EXPECT_EQ(self->run.user_data, 0);
 }
 
+/*
+ * Sanity check that it is possible to enter either of the two hardcoded TCS
+ */
+TEST_F(enclave, tcs_entry)
+{
+       struct encl_op_header op;
+
+       ASSERT_TRUE(setup_test_encl(ENCL_HEAP_SIZE_DEFAULT, &self->encl, _metadata));
+
+       memset(&self->run, 0, sizeof(self->run));
+       self->run.tcs = self->encl.encl_base;
+
+       op.type = ENCL_OP_NOP;
+
+       EXPECT_EQ(ENCL_CALL(&op, &self->run, true), 0);
+
+       EXPECT_EEXIT(&self->run);
+       EXPECT_EQ(self->run.exception_vector, 0);
+       EXPECT_EQ(self->run.exception_error_code, 0);
+       EXPECT_EQ(self->run.exception_addr, 0);
+
+       /* Move to the next TCS. */
+       self->run.tcs = self->encl.encl_base + PAGE_SIZE;
+
+       EXPECT_EQ(ENCL_CALL(&op, &self->run, true), 0);
+
+       EXPECT_EEXIT(&self->run);
+       EXPECT_EQ(self->run.exception_vector, 0);
+       EXPECT_EQ(self->run.exception_error_code, 0);
+       EXPECT_EQ(self->run.exception_addr, 0);
+}
+
 /*
  * Second page of .data segment is used to test changing PTE permissions.
  * This spans the local encl_buffer within the test enclave.
 
        memcpy(&op->value, (void *)op->addr, 8);
 }
 
+static void do_encl_op_nop(void *_op)
+{
+
+}
+
 void encl_body(void *rdi,  void *rsi)
 {
        const void (*encl_op_array[ENCL_OP_MAX])(void *) = {
                do_encl_op_get_from_buf,
                do_encl_op_put_to_addr,
                do_encl_op_get_from_addr,
+               do_encl_op_nop,
        };
 
        struct encl_op_header *op = (struct encl_op_header *)rdi;