[dif/otp_ctrl] Add smoke tests for otp_ctrl DIFs.
Signed-off-by: Miguel Young de la Sota <mcyoung@google.com>
diff --git a/sw/device/tests/dif/dif_otp_ctrl_smoketest.c b/sw/device/tests/dif/dif_otp_ctrl_smoketest.c
new file mode 100644
index 0000000..1343312
--- /dev/null
+++ b/sw/device/tests/dif/dif_otp_ctrl_smoketest.c
@@ -0,0 +1,75 @@
+// Copyright lowRISC contributors.
+// Licensed under the Apache License, Version 2.0, see LICENSE for details.
+// SPDX-License-Identifier: Apache-2.0
+
+#include "sw/device/lib/dif/dif_otp_ctrl.h"
+
+#include <stdbool.h>
+
+#include "sw/device/lib/base/bitfield.h"
+#include "sw/device/lib/base/memory.h"
+#include "sw/device/lib/runtime/log.h"
+#include "sw/device/lib/testing/check.h"
+#include "sw/device/lib/testing/test_main.h"
+#include "hw/top_earlgrey/sw/autogen/top_earlgrey.h"
+
+static dif_otp_ctrl_t otp;
+
+static const char kTestData[] = "abcdefghijklmno";
+_Static_assert(ARRAYSIZE(kTestData) % sizeof(uint32_t) == 0,
+ "kTestData must be a word array");
+
+const test_config_t kTestConfig;
+
+/**
+ * Busy-wait until the DAI is done with whatever operation it is doing.
+ */
+static void wait_for_dai(void) {
+ while (true) {
+ dif_otp_ctrl_status_t status;
+ CHECK(dif_otp_ctrl_get_status(&otp, &status) == kDifOtpCtrlOk);
+ if (bitfield_bit32_read(status.codes, kDifOtpCtrlStatusCodeDaiIdle)) {
+ return;
+ }
+ LOG_INFO("Waiting for DAI...");
+ }
+}
+
+/**
+ * Tests that the OTP can be programed in a particular spot, and that the
+ * value can then be read out exactly through the blocking read interface.
+ */
+bool test_main(void) {
+ mmio_region_t otp_reg =
+ mmio_region_from_addr(TOP_EARLGREY_OTP_CTRL_BASE_ADDR);
+ CHECK(dif_otp_ctrl_init((dif_otp_ctrl_params_t){.base_addr = otp_reg},
+ &otp) == kDifOtpCtrlOk);
+
+ dif_otp_ctrl_config_t config = {
+ .check_timeout = 100000,
+ .integrity_period_mask = 0x3ffff,
+ .consistency_period_mask = 0x3ffffff,
+ };
+ CHECK(dif_otp_ctrl_configure(&otp, config) == kDifOtpCtrlLockableOk);
+
+ for (int i = 0; i < ARRAYSIZE(kTestData); i += sizeof(uint32_t)) {
+ uint32_t word;
+ memcpy(&word, &kTestData[i], sizeof(word));
+
+ wait_for_dai();
+ dif_otp_ctrl_dai_result_t err = dif_otp_ctrl_dai_program32(
+ &otp, kDifOtpCtrlPartitionOwnerSwCfg, 0x100 + i, word);
+ CHECK(err == kDifOtpCtrlDaiOk,
+ "Failed to program word kTestData[%d] = 0x%8x.", i, word);
+ }
+
+ uint32_t readout[ARRAYSIZE(kTestData) / sizeof(uint32_t)] = {0};
+ dif_otp_ctrl_dai_result_t err =
+ dif_otp_ctrl_read_blocking(&otp, kDifOtpCtrlPartitionOwnerSwCfg, 0x100,
+ readout, ARRAYSIZE(kTestData));
+ CHECK(err == kDifOtpCtrlDaiOk, "Failed to perform OTP blocking readout.");
+
+ CHECK(memcmp(kTestData, readout, ARRAYSIZE(kTestData)) == 0);
+
+ return true;
+}
diff --git a/sw/device/tests/dif/meson.build b/sw/device/tests/dif/meson.build
index 42fcc75..39d9036 100644
--- a/sw/device/tests/dif/meson.build
+++ b/sw/device/tests/dif/meson.build
@@ -260,6 +260,7 @@
dependencies: [
sw_lib_dif_rstmgr,
sw_lib_mmio,
+ sw_lib_runtime_hart,
],
),
)
@@ -288,3 +289,21 @@
'library': dif_otbn_sanitytest_lib,
}
}
+
+dif_otp_ctrl_smoketest_lib = declare_dependency(
+ link_with: static_library(
+ 'dif_otp_ctrl_smoketest_lib',
+ sources: ['dif_otp_ctrl_smoketest.c'],
+ dependencies: [
+ sw_lib_dif_otp_ctrl,
+ sw_lib_runtime_log,
+ sw_lib_mmio,
+ sw_lib_runtime_hart,
+ ],
+ ),
+)
+sw_tests += {
+ 'dif_otp_ctrl_smoketest': {
+ 'library': dif_otp_ctrl_smoketest_lib,
+ }
+}
diff --git a/test/systemtest/config.py b/test/systemtest/config.py
index 9983cba..4444c6c 100644
--- a/test/systemtest/config.py
+++ b/test/systemtest/config.py
@@ -37,6 +37,9 @@
# "targets": ["sim_verilator"],
# },
{
+ "name": "dif_otp_ctrl_smoketest",
+ },
+ {
"name": "dif_plic_sanitytest",
},
{