From 9072d1557289bad16f37f8c9eb0809069bec1892 Mon Sep 17 00:00:00 2001 From: chetan-rathore Date: Wed, 6 Nov 2024 00:10:18 +0530 Subject: [PATCH 1/4] Deprecate 32-bit support --- .../fwts_build_dep-arm/include/bsd/string.h | 107 -- ...-what-we-use-to-test-EBBR-on-32b-arm.patch | 1587 ----------------- common/scripts/build-fwts-arm.sh | 141 -- common/scripts/build-uefi-apps-arm.sh | 112 -- common/sct-tests/sbbr-tests/BBR_SCT_arm.dsc | 619 ------- common/sct-tests/sbbr-tests/build_bbr_arm.sh | 326 ---- ebbr/config/EBBR-arm.seq | Bin 171574 -> 0 bytes 7 files changed, 2892 deletions(-) delete mode 100644 common/fwts_build_dep-arm/include/bsd/string.h delete mode 100644 common/patches/0001-Build-only-what-we-use-to-test-EBBR-on-32b-arm.patch delete mode 100755 common/scripts/build-fwts-arm.sh delete mode 100755 common/scripts/build-uefi-apps-arm.sh delete mode 100755 common/sct-tests/sbbr-tests/BBR_SCT_arm.dsc delete mode 100755 common/sct-tests/sbbr-tests/build_bbr_arm.sh delete mode 100755 ebbr/config/EBBR-arm.seq diff --git a/common/fwts_build_dep-arm/include/bsd/string.h b/common/fwts_build_dep-arm/include/bsd/string.h deleted file mode 100644 index 3ce28a1..0000000 --- a/common/fwts_build_dep-arm/include/bsd/string.h +++ /dev/null @@ -1,107 +0,0 @@ -#ifndef LIBBSD_STRING_H -#define LIBBSD_STRING_H - -#include -#include -/* $OpenBSD: strlcpy.c,v 1.12 2015/01/15 03:54:12 millert Exp $ */ - -/* - * Copyright (c) 1998, 2015 Todd C. Miller - * - * Permission to use, copy, modify, and distribute this software for any - * purpose with or without fee is hereby granted, provided that the above - * copyright notice and this permission notice appear in all copies. - * - * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES - * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF - * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR - * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES - * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN - * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF - * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. - */ - -/* - * Copy string src to buffer dst of size dsize. At most dsize-1 - * chars will be copied. Always NUL terminates (unless dsize == 0). - * Returns strnlen(src); if retval >= dsize, truncation occurred. - */ -static inline size_t -strlcpy(char *dst, const char *src, size_t dsize) -{ - const char *osrc = src; - size_t nleft = dsize; - - /* Copy as many bytes as will fit. */ - if (nleft != 0) { - while (--nleft != 0) { - if ((*dst++ = *src++) == '\0') - break; - } - } - - /* Not enough room in dst, add NUL and traverse rest of src. */ - if (nleft == 0) { - if (dsize != 0) - *dst = '\0'; /* NUL-terminate dst */ - while (*src++) - ; - } - - return(src - osrc - 1); /* count does not include NUL */ -} - -/* $OpenBSD: strlcat.c,v 1.15 2015/03/02 21:41:08 millert Exp $ */ - -/* - * Copyright (c) 1998, 2015 Todd C. Miller - * - * Permission to use, copy, modify, and distribute this software for any - * purpose with or without fee is hereby granted, provided that the above - * copyright notice and this permission notice appear in all copies. - * - * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES - * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF - * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR - * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES - * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN - * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF - * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. - */ - -/* - * Appends src to string dst of size dsize (unlike strncat, dsize is the - * full size of dst, not space left). At most dsize-1 characters - * will be copied. Always NUL terminates (unless dsize <= strnlen(dst)). - * Returns strnlen(src) + MIN(dsize, strnlen(initial dst)). - * If retval >= dsize, truncation occurred. - */ -static inline size_t -strlcat(char *dst, const char *src, size_t dsize) -{ - const char *odst = dst; - const char *osrc = src; - size_t n = dsize; - size_t dlen; - - /* Find the end of dst and adjust bytes left but don't go past end. */ - while (n-- != 0 && *dst != '\0') - dst++; - dlen = dst - odst; - n = dsize - dlen; - - if (n-- == 0) - return(dlen + strnlen(src,dsize-1)); - while (*src != '\0') { - if (n != 0) { - *dst++ = *src; - n--; - } - src++; - } - *dst = '\0'; - - return(dlen + (src - osrc)); /* count does not include NUL */ -} - -#endif diff --git a/common/patches/0001-Build-only-what-we-use-to-test-EBBR-on-32b-arm.patch b/common/patches/0001-Build-only-what-we-use-to-test-EBBR-on-32b-arm.patch deleted file mode 100644 index cf6e0b9..0000000 --- a/common/patches/0001-Build-only-what-we-use-to-test-EBBR-on-32b-arm.patch +++ /dev/null @@ -1,1587 +0,0 @@ -From 1541f83e0215d574b1c2e3b872febb4b20280d63 Mon Sep 17 00:00:00 2001 -From: =?UTF-8?q?Vincent=20Stehl=C3=A9?= -Date: Mon, 3 Oct 2022 15:35:30 +0200 -Subject: [PATCH] Build only what we use to test EBBR on 32b arm -MIME-Version: 1.0 -Content-Type: text/plain; charset=UTF-8 -Content-Transfer-Encoding: 8bit - -Simplify the build and reduce the dependencies to build for 32b arm, to -test for EBBR. -We remove all ACPI related and all the other features necessitating -external dependencies. We do still depend on BSD strlcpy() and strlcat(), -though. -Also, we enable UEFI support for arm 32b where necessary and we fix the EFI -status width to be in sync with the architecture instead of hardcoding to -64b. - -Signed-off-by: Vincent Stehlé ---- - configure.ac | 2 - - src/Makefile.am | 177 +---------------------- - src/lib/include/fwts.h | 6 + - src/lib/include/fwts_efi_runtime.h | 22 +-- - src/lib/include/fwts_uefi.h | 6 +- - src/lib/src/Makefile.am | 35 +---- - src/lib/src/fwts_fileio.c | 38 ----- - src/lib/src/fwts_framework.c | 1 - - src/lib/src/fwts_uefi.c | 10 +- - src/uefi/securebootcert/securebootcert.c | 2 +- - src/uefi/uefirtauthvar/uefirtauthvar.c | 34 ++--- - src/uefi/uefirtmisc/uefirtmisc.c | 16 +- - src/uefi/uefirttime/uefirttime.c | 58 ++++---- - src/uefi/uefirtvariable/uefirtvariable.c | 90 ++++++------ - src/uefi/uefivarinfo/uefivarinfo.c | 14 +- - 15 files changed, 143 insertions(+), 368 deletions(-) - -diff --git a/configure.ac b/configure.ac -index f40c3678..8e0d5b49 100644 ---- a/configure.ac -+++ b/configure.ac -@@ -98,8 +98,6 @@ - AC_CONFIG_FILES([ - Makefile - src/Makefile -- src/libfwtsiasl/Makefile -- src/libfwtsacpica/Makefile - src/lib/Makefile - src/lib/src/Makefile - src/utilities/Makefile -diff --git a/src/Makefile.am b/src/Makefile.am -index 9a26af86..71549d34 100644 ---- a/src/Makefile.am -+++ b/src/Makefile.am -@@ -1,18 +1,10 @@ --# Must build in this order: --# 1. acpica/source/compiler --# 2. lib --# 3. acpica --# ... because the libs in this bundled acpica/ depend on lib/ (libfwts.so), --# but libfwts.so depends on libraries produced by acpica/source/compiler. --SUBDIRS = libfwtsiasl lib libfwtsacpica -+SUBDIRS = lib - - AM_CPPFLAGS = \ - -I$(top_srcdir)/src/lib/include \ -- -I$(top_srcdir)/src/acpica/source/include \ -- -I$(top_srcdir)/src/acpica/source/compiler \ - -I$(top_srcdir)/efi_runtime \ - -I$(top_srcdir)/smccc_test \ -- -pthread `pkg-config --cflags glib-2.0 gio-2.0` \ -+ -pthread \ - -Wall -Werror -Wextra \ - -Wno-address-of-packed-member \ - -Wfloat-equal -Wmissing-declarations \ -@@ -23,173 +15,22 @@ AM_CPPFLAGS = \ - - bin_PROGRAMS = fwts - --fwts_CPPFLAGS = $(AM_CPPFLAGS) -DACPI_DEBUG_OUTPUT -+fwts_CPPFLAGS = $(AM_CPPFLAGS) - - if HAVE_LIBFDT - dt_tests = \ - devicetree/dt_base/dt_base.c \ - devicetree/dt_sysinfo/dt_sysinfo.c --mem_tests = \ -- opal/mem_info.c \ -- opal/reserv_mem.c --cpu_tests = \ -- opal/cpu_info.c --power_mgmt_tests = \ -- opal/power_mgmt_info.c --endif -- --if HAVE_LIBFDT --if HAVE_LIBPCI --pci_tests = \ -- opal/pci_info.c --endif - endif - - # - # fwts main + tests - # - fwts_SOURCES = main.c \ -- acpi/ac_adapter/ac_adapter.c \ -- acpi/acpidump/acpidump.c \ -- acpi/acpiinfo/acpiinfo.c \ -- acpi/acpitables/acpitables.c \ -- sbbr/acpitables/acpitables.c \ -- acpi/apicinstance/apicinstance.c \ -- acpi/asf/asf.c \ -- acpi/aspt/aspt.c \ -- acpi/battery/battery.c \ -- acpi/bert/bert.c \ -- acpi/bgrt/bgrt.c \ -- acpi/boot/boot.c \ -- acpi/brightness/brightness-helper.c \ -- acpi/brightness/brightness.c \ -- acpi/brightness/autobrightness.c \ -- acpi/checksum/checksum.c \ -- acpi/cpep/cpep.c \ -- acpi/crsdump/crsdump.c \ -- acpi/crsdump/prsdump.c \ -- acpi/csrt/csrt.c \ -- acpi/cstates/cstates.c \ -- acpi/dbgp/dbgp.c \ -- acpi/dbg2/dbg2.c \ -- acpi/devices/ac_adapter/ac.c \ -- acpi/devices/battery/battery.c \ -- acpi/devices/battery/smart_battery.c \ -- acpi/devices/ec/ec.c \ -- acpi/devices/buttons/power_button.c \ -- acpi/devices/buttons/sleep_button.c \ -- acpi/devices/lid/lid.c \ -- acpi/devices/nvdimm/nvdimm.c \ -- acpi/devices/sensor/als.c \ -- acpi/devices/time/time.c \ -- acpi/devices/wpc/wpc.c \ -- acpi/dmar/dmar.c \ -- acpi/dppt/dppt.c \ -- acpi/drtm/drtm.c \ -- acpi/dsddump/dsddump.c \ -- acpi/ecdt/ecdt.c \ -- acpi/einj/einj.c \ -- acpi/erst/erst.c \ -- acpi/facs/facs.c \ -- acpi/fadt/fadt.c \ -- sbbr/fadt/fadt.c \ -- acpi/fan/fan.c \ -- acpi/fpdt/fpdt.c \ -- acpi/gpedump/gpedump.c \ -- acpi/gtdt/gtdt.c \ -- acpi/hest/hest.c \ -- acpi/hpet/hpet.c \ -- acpi/hmat/hmat.c \ -- acpi/iort/iort.c \ -- acpi/lid/lid.c \ -- acpi/lpit/lpit.c \ -- acpi/madt/madt.c \ -- acpi/mcfg/mcfg.c \ -- acpi/mchi/mchi.c \ -- acpi/mpst/mpst.c \ -- acpi/msct/msct.c \ -- acpi/msdm/msdm.c \ -- acpi/method/method.c \ -- acpi/nfit/nfit.c \ -- acpi/osilinux/osilinux.c \ -- acpi/pcc/pcc.c \ -- acpi/pcct/pcct.c \ -- acpi/pdtt/pdtt.c \ -- acpi/powerbutton/powerbutton.c \ -- acpi/plddump/plddump.c \ -- acpi/phat/phat.c \ -- acpi/pmtt/pmtt.c \ -- acpi/pptt/pptt.c \ -- acpi/rasf/rasf.c \ -- acpi/rsdp/rsdp.c \ -- sbbr/rsdp/rsdp.c \ -- acpi/rsdt/rsdt.c \ -- acpi/s3/s3.c \ -- acpi/s3power/s3power.c \ -- acpi/s4/s4.c \ -- acpi/sbst/sbst.c \ -- acpi/sdei/sdei.c \ -- acpi/sdev/sdev.c \ -- acpi/slic/slic.c \ -- acpi/slit/slit.c \ -- acpi/spcr/spcr.c \ -- acpi/spmi/spmi.c \ -- acpi/srat/srat.c \ -- acpi/stao/stao.c \ -- acpi/syntaxcheck/syntaxcheck.c \ -- acpi/tcpa/tcpa.c \ -- acpi/tpm2/tpm2.c \ -- acpi/uefi/uefi.c \ -- acpi/uniqueid/uniqueid.c \ -- acpi/waet/waet.c \ -- acpi/wakealarm/wakealarm.c \ -- acpi/wdat/wdat.c \ -- acpi/wmi/wmi.c \ -- acpi/wpbt/wpbt.c \ -- acpi/wsmt/wsmt.c \ -- acpi/xsdt/xsdt.c \ -- acpi/xenv/xenv.c \ -- apic/apicedge/apicedge.c \ -- bios/bios_info/bios_info.c \ -- bios/bios32/bios32.c \ -- bios/ebda_region/ebda_region.c \ -- bios/ebdadump/ebdadump.c \ -- bios/hdaaudio/hdaaudio.c \ -- bios/interrupt/interrupt.c \ -- bios/memmapdump/memmapdump.c \ -- bios/mtrr/mtrr.c \ -- bios/multiproc/mpcheck.c \ -- bios/multiproc/mpdump.c \ -- bios/pciirq/pciirq.c \ -- bios/pnp/pnp.c \ -- bios/romdump/romdump.c \ -- bios/s0idle/s0idle.c \ -- bios/smm/smm.c \ -- cmos/cmosdump/cmosdump.c \ -- coreboot/clog/clog.c \ -- cpu/virt/virt.c \ -- cpu/virt/virt_svm.c \ -- cpu/virt/virt_vmx.c \ -- cpu/maxfreq/maxfreq.c \ -- cpu/cpufreq/cpufreq.c \ -- cpu/nx/nx.c \ -- cpu/msr/msr.c \ -- cpu/microcode/microcode.c \ -- dmi/dmicheck/dmicheck.c \ -- hotkey/hotkey/hotkey.c \ -- ipmi/bmc/bmc_info.c \ - kernel/klog/klog.c \ - kernel/olog/olog.c \ - kernel/oops/oops.c \ - kernel/version/version.c \ -- opal/mtd_info.c \ -- opal/prd_info.c \ -- pci/aspm/aspm.c \ -- pci/crs/crs.c \ -- pci/maxreadreq/maxreadreq.c \ -- pci/smccc/smccc.c \ -- tpm/tpmevlog/tpmevlog.c \ -- tpm/tpmevlogdump/tpmevlogdump.c \ - uefi/csm/csm.c \ - uefi/uefidump/uefidump.c \ - uefi/uefirttime/uefirttime.c \ -@@ -201,22 +42,14 @@ fwts_SOURCES = main.c \ - uefi/uefirtauthvar/uefirtauthvar.c \ - uefi/esrtdump/esrtdump.c \ - uefi/esrt/esrt.c \ -- $(pci_tests) \ -- $(mem_tests) \ -- $(cpu_tests) \ -- $(power_mgmt_tests) \ - $(dt_tests) - --fwts_LDFLAGS = -lm -lbsd `pkg-config --libs glib-2.0 gio-2.0` -+fwts_LDFLAGS = -lm - - fwts_LDADD = \ - -lfwts \ - -L$(top_builddir)/src \ -- -L$(top_builddir)/src/acpica \ -- -L$(top_builddir)/src/libfwtsiasl \ -- -L$(top_builddir)/src/libfwtsacpica \ -- -L$(top_builddir)/src/lib/src \ -- -lfwtsacpica -+ -L$(top_builddir)/src/lib/src - - man_MANS = ../doc/fwts.1 ../doc/fwts-collect.1 ../doc/fwts-frontend-text.1 - -diff --git a/src/lib/include/fwts.h b/src/lib/include/fwts.h -index f34d4859..33486b30 100644 ---- a/src/lib/include/fwts.h -+++ b/src/lib/include/fwts.h -@@ -127,6 +127,12 @@ - #define FWTS_USE_DEVMEM 1 - #endif - -+#if defined(__arm__) -+#define FWTS_ARCH_ARM 1 -+#define FWTS_HAS_UEFI 1 -+#define FWTS_USE_DEVMEM 1 -+#endif -+ - /* verision 3-tuple into integer */ - #define _VER_(major, minor, patchlevel) \ - ((major * 10000) + (minor * 100) + patchlevel) -diff --git a/src/lib/include/fwts_efi_runtime.h b/src/lib/include/fwts_efi_runtime.h -index 196d1735..15afd087 100644 ---- a/src/lib/include/fwts_efi_runtime.h -+++ b/src/lib/include/fwts_efi_runtime.h -@@ -19,6 +19,8 @@ - #ifndef _FWTS_EFI_RUNTIME_H_ - #define _FWTS_EFI_RUNTIME_H_ - -+typedef unsigned long efi_status_t; -+ - typedef enum { - EfiResetCold, - EfiResetWarm, -@@ -66,7 +68,7 @@ struct efi_getvariable { - uint32_t *Attributes; - uint64_t *DataSize; - void *Data; -- uint64_t *status; -+ efi_status_t *status; - } __attribute__ ((packed)); - - struct efi_setvariable { -@@ -75,14 +77,14 @@ struct efi_setvariable { - uint32_t Attributes; - uint64_t DataSize; - void *Data; -- uint64_t *status; -+ efi_status_t *status; - } __attribute__ ((packed)); - - struct efi_getnextvariablename { - uint64_t *VariableNameSize; - uint16_t *VariableName; - EFI_GUID *VendorGuid; -- uint64_t *status; -+ efi_status_t *status; - } __attribute__ ((packed)); - - struct efi_queryvariableinfo { -@@ -90,36 +92,36 @@ struct efi_queryvariableinfo { - uint64_t *MaximumVariableStorageSize; - uint64_t *RemainingVariableStorageSize; - uint64_t *MaximumVariableSize; -- uint64_t *status; -+ efi_status_t *status; - } __attribute__ ((packed)); - - struct efi_gettime { - EFI_TIME *Time; - EFI_TIME_CAPABILITIES *Capabilities; -- uint64_t *status; -+ efi_status_t *status; - } __attribute__ ((packed)); - - struct efi_settime { - EFI_TIME *Time; -- uint64_t *status; -+ efi_status_t *status; - } __attribute__ ((packed)); - - struct efi_getwakeuptime { - uint8_t *Enabled; - uint8_t *Pending; - EFI_TIME *Time; -- uint64_t *status; -+ efi_status_t *status; - } __attribute__ ((packed)); - - struct efi_setwakeuptime { - uint8_t Enabled; - EFI_TIME *Time; -- uint64_t *status; -+ efi_status_t *status; - } __attribute__ ((packed)); - - struct efi_getnexthighmonotoniccount { - uint32_t *HighCount; -- uint64_t *status; -+ efi_status_t *status; - } __attribute__ ((packed)); - - struct efi_querycapsulecapabilities { -@@ -127,7 +129,7 @@ struct efi_querycapsulecapabilities { - uint64_t CapsuleCount; - uint64_t *MaximumCapsuleSize; - EFI_RESET_TYPE *ResetType; -- uint64_t *status; -+ efi_status_t *status; - } __attribute__ ((packed)); - - /* ioctl calls that are permitted to the /dev/efi_runtime interface. */ -diff --git a/src/lib/include/fwts_uefi.h b/src/lib/include/fwts_uefi.h -index cf9df519..4e348217 100644 ---- a/src/lib/include/fwts_uefi.h -+++ b/src/lib/include/fwts_uefi.h -@@ -32,12 +32,14 @@ PRAGMA_PACK_WARN_OFF - 0xE0, 0x98, 0x03, 0x2B, 0x8C} \ - } - -+typedef unsigned long efi_status_t; -+ - typedef struct { - uint16_t *varname; - uint8_t guid[16]; - size_t datalen; - uint8_t *data; -- uint64_t status; -+ efi_status_t status; - uint32_t attributes; - } fwts_uefi_var; - -@@ -677,7 +679,7 @@ void fwts_uefi_free_variable(fwts_uefi_var *var); - void fwts_uefi_free_variable_names(fwts_list *list); - int fwts_uefi_get_variable_names(fwts_list *list); - --void fwts_uefi_print_status_info(fwts_framework *fw, const uint64_t status); -+void fwts_uefi_print_status_info(fwts_framework *fw, const efi_status_t status); - char *fwts_uefi_attribute_info(uint32_t attr); - - bool fwts_uefi_efivars_iface_exist(void); -diff --git a/src/lib/src/Makefile.am b/src/lib/src/Makefile.am -index a4fd23e9..d72d87a4 100644 ---- a/src/lib/src/Makefile.am -+++ b/src/lib/src/Makefile.am -@@ -18,25 +18,19 @@ - - AM_CPPFLAGS = \ - -I$(top_srcdir)/src/lib/include \ -- -I$(top_srcdir)/src/libfwtsiasl \ -- -I$(top_srcdir)/src/acpica/source/include \ -- -I$(top_srcdir)/src/acpica/source/compiler \ - `pkg-config --silence-errors --cflags json` \ - `pkg-config --silence-errors --cflags json-c` \ -- `pkg-config --cflags glib-2.0 gio-2.0` \ - -DDATAROOTDIR=\"$(datarootdir)\" \ -- -Wall -Werror -Wextra \ -+ -Wall -Wextra \ - -Wno-address-of-packed-member - - pkglib_LTLIBRARIES = libfwts.la - - libfwts_la_LDFLAGS = \ -- -lm -lpthread -lbsd \ -- -version-info 1:0:0 \ -- -L$(top_builddir)/src/libfwtsiasl \ -- -lfwtsiasl `pkg-config --libs glib-2.0 gio-2.0` -+ -lm -lpthread \ -+ -version-info 1:0:0 - --libfwts_la_CPPFLAGS = $(AM_CPPFLAGS) -DACPI_DEBUG_OUTPUT -+libfwts_la_CPPFLAGS = $(AM_CPPFLAGS) - - if HAVE_LIBFDT - dt_sources = \ -@@ -47,24 +41,13 @@ endif - # Components of the fwts core helper library libfwts - # - libfwts_la_SOURCES = \ -- fwts_ac_adapter.c \ -- fwts_acpi_object_eval.c \ -- fwts_acpi_tables.c \ -- fwts_acpi.c \ -- fwts_acpid.c \ - fwts_alloc.c \ - fwts_arch.c \ - fwts_args.c \ - fwts_backtrace.c \ -- fwts_battery.c \ - fwts_binpaths.c \ -- fwts_button.c \ - fwts_checkeuid.c \ - fwts_checksum.c \ -- fwts_clog.c \ -- fwts_cmos.c \ -- fwts_coreboot.c \ -- fwts_coreboot_cbmem.c \ - fwts_cpu.c \ - fwts_dump.c \ - fwts_dump_data.c \ -@@ -77,13 +60,9 @@ libfwts_la_SOURCES = \ - fwts_get.c \ - fwts_gpe.c \ - fwts_guid.c \ -- fwts_hwinfo.c \ -- fwts_iasl.c \ - fwts_interactive.c \ - fwts_ioport.c \ -- fwts_ipmi.c \ - fwts_json.c \ -- fwts_kernel.c \ - fwts_keymap.c \ - fwts_klog.c \ - fwts_olog.c \ -@@ -99,22 +78,16 @@ libfwts_la_SOURCES = \ - fwts_modprobe.c \ - fwts_multiproc.c \ - fwts_oops.c \ -- fwts_pci.c \ - fwts_pipeio.c \ - fwts_release.c \ - fwts_scan_efi_systab.c \ - fwts_set.c \ -- fwts_smbios.c \ - fwts_stringextras.c \ - fwts_summary.c \ - fwts_text_list.c \ -- fwts_tpm.c \ - fwts_tty.c \ - fwts_uefi.c \ -- fwts_wakealarm.c \ -- fwts_pm_method.c \ - fwts_safe_mem.c \ -- fwts_pm_debug.c \ - $(dt_sources) - - -include $(top_srcdir)/git.mk -diff --git a/src/lib/src/fwts_fileio.c b/src/lib/src/fwts_fileio.c -index 83a62bc4..eac7fdec 100644 ---- a/src/lib/src/fwts_fileio.c -+++ b/src/lib/src/fwts_fileio.c -@@ -62,41 +62,3 @@ fwts_list* fwts_file_open_and_read(const char *file) - - return list; - } -- --/* -- * fwts_gzfile_read() -- * read given gz file and return contents as a list of lines -- */ --fwts_list *fwts_gzfile_read(gzFile *fp) --{ -- fwts_list *list; -- char buffer[8192]; -- -- if ((list = fwts_list_new()) == NULL) -- return NULL; -- -- while (gzgets(*fp, buffer, sizeof(buffer)) != NULL) { -- buffer[strlen(buffer) - 1] = '\0'; /* Chop off "\n" */ -- fwts_text_list_append(list, buffer); -- } -- -- return list; --} -- --/* -- * fwts_gzfile_open_and_read() -- * open and read gz file and return contents as a list of lines -- */ --fwts_list* fwts_gzfile_open_and_read(const char *file) --{ -- gzFile fp; -- fwts_list *list; -- -- if ((fp = gzopen(file, "r")) == Z_NULL) -- return NULL; -- -- list = fwts_gzfile_read(&fp); -- (void)gzclose(fp); -- -- return list; --} -diff --git a/src/lib/src/fwts_framework.c b/src/lib/src/fwts_framework.c -index 725a7e0b..1ed17432 100644 ---- a/src/lib/src/fwts_framework.c -+++ b/src/lib/src/fwts_framework.c -@@ -31,7 +31,6 @@ - #include - - #include "fwts.h" --#include "fwts_pm_method.h" - - - #define ACS_VERSION "v1.0" -diff --git a/src/lib/src/fwts_uefi.c b/src/lib/src/fwts_uefi.c -index 2dd1727e..61aa7b9d 100644 ---- a/src/lib/src/fwts_uefi.c -+++ b/src/lib/src/fwts_uefi.c -@@ -41,7 +41,7 @@ typedef struct { - uint8_t guid[16]; - uint64_t datalen; - uint8_t data[1024]; -- uint64_t status; -+ efi_status_t status; - uint32_t attributes; - } __attribute__((packed)) fwts_uefi_sys_fs_var; - -@@ -52,7 +52,7 @@ typedef struct { - } __attribute__((packed)) fwts_uefi_efivars_fs_var; - - typedef struct { -- const uint64_t statusvalue; -+ const efi_status_t statusvalue; - const char *mnemonic ; - const char *description; - } uefistatus_info; -@@ -467,12 +467,12 @@ static const uefistatus_info uefistatus_info_table[] = { - { ~0, NULL, NULL } - }; - --void fwts_uefi_print_status_info(fwts_framework *fw, const uint64_t status) -+void fwts_uefi_print_status_info(fwts_framework *fw, const efi_status_t status) - { - - const uefistatus_info *info; - -- if (status == ~0ULL) { -+ if (status == ~0UL) { - fwts_log_info(fw, "fwts test ioctl() failed, errno=%d (%s)", errno, strerror(errno)); - return; - } -@@ -483,7 +483,7 @@ void fwts_uefi_print_status_info(fwts_framework *fw, const uint64_t status) - return; - } - } -- fwts_log_info(fw, "Cannot find the return status information, value = 0x%" PRIx64 ".", status); -+ fwts_log_info(fw, "Cannot find the return status information, value = 0x%lx.", status); - - } - -diff --git a/src/uefi/securebootcert/securebootcert.c b/src/uefi/securebootcert/securebootcert.c -index 0fcc771c..21a7935a 100644 ---- a/src/uefi/securebootcert/securebootcert.c -+++ b/src/uefi/securebootcert/securebootcert.c -@@ -518,7 +518,7 @@ static int securebootcert_setvar( - long ioret; - struct efi_setvariable setvariable; - -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - uint64_t datasize = 1; - - setvariable.VariableName = varname; -diff --git a/src/uefi/uefirtauthvar/uefirtauthvar.c b/src/uefi/uefirtauthvar/uefirtauthvar.c -index 99918125..97c3a7ed 100644 ---- a/src/uefi/uefirtauthvar/uefirtauthvar.c -+++ b/src/uefi/uefirtauthvar/uefirtauthvar.c -@@ -61,7 +61,7 @@ static long setvar( - uint32_t var_attributes, - uint64_t datasize, - void *data, -- uint64_t *status) -+ efi_status_t *status) - { - long ioret; - struct efi_setvariable setvariable; -@@ -72,7 +72,7 @@ static long setvar( - setvariable.DataSize = datasize; - setvariable.Data = data; - setvariable.status = status; -- *status = ~0ULL; -+ *status = ~0UL; - ioret = ioctl(fd, EFI_RUNTIME_SET_VARIABLE, &setvariable); - - return ioret; -@@ -83,7 +83,7 @@ static long getvar( - uint32_t *attributestest, - uint64_t *getdatasize, - void *data, -- uint64_t *status) -+ efi_status_t *status) - { - long ioret; - struct efi_getvariable getvariable; -@@ -94,7 +94,7 @@ static long getvar( - getvariable.DataSize = getdatasize; - getvariable.Data = data; - getvariable.status = status; -- *status = ~0ULL; -+ *status = ~0UL; - ioret = ioctl(fd, EFI_RUNTIME_GET_VARIABLE, &getvariable); - - return ioret; -@@ -102,7 +102,7 @@ static long getvar( - - static void uefirtvariable_env_cleanup(void) - { -- uint64_t status; -+ efi_status_t status; - uint8_t data[GETVAR_BUF_SIZE]; - uint64_t getdatasize = sizeof(data); - uint32_t attributestest; -@@ -145,7 +145,7 @@ static int uefirtauthvar_deinit(fwts_framework *fw) - return FWTS_OK; - } - --static int check_fw_support(fwts_framework *fw, uint64_t status) -+static int check_fw_support(fwts_framework *fw, efi_status_t status) - { - if ((status == EFI_INVALID_PARAMETER) && - ((bool)(attributes & FWTS_UEFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) || -@@ -186,7 +186,7 @@ static int uefirtauthvar_test1(fwts_framework *fw) - - uint8_t data[GETVAR_BUF_SIZE]; - uint64_t getdatasize = sizeof(data); -- uint64_t status; -+ efi_status_t status; - uint32_t attributestest; - size_t i; - -@@ -248,7 +248,7 @@ static int uefirtauthvar_test1(fwts_framework *fw) - static int uefirtauthvar_test2(fwts_framework *fw) - { - long ioret; -- uint64_t status; -+ efi_status_t status; - - if (!(data_exist & E_AUTHVARCREATE)) { - fwts_skipped(fw,"The test variable, AuthVarCreate, doesn't exist, skip the test."); -@@ -288,7 +288,7 @@ static int uefirtauthvar_test2(fwts_framework *fw) - static int uefirtauthvar_test3(fwts_framework *fw) - { - long ioret; -- uint64_t status; -+ efi_status_t status; - - if (!(data_exist & E_AUTHVARCREATE)) { - fwts_skipped(fw,"The test variable, AuthVarCreate, doesn't exist, skip the test."); -@@ -330,7 +330,7 @@ static int uefirtauthvar_test4(fwts_framework *fw) - - uint8_t data[GETVAR_BUF_SIZE]; - uint64_t getdatasize = sizeof(data); -- uint64_t status; -+ efi_status_t status; - uint32_t attributestest; - size_t i; - uint32_t attribappend = attributes | FWTS_UEFI_VARIABLE_APPEND_WRITE; -@@ -412,7 +412,7 @@ static int uefirtauthvar_test5(fwts_framework *fw) - - uint8_t data[GETVAR_BUF_SIZE]; - uint64_t getdatasize = sizeof(data); -- uint64_t status; -+ efi_status_t status; - uint32_t attributestest; - size_t i; - -@@ -480,7 +480,7 @@ static int uefirtauthvar_test5(fwts_framework *fw) - static int uefirtauthvar_test6(fwts_framework *fw) - { - long ioret; -- uint64_t status; -+ efi_status_t status; - - if (!(data_exist & E_AUTHVARUPDATE)) { - fwts_skipped(fw,"The test variable, AuthVarUpdate, doesn't exist, skip the test."); -@@ -522,7 +522,7 @@ static int uefirtauthvar_test7(fwts_framework *fw) - - uint8_t data[GETVAR_BUF_SIZE]; - uint64_t getdatasize = sizeof(data); -- uint64_t status; -+ efi_status_t status; - uint32_t attributestest; - - if (!(data_exist & E_AUTHVARCREATE)) { -@@ -576,7 +576,7 @@ static int uefirtauthvar_test7(fwts_framework *fw) - static int uefirtauthvar_test8(fwts_framework *fw) - { - long ioret; -- uint64_t status; -+ efi_status_t status; - - ioret = setvar(>estguid, attributes, sizeof(AuthVarModData), AuthVarModData, &status); - -@@ -611,7 +611,7 @@ static int uefirtauthvar_test8(fwts_framework *fw) - static int uefirtauthvar_test9(fwts_framework *fw) - { - long ioret; -- uint64_t status; -+ efi_status_t status; - - ioret = setvar(>estguid, attributes, sizeof(AuthVarModTime), AuthVarModTime, &status); - -@@ -646,7 +646,7 @@ static int uefirtauthvar_test9(fwts_framework *fw) - static int uefirtauthvar_test10(fwts_framework *fw) - { - long ioret; -- uint64_t status; -+ efi_status_t status; - EFI_GUID gtestguiddiff = TEST_GUID1; - - ioret = setvar(>estguiddiff, attributes, sizeof(AuthVarCreate), AuthVarCreate, &status); -@@ -685,7 +685,7 @@ static int uefirtauthvar_test11(fwts_framework *fw) - - uint8_t data[GETVAR_BUF_SIZE]; - uint64_t getdatasize = sizeof(data); -- uint64_t status; -+ efi_status_t status; - uint32_t attributestest; - size_t i; - -diff --git a/src/uefi/uefirtmisc/uefirtmisc.c b/src/uefi/uefirtmisc/uefirtmisc.c -index 28939fb0..ab54929f 100644 ---- a/src/uefi/uefirtmisc/uefirtmisc.c -+++ b/src/uefi/uefirtmisc/uefirtmisc.c -@@ -70,7 +70,7 @@ static int uefirtmisc_deinit(fwts_framework *fw) - - static int getnexthighmonotoniccount_test(fwts_framework *fw, uint32_t multitesttime) - { -- uint64_t status; -+ efi_status_t status; - struct efi_getnexthighmonotoniccount getnexthighmonotoniccount; - uint32_t highcount; - uint32_t i; -@@ -85,7 +85,7 @@ static int getnexthighmonotoniccount_test(fwts_framework *fw, uint32_t multitest - getnexthighmonotoniccount.status = &status; - - for (i = 0; i < multitesttime; i++) { -- status = ~0ULL; -+ status = ~0UL; - long ioret = ioctl(fd, EFI_RUNTIME_GET_NEXTHIGHMONOTONICCOUNT, &getnexthighmonotoniccount); - - if (ioret == -1) { -@@ -111,7 +111,7 @@ static int getnexthighmonotoniccount_test(fwts_framework *fw, uint32_t multitest - - static int querycapsulecapabilities_test(fwts_framework *fw, uint32_t multitesttime, uint32_t flag) - { -- uint64_t status; -+ efi_status_t status; - uint32_t i; - - struct efi_querycapsulecapabilities querycapsulecapabilities; -@@ -143,7 +143,7 @@ static int querycapsulecapabilities_test(fwts_framework *fw, uint32_t multitestt - querycapsulecapabilities.ResetType = &resettype; - - for (i = 0; i < multitesttime; i++) { -- status = ~0ULL; -+ status = ~0UL; - long ioret = ioctl(fd, EFI_RUNTIME_QUERY_CAPSULECAPABILITIES, &querycapsulecapabilities); - if (ioret == -1) { - if (status == EFI_UNSUPPORTED) { -@@ -254,7 +254,7 @@ static int uefirtmisc_test2(fwts_framework *fw) - - static int uefirtmisc_test3(fwts_framework *fw) - { -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - long ioret; - struct efi_getnexthighmonotoniccount getnexthighmonotoniccount; - -@@ -294,13 +294,13 @@ static int uefirtmisc_test4(fwts_framework *fw) - - if (!(runtimeservicessupported & EFI_RT_SUPPORTED_GET_NEXT_HIGH_MONOTONIC_COUNT)) { - long ioret; -- uint64_t status; -+ efi_status_t status; - struct efi_getnexthighmonotoniccount getnexthighmonotoniccount; - uint32_t highcount; - - getnexthighmonotoniccount.HighCount = &highcount; - getnexthighmonotoniccount.status = &status; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_GET_NEXTHIGHMONOTONICCOUNT, &getnexthighmonotoniccount); - if (ioret == -1) { -@@ -308,7 +308,7 @@ static int uefirtmisc_test4(fwts_framework *fw) - fwts_passed(fw, "UEFI GetNextHighMonotonicCount runtime " - "service unsupported status test passed."); - else { -- if (status == ~0ULL) { -+ if (status == ~0UL) { - fwts_skipped(fw, "Unknown error occurred, skip test."); - return FWTS_SKIP; - } else { -diff --git a/src/uefi/uefirttime/uefirttime.c b/src/uefi/uefirttime/uefirttime.c -index 0cb50e8b..3c63953d 100644 ---- a/src/uefi/uefirttime/uefirttime.c -+++ b/src/uefi/uefirttime/uefirttime.c -@@ -198,7 +198,7 @@ static int uefirttime_test1(fwts_framework *fw) - EFI_TIME efi_time; - - EFI_TIME_CAPABILITIES efi_time_cap; -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - - if (!(runtimeservicessupported & EFI_RT_SUPPORTED_GET_TIME)) { - fwts_skipped(fw, "Skipping test, GetTime runtime " -@@ -239,7 +239,7 @@ static int uefirttime_test_gettime_invalid( - { - long ioret; - struct efi_gettime gettime; -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - - if (!(runtimeservicessupported & EFI_RT_SUPPORTED_GET_TIME)) { - fwts_skipped(fw, "Skipping test, GetTime runtime " -@@ -291,7 +291,7 @@ static int uefirttime_test4(fwts_framework *fw) - - long ioret; - struct efi_settime settime; -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - struct efi_gettime gettime; - - EFI_TIME oldtime; -@@ -356,7 +356,7 @@ static int uefirttime_test4(fwts_framework *fw) - } - - settime.Time = &time; -- status = ~0ULL; -+ status = ~0UL; - settime.status = &status; - - ioret = ioctl(fd, EFI_RUNTIME_SET_TIME, &settime); -@@ -375,7 +375,7 @@ static int uefirttime_test4(fwts_framework *fw) - sleep(1); - - gettime.Time = &newtime; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_GET_TIME, &gettime); - -@@ -428,7 +428,7 @@ static int uefirttime_test4(fwts_framework *fw) - - /* restore the previous time. */ - settime.Time = &oldtime; -- status = ~0ULL; -+ status = ~0UL; - ioret = ioctl(fd, EFI_RUNTIME_SET_TIME, &settime); - if (ioret == -1) { - if (status == EFI_UNSUPPORTED) { -@@ -452,7 +452,7 @@ static int uefirttime_test_settime_invalid( - struct efi_settime *settime) - { - long ioret; -- static uint64_t status; -+ static efi_status_t status; - - if (!(runtimeservicessupported & EFI_RT_SUPPORTED_SET_TIME)) { - fwts_skipped(fw, "Skipping test, SetTime runtime " -@@ -460,7 +460,7 @@ static int uefirttime_test_settime_invalid( - return FWTS_SKIP; - } - -- status = ~0ULL; -+ status = ~0UL; - settime->status = &status; - - ioret = ioctl(fd, EFI_RUNTIME_SET_TIME, settime); -@@ -493,7 +493,7 @@ static int uefirttime_test_settime_invalid_time( - struct efi_gettime gettime; - struct efi_settime settime; - EFI_TIME oldtime, newtime; -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - int ret, ioret; - - if (!(runtimeservicessupported & EFI_RT_SUPPORTED_GET_TIME)) { -@@ -547,7 +547,7 @@ static int uefirttime_test_settime_invalid_time( - - /* Restore original time */ - settime.Time = &oldtime; -- status = ~0ULL; -+ status = ~0UL; - settime.status = &status; - ioret = ioctl(fd, EFI_RUNTIME_SET_TIME, &settime); - if (ioret == -1) { -@@ -695,7 +695,7 @@ static int uefirttime_test18(fwts_framework *fw) - { - long ioret; - struct efi_getwakeuptime getwakeuptime; -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - uint8_t enabled, pending; - EFI_TIME efi_time; - -@@ -736,7 +736,7 @@ static int uefirttime_test_getwaketime_invalid( - struct efi_getwakeuptime *getwakeuptime) - { - long ioret; -- static uint64_t status; -+ static efi_status_t status; - - if (!(runtimeservicessupported & EFI_RT_SUPPORTED_GET_WAKEUP_TIME)) { - fwts_skipped(fw, "Skipping test, GetWakeupTime runtime " -@@ -744,7 +744,7 @@ static int uefirttime_test_getwaketime_invalid( - return FWTS_SKIP; - } - -- status = ~0ULL; -+ status = ~0UL; - getwakeuptime->status = &status; - - ioret = ioctl(fd, EFI_RUNTIME_GET_WAKETIME, getwakeuptime); -@@ -824,7 +824,7 @@ static int uefirttime_test23(fwts_framework *fw) - { - long ioret; - struct efi_setwakeuptime setwakeuptime; -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - EFI_TIME oldtime; - EFI_TIME newtime; - -@@ -868,7 +868,7 @@ static int uefirttime_test23(fwts_framework *fw) - addonehour(&oldtime); - - setwakeuptime.Time = &oldtime; -- status = ~0ULL; -+ status = ~0UL; - setwakeuptime.status = &status; - setwakeuptime.Enabled = true; - -@@ -896,7 +896,7 @@ static int uefirttime_test23(fwts_framework *fw) - getwakeuptime.Enabled = &enabled; - getwakeuptime.Pending = &pending; - getwakeuptime.Time = &newtime; -- status = ~0ULL; -+ status = ~0UL; - getwakeuptime.status = &status; - - ioret = ioctl(fd, EFI_RUNTIME_GET_WAKETIME, &getwakeuptime); -@@ -932,7 +932,7 @@ static int uefirttime_test23(fwts_framework *fw) - } - - setwakeuptime.Enabled = false; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_SET_WAKETIME, &setwakeuptime); - if (ioret == -1) { -@@ -948,7 +948,7 @@ static int uefirttime_test23(fwts_framework *fw) - } - - sleep(1); -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_GET_WAKETIME, &getwakeuptime); - if (ioret == -1) { -@@ -980,7 +980,7 @@ static int uefirttime_test_setwakeuptime_invalid( - ) - { - long ioret; -- static uint64_t status; -+ static efi_status_t status; - - if (!(runtimeservicessupported & EFI_RT_SUPPORTED_SET_WAKEUP_TIME)) { - fwts_skipped(fw, "Skipping test, SetWakeupTime runtime " -@@ -988,7 +988,7 @@ static int uefirttime_test_setwakeuptime_invalid( - return FWTS_SKIP; - } - -- status = ~0ULL; -+ status = ~0UL; - setwakeuptime->status = &status; - - ioret = ioctl(fd, EFI_RUNTIME_SET_WAKETIME, setwakeuptime); -@@ -1031,7 +1031,7 @@ static int uefirttime_test_setwakeuptime_invalid_time( - struct efi_getwakeuptime getwakeuptime; - struct efi_setwakeuptime setwakeuptime; - EFI_TIME oldtime, newtime; -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - uint8_t pending, enabled; - int ret, ioret; - -@@ -1088,7 +1088,7 @@ static int uefirttime_test_setwakeuptime_invalid_time( - - /* Restore original time */ - setwakeuptime.Time = &oldtime; -- status = ~0ULL; -+ status = ~0UL; - setwakeuptime.status = &status; - setwakeuptime.Enabled = true; - ioret = ioctl(fd, EFI_RUNTIME_SET_WAKETIME, &setwakeuptime); -@@ -1238,7 +1238,7 @@ static int uefirttime_test38(fwts_framework *fw) - long ioret; - - struct efi_settime settime; -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - struct efi_gettime gettime; - struct efi_getwakeuptime getwakeuptime; - uint8_t enabled, pending; -@@ -1258,7 +1258,7 @@ static int uefirttime_test38(fwts_framework *fw) - fwts_passed(fw, "UEFI GetTime runtime service " - "unsupported status test passed."); - else { -- if (status == ~0ULL) -+ if (status == ~0UL) - fwts_skipped(fw, "Unknown error occurred, skip test."); - else - fwts_failed(fw, LOG_LEVEL_HIGH, "UEFIRuntimeGetTime", -@@ -1286,7 +1286,7 @@ static int uefirttime_test38(fwts_framework *fw) - - if (!(runtimeservicessupported & EFI_RT_SUPPORTED_SET_TIME)) { - settime.Time = &efi_time; -- status = ~0ULL; -+ status = ~0UL; - settime.status = &status; - - ioret = ioctl(fd, EFI_RUNTIME_SET_TIME, &settime); -@@ -1295,7 +1295,7 @@ static int uefirttime_test38(fwts_framework *fw) - fwts_passed(fw, "UEFI SetTime runtime service " - "unsupported status test passed."); - } else { -- if (status == ~0ULL) -+ if (status == ~0UL) - fwts_skipped(fw, "Unknown error occurred, skip test."); - else - fwts_failed(fw, LOG_LEVEL_HIGH, "UEFIRuntimeSetTime", -@@ -1317,7 +1317,7 @@ static int uefirttime_test38(fwts_framework *fw) - - if (!(runtimeservicessupported & EFI_RT_SUPPORTED_SET_WAKEUP_TIME)) { - setwakeuptime.Time = &efi_time; -- status = ~0ULL; -+ status = ~0UL; - setwakeuptime.status = &status; - setwakeuptime.Enabled = false; - -@@ -1327,7 +1327,7 @@ static int uefirttime_test38(fwts_framework *fw) - fwts_passed(fw, "UEFI SetWakeupTime runtime service " - "unsupported status test passed."); - else { -- if (status == ~0ULL) -+ if (status == ~0UL) - fwts_skipped(fw, "Unknown error occurred, skip test."); - else - fwts_failed(fw, LOG_LEVEL_HIGH, "UEFIRuntimeSetWakeupTime", -@@ -1360,7 +1360,7 @@ static int uefirttime_test38(fwts_framework *fw) - fwts_passed(fw, "UEFI GetWakeupTime runtime service " - "unsupported status test passed."); - else { -- if (status == ~0ULL) -+ if (status == ~0UL) - fwts_skipped(fw, "Unknown error occurred, skip test."); - else - fwts_failed(fw, LOG_LEVEL_HIGH, "UEFIRuntimeGetWakeupTime", -diff --git a/src/uefi/uefirtvariable/uefirtvariable.c b/src/uefi/uefirtvariable/uefirtvariable.c -index bf6f5e89..7c6bb772 100644 ---- a/src/uefi/uefirtvariable/uefirtvariable.c -+++ b/src/uefi/uefirtvariable/uefirtvariable.c -@@ -69,7 +69,7 @@ static uint32_t runtimeservicessupported; - static void uefirtvariable_env_cleanup(void) - { - struct efi_setvariable setvariable; -- uint64_t status; -+ efi_status_t status; - uint8_t data = 0; - - setvariable.VariableName = variablenametest; -@@ -77,19 +77,19 @@ static void uefirtvariable_env_cleanup(void) - setvariable.Attributes = 0; - setvariable.DataSize = 0; - setvariable.Data = &data; -- status = ~0ULL; -+ status = ~0UL; - setvariable.status = &status; - (void)ioctl(fd, EFI_RUNTIME_SET_VARIABLE, &setvariable); - -- status = ~0ULL; -+ status = ~0UL; - setvariable.VariableName = variablenametest2; - (void)ioctl(fd, EFI_RUNTIME_SET_VARIABLE, &setvariable); - -- status = ~0ULL; -+ status = ~0UL; - setvariable.VariableName = variablenametest3; - (void)ioctl(fd, EFI_RUNTIME_SET_VARIABLE, &setvariable); - -- status = ~0ULL; -+ status = ~0UL; - setvariable.VariableName = variablenametest; - setvariable.VendorGuid = >estguid2; - (void)ioctl(fd, EFI_RUNTIME_SET_VARIABLE, &setvariable); -@@ -125,7 +125,7 @@ static int getvariable_test( - struct efi_getvariable getvariable; - struct efi_setvariable setvariable; - -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - uint8_t testdata[MAX_DATA_LENGTH]; - uint64_t dataindex; - uint64_t getdatasize = sizeof(testdata); -@@ -189,7 +189,7 @@ static int getvariable_test( - getvariable.status = &status; - - for (i = 0; i < multitesttime; i++) { -- status = ~0ULL; -+ status = ~0UL; - ioret = ioctl(fd, EFI_RUNTIME_GET_VARIABLE, &getvariable); - if (ioret == -1) { - if (status == EFI_UNSUPPORTED) { -@@ -239,7 +239,7 @@ static int getvariable_test( - - /* delete the variable */ - setvariable.DataSize = 0; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_SET_VARIABLE, &setvariable); - -@@ -255,7 +255,7 @@ static int getvariable_test( - err_restore_env: - - setvariable.DataSize = 0; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_SET_VARIABLE, &setvariable); - -@@ -308,7 +308,7 @@ static bool compare_name(const uint16_t *name1, const uint16_t *name2) - static int getnextvariable_test1(fwts_framework *fw) - { - long ioret; -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - - struct efi_setvariable setvariable; - -@@ -388,7 +388,7 @@ static int getnextvariable_test1(fwts_framework *fw) - variablename[0] = '\0'; - while (true) { - variablenamesize = maxvariablenamesize; -- status = ~0ULL; -+ status = ~0UL; - ioret = ioctl(fd, EFI_RUNTIME_GET_NEXTVARIABLENAME, &getnextvariablename); - - if (ioret == -1) { -@@ -458,7 +458,7 @@ static int getnextvariable_test1(fwts_framework *fw) - - /* delete the variable */ - setvariable.DataSize = 0; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_SET_VARIABLE, &setvariable); - -@@ -474,7 +474,7 @@ static int getnextvariable_test1(fwts_framework *fw) - err_restore_env: - - setvariable.DataSize = 0; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_SET_VARIABLE, &setvariable); - if (ioret == -1) { -@@ -512,7 +512,7 @@ static bool strlen_valid(const uint16_t *variablename, const uint64_t variablena - - static int getnextvariable_test2(fwts_framework *fw) - { -- uint64_t status; -+ efi_status_t status; - - struct efi_getnextvariablename getnextvariablename; - uint64_t variablenamesize = MAX_DATA_LENGTH; -@@ -546,7 +546,7 @@ static int getnextvariable_test2(fwts_framework *fw) - while (true) { - long ioret; - -- status = ~0ULL; -+ status = ~0UL; - variablenamesize = maxvariablenamesize; - ioret = ioctl(fd, EFI_RUNTIME_GET_NEXTVARIABLENAME, &getnextvariablename); - -@@ -683,7 +683,7 @@ static void bucket_destroy(void) - static int getnextvariable_test3(fwts_framework *fw) - { - long ioret; -- uint64_t status; -+ efi_status_t status; - - struct efi_getnextvariablename getnextvariablename; - uint64_t variablenamesize = MAX_DATA_LENGTH; -@@ -717,7 +717,7 @@ static int getnextvariable_test3(fwts_framework *fw) - while (true) { - struct efi_var_item *item; - -- status = ~0ULL; -+ status = ~0UL; - variablenamesize = maxvariablenamesize; - ioret = ioctl(fd, EFI_RUNTIME_GET_NEXTVARIABLENAME, &getnextvariablename); - -@@ -823,7 +823,7 @@ err: - static int getnextvariable_test4(fwts_framework *fw) - { - long ioret; -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - uint64_t i; - - struct efi_getnextvariablename getnextvariablename; -@@ -866,7 +866,7 @@ static int getnextvariable_test4(fwts_framework *fw) - - getnextvariablename.VariableName = variablename; - getnextvariablename.VendorGuid = NULL; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_GET_NEXTVARIABLENAME, &getnextvariablename); - -@@ -880,7 +880,7 @@ static int getnextvariable_test4(fwts_framework *fw) - - getnextvariablename.VendorGuid = &vendorguid; - getnextvariablename.VariableNameSize = NULL; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_GET_NEXTVARIABLENAME, &getnextvariablename); - -@@ -902,7 +902,7 @@ static int getnextvariable_test4(fwts_framework *fw) - * string in VariableName - */ - variablename[0] = '\0'; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_GET_NEXTVARIABLENAME, &getnextvariablename); - -@@ -949,7 +949,7 @@ static int setvariable_insertvariable( - long ioret; - struct efi_setvariable setvariable; - -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - uint64_t dataindex; - - uint8_t data[datasize + 1]; -@@ -1029,7 +1029,7 @@ static int setvariable_checkvariable( - long ioret; - struct efi_getvariable getvariable; - -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - uint8_t testdata[datasize]; - uint64_t dataindex; - uint64_t getdatasize = sizeof(testdata); -@@ -1096,7 +1096,7 @@ static int setvariable_checkvariable_notfound( - long ioret; - struct efi_getvariable getvariable; - -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - uint8_t testdata[MAX_DATA_LENGTH]; - uint64_t getdatasize = sizeof(testdata); - uint32_t attributestest; -@@ -1142,7 +1142,7 @@ static int setvariable_invalidattr( - { - long ioret; - struct efi_setvariable setvariable; -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - uint64_t dataindex; - uint8_t data[datasize]; - -@@ -1502,7 +1502,7 @@ static int setvariable_test8(fwts_framework *fw) - uint32_t attr = attributes | FWTS_UEFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS; - uint64_t datasize = 1; - uint8_t data = 1; -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - - if (!(runtimeservicessupported & EFI_RT_SUPPORTED_SET_VARIABLE)) { - fwts_skipped(fw, "Skipping test, SetVariable runtime service " -@@ -1532,7 +1532,7 @@ static int setvariable_test8(fwts_framework *fw) - } - - static int do_queryvariableinfo( -- uint64_t *status, -+ efi_status_t *status, - uint64_t *remvarstoragesize, - uint64_t *maxvariablesize) - { -@@ -1545,7 +1545,7 @@ static int do_queryvariableinfo( - queryvariableinfo.RemainingVariableStorageSize = remvarstoragesize; - queryvariableinfo.MaximumVariableSize = maxvariablesize; - queryvariableinfo.status = status; -- *status = ~0ULL; -+ *status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_QUERY_VARIABLEINFO, &queryvariableinfo); - -@@ -1560,7 +1560,7 @@ static int getnextvariable_multitest( - const uint32_t multitesttime) - { - long ioret; -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - uint32_t i; - - struct efi_setvariable setvariable; -@@ -1627,7 +1627,7 @@ static int getnextvariable_multitest( - for (i = 0; i < multitesttime; i++) { - variablename[0] = '\0'; - variablenamesize = MAX_DATA_LENGTH; -- status = ~0ULL; -+ status = ~0UL; - ioret = ioctl(fd, EFI_RUNTIME_GET_NEXTVARIABLENAME, &getnextvariablename); - - if (ioret == -1) { -@@ -1645,7 +1645,7 @@ static int getnextvariable_multitest( - }; - - setvariable.DataSize = 0; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_SET_VARIABLE, &setvariable); - -@@ -1660,7 +1660,7 @@ static int getnextvariable_multitest( - err_restore_env: - - setvariable.DataSize = 0; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_SET_VARIABLE, &setvariable); - -@@ -1778,7 +1778,7 @@ static int uefirtvariable_test3(fwts_framework *fw) - - static int uefirtvariable_test4(fwts_framework *fw) - { -- uint64_t status; -+ efi_status_t status; - uint64_t remvarstoragesize; - uint64_t maxvariablesize; - -@@ -1929,7 +1929,7 @@ static int uefirtvariable_test6(fwts_framework *fw) - static int uefirtvariable_test7(fwts_framework *fw) - { - uint32_t multitesttime = uefi_query_variable_multiple; -- uint64_t status; -+ efi_status_t status; - uint64_t remvarstoragesize; - uint64_t maxvariablesize; - uint32_t i; -@@ -1994,7 +1994,7 @@ static void getvariable_test_invalid( - } - - fwts_log_info(fw, "Testing GetVariable with %s.", test); -- *(getvariable->status) = ~0ULL; -+ *(getvariable->status) = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_GET_VARIABLE, getvariable); - -@@ -2030,7 +2030,7 @@ static int uefirtvariable_test8(fwts_framework *fw) - struct efi_getvariable getvariable; - struct efi_setvariable setvariable; - uint8_t data[16]; -- uint64_t status= ~0ULL; -+ efi_status_t status= ~0UL; - uint64_t dataindex; - uint64_t getdatasize = sizeof(data); - uint32_t attr; -@@ -2118,7 +2118,7 @@ static int uefirtvariable_test8(fwts_framework *fw) - - /* delete the variable */ - setvariable.DataSize = 0; -- status = ~0ULL; -+ status = ~0UL; - ioret = ioctl(fd, EFI_RUNTIME_SET_VARIABLE, &setvariable); - if (ioret == -1) { - fwts_failed(fw, LOG_LEVEL_HIGH, "UEFIRuntimeSetVariable", -@@ -2139,7 +2139,7 @@ static int uefirtvariable_test9(fwts_framework *fw) - struct efi_queryvariableinfo queryvariableinfo; - - EFI_GUID guid; -- uint64_t status = ~0ULL; -+ efi_status_t status = ~0UL; - uint8_t data = 1; - uint64_t datasize = 1; - uint64_t variablenamesize = MAX_DATA_LENGTH; -@@ -2165,7 +2165,7 @@ static int uefirtvariable_test9(fwts_framework *fw) - fwts_passed(fw, "UEFI SetVariable runtime service " - "unsupported status test passed."); - else { -- if (status == ~0ULL) -+ if (status == ~0UL) - fwts_skipped(fw, "Unknown error occurred, skip test."); - else - fwts_failed(fw, LOG_LEVEL_HIGH, "UEFIRuntimeSetVariable", -@@ -2200,7 +2200,7 @@ static int uefirtvariable_test9(fwts_framework *fw) - fwts_passed(fw, "UEFI GetVariable runtime service " - "unsupported status test passed."); - else { -- if (status == ~0ULL) -+ if (status == ~0UL) - fwts_skipped(fw, "Unknown error occurred, skip test."); - else - fwts_failed(fw, LOG_LEVEL_HIGH, "UEFIRuntimeGetVariable", -@@ -2222,7 +2222,7 @@ static int uefirtvariable_test9(fwts_framework *fw) - - /* delete the variable which was set */ - setvariable.DataSize = 0; -- status = ~0ULL; -+ status = ~0UL; - (void)ioctl(fd, EFI_RUNTIME_SET_VARIABLE, &setvariable); - - variablename = malloc(sizeof(uint16_t) * variablenamesize); -@@ -2237,7 +2237,7 @@ static int uefirtvariable_test9(fwts_framework *fw) - getnextvariablename.VendorGuid = &guid; - getnextvariablename.status = &status; - variablename[0] = '\0'; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_GET_NEXTVARIABLENAME, &getnextvariablename); - if (ioret == -1) { -@@ -2245,7 +2245,7 @@ static int uefirtvariable_test9(fwts_framework *fw) - fwts_passed(fw, "UEFI GetNextVarName runtime service " - "unsupported status test passed."); - else { -- if (status == ~0ULL) -+ if (status == ~0UL) - fwts_skipped(fw, "Unknown error occurred, skip test."); - else - fwts_failed(fw, LOG_LEVEL_HIGH, "UEFIRuntimeGetNextVarName", -@@ -2271,7 +2271,7 @@ static int uefirtvariable_test9(fwts_framework *fw) - queryvariableinfo.RemainingVariableStorageSize = &remvarstoragesize; - queryvariableinfo.MaximumVariableSize = &maxvariablesize; - queryvariableinfo.status = &status; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_QUERY_VARIABLEINFO, &queryvariableinfo); - if (ioret == -1) { -@@ -2279,7 +2279,7 @@ static int uefirtvariable_test9(fwts_framework *fw) - fwts_passed(fw, "UEFI QueryVarInfo runtime service " - "unsupported status test passed."); - else { -- if (status == ~0ULL) -+ if (status == ~0UL) - fwts_skipped(fw, "Unknown error occurred, skip test."); - else - fwts_failed(fw, LOG_LEVEL_HIGH, "UEFIRuntimeQueryVarInfo", -diff --git a/src/uefi/uefivarinfo/uefivarinfo.c b/src/uefi/uefivarinfo/uefivarinfo.c -index 1386d17a..f31e2649 100644 ---- a/src/uefi/uefivarinfo/uefivarinfo.c -+++ b/src/uefi/uefivarinfo/uefivarinfo.c -@@ -55,7 +55,7 @@ static int do_checkvariables( - uint64_t *usedvarssize, - const uint64_t maxvarsize) - { -- uint64_t status; -+ efi_status_t status; - - struct efi_getnextvariablename getnextvariablename; - uint64_t variablenamesize = MAX_VARNAME_LENGTH; -@@ -85,7 +85,7 @@ static int do_checkvariables( - variablename[0] = '\0'; - while (true) { - long ioret; -- status = ~0ULL; -+ status = ~0UL; - - variablenamesize = MAX_VARNAME_LENGTH; - ioret = ioctl(fd, EFI_RUNTIME_GET_NEXTVARIABLENAME, &getnextvariablename); -@@ -114,7 +114,7 @@ static int do_checkvariables( - getvariable.VendorGuid = &vendorguid; - getvariable.DataSize = &getdatasize; - getvariable.Data = data; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_GET_VARIABLE, &getvariable); - if (ioret == -1) { -@@ -139,7 +139,7 @@ static int do_checkvariables( - } - - getvariable.Data = data; -- status = ~0ULL; -+ status = ~0UL; - - ioret = ioctl(fd, EFI_RUNTIME_GET_VARIABLE, &getvariable); - if (ioret == -1) { -@@ -161,7 +161,7 @@ static int do_checkvariables( - } - - static int do_queryvariableinfo( -- uint64_t *status, -+ efi_status_t *status, - uint64_t *maxvarstoragesize, - uint64_t *remvarstoragesize, - uint64_t *maxvariablesize) -@@ -175,7 +175,7 @@ static int do_queryvariableinfo( - queryvariableinfo.MaximumVariableStorageSize = maxvarstoragesize; - queryvariableinfo.RemainingVariableStorageSize = remvarstoragesize; - queryvariableinfo.MaximumVariableSize = maxvariablesize; -- *status = ~0ULL; -+ *status = ~0UL; - queryvariableinfo.status = status; - - ioret = ioctl(fd, EFI_RUNTIME_QUERY_VARIABLEINFO, &queryvariableinfo); -@@ -188,7 +188,7 @@ static int do_queryvariableinfo( - - static int uefivarinfo_test1(fwts_framework *fw) - { -- uint64_t status; -+ efi_status_t status; - uint64_t remvarstoragesize; - uint64_t maxvariablesize; - uint64_t maxvarstoragesize; --- -2.35.1 - diff --git a/common/scripts/build-fwts-arm.sh b/common/scripts/build-fwts-arm.sh deleted file mode 100755 index c9f770a..0000000 --- a/common/scripts/build-fwts-arm.sh +++ /dev/null @@ -1,141 +0,0 @@ -#!/usr/bin/env bash - -# Copyright (c) 2021-2022, ARM Limited and Contributors. All rights reserved. -# -# Redistribution and use in source and binary forms, with or without -# modification, are permitted provided that the following conditions are met: -# -# Redistributions of source code must retain the above copyright notice, this -# list of conditions and the following disclaimer. -# -# Redistributions in binary form must reproduce the above copyright notice, -# this list of conditions and the following disclaimer in the documentation -# and/or other materials provided with the distribution. -# -# Neither the name of ARM nor the names of its contributors may be used -# to endorse or promote products derived from this software without specific -# prior written permission. -# -# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" -# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE -# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR -# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF -# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS -# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN -# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) -# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE -# POSSIBILITY OF SUCH DAMAGE. - -# -# This script uses the following environment variables from the variant -# -# VARIANT - build variant name -# TOP_DIR - workspace root directory -# CROSS_COMPILE - PATH to GCC including CROSS-COMPILE prefix -# PARALLELISM - number of cores to build across - -TOP_DIR=`pwd` -FWTS_PATH=fwts -FWTS_BINARY=fwts_output -RAMDISK_PATH=ramdisk -FWTS_DEP=$RAMDISK_PATH/fwts_build_dep-arm - -. $TOP_DIR/../../common/config/common_config.cfg -. $TOP_DIR/../../common/scripts/cross_toolchain-arm.sh - -# Only build Full SystemReady IR -BUILD_PLAT=IR -BUILD_TYPE=F - -BBR_DIR=$TOP_DIR/bbr-acs - -init() -{ - if [[ $BUILD_TYPE = S ]]; then - mkdir -p $TOP_DIR/$RAMDISK_PATH - fi - cp -r $BBR_DIR/common/fwts_build_dep-arm $RAMDISK_PATH - - # Copy the libraries fwts needs at runtime. - mkdir -pv $RAMDISK_PATH/fwts_build_dep-arm/cross_libs - - for f in libc.so.6 ld-linux-armhf.so.3 libpthread.so.0 libm.so.6; do - cp -v "$CROSS_COMPILE_DIR/../arm-linux-gnueabihf/libc/lib/$f" "$RAMDISK_PATH/fwts_build_dep-arm/cross_libs/" - done -} - -do_build() -{ - pushd $TOP_DIR/$FWTS_PATH - DEF_PATH=$PATH - PATH=$(getconf PATH) #Reset path to avoid cross compiler mismatch - PATH="$PATH:$CROSS_COMPILE_DIR" - - echo $BBR_DIR - - if ! patch -R -s -f --dry-run -p1 < $BBR_DIR/ebbr/config/IR_VER.patch ; then - echo "Applying FWTS Patch ..." - patch -p1 < $BBR_DIR/ebbr/config/IR_VER.patch - fi - - #The below patch is temporary and shall be removed once a permanent solution - #in FWTS codebase is found - if ! patch -R -s -f --dry-run -p1 < $BBR_DIR/common/patches/0001-Fix-for-FWTS-build-issue.patch; then - echo "Applying FWTS build patch ..." - patch -p1 < $BBR_DIR/common/patches/0001-Fix-for-FWTS-build-issue.patch - fi - - if ! patch -R -s -f --dry-run -p1 < $BBR_DIR/common/patches/0001-Build-only-what-we-use-to-test-EBBR-on-32b-arm.patch; then - echo "Applying FWTS EBBR on 32b arm patch ..." - patch -p1 < $BBR_DIR/common/patches/0001-Build-only-what-we-use-to-test-EBBR-on-32b-arm.patch - fi - - mkdir -p $FWTS_BINARY - mkdir -p $FWTS_BINARY/bash - autoreconf -ivf - export ac_cv_func_malloc_0_nonnull=yes - export ac_cv_func_realloc_0_nonnull=yes - ./configure --host=arm-linux-gnueabihf \ - --enable-static=yes CPPFLAGS="-I$TOP_DIR/$FWTS_DEP/include" CFLAGS="-g -O2" \ - --prefix=$TOP_DIR/$FWTS_PATH/$FWTS_BINARY \ - --exec-prefix=$TOP_DIR/$FWTS_PATH/$FWTS_BINARY \ - --datarootdir=$TOP_DIR/$FWTS_PATH/$FWTS_BINARY \ - --with-bashcompletiondir=$TOP_DIR/$FWTS_PATH/$FWTS_BINARY/bash - - make install - PATH=$DEF_PATH #Restore def path - popd -} - -do_clean() -{ - pushd $TOP_DIR/$FWTS_PATH - - if [ -f "$TOP_DIR/$FWTS_PATH/Makefile" ]; then - make clean - fi - if [ -f "$TOP_DIR/$FWTS_PATH/$FWTS_BINARY/bin/fwts" ]; then - make uninstall - fi - rm -rf $TOP_DIR/$RAMDISK_PATH/$FWTS_BINARY - popd -} - -do_package () -{ - echo "Packaging FWTS... $VARIANT"; - if [[ $BUILD_TYPE = F ]]; then - sed -i '/ir_bbr_fwts_tests.ini/d' $TOP_DIR/ramdisk/files-arm.txt - #Add the entry in file-arm.txt of ramdisk - echo "file /bin/ir_bbr_fwts_tests.ini ./fwts_output/bin/ir_bbr_fwts_tests.ini 766 0 0" >> $TOP_DIR/ramdisk/files-arm.txt - cp $BBR_DIR/ebbr/config/ir_bbr_fwts_tests.ini $TOP_DIR/$FWTS_PATH/$FWTS_BINARY/bin - fi - cp -R $TOP_DIR/$FWTS_PATH/$FWTS_BINARY ramdisk - chmod 777 -R $TOP_DIR/$RAMDISK_PATH/$FWTS_BINARY -} - -DIR=$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd ) -init -source $DIR/framework.sh $BUILD_PLAT $BUILD_TYPE diff --git a/common/scripts/build-uefi-apps-arm.sh b/common/scripts/build-uefi-apps-arm.sh deleted file mode 100755 index 124078e..0000000 --- a/common/scripts/build-uefi-apps-arm.sh +++ /dev/null @@ -1,112 +0,0 @@ -#!/usr/bin/env bash - -# Copyright (c) 2021, ARM Limited and Contributors. All rights reserved. -# -# Redistribution and use in source and binary forms, with or without -# modification, are permitted provided that the following conditions are met: -# -# Redistributions of source code must retain the above copyright notice, this -# list of conditions and the following disclaimer. -# -# Redistributions in binary form must reproduce the above copyright notice, -# this list of conditions and the following disclaimer in the documentation -# and/or other materials provided with the distribution. -# -# Neither the name of ARM nor the names of its contributors may be used -# to endorse or promote products derived from this software without specific -# prior written permission. -# -# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" -# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE -# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR -# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF -# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS -# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN -# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) -# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE -# POSSIBILITY OF SUCH DAMAGE. - -# -# This script uses the following environment variables from the variant -# -# VARIANT - build variant name -# TOP_DIR - workspace root directory -# CROSS_COMPILE - PATH to GCC including CROSS-COMPILE prefix -# PARALLELISM - number of cores to build across -# UEFI_BUILD_ENABLED - Flag to enable building UEFI -# UEFI_PATH - sub-directory containing UEFI code -# UEFI_BUILD_MODE - DEBUG or RELEASE -# UEFI_TOOLCHAIN - Toolchain supported by Linaro uefi-tools: GCC49, GCC48 or GCC47 -# UEFI_PLATFORMS - List of platforms to build -# UEFI_PLAT_{platform name} - array of platform parameters: -# - platname - the name of the platform used by the build -# - makefile - the makefile to execute for this platform -# - output - where to store the files in packaging phase -# - defines - extra platform defines during the build -# - binary - what to call the final output binary - -TOP_DIR=`pwd` -UEFI_PATH=edk2 -UEFI_TOOLCHAIN=GCC5 -UEFI_BUILD_MODE=DEBUG -TARGET_ARCH=ARM - -. $TOP_DIR/../../common/config/common_config.cfg -. $TOP_DIR/../../common/scripts/cross_toolchain-arm.sh - -# Onlt build Full SystemReady IR -BUILD_PLAT=IR -BUILD_TYPE=F - -echo "Target: $BUILD_PLAT" -echo "Build type: $BUILD_TYPE" - -if [[ $BUILD_TYPE = S ]]; then - BBR_DIR=$TOP_DIR/../../ -else - BBR_DIR=$TOP_DIR/bbr-acs -fi - -do_build() -{ - pushd $TOP_DIR/$UEFI_PATH - - export EDK2_TOOLCHAIN=$UEFI_TOOLCHAIN - export ${UEFI_TOOLCHAIN}_ARM_PREFIX=$CROSS_COMPILE - local vars= - export PACKAGES_PATH=$TOP_DIR/$UEFI_PATH - export PYTHON_COMMAND=/usr/bin/python3 - export WORKSPACE=$TOP_DIR/$UEFI_PATH - - #Build base tools - source $TOP_DIR/$UEFI_PATH/edksetup.sh - make -C $TOP_DIR/$UEFI_PATH/BaseTools - - build -a $TARGET_ARCH -t $EDK2_TOOLCHAIN -p MdeModulePkg/MdeModulePkg.dsc - popd -} - -do_clean() -{ - pushd $TOP_DIR/$UEFI_PATH - source $TOP_DIR/$UEFI_PATH/edksetup.sh - make -C $TOP_DIR/$UEFI_PATH/BaseTools clean - popd -} - -do_package () -{ - echo "Packaging..."; - - if [ -f $TOP_DIR/$UEFI_PATH/Build/MdeModule/${UEFI_BUILD_MODE}_${UEFI_TOOLCHAIN}/${TARGET_ARCH}/CapsuleApp.efi ]; then - echo "CapsuleApp.efi successfully generated at $TOP_DIR/$UEFI_PATH/Build/MdeModule/${UEFI_BUILD_MODE}_${UEFI_TOOLCHAIN}/${TARGET_ARCH}/CapsuleApp.efi" - else - echo "Error: CapsuleApp.efi could not be generated. Please check the logs" - fi - -} - -DIR=$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd ) -source $DIR/framework.sh $BUILD_PLAT $BUILD_TYPE diff --git a/common/sct-tests/sbbr-tests/BBR_SCT_arm.dsc b/common/sct-tests/sbbr-tests/BBR_SCT_arm.dsc deleted file mode 100755 index 3c21d6f..0000000 --- a/common/sct-tests/sbbr-tests/BBR_SCT_arm.dsc +++ /dev/null @@ -1,619 +0,0 @@ -# -# The material contained herein is not a license, either -# expressly or impliedly, to any intellectual property owned -# or controlled by any of the authors or developers of this -# material or to any contribution thereto. The material -# contained herein is provided on an "AS IS" basis and, to the -# maximum extent permitted by applicable law, this information -# is provided AS IS AND WITH ALL FAULTS, and the authors and -# developers of this material hereby disclaim all other -# warranties and conditions, either express, implied or -# statutory, including, but not limited to, any (if any) -# implied warranties, duties or conditions of merchantability, -# of fitness for a particular purpose, of accuracy or -# completeness of responses, of results, of workmanlike -# effort, of lack of viruses and of lack of negligence, all -# with regard to this material and any contribution thereto. -# Designers must not rely on the absence or characteristics of -# any features or instructions marked "reserved" or -# "undefined." The Unified EFI Forum, Inc. reserves any -# features or instructions so marked for future definition and -# shall have no responsibility whatsoever for conflicts or -# incompatibilities arising from future changes to them. ALSO, -# THERE IS NO WARRANTY OR CONDITION OF TITLE, QUIET ENJOYMENT, -# QUIET POSSESSION, CORRESPONDENCE TO DESCRIPTION OR -# NON-INFRINGEMENT WITH REGARD TO THE TEST SUITE AND ANY -# CONTRIBUTION THERETO. -# -# IN NO EVENT WILL ANY AUTHOR OR DEVELOPER OF THIS MATERIAL OR -# ANY CONTRIBUTION THERETO BE LIABLE TO ANY OTHER PARTY FOR -# THE COST OF PROCURING SUBSTITUTE GOODS OR SERVICES, LOST -# PROFITS, LOSS OF USE, LOSS OF DATA, OR ANY INCIDENTAL, -# CONSEQUENTIAL, DIRECT, INDIRECT, OR SPECIAL DAMAGES WHETHER -# UNDER CONTRACT, TORT, WARRANTY, OR OTHERWISE, ARISING IN ANY -# WAY OUT OF THIS OR ANY OTHER AGREEMENT RELATING TO THIS -# DOCUMENT, WHETHER OR NOT SUCH PARTY HAD ADVANCE NOTICE OF -# THE POSSIBILITY OF SUCH DAMAGES. -# -# Copyright 2006 - 2016 Unified EFI, Inc. All -# Rights Reserved, subject to all existing rights in all -# matters included within this Test Suite, to which United -# EFI, Inc. makes no claim of right. -# -# Copyright (c) 2010 - 2016, Intel Corporation. All rights reserved.
-# -# Copyright (c) 2016-2020, ARM Ltd. All rights reserved.
-# -# -#/*++ -# -# Module Name: -# -# BBR_SCT_arm.dsc -# -# Abstract: -# -# This is a build description file used to build the test modules of BBR SCT. -# -# Notes: -# -# The info in this file is broken down into sections. The start of a section -# is designated by a "[" in the first column. So the [=====] separater ends -# a section. -# -#--*/ - -################################################################################ -# -# Defines Section - statements that will be processed to create a Makefile. -# -################################################################################ -[Defines] - PLATFORM_NAME = bbrSct - PLATFORM_GUID = d513138b-9d4a-479c-8058-4a5160018663 - PLATFORM_VERSION = 0.1 - DSC_SPECIFICATION = 0x00010005 - OUTPUT_DIRECTORY = Build/bbrSct - SUPPORTED_ARCHITECTURES = AARCH64|ARM - BUILD_TARGETS = DEBUG|RELEASE - SKUID_IDENTIFIER = DEFAULT - - DEFINE GCC_VER_MACRO = -D EFI_SPECIFICATION_VERSION=0x00020028 -D TIANO_RELEASE_VERSION=0x00080006 - DEFINE MSFT_VER_MACRO = /D EFI_SPECIFICATION_VERSION=0x00020028 /D TIANO_RELEASE_VERSION=0x00080006 - - -################################################################################ -# -# SKU Identification section - list of all SKU IDs supported by this -# Platform. -# -################################################################################ -[SkuIds] - 0|DEFAULT # The entry: 0|DEFAULT is reserved and always required. - -[BuildOptions] - *_*_AARCH64_CC_FLAGS = -D EFIAARCH64 -I$(WORKSPACE)/MdePkg/Include/AArch64 $(GCC_VER_MACRO) - GCC:*_*_AARCH64_CC_FLAGS = -D EFIAARCH64 $(GCC_VER_MACRO) -ffreestanding -nostdinc -nostdlib -Wno-error=unused-function -Wno-error=unused-but-set-variable -Wno-error - *_*_AARCH64_VFRPP_FLAGS = -D EFIAARCH64 $(GCC_VER_MACRO) - *_*_AARCH64_APP_FLAGS = -D EFIAARCH64 $(GCC_VER_MACRO) - *_*_AARCH64_PP_FLAGS = -D EFIAARCH64 $(GCC_VER_MACRO) - RVCT:*_*_AARCH64_DLINK_FLAGS = --muldefweak - - #TODO: OM - fixme RVCT:*_*_ARM_CC_FLAGS = -D EFIARM $(GCC_VER_MACRO) - *_*_ARM_CC_FLAGS = -D EFIARM - GCC:*_*_ARM_CC_FLAGS = -D EFIARM $(GCC_VER_MACRO) -fno-stack-protector -ffreestanding -nostdinc -nostdlib -Wno-error=unused-function -Wno-error=unused-but-set-variable -Wno-error=implicit-function-declaration -Wno-error - *_*_ARM_VFRPP_FLAGS = -D EFIARM $(GCC_VER_MACRO) - *_*_ARM_APP_FLAGS = -D EFIARM $(GCC_VER_MACRO) - *_*_ARM_PP_FLAGS = -D EFIARM $(GCC_VER_MACRO) - - RVCT:*_*_ARM_DLINK_FLAGS = --muldefweak -# 167: "argument of type is incompatible with parameter of type # " -# (caused here by passing typed pointers to functions that take "void *" or "void **") -# 1295: "provide arguments" (i.e. `UINTN Function ()` should be `UINTN Function (VOID)`) -# 188: "enumerated type mixed with another type" -# (i.e. passing an integer as an enum without a cast) -# 550: "variable was set but never used" -# 1: "last line of file ends without a newline" -# 68: "integer conversion resulted in a change of sign" ("if (Status == -1)") -# 111: "statement is unreachable" (invariably "break;" after "return X;" in case statement) -# 177: "function was declared but never referenced" - RVCT:*_*_ARM_CC_FLAGS = --diag_remark=167 --diag_suppress=167,1295,188,550,1,68,111,177 - - - DEBUG_*_*_CC_FLAGS = -DEFI_DEBUG -DACS_VERSION=\"v1.0\" - RELEASE_*_*_CC_FLAGS = -DMDEPKG_NDEBUG -DACS_VERSION=\"v1.0\" - -[Libraries] - SctPkg/Library/SctLib/SctLib.inf - SctPkg/Library/SctGuidLib/SctGuidLib.inf - SctPkg/Library/EfiTestLib/EfiTestLib.inf - - SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/EntsLib.inf - - MdePkg/Library/BaseDebugLibNull/BaseDebugLibNull.inf - -[Libraries.ARM] - ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf - -[Libraries.AARCH64] - ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf - -[LibraryClasses.common] - UefiApplicationEntryPoint|MdePkg/Library/UefiApplicationEntryPoint/UefiApplicationEntryPoint.inf - UefiDriverEntryPoint|MdePkg/Library/UefiDriverEntryPoint/UefiDriverEntryPoint.inf - UefiBootServicesTableLib|MdePkg/Library/UefiBootServicesTableLib/UefiBootServicesTableLib.inf - BaseLib|MdePkg/Library/BaseLib/BaseLib.inf - BaseMemoryLib|MdePkg/Library/BaseMemoryLib/BaseMemoryLib.inf - DebugLib|MdePkg/Library/BaseDebugLibNull/BaseDebugLibNull.inf - PcdLib|MdePkg/Library/BasePcdLibNull/BasePcdLibNull.inf - MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf - UefiRuntimeServicesTableLib|MdePkg/Library/UefiRuntimeServicesTableLib/UefiRuntimeServicesTableLib.inf - UefiHiiServicesLib|MdeModulePkg/Library/UefiHiiServicesLib/UefiHiiServicesLib.inf - HiiLib|MdeModulePkg/Library/UefiHiiLib/UefiHiiLib.inf - PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf - UefiLib|MdePkg/Library/UefiLib/UefiLib.inf - DevicePathLib|MdePkg/Library/UefiDevicePathLib/UefiDevicePathLib.inf - - SctLib|SctPkg/Library/SctLib/SctLib.inf - NetLib|SctPkg/Library/NetLib/NetLib.inf - EntsLib|SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/EntsLib.inf - EasLib|SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasDispatcher/Eas.inf - EfiTestLib|SctPkg/Library/EfiTestLib/EfiTestLib.inf - -[LibraryClasses.ARM] - NULL|ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf - ArmLib|ArmPkg/Library/ArmLib/ArmBaseLib.inf - -[LibraryClasses.AARCH64] - NULL|ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf - ArmLib|ArmPkg/Library/ArmLib/ArmBaseLib.inf - -############################################################################### -# -# These are the components that will be built by the master makefile -# -############################################################################### - -[Components] - -# -# The default package -# -DEFINE PACKAGE=Default - -# -# Components -# - -# -# Following are the SCT suite & related drivers -# - -SctPkg/TestInfrastructure/SCT/Framework/Sct.inf -SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.inf -SctPkg/TestInfrastructure/SCT/Drivers/TestProfile/TestProfile.inf -SctPkg/TestInfrastructure/SCT/Drivers/TestRecovery/TestRecovery.inf -SctPkg/TestInfrastructure/SCT/Drivers/TestLogging/TestLogging.inf - -# -# Related SCT applications -# - -SctPkg/Application/InstallSct/InstallSct.inf -SctPkg/Application/StallForKey/StallForKey.inf - -SctPkg/SCRT/SCRTApp/SCRTApp.inf -SctPkg/SCRT/SCRTDriver/SCRTDriver.inf - -# -# Test cases for UEFI SCT and UEFI/EFI SCT -# - -SctPkg/TestCase/UEFI/EFI/Generic/EfiCompliant/BlackBoxTest/EfiCompliantBBTest_uefi.inf -SctPkg/TestCase/UEFI/EFI/BootServices/EventTimerTaskPriorityServices/BlackBoxTest/EventTimerTaskPriorityServicesBBTest_uefi.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/ImageBBTest.inf -SctPkg/TestCase/UEFI/EFI/BootServices/MemoryAllocationServices/BlackBoxTest/MemoryAllocationServicesBBTest.inf -SctPkg/TestCase/UEFI/EFI/BootServices/MiscBootServices/BlackBoxTest/MiscBootServicesBBTest.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/ProtocolHandlerBBTest.inf - -SctPkg/TestCase/UEFI/EFI/RuntimeServices/MiscRuntimeServices/BlackBoxTest/MiscRuntimeServicesBBTest.inf -SctPkg/TestCase/UEFI/EFI/RuntimeServices/TimeServices/BlackBoxTest/TimeServicesBBTest.inf -SctPkg/TestCase/UEFI/EFI/RuntimeServices/VariableServices/BlackBoxTest/VariableServicesBBTest.inf - -SctPkg/TestCase/UEFI/EFI/Protocol/GraphicsOutput/BlackBoxTest/GraphicsOutputBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/Bis/BlackBoxTest/BisBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/BlockIo/BlackBoxTest/BlockIoBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/BlockIo2/BlackBoxTest/BlockIo2BBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/BusSpecificDriverOverride/BlackBoxTest/BusSpecificDriverOverrideBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/DebugPort/BlackBoxTest/DebugPortBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/DebugSupportBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/Decompress/BlackBoxTest/DecompressBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/DevicePath/BlackBoxTest/DevicePathBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/DevicePathUtilities/BlackBoxTest/DevicePathUtilitiesBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/DevicePathToText/BlackBoxTest/DevicePathToTextBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/DevicePathFromText/BlackBoxTest/DevicePathFromTextBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/DiskIo/BlackBoxTest/DiskIoBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/DiskIo2/BlackBoxTest/DiskIo2BBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/Ebc/BlackBoxTest/EbcBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/LoadedImage/BlackBoxTest/LoadedImageBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/LoadFile/BlackBoxTest/LoadFileBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/PciIo/BlackBoxTest/PciIoBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/PciRootBridgeIo/BlackBoxTest/PciRootBridgeIoBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/PlatformDriverOverride/BlackBoxTest/PlatformDriverOverrideBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/PxeBaseCode/BlackBoxTest/PxeBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/ScsiIo/BlackBoxTest/ScsiIoBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/ExtScsiPassThru/BlackBoxTest/ExtScsiPassThruBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/iScsiInitiatorName/BlackBoxTest/iScsiInitiatorNameBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/SerialIo/BlackBoxTest/SerialIoBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/SimpleNetwork/BlackBoxTest/SimpleNetworkBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/SimpleFileSystem/BlackBoxTest/SimpleFileSystemBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/SimplePointer/BlackBoxTest/SimplePointerBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/SimpleTextIn/BlackBoxTest/SimpleTextInBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/SimpleTextOut/BlackBoxTest/SimpleTextOutBBTest_uefi.inf -SctPkg/TestCase/UEFI/EFI/Protocol/UnicodeCollation2/BlackBoxTest/UnicodeCollation2BBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/RegularExpression/BlackBoxTest/RegularExpressionBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/Usb2Hc/BlackBoxTest/Usb2HcTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/UsbIo/BlackBoxTest/UsbIoTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/Authentication/BlackBoxTest/AuthenticationBBTest.inf -#SctPkg/TestCase/UEFI/EFI/Protocol/Hash/BlackBoxTest/HashBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/Tape/BlackBoxTest/TapeBBTest.inf - -SctPkg/TestCase/UEFI/EFI/Protocol/DriverDiagnostics2/BlackBoxTest/DriverDiagnostics2BBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/ACPITable/BlackBoxTest/AcpiTableProtocolBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/SimpleTextInputEx/BlackBoxTest/SimpleTextInputExBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/ComponentName2/BlackBoxTest/ComponentName2BBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/HIIDatabase/BlackBoxTest/HIIDatabaseBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/HIIString/BlackBoxTest/HIIStringBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/HIIImage/BlackBoxTest/HIIImageBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/HIIImageEx/BlackBoxTest/HIIImageExBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/HIIFont/BlackBoxTest/HIIFontBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/HIIFontEx/BlackBoxTest/HIIFontExBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/HIIConfigAccess/BlackBoxTest/HIIConfigAccessBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/HIIConfigRouting/BlackBoxTest/HIIConfigRoutingBBTest.inf - -SctPkg/TestCase/UEFI/EFI/Protocol/VlanConfig/BlackBoxTest/VlanConfigBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/IPsecConfig/BlackBoxTest/IPsecConfigBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/IPsec2/BlackBoxTest/IPsec2BBTest.inf - -SctPkg/TestCase/UEFI/EFI/Protocol/AbsolutePointer/BlackBoxTest/AbsolutePointerBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/PlatformToDriverConfiguration/BlackBoxTest/PlatformToDriverConfigurationBBTest.inf - -SctPkg/TestCase/UEFI/EFI/Protocol/FirmwareManagement/BlackBoxTest/FirmwareManagementBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/AtaPassThru/BlackBoxTest/AtaPassThruBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/StorageSecurityCommand/BlackBoxTest/StorageSecurityCommandBBTest.inf - -SctPkg/TestCase/UEFI/EFI/Protocol/AdapterInfo/BlackBoxTest/AdapterInfoProtocolBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/TimeStamp/BlackBoxTest/TimeStampProtocolBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/RandomNumber/BlackBoxTest/RandomNumberBBTest.inf - -SctPkg/TestCase/UEFI/EFI/Protocol/Hash2/BlackBoxTest/Hash2BBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/PKCS7Verify/BlackBoxTest/Pkcs7BBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/ConfigKeywordHandler/BlackBoxTest/ConfigKeywordHandlerBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/RamDisk/BlackBoxTest/RamDiskProtocolBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/NVMEPassThru/BlackBoxTest/NVMEPassThruBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/EraseBlock/BlackBoxTest/EraseBlockBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/SDMMCPassThru/BlackBoxTest/SDMMCPassThruBBTest.inf - -SctPkg/TestCase/UEFI/EFI/Protocol/PartitionInfo/BlackBoxTest/PartitionInfoBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/UFSDeviceConfig/BlackBoxTest/UFSDeviceConfigBBTest.inf -SctPkg/TestCase/UEFI/EFI/Protocol/ResetNotification/BlackBoxTest/ResetNotificationBBTest.inf -# -# Dependency files for UEFI/EFI Compliant Test -# - -SctPkg/TestCase/UEFI/EFI/Generic/EfiCompliant/BlackBoxTest/Dependency/Config/Config.inf - -# -# Dependency files for Image Services Test -# - -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/LoadFile/LoadFile.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/Application1/Application1.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/Application2/Application2.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/Application3/Application3.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/Application4/Application4.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/BootServicesDriver1/BootServicesDriver1.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/BootServicesDriver2/BootServicesDriver2.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/BootServicesDriver3/BootServicesDriver3.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/BootServicesDriver4/BootServicesDriver4.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/BootServicesDriver5/BootServicesDriver5.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/BootServicesDriver6/BootServicesDriver6.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/RuntimeServicesDriver1/RuntimeServicesDriver1.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/RuntimeServicesDriver2/RuntimeServicesDriver2.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/RuntimeServicesDriver3/RuntimeServicesDriver3.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/RuntimeServicesDriver4/RuntimeServicesDriver4.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/RuntimeServicesDriver5/RuntimeServicesDriver5.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/RuntimeServicesDriver6/RuntimeServicesDriver6.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/CombinationImage1/CombinationImage1.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/CombinationImage2/CombinationImage2.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/CombinationImage3/CombinationImage3.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/CombinationImage4/CombinationImage4.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/CombinationImage5/CombinationImage5.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/CombinationImage6/CombinationImage6.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/CombinationImage7/CombinationImage7.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/CombinationImage8/CombinationImage8.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/CombinationImage9/CombinationImage9.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/CombinationImage10/CombinationImage10.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/InvalidImage1/InvalidImage1.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/InvalidImage2/InvalidImage2.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/InvalidImage3/InvalidImage3.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/InvalidImage4/InvalidImage4.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/InvalidImage5/InvalidImage5.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/InvalidImage6/InvalidImage6.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/InvalidImage7/InvalidImage7.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/ValidHiiImage1/ValidHiiImage1.inf -#SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/Dependency/VeryLargeImage1/VeryLargeImage1.inf - - -# -# Dependency files for Protocol Handler Services Test -# - -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/BusDriver1/BusDriver1.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/BusDriver2/BusDriver2.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/BusDriver3/BusDriver3.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/BusDriver4/BusDriver4.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DBindingDriver1/DBindingDriver1.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DBindingDriver2/DBindingDriver2.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DBindingDriver3/DBindingDriver3.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DBindingDriver4/DBindingDriver4.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DBindingDriver5/DBindingDriver5.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver1/DeviceDriver1.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver2/DeviceDriver2.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver3/DeviceDriver3.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver4/DeviceDriver4.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver5/DeviceDriver5.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver6/DeviceDriver6.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver7/DeviceDriver7.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver11/DeviceDriver11.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver12/DeviceDriver12.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver13/DeviceDriver13.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver14/DeviceDriver14.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver15/DeviceDriver15.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver18/DeviceDriver18.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver19/DeviceDriver19.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver110/DeviceDriver110.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/DeviceDriver111/DeviceDriver111.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/TestDriver1/TestDriver1.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/TestDriver2/TestDriver2.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/TestDriver3/TestDriver3.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/TestDriver4/TestDriver4.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/TestDriver5/TestDriver5.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/PlatformOverrideDriver1/PlatformOverrideDriver1.inf -SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/Dependency/BusOverrideDriver1/BusOverrideDriver1.inf - -# -# Dependency files for Decompress Protocol Test -# - -SctPkg/TestCase/UEFI/EFI/Protocol/Decompress/BlackBoxTest/Dependency/Config/Config.inf -SctPkg/TestCase/UEFI/EFI/Protocol/Decompress/BlackBoxTest/Dependency/CompressedFile1/CompressedFile1.inf -SctPkg/TestCase/UEFI/EFI/Protocol/Decompress/BlackBoxTest/Dependency/CompressedFile2/CompressedFile2.inf -SctPkg/TestCase/UEFI/EFI/Protocol/Decompress/BlackBoxTest/Dependency/UncompressedFile1/UncompressedFile1.inf -SctPkg/TestCase/UEFI/EFI/Protocol/Decompress/BlackBoxTest/Dependency/UncompressedFile2/UncompressedFile2.inf -SctPkg/TestCase/UEFI/EFI/Protocol/Decompress/BlackBoxTest/Dependency/InvalidCompressedFile1/InvalidCompressedFile1.inf - -# -# Dependency files for EBC Protocol Test -# -SctPkg/TestCase/UEFI/EFI/Protocol/Ebc/BlackBoxTest/Dependency/EbcDriverBin/EbcDriverBin.inf - -# -# Dependency files for Loaded Image Protocol Test -# - -SctPkg/TestCase/UEFI/EFI/Protocol/LoadedImage/BlackBoxTest/Dependency/Application1/Application1.inf -SctPkg/TestCase/UEFI/EFI/Protocol/LoadedImage/BlackBoxTest/Dependency/Application2/Application2.inf -SctPkg/TestCase/UEFI/EFI/Protocol/LoadedImage/BlackBoxTest/Dependency/BootServicesDriver1/BootServicesDriver1.inf -SctPkg/TestCase/UEFI/EFI/Protocol/LoadedImage/BlackBoxTest/Dependency/BootServicesDriver2/BootServicesDriver2.inf -SctPkg/TestCase/UEFI/EFI/Protocol/LoadedImage/BlackBoxTest/Dependency/RuntimeServicesDriver1/RuntimeServicesDriver1.inf -SctPkg/TestCase/UEFI/EFI/Protocol/LoadedImage/BlackBoxTest/Dependency/RuntimeServicesDriver2/RuntimeServicesDriver2.inf - -# -# Dependency files for PCI IO Protocol Test -# - -SctPkg/TestCase/UEFI/EFI/Protocol/PciIo/BlackBoxTest/Dependency/Config/Config.inf -SctPkg/TestCase/UEFI/EFI/Protocol/PciIo/BlackBoxTest/Dependency/MakeConfigWritable/MakeConfigWritable.inf - -# -# Dependency files for PCI Root Bridge IO Protocol Test -# - -SctPkg/TestCase/UEFI/EFI/Protocol/PciRootBridgeIo/BlackBoxTest/Dependency/Config/Config.inf - -# -# Dependency files for PXE Base Code Protocol Test -# -SctPkg/TestCase/UEFI/EFI/Protocol/PxeBaseCode/BlackBoxTest/Dependency/Config/Config.inf - -# -# Dependency files for Config Keyword Handler Protocol Test -# -SctPkg/TestCase/UEFI/EFI/Protocol/ConfigKeywordHandler/BlackBoxTest/Dependency/SampleDriver/DriverSampleDxe.inf - -# -# Support Files -# -SctPkg/TestInfrastructure/SCT/Framework/ENTS/Eftp/Eftp.inf -SctPkg/TestInfrastructure/SCT/Framework/ENTS/MonitorServices/SerialMonitor/SerialMonitor.inf -SctPkg/TestInfrastructure/SCT/Framework/ENTS/MonitorServices/ManagedNetworkMonitor/ManagedNetworkMonitor.inf -SctPkg/TestInfrastructure/SCT/Framework/ENTS/MonitorServices/IP4NetworkMonitor/IP4NetworkMonitor.inf - - -# -# Test Cases for RIVL (Only for UEFI SCT) -# - -SctPkg/TestCase/RIVL/BootService/BootServiceENTSTest.inf -SctPkg/TestCase/RIVL/RuntimeService/RuntimeServiceENTSTest.inf -SctPkg/TestCase/RIVL/GenericService/GenericServiceENTSTest.inf - -SctPkg/TestCase/RIVL/Protocol/SimpleNetwork/SimpleNetworkENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/PXEBaseCode/PXEBaseCodeENTSTest.inf - -SctPkg/TestCase/RIVL/Protocol/AddressResolutionProtocol/Arp/ArpENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/AddressResolutionProtocol/ArpServiceBinding/ArpServiceBindingENTSTest.inf - -SctPkg/TestCase/RIVL/Protocol/InternetProtocol4/Ip4/Ip4ENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/InternetProtocol4/Ip4Config/Ip4ConfigENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/InternetProtocol4/Ip4Config2/Ip4Config2ENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/InternetProtocol4/Ip4ServiceBinding/Ip4ServiceBindingENTSTest.inf - -SctPkg/TestCase/RIVL/Protocol/InternetProtocol6/Ip6/Ip6ENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/InternetProtocol6/Ip6Config/Ip6ConfigENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/InternetProtocol6/Ip6ServiceBinding/Ip6ServiceBindingENTSTest.inf - -SctPkg/TestCase/RIVL/Protocol/ManagedNetwork/MNP/MnpENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/ManagedNetwork/MNPSB/MnpSBENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/Dhcp4/Dhcp4/Dhcp4ENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/Dhcp4/Dhcp4SB/Dhcp4SBENTSTest.inf - -SctPkg/TestCase/RIVL/Protocol/Dhcp6/Dhcp6/Dhcp6ENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/Dhcp6/Dhcp6SB/Dhcp6SBENTSTest.inf - -SctPkg/TestCase/RIVL/Protocol/Udp4/Udp4/Udp4ENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/Udp4/Udp4ServiceBinding/Udp4ServiceBindingENTSTest.inf - -SctPkg/TestCase/RIVL/Protocol/Udp6/Udp6/Udp6ENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/Udp6/Udp6ServiceBinding/Udp6ServiceBindingENTSTest.inf - -SctPkg/TestCase/RIVL/Protocol/Mtftp4/Mtftp4/Mtftp4ENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/Mtftp4/Mtftp4ServiceBinding/Mtftp4ServiceBindingENTSTest.inf - -SctPkg/TestCase/RIVL/Protocol/Mtftp6/Mtftp6/Mtftp6ENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/Mtftp6/Mtftp6ServiceBinding/Mtftp6ServiceBindingENTSTest.inf - -SctPkg/TestCase/RIVL/Protocol/Tcp4/Tcp4/Tcp4ENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/Tcp4/Tcp4ServiceBinding/Tcp4ServiceBindingENTSTest.inf - -SctPkg/TestCase/RIVL/Protocol/Tcp6/Tcp6/Tcp6ENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/Tcp6/Tcp6ServiceBinding/Tcp6ServiceBindingENTSTest.inf - -SctPkg/TestCase/RIVL/Protocol/Http/Http/HttpENTSTest.inf -SctPkg/TestCase/RIVL/Protocol/Http/HttpServiceBinding/HttpServiceBindingENTSTest.inf - - -# -# Test cases for SBBR SCT -# - -# Boot Services Tests - SBBR v1.0 Appendix A -# -## 1. EFI_RAISE_TPL -## 2. EFI_RESTORE_TPL -## 3. EFI_CREATE_EVENT -## 4. EFI_SET_TIMER -## 5. EFI_WAIT_FOR_EVENT -## 6. EFI_SIGNAL_EVENT -## 7. EFI_CLOSE_EVENT -## 8. EFI_CREATE_EVENT_EX -#SctPkg/TestCase/UEFI/EFI/BootServices/EventTimerTaskPriorityServices/BlackBoxTest/EventTimerTaskPriorityServicesBBTest_uefi.inf -# -## 9. EFI_IMAGE_LOAD -## 10. EFI_IMAGE_START -## 11. EFI_EXIT -## 12. EFI_IMAGE_UNLOAD -## 13. EFI_EXIT_BOOT_SERVICES -#SctPkg/TestCase/UEFI/EFI/BootServices/ImageServices/BlackBoxTest/ImageBBTest.inf -# -## 14. EFI_ALLOCATE_PAGES -## 15. EFI_FREE_PAGES -## 16. EFI_GET_MEMORY_MAP -## 17. EFI_ALLOCATE_POOL -## 18. EFI_FREE_POOL -#SctPkg/TestCase/UEFI/EFI/BootServices/MemoryAllocationServices/BlackBoxTest/MemoryAllocationServicesBBTest.inf -# -## 19. EFI_INSTALL_CONFIGURATION_TABLE -## 20. EFI_GET_NEXT_MONOTONIC_COUNT -## 21. EFI_STALL -## 22. EFI_SET_WATCHDOG_TIMER -## 23. EFI_CALCULATE_CRC32 -## 24. EFI_COPY_MEM -## 25. EFI_SET_MEM -#SctPkg/TestCase/UEFI/EFI/BootServices/MiscBootServices/BlackBoxTest/MiscBootServicesBBTest.inf -# -## 26. EFI_INSTALL_PROTOCOL_INTERFACE -## 27. EFI_REINSTALL_PROTOCOL_INTERFACE -## 28. EFI_UNINSTALL_PROTOCOL_INTERFACE -## 29. EFI_HANDLE_PROTOCOL -## 30. EFI_REGISTER_PROTOCOL_NOTIFY -## 31. EFI_LOCATE_HANDLE -## 32. EFI_LOCATE_PROTOCOL -## 33. EFI_LOCATE_DEVICE_PATH -## 34. EFI_CONNECT_CONTROLLER -## 35. EFI_DISCONNECT_CONTROLLER -## 36. EFI_OPEN_PROTOCOL -## 37. EFI_CLOSE_PROTOCOL -## 38. EFI_OPEN_PROTOCOL_INFORMATION -## 39. EFI_PROTOCOLS_PER_HANDLE -## 40. EFI_LOCATE_HANDLE_BUFFER -## 41. EFI_INSTALL_MULTIPLE_PROTOCOL_INTERFACES -## 42. EFI_UNINSTALL_MULTIPLE_PROTOCOL_INTERFACES -#SctPkg/TestCase/UEFI/EFI/BootServices/ProtocolHandlerServices/BlackBoxTest/ProtocolHandlerBBTest.inf - -# End of Boot Services Tests - SBBR v1.0 Appendix A - -# -# UEFI System Environment and Configuration Tests - SBBR v1.0 3.3 -# -# ARM: disabled for ArmReadCurrentEL wich are not available on ArmLib for 32bits -#SctPkg/TestCase/UEFI/EFI/Generic/SbbrSysEnvConfig/BlackBoxTest/SysEnvConfigBBTest.inf -#End of UEFI System Environment and Configuration Tests - SBBR v1.0 3.3 -# -# Check if EFI Specification Version is 2.7 or greater -SctPkg/TestCase/UEFI/EFI/Generic/SbbrEfiSpecVerLvl/BlackBoxTest/EfiSpecVerLvlBBTest.inf -# -# UEFI Boot Services - SBBR v1.0 3.4 -# -## 3.4.4 Configuration Tables -SctPkg/TestCase/UEFI/EFI/BootServices/SbbrBootServices/BlackBoxTest/SbbrBootServicesBBTest.inf -# End of UEFI Boot Services - SBBR v1.0 3.4 - - - -# -# Required UEFI Runtime Services Tests - SBBR v1.0 Appendix B -# -## 1. EFI_GET_TIME -## 2. EFI_SET_TIME -## 3. EFI_GET_WAKEUP_TIME -## 4. EFI_SET_WAKEUP_TIME -#SctPkg/TestCase/UEFI/EFI/RuntimeServices/TimeServices/BlackBoxTest/TimeServicesBBTest.inf -# -## 5. EFI_GET_VARIABLE -## 6. EFI_GET_NEXT_VARIABLE_NAME -## 7. EFI_SET_VARIABLE -## 8. EFI_QUERY_VARIABLE_INFO -#SctPkg/TestCase/UEFI/EFI/RuntimeServices/VariableServices/BlackBoxTest/VariableServicesBBTest.inf -# -## 9. EFI_QUERY_CAPSULE_CAPABILITIES -## 10. EFI_UPDATE_CAPSULE -## 11. EFI_RESET_SYSTEM -#SctPkg/TestCase/UEFI/EFI/RuntimeServices/MiscRuntimeServices/BlackBoxTest/MiscRuntimeServicesBBTest.inf -# -## 12. EFI_SET_VIRTUAL_ADDRESS_MAP -## 13. EFI_CONVERT_POINTER -# -# UEFI Required Protocols Tests - SBBR Appendix C -# -SctPkg/TestCase/UEFI/EFI/Generic/SbbrRequiredUefiProtocols/BlackBoxTest/RequiredUefiProtocolsBBTest.inf -#SctPkg/TestCase/UEFI/EFI/Generic/EfiCompliant/BlackBoxTest/EfiCompliantBBTest_uefi.inf -## -## Dependency files for UEFI/EFI Compliant Test -## -#SctPkg/TestCase/UEFI/EFI/Generic/EfiCompliant/BlackBoxTest/Dependency/Config/Config.inf -# End of UEFI Required Protocols Tests - SBBR Appendix C - -#SctPkg/TestCase/UEFI/EFI/Protocol/GraphicsOutput/BlackBoxTest/GraphicsOutputBBTest.inf -#SctPkg/TestCase/UEFI/EFI/Protocol/PciIo/BlackBoxTest/PciIoBBTest.inf -#SctPkg/TestCase/UEFI/EFI/Protocol/PciRootBridgeIo/BlackBoxTest/PciRootBridgeIoBBTest.inf -#SctPkg/TestCase/UEFI/EFI/Protocol/DevicePath/BlackBoxTest/DevicePathBBTest.inf - -# -# Support Files -# -#SctPkg/TestInfrastructure/SCT/Framework/ENTS/Eftp/Eftp.inf -#SctPkg/TestInfrastructure/SCT/Framework/ENTS/MonitorServices/SerialMonitor/SerialMonitor.inf -#SctPkg/TestInfrastructure/SCT/Framework/ENTS/MonitorServices/ManagedNetworkMonitor/ManagedNetworkMonitor.inf -#SctPkg/TestInfrastructure/SCT/Framework/ENTS/MonitorServices/IP4NetworkMonitor/IP4NetworkMonitor.inf diff --git a/common/sct-tests/sbbr-tests/build_bbr_arm.sh b/common/sct-tests/sbbr-tests/build_bbr_arm.sh deleted file mode 100755 index 8c4dfc2..0000000 --- a/common/sct-tests/sbbr-tests/build_bbr_arm.sh +++ /dev/null @@ -1,326 +0,0 @@ -#!/bin/bash -# The material contained herein is not a license, either -# expressly or impliedly, to any intellectual property owned -# or controlled by any of the authors or developers of this -# material or to any contribution thereto. The material -# contained herein is provided on an "AS IS" basis and, to the -# maximum extent permitted by applicable law, this information -# is provided AS IS AND WITH ALL FAULTS, and the authors and -# developers of this material hereby disclaim all other -# warranties and conditions, either express, implied or -# statutory, including, but not limited to, any (if any) -# implied warranties, duties or conditions of merchantability, -# of fitness for a particular purpose, of accuracy or -# completeness of responses, of results, of workmanlike -# effort, of lack of viruses and of lack of negligence, all -# with regard to this material and any contribution thereto. -# Designers must not rely on the absence or characteristics of -# any features or instructions marked "reserved" or -# "undefined." The Unified EFI Forum, Inc. reserves any -# features or instructions so marked for future definition and -# shall have no responsibility whatsoever for conflicts or -# incompatibilities arising from future changes to them. ALSO, -# THERE IS NO WARRANTY OR CONDITION OF TITLE, QUIET ENJOYMENT, -# QUIET POSSESSION, CORRESPONDENCE TO DESCRIPTION OR -# NON-INFRINGEMENT WITH REGARD TO THE TEST SUITE AND ANY -# CONTRIBUTION THERETO. -# -# IN NO EVENT WILL ANY AUTHOR OR DEVELOPER OF THIS MATERIAL OR -# ANY CONTRIBUTION THERETO BE LIABLE TO ANY OTHER PARTY FOR -# THE COST OF PROCURING SUBSTITUTE GOODS OR SERVICES, LOST -# PROFITS, LOSS OF USE, LOSS OF DATA, OR ANY INCIDENTAL, -# CONSEQUENTIAL, DIRECT, INDIRECT, OR SPECIAL DAMAGES WHETHER -# UNDER CONTRACT, TORT, WARRANTY, OR OTHERWISE, ARISING IN ANY -# WAY OUT OF THIS OR ANY OTHER AGREEMENT RELATING TO THIS -# DOCUMENT, WHETHER OR NOT SUCH PARTY HAD ADVANCE NOTICE OF -# THE POSSIBILITY OF SUCH DAMAGES. -# -# Copyright 2006 - 2015 Unified EFI, Inc. All -# Rights Reserved, subject to all existing rights in all -# matters included within this Test Suite, to which United -# EFI, Inc. makes no claim of right. -# -# Copyright (c) 2011, 2015-2020 ARM Ltd. All rights reserved.
-# - -SctpackageDependencyList=(SctPkg BaseTools) - -function get_build_arch -{ - case `uname -m` in - aarch64*) - BUILD_ARCH=AARCH64;; - *) - BUILD_ARCH=other;; - esac -} - -function set_cross_compile -{ - get_build_arch - - echo "Target: $SCT_TARGET_ARCH" - echo "Build: $BUILD_ARCH" - if [ "$SCT_TARGET_ARCH" = "$BUILD_ARCH" ]; then - TEMP_CROSS_COMPILE= - elif [ "$SCT_TARGET_ARCH" == "AARCH64" ]; then - if [ X"$CROSS_COMPILE_64" != X"" ]; then - TEMP_CROSS_COMPILE="$CROSS_COMPILE_64" - else - TEMP_CROSS_COMPILE=aarch64-linux-gnu- - fi - elif [ "$SCT_TARGET_ARCH" == "ARM" ]; then - if [ X"$CROSS_COMPILE_32" != X"" ]; then - TEMP_CROSS_COMPILE="$CROSS_COMPILE_32" - else - TEMP_CROSS_COMPILE=arm-linux-gnueabihf- - fi - else - echo "Unsupported target architecture '$SCT_TARGET_ARCH'!" >&2 - fi -} - -function get_gcc_version -{ - gcc_version=$($1 -dumpversion) - - if [ ${gcc_version%%.*} -ge 5 ]; then - gcc_version=5 - fi - - case $gcc_version in - 4.6*|4.7*|4.8*|4.9*|5*) - echo GCC$(echo ${gcc_version} | awk -F. '{print $1$2}') - ;; - *) - echo "Unknown toolchain version '$gcc_version'" >&2 - echo "Attempting to build using GCC49 profile." >&2 - echo GCC49 - ;; - esac -} - -function get_clang_version -{ - clang_version=`$1 --version | head -1 | sed 's/^.*version\s*\([0-9]*\).\([0-9]*\).*/\1\2/g'` - echo "CLANG$clang_version" -} - - -GetBaseToolsBinSubDir() { - # - # Figure out a uniq directory name from the uname command - # - UNAME_DIRNAME=`uname -sm` - UNAME_DIRNAME=${UNAME_DIRNAME// /-} - UNAME_DIRNAME=${UNAME_DIRNAME//\//-} - echo $UNAME_DIRNAME -} - -GetEdkToolsPathBinDirectory() { - # - # Figure out a uniq directory name from the uname - # command - # - BIN_SUB_DIR=`GetBaseToolsBinSubDir` - - if [ -e $EDK_TOOLS_PATH/BinWrappers/$BIN_SUB_DIR ] - then - EDK_TOOLS_PATH_BIN=$EDK_TOOLS_PATH/BinWrappers/$BIN_SUB_DIR - else - EDK_TOOLS_PATH_BIN=$EDK_TOOLS_PATH/BinWrappers/PosixLike - fi - echo $EDK_TOOLS_PATH_BIN -} - -PrintUsage() { - # - #Print Help - # - echo "Usage:" - echo " $0 \ - \ -[build type (RELEASE OR DEBUG, DEFAULT: DEBUG)]" -} - -#Iterate through the SCT package dependency list and check if they exist in the current directory -for pkg in ${names[@]} -do - if [ ! -d `pwd`/$name] - then - echo "Couldn't build SCT:" - echo The directory `pwd`/$name does not exist. - exit -1 - fi -done - -export EFI_SOURCE=`pwd` - -# check if the last command was successful -status=$? -if test $status -ne 0; then - echo Could not Run the edksetup.sh script - exit -1 -fi - -SCT_TARGET_ARCH=${1} - -# -# Pick a default tool type for a given OS -# -case `uname` in - Linux*) - case ${2} in - RVCT | rvct) - TARGET_TOOLS=RVCTLINUX - ;; - - ARMGCC | armgcc) - TARGET_TOOLS=ARMGCC - ;; - - GCC | gcc) - set_cross_compile - CROSS_COMPILE="$TEMP_CROSS_COMPILE" - export TARGET_TOOLS=`get_gcc_version "$CROSS_COMPILE"gcc` - - ;; - - *) - echo "Couldn't build BBR SCT:" - PrintUsage - exit -1 - ;; - esac - ;; - CYGWIN*) - case ${2} in - RVCT | rvct) - TARGET_TOOLS=RVCT31CYGWIN - ;; - - ARMGCC | armgcc) - TARGET_TOOLS=ARMGCCCYGWIN - ;; - - *) - echo "Couldn't build BBR SCT:" - PrintUsage - exit -1 - ;; - esac - ;; - *) - echo "Couldn't build BBR SCT:" - echo "Unknown OS, Use this script either in Unix or Cygwin environment". - PrintUsage - exit -1 - ;; -esac - -echo "TOOLCHAIN is ${TARGET_TOOLS}" -export ${TARGET_TOOLS}_${SCT_TARGET_ARCH}_PREFIX=$CROSS_COMPILE -echo "Toolchain prefix: ${TARGET_TOOLS}_${SCT_TARGET_ARCH}_PREFIX=$CROSS_COMPILE" - -SCT_BUILD=DEBUG -if [ "$3" = "RELEASE" -o "$3" = "DEBUG" ]; then - SCT_BUILD=$3 - shift -fi - -# -# Setup workspace if it is not set -# -if [ -z "${WORKSPACE:-}" ]; then - echo Initializing workspace - # Uses an external BaseTools project - # Uses the BaseTools in edk2 - export WORKSPACE=$PWD - export PACKAGES_PATH=$WORKSPACE/edk2:$WORKSPACE/SctPkg - # We do not pass BuildArmSct.sh arguments to edksetup.sh - while (( "$#" )); do - shift - done - pwd - . edk2/edksetup.sh -else - echo Building from: $WORKSPACE -fi - -if [[ ! -e $EDK_TOOLS_PATH/Source/C/bin ]] -then - # build the tools if they don't yet exist - echo Building tools: $EDK_TOOLS_PATH - make -C $EDK_TOOLS_PATH - status=$? - if test $status -ne 0 - then - echo Error while building EDK tools - exit -1 - fi -else - echo using prebuilt tools -fi - -rm -f $EDK_TOOLS_PATH/Source/C/bin/GenBin - -# build the GenBin if it doesn't yet exist -echo Building GenBin -make -C SctPkg/Tools/Source/GenBin -status=$? -if test $status -ne 0 -then -echo Error while building GenBin - exit -1 -fi - -# Copy GenBin file to Base tools bin directory -DEST_DIR=`GetEdkToolsPathBinDirectory` -# Ensure the directory exist -mkdir -p $DEST_DIR -cp $EDK_TOOLS_PATH/Source/C/bin/GenBin $DEST_DIR/GenBin - -# -# Build the SCT package -# -build -p SctPkg/UEFI/BBR_SCT_arm.dsc -a $SCT_TARGET_ARCH -t $TARGET_TOOLS -b $SCT_BUILD $3 $4 $5 $6 $7 $8 $9 - -# Check if there is any error -status=$? -if test $status -ne 0 -then -echo Could not build the BBR SCT package - exit -1 -fi - -# -# If the argument is clean, then don't have to generate Sct binary. -# -for arg in "$@" -do - if [ $arg == clean ] || [ $arg == cleanall ] - then - # no need to post process if we are doing a clean - exit 1 - fi -done - -# -# Change directory to Build directory -# -cd Build/bbrSct/${SCT_BUILD}_${TARGET_TOOLS} -pwd - -# -# Run a script to generate Sct binary for the target architecture -# -../../../SctPkg/CommonGenFramework.sh bbr_sct $SCT_TARGET_ARCH Install$SCT_TARGET_ARCH.efi - -status=$? -if test $status -ne 0 -then -echo Could not generate BBR SCT binary - exit -1 -else -echo The BBR SCT binary "SctPackage${SCT_TARGET_ARCH}" is located at "$EFI_SOURCE/Build/bbrSct/${SCT_BUILD}_${TARGET_TOOLS}" -fi diff --git a/ebbr/config/EBBR-arm.seq b/ebbr/config/EBBR-arm.seq deleted file mode 100755 index 00f96ad2b6c5417816050906d4d70981161f8391..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 171574 zcmdtr+md6~k*(>tZnJ)edI6g0NJ$rUkv!FwZAqmqQL2l!HW|f}(!^6|l2UO$e0R?e zKW8D<0s;{!Wg%kH!ZH(yKqR>a+=mYz?sMV)`+xthoA+-%zIl1`_07NBynXY*c=Ykj z|9$g+-uxdozZ;MKcJq8Z^Ze$^n=fwu_2vgR|9SJn@q1rh^KUobjPHIlzW3(Mv+?sk zyLoTC;wR(ljq$3tZhka=e`EaZ$2UJcJojvT|LyULH^!@fIKJ;^-X5>{@%Vakyym^b zfB84#|Ks!VU;o$f?|(f0&)&ItG5#xm8;@Vy{As-AoAH11;o+74KA!pL@O=Mw?~U)? z{__9$%keMx$q&Y#UCGPuuI2VCJ@)FG!|$&Pl^>6*es}zOXZ-%&xV|@Tem*ey*|_FV zdFz16TLTM7yfI$$&f)t%AFuo2_?e&I{9?TN&3jS#?cwVFvKTs|%K zLk#@jfXPqB<9A0?yfF~?>A>Pg9{p(i)SCmJXX7>Aw`0uQj+S4I$o=3D zAs;P<&9iZBu3vtd0re>SdJM*Ute(o0ojd#amHGPW)#qjdxs{^0V5o^_I zO#71&74ID0YZ^r!xk{M)Y&@?TiIg7=gnakS@wYd}m!J9B;fvDM8rEo=xD0yRCJ9bFT zxq5Z_t?>$qrSDQMYSh~YH2nO&Ccl02tDE1B?|(To@8?6Ud@=M2)Sh}R7X80CM8prj zi-sSJYfGuAG|vuEgLB^lZ&_Lmd2cdSC2hZ8kyn|CdIdqlQFa#q;Ru{!n4KAxmfx2p&Gv&czik@ z;TN6qDyYZ=wa4$STQ98Q(DFE>NU1}VL0+rdh7DApxkcqS>vg5KH2Ol9gSQEgVnd=Jz9RzFt0VemanGg%m1Rf#Qc!oTF;1PwICXkB)oy@O?GQ zcg4*Q&c@BJ4yxtT!MbtH%kk1Zyttunj@R>N z{QZ1peLNgXF6u`EBmLs{12f(Whmzyu>SdR1p*~VB!c4@$3ZnX@$w5CDKL^eGnR<2! zDtsFG!$oQtM&=&y^IY#_Y1JGi=|Vm)F2dJbDxOvSC4A)T`KUT7<8=|jxU{e@tV0*# zs;Yex0~M|QL03gVio0J7Oy3=ddHp``PFZ_hggAHkySl1$Am@C}R#bbrWo97Xbnbdo z9R&@|Nyk>_V(65I*2PJGu6n(Dh^2Zf5hAbXCXoiGcLs7PNLlv7fu!pHv+mnyU)Gsll3aW0pbX5>bnOPNK^(HvKUX>H1MvBb6I!JN<^1#@7kax%Ya7AUH z8#i6idFZ<0AkRXFrt%!8-7FJ!SUWzWDItZW&gI|w=&1KJHh)+QP?ne|-;_fp>v%== zCSplM>FAmm)8%`=BmQ0=9l8)Q*xFUgB6y_)FtsS+GynL26E(y)>i3DyzW$rZd@#D% z_3_b(;S#Y?&F2>47rABjJ$(<%^u~A%ey1{jJ|1xcsLLPia_bbIUk>HHD*vP&O($G6 z6!`49hg_n(Xv!eJ$edhmvn(}!RC-4izw0+lMC(T2 zRj!$x_lT+#U3Q$jQa`iTil>Z?t=B~f`%r-Dx=ezS$f~ZXbo@5BP>|}HF0E;*pEN-{ zb(2m}nssemq-Y^CGg+plLrQGb|Lf4`N0Xwr$1j-qF24k}aH1dfQ`Nhw+qyWpdMaBN zi<5Kt+aRO@XiR(sIp2j26%Jq6iK^2LmT-E1%vWt({^`Fm4$JQ+&^%<%-@Q?p3-fw+ zDDkUoGW%<@)W+cShh$8?Bef$^OvLo^@`rP+W zv;D5tKJTaMcYUXMpLcQH_?LD1<9a;TNUPdJ>%FH&s|z9?D)OJg*EQ25X6pO+-{<|M z>!yRR|9hrwkG^jpzzTaY+n&7zc5nMOlg&%G=);5|b+50KI-{)ig5(eVu`WV#l zwy}xTY{}rZTobI`EKaQBe4ULvcjf$C`oMJ8|M_tS00v(Ja);bh4_j)?t>>qm!b2o={{?^VB0 zH;+40&AL)7p@y{0svp6k%^A0d{9)(;6KW@B{uxAaQmz{#-g`<(m#%Wumo`X;J(skU&QgVuPkJ3)xme=Hdrl{! zqu=+M?;W;NKf3v!BWu3B`SU=>j>kub9glCv-@X}GJv34tBXeYdFMCs=5^qlTw4Gj2 z!Z~cd#knxSQJp=u<-EA~m)}B>nNvB0>>gpG|NAmw~FzoAH>&a`nYRZYj=CZzwabF1o05*|$Zc7&*@) z|6^p4eW}kzRy{0I+6}&Lq{tg;v-cbtwxN!yG)BR(lnWiJpToZP;BzVD&lZMAOhp4w#LFO?kk&||M9r~5?CpNG!6w>)~x2tU&C^WgF_#vhe?UBJRpMKW| zJJGqVNxvB?PFMWN(032Vha$Ls(mdSLeIOEep?@e!DYxI68dM>!V|Wryszv@}%7(T_SYU>Z&&_QzVHP(@n91n|U|; z-R*s~^7ohH*Vn`CK31xSbWIf0?XSxS-F~IVUj2Hfz4Q#sc-rcx$l;$+e$6=Q##J<( zHx{NJWtQ5-(^K30pBXZi<+M9IJJ{jl$X%cMNmSVPdbvvg`c*V zJuJo^o`2_J=WYf+_v+UhX)3;~!`+>()ps;ur5SCU;>2Lgx@nv)>a_^5mJkr)h zuCo$4cKFFr@x(osqcoLHmiq%wjAvHCEuyS+Z}8nuD651kau&~2b*BrJALgwG$_L*k*Q9OLotlW-*=PqP_P#UEZwACf;kA(}s(hu5X{c zI}c2(=v#ZFZ)>l|&QCvidj4-_&$_r^6pmvIgL*J(LQo(@4eT%uZ&BYOs-~MTB_i7 z?L15S@qysX&)?#-?<8g-F&ZPcf$3q$Jfs z-4<=Mjh)LJzAjqL#3(~JlvTKTGC5UHe9??}zH?p87WqO=&9-Pggvr;%taBq&qYf-z zR(8z|9~lU}vZzH4}<+^dX zc|`hLwQ?J4&Li7Oc0a$*#yr;j{V1ys$FI-E8Kf`9-%M&h8Lx0Rpvz~M=zahG-Hzjb z$Jr%uBs%y)oW{vYMU>~TJU++tb-9qECUm~y$*Z==h$#2Ne0}K1_v@phV#zLATL%xF zA_1eT`l7Pu5&p>XS?UH&8yp*{BlP5FI+!n>Q==D<&2|UYgp*$yBCWNg(9LQ?R&^5JX0UX zo7|$Z<(glQ&i}K)F3-oNvySe5?s<7H`#i=O0d6xFRaf6Re-pClta%JSSk=9l$>L)f zMp5EzHEoO4Df_&ByylMeb=jJ?mX2*!Fl~A*>?B%DKhSqk9-Ej zhX+sT&w|?T5|pDGF9aq>F=Al>S(8vB)gglP&pKF%)Srb$H2>h0baPBEtk=7e~rgLL%*o6*1_nrol9)0 zNq@EfPs{0e2n&*oG-CiCGcF4oyO;txQVmeFY zB; zFSln8-`)F0b5iHuIjymev7g=q*S-)JRy63ty8jVg!70=RJ%Vl8Kx+S1HRkE!m@P7= zo!dW)&YbmKw@>3utOR>X?@eW)U z9T`$5+s+VlC^hVYWvE86;~8BG{f=$rmc4=W?KxNN;l9yjR37Jyvni~|aK2E^sKjCc zDibMHyqHn9WFG&mKHpF8z5OlM{9``IC9HIy*N-6T4co{woT8hdUU3ekX7d&2aH!)U ze8tI?k!_KjR_#;vdHr}%RoBN$CBiWnhrZzq$-*)Y4`XoZuL+WDW1=1WLK4Z-kV2FSHYZg?S#E(!9m-4br%9#-{>+L zkHNrmx5%D&8KT3P=R4f%80)xR)hNv;I_d>%<8!h1+iACBU|+W{f70Ug9j;r4#550) z!s8Eia@Q0ei(r>ngrDHMxda%bIW_Iey}vsqUKNF0|LdZlno?|PGOt*7oGS)rZnQ`7Xx||h{QGvbRR0jPnA6zxxs9q3*LP7_PC*+6R5h?Ar z;0TV|HXimdaNak%ga$X_`ZYt9R7){{Yo=0ZRFAy#_6Q&ZF&X0wCJs^I{G@IWziiRC z%P~0e!=JwUnSGzb>ApS+uE;evgYvGY)#XX=yjs#u9XwYPvmA-N*D1#R7g1E6r}j4Hc!z z>f9(U3T%tPU951Ik9Y|e@#$Z`E-q?=NDvvh?B1W85!IDfmZHLm+}G~Qa2s>DkhwFz@+ME-Fw5HD zLwRI#rs|w(G4Ir?bYdj6La*w2INSb(eKop2rnYxHm<+uFVl+Ko5;Zsm^T@6AeJ46o zF?rVN6)soHbU)^xoRMu@#nH!U*B6KR_@BmI%fAn~h^O*}OgSc7o0iob7H^bcn>Wy< z{?#( zNwydrPl=cEP@n0MUQ6E&O}y{Rb8SC3Ve+bY6h1?m8El zNV#$|axmoNUW=Nqi zndV-xHs?MYkup`*3e01}IDM@*!Oyt6b0I1nrw>M0xgJ;MP)@uN%0M(dEQ40U#g4W2 zSvIs$h=qHk%Wa=s1#5;9gXguotCsoObasz3wYxHCC1kpGm0PVAF{<@EZ3QjQ@sV%| z=J9o)2|tKIv#ZRl)wHP^x=ZN@*9NBL&_co?YCeHNK|rIX5obZVmg zZVC_c?sF(7ab;Z0-)Y88t%XIMjM)qxg@q|4rv?^P++2vJd`)xh zzQD@~Gc{}PpDlGn_%Q`jTedpha zktTp)5yR9qsYJHT;^Wh^ciXMiXQOZaYUq{shv)L=!}*D+Z0F=_g>0ha-5E%3n8Da< zrq$GG&*+i!6-X_BDZ#8~1+ zpDw z=vZz zcy_v0oL>>9@_D?UzB=pqe7I7!fllv_v|=2&Qq0Y}jg#CP$(~S}sScU%OFhUnonHHB zDSEx%{{Bg`mnnXJGf?|{xOwh{vLZ$hio0W#&J#lnMtVO{CHK;wRDfJ;7R4{-tnd9P zRqo~Z_4Ou}R>Vi`Pak$#GeC`a;aK<)S@HuUo}9Ni-$C z)rDXiiYY}&m-9SjVfSOQb=I89`35YcS2;hc-E;N2C_w=}es9~(wNv7vhzHd!2w#fs z<|#CD(y{mnOuk3yGGnicmb*BsY^L254~#fc@iqph1ZYY7dmgEErVALHzoKj2d%$<| z_PR)kC;K3-R&R%?bKzj7iwhs!8ysx{$X0sXpE_o|zh$TM?7c2ZDwq1tXG#Z%mik}M zVIdqP$I?r(uX&(THD(g3FuGnzZ$>(e9%tz`o3LkgPLNLJ82!&%(c$WP2_ma z{7P;$9jDIujW@L{BS1L{FOqIL0qbw8bRvc2!Jl zB~o~<6!+4FBETcvxsD@DC_$KXegkr{r|pt`4;IJHJ1o9GdJ41KmnU~_{?qvH+Ijr) zfay~|2is03o@uJ9VmE_?6+U7n_@RD28$RsaD0%%;$0pZI z6>^40%&1l(2sSY*Ykad3ma8jsh;%O(H^ zk#E+fEU&07QCc}x!qT)+o|@?;lpv;ewTryP>-XPNv^YI{Z2p*iE}ez=iKXxry+cRy z0Ysc$#5C8;geEX~+B5g<=z2Lg=);58=)S05j-2E@-o;xhWTajK56QvKAY%184Tv=h zhmh_bW@dAqt>@R*o%U+K9JqYnkV-qts^W$&a5gh!`#(lR{dwG-yPbil7DU-vx)RT;dMcUDHD;P8W^fplKzZ`{ZK&$&y4$^crA0;L zp0{{x=dpTkus*f<&B(^p6eq@Vnq1v$+AXK_v+|8AsZwGlypGk{=*IbanL4?BRdk0U zn7sHNB1UmKuZZ8dZt==dOxG%>Be=D;Zv(v7$=ua^l*c!Y0#k!(&F{~ zwg$OPqD_~|O*xI2od2~>P+(UzNzULNUYSZYRS_2mJ?Hw(V%ub^Znf>rJ5tN4{&fUF2ysfv zAGso8a$ETWrv06Wj{ab=bDrv|{Bd>q)=tu-0^t+W>TE@Y zII0KHv56T-s@q#6@}GY_(D=_06`v2C_xX39V&m=%c0g!mQS{OHyZd^qlwC5!ZUZ&k zv{kJ+y3%cH^N4Wo+|BCrn|##4ou6#n-stO-kDd>t*T)=YVfiuxh?o z!Q}W$KZ?JxJKt!(Epr~1Id5H|*1IM>1U1}T6)&3+!393ha7T=MM!7>h(}{32H9Nf{ zp?j}W&&NBQUG{wVQP8^kepG$`_1@*PK2gQtF6$iB`TB*X8!EnR!X@o?c%@kgbxlLk z$y@fw>2gly;a8tRxbD^4)#TE|lDdK%zG{x?O}iSoeV77L^fGlAXV_fWUcHTSj>D_H z`*j)Dy?*@PIcOYMXNV>8KvtbEO8;`a+m5|{yo+pC z*gRNmQ2pBOQWxwl74My}&y7BQD3x>zoo-@BQ_DtAF$mPSgW? zy$;Z(cAT-j`ny=~^7XfublvOMGw8?Eb62MSnzL$pr!5h_k;x)Gos)0!LkrjqG4J1A z|B>}BU-4sn_A1{-OpE#Uf?ON6OX1iOPWiQArmydv=4I$s>A!ssZx2|F$MyA4vtO79 z%;zEX)OQ)0$m2G(uz8jlO`ITK+F*z~sAG9#o)1gfxzh>Ts5o-MTD<}-i1Ea{?QoR< z`-KL-7)R(En>=`(zDu`h(~6cBIj3lRIr^uyu%Ply(OqGR$d!3c_BdU@3#5rm{_q90 z;Po&}C1Kh<7N(!S9B8~Zvgfn$xKE^=xwAsf&Wlh{!*O$~I@7je3JURzd=Qx<+0~^Zs*7a2VR`jHX9+co*DSt$3|%KTw%VW~($teXdHH*-@G$(g z@fT~Z^QjXsqqucoZ9>UK6ABpG@=!}C2>C5@eb0AvwfYv{+3SjjA-9dZ)sQpY!g}~k z$KKROL_tokN5j)7xDawOxp_6+E;@NV+njB7{l`Q1YuBN>AzoG`Cc6HW>pC6OC}yI@ zs*Jjp6bI)`T!|dDK{V-mV=z-y+QVdZufn?idA@az!@M`|eRw>E?}wSIZ?pmq(xY*L z#DlI48&M3ozxtQ<#O!FwB3ZTP@XiA5ak%gL>j$qJ59)Ylmb?1`_uKX5`Qi;T9-d&6 zQIh~lOP|-h%z1(P>%S`>E_Jg0-RtMWbguOx?Zj8Z>*R}g9hxo{5}hs3k@!h@BBRdV z^X&e7xQxeR%)e9#u6DjIE})dvT>0P~mk*e*9N`|q!F?5Q18&i)ZTa!8e7Jo5-M{&| z`QW-b%_hcG0Pj5w?E1w6R;1(n@`!S&qR0)`4vX#e|F5xE!pr&gX3q)JAH9zoV%+Ou z(d-*Ts(LD<`DR)S7Aj$m-&Aj%dE;1MOBp3oULA|eanWYVwXtwY-;CFc9}}pGbEihc zB}y$tOrRxqX-sXoLV$DM2bjpx!8`QkVf9{Yage;ichM>l^z z{Q2?t_ndvyEj!Kd;o;Fox4ejRNU7MKzi!T?B=YWfoNY_sSJ$p{hKwmfs*?wpr=CWq zPbm@q=Tk%e>o`GW#&ka(mmG8uHbd*`BplD++P8Ijws^w_Ik@8%K45D98VckRa_aSQFy20FJT zj)jWa?6oEe^c%eVpB>}nJU%lz)^nYz!2LewD!4U;Mw!Vf@zv>bRYwe|;&ck<7(;DQ znqB?Y7qPMLb^BTbZ_i(wPpAshA@4jEX)>R4RD`(lX89>MXf$&(bI|?oKNZB3-sZ0j z>8}SiHh(`EPWY$yaO$~yxEqgiuYSGRBO>S%?{2-Sx=Wj4+unU_tM+(KuIc@%;FKHI zJ%`S`!}Yq@G=HVUWP^BdA2g_hjhqlK91xY+Mho@t=itIPPI?!S{IpSk0z30 zMov+(_4@RQsDO;l4{ma4PEkaUxDi8JHaS)z^QU#u>7);bs4my_+pM2)gK1(M>_gws z{p!12P+FJ9-FJhx@qo_}t+hG;9x2YDTT{8ZpSewxKRqjv>SQ+3#yQ8N{VJ7w8#{SN z&kp+!Zx1G3jfb5&q2xFNVPPXy!t}3+>GPJ)4pzY?ygq)c??7Q)BCsv%jRJ&CwIjE9x zVz$T}dH1wRt%Qzird_ynA%T%)3C2-{nsd=S@(fFxz4H0hDb?LPdW+6PfD+zUsrkJX z7^e+a@4xK@TUMrBas@i{vM938OB>tJ>Ygu{#(fr>P4D}qb5&|3R4@x7w_2~~ zR;zID7vJ5;YhC*pK!X@B>CBSOzc4C&I3pN_mPR95S+FtoiLbvZV`Te?+sk=u&OO3)kGEB!- zT=Abhr?1WT!2RZMvX%2}^TgTGbEth^?`PT^Tu)1l%SGLO-FUf@xy&RqU@1F1LBJbmzXSi|xOU_coPlGK`-T z>-)V~p&Hmk6-HDQ%}Iso_Gm8ID+2c&OnB7`-#%q>uKT;Z;q=t1q^$%>Q}yFptAqOG z;!8K!mJekm`uc3DSu;2c{HFcx(`~$F|H5BcA1{3i?!xZSX>)qc?mPEDX<#{ii>?^2 zsSms-SA?RWOCJ{N#dCcjqvh_hmkI zkZZ9PKMzxLz2`~W*c~=g@2j2a0A-;X_z68V-O;IlbJ&!H&Yp5%zW83SmOjXqjOb}w z#teq4sHgULYSwycX9Z}kK2N37A$t`ediHloHKAH7mfFh`A10F+shL7k1(SpnmTeMv z`O_`{y}(y*n`^I4&)+F^J#_RiSlhLmO2*us=N3=74SYS$CMDWtn>aHa#_8g0n`yUs zXKwI$#Z#Z^VpM#i`ll)F!25!WEXvWu+sDq30`LV94$L_p?|dGugiWpzcBP`r8J+Iz zi?OooQKk6ioxu`Qev*z1p>3pG%A=Lg;mb8sGI5%-6S*RC)FX)D=}uzt%uQnSGu%6Q zrJLKL^B;#AMJ*m@ye|jhD{`0VB@$f-MpQ*I;H#!=AYh+rhM+`T(=KC`Az zwBFVPkBsVRb5B;$HZrID>dsj((yPM|Gm9sC0T5FA_FG#sn%2do$t>j~YGj$36b7`i zt?OK$Itv*kwy<)&gBjGmvzoZ@$)1laTNj^v8a3OU2`C&f)BT~^Nyo5)yFR?yuQm_QTZ9|EOp<9ZQOLee@#T_8)skimAF@~=oC_cuD?x4K09pM zrlE~j;ZaWISI0j zjdK|@wXs(|b#KcRszkXFDi21bcA+vi8)@UJkxpH2CA-?Prug=#>@#L9M9dVZ*gD1d zbb2;sEX@{F8o47{V1{SYf0$%{(y)yA>En`oacb_x@RP%1P@J+}%o9bz>_ z1mW4XJWQj!vQFJju?l@3HeqGk>XY&1&LV4_9HZ1kgW6)3EPaAu#FEURV=yv2ac(=H zSlY9B%lm2ZK7yQDIL6aj2f*Ote4H=b z-i%!fnVfXfZ@rL+>FzX8fK2-p&Z;#GV+{tbU~ zM>lMwuX;Y7z3+2=C`rg)cbghA=@mQ+5Bk@n2{Ps~s&>p&9pg!e6h5dvLfzjZv+b8| zV{=*g&TXOVV&G&7=RmdbUgs*<7Py@^$9;R1T)k4?o3mi;y)*Ob(J}j`a|(x>c>U<0 z`OS2@Tk(*Nd@IYE zf176J)zB~^PmLFU^bWskTdj+t)uV^z6$f_MRN?O0f_Y%W>*YeIJo2#9nYt%cDJ`6D zzQyLKWZoWAD5o*L7*VuZw?LDq$K7Wl7f+1L9UE0lx1hK3NFH^*NB4k{brSn(b;M@< z*rC~Sfn^Bhu}?E=R=XxS!F8H+pGs~XrCShHdwlL@=haw;_7@L&DY>I!=ipJootf(% zVnq)g>g;Y?keGeHb%TL@lI8m&uY4ZrT9{BP_>>l|6A&-6|K?}aH(^})*1eG1a<_>h zuPDeZ+uR*7vz}kldrwXCs5Ekeqe<_{DxL*oRB&2YEaBt&@b!z z8YVVH!PR0*rBdlSRmUgRRcx`jT(effN6xs`Iwsjg%lLa*5FgV!V#Or9dn!W}X4uQl z+n$y0W}wyjEnPPEuiX*RqpPUjq7!oiohCGkfss9m{2m>Jj(tDdJ*`nE@4)8K~AujqyH?&8iEwrT(Dkz6yb z@pqb6ewaC(W0C*o&{w_~-M~lVwLCocLvVKJ<>5N_^QOnRdR3REr)ixs!veaaS%JNu zGJ_M2VX1#gO+{)iLR{>x{wzZuj@=@k;KC`+WB4lzw6# z4^K_4*=@BcM45J9&+d|3y=`Zz-3E?lcj~E@U=jDLp;%61{rN15oN zxWapdl79QQ!O-6hR{qP9Ohm_Xf=yr3Y2AybswMa88|9Lya(5n6Ali*)XZ@eq94>(m9#t`RTk1~^mVqetyrsbhAk_2YXTcRRzj*|jcTiwUY% z^^S{7aw!`*hPgwE&p;j75}<@2l#i@~+(*)Fq)xeLU9?0FpHI!AfoAre&OO~RPv*QRK|j=YzF2H?A&r^!d#_aWfJZYA7%%fW0ic1!F%JK|M-=z{V_Hm zu%r11$F13buCx8Kd=}ga0S=YTkxrpNNAIOZ>khZqe)|4@IWoZ{a&m>&@4L*Yq_3L+ z-bL?s&O;t{=Zs}Q_heT|INY?HDkA@RQCv63sViFqV#;$IFjd@n1RmovM2cXZqMk36 zD(dqZZ1qz2G#u?A25=QuHr*j2;IT#EGzN|wa2bQgaGz8He!Z&4XXG?_S97RgpgW{G z=2=l0k2AvpH=OE;a~yE_+8<*_PA}`d#eJe6hT{WFtw2@D_MEpqQ;4Dx{U&1S!(OAG zzWQr{NUL_$hH$T-Y&D8Ik!W28zHBrKOLPe#qiCccCLt1 zwSYQ|8E6UlHF+ck6>0UrFlrOb99|rCkGU zdbaxQLzc<6+uMf6PdnS^-v>j%Js+?B_E72f>WwlKwbx~Cx{Vf9zuRqB$0u`RYqJwB zUHgW5S`(FAD0^mDZSPDz8{L{Yk^98G4s3MbkAaPu8imil&8wwj^GK*z&Ile-$Hb2b zB9|^tH_Xm&Y}`g=?x)WCUL0quv%=jMIgg=wIzz(4#w2A;(Ns?1Wi?-aKoiR(eXm~0 z_aLP!+A{S!qjr6D$deBbm8?55{%z!qxzR-G)e(9ORit8@Ez?G+BAR$Qk{F3!K>6h` zag+29YMV~p9A53)B6L@7{iE1Wqu0+ZJy7mrJ1u$xxu!$pBk;R>PA*ly+T9Hy%K2Q+ zbe?x6HYNct2LsPJ?ZU4*YvU6+@Jy&I3oKx5ay&rp%<9VAEYj^n8?n`oHg8kIHDv-$!lqa4m@` zt{+8MnM2wAc<5`@9W%vGQy0b2or>dt@jv*%^rG6g&AGd{`yatYzkPjNWQmPJ8{*#i z=4fgbTxjXGdvUezimc|4Gxv1*`*^tvm&w~l-}C-XP4r$L7keM3^zs2$!=+gnT+9P# zAbi{>@#x0%Af^B+J$J~o?P2jUaXICjhvyZa`uaHG82gqgJlDfSAMeIDbhbzGs2yoh zWZTr+;`EQyvWFu@(O(}aHD4X-{?d4d@@a~clGcZaC^5uWuYaX4<(x16>p7&( zRkCCE@hZqX#>~Y8TJ6!Vw$Z1SiygVf)u19V6%6_9@=Jzc@b2qq^L2~NLpzUGL8qz4 zbvydBj||ecx_&xv?!)3<)lB71LDER_(W~ScUqn^gqJwd6pWxYh8(zJ4G>XCF?_P5^ z7RT51$g5xPr78mNIg7!+hVAVvEd{dww%;vK#zz zbg@4D{o{e;di$Z~6rGUNyW$yYCcak3Q;IT87puzaZ)2X+4_&$cMBU4$c~-*A!wQ-tQMod?moO{bsIoYOQ89KKTP zAcUKAoN{r`%=35iP!7oJRYQ20dhUc2?)6BwAvT(Kc}}#*Bx+Lk zB|day{;yB3`QL}y`Fdy{zu(@Sy$^xM=p))$P=C1@Rd3hZOkVdjJFL0UNDYb*-+@YZ z=-6h*`v>*+YFGaluCo0MtYC)Bq0x!+xKhJhtU7UgD>_WO_<=a09$crepKcxRYIMAF z=Tvs*WB)OFYjKP9XpK%`sIJ8TRK&K}?{yx<3-*`PmG;~AF4n8ue^I7gKj(9rR07v3 zy4A)igKEl^QV&!}-<9clNV92q(yr?H>wY#ee*0O>&*#(ITfOg&O!hLa9|3Z?2_sIE;kc}= zH5t&R4JS$7rxH3vB4eC%GmY9$ZG9q~``LAOJKIM-9rV6CNc!(y9|09iHenyZoLCV76eaZhX`=1_d@AdI9q+q4alJk2-n@37`}Xp%@6ox?`?BFN+;=ofjs^ zF{5@cARSzk=-Auc=PT0AHi`Bw;=Tr4zV64^YH9O=dhNY;-8R@EfB|gcde8Ye`KY1< z8+gY(rULh$$MKN(zl_CWY;KEW?|ARBsJG2xdkz+LL#m)^0Top{KJZh#3Nx_12CDmR zmkt9sg?KsppPDP7LSi{CU|UZ5=T2a9Q1k!HNc*%Xnwd75_fSwFF~yc6|1fZHs>SE8 z9nU=o3uh~Iwzs@Bo{qL3)j%!odAaDK9g>DklS;r?!7Skin%4XLj35MsBc;l z?}!@Si>MJ*HdSWTX@0Kvpv!3wRmr?!?_b@<>GYK9s#xi;`3(BgI&gJY9>GeFlAp|r zY5xEh>uB8ng^z0Me(%bZYsXXbtD=)@(f#G}i>Xu{Ep%)$t74FF-*5dpN2~3Wrp8X7 zoj-TAKRLfDMk*AqsL;QTGfpzW)!y%Dta;vRo z5d()9$#>=4JpU-xRKz+)PKv5{+A|zK|N1<8uZx%(=WH~Edg$5A`d$ zlw5uqiDK{^KP;9~_f!Br!MTXKy*u{);m$)ouWV}Z6*M?zp~C6P_QJb+Lw=_&M3%Y! zxi!us;+FbJ+MTM{*St9CHafo=y>6#iR`dX5k!#j}Py&1+TpTNPmlJ&)M8r@`E$*6$ z^4IYCHinKfQ8V}ZKJ(H2LGhY=xhOmp}hb zIexSl_vp_=3cgMIG-s%%RrB@#yk}i3C7^551?N-CJD6>8I^~`tGtVmKC-%%3PSWJYCjKesbI7CG)P z0?l?exv@6PWEwWd>f0E4Sgx&v6R(xt>(o14t={X-($#G}n1jejafO}Wr)T5TVeiYk zb*6kT20N|A*7^vwT&`ekF~R|uwH-I>IOHN^cm(`MzQ1Zlh0~SW2)evQw-!RWg}6n{ zr=W3C?!FC?cEhl8>IZYrJ4=f?+6Oyr5jy4RwNT+6iU8cKOK&Sk?<%9*14k!jN|-yM z15vLyMzpm3I=Xv{%25-pnN9LYz2;WvEXpP`52%=x>MVF@-2qGP=pu5C_>H>w{j}_e z%I(UvTD+(>oWnMUAk#)sJ?A`u!okq5Q-#G$-D;7vN2V+~cXD|xbZnR55AVIoBt~ev z-03EUo>P@_$=agF$uco7WWR~B-;G}j6H1rQB_d2XcsN{)^sz}9RoJzQ7}I*MtJ2ff zdb7O(JnkZ{q+eu$N@8AUHkgvLza@Kg z!~>NA8Cqp_QRNFRF^yJ{D4KL0H3&mq>$VQvr(ae=NFIp*?x={6DV_@GVlmuRX|H{;T0s#Bt>vk(vcoS|){UI`gp&wuwP z46Tcf9Mb)$MCx(-D{T#SqO@}~wx;=9*hY^n%k0;GA3tG;Lt|2)`q~>*sck!9V+zH@ z1@p=wT*Dcpld-hTYy9n1TZU1O-21pYzpkZS>Za)tyD8}u(}bqOogto#lecAZZbOBN z@k;mB*mp-0kzWpE*204pQ*qQFdd~I$2F_*B{fLm<8F;w<6ps#*a#7Rw)AAxicVv%n zEkq#Um)_at1Xsa3-{gt!sXnVe>6T7UzIk^dMz)boQ+z7{6pz!h`j_y#zG zyXz4i>GWBAlHP4IS;uH^PNwZh_tQsMC+cKhan&P4!*dtXLkEpfg84wW>x*vTZ6lKlcMfmNQD?MK{Ms#>4_r6rv zw)=AXF=ks^at021#N*DgpA$W%Z`+&+kyWDvkE$}d9y)`Yr215SO&X~Xj*@CCa#SK} zPMbH&hfkpJX%uTQtNne>iFaFPCrW6ss*Nf{t9Gv?F$6)Xj9%4W%O7#J zjgtL+$#u=2j4$`tJe^t3d)BXu zOZzQwfQ}f!Bz70!BEw+CC6G6C8wD%Q)NiQLEqf2{y`k!DeEemxDACi|p6ZTMOLrg*iDA$3I^!X-3|T#{4elIk695Q3X|0EOr0%o)wpWZ5=) zI&JrT!H5@2$5U+Tjy{pIAlGD5+{{f$>8Vd`QuXOV`~=g2Ek?6%o=(C_ZXCw&CAYZy zYL9%HQA73S{Noz)c`+i&)F#}cf8IyUL?kC+B|JF&_6${)_ywn^G$KT|7{AnC>j2;) zUPKl|xV?LAw|5fOLPU;;4_Brh>kKg~M5vU!6%3<3i5R;tO;n+WgYS0|R>FiA*`A6G zR6ZnS$6+f+{t%tll+lyTOQdu2`k}&Pt_4Ko_K1OoG`75RwxJ8YoO3ab%lEx`Gx6WXnQTZ#EI^?x5 za=r9E^`iQ~WBUF0h;9)nO^3J$cuHnLP;B9>ZS36dBCLebyk0TU`C`{!h334>IPz?} zma4kRBgQdN(MRo>rykLc|NInc7(VrLG$tDQVprtPl&lQ%$Yw_ILg~q~G>xfQnPpz& z-`K~?=i?r4&xekAdGr48=epn93V6r^N`fQ6byT4-Z5-2GuRNze(k*+XI#yMJgzVdI z+CCc-#IFV(Yhi&8bUoA>Rni2Rb0juQMB>}_Xz3eWq&#xYG5;1nZ)4-Qtv(&>c~_oi zhtqps9$vrC8`->gl*_0*#=SwsgZH_u9Zod|t?diUF?aR3kTHtMsVt)IQ#PFK z)3~swa~_phU-0YYJAsJG>qm-ei#ybbW*9az=v%oWCz^!emRu%0p-!tdc(#9Gi%E6Y zJyLvj=*I&^cZhQbnfp3(Gfj)jcQ5Heh%W?$)Dvmlk)WWzqeo=x&# z-yhg~J}`QDP${2}`tvFd!MSU{J8I6o`t>43anNp}rj249K$9TRMbj5UdZ3&I_&~MK zp6LAPHikl~*!gN;<&GlH516ftl^rf_wd&1vQjg?bQ8jfP2capeNb>sBpA7_^(!K|{ z8>{pE;w7i$T)aGHblJJ~|D^Xx%g8<)E)VCaAc)mz>m;B#Nl#YM9rvu>b zT>q-+(qf$6pS5^?5`&zAk`wh4EAg*)|Gp7KFa62efg^6l)E$izaz#eFzQQW(`0G`cAJh! z)r5-{66r5JkMB^Y-37w?b^P3!qwjt>ub&#z^&aM?+q$#i%4M8W-)1xLYF6GfqA3hM zY}aq!^K;tWOW7yyem!23uljuWjQcuzE*qX2M*7#L-svn|944q5@P<@Uvk2KBi)4z) zgboiwHuu~|%$MKYPjPj8q1Lth-}q;`QZ- zu*=hmrxrLzH|lUiZ!6QzGV0 z!3wzO`P=zymqx5~$2R#>ea5-wJ8D<=ITI`LPM$UIIF~;wb)nQ9v^Gk?~r)as3Cg+6}PXH3&946}-rG#*Z-2hD%DCNxdB z?R9YsGoxl*bf_4pz$3So_n}V|J5w8*{Fs;JSo*$d#C;QWcXf^r^GBW<`{Ite1MI7p z)>Y1IGB-Rr`^AeorLIGzO_k{a9J|WnB)N&u^TEEKE~a198&$@Xrwx_1XSqwV$g}u2 z{~F_P7*r-_J@BsxJMTUoV`b*j3KfaRVt>iCwXdW$ivfs;6`Gf#Gq2K3sY&Xy8fEV* z*Lz!$?uwO_kWo?EhoncK(EZ+0z0gXz=)Ey9Rh*uq_)Swg1F}Wt?a?Q?OO+k3cW?eS ze*fao1zbYrG5k25lWVkF0tZ#a>C!T#jg^#&DZE%|8&r1qIa=4B54-xQ<<4cyV|dT) z!cz98V0vTkF^|%f^4~j`;k({@Dqg1ywH$c}?Dt`PBDg*2?K^+z+WQx->q&aw=yn@N z6h!wpnGUpCS@qy5dFMHiZ6h^j;9jdE+jsu=V|MlFi1iN!2Djt>($zo4{vMs>9rmu9 zym;qT0}4xpPzS_4)gCj_?Ws}MpWfP^^ZSo+-Oop!`{b<`o9n-n_m8m$Et_2t*DP02 zJ(zpYY9=nQO=P=BWoW{L5%_IwVEnW3VO8qF+PTE zH2sMxAz$#rHuKM4`=$52?78l>t8q4f>`$rl)$^J6?FV_^`8XKg74wxbrLVTi_HJk$ z=-hU&V|OXvA7h&x&+{<#3Dh38*DZANqph&&JU?B&9%h-f!4O7j6+!MxLhcXK)g zc;0)C1zbBv$?LuMRmF3zL!=#_S%J`gLO6d zPj~41=NSH6PZI){^1i9abrImTSFu!bd`HJ(FbK@O8qaZE#lQES7QpeQ@HGE^|M3qa z>OUC@@AqQ{I8Q^$kf-j`JHJT5r~p_&%&YvE9>=+A2rKixh>By(&n)+g2-(MN5k zsjF~;h+M)PRJKUrsqJ}WBGTR1R*Dc_L3@h4FA>t2lPXI{$(o$$&K~qxpj4F(iniM0 zQDn^ASt~;DhbmIo)~hFYEdcs^qr zux*;`-3EB98X;K3WRBA4z9sr?e}_n?WaAc08l#xZz(}Nc4ffqe$o_6@E5(Qk<67-a zq)Gja+ZG~}N1DAmyz^xEP*9^;{f%Zjhse57!jsKwZx^(l4H8AbRQB>oZN{bT_~B(e zjT!J36W+}2yRoelC7pQnUaL3Fd};HT6_?--DvVPFC0U~Pop&I!v$OYYFW-Y~C46X9 zp1%IInK(V_nqgu8sEDysJ@=LL$uPmgDv*9)8!_wO*PVaoDowgNGt2MD`EK69387sPyPImN2)mlITqj!%xnF>^}P9v7S-s3v#ESpFezea|s@#p|O($?}aT zvo-?MyBFONU*wot;OD*1G!e-`SP2gfKqvR;T)Bd4=7~q&l{IoiSE!q&WmGEq zU*=GL`wG2x5LQCOJB%4bK=GtzqB`5- zi$}0X-4J({gD~&LCSJ^Niw<~pa%Hdlw+_NecwkOi#FcX-aqILgx7NvtnBg~8?iJl^}mggweRPy|8HND*D5w_)Hm!cJ&;Vc@~+LRc-jNGz)BSh<;Fg(l-}DTSROE zf3?^I&_<&jr|zZ{f2uHXD&>_+&1n=l6sum?<^X-`1mLMxaM?>)DN=YLX2R4)++qGn zsbf>;{9wi}F(32Dx#TwP)tn|odyn=~m%I`>HiC6AbGB}Z!E0=zikmHtI`O7Dc^&27 ztiu^xakQ_UKpgiJE+7QO5EaE=;#PAjOZ%A(l=X{nRnWH_q#0& z_sjY4=8xm|7h?-Qa@od?ffcLPOd-qxVLCGSM9i(Or-sw8JKoOuar5JVX;PeXK`naLfw{{88nlZfUm8 zwNbjdB3Lv9*dh^+{ARrO?)&iTgICgB*}fQPd^r9U_d2-$)P;H6V_;%(Lv84N>w?u8 zS)r!PJsdSh#F#IuQ=P{#=dh!^SFg?{b+0XVNS%Cf>M0%XT7G$F$2)USjQvVczJu|%x5Dmz8SyEo{z_CUW~unZn+PI$2ghe zDyh>LQVi(sn)#UOh=qJc`qU#%fN0^N+pF*>P}wBUVCAL+kMNW_Zl-_|GIT1-sSQ+{VhYgZdiC^*GiReA`3%cMimtb`jhij zbGpZuulg}gZ)}t-ggeUxNkR)XIR8kq(WZC<}psMxk9W!8`Zh%ET}8& zU|Lu2!B6Ix$`%RoUDN8IDYrb%i*{K&_XGv0YUd_KDO-L!Up zp2an*4EJ4e-RgDwDEc^tH>2lUs)ThQS6-CQSE+GzzEK-5!vl(NaG&WIw|Ui0tA*-ZNwI_AIM zJ6HFwU;oPKJsqBRI$cNm@?2AW-f{0Stx!k6kE0&E)4VtM?6cdu{o(la{BR$F_r{-} z4IFqTmm~hE?H0)IPOi~-qM_NA{D+J<5EtJ2ra*l^Weg`QxSyoQ_jB9g*@%yi1~T$v zwY?omF+Rixw1AE&?^-6!ttPWVda~G|w9U<^?j|4myy<>zeOeD^Wi?#XL|X+kP+pVY zb%!y_RFdsl^IGhNQ3-y>zue4yFZJv3st*PhUk_jLtKqM;#8H6DRd*+f1q7ntbxjy?KJ|uOACKO`d!c3M|otys3^DpfcKDqa~ZEs|9LO zJty~Jd+l9ys(Jd3Ua|M${kN`v%_@M5rxQ96OiPLY@sIiP(kKsz!-z7v zO3y3H4aM`E0dp1acV4>ZupJ$N?>I^3Gni3soGQrMs`>IYKZb{7!lEnkj^~$n4_$3B zZk{5W^@m?@=1UknHPu{3o2k&qqQM4?%_(sqUaA3V9Gvt}b&xu1eu3U|U;Ag3 zYe#vnnpeWd{*xXVSF~Bz$-5?TdMnwYtH^19BcIv(tb+5CF5&ZXREepYSHeXlbQ(UY4A0Tin34`qPhwUmT&}K{uUn>F{~gyW zyQi{x*mcuYRJ7|houjA3w;DlT)62~v`Ew$`L~{F%7wzwi_dPf6#eaRC%UT_DXExMJ zY#V`z|tc$^mES`lMe@<-D87S}1X&n@6UiR7r@$ z8nQ}friRjCqA4Y6rX&8E*zGr2F2&F#{&;Hj#14}zYQC)l=fHHQRl0+ohmI_&Tczn$ z8LG?AVV3=5=OHn)5=t~Xhfep(!*2R7>+n$ZxEN~pR97Ry@Q<8?mtJqnL)-4==;Ez} z4DQ7}yo}CG;TtRs87f|Or9fgRrvc=neIP$Y+wb*=4XG~ljm110ClZicQPh*w~dy69}YKE{&-;IZw{a7xfT=42d;ozYICfu z0Qp4ar|&Ufv*Xy;=(987x)2;NaTAdR>+of(&^7w=Y?s*g9dI31?`SqQVFQ1KH=B#Vs z!3R`@^?B{m*s-BTV%0X#@<`$mapYNXMZct*x0#~exL4q6SkUykJKdkU(l$|^Du%_Y zwsERD`rBq_)NR{qW(Qj=R=pcf`*;`wd(a;#jp{8Q4H`6Tk5pJShzj8hwb8#vW7T_z zQ19YCb%r<8T^v%L@SVkmIWlcatEnO!0*(O{dv1<~Go0>!d2j^sSJ%oKD&G6u{e)Fm zsLZoJCQW>1j)Cr)2Eia^7xh7$d^xwxnsoiz$Z&%4g{mx2Fj*8my5_PM4 zYa+sB*RP2OnCOb>(E2^9tj#aiE^hRCoOZb+I_z?s-f?s)`1|kH{M0%cY#|T0kn zH3}IVEFbW!sK6$wuI$0Oogkv<_YpGn$a;9FBhY|AcTK^c`SG%aVu6Pl74D@{bh>JB zCrD(^o?VZcWIaU8uIW(~CY2^{Y%didZFktb$`LTd!K&$0oo}bzxAo?zOV&dqPqt3Y z-h(=WLvjJQAaRHp9lZiU6AU_^@1_DnWsAt*{R zn&8>W78zvbfq(ZdzB%QdqRVDCi+wCzNH#iyRzUB&hSd}V7iTGq;iX#{oNmqHF!ltXi+mL z3LdLs1=S@k#l5;3oJ+f!gwB2@r&`V0?-LyB@QR3VJt#DM;_CG)eR6SLkmu;MsbI~? z^}cFzs#TrdvdFgYT`6bGTBs5IjC?37rZ&;z${rl*>cxt95*4b8)6z8F-Uo0e6tm5F zXQ4k0*9c{C;c!abQ@H!*pk4t9^&+v6d$l7S6 zKwe*T{BeG5OSv1v-;Ub-^*Gi4eZr99HzS0I2!j&0iQa*sGg?$menLG0mF)TM9^mKp zD(7wt&&T1^g@BdR_ddesIM04xxVSA$MwdYW)eul6gD}ZeX7{ zt1E?u`LuaM`<56@rNDEYL)EQuIL^C*^X%bjn{_;k)CK2{4(IkYVSouWAwsxhBE(Le zsFIT+1)iqi+uX`2J!*#)SX%72vw%Isge#^SLYpJ&`REIizbL z;eA(woQ$cqd%w9jkeDZGnz-N(Q*CFLX{WxpVEcMMV`A2!6=EU<;{+8%nzgCnv+}eX zYvCC_b9d+SPBTj_UKs)~T8uQ&2HjW`FMV zcZa(n`>bv?^^3!X;hHCtO;yYeaAEgE!x!9gIb*tnNAz=MFs3gmtLY`|Y?7r7x9o8l zpG$W?d}_6~?h8xUk&{U(562Kb`JwP>nyCt76MJO(em$8<%wEH})Arv-H?JR{$tEJR zS6zW))K(sHdxJ5HI;6L^OV-&l-BsH|F!W1o!BBUgkKIO2Y`Zox)CV3>Q`BGa(cU&> zx=V=XRA6YeQDcupw)rx**-snh%yQ+Jp}h3qx^me;m(ivvS(8b1*)#L*?KD4*hA3Sl z)Ao}oCxAa#KA$?hNvF6{{EKmqGb%b4zt~WXld%u{OvF1Ai>J5wbc)R{hgY^D-`GlR z0;N9df;bP@RaS`&Iv4NaYUp*^Ty{~q>eQ*5vuEO|ZPs&Zs1#S;NeH=xMR+mcLlehD zHu5^BhNn}$@)B3?-I_fguZxcvrU@|46%BPl)C_#|g>^@^(ef1RqlqUx&DZjsy(_(E z<#q9)yg10}4~`W-5P(#heel7|{FP$Lej9Z3mfaO;?=qb7&$ Date: Wed, 6 Nov 2024 00:19:12 +0530 Subject: [PATCH 2/4] Pivot and Hive related changes --- bbsr/config/BBSRStartup.nsh | 98 ++++++++++++++++ bbsr/config/sie_SctStartup.nsh | 106 ------------------ ... 0001-BBSR-Patch-for-UEFI-SCT-Build.patch} | 0 .../{bbr_common_config.cfg => bbr_source.cfg} | 2 +- common/scripts/build-fwts.sh | 72 +++++------- common/scripts/build-sct.sh | 75 +++++++------ common/scripts/build-uefi-apps.sh | 60 +++------- common/scripts/get_source.sh | 13 +-- common/sct-tests/sbbr-tests/BBR_SCT.dsc | 4 +- .../ACS_VER_fwts.patch} | 0 ebbr/patches/sctversion.patch | 12 ++ ebbr/scripts/build-scripts/build_ebbr.sh | 52 ++++----- .../ACS_VER_fwts.patch} | 4 +- sbbr/patches/sctversion.patch | 12 ++ sbbr/scripts/build-scripts/build_sbbr.sh | 10 +- 15 files changed, 240 insertions(+), 280 deletions(-) create mode 100644 bbsr/config/BBSRStartup.nsh delete mode 100644 bbsr/config/sie_SctStartup.nsh rename bbsr/patches/{0001-SIE-Patch-for-UEFI-SCT-Build.patch => 0001-BBSR-Patch-for-UEFI-SCT-Build.patch} (100%) rename common/config/{bbr_common_config.cfg => bbr_source.cfg} (98%) rename ebbr/{config/IR_VER.patch => patches/ACS_VER_fwts.patch} (100%) create mode 100644 ebbr/patches/sctversion.patch rename sbbr/{config/ES_VER.patch => patches/ACS_VER_fwts.patch} (91%) create mode 100644 sbbr/patches/sctversion.patch diff --git a/bbsr/config/BBSRStartup.nsh b/bbsr/config/BBSRStartup.nsh new file mode 100644 index 0000000..9103607 --- /dev/null +++ b/bbsr/config/BBSRStartup.nsh @@ -0,0 +1,98 @@ +#!/usr/bin/env bash + +# Copyright (c) 2021-2024, Arm Limited or its affiliates. All rights reserved. +# SPDX-License-Identifier : Apache-2.0 +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +## + +echo -off + +for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F + if exist FS%i:\acs_tests\bbr\SCT then + # + # Found EFI SCT harness + # + FS%i: + cd FS%i:\acs_tests\bbr\SCT + echo "Press any key to stop the BBSR SCT running" + stallforkey.efi 5 + if %lasterror% == 0 then + goto Done + endif + for %j in 0 1 2 3 4 5 6 7 8 9 A B C D E F then + if exists FS%j:\acs_results\ then + if exists FS%j:\acs_results\BBSR\sct_results then + + #Check if SCT run has already completed + if exist FS%j:\acs_results\BBSR\sct_results\Overall\Summary.log then + echo "BBSR SCT has completed run." + echo "Press any key to start BBSR SCT execution from the beginning." + echo "WARNING: Ensure you have backed up the existing logs." + stallforkey.efi 5 + if %lasterror% == 0 then + #Backup the existing logs + rm -q FS%j:\acs_results\BBSR\sct_results_previous_run + mkdir FS%j:\acs_results\BBSR\sct_results_previous_run + cp -r FS%j:\acs_results\BBSR\sct_results FS%j:\acs_results\sct_results_previous_run + rm -q FS%j:\acs_results\BBSR\sct_results + goto StartSCT + else + goto Done + endif + endif + + if exist FS%i:\acs_tests\bbr\SCT\.passive.mode then + if exist FS%i:\acs_tests\bbr\SCT\.verbose.mode then + Sct -c -p mnp -v + else + Sct -c -p mnp + endif + else + if exist FS%i:\acs_tests\bbr\SCT\.verbose.mode then + Sct -c -v + else + Sct -c + endif + + #SCT execution has finished. Copy the logs to acs_results + if exist FS%j:\acs_results\sct_results\ then + if exist FS%i:\acs_tests\bbr\SCT\Overall then + cp -r FS%i:\acs_tests\bbr\SCT\Overall FS%j:\acs_results\BBSR\sct_results\ + endif + if exist FS%i:\acs_tests\bbr\SCT\Sequence then + cp -r FS%i:\acs_tests\bbr\SCT\Sequence\BBSR.seq FS%j:\acs_results\BBSR\sct_results\ + endif + #Restart to avoid an impact of running SCT tests on rest of the suites + echo "Reset the system ..." + reset + endif + endif + else +:StartSCT + FS%j: + cd FS%j:\acs_results + mkdir BBSR + cd FS%j:\acs_results\BBSR + mkdir sct_results + FS%i: + cd FS%i:\acs_tests\bbr\SCT + Sct -s BBSR.seq + goto Done + endif + endif + endfor + endif +endfor + +:Done diff --git a/bbsr/config/sie_SctStartup.nsh b/bbsr/config/sie_SctStartup.nsh deleted file mode 100644 index 92f5121..0000000 --- a/bbsr/config/sie_SctStartup.nsh +++ /dev/null @@ -1,106 +0,0 @@ -# Copyright (c) 2023, ARM Limited and Contributors. All rights reserved. -# -# Redistribution and use in source and binary forms, with or without -# modification, are permitted provided that the following conditions are met: -# -# Redistributions of source code must retain the above copyright notice, this -# list of conditions and the following disclaimer. -# -# Redistributions in binary form must reproduce the above copyright notice, -# this list of conditions and the following disclaimer in the documentation -# and/or other materials provided with the distribution. -# -# Neither the name of ARM nor the names of its contributors may be used -# to endorse or promote products derived from this software without specific -# prior written permission. -# -# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" -# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE -# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR -# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF -# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS -# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN -# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) -# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE -# POSSIBILITY OF SUCH DAMAGE. - -echo -off - -for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F - if exist FS%i:\EFI\BOOT\bbr\SCT then - # - # Found EFI SCT harness - # - FS%i: - cd FS%i:\EFI\BOOT\bbr\SCT - echo Press any key to stop the SIE SCT running - stallforkey.efi 5 - if %lasterror% == 0 then - goto Done - endif - for %j in 0 1 2 3 4 5 6 7 8 9 A B C D E F then - if exists FS%j:\acs_results\ then - if exists FS%j:\acs_results\SIE\sct_results then - - #Check if SCT run has already completed - if exist FS%j:\acs_results\SIE\sct_results\Overall\Summary.log then - echo SIE SCT has completed run. Press any key to start SIE SCT execution from the beginning. WARNING: Ensure you have backed up the existing logs. - stallforkey.efi 5 - if %lasterror% == 0 then - #Backup the existing logs - rm -q FS%j:\acs_results\SIE\sct_results_previous_run - mkdir FS%j:\acs_results\SIE\sct_results_previous_run - cp -r FS%j:\acs_results\SIE\sct_results FS%j:\acs_results\sct_results_previous_run - rm -q FS%j:\acs_results\SIE\sct_results - goto StartSCT - else - goto Done - endif - endif - - if exist FS%i:\EFI\BOOT\bbr\SCT\.passive.mode then - if exist FS%i:\EFI\BOOT\bbr\SCT\.verbose.mode then - Sct -c -p mnp -v - else - Sct -c -p mnp - endif - else - if exist FS%i:\EFI\BOOT\bbr\SCT\.verbose.mode then - Sct -c -v - else - Sct -c - endif - - #SCT execution has finished. Copy the logs to acs_results - if exist FS%j:\acs_results\sct_results\ then - if exist FS%i:\EFI\BOOT\bbr\SCT\Overall then - cp -r FS%i:\EFI\BOOT\bbr\SCT\Overall FS%j:\acs_results\SIE\sct_results\ - endif - if exist FS%i:\EFI\BOOT\bbr\SCT\Sequence then - cp -r FS%i:\EFI\BOOT\bbr\SCT\Sequence\BBSR.seq FS%j:\acs_results\SIE\sct_results\ - endif - #Restart to avoid an impact of running SCT tests on rest of the suites - echo Reset the system ... - reset - endif - endif - else -:StartSCT - FS%j: - cd FS%j:\acs_results - mkdir SIE - cd FS%j:\acs_results\SIE - mkdir sct_results - FS%i: - cd FS%i:\EFI\BOOT\bbr\SCT - Sct -s BBSR.seq - goto Done - endif - endif - endfor - endif -endfor - -:Done diff --git a/bbsr/patches/0001-SIE-Patch-for-UEFI-SCT-Build.patch b/bbsr/patches/0001-BBSR-Patch-for-UEFI-SCT-Build.patch similarity index 100% rename from bbsr/patches/0001-SIE-Patch-for-UEFI-SCT-Build.patch rename to bbsr/patches/0001-BBSR-Patch-for-UEFI-SCT-Build.patch diff --git a/common/config/bbr_common_config.cfg b/common/config/bbr_source.cfg similarity index 98% rename from common/config/bbr_common_config.cfg rename to common/config/bbr_source.cfg index 0f7bef4..797e668 100644 --- a/common/config/bbr_common_config.cfg +++ b/common/config/bbr_source.cfg @@ -41,4 +41,4 @@ SCT_SRC_TAG=abb54c667fe6ae2a41144c010871569ef519c459 FWTS_SRC_TAG=V23.01.00 # EDK2 source tag from https://github.com/tianocore/edk2.git -EDK2_SRC_VERSION=edk2-stable202208 \ No newline at end of file +EDK2_SRC_VERSION=edk2-stable202208 diff --git a/common/scripts/build-fwts.sh b/common/scripts/build-fwts.sh index 3acdfea..96f8381 100755 --- a/common/scripts/build-fwts.sh +++ b/common/scripts/build-fwts.sh @@ -1,32 +1,20 @@ #!/usr/bin/env bash -# Copyright (c) 2021-2023, ARM Limited and Contributors. All rights reserved. +# Copyright (c) 2021-2024, Arm Limited or its affiliates. All rights reserved. +# SPDX-License-Identifier : Apache-2.0 # -# Redistribution and use in source and binary forms, with or without -# modification, are permitted provided that the following conditions are met: +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at # -# Redistributions of source code must retain the above copyright notice, this -# list of conditions and the following disclaimer. +# http://www.apache.org/licenses/LICENSE-2.0 # -# Redistributions in binary form must reproduce the above copyright notice, -# this list of conditions and the following disclaimer in the documentation -# and/or other materials provided with the distribution. -# -# Neither the name of ARM nor the names of its contributors may be used -# to endorse or promote products derived from this software without specific -# prior written permission. -# -# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" -# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE -# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR -# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF -# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS -# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN -# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) -# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE -# POSSIBILITY OF SUCH DAMAGE. +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +## # # This script uses the following environment variables from the variant @@ -49,10 +37,6 @@ fi BUILD_PLAT=$1 BUILD_TYPE=$2 -if [ $BUILD_PLAT = SR ]; then - BUILD_PLAT=ES -fi - if ! [[ $BUILD_TYPE = S ]] && ! [[ $BUILD_TYPE = F ]] ; then echo "Please provide a Build type." echo "Usage build-fwts.sh " @@ -86,24 +70,30 @@ do_build() echo $BBR_DIR - if [ "$BUILD_PLAT" = "IR" ]; then - if ! patch -R -s -f --dry-run -p1 < $BBR_DIR/ebbr/config/IR_VER.patch ; then - echo "Applying FWTS Patch ..." - patch -p1 < $BBR_DIR/ebbr/config/IR_VER.patch + if [ "$BUILD_PLAT" = "EBBR" ]; then + if ! git apply --check $BBR_DIR/ebbr/patches/ACS_VER_fwts.patch ; then + echo "FWTS Version patch apply failed" + exit 1 + else + git apply $BBR_DIR/ebbr/patches/ACS_VER_fwts.patch fi fi - if [ "$BUILD_PLAT" = "ES" ]; then - if ! patch -R -s -f --dry-run -p1 < $BBR_DIR/sbbr/config/ES_VER.patch ; then - echo "Applying FWTS Patch ..." - patch -p1 < $BBR_DIR/sbbr/config/ES_VER.patch + + if [ "$BUILD_PLAT" = "SBBR" ]; then + if ! git apply --check $BBR_DIR/sbbr/patches/ACS_VER_fwts.patch ; then + echo "FWTS Version patch apply failed" + exit 1 + else + git apply $BBR_DIR/sbbr/patches/ACS_VER_fwts.patch fi fi - #The below patch is temporary and shall be removed once a permanent solution #in FWTS codebase is found - if ! patch -R -s -f --dry-run -p1 < $BBR_DIR/common/patches/0001-Fix-for-FWTS-build-issue.patch; then - echo "Applying FWTS build patch ..." - patch -p1 < $BBR_DIR/common/patches/0001-Fix-for-FWTS-build-issue.patch + if ! git apply --check $BBR_DIR/common/patches/0001-Fix-for-FWTS-build-issue.patch; then + echo "FWTS build patch apply failed" + exit 1 + else + git apply $BBR_DIR/common/patches/0001-Fix-for-FWTS-build-issue.patch fi mkdir -p $FWTS_BINARY @@ -158,7 +148,7 @@ do_package () echo "Packaging FWTS... $VARIANT"; if [[ $BUILD_TYPE = F ]]; then sed -i '/ir_bbr_fwts_tests.ini/d' $TOP_DIR/ramdisk/files.txt - if [ "$BUILD_PLAT" = "IR" ]; then + if [ "$BUILD_PLAT" = "EBBR" ]; then #Add the entry in file.txt of ramdisk echo "file /bin/ir_bbr_fwts_tests.ini ./fwts_output/bin/ir_bbr_fwts_tests.ini 766 0 0" >> $TOP_DIR/ramdisk/files.txt cp $BBR_DIR/ebbr/config/ir_bbr_fwts_tests.ini $TOP_DIR/$FWTS_PATH/$FWTS_BINARY/bin diff --git a/common/scripts/build-sct.sh b/common/scripts/build-sct.sh index 8aabe64..b78720a 100755 --- a/common/scripts/build-sct.sh +++ b/common/scripts/build-sct.sh @@ -42,7 +42,7 @@ SCT_PATH=edk2-test UEFI_TOOLCHAIN=GCC5 UEFI_BUILD_MODE=DEBUG TARGET_ARCH=AARCH64 -KEYS_DIR=$TOP_DIR/security-interface-extension-keys +KEYS_DIR=$TOP_DIR/bbsr-keys TEST_DB1_KEY=$KEYS_DIR/TestDB1.key TEST_DB1_CRT=$KEYS_DIR/TestDB1.crt SCT_FRAMEWORK=$TOP_DIR/$SCT_PATH/uefi-sct/Build/bbrSct/${UEFI_BUILD_MODE}_${UEFI_TOOLCHAIN}/SctPackage${TARGET_ARCH}/${TARGET_ARCH} @@ -52,10 +52,10 @@ BUILD_TYPE=$2 # if BBR standalone build if [[ $BUILD_TYPE = S ]]; then - . $TOP_DIR/../../common/config/bbr_common_config.cfg + . $TOP_DIR/../../common/config/bbr_source.cfg else # source common config if arm-systemready ACS build - . $TOP_DIR/../../common/config/sr_es_common_config.cfg + . $TOP_DIR/../common/config/systemready-band-source.cfg fi if [[ $arch != "aarch64" ]]; then @@ -63,13 +63,9 @@ if [[ $arch != "aarch64" ]]; then fi -if [ $BUILD_PLAT = SR ]; then - BUILD_PLAT=ES -fi - -if ! [[ $BUILD_PLAT = IR ]] && ! [[ $BUILD_PLAT = ES ]] ; then +if ! [[ $BUILD_PLAT = EBBR ]] && ! [[ $BUILD_PLAT = SBBR ]] ; then echo "Please provide a target." - echo "Usage build-sct.sh " + echo "Usage build-sct.sh " exit fi @@ -104,10 +100,10 @@ fi do_build() { pushd $TOP_DIR/$SCT_PATH - export KEYS_DIR=$TOP_DIR/security-interface-extension-keys + export KEYS_DIR=$TOP_DIR/bbsr-keys export EDK2_TOOLCHAIN=$UEFI_TOOLCHAIN - # required for SIE keys generation + # required for BBSR keys generation export PATH="$PATH:$TOP_DIR/efitools" # export EDK2 enviromnent variables @@ -126,7 +122,7 @@ do_build() cp $SBBR_TEST_DIR/BBR_SCT.dsc uefi-sct/SctPkg/UEFI/ cp $SBBR_TEST_DIR/build_bbr.sh uefi-sct/SctPkg/ - # copy SIE SCT tests to edk2-test + # copy BBSR SCT tests to edk2-test if [[ $BUILD_TYPE != S ]]; then cp -r $BBSR_TEST_DIR/BBSRVariableSizeTest uefi-sct/SctPkg/TestCase/UEFI/EFI/RuntimeServices cp -r $BBSR_TEST_DIR/SecureBoot uefi-sct/SctPkg/TestCase/UEFI/EFI/RuntimeServices @@ -136,29 +132,38 @@ do_build() #Startup/runtime files. mkdir -p uefi-sct/SctPkg/BBR - if [ $BUILD_PLAT = IR ]; then - #EBBR - cp $BBR_DIR/ebbr/config/EBBRStartup.nsh uefi-sct/SctPkg/BBR/ - cp $BBR_DIR/ebbr/config/EBBR.seq uefi-sct/SctPkg/BBR/ - cp $BBR_DIR/ebbr/config/EBBR_manual.seq uefi-sct/SctPkg/BBR/ - cp $BBR_DIR/ebbr/config/EBBR_extd_run.seq uefi-sct/SctPkg/BBR/ - cp $BBR_DIR/ebbr/config/EfiCompliant_EBBR.ini uefi-sct/SctPkg/BBR/ - elif [ $BUILD_PLAT = ES ]; then + # undo any previously applied patches on edk2-test + git checkout . + + if [ $BUILD_PLAT = EBBR ]; then + #EBBR + cp $BBR_DIR/ebbr/config/EBBRStartup.nsh uefi-sct/SctPkg/BBR/ + cp $BBR_DIR/ebbr/config/EBBR.seq uefi-sct/SctPkg/BBR/ + cp $BBR_DIR/ebbr/config/EBBR_manual.seq uefi-sct/SctPkg/BBR/ + cp $BBR_DIR/ebbr/config/EBBR_extd_run.seq uefi-sct/SctPkg/BBR/ + cp $BBR_DIR/ebbr/config/EfiCompliant_EBBR.ini uefi-sct/SctPkg/BBR/ + elif [ $BUILD_PLAT = SBBR ]; then #SBBR - cp $BBR_DIR/sbbr/config/SBBRStartup.nsh uefi-sct/SctPkg/BBR/ - cp $BBR_DIR/sbbr/config/SBBR.seq uefi-sct/SctPkg/BBR/ - cp $BBR_DIR/sbbr/config/SBBR_manual.seq uefi-sct/SctPkg/BBR/ - cp $BBR_DIR/sbbr/config/SBBR_extd_run.seq uefi-sct/SctPkg/BBR/ - cp $BBR_DIR/sbbr/config/EfiCompliant_SBBR.ini uefi-sct/SctPkg/BBR/ + cp $BBR_DIR/sbbr/config/SBBRStartup.nsh uefi-sct/SctPkg/BBR/ + cp $BBR_DIR/sbbr/config/SBBR.seq uefi-sct/SctPkg/BBR/ + cp $BBR_DIR/sbbr/config/SBBR_manual.seq uefi-sct/SctPkg/BBR/ + cp $BBR_DIR/sbbr/config/SBBR_extd_run.seq uefi-sct/SctPkg/BBR/ + cp $BBR_DIR/sbbr/config/EfiCompliant_SBBR.ini uefi-sct/SctPkg/BBR/ + if [[ $BUILD_TYPE != S ]]; then + if git apply --check $TOP_DIR/patches/sctversion.patch; then + echo "Applying edk2-test BBR sctversion patch..." + git apply --ignore-whitespace --ignore-space-change $TOP_DIR/patches/sctversion.patch + else + echo "Error while applying edk2-test BBR sctversion patch..." + exit + fi + fi fi - #Common #SCRT cp $BBR_DIR/common/config/ScrtStartup.nsh uefi-sct/SctPkg/BBR/ cp $BBR_DIR/common/config/SCRT.conf uefi-sct/SctPkg/BBR/ - # undo any previously applied patches on edk2-test - git checkout . if git apply --check $BBR_DIR/common/patches/edk2-test-bbr-build.patch; then echo "Applying edk2-test BBR build patch..." @@ -175,11 +180,11 @@ do_build() exit fi if [[ $BUILD_TYPE != S ]]; then - if git apply --check $BBR_DIR/bbsr/patches/0001-SIE-Patch-for-UEFI-SCT-Build.patch; then - echo "Applying SIE SCT patch..." - git apply --ignore-whitespace --ignore-space-change $BBR_DIR/bbsr/patches/0001-SIE-Patch-for-UEFI-SCT-Build.patch + if git apply --check $BBR_DIR/bbsr/patches/0001-BBSR-Patch-for-UEFI-SCT-Build.patch; then + echo "Applying BBSR SCT patch..." + git apply --ignore-whitespace --ignore-space-change $BBR_DIR/bbsr/patches/0001-BBSR-Patch-for-UEFI-SCT-Build.patch else - echo "Error while applying SIE SCT patch..." + echo "Error while applying BBSR SCT patch..." exit fi fi @@ -233,14 +238,14 @@ do_package () mkdir -p ${TARGET_ARCH}_SCT/SCT/SCRT mkdir -p ${TARGET_ARCH}_SCT/SCT/Sequence - if [ $BUILD_PLAT = IR ]; then + if [ $BUILD_PLAT = EBBR ]; then #EBBR cp -r Build/bbrSct/${UEFI_BUILD_MODE}_${UEFI_TOOLCHAIN}/SctPackage${TARGET_ARCH}/${TARGET_ARCH}/* ${TARGET_ARCH}_SCT/SCT/ cp Build/bbrSct/${UEFI_BUILD_MODE}_${UEFI_TOOLCHAIN}/SctPackage${TARGET_ARCH}/EBBRStartup.nsh ${TARGET_ARCH}_SCT/SctStartup.nsh cp SctPkg/BBR/EfiCompliant_EBBR.ini ${TARGET_ARCH}_SCT/SCT/Dependency/EfiCompliantBBTest/EfiCompliant.ini cp SctPkg/BBR/EBBR_manual.seq ${TARGET_ARCH}_SCT/SCT/Sequence/EBBR_manual.seq - elif [ $BUILD_PLAT = ES ]; then + elif [ $BUILD_PLAT = SBBR ]; then # Sign the SCT binaries if [ $BUILD_TYPE != S ]; then SecureBootSign $SCT_FRAMEWORK @@ -256,7 +261,7 @@ do_package () SecureBootSignDependency ConfigKeywordHandler SecureBootSignDependency PciIo #BBSR - cp $BBR_DIR/bbsr/config/sie_SctStartup.nsh ${TARGET_ARCH}_SCT/sie_SctStartup.nsh + cp $BBR_DIR/bbsr/config/BBSRStartup.nsh ${TARGET_ARCH}_SCT/bbsr_SctStartup.nsh cp $BBR_DIR/bbsr/config/BBSR.seq ${TARGET_ARCH}_SCT/SCT/Sequence/ fi #SBBR diff --git a/common/scripts/build-uefi-apps.sh b/common/scripts/build-uefi-apps.sh index 0b6a231..2f80b3b 100755 --- a/common/scripts/build-uefi-apps.sh +++ b/common/scripts/build-uefi-apps.sh @@ -1,32 +1,20 @@ #!/usr/bin/env bash -# Copyright (c) 2021, 2023, ARM Limited and Contributors. All rights reserved. +# Copyright (c) 2021, 2023-2024, Arm Limited or its affiliates. All rights reserved. +# SPDX-License-Identifier : Apache-2.0 # -# Redistribution and use in source and binary forms, with or without -# modification, are permitted provided that the following conditions are met: +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at # -# Redistributions of source code must retain the above copyright notice, this -# list of conditions and the following disclaimer. +# http://www.apache.org/licenses/LICENSE-2.0 # -# Redistributions in binary form must reproduce the above copyright notice, -# this list of conditions and the following disclaimer in the documentation -# and/or other materials provided with the distribution. -# -# Neither the name of ARM nor the names of its contributors may be used -# to endorse or promote products derived from this software without specific -# prior written permission. -# -# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" -# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE -# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR -# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF -# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS -# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN -# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) -# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE -# POSSIBILITY OF SUCH DAMAGE. +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +## # # This script uses the following environment variables from the variant @@ -53,35 +41,23 @@ UEFI_PATH=edk2 UEFI_TOOLCHAIN=GCC5 UEFI_BUILD_MODE=DEBUG TARGET_ARCH=AARCH64 -KEYS_DIR=$TOP_DIR/security-interface-extension-keys +KEYS_DIR=$TOP_DIR/bbsr-keys BUILD_PLAT=$1 BUILD_TYPE=$2 # if BBR standalone build if [[ $BUILD_TYPE = S ]]; then - . $TOP_DIR/../../common/config/bbr_common_config.cfg + . $TOP_DIR/../../common/config/bbr_source.cfg else # source common config if arm-systemready ACS build - . $TOP_DIR/../../common/config/sr_es_common_config.cfg +. $TOP_DIR/../common/config/systemready-band-source.cfg fi if [[ $arch != "aarch64" ]]; then CROSS_COMPILE=$TOP_DIR/$GCC fi -if [ $BUILD_PLAT = SR ]; then - BUILD_PLAT=ES -fi - -#Currently the BUILD_PLAT flag is not used. For future use -if ! [[ $BUILD_PLAT = IR ]] && ! [[ $BUILD_PLAT = ES ]]; then - echo "Please provide a target." - echo "Usage $0 " - echo "S->Standalone BBR,F->Full systemready" - exit -fi - if ! [[ $BUILD_TYPE = S ]] && ! [[ $BUILD_TYPE = F ]] ; then echo "Please provide a Build type." echo "Usage $0 " @@ -92,7 +68,6 @@ fi echo "Target: $BUILD_PLAT" echo "Build type: $BUILD_TYPE" - if [[ $BUILD_TYPE = S ]]; then BBR_DIR=$TOP_DIR/../../ else @@ -101,7 +76,6 @@ fi do_build() { - pushd $TOP_DIR/$UEFI_PATH if [[ $arch != "aarch64" ]]; then CROSS_COMPILE_DIR=$(dirname $CROSS_COMPILE) @@ -131,9 +105,7 @@ do_clean() fi source $TOP_DIR/$UEFI_PATH/edksetup.sh make -C $TOP_DIR/$UEFI_PATH/BaseTools clean - popd - } do_package () @@ -149,9 +121,7 @@ do_package () else echo "Error: CapsuleApp.efi could not be generated. Please check the logs" fi - } DIR=$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd ) source $DIR/framework.sh $@ - diff --git a/common/scripts/get_source.sh b/common/scripts/get_source.sh index b80d566..dfc6c2b 100755 --- a/common/scripts/get_source.sh +++ b/common/scripts/get_source.sh @@ -18,14 +18,7 @@ TOP_DIR=`pwd` -. $TOP_DIR/../../common/config/bbr_common_config.cfg - -#Optional argument 'arm' shall be set when targeting a 32bit Arm device -if [ "$1" == "arm" ]; then - TARGET_ARCH="arm" -else - TARGET_ARCH="aarch64" -fi +. $TOP_DIR/../../common/config/bbr_source.cfg get_cross_compiler() { @@ -36,11 +29,7 @@ get_cross_compiler() echo "==================================================================" else echo "Downloading cross compiler. Version : ${GCC_TOOLS_VERSION}" - if [ $TARGET_ARCH == "arm" ]; then - TAG=arm-linux-gnueabihf - else TAG=aarch64-none-linux-gnu - fi mkdir -p tools pushd $TOP_DIR/tools wget $CROSS_COMPILER_URL diff --git a/common/sct-tests/sbbr-tests/BBR_SCT.dsc b/common/sct-tests/sbbr-tests/BBR_SCT.dsc index 9c6a10a..529d0d2 100755 --- a/common/sct-tests/sbbr-tests/BBR_SCT.dsc +++ b/common/sct-tests/sbbr-tests/BBR_SCT.dsc @@ -99,8 +99,8 @@ *_*_AARCH64_PP_FLAGS = -D EFIAARCH64 $(GCC_VER_MACRO) RVCT:*_*_AARCH64_DLINK_FLAGS = --muldefweak - DEBUG_*_*_CC_FLAGS = -DEFI_DEBUG -DACS_VERSION=\"v24.03_2.1.0\" - RELEASE_*_*_CC_FLAGS = -DMDEPKG_NDEBUG -DACS_VERSION=\"v24.03_2.1.0\" + DEBUG_*_*_CC_FLAGS = -DEFI_DEBUG + RELEASE_*_*_CC_FLAGS = -DMDEPKG_NDEBUG [Libraries] SctPkg/Library/SctLib/SctLib.inf diff --git a/ebbr/config/IR_VER.patch b/ebbr/patches/ACS_VER_fwts.patch similarity index 100% rename from ebbr/config/IR_VER.patch rename to ebbr/patches/ACS_VER_fwts.patch diff --git a/ebbr/patches/sctversion.patch b/ebbr/patches/sctversion.patch new file mode 100644 index 0000000..a4545f9 --- /dev/null +++ b/ebbr/patches/sctversion.patch @@ -0,0 +1,12 @@ +diff --git a/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c b/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c +index 94cae289..5934db2d 100644 +--- a/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c ++++ b/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c +@@ -30,6 +30,7 @@ Abstract: + #include "StandardTest.h" + #include + ++#define ACS_VERSION "SystemReady devicetree ACS v3.0.0\nBBR ACS v1.0.6 (EBBR)" + static EFI_TIME Epoch = { .Year = 1970, .Month = 1, .Day = 1 }; + + // diff --git a/ebbr/scripts/build-scripts/build_ebbr.sh b/ebbr/scripts/build-scripts/build_ebbr.sh index 51e50e0..a8b94d5 100755 --- a/ebbr/scripts/build-scripts/build_ebbr.sh +++ b/ebbr/scripts/build-scripts/build_ebbr.sh @@ -1,32 +1,20 @@ #!/usr/bin/env bash -# Copyright (c) 2021, ARM Limited and Contributors. All rights reserved. +# Copyright (c) 2021, 2024, Arm Limited or its affiliates. All rights reserved. +# SPDX-License-Identifier : Apache-2.0 # -# Redistribution and use in source and binary forms, with or without -# modification, are permitted provided that the following conditions are met: +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at # -# Redistributions of source code must retain the above copyright notice, this -# list of conditions and the following disclaimer. +# http://www.apache.org/licenses/LICENSE-2.0 # -# Redistributions in binary form must reproduce the above copyright notice, -# this list of conditions and the following disclaimer in the documentation -# and/or other materials provided with the distribution. -# -# Neither the name of ARM nor the names of its contributors may be used -# to endorse or promote products derived from this software without specific -# prior written permission. -# -# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" -# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE -# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR -# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF -# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS -# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN -# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) -# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE -# POSSIBILITY OF SUCH DAMAGE. +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +## TOP_DIR=`pwd` @@ -39,7 +27,7 @@ create_scripts_link() elif [[ $1 = "sct" ]]; then ln -s $TOP_DIR/../../common/scripts/build-sct.sh $TOP_DIR/build-scripts/build-sct.sh else - ln -s $TOP_DIR/../../common/scripts/build-sct.sh $TOP_DIR/build-scripts/build-sct.sh + ln -s $TOP_DIR/../../common/scripts/build-sct.sh $TOP_DIR/build-scripts/build-sct.sh ln -s $TOP_DIR/../../common/scripts/build-fwts.sh $TOP_DIR/build-scripts/build-fwts.sh fi ln -s $TOP_DIR/../../common/scripts/build-uefi-apps.sh $TOP_DIR/build-scripts/build-uefi-apps.sh @@ -54,13 +42,15 @@ init_dir() create_scripts_link init_dir - if [[ $1 = "fwts" ]]; then - source ./build-scripts/build-fwts.sh IR S + source ./build-scripts/build-fwts.sh EBBR S elif [[ $1 = "sct" ]]; then - source ./build-scripts/build-sct.sh IR S + source ./build-scripts/build-sct.sh EBBR S else - source ./build-scripts/build-fwts.sh IR S - source ./build-scripts/build-sct.sh IR S + source ./build-scripts/build-fwts.sh EBBR S + source ./build-scripts/build-sct.sh EBBR S fi -source ./build-scripts/build-uefi-apps.sh IR S + +source ./build-scripts/build-uefi-apps.sh EBBR S + +TOP_DIR=`pwd` diff --git a/sbbr/config/ES_VER.patch b/sbbr/patches/ACS_VER_fwts.patch similarity index 91% rename from sbbr/config/ES_VER.patch rename to sbbr/patches/ACS_VER_fwts.patch index d4f035a..266942d 100644 --- a/sbbr/config/ES_VER.patch +++ b/sbbr/patches/ACS_VER_fwts.patch @@ -1,5 +1,5 @@ diff --git a/src/lib/src/fwts_framework.c b/src/lib/src/fwts_framework.c -index 1f139a7..421012d 100644 +index 1f139a7..458ba1b 100644 --- a/src/lib/src/fwts_framework.c +++ b/src/lib/src/fwts_framework.c @@ -33,6 +33,9 @@ @@ -7,7 +7,7 @@ index 1f139a7..421012d 100644 #include "fwts_pm_method.h" + -+#define ACS_VERSION "v1.3.0" ++#define ACS_VERSION "v2.1.0" + typedef struct { const char *title; /* Test category */ diff --git a/sbbr/patches/sctversion.patch b/sbbr/patches/sctversion.patch new file mode 100644 index 0000000..8bf4e5d --- /dev/null +++ b/sbbr/patches/sctversion.patch @@ -0,0 +1,12 @@ +diff --git a/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c b/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c +index 94cae289..5934db2d 100644 +--- a/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c ++++ b/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c +@@ -30,6 +30,7 @@ Abstract: + #include "StandardTest.h" + #include + ++#define ACS_VERSION "SystemReady ACS v3.0.0\nBBR ACS v1.0.5 (SBBR)" + static EFI_TIME Epoch = { .Year = 1970, .Month = 1, .Day = 1 }; + + // diff --git a/sbbr/scripts/build-scripts/build_sbbr.sh b/sbbr/scripts/build-scripts/build_sbbr.sh index 420ce00..5afdf07 100755 --- a/sbbr/scripts/build-scripts/build_sbbr.sh +++ b/sbbr/scripts/build-scripts/build_sbbr.sh @@ -43,11 +43,11 @@ create_scripts_link init_dir if [[ $1 = "fwts" ]]; then - source ./build-scripts/build-fwts.sh ES S + source ./build-scripts/build-fwts.sh SBBR S elif [[ $1 = "sct" ]]; then - source ./build-scripts/build-sct.sh ES S + source ./build-scripts/build-sct.sh SBBR S else - source ./build-scripts/build-fwts.sh ES S - source ./build-scripts/build-sct.sh ES S + source ./build-scripts/build-fwts.sh SBBR S + source ./build-scripts/build-sct.sh SBBR S fi -source ./build-scripts/build-uefi-apps.sh ES S +source ./build-scripts/build-uefi-apps.sh SBBR S From 7fb1c73db8da37826aea7ef2530790bd79a8e4bc Mon Sep 17 00:00:00 2001 From: chetan-rathore Date: Wed, 6 Nov 2024 00:23:17 +0530 Subject: [PATCH 3/4] Moving bbr tests from EFI/BOOT to acs_tests --- README.md | 8 ++-- common/config/ScrtStartup.nsh | 59 +++++++++++++---------------- ebbr/config/EBBRStartup.nsh | 71 ++++++++++++++++------------------- sbbr/config/SBBRStartup.nsh | 71 ++++++++++++++++------------------- 4 files changed, 94 insertions(+), 115 deletions(-) diff --git a/README.md b/README.md index 1161581..d2fda69 100755 --- a/README.md +++ b/README.md @@ -33,11 +33,11 @@ To run SCT manually, follow these steps: 1. `Shell>FS(X):` -- `FS(X):>cd EFI\BOOT\bbr\SCT` +- `FS(X):>cd acs_tests\bbr\SCT` - To run EBBR or SBBR tests - `FS(X):EFI\BOOT\bbr\SCT>SCT -s ` + `FS(X):acs_tests\bbr\SCT>SCT -s ` - To run all tests - `FS(X):EFI\BOOT\bbr\SCT>SCT -a -v` + `FS(X):acs_tests\bbr\SCT>SCT -a -v` You can also select and run tests individually. For more information on running the tests, see the [SCT User Guide](http://www.uefi.org/testtools). @@ -60,7 +60,7 @@ To run the tests, follow these steps. 2. Run manual tests. - - `FS(X):EFI\BOOT\bbr\SCT>SCT -s ` + - `FS(X):acs_tests\bbr\SCT>SCT -s ` 3. While the system runs the reset tests, you may have to manually reset the system if it hangs. diff --git a/common/config/ScrtStartup.nsh b/common/config/ScrtStartup.nsh index 35503e7..9b2ac52 100644 --- a/common/config/ScrtStartup.nsh +++ b/common/config/ScrtStartup.nsh @@ -1,40 +1,31 @@ -# Copyright (c) 2023, ARM Limited and Contributors. All rights reserved. -# -# Redistribution and use in source and binary forms, with or without -# modification, are permitted provided that the following conditions are met: -# -# Redistributions of source code must retain the above copyright notice, this -# list of conditions and the following disclaimer. +#!/usr/bin/env bash + +# Copyright (c) 2021-2024, Arm Limited or its affiliates. All rights reserved. +# SPDX-License-Identifier : Apache-2.0 # -# Redistributions in binary form must reproduce the above copyright notice, -# this list of conditions and the following disclaimer in the documentation -# and/or other materials provided with the distribution. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at # -# Neither the name of ARM nor the names of its contributors may be used -# to endorse or promote products derived from this software without specific -# prior written permission. +# http://www.apache.org/licenses/LICENSE-2.0 # -# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" -# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE -# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR -# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF -# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS -# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN -# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) -# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE -# POSSIBILITY OF SUCH DAMAGE. +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +## + echo -off for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F - if exist FS%i:\EFI\BOOT\bbr\SCT\SCRT then + if exist FS%i:\acs_tests\bbr\SCT\SCRT then # # Found EFI SCRT harness # FS%i: - cd FS%i:\EFI\BOOT\bbr\SCT\SCRT + cd FS%i:\acs_tests\bbr\SCT\SCRT #Check if SCRT run is already in progress if exist SCRT_run_progress.flag then @@ -47,10 +38,10 @@ for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F #Save the logs in acs_results for %j in 0 1 2 3 4 5 6 7 8 9 A B C D E F then if exists FS%j:\acs_results\ then - mkdir FS%j:\acs_results\sct_results - mkdir FS%j:\acs_results\sct_results\SCRT - cp SCRT.log FS%j:\acs_results\sct_results\SCRT\SCRT.log - cp SCRT.conf FS%j:\acs_results\sct_results\SCRT\SCRT.conf + mkdir FS%j:\acs_results\scrt_results + mkdir FS%j:\acs_results\scrt_results + cp SCRT.log FS%j:\acs_results\scrt_results\SCRT.log + cp SCRT.conf FS%j:\acs_results\scrt_results\SCRT.conf endif endfor @@ -58,7 +49,7 @@ for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F endif echo SCRT run. Press any key to stop the EFI SCRT running - FS%i:\EFI\BOOT\bbr\SCT\stallforkey.efi 5 + FS%i:\acs_tests\bbr\SCT\stallforkey.efi 5 if %lasterror% == 0 then goto Done endif @@ -66,8 +57,10 @@ for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F echo "Note: The System will automatically reset as part of SCRT testing" if exist SCRT.log then - echo SCRT is already run. Press any key to run SCRT again. WARNING: Ensure you have backed up the existing logs. - FS%i:\EFI\BOOT\bbr\SCT\stallforkey.efi 5 + echo "SCRT is already run." + echo "Press any key to run SCRT again." + echo "WARNING: Ensure you have backed up the existing logs." + FS%i:\acs_tests\bbr\SCT\stallforkey.efi 5 if %lasterror% == 0 then #Backup the existing logs cp SCRT.log SCRT.log_previous_run diff --git a/ebbr/config/EBBRStartup.nsh b/ebbr/config/EBBRStartup.nsh index 3dde46e..3ab019c 100755 --- a/ebbr/config/EBBRStartup.nsh +++ b/ebbr/config/EBBRStartup.nsh @@ -1,41 +1,32 @@ -# Copyright (c) 2021, 2023 ARM Limited and Contributors. All rights reserved. -# -# Redistribution and use in source and binary forms, with or without -# modification, are permitted provided that the following conditions are met: -# -# Redistributions of source code must retain the above copyright notice, this -# list of conditions and the following disclaimer. +#!/usr/bin/env bash + +# Copyright (c) 2021-2024, Arm Limited or its affiliates. All rights reserved. +# SPDX-License-Identifier : Apache-2.0 # -# Redistributions in binary form must reproduce the above copyright notice, -# this list of conditions and the following disclaimer in the documentation -# and/or other materials provided with the distribution. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at # -# Neither the name of ARM nor the names of its contributors may be used -# to endorse or promote products derived from this software without specific -# prior written permission. +# http://www.apache.org/licenses/LICENSE-2.0 # -# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" -# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE -# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR -# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF -# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS -# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN -# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) -# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE -# POSSIBILITY OF SUCH DAMAGE. +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +## + echo -off for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F - if exist FS%i:\EFI\BOOT\bbr\SCT then + if exist FS%i:\acs_tests\bbr\SCT then # # Found EFI SCT harness # FS%i: - cd FS%i:\EFI\BOOT\bbr\SCT - echo Press any key to stop the EFI SCT running + cd FS%i:\acs_tests\bbr\SCT + echo "Press any key to stop the EFI SCT running" stallforkey.efi 5 if %lasterror% == 0 then goto Done @@ -46,7 +37,9 @@ for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F #Check if SCT run has already completed if exist FS%j:\acs_results\sct_results\Overall\Summary.log then - echo SCT has completed run. Press any key to start SCT execution from the beginning. WARNING: Ensure you have backed up the existing logs. + echo "SCT has completed run." + echo "Press any key to start SCT execution from the beginning." + echo "WARNING: Ensure you have backed up the existing logs." stallforkey.efi 5 if %lasterror% == 0 then #Backup the existing logs @@ -60,14 +53,14 @@ for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F endif endif - if exist FS%i:\EFI\BOOT\bbr\SCT\.passive.mode then - if exist FS%i:\EFI\BOOT\bbr\SCT\.verbose.mode then + if exist FS%i:\acs_tests\bbr\SCT\.passive.mode then + if exist FS%i:\acs_tests\bbr\SCT\.verbose.mode then Sct -c -p mnp -v else Sct -c -p mnp endif else - if exist FS%i:\EFI\BOOT\bbr\SCT\.verbose.mode then + if exist FS%i:\acs_tests\bbr\SCT\.verbose.mode then Sct -c -v else Sct -c @@ -75,18 +68,18 @@ for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F #SCT execution has finished. Copy the logs to acs_results if exist FS%j:\acs_results\sct_results\ then - if exist FS%i:\EFI\BOOT\bbr\SCT\Overall then - cp -r FS%i:\EFI\BOOT\bbr\SCT\Overall FS%j:\acs_results\sct_results\ + if exist FS%i:\acs_tests\bbr\SCT\Overall then + cp -r FS%i:\acs_tests\bbr\SCT\Overall FS%j:\acs_results\sct_results\ endif - if exist FS%i:\EFI\BOOT\bbr\SCT\Dependency\EfiCompliantBBTest then - cp -r FS%i:\EFI\BOOT\bbr\SCT\Dependency\EfiCompliantBBTest FS%j:\acs_results\sct_results\ + if exist FS%i:\acs_tests\bbr\SCT\Dependency\EfiCompliantBBTest then + cp -r FS%i:\acs_tests\bbr\SCT\Dependency\EfiCompliantBBTest FS%j:\acs_results\sct_results\ endif - if exist FS%i:\EFI\BOOT\bbr\SCT\Sequence then - cp -r FS%i:\EFI\BOOT\bbr\SCT\Sequence FS%j:\acs_results\sct_results\ + if exist FS%i:\acs_tests\bbr\SCT\Sequence then + cp -r FS%i:\acs_tests\bbr\SCT\Sequence FS%j:\acs_results\sct_results\ endif #Restart to avoid an impact of running SCT tests on rest of the suites - echo Reset the system ... + echo "Reset the system ..." reset endif #goto Done @@ -97,7 +90,7 @@ for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F cd FS%j:\acs_results mkdir sct_results FS%i: - cd FS%i:\EFI\BOOT\bbr\SCT + cd FS%i:\acs_tests\bbr\SCT if %1 == sct_extd then echo "Starting extended run of SCT" Sct -s EBBR_extd_run.seq diff --git a/sbbr/config/SBBRStartup.nsh b/sbbr/config/SBBRStartup.nsh index ef1f3b2..13d229c 100755 --- a/sbbr/config/SBBRStartup.nsh +++ b/sbbr/config/SBBRStartup.nsh @@ -1,41 +1,32 @@ -# Copyright (c) 2021, 2023 ARM Limited and Contributors. All rights reserved. -# -# Redistribution and use in source and binary forms, with or without -# modification, are permitted provided that the following conditions are met: -# -# Redistributions of source code must retain the above copyright notice, this -# list of conditions and the following disclaimer. +#!/usr/bin/env bash + +# Copyright (c) 2021-2024, Arm Limited or its affiliates. All rights reserved. +# SPDX-License-Identifier : Apache-2.0 # -# Redistributions in binary form must reproduce the above copyright notice, -# this list of conditions and the following disclaimer in the documentation -# and/or other materials provided with the distribution. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at # -# Neither the name of ARM nor the names of its contributors may be used -# to endorse or promote products derived from this software without specific -# prior written permission. +# http://www.apache.org/licenses/LICENSE-2.0 # -# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" -# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE -# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR -# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF -# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS -# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN -# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) -# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE -# POSSIBILITY OF SUCH DAMAGE. +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +## + echo -off for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F - if exist FS%i:\EFI\BOOT\bbr\SCT then + if exist FS%i:\acs_tests\bbr\SCT then # # Found EFI SCT harness # FS%i: - cd FS%i:\EFI\BOOT\bbr\SCT - echo Press any key to stop the EFI SCT running + cd FS%i:\acs_tests\bbr\SCT + echo "Press any key to stop the EFI SCT running" stallforkey.efi 5 if %lasterror% == 0 then goto Done @@ -46,7 +37,9 @@ for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F #Check if SCT run has already completed if exist FS%j:\acs_results\sct_results\Overall\Summary.log then - echo SCT has completed run. Press any key to start SCT execution from the beginning. WARNING: Ensure you have backed up the existing logs. + echo "SCT has completed run." + echo "Press any key to start SCT execution from the beginning." + echo "WARNING: Ensure you have backed up the existing logs." stallforkey.efi 5 if %lasterror% == 0 then #Backup the existing logs @@ -60,14 +53,14 @@ for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F endif endif - if exist FS%i:\EFI\BOOT\bbr\SCT\.passive.mode then - if exist FS%i:\EFI\BOOT\bbr\SCT\.verbose.mode then + if exist FS%i:\acs_tests\bbr\SCT\.passive.mode then + if exist FS%i:\acs_tests\bbr\SCT\.verbose.mode then Sct -c -p mnp -v else Sct -c -p mnp endif else - if exist FS%i:\EFI\BOOT\bbr\SCT\.verbose.mode then + if exist FS%i:\acs_tests\bbr\SCT\.verbose.mode then Sct -c -v else Sct -c @@ -75,18 +68,18 @@ for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F #SCT execution has finished. Copy the logs to acs_results if exist FS%j:\acs_results\sct_results\ then - if exist FS%i:\EFI\BOOT\bbr\SCT\Overall then - cp -r FS%i:\EFI\BOOT\bbr\SCT\Overall FS%j:\acs_results\sct_results\ + if exist FS%i:\acs_tests\bbr\SCT\Overall then + cp -r FS%i:\acs_tests\bbr\SCT\Overall FS%j:\acs_results\sct_results\ endif - if exist FS%i:\EFI\BOOT\bbr\SCT\Dependency\EfiCompliantBBTest then - cp -r FS%i:\EFI\BOOT\bbr\SCT\Dependency\EfiCompliantBBTest FS%j:\acs_results\sct_results\ + if exist FS%i:\acs_tests\bbr\SCT\Dependency\EfiCompliantBBTest then + cp -r FS%i:\acs_tests\bbr\SCT\Dependency\EfiCompliantBBTest FS%j:\acs_results\sct_results\ endif - if exist FS%i:\EFI\BOOT\bbr\SCT\Sequence then - cp -r FS%i:\EFI\BOOT\bbr\SCT\Sequence FS%j:\acs_results\sct_results\ + if exist FS%i:\acs_tests\bbr\SCT\Sequence then + cp -r FS%i:\acs_tests\bbr\SCT\Sequence FS%j:\acs_results\sct_results\ endif #Restart to avoid an impact of running SCT tests on rest of the suites - echo Reset the system ... + echo "Reset the system ..." reset endif #goto Done @@ -97,7 +90,7 @@ for %i in 0 1 2 3 4 5 6 7 8 9 A B C D E F cd FS%j:\acs_results mkdir sct_results FS%i: - cd FS%i:\EFI\BOOT\bbr\SCT + cd FS%i:\acs_tests\bbr\SCT if %1 == sct_extd then echo "Starting extended run of SCT" Sct -s SBBR_extd_run.seq From a52ade8fe199a7be5f554e8f532ca96452aa4f93 Mon Sep 17 00:00:00 2001 From: Amrathesh Date: Wed, 20 Nov 2024 15:15:03 +0530 Subject: [PATCH 4/4] added standalone sct version patches - added patches for sbbr and ebbr - script changes to apply the patches. Signed-off-by: Amrathesh Change-Id: Iae7d5895ab337ccb784514b9158dd6a00d663ba9 --- common/scripts/build-sct.sh | 22 +++++++++++++++++++++- ebbr/patches/standalone_ebbr_ver.patch | 12 ++++++++++++ sbbr/patches/standalone_sbbr_ver.patch | 12 ++++++++++++ 3 files changed, 45 insertions(+), 1 deletion(-) create mode 100644 ebbr/patches/standalone_ebbr_ver.patch create mode 100644 sbbr/patches/standalone_sbbr_ver.patch diff --git a/common/scripts/build-sct.sh b/common/scripts/build-sct.sh index b78720a..9402929 100755 --- a/common/scripts/build-sct.sh +++ b/common/scripts/build-sct.sh @@ -150,7 +150,7 @@ do_build() cp $BBR_DIR/sbbr/config/SBBR_extd_run.seq uefi-sct/SctPkg/BBR/ cp $BBR_DIR/sbbr/config/EfiCompliant_SBBR.ini uefi-sct/SctPkg/BBR/ if [[ $BUILD_TYPE != S ]]; then - if git apply --check $TOP_DIR/patches/sctversion.patch; then + if git apply --check $TOP_DIR/patches/sctversion.patch; then echo "Applying edk2-test BBR sctversion patch..." git apply --ignore-whitespace --ignore-space-change $TOP_DIR/patches/sctversion.patch else @@ -164,6 +164,26 @@ do_build() cp $BBR_DIR/common/config/ScrtStartup.nsh uefi-sct/SctPkg/BBR/ cp $BBR_DIR/common/config/SCRT.conf uefi-sct/SctPkg/BBR/ + # apply version patches for standalone BBR builds + if [[ $BUILD_TYPE = S ]]; then + if [ $BUILD_PLAT = EBBR ]; then + if git apply --check $BBR_DIR/ebbr/patches/standalone_ebbr_ver.patch; then + echo "Applying EBBR SCT version patch..." + git apply --ignore-whitespace --ignore-space-change $BBR_DIR/ebbr/patches/standalone_ebbr_ver.patch + else + echo "Error while applying EBBR SCT version patch..." + exit + fi + elif [ $BUILD_PLAT = SBBR ]; then + if git apply --check $BBR_DIR/sbbr/patches/standalone_sbbr_ver.patch; then + echo "Applying SBBR SCT version patch..." + git apply --ignore-whitespace --ignore-space-change $BBR_DIR/sbbr/patches/standalone_sbbr_ver.patch + else + echo "Error while applying SBBR SCT version patch..." + exit + fi + fi + fi if git apply --check $BBR_DIR/common/patches/edk2-test-bbr-build.patch; then echo "Applying edk2-test BBR build patch..." diff --git a/ebbr/patches/standalone_ebbr_ver.patch b/ebbr/patches/standalone_ebbr_ver.patch new file mode 100644 index 0000000..f0ab8cc --- /dev/null +++ b/ebbr/patches/standalone_ebbr_ver.patch @@ -0,0 +1,12 @@ +diff --git a/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c b/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c +index 94cae289..3685f025 100644 +--- a/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c ++++ b/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c +@@ -30,6 +30,7 @@ Abstract: + #include "StandardTest.h" + #include + ++#define ACS_VERSION "BBR ACS 2.2.0-BETA0 (EBBR)" + static EFI_TIME Epoch = { .Year = 1970, .Month = 1, .Day = 1 }; + + // diff --git a/sbbr/patches/standalone_sbbr_ver.patch b/sbbr/patches/standalone_sbbr_ver.patch new file mode 100644 index 0000000..05c2ead --- /dev/null +++ b/sbbr/patches/standalone_sbbr_ver.patch @@ -0,0 +1,12 @@ +diff --git a/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c b/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c +index 94cae289..1a8bb233 100644 +--- a/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c ++++ b/uefi-sct/SctPkg/TestInfrastructure/SCT/Drivers/StandardTest/StandardTest.c +@@ -30,6 +30,7 @@ Abstract: + #include "StandardTest.h" + #include + ++#define ACS_VERSION "BBR ACS 2.1.0-BETA0 (SBBR)" + static EFI_TIME Epoch = { .Year = 1970, .Month = 1, .Day = 1 }; + + //