ea1c15791f
Disambiguate the log components from the trace functionality (include/spdk/trace.h). The internal spdk_trace_flag structure and related functions will be renamed in a later commit - this is just a find and replace on SPDK_TRACE_* and SPDK_LOG_REGISTER_TRACE_FLAG(). Change-Id: I617bd5a9fbe35ffb44ae6020b292658c094a0ad6 Signed-off-by: Daniel Verkamp <daniel.verkamp@intel.com> Reviewed-on: https://review.gerrithub.io/376421 Tested-by: SPDK Automated Test System <sys_sgsw@intel.com> Reviewed-by: Jim Harris <james.r.harris@intel.com> Reviewed-by: Ben Walker <benjamin.walker@intel.com>
240 lines
7.2 KiB
C
240 lines
7.2 KiB
C
/*-
|
|
* BSD LICENSE
|
|
*
|
|
* Copyright (c) Intel Corporation.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* * Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
* * Neither the name of Intel Corporation nor the names of its
|
|
* contributors may be used to endorse or promote products derived
|
|
* from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "gpt.h"
|
|
|
|
#include "spdk/crc32.h"
|
|
#include "spdk/endian.h"
|
|
#include "spdk/event.h"
|
|
|
|
#include "spdk_internal/log.h"
|
|
|
|
#define GPT_PRIMARY_PARTITION_TABLE_LBA 0x1
|
|
#define PRIMARY_PARTITION_NUMBER 4
|
|
#define GPT_PROTECTIVE_MBR 1
|
|
#define SPDK_MAX_NUM_PARTITION_ENTRIES 128
|
|
|
|
static int
|
|
spdk_gpt_read_partitions(struct spdk_gpt *gpt)
|
|
{
|
|
uint32_t total_partition_size, num_partition_entries, partition_entry_size;
|
|
uint64_t partition_start_lba;
|
|
struct spdk_gpt_header *head = gpt->header;
|
|
uint32_t crc32;
|
|
|
|
num_partition_entries = from_le32(&head->num_partition_entries);
|
|
if (num_partition_entries > SPDK_MAX_NUM_PARTITION_ENTRIES) {
|
|
SPDK_ERRLOG("Num_partition_entries=%u which exceeds max=%u\n",
|
|
num_partition_entries, SPDK_MAX_NUM_PARTITION_ENTRIES);
|
|
return -1;
|
|
}
|
|
|
|
partition_entry_size = from_le32(&head->size_of_partition_entry);
|
|
if (partition_entry_size != sizeof(struct spdk_gpt_partition_entry)) {
|
|
SPDK_ERRLOG("Partition_entry_size(%x) != expected(%lx)\n",
|
|
partition_entry_size, sizeof(struct spdk_gpt_partition_entry));
|
|
return -1;
|
|
}
|
|
|
|
total_partition_size = num_partition_entries * partition_entry_size;
|
|
partition_start_lba = from_le64(&head->partition_entry_lba);
|
|
if ((total_partition_size + partition_start_lba * gpt->sector_size) > SPDK_GPT_BUFFER_SIZE) {
|
|
SPDK_ERRLOG("Buffer size is not enough\n");
|
|
return -1;
|
|
}
|
|
|
|
gpt->partitions = (struct spdk_gpt_partition_entry *)(gpt->buf +
|
|
partition_start_lba * gpt->sector_size);
|
|
|
|
crc32 = spdk_crc32_ieee_update(gpt->partitions, total_partition_size, ~0);
|
|
crc32 ^= ~0;
|
|
|
|
if (crc32 != from_le32(&head->partition_entry_array_crc32)) {
|
|
SPDK_ERRLOG("GPT partition entry array crc32 did not match\n");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
spdk_gpt_lba_range_check(struct spdk_gpt_header *head, uint64_t lba_end)
|
|
{
|
|
uint64_t usable_lba_start, usable_lba_end;
|
|
|
|
usable_lba_start = from_le64(&head->first_usable_lba);
|
|
usable_lba_end = from_le64(&head->last_usable_lba);
|
|
|
|
if (usable_lba_end < usable_lba_start) {
|
|
SPDK_ERRLOG("Head's usable_lba_end(%" PRIu64 ") < usable_lba_start(%" PRIu64 ")\n",
|
|
usable_lba_end, usable_lba_start);
|
|
return -1;
|
|
}
|
|
|
|
if (usable_lba_end > lba_end) {
|
|
SPDK_ERRLOG("Head's usable_lba_end(%" PRIu64 ") > lba_end(%" PRIu64 ")\n",
|
|
usable_lba_end, lba_end);
|
|
return -1;
|
|
}
|
|
|
|
if ((usable_lba_start < GPT_PRIMARY_PARTITION_TABLE_LBA) &&
|
|
(GPT_PRIMARY_PARTITION_TABLE_LBA < usable_lba_end)) {
|
|
SPDK_ERRLOG("Head lba is not in the usable range\n");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
spdk_gpt_read_header(struct spdk_gpt *gpt)
|
|
{
|
|
uint32_t head_size;
|
|
uint32_t new_crc, original_crc;
|
|
struct spdk_gpt_header *head;
|
|
|
|
head = (struct spdk_gpt_header *)(gpt->buf + GPT_PRIMARY_PARTITION_TABLE_LBA * gpt->sector_size);
|
|
head_size = from_le32(&head->header_size);
|
|
if (head_size < sizeof(*head) || head_size > gpt->sector_size) {
|
|
SPDK_ERRLOG("head_size=%u\n", head_size);
|
|
return -1;
|
|
}
|
|
|
|
original_crc = from_le32(&head->header_crc32);
|
|
head->header_crc32 = 0;
|
|
new_crc = spdk_crc32_ieee_update(head, from_le32(&head->header_size), ~0);
|
|
new_crc ^= ~0;
|
|
/* restore header crc32 */
|
|
to_le32(&head->header_crc32, original_crc);
|
|
|
|
if (new_crc != original_crc) {
|
|
SPDK_ERRLOG("head crc32 does not match, provided=%u, caculated=%u\n",
|
|
original_crc, new_crc);
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(SPDK_GPT_SIGNATURE, head->gpt_signature,
|
|
sizeof(head->gpt_signature))) {
|
|
SPDK_ERRLOG("signature did not match\n");
|
|
return -1;
|
|
}
|
|
|
|
if (spdk_gpt_lba_range_check(head, gpt->lba_end)) {
|
|
SPDK_ERRLOG("lba range check error\n");
|
|
return -1;
|
|
}
|
|
|
|
gpt->header = head;
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
spdk_gpt_check_mbr(struct spdk_gpt *gpt)
|
|
{
|
|
int i, primary_partition = 0;
|
|
uint32_t total_lba_size = 0, ret = 0, expected_start_lba;
|
|
struct spdk_mbr *mbr;
|
|
|
|
mbr = (struct spdk_mbr *)gpt->buf;
|
|
if (from_le16(&mbr->mbr_signature) != SPDK_MBR_SIGNATURE) {
|
|
SPDK_DEBUGLOG(SPDK_LOG_GPT_PARSE, "Signature mismatch, provided=%x,"
|
|
"expected=%x\n", from_le16(&mbr->disk_signature),
|
|
SPDK_MBR_SIGNATURE);
|
|
return -1;
|
|
}
|
|
|
|
for (i = 0; i < PRIMARY_PARTITION_NUMBER; i++) {
|
|
if (mbr->partitions[i].os_type == SPDK_MBR_OS_TYPE_GPT_PROTECTIVE) {
|
|
primary_partition = i;
|
|
ret = GPT_PROTECTIVE_MBR;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (ret == GPT_PROTECTIVE_MBR) {
|
|
expected_start_lba = GPT_PRIMARY_PARTITION_TABLE_LBA;
|
|
if (from_le32(&mbr->partitions[primary_partition].start_lba) != expected_start_lba) {
|
|
SPDK_DEBUGLOG(SPDK_LOG_GPT_PARSE, "start lba mismatch, provided=%u, expected=%u\n",
|
|
from_le32(&mbr->partitions[primary_partition].start_lba),
|
|
expected_start_lba);
|
|
return -1;
|
|
}
|
|
|
|
total_lba_size = from_le32(&mbr->partitions[primary_partition].size_lba);
|
|
if ((total_lba_size != ((uint32_t) gpt->total_sectors - 1)) &&
|
|
(total_lba_size != 0xFFFFFFFF)) {
|
|
SPDK_ERRLOG("GPT Primary MBR size does not equal: (record_size %u != actual_size %u)!\n",
|
|
total_lba_size, (uint32_t) gpt->total_sectors - 1);
|
|
return -1;
|
|
}
|
|
} else {
|
|
SPDK_DEBUGLOG(SPDK_LOG_GPT_PARSE, "Currently only support GPT Protective MBR format\n");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
spdk_gpt_parse(struct spdk_gpt *gpt)
|
|
{
|
|
int rc;
|
|
|
|
if (!gpt || !gpt->buf) {
|
|
SPDK_ERRLOG("Gpt and the related buffer should not be NULL\n");
|
|
return -1;
|
|
}
|
|
|
|
rc = spdk_gpt_check_mbr(gpt);
|
|
if (rc) {
|
|
SPDK_DEBUGLOG(SPDK_LOG_GPT_PARSE, "Failed to detect gpt in MBR\n");
|
|
return rc;
|
|
}
|
|
|
|
rc = spdk_gpt_read_header(gpt);
|
|
if (rc) {
|
|
SPDK_ERRLOG("Failed to read gpt header\n");
|
|
return rc;
|
|
}
|
|
|
|
rc = spdk_gpt_read_partitions(gpt);
|
|
if (rc) {
|
|
SPDK_ERRLOG("Failed to read gpt partitions\n");
|
|
return rc;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
SPDK_LOG_REGISTER_COMPONENT("gpt_parse", SPDK_LOG_GPT_PARSE)
|