/* * Copyright (c) 2012 The Chromium OS Authors. * Written by Mike Frysinger . * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote products * derived from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "defs.h" #include #include static const struct xlat loop_flags_options[] = { XLAT(LO_FLAGS_READ_ONLY), #if HAVE_DECL_LO_FLAGS_AUTOCLEAR XLAT(LO_FLAGS_AUTOCLEAR), #endif #if HAVE_DECL_LO_FLAGS_PARTSCAN XLAT(LO_FLAGS_PARTSCAN), #endif XLAT_END }; static const struct xlat loop_crypt_type_options[] = { XLAT(LO_CRYPT_NONE), XLAT(LO_CRYPT_XOR), XLAT(LO_CRYPT_DES), XLAT(LO_CRYPT_FISH2), XLAT(LO_CRYPT_BLOW), XLAT(LO_CRYPT_CAST128), XLAT(LO_CRYPT_IDEA), XLAT(LO_CRYPT_DUMMY), XLAT(LO_CRYPT_SKIPJACK), XLAT(LO_CRYPT_CRYPTOAPI), XLAT_END }; int loop_ioctl(struct tcb *tcp, long code, long arg) { struct loop_info info; struct loop_info64 info64; char *s = alloca((LO_NAME_SIZE + LO_KEY_SIZE) * 4); if (entering(tcp)) return 0; switch (code) { case LOOP_SET_STATUS: case LOOP_GET_STATUS: if (!verbose(tcp) || umove(tcp, arg, &info) < 0) return 0; tprintf(", {number=%d", info.lo_number); if (!abbrev(tcp)) { tprintf(", device=%#lx, inode=%lu, rdevice=%#lx", (unsigned long) info.lo_device, info.lo_inode, (unsigned long) info.lo_rdevice); } tprintf(", offset=%#x", info.lo_offset); if (!abbrev(tcp) || info.lo_encrypt_type != LO_CRYPT_NONE) { tprints(", encrypt_type="); printxval(loop_crypt_type_options, info.lo_encrypt_type, "LO_CRYPT_???"); tprintf(", encrypt_key_size=%d", info.lo_encrypt_key_size); } tprints(", flags="); printflags(loop_flags_options, info.lo_flags, "LO_FLAGS_???"); string_quote(info.lo_name, s, -1, LO_NAME_SIZE); tprintf(", name=%s", s); if (!abbrev(tcp) || info.lo_encrypt_type != LO_CRYPT_NONE) { string_quote((void *) info.lo_encrypt_key, s, 0, LO_KEY_SIZE); tprintf(", encrypt_key=%s", s); } if (!abbrev(tcp)) tprintf(", init={%#lx, %#lx}" ", reserved={%#x, %#x, %#x, %#x}}", info.lo_init[0], info.lo_init[1], info.reserved[0], info.reserved[1], info.reserved[2], info.reserved[3]); else tprints(", ...}"); return 1; case LOOP_SET_STATUS64: case LOOP_GET_STATUS64: if (!verbose(tcp) || umove(tcp, arg, &info64) < 0) return 0; tprints(", {"); if (!abbrev(tcp)) { tprintf("device=%" PRIu64 ", inode=%" PRIu64 ", " "rdevice=%" PRIu64 ", offset=%#" PRIx64 ", " "sizelimit=%" PRIu64 ", number=%" PRIu32, (uint64_t) info64.lo_device, (uint64_t) info64.lo_inode, (uint64_t) info64.lo_rdevice, (uint64_t) info64.lo_offset, (uint64_t) info64.lo_sizelimit, (uint32_t) info64.lo_number); } else { tprintf("offset=%#" PRIx64 ", number=%" PRIu32, (uint64_t) info64.lo_offset, (uint32_t) info64.lo_number); } if (!abbrev(tcp) || info64.lo_encrypt_type != LO_CRYPT_NONE) { tprints(", encrypt_type="); printxval(loop_crypt_type_options, info64.lo_encrypt_type, "LO_CRYPT_???"); tprintf(", encrypt_key_size=%" PRIu32, info64.lo_encrypt_key_size); } tprints(", flags="); printflags(loop_flags_options, info64.lo_flags, "LO_FLAGS_???"); string_quote((void *) info64.lo_file_name, s, -1, LO_NAME_SIZE); tprintf(", file_name=%s", s); if (!abbrev(tcp) || info64.lo_encrypt_type != LO_CRYPT_NONE) { string_quote((void *) info64.lo_crypt_name, s, -1, LO_NAME_SIZE); tprintf(", crypt_name=%s", s); string_quote((void *) info64.lo_encrypt_key, s, 0, LO_KEY_SIZE); tprintf(", encrypt_key=%s", s); } if (!abbrev(tcp)) tprintf(", init={%#" PRIx64 ", %#" PRIx64 "}}", (uint64_t) info64.lo_init[0], (uint64_t) info64.lo_init[1]); else tprints(", ...}"); return 1; case LOOP_CLR_FD: #ifdef LOOP_SET_CAPACITY case LOOP_SET_CAPACITY: #endif #ifdef LOOP_CTL_GET_FREE /* newer loop-control stuff */ case LOOP_CTL_GET_FREE: #endif /* Takes no arguments */ return 1; case LOOP_SET_FD: case LOOP_CHANGE_FD: #ifdef LOOP_CTL_ADD /* newer loop-control stuff */ case LOOP_CTL_ADD: case LOOP_CTL_REMOVE: #endif /* These take simple args, so let default printer handle it */ default: return 0; } }