]> git.ipfire.org Git - thirdparty/u-boot.git/blob - disk/part_efi.c
4ac21868d088f2c75bccceed09915cce309b8e10
[thirdparty/u-boot.git] / disk / part_efi.c
1 // SPDX-License-Identifier: GPL-2.0+
2 /*
3 * Copyright (C) 2008 RuggedCom, Inc.
4 * Richard Retanubun <RichardRetanubun@RuggedCom.com>
5 */
6
7 /*
8 * NOTE:
9 * when CONFIG_SYS_64BIT_LBA is not defined, lbaint_t is 32 bits; this
10 * limits the maximum size of addressable storage to < 2 tebibytes
11 */
12 #include <common.h>
13 #include <blk.h>
14 #include <log.h>
15 #include <part.h>
16 #include <uuid.h>
17 #include <asm/cache.h>
18 #include <asm/global_data.h>
19 #include <asm/unaligned.h>
20 #include <command.h>
21 #include <fdtdec.h>
22 #include <ide.h>
23 #include <malloc.h>
24 #include <memalign.h>
25 #include <part_efi.h>
26 #include <dm/ofnode.h>
27 #include <linux/compiler.h>
28 #include <linux/ctype.h>
29 #include <u-boot/crc.h>
30
31 /* GUID for basic data partitons */
32 #if CONFIG_IS_ENABLED(EFI_PARTITION)
33 static const efi_guid_t partition_basic_data_guid = PARTITION_BASIC_DATA_GUID;
34 #endif
35
36 /**
37 * efi_crc32() - EFI version of crc32 function
38 * @buf: buffer to calculate crc32 of
39 * @len - length of buf
40 *
41 * Description: Returns EFI-style CRC32 value for @buf
42 */
43 static inline u32 efi_crc32(const void *buf, u32 len)
44 {
45 return crc32(0, buf, len);
46 }
47
48 /*
49 * Private function prototypes
50 */
51
52 static int pmbr_part_valid(struct partition *part);
53 static int is_pmbr_valid(legacy_mbr * mbr);
54 static int is_gpt_valid(struct blk_desc *desc, u64 lba, gpt_header *pgpt_head,
55 gpt_entry **pgpt_pte);
56 static gpt_entry *alloc_read_gpt_entries(struct blk_desc *desc,
57 gpt_header *pgpt_head);
58 static int is_pte_valid(gpt_entry * pte);
59 static int find_valid_gpt(struct blk_desc *desc, gpt_header *gpt_head,
60 gpt_entry **pgpt_pte);
61
62 static char *print_efiname(gpt_entry *pte)
63 {
64 static char name[PARTNAME_SZ + 1];
65 int i;
66 for (i = 0; i < PARTNAME_SZ; i++) {
67 u8 c;
68 c = pte->partition_name[i] & 0xff;
69 c = (c && !isprint(c)) ? '.' : c;
70 name[i] = c;
71 }
72 name[PARTNAME_SZ] = 0;
73 return name;
74 }
75
76 static const efi_guid_t system_guid = PARTITION_SYSTEM_GUID;
77
78 static int get_bootable(gpt_entry *p)
79 {
80 int ret = 0;
81
82 if (!memcmp(&p->partition_type_guid, &system_guid, sizeof(efi_guid_t)))
83 ret |= PART_EFI_SYSTEM_PARTITION;
84 if (p->attributes.fields.legacy_bios_bootable)
85 ret |= PART_BOOTABLE;
86 return ret;
87 }
88
89 static int validate_gpt_header(gpt_header *gpt_h, lbaint_t lba,
90 lbaint_t lastlba)
91 {
92 uint32_t crc32_backup = 0;
93 uint32_t calc_crc32;
94
95 /* Check the GPT header signature */
96 if (le64_to_cpu(gpt_h->signature) != GPT_HEADER_SIGNATURE_UBOOT) {
97 log_debug("%s signature is wrong: %#llX != %#llX\n",
98 "GUID Partition Table Header",
99 le64_to_cpu(gpt_h->signature),
100 GPT_HEADER_SIGNATURE_UBOOT);
101 return -1;
102 }
103
104 /* Check the GUID Partition Table CRC */
105 memcpy(&crc32_backup, &gpt_h->header_crc32, sizeof(crc32_backup));
106 memset(&gpt_h->header_crc32, 0, sizeof(gpt_h->header_crc32));
107
108 calc_crc32 = efi_crc32((const unsigned char *)gpt_h,
109 le32_to_cpu(gpt_h->header_size));
110
111 memcpy(&gpt_h->header_crc32, &crc32_backup, sizeof(crc32_backup));
112
113 if (calc_crc32 != le32_to_cpu(crc32_backup)) {
114 log_debug("%s: CRC is wrong: %#x != %#x\n",
115 "GUID Partition Table Header",
116 le32_to_cpu(crc32_backup), calc_crc32);
117 return -1;
118 }
119
120 /*
121 * Check that the my_lba entry points to the LBA that contains the GPT
122 */
123 if (le64_to_cpu(gpt_h->my_lba) != lba) {
124 log_debug("GPT: my_lba incorrect: %llX != " LBAF "\n",
125 le64_to_cpu(gpt_h->my_lba), lba);
126 return -1;
127 }
128
129 /*
130 * Check that the first_usable_lba and that the last_usable_lba are
131 * within the disk.
132 */
133 if (le64_to_cpu(gpt_h->first_usable_lba) > lastlba) {
134 log_debug("GPT: first_usable_lba incorrect: %llX > " LBAF "\n",
135 le64_to_cpu(gpt_h->first_usable_lba), lastlba);
136 return -1;
137 }
138 if (le64_to_cpu(gpt_h->last_usable_lba) > lastlba) {
139 log_debug("GPT: last_usable_lba incorrect: %llX > " LBAF "\n",
140 le64_to_cpu(gpt_h->last_usable_lba), lastlba);
141 return -1;
142 }
143
144 debug("GPT: first_usable_lba: %llX last_usable_lba: %llX last lba: "
145 LBAF "\n", le64_to_cpu(gpt_h->first_usable_lba),
146 le64_to_cpu(gpt_h->last_usable_lba), lastlba);
147
148 return 0;
149 }
150
151 static int validate_gpt_entries(gpt_header *gpt_h, gpt_entry *gpt_e)
152 {
153 uint32_t calc_crc32;
154
155 /* Check the GUID Partition Table Entry Array CRC */
156 calc_crc32 = efi_crc32((const unsigned char *)gpt_e,
157 le32_to_cpu(gpt_h->num_partition_entries) *
158 le32_to_cpu(gpt_h->sizeof_partition_entry));
159
160 if (calc_crc32 != le32_to_cpu(gpt_h->partition_entry_array_crc32)) {
161 log_debug("%s: %#x != %#x\n",
162 "GUID Partition Table Entry Array CRC is wrong",
163 le32_to_cpu(gpt_h->partition_entry_array_crc32),
164 calc_crc32);
165 return -1;
166 }
167
168 return 0;
169 }
170
171 static void prepare_backup_gpt_header(gpt_header *gpt_h)
172 {
173 uint32_t calc_crc32;
174 uint64_t val;
175
176 /* recalculate the values for the Backup GPT Header */
177 val = le64_to_cpu(gpt_h->my_lba);
178 gpt_h->my_lba = gpt_h->alternate_lba;
179 gpt_h->alternate_lba = cpu_to_le64(val);
180 gpt_h->partition_entry_lba =
181 cpu_to_le64(le64_to_cpu(gpt_h->last_usable_lba) + 1);
182 gpt_h->header_crc32 = 0;
183
184 calc_crc32 = efi_crc32((const unsigned char *)gpt_h,
185 le32_to_cpu(gpt_h->header_size));
186 gpt_h->header_crc32 = cpu_to_le32(calc_crc32);
187 }
188
189 #if CONFIG_IS_ENABLED(EFI_PARTITION)
190 /*
191 * Public Functions (include/part.h)
192 */
193
194 /*
195 * UUID is displayed as 32 hexadecimal digits, in 5 groups,
196 * separated by hyphens, in the form 8-4-4-4-12 for a total of 36 characters
197 */
198 int get_disk_guid(struct blk_desc *desc, char *guid)
199 {
200 ALLOC_CACHE_ALIGN_BUFFER_PAD(gpt_header, gpt_head, 1, desc->blksz);
201 gpt_entry *gpt_pte = NULL;
202 unsigned char *guid_bin;
203
204 /* This function validates AND fills in the GPT header and PTE */
205 if (find_valid_gpt(desc, gpt_head, &gpt_pte) != 1)
206 return -EINVAL;
207
208 guid_bin = gpt_head->disk_guid.b;
209 uuid_bin_to_str(guid_bin, guid, UUID_STR_FORMAT_GUID);
210
211 /* Remember to free pte */
212 free(gpt_pte);
213 return 0;
214 }
215
216 void part_print_efi(struct blk_desc *desc)
217 {
218 ALLOC_CACHE_ALIGN_BUFFER_PAD(gpt_header, gpt_head, 1, desc->blksz);
219 gpt_entry *gpt_pte = NULL;
220 int i = 0;
221 unsigned char *uuid;
222
223 /* This function validates AND fills in the GPT header and PTE */
224 if (find_valid_gpt(desc, gpt_head, &gpt_pte) != 1)
225 return;
226
227 debug("%s: gpt-entry at %p\n", __func__, gpt_pte);
228
229 printf("Part\tStart LBA\tEnd LBA\t\tName\n");
230 printf("\tAttributes\n");
231 printf("\tType GUID\n");
232 printf("\tPartition GUID\n");
233
234 for (i = 0; i < le32_to_cpu(gpt_head->num_partition_entries); i++) {
235 /* Skip invalid PTE */
236 if (!is_pte_valid(&gpt_pte[i]))
237 continue;
238
239 printf("%3d\t0x%08llx\t0x%08llx\t\"%s\"\n", (i + 1),
240 le64_to_cpu(gpt_pte[i].starting_lba),
241 le64_to_cpu(gpt_pte[i].ending_lba),
242 print_efiname(&gpt_pte[i]));
243 printf("\tattrs:\t0x%016llx\n", gpt_pte[i].attributes.raw);
244 uuid = (unsigned char *)gpt_pte[i].partition_type_guid.b;
245 if (IS_ENABLED(CONFIG_PARTITION_TYPE_GUID))
246 printf("\ttype:\t%pUl\n\t\t(%pUs)\n", uuid, uuid);
247 else
248 printf("\ttype:\t%pUl\n", uuid);
249 uuid = (unsigned char *)gpt_pte[i].unique_partition_guid.b;
250 printf("\tguid:\t%pUl\n", uuid);
251 }
252
253 /* Remember to free pte */
254 free(gpt_pte);
255 return;
256 }
257
258 int part_get_info_efi(struct blk_desc *desc, int part,
259 struct disk_partition *info)
260 {
261 ALLOC_CACHE_ALIGN_BUFFER_PAD(gpt_header, gpt_head, 1, desc->blksz);
262 gpt_entry *gpt_pte = NULL;
263
264 /* "part" argument must be at least 1 */
265 if (part < 1) {
266 log_debug("Invalid Argument(s)\n");
267 return -EINVAL;
268 }
269
270 /* This function validates AND fills in the GPT header and PTE */
271 if (find_valid_gpt(desc, gpt_head, &gpt_pte) != 1)
272 return -EINVAL;
273
274 if (part > le32_to_cpu(gpt_head->num_partition_entries) ||
275 !is_pte_valid(&gpt_pte[part - 1])) {
276 log_debug("Invalid partition number %d\n", part);
277 free(gpt_pte);
278 return -EPERM;
279 }
280
281 /* The 'lbaint_t' casting may limit the maximum disk size to 2 TB */
282 info->start = (lbaint_t)le64_to_cpu(gpt_pte[part - 1].starting_lba);
283 /* The ending LBA is inclusive, to calculate size, add 1 to it */
284 info->size = (lbaint_t)le64_to_cpu(gpt_pte[part - 1].ending_lba) + 1
285 - info->start;
286 info->blksz = desc->blksz;
287
288 snprintf((char *)info->name, sizeof(info->name), "%s",
289 print_efiname(&gpt_pte[part - 1]));
290 strcpy((char *)info->type, "U-Boot");
291 info->bootable = get_bootable(&gpt_pte[part - 1]);
292 #if CONFIG_IS_ENABLED(PARTITION_UUIDS)
293 uuid_bin_to_str(gpt_pte[part - 1].unique_partition_guid.b, info->uuid,
294 UUID_STR_FORMAT_GUID);
295 #endif
296 #ifdef CONFIG_PARTITION_TYPE_GUID
297 uuid_bin_to_str(gpt_pte[part - 1].partition_type_guid.b,
298 info->type_guid, UUID_STR_FORMAT_GUID);
299 #endif
300
301 log_debug("start 0x" LBAF ", size 0x" LBAF ", name %s\n", info->start,
302 info->size, info->name);
303
304 /* Remember to free pte */
305 free(gpt_pte);
306 return 0;
307 }
308
309 static int part_test_efi(struct blk_desc *desc)
310 {
311 ALLOC_CACHE_ALIGN_BUFFER_PAD(legacy_mbr, legacymbr, 1, desc->blksz);
312
313 /* Read legacy MBR from block 0 and validate it */
314 if ((blk_dread(desc, 0, 1, (ulong *)legacymbr) != 1)
315 || (is_pmbr_valid(legacymbr) != 1)) {
316 return -1;
317 }
318 return 0;
319 }
320
321 /**
322 * set_protective_mbr(): Set the EFI protective MBR
323 * @param desc - block device descriptor
324 *
325 * Return: - zero on success, otherwise error
326 */
327 static int set_protective_mbr(struct blk_desc *desc)
328 {
329 /* Setup the Protective MBR */
330 ALLOC_CACHE_ALIGN_BUFFER_PAD(legacy_mbr, p_mbr, 1, desc->blksz);
331 if (p_mbr == NULL) {
332 log_debug("calloc failed!\n");
333 return -ENOMEM;
334 }
335
336 /* Read MBR to backup boot code if it exists */
337 if (blk_dread(desc, 0, 1, p_mbr) != 1) {
338 log_debug("** Can't read from device %d **\n",
339 desc->devnum);
340 return -EIO;
341 }
342
343 /* Clear all data in MBR except of backed up boot code */
344 memset((char *)p_mbr + MSDOS_MBR_BOOT_CODE_SIZE, 0, sizeof(*p_mbr) -
345 MSDOS_MBR_BOOT_CODE_SIZE);
346
347 /* Append signature */
348 p_mbr->signature = MSDOS_MBR_SIGNATURE;
349 p_mbr->partition_record[0].sys_ind = EFI_PMBR_OSTYPE_EFI_GPT;
350 p_mbr->partition_record[0].start_sect = 1;
351 p_mbr->partition_record[0].nr_sects = (u32)desc->lba - 1;
352
353 /* Write MBR sector to the MMC device */
354 if (blk_dwrite(desc, 0, 1, p_mbr) != 1) {
355 log_debug("** Can't write to device %d **\n", desc->devnum);
356 return -EIO;
357 }
358
359 return 0;
360 }
361
362 int write_gpt_table(struct blk_desc *desc, gpt_header *gpt_h, gpt_entry *gpt_e)
363 {
364 const int pte_blk_cnt = BLOCK_CNT((gpt_h->num_partition_entries
365 * sizeof(gpt_entry)), desc);
366 u32 calc_crc32;
367
368 debug("max lba: %x\n", (u32)desc->lba);
369 /* Setup the Protective MBR */
370 if (set_protective_mbr(desc) < 0)
371 goto err;
372
373 /* Generate CRC for the Primary GPT Header */
374 calc_crc32 = efi_crc32((const unsigned char *)gpt_e,
375 le32_to_cpu(gpt_h->num_partition_entries) *
376 le32_to_cpu(gpt_h->sizeof_partition_entry));
377 gpt_h->partition_entry_array_crc32 = cpu_to_le32(calc_crc32);
378
379 calc_crc32 = efi_crc32((const unsigned char *)gpt_h,
380 le32_to_cpu(gpt_h->header_size));
381 gpt_h->header_crc32 = cpu_to_le32(calc_crc32);
382
383 /* Write the First GPT to the block right after the Legacy MBR */
384 if (blk_dwrite(desc, 1, 1, gpt_h) != 1)
385 goto err;
386
387 if (blk_dwrite(desc, le64_to_cpu(gpt_h->partition_entry_lba),
388 pte_blk_cnt, gpt_e) != pte_blk_cnt)
389 goto err;
390
391 prepare_backup_gpt_header(gpt_h);
392
393 if (blk_dwrite(desc, (lbaint_t)le64_to_cpu(gpt_h->last_usable_lba)
394 + 1, pte_blk_cnt, gpt_e) != pte_blk_cnt)
395 goto err;
396
397 if (blk_dwrite(desc, (lbaint_t)le64_to_cpu(gpt_h->my_lba), 1,
398 gpt_h) != 1)
399 goto err;
400
401 debug("GPT successfully written to block device!\n");
402 return 0;
403
404 err:
405 log_debug("** Can't write to device %d **\n", desc->devnum);
406 return -EIO;
407 }
408
409 int gpt_fill_pte(struct blk_desc *desc,
410 gpt_header *gpt_h, gpt_entry *gpt_e,
411 struct disk_partition *partitions, int parts)
412 {
413 lbaint_t offset = (lbaint_t)le64_to_cpu(gpt_h->first_usable_lba);
414 lbaint_t last_usable_lba = (lbaint_t)
415 le64_to_cpu(gpt_h->last_usable_lba);
416 int i, k;
417 size_t efiname_len, dosname_len;
418 #if CONFIG_IS_ENABLED(PARTITION_UUIDS)
419 char *str_uuid;
420 unsigned char *bin_uuid;
421 #endif
422 #ifdef CONFIG_PARTITION_TYPE_GUID
423 char *str_type_guid;
424 unsigned char *bin_type_guid;
425 #endif
426 size_t hdr_start = gpt_h->my_lba;
427 size_t hdr_end = hdr_start + 1;
428
429 size_t pte_start = gpt_h->partition_entry_lba;
430 size_t pte_end = pte_start +
431 gpt_h->num_partition_entries * gpt_h->sizeof_partition_entry /
432 desc->blksz;
433
434 for (i = 0; i < parts; i++) {
435 /* partition starting lba */
436 lbaint_t start = partitions[i].start;
437 lbaint_t size = partitions[i].size;
438
439 if (start) {
440 offset = start + size;
441 } else {
442 start = offset;
443 offset += size;
444 }
445
446 /*
447 * If our partition overlaps with either the GPT
448 * header, or the partition entry, reject it.
449 */
450 if (((start < hdr_end && hdr_start < (start + size)) ||
451 (start < pte_end && pte_start < (start + size)))) {
452 log_debug("Partition overlap\n");
453 return -ENOSPC;
454 }
455
456 gpt_e[i].starting_lba = cpu_to_le64(start);
457
458 if (offset > (last_usable_lba + 1)) {
459 log_debug("Partitions layout exceeds disk size\n");
460 return -E2BIG;
461 }
462 /* partition ending lba */
463 if ((i == parts - 1) && (size == 0))
464 /* extend the last partition to maximuim */
465 gpt_e[i].ending_lba = gpt_h->last_usable_lba;
466 else
467 gpt_e[i].ending_lba = cpu_to_le64(offset - 1);
468
469 #ifdef CONFIG_PARTITION_TYPE_GUID
470 str_type_guid = partitions[i].type_guid;
471 bin_type_guid = gpt_e[i].partition_type_guid.b;
472 if (strlen(str_type_guid)) {
473 if (uuid_str_to_bin(str_type_guid, bin_type_guid,
474 UUID_STR_FORMAT_GUID)) {
475 log_debug("Partition no. %d: invalid type guid: %s\n",
476 i, str_type_guid);
477 return -EINVAL;
478 }
479 } else {
480 /* default partition type GUID */
481 memcpy(bin_type_guid,
482 &partition_basic_data_guid, 16);
483 }
484 #else
485 /* partition type GUID */
486 memcpy(gpt_e[i].partition_type_guid.b,
487 &partition_basic_data_guid, 16);
488 #endif
489
490 #if CONFIG_IS_ENABLED(PARTITION_UUIDS)
491 str_uuid = partitions[i].uuid;
492 bin_uuid = gpt_e[i].unique_partition_guid.b;
493
494 if (uuid_str_to_bin(str_uuid, bin_uuid, UUID_STR_FORMAT_GUID)) {
495 log_debug("Partition no. %d: invalid guid: %s\n",
496 i, str_uuid);
497 return -EINVAL;
498 }
499 #endif
500
501 /* partition attributes */
502 memset(&gpt_e[i].attributes, 0,
503 sizeof(gpt_entry_attributes));
504
505 if (partitions[i].bootable & PART_BOOTABLE)
506 gpt_e[i].attributes.fields.legacy_bios_bootable = 1;
507
508 /* partition name */
509 efiname_len = sizeof(gpt_e[i].partition_name)
510 / sizeof(efi_char16_t);
511 dosname_len = sizeof(partitions[i].name);
512
513 memset(gpt_e[i].partition_name, 0,
514 sizeof(gpt_e[i].partition_name));
515
516 for (k = 0; k < min(dosname_len, efiname_len); k++)
517 gpt_e[i].partition_name[k] =
518 (efi_char16_t)(partitions[i].name[k]);
519
520 debug("%s: name: %s offset[%d]: 0x" LBAF
521 " size[%d]: 0x" LBAF "\n",
522 __func__, partitions[i].name, i,
523 offset, i, size);
524 }
525
526 return 0;
527 }
528
529 static uint32_t partition_entries_offset(struct blk_desc *desc)
530 {
531 uint32_t offset_blks = 2;
532 uint32_t __maybe_unused offset_bytes;
533 int __maybe_unused config_offset;
534
535 #if defined(CONFIG_EFI_PARTITION_ENTRIES_OFF)
536 /*
537 * Some architectures require their SPL loader at a fixed
538 * address within the first 16KB of the disk. To avoid an
539 * overlap with the partition entries of the EFI partition
540 * table, the first safe offset (in bytes, from the start of
541 * the disk) for the entries can be set in
542 * CONFIG_EFI_PARTITION_ENTRIES_OFF.
543 */
544 offset_bytes =
545 PAD_TO_BLOCKSIZE(CONFIG_EFI_PARTITION_ENTRIES_OFF, desc);
546 offset_blks = offset_bytes / desc->blksz;
547 #endif
548
549 #if defined(CONFIG_OF_CONTROL)
550 /*
551 * Allow the offset of the first partition entires (in bytes
552 * from the start of the device) to be specified as a property
553 * of the device tree '/config' node.
554 */
555 config_offset = ofnode_conf_read_int(
556 "u-boot,efi-partition-entries-offset", -EINVAL);
557 if (config_offset != -EINVAL) {
558 offset_bytes = PAD_TO_BLOCKSIZE(config_offset, desc);
559 offset_blks = offset_bytes / desc->blksz;
560 }
561 #endif
562
563 debug("efi: partition entries offset (in blocks): %d\n", offset_blks);
564
565 /*
566 * The earliest LBA this can be at is LBA#2 (i.e. right behind
567 * the (protective) MBR and the GPT header.
568 */
569 if (offset_blks < 2)
570 offset_blks = 2;
571
572 return offset_blks;
573 }
574
575 int gpt_fill_header(struct blk_desc *desc, gpt_header *gpt_h, char *str_guid,
576 int parts_count)
577 {
578 gpt_h->signature = cpu_to_le64(GPT_HEADER_SIGNATURE_UBOOT);
579 gpt_h->revision = cpu_to_le32(GPT_HEADER_REVISION_V1);
580 gpt_h->header_size = cpu_to_le32(sizeof(gpt_header));
581 gpt_h->my_lba = cpu_to_le64(1);
582 gpt_h->alternate_lba = cpu_to_le64(desc->lba - 1);
583 gpt_h->last_usable_lba = cpu_to_le64(desc->lba - 34);
584 gpt_h->partition_entry_lba =
585 cpu_to_le64(partition_entries_offset(desc));
586 gpt_h->first_usable_lba =
587 cpu_to_le64(le64_to_cpu(gpt_h->partition_entry_lba) + 32);
588 gpt_h->num_partition_entries = cpu_to_le32(GPT_ENTRY_NUMBERS);
589 gpt_h->sizeof_partition_entry = cpu_to_le32(sizeof(gpt_entry));
590 gpt_h->header_crc32 = 0;
591 gpt_h->partition_entry_array_crc32 = 0;
592
593 if (uuid_str_to_bin(str_guid, gpt_h->disk_guid.b, UUID_STR_FORMAT_GUID))
594 return -1;
595
596 return 0;
597 }
598
599 int gpt_restore(struct blk_desc *desc, char *str_disk_guid,
600 struct disk_partition *partitions, int parts_count)
601 {
602 gpt_header *gpt_h;
603 gpt_entry *gpt_e;
604 int ret, size;
605
606 size = PAD_TO_BLOCKSIZE(sizeof(gpt_header), desc);
607 gpt_h = malloc_cache_aligned(size);
608 if (gpt_h == NULL) {
609 log_debug("calloc failed!\n");
610 return -ENOMEM;
611 }
612 memset(gpt_h, 0, size);
613
614 size = PAD_TO_BLOCKSIZE(GPT_ENTRY_NUMBERS * sizeof(gpt_entry),
615 desc);
616 gpt_e = malloc_cache_aligned(size);
617 if (gpt_e == NULL) {
618 log_debug("calloc failed!\n");
619 free(gpt_h);
620 return -ENOMEM;
621 }
622 memset(gpt_e, 0, size);
623
624 /* Generate Primary GPT header (LBA1) */
625 ret = gpt_fill_header(desc, gpt_h, str_disk_guid, parts_count);
626 if (ret)
627 goto err;
628
629 /* Generate partition entries */
630 ret = gpt_fill_pte(desc, gpt_h, gpt_e, partitions, parts_count);
631 if (ret)
632 goto err;
633
634 /* Write GPT partition table */
635 ret = write_gpt_table(desc, gpt_h, gpt_e);
636
637 err:
638 free(gpt_e);
639 free(gpt_h);
640 return ret;
641 }
642
643 /**
644 * gpt_convert_efi_name_to_char() - convert u16 string to char string
645 *
646 * TODO: this conversion only supports ANSI characters
647 *
648 * @s: target buffer
649 * @es: u16 string to be converted
650 * @n: size of target buffer
651 */
652 static void gpt_convert_efi_name_to_char(char *s, void *es, int n)
653 {
654 char *ess = es;
655 int i, j;
656
657 memset(s, '\0', n);
658
659 for (i = 0, j = 0; j < n; i += 2, j++) {
660 s[j] = ess[i];
661 if (!ess[i])
662 return;
663 }
664 }
665
666 int gpt_verify_headers(struct blk_desc *desc, gpt_header *gpt_head,
667 gpt_entry **gpt_pte)
668 {
669 /*
670 * This function validates AND
671 * fills in the GPT header and PTE
672 */
673 if (is_gpt_valid(desc,
674 GPT_PRIMARY_PARTITION_TABLE_LBA,
675 gpt_head, gpt_pte) != 1) {
676 log_debug("Invalid GPT\n");
677 return -1;
678 }
679
680 /* Free pte before allocating again */
681 free(*gpt_pte);
682
683 /*
684 * Check that the alternate_lba entry points to the last LBA
685 */
686 if (le64_to_cpu(gpt_head->alternate_lba) != (desc->lba - 1)) {
687 log_debug("Misplaced Backup GPT\n");
688 return -1;
689 }
690
691 if (is_gpt_valid(desc, (desc->lba - 1),
692 gpt_head, gpt_pte) != 1) {
693 log_debug("Invalid Backup GPT\n");
694 return -1;
695 }
696
697 return 0;
698 }
699
700 static void restore_primary_gpt_header(gpt_header *gpt_h, struct blk_desc *desc)
701 {
702 u32 calc_crc32;
703 u64 val;
704
705 /* recalculate the values for the Primary GPT Header */
706 val = le64_to_cpu(gpt_h->my_lba);
707 gpt_h->my_lba = gpt_h->alternate_lba;
708 gpt_h->alternate_lba = cpu_to_le64(val);
709 gpt_h->partition_entry_lba = cpu_to_le64(partition_entries_offset(desc));
710
711 gpt_h->header_crc32 = 0;
712
713 calc_crc32 = efi_crc32((const unsigned char *)gpt_h,
714 le32_to_cpu(gpt_h->header_size));
715 gpt_h->header_crc32 = cpu_to_le32(calc_crc32);
716 }
717
718 static int write_one_gpt_table(struct blk_desc *desc, gpt_header *gpt_h,
719 gpt_entry *gpt_e)
720 {
721 const int pte_blk_cnt = BLOCK_CNT((gpt_h->num_partition_entries
722 * sizeof(gpt_entry)), desc);
723 lbaint_t start;
724 int ret = 0;
725
726 start = le64_to_cpu(gpt_h->my_lba);
727 if (blk_dwrite(desc, start, 1, gpt_h) != 1) {
728 ret = -1;
729 goto out;
730 }
731
732 start = le64_to_cpu(gpt_h->partition_entry_lba);
733 if (blk_dwrite(desc, start, pte_blk_cnt, gpt_e) != pte_blk_cnt) {
734 ret = -1;
735 goto out;
736 }
737
738 out:
739 return ret;
740 }
741
742 int gpt_repair_headers(struct blk_desc *desc)
743 {
744 ALLOC_CACHE_ALIGN_BUFFER_PAD(gpt_header, gpt_h1, 1, desc->blksz);
745 ALLOC_CACHE_ALIGN_BUFFER_PAD(gpt_header, gpt_h2, 1, desc->blksz);
746 gpt_entry *gpt_e1 = NULL, *gpt_e2 = NULL;
747 int is_gpt1_valid, is_gpt2_valid;
748 int ret = -1;
749
750 is_gpt1_valid = is_gpt_valid(desc, GPT_PRIMARY_PARTITION_TABLE_LBA,
751 gpt_h1, &gpt_e1);
752 is_gpt2_valid = is_gpt_valid(desc, desc->lba - 1,
753 gpt_h2, &gpt_e2);
754
755 if (is_gpt1_valid && is_gpt2_valid) {
756 ret = 0;
757 goto out;
758 }
759
760 if (is_gpt1_valid && !is_gpt2_valid) {
761 prepare_backup_gpt_header(gpt_h1);
762 ret = write_one_gpt_table(desc, gpt_h1, gpt_e1);
763 goto out;
764 }
765
766 if (!is_gpt1_valid && is_gpt2_valid) {
767 restore_primary_gpt_header(gpt_h2, desc);
768 ret = write_one_gpt_table(desc, gpt_h2, gpt_e2);
769 goto out;
770 }
771
772 if (!is_gpt1_valid && !is_gpt2_valid) {
773 ret = -1;
774 goto out;
775 }
776
777 out:
778 if (is_gpt1_valid)
779 free(gpt_e1);
780 if (is_gpt2_valid)
781 free(gpt_e2);
782
783 return ret;
784 }
785
786 int gpt_verify_partitions(struct blk_desc *desc,
787 struct disk_partition *partitions, int parts,
788 gpt_header *gpt_head, gpt_entry **gpt_pte)
789 {
790 char efi_str[PARTNAME_SZ + 1];
791 u64 gpt_part_size;
792 gpt_entry *gpt_e;
793 int ret, i;
794
795 ret = gpt_verify_headers(desc, gpt_head, gpt_pte);
796 if (ret)
797 return ret;
798
799 gpt_e = *gpt_pte;
800
801 for (i = 0; i < parts; i++) {
802 if (i == gpt_head->num_partition_entries) {
803 pr_err("More partitions than allowed!\n");
804 return -1;
805 }
806
807 /* Check if GPT and ENV partition names match */
808 gpt_convert_efi_name_to_char(efi_str, gpt_e[i].partition_name,
809 PARTNAME_SZ + 1);
810
811 debug("%s: part: %2d name - GPT: %16s, ENV: %16s ",
812 __func__, i, efi_str, partitions[i].name);
813
814 if (strncmp(efi_str, (char *)partitions[i].name,
815 sizeof(partitions->name))) {
816 pr_err("Partition name: %s does not match %s!\n",
817 efi_str, (char *)partitions[i].name);
818 return -1;
819 }
820
821 /* Check if GPT and ENV sizes match */
822 gpt_part_size = le64_to_cpu(gpt_e[i].ending_lba) -
823 le64_to_cpu(gpt_e[i].starting_lba) + 1;
824 debug("size(LBA) - GPT: %8llu, ENV: %8llu ",
825 (unsigned long long)gpt_part_size,
826 (unsigned long long)partitions[i].size);
827
828 if (le64_to_cpu(gpt_part_size) != partitions[i].size) {
829 /* We do not check the extend partition size */
830 if ((i == parts - 1) && (partitions[i].size == 0))
831 continue;
832
833 pr_err("Partition %s size: %llu does not match %llu!\n",
834 efi_str, (unsigned long long)gpt_part_size,
835 (unsigned long long)partitions[i].size);
836 return -1;
837 }
838
839 /*
840 * Start address is optional - check only if provided
841 * in '$partition' variable
842 */
843 if (!partitions[i].start) {
844 debug("\n");
845 continue;
846 }
847
848 /* Check if GPT and ENV start LBAs match */
849 debug("start LBA - GPT: %8llu, ENV: %8llu\n",
850 le64_to_cpu(gpt_e[i].starting_lba),
851 (unsigned long long)partitions[i].start);
852
853 if (le64_to_cpu(gpt_e[i].starting_lba) != partitions[i].start) {
854 pr_err("Partition %s start: %llu does not match %llu!\n",
855 efi_str, le64_to_cpu(gpt_e[i].starting_lba),
856 (unsigned long long)partitions[i].start);
857 return -1;
858 }
859 }
860
861 return 0;
862 }
863
864 int is_valid_gpt_buf(struct blk_desc *desc, void *buf)
865 {
866 gpt_header *gpt_h;
867 gpt_entry *gpt_e;
868
869 /* determine start of GPT Header in the buffer */
870 gpt_h = buf + (GPT_PRIMARY_PARTITION_TABLE_LBA * desc->blksz);
871 if (validate_gpt_header(gpt_h, GPT_PRIMARY_PARTITION_TABLE_LBA,
872 desc->lba))
873 return -1;
874
875 /* determine start of GPT Entries in the buffer */
876 gpt_e = buf + (le64_to_cpu(gpt_h->partition_entry_lba) *
877 desc->blksz);
878 if (validate_gpt_entries(gpt_h, gpt_e))
879 return -1;
880
881 return 0;
882 }
883
884 int write_mbr_and_gpt_partitions(struct blk_desc *desc, void *buf)
885 {
886 gpt_header *gpt_h;
887 gpt_entry *gpt_e;
888 int gpt_e_blk_cnt;
889 lbaint_t lba;
890 int cnt;
891
892 if (is_valid_gpt_buf(desc, buf))
893 return -1;
894
895 /* determine start of GPT Header in the buffer */
896 gpt_h = buf + (GPT_PRIMARY_PARTITION_TABLE_LBA * desc->blksz);
897
898 /* determine start of GPT Entries in the buffer */
899 gpt_e = buf + (le64_to_cpu(gpt_h->partition_entry_lba) * desc->blksz);
900 gpt_e_blk_cnt = BLOCK_CNT((le32_to_cpu(gpt_h->num_partition_entries) *
901 le32_to_cpu(gpt_h->sizeof_partition_entry)),
902 desc);
903
904 /* write MBR */
905 lba = 0; /* MBR is always at 0 */
906 cnt = 1; /* MBR (1 block) */
907 if (blk_dwrite(desc, lba, cnt, buf) != cnt) {
908 log_debug("failed writing '%s' (%d blks at 0x" LBAF ")\n",
909 "MBR", cnt, lba);
910 return 1;
911 }
912
913 /* write Primary GPT */
914 lba = GPT_PRIMARY_PARTITION_TABLE_LBA;
915 cnt = 1; /* GPT Header (1 block) */
916 if (blk_dwrite(desc, lba, cnt, gpt_h) != cnt) {
917 log_debug("failed writing '%s' (%d blks at 0x" LBAF ")\n",
918 "Primary GPT Header", cnt, lba);
919 return 1;
920 }
921
922 lba = le64_to_cpu(gpt_h->partition_entry_lba);
923 cnt = gpt_e_blk_cnt;
924 if (blk_dwrite(desc, lba, cnt, gpt_e) != cnt) {
925 log_debug("failed writing '%s' (%d blks at 0x" LBAF ")\n",
926 "Primary GPT Entries", cnt, lba);
927 return 1;
928 }
929
930 prepare_backup_gpt_header(gpt_h);
931
932 /* write Backup GPT */
933 lba = le64_to_cpu(gpt_h->partition_entry_lba);
934 cnt = gpt_e_blk_cnt;
935 if (blk_dwrite(desc, lba, cnt, gpt_e) != cnt) {
936 log_debug("failed writing '%s' (%d blks at 0x" LBAF ")\n",
937 "Backup GPT Entries", cnt, lba);
938 return 1;
939 }
940
941 lba = le64_to_cpu(gpt_h->my_lba);
942 cnt = 1; /* GPT Header (1 block) */
943 if (blk_dwrite(desc, lba, cnt, gpt_h) != cnt) {
944 log_debug("failed writing '%s' (%d blks at 0x" LBAF ")\n",
945 "Backup GPT Header", cnt, lba);
946 return 1;
947 }
948
949 /* Update the partition table entries*/
950 part_init(desc);
951
952 return 0;
953 }
954 #endif
955
956 /*
957 * Private functions
958 */
959 /*
960 * pmbr_part_valid(): Check for EFI partition signature
961 *
962 * Returns: 1 if EFI GPT partition type is found.
963 */
964 static int pmbr_part_valid(struct partition *part)
965 {
966 if (part->sys_ind == EFI_PMBR_OSTYPE_EFI_GPT &&
967 get_unaligned_le32(&part->start_sect) == 1UL) {
968 return 1;
969 }
970
971 return 0;
972 }
973
974 /*
975 * is_pmbr_valid(): test Protective MBR for validity
976 *
977 * Returns: 1 if PMBR is valid, 0 otherwise.
978 * Validity depends on two things:
979 * 1) MSDOS signature is in the last two bytes of the MBR
980 * 2) One partition of type 0xEE is found, checked by pmbr_part_valid()
981 */
982 static int is_pmbr_valid(legacy_mbr * mbr)
983 {
984 int i = 0;
985
986 if (!mbr || le16_to_cpu(mbr->signature) != MSDOS_MBR_SIGNATURE)
987 return 0;
988
989 for (i = 0; i < 4; i++) {
990 if (pmbr_part_valid(&mbr->partition_record[i])) {
991 return 1;
992 }
993 }
994 return 0;
995 }
996
997 /**
998 * is_gpt_valid() - tests one GPT header and PTEs for validity
999 *
1000 * lba is the logical block address of the GPT header to test
1001 * gpt is a GPT header ptr, filled on return.
1002 * ptes is a PTEs ptr, filled on return.
1003 *
1004 * Description: returns 1 if valid, 0 on error, 2 if ignored header
1005 * If valid, returns pointers to PTEs.
1006 */
1007 static int is_gpt_valid(struct blk_desc *desc, u64 lba, gpt_header *pgpt_head,
1008 gpt_entry **pgpt_pte)
1009 {
1010 /* Confirm valid arguments prior to allocation. */
1011 if (!desc || !pgpt_head) {
1012 log_debug("Invalid Argument(s)\n");
1013 return 0;
1014 }
1015
1016 ALLOC_CACHE_ALIGN_BUFFER_PAD(legacy_mbr, mbr, 1, desc->blksz);
1017
1018 /* Read MBR Header from device */
1019 if (blk_dread(desc, 0, 1, (ulong *)mbr) != 1) {
1020 log_debug("Can't read MBR header\n");
1021 return 0;
1022 }
1023
1024 /* Read GPT Header from device */
1025 if (blk_dread(desc, (lbaint_t)lba, 1, pgpt_head) != 1) {
1026 log_debug("Can't read GPT header\n");
1027 return 0;
1028 }
1029
1030 /* Invalid but nothing to yell about. */
1031 if (le64_to_cpu(pgpt_head->signature) == GPT_HEADER_CHROMEOS_IGNORE) {
1032 log_debug("ChromeOS 'IGNOREME' GPT header found and ignored\n");
1033 return 2;
1034 }
1035
1036 if (validate_gpt_header(pgpt_head, (lbaint_t)lba, desc->lba))
1037 return 0;
1038
1039 if (desc->sig_type == SIG_TYPE_NONE) {
1040 efi_guid_t empty = {};
1041 if (memcmp(&pgpt_head->disk_guid, &empty, sizeof(empty))) {
1042 desc->sig_type = SIG_TYPE_GUID;
1043 memcpy(&desc->guid_sig, &pgpt_head->disk_guid,
1044 sizeof(empty));
1045 } else if (mbr->unique_mbr_signature != 0) {
1046 desc->sig_type = SIG_TYPE_MBR;
1047 desc->mbr_sig = mbr->unique_mbr_signature;
1048 }
1049 }
1050
1051 /* Read and allocate Partition Table Entries */
1052 *pgpt_pte = alloc_read_gpt_entries(desc, pgpt_head);
1053 if (!*pgpt_pte)
1054 return 0;
1055
1056 if (validate_gpt_entries(pgpt_head, *pgpt_pte)) {
1057 free(*pgpt_pte);
1058 return 0;
1059 }
1060
1061 /* We're done, all's well */
1062 return 1;
1063 }
1064
1065 /**
1066 * find_valid_gpt() - finds a valid GPT header and PTEs
1067 *
1068 * gpt is a GPT header ptr, filled on return.
1069 * ptes is a PTEs ptr, filled on return.
1070 *
1071 * Description: returns 1 if found a valid gpt, 0 on error.
1072 * If valid, returns pointers to PTEs.
1073 */
1074 static int find_valid_gpt(struct blk_desc *desc, gpt_header *gpt_head,
1075 gpt_entry **pgpt_pte)
1076 {
1077 int r;
1078
1079 r = is_gpt_valid(desc, GPT_PRIMARY_PARTITION_TABLE_LBA, gpt_head,
1080 pgpt_pte);
1081
1082 if (r != 1) {
1083 if (r != 2)
1084 log_debug("Invalid GPT\n");
1085
1086 if (is_gpt_valid(desc, desc->lba - 1, gpt_head, pgpt_pte)
1087 != 1) {
1088 log_debug("Invalid Backup GPT\n");
1089 return 0;
1090 }
1091 if (r != 2)
1092 log_debug(" Using Backup GPT\n");
1093 }
1094 return 1;
1095 }
1096
1097 /**
1098 * alloc_read_gpt_entries(): reads partition entries from disk
1099 * @desc
1100 * @gpt - GPT header
1101 *
1102 * Description: Returns ptes on success, NULL on error.
1103 * Allocates space for PTEs based on information found in @gpt.
1104 * Notes: remember to free pte when you're done!
1105 */
1106 static gpt_entry *alloc_read_gpt_entries(struct blk_desc *desc,
1107 gpt_header *pgpt_head)
1108 {
1109 size_t count = 0, blk_cnt;
1110 lbaint_t blk;
1111 gpt_entry *pte = NULL;
1112
1113 if (!desc || !pgpt_head) {
1114 log_debug("Invalid Argument(s)\n");
1115 return NULL;
1116 }
1117
1118 count = le32_to_cpu(pgpt_head->num_partition_entries) *
1119 le32_to_cpu(pgpt_head->sizeof_partition_entry);
1120
1121 log_debug("count = %u * %u = %lu\n",
1122 (u32)le32_to_cpu(pgpt_head->num_partition_entries),
1123 (u32)le32_to_cpu(pgpt_head->sizeof_partition_entry),
1124 (ulong)count);
1125
1126 /* Allocate memory for PTE, remember to FREE */
1127 if (count != 0) {
1128 pte = memalign(ARCH_DMA_MINALIGN,
1129 PAD_TO_BLOCKSIZE(count, desc));
1130 }
1131
1132 if (count == 0 || pte == NULL) {
1133 log_debug("ERROR: Can't allocate %#lX bytes for GPT Entries\n",
1134 (ulong)count);
1135 return NULL;
1136 }
1137
1138 /* Read GPT Entries from device */
1139 blk = le64_to_cpu(pgpt_head->partition_entry_lba);
1140 blk_cnt = BLOCK_CNT(count, desc);
1141 if (blk_dread(desc, blk, (lbaint_t)blk_cnt, pte) != blk_cnt) {
1142 log_debug("Can't read GPT Entries\n");
1143 free(pte);
1144 return NULL;
1145 }
1146 return pte;
1147 }
1148
1149 /**
1150 * is_pte_valid(): validates a single Partition Table Entry
1151 * @gpt_entry - Pointer to a single Partition Table Entry
1152 *
1153 * Description: returns 1 if valid, 0 on error.
1154 */
1155 static int is_pte_valid(gpt_entry * pte)
1156 {
1157 efi_guid_t unused_guid;
1158
1159 if (!pte) {
1160 log_debug("Invalid Argument(s)\n");
1161 return 0;
1162 }
1163
1164 /* Only one validation for now:
1165 * The GUID Partition Type != Unused Entry (ALL-ZERO)
1166 */
1167 memset(unused_guid.b, 0, sizeof(unused_guid.b));
1168
1169 if (memcmp(pte->partition_type_guid.b, unused_guid.b,
1170 sizeof(unused_guid.b)) == 0) {
1171
1172 log_debug("Found an unused PTE GUID at 0x%08X\n",
1173 (unsigned int)(uintptr_t)pte);
1174
1175 return 0;
1176 } else {
1177 return 1;
1178 }
1179 }
1180
1181 /*
1182 * Add an 'a_' prefix so it comes before 'dos' in the linker list. We need to
1183 * check EFI first, since a DOS partition is often used as a 'protective MBR'
1184 * with EFI.
1185 */
1186 U_BOOT_PART_TYPE(a_efi) = {
1187 .name = "EFI",
1188 .part_type = PART_TYPE_EFI,
1189 .max_entries = GPT_ENTRY_NUMBERS,
1190 .get_info = part_get_info_ptr(part_get_info_efi),
1191 .print = part_print_ptr(part_print_efi),
1192 .test = part_test_efi,
1193 };