diff --git a/trunk/BuildLibs.sh b/trunk/BuildLibs.sh index b599d9c..48d6fee 100755 --- a/trunk/BuildLibs.sh +++ b/trunk/BuildLibs.sh @@ -1,47 +1,47 @@ #!/bin/bash control_c() { echo echo Exiting exit 0 } trap control_c SIGINT if [ -z "$1" ]; then echo "Usage: $0 " exit 1 fi JOBS=$1 ( cd libxmount_input/libxmount_input_aff/ echo echo "Extracting libaff" rm -rf libaff &>/dev/null tar xfz libaff-*.tar.gz echo read -p "Ready to configure LIBAFF?" cd libaff ./bootstrap.sh - CFLAGS="-fPIC" CXXFLAGS="-fPIC" ./configure --disable-qemu --disable-libewf --disable-fuse --disable-shared --enable-static --disable-s3 --enable-threading + CFLAGS="-fPIC" CXXFLAGS="-fPIC" ./configure --disable-qemu --disable-libewf --disable-fuse --disable-s3 --disable-shared --enable-static --enable-threading echo read -p "Ready to compile LIBAFF?" make -j$JOBS ) ( cd libxmount_input/libxmount_input_ewf echo echo "Extracting libewf" rm -rf libewf &>/dev/null tar xfz libewf-*.tar.gz echo read -p "Ready to configure LIBEWF?" cd libewf CFLAGS="-fPIC" ./configure --disable-v1-api --disable-shared --enable-static --without-libbfio --without-libfuse --without-openssl echo read -p "Ready to compile LIBEWF?" make -j$JOBS ) diff --git a/trunk/CMakeLists.txt b/trunk/CMakeLists.txt index 1579a25..69c0400 100644 --- a/trunk/CMakeLists.txt +++ b/trunk/CMakeLists.txt @@ -1,90 +1,93 @@ cmake_minimum_required(VERSION 2.8) project(xmount C) include(CheckIncludeFiles) #include(CheckCSourceCompiles) # Only for internal packaging #set(STATIC_EWF 1) #set(STATIC_AFF 1) +if(APPLE) + # On OSx, do not try to find frameworks but only std headers / libraries + set(CMAKE_FIND_FRAMEWORK "NEVER") +endif(APPLE) + # Make sure CMAKE_BUILD_TYPE is set if(NOT CMAKE_BUILD_TYPE) set(CMAKE_BUILD_TYPE "Release") else(NOT CMAKE_BUILD_TYPE) if(NOT (CMAKE_BUILD_TYPE STREQUAL "Release" OR CMAKE_BUILD_TYPE STREQUAL "Debug")) message(FATAL_ERROR "Only build types 'Release' and 'Debug' are supported!") endif(NOT (CMAKE_BUILD_TYPE STREQUAL "Release" OR CMAKE_BUILD_TYPE STREQUAL "Debug")) endif(NOT CMAKE_BUILD_TYPE) # Add cmake_modules dir to CMAKE_MODULE_PATH set(CMAKE_MODULE_PATH ${CMAKE_MODULE_PATH} "${CMAKE_SOURCE_DIR}/cmake_modules/") # Check required headers check_include_files(stdlib.h HAVE_STDLIB_H) check_include_files(stdio.h HAVE_STDIO_H) check_include_files(stdint.h HAVE_STDINT_H) check_include_files(stdarg.h HAVE_STDARG_H) check_include_files(string.h HAVE_STRING_H) check_include_files(errno.h HAVE_ERRNO_H) check_include_files(fcntl.h HAVE_FCNTL_H) check_include_files(dlfcn.h HAVE_DLFCN_H) check_include_files(dirent.h HAVE_DIRENT_H) check_include_files(unistd.h HAVE_UNISTD_H) check_include_files(sys/ioctl.h HAVE_SYS_IOCTL_H) check_include_files(sys/stat.h HAVE_SYS_STAT_H) check_include_files(sys/types.h HAVE_SYS_TYPES_H) check_include_files(linux/fs.h HAVE_LINUX_FS_H) check_include_files(grp.h HAVE_GRP_H) +check_include_files(pwd.h HAVE_PWD_H) check_include_files(pthread.h HAVE_PTHREAD_H) check_include_files(time.h HAVE_TIME_H) check_include_files(inttypes.h HAVE_INTTYPES_H) check_include_files(byteswap.h HAVE_BYTESWAP_H) check_include_files(endian.h HAVE_ENDIAN_H) check_include_files(libkern/OSByteOrder.h HAVE_LIBKERN_OSBYTEORDER_H) # Check for required libs if(NOT APPLE) find_package(LibFUSE REQUIRED) - include_directories(${LIBFUSE_INCLUDE_DIRS}) - set(LIBS ${LIBS} ${LIBFUSE_LIBRARIES}) else(NOT APPLE) + # On OSx, search for osxfuse find_package(LibOSXFUSE REQUIRED) - include_directories(${LIBOSXFUSE_INCLUDE_DIRS}) - set(LIBS ${LIBS} ${LIBOSXFUSE_LIBRARIES}) endif(NOT APPLE) # Generate config.h and add it's path to the include dirs configure_file(${CMAKE_CURRENT_SOURCE_DIR}/config.h.in ${CMAKE_CURRENT_BINARY_DIR}/config.h) include_directories(${CMAKE_CURRENT_BINARY_DIR}) # Add preprocessor definitions add_definitions(-D_LARGEFILE64_SOURCE) add_definitions(-D_FILE_OFFSET_BITS=64) add_definitions(-D_GNU_SOURCE) set(CMAKE_C_FLAGS "-fno-strict-aliasing -std=c99 -Wall") set(CMAKE_C_FLAGS_RELEASE "-O2 ${CMAKE_C_FLAGS}") set(CMAKE_C_FLAGS_DEBUG "-ggdb -O0 ${CMAKE_C_FLAGS}") # Check that off_t can represent 2**63 - 1 correctly. # If it can't, we need to set _FILE_OFFSET_BITS=64 #check_c_source_compiles(" # #include # #define LARGE_OFF_T (((off_t) 1 << 62) - 1 + ((off_t) 1 << 62)) # int off_t_is_large[(LARGE_OFF_T % 2147483629 == 721 && LARGE_OFF_T % 2147483647 == 1) ? 1 : -1]; # int main() { return 0; } #" _OFFT_IS_64BIT) #if(NOT ${_OFFT_IS_64BIT}) # set(CMAKE_C_FLAGS ${CMAKE_C_FLAGS} "-D_FILE_OFFSET_BITS=64") #endif(NOT ${_OFFT_IS_64BIT}) # Compile stuff in sub dirs add_subdirectory(libxmount_input) add_subdirectory(src) # Install man page INSTALL(FILES ${CMAKE_CURRENT_SOURCE_DIR}/xmount.1 DESTINATION share/man/man1) diff --git a/trunk/config.h.in b/trunk/config.h.in index 50a71c7..dc1d9fe 100644 --- a/trunk/config.h.in +++ b/trunk/config.h.in @@ -1,45 +1,47 @@ /******************************************************************************* * xmount Copyright (c) 2008-2014 by Gillen Daniel * * * * xmount is a small tool to "fuse mount" various harddisk image formats as dd, * * vdi, vhd or vmdk files and enable virtual write access to them. * * * * This program is free software: you can redistribute it and/or modify it * * under the terms of the GNU General Public License as published by the Free * * Software Foundation, either version 3 of the License, or (at your option) * * any later version. * * * * This program is distributed in the hope that it will be useful, but WITHOUT * * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for * * more details. * * * * You should have received a copy of the GNU General Public License along with * * this program. If not, see . * *******************************************************************************/ #ifndef CONFIG_H #define CONFIG_H #cmakedefine HAVE_STDLIB_H 1 #cmakedefine HAVE_STDIO_H 1 #cmakedefine HAVE_STDINT_H 1 #cmakedefine HAVE_STDARG_H 1 #cmakedefine HAVE_STRING_H 1 #cmakedefine HAVE_ERRNO_H 1 #cmakedefine HAVE_FCNTL_H 1 #cmakedefine HAVE_DLFCN_H 1 #cmakedefine HAVE_DIRENT_H 1 #cmakedefine HAVE_UNISTD_H 1 #cmakedefine HAVE_SYS_IOCTL_H 1 #cmakedefine HAVE_SYS_TYPES_H 1 #cmakedefine HAVE_LINUX_FS_H 1 +#cmakedefine HAVE_GRP_H 1 +#cmakedefine HAVE_PWD_H 1 #cmakedefine HAVE_PTHREAD_H 1 #cmakedefine HAVE_TIME_H 1 #cmakedefine HAVE_INTTYPES_H 1 #cmakedefine HAVE_BYTESWAP_H 1 #cmakedefine HAVE_ENDIAN_H 1 #cmakedefine HAVE_LIBKERN_OSBYTEORDER_H 1 #endif // CONFIG_H diff --git a/trunk/libxmount_input/CMakeLists.txt b/trunk/libxmount_input/CMakeLists.txt index c8186ae..b6b8293 100644 --- a/trunk/libxmount_input/CMakeLists.txt +++ b/trunk/libxmount_input/CMakeLists.txt @@ -1,27 +1,29 @@ add_subdirectory(libxmount_input_dd) if(NOT STATIC_EWF) find_package(LibEWF) if(LIBEWF_FOUND) add_subdirectory(libxmount_input_ewf) endif(LIBEWF_FOUND) else(NOT STATIC_EWF) + message("-- Not checking for LibEWF (STATIC_EWF = 1)") add_subdirectory(libxmount_input_ewf) endif(NOT STATIC_EWF) if(NOT STATIC_AFF) find_package(LibAFF) find_package(OpenSSL) if(LIBAFF_FOUND AND OPENSSL_FOUND) add_subdirectory(libxmount_input_aff) endif(LIBAFF_FOUND AND OPENSSL_FOUND) else(NOT STATIC_AFF) + message("-- Not checking for LibAFF (STATIC_AFF = 1)") add_subdirectory(libxmount_input_aff) endif(NOT STATIC_AFF) #find_package(LibZ) #if(LIBZ_FOUND) # add_subdirectory(libxmount_input_aewf) # add_subdirectory(libxmount_input_aaff) #endif(LIBZ_FOUND) diff --git a/trunk/libxmount_input/libxmount_input_aff/CMakeLists.txt b/trunk/libxmount_input/libxmount_input_aff/CMakeLists.txt index 5f4de19..1825382 100644 --- a/trunk/libxmount_input/libxmount_input_aff/CMakeLists.txt +++ b/trunk/libxmount_input/libxmount_input_aff/CMakeLists.txt @@ -1,24 +1,36 @@ if(POLICY CMP0042) cmake_policy(SET CMP0042 NEW) # CMake 3.0 endif(POLICY CMP0042) project(libxmount_input_aff C) add_library(xmount_input_aff SHARED libxmount_input_aff.c) if(NOT STATIC_AFF) include_directories(${LIBAFF_INCLUDE_DIRS}) include_directories(${OPENSSL_INCLUDE_DIRS}) set(LIBS ${LIBS} ${LIBAFF_LIBRARIES}) set(LIBS ${LIBS} ${OPENSSL_LIBRARIES}) else(NOT STATIC_AFF) + add_definitions(-DHAVE_LIBAFF_STATIC) include_directories(${CMAKE_CURRENT_SOURCE_DIR}/libaff/lib) set(LIBS ${LIBS} ${CMAKE_CURRENT_SOURCE_DIR}/libaff/lib/.libs/libafflib.a) - set(LIBS ${LIBS} "-lstdc++ -lcrypto -lssl -lrt -lz") - add_definitions(-DHAVE_LIBAFF_STATIC) + if(NOT APPLE) + set(LIBS ${LIBS} "-lstdc++ -lcrypto -lssl -lrt -lz") + else(NOT APPLE) + # As most of afflib's deps on OSx come from MacPorts, better link in + # everything statically + set(LIBS ${LIBS} "/opt/local/lib/libcrypto.a") + set(LIBS ${LIBS} "/opt/local/lib/libssl.a") + set(LIBS ${LIBS} "/opt/local/lib/libexpat.a") + set(LIBS ${LIBS} "/opt/local/lib/libncurses.a") + set(LIBS ${LIBS} "/opt/local/lib/libreadline.a") + set(LIBS ${LIBS} "/opt/local/lib/libz.a") + set(LIBS ${LIBS} "-lstdc++") + endif(NOT APPLE) endif(NOT STATIC_AFF) target_link_libraries(xmount_input_aff ${LIBS}) install(TARGETS xmount_input_aff DESTINATION lib/xmount) diff --git a/trunk/libxmount_input/libxmount_input_ewf/CMakeLists.txt b/trunk/libxmount_input/libxmount_input_ewf/CMakeLists.txt index 1fca957..84fc848 100644 --- a/trunk/libxmount_input/libxmount_input_ewf/CMakeLists.txt +++ b/trunk/libxmount_input/libxmount_input_ewf/CMakeLists.txt @@ -1,22 +1,28 @@ if(POLICY CMP0042) cmake_policy(SET CMP0042 NEW) # CMake 3.0 endif(POLICY CMP0042) project(libxmount_input_ewf C) add_library(xmount_input_ewf SHARED libxmount_input_ewf.c) if(NOT STATIC_EWF) include_directories(${LIBEWF_INCLUDE_DIRS}) set(LIBS ${LIBS} ${LIBEWF_LIBRARIES}) else(NOT STATIC_EWF) + add_definitions(-DHAVE_LIBEWF_STATIC) include_directories(${CMAKE_CURRENT_SOURCE_DIR}/libewf/include) set(LIBS ${LIBS} ${CMAKE_CURRENT_SOURCE_DIR}/libewf/libewf/.libs/libewf.a) - set(LIBS ${LIBS} -lz) - add_definitions(-DHAVE_LIBEWF_STATIC) + if(NOT APPLE) + set(LIBS ${LIBS} -lz) + else(NOT APPLE) + # As most of libewf's deps on OSx come from MacPorts, better link in + # everything statically + set(LIBS ${LIBS} "/opt/local/lib/libz.a") + endif(NOT APPLE) endif(NOT STATIC_EWF) target_link_libraries(xmount_input_ewf ${LIBS}) install(TARGETS xmount_input_ewf DESTINATION lib/xmount) diff --git a/trunk/src/xmount.c b/trunk/src/xmount.c index 688abd3..033b894 100755 --- a/trunk/src/xmount.c +++ b/trunk/src/xmount.c @@ -1,3197 +1,3218 @@ /******************************************************************************* * xmount Copyright (c) 2008-2014 by Gillen Daniel * * * * xmount is a small tool to "fuse mount" various harddisk image formats as dd, * * vdi, vhd or vmdk files and enable virtual write access to them. * * * * This program is free software: you can redistribute it and/or modify it * * under the terms of the GNU General Public License as published by the Free * * Software Foundation, either version 3 of the License, or (at your option) * * any later version. * * * * This program is distributed in the hope that it will be useful, but WITHOUT * * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for * * more details. * * * * You should have received a copy of the GNU General Public License along with * * this program. If not, see . * *******************************************************************************/ #include #include #include #include #include #include #include // For PRI* #include #include // For dlopen, dlclose, dlsym #include // For opendir, readdir, closedir #include #include #include // For fstat #include #ifdef HAVE_LINUX_FS_H #include // For SEEK_* ?? #endif -#include // For getgrnam +#if !defined(__APPLE__) && defined(HAVE_GRP_H) && defined(HAVE_PWD_H) + #include // For getgrnam, struct group + #include // For getpwuid, struct passwd +#endif #include #include // For time #define FUSE_USE_VERSION 26 #include #include "xmount.h" #include "md5.h" #include "endianness.h" #include "macros.h" #define XMOUNT_COPYRIGHT_NOTICE \ "xmount v%s Copyright (c) 2008-2014 by Gillen Daniel " /******************************************************************************* * Global vars ******************************************************************************/ //! Struct that contains various runtime configuration options static ts_XmountConfData glob_xmount_cfg; //! Struct containing pointers to the libxmount_input functions static pts_InputLib *glob_pp_input_libs=NULL; static uint32_t glob_input_libs_count=0; static pts_LibXmountInputFunctions glob_p_input_functions=NULL; //! Handle for input image static void *glob_p_input_image=NULL; //! Pointer to virtual info file static char *glob_p_info_file=NULL; //! Vars needed for VDI emulation static pts_VdiFileHeader glob_p_vdi_header=NULL; static uint32_t glob_vdi_header_size=0; static char *glob_p_vdi_block_map=NULL; static uint32_t glob_p_vdi_block_map_size=0; //! Vars needed for VHD emulation static ts_VhdFileHeader *glob_p_vhd_header=NULL; //! Vars needed for VMDK emulation static char *glob_p_vmdk_file=NULL; static int glob_vmdk_file_size=0; static char *glob_p_vmdk_lockdir1=NULL; static char *glob_p_vmdk_lockdir2=NULL; static char *glob_p_vmdk_lockfile_data=NULL; static int glob_vmdk_lockfile_size=0; static char *glob_p_vmdk_lockfile_name=NULL; //! Vars needed for virtual write access static FILE *glob_p_cache_file=NULL; static pts_CacheFileHeader glob_p_cache_header=NULL; static pts_CacheFileBlockIndex glob_p_cache_blkidx=NULL; //! Mutexes to control concurrent read & write access static pthread_mutex_t glob_mutex_image_rw; static pthread_mutex_t glob_mutex_info_read; /******************************************************************************* * Helper functions ******************************************************************************/ //! Print error and debug messages to stdout /*! * \param p_msg_type "ERROR" or "DEBUG" * \param p_calling_fun Name of calling function * \param line Line number of call * \param p_msg Message string * \param ... Variable params with values to include in message string */ static void LogMessage(char *p_msg_type, char *p_calling_fun, int line, char *p_msg, ...) { va_list var_list; // Print message "header" printf("%s: %s.%s@%u : ",p_msg_type,p_calling_fun,XMOUNT_VERSION,line); // Print message with variable parameters va_start(var_list,p_msg); vprintf(p_msg,var_list); va_end(var_list); } //! Print usage instructions (cmdline options etc..) /*! * \param p_prog_name Program name (argv[0]) */ static void PrintUsage(char *p_prog_name) { char *p_buf; int first=1; printf("\n" XMOUNT_COPYRIGHT_NOTICE "\n",XMOUNT_VERSION); printf("\nUsage:\n"); printf(" %s [[fopts] [mopts]] [ [...]] \n\n", p_prog_name); printf("Options:\n"); printf(" fopts:\n"); printf(" -d : Enable FUSE's and xmount's debug mode.\n"); printf(" -h : Display this help message.\n"); printf(" -s : Run single threaded.\n"); printf(" -o no_allow_other : Disable automatic addition of FUSE's " "allow_other option.\n"); printf(" -o : Specify fuse mount options. Will also disable " "automatic\n"); printf(" addition of FUSE's allow_other option!\n"); printf(" INFO: For VMDK emulation, you have to uncomment " "\"user_allow_other\" in\n"); printf(" /etc/fuse.conf or run xmount as root.\n"); printf("\n"); printf(" mopts:\n"); printf(" --cache : Enable virtual write support and set cachefile " "to use.\n"); printf(" --in : Input image format. can be "); // List supported input types for(uint32_t i=0;ip_supported_input_types; while(*p_buf!='\0') { if(first==1) { printf("\"%s\"",p_buf); first=0; } else printf(", \"%s\"",p_buf); p_buf+=(strlen(p_buf)+1); } } printf(".\n"); printf(" --inopts : Specify input library specific options.\n"); printf(" --info : Print out infos about used compiler and libraries.\n"); printf(" --offset : Move the output image data start bytes " "into the input image.\n"); printf(" --out : Output image format. " " can be \"dd\", \"dmg\", \"vdi\", \"vhd\", \"vmdk(s)\".\n"); printf(" --owcache : Same as --cache but overwrites " "existing cache.\n"); printf(" --rw : Same as --cache .\n"); printf(" --version : Same as --info.\n"); #ifndef __APPLE__ printf(" INFO: Input and output image type defaults to \"dd\" if not " "specified.\n"); #else printf(" INFO: Input image type defaults to \"dd\" and output image type " "defaults to \"dmg\" if not specified.\n"); #endif printf(" WARNING: Output image type \"vmdk(s)\" should be considered " "experimental!\n"); printf("\n"); printf(" ifile:\n"); printf(" Input image file. If your input image is split into multiple " "files, you have to specify them all!\n"); printf("\n"); printf(" mntp:\n"); printf(" Mount point where virtual files should be located.\n"); printf("\n"); printf(" iopts:\n"); printf(" Some input libraries might support an own set of options to " "configure / tune their behaviour.\n"); printf(" Input libraries supporting this feature (if any) and and their " "options are listed below.\n"); printf("\n"); // List input lib options for(uint32_t i=0;ilib_functions.OptionsHelp(); if(p_buf==NULL) continue; printf(" - %s\n",glob_pp_input_libs[i]->p_name); printf("%s\n",p_buf); printf("\n"); } } //! Check fuse settings /*! * Check if FUSE allows us to pass the -o allow_other parameter. This only works * if we are root or user_allow_other is set in /etc/fuse.conf. * * In addition, this function also checks if the user is member of the fuse * group which is generally needed to use fuse at all. */ static void CheckFuseSettings() { +#if !defined(__APPLE__) && defined(HAVE_GRP_H) && defined(HAVE_PWD_H) + struct group *p_group; + struct passwd *p_passwd; +#endif + int found; FILE *h_fuse_conf; char line[256]; - int found; - struct group *p_group; - char *p_username; + + glob_xmount_cfg.may_set_fuse_allow_other=FALSE; if(geteuid()==0) { // Running as root, there should be no problems glob_xmount_cfg.may_set_fuse_allow_other=TRUE; return; } - // Check if a fuse group exists and if so, make sure user is a member of it +#if !defined(__APPLE__) && defined(HAVE_GRP_H) && defined(HAVE_PWD_H) + // Check if a fuse group exists and if so, make sure user is a member of it. + // Makes only sense on Linux because as far as I know osxfuse has no own group p_group=getgrnam("fuse"); if(p_group!=NULL) { // Get effective user name - p_username=cuserid(NULL); + p_passwd=getpwuid(geteuid()); + if(p_passwd==NULL) { + printf("\nWARNING: Unable to determine your effective user name. If " + "mounting works, you can ignore this message.\n\n"); + return; + } // Check if user is member of fuse group found=FALSE; while(*(p_group->gr_mem)!=NULL) { - if(strcmp(*(p_group->gr_mem),p_username)==0) { + if(strcmp(*(p_group->gr_mem),p_passwd->pw_name)==0) { found=TRUE; break; } p_group->gr_mem++; } if(found==FALSE) { printf("\nWARNING: You are not a member of the \"fuse\" group. This will " "prevent you from mounting images using xmount. Please add " "yourself to the \"fuse\" group using the command " "\"sudo usermod -a -G fuse %s\" and reboot your system or " "execute xmount as root.\n\n", - p_username); + p_passwd->pw_name); return; } } else { printf("\nWARNING: Your system does not seem to have a \"fuse\" group. If " "mounting works, you can ignore this message.\n\n"); } +#endif // Read FUSE's config file /etc/fuse.conf and check for set user_allow_other h_fuse_conf=(FILE*)FOPEN("/etc/fuse.conf","r"); if(h_fuse_conf!=NULL) { // Search conf file for set user_allow_others found=FALSE; while(fgets(line,sizeof(line),h_fuse_conf)!=NULL) { // TODO: This works as long as there is no other parameter beginning with // "user_allow_other" :) if(strncmp(line,"user_allow_other",16)==0) { found=TRUE; break; } } fclose(h_fuse_conf); - if(found==FALSE) { + if(found==TRUE) { + glob_xmount_cfg.may_set_fuse_allow_other=TRUE; + } else { printf("\nWARNING: FUSE will not allow other users nor root to access " "your virtual harddisk image. To change this behavior, please " "add \"user_allow_other\" to /etc/fuse.conf or execute xmount " "as root.\n\n"); - glob_xmount_cfg.may_set_fuse_allow_other=FALSE; } } else { printf("\nWARNING: Unable to open /etc/fuse.conf. If mounting works, you " - "can ignore this message.\n\n"); - glob_xmount_cfg.may_set_fuse_allow_other=FALSE; + "can ignore this message. If you encounter issues, please create " + "the file and add a single line containing the string " + "\"user_allow_other\" or execute xmount as root.\n\n"); + return; } } //! Parse command line options /*! * \param argc Number of cmdline params * \param pp_argv Array containing cmdline params * \param p_nargv Number of FUSE options is written to this var * \param ppp_nargv FUSE options are written to this array * \param p_filename_count Number of input image files is written to this var * \param ppp_filenames Input image filenames are written to this array * \param pp_mountpoint Mountpoint is written to this var * \return TRUE on success, FALSE on error */ static int ParseCmdLine(const int argc, char **pp_argv, int *p_nargv, char ***ppp_nargv, int *p_filename_count, char ***ppp_filenames, char **pp_mountpoint) { int i=1,files=0,opts=0,FuseMinusOControl=TRUE,FuseAllowOther=TRUE,first; char *p_buf; // add pp_argv[0] to ppp_nargv opts++; XMOUNT_MALLOC(*ppp_nargv,char**,opts*sizeof(char*)) XMOUNT_STRSET((*ppp_nargv)[opts-1],pp_argv[0]) // Parse options while(i1 && *(pp_argv[i]+1)!='-') { // Options beginning with - are mostly FUSE specific if(strcmp(pp_argv[i],"-d")==0) { // Enable FUSE's and xmount's debug mode opts++; XMOUNT_REALLOC(*ppp_nargv,char**,opts*sizeof(char*)) XMOUNT_STRSET((*ppp_nargv)[opts-1],pp_argv[i]) glob_xmount_cfg.debug=TRUE; } else if(strcmp(pp_argv[i],"-h")==0) { // Print help message PrintUsage(pp_argv[0]); exit(1); } else if(strcmp(pp_argv[i],"-o")==0) { // Next parameter specifies fuse / lib mount options if((argc+1)>i) { i++; // As the user specified the -o option, we assume he knows what he is // doing. We won't append allow_other automatically. And we allow him // to disable allow_other by passing a single "-o no_allow_other" // which won't be passed to FUSE as it is xmount specific. if(strcmp(pp_argv[i],"no_allow_other")!=0) { opts+=2; XMOUNT_REALLOC(*ppp_nargv,char**,opts*sizeof(char*)) XMOUNT_STRSET((*ppp_nargv)[opts-2],pp_argv[i-1]) XMOUNT_STRSET((*ppp_nargv)[opts-1],pp_argv[i]) FuseMinusOControl=FALSE; } else FuseAllowOther=FALSE; } else { LOG_ERROR("Couldn't parse mount options!\n") PrintUsage(pp_argv[0]); exit(1); } } else if(strcmp(pp_argv[i],"-s")==0) { // Enable FUSE's single threaded mode opts++; XMOUNT_REALLOC(*ppp_nargv,char**,opts*sizeof(char*)) XMOUNT_STRSET((*ppp_nargv)[opts-1],pp_argv[i]) } else if(strcmp(pp_argv[i],"-V")==0) { // Display FUSE version info opts++; XMOUNT_REALLOC(*ppp_nargv,char**,opts*sizeof(char*)) XMOUNT_STRSET((*ppp_nargv)[opts-1],pp_argv[i]) } else { LOG_ERROR("Unknown command line option \"%s\"\n",pp_argv[i]); PrintUsage(pp_argv[0]); exit(1); } } else { // Options beginning with -- are xmount specific if(strcmp(pp_argv[i],"--cache")==0 || strcmp(pp_argv[i],"--rw")==0) { // Emulate writable access to mounted image // Next parameter must be cache file to read/write changes from/to if((argc+1)>i) { i++; XMOUNT_STRSET(glob_xmount_cfg.p_cache_file,pp_argv[i]) glob_xmount_cfg.writable=TRUE; } else { LOG_ERROR("You must specify a cache file!\n") PrintUsage(pp_argv[0]); exit(1); } LOG_DEBUG("Enabling virtual write support using cache file \"%s\"\n", glob_xmount_cfg.p_cache_file) } else if(strcmp(pp_argv[i],"--in")==0) { // Specify input image type // Next parameter must be image type if((argc+1)>i) { i++; if(glob_xmount_cfg.p_orig_image_type==NULL) { XMOUNT_STRSET(glob_xmount_cfg.p_orig_image_type,pp_argv[i]); LOG_DEBUG("Setting input image type to '%s'\n",pp_argv[i]); } else { LOG_ERROR("You can only specify --in once!") PrintUsage(pp_argv[0]); exit(1); } } else { LOG_ERROR("You must specify an input image type!\n"); PrintUsage(pp_argv[0]); exit(1); } } else if(strcmp(pp_argv[i],"--inopts")==0) { if((argc+1)>i) { i++; if(glob_xmount_cfg.p_lib_params==NULL) { XMOUNT_STRSET(glob_xmount_cfg.p_lib_params,pp_argv[i]); } else { LOG_ERROR("You can only specify --inopts once!") PrintUsage(pp_argv[0]); exit(1); } } else { LOG_ERROR("You must specify special options!\n"); PrintUsage(pp_argv[0]); exit(1); } } else if(strcmp(pp_argv[i],"--out")==0) { // Specify output image type // Next parameter must be image type if((argc+1)>i) { i++; if(strcmp(pp_argv[i],"dd")==0) { glob_xmount_cfg.VirtImageType=VirtImageType_DD; LOG_DEBUG("Setting virtual image type to DD\n") } else if(strcmp(pp_argv[i],"dmg")==0) { glob_xmount_cfg.VirtImageType=VirtImageType_DMG; LOG_DEBUG("Setting virtual image type to DMG\n") } else if(strcmp(pp_argv[i],"vdi")==0) { glob_xmount_cfg.VirtImageType=VirtImageType_VDI; LOG_DEBUG("Setting virtual image type to VDI\n") } else if(strcmp(pp_argv[i],"vhd")==0) { glob_xmount_cfg.VirtImageType=VirtImageType_VHD; LOG_DEBUG("Setting virtual image type to VHD\n") } else if(strcmp(pp_argv[i],"vmdk")==0) { glob_xmount_cfg.VirtImageType=VirtImageType_VMDK; LOG_DEBUG("Setting virtual image type to VMDK\n") } else if(strcmp(pp_argv[i],"vmdks")==0) { glob_xmount_cfg.VirtImageType=VirtImageType_VMDKS; LOG_DEBUG("Setting virtual image type to VMDKS\n") } else { LOG_ERROR("Unknown output image type \"%s\"!\n",pp_argv[i]) PrintUsage(pp_argv[0]); exit(1); } } else { LOG_ERROR("You must specify an output image type!\n"); PrintUsage(pp_argv[0]); exit(1); } } else if(strcmp(pp_argv[i],"--owcache")==0) { // Enable writable access to mounted image and overwrite existing cache // Next parameter must be cache file to read/write changes from/to if((argc+1)>i) { i++; XMOUNT_STRSET(glob_xmount_cfg.p_cache_file,pp_argv[i]) glob_xmount_cfg.writable=TRUE; glob_xmount_cfg.overwrite_cache=TRUE; } else { LOG_ERROR("You must specify a cache file!\n") PrintUsage(pp_argv[0]); exit(1); } LOG_DEBUG("Enabling virtual write support overwriting cache file %s\n", glob_xmount_cfg.p_cache_file) } else if(strcmp(pp_argv[i],"--version")==0 || strcmp(pp_argv[i],"--info")==0) { printf(XMOUNT_COPYRIGHT_NOTICE "\n\n",XMOUNT_VERSION); #ifdef __GNUC__ printf(" compile timestamp: %s %s\n",__DATE__,__TIME__); printf(" gcc version: %s\n",__VERSION__); #endif printf(" loaded input libraries:\n"); for(uint32_t ii=0;iip_name); p_buf=glob_pp_input_libs[ii]->p_supported_input_types; first=TRUE; while(*p_buf!='\0') { if(first) { printf("\"%s\"",p_buf); first=FALSE; } else printf(", \"%s\"",p_buf); p_buf+=(strlen(p_buf)+1); } printf("\n"); } printf("\n"); exit(0); } else if(strcmp(pp_argv[i],"--offset")==0) { if((argc+1)>i) { i++; glob_xmount_cfg.orig_img_offset=strtoull(pp_argv[i],NULL,10); } else { LOG_ERROR("You must specify an offset!\n") PrintUsage(pp_argv[0]); exit(1); } LOG_DEBUG("Setting input image offset to \"%" PRIu64 "\"\n", glob_xmount_cfg.orig_img_offset) } else { LOG_ERROR("Unknown command line option \"%s\"\n",pp_argv[i]); PrintUsage(pp_argv[0]); exit(1); } } i++; } // Parse input image filename(s) while(i<(argc-1)) { files++; XMOUNT_REALLOC(*ppp_filenames,char**,files*sizeof(char*)) XMOUNT_STRSET((*ppp_filenames)[files-1],pp_argv[i]) i++; } if(files==0) { LOG_ERROR("No input files specified!\n") PrintUsage(pp_argv[0]); exit(1); } *p_filename_count=files; // Extract mountpoint if(i==(argc-1)) { XMOUNT_STRSET(*pp_mountpoint,pp_argv[argc-1]) opts++; XMOUNT_REALLOC(*ppp_nargv,char**,opts*sizeof(char*)) XMOUNT_STRSET((*ppp_nargv)[opts-1],*pp_mountpoint) } else { LOG_ERROR("No mountpoint specified!\n") PrintUsage(pp_argv[0]); exit(1); } if(FuseMinusOControl==TRUE) { // We control the -o flag, set subtype, fsname and allow_other options opts+=2; XMOUNT_REALLOC(*ppp_nargv,char**,opts*sizeof(char*)) XMOUNT_STRSET((*ppp_nargv)[opts-2],"-o") XMOUNT_STRSET((*ppp_nargv)[opts-1],"subtype=xmount,fsname=") XMOUNT_STRAPP((*ppp_nargv)[opts-1],(*ppp_filenames)[0]) if(FuseAllowOther==TRUE) { // Try to add "allow_other" to FUSE's cmd-line params if(glob_xmount_cfg.may_set_fuse_allow_other) { XMOUNT_STRAPP((*ppp_nargv)[opts-1],",allow_other") } } } *p_nargv=opts; return TRUE; } //! Extract virtual file name from input image name /*! * \param p_orig_name Name of input image (may include a path) * \return TRUE on success, FALSE on error */ static int ExtractVirtFileNames(char *p_orig_name) { char *tmp; // Truncate any leading path tmp=strrchr(p_orig_name,'/'); if(tmp!=NULL) p_orig_name=tmp+1; // Extract file extension tmp=strrchr(p_orig_name,'.'); // Set leading '/' XMOUNT_STRSET(glob_xmount_cfg.p_virtual_image_path,"/") XMOUNT_STRSET(glob_xmount_cfg.p_virtual_info_path,"/") if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK || glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS) { XMOUNT_STRSET(glob_xmount_cfg.p_virtual_vmdk_path,"/") } // Copy filename if(tmp==NULL) { // Input image filename has no extension XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_image_path,p_orig_name) XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_info_path,p_orig_name) if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK || glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS) { XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_vmdk_path,p_orig_name) } XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_info_path,".info") } else { XMOUNT_STRNAPP(glob_xmount_cfg.p_virtual_image_path,p_orig_name, strlen(p_orig_name)-strlen(tmp)) XMOUNT_STRNAPP(glob_xmount_cfg.p_virtual_info_path,p_orig_name, strlen(p_orig_name)-strlen(tmp)) if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK || glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS) { XMOUNT_STRNAPP(glob_xmount_cfg.p_virtual_vmdk_path,p_orig_name, strlen(p_orig_name)-strlen(tmp)) } XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_info_path,".info") } // Add virtual file extensions switch(glob_xmount_cfg.VirtImageType) { case VirtImageType_DD: XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_image_path,".dd") break; case VirtImageType_DMG: XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_image_path,".dmg") break; case VirtImageType_VDI: XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_image_path,".vdi") break; case VirtImageType_VHD: XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_image_path,".vhd") break; case VirtImageType_VMDK: case VirtImageType_VMDKS: XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_image_path,".dd") XMOUNT_STRAPP(glob_xmount_cfg.p_virtual_vmdk_path,".vmdk") break; default: LOG_ERROR("Unknown virtual image type!\n") return FALSE; } LOG_DEBUG("Set virtual image name to \"%s\"\n", glob_xmount_cfg.p_virtual_image_path) LOG_DEBUG("Set virtual image info name to \"%s\"\n", glob_xmount_cfg.p_virtual_info_path) if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK || glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS) { LOG_DEBUG("Set virtual vmdk name to \"%s\"\n", glob_xmount_cfg.p_virtual_vmdk_path) } return TRUE; } //! Get size of original image /*! * \param p_size Pointer to an uint64_t to which the size will be written to * \param without_offset If set to TRUE, returns the real size without * substracting a given offset. * \return TRUE on success, FALSE on error */ static int GetOrigImageSize(uint64_t *p_size, int without_offset) { int ret; // Make sure to return correct values when dealing with only 32bit file sizes *p_size=0; // When size was already queryed, use old value rather than regetting value // from disk if(glob_xmount_cfg.orig_image_size!=0 && !without_offset) { *p_size=glob_xmount_cfg.orig_image_size; return TRUE; } // Get size of original image ret=glob_p_input_functions->Size(glob_p_input_image,p_size); if(ret!=0) { LOG_ERROR("Unable to determine input image size: %s!\n", glob_p_input_functions->GetErrorMessage(ret)); return FALSE; } if(!without_offset) { // Substract given offset (*p_size)-=glob_xmount_cfg.orig_img_offset; // Save size so we have not to reget it from disk next time glob_xmount_cfg.orig_image_size=*p_size; } return TRUE; } //! Get size of the emulated image /*! * \param p_size Pointer to an uint64_t to which the size will be written to * \return TRUE on success, FALSE on error */ static int GetVirtImageSize(uint64_t *p_size) { if(glob_xmount_cfg.virt_image_size!=0) { *p_size=glob_xmount_cfg.virt_image_size; return TRUE; } switch(glob_xmount_cfg.VirtImageType) { case VirtImageType_DD: case VirtImageType_DMG: case VirtImageType_VMDK: case VirtImageType_VMDKS: // Virtual image is a DD, DMG or VMDK file. Just return the size of the // original image if(!GetOrigImageSize(p_size,FALSE)) { LOG_ERROR("Couldn't get size of input image!\n") return FALSE; } break; case VirtImageType_VDI: // Virtual image is a VDI file. Get size of original image and add size // of VDI header etc. if(!GetOrigImageSize(p_size,FALSE)) { LOG_ERROR("Couldn't get size of input image!\n") return FALSE; } (*p_size)+=(sizeof(ts_VdiFileHeader)+glob_p_vdi_block_map_size); break; case VirtImageType_VHD: // Virtual image is a VHD file. Get size of original image and add size // of VHD footer. if(!GetOrigImageSize(p_size,FALSE)) { LOG_ERROR("Couldn't get size of input image!\n") return FALSE; } (*p_size)+=sizeof(ts_VhdFileHeader); break; default: LOG_ERROR("Unsupported image type!\n") return FALSE; } glob_xmount_cfg.virt_image_size=*p_size; return TRUE; } //! Read data from original image /*! * \param p_buf Pointer to buffer to write read data to (must be preallocated!) * \param offset Offset at which data should be read * \param size Size of data which should be read (size of buffer) * \return Number of read bytes on success or "-1" on error */ static int GetOrigImageData(char *p_buf, off_t offset, size_t size) { int ret; size_t to_read=0; uint64_t image_size=0; // Make sure we aren't reading past EOF of image file if(!GetOrigImageSize(&image_size,FALSE)) { LOG_ERROR("Couldn't get image size!\n") return -1; } if(offset>=image_size) { // Offset is beyond image size LOG_DEBUG("Offset is beyond image size.\n") return 0; } if(offset+size>image_size) { // Attempt to read data past EOF of image file to_read=image_size-offset; LOG_DEBUG("Attempt to read data past EOF. Corrected size from %zd" " to %zd.\n",size,to_read) } else to_read=size; // Read data from image file (adding input image offset if one was specified) ret=glob_p_input_functions->Read(glob_p_input_image, offset+glob_xmount_cfg.orig_img_offset, p_buf, to_read); if(ret!=0) { LOG_ERROR("Couldn't read %zd bytes from offset %" PRIu64 "!\n", to_read, offset, glob_p_input_functions->GetErrorMessage(ret)); return -1; } return to_read; } //! Read data from virtual image /*! * \param p_buf Pointer to buffer to write read data to * \param offset Offset at which data should be read * \param size Size of data which should be read * \return Number of read bytes on success or negated error code on error */ static int GetVirtImageData(char *p_buf, off_t offset, size_t size) { uint32_t cur_block=0; uint64_t orig_image_size, virt_image_size; size_t to_read=0, cur_to_read=0; off_t file_off=offset, block_off=0; size_t to_read_later=0; // Get virtual image size if(!GetVirtImageSize(&virt_image_size)) { LOG_ERROR("Couldn't get virtual image size!\n") return -EIO; } if(offset>=virt_image_size) { LOG_ERROR("Attempt to read behind EOF of virtual image!\n") return 0; } if(offset+size>virt_image_size) { LOG_DEBUG("Attempt to read pas EOF of virtual image file\n") LOG_DEBUG("Adjusting read size from %u to %u\n",size,virt_image_size-offset) size=virt_image_size-offset; } to_read=size; if(!GetOrigImageSize(&orig_image_size,FALSE)) { LOG_ERROR("Couldn't get original image size!") return -EIO; } // Read virtual image type specific data preceeding original image data switch(glob_xmount_cfg.VirtImageType) { case VirtImageType_DD: case VirtImageType_DMG: case VirtImageType_VMDK: case VirtImageType_VMDKS: break; case VirtImageType_VDI: if(file_offglob_vdi_header_size) { cur_to_read=glob_vdi_header_size-file_off; } else { cur_to_read=to_read; } if(glob_xmount_cfg.writable==TRUE && glob_p_cache_header->VdiFileHeaderCached==TRUE) { // VDI header was already cached if(fseeko(glob_p_cache_file, glob_p_cache_header->pVdiFileHeader+file_off, SEEK_SET)!=0) { LOG_ERROR("Couldn't seek to cached VDI header at offset %" PRIu64 "\n",glob_p_cache_header->pVdiFileHeader+file_off) return -EIO; } if(fread(p_buf,cur_to_read,1,glob_p_cache_file)!=1) { LOG_ERROR("Couldn't read %zu bytes from cache file at offset %" PRIu64 "\n",cur_to_read, glob_p_cache_header->pVdiFileHeader+file_off) return -EIO; } LOG_DEBUG("Read %zd bytes from cached VDI header at offset %" PRIu64 " at cache file offset %" PRIu64 "\n", cur_to_read,file_off, glob_p_cache_header->pVdiFileHeader+file_off) } else { // VDI header isn't cached memcpy(p_buf,((char*)glob_p_vdi_header)+file_off,cur_to_read); LOG_DEBUG("Read %zd bytes at offset %" PRIu64 " from virtual VDI header\n",cur_to_read, file_off) } if(to_read==cur_to_read) return to_read; else { // Adjust values to read from original image to_read-=cur_to_read; p_buf+=cur_to_read; file_off=0; } } else file_off-=glob_vdi_header_size; break; case VirtImageType_VHD: // When emulating VHD, make sure the while loop below only reads data // available in the original image. Any VHD footer data must be read // afterwards. if(file_off>=orig_image_size) { to_read_later=to_read; to_read=0; } else if((file_off+to_read)>orig_image_size) { to_read_later=(file_off+to_read)-orig_image_size; to_read-=to_read_later; } break; } // Calculate block to read data from cur_block=file_off/CACHE_BLOCK_SIZE; block_off=file_off%CACHE_BLOCK_SIZE; // Read image data while(to_read!=0) { // Calculate how many bytes we have to read from this block if(block_off+to_read>CACHE_BLOCK_SIZE) { cur_to_read=CACHE_BLOCK_SIZE-block_off; } else cur_to_read=to_read; if(glob_xmount_cfg.writable==TRUE && glob_p_cache_blkidx[cur_block].Assigned==TRUE) { // Write support enabled and need to read altered data from cachefile if(fseeko(glob_p_cache_file, glob_p_cache_blkidx[cur_block].off_data+block_off, SEEK_SET)!=0) { LOG_ERROR("Couldn't seek to offset %" PRIu64 " in cache file\n") return -EIO; } if(fread(p_buf,cur_to_read,1,glob_p_cache_file)!=1) { LOG_ERROR("Couldn't read data from cache file!\n") return -EIO; } LOG_DEBUG("Read %zd bytes at offset %" PRIu64 " from cache file\n",cur_to_read,file_off) } else { // No write support or data not cached if(GetOrigImageData(p_buf, file_off, cur_to_read)!=cur_to_read) { LOG_ERROR("Couldn't read data from input image!\n") return -EIO; } LOG_DEBUG("Read %zd bytes at offset %" PRIu64 " from original image file\n",cur_to_read, file_off) } cur_block++; block_off=0; p_buf+=cur_to_read; to_read-=cur_to_read; file_off+=cur_to_read; } if(to_read_later!=0) { // Read virtual image type specific data following original image data switch(glob_xmount_cfg.VirtImageType) { case VirtImageType_DD: case VirtImageType_DMG: case VirtImageType_VMDK: case VirtImageType_VMDKS: case VirtImageType_VDI: break; case VirtImageType_VHD: // Micro$oft has choosen to use a footer rather then a header. if(glob_xmount_cfg.writable==TRUE && glob_p_cache_header->VhdFileHeaderCached==TRUE) { // VHD footer was already cached if(fseeko(glob_p_cache_file, glob_p_cache_header->pVhdFileHeader+ (file_off-orig_image_size), SEEK_SET)!=0) { LOG_ERROR("Couldn't seek to cached VHD footer at offset %" PRIu64 "\n", glob_p_cache_header->pVhdFileHeader+ (file_off-orig_image_size)) return -EIO; } if(fread(p_buf,to_read_later,1,glob_p_cache_file)!=1) { LOG_ERROR("Couldn't read %zu bytes from cache file at offset %" PRIu64 "\n",to_read_later, glob_p_cache_header->pVhdFileHeader+ (file_off-orig_image_size)) return -EIO; } LOG_DEBUG("Read %zd bytes from cached VHD footer at offset %" PRIu64 " at cache file offset %" PRIu64 "\n", to_read_later,(file_off-orig_image_size), glob_p_cache_header->pVhdFileHeader+ (file_off-orig_image_size)) } else { // VHD header isn't cached memcpy(p_buf, ((char*)glob_p_vhd_header)+(file_off-orig_image_size), to_read_later); LOG_DEBUG("Read %zd bytes at offset %" PRIu64 " from virtual VHD header\n", to_read_later, (file_off-orig_image_size)) } break; } } return size; } //! Write data to virtual VDI file header /*! * \param p_buf Buffer containing data to write * \param offset Offset of changes * \param size Amount of bytes to write * \return Number of written bytes on success or "-1" on error */ static int SetVdiFileHeaderData(char *p_buf,off_t offset,size_t size) { if(offset+size>glob_vdi_header_size) size=glob_vdi_header_size-offset; LOG_DEBUG("Need to cache %zu bytes at offset %" PRIu64 " from VDI header\n",size,offset) if(glob_p_cache_header->VdiFileHeaderCached==1) { // Header was already cached if(fseeko(glob_p_cache_file, glob_p_cache_header->pVdiFileHeader+offset, SEEK_SET)!=0) { LOG_ERROR("Couldn't seek to cached VDI header at address %" PRIu64 "\n",glob_p_cache_header->pVdiFileHeader+offset) return -1; } if(fwrite(p_buf,size,1,glob_p_cache_file)!=1) { LOG_ERROR("Couldn't write %zu bytes to cache file at offset %" PRIu64 "\n",size, glob_p_cache_header->pVdiFileHeader+offset) return -1; } LOG_DEBUG("Wrote %zd bytes at offset %" PRIu64 " to cache file\n", size,glob_p_cache_header->pVdiFileHeader+offset) } else { // Header wasn't already cached. if(fseeko(glob_p_cache_file, 0, SEEK_END)!=0) { LOG_ERROR("Couldn't seek to end of cache file!") return -1; } glob_p_cache_header->pVdiFileHeader=ftello(glob_p_cache_file); LOG_DEBUG("Caching whole VDI header\n") if(offset>0) { // Changes do not begin at offset 0, need to prepend with data from // VDI header if(fwrite((char*)glob_p_vdi_header,offset,1,glob_p_cache_file)!=1) { LOG_ERROR("Error while writing %" PRIu64 " bytes " "to cache file at offset %" PRIu64 "!\n", offset, glob_p_cache_header->pVdiFileHeader); return -1; } LOG_DEBUG("Prepended changed data with %" PRIu64 " bytes at cache file offset %" PRIu64 "\n", offset,glob_p_cache_header->pVdiFileHeader) } // Cache changed data if(fwrite(p_buf,size,1,glob_p_cache_file)!=1) { LOG_ERROR("Couldn't write %zu bytes to cache file at offset %" PRIu64 "\n",size, glob_p_cache_header->pVdiFileHeader+offset) return -1; } LOG_DEBUG("Wrote %zu bytes of changed data to cache file offset %" PRIu64 "\n",size, glob_p_cache_header->pVdiFileHeader+offset) if(offset+size!=glob_vdi_header_size) { // Need to append data from VDI header to cache whole data struct if(fwrite(((char*)glob_p_vdi_header)+offset+size, glob_vdi_header_size-(offset+size), 1, glob_p_cache_file)!=1) { LOG_ERROR("Couldn't write %zu bytes to cache file at offset %" PRIu64 "\n",glob_vdi_header_size-(offset+size), (uint64_t)(glob_p_cache_header->pVdiFileHeader+offset+size)) return -1; } LOG_DEBUG("Appended %" PRIu32 " bytes to changed data at cache file offset %" PRIu64 "\n",glob_vdi_header_size-(offset+size), glob_p_cache_header->pVdiFileHeader+offset+size) } // Mark header as cached and update header in cache file glob_p_cache_header->VdiFileHeaderCached=1; if(fseeko(glob_p_cache_file,0,SEEK_SET)!=0) { LOG_ERROR("Couldn't seek to offset 0 of cache file!\n") return -1; } if(fwrite((char*)glob_p_cache_header, sizeof(ts_CacheFileHeader), 1, glob_p_cache_file)!=1) { LOG_ERROR("Couldn't write changed cache file header!\n") return -1; } } // All important data has been written, now flush all buffers to make // sure data is written to cache file fflush(glob_p_cache_file); #ifndef __APPLE__ ioctl(fileno(glob_p_cache_file),BLKFLSBUF,0); #endif return size; } //! Write data to virtual VHD file footer /*! * \param p_buf Buffer containing data to write * \param offset Offset of changes * \param size Amount of bytes to write * \return Number of written bytes on success or "-1" on error */ static int SetVhdFileHeaderData(char *p_buf,off_t offset,size_t size) { LOG_DEBUG("Need to cache %zu bytes at offset %" PRIu64 " from VHD footer\n",size,offset) if(glob_p_cache_header->VhdFileHeaderCached==1) { // Header has already been cached if(fseeko(glob_p_cache_file, glob_p_cache_header->pVhdFileHeader+offset, SEEK_SET)!=0) { LOG_ERROR("Couldn't seek to cached VHD header at address %" PRIu64 "\n",glob_p_cache_header->pVhdFileHeader+offset) return -1; } if(fwrite(p_buf,size,1,glob_p_cache_file)!=1) { LOG_ERROR("Couldn't write %zu bytes to cache file at offset %" PRIu64 "\n",size, glob_p_cache_header->pVhdFileHeader+offset) return -1; } LOG_DEBUG("Wrote %zd bytes at offset %" PRIu64 " to cache file\n", size,glob_p_cache_header->pVhdFileHeader+offset) } else { // Header hasn't been cached yet. if(fseeko(glob_p_cache_file, 0, SEEK_END)!=0) { LOG_ERROR("Couldn't seek to end of cache file!") return -1; } glob_p_cache_header->pVhdFileHeader=ftello(glob_p_cache_file); LOG_DEBUG("Caching whole VHD header\n") if(offset>0) { // Changes do not begin at offset 0, need to prepend with data from // VHD header if(fwrite((char*)glob_p_vhd_header,offset,1,glob_p_cache_file)!=1) { LOG_ERROR("Error while writing %" PRIu64 " bytes " "to cache file at offset %" PRIu64 "!\n", offset, glob_p_cache_header->pVhdFileHeader); return -1; } LOG_DEBUG("Prepended changed data with %" PRIu64 " bytes at cache file offset %" PRIu64 "\n", offset,glob_p_cache_header->pVhdFileHeader) } // Cache changed data if(fwrite(p_buf,size,1,glob_p_cache_file)!=1) { LOG_ERROR("Couldn't write %zu bytes to cache file at offset %" PRIu64 "\n",size, glob_p_cache_header->pVhdFileHeader+offset) return -1; } LOG_DEBUG("Wrote %zu bytes of changed data to cache file offset %" PRIu64 "\n",size, glob_p_cache_header->pVhdFileHeader+offset) if(offset+size!=sizeof(ts_VhdFileHeader)) { // Need to append data from VHD header to cache whole data struct if(fwrite(((char*)glob_p_vhd_header)+offset+size, sizeof(ts_VhdFileHeader)-(offset+size), 1, glob_p_cache_file)!=1) { LOG_ERROR("Couldn't write %zu bytes to cache file at offset %" PRIu64 "\n",sizeof(ts_VhdFileHeader)-(offset+size), (uint64_t)(glob_p_cache_header->pVhdFileHeader+offset+size)) return -1; } LOG_DEBUG("Appended %" PRIu32 " bytes to changed data at cache file offset %" PRIu64 "\n",sizeof(ts_VhdFileHeader)-(offset+size), glob_p_cache_header->pVhdFileHeader+offset+size) } // Mark header as cached and update header in cache file glob_p_cache_header->VhdFileHeaderCached=1; if(fseeko(glob_p_cache_file,0,SEEK_SET)!=0) { LOG_ERROR("Couldn't seek to offset 0 of cache file!\n") return -1; } if(fwrite((char*)glob_p_cache_header, sizeof(ts_CacheFileHeader), 1, glob_p_cache_file)!=1) { LOG_ERROR("Couldn't write changed cache file header!\n") return -1; } } // All important data has been written, now flush all buffers to make // sure data is written to cache file fflush(glob_p_cache_file); #ifndef __APPLE__ ioctl(fileno(glob_p_cache_file),BLKFLSBUF,0); #endif return size; } //! Write data to virtual image /*! * \param p_buf Buffer containing data to write * \param offset Offset to start writing at * \param size Size of data to be written * \return Number of written bytes on success or "-1" on error */ static int SetVirtImageData(const char *p_buf, off_t offset, size_t size) { uint64_t cur_block=0; uint64_t virt_image_size; uint64_t orig_image_size; size_t to_write=0; size_t to_write_later=0; size_t to_write_now=0; off_t file_offset=offset; off_t block_offset=0; char *p_write_buf=(char*)p_buf; char *p_buf2; ssize_t ret; // Get virtual image size if(!GetVirtImageSize(&virt_image_size)) { LOG_ERROR("Couldn't get virtual image size!\n") return -1; } if(offset>=virt_image_size) { LOG_ERROR("Attempt to write beyond EOF of virtual image file!\n") return -1; } if(offset+size>virt_image_size) { LOG_DEBUG("Attempt to write past EOF of virtual image file\n") size=virt_image_size-offset; } to_write=size; // Get original image size if(!GetOrigImageSize(&orig_image_size,FALSE)) { LOG_ERROR("Couldn't get original image size!\n") return -1; } // Cache virtual image type specific data preceeding original image data switch(glob_xmount_cfg.VirtImageType) { case VirtImageType_DD: case VirtImageType_DMG: case VirtImageType_VMDK: case VirtImageType_VMDKS: break; case VirtImageType_VDI: if(file_offset=orig_image_size) { to_write_later=to_write; to_write=0; } else if((file_offset+to_write)>orig_image_size) { to_write_later=(file_offset+to_write)-orig_image_size; to_write-=to_write_later; } break; } // Calculate block to write data to cur_block=file_offset/CACHE_BLOCK_SIZE; block_offset=file_offset%CACHE_BLOCK_SIZE; while(to_write!=0) { // Calculate how many bytes we have to write to this block if(block_offset+to_write>CACHE_BLOCK_SIZE) { to_write_now=CACHE_BLOCK_SIZE-block_offset; } else to_write_now=to_write; if(glob_p_cache_blkidx[cur_block].Assigned==1) { // Block was already cached // Seek to data offset in cache file if(fseeko(glob_p_cache_file, glob_p_cache_blkidx[cur_block].off_data+block_offset, SEEK_SET)!=0) { LOG_ERROR("Couldn't seek to cached block at address %" PRIu64 "\n", glob_p_cache_blkidx[cur_block].off_data+block_offset) return -1; } if(fwrite(p_write_buf,to_write_now,1,glob_p_cache_file)!=1) { LOG_ERROR("Error while writing %zu bytes " "to cache file at offset %" PRIu64 "!\n", to_write_now, glob_p_cache_blkidx[cur_block].off_data+block_offset); return -1; } LOG_DEBUG("Wrote %zd bytes at offset %" PRIu64 " to cache file\n",to_write_now, glob_p_cache_blkidx[cur_block].off_data+block_offset) } else { // Uncached block. Need to cache entire new block // Seek to end of cache file to append new cache block fseeko(glob_p_cache_file,0,SEEK_END); glob_p_cache_blkidx[cur_block].off_data=ftello(glob_p_cache_file); if(block_offset!=0) { // Changed data does not begin at block boundry. Need to prepend // with data from virtual image file XMOUNT_MALLOC(p_buf2,char*,block_offset*sizeof(char)) if(GetOrigImageData(p_buf2, file_offset-block_offset, block_offset)!=block_offset) { LOG_ERROR("Couldn't read data from original image file!\n") return -1; } if(fwrite(p_buf2,block_offset,1,glob_p_cache_file)!=1) { LOG_ERROR("Couldn't writing %" PRIu64 " bytes " "to cache file at offset %" PRIu64 "!\n", block_offset, glob_p_cache_blkidx[cur_block].off_data); return -1; } LOG_DEBUG("Prepended changed data with %" PRIu64 " bytes from virtual image file at offset %" PRIu64 "\n",block_offset,file_offset-block_offset) free(p_buf2); } if(fwrite(p_write_buf,to_write_now,1,glob_p_cache_file)!=1) { LOG_ERROR("Error while writing %zd bytes " "to cache file at offset %" PRIu64 "!\n", to_write_now, glob_p_cache_blkidx[cur_block].off_data+block_offset); return -1; } if(block_offset+to_write_now!=CACHE_BLOCK_SIZE) { // Changed data does not end at block boundry. Need to append // with data from virtual image file XMOUNT_MALLOC(p_buf2,char*,(CACHE_BLOCK_SIZE- (block_offset+to_write_now))*sizeof(char)) memset(p_buf2,0,CACHE_BLOCK_SIZE-(block_offset+to_write_now)); if((file_offset-block_offset)+CACHE_BLOCK_SIZE>orig_image_size) { // Original image is smaller than full cache block if(GetOrigImageData(p_buf2, file_offset+to_write_now, orig_image_size-(file_offset+to_write_now))!= orig_image_size-(file_offset+to_write_now)) { LOG_ERROR("Couldn't read data from virtual image file!\n") return -1; } } else { if(GetOrigImageData(p_buf2, file_offset+to_write_now, CACHE_BLOCK_SIZE-(block_offset+to_write_now))!= CACHE_BLOCK_SIZE-(block_offset+to_write_now)) { LOG_ERROR("Couldn't read data from virtual image file!\n") return -1; } } if(fwrite(p_buf2, CACHE_BLOCK_SIZE-(block_offset+to_write_now), 1, glob_p_cache_file)!=1) { LOG_ERROR("Error while writing %zd bytes " "to cache file at offset %" PRIu64 "!\n", CACHE_BLOCK_SIZE-(block_offset+to_write_now), glob_p_cache_blkidx[cur_block].off_data+ block_offset+to_write_now); return -1; } free(p_buf2); } // All important data for this cache block has been written, // flush all buffers and mark cache block as assigned fflush(glob_p_cache_file); #ifndef __APPLE__ ioctl(fileno(glob_p_cache_file),BLKFLSBUF,0); #endif glob_p_cache_blkidx[cur_block].Assigned=1; // Update cache block index entry in cache file fseeko(glob_p_cache_file, sizeof(ts_CacheFileHeader)+ (cur_block*sizeof(ts_CacheFileBlockIndex)), SEEK_SET); if(fwrite(&(glob_p_cache_blkidx[cur_block]), sizeof(ts_CacheFileBlockIndex), 1, glob_p_cache_file)!=1) { LOG_ERROR("Couldn't update cache file block index!\n"); return -1; } LOG_DEBUG("Updated cache file block index: Number=%" PRIu64 ", Data offset=%" PRIu64 "\n",cur_block, glob_p_cache_blkidx[cur_block].off_data); } // Flush buffers fflush(glob_p_cache_file); #ifndef __APPLE__ ioctl(fileno(glob_p_cache_file),BLKFLSBUF,0); #endif block_offset=0; cur_block++; p_write_buf+=to_write_now; to_write-=to_write_now; file_offset+=to_write_now; } if(to_write_later!=0) { // Cache virtual image type specific data preceeding original image data switch(glob_xmount_cfg.VirtImageType) { case VirtImageType_DD: case VirtImageType_DMG: case VirtImageType_VMDK: case VirtImageType_VMDKS: case VirtImageType_VDI: break; case VirtImageType_VHD: // Micro$oft has choosen to use a footer rather then a header. ret=SetVhdFileHeaderData(p_write_buf, file_offset-orig_image_size, to_write_later); if(ret==-1) { LOG_ERROR("Couldn't write data to virtual VHD file footer!\n") return -1; } break; } } return size; } //! Calculates an MD5 hash of the first HASH_AMOUNT bytes of the input image /*! * \param p_hash_low Pointer to the lower 64 bit of the hash * \param p_hash_high Pointer to the higher 64 bit of the hash * \return TRUE on success, FALSE on error */ static int CalculateInputImageHash(uint64_t *p_hash_low, uint64_t *p_hash_high) { char hash[16]; md5_state_t md5_state; char *p_buf; XMOUNT_MALLOC(p_buf,char*,HASH_AMOUNT*sizeof(char)) size_t read_data=GetOrigImageData(p_buf,0,HASH_AMOUNT); if(read_data>0) { // Calculate MD5 hash md5_init(&md5_state); md5_append(&md5_state,(const md5_byte_t*)p_buf,read_data); md5_finish(&md5_state,(md5_byte_t*)hash); // Convert MD5 hash into two 64bit integers *p_hash_low=*((uint64_t*)hash); *p_hash_high=*((uint64_t*)(hash+8)); free(p_buf); return TRUE; } else { LOG_ERROR("Couldn't read data from original image file!\n") free(p_buf); return FALSE; } } //! Build and init virtual VDI file header /*! * \return TRUE on success, FALSE on error */ static int InitVirtVdiHeader() { // See http://forums.virtualbox.org/viewtopic.php?t=8046 for a // "description" of the various header fields uint64_t image_size; off_t offset; uint32_t i,block_entries; // Get input image size if(!GetOrigImageSize(&image_size,FALSE)) { LOG_ERROR("Couldn't get input image size!\n") return FALSE; } // Calculate how many VDI blocks we need block_entries=image_size/VDI_IMAGE_BLOCK_SIZE; if((image_size%VDI_IMAGE_BLOCK_SIZE)!=0) block_entries++; glob_p_vdi_block_map_size=block_entries*sizeof(uint32_t); LOG_DEBUG("BlockMap: %d (%08X) entries, %d (%08X) bytes!\n", block_entries, block_entries, glob_p_vdi_block_map_size, glob_p_vdi_block_map_size) // Allocate memory for vdi header and block map glob_vdi_header_size=sizeof(ts_VdiFileHeader)+glob_p_vdi_block_map_size; XMOUNT_MALLOC(glob_p_vdi_header,pts_VdiFileHeader,glob_vdi_header_size) memset(glob_p_vdi_header,0,glob_vdi_header_size); glob_p_vdi_block_map=((void*)glob_p_vdi_header)+sizeof(ts_VdiFileHeader); // Init header values strncpy(glob_p_vdi_header->szFileInfo,VDI_FILE_COMMENT, strlen(VDI_FILE_COMMENT)+1); glob_p_vdi_header->u32Signature=VDI_IMAGE_SIGNATURE; glob_p_vdi_header->u32Version=VDI_IMAGE_VERSION; // No idea what the following value is for! Testimage had same value glob_p_vdi_header->cbHeader=0x00000180; glob_p_vdi_header->u32Type=VDI_IMAGE_TYPE_FIXED; glob_p_vdi_header->fFlags=VDI_IMAGE_FLAGS; strncpy(glob_p_vdi_header->szComment,VDI_HEADER_COMMENT, strlen(VDI_HEADER_COMMENT)+1); glob_p_vdi_header->offData=glob_vdi_header_size; glob_p_vdi_header->offBlocks=sizeof(ts_VdiFileHeader); glob_p_vdi_header->cCylinders=0; // Legacy info glob_p_vdi_header->cHeads=0; // Legacy info glob_p_vdi_header->cSectors=0; // Legacy info glob_p_vdi_header->cbSector=512; // Legacy info glob_p_vdi_header->u32Dummy=0; glob_p_vdi_header->cbDisk=image_size; // Seems as VBox is always using a 1MB blocksize glob_p_vdi_header->cbBlock=VDI_IMAGE_BLOCK_SIZE; glob_p_vdi_header->cbBlockExtra=0; glob_p_vdi_header->cBlocks=block_entries; glob_p_vdi_header->cBlocksAllocated=block_entries; // Use partial MD5 input file hash as creation UUID and generate a random // modification UUID. VBox won't accept immages where create and modify UUIDS // aren't set. glob_p_vdi_header->uuidCreate_l=glob_xmount_cfg.input_hash_lo; glob_p_vdi_header->uuidCreate_h=glob_xmount_cfg.input_hash_hi; #define rand64(var) { \ *((uint32_t*)&(var))=rand(); \ *(((uint32_t*)&(var))+1)=rand(); \ } rand64(glob_p_vdi_header->uuidModify_l); rand64(glob_p_vdi_header->uuidModify_h); #undef rand64 // Generate block map i=0; for(offset=0;offsetcookie=VHD_IMAGE_HVAL_COOKIE; glob_p_vhd_header->features=VHD_IMAGE_HVAL_FEATURES; glob_p_vhd_header->file_format_version=VHD_IMAGE_HVAL_FILE_FORMAT_VERSION; glob_p_vhd_header->data_offset=VHD_IMAGE_HVAL_DATA_OFFSET; glob_p_vhd_header->creation_time=htobe32(time(NULL)- VHD_IMAGE_TIME_CONVERSION_OFFSET); glob_p_vhd_header->creator_app=VHD_IMAGE_HVAL_CREATOR_APPLICATION; glob_p_vhd_header->creator_ver=VHD_IMAGE_HVAL_CREATOR_VERSION; glob_p_vhd_header->creator_os=VHD_IMAGE_HVAL_CREATOR_HOST_OS; glob_p_vhd_header->size_original=htobe64(orig_image_size); glob_p_vhd_header->size_current=glob_p_vhd_header->size_original; // Convert size to sectors if(orig_image_size>136899993600) { // image is larger then CHS values can address. // Set sectors to max (C65535*H16*S255). geom_tot_s=267382800; } else { // Calculate actual sectors geom_tot_s=orig_image_size/512; if((orig_image_size%512)!=0) geom_tot_s++; } // Calculate CHS values. This is done according to the VHD specs if(geom_tot_s>=66059280) { // C65535 * H16 * S63 geom_s=255; geom_h=16; geom_c_x_h=geom_tot_s/geom_s; } else { geom_s=17; geom_c_x_h=geom_tot_s/geom_s; geom_h=(geom_c_x_h+1023)/1024; if(geom_h<4) geom_h=4; if(geom_c_x_h>=(geom_h*1024) || geom_h>16) { geom_s=31; geom_h=16; geom_c_x_h=geom_tot_s/geom_s; } if(geom_c_x_h>=(geom_h*1024)) { geom_s=63; geom_h=16; geom_c_x_h=geom_tot_s/geom_s; } } geom_c=geom_c_x_h/geom_h; glob_p_vhd_header->disk_geometry_c=htobe16(geom_c); glob_p_vhd_header->disk_geometry_h=geom_h; glob_p_vhd_header->disk_geometry_s=geom_s; glob_p_vhd_header->disk_type=VHD_IMAGE_HVAL_DISK_TYPE; glob_p_vhd_header->uuid_l=glob_xmount_cfg.input_hash_lo; glob_p_vhd_header->uuid_h=glob_xmount_cfg.input_hash_hi; glob_p_vhd_header->saved_state=0x00; // Calculate footer checksum for(i=0;ichecksum=htobe32(~checksum); LOG_DEBUG("VHD header size = %u\n",sizeof(ts_VhdFileHeader)); return TRUE; } //! Init the virtual VMDK file /*! * \return TRUE on success, FALSE on error */ static int InitVirtualVmdkFile() { uint64_t image_size=0; uint64_t image_blocks=0; char buf[500]; // Get original image size if(!GetOrigImageSize(&image_size,FALSE)) { LOG_ERROR("Couldn't get original image size!\n") return FALSE; } image_blocks=image_size/512; if(image_size%512!=0) image_blocks++; #define VMDK_DESC_FILE "# Disk DescriptorFile\n" \ "version=1\n" \ "CID=fffffffe\n" \ "parentCID=ffffffff\n" \ "createType=\"monolithicFlat\"\n\n" \ "# Extent description\n" \ "RW %" PRIu64 " FLAT \"%s\" 0\n\n" \ "# The Disk Data Base\n" \ "#DDB\n" \ "ddb.virtualHWVersion = \"3\"\n" \ "ddb.adapterType = \"%s\"\n" \ "ddb.geometry.cylinders = \"0\"\n" \ "ddb.geometry.heads = \"0\"\n" \ "ddb.geometry.sectors = \"0\"\n" if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK) { // VMDK with IDE bus sprintf(buf, VMDK_DESC_FILE, image_blocks, (glob_xmount_cfg.p_virtual_image_path)+1, "ide"); } else if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS){ // VMDK with SCSI bus sprintf(buf, VMDK_DESC_FILE, image_blocks, (glob_xmount_cfg.p_virtual_image_path)+1, "scsi"); } else { LOG_ERROR("Unknown virtual VMDK file format!\n") return FALSE; } #undef VMDK_DESC_FILE // Do not use XMOUNT_STRSET here to avoid adding '\0' to the buffer! XMOUNT_MALLOC(glob_p_vmdk_file,char*,strlen(buf)) strncpy(glob_p_vmdk_file,buf,strlen(buf)); glob_vmdk_file_size=strlen(buf); return TRUE; } //! Create virtual image info file /*! * \return TRUE on success, FALSE on error */ static int InitVirtImageInfoFile() { int ret; char *p_buf; // Add static header XMOUNT_MALLOC(glob_p_info_file,char*,strlen(IMAGE_INFO_HEADER)+1) strncpy(glob_p_info_file,IMAGE_INFO_HEADER,strlen(IMAGE_INFO_HEADER)+1); // Get infos from input lib ret=glob_p_input_functions->GetInfofileContent(glob_p_input_image,&p_buf); if(ret!=0) { LOG_ERROR("Unable to get info file content: %s!\n", glob_p_input_functions->GetErrorMessage(ret)); return FALSE; } // Add infos to main buffer and free p_buf XMOUNT_STRAPP(glob_p_info_file,p_buf); glob_p_input_functions->FreeBuffer(p_buf); return TRUE; } //! Create / load cache file to enable virtual write support /*! * \return TRUE on success, FALSE on error */ static int InitCacheFile() { uint64_t image_size=0; uint64_t blockindex_size=0; uint64_t cachefile_header_size=0; uint64_t cachefile_size=0; uint32_t needed_blocks=0; uint64_t buf; if(!glob_xmount_cfg.overwrite_cache) { // Try to open an existing cache file or create a new one glob_p_cache_file=(FILE*)FOPEN(glob_xmount_cfg.p_cache_file,"rb+"); if(glob_p_cache_file==NULL) { // As the c lib seems to have no possibility to open a file rw wether it // exists or not (w+ does not work because it truncates an existing file), // when r+ returns NULL the file could simply not exist LOG_DEBUG("Cache file does not exist. Creating new one\n") glob_p_cache_file=(FILE*)FOPEN(glob_xmount_cfg.p_cache_file,"wb+"); if(glob_p_cache_file==NULL) { // There is really a problem opening the file LOG_ERROR("Couldn't open cache file \"%s\"!\n", glob_xmount_cfg.p_cache_file) return FALSE; } } } else { // Overwrite existing cache file or create a new one glob_p_cache_file=(FILE*)FOPEN(glob_xmount_cfg.p_cache_file,"wb+"); if(glob_p_cache_file==NULL) { LOG_ERROR("Couldn't open cache file \"%s\"!\n", glob_xmount_cfg.p_cache_file) return FALSE; } } // Get input image size if(!GetOrigImageSize(&image_size,FALSE)) { LOG_ERROR("Couldn't get input image size!\n") return FALSE; } // Calculate how many blocks are needed and how big the buffers must be // for the actual cache file version needed_blocks=image_size/CACHE_BLOCK_SIZE; if((image_size%CACHE_BLOCK_SIZE)!=0) needed_blocks++; blockindex_size=needed_blocks*sizeof(ts_CacheFileBlockIndex); cachefile_header_size=sizeof(ts_CacheFileHeader)+blockindex_size; LOG_DEBUG("Cache blocks: %u (%04X) entries, %zd (%08zX) bytes\n", needed_blocks, needed_blocks, blockindex_size, blockindex_size) // Get cache file size // fseeko64 had massive problems! if(fseeko(glob_p_cache_file,0,SEEK_END)!=0) { LOG_ERROR("Couldn't seek to end of cache file!\n") return FALSE; } // Same here, ftello64 didn't work at all and returned 0 all the times cachefile_size=ftello(glob_p_cache_file); LOG_DEBUG("Cache file has %zd bytes\n",cachefile_size) if(cachefile_size>0) { // Cache file isn't empty, parse block header LOG_DEBUG("Cache file not empty. Parsing block header\n") if(fseeko(glob_p_cache_file,0,SEEK_SET)!=0) { LOG_ERROR("Couldn't seek to beginning of cache file!\n") return FALSE; } // Read and check file signature if(fread(&buf,8,1,glob_p_cache_file)!=1 || buf!=CACHE_FILE_SIGNATURE) { free(glob_p_cache_header); LOG_ERROR("Not an xmount cache file or cache file corrupt!\n") return FALSE; } // Now get cache file version (Has only 32bit!) if(fread(&buf,4,1,glob_p_cache_file)!=1) { free(glob_p_cache_header); LOG_ERROR("Not an xmount cache file or cache file corrupt!\n") return FALSE; } switch((uint32_t)buf) { case 0x00000001: // Old v1 cache file. LOG_ERROR("Unsupported cache file version!\n") LOG_ERROR("Please use xmount-tool to upgrade your cache file.\n") return FALSE; case CUR_CACHE_FILE_VERSION: // Current version if(fseeko(glob_p_cache_file,0,SEEK_SET)!=0) { LOG_ERROR("Couldn't seek to beginning of cache file!\n") return FALSE; } // Alloc memory for header and block index XMOUNT_MALLOC(glob_p_cache_header, pts_CacheFileHeader, cachefile_header_size); memset(glob_p_cache_header,0,cachefile_header_size); // Read header and block index from file if(fread(glob_p_cache_header, cachefile_header_size, 1, glob_p_cache_file)!=1) { // Cache file isn't big enough free(glob_p_cache_header); LOG_ERROR("Cache file corrupt!\n") return FALSE; } break; default: LOG_ERROR("Unknown cache file version!\n") return FALSE; } // Check if cache file has same block size as we do if(glob_p_cache_header->BlockSize!=CACHE_BLOCK_SIZE) { LOG_ERROR("Cache file does not use default cache block size!\n") return FALSE; } // Set pointer to block index glob_p_cache_blkidx=(pts_CacheFileBlockIndex)((void*)glob_p_cache_header+ glob_p_cache_header->pBlockIndex); } else { // New cache file, generate a new block header LOG_DEBUG("Cache file is empty. Generating new block header\n"); // Alloc memory for header and block index XMOUNT_MALLOC(glob_p_cache_header,pts_CacheFileHeader,cachefile_header_size) memset(glob_p_cache_header,0,cachefile_header_size); glob_p_cache_header->FileSignature=CACHE_FILE_SIGNATURE; glob_p_cache_header->CacheFileVersion=CUR_CACHE_FILE_VERSION; glob_p_cache_header->BlockSize=CACHE_BLOCK_SIZE; glob_p_cache_header->BlockCount=needed_blocks; //glob_p_cache_header->UsedBlocks=0; // The following pointer is only usuable when reading data from cache file glob_p_cache_header->pBlockIndex=sizeof(ts_CacheFileHeader); glob_p_cache_blkidx=(pts_CacheFileBlockIndex)((void*)glob_p_cache_header+ sizeof(ts_CacheFileHeader)); glob_p_cache_header->VdiFileHeaderCached=FALSE; glob_p_cache_header->pVdiFileHeader=0; glob_p_cache_header->VmdkFileCached=FALSE; glob_p_cache_header->VmdkFileSize=0; glob_p_cache_header->pVmdkFile=0; glob_p_cache_header->VhdFileHeaderCached=FALSE; glob_p_cache_header->pVhdFileHeader=0; // Write header to file if(fwrite(glob_p_cache_header, cachefile_header_size, 1, glob_p_cache_file)!=1) { free(glob_p_cache_header); LOG_ERROR("Couldn't write cache file header to file!\n"); return FALSE; } } return TRUE; } //! Load input libs /*! * \return TRUE on success, FALSE on error */ static int LoadInputLibs() { DIR *p_dir=NULL; struct dirent *p_dirent=NULL; int base_library_path_len=0; char *p_library_path=NULL; void *p_libxmount_in=NULL; t_LibXmount_Input_GetApiVersion pfun_GetApiVersion; t_LibXmount_Input_GetSupportedFormats pfun_GetSupportedFormats; t_LibXmount_Input_GetFunctions pfun_GetFunctions; const char *p_supported_formats=NULL; const char *p_buf; uint32_t supported_formats_len=0; pts_InputLib p_input_lib=NULL; LOG_DEBUG("Searching for input libraries in '%s'.\n", XMOUNT_LIBRARY_PATH); // Open lib dir p_dir=opendir(XMOUNT_LIBRARY_PATH); if(p_dir==NULL) { LOG_ERROR("Unable to access xmount library directory '%s'!\n", XMOUNT_LIBRARY_PATH); return FALSE; } // Construct base library path base_library_path_len=strlen(XMOUNT_LIBRARY_PATH); XMOUNT_STRSET(p_library_path,XMOUNT_LIBRARY_PATH); if(XMOUNT_LIBRARY_PATH[base_library_path_len]!='/') { base_library_path_len++; XMOUNT_STRAPP(p_library_path,"/"); } // Loop over lib dir while((p_dirent=readdir(p_dir))!=NULL) { if(strncmp(p_dirent->d_name,"libxmount_input_",16)!=0) { LOG_DEBUG("Ignoring '%s'.\n",p_dirent->d_name); continue; } LOG_DEBUG("Trying to load '%s'\n",p_dirent->d_name); // Found an input lib, construct full path to it and load it p_library_path=realloc(p_library_path, base_library_path_len+strlen(p_dirent->d_name)+1); if(p_library_path==NULL) { LOG_ERROR("Couldn't allocate memmory!\n"); exit(1); } strcpy(p_library_path+base_library_path_len,p_dirent->d_name); p_libxmount_in=dlopen(p_library_path,RTLD_NOW); if(p_libxmount_in==NULL) { LOG_ERROR("Unable to load input library '%s': %s!\n", p_library_path, dlerror()); continue; } // Load library symbols #define LIBXMOUNT_LOAD_SYMBOL(name,pfun) { \ if((pfun=dlsym(p_libxmount_in,name))==NULL) { \ LOG_ERROR("Unable to load symbol '%s' from library '%s'!\n", \ name, \ p_library_path); \ dlclose(p_libxmount_in); \ p_libxmount_in=NULL; \ continue; \ } \ } LIBXMOUNT_LOAD_SYMBOL("LibXmount_Input_GetApiVersion",pfun_GetApiVersion); // Check library's API version if(pfun_GetApiVersion()!=LIBXMOUNT_INPUT_API_VERSION) { LOG_DEBUG("Failed! Wrong API version.\n"); LOG_ERROR("Unable to load input library '%s'. Wrong API version\n", p_library_path); dlclose(p_libxmount_in); continue; } LIBXMOUNT_LOAD_SYMBOL("LibXmount_Input_GetSupportedFormats", pfun_GetSupportedFormats); LIBXMOUNT_LOAD_SYMBOL("LibXmount_Input_GetFunctions",pfun_GetFunctions); #undef LIBXMOUNT_LOAD_SYMBOL // Construct new entry for our library list XMOUNT_MALLOC(p_input_lib,pts_InputLib,sizeof(ts_InputLib)); // Initialize lib_functions structure to NULL memset(&(p_input_lib->lib_functions),0,sizeof(ts_LibXmountInputFunctions)); // Set name and handle XMOUNT_STRSET(p_input_lib->p_name,p_dirent->d_name); p_input_lib->p_lib=p_libxmount_in; // Get and set supported formats p_supported_formats=pfun_GetSupportedFormats(); supported_formats_len=0; p_buf=p_supported_formats; while(*p_buf!='\0') { supported_formats_len+=(strlen(p_buf)+1); p_buf+=(strlen(p_buf)+1); } supported_formats_len++; XMOUNT_MALLOC(p_input_lib->p_supported_input_types, char*, supported_formats_len); memcpy(p_input_lib->p_supported_input_types, p_supported_formats, supported_formats_len); // Get, set and check lib_functions pfun_GetFunctions(&(p_input_lib->lib_functions)); if(p_input_lib->lib_functions.CreateHandle==NULL || p_input_lib->lib_functions.DestroyHandle==NULL || p_input_lib->lib_functions.Open==NULL || p_input_lib->lib_functions.Close==NULL || p_input_lib->lib_functions.Size==NULL || p_input_lib->lib_functions.Read==NULL || p_input_lib->lib_functions.OptionsHelp==NULL || p_input_lib->lib_functions.OptionsParse==NULL || p_input_lib->lib_functions.GetInfofileContent==NULL || p_input_lib->lib_functions.GetErrorMessage==NULL || p_input_lib->lib_functions.FreeBuffer==NULL) { LOG_DEBUG("Missing implemention of one or more functions in lib %s!\n", p_dirent->d_name); free(p_input_lib->p_supported_input_types); free(p_input_lib->p_name); free(p_input_lib); dlclose(p_libxmount_in); continue; } // Add entry to the input library list XMOUNT_REALLOC(glob_pp_input_libs, pts_InputLib*, sizeof(pts_InputLib)*(glob_input_libs_count+1)); glob_pp_input_libs[glob_input_libs_count++]=p_input_lib; LOG_DEBUG("%s loaded successfully\n",p_dirent->d_name); } LOG_DEBUG("A total of %u input libs were loaded.\n",glob_input_libs_count); free(p_library_path); closedir(p_dir); return (glob_input_libs_count>0 ? TRUE : FALSE); } //! Unload input libs /*! * \return TRUE on success, FALSE on error */ static void UnloadInputLibs() { LOG_DEBUG("Unloading all input libs.\n"); for(uint32_t i=0;ip_name); dlclose(glob_pp_input_libs[i]->p_lib); free(glob_pp_input_libs[i]->p_supported_input_types); free(glob_pp_input_libs[i]); } free(glob_pp_input_libs); glob_pp_input_libs=NULL; glob_input_libs_count=0; } //! Search an appropriate input lib for specified input type /*! * \return TRUE on success, FALSE on error */ static int FindInputLib() { char *p_buf; LOG_DEBUG("Trying to find suitable library for input type '%s'.\n", glob_xmount_cfg.p_orig_image_type); // Loop over all loaded libs for(uint32_t i=0;ip_name); p_buf=glob_pp_input_libs[i]->p_supported_input_types; while(*p_buf!='\0') { if(strcmp(p_buf,glob_xmount_cfg.p_orig_image_type)==0) { // Library supports input type, set lib functions LOG_DEBUG("Input library '%s' pretends to handle that input type.\n", glob_pp_input_libs[i]->p_name); glob_p_input_functions=&(glob_pp_input_libs[i]->lib_functions); return TRUE; } p_buf+=(strlen(p_buf)+1); } } LOG_DEBUG("Couldn't find any suitable library.\n"); // No library supporting input type found return FALSE; } /******************************************************************************* * FUSE function implementation ******************************************************************************/ //! FUSE access implementation /*! * \param p_path Path of file to get attributes from * \param perm Requested permissisons * \return 0 on success, negated error code on error */ /* static int FuseAccess(const char *path, int perm) { // TODO: Implement propper file permission handling // http://www.cs.cf.ac.uk/Dave/C/node20.html // Values for the second argument to access. // These may be OR'd together. //#define R_OK 4 // Test for read permission. //#define W_OK 2 // Test for write permission. //#define X_OK 1 // Test for execute permission. //#define F_OK 0 // Test for existence. return 0; } */ //! FUSE getattr implementation /*! * \param p_path Path of file to get attributes from * \param p_stat Pointer to stat structure to save attributes to * \return 0 on success, negated error code on error */ static int FuseGetAttr(const char *p_path, struct stat *p_stat) { memset(p_stat,0,sizeof(struct stat)); if(strcmp(p_path,"/")==0) { // Attributes of mountpoint p_stat->st_mode=S_IFDIR | 0777; p_stat->st_nlink=2; } else if(strcmp(p_path,glob_xmount_cfg.p_virtual_image_path)==0) { // Attributes of virtual image if(!glob_xmount_cfg.writable) p_stat->st_mode=S_IFREG | 0444; else p_stat->st_mode=S_IFREG | 0666; p_stat->st_nlink=1; // Get virtual image file size if(!GetVirtImageSize((uint64_t*)&(p_stat->st_size))) { LOG_ERROR("Couldn't get image size!\n"); return -ENOENT; } if(glob_xmount_cfg.VirtImageType==VirtImageType_VHD) { // Make sure virtual image seems to be fully allocated (not sparse file). // Without this, Windows won't attach the vhd file! p_stat->st_blocks=p_stat->st_size/512; if(p_stat->st_size%512!=0) p_stat->st_blocks++; } } else if(strcmp(p_path,glob_xmount_cfg.p_virtual_info_path)==0) { // Attributes of virtual image info file p_stat->st_mode=S_IFREG | 0444; p_stat->st_nlink=1; // Get virtual image info file size if(glob_p_info_file!=NULL) { p_stat->st_size=strlen(glob_p_info_file); } else p_stat->st_size=0; } else if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK || glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS) { // Some special files only present when emulating VMDK files if(strcmp(p_path,glob_xmount_cfg.p_virtual_vmdk_path)==0) { // Attributes of virtual vmdk file if(!glob_xmount_cfg.writable) p_stat->st_mode=S_IFREG | 0444; else p_stat->st_mode=S_IFREG | 0666; p_stat->st_nlink=1; // Get virtual image info file size if(glob_p_vmdk_file!=NULL) { p_stat->st_size=glob_vmdk_file_size; } else p_stat->st_size=0; } else if(glob_p_vmdk_lockdir1!=NULL && strcmp(p_path,glob_p_vmdk_lockdir1)==0) { p_stat->st_mode=S_IFDIR | 0777; p_stat->st_nlink=2; } else if(glob_p_vmdk_lockdir2!=NULL && strcmp(p_path,glob_p_vmdk_lockdir2)==0) { p_stat->st_mode=S_IFDIR | 0777; p_stat->st_nlink=2; } else if(glob_p_vmdk_lockfile_name!=NULL && strcmp(p_path,glob_p_vmdk_lockfile_name)==0) { p_stat->st_mode=S_IFREG | 0666; if(glob_p_vmdk_lockfile_name!=NULL) { p_stat->st_size=strlen(glob_p_vmdk_lockfile_name); } else p_stat->st_size=0; } else return -ENOENT; } else return -ENOENT; // Set uid and gid of all files to uid and gid of current process p_stat->st_uid=getuid(); p_stat->st_gid=getgid(); return 0; } //! FUSE mkdir implementation /*! * \param p_path Directory path * \param mode Directory permissions * \return 0 on success, negated error code on error */ static int FuseMkDir(const char *p_path, mode_t mode) { // Only allow creation of VMWare's lock directories if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK || glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS) { if(glob_p_vmdk_lockdir1==NULL) { char aVmdkLockDir[strlen(glob_xmount_cfg.p_virtual_vmdk_path)+5]; sprintf(aVmdkLockDir,"%s.lck",glob_xmount_cfg.p_virtual_vmdk_path); if(strcmp(p_path,aVmdkLockDir)==0) { LOG_DEBUG("Creating virtual directory \"%s\"\n",aVmdkLockDir) XMOUNT_STRSET(glob_p_vmdk_lockdir1,aVmdkLockDir) return 0; } else { LOG_ERROR("Attempt to create illegal directory \"%s\"!\n",p_path) LOG_DEBUG("Supposed: %s\n",aVmdkLockDir) return -1; } } else if(glob_p_vmdk_lockdir2==NULL && strncmp(p_path, glob_p_vmdk_lockdir1, strlen(glob_p_vmdk_lockdir1))==0) { LOG_DEBUG("Creating virtual directory \"%s\"\n",p_path) XMOUNT_STRSET(glob_p_vmdk_lockdir2,p_path) return 0; } else { LOG_ERROR("Attempt to create illegal directory \"%s\"!\n",p_path) LOG_DEBUG("Compared to first %u chars of \"%s\"\n", strlen(glob_p_vmdk_lockdir1), glob_p_vmdk_lockdir1) return -1; } } LOG_ERROR("Attempt to create directory \"%s\" " "on read-only filesystem!\n",p_path) return -1; } //! FUSE create implementation. /*! * Currently only allows to create VMWare's lock file * * \param p_path File to create * \param mode File mode * \param dev ??? but not used * \return 0 on success, negated error code on error */ static int FuseMkNod(const char *p_path, mode_t mode, dev_t dev) { if((glob_xmount_cfg.VirtImageType==VirtImageType_VMDK || glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS) && glob_p_vmdk_lockdir1!=NULL && glob_p_vmdk_lockfile_name==NULL) { LOG_DEBUG("Creating virtual file \"%s\"\n",p_path) XMOUNT_STRSET(glob_p_vmdk_lockfile_name,p_path); return 0; } else { LOG_ERROR("Attempt to create illegal file \"%s\"\n",p_path) return -1; } } //! FUSE readdir implementation /*! * \param p_path Path from where files should be listed * \param p_buf Buffer to write file entrys to * \param filler Function to write dir entrys to buffer * \param offset ??? but not used * \param p_fi File info struct * \return 0 on success, negated error code on error */ static int FuseReadDir(const char *p_path, void *p_buf, fuse_fill_dir_t filler, off_t offset, struct fuse_file_info *p_fi) { // Ignore some params (void)offset; (void)p_fi; if(strcmp(p_path,"/")==0) { // Add std . and .. entrys filler(p_buf,".",NULL,0); filler(p_buf,"..",NULL,0); // Add our virtual files (p+1 to ignore starting "/") filler(p_buf,glob_xmount_cfg.p_virtual_image_path+1,NULL,0); filler(p_buf,glob_xmount_cfg.p_virtual_info_path+1,NULL,0); if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK || glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS) { // For VMDK's, we use an additional descriptor file filler(p_buf,glob_xmount_cfg.p_virtual_vmdk_path+1,NULL,0); // And there could also be a lock directory if(glob_p_vmdk_lockdir1!=NULL) { filler(p_buf,glob_p_vmdk_lockdir1+1,NULL,0); } } } else if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK || glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS) { // For VMDK emulation, there could be a lock directory if(glob_p_vmdk_lockdir1!=NULL && strcmp(p_path,glob_p_vmdk_lockdir1)==0) { filler(p_buf,".",NULL,0); filler(p_buf,"..",NULL,0); if(glob_p_vmdk_lockfile_name!=NULL) { filler(p_buf, glob_p_vmdk_lockfile_name+strlen(glob_p_vmdk_lockdir1)+1, NULL, 0); } } else if(glob_p_vmdk_lockdir2!=NULL && strcmp(p_path,glob_p_vmdk_lockdir2)==0) { filler(p_buf,".",NULL,0); filler(p_buf,"..",NULL,0); } else return -ENOENT; } else return -ENOENT; return 0; } //! FUSE open implementation /*! * \param p_path Path to file to open * \param p_fi File info struct * \return 0 on success, negated error code on error */ static int FuseOpen(const char *p_path, struct fuse_file_info *p_fi) { #define CHECK_OPEN_PERMS() { \ if(!glob_xmount_cfg.writable && (p_fi->flags & 3)!=O_RDONLY) { \ LOG_DEBUG("Attempt to open the read-only file \"%s\" for writing.\n", \ p_path) \ return -EACCES; \ } \ return 0; \ } if(strcmp(p_path,glob_xmount_cfg.p_virtual_image_path)==0 || strcmp(p_path,glob_xmount_cfg.p_virtual_info_path)==0) { CHECK_OPEN_PERMS(); } else if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK || glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS) { if(strcmp(p_path,glob_xmount_cfg.p_virtual_vmdk_path)==0 || (glob_p_vmdk_lockfile_name!=NULL && strcmp(p_path,glob_p_vmdk_lockfile_name)==0)) { CHECK_OPEN_PERMS(); } } #undef CHECK_OPEN_PERMS LOG_DEBUG("Attempt to open inexistant file \"%s\".\n",p_path); return -ENOENT; } //! FUSE read implementation /*! * \param p_path Path (relative to mount folder) of file to read data from * \param p_buf Pre-allocated buffer where read data should be written to * \param size Number of bytes to read * \param offset Offset to start reading at * \param p_fi: File info struct * \return Read bytes on success, negated error code on error */ static int FuseRead(const char *p_path, char *p_buf, size_t size, off_t offset, struct fuse_file_info *p_fi) { (void)p_fi; int ret; uint64_t len; #define READ_MEM_FILE(filebuf,filesize,filetypestr,mutex) { \ len=filesize; \ if(offsetlen) { \ LOG_DEBUG("Attempt to read past EOF of virtual " filetypestr " file\n"); \ LOG_DEBUG("Adjusting read size from %u to %u\n",size,len-offset); \ size=len-offset; \ } \ pthread_mutex_lock(&mutex); \ memcpy(p_buf,filebuf+offset,size); \ pthread_mutex_unlock(&mutex); \ LOG_DEBUG("Read %" PRIu64 " bytes at offset %" PRIu64 \ " from virtual " filetypestr " file\n",size,offset); \ ret=size; \ } else { \ LOG_DEBUG("Attempt to read behind EOF of virtual " filetypestr " file\n"); \ ret=0; \ } \ } if(strcmp(p_path,glob_xmount_cfg.p_virtual_image_path)==0) { // Read data from virtual output file // Wait for other threads to end reading/writing data pthread_mutex_lock(&glob_mutex_image_rw); // Get requested data if((ret=GetVirtImageData(p_buf,offset,size))<0) { LOG_ERROR("Couldn't read data from virtual image file!\n") } // Allow other threads to read/write data again pthread_mutex_unlock(&glob_mutex_image_rw); } else if(strcmp(p_path,glob_xmount_cfg.p_virtual_info_path)==0) { // Read data from virtual info file READ_MEM_FILE(glob_p_info_file, strlen(glob_p_info_file), "info", glob_mutex_info_read); } else if(strcmp(p_path,glob_xmount_cfg.p_virtual_vmdk_path)==0) { // Read data from virtual vmdk file READ_MEM_FILE(glob_p_vmdk_file, glob_vmdk_file_size, "vmdk", glob_mutex_image_rw); } else if(glob_p_vmdk_lockfile_name!=NULL && strcmp(p_path,glob_p_vmdk_lockfile_name)==0) { // Read data from virtual lock file READ_MEM_FILE(glob_p_vmdk_lockfile_data, glob_vmdk_lockfile_size, "vmdk lock", glob_mutex_image_rw); } else { // Attempt to read non existant file LOG_DEBUG("Attempt to read from non existant file \"%s\"\n",p_path) ret=-ENOENT; } #undef READ_MEM_FILE return ret; } //! FUSE rename implementation /*! * \param p_path File to rename * \param p_npath New filename * \return 0 on error, negated error code on error */ static int FuseRename(const char *p_path, const char *p_npath) { if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK || glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS) { if(glob_p_vmdk_lockfile_name!=NULL && strcmp(p_path,glob_p_vmdk_lockfile_name)==0) { LOG_DEBUG("Renaming virtual lock file from \"%s\" to \"%s\"\n", glob_p_vmdk_lockfile_name, p_npath) XMOUNT_REALLOC(glob_p_vmdk_lockfile_name,char*, (strlen(p_npath)+1)*sizeof(char)); strcpy(glob_p_vmdk_lockfile_name,p_npath); return 0; } } return -ENOENT; } //! FUSE rmdir implementation /*! * \param p_path Directory to delete * \return 0 on success, negated error code on error */ static int FuseRmDir(const char *p_path) { // Only VMWare's lock directories can be deleted if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK || glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS) { if(glob_p_vmdk_lockdir1!=NULL && strcmp(p_path,glob_p_vmdk_lockdir1)==0) { LOG_DEBUG("Deleting virtual lock dir \"%s\"\n",glob_p_vmdk_lockdir1) free(glob_p_vmdk_lockdir1); glob_p_vmdk_lockdir1=NULL; return 0; } else if(glob_p_vmdk_lockdir2!=NULL && strcmp(p_path,glob_p_vmdk_lockdir2)==0) { LOG_DEBUG("Deleting virtual lock dir \"%s\"\n",glob_p_vmdk_lockdir1) free(glob_p_vmdk_lockdir2); glob_p_vmdk_lockdir2=NULL; return 0; } } return -1; } //! FUSE unlink implementation /*! * \param p_path File to delete * \return 0 on success, negated error code on error */ static int FuseUnlink(const char *p_path) { // Only VMWare's lock file can be deleted if(glob_xmount_cfg.VirtImageType==VirtImageType_VMDK || glob_xmount_cfg.VirtImageType==VirtImageType_VMDKS) { if(glob_p_vmdk_lockfile_name!=NULL && strcmp(p_path,glob_p_vmdk_lockfile_name)==0) { LOG_DEBUG("Deleting virtual file \"%s\"\n",glob_p_vmdk_lockfile_name) free(glob_p_vmdk_lockfile_name); free(glob_p_vmdk_lockfile_data); glob_p_vmdk_lockfile_name=NULL; glob_p_vmdk_lockfile_data=NULL; glob_vmdk_lockfile_size=0; return 0; } } return -1; } //! FUSE statfs implementation /*! * \param p_path Get stats for fs that the specified file resides in * \param stats Stats * \return 0 on success, negated error code on error */ /* static int FuseStatFs(const char *p_path, struct statvfs *stats) { struct statvfs CacheFileFsStats; int ret; if(glob_xmount_cfg.writable==TRUE) { // If write support is enabled, return stats of fs upon which cache file // resides in if((ret=statvfs(glob_xmount_cfg.p_cache_file,&CacheFileFsStats))==0) { memcpy(stats,&CacheFileFsStats,sizeof(struct statvfs)); return 0; } else { LOG_ERROR("Couldn't get stats for fs upon which resides \"%s\"\n", glob_xmount_cfg.p_cache_file) return ret; } } else { // TODO: Return read only return 0; } } */ // FUSE write implementation /*! * \param p_buf Buffer containing data to write * \param size Number of bytes to write * \param offset Offset to start writing at * \param p_fi: File info struct * * Returns: * Written bytes on success, negated error code on error */ static int FuseWrite(const char *p_path, const char *p_buf, size_t size, off_t offset, struct fuse_file_info *p_fi) { (void)p_fi; uint64_t len; if(strcmp(p_path,glob_xmount_cfg.p_virtual_image_path)==0) { // Wait for other threads to end reading/writing data pthread_mutex_lock(&glob_mutex_image_rw); // Get virtual image file size if(!GetVirtImageSize(&len)) { LOG_ERROR("Couldn't get virtual image size!\n") pthread_mutex_unlock(&glob_mutex_image_rw); return 0; } if(offsetlen) size=len-offset; if(SetVirtImageData(p_buf,offset,size)!=size) { LOG_ERROR("Couldn't write data to virtual image file!\n") pthread_mutex_unlock(&glob_mutex_image_rw); return 0; } } else { LOG_DEBUG("Attempt to write past EOF of virtual image file\n") pthread_mutex_unlock(&glob_mutex_image_rw); return 0; } // Allow other threads to read/write data again pthread_mutex_unlock(&glob_mutex_image_rw); } else if(strcmp(p_path,glob_xmount_cfg.p_virtual_vmdk_path)==0) { pthread_mutex_lock(&glob_mutex_image_rw); len=glob_vmdk_file_size; if((offset+size)>len) { // Enlarge or create buffer if needed if(len==0) { len=offset+size; XMOUNT_MALLOC(glob_p_vmdk_file,char*,len*sizeof(char)) } else { len=offset+size; XMOUNT_REALLOC(glob_p_vmdk_file,char*,len*sizeof(char)) } glob_vmdk_file_size=offset+size; } // Copy data to buffer memcpy(glob_p_vmdk_file+offset,p_buf,size); pthread_mutex_unlock(&glob_mutex_image_rw); } else if(glob_p_vmdk_lockfile_name!=NULL && strcmp(p_path,glob_p_vmdk_lockfile_name)==0) { pthread_mutex_lock(&glob_mutex_image_rw); if((offset+size)>glob_vmdk_lockfile_size) { // Enlarge or create buffer if needed if(glob_vmdk_lockfile_size==0) { glob_vmdk_lockfile_size=offset+size; XMOUNT_MALLOC(glob_p_vmdk_lockfile_data,char*, glob_vmdk_lockfile_size*sizeof(char)) } else { glob_vmdk_lockfile_size=offset+size; XMOUNT_REALLOC(glob_p_vmdk_lockfile_data,char*, glob_vmdk_lockfile_size*sizeof(char)) } } // Copy data to buffer memcpy(glob_p_vmdk_lockfile_data+offset,p_buf,size); pthread_mutex_unlock(&glob_mutex_image_rw); } else if(strcmp(p_path,glob_xmount_cfg.p_virtual_info_path)==0) { // Attempt to write data to read only image info file LOG_DEBUG("Attempt to write data to virtual info file\n"); return -ENOENT; } else { // Attempt to write to non existant file LOG_DEBUG("Attempt to write to the non existant file \"%s\"\n",p_path) return -ENOENT; } return size; } /******************************************************************************* * Main ******************************************************************************/ int main(int argc, char *argv[]) { char **pp_input_filenames=NULL; int input_filenames_count=0; int nargc=0; char **pp_nargv=NULL; char *p_mountpoint=NULL; struct stat file_stat; int ret; int fuse_ret; char *p_err_msg; // Set implemented FUSE functions struct fuse_operations xmount_operations = { //.access=FuseAccess, .getattr=FuseGetAttr, .mkdir=FuseMkDir, .mknod=FuseMkNod, .open=FuseOpen, .readdir=FuseReadDir, .read=FuseRead, .rename=FuseRename, .rmdir=FuseRmDir, //.statfs=FuseStatFs, .unlink=FuseUnlink, .write=FuseWrite }; // Disable std output / input buffering setbuf(stdout,NULL); setbuf(stderr,NULL); // Init glob_xmount_cfg glob_xmount_cfg.p_orig_image_type=NULL; #ifndef __APPLE__ glob_xmount_cfg.VirtImageType=VirtImageType_DD; #else glob_xmount_cfg.VirtImageType=VirtImageType_DMG; #endif glob_xmount_cfg.debug=FALSE; glob_xmount_cfg.p_virtual_image_path=NULL; glob_xmount_cfg.p_virtual_vmdk_path=NULL; glob_xmount_cfg.p_virtual_info_path=NULL; glob_xmount_cfg.writable=FALSE; glob_xmount_cfg.overwrite_cache=FALSE; glob_xmount_cfg.p_cache_file=NULL; glob_xmount_cfg.orig_image_size=0; glob_xmount_cfg.virt_image_size=0; glob_xmount_cfg.input_hash_lo=0; glob_xmount_cfg.input_hash_hi=0; glob_xmount_cfg.orig_img_offset=0; glob_xmount_cfg.p_lib_params=NULL; glob_xmount_cfg.may_set_fuse_allow_other=FALSE; // Load input libs if(!LoadInputLibs()) { LOG_ERROR("Unable to load any input libraries!\n") return 1; } // Check FUSE settings CheckFuseSettings(); // Parse command line options if(!ParseCmdLine(argc, argv, &nargc, &pp_nargv, &input_filenames_count, &pp_input_filenames, &p_mountpoint)) { LOG_ERROR("Error parsing command line options!\n") //PrintUsage(argv[0]); UnloadInputLibs(); return 1; } // Check command line options if(nargc<2 /*|| input_filenames_count==0 || p_mountpoint==NULL*/) { LOG_ERROR("Couldn't parse command line options!\n") PrintUsage(argv[0]); UnloadInputLibs(); return 1; } // Check if mountpoint is a valid dir if(stat(p_mountpoint,&file_stat)!=0) { LOG_ERROR("Unable to stat mount point '%s'!\n",p_mountpoint); PrintUsage(argv[0]); UnloadInputLibs(); return 1; } if(!S_ISDIR(file_stat.st_mode)) { LOG_ERROR("Mount point '%s' is not a directory!\n",p_mountpoint); PrintUsage(argv[0]); UnloadInputLibs(); return 1; } // If no input type was specified, default to "dd" if(glob_xmount_cfg.p_orig_image_type==NULL) { XMOUNT_STRSET(glob_xmount_cfg.p_orig_image_type,"dd"); } // Find an input lib for the specified input type if(!FindInputLib()) { LOG_ERROR("Unknown input image type \"%s\"!\n", glob_xmount_cfg.p_orig_image_type) PrintUsage(argv[0]); UnloadInputLibs(); return 1; } // Init input image handle ret=glob_p_input_functions->CreateHandle(&glob_p_input_image); if(ret!=0) { LOG_ERROR("Unable to init input handle: %s!\n", glob_p_input_functions->GetErrorMessage(ret)); return 1; } // Parse input lib specific options if(glob_xmount_cfg.p_lib_params!=NULL) { ret=glob_p_input_functions->OptionsParse(glob_p_input_image, glob_xmount_cfg.p_lib_params, &p_err_msg); if(ret!=0) { if(p_err_msg!=NULL) { LOG_ERROR("Unable to parse input library specific options: %s: %s!\n", glob_p_input_functions->GetErrorMessage(ret), p_err_msg); glob_p_input_functions->FreeBuffer(p_err_msg); } else { LOG_ERROR("Unable to parse input library specific options: %s!\n", glob_p_input_functions->GetErrorMessage(ret)); } } } if(glob_xmount_cfg.debug==TRUE) { LOG_DEBUG("Options passed to FUSE: ") for(int i=0;iOpen(&glob_p_input_image, (const char**)pp_input_filenames, input_filenames_count); if(ret!=0) { LOG_ERROR("Unable to open input image file: %s!\n", glob_p_input_functions->GetErrorMessage(ret)); UnloadInputLibs(); return 1; } LOG_DEBUG("Input image file opened successfully\n") // If an offset was specified, make sure it is within limits if(glob_xmount_cfg.orig_img_offset!=0) { uint64_t size; if(!GetOrigImageSize(&size,TRUE)) { LOG_ERROR("Couldn't get original image's size!\n"); return 1; } if(glob_xmount_cfg.orig_img_offset>size) { LOG_ERROR("The specified offset is larger then the size of the input " "image! (%" PRIu64 " > %" PRIu64 ")\n", glob_xmount_cfg.orig_img_offset, size); return 1; } } // Calculate partial MD5 hash of input image file if(CalculateInputImageHash(&(glob_xmount_cfg.input_hash_lo), &(glob_xmount_cfg.input_hash_hi))==FALSE) { LOG_ERROR("Couldn't calculate partial hash of input image file!\n") return 1; } if(glob_xmount_cfg.debug==TRUE) { LOG_DEBUG("Partial MD5 hash of input image file: ") for(int i=0;i<8;i++) printf("%02hhx",*(((char*)(&(glob_xmount_cfg.input_hash_lo)))+i)); for(int i=0;i<8;i++) printf("%02hhx",*(((char*)(&(glob_xmount_cfg.input_hash_hi)))+i)); printf("\n"); } if(!ExtractVirtFileNames(pp_input_filenames[0])) { LOG_ERROR("Couldn't extract virtual file names!\n"); UnloadInputLibs(); return 1; } LOG_DEBUG("Virtual file names extracted successfully\n") // Gather infos for info file if(!InitVirtImageInfoFile()) { LOG_ERROR("Couldn't gather infos for virtual image info file!\n") UnloadInputLibs(); return 1; } LOG_DEBUG("Virtual image info file build successfully\n") // Do some virtual image type specific initialisations switch(glob_xmount_cfg.VirtImageType) { case VirtImageType_DD: case VirtImageType_DMG: break; case VirtImageType_VDI: // When mounting as VDI, we need to construct a vdi header if(!InitVirtVdiHeader()) { LOG_ERROR("Couldn't initialize virtual VDI file header!\n") UnloadInputLibs(); return 1; } LOG_DEBUG("Virtual VDI file header build successfully\n") break; case VirtImageType_VHD: // When mounting as VHD, we need to construct a vhd footer if(!InitVirtVhdHeader()) { LOG_ERROR("Couldn't initialize virtual VHD file footer!\n") UnloadInputLibs(); return 1; } LOG_DEBUG("Virtual VHD file footer build successfully\n") break; case VirtImageType_VMDK: case VirtImageType_VMDKS: // When mounting as VMDK, we need to construct the VMDK descriptor file if(!InitVirtualVmdkFile()) { LOG_ERROR("Couldn't initialize virtual VMDK file!\n") UnloadInputLibs(); return 1; } break; } if(glob_xmount_cfg.writable) { // Init cache file and cache file block index if(!InitCacheFile()) { LOG_ERROR("Couldn't initialize cache file!\n") UnloadInputLibs(); return 1; } LOG_DEBUG("Cache file initialized successfully\n") } // Call fuse_main to do the fuse magic fuse_ret=fuse_main(nargc,pp_nargv,&xmount_operations,NULL); // Destroy mutexes pthread_mutex_destroy(&glob_mutex_image_rw); pthread_mutex_destroy(&glob_mutex_info_read); // Close input image and destroy handle ret=glob_p_input_functions->Close(&glob_p_input_image); if(ret!=0) { LOG_ERROR("Unable to close input image file: %s!", glob_p_input_functions->GetErrorMessage(ret)); } ret=glob_p_input_functions->DestroyHandle(&glob_p_input_image); if(ret!=0) { LOG_ERROR("Unable to destroy input image handle: %s!", glob_p_input_functions->GetErrorMessage(ret)); } // Close cache file if write support was enabled if(glob_xmount_cfg.writable) { fclose(glob_p_cache_file); free(glob_p_cache_header); } // Free allocated memory // Free info file content if(glob_p_info_file!=NULL) free(glob_p_info_file); // Free output image specific data switch(glob_xmount_cfg.VirtImageType) { case VirtImageType_DD: case VirtImageType_DMG: break; case VirtImageType_VDI: free(glob_p_vdi_header); break; case VirtImageType_VHD: free(glob_p_vhd_header); break; case VirtImageType_VMDK: case VirtImageType_VMDKS: { free(glob_p_vmdk_file); free(glob_xmount_cfg.p_virtual_vmdk_path); if(glob_p_vmdk_lockfile_name!=NULL) free(glob_p_vmdk_lockfile_name); if(glob_p_vmdk_lockfile_data!=NULL) free(glob_p_vmdk_lockfile_data); if(glob_p_vmdk_lockdir1!=NULL) free(glob_p_vmdk_lockdir1); if(glob_p_vmdk_lockdir2!=NULL) free(glob_p_vmdk_lockdir2); break; } } // Free input filenames if(pp_input_filenames!=NULL) { for(int i=0;i32bit 20090308: * Added SetVdiFileHeaderData function to handle virtual image type specific data to be cached. This makes cache files independent from virtual image type 20090316: v0.2.0 released 20090327: v0.2.1 released * Fixed a bug in virtual write support. Checking whether data is cached didn't use semaphores. This could corrupt cache files when running multi-threaded. * Added IsVdiFileHeaderCached function to check whether VDI file header was already cached * Added IsBlockCached function to check whether a block was already cached 20090331: v0.2.2 released (Internal release) * Further changes to semaphores to fix write support bug. 20090410: v0.2.3 released * Reverted most of the fixes from v0.2.1 and v0.2.2 as those did not solve the write support bug. * Removed all semaphores * Added two pthread mutexes to protect virtual image and virtual info file. 20090508: * Configure script will now exit when needed libraries aren't found * Added support for newest libewf beta version 20090506 as it seems to reduce memory usage when working with EWF files by about 1/2. * Added LIBEWF_BETA define to adept source to new libewf API. * Added function InitVirtualVmdkFile to build a VmWare virtual disk descriptor file. 20090519: * Added function CreateVirtDir implementing FUSE's mkdir to allow VMWare to create his .vmdk.lck lock folder. Function does not allow to create other folders! * Changed cache file handling as VMDK caching will need new cache file structure incompatible to the old one. 20090522: v0.3.0 released * Added function DeleteVirtFile and DeleteVirtDir so VMWare can remove his lock directories and files. * Added function RenameVirtFile because VMWare needs to rename his lock files. * VMDK support should work now but descriptor file won't get cached as I didn't implement it yet. 20090604: * Added --cache commandline parameter doing the same as --rw. * Added --owcache commandline parameter doing the same as --rw but overwrites any existing cache data. This can be handy for debugging and testing purposes. * Added "vmdks" output type. Same as "vmdk" but generates a disk connected to the SCSI bus rather than the IDE bus. 20090710: v0.3.1 released 20090721: * Added function CheckFuseAllowOther to check wether FUSE supports the "-o allow_other" option. It is supported when "user_allow_other" is set in /etc/fuse.conf or when running xmount as root. * Automatic addition of FUSE's "-o allow_other" option if it is supported. * Added special "-o no_allow_other" command line parameter to disable automatic addition of the above option. * Reorganisation of FUSE's and xmount's command line options processing. * Added LogWarnMessage function to output a warning message. 20090722: * Added function CalculateInputImageHash to calculate an MD5 hash of the first input image's HASH_AMOUNT bytes of data. This hash is used as VDI creation UUID and will later be used to match cache files to input images. 20090724: v0.3.2 released 20090725: v0.4.0 released * Added AFF input image support. * Due to various problems with libewf and libaff packages (Mainly in Debian and Ubuntu), I decided to include them into xmount's source tree and link them in statically. This has the advantage that I can use whatever version I want. 20090727: v0.4.1 released * Added again the ability to compile xmount with shared libs as the Debian folks don't like the static ones :) 20090812: * Added TXMountConfData.OrigImageSize and TXMountConfData.VirtImageSize to save the size of the input and output image in order to avoid regetting it always from disk. 20090814: * Replaced all malloc and realloc occurences with the two macros XMOUNT_MALLOC and XMOUNT_REALLOC. 20090816: * Replaced where applicable all occurences of str(n)cpy or alike with their corresponding macros XMOUNT_STRSET, XMOUNT_STRCPY and XMOUNT_STRNCPY pendants. 20090907: v0.4.2 released * Fixed a bug in VMDK lock file access. glob_vmdk_lockfile_size wasn't reset to 0 when the file was deleted. * Fixed a bug in VMDK descriptor file access. Had to add glob_vmdk_file_size to track the size of this file as strlen was a bad idea :). 20100324: v0.4.3 released * Changed all header structs to prevent different sizes on i386 and amd64. See xmount.h for more details. 20100810: v0.4.4 released * Found a bug in InitVirtVdiHeader(). The 64bit values were addressed incorrectly while filled with rand(). This leads to an error message when trying to add a VDI file to VirtualBox 3.2.8. 20110210: * Adding subtype and fsname FUSE options in order to display mounted source in mount command output. 20110211: v0.4.5 released 20111011: * Changes to deal with libewf v2 API (thx to Joachim Metz) 20111109: v0.4.6 released * Added support for DMG output type (actually a DD with .dmg file extension). This type is used as default output type when using xmount under Mac OS X. 20120130: v0.4.7 released * Made InitVirtImageInfoFile less picky about missing EWF infos. 20120507: * Added support for VHD output image as requested by various people. * Statically linked libs updated to 20120504 (libewf) and 3.7.0 (afflib). 20120510: v0.5.0 released * Added stbuf->st_blocks calculation for VHD images in function GetVirtFileAttr. This makes Windows not think the emulated file would be a sparse file. Sparse vhd files are not attachable in Windows. 20130726: v0.6.0 released * Added libaaff to replace libaff (thx to Guy Voncken). * Added libdd to replace raw dd input file handling and finally support split dd files (thx to Guy Voncken). 20140311: * Added libaewf (thx to Guy Voncken). 20140726: * Added support for dynamically loading of input libs. This should ease adding support for new input image formats in the future. * Moved input image functions to their corresponding dynamically loadable libs. * Prepended "glob_" to all global vars for better identification. 20140731: * Added --offset option as requested by HPM. * Began massive code cleanup. 20140803: * Added correct return code handling when calling input lib functions including getting error messages using GetErrorMessage. * Added input lib specific option parsing. * Re-implemented InitVirtImageInfoFile using input lib's GetInfofileContent function. * Further code cleanups. 20140807: * Further code cleanups. * Renamed GetVirtFileAttr to FuseGetAttr * Renamed CreateVirtDir to FuseMkDir * Renamed CreateVirtDir to FuseMkNod * Renamed OpenVirtFile to FuseOpen * Renamed GetVirtFiles to FuseReadDir * Renamed ReadVirtFile to FuseRead * Renamed RenameVirtFile to FuseRename * Renamed DeleteVirtDir to FuseRmDir * Renamed DeleteVirtFile to FuseUnlink * Renamed WriteVirtFile to FuseWrite * Fixed bug in CalculateInputImageHash where always HASH_AMOUNT bytes were hased even if input image is smaller. * Fixed a newly introduced bug in FuseRead and GetVirtImageData returning -EIO when trying to read behind EOF. The correct return value is 0. 20140811: * Renamed CheckFuseAllowOther to CheckFuseSettings and added a check to see if user is part of the fuse group. + 20140814: * Replaced cuserid() with getpwuid(geteuid()) in CheckFuseSettings + as it is deprecated on Linux and not available on OSx. + * Only build fuse group checks from CheckFuseSettings on Linux. */ diff --git a/trunk/xmount.spec b/trunk/xmount.spec index f3ee4e5..0a514ba 100644 --- a/trunk/xmount.spec +++ b/trunk/xmount.spec @@ -1,58 +1,57 @@ %define debug_package %{nil} Name: xmount Summary: Tool to crossmount between multiple input and output harddisk images -Version: 0.5.0 +Version: 0.7.0 Release: 1%{?dist} License: GPL Group: Applications/System URL: https://www.pinguin.lu/ Source0: %{name}-%{version}.tar.gz Buildroot: %{_tmppath}/%{name}-%{version}-%{release}-root Requires: fuse openssl zlib libewf afflib -BuildRequires: fuse-devel libewf-devel >= 20110903 afflib-devel +BuildRequires: cmake fuse-devel zlib-devel libewf-devel afflib-devel %description xmount allows you to convert on-the-fly between multiple input and output -harddisk image types. xmount creates a virtual file system using FUSE +harddisk image formats. xmount creates a virtual file system using FUSE (Filesystem in Userspace) that contains a virtual representation of the input -harddisk image. The virtual representation can be in raw DD, VirtualBox's -virtual disk file format, Microsoft's Virtual Hard Disk Image format or in -VMware's VMDK format. Input harddisk images can be raw DD or EWF (Expert -Witness Compression Format) files. In addition, xmount also supports virtual -write access to the output files that is redirected to a cache file. This -makes it for example possible to boot acquired harddisk images using QEMU, -KVM, VirtualBox, VMware or alike. -%prep -%setup -q -autoreconf +harddisk image. The virtual representation can be in raw DD, Apple's Disk Image +format (DMG), VirtualBox's virtual disk file format (VDI), Microsoft's Virtual +Hard Disk Image format (VHD) or in VmWare's VMDK file format. Input images can +be raw DD, EWF (Expert Witness Compression Format) or AFF (Advanced Forensic +Format) files. In addition, xmount also supports virtual write access to the +output files that is redirected to a cache file. This makes it for example +possible to boot acquired harddisk images using QEMU, KVM, VirtualBox, VMware +or alike. %build -%configure -make +%cmake -DCMAKE_INSTALL_PREFIX=%{_prefix} . +make %{?_smp_mflags} %install rm -fr %{buildroot} +make install DESTDIR=%{buildroot} %makeinstall %clean rm -fr %{buildroot} %post %preun %postun %files %defattr(-,root,root) %{_bindir}/* %{_mandir}/* %doc AUTHORS COPYING INSTALL NEWS README ROADMAP %changelog -* Sun May 6 2012 Daniel Gillen 0.5.0-1 -* Release 0.5.0-1 - Added support for virtual VHD image file emulation +* Wed Aug 13 2014 Daniel Gillen 0.7.0-1 +* Release 0.7.0-1 + See ChangeLog for details