1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259
|
/*
* The Sleuth Kit
*
* Brian Carrier [carrier <at> sleuthkit [dot] org]
* Copyright (c) 2006-2011 Brian Carrier, Basis Technology. All Rights reserved
* Copyright (c) 2003-2005 Brian Carrier. All rights reserved
*
* Copyright (c) 1997,1998,1999, International Business Machines
* Corporation and others. All Rights Reserved.
*
*
* LICENSE
* This software is distributed under the IBM Public License.
* AUTHOR(S)
* Wietse Venema
* IBM T.J. Watson Research
* P.O. Box 704
* Yorktown Heights, NY 10598, USA
--*/
/** \file fs_io.c
* Contains functions to read data from a disk image and wrapper functions to read file content.
*/
#include <errno.h>
#include "../pool/tsk_pool.h"
#include "tsk_fs_i.h"
/** \internal
* Internal method to deal with calculating correct offset when we have pre and post bytes
* in teh file system blocks (i.e. RAW Cds)
* @param a_fs File system being analyzed
* @param a_off Byte offset into file system (i.e. not offset into image)
* @param a_buf Buffer to write data into
* @param a_len Number of bytes to read
* @returns Number of bytes read or -1 on error
*/
static ssize_t
fs_prepost_read(TSK_FS_INFO * a_fs, TSK_OFF_T a_off, char *a_buf,
size_t a_len)
{
TSK_OFF_T cur_off = a_off;
TSK_OFF_T end_off = a_off + a_len;
ssize_t cur_idx = 0;
// we need to read block by block so that we can skip the needed pre and post bytes
while (cur_off < end_off) {
TSK_OFF_T read_off;
ssize_t retval2 = 0;
TSK_DADDR_T blk = cur_off / a_fs->block_size;
size_t read_len = a_fs->block_size - cur_off % a_fs->block_size;
if ((TSK_OFF_T)read_len > end_off - cur_off)
read_len = (size_t) (end_off - cur_off);
read_off =
a_fs->offset + cur_off + blk * (a_fs->block_pre_size +
a_fs->block_post_size) + a_fs->block_pre_size;
if (tsk_verbose)
fprintf(stderr,
"fs_prepost_read: Mapped %" PRIdOFF " to %" PRIdOFF "\n",
cur_off, read_off);
retval2 =
tsk_img_read(a_fs->img_info, read_off, &a_buf[cur_idx],
read_len);
if (retval2 == -1)
return -1;
else if (retval2 == 0)
break;
cur_idx += retval2;
cur_off += retval2;
}
return cur_idx;
}
/**
* \ingroup fslib
* Read arbitrary data from inside of the file system.
* @param a_fs The file system handle.
* @param a_off The byte offset to start reading from (relative to start of file system)
* @param a_buf The buffer to store the block in.
* @param a_len The number of bytes to read
* @return The number of bytes read or -1 on error.
*/
ssize_t
tsk_fs_read(TSK_FS_INFO * a_fs, TSK_OFF_T a_off, char *a_buf, size_t a_len)
{
return tsk_fs_read_decrypt(a_fs, a_off, a_buf, a_len, 0);
}
/**
* \ingroup fslib
* Read arbitrary data from inside of the file system.
* @param a_fs The file system handle.
* @param a_off The byte offset to start reading from (relative to start of file system)
* @param a_buf The buffer to store the block in.
* @param a_len The number of bytes to read
* @param crypto_id Starting block number needed for the XTS IV
* @return The number of bytes read or -1 on error.
*/
ssize_t
tsk_fs_read_decrypt(TSK_FS_INFO * a_fs, TSK_OFF_T a_off, char *a_buf, size_t a_len,
TSK_DADDR_T crypto_id)
{
// do a sanity check on the read bounds, but only if the block
// value has been set.
// note that this could prevent us from viewing the FS slack...
if ((a_fs->last_block_act > 0)
&& ((TSK_DADDR_T) a_off >=
((a_fs->last_block_act + 1) * a_fs->block_size))) {
tsk_error_reset();
tsk_error_set_errno(TSK_ERR_FS_READ);
if ((TSK_DADDR_T) a_off <
((a_fs->last_block + 1) * a_fs->block_size))
tsk_error_set_errstr
("tsk_fs_read: Offset missing in partial image: %"
PRIuDADDR ")", a_off);
else
tsk_error_set_errstr
("tsk_fs_read: Offset is too large for image: %" PRIuDADDR
")", a_off);
return -1;
}
// We need different logic for encrypted file systems
if ((a_fs->flags & TSK_FS_INFO_FLAG_ENCRYPTED) && a_fs->block_size) {
// If we're reading on block boundaries and a multiple of block
// sizes, we can just decrypt directly to the buffer.
if ((a_off % a_fs->block_size == 0) && (a_len % a_fs->block_size == 0)) {
return tsk_fs_read_block_decrypt(a_fs, a_off / a_fs->block_size, a_buf, a_len, crypto_id);
}
// Since we can only decrypt on block boundaries, we'll need to
// decrypt the blocks and then copy to the output buffer.
// Starting address needs to be aligned by block size;
TSK_OFF_T bit_magic = a_fs->block_size - 1;
TSK_OFF_T start = a_off & ~bit_magic;
// Ending address needs to be rounded up to the nearest
// block boundary.
TSK_OFF_T end = (a_off + a_len + bit_magic) & ~bit_magic;
TSK_OFF_T len = end - start;
// Decrypt the blocks to a temp buffer
char * temp_buffer = tsk_malloc(len);
if (temp_buffer == NULL) {
return -1;
}
if (tsk_fs_read_block_decrypt(a_fs, start / a_fs->block_size, temp_buffer,
len, crypto_id) != len) {
free(temp_buffer);
return -1;
}
// Copy the decrypted data
memcpy(a_buf, temp_buffer + a_off - start, a_len);
free(temp_buffer);
return a_len;
}
if (((a_fs->block_pre_size) || (a_fs->block_post_size))
&& (a_fs->block_size)) {
return fs_prepost_read(a_fs, a_off, a_buf, a_len);
}
else {
return tsk_img_read(a_fs->img_info, a_off + a_fs->offset, a_buf,
a_len);
}
}
/**
* \ingroup fslib
* Read a file system block into a char* buffer.
* This is actually a wrapper around the fs_read_random function,
* but it allows the starting location to be specified as a block address.
*
* @param a_fs The file system structure.
* @param a_addr The starting block file system address.
* @param a_buf The char * buffer to store the block data in.
* @param a_len The number of bytes to read (must be a multiple of the block size)
* @return The number of bytes read or -1 on error.
*/
ssize_t
tsk_fs_read_block(TSK_FS_INFO * a_fs, TSK_DADDR_T a_addr, char *a_buf,
size_t a_len)
{
return tsk_fs_read_block_decrypt(a_fs, a_addr, a_buf, a_len, 0);
}
/**
* \ingroup fslib
* Read a file system block into a char* buffer.
* This is actually a wrapper around the fs_read_random function,
* but it allows the starting location to be specified as a block address.
*
* @param a_fs The file system structure.
* @param a_addr The starting block file system address.
* @param a_buf The char * buffer to store the block data in.
* @param a_len The number of bytes to read (must be a multiple of the block size)
* @param crypto_id Starting block number needed for the XTS IV
* @return The number of bytes read or -1 on error.
*/
ssize_t
tsk_fs_read_block_decrypt(TSK_FS_INFO * a_fs, TSK_DADDR_T a_addr, char *a_buf,
size_t a_len, TSK_DADDR_T crypto_id)
{
if (a_len % a_fs->block_size) {
tsk_error_reset();
tsk_error_set_errno(TSK_ERR_FS_READ);
tsk_error_set_errstr("tsk_fs_read_block: length %" PRIuSIZE ""
" not a multiple of %d", a_len, a_fs->block_size);
return -1;
}
if (a_addr > a_fs->last_block_act) {
tsk_error_reset();
tsk_error_set_errno(TSK_ERR_FS_READ);
if (a_addr <= a_fs->last_block)
tsk_error_set_errstr
("tsk_fs_read_block: Address missing in partial image: %"
PRIuDADDR ")", a_addr);
else
tsk_error_set_errstr
("tsk_fs_read_block: Address is too large for image: %"
PRIuDADDR ")", a_addr);
return -1;
}
ssize_t ret_len;
if ((a_fs->block_pre_size == 0) && (a_fs->block_post_size == 0)) {
TSK_OFF_T off =
a_fs->offset + (TSK_OFF_T) (a_addr) * a_fs->block_size;
ret_len = tsk_img_read(a_fs->img_info, off, a_buf, a_len);
}
else {
TSK_OFF_T off = (TSK_OFF_T) (a_addr) * a_fs->block_size;
ret_len = fs_prepost_read(a_fs, off, a_buf, a_len);
}
if ((a_fs->flags & TSK_FS_INFO_FLAG_ENCRYPTED)
&& ret_len > 0
&& a_fs->decrypt_block) {
TSK_DADDR_T i;
for (i = 0; i < a_len / a_fs->block_size; i++) {
a_fs->decrypt_block(a_fs, crypto_id + i,
a_buf + (a_fs->block_size * i));
}
}
return ret_len;
}
|