1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
|
/*
* EFI GPT partition parsing code
*
* Copyright (C) 2009 Karel Zak <kzak@redhat.com>
*
* This file may be redistributed under the terms of the
* GNU Lesser General Public License.
*
* This code is not copy & past from any other implementation.
*
* For more information about GPT start your study at:
* http://en.wikipedia.org/wiki/GUID_Partition_Table
* http://technet.microsoft.com/en-us/library/cc739412(WS.10).aspx
*/
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <stdint.h>
#include <stddef.h>
#include <limits.h>
#include <inttypes.h>
#include "partitions.h"
#include "crc32.h"
#define GPT_PRIMARY_LBA 1
/* Signature - “EFI PART” */
#define GPT_HEADER_SIGNATURE 0x5452415020494645ULL
#define GPT_HEADER_SIGNATURE_STR "EFI PART"
/* basic types */
typedef uint16_t efi_char16_t;
/* UUID */
typedef struct {
uint32_t time_low;
uint16_t time_mid;
uint16_t time_hi_and_version;
uint8_t clock_seq_hi;
uint8_t clock_seq_low;
uint8_t node[6];
} efi_guid_t;
#define GPT_UNUSED_ENTRY_GUID \
((efi_guid_t) { 0x00000000, 0x0000, 0x0000, 0x00, 0x00, \
{ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }})
struct gpt_header {
uint64_t signature; /* "EFI PART" */
uint32_t revision;
uint32_t header_size; /* usually 92 bytes */
uint32_t header_crc32; /* checksum of header with this
* field zeroed during calculation */
uint32_t reserved1;
uint64_t my_lba; /* location of this header copy */
uint64_t alternate_lba; /* location of the other header copy */
uint64_t first_usable_lba; /* first usable LBA for partitions */
uint64_t last_usable_lba; /* last usable LBA for partitions */
efi_guid_t disk_guid; /* disk UUID */
uint64_t partition_entries_lba; /* always 2 in primary header copy */
uint32_t num_partition_entries;
uint32_t sizeof_partition_entry;
uint32_t partition_entry_array_crc32;
/*
* The rest of the block is reserved by UEFI and must be zero. EFI
* standard handles this by:
*
* uint8_t reserved2[ BLKSSZGET - 92 ];
*
* This definition is useless in practice. It is necessary to read
* whole block from the device rather than sizeof(struct gpt_header)
* only.
*/
} __attribute__ ((packed));
/*** not used
struct gpt_entry_attributes {
uint64_t required_to_function:1;
uint64_t reserved:47;
uint64_t type_guid_specific:16;
} __attribute__ ((packed));
***/
struct gpt_entry {
efi_guid_t partition_type_guid; /* type UUID */
efi_guid_t unique_partition_guid; /* partition UUID */
uint64_t starting_lba;
uint64_t ending_lba;
/*struct gpt_entry_attributes attributes;*/
uint64_t attributes;
efi_char16_t partition_name[72 / sizeof(efi_char16_t)]; /* UTF-16LE string*/
} __attribute__ ((packed));
/*
* EFI uses crc32 with ~0 seed and xor's with ~0 at the end.
*/
static inline uint32_t count_crc32(const unsigned char *buf, size_t len,
size_t exclude_off, size_t exclude_len)
{
return (ul_crc32_exclude_offset(~0L, buf, len, exclude_off, exclude_len) ^ ~0L);
}
static inline unsigned char *get_lba_buffer(blkid_probe pr,
uint64_t lba, size_t bytes)
{
return blkid_probe_get_buffer(pr,
blkid_probe_get_sectorsize(pr) * lba, bytes);
}
static inline int guidcmp(efi_guid_t left, efi_guid_t right)
{
return memcmp(&left, &right, sizeof (efi_guid_t));
}
/*
* UUID is traditionally 16 byte big-endian array, except Intel EFI
* specification where the UUID is a structure of little-endian fields.
*/
static void swap_efi_guid(efi_guid_t *uid)
{
uid->time_low = swab32(uid->time_low);
uid->time_mid = swab16(uid->time_mid);
uid->time_hi_and_version = swab16(uid->time_hi_and_version);
}
static int last_lba(blkid_probe pr, uint64_t *lba)
{
uint64_t sz = blkid_probe_get_size(pr);
unsigned int ssz = blkid_probe_get_sectorsize(pr);
if (sz < ssz)
return -1;
*lba = (sz / ssz) - 1ULL;
return 0;
}
/*
* Protective (legacy) MBR.
*
* This MBR contains standard DOS partition table with a single partition, type
* of 0xEE. The partition usually encompassing the entire GPT drive - or 2TiB
* for large disks.
*
* Note that Apple uses GPT/MBR hybrid disks, where the DOS partition table is
* synchronized with GPT. This synchronization has many restriction of course
* (due DOS PT limitations).
*
* Note that the PMBR detection is optional (enabled by default) and could be
* disabled by BLKID_PARTS_FOPCE_GPT flag (see also blkid_partitions_set_flags()).
*/
static int is_pmbr_valid(blkid_probe pr, int *has)
{
int flags = blkid_partitions_get_flags(pr);
unsigned char *data;
struct dos_partition *p;
int i;
if (has)
*has = 0;
else if (flags & BLKID_PARTS_FORCE_GPT)
return 1; /* skip PMBR check */
data = blkid_probe_get_sector(pr, 0);
if (!data) {
if (errno)
return -errno;
goto failed;
}
if (!mbr_is_valid_magic(data))
goto failed;
for (i = 0, p = mbr_get_partition(data, 0); i < 4; i++, p++) {
if (p->sys_ind == MBR_GPT_PARTITION) {
DBG(LOWPROBE, ul_debug(" #%d valid PMBR partition", i + 1));
goto ok;
}
}
failed:
return 0;
ok:
if (has)
*has = 1;
return 1;
}
/*
* Reads GPT header to @hdr and returns a pointer to @hdr or NULL in case of
* error. The function also returns GPT entries in @ents.
*
* Note, this function does not allocate any memory. The GPT header has fixed
* size so we use stack, and @ents returns memory from libblkid buffer (so the
* next blkid_probe_get_buffer() will overwrite this buffer).
*
* This function checks validity of header and entries array. A corrupted
* header is not returned.
*/
static struct gpt_header *get_gpt_header(
blkid_probe pr, struct gpt_header *hdr,
struct gpt_entry **ents, uint64_t lba,
uint64_t lastlba)
{
struct gpt_header *h;
uint32_t crc;
uint64_t lu, fu;
uint64_t esz;
uint32_t hsz, ssz;
ssz = blkid_probe_get_sectorsize(pr);
DBG(LOWPROBE, ul_debug(" checking for GPT header at %"PRIu64, lba));
/* whole sector is allocated for GPT header */
h = (struct gpt_header *) get_lba_buffer(pr, lba, ssz);
if (!h)
return NULL;
if (le64_to_cpu(h->signature) != GPT_HEADER_SIGNATURE)
return NULL;
hsz = le32_to_cpu(h->header_size);
/* EFI: The HeaderSize must be greater than 92 and must be less
* than or equal to the logical block size.
*/
if (hsz > ssz || hsz < sizeof(*h))
return NULL;
/* Header has to be verified when header_crc32 is zero */
crc = count_crc32((unsigned char *) h, hsz,
offsetof(struct gpt_header, header_crc32),
sizeof(h->header_crc32));
if (crc != le32_to_cpu(h->header_crc32)) {
DBG(LOWPROBE, ul_debug("GPT header corrupted"));
return NULL;
}
/* Valid header has to be at MyLBA */
if (le64_to_cpu(h->my_lba) != lba) {
DBG(LOWPROBE, ul_debug(
"GPT->MyLBA mismatch with real position"));
return NULL;
}
fu = le64_to_cpu(h->first_usable_lba);
lu = le64_to_cpu(h->last_usable_lba);
/* Check if First and Last usable LBA makes sense */
if (lu < fu || fu > lastlba || lu > lastlba) {
DBG(LOWPROBE, ul_debug(
"GPT->{First,Last}UsableLBA out of range"));
return NULL;
}
/* The header has to be outside usable range */
if (fu < lba && lba < lu) {
DBG(LOWPROBE, ul_debug("GPT header is inside usable area"));
return NULL;
}
/* Size of blocks with GPT entries */
esz = (uint64_t)le32_to_cpu(h->num_partition_entries) *
le32_to_cpu(h->sizeof_partition_entry);
if (esz == 0 || esz >= UINT32_MAX ||
le32_to_cpu(h->sizeof_partition_entry) != sizeof(struct gpt_entry)) {
DBG(LOWPROBE, ul_debug("GPT entries undefined"));
return NULL;
}
/* The header seems valid, save it
* (we don't care about zeros in hdr->reserved2 area) */
memcpy(hdr, h, sizeof(*h));
h = hdr;
/* Read GPT entries */
*ents = (struct gpt_entry *) get_lba_buffer(pr,
le64_to_cpu(h->partition_entries_lba), esz);
if (!*ents) {
DBG(LOWPROBE, ul_debug("GPT entries unreadable"));
return NULL;
}
/* Validate entries */
crc = count_crc32((unsigned char *) *ents, esz, 0, 0);
if (crc != le32_to_cpu(h->partition_entry_array_crc32)) {
DBG(LOWPROBE, ul_debug("GPT entries corrupted"));
return NULL;
}
return h;
}
static int probe_gpt_pt(blkid_probe pr,
const struct blkid_idmag *mag __attribute__((__unused__)))
{
uint64_t lastlba = 0, lba;
struct gpt_header hdr, *h;
struct gpt_entry *e;
blkid_parttable tab = NULL;
blkid_partlist ls;
uint64_t fu, lu;
uint32_t ssf, i;
efi_guid_t guid;
int ret;
if (last_lba(pr, &lastlba))
goto nothing;
ret = is_pmbr_valid(pr, NULL);
if (ret < 0)
return ret;
if (ret == 0)
goto nothing;
errno = 0;
h = get_gpt_header(pr, &hdr, &e, (lba = GPT_PRIMARY_LBA), lastlba);
if (!h && !errno)
h = get_gpt_header(pr, &hdr, &e, (lba = lastlba), lastlba);
if (!h) {
if (errno)
return -errno;
goto nothing;
}
blkid_probe_use_wiper(pr, lba * blkid_probe_get_size(pr), 8);
if (blkid_probe_set_magic(pr, blkid_probe_get_sectorsize(pr) * lba,
sizeof(GPT_HEADER_SIGNATURE_STR) - 1,
(unsigned char *) GPT_HEADER_SIGNATURE_STR))
goto err;
guid = h->disk_guid;
swap_efi_guid(&guid);
if (blkid_partitions_need_typeonly(pr)) {
/* Non-binary interface -- caller does not ask for details
* about partitions, just set generic variables only. */
blkid_partitions_set_ptuuid(pr, (unsigned char *) &guid);
return BLKID_PROBE_OK;
}
ls = blkid_probe_get_partlist(pr);
if (!ls)
goto nothing;
tab = blkid_partlist_new_parttable(ls, "gpt",
blkid_probe_get_sectorsize(pr) * lba);
if (!tab)
goto err;
blkid_parttable_set_uuid(tab, (const unsigned char *) &guid);
ssf = blkid_probe_get_sectorsize(pr) / 512;
fu = le64_to_cpu(h->first_usable_lba);
lu = le64_to_cpu(h->last_usable_lba);
for (i = 0; i < le32_to_cpu(h->num_partition_entries); i++, e++) {
blkid_partition par;
uint64_t start = le64_to_cpu(e->starting_lba);
uint64_t size = le64_to_cpu(e->ending_lba) -
le64_to_cpu(e->starting_lba) + 1ULL;
/* 00000000-0000-0000-0000-000000000000 entry */
if (!guidcmp(e->partition_type_guid, GPT_UNUSED_ENTRY_GUID)) {
blkid_partlist_increment_partno(ls);
continue;
}
/* the partition has to inside usable range */
if (start < fu || start + size - 1 > lu) {
DBG(LOWPROBE, ul_debug(
"GPT entry[%d] overflows usable area - ignore",
i));
blkid_partlist_increment_partno(ls);
continue;
}
par = blkid_partlist_add_partition(ls, tab,
start * ssf, size * ssf);
if (!par)
goto err;
blkid_partition_set_utf8name(par,
(unsigned char *) e->partition_name,
sizeof(e->partition_name), UL_ENCODE_UTF16LE);
guid = e->unique_partition_guid;
swap_efi_guid(&guid);
blkid_partition_set_uuid(par, (const unsigned char *) &guid);
guid = e->partition_type_guid;
swap_efi_guid(&guid);
blkid_partition_set_type_uuid(par, (const unsigned char *) &guid);
blkid_partition_set_flags(par, le64_to_cpu(e->attributes));
}
return BLKID_PROBE_OK;
nothing:
return BLKID_PROBE_NONE;
err:
return -ENOMEM;
}
const struct blkid_idinfo gpt_pt_idinfo =
{
.name = "gpt",
.probefunc = probe_gpt_pt,
/*
* It would be possible to check for DOS signature (0xAA55), but
* unfortunately almost all EFI GPT implementations allow to optionally
* skip the legacy MBR. We follows this behavior and MBR is optional.
* See is_valid_pmbr().
*
* It means we have to always call probe_gpt_pt().
*/
.magics = BLKID_NONE_MAGIC
};
/* probe for *alone* protective MBR */
static int probe_pmbr_pt(blkid_probe pr,
const struct blkid_idmag *mag __attribute__((__unused__)))
{
int has = 0;
struct gpt_entry *e;
uint64_t lastlba = 0;
struct gpt_header hdr;
if (last_lba(pr, &lastlba))
goto nothing;
is_pmbr_valid(pr, &has);
if (!has)
goto nothing;
if (!get_gpt_header(pr, &hdr, &e, GPT_PRIMARY_LBA, lastlba) &&
!get_gpt_header(pr, &hdr, &e, lastlba, lastlba))
return 0;
nothing:
return 1;
}
const struct blkid_idinfo pmbr_pt_idinfo =
{
.name = "PMBR",
.probefunc = probe_pmbr_pt,
.magics =
{
{ .magic = "\x55\xAA", .len = 2, .sboff = 510 },
{ NULL }
}
};
|