blob: d86aa61e425ad4e9d8e0f7681a9f176f09a9847c [file] [log] [blame]
J-Alvesd1aae292020-10-08 17:16:58 +01001/*
J-Alves32ccd2b2021-12-14 14:59:51 +00002 * Copyright (c) 2021-2022, Arm Limited. All rights reserved.
J-Alvesd1aae292020-10-08 17:16:58 +01003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#ifndef CACTUS_TEST_CMDS
8#define CACTUS_TEST_CMDS
9
J-Alvesd1aae292020-10-08 17:16:58 +010010#include <ffa_helpers.h>
Manish Pandey9ee6a8d2021-03-03 09:53:33 +000011#include <spm_common.h>
J-Alvesd1aae292020-10-08 17:16:58 +010012
13/**
14 * Success and error return to be sent over a msg response.
15 */
J-Alves0e1e7ca2021-01-25 14:11:06 +000016#define CACTUS_SUCCESS U(0)
17#define CACTUS_ERROR U(-1)
18
19/**
20 * Error codes.
21 */
22#define CACTUS_ERROR_INVALID U(1)
23#define CACTUS_ERROR_TEST U(2)
24#define CACTUS_ERROR_FFA_CALL U(3)
J-Alves4cb9dee2021-03-03 13:59:52 +000025#define CACTUS_ERROR_UNHANDLED U(4)
J-Alvesd1aae292020-10-08 17:16:58 +010026
Madhukar Pappireddy4d76de02022-06-22 17:38:21 -050027#define ECHO_VAL1 U(0xa0a0a0a0)
28#define ECHO_VAL2 U(0xb0b0b0b0)
29#define ECHO_VAL3 U(0xc0c0c0c0)
30
J-Alvesd1aae292020-10-08 17:16:58 +010031/**
Daniel Boulbyce386b12022-03-29 18:36:36 +010032 * Get command from struct ffa_value.
J-Alvesd1aae292020-10-08 17:16:58 +010033 */
Daniel Boulbyce386b12022-03-29 18:36:36 +010034static inline uint64_t cactus_get_cmd(struct ffa_value ret)
J-Alves53392012020-11-18 14:51:57 +000035{
Daniel Boulbyce386b12022-03-29 18:36:36 +010036 return (uint64_t)ret.arg3;
J-Alves53392012020-11-18 14:51:57 +000037}
J-Alvesd1aae292020-10-08 17:16:58 +010038
39/**
40 * Template for commands to be sent to CACTUS partitions over direct
41 * messages interfaces.
42 */
Daniel Boulbyce386b12022-03-29 18:36:36 +010043static inline struct ffa_value cactus_send_cmd(
Daniel Boulbye79d2072021-03-03 11:34:53 +000044 ffa_id_t source, ffa_id_t dest, uint64_t cmd, uint64_t val0,
J-Alves53392012020-11-18 14:51:57 +000045 uint64_t val1, uint64_t val2, uint64_t val3)
46{
J-Alvesecd30742021-02-19 18:31:06 +000047 return ffa_msg_send_direct_req64(source, dest, cmd, val0, val1, val2,
48 val3);
J-Alves53392012020-11-18 14:51:57 +000049}
J-Alvesd1aae292020-10-08 17:16:58 +010050
J-Alves7d28b332021-02-11 16:08:08 +000051/**
52 * Template for responses to Cactus commands.
53 * 'cactus_send_response' is the template for custom responses, in case there is
54 * a need to propagate more than one value in the response of a command.
55 */
Daniel Boulbyce386b12022-03-29 18:36:36 +010056static inline struct ffa_value cactus_send_response(
J-Alves7a595282021-03-29 15:11:11 +010057 ffa_id_t source, ffa_id_t dest, uint32_t resp, uint64_t val0,
J-Alves7d28b332021-02-11 16:08:08 +000058 uint64_t val1, uint64_t val2, uint64_t val3)
59{
J-Alvesecd30742021-02-19 18:31:06 +000060 return ffa_msg_send_direct_resp64(source, dest, resp, val0, val1,
61 val2, val3);
J-Alves7d28b332021-02-11 16:08:08 +000062}
63
64/**
65 * For responses of one value only.
66 */
Daniel Boulbyce386b12022-03-29 18:36:36 +010067static inline struct ffa_value cactus_response(
Daniel Boulbye79d2072021-03-03 11:34:53 +000068 ffa_id_t source, ffa_id_t dest, uint32_t response)
J-Alves7d28b332021-02-11 16:08:08 +000069{
Madhukar Pappireddy3c287262021-08-05 14:39:24 -050070 return cactus_send_response(source, dest, response, 0, 0, 0, 0);
J-Alves7d28b332021-02-11 16:08:08 +000071}
72
Daniel Boulbyce386b12022-03-29 18:36:36 +010073static inline uint32_t cactus_get_response(struct ffa_value ret)
J-Alves7d28b332021-02-11 16:08:08 +000074{
Daniel Boulbyce386b12022-03-29 18:36:36 +010075 return (uint32_t)ret.arg3;
J-Alves7d28b332021-02-11 16:08:08 +000076}
77
78/**
79 * In a successful test, in case the SP needs to propagate an extra value
80 * to conclude the test.
81 * If more arguments are needed, a custom response should be defined for the
82 * specific test.
83 */
Daniel Boulbyce386b12022-03-29 18:36:36 +010084static inline struct ffa_value cactus_success_resp(
Daniel Boulbye79d2072021-03-03 11:34:53 +000085 ffa_id_t source, ffa_id_t dest, uint64_t value)
J-Alves7d28b332021-02-11 16:08:08 +000086{
87 return cactus_send_response(source, dest, CACTUS_SUCCESS, value,
88 0, 0, 0);
89}
90
91/**
92 * In case the test fails on the SP side, the 'error_code' should help specify
93 * the reason, which can be specific to the test, or general ones as defined
94 * in the error code list.
95 */
Daniel Boulbyce386b12022-03-29 18:36:36 +010096static inline struct ffa_value cactus_error_resp(
Daniel Boulbye79d2072021-03-03 11:34:53 +000097 ffa_id_t source, ffa_id_t dest, uint32_t error_code)
J-Alves7d28b332021-02-11 16:08:08 +000098{
99 return cactus_send_response(source, dest, CACTUS_ERROR, error_code,
100 0, 0, 0);
101}
102
Daniel Boulbyce386b12022-03-29 18:36:36 +0100103static inline uint32_t cactus_error_code(struct ffa_value ret)
J-Alves7d28b332021-02-11 16:08:08 +0000104{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100105 return (uint32_t) ret.arg4;
J-Alves7d28b332021-02-11 16:08:08 +0000106}
107
J-Alvesd1aae292020-10-08 17:16:58 +0100108/**
J-Alves28672f92020-11-09 15:34:31 +0000109 * With this test command the sender transmits a 64-bit value that it then
110 * expects to receive on the respective command response.
111 *
112 * The id is the hex representation of the string 'echo'.
113 */
114#define CACTUS_ECHO_CMD U(0x6563686f)
115
Daniel Boulbyce386b12022-03-29 18:36:36 +0100116static inline struct ffa_value cactus_echo_send_cmd(
Daniel Boulbye79d2072021-03-03 11:34:53 +0000117 ffa_id_t source, ffa_id_t dest, uint64_t echo_val)
J-Alves53392012020-11-18 14:51:57 +0000118{
119 return cactus_send_cmd(source, dest, CACTUS_ECHO_CMD, echo_val, 0, 0,
120 0);
121}
J-Alves28672f92020-11-09 15:34:31 +0000122
Daniel Boulbyce386b12022-03-29 18:36:36 +0100123static inline uint64_t cactus_echo_get_val(struct ffa_value ret)
J-Alves53392012020-11-18 14:51:57 +0000124{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100125 return (uint64_t)ret.arg4;
J-Alves53392012020-11-18 14:51:57 +0000126}
J-Alves28672f92020-11-09 15:34:31 +0000127
128/**
129 * Command to request a cactus secure partition to send an echo command to
130 * another partition.
131 *
132 * The sender of this command expects to receive CACTUS_SUCCESS if the requested
133 * echo interaction happened successfully, or CACTUS_ERROR otherwise.
134 */
135#define CACTUS_REQ_ECHO_CMD (CACTUS_ECHO_CMD + 1)
136
Daniel Boulbyce386b12022-03-29 18:36:36 +0100137static inline struct ffa_value cactus_req_echo_send_cmd(
Daniel Boulbye79d2072021-03-03 11:34:53 +0000138 ffa_id_t source, ffa_id_t dest, ffa_id_t echo_dest,
J-Alves53392012020-11-18 14:51:57 +0000139 uint64_t echo_val)
140{
141 return cactus_send_cmd(source, dest, CACTUS_REQ_ECHO_CMD, echo_val,
142 echo_dest, 0, 0);
143}
J-Alves28672f92020-11-09 15:34:31 +0000144
Daniel Boulbyce386b12022-03-29 18:36:36 +0100145static inline ffa_id_t cactus_req_echo_get_echo_dest(struct ffa_value ret)
J-Alves53392012020-11-18 14:51:57 +0000146{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100147 return (ffa_id_t)ret.arg5;
J-Alves53392012020-11-18 14:51:57 +0000148}
J-Alves28672f92020-11-09 15:34:31 +0000149
150/**
J-Alves1d203f12020-11-11 11:38:49 +0000151 * Command to create a cyclic dependency between SPs, which could result in
152 * a deadlock. This aims at proving such scenario cannot happen.
153 * If the deadlock happens, the system will just hang.
154 * If the deadlock is prevented, the last partition to use the command will
155 * send response CACTUS_SUCCESS.
156 *
157 * The id is the hex representation of the string 'dead'.
158 */
159#define CACTUS_DEADLOCK_CMD U(0x64656164)
160
Daniel Boulbyce386b12022-03-29 18:36:36 +0100161static inline struct ffa_value cactus_deadlock_send_cmd(
Daniel Boulbye79d2072021-03-03 11:34:53 +0000162 ffa_id_t source, ffa_id_t dest, ffa_id_t next_dest)
J-Alves53392012020-11-18 14:51:57 +0000163{
164 return cactus_send_cmd(source, dest, CACTUS_DEADLOCK_CMD, next_dest, 0,
165 0, 0);
166}
J-Alves1d203f12020-11-11 11:38:49 +0000167
Daniel Boulbyce386b12022-03-29 18:36:36 +0100168static inline ffa_id_t cactus_deadlock_get_next_dest(struct ffa_value ret)
J-Alves53392012020-11-18 14:51:57 +0000169{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100170 return (ffa_id_t)ret.arg4;
J-Alves53392012020-11-18 14:51:57 +0000171}
J-Alves1d203f12020-11-11 11:38:49 +0000172
173/**
174 * Command to request a sequence CACTUS_DEADLOCK_CMD between the partitions
175 * of specified IDs.
176 */
177#define CACTUS_REQ_DEADLOCK_CMD (CACTUS_DEADLOCK_CMD + 1)
178
Daniel Boulbyce386b12022-03-29 18:36:36 +0100179static inline struct ffa_value cactus_req_deadlock_send_cmd(
Daniel Boulbye79d2072021-03-03 11:34:53 +0000180 ffa_id_t source, ffa_id_t dest, ffa_id_t next_dest1,
181 ffa_id_t next_dest2)
J-Alves53392012020-11-18 14:51:57 +0000182{
183 return cactus_send_cmd(source, dest, CACTUS_REQ_DEADLOCK_CMD,
184 next_dest1, next_dest2, 0, 0);
185}
J-Alves1d203f12020-11-11 11:38:49 +0000186
J-Alves53392012020-11-18 14:51:57 +0000187/* To get next_dest1 use CACTUS_DEADLOCK_GET_NEXT_DEST */
Daniel Boulbyce386b12022-03-29 18:36:36 +0100188static inline ffa_id_t cactus_deadlock_get_next_dest2(struct ffa_value ret)
J-Alves53392012020-11-18 14:51:57 +0000189{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100190 return (ffa_id_t)ret.arg5;
J-Alves53392012020-11-18 14:51:57 +0000191}
J-Alves1d203f12020-11-11 11:38:49 +0000192
193/**
J-Alvesd1aae292020-10-08 17:16:58 +0100194 * Command to notify cactus of a memory management operation. The cmd value
195 * should be the memory management smc function id.
J-Alvesb9085f82020-12-07 10:57:28 +0000196 *
197 * The id is the hex representation of the string "mem"
J-Alvesd1aae292020-10-08 17:16:58 +0100198 */
J-Alvesb9085f82020-12-07 10:57:28 +0000199#define CACTUS_MEM_SEND_CMD U(0x6d656d)
J-Alvesd1aae292020-10-08 17:16:58 +0100200
Daniel Boulbyce386b12022-03-29 18:36:36 +0100201static inline struct ffa_value cactus_mem_send_cmd(
Daniel Boulbye79d2072021-03-03 11:34:53 +0000202 ffa_id_t source, ffa_id_t dest, uint32_t mem_func,
J-Alves32ccd2b2021-12-14 14:59:51 +0000203 ffa_memory_handle_t handle, ffa_memory_region_flags_t retrieve_flags,
Federico Recanati6328fb02022-01-14 15:48:16 +0100204 bool non_secure, uint16_t word_to_write)
J-Alves53392012020-11-18 14:51:57 +0000205{
Federico Recanati6328fb02022-01-14 15:48:16 +0100206 /*
207 * `non_secure` and `word_to_write` are packed in the same register.
208 * Packed in a 32-bit value to support AArch32 platforms (eg Juno).
209 */
210 uint32_t val3 = ((uint32_t)non_secure << 16) | word_to_write;
J-Alves53392012020-11-18 14:51:57 +0000211 return cactus_send_cmd(source, dest, CACTUS_MEM_SEND_CMD, mem_func,
Federico Recanati6328fb02022-01-14 15:48:16 +0100212 handle, retrieve_flags, val3);
J-Alves53392012020-11-18 14:51:57 +0000213}
J-Alvesb9085f82020-12-07 10:57:28 +0000214
Daniel Boulbyce386b12022-03-29 18:36:36 +0100215static inline ffa_memory_handle_t cactus_mem_send_get_handle(
216 struct ffa_value ret)
J-Alves53392012020-11-18 14:51:57 +0000217{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100218 return (ffa_memory_handle_t)ret.arg5;
J-Alves53392012020-11-18 14:51:57 +0000219}
J-Alvesd1aae292020-10-08 17:16:58 +0100220
J-Alves32ccd2b2021-12-14 14:59:51 +0000221static inline ffa_memory_region_flags_t cactus_mem_send_get_retrv_flags(
Daniel Boulbyce386b12022-03-29 18:36:36 +0100222 struct ffa_value ret)
J-Alves32ccd2b2021-12-14 14:59:51 +0000223{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100224 return (ffa_memory_region_flags_t)ret.arg6;
J-Alves32ccd2b2021-12-14 14:59:51 +0000225}
226
Daniel Boulbyce386b12022-03-29 18:36:36 +0100227static inline uint16_t cactus_mem_send_words_to_write(struct ffa_value ret)
J-Alves32ccd2b2021-12-14 14:59:51 +0000228{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100229 return (uint16_t)ret.arg7;
Federico Recanati6328fb02022-01-14 15:48:16 +0100230}
231
Daniel Boulbyce386b12022-03-29 18:36:36 +0100232static inline bool cactus_mem_send_get_non_secure(struct ffa_value ret)
Federico Recanati6328fb02022-01-14 15:48:16 +0100233{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100234 return (bool)(ret.arg7 >> 16);
J-Alves32ccd2b2021-12-14 14:59:51 +0000235}
236
J-Alvesd1aae292020-10-08 17:16:58 +0100237/**
J-Alves542d8d82020-11-18 10:34:06 +0000238 * Command to request a memory management operation. The 'mem_func' argument
239 * identifies the operation that is to be performend, and 'receiver' is the id
240 * of the partition to receive the memory region.
241 *
242 * The command id is the hex representation of the string "memory".
243 */
244#define CACTUS_REQ_MEM_SEND_CMD U(0x6d656d6f7279)
245
Daniel Boulbyce386b12022-03-29 18:36:36 +0100246static inline struct ffa_value cactus_req_mem_send_send_cmd(
Daniel Boulbye79d2072021-03-03 11:34:53 +0000247 ffa_id_t source, ffa_id_t dest, uint32_t mem_func,
Federico Recanati6328fb02022-01-14 15:48:16 +0100248 ffa_id_t receiver, bool non_secure)
J-Alves53392012020-11-18 14:51:57 +0000249{
250 return cactus_send_cmd(source, dest, CACTUS_REQ_MEM_SEND_CMD, mem_func,
Federico Recanati6328fb02022-01-14 15:48:16 +0100251 receiver, non_secure, 0);
J-Alves53392012020-11-18 14:51:57 +0000252}
J-Alves542d8d82020-11-18 10:34:06 +0000253
Daniel Boulbyce386b12022-03-29 18:36:36 +0100254static inline uint32_t cactus_req_mem_send_get_mem_func(struct ffa_value ret)
J-Alves53392012020-11-18 14:51:57 +0000255{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100256 return (uint32_t)ret.arg4;
J-Alves53392012020-11-18 14:51:57 +0000257}
258
Daniel Boulbyce386b12022-03-29 18:36:36 +0100259static inline ffa_id_t cactus_req_mem_send_get_receiver(struct ffa_value ret)
J-Alves53392012020-11-18 14:51:57 +0000260{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100261 return (ffa_id_t)ret.arg5;
J-Alves53392012020-11-18 14:51:57 +0000262}
J-Alves542d8d82020-11-18 10:34:06 +0000263
Daniel Boulbyce386b12022-03-29 18:36:36 +0100264static inline bool cactus_req_mem_send_get_non_secure(struct ffa_value ret)
Federico Recanati6328fb02022-01-14 15:48:16 +0100265{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100266 return (bool)ret.arg6;
Federico Recanati6328fb02022-01-14 15:48:16 +0100267}
268
J-Alves542d8d82020-11-18 10:34:06 +0000269/**
Olivier Deprez881b1992020-12-01 15:34:34 +0100270 * Request to fill SIMD vectors with dummy values with purpose to check a
271 * save/restore routine during the context switches between secure world and
272 * normal world.
273 *
274 * The command id is the hex representation of the string "SIMD"
275 */
276#define CACTUS_REQ_SIMD_FILL_CMD U(0x53494d44)
277
Daniel Boulbyce386b12022-03-29 18:36:36 +0100278static inline struct ffa_value cactus_req_simd_fill_send_cmd(
Daniel Boulbye79d2072021-03-03 11:34:53 +0000279 ffa_id_t source, ffa_id_t dest)
Olivier Deprez881b1992020-12-01 15:34:34 +0100280{
J-Alves0e1e7ca2021-01-25 14:11:06 +0000281 return cactus_send_cmd(source, dest, CACTUS_REQ_SIMD_FILL_CMD, 0, 0, 0,
282 0);
Olivier Deprez881b1992020-12-01 15:34:34 +0100283}
284
Manish Pandey9ee6a8d2021-03-03 09:53:33 +0000285/**
286 * Command to request cactus to sleep for the given time in ms
287 *
288 * The command id is the hex representation of string "sleep"
289 */
290#define CACTUS_SLEEP_CMD U(0x736c656570)
291
Daniel Boulbyce386b12022-03-29 18:36:36 +0100292static inline struct ffa_value cactus_sleep_cmd(
Daniel Boulbye79d2072021-03-03 11:34:53 +0000293 ffa_id_t source, ffa_id_t dest, uint32_t sleep_time)
Manish Pandey9ee6a8d2021-03-03 09:53:33 +0000294{
295 return cactus_send_cmd(source, dest, CACTUS_SLEEP_CMD, sleep_time, 0, 0,
296 0);
297}
298
Madhukar Pappireddyb6402592021-08-20 13:13:49 -0500299/**
300 * Command to request cactus to forward sleep command for the given time in ms
301 *
302 * The sender of this command expects to receive CACTUS_SUCCESS if the requested
303 * echo interaction happened successfully, or CACTUS_ERROR otherwise.
304 */
305#define CACTUS_FWD_SLEEP_CMD (CACTUS_SLEEP_CMD + 1)
306
Daniel Boulbyce386b12022-03-29 18:36:36 +0100307static inline struct ffa_value cactus_fwd_sleep_cmd(
Madhukar Pappireddyb6402592021-08-20 13:13:49 -0500308 ffa_id_t source, ffa_id_t dest, ffa_id_t fwd_dest,
309 uint32_t sleep_time)
310{
311 return cactus_send_cmd(source, dest, CACTUS_FWD_SLEEP_CMD, sleep_time,
312 fwd_dest, 0, 0);
313}
314
Daniel Boulbyce386b12022-03-29 18:36:36 +0100315static inline uint32_t cactus_get_sleep_time(struct ffa_value ret)
Manish Pandey9ee6a8d2021-03-03 09:53:33 +0000316{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100317 return (uint32_t)ret.arg4;
Manish Pandey9ee6a8d2021-03-03 09:53:33 +0000318}
319
Daniel Boulbyce386b12022-03-29 18:36:36 +0100320static inline ffa_id_t cactus_get_fwd_sleep_dest(struct ffa_value ret)
Madhukar Pappireddyb6402592021-08-20 13:13:49 -0500321{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100322 return (ffa_id_t)ret.arg5;
Madhukar Pappireddyb6402592021-08-20 13:13:49 -0500323}
324
Manish Pandey9ee6a8d2021-03-03 09:53:33 +0000325/**
Madhukar Pappireddy407befc2021-12-17 11:06:17 -0600326 * Command to request cactus to sleep for half the given time in ms, trigger
327 * trusted watchdog timer and then sleep again for another half the given time.
328 *
329 * The sender of this command expects to receive CACTUS_SUCCESS if the requested
330 * echo interaction happened successfully, or CACTUS_ERROR otherwise.
331 */
332#define CACTUS_SLEEP_TRIGGER_TWDOG_CMD (CACTUS_SLEEP_CMD + 2)
333
Daniel Boulbyce386b12022-03-29 18:36:36 +0100334static inline struct ffa_value cactus_sleep_trigger_wdog_cmd(
Madhukar Pappireddy407befc2021-12-17 11:06:17 -0600335 ffa_id_t source, ffa_id_t dest, uint32_t sleep_time,
336 uint64_t wdog_time)
337{
338 return cactus_send_cmd(source, dest, CACTUS_SLEEP_TRIGGER_TWDOG_CMD, sleep_time,
339 wdog_time, 0, 0);
340}
341
342
Daniel Boulbyce386b12022-03-29 18:36:36 +0100343static inline uint32_t cactus_get_wdog_trigger_duration(struct ffa_value ret)
Madhukar Pappireddy407befc2021-12-17 11:06:17 -0600344{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100345 return (uint32_t)ret.arg5;
Madhukar Pappireddy407befc2021-12-17 11:06:17 -0600346}
347
348/**
Manish Pandey9ee6a8d2021-03-03 09:53:33 +0000349 * Command to request cactus to enable/disable an interrupt
350 *
351 * The command id is the hex representation of string "intr"
352 */
353#define CACTUS_INTERRUPT_CMD U(0x696e7472)
354
Daniel Boulbyce386b12022-03-29 18:36:36 +0100355static inline struct ffa_value cactus_interrupt_cmd(
Daniel Boulbye79d2072021-03-03 11:34:53 +0000356 ffa_id_t source, ffa_id_t dest, uint32_t interrupt_id,
Manish Pandey9ee6a8d2021-03-03 09:53:33 +0000357 bool enable, uint32_t pin)
358{
359 return cactus_send_cmd(source, dest, CACTUS_INTERRUPT_CMD, interrupt_id,
360 enable, pin, 0);
361}
362
Daniel Boulbyce386b12022-03-29 18:36:36 +0100363static inline uint32_t cactus_get_interrupt_id(struct ffa_value ret)
Manish Pandey9ee6a8d2021-03-03 09:53:33 +0000364{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100365 return (uint32_t)ret.arg4;
Manish Pandey9ee6a8d2021-03-03 09:53:33 +0000366}
367
Daniel Boulbyce386b12022-03-29 18:36:36 +0100368static inline bool cactus_get_interrupt_enable(struct ffa_value ret)
Manish Pandey9ee6a8d2021-03-03 09:53:33 +0000369{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100370 return (bool)ret.arg5;
Manish Pandey9ee6a8d2021-03-03 09:53:33 +0000371}
372
Daniel Boulbyce386b12022-03-29 18:36:36 +0100373static inline enum interrupt_pin cactus_get_interrupt_pin(struct ffa_value ret)
Manish Pandey9ee6a8d2021-03-03 09:53:33 +0000374{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100375 return (enum interrupt_pin)ret.arg6;
Manish Pandey9ee6a8d2021-03-03 09:53:33 +0000376}
377
Madhukar Pappireddy172523b2020-12-31 19:25:33 -0600378/**
379 * Request to initiate DMA transaction by upstream peripheral.
380 *
381 * The command id is the hex representation of the string "SMMU"
382 */
383#define CACTUS_DMA_SMMUv3_CMD (0x534d4d55)
384
Daniel Boulbyce386b12022-03-29 18:36:36 +0100385static inline struct ffa_value cactus_send_dma_cmd(
Daniel Boulbye79d2072021-03-03 11:34:53 +0000386 ffa_id_t source, ffa_id_t dest)
Madhukar Pappireddy172523b2020-12-31 19:25:33 -0600387{
388 return cactus_send_cmd(source, dest, CACTUS_DMA_SMMUv3_CMD, 0, 0, 0,
389 0);
390}
J-Alvesb4e89a22021-03-09 10:04:39 +0000391
392/*
393 * Request SP to bind a notification to a FF-A endpoint. In case of error
394 * when using the FFA_NOTIFICATION_BIND interface, include the error code
395 * in the response to the command's request. The receiver and sender arguments
396 * are propagated through the command's arguments, to allow the test of
397 * erroneous uses of the FFA_NOTIFICATION_BIND interface.
398 *
399 * The command id is the hex representation of the string "bind".
400 */
401#define CACTUS_NOTIFICATION_BIND_CMD U(0x62696e64)
402
Daniel Boulbyce386b12022-03-29 18:36:36 +0100403static inline struct ffa_value cactus_notification_bind_send_cmd(
J-Alvesb4e89a22021-03-09 10:04:39 +0000404 ffa_id_t source, ffa_id_t dest, ffa_id_t receiver,
405 ffa_id_t sender, ffa_notification_bitmap_t notifications, uint32_t flags)
406{
407 return cactus_send_cmd(source, dest, CACTUS_NOTIFICATION_BIND_CMD,
408 receiver, sender, notifications, flags);
409}
410
411/**
412 * Request to SP unbind a notification. In case of error when using the
413 * FFA_NOTIFICATION_UNBIND interface, the test includes the error code in the
414 * response. The receiver and sender arguments are propagated throught the
415 * command's arguments, to allow the test of erroneous uses of the
416 * FFA_NOTIFICATION_BIND interface.
417 *
418 * The command id is the hex representation of the string "unbind".
419 */
420#define CACTUS_NOTIFICATION_UNBIND_CMD U(0x756e62696e64)
421
Daniel Boulbyce386b12022-03-29 18:36:36 +0100422static inline struct ffa_value cactus_notification_unbind_send_cmd(
J-Alvesb4e89a22021-03-09 10:04:39 +0000423 ffa_id_t source, ffa_id_t dest, ffa_id_t receiver,
424 ffa_id_t sender, ffa_notification_bitmap_t notifications)
425{
426 return cactus_send_cmd(source, dest, CACTUS_NOTIFICATION_UNBIND_CMD,
427 receiver, sender, notifications, 0);
428}
429
Daniel Boulbyce386b12022-03-29 18:36:36 +0100430static inline ffa_id_t cactus_notification_get_receiver(struct ffa_value ret)
J-Alvesb4e89a22021-03-09 10:04:39 +0000431{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100432 return (ffa_id_t)ret.arg4;
J-Alvesb4e89a22021-03-09 10:04:39 +0000433}
434
Daniel Boulbyce386b12022-03-29 18:36:36 +0100435static inline ffa_id_t cactus_notification_get_sender(struct ffa_value ret)
J-Alvesb4e89a22021-03-09 10:04:39 +0000436{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100437 return (ffa_id_t)ret.arg5;
J-Alvesb4e89a22021-03-09 10:04:39 +0000438}
439
440static inline ffa_notification_bitmap_t cactus_notification_get_notifications(
Daniel Boulbyce386b12022-03-29 18:36:36 +0100441 struct ffa_value ret)
J-Alvesb4e89a22021-03-09 10:04:39 +0000442{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100443 return (uint64_t)ret.arg6;
J-Alvesb4e89a22021-03-09 10:04:39 +0000444}
445
J-Alvesab775912021-03-29 15:22:33 +0100446/**
447 * Request SP to get notifications. The arguments to use in ffa_notification_get
448 * are propagated on the command to test erroneous uses of the interface.
449 * In a successful call to the interface, the SP's response payload should
450 * include all bitmaps returned by the SPMC.
451 *
452 * The command id is the hex representation of the string "getnot".
453 */
454#define CACTUS_NOTIFICATION_GET_CMD U(0x6765746e6f74)
455
Daniel Boulbyce386b12022-03-29 18:36:36 +0100456static inline struct ffa_value cactus_notification_get_send_cmd(
J-Alvesab775912021-03-29 15:22:33 +0100457 ffa_id_t source, ffa_id_t dest, ffa_id_t receiver,
J-Alvesa076d4c2021-10-19 16:06:15 +0100458 uint32_t vcpu_id, uint32_t flags, bool check_npi_handled)
J-Alvesab775912021-03-29 15:22:33 +0100459{
460 return cactus_send_cmd(source, dest, CACTUS_NOTIFICATION_GET_CMD,
J-Alvesa076d4c2021-10-19 16:06:15 +0100461 receiver, vcpu_id, check_npi_handled, flags);
J-Alvesab775912021-03-29 15:22:33 +0100462}
463
Daniel Boulbyce386b12022-03-29 18:36:36 +0100464static inline uint32_t cactus_notification_get_vcpu(struct ffa_value ret)
J-Alvesab775912021-03-29 15:22:33 +0100465{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100466 return (uint32_t)ret.arg5;
J-Alvesab775912021-03-29 15:22:33 +0100467}
468
Daniel Boulbyce386b12022-03-29 18:36:36 +0100469static inline uint32_t cactus_notification_get_flags(struct ffa_value ret)
J-Alvesb4e89a22021-03-09 10:04:39 +0000470{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100471 return (uint32_t)ret.arg7;
J-Alvesb4e89a22021-03-09 10:04:39 +0000472}
473
Daniel Boulbyce386b12022-03-29 18:36:36 +0100474static inline struct ffa_value cactus_notifications_get_success_resp(
J-Alvesab775912021-03-29 15:22:33 +0100475 ffa_id_t source, ffa_id_t dest, uint64_t from_sp,
476 uint64_t from_vm)
477{
478 return cactus_send_response(source, dest, CACTUS_SUCCESS, from_sp,
479 from_vm, 0, 0);
480}
481
Daniel Boulbyce386b12022-03-29 18:36:36 +0100482static inline uint64_t cactus_notifications_get_from_sp(struct ffa_value ret)
J-Alvesab775912021-03-29 15:22:33 +0100483{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100484 return (uint64_t)ret.arg4;
J-Alvesab775912021-03-29 15:22:33 +0100485}
486
Daniel Boulbyce386b12022-03-29 18:36:36 +0100487static inline uint64_t cactus_notifications_get_from_vm(struct ffa_value ret)
J-Alvesab775912021-03-29 15:22:33 +0100488{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100489 return (uint64_t)ret.arg5;
J-Alvesab775912021-03-29 15:22:33 +0100490}
491
Daniel Boulbyce386b12022-03-29 18:36:36 +0100492static inline bool cactus_notifications_check_npi_handled(struct ffa_value ret)
J-Alvesa076d4c2021-10-19 16:06:15 +0100493{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100494 return (bool)ret.arg6;
J-Alvesa076d4c2021-10-19 16:06:15 +0100495}
496
J-Alvesab775912021-03-29 15:22:33 +0100497/**
498 * Request SP to set notifications. The arguments to use in ffa_notification_set
499 * are propagated on the command to test erroneous uses of the interface.
500 * In case of error while calling the interface, the response should include the
J-Alvesfbbbf622021-07-30 16:43:36 +0100501 * error code. If in the flags a delay SRI is requested, cactus should
502 * send a CACTUS_ECHO_CMD to the SP specified as `echo_dest`. This should help
503 * validate that the SRI is only sent when returning execution to the NWd.
J-Alvesab775912021-03-29 15:22:33 +0100504 */
505#define CACTUS_NOTIFICATIONS_SET_CMD U(0x6e6f74736574)
506
Daniel Boulbyce386b12022-03-29 18:36:36 +0100507static inline struct ffa_value cactus_notifications_set_send_cmd(
J-Alvesab775912021-03-29 15:22:33 +0100508 ffa_id_t source, ffa_id_t dest, ffa_id_t receiver,
J-Alvesfbbbf622021-07-30 16:43:36 +0100509 ffa_id_t sender, uint32_t flags, ffa_notification_bitmap_t notifications,
510 ffa_id_t echo_dest)
J-Alvesab775912021-03-29 15:22:33 +0100511{
512 return cactus_send_cmd(source, dest, CACTUS_NOTIFICATIONS_SET_CMD,
J-Alvesfbbbf622021-07-30 16:43:36 +0100513 (uint32_t)receiver | ((uint32_t)sender << 16),
514 echo_dest,
515 notifications, flags);
516}
517
Daniel Boulbyce386b12022-03-29 18:36:36 +0100518static inline ffa_id_t cactus_notifications_set_get_receiver(
519 struct ffa_value ret)
J-Alvesfbbbf622021-07-30 16:43:36 +0100520{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100521 return (ffa_id_t)(ret.arg4 & 0xFFFFU);
J-Alvesfbbbf622021-07-30 16:43:36 +0100522}
523
Daniel Boulbyce386b12022-03-29 18:36:36 +0100524static inline ffa_id_t cactus_notifications_set_get_sender(struct ffa_value ret)
J-Alvesfbbbf622021-07-30 16:43:36 +0100525{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100526 return (ffa_id_t)((ret.arg4 >> 16U) & 0xFFFFU);
J-Alvesab775912021-03-29 15:22:33 +0100527}
528
Madhukar Pappireddy3c287262021-08-05 14:39:24 -0500529/**
530 * Request to start trusted watchdog timer.
531 *
532 * The command id is the hex representaton of the string "WDOG"
533 */
534#define CACTUS_TWDOG_START_CMD U(0x57444f47)
535
Daniel Boulbyce386b12022-03-29 18:36:36 +0100536static inline struct ffa_value cactus_send_twdog_cmd(
Madhukar Pappireddy3c287262021-08-05 14:39:24 -0500537 ffa_id_t source, ffa_id_t dest, uint64_t time)
538{
539 return cactus_send_cmd(source, dest, CACTUS_TWDOG_START_CMD, time, 0, 0,
540 0);
541}
542
Daniel Boulbyce386b12022-03-29 18:36:36 +0100543static inline uint32_t cactus_get_wdog_duration(struct ffa_value ret)
Madhukar Pappireddy3c287262021-08-05 14:39:24 -0500544{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100545 return (uint32_t)ret.arg4;
Madhukar Pappireddy3c287262021-08-05 14:39:24 -0500546}
547
J-Alvesf7535f42021-07-30 11:58:41 +0100548/**
549 * Request SP to return the current count of handled requests.
550 *
551 * The command id is the hex representation of the string "getnot".
552 */
553#define CACTUS_GET_REQ_COUNT_CMD U(0x726571636f756e74)
554
Daniel Boulbyce386b12022-03-29 18:36:36 +0100555static inline struct ffa_value cactus_get_req_count_send_cmd(
J-Alvesf7535f42021-07-30 11:58:41 +0100556 ffa_id_t source, ffa_id_t dest)
557{
558 return cactus_send_cmd(source, dest, CACTUS_GET_REQ_COUNT_CMD, 0, 0, 0,
559 0);
560}
561
Daniel Boulbyce386b12022-03-29 18:36:36 +0100562static inline uint32_t cactus_get_req_count(struct ffa_value ret)
J-Alvesf7535f42021-07-30 11:58:41 +0100563{
Daniel Boulbyce386b12022-03-29 18:36:36 +0100564 return (uint32_t)ret.arg4;
J-Alvesf7535f42021-07-30 11:58:41 +0100565}
566
Madhukar Pappireddyf4c8e8d2022-02-15 15:52:53 -0600567/**
568 * Request SP to return the last serviced secure virtual interrupt.
569 *
570 * The command id is the hex representaton of the string "vINT"
571 */
572#define CACTUS_LAST_INTERRUPT_SERVICED_CMD U(0x76494e54)
573
Daniel Boulbyce386b12022-03-29 18:36:36 +0100574static inline struct ffa_value cactus_get_last_interrupt_cmd(
Madhukar Pappireddyf4c8e8d2022-02-15 15:52:53 -0600575 ffa_id_t source, ffa_id_t dest)
576{
577 return cactus_send_cmd(source, dest, CACTUS_LAST_INTERRUPT_SERVICED_CMD,
578 0, 0, 0, 0);
579}
J-Alvesd1aae292020-10-08 17:16:58 +0100580#endif