2
* Low-level libblkid probing API
4
* Copyright (C) 2008-2009 Karel Zak <kzak@redhat.com>
6
* This file may be redistributed under the terms of the
7
* GNU Lesser General Public License.
12
* @title: Low-level probing
13
* @short_description: low-level prober initialization
15
* The low-level probing routines always and directly read information from
16
* the selected (see blkid_probe_set_device()) device.
18
* The probing routines are grouped together into separate chains. Currently,
19
* the library provides superblocks, partitions and topology chains.
21
* The probing routines is possible to filter (enable/disable) by type (e.g.
22
* fstype "vfat" or partype "gpt") or by usage flags (e.g. BLKID_USAGE_RAID).
23
* These filters are per-chain. Note that always when you touch the chain
24
* filter the current probing position is reseted and probing starts from
25
* scratch. It means that the chain filter should not be modified during
26
* probing, for example in loop where you call blkid_do_probe().
28
* For more details see the chain specific documentation.
30
* The low-level API provides two ways how access to probing results.
32
* 1. The NAME=value (tag) interface. This interface is older and returns all data
33
* as strings. This interface is generic for all chains.
35
* 2. The binary interfaces. These interfaces return data in the native formats.
36
* The interface is always specific to the probing chain.
38
* Note that the previous probing result (binary or NAME=value) is always
39
* zeroized when a chain probing function is called. For example
43
* blkid_probe_enable_partitions(pr, TRUE);
44
* blkid_probe_enable_superblocks(pr, FALSE);
46
* blkid_do_safeprobe(pr);
50
* overwrites the previous probing result for the partitions chain, the superblocks
51
* result is not modified.
55
* SECTION: lowprobe-tags
56
* @title: Low-level tags
57
* @short_description: generic NAME=value interface.
59
* The probing routines inside the chain are mutually exclusive by default --
60
* only few probing routines are marked as "tolerant". The "tolerant" probing
61
* routines are used for filesystem which can share the same device with any
62
* other filesystem. The blkid_do_safeprobe() checks for the "tolerant" flag.
64
* The SUPERBLOCKS chain is enabled by default. The all others chains is
65
* necessary to enable by blkid_probe_enable_'CHAINNAME'(). See chains specific
68
* The blkid_do_probe() function returns a result from only one probing
69
* routine, and the next call from the next probing routine. It means you need
70
* to call the function in loop, for example:
74
* while((blkid_do_probe(pr) == 0)
79
* The blkid_do_safeprobe() is the same as blkid_do_probe(), but returns only
80
* first probing result for every enabled chain. This function checks for
81
* ambivalent results (e.g. more "intolerant" filesystems superblocks on the
84
* The probing result is set of NAME=value pairs (the NAME is always unique).
93
#include <sys/types.h>
94
#ifdef HAVE_LINUX_CDROM_H
95
#include <linux/cdrom.h>
97
#ifdef HAVE_SYS_STAT_H
103
#include <inttypes.h>
108
# ifdef HAVE_UUID_UUID_H
109
# include <uuid/uuid.h>
118
extern const struct blkid_chaindrv superblocks_drv;
119
extern const struct blkid_chaindrv topology_drv;
120
extern const struct blkid_chaindrv partitions_drv;
123
* All supported chains
125
static const struct blkid_chaindrv *chains_drvs[] = {
126
[BLKID_CHAIN_SUBLKS] = &superblocks_drv,
127
[BLKID_CHAIN_TOPLGY] = &topology_drv,
128
[BLKID_CHAIN_PARTS] = &partitions_drv
131
static void blkid_probe_reset_vals(blkid_probe pr);
132
static void blkid_probe_reset_buffer(blkid_probe pr);
137
* Returns: a pointer to the newly allocated probe struct.
139
blkid_probe blkid_new_probe(void)
145
pr = calloc(1, sizeof(struct blkid_struct_probe));
149
/* initialize chains */
150
for (i = 0; i < BLKID_NCHAINS; i++) {
151
pr->chains[i].driver = chains_drvs[i];
152
pr->chains[i].flags = chains_drvs[i]->dflt_flags;
153
pr->chains[i].enabled = chains_drvs[i]->dflt_enabled;
155
INIT_LIST_HEAD(&pr->buffers);
160
* blkid_new_probe_from_filename:
161
* @filename: device or regular file
163
* This function is same as call open(filename), blkid_new_probe() and
164
* blkid_probe_set_device(pr, fd, 0, 0).
166
* The @filename is closed by blkid_free_probe() or by the
167
* blkid_probe_set_device() call.
169
* Returns: a pointer to the newly allocated probe struct or NULL in case of
172
blkid_probe blkid_new_probe_from_filename(const char *filename)
175
blkid_probe pr = NULL;
180
fd = open(filename, O_RDONLY);
184
pr = blkid_new_probe();
188
if (blkid_probe_set_device(pr, fd, 0, 0))
191
pr->flags |= BLKID_PRIVATE_FD;
196
blkid_free_probe(pr);
204
* Deallocates the probe struct, buffers and all allocated
205
* data that are associated with this probing control struct.
207
void blkid_free_probe(blkid_probe pr)
214
for (i = 0; i < BLKID_NCHAINS; i++) {
215
struct blkid_chain *ch = &pr->chains[i];
217
if (ch->driver->free_data)
218
ch->driver->free_data(pr, ch->data);
222
if ((pr->flags & BLKID_PRIVATE_FD) && pr->fd >= 0)
224
blkid_probe_reset_buffer(pr);
230
* Removes chain values from probing result.
232
void blkid_probe_chain_reset_vals(blkid_probe pr, struct blkid_chain *chn)
234
int nvals = pr->nvals;
237
for (x = 0, i = 0; i < pr->nvals; i++) {
238
struct blkid_prval *v = &pr->vals[i];
240
if (v->chain != chn && x == i) {
244
if (v->chain == chn) {
248
memcpy(&pr->vals[x++], v, sizeof(struct blkid_prval));
253
static void blkid_probe_chain_reset_position(struct blkid_chain *chn)
260
* Copies chain values from probing result to @vals, the max size of @vals is
261
* @nvals and returns real number of values.
263
int blkid_probe_chain_copy_vals(blkid_probe pr, struct blkid_chain *chn,
264
struct blkid_prval *vals, int nvals)
268
for (x = 0, i = 0; i < pr->nvals && x < nvals; i++) {
269
struct blkid_prval *v = &pr->vals[i];
273
memcpy(&vals[x++], v, sizeof(struct blkid_prval));
279
* Appends values from @vals to the probing result
281
void blkid_probe_append_vals(blkid_probe pr, struct blkid_prval *vals, int nvals)
285
while (i < nvals && pr->nvals < BLKID_NVALS) {
286
memcpy(&pr->vals[pr->nvals++], &vals[i++],
287
sizeof(struct blkid_prval));
291
static void blkid_probe_reset_vals(blkid_probe pr)
293
memset(pr->vals, 0, sizeof(pr->vals));
297
struct blkid_chain *blkid_probe_get_chain(blkid_probe pr)
299
return pr->cur_chain;
302
void *blkid_probe_get_binary_data(blkid_probe pr, struct blkid_chain *chn)
304
int rc, org_prob_flags;
305
struct blkid_chain *org_chn;
310
/* save the current setting -- the binary API has to be completely
311
* independent on the current probing status
313
org_chn = pr->cur_chain;
314
org_prob_flags = pr->prob_flags;
319
blkid_probe_chain_reset_position(chn);
321
rc = chn->driver->probe(pr, chn);
324
blkid_probe_chain_reset_position(chn);
326
/* restore the original setting
328
pr->cur_chain = org_chn;
329
pr->prob_flags = org_prob_flags;
335
printf("returning %s binary data\n", chn->driver->name));
344
* Zeroize probing results and resets the current probing (this has impact to
345
* blkid_do_probe() only). This function does not touch probing filters and
346
* keeps assigned device.
348
void blkid_reset_probe(blkid_probe pr)
355
blkid_probe_reset_buffer(pr);
356
blkid_probe_reset_vals(pr);
358
pr->cur_chain = NULL;
360
for (i = 0; i < BLKID_NCHAINS; i++)
361
blkid_probe_chain_reset_position(&pr->chains[i]);
365
static int blkid_probe_dump_filter(blkid_probe pr, int chain)
367
struct blkid_chain *chn;
370
if (!pr || chain < 0 || chain >= BLKID_NCHAINS)
373
chn = &pr->chains[chain];
378
for (i = 0; i < chn->driver->nidinfos; i++) {
379
const struct blkid_idinfo *id = chn->driver->idinfos[i];
381
DBG(DEBUG_LOWPROBE, printf("%d: %s: %s\n",
384
blkid_bmp_get_item(chn->fltr, i)
385
? "disabled" : "enabled <--"));
392
* Returns properly initialized chain filter
394
unsigned long *blkid_probe_get_filter(blkid_probe pr, int chain, int create)
396
struct blkid_chain *chn;
398
if (!pr || chain < 0 || chain >= BLKID_NCHAINS)
401
chn = &pr->chains[chain];
403
/* always when you touch the chain filter all indexes are reseted and
404
* probing starts from scratch
406
blkid_probe_chain_reset_position(chn);
407
pr->cur_chain = NULL;
409
if (!chn->driver->has_fltr || (!chn->fltr && !create))
413
chn->fltr = calloc(1, blkid_bmp_nbytes(chn->driver->nidinfos));
415
memset(chn->fltr, 0, blkid_bmp_nbytes(chn->driver->nidinfos));
417
/* blkid_probe_dump_filter(pr, chain); */
422
* Generic private functions for filter setting
424
int __blkid_probe_invert_filter(blkid_probe pr, int chain)
427
struct blkid_chain *chn;
429
chn = &pr->chains[chain];
431
if (!chn->driver->has_fltr || !chn->fltr)
434
for (i = 0; i < blkid_bmp_nwords(chn->driver->nidinfos); i++)
435
chn->fltr[i] = ~chn->fltr[i];
437
DBG(DEBUG_LOWPROBE, printf("probing filter inverted\n"));
438
/* blkid_probe_dump_filter(pr, chain); */
442
int __blkid_probe_reset_filter(blkid_probe pr, int chain)
444
return blkid_probe_get_filter(pr, chain, FALSE) ? 0 : -1;
447
int __blkid_probe_filter_types(blkid_probe pr, int chain, int flag, char *names[])
450
struct blkid_chain *chn;
453
fltr = blkid_probe_get_filter(pr, chain, TRUE);
457
chn = &pr->chains[chain];
459
for (i = 0; i < chn->driver->nidinfos; i++) {
461
const struct blkid_idinfo *id = chn->driver->idinfos[i];
464
for (n = names; *n; n++) {
465
if (!strcmp(id->name, *n)) {
470
if (flag & BLKID_FLTR_ONLYIN) {
472
blkid_bmp_set_item(fltr, i);
473
} else if (flag & BLKID_FLTR_NOTIN) {
475
blkid_bmp_set_item(fltr, i);
480
printf("%s: a new probing type-filter initialized\n",
482
/* blkid_probe_dump_filter(pr, chain); */
486
unsigned char *blkid_probe_get_buffer(blkid_probe pr,
487
blkid_loff_t off, blkid_loff_t len)
490
struct blkid_bufinfo *bf = NULL;
495
list_for_each(p, &pr->buffers) {
496
struct blkid_bufinfo *x =
497
list_entry(p, struct blkid_bufinfo, bufs);
499
if (x->off <= off && off + len <= x->off + x->len) {
501
printf("\treuse buffer: off=%jd len=%jd\n",
510
if (blkid_llseek(pr->fd, pr->off + off, SEEK_SET) < 0)
513
/* allocate info and space for data by why call */
514
bf = calloc(1, sizeof(struct blkid_bufinfo) + len);
518
bf->data = ((unsigned char *) bf) + sizeof(struct blkid_bufinfo);
521
INIT_LIST_HEAD(&bf->bufs);
524
printf("\tbuffer read: off=%jd len=%jd\n", off, len));
526
ret = read(pr->fd, bf->data, len);
527
if (ret != (ssize_t) len) {
531
list_add_tail(&bf->bufs, &pr->buffers);
534
return off ? bf->data + (off - bf->off) : bf->data;
538
static void blkid_probe_reset_buffer(blkid_probe pr)
540
uint64_t read_ct = 0, len_ct = 0;
542
if (!pr || list_empty(&pr->buffers))
545
DBG(DEBUG_LOWPROBE, printf("reseting probing buffers\n"));
547
while (!list_empty(&pr->buffers)) {
548
struct blkid_bufinfo *bf = list_entry(pr->buffers.next,
549
struct blkid_bufinfo, bufs);
558
printf("buffers summary: %"PRIu64" bytes "
559
"by %"PRIu64" read() call(s)\n",
562
INIT_LIST_HEAD(&pr->buffers);
566
* Small devices need a special care.
568
int blkid_probe_is_tiny(blkid_probe pr)
570
return pr && (pr->flags & BLKID_TINY_DEV);
574
* CDROMs may fail when probed for RAID (last sector problem)
576
int blkid_probe_is_cdrom(blkid_probe pr)
578
return pr && (pr->flags & BLKID_CDROM_DEV);
582
* blkid_probe_set_device:
584
* @fd: device file descriptor
585
* @off: begin of probing area
586
* @size: size of probing area (zero means whole device/file)
588
* Assigns the device to probe control struct, resets internal buffers and
589
* resets the current probing.
591
* Returns: -1 in case of failure, or 0 on success.
593
int blkid_probe_set_device(blkid_probe pr, int fd,
594
blkid_loff_t off, blkid_loff_t size)
601
blkid_reset_probe(pr);
603
if ((pr->flags & BLKID_PRIVATE_FD) && pr->fd >= 0)
606
pr->flags &= ~BLKID_PRIVATE_FD;
607
pr->flags &= ~BLKID_TINY_DEV;
608
pr->flags &= ~BLKID_CDROM_DEV;
616
#if defined(POSIX_FADV_RANDOM) && defined(HAVE_POSIX_FADVISE)
617
/* Disable read-ahead */
618
posix_fadvise(fd, 0, 0, POSIX_FADV_RANDOM);
623
if (!S_ISBLK(sb.st_mode) && !S_ISCHR(sb.st_mode) && !S_ISREG(sb.st_mode))
626
pr->mode = sb.st_mode;
627
if (S_ISBLK(sb.st_mode) || S_ISCHR(sb.st_mode))
628
pr->devno = sb.st_rdev;
633
if (S_ISBLK(sb.st_mode)) {
634
if (blkdev_get_size(fd, (unsigned long long *) &pr->size)) {
635
DBG(DEBUG_LOWPROBE, printf(
636
"failed to get device size\n"));
639
} else if (S_ISCHR(sb.st_mode))
640
pr->size = 1; /* UBI devices are char... */
641
else if (S_ISREG(sb.st_mode))
642
pr->size = sb.st_size; /* regular file */
644
if (pr->off > pr->size)
647
/* The probing area cannot be larger than whole device, pr->off
648
* is offset within the device */
652
if (pr->size <= 1440 * 1024 && !S_ISCHR(sb.st_mode))
653
pr->flags |= BLKID_TINY_DEV;
655
#ifdef CDROM_GET_CAPABILITY
656
if (S_ISBLK(sb.st_mode) && ioctl(fd, CDROM_GET_CAPABILITY, NULL) >= 0)
657
pr->flags |= BLKID_CDROM_DEV;
660
DBG(DEBUG_LOWPROBE, printf("ready for low-probing, offset=%jd, size=%jd\n",
662
DBG(DEBUG_LOWPROBE, printf("whole-disk: %s, regfile: %s\n",
663
blkid_probe_is_wholedisk(pr) ?"YES" : "NO",
664
S_ISREG(pr->mode) ? "YES" : "NO"));
669
printf("failed to prepare a device for low-probing\n"));
674
int blkid_probe_get_dimension(blkid_probe pr,
675
blkid_loff_t *off, blkid_loff_t *size)
685
int blkid_probe_set_dimension(blkid_probe pr,
686
blkid_loff_t off, blkid_loff_t size)
691
DBG(DEBUG_LOWPROBE, printf(
692
"changing probing area: size=%llu, off=%llu "
693
"-to-> size=%llu, off=%llu\n",
694
(unsigned long long) pr->size,
695
(unsigned long long) pr->off,
696
(unsigned long long) size,
697
(unsigned long long) off));
701
pr->flags &= ~BLKID_TINY_DEV;
703
if (pr->size <= 1440 * 1024 && !S_ISCHR(pr->mode))
704
pr->flags |= BLKID_TINY_DEV;
706
blkid_probe_reset_buffer(pr);
711
int blkid_probe_get_idmag(blkid_probe pr, const struct blkid_idinfo *id,
712
blkid_loff_t *offset, const struct blkid_idmag **res)
714
const struct blkid_idmag *mag = NULL;
715
blkid_loff_t off = 0;
718
mag = id->magics ? &id->magics[0] : NULL;
722
/* try to detect by magic string */
723
while(mag && mag->magic) {
726
off = (mag->kboff + (mag->sboff >> 10)) << 10;
727
buf = blkid_probe_get_buffer(pr, off, 1024);
729
if (buf && !memcmp(mag->magic,
730
buf + (mag->sboff & 0x3ff), mag->len)) {
731
DBG(DEBUG_LOWPROBE, printf(
732
"\tmagic sboff=%u, kboff=%ld\n",
733
mag->sboff, mag->kboff));
735
*offset = off + (mag->sboff & 0x3ff);
743
if (id->magics && id->magics[0].magic)
744
/* magic string(s) defined, but not found */
750
static inline void blkid_probe_start(blkid_probe pr)
753
pr->cur_chain = NULL;
755
blkid_probe_set_wiper(pr, 0, 0);
759
static inline void blkid_probe_end(blkid_probe pr)
762
pr->cur_chain = NULL;
764
blkid_probe_set_wiper(pr, 0, 0);
772
* Calls probing functions in all enabled chains. The superblocks chain is
773
* enabled by default. The blkid_do_probe() stores result from only one
774
* probing function. It's necessary to call this routine in a loop to get
775
* results from all probing functions in all chains. The probing is reseted
776
* by blkid_reset_probe() or by filter functions.
778
* This is string-based NAME=value interface only.
781
* <title>basic case - use the first result only</title>
784
* if (blkid_do_probe(pr) == 0) {
785
* int nvals = blkid_probe_numof_values(pr);
786
* for (n = 0; n < nvals; n++) {
787
* if (blkid_probe_get_value(pr, n, &name, &data, &len) == 0)
788
* printf("%s = %s\n", name, data);
795
* <title>advanced case - probe for all signatures</title>
798
* while (blkid_do_probe(pr) == 0) {
799
* int nvals = blkid_probe_numof_values(pr);
805
* See also blkid_reset_probe().
807
* Returns: 0 on success, 1 when probing is done and -1 in case of error.
809
int blkid_do_probe(blkid_probe pr)
817
struct blkid_chain *chn = pr->cur_chain;
820
blkid_probe_start(pr);
821
chn = pr->cur_chain = &pr->chains[0];
823
/* we go to the next chain only when the previous probing
824
* result was nothing (rc == 1) and when the current chain is
825
* disabled or we are at end of the current chain (chain->idx +
826
* 1 == sizeof chain) or the current chain bailed out right at
827
* the start (chain->idx == -1)
829
else if (rc == 1 && (chn->enabled == FALSE ||
830
chn->idx + 1 == chn->driver->nidinfos ||
833
int idx = chn->driver->id + 1;
835
if (idx < BLKID_NCHAINS)
836
chn = pr->cur_chain = &pr->chains[idx];
839
return 1; /* all chains already probed */
843
chn->binary = FALSE; /* for sure... */
845
DBG(DEBUG_LOWPROBE, printf("chain probe %s %s (idx=%d)\n",
847
chn->enabled? "ENABLED" : "DISABLED",
853
/* rc: -1 = error, 0 = success, 1 = no result */
854
rc = chn->driver->probe(pr, chn);
862
* blkid_do_safeprobe:
865
* This function gathers probing results from all enabled chains and checks
866
* for ambivalent results (e.g. more filesystems on the device).
868
* This is string-based NAME=value interface only.
870
* Note about suberblocks chain -- the function does not check for filesystems
871
* when a RAID signature is detected. The function also does not check for
872
* collision between RAIDs. The first detected RAID is returned. The function
873
* checks for collision between partition table and RAID signature -- it's
874
* recommended to enable partitions chain together with superblocks chain.
876
* Returns: 0 on success, 1 if nothing is detected, -2 if ambivalen result is
877
* detected and -1 on case of error.
879
int blkid_do_safeprobe(blkid_probe pr)
881
int i, count = 0, rc = 0;
886
blkid_probe_start(pr);
888
for (i = 0; i < BLKID_NCHAINS; i++) {
889
struct blkid_chain *chn;
891
chn = pr->cur_chain = &pr->chains[i];
892
chn->binary = FALSE; /* for sure... */
894
DBG(DEBUG_LOWPROBE, printf("chain safeprobe %s %s\n",
896
chn->enabled? "ENABLED" : "DISABLED"));
901
blkid_probe_chain_reset_position(chn);
903
rc = chn->driver->safeprobe(pr, chn);
905
blkid_probe_chain_reset_position(chn);
907
/* rc: -2 ambivalent, -1 = error, 0 = success, 1 = no result */
909
goto done; /* error */
911
count++; /* success */
918
return count ? 0 : 1;
922
* blkid_do_fullprobe:
925
* This function gathers probing results from all enabled chains. Same as
926
* blkid_so_safeprobe() but does not check for collision between probing
929
* This is string-based NAME=value interface only.
931
* Returns: 0 on success, 1 if nothing is detected or -1 on case of error.
933
int blkid_do_fullprobe(blkid_probe pr)
935
int i, count = 0, rc = 0;
940
blkid_probe_start(pr);
942
for (i = 0; i < BLKID_NCHAINS; i++) {
944
struct blkid_chain *chn;
946
chn = pr->cur_chain = &pr->chains[i];
947
chn->binary = FALSE; /* for sure... */
949
DBG(DEBUG_LOWPROBE, printf("chain fullprobe %s: %s\n",
951
chn->enabled? "ENABLED" : "DISABLED"));
956
blkid_probe_chain_reset_position(chn);
958
rc = chn->driver->probe(pr, chn);
960
blkid_probe_chain_reset_position(chn);
962
/* rc: -1 = error, 0 = success, 1 = no result */
964
goto done; /* error */
966
count++; /* success */
973
return count ? 0 : 1;
976
/* same sa blkid_probe_get_buffer() but works with 512-sectors */
977
unsigned char *blkid_probe_get_sector(blkid_probe pr, unsigned int sector)
979
return pr ? blkid_probe_get_buffer(pr,
980
((blkid_loff_t) sector) << 9, 0x200) : NULL;
983
struct blkid_prval *blkid_probe_assign_value(
984
blkid_probe pr, const char *name)
986
struct blkid_prval *v;
990
if (pr->nvals >= BLKID_NVALS)
993
v = &pr->vals[pr->nvals];
995
v->chain = pr->cur_chain;
999
printf("assigning %s [%s]\n", name, v->chain->driver->name));
1003
int blkid_probe_reset_last_value(blkid_probe pr)
1005
struct blkid_prval *v;
1007
if (pr == NULL || pr->nvals == 0)
1010
v = &pr->vals[pr->nvals - 1];
1013
printf("un-assigning %s [%s]\n", v->name, v->chain->driver->name));
1015
memset(v, 0, sizeof(struct blkid_prval));
1022
int blkid_probe_set_value(blkid_probe pr, const char *name,
1023
unsigned char *data, size_t len)
1025
struct blkid_prval *v;
1027
if (len > BLKID_PROBVAL_BUFSIZ)
1028
len = BLKID_PROBVAL_BUFSIZ;
1030
v = blkid_probe_assign_value(pr, name);
1034
memcpy(v->data, data, len);
1039
int blkid_probe_vsprintf_value(blkid_probe pr, const char *name,
1040
const char *fmt, va_list ap)
1042
struct blkid_prval *v;
1045
v = blkid_probe_assign_value(pr, name);
1049
len = vsnprintf((char *) v->data, sizeof(v->data), fmt, ap);
1052
blkid_probe_reset_last_value(pr);
1059
int blkid_probe_sprintf_value(blkid_probe pr, const char *name,
1060
const char *fmt, ...)
1066
rc = blkid_probe_vsprintf_value(pr, name, fmt, ap);
1073
* blkid_probe_get_devno:
1076
* Returns: block device number, or 0 for regilar files.
1078
dev_t blkid_probe_get_devno(blkid_probe pr)
1084
* blkid_probe_get_wholedisk_devno:
1087
* Returns: device number of the wholedisk, or 0 for regilar files.
1089
dev_t blkid_probe_get_wholedisk_devno(blkid_probe pr)
1091
if (!pr->disk_devno) {
1092
dev_t devno, disk_devno = 0;
1094
devno = blkid_probe_get_devno(pr);
1098
if (blkid_devno_to_wholedisk(devno, NULL, 0, &disk_devno) == 0)
1099
pr->disk_devno = disk_devno;
1101
return pr->disk_devno;
1105
* blkid_probe_is_wholedisk:
1108
* Returns: 1 if the device is whole-disk or 0.
1110
int blkid_probe_is_wholedisk(blkid_probe pr)
1112
dev_t devno, disk_devno;
1114
devno = blkid_probe_get_devno(pr);
1118
disk_devno = blkid_probe_get_wholedisk_devno(pr);
1122
return devno == disk_devno;
1126
* blkid_probe_get_size:
1129
* This function returns size of probing area as defined by blkid_probe_set_device().
1130
* If the size of the probing area is unrestricted then this function returns
1131
* the real size of device. See also blkid_get_dev_size().
1133
* Returns: size in bytes or -1 in case of error.
1135
blkid_loff_t blkid_probe_get_size(blkid_probe pr)
1137
return pr ? pr->size : -1;
1141
* blkid_probe_get_offset:
1144
* This function returns offset of probing area as defined by blkid_probe_set_device().
1146
* Returns: offset in bytes or -1 in case of error.
1148
blkid_loff_t blkid_probe_get_offset(blkid_probe pr)
1150
return pr ? pr->off : -1;
1154
* blkid_probe_get_fd:
1157
* Returns: file descriptor for assigned device/file.
1159
int blkid_probe_get_fd(blkid_probe pr)
1161
return pr ? pr->fd : -1;
1165
* blkid_probe_get_sectorsize:
1166
* @pr: probe or NULL (for NULL returns 512)
1168
* Returns: block device logical sector size (BLKSSZGET ioctl, default 512).
1170
unsigned int blkid_probe_get_sectorsize(blkid_probe pr)
1173
return DEFAULT_SECTOR_SIZE; /*... and good luck! */
1178
if (S_ISBLK(pr->mode) &&
1179
blkdev_get_sector_size(pr->fd, (int *) &pr->blkssz) == 0)
1182
pr->blkssz = DEFAULT_SECTOR_SIZE;
1187
* blkid_probe_get_sectors:
1190
* Returns: 512-byte sector count or -1 in case of error.
1192
blkid_loff_t blkid_probe_get_sectors(blkid_probe pr)
1194
return pr ? pr->size >> 9 : -1;
1198
* blkid_probe_numof_values:
1201
* Returns: number of values in probing result or -1 in case of error.
1203
int blkid_probe_numof_values(blkid_probe pr)
1211
* blkid_probe_get_value:
1213
* @num: wanted value in range 0..N, where N is blkid_probe_numof_values() - 1
1214
* @name: pointer to return value name or NULL
1215
* @data: pointer to return value data or NULL
1216
* @len: pointer to return value length or NULL
1218
* Note, the @len returns length of the @data, including the terminating
1221
* Returns: 0 on success, or -1 in case of error.
1223
int blkid_probe_get_value(blkid_probe pr, int num, const char **name,
1224
const char **data, size_t *len)
1226
struct blkid_prval *v = __blkid_probe_get_value(pr, num);
1233
*data = (char *) v->data;
1237
DBG(DEBUG_LOWPROBE, printf("returning %s value\n", v->name));
1242
* blkid_probe_lookup_value:
1244
* @name: name of value
1245
* @data: pointer to return value data or NULL
1246
* @len: pointer to return value length or NULL
1248
* Note, the @len returns length of the @data, including the terminating
1251
* Returns: 0 on success, or -1 in case of error.
1253
int blkid_probe_lookup_value(blkid_probe pr, const char *name,
1254
const char **data, size_t *len)
1256
struct blkid_prval *v = __blkid_probe_lookup_value(pr, name);
1261
*data = (char *) v->data;
1268
* blkid_probe_has_value:
1270
* @name: name of value
1272
* Returns: 1 if value exist in probing result, otherwise 0.
1274
int blkid_probe_has_value(blkid_probe pr, const char *name)
1276
if (blkid_probe_lookup_value(pr, name, NULL, NULL) == 0)
1281
struct blkid_prval *__blkid_probe_get_value(blkid_probe pr, int num)
1283
if (pr == NULL || num < 0 || num >= pr->nvals)
1286
return &pr->vals[num];
1289
struct blkid_prval *__blkid_probe_lookup_value(blkid_probe pr, const char *name)
1293
if (pr == NULL || pr->nvals == 0 || name == NULL)
1296
for (i = 0; i < pr->nvals; i++) {
1297
struct blkid_prval *v = &pr->vals[i];
1299
if (v->name && strcmp(name, v->name) == 0) {
1300
DBG(DEBUG_LOWPROBE, printf("returning %s value\n", v->name));
1308
/* converts DCE UUID (uuid[16]) to human readable string
1309
* - the @len should be always 37 */
1310
void blkid_unparse_uuid(const unsigned char *uuid, char *str, size_t len)
1313
uuid_unparse(uuid, str);
1316
"%02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x",
1317
uuid[0], uuid[1], uuid[2], uuid[3],
1321
uuid[10], uuid[11], uuid[12], uuid[13], uuid[14],uuid[15]);
1326
/* Removes whitespace from the right-hand side of a string (trailing
1329
* Returns size of the new string (without \0).
1331
size_t blkid_rtrim_whitespace(unsigned char *str)
1333
size_t i = strlen((char *) str);
1336
if (!isspace(str[i]))
1344
* Some mkfs-like utils wipe some parts (usually begin) of the device.
1345
* For example LVM (pvcreate) or mkswap(8). This information could be used
1346
* for later resolution to conflicts between superblocks.
1348
* For example we found valid LVM superblock, LVM wipes 8KiB at the begin of
1349
* the device. If we found another signature (for example MBR) this wiped area
1350
* then the signature has been added later and LVM superblock should be ignore.
1352
* Note that this heuristic is not 100% reliable, for example "pvcreate --zero
1353
* n" allows to keep the begin of the device unmodified. It's probably better
1354
* to use this heuristic for conflicts between superblocks and partition tables
1355
* than for conflicts between filesystem superblocks -- existence of unwanted
1356
* partition table is very unusual, because PT is pretty visible (parsed and
1357
* interpreted by kernel).
1359
void blkid_probe_set_wiper(blkid_probe pr, blkid_loff_t off, blkid_loff_t size)
1361
struct blkid_chain *chn;
1367
DBG(DEBUG_LOWPROBE, printf("zeroize wiper\n"));
1368
pr->wipe_size = pr->wipe_off = 0;
1369
pr->wipe_chain = NULL;
1373
chn = pr->cur_chain;
1375
if (!chn || !chn->driver ||
1376
chn->idx < 0 || chn->idx >= chn->driver->nidinfos)
1379
pr->wipe_size = size;
1381
pr->wipe_chain = chn;
1384
printf("wiper set to %s::%s off=%jd size=%jd\n",
1386
chn->driver->idinfos[chn->idx]->name,
1387
pr->wipe_off, pr->wipe_size));
1392
* Returns 1 if the <@off,@size> area was wiped
1394
int blkid_probe_is_wiped(blkid_probe pr, struct blkid_chain **chn,
1395
blkid_loff_t off, blkid_loff_t size)
1400
if (pr->wipe_off <= off && off + size <= pr->wipe_off + pr->wipe_size) {
1402
*chn = pr->wipe_chain;
1408
void blkid_probe_use_wiper(blkid_probe pr, blkid_loff_t off, blkid_loff_t size)
1410
struct blkid_chain *chn = NULL;
1412
if (blkid_probe_is_wiped(pr, &chn, off, size) && chn) {
1413
DBG(DEBUG_LOWPROBE, printf("wiped area detected -- ignore previous results\n"));
1414
blkid_probe_set_wiper(pr, 0, 0);
1415
blkid_probe_chain_reset_vals(pr, chn);