Minor fixes (this is now v1.0.0 by the way)
[wimlib] / src / ntfs-capture.c
1 /*
2  * ntfs-capture.c
3  *
4  * Capture a WIM image from a NTFS volume.  We capture everything we can,
5  * including security data and alternate data streams.
6  */
7
8 /*
9  * Copyright (C) 2012 Eric Biggers
10  *
11  * This file is part of wimlib, a library for working with WIM files.
12  *
13  * wimlib is free software; you can redistribute it and/or modify it under the
14  * terms of the GNU General Public License as published by the Free
15  * Software Foundation; either version 3 of the License, or (at your option)
16  * any later version.
17  *
18  * wimlib is distributed in the hope that it will be useful, but WITHOUT ANY
19  * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
20  * A PARTICULAR PURPOSE. See the GNU General Public License for more
21  * details.
22  *
23  * You should have received a copy of the GNU General Public License
24  * along with wimlib; if not, see http://www.gnu.org/licenses/.
25  */
26
27 #include "config.h"
28 #include "wimlib_internal.h"
29
30
31 #ifdef WITH_NTFS_3G
32 #include "dentry.h"
33 #include "lookup_table.h"
34 #include "io.h"
35 #include <ntfs-3g/layout.h>
36 #include <ntfs-3g/acls.h>
37 #include <ntfs-3g/attrib.h>
38 #include <ntfs-3g/misc.h>
39 #include <ntfs-3g/reparse.h>
40 #include <ntfs-3g/security.h> /* security.h before xattrs.h */
41 #include <ntfs-3g/xattrs.h>
42 #include <ntfs-3g/volume.h>
43 #include <stdlib.h>
44 #include <unistd.h>
45 #include <errno.h>
46
47 #if 0
48 extern int ntfs_get_inode_security(ntfs_inode *ni, u32 selection, char *buf,
49                                    u32 buflen, u32 *psize);
50
51 extern u32 ntfs_get_inode_attributes(ntfs_inode *ni);
52 #endif
53
54 /* Structure that allows searching the security descriptors by SHA1 message
55  * digest. */
56 struct sd_set {
57         struct wim_security_data *sd;
58         struct sd_node *root;
59 };
60
61 /* Binary tree node of security descriptors, indexed by the @hash field. */
62 struct sd_node {
63         int security_id;
64         u8 hash[SHA1_HASH_SIZE];
65         struct sd_node *left;
66         struct sd_node *right;
67 };
68
69 static void free_sd_tree(struct sd_node *root)
70 {
71         if (root) {
72                 free_sd_tree(root->left);
73                 free_sd_tree(root->right);
74                 FREE(root);
75         }
76 }
77 /* Frees a security descriptor index set. */
78 static void destroy_sd_set(struct sd_set *sd_set)
79 {
80         free_sd_tree(sd_set->root);
81 }
82
83 /* Inserts a a new node into the security descriptor index tree. */
84 static void insert_sd_node(struct sd_node *new, struct sd_node *root)
85 {
86         int cmp = hashes_cmp(new->hash, root->hash);
87         if (cmp < 0) {
88                 if (root->left)
89                         insert_sd_node(new, root->left);
90                 else 
91                         root->left = new;
92         } else if (cmp > 0) {
93                 if (root->right)
94                         insert_sd_node(new, root->right);
95                 else 
96                         root->right = new;
97         } else {
98                 wimlib_assert(0);
99         }
100 }
101
102 /* Returns the security ID of the security data having a SHA1 message digest of
103  * @hash in the security descriptor index tree rooted at @root. 
104  *
105  * If not found, return -1. */
106 static int lookup_sd(const u8 hash[SHA1_HASH_SIZE], struct sd_node *root)
107 {
108         int cmp;
109         if (!root)
110                 return -1;
111         cmp = hashes_cmp(hash, root->hash);
112         if (cmp < 0)
113                 return lookup_sd(hash, root->left);
114         else if (cmp > 0)
115                 return lookup_sd(hash, root->right);
116         else
117                 return root->security_id;
118 }
119
120 /*
121  * Adds a security descriptor to the indexed security descriptor set as well as
122  * the corresponding `struct wim_security_data', and returns the new security
123  * ID; or, if there is an existing security descriptor that is the same, return
124  * the security ID for it.  If a new security descriptor cannot be allocated,
125  * return -1.
126  */
127 static int sd_set_add_sd(struct sd_set *sd_set, const char descriptor[],
128                          size_t size)
129 {
130         u8 hash[SHA1_HASH_SIZE];
131         int security_id;
132         struct sd_node *new;
133         u8 **descriptors;
134         u64 *sizes;
135         u8 *descr_copy;
136         struct wim_security_data *sd;
137
138         sha1_buffer((const u8*)descriptor, size, hash);
139
140         security_id = lookup_sd(hash, sd_set->root);
141         if (security_id >= 0)
142                 return security_id;
143
144         new = MALLOC(sizeof(*new));
145         if (!new)
146                 goto out;
147         descr_copy = MALLOC(size);
148         if (!descr_copy)
149                 goto out_free_node;
150
151         sd = sd_set->sd;
152
153         memcpy(descr_copy, descriptor, size);
154         new->security_id = sd->num_entries;
155         new->left = NULL;
156         new->right = NULL;
157         copy_hash(new->hash, hash);
158
159
160         descriptors = REALLOC(sd->descriptors,
161                               (sd->num_entries + 1) * sizeof(sd->descriptors[0]));
162         if (!descriptors)
163                 goto out_free_descr;
164         sd->descriptors = descriptors;
165         sizes = REALLOC(sd->sizes,
166                         (sd->num_entries + 1) * sizeof(sd->sizes[0]));
167         if (!sizes)
168                 goto out_free_descr;
169         sd->sizes = sizes;
170         sd->descriptors[sd->num_entries] = descr_copy;
171         sd->sizes[sd->num_entries] = size;
172         sd->num_entries++;
173         DEBUG("There are now %d security descriptors", sd->num_entries);
174         sd->total_length += size + sizeof(sd->sizes[0]);
175
176         if (sd_set->root)
177                 insert_sd_node(new, sd_set->root);
178         else
179                 sd_set->root = new;
180         return new->security_id;
181 out_free_descr:
182         FREE(descr_copy);
183 out_free_node:
184         FREE(new);
185 out:
186         return -1;
187 }
188
189 static inline ntfschar *attr_record_name(ATTR_RECORD *ar)
190 {
191         return (ntfschar*)((u8*)ar + le16_to_cpu(ar->name_offset));
192 }
193
194 /* Calculates the SHA1 message digest of a NTFS attribute. 
195  *
196  * @ni:  The NTFS inode containing the attribute.
197  * @ar:  The ATTR_RECORD describing the attribute.
198  * @md:  If successful, the returned SHA1 message digest.
199  * @reparse_tag_ret:    Optional pointer into which the first 4 bytes of the
200  *                              attribute will be written (to get the reparse
201  *                              point ID)
202  *
203  * Return 0 on success or nonzero on error.
204  */
205 static int ntfs_attr_sha1sum(ntfs_inode *ni, ATTR_RECORD *ar,
206                              u8 md[SHA1_HASH_SIZE],
207                              u32 *reparse_tag_ret)
208 {
209         s64 pos = 0;
210         s64 bytes_remaining;
211         char buf[4096];
212         ntfs_attr *na;
213         SHA_CTX ctx;
214
215         na = ntfs_attr_open(ni, ar->type, attr_record_name(ar),
216                             ar->name_length);
217         if (!na) {
218                 ERROR_WITH_ERRNO("Failed to open NTFS attribute");
219                 return WIMLIB_ERR_NTFS_3G;
220         }
221
222         bytes_remaining = na->data_size;
223         sha1_init(&ctx);
224
225         DEBUG2("Calculating SHA1 message digest (%"PRIu64" bytes)",
226                bytes_remaining);
227
228         while (bytes_remaining) {
229                 s64 to_read = min(bytes_remaining, sizeof(buf));
230                 if (ntfs_attr_pread(na, pos, to_read, buf) != to_read) {
231                         ERROR_WITH_ERRNO("Error reading NTFS attribute");
232                         return WIMLIB_ERR_NTFS_3G;
233                 }
234                 if (bytes_remaining == na->data_size && reparse_tag_ret)
235                         *reparse_tag_ret = le32_to_cpu(*(u32*)buf);
236                 sha1_update(&ctx, buf, to_read);
237                 pos += to_read;
238                 bytes_remaining -= to_read;
239         }
240         sha1_final(md, &ctx);
241         ntfs_attr_close(na);
242         return 0;
243 }
244
245 /* Load the streams from a WIM file or reparse point in the NTFS volume into the
246  * WIM lookup table */
247 static int capture_ntfs_streams(struct dentry *dentry, ntfs_inode *ni,
248                                 char path[], size_t path_len,
249                                 struct lookup_table *lookup_table,
250                                 ntfs_volume **ntfs_vol_p,
251                                 ATTR_TYPES type)
252 {
253
254         ntfs_attr_search_ctx *actx;
255         u8 attr_hash[SHA1_HASH_SIZE];
256         struct ntfs_location *ntfs_loc = NULL;
257         int ret = 0;
258         struct lookup_table_entry *lte;
259
260         DEBUG2("Capturing NTFS data streams from `%s'", path);
261
262         /* Get context to search the streams of the NTFS file. */
263         actx = ntfs_attr_get_search_ctx(ni, NULL);
264         if (!actx) {
265                 ERROR_WITH_ERRNO("Cannot get NTFS attribute search "
266                                  "context");
267                 return WIMLIB_ERR_NTFS_3G;
268         }
269
270         /* Capture each data stream or reparse data stream. */
271         while (!ntfs_attr_lookup(type, NULL, 0,
272                                  CASE_SENSITIVE, 0, NULL, 0, actx))
273         {
274                 char *stream_name_utf8;
275                 size_t stream_name_utf16_len;
276                 u32 reparse_tag;
277                 u64 data_size = ntfs_get_attribute_value_length(actx->attr);
278                 u64 name_length = actx->attr->name_length;
279
280                 if (data_size == 0) { 
281                         if (errno != 0) {
282                                 ERROR_WITH_ERRNO("Failed to get size of attribute of "
283                                                  "`%s'", path);
284                                 ret = WIMLIB_ERR_NTFS_3G;
285                                 goto out_put_actx;
286                         }
287                         /* Empty stream.  No lookup table entry is needed. */
288                         lte = NULL;
289                 } else {
290                         if (type == AT_REPARSE_POINT && data_size < 8) {
291                                 ERROR("`%s': reparse point buffer too small",
292                                       path);
293                                 ret = WIMLIB_ERR_NTFS_3G;
294                                 goto out_put_actx;
295                         }
296                         /* Checksum the stream. */
297                         ret = ntfs_attr_sha1sum(ni, actx->attr, attr_hash, &reparse_tag);
298                         if (ret != 0)
299                                 goto out_put_actx;
300
301                         /* Make a lookup table entry for the stream, or use an existing
302                          * one if there's already an identical stream. */
303                         lte = __lookup_resource(lookup_table, attr_hash);
304                         ret = WIMLIB_ERR_NOMEM;
305                         if (lte) {
306                                 lte->refcnt++;
307                         } else {
308                                 ntfs_loc = CALLOC(1, sizeof(*ntfs_loc));
309                                 if (!ntfs_loc)
310                                         goto out_put_actx;
311                                 ntfs_loc->ntfs_vol_p = ntfs_vol_p;
312                                 ntfs_loc->path_utf8 = MALLOC(path_len + 1);
313                                 if (!ntfs_loc->path_utf8)
314                                         goto out_free_ntfs_loc;
315                                 memcpy(ntfs_loc->path_utf8, path, path_len + 1);
316                                 if (name_length) {
317                                         ntfs_loc->stream_name_utf16 = MALLOC(name_length * 2);
318                                         if (!ntfs_loc->stream_name_utf16)
319                                                 goto out_free_ntfs_loc;
320                                         memcpy(ntfs_loc->stream_name_utf16,
321                                                attr_record_name(actx->attr),
322                                                actx->attr->name_length * 2);
323                                         ntfs_loc->stream_name_utf16_num_chars = name_length;
324                                 }
325
326                                 lte = new_lookup_table_entry();
327                                 if (!lte)
328                                         goto out_free_ntfs_loc;
329                                 lte->ntfs_loc = ntfs_loc;
330                                 lte->resource_location = RESOURCE_IN_NTFS_VOLUME;
331                                 if (type == AT_REPARSE_POINT) {
332                                         dentry->reparse_tag = reparse_tag;
333                                         ntfs_loc->is_reparse_point = true;
334                                         lte->resource_entry.original_size = data_size - 8;
335                                         lte->resource_entry.size = data_size - 8;
336                                 } else {
337                                         ntfs_loc->is_reparse_point = false;
338                                         lte->resource_entry.original_size = data_size;
339                                         lte->resource_entry.size = data_size;
340                                 }
341                                 ntfs_loc = NULL;
342                                 DEBUG("Add resource for `%s' (size = %zu)",
343                                       dentry->file_name_utf8,
344                                       lte->resource_entry.original_size);
345                                 copy_hash(lte->hash, attr_hash);
346                                 lookup_table_insert(lookup_table, lte);
347                         }
348                 }
349                 if (name_length == 0) {
350                         /* Unnamed data stream.  Put the reference to it in the
351                          * dentry. */
352                         if (dentry->lte) {
353                                 ERROR("Found two un-named data streams for "
354                                       "`%s'", path);
355                                 ret = WIMLIB_ERR_NTFS_3G;
356                                 goto out_free_lte;
357                         }
358                         dentry->lte = lte;
359                 } else {
360                         /* Named data stream.  Put the reference to it in the
361                          * alternate data stream entries */
362                         struct ads_entry *new_ads_entry;
363                         size_t stream_name_utf8_len;
364                         stream_name_utf8 = utf16_to_utf8((const char*)attr_record_name(actx->attr),
365                                                          name_length * 2,
366                                                          &stream_name_utf8_len);
367                         if (!stream_name_utf8)
368                                 goto out_free_lte;
369                         new_ads_entry = dentry_add_ads(dentry, stream_name_utf8);
370                         FREE(stream_name_utf8);
371                         if (!new_ads_entry)
372                                 goto out_free_lte;
373
374                         wimlib_assert(new_ads_entry->stream_name_len == name_length * 2);
375                                 
376                         new_ads_entry->lte = lte;
377                 }
378         }
379         ret = 0;
380         goto out_put_actx;
381 out_free_lte:
382         free_lookup_table_entry(lte);
383 out_free_ntfs_loc:
384         if (ntfs_loc) {
385                 FREE(ntfs_loc->path_utf8);
386                 FREE(ntfs_loc->stream_name_utf16);
387                 FREE(ntfs_loc);
388         }
389 out_put_actx:
390         ntfs_attr_put_search_ctx(actx);
391         if (ret == 0)
392                 DEBUG2("Successfully captured NTFS streams from `%s'", path);
393         else
394                 ERROR("Failed to capture NTFS streams from `%s", path);
395         return ret;
396 }
397
398 struct readdir_ctx {
399         struct dentry       *parent;
400         ntfs_inode          *dir_ni;
401         char                *path;
402         size_t               path_len;
403         struct lookup_table *lookup_table;
404         struct sd_set       *sd_set;
405         const struct capture_config *config;
406         ntfs_volume        **ntfs_vol_p;
407         int                  flags;
408 };
409
410 static int
411 build_dentry_tree_ntfs_recursive(struct dentry **root_p, ntfs_inode *dir_ni,
412                                  ntfs_inode *ni, char path[], size_t path_len,
413                                  int name_type,
414                                  struct lookup_table *lookup_table,
415                                  struct sd_set *sd_set,
416                                  const struct capture_config *config,
417                                  ntfs_volume **ntfs_vol_p,
418                                  int flags);
419
420 static int wim_ntfs_capture_filldir(void *dirent, const ntfschar *name,
421                                     const int name_len, const int name_type,
422                                     const s64 pos, const MFT_REF mref,
423                                     const unsigned dt_type)
424 {
425         struct readdir_ctx *ctx;
426         size_t utf8_name_len;
427         char *utf8_name;
428         struct dentry *child = NULL;
429         int ret;
430         size_t path_len;
431
432         if (name_type == FILE_NAME_DOS)
433                 return 0;
434
435         ret = -1;
436
437         utf8_name = utf16_to_utf8((const char*)name, name_len * 2,
438                                   &utf8_name_len);
439         if (!utf8_name)
440                 goto out;
441
442         if (utf8_name[0] == '.' &&
443              (utf8_name[1] == '\0' ||
444               (utf8_name[1] == '.' && utf8_name[2] == '\0'))) {
445                 ret = 0;
446                 goto out_free_utf8_name;
447         }
448
449         ctx = dirent;
450
451         ntfs_inode *ni = ntfs_inode_open(ctx->dir_ni->vol, mref);
452         if (!ni) {
453                 ERROR_WITH_ERRNO("Failed to open NTFS inode");
454                 ret = 1;
455         }
456         path_len = ctx->path_len;
457         if (path_len != 1)
458                 ctx->path[path_len++] = '/';
459         memcpy(ctx->path + path_len, utf8_name, utf8_name_len + 1);
460         path_len += utf8_name_len;
461         ret = build_dentry_tree_ntfs_recursive(&child, ctx->dir_ni,
462                                                ni, ctx->path, path_len, name_type,
463                                                ctx->lookup_table, ctx->sd_set,
464                                                ctx->config, ctx->ntfs_vol_p,
465                                                ctx->flags);
466
467         if (child)
468                 link_dentry(child, ctx->parent);
469
470         ntfs_inode_close(ni);
471 out_free_utf8_name:
472         FREE(utf8_name);
473 out:
474         return ret;
475 }
476
477 static int change_dentry_short_name(struct dentry *dentry,
478                                     const char short_name_utf8[],
479                                     int short_name_utf8_len)
480 {
481         size_t short_name_utf16_len;
482         char *short_name_utf16;
483         short_name_utf16 = utf8_to_utf16(short_name_utf8, short_name_utf8_len,
484                                          &short_name_utf16_len);
485         if (!short_name_utf16) {
486                 ERROR_WITH_ERRNO("Failed to convert short name to UTF-16");
487                 return WIMLIB_ERR_NOMEM;
488         }
489         dentry->short_name = short_name_utf16;
490         dentry->short_name_len = short_name_utf16_len;
491         return 0;
492 }
493
494 /*#define HAVE_NTFS_INODE_FUNCTIONS*/
495
496 /* Recursively build a WIM dentry tree corresponding to a NTFS volume.
497  * At the same time, update the WIM lookup table with lookup table entries for
498  * the NTFS streams, and build an array of security descriptors.
499  */
500 static int build_dentry_tree_ntfs_recursive(struct dentry **root_p,
501                                             ntfs_inode *dir_ni,
502                                             ntfs_inode *ni,
503                                             char path[],
504                                             size_t path_len,
505                                             int name_type,
506                                             struct lookup_table *lookup_table,
507                                             struct sd_set *sd_set,
508                                             const struct capture_config *config,
509                                             ntfs_volume **ntfs_vol_p,
510                                             int flags)
511 {
512         u32 attributes;
513         int mrec_flags;
514         u32 sd_size = 0;
515         int ret;
516         char dos_name_utf8[64];
517         struct dentry *root;
518
519         mrec_flags = ni->mrec->flags;
520 #ifdef HAVE_NTFS_INODE_FUNCTIONS
521         attributes = ntfs_get_inode_attributes(ni);
522 #else
523         struct SECURITY_CONTEXT ctx;
524         memset(&ctx, 0, sizeof(ctx));
525         ctx.vol = ni->vol;
526         ret = ntfs_xattr_system_getxattr(&ctx, XATTR_NTFS_ATTRIB,
527                                          ni, dir_ni, (char *)&attributes,
528                                          sizeof(u32));
529         if (ret != 4) {
530                 ERROR_WITH_ERRNO("Failed to get NTFS attributes from `%s'",
531                                  path);
532                 return WIMLIB_ERR_NTFS_3G;
533         }
534 #endif
535
536         if (exclude_path(path, config, false)) {
537                 if (flags & WIMLIB_ADD_IMAGE_FLAG_VERBOSE) {
538                         const char *file_type;
539                         if (attributes & MFT_RECORD_IS_DIRECTORY)
540                                 file_type = "directory";
541                         else
542                                 file_type = "file";
543                         printf("Excluding %s `%s' from capture\n",
544                                file_type, path);
545                 }
546                 *root_p = NULL;
547                 return 0;
548         }
549
550         if (flags & WIMLIB_ADD_IMAGE_FLAG_VERBOSE)
551                 printf("Scanning `%s'\n", path);
552
553         root = new_dentry(path_basename(path));
554         if (!root)
555                 return WIMLIB_ERR_NOMEM;
556         *root_p = root;
557
558         if (dir_ni && (name_type == FILE_NAME_WIN32_AND_DOS
559                        || name_type == FILE_NAME_WIN32))
560         {
561                 ret = ntfs_get_ntfs_dos_name(ni, dir_ni, dos_name_utf8,
562                                              sizeof(dos_name_utf8));
563                 if (ret > 0) {
564                         DEBUG("Changing short name of `%s'", path);
565                         ret = change_dentry_short_name(root, dos_name_utf8,
566                                                        ret);
567                         if (ret != 0)
568                                 return ret;
569                 } else {
570                         if (errno != ENODATA) {
571                                 ERROR_WITH_ERRNO("Error getting DOS name "
572                                                  "of `%s'", path);
573                                 return WIMLIB_ERR_NTFS_3G;
574                         }
575                 }
576         }
577
578         root->creation_time    = le64_to_cpu(ni->creation_time);
579         root->last_write_time  = le64_to_cpu(ni->last_data_change_time);
580         root->last_access_time = le64_to_cpu(ni->last_access_time);
581         root->attributes       = le32_to_cpu(attributes);
582         root->link_group_id    = ni->mft_no;
583         root->resolved         = true;
584
585         if (attributes & FILE_ATTR_REPARSE_POINT) {
586                 /* Junction point, symbolic link, or other reparse point */
587                 ret = capture_ntfs_streams(root, ni, path, path_len,
588                                            lookup_table, ntfs_vol_p,
589                                            AT_REPARSE_POINT);
590         } else if (mrec_flags & MFT_RECORD_IS_DIRECTORY) {
591
592                 /* Normal directory */
593                 s64 pos = 0;
594                 struct readdir_ctx ctx = {
595                         .parent       = root,
596                         .dir_ni       = ni,
597                         .path         = path,
598                         .path_len     = path_len,
599                         .lookup_table = lookup_table,
600                         .sd_set       = sd_set,
601                         .config       = config,
602                         .ntfs_vol_p   = ntfs_vol_p,
603                         .flags        = flags,
604                 };
605                 ret = ntfs_readdir(ni, &pos, &ctx, wim_ntfs_capture_filldir);
606                 if (ret != 0) {
607                         ERROR_WITH_ERRNO("ntfs_readdir()");
608                         ret = WIMLIB_ERR_NTFS_3G;
609                 }
610         } else {
611                 /* Normal file */
612                 ret = capture_ntfs_streams(root, ni, path, path_len,
613                                            lookup_table, ntfs_vol_p,
614                                            AT_DATA);
615         }
616         if (ret != 0)
617                 return ret;
618
619 #ifdef HAVE_NTFS_INODE_FUNCTIONS
620         ret = ntfs_get_inode_security(ni,
621                                       OWNER_SECURITY_INFORMATION |
622                                       GROUP_SECURITY_INFORMATION |
623                                       DACL_SECURITY_INFORMATION  |
624                                       SACL_SECURITY_INFORMATION,
625                                       NULL, 0, &sd_size);
626         char sd[sd_size];
627         ret = ntfs_get_inode_security(ni,
628                                       OWNER_SECURITY_INFORMATION |
629                                       GROUP_SECURITY_INFORMATION |
630                                       DACL_SECURITY_INFORMATION  |
631                                       SACL_SECURITY_INFORMATION,
632                                       sd, sd_size, &sd_size);
633         if (ret == 0) {
634                 ERROR_WITH_ERRNO("Failed to get security information from "
635                                  "`%s'", path);
636                 ret = WIMLIB_ERR_NTFS_3G;
637         } else {
638                 if (ret > 0) {
639                         /*print_security_descriptor(sd, sd_size);*/
640                         root->security_id = sd_set_add_sd(sd_set, sd, ret);
641                         if (root->security_id == -1) {
642                                 ERROR("Out of memory");
643                                 return WIMLIB_ERR_NOMEM;
644                         }
645                         DEBUG("Added security ID = %u for `%s'",
646                               root->security_id, path);
647                 } else { 
648                         root->security_id = -1;
649                         DEBUG("No security ID for `%s'", path);
650                 }
651                 ret = 0;
652         }
653 #else
654         char _sd[1];
655         char *sd = _sd;
656         errno = 0;
657         ret = ntfs_xattr_system_getxattr(&ctx, XATTR_NTFS_ACL,
658                                          ni, dir_ni, sd,
659                                          sizeof(sd));
660         if (ret > sizeof(sd)) {
661                 sd = alloca(ret);
662                 ret = ntfs_xattr_system_getxattr(&ctx, XATTR_NTFS_ACL,
663                                                  ni, dir_ni, sd, ret);
664         }
665         if (ret > 0) {
666                 root->security_id = sd_set_add_sd(sd_set, sd, ret);
667                 if (root->security_id == -1) {
668                         ERROR("Out of memory");
669                         return WIMLIB_ERR_NOMEM;
670                 }
671                 DEBUG("Added security ID = %u for `%s'",
672                       root->security_id, path);
673                 ret = 0;
674         } else if (ret < 0) {
675                 ERROR_WITH_ERRNO("Failed to get security information from "
676                                  "`%s'", path);
677                 ret = WIMLIB_ERR_NTFS_3G;
678         } else {
679                 root->security_id = -1;
680                 DEBUG("No security ID for `%s'", path);
681         }
682 #endif
683         return ret;
684 }
685
686 static int build_dentry_tree_ntfs(struct dentry **root_p,
687                                   const char *device,
688                                   struct lookup_table *lookup_table,
689                                   struct wim_security_data *sd,
690                                   const struct capture_config *config,
691                                   int flags,
692                                   void *extra_arg)
693 {
694         ntfs_volume *vol;
695         ntfs_inode *root_ni;
696         int ret = 0;
697         struct sd_set sd_set = {
698                 .sd = sd,
699                 .root = NULL,
700         };
701         ntfs_volume **ntfs_vol_p = extra_arg;
702
703         DEBUG("Mounting NTFS volume `%s' read-only", device);
704         
705         vol = ntfs_mount(device, MS_RDONLY);
706         if (!vol) {
707                 ERROR_WITH_ERRNO("Failed to mount NTFS volume `%s' read-only",
708                                  device);
709                 return WIMLIB_ERR_NTFS_3G;
710         }
711         ntfs_open_secure(vol);
712
713         /* We don't want to capture the special NTFS files such as $Bitmap.  Not
714          * to be confused with "hidden" or "system" files which are real files
715          * that we do need to capture.  */
716         NVolClearShowSysFiles(vol);
717
718         DEBUG("Opening root NTFS dentry");
719         root_ni = ntfs_inode_open(vol, FILE_root);
720         if (!root_ni) {
721                 ERROR_WITH_ERRNO("Failed to open root inode of NTFS volume "
722                                  "`%s'", device);
723                 ret = WIMLIB_ERR_NTFS_3G;
724                 goto out;
725         }
726
727         /* Currently we assume that all the UTF-8 paths fit into this length and
728          * there is no check for overflow. */
729         char *path = MALLOC(32768);
730         if (!path) {
731                 ERROR("Could not allocate memory for NTFS pathname");
732                 goto out_cleanup;
733         }
734
735         path[0] = '/';
736         path[1] = '\0';
737         ret = build_dentry_tree_ntfs_recursive(root_p, NULL, root_ni, path, 1,
738                                                FILE_NAME_POSIX, lookup_table,
739                                                &sd_set, config, ntfs_vol_p,
740                                                flags);
741 out_cleanup:
742         FREE(path);
743         ntfs_inode_close(root_ni);
744         destroy_sd_set(&sd_set);
745
746 out:
747         if (ret) {
748                 if (ntfs_umount(vol, FALSE) != 0) {
749                         ERROR_WITH_ERRNO("Failed to unmount NTFS volume `%s'",
750                                          device);
751                         if (ret == 0)
752                                 ret = WIMLIB_ERR_NTFS_3G;
753                 }
754         } else {
755                 /* We need to leave the NTFS volume mounted so that we can read
756                  * the NTFS files again when we are actually writing the WIM */
757                 *ntfs_vol_p = vol;
758         }
759         return ret;
760 }
761
762
763
764 WIMLIBAPI int wimlib_add_image_from_ntfs_volume(WIMStruct *w,
765                                                 const char *device,
766                                                 const char *name,
767                                                 const char *config_str,
768                                                 size_t config_len,
769                                                 int flags)
770 {
771         if (flags & (WIMLIB_ADD_IMAGE_FLAG_DEREFERENCE)) {
772                 ERROR("Cannot dereference files when capturing directly from NTFS");
773                 return WIMLIB_ERR_INVALID_PARAM;
774         }
775         return do_add_image(w, device, name, config_str, config_len, flags,
776                             build_dentry_tree_ntfs, &w->ntfs_vol);
777 }
778
779 #else /* WITH_NTFS_3G */
780 WIMLIBAPI int wimlib_add_image_from_ntfs_volume(WIMStruct *w,
781                                                 const char *device,
782                                                 const char *name,
783                                                 const char *config_str,
784                                                 size_t config_len,
785                                                 int flags)
786 {
787         ERROR("wimlib was compiled without support for NTFS-3g, so");
788         ERROR("we cannot capture a WIM image directly from a NTFS volume");
789         return WIMLIB_ERR_UNSUPPORTED;
790 }
791 #endif /* WITH_NTFS_3G */