blob: b317fc819f4d47998878cb0e1c807d98faf9a6ea [file] [log] [blame]
David Brazdil7a462ec2019-08-15 12:27:47 +01001/*
2 * Copyright 2019 The Hafnium Authors.
3 *
Andrew Walbrane959ec12020-06-17 15:01:09 +01004 * Use of this source code is governed by a BSD-style
5 * license that can be found in the LICENSE file or at
6 * https://opensource.org/licenses/BSD-3-Clause.
David Brazdil7a462ec2019-08-15 12:27:47 +01007 */
8
9#include "hf/manifest.h"
10
J-Alvesd8a1d362023-03-08 11:15:28 +000011#include <stddef.h>
J-Alves77b6f4f2023-03-15 11:34:49 +000012#include <stdint.h>
J-Alvesd8a1d362023-03-08 11:15:28 +000013
J-Alves35315782022-01-25 17:58:32 +000014#include "hf/arch/types.h"
J-Alves77b6f4f2023-03-15 11:34:49 +000015#include "hf/arch/vmid_base.h"
J-Alves35315782022-01-25 17:58:32 +000016
David Brazdil7a462ec2019-08-15 12:27:47 +010017#include "hf/addr.h"
Daniel Boulbya2f8c662021-11-26 17:52:53 +000018#include "hf/assert.h"
J-Alves35315782022-01-25 17:58:32 +000019#include "hf/boot_info.h"
J-Alves77b6f4f2023-03-15 11:34:49 +000020#include "hf/boot_params.h"
David Brazdil7a462ec2019-08-15 12:27:47 +010021#include "hf/check.h"
Andrew Scullae9962e2019-10-03 16:51:16 +010022#include "hf/dlog.h"
J-Alves77b6f4f2023-03-15 11:34:49 +000023#include "hf/fdt.h"
24#include "hf/mm.h"
25#include "hf/mpool.h"
J-Alves2f86c1e2022-02-23 18:44:19 +000026#include "hf/sp_pkg.h"
David Brazdil7a462ec2019-08-15 12:27:47 +010027#include "hf/static_assert.h"
28#include "hf/std.h"
29
30#define TRY(expr) \
31 do { \
32 enum manifest_return_code ret_code = (expr); \
33 if (ret_code != MANIFEST_SUCCESS) { \
34 return ret_code; \
35 } \
36 } while (0)
37
David Brazdilb856be62020-03-25 10:14:55 +000038#define VM_ID_MAX (HF_VM_ID_OFFSET + MAX_VMS - 1)
39#define VM_ID_MAX_DIGITS (5)
40#define VM_NAME_EXTRA_CHARS (3) /* "vm" + number + '\0' */
41#define VM_NAME_MAX_SIZE (VM_ID_MAX_DIGITS + VM_NAME_EXTRA_CHARS)
42static_assert(VM_NAME_MAX_SIZE <= STRING_MAX_SIZE,
43 "VM name does not fit into a struct string.");
44static_assert(VM_ID_MAX <= 99999, "Insufficient VM_NAME_BUF_SIZE");
Olivier Deprez2a8ee342020-08-03 15:10:44 +020045static_assert((HF_OTHER_WORLD_ID > VM_ID_MAX) ||
46 (HF_OTHER_WORLD_ID < HF_VM_ID_BASE),
Andrew Walbran9daa57e2019-09-27 13:33:20 +010047 "TrustZone VM ID clashes with normal VM range.");
David Brazdil7a462ec2019-08-15 12:27:47 +010048
Kathleen Capella4a2a6e72023-04-21 14:43:26 -040049/* Bitmap to track boot order values in use. */
50#define BOOT_ORDER_ENTRY_BITS (sizeof(uint64_t) * 8)
51#define BOOT_ORDER_MAP_ENTRIES \
52 ((DEFAULT_BOOT_ORDER + (BOOT_ORDER_ENTRY_BITS - 1)) / \
53 BOOT_ORDER_ENTRY_BITS)
54
Daniel Boulby801f8ef2022-06-27 14:21:01 +010055/**
J-Alves596049f2023-03-15 11:40:24 +000056 * A struct to keep track of the partitions properties during early boot
57 * manifest parsing:
58 * - Interrupts ID.
59 * - Physical memory ranges.
Daniel Boulby801f8ef2022-06-27 14:21:01 +010060 */
Olivier Deprez93644652022-09-09 11:01:12 +020061struct manifest_data {
62 struct manifest manifest;
Daniel Boulby4ca50f02022-07-29 18:29:34 +010063 struct interrupt_bitmap intids;
J-Alves596049f2023-03-15 11:40:24 +000064 /*
65 * Allocate enough for the maximum amount of memory regions defined via
66 * the partitions manifest, and regions for each partition
67 * address-space.
68 */
Daniel Boulby4d165722023-11-21 13:46:42 +000069 struct mem_range mem_regions[PARTITION_MAX_MEMORY_REGIONS * MAX_VMS +
70 PARTITION_MAX_DEVICE_REGIONS * MAX_VMS +
71 MAX_VMS];
Kathleen Capella4a2a6e72023-04-21 14:43:26 -040072 uint64_t boot_order_values[BOOT_ORDER_MAP_ENTRIES];
Daniel Boulby801f8ef2022-06-27 14:21:01 +010073};
Olivier Deprez93644652022-09-09 11:01:12 +020074
Daniel Boulby801f8ef2022-06-27 14:21:01 +010075/**
Daniel Boulbya7e9e182022-06-27 14:21:01 +010076 * Calculate the number of entries in the ppool that are required to
Olivier Deprez93644652022-09-09 11:01:12 +020077 * store the manifest_data struct.
Daniel Boulby801f8ef2022-06-27 14:21:01 +010078 */
J-Alves596049f2023-03-15 11:40:24 +000079static const size_t manifest_data_ppool_entries =
Olivier Deprez93644652022-09-09 11:01:12 +020080 (align_up(sizeof(struct manifest_data), MM_PPOOL_ENTRY_SIZE) /
Daniel Boulbya7e9e182022-06-27 14:21:01 +010081 MM_PPOOL_ENTRY_SIZE);
82
Olivier Deprez93644652022-09-09 11:01:12 +020083static struct manifest_data *manifest_data;
84/* Index used to track the number of memory regions allocated. */
Daniel Boulbya7e9e182022-06-27 14:21:01 +010085static size_t allocated_mem_regions_index = 0;
Daniel Boulby801f8ef2022-06-27 14:21:01 +010086
Kathleen Capella4a2a6e72023-04-21 14:43:26 -040087static bool check_boot_order(uint16_t boot_order)
88{
89 uint16_t i;
90 uint64_t boot_order_mask;
91
92 if (boot_order == DEFAULT_BOOT_ORDER) {
93 return true;
94 }
95 if (boot_order > DEFAULT_BOOT_ORDER) {
96 dlog_error("Boot order should not exceed %x",
97 DEFAULT_BOOT_ORDER);
98 return false;
99 }
100
101 i = boot_order / BOOT_ORDER_ENTRY_BITS;
102 boot_order_mask = 1 << (boot_order % BOOT_ORDER_ENTRY_BITS);
103
104 if ((boot_order_mask & manifest_data->boot_order_values[i]) != 0U) {
105 dlog_error("Boot order must be a unique value.");
106 return false;
107 }
108
109 manifest_data->boot_order_values[i] |= boot_order_mask;
110
111 return true;
112}
113
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100114/**
Olivier Deprez93644652022-09-09 11:01:12 +0200115 * Allocates and clear memory for the manifest data in the given memory pool.
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100116 * Returns true if the memory is successfully allocated.
117 */
Olivier Deprez93644652022-09-09 11:01:12 +0200118static bool manifest_data_init(struct mpool *ppool)
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100119{
Olivier Deprez93644652022-09-09 11:01:12 +0200120 manifest_data = (struct manifest_data *)mpool_alloc_contiguous(
121 ppool, manifest_data_ppool_entries, 1);
J-Alves5c0ae6f2023-06-14 15:20:21 +0100122
123 assert(manifest_data != NULL);
124
Olivier Deprez93644652022-09-09 11:01:12 +0200125 memset_s(manifest_data, sizeof(struct manifest_data), 0,
126 sizeof(struct manifest_data));
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100127
Olivier Deprez93644652022-09-09 11:01:12 +0200128 return manifest_data != NULL;
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100129}
130
131/**
Olivier Deprez93644652022-09-09 11:01:12 +0200132 * Frees the memory used for the manifest data in the given memory pool.
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100133 */
Olivier Deprez93644652022-09-09 11:01:12 +0200134static void manifest_data_deinit(struct mpool *ppool)
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100135{
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100136 /**
Olivier Deprez93644652022-09-09 11:01:12 +0200137 * Clear and return the memory used for the manifest_data struct to the
138 * memory pool.
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100139 */
Olivier Deprez93644652022-09-09 11:01:12 +0200140 memset_s(manifest_data, sizeof(struct manifest_data), 0,
141 sizeof(struct manifest_data));
142 mpool_add_chunk(ppool, manifest_data, manifest_data_ppool_entries);
143
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100144 /**
145 * Reset the index used for tracking the number of memory regions
146 * allocated.
147 */
148 allocated_mem_regions_index = 0;
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100149}
150
J-Alves19e20cf2023-08-02 12:48:55 +0100151static inline size_t count_digits(ffa_id_t vm_id)
David Brazdilb856be62020-03-25 10:14:55 +0000152{
153 size_t digits = 0;
154
155 do {
156 digits++;
157 vm_id /= 10;
158 } while (vm_id);
159 return digits;
160}
161
David Brazdil7a462ec2019-08-15 12:27:47 +0100162/**
163 * Generates a string with the two letters "vm" followed by an integer.
164 * Assumes `buf` is of size VM_NAME_BUF_SIZE.
165 */
J-Alves19e20cf2023-08-02 12:48:55 +0100166static void generate_vm_node_name(struct string *str, ffa_id_t vm_id)
David Brazdil7a462ec2019-08-15 12:27:47 +0100167{
168 static const char *digits = "0123456789";
David Brazdilb856be62020-03-25 10:14:55 +0000169 size_t vm_id_digits = count_digits(vm_id);
170 char *base = str->data;
171 char *ptr = base + (VM_NAME_EXTRA_CHARS + vm_id_digits);
David Brazdil7a462ec2019-08-15 12:27:47 +0100172
Daniel Boulbya2f8c662021-11-26 17:52:53 +0000173 assert(vm_id_digits <= VM_ID_MAX_DIGITS);
David Brazdil7a462ec2019-08-15 12:27:47 +0100174 *(--ptr) = '\0';
175 do {
176 *(--ptr) = digits[vm_id % 10];
177 vm_id /= 10;
178 } while (vm_id);
179 *(--ptr) = 'm';
180 *(--ptr) = 'v';
Daniel Boulbya2f8c662021-11-26 17:52:53 +0000181 assert(ptr == base);
David Brazdil7a462ec2019-08-15 12:27:47 +0100182}
183
Andrew Scullae9962e2019-10-03 16:51:16 +0100184/**
Andrew Scullb2c3a242019-11-04 13:52:36 +0000185 * Read a boolean property: true if present; false if not. If present, the value
186 * of the property must be empty else it is considered malformed.
Andrew Scullae9962e2019-10-03 16:51:16 +0100187 */
Andrew Scullb2c3a242019-11-04 13:52:36 +0000188static enum manifest_return_code read_bool(const struct fdt_node *node,
189 const char *property, bool *out)
Andrew Scullae9962e2019-10-03 16:51:16 +0100190{
David Brazdilb856be62020-03-25 10:14:55 +0000191 struct memiter data;
192 bool present = fdt_read_property(node, property, &data);
Andrew Scullae9962e2019-10-03 16:51:16 +0100193
David Brazdilb856be62020-03-25 10:14:55 +0000194 if (present && memiter_size(&data) != 0) {
Andrew Scullb2c3a242019-11-04 13:52:36 +0000195 return MANIFEST_ERROR_MALFORMED_BOOLEAN;
196 }
197
198 *out = present;
199 return MANIFEST_SUCCESS;
Andrew Scullae9962e2019-10-03 16:51:16 +0100200}
201
Andrew Scull72b43c02019-09-18 13:53:45 +0100202static enum manifest_return_code read_string(const struct fdt_node *node,
David Brazdil136f2942019-09-23 14:11:03 +0100203 const char *property,
204 struct string *out)
Andrew Scull72b43c02019-09-18 13:53:45 +0100205{
David Brazdilb856be62020-03-25 10:14:55 +0000206 struct memiter data;
Andrew Scull72b43c02019-09-18 13:53:45 +0100207
David Brazdilb856be62020-03-25 10:14:55 +0000208 if (!fdt_read_property(node, property, &data)) {
Andrew Scull72b43c02019-09-18 13:53:45 +0100209 return MANIFEST_ERROR_PROPERTY_NOT_FOUND;
210 }
211
David Brazdilb856be62020-03-25 10:14:55 +0000212 switch (string_init(out, &data)) {
David Brazdil136f2942019-09-23 14:11:03 +0100213 case STRING_SUCCESS:
214 return MANIFEST_SUCCESS;
215 case STRING_ERROR_INVALID_INPUT:
216 return MANIFEST_ERROR_MALFORMED_STRING;
217 case STRING_ERROR_TOO_LONG:
218 return MANIFEST_ERROR_STRING_TOO_LONG;
219 }
Andrew Scull72b43c02019-09-18 13:53:45 +0100220}
221
222static enum manifest_return_code read_optional_string(
David Brazdil136f2942019-09-23 14:11:03 +0100223 const struct fdt_node *node, const char *property, struct string *out)
Andrew Scull72b43c02019-09-18 13:53:45 +0100224{
David Brazdil136f2942019-09-23 14:11:03 +0100225 enum manifest_return_code ret;
Andrew Scull72b43c02019-09-18 13:53:45 +0100226
David Brazdil136f2942019-09-23 14:11:03 +0100227 ret = read_string(node, property, out);
228 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
229 string_init_empty(out);
230 ret = MANIFEST_SUCCESS;
Andrew Scull72b43c02019-09-18 13:53:45 +0100231 }
David Brazdil136f2942019-09-23 14:11:03 +0100232 return ret;
Andrew Scull72b43c02019-09-18 13:53:45 +0100233}
234
David Brazdil7a462ec2019-08-15 12:27:47 +0100235static enum manifest_return_code read_uint64(const struct fdt_node *node,
236 const char *property,
237 uint64_t *out)
238{
David Brazdilb856be62020-03-25 10:14:55 +0000239 struct memiter data;
David Brazdil7a462ec2019-08-15 12:27:47 +0100240
David Brazdilb856be62020-03-25 10:14:55 +0000241 if (!fdt_read_property(node, property, &data)) {
David Brazdil7a462ec2019-08-15 12:27:47 +0100242 return MANIFEST_ERROR_PROPERTY_NOT_FOUND;
243 }
244
David Brazdilb856be62020-03-25 10:14:55 +0000245 if (!fdt_parse_number(&data, memiter_size(&data), out)) {
David Brazdil7a462ec2019-08-15 12:27:47 +0100246 return MANIFEST_ERROR_MALFORMED_INTEGER;
247 }
248
249 return MANIFEST_SUCCESS;
250}
251
David Brazdil080ee312020-02-25 15:30:30 -0800252static enum manifest_return_code read_optional_uint64(
253 const struct fdt_node *node, const char *property,
254 uint64_t default_value, uint64_t *out)
255{
256 enum manifest_return_code ret;
257
258 ret = read_uint64(node, property, out);
259 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
260 *out = default_value;
261 return MANIFEST_SUCCESS;
262 }
263 return ret;
264}
265
Olivier Deprez62d99e32020-01-09 15:58:07 +0100266static enum manifest_return_code read_uint32(const struct fdt_node *node,
267 const char *property,
268 uint32_t *out)
269{
270 uint64_t value;
271
272 TRY(read_uint64(node, property, &value));
273
274 if (value > UINT32_MAX) {
275 return MANIFEST_ERROR_INTEGER_OVERFLOW;
276 }
277
278 *out = (uint32_t)value;
279 return MANIFEST_SUCCESS;
280}
281
Manish Pandeye68e7932020-04-23 15:29:28 +0100282static enum manifest_return_code read_optional_uint32(
283 const struct fdt_node *node, const char *property,
284 uint32_t default_value, uint32_t *out)
285{
286 enum manifest_return_code ret;
287
288 ret = read_uint32(node, property, out);
289 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
290 *out = default_value;
291 return MANIFEST_SUCCESS;
292 }
293 return ret;
294}
295
David Brazdil7a462ec2019-08-15 12:27:47 +0100296static enum manifest_return_code read_uint16(const struct fdt_node *node,
297 const char *property,
298 uint16_t *out)
299{
300 uint64_t value;
301
302 TRY(read_uint64(node, property, &value));
David Brazdil7a462ec2019-08-15 12:27:47 +0100303 if (value > UINT16_MAX) {
304 return MANIFEST_ERROR_INTEGER_OVERFLOW;
305 }
306
307 *out = (uint16_t)value;
308 return MANIFEST_SUCCESS;
309}
310
J-Alvesb37fd082020-10-22 12:29:21 +0100311static enum manifest_return_code read_optional_uint16(
312 const struct fdt_node *node, const char *property,
313 uint16_t default_value, uint16_t *out)
314{
315 enum manifest_return_code ret;
316
317 ret = read_uint16(node, property, out);
318 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
319 *out = default_value;
320 return MANIFEST_SUCCESS;
321 }
322
Kathleen Capella4a2a6e72023-04-21 14:43:26 -0400323 return ret;
J-Alvesb37fd082020-10-22 12:29:21 +0100324}
325
Olivier Deprez62d99e32020-01-09 15:58:07 +0100326static enum manifest_return_code read_uint8(const struct fdt_node *node,
327 const char *property, uint8_t *out)
328{
329 uint64_t value;
330
331 TRY(read_uint64(node, property, &value));
332
333 if (value > UINT8_MAX) {
334 return MANIFEST_ERROR_INTEGER_OVERFLOW;
335 }
336
337 *out = (uint8_t)value;
338 return MANIFEST_SUCCESS;
339}
340
J-Alves4369bd92020-08-07 16:35:36 +0100341static enum manifest_return_code read_optional_uint8(
342 const struct fdt_node *node, const char *property,
343 uint8_t default_value, uint8_t *out)
344{
345 enum manifest_return_code ret;
346
347 ret = read_uint8(node, property, out);
348 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
349 *out = default_value;
350 return MANIFEST_SUCCESS;
351 }
352
353 return MANIFEST_SUCCESS;
354}
355
Andrew Scullae9962e2019-10-03 16:51:16 +0100356struct uint32list_iter {
357 struct memiter mem_it;
358};
359
J-Alves4369bd92020-08-07 16:35:36 +0100360static enum manifest_return_code read_uint32list(const struct fdt_node *node,
361 const char *property,
362 struct uint32list_iter *out)
Andrew Scullae9962e2019-10-03 16:51:16 +0100363{
David Brazdilb856be62020-03-25 10:14:55 +0000364 struct memiter data;
Andrew Scullae9962e2019-10-03 16:51:16 +0100365
David Brazdilb856be62020-03-25 10:14:55 +0000366 if (!fdt_read_property(node, property, &data)) {
Andrew Scullae9962e2019-10-03 16:51:16 +0100367 memiter_init(&out->mem_it, NULL, 0);
J-Alves4369bd92020-08-07 16:35:36 +0100368 return MANIFEST_ERROR_PROPERTY_NOT_FOUND;
Andrew Scullae9962e2019-10-03 16:51:16 +0100369 }
370
David Brazdilb856be62020-03-25 10:14:55 +0000371 if ((memiter_size(&data) % sizeof(uint32_t)) != 0) {
Andrew Scullae9962e2019-10-03 16:51:16 +0100372 return MANIFEST_ERROR_MALFORMED_INTEGER_LIST;
373 }
374
David Brazdilb856be62020-03-25 10:14:55 +0000375 out->mem_it = data;
Andrew Scullae9962e2019-10-03 16:51:16 +0100376 return MANIFEST_SUCCESS;
377}
378
J-Alves4369bd92020-08-07 16:35:36 +0100379static enum manifest_return_code read_optional_uint32list(
380 const struct fdt_node *node, const char *property,
381 struct uint32list_iter *out)
382{
383 enum manifest_return_code ret = read_uint32list(node, property, out);
384
385 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
386 return MANIFEST_SUCCESS;
387 }
388 return ret;
389}
390
Andrew Scullae9962e2019-10-03 16:51:16 +0100391static bool uint32list_has_next(const struct uint32list_iter *list)
392{
393 return memiter_size(&list->mem_it) > 0;
394}
395
David Brazdil5ea99462020-03-25 13:01:47 +0000396static enum manifest_return_code uint32list_get_next(
397 struct uint32list_iter *list, uint32_t *out)
Andrew Scullae9962e2019-10-03 16:51:16 +0100398{
Andrew Scullae9962e2019-10-03 16:51:16 +0100399 uint64_t num;
400
401 CHECK(uint32list_has_next(list));
David Brazdilb856be62020-03-25 10:14:55 +0000402 if (!fdt_parse_number(&list->mem_it, sizeof(uint32_t), &num)) {
Andrew Scullae9962e2019-10-03 16:51:16 +0100403 return MANIFEST_ERROR_MALFORMED_INTEGER;
404 }
405
David Brazdil5ea99462020-03-25 13:01:47 +0000406 *out = (uint32_t)num;
407 return MANIFEST_SUCCESS;
Andrew Scullae9962e2019-10-03 16:51:16 +0100408}
409
Olivier Deprez62d99e32020-01-09 15:58:07 +0100410static enum manifest_return_code parse_vm_common(const struct fdt_node *node,
411 struct manifest_vm *vm,
J-Alves19e20cf2023-08-02 12:48:55 +0100412 ffa_id_t vm_id)
David Brazdil7a462ec2019-08-15 12:27:47 +0100413{
Andrew Scullae9962e2019-10-03 16:51:16 +0100414 struct uint32list_iter smcs;
David Brazdil5ea99462020-03-25 13:01:47 +0000415 size_t idx;
Andrew Scullae9962e2019-10-03 16:51:16 +0100416
Olivier Deprez62d99e32020-01-09 15:58:07 +0100417 TRY(read_bool(node, "is_ffa_partition", &vm->is_ffa_partition));
418
Raghu Krishnamurthyb49549e2021-07-02 08:27:38 -0700419 TRY(read_bool(node, "hyp_loaded", &vm->is_hyp_loaded));
420
David Brazdil136f2942019-09-23 14:11:03 +0100421 TRY(read_string(node, "debug_name", &vm->debug_name));
Andrew Scullae9962e2019-10-03 16:51:16 +0100422
423 TRY(read_optional_uint32list(node, "smc_whitelist", &smcs));
424 while (uint32list_has_next(&smcs) &&
425 vm->smc_whitelist.smc_count < MAX_SMCS) {
David Brazdil5ea99462020-03-25 13:01:47 +0000426 idx = vm->smc_whitelist.smc_count++;
427 TRY(uint32list_get_next(&smcs, &vm->smc_whitelist.smcs[idx]));
Andrew Scullae9962e2019-10-03 16:51:16 +0100428 }
429
430 if (uint32list_has_next(&smcs)) {
Andrew Walbran17eebf92020-02-05 16:35:49 +0000431 dlog_warning("%s SMC whitelist too long.\n", vm->debug_name);
Andrew Scullae9962e2019-10-03 16:51:16 +0100432 }
433
Andrew Scullb2c3a242019-11-04 13:52:36 +0000434 TRY(read_bool(node, "smc_whitelist_permissive",
435 &vm->smc_whitelist.permissive));
Andrew Scullae9962e2019-10-03 16:51:16 +0100436
Olivier Deprez62d99e32020-01-09 15:58:07 +0100437 if (vm_id != HF_PRIMARY_VM_ID) {
438 TRY(read_uint64(node, "mem_size", &vm->secondary.mem_size));
439 TRY(read_uint16(node, "vcpu_count", &vm->secondary.vcpu_count));
Fuad Tabba50469e02020-06-30 15:14:28 +0100440 TRY(read_optional_string(node, "fdt_filename",
441 &vm->secondary.fdt_filename));
Olivier Deprez62d99e32020-01-09 15:58:07 +0100442 }
443
444 return MANIFEST_SUCCESS;
445}
446
447static enum manifest_return_code parse_vm(struct fdt_node *node,
448 struct manifest_vm *vm,
J-Alves19e20cf2023-08-02 12:48:55 +0100449 ffa_id_t vm_id)
Olivier Deprez62d99e32020-01-09 15:58:07 +0100450{
451 TRY(read_optional_string(node, "kernel_filename",
452 &vm->kernel_filename));
453
David Brazdile6f83222019-09-23 14:47:37 +0100454 if (vm_id == HF_PRIMARY_VM_ID) {
455 TRY(read_optional_string(node, "ramdisk_filename",
456 &vm->primary.ramdisk_filename));
David Brazdil080ee312020-02-25 15:30:30 -0800457 TRY(read_optional_uint64(node, "boot_address",
458 MANIFEST_INVALID_ADDRESS,
459 &vm->primary.boot_address));
David Brazdil7a462ec2019-08-15 12:27:47 +0100460 }
Raghu Krishnamurthy988a5e72021-02-27 21:46:06 -0800461 TRY(read_optional_uint8(node, "exception-level", (uint8_t)EL1,
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -0700462 (uint8_t *)&vm->partition.run_time_el));
Olivier Deprez62d99e32020-01-09 15:58:07 +0100463
David Brazdil7a462ec2019-08-15 12:27:47 +0100464 return MANIFEST_SUCCESS;
465}
466
J-Alves77b6f4f2023-03-15 11:34:49 +0000467static bool is_memory_region_within_ranges(uintptr_t base_address,
468 uint32_t page_count,
469 const struct mem_range *ranges,
470 const size_t ranges_size)
471{
472 uintptr_t region_end =
473 base_address + ((uintptr_t)page_count * PAGE_SIZE - 1);
474
475 for (size_t i = 0; i < ranges_size; i++) {
476 uintptr_t base = (uintptr_t)pa_addr(ranges[i].begin);
477 uintptr_t end = (uintptr_t)pa_addr(ranges[i].end);
478
479 if ((base_address >= base && base_address <= end) ||
480 (region_end >= base && region_end <= end)) {
481 return true;
482 }
483 }
484
485 return false;
486}
487
488void dump_memory_ranges(const struct mem_range *ranges,
489 const size_t ranges_size, bool ns)
490{
491 if (LOG_LEVEL < LOG_LEVEL_VERBOSE) {
492 return;
493 }
494
495 dlog("%s Memory ranges:\n", ns ? "NS" : "S");
496
497 for (size_t i = 0; i < ranges_size; i++) {
498 uintptr_t begin = pa_addr(ranges[i].begin);
499 uintptr_t end = pa_addr(ranges[i].end);
500 size_t page_count =
501 align_up(pa_difference(ranges[i].begin, ranges[i].end),
502 PAGE_SIZE) /
503 PAGE_SIZE;
504
505 dlog(" [%x - %x (%u pages)]\n", begin, end, page_count);
506 }
507}
508
509/**
510 * Check the partition's assigned memory is contained in the memory ranges
511 * configured for the SWd, in the SPMC's manifest.
512 */
513static enum manifest_return_code check_partition_memory_is_valid(
514 uintptr_t base_address, uint32_t page_count, uint32_t attributes,
515 const struct boot_params *params)
516{
517 bool is_secure_region =
518 (attributes & MANIFEST_REGION_ATTR_SECURITY) == 0U;
Daniel Boulby4339edc2024-02-21 14:59:00 +0000519 bool is_device_region =
520 (attributes & MANIFEST_REGION_ATTR_MEMORY_TYPE_DEVICE) != 0U;
521 const struct mem_range *ranges_from_manifest;
522 size_t ranges_count;
523 bool within_ranges;
524 enum manifest_return_code error_return;
525
526 if (!is_device_region) {
527 ranges_from_manifest = is_secure_region ? params->mem_ranges
528 : params->ns_mem_ranges;
529 ranges_count = is_secure_region ? params->mem_ranges_count
530 : params->ns_mem_ranges_count;
531 error_return = MANIFEST_ERROR_MEM_REGION_INVALID;
532 } else {
533 ranges_from_manifest = is_secure_region
534 ? params->device_mem_ranges
535 : params->ns_device_mem_ranges;
536 ranges_count = is_secure_region
537 ? params->device_mem_ranges_count
538 : params->ns_device_mem_ranges_count;
539 error_return = MANIFEST_ERROR_DEVICE_MEM_REGION_INVALID;
540 }
541
542 within_ranges = is_memory_region_within_ranges(
J-Alves77b6f4f2023-03-15 11:34:49 +0000543 base_address, page_count, ranges_from_manifest, ranges_count);
544
Daniel Boulby4339edc2024-02-21 14:59:00 +0000545 return within_ranges ? MANIFEST_SUCCESS : error_return;
J-Alves77b6f4f2023-03-15 11:34:49 +0000546}
547
548/*
549 * Keep track of the memory allocated by partitions. This includes memory region
Daniel Boulby4d165722023-11-21 13:46:42 +0000550 * nodes and device region nodes defined in their respective partition
551 * manifests, as well address space defined from their load address.
J-Alves77b6f4f2023-03-15 11:34:49 +0000552 */
553static enum manifest_return_code check_and_record_memory_used(
Varun Wadekar4afbfd72022-10-13 14:30:18 +0100554 uintptr_t base_address, uint32_t page_count)
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100555{
J-Alves77b6f4f2023-03-15 11:34:49 +0000556 bool overlap_of_regions;
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100557
Varun Wadekar4afbfd72022-10-13 14:30:18 +0100558 if (page_count == 0U) {
559 dlog_error(
Daniel Boulbyc1a613d2022-10-18 11:26:17 +0100560 "Empty memory region defined with base address: %#x.\n",
Varun Wadekar4afbfd72022-10-13 14:30:18 +0100561 base_address);
562 return MANIFEST_ERROR_MEM_REGION_EMPTY;
563 }
564
Daniel Boulbyc1a613d2022-10-18 11:26:17 +0100565 if (!is_aligned(base_address, PAGE_SIZE)) {
566 dlog_error("base_address (%#x) is not aligned to page size.\n",
567 base_address);
568 return MANIFEST_ERROR_MEM_REGION_UNALIGNED;
569 }
570
J-Alves77b6f4f2023-03-15 11:34:49 +0000571 overlap_of_regions = is_memory_region_within_ranges(
572 base_address, page_count, manifest_data->mem_regions,
573 allocated_mem_regions_index);
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100574
J-Alves77b6f4f2023-03-15 11:34:49 +0000575 if (!overlap_of_regions) {
576 paddr_t begin = pa_init(base_address);
577
578 manifest_data->mem_regions[allocated_mem_regions_index].begin =
579 begin;
580 manifest_data->mem_regions[allocated_mem_regions_index].end =
581 pa_add(begin, page_count * PAGE_SIZE - 1);
582 allocated_mem_regions_index++;
583
584 return MANIFEST_SUCCESS;
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100585 }
586
J-Alves77b6f4f2023-03-15 11:34:49 +0000587 return MANIFEST_ERROR_MEM_REGION_OVERLAP;
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100588}
589
Manish Pandey6542f5c2020-04-27 14:37:46 +0100590static enum manifest_return_code parse_ffa_memory_region_node(
Karl Meakinf6d49402023-04-04 18:14:26 +0100591 struct fdt_node *mem_node, uintptr_t load_address,
592 struct memory_region *mem_regions, uint16_t *count, struct rx_tx *rxtx,
J-Alves77b6f4f2023-03-15 11:34:49 +0000593 const struct boot_params *boot_params)
Manish Pandey6542f5c2020-04-27 14:37:46 +0100594{
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100595 uint32_t phandle;
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -0700596 uint16_t i = 0;
Madhukar Pappireddy3c2b7912023-10-11 14:47:27 -0500597 uint32_t j = 0;
Karl Meakinf6d49402023-04-04 18:14:26 +0100598 uintptr_t relative_address;
Madhukar Pappireddy3c2b7912023-10-11 14:47:27 -0500599 struct uint32list_iter list;
Manish Pandey6542f5c2020-04-27 14:37:46 +0100600
601 dlog_verbose(" Partition memory regions\n");
602
603 if (!fdt_is_compatible(mem_node, "arm,ffa-manifest-memory-regions")) {
604 return MANIFEST_ERROR_NOT_COMPATIBLE;
605 }
606
607 if (!fdt_first_child(mem_node)) {
608 return MANIFEST_ERROR_MEMORY_REGION_NODE_EMPTY;
609 }
610
611 do {
612 dlog_verbose(" Memory Region[%u]\n", i);
613
614 TRY(read_optional_string(mem_node, "description",
615 &mem_regions[i].name));
616 dlog_verbose(" Name: %s\n",
617 string_data(&mem_regions[i].name));
618
Karl Meakinf6d49402023-04-04 18:14:26 +0100619 TRY(read_optional_uint64(mem_node, "base-address",
620 MANIFEST_INVALID_ADDRESS,
621 &mem_regions[i].base_address));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200622 dlog_verbose(" Base address: %#x\n",
Manish Pandey6542f5c2020-04-27 14:37:46 +0100623 mem_regions[i].base_address);
624
Karl Meakinf6d49402023-04-04 18:14:26 +0100625 TRY(read_optional_uint64(mem_node, "relative-address",
626 MANIFEST_INVALID_ADDRESS,
627 &relative_address));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200628 if (relative_address != MANIFEST_INVALID_ADDRESS) {
629 dlog_verbose(" Relative address: %#x\n",
630 relative_address);
631 }
Karl Meakinf6d49402023-04-04 18:14:26 +0100632
633 if (mem_regions[i].base_address == MANIFEST_INVALID_ADDRESS &&
634 relative_address == MANIFEST_INVALID_ADDRESS) {
635 return MANIFEST_ERROR_PROPERTY_NOT_FOUND;
636 }
637
638 if (mem_regions[i].base_address != MANIFEST_INVALID_ADDRESS &&
639 relative_address != MANIFEST_INVALID_ADDRESS) {
640 return MANIFEST_ERROR_BASE_ADDRESS_AND_RELATIVE_ADDRESS;
641 }
642
643 if (relative_address != MANIFEST_INVALID_ADDRESS &&
644 relative_address > UINT64_MAX - load_address) {
645 return MANIFEST_ERROR_INTEGER_OVERFLOW;
646 }
647
648 if (relative_address != MANIFEST_INVALID_ADDRESS) {
649 mem_regions[i].base_address =
650 load_address + relative_address;
651 }
652
Manish Pandey6542f5c2020-04-27 14:37:46 +0100653 TRY(read_uint32(mem_node, "pages-count",
654 &mem_regions[i].page_count));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200655 dlog_verbose(" Pages_count: %u\n",
Manish Pandey6542f5c2020-04-27 14:37:46 +0100656 mem_regions[i].page_count);
657
658 TRY(read_uint32(mem_node, "attributes",
659 &mem_regions[i].attributes));
Raghu Krishnamurthy384693c2021-10-11 13:56:24 -0700660
Olivier Deprez035fa152022-03-14 11:19:10 +0100661 /*
662 * Check RWX permission attributes.
663 * Security attribute is checked at load phase.
664 */
665 uint32_t permissions = mem_regions[i].attributes &
666 (MANIFEST_REGION_ATTR_READ |
667 MANIFEST_REGION_ATTR_WRITE |
668 MANIFEST_REGION_ATTR_EXEC);
669 if (permissions != MANIFEST_REGION_ATTR_READ &&
670 permissions != (MANIFEST_REGION_ATTR_READ |
671 MANIFEST_REGION_ATTR_WRITE) &&
672 permissions != (MANIFEST_REGION_ATTR_READ |
673 MANIFEST_REGION_ATTR_EXEC)) {
Raghu Krishnamurthy384693c2021-10-11 13:56:24 -0700674 return MANIFEST_ERROR_INVALID_MEM_PERM;
675 }
676
Olivier Deprez035fa152022-03-14 11:19:10 +0100677 /* Filter memory region attributes. */
678 mem_regions[i].attributes &= MANIFEST_REGION_ALL_ATTR_MASK;
679
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200680 dlog_verbose(" Attributes: %#x\n",
Manish Pandey6542f5c2020-04-27 14:37:46 +0100681 mem_regions[i].attributes);
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100682
J-Alves77b6f4f2023-03-15 11:34:49 +0000683 TRY(check_partition_memory_is_valid(
684 mem_regions[i].base_address, mem_regions[i].page_count,
685 mem_regions[i].attributes, boot_params));
686
687 TRY(check_and_record_memory_used(mem_regions[i].base_address,
688 mem_regions[i].page_count));
689
Madhukar Pappireddy3c2b7912023-10-11 14:47:27 -0500690 TRY(read_optional_uint32(mem_node, "smmu-id",
691 MANIFEST_INVALID_ID,
692 &mem_regions[i].dma_prop.smmu_id));
693 if (mem_regions[i].dma_prop.smmu_id != MANIFEST_INVALID_ID) {
694 dlog_verbose(" smmu-id: %u\n",
695 mem_regions[i].dma_prop.smmu_id);
696 }
697
698 TRY(read_optional_uint32list(mem_node, "stream-ids", &list));
699 dlog_verbose(" Stream IDs assigned:\n");
700
701 j = 0;
702 while (uint32list_has_next(&list)) {
703 if (j == PARTITION_MAX_STREAMS_PER_DEVICE) {
704 return MANIFEST_ERROR_STREAM_IDS_OVERFLOW;
705 }
706
707 TRY(uint32list_get_next(
708 &list, &mem_regions[i].dma_prop.stream_ids[j]));
709 dlog_verbose(" %u\n",
710 mem_regions[i].dma_prop.stream_ids[j]);
711 j++;
712 }
713 if (j == 0) {
714 dlog_verbose(" None\n");
715 } else if (mem_regions[i].dma_prop.smmu_id ==
716 MANIFEST_INVALID_ID) {
717 /*
718 * SMMU ID must be specified if the partition specifies
719 * Stream IDs for any device upstream of SMMU.
720 */
721 return MANIFEST_ERROR_MISSING_SMMU_ID;
722 }
723
724 mem_regions[i].dma_prop.stream_count = j;
725
726 TRY(read_optional_uint32list(
727 mem_node, "stream-ids-access-permissions", &list));
728 dlog_verbose(" Access permissions of Stream IDs:\n");
729
730 j = 0;
731 while (uint32list_has_next(&list)) {
732 uint32_t permissions;
733
734 if (j == PARTITION_MAX_STREAMS_PER_DEVICE) {
735 return MANIFEST_ERROR_DMA_ACCESS_PERMISSIONS_OVERFLOW;
736 }
737
738 TRY(uint32list_get_next(&list, &permissions));
739 dlog_verbose(" %u\n", permissions);
740
741 if (j == 0) {
742 mem_regions[i].dma_prop.dma_access_permissions =
743 permissions;
744 }
745
746 /*
747 * All stream ids belonging to a dma device must specify
748 * the same access permissions.
749 */
750 if (permissions !=
751 mem_regions[i].dma_prop.dma_access_permissions) {
752 return MANIFEST_ERROR_MISMATCH_DMA_ACCESS_PERMISSIONS;
753 }
754
755 j++;
756 }
757
758 if (j == 0) {
759 dlog_verbose(" None\n");
760 } else if (j != mem_regions[i].dma_prop.stream_count) {
761 return MANIFEST_ERROR_MISMATCH_DMA_ACCESS_PERMISSIONS;
762 }
763
764 if (j > 0) {
765 /* Filter the dma access permissions. */
766 mem_regions[i].dma_prop.dma_access_permissions &=
767 MANIFEST_REGION_ALL_ATTR_MASK;
768 }
769
Manish Pandeya70a4192020-10-07 22:05:04 +0100770 if (rxtx->available) {
771 TRY(read_optional_uint32(
772 mem_node, "phandle",
773 (uint32_t)MANIFEST_INVALID_ADDRESS, &phandle));
774 if (phandle == rxtx->rx_phandle) {
775 dlog_verbose(" Assigned as RX buffer\n");
776 rxtx->rx_buffer = &mem_regions[i];
777 } else if (phandle == rxtx->tx_phandle) {
778 dlog_verbose(" Assigned as TX buffer\n");
779 rxtx->tx_buffer = &mem_regions[i];
780 }
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100781 }
782
Manish Pandey6542f5c2020-04-27 14:37:46 +0100783 i++;
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -0700784 } while (fdt_next_sibling(mem_node) &&
785 (i < PARTITION_MAX_MEMORY_REGIONS));
Manish Pandey6542f5c2020-04-27 14:37:46 +0100786
Manish Pandeya70a4192020-10-07 22:05:04 +0100787 if (rxtx->available &&
788 (rxtx->rx_buffer->page_count != rxtx->tx_buffer->page_count)) {
Manish Pandeyf06c9072020-09-29 15:41:58 +0100789 return MANIFEST_ERROR_RXTX_SIZE_MISMATCH;
790 }
791
Manish Pandey2145c212020-05-01 16:04:22 +0100792 *count = i;
Manish Pandey6542f5c2020-04-27 14:37:46 +0100793
794 return MANIFEST_SUCCESS;
795}
796
Raghu Krishnamurthy98da1ca2022-10-04 08:59:01 -0700797static struct interrupt_info *device_region_get_interrupt_info(
798 struct device_region *dev_regions, uint32_t intid)
799{
800 for (uint32_t i = 0; i < ARRAY_SIZE(dev_regions->interrupts); i++) {
801 if (dev_regions->interrupts[i].id == intid) {
802 return &(dev_regions->interrupts[i]);
803 }
804 }
805 return NULL;
806}
807
Manish Pandeye68e7932020-04-23 15:29:28 +0100808static enum manifest_return_code parse_ffa_device_region_node(
Manish Pandey2145c212020-05-01 16:04:22 +0100809 struct fdt_node *dev_node, struct device_region *dev_regions,
Daniel Boulby4339edc2024-02-21 14:59:00 +0000810 uint16_t *count, uint8_t *dma_device_count,
811 const struct boot_params *boot_params)
Manish Pandeye68e7932020-04-23 15:29:28 +0100812{
813 struct uint32list_iter list;
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -0700814 uint16_t i = 0;
Madhukar Pappireddy5fc8be12021-08-03 11:42:53 -0500815 uint32_t j = 0;
Olivier Deprez93644652022-09-09 11:01:12 +0200816 struct interrupt_bitmap allocated_intids = manifest_data->intids;
Madhukar Pappireddye032af52023-10-11 14:52:58 -0500817 static uint8_t dma_device_id = 0;
Manish Pandeye68e7932020-04-23 15:29:28 +0100818
819 dlog_verbose(" Partition Device Regions\n");
820
821 if (!fdt_is_compatible(dev_node, "arm,ffa-manifest-device-regions")) {
822 return MANIFEST_ERROR_NOT_COMPATIBLE;
823 }
824
825 if (!fdt_first_child(dev_node)) {
826 return MANIFEST_ERROR_DEVICE_REGION_NODE_EMPTY;
827 }
828
Madhukar Pappireddye032af52023-10-11 14:52:58 -0500829 *dma_device_count = 0;
830
Manish Pandeye68e7932020-04-23 15:29:28 +0100831 do {
832 dlog_verbose(" Device Region[%u]\n", i);
833
834 TRY(read_optional_string(dev_node, "description",
835 &dev_regions[i].name));
836 dlog_verbose(" Name: %s\n",
837 string_data(&dev_regions[i].name));
838
839 TRY(read_uint64(dev_node, "base-address",
840 &dev_regions[i].base_address));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200841 dlog_verbose(" Base address: %#x\n",
Manish Pandeye68e7932020-04-23 15:29:28 +0100842 dev_regions[i].base_address);
843
844 TRY(read_uint32(dev_node, "pages-count",
845 &dev_regions[i].page_count));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200846 dlog_verbose(" Pages_count: %u\n",
Manish Pandeye68e7932020-04-23 15:29:28 +0100847 dev_regions[i].page_count);
848
Daniel Boulby4d165722023-11-21 13:46:42 +0000849 TRY(check_and_record_memory_used(dev_regions[i].base_address,
850 dev_regions[i].page_count));
851
Manish Pandeye68e7932020-04-23 15:29:28 +0100852 TRY(read_uint32(dev_node, "attributes",
853 &dev_regions[i].attributes));
Daniel Boulby4339edc2024-02-21 14:59:00 +0000854 /* Set the memory type attribute to device. */
855 dev_regions[i].attributes =
856 dev_regions[i].attributes |
857 MANIFEST_REGION_ATTR_MEMORY_TYPE_DEVICE;
Raghu Krishnamurthy384693c2021-10-11 13:56:24 -0700858
Olivier Deprez035fa152022-03-14 11:19:10 +0100859 /*
860 * Check RWX permission attributes.
861 * Security attribute is checked at load phase.
862 */
863 uint32_t permissions = dev_regions[i].attributes &
864 (MANIFEST_REGION_ATTR_READ |
865 MANIFEST_REGION_ATTR_WRITE |
866 MANIFEST_REGION_ATTR_EXEC);
867
868 if (permissions != MANIFEST_REGION_ATTR_READ &&
869 permissions != (MANIFEST_REGION_ATTR_READ |
870 MANIFEST_REGION_ATTR_WRITE)) {
Raghu Krishnamurthy384693c2021-10-11 13:56:24 -0700871 return MANIFEST_ERROR_INVALID_MEM_PERM;
872 }
873
Daniel Boulby4339edc2024-02-21 14:59:00 +0000874 /* Filter device region attributes. */
Olivier Deprez035fa152022-03-14 11:19:10 +0100875 dev_regions[i].attributes = dev_regions[i].attributes &
876 MANIFEST_REGION_ALL_ATTR_MASK;
877
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200878 dlog_verbose(" Attributes: %#x\n",
Manish Pandeye68e7932020-04-23 15:29:28 +0100879 dev_regions[i].attributes);
880
Daniel Boulby4339edc2024-02-21 14:59:00 +0000881 TRY(check_partition_memory_is_valid(
882 dev_regions[i].base_address, dev_regions[i].page_count,
883 dev_regions[i].attributes, boot_params));
884
Manish Pandeye68e7932020-04-23 15:29:28 +0100885 TRY(read_optional_uint32list(dev_node, "interrupts", &list));
886 dlog_verbose(" Interrupt List:\n");
887 j = 0;
888 while (uint32list_has_next(&list) &&
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -0700889 j < PARTITION_MAX_INTERRUPTS_PER_DEVICE) {
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100890 uint32_t intid;
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100891
Manish Pandeye68e7932020-04-23 15:29:28 +0100892 TRY(uint32list_get_next(
893 &list, &dev_regions[i].interrupts[j].id));
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100894 intid = dev_regions[i].interrupts[j].id;
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100895
896 dlog_verbose(" ID = %u\n", intid);
897
Daniel Boulby4ca50f02022-07-29 18:29:34 +0100898 if (interrupt_bitmap_get_value(&allocated_intids,
899 intid) == 1U) {
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100900 return MANIFEST_ERROR_INTERRUPT_ID_REPEATED;
901 }
902
Daniel Boulby4ca50f02022-07-29 18:29:34 +0100903 interrupt_bitmap_set_value(&allocated_intids, intid);
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100904
Manish Pandeye68e7932020-04-23 15:29:28 +0100905 if (uint32list_has_next(&list)) {
906 TRY(uint32list_get_next(&list,
907 &dev_regions[i]
908 .interrupts[j]
909 .attributes));
910 } else {
911 return MANIFEST_ERROR_MALFORMED_INTEGER_LIST;
912 }
913
Raghu Krishnamurthy98da1ca2022-10-04 08:59:01 -0700914 dev_regions[i].interrupts[j].mpidr_valid = false;
915 dev_regions[i].interrupts[j].mpidr = 0;
916
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100917 dlog_verbose(" attributes = %u\n",
Manish Pandeye68e7932020-04-23 15:29:28 +0100918 dev_regions[i].interrupts[j].attributes);
919 j++;
920 }
Madhukar Pappireddy5fc8be12021-08-03 11:42:53 -0500921
922 dev_regions[i].interrupt_count = j;
Manish Pandeye68e7932020-04-23 15:29:28 +0100923 if (j == 0) {
924 dlog_verbose(" Empty\n");
Raghu Krishnamurthy98da1ca2022-10-04 08:59:01 -0700925 } else {
926 TRY(read_optional_uint32list(
927 dev_node, "interrupts-target", &list));
928 dlog_verbose(" Interrupt Target List:\n");
929
930 while (uint32list_has_next(&list)) {
931 uint32_t intid;
932 uint64_t mpidr = 0;
933 uint32_t mpidr_lower = 0;
934 uint32_t mpidr_upper = 0;
935 struct interrupt_info *info = NULL;
936
937 TRY(uint32list_get_next(&list, &intid));
938
939 dlog_verbose(" ID = %u\n", intid);
940
941 if (interrupt_bitmap_get_value(
942 &allocated_intids, intid) != 1U) {
943 return MANIFEST_ERROR_INTERRUPT_ID_NOT_IN_LIST;
944 }
945
946 TRY(uint32list_get_next(&list, &mpidr_upper));
947 TRY(uint32list_get_next(&list, &mpidr_lower));
948 mpidr = mpidr_upper;
949 mpidr <<= 32;
950 mpidr |= mpidr_lower;
951
952 info = device_region_get_interrupt_info(
953 &dev_regions[i], intid);
954 /*
955 * We should find info since
956 * interrupt_bitmap_get_value already ensures
957 * that we saw the interrupt and allocated ids
958 * for it.
959 */
960 assert(info != NULL);
961 info->mpidr = mpidr;
962 info->mpidr_valid = true;
963 dlog_verbose(" MPIDR = %#x\n", mpidr);
964 }
Manish Pandeye68e7932020-04-23 15:29:28 +0100965 }
966
967 TRY(read_optional_uint32(dev_node, "smmu-id",
Madhukar Pappireddy54680c72020-10-23 15:02:38 -0500968 MANIFEST_INVALID_ID,
Manish Pandeye68e7932020-04-23 15:29:28 +0100969 &dev_regions[i].smmu_id));
Olivier Deprez86d87ae2021-08-19 14:27:46 +0200970 if (dev_regions[i].smmu_id != MANIFEST_INVALID_ID) {
971 dlog_verbose(" smmu-id: %u\n",
972 dev_regions[i].smmu_id);
973 }
Manish Pandeye68e7932020-04-23 15:29:28 +0100974
975 TRY(read_optional_uint32list(dev_node, "stream-ids", &list));
976 dlog_verbose(" Stream IDs assigned:\n");
977
978 j = 0;
Madhukar Pappireddye032af52023-10-11 14:52:58 -0500979 while (uint32list_has_next(&list)) {
980 if (j == PARTITION_MAX_STREAMS_PER_DEVICE) {
981 return MANIFEST_ERROR_STREAM_IDS_OVERFLOW;
982 }
983
Manish Pandeye68e7932020-04-23 15:29:28 +0100984 TRY(uint32list_get_next(&list,
985 &dev_regions[i].stream_ids[j]));
986 dlog_verbose(" %u\n",
987 dev_regions[i].stream_ids[j]);
988 j++;
989 }
Madhukar Pappireddye032af52023-10-11 14:52:58 -0500990
Manish Pandeye68e7932020-04-23 15:29:28 +0100991 if (j == 0) {
992 dlog_verbose(" None\n");
Madhukar Pappireddye032af52023-10-11 14:52:58 -0500993 } else if (dev_regions[i].smmu_id != MANIFEST_INVALID_ID) {
994 dev_regions[i].dma_device_id = dma_device_id++;
995 *dma_device_count = dma_device_id;
996
Madhukar Pappireddy8a364472023-10-11 15:34:07 -0500997 if (*dma_device_count > PARTITION_MAX_DMA_DEVICES) {
998 return MANIFEST_ERROR_DMA_DEVICE_OVERFLOW;
999 }
1000
Madhukar Pappireddye032af52023-10-11 14:52:58 -05001001 dlog_verbose(" dma peripheral device id: %u\n",
1002 dev_regions[i].dma_device_id);
1003 } else {
1004 /*
1005 * SMMU ID must be specified if the partition specifies
1006 * Stream IDs for any device upstream of SMMU.
1007 */
1008 return MANIFEST_ERROR_MISSING_SMMU_ID;
Manish Pandeye68e7932020-04-23 15:29:28 +01001009 }
Madhukar Pappireddye032af52023-10-11 14:52:58 -05001010
Madhukar Pappireddy54680c72020-10-23 15:02:38 -05001011 dev_regions[i].stream_count = j;
Manish Pandeye68e7932020-04-23 15:29:28 +01001012
1013 TRY(read_bool(dev_node, "exclusive-access",
1014 &dev_regions[i].exclusive_access));
J-Alves4369bd92020-08-07 16:35:36 +01001015 dlog_verbose(" Exclusive_access: %u\n",
Manish Pandeye68e7932020-04-23 15:29:28 +01001016 dev_regions[i].exclusive_access);
1017
1018 i++;
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -07001019 } while (fdt_next_sibling(dev_node) &&
1020 (i < PARTITION_MAX_DEVICE_REGIONS));
Manish Pandeye68e7932020-04-23 15:29:28 +01001021
Manish Pandey2145c212020-05-01 16:04:22 +01001022 *count = i;
Manish Pandeye68e7932020-04-23 15:29:28 +01001023
1024 return MANIFEST_SUCCESS;
1025}
1026
J-Alvesabebe432022-05-31 14:40:50 +01001027static enum manifest_return_code sanity_check_ffa_manifest(
1028 struct manifest_vm *vm)
1029{
1030 uint16_t ffa_version_major;
1031 uint16_t ffa_version_minor;
1032 enum manifest_return_code ret_code = MANIFEST_SUCCESS;
1033 const char *error_string = "specified in manifest is unsupported";
1034 uint32_t k = 0;
Kathleen Capellaf71dee42023-08-08 16:24:14 -04001035 bool using_req2 = (vm->partition.messaging_method &
1036 (FFA_PARTITION_DIRECT_REQ2_RECV |
1037 FFA_PARTITION_DIRECT_REQ2_SEND)) != 0;
J-Alvesabebe432022-05-31 14:40:50 +01001038
1039 /* ensure that the SPM version is compatible */
1040 ffa_version_major = (vm->partition.ffa_version & 0xffff0000) >>
1041 FFA_VERSION_MAJOR_OFFSET;
1042 ffa_version_minor = vm->partition.ffa_version & 0xffff;
1043
1044 if (ffa_version_major != FFA_VERSION_MAJOR ||
1045 ffa_version_minor > FFA_VERSION_MINOR) {
1046 dlog_error("FF-A partition manifest version %s: %u.%u\n",
1047 error_string, ffa_version_major, ffa_version_minor);
1048 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1049 }
1050
1051 if (vm->partition.xlat_granule != PAGE_4KB) {
1052 dlog_error("Translation granule %s: %u\n", error_string,
1053 vm->partition.xlat_granule);
1054 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1055 }
1056
1057 if (vm->partition.execution_state != AARCH64) {
1058 dlog_error("Execution state %s: %u\n", error_string,
1059 vm->partition.execution_state);
1060 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1061 }
1062
1063 if (vm->partition.run_time_el != EL1 &&
1064 vm->partition.run_time_el != S_EL1 &&
Daniel Boulby874d5432023-04-27 12:40:24 +01001065 vm->partition.run_time_el != S_EL0 &&
1066 vm->partition.run_time_el != EL0) {
J-Alvesabebe432022-05-31 14:40:50 +01001067 dlog_error("Exception level %s: %d\n", error_string,
1068 vm->partition.run_time_el);
1069 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1070 }
1071
Kathleen Capellaf71dee42023-08-08 16:24:14 -04001072 if (vm->partition.ffa_version < MAKE_FFA_VERSION(1, 2) && using_req2) {
1073 dlog_error("Messaging method %s: %x\n", error_string,
1074 vm->partition.messaging_method);
1075 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1076 }
1077
J-Alvesabebe432022-05-31 14:40:50 +01001078 if ((vm->partition.messaging_method &
1079 ~(FFA_PARTITION_DIRECT_REQ_RECV | FFA_PARTITION_DIRECT_REQ_SEND |
Kathleen Capellaf71dee42023-08-08 16:24:14 -04001080 FFA_PARTITION_INDIRECT_MSG | FFA_PARTITION_DIRECT_REQ2_RECV |
1081 FFA_PARTITION_DIRECT_REQ2_SEND)) != 0U) {
J-Alvesabebe432022-05-31 14:40:50 +01001082 dlog_error("Messaging method %s: %x\n", error_string,
1083 vm->partition.messaging_method);
1084 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1085 }
1086
Daniel Boulby874d5432023-04-27 12:40:24 +01001087 if ((vm->partition.run_time_el == S_EL0 ||
1088 vm->partition.run_time_el == EL0) &&
J-Alvesabebe432022-05-31 14:40:50 +01001089 vm->partition.execution_ctx_count != 1) {
1090 dlog_error(
1091 "Exception level and execution context count %s: %d "
1092 "%d\n",
1093 error_string, vm->partition.run_time_el,
1094 vm->partition.execution_ctx_count);
1095 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1096 }
1097
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -07001098 for (uint16_t i = 0; i < vm->partition.dev_region_count; i++) {
J-Alvesabebe432022-05-31 14:40:50 +01001099 struct device_region dev_region;
1100
1101 dev_region = vm->partition.dev_regions[i];
1102
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -07001103 if (dev_region.interrupt_count >
1104 PARTITION_MAX_INTERRUPTS_PER_DEVICE) {
J-Alvesabebe432022-05-31 14:40:50 +01001105 dlog_error(
1106 "Interrupt count for device region exceeds "
1107 "limit.\n");
1108 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1109 continue;
1110 }
1111
1112 for (uint8_t j = 0; j < dev_region.interrupt_count; j++) {
1113 k++;
1114 if (k > VM_MANIFEST_MAX_INTERRUPTS) {
1115 dlog_error(
1116 "Interrupt count for VM exceeds "
1117 "limit.\n");
1118 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1119 continue;
1120 }
1121 }
1122 }
1123
1124 /* GP register is restricted to one of x0 - x3. */
Karl Meakin824b63d2024-06-03 19:04:53 +01001125 if (vm->partition.gp_register_num != DEFAULT_BOOT_GP_REGISTER &&
J-Alvesabebe432022-05-31 14:40:50 +01001126 vm->partition.gp_register_num > 3) {
1127 dlog_error("GP register number %s: %u\n", error_string,
1128 vm->partition.gp_register_num);
1129 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1130 }
1131
1132 return ret_code;
1133}
1134
Madhukar Pappireddye032af52023-10-11 14:52:58 -05001135/**
1136 * Find the device id allocated to the device region node corresponding to the
1137 * specified stream id.
1138 */
1139static bool find_dma_device_id_from_dev_region_nodes(
1140 const struct manifest_vm *manifest_vm, uint32_t sid, uint8_t *device_id)
1141{
1142 for (uint16_t i = 0; i < manifest_vm->partition.dev_region_count; i++) {
1143 struct device_region dev_region =
1144 manifest_vm->partition.dev_regions[i];
1145
1146 for (uint8_t j = 0; j < dev_region.stream_count; j++) {
1147 if (sid == dev_region.stream_ids[j]) {
1148 *device_id = dev_region.dma_device_id;
1149 return true;
1150 }
1151 }
1152 }
1153 return false;
1154}
1155
1156/**
1157 * Identify the device id of a DMA device node corresponding to a stream id
1158 * specified in the memory region node.
1159 */
1160static bool map_dma_device_id_to_stream_ids(struct manifest_vm *vm)
1161{
1162 for (uint16_t i = 0; i < vm->partition.mem_region_count; i++) {
1163 struct memory_region mem_region = vm->partition.mem_regions[i];
1164
1165 for (uint8_t j = 0; j < mem_region.dma_prop.stream_count; j++) {
1166 uint32_t sid = mem_region.dma_prop.stream_ids[j];
1167 uint8_t device_id = 0;
1168
1169 /*
1170 * Every stream id must have been declared in the
1171 * device node as well.
1172 */
1173 if (!find_dma_device_id_from_dev_region_nodes(
1174 vm, sid, &device_id)) {
1175 dlog_verbose(
1176 "Stream ID not found in any device "
1177 "region node of partition manifest\n",
1178 sid);
1179 return false;
1180 }
1181
1182 mem_region.dma_prop.dma_device_id = device_id;
1183 }
1184 }
1185
1186 return true;
1187}
1188
J-Alves77b6f4f2023-03-15 11:34:49 +00001189enum manifest_return_code parse_ffa_manifest(
1190 struct fdt *fdt, struct manifest_vm *vm,
1191 struct fdt_node *boot_info_node, const struct boot_params *boot_params)
Olivier Deprez62d99e32020-01-09 15:58:07 +01001192{
1193 unsigned int i = 0;
Kathleen Capella422b10b2023-06-30 18:28:27 -04001194 unsigned int j = 0;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001195 struct uint32list_iter uuid;
1196 uint32_t uuid_word;
1197 struct fdt_node root;
1198 struct fdt_node ffa_node;
1199 struct string rxtx_node_name = STRING_INIT("rx_tx-info");
Manish Pandey6542f5c2020-04-27 14:37:46 +01001200 struct string mem_region_node_name = STRING_INIT("memory-regions");
Manish Pandeye68e7932020-04-23 15:29:28 +01001201 struct string dev_region_node_name = STRING_INIT("device-regions");
J-Alves35315782022-01-25 17:58:32 +00001202 struct string boot_info_node_name = STRING_INIT("boot-info");
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001203 bool managed_exit_field_present = false;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001204
1205 if (!fdt_find_node(fdt, "/", &root)) {
1206 return MANIFEST_ERROR_NO_ROOT_NODE;
1207 }
1208
1209 /* Check "compatible" property. */
1210 if (!fdt_is_compatible(&root, "arm,ffa-manifest-1.0")) {
1211 return MANIFEST_ERROR_NOT_COMPATIBLE;
1212 }
1213
J-Alves4369bd92020-08-07 16:35:36 +01001214 TRY(read_uint32list(&root, "uuid", &uuid));
Olivier Deprez62d99e32020-01-09 15:58:07 +01001215
Kathleen Capella422b10b2023-06-30 18:28:27 -04001216 while (uint32list_has_next(&uuid) && j < PARTITION_MAX_UUIDS) {
1217 while (uint32list_has_next(&uuid) && i < 4) {
1218 TRY(uint32list_get_next(&uuid, &uuid_word));
1219 vm->partition.uuids[j].uuid[i] = uuid_word;
1220 i++;
1221 }
1222
1223 if (ffa_uuid_is_null(&vm->partition.uuids[j])) {
1224 return MANIFEST_ERROR_UUID_ALL_ZEROS;
1225 }
1226 dlog_verbose(" UUID %#x-%x-%x-%x\n",
1227 vm->partition.uuids[j].uuid[0],
1228 vm->partition.uuids[j].uuid[1],
1229 vm->partition.uuids[j].uuid[2],
1230 vm->partition.uuids[j].uuid[3]);
1231 j++;
1232 i = 0;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001233 }
Kathleen Capella422b10b2023-06-30 18:28:27 -04001234
1235 vm->partition.uuid_count = j;
1236 dlog_verbose(" Number of UUIDs %u\n", vm->partition.uuid_count);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001237
Olivier Deprezb7aa0c22023-06-29 10:46:26 +02001238 TRY(read_uint32(&root, "ffa-version", &vm->partition.ffa_version));
1239 dlog_verbose(" Expected FF-A version %u.%u\n",
1240 vm->partition.ffa_version >> 16,
1241 vm->partition.ffa_version & 0xffff);
1242
Olivier Deprez62d99e32020-01-09 15:58:07 +01001243 TRY(read_uint16(&root, "execution-ctx-count",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001244 &vm->partition.execution_ctx_count));
J-Alves4369bd92020-08-07 16:35:36 +01001245 dlog_verbose(" Number of execution context %u\n",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001246 vm->partition.execution_ctx_count);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001247
1248 TRY(read_uint8(&root, "exception-level",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001249 (uint8_t *)&vm->partition.run_time_el));
1250 dlog_verbose(" Run-time EL %u\n", vm->partition.run_time_el);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001251
1252 TRY(read_uint8(&root, "execution-state",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001253 (uint8_t *)&vm->partition.execution_state));
1254 dlog_verbose(" Execution state %u\n", vm->partition.execution_state);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001255
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001256 TRY(read_optional_uint64(&root, "load-address", 0,
1257 &vm->partition.load_addr));
1258 dlog_verbose(" Load address %#x\n", vm->partition.load_addr);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001259
J-Alves4369bd92020-08-07 16:35:36 +01001260 TRY(read_optional_uint64(&root, "entrypoint-offset", 0,
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001261 &vm->partition.ep_offset));
1262 dlog_verbose(" Entry point offset %#x\n", vm->partition.ep_offset);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001263
J-Alves35315782022-01-25 17:58:32 +00001264 TRY(read_optional_uint32(&root, "gp-register-num",
1265 DEFAULT_BOOT_GP_REGISTER,
1266 &vm->partition.gp_register_num));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +02001267
1268 if (vm->partition.gp_register_num != DEFAULT_BOOT_GP_REGISTER) {
1269 dlog_verbose(" Boot GP register: x%u\n",
1270 vm->partition.gp_register_num);
1271 }
J-Alves35315782022-01-25 17:58:32 +00001272
J-Alvesb37fd082020-10-22 12:29:21 +01001273 TRY(read_optional_uint16(&root, "boot-order", DEFAULT_BOOT_ORDER,
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001274 &vm->partition.boot_order));
Kathleen Capella4a2a6e72023-04-21 14:43:26 -04001275 if (vm->partition.boot_order != DEFAULT_BOOT_ORDER) {
1276 dlog_verbose(" Boot order %#u\n", vm->partition.boot_order);
1277 }
1278
1279 if (!check_boot_order(vm->partition.boot_order)) {
1280 return MANIFEST_ERROR_INVALID_BOOT_ORDER;
1281 }
J-Alvesb37fd082020-10-22 12:29:21 +01001282
J-Alves4369bd92020-08-07 16:35:36 +01001283 TRY(read_optional_uint8(&root, "xlat-granule", 0,
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001284 (uint8_t *)&vm->partition.xlat_granule));
1285 dlog_verbose(" Translation granule %u\n", vm->partition.xlat_granule);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001286
1287 ffa_node = root;
1288 if (fdt_find_child(&ffa_node, &rxtx_node_name)) {
1289 if (!fdt_is_compatible(&ffa_node,
1290 "arm,ffa-manifest-rx_tx-buffer")) {
1291 return MANIFEST_ERROR_NOT_COMPATIBLE;
1292 }
1293
Manish Pandeyfa1f2912020-05-05 12:57:01 +01001294 /*
1295 * Read only phandles for now, it will be used to update buffers
1296 * while parsing memory regions.
1297 */
1298 TRY(read_uint32(&ffa_node, "rx-buffer",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001299 &vm->partition.rxtx.rx_phandle));
Olivier Deprez62d99e32020-01-09 15:58:07 +01001300
Manish Pandeyfa1f2912020-05-05 12:57:01 +01001301 TRY(read_uint32(&ffa_node, "tx-buffer",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001302 &vm->partition.rxtx.tx_phandle));
Olivier Deprez62d99e32020-01-09 15:58:07 +01001303
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001304 vm->partition.rxtx.available = true;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001305 }
1306
Kathleen Capellaf71dee42023-08-08 16:24:14 -04001307 TRY(read_uint16(&root, "messaging-method",
1308 (uint16_t *)&vm->partition.messaging_method));
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001309 dlog_verbose(" Messaging method %u\n", vm->partition.messaging_method);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001310
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001311 TRY(read_bool(&root, "managed-exit", &managed_exit_field_present));
1312
1313 TRY(read_optional_uint8(
1314 &root, "ns-interrupts-action", NS_ACTION_SIGNALED,
1315 (uint8_t *)&vm->partition.ns_interrupts_action));
1316
1317 /*
1318 * An SP manifest can specify one of the fields listed below:
1319 * `managed-exit`: Introduced in FF-A v1.0 spec.
1320 * `ns-interrupts-action`: Introduced in FF-A v1.1 EAC0 spec.
1321 * If both are missing from the manifest, the default response is
1322 * NS_ACTION_SIGNALED.
1323 */
1324 if (managed_exit_field_present) {
1325 vm->partition.ns_interrupts_action = NS_ACTION_ME;
1326 }
1327
1328 if (vm->partition.ns_interrupts_action != NS_ACTION_QUEUED &&
1329 vm->partition.ns_interrupts_action != NS_ACTION_ME &&
1330 vm->partition.ns_interrupts_action != NS_ACTION_SIGNALED) {
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001331 return MANIFEST_ERROR_ILLEGAL_NS_INT_ACTION;
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001332 }
1333
1334 dlog_verbose(
Olivier Deprezb7aa0c22023-06-29 10:46:26 +02001335 " NS Interrupts %s\n",
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001336 (vm->partition.ns_interrupts_action == NS_ACTION_QUEUED)
1337 ? "Queued"
1338 : (vm->partition.ns_interrupts_action == NS_ACTION_SIGNALED)
1339 ? "Signaled"
1340 : "Managed exit");
1341
1342 if (vm->partition.ns_interrupts_action == NS_ACTION_ME) {
1343 /* Managed exit only supported by S_EL1 partitions. */
1344 if (vm->partition.run_time_el != S_EL1) {
1345 dlog_error(
1346 "Managed exit cannot be supported by this "
1347 "partition\n");
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001348 return MANIFEST_ERROR_ILLEGAL_NS_INT_ACTION;
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001349 }
Madhukar Pappireddy046dad02022-06-21 18:43:33 -05001350
1351 TRY(read_bool(&root, "managed-exit-virq",
1352 &vm->partition.me_signal_virq));
1353 if (vm->partition.me_signal_virq) {
1354 dlog_verbose(" Managed Exit signaled through vIRQ\n");
1355 }
J-Alvesa4730db2021-11-02 10:31:01 +00001356 }
1357
1358 TRY(read_bool(&root, "notification-support",
1359 &vm->partition.notification_support));
1360 if (vm->partition.notification_support) {
1361 dlog_verbose(" Notifications Receipt Supported\n");
1362 }
Maksims Svecovs9ddf86a2021-05-06 17:17:21 +01001363
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001364 TRY(read_optional_uint8(
1365 &root, "other-s-interrupts-action", OTHER_S_INT_ACTION_SIGNALED,
1366 (uint8_t *)&vm->partition.other_s_interrupts_action));
1367
1368 if (vm->partition.other_s_interrupts_action ==
1369 OTHER_S_INT_ACTION_QUEUED) {
1370 if (vm->partition.ns_interrupts_action != NS_ACTION_QUEUED) {
1371 dlog_error(
1372 "Choice of the fields 'ns-interrupts-action' "
1373 "and 'other-s-interrupts-action' not "
1374 "compatible\n");
1375 return MANIFEST_ERROR_NOT_COMPATIBLE;
1376 }
1377 } else if (vm->partition.other_s_interrupts_action >
1378 OTHER_S_INT_ACTION_SIGNALED) {
1379 dlog_error(
1380 "Illegal value specified for the field"
1381 " 'other-s-interrupts-action': %u\n",
1382 vm->partition.other_s_interrupts_action);
1383 return MANIFEST_ERROR_ILLEGAL_OTHER_S_INT_ACTION;
1384 }
1385
J-Alves35315782022-01-25 17:58:32 +00001386 /* Parse boot info node. */
1387 if (boot_info_node != NULL) {
1388 ffa_node = root;
1389 vm->partition.boot_info =
1390 fdt_find_child(&ffa_node, &boot_info_node_name);
1391 if (vm->partition.boot_info) {
1392 *boot_info_node = ffa_node;
1393 }
1394 } else {
1395 vm->partition.boot_info = false;
1396 }
1397
Olivier Depreza15f2352022-09-26 09:17:24 +02001398 TRY(read_optional_uint32(
1399 &root, "power-management-messages",
1400 MANIFEST_POWER_MANAGEMENT_CPU_OFF_SUPPORTED |
1401 MANIFEST_POWER_MANAGEMENT_CPU_ON_SUPPORTED,
1402 &vm->partition.power_management));
1403 vm->partition.power_management &= MANIFEST_POWER_MANAGEMENT_ALL_MASK;
1404 if (vm->partition.execution_ctx_count == 1 ||
Daniel Boulby874d5432023-04-27 12:40:24 +01001405 vm->partition.run_time_el == S_EL0 ||
1406 vm->partition.run_time_el == EL0) {
Olivier Depreza15f2352022-09-26 09:17:24 +02001407 vm->partition.power_management =
1408 MANIFEST_POWER_MANAGEMENT_NONE_MASK;
1409 }
1410
1411 dlog_verbose(" Power management messages %#x\n",
1412 vm->partition.power_management);
1413
Manish Pandey6542f5c2020-04-27 14:37:46 +01001414 /* Parse memory-regions */
1415 ffa_node = root;
1416 if (fdt_find_child(&ffa_node, &mem_region_node_name)) {
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001417 TRY(parse_ffa_memory_region_node(
Karl Meakinf6d49402023-04-04 18:14:26 +01001418 &ffa_node, vm->partition.load_addr,
1419 vm->partition.mem_regions,
J-Alves77b6f4f2023-03-15 11:34:49 +00001420 &vm->partition.mem_region_count, &vm->partition.rxtx,
1421 boot_params));
Manish Pandey6542f5c2020-04-27 14:37:46 +01001422 }
Manish Pandey2145c212020-05-01 16:04:22 +01001423 dlog_verbose(" Total %u memory regions found\n",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001424 vm->partition.mem_region_count);
Manish Pandey6542f5c2020-04-27 14:37:46 +01001425
Manish Pandeye68e7932020-04-23 15:29:28 +01001426 /* Parse Device-regions */
1427 ffa_node = root;
1428 if (fdt_find_child(&ffa_node, &dev_region_node_name)) {
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001429 TRY(parse_ffa_device_region_node(
1430 &ffa_node, vm->partition.dev_regions,
Madhukar Pappireddye032af52023-10-11 14:52:58 -05001431 &vm->partition.dev_region_count,
Daniel Boulby4339edc2024-02-21 14:59:00 +00001432 &vm->partition.dma_device_count, boot_params));
Manish Pandeye68e7932020-04-23 15:29:28 +01001433 }
Manish Pandey2145c212020-05-01 16:04:22 +01001434 dlog_verbose(" Total %u device regions found\n",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001435 vm->partition.dev_region_count);
Manish Pandeye68e7932020-04-23 15:29:28 +01001436
Madhukar Pappireddye032af52023-10-11 14:52:58 -05001437 if (!map_dma_device_id_to_stream_ids(vm)) {
1438 return MANIFEST_ERROR_NOT_COMPATIBLE;
1439 }
1440
J-Alves4eb7b542022-03-02 15:21:52 +00001441 return sanity_check_ffa_manifest(vm);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001442}
1443
Olivier Deprez62d99e32020-01-09 15:58:07 +01001444static enum manifest_return_code parse_ffa_partition_package(
1445 struct mm_stage1_locked stage1_locked, struct fdt_node *node,
J-Alves19e20cf2023-08-02 12:48:55 +01001446 struct manifest_vm *vm, ffa_id_t vm_id,
J-Alves77b6f4f2023-03-15 11:34:49 +00001447 const struct boot_params *boot_params, struct mpool *ppool)
Olivier Deprez62d99e32020-01-09 15:58:07 +01001448{
1449 enum manifest_return_code ret = MANIFEST_ERROR_NOT_COMPATIBLE;
J-Alves2f86c1e2022-02-23 18:44:19 +00001450 uintpaddr_t load_address;
1451 struct sp_pkg_header header;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001452 struct fdt sp_fdt;
J-Alves2f86c1e2022-02-23 18:44:19 +00001453 vaddr_t pkg_start;
1454 vaddr_t manifest_address;
J-Alves35315782022-01-25 17:58:32 +00001455 struct fdt_node boot_info_node;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001456
1457 /*
1458 * This must have been hinted as being an FF-A partition,
1459 * return straight with failure if this is not the case.
1460 */
1461 if (!vm->is_ffa_partition) {
J-Alves2f86c1e2022-02-23 18:44:19 +00001462 return ret;
1463 }
1464
1465 TRY(read_uint64(node, "load_address", &load_address));
1466 if (!is_aligned(load_address, PAGE_SIZE)) {
Olivier Deprez62d99e32020-01-09 15:58:07 +01001467 return MANIFEST_ERROR_NOT_COMPATIBLE;
1468 }
1469
J-Alves2f86c1e2022-02-23 18:44:19 +00001470 assert(load_address != 0U);
1471
1472 if (!sp_pkg_init(stage1_locked, pa_init(load_address), &header,
1473 ppool)) {
1474 return ret;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001475 }
1476
J-Alves2f86c1e2022-02-23 18:44:19 +00001477 pkg_start = va_init(load_address);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001478
J-Alves2f86c1e2022-02-23 18:44:19 +00001479 if (vm_id != HF_PRIMARY_VM_ID &&
1480 sp_pkg_get_mem_size(&header) >= vm->secondary.mem_size) {
J-Alves4369bd92020-08-07 16:35:36 +01001481 dlog_error("Invalid package header or DT size.\n");
J-Alves2f86c1e2022-02-23 18:44:19 +00001482 goto out;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001483 }
1484
J-Alves2f86c1e2022-02-23 18:44:19 +00001485 manifest_address = va_add(va_init(load_address), header.pm_offset);
1486 if (!fdt_init_from_ptr(&sp_fdt, ptr_from_va(manifest_address),
1487 header.pm_size)) {
Kathleen Capella422b10b2023-06-30 18:28:27 -04001488 dlog_error("manifest.c: FDT failed validation.\n");
J-Alves2f86c1e2022-02-23 18:44:19 +00001489 goto out;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001490 }
1491
J-Alves77b6f4f2023-03-15 11:34:49 +00001492 ret = parse_ffa_manifest(&sp_fdt, vm, &boot_info_node, boot_params);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001493 if (ret != MANIFEST_SUCCESS) {
Olivier Deprez3cbdf862023-06-07 15:36:32 +02001494 dlog_error("Error parsing partition manifest.\n");
J-Alves2f86c1e2022-02-23 18:44:19 +00001495 goto out;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001496 }
1497
J-Alves2f86c1e2022-02-23 18:44:19 +00001498 if (vm->partition.load_addr != load_address) {
J-Alvesa26ea212021-03-22 14:33:47 +00001499 dlog_warning(
1500 "Partition's load address at its manifest differs"
1501 " from specified in partition's package.\n");
J-Alves2f86c1e2022-02-23 18:44:19 +00001502 vm->partition.load_addr = load_address;
J-Alvesa26ea212021-03-22 14:33:47 +00001503 }
1504
J-Alves889a1d72022-05-13 11:38:27 +01001505 if (vm->partition.gp_register_num != DEFAULT_BOOT_GP_REGISTER) {
1506 if (header.version == SP_PKG_HEADER_VERSION_2 &&
1507 vm->partition.boot_info &&
1508 !ffa_boot_info_node(&boot_info_node, pkg_start, &header)) {
1509 dlog_error("Failed to process boot information.\n");
1510 }
J-Alves35315782022-01-25 17:58:32 +00001511 }
J-Alves2f86c1e2022-02-23 18:44:19 +00001512out:
1513 sp_pkg_deinit(stage1_locked, pkg_start, &header, ppool);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001514 return ret;
1515}
1516
David Brazdil7a462ec2019-08-15 12:27:47 +01001517/**
1518 * Parse manifest from FDT.
1519 */
Olivier Deprez62d99e32020-01-09 15:58:07 +01001520enum manifest_return_code manifest_init(struct mm_stage1_locked stage1_locked,
Olivier Deprez93644652022-09-09 11:01:12 +02001521 struct manifest **manifest_ret,
Olivier Deprez62d99e32020-01-09 15:58:07 +01001522 struct memiter *manifest_fdt,
J-Alves77b6f4f2023-03-15 11:34:49 +00001523 struct boot_params *boot_params,
Olivier Deprez62d99e32020-01-09 15:58:07 +01001524 struct mpool *ppool)
David Brazdil7a462ec2019-08-15 12:27:47 +01001525{
Olivier Deprez93644652022-09-09 11:01:12 +02001526 struct manifest *manifest;
David Brazdilb856be62020-03-25 10:14:55 +00001527 struct string vm_name;
1528 struct fdt fdt;
David Brazdil7a462ec2019-08-15 12:27:47 +01001529 struct fdt_node hyp_node;
1530 size_t i = 0;
1531 bool found_primary_vm = false;
1532
J-Alvescd438fa2023-04-26 10:13:12 +01001533 if (boot_params->mem_ranges_count == 0 &&
1534 boot_params->ns_mem_ranges_count == 0) {
1535 return MANIFEST_ERROR_MEMORY_MISSING;
1536 }
1537
J-Alves77b6f4f2023-03-15 11:34:49 +00001538 dump_memory_ranges(boot_params->mem_ranges,
1539 boot_params->mem_ranges_count, false);
1540 dump_memory_ranges(boot_params->ns_mem_ranges,
1541 boot_params->ns_mem_ranges_count, true);
1542
Olivier Deprez93644652022-09-09 11:01:12 +02001543 /* Allocate space in the ppool for the manifest data. */
1544 if (!manifest_data_init(ppool)) {
1545 panic("Unable to allocate manifest data.\n");
Daniel Boulby801f8ef2022-06-27 14:21:01 +01001546 }
1547
Olivier Deprez93644652022-09-09 11:01:12 +02001548 manifest = &manifest_data->manifest;
1549 *manifest_ret = manifest;
1550
David Brazdilb856be62020-03-25 10:14:55 +00001551 if (!fdt_init_from_memiter(&fdt, manifest_fdt)) {
1552 return MANIFEST_ERROR_FILE_SIZE; /* TODO */
David Brazdila2358d42020-01-27 18:51:38 +00001553 }
1554
David Brazdil7a462ec2019-08-15 12:27:47 +01001555 /* Find hypervisor node. */
David Brazdilb856be62020-03-25 10:14:55 +00001556 if (!fdt_find_node(&fdt, "/hypervisor", &hyp_node)) {
David Brazdil7a462ec2019-08-15 12:27:47 +01001557 return MANIFEST_ERROR_NO_HYPERVISOR_FDT_NODE;
1558 }
1559
David Brazdil74e9c3b2019-08-28 11:09:08 +01001560 /* Check "compatible" property. */
David Brazdilf4925382020-03-25 13:33:51 +00001561 if (!fdt_is_compatible(&hyp_node, "hafnium,hafnium")) {
David Brazdil74e9c3b2019-08-28 11:09:08 +01001562 return MANIFEST_ERROR_NOT_COMPATIBLE;
1563 }
1564
Olivier Deprez622ab8d2021-08-02 12:15:45 +02001565 TRY(read_bool(&hyp_node, "ffa_tee_enabled",
1566 &manifest->ffa_tee_enabled));
Andrew Walbran41a49d82020-01-10 17:46:38 +00001567
David Brazdil7a462ec2019-08-15 12:27:47 +01001568 /* Iterate over reserved VM IDs and check no such nodes exist. */
Olivier Deprez2a8ee342020-08-03 15:10:44 +02001569 for (i = HF_VM_ID_BASE; i < HF_VM_ID_OFFSET; i++) {
J-Alves19e20cf2023-08-02 12:48:55 +01001570 ffa_id_t vm_id = (ffa_id_t)i - HF_VM_ID_BASE;
David Brazdil7a462ec2019-08-15 12:27:47 +01001571 struct fdt_node vm_node = hyp_node;
David Brazdil7a462ec2019-08-15 12:27:47 +01001572
David Brazdilb856be62020-03-25 10:14:55 +00001573 generate_vm_node_name(&vm_name, vm_id);
1574 if (fdt_find_child(&vm_node, &vm_name)) {
David Brazdil7a462ec2019-08-15 12:27:47 +01001575 return MANIFEST_ERROR_RESERVED_VM_ID;
1576 }
1577 }
1578
1579 /* Iterate over VM nodes until we find one that does not exist. */
1580 for (i = 0; i <= MAX_VMS; ++i) {
J-Alves19e20cf2023-08-02 12:48:55 +01001581 ffa_id_t vm_id = HF_VM_ID_OFFSET + i;
David Brazdil7a462ec2019-08-15 12:27:47 +01001582 struct fdt_node vm_node = hyp_node;
David Brazdil7a462ec2019-08-15 12:27:47 +01001583
Olivier Deprez2a8ee342020-08-03 15:10:44 +02001584 generate_vm_node_name(&vm_name, vm_id - HF_VM_ID_BASE);
David Brazdilb856be62020-03-25 10:14:55 +00001585 if (!fdt_find_child(&vm_node, &vm_name)) {
David Brazdil7a462ec2019-08-15 12:27:47 +01001586 break;
1587 }
1588
1589 if (i == MAX_VMS) {
1590 return MANIFEST_ERROR_TOO_MANY_VMS;
1591 }
1592
1593 if (vm_id == HF_PRIMARY_VM_ID) {
1594 CHECK(found_primary_vm == false); /* sanity check */
1595 found_primary_vm = true;
1596 }
1597
David Brazdil0251b942019-09-10 15:59:50 +01001598 manifest->vm_count = i + 1;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001599
1600 TRY(parse_vm_common(&vm_node, &manifest->vm[i], vm_id));
1601
Raghu Krishnamurthyb49549e2021-07-02 08:27:38 -07001602 CHECK(!manifest->vm[i].is_hyp_loaded ||
1603 manifest->vm[i].is_ffa_partition);
1604
1605 if (manifest->vm[i].is_ffa_partition &&
1606 !manifest->vm[i].is_hyp_loaded) {
Olivier Deprez62d99e32020-01-09 15:58:07 +01001607 TRY(parse_ffa_partition_package(stage1_locked, &vm_node,
1608 &manifest->vm[i], vm_id,
J-Alves77b6f4f2023-03-15 11:34:49 +00001609 boot_params, ppool));
J-Alves596049f2023-03-15 11:40:24 +00001610 size_t page_count =
1611 align_up(manifest->vm[i].secondary.mem_size,
1612 PAGE_SIZE) /
1613 PAGE_SIZE;
1614
1615 if (vm_id == HF_PRIMARY_VM_ID) {
1616 continue;
1617 }
1618
1619 TRY(check_partition_memory_is_valid(
1620 manifest->vm[i].partition.load_addr, page_count,
1621 0, boot_params));
1622
1623 /*
1624 * Check if memory from load-address until (load-address
1625 * + memory size) has been used by other partition.
1626 */
1627 TRY(check_and_record_memory_used(
1628 manifest->vm[i].partition.load_addr,
1629 page_count));
Olivier Deprez62d99e32020-01-09 15:58:07 +01001630 } else {
1631 TRY(parse_vm(&vm_node, &manifest->vm[i], vm_id));
1632 }
David Brazdil7a462ec2019-08-15 12:27:47 +01001633 }
1634
Olivier Deprezfb05f3c2020-11-10 17:48:04 +01001635 if (!found_primary_vm && vm_id_is_current_world(HF_PRIMARY_VM_ID)) {
David Brazdil7a462ec2019-08-15 12:27:47 +01001636 return MANIFEST_ERROR_NO_PRIMARY_VM;
1637 }
1638
1639 return MANIFEST_SUCCESS;
1640}
1641
Olivier Deprez93644652022-09-09 11:01:12 +02001642/**
1643 * Free manifest data resources, called once manifest parsing has
1644 * completed and VMs are loaded.
1645 */
Daniel Boulby801f8ef2022-06-27 14:21:01 +01001646void manifest_deinit(struct mpool *ppool)
1647{
Olivier Deprez93644652022-09-09 11:01:12 +02001648 manifest_data_deinit(ppool);
Daniel Boulby801f8ef2022-06-27 14:21:01 +01001649}
1650
David Brazdil7a462ec2019-08-15 12:27:47 +01001651const char *manifest_strerror(enum manifest_return_code ret_code)
1652{
1653 switch (ret_code) {
1654 case MANIFEST_SUCCESS:
1655 return "Success";
David Brazdila2358d42020-01-27 18:51:38 +00001656 case MANIFEST_ERROR_FILE_SIZE:
1657 return "Total size in header does not match file size";
Olivier Deprez62d99e32020-01-09 15:58:07 +01001658 case MANIFEST_ERROR_MALFORMED_DTB:
1659 return "Malformed device tree blob";
David Brazdila2358d42020-01-27 18:51:38 +00001660 case MANIFEST_ERROR_NO_ROOT_NODE:
1661 return "Could not find root node in manifest";
David Brazdil7a462ec2019-08-15 12:27:47 +01001662 case MANIFEST_ERROR_NO_HYPERVISOR_FDT_NODE:
1663 return "Could not find \"hypervisor\" node in manifest";
David Brazdil74e9c3b2019-08-28 11:09:08 +01001664 case MANIFEST_ERROR_NOT_COMPATIBLE:
1665 return "Hypervisor manifest entry not compatible with Hafnium";
David Brazdil7a462ec2019-08-15 12:27:47 +01001666 case MANIFEST_ERROR_RESERVED_VM_ID:
1667 return "Manifest defines a VM with a reserved ID";
1668 case MANIFEST_ERROR_NO_PRIMARY_VM:
1669 return "Manifest does not contain a primary VM entry";
1670 case MANIFEST_ERROR_TOO_MANY_VMS:
1671 return "Manifest specifies more VMs than Hafnium has "
1672 "statically allocated space for";
1673 case MANIFEST_ERROR_PROPERTY_NOT_FOUND:
1674 return "Property not found";
1675 case MANIFEST_ERROR_MALFORMED_STRING:
1676 return "Malformed string property";
David Brazdil0dbb41f2019-09-09 18:03:35 +01001677 case MANIFEST_ERROR_STRING_TOO_LONG:
1678 return "String too long";
David Brazdil7a462ec2019-08-15 12:27:47 +01001679 case MANIFEST_ERROR_MALFORMED_INTEGER:
1680 return "Malformed integer property";
1681 case MANIFEST_ERROR_INTEGER_OVERFLOW:
1682 return "Integer overflow";
Andrew Scullae9962e2019-10-03 16:51:16 +01001683 case MANIFEST_ERROR_MALFORMED_INTEGER_LIST:
1684 return "Malformed integer list property";
Andrew Scullb2c3a242019-11-04 13:52:36 +00001685 case MANIFEST_ERROR_MALFORMED_BOOLEAN:
1686 return "Malformed boolean property";
Manish Pandey6542f5c2020-04-27 14:37:46 +01001687 case MANIFEST_ERROR_MEMORY_REGION_NODE_EMPTY:
1688 return "Memory-region node should have at least one entry";
Manish Pandeye68e7932020-04-23 15:29:28 +01001689 case MANIFEST_ERROR_DEVICE_REGION_NODE_EMPTY:
1690 return "Device-region node should have at least one entry";
Manish Pandeyf06c9072020-09-29 15:41:58 +01001691 case MANIFEST_ERROR_RXTX_SIZE_MISMATCH:
1692 return "RX and TX buffers should be of same size";
Varun Wadekar4afbfd72022-10-13 14:30:18 +01001693 case MANIFEST_ERROR_MEM_REGION_EMPTY:
1694 return "Memory region should have at least one page";
Karl Meakinf6d49402023-04-04 18:14:26 +01001695 case MANIFEST_ERROR_BASE_ADDRESS_AND_RELATIVE_ADDRESS:
1696 return "Base and relative addresses are mutually exclusive";
Daniel Boulbya7e9e182022-06-27 14:21:01 +01001697 case MANIFEST_ERROR_MEM_REGION_OVERLAP:
1698 return "Memory region overlaps with one already allocated";
Daniel Boulbyc1a613d2022-10-18 11:26:17 +01001699 case MANIFEST_ERROR_MEM_REGION_UNALIGNED:
1700 return "Memory region is not aligned to a page boundary";
Raghu Krishnamurthy384693c2021-10-11 13:56:24 -07001701 case MANIFEST_ERROR_INVALID_MEM_PERM:
1702 return "Memory permission should be RO, RW or RX";
J-Alves35315782022-01-25 17:58:32 +00001703 case MANIFEST_ERROR_ARGUMENTS_LIST_EMPTY:
1704 return "Arguments-list node should have at least one argument";
Daniel Boulby801f8ef2022-06-27 14:21:01 +01001705 case MANIFEST_ERROR_INTERRUPT_ID_REPEATED:
1706 return "Interrupt ID already assigned to another endpoint";
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001707 case MANIFEST_ERROR_ILLEGAL_NS_INT_ACTION:
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001708 return "Illegal value specidied for the field: Action in "
1709 "response to NS Interrupt";
Raghu Krishnamurthy98da1ca2022-10-04 08:59:01 -07001710 case MANIFEST_ERROR_INTERRUPT_ID_NOT_IN_LIST:
1711 return "Interrupt ID is not in the list of interrupts";
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001712 case MANIFEST_ERROR_ILLEGAL_OTHER_S_INT_ACTION:
1713 return "Illegal value specified for the field: Action in "
1714 "response to Other-S Interrupt";
J-Alves77b6f4f2023-03-15 11:34:49 +00001715 case MANIFEST_ERROR_MEMORY_MISSING:
1716 return "Memory nodes must be defined in the SPMC manifest "
Olivier Deprez3cbdf862023-06-07 15:36:32 +02001717 "('memory' and 'ns-memory')";
J-Alves77b6f4f2023-03-15 11:34:49 +00001718 case MANIFEST_ERROR_PARTITION_ADDRESS_OVERLAP:
1719 return "Partition's memory [load address: load address + "
1720 "memory size[ overlap with other allocated "
Olivier Deprez3cbdf862023-06-07 15:36:32 +02001721 "regions";
J-Alves77b6f4f2023-03-15 11:34:49 +00001722 case MANIFEST_ERROR_MEM_REGION_INVALID:
Olivier Deprez3cbdf862023-06-07 15:36:32 +02001723 return "Invalid memory region range";
Daniel Boulby4339edc2024-02-21 14:59:00 +00001724 case MANIFEST_ERROR_DEVICE_MEM_REGION_INVALID:
1725 return "Invalid device memory region range";
Kathleen Capella4a2a6e72023-04-21 14:43:26 -04001726 case MANIFEST_ERROR_INVALID_BOOT_ORDER:
1727 return "Boot order should be a unique value less than "
1728 "default largest value";
Kathleen Capella422b10b2023-06-30 18:28:27 -04001729 case MANIFEST_ERROR_UUID_ALL_ZEROS:
1730 return "UUID should not be NIL";
Madhukar Pappireddy3c2b7912023-10-11 14:47:27 -05001731 case MANIFEST_ERROR_MISSING_SMMU_ID:
1732 return "SMMU ID must be specified for the given Stream IDs";
1733 case MANIFEST_ERROR_MISMATCH_DMA_ACCESS_PERMISSIONS:
1734 return "DMA device access permissions must match memory region "
1735 "attributes";
1736 case MANIFEST_ERROR_STREAM_IDS_OVERFLOW:
1737 return "DMA device stream ID count exceeds predefined limit";
1738 case MANIFEST_ERROR_DMA_ACCESS_PERMISSIONS_OVERFLOW:
1739 return "DMA access permissions count exceeds predefined limit";
Madhukar Pappireddy8a364472023-10-11 15:34:07 -05001740 case MANIFEST_ERROR_DMA_DEVICE_OVERFLOW:
1741 return "Number of device regions with DMA peripheral exceeds "
1742 "limit.";
David Brazdil7a462ec2019-08-15 12:27:47 +01001743 }
1744
1745 panic("Unexpected manifest return code.");
1746}