blob: 1101081130966e3c2c557230f23920010c73a65e [file] [log] [blame]
David Brazdil7a462ec2019-08-15 12:27:47 +01001/*
2 * Copyright 2019 The Hafnium Authors.
3 *
Andrew Walbrane959ec12020-06-17 15:01:09 +01004 * Use of this source code is governed by a BSD-style
5 * license that can be found in the LICENSE file or at
6 * https://opensource.org/licenses/BSD-3-Clause.
David Brazdil7a462ec2019-08-15 12:27:47 +01007 */
8
9#include "hf/manifest.h"
10
11#include "hf/addr.h"
12#include "hf/check.h"
Andrew Scullae9962e2019-10-03 16:51:16 +010013#include "hf/dlog.h"
David Brazdil7a462ec2019-08-15 12:27:47 +010014#include "hf/fdt.h"
15#include "hf/static_assert.h"
16#include "hf/std.h"
17
18#define TRY(expr) \
19 do { \
20 enum manifest_return_code ret_code = (expr); \
21 if (ret_code != MANIFEST_SUCCESS) { \
22 return ret_code; \
23 } \
24 } while (0)
25
David Brazdilb856be62020-03-25 10:14:55 +000026#define VM_ID_MAX (HF_VM_ID_OFFSET + MAX_VMS - 1)
27#define VM_ID_MAX_DIGITS (5)
28#define VM_NAME_EXTRA_CHARS (3) /* "vm" + number + '\0' */
29#define VM_NAME_MAX_SIZE (VM_ID_MAX_DIGITS + VM_NAME_EXTRA_CHARS)
30static_assert(VM_NAME_MAX_SIZE <= STRING_MAX_SIZE,
31 "VM name does not fit into a struct string.");
32static_assert(VM_ID_MAX <= 99999, "Insufficient VM_NAME_BUF_SIZE");
Olivier Deprez2a8ee342020-08-03 15:10:44 +020033static_assert((HF_OTHER_WORLD_ID > VM_ID_MAX) ||
34 (HF_OTHER_WORLD_ID < HF_VM_ID_BASE),
Andrew Walbran9daa57e2019-09-27 13:33:20 +010035 "TrustZone VM ID clashes with normal VM range.");
David Brazdil7a462ec2019-08-15 12:27:47 +010036
Andrew Walbranb5ab43c2020-04-30 11:32:54 +010037static inline size_t count_digits(ffa_vm_id_t vm_id)
David Brazdilb856be62020-03-25 10:14:55 +000038{
39 size_t digits = 0;
40
41 do {
42 digits++;
43 vm_id /= 10;
44 } while (vm_id);
45 return digits;
46}
47
David Brazdil7a462ec2019-08-15 12:27:47 +010048/**
49 * Generates a string with the two letters "vm" followed by an integer.
50 * Assumes `buf` is of size VM_NAME_BUF_SIZE.
51 */
Andrew Walbranb5ab43c2020-04-30 11:32:54 +010052static void generate_vm_node_name(struct string *str, ffa_vm_id_t vm_id)
David Brazdil7a462ec2019-08-15 12:27:47 +010053{
54 static const char *digits = "0123456789";
David Brazdilb856be62020-03-25 10:14:55 +000055 size_t vm_id_digits = count_digits(vm_id);
56 char *base = str->data;
57 char *ptr = base + (VM_NAME_EXTRA_CHARS + vm_id_digits);
David Brazdil7a462ec2019-08-15 12:27:47 +010058
David Brazdilb856be62020-03-25 10:14:55 +000059 CHECK(vm_id_digits <= VM_ID_MAX_DIGITS);
David Brazdil7a462ec2019-08-15 12:27:47 +010060 *(--ptr) = '\0';
61 do {
62 *(--ptr) = digits[vm_id % 10];
63 vm_id /= 10;
64 } while (vm_id);
65 *(--ptr) = 'm';
66 *(--ptr) = 'v';
David Brazdilb856be62020-03-25 10:14:55 +000067 CHECK(ptr == base);
David Brazdil7a462ec2019-08-15 12:27:47 +010068}
69
Andrew Scullae9962e2019-10-03 16:51:16 +010070/**
Andrew Scullb2c3a242019-11-04 13:52:36 +000071 * Read a boolean property: true if present; false if not. If present, the value
72 * of the property must be empty else it is considered malformed.
Andrew Scullae9962e2019-10-03 16:51:16 +010073 */
Andrew Scullb2c3a242019-11-04 13:52:36 +000074static enum manifest_return_code read_bool(const struct fdt_node *node,
75 const char *property, bool *out)
Andrew Scullae9962e2019-10-03 16:51:16 +010076{
David Brazdilb856be62020-03-25 10:14:55 +000077 struct memiter data;
78 bool present = fdt_read_property(node, property, &data);
Andrew Scullae9962e2019-10-03 16:51:16 +010079
David Brazdilb856be62020-03-25 10:14:55 +000080 if (present && memiter_size(&data) != 0) {
Andrew Scullb2c3a242019-11-04 13:52:36 +000081 return MANIFEST_ERROR_MALFORMED_BOOLEAN;
82 }
83
84 *out = present;
85 return MANIFEST_SUCCESS;
Andrew Scullae9962e2019-10-03 16:51:16 +010086}
87
Andrew Scull72b43c02019-09-18 13:53:45 +010088static enum manifest_return_code read_string(const struct fdt_node *node,
David Brazdil136f2942019-09-23 14:11:03 +010089 const char *property,
90 struct string *out)
Andrew Scull72b43c02019-09-18 13:53:45 +010091{
David Brazdilb856be62020-03-25 10:14:55 +000092 struct memiter data;
Andrew Scull72b43c02019-09-18 13:53:45 +010093
David Brazdilb856be62020-03-25 10:14:55 +000094 if (!fdt_read_property(node, property, &data)) {
Andrew Scull72b43c02019-09-18 13:53:45 +010095 return MANIFEST_ERROR_PROPERTY_NOT_FOUND;
96 }
97
David Brazdilb856be62020-03-25 10:14:55 +000098 switch (string_init(out, &data)) {
David Brazdil136f2942019-09-23 14:11:03 +010099 case STRING_SUCCESS:
100 return MANIFEST_SUCCESS;
101 case STRING_ERROR_INVALID_INPUT:
102 return MANIFEST_ERROR_MALFORMED_STRING;
103 case STRING_ERROR_TOO_LONG:
104 return MANIFEST_ERROR_STRING_TOO_LONG;
105 }
Andrew Scull72b43c02019-09-18 13:53:45 +0100106}
107
108static enum manifest_return_code read_optional_string(
David Brazdil136f2942019-09-23 14:11:03 +0100109 const struct fdt_node *node, const char *property, struct string *out)
Andrew Scull72b43c02019-09-18 13:53:45 +0100110{
David Brazdil136f2942019-09-23 14:11:03 +0100111 enum manifest_return_code ret;
Andrew Scull72b43c02019-09-18 13:53:45 +0100112
David Brazdil136f2942019-09-23 14:11:03 +0100113 ret = read_string(node, property, out);
114 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
115 string_init_empty(out);
116 ret = MANIFEST_SUCCESS;
Andrew Scull72b43c02019-09-18 13:53:45 +0100117 }
David Brazdil136f2942019-09-23 14:11:03 +0100118 return ret;
Andrew Scull72b43c02019-09-18 13:53:45 +0100119}
120
David Brazdil7a462ec2019-08-15 12:27:47 +0100121static enum manifest_return_code read_uint64(const struct fdt_node *node,
122 const char *property,
123 uint64_t *out)
124{
David Brazdilb856be62020-03-25 10:14:55 +0000125 struct memiter data;
David Brazdil7a462ec2019-08-15 12:27:47 +0100126
David Brazdilb856be62020-03-25 10:14:55 +0000127 if (!fdt_read_property(node, property, &data)) {
David Brazdil7a462ec2019-08-15 12:27:47 +0100128 return MANIFEST_ERROR_PROPERTY_NOT_FOUND;
129 }
130
David Brazdilb856be62020-03-25 10:14:55 +0000131 if (!fdt_parse_number(&data, memiter_size(&data), out)) {
David Brazdil7a462ec2019-08-15 12:27:47 +0100132 return MANIFEST_ERROR_MALFORMED_INTEGER;
133 }
134
135 return MANIFEST_SUCCESS;
136}
137
David Brazdil080ee312020-02-25 15:30:30 -0800138static enum manifest_return_code read_optional_uint64(
139 const struct fdt_node *node, const char *property,
140 uint64_t default_value, uint64_t *out)
141{
142 enum manifest_return_code ret;
143
144 ret = read_uint64(node, property, out);
145 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
146 *out = default_value;
147 return MANIFEST_SUCCESS;
148 }
149 return ret;
150}
151
Olivier Deprez62d99e32020-01-09 15:58:07 +0100152static enum manifest_return_code read_uint32(const struct fdt_node *node,
153 const char *property,
154 uint32_t *out)
155{
156 uint64_t value;
157
158 TRY(read_uint64(node, property, &value));
159
160 if (value > UINT32_MAX) {
161 return MANIFEST_ERROR_INTEGER_OVERFLOW;
162 }
163
164 *out = (uint32_t)value;
165 return MANIFEST_SUCCESS;
166}
167
Manish Pandeye68e7932020-04-23 15:29:28 +0100168static enum manifest_return_code read_optional_uint32(
169 const struct fdt_node *node, const char *property,
170 uint32_t default_value, uint32_t *out)
171{
172 enum manifest_return_code ret;
173
174 ret = read_uint32(node, property, out);
175 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
176 *out = default_value;
177 return MANIFEST_SUCCESS;
178 }
179 return ret;
180}
181
David Brazdil7a462ec2019-08-15 12:27:47 +0100182static enum manifest_return_code read_uint16(const struct fdt_node *node,
183 const char *property,
184 uint16_t *out)
185{
186 uint64_t value;
187
188 TRY(read_uint64(node, property, &value));
189
190 if (value > UINT16_MAX) {
191 return MANIFEST_ERROR_INTEGER_OVERFLOW;
192 }
193
194 *out = (uint16_t)value;
195 return MANIFEST_SUCCESS;
196}
197
J-Alvesb37fd082020-10-22 12:29:21 +0100198static enum manifest_return_code read_optional_uint16(
199 const struct fdt_node *node, const char *property,
200 uint16_t default_value, uint16_t *out)
201{
202 enum manifest_return_code ret;
203
204 ret = read_uint16(node, property, out);
205 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
206 *out = default_value;
207 return MANIFEST_SUCCESS;
208 }
209
210 return MANIFEST_SUCCESS;
211}
212
Olivier Deprez62d99e32020-01-09 15:58:07 +0100213static enum manifest_return_code read_uint8(const struct fdt_node *node,
214 const char *property, uint8_t *out)
215{
216 uint64_t value;
217
218 TRY(read_uint64(node, property, &value));
219
220 if (value > UINT8_MAX) {
221 return MANIFEST_ERROR_INTEGER_OVERFLOW;
222 }
223
224 *out = (uint8_t)value;
225 return MANIFEST_SUCCESS;
226}
227
J-Alves4369bd92020-08-07 16:35:36 +0100228static enum manifest_return_code read_optional_uint8(
229 const struct fdt_node *node, const char *property,
230 uint8_t default_value, uint8_t *out)
231{
232 enum manifest_return_code ret;
233
234 ret = read_uint8(node, property, out);
235 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
236 *out = default_value;
237 return MANIFEST_SUCCESS;
238 }
239
240 return MANIFEST_SUCCESS;
241}
242
Andrew Scullae9962e2019-10-03 16:51:16 +0100243struct uint32list_iter {
244 struct memiter mem_it;
245};
246
J-Alves4369bd92020-08-07 16:35:36 +0100247static enum manifest_return_code read_uint32list(const struct fdt_node *node,
248 const char *property,
249 struct uint32list_iter *out)
Andrew Scullae9962e2019-10-03 16:51:16 +0100250{
David Brazdilb856be62020-03-25 10:14:55 +0000251 struct memiter data;
Andrew Scullae9962e2019-10-03 16:51:16 +0100252
David Brazdilb856be62020-03-25 10:14:55 +0000253 if (!fdt_read_property(node, property, &data)) {
Andrew Scullae9962e2019-10-03 16:51:16 +0100254 memiter_init(&out->mem_it, NULL, 0);
J-Alves4369bd92020-08-07 16:35:36 +0100255 return MANIFEST_ERROR_PROPERTY_NOT_FOUND;
Andrew Scullae9962e2019-10-03 16:51:16 +0100256 }
257
David Brazdilb856be62020-03-25 10:14:55 +0000258 if ((memiter_size(&data) % sizeof(uint32_t)) != 0) {
Andrew Scullae9962e2019-10-03 16:51:16 +0100259 return MANIFEST_ERROR_MALFORMED_INTEGER_LIST;
260 }
261
David Brazdilb856be62020-03-25 10:14:55 +0000262 out->mem_it = data;
Andrew Scullae9962e2019-10-03 16:51:16 +0100263 return MANIFEST_SUCCESS;
264}
265
J-Alves4369bd92020-08-07 16:35:36 +0100266static enum manifest_return_code read_optional_uint32list(
267 const struct fdt_node *node, const char *property,
268 struct uint32list_iter *out)
269{
270 enum manifest_return_code ret = read_uint32list(node, property, out);
271
272 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
273 return MANIFEST_SUCCESS;
274 }
275 return ret;
276}
277
Andrew Scullae9962e2019-10-03 16:51:16 +0100278static bool uint32list_has_next(const struct uint32list_iter *list)
279{
280 return memiter_size(&list->mem_it) > 0;
281}
282
David Brazdil5ea99462020-03-25 13:01:47 +0000283static enum manifest_return_code uint32list_get_next(
284 struct uint32list_iter *list, uint32_t *out)
Andrew Scullae9962e2019-10-03 16:51:16 +0100285{
Andrew Scullae9962e2019-10-03 16:51:16 +0100286 uint64_t num;
287
288 CHECK(uint32list_has_next(list));
David Brazdilb856be62020-03-25 10:14:55 +0000289 if (!fdt_parse_number(&list->mem_it, sizeof(uint32_t), &num)) {
Andrew Scullae9962e2019-10-03 16:51:16 +0100290 return MANIFEST_ERROR_MALFORMED_INTEGER;
291 }
292
David Brazdil5ea99462020-03-25 13:01:47 +0000293 *out = (uint32_t)num;
294 return MANIFEST_SUCCESS;
Andrew Scullae9962e2019-10-03 16:51:16 +0100295}
296
Olivier Deprez62d99e32020-01-09 15:58:07 +0100297static enum manifest_return_code parse_vm_common(const struct fdt_node *node,
298 struct manifest_vm *vm,
299 ffa_vm_id_t vm_id)
David Brazdil7a462ec2019-08-15 12:27:47 +0100300{
Andrew Scullae9962e2019-10-03 16:51:16 +0100301 struct uint32list_iter smcs;
David Brazdil5ea99462020-03-25 13:01:47 +0000302 size_t idx;
Andrew Scullae9962e2019-10-03 16:51:16 +0100303
Olivier Deprez62d99e32020-01-09 15:58:07 +0100304 TRY(read_bool(node, "is_ffa_partition", &vm->is_ffa_partition));
305
David Brazdil136f2942019-09-23 14:11:03 +0100306 TRY(read_string(node, "debug_name", &vm->debug_name));
Andrew Scullae9962e2019-10-03 16:51:16 +0100307
308 TRY(read_optional_uint32list(node, "smc_whitelist", &smcs));
309 while (uint32list_has_next(&smcs) &&
310 vm->smc_whitelist.smc_count < MAX_SMCS) {
David Brazdil5ea99462020-03-25 13:01:47 +0000311 idx = vm->smc_whitelist.smc_count++;
312 TRY(uint32list_get_next(&smcs, &vm->smc_whitelist.smcs[idx]));
Andrew Scullae9962e2019-10-03 16:51:16 +0100313 }
314
315 if (uint32list_has_next(&smcs)) {
Andrew Walbran17eebf92020-02-05 16:35:49 +0000316 dlog_warning("%s SMC whitelist too long.\n", vm->debug_name);
Andrew Scullae9962e2019-10-03 16:51:16 +0100317 }
318
Andrew Scullb2c3a242019-11-04 13:52:36 +0000319 TRY(read_bool(node, "smc_whitelist_permissive",
320 &vm->smc_whitelist.permissive));
Andrew Scullae9962e2019-10-03 16:51:16 +0100321
Olivier Deprez62d99e32020-01-09 15:58:07 +0100322 if (vm_id != HF_PRIMARY_VM_ID) {
323 TRY(read_uint64(node, "mem_size", &vm->secondary.mem_size));
324 TRY(read_uint16(node, "vcpu_count", &vm->secondary.vcpu_count));
Fuad Tabba50469e02020-06-30 15:14:28 +0100325 TRY(read_optional_string(node, "fdt_filename",
326 &vm->secondary.fdt_filename));
Olivier Deprez62d99e32020-01-09 15:58:07 +0100327 }
328
329 return MANIFEST_SUCCESS;
330}
331
332static enum manifest_return_code parse_vm(struct fdt_node *node,
333 struct manifest_vm *vm,
334 ffa_vm_id_t vm_id)
335{
336 TRY(read_optional_string(node, "kernel_filename",
337 &vm->kernel_filename));
338
David Brazdile6f83222019-09-23 14:47:37 +0100339 if (vm_id == HF_PRIMARY_VM_ID) {
340 TRY(read_optional_string(node, "ramdisk_filename",
341 &vm->primary.ramdisk_filename));
David Brazdil080ee312020-02-25 15:30:30 -0800342 TRY(read_optional_uint64(node, "boot_address",
343 MANIFEST_INVALID_ADDRESS,
344 &vm->primary.boot_address));
David Brazdil7a462ec2019-08-15 12:27:47 +0100345 }
Raghu Krishnamurthy988a5e72021-02-27 21:46:06 -0800346 TRY(read_optional_uint8(node, "exception-level", (uint8_t)EL1,
347 (uint8_t *)&vm->sp.run_time_el));
Olivier Deprez62d99e32020-01-09 15:58:07 +0100348
David Brazdil7a462ec2019-08-15 12:27:47 +0100349 return MANIFEST_SUCCESS;
350}
351
Manish Pandey6542f5c2020-04-27 14:37:46 +0100352static enum manifest_return_code parse_ffa_memory_region_node(
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100353 struct fdt_node *mem_node, struct memory_region *mem_regions,
Manish Pandey2145c212020-05-01 16:04:22 +0100354 uint8_t *count, struct rx_tx *rxtx)
Manish Pandey6542f5c2020-04-27 14:37:46 +0100355{
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100356 uint32_t phandle;
Manish Pandey2145c212020-05-01 16:04:22 +0100357 uint8_t i = 0;
Manish Pandey6542f5c2020-04-27 14:37:46 +0100358
359 dlog_verbose(" Partition memory regions\n");
360
361 if (!fdt_is_compatible(mem_node, "arm,ffa-manifest-memory-regions")) {
362 return MANIFEST_ERROR_NOT_COMPATIBLE;
363 }
364
365 if (!fdt_first_child(mem_node)) {
366 return MANIFEST_ERROR_MEMORY_REGION_NODE_EMPTY;
367 }
368
369 do {
370 dlog_verbose(" Memory Region[%u]\n", i);
371
372 TRY(read_optional_string(mem_node, "description",
373 &mem_regions[i].name));
374 dlog_verbose(" Name: %s\n",
375 string_data(&mem_regions[i].name));
376
377 TRY(read_optional_uint64(mem_node, "base-address",
378 MANIFEST_INVALID_ADDRESS,
379 &mem_regions[i].base_address));
380 dlog_verbose(" Base address: %#x\n",
381 mem_regions[i].base_address);
382
383 TRY(read_uint32(mem_node, "pages-count",
384 &mem_regions[i].page_count));
385 dlog_verbose(" Pages_count: %u\n",
386 mem_regions[i].page_count);
387
388 TRY(read_uint32(mem_node, "attributes",
389 &mem_regions[i].attributes));
390 mem_regions[i].attributes &= MM_PERM_MASK;
391 dlog_verbose(" Attributes: %u\n",
392 mem_regions[i].attributes);
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100393
Manish Pandeya70a4192020-10-07 22:05:04 +0100394 if (rxtx->available) {
395 TRY(read_optional_uint32(
396 mem_node, "phandle",
397 (uint32_t)MANIFEST_INVALID_ADDRESS, &phandle));
398 if (phandle == rxtx->rx_phandle) {
399 dlog_verbose(" Assigned as RX buffer\n");
400 rxtx->rx_buffer = &mem_regions[i];
401 } else if (phandle == rxtx->tx_phandle) {
402 dlog_verbose(" Assigned as TX buffer\n");
403 rxtx->tx_buffer = &mem_regions[i];
404 }
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100405 }
406
Manish Pandey6542f5c2020-04-27 14:37:46 +0100407 i++;
408 } while (fdt_next_sibling(mem_node) && (i < SP_MAX_MEMORY_REGIONS));
409
Manish Pandeya70a4192020-10-07 22:05:04 +0100410 if (rxtx->available &&
411 (rxtx->rx_buffer->page_count != rxtx->tx_buffer->page_count)) {
Manish Pandeyf06c9072020-09-29 15:41:58 +0100412 return MANIFEST_ERROR_RXTX_SIZE_MISMATCH;
413 }
414
Manish Pandey2145c212020-05-01 16:04:22 +0100415 *count = i;
Manish Pandey6542f5c2020-04-27 14:37:46 +0100416
417 return MANIFEST_SUCCESS;
418}
419
Manish Pandeye68e7932020-04-23 15:29:28 +0100420static enum manifest_return_code parse_ffa_device_region_node(
Manish Pandey2145c212020-05-01 16:04:22 +0100421 struct fdt_node *dev_node, struct device_region *dev_regions,
422 uint8_t *count)
Manish Pandeye68e7932020-04-23 15:29:28 +0100423{
424 struct uint32list_iter list;
Manish Pandey2145c212020-05-01 16:04:22 +0100425 uint8_t i = 0;
426 uint8_t j = 0;
Manish Pandeye68e7932020-04-23 15:29:28 +0100427
428 dlog_verbose(" Partition Device Regions\n");
429
430 if (!fdt_is_compatible(dev_node, "arm,ffa-manifest-device-regions")) {
431 return MANIFEST_ERROR_NOT_COMPATIBLE;
432 }
433
434 if (!fdt_first_child(dev_node)) {
435 return MANIFEST_ERROR_DEVICE_REGION_NODE_EMPTY;
436 }
437
438 do {
439 dlog_verbose(" Device Region[%u]\n", i);
440
441 TRY(read_optional_string(dev_node, "description",
442 &dev_regions[i].name));
443 dlog_verbose(" Name: %s\n",
444 string_data(&dev_regions[i].name));
445
446 TRY(read_uint64(dev_node, "base-address",
447 &dev_regions[i].base_address));
448 dlog_verbose(" Base address: %#x\n",
449 dev_regions[i].base_address);
450
451 TRY(read_uint32(dev_node, "pages-count",
452 &dev_regions[i].page_count));
453 dlog_verbose(" Pages_count: %u\n",
454 dev_regions[i].page_count);
455
456 TRY(read_uint32(dev_node, "attributes",
457 &dev_regions[i].attributes));
458 dev_regions[i].attributes =
459 (dev_regions[i].attributes & MM_PERM_MASK) | MM_MODE_D;
460 dlog_verbose(" Attributes: %u\n",
461 dev_regions[i].attributes);
462
463 TRY(read_optional_uint32list(dev_node, "interrupts", &list));
464 dlog_verbose(" Interrupt List:\n");
465 j = 0;
466 while (uint32list_has_next(&list) &&
467 j < SP_MAX_INTERRUPTS_PER_DEVICE) {
468 TRY(uint32list_get_next(
469 &list, &dev_regions[i].interrupts[j].id));
470 if (uint32list_has_next(&list)) {
471 TRY(uint32list_get_next(&list,
472 &dev_regions[i]
473 .interrupts[j]
474 .attributes));
475 } else {
476 return MANIFEST_ERROR_MALFORMED_INTEGER_LIST;
477 }
478
479 dlog_verbose(" ID = %u, attributes = %u\n",
480 dev_regions[i].interrupts[j].id,
481 dev_regions[i].interrupts[j].attributes);
482 j++;
483 }
484 if (j == 0) {
485 dlog_verbose(" Empty\n");
486 }
487
488 TRY(read_optional_uint32(dev_node, "smmu-id",
Madhukar Pappireddy54680c72020-10-23 15:02:38 -0500489 MANIFEST_INVALID_ID,
Manish Pandeye68e7932020-04-23 15:29:28 +0100490 &dev_regions[i].smmu_id));
491 dlog_verbose(" smmu-id: %u\n", dev_regions[i].smmu_id);
492
493 TRY(read_optional_uint32list(dev_node, "stream-ids", &list));
494 dlog_verbose(" Stream IDs assigned:\n");
495
496 j = 0;
497 while (uint32list_has_next(&list) &&
498 j < SP_MAX_STREAMS_PER_DEVICE) {
499 TRY(uint32list_get_next(&list,
500 &dev_regions[i].stream_ids[j]));
501 dlog_verbose(" %u\n",
502 dev_regions[i].stream_ids[j]);
503 j++;
504 }
505 if (j == 0) {
506 dlog_verbose(" None\n");
507 }
Madhukar Pappireddy54680c72020-10-23 15:02:38 -0500508 dev_regions[i].stream_count = j;
Manish Pandeye68e7932020-04-23 15:29:28 +0100509
510 TRY(read_bool(dev_node, "exclusive-access",
511 &dev_regions[i].exclusive_access));
J-Alves4369bd92020-08-07 16:35:36 +0100512 dlog_verbose(" Exclusive_access: %u\n",
Manish Pandeye68e7932020-04-23 15:29:28 +0100513 dev_regions[i].exclusive_access);
514
515 i++;
516 } while (fdt_next_sibling(dev_node) && (i < SP_MAX_DEVICE_REGIONS));
517
Manish Pandey2145c212020-05-01 16:04:22 +0100518 *count = i;
Manish Pandeye68e7932020-04-23 15:29:28 +0100519
520 return MANIFEST_SUCCESS;
521}
522
Olivier Deprez62d99e32020-01-09 15:58:07 +0100523static enum manifest_return_code parse_ffa_manifest(struct fdt *fdt,
524 struct manifest_vm *vm)
525{
526 unsigned int i = 0;
527 struct uint32list_iter uuid;
528 uint32_t uuid_word;
529 struct fdt_node root;
530 struct fdt_node ffa_node;
531 struct string rxtx_node_name = STRING_INIT("rx_tx-info");
Manish Pandey6542f5c2020-04-27 14:37:46 +0100532 struct string mem_region_node_name = STRING_INIT("memory-regions");
Manish Pandeye68e7932020-04-23 15:29:28 +0100533 struct string dev_region_node_name = STRING_INIT("device-regions");
Olivier Deprez62d99e32020-01-09 15:58:07 +0100534
535 if (!fdt_find_node(fdt, "/", &root)) {
536 return MANIFEST_ERROR_NO_ROOT_NODE;
537 }
538
539 /* Check "compatible" property. */
540 if (!fdt_is_compatible(&root, "arm,ffa-manifest-1.0")) {
541 return MANIFEST_ERROR_NOT_COMPATIBLE;
542 }
543
544 TRY(read_uint32(&root, "ffa-version", &vm->sp.ffa_version));
J-Alves4369bd92020-08-07 16:35:36 +0100545 dlog_verbose(" Expected FF-A version %u.%u\n",
Olivier Deprez62d99e32020-01-09 15:58:07 +0100546 vm->sp.ffa_version >> 16, vm->sp.ffa_version & 0xffff);
547
J-Alves4369bd92020-08-07 16:35:36 +0100548 TRY(read_uint32list(&root, "uuid", &uuid));
Olivier Deprez62d99e32020-01-09 15:58:07 +0100549
550 while (uint32list_has_next(&uuid) && i < 4) {
551 TRY(uint32list_get_next(&uuid, &uuid_word));
Fuad Tabbae4efcc32020-07-16 15:37:27 +0100552 vm->sp.uuid.uuid[i] = uuid_word;
Olivier Deprez62d99e32020-01-09 15:58:07 +0100553 i++;
554 }
J-Alves4369bd92020-08-07 16:35:36 +0100555 dlog_verbose(" UUID %#x-%x-%x-%x\n", vm->sp.uuid.uuid[0],
Fuad Tabba952401e2020-07-24 10:43:40 +0100556 vm->sp.uuid.uuid[1], vm->sp.uuid.uuid[2],
557 vm->sp.uuid.uuid[3]);
Olivier Deprez62d99e32020-01-09 15:58:07 +0100558
559 TRY(read_uint16(&root, "execution-ctx-count",
560 &vm->sp.execution_ctx_count));
J-Alves4369bd92020-08-07 16:35:36 +0100561 dlog_verbose(" Number of execution context %u\n",
Olivier Deprez62d99e32020-01-09 15:58:07 +0100562 vm->sp.execution_ctx_count);
563
564 TRY(read_uint8(&root, "exception-level",
565 (uint8_t *)&vm->sp.run_time_el));
J-Alves4369bd92020-08-07 16:35:36 +0100566 dlog_verbose(" Run-time EL %u\n", vm->sp.run_time_el);
Olivier Deprez62d99e32020-01-09 15:58:07 +0100567
568 TRY(read_uint8(&root, "execution-state",
569 (uint8_t *)&vm->sp.execution_state));
J-Alves4369bd92020-08-07 16:35:36 +0100570 dlog_verbose(" Execution state %u\n", vm->sp.execution_state);
Olivier Deprez62d99e32020-01-09 15:58:07 +0100571
J-Alves4369bd92020-08-07 16:35:36 +0100572 TRY(read_optional_uint64(&root, "load-address", 0, &vm->sp.load_addr));
573 dlog_verbose(" Load address %#x\n", vm->sp.load_addr);
Olivier Deprez62d99e32020-01-09 15:58:07 +0100574
J-Alves4369bd92020-08-07 16:35:36 +0100575 TRY(read_optional_uint64(&root, "entrypoint-offset", 0,
576 &vm->sp.ep_offset));
577 dlog_verbose(" Entry point offset %#x\n", vm->sp.ep_offset);
Olivier Deprez62d99e32020-01-09 15:58:07 +0100578
J-Alvesb37fd082020-10-22 12:29:21 +0100579 TRY(read_optional_uint16(&root, "boot-order", DEFAULT_BOOT_ORDER,
580 &vm->sp.boot_order));
J-Alves4369bd92020-08-07 16:35:36 +0100581 dlog_verbose(" Boot order %#u\n", vm->sp.boot_order);
J-Alvesb37fd082020-10-22 12:29:21 +0100582
J-Alves4369bd92020-08-07 16:35:36 +0100583 TRY(read_optional_uint8(&root, "xlat-granule", 0,
584 (uint8_t *)&vm->sp.xlat_granule));
585 dlog_verbose(" Translation granule %u\n", vm->sp.xlat_granule);
Olivier Deprez62d99e32020-01-09 15:58:07 +0100586
587 ffa_node = root;
588 if (fdt_find_child(&ffa_node, &rxtx_node_name)) {
589 if (!fdt_is_compatible(&ffa_node,
590 "arm,ffa-manifest-rx_tx-buffer")) {
591 return MANIFEST_ERROR_NOT_COMPATIBLE;
592 }
593
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100594 /*
595 * Read only phandles for now, it will be used to update buffers
596 * while parsing memory regions.
597 */
598 TRY(read_uint32(&ffa_node, "rx-buffer",
599 &vm->sp.rxtx.rx_phandle));
Olivier Deprez62d99e32020-01-09 15:58:07 +0100600
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100601 TRY(read_uint32(&ffa_node, "tx-buffer",
602 &vm->sp.rxtx.tx_phandle));
Olivier Deprez62d99e32020-01-09 15:58:07 +0100603
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100604 vm->sp.rxtx.available = true;
Olivier Deprez62d99e32020-01-09 15:58:07 +0100605 }
606
607 TRY(read_uint8(&root, "messaging-method",
608 (uint8_t *)&vm->sp.messaging_method));
J-Alves4369bd92020-08-07 16:35:36 +0100609 dlog_verbose(" Messaging method %u\n", vm->sp.messaging_method);
Olivier Deprez62d99e32020-01-09 15:58:07 +0100610
Maksims Svecovs9ddf86a2021-05-06 17:17:21 +0100611 TRY(read_bool(&root, "managed-exit", &vm->sp.managed_exit));
612
Manish Pandey6542f5c2020-04-27 14:37:46 +0100613 /* Parse memory-regions */
614 ffa_node = root;
615 if (fdt_find_child(&ffa_node, &mem_region_node_name)) {
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100616 TRY(parse_ffa_memory_region_node(&ffa_node, vm->sp.mem_regions,
Manish Pandey2145c212020-05-01 16:04:22 +0100617 &vm->sp.mem_region_count,
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100618 &vm->sp.rxtx));
Manish Pandey6542f5c2020-04-27 14:37:46 +0100619 }
Manish Pandey2145c212020-05-01 16:04:22 +0100620 dlog_verbose(" Total %u memory regions found\n",
621 vm->sp.mem_region_count);
Manish Pandey6542f5c2020-04-27 14:37:46 +0100622
Manish Pandeye68e7932020-04-23 15:29:28 +0100623 /* Parse Device-regions */
624 ffa_node = root;
625 if (fdt_find_child(&ffa_node, &dev_region_node_name)) {
Manish Pandey2145c212020-05-01 16:04:22 +0100626 TRY(parse_ffa_device_region_node(&ffa_node, vm->sp.dev_regions,
627 &vm->sp.dev_region_count));
Manish Pandeye68e7932020-04-23 15:29:28 +0100628 }
Manish Pandey2145c212020-05-01 16:04:22 +0100629 dlog_verbose(" Total %u device regions found\n",
630 vm->sp.dev_region_count);
Manish Pandeye68e7932020-04-23 15:29:28 +0100631
Olivier Deprez62d99e32020-01-09 15:58:07 +0100632 return MANIFEST_SUCCESS;
633}
634
635static enum manifest_return_code sanity_check_ffa_manifest(
636 struct manifest_vm *vm)
637{
638 uint16_t ffa_version_major;
639 uint16_t ffa_version_minor;
640 enum manifest_return_code ret_code = MANIFEST_SUCCESS;
641 const char *error_string = "specified in manifest is unsupported";
642
643 /* ensure that the SPM version is compatible */
644 ffa_version_major =
645 (vm->sp.ffa_version & 0xffff0000) >> FFA_VERSION_MAJOR_OFFSET;
646 ffa_version_minor = vm->sp.ffa_version & 0xffff;
647
648 if (ffa_version_major != FFA_VERSION_MAJOR ||
649 ffa_version_minor > FFA_VERSION_MINOR) {
J-Alves4369bd92020-08-07 16:35:36 +0100650 dlog_error("FF-A partition manifest version %s: %u.%u\n",
Olivier Deprez62d99e32020-01-09 15:58:07 +0100651 error_string, ffa_version_major, ffa_version_minor);
652 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
653 }
654
655 if (vm->sp.xlat_granule != PAGE_4KB) {
J-Alves4369bd92020-08-07 16:35:36 +0100656 dlog_error("Translation granule %s: %u\n", error_string,
Olivier Deprez62d99e32020-01-09 15:58:07 +0100657 vm->sp.xlat_granule);
658 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
659 }
660
661 if (vm->sp.execution_state != AARCH64) {
J-Alves4369bd92020-08-07 16:35:36 +0100662 dlog_error("Execution state %s: %u\n", error_string,
Olivier Deprez62d99e32020-01-09 15:58:07 +0100663 vm->sp.execution_state);
664 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
665 }
666
Raghu Krishnamurthyac5a8092021-01-03 14:23:51 -0800667 if (vm->sp.run_time_el != EL1 && vm->sp.run_time_el != S_EL1 &&
668 vm->sp.run_time_el != S_EL0) {
669 dlog_error("Exception level %s: %d\n", error_string,
Olivier Deprez62d99e32020-01-09 15:58:07 +0100670 vm->sp.run_time_el);
671 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
672 }
673
Maksims Svecovsb596eab2021-04-27 00:52:27 +0100674 if ((vm->sp.messaging_method &
675 ~(FFA_PARTITION_DIRECT_REQ_RECV | FFA_PARTITION_DIRECT_REQ_SEND |
Maksims Svecovs9ddf86a2021-05-06 17:17:21 +0100676 FFA_PARTITION_INDIRECT_MSG)) != 0U) {
Olivier Deprez62d99e32020-01-09 15:58:07 +0100677 dlog_error("Messaging method %s: %x\n", error_string,
678 vm->sp.messaging_method);
679 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
680 }
681
Raghu Krishnamurthycd1eceb2021-01-04 12:20:48 -0800682 if (vm->sp.run_time_el == S_EL0 && vm->sp.execution_ctx_count != 1) {
683 dlog_error(
684 "Exception level and execution context count %s: %d "
685 "%d\n",
686 error_string, vm->sp.run_time_el,
687 vm->sp.execution_ctx_count);
688 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
689 }
690
Olivier Deprez62d99e32020-01-09 15:58:07 +0100691 return ret_code;
692}
693
694static enum manifest_return_code parse_ffa_partition_package(
695 struct mm_stage1_locked stage1_locked, struct fdt_node *node,
696 struct manifest_vm *vm, ffa_vm_id_t vm_id, struct mpool *ppool)
697{
698 enum manifest_return_code ret = MANIFEST_ERROR_NOT_COMPATIBLE;
699 uintpaddr_t sp_pkg_addr;
700 paddr_t sp_pkg_start;
701 paddr_t sp_pkg_end;
702 struct sp_pkg_header *sp_pkg;
703 size_t sp_header_dtb_size;
704 paddr_t sp_dtb_addr;
705 struct fdt sp_fdt;
706
707 /*
708 * This must have been hinted as being an FF-A partition,
709 * return straight with failure if this is not the case.
710 */
711 if (!vm->is_ffa_partition) {
712 return MANIFEST_ERROR_NOT_COMPATIBLE;
713 }
714
715 TRY(read_uint64(node, "load_address", &sp_pkg_addr));
716 if (!is_aligned(sp_pkg_addr, PAGE_SIZE)) {
717 return MANIFEST_ERROR_NOT_COMPATIBLE;
718 }
719
J-Alves4369bd92020-08-07 16:35:36 +0100720 /* Map top of package as a single page to extract the header */
Olivier Deprez62d99e32020-01-09 15:58:07 +0100721 sp_pkg_start = pa_init(sp_pkg_addr);
722 sp_pkg_end = pa_add(sp_pkg_start, PAGE_SIZE);
723 sp_pkg = mm_identity_map(stage1_locked, sp_pkg_start,
724 pa_add(sp_pkg_start, PAGE_SIZE), MM_MODE_R,
725 ppool);
726 CHECK(sp_pkg != NULL);
727
J-Alves4369bd92020-08-07 16:35:36 +0100728 dlog_verbose("Package load address %#x\n", sp_pkg_addr);
Olivier Deprez62d99e32020-01-09 15:58:07 +0100729
730 if (sp_pkg->magic != SP_PKG_HEADER_MAGIC) {
J-Alves4369bd92020-08-07 16:35:36 +0100731 dlog_error("Invalid package magic.\n");
Olivier Deprez62d99e32020-01-09 15:58:07 +0100732 goto exit_unmap;
733 }
734
735 if (sp_pkg->version != SP_PKG_HEADER_VERSION) {
J-Alves4369bd92020-08-07 16:35:36 +0100736 dlog_error("Invalid package version.\n");
Olivier Deprez62d99e32020-01-09 15:58:07 +0100737 goto exit_unmap;
738 }
739
J-Alves4369bd92020-08-07 16:35:36 +0100740 /* Expect DTB to immediately follow header */
Olivier Deprez62d99e32020-01-09 15:58:07 +0100741 if (sp_pkg->pm_offset != sizeof(struct sp_pkg_header)) {
J-Alves4369bd92020-08-07 16:35:36 +0100742 dlog_error("Invalid package manifest offset.\n");
Olivier Deprez62d99e32020-01-09 15:58:07 +0100743 goto exit_unmap;
744 }
745
746 sp_header_dtb_size = align_up(
747 sp_pkg->pm_size + sizeof(struct sp_pkg_header), PAGE_SIZE);
748 if ((vm_id != HF_PRIMARY_VM_ID) &&
749 (sp_header_dtb_size >= vm->secondary.mem_size)) {
J-Alves4369bd92020-08-07 16:35:36 +0100750 dlog_error("Invalid package header or DT size.\n");
Olivier Deprez62d99e32020-01-09 15:58:07 +0100751 goto exit_unmap;
752 }
753
754 if (sp_header_dtb_size > PAGE_SIZE) {
755 /* Map remainder of header + DTB */
756 sp_pkg_end = pa_add(sp_pkg_start, sp_header_dtb_size);
757
758 sp_pkg = mm_identity_map(stage1_locked, sp_pkg_start,
759 sp_pkg_end, MM_MODE_R, ppool);
760 CHECK(sp_pkg != NULL);
761 }
762
763 sp_dtb_addr = pa_add(sp_pkg_start, sp_pkg->pm_offset);
J-Alves4369bd92020-08-07 16:35:36 +0100764 if (!fdt_init_from_ptr(&sp_fdt, (void *)pa_addr(sp_dtb_addr),
Olivier Deprez62d99e32020-01-09 15:58:07 +0100765 sp_pkg->pm_size)) {
766 dlog_error("FDT failed validation.\n");
767 goto exit_unmap;
768 }
769
770 ret = parse_ffa_manifest(&sp_fdt, vm);
771 if (ret != MANIFEST_SUCCESS) {
772 goto exit_unmap;
773 }
774
J-Alvesa26ea212021-03-22 14:33:47 +0000775 if (vm->sp.load_addr != sp_pkg_addr) {
776 dlog_warning(
777 "Partition's load address at its manifest differs"
778 " from specified in partition's package.\n");
779 vm->sp.load_addr = sp_pkg_addr;
780 }
781
Olivier Deprez62d99e32020-01-09 15:58:07 +0100782 ret = sanity_check_ffa_manifest(vm);
783
784exit_unmap:
785 CHECK(mm_unmap(stage1_locked, sp_pkg_start, sp_pkg_end, ppool));
786
787 return ret;
788}
789
David Brazdil7a462ec2019-08-15 12:27:47 +0100790/**
791 * Parse manifest from FDT.
792 */
Olivier Deprez62d99e32020-01-09 15:58:07 +0100793enum manifest_return_code manifest_init(struct mm_stage1_locked stage1_locked,
794 struct manifest *manifest,
795 struct memiter *manifest_fdt,
796 struct mpool *ppool)
David Brazdil7a462ec2019-08-15 12:27:47 +0100797{
David Brazdilb856be62020-03-25 10:14:55 +0000798 struct string vm_name;
799 struct fdt fdt;
David Brazdil7a462ec2019-08-15 12:27:47 +0100800 struct fdt_node hyp_node;
801 size_t i = 0;
802 bool found_primary_vm = false;
803
804 memset_s(manifest, sizeof(*manifest), 0, sizeof(*manifest));
805
David Brazdilb856be62020-03-25 10:14:55 +0000806 if (!fdt_init_from_memiter(&fdt, manifest_fdt)) {
807 return MANIFEST_ERROR_FILE_SIZE; /* TODO */
David Brazdila2358d42020-01-27 18:51:38 +0000808 }
809
David Brazdil7a462ec2019-08-15 12:27:47 +0100810 /* Find hypervisor node. */
David Brazdilb856be62020-03-25 10:14:55 +0000811 if (!fdt_find_node(&fdt, "/hypervisor", &hyp_node)) {
David Brazdil7a462ec2019-08-15 12:27:47 +0100812 return MANIFEST_ERROR_NO_HYPERVISOR_FDT_NODE;
813 }
814
David Brazdil74e9c3b2019-08-28 11:09:08 +0100815 /* Check "compatible" property. */
David Brazdilf4925382020-03-25 13:33:51 +0000816 if (!fdt_is_compatible(&hyp_node, "hafnium,hafnium")) {
David Brazdil74e9c3b2019-08-28 11:09:08 +0100817 return MANIFEST_ERROR_NOT_COMPATIBLE;
818 }
819
Olivier Deprez622ab8d2021-08-02 12:15:45 +0200820 TRY(read_bool(&hyp_node, "ffa_tee_enabled",
821 &manifest->ffa_tee_enabled));
Andrew Walbran41a49d82020-01-10 17:46:38 +0000822
David Brazdil7a462ec2019-08-15 12:27:47 +0100823 /* Iterate over reserved VM IDs and check no such nodes exist. */
Olivier Deprez2a8ee342020-08-03 15:10:44 +0200824 for (i = HF_VM_ID_BASE; i < HF_VM_ID_OFFSET; i++) {
825 ffa_vm_id_t vm_id = (ffa_vm_id_t)i - HF_VM_ID_BASE;
David Brazdil7a462ec2019-08-15 12:27:47 +0100826 struct fdt_node vm_node = hyp_node;
David Brazdil7a462ec2019-08-15 12:27:47 +0100827
David Brazdilb856be62020-03-25 10:14:55 +0000828 generate_vm_node_name(&vm_name, vm_id);
829 if (fdt_find_child(&vm_node, &vm_name)) {
David Brazdil7a462ec2019-08-15 12:27:47 +0100830 return MANIFEST_ERROR_RESERVED_VM_ID;
831 }
832 }
833
834 /* Iterate over VM nodes until we find one that does not exist. */
835 for (i = 0; i <= MAX_VMS; ++i) {
Andrew Walbranb5ab43c2020-04-30 11:32:54 +0100836 ffa_vm_id_t vm_id = HF_VM_ID_OFFSET + i;
David Brazdil7a462ec2019-08-15 12:27:47 +0100837 struct fdt_node vm_node = hyp_node;
David Brazdil7a462ec2019-08-15 12:27:47 +0100838
Olivier Deprez2a8ee342020-08-03 15:10:44 +0200839 generate_vm_node_name(&vm_name, vm_id - HF_VM_ID_BASE);
David Brazdilb856be62020-03-25 10:14:55 +0000840 if (!fdt_find_child(&vm_node, &vm_name)) {
David Brazdil7a462ec2019-08-15 12:27:47 +0100841 break;
842 }
843
844 if (i == MAX_VMS) {
845 return MANIFEST_ERROR_TOO_MANY_VMS;
846 }
847
848 if (vm_id == HF_PRIMARY_VM_ID) {
849 CHECK(found_primary_vm == false); /* sanity check */
850 found_primary_vm = true;
851 }
852
David Brazdil0251b942019-09-10 15:59:50 +0100853 manifest->vm_count = i + 1;
Olivier Deprez62d99e32020-01-09 15:58:07 +0100854
855 TRY(parse_vm_common(&vm_node, &manifest->vm[i], vm_id));
856
857 if (manifest->vm[i].is_ffa_partition) {
858 TRY(parse_ffa_partition_package(stage1_locked, &vm_node,
859 &manifest->vm[i], vm_id,
860 ppool));
861 } else {
862 TRY(parse_vm(&vm_node, &manifest->vm[i], vm_id));
863 }
David Brazdil7a462ec2019-08-15 12:27:47 +0100864 }
865
Olivier Deprezfb05f3c2020-11-10 17:48:04 +0100866 if (!found_primary_vm && vm_id_is_current_world(HF_PRIMARY_VM_ID)) {
David Brazdil7a462ec2019-08-15 12:27:47 +0100867 return MANIFEST_ERROR_NO_PRIMARY_VM;
868 }
869
870 return MANIFEST_SUCCESS;
871}
872
873const char *manifest_strerror(enum manifest_return_code ret_code)
874{
875 switch (ret_code) {
876 case MANIFEST_SUCCESS:
877 return "Success";
David Brazdila2358d42020-01-27 18:51:38 +0000878 case MANIFEST_ERROR_FILE_SIZE:
879 return "Total size in header does not match file size";
Olivier Deprez62d99e32020-01-09 15:58:07 +0100880 case MANIFEST_ERROR_MALFORMED_DTB:
881 return "Malformed device tree blob";
David Brazdila2358d42020-01-27 18:51:38 +0000882 case MANIFEST_ERROR_NO_ROOT_NODE:
883 return "Could not find root node in manifest";
David Brazdil7a462ec2019-08-15 12:27:47 +0100884 case MANIFEST_ERROR_NO_HYPERVISOR_FDT_NODE:
885 return "Could not find \"hypervisor\" node in manifest";
David Brazdil74e9c3b2019-08-28 11:09:08 +0100886 case MANIFEST_ERROR_NOT_COMPATIBLE:
887 return "Hypervisor manifest entry not compatible with Hafnium";
David Brazdil7a462ec2019-08-15 12:27:47 +0100888 case MANIFEST_ERROR_RESERVED_VM_ID:
889 return "Manifest defines a VM with a reserved ID";
890 case MANIFEST_ERROR_NO_PRIMARY_VM:
891 return "Manifest does not contain a primary VM entry";
892 case MANIFEST_ERROR_TOO_MANY_VMS:
893 return "Manifest specifies more VMs than Hafnium has "
894 "statically allocated space for";
895 case MANIFEST_ERROR_PROPERTY_NOT_FOUND:
896 return "Property not found";
897 case MANIFEST_ERROR_MALFORMED_STRING:
898 return "Malformed string property";
David Brazdil0dbb41f2019-09-09 18:03:35 +0100899 case MANIFEST_ERROR_STRING_TOO_LONG:
900 return "String too long";
David Brazdil7a462ec2019-08-15 12:27:47 +0100901 case MANIFEST_ERROR_MALFORMED_INTEGER:
902 return "Malformed integer property";
903 case MANIFEST_ERROR_INTEGER_OVERFLOW:
904 return "Integer overflow";
Andrew Scullae9962e2019-10-03 16:51:16 +0100905 case MANIFEST_ERROR_MALFORMED_INTEGER_LIST:
906 return "Malformed integer list property";
Andrew Scullb2c3a242019-11-04 13:52:36 +0000907 case MANIFEST_ERROR_MALFORMED_BOOLEAN:
908 return "Malformed boolean property";
Manish Pandey6542f5c2020-04-27 14:37:46 +0100909 case MANIFEST_ERROR_MEMORY_REGION_NODE_EMPTY:
910 return "Memory-region node should have at least one entry";
Manish Pandeye68e7932020-04-23 15:29:28 +0100911 case MANIFEST_ERROR_DEVICE_REGION_NODE_EMPTY:
912 return "Device-region node should have at least one entry";
Manish Pandeyf06c9072020-09-29 15:41:58 +0100913 case MANIFEST_ERROR_RXTX_SIZE_MISMATCH:
914 return "RX and TX buffers should be of same size";
David Brazdil7a462ec2019-08-15 12:27:47 +0100915 }
916
917 panic("Unexpected manifest return code.");
918}