trunk/src/xmount.c b/trunk/src/xmount.c
index 688abd3..033b894 100755
--- a/trunk/src/xmount.c
+++ b/trunk/src/xmount.c
@@ -1,3197 +1,3218 @@
/*******************************************************************************
* xmount Copyright (c) 2008-2014 by Gillen Daniel <gillen.dan@pinguin.lu> *
* *
* xmount is a small tool to "fuse mount" various harddisk image formats as dd, *
* vdi, vhd or vmdk files and enable virtual write access to them. *
* *
* This program is free software: you can redistribute it and/or modify it *
* under the terms of the GNU General Public License as published by the Free *
* Software Foundation, either version 3 of the License, or (at your option) *
* any later version. *
* *
* This program is distributed in the hope that it will be useful, but WITHOUT *
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or *
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for *
* more details. *
* *
* You should have received a copy of the GNU General Public License along with *
* this program. If not, see <http://www.gnu.org/licenses/>. *
*******************************************************************************/
#include <config.h>
#include <stdio.h>
#include <stdlib.h>
#include <stdint.h>
#include <stdarg.h>
#include <string.h>
#include <inttypes.h> // For PRI*
#include <errno.h>
#include <dlfcn.h> // For dlopen, dlclose, dlsym
#include <dirent.h> // For opendir, readdir, closedir
#include <unistd.h>
#include <sys/ioctl.h>
#include <sys/stat.h> // For fstat
#include <sys/types.h>
#ifdef HAVE_LINUX_FS_H
#include <linux/fs.h> // For SEEK_* ??
#endif
-#include <grp.h> // For getgrnam
+#if !defined(__APPLE__) && defined(HAVE_GRP_H) && defined(HAVE_PWD_H)
+ #include <grp.h> // For getgrnam, struct group
+ #include <pwd.h> // For getpwuid, struct passwd
+#endif
#include <pthread.h>
#include <time.h> // For time
#define FUSE_USE_VERSION 26
#include <fuse.h>
#include "xmount.h"
#include "md5.h"
#include "endianness.h"
#include "macros.h"
#define XMOUNT_COPYRIGHT_NOTICE \
"xmount v%s Copyright (c) 2008-2014 by Gillen Daniel <gillen.dan@pinguin.lu>"
/*******************************************************************************
* Global vars
******************************************************************************/
//! Struct that contains various runtime configuration options
static ts_XmountConfData glob_xmount_cfg;
//! Struct containing pointers to the libxmount_input functions
static pts_InputLib *glob_pp_input_libs=NULL;
static uint32_t glob_input_libs_count=0;
static pts_LibXmountInputFunctions glob_p_input_functions=NULL;
//! Handle for input image
static void *glob_p_input_image=NULL;
//! Pointer to virtual info file
static char *glob_p_info_file=NULL;
//! Vars needed for VDI emulation
static pts_VdiFileHeader glob_p_vdi_header=NULL;
static uint32_t glob_vdi_header_size=0;
static char *glob_p_vdi_block_map=NULL;
static uint32_t glob_p_vdi_block_map_size=0;
//! Vars needed for VHD emulation
static ts_VhdFileHeader *glob_p_vhd_header=NULL;
//! Vars needed for VMDK emulation
static char *glob_p_vmdk_file=NULL;
static int glob_vmdk_file_size=0;
static char *glob_p_vmdk_lockdir1=NULL;
static char *glob_p_vmdk_lockdir2=NULL;
static char *glob_p_vmdk_lockfile_data=NULL;
static int glob_vmdk_lockfile_size=0;
static char *glob_p_vmdk_lockfile_name=NULL;
//! Vars needed for virtual write access
static FILE *glob_p_cache_file=NULL;
static pts_CacheFileHeader glob_p_cache_header=NULL;
static pts_CacheFileBlockIndex glob_p_cache_blkidx=NULL;
//! Mutexes to control concurrent read & write access
static pthread_mutex_t glob_mutex_image_rw;
static pthread_mutex_t glob_mutex_info_read;
/*******************************************************************************
* Helper functions
******************************************************************************/
//! Print error and debug messages to stdout
/*!
* \param p_msg_type "ERROR" or "DEBUG"
* \param p_calling_fun Name of calling function
* \param line Line number of call
* \param p_msg Message string
* \param ... Variable params with values to include in message string
*/
static void LogMessage(char *p_msg_type,
char *p_calling_fun,
int line,
char *p_msg,
...)
{
va_list var_list;
// Print message "header"
printf("%s: %s.%s@%u : ",p_msg_type,p_calling_fun,XMOUNT_VERSION,line);
// Print message with variable parameters
va_start(var_list,p_msg);
vprintf(p_msg,var_list);
va_end(var_list);
}
//! Print usage instructions (cmdline options etc..)
/*!
* \param p_prog_name Program name (argv[0])
*/
static void PrintUsage(char *p_prog_name) {
char *p_buf;
int first=1;
printf("\n" XMOUNT_COPYRIGHT_NOTICE "\n",XMOUNT_VERSION);
printf("\nUsage:\n");
printf(" %s [[fopts] [mopts]] <ifile> [<ifile> [...]] <mntp>\n\n",
p_prog_name);
printf("Options:\n");
printf(" fopts:\n");
printf(" -d : Enable FUSE's and xmount's debug mode.\n");
printf(" -h : Display this help message.\n");
printf(" -s : Run single threaded.\n");
printf(" -o no_allow_other : Disable automatic addition of FUSE's "
"allow_other option.\n");
printf(" -o <fmopts> : Specify fuse mount options. Will also disable "
"automatic\n");
printf(" addition of FUSE's allow_other option!\n");
printf(" INFO: For VMDK emulation, you have to uncomment "
"\"user_allow_other\" in\n");
printf(" /etc/fuse.conf or run xmount as root.\n");
printf("\n");
printf(" mopts:\n");
printf(" --cache <file> : Enable virtual write support and set cachefile "
"to use.\n");
printf(" --in <itype> : Input image format. <itype> can be ");
// List supported input types
for(uint32_t i=0;i<glob_input_libs_count;i++) {
p_buf=glob_pp_input_libs[i]->p_supported_input_types;
while(*p_buf!='\0') {
if(first==1) {
printf("\"%s\"",p_buf);
first=0;
} else printf(", \"%s\"",p_buf);
p_buf+=(strlen(p_buf)+1);
}
}
printf(".\n");
printf(" --inopts <iopts> : Specify input library specific options.\n");
printf(" --info : Print out infos about used compiler and libraries.\n");
printf(" --offset <off> : Move the output image data start <off> bytes "
"into the input image.\n");
printf(" --out <otype> : Output image format. "
"<otype> can be \"dd\", \"dmg\", \"vdi\", \"vhd\", \"vmdk(s)\".\n");
printf(" --owcache <file> : Same as --cache <file> but overwrites "
"existing cache.\n");
printf(" --rw <file> : Same as --cache <file>.\n");
printf(" --version : Same as --info.\n");
#ifndef __APPLE__
printf(" INFO: Input and output image type defaults to \"dd\" if not "
"specified.\n");
#else
printf(" INFO: Input image type defaults to \"dd\" and output image type "
"defaults to \"dmg\" if not specified.\n");
#endif
printf(" WARNING: Output image type \"vmdk(s)\" should be considered "
"experimental!\n");
printf("\n");
printf(" ifile:\n");
printf(" Input image file. If your input image is split into multiple "
"files, you have to specify them all!\n");
printf("\n");
printf(" mntp:\n");
printf(" Mount point where virtual files should be located.\n");
printf("\n");
printf(" iopts:\n");
printf(" Some input libraries might support an own set of options to "
"configure / tune their behaviour.\n");
printf(" Input libraries supporting this feature (if any) and and their "
"options are listed below.\n");
printf("\n");
// List input lib options
for(uint32_t i=0;i<glob_input_libs_count;i++) {
p_buf=(char*)glob_pp_input_libs[i]->lib_functions.OptionsHelp();
if(p_buf==NULL) continue;
printf(" - %s\n",glob_pp_input_libs[i]->p_name);
printf("%s\n",p_buf);
printf("\n");
}
}
//! Check fuse settings
/*!
* Check if FUSE allows us to pass the -o allow_other parameter. This only works
* if we are root or user_allow_other is set in /etc/fuse.conf.
*
* In addition, this function also checks if the user is member of the fuse
* group which is generally needed to use fuse at all.
*/
static void CheckFuseSettings() {
+#if !defined(__APPLE__) && defined(HAVE_GRP_H) && defined(HAVE_PWD_H)
+ struct group *p_group;
+ struct passwd *p_passwd;
+#endif
+ int found;
FILE *h_fuse_conf;
char line[256];
- int found;
- struct group *p_group;
- char *p_username;
+
+ glob_xmount_cfg.may_set_fuse_allow_other=FALSE;
if(geteuid()==0) {
// Running as root, there should be no problems
glob_xmount_cfg.may_set_fuse_allow_other=TRUE;
return;
}
- // Check if a fuse group exists and if so, make sure user is a member of it
+#if !defined(__APPLE__) && defined(HAVE_GRP_H) && defined(HAVE_PWD_H)
+ // Check if a fuse group exists and if so, make sure user is a member of it.
+ // Makes only sense on Linux because as far as I know osxfuse has no own group
p_group=getgrnam("fuse");
if(p_group!=NULL) {
// Get effective user name
- p_username=cuserid(NULL);
+ p_passwd=getpwuid(geteuid());
+ if(p_passwd==NULL) {
+ printf("\nWARNING: Unable to determine your effective user name. If "
+ "mounting works, you can ignore this message.\n\n");
+ return;
+ }
// Check if user is member of fuse group
found=FALSE;
while(*(p_group->gr_mem)!=NULL) {
- if(strcmp(*(p_group->gr_mem),p_username)==0) {
+ if(strcmp(*(p_group->gr_mem),p_passwd->pw_name)==0) {
found=TRUE;
break;
}
p_group->gr_mem++;
}
if(found==FALSE) {
printf("\nWARNING: You are not a member of the \"fuse\" group. This will "
"prevent you from mounting images using xmount. Please add "
"yourself to the \"fuse\" group using the command "
"\"sudo usermod -a -G fuse %s\" and reboot your system or "
"execute xmount as root.\n\n",
- p_username);
+ p_passwd->pw_name);
return;
}
} else {
printf("\nWARNING: Your system does not seem to have a \"fuse\" group. If "
"mounting works, you can ignore this message.\n\n");
}
+#endif
// Read FUSE's config file /etc/fuse.conf and check for set user_allow_other
h_fuse_conf=(FILE*)FOPEN("/etc/fuse.conf","r");
if(h_fuse_conf!=NULL) {
// Search conf file for set user_allow_others
found=FALSE;
while(fgets(line,sizeof(line),h_fuse_conf)!=NULL) {
// TODO: This works as long as there is no other parameter beginning with
// "user_allow_other" :)
if(strncmp(line,"user_allow_other",16)==0) {
found=TRUE;
break;
}
}
fclose(h_fuse_conf);
- if(found==FALSE) {
+ if(found==TRUE) {
+ glob_xmount_cfg.may_set_fuse_allow_other=TRUE;
+ } else {
printf("\nWARNING: FUSE will not allow other users nor root to access "
"your virtual harddisk image. To change this behavior, please "
"add \"user_allow_other\" to /etc/fuse.conf or execute xmount "
"as root.\n\n");
- glob_xmount_cfg.may_set_fuse_allow_other=FALSE;
}
} else {
printf("\nWARNING: Unable to open /etc/fuse.conf. If mounting works, you "
- "can ignore this message.\n\n");
- glob_xmount_cfg.may_set_fuse_allow_other=FALSE;
+ "can ignore this message. If you encounter issues, please create "
+ "the file and add a single line containing the string "
+ "\"user_allow_other\" or execute xmount as root.\n\n");
+ return;
}
}
//! Parse command line options
/*!
* \param argc Number of cmdline params
* \param pp_argv Array containing cmdline params
* \param p_nargv Number of FUSE options is written to this var
* \param ppp_nargv FUSE options are written to this array
* \param p_filename_count Number of input image files is written to this var
* \param ppp_filenames Input image filenames are written to this array
* \param pp_mountpoint Mountpoint is written to this var
* \return TRUE on success, FALSE on error
*/
static int ParseCmdLine(const int argc,
char **pp_argv,
int *p_nargv,
char ***ppp_nargv,
int *p_filename_count,
char ***ppp_filenames,
char **pp_mountpoint)
{
int i=1,files=0,opts=0,FuseMinusOControl=TRUE,FuseAllowOther=TRUE,first;
char *p_buf;
// add pp_argv[0] to ppp_nargv
opts++;
XMOUNT_MALLOC(*ppp_nargv,char**,opts*sizeof(char*))
XMOUNT_STRSET((*ppp_nargv)[opts-1],pp_argv[0])
// Parse options
while(i<argc && *pp_argv[i]=='-') {
if(strlen(pp_argv[i])>1 && *(pp_argv[i]+1)!='-') {
// Options beginning with - are mostly FUSE specific
if(strcmp(pp_argv[i],"-d")==0) {
// Enable FUSE's and xmount's debug mode
opts++;
XMOUNT_REALLOC(*ppp_nargv,char**,opts*sizeof(char*))
XMOUNT_STRSET((*ppp_nargv)[opts-1],pp_argv[i])
glob_xmount_cfg.debug=TRUE;
} else if(strcmp(pp_argv[i],"-h")==0) {
// Print help message
PrintUsage(pp_argv[0]);
exit(1);
} else if(strcmp(pp_argv[i],"-o")==0) {
// Next parameter specifies fuse / lib mount options
if((argc+1)>i) {
i++;
// As the user specified the -o option, we assume he knows what he is
// doing. We won't append allow_other automatically. And we allow him
// to disable allow_other by passing a single "-o no_allow_other"
// which won't be passed to FUSE as it is xmount specific.
if(strcmp(pp_argv[i],"no_allow_other")!=0) {
opts+=2;
XMOUNT_REALLOC(*ppp_nargv,char**,opts*sizeof(char*))
XMOUNT_STRSET((*ppp_nargv)[opts-2],pp_argv[i-1])
XMOUNT_STRSET((*ppp_nargv)[opts-1],pp_argv[i])
FuseMinusOControl=FALSE;
} else FuseAllowOther=FALSE;
} else {
LOG_ERROR("Couldn't parse mount options!\n")
PrintUsage(pp_argv[0]);
exit(1);
}
} else if(strcmp(pp_argv[i],"-s")==0) {
// Enable FUSE's single threaded mode
opts++;
XMOUNT_REALLOC(*ppp_nargv,char**,opts*sizeof(char*))
XMOUNT_STRSET((*ppp_nargv)[opts-1],pp_argv[i])
} else if(strcmp(pp_argv[i],"-V")==0) {
// Display FUSE version info
opts++;
XMOUNT_REALLOC(*ppp_nargv,char**,opts*sizeof(char*))
XMOUNT_STRSET((*ppp_nargv)[opts-1],pp_argv[i])
} else {
LOG_ERROR("Unknown command line option \"%s\"\n",pp_argv[i]);
PrintUsage(pp_argv[0]);
exit(1);
}
} else {
// Options beginning with -- are xmount specific
if(strcmp(pp_argv[i],"--cache")==0 || strcmp(pp_argv[i],"--rw")==0) {
// Emulate writable access to mounted image
// Next parameter must be cache file to read/write changes from/to
if((argc+1)>i) {
i++;
XMOUNT_STRSET(glob_xmount_cfg.p_cache_file,pp_argv[i])
glob_xmount_cfg.writable=TRUE;
} else {
LOG_ERROR("You must specify a cache file!\n")
PrintUsage(pp_argv[0]);
exit(1);
}
LOG_DEBUG("Enabling virtual write support using cache file \"%s\"\n",
glob_xmount_cfg.p_cache_file)
} else if(strcmp(pp_argv[i],"--in")==0) {
// Specify input image type
// Next parameter must be image type
if((argc+1)>i) {
i++;
if(glob_xmount_cfg.p_orig_image_type==NULL) {
XMOUNT_STRSET(glob_xmount_cfg.p_orig_image_type,pp_argv[i]);
LOG_DEBUG("Setting input image type to '%s'\n",pp_argv[i]);
} else {
LOG_ERROR("You can only specify --in once!")
PrintUsage(pp_argv[0]);
exit(1);
}
} else {
LOG_ERROR("You must specify an input image type!\n");
PrintUsage(pp_argv[0]);
exit(1);
}
} else if(strcmp(pp_argv[i],"--inopts")==0) {
if((argc+1)>i) {
i++;
if(glob_xmount_cfg.p_lib_params==NULL) {
XMOUNT_STRSET(glob_xmount_cfg.p_lib_params,pp_argv[i]);
} else {
LOG_ERROR("You can only specify --inopts once!")
PrintUsage(pp_argv[0]);
exit(1);
}
} else {
LOG_ERROR("You must specify special options!\n");
PrintUsage(pp_argv[0]);
exit(1);
}
} else if(strcmp(pp_argv[i],"--out")==0) {
// Specify output image type
// Next parameter must be image type
if((argc+1)>i) {
i++;
if(strcmp(pp_argv[i],"dd")==0) {
glob_xmount_cfg.VirtImageType=VirtImageType_DD;
LOG_DEBUG("Setting virtual image type to DD\n")
} else if(strcmp(pp_argv[i],"dmg")==0) {
glob_xmount_cfg.VirtImageType=VirtImageType_DMG;
LOG_DEBUG("Setting virtual image type to DMG\n")
} else if(strcmp(pp_argv[i],"vdi")==0) {
glob_xmount_cfg.VirtImageType=VirtImageType_VDI;
LOG_DEBUG("Setting virtual image type to VDI\n")
} else if(strcmp(pp_argv[i],"vhd")==0) {
glob_xmount_cfg.VirtImageType=VirtImageType_VHD;
LOG_DEBUG("Setting virtual image type to VHD\n")
} else if(strcmp(pp_argv[i],"vmdk")==0) {
glob_xmount_cfg.VirtImageType=VirtImageType_VMDK;
LOG_DEBUG("Setting virtual image type to VMDK\n")
} else if(strcmp(pp_argv[i],"vmdks")==0) {
glob_xmount_cfg.VirtImageType=VirtImageType_VMDKS;
LOG_DEBUG("Setting virtual image type to VMDKS\n")
} else {
LOG_ERROR("Unknown output image type \"%s\"!\n",pp_argv[i])
PrintUsage(pp_argv[0]);
exit(1);
}
} else {
LOG_ERROR("You must specify an output image type!\n");
PrintUsage(pp_argv[0]);
exit(1);
}
} else if(strcmp(pp_argv[i],"--owcache")==0) {
// Enable writable access to mounted image and overwrite existing cache
// Next parameter must be cache file to read/write changes from/to
if((argc+1)>i) {
i++;
XMOUNT_STRSET(glob_xmount_cfg.p_cache_file,pp_argv[i])
glob_xmount_cfg.writable=TRUE;
glob_xmount_cfg.overwrite_cache=TRUE;
} else {
LOG_ERROR("You must specify a cache file!\n")
PrintUsage(pp_argv[0]);
exit(1);
}
LOG_DEBUG("Enabling virtual write support overwriting cache file %s\n",
glob_xmount_cfg.p_cache_file)
} else if(strcmp(pp_argv[i],"--version")==0 ||
strcmp(pp_argv[i],"--info")==0)
{
printf(XMOUNT_COPYRIGHT_NOTICE "\n\n",XMOUNT_VERSION);
#ifdef __GNUC__
printf(" compile timestamp: %s %s\n",__DATE__,__TIME__);
printf(" gcc version: %s\n",__VERSION__);
#endif
printf(" loaded input libraries:\n");
for(uint32_t ii=0;ii<glob_input_libs_count;ii++) {
printf(" - %s supporting ",glob_pp_input_libs[ii]->p_name);
p_buf=glob_pp_input_libs[ii]->p_supported_input_types;
first=TRUE;
while(*p_buf!='\0') {
if(first) {
printf("\"%s\"",p_buf);
first=FALSE;
} else printf(", \"%s\"",p_buf);
p_buf+=(strlen(p_buf)+1);
}
printf("\n");
}
printf("\n");
exit(0);
} else if(strcmp(pp_argv[i],"--offset")==0) {
if((argc+1)>i) {
i++;
glob_xmount_cfg.orig_img_offset=strtoull(pp_argv[i],NULL,10);
} else {
LOG_ERROR("You must specify an offset!\n")
PrintUsage(pp_argv[0]);
exit(1);
}
LOG_DEBUG("Setting input image offset to \"%" PRIu64 "\"\n",
glob_xmount_cfg.orig_img_offset)
} else {
LOG_ERROR("Unknown command line option \"%s\"\n",pp_argv[i]);
PrintUsage(pp_argv[0]);
exit(1);
}
}
i++;
}
// Parse input image filename(s)
while(i<(argc-1)) {
files++;
XMOUNT_REALLOC(*ppp_filenames,char**,files*sizeof(char*))
XMOUNT_STRSET((*ppp_filenames)[files-1],pp_argv[i])
i++;
}
if(files==0) {
LOG_ERROR("No input files specified!\n")
PrintUsage(pp_argv[0]);
exit(1);
}
*p_filename_count=files;
// Extract mountpoint
if(i==(argc-1)) {
XMOUNT_STRSET(*pp_mountpoint,pp_argv[argc-1])
opts++;
XMOUNT_REALLOC(*ppp_nargv,char**,opts*sizeof(char*))
XMOUNT_STRSET((*ppp_nargv)[opts-1],*pp_mountpoint)
} else {
LOG_ERROR("No mountpoint specified!\n")
PrintUsage(pp_argv[0]);
exit(1);
}
if(FuseMinusOControl==TRUE) {
// We control the -o flag, set subtype, fsname and allow_other options
opts+=2;
XMOUNT_REALLOC(*ppp_nargv,char**,opts*sizeof(char*))
XMOUNT_STRSET((*ppp_nargv)[opts-2],"-o")
XMOUNT_STRSET((*ppp_nargv)[opts-1],"subtype=xmount,fsname=")
XMOUNT_STRAPP((*ppp_nargv)[opts-1],(*ppp_filenames)[0])
if(FuseAllowOther==TRUE) {
// Try to add "allow_other" to FUSE's cmd-line params
if(glob_xmount_cfg.may_set_fuse_allow_other) {
XMOUNT_STRAPP((*ppp_nargv)[opts-1],",allow_other")
}
}
}
*p_nargv=opts;
return TRUE;
}
//! Extract virtual file name from input image name
/*!
* \param p_orig_name Name of input image (may include a path)
* \return TRUE on success, FALSE on error
*/
static int ExtractVirtFileNames(char *p_orig_name) {
char *tmp;
// Truncate any leading path
tmp=strrchr(p_orig_name,'/');
if(tmp!=NULL) p_orig_name=tmp+1;
// Extract file extension
tmp=strrchr(p_orig_name,'.');
// Set leading '/'
XMOUNT_STRSET(glob_xmount_cfg.p_virtual_image_path,"/")
XMOUNT_STRSET(glob_xmount_cfg.p_virtual_info_path,"/")
if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK ||
glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS)
{
XMOUNT_STRSET(glob_xmount_cfg.p_virtual_vmdk_path,"/")
}
// Copy filename
if(tmp==NULL) {
// Input image filename has no extension
XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_image_path,p_orig_name)
XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_info_path,p_orig_name)
if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK ||
glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS)
{
XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_vmdk_path,p_orig_name)
}
XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_info_path,".info")
} else {
XMOUNT_STRNAPP(glob_xmount_cfg.p_virtual_image_path,p_orig_name,
strlen(p_orig_name)-strlen(tmp))
XMOUNT_STRNAPP(glob_xmount_cfg.p_virtual_info_path,p_orig_name,
strlen(p_orig_name)-strlen(tmp))
if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK ||
glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS)
{
XMOUNT_STRNAPP(glob_xmount_cfg.p_virtual_vmdk_path,p_orig_name,
strlen(p_orig_name)-strlen(tmp))
}
XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_info_path,".info")
}
// Add virtual file extensions
switch(glob_xmount_cfg.VirtImageType) {
case VirtImageType_DD:
XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_image_path,".dd")
break;
case VirtImageType_DMG:
XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_image_path,".dmg")
break;
case VirtImageType_VDI:
XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_image_path,".vdi")
break;
case VirtImageType_VHD:
XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_image_path,".vhd")
break;
case VirtImageType_VMDK:
case VirtImageType_VMDKS:
XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_image_path,".dd")
XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_vmdk_path,".vmdk")
break;
default:
LOG_ERROR("Unknown virtual image type!\n")
return FALSE;
}
LOG_DEBUG("Set virtual image name to \"%s\"\n",
glob_xmount_cfg.p_virtual_image_path)
LOG_DEBUG("Set virtual image info name to \"%s\"\n",
glob_xmount_cfg.p_virtual_info_path)
if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK ||
glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS)
{
LOG_DEBUG("Set virtual vmdk name to \"%s\"\n",
glob_xmount_cfg.p_virtual_vmdk_path)
}
return TRUE;
}
//! Get size of original image
/*!
* \param p_size Pointer to an uint64_t to which the size will be written to
* \param without_offset If set to TRUE, returns the real size without
* substracting a given offset.
* \return TRUE on success, FALSE on error
*/
static int GetOrigImageSize(uint64_t *p_size, int without_offset) {
int ret;
// Make sure to return correct values when dealing with only 32bit file sizes
*p_size=0;
// When size was already queryed, use old value rather than regetting value
// from disk
if(glob_xmount_cfg.orig_image_size!=0 && !without_offset) {
*p_size=glob_xmount_cfg.orig_image_size;
return TRUE;
}
// Get size of original image
ret=glob_p_input_functions->Size(glob_p_input_image,p_size);
if(ret!=0) {
LOG_ERROR("Unable to determine input image size: %s!\n",
glob_p_input_functions->GetErrorMessage(ret));
return FALSE;
}
if(!without_offset) {
// Substract given offset
(*p_size)-=glob_xmount_cfg.orig_img_offset;
// Save size so we have not to reget it from disk next time
glob_xmount_cfg.orig_image_size=*p_size;
}
return TRUE;
}
//! Get size of the emulated image
/*!
* \param p_size Pointer to an uint64_t to which the size will be written to
* \return TRUE on success, FALSE on error
*/
static int GetVirtImageSize(uint64_t *p_size) {
if(glob_xmount_cfg.virt_image_size!=0) {
*p_size=glob_xmount_cfg.virt_image_size;
return TRUE;
}
switch(glob_xmount_cfg.VirtImageType) {
case VirtImageType_DD:
case VirtImageType_DMG:
case VirtImageType_VMDK:
case VirtImageType_VMDKS:
// Virtual image is a DD, DMG or VMDK file. Just return the size of the
// original image
if(!GetOrigImageSize(p_size,FALSE)) {
LOG_ERROR("Couldn't get size of input image!\n")
return FALSE;
}
break;
case VirtImageType_VDI:
// Virtual image is a VDI file. Get size of original image and add size
// of VDI header etc.
if(!GetOrigImageSize(p_size,FALSE)) {
LOG_ERROR("Couldn't get size of input image!\n")
return FALSE;
}
(*p_size)+=(sizeof(ts_VdiFileHeader)+glob_p_vdi_block_map_size);
break;
case VirtImageType_VHD:
// Virtual image is a VHD file. Get size of original image and add size
// of VHD footer.
if(!GetOrigImageSize(p_size,FALSE)) {
LOG_ERROR("Couldn't get size of input image!\n")
return FALSE;
}
(*p_size)+=sizeof(ts_VhdFileHeader);
break;
default:
LOG_ERROR("Unsupported image type!\n")
return FALSE;
}
glob_xmount_cfg.virt_image_size=*p_size;
return TRUE;
}
//! Read data from original image
/*!
* \param p_buf Pointer to buffer to write read data to (must be preallocated!)
* \param offset Offset at which data should be read
* \param size Size of data which should be read (size of buffer)
* \return Number of read bytes on success or "-1" on error
*/
static int GetOrigImageData(char *p_buf, off_t offset, size_t size) {
int ret;
size_t to_read=0;
uint64_t image_size=0;
// Make sure we aren't reading past EOF of image file
if(!GetOrigImageSize(&image_size,FALSE)) {
LOG_ERROR("Couldn't get image size!\n")
return -1;
}
if(offset>=image_size) {
// Offset is beyond image size
LOG_DEBUG("Offset is beyond image size.\n")
return 0;
}
if(offset+size>image_size) {
// Attempt to read data past EOF of image file
to_read=image_size-offset;
LOG_DEBUG("Attempt to read data past EOF. Corrected size from %zd"
" to %zd.\n",size,to_read)
} else to_read=size;
// Read data from image file (adding input image offset if one was specified)
ret=glob_p_input_functions->Read(glob_p_input_image,
offset+glob_xmount_cfg.orig_img_offset,
p_buf,
to_read);
if(ret!=0) {
LOG_ERROR("Couldn't read %zd bytes from offset %" PRIu64 "!\n",
to_read,
offset,
glob_p_input_functions->GetErrorMessage(ret));
return -1;
}
return to_read;
}
//! Read data from virtual image
/*!
* \param p_buf Pointer to buffer to write read data to
* \param offset Offset at which data should be read
* \param size Size of data which should be read
* \return Number of read bytes on success or negated error code on error
*/
static int GetVirtImageData(char *p_buf, off_t offset, size_t size) {
uint32_t cur_block=0;
uint64_t orig_image_size, virt_image_size;
size_t to_read=0, cur_to_read=0;
off_t file_off=offset, block_off=0;
size_t to_read_later=0;
// Get virtual image size
if(!GetVirtImageSize(&virt_image_size)) {
LOG_ERROR("Couldn't get virtual image size!\n")
return -EIO;
}
if(offset>=virt_image_size) {
LOG_ERROR("Attempt to read behind EOF of virtual image!\n")
return 0;
}
if(offset+size>virt_image_size) {
LOG_DEBUG("Attempt to read pas EOF of virtual image file\n")
LOG_DEBUG("Adjusting read size from %u to %u\n",size,virt_image_size-offset)
size=virt_image_size-offset;
}
to_read=size;
if(!GetOrigImageSize(&orig_image_size,FALSE)) {
LOG_ERROR("Couldn't get original image size!")
return -EIO;
}
// Read virtual image type specific data preceeding original image data
switch(glob_xmount_cfg.VirtImageType) {
case VirtImageType_DD:
case VirtImageType_DMG:
case VirtImageType_VMDK:
case VirtImageType_VMDKS:
break;
case VirtImageType_VDI:
if(file_off<glob_vdi_header_size) {
if(file_off+to_read>glob_vdi_header_size) {
cur_to_read=glob_vdi_header_size-file_off;
} else {
cur_to_read=to_read;
}
if(glob_xmount_cfg.writable==TRUE &&
glob_p_cache_header->VdiFileHeaderCached==TRUE)
{
// VDI header was already cached
if(fseeko(glob_p_cache_file,
glob_p_cache_header->pVdiFileHeader+file_off,
SEEK_SET)!=0)
{
LOG_ERROR("Couldn't seek to cached VDI header at offset %"
PRIu64 "\n",glob_p_cache_header->pVdiFileHeader+file_off)
return -EIO;
}
if(fread(p_buf,cur_to_read,1,glob_p_cache_file)!=1) {
LOG_ERROR("Couldn't read %zu bytes from cache file at offset %"
PRIu64 "\n",cur_to_read,
glob_p_cache_header->pVdiFileHeader+file_off)
return -EIO;
}
LOG_DEBUG("Read %zd bytes from cached VDI header at offset %"
PRIu64 " at cache file offset %" PRIu64 "\n",
cur_to_read,file_off,
glob_p_cache_header->pVdiFileHeader+file_off)
} else {
// VDI header isn't cached
memcpy(p_buf,((char*)glob_p_vdi_header)+file_off,cur_to_read);
LOG_DEBUG("Read %zd bytes at offset %" PRIu64
" from virtual VDI header\n",cur_to_read,
file_off)
}
if(to_read==cur_to_read) return to_read;
else {
// Adjust values to read from original image
to_read-=cur_to_read;
p_buf+=cur_to_read;
file_off=0;
}
} else file_off-=glob_vdi_header_size;
break;
case VirtImageType_VHD:
// When emulating VHD, make sure the while loop below only reads data
// available in the original image. Any VHD footer data must be read
// afterwards.
if(file_off>=orig_image_size) {
to_read_later=to_read;
to_read=0;
} else if((file_off+to_read)>orig_image_size) {
to_read_later=(file_off+to_read)-orig_image_size;
to_read-=to_read_later;
}
break;
}
// Calculate block to read data from
cur_block=file_off/CACHE_BLOCK_SIZE;
block_off=file_off%CACHE_BLOCK_SIZE;
// Read image data
while(to_read!=0) {
// Calculate how many bytes we have to read from this block
if(block_off+to_read>CACHE_BLOCK_SIZE) {
cur_to_read=CACHE_BLOCK_SIZE-block_off;
} else cur_to_read=to_read;
if(glob_xmount_cfg.writable==TRUE &&
glob_p_cache_blkidx[cur_block].Assigned==TRUE)
{
// Write support enabled and need to read altered data from cachefile
if(fseeko(glob_p_cache_file,
glob_p_cache_blkidx[cur_block].off_data+block_off,
SEEK_SET)!=0)
{
LOG_ERROR("Couldn't seek to offset %" PRIu64
" in cache file\n")
return -EIO;
}
if(fread(p_buf,cur_to_read,1,glob_p_cache_file)!=1) {
LOG_ERROR("Couldn't read data from cache file!\n")
return -EIO;
}
LOG_DEBUG("Read %zd bytes at offset %" PRIu64
" from cache file\n",cur_to_read,file_off)
} else {
// No write support or data not cached
if(GetOrigImageData(p_buf,
file_off,
cur_to_read)!=cur_to_read)
{
LOG_ERROR("Couldn't read data from input image!\n")
return -EIO;
}
LOG_DEBUG("Read %zd bytes at offset %" PRIu64
" from original image file\n",cur_to_read,
file_off)
}
cur_block++;
block_off=0;
p_buf+=cur_to_read;
to_read-=cur_to_read;
file_off+=cur_to_read;
}
if(to_read_later!=0) {
// Read virtual image type specific data following original image data
switch(glob_xmount_cfg.VirtImageType) {
case VirtImageType_DD:
case VirtImageType_DMG:
case VirtImageType_VMDK:
case VirtImageType_VMDKS:
case VirtImageType_VDI:
break;
case VirtImageType_VHD:
// Micro$oft has choosen to use a footer rather then a header.
if(glob_xmount_cfg.writable==TRUE &&
glob_p_cache_header->VhdFileHeaderCached==TRUE)
{
// VHD footer was already cached
if(fseeko(glob_p_cache_file,
glob_p_cache_header->pVhdFileHeader+
(file_off-orig_image_size),
SEEK_SET)!=0)
{
LOG_ERROR("Couldn't seek to cached VHD footer at offset %"
PRIu64 "\n",
glob_p_cache_header->pVhdFileHeader+
(file_off-orig_image_size))
return -EIO;
}
if(fread(p_buf,to_read_later,1,glob_p_cache_file)!=1) {
LOG_ERROR("Couldn't read %zu bytes from cache file at offset %"
PRIu64 "\n",to_read_later,
glob_p_cache_header->pVhdFileHeader+
(file_off-orig_image_size))
return -EIO;
}
LOG_DEBUG("Read %zd bytes from cached VHD footer at offset %"
PRIu64 " at cache file offset %" PRIu64 "\n",
to_read_later,(file_off-orig_image_size),
glob_p_cache_header->pVhdFileHeader+
(file_off-orig_image_size))
} else {
// VHD header isn't cached
memcpy(p_buf,
((char*)glob_p_vhd_header)+(file_off-orig_image_size),
to_read_later);
LOG_DEBUG("Read %zd bytes at offset %" PRIu64
" from virtual VHD header\n",
to_read_later,
(file_off-orig_image_size))
}
break;
}
}
return size;
}
//! Write data to virtual VDI file header
/*!
* \param p_buf Buffer containing data to write
* \param offset Offset of changes
* \param size Amount of bytes to write
* \return Number of written bytes on success or "-1" on error
*/
static int SetVdiFileHeaderData(char *p_buf,off_t offset,size_t size) {
if(offset+size>glob_vdi_header_size) size=glob_vdi_header_size-offset;
LOG_DEBUG("Need to cache %zu bytes at offset %" PRIu64
" from VDI header\n",size,offset)
if(glob_p_cache_header->VdiFileHeaderCached==1) {
// Header was already cached
if(fseeko(glob_p_cache_file,
glob_p_cache_header->pVdiFileHeader+offset,
SEEK_SET)!=0)
{
LOG_ERROR("Couldn't seek to cached VDI header at address %"
PRIu64 "\n",glob_p_cache_header->pVdiFileHeader+offset)
return -1;
}
if(fwrite(p_buf,size,1,glob_p_cache_file)!=1) {
LOG_ERROR("Couldn't write %zu bytes to cache file at offset %"
PRIu64 "\n",size,
glob_p_cache_header->pVdiFileHeader+offset)
return -1;
}
LOG_DEBUG("Wrote %zd bytes at offset %" PRIu64 " to cache file\n",
size,glob_p_cache_header->pVdiFileHeader+offset)
} else {
// Header wasn't already cached.
if(fseeko(glob_p_cache_file,
0,
SEEK_END)!=0)
{
LOG_ERROR("Couldn't seek to end of cache file!")
return -1;
}
glob_p_cache_header->pVdiFileHeader=ftello(glob_p_cache_file);
LOG_DEBUG("Caching whole VDI header\n")
if(offset>0) {
// Changes do not begin at offset 0, need to prepend with data from
// VDI header
if(fwrite((char*)glob_p_vdi_header,offset,1,glob_p_cache_file)!=1) {
LOG_ERROR("Error while writing %" PRIu64 " bytes "
"to cache file at offset %" PRIu64 "!\n",
offset,
glob_p_cache_header->pVdiFileHeader);
return -1;
}
LOG_DEBUG("Prepended changed data with %" PRIu64
" bytes at cache file offset %" PRIu64 "\n",
offset,glob_p_cache_header->pVdiFileHeader)
}
// Cache changed data
if(fwrite(p_buf,size,1,glob_p_cache_file)!=1) {
LOG_ERROR("Couldn't write %zu bytes to cache file at offset %"
PRIu64 "\n",size,
glob_p_cache_header->pVdiFileHeader+offset)
return -1;
}
LOG_DEBUG("Wrote %zu bytes of changed data to cache file offset %"
PRIu64 "\n",size,
glob_p_cache_header->pVdiFileHeader+offset)
if(offset+size!=glob_vdi_header_size) {
// Need to append data from VDI header to cache whole data struct
if(fwrite(((char*)glob_p_vdi_header)+offset+size,
glob_vdi_header_size-(offset+size),
1,
glob_p_cache_file)!=1)
{
LOG_ERROR("Couldn't write %zu bytes to cache file at offset %"
PRIu64 "\n",glob_vdi_header_size-(offset+size),
(uint64_t)(glob_p_cache_header->pVdiFileHeader+offset+size))
return -1;
}
LOG_DEBUG("Appended %" PRIu32
" bytes to changed data at cache file offset %"
PRIu64 "\n",glob_vdi_header_size-(offset+size),
glob_p_cache_header->pVdiFileHeader+offset+size)
}
// Mark header as cached and update header in cache file
glob_p_cache_header->VdiFileHeaderCached=1;
if(fseeko(glob_p_cache_file,0,SEEK_SET)!=0) {
LOG_ERROR("Couldn't seek to offset 0 of cache file!\n")
return -1;
}
if(fwrite((char*)glob_p_cache_header,
sizeof(ts_CacheFileHeader),
1,
glob_p_cache_file)!=1)
{
LOG_ERROR("Couldn't write changed cache file header!\n")
return -1;
}
}
// All important data has been written, now flush all buffers to make
// sure data is written to cache file
fflush(glob_p_cache_file);
#ifndef __APPLE__
ioctl(fileno(glob_p_cache_file),BLKFLSBUF,0);
#endif
return size;
}
//! Write data to virtual VHD file footer
/*!
* \param p_buf Buffer containing data to write
* \param offset Offset of changes
* \param size Amount of bytes to write
* \return Number of written bytes on success or "-1" on error
*/
static int SetVhdFileHeaderData(char *p_buf,off_t offset,size_t size) {
LOG_DEBUG("Need to cache %zu bytes at offset %" PRIu64
" from VHD footer\n",size,offset)
if(glob_p_cache_header->VhdFileHeaderCached==1) {
// Header has already been cached
if(fseeko(glob_p_cache_file,
glob_p_cache_header->pVhdFileHeader+offset,
SEEK_SET)!=0)
{
LOG_ERROR("Couldn't seek to cached VHD header at address %"
PRIu64 "\n",glob_p_cache_header->pVhdFileHeader+offset)
return -1;
}
if(fwrite(p_buf,size,1,glob_p_cache_file)!=1) {
LOG_ERROR("Couldn't write %zu bytes to cache file at offset %"
PRIu64 "\n",size,
glob_p_cache_header->pVhdFileHeader+offset)
return -1;
}
LOG_DEBUG("Wrote %zd bytes at offset %" PRIu64 " to cache file\n",
size,glob_p_cache_header->pVhdFileHeader+offset)
} else {
// Header hasn't been cached yet.
if(fseeko(glob_p_cache_file,
0,
SEEK_END)!=0)
{
LOG_ERROR("Couldn't seek to end of cache file!")
return -1;
}
glob_p_cache_header->pVhdFileHeader=ftello(glob_p_cache_file);
LOG_DEBUG("Caching whole VHD header\n")
if(offset>0) {
// Changes do not begin at offset 0, need to prepend with data from
// VHD header
if(fwrite((char*)glob_p_vhd_header,offset,1,glob_p_cache_file)!=1) {
LOG_ERROR("Error while writing %" PRIu64 " bytes "
"to cache file at offset %" PRIu64 "!\n",
offset,
glob_p_cache_header->pVhdFileHeader);
return -1;
}
LOG_DEBUG("Prepended changed data with %" PRIu64
" bytes at cache file offset %" PRIu64 "\n",
offset,glob_p_cache_header->pVhdFileHeader)
}
// Cache changed data
if(fwrite(p_buf,size,1,glob_p_cache_file)!=1) {
LOG_ERROR("Couldn't write %zu bytes to cache file at offset %"
PRIu64 "\n",size,
glob_p_cache_header->pVhdFileHeader+offset)
return -1;
}
LOG_DEBUG("Wrote %zu bytes of changed data to cache file offset %"
PRIu64 "\n",size,
glob_p_cache_header->pVhdFileHeader+offset)
if(offset+size!=sizeof(ts_VhdFileHeader)) {
// Need to append data from VHD header to cache whole data struct
if(fwrite(((char*)glob_p_vhd_header)+offset+size,
sizeof(ts_VhdFileHeader)-(offset+size),
1,
glob_p_cache_file)!=1)
{
LOG_ERROR("Couldn't write %zu bytes to cache file at offset %"
PRIu64 "\n",sizeof(ts_VhdFileHeader)-(offset+size),
(uint64_t)(glob_p_cache_header->pVhdFileHeader+offset+size))
return -1;
}
LOG_DEBUG("Appended %" PRIu32
" bytes to changed data at cache file offset %"
PRIu64 "\n",sizeof(ts_VhdFileHeader)-(offset+size),
glob_p_cache_header->pVhdFileHeader+offset+size)
}
// Mark header as cached and update header in cache file
glob_p_cache_header->VhdFileHeaderCached=1;
if(fseeko(glob_p_cache_file,0,SEEK_SET)!=0) {
LOG_ERROR("Couldn't seek to offset 0 of cache file!\n")
return -1;
}
if(fwrite((char*)glob_p_cache_header,
sizeof(ts_CacheFileHeader),
1,
glob_p_cache_file)!=1)
{
LOG_ERROR("Couldn't write changed cache file header!\n")
return -1;
}
}
// All important data has been written, now flush all buffers to make
// sure data is written to cache file
fflush(glob_p_cache_file);
#ifndef __APPLE__
ioctl(fileno(glob_p_cache_file),BLKFLSBUF,0);
#endif
return size;
}
//! Write data to virtual image
/*!
* \param p_buf Buffer containing data to write
* \param offset Offset to start writing at
* \param size Size of data to be written
* \return Number of written bytes on success or "-1" on error
*/
static int SetVirtImageData(const char *p_buf, off_t offset, size_t size) {
uint64_t cur_block=0;
uint64_t virt_image_size;
uint64_t orig_image_size;
size_t to_write=0;
size_t to_write_later=0;
size_t to_write_now=0;
off_t file_offset=offset;
off_t block_offset=0;
char *p_write_buf=(char*)p_buf;
char *p_buf2;
ssize_t ret;
// Get virtual image size
if(!GetVirtImageSize(&virt_image_size)) {
LOG_ERROR("Couldn't get virtual image size!\n")
return -1;
}
if(offset>=virt_image_size) {
LOG_ERROR("Attempt to write beyond EOF of virtual image file!\n")
return -1;
}
if(offset+size>virt_image_size) {
LOG_DEBUG("Attempt to write past EOF of virtual image file\n")
size=virt_image_size-offset;
}
to_write=size;
// Get original image size
if(!GetOrigImageSize(&orig_image_size,FALSE)) {
LOG_ERROR("Couldn't get original image size!\n")
return -1;
}
// Cache virtual image type specific data preceeding original image data
switch(glob_xmount_cfg.VirtImageType) {
case VirtImageType_DD:
case VirtImageType_DMG:
case VirtImageType_VMDK:
case VirtImageType_VMDKS:
break;
case VirtImageType_VDI:
if(file_offset<glob_vdi_header_size) {
ret=SetVdiFileHeaderData(p_write_buf,file_offset,to_write);
if(ret==-1) {
LOG_ERROR("Couldn't write data to virtual VDI file header!\n")
return -1;
}
if(ret==to_write) return to_write;
else {
to_write-=ret;
p_write_buf+=ret;
file_offset=0;
}
} else file_offset-=glob_vdi_header_size;
break;
case VirtImageType_VHD:
// When emulating VHD, make sure the while loop below only writes data
// available in the original image. Any VHD footer data must be written
// afterwards.
if(file_offset>=orig_image_size) {
to_write_later=to_write;
to_write=0;
} else if((file_offset+to_write)>orig_image_size) {
to_write_later=(file_offset+to_write)-orig_image_size;
to_write-=to_write_later;
}
break;
}
// Calculate block to write data to
cur_block=file_offset/CACHE_BLOCK_SIZE;
block_offset=file_offset%CACHE_BLOCK_SIZE;
while(to_write!=0) {
// Calculate how many bytes we have to write to this block
if(block_offset+to_write>CACHE_BLOCK_SIZE) {
to_write_now=CACHE_BLOCK_SIZE-block_offset;
} else to_write_now=to_write;
if(glob_p_cache_blkidx[cur_block].Assigned==1) {
// Block was already cached
// Seek to data offset in cache file
if(fseeko(glob_p_cache_file,
glob_p_cache_blkidx[cur_block].off_data+block_offset,
SEEK_SET)!=0)
{
LOG_ERROR("Couldn't seek to cached block at address %" PRIu64 "\n",
glob_p_cache_blkidx[cur_block].off_data+block_offset)
return -1;
}
if(fwrite(p_write_buf,to_write_now,1,glob_p_cache_file)!=1) {
LOG_ERROR("Error while writing %zu bytes "
"to cache file at offset %" PRIu64 "!\n",
to_write_now,
glob_p_cache_blkidx[cur_block].off_data+block_offset);
return -1;
}
LOG_DEBUG("Wrote %zd bytes at offset %" PRIu64
" to cache file\n",to_write_now,
glob_p_cache_blkidx[cur_block].off_data+block_offset)
} else {
// Uncached block. Need to cache entire new block
// Seek to end of cache file to append new cache block
fseeko(glob_p_cache_file,0,SEEK_END);
glob_p_cache_blkidx[cur_block].off_data=ftello(glob_p_cache_file);
if(block_offset!=0) {
// Changed data does not begin at block boundry. Need to prepend
// with data from virtual image file
XMOUNT_MALLOC(p_buf2,char*,block_offset*sizeof(char))
if(GetOrigImageData(p_buf2,
file_offset-block_offset,
block_offset)!=block_offset)
{
LOG_ERROR("Couldn't read data from original image file!\n")
return -1;
}
if(fwrite(p_buf2,block_offset,1,glob_p_cache_file)!=1) {
LOG_ERROR("Couldn't writing %" PRIu64 " bytes "
"to cache file at offset %" PRIu64 "!\n",
block_offset,
glob_p_cache_blkidx[cur_block].off_data);
return -1;
}
LOG_DEBUG("Prepended changed data with %" PRIu64
" bytes from virtual image file at offset %" PRIu64
"\n",block_offset,file_offset-block_offset)
free(p_buf2);
}
if(fwrite(p_write_buf,to_write_now,1,glob_p_cache_file)!=1) {
LOG_ERROR("Error while writing %zd bytes "
"to cache file at offset %" PRIu64 "!\n",
to_write_now,
glob_p_cache_blkidx[cur_block].off_data+block_offset);
return -1;
}
if(block_offset+to_write_now!=CACHE_BLOCK_SIZE) {
// Changed data does not end at block boundry. Need to append
// with data from virtual image file
XMOUNT_MALLOC(p_buf2,char*,(CACHE_BLOCK_SIZE-
(block_offset+to_write_now))*sizeof(char))
memset(p_buf2,0,CACHE_BLOCK_SIZE-(block_offset+to_write_now));
if((file_offset-block_offset)+CACHE_BLOCK_SIZE>orig_image_size) {
// Original image is smaller than full cache block
if(GetOrigImageData(p_buf2,
file_offset+to_write_now,
orig_image_size-(file_offset+to_write_now))!=
orig_image_size-(file_offset+to_write_now))
{
LOG_ERROR("Couldn't read data from virtual image file!\n")
return -1;
}
} else {
if(GetOrigImageData(p_buf2,
file_offset+to_write_now,
CACHE_BLOCK_SIZE-(block_offset+to_write_now))!=
CACHE_BLOCK_SIZE-(block_offset+to_write_now))
{
LOG_ERROR("Couldn't read data from virtual image file!\n")
return -1;
}
}
if(fwrite(p_buf2,
CACHE_BLOCK_SIZE-(block_offset+to_write_now),
1,
glob_p_cache_file)!=1)
{
LOG_ERROR("Error while writing %zd bytes "
"to cache file at offset %" PRIu64 "!\n",
CACHE_BLOCK_SIZE-(block_offset+to_write_now),
glob_p_cache_blkidx[cur_block].off_data+
block_offset+to_write_now);
return -1;
}
free(p_buf2);
}
// All important data for this cache block has been written,
// flush all buffers and mark cache block as assigned
fflush(glob_p_cache_file);
#ifndef __APPLE__
ioctl(fileno(glob_p_cache_file),BLKFLSBUF,0);
#endif
glob_p_cache_blkidx[cur_block].Assigned=1;
// Update cache block index entry in cache file
fseeko(glob_p_cache_file,
sizeof(ts_CacheFileHeader)+
(cur_block*sizeof(ts_CacheFileBlockIndex)),
SEEK_SET);
if(fwrite(&(glob_p_cache_blkidx[cur_block]),
sizeof(ts_CacheFileBlockIndex),
1,
glob_p_cache_file)!=1)
{
LOG_ERROR("Couldn't update cache file block index!\n");
return -1;
}
LOG_DEBUG("Updated cache file block index: Number=%" PRIu64
", Data offset=%" PRIu64 "\n",cur_block,
glob_p_cache_blkidx[cur_block].off_data);
}
// Flush buffers
fflush(glob_p_cache_file);
#ifndef __APPLE__
ioctl(fileno(glob_p_cache_file),BLKFLSBUF,0);
#endif
block_offset=0;
cur_block++;
p_write_buf+=to_write_now;
to_write-=to_write_now;
file_offset+=to_write_now;
}
if(to_write_later!=0) {
// Cache virtual image type specific data preceeding original image data
switch(glob_xmount_cfg.VirtImageType) {
case VirtImageType_DD:
case VirtImageType_DMG:
case VirtImageType_VMDK:
case VirtImageType_VMDKS:
case VirtImageType_VDI:
break;
case VirtImageType_VHD:
// Micro$oft has choosen to use a footer rather then a header.
ret=SetVhdFileHeaderData(p_write_buf,
file_offset-orig_image_size,
to_write_later);
if(ret==-1) {
LOG_ERROR("Couldn't write data to virtual VHD file footer!\n")
return -1;
}
break;
}
}
return size;
}
//! Calculates an MD5 hash of the first HASH_AMOUNT bytes of the input image
/*!
* \param p_hash_low Pointer to the lower 64 bit of the hash
* \param p_hash_high Pointer to the higher 64 bit of the hash
* \return TRUE on success, FALSE on error
*/
static int CalculateInputImageHash(uint64_t *p_hash_low,
uint64_t *p_hash_high)
{
char hash[16];
md5_state_t md5_state;
char *p_buf;
XMOUNT_MALLOC(p_buf,char*,HASH_AMOUNT*sizeof(char))
size_t read_data=GetOrigImageData(p_buf,0,HASH_AMOUNT);
if(read_data>0) {
// Calculate MD5 hash
md5_init(&md5_state);
md5_append(&md5_state,(const md5_byte_t*)p_buf,read_data);
md5_finish(&md5_state,(md5_byte_t*)hash);
// Convert MD5 hash into two 64bit integers
*p_hash_low=*((uint64_t*)hash);
*p_hash_high=*((uint64_t*)(hash+8));
free(p_buf);
return TRUE;
} else {
LOG_ERROR("Couldn't read data from original image file!\n")
free(p_buf);
return FALSE;
}
}
//! Build and init virtual VDI file header
/*!
* \return TRUE on success, FALSE on error
*/
static int InitVirtVdiHeader() {
// See http://forums.virtualbox.org/viewtopic.php?t=8046 for a
// "description" of the various header fields
uint64_t image_size;
off_t offset;
uint32_t i,block_entries;
// Get input image size
if(!GetOrigImageSize(&image_size,FALSE)) {
LOG_ERROR("Couldn't get input image size!\n")
return FALSE;
}
// Calculate how many VDI blocks we need
block_entries=image_size/VDI_IMAGE_BLOCK_SIZE;
if((image_size%VDI_IMAGE_BLOCK_SIZE)!=0) block_entries++;
glob_p_vdi_block_map_size=block_entries*sizeof(uint32_t);
LOG_DEBUG("BlockMap: %d (%08X) entries, %d (%08X) bytes!\n",
block_entries,
block_entries,
glob_p_vdi_block_map_size,
glob_p_vdi_block_map_size)
// Allocate memory for vdi header and block map
glob_vdi_header_size=sizeof(ts_VdiFileHeader)+glob_p_vdi_block_map_size;
XMOUNT_MALLOC(glob_p_vdi_header,pts_VdiFileHeader,glob_vdi_header_size)
memset(glob_p_vdi_header,0,glob_vdi_header_size);
glob_p_vdi_block_map=((void*)glob_p_vdi_header)+sizeof(ts_VdiFileHeader);
// Init header values
strncpy(glob_p_vdi_header->szFileInfo,VDI_FILE_COMMENT,
strlen(VDI_FILE_COMMENT)+1);
glob_p_vdi_header->u32Signature=VDI_IMAGE_SIGNATURE;
glob_p_vdi_header->u32Version=VDI_IMAGE_VERSION;
// No idea what the following value is for! Testimage had same value
glob_p_vdi_header->cbHeader=0x00000180;
glob_p_vdi_header->u32Type=VDI_IMAGE_TYPE_FIXED;
glob_p_vdi_header->fFlags=VDI_IMAGE_FLAGS;
strncpy(glob_p_vdi_header->szComment,VDI_HEADER_COMMENT,
strlen(VDI_HEADER_COMMENT)+1);
glob_p_vdi_header->offData=glob_vdi_header_size;
glob_p_vdi_header->offBlocks=sizeof(ts_VdiFileHeader);
glob_p_vdi_header->cCylinders=0; // Legacy info
glob_p_vdi_header->cHeads=0; // Legacy info
glob_p_vdi_header->cSectors=0; // Legacy info
glob_p_vdi_header->cbSector=512; // Legacy info
glob_p_vdi_header->u32Dummy=0;
glob_p_vdi_header->cbDisk=image_size;
// Seems as VBox is always using a 1MB blocksize
glob_p_vdi_header->cbBlock=VDI_IMAGE_BLOCK_SIZE;
glob_p_vdi_header->cbBlockExtra=0;
glob_p_vdi_header->cBlocks=block_entries;
glob_p_vdi_header->cBlocksAllocated=block_entries;
// Use partial MD5 input file hash as creation UUID and generate a random
// modification UUID. VBox won't accept immages where create and modify UUIDS
// aren't set.
glob_p_vdi_header->uuidCreate_l=glob_xmount_cfg.input_hash_lo;
glob_p_vdi_header->uuidCreate_h=glob_xmount_cfg.input_hash_hi;
#define rand64(var) { \
*((uint32_t*)&(var))=rand(); \
*(((uint32_t*)&(var))+1)=rand(); \
}
rand64(glob_p_vdi_header->uuidModify_l);
rand64(glob_p_vdi_header->uuidModify_h);
#undef rand64
// Generate block map
i=0;
for(offset=0;offset<glob_p_vdi_block_map_size;offset+=4) {
*((uint32_t*)(glob_p_vdi_block_map+offset))=i;
i++;
}
LOG_DEBUG("VDI header size = %u\n",glob_vdi_header_size)
return TRUE;
}
//! Build and init virtual VHD file header
/*!
* \return TRUE on success, FALSE on error
*/
static int InitVirtVhdHeader() {
uint64_t orig_image_size=0;
uint16_t i=0;
uint64_t geom_tot_s=0;
uint64_t geom_c_x_h=0;
uint16_t geom_c=0;
uint8_t geom_h=0;
uint8_t geom_s=0;
uint32_t checksum=0;
// Get input image size
if(!GetOrigImageSize(&orig_image_size,FALSE)) {
LOG_ERROR("Couldn't get input image size!\n")
return FALSE;
}
// Allocate memory for vhd header
XMOUNT_MALLOC(glob_p_vhd_header,pts_VhdFileHeader,sizeof(ts_VhdFileHeader))
memset(glob_p_vhd_header,0,sizeof(ts_VhdFileHeader));
// Init header values
glob_p_vhd_header->cookie=VHD_IMAGE_HVAL_COOKIE;
glob_p_vhd_header->features=VHD_IMAGE_HVAL_FEATURES;
glob_p_vhd_header->file_format_version=VHD_IMAGE_HVAL_FILE_FORMAT_VERSION;
glob_p_vhd_header->data_offset=VHD_IMAGE_HVAL_DATA_OFFSET;
glob_p_vhd_header->creation_time=htobe32(time(NULL)-
VHD_IMAGE_TIME_CONVERSION_OFFSET);
glob_p_vhd_header->creator_app=VHD_IMAGE_HVAL_CREATOR_APPLICATION;
glob_p_vhd_header->creator_ver=VHD_IMAGE_HVAL_CREATOR_VERSION;
glob_p_vhd_header->creator_os=VHD_IMAGE_HVAL_CREATOR_HOST_OS;
glob_p_vhd_header->size_original=htobe64(orig_image_size);
glob_p_vhd_header->size_current=glob_p_vhd_header->size_original;
// Convert size to sectors
if(orig_image_size>136899993600) {
// image is larger then CHS values can address.
// Set sectors to max (C65535*H16*S255).
geom_tot_s=267382800;
} else {
// Calculate actual sectors
geom_tot_s=orig_image_size/512;
if((orig_image_size%512)!=0) geom_tot_s++;
}
// Calculate CHS values. This is done according to the VHD specs
if(geom_tot_s>=66059280) { // C65535 * H16 * S63
geom_s=255;
geom_h=16;
geom_c_x_h=geom_tot_s/geom_s;
} else {
geom_s=17;
geom_c_x_h=geom_tot_s/geom_s;
geom_h=(geom_c_x_h+1023)/1024;
if(geom_h<4) geom_h=4;
if(geom_c_x_h>=(geom_h*1024) || geom_h>16) {
geom_s=31;
geom_h=16;
geom_c_x_h=geom_tot_s/geom_s;
}
if(geom_c_x_h>=(geom_h*1024)) {
geom_s=63;
geom_h=16;
geom_c_x_h=geom_tot_s/geom_s;
}
}
geom_c=geom_c_x_h/geom_h;
glob_p_vhd_header->disk_geometry_c=htobe16(geom_c);
glob_p_vhd_header->disk_geometry_h=geom_h;
glob_p_vhd_header->disk_geometry_s=geom_s;
glob_p_vhd_header->disk_type=VHD_IMAGE_HVAL_DISK_TYPE;
glob_p_vhd_header->uuid_l=glob_xmount_cfg.input_hash_lo;
glob_p_vhd_header->uuid_h=glob_xmount_cfg.input_hash_hi;
glob_p_vhd_header->saved_state=0x00;
// Calculate footer checksum
for(i=0;i<sizeof(ts_VhdFileHeader);i++) {
checksum+=*((uint8_t*)(glob_p_vhd_header)+i);
}
glob_p_vhd_header->checksum=htobe32(~checksum);
LOG_DEBUG("VHD header size = %u\n",sizeof(ts_VhdFileHeader));
return TRUE;
}
//! Init the virtual VMDK file
/*!
* \return TRUE on success, FALSE on error
*/
static int InitVirtualVmdkFile() {
uint64_t image_size=0;
uint64_t image_blocks=0;
char buf[500];
// Get original image size
if(!GetOrigImageSize(&image_size,FALSE)) {
LOG_ERROR("Couldn't get original image size!\n")
return FALSE;
}
image_blocks=image_size/512;
if(image_size%512!=0) image_blocks++;
#define VMDK_DESC_FILE "# Disk DescriptorFile\n" \
"version=1\n" \
"CID=fffffffe\n" \
"parentCID=ffffffff\n" \
"createType=\"monolithicFlat\"\n\n" \
"# Extent description\n" \
"RW %" PRIu64 " FLAT \"%s\" 0\n\n" \
"# The Disk Data Base\n" \
"#DDB\n" \
"ddb.virtualHWVersion = \"3\"\n" \
"ddb.adapterType = \"%s\"\n" \
"ddb.geometry.cylinders = \"0\"\n" \
"ddb.geometry.heads = \"0\"\n" \
"ddb.geometry.sectors = \"0\"\n"
if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK) {
// VMDK with IDE bus
sprintf(buf,
VMDK_DESC_FILE,
image_blocks,
(glob_xmount_cfg.p_virtual_image_path)+1,
"ide");
} else if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS){
// VMDK with SCSI bus
sprintf(buf,
VMDK_DESC_FILE,
image_blocks,
(glob_xmount_cfg.p_virtual_image_path)+1,
"scsi");
} else {
LOG_ERROR("Unknown virtual VMDK file format!\n")
return FALSE;
}
#undef VMDK_DESC_FILE
// Do not use XMOUNT_STRSET here to avoid adding '\0' to the buffer!
XMOUNT_MALLOC(glob_p_vmdk_file,char*,strlen(buf))
strncpy(glob_p_vmdk_file,buf,strlen(buf));
glob_vmdk_file_size=strlen(buf);
return TRUE;
}
//! Create virtual image info file
/*!
* \return TRUE on success, FALSE on error
*/
static int InitVirtImageInfoFile() {
int ret;
char *p_buf;
// Add static header
XMOUNT_MALLOC(glob_p_info_file,char*,strlen(IMAGE_INFO_HEADER)+1)
strncpy(glob_p_info_file,IMAGE_INFO_HEADER,strlen(IMAGE_INFO_HEADER)+1);
// Get infos from input lib
ret=glob_p_input_functions->GetInfofileContent(glob_p_input_image,&p_buf);
if(ret!=0) {
LOG_ERROR("Unable to get info file content: %s!\n",
glob_p_input_functions->GetErrorMessage(ret));
return FALSE;
}
// Add infos to main buffer and free p_buf
XMOUNT_STRAPP(glob_p_info_file,p_buf);
glob_p_input_functions->FreeBuffer(p_buf);
return TRUE;
}
//! Create / load cache file to enable virtual write support
/*!
* \return TRUE on success, FALSE on error
*/
static int InitCacheFile() {
uint64_t image_size=0;
uint64_t blockindex_size=0;
uint64_t cachefile_header_size=0;
uint64_t cachefile_size=0;
uint32_t needed_blocks=0;
uint64_t buf;
if(!glob_xmount_cfg.overwrite_cache) {
// Try to open an existing cache file or create a new one
glob_p_cache_file=(FILE*)FOPEN(glob_xmount_cfg.p_cache_file,"rb+");
if(glob_p_cache_file==NULL) {
// As the c lib seems to have no possibility to open a file rw wether it
// exists or not (w+ does not work because it truncates an existing file),
// when r+ returns NULL the file could simply not exist
LOG_DEBUG("Cache file does not exist. Creating new one\n")
glob_p_cache_file=(FILE*)FOPEN(glob_xmount_cfg.p_cache_file,"wb+");
if(glob_p_cache_file==NULL) {
// There is really a problem opening the file
LOG_ERROR("Couldn't open cache file \"%s\"!\n",
glob_xmount_cfg.p_cache_file)
return FALSE;
}
}
} else {
// Overwrite existing cache file or create a new one
glob_p_cache_file=(FILE*)FOPEN(glob_xmount_cfg.p_cache_file,"wb+");
if(glob_p_cache_file==NULL) {
LOG_ERROR("Couldn't open cache file \"%s\"!\n",
glob_xmount_cfg.p_cache_file)
return FALSE;
}
}
// Get input image size
if(!GetOrigImageSize(&image_size,FALSE)) {
LOG_ERROR("Couldn't get input image size!\n")
return FALSE;
}
// Calculate how many blocks are needed and how big the buffers must be
// for the actual cache file version
needed_blocks=image_size/CACHE_BLOCK_SIZE;
if((image_size%CACHE_BLOCK_SIZE)!=0) needed_blocks++;
blockindex_size=needed_blocks*sizeof(ts_CacheFileBlockIndex);
cachefile_header_size=sizeof(ts_CacheFileHeader)+blockindex_size;
LOG_DEBUG("Cache blocks: %u (%04X) entries, %zd (%08zX) bytes\n",
needed_blocks,
needed_blocks,
blockindex_size,
blockindex_size)
// Get cache file size
// fseeko64 had massive problems!
if(fseeko(glob_p_cache_file,0,SEEK_END)!=0) {
LOG_ERROR("Couldn't seek to end of cache file!\n")
return FALSE;
}
// Same here, ftello64 didn't work at all and returned 0 all the times
cachefile_size=ftello(glob_p_cache_file);
LOG_DEBUG("Cache file has %zd bytes\n",cachefile_size)
if(cachefile_size>0) {
// Cache file isn't empty, parse block header
LOG_DEBUG("Cache file not empty. Parsing block header\n")
if(fseeko(glob_p_cache_file,0,SEEK_SET)!=0) {
LOG_ERROR("Couldn't seek to beginning of cache file!\n")
return FALSE;
}
// Read and check file signature
if(fread(&buf,8,1,glob_p_cache_file)!=1 || buf!=CACHE_FILE_SIGNATURE) {
free(glob_p_cache_header);
LOG_ERROR("Not an xmount cache file or cache file corrupt!\n")
return FALSE;
}
// Now get cache file version (Has only 32bit!)
if(fread(&buf,4,1,glob_p_cache_file)!=1) {
free(glob_p_cache_header);
LOG_ERROR("Not an xmount cache file or cache file corrupt!\n")
return FALSE;
}
switch((uint32_t)buf) {
case 0x00000001:
// Old v1 cache file.
LOG_ERROR("Unsupported cache file version!\n")
LOG_ERROR("Please use xmount-tool to upgrade your cache file.\n")
return FALSE;
case CUR_CACHE_FILE_VERSION:
// Current version
if(fseeko(glob_p_cache_file,0,SEEK_SET)!=0) {
LOG_ERROR("Couldn't seek to beginning of cache file!\n")
return FALSE;
}
// Alloc memory for header and block index
XMOUNT_MALLOC(glob_p_cache_header,
pts_CacheFileHeader,
cachefile_header_size);
memset(glob_p_cache_header,0,cachefile_header_size);
// Read header and block index from file
if(fread(glob_p_cache_header,
cachefile_header_size,
1,
glob_p_cache_file)!=1)
{
// Cache file isn't big enough
free(glob_p_cache_header);
LOG_ERROR("Cache file corrupt!\n")
return FALSE;
}
break;
default:
LOG_ERROR("Unknown cache file version!\n")
return FALSE;
}
// Check if cache file has same block size as we do
if(glob_p_cache_header->BlockSize!=CACHE_BLOCK_SIZE) {
LOG_ERROR("Cache file does not use default cache block size!\n")
return FALSE;
}
// Set pointer to block index
glob_p_cache_blkidx=(pts_CacheFileBlockIndex)((void*)glob_p_cache_header+
glob_p_cache_header->pBlockIndex);
} else {
// New cache file, generate a new block header
LOG_DEBUG("Cache file is empty. Generating new block header\n");
// Alloc memory for header and block index
XMOUNT_MALLOC(glob_p_cache_header,pts_CacheFileHeader,cachefile_header_size)
memset(glob_p_cache_header,0,cachefile_header_size);
glob_p_cache_header->FileSignature=CACHE_FILE_SIGNATURE;
glob_p_cache_header->CacheFileVersion=CUR_CACHE_FILE_VERSION;
glob_p_cache_header->BlockSize=CACHE_BLOCK_SIZE;
glob_p_cache_header->BlockCount=needed_blocks;
//glob_p_cache_header->UsedBlocks=0;
// The following pointer is only usuable when reading data from cache file
glob_p_cache_header->pBlockIndex=sizeof(ts_CacheFileHeader);
glob_p_cache_blkidx=(pts_CacheFileBlockIndex)((void*)glob_p_cache_header+
sizeof(ts_CacheFileHeader));
glob_p_cache_header->VdiFileHeaderCached=FALSE;
glob_p_cache_header->pVdiFileHeader=0;
glob_p_cache_header->VmdkFileCached=FALSE;
glob_p_cache_header->VmdkFileSize=0;
glob_p_cache_header->pVmdkFile=0;
glob_p_cache_header->VhdFileHeaderCached=FALSE;
glob_p_cache_header->pVhdFileHeader=0;
// Write header to file
if(fwrite(glob_p_cache_header,
cachefile_header_size,
1,
glob_p_cache_file)!=1)
{
free(glob_p_cache_header);
LOG_ERROR("Couldn't write cache file header to file!\n");
return FALSE;
}
}
return TRUE;
}
//! Load input libs
/*!
* \return TRUE on success, FALSE on error
*/
static int LoadInputLibs() {
DIR *p_dir=NULL;
struct dirent *p_dirent=NULL;
int base_library_path_len=0;
char *p_library_path=NULL;
void *p_libxmount_in=NULL;
t_LibXmount_Input_GetApiVersion pfun_GetApiVersion;
t_LibXmount_Input_GetSupportedFormats pfun_GetSupportedFormats;
t_LibXmount_Input_GetFunctions pfun_GetFunctions;
const char *p_supported_formats=NULL;
const char *p_buf;
uint32_t supported_formats_len=0;
pts_InputLib p_input_lib=NULL;
LOG_DEBUG("Searching for input libraries in '%s'.\n",
XMOUNT_LIBRARY_PATH);
// Open lib dir
p_dir=opendir(XMOUNT_LIBRARY_PATH);
if(p_dir==NULL) {
LOG_ERROR("Unable to access xmount library directory '%s'!\n",
XMOUNT_LIBRARY_PATH);
return FALSE;
}
// Construct base library path
base_library_path_len=strlen(XMOUNT_LIBRARY_PATH);
XMOUNT_STRSET(p_library_path,XMOUNT_LIBRARY_PATH);
if(XMOUNT_LIBRARY_PATH[base_library_path_len]!='/') {
base_library_path_len++;
XMOUNT_STRAPP(p_library_path,"/");
}
// Loop over lib dir
while((p_dirent=readdir(p_dir))!=NULL) {
if(strncmp(p_dirent->d_name,"libxmount_input_",16)!=0) {
LOG_DEBUG("Ignoring '%s'.\n",p_dirent->d_name);
continue;
}
LOG_DEBUG("Trying to load '%s'\n",p_dirent->d_name);
// Found an input lib, construct full path to it and load it
p_library_path=realloc(p_library_path,
base_library_path_len+strlen(p_dirent->d_name)+1);
if(p_library_path==NULL) {
LOG_ERROR("Couldn't allocate memmory!\n");
exit(1);
}
strcpy(p_library_path+base_library_path_len,p_dirent->d_name);
p_libxmount_in=dlopen(p_library_path,RTLD_NOW);
if(p_libxmount_in==NULL) {
LOG_ERROR("Unable to load input library '%s': %s!\n",
p_library_path,
dlerror());
continue;
}
// Load library symbols
#define LIBXMOUNT_LOAD_SYMBOL(name,pfun) { \
if((pfun=dlsym(p_libxmount_in,name))==NULL) { \
LOG_ERROR("Unable to load symbol '%s' from library '%s'!\n", \
name, \
p_library_path); \
dlclose(p_libxmount_in); \
p_libxmount_in=NULL; \
continue; \
} \
}
LIBXMOUNT_LOAD_SYMBOL("LibXmount_Input_GetApiVersion",pfun_GetApiVersion);
// Check library's API version
if(pfun_GetApiVersion()!=LIBXMOUNT_INPUT_API_VERSION) {
LOG_DEBUG("Failed! Wrong API version.\n");
LOG_ERROR("Unable to load input library '%s'. Wrong API version\n",
p_library_path);
dlclose(p_libxmount_in);
continue;
}
LIBXMOUNT_LOAD_SYMBOL("LibXmount_Input_GetSupportedFormats",
pfun_GetSupportedFormats);
LIBXMOUNT_LOAD_SYMBOL("LibXmount_Input_GetFunctions",pfun_GetFunctions);
#undef LIBXMOUNT_LOAD_SYMBOL
// Construct new entry for our library list
XMOUNT_MALLOC(p_input_lib,pts_InputLib,sizeof(ts_InputLib));
// Initialize lib_functions structure to NULL
memset(&(p_input_lib->lib_functions),0,sizeof(ts_LibXmountInputFunctions));
// Set name and handle
XMOUNT_STRSET(p_input_lib->p_name,p_dirent->d_name);
p_input_lib->p_lib=p_libxmount_in;
// Get and set supported formats
p_supported_formats=pfun_GetSupportedFormats();
supported_formats_len=0;
p_buf=p_supported_formats;
while(*p_buf!='\0') {
supported_formats_len+=(strlen(p_buf)+1);
p_buf+=(strlen(p_buf)+1);
}
supported_formats_len++;
XMOUNT_MALLOC(p_input_lib->p_supported_input_types,
char*,
supported_formats_len);
memcpy(p_input_lib->p_supported_input_types,
p_supported_formats,
supported_formats_len);
// Get, set and check lib_functions
pfun_GetFunctions(&(p_input_lib->lib_functions));
if(p_input_lib->lib_functions.CreateHandle==NULL ||
p_input_lib->lib_functions.DestroyHandle==NULL ||
p_input_lib->lib_functions.Open==NULL ||
p_input_lib->lib_functions.Close==NULL ||
p_input_lib->lib_functions.Size==NULL ||
p_input_lib->lib_functions.Read==NULL ||
p_input_lib->lib_functions.OptionsHelp==NULL ||
p_input_lib->lib_functions.OptionsParse==NULL ||
p_input_lib->lib_functions.GetInfofileContent==NULL ||
p_input_lib->lib_functions.GetErrorMessage==NULL ||
p_input_lib->lib_functions.FreeBuffer==NULL)
{
LOG_DEBUG("Missing implemention of one or more functions in lib %s!\n",
p_dirent->d_name);
free(p_input_lib->p_supported_input_types);
free(p_input_lib->p_name);
free(p_input_lib);
dlclose(p_libxmount_in);
continue;
}
// Add entry to the input library list
XMOUNT_REALLOC(glob_pp_input_libs,
pts_InputLib*,
sizeof(pts_InputLib)*(glob_input_libs_count+1));
glob_pp_input_libs[glob_input_libs_count++]=p_input_lib;
LOG_DEBUG("%s loaded successfully\n",p_dirent->d_name);
}
LOG_DEBUG("A total of %u input libs were loaded.\n",glob_input_libs_count);
free(p_library_path);
closedir(p_dir);
return (glob_input_libs_count>0 ? TRUE : FALSE);
}
//! Unload input libs
/*!
* \return TRUE on success, FALSE on error
*/
static void UnloadInputLibs() {
LOG_DEBUG("Unloading all input libs.\n");
for(uint32_t i=0;i<glob_input_libs_count;i++) {
free(glob_pp_input_libs[i]->p_name);
dlclose(glob_pp_input_libs[i]->p_lib);
free(glob_pp_input_libs[i]->p_supported_input_types);
free(glob_pp_input_libs[i]);
}
free(glob_pp_input_libs);
glob_pp_input_libs=NULL;
glob_input_libs_count=0;
}
//! Search an appropriate input lib for specified input type
/*!
* \return TRUE on success, FALSE on error
*/
static int FindInputLib() {
char *p_buf;
LOG_DEBUG("Trying to find suitable library for input type '%s'.\n",
glob_xmount_cfg.p_orig_image_type);
// Loop over all loaded libs
for(uint32_t i=0;i<glob_input_libs_count;i++) {
LOG_DEBUG("Checking input library %s\n",glob_pp_input_libs[i]->p_name);
p_buf=glob_pp_input_libs[i]->p_supported_input_types;
while(*p_buf!='\0') {
if(strcmp(p_buf,glob_xmount_cfg.p_orig_image_type)==0) {
// Library supports input type, set lib functions
LOG_DEBUG("Input library '%s' pretends to handle that input type.\n",
glob_pp_input_libs[i]->p_name);
glob_p_input_functions=&(glob_pp_input_libs[i]->lib_functions);
return TRUE;
}
p_buf+=(strlen(p_buf)+1);
}
}
LOG_DEBUG("Couldn't find any suitable library.\n");
// No library supporting input type found
return FALSE;
}
/*******************************************************************************
* FUSE function implementation
******************************************************************************/
//! FUSE access implementation
/*!
* \param p_path Path of file to get attributes from
* \param perm Requested permissisons
* \return 0 on success, negated error code on error
*/
/*
static int FuseAccess(const char *path, int perm) {
// TODO: Implement propper file permission handling
// http://www.cs.cf.ac.uk/Dave/C/node20.html
// Values for the second argument to access.
// These may be OR'd together.
//#define R_OK 4 // Test for read permission.
//#define W_OK 2 // Test for write permission.
//#define X_OK 1 // Test for execute permission.
//#define F_OK 0 // Test for existence.
return 0;
}
*/
//! FUSE getattr implementation
/*!
* \param p_path Path of file to get attributes from
* \param p_stat Pointer to stat structure to save attributes to
* \return 0 on success, negated error code on error
*/
static int FuseGetAttr(const char *p_path, struct stat *p_stat) {
memset(p_stat,0,sizeof(struct stat));
if(strcmp(p_path,"/")==0) {
// Attributes of mountpoint
p_stat->st_mode=S_IFDIR | 0777;
p_stat->st_nlink=2;
} else if(strcmp(p_path,glob_xmount_cfg.p_virtual_image_path)==0) {
// Attributes of virtual image
if(!glob_xmount_cfg.writable) p_stat->st_mode=S_IFREG | 0444;
else p_stat->st_mode=S_IFREG | 0666;
p_stat->st_nlink=1;
// Get virtual image file size
if(!GetVirtImageSize((uint64_t*)&(p_stat->st_size))) {
LOG_ERROR("Couldn't get image size!\n");
return -ENOENT;
}
if(glob_xmount_cfg.VirtImageType==VirtImageType_VHD) {
// Make sure virtual image seems to be fully allocated (not sparse file).
// Without this, Windows won't attach the vhd file!
p_stat->st_blocks=p_stat->st_size/512;
if(p_stat->st_size%512!=0) p_stat->st_blocks++;
}
} else if(strcmp(p_path,glob_xmount_cfg.p_virtual_info_path)==0) {
// Attributes of virtual image info file
p_stat->st_mode=S_IFREG | 0444;
p_stat->st_nlink=1;
// Get virtual image info file size
if(glob_p_info_file!=NULL) {
p_stat->st_size=strlen(glob_p_info_file);
} else p_stat->st_size=0;
} else if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK ||
glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS)
{
// Some special files only present when emulating VMDK files
if(strcmp(p_path,glob_xmount_cfg.p_virtual_vmdk_path)==0) {
// Attributes of virtual vmdk file
if(!glob_xmount_cfg.writable) p_stat->st_mode=S_IFREG | 0444;
else p_stat->st_mode=S_IFREG | 0666;
p_stat->st_nlink=1;
// Get virtual image info file size
if(glob_p_vmdk_file!=NULL) {
p_stat->st_size=glob_vmdk_file_size;
} else p_stat->st_size=0;
} else if(glob_p_vmdk_lockdir1!=NULL &&
strcmp(p_path,glob_p_vmdk_lockdir1)==0)
{
p_stat->st_mode=S_IFDIR | 0777;
p_stat->st_nlink=2;
} else if(glob_p_vmdk_lockdir2!=NULL &&
strcmp(p_path,glob_p_vmdk_lockdir2)==0)
{
p_stat->st_mode=S_IFDIR | 0777;
p_stat->st_nlink=2;
} else if(glob_p_vmdk_lockfile_name!=NULL &&
strcmp(p_path,glob_p_vmdk_lockfile_name)==0)
{
p_stat->st_mode=S_IFREG | 0666;
if(glob_p_vmdk_lockfile_name!=NULL) {
p_stat->st_size=strlen(glob_p_vmdk_lockfile_name);
} else p_stat->st_size=0;
} else return -ENOENT;
} else return -ENOENT;
// Set uid and gid of all files to uid and gid of current process
p_stat->st_uid=getuid();
p_stat->st_gid=getgid();
return 0;
}
//! FUSE mkdir implementation
/*!
* \param p_path Directory path
* \param mode Directory permissions
* \return 0 on success, negated error code on error
*/
static int FuseMkDir(const char *p_path, mode_t mode) {
// Only allow creation of VMWare's lock directories
if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK ||
glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS)
{
if(glob_p_vmdk_lockdir1==NULL) {
char aVmdkLockDir[strlen(glob_xmount_cfg.p_virtual_vmdk_path)+5];
sprintf(aVmdkLockDir,"%s.lck",glob_xmount_cfg.p_virtual_vmdk_path);
if(strcmp(p_path,aVmdkLockDir)==0) {
LOG_DEBUG("Creating virtual directory \"%s\"\n",aVmdkLockDir)
XMOUNT_STRSET(glob_p_vmdk_lockdir1,aVmdkLockDir)
return 0;
} else {
LOG_ERROR("Attempt to create illegal directory \"%s\"!\n",p_path)
LOG_DEBUG("Supposed: %s\n",aVmdkLockDir)
return -1;
}
} else if(glob_p_vmdk_lockdir2==NULL &&
strncmp(p_path,
glob_p_vmdk_lockdir1,
strlen(glob_p_vmdk_lockdir1))==0)
{
LOG_DEBUG("Creating virtual directory \"%s\"\n",p_path)
XMOUNT_STRSET(glob_p_vmdk_lockdir2,p_path)
return 0;
} else {
LOG_ERROR("Attempt to create illegal directory \"%s\"!\n",p_path)
LOG_DEBUG("Compared to first %u chars of \"%s\"\n",
strlen(glob_p_vmdk_lockdir1),
glob_p_vmdk_lockdir1)
return -1;
}
}
LOG_ERROR("Attempt to create directory \"%s\" "
"on read-only filesystem!\n",p_path)
return -1;
}
//! FUSE create implementation.
/*!
* Currently only allows to create VMWare's lock file
*
* \param p_path File to create
* \param mode File mode
* \param dev ??? but not used
* \return 0 on success, negated error code on error
*/
static int FuseMkNod(const char *p_path, mode_t mode, dev_t dev) {
if((glob_xmount_cfg.VirtImageType==VirtImageType_VMDK ||
glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS) &&
glob_p_vmdk_lockdir1!=NULL && glob_p_vmdk_lockfile_name==NULL)
{
LOG_DEBUG("Creating virtual file \"%s\"\n",p_path)
XMOUNT_STRSET(glob_p_vmdk_lockfile_name,p_path);
return 0;
} else {
LOG_ERROR("Attempt to create illegal file \"%s\"\n",p_path)
return -1;
}
}
//! FUSE readdir implementation
/*!
* \param p_path Path from where files should be listed
* \param p_buf Buffer to write file entrys to
* \param filler Function to write dir entrys to buffer
* \param offset ??? but not used
* \param p_fi File info struct
* \return 0 on success, negated error code on error
*/
static int FuseReadDir(const char *p_path,
void *p_buf,
fuse_fill_dir_t filler,
off_t offset,
struct fuse_file_info *p_fi)
{
// Ignore some params
(void)offset;
(void)p_fi;
if(strcmp(p_path,"/")==0) {
// Add std . and .. entrys
filler(p_buf,".",NULL,0);
filler(p_buf,"..",NULL,0);
// Add our virtual files (p+1 to ignore starting "/")
filler(p_buf,glob_xmount_cfg.p_virtual_image_path+1,NULL,0);
filler(p_buf,glob_xmount_cfg.p_virtual_info_path+1,NULL,0);
if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK ||
glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS)
{
// For VMDK's, we use an additional descriptor file
filler(p_buf,glob_xmount_cfg.p_virtual_vmdk_path+1,NULL,0);
// And there could also be a lock directory
if(glob_p_vmdk_lockdir1!=NULL) {
filler(p_buf,glob_p_vmdk_lockdir1+1,NULL,0);
}
}
} else if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK ||
glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS)
{
// For VMDK emulation, there could be a lock directory
if(glob_p_vmdk_lockdir1!=NULL && strcmp(p_path,glob_p_vmdk_lockdir1)==0) {
filler(p_buf,".",NULL,0);
filler(p_buf,"..",NULL,0);
if(glob_p_vmdk_lockfile_name!=NULL) {
filler(p_buf,
glob_p_vmdk_lockfile_name+strlen(glob_p_vmdk_lockdir1)+1,
NULL,
0);
}
} else if(glob_p_vmdk_lockdir2!=NULL &&
strcmp(p_path,glob_p_vmdk_lockdir2)==0)
{
filler(p_buf,".",NULL,0);
filler(p_buf,"..",NULL,0);
} else return -ENOENT;
} else return -ENOENT;
return 0;
}
//! FUSE open implementation
/*!
* \param p_path Path to file to open
* \param p_fi File info struct
* \return 0 on success, negated error code on error
*/
static int FuseOpen(const char *p_path, struct fuse_file_info *p_fi) {
#define CHECK_OPEN_PERMS() { \
if(!glob_xmount_cfg.writable && (p_fi->flags & 3)!=O_RDONLY) { \
LOG_DEBUG("Attempt to open the read-only file \"%s\" for writing.\n", \
p_path) \
return -EACCES; \
} \
return 0; \
}
if(strcmp(p_path,glob_xmount_cfg.p_virtual_image_path)==0 ||
strcmp(p_path,glob_xmount_cfg.p_virtual_info_path)==0)
{
CHECK_OPEN_PERMS();
} else if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK ||
glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS)
{
if(strcmp(p_path,glob_xmount_cfg.p_virtual_vmdk_path)==0 ||
(glob_p_vmdk_lockfile_name!=NULL &&
strcmp(p_path,glob_p_vmdk_lockfile_name)==0))
{
CHECK_OPEN_PERMS();
}
}
#undef CHECK_OPEN_PERMS
LOG_DEBUG("Attempt to open inexistant file \"%s\".\n",p_path);
return -ENOENT;
}
//! FUSE read implementation
/*!
* \param p_path Path (relative to mount folder) of file to read data from
* \param p_buf Pre-allocated buffer where read data should be written to
* \param size Number of bytes to read
* \param offset Offset to start reading at
* \param p_fi: File info struct
* \return Read bytes on success, negated error code on error
*/
static int FuseRead(const char *p_path,
char *p_buf,
size_t size,
off_t offset,
struct fuse_file_info *p_fi)
{
(void)p_fi;
int ret;
uint64_t len;
#define READ_MEM_FILE(filebuf,filesize,filetypestr,mutex) { \
len=filesize; \
if(offset<len) { \
if(offset+size>len) { \
LOG_DEBUG("Attempt to read past EOF of virtual " filetypestr " file\n"); \
LOG_DEBUG("Adjusting read size from %u to %u\n",size,len-offset); \
size=len-offset; \
} \
pthread_mutex_lock(&mutex); \
memcpy(p_buf,filebuf+offset,size); \
pthread_mutex_unlock(&mutex); \
LOG_DEBUG("Read %" PRIu64 " bytes at offset %" PRIu64 \
" from virtual " filetypestr " file\n",size,offset); \
ret=size; \
} else { \
LOG_DEBUG("Attempt to read behind EOF of virtual " filetypestr " file\n"); \
ret=0; \
} \
}
if(strcmp(p_path,glob_xmount_cfg.p_virtual_image_path)==0) {
// Read data from virtual output file
// Wait for other threads to end reading/writing data
pthread_mutex_lock(&glob_mutex_image_rw);
// Get requested data
if((ret=GetVirtImageData(p_buf,offset,size))<0) {
LOG_ERROR("Couldn't read data from virtual image file!\n")
}
// Allow other threads to read/write data again
pthread_mutex_unlock(&glob_mutex_image_rw);
} else if(strcmp(p_path,glob_xmount_cfg.p_virtual_info_path)==0) {
// Read data from virtual info file
READ_MEM_FILE(glob_p_info_file,
strlen(glob_p_info_file),
"info",
glob_mutex_info_read);
} else if(strcmp(p_path,glob_xmount_cfg.p_virtual_vmdk_path)==0) {
// Read data from virtual vmdk file
READ_MEM_FILE(glob_p_vmdk_file,
glob_vmdk_file_size,
"vmdk",
glob_mutex_image_rw);
} else if(glob_p_vmdk_lockfile_name!=NULL &&
strcmp(p_path,glob_p_vmdk_lockfile_name)==0)
{
// Read data from virtual lock file
READ_MEM_FILE(glob_p_vmdk_lockfile_data,
glob_vmdk_lockfile_size,
"vmdk lock",
glob_mutex_image_rw);
} else {
// Attempt to read non existant file
LOG_DEBUG("Attempt to read from non existant file \"%s\"\n",p_path)
ret=-ENOENT;
}
#undef READ_MEM_FILE
return ret;
}
//! FUSE rename implementation
/*!
* \param p_path File to rename
* \param p_npath New filename
* \return 0 on error, negated error code on error
*/
static int FuseRename(const char *p_path, const char *p_npath) {
if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK ||
glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS)
{
if(glob_p_vmdk_lockfile_name!=NULL &&
strcmp(p_path,glob_p_vmdk_lockfile_name)==0)
{
LOG_DEBUG("Renaming virtual lock file from \"%s\" to \"%s\"\n",
glob_p_vmdk_lockfile_name,
p_npath)
XMOUNT_REALLOC(glob_p_vmdk_lockfile_name,char*,
(strlen(p_npath)+1)*sizeof(char));
strcpy(glob_p_vmdk_lockfile_name,p_npath);
return 0;
}
}
return -ENOENT;
}
//! FUSE rmdir implementation
/*!
* \param p_path Directory to delete
* \return 0 on success, negated error code on error
*/
static int FuseRmDir(const char *p_path) {
// Only VMWare's lock directories can be deleted
if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK ||
glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS)
{
if(glob_p_vmdk_lockdir1!=NULL && strcmp(p_path,glob_p_vmdk_lockdir1)==0) {
LOG_DEBUG("Deleting virtual lock dir \"%s\"\n",glob_p_vmdk_lockdir1)
free(glob_p_vmdk_lockdir1);
glob_p_vmdk_lockdir1=NULL;
return 0;
} else if(glob_p_vmdk_lockdir2!=NULL &&
strcmp(p_path,glob_p_vmdk_lockdir2)==0)
{
LOG_DEBUG("Deleting virtual lock dir \"%s\"\n",glob_p_vmdk_lockdir1)
free(glob_p_vmdk_lockdir2);
glob_p_vmdk_lockdir2=NULL;
return 0;
}
}
return -1;
}
//! FUSE unlink implementation
/*!
* \param p_path File to delete
* \return 0 on success, negated error code on error
*/
static int FuseUnlink(const char *p_path) {
// Only VMWare's lock file can be deleted
if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK ||
glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS)
{
if(glob_p_vmdk_lockfile_name!=NULL &&
strcmp(p_path,glob_p_vmdk_lockfile_name)==0)
{
LOG_DEBUG("Deleting virtual file \"%s\"\n",glob_p_vmdk_lockfile_name)
free(glob_p_vmdk_lockfile_name);
free(glob_p_vmdk_lockfile_data);
glob_p_vmdk_lockfile_name=NULL;
glob_p_vmdk_lockfile_data=NULL;
glob_vmdk_lockfile_size=0;
return 0;
}
}
return -1;
}
//! FUSE statfs implementation
/*!
* \param p_path Get stats for fs that the specified file resides in
* \param stats Stats
* \return 0 on success, negated error code on error
*/
/*
static int FuseStatFs(const char *p_path, struct statvfs *stats) {
struct statvfs CacheFileFsStats;
int ret;
if(glob_xmount_cfg.writable==TRUE) {
// If write support is enabled, return stats of fs upon which cache file
// resides in
if((ret=statvfs(glob_xmount_cfg.p_cache_file,&CacheFileFsStats))==0) {
memcpy(stats,&CacheFileFsStats,sizeof(struct statvfs));
return 0;
} else {
LOG_ERROR("Couldn't get stats for fs upon which resides \"%s\"\n",
glob_xmount_cfg.p_cache_file)
return ret;
}
} else {
// TODO: Return read only
return 0;
}
}
*/
// FUSE write implementation
/*!
* \param p_buf Buffer containing data to write
* \param size Number of bytes to write
* \param offset Offset to start writing at
* \param p_fi: File info struct
*
* Returns:
* Written bytes on success, negated error code on error
*/
static int FuseWrite(const char *p_path,
const char *p_buf,
size_t size,
off_t offset,
struct fuse_file_info *p_fi)
{
(void)p_fi;
uint64_t len;
if(strcmp(p_path,glob_xmount_cfg.p_virtual_image_path)==0) {
// Wait for other threads to end reading/writing data
pthread_mutex_lock(&glob_mutex_image_rw);
// Get virtual image file size
if(!GetVirtImageSize(&len)) {
LOG_ERROR("Couldn't get virtual image size!\n")
pthread_mutex_unlock(&glob_mutex_image_rw);
return 0;
}
if(offset<len) {
if(offset+size>len) size=len-offset;
if(SetVirtImageData(p_buf,offset,size)!=size) {
LOG_ERROR("Couldn't write data to virtual image file!\n")
pthread_mutex_unlock(&glob_mutex_image_rw);
return 0;
}
} else {
LOG_DEBUG("Attempt to write past EOF of virtual image file\n")
pthread_mutex_unlock(&glob_mutex_image_rw);
return 0;
}
// Allow other threads to read/write data again
pthread_mutex_unlock(&glob_mutex_image_rw);
} else if(strcmp(p_path,glob_xmount_cfg.p_virtual_vmdk_path)==0) {
pthread_mutex_lock(&glob_mutex_image_rw);
len=glob_vmdk_file_size;
if((offset+size)>len) {
// Enlarge or create buffer if needed
if(len==0) {
len=offset+size;
XMOUNT_MALLOC(glob_p_vmdk_file,char*,len*sizeof(char))
} else {
len=offset+size;
XMOUNT_REALLOC(glob_p_vmdk_file,char*,len*sizeof(char))
}
glob_vmdk_file_size=offset+size;
}
// Copy data to buffer
memcpy(glob_p_vmdk_file+offset,p_buf,size);
pthread_mutex_unlock(&glob_mutex_image_rw);
} else if(glob_p_vmdk_lockfile_name!=NULL &&
strcmp(p_path,glob_p_vmdk_lockfile_name)==0)
{
pthread_mutex_lock(&glob_mutex_image_rw);
if((offset+size)>glob_vmdk_lockfile_size) {
// Enlarge or create buffer if needed
if(glob_vmdk_lockfile_size==0) {
glob_vmdk_lockfile_size=offset+size;
XMOUNT_MALLOC(glob_p_vmdk_lockfile_data,char*,
glob_vmdk_lockfile_size*sizeof(char))
} else {
glob_vmdk_lockfile_size=offset+size;
XMOUNT_REALLOC(glob_p_vmdk_lockfile_data,char*,
glob_vmdk_lockfile_size*sizeof(char))
}
}
// Copy data to buffer
memcpy(glob_p_vmdk_lockfile_data+offset,p_buf,size);
pthread_mutex_unlock(&glob_mutex_image_rw);
} else if(strcmp(p_path,glob_xmount_cfg.p_virtual_info_path)==0) {
// Attempt to write data to read only image info file
LOG_DEBUG("Attempt to write data to virtual info file\n");
return -ENOENT;
} else {
// Attempt to write to non existant file
LOG_DEBUG("Attempt to write to the non existant file \"%s\"\n",p_path)
return -ENOENT;
}
return size;
}
/*******************************************************************************
* Main
******************************************************************************/
int main(int argc, char *argv[]) {
char **pp_input_filenames=NULL;
int input_filenames_count=0;
int nargc=0;
char **pp_nargv=NULL;
char *p_mountpoint=NULL;
struct stat file_stat;
int ret;
int fuse_ret;
char *p_err_msg;
// Set implemented FUSE functions
struct fuse_operations xmount_operations = {
//.access=FuseAccess,
.getattr=FuseGetAttr,
.mkdir=FuseMkDir,
.mknod=FuseMkNod,
.open=FuseOpen,
.readdir=FuseReadDir,
.read=FuseRead,
.rename=FuseRename,
.rmdir=FuseRmDir,
//.statfs=FuseStatFs,
.unlink=FuseUnlink,
.write=FuseWrite
};
// Disable std output / input buffering
setbuf(stdout,NULL);
setbuf(stderr,NULL);
// Init glob_xmount_cfg
glob_xmount_cfg.p_orig_image_type=NULL;
#ifndef __APPLE__
glob_xmount_cfg.VirtImageType=VirtImageType_DD;
#else
glob_xmount_cfg.VirtImageType=VirtImageType_DMG;
#endif
glob_xmount_cfg.debug=FALSE;
glob_xmount_cfg.p_virtual_image_path=NULL;
glob_xmount_cfg.p_virtual_vmdk_path=NULL;
glob_xmount_cfg.p_virtual_info_path=NULL;
glob_xmount_cfg.writable=FALSE;
glob_xmount_cfg.overwrite_cache=FALSE;
glob_xmount_cfg.p_cache_file=NULL;
glob_xmount_cfg.orig_image_size=0;
glob_xmount_cfg.virt_image_size=0;
glob_xmount_cfg.input_hash_lo=0;
glob_xmount_cfg.input_hash_hi=0;
glob_xmount_cfg.orig_img_offset=0;
glob_xmount_cfg.p_lib_params=NULL;
glob_xmount_cfg.may_set_fuse_allow_other=FALSE;
// Load input libs
if(!LoadInputLibs()) {
LOG_ERROR("Unable to load any input libraries!\n")
return 1;
}
// Check FUSE settings
CheckFuseSettings();
// Parse command line options
if(!ParseCmdLine(argc,
argv,
&nargc,
&pp_nargv,
&input_filenames_count,
&pp_input_filenames,
&p_mountpoint))
{
LOG_ERROR("Error parsing command line options!\n")
//PrintUsage(argv[0]);
UnloadInputLibs();
return 1;
}
// Check command line options
if(nargc<2 /*|| input_filenames_count==0 || p_mountpoint==NULL*/) {
LOG_ERROR("Couldn't parse command line options!\n")
PrintUsage(argv[0]);
UnloadInputLibs();
return 1;
}
// Check if mountpoint is a valid dir
if(stat(p_mountpoint,&file_stat)!=0) {
LOG_ERROR("Unable to stat mount point '%s'!\n",p_mountpoint);
PrintUsage(argv[0]);
UnloadInputLibs();
return 1;
}
if(!S_ISDIR(file_stat.st_mode)) {
LOG_ERROR("Mount point '%s' is not a directory!\n",p_mountpoint);
PrintUsage(argv[0]);
UnloadInputLibs();
return 1;
}
// If no input type was specified, default to "dd"
if(glob_xmount_cfg.p_orig_image_type==NULL) {
XMOUNT_STRSET(glob_xmount_cfg.p_orig_image_type,"dd");
}
// Find an input lib for the specified input type
if(!FindInputLib()) {
LOG_ERROR("Unknown input image type \"%s\"!\n",
glob_xmount_cfg.p_orig_image_type)
PrintUsage(argv[0]);
UnloadInputLibs();
return 1;
}
// Init input image handle
ret=glob_p_input_functions->CreateHandle(&glob_p_input_image);
if(ret!=0) {
LOG_ERROR("Unable to init input handle: %s!\n",
glob_p_input_functions->GetErrorMessage(ret));
return 1;
}
// Parse input lib specific options
if(glob_xmount_cfg.p_lib_params!=NULL) {
ret=glob_p_input_functions->OptionsParse(glob_p_input_image,
glob_xmount_cfg.p_lib_params,
&p_err_msg);
if(ret!=0) {
if(p_err_msg!=NULL) {
LOG_ERROR("Unable to parse input library specific options: %s: %s!\n",
glob_p_input_functions->GetErrorMessage(ret),
p_err_msg);
glob_p_input_functions->FreeBuffer(p_err_msg);
} else {
LOG_ERROR("Unable to parse input library specific options: %s!\n",
glob_p_input_functions->GetErrorMessage(ret));
}
}
}
if(glob_xmount_cfg.debug==TRUE) {
LOG_DEBUG("Options passed to FUSE: ")
for(int i=0;i<nargc;i++) { printf("%s ",pp_nargv[i]); }
printf("\n");
}
// Init mutexes
pthread_mutex_init(&glob_mutex_image_rw,NULL);
pthread_mutex_init(&glob_mutex_info_read,NULL);
if(input_filenames_count==1) {
LOG_DEBUG("Loading image file \"%s\"...\n",
pp_input_filenames[0])
} else {
LOG_DEBUG("Loading image files \"%s .. %s\"...\n",
pp_input_filenames[0],
pp_input_filenames[input_filenames_count-1])
}
// Init random generator
srand(time(NULL));
// Open input image
ret=glob_p_input_functions->Open(&glob_p_input_image,
(const char**)pp_input_filenames,
input_filenames_count);
if(ret!=0) {
LOG_ERROR("Unable to open input image file: %s!\n",
glob_p_input_functions->GetErrorMessage(ret));
UnloadInputLibs();
return 1;
}
LOG_DEBUG("Input image file opened successfully\n")
// If an offset was specified, make sure it is within limits
if(glob_xmount_cfg.orig_img_offset!=0) {
uint64_t size;
if(!GetOrigImageSize(&size,TRUE)) {
LOG_ERROR("Couldn't get original image's size!\n");
return 1;
}
if(glob_xmount_cfg.orig_img_offset>size) {
LOG_ERROR("The specified offset is larger then the size of the input "
"image! (%" PRIu64 " > %" PRIu64 ")\n",
glob_xmount_cfg.orig_img_offset,
size);
return 1;
}
}
// Calculate partial MD5 hash of input image file
if(CalculateInputImageHash(&(glob_xmount_cfg.input_hash_lo),
&(glob_xmount_cfg.input_hash_hi))==FALSE)
{
LOG_ERROR("Couldn't calculate partial hash of input image file!\n")
return 1;
}
if(glob_xmount_cfg.debug==TRUE) {
LOG_DEBUG("Partial MD5 hash of input image file: ")
for(int i=0;i<8;i++)
printf("%02hhx",*(((char*)(&(glob_xmount_cfg.input_hash_lo)))+i));
for(int i=0;i<8;i++)
printf("%02hhx",*(((char*)(&(glob_xmount_cfg.input_hash_hi)))+i));
printf("\n");
}
if(!ExtractVirtFileNames(pp_input_filenames[0])) {
LOG_ERROR("Couldn't extract virtual file names!\n");
UnloadInputLibs();
return 1;
}
LOG_DEBUG("Virtual file names extracted successfully\n")
// Gather infos for info file
if(!InitVirtImageInfoFile()) {
LOG_ERROR("Couldn't gather infos for virtual image info file!\n")
UnloadInputLibs();
return 1;
}
LOG_DEBUG("Virtual image info file build successfully\n")
// Do some virtual image type specific initialisations
switch(glob_xmount_cfg.VirtImageType) {
case VirtImageType_DD:
case VirtImageType_DMG:
break;
case VirtImageType_VDI:
// When mounting as VDI, we need to construct a vdi header
if(!InitVirtVdiHeader()) {
LOG_ERROR("Couldn't initialize virtual VDI file header!\n")
UnloadInputLibs();
return 1;
}
LOG_DEBUG("Virtual VDI file header build successfully\n")
break;
case VirtImageType_VHD:
// When mounting as VHD, we need to construct a vhd footer
if(!InitVirtVhdHeader()) {
LOG_ERROR("Couldn't initialize virtual VHD file footer!\n")
UnloadInputLibs();
return 1;
}
LOG_DEBUG("Virtual VHD file footer build successfully\n")
break;
case VirtImageType_VMDK:
case VirtImageType_VMDKS:
// When mounting as VMDK, we need to construct the VMDK descriptor file
if(!InitVirtualVmdkFile()) {
LOG_ERROR("Couldn't initialize virtual VMDK file!\n")
UnloadInputLibs();
return 1;
}
break;
}
if(glob_xmount_cfg.writable) {
// Init cache file and cache file block index
if(!InitCacheFile()) {
LOG_ERROR("Couldn't initialize cache file!\n")
UnloadInputLibs();
return 1;
}
LOG_DEBUG("Cache file initialized successfully\n")
}
// Call fuse_main to do the fuse magic
fuse_ret=fuse_main(nargc,pp_nargv,&xmount_operations,NULL);
// Destroy mutexes
pthread_mutex_destroy(&glob_mutex_image_rw);
pthread_mutex_destroy(&glob_mutex_info_read);
// Close input image and destroy handle
ret=glob_p_input_functions->Close(&glob_p_input_image);
if(ret!=0) {
LOG_ERROR("Unable to close input image file: %s!",
glob_p_input_functions->GetErrorMessage(ret));
}
ret=glob_p_input_functions->DestroyHandle(&glob_p_input_image);
if(ret!=0) {
LOG_ERROR("Unable to destroy input image handle: %s!",
glob_p_input_functions->GetErrorMessage(ret));
}
// Close cache file if write support was enabled
if(glob_xmount_cfg.writable) {
fclose(glob_p_cache_file);
free(glob_p_cache_header);
}
// Free allocated memory
// Free info file content
if(glob_p_info_file!=NULL) free(glob_p_info_file);
// Free output image specific data
switch(glob_xmount_cfg.VirtImageType) {
case VirtImageType_DD:
case VirtImageType_DMG:
break;
case VirtImageType_VDI:
free(glob_p_vdi_header);
break;
case VirtImageType_VHD:
free(glob_p_vhd_header);
break;
case VirtImageType_VMDK:
case VirtImageType_VMDKS: {
free(glob_p_vmdk_file);
free(glob_xmount_cfg.p_virtual_vmdk_path);
if(glob_p_vmdk_lockfile_name!=NULL) free(glob_p_vmdk_lockfile_name);
if(glob_p_vmdk_lockfile_data!=NULL) free(glob_p_vmdk_lockfile_data);
if(glob_p_vmdk_lockdir1!=NULL) free(glob_p_vmdk_lockdir1);
if(glob_p_vmdk_lockdir2!=NULL) free(glob_p_vmdk_lockdir2);
break;
}
}
// Free input filenames
if(pp_input_filenames!=NULL) {
for(int i=0;i<input_filenames_count;i++) free(pp_input_filenames[i]);
free(pp_input_filenames);
}
// Free constructed argv
if(pp_nargv!=NULL) {
for(int i=0;i<nargc;i++) free(pp_nargv[i]);
free(pp_nargv);
}
// Free mountpoint
if(p_mountpoint!=NULL) free(p_mountpoint);
// Free virtual paths
free(glob_xmount_cfg.p_virtual_image_path);
free(glob_xmount_cfg.p_virtual_info_path);
// Free cachefile path
free(glob_xmount_cfg.p_cache_file);
// Unload input libs
UnloadInputLibs();
return fuse_ret;
}
/*
----- Change log -----
20090131: v0.1.0 released
* Some minor things have still to be done.
* Mounting ewf as dd: Seems to work. Diff didn't complain about
changes between original dd and emulated dd.
* Mounting ewf as vdi: Seems to work too. VBox accepts the emulated
vdi as valid vdi file and I was able to mount the containing fs
under Debian. INFO: Debian freezed when not using mount -r !!
20090203: v0.1.1 released
* Multiple code improvements. For ex. cleaner vdi header allocation.
* Fixed severe bug in image block calculation. Didn't check for odd
input in conversion from bytes to megabytes.
* Added more debug output
20090210: v0.1.2 released
* Fixed compilation problem (Typo in image_init_info() function).
* Fixed some problems with the debian scripts to be able to build
packages.
* Added random generator initialisation (Makes it possible to use
more than one image in VBox at a time).
20090215: * Added function init_cache_blocks which creates / loads a cache
file used to implement virtual write capability.
20090217: * Implemented the fuse write function. Did already some basic tests
with dd and it seems to work. But there are certainly still some
bugs left as there are also still some TODO's left.
20090226: * Changed program name from mountewf to xmount.
* Began with massive code cleanups to ease full implementation of
virtual write support and to be able to support multiple input
image formats (DD, EWF and AFF are planned for now).
* Added defines for supported input formats so it should be possible
to compile xmount without supporting all input formats. (DD
input images are always supported as these do not require any
additional libs). Input formats should later be en/disabled
by the configure script in function to which libs it detects.
* GetOrigImageSize function added to get the size of the original
image whatever type it is in.
* GetOrigImageData function added to retrieve data from original
image file whatever type it is in.
* GetVirtImageSize function added to get the size of the virtual
image file.
* Cleaned function mountewf_getattr and renamed it to
GetVirtFileAttr
* Cleaned function mountewf_readdir and renamed it to GetVirtFiles
* Cleaned function mountewf_open and renamed it to OpenVirtFile
20090227: * Cleaned function init_info_file and renamed it to
InitVirtImageInfoFile
20090228: * Cleaned function init_cache_blocks and renamed it to
InitCacheFile
* Added LogMessage function to ease error and debug logging (See
also LOG_ERROR and LOG_DEBUG macros in xmount.h)
* Cleaned function init_vdi_header and renamed it to
InitVirtVdiHeader
* Added PrintUsage function to print out xmount usage informations
* Cleaned function parse_cmdline and renamed it to ParseCmdLine
* Cleaned function main
* Added ExtractVirtFileNames function to extract virtual file names
from input image name
* Added function GetVirtImageData to retrieve data from the virtual
image file. This includes reading data from cache file if virtual
write support is enabled.
* Added function ReadVirtFile to replace mountewf_read
20090229: * Fixed a typo in virtual file name creation
* Added function SetVirtImageData to write data to virtual image
file. This includes writing data to cache file and caching entire
new blocks
* Added function WriteVirtFile to replace mountewf_write
20090305: * Solved a problem that made it impossible to access offsets >32bit
20090308: * Added SetVdiFileHeaderData function to handle virtual image type
specific data to be cached. This makes cache files independent
from virtual image type
20090316: v0.2.0 released
20090327: v0.2.1 released
* Fixed a bug in virtual write support. Checking whether data is
cached didn't use semaphores. This could corrupt cache files
when running multi-threaded.
* Added IsVdiFileHeaderCached function to check whether VDI file
header was already cached
* Added IsBlockCached function to check whether a block was already
cached
20090331: v0.2.2 released (Internal release)
* Further changes to semaphores to fix write support bug.
20090410: v0.2.3 released
* Reverted most of the fixes from v0.2.1 and v0.2.2 as those did not
solve the write support bug.
* Removed all semaphores
* Added two pthread mutexes to protect virtual image and virtual
info file.
20090508: * Configure script will now exit when needed libraries aren't found
* Added support for newest libewf beta version 20090506 as it seems
to reduce memory usage when working with EWF files by about 1/2.
* Added LIBEWF_BETA define to adept source to new libewf API.
* Added function InitVirtualVmdkFile to build a VmWare virtual disk
descriptor file.
20090519: * Added function CreateVirtDir implementing FUSE's mkdir to allow
VMWare to create his <iname>.vmdk.lck lock folder. Function does
not allow to create other folders!
* Changed cache file handling as VMDK caching will need new cache
file structure incompatible to the old one.
20090522: v0.3.0 released
* Added function DeleteVirtFile and DeleteVirtDir so VMWare can
remove his lock directories and files.
* Added function RenameVirtFile because VMWare needs to rename his
lock files.
* VMDK support should work now but descriptor file won't get cached
as I didn't implement it yet.
20090604: * Added --cache commandline parameter doing the same as --rw.
* Added --owcache commandline parameter doing the same as --rw but
overwrites any existing cache data. This can be handy for
debugging and testing purposes.
* Added "vmdks" output type. Same as "vmdk" but generates a disk
connected to the SCSI bus rather than the IDE bus.
20090710: v0.3.1 released
20090721: * Added function CheckFuseAllowOther to check wether FUSE supports
the "-o allow_other" option. It is supported when
"user_allow_other" is set in /etc/fuse.conf or when running
xmount as root.
* Automatic addition of FUSE's "-o allow_other" option if it is
supported.
* Added special "-o no_allow_other" command line parameter to
disable automatic addition of the above option.
* Reorganisation of FUSE's and xmount's command line options
processing.
* Added LogWarnMessage function to output a warning message.
20090722: * Added function CalculateInputImageHash to calculate an MD5 hash
of the first input image's HASH_AMOUNT bytes of data. This hash is
used as VDI creation UUID and will later be used to match cache
files to input images.
20090724: v0.3.2 released
20090725: v0.4.0 released
* Added AFF input image support.
* Due to various problems with libewf and libaff packages (Mainly
in Debian and Ubuntu), I decided to include them into xmount's
source tree and link them in statically. This has the advantage
that I can use whatever version I want.
20090727: v0.4.1 released
* Added again the ability to compile xmount with shared libs as the
Debian folks don't like the static ones :)
20090812: * Added TXMountConfData.OrigImageSize and
TXMountConfData.VirtImageSize to save the size of the input and
output image in order to avoid regetting it always from disk.
20090814: * Replaced all malloc and realloc occurences with the two macros
XMOUNT_MALLOC and XMOUNT_REALLOC.
20090816: * Replaced where applicable all occurences of str(n)cpy or
alike with their corresponding macros XMOUNT_STRSET, XMOUNT_STRCPY
and XMOUNT_STRNCPY pendants.
20090907: v0.4.2 released
* Fixed a bug in VMDK lock file access. glob_vmdk_lockfile_size
wasn't reset to 0 when the file was deleted.
* Fixed a bug in VMDK descriptor file access. Had to add
glob_vmdk_file_size to track the size of this file as strlen was
a bad idea :).
20100324: v0.4.3 released
* Changed all header structs to prevent different sizes on i386 and
amd64. See xmount.h for more details.
20100810: v0.4.4 released
* Found a bug in InitVirtVdiHeader(). The 64bit values were
addressed incorrectly while filled with rand(). This leads to an
error message when trying to add a VDI file to VirtualBox 3.2.8.
20110210: * Adding subtype and fsname FUSE options in order to display mounted
source in mount command output.
20110211: v0.4.5 released
20111011: * Changes to deal with libewf v2 API (thx to Joachim Metz)
20111109: v0.4.6 released
* Added support for DMG output type (actually a DD with .dmg file
extension). This type is used as default output type when
using xmount under Mac OS X.
20120130: v0.4.7 released
* Made InitVirtImageInfoFile less picky about missing EWF infos.
20120507: * Added support for VHD output image as requested by various people.
* Statically linked libs updated to 20120504 (libewf) and 3.7.0
(afflib).
20120510: v0.5.0 released
* Added stbuf->st_blocks calculation for VHD images in function
GetVirtFileAttr. This makes Windows not think the emulated
file would be a sparse file. Sparse vhd files are not attachable
in Windows.
20130726: v0.6.0 released
* Added libaaff to replace libaff (thx to Guy Voncken).
* Added libdd to replace raw dd input file handling and finally
support split dd files (thx to Guy Voncken).
20140311: * Added libaewf (thx to Guy Voncken).
20140726: * Added support for dynamically loading of input libs. This should
ease adding support for new input image formats in the future.
* Moved input image functions to their corresponding dynamically
loadable libs.
* Prepended "glob_" to all global vars for better identification.
20140731: * Added --offset option as requested by HPM.
* Began massive code cleanup.
20140803: * Added correct return code handling when calling input lib
functions including getting error messages using GetErrorMessage.
* Added input lib specific option parsing.
* Re-implemented InitVirtImageInfoFile using input lib's
GetInfofileContent function.
* Further code cleanups.
20140807: * Further code cleanups.
* Renamed GetVirtFileAttr to FuseGetAttr
* Renamed CreateVirtDir to FuseMkDir
* Renamed CreateVirtDir to FuseMkNod
* Renamed OpenVirtFile to FuseOpen
* Renamed GetVirtFiles to FuseReadDir
* Renamed ReadVirtFile to FuseRead
* Renamed RenameVirtFile to FuseRename
* Renamed DeleteVirtDir to FuseRmDir
* Renamed DeleteVirtFile to FuseUnlink
* Renamed WriteVirtFile to FuseWrite
* Fixed bug in CalculateInputImageHash where always HASH_AMOUNT
bytes were hased even if input image is smaller.
* Fixed a newly introduced bug in FuseRead and GetVirtImageData
returning -EIO when trying to read behind EOF. The correct return
value is 0.
20140811: * Renamed CheckFuseAllowOther to CheckFuseSettings and added a
check to see if user is part of the fuse group.
+ 20140814: * Replaced cuserid() with getpwuid(geteuid()) in CheckFuseSettings
+ as it is deprecated on Linux and not available on OSx.
+ * Only build fuse group checks from CheckFuseSettings on Linux.
*/
diff --git a/trunk/xmount.spec b/trunk/xmount.spec
index f3ee4e5..0a514ba 100644
--- a/trunk/xmount.spec
+++ b/trunk/xmount.spec
@@ -1,58 +1,57 @@
%define debug_package %{nil}
Name: xmount
Summary: Tool to crossmount between multiple input and output harddisk images
-Version: 0.5.0
+Version: 0.7.0
Release: 1%{?dist}
License: GPL
Group: Applications/System
URL: https://www.pinguin.lu/
Source0: %{name}-%{version}.tar.gz
Buildroot: %{_tmppath}/%{name}-%{version}-%{release}-root
Requires: fuse openssl zlib libewf afflib
-BuildRequires: fuse-devel libewf-devel >= 20110903 afflib-devel
+BuildRequires: cmake fuse-devel zlib-devel libewf-devel afflib-devel
%description
xmount allows you to convert on-the-fly between multiple input and output
-harddisk image types. xmount creates a virtual file system using FUSE
+harddisk image formats. xmount creates a virtual file system using FUSE
(Filesystem in Userspace) that contains a virtual representation of the input
-harddisk image. The virtual representation can be in raw DD, VirtualBox's
-virtual disk file format, Microsoft's Virtual Hard Disk Image format or in
-VMware's VMDK format. Input harddisk images can be raw DD or EWF (Expert
-Witness Compression Format) files. In addition, xmount also supports virtual
-write access to the output files that is redirected to a cache file. This
-makes it for example possible to boot acquired harddisk images using QEMU,
-KVM, VirtualBox, VMware or alike.
-%prep
-%setup -q
-autoreconf
+harddisk image. The virtual representation can be in raw DD, Apple's Disk Image
+format (DMG), VirtualBox's virtual disk file format (VDI), Microsoft's Virtual
+Hard Disk Image format (VHD) or in VmWare's VMDK file format. Input images can
+be raw DD, EWF (Expert Witness Compression Format) or AFF (Advanced Forensic
+Format) files. In addition, xmount also supports virtual write access to the
+output files that is redirected to a cache file. This makes it for example
+possible to boot acquired harddisk images using QEMU, KVM, VirtualBox, VMware
+or alike.
%build
-%configure
-make
+%cmake -DCMAKE_INSTALL_PREFIX=%{_prefix} .
+make %{?_smp_mflags}
%install
rm -fr %{buildroot}
+make install DESTDIR=%{buildroot}
%makeinstall
%clean
rm -fr %{buildroot}
%post
%preun
%postun
%files
%defattr(-,root,root)
%{_bindir}/*
%{_mandir}/*
%doc AUTHORS COPYING INSTALL NEWS README ROADMAP
%changelog
-* Sun May 6 2012 Daniel Gillen <gillen.dan@pinguin.lu> 0.5.0-1
-* Release 0.5.0-1
- Added support for virtual VHD image file emulation
+* Wed Aug 13 2014 Daniel Gillen <gillen.dan@pinguin.lu> 0.7.0-1
+* Release 0.7.0-1
+ See ChangeLog for details

File Metadata

Mime Type
text/x-diff
Expires
Sun, Aug 24, 1:08 PM (1 d, 4 h)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
1310216
Default Alt Text
(132 KB)

Event Timeline