blob: d695c788341de70d863321d5fa4a56ef65cf4339 [file] [log] [blame]
// SPDX-License-Identifier: BSD-2-Clause
/*
* Copyright (c) 2014, STMicroelectronics International N.V.
* All rights reserved.
*/
#include <compiler.h>
#include <dlfcn.h>
#include <link.h>
#include <setjmp.h>
#include <stdint.h>
#include <string.h>
#include <ta_crypt.h>
#include <ta_os_test.h>
#include <tee_internal_api_extensions.h>
#include "os_test.h"
#include "test_float_subj.h"
#include "os_test_lib.h"
enum p_type {
P_TYPE_BOOL,
P_TYPE_INT,
P_TYPE_UUID,
P_TYPE_IDENTITY,
P_TYPE_STRING,
P_TYPE_BINARY_BLOCK,
};
struct p_attr {
const char *str;
enum p_type type;
bool retrieved;
};
static TEE_Result check_returned_prop(
int line __maybe_unused, char *prop_name __maybe_unused,
TEE_Result return_res, TEE_Result expected_res,
uint32_t return_len, uint32_t expected_len)
{
if (return_res != expected_res) {
EMSG("From line %d (property name=%s): return_res=0x%x vs expected_res=0x%x",
line, (prop_name ? prop_name : "unknown"),
(unsigned int)return_res, (unsigned int)expected_res);
return TEE_ERROR_GENERIC;
}
if (return_len != expected_len) {
EMSG("From line %d (property name=%s): return_len=%u vs expected_res=%u",
line, (prop_name ? prop_name : "unknown"),
return_len, expected_len);
return TEE_ERROR_GENERIC;
}
return TEE_SUCCESS;
}
static TEE_Result check_binprop_ones(size_t size, char *bbuf, size_t bblen)
{
char ones[4] = { 0xff, 0xff, 0xff, 0xff };
if (size > 4 || bblen != size) {
EMSG("Size error (size=%zu, bblen=%zu)", size, bblen);
return TEE_ERROR_GENERIC;
}
if (strncmp(bbuf, ones, bblen)) {
EMSG("Unexpected content");
DHEXDUMP(bbuf, bblen);
return TEE_ERROR_GENERIC;
}
return TEE_SUCCESS;
}
static TEE_Result get_binblock_property(TEE_PropSetHandle h,
char *nbuf __unused, char **bbuf, size_t *bblen)
{
TEE_Result res = TEE_ERROR_GENERIC;
uint32_t block_len = 0;
*bbuf = NULL;
*bblen = 0;
res = TEE_GetPropertyAsBinaryBlock(h, NULL, *bbuf, &block_len);
if (res == TEE_SUCCESS && !block_len)
return TEE_SUCCESS;
if (res != TEE_ERROR_SHORT_BUFFER) {
EMSG("TEE_GetPropertyAsBinaryBlock() size query returned 0x%x",
(unsigned int)res);
return res ? res : TEE_ERROR_GENERIC;
}
*bbuf = TEE_Malloc(block_len, TEE_MALLOC_FILL_ZERO);
if (!bbuf)
return TEE_ERROR_OUT_OF_MEMORY;
res = TEE_GetPropertyAsBinaryBlock(h, NULL, *bbuf, &block_len);
if (res != TEE_SUCCESS)
EMSG("TEE_GetPropertyAsBinaryBlock(\"%s\") returned 0x%x",
nbuf, (unsigned int)res);
else
*bblen = block_len;
return res;
}
static TEE_Result print_properties(TEE_PropSetHandle h,
TEE_PropSetHandle prop_set,
struct p_attr *p_attrs, size_t num_p_attrs)
{
TEE_Result res = TEE_ERROR_GENERIC;
size_t n = 0;
TEE_StartPropertyEnumerator(h, prop_set);
while (true) {
char nbuf[256] = { };
char nbuf_small[256] = { };
char vbuf[256] = { };
char vbuf2[256] = { };
uint32_t nblen = sizeof(nbuf);
uint32_t nblen_small = 0;
uint32_t vblen = sizeof(vbuf);
uint32_t vblen2 = sizeof(vbuf2);
char *bbuf = NULL;
size_t bblen = 0;
res = TEE_GetPropertyName(h, nbuf, &nblen);
if (res != TEE_SUCCESS) {
EMSG("TEE_GetPropertyName returned 0x%x\n",
(unsigned int)res);
return res;
}
if (nblen != strlen(nbuf) + 1) {
EMSG("Name has wrong size: %u vs %zu", nblen, strlen(nbuf) + 1);
return TEE_ERROR_GENERIC;
}
/* Get the property name with a very small buffer */
nblen_small = 2;
res = TEE_GetPropertyName(h, nbuf_small, &nblen_small);
res = check_returned_prop(__LINE__, nbuf, res, TEE_ERROR_SHORT_BUFFER,
nblen_small, nblen);
if (res != TEE_SUCCESS)
return res;
/* Get the property name with almost the correct buffer */
nblen_small = nblen - 1;
res = TEE_GetPropertyName(h, nbuf_small, &nblen_small);
res = check_returned_prop(__LINE__, nbuf, res, TEE_ERROR_SHORT_BUFFER,
nblen_small, nblen);
if (res != TEE_SUCCESS)
return res;
/* Get the property name with the exact buffer length */
nblen_small = nblen;
res = TEE_GetPropertyName(h, nbuf_small, &nblen_small);
res = check_returned_prop(__LINE__, nbuf, res, TEE_SUCCESS,
nblen_small, nblen);
if (res != TEE_SUCCESS)
return res;
/* Get the property value */
res = TEE_GetPropertyAsString(h, NULL, vbuf, &vblen);
res = check_returned_prop(__LINE__, nbuf, res, TEE_SUCCESS,
vblen, strlen(vbuf) + 1);
if (res != TEE_SUCCESS)
return res;
res = TEE_GetPropertyAsString(prop_set, nbuf, vbuf2, &vblen2);
res = check_returned_prop(__LINE__, nbuf, res, TEE_SUCCESS,
vblen2, strlen(vbuf2) + 1);
if (res != TEE_SUCCESS)
return res;
if (strcmp(vbuf, vbuf2) != 0) {
EMSG("String of \"%s\" differs\n", nbuf);
return TEE_ERROR_GENERIC;
}
/* Get the property with a very small buffer */
if (vblen > 1) {
vblen2 = 1;
res = TEE_GetPropertyAsString(prop_set, nbuf, vbuf2, &vblen2);
res = check_returned_prop(__LINE__, nbuf, res,
TEE_ERROR_SHORT_BUFFER,
vblen2, vblen);
if (res != TEE_SUCCESS)
return res;
}
/* Get the property with almost the correct buffer */
vblen2 = vblen - 1;
res = TEE_GetPropertyAsString(prop_set, nbuf, vbuf2, &vblen2);
res = check_returned_prop(__LINE__, nbuf, res, TEE_ERROR_SHORT_BUFFER,
vblen2, vblen);
if (res != TEE_SUCCESS)
return res;
/* Get the property name with the exact buffer length */
vblen2 = vblen;
res = TEE_GetPropertyAsString(prop_set, nbuf, vbuf2, &vblen2);
res = check_returned_prop(__LINE__, nbuf, res, TEE_SUCCESS, vblen2, vblen);
if (res != TEE_SUCCESS)
return res;
/* check specific myprop.hello property, which is larger than 80 */
if (!strcmp("myprop.hello", nbuf) &&
vblen2 != 1 + strlen("hello property, larger than 80 characters, so that it checks that it is not truncated by anything in the source code which may be wrong")) {
EMSG("TEE_GetPropertyAsString(\"%s\") is truncated - returned \"%s\"\n",
nbuf, vbuf);
return TEE_ERROR_GENERIC;
}
DMSG("Found \"%s\" value \"%s\"\n", nbuf, vbuf);
for (n = 0; n < num_p_attrs; n++) {
if (strcmp(nbuf, p_attrs[n].str) != 0)
continue;
if (p_attrs[n].retrieved) {
EMSG("Value \"%s\" already retrieved\n",
p_attrs[n].str);
return TEE_ERROR_GENERIC;
}
p_attrs[n].retrieved = true;
switch (p_attrs[n].type) {
case P_TYPE_BOOL:
{
bool v = false;
res =
TEE_GetPropertyAsBool(h, NULL, &v);
if (res != TEE_SUCCESS) {
EMSG(
"TEE_GetPropertyAsBool(\"%s\") returned 0x%x\n",
nbuf, (unsigned int)res);
return res;
}
}
break;
case P_TYPE_INT:
{
uint32_t v = 0;
res = TEE_GetPropertyAsU32(h, NULL, &v);
if (res != TEE_SUCCESS) {
EMSG(
"TEE_GetPropertyAsU32(\"%s\") returned 0x%x\n",
nbuf, (unsigned int)res);
return res;
}
}
break;
case P_TYPE_UUID:
{
TEE_UUID v = { };
res =
TEE_GetPropertyAsUUID(h, NULL, &v);
if (res != TEE_SUCCESS) {
EMSG(
"TEE_GetPropertyAsUUID(\"%s\") returned 0x%x\n",
nbuf, (unsigned int)res);
return res;
}
}
break;
case P_TYPE_IDENTITY:
{
TEE_Identity v = { };
res =
TEE_GetPropertyAsIdentity(h, NULL,
&v);
if (res != TEE_SUCCESS) {
EMSG(
"TEE_GetPropertyAsIdentity(\"%s\") returned 0x%x\n",
nbuf, (unsigned int)res);
return res;
}
}
break;
case P_TYPE_STRING:
/* Already read as string */
break;
case P_TYPE_BINARY_BLOCK:
res = get_binblock_property(h, nbuf, &bbuf, &bblen);
if (res)
return res;
if (!strcmp("myprop.binaryblock", nbuf)) {
const char exp_bin_value[] = "Hello world!";
if (bblen != strlen(exp_bin_value) ||
TEE_MemCompare(exp_bin_value, bbuf,
bblen)) {
EMSG("Binary buffer of \"%s\" differs from \"%s\"",
nbuf, exp_bin_value);
EMSG("Got \"%s\"", bbuf);
return TEE_ERROR_GENERIC;
}
} else if (!strcmp("myprop.binaryblock.1byte-ones",
nbuf)) {
res = check_binprop_ones(1, bbuf, bblen);
if (res)
return res;
} else if (!strcmp("myprop.binaryblock.2byte-ones",
nbuf)) {
res = check_binprop_ones(2, bbuf, bblen);
if (res)
return res;
} else if (!strcmp("myprop.binaryblock.3byte-ones",
nbuf)) {
res = check_binprop_ones(3, bbuf, bblen);
if (res)
return res;
} else if (!strcmp("myprop.binaryblock.4byte-ones",
nbuf)) {
res = check_binprop_ones(4, bbuf, bblen);
if (res)
return res;
} else if (!strcmp("myprop.binaryblock.empty1", nbuf) ||
!strcmp("myprop.binaryblock.empty2", nbuf) ||
!strcmp("myprop.binaryblock.empty3", nbuf)) {
if (bblen) {
EMSG("Property \"%s\": %zu byte(s)",
nbuf, bblen);
return TEE_ERROR_GENERIC;
}
} else {
EMSG("Unexpected property \"%s\"", nbuf);
TEE_Panic(0);
}
TEE_Free(bbuf);
break;
default:
EMSG("Unknown type (%d) for \"%s\"\n",
p_attrs[n].type, p_attrs[n].str);
return TEE_ERROR_GENERIC;
}
}
res = TEE_GetNextProperty(h);
if (res != TEE_SUCCESS) {
if (res == TEE_ERROR_ITEM_NOT_FOUND)
return TEE_SUCCESS;
return res;
}
}
}
static TEE_Result test_malloc(void)
{
void *p = TEE_Malloc(4, 0);
if (p == NULL) {
EMSG("TEE_Malloc failed\n");
return TEE_ERROR_OUT_OF_MEMORY;
}
TEE_Free(p);
TEE_Free(NULL);
return TEE_SUCCESS;
}
static TEE_Result test_properties(void)
{
TEE_Result res = TEE_ERROR_GENERIC;
TEE_PropSetHandle h = TEE_HANDLE_NULL;
struct p_attr p_attrs[] = {
{"gpd.ta.appID", P_TYPE_UUID},
{"gpd.ta.singleInstance", P_TYPE_BOOL},
{"gpd.ta.multiSession", P_TYPE_BOOL},
{"gpd.ta.instanceKeepAlive", P_TYPE_BOOL},
{"gpd.ta.dataSize", P_TYPE_INT},
{"gpd.ta.stackSize", P_TYPE_INT},
{"gpd.ta.version", P_TYPE_STRING},
{"gpd.ta.description", P_TYPE_STRING},
{"gpd.client.identity", P_TYPE_IDENTITY},
{"gpd.tee.apiversion", P_TYPE_STRING},
{"gpd.tee.description", P_TYPE_STRING},
{"gpd.tee.deviceID", P_TYPE_UUID},
{"gpd.tee.systemTime.protectionLevel", P_TYPE_INT},
{"gpd.tee.TAPersistentTime.protectionLevel", P_TYPE_INT},
{"gpd.tee.arith.maxBigIntSize", P_TYPE_INT},
{"gpd.tee.cryptography.ecc", P_TYPE_BOOL},
{"gpd.tee.trustedStorage.antiRollback.protectionLevel", P_TYPE_INT},
{"gpd.tee.trustedos.implementation.version", P_TYPE_STRING},
{"gpd.tee.trustedos.implementation.binaryversion", P_TYPE_INT},
{"gpd.tee.trustedos.manufacturer", P_TYPE_STRING},
{"gpd.tee.firmware.implementation.version", P_TYPE_STRING},
{"gpd.tee.firmware.implementation.binaryversion", P_TYPE_INT},
{"gpd.tee.firmware.manufacturer", P_TYPE_STRING},
{"myprop.true", P_TYPE_BOOL},
{"myprop.42", P_TYPE_INT},
{"myprop.123", P_TYPE_UUID},
{"myprop.1234", P_TYPE_IDENTITY},
{"myprop.hello", P_TYPE_STRING},
{"myprop.binaryblock", P_TYPE_BINARY_BLOCK},
{"myprop.binaryblock.1byte-ones", P_TYPE_BINARY_BLOCK},
{"myprop.binaryblock.2byte-ones", P_TYPE_BINARY_BLOCK},
{"myprop.binaryblock.3byte-ones", P_TYPE_BINARY_BLOCK},
{"myprop.binaryblock.4byte-ones", P_TYPE_BINARY_BLOCK},
{"myprop.binaryblock.empty1", P_TYPE_BINARY_BLOCK},
{"myprop.binaryblock.empty2", P_TYPE_BINARY_BLOCK},
{"myprop.binaryblock.empty3", P_TYPE_BINARY_BLOCK},
};
const size_t num_p_attrs = sizeof(p_attrs) / sizeof(p_attrs[0]);
size_t n = 0;
res = TEE_AllocatePropertyEnumerator(&h);
if (res != TEE_SUCCESS) {
EMSG("TEE_AllocatePropertyEnumerator: returned 0x%x\n",
(unsigned int)res);
return TEE_ERROR_GENERIC;
}
printf("Getting properties for current TA\n");
res = print_properties(h, TEE_PROPSET_CURRENT_TA, p_attrs, num_p_attrs);
if (res != TEE_SUCCESS)
goto cleanup_return;
printf("Getting properties for current client\n");
res = print_properties(h, TEE_PROPSET_CURRENT_CLIENT, p_attrs,
num_p_attrs);
if (res != TEE_SUCCESS)
goto cleanup_return;
printf("Getting properties for implementation\n");
res = print_properties(h, TEE_PROPSET_TEE_IMPLEMENTATION, p_attrs,
num_p_attrs);
if (res != TEE_SUCCESS)
goto cleanup_return;
for (n = 0; n < num_p_attrs; n++) {
if (!p_attrs[n].retrieved) {
EMSG("\"%s\" not retrieved\n", p_attrs[n].str);
res = TEE_ERROR_GENERIC;
goto cleanup_return;
}
}
cleanup_return:
TEE_FreePropertyEnumerator(h);
return res;
}
static TEE_Result test_mem_access_right(uint32_t param_types,
TEE_Param params[4])
{
static const TEE_UUID test_uuid = TA_OS_TEST_UUID;
TEE_Result res = TEE_ERROR_GENERIC;
uint32_t ret_orig = 0;
uint32_t l_pts = 0;
TEE_Param l_params[4] = { };
uint8_t buf[32] = { };
TEE_TASessionHandle sess = TEE_HANDLE_NULL;
TEE_UUID *uuid = NULL;
if (param_types !=
TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT, 0, 0, 0))
return TEE_ERROR_GENERIC;
/* test access rights on memref parameter */
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ |
TEE_MEMORY_ACCESS_ANY_OWNER,
params[0].memref.buffer,
params[0].memref.size);
if (res != TEE_SUCCESS)
return res;
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ,
params[0].memref.buffer,
params[0].memref.size);
if (res != TEE_ERROR_ACCESS_DENIED)
return TEE_ERROR_GENERIC;
/* test access rights on private read-only and read-write memory */
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ,
(void *)&test_uuid, sizeof(test_uuid));
if (res != TEE_SUCCESS)
return res;
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_WRITE,
(void *)&test_uuid, sizeof(test_uuid));
if (res == TEE_SUCCESS)
return TEE_ERROR_GENERIC;
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ |
TEE_MEMORY_ACCESS_WRITE,
&ret_orig, sizeof(ret_orig));
if (res != TEE_SUCCESS)
return res;
uuid = TEE_Malloc(sizeof(*uuid), 0);
if (!uuid)
return TEE_ERROR_OUT_OF_MEMORY;
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ |
TEE_MEMORY_ACCESS_WRITE,
uuid, sizeof(*uuid));
TEE_Free(uuid);
if (res != TEE_SUCCESS)
return res;
/* test access rights on invalid memory (at least lower 256kB) */
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ,
NULL, 1);
if (res == TEE_SUCCESS)
return TEE_ERROR_GENERIC;
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ,
(void*)(256 * 1024), 1);
if (res == TEE_SUCCESS)
return TEE_ERROR_GENERIC;
res = TEE_OpenTASession(&test_uuid, TEE_TIMEOUT_INFINITE, 0, NULL,
&sess, &ret_orig);
if (res != TEE_SUCCESS) {
EMSG("test_mem_access_right: TEE_OpenTASession failed\n");
goto cleanup_return;
}
l_pts = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT,
TEE_PARAM_TYPE_MEMREF_INPUT, 0, 0);
l_params[0].memref.buffer = buf;
l_params[0].memref.size = sizeof(buf);
l_params[1].memref.buffer = NULL;
l_params[1].memref.size = 0;
res = TEE_InvokeTACommand(sess, TEE_TIMEOUT_INFINITE,
TA_OS_TEST_CMD_PARAMS_ACCESS,
l_pts, l_params, &ret_orig);
if (res != TEE_SUCCESS) {
EMSG("test_mem_access_right: TEE_InvokeTACommand failed\n");
goto cleanup_return;
}
cleanup_return:
TEE_CloseTASession(sess);
return res;
}
static TEE_Result test_time(void)
{
TEE_Result res = TEE_ERROR_GENERIC;
TEE_Time t = { };
TEE_Time sys_t = { };
static const TEE_Time null_time = { 0, 0 };
static const TEE_Time wrap_time = { UINT32_MAX, 999 };
TEE_GetSystemTime(&sys_t);
printf("system time %u.%03u\n", (unsigned int)sys_t.seconds,
(unsigned int)sys_t.millis);
TEE_GetREETime(&t);
printf("REE time %u.%03u\n", (unsigned int)t.seconds,
(unsigned int)t.millis);
res = TEE_GetTAPersistentTime(&t);
switch (res) {
case TEE_SUCCESS:
printf("Stored TA time %u.%03u\n", (unsigned int)t.seconds,
(unsigned int)t.millis);
break;
case TEE_ERROR_OVERFLOW:
EMSG("Stored TA time overflowed %u.%03u\n",
(unsigned int)t.seconds, (unsigned int)t.millis);
break;
case TEE_ERROR_TIME_NOT_SET:
EMSG("TA time not stored\n");
break;
case TEE_ERROR_TIME_NEEDS_RESET:
EMSG("TA time needs reset\n");
break;
default:
return res;
}
res = TEE_SetTAPersistentTime(&null_time);
if (res != TEE_SUCCESS) {
EMSG("TEE_SetTAPersistentTime: failed\n");
return res;
}
res = TEE_GetTAPersistentTime(&t);
if (res != TEE_SUCCESS) {
EMSG("TEE_GetTAPersistentTime null: failed\n");
return res;
}
printf("TA time %u.%03u\n", (unsigned int)t.seconds,
(unsigned int)t.millis);
/*
* The time between TEE_SetTAPersistentTime() and
* TEE_GetTAPersistentTime() should be much less than 1 second, in fact
* it's not even a millisecond.
*/
if (t.seconds > 1 || t.millis >= 1000) {
EMSG("Unexpected stored TA time %u.%03u\n",
(unsigned int)t.seconds, (unsigned int)t.millis);
return TEE_ERROR_BAD_STATE;
}
res = TEE_SetTAPersistentTime(&wrap_time);
if (res != TEE_SUCCESS) {
EMSG("TEE_SetTAPersistentTime wrap: failed\n");
return res;
}
res = TEE_Wait(1000);
if (res != TEE_SUCCESS)
EMSG("TEE_Wait wrap: failed\n");
res = TEE_GetTAPersistentTime(&t);
if (res != TEE_ERROR_OVERFLOW) {
EMSG("TEE_GetTAPersistentTime: failed\n");
return TEE_ERROR_BAD_STATE;
}
printf("TA time %u.%03u\n", (unsigned int)t.seconds,
(unsigned int)t.millis);
if (t.seconds > sys_t.seconds) {
EMSG("Unexpected wrapped time %u.%03u (sys_t %u.%03u)\n",
(unsigned int)t.seconds, (unsigned int)t.millis,
(unsigned int)sys_t.seconds, (unsigned int)sys_t.millis);
return TEE_ERROR_BAD_STATE;
}
return TEE_SUCCESS;
}
#ifdef CFG_TA_FLOAT_SUPPORT
static bool my_dcmpeq(double v1, double v2, double prec)
{
return v1 > (v2 - prec) && v1 < (v2 + prec);
}
static bool my_fcmpeq(float v1, float v2, float prec)
{
return v1 > (v2 - prec) && v1 < (v2 + prec);
}
static TEE_Result test_float(void)
{
#define VAL1 2.6
#define VAL1_INT 2
#define VAL2 5.3
#define DPREC 0.000000000000001
#define FPREC 0.000001
#define EXPECT(expr) do { \
if (!(expr)) { \
EMSG("Expression %s failed", #expr); \
return TEE_ERROR_GENERIC; \
} \
} while (0)
IMSG("Testing floating point operations");
EXPECT(my_dcmpeq(test_float_dadd(VAL1, VAL2), VAL1 + VAL2, DPREC));
EXPECT(my_dcmpeq(test_float_ddiv(VAL1, VAL2), VAL1 / VAL2, DPREC));
EXPECT(my_dcmpeq(test_float_dmul(VAL1, VAL2), VAL1 * VAL2, DPREC));
EXPECT(my_dcmpeq(test_float_drsub(VAL1, VAL2), VAL2 - VAL1, DPREC));
EXPECT(my_dcmpeq(test_float_dsub(VAL1, VAL2), VAL1 - VAL2, DPREC));
EXPECT(test_float_dcmpeq(VAL1, VAL1) == 1);
EXPECT(test_float_dcmplt(VAL1, VAL2) == 1);
EXPECT(test_float_dcmple(VAL1, VAL1) == 1);
EXPECT(test_float_dcmpge(VAL1, VAL1) == 1);
EXPECT(test_float_dcmpgt(VAL2, VAL1) == 1);
EXPECT(my_fcmpeq(test_float_fadd(VAL1, VAL2), VAL1 + VAL2, FPREC));
EXPECT(my_fcmpeq(test_float_fdiv(VAL1, VAL2), VAL1 / VAL2, FPREC));
EXPECT(my_fcmpeq(test_float_fmul(VAL1, VAL2), VAL1 * VAL2, FPREC));
EXPECT(my_fcmpeq(test_float_frsub(VAL1, VAL2), VAL2 - VAL1, FPREC));
EXPECT(my_fcmpeq(test_float_fsub(VAL1, VAL2), VAL1 - VAL2, FPREC));
EXPECT(test_float_fcmpeq(VAL1, VAL1) == 1);
EXPECT(test_float_fcmplt(VAL1, VAL2) == 1);
EXPECT(test_float_fcmple(VAL1, VAL1) == 1);
EXPECT(test_float_fcmpge(VAL1, VAL1) == 1);
EXPECT(test_float_fcmpgt(VAL2, VAL1) == 1);
EXPECT(test_float_d2iz(VAL1) == VAL1_INT);
EXPECT(test_float_d2uiz(VAL1) == VAL1_INT);
EXPECT(test_float_d2lz(VAL1) == VAL1_INT);
EXPECT(test_float_d2ulz(VAL1) == VAL1_INT);
EXPECT(test_float_f2iz(VAL1) == VAL1_INT);
EXPECT(test_float_f2uiz(VAL1) == VAL1_INT);
EXPECT(test_float_f2lz(VAL1) == VAL1_INT);
EXPECT(test_float_f2ulz(VAL1) == VAL1_INT);
EXPECT(my_fcmpeq(test_float_d2f(VAL1), VAL1, FPREC));
EXPECT(my_dcmpeq(test_float_f2d(VAL1), VAL1, FPREC));
EXPECT(my_dcmpeq(test_float_i2d(VAL1_INT), VAL1_INT, DPREC));
EXPECT(my_dcmpeq(test_float_ui2d(VAL1_INT), VAL1_INT, DPREC));
EXPECT(my_dcmpeq(test_float_l2d(VAL1_INT), VAL1_INT, DPREC));
EXPECT(my_dcmpeq(test_float_ul2d(VAL1_INT), VAL1_INT, DPREC));
EXPECT(my_fcmpeq(test_float_i2f(VAL1_INT), VAL1_INT, FPREC));
EXPECT(my_fcmpeq(test_float_ui2f(VAL1_INT), VAL1_INT, FPREC));
EXPECT(my_fcmpeq(test_float_l2f(VAL1_INT), VAL1_INT, FPREC));
EXPECT(my_fcmpeq(test_float_ul2f(VAL1_INT), VAL1_INT, FPREC));
return TEE_SUCCESS;
}
#else /*CFG_TA_FLOAT_SUPPORT*/
static TEE_Result test_float(void)
{
IMSG("Floating point disabled");
return TEE_SUCCESS;
}
#endif /*CFG_TA_FLOAT_SUPPORT*/
#if defined(CFG_TA_BGET_TEST)
/* From libutils */
int bget_main_test(void *(*malloc_func)(size_t), void (*free_func)(void *));
static void *malloc_wrapper(size_t size)
{
return tee_map_zi(size, 0);
}
static void free_wrapper(void *ptr __unused)
{
}
static TEE_Result test_bget(void)
{
DMSG("Testing bget");
if (bget_main_test(malloc_wrapper, free_wrapper)) {
EMSG("bget_main_test failed");
return TEE_ERROR_GENERIC;
}
DMSG("Bget OK");
return TEE_SUCCESS;
}
#else
static TEE_Result test_bget(void)
{
IMSG("Bget test disabled");
return TEE_SUCCESS;
}
#endif
static __noinline __noreturn void call_longjmp(jmp_buf env)
{
DMSG("Calling longjmp");
longjmp(env, 1);
EMSG("error: longjmp returned to calling function");
}
static TEE_Result test_setjmp(void)
{
jmp_buf env = { };
if (setjmp(env)) {
IMSG("Returned via longjmp");
return TEE_SUCCESS;
} else {
call_longjmp(env);
return TEE_ERROR_GENERIC;
}
}
TEE_Result ta_entry_basic(uint32_t param_types, TEE_Param params[4])
{
TEE_Result res = TEE_ERROR_GENERIC;
printf("ta_entry_basic: enter\n");
res = test_malloc();
if (res != TEE_SUCCESS)
return res;
res = test_properties();
if (res != TEE_SUCCESS)
return res;
res = test_mem_access_right(param_types, params);
if (res != TEE_SUCCESS)
return res;
res = test_time();
if (res != TEE_SUCCESS)
return res;
res = test_float();
if (res != TEE_SUCCESS)
return res;
res = test_setjmp();
if (res != TEE_SUCCESS)
return res;
res = test_bget();
if (res != TEE_SUCCESS)
return res;
return TEE_SUCCESS;
}
TEE_Result ta_entry_panic(uint32_t param_types, TEE_Param params[4])
{
volatile bool mytrue = true;
(void)param_types;
(void)params;
printf("ta_entry_panic: enter\n");
/*
* Somewhat clumsy way of avoiding compile errors if TEE_Panic() has
* the __noreturn attribute.
*/
if (mytrue)
TEE_Panic(0xbeef);
/*
* Should not be reached, but if it is the testsuite can detect that
* TEE_Panic() returned instead of panicking the TA.
*/
return TEE_SUCCESS;
}
TEE_Result ta_entry_client_with_timeout(uint32_t param_types,
TEE_Param params[4])
{
static const TEE_UUID os_test_uuid = TA_OS_TEST_UUID;
TEE_Result res = TEE_ERROR_GENERIC;
TEE_TASessionHandle sess = TEE_HANDLE_NULL;
uint32_t ret_orig = 0;
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_VALUE_INPUT,
TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE)) {
EMSG("ta_entry_client_with_timeout: bad parameters\n");
return TEE_ERROR_BAD_PARAMETERS;
}
res = TEE_OpenTASession(&os_test_uuid, TEE_TIMEOUT_INFINITE, 0, NULL,
&sess, &ret_orig);
if (res != TEE_SUCCESS) {
EMSG(
"ta_entry_client_with_timeout: TEE_OpenTASession failed\n");
return res;
}
res =
TEE_InvokeTACommand(sess, params[0].value.a / 2,
TA_OS_TEST_CMD_WAIT, param_types, params,
&ret_orig);
if (ret_orig != TEE_ORIGIN_TRUSTED_APP || res != TEE_ERROR_CANCEL) {
EMSG("ta_entry_client_with_timeout: TEE_InvokeTACommand: "
"res 0x%x ret_orig 0x%x\n", (unsigned int)res,
(unsigned int)ret_orig);
res = TEE_ERROR_GENERIC;
} else
res = TEE_SUCCESS;
TEE_CloseTASession(sess);
return res;
}
TEE_Result ta_entry_client(uint32_t param_types, TEE_Param params[4])
{
static const TEE_UUID crypt_uuid = TA_CRYPT_UUID;
TEE_Result res = TEE_ERROR_GENERIC;
uint32_t l_pts = 0;
TEE_Param l_params[4] = { };
TEE_TASessionHandle sess = TEE_HANDLE_NULL;
uint32_t ret_orig = 0;
static const uint8_t sha256_in[] = { 'a', 'b', 'c' };
static const uint8_t sha256_out[] = {
0xba, 0x78, 0x16, 0xbf, 0x8f, 0x01, 0xcf, 0xea,
0x41, 0x41, 0x40, 0xde, 0x5d, 0xae, 0x22, 0x23,
0xb0, 0x03, 0x61, 0xa3, 0x96, 0x17, 0x7a, 0x9c,
0xb4, 0x10, 0xff, 0x61, 0xf2, 0x00, 0x15, 0xad
};
uint8_t out[32] = { 0 };
void *in = NULL;
(void)param_types;
(void)params;
printf("ta_entry_client: enter\n");
in = TEE_Malloc(sizeof(sha256_in), 0);
if (in == NULL)
return TEE_ERROR_OUT_OF_MEMORY;
TEE_MemMove(in, sha256_in, sizeof(sha256_in));
res = TEE_OpenTASession(&crypt_uuid, TEE_TIMEOUT_INFINITE, 0, NULL,
&sess, &ret_orig);
if (res != TEE_SUCCESS) {
EMSG("ta_entry_client: TEE_OpenTASession failed\n");
goto cleanup_return;
}
l_pts = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT,
TEE_PARAM_TYPE_MEMREF_OUTPUT, 0, 0);
l_params[0].memref.buffer = in;
l_params[0].memref.size = sizeof(sha256_in);
l_params[1].memref.buffer = out;
l_params[1].memref.size = sizeof(out);
res = TEE_InvokeTACommand(sess, TEE_TIMEOUT_INFINITE,
TA_CRYPT_CMD_SHA256, l_pts, l_params,
&ret_orig);
if (res != TEE_SUCCESS) {
EMSG("ta_entry_client: TEE_InvokeTACommand failed\n");
goto cleanup_return;
}
if (TEE_MemCompare(sha256_out, out, sizeof(sha256_out)) != 0) {
EMSG("ta_entry_client: out parameter failed\n");
res = TEE_ERROR_GENERIC;
goto cleanup_return;
}
cleanup_return:
TEE_Free(in);
TEE_CloseTASession(sess);
return res;
}
TEE_Result ta_entry_params_access_rights(uint32_t param_types, TEE_Param params[4])
{
TEE_Result res = TEE_ERROR_GENERIC;
if (param_types !=
TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT,
TEE_PARAM_TYPE_MEMREF_INPUT, 0, 0))
return TEE_ERROR_GENERIC;
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ |
TEE_MEMORY_ACCESS_ANY_OWNER,
params[0].memref.buffer,
params[0].memref.size);
if (res != TEE_SUCCESS)
return res;
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ,
params[0].memref.buffer,
params[0].memref.size);
if (res != TEE_ERROR_ACCESS_DENIED)
return TEE_ERROR_GENERIC;
if (params[1].memref.buffer || params[1].memref.size)
return TEE_ERROR_BAD_PARAMETERS;
return TEE_SUCCESS;
}
TEE_Result ta_entry_wait(uint32_t param_types, TEE_Param params[4])
{
TEE_Result res = TEE_SUCCESS;
(void)param_types;
printf("ta_entry_wait: waiting %d\n", (unsigned int)params[0].value.a);
/* Wait */
res = TEE_Wait(params[0].value.a);
return res;
}
static void undef_instr(void)
{
#if defined(ARM64)
__asm__(".word 0x0");
#elif defined(ARM32)
__asm__(".word 0xe7ffffff");
#else
#error "Unsupported architecture"
#endif
}
TEE_Result ta_entry_bad_mem_access(uint32_t param_types, TEE_Param params[4])
{
long int stack = 0;
long int stack_addr = (long int)&stack;
void (*volatile null_fn_ptr)(void) = NULL;
char *zero_size_malloc = NULL;
volatile char c = 0;
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_VALUE_INPUT, 0, 0, 0) &&
param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_VALUE_INPUT,
TEE_PARAM_TYPE_MEMREF_INOUT, 0, 0))
return TEE_ERROR_GENERIC;
switch (params[0].value.a) {
case 1:
*((volatile uint32_t *)0) = 0;
break;
case 2:
*((uint32_t *)(stack_addr + 0x40000000)) = 0;
break;
case 3:
null_fn_ptr();
break;
case 4:
((void (*)(void))(stack_addr + 0x40000000)) ();
break;
case 5:
undef_instr();
break;
case 6:
zero_size_malloc = TEE_Malloc(0, 0);
if (!zero_size_malloc)
return TEE_ERROR_GENERIC;
c = *zero_size_malloc;
break;
case 7:
zero_size_malloc = TEE_Malloc(0, 0);
if (!zero_size_malloc)
return TEE_ERROR_GENERIC;
*zero_size_malloc = 0;
break;
default:
break;
}
return TEE_SUCCESS;
}
static void incr_values(size_t bufsize, uint8_t *a, uint8_t *b, uint8_t *c)
{
size_t i = 0;
for (i = 0; i < bufsize; i++) {
a[i]++; b[i]++; c[i]++;
}
}
#define TA2TA_BUF_SIZE (2 * 1024)
TEE_Result ta_entry_ta2ta_memref(uint32_t param_types, TEE_Param params[4])
{
static const TEE_UUID test_uuid = TA_OS_TEST_UUID;
TEE_TASessionHandle sess = TEE_HANDLE_NULL;
TEE_Param l_params[4] = { };
uint8_t in[TA2TA_BUF_SIZE] = { };
uint8_t inout[TA2TA_BUF_SIZE] = { };
uint8_t out[TA2TA_BUF_SIZE] = { };
TEE_Result res = TEE_ERROR_GENERIC;
uint32_t ret_orig = 0;
uint32_t l_pts = 0;
size_t i = 0;
(void)params;
if (param_types != TEE_PARAM_TYPES(0, 0, 0, 0))
return TEE_ERROR_GENERIC;
res = TEE_OpenTASession(&test_uuid, TEE_TIMEOUT_INFINITE, 0, NULL,
&sess, &ret_orig);
if (res != TEE_SUCCESS) {
EMSG("TEE_OpenTASession failed");
goto cleanup_return;
}
l_pts = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT,
TEE_PARAM_TYPE_MEMREF_INOUT,
TEE_PARAM_TYPE_MEMREF_OUTPUT, 0);
l_params[0].memref.buffer = in;
l_params[0].memref.size = TA2TA_BUF_SIZE;
l_params[1].memref.buffer = inout;
l_params[1].memref.size = TA2TA_BUF_SIZE;
l_params[2].memref.buffer = out;
l_params[2].memref.size = TA2TA_BUF_SIZE;
/* Initialize buffers */
for (i = 0; i < TA2TA_BUF_SIZE; i++) {
in[i] = 5;
inout[i] = 10;
out[i] = 0;
}
/*
* TA will compute: out = ++inout + in
* Expected values after this step: in: 5, inout: 11, out: 16
*/
res = TEE_InvokeTACommand(sess, TEE_TIMEOUT_INFINITE,
TA_OS_TEST_CMD_TA2TA_MEMREF_MIX,
l_pts, l_params, &ret_orig);
if (res != TEE_SUCCESS) {
EMSG("TEE_InvokeTACommand failed");
goto cleanup_return;
}
/*
* Increment all values by one.
* Expected values after this step: in: 6, inout: 12, out: 17
*/
incr_values(TA2TA_BUF_SIZE, in, inout, out);
/*
* TA will compute: out = ++inout + in
* Expected values after this step: in: 6, inout: 13, out: 19
*/
res = TEE_InvokeTACommand(sess, TEE_TIMEOUT_INFINITE,
TA_OS_TEST_CMD_TA2TA_MEMREF_MIX,
l_pts, l_params, &ret_orig);
if (res != TEE_SUCCESS) {
EMSG("TEE_InvokeTACommand failed");
goto cleanup_return;
}
/* Check the actual values */
for (i = 0; i < TA2TA_BUF_SIZE; i++) {
if (in[i] != 6 || inout[i] != 13 || out[i] != 19) {
EMSG("Unexpected value in buffer(s)");
DHEXDUMP(in, TA2TA_BUF_SIZE);
DHEXDUMP(inout, TA2TA_BUF_SIZE);
DHEXDUMP(out, TA2TA_BUF_SIZE);
return TEE_ERROR_GENERIC;
}
}
cleanup_return:
TEE_CloseTASession(sess);
return res;
}
TEE_Result ta_entry_ta2ta_memref_mix(uint32_t param_types, TEE_Param params[4])
{
uint8_t *in = NULL;
uint8_t *inout = NULL;
uint8_t *out = NULL;
size_t bufsize = 0;
size_t i = 0;
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT,
TEE_PARAM_TYPE_MEMREF_INOUT,
TEE_PARAM_TYPE_MEMREF_OUTPUT, 0))
return TEE_ERROR_GENERIC;
bufsize = params[0].memref.size;
if (params[1].memref.size != bufsize ||
params[2].memref.size != bufsize)
return TEE_ERROR_GENERIC;
in = params[0].memref.buffer;
inout = params[1].memref.buffer;
out = params[2].memref.buffer;
for (i = 0; i < bufsize; i++)
out[i] = ++inout[i] + in[i];
return TEE_SUCCESS;
}
TEE_Result ta_entry_params(uint32_t param_types, TEE_Param params[4])
{
size_t n = 0;
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT,
TEE_PARAM_TYPE_MEMREF_INPUT,
TEE_PARAM_TYPE_MEMREF_OUTPUT,
TEE_PARAM_TYPE_MEMREF_OUTPUT))
return TEE_ERROR_BAD_PARAMETERS;
for (n = 0; n < TEE_NUM_PARAMS; n++)
if (!params[n].memref.buffer || !params[n].memref.size)
return TEE_ERROR_BAD_PARAMETERS;
return TEE_SUCCESS;
}
TEE_Result ta_entry_null_memref(uint32_t param_types, TEE_Param params[4])
{
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT,
TEE_PARAM_TYPE_MEMREF_INPUT,
TEE_PARAM_TYPE_MEMREF_OUTPUT,
TEE_PARAM_TYPE_MEMREF_OUTPUT))
return TEE_ERROR_BAD_PARAMETERS;
/*
* Tests how client can provide null or non-null memref parameters
* param[0] expected as a 0 byte input mapped memeref.
* param[1] expected as a 0 byte input not-mapped memeref.
* param[2] expected as a 0 byte output mapped memeref.
* param[3] expected as a 0 byte output not-mapped memeref.
*/
if (!params[0].memref.buffer || params[0].memref.size ||
params[1].memref.buffer || params[1].memref.size ||
!params[2].memref.buffer || params[2].memref.size ||
params[3].memref.buffer || params[3].memref.size)
return TEE_ERROR_BAD_PARAMETERS;
return TEE_SUCCESS;
}
TEE_Result ta_entry_call_lib(uint32_t param_types,
TEE_Param params[4] __unused)
{
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE))
return TEE_ERROR_BAD_PARAMETERS;
if (os_test_shlib_add(1, 2) != 3)
return TEE_ERROR_GENERIC;
return TEE_SUCCESS;
}
TEE_Result ta_entry_call_lib_panic(uint32_t param_types,
TEE_Param params[4] __unused)
{
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE))
return TEE_ERROR_BAD_PARAMETERS;
os_test_shlib_panic();
return TEE_ERROR_GENERIC;
}
TEE_Result ta_entry_call_lib_dl(uint32_t param_types __maybe_unused,
TEE_Param params[4] __unused)
{
int (*add_func)(int a, int b) = NULL;
TEE_Result res = TEE_ERROR_GENERIC;
void *handle = NULL;
void *hnull = NULL;
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE))
return TEE_ERROR_BAD_PARAMETERS;
handle = dlopen("b3091a65-9751-4784-abf7-0298a7cc35ba",
RTLD_NOW | RTLD_GLOBAL | RTLD_NODELETE);
if (!handle)
return TEE_ERROR_GENERIC;
add_func = dlsym(handle, "os_test_shlib_dl_add");
if (!add_func)
goto err;
if (add_func(3, 4) != 7)
goto err;
hnull = dlopen(NULL, RTLD_NOW | RTLD_GLOBAL | RTLD_NODELETE);
if (!hnull)
goto err;
add_func = dlsym(hnull, "os_test_shlib_dl_add");
if (!add_func)
goto err;
if (add_func(5, 6) != 11)
goto err;
res = TEE_SUCCESS;
dlclose(hnull);
err:
dlclose(handle);
return res;
}
TEE_Result ta_entry_call_lib_dl_panic(uint32_t param_types __maybe_unused,
TEE_Param params[4] __unused)
{
int (*panic_func)(void) = NULL;
void *handle = NULL;
TEE_Result res = TEE_ERROR_GENERIC;
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE))
return TEE_ERROR_BAD_PARAMETERS;
handle = dlopen("b3091a65-9751-4784-abf7-0298a7cc35ba",
RTLD_NOW | RTLD_GLOBAL | RTLD_NODELETE);
if (!handle)
return res;
panic_func = dlsym(handle, "os_test_shlib_dl_panic");
if (!panic_func)
goto err;
panic_func();
return TEE_ERROR_GENERIC;
err:
dlclose(handle);
return res;
}
/* ELF initialization/finalization test */
volatile int os_test_global;
static void __attribute__((constructor)) os_test_init(void)
{
os_test_global *= 10;
os_test_global += 1;
DMSG("os_test_global=%d", os_test_global);
}
TEE_Result ta_entry_get_global_var(uint32_t param_types, TEE_Param params[4])
{
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_VALUE_OUTPUT,
TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE))
return TEE_ERROR_BAD_PARAMETERS;
params[0].value.a = os_test_global;
return TEE_SUCCESS;
}
TEE_Result ta_entry_client_identity(uint32_t param_types, TEE_Param params[4])
{
TEE_Result res = TEE_ERROR_GENERIC;
TEE_Identity identity = { };
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_VALUE_OUTPUT,
TEE_PARAM_TYPE_MEMREF_OUTPUT,
TEE_PARAM_TYPE_NONE,
TEE_PARAM_TYPE_NONE))
return TEE_ERROR_BAD_PARAMETERS;
if (params[1].memref.size < sizeof(TEE_UUID)) {
params[1].memref.size = sizeof(TEE_UUID);
return TEE_ERROR_SHORT_BUFFER;
}
res = TEE_GetPropertyAsIdentity(TEE_PROPSET_CURRENT_CLIENT,
"gpd.client.identity", &identity);
if (res != TEE_SUCCESS) {
EMSG("TEE_GetPropertyAsIdentity: returned %#"PRIx32, res);
return res;
}
params[0].value.a = identity.login;
memcpy(params[1].memref.buffer, &identity.uuid, sizeof(TEE_UUID));
params[1].memref.size = sizeof(TEE_UUID);
return res;
}
#if defined(WITH_TLS_TESTS)
__thread int os_test_tls_a;
__thread int os_test_tls_b = 42;
TEE_Result ta_entry_tls_test_main(void)
{
if (os_test_tls_a != 0) {
EMSG("os_test_tls_a=%d, expected 0", os_test_tls_a);
return TEE_ERROR_GENERIC;
}
if (os_test_tls_b != 42) {
EMSG("os_test_tls_b=%d, expected 42", os_test_tls_b);
return TEE_ERROR_GENERIC;
}
return TEE_SUCCESS;
}
TEE_Result ta_entry_tls_test_shlib(void)
{
if (os_test_shlib_tls_a != 0) {
EMSG("os_test_shlib_tls_a=%d, expected 0", os_test_shlib_tls_a);
return TEE_ERROR_GENERIC;
}
if (os_test_shlib_tls_b != 123) {
EMSG("os_test_shlib_tls_b=%d, expected 123",
os_test_shlib_tls_b);
return TEE_ERROR_GENERIC;
}
return TEE_SUCCESS;
}
#else
TEE_Result ta_entry_tls_test_main(void)
{
return TEE_ERROR_NOT_SUPPORTED;
}
TEE_Result ta_entry_tls_test_shlib(void)
{
return TEE_ERROR_NOT_SUPPORTED;
}
#endif
static int iterate_hdr_cb(struct dl_phdr_info *info __maybe_unused,
size_t size __unused, void *data)
{
int *count = data;
(*count)++;
IMSG("ELF module index: %d", *count);
IMSG(" dlpi_addr=%p", (void *)info->dlpi_addr);
IMSG(" dlpi_name='%s'", info->dlpi_name);
IMSG(" dlpi_phdr=%p", (void *)info->dlpi_phdr);
IMSG(" dlpi_phnum=%hu", info->dlpi_phnum);
IMSG(" dlpi_adds=%llu", info->dlpi_adds);
IMSG(" dlpi_subs=%llu", info->dlpi_subs);
IMSG(" dlpi_tls_modid=%zu", info->dlpi_tls_modid);
IMSG(" dlpi_tls_data=%p", info->dlpi_tls_data);
return 123;
}
static TEE_Result expect_dl_count_ge(size_t exp_count)
{
int st = 0;
size_t count = 0;
st = dl_iterate_phdr(iterate_hdr_cb, (void *)&count);
if (st != 123) {
/*
* dl_iterate_phdr() should return the last value returned by
* the callback
*/
EMSG("Expected return value 123, got %d", st);
return TEE_ERROR_GENERIC;
}
if (count < exp_count) {
/*
* Expect >= and not == since there could be more shared
* libraries (for instance, CFG_ULIBS_SHARED=y)
*/
EMSG("Expected count > %zu, got: %zu", exp_count, count);
return TEE_ERROR_GENERIC;
}
return TEE_SUCCESS;
}
TEE_Result ta_entry_dl_phdr(void)
{
return expect_dl_count_ge(2);
}
TEE_Result ta_entry_dl_phdr_dl(void)
{
TEE_Result res = TEE_ERROR_GENERIC;
void *handle = NULL;
handle = dlopen("b3091a65-9751-4784-abf7-0298a7cc35ba",
RTLD_NOW | RTLD_GLOBAL | RTLD_NODELETE);
if (!handle)
return TEE_ERROR_GENERIC;
res = expect_dl_count_ge(3);
dlclose(handle);
return res;
}