From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from EUR03-AM5-obe.outbound.protection.outlook.com (EUR03-AM5-obe.outbound.protection.outlook.com [40.107.3.86]) by mx.groups.io with SMTP id smtpd.web10.994.1624481760817309228 for ; Wed, 23 Jun 2021 13:56:01 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=vTit8hHV; spf=pass (domain: arm.com, ip: 40.107.3.86, mailfrom: samer.el-haj-mahmoud@arm.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dvHKn3Tx6orRWQZNGjwcTRdw/HRikjk5BSBi3TSUp2U=; b=vTit8hHVgCpyLdPmnEhiznOdkzmfyWxVYo8RpSKEn7W/YvM28Vkg20C0zYdy8yDouk2lnt7gFfV6zunRRaYRCpiieI21ZrD8zpQbE1+rC3nA+zOQHuFlMR2slUvOlUXCzl36X6PDP7U/mWdFClHg0jnDN6zGUItAGWg7ozczuqY= Received: from DBBPR09CA0005.eurprd09.prod.outlook.com (2603:10a6:10:c0::17) by VI1PR08MB3280.eurprd08.prod.outlook.com (2603:10a6:803:3d::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4242.18; Wed, 23 Jun 2021 20:55:50 +0000 Received: from DB5EUR03FT051.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:c0:cafe::df) by DBBPR09CA0005.outlook.office365.com (2603:10a6:10:c0::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4264.18 via Frontend Transport; Wed, 23 Jun 2021 20:55:50 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT051.mail.protection.outlook.com (10.152.21.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4264.18 via Frontend Transport; Wed, 23 Jun 2021 20:55:50 +0000 Received: ("Tessian outbound 7f55dcc5b33a:v96"); Wed, 23 Jun 2021 20:55:50 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: ebea7c226a08922d X-CR-MTA-TID: 64aa7808 Received: from 15e5b582e8af.3 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 17F7A01A-F936-46C0-9CCA-6C7CB3BB23BF.1; Wed, 23 Jun 2021 20:55:43 +0000 Received: from EUR05-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 15e5b582e8af.3 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 23 Jun 2021 20:55:43 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kPNkg373VJ5+XzV98UTEQRPmObL0gVbbFh/04TwqHCc1N0OHvVYn5hw0wA0I5xj3X9pjFdgNR7v5OC5P3n/qk7aIztt5opS3ueAuow0n4e35MrmPvafwCnaa5q8JmTwseUaCK4an1yGVaFj+LNflOYdYkOGE5jvX7R7VOaViVThe+LY04Gg++gHsGRrTCzjS9yuhYOFCVpoJklGik32P8GTGN0ro74addOhvdIWh2C4UKH300W2vI9y2Bb67OdRt6fVv5oVI30Cr0c4hzNSSOTCkflz77U7ZdjyblCPzDFWm6qE0yfkCiTEs+0KJKO8xgDuBBgG38i0dtu+7gYKalA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dvHKn3Tx6orRWQZNGjwcTRdw/HRikjk5BSBi3TSUp2U=; b=JsxZzQfXrVYF9QwbeJy0guNrWTsXz8W+2DHAenfxFrG0dFginMKerU0ppLR/eJp8+5hm0m/gsc0prGNbMU2M/6ch2j+rCLbKnX5ZVtt3lHRtjoKxN2rRLk1V/qiJ9FPUa9+DOohwxW5kSDgBYFIGlOMUPXyA68NVSWkb6VajU/x32E+JDHl2yGu/2I1aptHOkhrLL0TAhM5SgV2T205ETqSWdhbNBaQhDq3YRukSsj4ch7k6PM6nO2NZenffWHg+dq6M1UJNXfuKfQ8B9GupLYgGSeCbViy7/yEIkQs7O+JOE8nNh3ozNUEn/Gs+9iN3Nm54yF8mJ9Ea0mwMaNFcaA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dvHKn3Tx6orRWQZNGjwcTRdw/HRikjk5BSBi3TSUp2U=; b=vTit8hHVgCpyLdPmnEhiznOdkzmfyWxVYo8RpSKEn7W/YvM28Vkg20C0zYdy8yDouk2lnt7gFfV6zunRRaYRCpiieI21ZrD8zpQbE1+rC3nA+zOQHuFlMR2slUvOlUXCzl36X6PDP7U/mWdFClHg0jnDN6zGUItAGWg7ozczuqY= Received: from PAXPR08MB6987.eurprd08.prod.outlook.com (2603:10a6:102:1df::15) by PA4PR08MB6207.eurprd08.prod.outlook.com (2603:10a6:102:f2::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4242.19; Wed, 23 Jun 2021 20:55:40 +0000 Received: from PAXPR08MB6987.eurprd08.prod.outlook.com ([fe80::65ab:99b9:c2cb:bf4a]) by PAXPR08MB6987.eurprd08.prod.outlook.com ([fe80::65ab:99b9:c2cb:bf4a%6]) with mapi id 15.20.4264.018; Wed, 23 Jun 2021 20:55:40 +0000 From: "Samer El-Haj-Mahmoud" To: "Nelson, Eric" , G Edhaya Chandran , "gaojie@byosoft.com.cn" , "devel@edk2.groups.io" CC: Samer El-Haj-Mahmoud Subject: Re: Proposing a new area of the edk2-test repository Thread-Topic: Proposing a new area of the edk2-test repository Thread-Index: AddhbD/jx+sU+OEET2KEtVurFZp1QgAMtQmQAB1RQDABk5dlwAADbvTA Date: Wed, 23 Jun 2021 20:55:40 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: Authentication-Results-Original: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=arm.com; x-originating-ip: [99.132.126.10] x-ms-publictraffictype: Email X-MS-Office365-Filtering-Correlation-Id: c2b0d69f-fe77-409d-ee84-08d936894879 x-ms-traffictypediagnostic: PA4PR08MB6207:|VI1PR08MB3280: x-ms-exchange-transport-forked: True X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true nodisclaimer: true x-ms-oob-tlc-oobclassifiers: OLM:10000;OLM:10000; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 4JSHGXthm8ro+dcmonp1u8+ICofX6HBgQCppGniU6+9dm9pyLP2Jn1m2gkj8ynWAY372p+bVIRLcshnAor/gcNvSVKCeUB+VI3Qo7T7oDher8KrGQ0xQYsj/5o7myuBGalJ+UsQfXGItzLL0j5tzWxN47eBqjMSSrcyrgI0qDntfd6vh8+MnSzAlw9pRpXs6yBjYoSmf3QplLgxYdLA1/oG29dSP9b1Dhh51cBLuyLqGC3Bz7vJ3Y+TGlNime2DxTzXlMYXaaW0m5ejXNSRoP8eqqm10iWn+oOSOt/F7eVa7jI07d0uNNIgr+2E9zoI3RXIYZ2zFl5MelN9hMck6fLZ2TBLkEQdQr8w95QWzhpnQZ1RpAG+rjkjGgOBXMvhpZitmcRlmzeQHUKyBSh/Xniv6lEr4w3oO1j+8gdHuDL5kb1wBNfGl5ISVjKhKHwyePmQAw/11qCbdbxKiis2AFnfkEGFdxG3VAtqPJprOTKyV7tsCoocv1aG3MstLm0asg1HSWeEQ4fYlc0YAEvlcqBhQAmY454Dtf+rwrx6dnmNsxXRscjPPIHtYI5kQ4DbawExlmawALAMzfo9tsHUW4ECoXdBNVVhLIm0qoU8Vc5+IXYcVenluzoVBfYHs0ePyzNkoYFZZZJUZZ4XaTF/tr04H3yEIq+81U9ExdGLhgsyTPcSEtXVs5howMnAGR6dIRa6s0caSJGo5uLf6vD6hQB7ta/Nj0cFl5hUVa1Ac1iAaB+dBqwW3caQq+R9IFLRWyJjIWOuyj1somaQeTHAosQ== X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB6987.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(39850400004)(136003)(366004)(346002)(376002)(396003)(2906002)(166002)(5660300002)(26005)(71200400001)(53546011)(6506007)(186003)(8936002)(33656002)(7696005)(83380400001)(86362001)(52536014)(66946007)(8676002)(110136005)(19627235002)(55016002)(966005)(38100700002)(122000001)(76116006)(66446008)(66556008)(316002)(64756008)(478600001)(66476007)(9686003)(4326008);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?Vwx9Gf9ZGqCRmunCc8nzcbBkut+Ji6+hxaL8XLGOvR+g1ixsqAUjgKXxXi0J?= =?us-ascii?Q?kgNrsBV8bvF/tg3LMfZLlZC0ynjd/KDdPBO0j0ayAaSrpAswCTiHQhv91qut?= =?us-ascii?Q?u+plP4lOoEjKd3N3QqmUujHbr8fJbvxlEkwjv1CKnQEq7JY03pJE+8SSKFVf?= =?us-ascii?Q?ST+I3my+37T2rq6FbLrY2stYo0FknPzLv93s47CNs/b1XMyCfiotniq71jS8?= =?us-ascii?Q?tfRDWU0q1lxD3RV4Vb3Y02ypmHKFRKXlegvW7oQVWRpwe4M9p6G09AmWqWSt?= =?us-ascii?Q?XuenWzbFgdRtFkpv4JlHLxQLcJWIQe5smyVWTdCRnADsJ6ErN8HAbf8yBnQV?= =?us-ascii?Q?J8oQ31kdHPCRQhkWMOVlSrh4+E+NN/g+/y0lw78MoY/2JDcUqC1oegdO/PDi?= =?us-ascii?Q?/TpSZ+uUMvQcUoYsnMo88xlYAmxWGH4IiVSSzDSN5YeEpW66zyeDdTq8afYn?= =?us-ascii?Q?Ew/WGJR0t6CmiNaxALPfP/JpNecFu+tKLO1d2jLVgB2hKrRvXtULsozu8zIL?= =?us-ascii?Q?JDLKVMsPISLye4ldFA4acWvmb758nXL0KELYfiF4pQX/YPj0MEWEcyJAZZer?= =?us-ascii?Q?6TLKlwQDBgZiPDAwp/WETnCpRUV96ooBiJJ1mIPIyHGe9lbh6l1gCNg3ZyF8?= =?us-ascii?Q?q/wKrMALwj2E8/pvTqoZis6grz7TywxHrnNchm5h37MFfMHBnj3/At9LB/Vg?= =?us-ascii?Q?QRN+IoGkD65j3ZHIxRBwQeCQMhavKtdMkvZ/8dzrkJ16+1jJSLkReVBCAoPf?= =?us-ascii?Q?+mQeaLPGze37bho5NQjJr+5ZQut3rlP4PJ6nnT34MyW8MlvYEp31pR9sFpGs?= =?us-ascii?Q?k1OJOy1YKR19AdCbvU/aZNwHQaB5AdXFIpQ3TvYjg6qIybAmpgcLXlupKlIt?= =?us-ascii?Q?JFObnpiiX4j1HCR4TiUJywZszt8UOK2iGueL+oqun83MIV2RDOtMVh3VpIHA?= =?us-ascii?Q?XH7htxDbcCJr7jtUFEC+VWSKwFgFDkEiCtN4KLT827u+qIqwww8pC7wCeqju?= =?us-ascii?Q?PwIF80Z/8DGtsvgycZbC0yzBr+bLe8vUYo+4TUjrtPvJEIYVz1cY0rIwndAO?= =?us-ascii?Q?2KDy1N985X0CMOPB0m/GYzJjfFIQ81DNz2qjEn0fPP53nR/zkdA3AkHKXYv4?= =?us-ascii?Q?xD+05Y9/M8bjP3MPTew7Ri3EjarktT147GDm/3ydMrPcTIpbpVV1yZ+aeee+?= =?us-ascii?Q?DVmDAmrgz2+gbidgHKeCxAjqMZDVuzF7EUrO0rT6FcpdEBAxZrzQPD8xLEOo?= =?us-ascii?Q?g4Qt/eCX38bIOrMKpf/wFx4G7ZWPZzDs4icFiaKc7dTXVss7uKktuMf3hVCc?= =?us-ascii?Q?cSfnBVoid9j3c+BLBwr8Y1kM?= MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR08MB6207 Original-Authentication-Results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=arm.com; Return-Path: Samer.El-Haj-Mahmoud@arm.com X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT051.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: d7113329-dbb7-411a-9f92-08d9368942a2 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: H5ebMl15ECGxvbW0bCt72aio90B0Ymzk0gwXH1Z+W0SuXNQrWhAD8eFk421kVj1/Ibs+BZDC841b1w6TlTp9JWHnC/n6djonQHURmruWwXCajpwfNOQgMep52ZmkRgwAagZeQMu+4TOyq0GdnlBYc6oujuzpVyZiP6mAXhWHj339MENKVlBJeR31iazZDi4e08DwvlJpsSMfIhn2anpG6VN+CtPrwqxIN+eMTUAVnj9aLWfDfQL5dD6d5R81sJ7KbuJy6jerqnUMXuV4vjCZA6qeeVAai1syUWvKZ0/WfO3w5R2TOgTW+FueFrrQlPEqGRzpPCoyat8U/OuB7oMs9zyuOxVHDww4TxnFhPh29I80LPJIioYP/V5kOk+5+zjxI1P7+A2TyQjKaVTGOrRGpJguNmI69AGp0shHMfjYjBbPmU0RYt+B3ji0hjti4OVVEsZgYnPKPOtLTDRY87jnCcuAGAyZmX5IjLI8ftuDkbP8CXagPGLtSq437hR1kEsGxqWPUDcedSDNqqGfQuWwJ1wiGS9z+13L4tevJUsroOEpl7WGgzld+KZNg6dZLQdlaohZPc1H/5OcNwGZAaP9kwJH/Z485dYwVLzrwnKFSfB5m39iZnIo3DIuZ+NC5MZ+ms+X7O9xMMOtiEjIK/Oc46vCUPmRKnVgp66blnb7lkP0MRn4aF8F6I1Mq4oZAAdcXyb2GQHGXWAoFFLKc8Jh24xoNMgu98KQG3y/GFs0S/WPC/0tq8MNf1AFYrd7y7jAA66ahF0jnaIL0gtXkACWYl6LyIvayU+Q8xSJ0fo6XeHY3bz8H3Sdgs2unGv9vA2O X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(346002)(396003)(376002)(39850400004)(136003)(46966006)(36840700001)(26005)(81166007)(316002)(166002)(336012)(30864003)(110136005)(8676002)(186003)(36860700001)(47076005)(53546011)(70206006)(19627235002)(70586007)(6506007)(52536014)(356005)(33656002)(83380400001)(82310400003)(55016002)(2906002)(966005)(9686003)(82740400003)(7696005)(86362001)(4326008)(5660300002)(478600001)(8936002);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Jun 2021 20:55:50.3925 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: c2b0d69f-fe77-409d-ee84-08d936894879 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT051.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3280 Content-Language: en-US Content-Type: multipart/alternative; boundary="_000_PAXPR08MB6987B7B9B53F3AB76184CECB90089PAXPR08MB6987eurp_" --_000_PAXPR08MB6987B7B9B53F3AB76184CECB90089PAXPR08MB6987eurp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable +edk2 list I am not against adding additional test tools to edk2-test. Just feel like = there is a need to organize and have a strategy, rather than just use edk2-= test as a dumping group of miscellaneous tools. There is already a place for apps under https://github.com/tianocore/edk2/t= ree/master/MdeModulePkg/Application We also have a number of EDK2 misc applications that use edk2-libc in https= ://github.com/tianocore/edk2-libc/tree/master/AppPkg/Applications A couple of questions: * Do you expect more apps from WinTestPkg to be contributed to TianoCor= e? And are they all around testing specific Windows requirements? If so, th= en having an edk2-test/WinTestPkg makes sense to me, as you will have a col= lection of useful testing app targeting specific area. * But what about other OSes? * If this is a one-off test app and other WinTestPkg apps are not going= to be contributed, then does it make sense to put this under MdeModulePkg/= Application ? From: Nelson, Eric Sent: Wednesday, June 23, 2021 3:10 PM To: G Edhaya Chandran ; gaojie@byosoft.com.cn Cc: Samer El-Haj-Mahmoud Subject: RE: Proposing a new area of the edk2-test repository Hi Edhay, Do you have any more questions? What do you think of creating another directory in edk2-test, for other tes= t apps, in addition to uefi-sct, such as ResumeOK.efi? Thanks, __e From: Nelson, Eric Sent: Tuesday, June 15, 2021 12:00 PM To: G Edhaya Chandran >; gaojie@byosoft.com.cn Cc: Samer El-Haj-Mahmoud > Subject: RE: Proposing a new area of the edk2-test repository Hi Edhay, ResumeOK.efi is a tool I wrote from the HelloWorld example, that validates = Windows resume from S4 requirements, specifically that the memory-map run-t= ime memory regions don't change, and secondly that PCI devices don't disapp= ear from the system, both conditions would cause Windows to fail to resume = from S4. You install the tool to the root of the ESP, and set it as the default/top = entry in the boot manager, and launch it. (Disable Secure Boot.) It runs warm, cold, and 60s ACPI RTC wake cycles, infinitely looking for er= rors. ResumeOK.efi writes a file to the root of the ESP, ResumeOK.map, which cont= ains the ACPI Facs->HardwareSignature, a list of the PCI devices in the sys= tem, and a copy of its memory map, from the first time it runs. During each test pass, it runs a barrage of tests: 1. Free memory test - does the available memory match the memory map sav= ed in ResumeOK.map 2. HW signature check - does the system still have the same HW signature= as saved in the ResumeOK.map 3. Allocation test - all the available memory is allocated, and then the= memory map is checked if the run-time regions match ResumeOK.map. If any of the tests fail, then the new/missing PCI devices are listed (HW s= ignature fail case), or the memory descriptor that changed, it's location, = and current and previous type and size. I have received permission from Intel to *try* to release the source under = Edk2-test. I've included a 64-bit binary, if you want to give it a test drive. Make sure Secure Boot is off. Also, it is required to manually delete any ResumeOK.map on the ESP, before= beginning a new test pass. The tool also supports a host of EFI Shell commands: Resumeok.efi MEMMAP - displays Windows coalesced view of the current memory= map ResumeOK.efi ROKMAP - displays Windows coalesced view of the memory saved i= n ResumeOK.map ResumeOK.efi RTDATA - displays an analysis of RT_Data pool usage ResumeOK.efi NORESET - run one test pass, but suppress automatic SX cycling These are the files that build it: Edk2\WinTestPkg\Application Edk2\WinTestPkg\WinTestPkg.dec Edk2\WinTestPkg\WinTestPkg.dsc Edk2\WinTestPkg\Application\ResumeOK Edk2\WinTestPkg\Application\ResumeOK\AcpiTbl.c Edk2\WinTestPkg\Application\ResumeOK\AcpiTbl.h Edk2\WinTestPkg\Application\ResumeOK\AppSupport.c Edk2\WinTestPkg\Application\ResumeOK\BitMap.c Edk2\WinTestPkg\Application\ResumeOK\BitMap.h Edk2\WinTestPkg\Application\ResumeOK\EfiFileLib.c Edk2\WinTestPkg\Application\ResumeOK\EfiFileLib.h Edk2\WinTestPkg\Application\ResumeOK\pci.c Edk2\WinTestPkg\Application\ResumeOK\Pci.h Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.c Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.h Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.inf Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.uni Edk2\WinTestPkg\Application\ResumeOK\ResumeOKExtra.uni Edk2\WinTestPkg\Application\ResumeOK\RtData.c Edk2\WinTestPkg\Application\ResumeOK\TimeBaseLib.c Thanks, __e From: G Edhaya Chandran > Sent: Monday, June 14, 2021 9:36 PM To: Nelson, Eric >; gao= jie@byosoft.com.cn Cc: Samer El-Haj-Mahmoud > Subject: RE: Proposing a new area of the edk2-test repository Hi Eric, Thanks for reaching out to us. Can we get more details of the tool? Is this tool already open sourced or could you send us the basic documentat= ion pertaining to it. With Warm Regards, Edhay From: Nelson, Eric > Sent: 15 June 2021 04:23 To: gaojie@byosoft.com.cn; G Edhaya Chandran = > Subject: Proposing a new area of the edk2-test repository Hello SCT maintainers, I'm looking to release source to a UEFI validation tool that has been a big= hit with platform BIOS validation teams, so it can help other PC vendors. My coworker Michael Kinney suggested I reach out to you directly about the = idea of creating a new top level directory in the edk2-test repro for other= test apps, and I could be maintainer. What do you think of creating another directory in edk2-test, for other tes= t apps, in addition to uefi-sct? Thanks! __e IMPORTANT NOTICE: The contents of this email and any attachments are confid= ential and may also be privileged. If you are not the intended recipient, p= lease notify the sender immediately and do not disclose the contents to any= other person, use it for any purpose, or store or copy the information in = any medium. Thank you. IMPORTANT NOTICE: The contents of this email and any attachments are confid= ential and may also be privileged. If you are not the intended recipient, p= lease notify the sender immediately and do not disclose the contents to any= other person, use it for any purpose, or store or copy the information in = any medium. Thank you. --_000_PAXPR08MB6987B7B9B53F3AB76184CECB90089PAXPR08MB6987eurp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

+edk2 list

 

I am not against adding additional test tools to edk= 2-test. Just feel like there is a need to organize and have a strategy, rat= her than just use edk2-test as a dumping group of miscellaneous tools.=

 

There is already a place for apps under https://github.com/tianocore/edk2/tree/master/MdeModulePkg/Application<= o:p>

 

We also have a number of EDK2 misc applications that= use edk2-libc in https://github.com/tianocore/edk2-libc/tree/master/AppPkg/Applications<= o:p>

 

A couple of questions:

  • Do you expect more apps from WinTestPkg to be contributed to TianoCor= e? And are they all around testing specific Windows requirements? If so, th= en having an edk2-test/WinTestPkg makes sense to me, as you will have a collection of useful testing app targeting= specific area.
    • But what about other OSes?
  • If this is a one-off test app and other WinTestPkg apps are not going= to be contributed, then does it make sense to put this under MdeModulePkg/= Application ?

 

 

 

From: Nelson, Eric <eric.nelson@intel.com&= gt;
Sent: Wednesday, June 23, 2021 3:10 PM
To: G Edhaya Chandran <Edhaya.Chandran@arm.com>; gaojie@byosof= t.com.cn
Cc: Samer El-Haj-Mahmoud <Samer.El-Haj-Mahmoud@arm.com>
Subject: RE: Proposing a new area of the edk2-test repository

 

 

Hi Edhay,

 

Do you have any more questions?

What do you think of creating another directory in e= dk2-test, for other test apps, in addition to uefi-sct, such as ResumeOK.ef= i?

 

Thanks,

__e

 

 

From: Nelson, Eric
Sent: Tuesday, June 15, 2021 12:00 PM
To: G Edhaya Chandran <Edhaya.Chandran@arm.com>; gaojie@byosoft.com.cn
Cc: Samer El-Haj-Mahmoud <Samer.El-Haj-Mahmoud@arm.com>
Subject: RE: Proposing a new area of the edk2-test repository

 

 

Hi Edhay,

 

ResumeOK.efi is a tool I wrote from the HelloWorld e= xample, that validates Windows resume from S4 requirements, specifically th= at the memory-map run-time memory regions don’t change, and secondly = that PCI devices don’t disappear from the system, both conditions would cause Windows to fail to resume from S4.

 

You install the tool to the root of the ESP, and set= it as the default/top entry in the boot manager, and launch it.  (Dis= able Secure Boot.)

 

It runs warm, cold, and 60s ACPI RTC wake cycles, in= finitely looking for errors.

 

ResumeOK.efi writes a file to the root of the ESP, R= esumeOK.map, which contains the ACPI Facs->HardwareSignature, a list of = the PCI devices in the system, and a copy of its memory map, from the first= time it runs.

 

During each test pass, it runs a barrage of tests:

 

  1. Free memory test – does the available memory match the memory m= ap saved in ResumeOK.map
  2. HW signature check – do= es the system still have the same HW signature as saved in the ResumeOK.map=
  3. Allocation test – all the available memory is a= llocated, and then the memory map is checked if the run-time regions match = ResumeOK.map.

 

If any of the tests fail, then the new/missing PCI d= evices are listed (HW signature fail case), or the memory descriptor that c= hanged, it’s location, and current and previous type and size.

 

I have received permission from Intel to *try= * to release the source under Edk2-test.

 

I’ve included a 64-bit binary, if you want to = give it a test drive.

 

Make sure Secure Boot is off.

Also, it is required to manually delete any ResumeOK= .map on the ESP, before beginning a new test pass.

 

The tool also supports a host of EFI Shell commands:=

 

Resumeok.efi MEMMAP ̵= 1; displays Windows coalesced view of the current memory map

ResumeOK.efi ROKMAP ̵= 1; displays Windows coalesced view of the memory saved in ResumeOK.map=

ResumeOK.efi RTDATA ̵= 1; displays an analysis of RT_Data pool usage

ResumeOK.efi NORESET R= 11; run one test pass, but suppress automatic SX cycling

 

These are the files that build it:

 

Edk2\WinTestPkg\Application

Edk2\WinTestPkg\WinTestPkg.dec

Edk2\WinTestPkg\WinTestPkg.dsc

Edk2\WinTestPkg\Application\ResumeOK

Edk2\WinTestPkg\Application\ResumeOK\AcpiTbl.c<= /o:p>

Edk2\WinTestPkg\Application\ResumeOK\AcpiTbl.h<= /o:p>

Edk2\WinTestPkg\Application\ResumeOK\AppSupport.c

Edk2\WinTestPkg\Application\ResumeOK\BitMap.c

Edk2\WinTestPkg\Application\ResumeOK\BitMap.h

Edk2\WinTestPkg\Application\ResumeOK\EfiFileLib.c

Edk2\WinTestPkg\Application\ResumeOK\EfiFileLib.h

Edk2\WinTestPkg\Application\ResumeOK\pci.c

Edk2\WinTestPkg\Application\ResumeOK\Pci.h

Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.c=

Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.h=

Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.inf

Edk2\WinTestPkg\Application\ResumeOK\ResumeOK.uni

Edk2\WinTestPkg\Application\ResumeOK\ResumeOKExtra.u= ni

Edk2\WinTestPkg\Application\ResumeOK\RtData.c

Edk2\WinTestPkg\Application\ResumeOK\TimeBaseLib.c

 

Thanks,

__e

 

 

From: G Edhaya Chandran <Edhaya.Chandran@arm.com>
Sent: Monday, June 14, 2021 9:36 PM
To: Nelson, Eric <eric.n= elson@intel.com>; gaojie@byosoft.com.cn
Cc: Samer El-Haj-Mahmoud <Samer.El-Haj-Mahmoud@arm.com>
Subject: RE: Proposing a new area of the edk2-test repository

 

Hi Eric,

 

    Thanks for reaching out to us.

Can we get more details of the tool?

 

Is this tool already open sourced or could you send = us the basic documentation pertaining to it.

 

With Warm Regards,
Edhay

 

 

From: Nelson, Eric <eric.nelson@intel.com>
Sent: 15 June 2021 04:23
To: gaojie@byosoft.com.cn; G Edhaya Chandran <Edhaya= .Chandran@arm.com>
Subject: Proposing a new area of the edk2-test repository=

 

 

Hello SCT maintainers,

 

I’m looking to release source to a UEFI valida= tion tool that has been a big hit with platform BIOS validation teams, so i= t can help other PC vendors.

 

My coworker Michael Kinney suggested I reach out to = you directly about the idea of creating a new top level directory in the ed= k2-test repro for other test apps, and I could be maintainer.

 

What do you think of creating another directory in e= dk2-test, for other test apps, in addition to uefi-sct?

 

Thanks!

__e

 

IMPORTANT NOTICE: The contents of this email and any= attachments are confidential and may also be privileged. If you are not th= e intended recipient, please notify the sender immediately and do not discl= ose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Th= ank you.

IMPORTANT NOTICE: The contents of this email and any attachments are confid= ential and may also be privileged. If you are not the intended recipient, p= lease notify the sender immediately and do not disclose the contents to any= other person, use it for any purpose, or store or copy the information in any medium. Thank you. --_000_PAXPR08MB6987B7B9B53F3AB76184CECB90089PAXPR08MB6987eurp_--