SYS_FUNC(add_key)
{
- if (entering(tcp)) {
- /* type */
- printstr(tcp, tcp->u_arg[0], -1);
- /* description */
- tprints(", ");
- printstr(tcp, tcp->u_arg[1], -1);
- /* payload */
- tprints(", ");
- printstr(tcp, tcp->u_arg[2], tcp->u_arg[3]);
- /* payload length */
- tprintf(", %lu, ", tcp->u_arg[3]);
- /* keyring serial number */
- print_keyring_serial_number(tcp->u_arg[4]);
- }
- return 0;
+ /* type */
+ printstr(tcp, tcp->u_arg[0], -1);
+ /* description */
+ tprints(", ");
+ printstr(tcp, tcp->u_arg[1], -1);
+ /* payload */
+ tprints(", ");
+ printstr(tcp, tcp->u_arg[2], tcp->u_arg[3]);
+ /* payload length */
+ tprintf(", %lu, ", tcp->u_arg[3]);
+ /* keyring serial number */
+ print_keyring_serial_number(tcp->u_arg[4]);
+
+ return RVAL_DECODED;
}
SYS_FUNC(request_key)
{
- if (entering(tcp)) {
- /* type */
- printstr(tcp, tcp->u_arg[0], -1);
- /* description */
- tprints(", ");
- printstr(tcp, tcp->u_arg[1], -1);
- /* callout_info */
- tprints(", ");
- printstr(tcp, tcp->u_arg[2], -1);
- /* keyring serial number */
- tprints(", ");
- print_keyring_serial_number(tcp->u_arg[3]);
- }
- return 0;
+ /* type */
+ printstr(tcp, tcp->u_arg[0], -1);
+ /* description */
+ tprints(", ");
+ printstr(tcp, tcp->u_arg[1], -1);
+ /* callout_info */
+ tprints(", ");
+ printstr(tcp, tcp->u_arg[2], -1);
+ /* keyring serial number */
+ tprints(", ");
+ print_keyring_serial_number(tcp->u_arg[3]);
+
+ return RVAL_DECODED;
}
-static int
+static void
keyctl_get_keyring_id(struct tcb *tcp, key_serial_t id, int create)
{
- if (entering(tcp)) {
- tprints(", ");
- print_keyring_serial_number(id);
- tprintf(", %d", create);
- }
- return 0;
-}
-
-static int
-keyctl_join_session_keyring(struct tcb *tcp, long addr)
-{
- if (entering(tcp)) {
- tprints(", ");
- printstr(tcp, addr, -1);
- }
- return 0;
+ print_keyring_serial_number(id);
+ tprintf(", %d", create);
}
-static int
+static void
keyctl_update_key(struct tcb *tcp, key_serial_t id, long addr, long len)
{
- if (entering(tcp)) {
- tprints(", ");
- print_keyring_serial_number(id);
- tprints(", ");
- printstr(tcp, addr, len);
- tprintf(", %lu", len);
- }
- return 0;
+ print_keyring_serial_number(id);
+ tprints(", ");
+ printstr(tcp, addr, len);
+ tprintf(", %lu", len);
}
-static int
-keyctl_handle_key(struct tcb *tcp, key_serial_t id)
-{
- if (entering(tcp)) {
- tprints(", ");
- print_keyring_serial_number(id);
- }
- return 0;
-}
-
-static int
+static void
keyctl_handle_key_key(struct tcb *tcp, key_serial_t id1, key_serial_t id2)
{
- if (entering(tcp)) {
- tprints(", ");
- print_keyring_serial_number(id1);
- tprints(", ");
- print_keyring_serial_number(id2);
- }
- return 0;
+ print_keyring_serial_number(id1);
+ tprints(", ");
+ print_keyring_serial_number(id2);
}
-static int
+static void
keyctl_read_key(struct tcb *tcp, key_serial_t id, long addr, long len)
{
if (entering(tcp)) {
- tprints(", ");
print_keyring_serial_number(id);
tprints(", ");
} else {
}
tprintf(", %lu", len);
}
- return 0;
}
-static int
+static void
keyctl_keyring_search(struct tcb *tcp, key_serial_t id1, long addr1,
long addr2, key_serial_t id2)
{
- if (entering(tcp)) {
- tprints(", ");
- print_keyring_serial_number(id1);
- tprints(", ");
- printstr(tcp, addr1, -1);
- tprints(", ");
- printstr(tcp, addr2, -1);
- tprints(", ");
- print_keyring_serial_number(id2);
- }
- return 0;
+ print_keyring_serial_number(id1);
+ tprints(", ");
+ printstr(tcp, addr1, -1);
+ tprints(", ");
+ printstr(tcp, addr2, -1);
+ tprints(", ");
+ print_keyring_serial_number(id2);
}
-static int
+static void
keyctl_chown_key(struct tcb *tcp, key_serial_t id, int user, int group)
{
- if (entering(tcp)) {
- tprints(", ");
- print_keyring_serial_number(id);
- tprintf(", %d, %d", user, group);
- }
- return 0;
+ print_keyring_serial_number(id);
+ tprintf(", %d, %d", user, group);
}
-static int
+static void
keyctl_instantiate_key(struct tcb *tcp, key_serial_t id1, long addr,
long len, key_serial_t id2)
{
- if (entering(tcp)) {
- tprints(", ");
- print_keyring_serial_number(id1);
- tprints(", ");
- printstr(tcp, addr, len);
- tprintf(", %lu, ", len);
- print_keyring_serial_number(id2);
- }
- return 0;
+ print_keyring_serial_number(id1);
+ tprints(", ");
+ printstr(tcp, addr, len);
+ tprintf(", %lu, ", len);
+ print_keyring_serial_number(id2);
}
-static int
+static void
keyctl_instantiate_key_iov(struct tcb *tcp, key_serial_t id1,
long addr, long len, key_serial_t id2)
{
- if (entering(tcp)) {
- tprints(", ");
- print_keyring_serial_number(id1);
- tprints(", ");
- tprint_iov(tcp, len, addr, 1);
- tprintf(", %lu, ", len);
- print_keyring_serial_number(id2);
- }
- return 0;
+ print_keyring_serial_number(id1);
+ tprints(", ");
+ tprint_iov(tcp, len, addr, 1);
+ tprintf(", %lu, ", len);
+ print_keyring_serial_number(id2);
}
-static int
+static void
keyctl_negate_key(struct tcb *tcp, key_serial_t id1, unsigned timeout,
key_serial_t id2)
{
- if (entering(tcp)) {
- tprints(", ");
- print_keyring_serial_number(id1);
- tprintf(", %u, ", timeout);
- print_keyring_serial_number(id2);
- }
- return 0;
+ print_keyring_serial_number(id1);
+ tprintf(", %u, ", timeout);
+ print_keyring_serial_number(id2);
}
-static int
+static void
keyctl_reject_key(struct tcb *tcp, key_serial_t id1, unsigned timeout,
unsigned error, key_serial_t id2)
{
- if (entering(tcp)) {
- tprints(", ");
- print_keyring_serial_number(id1);
- tprintf(", %u, %u, ", timeout, error);
- print_keyring_serial_number(id2);
- }
- return 0;
+ print_keyring_serial_number(id1);
+ tprintf(", %u, %u, ", timeout, error);
+ print_keyring_serial_number(id2);
}
-static int
+static void
keyctl_set_timeout(struct tcb *tcp, key_serial_t id, unsigned timeout)
{
- if (entering(tcp)) {
- tprints(", ");
- print_keyring_serial_number(id);
- tprintf(", %u", timeout);
- }
- return 0;
+ print_keyring_serial_number(id);
+ tprintf(", %u", timeout);
}
-static int
+static void
keyctl_get_persistent(struct tcb *tcp, int uid, key_serial_t id)
{
- if (entering(tcp)) {
- tprintf(", %d, ", uid);
- print_keyring_serial_number(id);
- }
- return 0;
+ tprintf("%d, ", uid);
+ print_keyring_serial_number(id);
}
#include "xlat/key_perms.h"
-static int
+static void
keyctl_setperm_key(struct tcb *tcp, key_serial_t id, uint32_t perm)
{
- if (entering(tcp)) {
- tprints(", ");
- print_keyring_serial_number(id);
- tprints(", ");
- printflags(key_perms, perm, "KEY_???");
- }
- return 0;
+ print_keyring_serial_number(id);
+ tprints(", ");
+ printflags(key_perms, perm, "KEY_???");
}
#include "xlat/key_reqkeys.h"
-
-static int
-keyctl_set_reqkey_keyring(struct tcb *tcp, int reqkey)
-{
- if (entering(tcp)) {
- tprints(", ");
- printxval(key_reqkeys, reqkey, "KEY_REQKEY_DEFL_???");
- }
- return 0;
-}
-
#include "xlat/keyctl_commands.h"
SYS_FUNC(keyctl)
{
int cmd = tcp->u_arg[0];
- if (entering(tcp))
+ if (entering(tcp)) {
printxval(keyctl_commands, cmd, "KEYCTL_???");
+ tprints(", ");
+ }
switch (cmd) {
case KEYCTL_GET_KEYRING_ID:
- return keyctl_get_keyring_id(tcp, tcp->u_arg[1], tcp->u_arg[2]);
+ keyctl_get_keyring_id(tcp, tcp->u_arg[1], tcp->u_arg[2]);
+ break;
case KEYCTL_JOIN_SESSION_KEYRING:
- return keyctl_join_session_keyring(tcp, tcp->u_arg[1]);
+ printstr(tcp, tcp->u_arg[1], -1);
+ break;
case KEYCTL_UPDATE:
- return keyctl_update_key(tcp, tcp->u_arg[1],
- tcp->u_arg[2], tcp->u_arg[3]);
+ keyctl_update_key(tcp, tcp->u_arg[1],
+ tcp->u_arg[2], tcp->u_arg[3]);
+ break;
case KEYCTL_REVOKE:
case KEYCTL_CLEAR:
case KEYCTL_INVALIDATE:
case KEYCTL_ASSUME_AUTHORITY:
- return keyctl_handle_key(tcp, tcp->u_arg[1]);
+ print_keyring_serial_number(tcp->u_arg[1]);
+ break;
case KEYCTL_LINK:
case KEYCTL_UNLINK:
- return keyctl_handle_key_key(tcp, tcp->u_arg[1], tcp->u_arg[2]);
+ keyctl_handle_key_key(tcp, tcp->u_arg[1], tcp->u_arg[2]);
+ break;
case KEYCTL_DESCRIBE:
case KEYCTL_READ:
case KEYCTL_GET_SECURITY:
- return keyctl_read_key(tcp, tcp->u_arg[1],
- tcp->u_arg[2], tcp->u_arg[3]);
+ keyctl_read_key(tcp, tcp->u_arg[1],
+ tcp->u_arg[2], tcp->u_arg[3]);
+ return 0;
case KEYCTL_SEARCH:
- return keyctl_keyring_search(tcp, tcp->u_arg[1], tcp->u_arg[2],
- tcp->u_arg[3], tcp->u_arg[4]);
+ keyctl_keyring_search(tcp, tcp->u_arg[1], tcp->u_arg[2],
+ tcp->u_arg[3], tcp->u_arg[4]);
+ break;
case KEYCTL_CHOWN:
- return keyctl_chown_key(tcp, tcp->u_arg[1],
- tcp->u_arg[2], tcp->u_arg[3]);
+ keyctl_chown_key(tcp, tcp->u_arg[1],
+ tcp->u_arg[2], tcp->u_arg[3]);
+ break;
case KEYCTL_SETPERM:
- return keyctl_setperm_key(tcp, tcp->u_arg[1], tcp->u_arg[2]);
+ keyctl_setperm_key(tcp, tcp->u_arg[1], tcp->u_arg[2]);
+ break;
case KEYCTL_INSTANTIATE:
- return keyctl_instantiate_key(tcp, tcp->u_arg[1], tcp->u_arg[2],
- tcp->u_arg[3], tcp->u_arg[4]);
+ keyctl_instantiate_key(tcp, tcp->u_arg[1], tcp->u_arg[2],
+ tcp->u_arg[3], tcp->u_arg[4]);
+ break;
case KEYCTL_NEGATE:
- return keyctl_negate_key(tcp, tcp->u_arg[1],
- tcp->u_arg[2], tcp->u_arg[3]);
+ keyctl_negate_key(tcp, tcp->u_arg[1],
+ tcp->u_arg[2], tcp->u_arg[3]);
+ break;
case KEYCTL_SET_REQKEY_KEYRING:
- return keyctl_set_reqkey_keyring(tcp, tcp->u_arg[1]);
+ printxval(key_reqkeys, tcp->u_arg[1], "KEY_REQKEY_DEFL_???");
+ break;
case KEYCTL_SET_TIMEOUT:
- return keyctl_set_timeout(tcp, tcp->u_arg[1], tcp->u_arg[2]);
+ keyctl_set_timeout(tcp, tcp->u_arg[1], tcp->u_arg[2]);
+ break;
case KEYCTL_SESSION_TO_PARENT:
- return 0;
+ break;
case KEYCTL_REJECT:
- return keyctl_reject_key(tcp, tcp->u_arg[1], tcp->u_arg[2],
- tcp->u_arg[3], tcp->u_arg[4]);
+ keyctl_reject_key(tcp, tcp->u_arg[1], tcp->u_arg[2],
+ tcp->u_arg[3], tcp->u_arg[4]);
+ break;
case KEYCTL_INSTANTIATE_IOV:
- return keyctl_instantiate_key_iov(tcp, tcp->u_arg[1],
- tcp->u_arg[2], tcp->u_arg[3],
- tcp->u_arg[4]);
+ keyctl_instantiate_key_iov(tcp, tcp->u_arg[1],
+ tcp->u_arg[2], tcp->u_arg[3],
+ tcp->u_arg[4]);
+ break;
case KEYCTL_GET_PERSISTENT:
- return keyctl_get_persistent(tcp, tcp->u_arg[1], tcp->u_arg[2]);
+ keyctl_get_persistent(tcp, tcp->u_arg[1], tcp->u_arg[2]);
+ break;
default:
- if (entering(tcp))
- tprintf(", %#lx, %#lx, %#lx, %#lx",
- tcp->u_arg[1], tcp->u_arg[2],
- tcp->u_arg[3], tcp->u_arg[4]);
+ tprintf("%#lx, %#lx, %#lx, %#lx",
+ tcp->u_arg[1], tcp->u_arg[2],
+ tcp->u_arg[3], tcp->u_arg[4]);
+ break;
}
- return 0;
+ return RVAL_DECODED;
}