/* Originally from Ted's losetup.c */ /* * losetup.c - setup and control loop devices */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include "loop.h" #include "lomount.h" #include "rmd160.h" #include "xstrncpy.h" #include "nls.h" #include "sundries.h" #include "xmalloc.h" #include "pathnames.h" #ifndef HAVE_VERSIONSORT # include "strverscmp.h" #endif #define SIZE(a) (sizeof(a)/sizeof(a[0])) #ifdef LOOP_SET_FD static int is_associated(int dev, struct stat *file, unsigned long long offset, int isoff); static int loop_info64_to_old(const struct loop_info64 *info64, struct loop_info *info) { memset(info, 0, sizeof(*info)); info->lo_number = info64->lo_number; info->lo_device = info64->lo_device; info->lo_inode = info64->lo_inode; info->lo_rdevice = info64->lo_rdevice; info->lo_offset = info64->lo_offset; info->lo_encrypt_type = info64->lo_encrypt_type; info->lo_encrypt_key_size = info64->lo_encrypt_key_size; info->lo_flags = info64->lo_flags; info->lo_init[0] = info64->lo_init[0]; info->lo_init[1] = info64->lo_init[1]; if (info->lo_encrypt_type == LO_CRYPT_CRYPTOAPI) memcpy(info->lo_name, info64->lo_crypt_name, LO_NAME_SIZE); else memcpy(info->lo_name, info64->lo_file_name, LO_NAME_SIZE); memcpy(info->lo_encrypt_key, info64->lo_encrypt_key, LO_KEY_SIZE); /* error in case values were truncated */ if (info->lo_device != info64->lo_device || info->lo_rdevice != info64->lo_rdevice || info->lo_inode != info64->lo_inode || info->lo_offset != info64->lo_offset) return -EOVERFLOW; return 0; } #define LOOPMAJOR 7 #define NLOOPS_DEFAULT 8 /* /dev/loop[0-7] */ struct looplist { int flag; /* scanning options */ FILE *proc; /* /proc/partitions */ int ncur; /* current possition */ int *minors; /* ary of minor numbers (when scan whole /dev) */ int nminors; /* number of items in *minors */ char name[128]; /* device name */ int ct_perm; /* count permission problems */ int ct_succ; /* count number of successfully detected devices */ }; #define LLFLG_USEDONLY (1 << 1) /* return used devices only */ #define LLFLG_FREEONLY (1 << 2) /* return non-used devices */ #define LLFLG_DONE (1 << 3) /* all is done */ #define LLFLG_PROCFS (1 << 4) /* try to found used devices in /proc/partitions */ #define LLFLG_SUBDIR (1 << 5) /* /dev/loop/N */ #define LLFLG_DFLT (1 << 6) /* directly try to check default loops */ int is_loop_device (const char *device) { struct stat st; return (stat(device, &st) == 0 && S_ISBLK(st.st_mode) && major(st.st_rdev) == LOOPMAJOR); } static int is_loop_used(int fd) { struct loop_info li; errno = 0; if (ioctl (fd, LOOP_GET_STATUS, &li) < 0 && errno == ENXIO) return 0; return 1; } static int is_loopfd_autoclear(int fd) { struct loop_info lo; struct loop_info64 lo64; if (ioctl(fd, LOOP_GET_STATUS64, &lo64) == 0) { if (lo64.lo_flags & LO_FLAGS_AUTOCLEAR) return 1; } else if (ioctl(fd, LOOP_GET_STATUS, &lo) == 0) { if (lo.lo_flags & LO_FLAGS_AUTOCLEAR) return 1; } return 0; } int is_loop_autoclear(const char *device) { int fd, rc; if ((fd = open(device, O_RDONLY)) < 0) return 0; rc = is_loopfd_autoclear(fd); close(fd); return rc; } static int looplist_open(struct looplist *ll, int flag) { struct stat st; memset(ll, 0, sizeof(*ll)); ll->flag = flag; ll->ncur = -1; if (stat(_PATH_DEV, &st) == -1 || (!S_ISDIR(st.st_mode))) return -1; /* /dev doesn't exist */ if (stat(_PATH_DEV_LOOP, &st) == 0 && S_ISDIR(st.st_mode)) ll->flag |= LLFLG_SUBDIR; /* /dev/loop/ exists */ if ((ll->flag & LLFLG_USEDONLY) && stat(_PATH_PROC_PARTITIONS, &st) == 0) ll->flag |= LLFLG_PROCFS; /* try /proc/partitions */ ll->flag |= LLFLG_DFLT; /* required! */ return 0; } static void looplist_close(struct looplist *ll) { free(ll->minors); if (ll->proc) fclose(ll->proc); ll->minors = NULL; ll->proc = NULL; ll->ncur = -1; ll->flag |= LLFLG_DONE; } static int looplist_open_dev(struct looplist *ll, int lnum) { struct stat st; int used; int fd; /* create a full device path */ snprintf(ll->name, sizeof(ll->name), ll->flag & LLFLG_SUBDIR ? _PATH_DEV_LOOP "/%d" : _PATH_DEV "loop%d", lnum); fd = open(ll->name, O_RDONLY); if (fd == -1) { if (errno == EACCES) ll->ct_perm++; return -1; } if (fstat(fd, &st) == -1) goto error; if (!S_ISBLK(st.st_mode) || major(st.st_rdev) != LOOPMAJOR) goto error; ll->ct_succ++; /* check if the device is wanted */ if (!(ll->flag & (LLFLG_USEDONLY | LLFLG_FREEONLY))) return fd; used = is_loop_used(fd); if ((ll->flag & LLFLG_USEDONLY) && used) return fd; if ((ll->flag & LLFLG_FREEONLY) && !used) return fd; error: close(fd); return -1; } /* returns from "loop" */ static int name2minor(int hasprefix, const char *name) { int n; char *end; if (hasprefix) { if (strncmp(name, "loop", 4)) return -1; name += 4; } n = strtol(name, &end, 10); if (end && end != name && *end == '\0' && n >= 0) return n; return -1; } static int cmpnum(const void *p1, const void *p2) { return (* (int *) p1) > (* (int *) p2); } /* * The classic scandir() is more expensive and less portable. * We needn't full loop device names -- minor numers (loop) * are enough. */ static int loop_scandir(const char *dirname, int **ary, int hasprefix) { DIR *dir; struct dirent *d; int n, count = 0, arylen = 0; if (!dirname || !ary) return -1; dir = opendir(dirname); if (!dir) return -1; *ary = NULL; while((d = readdir(dir))) { if (d->d_type != DT_BLK && d->d_type != DT_UNKNOWN && d->d_type != DT_LNK) continue; n = name2minor(hasprefix, d->d_name); if (n == -1 || n < NLOOPS_DEFAULT) continue; if (count + 1 > arylen) { arylen += 1; *ary = *ary ? realloc(*ary, arylen * sizeof(int)) : malloc(arylen * sizeof(int)); if (!*ary) return -1; } (*ary)[count++] = n; } if (count) qsort(*ary, count, sizeof(int), cmpnum); closedir(dir); return count; } static int looplist_next(struct looplist *ll) { int fd, n; if (ll->flag & LLFLG_DONE) return -1; /* A) Look for used loop devices in /proc/partitions ("losetup -a" only) */ if (ll->flag & LLFLG_PROCFS) { char buf[BUFSIZ]; if (!ll->proc) ll->proc = fopen(_PATH_PROC_PARTITIONS, "r"); while (ll->proc && fgets(buf, sizeof(buf), ll->proc)) { int m; unsigned long long sz; char name[128]; if (sscanf(buf, " %d %d %llu %128[^\n ]", &m, &n, &sz, name) != 4) continue; if (m != LOOPMAJOR) continue; /* unfortunately, real minor numbers needn't to match * loop device name. We have to follow device name. */ n = name2minor(1, name); fd = looplist_open_dev(ll, n); if (fd != -1) return fd; } goto done; } /* B) Classic way, try first eight loop devices (default number * of loop devices). This is enough for 99% of all cases. */ if (ll->flag & LLFLG_DFLT) { for (++ll->ncur; ll->ncur < NLOOPS_DEFAULT; ll->ncur++) { fd = looplist_open_dev(ll, ll->ncur); if (fd != -1) return fd; } ll->flag &= ~LLFLG_DFLT; } /* C) the worst posibility, scan all /dev or /dev/loop */ if (!ll->minors) { ll->nminors = (ll->flag & LLFLG_SUBDIR) ? loop_scandir(_PATH_DEV_LOOP, &ll->minors, 0) : loop_scandir(_PATH_DEV, &ll->minors, 1); ll->ncur = -1; } for (++ll->ncur; ll->ncur < ll->nminors; ll->ncur++) { fd = looplist_open_dev(ll, ll->minors[ll->ncur]); if (fd != -1) return fd; } done: looplist_close(ll); return -1; } #ifdef MAIN static int set_capacity(const char *device) { int errsv; int fd = open(device, O_RDONLY); if (fd == -1) goto err; if (ioctl(fd, LOOP_SET_CAPACITY) != 0) goto err; return 0; err: errsv = errno; fprintf(stderr, _("loop: can't set capacity on device %s: %s\n"), device, strerror (errsv)); if (fd != -1) close(fd); return 2; } static int show_loop_fd(int fd, char *device) { struct loop_info loopinfo; struct loop_info64 loopinfo64; int errsv; if (ioctl(fd, LOOP_GET_STATUS64, &loopinfo64) == 0) { loopinfo64.lo_file_name[LO_NAME_SIZE-2] = '*'; loopinfo64.lo_file_name[LO_NAME_SIZE-1] = 0; loopinfo64.lo_crypt_name[LO_NAME_SIZE-1] = 0; printf("%s: [%04" PRIx64 "]:%" PRIu64 " (%s)", device, loopinfo64.lo_device, loopinfo64.lo_inode, loopinfo64.lo_file_name); if (loopinfo64.lo_offset) printf(_(", offset %" PRIu64 ), loopinfo64.lo_offset); if (loopinfo64.lo_sizelimit) printf(_(", sizelimit %" PRIu64 ), loopinfo64.lo_sizelimit); if (loopinfo64.lo_encrypt_type || loopinfo64.lo_crypt_name[0]) { char *e = (char *)loopinfo64.lo_crypt_name; if (*e == 0 && loopinfo64.lo_encrypt_type == 1) e = "XOR"; printf(_(", encryption %s (type %" PRIu32 ")"), e, loopinfo64.lo_encrypt_type); } printf("\n"); return 0; } if (ioctl(fd, LOOP_GET_STATUS, &loopinfo) == 0) { printf ("%s: [%04x]:%ld (%s)", device, (unsigned int)loopinfo.lo_device, loopinfo.lo_inode, loopinfo.lo_name); if (loopinfo.lo_offset) printf(_(", offset %d"), loopinfo.lo_offset); if (loopinfo.lo_encrypt_type) printf(_(", encryption type %d\n"), loopinfo.lo_encrypt_type); printf("\n"); return 0; } errsv = errno; fprintf(stderr, _("loop: can't get info on device %s: %s\n"), device, strerror (errsv)); return 1; } static int show_loop(char *device) { int ret, fd; if ((fd = open(device, O_RDONLY)) < 0) { int errsv = errno; fprintf(stderr, _("loop: can't open device %s: %s\n"), device, strerror (errsv)); return 2; } ret = show_loop_fd(fd, device); close(fd); return ret; } static int show_used_loop_devices (void) { struct looplist ll; int fd; if (looplist_open(&ll, LLFLG_USEDONLY) == -1) { error(_("%s: /dev directory does not exist."), progname); return 1; } while((fd = looplist_next(&ll)) != -1) { show_loop_fd(fd, ll.name); close(fd); } looplist_close(&ll); if (!ll.ct_succ && ll.ct_perm) { error(_("%s: no permission to look at /dev/loop%s"), progname, (ll.flag & LLFLG_SUBDIR) ? "/" : ""); return 1; } return 0; } /* list all associated loop devices */ static int show_associated_loop_devices(char *filename, unsigned long long offset, int isoff) { struct looplist ll; struct stat filestat; int fd; if (stat(filename, &filestat) == -1) { perror(filename); return 1; } if (looplist_open(&ll, LLFLG_USEDONLY) == -1) { error(_("%s: /dev directory does not exist."), progname); return 1; } while((fd = looplist_next(&ll)) != -1) { if (is_associated(fd, &filestat, offset, isoff) == 1) show_loop_fd(fd, ll.name); close(fd); } looplist_close(&ll); return 0; } #endif /* MAIN */ /* check if the loopfile is already associated with the same given * parameters. * * returns: 0 unused / error * 1 loop device already used */ static int is_associated(int dev, struct stat *file, unsigned long long offset, int isoff) { struct loop_info64 linfo64; struct loop_info64 linfo; int ret = 0; if (ioctl(dev, LOOP_GET_STATUS64, &linfo64) == 0) { if (file->st_dev == linfo64.lo_device && file->st_ino == linfo64.lo_inode && (isoff == 0 || offset == linfo64.lo_offset)) ret = 1; } else if (ioctl(dev, LOOP_GET_STATUS, &linfo) == 0) { if (file->st_dev == linfo.lo_device && file->st_ino == linfo.lo_inode && (isoff == 0 || offset == linfo.lo_offset)) ret = 1; } return ret; } /* check if the loop file is already used with the same given * parameters. We check for device no, inode and offset. * returns: associated devname or NULL */ char * loopfile_used (const char *filename, unsigned long long offset) { struct looplist ll; char *devname = NULL; struct stat filestat; int fd; if (stat(filename, &filestat) == -1) { perror(filename); return NULL; } if (looplist_open(&ll, LLFLG_USEDONLY) == -1) { error(_("%s: /dev directory does not exist."), progname); return NULL; } while((fd = looplist_next(&ll)) != -1) { int res = is_associated(fd, &filestat, offset, 1); close(fd); if (res == 1) { devname = xstrdup(ll.name); break; } } looplist_close(&ll); return devname; } int loopfile_used_with(char *devname, const char *filename, unsigned long long offset) { struct stat statbuf; int fd, ret; if (!is_loop_device(devname)) return 0; if (stat(filename, &statbuf) == -1) return 0; fd = open(devname, O_RDONLY); if (fd == -1) return 0; ret = is_associated(fd, &statbuf, offset, 1); close(fd); return ret; } char * find_unused_loop_device (void) { struct looplist ll; char *devname = NULL; int fd; if (looplist_open(&ll, LLFLG_FREEONLY) == -1) { error(_("%s: /dev directory does not exist."), progname); return NULL; } if ((fd = looplist_next(&ll)) != -1) { close(fd); devname = xstrdup(ll.name); } looplist_close(&ll); if (devname) return devname; if (!ll.ct_succ && ll.ct_perm) error(_("%s: no permission to look at /dev/loop%s"), progname, (ll.flag & LLFLG_SUBDIR) ? "/" : ""); else if (ll.ct_succ) error(_("%s: could not find any free loop device"), progname); else error(_( "%s: Could not find any loop device. Maybe this kernel " "does not know\n" " about the loop device? (If so, recompile or " "`modprobe loop'.)"), progname); return NULL; } /* * A function to read the passphrase either from the terminal or from * an open file descriptor. */ static char * xgetpass(int pfd, const char *prompt) { char *pass; int buflen, i; if (pfd < 0) /* terminal */ return getpass(prompt); pass = NULL; buflen = 0; for (i=0; ; i++) { if (i >= buflen-1) { /* we're running out of space in the buffer. * Make it bigger: */ char *tmppass = pass; buflen += 128; pass = realloc(tmppass, buflen); if (pass == NULL) { /* realloc failed. Stop reading. */ error(_("Out of memory while reading passphrase")); pass = tmppass; /* the old buffer hasn't changed */ break; } } if (read(pfd, pass+i, 1) != 1 || pass[i] == '\n' || pass[i] == 0) break; } if (pass == NULL) return ""; pass[i] = 0; return pass; } static int digits_only(const char *s) { while (*s) if (!isdigit(*s++)) return 0; return 1; } /* * return codes: * 0 - success * 1 - error * 2 - error (EBUSY) */ int set_loop(const char *device, const char *file, unsigned long long offset, unsigned long long sizelimit, const char *encryption, int pfd, int *options, int keysz, int hash_pass) { struct loop_info64 loopinfo64; int fd, ffd, mode, i; char *pass; char *filename; if (verbose) { char *xdev = loopfile_used(file, offset); if (xdev) { printf(_("warning: %s is already associated with %s\n"), file, xdev); free(xdev); } } mode = (*options & SETLOOP_RDONLY) ? O_RDONLY : O_RDWR; if ((ffd = open(file, mode)) < 0) { if (!(*options & SETLOOP_RDONLY) && (errno == EROFS || errno == EACCES)) ffd = open(file, mode = O_RDONLY); if (ffd < 0) { perror(file); return 1; } if (verbose) printf(_("warning: %s: is write-protected, using read-only.\n"), file); *options |= SETLOOP_RDONLY; } if ((fd = open(device, mode)) < 0) { perror (device); close(ffd); return 1; } memset(&loopinfo64, 0, sizeof(loopinfo64)); if (!(filename = canonicalize(file))) filename = (char *) file; xstrncpy((char *)loopinfo64.lo_file_name, filename, LO_NAME_SIZE); if (encryption && *encryption) { if (digits_only(encryption)) { loopinfo64.lo_encrypt_type = atoi(encryption); } else { loopinfo64.lo_encrypt_type = LO_CRYPT_CRYPTOAPI; snprintf((char *)loopinfo64.lo_crypt_name, LO_NAME_SIZE, "%s", encryption); } } loopinfo64.lo_offset = offset; loopinfo64.lo_sizelimit = sizelimit; #ifdef MCL_FUTURE /* * Oh-oh, sensitive data coming up. Better lock into memory to prevent * passwd etc being swapped out and left somewhere on disk. */ if (loopinfo64.lo_encrypt_type != LO_CRYPT_NONE) { if(mlockall(MCL_CURRENT | MCL_FUTURE)) { perror("memlock"); fprintf(stderr, _("Couldn't lock into memory, exiting.\n")); exit(1); } } #endif if (keysz==0) keysz=LO_KEY_SIZE*8; switch (loopinfo64.lo_encrypt_type) { case LO_CRYPT_NONE: loopinfo64.lo_encrypt_key_size = 0; break; case LO_CRYPT_XOR: pass = getpass(_("Password: ")); memset(loopinfo64.lo_encrypt_key, 0, LO_KEY_SIZE); xstrncpy((char *)loopinfo64.lo_encrypt_key, pass, LO_KEY_SIZE); memset(pass, 0, strlen(pass)); loopinfo64.lo_encrypt_key_size = LO_KEY_SIZE; break; #define HASHLENGTH 20 #if 0 case LO_CRYPT_FISH2: case LO_CRYPT_BLOW: case LO_CRYPT_IDEA: case LO_CRYPT_CAST128: case LO_CRYPT_SERPENT: case LO_CRYPT_MARS: case LO_CRYPT_RC6: case LO_CRYPT_3DES: case LO_CRYPT_DFC: case LO_CRYPT_RIJNDAEL: { char keybits[2*HASHLENGTH]; char *pass2; int passwdlen; int keylength; int i; pass = xgetpass(pfd, _("Password: ")); passwdlen=strlen(pass); pass2=malloc(passwdlen+2); pass2[0]='A'; strcpy(pass2+1,pass); rmd160_hash_buffer(keybits,pass,passwdlen); rmd160_hash_buffer(keybits+HASHLENGTH,pass2,passwdlen+1); memcpy((char*)loopinfo64.lo_encrypt_key,keybits,2*HASHLENGTH); memset(pass, 0, passwdlen); memset(pass2, 0, passwdlen+1); free(pass2); keylength=0; for(i=0; crypt_type_tbl[i].id != -1; i++){ if(loopinfo64.lo_encrypt_type == crypt_type_tbl[i].id){ keylength = crypt_type_tbl[i].keylength; break; } } loopinfo64.lo_encrypt_key_size=keylength; break; } #endif default: if (hash_pass) { char keybits[2*HASHLENGTH]; char *pass2; int passwdlen; pass = xgetpass(pfd, _("Password: ")); passwdlen=strlen(pass); pass2=malloc(passwdlen+2); pass2[0]='A'; strcpy(pass2+1,pass); rmd160_hash_buffer(keybits,pass,passwdlen); rmd160_hash_buffer(keybits+HASHLENGTH,pass2,passwdlen+1); memset(pass, 0, passwdlen); memset(pass2, 0, passwdlen+1); free(pass2); memcpy((char*)loopinfo64.lo_encrypt_key,keybits,keysz/8); loopinfo64.lo_encrypt_key_size = keysz/8; } else { pass = xgetpass(pfd, _("Password: ")); memset(loopinfo64.lo_encrypt_key, 0, LO_KEY_SIZE); xstrncpy(loopinfo64.lo_encrypt_key, pass, LO_KEY_SIZE); memset(pass, 0, strlen(pass)); loopinfo64.lo_encrypt_key_size = LO_KEY_SIZE; } } if (ioctl(fd, LOOP_SET_FD, ffd) < 0) { int rc = 1; if (errno == EBUSY) { if (verbose) printf(_("ioctl LOOP_SET_FD failed: %s\n"), strerror(errno)); rc = 2; } else perror("ioctl: LOOP_SET_FD"); close(fd); close(ffd); if (file != filename) free(filename); return rc; } close (ffd); if (*options & SETLOOP_AUTOCLEAR) loopinfo64.lo_flags = LO_FLAGS_AUTOCLEAR; i = ioctl(fd, LOOP_SET_STATUS64, &loopinfo64); if (i) { struct loop_info loopinfo; int errsv = errno; i = loop_info64_to_old(&loopinfo64, &loopinfo); if (i) { errno = errsv; *options &= ~SETLOOP_AUTOCLEAR; perror("ioctl: LOOP_SET_STATUS64"); } else { i = ioctl(fd, LOOP_SET_STATUS, &loopinfo); if (i) perror("ioctl: LOOP_SET_STATUS"); } memset(&loopinfo, 0, sizeof(loopinfo)); } if ((*options & SETLOOP_AUTOCLEAR) && !is_loopfd_autoclear(fd)) /* kernel doesn't support loop auto-destruction */ *options &= ~SETLOOP_AUTOCLEAR; memset(&loopinfo64, 0, sizeof(loopinfo64)); if (i) { ioctl (fd, LOOP_CLR_FD, 0); close (fd); if (file != filename) free(filename); return 1; } /* * HACK: here we're leeking a file descriptor, * but mount is a short-lived process anyway. */ if (!(*options & SETLOOP_AUTOCLEAR)) close (fd); if (verbose > 1) printf(_("set_loop(%s,%s,%llu,%llu): success\n"), device, filename, offset, sizelimit); if (file != filename) free(filename); return 0; } int del_loop (const char *device) { int fd, errsv; if ((fd = open (device, O_RDONLY)) < 0) { errsv = errno; goto error; } if (ioctl (fd, LOOP_CLR_FD, 0) < 0) { errsv = errno; goto error; } close (fd); if (verbose > 1) printf(_("del_loop(%s): success\n"), device); return 0; error: fprintf(stderr, _("loop: can't delete device %s: %s\n"), device, strerror(errsv)); if (fd >= 0) close(fd); return 1; } #else /* no LOOP_SET_FD defined */ static void mutter(void) { fprintf(stderr, _("This mount was compiled without loop support. " "Please recompile.\n")); } int set_loop(const char *device, const char *file, unsigned long long offset, unsigned long long sizelimit, const char *encryption, int pfd, int *options, int keysz, int hash_pass) { mutter(); return 1; } int del_loop (const char *device) { mutter(); return 1; } char * find_unused_loop_device (void) { mutter(); return 0; } #endif /* !LOOP_SET_FD */ #ifdef MAIN #ifdef LOOP_SET_FD #include #include static void usage(void) { fprintf(stderr, _("\nUsage:\n" " %1$s loop_device give info\n" " %1$s -a | --all list all used\n" " %1$s -d | --detach [ ...] delete\n" " %1$s -f | --find find unused\n" " %1$s -c | --set-capacity resize\n" " %1$s -j | --associated [-o ] list all associated with \n" " %1$s [ options ] {-f|--find|loopdev} setup\n"), progname); fprintf(stderr, _("\nOptions:\n" " -e | --encryption enable data encryption with specified \n" " -h | --help this help\n" " -o | --offset start at offset into file\n" " --sizelimit loop limited to only bytes of the file\n" " -p | --pass-fd read passphrase from file descriptor \n" " -r | --read-only setup read-only loop device\n" " --show print device name (with -f )\n" " -N | --nohashpass Do not hash the given password (Debian hashes)\n" " -k | --keybits specify number of bits in the hashed key given\n" " to the cipher. Some ciphers support several key\n" " sizes and might be more efficient with a smaller\n" " key size. Key sizes < 128 are generally not\n" " recommended\n" " -v | --verbose verbose mode\n\n")); exit(1); } int main(int argc, char **argv) { char *p, *offset, *sizelimit, *encryption, *passfd, *device, *file, *assoc; char *keysize; int delete, find, c, all, capacity; int res = 0; int showdev = 0; int ro = 0; int pfd = -1; int keysz = 0; int hash_pass = 1; unsigned long long off, slimit; struct option longopts[] = { { "all", 0, 0, 'a' }, { "set-capacity", 0, 0, 'c' }, { "detach", 0, 0, 'd' }, { "encryption", 1, 0, 'e' }, { "find", 0, 0, 'f' }, { "help", 0, 0, 'h' }, { "keybits", 1, 0, 'k' }, { "nopasshash", 0, 0, 'N' }, { "nohashpass", 0, 0, 'N' }, { "associated", 1, 0, 'j' }, { "offset", 1, 0, 'o' }, { "sizelimit", 1, 0, 128 }, { "pass-fd", 1, 0, 'p' }, { "read-only", 0, 0, 'r' }, { "show", 0, 0, 's' }, { "verbose", 0, 0, 'v' }, { NULL, 0, 0, 0 } }; setlocale(LC_ALL, ""); bindtextdomain(PACKAGE, LOCALEDIR); textdomain(PACKAGE); capacity = delete = find = all = 0; off = 0; slimit = 0; assoc = offset = sizelimit = encryption = passfd = NULL; keysize = NULL; progname = argv[0]; if ((p = strrchr(progname, '/')) != NULL) progname = p+1; while ((c = getopt_long(argc, argv, "acde:E:fhj:k:No:p:rsv", longopts, NULL)) != -1) { switch (c) { case 'a': all = 1; break; case 'c': capacity = 1; break; case 'r': ro = 1; break; case 'd': delete = 1; break; case 'E': case 'e': encryption = optarg; break; case 'f': find = 1; break; case 'j': assoc = optarg; case 'k': keysize = optarg; break; case 'N': hash_pass = 0; break; case 'o': offset = optarg; break; case 'p': passfd = optarg; break; case 's': showdev = 1; break; case 'v': verbose = 1; break; case 128: /* --sizelimit */ sizelimit = optarg; break; default: usage(); } } if (argc == 1) { usage(); } else if (delete) { if (argc < optind+1 || encryption || offset || sizelimit || capacity || find || all || showdev || assoc || ro) usage(); } else if (find) { if (capacity || all || assoc || argc < optind || argc > optind+1) usage(); } else if (all) { if (argc > 2) usage(); } else if (assoc) { if (capacity || encryption || showdev || passfd || ro) usage(); } else if (capacity) { if (argc != optind + 1 || encryption || offset || sizelimit || showdev || ro) usage(); } else { if (argc < optind+1 || argc > optind+2) usage(); } if (offset && sscanf(offset, "%llu", &off) != 1) usage(); if (sizelimit && sscanf(sizelimit, "%llu", &slimit) != 1) usage(); if (all) return show_used_loop_devices(); else if (assoc) return show_associated_loop_devices(assoc, off, offset ? 1 : 0); else if (find) { device = find_unused_loop_device(); if (device == NULL) return -1; if (argc == optind) { if (verbose) printf(_("Loop device is %s\n"), device); printf("%s\n", device); return 0; } file = argv[optind]; } else if (!delete) { device = argv[optind]; if (argc == optind+1) file = NULL; else file = argv[optind+1]; } if (delete) { while (optind < argc) res += del_loop(argv[optind++]); } else if (capacity) { res = set_capacity(device); } else if (file == NULL) res = show_loop(device); else { if (passfd && sscanf(passfd, "%d", &pfd) != 1) usage(); if (keysize && sscanf(keysize,"%d",&keysz) != 1) usage(); do { res = set_loop(device, file, off, slimit, encryption, pfd, &ro, keysz, hash_pass); if (res == 2 && find) { if (verbose) printf(_("stolen loop=%s...trying again\n"), device); free(device); if (!(device = find_unused_loop_device())) return -1; } } while (find && res == 2); if (device) { if (res == 2) error(_("%s: %s: device is busy"), progname, device); else if (res == 0) { if (verbose) printf(_("Loop device is %s\n"), device); if (showdev && find) printf("%s\n", device); } } } return res; } #else /* LOOP_SET_FD not defined */ int main(int argc, char **argv) { fprintf(stderr, _("No loop support was available at compile time. " "Please recompile.\n")); return -1; } #endif /* !LOOP_SET_FD*/ #endif /* MAIN */