From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from EUR05-VI1-obe.outbound.protection.outlook.com (EUR05-VI1-obe.outbound.protection.outlook.com [40.107.21.43]) by mx.groups.io with SMTP id smtpd.web09.4683.1627996189890221311 for ; Tue, 03 Aug 2021 06:09:55 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=pKMzCPst; spf=pass (domain: arm.com, ip: 40.107.21.43, mailfrom: samer.el-haj-mahmoud@arm.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+YlXsv6mKLqJz//gopjAp24BO4Ef7l1ef8l4GLyhsyw=; b=pKMzCPsttG9lzjkPK92XDx5sPZA4GHU62w+tdWpkDy+VOHg9OvPSmz9uF5NbJJ4HG0DTvOpxFMY+AkdDycBwkbKGWN9izE+v+8kJH1oqtR+ntHwOFdTW27S+iWEa4jNoUZTvajlsWt8ytYEdWKpsokhD8gsHaQE9vWfK00RiM2A= Received: from DB6PR07CA0088.eurprd07.prod.outlook.com (2603:10a6:6:2b::26) by PAXPR08MB6878.eurprd08.prod.outlook.com (2603:10a6:102:139::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4373.18; Tue, 3 Aug 2021 13:09:42 +0000 Received: from DB5EUR03FT024.eop-EUR03.prod.protection.outlook.com (2603:10a6:6:2b:cafe::d4) by DB6PR07CA0088.outlook.office365.com (2603:10a6:6:2b::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4394.6 via Frontend Transport; Tue, 3 Aug 2021 13:09:42 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT024.mail.protection.outlook.com (10.152.20.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4373.18 via Frontend Transport; Tue, 3 Aug 2021 13:09:41 +0000 Received: ("Tessian outbound 8529ae990a93:v101"); Tue, 03 Aug 2021 13:09:41 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 00b20367279a74f8 X-CR-MTA-TID: 64aa7808 Received: from fe65807730b3.2 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 0855FA7E-1ED6-492B-A835-3107970B2161.1; Tue, 03 Aug 2021 13:09:30 +0000 Received: from EUR04-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id fe65807730b3.2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Tue, 03 Aug 2021 13:09:30 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZRrdx6bo5dUQdhtPLg65nQWKW+faG1hmFTvj1ognueO2WIWhZ8lppQgVNsBLx4NTJ7bDHGpYXw0i3NR6xL4oPxtKPi1gMQoDlrwBzX+J5HEcLmbTtp12hgJ0435Jwg9RONRfMdBBD4Y9j9B/UhUD6Q9QELduadA3it4K2BCDRl3TQN/Z3jusihhljiZ7i7bA+F7yMxqEs4YwM3vRZKAi8HyBm2DxNXfkJXI7WLC2bjPbwJFH+j81GaCt49s0VbFeYkXABdVJJRBFxS6zQiS4OyJbbvefe8IbXh5u7IXm/QV8Dn9yJ0chSq1R2GFJvhoOepWi6gTmL/jSqpmI9i2PdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+YlXsv6mKLqJz//gopjAp24BO4Ef7l1ef8l4GLyhsyw=; b=Q3hGIcPIrVbZatM18T4K2p1b9PGr6kH7nf7OdV0dehcJfTiGbyfuxC49pD38L2POy5ipXALtAXiWmSz7OEo9orhScBI8Ju9012oZDJVYxbIzrI7K8kr3cLZBF7XieR9i2oORmIapbaaESFSPEfaXaejLzkEy/B/HVbVtC/ifXiw59pfMyAOjoeS6rBGcrIuKxujwU6Cuz+RbT/2g/y5rv7gz6QIwv0gq2l/+X7OigugvPtEQHV4+Mtk8BACnF4mHxBUpo+hzvZQ55CRO2RM1IJg8uojEnl/RyAaIOA0m2v7UoH3b2F0cPSC3pqvOyfaLwRV6cYKP2+pg0v58xmB5cQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+YlXsv6mKLqJz//gopjAp24BO4Ef7l1ef8l4GLyhsyw=; b=pKMzCPsttG9lzjkPK92XDx5sPZA4GHU62w+tdWpkDy+VOHg9OvPSmz9uF5NbJJ4HG0DTvOpxFMY+AkdDycBwkbKGWN9izE+v+8kJH1oqtR+ntHwOFdTW27S+iWEa4jNoUZTvajlsWt8ytYEdWKpsokhD8gsHaQE9vWfK00RiM2A= Received: from PAXPR08MB6987.eurprd08.prod.outlook.com (2603:10a6:102:1df::15) by PAXPR08MB7018.eurprd08.prod.outlook.com (2603:10a6:102:201::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4373.21; Tue, 3 Aug 2021 13:09:20 +0000 Received: from PAXPR08MB6987.eurprd08.prod.outlook.com ([fe80::cdae:9f67:6693:49d4]) by PAXPR08MB6987.eurprd08.prod.outlook.com ([fe80::cdae:9f67:6693:49d4%8]) with mapi id 15.20.4373.026; Tue, 3 Aug 2021 13:09:19 +0000 From: "Samer El-Haj-Mahmoud" To: "Nelson, Eric" , Bret Barkelew , "devel@edk2.groups.io" , G Edhaya Chandran , "gaojie@byosoft.com.cn" , "Kinney, Michael D" CC: Samer El-Haj-Mahmoud Subject: Re: Proposing a new area of the edk2-test repository Thread-Topic: Proposing a new area of the edk2-test repository Thread-Index: AddhbD/jx+sU+OEET2KEtVurFZp1QgAMtQmQAB1RQDABk5dlwAADbvTAAAGI+IAADovgLQMTMe5wA7j5TkABIc3nUA== Date: Tue, 3 Aug 2021 13:09:19 +0000 Message-ID: References: , In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: yes X-MS-TNEF-Correlator: msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2021-06-24T04:24:07.1039521Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Privileged Authentication-Results-Original: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=arm.com; x-ms-publictraffictype: Email X-MS-Office365-Filtering-Correlation-Id: 404dba69-13be-4782-3f8b-08d9567ff4d8 x-ms-traffictypediagnostic: PAXPR08MB7018:|PAXPR08MB6878: x-ms-exchange-transport-forked: True X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true nodisclaimer: true x-ms-oob-tlc-oobclassifiers: OLM:10000;OLM:10000; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB6987.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(346002)(376002)(39850400004)(366004)(396003)(136003)(7696005)(76236003)(38100700002)(2906002)(6506007)(66616009)(64756008)(9686003)(55016002)(30864003)(110136005)(83380400001)(66446008)(19627235002)(122000001)(66556008)(66476007)(76116006)(53546011)(99936003)(166002)(186003)(966005)(38070700005)(52536014)(71200400001)(8936002)(478600001)(45080400002)(86362001)(5660300002)(33656002)(8676002)(66946007)(4326008)(316002)(26005);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?YrLEiZCFtJxxFXuVT+2yPD0EcXvoZO+kjlgtsxBA1xmOs5Pmv+V1gbNBumJe?= =?us-ascii?Q?Cpx/zAaSLE9bMttmZxp+BGHAL53YzTOC8PKrl824fA+KAtEGA5hwsR+6vzfY?= =?us-ascii?Q?cuFe3ISiMtDuBh0+JrcX9tncYDveXhcBPbg8uWZ0ElVfD0bAU7R+v5ape1Jp?= =?us-ascii?Q?WcmbeGW+6YHyH3TwtgKqdCMBD+op0VtA18J+udOhHBxwKH1z01W2oE2R1hDS?= =?us-ascii?Q?C+9yOc7V7UDs5AtCkNZ5HpS1NDp5wpgpFEaf98XFibk+E9Fu/P12dm79G0kd?= =?us-ascii?Q?kZfsU1/TgVBK3VzqzdNbb11St+Oko2U3HDP1Ik2owuY4j276r7mJ72r41/r4?= =?us-ascii?Q?bk1iWluM8uXJQom8DidN83NN3zYmxtOoZWdQBwBiY/qzUHKXfipiWPi7FDMm?= =?us-ascii?Q?3f3WBNMG4AuCJaG2bW6/NzFBRTfEklOLJTehQQo53QN/rVKuTkKYNsPMOqhS?= =?us-ascii?Q?v7BZyNitBSc4mUGjbRY4xqE6jy79zNjHWS2cO/Qni/s4kKYHsuZ3m1sYuRe5?= =?us-ascii?Q?9SP5YfAMks2TmA9hXok1k0fOkAHNgnDRNlB4OgH7zXHVokPXDTxYBBEHCzPV?= =?us-ascii?Q?lClWlKsHYmhBfq3Rq/SNXoTejAyS81TR4+4DzaUfmm3FomD19RkRduKgKeuI?= =?us-ascii?Q?puoQLJ50zpZ4ywcJ+4XhH0ew35RW10N5rTtd9y9yCnyu5TzO4pcMwuURscTS?= =?us-ascii?Q?n6Z0qWx6Gm+f50zfJMzSmjvB7rs/1voJNDQs9fwXRtWH5xACJufcu/+2jyV8?= =?us-ascii?Q?27AhCDRBaAs8g/sMEH/kwSb/6TeR75ZIZY8H+6uIhY7x+ZMjt634XfygmoKA?= =?us-ascii?Q?CHJiMKGWULYk5VXe9KmOgnNlKEQtyVxLIzXmj1oKVgKHuoQWNpjO5ancBIwW?= =?us-ascii?Q?YVJrJxLA6kl5df/J3NFYmqmzDIZnYZpn3cjcFB/DOD2RwMn92f72adTxgVww?= =?us-ascii?Q?m1KJ/k5wje32wfHwOO5y/WMloAtZGgdlIt3tJ50G8BKDf9a7J8dXfzhP02dA?= =?us-ascii?Q?yL0TEixrrs8QI4PjptZVxr73YdbmOBWZA5psnlTaCMxWwf3W95oTnl+jDf7T?= =?us-ascii?Q?IeIq9PTJT+Ml4V6+oVimmxMGe7TVGRHKoM7zIeZNgWwMwN6ACp48s8WYAiyV?= =?us-ascii?Q?1OEqbDXDDhhAscYmAdLqAWRTn8uAE1plssk3e8MxiuupvFj5kmuJ6krBhxlA?= =?us-ascii?Q?SLh98fqitYZcHWEA5fh65V+nZCKZ6kB4jIL03Hly1Uf3Wj6Eq5SRWYtfTgK4?= =?us-ascii?Q?t7Vfy1wcpz2HbvUnas2L4IFOr8upqoHrlSK6wdJ3XtMYK2n7Y/SNo4UK0Axn?= =?us-ascii?Q?FqGvoXn38tvGEc0wNwzzEDfV?= MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB7018 Original-Authentication-Results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=arm.com; Return-Path: Samer.El-Haj-Mahmoud@arm.com X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT024.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 1b64cdb4-8b83-4e89-c61b-08d9567fe7d3 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(136003)(396003)(346002)(376002)(39860400002)(46966006)(36840700001)(82310400003)(70586007)(70206006)(336012)(66616009)(26005)(7696005)(86362001)(45080400002)(9686003)(8676002)(19627235002)(8936002)(186003)(52536014)(55016002)(4326008)(478600001)(33656002)(966005)(5660300002)(30864003)(110136005)(316002)(6506007)(53546011)(82740400003)(99936003)(356005)(2906002)(81166007)(166002)(76236003)(47076005)(36860700001)(83380400001)(559001)(579004);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Aug 2021 13:09:41.8203 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 404dba69-13be-4782-3f8b-08d9567ff4d8 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT024.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB6878 X-Groupsio-MsgNum: 78593 Content-Language: en-US Content-Type: multipart/related; boundary="_004_PAXPR08MB6987B5B7347F0B88052FF14490F09PAXPR08MB6987eurp_"; type="multipart/alternative" --_004_PAXPR08MB6987B5B7347F0B88052FF14490F09PAXPR08MB6987eurp_ Content-Type: multipart/alternative; boundary="_000_PAXPR08MB6987B5B7347F0B88052FF14490F09PAXPR08MB6987eurp_" --_000_PAXPR08MB6987B5B7347F0B88052FF14490F09PAXPR08MB6987eurp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable I would think just sending the code contribution patch is sufficient. From: Nelson, Eric Sent: Wednesday, July 28, 2021 3:05 PM To: Samer El-Haj-Mahmoud ; Bret Barkelew ; devel@edk2.groups.io; G Edhaya Chandran ; gaojie@byosoft.com.cn; Kinney, Michael D Subject: RE: Proposing a new area of the edk2-test repository Adding ResumeOK.efi tool under /edk2-test/test-tools/TestToolsPkg would be= great. Should I propose this in the RFC and DEVEL mailing lists as a next step? Thanks, __e From: Samer El-Haj-Mahmoud > Sent: Friday, July 9, 2021 1:12 PM To: Bret Barkelew >; devel@edk2.groups.io; Nelson, Eric = >; G Edhaya Chandran >; gaojie@byosoft.com= .cn; Kinney, Michael D > Subject: RE: Proposing a new area of the edk2-test repository Interesting, thanks for sharing Bret. Some of those tests seem to be x64 s= pecific (SMM tests), and some can be more generic like MorLockTestApp Like I said earlier, I am not against adding test tools to edk2-test. That= in fact is welcomed, especially if their usefulness in validating the solu= tions extend beyond specific implementations. What would a good tree structure look like to accommodate misc tools? Toda= y we have /edk2-test/uefi-sct/SctPkg How about something like this? /edk2-test/test-tools/TestToolsPkg or /edk2-test/ TestToolsPkg The "ResumeOK" can be placed there Any other ideas? From: Bret Barkelew > Sent: Thursday, June 24, 2021 12:25 AM To: devel@edk2.groups.io; eric.nelson@intel.c= om; Samer El-Haj-Mahmoud >; G Edhaya Chandran >; gaojie@byosoft.com.cn; Kinney, Michael D > Subject: RE: Proposing a new area of the edk2-test repository Fun fact! Mu also has a number of apps and things that we could work on mo= ving to EDK2 if there were a suitable location. Right now, many of them are= here: mu_plus/UefiTestingPkg at release/202102 * microsoft/mu_plus (github.com)<= https://github.com/microsoft/mu_plus/tree/release/202102/UefiTestingPkg> - Bret From: Nelson, Eric via groups.io Sent: Wednesday, June 23, 2021 3:38 PM To: Samer El-Haj-Mahmoud; G Edhaya Ch= andran; gaojie@byosoft.com.cn; devel@edk2.groups.io; Kinney= , Michael D Subject: [EXTERNAL] Re: [edk2-devel] Proposing a new area of the edk2-test= repository I have created a few other internal apps that build under WinTestPkg, alth= ough ResumeOK.efi is the only one I have received permissions to release so= urces for at this time. And yes, they are primarily intended for validating Windows requirements. I had some issues with my apps, needing to use different libraries than Md= eModulePkg, and found it easier to create my own package, and use the libs = I want. __e From: Samer El-Haj-Mahmoud > Sent: Wednesday, June 23, 2021 1:56 PM To: Nelson, Eric >; G = Edhaya Chandran >; = gaojie@byosoft.com.cn; devel@edk2.groups.io Cc: Samer El-Haj-Mahmoud > Subject: RE: Proposing a new area of the edk2-test repository +edk2 list I am not against adding additional test tools to edk2-test. Just feel like= there is a need to organize and have a strategy, rather than just use edk2= -test as a dumping group of miscellaneous tools. There is already a place for apps under https://github.com/tianocore/edk2/= tree/master/MdeModulePkg/Application We also have a number of EDK2 misc applications that use edk2-libc in http= s://github.com/tianocore/edk2-libc/tree/master/AppPkg/Applications A couple of questions: * Do you expect more apps from WinTestPkg to be contributed to TianoCo= re? And are they all around testing specific Windows requirements? If so, t= hen having an edk2-test/WinTestPkg makes sense to me, as you will have a co= llection of useful testing app targeting specific area. * But what about other OSes? * If this is a one-off test app and other WinTestPkg apps are not goin= g to be contributed, then does it make sense to put this under MdeModulePkg= /Application ? From: Nelson, Eric > Sent: Wednesday, June 23, 2021 3:10 PM To: G Edhaya Chandran >; gaojie@byosoft.com.cn Cc: Samer El-Haj-Mahmoud > Subject: RE: Proposing a new area of the edk2-test repository Hi Edhay, Do you have any more questions? What do you think of creating another directory in edk2-test, for other te= st apps, in addition to uefi-sct, such as ResumeOK.efi? Thanks, __e From: Nelson, Eric Sent: Tuesday, June 15, 2021 12:00 PM To: G Edhaya Chandran >; gaojie@byosoft.com.cn Cc: Samer El-Haj-Mahmoud > Subject: RE: Proposing a new area of the edk2-test repository Hi Edhay, ResumeOK.efi is a tool I wrote from the HelloWorld example, that validates= Windows resume from S4 requirements, specifically that the memory-map run-= time memory regions don't change, and secondly that PCI devices don't disap= pear from the system, both conditions would cause Windows to fail to resume= from S4. You install the tool to the root of the ESP, and set it as the default/top= entry in the boot manager, and launch it. (Disable Secure Boot.) It runs warm, cold, and 60s ACPI RTC wake cycles, infinitely looking for e= rrors. ResumeOK.efi writes a file to the root of the ESP, ResumeOK.map, which con= tains the ACPI Facs->HardwareSignature, a list of the PCI devices in the sy= stem, and a copy of its memory map, from the first time it runs. During each test pass, it runs a barrage of tests: 1. Free memory test - does the available memory match the memory map sa= ved in ResumeOK.map 2. HW signature check - does the system still have the same HW signatur= e as saved in the ResumeOK.map 3. Allocation test - all the available memory is allocated, and then th= e memory map is checked if the run-time regions match ResumeOK.map. If any of the tests fail, then the new/missing PCI devices are listed (HW = signature fail case), or the memory descriptor that changed, it's location,= and current and previous type and size. I have received permission from Intel to *try* to release the source under= Edk2-test. I've included a 64-bit binary, if you want to give it a test drive. Make sure Secure Boot is off. Also, it is required to manually delete any ResumeOK.map on the ESP, befor= e beginning a new test pass. The tool also supports a host of EFI Shell commands: Resumeok.efi MEMMAP - displays Windows coalesced view of the current memor= y map ResumeOK.efi ROKMAP - displays Windows coalesced view of the memory saved = in ResumeOK.map ResumeOK.efi RTDATA - displays an analysis of RT_Data pool usage ResumeOK.efi NORESET - run one test pass, but suppress automatic SX cyclin= g These are the files that build it: Edk2\WinTestPkg\Application Edk2\WinTestPkg\WinTestPkg.dec Edk2\WinTestPkg\WinTestPkg.dsc Edk2\WinTestPkg\Application\ResumeOK Edk2\WinTestPkg\Application\ResumeOK\AcpiTbl.c Edk2\WinTestPkg\Application\ResumeOK\AcpiTbl.h Edk2\WinTestPkg\Application\ResumeOK\AppSupport.c Edk2\WinTestPkg\Application\ResumeOK\BitMap.c Edk2\WinTestPkg\Application\ResumeOK\BitMap.h Edk2\WinTestPkg\Application\ResumeOK\EfiFileLib.c Edk2\WinTestPkg\Application\ResumeOK\EfiFileLib.h Edk2\WinTestPkg\Application\ResumeOK\pci.c Edk2\WinTestPkg\Application\ResumeOK\Pci.h Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.c Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.h Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.inf Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.uni Edk2\WinTestPkg\Application\ResumeOK\ResumeOKExtra.uni Edk2\WinTestPkg\Application\ResumeOK\RtData.c Edk2\WinTestPkg\Application\ResumeOK\TimeBaseLib.c Thanks, __e From: G Edhaya Chandran > Sent: Monday, June 14, 2021 9:36 PM To: Nelson, Eric >; ga= ojie@byosoft.com.cn Cc: Samer El-Haj-Mahmoud > Subject: RE: Proposing a new area of the edk2-test repository Hi Eric, Thanks for reaching out to us. Can we get more details of the tool? Is this tool already open sourced or could you send us the basic documenta= tion pertaining to it. With Warm Regards, Edhay From: Nelson, Eric > Sent: 15 June 2021 04:23 To: gaojie@byosoft.com.cn; G Edhaya Chandran= > Subject: Proposing a new area of the edk2-test repository Hello SCT maintainers, I'm looking to release source to a UEFI validation tool that has been a bi= g hit with platform BIOS validation teams, so it can help other PC vendors. My coworker Michael Kinney suggested I reach out to you directly about the= idea of creating a new top level directory in the edk2-test repro for othe= r test apps, and I could be maintainer. What do you think of creating another directory in edk2-test, for other te= st apps, in addition to uefi-sct? Thanks! __e IMPORTANT NOTICE: The contents of this email and any attachments are confi= dential and may also be privileged. If you are not the intended recipient, = please notify the sender immediately and do not disclose the contents to an= y other person, use it for any purpose, or store or copy the information in= any medium. Thank you. IMPORTANT NOTICE: The contents of this email and any attachments are confi= dential and may also be privileged. If you are not the intended recipient, = please notify the sender immediately and do not disclose the contents to an= y other person, use it for any purpose, or store or copy the information in= any medium. Thank you. IMPORTANT NOTICE: The contents of this email and any attachments are confi= dential and may also be privileged. If you are not the intended recipient, = please notify the sender immediately and do not disclose the contents to an= y other person, use it for any purpose, or store or copy the information in= any medium. Thank you. IMPORTANT NOTICE: The contents of this email and any attachments are confi= dential and may also be privileged. If you are not the intended recipient, = please notify the sender immediately and do not disclose the contents to an= y other person, use it for any purpose, or store or copy the information in= any medium. Thank you. --_000_PAXPR08MB6987B5B7347F0B88052FF14490F09PAXPR08MB6987eurp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

I would think just sending the code contribution pa= tch is sufficient.

 

 

From: Nelson, Eric <eric.nelson@intel.com= >
Sent: Wednesday, July 28, 2021 3:05 PM
To: Samer El-Haj-Mahmoud <Samer.El-Haj-Mahmoud@arm.com>; Bret= Barkelew <Bret.Barkelew@microsoft.com>; devel@edk2.groups.io; G Edha= ya Chandran <Edhaya.Chandran@arm.com>; gaojie@byosoft.com.cn; Kinney,= Michael D <michael.d.kinney@intel.com>
Subject: RE: Proposing a new area of the edk2-test repository<= /o:p>

 

 

Adding ResumeOK.efi tool under /edk2-test/test-tool= s/TestToolsPkg would be great.

 

Should I propose this in the RFC and DEVEL mailing = lists as a next step?

 

Thanks,

__e

 

 

From: Samer El-Haj-Mahmoud <Samer.El-Haj-Mahmoud@arm.com>
Sent: Friday, July 9, 2021 1:12 PM
To: Bret Barkelew <Bret.Barkelew@microsoft.com>; devel@edk2.groups.io; Nelson, = Eric <eric.nelson@intel.com= >; G Edhaya Chandran <Edha= ya.Chandran@arm.com>; gaojie@byosoft.com.cn; Kinney= , Michael D <michael.d.kin= ney@intel.com>
Subject: RE: Proposing a new area of the edk2-test repository<= /o:p>

 

Interesting, thanks for sharing Bret. Some of those= tests seem to be x64 specific (SMM tests), and some can be more generic li= ke MorLockTestApp

 

Like I said earlier, I am not against adding test t= ools to edk2-test. That in fact is welcomed, especially if their usefulness= in validating the solutions extend beyond specific implementations.

 

What would a good tree structure look like to accom= modate misc tools? Today we have

 

/edk2-test/uefi-sct/SctPkg

 

How about something like this?

/edk2-test/test-tools/TestToolsPkg

or /edk2-test/ TestToolsPkg

 

The “ResumeOK” can be placed there=

 

Any other ideas?

 

 

From: Bret Barkelew <Bret.Barkelew@microsoft.com>
Sent: Thursday, June 24, 2021 12:25 AM
To: devel@edk2.groups.io; eric.nelson@intel.com; Samer El-Haj-Mahmoud <Samer.El-Haj-Mahmoud@arm.com>; G Edhaya Ch= andran <Edhaya.Chandran@arm.c= om>; gaojie@byosoft.com.cn; Kinney= , Michael D <michael.d.kin= ney@intel.com>
Subject: RE: Proposing a new area of the edk2-test repository<= /o:p>

 

Fun fact! Mu also has a number of apps and things t= hat we could work on moving to EDK2 if there were a suitable location. Righ= t now, many of them are here:

mu_plus/UefiTestingPkg at release/202102 &= middot; microsoft/mu_plus (github.com)

 

- Bret

 

From: Nelson, Eric via groups.io
Sent: Wednesday, June 23, 2021 3:38 PM
To: Samer El-Haj-Ma= hmoud; G Edhaya Chandran; gaojie@byosoft.com.cn; devel@e= dk2.groups.io; Kinney, Michael D
Subject: [EXTERNAL] Re: [edk2-devel] Proposing a new area of the ed= k2-test repository

 

 

I have created a few other internal apps that build= under WinTestPkg, although ResumeOK.efi is the only one I have received pe= rmissions to release sources for at this time.

And yes, they are primarily intended for validating= Windows requirements.

I had some issues with my apps, needing to use diff= erent libraries than MdeModulePkg, and found it easier to create my own pac= kage, and use the libs I want.

 

__e

 

 

From: Samer El-Haj-Mahmoud <Samer.El-Haj-Mahmoud@arm.com>
Sent: Wednesday, June 23, 2021 1:56 PM
To: Nelson, Eric <eric.= nelson@intel.com>; G Edhaya Chandran <Edhaya.Chandran@arm.com>; gaojie@byosoft.com.cn; devel@edk2.groups.io
Cc: Samer El-Haj-Mahmoud <Samer.El-Haj-Mahmoud@arm.com>
Subject: RE: Proposing a new area of the edk2-test repository<= /o:p>

 

+edk2 list

 

I am not against adding additional test tools to ed= k2-test. Just feel like there is a need to organize and have a strategy, ra= ther than just use edk2-test as a dumping group of miscellaneous tools.

 

There is already a place for apps under https://github.com/tianocore/edk2/tree/maste= r/MdeModulePkg/Application

 

We also have a number of EDK2 misc applications tha= t use edk2-libc in https://github.com/tianocore/edk2-libc/tree/= master/AppPkg/Applications

 

A couple of questions:

  • Do you expect more apps from WinTestPkg to be contributed to TianoCo= re? And are they all around testing specific Windows requirements? If so, t= hen having an edk2-test/WinTestPkg makes sense to me, as you will have a collection of useful testing app targetin= g specific area.
    • But what about other OSes?
  • If this is a one-off test app and other WinTestPkg apps are not goin= g to be contributed, then does it make sense to put this under MdeModulePkg= /Application ?

 

 

 

From: Nelson, Eric <eric.nelson@intel.com>
Sent: Wednesday, June 23, 2021 3:10 PM
To: G Edhaya Chandran <Edhaya.Chandran@arm.com>; gao= jie@byosoft.com.cn
Cc: Samer El-Haj-Mahmoud <Samer.El-Haj-Mahmoud@arm.com= >
Subject: RE: Proposing a new area of the edk2-test repository<= /o:p>

 

 

Hi Edhay,

 

Do you have any more questions?

What do you think of creating another directory in = edk2-test, for other test apps, in addition to uefi-sct, such as ResumeOK.e= fi?

 

Thanks,

__e

 

 

From: Nelson, Eric
Sent: Tuesday, June 15, 2021 12:00 PM
To: G Edhaya Chandran <Edhaya.Chandran@arm.com>; gao= jie@byosoft.com.cn
Cc: Samer El-Haj-Mahmoud <Samer.El-Haj-Mahmoud@arm.com= >
Subject: RE: Proposing a new area of the edk2-test repository<= /o:p>

 

 

Hi Edhay,

 

ResumeOK.efi is a tool I wrote from the HelloWorld = example, that validates Windows resume from S4 requirements, specifically t= hat the memory-map run-time memory regions don’t change, and secondly= that PCI devices don’t disappear from the system, both conditions would cause Windows to fail to resume from S4.

 

You install the tool to the root of the ESP, and se= t it as the default/top entry in the boot manager, and launch it.  (Di= sable Secure Boot.)

 

It runs warm, cold, and 60s ACPI RTC wake cycles, i= nfinitely looking for errors.

 

ResumeOK.efi writes a file to the root of the ESP, = ResumeOK.map, which contains the ACPI Facs->HardwareSignature, a list of= the PCI devices in the system, and a copy of its memory map, from the firs= t time it runs.

 

During each test pass, it runs a barrage of tests:<= o:p>

 

  1. Free memory test – does the available memory match the memory = map saved in ResumeOK.map
  2. HW signature check – d= oes the system still have the same HW signature as saved in the ResumeOK.ma= p
  3. Allocation test – all the available memory is = allocated, and then the memory map is checked if the run-time regions match= ResumeOK.map.

 

If any of the tests fail, then the new/missing PCI = devices are listed (HW signature fail case), or the memory descriptor that = changed, it’s location, and current and previous type and size.<= /o:p>

 

I have received permission from Intel to *try* to release the source under Edk2-test.

 

I’ve included a 64-bit binary, if you want to= give it a test drive.

 

Make sure Secure Boot is off.

Also, it is required to manually delete any ResumeO= K.map on the ESP, before beginning a new test pass.

 

The tool also supports a host of EFI Shell commands= :

 

Resumeok.efi MEMMAP R= 11; displays Windows coalesced view of the current memory map

ResumeOK.efi ROKMAP R= 11; displays Windows coalesced view of the memory saved in ResumeOK.map

ResumeOK.efi RTDATA R= 11; displays an analysis of RT_Data pool usage

ResumeOK.efi NORESET = 211; run one test pass, but suppress automatic SX cycling

 

These are the files that build it:

 

Edk2\WinTestPkg\Application

Edk2\WinTestPkg\WinTestPkg.dec

Edk2\WinTestPkg\WinTestPkg.dsc

Edk2\WinTestPkg\Application\ResumeOK

Edk2\WinTestPkg\Application\ResumeOK\AcpiTbl.c=

Edk2\WinTestPkg\Application\ResumeOK\AcpiTbl.h=

Edk2\WinTestPkg\Application\ResumeOK\AppSupport.c

Edk2\WinTestPkg\Application\ResumeOK\BitMap.c<= /o:p>

Edk2\WinTestPkg\Application\ResumeOK\BitMap.h<= /o:p>

Edk2\WinTestPkg\Application\ResumeOK\EfiFileLib.c

Edk2\WinTestPkg\Application\ResumeOK\EfiFileLib.h

Edk2\WinTestPkg\Application\ResumeOK\pci.c

Edk2\WinTestPkg\Application\ResumeOK\Pci.h

Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.c

Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.h

Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.inf

Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.uni

Edk2\WinTestPkg\Application\ResumeOK\ResumeOKExtra.= uni

Edk2\WinTestPkg\Application\ResumeOK\RtData.c<= /o:p>

Edk2\WinTestPkg\Application\ResumeOK\TimeBaseLib.c<= o:p>

 

Thanks,

__e

 

 

From: G Edhaya Chandran <Edhaya.Chandran@ar= m.com>
Sent: Monday, June 14, 2021 9:36 PM
To: Nelson, Eric <eric.nelson@intel.com>; gao= jie@byosoft.com.cn
Cc: Samer El-Haj-Mahmoud <Samer.El-Haj-Mahmoud@arm.com= >
Subject: RE: Proposing a new area of the edk2-test repository<= /o:p>

 

Hi Eric,

 

    Thanks for reaching out to us.

Can we get more details of the tool?

 

Is this tool already open sourced or could you send= us the basic documentation pertaining to it.

 

With Warm Regards,
Edhay

 

 

From: Nelson, Eric <eric.nelson@intel.com>
Sent: 15 June 2021 04:23
To: gaojie@byosoft.com.cn; G Edhaya Chandran <Edhaya.Chandr= an@arm.com>
Subject: Proposing a new area of the edk2-test repository

 

 

Hello SCT maintainers,

 

I’m looking to release source to a UEFI valid= ation tool that has been a big hit with platform BIOS validation teams, so = it can help other PC vendors.

 

My coworker Michael Kinney suggested I reach out to= you directly about the idea of creating a new top level directory in the e= dk2-test repro for other test apps, and I could be maintainer.

 

What do you think of creating another directory in = edk2-test, for other test apps, in addition to uefi-sct?

 

Thanks!

__e

 

IMPORTANT NOTICE: The contents of this email and an= y attachments are confidential and may also be privileged. If you are not t= he intended recipient, please notify the sender immediately and do not disc= lose the contents to any other person, use it for any purpose, or store or copy the information in any medium. T= hank you.

IMPORTANT NOTICE: The contents of this email and an= y attachments are confidential and may also be privileged. If you are not t= he intended recipient, please notify the sender immediately and do not disc= lose the contents to any other person, use it for any purpose, or store or copy the information in any medium. T= hank you.

 

IMPORTANT NOTICE: The contents of this email and an= y attachments are confidential and may also be privileged. If you are not t= he intended recipient, please notify the sender immediately and do not disc= lose the contents to any other person, use it for any purpose, or store or copy the information in any medium. T= hank you.

IMPORTANT NOTICE: The contents of this email and any attachments are confi= dential and may also be privileged. If you are not the intended recipient, = please notify the sender immediately and do not disclose the contents to an= y other person, use it for any purpose, or store or copy the information in any medium. Thank you. --_000_PAXPR08MB6987B5B7347F0B88052FF14490F09PAXPR08MB6987eurp_-- --_004_PAXPR08MB6987B5B7347F0B88052FF14490F09PAXPR08MB6987eurp_ Content-Type: image/png; name="image001.png" Content-Description: image001.png Content-Disposition: inline; filename="image001.png"; size=175; creation-date="Tue, 03 Aug 2021 13:09:19 GMT"; modification-date="Tue, 03 Aug 2021 13:09:19 GMT" Content-ID: Content-Transfer-Encoding: base64 iVBORw0KGgoAAAANSUhEUgAABGsAAAACCAMAAADYQ6EuAAAAAXNSR0IArs4c6QAAAANQTFRFv83b Bi0mqAAAAAlwSFlzAAAdhwAAHYcBj+XxZQAAABl0RVh0U29mdHdhcmUATWljcm9zb2Z0IE9mZmlj ZX/tNXEAAAAgSURBVEhLY2AYBaMhMBoCoyEwGgKjITAaAqMhMDxCAAAI2AABAaOcngAAAABJRU5E rkJggg== --_004_PAXPR08MB6987B5B7347F0B88052FF14490F09PAXPR08MB6987eurp_--