1From a7caa35eff3487c0bd777f7df6f5337219b8d9dd Mon Sep 17 00:00:00 2001 2From: Jens Wiklander <jens.wiklander@linaro.org> 3Date: Tue, 7 Jul 2020 11:17:14 +0200 4Subject: [PATCH 09/11] TEE_Internal_API.xml 5 6Disabling cases: 7- Invoke_CheckMemoryAccessRight_BufferRead_AccessWrite_error (a7-35-f1) 8- Invoke_CheckMemoryAccessRight_BufferWrite_AccessRead_error (a7-98-4b) 9As OP-TEE doesn't check the direction of the passed memrefs 10 11Disabling the case: 12- Invoke_GetCancellationFlag_RequestedCancel (a7-71-11 13Because the adaption layer we've implemented cannot deal with threads in 14a good way. 15 16Disabling the case: 17- Invoke_GetPropertyAsBinaryBlock_withoutEnum_success (a7-26-c1) 18Because it assumes base64 coded binary properties and is also 19in the list of excluded conformance tests. 20 21Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> 22--- 23 packages/TrustedCoreFw/xmlstable/TEE_Internal_API.xml | 8 ++++++++ 24 1 file changed, 8 insertions(+) 25 26diff --git a/packages/TrustedCoreFw/xmlstable/TEE_Internal_API.xml b/packages/TrustedCoreFw/xmlstable/TEE_Internal_API.xml 27index f9824238451a..0e96e3bde8e9 100644 28--- a/packages/TrustedCoreFw/xmlstable/TEE_Internal_API.xml 29+++ b/packages/TrustedCoreFw/xmlstable/TEE_Internal_API.xml 30@@ -523,6 +523,7 @@ 31 </call> 32 </postamble> 33 </scenario> 34+<!-- CheckMemoryAccessRight 35 <scenario name="Invoke_CheckMemoryAccessRight_BufferRead_AccessWrite_error (a7-35-f1)" destructive="no"> 36 <req name="CHECK_MEMORY_ACCESS_RIGHTS_ACCESS_DENIED"> 37 <description><![CDATA[The TEE_CheckMemoryAccessRights function causes the Implementation to examine a buffer of memory specified in the parameters buffer and size and to determine whether the current Trusted Application instance has the access rights requested in the arameter accessFlags. If the characteristics of the buffer are compatible with accessFlags, then the function returns TEE_SUCCESS. Otherwise, it returns TEE_ERROR_ACCESS_DENIED.]]></description> 38@@ -697,6 +698,7 @@ 39 </call> 40 </postamble> 41 </scenario> 42+--> 43 <scenario name="Invoke_CheckMemoryAccessRight_BufferShared_AccessAnyOwnerNotSet_error (a7-99-f7)" destructive="no"> 44 <req name="CHECK_MEMORY_ACCESS_RIGHTS_ACCESS_DENIED"> 45 <description><![CDATA[The TEE_CheckMemoryAccessRights function causes the Implementation to examine a buffer of memory specified in the parameters buffer and size and to determine whether the current Trusted Application instance has the access rights requested in the arameter accessFlags. If the characteristics of the buffer are compatible with accessFlags, then the function returns TEE_SUCCESS. Otherwise, it returns TEE_ERROR_ACCESS_DENIED.]]></description> 46@@ -1045,6 +1047,7 @@ 47 </call> 48 </postamble> 49 </scenario> 50+<!-- CheckMemoryAccessRight 51 <scenario name="Invoke_CheckMemoryAccessRight_BufferWrite_AccessRead_error (a7-98-4b)" destructive="no"> 52 <req name="CHECK_MEMORY_ACCESS_RIGHTS_ACCESS_DENIED"> 53 <description><![CDATA[The TEE_CheckMemoryAccessRights function causes the Implementation to examine a buffer of memory specified in the parameters buffer and size and to determine whether the current Trusted Application instance has the access rights requested in the arameter accessFlags. If the characteristics of the buffer are compatible with accessFlags, then the function returns TEE_SUCCESS. Otherwise, it returns TEE_ERROR_ACCESS_DENIED.]]></description> 54@@ -1219,6 +1222,7 @@ 55 </call> 56 </postamble> 57 </scenario> 58+--> 59 <scenario name="Invoke_CheckMemoryAccessRight_BufferWrite_AccessWrite_success (a7-32-44)" destructive="no"> 60 <req name="CHECK_MEMORY_ACCESS_RIGHTS_OK"> 61 <description><![CDATA[The TEE_CheckMemoryAccessRights function causes the Implementation to examine a buffer of memory specified in the parameters buffer and size and to determine whether the current Trusted Application instance has the access rights requested in the arameter accessFlags. If the characteristics of the buffer are compatible with accessFlags, then the function returns TEE_SUCCESS. Otherwise, it returns TEE_ERROR_ACCESS_DENIED.]]></description> 62@@ -2254,6 +2258,7 @@ 63 </call> 64 </postamble> 65 </scenario> 66+<!-- cancellation 67 <scenario name="Invoke_GetCancellationFlag_RequestedCancel (a7-71-11)" destructive="no"> 68 <req name="GET_CANCELLATION_FLAG"> 69 <description><![CDATA[The TEE_GetCancellationFlag function determines whether the current task’s Cancellation Flag is set. If cancellations are masked, this function MUST return false. This function cannot panic.]]></description> 70@@ -2524,6 +2529,7 @@ 71 </call> 72 </postamble> 73 </scenario> 74+--> 75 <scenario name="Invoke_GetInstanceData_noPreviousSetInstance_null (a7-7d-9b)" destructive="no"> 76 <req name="GET_INSTANCE_DATA_SUCCESS"> 77 <description><![CDATA[The TEE_GetInstanceData function retrieves the instance data pointer set by the Trusted Application using the TEE_GetInstanceData function. Return Value: The value returned is the previously set pointer to the Trusted Application instance data, or NULL if no instance data pointer has yet been set.]]></description> 78@@ -3716,6 +3722,7 @@ 79 </call> 80 </postamble> 81 </scenario> 82+<!-- 83 <scenario name="Invoke_GetPropertyAsBinaryBlock_withoutEnum_success (a7-26-c1)" destructive="no"> 84 <req name="CLOSE_SESSION_ENTRY_POINT_SUCCESS"> 85 <description><![CDATA[The Trusted Application implementation is responsible for freeing any resources consumed by the session being closed. Note that the Trusted Application cannot refuse to close a session, but can hold the closing until it returns from TA_CloseSessionEntryPoint. This is why this function cannot return a return code.]]></description> 86@@ -3920,6 +3927,7 @@ 87 </call> 88 </postamble> 89 </scenario> 90+--> 91 <scenario name="Invoke_GetPropertyAsBool_withoutEnum_badFormat_error (a7-63-46)" destructive="no"> 92 <req name="GET_PROPERTY_AS_BOOL_ERROR_BAD_FORMAT"> 93 <description><![CDATA[If the property value cannot be converted to a boolean]]></description> 94-- 952.25.1 96 97