blob: 495e3e2b96fc99bde2aa96ec8f3b7941160b2a30 [file] [log] [blame]
/*
* Copyright (c) 2012 The Chromium OS Authors.
* Written by Mike Frysinger <vapier@gentoo.org>.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote products
* derived from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "defs.h"
#include <sys/ioctl.h>
#include <linux/loop.h>
static const struct xlat loop_flags_options[] = {
XLAT(LO_FLAGS_READ_ONLY),
#if HAVE_DECL_LO_FLAGS_AUTOCLEAR
XLAT(LO_FLAGS_AUTOCLEAR),
#endif
#if HAVE_DECL_LO_FLAGS_PARTSCAN
XLAT(LO_FLAGS_PARTSCAN),
#endif
XLAT_END
};
static const struct xlat loop_crypt_type_options[] = {
XLAT(LO_CRYPT_NONE),
XLAT(LO_CRYPT_XOR),
XLAT(LO_CRYPT_DES),
XLAT(LO_CRYPT_FISH2),
XLAT(LO_CRYPT_BLOW),
XLAT(LO_CRYPT_CAST128),
XLAT(LO_CRYPT_IDEA),
XLAT(LO_CRYPT_DUMMY),
XLAT(LO_CRYPT_SKIPJACK),
XLAT(LO_CRYPT_CRYPTOAPI),
XLAT_END
};
int loop_ioctl(struct tcb *tcp, long code, long arg)
{
struct loop_info info;
struct loop_info64 info64;
char *s = alloca((LO_NAME_SIZE + LO_KEY_SIZE) * 4);
if (entering(tcp))
return 0;
switch (code) {
case LOOP_SET_STATUS:
case LOOP_GET_STATUS:
if (!verbose(tcp) || umove(tcp, arg, &info) < 0)
return 0;
tprintf(", {number=%d", info.lo_number);
if (!abbrev(tcp)) {
tprintf(", device=%#lx, inode=%lu, rdevice=%#lx",
(unsigned long) info.lo_device,
info.lo_inode,
(unsigned long) info.lo_rdevice);
}
tprintf(", offset=%#x", info.lo_offset);
if (!abbrev(tcp) || info.lo_encrypt_type != LO_CRYPT_NONE) {
tprints(", encrypt_type=");
printxval(loop_crypt_type_options, info.lo_encrypt_type,
"LO_CRYPT_???");
tprintf(", encrypt_key_size=%d", info.lo_encrypt_key_size);
}
tprints(", flags=");
printflags(loop_flags_options, info.lo_flags, "LO_FLAGS_???");
string_quote(info.lo_name, s, -1, LO_NAME_SIZE);
tprintf(", name=%s", s);
if (!abbrev(tcp) || info.lo_encrypt_type != LO_CRYPT_NONE) {
string_quote((void *) info.lo_encrypt_key, s, 0, LO_KEY_SIZE);
tprintf(", encrypt_key=%s", s);
}
if (!abbrev(tcp))
tprintf(", init={%#lx, %#lx}"
", reserved={%#x, %#x, %#x, %#x}}",
info.lo_init[0], info.lo_init[1],
info.reserved[0], info.reserved[1],
info.reserved[2], info.reserved[3]);
else
tprints(", ...}");
return 1;
case LOOP_SET_STATUS64:
case LOOP_GET_STATUS64:
if (!verbose(tcp) || umove(tcp, arg, &info64) < 0)
return 0;
tprints(", {");
if (!abbrev(tcp)) {
tprintf("device=%" PRIu64 ", inode=%" PRIu64 ", "
"rdevice=%" PRIu64 ", offset=%#" PRIx64 ", "
"sizelimit=%" PRIu64 ", number=%" PRIu32,
(uint64_t) info64.lo_device,
(uint64_t) info64.lo_inode,
(uint64_t) info64.lo_rdevice,
(uint64_t) info64.lo_offset,
(uint64_t) info64.lo_sizelimit,
(uint32_t) info64.lo_number);
} else {
tprintf("offset=%#" PRIx64 ", number=%" PRIu32,
(uint64_t) info64.lo_offset,
(uint32_t) info64.lo_number);
}
if (!abbrev(tcp) || info64.lo_encrypt_type != LO_CRYPT_NONE) {
tprints(", encrypt_type=");
printxval(loop_crypt_type_options, info64.lo_encrypt_type,
"LO_CRYPT_???");
tprintf(", encrypt_key_size=%" PRIu32,
info64.lo_encrypt_key_size);
}
tprints(", flags=");
printflags(loop_flags_options, info64.lo_flags, "LO_FLAGS_???");
string_quote((void *) info64.lo_file_name, s, -1, LO_NAME_SIZE);
tprintf(", file_name=%s", s);
if (!abbrev(tcp) || info64.lo_encrypt_type != LO_CRYPT_NONE) {
string_quote((void *) info64.lo_crypt_name, s, -1, LO_NAME_SIZE);
tprintf(", crypt_name=%s", s);
string_quote((void *) info64.lo_encrypt_key, s, 0, LO_KEY_SIZE);
tprintf(", encrypt_key=%s", s);
}
if (!abbrev(tcp))
tprintf(", init={%#" PRIx64 ", %#" PRIx64 "}}",
(uint64_t) info64.lo_init[0],
(uint64_t) info64.lo_init[1]);
else
tprints(", ...}");
return 1;
case LOOP_CLR_FD:
#ifdef LOOP_SET_CAPACITY
case LOOP_SET_CAPACITY:
#endif
#ifdef LOOP_CTL_GET_FREE
/* newer loop-control stuff */
case LOOP_CTL_GET_FREE:
#endif
/* Takes no arguments */
return 1;
case LOOP_SET_FD:
case LOOP_CHANGE_FD:
#ifdef LOOP_CTL_ADD
/* newer loop-control stuff */
case LOOP_CTL_ADD:
case LOOP_CTL_REMOVE:
#endif
/* These take simple args, so let default printer handle it */
default:
return 0;
}
}