← Back to team overview

firmware-testing-team team mailing list archive

Re: Fwd: Re: Using FWTS for Certification

 

I've been thinking a lot about this a lot while I'm currently in bed fighting a bad case of shingles :-/

fwts was designed to catch firmware errors - from my perspective it was a way to automate the kind of work I did in HWE to catch any problem early in the enablement phase so we could get firmware fixed or detect issues that we could fix in the kernel before we shipped a product. The mind set to fwts is: "automatically spot potential errors and get them fixed early". Honestly, it looks *REALLY* poor if the kernel spews out lots of warning and error messages on hardware that we've enabled.

This is a different use-case from what CERT requires. The firmware is not really fixable - the machine is already released and on the market and firmware upgrades are less likely.

From the enablement viewpoint, I wrote fwts to be pedantic so we can spot specific issues (such as missing controls like _BQC) because the kernel has to bodge and work around this features (it kind of works, but is not ideal) and it is good to get these fixed in firmware if we can. This is obviously not the case in the certification phase.

Some issues are marked "CRITICAL" such as _OSC as it most probably (or though possibly not) may lead to a poor configuration (e.g. poor power configuration) and it requires an engineer to look at. We don't want to fail energy star compliance tests do we? :-)

So, I think once you understand that fwts was designed to catch potential poorly written firmware issues so that can be investigated and fixed you can see that design feature does not match the requirements of certification. I suspect we may need to add a profile setting to fwts so it can be used for different use-cases.

Anyhow, that's just my view. Others may disagree. I'm very happy to discuss this and thrash out some kind of workable solution.

Colin


Follow ups

References