Home | History | Annotate | Download | only in cmd
      1 // SPDX-License-Identifier: GPL-2.0+
      2 /*
      3  * Copyright (c) 2015 Google, Inc
      4  */
      5 
      6 #include <common.h>
      7 #include <command.h>
      8 #include <environment.h>
      9 #include <tpm-v1.h>
     10 
     11 /* Prints error and returns on failure */
     12 #define TPM_CHECK(tpm_command) do { \
     13 	uint32_t result; \
     14 	\
     15 	result = (tpm_command); \
     16 	if (result != TPM_SUCCESS) { \
     17 		printf("TEST FAILED: line %d: " #tpm_command ": 0x%x\n", \
     18 			__LINE__, result); \
     19 		return result; \
     20 	} \
     21 } while (0)
     22 
     23 #define INDEX0			0xda70
     24 #define INDEX1			0xda71
     25 #define INDEX2			0xda72
     26 #define INDEX3			0xda73
     27 #define INDEX_INITIALISED	0xda80
     28 #define PHYS_PRESENCE		4
     29 #define PRESENCE		8
     30 
     31 static uint32_t TlclStartupIfNeeded(void)
     32 {
     33 	uint32_t result = tpm_startup(TPM_ST_CLEAR);
     34 
     35 	return result == TPM_INVALID_POSTINIT ? TPM_SUCCESS : result;
     36 }
     37 
     38 static int test_timer(void)
     39 {
     40 	printf("get_timer(0) = %lu\n", get_timer(0));
     41 	return 0;
     42 }
     43 
     44 static uint32_t tpm_get_flags(uint8_t *disable, uint8_t *deactivated,
     45 			      uint8_t *nvlocked)
     46 {
     47 	struct tpm_permanent_flags pflags;
     48 	uint32_t result;
     49 
     50 	result = tpm_get_permanent_flags(&pflags);
     51 	if (result)
     52 		return result;
     53 	if (disable)
     54 		*disable = pflags.disable;
     55 	if (deactivated)
     56 		*deactivated = pflags.deactivated;
     57 	if (nvlocked)
     58 		*nvlocked = pflags.nv_locked;
     59 	debug("TPM: Got flags disable=%d, deactivated=%d, nvlocked=%d\n",
     60 	      pflags.disable, pflags.deactivated, pflags.nv_locked);
     61 
     62 	return 0;
     63 }
     64 
     65 static uint32_t tpm_set_global_lock(void)
     66 {
     67 	uint32_t x;
     68 
     69 	debug("TPM: Set global lock\n");
     70 	return tpm_nv_write_value(INDEX0, (uint8_t *)&x, 0);
     71 }
     72 
     73 static uint32_t tpm_nv_write_value_lock(uint32_t index)
     74 {
     75 	debug("TPM: Write lock 0x%x\n", index);
     76 
     77 	return tpm_nv_write_value(index, NULL, 0);
     78 }
     79 
     80 static uint32_t tpm_nv_set_locked(void)
     81 {
     82 	debug("TPM: Set NV locked\n");
     83 
     84 	return tpm_nv_define_space(TPM_NV_INDEX_LOCK, 0, 0);
     85 }
     86 
     87 static int tpm_is_owned(void)
     88 {
     89 	uint8_t response[TPM_PUBEK_SIZE];
     90 	uint32_t result;
     91 
     92 	result = tpm_read_pubek(response, sizeof(response));
     93 
     94 	return result != TPM_SUCCESS;
     95 }
     96 
     97 static int test_early_extend(void)
     98 {
     99 	uint8_t value_in[20];
    100 	uint8_t value_out[20];
    101 
    102 	printf("Testing earlyextend ...");
    103 	tpm_init();
    104 	TPM_CHECK(tpm_startup(TPM_ST_CLEAR));
    105 	TPM_CHECK(tpm_continue_self_test());
    106 	TPM_CHECK(tpm_extend(1, value_in, value_out));
    107 	printf("done\n");
    108 	return 0;
    109 }
    110 
    111 static int test_early_nvram(void)
    112 {
    113 	uint32_t x;
    114 
    115 	printf("Testing earlynvram ...");
    116 	tpm_init();
    117 	TPM_CHECK(tpm_startup(TPM_ST_CLEAR));
    118 	TPM_CHECK(tpm_continue_self_test());
    119 	TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
    120 	TPM_CHECK(tpm_nv_read_value(INDEX0, (uint8_t *)&x, sizeof(x)));
    121 	printf("done\n");
    122 	return 0;
    123 }
    124 
    125 static int test_early_nvram2(void)
    126 {
    127 	uint32_t x;
    128 
    129 	printf("Testing earlynvram2 ...");
    130 	tpm_init();
    131 	TPM_CHECK(tpm_startup(TPM_ST_CLEAR));
    132 	TPM_CHECK(tpm_continue_self_test());
    133 	TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
    134 	TPM_CHECK(tpm_nv_write_value(INDEX0, (uint8_t *)&x, sizeof(x)));
    135 	printf("done\n");
    136 	return 0;
    137 }
    138 
    139 static int test_enable(void)
    140 {
    141 	uint8_t disable = 0, deactivated = 0;
    142 
    143 	printf("Testing enable ...\n");
    144 	tpm_init();
    145 	TPM_CHECK(TlclStartupIfNeeded());
    146 	TPM_CHECK(tpm_self_test_full());
    147 	TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
    148 	TPM_CHECK(tpm_get_flags(&disable, &deactivated, NULL));
    149 	printf("\tdisable is %d, deactivated is %d\n", disable, deactivated);
    150 	TPM_CHECK(tpm_physical_enable());
    151 	TPM_CHECK(tpm_physical_set_deactivated(0));
    152 	TPM_CHECK(tpm_get_flags(&disable, &deactivated, NULL));
    153 	printf("\tdisable is %d, deactivated is %d\n", disable, deactivated);
    154 	if (disable == 1 || deactivated == 1)
    155 		printf("\tfailed to enable or activate\n");
    156 	printf("\tdone\n");
    157 	return 0;
    158 }
    159 
    160 #define reboot() do { \
    161 	printf("\trebooting...\n"); \
    162 	reset_cpu(0); \
    163 } while (0)
    164 
    165 static int test_fast_enable(void)
    166 {
    167 	uint8_t disable = 0, deactivated = 0;
    168 	int i;
    169 
    170 	printf("Testing fastenable ...\n");
    171 	tpm_init();
    172 	TPM_CHECK(TlclStartupIfNeeded());
    173 	TPM_CHECK(tpm_self_test_full());
    174 	TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
    175 	TPM_CHECK(tpm_get_flags(&disable, &deactivated, NULL));
    176 	printf("\tdisable is %d, deactivated is %d\n", disable, deactivated);
    177 	for (i = 0; i < 2; i++) {
    178 		TPM_CHECK(tpm_force_clear());
    179 		TPM_CHECK(tpm_get_flags(&disable, &deactivated, NULL));
    180 		printf("\tdisable is %d, deactivated is %d\n", disable,
    181 		       deactivated);
    182 		assert(disable == 1 && deactivated == 1);
    183 		TPM_CHECK(tpm_physical_enable());
    184 		TPM_CHECK(tpm_physical_set_deactivated(0));
    185 		TPM_CHECK(tpm_get_flags(&disable, &deactivated, NULL));
    186 		printf("\tdisable is %d, deactivated is %d\n", disable,
    187 		       deactivated);
    188 		assert(disable == 0 && deactivated == 0);
    189 	}
    190 	printf("\tdone\n");
    191 	return 0;
    192 }
    193 
    194 static int test_global_lock(void)
    195 {
    196 	uint32_t zero = 0;
    197 	uint32_t result;
    198 	uint32_t x;
    199 
    200 	printf("Testing globallock ...\n");
    201 	tpm_init();
    202 	TPM_CHECK(TlclStartupIfNeeded());
    203 	TPM_CHECK(tpm_self_test_full());
    204 	TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
    205 	TPM_CHECK(tpm_nv_read_value(INDEX0, (uint8_t *)&x, sizeof(x)));
    206 	TPM_CHECK(tpm_nv_write_value(INDEX0, (uint8_t *)&zero,
    207 				     sizeof(uint32_t)));
    208 	TPM_CHECK(tpm_nv_read_value(INDEX1, (uint8_t *)&x, sizeof(x)));
    209 	TPM_CHECK(tpm_nv_write_value(INDEX1, (uint8_t *)&zero,
    210 				     sizeof(uint32_t)));
    211 	TPM_CHECK(tpm_set_global_lock());
    212 	/* Verifies that write to index0 fails */
    213 	x = 1;
    214 	result = tpm_nv_write_value(INDEX0, (uint8_t *)&x, sizeof(x));
    215 	assert(result == TPM_AREA_LOCKED);
    216 	TPM_CHECK(tpm_nv_read_value(INDEX0, (uint8_t *)&x, sizeof(x)));
    217 	assert(x == 0);
    218 	/* Verifies that write to index1 is still possible */
    219 	x = 2;
    220 	TPM_CHECK(tpm_nv_write_value(INDEX1, (uint8_t *)&x, sizeof(x)));
    221 	TPM_CHECK(tpm_nv_read_value(INDEX1, (uint8_t *)&x, sizeof(x)));
    222 	assert(x == 2);
    223 	/* Turns off PP */
    224 	tpm_tsc_physical_presence(PHYS_PRESENCE);
    225 	/* Verifies that write to index1 fails */
    226 	x = 3;
    227 	result = tpm_nv_write_value(INDEX1, (uint8_t *)&x, sizeof(x));
    228 	assert(result == TPM_BAD_PRESENCE);
    229 	TPM_CHECK(tpm_nv_read_value(INDEX1, (uint8_t *)&x, sizeof(x)));
    230 	assert(x == 2);
    231 	printf("\tdone\n");
    232 	return 0;
    233 }
    234 
    235 static int test_lock(void)
    236 {
    237 	printf("Testing lock ...\n");
    238 	tpm_init();
    239 	tpm_startup(TPM_ST_CLEAR);
    240 	tpm_self_test_full();
    241 	tpm_tsc_physical_presence(PRESENCE);
    242 	tpm_nv_write_value_lock(INDEX0);
    243 	printf("\tLocked 0x%x\n", INDEX0);
    244 	printf("\tdone\n");
    245 	return 0;
    246 }
    247 
    248 static void initialise_spaces(void)
    249 {
    250 	uint32_t zero = 0;
    251 	uint32_t perm = TPM_NV_PER_WRITE_STCLEAR | TPM_NV_PER_PPWRITE;
    252 
    253 	printf("\tInitialising spaces\n");
    254 	tpm_nv_set_locked();  /* useful only the first time */
    255 	tpm_nv_define_space(INDEX0, perm, 4);
    256 	tpm_nv_write_value(INDEX0, (uint8_t *)&zero, 4);
    257 	tpm_nv_define_space(INDEX1, perm, 4);
    258 	tpm_nv_write_value(INDEX1, (uint8_t *)&zero, 4);
    259 	tpm_nv_define_space(INDEX2, perm, 4);
    260 	tpm_nv_write_value(INDEX2, (uint8_t *)&zero, 4);
    261 	tpm_nv_define_space(INDEX3, perm, 4);
    262 	tpm_nv_write_value(INDEX3, (uint8_t *)&zero, 4);
    263 	perm = TPM_NV_PER_READ_STCLEAR | TPM_NV_PER_WRITE_STCLEAR |
    264 		TPM_NV_PER_PPWRITE;
    265 	tpm_nv_define_space(INDEX_INITIALISED, perm, 1);
    266 }
    267 
    268 static int test_readonly(void)
    269 {
    270 	uint8_t c;
    271 	uint32_t index_0, index_1, index_2, index_3;
    272 	int read0, read1, read2, read3;
    273 
    274 	printf("Testing readonly ...\n");
    275 	tpm_init();
    276 	tpm_startup(TPM_ST_CLEAR);
    277 	tpm_self_test_full();
    278 	tpm_tsc_physical_presence(PRESENCE);
    279 	/*
    280 	 * Checks if initialisation has completed by trying to read-lock a
    281 	 * space that's created at the end of initialisation
    282 	 */
    283 	if (tpm_nv_read_value(INDEX_INITIALISED, &c, 0) == TPM_BADINDEX) {
    284 		/* The initialisation did not complete */
    285 		initialise_spaces();
    286 	}
    287 
    288 	/* Checks if spaces are OK or messed up */
    289 	read0 = tpm_nv_read_value(INDEX0, (uint8_t *)&index_0, sizeof(index_0));
    290 	read1 = tpm_nv_read_value(INDEX1, (uint8_t *)&index_1, sizeof(index_1));
    291 	read2 = tpm_nv_read_value(INDEX2, (uint8_t *)&index_2, sizeof(index_2));
    292 	read3 = tpm_nv_read_value(INDEX3, (uint8_t *)&index_3, sizeof(index_3));
    293 	if (read0 || read1 || read2 || read3) {
    294 		printf("Invalid contents\n");
    295 		return 0;
    296 	}
    297 
    298 	/*
    299 	 * Writes space, and locks it.  Then attempts to write again.
    300 	 * I really wish I could use the imperative.
    301 	 */
    302 	index_0 += 1;
    303 	if (tpm_nv_write_value(INDEX0, (uint8_t *)&index_0, sizeof(index_0) !=
    304 		TPM_SUCCESS)) {
    305 		pr_err("\tcould not write index 0\n");
    306 	}
    307 	tpm_nv_write_value_lock(INDEX0);
    308 	if (tpm_nv_write_value(INDEX0, (uint8_t *)&index_0, sizeof(index_0)) ==
    309 			TPM_SUCCESS)
    310 		pr_err("\tindex 0 is not locked\n");
    311 
    312 	printf("\tdone\n");
    313 	return 0;
    314 }
    315 
    316 static int test_redefine_unowned(void)
    317 {
    318 	uint32_t perm;
    319 	uint32_t result;
    320 	uint32_t x;
    321 
    322 	printf("Testing redefine_unowned ...");
    323 	tpm_init();
    324 	TPM_CHECK(TlclStartupIfNeeded());
    325 	TPM_CHECK(tpm_self_test_full());
    326 	TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
    327 	assert(!tpm_is_owned());
    328 
    329 	/* Ensures spaces exist. */
    330 	TPM_CHECK(tpm_nv_read_value(INDEX0, (uint8_t *)&x, sizeof(x)));
    331 	TPM_CHECK(tpm_nv_read_value(INDEX1, (uint8_t *)&x, sizeof(x)));
    332 
    333 	/* Redefines spaces a couple of times. */
    334 	perm = TPM_NV_PER_PPWRITE | TPM_NV_PER_GLOBALLOCK;
    335 	TPM_CHECK(tpm_nv_define_space(INDEX0, perm, 2 * sizeof(uint32_t)));
    336 	TPM_CHECK(tpm_nv_define_space(INDEX0, perm, sizeof(uint32_t)));
    337 	perm = TPM_NV_PER_PPWRITE;
    338 	TPM_CHECK(tpm_nv_define_space(INDEX1, perm, 2 * sizeof(uint32_t)));
    339 	TPM_CHECK(tpm_nv_define_space(INDEX1, perm, sizeof(uint32_t)));
    340 
    341 	/* Sets the global lock */
    342 	tpm_set_global_lock();
    343 
    344 	/* Verifies that index0 cannot be redefined */
    345 	result = tpm_nv_define_space(INDEX0, perm, sizeof(uint32_t));
    346 	assert(result == TPM_AREA_LOCKED);
    347 
    348 	/* Checks that index1 can */
    349 	TPM_CHECK(tpm_nv_define_space(INDEX1, perm, 2 * sizeof(uint32_t)));
    350 	TPM_CHECK(tpm_nv_define_space(INDEX1, perm, sizeof(uint32_t)));
    351 
    352 	/* Turns off PP */
    353 	tpm_tsc_physical_presence(PHYS_PRESENCE);
    354 
    355 	/* Verifies that neither index0 nor index1 can be redefined */
    356 	result = tpm_nv_define_space(INDEX0, perm, sizeof(uint32_t));
    357 	assert(result == TPM_BAD_PRESENCE);
    358 	result = tpm_nv_define_space(INDEX1, perm, sizeof(uint32_t));
    359 	assert(result == TPM_BAD_PRESENCE);
    360 
    361 	printf("done\n");
    362 	return 0;
    363 }
    364 
    365 #define PERMPPGL (TPM_NV_PER_PPWRITE | TPM_NV_PER_GLOBALLOCK)
    366 #define PERMPP TPM_NV_PER_PPWRITE
    367 
    368 static int test_space_perm(void)
    369 {
    370 	uint32_t perm;
    371 
    372 	printf("Testing spaceperm ...");
    373 	tpm_init();
    374 	TPM_CHECK(TlclStartupIfNeeded());
    375 	TPM_CHECK(tpm_continue_self_test());
    376 	TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
    377 	TPM_CHECK(tpm_get_permissions(INDEX0, &perm));
    378 	assert((perm & PERMPPGL) == PERMPPGL);
    379 	TPM_CHECK(tpm_get_permissions(INDEX1, &perm));
    380 	assert((perm & PERMPP) == PERMPP);
    381 	printf("done\n");
    382 	return 0;
    383 }
    384 
    385 static int test_startup(void)
    386 {
    387 	uint32_t result;
    388 	printf("Testing startup ...\n");
    389 
    390 	tpm_init();
    391 	result = tpm_startup(TPM_ST_CLEAR);
    392 	if (result != 0 && result != TPM_INVALID_POSTINIT)
    393 		printf("\ttpm startup failed with 0x%x\n", result);
    394 	result = tpm_get_flags(NULL, NULL, NULL);
    395 	if (result != 0)
    396 		printf("\ttpm getflags failed with 0x%x\n", result);
    397 	printf("\texecuting SelfTestFull\n");
    398 	tpm_self_test_full();
    399 	result = tpm_get_flags(NULL, NULL, NULL);
    400 	if (result != 0)
    401 		printf("\ttpm getflags failed with 0x%x\n", result);
    402 	printf("\tdone\n");
    403 	return 0;
    404 }
    405 
    406 /*
    407  * Runs [op] and ensures it returns success and doesn't run longer than
    408  * [time_limit] in milliseconds.
    409  */
    410 #define TTPM_CHECK(op, time_limit) do { \
    411 	ulong start, time; \
    412 	uint32_t __result; \
    413 	\
    414 	start = get_timer(0); \
    415 	__result = op; \
    416 	if (__result != TPM_SUCCESS) { \
    417 		printf("\t" #op ": error 0x%x\n", __result); \
    418 		return -1; \
    419 	} \
    420 	time = get_timer(start); \
    421 	printf("\t" #op ": %lu ms\n", time); \
    422 	if (time > (ulong)time_limit) { \
    423 		printf("\t" #op " exceeded " #time_limit " ms\n"); \
    424 	} \
    425 } while (0)
    426 
    427 
    428 static int test_timing(void)
    429 {
    430 	uint32_t x;
    431 	uint8_t in[20], out[20];
    432 
    433 	printf("Testing timing ...");
    434 	tpm_init();
    435 	TTPM_CHECK(TlclStartupIfNeeded(), 50);
    436 	TTPM_CHECK(tpm_continue_self_test(), 100);
    437 	TTPM_CHECK(tpm_self_test_full(), 1000);
    438 	TTPM_CHECK(tpm_tsc_physical_presence(PRESENCE), 100);
    439 	TTPM_CHECK(tpm_nv_write_value(INDEX0, (uint8_t *)&x, sizeof(x)), 100);
    440 	TTPM_CHECK(tpm_nv_read_value(INDEX0, (uint8_t *)&x, sizeof(x)), 100);
    441 	TTPM_CHECK(tpm_extend(0, in, out), 200);
    442 	TTPM_CHECK(tpm_set_global_lock(), 50);
    443 	TTPM_CHECK(tpm_tsc_physical_presence(PHYS_PRESENCE), 100);
    444 	printf("done\n");
    445 	return 0;
    446 }
    447 
    448 #define TPM_MAX_NV_WRITES_NOOWNER 64
    449 
    450 static int test_write_limit(void)
    451 {
    452 	printf("Testing writelimit ...\n");
    453 	int i;
    454 	uint32_t result;
    455 
    456 	tpm_init();
    457 	TPM_CHECK(TlclStartupIfNeeded());
    458 	TPM_CHECK(tpm_self_test_full());
    459 	TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
    460 	TPM_CHECK(tpm_force_clear());
    461 	TPM_CHECK(tpm_physical_enable());
    462 	TPM_CHECK(tpm_physical_set_deactivated(0));
    463 
    464 	for (i = 0; i < TPM_MAX_NV_WRITES_NOOWNER + 2; i++) {
    465 		printf("\twriting %d\n", i);
    466 		result = tpm_nv_write_value(INDEX0, (uint8_t *)&i, sizeof(i));
    467 		switch (result) {
    468 		case TPM_SUCCESS:
    469 			break;
    470 		case TPM_MAXNVWRITES:
    471 			assert(i >= TPM_MAX_NV_WRITES_NOOWNER);
    472 		default:
    473 			pr_err("\tunexpected error code %d (0x%x)\n",
    474 			      result, result);
    475 		}
    476 	}
    477 
    478 	/* Reset write count */
    479 	TPM_CHECK(tpm_force_clear());
    480 	TPM_CHECK(tpm_physical_enable());
    481 	TPM_CHECK(tpm_physical_set_deactivated(0));
    482 
    483 	/* Try writing again. */
    484 	TPM_CHECK(tpm_nv_write_value(INDEX0, (uint8_t *)&i, sizeof(i)));
    485 	printf("\tdone\n");
    486 	return 0;
    487 }
    488 
    489 #define VOIDTEST(XFUNC) \
    490 	int do_test_##XFUNC(cmd_tbl_t *cmd_tbl, int flag, int argc, \
    491 	char * const argv[]) \
    492 	{ \
    493 		return test_##XFUNC(); \
    494 	}
    495 
    496 #define VOIDENT(XNAME) \
    497 	U_BOOT_CMD_MKENT(XNAME, 0, 1, do_test_##XNAME, "", ""),
    498 
    499 VOIDTEST(early_extend)
    500 VOIDTEST(early_nvram)
    501 VOIDTEST(early_nvram2)
    502 VOIDTEST(enable)
    503 VOIDTEST(fast_enable)
    504 VOIDTEST(global_lock)
    505 VOIDTEST(lock)
    506 VOIDTEST(readonly)
    507 VOIDTEST(redefine_unowned)
    508 VOIDTEST(space_perm)
    509 VOIDTEST(startup)
    510 VOIDTEST(timing)
    511 VOIDTEST(write_limit)
    512 VOIDTEST(timer)
    513 
    514 static cmd_tbl_t cmd_cros_tpm_sub[] = {
    515 	VOIDENT(early_extend)
    516 	VOIDENT(early_nvram)
    517 	VOIDENT(early_nvram2)
    518 	VOIDENT(enable)
    519 	VOIDENT(fast_enable)
    520 	VOIDENT(global_lock)
    521 	VOIDENT(lock)
    522 	VOIDENT(readonly)
    523 	VOIDENT(redefine_unowned)
    524 	VOIDENT(space_perm)
    525 	VOIDENT(startup)
    526 	VOIDENT(timing)
    527 	VOIDENT(write_limit)
    528 	VOIDENT(timer)
    529 };
    530 
    531 static int do_tpmtest(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
    532 {
    533 	cmd_tbl_t *c;
    534 	int i;
    535 
    536 	printf("argc = %d, argv = ", argc);
    537 
    538 	for (i = 0; i < argc; i++)
    539 		printf(" %s", argv[i]);
    540 
    541 	printf("\n------\n");
    542 
    543 	argc--;
    544 	argv++;
    545 	c = find_cmd_tbl(argv[0], cmd_cros_tpm_sub,
    546 			 ARRAY_SIZE(cmd_cros_tpm_sub));
    547 	return c ? c->cmd(cmdtp, flag, argc, argv) : cmd_usage(cmdtp);
    548 }
    549 
    550 U_BOOT_CMD(tpmtest, 2, 1, do_tpmtest, "TPM tests",
    551 	"\n\tearly_extend\n"
    552 	"\tearly_nvram\n"
    553 	"\tearly_nvram2\n"
    554 	"\tenable\n"
    555 	"\tfast_enable\n"
    556 	"\tglobal_lock\n"
    557 	"\tlock\n"
    558 	"\treadonly\n"
    559 	"\tredefine_unowned\n"
    560 	"\tspace_perm\n"
    561 	"\tstartup\n"
    562 	"\ttiming\n"
    563 	"\twrite_limit\n");
    564