/** @file
Copyright (c) 2017 - 2018, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent
**/
#ifndef _TEST_POINT_CHECK_LIB_H_
#define _TEST_POINT_CHECK_LIB_H_
#include
#include
//
// Below is Test Point Hook Point.
//
// Naming: TestPoint
//
// Phase/Event(PEI) = MemoryDiscovered|EndOfPei
// Phase/Event(DXE) = PciEnumerationDone|EndOfDxe|DxeSmmReadyToLock|ReadyToBoot
// Phase/Event(SMM) = SmmEndOfDxe|SmmReadyToLock|SmmReadyToBoot
//
/**
This service tests temporary memory functionality.
Test subject: Temporary Memory
Test overview: Reads/writes results on the stack and heap.
Reporting mechanism: PPI
@param[in] TempRamStart A pointer to the start of temporary memory.
@param[in] TempRamEnd A pointer to the end of temporary memory.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointTempMemoryFunction (
IN VOID *TempRamStart,
IN VOID *TempRamEnd
);
/**
This service tests debug configuration after debug device initialization.
Test subject: Debug Capability
Test overview: Dumps a struct of debug configuration parameters to the debug log.
Reporting mechanism: Serial port shows the debug log.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointDebugInitDone (
VOID
);
/**
This service verifies MTRR settings after memory is discovered.
Test subject: MTRRs after memory is discovered.
Test overview: Verifies MTRR settings.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps results to the debug log.
Examples of settings verified: No MTRR overlap, PEI data memory is writeback, and flash region is WP, MMIO is UC, etc.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointMemoryDiscoveredMtrrFunctional (
VOID
);
/**
This service verifies discovered memory resources after memory is discovered.
Test subject: Resource description HOBs.
Test overview: No memory resource overlap.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps results to the debug log.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointMemoryDiscoveredMemoryResourceFunctional (
VOID
);
/**
This service verifies the validity of published firmware volume resources.
Test subject: FV HOB and FV Info PPI.
Test overview: FV HOB and FV Info PPI.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps results to the debug log.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointMemoryDiscoveredFvInfoFunctional (
VOID
);
/**
This service verifies DMA protection configuration in PEI after memory is discovered.
Test subject: DMA protection.
Test overview: DMA protection in PEI.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointMemoryDiscoveredDmaProtectionEnabled (
VOID
);
/**
This service verifies system resources at the end of PEI.
Test subject: Resource HOB and SMRAM HOB.
Test overview: SMRAM configuration and no system resource overlap.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps results to the debug log.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointEndOfPeiSystemResourceFunctional (
VOID
);
/**
This service verifies MTRR settings at the end of PEI.
Test subject: MTRRs after end of PEI.
Test overview: Verifies MTRR settings.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps results to the debug log.
Examples of settings verified: No MTRR overlap, DXE data memory is writeback, flash region may be UC, MMIO is UC, etc.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointEndOfPeiMtrrFunctional (
VOID
);
/**
This service verifies bus master enable (BME) is disabled at the end of PEI.
Test subject: PCI device BME.
Test overview: Verify BME is cleared.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps results to the debug log.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointEndOfPeiPciBusMasterDisabled (
VOID
);
/**
This service verifies bus master enable (BME) is disabled after PCI enumeration.
Test subject: PCI device BME.
Test overview: Verify BME is cleared.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps results to the debug log.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointPciEnumerationDonePciBusMasterDisabled (
VOID
);
/**
This service verifies PCI device resource assignment after PCI enumeration.
Test subject: PCI device resources.
Test overview: Verify all PCI devices have been assigned proper resources.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps PCI resource assignments to the debug log.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointPciEnumerationDonePciResourceAllocated (
VOID
);
/**
This service verifies no 3rd party PCI option ROMs (OPROMs) were dispatched prior to the end of DXE.
Test subject: 3rd party OPROMs.
Test overview: Verify no 3rd party PCI OPROMs were .
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps PCI resource assignments to the debug log.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointEndOfDxeNoThirdPartyPciOptionRom (
VOID
);
/**
This service verifies the DMA ACPI table is reported at the end of DXE.
Test subject: DMA protection.
Test overview: DMA ACPI table is reported.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the DMA ACPI table to the debug log.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointEndOfDxeDmaAcpiTableFunctional (
VOID
);
/**
This service verifies DMA protection configuration at the end of DXE.
Test subject: DMA protection.
Test overview: DMA protection in DXE.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the DMA ACPI table to the debug log.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointEndOfDxeDmaProtectionEnabled (
VOID
);
/**
This service verifies the validity of System Management RAM (SMRAM) alignment at SMM Ready To Lock.
Test subject: SMRAM Information.
Test overview: SMRAM is aligned.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the SMRAM region table to the debug log.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointDxeSmmReadyToLockSmramAligned (
VOID
);
/**
This service verifies the validity of the Windows SMM Security Mitigation Table (WSMT) at SMM Ready To Lock.
Test subject: Windows Security SMM Mitigation Table.
Test overview: The table is reported in compliance with the Windows SMM Security Mitigations Table
ACPI table specification.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the WSMT to the debug log.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointDxeSmmReadyToLockWsmtTableFunctional (
VOID
);
/**
This service verifies the validity of the SMM page table at Ready To Boot.
Test subject: SMM page table.
Test overview: The SMM page table settings matches the SmmMemoryAttribute table.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Reports an error if verification fails.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointDxeSmmReadyToBootSmmPageProtection (
VOID
);
/**
This services verifies the validity of installed ACPI tables at Ready To Boot.
Test subject: ACPI tables.
Test overview: The ACPI table settings are valid.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the installed ACPI tables.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointReadyToBootAcpiTableFunctional (
VOID
);
/**
This services verifies ACPI table resources are in the GCD.
Test subject: ACPI memory resources.
Test overview: Memory resources are described consistently in both ACPI and GCD.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the installed ACPI tables and GCD.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointReadyToBootGcdResourceFunctional (
VOID
);
/**
This service verifies the validity of the memory type information settings.
Test subject: Memory type information.
Test overview: Inspect an verify memory type information is correct.
Confirm no fragmentation exists in the ACPI/Reserved/Runtime regions.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the memory type information settings to the debug log.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointReadyToBootMemoryTypeInformationFunctional (
VOID
);
/**
This service verifies the validity of the memory type information settings.
Test subject: Memory type information.
Test overview: Inspect an verify memory type information is correct.
Confirm no fragmentation exists in the ACPI/Reserved/Runtime regions.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the memory type information settings to the debug log.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointReadyToBootUefiMemoryAttributeTableFunctional (
VOID
);
/**
This service verifies the validity of the UEFI memory attribute table.
Test subject: UEFI memory attribute table.
Test overview: The UEFI memeory attribute table is reported. The image code/data is consistent with the table.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the UEFI image information and the UEFI memory attribute table.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointReadyToBootUefiBootVariableFunctional (
VOID
);
/**
This service verifies the consle variable information.
Test subject: Console.
Test overview: Inspect and verify the console variable information is correct.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the console variable information.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointReadyToBootUefiConsoleVariableFunctional (
VOID
);
/**
This service verifies the HSTI table.
Test subject: HSTI table.
Test overview: Verify the HSTI table is reported.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the HSTI table.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointReadyToBootHstiTableFunctional (
VOID
);
/**
This service verifies the ESRT table.
Test subject: ESRT table.
Test overview: Verify the ESRT table is reported.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the ESRT table.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointReadyToBootEsrtTableFunctional (
VOID
);
/**
This service verifies UEFI Secure Boot is enabled.
Test subject: UEFI Secure Boot.
Test overview: Verify the SecureBoot variable is set.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the SecureBoot variable.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointReadyToBootUefiSecureBootEnabled (
VOID
);
/**
This service verifies Platform Initialization (PI) Signed FV Boot is enabled.
Test subject: PI Signed FV Boot.
Test overview: Verify PI signed FV boot is enabled.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointReadyToBootPiSignedFvBootEnabled (
VOID
);
/**
This service verifies TCG Trusted Boot is enabled.
Test subject: TCG Trusted Boot.
Test overview: Verify the TCG protocol is installed.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the TCG protocol capability.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointReadyToBootTcgTrustedBootEnabled (
VOID
);
/**
This service verifies TCG Memory Overwrite Request (MOR) is enabled.
Test subject: TCG MOR.
Test overview: Verify the MOR UEFI variable is set.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the MOR UEFI variable.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointReadyToBootTcgMorEnabled (
VOID
);
/**
This service verifies SMI handler profiling.
Test subject: SMI handler profiling.
Test overview:
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the SMI handler profile.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointDxeSmmReadyToBootSmiHandlerInstrument (
VOID
);
/**
This service verifies SMRR configuration at the End of DXE.
Test subject: SMRR.
Test overview: Verify SMRR is aligned and SMRR matches SMRAM_INFO.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps SMRR and SMRAM_INFO.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointSmmEndOfDxeSmrrFunctional (
VOID
);
/**
This service verifies the validity of the SMM memory atttribute table at SMM Ready To Lock.
Test subject: SMM memory attribute table.
Test overview: Verify the SMM memory attribute table is reported.
Verify image code/data is consistent with the SMM memory attribute table.
Verify the GDT/IDT/PageTable is RO, data is NX, and code is RO.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Dumps the SMM memory attribute table and SMM image information.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointSmmReadyToLockSmmMemoryAttributeTableFunctional (
VOID
);
/**
This service verifies the security of SMM communication buffers at SMM Ready To Lock.
Test subject: SMM communication buffer.
Test overview: Verify only CommBuffer and MMIO are mapped in the page table.
Reporting mechanism: Dumps the memory map and GCD map at SmmReadyToLock and checks at SmmReadyToBoot.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointSmmReadyToLockSecureSmmCommunicationBuffer (
VOID
);
/**
This service verifies the validity of the SMM page table at SMM Ready To Boot.
Test subject: SMM page table.
Test overview: Verify the SMM page table matches the SMM memory attribute table.
Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT.
Reports an error message upon checking.
@retval EFI_SUCCESS The test point check was performed successfully.
@retval EFI_UNSUPPORTED The test point check is not supported on this platform.
**/
EFI_STATUS
EFIAPI
TestPointSmmReadyToBootSmmPageProtection (
VOID
);
/**
This service verifies the system state after Exit Boot Services is invoked.
@retval EFI_SUCCESS The test point check was performed successfully.
**/
EFI_STATUS
EFIAPI
TestPointExitBootServices (
VOID
);
/**
This service verifies the system state within SMM after Exit Boot Services is invoked.
@retval EFI_SUCCESS The test point check was performed successfully.
**/
EFI_STATUS
EFIAPI
TestPointSmmExitBootServices (
VOID
);
//
// Below is detail definition for MinPlatform implementation
//
#define TEST_POINT_IMPLEMENTATION_ID_PLATFORM L"Minimum Platform TestPoint"
#define TEST_POINT_IMPLEMENTATION_ID_PLATFORM_PEI TEST_POINT_IMPLEMENTATION_ID_PLATFORM L" (PEI)"
#define TEST_POINT_IMPLEMENTATION_ID_PLATFORM_DXE TEST_POINT_IMPLEMENTATION_ID_PLATFORM L" (DXE)"
#define TEST_POINT_IMPLEMENTATION_ID_PLATFORM_SMM TEST_POINT_IMPLEMENTATION_ID_PLATFORM L" (SMM)"
#define TEST_POINT_FEATURE_SIZE 0x10
#define TEST_POINT_ERROR L"Error "
#define TEST_POINT_PLATFORM_TEST_POINT L" Platform TestPoint"
// Byte 0 - SEC/PEI
#define TEST_POINT_TEMP_MEMORY_INIT_DONE L" - Temp Memory Init Done - "
#define TEST_POINT_DEBUG_INIT_DONE L" - Debug Init Done - "
#define TEST_POINT_BYTE0_TEMP_INIT_DONE BIT0
#define TEST_POINT_BYTE0_DEBUG_INIT_DONE BIT1
// Byte 1/2 - PEI
#define TEST_POINT_MEMORY_DISCOVERED L" - Memory Discovered - "
#define TEST_POINT_END_OF_PEI L" - End Of PEI - "
#define TEST_POINT_BYTE1_MEMORY_DISCOVERED_MTRR_FUNCTIONAL BIT0
#define TEST_POINT_BYTE1_MEMORY_DISCOVERED_MEMORY_RESOURCE_FUNCTIONAL BIT1
#define TEST_POINT_BYTE1_MEMORY_DISCOVERED_FV_INFO_FUNCTIONAL BIT2
#define TEST_POINT_BYTE1_MEMORY_DISCOVERED_DMA_PROTECTION_ENABLED BIT3
#define TEST_POINT_BYTE1_MEMORY_DISCOVERED_MTRR_FUNCTIONAL_ERROR_CODE L"0x01000000"
#define TEST_POINT_BYTE1_MEMORY_DISCOVERED_MTRR_FUNCTIONAL_ERROR_STRING L"Invalid MTRR Setting\r\n"
#define TEST_POINT_BYTE1_MEMORY_DISCOVERED_MEMORY_RESOURCE_FUNCTIONAL_ERROR_CODE L"0x01010000"
#define TEST_POINT_BYTE1_MEMORY_DISCOVERED_MEMORY_RESOURCE_FUNCTIONAL_ERROR_STRING L"Invalid Memory Resource\r\n"
#define TEST_POINT_BYTE1_MEMORY_DISCOVERED_FV_INFO_FUNCTIONAL_ERROR_CODE L"0x01020000"
#define TEST_POINT_BYTE1_MEMORY_DISCOVERED_FV_INFO_FUNCTIONAL_ERROR_STRING L"Invalid FV Information\r\n"
#define TEST_POINT_BYTE1_MEMORY_DISCOVERED_DMA_PROTECTION_ENABLED_ERROR_CODE L"0x01030000"
#define TEST_POINT_BYTE1_MEMORY_DISCOVERED_DMA_PROTECTION_ENABLED_ERROR_STRING L"DMA protection disabled\r\n"
#define TEST_POINT_BYTE2_END_OF_PEI_SYSTEM_RESOURCE_FUNCTIONAL BIT0
#define TEST_POINT_BYTE2_END_OF_PEI_MTRR_FUNCTIONAL BIT1
#define TEST_POINT_BYTE2_END_OF_PEI_PCI_BUS_MASTER_DISABLED BIT2
#define TEST_POINT_BYTE2_END_OF_PEI_SYSTEM_RESOURCE_FUNCTIONAL_ERROR_CODE L"0x02000000"
#define TEST_POINT_BYTE2_END_OF_PEI_SYSTEM_RESOURCE_FUNCTIONAL_ERROR_STRING L"Invalid System Resource\r\n"
#define TEST_POINT_BYTE2_END_OF_PEI_MTRR_FUNCTIONAL_ERROR_CODE L"0x02010000"
#define TEST_POINT_BYTE2_END_OF_PEI_MTRR_FUNCTIONAL_ERROR_STRING L"Invalid MTRR Setting\r\n"
#define TEST_POINT_BYTE2_END_OF_PEI_PCI_BUS_MASTER_DISABLED_ERROR_CODE L"0x02020000"
#define TEST_POINT_BYTE2_END_OF_PEI_PCI_BUS_MASTER_DISABLED_ERROR_STRING L"PCI Bus Master Enabled\r\n"
// Byte 3/4/5 - DXE
#define TEST_POINT_PCI_ENUMERATION_DONE L" - PCI Enumeration Done - "
#define TEST_POINT_END_OF_DXE L" - End Of DXE - "
#define TEST_POINT_DXE_SMM_READY_TO_LOCK L" - DXE SMM Ready To Lock - "
#define TEST_POINT_READY_TO_BOOT L" - Ready To Boot - "
#define TEST_POINT_EXIT_BOOT_SERVICES L" - Exit Boot Services - "
#define TEST_POINT_BYTE3_PCI_ENUMERATION_DONE_RESOURCE_ALLOCATED BIT0
#define TEST_POINT_BYTE3_PCI_ENUMERATION_DONE_BUS_MASTER_DISABLED BIT1
#define TEST_POINT_BYTE3_END_OF_DXE_NO_THIRD_PARTY_PCI_OPTION_ROM BIT2
#define TEST_POINT_BYTE3_END_OF_DXE_DMA_ACPI_TABLE_FUNCTIONAL BIT3
#define TEST_POINT_BYTE3_END_OF_DXE_DMA_PROTECTION_ENABLED BIT4
#define TEST_POINT_BYTE3_PCI_ENUMERATION_DONE_RESOURCE_ALLOCATED_ERROR_CODE L"0x03000000"
#define TEST_POINT_BYTE3_PCI_ENUMERATION_DONE_RESOURCE_ALLOCATED_ERROR_STRING L"Invalid PCI Resource\r\n"
#define TEST_POINT_BYTE3_PCI_ENUMERATION_DONE_BUS_MASTER_DISABLED_ERROR_CODE L"0x03010000"
#define TEST_POINT_BYTE3_PCI_ENUMERATION_DONE_BUS_MASTER_DISABLED_ERROR_STRING L"PCI Bus Master Enabled\r\n"
#define TEST_POINT_BYTE3_END_OF_DXE_NO_THIRD_PARTY_PCI_OPTION_ROM_ERROR_CODE L"0x03020000"
#define TEST_POINT_BYTE3_END_OF_DXE_NO_THIRD_PARTY_PCI_OPTION_ROM_ERROR_STRING L"Third Party Option ROM dispatched\r\n"
#define TEST_POINT_BYTE3_END_OF_DXE_DMA_ACPI_TABLE_FUNCTIONAL_ERROR_CODE L"0x03030000"
#define TEST_POINT_BYTE3_END_OF_DXE_DMA_ACPI_TABLE_FUNCTIONAL_ERROR_STRING L"No DMA ACPI table\r\n"
#define TEST_POINT_BYTE3_END_OF_DXE_DMA_PROTECTION_ENABLED_ERROR_CODE L"0x03040000"
#define TEST_POINT_BYTE3_END_OF_DXE_DXE_DMA_PROTECTION_ENABLED_ERROR_STRING L"DMA protection disabled\r\n"
#define TEST_POINT_BYTE4_READY_TO_BOOT_MEMORY_TYPE_INFORMATION_FUNCTIONAL BIT0
#define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_MEMORY_ATTRIBUTE_TABLE_FUNCTIONAL BIT1
#define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_BOOT_VARIABLE_FUNCTIONAL BIT2
#define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_CONSOLE_VARIABLE_FUNCTIONAL BIT3
#define TEST_POINT_BYTE4_READY_TO_BOOT_ACPI_TABLE_FUNCTIONAL BIT4
#define TEST_POINT_BYTE4_READY_TO_BOOT_GCD_RESOURCE_FUNCTIONAL BIT5
#define TEST_POINT_BYTE4_READY_TO_BOOT_MEMORY_TYPE_INFORMATION_FUNCTIONAL_ERROR_CODE L"0x04000000"
#define TEST_POINT_BYTE4_READY_TO_BOOT_MEMORY_TYPE_INFORMATION_FUNCTIONAL_ERROR_STRING L"Invalid Memory Type Information\r\n"
#define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_MEMORY_ATTRIBUTE_TABLE_FUNCTIONAL_ERROR_CODE L"0x04010000"
#define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_MEMORY_ATTRIBUTE_TABLE_FUNCTIONAL_ERROR_STRING L"Invalid Memory Attribute Table\r\n"
#define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_BOOT_VARIABLE_FUNCTIONAL_ERROR_CODE L"0x04020000"
#define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_BOOT_VARIABLE_FUNCTIONAL_ERROR_STRING L"Invalid Boot Variable\r\n"
#define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_CONSOLE_VARIABLE_FUNCTIONAL_ERROR_CODE L"0x04030000"
#define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_CONSOLE_VARIABLE_FUNCTIONAL_ERROR_STRING L"Invalid Console Variable\r\n"
#define TEST_POINT_BYTE4_READY_TO_BOOT_ACPI_TABLE_FUNCTIONAL_ERROR_CODE L"0x04040000"
#define TEST_POINT_BYTE4_READY_TO_BOOT_ACPI_TABLE_FUNCTIONAL_ERROR_STRING L"Invalid ACPI Table\r\n"
#define TEST_POINT_BYTE4_READY_TO_BOOT_GCD_RESOURCE_FUNCTIONAL_ERROR_CODE L"0x04050000"
#define TEST_POINT_BYTE4_READY_TO_BOOT_GCD_RESOURCE_FUNCTIONAL_ERROR_STRING L"Invalid GCD Resource\r\n"
#define TEST_POINT_BYTE5_READY_TO_BOOT_UEFI_SECURE_BOOT_ENABLED BIT0
#define TEST_POINT_BYTE5_READY_TO_BOOT_PI_SIGNED_FV_BOOT_ENABLED BIT1
#define TEST_POINT_BYTE5_READY_TO_BOOT_TCG_TRUSTED_BOOT_ENABLED BIT2
#define TEST_POINT_BYTE5_READY_TO_BOOT_TCG_MOR_ENABLED BIT3
#define TEST_POINT_BYTE5_READY_TO_BOOT_UEFI_SECURE_BOOT_ENABLED_ERROR_CODE L"0x05000000"
#define TEST_POINT_BYTE5_READY_TO_BOOT_UEFI_SECURE_BOOT_ENABLED_ERROR_STRING L"UEFI Secure Boot Disable\r\n"
#define TEST_POINT_BYTE5_READY_TO_BOOT_PI_SIGNED_FV_BOOT_ENABLED_ERROR_CODE L"0x05010000"
#define TEST_POINT_BYTE5_READY_TO_BOOT_PI_SIGNED_FV_BOOT_ENABLED_ERROR_STRING L"PI Signed FV Boot Disable\r\n"
#define TEST_POINT_BYTE5_READY_TO_BOOT_TCG_TRUSTED_BOOT_ENABLED_ERROR_CODE L"0x05020000"
#define TEST_POINT_BYTE5_READY_TO_BOOT_TCG_TRUSTED_BOOT_ENABLED_ERROR_STRING L"TCG Trusted Boot Disable\r\n"
#define TEST_POINT_BYTE5_READY_TO_BOOT_TCG_MOR_ENABLED_ERROR_CODE L"0x05030000"
#define TEST_POINT_BYTE5_READY_TO_BOOT_TCG_MOR_ENABLED_ERROR_STRING L"TCG MOR not enabled\r\n"
// Byte 6/7 - SMM
#define TEST_POINT_SMM_END_OF_DXE L" - SMM End Of DXE - "
#define TEST_POINT_SMM_READY_TO_LOCK L" - SMM Ready To Lock - "
#define TEST_POINT_SMM_READY_TO_BOOT L" - SMM Ready To Boot - "
#define TEST_POINT_SMM_EXIT_BOOT_SERVICES L" - SMM Exit Boot Services - "
#define TEST_POINT_INDEX_BYTE6_SMM 6
#define TEST_POINT_BYTE6_SMM_END_OF_DXE_SMRR_FUNCTIONAL BIT0
#define TEST_POINT_BYTE6_SMM_READY_TO_LOCK_SMM_MEMORY_ATTRIBUTE_TABLE_FUNCTIONAL BIT1
#define TEST_POINT_BYTE6_SMM_READY_TO_LOCK_SECURE_SMM_COMMUNICATION_BUFFER BIT2
#define TEST_POINT_BYTE6_SMM_READY_TO_BOOT_SMM_PAGE_LEVEL_PROTECTION BIT3
#define TEST_POINT_BYTE6_SMM_END_OF_DXE_SMRR_FUNCTIONAL_ERROR_CODE L"0x06000000"
#define TEST_POINT_BYTE6_SMM_END_OF_DXE_SMRR_FUNCTIONAL_ERROR_STRING L"Invalid SMRR\r\n"
#define TEST_POINT_BYTE6_SMM_READY_TO_LOCK_SMM_MEMORY_ATTRIBUTE_TABLE_FUNCTIONAL_ERROR_CODE L"0x06010000"
#define TEST_POINT_BYTE6_SMM_READY_TO_LOCK_SMM_MEMORY_ATTRIBUTE_TABLE_FUNCTIONAL_ERROR_STRING L"Invalid SMM Memory Attribute Table\r\n"
#define TEST_POINT_BYTE6_SMM_READY_TO_LOCK_SECURE_SMM_COMMUNICATION_BUFFER_ERROR_CODE L"0x06020000"
#define TEST_POINT_BYTE6_SMM_READY_TO_LOCK_SECURE_SMM_COMMUNICATION_BUFFER_ERROR_STRING L"Unsecure SMM communication buffer\r\n"
#define TEST_POINT_BYTE6_SMM_READY_TO_BOOT_SMM_PAGE_LEVEL_PROTECTION_ERROR_CODE L"0x06030000"
#define TEST_POINT_BYTE6_SMM_READY_TO_BOOT_SMM_PAGE_LEVEL_PROTECTION_ERROR_STRING L"SMM page level protection disabled\r\n"
#define TEST_POINT_BYTE7_DXE_SMM_READY_TO_LOCK_SMRAM_ALIGNED BIT0
#define TEST_POINT_BYTE7_DXE_SMM_READY_TO_LOCK_WSMT_TABLE_FUNCTIONAL BIT1
#define TEST_POINT_BYTE7_DXE_SMM_READY_TO_BOOT_SMI_HANDLER_INSTRUMENT BIT2
#define TEST_POINT_BYTE7_DXE_SMM_READY_TO_LOCK_SMRAM_ALIGNED_ERROR_CODE L"0x07000000"
#define TEST_POINT_BYTE7_DXE_SMM_READY_TO_LOCK_SMRAM_ALIGNED_ERROR_STRING L"Invalid SMRAM Information\r\n"
#define TEST_POINT_BYTE7_DXE_SMM_READY_TO_LOCK_WSMT_TABLE_FUNCTIONAL_ERROR_CODE L"0x07010000"
#define TEST_POINT_BYTE7_DXE_SMM_READY_TO_LOCK_WSMT_TABLE_FUNCTIONAL_ERROR_STRING L"No WSMT table\r\n"
#define TEST_POINT_BYTE7_DXE_SMM_READY_TO_BOOT_SMI_HANDLER_INSTRUMENT_ERROR_CODE L"0x07020000"
#define TEST_POINT_BYTE7_DXE_SMM_READY_TO_BOOT_SMI_HANDLER_INSTRUMENT_ERROR_STRING L"No SMI Instrument\r\n"
// Byte 8 - Advanced
#define TEST_POINT_BYTE8_READY_TO_BOOT_ESRT_TABLE_FUNCTIONAL BIT0
#define TEST_POINT_BYTE8_READY_TO_BOOT_HSTI_TABLE_FUNCTIONAL BIT1
#define TEST_POINT_BYTE8_READY_TO_BOOT_ESRT_TABLE_FUNCTIONAL_ERROR_CODE L"0x08000000"
#define TEST_POINT_BYTE8_READY_TO_BOOT_ESRT_TABLE_FUNCTIONAL_ERROR_STRING L"No ESRT\r\n"
#define TEST_POINT_BYTE8_READY_TO_BOOT_HSTI_TABLE_FUNCTIONAL_ERROR_CODE L"0x08010000"
#define TEST_POINT_BYTE8_READY_TO_BOOT_HSTI_TABLE_FUNCTIONAL_ERROR_STRING L"No HSTI\r\n"
#pragma pack (1)
typedef struct {
UINT32 Version;
UINT32 Role;
CHAR16 ImplementationID[256];
UINT32 FeaturesSize;
UINT8 FeaturesImplemented[TEST_POINT_FEATURE_SIZE];
UINT8 FeaturesVerified[TEST_POINT_FEATURE_SIZE];
CHAR16 End;
} ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT;
#pragma pack ()
#endif