From nobody Sat May 18 18:58:09 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+90389+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+90389+1787277+3901457@groups.io ARC-Seal: i=1; a=rsa-sha256; t=1654770440; cv=none; d=zohomail.com; s=zohoarc; b=CSyt4duD70QSS6wylLgNpm0Znwgx+3bwNM0jBEkMzkV1JmMg8gNab2vj6eqeCX1ksA4FZWqC1lswNI2DKBndwv72COGp+03rLAg262x5wEz7lBvgHv2ayYaMWbeYsK5XtHmqibhILgPj71d41GkZoDJ0YEDXA1L3LdanskU8nP0= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1654770440; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=W/37nrYPhHZpswl2UafQOolqchSCOsP9Sdu8QL+V56s=; b=UA9KKajz9sIG7NUNw1O8TTkp3l2Sxt+xMDma1S6zj+kQNMBcDgYFa/gTQt0ecrwhfQdhXr9UoM5N9pExEAwcUC2pzpL9DzzcNWmr4UYFF82ia/TQ6qQ8S38/kyKIL7zsFK1umcT1JgNJCpR9+rb6c9bWoN/7+mChEWsUMdOAftg= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+90389+1787277+3901457@groups.io Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 165477044023818.86739317646095; Thu, 9 Jun 2022 03:27:20 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id DegwYY1788612x7k0qoH4BQz; Thu, 09 Jun 2022 03:27:19 -0700 X-Received: from mail-pl1-f173.google.com (mail-pl1-f173.google.com [209.85.214.173]) by mx.groups.io with SMTP id smtpd.web08.9579.1654770439224106162 for ; Thu, 09 Jun 2022 03:27:19 -0700 X-Received: by mail-pl1-f173.google.com with SMTP id t2so19912304pld.4 for ; Thu, 09 Jun 2022 03:27:19 -0700 (PDT) X-Gm-Message-State: 0GiaMQVOBkA8r0P8Y2PI1X2Ax1787277AA= X-Google-Smtp-Source: ABdhPJxCI0tKvXWf/zccVTO4OK6K8shSQgd1EyCFoTKFQFqy1WsS6n43qp7sv0sjXrCNzma/MTELOQ== X-Received: by 2002:a17:902:ce88:b0:163:dbd5:9797 with SMTP id f8-20020a170902ce8800b00163dbd59797mr38835188plg.82.1654770438610; Thu, 09 Jun 2022 03:27:18 -0700 (PDT) X-Received: from kerodipc.Dlink ([49.206.9.238]) by smtp.gmail.com with ESMTPSA id e5-20020a170902784500b00163f8eb7eb3sm16994168pln.196.2022.06.09.03.27.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 09 Jun 2022 03:27:18 -0700 (PDT) From: "Sunil V L" To: devel@edk2.groups.io Cc: Sunil V L , G Edhaya Chandran , Barton Gao , Carolyn Gjertsen , Samer El-Haj-Mahmoud , Eric Jin , Arvin Chen , Supreeth Venkatesh , Ard Biesheuvel , Heinrich Schuchardt , Abner Chang Subject: [edk2-devel] [PATCH 1/5] uefi-sct/SctPkg: Add header file for RISCV_EFI_BOOT_PROTOCOL Date: Thu, 9 Jun 2022 15:57:05 +0530 Message-Id: <20220609102709.957985-2-sunilvl@ventanamicro.com> In-Reply-To: <20220609102709.957985-1-sunilvl@ventanamicro.com> References: <20220609102709.957985-1-sunilvl@ventanamicro.com> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sunilvl@ventanamicro.com Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1654770439; bh=plnR+NbQhdTkYwo3wWQX4J+JYwWzABZDKjl580vpZmc=; h=Cc:Date:From:Reply-To:Subject:To; b=OLsg04tp4biKM5qcfbXl88wAaO6ZZ6KEL0A6m7Eh3xqAq5pwvm5GUYm/5AO9J6ekZd0 ThC6wtq/De8l01L9/jdpH7+d/T1zhdVr/hZ/fOIt2ABqa9az+kOfVz4IiuRpDDKqTzD+S gB2/BYwzs6w5Dmw373teMSeLU73kmHMNmQw= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1654770442166100005 Content-Type: text/plain; charset="utf-8" REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3837 RISC-V platforms need to support new RISCV_EFI_BOOT_PROTOCOL to communicate the boot hart ID to the operating system. Add the required header file for this protocol. The specification of the protocol is maintained at: https://github.com/riscv-non-isa/riscv-uefi Cc: G Edhaya Chandran Cc: Barton Gao Cc: Carolyn Gjertsen Cc: Samer El-Haj-Mahmoud Cc: Eric Jin Cc: Arvin Chen Cc: Supreeth Venkatesh Cc: Ard Biesheuvel Cc: Heinrich Schuchardt Cc: Abner Chang Signed-off-by: Sunil V L Reviewed-by: Heinrich Schuchardt Tested-by: Heinrich Schuchardt Reviewed-by: G Edhaya Chandran --- uefi-sct/SctPkg/UEFI/Protocol/RiscVBoot.h | 72 +++++++++++++++++++++++ 1 file changed, 72 insertions(+) create mode 100644 uefi-sct/SctPkg/UEFI/Protocol/RiscVBoot.h diff --git a/uefi-sct/SctPkg/UEFI/Protocol/RiscVBoot.h b/uefi-sct/SctPkg/UE= FI/Protocol/RiscVBoot.h new file mode 100644 index 00000000..71367425 --- /dev/null +++ b/uefi-sct/SctPkg/UEFI/Protocol/RiscVBoot.h @@ -0,0 +1,72 @@ +/** @file + + Copyright (c) 2022, Ventana Micro Systems Inc. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ +/*++ + +Module Name: + + RiscVBoot.h + +Abstract: + + This UEFI protocol for RISC-V systems provides early information to the = bootloaders or Operating + Systems. Firmwares like EDK2/u-boot need to implement this protocol on R= ISC-V UEFI systems. +--*/ + +#ifndef _RISCV_BOOT_H_ +#define _RISCV_BOOT_H_ + + +// +// Global ID for the RISC-V Boot Protocol +// +#define RISCV_EFI_BOOT_PROTOCOL_GUID \ + { 0xccd15fec, 0x6f73, 0x4eec, { 0x83, 0x95, 0x3e, 0x69, 0xe4, 0xb9, 0x40,= 0xbf } } + +typedef struct _RISCV_EFI_BOOT_PROTOCOL RISCV_EFI_BOOT_PROTOCOL; + +typedef +EFI_STATUS +(EFIAPI *EFI_GET_BOOT_HARTID) ( + IN RISCV_EFI_BOOT_PROTOCOL *This, + OUT UINTN *BootHartId + ) +/*++ + + Routine Description: + This interface provides the hartid of the boot cpu. + + Arguments: + This - Protocol instance pointer. + BootHartId - Pointer to the variable receiving the hartid of the bo= ot cpu. + + Returns: + EFI_SUCCESS - The boot hart id could be returned. + EFI_INVALID_PARAMETER - This parameter is NULL or does not point to a = valid + RISCV_EFI_BOOT_PROTOCOL implementation. + EFI_INVALID_PARAMETER - BootHartId parameter is NULL. + +--*/ +; + +// +// Interface structure for the RISC-V Boot Protocol +// +struct _RISCV_EFI_BOOT_PROTOCOL { + UINTN Revision; + EFI_GET_BOOT_HARTID GetBootHartId; +}; + +extern EFI_GUID gBlackBoxEfiRiscVBootProtocolGuid; + +#endif --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#90389): https://edk2.groups.io/g/devel/message/90389 Mute This Topic: https://groups.io/mt/91642395/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sat May 18 18:58:09 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+90390+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+90390+1787277+3901457@groups.io ARC-Seal: i=1; a=rsa-sha256; t=1654770444; cv=none; d=zohomail.com; s=zohoarc; b=Vp9eKL3H5guuLMrM8Rav9qRWBFrMxq6TuDrvyhsiWbzq7Zry4eG0LP9m/vGXzjr4/nqV2I4fSU1hH5Gjdbn4+NmJcUO2JphsFNFKQ3oO0RidcPz6V1gam+cf+ueowER2ahdTG6oZ/+Ma8FKENxv4XL2uTid8s+wCf58vMW8KNOw= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1654770444; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=gm+aYMOFBkCIHeipY9PYV3EuXCByHwY5HqZTeIfPMd8=; b=LW97c/SCOazqhKWXNJtTCQnfyJlgmtAE7nee872S8vCOptPNKZO9inMgmc0HPobb7+aSnTdujBWCaNb4ODfz8t4WFTTZaGZY5/4sYcrbQ9GG8HIkRP3/yREhIvvp67WfSQmraYY/u74V7dHcmNgDhT9mLWgm/MYy+LwLPBiuBoY= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+90390+1787277+3901457@groups.io Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1654770444634876.5249686166593; Thu, 9 Jun 2022 03:27:24 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id hT2qYY1788612xMAl7oqgNc3; Thu, 09 Jun 2022 03:27:23 -0700 X-Received: from mail-pj1-f44.google.com (mail-pj1-f44.google.com [209.85.216.44]) by mx.groups.io with SMTP id smtpd.web11.9529.1654770443183515665 for ; Thu, 09 Jun 2022 03:27:23 -0700 X-Received: by mail-pj1-f44.google.com with SMTP id u12-20020a17090a1d4c00b001df78c7c209so26314609pju.1 for ; Thu, 09 Jun 2022 03:27:23 -0700 (PDT) X-Gm-Message-State: kVeTyeobd6ejlRRkoKWRm9E7x1787277AA= X-Google-Smtp-Source: ABdhPJxzVjxZwGwHOQ6CSW4bFIj7BCYv8b1mdysqlheetdu1RWO+3Vb8SBCei2wa4Ws95qLgtdH4Zw== X-Received: by 2002:a17:902:d2c9:b0:163:bdee:b2df with SMTP id n9-20020a170902d2c900b00163bdeeb2dfmr39102730plc.98.1654770442387; Thu, 09 Jun 2022 03:27:22 -0700 (PDT) X-Received: from kerodipc.Dlink ([49.206.9.238]) by smtp.gmail.com with ESMTPSA id e5-20020a170902784500b00163f8eb7eb3sm16994168pln.196.2022.06.09.03.27.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 09 Jun 2022 03:27:22 -0700 (PDT) From: "Sunil V L" To: devel@edk2.groups.io Cc: Sunil V L , G Edhaya Chandran , Barton Gao , Carolyn Gjertsen , Samer El-Haj-Mahmoud , Eric Jin , Arvin Chen , Supreeth Venkatesh , Ard Biesheuvel , Heinrich Schuchardt , Abner Chang Subject: [edk2-devel] [PATCH 2/5] uefi-sct/SctPkg: Add test cases for RISCV_EFI_BOOT_PROTOCOL Date: Thu, 9 Jun 2022 15:57:06 +0530 Message-Id: <20220609102709.957985-3-sunilvl@ventanamicro.com> In-Reply-To: <20220609102709.957985-1-sunilvl@ventanamicro.com> References: <20220609102709.957985-1-sunilvl@ventanamicro.com> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sunilvl@ventanamicro.com Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1654770443; bh=wfbPaUt8b66U8NPsyQ4M3OrUMrAoV7FqmoYgJJIn6I4=; h=Cc:Date:From:Reply-To:Subject:To; b=prRApdC4zMViBrw3wfTgY9c5Bg9ecdMjEDhKX+jjLSeZToccYt/0J2kcoP8c+Kbm+TM 0kbpy8HChHAGTU83B84k4iLe+/vw1qz3UBNeadHxfgCVT1iJV+yWdK/Go4EyDuLwZTK1W Cvx+OYQmod1IwVu+Lkq80KbBHVyeJ9XIzdc= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1654770446195100001 Content-Type: text/plain; charset="utf-8" REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3837 RISC-V platforms need to support new RISCV_EFI_BOOT_PROTOCOL to communicate the boot hart ID to the operating system. Add the required test cases for this protocol. The specification of the protocol is maintained at: https://github.com/riscv-non-isa/riscv-uefi The test case specification is attached in the Bugzilla. Cc: G Edhaya Chandran Cc: Barton Gao Cc: Carolyn Gjertsen Cc: Samer El-Haj-Mahmoud Cc: Eric Jin Cc: Arvin Chen Cc: Supreeth Venkatesh Cc: Ard Biesheuvel Cc: Heinrich Schuchardt Cc: Abner Chang Signed-off-by: Sunil V L Reviewed-by: Heinrich Schuchardt Tested-by: Heinrich Schuchardt Reviewed-by: G Edhaya Chandran --- .../EFI/Protocol/RiscV/BlackBoxTest/Guid.c | 38 ++++ .../EFI/Protocol/RiscV/BlackBoxTest/Guid.h | 50 +++++ .../BlackBoxTest/RiscVBootProtocolBBTest.inf | 50 +++++ .../RiscVBootProtocolBBTestConformance.c | 171 ++++++++++++++++++ .../RiscVBootProtocolBBTestFunction.c | 124 +++++++++++++ .../RiscVBootProtocolBBTestMain.c | 122 +++++++++++++ .../RiscVBootProtocolBBTestMain.h | 112 ++++++++++++ 7 files changed, 667 insertions(+) create mode 100644 uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackB= oxTest/Guid.c create mode 100644 uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackB= oxTest/Guid.h create mode 100644 uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackB= oxTest/RiscVBootProtocolBBTest.inf create mode 100644 uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackB= oxTest/RiscVBootProtocolBBTestConformance.c create mode 100644 uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackB= oxTest/RiscVBootProtocolBBTestFunction.c create mode 100644 uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackB= oxTest/RiscVBootProtocolBBTestMain.c create mode 100644 uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackB= oxTest/RiscVBootProtocolBBTestMain.h diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/= Guid.c b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/Guid= .c new file mode 100644 index 00000000..693f5a9f --- /dev/null +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/Guid.c @@ -0,0 +1,38 @@ +/** @file + + Copyright (c) 2022, Ventana Micro Systems Inc. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ +/*++ + + Module Name: + + Guid.c + + Abstract: + + GUIDs auto-generated for EFI test assertion. + +--*/ + +#include "Efi.h" +#include "Guid.h" + + +EFI_GUID gGetBootHartIdBBTestConformanceAssertionGuid001 =3D EFI_TEST_RISC= V_BOOT_PROTOCOL_BBTESTCONFORMANCE_ASSERTION_001_GUID; + +EFI_GUID gGetBootHartIdBBTestConformanceAssertionGuid002 =3D EFI_TEST_RISC= V_BOOT_PROTOCOL_BBTESTCONFORMANCE_ASSERTION_002_GUID; + +EFI_GUID gGetBootHartIdBBTestConformanceAssertionGuid003 =3D EFI_TEST_RISC= V_BOOT_PROTOCOL_BBTESTCONFORMANCE_ASSERTION_003_GUID; + +EFI_GUID gGetBootHartIdBBTestFunctionAssertionGuid001 =3D EFI_TEST_RISCV_B= OOT_PROTOCOL_BBTESTFUNCTION_ASSERTION_001_GUID; + +EFI_GUID gGetBootHartIdBBTestFunctionAssertionGuid002 =3D EFI_TEST_RISCV_B= OOT_PROTOCOL_BBTESTFUNCTION_ASSERTION_002_GUID; diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/= Guid.h b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/Guid= .h new file mode 100644 index 00000000..bf527072 --- /dev/null +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/Guid.h @@ -0,0 +1,50 @@ +/** @file + + Copyright (c) 2022, Ventana Micro Systems Inc. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ +/*++ + + Module Name: + + Guid.h + + Abstract: + + GUIDs auto-generated for EFI test assertion. + +--*/ + + +#define EFI_TEST_RISCV_BOOT_PROTOCOL_BBTESTCONFORMANCE_ASSERTION_001_GUID \ +{ 0x5ccf7e22, 0x5ca1, 0x433c, { 0x97, 0xb4, 0xea, 0x3a, 0xb8, 0x49, 0xf7, = 0x03 } } + +extern EFI_GUID gGetBootHartIdBBTestConformanceAssertionGuid001; + +#define EFI_TEST_RISCV_BOOT_PROTOCOL_BBTESTCONFORMANCE_ASSERTION_002_GUID \ +{ 0xa07c08ba, 0x8581, 0x477a, { 0x85, 0xe2, 0x69, 0x88, 0xa5, 0xb3, 0xd4, = 0xec } } + +extern EFI_GUID gGetBootHartIdBBTestConformanceAssertionGuid002; + +#define EFI_TEST_RISCV_BOOT_PROTOCOL_BBTESTCONFORMANCE_ASSERTION_003_GUID \ +{ 0x00b63b3a, 0xd91d, 0x4175, { 0x8c, 0xee, 0xf9, 0xca, 0x63, 0xf5, 0x84, = 0x1c } } + +extern EFI_GUID gGetBootHartIdBBTestConformanceAssertionGuid003; + +#define EFI_TEST_RISCV_BOOT_PROTOCOL_BBTESTFUNCTION_ASSERTION_001_GUID \ +{ 0xe3a8b4a8, 0x866c, 0x4513, { 0x86, 0xb3, 0x61, 0x1d, 0x02, 0x52, 0x2f, = 0x81 } } + +extern EFI_GUID gGetBootHartIdBBTestFunctionAssertionGuid001; + +#define EFI_TEST_RISCV_BOOT_PROTOCOL_BBTESTFUNCTION_ASSERTION_002_GUID \ +{ 0x8fbbf9d8, 0x0ab2, 0x481d, { 0xb5, 0xe0, 0x5f, 0x29, 0x99, 0xd3, 0xcb, = 0x34 } } + +extern EFI_GUID gGetBootHartIdBBTestFunctionAssertionGuid002; diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/= RiscVBootProtocolBBTest.inf b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/Ri= scV/BlackBoxTest/RiscVBootProtocolBBTest.inf new file mode 100644 index 00000000..fc1f3aba --- /dev/null +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/RiscVBo= otProtocolBBTest.inf @@ -0,0 +1,50 @@ +## @file +# +# Copyright (c) 2022, Ventana Micro Systems Inc. All rights reserved.
+# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may = be found at +# http://opensource.org/licenses/bsd-license.php +# +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +# +## +#/*++ +# +# Module Name: +# +# RiscVBootProtocolBBTest.inf +# +# Abstract: +# +# Component description file for RISC-V Boot Protocol Black-Box Test. +# +#--*/ + +[defines] + INF_VERSION =3D 0x00010005 + BASE_NAME =3D RiscVBootProtocolBBTest + FILE_GUID =3D DC33F790-D1EE-41A7-A114-1DF84FF7110B + MODULE_TYPE =3D UEFI_DRIVER + VERSION_STRING =3D 1.0 + ENTRY_POINT =3D InitializeBBTestRiscVBootProtocol + +[sources.common] + RiscVBootProtocolBBTestConformance.c + RiscVBootProtocolBBTestFunction.c + RiscVBootProtocolBBTestMain.c + Guid.c + +[Packages] + MdePkg/MdePkg.dec + SctPkg/SctPkg.dec + SctPkg/UEFI/UEFI.dec + +[LibraryClasses] + UefiDriverEntryPoint + SctLib + EfiTestLib + +[Protocols] diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/= RiscVBootProtocolBBTestConformance.c b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Pr= otocol/RiscV/BlackBoxTest/RiscVBootProtocolBBTestConformance.c new file mode 100644 index 00000000..a7d498a9 --- /dev/null +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/RiscVBo= otProtocolBBTestConformance.c @@ -0,0 +1,171 @@ +/** @file + + Copyright (c) 2022, Ventana Micro Systems Inc. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ +/*++ + +Module Name: + RiscVBootProtocolBBTestConformance.c + +Abstract: + for EFI Driver RISC-V Boot Protocol's Conformance Test + +--*/ +#include "SctLib.h" +#include "RiscVBootProtocolBBTestMain.h" + + +EFI_STATUS +BBTestGetBootHartIdConformanceTest ( + IN EFI_BB_TEST_PROTOCOL *This, + IN VOID *ClientInterface, + IN EFI_TEST_LEVEL TestLevel, + IN EFI_HANDLE SupportHandle + ) +{ + EFI_STANDARD_TEST_LIBRARY_PROTOCOL *StandardLib; + EFI_STATUS Status; + RISCV_EFI_BOOT_PROTOCOL *RiscVBoot; + + // + // init + // + RiscVBoot =3D (RISCV_EFI_BOOT_PROTOCOL*)ClientInterface; + + // + // Get the Standard Library Interface + // + Status =3D gtBS->HandleProtocol ( + SupportHandle, + &gEfiStandardTestLibraryGuid, + (VOID **) &StandardLib + ); + if (EFI_ERROR(Status)) { + return Status; + } + + BBTestGetBootHartIdConformanceTestCheckpoint1 (StandardLib, RiscVBoot); + + BBTestGetBootHartIdConformanceTestCheckpoint2 (StandardLib, RiscVBoot); + + BBTestGetBootHartIdConformanceTestCheckpoint3 (StandardLib, RiscVBoot); + + return EFI_SUCCESS; +} + +EFI_STATUS +BBTestGetBootHartIdConformanceTestCheckpoint1 ( + IN EFI_STANDARD_TEST_LIBRARY_PROTOCOL *StandardLib, + IN RISCV_EFI_BOOT_PROTOCOL *RiscVBoot + ) +{ + EFI_STATUS Status; + EFI_TEST_ASSERTION AssertionType; + UINTN hartid; + + // + // with "This" pointer being NULL. + // + Status =3D RiscVBoot->GetBootHartId ( + NULL, + &hartid + ); + if (EFI_INVALID_PARAMETER =3D=3D Status) { + AssertionType =3D EFI_TEST_ASSERTION_PASSED; + } else { + AssertionType =3D EFI_TEST_ASSERTION_FAILED; + } + StandardLib->RecordAssertion ( + StandardLib, + AssertionType, + gGetBootHartIdBBTestConformanceAssertionGuid001, + L"RISCV_EFI_BOOT_PROTOCOL - GetBootHartId() returns EFI_I= NVALID_PARAMETER with This pointer as NULL.", + L"%a:%d: Status - %r", + __FILE__, + (UINTN)__LINE__, + Status + ); + + return EFI_SUCCESS; +} + +EFI_STATUS +BBTestGetBootHartIdConformanceTestCheckpoint2 ( + IN EFI_STANDARD_TEST_LIBRARY_PROTOCOL *StandardLib, + IN RISCV_EFI_BOOT_PROTOCOL *RiscVBoot + ) +{ + EFI_STATUS Status; + EFI_TEST_ASSERTION AssertionType; + UINTN hartid; + RISCV_EFI_BOOT_PROTOCOL protocol; + + // + // with "This" pointer being some thing other than located protocol. + // + Status =3D RiscVBoot->GetBootHartId ( + &protocol, + &hartid + ); + if (EFI_INVALID_PARAMETER =3D=3D Status) { + AssertionType =3D EFI_TEST_ASSERTION_PASSED; + } else { + AssertionType =3D EFI_TEST_ASSERTION_FAILED; + } + StandardLib->RecordAssertion ( + StandardLib, + AssertionType, + gGetBootHartIdBBTestConformanceAssertionGuid001, + L"RISCV_EFI_BOOT_PROTOCOL - GetBootHartId() returns EFI_I= NVALID_PARAMETER with invalid This pointer.", + L"%a:%d: Status - %r", + __FILE__, + (UINTN)__LINE__, + Status + ); + + return EFI_SUCCESS; +} + +EFI_STATUS +BBTestGetBootHartIdConformanceTestCheckpoint3 ( + IN EFI_STANDARD_TEST_LIBRARY_PROTOCOL *StandardLib, + IN RISCV_EFI_BOOT_PROTOCOL *RiscVBoot + ) +{ + EFI_STATUS Status; + EFI_TEST_ASSERTION AssertionType; + + // + // with BootHartId as NULL pointer. + // + Status =3D RiscVBoot->GetBootHartId ( + RiscVBoot, + NULL + ); + if (EFI_INVALID_PARAMETER =3D=3D Status) { + AssertionType =3D EFI_TEST_ASSERTION_PASSED; + } else { + AssertionType =3D EFI_TEST_ASSERTION_FAILED; + } + StandardLib->RecordAssertion ( + StandardLib, + AssertionType, + gGetBootHartIdBBTestConformanceAssertionGuid001, + L"RISCV_EFI_BOOT_PROTOCOL - GetBootHartId() returns EFI_I= NVALID_PARAMETER with NULL BootHartId pointer.", + L"%a:%d: Status - %r", + __FILE__, + (UINTN)__LINE__, + Status + ); + + return EFI_SUCCESS; +} diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/= RiscVBootProtocolBBTestFunction.c b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Proto= col/RiscV/BlackBoxTest/RiscVBootProtocolBBTestFunction.c new file mode 100644 index 00000000..c991223e --- /dev/null +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/RiscVBo= otProtocolBBTestFunction.c @@ -0,0 +1,124 @@ +/** @file + + Copyright (c) 2022, Ventana Micro Systems Inc. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ +/*++ + +Module Name: + RiscVBootProtocolBBTestFunction.c + +Abstract: + for EFI Driver RISC-V Boot Protocol's function Test + +--*/ +#include "SctLib.h" +#include "RiscVBootProtocolBBTestMain.h" + +EFI_STATUS +BBTestGetBootHartIdFunctionTest ( + IN EFI_BB_TEST_PROTOCOL *This, + IN VOID *ClientInterface, + IN EFI_TEST_LEVEL TestLevel, + IN EFI_HANDLE SupportHandle + ) +{ + EFI_STANDARD_TEST_LIBRARY_PROTOCOL *StandardLib; + EFI_STATUS Status; + RISCV_EFI_BOOT_PROTOCOL *RiscVBoot; + + // + // init + // + RiscVBoot =3D (RISCV_EFI_BOOT_PROTOCOL*)ClientInterface; + + // + // Get the Standard Library Interface + // + Status =3D gtBS->HandleProtocol ( + SupportHandle, + &gEfiStandardTestLibraryGuid, + (VOID **) &StandardLib + ); + if (EFI_ERROR(Status)) { + return Status; + } + + BBTestGetBootHartIdFunctionTestCheckpoint1 (StandardLib, RiscVBoot); + + return EFI_SUCCESS; +} + + +EFI_STATUS +BBTestGetBootHartIdFunctionTestCheckpoint1 ( + IN EFI_STANDARD_TEST_LIBRARY_PROTOCOL *StandardLib, + IN RISCV_EFI_BOOT_PROTOCOL *RiscVBoot + ) +{ + EFI_STATUS Status; + EFI_TEST_ASSERTION AssertionType; + UINTN hartid1 =3D 0xdead; + UINTN hartid2 =3D 0xbeef; + + + // + // with correct This and BoothartId pointers. + // + + Status =3D RiscVBoot->GetBootHartId ( + RiscVBoot, + &hartid1 + ); + if (EFI_SUCCESS =3D=3D Status) { + AssertionType =3D EFI_TEST_ASSERTION_PASSED; + } else { + AssertionType =3D EFI_TEST_ASSERTION_FAILED; + } + StandardLib->RecordAssertion ( + StandardLib, + AssertionType, + gGetBootHartIdBBTestFunctionAssertionGuid001, + L"RISCV_EFI_BOOT_PROTOCOL.GetBootHartId - GetBootHartId()= returns EFI_SUCCESS with valid parameters.", + L"%a:%d: Status - %r", + __FILE__, + (UINTN)__LINE__, + Status + ); + // + // call again with correct This and BoothartId pointers to ensure hartid= is not changed. + // + + Status =3D RiscVBoot->GetBootHartId ( + RiscVBoot, + &hartid2 + ); + if (EFI_SUCCESS =3D=3D Status) { + AssertionType =3D EFI_TEST_ASSERTION_PASSED; + if (hartid1 !=3D hartid2) { + AssertionType =3D EFI_TEST_ASSERTION_FAILED; + } + } else { + AssertionType =3D EFI_TEST_ASSERTION_FAILED; + } + StandardLib->RecordAssertion ( + StandardLib, + AssertionType, + gGetBootHartIdBBTestFunctionAssertionGuid002, + L"RISCV_EFI_BOOT_PROTOCOL.GetBootHartId - GetBootHartId()= returned same hartid when called twice.", + L"%a:%d: Status - %r", + __FILE__, + (UINTN)__LINE__, + Status + ); + return EFI_SUCCESS; + + } diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/= RiscVBootProtocolBBTestMain.c b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/= RiscV/BlackBoxTest/RiscVBootProtocolBBTestMain.c new file mode 100644 index 00000000..f7ecf020 --- /dev/null +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/RiscVBo= otProtocolBBTestMain.c @@ -0,0 +1,122 @@ +/** @file + + Copyright (c) 2022, Ventana Micro Systems Inc. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ +/*++ + +Module Name: + + RiscVBootBBTestMain.c + +Abstract: + + Test Driver of RISC-V Boot Protocol + +--*/ + +#include "SctLib.h" +#include "RiscVBootProtocolBBTestMain.h" + +#define RISCV_EFI_BOOT_PROTOCOL_TEST_REVISION 0x00010000 + +// +// Global variables +// + +EFI_HANDLE mImageHandle; + + +EFI_BB_TEST_PROTOCOL_FIELD gBBTestProtocolField =3D { + RISCV_EFI_BOOT_PROTOCOL_TEST_REVISION, + RISCV_EFI_BOOT_PROTOCOL_GUID, + L"RISC-V Boot Protocol Test", + L"UEFI RISC-V Boot Protocol Black-Box Test" +}; + +EFI_GUID gSupportProtocolGuid[] =3D { + EFI_STANDARD_TEST_LIBRARY_GUID, + EFI_NULL_GUID +}; + +EFI_BB_TEST_ENTRY_FIELD gBBTestEntryField[] =3D { + { + RISCV_EFI_BOOT_PROTOCOL_TEST_ENTRY_GUID0101, + L"GetBootHartIdFunction", + L"Function test for RISC-V Boot Protocol GetBootHartId().", + EFI_TEST_LEVEL_MINIMAL, + gSupportProtocolGuid, + EFI_TEST_CASE_AUTO, + BBTestGetBootHartIdFunctionTest + }, + { + RISCV_EFI_BOOT_PROTOCOL_TEST_ENTRY_GUID0201, + L"GetBootHartIdConformance", + L"Conformance test for RISC-V Boot Protocol GetBootHartId().", + EFI_TEST_LEVEL_MINIMAL, + gSupportProtocolGuid, + EFI_TEST_CASE_AUTO, + BBTestGetBootHartIdConformanceTest + }, + 0 +}; + +EFI_BB_TEST_PROTOCOL *gBBTestProtocolInterface; + +// +// Unload function +// + +EFI_STATUS +EFIAPI +UnloadBBTestRiscVBootProtocol ( + IN EFI_HANDLE ImageHandle + ); + + +EFI_STATUS +EFIAPI +InitializeBBTestRiscVBootProtocol ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ) +{ + EfiInitializeTestLib (ImageHandle, SystemTable); + + // + // initialize test utility lib + // + + SctInitializeLib (ImageHandle, SystemTable); + + mImageHandle =3D ImageHandle; + + return EfiInitAndInstallBBTestInterface ( + &ImageHandle, + &gBBTestProtocolField, + gBBTestEntryField, + UnloadBBTestRiscVBootProtocol, + &gBBTestProtocolInterface + ); +} + + +EFI_STATUS +EFIAPI +UnloadBBTestRiscVBootProtocol ( + IN EFI_HANDLE ImageHandle + ) +{ + return EfiUninstallAndFreeBBTestInterface ( + ImageHandle, + gBBTestProtocolInterface + ); +} diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/= RiscVBootProtocolBBTestMain.h b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/= RiscV/BlackBoxTest/RiscVBootProtocolBBTestMain.h new file mode 100644 index 00000000..d9dc4018 --- /dev/null +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/RiscVBo= otProtocolBBTestMain.h @@ -0,0 +1,112 @@ +/** @file + + Copyright (c) 2022, Ventana Micro Systems Inc. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. + +**/ +/*++ + +Module Name: + + RiscVBootProtocolBBTestMain.h + +Abstract: + + Test Driver of RISC-V Boot Protocol header file + +--*/ + +#ifndef _RISCV_BOOT_PROTOCOL_BB_TEST_MAIN_H +#define _RISCV_BOOT_PROTOCOL_BB_TEST_MAIN_H + + +#include "Efi.h" +#include +#include +#include "Guid.h" + + +// +// One private signature +// +#define UEFI_SCTT_TABLE_SIGNATURE EFI_SIGNATURE_32 ('S', 'C', 'T', 'T') + +// +// Entry GUIDs for Func Test +// +#define RISCV_EFI_BOOT_PROTOCOL_TEST_ENTRY_GUID0101 \ +{0xa17fc0c9, 0x82d8, 0x499f, { 0x81, 0x03, 0xe1, 0x3c, 0x7d, 0x08, 0xed, 0= x57 } } + +// +// Entry GUIDs for Conf Test +// +#define RISCV_EFI_BOOT_PROTOCOL_TEST_ENTRY_GUID0201 \ +{0x69378fba, 0x4f73, 0x4632, { 0xad, 0x1e, 0x5b, 0x1c, 0x18, 0x84, 0x99, 0= x88 } } + + + +EFI_STATUS +EFIAPI +InitializeBBTestRiscVBootProtocol ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ); + +EFI_STATUS +EFIAPI +UnloadBBTestRiscVBootProtocol ( + IN EFI_HANDLE ImageHandle + ); + +// +// Prototypes: Test Cases +// + +EFI_STATUS +BBTestGetBootHartIdConformanceTest ( + IN EFI_BB_TEST_PROTOCOL *This, + IN VOID *ClientInterface, + IN EFI_TEST_LEVEL TestLevel, + IN EFI_HANDLE SupportHandle + ); + +EFI_STATUS +BBTestGetBootHartIdConformanceTestCheckpoint1 ( + IN EFI_STANDARD_TEST_LIBRARY_PROTOCOL *StandardLib, + IN RISCV_EFI_BOOT_PROTOCOL *RiscVBoot + ); + +EFI_STATUS +BBTestGetBootHartIdConformanceTestCheckpoint2 ( + IN EFI_STANDARD_TEST_LIBRARY_PROTOCOL *StandardLib, + IN RISCV_EFI_BOOT_PROTOCOL *RiscVBoot + ); + +EFI_STATUS +BBTestGetBootHartIdConformanceTestCheckpoint3 ( + IN EFI_STANDARD_TEST_LIBRARY_PROTOCOL *StandardLib, + IN RISCV_EFI_BOOT_PROTOCOL *RiscVBoot + ); + +EFI_STATUS +BBTestGetBootHartIdFunctionTest ( + IN EFI_BB_TEST_PROTOCOL *This, + IN VOID *ClientInterface, + IN EFI_TEST_LEVEL TestLevel, + IN EFI_HANDLE SupportHandle + ); + +EFI_STATUS +BBTestGetBootHartIdFunctionTestCheckpoint1 ( + IN EFI_STANDARD_TEST_LIBRARY_PROTOCOL *StandardLib, + IN RISCV_EFI_BOOT_PROTOCOL *RiscVBoot + ); + +#endif --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#90390): https://edk2.groups.io/g/devel/message/90390 Mute This Topic: https://groups.io/mt/91642396/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sat May 18 18:58:09 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+90391+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+90391+1787277+3901457@groups.io ARC-Seal: i=1; a=rsa-sha256; t=1654770447; cv=none; d=zohomail.com; s=zohoarc; b=ZzHRVwLLNMC1pshbcayEI8aqNMzXBirlQg2Kw9556zKdUyq04ND/jOBZP8uSoj0IKwV0SsGQ5XeizdqCUEvsUEvVHA18Esfnc+lR89XXyebFZXAuuO527ukU2p5QKcCfg6SWhtrTg2woLh8MQA79zACWWi0NenPectF/2Ux9HQU= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1654770447; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=2mSeDfrsDjzYaCCs4lM/hZ8laiJ+faSMBLBZTbtHiHE=; b=BmPfVCi6VNcEtFJWszoVR38w96rdsr2ZaxwkQZeA+83lse5YsYeQZ1Zm7hsmf03fBq7MlhtApYcMtPBBSG0NYCEzJENY0pXLuf4ZzgVhzKEVNFCj0rtMsZ9kdjjrdF0hYNrq67iXD04bidbQHY5oHy5elgnnkFVhAGPSHSckV2g= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+90391+1787277+3901457@groups.io Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1654770447539423.14016230600623; Thu, 9 Jun 2022 03:27:27 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id dPz3YY1788612xdV0dIQ01Dc; Thu, 09 Jun 2022 03:27:27 -0700 X-Received: from mail-pj1-f43.google.com (mail-pj1-f43.google.com [209.85.216.43]) by mx.groups.io with SMTP id smtpd.web08.9581.1654770446585823448 for ; Thu, 09 Jun 2022 03:27:26 -0700 X-Received: by mail-pj1-f43.google.com with SMTP id e24so21027482pjt.0 for ; Thu, 09 Jun 2022 03:27:26 -0700 (PDT) X-Gm-Message-State: E2ZpXMhw30sCPXe8M7T2BCfLx1787277AA= X-Google-Smtp-Source: ABdhPJxp1dpSF9EyUWjFf1GTLSOGmKJyguuk2eEhHXis5xxaTbAAzGfpi/cn7sFd7bwARDZwAGfk/A== X-Received: by 2002:a17:902:d653:b0:163:78e0:552f with SMTP id y19-20020a170902d65300b0016378e0552fmr38987837plh.63.1654770445989; Thu, 09 Jun 2022 03:27:25 -0700 (PDT) X-Received: from kerodipc.Dlink ([49.206.9.238]) by smtp.gmail.com with ESMTPSA id e5-20020a170902784500b00163f8eb7eb3sm16994168pln.196.2022.06.09.03.27.22 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 09 Jun 2022 03:27:25 -0700 (PDT) From: "Sunil V L" To: devel@edk2.groups.io Cc: Sunil V L , G Edhaya Chandran , Barton Gao , Carolyn Gjertsen , Samer El-Haj-Mahmoud , Eric Jin , Arvin Chen , Supreeth Venkatesh , Ard Biesheuvel , Heinrich Schuchardt , Abner Chang Subject: [edk2-devel] [PATCH 3/5] uefi-sct/SctPkg: Build test cases of RISCV_EFI_BOOT_PROTOCOL Date: Thu, 9 Jun 2022 15:57:07 +0530 Message-Id: <20220609102709.957985-4-sunilvl@ventanamicro.com> In-Reply-To: <20220609102709.957985-1-sunilvl@ventanamicro.com> References: <20220609102709.957985-1-sunilvl@ventanamicro.com> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sunilvl@ventanamicro.com Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1654770447; bh=vlXONw0VcZkxjoGQM59PEy+x6u3orHC0q5hN5YLOgKg=; h=Cc:Date:From:Reply-To:Subject:To; b=VAOGD8EH2JNvgnHji1lZfeoOhU/7zMbvby4bpp3spE8mHwQlRGqqHJUG2qVgOkGB/et PVT5Lxh5+yjQNd2hdfrAmuz/PecZ92818nTd9ahHwFA9AXrsIeVZO1i7UC0nLplTrx9Bu 2EBJoKCVAw/gwDM7GcIND2nj61a0pMMn9eo= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1654770448172100007 Content-Type: text/plain; charset="utf-8" REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3837 Enable building test cases of RISCV_EFI_BOOT_PROTOCOL as part of SCT build. Cc: G Edhaya Chandran Cc: Barton Gao Cc: Carolyn Gjertsen Cc: Samer El-Haj-Mahmoud Cc: Eric Jin Cc: Arvin Chen Cc: Supreeth Venkatesh Cc: Ard Biesheuvel Cc: Heinrich Schuchardt Cc: Abner Chang Signed-off-by: Sunil V L Reviewed-by: Heinrich Schuchardt Tested-by: Heinrich Schuchardt Reviewed-by: G Edhaya Chandran --- uefi-sct/SctPkg/UEFI/UEFI.dec | 1 + uefi-sct/SctPkg/UEFI/UEFI_SCT.dsc | 3 +++ 2 files changed, 4 insertions(+) diff --git a/uefi-sct/SctPkg/UEFI/UEFI.dec b/uefi-sct/SctPkg/UEFI/UEFI.dec index e8f04e96..8f9578a1 100644 --- a/uefi-sct/SctPkg/UEFI/UEFI.dec +++ b/uefi-sct/SctPkg/UEFI/UEFI.dec @@ -193,3 +193,4 @@ gBlackBoxEfiPartitionInfoProtocolGuid =3D { 0x8cf2f62c, 0xbc9b, 0x4821, = {0x80, 0x8d, 0xec, 0x9e, 0xc4, 0x21, 0xa1, 0xa0 }} gBlackBoxEfiUFSDeviceConfigProtocolGuid =3D { 0xb81bfab0, 0xeb3, 0x4cf9,= { 0x84, 0x65, 0x7f, 0xa9, 0x86, 0x36, 0x16, 0x64 }} gBlackBoxEfiResetNotificationProtocolGuid =3D { 0x9da34ae0, 0xeaf9, 0x4b= bf, { 0x8e, 0xc3, 0xfd, 0x60, 0x22, 0x6c, 0x44, 0xbe }} + gBlackBoxEfiRiscVBootProtocolGuid =3D { 0xccd15fec, 0x6f73, 0x4eec, { 0x= 83, 0x95, 0x3e, 0x69, 0xe4, 0xb9, 0x40, 0xbf }} diff --git a/uefi-sct/SctPkg/UEFI/UEFI_SCT.dsc b/uefi-sct/SctPkg/UEFI/UEFI_= SCT.dsc index 5b3e5307..88d7a317 100644 --- a/uefi-sct/SctPkg/UEFI/UEFI_SCT.dsc +++ b/uefi-sct/SctPkg/UEFI/UEFI_SCT.dsc @@ -498,3 +498,6 @@ SctPkg/TestCase/RIVL/Protocol/Http/HttpServiceBinding/H= ttpServiceBindingENTSTest =20 [Components.IA32, Components.X64] SctPkg/TestCase/UEFI/EFI/Generic/ExeMode/BlackBoxTest/ExeModeBBTest.inf + +[Components.RISCV64] +SctPkg/TestCase/UEFI/EFI/Protocol/RiscV/BlackBoxTest/RiscVBootProtocolBBTe= st.inf --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#90391): https://edk2.groups.io/g/devel/message/90391 Mute This Topic: https://groups.io/mt/91642398/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sat May 18 18:58:09 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+90392+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+90392+1787277+3901457@groups.io ARC-Seal: i=1; a=rsa-sha256; t=1654770451; cv=none; d=zohomail.com; s=zohoarc; b=YJg4IFz3g3nGcp1wb52oC4H/gp/Bn+G8mQXRIKTbOK1Li8fUN+ccJ0mjPzf5Hu8AyWKQ9tba90rSeSNeHl2EGbXM3y4T1R38dqeNXeuFp77VEYEc4Z8/cws6vPWBpPHPF46K/WfjOP7FABRmvV3QzJK7p3+bnvNaLDDnOjcqhG0= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1654770451; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=3UTkJFG9Sl79krBwKRO1Qoq3fNhzBACuQEkdGjSFsHw=; b=hbLp7moIoWEOJEEcCBXiIXwiH+5eQd/emuRQ+iVP+AhaHjvBxumXBppYkj2flpWI7Y96NGRBdsiQqOzAwkNsrFE9+a6f3t5iNQZnlvUissDKBT1k05hA/pSq67I3yStRYkGdvc24MRT6s/vXzZ9OJBcQz/n1xYfOX2FlatmXXWM= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+90392+1787277+3901457@groups.io Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1654770451115734.7029896894627; Thu, 9 Jun 2022 03:27:31 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id iZqcYY1788612xsWkaii8smF; Thu, 09 Jun 2022 03:27:30 -0700 X-Received: from mail-pl1-f179.google.com (mail-pl1-f179.google.com [209.85.214.179]) by mx.groups.io with SMTP id smtpd.web11.9533.1654770450259969706 for ; Thu, 09 Jun 2022 03:27:30 -0700 X-Received: by mail-pl1-f179.google.com with SMTP id i1so19903812plg.7 for ; Thu, 09 Jun 2022 03:27:30 -0700 (PDT) X-Gm-Message-State: rfMB3ayveNZk5RQhDzIjPuB9x1787277AA= X-Google-Smtp-Source: ABdhPJzXeNw5vQCHqA1Y5jnU6kmx6VR9m9J2pWH+r9F9RXSuW4NUtP38UQdUnMnaoZ/uR+UQ/HNaNQ== X-Received: by 2002:a17:90b:4b90:b0:1e8:48bd:453 with SMTP id lr16-20020a17090b4b9000b001e848bd0453mr2746639pjb.86.1654770449677; Thu, 09 Jun 2022 03:27:29 -0700 (PDT) X-Received: from kerodipc.Dlink ([49.206.9.238]) by smtp.gmail.com with ESMTPSA id e5-20020a170902784500b00163f8eb7eb3sm16994168pln.196.2022.06.09.03.27.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 09 Jun 2022 03:27:29 -0700 (PDT) From: "Sunil V L" To: devel@edk2.groups.io Cc: Sunil V L , G Edhaya Chandran , Barton Gao , Carolyn Gjertsen , Samer El-Haj-Mahmoud , Eric Jin , Arvin Chen , Supreeth Venkatesh , Ard Biesheuvel , Heinrich Schuchardt , Abner Chang Subject: [edk2-devel] [PATCH 4/5] uefi-sct/SctPkg: Install RISCV_EFI_BOOT_PROTOCOL test module Date: Thu, 9 Jun 2022 15:57:08 +0530 Message-Id: <20220609102709.957985-5-sunilvl@ventanamicro.com> In-Reply-To: <20220609102709.957985-1-sunilvl@ventanamicro.com> References: <20220609102709.957985-1-sunilvl@ventanamicro.com> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sunilvl@ventanamicro.com Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1654770450; bh=D60Q7ByFVSSK/MJjb5lFFTgjNS68lVozm3zQ1MUQf90=; h=Cc:Date:From:Reply-To:Subject:To; b=EchUufjCgucNlxr5hAK7XZnYV2s7lCkGz1SGbJnM81U18ESVabp6f9OS+vlNvQjGZRs DZ6mnYphiebf5Y6EWsJnGSa28RkqWOywYKSfptSeskYvQd0Ll+8QAErGx83DCuOoAOG8V 9oDcQdlr2+WpfO1rJz/6/s5kvzJzfp9j1m8= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1654770452192100001 Content-Type: text/plain; charset="utf-8" REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3837 Enable installing the RISCV_EFI_BOOT_PROTOCOL test cases into the SCT directory. Cc: G Edhaya Chandran Cc: Barton Gao Cc: Carolyn Gjertsen Cc: Samer El-Haj-Mahmoud Cc: Eric Jin Cc: Arvin Chen Cc: Supreeth Venkatesh Cc: Ard Biesheuvel Cc: Heinrich Schuchardt Cc: Abner Chang Signed-off-by: Sunil V L Reviewed-by: Heinrich Schuchardt Tested-by: Heinrich Schuchardt Reviewed-by: G Edhaya Chandran --- uefi-sct/SctPkg/CommonGenFramework.sh | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/uefi-sct/SctPkg/CommonGenFramework.sh b/uefi-sct/SctPkg/Common= GenFramework.sh index 779a6a44..fb9043b5 100755 --- a/uefi-sct/SctPkg/CommonGenFramework.sh +++ b/uefi-sct/SctPkg/CommonGenFramework.sh @@ -222,6 +222,10 @@ then cp $ProcessorType/PartitionInfoBBTest.efi $Framework/= Test/ > NUL cp $ProcessorType/UFSDeviceConfigBBTest.efi $Framework/= Test/ > NUL cp $ProcessorType/ResetNotificationBBTest.efi $Framework/= Test/ > NUL + # Only include RiscVBootProtocolBBTest.efi if the file exists (true on= RISCV64) + if [ -e $ProcessorType/RiscVBootProtocolBBTest.efi ]; then + cp $ProcessorType/RiscVBootProtocolBBTest.efi $Framewor= k/Test/ > NUL + fi =20 # ********************************************* # Copy ENTS binary --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#90392): https://edk2.groups.io/g/devel/message/90392 Mute This Topic: https://groups.io/mt/91642400/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sat May 18 18:58:09 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+90393+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+90393+1787277+3901457@groups.io ARC-Seal: i=1; a=rsa-sha256; t=1654770454; cv=none; d=zohomail.com; s=zohoarc; b=Llkq38sh/wJPa+28jdPt9EHvJqdVns/4SUpc07MHYympsQrIbxjHVXENkupxmRcL6GxMaFdROMKy1iSQY55z+5Ux/pnXahrail6VuikNSqsmlFbShr7MOy6Z9N8SA/e4/102w2xqVyyYTA9j9OaS9vjneXt2CHYOwM3oLWKv5c4= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1654770454; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=ej1ame/I9DboewlJ5PCdo3QMq4XJUi9aiZxl3UAu5xc=; b=Nyt+/o6rjO6/T4BPW1H/5yoalFNJbA5Y6peaM+DM55xqwvh2VhuAZOehsY9ax3bfKsG7MBEZSVrWuVR+U65NAvIFdSHtDOhz7ogRoVY0+HYuXogwl8W8Las8ynTVPh466SVp6azgAWXWrTBuSEQFo9Lduvzvf6+vueVoFlik2Rk= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+90393+1787277+3901457@groups.io Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1654770454670754.0740637527383; Thu, 9 Jun 2022 03:27:34 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id f51pYY1788612xdZNLpqHr4J; Thu, 09 Jun 2022 03:27:34 -0700 X-Received: from mail-pg1-f180.google.com (mail-pg1-f180.google.com [209.85.215.180]) by mx.groups.io with SMTP id smtpd.web08.9582.1654770453861036609 for ; Thu, 09 Jun 2022 03:27:33 -0700 X-Received: by mail-pg1-f180.google.com with SMTP id y187so21464289pgd.3 for ; Thu, 09 Jun 2022 03:27:33 -0700 (PDT) X-Gm-Message-State: RNOnfNOtMjcRdi71kVRPbQEjx1787277AA= X-Google-Smtp-Source: ABdhPJwNg4O5fMeDN2XO41SGm2JBL3WhqePjrGjSxnsHQjWlP2E1tAo5vkeHrwrT+RSeYTYHditGfg== X-Received: by 2002:a63:340b:0:b0:3fd:c66:eb40 with SMTP id b11-20020a63340b000000b003fd0c66eb40mr29338177pga.288.1654770453310; Thu, 09 Jun 2022 03:27:33 -0700 (PDT) X-Received: from kerodipc.Dlink ([49.206.9.238]) by smtp.gmail.com with ESMTPSA id e5-20020a170902784500b00163f8eb7eb3sm16994168pln.196.2022.06.09.03.27.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 09 Jun 2022 03:27:32 -0700 (PDT) From: "Sunil V L" To: devel@edk2.groups.io Cc: Sunil V L , G Edhaya Chandran , Barton Gao , Carolyn Gjertsen , Samer El-Haj-Mahmoud , Eric Jin , Arvin Chen , Supreeth Venkatesh , Ard Biesheuvel , Heinrich Schuchardt , Abner Chang Subject: [edk2-devel] [PATCH 5/5] uefi-sct/SctPkg: Add a category for RISCV_EFI_BOOT_PROTOCOL Date: Thu, 9 Jun 2022 15:57:09 +0530 Message-Id: <20220609102709.957985-6-sunilvl@ventanamicro.com> In-Reply-To: <20220609102709.957985-1-sunilvl@ventanamicro.com> References: <20220609102709.957985-1-sunilvl@ventanamicro.com> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sunilvl@ventanamicro.com Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1654770454; bh=e0F1FDIUrQxcnleO4yO0+ZvW3e5GeCwCiQJu+cQclcQ=; h=Cc:Date:From:Reply-To:Subject:To; b=VzeFaC7F28Nu80Zb2fDU5rEIhn3LwTWKeu16ZTiQXiyzbUgvjrM4ReBzvQOETkQ20hW 7gp1YVhtXgNh/JpgaZyMTft+3fLfM/1afrLONSBl269sqKQitcKnL0W6dMFMJOXXktOk2 L7R6osxanZp4h6HFw+AP/46pboLLSE3ZKY8= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1654770456273100002 Content-Type: text/plain; charset="utf-8" REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3837 Provide a name for the GUID of RISCV_EFI_BOOT_PROTOCOL in the SCT. Cc: G Edhaya Chandran Cc: Barton Gao Cc: Carolyn Gjertsen Cc: Samer El-Haj-Mahmoud Cc: Eric Jin Cc: Arvin Chen Cc: Supreeth Venkatesh Cc: Ard Biesheuvel Cc: Heinrich Schuchardt Cc: Abner Chang Signed-off-by: Sunil V L Reviewed-by: Heinrich Schuchardt Tested-by: Heinrich Schuchardt Reviewed-by: G Edhaya Chandran --- uefi-sct/SctPkg/Config/Data/Category.ini | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/uefi-sct/SctPkg/Config/Data/Category.ini b/uefi-sct/SctPkg/Con= fig/Data/Category.ini index af27e362..70058577 100644 --- a/uefi-sct/SctPkg/Config/Data/Category.ini +++ b/uefi-sct/SctPkg/Config/Data/Category.ini @@ -1026,3 +1026,9 @@ InterfaceGuid =3D 8D59D32B-C655-4AE9-9B15-F25904992A43 Name =3D IHV\ConsoleSupportTest\AbsolutePointerProtocolTest Description =3D Absolute Pointer Protocol Test on IHV Drivers =20 +[Category Data] +Revision =3D 0x00010000 +CategoryGuid =3D CCD15FEC-6F73-4EEC-8395-3E69E4B940BF +InterfaceGuid =3D CCD15FEC-6F73-4EEC-8395-3E69E4B940BF +Name =3D RiscvBootProtocolTest +Description =3D RISC-V Boot Protocol Test --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#90393): https://edk2.groups.io/g/devel/message/90393 Mute This Topic: https://groups.io/mt/91642401/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-