blob: b5ac4136b7dbdd2566613017ef5cc57ee31da084 [file] [log] [blame]
# Copyright (C) 2019 The Android Open Source Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
include trusty/user/app/sample/stats-test/usertests-inc.mk
TRUSTY_USER_TESTS += \
trusty/user/app/sample/hwcryptohal/server/app \
trusty/user/app/sample/app-mgmt-test/client\
trusty/user/app/sample/binder-test/client \
trusty/user/app/sample/binder-test/service \
trusty/user/app/sample/hwcrypto-unittest \
trusty/user/app/sample/hwrng-unittest \
trusty/user/app/sample/hwrng-bench \
trusty/user/app/sample/manifest-test \
trusty/user/app/sample/memref-test \
trusty/user/app/sample/memref-test/lender \
trusty/user/app/sample/memref-test/receiver \
trusty/user/app/sample/timer \
trusty/user/app/sample/spi/swspi-srv \
trusty/user/app/sample/spi/swspi-test \
trusty/user/app/sample/skel_rust \
trusty/user/app/sample/skel2 \
trusty/user/app/sample/rust_no_std \
TRUSTY_RUST_USER_TESTS += \
trusty/user/app/sample/hwcryptohal/server \
trusty/user/app/sample/hwcryptokey-test \
trusty/user/app/sample/memref-test/rust \
trusty/user/app/sample/rust-hello-world \
ifeq (true,$(call TOBOOL,$(USER_SCS_ENABLED)))
TRUSTY_USER_TESTS += \
trusty/user/app/sample/userscs-test/default \
trusty/user/app/sample/userscs-test/custom \
# TODO: We cannot robustly support trusty apps that opt out of shadow call
# stacks until support for library variants is added to the SDK. Blocked on
# https://android-review.googlesource.com/c/trusty/lib/+/1706286
# USER_COVERAGE_ENABLED is set for fuzzing builds and causes apps to be
# instrumented to track coverage. When user shadow call stacks are enabled
# system wide, even apps that opt out are linked against the sanitizer
# coverage runtime that uses shadow call stacks which causes crashes.
ifeq (false,$(call TOBOOL,$(USER_COVERAGE_ENABLED)))
# TODO: This app requires a libc without shadow call stacks which we cannot
# currently provide for the reasons stated in the comment above.
# TRUSTY_USER_TESTS += \
# trusty/user/app/sample/userscs-test/disabled \
endif
endif # USER_SCS_ENABLED
ifneq (,$(findstring arm,$(TRUSTY_USER_ARCH)))
TRUSTY_USER_TESTS += \
trusty/user/app/sample/prebuilts-test \
endif
TRUSTY_LOADABLE_USER_TASKS += \
trusty/user/app/sample/app-mgmt-test/boot-start-srv \
trusty/user/app/sample/app-mgmt-test/dev-only-srv \
trusty/user/app/sample/app-mgmt-test/never-start-srv \
trusty/user/app/sample/app-mgmt-test/port-start-srv \
trusty/user/app/sample/app-mgmt-test/port-start-fail-srv \
trusty/user/app/sample/app-mgmt-test/restart-srv \
trusty/user/app/sample/app-mgmt-test/port-waiter-srv \
trusty/user/app/sample/storage-test \