From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 8382AFA373E for ; Mon, 24 Oct 2022 12:10:22 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id BE94D806ED; Mon, 24 Oct 2022 14:10:20 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=linaro.org header.i=@linaro.org header.b="VtrnpWgW"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 45BBC806EB; Mon, 24 Oct 2022 14:10:18 +0200 (CEST) Received: from mail-ed1-x531.google.com (mail-ed1-x531.google.com [IPv6:2a00:1450:4864:20::531]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 29F8F806EB for ; Mon, 24 Oct 2022 14:10:13 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=ilias.apalodimas@linaro.org Received: by mail-ed1-x531.google.com with SMTP id m15so30353026edb.13 for ; Mon, 24 Oct 2022 05:10:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=hdfFOVnFT1obilxBH6n7S6wfAip9mLe6wKbYrnV+uoE=; b=VtrnpWgWZIdHSnjh7ETZmC9NnU1PXZ0/WtNmQpEypgq0gfGT8B1mmNRlAKAYb71Cfh bx9diV//FXiPyWfIt5LZIk839gVFlq2eZYxlc24U2Zq39wnTO32td4Z0bozPLC2sB4az Vk2AaNeaYTPDwVoQdACS28uv7acchU0JeBQOMQ5/gDb4zwhVMVVraQ5b41vqPTh6J3VG QED3nzFjDSYWM/PPgVBo8Gzenvgax2VAZ5V/97OKNpJ03sV068qR5VFEg1tH0xJq/J3s PRTQo6iMsy++dLAm1fWjVgSW6WUV+tUmBcaoS13b/HNZnqEJqXQgpEwW7KR5j2I5tOCG Yoag== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=hdfFOVnFT1obilxBH6n7S6wfAip9mLe6wKbYrnV+uoE=; b=Il90Uk2WaHGzfy4UU7oWT/IUtbq/bEMF+qHjgB148jig5g5FR4qArprczanZtOXejf D3o8PI8a2lyeB74vc5k7rVLw/BzxDa6QpHR7Mv4BN5HKheQxidNOfTorvOlNdC9mOI3V 80FuB6rMCVGGEhDTNN6ejw0Sie2FirBuk7XbD5aogqDhdoqOgRKwUdfGsbQKjcbTfYFs KBz7qu/0tc41GnS4JjxN+9x6qZ8r60zl0DPxt+ESio0xvbLVRapujgRuc780P2mA+rHv gWMjao8m0enEVoQ0Iiz/K9OgYE6MVzI0DYvAP52lcGnpZMfZKvgagrbxnJDJ6x5ZTtQP iThw== X-Gm-Message-State: ACrzQf0hH/pAdoRxxDqsXk1LDEdC0eQLZetuAjtvCyMth5akg9sSgSsg /0Gd95Oc4xl0REUiDHqQsmDzTQ== X-Google-Smtp-Source: AMsMyM7jyazIKN/GmzYh/O0jy3C5Puxpesy6RRsLrXUHUGFLR6i2ipvROr2Aaf4+SaY14gCz/8OaHw== X-Received: by 2002:a05:6402:414d:b0:451:73f0:e113 with SMTP id x13-20020a056402414d00b0045173f0e113mr30962682eda.207.1666613412737; Mon, 24 Oct 2022 05:10:12 -0700 (PDT) Received: from hera (ppp046103015185.access.hol.gr. [46.103.15.185]) by smtp.gmail.com with ESMTPSA id dk24-20020a0564021d9800b0045b910b0542sm18266523edb.15.2022.10.24.05.10.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 24 Oct 2022 05:10:12 -0700 (PDT) Date: Mon, 24 Oct 2022 15:10:09 +0300 From: Ilias Apalodimas To: Abdellatif El Khlifi Cc: achin.gupta@arm.com, jens.wiklander@linaro.org, nd@arm.com, sjg@chromium.org, trini@konsulko.com, u-boot@lists.denx.de, vishnu.banavath@arm.com, xueliang.zhong@arm.com, Drew.Reed@arm.com Subject: Re: [PATCH v6 07/10] arm_ffa: introduce Sandbox test cases for UCLASS_FFA Message-ID: References: <20220926140827.15125-1-abdellatif.elkhlifi@arm.com> <20221013103857.614-1-abdellatif.elkhlifi@arm.com> <20221013103857.614-8-abdellatif.elkhlifi@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221013103857.614-8-abdellatif.elkhlifi@arm.com> X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.6 at phobos.denx.de X-Virus-Status: Clean Hi Abdellatif On Thu, Oct 13, 2022 at 11:38:54AM +0100, Abdellatif El Khlifi wrote: > Add functional test cases for the FF-A core driver > > These tests rely on the FF-A Sandbox driver which helps in > inspecting the FF-A core driver. This looks ok from me, but I'd prefer Simon having a quick look, since I am not an expert when it comes to sandbox and testing Thanks /Ilias > > Signed-off-by: Abdellatif El Khlifi > Cc: Tom Rini > Cc: Simon Glass > Cc: Ilias Apalodimas > Cc: Jens Wiklander > > --- > > Changelog: > =============== > > v4: align sandbox tests with the new FF-A driver interfaces > and new way of error handling > > v1: introduce sandbox tests > > MAINTAINERS | 1 + > test/dm/Makefile | 2 + > test/dm/ffa.c | 394 +++++++++++++++++++++++++++++++++++++++++++++++ > 3 files changed, 397 insertions(+) > create mode 100644 test/dm/ffa.c > > diff --git a/MAINTAINERS b/MAINTAINERS > index 598ae76e16..bf198f4ce1 100644 > --- a/MAINTAINERS > +++ b/MAINTAINERS > @@ -256,6 +256,7 @@ F: doc/arch/arm64.ffa.rst > F: drivers/firmware/arm-ffa/ > F: include/arm_ffa.h > F: include/sandbox_arm_ffa.h > +F: test/dm/ffa.c > > ARM FREESCALE IMX > M: Stefano Babic > diff --git a/test/dm/Makefile b/test/dm/Makefile > index 5178daa7cf..e5bc4b4bd6 100644 > --- a/test/dm/Makefile > +++ b/test/dm/Makefile > @@ -1,6 +1,7 @@ > # SPDX-License-Identifier: GPL-2.0+ > # > # Copyright (c) 2013 Google, Inc > +# (C) Copyright 2022 ARM Limited > > obj-$(CONFIG_UT_DM) += test-dm.o > > @@ -81,6 +82,7 @@ obj-$(CONFIG_POWER_DOMAIN) += power-domain.o > obj-$(CONFIG_ACPI_PMC) += pmc.o > obj-$(CONFIG_DM_PMIC) += pmic.o > obj-$(CONFIG_DM_PWM) += pwm.o > +obj-$(CONFIG_SANDBOX_FFA) += ffa.o > obj-$(CONFIG_QFW) += qfw.o > obj-$(CONFIG_RAM) += ram.o > obj-y += regmap.o > diff --git a/test/dm/ffa.c b/test/dm/ffa.c > new file mode 100644 > index 0000000000..052d5fc3f4 > --- /dev/null > +++ b/test/dm/ffa.c > @@ -0,0 +1,394 @@ > +// SPDX-License-Identifier: GPL-2.0+ > +/* > + * Functional tests for UCLASS_FFA class > + * > + * (C) Copyright 2022 ARM Limited > + * Abdellatif El Khlifi > + */ > + > +#include > +#include > +#include > +#include > +#include "../../drivers/firmware/arm-ffa/sandbox_arm_ffa_prv.h" > +#include > +#include > +#include > + > +/* Macros */ > + > +#define LOG_MSG_SZ (100) > +#define LOG_CMD_SZ (LOG_MSG_SZ * 2) > + > +/* Functional tests for the UCLASS_FFA */ > + > +static int dm_test_ffa_log(struct unit_test_state *uts, char *msg) > +{ > + char cmd[LOG_CMD_SZ] = {0}; > + > + console_record_reset(); > + > + snprintf(cmd, LOG_CMD_SZ, "echo \"%s\"", msg); > + run_command(cmd, 0); > + > + ut_assert_console_end(); > + > + return CMD_RET_SUCCESS; > +} > + > +static int check_fwk_version(struct ffa_prvdata *prvdata, struct sandbox_ffa_prvdata *sdx_prvdata, > + struct unit_test_state *uts) > +{ > + if (prvdata->fwk_version != sdx_prvdata->fwk_version) { > + char msg[LOG_MSG_SZ] = {0}; > + > + snprintf(msg, LOG_MSG_SZ, > + "[%s]: Error: framework version: core = 0x%x , sandbox = 0x%x", __func__, > + prvdata->fwk_version, > + sdx_prvdata->fwk_version); > + > + dm_test_ffa_log(uts, msg); > + return CMD_RET_FAILURE; > + } > + return CMD_RET_SUCCESS; > +} > + > +static int check_endpoint_id(struct ffa_prvdata *prvdata, struct unit_test_state *uts) > +{ > + if (prvdata->id) { > + char msg[LOG_MSG_SZ] = {0}; > + > + snprintf(msg, LOG_MSG_SZ, > + "[%s]: Error: endpoint id: core = 0x%x", __func__, prvdata->id); > + dm_test_ffa_log(uts, msg); > + return CMD_RET_FAILURE; > + } > + return CMD_RET_SUCCESS; > +} > + > +static int check_core_dev(struct ffa_prvdata *prvdata, struct unit_test_state *uts) > +{ > + if (!prvdata->dev) { > + char msg[LOG_MSG_SZ] = {0}; > + > + snprintf(msg, LOG_MSG_SZ, "[%s]: Error: core device NULL", __func__); > + dm_test_ffa_log(uts, msg); > + return CMD_RET_FAILURE; > + } > + return CMD_RET_SUCCESS; > +} > + > +static int check_sandbox_dev(struct sandbox_ffa_prvdata *sdx_prvdata, struct unit_test_state *uts) > +{ > + if (!sdx_prvdata->dev) { > + char msg[LOG_MSG_SZ] = {0}; > + > + snprintf(msg, LOG_MSG_SZ, "[%s]: Error: sandbox device NULL", __func__); > + dm_test_ffa_log(uts, msg); > + return CMD_RET_FAILURE; > + } > + return CMD_RET_SUCCESS; > +} > + > +static int check_rxtxbuf(struct ffa_prvdata *prvdata, struct unit_test_state *uts) > +{ > + if (!prvdata->pair.rxbuf && prvdata->pair.txbuf) { > + char msg[LOG_MSG_SZ] = {0}; > + > + snprintf(msg, LOG_MSG_SZ, "[%s]: Error: rxbuf = 0x%llx txbuf = 0x%llx", __func__, > + prvdata->pair.rxbuf, > + prvdata->pair.txbuf); > + dm_test_ffa_log(uts, msg); > + return CMD_RET_FAILURE; > + } > + return CMD_RET_SUCCESS; > +} > + > +static int check_features(struct ffa_prvdata *prvdata, struct unit_test_state *uts) > +{ > + char msg[LOG_MSG_SZ] = {0}; > + > + if (prvdata->pair.rxtx_min_pages != RXTX_4K && > + prvdata->pair.rxtx_min_pages != RXTX_16K && > + prvdata->pair.rxtx_min_pages != RXTX_64K) { > + snprintf(msg, > + LOG_MSG_SZ, > + "[%s]: Error: FFA_RXTX_MAP features = 0x%lx", > + __func__, > + prvdata->pair.rxtx_min_pages); > + dm_test_ffa_log(uts, msg); > + return CMD_RET_FAILURE; > + } > + > + return CMD_RET_SUCCESS; > +} > + > +static int check_rxbuf_mapped_flag(u32 queried_func_id, > + u8 rxbuf_mapped, > + struct unit_test_state *uts) > +{ > + char msg[LOG_MSG_SZ] = {0}; > + > + switch (queried_func_id) { > + case FFA_RXTX_MAP: > + { > + if (rxbuf_mapped) > + return CMD_RET_SUCCESS; > + break; > + } > + case FFA_RXTX_UNMAP: > + { > + if (!rxbuf_mapped) > + return CMD_RET_SUCCESS; > + break; > + } > + default: > + return CMD_RET_FAILURE; > + } > + > + snprintf(msg, LOG_MSG_SZ, "[%s]: Error: %s mapping issue", __func__, > + (queried_func_id == FFA_RXTX_MAP ? "FFA_RXTX_MAP" : "FFA_RXTX_UNMAP")); > + dm_test_ffa_log(uts, msg); > + > + return CMD_RET_FAILURE; > +} > + > +static int check_rxbuf_release_flag(u8 rxbuf_owned, struct unit_test_state *uts) > +{ > + if (rxbuf_owned) { > + char msg[LOG_MSG_SZ] = {0}; > + > + snprintf(msg, LOG_MSG_SZ, "[%s]: Error: RX buffer not released", __func__); > + dm_test_ffa_log(uts, msg); > + return CMD_RET_FAILURE; > + } > + return CMD_RET_SUCCESS; > +} > + > +static int test_ffa_msg_send_direct_req(u16 part_id, struct unit_test_state *uts) > +{ > + struct ffa_send_direct_data msg = {0}; > + u8 cnt; > + > + ut_assertok(ffa_bus_ops_get()->sync_send_receive(part_id, &msg)); > + > + for (cnt = 0; cnt < sizeof(struct ffa_send_direct_data) / sizeof(u64); cnt++) > + ut_assertok(((u64 *)&msg)[cnt] != 0xffffffffffffffff); > + > + return CMD_RET_SUCCESS; > +} > + > +static int test_partitions_and_comms(const char *service_uuid, > + struct sandbox_ffa_prvdata *sdx_prvdata, > + struct unit_test_state *uts) > +{ > + u32 count = 0, size = 0; > + struct ffa_partition_info *parts_info; > + u32 info_idx, exp_info_idx; > + int ret; > + > + /* > + * get from the driver the count of the SPs matching the UUID > + */ > + ret = ffa_bus_ops_get()->partition_info_get(service_uuid, &count, NULL); > + /* make sure partitions are detected */ > + ut_assertok(ret != 0); > + ut_assertok(count != SANDBOX_SP_COUNT_PER_VALID_SERVICE); > + > + /* > + * pre-allocate a buffer to be filled by the driver > + * with ffa_partition_info structs > + */ > + > + parts_info = calloc(count, sizeof(struct ffa_partition_info)); > + ut_assertok(!parts_info); > + > + size = count * sizeof(struct ffa_partition_info); > + > + /* > + * ask the driver to fill the buffer with the SPs info > + */ > + ret = ffa_bus_ops_get()->partition_info_get(service_uuid, &size, parts_info); > + if (ret != 0) { > + free(parts_info); > + ut_assertok(ret != 0); > + } > + > + /* > + * SPs found , verify the partitions information > + */ > + > + ret = CMD_RET_FAILURE; > + > + for (info_idx = 0; info_idx < count ; info_idx++) { > + for (exp_info_idx = 0; > + exp_info_idx < sdx_prvdata->partitions.count; > + exp_info_idx++) { > + if (parts_info[info_idx].id == > + sdx_prvdata->partitions.descs[exp_info_idx].info.id) { > + ret = memcmp(&parts_info[info_idx], > + &sdx_prvdata->partitions.descs[exp_info_idx] > + .info, > + sizeof(struct ffa_partition_info)); > + if (ret) > + free(parts_info); > + ut_assertok(ret != 0); > + /* send and receive data from the current partition */ > + test_ffa_msg_send_direct_req(parts_info[info_idx].id, uts); > + } > + ret = CMD_RET_SUCCESS; > + } > + } > + > + free(parts_info); > + > + /* Verify expected partitions found in the emulated secure world*/ > + ut_assertok(ret != CMD_RET_SUCCESS); > + > + return CMD_RET_SUCCESS; > +} > + > +static int dm_test_ffa_ack(struct unit_test_state *uts) > +{ > + struct ffa_prvdata *prvdata = NULL; > + struct sandbox_ffa_prvdata *sdx_prvdata = NULL; > + struct ffa_sandbox_data func_data = {0}; > + u8 rxbuf_flag = 0; > + const char *svc1_uuid = SANDBOX_SERVICE1_UUID; > + const char *svc2_uuid = SANDBOX_SERVICE2_UUID; > + int ret; > + > + /* test probing FF-A devices */ > + ut_assertok(ffa_bus_discover()); > + > + /* get a pointer to the FF-A core and sandbox drivers private data */ > + func_data.data0 = &prvdata; > + func_data.data0_size = sizeof(prvdata); > + func_data.data1 = &sdx_prvdata; > + func_data.data1_size = sizeof(sdx_prvdata); > + > + ut_assertok(sandbox_ffa_query_core_state(FFA_VERSION, &func_data)); > + > + /* make sure private data pointers are retrieved */ > + ut_assertok(prvdata == 0); > + ut_assertok(sdx_prvdata == 0); > + > + /* make sure dev devices created */ > + ut_assertok(check_core_dev(prvdata, uts)); > + ut_assertok(check_sandbox_dev(sdx_prvdata, uts)); > + > + /* test FFA_VERSION */ > + ut_assertok(check_fwk_version(prvdata, sdx_prvdata, uts)); > + > + /* test FFA_ID_GET */ > + ut_assertok(check_endpoint_id(prvdata, uts)); > + > + /* test FFA_FEATURES */ > + ut_assertok(check_features(prvdata, uts)); > + > + /* test core RX/TX buffers */ > + ut_assertok(check_rxtxbuf(prvdata, uts)); > + > + /* test FFA_RXTX_MAP */ > + func_data.data0 = &rxbuf_flag; > + func_data.data0_size = sizeof(rxbuf_flag); > + > + rxbuf_flag = 0; > + ut_assertok(sandbox_ffa_query_core_state(FFA_RXTX_MAP, &func_data)); > + ut_assertok(check_rxbuf_mapped_flag(FFA_RXTX_MAP, rxbuf_flag, uts)); > + > + /* FFA_PARTITION_INFO_GET / FFA_MSG_SEND_DIRECT_REQ */ > + ret = test_partitions_and_comms(svc1_uuid, sdx_prvdata, uts); > + ut_assertok(ret != CMD_RET_SUCCESS); > + > + /* test FFA_RX_RELEASE */ > + rxbuf_flag = 1; > + ut_assertok(sandbox_ffa_query_core_state(FFA_RX_RELEASE, &func_data)); > + ut_assertok(check_rxbuf_release_flag(rxbuf_flag, uts)); > + > + /* FFA_PARTITION_INFO_GET / FFA_MSG_SEND_DIRECT_REQ */ > + ret = test_partitions_and_comms(svc2_uuid, sdx_prvdata, uts); > + ut_assertok(ret != CMD_RET_SUCCESS); > + > + /* test FFA_RX_RELEASE */ > + rxbuf_flag = 1; > + ut_assertok(sandbox_ffa_query_core_state(FFA_RX_RELEASE, &func_data)); > + ut_assertok(check_rxbuf_release_flag(rxbuf_flag, uts)); > + > + /* test FFA_RXTX_UNMAP */ > + ut_assertok(ffa_bus_ops_get()->rxtx_unmap()); > + > + rxbuf_flag = 1; > + ut_assertok(sandbox_ffa_query_core_state(FFA_RXTX_UNMAP, &func_data)); > + ut_assertok(check_rxbuf_mapped_flag(FFA_RXTX_UNMAP, rxbuf_flag, uts)); > + > + return CMD_RET_SUCCESS; > +} > + > +DM_TEST(dm_test_ffa_ack, UT_TESTF_SCAN_FDT | UT_TESTF_CONSOLE_REC); > + > +static int dm_test_ffa_nack(struct unit_test_state *uts) > +{ > + struct ffa_prvdata *prvdata = NULL; > + struct sandbox_ffa_prvdata *sdx_prvdata = NULL; > + struct ffa_sandbox_data func_data = {0}; > + const char *valid_svc_uuid = SANDBOX_SERVICE1_UUID; > + const char *unvalid_svc_uuid = SANDBOX_SERVICE3_UUID; > + const char *unvalid_svc_uuid_str = SANDBOX_SERVICE4_UUID; > + struct ffa_send_direct_data msg = {0}; > + int ret; > + u32 count = 0; > + u16 part_id = 0; > + > + /* test probing FF-A devices */ > + ut_assertok(ffa_bus_discover()); > + > + /* get a pointer to the FF-A core and sandbox drivers private data */ > + func_data.data0 = &prvdata; > + func_data.data0_size = sizeof(prvdata); > + func_data.data1 = &sdx_prvdata; > + func_data.data1_size = sizeof(sdx_prvdata); > + > + ut_assertok(sandbox_ffa_query_core_state(FFA_VERSION, &func_data)); > + > + /* make sure private data pointers are retrieved */ > + ut_assertok(prvdata == 0); > + ut_assertok(sdx_prvdata == 0); > + > + /* make sure dev devices created */ > + ut_assertok(check_core_dev(prvdata, uts)); > + ut_assertok(check_sandbox_dev(sdx_prvdata, uts)); > + > + /* query partitions count using invalid arguments */ > + ret = ffa_bus_ops_get()->partition_info_get(unvalid_svc_uuid, NULL, NULL); > + ut_assertok(ret != -EINVAL); > + > + /* query partitions count using an invalid UUID string */ > + ret = ffa_bus_ops_get()->partition_info_get(unvalid_svc_uuid_str, &count, NULL); > + ut_assertok(ret != -EINVAL); > + > + /* query partitions count using an invalid UUID (no matching SP) */ > + count = 0; > + ret = ffa_bus_ops_get()->partition_info_get(unvalid_svc_uuid, &count, NULL); > + ut_assertok(count != 0); > + > + /* query partitions count using a valid UUID */ > + count = 0; > + ret = ffa_bus_ops_get()->partition_info_get(valid_svc_uuid, &count, NULL); > + /* make sure partitions are detected */ > + ut_assertok(ret != 0); > + ut_assertok(count != SANDBOX_SP_COUNT_PER_VALID_SERVICE); > + > + /* send data to an invalid partition */ > + ret = ffa_bus_ops_get()->sync_send_receive(part_id, &msg); > + ut_assertok(ret != -EINVAL); > + > + /* send data to a valid partition */ > + part_id = prvdata->partitions.descs[0].info.id; > + ret = ffa_bus_ops_get()->sync_send_receive(part_id, &msg); > + ut_assertok(ret != 0); > + > + return CMD_RET_SUCCESS; > +} > + > +DM_TEST(dm_test_ffa_nack, UT_TESTF_SCAN_FDT | UT_TESTF_CONSOLE_REC); > -- > 2.17.1 >