On Fri, May 21, 2021 at 09:00:11AM +0900, Masami Hiramatsu wrote:
Hi,
2021年5月20日(木) 23:55 Grant Likely grant.likely@arm.com:
Thanks Masami,
Comments below...
On 20/05/2021 11:09, Masami Hiramatsu wrote:
Hi Grant,
I have a comment on the U-Boot configuration: https://github.com/ARM-software/ebbr/wiki/U-Boot-Configuration-Guide
Another comment: Please don't use "efidebug capsule update" command. The only way that the current implementation of capsule update with a capsule file supports (or CONFIG_EFI_CAPSULE_ON_DISK) is "to reboot the system".
-Takahiro Akashi
The U-Boot Sniff Test requires bootefi hello and selftest,
u-boot=> bootefi hello ${fdtcontroladdr} u-boot=> bootefi selftest ${fdtcontroladdr}
So, U-Boot needs to enable below options too.
CONFIG_CMD_BOOTEFI_HELLO_COMPILE=y CONFIG_CMD_BOOTEFI_HELLO=y CONFIG_CMD_BOOTEFI_SELFTEST=y
While these commands are useful, they should not be required to be built in. I've added those options to the bottom of the configuration guide and moved the test commands out of the sniff test and into the configuration guide for those who want to run those tests.
Thanks for the update!
And I have a question about SCT's EBBR result (according to the EBBR-Testing-Guide). Recently my team ran the SCT on our board and got some failures. One of them was related to the Auth variable,
/opt/sct/SctPkg/TestCase/UEFI/EFI/RuntimeServices/VariableServices/BlackBoxTest/AuthVariableServicesBBTestFunction.c 635 Status - Invalid Parameter RT.SetVariable - Create one Time Base Auth Variable, the expect return status should be EFI_SUCCESS FAILURE
But I think U-Boot Auth Variable is not enabled unless UEFI secure boot is enabled. So other test cases are waived. But this specific test case failed.
guid: 008E18A5-C345-48AE-9134-61A692E30B87 set guid: 9338D0EC-807B-4750-986A-8F2A91BB3616
Easy answer here is to enable secure boot in U-Boot to get rid of these failures. I've added that option to the wiki
CONFIG_EFI_SECURE_BOOT=y
Hmm, but there are some other Auth Variable tests are correctly waived on the result. So I think it should be waived too. And as you said below, since SystemReady IR doesn't require the secure boot, I think the secure boot should not be enabled for EBBR test.
Vincent, this is something to discuss. Secure Boot is supported, but not required by SystemReady IR. Should we ignore failures when secure boot is disabled in the parsing script?
Thank you,
g.
Thank you,
2021年5月12日(水) 19:46 Masami Hiramatsu masami.hiramatsu@linaro.org:
Hi Grant,
Thanks, this is what I need. I'll check them out!
2021年5月12日(水) 18:56 Grant Likely grant.likely@arm.com:
Hi Masami,
Here are the instructions that I've been working on:
https://github.com/ARM-software/ebbr/wiki/EBBR-Testing-Guide https://github.com/ARM-software/ebbr/wiki/U-Boot-Configuration-Guide
I hope that helps
g.
On 12/05/2021 02:02, Masami Hiramatsu wrote:
Hello Grant and Vincent,
I'm interested in passing SCT on my board with the latest U-Boot. Would you know which CONFIG options are required for the SCT? I guess some CONFIG_EFI* options are related, but some of them may not be needed. Is there any good documentation about configuring U-Boot?
Thank you,
2021年5月10日(月) 22:36 Grant Likely grant.likely@arm.com: > > For the EBBR meeting today: > > Attached is the test result report from running a recent version of > U-Boot on an iMX8 platform and parsed with the SCT_Parser tool. > > g. > > > -------- Forwarded Message -------- > Subject: Re: EBBR Testing topic for today? > Date: Mon, 10 May 2021 14:22:56 +0100 > From: Vincent Stehle Vincent.Stehle@arm.com > To: Grant Likely Grant.Likely@arm.com > > > > Hi Grant, > > Here are some more SCT results: a run from this morning on Compulab, > with latest firmware from Paul (+ 3 patches) and latest sct parser config. > > INFO main: 0 dropped(s), 0 failure(s), 66 ignored(s), 10753 pass(s), 60 > waived(s), 0 warning(s) > > (The attached summary excludes the pass.) > > Best regards, > Vincent. > > > > > _______________________________________________ > boot-architecture mailing list > boot-architecture@lists.linaro.org > https://lists.linaro.org/mailman/listinfo/boot-architecture
-- Masami Hiramatsu
-- Masami Hiramatsu
-- Masami Hiramatsu _______________________________________________ boot-architecture mailing list boot-architecture@lists.linaro.org https://lists.linaro.org/mailman/listinfo/boot-architecture