]>
Commit | Line | Data |
---|---|---|
1c79356b | 1 | /* |
935ed37a | 2 | * Copyright (c) 2000-2008 Apple Inc. All rights reserved. |
5d5c5d0d | 3 | * |
2d21ac55 | 4 | * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ |
1c79356b | 5 | * |
2d21ac55 A |
6 | * This file contains Original Code and/or Modifications of Original Code |
7 | * as defined in and that are subject to the Apple Public Source License | |
8 | * Version 2.0 (the 'License'). You may not use this file except in | |
9 | * compliance with the License. The rights granted to you under the License | |
10 | * may not be used to create, or enable the creation or redistribution of, | |
11 | * unlawful or unlicensed copies of an Apple operating system, or to | |
12 | * circumvent, violate, or enable the circumvention or violation of, any | |
13 | * terms of an Apple operating system software license agreement. | |
8f6c56a5 | 14 | * |
2d21ac55 A |
15 | * Please obtain a copy of the License at |
16 | * http://www.opensource.apple.com/apsl/ and read it before using this file. | |
17 | * | |
18 | * The Original Code and all software distributed under the License are | |
19 | * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER | |
8f6c56a5 A |
20 | * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, |
21 | * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, | |
2d21ac55 A |
22 | * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. |
23 | * Please see the License for the specific language governing rights and | |
24 | * limitations under the License. | |
8f6c56a5 | 25 | * |
2d21ac55 | 26 | * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ |
1c79356b A |
27 | */ |
28 | ||
29 | /* | |
30 | * hfs_endian.c | |
31 | * | |
32 | * This file implements endian swapping routines for the HFS/HFS Plus | |
33 | * volume format. | |
34 | */ | |
35 | ||
1c79356b A |
36 | #include "hfs_endian.h" |
37 | #include "hfs_dbg.h" | |
3a60a9f5 | 38 | #include "hfscommon/headers/BTreesPrivate.h" |
1c79356b A |
39 | |
40 | #undef ENDIAN_DEBUG | |
41 | ||
3a60a9f5 A |
42 | /* |
43 | * Internal swapping routines | |
44 | * | |
45 | * These routines handle swapping the records of leaf and index nodes. The | |
46 | * layout of the keys and records varies depending on the kind of B-tree | |
47 | * (determined by fileID). | |
48 | * | |
49 | * The direction parameter must be kSwapBTNodeBigToHost or kSwapBTNodeHostToBig. | |
50 | * The kSwapBTNodeHeaderRecordOnly "direction" is not valid for these routines. | |
51 | */ | |
6d2010ae A |
52 | int hfs_swap_HFSPlusBTInternalNode (BlockDescriptor *src, HFSCatalogNodeID fileID, enum HFSBTSwapDirection direction); |
53 | int hfs_swap_HFSBTInternalNode (BlockDescriptor *src, HFSCatalogNodeID fileID, enum HFSBTSwapDirection direction); | |
54 | void hfs_swap_HFSPlusForkData (HFSPlusForkData *src); | |
1c79356b A |
55 | |
56 | /* | |
57 | * hfs_swap_HFSPlusForkData | |
1c79356b | 58 | */ |
6d2010ae | 59 | void |
1c79356b A |
60 | hfs_swap_HFSPlusForkData ( |
61 | HFSPlusForkData *src | |
62 | ) | |
63 | { | |
64 | int i; | |
65 | ||
1c79356b A |
66 | src->logicalSize = SWAP_BE64 (src->logicalSize); |
67 | ||
68 | src->clumpSize = SWAP_BE32 (src->clumpSize); | |
69 | src->totalBlocks = SWAP_BE32 (src->totalBlocks); | |
70 | ||
71 | for (i = 0; i < kHFSPlusExtentDensity; i++) { | |
72 | src->extents[i].startBlock = SWAP_BE32 (src->extents[i].startBlock); | |
73 | src->extents[i].blockCount = SWAP_BE32 (src->extents[i].blockCount); | |
74 | } | |
75 | } | |
76 | ||
77 | /* | |
78 | * hfs_swap_BTNode | |
79 | * | |
80 | * NOTE: This operation is not naturally symmetric. | |
81 | * We have to determine which way we're swapping things. | |
82 | */ | |
83 | int | |
84 | hfs_swap_BTNode ( | |
85 | BlockDescriptor *src, | |
3a60a9f5 | 86 | vnode_t vp, |
935ed37a A |
87 | enum HFSBTSwapDirection direction, |
88 | u_int8_t allow_empty_node | |
1c79356b A |
89 | ) |
90 | { | |
91 | BTNodeDescriptor *srcDesc = src->buffer; | |
2d21ac55 | 92 | u_int16_t *srcOffs = NULL; |
3a60a9f5 | 93 | BTreeControlBlockPtr btcb = (BTreeControlBlockPtr)VTOF(vp)->fcbBTCBPtr; |
b0d623f7 | 94 | u_int16_t i; /* index to match srcDesc->numRecords */ |
1c79356b A |
95 | int error = 0; |
96 | ||
1c79356b | 97 | #ifdef ENDIAN_DEBUG |
3a60a9f5 | 98 | if (direction == kSwapBTNodeBigToHost) { |
b0d623f7 | 99 | printf ("hfs: BE -> Native Swap\n"); |
3a60a9f5 | 100 | } else if (direction == kSwapBTNodeHostToBig) { |
b0d623f7 | 101 | printf ("hfs: Native -> BE Swap\n"); |
3a60a9f5 | 102 | } else if (direction == kSwapBTNodeHeaderRecordOnly) { |
b0d623f7 | 103 | printf ("hfs: Not swapping descriptors\n"); |
1c79356b | 104 | } else { |
3a60a9f5 | 105 | panic ("hfs_swap_BTNode: This is impossible"); |
1c79356b A |
106 | } |
107 | #endif | |
108 | ||
3a60a9f5 A |
109 | /* |
110 | * If we are doing a swap from on-disk to in-memory, then swap the node | |
111 | * descriptor and record offsets before we need to use them. | |
112 | */ | |
113 | if (direction == kSwapBTNodeBigToHost) { | |
1c79356b A |
114 | srcDesc->fLink = SWAP_BE32 (srcDesc->fLink); |
115 | srcDesc->bLink = SWAP_BE32 (srcDesc->bLink); | |
116 | ||
3a60a9f5 A |
117 | /* |
118 | * When first opening a BTree, we have to read the header node before the | |
119 | * control block is initialized. In this case, totalNodes will be zero, | |
593a1d5f A |
120 | * so skip the bounds checking. Also, we should ignore the header node when |
121 | * checking for invalid forwards and backwards links, since the header node's | |
122 | * links can point back to itself legitimately. | |
3a60a9f5 A |
123 | */ |
124 | if (btcb->totalNodes != 0) { | |
125 | if (srcDesc->fLink >= btcb->totalNodes) { | |
2d21ac55 | 126 | printf("hfs_swap_BTNode: invalid forward link (0x%08x >= 0x%08x)\n", srcDesc->fLink, btcb->totalNodes); |
3a60a9f5 A |
127 | error = fsBTInvalidHeaderErr; |
128 | goto fail; | |
129 | } | |
130 | if (srcDesc->bLink >= btcb->totalNodes) { | |
2d21ac55 | 131 | printf("hfs_swap_BTNode: invalid backward link (0x%08x >= 0x%08x)\n", srcDesc->bLink, btcb->totalNodes); |
3a60a9f5 A |
132 | error = fsBTInvalidHeaderErr; |
133 | goto fail; | |
134 | } | |
593a1d5f A |
135 | |
136 | if ((src->blockNum != 0) && (srcDesc->fLink == (u_int32_t) src->blockNum)) { | |
137 | printf("hfs_swap_BTNode: invalid forward link (0x%08x == 0x%08x)\n", | |
138 | srcDesc->fLink, (u_int32_t) src->blockNum); | |
139 | error = fsBTInvalidHeaderErr; | |
140 | goto fail; | |
141 | } | |
142 | if ((src->blockNum != 0) && (srcDesc->bLink == (u_int32_t) src->blockNum)) { | |
143 | printf("hfs_swap_BTNode: invalid backward link (0x%08x == 0x%08x)\n", | |
144 | srcDesc->bLink, (u_int32_t) src->blockNum); | |
145 | error = fsBTInvalidHeaderErr; | |
146 | goto fail; | |
147 | } | |
148 | ||
b0d623f7 | 149 | |
3a60a9f5 A |
150 | } |
151 | ||
152 | /* | |
153 | * Check srcDesc->kind. Don't swap it because it's only one byte. | |
154 | */ | |
155 | if (srcDesc->kind < kBTLeafNode || srcDesc->kind > kBTMapNode) { | |
156 | printf("hfs_swap_BTNode: invalid node kind (%d)\n", srcDesc->kind); | |
157 | error = fsBTInvalidHeaderErr; | |
158 | goto fail; | |
159 | } | |
160 | ||
161 | /* | |
162 | * Check srcDesc->height. Don't swap it because it's only one byte. | |
163 | */ | |
6d2010ae | 164 | if (srcDesc->height > kMaxTreeDepth) { |
3a60a9f5 A |
165 | printf("hfs_swap_BTNode: invalid node height (%d)\n", srcDesc->height); |
166 | error = fsBTInvalidHeaderErr; | |
167 | goto fail; | |
168 | } | |
169 | ||
1c79356b A |
170 | /* Don't swap srcDesc->reserved */ |
171 | ||
172 | srcDesc->numRecords = SWAP_BE16 (srcDesc->numRecords); | |
173 | ||
3a60a9f5 A |
174 | /* |
175 | * Swap the node offsets (including the free space one!). | |
176 | */ | |
2d21ac55 | 177 | srcOffs = (u_int16_t *)((char *)src->buffer + (src->blockSize - ((srcDesc->numRecords + 1) * sizeof (u_int16_t)))); |
1c79356b | 178 | |
3a60a9f5 A |
179 | /* |
180 | * Sanity check that the record offsets are within the node itself. | |
181 | */ | |
182 | if ((char *)srcOffs > ((char *)src->buffer + src->blockSize) || | |
183 | (char *)srcOffs < ((char *)src->buffer + sizeof(BTNodeDescriptor))) { | |
184 | printf("hfs_swap_BTNode: invalid record count (0x%04X)\n", srcDesc->numRecords); | |
185 | error = fsBTInvalidHeaderErr; | |
186 | goto fail; | |
1c79356b A |
187 | } |
188 | ||
3a60a9f5 A |
189 | /* |
190 | * Swap and sanity check each of the record offsets. | |
191 | */ | |
192 | for (i = 0; i <= srcDesc->numRecords; i++) { | |
1c79356b A |
193 | srcOffs[i] = SWAP_BE16 (srcOffs[i]); |
194 | ||
3a60a9f5 A |
195 | /* |
196 | * Sanity check: must be even, and within the node itself. | |
197 | * | |
198 | * We may be called to swap an unused node, which contains all zeroes. | |
935ed37a A |
199 | * Unused nodes are expected only when allow_empty_node is true. |
200 | * If it is false and record offset is zero, return error. | |
3a60a9f5 | 201 | */ |
935ed37a A |
202 | if ((srcOffs[i] & 1) || ( |
203 | (allow_empty_node == false) && (srcOffs[i] == 0)) || | |
204 | (srcOffs[i] < sizeof(BTNodeDescriptor) && srcOffs[i] != 0) || | |
205 | (srcOffs[i] >= src->blockSize)) { | |
3a60a9f5 A |
206 | printf("hfs_swap_BTNode: record #%d invalid offset (0x%04X)\n", srcDesc->numRecords-i-1, srcOffs[i]); |
207 | error = fsBTInvalidHeaderErr; | |
208 | goto fail; | |
209 | } | |
210 | ||
211 | /* | |
212 | * Make sure the offsets are strictly increasing. Note that we're looping over | |
213 | * them backwards, hence the order in the comparison. | |
214 | */ | |
215 | if ((i != 0) && (srcOffs[i] >= srcOffs[i-1])) { | |
216 | printf("hfs_swap_BTNode: offsets %d and %d out of order (0x%04X, 0x%04X)\n", | |
217 | srcDesc->numRecords-i-1, srcDesc->numRecords-i, srcOffs[i], srcOffs[i-1]); | |
218 | error = fsBTInvalidHeaderErr; | |
219 | goto fail; | |
1c79356b A |
220 | } |
221 | } | |
222 | } | |
223 | ||
3a60a9f5 A |
224 | /* |
225 | * Swap the records (ordered by frequency of access) | |
226 | */ | |
1c79356b A |
227 | if ((srcDesc->kind == kBTIndexNode) || |
228 | (srcDesc-> kind == kBTLeafNode)) { | |
229 | ||
3a60a9f5 A |
230 | if (VTOVCB(vp)->vcbSigWord == kHFSPlusSigWord) { |
231 | error = hfs_swap_HFSPlusBTInternalNode (src, VTOC(vp)->c_fileid, direction); | |
1c79356b | 232 | } else { |
3a60a9f5 | 233 | error = hfs_swap_HFSBTInternalNode (src, VTOC(vp)->c_fileid, direction); |
1c79356b A |
234 | } |
235 | ||
3a60a9f5 A |
236 | if (error) goto fail; |
237 | ||
1c79356b A |
238 | } else if (srcDesc-> kind == kBTMapNode) { |
239 | /* Don't swap the bitmaps, they'll be done in the bitmap routines */ | |
240 | ||
1c79356b | 241 | } else if (srcDesc-> kind == kBTHeaderNode) { |
3a60a9f5 A |
242 | /* The header's offset is hard-wired because we cannot trust the offset pointers. */ |
243 | BTHeaderRec *srcHead = (BTHeaderRec *)((char *)src->buffer + sizeof(BTNodeDescriptor)); | |
1c79356b A |
244 | |
245 | srcHead->treeDepth = SWAP_BE16 (srcHead->treeDepth); | |
246 | ||
247 | srcHead->rootNode = SWAP_BE32 (srcHead->rootNode); | |
248 | srcHead->leafRecords = SWAP_BE32 (srcHead->leafRecords); | |
249 | srcHead->firstLeafNode = SWAP_BE32 (srcHead->firstLeafNode); | |
250 | srcHead->lastLeafNode = SWAP_BE32 (srcHead->lastLeafNode); | |
251 | ||
252 | srcHead->nodeSize = SWAP_BE16 (srcHead->nodeSize); | |
253 | srcHead->maxKeyLength = SWAP_BE16 (srcHead->maxKeyLength); | |
254 | ||
255 | srcHead->totalNodes = SWAP_BE32 (srcHead->totalNodes); | |
256 | srcHead->freeNodes = SWAP_BE32 (srcHead->freeNodes); | |
257 | ||
258 | srcHead->clumpSize = SWAP_BE32 (srcHead->clumpSize); | |
259 | srcHead->attributes = SWAP_BE32 (srcHead->attributes); | |
260 | ||
261 | /* Don't swap srcHead->reserved1 */ | |
3a60a9f5 | 262 | /* Don't swap srcHead->btreeType; it's only one byte */ |
1c79356b A |
263 | /* Don't swap srcHead->reserved2 */ |
264 | /* Don't swap srcHead->reserved3 */ | |
265 | /* Don't swap bitmap */ | |
266 | } | |
267 | ||
3a60a9f5 A |
268 | /* |
269 | * If we are doing a swap from in-memory to on-disk, then swap the node | |
270 | * descriptor and record offsets after we're done using them. | |
271 | */ | |
272 | if (direction == kSwapBTNodeHostToBig) { | |
273 | /* | |
cf7d32b8 | 274 | * Sanity check and swap the forward and backward links. |
593a1d5f A |
275 | * Ignore the header node since its forward and backwards links can legitimately |
276 | * point to itself. | |
3a60a9f5 A |
277 | */ |
278 | if (srcDesc->fLink >= btcb->totalNodes) { | |
cf7d32b8 | 279 | panic("hfs_UNswap_BTNode: invalid forward link (0x%08X)\n", srcDesc->fLink); |
3a60a9f5 A |
280 | error = fsBTInvalidHeaderErr; |
281 | goto fail; | |
282 | } | |
593a1d5f A |
283 | if ((src->blockNum != 0) && (srcDesc->fLink == (u_int32_t) src->blockNum)) { |
284 | panic ("hfs_UNswap_BTNode: invalid forward link (0x%08x == 0x%08x)\n", | |
285 | srcDesc->fLink, (u_int32_t) src->blockNum); | |
286 | error = fsBTInvalidHeaderErr; | |
287 | goto fail; | |
288 | } | |
289 | ||
3a60a9f5 | 290 | if (srcDesc->bLink >= btcb->totalNodes) { |
cf7d32b8 | 291 | panic("hfs_UNswap_BTNode: invalid backward link (0x%08X)\n", srcDesc->bLink); |
3a60a9f5 A |
292 | error = fsBTInvalidHeaderErr; |
293 | goto fail; | |
294 | } | |
593a1d5f A |
295 | if ((src->blockNum != 0) && (srcDesc->bLink == (u_int32_t) src->blockNum)) { |
296 | panic ("hfs_UNswap_BTNode: invalid backward link (0x%08x == 0x%08x)\n", | |
297 | srcDesc->bLink, (u_int32_t) src->blockNum); | |
298 | error = fsBTInvalidHeaderErr; | |
299 | goto fail; | |
300 | } | |
301 | ||
302 | ||
1c79356b A |
303 | srcDesc->fLink = SWAP_BE32 (srcDesc->fLink); |
304 | srcDesc->bLink = SWAP_BE32 (srcDesc->bLink); | |
305 | ||
3a60a9f5 A |
306 | /* |
307 | * Check srcDesc->kind. Don't swap it because it's only one byte. | |
308 | */ | |
309 | if (srcDesc->kind < kBTLeafNode || srcDesc->kind > kBTMapNode) { | |
cf7d32b8 | 310 | panic("hfs_UNswap_BTNode: invalid node kind (%d)\n", srcDesc->kind); |
3a60a9f5 A |
311 | error = fsBTInvalidHeaderErr; |
312 | goto fail; | |
313 | } | |
314 | ||
315 | /* | |
316 | * Check srcDesc->height. Don't swap it because it's only one byte. | |
317 | */ | |
6d2010ae | 318 | if (srcDesc->height > kMaxTreeDepth) { |
cf7d32b8 | 319 | panic("hfs_UNswap_BTNode: invalid node height (%d)\n", srcDesc->height); |
3a60a9f5 A |
320 | error = fsBTInvalidHeaderErr; |
321 | goto fail; | |
322 | } | |
323 | ||
1c79356b A |
324 | /* Don't swap srcDesc->reserved */ |
325 | ||
3a60a9f5 A |
326 | /* |
327 | * Swap the node offsets (including the free space one!). | |
328 | */ | |
2d21ac55 | 329 | srcOffs = (u_int16_t *)((char *)src->buffer + (src->blockSize - ((srcDesc->numRecords + 1) * sizeof (u_int16_t)))); |
1c79356b | 330 | |
3a60a9f5 A |
331 | /* |
332 | * Sanity check that the record offsets are within the node itself. | |
333 | */ | |
334 | if ((char *)srcOffs > ((char *)src->buffer + src->blockSize) || | |
335 | (char *)srcOffs < ((char *)src->buffer + sizeof(BTNodeDescriptor))) { | |
cf7d32b8 | 336 | panic("hfs_UNswap_BTNode: invalid record count (0x%04X)\n", srcDesc->numRecords); |
3a60a9f5 A |
337 | error = fsBTInvalidHeaderErr; |
338 | goto fail; | |
1c79356b A |
339 | } |
340 | ||
3a60a9f5 A |
341 | /* |
342 | * Swap and sanity check each of the record offsets. | |
343 | */ | |
344 | for (i = 0; i <= srcDesc->numRecords; i++) { | |
345 | /* | |
346 | * Sanity check: must be even, and within the node itself. | |
347 | * | |
348 | * We may be called to swap an unused node, which contains all zeroes. | |
935ed37a | 349 | * This can happen when the last record from a node gets deleted. |
3a60a9f5 | 350 | * This is why we allow the record offset to be zero. |
935ed37a A |
351 | * Unused nodes are expected only when allow_empty_node is true |
352 | * (the caller should set it to true for kSwapBTNodeBigToHost). | |
3a60a9f5 | 353 | */ |
935ed37a A |
354 | if ((srcOffs[i] & 1) || |
355 | ((allow_empty_node == false) && (srcOffs[i] == 0)) || | |
356 | (srcOffs[i] < sizeof(BTNodeDescriptor) && srcOffs[i] != 0) || | |
357 | (srcOffs[i] >= src->blockSize)) { | |
cf7d32b8 | 358 | panic("hfs_UNswap_BTNode: record #%d invalid offset (0x%04X)\n", srcDesc->numRecords-i-1, srcOffs[i]); |
3a60a9f5 A |
359 | error = fsBTInvalidHeaderErr; |
360 | goto fail; | |
361 | } | |
362 | ||
363 | /* | |
364 | * Make sure the offsets are strictly increasing. Note that we're looping over | |
365 | * them backwards, hence the order in the comparison. | |
366 | */ | |
367 | if ((i < srcDesc->numRecords) && (srcOffs[i+1] >= srcOffs[i])) { | |
cf7d32b8 | 368 | panic("hfs_UNswap_BTNode: offsets %d and %d out of order (0x%04X, 0x%04X)\n", |
3a60a9f5 A |
369 | srcDesc->numRecords-i-2, srcDesc->numRecords-i-1, srcOffs[i+1], srcOffs[i]); |
370 | error = fsBTInvalidHeaderErr; | |
371 | goto fail; | |
1c79356b A |
372 | } |
373 | ||
374 | srcOffs[i] = SWAP_BE16 (srcOffs[i]); | |
375 | } | |
376 | ||
377 | srcDesc->numRecords = SWAP_BE16 (srcDesc->numRecords); | |
378 | } | |
3a60a9f5 A |
379 | |
380 | fail: | |
381 | if (error) { | |
382 | /* | |
383 | * Log some useful information about where the corrupt node is. | |
384 | */ | |
b0d623f7 | 385 | printf("hfs: node=%lld fileID=%u volume=%s device=%s\n", src->blockNum, VTOC(vp)->c_fileid, |
3a60a9f5 | 386 | VTOVCB(vp)->vcbVN, vfs_statfs(vnode_mount(vp))->f_mntfromname); |
2d21ac55 | 387 | hfs_mark_volume_inconsistent(VTOVCB(vp)); |
3a60a9f5 A |
388 | } |
389 | ||
1c79356b A |
390 | return (error); |
391 | } | |
392 | ||
6d2010ae | 393 | int |
1c79356b A |
394 | hfs_swap_HFSPlusBTInternalNode ( |
395 | BlockDescriptor *src, | |
396 | HFSCatalogNodeID fileID, | |
3a60a9f5 | 397 | enum HFSBTSwapDirection direction |
1c79356b A |
398 | ) |
399 | { | |
400 | BTNodeDescriptor *srcDesc = src->buffer; | |
2d21ac55 A |
401 | u_int16_t *srcOffs = (u_int16_t *)((char *)src->buffer + (src->blockSize - (srcDesc->numRecords * sizeof (u_int16_t)))); |
402 | char *nextRecord; /* Points to start of record following current one */ | |
403 | ||
404 | /* | |
405 | * i is an int32 because it needs to be negative to index the offset to free space. | |
406 | * srcDesc->numRecords is a u_int16_t and is unlikely to become 32-bit so this should be ok. | |
407 | */ | |
408 | ||
409 | int32_t i; | |
410 | u_int32_t j; | |
1c79356b | 411 | |
1c79356b A |
412 | if (fileID == kHFSExtentsFileID) { |
413 | HFSPlusExtentKey *srcKey; | |
414 | HFSPlusExtentDescriptor *srcRec; | |
3a60a9f5 | 415 | size_t recordSize; /* Size of the data part of the record, or node number for index nodes */ |
1c79356b | 416 | |
3a60a9f5 | 417 | if (srcDesc->kind == kBTIndexNode) |
2d21ac55 | 418 | recordSize = sizeof(u_int32_t); |
3a60a9f5 A |
419 | else |
420 | recordSize = sizeof(HFSPlusExtentDescriptor); | |
421 | ||
1c79356b | 422 | for (i = 0; i < srcDesc->numRecords; i++) { |
3a60a9f5 | 423 | /* Point to the start of the record we're currently checking. */ |
1c79356b | 424 | srcKey = (HFSPlusExtentKey *)((char *)src->buffer + srcOffs[i]); |
3a60a9f5 A |
425 | |
426 | /* | |
427 | * Point to start of next (larger offset) record. We'll use this | |
428 | * to be sure the current record doesn't overflow into the next | |
429 | * record. | |
430 | */ | |
431 | nextRecord = (char *)src->buffer + srcOffs[i-1]; | |
1c79356b | 432 | |
3a60a9f5 A |
433 | /* |
434 | * Make sure the key and data are within the buffer. Since both key | |
435 | * and data are fixed size, this is relatively easy. Note that this | |
436 | * relies on the keyLength being a constant; we verify the keyLength | |
437 | * below. | |
438 | */ | |
439 | if ((char *)srcKey + sizeof(HFSPlusExtentKey) + recordSize > nextRecord) { | |
cf7d32b8 A |
440 | if (direction == kSwapBTNodeHostToBig) { |
441 | panic("hfs_swap_HFSPlusBTInternalNode: extents key #%d offset too big (0x%04X)\n", srcDesc->numRecords-i-1, srcOffs[i]); | |
442 | } else { | |
443 | printf("hfs_swap_HFSPlusBTInternalNode: extents key #%d offset too big (0x%04X)\n", srcDesc->numRecords-i-1, srcOffs[i]); | |
444 | } | |
3a60a9f5 A |
445 | return fsBTInvalidNodeErr; |
446 | } | |
447 | ||
448 | if (direction == kSwapBTNodeBigToHost) | |
449 | srcKey->keyLength = SWAP_BE16 (srcKey->keyLength); | |
450 | if (srcKey->keyLength != sizeof(*srcKey) - sizeof(srcKey->keyLength)) { | |
cf7d32b8 A |
451 | if (direction == kSwapBTNodeHostToBig) { |
452 | panic("hfs_swap_HFSPlusBTInternalNode: extents key #%d invalid length (%d)\n", srcDesc->numRecords-i-1, srcKey->keyLength); | |
453 | } else { | |
454 | printf("hfs_swap_HFSPlusBTInternalNode: extents key #%d invalid length (%d)\n", srcDesc->numRecords-i-1, srcKey->keyLength); | |
455 | } | |
3a60a9f5 A |
456 | return fsBTInvalidNodeErr; |
457 | } | |
458 | srcRec = (HFSPlusExtentDescriptor *)((char *)srcKey + srcKey->keyLength + sizeof(srcKey->keyLength)); | |
459 | if (direction == kSwapBTNodeHostToBig) | |
460 | srcKey->keyLength = SWAP_BE16 (srcKey->keyLength); | |
1c79356b | 461 | |
3a60a9f5 | 462 | /* Don't swap srcKey->forkType; it's only one byte */ |
1c79356b A |
463 | /* Don't swap srcKey->pad */ |
464 | ||
465 | srcKey->fileID = SWAP_BE32 (srcKey->fileID); | |
466 | srcKey->startBlock = SWAP_BE32 (srcKey->startBlock); | |
467 | ||
1c79356b | 468 | if (srcDesc->kind == kBTIndexNode) { |
3a60a9f5 | 469 | /* For index nodes, the record data is just a child node number. */ |
2d21ac55 | 470 | *((u_int32_t *)srcRec) = SWAP_BE32 (*((u_int32_t *)srcRec)); |
3a60a9f5 A |
471 | } else { |
472 | /* Swap the extent data */ | |
473 | for (j = 0; j < kHFSPlusExtentDensity; j++) { | |
474 | srcRec[j].startBlock = SWAP_BE32 (srcRec[j].startBlock); | |
475 | srcRec[j].blockCount = SWAP_BE32 (srcRec[j].blockCount); | |
476 | } | |
1c79356b A |
477 | } |
478 | } | |
479 | ||
480 | } else if (fileID == kHFSCatalogFileID) { | |
481 | HFSPlusCatalogKey *srcKey; | |
2d21ac55 | 482 | int16_t *srcPtr; |
3a60a9f5 A |
483 | u_int16_t keyLength; |
484 | ||
1c79356b | 485 | for (i = 0; i < srcDesc->numRecords; i++) { |
3a60a9f5 | 486 | /* Point to the start of the record we're currently checking. */ |
1c79356b A |
487 | srcKey = (HFSPlusCatalogKey *)((char *)src->buffer + srcOffs[i]); |
488 | ||
3a60a9f5 A |
489 | /* |
490 | * Point to start of next (larger offset) record. We'll use this | |
491 | * to be sure the current record doesn't overflow into the next | |
492 | * record. | |
493 | */ | |
b0d623f7 | 494 | nextRecord = (char *)src->buffer + (uintptr_t)(srcOffs[i-1]); |
3a60a9f5 A |
495 | |
496 | /* | |
cf7d32b8 A |
497 | * Make sure we can safely dereference the keyLength and parentID fields. |
498 | */ | |
3a60a9f5 | 499 | if ((char *)srcKey + offsetof(HFSPlusCatalogKey, nodeName.unicode[0]) > nextRecord) { |
cf7d32b8 A |
500 | if (direction == kSwapBTNodeHostToBig) { |
501 | panic("hfs_swap_HFSPlusBTInternalNode: catalog key #%d offset too big (0x%04X)\n", srcDesc->numRecords-i-1, srcOffs[i]); | |
502 | } else { | |
503 | printf("hfs_swap_HFSPlusBTInternalNode: catalog key #%d offset too big (0x%04X)\n", srcDesc->numRecords-i-1, srcOffs[i]); | |
504 | } | |
3a60a9f5 A |
505 | return fsBTInvalidNodeErr; |
506 | } | |
507 | ||
508 | /* | |
509 | * Swap and sanity check the key length | |
510 | */ | |
511 | if (direction == kSwapBTNodeBigToHost) | |
512 | srcKey->keyLength = SWAP_BE16 (srcKey->keyLength); | |
513 | keyLength = srcKey->keyLength; /* Put it in a local (native order) because we use it several times */ | |
514 | if (direction == kSwapBTNodeHostToBig) | |
515 | srcKey->keyLength = SWAP_BE16 (keyLength); | |
1c79356b | 516 | |
3a60a9f5 A |
517 | /* Sanity check the key length */ |
518 | if (keyLength < kHFSPlusCatalogKeyMinimumLength || keyLength > kHFSPlusCatalogKeyMaximumLength) { | |
cf7d32b8 A |
519 | if (direction == kSwapBTNodeHostToBig) { |
520 | panic("hfs_swap_HFSPlusBTInternalNode: catalog key #%d invalid length (%d)\n", srcDesc->numRecords-i-1, keyLength); | |
521 | } else { | |
522 | printf("hfs_swap_HFSPlusBTInternalNode: catalog key #%d invalid length (%d)\n", srcDesc->numRecords-i-1, keyLength); | |
523 | } | |
3a60a9f5 A |
524 | return fsBTInvalidNodeErr; |
525 | } | |
526 | ||
527 | /* | |
528 | * Make sure that we can safely dereference the record's type field or | |
529 | * an index node's child node number. | |
530 | */ | |
2d21ac55 A |
531 | srcPtr = (int16_t *)((char *)srcKey + keyLength + sizeof(srcKey->keyLength)); |
532 | if ((char *)srcPtr + sizeof(u_int32_t) > nextRecord) { | |
cf7d32b8 A |
533 | if (direction == kSwapBTNodeHostToBig) { |
534 | panic("hfs_swap_HFSPlusBTInternalNode: catalog key #%d too big\n", srcDesc->numRecords-i-1); | |
535 | } else { | |
536 | printf("hfs_swap_HFSPlusBTInternalNode: catalog key #%d too big\n", srcDesc->numRecords-i-1); | |
537 | } | |
3a60a9f5 A |
538 | return fsBTInvalidNodeErr; |
539 | } | |
540 | ||
1c79356b A |
541 | srcKey->parentID = SWAP_BE32 (srcKey->parentID); |
542 | ||
3a60a9f5 A |
543 | /* |
544 | * Swap and sanity check the key's node name | |
545 | */ | |
546 | if (direction == kSwapBTNodeBigToHost) | |
547 | srcKey->nodeName.length = SWAP_BE16 (srcKey->nodeName.length); | |
548 | /* Make sure name length is consistent with key length */ | |
549 | if (keyLength < sizeof(srcKey->parentID) + sizeof(srcKey->nodeName.length) + | |
550 | srcKey->nodeName.length*sizeof(srcKey->nodeName.unicode[0])) { | |
cf7d32b8 A |
551 | if (direction == kSwapBTNodeHostToBig) { |
552 | panic("hfs_swap_HFSPlusBTInternalNode: catalog record #%d keyLength=%d expected=%lu\n", | |
553 | srcDesc->numRecords-i, keyLength, sizeof(srcKey->parentID) + sizeof(srcKey->nodeName.length) + | |
554 | srcKey->nodeName.length*sizeof(srcKey->nodeName.unicode[0])); | |
555 | } else { | |
556 | printf("hfs_swap_HFSPlusBTInternalNode: catalog record #%d keyLength=%d expected=%lu\n", | |
557 | srcDesc->numRecords-i, keyLength, sizeof(srcKey->parentID) + sizeof(srcKey->nodeName.length) + | |
558 | srcKey->nodeName.length*sizeof(srcKey->nodeName.unicode[0])); | |
559 | } | |
3a60a9f5 A |
560 | return fsBTInvalidNodeErr; |
561 | } | |
1c79356b A |
562 | for (j = 0; j < srcKey->nodeName.length; j++) { |
563 | srcKey->nodeName.unicode[j] = SWAP_BE16 (srcKey->nodeName.unicode[j]); | |
564 | } | |
3a60a9f5 A |
565 | if (direction == kSwapBTNodeHostToBig) |
566 | srcKey->nodeName.length = SWAP_BE16 (srcKey->nodeName.length); | |
1c79356b | 567 | |
3a60a9f5 A |
568 | /* |
569 | * For index nodes, the record data is just the child's node number. | |
570 | * Skip over swapping the various types of catalog record. | |
571 | */ | |
1c79356b | 572 | if (srcDesc->kind == kBTIndexNode) { |
2d21ac55 | 573 | *((u_int32_t *)srcPtr) = SWAP_BE32 (*((u_int32_t *)srcPtr)); |
1c79356b A |
574 | continue; |
575 | } | |
576 | ||
3a60a9f5 A |
577 | /* Make sure the recordType is in native order before using it. */ |
578 | if (direction == kSwapBTNodeBigToHost) | |
579 | srcPtr[0] = SWAP_BE16 (srcPtr[0]); | |
1c79356b A |
580 | |
581 | if (srcPtr[0] == kHFSPlusFolderRecord) { | |
582 | HFSPlusCatalogFolder *srcRec = (HFSPlusCatalogFolder *)srcPtr; | |
3a60a9f5 | 583 | if ((char *)srcRec + sizeof(*srcRec) > nextRecord) { |
cf7d32b8 A |
584 | if (direction == kSwapBTNodeHostToBig) { |
585 | panic("hfs_swap_HFSPlusBTInternalNode: catalog folder record #%d too big\n", srcDesc->numRecords-i-1); | |
586 | } else { | |
587 | printf("hfs_swap_HFSPlusBTInternalNode: catalog folder record #%d too big\n", srcDesc->numRecords-i-1); | |
588 | } | |
3a60a9f5 A |
589 | return fsBTInvalidNodeErr; |
590 | } | |
591 | ||
1c79356b A |
592 | srcRec->flags = SWAP_BE16 (srcRec->flags); |
593 | srcRec->valence = SWAP_BE32 (srcRec->valence); | |
594 | srcRec->folderID = SWAP_BE32 (srcRec->folderID); | |
595 | srcRec->createDate = SWAP_BE32 (srcRec->createDate); | |
596 | srcRec->contentModDate = SWAP_BE32 (srcRec->contentModDate); | |
597 | srcRec->attributeModDate = SWAP_BE32 (srcRec->attributeModDate); | |
598 | srcRec->accessDate = SWAP_BE32 (srcRec->accessDate); | |
599 | srcRec->backupDate = SWAP_BE32 (srcRec->backupDate); | |
600 | ||
601 | srcRec->bsdInfo.ownerID = SWAP_BE32 (srcRec->bsdInfo.ownerID); | |
602 | srcRec->bsdInfo.groupID = SWAP_BE32 (srcRec->bsdInfo.groupID); | |
603 | ||
3a60a9f5 A |
604 | /* Don't swap srcRec->bsdInfo.adminFlags; it's only one byte */ |
605 | /* Don't swap srcRec->bsdInfo.ownerFlags; it's only one byte */ | |
1c79356b A |
606 | |
607 | srcRec->bsdInfo.fileMode = SWAP_BE16 (srcRec->bsdInfo.fileMode); | |
608 | srcRec->bsdInfo.special.iNodeNum = SWAP_BE32 (srcRec->bsdInfo.special.iNodeNum); | |
609 | ||
610 | srcRec->textEncoding = SWAP_BE32 (srcRec->textEncoding); | |
611 | ||
612 | /* Don't swap srcRec->userInfo */ | |
613 | /* Don't swap srcRec->finderInfo */ | |
2d21ac55 A |
614 | srcRec->folderCount = SWAP_BE32 (srcRec->folderCount); |
615 | ||
1c79356b A |
616 | } else if (srcPtr[0] == kHFSPlusFileRecord) { |
617 | HFSPlusCatalogFile *srcRec = (HFSPlusCatalogFile *)srcPtr; | |
3a60a9f5 | 618 | if ((char *)srcRec + sizeof(*srcRec) > nextRecord) { |
cf7d32b8 A |
619 | if (direction == kSwapBTNodeHostToBig) { |
620 | panic("hfs_swap_HFSPlusBTInternalNode: catalog file record #%d too big\n", srcDesc->numRecords-i-1); | |
621 | } else { | |
622 | printf("hfs_swap_HFSPlusBTInternalNode: catalog file record #%d too big\n", srcDesc->numRecords-i-1); | |
623 | } | |
3a60a9f5 A |
624 | return fsBTInvalidNodeErr; |
625 | } | |
1c79356b A |
626 | |
627 | srcRec->flags = SWAP_BE16 (srcRec->flags); | |
628 | ||
629 | srcRec->fileID = SWAP_BE32 (srcRec->fileID); | |
630 | ||
631 | srcRec->createDate = SWAP_BE32 (srcRec->createDate); | |
632 | srcRec->contentModDate = SWAP_BE32 (srcRec->contentModDate); | |
633 | srcRec->attributeModDate = SWAP_BE32 (srcRec->attributeModDate); | |
634 | srcRec->accessDate = SWAP_BE32 (srcRec->accessDate); | |
635 | srcRec->backupDate = SWAP_BE32 (srcRec->backupDate); | |
636 | ||
637 | srcRec->bsdInfo.ownerID = SWAP_BE32 (srcRec->bsdInfo.ownerID); | |
638 | srcRec->bsdInfo.groupID = SWAP_BE32 (srcRec->bsdInfo.groupID); | |
639 | ||
3a60a9f5 A |
640 | /* Don't swap srcRec->bsdInfo.adminFlags; it's only one byte */ |
641 | /* Don't swap srcRec->bsdInfo.ownerFlags; it's only one byte */ | |
1c79356b A |
642 | |
643 | srcRec->bsdInfo.fileMode = SWAP_BE16 (srcRec->bsdInfo.fileMode); | |
644 | srcRec->bsdInfo.special.iNodeNum = SWAP_BE32 (srcRec->bsdInfo.special.iNodeNum); | |
645 | ||
646 | srcRec->textEncoding = SWAP_BE32 (srcRec->textEncoding); | |
2d21ac55 A |
647 | |
648 | /* If kHFSHasLinkChainBit is set, reserved1 is hl_FirstLinkID. | |
cf7d32b8 A |
649 | * In all other context, it is expected to be zero. |
650 | */ | |
2d21ac55 A |
651 | srcRec->reserved1 = SWAP_BE32 (srcRec->reserved1); |
652 | ||
1c79356b A |
653 | /* Don't swap srcRec->userInfo */ |
654 | /* Don't swap srcRec->finderInfo */ | |
655 | /* Don't swap srcRec->reserved2 */ | |
656 | ||
657 | hfs_swap_HFSPlusForkData (&srcRec->dataFork); | |
658 | hfs_swap_HFSPlusForkData (&srcRec->resourceFork); | |
659 | ||
660 | } else if ((srcPtr[0] == kHFSPlusFolderThreadRecord) || | |
661 | (srcPtr[0] == kHFSPlusFileThreadRecord)) { | |
662 | ||
3a60a9f5 A |
663 | /* |
664 | * Make sure there is room for parentID and name length. | |
665 | */ | |
1c79356b | 666 | HFSPlusCatalogThread *srcRec = (HFSPlusCatalogThread *)srcPtr; |
3a60a9f5 | 667 | if ((char *) &srcRec->nodeName.unicode[0] > nextRecord) { |
cf7d32b8 A |
668 | if (direction == kSwapBTNodeHostToBig) { |
669 | panic("hfs_swap_HFSPlusBTInternalNode: catalog thread record #%d too big\n", srcDesc->numRecords-i-1); | |
670 | } else { | |
671 | printf("hfs_swap_HFSPlusBTInternalNode: catalog thread record #%d too big\n", srcDesc->numRecords-i-1); | |
672 | } | |
3a60a9f5 A |
673 | return fsBTInvalidNodeErr; |
674 | } | |
675 | ||
1c79356b A |
676 | /* Don't swap srcRec->reserved */ |
677 | ||
678 | srcRec->parentID = SWAP_BE32 (srcRec->parentID); | |
679 | ||
3a60a9f5 A |
680 | if (direction == kSwapBTNodeBigToHost) |
681 | srcRec->nodeName.length = SWAP_BE16 (srcRec->nodeName.length); | |
682 | ||
683 | /* | |
684 | * Make sure there is room for the name in the buffer. | |
685 | * Then swap the characters of the name itself. | |
686 | */ | |
687 | if ((char *) &srcRec->nodeName.unicode[srcRec->nodeName.length] > nextRecord) { | |
cf7d32b8 A |
688 | if (direction == kSwapBTNodeHostToBig) { |
689 | panic("hfs_swap_HFSPlusBTInternalNode: catalog thread record #%d name too big\n", srcDesc->numRecords-i-1); | |
690 | } else { | |
691 | printf("hfs_swap_HFSPlusBTInternalNode: catalog thread record #%d name too big\n", srcDesc->numRecords-i-1); | |
692 | } | |
3a60a9f5 A |
693 | return fsBTInvalidNodeErr; |
694 | } | |
1c79356b A |
695 | for (j = 0; j < srcRec->nodeName.length; j++) { |
696 | srcRec->nodeName.unicode[j] = SWAP_BE16 (srcRec->nodeName.unicode[j]); | |
697 | } | |
3a60a9f5 A |
698 | |
699 | if (direction == kSwapBTNodeHostToBig) | |
700 | srcRec->nodeName.length = SWAP_BE16 (srcRec->nodeName.length); | |
1c79356b A |
701 | |
702 | } else { | |
cf7d32b8 A |
703 | if (direction == kSwapBTNodeHostToBig) { |
704 | panic("hfs_swap_HFSPlusBTInternalNode: unrecognized catalog record type (0x%04X; record #%d)\n", srcPtr[0], srcDesc->numRecords-i-1); | |
705 | } else { | |
706 | printf("hfs_swap_HFSPlusBTInternalNode: unrecognized catalog record type (0x%04X; record #%d)\n", srcPtr[0], srcDesc->numRecords-i-1); | |
707 | } | |
3a60a9f5 | 708 | return fsBTInvalidNodeErr; |
1c79356b A |
709 | } |
710 | ||
3a60a9f5 A |
711 | /* We can swap the record type now that we're done using it. */ |
712 | if (direction == kSwapBTNodeHostToBig) | |
713 | srcPtr[0] = SWAP_BE16 (srcPtr[0]); | |
1c79356b A |
714 | } |
715 | ||
91447636 A |
716 | } else if (fileID == kHFSAttributesFileID) { |
717 | HFSPlusAttrKey *srcKey; | |
718 | HFSPlusAttrRecord *srcRec; | |
3a60a9f5 A |
719 | u_int16_t keyLength; |
720 | u_int32_t attrSize = 0; | |
721 | ||
91447636 | 722 | for (i = 0; i < srcDesc->numRecords; i++) { |
3a60a9f5 | 723 | /* Point to the start of the record we're currently checking. */ |
91447636 | 724 | srcKey = (HFSPlusAttrKey *)((char *)src->buffer + srcOffs[i]); |
3a60a9f5 A |
725 | |
726 | /* | |
727 | * Point to start of next (larger offset) record. We'll use this | |
728 | * to be sure the current record doesn't overflow into the next | |
729 | * record. | |
730 | */ | |
731 | nextRecord = (char *)src->buffer + srcOffs[i-1]; | |
732 | ||
733 | /* Make sure there is room in the buffer for a minimal key */ | |
734 | if ((char *) &srcKey->attrName[1] > nextRecord) { | |
cf7d32b8 A |
735 | if (direction == kSwapBTNodeHostToBig) { |
736 | panic("hfs_swap_HFSPlusBTInternalNode: attr key #%d offset too big (0x%04X)\n", srcDesc->numRecords-i-1, srcOffs[i]); | |
737 | } else { | |
738 | printf("hfs_swap_HFSPlusBTInternalNode: attr key #%d offset too big (0x%04X)\n", srcDesc->numRecords-i-1, srcOffs[i]); | |
739 | } | |
3a60a9f5 A |
740 | return fsBTInvalidNodeErr; |
741 | } | |
91447636 | 742 | |
3a60a9f5 A |
743 | /* Swap the key length field */ |
744 | if (direction == kSwapBTNodeBigToHost) | |
745 | srcKey->keyLength = SWAP_BE16(srcKey->keyLength); | |
746 | keyLength = srcKey->keyLength; /* Keep a copy in native order */ | |
747 | if (direction == kSwapBTNodeHostToBig) | |
748 | srcKey->keyLength = SWAP_BE16(srcKey->keyLength); | |
749 | ||
750 | /* | |
751 | * Make sure that we can safely dereference the record's type field or | |
752 | * an index node's child node number. | |
753 | */ | |
754 | srcRec = (HFSPlusAttrRecord *)((char *)srcKey + keyLength + sizeof(srcKey->keyLength)); | |
755 | if ((char *)srcRec + sizeof(u_int32_t) > nextRecord) { | |
cf7d32b8 A |
756 | if (direction == kSwapBTNodeHostToBig) { |
757 | panic("hfs_swap_HFSPlusBTInternalNode: attr key #%d too big (%d)\n", srcDesc->numRecords-i-1, keyLength); | |
758 | } else { | |
759 | printf("hfs_swap_HFSPlusBTInternalNode: attr key #%d too big (%d)\n", srcDesc->numRecords-i-1, keyLength); | |
760 | } | |
3a60a9f5 A |
761 | return fsBTInvalidNodeErr; |
762 | } | |
91447636 A |
763 | |
764 | srcKey->fileID = SWAP_BE32(srcKey->fileID); | |
765 | srcKey->startBlock = SWAP_BE32(srcKey->startBlock); | |
3a60a9f5 A |
766 | |
767 | /* | |
768 | * Swap and check the attribute name | |
769 | */ | |
770 | if (direction == kSwapBTNodeBigToHost) | |
771 | srcKey->attrNameLen = SWAP_BE16(srcKey->attrNameLen); | |
772 | /* Sanity check the attribute name length */ | |
773 | if (srcKey->attrNameLen > kHFSMaxAttrNameLen || keyLength < (kHFSPlusAttrKeyMinimumLength + sizeof(u_int16_t)*srcKey->attrNameLen)) { | |
cf7d32b8 A |
774 | if (direction == kSwapBTNodeHostToBig) { |
775 | panic("hfs_swap_HFSPlusBTInternalNode: attr key #%d keyLength=%d attrNameLen=%d\n", srcDesc->numRecords-i-1, keyLength, srcKey->attrNameLen); | |
776 | } else { | |
777 | printf("hfs_swap_HFSPlusBTInternalNode: attr key #%d keyLength=%d attrNameLen=%d\n", srcDesc->numRecords-i-1, keyLength, srcKey->attrNameLen); | |
778 | } | |
3a60a9f5 A |
779 | return fsBTInvalidNodeErr; |
780 | } | |
91447636 A |
781 | for (j = 0; j < srcKey->attrNameLen; j++) |
782 | srcKey->attrName[j] = SWAP_BE16(srcKey->attrName[j]); | |
3a60a9f5 A |
783 | if (direction == kSwapBTNodeHostToBig) |
784 | srcKey->attrNameLen = SWAP_BE16(srcKey->attrNameLen); | |
91447636 | 785 | |
3a60a9f5 A |
786 | /* |
787 | * For index nodes, the record data is just the child's node number. | |
788 | * Skip over swapping the various types of attribute record. | |
789 | */ | |
91447636 | 790 | if (srcDesc->kind == kBTIndexNode) { |
2d21ac55 | 791 | *((u_int32_t *)srcRec) = SWAP_BE32 (*((u_int32_t *)srcRec)); |
91447636 A |
792 | continue; |
793 | } | |
794 | ||
3a60a9f5 A |
795 | /* Swap the record data */ |
796 | if (direction == kSwapBTNodeBigToHost) | |
797 | srcRec->recordType = SWAP_BE32(srcRec->recordType); | |
91447636 A |
798 | switch (srcRec->recordType) { |
799 | case kHFSPlusAttrInlineData: | |
3a60a9f5 A |
800 | /* Is there room for the inline data header? */ |
801 | if ((char *) &srcRec->attrData.attrData[0] > nextRecord) { | |
cf7d32b8 A |
802 | if (direction == kSwapBTNodeHostToBig) { |
803 | panic("hfs_swap_HFSPlusBTInternalNode: attr inline #%d too big\n", srcDesc->numRecords-i-1); | |
804 | } else { | |
805 | printf("hfs_swap_HFSPlusBTInternalNode: attr inline #%d too big\n", srcDesc->numRecords-i-1); | |
806 | } | |
3a60a9f5 A |
807 | return fsBTInvalidNodeErr; |
808 | } | |
809 | ||
91447636 | 810 | /* We're not swapping the reserved fields */ |
3a60a9f5 A |
811 | |
812 | /* Swap the attribute size */ | |
813 | if (direction == kSwapBTNodeHostToBig) | |
814 | attrSize = srcRec->attrData.attrSize; | |
91447636 | 815 | srcRec->attrData.attrSize = SWAP_BE32(srcRec->attrData.attrSize); |
3a60a9f5 A |
816 | if (direction == kSwapBTNodeBigToHost) |
817 | attrSize = srcRec->attrData.attrSize; | |
818 | ||
819 | /* Is there room for the inline attribute data? */ | |
820 | if ((char *) &srcRec->attrData.attrData[attrSize] > nextRecord) { | |
cf7d32b8 A |
821 | if (direction == kSwapBTNodeHostToBig) { |
822 | panic("hfs_swap_HFSPlusBTInternalNode: attr inline #%d too big (attrSize=%u)\n", srcDesc->numRecords-i-1, attrSize); | |
823 | } else { | |
824 | printf("hfs_swap_HFSPlusBTInternalNode: attr inline #%d too big (attrSize=%u)\n", srcDesc->numRecords-i-1, attrSize); | |
825 | } | |
3a60a9f5 A |
826 | return fsBTInvalidNodeErr; |
827 | } | |
828 | ||
829 | /* Not swapping the attribute data itself */ | |
91447636 | 830 | break; |
3a60a9f5 | 831 | |
91447636 | 832 | case kHFSPlusAttrForkData: |
3a60a9f5 A |
833 | /* Is there room for the fork data record? */ |
834 | if ((char *)srcRec + sizeof(HFSPlusAttrForkData) > nextRecord) { | |
cf7d32b8 A |
835 | if (direction == kSwapBTNodeHostToBig) { |
836 | panic("hfs_swap_HFSPlusBTInternalNode: attr fork data #%d too big\n", srcDesc->numRecords-i-1); | |
837 | } else { | |
838 | printf("hfs_swap_HFSPlusBTInternalNode: attr fork data #%d too big\n", srcDesc->numRecords-i-1); | |
839 | } | |
3a60a9f5 A |
840 | return fsBTInvalidNodeErr; |
841 | } | |
842 | ||
91447636 | 843 | /* We're not swapping the reserved field */ |
3a60a9f5 | 844 | |
91447636 A |
845 | hfs_swap_HFSPlusForkData(&srcRec->forkData.theFork); |
846 | break; | |
3a60a9f5 | 847 | |
91447636 | 848 | case kHFSPlusAttrExtents: |
3a60a9f5 A |
849 | /* Is there room for an extent record? */ |
850 | if ((char *)srcRec + sizeof(HFSPlusAttrExtents) > nextRecord) { | |
cf7d32b8 A |
851 | if (direction == kSwapBTNodeHostToBig) { |
852 | panic("hfs_swap_HFSPlusBTInternalNode: attr extents #%d too big\n", srcDesc->numRecords-i-1); | |
853 | } else { | |
854 | printf("hfs_swap_HFSPlusBTInternalNode: attr extents #%d too big\n", srcDesc->numRecords-i-1); | |
855 | } | |
3a60a9f5 A |
856 | return fsBTInvalidNodeErr; |
857 | } | |
858 | ||
91447636 | 859 | /* We're not swapping the reserved field */ |
3a60a9f5 | 860 | |
91447636 A |
861 | for (j = 0; j < kHFSPlusExtentDensity; j++) { |
862 | srcRec->overflowExtents.extents[j].startBlock = | |
863 | SWAP_BE32(srcRec->overflowExtents.extents[j].startBlock); | |
864 | srcRec->overflowExtents.extents[j].blockCount = | |
865 | SWAP_BE32(srcRec->overflowExtents.extents[j].blockCount); | |
866 | } | |
867 | break; | |
868 | } | |
3a60a9f5 A |
869 | if (direction == kSwapBTNodeHostToBig) |
870 | srcRec->recordType = SWAP_BE32(srcRec->recordType); | |
91447636 | 871 | } |
55e303ae | 872 | } else if (fileID > kHFSFirstUserCatalogNodeID) { |
3a60a9f5 | 873 | /* The only B-tree with a non-system CNID that we use is the hotfile B-tree */ |
55e303ae | 874 | HotFileKey *srcKey; |
2d21ac55 | 875 | u_int32_t *srcRec; |
55e303ae A |
876 | |
877 | for (i = 0; i < srcDesc->numRecords; i++) { | |
3a60a9f5 | 878 | /* Point to the start of the record we're currently checking. */ |
55e303ae A |
879 | srcKey = (HotFileKey *)((char *)src->buffer + srcOffs[i]); |
880 | ||
3a60a9f5 A |
881 | /* |
882 | * Point to start of next (larger offset) record. We'll use this | |
883 | * to be sure the current record doesn't overflow into the next | |
884 | * record. | |
885 | */ | |
886 | nextRecord = (char *)src->buffer + srcOffs[i-1]; | |
887 | ||
2d21ac55 A |
888 | /* Make sure there is room for the key (HotFileKey) and data (u_int32_t) */ |
889 | if ((char *)srcKey + sizeof(HotFileKey) + sizeof(u_int32_t) > nextRecord) { | |
cf7d32b8 A |
890 | if (direction == kSwapBTNodeHostToBig) { |
891 | panic("hfs_swap_HFSPlusBTInternalNode: hotfile #%d offset too big (0x%04X)\n", srcDesc->numRecords-i-1, srcOffs[i]); | |
892 | } else { | |
893 | printf("hfs_swap_HFSPlusBTInternalNode: hotfile #%d offset too big (0x%04X)\n", srcDesc->numRecords-i-1, srcOffs[i]); | |
894 | } | |
3a60a9f5 A |
895 | return fsBTInvalidNodeErr; |
896 | } | |
897 | ||
898 | /* Swap and sanity check the key length field */ | |
899 | if (direction == kSwapBTNodeBigToHost) | |
55e303ae | 900 | srcKey->keyLength = SWAP_BE16 (srcKey->keyLength); |
3a60a9f5 | 901 | if (srcKey->keyLength != sizeof(*srcKey) - sizeof(srcKey->keyLength)) { |
cf7d32b8 A |
902 | if (direction == kSwapBTNodeHostToBig) { |
903 | panic("hfs_swap_HFSPlusBTInternalNode: hotfile #%d incorrect keyLength %d\n", srcDesc->numRecords-i-1, srcKey->keyLength); | |
904 | } else { | |
905 | printf("hfs_swap_HFSPlusBTInternalNode: hotfile #%d incorrect keyLength %d\n", srcDesc->numRecords-i-1, srcKey->keyLength); | |
906 | } | |
3a60a9f5 A |
907 | return fsBTInvalidNodeErr; |
908 | } | |
909 | srcRec = (u_int32_t *)((char *)srcKey + srcKey->keyLength + sizeof(srcKey->keyLength)); | |
910 | if (direction == kSwapBTNodeHostToBig) | |
55e303ae A |
911 | srcKey->keyLength = SWAP_BE16 (srcKey->keyLength); |
912 | ||
913 | /* Don't swap srcKey->forkType */ | |
914 | /* Don't swap srcKey->pad */ | |
915 | ||
916 | srcKey->temperature = SWAP_BE32 (srcKey->temperature); | |
917 | srcKey->fileID = SWAP_BE32 (srcKey->fileID); | |
918 | ||
2d21ac55 | 919 | *((u_int32_t *)srcRec) = SWAP_BE32 (*((u_int32_t *)srcRec)); |
55e303ae | 920 | } |
1c79356b | 921 | } else { |
3a60a9f5 | 922 | panic ("hfs_swap_HFSPlusBTInternalNode: fileID %u is not a system B-tree\n", fileID); |
1c79356b A |
923 | } |
924 | ||
55e303ae | 925 | |
1c79356b A |
926 | return (0); |
927 | } | |
928 | ||
6d2010ae | 929 | int |
1c79356b A |
930 | hfs_swap_HFSBTInternalNode ( |
931 | BlockDescriptor *src, | |
932 | HFSCatalogNodeID fileID, | |
3a60a9f5 | 933 | enum HFSBTSwapDirection direction |
1c79356b A |
934 | ) |
935 | { | |
936 | BTNodeDescriptor *srcDesc = src->buffer; | |
2d21ac55 | 937 | u_int16_t *srcOffs = (u_int16_t *)((char *)src->buffer + (src->blockSize - (srcDesc->numRecords * sizeof (u_int16_t)))); |
3a60a9f5 | 938 | char *nextRecord; /* Points to start of record following current one */ |
1c79356b | 939 | |
2d21ac55 A |
940 | /* |
941 | * i is an int32 because it needs to be negative to index the offset to free space. | |
942 | * srcDesc->numRecords is a u_int16_t and is unlikely to become 32-bit so this should be ok. | |
943 | */ | |
944 | int32_t i; | |
945 | u_int32_t j; | |
1c79356b | 946 | |
1c79356b A |
947 | if (fileID == kHFSExtentsFileID) { |
948 | HFSExtentKey *srcKey; | |
949 | HFSExtentDescriptor *srcRec; | |
3a60a9f5 | 950 | size_t recordSize; /* Size of the data part of the record, or node number for index nodes */ |
1c79356b | 951 | |
3a60a9f5 | 952 | if (srcDesc->kind == kBTIndexNode) |
2d21ac55 | 953 | recordSize = sizeof(u_int32_t); |
3a60a9f5 A |
954 | else |
955 | recordSize = sizeof(HFSExtentDescriptor); | |
956 | ||
1c79356b | 957 | for (i = 0; i < srcDesc->numRecords; i++) { |
3a60a9f5 | 958 | /* Point to the start of the record we're currently checking. */ |
1c79356b A |
959 | srcKey = (HFSExtentKey *)((char *)src->buffer + srcOffs[i]); |
960 | ||
3a60a9f5 A |
961 | /* |
962 | * Point to start of next (larger offset) record. We'll use this | |
963 | * to be sure the current record doesn't overflow into the next | |
964 | * record. | |
965 | */ | |
966 | nextRecord = (char *)src->buffer + srcOffs[i-1]; | |
967 | ||
968 | /* | |
969 | * Make sure the key and data are within the buffer. Since both key | |
970 | * and data are fixed size, this is relatively easy. Note that this | |
971 | * relies on the keyLength being a constant; we verify the keyLength | |
972 | * below. | |
973 | */ | |
974 | if ((char *)srcKey + sizeof(HFSExtentKey) + recordSize > nextRecord) { | |
cf7d32b8 A |
975 | if (direction == kSwapBTNodeHostToBig) { |
976 | panic("hfs_swap_HFSBTInternalNode: extents key #%d offset too big (0x%04X)\n", srcDesc->numRecords-i-1, srcOffs[i]); | |
977 | } else { | |
978 | printf("hfs_swap_HFSBTInternalNode: extents key #%d offset too big (0x%04X)\n", srcDesc->numRecords-i-1, srcOffs[i]); | |
979 | } | |
3a60a9f5 A |
980 | return fsBTInvalidNodeErr; |
981 | } | |
982 | ||
983 | /* Don't swap srcKey->keyLength (it's only one byte), but do sanity check it */ | |
984 | if (srcKey->keyLength != sizeof(*srcKey) - sizeof(srcKey->keyLength)) { | |
cf7d32b8 A |
985 | if (direction == kSwapBTNodeHostToBig) { |
986 | panic("hfs_swap_HFSBTInternalNode: extents key #%d invalid length (%d)\n", srcDesc->numRecords-i-1, srcKey->keyLength); | |
987 | } else { | |
988 | printf("hfs_swap_HFSBTInternalNode: extents key #%d invalid length (%d)\n", srcDesc->numRecords-i-1, srcKey->keyLength); | |
989 | } | |
3a60a9f5 A |
990 | return fsBTInvalidNodeErr; |
991 | } | |
992 | ||
993 | /* Don't swap srcKey->forkType; it's only one byte */ | |
1c79356b A |
994 | |
995 | srcKey->fileID = SWAP_BE32 (srcKey->fileID); | |
996 | srcKey->startBlock = SWAP_BE16 (srcKey->startBlock); | |
997 | ||
998 | /* Point to record data (round up to even byte boundary) */ | |
999 | srcRec = (HFSExtentDescriptor *)((char *)srcKey + ((srcKey->keyLength + 2) & ~1)); | |
1000 | ||
1c79356b | 1001 | if (srcDesc->kind == kBTIndexNode) { |
3a60a9f5 | 1002 | /* For index nodes, the record data is just a child node number. */ |
2d21ac55 | 1003 | *((u_int32_t *)srcRec) = SWAP_BE32 (*((u_int32_t *)srcRec)); |
3a60a9f5 A |
1004 | } else { |
1005 | /* Swap the extent data */ | |
1006 | for (j = 0; j < kHFSExtentDensity; j++) { | |
1007 | srcRec[j].startBlock = SWAP_BE16 (srcRec[j].startBlock); | |
1008 | srcRec[j].blockCount = SWAP_BE16 (srcRec[j].blockCount); | |
1009 | } | |
1c79356b A |
1010 | } |
1011 | } | |
1012 | ||
1013 | } else if (fileID == kHFSCatalogFileID) { | |
1014 | HFSCatalogKey *srcKey; | |
2d21ac55 | 1015 | int16_t *srcPtr; |
3a60a9f5 A |
1016 | unsigned expectedKeyLength; |
1017 | ||
1c79356b | 1018 | for (i = 0; i < srcDesc->numRecords; i++) { |
3a60a9f5 | 1019 | /* Point to the start of the record we're currently checking. */ |
1c79356b A |
1020 | srcKey = (HFSCatalogKey *)((char *)src->buffer + srcOffs[i]); |
1021 | ||
3a60a9f5 A |
1022 | /* |
1023 | * Point to start of next (larger offset) record. We'll use this | |
1024 | * to be sure the current record doesn't overflow into the next | |
1025 | * record. | |
1026 | */ | |
1027 | nextRecord = (char *)src->buffer + srcOffs[i-1]; | |
1028 | ||
1029 | /* | |
1030 | * Make sure we can safely dereference the keyLength and parentID fields. | |
1031 | * The value 8 below is 1 bytes for keyLength + 1 byte reserved + 4 bytes | |
1032 | * for parentID + 1 byte for nodeName's length + 1 byte to round up the | |
1033 | * record start to an even offset, which forms a minimal key. | |
1034 | */ | |
1035 | if ((char *)srcKey + 8 > nextRecord) { | |
cf7d32b8 A |
1036 | if (direction == kSwapBTNodeHostToBig) { |
1037 | panic("hfs_swap_HFSBTInternalNode: catalog key #%d offset too big (0x%04X)\n", srcDesc->numRecords-i-1, srcOffs[i]); | |
1038 | } else { | |
1039 | printf("hfs_swap_HFSBTInternalNode: catalog key #%d offset too big (0x%04X)\n", srcDesc->numRecords-i-1, srcOffs[i]); | |
1040 | } | |
3a60a9f5 A |
1041 | return fsBTInvalidNodeErr; |
1042 | } | |
1043 | ||
1044 | /* Don't swap srcKey->keyLength (it's only one byte), but do sanity check it */ | |
1045 | if (srcKey->keyLength < kHFSCatalogKeyMinimumLength || srcKey->keyLength > kHFSCatalogKeyMaximumLength) { | |
cf7d32b8 A |
1046 | if (direction == kSwapBTNodeHostToBig) { |
1047 | panic("hfs_swap_HFSBTInternalNode: catalog key #%d invalid length (%d)\n", srcDesc->numRecords-i-1, srcKey->keyLength); | |
1048 | } else { | |
1049 | printf("hfs_swap_HFSBTInternalNode: catalog key #%d invalid length (%d)\n", srcDesc->numRecords-i-1, srcKey->keyLength); | |
1050 | } | |
3a60a9f5 A |
1051 | return fsBTInvalidNodeErr; |
1052 | } | |
1053 | ||
1c79356b A |
1054 | /* Don't swap srcKey->reserved */ |
1055 | ||
1056 | srcKey->parentID = SWAP_BE32 (srcKey->parentID); | |
1057 | ||
1058 | /* Don't swap srcKey->nodeName */ | |
3a60a9f5 A |
1059 | |
1060 | /* Make sure the keyLength is big enough for the key's content */ | |
1061 | if (srcDesc->kind == kBTIndexNode) | |
1062 | expectedKeyLength = sizeof(*srcKey) - sizeof(srcKey->keyLength); | |
1063 | else | |
1064 | expectedKeyLength = srcKey->nodeName[0] + kHFSCatalogKeyMinimumLength; | |
1065 | if (srcKey->keyLength < expectedKeyLength) { | |
cf7d32b8 A |
1066 | if (direction == kSwapBTNodeHostToBig) { |
1067 | panic("hfs_swap_HFSBTInternalNode: catalog record #%d keyLength=%u expected=%u\n", | |
1068 | srcDesc->numRecords-i, srcKey->keyLength, expectedKeyLength); | |
1069 | } else { | |
1070 | printf("hfs_swap_HFSBTInternalNode: catalog record #%d keyLength=%u expected=%u\n", | |
1071 | srcDesc->numRecords-i, srcKey->keyLength, expectedKeyLength); | |
1072 | } | |
3a60a9f5 A |
1073 | return fsBTInvalidNodeErr; |
1074 | } | |
1c79356b A |
1075 | |
1076 | /* Point to record data (round up to even byte boundary) */ | |
2d21ac55 | 1077 | srcPtr = (int16_t *)((char *)srcKey + ((srcKey->keyLength + 2) & ~1)); |
1c79356b | 1078 | |
3a60a9f5 A |
1079 | /* |
1080 | * Make sure that we can safely dereference the record's type field or | |
1081 | * and index node's child node number. | |
1082 | */ | |
2d21ac55 | 1083 | if ((char *)srcPtr + sizeof(u_int32_t) > nextRecord) { |
cf7d32b8 A |
1084 | if (direction == kSwapBTNodeHostToBig) { |
1085 | panic("hfs_swap_HFSBTInternalNode: catalog key #%d too big\n", srcDesc->numRecords-i-1); | |
1086 | } else { | |
1087 | printf("hfs_swap_HFSBTInternalNode: catalog key #%d too big\n", srcDesc->numRecords-i-1); | |
1088 | } | |
3a60a9f5 A |
1089 | return fsBTInvalidNodeErr; |
1090 | } | |
1091 | ||
1092 | /* | |
1093 | * For index nodes, the record data is just the child's node number. | |
1094 | * Skip over swapping the various types of catalog record. | |
1095 | */ | |
1c79356b | 1096 | if (srcDesc->kind == kBTIndexNode) { |
2d21ac55 | 1097 | *((u_int32_t *)srcPtr) = SWAP_BE32 (*((u_int32_t *)srcPtr)); |
1c79356b A |
1098 | continue; |
1099 | } | |
1100 | ||
3a60a9f5 A |
1101 | /* Make sure the recordType is in native order before using it. */ |
1102 | if (direction == kSwapBTNodeBigToHost) | |
1103 | srcPtr[0] = SWAP_BE16 (srcPtr[0]); | |
1c79356b A |
1104 | |
1105 | if (srcPtr[0] == kHFSFolderRecord) { | |
1106 | HFSCatalogFolder *srcRec = (HFSCatalogFolder *)srcPtr; | |
3a60a9f5 | 1107 | if ((char *)srcRec + sizeof(*srcRec) > nextRecord) { |
cf7d32b8 A |
1108 | if (direction == kSwapBTNodeHostToBig) { |
1109 | panic("hfs_swap_HFSBTInternalNode: catalog folder record #%d too big\n", srcDesc->numRecords-i-1); | |
1110 | } else { | |
1111 | printf("hfs_swap_HFSBTInternalNode: catalog folder record #%d too big\n", srcDesc->numRecords-i-1); | |
1112 | } | |
3a60a9f5 A |
1113 | return fsBTInvalidNodeErr; |
1114 | } | |
1c79356b A |
1115 | |
1116 | srcRec->flags = SWAP_BE16 (srcRec->flags); | |
1117 | srcRec->valence = SWAP_BE16 (srcRec->valence); | |
1118 | ||
1119 | srcRec->folderID = SWAP_BE32 (srcRec->folderID); | |
1120 | srcRec->createDate = SWAP_BE32 (srcRec->createDate); | |
1121 | srcRec->modifyDate = SWAP_BE32 (srcRec->modifyDate); | |
1122 | srcRec->backupDate = SWAP_BE32 (srcRec->backupDate); | |
1123 | ||
1124 | /* Don't swap srcRec->userInfo */ | |
1125 | /* Don't swap srcRec->finderInfo */ | |
1126 | /* Don't swap resserved array */ | |
1127 | ||
1128 | } else if (srcPtr[0] == kHFSFileRecord) { | |
1129 | HFSCatalogFile *srcRec = (HFSCatalogFile *)srcPtr; | |
3a60a9f5 | 1130 | if ((char *)srcRec + sizeof(*srcRec) > nextRecord) { |
cf7d32b8 A |
1131 | if (direction == kSwapBTNodeHostToBig) { |
1132 | panic("hfs_swap_HFSBTInternalNode: catalog file record #%d too big\n", srcDesc->numRecords-i-1); | |
1133 | } else { | |
1134 | printf("hfs_swap_HFSBTInternalNode: catalog file record #%d too big\n", srcDesc->numRecords-i-1); | |
1135 | } | |
3a60a9f5 A |
1136 | return fsBTInvalidNodeErr; |
1137 | } | |
1c79356b A |
1138 | |
1139 | srcRec->flags = srcRec->flags; | |
1140 | srcRec->fileType = srcRec->fileType; | |
1141 | ||
1142 | /* Don't swap srcRec->userInfo */ | |
1143 | ||
1144 | srcRec->fileID = SWAP_BE32 (srcRec->fileID); | |
1145 | ||
1146 | srcRec->dataStartBlock = SWAP_BE16 (srcRec->dataStartBlock); | |
1147 | srcRec->dataLogicalSize = SWAP_BE32 (srcRec->dataLogicalSize); | |
1148 | srcRec->dataPhysicalSize = SWAP_BE32 (srcRec->dataPhysicalSize); | |
1149 | ||
1150 | srcRec->rsrcStartBlock = SWAP_BE16 (srcRec->rsrcStartBlock); | |
1151 | srcRec->rsrcLogicalSize = SWAP_BE32 (srcRec->rsrcLogicalSize); | |
1152 | srcRec->rsrcPhysicalSize = SWAP_BE32 (srcRec->rsrcPhysicalSize); | |
1153 | ||
1154 | srcRec->createDate = SWAP_BE32 (srcRec->createDate); | |
1155 | srcRec->modifyDate = SWAP_BE32 (srcRec->modifyDate); | |
1156 | srcRec->backupDate = SWAP_BE32 (srcRec->backupDate); | |
1157 | ||
1158 | /* Don't swap srcRec->finderInfo */ | |
1159 | ||
1160 | srcRec->clumpSize = SWAP_BE16 (srcRec->clumpSize); | |
1161 | ||
2d21ac55 | 1162 | /* Swap the two sets of extents as an array of six (three each) u_int16_t */ |
1c79356b A |
1163 | for (j = 0; j < kHFSExtentDensity * 2; j++) { |
1164 | srcRec->dataExtents[j].startBlock = SWAP_BE16 (srcRec->dataExtents[j].startBlock); | |
1165 | srcRec->dataExtents[j].blockCount = SWAP_BE16 (srcRec->dataExtents[j].blockCount); | |
1166 | } | |
1167 | ||
1168 | /* Don't swap srcRec->reserved */ | |
1169 | ||
1170 | } else if ((srcPtr[0] == kHFSFolderThreadRecord) || | |
1171 | (srcPtr[0] == kHFSFileThreadRecord)) { | |
1c79356b | 1172 | HFSCatalogThread *srcRec = (HFSCatalogThread *)srcPtr; |
3a60a9f5 A |
1173 | |
1174 | /* Make sure there is room for parentID and name length */ | |
1175 | if ((char *) &srcRec->nodeName[1] > nextRecord) { | |
cf7d32b8 A |
1176 | if (direction == kSwapBTNodeHostToBig) { |
1177 | panic("hfs_swap_HFSBTInternalNode: catalog thread record #%d too big\n", srcDesc->numRecords-i-1); | |
1178 | } else { | |
1179 | printf("hfs_swap_HFSBTInternalNode: catalog thread record #%d too big\n", srcDesc->numRecords-i-1); | |
1180 | } | |
3a60a9f5 A |
1181 | return fsBTInvalidNodeErr; |
1182 | } | |
1c79356b A |
1183 | |
1184 | /* Don't swap srcRec->reserved array */ | |
1185 | ||
1186 | srcRec->parentID = SWAP_BE32 (srcRec->parentID); | |
1187 | ||
1188 | /* Don't swap srcRec->nodeName */ | |
3a60a9f5 A |
1189 | |
1190 | /* Make sure there is room for the name in the buffer */ | |
1191 | if ((char *) &srcRec->nodeName[srcRec->nodeName[0]] > nextRecord) { | |
cf7d32b8 A |
1192 | if (direction == kSwapBTNodeHostToBig) { |
1193 | panic("hfs_swap_HFSBTInternalNode: catalog thread record #%d name too big\n", srcDesc->numRecords-i-1); | |
1194 | } else { | |
1195 | printf("hfs_swap_HFSBTInternalNode: catalog thread record #%d name too big\n", srcDesc->numRecords-i-1); | |
1196 | } | |
3a60a9f5 A |
1197 | return fsBTInvalidNodeErr; |
1198 | } | |
1c79356b | 1199 | } else { |
cf7d32b8 A |
1200 | if (direction == kSwapBTNodeHostToBig) { |
1201 | panic("hfs_swap_HFSBTInternalNode: unrecognized catalog record type (0x%04X; record #%d)\n", srcPtr[0], srcDesc->numRecords-i-1); | |
1202 | } else { | |
1203 | printf("hfs_swap_HFSBTInternalNode: unrecognized catalog record type (0x%04X; record #%d)\n", srcPtr[0], srcDesc->numRecords-i-1); | |
1204 | } | |
3a60a9f5 | 1205 | return fsBTInvalidNodeErr; |
1c79356b A |
1206 | } |
1207 | ||
3a60a9f5 A |
1208 | /* We can swap the record type now that we're done using it */ |
1209 | if (direction == kSwapBTNodeHostToBig) | |
1210 | srcPtr[0] = SWAP_BE16 (srcPtr[0]); | |
1c79356b A |
1211 | } |
1212 | ||
1213 | } else { | |
3a60a9f5 | 1214 | panic ("hfs_swap_HFSBTInternalNode: fileID %u is not a system B-tree\n", fileID); |
1c79356b A |
1215 | } |
1216 | ||
1217 | return (0); | |
1218 | } |