]> git.proxmox.com Git - mirror_edk2.git/blame - FatPkg/FatPei/Gpt.c
FatPkg: Add GPT check in FatPei to support Capsule-on-Disk feature.
[mirror_edk2.git] / FatPkg / FatPei / Gpt.c
CommitLineData
0d18f5db
CC
1/** @file\r
2 Routines supporting partition discovery and\r
3 logical device reading\r
4\r
5Copyright (c) 2019 Intel Corporation. All rights reserved.<BR>\r
6\r
7This program and the accompanying materials are licensed and made available\r
8under the terms and conditions of the BSD License which accompanies this\r
9distribution. The full text of the license may be found at\r
10http://opensource.org/licenses/bsd-license.php\r
11\r
12THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
13WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
14\r
15**/\r
16\r
17#include <IndustryStandard/Mbr.h>\r
18#include <Uefi/UefiGpt.h>\r
19#include <Library/BaseLib.h>\r
20#include "FatLitePeim.h"\r
21\r
22//\r
23// Assumption: 'a' and 'blocksize' are all UINT32 or UINT64.\r
24// If 'a' and 'blocksize' are not the same type, should use DivU64xU32 to calculate.\r
25//\r
26#define EFI_SIZE_TO_BLOCKS(a, blocksize) (((a) / (blocksize)) + (((a) % (blocksize)) ? 1 : 0))\r
27\r
28//\r
29// GPT Partition Entry Status\r
30//\r
31typedef struct {\r
32 BOOLEAN OutOfRange;\r
33 BOOLEAN Overlap;\r
34 BOOLEAN OsSpecific;\r
35} EFI_PARTITION_ENTRY_STATUS;\r
36\r
37/**\r
38 Check if the CRC field in the Partition table header is valid.\r
39\r
40 @param[in] PartHeader Partition table header structure\r
41\r
42 @retval TRUE the CRC is valid\r
43 @retval FALSE the CRC is invalid\r
44\r
45**/\r
46BOOLEAN\r
47PartitionCheckGptHeaderCRC (\r
48 IN EFI_PARTITION_TABLE_HEADER *PartHeader\r
49 )\r
50{\r
51 UINT32 GptHdrCrc;\r
52 UINT32 Crc;\r
53\r
54 GptHdrCrc = PartHeader->Header.CRC32;\r
55\r
56 //\r
57 // Set CRC field to zero when doing calcuation\r
58 //\r
59 PartHeader->Header.CRC32 = 0;\r
60\r
61 Crc = CalculateCrc32 (PartHeader, PartHeader->Header.HeaderSize);\r
62\r
63 //\r
64 // Restore Header CRC\r
65 //\r
66 PartHeader->Header.CRC32 = GptHdrCrc;\r
67\r
68 return (GptHdrCrc == Crc);\r
69}\r
70\r
71\r
72/**\r
73 Check if the CRC field in the Partition table header is valid\r
74 for Partition entry array.\r
75\r
76 @param[in] PartHeader Partition table header structure\r
77 @param[in] PartEntry The partition entry array\r
78\r
79 @retval TRUE the CRC is valid\r
80 @retval FALSE the CRC is invalid\r
81\r
82**/\r
83BOOLEAN\r
84PartitionCheckGptEntryArrayCRC (\r
85 IN EFI_PARTITION_TABLE_HEADER *PartHeader,\r
86 IN EFI_PARTITION_ENTRY *PartEntry\r
87 )\r
88{\r
89 UINT32 Crc;\r
90 UINTN Size;\r
91\r
92 Size = (UINTN)MultU64x32(PartHeader->NumberOfPartitionEntries, PartHeader->SizeOfPartitionEntry);\r
93 Crc = CalculateCrc32 (PartEntry, Size);\r
94\r
95 return (BOOLEAN) (PartHeader->PartitionEntryArrayCRC32 == Crc);\r
96}\r
97\r
98/**\r
99 The function is used for valid GPT table. Both for Primary and Backup GPT header.\r
100\r
101 @param[in] PrivateData The global memory map\r
102 @param[in] ParentBlockDevNo The parent block device\r
103 @param[in] IsPrimaryHeader Indicate to which header will be checked.\r
104 @param[in] PartHdr Stores the partition table that is read\r
105\r
106 @retval TRUE The partition table is valid\r
107 @retval FALSE The partition table is not valid\r
108\r
109**/\r
110BOOLEAN\r
111PartitionCheckGptHeader (\r
112 IN PEI_FAT_PRIVATE_DATA *PrivateData,\r
113 IN UINTN ParentBlockDevNo,\r
114 IN BOOLEAN IsPrimaryHeader,\r
115 IN EFI_PARTITION_TABLE_HEADER *PartHdr\r
116 )\r
117{\r
118 PEI_FAT_BLOCK_DEVICE *ParentBlockDev;\r
119 EFI_PEI_LBA Lba;\r
120 EFI_PEI_LBA AlternateLba;\r
121 EFI_PEI_LBA EntryArrayLastLba;\r
122\r
123 UINT64 PartitionEntryArraySize;\r
124 UINT64 PartitionEntryBlockNumb;\r
125 UINT32 EntryArraySizeRemainder;\r
126\r
127 ParentBlockDev = &(PrivateData->BlockDevice[ParentBlockDevNo]);\r
128\r
129 if (IsPrimaryHeader) {\r
130 Lba = PRIMARY_PART_HEADER_LBA;\r
131 AlternateLba = ParentBlockDev->LastBlock;\r
132 } else {\r
133 Lba = ParentBlockDev->LastBlock;\r
134 AlternateLba = PRIMARY_PART_HEADER_LBA;\r
135 }\r
136\r
137 if ( (PartHdr->Header.Signature != EFI_PTAB_HEADER_ID) ||\r
138 (PartHdr->Header.Revision != 0x00010000) ||\r
139 (PartHdr->Header.HeaderSize < 92) ||\r
140 (PartHdr->Header.HeaderSize > ParentBlockDev->BlockSize) ||\r
141 (!PartitionCheckGptHeaderCRC (PartHdr)) ||\r
142 (PartHdr->Header.Reserved != 0)\r
143 ) {\r
144 DEBUG ((DEBUG_ERROR, "Invalid efi partition table header\n"));\r
145 return FALSE;\r
146 }\r
147\r
148 //\r
149 // | Block0 | Block1 |Block2 ~ FirstUsableLBA - 1|FirstUsableLBA, ... ,LastUsableLBA|LastUsableLBA+1 ~ LastBlock-1| LastBlock |\r
150 // |Protective MBR|Primary Header|Entry Array(At Least 16384)| Partition | Entry Array(At Least 16384) |BackUp Header|\r
151 //\r
152 // 1. Protective MBR is fixed at Block 0.\r
153 // 2. Primary Header is fixed at Block 1.\r
154 // 3. Backup Header is fixed at LastBlock.\r
155 // 4. Must be remain 128*128 bytes for primary entry array.\r
156 // 5. Must be remain 128*128 bytes for backup entry array.\r
157 // 6. SizeOfPartitionEntry must be equals to 128 * 2^n.\r
158 //\r
159 if ( (PartHdr->MyLBA != Lba) ||\r
160 (PartHdr->AlternateLBA != AlternateLba) ||\r
161 (PartHdr->FirstUsableLBA < 2 + EFI_SIZE_TO_BLOCKS (EFI_GPT_PART_ENTRY_MIN_SIZE, ParentBlockDev->BlockSize)) ||\r
162 (PartHdr->LastUsableLBA > ParentBlockDev->LastBlock - 1 - EFI_SIZE_TO_BLOCKS (EFI_GPT_PART_ENTRY_MIN_SIZE, ParentBlockDev->BlockSize)) ||\r
163 (PartHdr->FirstUsableLBA > PartHdr->LastUsableLBA) ||\r
164 (PartHdr->PartitionEntryLBA < 2) ||\r
165 (PartHdr->PartitionEntryLBA > ParentBlockDev->LastBlock - 1) ||\r
166 (PartHdr->PartitionEntryLBA >= PartHdr->FirstUsableLBA && PartHdr->PartitionEntryLBA <= PartHdr->LastUsableLBA) ||\r
167 (PartHdr->SizeOfPartitionEntry%128 != 0) ||\r
168 (PartHdr->SizeOfPartitionEntry != sizeof (EFI_PARTITION_ENTRY))\r
169 ) {\r
170 DEBUG ((DEBUG_ERROR, "Invalid efi partition table header\n"));\r
171 return FALSE;\r
172 }\r
173\r
174 //\r
175 // Ensure the NumberOfPartitionEntries * SizeOfPartitionEntry doesn't overflow.\r
176 //\r
177 if (PartHdr->NumberOfPartitionEntries > DivU64x32 (MAX_UINTN, PartHdr->SizeOfPartitionEntry)) {\r
178 DEBUG ((DEBUG_ERROR, "Memory overflow in GPT Entry Array\n"));\r
179 return FALSE;\r
180 }\r
181\r
182 PartitionEntryArraySize = MultU64x32 (PartHdr->NumberOfPartitionEntries, PartHdr->SizeOfPartitionEntry);\r
183 EntryArraySizeRemainder = 0;\r
184 PartitionEntryBlockNumb = DivU64x32Remainder (PartitionEntryArraySize, ParentBlockDev->BlockSize, &EntryArraySizeRemainder);\r
185 if (EntryArraySizeRemainder != 0) {\r
186 PartitionEntryBlockNumb++;\r
187 }\r
188\r
189 if (IsPrimaryHeader) {\r
190 EntryArrayLastLba = PartHdr->FirstUsableLBA;\r
191 } else {\r
192 EntryArrayLastLba = ParentBlockDev->LastBlock;\r
193 }\r
194\r
195 //\r
196 // Make sure partition entry array not overlaps with partition area or the LastBlock.\r
197 //\r
198 if (PartHdr->PartitionEntryLBA + PartitionEntryBlockNumb > EntryArrayLastLba) {\r
199 DEBUG ((DEBUG_ERROR, "GPT Partition Entry Array Error!\n"));\r
200 DEBUG ((DEBUG_ERROR, "PartitionEntryArraySize = %lu.\n", PartitionEntryArraySize));\r
201 DEBUG ((DEBUG_ERROR, "PartitionEntryLBA = %lu.\n", PartHdr->PartitionEntryLBA));\r
202 DEBUG ((DEBUG_ERROR, "PartitionEntryBlockNumb = %lu.\n", PartitionEntryBlockNumb));\r
203 DEBUG ((DEBUG_ERROR, "EntryArrayLastLba = %lu.\n", EntryArrayLastLba));\r
204 return FALSE;\r
205 }\r
206\r
207 return TRUE;\r
208}\r
209\r
210/**\r
211 This function is used to verify each partition in block device.\r
212\r
213 @param[in] PrivateData The global memory map\r
214 @param[in] ParentBlockDevNo The parent block device\r
215 @param[in] PartHdr Stores the partition table that is read\r
216\r
217 @retval TRUE The partition is valid\r
218 @retval FALSE The partition is not valid\r
219\r
220**/\r
221BOOLEAN\r
222PartitionCheckGptEntryArray (\r
223 IN PEI_FAT_PRIVATE_DATA *PrivateData,\r
224 IN UINTN ParentBlockDevNo,\r
225 IN EFI_PARTITION_TABLE_HEADER *PartHdr\r
226 )\r
227{\r
228 EFI_STATUS Status;\r
229 PEI_FAT_BLOCK_DEVICE *ParentBlockDev;\r
230 PEI_FAT_BLOCK_DEVICE *BlockDevPtr;\r
231\r
232 UINT64 PartitionEntryArraySize;\r
233 UINT64 PartitionEntryBlockNumb;\r
234 UINT32 EntryArraySizeRemainder;\r
235\r
236 EFI_PARTITION_ENTRY *PartitionEntryBuffer;\r
237 EFI_PARTITION_ENTRY_STATUS *PartitionEntryStatus;\r
238\r
239 BOOLEAN Found;\r
240 EFI_LBA StartingLBA;\r
241 EFI_LBA EndingLBA;\r
242 UINTN Index;\r
243 UINTN Index1;\r
244 UINTN Index2;\r
245 EFI_PARTITION_ENTRY *Entry;\r
246\r
247 ParentBlockDev = &(PrivateData->BlockDevice[ParentBlockDevNo]);\r
248 Found = FALSE;\r
249\r
250 PartitionEntryArraySize = MultU64x32 (PartHdr->NumberOfPartitionEntries, PartHdr->SizeOfPartitionEntry);\r
251 EntryArraySizeRemainder = 0;\r
252 PartitionEntryBlockNumb = DivU64x32Remainder (PartitionEntryArraySize, ParentBlockDev->BlockSize, &EntryArraySizeRemainder);\r
253 if (EntryArraySizeRemainder != 0) {\r
254 PartitionEntryBlockNumb++;\r
255 }\r
256 PartitionEntryArraySize = MultU64x32 (PartitionEntryBlockNumb, ParentBlockDev->BlockSize);\r
257\r
258 PartitionEntryBuffer = (EFI_PARTITION_ENTRY *) AllocatePages (EFI_SIZE_TO_PAGES ((UINTN)PartitionEntryArraySize));\r
259 if (PartitionEntryBuffer == NULL) {\r
260 DEBUG ((DEBUG_ERROR, "Allocate memory error!\n"));\r
261 goto EXIT;\r
262 }\r
263\r
264 PartitionEntryStatus = (EFI_PARTITION_ENTRY_STATUS *) AllocatePages (EFI_SIZE_TO_PAGES (PartHdr->NumberOfPartitionEntries * sizeof (EFI_PARTITION_ENTRY_STATUS)));\r
265 if (PartitionEntryStatus == NULL) {\r
266 DEBUG ((DEBUG_ERROR, "Allocate memory error!\n"));\r
267 goto EXIT;\r
268 }\r
269 ZeroMem (PartitionEntryStatus, PartHdr->NumberOfPartitionEntries * sizeof (EFI_PARTITION_ENTRY_STATUS));\r
270\r
271 Status = FatReadBlock (\r
272 PrivateData,\r
273 ParentBlockDevNo,\r
274 PartHdr->PartitionEntryLBA,\r
275 (UINTN)PartitionEntryArraySize,\r
276 PartitionEntryBuffer\r
277 );\r
278 if (EFI_ERROR (Status)) {\r
279 DEBUG ((DEBUG_ERROR, "Read partition entry array error!\n"));\r
280 goto EXIT;\r
281 }\r
282\r
283 if (!PartitionCheckGptEntryArrayCRC (PartHdr, PartitionEntryBuffer)) {\r
284 DEBUG ((DEBUG_ERROR, "Partition entries CRC check fail\n"));\r
285 goto EXIT;\r
286 }\r
287\r
288 for (Index1 = 0; Index1 < PartHdr->NumberOfPartitionEntries; Index1++) {\r
289 Entry = (EFI_PARTITION_ENTRY *) ((UINT8 *) PartitionEntryBuffer + Index1 * PartHdr->SizeOfPartitionEntry);\r
290 if (CompareGuid (&Entry->PartitionTypeGUID, &gEfiPartTypeUnusedGuid)) {\r
291 continue;\r
292 }\r
293\r
294 StartingLBA = Entry->StartingLBA;\r
295 EndingLBA = Entry->EndingLBA;\r
296 if (StartingLBA > EndingLBA ||\r
297 StartingLBA < PartHdr->FirstUsableLBA ||\r
298 StartingLBA > PartHdr->LastUsableLBA ||\r
299 EndingLBA < PartHdr->FirstUsableLBA ||\r
300 EndingLBA > PartHdr->LastUsableLBA\r
301 ) {\r
302 PartitionEntryStatus[Index1].OutOfRange = TRUE;\r
303 continue;\r
304 }\r
305\r
306 if ((Entry->Attributes & BIT1) != 0) {\r
307 //\r
308 // If Bit 1 is set, this indicate that this is an OS specific GUID partition.\r
309 //\r
310 PartitionEntryStatus[Index1].OsSpecific = TRUE;\r
311 }\r
312\r
313 for (Index2 = Index1 + 1; Index2 < PartHdr->NumberOfPartitionEntries; Index2++) {\r
314 Entry = (EFI_PARTITION_ENTRY *) ((UINT8 *) PartitionEntryBuffer + Index2 * PartHdr->SizeOfPartitionEntry);\r
315 if (CompareGuid (&Entry->PartitionTypeGUID, &gEfiPartTypeUnusedGuid)) {\r
316 continue;\r
317 }\r
318\r
319 if (Entry->EndingLBA >= StartingLBA && Entry->StartingLBA <= EndingLBA) {\r
320 //\r
321 // This region overlaps with the Index1'th region\r
322 //\r
323 PartitionEntryStatus[Index1].Overlap = TRUE;\r
324 PartitionEntryStatus[Index2].Overlap = TRUE;\r
325 continue;\r
326 }\r
327 }\r
328 }\r
329\r
330 for (Index = 0; Index < PartHdr->NumberOfPartitionEntries; Index++) {\r
331 if (CompareGuid (&PartitionEntryBuffer[Index].PartitionTypeGUID, &gEfiPartTypeUnusedGuid)||\r
332 PartitionEntryStatus[Index].OutOfRange ||\r
333 PartitionEntryStatus[Index].Overlap ||\r
334 PartitionEntryStatus[Index].OsSpecific) {\r
335 //\r
336 // Don't use null EFI Partition Entries, Invalid Partition Entries or OS specific\r
337 // partition Entries\r
338 //\r
339 continue;\r
340 }\r
341\r
342 if (PrivateData->BlockDeviceCount >= PEI_FAT_MAX_BLOCK_DEVICE) {\r
343 break;\r
344 }\r
345\r
346 Found = TRUE;\r
347 BlockDevPtr = &(PrivateData->BlockDevice[PrivateData->BlockDeviceCount]);\r
348\r
349 BlockDevPtr->BlockSize = ParentBlockDev->BlockSize;\r
350 BlockDevPtr->LastBlock = PartitionEntryBuffer[Index].EndingLBA;\r
351 BlockDevPtr->IoAlign = ParentBlockDev->IoAlign;\r
352 BlockDevPtr->Logical = TRUE;\r
353 BlockDevPtr->PartitionChecked = FALSE;\r
354 BlockDevPtr->StartingPos = MultU64x32 (\r
355 PartitionEntryBuffer[Index].StartingLBA,\r
356 ParentBlockDev->BlockSize\r
357 );\r
358 BlockDevPtr->ParentDevNo = ParentBlockDevNo;\r
359\r
360 PrivateData->BlockDeviceCount++;\r
361\r
362 DEBUG ((DEBUG_INFO, "Find GPT Partition [0x%lx", PartitionEntryBuffer[Index].StartingLBA, BlockDevPtr->LastBlock));\r
363 DEBUG ((DEBUG_INFO, ", 0x%lx]\n", BlockDevPtr->LastBlock));\r
364 DEBUG ((DEBUG_INFO, " BlockSize %x\n", BlockDevPtr->BlockSize));\r
365 }\r
366\r
367EXIT:\r
368 if (PartitionEntryBuffer != NULL) {\r
369 FreePages (PartitionEntryBuffer, EFI_SIZE_TO_PAGES ((UINTN)PartitionEntryArraySize));\r
370 }\r
371\r
372 if (PartitionEntryStatus != NULL) {\r
373 FreePages (PartitionEntryStatus, EFI_SIZE_TO_PAGES (PartHdr->NumberOfPartitionEntries * sizeof (EFI_PARTITION_ENTRY_STATUS)));\r
374 }\r
375\r
376 return Found;\r
377}\r
378\r
379/**\r
380 The function is used to check GPT structure, include GPT header and GPT entry array.\r
381\r
382 1. Check GPT header.\r
383 2. Check partition entry array.\r
384 3. Check each partitions.\r
385\r
386 @param[in] PrivateData The global memory map\r
387 @param[in] ParentBlockDevNo The parent block device\r
388 @param[in] IsPrimary Indicate primary or backup to be check\r
389\r
390 @retval TRUE Primary or backup GPT structure is valid.\r
391 @retval FALSE Both primary and backup are invalid.\r
392\r
393**/\r
394BOOLEAN\r
395PartitionCheckGptStructure (\r
396 IN PEI_FAT_PRIVATE_DATA *PrivateData,\r
397 IN UINTN ParentBlockDevNo,\r
398 IN BOOLEAN IsPrimary\r
399 )\r
400{\r
401 EFI_STATUS Status;\r
402 PEI_FAT_BLOCK_DEVICE *ParentBlockDev;\r
403 EFI_PARTITION_TABLE_HEADER *PartHdr;\r
404 EFI_PEI_LBA GptHeaderLBA;\r
405\r
406 ParentBlockDev = &(PrivateData->BlockDevice[ParentBlockDevNo]);\r
407 PartHdr = (EFI_PARTITION_TABLE_HEADER *) PrivateData->BlockData;\r
408\r
409 if (IsPrimary) {\r
410 GptHeaderLBA = PRIMARY_PART_HEADER_LBA;\r
411 } else {\r
412 GptHeaderLBA = ParentBlockDev->LastBlock;\r
413 }\r
414\r
415 Status = FatReadBlock (\r
416 PrivateData,\r
417 ParentBlockDevNo,\r
418 GptHeaderLBA,\r
419 ParentBlockDev->BlockSize,\r
420 PartHdr\r
421 );\r
422 if (EFI_ERROR (Status)) {\r
423 return FALSE;\r
424 }\r
425\r
426 if (!PartitionCheckGptHeader (PrivateData, ParentBlockDevNo, IsPrimary, PartHdr)) {\r
427 return FALSE;\r
428 }\r
429\r
430 if (!PartitionCheckGptEntryArray (PrivateData, ParentBlockDevNo, PartHdr)) {\r
431 return FALSE;\r
432 }\r
433\r
434 return TRUE;\r
435}\r
436\r
437/**\r
438 This function is used to check protective MBR structure before checking GPT.\r
439\r
440 @param[in] PrivateData The global memory map\r
441 @param[in] ParentBlockDevNo The parent block device\r
442\r
443 @retval TRUE Valid protective MBR\r
444 @retval FALSE Invalid MBR\r
445**/\r
446BOOLEAN\r
447PartitionCheckProtectiveMbr (\r
448 IN PEI_FAT_PRIVATE_DATA *PrivateData,\r
449 IN UINTN ParentBlockDevNo\r
450 )\r
451{\r
452 EFI_STATUS Status;\r
453 MASTER_BOOT_RECORD *ProtectiveMbr;\r
454 MBR_PARTITION_RECORD *MbrPartition;\r
455 PEI_FAT_BLOCK_DEVICE *ParentBlockDev;\r
456 UINTN Index;\r
457\r
458 ProtectiveMbr = (MASTER_BOOT_RECORD *) PrivateData->BlockData;\r
459 ParentBlockDev = &(PrivateData->BlockDevice[ParentBlockDevNo]);\r
460\r
461 //\r
462 // Read Protective MBR\r
463 //\r
464 Status = FatReadBlock (\r
465 PrivateData,\r
466 ParentBlockDevNo,\r
467 0,\r
468 ParentBlockDev->BlockSize,\r
469 ProtectiveMbr\r
470 );\r
471 if (EFI_ERROR (Status)) {\r
472 DEBUG ((DEBUG_ERROR, "GPT Error When Read Protective Mbr From Partition!\n"));\r
473 return FALSE;\r
474 }\r
475\r
476 if (ProtectiveMbr->Signature != MBR_SIGNATURE) {\r
477 DEBUG ((DEBUG_ERROR, "Protective Mbr Signature is invalid!\n"));\r
478 return FALSE;\r
479 }\r
480\r
481 //\r
482 // The partition define in UEFI Spec Table 17.\r
483 // Boot Code, Unique MBR Disk Signature, Unknown.\r
484 // These parts will not be used by UEFI, so we skip to check them.\r
485 //\r
486 for (Index = 0; Index < MAX_MBR_PARTITIONS; Index++) {\r
487 MbrPartition = (MBR_PARTITION_RECORD *)&ProtectiveMbr->Partition[Index];\r
488 if (MbrPartition->BootIndicator == 0x00 &&\r
489 MbrPartition->StartSector == 0x02 &&\r
490 MbrPartition->OSIndicator == PMBR_GPT_PARTITION &&\r
491 UNPACK_UINT32 (MbrPartition->StartingLBA) == 1\r
492 ) {\r
493 return TRUE;\r
494 }\r
495 }\r
496\r
497 DEBUG ((DEBUG_ERROR, "Protective Mbr, All Partition Entry Are Empty!\n"));\r
498 return FALSE;\r
499}\r
500\r
501/**\r
502 This function is used for finding GPT partition on block device.\r
503 As follow UEFI spec we should check protective MBR first and then\r
504 try to check both primary/backup GPT structures.\r
505\r
506 @param[in] PrivateData The global memory map\r
507 @param[in] ParentBlockDevNo The parent block device\r
508\r
509 @retval TRUE New partitions are detected and logical block devices\r
510 are added to block device array\r
511 @retval FALSE No new partitions are added\r
512\r
513**/\r
514BOOLEAN\r
515FatFindGptPartitions (\r
516 IN PEI_FAT_PRIVATE_DATA *PrivateData,\r
517 IN UINTN ParentBlockDevNo\r
518 )\r
519{\r
520 BOOLEAN Found;\r
521 PEI_FAT_BLOCK_DEVICE *ParentBlockDev;\r
522\r
523 if (ParentBlockDevNo > PEI_FAT_MAX_BLOCK_DEVICE - 1) {\r
524 return FALSE;\r
525 }\r
526\r
527 ParentBlockDev = &(PrivateData->BlockDevice[ParentBlockDevNo]);\r
528 if (ParentBlockDev->BlockSize > PEI_FAT_MAX_BLOCK_SIZE) {\r
529 DEBUG ((DEBUG_ERROR, "Device BlockSize %x exceed FAT_MAX_BLOCK_SIZE\n", ParentBlockDev->BlockSize));\r
530 return FALSE;\r
531 }\r
532\r
533 if (!PartitionCheckProtectiveMbr (PrivateData, ParentBlockDevNo)) {\r
534 return FALSE;\r
535 }\r
536\r
537 Found = PartitionCheckGptStructure (PrivateData, ParentBlockDevNo, TRUE);\r
538 if (!Found) {\r
539 DEBUG ((DEBUG_ERROR, "Primary GPT Header Error, Try to Check Backup GPT Header!\n"));\r
540 Found = PartitionCheckGptStructure (PrivateData, ParentBlockDevNo, FALSE);\r
541 }\r
542\r
543 if (Found) {\r
544 ParentBlockDev->PartitionChecked = TRUE;\r
545 }\r
546\r
547 return Found;\r
548}\r