blob: 669d080ad2e5bc0ed63c59fb53879fb5974235b0 [file] [log] [blame]
Colin Crossec0a2e82010-06-11 14:21:37 -07001/*
2 * Copyright (C) 2010 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Colin Cross33f96c62010-12-22 18:40:14 -080017#include "make_ext4fs.h"
Colin Cross33f96c62010-12-22 18:40:14 -080018#include "ext4_utils.h"
19#include "allocate.h"
20#include "contents.h"
Colin Crossdc5abee2012-04-23 23:20:48 -070021#include "wipe.h"
22
23#include <sparse/sparse.h>
Colin Crossec0a2e82010-06-11 14:21:37 -070024
Raphael Moll4605b3f2012-02-03 23:02:33 -080025#include <assert.h>
Colin Crossec0a2e82010-06-11 14:21:37 -070026#include <dirent.h>
Anatol Pomazau0349bd92012-01-11 15:12:27 -080027#include <fcntl.h>
Colin Crossaf072342014-01-23 13:19:27 -080028#include <inttypes.h>
Colin Crossec0a2e82010-06-11 14:21:37 -070029#include <libgen.h>
Colin Cross881cca22010-06-20 23:57:06 -070030#include <stdio.h>
31#include <stdlib.h>
32#include <string.h>
33#include <unistd.h>
34#include <sys/stat.h>
35#include <sys/types.h>
Colin Crossec0a2e82010-06-11 14:21:37 -070036
Raphael Moll4605b3f2012-02-03 23:02:33 -080037#ifdef USE_MINGW
38
39#include <winsock2.h>
40
41/* These match the Linux definitions of these flags.
42 L_xx is defined to avoid conflicting with the win32 versions.
43*/
44#define L_S_IRUSR 00400
45#define L_S_IWUSR 00200
46#define L_S_IXUSR 00100
47#define S_IRWXU (L_S_IRUSR | L_S_IWUSR | L_S_IXUSR)
48#define S_IRGRP 00040
49#define S_IWGRP 00020
50#define S_IXGRP 00010
51#define S_IRWXG (S_IRGRP | S_IWGRP | S_IXGRP)
52#define S_IROTH 00004
53#define S_IWOTH 00002
54#define S_IXOTH 00001
55#define S_IRWXO (S_IROTH | S_IWOTH | S_IXOTH)
56#define S_ISUID 0004000
57#define S_ISGID 0002000
58#define S_ISVTX 0001000
59
Anatol Pomazau0349bd92012-01-11 15:12:27 -080060#else
61
Colin Cross96529862013-01-23 15:38:57 -080062#include <selinux/selinux.h>
63#include <selinux/label.h>
Colin Cross96529862013-01-23 15:38:57 -080064
Anatol Pomazau0349bd92012-01-11 15:12:27 -080065#define O_BINARY 0
66
Raphael Moll4605b3f2012-02-03 23:02:33 -080067#endif
68
Colin Crossec0a2e82010-06-11 14:21:37 -070069/* TODO: Not implemented:
70 Allocating blocks in the same block group as the file inode
71 Hash or binary tree directories
Colin Cross7a8bee72010-06-20 14:53:14 -070072 Special files: sockets, devices, fifos
Colin Crossec0a2e82010-06-11 14:21:37 -070073 */
74
Colin Crossec0a2e82010-06-11 14:21:37 -070075static int filter_dot(const struct dirent *d)
76{
77 return (strcmp(d->d_name, "..") && strcmp(d->d_name, "."));
78}
79
Stephen Smalley7907ac72014-04-25 14:57:55 -040080static u32 build_default_directory_structure(const char *dir_path,
81 struct selabel_handle *sehnd)
Colin Crossec0a2e82010-06-11 14:21:37 -070082{
83 u32 inode;
84 u32 root_inode;
85 struct dentry dentries = {
86 .filename = "lost+found",
87 .file_type = EXT4_FT_DIR,
88 .mode = S_IRWXU,
89 .uid = 0,
Colin Crossde61f982010-08-04 15:06:09 -070090 .gid = 0,
91 .mtime = 0,
Colin Crossec0a2e82010-06-11 14:21:37 -070092 };
93 root_inode = make_directory(0, 1, &dentries, 1);
94 inode = make_directory(root_inode, 0, NULL, 0);
95 *dentries.inode = inode;
Ken Sumrall75249ed2010-08-13 16:04:49 -070096 inode_set_permissions(inode, dentries.mode,
97 dentries.uid, dentries.gid, dentries.mtime);
Colin Crossec0a2e82010-06-11 14:21:37 -070098
Stephen Smalley7907ac72014-04-25 14:57:55 -040099#ifndef USE_MINGW
100 if (sehnd) {
101 char *path = NULL;
102 char *secontext = NULL;
103
104 asprintf(&path, "%slost+found", dir_path);
105 if (selabel_lookup(sehnd, &secontext, path, S_IFDIR) < 0) {
106 error("cannot lookup security context for %s", path);
107 } else {
108 inode_set_selinux(inode, secontext);
109 freecon(secontext);
110 }
111 free(path);
112 }
113#endif
114
Colin Crossec0a2e82010-06-11 14:21:37 -0700115 return root_inode;
116}
117
Raphael Moll4605b3f2012-02-03 23:02:33 -0800118#ifndef USE_MINGW
Colin Crossec0a2e82010-06-11 14:21:37 -0700119/* Read a local directory and create the same tree in the generated filesystem.
Colin Crossa4460142012-12-20 01:00:33 -0800120 Calls itself recursively with each directory in the given directory.
121 full_path is an absolute or relative path, with a trailing slash, to the
122 directory on disk that should be copied, or NULL if this is a directory
123 that does not exist on disk (e.g. lost+found).
124 dir_path is an absolute path, with trailing slash, to the same directory
125 if the image were mounted at the specified mount point */
Thierry Strudelb89e81d2015-07-09 16:31:39 -0700126static u32 build_directory_structure(const char *full_path, const char *dir_path, const char *target_out_path,
Kenny Root2e5c5232012-03-30 20:38:32 -0700127 u32 dir_inode, fs_config_func_t fs_config_func,
Doug Zongker95266802013-12-05 15:51:28 -0800128 struct selabel_handle *sehnd, int verbose, time_t fixed_time)
Colin Crossec0a2e82010-06-11 14:21:37 -0700129{
130 int entries = 0;
131 struct dentry *dentries;
Colin Crossc18120d2012-11-20 19:41:42 -0800132 struct dirent **namelist = NULL;
Colin Crossec0a2e82010-06-11 14:21:37 -0700133 struct stat stat;
134 int ret;
135 int i;
136 u32 inode;
137 u32 entry_inode;
138 u32 dirs = 0;
Colin Crossc18120d2012-11-20 19:41:42 -0800139 bool needs_lost_and_found = false;
Colin Crossec0a2e82010-06-11 14:21:37 -0700140
Colin Crossc18120d2012-11-20 19:41:42 -0800141 if (full_path) {
142 entries = scandir(full_path, &namelist, filter_dot, (void*)alphasort);
143 if (entries < 0) {
Mihai Serban04f48392015-01-07 12:44:24 +0200144#ifdef __GLIBC__
145 /* The scandir function implemented in glibc has a bug that makes it
146 erroneously fail with ENOMEM under certain circumstances.
147 As a workaround we can retry the scandir call with the same arguments.
148 GLIBC BZ: https://sourceware.org/bugzilla/show_bug.cgi?id=17804 */
149 if (errno == ENOMEM)
150 entries = scandir(full_path, &namelist, filter_dot, (void*)alphasort);
151#endif
152 if (entries < 0) {
153 error_errno("scandir");
154 return EXT4_ALLOCATE_FAILED;
155 }
Colin Crossc18120d2012-11-20 19:41:42 -0800156 }
157 }
158
159 if (dir_inode == 0) {
160 /* root directory, check if lost+found already exists */
161 for (i = 0; i < entries; i++)
162 if (strcmp(namelist[i]->d_name, "lost+found") == 0)
163 break;
164 if (i == entries)
165 needs_lost_and_found = true;
Colin Crossec0a2e82010-06-11 14:21:37 -0700166 }
167
168 dentries = calloc(entries, sizeof(struct dentry));
169 if (dentries == NULL)
170 critical_error_errno("malloc");
171
172 for (i = 0; i < entries; i++) {
173 dentries[i].filename = strdup(namelist[i]->d_name);
174 if (dentries[i].filename == NULL)
175 critical_error_errno("strdup");
176
Colin Crossa4460142012-12-20 01:00:33 -0800177 asprintf(&dentries[i].path, "%s%s", dir_path, namelist[i]->d_name);
178 asprintf(&dentries[i].full_path, "%s%s", full_path, namelist[i]->d_name);
Colin Crossec0a2e82010-06-11 14:21:37 -0700179
180 free(namelist[i]);
181
182 ret = lstat(dentries[i].full_path, &stat);
183 if (ret < 0) {
184 error_errno("lstat");
185 i--;
186 entries--;
187 continue;
188 }
189
190 dentries[i].size = stat.st_size;
191 dentries[i].mode = stat.st_mode & (S_ISUID|S_ISGID|S_ISVTX|S_IRWXU|S_IRWXG|S_IRWXO);
Doug Zongker95266802013-12-05 15:51:28 -0800192 if (fixed_time == -1) {
193 dentries[i].mtime = stat.st_mtime;
194 } else {
195 dentries[i].mtime = fixed_time;
196 }
Nick Kralevich4df62f32013-02-07 14:21:34 -0800197 uint64_t capabilities;
Kenny Root68e3dfd2012-03-29 14:43:22 -0700198 if (fs_config_func != NULL) {
Colin Crossec0a2e82010-06-11 14:21:37 -0700199#ifdef ANDROID
200 unsigned int mode = 0;
201 unsigned int uid = 0;
202 unsigned int gid = 0;
203 int dir = S_ISDIR(stat.st_mode);
Thierry Strudelb89e81d2015-07-09 16:31:39 -0700204 fs_config_func(dentries[i].path, dir, target_out_path, &uid, &gid, &mode, &capabilities);
Colin Crossec0a2e82010-06-11 14:21:37 -0700205 dentries[i].mode = mode;
206 dentries[i].uid = uid;
207 dentries[i].gid = gid;
Nick Kralevich4df62f32013-02-07 14:21:34 -0800208 dentries[i].capabilities = capabilities;
Colin Crossec0a2e82010-06-11 14:21:37 -0700209#else
210 error("can't set android permissions - built without android support");
211#endif
212 }
Kenny Root723f1c72012-10-10 11:13:13 -0700213#ifndef USE_MINGW
Stephen Smalleyb4eca4b2012-01-13 09:00:56 -0500214 if (sehnd) {
Colin Crossa4460142012-12-20 01:00:33 -0800215 if (selabel_lookup(sehnd, &dentries[i].secon, dentries[i].path, stat.st_mode) < 0) {
216 error("cannot lookup security context for %s", dentries[i].path);
Stephen Smalleyb4eca4b2012-01-13 09:00:56 -0500217 }
William Roberts20573702013-01-17 13:24:27 -0800218
219 if (dentries[i].secon && verbose)
Colin Crossa4460142012-12-20 01:00:33 -0800220 printf("Labeling %s as %s\n", dentries[i].path, dentries[i].secon);
Stephen Smalleyb4eca4b2012-01-13 09:00:56 -0500221 }
222#endif
Colin Crossec0a2e82010-06-11 14:21:37 -0700223
224 if (S_ISREG(stat.st_mode)) {
225 dentries[i].file_type = EXT4_FT_REG_FILE;
226 } else if (S_ISDIR(stat.st_mode)) {
227 dentries[i].file_type = EXT4_FT_DIR;
228 dirs++;
229 } else if (S_ISCHR(stat.st_mode)) {
230 dentries[i].file_type = EXT4_FT_CHRDEV;
231 } else if (S_ISBLK(stat.st_mode)) {
232 dentries[i].file_type = EXT4_FT_BLKDEV;
233 } else if (S_ISFIFO(stat.st_mode)) {
234 dentries[i].file_type = EXT4_FT_FIFO;
235 } else if (S_ISSOCK(stat.st_mode)) {
236 dentries[i].file_type = EXT4_FT_SOCK;
237 } else if (S_ISLNK(stat.st_mode)) {
238 dentries[i].file_type = EXT4_FT_SYMLINK;
239 dentries[i].link = calloc(info.block_size, 1);
240 readlink(dentries[i].full_path, dentries[i].link, info.block_size - 1);
241 } else {
242 error("unknown file type on %s", dentries[i].path);
243 i--;
244 entries--;
245 }
246 }
247 free(namelist);
248
Colin Crossc18120d2012-11-20 19:41:42 -0800249 if (needs_lost_and_found) {
250 /* insert a lost+found directory at the beginning of the dentries */
251 struct dentry *tmp = calloc(entries + 1, sizeof(struct dentry));
252 memset(tmp, 0, sizeof(struct dentry));
253 memcpy(tmp + 1, dentries, entries * sizeof(struct dentry));
254 dentries = tmp;
255
256 dentries[0].filename = strdup("lost+found");
Colin Crossa4460142012-12-20 01:00:33 -0800257 asprintf(&dentries[0].path, "%slost+found", dir_path);
Colin Crossc18120d2012-11-20 19:41:42 -0800258 dentries[0].full_path = NULL;
259 dentries[0].size = 0;
260 dentries[0].mode = S_IRWXU;
261 dentries[0].file_type = EXT4_FT_DIR;
262 dentries[0].uid = 0;
263 dentries[0].gid = 0;
Colin Crossa532ecf2012-11-26 16:32:16 -0800264 if (sehnd) {
Colin Crossa4460142012-12-20 01:00:33 -0800265 if (selabel_lookup(sehnd, &dentries[0].secon, dentries[0].path, dentries[0].mode) < 0)
Colin Crossa532ecf2012-11-26 16:32:16 -0800266 error("cannot lookup security context for %s", dentries[0].path);
Colin Crossa532ecf2012-11-26 16:32:16 -0800267 }
Colin Crossc18120d2012-11-20 19:41:42 -0800268 entries++;
269 dirs++;
270 }
271
Colin Crossec0a2e82010-06-11 14:21:37 -0700272 inode = make_directory(dir_inode, entries, dentries, dirs);
273
274 for (i = 0; i < entries; i++) {
275 if (dentries[i].file_type == EXT4_FT_REG_FILE) {
276 entry_inode = make_file(dentries[i].full_path, dentries[i].size);
277 } else if (dentries[i].file_type == EXT4_FT_DIR) {
Colin Crossa4460142012-12-20 01:00:33 -0800278 char *subdir_full_path = NULL;
279 char *subdir_dir_path;
280 if (dentries[i].full_path) {
281 ret = asprintf(&subdir_full_path, "%s/", dentries[i].full_path);
282 if (ret < 0)
283 critical_error_errno("asprintf");
284 }
285 ret = asprintf(&subdir_dir_path, "%s/", dentries[i].path);
286 if (ret < 0)
287 critical_error_errno("asprintf");
Thierry Strudelb89e81d2015-07-09 16:31:39 -0700288 entry_inode = build_directory_structure(subdir_full_path, subdir_dir_path, target_out_path,
289 inode, fs_config_func, sehnd, verbose, fixed_time);
Colin Crossa4460142012-12-20 01:00:33 -0800290 free(subdir_full_path);
291 free(subdir_dir_path);
Colin Crossec0a2e82010-06-11 14:21:37 -0700292 } else if (dentries[i].file_type == EXT4_FT_SYMLINK) {
Nick Kralevich5446bde2013-02-19 19:05:47 -0800293 entry_inode = make_link(dentries[i].link);
Colin Crossec0a2e82010-06-11 14:21:37 -0700294 } else {
295 error("unknown file type on %s", dentries[i].path);
296 entry_inode = 0;
297 }
298 *dentries[i].inode = entry_inode;
299
300 ret = inode_set_permissions(entry_inode, dentries[i].mode,
Colin Crossde61f982010-08-04 15:06:09 -0700301 dentries[i].uid, dentries[i].gid,
302 dentries[i].mtime);
Colin Crossec0a2e82010-06-11 14:21:37 -0700303 if (ret)
304 error("failed to set permissions on %s\n", dentries[i].path);
Nick Kralevich4df62f32013-02-07 14:21:34 -0800305
306 /*
307 * It's important to call inode_set_selinux() before
308 * inode_set_capabilities(). Extended attributes need to
309 * be stored sorted order, and we guarantee this by making
310 * the calls in the proper order.
311 * Please see xattr_assert_sane() in contents.c
312 */
Stephen Smalleyb4eca4b2012-01-13 09:00:56 -0500313 ret = inode_set_selinux(entry_inode, dentries[i].secon);
314 if (ret)
315 error("failed to set SELinux context on %s\n", dentries[i].path);
Nick Kralevich4df62f32013-02-07 14:21:34 -0800316 ret = inode_set_capabilities(entry_inode, dentries[i].capabilities);
317 if (ret)
318 error("failed to set capability on %s\n", dentries[i].path);
Colin Crossec0a2e82010-06-11 14:21:37 -0700319
320 free(dentries[i].path);
321 free(dentries[i].full_path);
322 free(dentries[i].link);
323 free((void *)dentries[i].filename);
Stephen Smalleyb4eca4b2012-01-13 09:00:56 -0500324 free(dentries[i].secon);
Colin Crossec0a2e82010-06-11 14:21:37 -0700325 }
326
327 free(dentries);
328 return inode;
329}
Raphael Moll4605b3f2012-02-03 23:02:33 -0800330#endif
Colin Crossec0a2e82010-06-11 14:21:37 -0700331
332static u32 compute_block_size()
333{
334 return 4096;
335}
336
Colin Crosse4b5ae82010-08-03 14:10:07 -0700337static u32 compute_journal_blocks()
338{
339 u32 journal_blocks = DIV_ROUND_UP(info.len, info.block_size) / 64;
340 if (journal_blocks < 1024)
341 journal_blocks = 1024;
342 if (journal_blocks > 32768)
343 journal_blocks = 32768;
344 return journal_blocks;
345}
346
Colin Crossec0a2e82010-06-11 14:21:37 -0700347static u32 compute_blocks_per_group()
348{
349 return info.block_size * 8;
350}
351
352static u32 compute_inodes()
353{
354 return DIV_ROUND_UP(info.len, info.block_size) / 4;
355}
356
357static u32 compute_inodes_per_group()
358{
359 u32 blocks = DIV_ROUND_UP(info.len, info.block_size);
360 u32 block_groups = DIV_ROUND_UP(blocks, info.blocks_per_group);
Colin Cross96cc54a2011-04-29 16:45:48 -0700361 u32 inodes = DIV_ROUND_UP(info.inodes, block_groups);
Paul Lawrence40ce87a2014-03-03 10:51:58 -0800362 inodes = EXT4_ALIGN(inodes, (info.block_size / info.inode_size));
Ken Sumrall107a9f12011-06-29 20:28:30 -0700363
364 /* After properly rounding up the number of inodes/group,
365 * make sure to update the total inodes field in the info struct.
366 */
367 info.inodes = inodes * block_groups;
368
369 return inodes;
Colin Crossec0a2e82010-06-11 14:21:37 -0700370}
371
Colin Cross22742ce2010-12-22 16:01:52 -0800372static u32 compute_bg_desc_reserve_blocks()
373{
374 u32 blocks = DIV_ROUND_UP(info.len, info.block_size);
375 u32 block_groups = DIV_ROUND_UP(blocks, info.blocks_per_group);
376 u32 bg_desc_blocks = DIV_ROUND_UP(block_groups * sizeof(struct ext2_group_desc),
377 info.block_size);
378
379 u32 bg_desc_reserve_blocks =
380 DIV_ROUND_UP(block_groups * 1024 * sizeof(struct ext2_group_desc),
381 info.block_size) - bg_desc_blocks;
382
383 if (bg_desc_reserve_blocks > info.block_size / sizeof(u32))
384 bg_desc_reserve_blocks = info.block_size / sizeof(u32);
385
386 return bg_desc_reserve_blocks;
387}
388
Doug Zongker263eefd2010-06-29 17:23:14 -0700389void reset_ext4fs_info() {
Doug Zongker95266802013-12-05 15:51:28 -0800390 // Reset all the global data structures used by make_ext4fs so it
391 // can be called again.
392 memset(&info, 0, sizeof(info));
393 memset(&aux_info, 0, sizeof(aux_info));
Colin Crossf0ee37f2012-04-24 17:48:43 -0700394
Colin Cross3843c142014-01-31 09:38:20 -0800395 if (ext4_sparse_file) {
396 sparse_file_destroy(ext4_sparse_file);
397 ext4_sparse_file = NULL;
Doug Zongker95266802013-12-05 15:51:28 -0800398 }
Colin Crossec0a2e82010-06-11 14:21:37 -0700399}
400
Colin Cross96529862013-01-23 15:38:57 -0800401int make_ext4fs_sparse_fd(int fd, long long len,
Doug Zongker95266802013-12-05 15:51:28 -0800402 const char *mountpoint, struct selabel_handle *sehnd)
Colin Cross03ad99c2013-01-23 15:25:29 -0800403{
404 reset_ext4fs_info();
405 info.len = len;
406
Thierry Strudelb89e81d2015-07-09 16:31:39 -0700407 return make_ext4fs_internal(fd, NULL, NULL, mountpoint, NULL, 0, 1, 0, 0, 0, sehnd, 0, -1, NULL);
Colin Cross03ad99c2013-01-23 15:25:29 -0800408}
409
Colin Cross96529862013-01-23 15:38:57 -0800410int make_ext4fs(const char *filename, long long len,
Doug Zongker95266802013-12-05 15:51:28 -0800411 const char *mountpoint, struct selabel_handle *sehnd)
Ken Sumrall983fb192011-01-19 17:15:42 -0800412{
Anatol Pomazau0349bd92012-01-11 15:12:27 -0800413 int fd;
414 int status;
415
416 reset_ext4fs_info();
417 info.len = len;
418
419 fd = open(filename, O_WRONLY | O_CREAT | O_TRUNC | O_BINARY, 0644);
420 if (fd < 0) {
421 error_errno("open");
422 return EXIT_FAILURE;
423 }
424
Thierry Strudelb89e81d2015-07-09 16:31:39 -0700425 status = make_ext4fs_internal(fd, NULL, NULL, mountpoint, NULL, 0, 0, 0, 1, 0, sehnd, 0, -1, NULL);
Anatol Pomazau0349bd92012-01-11 15:12:27 -0800426 close(fd);
427
428 return status;
Ken Sumrall983fb192011-01-19 17:15:42 -0800429}
430
Colin Cross5b89a4a2012-12-21 11:17:58 -0800431/* return a newly-malloc'd string that is a copy of str. The new string
432 is guaranteed to have a trailing slash. If absolute is true, the new string
433 is also guaranteed to have a leading slash.
434*/
435static char *canonicalize_slashes(const char *str, bool absolute)
436{
437 char *ret;
438 int len = strlen(str);
439 int newlen = len;
440 char *ptr;
441
Benoit Fradin7b4448d2013-08-28 14:44:32 +0200442 if (len == 0) {
443 if (absolute)
444 return strdup("/");
445 else
446 return strdup("");
Colin Cross5b89a4a2012-12-21 11:17:58 -0800447 }
448
449 if (str[0] != '/' && absolute) {
450 newlen++;
451 }
452 if (str[len - 1] != '/') {
453 newlen++;
454 }
455 ret = malloc(newlen + 1);
456 if (!ret) {
457 critical_error("malloc");
458 }
459
460 ptr = ret;
461 if (str[0] != '/' && absolute) {
462 *ptr++ = '/';
463 }
464
465 strcpy(ptr, str);
466 ptr += len;
467
468 if (str[len - 1] != '/') {
469 *ptr++ = '/';
470 }
471
472 if (ptr != ret + newlen) {
473 critical_error("assertion failed\n");
474 }
475
476 *ptr = '\0';
477
478 return ret;
479}
480
481static char *canonicalize_abs_slashes(const char *str)
482{
483 return canonicalize_slashes(str, true);
484}
485
486static char *canonicalize_rel_slashes(const char *str)
487{
488 return canonicalize_slashes(str, false);
489}
490
Thierry Strudelb89e81d2015-07-09 16:31:39 -0700491int make_ext4fs_internal(int fd, const char *_directory, const char *_target_out_directory,
Doug Zongker95266802013-12-05 15:51:28 -0800492 const char *_mountpoint, fs_config_func_t fs_config_func, int gzip,
Jeff Sharkey7538cc92015-04-06 22:29:04 -0700493 int sparse, int crc, int wipe, int real_uuid,
Doug Zongkerbec598e2014-08-12 11:35:37 -0700494 struct selabel_handle *sehnd, int verbose, time_t fixed_time,
495 FILE* block_list_file)
Colin Crossec0a2e82010-06-11 14:21:37 -0700496{
Anatol Pomazau0349bd92012-01-11 15:12:27 -0800497 u32 root_inode_num;
498 u16 root_mode;
Colin Crossa4460142012-12-20 01:00:33 -0800499 char *mountpoint;
500 char *directory = NULL;
Thierry Strudelb89e81d2015-07-09 16:31:39 -0700501 char *target_out_directory = NULL;
Colin Crossec0a2e82010-06-11 14:21:37 -0700502
Ken Sumrall2ae76632011-03-23 22:08:53 -0700503 if (setjmp(setjmp_env))
504 return EXIT_FAILURE; /* Handle a call to longjmp() */
505
Colin Crossa4460142012-12-20 01:00:33 -0800506 if (_mountpoint == NULL) {
507 mountpoint = strdup("");
Colin Crossa4460142012-12-20 01:00:33 -0800508 } else {
Colin Cross5b89a4a2012-12-21 11:17:58 -0800509 mountpoint = canonicalize_abs_slashes(_mountpoint);
Colin Crossa4460142012-12-20 01:00:33 -0800510 }
511
512 if (_directory) {
Colin Cross5b89a4a2012-12-21 11:17:58 -0800513 directory = canonicalize_rel_slashes(_directory);
Colin Crossa4460142012-12-20 01:00:33 -0800514 }
515
Thierry Strudelb89e81d2015-07-09 16:31:39 -0700516 if (_target_out_directory) {
517 target_out_directory = canonicalize_rel_slashes(_target_out_directory);
518 }
519
Ken Sumrall435a8b62011-01-14 18:33:06 -0800520 if (info.len <= 0)
Anatol Pomazau0349bd92012-01-11 15:12:27 -0800521 info.len = get_file_size(fd);
Colin Crossec0a2e82010-06-11 14:21:37 -0700522
523 if (info.len <= 0) {
524 fprintf(stderr, "Need size of filesystem\n");
Anatol Pomazau0349bd92012-01-11 15:12:27 -0800525 return EXIT_FAILURE;
Colin Crossec0a2e82010-06-11 14:21:37 -0700526 }
527
Colin Crossec0a2e82010-06-11 14:21:37 -0700528 if (info.block_size <= 0)
529 info.block_size = compute_block_size();
530
Ken Sumrall88833a62011-07-13 17:27:07 -0700531 /* Round down the filesystem length to be a multiple of the block size */
532 info.len &= ~((u64)info.block_size - 1);
533
Colin Crosse4b5ae82010-08-03 14:10:07 -0700534 if (info.journal_blocks == 0)
535 info.journal_blocks = compute_journal_blocks();
536
537 if (info.no_journal == 0)
538 info.feat_compat = EXT4_FEATURE_COMPAT_HAS_JOURNAL;
539 else
540 info.journal_blocks = 0;
541
Colin Crossec0a2e82010-06-11 14:21:37 -0700542 if (info.blocks_per_group <= 0)
543 info.blocks_per_group = compute_blocks_per_group();
544
545 if (info.inodes <= 0)
546 info.inodes = compute_inodes();
547
548 if (info.inode_size <= 0)
549 info.inode_size = 256;
550
551 if (info.label == NULL)
552 info.label = "";
553
554 info.inodes_per_group = compute_inodes_per_group();
555
556 info.feat_compat |=
Nick Kralevich4df62f32013-02-07 14:21:34 -0800557 EXT4_FEATURE_COMPAT_RESIZE_INODE |
558 EXT4_FEATURE_COMPAT_EXT_ATTR;
Colin Crossec0a2e82010-06-11 14:21:37 -0700559
560 info.feat_ro_compat |=
561 EXT4_FEATURE_RO_COMPAT_SPARSE_SUPER |
Colin Cross56497f22013-02-04 00:44:55 -0800562 EXT4_FEATURE_RO_COMPAT_LARGE_FILE |
563 EXT4_FEATURE_RO_COMPAT_GDT_CSUM;
Colin Crossec0a2e82010-06-11 14:21:37 -0700564
565 info.feat_incompat |=
566 EXT4_FEATURE_INCOMPAT_EXTENTS |
567 EXT4_FEATURE_INCOMPAT_FILETYPE;
568
569
Colin Cross22742ce2010-12-22 16:01:52 -0800570 info.bg_desc_reserve_blocks = compute_bg_desc_reserve_blocks();
571
Colin Crossec0a2e82010-06-11 14:21:37 -0700572 printf("Creating filesystem with parameters:\n");
Colin Crossaf072342014-01-23 13:19:27 -0800573 printf(" Size: %"PRIu64"\n", info.len);
Colin Crossec0a2e82010-06-11 14:21:37 -0700574 printf(" Block size: %d\n", info.block_size);
575 printf(" Blocks per group: %d\n", info.blocks_per_group);
576 printf(" Inodes per group: %d\n", info.inodes_per_group);
577 printf(" Inode size: %d\n", info.inode_size);
Colin Crosse4b5ae82010-08-03 14:10:07 -0700578 printf(" Journal blocks: %d\n", info.journal_blocks);
Colin Crossec0a2e82010-06-11 14:21:37 -0700579 printf(" Label: %s\n", info.label);
580
581 ext4_create_fs_aux_info();
582
Colin Crossaf072342014-01-23 13:19:27 -0800583 printf(" Blocks: %"PRIu64"\n", aux_info.len_blocks);
Colin Crossec0a2e82010-06-11 14:21:37 -0700584 printf(" Block groups: %d\n", aux_info.groups);
Colin Cross22742ce2010-12-22 16:01:52 -0800585 printf(" Reserved block group size: %d\n", info.bg_desc_reserve_blocks);
Colin Crossec0a2e82010-06-11 14:21:37 -0700586
Colin Cross782879a2014-01-23 13:08:16 -0800587 ext4_sparse_file = sparse_file_new(info.block_size, info.len);
Colin Crossf0ee37f2012-04-24 17:48:43 -0700588
Colin Crossec0a2e82010-06-11 14:21:37 -0700589 block_allocator_init();
590
Jeff Sharkey7538cc92015-04-06 22:29:04 -0700591 ext4_fill_in_sb(real_uuid);
Colin Crossec0a2e82010-06-11 14:21:37 -0700592
593 if (reserve_inodes(0, 10) == EXT4_ALLOCATE_FAILED)
594 error("failed to reserve first 10 inodes");
595
596 if (info.feat_compat & EXT4_FEATURE_COMPAT_HAS_JOURNAL)
597 ext4_create_journal_inode();
598
599 if (info.feat_compat & EXT4_FEATURE_COMPAT_RESIZE_INODE)
600 ext4_create_resize_inode();
601
Raphael Moll4605b3f2012-02-03 23:02:33 -0800602#ifdef USE_MINGW
603 // Windows needs only 'create an empty fs image' functionality
604 assert(!directory);
Stephen Smalley7907ac72014-04-25 14:57:55 -0400605 root_inode_num = build_default_directory_structure(mountpoint, sehnd);
Raphael Moll4605b3f2012-02-03 23:02:33 -0800606#else
Colin Crossec0a2e82010-06-11 14:21:37 -0700607 if (directory)
Thierry Strudelb89e81d2015-07-09 16:31:39 -0700608 root_inode_num = build_directory_structure(directory, mountpoint, target_out_directory, 0,
Doug Zongkerbec598e2014-08-12 11:35:37 -0700609 fs_config_func, sehnd, verbose, fixed_time);
Colin Crossec0a2e82010-06-11 14:21:37 -0700610 else
Stephen Smalley7907ac72014-04-25 14:57:55 -0400611 root_inode_num = build_default_directory_structure(mountpoint, sehnd);
Raphael Moll4605b3f2012-02-03 23:02:33 -0800612#endif
Doug Zongker263eefd2010-06-29 17:23:14 -0700613
Colin Crossec0a2e82010-06-11 14:21:37 -0700614 root_mode = S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH;
Colin Crossde61f982010-08-04 15:06:09 -0700615 inode_set_permissions(root_inode_num, root_mode, 0, 0, 0);
Colin Crossec0a2e82010-06-11 14:21:37 -0700616
Kenny Root723f1c72012-10-10 11:13:13 -0700617#ifndef USE_MINGW
Stephen Smalleyb4eca4b2012-01-13 09:00:56 -0500618 if (sehnd) {
Stephen Smalleyb4eca4b2012-01-13 09:00:56 -0500619 char *secontext = NULL;
Stephen Smalley6ece7082012-02-09 14:19:24 -0500620
Colin Crossa4460142012-12-20 01:00:33 -0800621 if (selabel_lookup(sehnd, &secontext, mountpoint, S_IFDIR) < 0) {
622 error("cannot lookup security context for %s", mountpoint);
Stephen Smalleyb4eca4b2012-01-13 09:00:56 -0500623 }
Robert Craig29293132013-01-30 12:54:46 -0500624 if (secontext) {
625 if (verbose) {
626 printf("Labeling %s as %s\n", mountpoint, secontext);
627 }
Stephen Smalleyb4eca4b2012-01-13 09:00:56 -0500628 inode_set_selinux(root_inode_num, secontext);
629 }
Stephen Smalleyb4eca4b2012-01-13 09:00:56 -0500630 freecon(secontext);
631 }
632#endif
633
Colin Crossec0a2e82010-06-11 14:21:37 -0700634 ext4_update_free();
635
Colin Crossb7813302010-12-22 18:41:13 -0800636 ext4_queue_sb();
637
Doug Zongkerbec598e2014-08-12 11:35:37 -0700638 if (block_list_file) {
639 size_t dirlen = directory ? strlen(directory) : 0;
640 struct block_allocation* p = get_saved_allocation_chain();
641 while (p) {
642 if (directory && strncmp(p->filename, directory, dirlen) == 0) {
643 // substitute mountpoint for the leading directory in the filename, in the output file
644 fprintf(block_list_file, "%s%s", mountpoint, p->filename + dirlen);
645 } else {
646 fprintf(block_list_file, "%s", p->filename);
647 }
648 print_blocks(block_list_file, p);
649 struct block_allocation* pn = p->next;
650 free_alloc(p);
651 p = pn;
652 }
653 }
654
Colin Crossec0a2e82010-06-11 14:21:37 -0700655 printf("Created filesystem with %d/%d inodes and %d/%d blocks\n",
656 aux_info.sb->s_inodes_count - aux_info.sb->s_free_inodes_count,
657 aux_info.sb->s_inodes_count,
658 aux_info.sb->s_blocks_count_lo - aux_info.sb->s_free_blocks_count_lo,
659 aux_info.sb->s_blocks_count_lo);
660
David 'Digit' Turnereb5fcc32014-06-12 20:54:50 +0200661 if (wipe && WIPE_IS_SUPPORTED) {
Colin Crossdc5abee2012-04-23 23:20:48 -0700662 wipe_block_device(fd, info.len);
David 'Digit' Turnereb5fcc32014-06-12 20:54:50 +0200663 }
Colin Crossdc5abee2012-04-23 23:20:48 -0700664
665 write_ext4_image(fd, gzip, sparse, crc);
Colin Crossec0a2e82010-06-11 14:21:37 -0700666
Colin Cross782879a2014-01-23 13:08:16 -0800667 sparse_file_destroy(ext4_sparse_file);
668 ext4_sparse_file = NULL;
Colin Crossf0ee37f2012-04-24 17:48:43 -0700669
Colin Crossa4460142012-12-20 01:00:33 -0800670 free(mountpoint);
671 free(directory);
672
Colin Crossec0a2e82010-06-11 14:21:37 -0700673 return 0;
674}