blob: 5fb463259bedc7a9b39e4ed3c9f052b033826f1a [file] [log] [blame]
David Brazdil7a462ec2019-08-15 12:27:47 +01001/*
2 * Copyright 2019 The Hafnium Authors.
3 *
Andrew Walbrane959ec12020-06-17 15:01:09 +01004 * Use of this source code is governed by a BSD-style
5 * license that can be found in the LICENSE file or at
6 * https://opensource.org/licenses/BSD-3-Clause.
David Brazdil7a462ec2019-08-15 12:27:47 +01007 */
8
9#include "hf/manifest.h"
10
J-Alvesd8a1d362023-03-08 11:15:28 +000011#include <stddef.h>
J-Alves77b6f4f2023-03-15 11:34:49 +000012#include <stdint.h>
J-Alvesd8a1d362023-03-08 11:15:28 +000013
J-Alves35315782022-01-25 17:58:32 +000014#include "hf/arch/types.h"
J-Alves77b6f4f2023-03-15 11:34:49 +000015#include "hf/arch/vmid_base.h"
J-Alves35315782022-01-25 17:58:32 +000016
David Brazdil7a462ec2019-08-15 12:27:47 +010017#include "hf/addr.h"
Daniel Boulbya2f8c662021-11-26 17:52:53 +000018#include "hf/assert.h"
J-Alves35315782022-01-25 17:58:32 +000019#include "hf/boot_info.h"
J-Alves77b6f4f2023-03-15 11:34:49 +000020#include "hf/boot_params.h"
David Brazdil7a462ec2019-08-15 12:27:47 +010021#include "hf/check.h"
Andrew Scullae9962e2019-10-03 16:51:16 +010022#include "hf/dlog.h"
J-Alves77b6f4f2023-03-15 11:34:49 +000023#include "hf/fdt.h"
Karl Meakin0e617d92024-04-05 12:55:22 +010024#include "hf/ffa.h"
Daniel Boulby3f295b12023-12-15 17:38:08 +000025#include "hf/layout.h"
J-Alves77b6f4f2023-03-15 11:34:49 +000026#include "hf/mm.h"
27#include "hf/mpool.h"
J-Alves2f86c1e2022-02-23 18:44:19 +000028#include "hf/sp_pkg.h"
David Brazdil7a462ec2019-08-15 12:27:47 +010029#include "hf/static_assert.h"
30#include "hf/std.h"
31
32#define TRY(expr) \
33 do { \
34 enum manifest_return_code ret_code = (expr); \
35 if (ret_code != MANIFEST_SUCCESS) { \
36 return ret_code; \
37 } \
38 } while (0)
39
David Brazdilb856be62020-03-25 10:14:55 +000040#define VM_ID_MAX (HF_VM_ID_OFFSET + MAX_VMS - 1)
41#define VM_ID_MAX_DIGITS (5)
42#define VM_NAME_EXTRA_CHARS (3) /* "vm" + number + '\0' */
43#define VM_NAME_MAX_SIZE (VM_ID_MAX_DIGITS + VM_NAME_EXTRA_CHARS)
44static_assert(VM_NAME_MAX_SIZE <= STRING_MAX_SIZE,
45 "VM name does not fit into a struct string.");
46static_assert(VM_ID_MAX <= 99999, "Insufficient VM_NAME_BUF_SIZE");
Olivier Deprez2a8ee342020-08-03 15:10:44 +020047static_assert((HF_OTHER_WORLD_ID > VM_ID_MAX) ||
48 (HF_OTHER_WORLD_ID < HF_VM_ID_BASE),
Andrew Walbran9daa57e2019-09-27 13:33:20 +010049 "TrustZone VM ID clashes with normal VM range.");
David Brazdil7a462ec2019-08-15 12:27:47 +010050
Kathleen Capella4a2a6e72023-04-21 14:43:26 -040051/* Bitmap to track boot order values in use. */
52#define BOOT_ORDER_ENTRY_BITS (sizeof(uint64_t) * 8)
53#define BOOT_ORDER_MAP_ENTRIES \
54 ((DEFAULT_BOOT_ORDER + (BOOT_ORDER_ENTRY_BITS - 1)) / \
55 BOOT_ORDER_ENTRY_BITS)
56
Daniel Boulby801f8ef2022-06-27 14:21:01 +010057/**
J-Alves596049f2023-03-15 11:40:24 +000058 * A struct to keep track of the partitions properties during early boot
59 * manifest parsing:
60 * - Interrupts ID.
61 * - Physical memory ranges.
Daniel Boulby801f8ef2022-06-27 14:21:01 +010062 */
Olivier Deprez93644652022-09-09 11:01:12 +020063struct manifest_data {
64 struct manifest manifest;
Daniel Boulby4ca50f02022-07-29 18:29:34 +010065 struct interrupt_bitmap intids;
J-Alves596049f2023-03-15 11:40:24 +000066 /*
67 * Allocate enough for the maximum amount of memory regions defined via
68 * the partitions manifest, and regions for each partition
69 * address-space.
70 */
Daniel Boulby4d165722023-11-21 13:46:42 +000071 struct mem_range mem_regions[PARTITION_MAX_MEMORY_REGIONS * MAX_VMS +
72 PARTITION_MAX_DEVICE_REGIONS * MAX_VMS +
73 MAX_VMS];
Daniel Boulby3f295b12023-12-15 17:38:08 +000074 size_t mem_regions_index;
Kathleen Capella4a2a6e72023-04-21 14:43:26 -040075 uint64_t boot_order_values[BOOT_ORDER_MAP_ENTRIES];
Daniel Boulby801f8ef2022-06-27 14:21:01 +010076};
Olivier Deprez93644652022-09-09 11:01:12 +020077
Daniel Boulby801f8ef2022-06-27 14:21:01 +010078/**
Daniel Boulbya7e9e182022-06-27 14:21:01 +010079 * Calculate the number of entries in the ppool that are required to
Olivier Deprez93644652022-09-09 11:01:12 +020080 * store the manifest_data struct.
Daniel Boulby801f8ef2022-06-27 14:21:01 +010081 */
J-Alves596049f2023-03-15 11:40:24 +000082static const size_t manifest_data_ppool_entries =
Olivier Deprez93644652022-09-09 11:01:12 +020083 (align_up(sizeof(struct manifest_data), MM_PPOOL_ENTRY_SIZE) /
Daniel Boulbya7e9e182022-06-27 14:21:01 +010084 MM_PPOOL_ENTRY_SIZE);
85
Olivier Deprez93644652022-09-09 11:01:12 +020086static struct manifest_data *manifest_data;
Daniel Boulby801f8ef2022-06-27 14:21:01 +010087
Kathleen Capella4a2a6e72023-04-21 14:43:26 -040088static bool check_boot_order(uint16_t boot_order)
89{
90 uint16_t i;
91 uint64_t boot_order_mask;
92
93 if (boot_order == DEFAULT_BOOT_ORDER) {
94 return true;
95 }
96 if (boot_order > DEFAULT_BOOT_ORDER) {
97 dlog_error("Boot order should not exceed %x",
98 DEFAULT_BOOT_ORDER);
99 return false;
100 }
101
102 i = boot_order / BOOT_ORDER_ENTRY_BITS;
103 boot_order_mask = 1 << (boot_order % BOOT_ORDER_ENTRY_BITS);
104
105 if ((boot_order_mask & manifest_data->boot_order_values[i]) != 0U) {
106 dlog_error("Boot order must be a unique value.");
107 return false;
108 }
109
110 manifest_data->boot_order_values[i] |= boot_order_mask;
111
112 return true;
113}
114
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100115/**
Olivier Deprez93644652022-09-09 11:01:12 +0200116 * Allocates and clear memory for the manifest data in the given memory pool.
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100117 * Returns true if the memory is successfully allocated.
118 */
Olivier Deprez93644652022-09-09 11:01:12 +0200119static bool manifest_data_init(struct mpool *ppool)
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100120{
Olivier Deprez93644652022-09-09 11:01:12 +0200121 manifest_data = (struct manifest_data *)mpool_alloc_contiguous(
122 ppool, manifest_data_ppool_entries, 1);
J-Alves5c0ae6f2023-06-14 15:20:21 +0100123
124 assert(manifest_data != NULL);
125
Olivier Deprez93644652022-09-09 11:01:12 +0200126 memset_s(manifest_data, sizeof(struct manifest_data), 0,
127 sizeof(struct manifest_data));
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100128
Olivier Deprez93644652022-09-09 11:01:12 +0200129 return manifest_data != NULL;
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100130}
131
132/**
Olivier Deprez93644652022-09-09 11:01:12 +0200133 * Frees the memory used for the manifest data in the given memory pool.
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100134 */
Olivier Deprez93644652022-09-09 11:01:12 +0200135static void manifest_data_deinit(struct mpool *ppool)
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100136{
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100137 /**
Olivier Deprez93644652022-09-09 11:01:12 +0200138 * Clear and return the memory used for the manifest_data struct to the
139 * memory pool.
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100140 */
Olivier Deprez93644652022-09-09 11:01:12 +0200141 memset_s(manifest_data, sizeof(struct manifest_data), 0,
142 sizeof(struct manifest_data));
143 mpool_add_chunk(ppool, manifest_data, manifest_data_ppool_entries);
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100144}
145
J-Alves19e20cf2023-08-02 12:48:55 +0100146static inline size_t count_digits(ffa_id_t vm_id)
David Brazdilb856be62020-03-25 10:14:55 +0000147{
148 size_t digits = 0;
149
150 do {
151 digits++;
152 vm_id /= 10;
153 } while (vm_id);
154 return digits;
155}
156
David Brazdil7a462ec2019-08-15 12:27:47 +0100157/**
158 * Generates a string with the two letters "vm" followed by an integer.
159 * Assumes `buf` is of size VM_NAME_BUF_SIZE.
160 */
J-Alves19e20cf2023-08-02 12:48:55 +0100161static void generate_vm_node_name(struct string *str, ffa_id_t vm_id)
David Brazdil7a462ec2019-08-15 12:27:47 +0100162{
163 static const char *digits = "0123456789";
David Brazdilb856be62020-03-25 10:14:55 +0000164 size_t vm_id_digits = count_digits(vm_id);
165 char *base = str->data;
166 char *ptr = base + (VM_NAME_EXTRA_CHARS + vm_id_digits);
David Brazdil7a462ec2019-08-15 12:27:47 +0100167
Daniel Boulbya2f8c662021-11-26 17:52:53 +0000168 assert(vm_id_digits <= VM_ID_MAX_DIGITS);
David Brazdil7a462ec2019-08-15 12:27:47 +0100169 *(--ptr) = '\0';
170 do {
171 *(--ptr) = digits[vm_id % 10];
172 vm_id /= 10;
173 } while (vm_id);
174 *(--ptr) = 'm';
175 *(--ptr) = 'v';
Daniel Boulbya2f8c662021-11-26 17:52:53 +0000176 assert(ptr == base);
David Brazdil7a462ec2019-08-15 12:27:47 +0100177}
178
Andrew Scullae9962e2019-10-03 16:51:16 +0100179/**
Andrew Scullb2c3a242019-11-04 13:52:36 +0000180 * Read a boolean property: true if present; false if not. If present, the value
181 * of the property must be empty else it is considered malformed.
Andrew Scullae9962e2019-10-03 16:51:16 +0100182 */
Andrew Scullb2c3a242019-11-04 13:52:36 +0000183static enum manifest_return_code read_bool(const struct fdt_node *node,
184 const char *property, bool *out)
Andrew Scullae9962e2019-10-03 16:51:16 +0100185{
David Brazdilb856be62020-03-25 10:14:55 +0000186 struct memiter data;
187 bool present = fdt_read_property(node, property, &data);
Andrew Scullae9962e2019-10-03 16:51:16 +0100188
David Brazdilb856be62020-03-25 10:14:55 +0000189 if (present && memiter_size(&data) != 0) {
Andrew Scullb2c3a242019-11-04 13:52:36 +0000190 return MANIFEST_ERROR_MALFORMED_BOOLEAN;
191 }
192
193 *out = present;
194 return MANIFEST_SUCCESS;
Andrew Scullae9962e2019-10-03 16:51:16 +0100195}
196
Andrew Scull72b43c02019-09-18 13:53:45 +0100197static enum manifest_return_code read_string(const struct fdt_node *node,
David Brazdil136f2942019-09-23 14:11:03 +0100198 const char *property,
199 struct string *out)
Andrew Scull72b43c02019-09-18 13:53:45 +0100200{
David Brazdilb856be62020-03-25 10:14:55 +0000201 struct memiter data;
Andrew Scull72b43c02019-09-18 13:53:45 +0100202
David Brazdilb856be62020-03-25 10:14:55 +0000203 if (!fdt_read_property(node, property, &data)) {
Andrew Scull72b43c02019-09-18 13:53:45 +0100204 return MANIFEST_ERROR_PROPERTY_NOT_FOUND;
205 }
206
David Brazdilb856be62020-03-25 10:14:55 +0000207 switch (string_init(out, &data)) {
David Brazdil136f2942019-09-23 14:11:03 +0100208 case STRING_SUCCESS:
209 return MANIFEST_SUCCESS;
210 case STRING_ERROR_INVALID_INPUT:
211 return MANIFEST_ERROR_MALFORMED_STRING;
212 case STRING_ERROR_TOO_LONG:
213 return MANIFEST_ERROR_STRING_TOO_LONG;
214 }
Andrew Scull72b43c02019-09-18 13:53:45 +0100215}
216
217static enum manifest_return_code read_optional_string(
David Brazdil136f2942019-09-23 14:11:03 +0100218 const struct fdt_node *node, const char *property, struct string *out)
Andrew Scull72b43c02019-09-18 13:53:45 +0100219{
David Brazdil136f2942019-09-23 14:11:03 +0100220 enum manifest_return_code ret;
Andrew Scull72b43c02019-09-18 13:53:45 +0100221
David Brazdil136f2942019-09-23 14:11:03 +0100222 ret = read_string(node, property, out);
223 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
224 string_init_empty(out);
225 ret = MANIFEST_SUCCESS;
Andrew Scull72b43c02019-09-18 13:53:45 +0100226 }
David Brazdil136f2942019-09-23 14:11:03 +0100227 return ret;
Andrew Scull72b43c02019-09-18 13:53:45 +0100228}
229
David Brazdil7a462ec2019-08-15 12:27:47 +0100230static enum manifest_return_code read_uint64(const struct fdt_node *node,
231 const char *property,
232 uint64_t *out)
233{
David Brazdilb856be62020-03-25 10:14:55 +0000234 struct memiter data;
David Brazdil7a462ec2019-08-15 12:27:47 +0100235
David Brazdilb856be62020-03-25 10:14:55 +0000236 if (!fdt_read_property(node, property, &data)) {
David Brazdil7a462ec2019-08-15 12:27:47 +0100237 return MANIFEST_ERROR_PROPERTY_NOT_FOUND;
238 }
239
David Brazdilb856be62020-03-25 10:14:55 +0000240 if (!fdt_parse_number(&data, memiter_size(&data), out)) {
David Brazdil7a462ec2019-08-15 12:27:47 +0100241 return MANIFEST_ERROR_MALFORMED_INTEGER;
242 }
243
244 return MANIFEST_SUCCESS;
245}
246
David Brazdil080ee312020-02-25 15:30:30 -0800247static enum manifest_return_code read_optional_uint64(
248 const struct fdt_node *node, const char *property,
249 uint64_t default_value, uint64_t *out)
250{
251 enum manifest_return_code ret;
252
253 ret = read_uint64(node, property, out);
254 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
255 *out = default_value;
256 return MANIFEST_SUCCESS;
257 }
258 return ret;
259}
260
Olivier Deprez62d99e32020-01-09 15:58:07 +0100261static enum manifest_return_code read_uint32(const struct fdt_node *node,
262 const char *property,
263 uint32_t *out)
264{
265 uint64_t value;
266
267 TRY(read_uint64(node, property, &value));
268
269 if (value > UINT32_MAX) {
270 return MANIFEST_ERROR_INTEGER_OVERFLOW;
271 }
272
273 *out = (uint32_t)value;
274 return MANIFEST_SUCCESS;
275}
276
Manish Pandeye68e7932020-04-23 15:29:28 +0100277static enum manifest_return_code read_optional_uint32(
278 const struct fdt_node *node, const char *property,
279 uint32_t default_value, uint32_t *out)
280{
281 enum manifest_return_code ret;
282
283 ret = read_uint32(node, property, out);
284 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
285 *out = default_value;
286 return MANIFEST_SUCCESS;
287 }
288 return ret;
289}
290
David Brazdil7a462ec2019-08-15 12:27:47 +0100291static enum manifest_return_code read_uint16(const struct fdt_node *node,
292 const char *property,
293 uint16_t *out)
294{
295 uint64_t value;
296
297 TRY(read_uint64(node, property, &value));
David Brazdil7a462ec2019-08-15 12:27:47 +0100298 if (value > UINT16_MAX) {
299 return MANIFEST_ERROR_INTEGER_OVERFLOW;
300 }
301
302 *out = (uint16_t)value;
303 return MANIFEST_SUCCESS;
304}
305
J-Alvesb37fd082020-10-22 12:29:21 +0100306static enum manifest_return_code read_optional_uint16(
307 const struct fdt_node *node, const char *property,
308 uint16_t default_value, uint16_t *out)
309{
310 enum manifest_return_code ret;
311
312 ret = read_uint16(node, property, out);
313 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
314 *out = default_value;
315 return MANIFEST_SUCCESS;
316 }
317
Kathleen Capella4a2a6e72023-04-21 14:43:26 -0400318 return ret;
J-Alvesb37fd082020-10-22 12:29:21 +0100319}
320
Olivier Deprez62d99e32020-01-09 15:58:07 +0100321static enum manifest_return_code read_uint8(const struct fdt_node *node,
322 const char *property, uint8_t *out)
323{
324 uint64_t value;
325
326 TRY(read_uint64(node, property, &value));
327
328 if (value > UINT8_MAX) {
329 return MANIFEST_ERROR_INTEGER_OVERFLOW;
330 }
331
332 *out = (uint8_t)value;
333 return MANIFEST_SUCCESS;
334}
335
J-Alves4369bd92020-08-07 16:35:36 +0100336static enum manifest_return_code read_optional_uint8(
337 const struct fdt_node *node, const char *property,
338 uint8_t default_value, uint8_t *out)
339{
340 enum manifest_return_code ret;
341
342 ret = read_uint8(node, property, out);
343 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
344 *out = default_value;
345 return MANIFEST_SUCCESS;
346 }
347
348 return MANIFEST_SUCCESS;
349}
350
Andrew Scullae9962e2019-10-03 16:51:16 +0100351struct uint32list_iter {
352 struct memiter mem_it;
353};
354
J-Alves4369bd92020-08-07 16:35:36 +0100355static enum manifest_return_code read_uint32list(const struct fdt_node *node,
356 const char *property,
357 struct uint32list_iter *out)
Andrew Scullae9962e2019-10-03 16:51:16 +0100358{
David Brazdilb856be62020-03-25 10:14:55 +0000359 struct memiter data;
Andrew Scullae9962e2019-10-03 16:51:16 +0100360
David Brazdilb856be62020-03-25 10:14:55 +0000361 if (!fdt_read_property(node, property, &data)) {
Andrew Scullae9962e2019-10-03 16:51:16 +0100362 memiter_init(&out->mem_it, NULL, 0);
J-Alves4369bd92020-08-07 16:35:36 +0100363 return MANIFEST_ERROR_PROPERTY_NOT_FOUND;
Andrew Scullae9962e2019-10-03 16:51:16 +0100364 }
365
David Brazdilb856be62020-03-25 10:14:55 +0000366 if ((memiter_size(&data) % sizeof(uint32_t)) != 0) {
Andrew Scullae9962e2019-10-03 16:51:16 +0100367 return MANIFEST_ERROR_MALFORMED_INTEGER_LIST;
368 }
369
David Brazdilb856be62020-03-25 10:14:55 +0000370 out->mem_it = data;
Andrew Scullae9962e2019-10-03 16:51:16 +0100371 return MANIFEST_SUCCESS;
372}
373
J-Alves4369bd92020-08-07 16:35:36 +0100374static enum manifest_return_code read_optional_uint32list(
375 const struct fdt_node *node, const char *property,
376 struct uint32list_iter *out)
377{
378 enum manifest_return_code ret = read_uint32list(node, property, out);
379
380 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
381 return MANIFEST_SUCCESS;
382 }
383 return ret;
384}
385
Andrew Scullae9962e2019-10-03 16:51:16 +0100386static bool uint32list_has_next(const struct uint32list_iter *list)
387{
388 return memiter_size(&list->mem_it) > 0;
389}
390
David Brazdil5ea99462020-03-25 13:01:47 +0000391static enum manifest_return_code uint32list_get_next(
392 struct uint32list_iter *list, uint32_t *out)
Andrew Scullae9962e2019-10-03 16:51:16 +0100393{
Andrew Scullae9962e2019-10-03 16:51:16 +0100394 uint64_t num;
395
396 CHECK(uint32list_has_next(list));
David Brazdilb856be62020-03-25 10:14:55 +0000397 if (!fdt_parse_number(&list->mem_it, sizeof(uint32_t), &num)) {
Andrew Scullae9962e2019-10-03 16:51:16 +0100398 return MANIFEST_ERROR_MALFORMED_INTEGER;
399 }
400
David Brazdil5ea99462020-03-25 13:01:47 +0000401 *out = (uint32_t)num;
402 return MANIFEST_SUCCESS;
Andrew Scullae9962e2019-10-03 16:51:16 +0100403}
404
Karl Meakin60532972024-08-02 16:11:21 +0100405/**
406 * Parse a UUID from `uuid` into `out`.
407 * Returns `MANIFEST_SUCCESS` if parsing succeeded.
408 */
409static enum manifest_return_code parse_uuid(struct uint32list_iter *uuid,
410 struct ffa_uuid *out)
411{
412 for (size_t i = 0; i < 4 && uint32list_has_next(uuid); i++) {
413 TRY(uint32list_get_next(uuid, &out->uuid[i]));
414 }
415
416 return MANIFEST_SUCCESS;
417}
418
419/**
420 * Parse a list of UUIDs from `uuid` into `out`.
421 * Writes the number of UUIDs parsed to `len`.
422 * Returns `MANIFEST_SUCCESS` if parsing succeeded.
423 * Returns `MANIFEST_ERROR_UUID_ALL_ZEROS` if any of the UUIDs are all zeros.
424 * Returns `MANIFEEST_ERROR_TOO_MANY_UUIDS` if there are more than
425 * `PARTITION_MAX_UUIDS`
426 */
427static enum manifest_return_code parse_uuid_list(struct uint32list_iter *uuid,
428 struct ffa_uuid *out,
429 uint16_t *len)
430{
431 uint16_t j;
432
Karl Meakin45abeeb2024-08-02 16:55:44 +0100433 for (j = 0; uint32list_has_next(uuid); j++) {
Karl Meakin60532972024-08-02 16:11:21 +0100434 TRY(parse_uuid(uuid, &out[j]));
435
436 if (ffa_uuid_is_null(&out[j])) {
437 return MANIFEST_ERROR_UUID_ALL_ZEROS;
438 }
439 dlog_verbose(" UUID %#x-%x-%x-%x\n", out[j].uuid[0],
440 out[j].uuid[1], out[j].uuid[2], out[j].uuid[3]);
Karl Meakin45abeeb2024-08-02 16:55:44 +0100441
442 if (j >= PARTITION_MAX_UUIDS) {
443 return MANIFEST_ERROR_TOO_MANY_UUIDS;
444 }
Karl Meakin60532972024-08-02 16:11:21 +0100445 }
446
447 *len = j;
448 return MANIFEST_SUCCESS;
449}
450
Olivier Deprez62d99e32020-01-09 15:58:07 +0100451static enum manifest_return_code parse_vm_common(const struct fdt_node *node,
452 struct manifest_vm *vm,
J-Alves19e20cf2023-08-02 12:48:55 +0100453 ffa_id_t vm_id)
David Brazdil7a462ec2019-08-15 12:27:47 +0100454{
Andrew Scullae9962e2019-10-03 16:51:16 +0100455 struct uint32list_iter smcs;
David Brazdil5ea99462020-03-25 13:01:47 +0000456 size_t idx;
Andrew Scullae9962e2019-10-03 16:51:16 +0100457
Olivier Deprez62d99e32020-01-09 15:58:07 +0100458 TRY(read_bool(node, "is_ffa_partition", &vm->is_ffa_partition));
459
Raghu Krishnamurthyb49549e2021-07-02 08:27:38 -0700460 TRY(read_bool(node, "hyp_loaded", &vm->is_hyp_loaded));
461
David Brazdil136f2942019-09-23 14:11:03 +0100462 TRY(read_string(node, "debug_name", &vm->debug_name));
Andrew Scullae9962e2019-10-03 16:51:16 +0100463
464 TRY(read_optional_uint32list(node, "smc_whitelist", &smcs));
465 while (uint32list_has_next(&smcs) &&
466 vm->smc_whitelist.smc_count < MAX_SMCS) {
David Brazdil5ea99462020-03-25 13:01:47 +0000467 idx = vm->smc_whitelist.smc_count++;
468 TRY(uint32list_get_next(&smcs, &vm->smc_whitelist.smcs[idx]));
Andrew Scullae9962e2019-10-03 16:51:16 +0100469 }
470
471 if (uint32list_has_next(&smcs)) {
Karl Meakine8937d92024-03-19 16:04:25 +0000472 dlog_warning("%s SMC whitelist too long.\n",
473 vm->debug_name.data);
Andrew Scullae9962e2019-10-03 16:51:16 +0100474 }
475
Andrew Scullb2c3a242019-11-04 13:52:36 +0000476 TRY(read_bool(node, "smc_whitelist_permissive",
477 &vm->smc_whitelist.permissive));
Andrew Scullae9962e2019-10-03 16:51:16 +0100478
Olivier Deprez62d99e32020-01-09 15:58:07 +0100479 if (vm_id != HF_PRIMARY_VM_ID) {
480 TRY(read_uint64(node, "mem_size", &vm->secondary.mem_size));
481 TRY(read_uint16(node, "vcpu_count", &vm->secondary.vcpu_count));
Fuad Tabba50469e02020-06-30 15:14:28 +0100482 TRY(read_optional_string(node, "fdt_filename",
483 &vm->secondary.fdt_filename));
Olivier Deprez62d99e32020-01-09 15:58:07 +0100484 }
485
486 return MANIFEST_SUCCESS;
487}
488
489static enum manifest_return_code parse_vm(struct fdt_node *node,
490 struct manifest_vm *vm,
J-Alves19e20cf2023-08-02 12:48:55 +0100491 ffa_id_t vm_id)
Olivier Deprez62d99e32020-01-09 15:58:07 +0100492{
493 TRY(read_optional_string(node, "kernel_filename",
494 &vm->kernel_filename));
495
David Brazdile6f83222019-09-23 14:47:37 +0100496 if (vm_id == HF_PRIMARY_VM_ID) {
497 TRY(read_optional_string(node, "ramdisk_filename",
498 &vm->primary.ramdisk_filename));
David Brazdil080ee312020-02-25 15:30:30 -0800499 TRY(read_optional_uint64(node, "boot_address",
500 MANIFEST_INVALID_ADDRESS,
501 &vm->primary.boot_address));
David Brazdil7a462ec2019-08-15 12:27:47 +0100502 }
Raghu Krishnamurthy988a5e72021-02-27 21:46:06 -0800503 TRY(read_optional_uint8(node, "exception-level", (uint8_t)EL1,
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -0700504 (uint8_t *)&vm->partition.run_time_el));
Olivier Deprez62d99e32020-01-09 15:58:07 +0100505
David Brazdil7a462ec2019-08-15 12:27:47 +0100506 return MANIFEST_SUCCESS;
507}
508
J-Alves77b6f4f2023-03-15 11:34:49 +0000509static bool is_memory_region_within_ranges(uintptr_t base_address,
510 uint32_t page_count,
511 const struct mem_range *ranges,
512 const size_t ranges_size)
513{
514 uintptr_t region_end =
515 base_address + ((uintptr_t)page_count * PAGE_SIZE - 1);
516
517 for (size_t i = 0; i < ranges_size; i++) {
518 uintptr_t base = (uintptr_t)pa_addr(ranges[i].begin);
519 uintptr_t end = (uintptr_t)pa_addr(ranges[i].end);
520
521 if ((base_address >= base && base_address <= end) ||
522 (region_end >= base && region_end <= end)) {
523 return true;
524 }
525 }
526
527 return false;
528}
529
530void dump_memory_ranges(const struct mem_range *ranges,
531 const size_t ranges_size, bool ns)
532{
533 if (LOG_LEVEL < LOG_LEVEL_VERBOSE) {
534 return;
535 }
536
537 dlog("%s Memory ranges:\n", ns ? "NS" : "S");
538
539 for (size_t i = 0; i < ranges_size; i++) {
540 uintptr_t begin = pa_addr(ranges[i].begin);
541 uintptr_t end = pa_addr(ranges[i].end);
542 size_t page_count =
543 align_up(pa_difference(ranges[i].begin, ranges[i].end),
544 PAGE_SIZE) /
545 PAGE_SIZE;
546
Karl Meakine8937d92024-03-19 16:04:25 +0000547 dlog(" [%lx - %lx (%zu pages)]\n", begin, end, page_count);
J-Alves77b6f4f2023-03-15 11:34:49 +0000548 }
549}
550
551/**
552 * Check the partition's assigned memory is contained in the memory ranges
553 * configured for the SWd, in the SPMC's manifest.
554 */
555static enum manifest_return_code check_partition_memory_is_valid(
556 uintptr_t base_address, uint32_t page_count, uint32_t attributes,
Olivier Deprez058ddee2024-08-27 09:22:11 +0200557 const struct boot_params *params, bool is_device_region)
J-Alves77b6f4f2023-03-15 11:34:49 +0000558{
559 bool is_secure_region =
560 (attributes & MANIFEST_REGION_ATTR_SECURITY) == 0U;
Daniel Boulby4339edc2024-02-21 14:59:00 +0000561 const struct mem_range *ranges_from_manifest;
562 size_t ranges_count;
563 bool within_ranges;
564 enum manifest_return_code error_return;
565
566 if (!is_device_region) {
567 ranges_from_manifest = is_secure_region ? params->mem_ranges
568 : params->ns_mem_ranges;
569 ranges_count = is_secure_region ? params->mem_ranges_count
570 : params->ns_mem_ranges_count;
571 error_return = MANIFEST_ERROR_MEM_REGION_INVALID;
572 } else {
573 ranges_from_manifest = is_secure_region
574 ? params->device_mem_ranges
575 : params->ns_device_mem_ranges;
576 ranges_count = is_secure_region
577 ? params->device_mem_ranges_count
578 : params->ns_device_mem_ranges_count;
579 error_return = MANIFEST_ERROR_DEVICE_MEM_REGION_INVALID;
580 }
581
582 within_ranges = is_memory_region_within_ranges(
J-Alves77b6f4f2023-03-15 11:34:49 +0000583 base_address, page_count, ranges_from_manifest, ranges_count);
584
Daniel Boulby4339edc2024-02-21 14:59:00 +0000585 return within_ranges ? MANIFEST_SUCCESS : error_return;
J-Alves77b6f4f2023-03-15 11:34:49 +0000586}
587
588/*
589 * Keep track of the memory allocated by partitions. This includes memory region
Daniel Boulby4d165722023-11-21 13:46:42 +0000590 * nodes and device region nodes defined in their respective partition
591 * manifests, as well address space defined from their load address.
J-Alves77b6f4f2023-03-15 11:34:49 +0000592 */
593static enum manifest_return_code check_and_record_memory_used(
Daniel Boulby3f295b12023-12-15 17:38:08 +0000594 uintptr_t base_address, uint32_t page_count,
595 struct mem_range *mem_ranges, size_t *mem_regions_index)
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100596{
J-Alves77b6f4f2023-03-15 11:34:49 +0000597 bool overlap_of_regions;
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100598
Varun Wadekar4afbfd72022-10-13 14:30:18 +0100599 if (page_count == 0U) {
600 dlog_error(
Karl Meakine8937d92024-03-19 16:04:25 +0000601 "Empty memory region defined with base address: "
602 "%#lx.\n",
Varun Wadekar4afbfd72022-10-13 14:30:18 +0100603 base_address);
604 return MANIFEST_ERROR_MEM_REGION_EMPTY;
605 }
606
Daniel Boulbyc1a613d2022-10-18 11:26:17 +0100607 if (!is_aligned(base_address, PAGE_SIZE)) {
Karl Meakine8937d92024-03-19 16:04:25 +0000608 dlog_error("base_address (%#lx) is not aligned to page size.\n",
Daniel Boulbyc1a613d2022-10-18 11:26:17 +0100609 base_address);
610 return MANIFEST_ERROR_MEM_REGION_UNALIGNED;
611 }
612
J-Alves77b6f4f2023-03-15 11:34:49 +0000613 overlap_of_regions = is_memory_region_within_ranges(
Daniel Boulby3f295b12023-12-15 17:38:08 +0000614 base_address, page_count, mem_ranges, *mem_regions_index);
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100615
J-Alves77b6f4f2023-03-15 11:34:49 +0000616 if (!overlap_of_regions) {
617 paddr_t begin = pa_init(base_address);
618
Daniel Boulby3f295b12023-12-15 17:38:08 +0000619 mem_ranges[*mem_regions_index].begin = begin;
620 mem_ranges[*mem_regions_index].end =
J-Alves77b6f4f2023-03-15 11:34:49 +0000621 pa_add(begin, page_count * PAGE_SIZE - 1);
Daniel Boulby3f295b12023-12-15 17:38:08 +0000622 (*mem_regions_index)++;
J-Alves77b6f4f2023-03-15 11:34:49 +0000623
624 return MANIFEST_SUCCESS;
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100625 }
626
J-Alves77b6f4f2023-03-15 11:34:49 +0000627 return MANIFEST_ERROR_MEM_REGION_OVERLAP;
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100628}
629
Madhukar Pappireddy718afa92024-06-20 16:48:49 -0500630static enum manifest_return_code parse_common_fields_mem_dev_region_node(
631 struct fdt_node *ffa_node, struct dma_device_properties *dma_prop)
632{
633 uint32_t j = 0;
634 struct uint32list_iter list;
635
636 TRY(read_optional_uint32(ffa_node, "smmu-id", MANIFEST_INVALID_ID,
637 &dma_prop->smmu_id));
638 if (dma_prop->smmu_id != MANIFEST_INVALID_ID) {
639 dlog_verbose(" smmu-id: %u\n", dma_prop->smmu_id);
640 }
641
642 TRY(read_optional_uint32list(ffa_node, "stream-ids", &list));
643 dlog_verbose(" Stream IDs assigned:\n");
644
645 j = 0;
646 while (uint32list_has_next(&list)) {
647 if (j == PARTITION_MAX_STREAMS_PER_DEVICE) {
648 return MANIFEST_ERROR_STREAM_IDS_OVERFLOW;
649 }
650
651 TRY(uint32list_get_next(&list, &dma_prop->stream_ids[j]));
652 dlog_verbose(" %u\n", dma_prop->stream_ids[j]);
653 j++;
654 }
655 if (j == 0) {
656 dlog_verbose(" None\n");
657 } else if (dma_prop->smmu_id == MANIFEST_INVALID_ID) {
658 /*
659 * SMMU ID must be specified if the partition specifies
660 * Stream IDs for any device upstream of SMMU.
661 */
662 return MANIFEST_ERROR_MISSING_SMMU_ID;
663 }
664 dma_prop->stream_count = j;
665
666 return MANIFEST_SUCCESS;
667}
668
Manish Pandey6542f5c2020-04-27 14:37:46 +0100669static enum manifest_return_code parse_ffa_memory_region_node(
Karl Meakinf6d49402023-04-04 18:14:26 +0100670 struct fdt_node *mem_node, uintptr_t load_address,
671 struct memory_region *mem_regions, uint16_t *count, struct rx_tx *rxtx,
J-Alves77b6f4f2023-03-15 11:34:49 +0000672 const struct boot_params *boot_params)
Manish Pandey6542f5c2020-04-27 14:37:46 +0100673{
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100674 uint32_t phandle;
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -0700675 uint16_t i = 0;
Madhukar Pappireddy3c2b7912023-10-11 14:47:27 -0500676 uint32_t j = 0;
Karl Meakinf6d49402023-04-04 18:14:26 +0100677 uintptr_t relative_address;
Madhukar Pappireddy3c2b7912023-10-11 14:47:27 -0500678 struct uint32list_iter list;
Manish Pandey6542f5c2020-04-27 14:37:46 +0100679
680 dlog_verbose(" Partition memory regions\n");
681
682 if (!fdt_is_compatible(mem_node, "arm,ffa-manifest-memory-regions")) {
683 return MANIFEST_ERROR_NOT_COMPATIBLE;
684 }
685
686 if (!fdt_first_child(mem_node)) {
687 return MANIFEST_ERROR_MEMORY_REGION_NODE_EMPTY;
688 }
689
690 do {
691 dlog_verbose(" Memory Region[%u]\n", i);
692
693 TRY(read_optional_string(mem_node, "description",
694 &mem_regions[i].name));
695 dlog_verbose(" Name: %s\n",
696 string_data(&mem_regions[i].name));
697
Karl Meakinf6d49402023-04-04 18:14:26 +0100698 TRY(read_optional_uint64(mem_node, "base-address",
699 MANIFEST_INVALID_ADDRESS,
700 &mem_regions[i].base_address));
Karl Meakine8937d92024-03-19 16:04:25 +0000701 dlog_verbose(" Base address: %#lx\n",
Manish Pandey6542f5c2020-04-27 14:37:46 +0100702 mem_regions[i].base_address);
703
Davidson K8ccd2d02024-09-03 16:10:54 +0530704 TRY(read_optional_uint64(
705 mem_node, "load-address-relative-offset",
706 MANIFEST_INVALID_ADDRESS, &relative_address));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200707 if (relative_address != MANIFEST_INVALID_ADDRESS) {
Karl Meakine8937d92024-03-19 16:04:25 +0000708 dlog_verbose(" Relative address: %#lx\n",
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200709 relative_address);
710 }
Karl Meakinf6d49402023-04-04 18:14:26 +0100711
712 if (mem_regions[i].base_address == MANIFEST_INVALID_ADDRESS &&
713 relative_address == MANIFEST_INVALID_ADDRESS) {
714 return MANIFEST_ERROR_PROPERTY_NOT_FOUND;
715 }
716
717 if (mem_regions[i].base_address != MANIFEST_INVALID_ADDRESS &&
718 relative_address != MANIFEST_INVALID_ADDRESS) {
719 return MANIFEST_ERROR_BASE_ADDRESS_AND_RELATIVE_ADDRESS;
720 }
721
722 if (relative_address != MANIFEST_INVALID_ADDRESS &&
723 relative_address > UINT64_MAX - load_address) {
724 return MANIFEST_ERROR_INTEGER_OVERFLOW;
725 }
726
727 if (relative_address != MANIFEST_INVALID_ADDRESS) {
728 mem_regions[i].base_address =
729 load_address + relative_address;
730 }
731
Manish Pandey6542f5c2020-04-27 14:37:46 +0100732 TRY(read_uint32(mem_node, "pages-count",
733 &mem_regions[i].page_count));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200734 dlog_verbose(" Pages_count: %u\n",
Manish Pandey6542f5c2020-04-27 14:37:46 +0100735 mem_regions[i].page_count);
736
737 TRY(read_uint32(mem_node, "attributes",
738 &mem_regions[i].attributes));
Raghu Krishnamurthy384693c2021-10-11 13:56:24 -0700739
Olivier Deprez035fa152022-03-14 11:19:10 +0100740 /*
741 * Check RWX permission attributes.
742 * Security attribute is checked at load phase.
743 */
744 uint32_t permissions = mem_regions[i].attributes &
745 (MANIFEST_REGION_ATTR_READ |
746 MANIFEST_REGION_ATTR_WRITE |
747 MANIFEST_REGION_ATTR_EXEC);
748 if (permissions != MANIFEST_REGION_ATTR_READ &&
749 permissions != (MANIFEST_REGION_ATTR_READ |
750 MANIFEST_REGION_ATTR_WRITE) &&
751 permissions != (MANIFEST_REGION_ATTR_READ |
752 MANIFEST_REGION_ATTR_EXEC)) {
Raghu Krishnamurthy384693c2021-10-11 13:56:24 -0700753 return MANIFEST_ERROR_INVALID_MEM_PERM;
754 }
755
Olivier Deprez035fa152022-03-14 11:19:10 +0100756 /* Filter memory region attributes. */
757 mem_regions[i].attributes &= MANIFEST_REGION_ALL_ATTR_MASK;
758
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200759 dlog_verbose(" Attributes: %#x\n",
Manish Pandey6542f5c2020-04-27 14:37:46 +0100760 mem_regions[i].attributes);
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100761
J-Alves77b6f4f2023-03-15 11:34:49 +0000762 TRY(check_partition_memory_is_valid(
763 mem_regions[i].base_address, mem_regions[i].page_count,
Olivier Deprez058ddee2024-08-27 09:22:11 +0200764 mem_regions[i].attributes, boot_params, false));
J-Alves77b6f4f2023-03-15 11:34:49 +0000765
Daniel Boulby3f295b12023-12-15 17:38:08 +0000766 TRY(check_and_record_memory_used(
767 mem_regions[i].base_address, mem_regions[i].page_count,
768 manifest_data->mem_regions,
769 &manifest_data->mem_regions_index));
J-Alves77b6f4f2023-03-15 11:34:49 +0000770
Madhukar Pappireddy718afa92024-06-20 16:48:49 -0500771 TRY(parse_common_fields_mem_dev_region_node(
772 mem_node, &mem_regions[i].dma_prop));
Madhukar Pappireddy3c2b7912023-10-11 14:47:27 -0500773
774 TRY(read_optional_uint32list(
775 mem_node, "stream-ids-access-permissions", &list));
776 dlog_verbose(" Access permissions of Stream IDs:\n");
777
778 j = 0;
779 while (uint32list_has_next(&list)) {
780 uint32_t permissions;
781
782 if (j == PARTITION_MAX_STREAMS_PER_DEVICE) {
783 return MANIFEST_ERROR_DMA_ACCESS_PERMISSIONS_OVERFLOW;
784 }
785
786 TRY(uint32list_get_next(&list, &permissions));
787 dlog_verbose(" %u\n", permissions);
788
789 if (j == 0) {
Madhukar Pappireddy9c764b32024-06-20 14:36:55 -0500790 mem_regions[i].dma_access_permissions =
Madhukar Pappireddy3c2b7912023-10-11 14:47:27 -0500791 permissions;
792 }
793
794 /*
795 * All stream ids belonging to a dma device must specify
796 * the same access permissions.
797 */
798 if (permissions !=
Madhukar Pappireddy9c764b32024-06-20 14:36:55 -0500799 mem_regions[i].dma_access_permissions) {
Madhukar Pappireddy3c2b7912023-10-11 14:47:27 -0500800 return MANIFEST_ERROR_MISMATCH_DMA_ACCESS_PERMISSIONS;
801 }
802
803 j++;
804 }
805
806 if (j == 0) {
807 dlog_verbose(" None\n");
808 } else if (j != mem_regions[i].dma_prop.stream_count) {
809 return MANIFEST_ERROR_MISMATCH_DMA_ACCESS_PERMISSIONS;
810 }
811
812 if (j > 0) {
813 /* Filter the dma access permissions. */
Madhukar Pappireddy9c764b32024-06-20 14:36:55 -0500814 mem_regions[i].dma_access_permissions &=
Madhukar Pappireddy3c2b7912023-10-11 14:47:27 -0500815 MANIFEST_REGION_ALL_ATTR_MASK;
816 }
817
Manish Pandeya70a4192020-10-07 22:05:04 +0100818 if (rxtx->available) {
819 TRY(read_optional_uint32(
820 mem_node, "phandle",
821 (uint32_t)MANIFEST_INVALID_ADDRESS, &phandle));
822 if (phandle == rxtx->rx_phandle) {
823 dlog_verbose(" Assigned as RX buffer\n");
824 rxtx->rx_buffer = &mem_regions[i];
825 } else if (phandle == rxtx->tx_phandle) {
826 dlog_verbose(" Assigned as TX buffer\n");
827 rxtx->tx_buffer = &mem_regions[i];
828 }
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100829 }
830
Manish Pandey6542f5c2020-04-27 14:37:46 +0100831 i++;
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -0700832 } while (fdt_next_sibling(mem_node) &&
833 (i < PARTITION_MAX_MEMORY_REGIONS));
Manish Pandey6542f5c2020-04-27 14:37:46 +0100834
Manish Pandeya70a4192020-10-07 22:05:04 +0100835 if (rxtx->available &&
836 (rxtx->rx_buffer->page_count != rxtx->tx_buffer->page_count)) {
Manish Pandeyf06c9072020-09-29 15:41:58 +0100837 return MANIFEST_ERROR_RXTX_SIZE_MISMATCH;
838 }
839
Manish Pandey2145c212020-05-01 16:04:22 +0100840 *count = i;
Manish Pandey6542f5c2020-04-27 14:37:46 +0100841
842 return MANIFEST_SUCCESS;
843}
844
Raghu Krishnamurthy98da1ca2022-10-04 08:59:01 -0700845static struct interrupt_info *device_region_get_interrupt_info(
846 struct device_region *dev_regions, uint32_t intid)
847{
848 for (uint32_t i = 0; i < ARRAY_SIZE(dev_regions->interrupts); i++) {
849 if (dev_regions->interrupts[i].id == intid) {
850 return &(dev_regions->interrupts[i]);
851 }
852 }
853 return NULL;
854}
855
Manish Pandeye68e7932020-04-23 15:29:28 +0100856static enum manifest_return_code parse_ffa_device_region_node(
Manish Pandey2145c212020-05-01 16:04:22 +0100857 struct fdt_node *dev_node, struct device_region *dev_regions,
Daniel Boulby4339edc2024-02-21 14:59:00 +0000858 uint16_t *count, uint8_t *dma_device_count,
859 const struct boot_params *boot_params)
Manish Pandeye68e7932020-04-23 15:29:28 +0100860{
861 struct uint32list_iter list;
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -0700862 uint16_t i = 0;
Madhukar Pappireddy5fc8be12021-08-03 11:42:53 -0500863 uint32_t j = 0;
Olivier Deprez93644652022-09-09 11:01:12 +0200864 struct interrupt_bitmap allocated_intids = manifest_data->intids;
Madhukar Pappireddy718afa92024-06-20 16:48:49 -0500865 uint8_t dma_device_id = 0;
Manish Pandeye68e7932020-04-23 15:29:28 +0100866
867 dlog_verbose(" Partition Device Regions\n");
868
869 if (!fdt_is_compatible(dev_node, "arm,ffa-manifest-device-regions")) {
870 return MANIFEST_ERROR_NOT_COMPATIBLE;
871 }
872
873 if (!fdt_first_child(dev_node)) {
874 return MANIFEST_ERROR_DEVICE_REGION_NODE_EMPTY;
875 }
876
Madhukar Pappireddye032af52023-10-11 14:52:58 -0500877 *dma_device_count = 0;
878
Manish Pandeye68e7932020-04-23 15:29:28 +0100879 do {
880 dlog_verbose(" Device Region[%u]\n", i);
881
882 TRY(read_optional_string(dev_node, "description",
883 &dev_regions[i].name));
884 dlog_verbose(" Name: %s\n",
885 string_data(&dev_regions[i].name));
886
887 TRY(read_uint64(dev_node, "base-address",
888 &dev_regions[i].base_address));
Karl Meakine8937d92024-03-19 16:04:25 +0000889 dlog_verbose(" Base address: %#lx\n",
Manish Pandeye68e7932020-04-23 15:29:28 +0100890 dev_regions[i].base_address);
891
892 TRY(read_uint32(dev_node, "pages-count",
893 &dev_regions[i].page_count));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200894 dlog_verbose(" Pages_count: %u\n",
Manish Pandeye68e7932020-04-23 15:29:28 +0100895 dev_regions[i].page_count);
896
Daniel Boulby3f295b12023-12-15 17:38:08 +0000897 TRY(check_and_record_memory_used(
898 dev_regions[i].base_address, dev_regions[i].page_count,
899 manifest_data->mem_regions,
900 &manifest_data->mem_regions_index));
Daniel Boulby4d165722023-11-21 13:46:42 +0000901
Manish Pandeye68e7932020-04-23 15:29:28 +0100902 TRY(read_uint32(dev_node, "attributes",
903 &dev_regions[i].attributes));
Raghu Krishnamurthy384693c2021-10-11 13:56:24 -0700904
Olivier Deprez035fa152022-03-14 11:19:10 +0100905 /*
906 * Check RWX permission attributes.
907 * Security attribute is checked at load phase.
908 */
909 uint32_t permissions = dev_regions[i].attributes &
910 (MANIFEST_REGION_ATTR_READ |
911 MANIFEST_REGION_ATTR_WRITE |
912 MANIFEST_REGION_ATTR_EXEC);
913
914 if (permissions != MANIFEST_REGION_ATTR_READ &&
915 permissions != (MANIFEST_REGION_ATTR_READ |
916 MANIFEST_REGION_ATTR_WRITE)) {
Raghu Krishnamurthy384693c2021-10-11 13:56:24 -0700917 return MANIFEST_ERROR_INVALID_MEM_PERM;
918 }
919
Daniel Boulby4339edc2024-02-21 14:59:00 +0000920 /* Filter device region attributes. */
Olivier Deprez035fa152022-03-14 11:19:10 +0100921 dev_regions[i].attributes = dev_regions[i].attributes &
922 MANIFEST_REGION_ALL_ATTR_MASK;
923
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200924 dlog_verbose(" Attributes: %#x\n",
Manish Pandeye68e7932020-04-23 15:29:28 +0100925 dev_regions[i].attributes);
926
Daniel Boulby4339edc2024-02-21 14:59:00 +0000927 TRY(check_partition_memory_is_valid(
928 dev_regions[i].base_address, dev_regions[i].page_count,
Olivier Deprez058ddee2024-08-27 09:22:11 +0200929 dev_regions[i].attributes, boot_params, true));
Daniel Boulby4339edc2024-02-21 14:59:00 +0000930
Manish Pandeye68e7932020-04-23 15:29:28 +0100931 TRY(read_optional_uint32list(dev_node, "interrupts", &list));
932 dlog_verbose(" Interrupt List:\n");
933 j = 0;
934 while (uint32list_has_next(&list) &&
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -0700935 j < PARTITION_MAX_INTERRUPTS_PER_DEVICE) {
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100936 uint32_t intid;
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100937
Manish Pandeye68e7932020-04-23 15:29:28 +0100938 TRY(uint32list_get_next(
939 &list, &dev_regions[i].interrupts[j].id));
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100940 intid = dev_regions[i].interrupts[j].id;
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100941
942 dlog_verbose(" ID = %u\n", intid);
943
Daniel Boulby4ca50f02022-07-29 18:29:34 +0100944 if (interrupt_bitmap_get_value(&allocated_intids,
945 intid) == 1U) {
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100946 return MANIFEST_ERROR_INTERRUPT_ID_REPEATED;
947 }
948
Daniel Boulby4ca50f02022-07-29 18:29:34 +0100949 interrupt_bitmap_set_value(&allocated_intids, intid);
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100950
Manish Pandeye68e7932020-04-23 15:29:28 +0100951 if (uint32list_has_next(&list)) {
952 TRY(uint32list_get_next(&list,
953 &dev_regions[i]
954 .interrupts[j]
955 .attributes));
956 } else {
957 return MANIFEST_ERROR_MALFORMED_INTEGER_LIST;
958 }
959
Raghu Krishnamurthy98da1ca2022-10-04 08:59:01 -0700960 dev_regions[i].interrupts[j].mpidr_valid = false;
961 dev_regions[i].interrupts[j].mpidr = 0;
962
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100963 dlog_verbose(" attributes = %u\n",
Manish Pandeye68e7932020-04-23 15:29:28 +0100964 dev_regions[i].interrupts[j].attributes);
965 j++;
966 }
Madhukar Pappireddy5fc8be12021-08-03 11:42:53 -0500967
968 dev_regions[i].interrupt_count = j;
Manish Pandeye68e7932020-04-23 15:29:28 +0100969 if (j == 0) {
970 dlog_verbose(" Empty\n");
Raghu Krishnamurthy98da1ca2022-10-04 08:59:01 -0700971 } else {
972 TRY(read_optional_uint32list(
973 dev_node, "interrupts-target", &list));
974 dlog_verbose(" Interrupt Target List:\n");
975
976 while (uint32list_has_next(&list)) {
977 uint32_t intid;
978 uint64_t mpidr = 0;
979 uint32_t mpidr_lower = 0;
980 uint32_t mpidr_upper = 0;
981 struct interrupt_info *info = NULL;
982
983 TRY(uint32list_get_next(&list, &intid));
984
985 dlog_verbose(" ID = %u\n", intid);
986
987 if (interrupt_bitmap_get_value(
988 &allocated_intids, intid) != 1U) {
989 return MANIFEST_ERROR_INTERRUPT_ID_NOT_IN_LIST;
990 }
991
992 TRY(uint32list_get_next(&list, &mpidr_upper));
993 TRY(uint32list_get_next(&list, &mpidr_lower));
994 mpidr = mpidr_upper;
995 mpidr <<= 32;
996 mpidr |= mpidr_lower;
997
998 info = device_region_get_interrupt_info(
999 &dev_regions[i], intid);
1000 /*
1001 * We should find info since
1002 * interrupt_bitmap_get_value already ensures
1003 * that we saw the interrupt and allocated ids
1004 * for it.
1005 */
1006 assert(info != NULL);
1007 info->mpidr = mpidr;
1008 info->mpidr_valid = true;
Karl Meakine8937d92024-03-19 16:04:25 +00001009 dlog_verbose(" MPIDR = %#lx\n", mpidr);
Raghu Krishnamurthy98da1ca2022-10-04 08:59:01 -07001010 }
Manish Pandeye68e7932020-04-23 15:29:28 +01001011 }
1012
Madhukar Pappireddy718afa92024-06-20 16:48:49 -05001013 TRY(parse_common_fields_mem_dev_region_node(
1014 dev_node, &dev_regions[i].dma_prop));
1015
Madhukar Pappireddy9c764b32024-06-20 14:36:55 -05001016 if (dev_regions[i].dma_prop.smmu_id != MANIFEST_INVALID_ID) {
Madhukar Pappireddy9c764b32024-06-20 14:36:55 -05001017 dev_regions[i].dma_prop.dma_device_id = dma_device_id++;
Madhukar Pappireddye032af52023-10-11 14:52:58 -05001018 *dma_device_count = dma_device_id;
1019
Madhukar Pappireddy8a364472023-10-11 15:34:07 -05001020 if (*dma_device_count > PARTITION_MAX_DMA_DEVICES) {
1021 return MANIFEST_ERROR_DMA_DEVICE_OVERFLOW;
1022 }
1023
Madhukar Pappireddye032af52023-10-11 14:52:58 -05001024 dlog_verbose(" dma peripheral device id: %u\n",
Madhukar Pappireddy9c764b32024-06-20 14:36:55 -05001025 dev_regions[i].dma_prop.dma_device_id);
Manish Pandeye68e7932020-04-23 15:29:28 +01001026 }
Madhukar Pappireddye032af52023-10-11 14:52:58 -05001027
Manish Pandeye68e7932020-04-23 15:29:28 +01001028 TRY(read_bool(dev_node, "exclusive-access",
1029 &dev_regions[i].exclusive_access));
J-Alves4369bd92020-08-07 16:35:36 +01001030 dlog_verbose(" Exclusive_access: %u\n",
Manish Pandeye68e7932020-04-23 15:29:28 +01001031 dev_regions[i].exclusive_access);
1032
1033 i++;
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -07001034 } while (fdt_next_sibling(dev_node) &&
1035 (i < PARTITION_MAX_DEVICE_REGIONS));
Manish Pandeye68e7932020-04-23 15:29:28 +01001036
Manish Pandey2145c212020-05-01 16:04:22 +01001037 *count = i;
Manish Pandeye68e7932020-04-23 15:29:28 +01001038
1039 return MANIFEST_SUCCESS;
1040}
1041
J-Alvesabebe432022-05-31 14:40:50 +01001042static enum manifest_return_code sanity_check_ffa_manifest(
1043 struct manifest_vm *vm)
1044{
Karl Meakin0e617d92024-04-05 12:55:22 +01001045 enum ffa_version ffa_version;
J-Alvesabebe432022-05-31 14:40:50 +01001046 enum manifest_return_code ret_code = MANIFEST_SUCCESS;
1047 const char *error_string = "specified in manifest is unsupported";
1048 uint32_t k = 0;
Kathleen Capellaf71dee42023-08-08 16:24:14 -04001049 bool using_req2 = (vm->partition.messaging_method &
1050 (FFA_PARTITION_DIRECT_REQ2_RECV |
1051 FFA_PARTITION_DIRECT_REQ2_SEND)) != 0;
J-Alvesabebe432022-05-31 14:40:50 +01001052
1053 /* ensure that the SPM version is compatible */
Karl Meakin0e617d92024-04-05 12:55:22 +01001054 ffa_version = vm->partition.ffa_version;
1055 if (!ffa_versions_are_compatible(ffa_version, FFA_VERSION_COMPILED)) {
J-Alvesabebe432022-05-31 14:40:50 +01001056 dlog_error("FF-A partition manifest version %s: %u.%u\n",
Karl Meakin0e617d92024-04-05 12:55:22 +01001057 error_string, ffa_version_get_major(ffa_version),
1058 ffa_version_get_minor(ffa_version));
J-Alvesabebe432022-05-31 14:40:50 +01001059 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1060 }
1061
1062 if (vm->partition.xlat_granule != PAGE_4KB) {
1063 dlog_error("Translation granule %s: %u\n", error_string,
1064 vm->partition.xlat_granule);
1065 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1066 }
1067
1068 if (vm->partition.execution_state != AARCH64) {
1069 dlog_error("Execution state %s: %u\n", error_string,
1070 vm->partition.execution_state);
1071 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1072 }
1073
1074 if (vm->partition.run_time_el != EL1 &&
1075 vm->partition.run_time_el != S_EL1 &&
Daniel Boulby874d5432023-04-27 12:40:24 +01001076 vm->partition.run_time_el != S_EL0 &&
1077 vm->partition.run_time_el != EL0) {
J-Alvesabebe432022-05-31 14:40:50 +01001078 dlog_error("Exception level %s: %d\n", error_string,
1079 vm->partition.run_time_el);
1080 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1081 }
1082
Karl Meakin0e617d92024-04-05 12:55:22 +01001083 if (vm->partition.ffa_version < FFA_VERSION_1_2 && using_req2) {
Kathleen Capellaf71dee42023-08-08 16:24:14 -04001084 dlog_error("Messaging method %s: %x\n", error_string,
1085 vm->partition.messaging_method);
1086 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1087 }
1088
J-Alvesabebe432022-05-31 14:40:50 +01001089 if ((vm->partition.messaging_method &
1090 ~(FFA_PARTITION_DIRECT_REQ_RECV | FFA_PARTITION_DIRECT_REQ_SEND |
Kathleen Capellaf71dee42023-08-08 16:24:14 -04001091 FFA_PARTITION_INDIRECT_MSG | FFA_PARTITION_DIRECT_REQ2_RECV |
1092 FFA_PARTITION_DIRECT_REQ2_SEND)) != 0U) {
J-Alvesabebe432022-05-31 14:40:50 +01001093 dlog_error("Messaging method %s: %x\n", error_string,
1094 vm->partition.messaging_method);
1095 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1096 }
1097
Daniel Boulby874d5432023-04-27 12:40:24 +01001098 if ((vm->partition.run_time_el == S_EL0 ||
1099 vm->partition.run_time_el == EL0) &&
J-Alvesabebe432022-05-31 14:40:50 +01001100 vm->partition.execution_ctx_count != 1) {
1101 dlog_error(
1102 "Exception level and execution context count %s: %d "
1103 "%d\n",
1104 error_string, vm->partition.run_time_el,
1105 vm->partition.execution_ctx_count);
1106 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1107 }
1108
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -07001109 for (uint16_t i = 0; i < vm->partition.dev_region_count; i++) {
J-Alvesabebe432022-05-31 14:40:50 +01001110 struct device_region dev_region;
1111
1112 dev_region = vm->partition.dev_regions[i];
1113
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -07001114 if (dev_region.interrupt_count >
1115 PARTITION_MAX_INTERRUPTS_PER_DEVICE) {
J-Alvesabebe432022-05-31 14:40:50 +01001116 dlog_error(
1117 "Interrupt count for device region exceeds "
1118 "limit.\n");
1119 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1120 continue;
1121 }
1122
1123 for (uint8_t j = 0; j < dev_region.interrupt_count; j++) {
1124 k++;
1125 if (k > VM_MANIFEST_MAX_INTERRUPTS) {
1126 dlog_error(
1127 "Interrupt count for VM exceeds "
1128 "limit.\n");
1129 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1130 continue;
1131 }
1132 }
1133 }
1134
1135 /* GP register is restricted to one of x0 - x3. */
Karl Meakin824b63d2024-06-03 19:04:53 +01001136 if (vm->partition.gp_register_num != DEFAULT_BOOT_GP_REGISTER &&
J-Alvesabebe432022-05-31 14:40:50 +01001137 vm->partition.gp_register_num > 3) {
1138 dlog_error("GP register number %s: %u\n", error_string,
1139 vm->partition.gp_register_num);
1140 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1141 }
1142
1143 return ret_code;
1144}
1145
Madhukar Pappireddye032af52023-10-11 14:52:58 -05001146/**
1147 * Find the device id allocated to the device region node corresponding to the
1148 * specified stream id.
1149 */
1150static bool find_dma_device_id_from_dev_region_nodes(
1151 const struct manifest_vm *manifest_vm, uint32_t sid, uint8_t *device_id)
1152{
1153 for (uint16_t i = 0; i < manifest_vm->partition.dev_region_count; i++) {
1154 struct device_region dev_region =
1155 manifest_vm->partition.dev_regions[i];
1156
Madhukar Pappireddy9c764b32024-06-20 14:36:55 -05001157 for (uint8_t j = 0; j < dev_region.dma_prop.stream_count; j++) {
1158 if (sid == dev_region.dma_prop.stream_ids[j]) {
1159 *device_id = dev_region.dma_prop.dma_device_id;
Madhukar Pappireddye032af52023-10-11 14:52:58 -05001160 return true;
1161 }
1162 }
1163 }
1164 return false;
1165}
1166
1167/**
1168 * Identify the device id of a DMA device node corresponding to a stream id
1169 * specified in the memory region node.
1170 */
1171static bool map_dma_device_id_to_stream_ids(struct manifest_vm *vm)
1172{
1173 for (uint16_t i = 0; i < vm->partition.mem_region_count; i++) {
1174 struct memory_region mem_region = vm->partition.mem_regions[i];
1175
1176 for (uint8_t j = 0; j < mem_region.dma_prop.stream_count; j++) {
1177 uint32_t sid = mem_region.dma_prop.stream_ids[j];
1178 uint8_t device_id = 0;
1179
1180 /*
1181 * Every stream id must have been declared in the
1182 * device node as well.
1183 */
1184 if (!find_dma_device_id_from_dev_region_nodes(
1185 vm, sid, &device_id)) {
1186 dlog_verbose(
Karl Meakine8937d92024-03-19 16:04:25 +00001187 "Stream ID %d not found in any device "
Madhukar Pappireddye032af52023-10-11 14:52:58 -05001188 "region node of partition manifest\n",
1189 sid);
1190 return false;
1191 }
1192
1193 mem_region.dma_prop.dma_device_id = device_id;
1194 }
1195 }
1196
1197 return true;
1198}
1199
J-Alves77b6f4f2023-03-15 11:34:49 +00001200enum manifest_return_code parse_ffa_manifest(
1201 struct fdt *fdt, struct manifest_vm *vm,
1202 struct fdt_node *boot_info_node, const struct boot_params *boot_params)
Olivier Deprez62d99e32020-01-09 15:58:07 +01001203{
Olivier Deprez62d99e32020-01-09 15:58:07 +01001204 struct uint32list_iter uuid;
Davidson K5d5f2792024-08-19 19:09:12 +05301205 uintpaddr_t load_address;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001206 struct fdt_node root;
1207 struct fdt_node ffa_node;
1208 struct string rxtx_node_name = STRING_INIT("rx_tx-info");
Manish Pandey6542f5c2020-04-27 14:37:46 +01001209 struct string mem_region_node_name = STRING_INIT("memory-regions");
Manish Pandeye68e7932020-04-23 15:29:28 +01001210 struct string dev_region_node_name = STRING_INIT("device-regions");
J-Alves35315782022-01-25 17:58:32 +00001211 struct string boot_info_node_name = STRING_INIT("boot-info");
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001212 bool managed_exit_field_present = false;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001213
1214 if (!fdt_find_node(fdt, "/", &root)) {
1215 return MANIFEST_ERROR_NO_ROOT_NODE;
1216 }
1217
1218 /* Check "compatible" property. */
1219 if (!fdt_is_compatible(&root, "arm,ffa-manifest-1.0")) {
1220 return MANIFEST_ERROR_NOT_COMPATIBLE;
1221 }
1222
J-Alves4369bd92020-08-07 16:35:36 +01001223 TRY(read_uint32list(&root, "uuid", &uuid));
Olivier Deprez62d99e32020-01-09 15:58:07 +01001224
Karl Meakin60532972024-08-02 16:11:21 +01001225 TRY(parse_uuid_list(&uuid, vm->partition.uuids,
1226 &vm->partition.uuid_count));
Kathleen Capella422b10b2023-06-30 18:28:27 -04001227 dlog_verbose(" Number of UUIDs %u\n", vm->partition.uuid_count);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001228
Olivier Deprezb7aa0c22023-06-29 10:46:26 +02001229 TRY(read_uint32(&root, "ffa-version", &vm->partition.ffa_version));
1230 dlog_verbose(" Expected FF-A version %u.%u\n",
Karl Meakin0e617d92024-04-05 12:55:22 +01001231 ffa_version_get_major(vm->partition.ffa_version),
1232 ffa_version_get_minor(vm->partition.ffa_version));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +02001233
Olivier Deprez62d99e32020-01-09 15:58:07 +01001234 TRY(read_uint16(&root, "execution-ctx-count",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001235 &vm->partition.execution_ctx_count));
J-Alves4369bd92020-08-07 16:35:36 +01001236 dlog_verbose(" Number of execution context %u\n",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001237 vm->partition.execution_ctx_count);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001238
1239 TRY(read_uint8(&root, "exception-level",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001240 (uint8_t *)&vm->partition.run_time_el));
1241 dlog_verbose(" Run-time EL %u\n", vm->partition.run_time_el);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001242
1243 TRY(read_uint8(&root, "execution-state",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001244 (uint8_t *)&vm->partition.execution_state));
1245 dlog_verbose(" Execution state %u\n", vm->partition.execution_state);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001246
Davidson K5d5f2792024-08-19 19:09:12 +05301247 TRY(read_optional_uint64(&root, "load-address", 0, &load_address));
1248 if (vm->partition.load_addr != load_address) {
1249 dlog_warning(
1250 "Partition's load address at its manifest differs"
1251 " from specified in partition's package.\n");
1252 }
Karl Meakine8937d92024-03-19 16:04:25 +00001253 dlog_verbose(" Load address %#lx\n", vm->partition.load_addr);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001254
J-Alves4369bd92020-08-07 16:35:36 +01001255 TRY(read_optional_uint64(&root, "entrypoint-offset", 0,
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001256 &vm->partition.ep_offset));
Karl Meakine8937d92024-03-19 16:04:25 +00001257 dlog_verbose(" Entry point offset %#zx\n", vm->partition.ep_offset);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001258
J-Alves35315782022-01-25 17:58:32 +00001259 TRY(read_optional_uint32(&root, "gp-register-num",
1260 DEFAULT_BOOT_GP_REGISTER,
1261 &vm->partition.gp_register_num));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +02001262
1263 if (vm->partition.gp_register_num != DEFAULT_BOOT_GP_REGISTER) {
1264 dlog_verbose(" Boot GP register: x%u\n",
1265 vm->partition.gp_register_num);
1266 }
J-Alves35315782022-01-25 17:58:32 +00001267
J-Alvesb37fd082020-10-22 12:29:21 +01001268 TRY(read_optional_uint16(&root, "boot-order", DEFAULT_BOOT_ORDER,
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001269 &vm->partition.boot_order));
Kathleen Capella4a2a6e72023-04-21 14:43:26 -04001270 if (vm->partition.boot_order != DEFAULT_BOOT_ORDER) {
Karl Meakine8937d92024-03-19 16:04:25 +00001271 dlog_verbose(" Boot order %u\n", vm->partition.boot_order);
Kathleen Capella4a2a6e72023-04-21 14:43:26 -04001272 }
1273
1274 if (!check_boot_order(vm->partition.boot_order)) {
1275 return MANIFEST_ERROR_INVALID_BOOT_ORDER;
1276 }
J-Alvesb37fd082020-10-22 12:29:21 +01001277
J-Alves4369bd92020-08-07 16:35:36 +01001278 TRY(read_optional_uint8(&root, "xlat-granule", 0,
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001279 (uint8_t *)&vm->partition.xlat_granule));
1280 dlog_verbose(" Translation granule %u\n", vm->partition.xlat_granule);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001281
1282 ffa_node = root;
1283 if (fdt_find_child(&ffa_node, &rxtx_node_name)) {
1284 if (!fdt_is_compatible(&ffa_node,
1285 "arm,ffa-manifest-rx_tx-buffer")) {
1286 return MANIFEST_ERROR_NOT_COMPATIBLE;
1287 }
1288
Manish Pandeyfa1f2912020-05-05 12:57:01 +01001289 /*
1290 * Read only phandles for now, it will be used to update buffers
1291 * while parsing memory regions.
1292 */
1293 TRY(read_uint32(&ffa_node, "rx-buffer",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001294 &vm->partition.rxtx.rx_phandle));
Olivier Deprez62d99e32020-01-09 15:58:07 +01001295
Manish Pandeyfa1f2912020-05-05 12:57:01 +01001296 TRY(read_uint32(&ffa_node, "tx-buffer",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001297 &vm->partition.rxtx.tx_phandle));
Olivier Deprez62d99e32020-01-09 15:58:07 +01001298
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001299 vm->partition.rxtx.available = true;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001300 }
1301
Kathleen Capellaf71dee42023-08-08 16:24:14 -04001302 TRY(read_uint16(&root, "messaging-method",
1303 (uint16_t *)&vm->partition.messaging_method));
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001304 dlog_verbose(" Messaging method %u\n", vm->partition.messaging_method);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001305
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001306 TRY(read_bool(&root, "managed-exit", &managed_exit_field_present));
1307
1308 TRY(read_optional_uint8(
1309 &root, "ns-interrupts-action", NS_ACTION_SIGNALED,
1310 (uint8_t *)&vm->partition.ns_interrupts_action));
1311
1312 /*
1313 * An SP manifest can specify one of the fields listed below:
1314 * `managed-exit`: Introduced in FF-A v1.0 spec.
1315 * `ns-interrupts-action`: Introduced in FF-A v1.1 EAC0 spec.
1316 * If both are missing from the manifest, the default response is
1317 * NS_ACTION_SIGNALED.
1318 */
1319 if (managed_exit_field_present) {
1320 vm->partition.ns_interrupts_action = NS_ACTION_ME;
1321 }
1322
1323 if (vm->partition.ns_interrupts_action != NS_ACTION_QUEUED &&
1324 vm->partition.ns_interrupts_action != NS_ACTION_ME &&
1325 vm->partition.ns_interrupts_action != NS_ACTION_SIGNALED) {
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001326 return MANIFEST_ERROR_ILLEGAL_NS_INT_ACTION;
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001327 }
1328
1329 dlog_verbose(
Olivier Deprezb7aa0c22023-06-29 10:46:26 +02001330 " NS Interrupts %s\n",
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001331 (vm->partition.ns_interrupts_action == NS_ACTION_QUEUED)
1332 ? "Queued"
1333 : (vm->partition.ns_interrupts_action == NS_ACTION_SIGNALED)
1334 ? "Signaled"
1335 : "Managed exit");
1336
1337 if (vm->partition.ns_interrupts_action == NS_ACTION_ME) {
1338 /* Managed exit only supported by S_EL1 partitions. */
1339 if (vm->partition.run_time_el != S_EL1) {
1340 dlog_error(
1341 "Managed exit cannot be supported by this "
1342 "partition\n");
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001343 return MANIFEST_ERROR_ILLEGAL_NS_INT_ACTION;
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001344 }
Madhukar Pappireddy046dad02022-06-21 18:43:33 -05001345
1346 TRY(read_bool(&root, "managed-exit-virq",
1347 &vm->partition.me_signal_virq));
1348 if (vm->partition.me_signal_virq) {
1349 dlog_verbose(" Managed Exit signaled through vIRQ\n");
1350 }
J-Alvesa4730db2021-11-02 10:31:01 +00001351 }
1352
1353 TRY(read_bool(&root, "notification-support",
1354 &vm->partition.notification_support));
1355 if (vm->partition.notification_support) {
1356 dlog_verbose(" Notifications Receipt Supported\n");
1357 }
Maksims Svecovs9ddf86a2021-05-06 17:17:21 +01001358
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001359 TRY(read_optional_uint8(
1360 &root, "other-s-interrupts-action", OTHER_S_INT_ACTION_SIGNALED,
1361 (uint8_t *)&vm->partition.other_s_interrupts_action));
1362
1363 if (vm->partition.other_s_interrupts_action ==
1364 OTHER_S_INT_ACTION_QUEUED) {
1365 if (vm->partition.ns_interrupts_action != NS_ACTION_QUEUED) {
1366 dlog_error(
1367 "Choice of the fields 'ns-interrupts-action' "
1368 "and 'other-s-interrupts-action' not "
1369 "compatible\n");
1370 return MANIFEST_ERROR_NOT_COMPATIBLE;
1371 }
1372 } else if (vm->partition.other_s_interrupts_action >
1373 OTHER_S_INT_ACTION_SIGNALED) {
1374 dlog_error(
J-Alves0a824e92024-04-26 16:20:12 +01001375 "Illegal value specified for the field "
1376 "'other-s-interrupts-action': %u\n",
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001377 vm->partition.other_s_interrupts_action);
1378 return MANIFEST_ERROR_ILLEGAL_OTHER_S_INT_ACTION;
1379 }
1380
J-Alves35315782022-01-25 17:58:32 +00001381 /* Parse boot info node. */
1382 if (boot_info_node != NULL) {
1383 ffa_node = root;
1384 vm->partition.boot_info =
1385 fdt_find_child(&ffa_node, &boot_info_node_name);
1386 if (vm->partition.boot_info) {
1387 *boot_info_node = ffa_node;
1388 }
1389 } else {
1390 vm->partition.boot_info = false;
1391 }
1392
Olivier Depreza15f2352022-09-26 09:17:24 +02001393 TRY(read_optional_uint32(
Karl Meakin18694022024-08-02 13:59:25 +01001394 &root, "vm-availability-messages", 0,
1395 (uint32_t *)&vm->partition.vm_availability_messages));
1396 dlog_verbose("vm-availability-messages=%#x\n",
1397 *(uint32_t *)&vm->partition.vm_availability_messages);
1398
1399 if (vm->partition.vm_availability_messages.mbz != 0) {
1400 return MANIFEST_ERROR_VM_AVAILABILITY_MESSAGE_INVALID;
1401 }
1402
1403 TRY(read_optional_uint32(
Olivier Depreza15f2352022-09-26 09:17:24 +02001404 &root, "power-management-messages",
1405 MANIFEST_POWER_MANAGEMENT_CPU_OFF_SUPPORTED |
1406 MANIFEST_POWER_MANAGEMENT_CPU_ON_SUPPORTED,
1407 &vm->partition.power_management));
1408 vm->partition.power_management &= MANIFEST_POWER_MANAGEMENT_ALL_MASK;
1409 if (vm->partition.execution_ctx_count == 1 ||
Daniel Boulby874d5432023-04-27 12:40:24 +01001410 vm->partition.run_time_el == S_EL0 ||
1411 vm->partition.run_time_el == EL0) {
Olivier Depreza15f2352022-09-26 09:17:24 +02001412 vm->partition.power_management =
1413 MANIFEST_POWER_MANAGEMENT_NONE_MASK;
1414 }
1415
1416 dlog_verbose(" Power management messages %#x\n",
1417 vm->partition.power_management);
1418
Manish Pandey6542f5c2020-04-27 14:37:46 +01001419 /* Parse memory-regions */
1420 ffa_node = root;
1421 if (fdt_find_child(&ffa_node, &mem_region_node_name)) {
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001422 TRY(parse_ffa_memory_region_node(
Karl Meakinf6d49402023-04-04 18:14:26 +01001423 &ffa_node, vm->partition.load_addr,
1424 vm->partition.mem_regions,
J-Alves77b6f4f2023-03-15 11:34:49 +00001425 &vm->partition.mem_region_count, &vm->partition.rxtx,
1426 boot_params));
Manish Pandey6542f5c2020-04-27 14:37:46 +01001427 }
Manish Pandey2145c212020-05-01 16:04:22 +01001428 dlog_verbose(" Total %u memory regions found\n",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001429 vm->partition.mem_region_count);
Manish Pandey6542f5c2020-04-27 14:37:46 +01001430
Manish Pandeye68e7932020-04-23 15:29:28 +01001431 /* Parse Device-regions */
1432 ffa_node = root;
1433 if (fdt_find_child(&ffa_node, &dev_region_node_name)) {
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001434 TRY(parse_ffa_device_region_node(
1435 &ffa_node, vm->partition.dev_regions,
Madhukar Pappireddye032af52023-10-11 14:52:58 -05001436 &vm->partition.dev_region_count,
Daniel Boulby4339edc2024-02-21 14:59:00 +00001437 &vm->partition.dma_device_count, boot_params));
Manish Pandeye68e7932020-04-23 15:29:28 +01001438 }
Manish Pandey2145c212020-05-01 16:04:22 +01001439 dlog_verbose(" Total %u device regions found\n",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001440 vm->partition.dev_region_count);
Manish Pandeye68e7932020-04-23 15:29:28 +01001441
Madhukar Pappireddye032af52023-10-11 14:52:58 -05001442 if (!map_dma_device_id_to_stream_ids(vm)) {
1443 return MANIFEST_ERROR_NOT_COMPATIBLE;
1444 }
1445
J-Alves4eb7b542022-03-02 15:21:52 +00001446 return sanity_check_ffa_manifest(vm);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001447}
1448
Olivier Deprez62d99e32020-01-09 15:58:07 +01001449static enum manifest_return_code parse_ffa_partition_package(
1450 struct mm_stage1_locked stage1_locked, struct fdt_node *node,
J-Alves19e20cf2023-08-02 12:48:55 +01001451 struct manifest_vm *vm, ffa_id_t vm_id,
J-Alves77b6f4f2023-03-15 11:34:49 +00001452 const struct boot_params *boot_params, struct mpool *ppool)
Olivier Deprez62d99e32020-01-09 15:58:07 +01001453{
1454 enum manifest_return_code ret = MANIFEST_ERROR_NOT_COMPATIBLE;
J-Alves2f86c1e2022-02-23 18:44:19 +00001455 uintpaddr_t load_address;
1456 struct sp_pkg_header header;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001457 struct fdt sp_fdt;
J-Alves2f86c1e2022-02-23 18:44:19 +00001458 vaddr_t pkg_start;
1459 vaddr_t manifest_address;
J-Alves35315782022-01-25 17:58:32 +00001460 struct fdt_node boot_info_node;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001461
1462 /*
1463 * This must have been hinted as being an FF-A partition,
1464 * return straight with failure if this is not the case.
1465 */
1466 if (!vm->is_ffa_partition) {
J-Alves2f86c1e2022-02-23 18:44:19 +00001467 return ret;
1468 }
1469
1470 TRY(read_uint64(node, "load_address", &load_address));
1471 if (!is_aligned(load_address, PAGE_SIZE)) {
Olivier Deprez62d99e32020-01-09 15:58:07 +01001472 return MANIFEST_ERROR_NOT_COMPATIBLE;
1473 }
1474
J-Alves2f86c1e2022-02-23 18:44:19 +00001475 assert(load_address != 0U);
1476
1477 if (!sp_pkg_init(stage1_locked, pa_init(load_address), &header,
1478 ppool)) {
1479 return ret;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001480 }
1481
J-Alves2f86c1e2022-02-23 18:44:19 +00001482 pkg_start = va_init(load_address);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001483
J-Alves2f86c1e2022-02-23 18:44:19 +00001484 if (vm_id != HF_PRIMARY_VM_ID &&
1485 sp_pkg_get_mem_size(&header) >= vm->secondary.mem_size) {
J-Alves4369bd92020-08-07 16:35:36 +01001486 dlog_error("Invalid package header or DT size.\n");
J-Alves2f86c1e2022-02-23 18:44:19 +00001487 goto out;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001488 }
1489
J-Alves2f86c1e2022-02-23 18:44:19 +00001490 manifest_address = va_add(va_init(load_address), header.pm_offset);
1491 if (!fdt_init_from_ptr(&sp_fdt, ptr_from_va(manifest_address),
1492 header.pm_size)) {
Kathleen Capella422b10b2023-06-30 18:28:27 -04001493 dlog_error("manifest.c: FDT failed validation.\n");
J-Alves2f86c1e2022-02-23 18:44:19 +00001494 goto out;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001495 }
1496
Davidson K5d5f2792024-08-19 19:09:12 +05301497 vm->partition.load_addr = load_address;
1498
J-Alves77b6f4f2023-03-15 11:34:49 +00001499 ret = parse_ffa_manifest(&sp_fdt, vm, &boot_info_node, boot_params);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001500 if (ret != MANIFEST_SUCCESS) {
Olivier Deprez3cbdf862023-06-07 15:36:32 +02001501 dlog_error("Error parsing partition manifest.\n");
J-Alves2f86c1e2022-02-23 18:44:19 +00001502 goto out;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001503 }
1504
J-Alves889a1d72022-05-13 11:38:27 +01001505 if (vm->partition.gp_register_num != DEFAULT_BOOT_GP_REGISTER) {
1506 if (header.version == SP_PKG_HEADER_VERSION_2 &&
1507 vm->partition.boot_info &&
1508 !ffa_boot_info_node(&boot_info_node, pkg_start, &header)) {
1509 dlog_error("Failed to process boot information.\n");
1510 }
J-Alves35315782022-01-25 17:58:32 +00001511 }
J-Alves2f86c1e2022-02-23 18:44:19 +00001512out:
1513 sp_pkg_deinit(stage1_locked, pkg_start, &header, ppool);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001514 return ret;
1515}
1516
David Brazdil7a462ec2019-08-15 12:27:47 +01001517/**
1518 * Parse manifest from FDT.
1519 */
Olivier Deprez62d99e32020-01-09 15:58:07 +01001520enum manifest_return_code manifest_init(struct mm_stage1_locked stage1_locked,
Olivier Deprez93644652022-09-09 11:01:12 +02001521 struct manifest **manifest_ret,
Olivier Deprez62d99e32020-01-09 15:58:07 +01001522 struct memiter *manifest_fdt,
J-Alves77b6f4f2023-03-15 11:34:49 +00001523 struct boot_params *boot_params,
Olivier Deprez62d99e32020-01-09 15:58:07 +01001524 struct mpool *ppool)
David Brazdil7a462ec2019-08-15 12:27:47 +01001525{
Olivier Deprez93644652022-09-09 11:01:12 +02001526 struct manifest *manifest;
David Brazdilb856be62020-03-25 10:14:55 +00001527 struct string vm_name;
1528 struct fdt fdt;
David Brazdil7a462ec2019-08-15 12:27:47 +01001529 struct fdt_node hyp_node;
1530 size_t i = 0;
1531 bool found_primary_vm = false;
Daniel Boulby3f295b12023-12-15 17:38:08 +00001532 const size_t spmc_size =
1533 align_up(pa_difference(layout_text_begin(), layout_image_end()),
1534 PAGE_SIZE);
1535 const size_t spmc_page_count = spmc_size / PAGE_SIZE;
David Brazdil7a462ec2019-08-15 12:27:47 +01001536
J-Alvescd438fa2023-04-26 10:13:12 +01001537 if (boot_params->mem_ranges_count == 0 &&
1538 boot_params->ns_mem_ranges_count == 0) {
1539 return MANIFEST_ERROR_MEMORY_MISSING;
1540 }
1541
J-Alves77b6f4f2023-03-15 11:34:49 +00001542 dump_memory_ranges(boot_params->mem_ranges,
1543 boot_params->mem_ranges_count, false);
1544 dump_memory_ranges(boot_params->ns_mem_ranges,
1545 boot_params->ns_mem_ranges_count, true);
1546
Olivier Deprez93644652022-09-09 11:01:12 +02001547 /* Allocate space in the ppool for the manifest data. */
1548 if (!manifest_data_init(ppool)) {
1549 panic("Unable to allocate manifest data.\n");
Daniel Boulby801f8ef2022-06-27 14:21:01 +01001550 }
1551
Daniel Boulby3f295b12023-12-15 17:38:08 +00001552 /*
1553 * Add SPMC load address range to memory ranges to track to ensure
1554 * no partitions overlap with this memory.
1555 * The system integrator should have prevented this by defining the
1556 * secure memory region ranges so as not to overlap the SPMC load
1557 * address range. Therefore, this code is intended to catch any
1558 * potential misconfigurations there.
1559 */
1560 if (is_aligned(pa_addr(layout_text_begin()), PAGE_SIZE) &&
1561 spmc_page_count != 0) {
1562 TRY(check_and_record_memory_used(
1563 pa_addr(layout_text_begin()), spmc_page_count,
1564 manifest_data->mem_regions,
1565 &manifest_data->mem_regions_index));
1566 }
1567
Olivier Deprez93644652022-09-09 11:01:12 +02001568 manifest = &manifest_data->manifest;
1569 *manifest_ret = manifest;
1570
David Brazdilb856be62020-03-25 10:14:55 +00001571 if (!fdt_init_from_memiter(&fdt, manifest_fdt)) {
1572 return MANIFEST_ERROR_FILE_SIZE; /* TODO */
David Brazdila2358d42020-01-27 18:51:38 +00001573 }
1574
David Brazdil7a462ec2019-08-15 12:27:47 +01001575 /* Find hypervisor node. */
David Brazdilb856be62020-03-25 10:14:55 +00001576 if (!fdt_find_node(&fdt, "/hypervisor", &hyp_node)) {
David Brazdil7a462ec2019-08-15 12:27:47 +01001577 return MANIFEST_ERROR_NO_HYPERVISOR_FDT_NODE;
1578 }
1579
David Brazdil74e9c3b2019-08-28 11:09:08 +01001580 /* Check "compatible" property. */
David Brazdilf4925382020-03-25 13:33:51 +00001581 if (!fdt_is_compatible(&hyp_node, "hafnium,hafnium")) {
David Brazdil74e9c3b2019-08-28 11:09:08 +01001582 return MANIFEST_ERROR_NOT_COMPATIBLE;
1583 }
1584
Olivier Deprez622ab8d2021-08-02 12:15:45 +02001585 TRY(read_bool(&hyp_node, "ffa_tee_enabled",
1586 &manifest->ffa_tee_enabled));
Andrew Walbran41a49d82020-01-10 17:46:38 +00001587
David Brazdil7a462ec2019-08-15 12:27:47 +01001588 /* Iterate over reserved VM IDs and check no such nodes exist. */
Olivier Deprez2a8ee342020-08-03 15:10:44 +02001589 for (i = HF_VM_ID_BASE; i < HF_VM_ID_OFFSET; i++) {
J-Alves19e20cf2023-08-02 12:48:55 +01001590 ffa_id_t vm_id = (ffa_id_t)i - HF_VM_ID_BASE;
David Brazdil7a462ec2019-08-15 12:27:47 +01001591 struct fdt_node vm_node = hyp_node;
David Brazdil7a462ec2019-08-15 12:27:47 +01001592
David Brazdilb856be62020-03-25 10:14:55 +00001593 generate_vm_node_name(&vm_name, vm_id);
1594 if (fdt_find_child(&vm_node, &vm_name)) {
David Brazdil7a462ec2019-08-15 12:27:47 +01001595 return MANIFEST_ERROR_RESERVED_VM_ID;
1596 }
1597 }
1598
1599 /* Iterate over VM nodes until we find one that does not exist. */
1600 for (i = 0; i <= MAX_VMS; ++i) {
J-Alves19e20cf2023-08-02 12:48:55 +01001601 ffa_id_t vm_id = HF_VM_ID_OFFSET + i;
David Brazdil7a462ec2019-08-15 12:27:47 +01001602 struct fdt_node vm_node = hyp_node;
David Brazdil7a462ec2019-08-15 12:27:47 +01001603
Olivier Deprez2a8ee342020-08-03 15:10:44 +02001604 generate_vm_node_name(&vm_name, vm_id - HF_VM_ID_BASE);
David Brazdilb856be62020-03-25 10:14:55 +00001605 if (!fdt_find_child(&vm_node, &vm_name)) {
David Brazdil7a462ec2019-08-15 12:27:47 +01001606 break;
1607 }
1608
1609 if (i == MAX_VMS) {
1610 return MANIFEST_ERROR_TOO_MANY_VMS;
1611 }
1612
1613 if (vm_id == HF_PRIMARY_VM_ID) {
1614 CHECK(found_primary_vm == false); /* sanity check */
1615 found_primary_vm = true;
1616 }
1617
David Brazdil0251b942019-09-10 15:59:50 +01001618 manifest->vm_count = i + 1;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001619
1620 TRY(parse_vm_common(&vm_node, &manifest->vm[i], vm_id));
1621
Raghu Krishnamurthyb49549e2021-07-02 08:27:38 -07001622 CHECK(!manifest->vm[i].is_hyp_loaded ||
1623 manifest->vm[i].is_ffa_partition);
1624
1625 if (manifest->vm[i].is_ffa_partition &&
1626 !manifest->vm[i].is_hyp_loaded) {
Olivier Deprez62d99e32020-01-09 15:58:07 +01001627 TRY(parse_ffa_partition_package(stage1_locked, &vm_node,
1628 &manifest->vm[i], vm_id,
J-Alves77b6f4f2023-03-15 11:34:49 +00001629 boot_params, ppool));
J-Alves596049f2023-03-15 11:40:24 +00001630 size_t page_count =
1631 align_up(manifest->vm[i].secondary.mem_size,
1632 PAGE_SIZE) /
1633 PAGE_SIZE;
1634
1635 if (vm_id == HF_PRIMARY_VM_ID) {
1636 continue;
1637 }
1638
1639 TRY(check_partition_memory_is_valid(
1640 manifest->vm[i].partition.load_addr, page_count,
Olivier Deprez058ddee2024-08-27 09:22:11 +02001641 0, boot_params, false));
J-Alves596049f2023-03-15 11:40:24 +00001642
1643 /*
1644 * Check if memory from load-address until (load-address
1645 * + memory size) has been used by other partition.
1646 */
1647 TRY(check_and_record_memory_used(
Daniel Boulby3f295b12023-12-15 17:38:08 +00001648 manifest->vm[i].partition.load_addr, page_count,
1649 manifest_data->mem_regions,
1650 &manifest_data->mem_regions_index));
Olivier Deprez62d99e32020-01-09 15:58:07 +01001651 } else {
1652 TRY(parse_vm(&vm_node, &manifest->vm[i], vm_id));
1653 }
David Brazdil7a462ec2019-08-15 12:27:47 +01001654 }
1655
Olivier Deprezfb05f3c2020-11-10 17:48:04 +01001656 if (!found_primary_vm && vm_id_is_current_world(HF_PRIMARY_VM_ID)) {
David Brazdil7a462ec2019-08-15 12:27:47 +01001657 return MANIFEST_ERROR_NO_PRIMARY_VM;
1658 }
1659
1660 return MANIFEST_SUCCESS;
1661}
1662
Olivier Deprez93644652022-09-09 11:01:12 +02001663/**
1664 * Free manifest data resources, called once manifest parsing has
1665 * completed and VMs are loaded.
1666 */
Daniel Boulby801f8ef2022-06-27 14:21:01 +01001667void manifest_deinit(struct mpool *ppool)
1668{
Olivier Deprez93644652022-09-09 11:01:12 +02001669 manifest_data_deinit(ppool);
Daniel Boulby801f8ef2022-06-27 14:21:01 +01001670}
1671
David Brazdil7a462ec2019-08-15 12:27:47 +01001672const char *manifest_strerror(enum manifest_return_code ret_code)
1673{
1674 switch (ret_code) {
1675 case MANIFEST_SUCCESS:
1676 return "Success";
David Brazdila2358d42020-01-27 18:51:38 +00001677 case MANIFEST_ERROR_FILE_SIZE:
1678 return "Total size in header does not match file size";
Olivier Deprez62d99e32020-01-09 15:58:07 +01001679 case MANIFEST_ERROR_MALFORMED_DTB:
1680 return "Malformed device tree blob";
David Brazdila2358d42020-01-27 18:51:38 +00001681 case MANIFEST_ERROR_NO_ROOT_NODE:
1682 return "Could not find root node in manifest";
David Brazdil7a462ec2019-08-15 12:27:47 +01001683 case MANIFEST_ERROR_NO_HYPERVISOR_FDT_NODE:
1684 return "Could not find \"hypervisor\" node in manifest";
David Brazdil74e9c3b2019-08-28 11:09:08 +01001685 case MANIFEST_ERROR_NOT_COMPATIBLE:
1686 return "Hypervisor manifest entry not compatible with Hafnium";
David Brazdil7a462ec2019-08-15 12:27:47 +01001687 case MANIFEST_ERROR_RESERVED_VM_ID:
1688 return "Manifest defines a VM with a reserved ID";
1689 case MANIFEST_ERROR_NO_PRIMARY_VM:
1690 return "Manifest does not contain a primary VM entry";
1691 case MANIFEST_ERROR_TOO_MANY_VMS:
1692 return "Manifest specifies more VMs than Hafnium has "
1693 "statically allocated space for";
1694 case MANIFEST_ERROR_PROPERTY_NOT_FOUND:
1695 return "Property not found";
1696 case MANIFEST_ERROR_MALFORMED_STRING:
1697 return "Malformed string property";
David Brazdil0dbb41f2019-09-09 18:03:35 +01001698 case MANIFEST_ERROR_STRING_TOO_LONG:
1699 return "String too long";
David Brazdil7a462ec2019-08-15 12:27:47 +01001700 case MANIFEST_ERROR_MALFORMED_INTEGER:
1701 return "Malformed integer property";
1702 case MANIFEST_ERROR_INTEGER_OVERFLOW:
1703 return "Integer overflow";
Andrew Scullae9962e2019-10-03 16:51:16 +01001704 case MANIFEST_ERROR_MALFORMED_INTEGER_LIST:
1705 return "Malformed integer list property";
Andrew Scullb2c3a242019-11-04 13:52:36 +00001706 case MANIFEST_ERROR_MALFORMED_BOOLEAN:
1707 return "Malformed boolean property";
Manish Pandey6542f5c2020-04-27 14:37:46 +01001708 case MANIFEST_ERROR_MEMORY_REGION_NODE_EMPTY:
1709 return "Memory-region node should have at least one entry";
Manish Pandeye68e7932020-04-23 15:29:28 +01001710 case MANIFEST_ERROR_DEVICE_REGION_NODE_EMPTY:
1711 return "Device-region node should have at least one entry";
Manish Pandeyf06c9072020-09-29 15:41:58 +01001712 case MANIFEST_ERROR_RXTX_SIZE_MISMATCH:
1713 return "RX and TX buffers should be of same size";
Varun Wadekar4afbfd72022-10-13 14:30:18 +01001714 case MANIFEST_ERROR_MEM_REGION_EMPTY:
1715 return "Memory region should have at least one page";
Karl Meakinf6d49402023-04-04 18:14:26 +01001716 case MANIFEST_ERROR_BASE_ADDRESS_AND_RELATIVE_ADDRESS:
1717 return "Base and relative addresses are mutually exclusive";
Daniel Boulbya7e9e182022-06-27 14:21:01 +01001718 case MANIFEST_ERROR_MEM_REGION_OVERLAP:
1719 return "Memory region overlaps with one already allocated";
Daniel Boulbyc1a613d2022-10-18 11:26:17 +01001720 case MANIFEST_ERROR_MEM_REGION_UNALIGNED:
1721 return "Memory region is not aligned to a page boundary";
Raghu Krishnamurthy384693c2021-10-11 13:56:24 -07001722 case MANIFEST_ERROR_INVALID_MEM_PERM:
1723 return "Memory permission should be RO, RW or RX";
J-Alves35315782022-01-25 17:58:32 +00001724 case MANIFEST_ERROR_ARGUMENTS_LIST_EMPTY:
1725 return "Arguments-list node should have at least one argument";
Daniel Boulby801f8ef2022-06-27 14:21:01 +01001726 case MANIFEST_ERROR_INTERRUPT_ID_REPEATED:
1727 return "Interrupt ID already assigned to another endpoint";
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001728 case MANIFEST_ERROR_ILLEGAL_NS_INT_ACTION:
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001729 return "Illegal value specidied for the field: Action in "
1730 "response to NS Interrupt";
Raghu Krishnamurthy98da1ca2022-10-04 08:59:01 -07001731 case MANIFEST_ERROR_INTERRUPT_ID_NOT_IN_LIST:
1732 return "Interrupt ID is not in the list of interrupts";
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001733 case MANIFEST_ERROR_ILLEGAL_OTHER_S_INT_ACTION:
1734 return "Illegal value specified for the field: Action in "
1735 "response to Other-S Interrupt";
J-Alves77b6f4f2023-03-15 11:34:49 +00001736 case MANIFEST_ERROR_MEMORY_MISSING:
1737 return "Memory nodes must be defined in the SPMC manifest "
Olivier Deprez3cbdf862023-06-07 15:36:32 +02001738 "('memory' and 'ns-memory')";
J-Alves77b6f4f2023-03-15 11:34:49 +00001739 case MANIFEST_ERROR_PARTITION_ADDRESS_OVERLAP:
1740 return "Partition's memory [load address: load address + "
1741 "memory size[ overlap with other allocated "
Olivier Deprez3cbdf862023-06-07 15:36:32 +02001742 "regions";
J-Alves77b6f4f2023-03-15 11:34:49 +00001743 case MANIFEST_ERROR_MEM_REGION_INVALID:
Olivier Deprez3cbdf862023-06-07 15:36:32 +02001744 return "Invalid memory region range";
Daniel Boulby4339edc2024-02-21 14:59:00 +00001745 case MANIFEST_ERROR_DEVICE_MEM_REGION_INVALID:
1746 return "Invalid device memory region range";
Kathleen Capella4a2a6e72023-04-21 14:43:26 -04001747 case MANIFEST_ERROR_INVALID_BOOT_ORDER:
1748 return "Boot order should be a unique value less than "
1749 "default largest value";
Kathleen Capella422b10b2023-06-30 18:28:27 -04001750 case MANIFEST_ERROR_UUID_ALL_ZEROS:
1751 return "UUID should not be NIL";
Karl Meakin45abeeb2024-08-02 16:55:44 +01001752 case MANIFEST_ERROR_TOO_MANY_UUIDS:
1753 return "Manifest specifies more UUIDs than Hafnium has "
1754 "statically allocated space for";
Madhukar Pappireddy3c2b7912023-10-11 14:47:27 -05001755 case MANIFEST_ERROR_MISSING_SMMU_ID:
1756 return "SMMU ID must be specified for the given Stream IDs";
1757 case MANIFEST_ERROR_MISMATCH_DMA_ACCESS_PERMISSIONS:
1758 return "DMA device access permissions must match memory region "
1759 "attributes";
1760 case MANIFEST_ERROR_STREAM_IDS_OVERFLOW:
1761 return "DMA device stream ID count exceeds predefined limit";
1762 case MANIFEST_ERROR_DMA_ACCESS_PERMISSIONS_OVERFLOW:
1763 return "DMA access permissions count exceeds predefined limit";
Madhukar Pappireddy8a364472023-10-11 15:34:07 -05001764 case MANIFEST_ERROR_DMA_DEVICE_OVERFLOW:
1765 return "Number of device regions with DMA peripheral exceeds "
1766 "limit.";
Karl Meakin18694022024-08-02 13:59:25 +01001767 case MANIFEST_ERROR_VM_AVAILABILITY_MESSAGE_INVALID:
1768 return "VM availability messages invalid (bits [31:2] must be "
1769 "zero)";
David Brazdil7a462ec2019-08-15 12:27:47 +01001770 }
1771
1772 panic("Unexpected manifest return code.");
1773}