blob: 73d59bd3f15d8a267599245c05d096c09bd029cf [file] [log] [blame]
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +02001/*
Max Shvetsov103e0562021-02-04 16:58:31 +00002 * Copyright (c) 2020-2021, Arm Limited. All rights reserved.
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +02003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <arch_helpers.h>
J-Alves952e1f72021-07-30 17:19:09 +01008#include <cactus_test_cmds.h>
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +02009#include <plat_topology.h>
10#include <platform.h>
11#include <power_management.h>
12#include <test_helpers.h>
13#include <tftf_lib.h>
14
J-Alvesf1126f22020-11-02 17:28:20 +000015static struct mailbox_buffers test_mb = {.send = NULL, .recv = NULL};
16
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +020017int is_sys_suspend_state_ready(void)
18{
19 int aff_info;
20 unsigned int target_node;
21 u_register_t target_mpid;
22 u_register_t current_mpid = read_mpidr_el1() & MPID_MASK;
23
24 for_each_cpu(target_node) {
25 target_mpid = tftf_get_mpidr_from_node(target_node);
26
27 /* Skip current CPU, as it is powered on */
28 if (target_mpid == current_mpid)
29 continue;
30
31 aff_info = tftf_psci_affinity_info(target_mpid, MPIDR_AFFLVL0);
32 if (aff_info != PSCI_STATE_OFF)
33 return 0;
34 }
35
36 return 1;
37}
38
39void psci_system_reset(void)
40{
41 smc_args args = { SMC_PSCI_SYSTEM_RESET };
42 smc_ret_values ret;
43
44 ret = tftf_smc(&args);
45
46 /* The PSCI SYSTEM_RESET call is not supposed to return */
47 tftf_testcase_printf("System didn't reboot properly (%d)\n",
48 (unsigned int)ret.ret0);
49}
50
51int psci_mem_protect(int val)
52{
53 smc_args args = { SMC_PSCI_MEM_PROTECT};
54 smc_ret_values ret;
55
56 args.arg1 = val;
57 ret = tftf_smc(&args);
58
59 return ret.ret0;
60}
61
62int psci_mem_protect_check(uintptr_t addr, size_t size)
63{
64 smc_args args = { SMC_PSCI_MEM_PROTECT_CHECK };
65 smc_ret_values ret;
66
67 args.arg1 = addr;
68 args.arg2 = size;
69 ret = tftf_smc(&args);
70 return ret.ret0;
71}
72
73/*
74 * This function returns an address that can be used as
75 * sentinel for mem_protect functions. The logic behind
76 * it is that it has to search one region that doesn't intersect
77 * with the memory used by TFTF.
78 */
79unsigned char *psci_mem_prot_get_sentinel(void)
80{
81 const mem_region_t *ranges, *rp, *lim;
82 int nranges;
83 IMPORT_SYM(uintptr_t, __TFTF_BASE__, tftf_base);
84 IMPORT_SYM(uintptr_t, __TFTF_END__, tftf_end);
85 uintptr_t p = 0;
86
87 ranges = plat_get_prot_regions(&nranges);
88 if (!ranges)
89 return NULL;
90
91 lim = &ranges[nranges];
92 for (rp = ranges ; rp < lim; rp++) {
93 p = rp->addr;
94 if (p < tftf_base || p > tftf_end)
95 break;
96 p = p + (rp->size - 1);
97 if (p < tftf_base || p > tftf_end)
98 break;
99 }
100
101 return (rp == lim) ? NULL : (unsigned char *) p;
102}
103
104/*
105 * This function maps the memory region before the
106 * test and unmap it after the test is run
107 */
108test_result_t map_test_unmap(const map_args_unmap_t *args,
109 test_function_arg_t test)
110{
111 int mmap_ret;
112 test_result_t test_ret;
113
114 mmap_ret = mmap_add_dynamic_region(args->addr, args->addr,
115 args->size, args->attr);
116
117 if (mmap_ret != 0) {
118 tftf_testcase_printf("Couldn't map memory (ret = %d)\n",
119 mmap_ret);
120 return TEST_RESULT_FAIL;
121 }
122
123 test_ret = (*test)(args->arg);
124
125 mmap_ret = mmap_remove_dynamic_region(args->addr, args->size);
126 if (mmap_ret != 0) {
127 tftf_testcase_printf("Couldn't unmap memory (ret = %d)\n",
128 mmap_ret);
129 return TEST_RESULT_FAIL;
130 }
131
132 return test_ret;
133}
J-Alvesf1126f22020-11-02 17:28:20 +0000134
135void set_tftf_mailbox(const struct mailbox_buffers *mb)
136{
137 if (mb != NULL) {
138 test_mb = *mb;
139 }
140}
141
142bool get_tftf_mailbox(struct mailbox_buffers *mb)
143{
144 if ((test_mb.recv != NULL) && (test_mb.send != NULL)) {
145 *mb = test_mb;
146 return true;
147 }
148 return false;
149}
J-Alvesd708c032020-11-19 12:14:21 +0000150
J-Alves04469302021-01-21 14:48:13 +0000151test_result_t check_spmc_testing_set_up(
J-Alvesd708c032020-11-19 12:14:21 +0000152 uint32_t ffa_version_major, uint32_t ffa_version_minor,
153 const struct ffa_uuid *ffa_uuids, size_t ffa_uuids_size)
154{
155 struct mailbox_buffers mb;
156
157 if (ffa_uuids == NULL) {
158 ERROR("Invalid parameter ffa_uuids!\n");
159 return TEST_RESULT_FAIL;
160 }
161
162 SKIP_TEST_IF_FFA_VERSION_LESS_THAN(ffa_version_major,
163 ffa_version_minor);
164
165 /**********************************************************************
166 * If OP-TEE is SPMC skip the current test.
167 **********************************************************************/
168 if (check_spmc_execution_level()) {
169 VERBOSE("OPTEE as SPMC at S-EL1. Skipping test!\n");
170 return TEST_RESULT_SKIPPED;
171 }
172
173 GET_TFTF_MAILBOX(mb);
174
175 for (unsigned int i = 0U; i < ffa_uuids_size; i++)
Max Shvetsov0b7d25f2021-03-05 13:46:42 +0000176 SKIP_TEST_IF_FFA_ENDPOINT_NOT_DEPLOYED(*mb, ffa_uuids[i]);
J-Alvesd708c032020-11-19 12:14:21 +0000177
178 return TEST_RESULT_SUCCESS;
179}
J-Alvesd56c53c2021-07-01 16:32:16 +0100180
181test_result_t spm_run_multi_core_test(uintptr_t cpu_on_handler,
182 event_t *cpu_done)
183{
184 unsigned int lead_mpid = read_mpidr_el1() & MPID_MASK;
185 unsigned int core_pos, cpu_node, mpidr;
186 int32_t ret;
187
188 VERBOSE("Powering on all cpus.\n");
189
190 for (unsigned int i = 0U; i < PLATFORM_CORE_COUNT; i++) {
191 tftf_init_event(&cpu_done[i]);
192 }
193
194 for_each_cpu(cpu_node) {
195 mpidr = tftf_get_mpidr_from_node(cpu_node);
196 if (mpidr == lead_mpid) {
197 continue;
198 }
199
200 ret = tftf_cpu_on(mpidr, cpu_on_handler, 0U);
201 if (ret != 0) {
202 ERROR("tftf_cpu_on mpidr 0x%x returns %d\n",
203 mpidr, ret);
204 }
205 }
206
207 VERBOSE("Waiting secondary CPUs to turn off ...\n");
208
209 for_each_cpu(cpu_node) {
210 mpidr = tftf_get_mpidr_from_node(cpu_node);
211 if (mpidr == lead_mpid) {
212 continue;
213 }
214
215 core_pos = platform_get_core_pos(mpidr);
216 tftf_wait_for_event(&cpu_done[core_pos]);
217 }
218
219 VERBOSE("Done exiting.\n");
220
221 return TEST_RESULT_SUCCESS;
222}
J-Alves952e1f72021-07-30 17:19:09 +0100223
224bool spm_set_managed_exit_int(ffa_id_t sp_id, bool enable)
225{
226 smc_ret_values ret;
227
228 ret = cactus_interrupt_cmd(HYP_ID, sp_id, MANAGED_EXIT_INTERRUPT_ID,
229 enable, INTERRUPT_TYPE_FIQ);
230
231 if (!is_ffa_direct_response(ret) ||
232 cactus_get_response(ret) != CACTUS_SUCCESS) {
233 ERROR("Failed to enable Managed exit interrupt\n");
234 return false;
235 }
236
237 return true;
238}