/** @file Copyright (c) 2017 - 2018, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent **/ #ifndef _TEST_POINT_CHECK_LIB_H_ #define _TEST_POINT_CHECK_LIB_H_ #include #include // // Below is Test Point Hook Point. // // Naming: TestPoint // // Phase/Event(PEI) = MemoryDiscovered|EndOfPei // Phase/Event(DXE) = PciEnumerationDone|EndOfDxe|DxeSmmReadyToLock|ReadyToBoot // Phase/Event(SMM) = SmmEndOfDxe|SmmReadyToLock|SmmReadyToBoot // /** This service tests temporary memory functionality. Test subject: Temporary Memory Test overview: Reads/writes results on the stack and heap. Reporting mechanism: PPI @param[in] TempRamStart A pointer to the start of temporary memory. @param[in] TempRamEnd A pointer to the end of temporary memory. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointTempMemoryFunction ( IN VOID *TempRamStart, IN VOID *TempRamEnd ); /** This service tests debug configuration after debug device initialization. Test subject: Debug Capability Test overview: Dumps a struct of debug configuration parameters to the debug log. Reporting mechanism: Serial port shows the debug log. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointDebugInitDone ( VOID ); /** This service verifies MTRR settings after memory is discovered. Test subject: MTRRs after memory is discovered. Test overview: Verifies MTRR settings. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps results to the debug log. Examples of settings verified: No MTRR overlap, PEI data memory is writeback, and flash region is WP, MMIO is UC, etc. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointMemoryDiscoveredMtrrFunctional ( VOID ); /** This service verifies discovered memory resources after memory is discovered. Test subject: Resource description HOBs. Test overview: No memory resource overlap. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps results to the debug log. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointMemoryDiscoveredMemoryResourceFunctional ( VOID ); /** This service verifies the validity of published firmware volume resources. Test subject: FV HOB and FV Info PPI. Test overview: FV HOB and FV Info PPI. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps results to the debug log. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointMemoryDiscoveredFvInfoFunctional ( VOID ); /** This service verifies DMA protection configuration in PEI after memory is discovered. Test subject: DMA protection. Test overview: DMA protection in PEI. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointMemoryDiscoveredDmaProtectionEnabled ( VOID ); /** This service verifies system resources at the end of PEI. Test subject: Resource HOB and SMRAM HOB. Test overview: SMRAM configuration and no system resource overlap. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps results to the debug log. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointEndOfPeiSystemResourceFunctional ( VOID ); /** This service verifies MTRR settings at the end of PEI. Test subject: MTRRs after end of PEI. Test overview: Verifies MTRR settings. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps results to the debug log. Examples of settings verified: No MTRR overlap, DXE data memory is writeback, flash region may be UC, MMIO is UC, etc. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointEndOfPeiMtrrFunctional ( VOID ); /** This service verifies bus master enable (BME) is disabled at the end of PEI. Test subject: PCI device BME. Test overview: Verify BME is cleared. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps results to the debug log. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointEndOfPeiPciBusMasterDisabled ( VOID ); /** This service verifies bus master enable (BME) is disabled after PCI enumeration. Test subject: PCI device BME. Test overview: Verify BME is cleared. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps results to the debug log. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointPciEnumerationDonePciBusMasterDisabled ( VOID ); /** This service verifies PCI device resource assignment after PCI enumeration. Test subject: PCI device resources. Test overview: Verify all PCI devices have been assigned proper resources. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps PCI resource assignments to the debug log. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointPciEnumerationDonePciResourceAllocated ( VOID ); /** This service verifies no 3rd party PCI option ROMs (OPROMs) were dispatched prior to the end of DXE. Test subject: 3rd party OPROMs. Test overview: Verify no 3rd party PCI OPROMs were . Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps PCI resource assignments to the debug log. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointEndOfDxeNoThirdPartyPciOptionRom ( VOID ); /** This service verifies the DMA ACPI table is reported at the end of DXE. Test subject: DMA protection. Test overview: DMA ACPI table is reported. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the DMA ACPI table to the debug log. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointEndOfDxeDmaAcpiTableFunctional ( VOID ); /** This service verifies DMA protection configuration at the end of DXE. Test subject: DMA protection. Test overview: DMA protection in DXE. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the DMA ACPI table to the debug log. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointEndOfDxeDmaProtectionEnabled ( VOID ); /** This service verifies the validity of System Management RAM (SMRAM) alignment at SMM Ready To Lock. Test subject: SMRAM Information. Test overview: SMRAM is aligned. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the SMRAM region table to the debug log. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointDxeSmmReadyToLockSmramAligned ( VOID ); /** This service verifies the validity of the Windows SMM Security Mitigation Table (WSMT) at SMM Ready To Lock. Test subject: Windows Security SMM Mitigation Table. Test overview: The table is reported in compliance with the Windows SMM Security Mitigations Table ACPI table specification. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the WSMT to the debug log. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointDxeSmmReadyToLockWsmtTableFunctional ( VOID ); /** This service verifies the validity of the SMM page table at Ready To Boot. Test subject: SMM page table. Test overview: The SMM page table settings matches the SmmMemoryAttribute table. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Reports an error if verification fails. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointDxeSmmReadyToBootSmmPageProtection ( VOID ); /** This services verifies the validity of installed ACPI tables at Ready To Boot. Test subject: ACPI tables. Test overview: The ACPI table settings are valid. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the installed ACPI tables. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointReadyToBootAcpiTableFunctional ( VOID ); /** This services verifies ACPI table resources are in the GCD. Test subject: ACPI memory resources. Test overview: Memory resources are described consistently in both ACPI and GCD. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the installed ACPI tables and GCD. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointReadyToBootGcdResourceFunctional ( VOID ); /** This service verifies the validity of the memory type information settings. Test subject: Memory type information. Test overview: Inspect an verify memory type information is correct. Confirm no fragmentation exists in the ACPI/Reserved/Runtime regions. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the memory type information settings to the debug log. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointReadyToBootMemoryTypeInformationFunctional ( VOID ); /** This service verifies the validity of the memory type information settings. Test subject: Memory type information. Test overview: Inspect an verify memory type information is correct. Confirm no fragmentation exists in the ACPI/Reserved/Runtime regions. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the memory type information settings to the debug log. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointReadyToBootUefiMemoryAttributeTableFunctional ( VOID ); /** This service verifies the validity of the UEFI memory attribute table. Test subject: UEFI memory attribute table. Test overview: The UEFI memeory attribute table is reported. The image code/data is consistent with the table. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the UEFI image information and the UEFI memory attribute table. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointReadyToBootUefiBootVariableFunctional ( VOID ); /** This service verifies the consle variable information. Test subject: Console. Test overview: Inspect and verify the console variable information is correct. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the console variable information. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointReadyToBootUefiConsoleVariableFunctional ( VOID ); /** This service verifies the HSTI table. Test subject: HSTI table. Test overview: Verify the HSTI table is reported. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the HSTI table. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointReadyToBootHstiTableFunctional ( VOID ); /** This service verifies the ESRT table. Test subject: ESRT table. Test overview: Verify the ESRT table is reported. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the ESRT table. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointReadyToBootEsrtTableFunctional ( VOID ); /** This service verifies UEFI Secure Boot is enabled. Test subject: UEFI Secure Boot. Test overview: Verify the SecureBoot variable is set. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the SecureBoot variable. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointReadyToBootUefiSecureBootEnabled ( VOID ); /** This service verifies Platform Initialization (PI) Signed FV Boot is enabled. Test subject: PI Signed FV Boot. Test overview: Verify PI signed FV boot is enabled. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointReadyToBootPiSignedFvBootEnabled ( VOID ); /** This service verifies TCG Trusted Boot is enabled. Test subject: TCG Trusted Boot. Test overview: Verify the TCG protocol is installed. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the TCG protocol capability. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointReadyToBootTcgTrustedBootEnabled ( VOID ); /** This service verifies TCG Memory Overwrite Request (MOR) is enabled. Test subject: TCG MOR. Test overview: Verify the MOR UEFI variable is set. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the MOR UEFI variable. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointReadyToBootTcgMorEnabled ( VOID ); /** This service verifies SMI handler profiling. Test subject: SMI handler profiling. Test overview: Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the SMI handler profile. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointDxeSmmReadyToBootSmiHandlerInstrument ( VOID ); /** This service verifies SMRR configuration at the End of DXE. Test subject: SMRR. Test overview: Verify SMRR is aligned and SMRR matches SMRAM_INFO. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps SMRR and SMRAM_INFO. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointSmmEndOfDxeSmrrFunctional ( VOID ); /** This service verifies the validity of the SMM memory atttribute table at SMM Ready To Lock. Test subject: SMM memory attribute table. Test overview: Verify the SMM memory attribute table is reported. Verify image code/data is consistent with the SMM memory attribute table. Verify the GDT/IDT/PageTable is RO, data is NX, and code is RO. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Dumps the SMM memory attribute table and SMM image information. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointSmmReadyToLockSmmMemoryAttributeTableFunctional ( VOID ); /** This service verifies the security of SMM communication buffers at SMM Ready To Lock. Test subject: SMM communication buffer. Test overview: Verify only CommBuffer and MMIO are mapped in the page table. Reporting mechanism: Dumps the memory map and GCD map at SmmReadyToLock and checks at SmmReadyToBoot. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointSmmReadyToLockSecureSmmCommunicationBuffer ( VOID ); /** This service verifies the validity of the SMM page table at SMM Ready To Boot. Test subject: SMM page table. Test overview: Verify the SMM page table matches the SMM memory attribute table. Reporting mechanism: Set ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT. Reports an error message upon checking. @retval EFI_SUCCESS The test point check was performed successfully. @retval EFI_UNSUPPORTED The test point check is not supported on this platform. **/ EFI_STATUS EFIAPI TestPointSmmReadyToBootSmmPageProtection ( VOID ); /** This service verifies the system state after Exit Boot Services is invoked. @retval EFI_SUCCESS The test point check was performed successfully. **/ EFI_STATUS EFIAPI TestPointExitBootServices ( VOID ); /** This service verifies the system state within SMM after Exit Boot Services is invoked. @retval EFI_SUCCESS The test point check was performed successfully. **/ EFI_STATUS EFIAPI TestPointSmmExitBootServices ( VOID ); // // Below is detail definition for MinPlatform implementation // #define TEST_POINT_IMPLEMENTATION_ID_PLATFORM L"Minimum Platform TestPoint" #define TEST_POINT_IMPLEMENTATION_ID_PLATFORM_PEI TEST_POINT_IMPLEMENTATION_ID_PLATFORM L" (PEI)" #define TEST_POINT_IMPLEMENTATION_ID_PLATFORM_DXE TEST_POINT_IMPLEMENTATION_ID_PLATFORM L" (DXE)" #define TEST_POINT_IMPLEMENTATION_ID_PLATFORM_SMM TEST_POINT_IMPLEMENTATION_ID_PLATFORM L" (SMM)" #define TEST_POINT_FEATURE_SIZE 0x10 #define TEST_POINT_ERROR L"Error " #define TEST_POINT_PLATFORM_TEST_POINT L" Platform TestPoint" // Byte 0 - SEC/PEI #define TEST_POINT_TEMP_MEMORY_INIT_DONE L" - Temp Memory Init Done - " #define TEST_POINT_DEBUG_INIT_DONE L" - Debug Init Done - " #define TEST_POINT_BYTE0_TEMP_INIT_DONE BIT0 #define TEST_POINT_BYTE0_DEBUG_INIT_DONE BIT1 // Byte 1/2 - PEI #define TEST_POINT_MEMORY_DISCOVERED L" - Memory Discovered - " #define TEST_POINT_END_OF_PEI L" - End Of PEI - " #define TEST_POINT_BYTE1_MEMORY_DISCOVERED_MTRR_FUNCTIONAL BIT0 #define TEST_POINT_BYTE1_MEMORY_DISCOVERED_MEMORY_RESOURCE_FUNCTIONAL BIT1 #define TEST_POINT_BYTE1_MEMORY_DISCOVERED_FV_INFO_FUNCTIONAL BIT2 #define TEST_POINT_BYTE1_MEMORY_DISCOVERED_DMA_PROTECTION_ENABLED BIT3 #define TEST_POINT_BYTE1_MEMORY_DISCOVERED_MTRR_FUNCTIONAL_ERROR_CODE L"0x01000000" #define TEST_POINT_BYTE1_MEMORY_DISCOVERED_MTRR_FUNCTIONAL_ERROR_STRING L"Invalid MTRR Setting\r\n" #define TEST_POINT_BYTE1_MEMORY_DISCOVERED_MEMORY_RESOURCE_FUNCTIONAL_ERROR_CODE L"0x01010000" #define TEST_POINT_BYTE1_MEMORY_DISCOVERED_MEMORY_RESOURCE_FUNCTIONAL_ERROR_STRING L"Invalid Memory Resource\r\n" #define TEST_POINT_BYTE1_MEMORY_DISCOVERED_FV_INFO_FUNCTIONAL_ERROR_CODE L"0x01020000" #define TEST_POINT_BYTE1_MEMORY_DISCOVERED_FV_INFO_FUNCTIONAL_ERROR_STRING L"Invalid FV Information\r\n" #define TEST_POINT_BYTE1_MEMORY_DISCOVERED_DMA_PROTECTION_ENABLED_ERROR_CODE L"0x01030000" #define TEST_POINT_BYTE1_MEMORY_DISCOVERED_DMA_PROTECTION_ENABLED_ERROR_STRING L"DMA protection disabled\r\n" #define TEST_POINT_BYTE2_END_OF_PEI_SYSTEM_RESOURCE_FUNCTIONAL BIT0 #define TEST_POINT_BYTE2_END_OF_PEI_MTRR_FUNCTIONAL BIT1 #define TEST_POINT_BYTE2_END_OF_PEI_PCI_BUS_MASTER_DISABLED BIT2 #define TEST_POINT_BYTE2_END_OF_PEI_SYSTEM_RESOURCE_FUNCTIONAL_ERROR_CODE L"0x02000000" #define TEST_POINT_BYTE2_END_OF_PEI_SYSTEM_RESOURCE_FUNCTIONAL_ERROR_STRING L"Invalid System Resource\r\n" #define TEST_POINT_BYTE2_END_OF_PEI_MTRR_FUNCTIONAL_ERROR_CODE L"0x02010000" #define TEST_POINT_BYTE2_END_OF_PEI_MTRR_FUNCTIONAL_ERROR_STRING L"Invalid MTRR Setting\r\n" #define TEST_POINT_BYTE2_END_OF_PEI_PCI_BUS_MASTER_DISABLED_ERROR_CODE L"0x02020000" #define TEST_POINT_BYTE2_END_OF_PEI_PCI_BUS_MASTER_DISABLED_ERROR_STRING L"PCI Bus Master Enabled\r\n" // Byte 3/4/5 - DXE #define TEST_POINT_PCI_ENUMERATION_DONE L" - PCI Enumeration Done - " #define TEST_POINT_END_OF_DXE L" - End Of DXE - " #define TEST_POINT_DXE_SMM_READY_TO_LOCK L" - DXE SMM Ready To Lock - " #define TEST_POINT_READY_TO_BOOT L" - Ready To Boot - " #define TEST_POINT_EXIT_BOOT_SERVICES L" - Exit Boot Services - " #define TEST_POINT_BYTE3_PCI_ENUMERATION_DONE_RESOURCE_ALLOCATED BIT0 #define TEST_POINT_BYTE3_PCI_ENUMERATION_DONE_BUS_MASTER_DISABLED BIT1 #define TEST_POINT_BYTE3_END_OF_DXE_NO_THIRD_PARTY_PCI_OPTION_ROM BIT2 #define TEST_POINT_BYTE3_END_OF_DXE_DMA_ACPI_TABLE_FUNCTIONAL BIT3 #define TEST_POINT_BYTE3_END_OF_DXE_DMA_PROTECTION_ENABLED BIT4 #define TEST_POINT_BYTE3_PCI_ENUMERATION_DONE_RESOURCE_ALLOCATED_ERROR_CODE L"0x03000000" #define TEST_POINT_BYTE3_PCI_ENUMERATION_DONE_RESOURCE_ALLOCATED_ERROR_STRING L"Invalid PCI Resource\r\n" #define TEST_POINT_BYTE3_PCI_ENUMERATION_DONE_BUS_MASTER_DISABLED_ERROR_CODE L"0x03010000" #define TEST_POINT_BYTE3_PCI_ENUMERATION_DONE_BUS_MASTER_DISABLED_ERROR_STRING L"PCI Bus Master Enabled\r\n" #define TEST_POINT_BYTE3_END_OF_DXE_NO_THIRD_PARTY_PCI_OPTION_ROM_ERROR_CODE L"0x03020000" #define TEST_POINT_BYTE3_END_OF_DXE_NO_THIRD_PARTY_PCI_OPTION_ROM_ERROR_STRING L"Third Party Option ROM dispatched\r\n" #define TEST_POINT_BYTE3_END_OF_DXE_DMA_ACPI_TABLE_FUNCTIONAL_ERROR_CODE L"0x03030000" #define TEST_POINT_BYTE3_END_OF_DXE_DMA_ACPI_TABLE_FUNCTIONAL_ERROR_STRING L"No DMA ACPI table\r\n" #define TEST_POINT_BYTE3_END_OF_DXE_DMA_PROTECTION_ENABLED_ERROR_CODE L"0x03040000" #define TEST_POINT_BYTE3_END_OF_DXE_DXE_DMA_PROTECTION_ENABLED_ERROR_STRING L"DMA protection disabled\r\n" #define TEST_POINT_BYTE4_READY_TO_BOOT_MEMORY_TYPE_INFORMATION_FUNCTIONAL BIT0 #define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_MEMORY_ATTRIBUTE_TABLE_FUNCTIONAL BIT1 #define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_BOOT_VARIABLE_FUNCTIONAL BIT2 #define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_CONSOLE_VARIABLE_FUNCTIONAL BIT3 #define TEST_POINT_BYTE4_READY_TO_BOOT_ACPI_TABLE_FUNCTIONAL BIT4 #define TEST_POINT_BYTE4_READY_TO_BOOT_GCD_RESOURCE_FUNCTIONAL BIT5 #define TEST_POINT_BYTE4_READY_TO_BOOT_MEMORY_TYPE_INFORMATION_FUNCTIONAL_ERROR_CODE L"0x04000000" #define TEST_POINT_BYTE4_READY_TO_BOOT_MEMORY_TYPE_INFORMATION_FUNCTIONAL_ERROR_STRING L"Invalid Memory Type Information\r\n" #define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_MEMORY_ATTRIBUTE_TABLE_FUNCTIONAL_ERROR_CODE L"0x04010000" #define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_MEMORY_ATTRIBUTE_TABLE_FUNCTIONAL_ERROR_STRING L"Invalid Memory Attribute Table\r\n" #define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_BOOT_VARIABLE_FUNCTIONAL_ERROR_CODE L"0x04020000" #define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_BOOT_VARIABLE_FUNCTIONAL_ERROR_STRING L"Invalid Boot Variable\r\n" #define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_CONSOLE_VARIABLE_FUNCTIONAL_ERROR_CODE L"0x04030000" #define TEST_POINT_BYTE4_READY_TO_BOOT_UEFI_CONSOLE_VARIABLE_FUNCTIONAL_ERROR_STRING L"Invalid Console Variable\r\n" #define TEST_POINT_BYTE4_READY_TO_BOOT_ACPI_TABLE_FUNCTIONAL_ERROR_CODE L"0x04040000" #define TEST_POINT_BYTE4_READY_TO_BOOT_ACPI_TABLE_FUNCTIONAL_ERROR_STRING L"Invalid ACPI Table\r\n" #define TEST_POINT_BYTE4_READY_TO_BOOT_GCD_RESOURCE_FUNCTIONAL_ERROR_CODE L"0x04050000" #define TEST_POINT_BYTE4_READY_TO_BOOT_GCD_RESOURCE_FUNCTIONAL_ERROR_STRING L"Invalid GCD Resource\r\n" #define TEST_POINT_BYTE5_READY_TO_BOOT_UEFI_SECURE_BOOT_ENABLED BIT0 #define TEST_POINT_BYTE5_READY_TO_BOOT_PI_SIGNED_FV_BOOT_ENABLED BIT1 #define TEST_POINT_BYTE5_READY_TO_BOOT_TCG_TRUSTED_BOOT_ENABLED BIT2 #define TEST_POINT_BYTE5_READY_TO_BOOT_TCG_MOR_ENABLED BIT3 #define TEST_POINT_BYTE5_READY_TO_BOOT_UEFI_SECURE_BOOT_ENABLED_ERROR_CODE L"0x05000000" #define TEST_POINT_BYTE5_READY_TO_BOOT_UEFI_SECURE_BOOT_ENABLED_ERROR_STRING L"UEFI Secure Boot Disable\r\n" #define TEST_POINT_BYTE5_READY_TO_BOOT_PI_SIGNED_FV_BOOT_ENABLED_ERROR_CODE L"0x05010000" #define TEST_POINT_BYTE5_READY_TO_BOOT_PI_SIGNED_FV_BOOT_ENABLED_ERROR_STRING L"PI Signed FV Boot Disable\r\n" #define TEST_POINT_BYTE5_READY_TO_BOOT_TCG_TRUSTED_BOOT_ENABLED_ERROR_CODE L"0x05020000" #define TEST_POINT_BYTE5_READY_TO_BOOT_TCG_TRUSTED_BOOT_ENABLED_ERROR_STRING L"TCG Trusted Boot Disable\r\n" #define TEST_POINT_BYTE5_READY_TO_BOOT_TCG_MOR_ENABLED_ERROR_CODE L"0x05030000" #define TEST_POINT_BYTE5_READY_TO_BOOT_TCG_MOR_ENABLED_ERROR_STRING L"TCG MOR not enabled\r\n" // Byte 6/7 - SMM #define TEST_POINT_SMM_END_OF_DXE L" - SMM End Of DXE - " #define TEST_POINT_SMM_READY_TO_LOCK L" - SMM Ready To Lock - " #define TEST_POINT_SMM_READY_TO_BOOT L" - SMM Ready To Boot - " #define TEST_POINT_SMM_EXIT_BOOT_SERVICES L" - SMM Exit Boot Services - " #define TEST_POINT_INDEX_BYTE6_SMM 6 #define TEST_POINT_BYTE6_SMM_END_OF_DXE_SMRR_FUNCTIONAL BIT0 #define TEST_POINT_BYTE6_SMM_READY_TO_LOCK_SMM_MEMORY_ATTRIBUTE_TABLE_FUNCTIONAL BIT1 #define TEST_POINT_BYTE6_SMM_READY_TO_LOCK_SECURE_SMM_COMMUNICATION_BUFFER BIT2 #define TEST_POINT_BYTE6_SMM_READY_TO_BOOT_SMM_PAGE_LEVEL_PROTECTION BIT3 #define TEST_POINT_BYTE6_SMM_END_OF_DXE_SMRR_FUNCTIONAL_ERROR_CODE L"0x06000000" #define TEST_POINT_BYTE6_SMM_END_OF_DXE_SMRR_FUNCTIONAL_ERROR_STRING L"Invalid SMRR\r\n" #define TEST_POINT_BYTE6_SMM_READY_TO_LOCK_SMM_MEMORY_ATTRIBUTE_TABLE_FUNCTIONAL_ERROR_CODE L"0x06010000" #define TEST_POINT_BYTE6_SMM_READY_TO_LOCK_SMM_MEMORY_ATTRIBUTE_TABLE_FUNCTIONAL_ERROR_STRING L"Invalid SMM Memory Attribute Table\r\n" #define TEST_POINT_BYTE6_SMM_READY_TO_LOCK_SECURE_SMM_COMMUNICATION_BUFFER_ERROR_CODE L"0x06020000" #define TEST_POINT_BYTE6_SMM_READY_TO_LOCK_SECURE_SMM_COMMUNICATION_BUFFER_ERROR_STRING L"Unsecure SMM communication buffer\r\n" #define TEST_POINT_BYTE6_SMM_READY_TO_BOOT_SMM_PAGE_LEVEL_PROTECTION_ERROR_CODE L"0x06030000" #define TEST_POINT_BYTE6_SMM_READY_TO_BOOT_SMM_PAGE_LEVEL_PROTECTION_ERROR_STRING L"SMM page level protection disabled\r\n" #define TEST_POINT_BYTE7_DXE_SMM_READY_TO_LOCK_SMRAM_ALIGNED BIT0 #define TEST_POINT_BYTE7_DXE_SMM_READY_TO_LOCK_WSMT_TABLE_FUNCTIONAL BIT1 #define TEST_POINT_BYTE7_DXE_SMM_READY_TO_BOOT_SMI_HANDLER_INSTRUMENT BIT2 #define TEST_POINT_BYTE7_DXE_SMM_READY_TO_LOCK_SMRAM_ALIGNED_ERROR_CODE L"0x07000000" #define TEST_POINT_BYTE7_DXE_SMM_READY_TO_LOCK_SMRAM_ALIGNED_ERROR_STRING L"Invalid SMRAM Information\r\n" #define TEST_POINT_BYTE7_DXE_SMM_READY_TO_LOCK_WSMT_TABLE_FUNCTIONAL_ERROR_CODE L"0x07010000" #define TEST_POINT_BYTE7_DXE_SMM_READY_TO_LOCK_WSMT_TABLE_FUNCTIONAL_ERROR_STRING L"No WSMT table\r\n" #define TEST_POINT_BYTE7_DXE_SMM_READY_TO_BOOT_SMI_HANDLER_INSTRUMENT_ERROR_CODE L"0x07020000" #define TEST_POINT_BYTE7_DXE_SMM_READY_TO_BOOT_SMI_HANDLER_INSTRUMENT_ERROR_STRING L"No SMI Instrument\r\n" // Byte 8 - Advanced #define TEST_POINT_BYTE8_READY_TO_BOOT_ESRT_TABLE_FUNCTIONAL BIT0 #define TEST_POINT_BYTE8_READY_TO_BOOT_HSTI_TABLE_FUNCTIONAL BIT1 #define TEST_POINT_BYTE8_READY_TO_BOOT_ESRT_TABLE_FUNCTIONAL_ERROR_CODE L"0x08000000" #define TEST_POINT_BYTE8_READY_TO_BOOT_ESRT_TABLE_FUNCTIONAL_ERROR_STRING L"No ESRT\r\n" #define TEST_POINT_BYTE8_READY_TO_BOOT_HSTI_TABLE_FUNCTIONAL_ERROR_CODE L"0x08010000" #define TEST_POINT_BYTE8_READY_TO_BOOT_HSTI_TABLE_FUNCTIONAL_ERROR_STRING L"No HSTI\r\n" #pragma pack (1) typedef struct { UINT32 Version; UINT32 Role; CHAR16 ImplementationID[256]; UINT32 FeaturesSize; UINT8 FeaturesImplemented[TEST_POINT_FEATURE_SIZE]; UINT8 FeaturesVerified[TEST_POINT_FEATURE_SIZE]; CHAR16 End; } ADAPTER_INFO_PLATFORM_TEST_POINT_STRUCT; #pragma pack () #endif