// SPDX-License-Identifier: BSD-2-Clause
|
/*
|
* Copyright (c) 2014, STMicroelectronics International N.V.
|
* All rights reserved.
|
*/
|
#include <compiler.h>
|
#include <dlfcn.h>
|
#include <link.h>
|
#include <setjmp.h>
|
#include <stdint.h>
|
#include <string.h>
|
#include <ta_crypt.h>
|
#include <ta_os_test.h>
|
#include <tee_internal_api_extensions.h>
|
|
#include "os_test.h"
|
#include "test_float_subj.h"
|
#include "os_test_lib.h"
|
|
enum p_type {
|
P_TYPE_BOOL,
|
P_TYPE_INT,
|
P_TYPE_UUID,
|
P_TYPE_IDENTITY,
|
P_TYPE_STRING,
|
P_TYPE_BINARY_BLOCK,
|
};
|
|
struct p_attr {
|
const char *str;
|
enum p_type type;
|
bool retrieved;
|
};
|
|
static TEE_Result check_returned_prop(
|
int line __maybe_unused, char *prop_name __maybe_unused,
|
TEE_Result return_res, TEE_Result expected_res,
|
uint32_t return_len, uint32_t expected_len)
|
{
|
if (return_res != expected_res) {
|
EMSG("From line %d (property name=%s): return_res=0x%x vs expected_res=0x%x",
|
line, (prop_name ? prop_name : "unknown"),
|
(unsigned int)return_res, (unsigned int)expected_res);
|
return TEE_ERROR_GENERIC;
|
}
|
if (return_len != expected_len) {
|
EMSG("From line %d (property name=%s): return_len=%u vs expected_res=%u",
|
line, (prop_name ? prop_name : "unknown"),
|
return_len, expected_len);
|
return TEE_ERROR_GENERIC;
|
}
|
return TEE_SUCCESS;
|
}
|
|
static TEE_Result check_binprop_ones(size_t size, char *bbuf, size_t bblen)
|
{
|
char ones[4] = { 0xff, 0xff, 0xff, 0xff };
|
|
if (size > 4 || bblen != size) {
|
EMSG("Size error (size=%zu, bblen=%zu)", size, bblen);
|
return TEE_ERROR_GENERIC;
|
}
|
if (strncmp(bbuf, ones, bblen)) {
|
EMSG("Unexpected content");
|
DHEXDUMP(bbuf, bblen);
|
return TEE_ERROR_GENERIC;
|
}
|
return TEE_SUCCESS;
|
}
|
|
static TEE_Result get_binblock_property(TEE_PropSetHandle h,
|
char *nbuf __unused, char **bbuf, size_t *bblen)
|
{
|
TEE_Result res = TEE_ERROR_GENERIC;
|
uint32_t block_len = 0;
|
|
*bbuf = NULL;
|
*bblen = 0;
|
res = TEE_GetPropertyAsBinaryBlock(h, NULL, *bbuf, &block_len);
|
|
if (res == TEE_SUCCESS && !block_len)
|
return TEE_SUCCESS;
|
|
if (res != TEE_ERROR_SHORT_BUFFER) {
|
EMSG("TEE_GetPropertyAsBinaryBlock() size query returned 0x%x",
|
(unsigned int)res);
|
return res ? res : TEE_ERROR_GENERIC;
|
}
|
|
*bbuf = TEE_Malloc(block_len, TEE_MALLOC_FILL_ZERO);
|
if (!bbuf)
|
return TEE_ERROR_OUT_OF_MEMORY;
|
|
res = TEE_GetPropertyAsBinaryBlock(h, NULL, *bbuf, &block_len);
|
if (res != TEE_SUCCESS)
|
EMSG("TEE_GetPropertyAsBinaryBlock(\"%s\") returned 0x%x",
|
nbuf, (unsigned int)res);
|
else
|
*bblen = block_len;
|
|
return res;
|
}
|
|
static TEE_Result print_properties(TEE_PropSetHandle h,
|
TEE_PropSetHandle prop_set,
|
struct p_attr *p_attrs, size_t num_p_attrs)
|
{
|
TEE_Result res = TEE_ERROR_GENERIC;
|
size_t n = 0;
|
|
TEE_StartPropertyEnumerator(h, prop_set);
|
|
while (true) {
|
char nbuf[256] = { };
|
char nbuf_small[256] = { };
|
char vbuf[256] = { };
|
char vbuf2[256] = { };
|
uint32_t nblen = sizeof(nbuf);
|
uint32_t nblen_small = 0;
|
uint32_t vblen = sizeof(vbuf);
|
uint32_t vblen2 = sizeof(vbuf2);
|
char *bbuf = NULL;
|
size_t bblen = 0;
|
|
res = TEE_GetPropertyName(h, nbuf, &nblen);
|
if (res != TEE_SUCCESS) {
|
EMSG("TEE_GetPropertyName returned 0x%x\n",
|
(unsigned int)res);
|
return res;
|
}
|
if (nblen != strlen(nbuf) + 1) {
|
EMSG("Name has wrong size: %u vs %zu", nblen, strlen(nbuf) + 1);
|
return TEE_ERROR_GENERIC;
|
}
|
|
|
/* Get the property name with a very small buffer */
|
nblen_small = 2;
|
res = TEE_GetPropertyName(h, nbuf_small, &nblen_small);
|
res = check_returned_prop(__LINE__, nbuf, res, TEE_ERROR_SHORT_BUFFER,
|
nblen_small, nblen);
|
if (res != TEE_SUCCESS)
|
return res;
|
|
/* Get the property name with almost the correct buffer */
|
nblen_small = nblen - 1;
|
res = TEE_GetPropertyName(h, nbuf_small, &nblen_small);
|
res = check_returned_prop(__LINE__, nbuf, res, TEE_ERROR_SHORT_BUFFER,
|
nblen_small, nblen);
|
if (res != TEE_SUCCESS)
|
return res;
|
|
/* Get the property name with the exact buffer length */
|
nblen_small = nblen;
|
res = TEE_GetPropertyName(h, nbuf_small, &nblen_small);
|
res = check_returned_prop(__LINE__, nbuf, res, TEE_SUCCESS,
|
nblen_small, nblen);
|
if (res != TEE_SUCCESS)
|
return res;
|
|
/* Get the property value */
|
res = TEE_GetPropertyAsString(h, NULL, vbuf, &vblen);
|
res = check_returned_prop(__LINE__, nbuf, res, TEE_SUCCESS,
|
vblen, strlen(vbuf) + 1);
|
if (res != TEE_SUCCESS)
|
return res;
|
|
res = TEE_GetPropertyAsString(prop_set, nbuf, vbuf2, &vblen2);
|
res = check_returned_prop(__LINE__, nbuf, res, TEE_SUCCESS,
|
vblen2, strlen(vbuf2) + 1);
|
if (res != TEE_SUCCESS)
|
return res;
|
|
if (strcmp(vbuf, vbuf2) != 0) {
|
EMSG("String of \"%s\" differs\n", nbuf);
|
return TEE_ERROR_GENERIC;
|
}
|
|
/* Get the property with a very small buffer */
|
if (vblen > 1) {
|
vblen2 = 1;
|
res = TEE_GetPropertyAsString(prop_set, nbuf, vbuf2, &vblen2);
|
res = check_returned_prop(__LINE__, nbuf, res,
|
TEE_ERROR_SHORT_BUFFER,
|
vblen2, vblen);
|
if (res != TEE_SUCCESS)
|
return res;
|
}
|
|
/* Get the property with almost the correct buffer */
|
vblen2 = vblen - 1;
|
res = TEE_GetPropertyAsString(prop_set, nbuf, vbuf2, &vblen2);
|
res = check_returned_prop(__LINE__, nbuf, res, TEE_ERROR_SHORT_BUFFER,
|
vblen2, vblen);
|
if (res != TEE_SUCCESS)
|
return res;
|
|
/* Get the property name with the exact buffer length */
|
vblen2 = vblen;
|
res = TEE_GetPropertyAsString(prop_set, nbuf, vbuf2, &vblen2);
|
res = check_returned_prop(__LINE__, nbuf, res, TEE_SUCCESS, vblen2, vblen);
|
if (res != TEE_SUCCESS)
|
return res;
|
|
/* check specific myprop.hello property, which is larger than 80 */
|
if (!strcmp("myprop.hello", nbuf) &&
|
vblen2 != 1 + strlen("hello property, larger than 80 characters, so that it checks that it is not truncated by anything in the source code which may be wrong")) {
|
EMSG("TEE_GetPropertyAsString(\"%s\") is truncated - returned \"%s\"\n",
|
nbuf, vbuf);
|
return TEE_ERROR_GENERIC;
|
}
|
|
DMSG("Found \"%s\" value \"%s\"\n", nbuf, vbuf);
|
|
for (n = 0; n < num_p_attrs; n++) {
|
if (strcmp(nbuf, p_attrs[n].str) != 0)
|
continue;
|
|
if (p_attrs[n].retrieved) {
|
EMSG("Value \"%s\" already retrieved\n",
|
p_attrs[n].str);
|
return TEE_ERROR_GENERIC;
|
}
|
p_attrs[n].retrieved = true;
|
|
switch (p_attrs[n].type) {
|
case P_TYPE_BOOL:
|
{
|
bool v = false;
|
|
res =
|
TEE_GetPropertyAsBool(h, NULL, &v);
|
if (res != TEE_SUCCESS) {
|
EMSG(
|
"TEE_GetPropertyAsBool(\"%s\") returned 0x%x\n",
|
nbuf, (unsigned int)res);
|
return res;
|
}
|
}
|
break;
|
|
case P_TYPE_INT:
|
{
|
uint32_t v = 0;
|
|
res = TEE_GetPropertyAsU32(h, NULL, &v);
|
if (res != TEE_SUCCESS) {
|
EMSG(
|
"TEE_GetPropertyAsU32(\"%s\") returned 0x%x\n",
|
nbuf, (unsigned int)res);
|
return res;
|
}
|
}
|
break;
|
|
case P_TYPE_UUID:
|
{
|
TEE_UUID v = { };
|
|
res =
|
TEE_GetPropertyAsUUID(h, NULL, &v);
|
if (res != TEE_SUCCESS) {
|
EMSG(
|
"TEE_GetPropertyAsUUID(\"%s\") returned 0x%x\n",
|
nbuf, (unsigned int)res);
|
return res;
|
}
|
}
|
break;
|
|
case P_TYPE_IDENTITY:
|
{
|
TEE_Identity v = { };
|
|
res =
|
TEE_GetPropertyAsIdentity(h, NULL,
|
&v);
|
if (res != TEE_SUCCESS) {
|
EMSG(
|
"TEE_GetPropertyAsIdentity(\"%s\") returned 0x%x\n",
|
nbuf, (unsigned int)res);
|
return res;
|
}
|
}
|
break;
|
|
case P_TYPE_STRING:
|
/* Already read as string */
|
break;
|
|
case P_TYPE_BINARY_BLOCK:
|
res = get_binblock_property(h, nbuf, &bbuf, &bblen);
|
if (res)
|
return res;
|
|
if (!strcmp("myprop.binaryblock", nbuf)) {
|
const char exp_bin_value[] = "Hello world!";
|
|
if (bblen != strlen(exp_bin_value) ||
|
TEE_MemCompare(exp_bin_value, bbuf,
|
bblen)) {
|
EMSG("Binary buffer of \"%s\" differs from \"%s\"",
|
nbuf, exp_bin_value);
|
EMSG("Got \"%s\"", bbuf);
|
return TEE_ERROR_GENERIC;
|
}
|
} else if (!strcmp("myprop.binaryblock.1byte-ones",
|
nbuf)) {
|
res = check_binprop_ones(1, bbuf, bblen);
|
if (res)
|
return res;
|
} else if (!strcmp("myprop.binaryblock.2byte-ones",
|
nbuf)) {
|
res = check_binprop_ones(2, bbuf, bblen);
|
if (res)
|
return res;
|
} else if (!strcmp("myprop.binaryblock.3byte-ones",
|
nbuf)) {
|
res = check_binprop_ones(3, bbuf, bblen);
|
if (res)
|
return res;
|
} else if (!strcmp("myprop.binaryblock.4byte-ones",
|
nbuf)) {
|
res = check_binprop_ones(4, bbuf, bblen);
|
if (res)
|
return res;
|
} else if (!strcmp("myprop.binaryblock.empty1", nbuf) ||
|
!strcmp("myprop.binaryblock.empty2", nbuf) ||
|
!strcmp("myprop.binaryblock.empty3", nbuf)) {
|
if (bblen) {
|
EMSG("Property \"%s\": %zu byte(s)",
|
nbuf, bblen);
|
return TEE_ERROR_GENERIC;
|
}
|
} else {
|
EMSG("Unexpected property \"%s\"", nbuf);
|
TEE_Panic(0);
|
}
|
|
TEE_Free(bbuf);
|
break;
|
|
default:
|
EMSG("Unknown type (%d) for \"%s\"\n",
|
p_attrs[n].type, p_attrs[n].str);
|
return TEE_ERROR_GENERIC;
|
}
|
}
|
|
res = TEE_GetNextProperty(h);
|
if (res != TEE_SUCCESS) {
|
if (res == TEE_ERROR_ITEM_NOT_FOUND)
|
return TEE_SUCCESS;
|
return res;
|
}
|
}
|
}
|
|
static TEE_Result test_malloc(void)
|
{
|
void *p = TEE_Malloc(4, 0);
|
|
if (p == NULL) {
|
EMSG("TEE_Malloc failed\n");
|
return TEE_ERROR_OUT_OF_MEMORY;
|
}
|
TEE_Free(p);
|
TEE_Free(NULL);
|
|
return TEE_SUCCESS;
|
}
|
|
static TEE_Result test_properties(void)
|
{
|
TEE_Result res = TEE_ERROR_GENERIC;
|
TEE_PropSetHandle h = TEE_HANDLE_NULL;
|
struct p_attr p_attrs[] = {
|
{"gpd.ta.appID", P_TYPE_UUID},
|
{"gpd.ta.singleInstance", P_TYPE_BOOL},
|
{"gpd.ta.multiSession", P_TYPE_BOOL},
|
{"gpd.ta.instanceKeepAlive", P_TYPE_BOOL},
|
{"gpd.ta.dataSize", P_TYPE_INT},
|
{"gpd.ta.stackSize", P_TYPE_INT},
|
{"gpd.ta.version", P_TYPE_STRING},
|
{"gpd.ta.description", P_TYPE_STRING},
|
{"gpd.client.identity", P_TYPE_IDENTITY},
|
{"gpd.tee.apiversion", P_TYPE_STRING},
|
{"gpd.tee.description", P_TYPE_STRING},
|
{"gpd.tee.deviceID", P_TYPE_UUID},
|
{"gpd.tee.systemTime.protectionLevel", P_TYPE_INT},
|
{"gpd.tee.TAPersistentTime.protectionLevel", P_TYPE_INT},
|
{"gpd.tee.arith.maxBigIntSize", P_TYPE_INT},
|
{"gpd.tee.cryptography.ecc", P_TYPE_BOOL},
|
{"gpd.tee.trustedStorage.antiRollback.protectionLevel", P_TYPE_INT},
|
{"gpd.tee.trustedos.implementation.version", P_TYPE_STRING},
|
{"gpd.tee.trustedos.implementation.binaryversion", P_TYPE_INT},
|
{"gpd.tee.trustedos.manufacturer", P_TYPE_STRING},
|
{"gpd.tee.firmware.implementation.version", P_TYPE_STRING},
|
{"gpd.tee.firmware.implementation.binaryversion", P_TYPE_INT},
|
{"gpd.tee.firmware.manufacturer", P_TYPE_STRING},
|
{"myprop.true", P_TYPE_BOOL},
|
{"myprop.42", P_TYPE_INT},
|
{"myprop.123", P_TYPE_UUID},
|
{"myprop.1234", P_TYPE_IDENTITY},
|
{"myprop.hello", P_TYPE_STRING},
|
{"myprop.binaryblock", P_TYPE_BINARY_BLOCK},
|
{"myprop.binaryblock.1byte-ones", P_TYPE_BINARY_BLOCK},
|
{"myprop.binaryblock.2byte-ones", P_TYPE_BINARY_BLOCK},
|
{"myprop.binaryblock.3byte-ones", P_TYPE_BINARY_BLOCK},
|
{"myprop.binaryblock.4byte-ones", P_TYPE_BINARY_BLOCK},
|
{"myprop.binaryblock.empty1", P_TYPE_BINARY_BLOCK},
|
{"myprop.binaryblock.empty2", P_TYPE_BINARY_BLOCK},
|
{"myprop.binaryblock.empty3", P_TYPE_BINARY_BLOCK},
|
};
|
const size_t num_p_attrs = sizeof(p_attrs) / sizeof(p_attrs[0]);
|
size_t n = 0;
|
|
res = TEE_AllocatePropertyEnumerator(&h);
|
if (res != TEE_SUCCESS) {
|
EMSG("TEE_AllocatePropertyEnumerator: returned 0x%x\n",
|
(unsigned int)res);
|
return TEE_ERROR_GENERIC;
|
}
|
|
printf("Getting properties for current TA\n");
|
res = print_properties(h, TEE_PROPSET_CURRENT_TA, p_attrs, num_p_attrs);
|
if (res != TEE_SUCCESS)
|
goto cleanup_return;
|
|
printf("Getting properties for current client\n");
|
res = print_properties(h, TEE_PROPSET_CURRENT_CLIENT, p_attrs,
|
num_p_attrs);
|
if (res != TEE_SUCCESS)
|
goto cleanup_return;
|
|
printf("Getting properties for implementation\n");
|
res = print_properties(h, TEE_PROPSET_TEE_IMPLEMENTATION, p_attrs,
|
num_p_attrs);
|
if (res != TEE_SUCCESS)
|
goto cleanup_return;
|
|
for (n = 0; n < num_p_attrs; n++) {
|
if (!p_attrs[n].retrieved) {
|
EMSG("\"%s\" not retrieved\n", p_attrs[n].str);
|
res = TEE_ERROR_GENERIC;
|
goto cleanup_return;
|
}
|
}
|
|
cleanup_return:
|
TEE_FreePropertyEnumerator(h);
|
return res;
|
}
|
|
static TEE_Result test_mem_access_right(uint32_t param_types,
|
TEE_Param params[4])
|
{
|
static const TEE_UUID test_uuid = TA_OS_TEST_UUID;
|
TEE_Result res = TEE_ERROR_GENERIC;
|
uint32_t ret_orig = 0;
|
uint32_t l_pts = 0;
|
TEE_Param l_params[4] = { };
|
uint8_t buf[32] = { };
|
TEE_TASessionHandle sess = TEE_HANDLE_NULL;
|
TEE_UUID *uuid = NULL;
|
|
if (param_types !=
|
TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT, 0, 0, 0))
|
return TEE_ERROR_GENERIC;
|
|
/* test access rights on memref parameter */
|
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ |
|
TEE_MEMORY_ACCESS_ANY_OWNER,
|
params[0].memref.buffer,
|
params[0].memref.size);
|
if (res != TEE_SUCCESS)
|
return res;
|
|
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ,
|
params[0].memref.buffer,
|
params[0].memref.size);
|
if (res != TEE_ERROR_ACCESS_DENIED)
|
return TEE_ERROR_GENERIC;
|
|
/* test access rights on private read-only and read-write memory */
|
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ,
|
(void *)&test_uuid, sizeof(test_uuid));
|
if (res != TEE_SUCCESS)
|
return res;
|
|
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_WRITE,
|
(void *)&test_uuid, sizeof(test_uuid));
|
if (res == TEE_SUCCESS)
|
return TEE_ERROR_GENERIC;
|
|
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ |
|
TEE_MEMORY_ACCESS_WRITE,
|
&ret_orig, sizeof(ret_orig));
|
if (res != TEE_SUCCESS)
|
return res;
|
|
uuid = TEE_Malloc(sizeof(*uuid), 0);
|
if (!uuid)
|
return TEE_ERROR_OUT_OF_MEMORY;
|
|
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ |
|
TEE_MEMORY_ACCESS_WRITE,
|
uuid, sizeof(*uuid));
|
TEE_Free(uuid);
|
if (res != TEE_SUCCESS)
|
return res;
|
|
/* test access rights on invalid memory (at least lower 256kB) */
|
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ,
|
NULL, 1);
|
if (res == TEE_SUCCESS)
|
return TEE_ERROR_GENERIC;
|
|
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ,
|
(void*)(256 * 1024), 1);
|
if (res == TEE_SUCCESS)
|
return TEE_ERROR_GENERIC;
|
|
res = TEE_OpenTASession(&test_uuid, TEE_TIMEOUT_INFINITE, 0, NULL,
|
&sess, &ret_orig);
|
if (res != TEE_SUCCESS) {
|
EMSG("test_mem_access_right: TEE_OpenTASession failed\n");
|
goto cleanup_return;
|
}
|
|
l_pts = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT,
|
TEE_PARAM_TYPE_MEMREF_INPUT, 0, 0);
|
l_params[0].memref.buffer = buf;
|
l_params[0].memref.size = sizeof(buf);
|
l_params[1].memref.buffer = NULL;
|
l_params[1].memref.size = 0;
|
res = TEE_InvokeTACommand(sess, TEE_TIMEOUT_INFINITE,
|
TA_OS_TEST_CMD_PARAMS_ACCESS,
|
l_pts, l_params, &ret_orig);
|
if (res != TEE_SUCCESS) {
|
EMSG("test_mem_access_right: TEE_InvokeTACommand failed\n");
|
goto cleanup_return;
|
}
|
|
cleanup_return:
|
TEE_CloseTASession(sess);
|
return res;
|
}
|
|
static TEE_Result test_time(void)
|
{
|
TEE_Result res = TEE_ERROR_GENERIC;
|
TEE_Time t = { };
|
TEE_Time sys_t = { };
|
static const TEE_Time null_time = { 0, 0 };
|
static const TEE_Time wrap_time = { UINT32_MAX, 999 };
|
|
TEE_GetSystemTime(&sys_t);
|
printf("system time %u.%03u\n", (unsigned int)sys_t.seconds,
|
(unsigned int)sys_t.millis);
|
|
TEE_GetREETime(&t);
|
printf("REE time %u.%03u\n", (unsigned int)t.seconds,
|
(unsigned int)t.millis);
|
|
res = TEE_GetTAPersistentTime(&t);
|
switch (res) {
|
case TEE_SUCCESS:
|
printf("Stored TA time %u.%03u\n", (unsigned int)t.seconds,
|
(unsigned int)t.millis);
|
break;
|
case TEE_ERROR_OVERFLOW:
|
EMSG("Stored TA time overflowed %u.%03u\n",
|
(unsigned int)t.seconds, (unsigned int)t.millis);
|
break;
|
case TEE_ERROR_TIME_NOT_SET:
|
EMSG("TA time not stored\n");
|
break;
|
case TEE_ERROR_TIME_NEEDS_RESET:
|
EMSG("TA time needs reset\n");
|
break;
|
default:
|
return res;
|
}
|
|
res = TEE_SetTAPersistentTime(&null_time);
|
if (res != TEE_SUCCESS) {
|
EMSG("TEE_SetTAPersistentTime: failed\n");
|
return res;
|
}
|
|
res = TEE_GetTAPersistentTime(&t);
|
if (res != TEE_SUCCESS) {
|
EMSG("TEE_GetTAPersistentTime null: failed\n");
|
return res;
|
}
|
printf("TA time %u.%03u\n", (unsigned int)t.seconds,
|
(unsigned int)t.millis);
|
/*
|
* The time between TEE_SetTAPersistentTime() and
|
* TEE_GetTAPersistentTime() should be much less than 1 second, in fact
|
* it's not even a millisecond.
|
*/
|
if (t.seconds > 1 || t.millis >= 1000) {
|
EMSG("Unexpected stored TA time %u.%03u\n",
|
(unsigned int)t.seconds, (unsigned int)t.millis);
|
return TEE_ERROR_BAD_STATE;
|
}
|
|
res = TEE_SetTAPersistentTime(&wrap_time);
|
if (res != TEE_SUCCESS) {
|
EMSG("TEE_SetTAPersistentTime wrap: failed\n");
|
return res;
|
}
|
|
res = TEE_Wait(1000);
|
if (res != TEE_SUCCESS)
|
EMSG("TEE_Wait wrap: failed\n");
|
|
res = TEE_GetTAPersistentTime(&t);
|
if (res != TEE_ERROR_OVERFLOW) {
|
EMSG("TEE_GetTAPersistentTime: failed\n");
|
return TEE_ERROR_BAD_STATE;
|
}
|
printf("TA time %u.%03u\n", (unsigned int)t.seconds,
|
(unsigned int)t.millis);
|
|
if (t.seconds > sys_t.seconds) {
|
EMSG("Unexpected wrapped time %u.%03u (sys_t %u.%03u)\n",
|
(unsigned int)t.seconds, (unsigned int)t.millis,
|
(unsigned int)sys_t.seconds, (unsigned int)sys_t.millis);
|
return TEE_ERROR_BAD_STATE;
|
}
|
|
return TEE_SUCCESS;
|
}
|
|
#ifdef CFG_TA_FLOAT_SUPPORT
|
static bool my_dcmpeq(double v1, double v2, double prec)
|
{
|
return v1 > (v2 - prec) && v1 < (v2 + prec);
|
}
|
|
static bool my_fcmpeq(float v1, float v2, float prec)
|
{
|
return v1 > (v2 - prec) && v1 < (v2 + prec);
|
}
|
|
|
static TEE_Result test_float(void)
|
{
|
#define VAL1 2.6
|
#define VAL1_INT 2
|
#define VAL2 5.3
|
#define DPREC 0.000000000000001
|
#define FPREC 0.000001
|
#define EXPECT(expr) do { \
|
if (!(expr)) { \
|
EMSG("Expression %s failed", #expr); \
|
return TEE_ERROR_GENERIC; \
|
} \
|
} while (0)
|
|
IMSG("Testing floating point operations");
|
|
EXPECT(my_dcmpeq(test_float_dadd(VAL1, VAL2), VAL1 + VAL2, DPREC));
|
EXPECT(my_dcmpeq(test_float_ddiv(VAL1, VAL2), VAL1 / VAL2, DPREC));
|
EXPECT(my_dcmpeq(test_float_dmul(VAL1, VAL2), VAL1 * VAL2, DPREC));
|
EXPECT(my_dcmpeq(test_float_drsub(VAL1, VAL2), VAL2 - VAL1, DPREC));
|
EXPECT(my_dcmpeq(test_float_dsub(VAL1, VAL2), VAL1 - VAL2, DPREC));
|
|
EXPECT(test_float_dcmpeq(VAL1, VAL1) == 1);
|
EXPECT(test_float_dcmplt(VAL1, VAL2) == 1);
|
EXPECT(test_float_dcmple(VAL1, VAL1) == 1);
|
EXPECT(test_float_dcmpge(VAL1, VAL1) == 1);
|
EXPECT(test_float_dcmpgt(VAL2, VAL1) == 1);
|
|
EXPECT(my_fcmpeq(test_float_fadd(VAL1, VAL2), VAL1 + VAL2, FPREC));
|
EXPECT(my_fcmpeq(test_float_fdiv(VAL1, VAL2), VAL1 / VAL2, FPREC));
|
EXPECT(my_fcmpeq(test_float_fmul(VAL1, VAL2), VAL1 * VAL2, FPREC));
|
EXPECT(my_fcmpeq(test_float_frsub(VAL1, VAL2), VAL2 - VAL1, FPREC));
|
EXPECT(my_fcmpeq(test_float_fsub(VAL1, VAL2), VAL1 - VAL2, FPREC));
|
|
EXPECT(test_float_fcmpeq(VAL1, VAL1) == 1);
|
EXPECT(test_float_fcmplt(VAL1, VAL2) == 1);
|
EXPECT(test_float_fcmple(VAL1, VAL1) == 1);
|
EXPECT(test_float_fcmpge(VAL1, VAL1) == 1);
|
EXPECT(test_float_fcmpgt(VAL2, VAL1) == 1);
|
|
EXPECT(test_float_d2iz(VAL1) == VAL1_INT);
|
EXPECT(test_float_d2uiz(VAL1) == VAL1_INT);
|
EXPECT(test_float_d2lz(VAL1) == VAL1_INT);
|
EXPECT(test_float_d2ulz(VAL1) == VAL1_INT);
|
|
EXPECT(test_float_f2iz(VAL1) == VAL1_INT);
|
EXPECT(test_float_f2uiz(VAL1) == VAL1_INT);
|
EXPECT(test_float_f2lz(VAL1) == VAL1_INT);
|
EXPECT(test_float_f2ulz(VAL1) == VAL1_INT);
|
|
EXPECT(my_fcmpeq(test_float_d2f(VAL1), VAL1, FPREC));
|
EXPECT(my_dcmpeq(test_float_f2d(VAL1), VAL1, FPREC));
|
|
EXPECT(my_dcmpeq(test_float_i2d(VAL1_INT), VAL1_INT, DPREC));
|
EXPECT(my_dcmpeq(test_float_ui2d(VAL1_INT), VAL1_INT, DPREC));
|
EXPECT(my_dcmpeq(test_float_l2d(VAL1_INT), VAL1_INT, DPREC));
|
EXPECT(my_dcmpeq(test_float_ul2d(VAL1_INT), VAL1_INT, DPREC));
|
|
EXPECT(my_fcmpeq(test_float_i2f(VAL1_INT), VAL1_INT, FPREC));
|
EXPECT(my_fcmpeq(test_float_ui2f(VAL1_INT), VAL1_INT, FPREC));
|
EXPECT(my_fcmpeq(test_float_l2f(VAL1_INT), VAL1_INT, FPREC));
|
EXPECT(my_fcmpeq(test_float_ul2f(VAL1_INT), VAL1_INT, FPREC));
|
return TEE_SUCCESS;
|
}
|
#else /*CFG_TA_FLOAT_SUPPORT*/
|
static TEE_Result test_float(void)
|
{
|
IMSG("Floating point disabled");
|
return TEE_SUCCESS;
|
}
|
#endif /*CFG_TA_FLOAT_SUPPORT*/
|
|
#if defined(CFG_TA_BGET_TEST)
|
/* From libutils */
|
int bget_main_test(void *(*malloc_func)(size_t), void (*free_func)(void *));
|
|
static void *malloc_wrapper(size_t size)
|
{
|
return tee_map_zi(size, 0);
|
}
|
|
static void free_wrapper(void *ptr __unused)
|
{
|
}
|
|
static TEE_Result test_bget(void)
|
{
|
DMSG("Testing bget");
|
if (bget_main_test(malloc_wrapper, free_wrapper)) {
|
EMSG("bget_main_test failed");
|
return TEE_ERROR_GENERIC;
|
}
|
DMSG("Bget OK");
|
return TEE_SUCCESS;
|
}
|
#else
|
static TEE_Result test_bget(void)
|
{
|
IMSG("Bget test disabled");
|
return TEE_SUCCESS;
|
}
|
#endif
|
|
|
static __noinline __noreturn void call_longjmp(jmp_buf env)
|
{
|
DMSG("Calling longjmp");
|
longjmp(env, 1);
|
EMSG("error: longjmp returned to calling function");
|
}
|
|
static TEE_Result test_setjmp(void)
|
{
|
jmp_buf env = { };
|
|
if (setjmp(env)) {
|
IMSG("Returned via longjmp");
|
return TEE_SUCCESS;
|
} else {
|
call_longjmp(env);
|
return TEE_ERROR_GENERIC;
|
}
|
}
|
|
TEE_Result ta_entry_basic(uint32_t param_types, TEE_Param params[4])
|
{
|
TEE_Result res = TEE_ERROR_GENERIC;
|
|
printf("ta_entry_basic: enter\n");
|
|
res = test_malloc();
|
if (res != TEE_SUCCESS)
|
return res;
|
|
res = test_properties();
|
if (res != TEE_SUCCESS)
|
return res;
|
|
res = test_mem_access_right(param_types, params);
|
if (res != TEE_SUCCESS)
|
return res;
|
|
res = test_time();
|
if (res != TEE_SUCCESS)
|
return res;
|
|
res = test_float();
|
if (res != TEE_SUCCESS)
|
return res;
|
|
res = test_setjmp();
|
if (res != TEE_SUCCESS)
|
return res;
|
|
res = test_bget();
|
if (res != TEE_SUCCESS)
|
return res;
|
|
return TEE_SUCCESS;
|
}
|
|
TEE_Result ta_entry_panic(uint32_t param_types, TEE_Param params[4])
|
{
|
volatile bool mytrue = true;
|
(void)param_types;
|
(void)params;
|
|
printf("ta_entry_panic: enter\n");
|
/*
|
* Somewhat clumsy way of avoiding compile errors if TEE_Panic() has
|
* the __noreturn attribute.
|
*/
|
if (mytrue)
|
TEE_Panic(0xbeef);
|
|
/*
|
* Should not be reached, but if it is the testsuite can detect that
|
* TEE_Panic() returned instead of panicking the TA.
|
*/
|
return TEE_SUCCESS;
|
}
|
|
TEE_Result ta_entry_client_with_timeout(uint32_t param_types,
|
TEE_Param params[4])
|
{
|
static const TEE_UUID os_test_uuid = TA_OS_TEST_UUID;
|
TEE_Result res = TEE_ERROR_GENERIC;
|
TEE_TASessionHandle sess = TEE_HANDLE_NULL;
|
uint32_t ret_orig = 0;
|
|
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_VALUE_INPUT,
|
TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE)) {
|
EMSG("ta_entry_client_with_timeout: bad parameters\n");
|
return TEE_ERROR_BAD_PARAMETERS;
|
}
|
|
res = TEE_OpenTASession(&os_test_uuid, TEE_TIMEOUT_INFINITE, 0, NULL,
|
&sess, &ret_orig);
|
if (res != TEE_SUCCESS) {
|
EMSG(
|
"ta_entry_client_with_timeout: TEE_OpenTASession failed\n");
|
return res;
|
}
|
|
res =
|
TEE_InvokeTACommand(sess, params[0].value.a / 2,
|
TA_OS_TEST_CMD_WAIT, param_types, params,
|
&ret_orig);
|
|
if (ret_orig != TEE_ORIGIN_TRUSTED_APP || res != TEE_ERROR_CANCEL) {
|
EMSG("ta_entry_client_with_timeout: TEE_InvokeTACommand: "
|
"res 0x%x ret_orig 0x%x\n", (unsigned int)res,
|
(unsigned int)ret_orig);
|
res = TEE_ERROR_GENERIC;
|
} else
|
res = TEE_SUCCESS;
|
|
TEE_CloseTASession(sess);
|
return res;
|
|
}
|
|
TEE_Result ta_entry_client(uint32_t param_types, TEE_Param params[4])
|
{
|
static const TEE_UUID crypt_uuid = TA_CRYPT_UUID;
|
TEE_Result res = TEE_ERROR_GENERIC;
|
uint32_t l_pts = 0;
|
TEE_Param l_params[4] = { };
|
TEE_TASessionHandle sess = TEE_HANDLE_NULL;
|
uint32_t ret_orig = 0;
|
static const uint8_t sha256_in[] = { 'a', 'b', 'c' };
|
static const uint8_t sha256_out[] = {
|
0xba, 0x78, 0x16, 0xbf, 0x8f, 0x01, 0xcf, 0xea,
|
0x41, 0x41, 0x40, 0xde, 0x5d, 0xae, 0x22, 0x23,
|
0xb0, 0x03, 0x61, 0xa3, 0x96, 0x17, 0x7a, 0x9c,
|
0xb4, 0x10, 0xff, 0x61, 0xf2, 0x00, 0x15, 0xad
|
};
|
uint8_t out[32] = { 0 };
|
void *in = NULL;
|
|
(void)param_types;
|
(void)params;
|
|
printf("ta_entry_client: enter\n");
|
|
in = TEE_Malloc(sizeof(sha256_in), 0);
|
if (in == NULL)
|
return TEE_ERROR_OUT_OF_MEMORY;
|
TEE_MemMove(in, sha256_in, sizeof(sha256_in));
|
|
res = TEE_OpenTASession(&crypt_uuid, TEE_TIMEOUT_INFINITE, 0, NULL,
|
&sess, &ret_orig);
|
if (res != TEE_SUCCESS) {
|
EMSG("ta_entry_client: TEE_OpenTASession failed\n");
|
goto cleanup_return;
|
}
|
|
l_pts = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT,
|
TEE_PARAM_TYPE_MEMREF_OUTPUT, 0, 0);
|
l_params[0].memref.buffer = in;
|
l_params[0].memref.size = sizeof(sha256_in);
|
l_params[1].memref.buffer = out;
|
l_params[1].memref.size = sizeof(out);
|
|
res = TEE_InvokeTACommand(sess, TEE_TIMEOUT_INFINITE,
|
TA_CRYPT_CMD_SHA256, l_pts, l_params,
|
&ret_orig);
|
if (res != TEE_SUCCESS) {
|
EMSG("ta_entry_client: TEE_InvokeTACommand failed\n");
|
goto cleanup_return;
|
}
|
|
if (TEE_MemCompare(sha256_out, out, sizeof(sha256_out)) != 0) {
|
EMSG("ta_entry_client: out parameter failed\n");
|
res = TEE_ERROR_GENERIC;
|
goto cleanup_return;
|
}
|
|
cleanup_return:
|
TEE_Free(in);
|
TEE_CloseTASession(sess);
|
return res;
|
}
|
|
TEE_Result ta_entry_params_access_rights(uint32_t param_types, TEE_Param params[4])
|
{
|
TEE_Result res = TEE_ERROR_GENERIC;
|
|
if (param_types !=
|
TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT,
|
TEE_PARAM_TYPE_MEMREF_INPUT, 0, 0))
|
return TEE_ERROR_GENERIC;
|
|
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ |
|
TEE_MEMORY_ACCESS_ANY_OWNER,
|
params[0].memref.buffer,
|
params[0].memref.size);
|
if (res != TEE_SUCCESS)
|
return res;
|
|
res = TEE_CheckMemoryAccessRights(TEE_MEMORY_ACCESS_READ,
|
params[0].memref.buffer,
|
params[0].memref.size);
|
if (res != TEE_ERROR_ACCESS_DENIED)
|
return TEE_ERROR_GENERIC;
|
if (params[1].memref.buffer || params[1].memref.size)
|
return TEE_ERROR_BAD_PARAMETERS;
|
|
return TEE_SUCCESS;
|
}
|
|
TEE_Result ta_entry_wait(uint32_t param_types, TEE_Param params[4])
|
{
|
TEE_Result res = TEE_SUCCESS;
|
(void)param_types;
|
|
printf("ta_entry_wait: waiting %d\n", (unsigned int)params[0].value.a);
|
/* Wait */
|
res = TEE_Wait(params[0].value.a);
|
|
return res;
|
}
|
|
static void undef_instr(void)
|
{
|
#if defined(ARM64)
|
__asm__(".word 0x0");
|
#elif defined(ARM32)
|
__asm__(".word 0xe7ffffff");
|
#else
|
#error "Unsupported architecture"
|
#endif
|
}
|
|
TEE_Result ta_entry_bad_mem_access(uint32_t param_types, TEE_Param params[4])
|
{
|
long int stack = 0;
|
long int stack_addr = (long int)&stack;
|
void (*volatile null_fn_ptr)(void) = NULL;
|
|
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_VALUE_INPUT, 0, 0, 0) &&
|
param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_VALUE_INPUT,
|
TEE_PARAM_TYPE_MEMREF_INOUT, 0, 0))
|
return TEE_ERROR_GENERIC;
|
|
switch (params[0].value.a) {
|
case 1:
|
*((volatile uint32_t *)0) = 0;
|
break;
|
case 2:
|
*((uint32_t *)(stack_addr + 0x40000000)) = 0;
|
break;
|
case 3:
|
null_fn_ptr();
|
break;
|
case 4:
|
((void (*)(void))(stack_addr + 0x40000000)) ();
|
break;
|
case 5:
|
undef_instr();
|
break;
|
default:
|
break;
|
}
|
|
return TEE_SUCCESS;
|
}
|
|
static void incr_values(size_t bufsize, uint8_t *a, uint8_t *b, uint8_t *c)
|
{
|
size_t i = 0;
|
|
for (i = 0; i < bufsize; i++) {
|
a[i]++; b[i]++; c[i]++;
|
}
|
}
|
|
#define TA2TA_BUF_SIZE (2 * 1024)
|
TEE_Result ta_entry_ta2ta_memref(uint32_t param_types, TEE_Param params[4])
|
{
|
static const TEE_UUID test_uuid = TA_OS_TEST_UUID;
|
TEE_TASessionHandle sess = TEE_HANDLE_NULL;
|
TEE_Param l_params[4] = { };
|
uint8_t in[TA2TA_BUF_SIZE] = { };
|
uint8_t inout[TA2TA_BUF_SIZE] = { };
|
uint8_t out[TA2TA_BUF_SIZE] = { };
|
TEE_Result res = TEE_ERROR_GENERIC;
|
uint32_t ret_orig = 0;
|
uint32_t l_pts = 0;
|
size_t i = 0;
|
|
(void)params;
|
|
if (param_types != TEE_PARAM_TYPES(0, 0, 0, 0))
|
return TEE_ERROR_GENERIC;
|
|
res = TEE_OpenTASession(&test_uuid, TEE_TIMEOUT_INFINITE, 0, NULL,
|
&sess, &ret_orig);
|
if (res != TEE_SUCCESS) {
|
EMSG("TEE_OpenTASession failed");
|
goto cleanup_return;
|
}
|
|
l_pts = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT,
|
TEE_PARAM_TYPE_MEMREF_INOUT,
|
TEE_PARAM_TYPE_MEMREF_OUTPUT, 0);
|
l_params[0].memref.buffer = in;
|
l_params[0].memref.size = TA2TA_BUF_SIZE;
|
l_params[1].memref.buffer = inout;
|
l_params[1].memref.size = TA2TA_BUF_SIZE;
|
l_params[2].memref.buffer = out;
|
l_params[2].memref.size = TA2TA_BUF_SIZE;
|
|
/* Initialize buffers */
|
for (i = 0; i < TA2TA_BUF_SIZE; i++) {
|
in[i] = 5;
|
inout[i] = 10;
|
out[i] = 0;
|
}
|
|
/*
|
* TA will compute: out = ++inout + in
|
* Expected values after this step: in: 5, inout: 11, out: 16
|
*/
|
res = TEE_InvokeTACommand(sess, TEE_TIMEOUT_INFINITE,
|
TA_OS_TEST_CMD_TA2TA_MEMREF_MIX,
|
l_pts, l_params, &ret_orig);
|
if (res != TEE_SUCCESS) {
|
EMSG("TEE_InvokeTACommand failed");
|
goto cleanup_return;
|
}
|
|
/*
|
* Increment all values by one.
|
* Expected values after this step: in: 6, inout: 12, out: 17
|
*/
|
incr_values(TA2TA_BUF_SIZE, in, inout, out);
|
|
/*
|
* TA will compute: out = ++inout + in
|
* Expected values after this step: in: 6, inout: 13, out: 19
|
*/
|
res = TEE_InvokeTACommand(sess, TEE_TIMEOUT_INFINITE,
|
TA_OS_TEST_CMD_TA2TA_MEMREF_MIX,
|
l_pts, l_params, &ret_orig);
|
if (res != TEE_SUCCESS) {
|
EMSG("TEE_InvokeTACommand failed");
|
goto cleanup_return;
|
}
|
|
/* Check the actual values */
|
for (i = 0; i < TA2TA_BUF_SIZE; i++) {
|
if (in[i] != 6 || inout[i] != 13 || out[i] != 19) {
|
EMSG("Unexpected value in buffer(s)");
|
DHEXDUMP(in, TA2TA_BUF_SIZE);
|
DHEXDUMP(inout, TA2TA_BUF_SIZE);
|
DHEXDUMP(out, TA2TA_BUF_SIZE);
|
return TEE_ERROR_GENERIC;
|
}
|
}
|
|
cleanup_return:
|
TEE_CloseTASession(sess);
|
return res;
|
}
|
|
TEE_Result ta_entry_ta2ta_memref_mix(uint32_t param_types, TEE_Param params[4])
|
{
|
uint8_t *in = NULL;
|
uint8_t *inout = NULL;
|
uint8_t *out = NULL;
|
size_t bufsize = 0;
|
size_t i = 0;
|
|
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT,
|
TEE_PARAM_TYPE_MEMREF_INOUT,
|
TEE_PARAM_TYPE_MEMREF_OUTPUT, 0))
|
return TEE_ERROR_GENERIC;
|
|
bufsize = params[0].memref.size;
|
if (params[1].memref.size != bufsize ||
|
params[2].memref.size != bufsize)
|
return TEE_ERROR_GENERIC;
|
|
in = params[0].memref.buffer;
|
inout = params[1].memref.buffer;
|
out = params[2].memref.buffer;
|
|
for (i = 0; i < bufsize; i++)
|
out[i] = ++inout[i] + in[i];
|
|
return TEE_SUCCESS;
|
}
|
|
TEE_Result ta_entry_params(uint32_t param_types, TEE_Param params[4])
|
{
|
size_t n = 0;
|
|
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT,
|
TEE_PARAM_TYPE_MEMREF_INPUT,
|
TEE_PARAM_TYPE_MEMREF_OUTPUT,
|
TEE_PARAM_TYPE_MEMREF_OUTPUT))
|
return TEE_ERROR_BAD_PARAMETERS;
|
|
for (n = 0; n < TEE_NUM_PARAMS; n++)
|
if (!params[n].memref.buffer || !params[n].memref.size)
|
return TEE_ERROR_BAD_PARAMETERS;
|
|
return TEE_SUCCESS;
|
}
|
|
TEE_Result ta_entry_null_memref(uint32_t param_types, TEE_Param params[4])
|
{
|
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT,
|
TEE_PARAM_TYPE_MEMREF_INPUT,
|
TEE_PARAM_TYPE_MEMREF_OUTPUT,
|
TEE_PARAM_TYPE_MEMREF_OUTPUT))
|
return TEE_ERROR_BAD_PARAMETERS;
|
|
/*
|
* Tests how client can provide null or non-null memref parameters
|
* param[0] expected as a 0 byte input mapped memeref.
|
* param[1] expected as a 0 byte input not-mapped memeref.
|
* param[2] expected as a 0 byte output mapped memeref.
|
* param[3] expected as a 0 byte output not-mapped memeref.
|
*/
|
if (!params[0].memref.buffer || params[0].memref.size ||
|
params[1].memref.buffer || params[1].memref.size ||
|
!params[2].memref.buffer || params[2].memref.size ||
|
params[3].memref.buffer || params[3].memref.size)
|
return TEE_ERROR_BAD_PARAMETERS;
|
|
return TEE_SUCCESS;
|
}
|
|
TEE_Result ta_entry_call_lib(uint32_t param_types,
|
TEE_Param params[4] __unused)
|
{
|
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE))
|
return TEE_ERROR_BAD_PARAMETERS;
|
|
if (os_test_shlib_add(1, 2) != 3)
|
return TEE_ERROR_GENERIC;
|
|
return TEE_SUCCESS;
|
}
|
|
TEE_Result ta_entry_call_lib_panic(uint32_t param_types,
|
TEE_Param params[4] __unused)
|
{
|
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE))
|
return TEE_ERROR_BAD_PARAMETERS;
|
|
os_test_shlib_panic();
|
|
return TEE_ERROR_GENERIC;
|
}
|
|
TEE_Result ta_entry_call_lib_dl(uint32_t param_types __maybe_unused,
|
TEE_Param params[4] __unused)
|
{
|
int (*add_func)(int a, int b) = NULL;
|
TEE_Result res = TEE_ERROR_GENERIC;
|
void *handle = NULL;
|
void *hnull = NULL;
|
|
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE))
|
return TEE_ERROR_BAD_PARAMETERS;
|
|
handle = dlopen("b3091a65-9751-4784-abf7-0298a7cc35ba",
|
RTLD_NOW | RTLD_GLOBAL | RTLD_NODELETE);
|
if (!handle)
|
return TEE_ERROR_GENERIC;
|
|
add_func = dlsym(handle, "os_test_shlib_dl_add");
|
if (!add_func)
|
goto err;
|
if (add_func(3, 4) != 7)
|
goto err;
|
|
hnull = dlopen(NULL, RTLD_NOW | RTLD_GLOBAL | RTLD_NODELETE);
|
if (!hnull)
|
goto err;
|
|
add_func = dlsym(hnull, "os_test_shlib_dl_add");
|
if (!add_func)
|
goto err;
|
if (add_func(5, 6) != 11)
|
goto err;
|
|
res = TEE_SUCCESS;
|
dlclose(hnull);
|
err:
|
dlclose(handle);
|
return res;
|
}
|
|
TEE_Result ta_entry_call_lib_dl_panic(uint32_t param_types __maybe_unused,
|
TEE_Param params[4] __unused)
|
{
|
int (*panic_func)(void) = NULL;
|
void *handle = NULL;
|
TEE_Result res = TEE_ERROR_GENERIC;
|
|
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE))
|
return TEE_ERROR_BAD_PARAMETERS;
|
|
handle = dlopen("b3091a65-9751-4784-abf7-0298a7cc35ba",
|
RTLD_NOW | RTLD_GLOBAL | RTLD_NODELETE);
|
if (!handle)
|
return res;
|
|
panic_func = dlsym(handle, "os_test_shlib_dl_panic");
|
if (!panic_func)
|
goto err;
|
panic_func();
|
return TEE_ERROR_GENERIC;
|
err:
|
dlclose(handle);
|
return res;
|
}
|
|
/* ELF initialization/finalization test */
|
|
volatile int os_test_global;
|
|
static void __attribute__((constructor)) os_test_init(void)
|
{
|
os_test_global *= 10;
|
os_test_global += 1;
|
DMSG("os_test_global=%d", os_test_global);
|
}
|
|
TEE_Result ta_entry_get_global_var(uint32_t param_types, TEE_Param params[4])
|
{
|
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_VALUE_OUTPUT,
|
TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE))
|
return TEE_ERROR_BAD_PARAMETERS;
|
|
params[0].value.a = os_test_global;
|
|
return TEE_SUCCESS;
|
}
|
|
TEE_Result ta_entry_client_identity(uint32_t param_types, TEE_Param params[4])
|
{
|
TEE_Result res = TEE_ERROR_GENERIC;
|
TEE_Identity identity = { };
|
|
if (param_types != TEE_PARAM_TYPES(TEE_PARAM_TYPE_VALUE_OUTPUT,
|
TEE_PARAM_TYPE_MEMREF_OUTPUT,
|
TEE_PARAM_TYPE_NONE,
|
TEE_PARAM_TYPE_NONE))
|
return TEE_ERROR_BAD_PARAMETERS;
|
|
if (params[1].memref.size < sizeof(TEE_UUID)) {
|
params[1].memref.size = sizeof(TEE_UUID);
|
return TEE_ERROR_SHORT_BUFFER;
|
}
|
|
res = TEE_GetPropertyAsIdentity(TEE_PROPSET_CURRENT_CLIENT,
|
"gpd.client.identity", &identity);
|
if (res != TEE_SUCCESS) {
|
EMSG("TEE_GetPropertyAsIdentity: returned %#"PRIx32, res);
|
return res;
|
}
|
|
params[0].value.a = identity.login;
|
memcpy(params[1].memref.buffer, &identity.uuid, sizeof(TEE_UUID));
|
params[1].memref.size = sizeof(TEE_UUID);
|
|
return res;
|
}
|
|
#if defined(WITH_TLS_TESTS)
|
__thread int os_test_tls_a;
|
__thread int os_test_tls_b = 42;
|
|
TEE_Result ta_entry_tls_test_main(void)
|
{
|
if (os_test_tls_a != 0) {
|
EMSG("os_test_tls_a=%d, expected 0", os_test_tls_a);
|
return TEE_ERROR_GENERIC;
|
}
|
if (os_test_tls_b != 42) {
|
EMSG("os_test_tls_b=%d, expected 42", os_test_tls_b);
|
return TEE_ERROR_GENERIC;
|
}
|
|
return TEE_SUCCESS;
|
}
|
|
TEE_Result ta_entry_tls_test_shlib(void)
|
{
|
if (os_test_shlib_tls_a != 0) {
|
EMSG("os_test_shlib_tls_a=%d, expected 0", os_test_shlib_tls_a);
|
return TEE_ERROR_GENERIC;
|
}
|
if (os_test_shlib_tls_b != 123) {
|
EMSG("os_test_shlib_tls_b=%d, expected 123",
|
os_test_shlib_tls_b);
|
return TEE_ERROR_GENERIC;
|
}
|
|
return TEE_SUCCESS;
|
}
|
#else
|
TEE_Result ta_entry_tls_test_main(void)
|
{
|
return TEE_ERROR_NOT_SUPPORTED;
|
}
|
|
TEE_Result ta_entry_tls_test_shlib(void)
|
{
|
return TEE_ERROR_NOT_SUPPORTED;
|
}
|
#endif
|
|
static int iterate_hdr_cb(struct dl_phdr_info *info __maybe_unused,
|
size_t size __unused, void *data)
|
{
|
int *count = data;
|
|
(*count)++;
|
IMSG("ELF module index: %d", *count);
|
IMSG(" dlpi_addr=%p", (void *)info->dlpi_addr);
|
IMSG(" dlpi_name='%s'", info->dlpi_name);
|
IMSG(" dlpi_phdr=%p", (void *)info->dlpi_phdr);
|
IMSG(" dlpi_phnum=%hu", info->dlpi_phnum);
|
IMSG(" dlpi_adds=%llu", info->dlpi_adds);
|
IMSG(" dlpi_subs=%llu", info->dlpi_subs);
|
IMSG(" dlpi_tls_modid=%zu", info->dlpi_tls_modid);
|
IMSG(" dlpi_tls_data=%p", info->dlpi_tls_data);
|
|
return 123;
|
}
|
|
static TEE_Result expect_dl_count_ge(size_t exp_count)
|
{
|
int st = 0;
|
size_t count = 0;
|
|
st = dl_iterate_phdr(iterate_hdr_cb, (void *)&count);
|
if (st != 123) {
|
/*
|
* dl_iterate_phdr() should return the last value returned by
|
* the callback
|
*/
|
EMSG("Expected return value 123, got %d", st);
|
return TEE_ERROR_GENERIC;
|
}
|
if (count < exp_count) {
|
/*
|
* Expect >= and not == since there could be more shared
|
* libraries (for instance, CFG_ULIBS_SHARED=y)
|
*/
|
EMSG("Expected count > %zu, got: %zu", exp_count, count);
|
return TEE_ERROR_GENERIC;
|
}
|
|
return TEE_SUCCESS;
|
}
|
|
TEE_Result ta_entry_dl_phdr(void)
|
{
|
return expect_dl_count_ge(2);
|
}
|
|
TEE_Result ta_entry_dl_phdr_dl(void)
|
{
|
TEE_Result res = TEE_ERROR_GENERIC;
|
void *handle = NULL;
|
|
handle = dlopen("b3091a65-9751-4784-abf7-0298a7cc35ba",
|
RTLD_NOW | RTLD_GLOBAL | RTLD_NODELETE);
|
if (!handle)
|
return TEE_ERROR_GENERIC;
|
|
res = expect_dl_count_ge(3);
|
dlclose(handle);
|
|
return res;
|
}
|