]> git.proxmox.com Git - mirror_edk2.git/blob - MdeModulePkg/Library/EdkFvbServiceLib/Fvb.c
Move Crc32GuidedSectionExtraction from Protocol to Guid directory
[mirror_edk2.git] / MdeModulePkg / Library / EdkFvbServiceLib / Fvb.c
1 /**@file
2 Firmware Volume Block Protocol Runtime Interface Abstraction
3 And FVB Extension protocol Runtime Interface Abstraction
4
5 mFvbEntry is an array of Handle Fvb pairs. The Fvb Lib Instance matches the
6 index in the mFvbEntry array. This should be the same sequence as the FVB's
7 were described in the HOB. We have to remember the handle so we can tell if
8 the protocol has been reinstalled and it needs updating.
9
10
11 Copyright (c) 2006 - 2008, Intel Corporation
12 All rights reserved. This program and the accompanying materials
13 are licensed and made available under the terms and conditions of the BSD License
14 which accompanies this distribution. The full text of the license may be found at
15 http://opensource.org/licenses/bsd-license.php
16
17 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
18 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
19
20 **/
21
22
23 #include "Fvb.h"
24
25
26 //
27 // Event for Set Virtual Map Changed Event
28 //
29 EFI_EVENT mSetVirtualMapChangedEvent = NULL;
30
31 //
32 // Lib will ASSERT if more FVB devices than this are added to the system.
33 //
34 FVB_ENTRY *mFvbEntry = NULL;
35 EFI_EVENT mFvbRegistration = NULL;
36 UINTN mFvbCount = 0;
37
38 /**
39 Check whether an address is runtime memory or not.
40
41 @param Address The Address being checked.
42
43 @retval TRUE The address is runtime memory.
44 @retval FALSE The address is not runtime memory.
45 **/
46 BOOLEAN
47 IsRuntimeMemory (
48 IN VOID *Address
49 )
50 {
51 EFI_STATUS Status;
52 UINT8 TmpMemoryMap[1];
53 UINTN MapKey;
54 UINTN DescriptorSize;
55 UINT32 DescriptorVersion;
56 UINTN MemoryMapSize;
57 EFI_MEMORY_DESCRIPTOR *MemoryMap;
58 EFI_MEMORY_DESCRIPTOR *MemoryMapPtr;
59 BOOLEAN IsRuntime;
60 UINTN Index;
61
62 IsRuntime = FALSE;
63
64 //
65 // Get System MemoryMapSize
66 //
67 MemoryMapSize = 1;
68 Status = gBS->GetMemoryMap (
69 &MemoryMapSize,
70 (EFI_MEMORY_DESCRIPTOR *)TmpMemoryMap,
71 &MapKey,
72 &DescriptorSize,
73 &DescriptorVersion
74 );
75 ASSERT (Status == EFI_BUFFER_TOO_SMALL);
76 //
77 // Enlarge space here, because we will allocate pool now.
78 //
79 MemoryMapSize += EFI_PAGE_SIZE;
80 MemoryMap = AllocatePool (MemoryMapSize);
81 ASSERT (MemoryMap != NULL);
82
83 //
84 // Get System MemoryMap
85 //
86 Status = gBS->GetMemoryMap (
87 &MemoryMapSize,
88 MemoryMap,
89 &MapKey,
90 &DescriptorSize,
91 &DescriptorVersion
92 );
93 ASSERT_EFI_ERROR (Status);
94
95 MemoryMapPtr = MemoryMap;
96 //
97 // Search the request Address
98 //
99 for (Index = 0; Index < (MemoryMapSize / DescriptorSize); Index++) {
100 if (((EFI_PHYSICAL_ADDRESS)(UINTN)Address >= MemoryMap->PhysicalStart) &&
101 ((EFI_PHYSICAL_ADDRESS)(UINTN)Address < MemoryMap->PhysicalStart
102 + LShiftU64 (MemoryMap->NumberOfPages, EFI_PAGE_SHIFT))) {
103 //
104 // Found it
105 //
106 if ((MemoryMap->Attribute & EFI_MEMORY_RUNTIME) != 0) {
107 IsRuntime = TRUE;
108 }
109 break;
110 }
111 //
112 // Get next item
113 //
114 MemoryMap = (EFI_MEMORY_DESCRIPTOR *)((UINTN) MemoryMap + DescriptorSize);
115 }
116
117 //
118 // Done
119 //
120 FreePool (MemoryMapPtr);
121
122 return IsRuntime;
123 }
124
125
126 /**
127 Update mFvbEntry. Add new entry, or update existing entry if Fvb protocol is
128 reinstalled.
129
130 @param Event The Event that is being processed
131 @param Context Event Context
132
133 **/
134 VOID
135 EFIAPI
136 FvbNotificationEvent (
137 IN EFI_EVENT Event,
138 IN VOID *Context
139 )
140 {
141 EFI_STATUS Status;
142 UINTN BufferSize;
143 EFI_HANDLE Handle;
144 UINTN Index;
145 UINTN UpdateIndex;
146
147 while (TRUE) {
148 BufferSize = sizeof (Handle);
149 Status = gBS->LocateHandle (
150 ByRegisterNotify,
151 &gEfiFirmwareVolumeBlockProtocolGuid,
152 mFvbRegistration,
153 &BufferSize,
154 &Handle
155 );
156 if (EFI_ERROR (Status)) {
157 //
158 // Exit Path of While Loop....
159 //
160 break;
161 }
162
163 UpdateIndex = MAX_FVB_COUNT;
164 for (Index = 0; Index < mFvbCount; Index++) {
165 if (mFvbEntry[Index].Handle == Handle) {
166 //
167 // If the handle is already in the table just update the protocol
168 //
169 UpdateIndex = Index;
170 break;
171 }
172 }
173
174 if (UpdateIndex == MAX_FVB_COUNT) {
175 //
176 // Use the next free slot for a new entry
177 //
178 UpdateIndex = mFvbCount++;
179 //
180 // Check the UpdateIndex whether exceed the maximum value.
181 //
182 ASSERT (UpdateIndex < MAX_FVB_COUNT);
183 mFvbEntry[UpdateIndex].Handle = Handle;
184 }
185 //
186 // The array does not have enough entries
187 //
188 ASSERT (UpdateIndex < MAX_FVB_COUNT);
189
190 //
191 // Get the interface pointer and if it's ours, skip it
192 //
193 Status = gBS->HandleProtocol (
194 Handle,
195 &gEfiFirmwareVolumeBlockProtocolGuid,
196 (VOID **) &mFvbEntry[UpdateIndex].Fvb
197 );
198 ASSERT_EFI_ERROR (Status);
199
200 //
201 // Check the FVB can be accessed in RUNTIME, The FVBs in FVB handle list come from two ways:
202 // 1) Dxe Core. (FVB information is transferred from FV HOB). 2) FVB driver. The FVB produced
203 // Dxe core is used to discovery DXE driver and dispatch. These FVBs can only be accessed in
204 // boot time. FVB driver will discovery all FV in FLASH and these FVBs can be accessed in
205 // runtime. The FVB itself produced by FVB driver is allocated in runtime memory. So we can
206 // determine the what FVB can be accessed in RUNTIME by judging whether FVB itself is allocated
207 // in RUNTIME memory.
208 //
209 mFvbEntry[UpdateIndex].IsRuntimeAccess = IsRuntimeMemory (mFvbEntry[UpdateIndex].Fvb);
210 }
211 }
212
213 /**
214 Convert all pointers in mFvbEntry after ExitBootServices.
215
216 @param Event The Event that is being processed
217 @param Context Event Context
218
219 **/
220 VOID
221 EFIAPI
222 FvbVirtualAddressChangeNotifyEvent (
223 IN EFI_EVENT Event,
224 IN VOID *Context
225 )
226 {
227 UINTN Index;
228
229 if (mFvbEntry != NULL) {
230 for (Index = 0; Index < MAX_FVB_COUNT; Index++) {
231 if (!mFvbEntry[Index].IsRuntimeAccess) {
232 continue;
233 }
234
235 if (mFvbEntry[Index].Fvb != NULL) {
236 EfiConvertPointer (0x0, (VOID **) &mFvbEntry[Index].Fvb->GetBlockSize);
237 EfiConvertPointer (0x0, (VOID **) &mFvbEntry[Index].Fvb->GetPhysicalAddress);
238 EfiConvertPointer (0x0, (VOID **) &mFvbEntry[Index].Fvb->GetAttributes);
239 EfiConvertPointer (0x0, (VOID **) &mFvbEntry[Index].Fvb->SetAttributes);
240 EfiConvertPointer (0x0, (VOID **) &mFvbEntry[Index].Fvb->Read);
241 EfiConvertPointer (0x0, (VOID **) &mFvbEntry[Index].Fvb->Write);
242 EfiConvertPointer (0x0, (VOID **) &mFvbEntry[Index].Fvb->EraseBlocks);
243 EfiConvertPointer (0x0, (VOID **) &mFvbEntry[Index].Fvb);
244 }
245 }
246
247 EfiConvertPointer (0x0, (VOID **) &mFvbEntry);
248 }
249 }
250
251
252 /**
253 Library constructor function entry.
254
255 @param ImageHandle The handle of image who call this library.
256 @param SystemTable The point of System Table.
257
258 @retval EFI_SUCESS Success construct this library.
259 @retval Others Fail to construct this library.
260 **/
261 EFI_STATUS
262 EFIAPI
263 FvbLibInitialize (
264 IN EFI_HANDLE ImageHandle,
265 IN EFI_SYSTEM_TABLE *SystemTable
266 )
267 {
268 EFI_STATUS Status;
269
270 mFvbEntry = AllocateRuntimeZeroPool (sizeof (FVB_ENTRY) * MAX_FVB_COUNT);
271 ASSERT (mFvbEntry != NULL);
272
273 //
274 // Register FvbNotificationEvent () notify function.
275 //
276 EfiCreateProtocolNotifyEvent (
277 &gEfiFirmwareVolumeBlockProtocolGuid,
278 TPL_CALLBACK,
279 FvbNotificationEvent,
280 NULL,
281 &mFvbRegistration
282 );
283
284 //
285 // Register SetVirtualAddressMap () notify function
286 //
287 Status = gBS->CreateEventEx (
288 EVT_NOTIFY_SIGNAL,
289 TPL_NOTIFY,
290 FvbVirtualAddressChangeNotifyEvent,
291 NULL,
292 &gEfiEventVirtualAddressChangeGuid,
293 &mSetVirtualMapChangedEvent
294 );
295 ASSERT_EFI_ERROR (Status);
296
297 return Status;
298 }
299
300 //
301 // =============================================================================
302 // The following functions wrap Fvb protocol in the Runtime Lib functions.
303 // The Instance translates into Fvb instance. The Fvb order defined by HOBs and
304 // thus the sequence of FVB protocol addition define Instance.
305 //
306
307 /**
308 Reads specified number of bytes into a buffer from the specified block.
309
310 The EfiFvbReadBlock() function reads the requested number of bytes from
311 the requested block in the specified firmware volume and stores them in
312 the provided buffer. Implementations should be mindful that the firmware
313 volume might be in the ReadDisabled state. If it is in this state, the
314 EfiFvbReadBlock() function must return the status code EFI_ACCESS_DENIED
315 without modifying the contents of the buffer.
316
317 The EfiFvbReadBlock() function must also prevent spanning block boundaries.
318 If a read is requested that would span a block boundary, the read must read
319 up to the boundary but not beyond. The output parameter NumBytes must be
320 set to correctly indicate the number of bytes actually read.
321 The caller must be aware that a read may be partially completed.
322
323 If NumBytes is NULL, then ASSERT().
324
325 If Buffer is NULL, then ASSERT().
326
327 @param[in] Instance The FV instance to be read from.
328 @param[in] Lba The logical block address to be read from
329 @param[in] Offset The offset relative to the block, at which to begin reading.
330 @param[in, out] NumBytes Pointer to a UINTN. On input, *NumBytes contains the total
331 size of the buffer. On output, it contains the actual number
332 of bytes read.
333 @param[out] Buffer Pointer to a caller allocated buffer that will be
334 used to hold the data read.
335
336 @retval EFI_SUCCESS The firmware volume was read successfully and contents are in Buffer.
337 @retval EFI_BAD_BUFFER_SIZE Read attempted across an LBA boundary. On output, NumBytes contains
338 the total number of bytes returned in Buffer.
339 @retval EFI_ACCESS_DENIED The firmware volume is in the ReadDisabled state.
340 @retval EFI_DEVICE_ERROR The block device is not functioning correctly and could not be read.
341 @retval EFI_INVALID_PARAMETER Invalid parameter, Instance is larger than the max FVB number. Lba index
342 is larger than the last block of the firmware volume. Offset is larger
343 than the block size.
344
345 **/
346 EFI_STATUS
347 EFIAPI
348 EfiFvbReadBlock (
349 IN UINTN Instance,
350 IN EFI_LBA Lba,
351 IN UINTN Offset,
352 IN OUT UINTN *NumBytes,
353 OUT UINT8 *Buffer
354 )
355 {
356 ASSERT (NumBytes != NULL);
357 ASSERT (Buffer != NULL);
358
359 if (Instance >= mFvbCount) {
360 return EFI_INVALID_PARAMETER;
361 }
362
363 if (EfiAtRuntime() && !mFvbEntry[Instance].IsRuntimeAccess) {
364 return EFI_INVALID_PARAMETER;
365 }
366
367 return mFvbEntry[Instance].Fvb->Read (mFvbEntry[Instance].Fvb, Lba, Offset, NumBytes, Buffer);
368 }
369
370 /**
371 Writes specified number of bytes from the input buffer to the block
372
373 The EfiFvbWriteBlock() function writes the specified number of bytes
374 from the provided buffer to the specified block and offset in the
375 requested firmware volume.
376
377 If the firmware volume is sticky write, the caller must ensure that
378 all the bits of the specified range to write are in the EFI_FVB_ERASE_POLARITY
379 state before calling the EfiFvbWriteBlock() function, or else the
380 result will be unpredictable. This unpredictability arises because,
381 for a sticky-write firmware volume, a write may negate a bit in the
382 EFI_FVB_ERASE_POLARITY state but it cannot flip it back again. In
383 general, before calling the EfiFvbWriteBlock() function, the caller
384 should call the EfiFvbEraseBlock() function first to erase the specified
385 block to write. A block erase cycle will transition bits from the
386 (NOT)EFI_FVB_ERASE_POLARITY state back to the EFI_FVB_ERASE_POLARITY state.
387 Implementations should be mindful that the firmware volume might be
388 in the WriteDisabled state. If it is in this state, the EfiFvbWriteBlock()
389 function must return the status code EFI_ACCESS_DENIED without modifying
390 the contents of the firmware volume.
391
392 The EfiFvbWriteBlock() function must also prevent spanning block boundaries.
393 If a write is requested that spans a block boundary, the write must store
394 up to the boundary but not beyond. The output parameter NumBytes must be
395 set to correctly indicate the number of bytes actually written. The caller
396 must be aware that a write may be partially completed.
397 All writes, partial or otherwise, must be fully flushed to the hardware
398 before the EfiFvbWriteBlock() function returns.
399
400 If NumBytes is NULL, then ASSERT().
401
402 @param Instance The FV instance to be written to.
403 @param Lba The starting logical block index to write.
404 @param Offset The offset relative to the block to write.
405 @param NumBytes Pointer to a UINTN. On input, *NumBytes contains
406 the total size of the buffer. On output, it contains
407 the actual number of bytes written.
408 @param Buffer Pointer to a caller allocated buffer that contains
409 the source for the write
410
411 @retval EFI_SUCCESS The firmware volume was written successfully.
412 @retval EFI_BAD_BUFFER_SIZE The write was attempted across an LBA boundary.
413 On output, NumBytes contains the total number of bytes actually written.
414 @retval EFI_ACCESS_DENIED The firmware volume is in the WriteDisabled state.
415 @retval EFI_DEVICE_ERROR The block device is malfunctioning and could not be written.
416 @retval EFI_INVALID_PARAMETER Invalid parameter, Instance is larger than the max FVB number.
417 Lba index is larger than the last block of the firmware volume.
418 Offset is larger than the block size.
419 **/
420 EFI_STATUS
421 EFIAPI
422 EfiFvbWriteBlock (
423 IN UINTN Instance,
424 IN EFI_LBA Lba,
425 IN UINTN Offset,
426 IN OUT UINTN *NumBytes,
427 IN UINT8 *Buffer
428 )
429 {
430 ASSERT (NumBytes != NULL);
431
432 if (Instance >= mFvbCount) {
433 return EFI_INVALID_PARAMETER;
434 }
435
436 if (EfiAtRuntime() && !mFvbEntry[Instance].IsRuntimeAccess) {
437 return EFI_INVALID_PARAMETER;
438 }
439
440 return mFvbEntry[Instance].Fvb->Write (mFvbEntry[Instance].Fvb, Lba, Offset, NumBytes, Buffer);
441 }
442
443
444 /**
445 Erases and initializes a firmware volume block.
446
447 The EfiFvbEraseBlock() function erases one block specified by Lba.
448 Implementations should be mindful that the firmware volume might
449 be in the WriteDisabled state. If it is in this state, the EfiFvbEraseBlock()
450 function must return the status code EFI_ACCESS_DENIED without
451 modifying the contents of the firmware volume. If Instance is
452 larger than the max FVB number, or Lba index is larger than the
453 last block of the firmware volume, this function return the status
454 code EFI_INVALID_PARAMETER.
455
456 All calls to EfiFvbEraseBlock() must be fully flushed to the
457 hardware before this function returns.
458
459 @param[in] Instance The FV instance to be erased.
460 @param[in] Lba The logical block index to be erased from.
461
462 @retval EFI_SUCCESS The erase request was successfully completed.
463 @retval EFI_ACCESS_DENIED The firmware volume is in the WriteDisabled state.
464 @retval EFI_DEVICE_ERROR The block device is not functioning correctly and
465 could not be written. The firmware device may
466 have been partially erased.
467 @retval EFI_INVALID_PARAMETER Invalid parameter. Instance is larger than the max
468 FVB number. Lba index is larger than the last block
469 of the firmware volume.
470
471 **/
472 EFI_STATUS
473 EFIAPI
474 EfiFvbEraseBlock (
475 IN UINTN Instance,
476 IN EFI_LBA Lba
477 )
478 {
479 if (Instance >= mFvbCount) {
480 return EFI_INVALID_PARAMETER;
481 }
482
483 if (EfiAtRuntime() && !mFvbEntry[Instance].IsRuntimeAccess) {
484 return EFI_INVALID_PARAMETER;
485 }
486
487 return mFvbEntry[Instance].Fvb->EraseBlocks (mFvbEntry[Instance].Fvb, Lba, 1, EFI_LBA_LIST_TERMINATOR);
488 }
489
490
491 /**
492 Retrieves the attributes and current settings of the specified block,
493 returns resulting attributes in output parameter.
494
495 The EfiFvbGetAttributes() function retrieves the attributes and current
496 settings of the block specified by Instance. If Instance is larger than
497 the max FVB number, this function returns the status code EFI_INVALID_PARAMETER.
498
499 If Attributes is NULL, then ASSERT().
500
501 @param[in] Instance The FV instance to be operated.
502 @param[out] Attributes Pointer to EFI_FVB_ATTRIBUTES_2 in which the
503 attributes and current settings are returned.
504
505 @retval EFI_EFI_SUCCESS The firmware volume attributes were returned.
506 @retval EFI_INVALID_PARAMETER Invalid parameter. Instance is larger than the max FVB number.
507 **/
508 EFI_STATUS
509 EFIAPI
510 EfiFvbGetVolumeAttributes (
511 IN UINTN Instance,
512 OUT EFI_FVB_ATTRIBUTES_2 *Attributes
513 )
514 {
515 ASSERT (Attributes != NULL);
516
517 if (Instance >= mFvbCount) {
518 return EFI_INVALID_PARAMETER;
519 }
520
521 if (EfiAtRuntime() && !mFvbEntry[Instance].IsRuntimeAccess) {
522 return EFI_INVALID_PARAMETER;
523 }
524
525 return mFvbEntry[Instance].Fvb->GetAttributes (mFvbEntry[Instance].Fvb, Attributes);
526 }
527
528
529 /**
530 Modify the attributes and current settings of the specified block
531 according to the input parameter.
532
533 The EfiFvbSetAttributes() function sets configurable firmware volume
534 attributes and returns the new settings of the firmware volume specified
535 by Instance. If Instance is larger than the max FVB number, this function
536 returns the status code EFI_INVALID_PARAMETER.
537
538 If Attributes is NULL, then ASSERT().
539
540 @param[in] Instance The FV instance to be operated.
541 @param[in, out]Attributes On input, Attributes is a pointer to EFI_FVB_ATTRIBUTES_2
542 that contains the desired firmware volume settings.
543 On successful return, it contains the new settings of the firmware volume.
544
545 @retval EFI_EFI_SUCCESS The firmware volume attributes were modified successfully.
546 @retval EFI_INVALID_PARAMETER Invalid parameter. Instance is larger than the max FVB number.
547
548 **/
549 EFI_STATUS
550 EFIAPI
551 EfiFvbSetVolumeAttributes (
552 IN UINTN Instance,
553 IN OUT EFI_FVB_ATTRIBUTES_2 *Attributes
554 )
555 {
556 ASSERT (Attributes != NULL);
557
558 if (Instance >= mFvbCount) {
559 return EFI_INVALID_PARAMETER;
560 }
561
562 if (EfiAtRuntime() && !mFvbEntry[Instance].IsRuntimeAccess) {
563 return EFI_INVALID_PARAMETER;
564 }
565
566 return mFvbEntry[Instance].Fvb->SetAttributes (mFvbEntry[Instance].Fvb, Attributes);
567 }
568
569
570 /**
571 Retrieves the physical address of the specified memory mapped FV.
572
573 Retrieve the base address of a memory-mapped firmware volume specified by Instance.
574 If Instance is larger than the max FVB number, this function returns the status
575 code EFI_INVALID_PARAMETER.
576
577 If BaseAddress is NULL, then ASSERT().
578
579 @param[in] Instance The FV instance to be operated.
580 @param[out] BaseAddress Pointer to a caller allocated EFI_PHYSICAL_ADDRESS
581 that on successful return, contains the base address
582 of the firmware volume.
583
584 @retval EFI_EFI_SUCCESS The firmware volume base address is returned.
585 @retval EFI_INVALID_PARAMETER Invalid parameter. Instance is larger than the max FVB number.
586
587 **/
588 EFI_STATUS
589 EFIAPI
590 EfiFvbGetPhysicalAddress (
591 IN UINTN Instance,
592 OUT EFI_PHYSICAL_ADDRESS *BaseAddress
593 )
594 {
595 ASSERT (BaseAddress != NULL);
596
597 if (Instance >= mFvbCount) {
598 return EFI_INVALID_PARAMETER;
599 }
600
601 if (EfiAtRuntime() && !mFvbEntry[Instance].IsRuntimeAccess) {
602 return EFI_INVALID_PARAMETER;
603 }
604
605 return mFvbEntry[Instance].Fvb->GetPhysicalAddress (mFvbEntry[Instance].Fvb, BaseAddress);
606 }
607
608
609 /**
610 Retrieve the block size of the specified fv.
611
612 The EfiFvbGetBlockSize() function retrieves the size of the requested block.
613 It also returns the number of additional blocks with the identical size.
614 If Instance is larger than the max FVB number, or Lba index is larger than
615 the last block of the firmware volume, this function return the status code
616 EFI_INVALID_PARAMETER.
617
618 If BlockSize is NULL, then ASSERT().
619
620 If NumOfBlocks is NULL, then ASSERT().
621
622 @param[in] Instance The FV instance to be operated.
623 @param[in] Lba Indicates which block to return the size for.
624 @param[out] BlockSize Pointer to a caller-allocated UINTN in which the
625 size of the block is returned.
626 @param[out] NumOfBlocks Pointer to a caller-allocated UINTN in which the
627 number of consecutive blocks, starting with Lba,
628 is returned. All blocks in this range have a size of BlockSize.
629
630 @retval EFI_EFI_SUCCESS The firmware volume base address is returned.
631 @retval EFI_INVALID_PARAMETER Invalid parameter. Instance is larger than the max FVB number.
632 Lba index is larger than the last block of the firmware volume.
633
634 **/
635 EFI_STATUS
636 EFIAPI
637 EfiFvbGetBlockSize (
638 IN UINTN Instance,
639 IN EFI_LBA Lba,
640 OUT UINTN *BlockSize,
641 OUT UINTN *NumOfBlocks
642 )
643 {
644 ASSERT (BlockSize != NULL);
645 ASSERT (NumOfBlocks != NULL);
646
647 if (Instance >= mFvbCount) {
648 return EFI_INVALID_PARAMETER;
649 }
650
651 if (EfiAtRuntime() && !mFvbEntry[Instance].IsRuntimeAccess) {
652 return EFI_INVALID_PARAMETER;
653 }
654
655 return mFvbEntry[Instance].Fvb->GetBlockSize (mFvbEntry[Instance].Fvb, Lba, BlockSize, NumOfBlocks);
656 }