Merge "Separate shutdown and stats after shutdown tests"
diff --git a/tftf/tests/runtime_services/arm_arch_svc/smccc_arch_workaround_2.c b/tftf/tests/runtime_services/arm_arch_svc/smccc_arch_workaround_2.c
index a090874..cf36e4f 100644
--- a/tftf/tests/runtime_services/arm_arch_svc/smccc_arch_workaround_2.c
+++ b/tftf/tests/runtime_services/arm_arch_svc/smccc_arch_workaround_2.c
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 2018, Arm Limited. All rights reserved.
+ * Copyright (c) 2019, Arm Limited. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
@@ -15,7 +15,12 @@
#include <tftf_lib.h>
#ifdef AARCH64
-#define CORTEX_A76_MIDR 0x410fd0b0
+#define NOT_REQUIRED_DONOT_INVOKE -2
+#define NOT_SUPPORTED -1
+#define IS_REQUIRED 0
+#define NOT_REQUIRED 1
+
+#define CORTEX_A76_MIDR 0x410fd0b0
static int cortex_a76_test(void);
@@ -37,7 +42,6 @@
smc_ret_values ret;
int32_t expected_ver;
unsigned int my_midr, midr_mask;
- int wa_required;
size_t i;
/* Check if SMCCC version is at least v1.1 */
@@ -56,16 +60,43 @@
args.fid = SMCCC_ARCH_FEATURES;
args.arg1 = SMCCC_ARCH_WORKAROUND_2;
ret = tftf_smc(&args);
- if ((int)ret.ret0 == -1) {
- tftf_testcase_printf("SMCCC_ARCH_WORKAROUND_2 is not implemented\n");
- return TEST_RESULT_SKIPPED;
- }
- /* If the call returns 0, it means the workaround is required */
- if ((int)ret.ret0 == 0)
- wa_required = 1;
- else
- wa_required = 0;
+ switch ((int)ret.ret0) {
+
+ case NOT_REQUIRED_DONOT_INVOKE:
+ /*
+ * This workaround is not required and must not be invoked on
+ * any PE in this system
+ */
+ tftf_testcase_printf("SMCCC_ARCH_WORKAROUND_2 is not required\n");
+ return TEST_RESULT_SKIPPED;
+
+ case NOT_SUPPORTED:
+ /*
+ * This workaround is not supported and must not be invoked on
+ * any PE in this system
+ */
+ tftf_testcase_printf("SMCCC_ARCH_WORKAROUND_2 is not supported\n");
+ return TEST_RESULT_SKIPPED;
+
+ case IS_REQUIRED:
+ /* This workaround is required. Proceed with the test */
+ break;
+
+ case NOT_REQUIRED:
+ /*
+ * This PE does not require dynamic firmware mitigation using
+ * SMCCC_ARCH_WORKAROUND_2
+ */
+ tftf_testcase_printf("SMCCC_ARCH_WORKAROUND_2 is not required\n");
+ return TEST_RESULT_SKIPPED;
+
+ default:
+ tftf_testcase_printf("Illegal value %d returned by "
+ "SMCCC_ARCH_WORKAROUND_2 function\n", (int)ret.ret0);
+ return TEST_RESULT_FAIL;
+
+ }
/* Check if the SMC return value matches our expectations */
my_midr = (unsigned int)read_midr_el1();
@@ -75,12 +106,12 @@
struct ent *entp = &entries[i];
if ((my_midr & midr_mask) == (entp->midr & midr_mask)) {
- if (entp->wa_required() != wa_required)
+ if (entp->wa_required() != 1)
return TEST_RESULT_FAIL;
break;
}
}
- if (i == ARRAY_SIZE(entries) && wa_required) {
+ if (i == ARRAY_SIZE(entries)) {
tftf_testcase_printf("TFTF workaround table out of sync with TF\n");
return TEST_RESULT_FAIL;
}
@@ -128,4 +159,4 @@
INFO("%s skipped on AArch32\n", __func__);
return TEST_RESULT_SKIPPED;
}
-#endif
+#endif /* AARCH64 */
diff --git a/tftf/tests/runtime_services/generic/generic_smc.c b/tftf/tests/runtime_services/generic/generic_smc.c
index 366509b..defb843 100644
--- a/tftf/tests/runtime_services/generic/generic_smc.c
+++ b/tftf/tests/runtime_services/generic/generic_smc.c
@@ -69,33 +69,57 @@
* Send an SMC with the specified arguments.
* Check that the values it returns match the expected ones. The do_check[]
* array indicates which ones should be checked and provides some flexibility
- * to ignore some of them.
+ * to ignore some of them. Also the allow_zeros[] array lets the values to be
+ * zeroes. allow_zeros[] is only evaluated if do_check[] is true for the given
+ * value.
+ * The two common solutions for preventing data leak from the TEE is to either
+ * preserve the register values or zero them out. Having an expected value and
+ * also allowing zeroes in this function comes handy in this previous case.
* If the values do not match, write an error message in the test report.
*/
static bool smc_check_match(const smc_args *args, const smc_ret_values *expect,
- const bool do_check[4])
+ const bool do_check[4], const bool allow_zeros[4])
{
smc_ret_values ret = tftf_smc(args);
- if ((do_check[0] && (ret.ret0 != expect->ret0)) ||
- (do_check[1] && (ret.ret1 != expect->ret1)) ||
- (do_check[2] && (ret.ret2 != expect->ret2)) ||
- (do_check[3] && (ret.ret3 != expect->ret3))) {
+#define CHK_RET(ret, expect, allow_zeros) \
+ ((ret) != (expect) && !((allow_zeros) && (ret) == 0))
+
+ if ((do_check[0] && CHK_RET(ret.ret0, expect->ret0, allow_zeros[0])) ||
+ (do_check[1] && CHK_RET(ret.ret1, expect->ret1, allow_zeros[1])) ||
+ (do_check[2] && CHK_RET(ret.ret2, expect->ret2, allow_zeros[2])) ||
+ (do_check[3] && CHK_RET(ret.ret3, expect->ret3, allow_zeros[3]))) {
+
+#undef CHK_RET
/*
* Build an error message where unchecked SMC return values are
* displayed as '*'.
*/
- char expect_str[4][20];
-#define BUILD_STR(_buf, _do_check, _expect) \
- if (_do_check) { \
- snprintf(_buf, 20, "0x%lx", _expect); \
- } else { \
- strncpy(_buf, "*", 2); \
- }
- BUILD_STR(expect_str[0], do_check[0], expect->ret0);
- BUILD_STR(expect_str[1], do_check[1], expect->ret1);
- BUILD_STR(expect_str[2], do_check[2], expect->ret2);
- BUILD_STR(expect_str[3], do_check[3], expect->ret3);
+ char expect_str[4][28];
+#define BUILD_STR(_buf, _buf_size, _do_check, _allow_zero, _expect) \
+ do { \
+ if (_do_check) { \
+ if (_allow_zero) { \
+ snprintf(_buf, _buf_size, \
+ "0x%lx or zero", \
+ _expect); \
+ } else { \
+ snprintf(_buf, _buf_size, \
+ "0x%lx", _expect); \
+ } \
+ } else { \
+ _buf[0] = '*'; \
+ _buf[1] = '\0'; \
+ } \
+ } while (0)
+ BUILD_STR(expect_str[0], sizeof(expect_str[0]),
+ do_check[0], allow_zeros[0], expect->ret0);
+ BUILD_STR(expect_str[1], sizeof(expect_str[1]),
+ do_check[1], allow_zeros[1], expect->ret1);
+ BUILD_STR(expect_str[2], sizeof(expect_str[2]),
+ do_check[2], allow_zeros[2], expect->ret2);
+ BUILD_STR(expect_str[3], sizeof(expect_str[3]),
+ do_check[3], allow_zeros[3], expect->ret3);
#undef BUILD_STR
tftf_testcase_printf(
"Got {0x%lx,0x%lx,0x%lx,0x%lx}, expected {%s,%s,%s,%s}.\n",
@@ -167,11 +191,14 @@
if (is_trusted_os_present(NULL)) {
/*
* The Trusted OS is free to return any error code in x0 but it
- * should at least preserve the values of x1-x3.
+ * should at least preserve or fill by zeroes the values of
+ * x1-x3.
*/
const smc_ret_values ret3 = { 0, 0x44444444, 0x55555555, 0x66666666 };
const bool check[4] = { false, true, true, true };
- FAIL_IF(!smc_check_match(&args3, &ret3, check));
+ const bool allow_zeros[4] = { false, true, true, true };
+
+ FAIL_IF(!smc_check_match(&args3, &ret3, check, allow_zeros));
} else {
const smc_ret_values ret3
= { SMC_UNKNOWN, 0x44444444, 0x55555555, 0x66666666 };
@@ -278,11 +305,14 @@
if (is_trusted_os_present(NULL)) {
/*
* The Trusted OS is free to return any error code in x0 but it
- * should at least preserve the values of x1-x3.
+ * should at least preserve or fill by zeroes the values of
+ * x1-x3.
*/
const smc_ret_values ret3 = { 0, 0x44444444, 0x55555555, 0x66666666 };
const bool check[4] = { false, true, true, true };
- FAIL_IF(!smc_check_match(&args3, &ret3, check));
+ const bool allow_zeros[4] = { false, true, true, true };
+
+ FAIL_IF(!smc_check_match(&args3, &ret3, check, allow_zeros));
} else {
const smc_ret_values ret3
= { SMC_UNKNOWN, 0x44444444, 0x55555555, 0x66666666 };