blob: 581d3bed1cc53bab77dac9f7e4616657588a8256 [file] [log] [blame]
David Brazdil7a462ec2019-08-15 12:27:47 +01001/*
2 * Copyright 2019 The Hafnium Authors.
3 *
Andrew Walbrane959ec12020-06-17 15:01:09 +01004 * Use of this source code is governed by a BSD-style
5 * license that can be found in the LICENSE file or at
6 * https://opensource.org/licenses/BSD-3-Clause.
David Brazdil7a462ec2019-08-15 12:27:47 +01007 */
8
9#include "hf/manifest.h"
10
J-Alvesd8a1d362023-03-08 11:15:28 +000011#include <stddef.h>
J-Alves77b6f4f2023-03-15 11:34:49 +000012#include <stdint.h>
J-Alvesd8a1d362023-03-08 11:15:28 +000013
J-Alves35315782022-01-25 17:58:32 +000014#include "hf/arch/types.h"
J-Alves77b6f4f2023-03-15 11:34:49 +000015#include "hf/arch/vmid_base.h"
J-Alves35315782022-01-25 17:58:32 +000016
David Brazdil7a462ec2019-08-15 12:27:47 +010017#include "hf/addr.h"
Daniel Boulbya2f8c662021-11-26 17:52:53 +000018#include "hf/assert.h"
J-Alves35315782022-01-25 17:58:32 +000019#include "hf/boot_info.h"
J-Alves77b6f4f2023-03-15 11:34:49 +000020#include "hf/boot_params.h"
David Brazdil7a462ec2019-08-15 12:27:47 +010021#include "hf/check.h"
Andrew Scullae9962e2019-10-03 16:51:16 +010022#include "hf/dlog.h"
J-Alves77b6f4f2023-03-15 11:34:49 +000023#include "hf/fdt.h"
24#include "hf/mm.h"
25#include "hf/mpool.h"
J-Alves2f86c1e2022-02-23 18:44:19 +000026#include "hf/sp_pkg.h"
David Brazdil7a462ec2019-08-15 12:27:47 +010027#include "hf/static_assert.h"
28#include "hf/std.h"
29
30#define TRY(expr) \
31 do { \
32 enum manifest_return_code ret_code = (expr); \
33 if (ret_code != MANIFEST_SUCCESS) { \
34 return ret_code; \
35 } \
36 } while (0)
37
David Brazdilb856be62020-03-25 10:14:55 +000038#define VM_ID_MAX (HF_VM_ID_OFFSET + MAX_VMS - 1)
39#define VM_ID_MAX_DIGITS (5)
40#define VM_NAME_EXTRA_CHARS (3) /* "vm" + number + '\0' */
41#define VM_NAME_MAX_SIZE (VM_ID_MAX_DIGITS + VM_NAME_EXTRA_CHARS)
42static_assert(VM_NAME_MAX_SIZE <= STRING_MAX_SIZE,
43 "VM name does not fit into a struct string.");
44static_assert(VM_ID_MAX <= 99999, "Insufficient VM_NAME_BUF_SIZE");
Olivier Deprez2a8ee342020-08-03 15:10:44 +020045static_assert((HF_OTHER_WORLD_ID > VM_ID_MAX) ||
46 (HF_OTHER_WORLD_ID < HF_VM_ID_BASE),
Andrew Walbran9daa57e2019-09-27 13:33:20 +010047 "TrustZone VM ID clashes with normal VM range.");
David Brazdil7a462ec2019-08-15 12:27:47 +010048
Kathleen Capella4a2a6e72023-04-21 14:43:26 -040049/* Bitmap to track boot order values in use. */
50#define BOOT_ORDER_ENTRY_BITS (sizeof(uint64_t) * 8)
51#define BOOT_ORDER_MAP_ENTRIES \
52 ((DEFAULT_BOOT_ORDER + (BOOT_ORDER_ENTRY_BITS - 1)) / \
53 BOOT_ORDER_ENTRY_BITS)
54
Daniel Boulby801f8ef2022-06-27 14:21:01 +010055/**
J-Alves596049f2023-03-15 11:40:24 +000056 * A struct to keep track of the partitions properties during early boot
57 * manifest parsing:
58 * - Interrupts ID.
59 * - Physical memory ranges.
Daniel Boulby801f8ef2022-06-27 14:21:01 +010060 */
Olivier Deprez93644652022-09-09 11:01:12 +020061struct manifest_data {
62 struct manifest manifest;
Daniel Boulby4ca50f02022-07-29 18:29:34 +010063 struct interrupt_bitmap intids;
J-Alves596049f2023-03-15 11:40:24 +000064 /*
65 * Allocate enough for the maximum amount of memory regions defined via
66 * the partitions manifest, and regions for each partition
67 * address-space.
68 */
69 struct mem_range
70 mem_regions[PARTITION_MAX_MEMORY_REGIONS * MAX_VMS + MAX_VMS];
Kathleen Capella4a2a6e72023-04-21 14:43:26 -040071 uint64_t boot_order_values[BOOT_ORDER_MAP_ENTRIES];
Daniel Boulby801f8ef2022-06-27 14:21:01 +010072};
Olivier Deprez93644652022-09-09 11:01:12 +020073
Daniel Boulby801f8ef2022-06-27 14:21:01 +010074/**
Daniel Boulbya7e9e182022-06-27 14:21:01 +010075 * Calculate the number of entries in the ppool that are required to
Olivier Deprez93644652022-09-09 11:01:12 +020076 * store the manifest_data struct.
Daniel Boulby801f8ef2022-06-27 14:21:01 +010077 */
J-Alves596049f2023-03-15 11:40:24 +000078static const size_t manifest_data_ppool_entries =
Olivier Deprez93644652022-09-09 11:01:12 +020079 (align_up(sizeof(struct manifest_data), MM_PPOOL_ENTRY_SIZE) /
Daniel Boulbya7e9e182022-06-27 14:21:01 +010080 MM_PPOOL_ENTRY_SIZE);
81
Olivier Deprez93644652022-09-09 11:01:12 +020082static struct manifest_data *manifest_data;
83/* Index used to track the number of memory regions allocated. */
Daniel Boulbya7e9e182022-06-27 14:21:01 +010084static size_t allocated_mem_regions_index = 0;
Daniel Boulby801f8ef2022-06-27 14:21:01 +010085
Kathleen Capella4a2a6e72023-04-21 14:43:26 -040086static bool check_boot_order(uint16_t boot_order)
87{
88 uint16_t i;
89 uint64_t boot_order_mask;
90
91 if (boot_order == DEFAULT_BOOT_ORDER) {
92 return true;
93 }
94 if (boot_order > DEFAULT_BOOT_ORDER) {
95 dlog_error("Boot order should not exceed %x",
96 DEFAULT_BOOT_ORDER);
97 return false;
98 }
99
100 i = boot_order / BOOT_ORDER_ENTRY_BITS;
101 boot_order_mask = 1 << (boot_order % BOOT_ORDER_ENTRY_BITS);
102
103 if ((boot_order_mask & manifest_data->boot_order_values[i]) != 0U) {
104 dlog_error("Boot order must be a unique value.");
105 return false;
106 }
107
108 manifest_data->boot_order_values[i] |= boot_order_mask;
109
110 return true;
111}
112
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100113/**
Olivier Deprez93644652022-09-09 11:01:12 +0200114 * Allocates and clear memory for the manifest data in the given memory pool.
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100115 * Returns true if the memory is successfully allocated.
116 */
Olivier Deprez93644652022-09-09 11:01:12 +0200117static bool manifest_data_init(struct mpool *ppool)
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100118{
Olivier Deprez93644652022-09-09 11:01:12 +0200119 manifest_data = (struct manifest_data *)mpool_alloc_contiguous(
120 ppool, manifest_data_ppool_entries, 1);
J-Alves5c0ae6f2023-06-14 15:20:21 +0100121
122 assert(manifest_data != NULL);
123
Olivier Deprez93644652022-09-09 11:01:12 +0200124 memset_s(manifest_data, sizeof(struct manifest_data), 0,
125 sizeof(struct manifest_data));
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100126
Olivier Deprez93644652022-09-09 11:01:12 +0200127 return manifest_data != NULL;
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100128}
129
130/**
Olivier Deprez93644652022-09-09 11:01:12 +0200131 * Frees the memory used for the manifest data in the given memory pool.
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100132 */
Olivier Deprez93644652022-09-09 11:01:12 +0200133static void manifest_data_deinit(struct mpool *ppool)
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100134{
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100135 /**
Olivier Deprez93644652022-09-09 11:01:12 +0200136 * Clear and return the memory used for the manifest_data struct to the
137 * memory pool.
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100138 */
Olivier Deprez93644652022-09-09 11:01:12 +0200139 memset_s(manifest_data, sizeof(struct manifest_data), 0,
140 sizeof(struct manifest_data));
141 mpool_add_chunk(ppool, manifest_data, manifest_data_ppool_entries);
142
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100143 /**
144 * Reset the index used for tracking the number of memory regions
145 * allocated.
146 */
147 allocated_mem_regions_index = 0;
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100148}
149
J-Alves19e20cf2023-08-02 12:48:55 +0100150static inline size_t count_digits(ffa_id_t vm_id)
David Brazdilb856be62020-03-25 10:14:55 +0000151{
152 size_t digits = 0;
153
154 do {
155 digits++;
156 vm_id /= 10;
157 } while (vm_id);
158 return digits;
159}
160
David Brazdil7a462ec2019-08-15 12:27:47 +0100161/**
162 * Generates a string with the two letters "vm" followed by an integer.
163 * Assumes `buf` is of size VM_NAME_BUF_SIZE.
164 */
J-Alves19e20cf2023-08-02 12:48:55 +0100165static void generate_vm_node_name(struct string *str, ffa_id_t vm_id)
David Brazdil7a462ec2019-08-15 12:27:47 +0100166{
167 static const char *digits = "0123456789";
David Brazdilb856be62020-03-25 10:14:55 +0000168 size_t vm_id_digits = count_digits(vm_id);
169 char *base = str->data;
170 char *ptr = base + (VM_NAME_EXTRA_CHARS + vm_id_digits);
David Brazdil7a462ec2019-08-15 12:27:47 +0100171
Daniel Boulbya2f8c662021-11-26 17:52:53 +0000172 assert(vm_id_digits <= VM_ID_MAX_DIGITS);
David Brazdil7a462ec2019-08-15 12:27:47 +0100173 *(--ptr) = '\0';
174 do {
175 *(--ptr) = digits[vm_id % 10];
176 vm_id /= 10;
177 } while (vm_id);
178 *(--ptr) = 'm';
179 *(--ptr) = 'v';
Daniel Boulbya2f8c662021-11-26 17:52:53 +0000180 assert(ptr == base);
David Brazdil7a462ec2019-08-15 12:27:47 +0100181}
182
Andrew Scullae9962e2019-10-03 16:51:16 +0100183/**
Andrew Scullb2c3a242019-11-04 13:52:36 +0000184 * Read a boolean property: true if present; false if not. If present, the value
185 * of the property must be empty else it is considered malformed.
Andrew Scullae9962e2019-10-03 16:51:16 +0100186 */
Andrew Scullb2c3a242019-11-04 13:52:36 +0000187static enum manifest_return_code read_bool(const struct fdt_node *node,
188 const char *property, bool *out)
Andrew Scullae9962e2019-10-03 16:51:16 +0100189{
David Brazdilb856be62020-03-25 10:14:55 +0000190 struct memiter data;
191 bool present = fdt_read_property(node, property, &data);
Andrew Scullae9962e2019-10-03 16:51:16 +0100192
David Brazdilb856be62020-03-25 10:14:55 +0000193 if (present && memiter_size(&data) != 0) {
Andrew Scullb2c3a242019-11-04 13:52:36 +0000194 return MANIFEST_ERROR_MALFORMED_BOOLEAN;
195 }
196
197 *out = present;
198 return MANIFEST_SUCCESS;
Andrew Scullae9962e2019-10-03 16:51:16 +0100199}
200
Andrew Scull72b43c02019-09-18 13:53:45 +0100201static enum manifest_return_code read_string(const struct fdt_node *node,
David Brazdil136f2942019-09-23 14:11:03 +0100202 const char *property,
203 struct string *out)
Andrew Scull72b43c02019-09-18 13:53:45 +0100204{
David Brazdilb856be62020-03-25 10:14:55 +0000205 struct memiter data;
Andrew Scull72b43c02019-09-18 13:53:45 +0100206
David Brazdilb856be62020-03-25 10:14:55 +0000207 if (!fdt_read_property(node, property, &data)) {
Andrew Scull72b43c02019-09-18 13:53:45 +0100208 return MANIFEST_ERROR_PROPERTY_NOT_FOUND;
209 }
210
David Brazdilb856be62020-03-25 10:14:55 +0000211 switch (string_init(out, &data)) {
David Brazdil136f2942019-09-23 14:11:03 +0100212 case STRING_SUCCESS:
213 return MANIFEST_SUCCESS;
214 case STRING_ERROR_INVALID_INPUT:
215 return MANIFEST_ERROR_MALFORMED_STRING;
216 case STRING_ERROR_TOO_LONG:
217 return MANIFEST_ERROR_STRING_TOO_LONG;
218 }
Andrew Scull72b43c02019-09-18 13:53:45 +0100219}
220
221static enum manifest_return_code read_optional_string(
David Brazdil136f2942019-09-23 14:11:03 +0100222 const struct fdt_node *node, const char *property, struct string *out)
Andrew Scull72b43c02019-09-18 13:53:45 +0100223{
David Brazdil136f2942019-09-23 14:11:03 +0100224 enum manifest_return_code ret;
Andrew Scull72b43c02019-09-18 13:53:45 +0100225
David Brazdil136f2942019-09-23 14:11:03 +0100226 ret = read_string(node, property, out);
227 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
228 string_init_empty(out);
229 ret = MANIFEST_SUCCESS;
Andrew Scull72b43c02019-09-18 13:53:45 +0100230 }
David Brazdil136f2942019-09-23 14:11:03 +0100231 return ret;
Andrew Scull72b43c02019-09-18 13:53:45 +0100232}
233
David Brazdil7a462ec2019-08-15 12:27:47 +0100234static enum manifest_return_code read_uint64(const struct fdt_node *node,
235 const char *property,
236 uint64_t *out)
237{
David Brazdilb856be62020-03-25 10:14:55 +0000238 struct memiter data;
David Brazdil7a462ec2019-08-15 12:27:47 +0100239
David Brazdilb856be62020-03-25 10:14:55 +0000240 if (!fdt_read_property(node, property, &data)) {
David Brazdil7a462ec2019-08-15 12:27:47 +0100241 return MANIFEST_ERROR_PROPERTY_NOT_FOUND;
242 }
243
David Brazdilb856be62020-03-25 10:14:55 +0000244 if (!fdt_parse_number(&data, memiter_size(&data), out)) {
David Brazdil7a462ec2019-08-15 12:27:47 +0100245 return MANIFEST_ERROR_MALFORMED_INTEGER;
246 }
247
248 return MANIFEST_SUCCESS;
249}
250
David Brazdil080ee312020-02-25 15:30:30 -0800251static enum manifest_return_code read_optional_uint64(
252 const struct fdt_node *node, const char *property,
253 uint64_t default_value, uint64_t *out)
254{
255 enum manifest_return_code ret;
256
257 ret = read_uint64(node, property, out);
258 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
259 *out = default_value;
260 return MANIFEST_SUCCESS;
261 }
262 return ret;
263}
264
Olivier Deprez62d99e32020-01-09 15:58:07 +0100265static enum manifest_return_code read_uint32(const struct fdt_node *node,
266 const char *property,
267 uint32_t *out)
268{
269 uint64_t value;
270
271 TRY(read_uint64(node, property, &value));
272
273 if (value > UINT32_MAX) {
274 return MANIFEST_ERROR_INTEGER_OVERFLOW;
275 }
276
277 *out = (uint32_t)value;
278 return MANIFEST_SUCCESS;
279}
280
Manish Pandeye68e7932020-04-23 15:29:28 +0100281static enum manifest_return_code read_optional_uint32(
282 const struct fdt_node *node, const char *property,
283 uint32_t default_value, uint32_t *out)
284{
285 enum manifest_return_code ret;
286
287 ret = read_uint32(node, property, out);
288 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
289 *out = default_value;
290 return MANIFEST_SUCCESS;
291 }
292 return ret;
293}
294
David Brazdil7a462ec2019-08-15 12:27:47 +0100295static enum manifest_return_code read_uint16(const struct fdt_node *node,
296 const char *property,
297 uint16_t *out)
298{
299 uint64_t value;
300
301 TRY(read_uint64(node, property, &value));
David Brazdil7a462ec2019-08-15 12:27:47 +0100302 if (value > UINT16_MAX) {
303 return MANIFEST_ERROR_INTEGER_OVERFLOW;
304 }
305
306 *out = (uint16_t)value;
307 return MANIFEST_SUCCESS;
308}
309
J-Alvesb37fd082020-10-22 12:29:21 +0100310static enum manifest_return_code read_optional_uint16(
311 const struct fdt_node *node, const char *property,
312 uint16_t default_value, uint16_t *out)
313{
314 enum manifest_return_code ret;
315
316 ret = read_uint16(node, property, out);
317 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
318 *out = default_value;
319 return MANIFEST_SUCCESS;
320 }
321
Kathleen Capella4a2a6e72023-04-21 14:43:26 -0400322 return ret;
J-Alvesb37fd082020-10-22 12:29:21 +0100323}
324
Olivier Deprez62d99e32020-01-09 15:58:07 +0100325static enum manifest_return_code read_uint8(const struct fdt_node *node,
326 const char *property, uint8_t *out)
327{
328 uint64_t value;
329
330 TRY(read_uint64(node, property, &value));
331
332 if (value > UINT8_MAX) {
333 return MANIFEST_ERROR_INTEGER_OVERFLOW;
334 }
335
336 *out = (uint8_t)value;
337 return MANIFEST_SUCCESS;
338}
339
J-Alves4369bd92020-08-07 16:35:36 +0100340static enum manifest_return_code read_optional_uint8(
341 const struct fdt_node *node, const char *property,
342 uint8_t default_value, uint8_t *out)
343{
344 enum manifest_return_code ret;
345
346 ret = read_uint8(node, property, out);
347 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
348 *out = default_value;
349 return MANIFEST_SUCCESS;
350 }
351
352 return MANIFEST_SUCCESS;
353}
354
Andrew Scullae9962e2019-10-03 16:51:16 +0100355struct uint32list_iter {
356 struct memiter mem_it;
357};
358
J-Alves4369bd92020-08-07 16:35:36 +0100359static enum manifest_return_code read_uint32list(const struct fdt_node *node,
360 const char *property,
361 struct uint32list_iter *out)
Andrew Scullae9962e2019-10-03 16:51:16 +0100362{
David Brazdilb856be62020-03-25 10:14:55 +0000363 struct memiter data;
Andrew Scullae9962e2019-10-03 16:51:16 +0100364
David Brazdilb856be62020-03-25 10:14:55 +0000365 if (!fdt_read_property(node, property, &data)) {
Andrew Scullae9962e2019-10-03 16:51:16 +0100366 memiter_init(&out->mem_it, NULL, 0);
J-Alves4369bd92020-08-07 16:35:36 +0100367 return MANIFEST_ERROR_PROPERTY_NOT_FOUND;
Andrew Scullae9962e2019-10-03 16:51:16 +0100368 }
369
David Brazdilb856be62020-03-25 10:14:55 +0000370 if ((memiter_size(&data) % sizeof(uint32_t)) != 0) {
Andrew Scullae9962e2019-10-03 16:51:16 +0100371 return MANIFEST_ERROR_MALFORMED_INTEGER_LIST;
372 }
373
David Brazdilb856be62020-03-25 10:14:55 +0000374 out->mem_it = data;
Andrew Scullae9962e2019-10-03 16:51:16 +0100375 return MANIFEST_SUCCESS;
376}
377
J-Alves4369bd92020-08-07 16:35:36 +0100378static enum manifest_return_code read_optional_uint32list(
379 const struct fdt_node *node, const char *property,
380 struct uint32list_iter *out)
381{
382 enum manifest_return_code ret = read_uint32list(node, property, out);
383
384 if (ret == MANIFEST_ERROR_PROPERTY_NOT_FOUND) {
385 return MANIFEST_SUCCESS;
386 }
387 return ret;
388}
389
Andrew Scullae9962e2019-10-03 16:51:16 +0100390static bool uint32list_has_next(const struct uint32list_iter *list)
391{
392 return memiter_size(&list->mem_it) > 0;
393}
394
David Brazdil5ea99462020-03-25 13:01:47 +0000395static enum manifest_return_code uint32list_get_next(
396 struct uint32list_iter *list, uint32_t *out)
Andrew Scullae9962e2019-10-03 16:51:16 +0100397{
Andrew Scullae9962e2019-10-03 16:51:16 +0100398 uint64_t num;
399
400 CHECK(uint32list_has_next(list));
David Brazdilb856be62020-03-25 10:14:55 +0000401 if (!fdt_parse_number(&list->mem_it, sizeof(uint32_t), &num)) {
Andrew Scullae9962e2019-10-03 16:51:16 +0100402 return MANIFEST_ERROR_MALFORMED_INTEGER;
403 }
404
David Brazdil5ea99462020-03-25 13:01:47 +0000405 *out = (uint32_t)num;
406 return MANIFEST_SUCCESS;
Andrew Scullae9962e2019-10-03 16:51:16 +0100407}
408
Olivier Deprez62d99e32020-01-09 15:58:07 +0100409static enum manifest_return_code parse_vm_common(const struct fdt_node *node,
410 struct manifest_vm *vm,
J-Alves19e20cf2023-08-02 12:48:55 +0100411 ffa_id_t vm_id)
David Brazdil7a462ec2019-08-15 12:27:47 +0100412{
Andrew Scullae9962e2019-10-03 16:51:16 +0100413 struct uint32list_iter smcs;
David Brazdil5ea99462020-03-25 13:01:47 +0000414 size_t idx;
Andrew Scullae9962e2019-10-03 16:51:16 +0100415
Olivier Deprez62d99e32020-01-09 15:58:07 +0100416 TRY(read_bool(node, "is_ffa_partition", &vm->is_ffa_partition));
417
Raghu Krishnamurthyb49549e2021-07-02 08:27:38 -0700418 TRY(read_bool(node, "hyp_loaded", &vm->is_hyp_loaded));
419
David Brazdil136f2942019-09-23 14:11:03 +0100420 TRY(read_string(node, "debug_name", &vm->debug_name));
Andrew Scullae9962e2019-10-03 16:51:16 +0100421
422 TRY(read_optional_uint32list(node, "smc_whitelist", &smcs));
423 while (uint32list_has_next(&smcs) &&
424 vm->smc_whitelist.smc_count < MAX_SMCS) {
David Brazdil5ea99462020-03-25 13:01:47 +0000425 idx = vm->smc_whitelist.smc_count++;
426 TRY(uint32list_get_next(&smcs, &vm->smc_whitelist.smcs[idx]));
Andrew Scullae9962e2019-10-03 16:51:16 +0100427 }
428
429 if (uint32list_has_next(&smcs)) {
Andrew Walbran17eebf92020-02-05 16:35:49 +0000430 dlog_warning("%s SMC whitelist too long.\n", vm->debug_name);
Andrew Scullae9962e2019-10-03 16:51:16 +0100431 }
432
Andrew Scullb2c3a242019-11-04 13:52:36 +0000433 TRY(read_bool(node, "smc_whitelist_permissive",
434 &vm->smc_whitelist.permissive));
Andrew Scullae9962e2019-10-03 16:51:16 +0100435
Olivier Deprez62d99e32020-01-09 15:58:07 +0100436 if (vm_id != HF_PRIMARY_VM_ID) {
437 TRY(read_uint64(node, "mem_size", &vm->secondary.mem_size));
438 TRY(read_uint16(node, "vcpu_count", &vm->secondary.vcpu_count));
Fuad Tabba50469e02020-06-30 15:14:28 +0100439 TRY(read_optional_string(node, "fdt_filename",
440 &vm->secondary.fdt_filename));
Olivier Deprez62d99e32020-01-09 15:58:07 +0100441 }
442
443 return MANIFEST_SUCCESS;
444}
445
446static enum manifest_return_code parse_vm(struct fdt_node *node,
447 struct manifest_vm *vm,
J-Alves19e20cf2023-08-02 12:48:55 +0100448 ffa_id_t vm_id)
Olivier Deprez62d99e32020-01-09 15:58:07 +0100449{
450 TRY(read_optional_string(node, "kernel_filename",
451 &vm->kernel_filename));
452
David Brazdile6f83222019-09-23 14:47:37 +0100453 if (vm_id == HF_PRIMARY_VM_ID) {
454 TRY(read_optional_string(node, "ramdisk_filename",
455 &vm->primary.ramdisk_filename));
David Brazdil080ee312020-02-25 15:30:30 -0800456 TRY(read_optional_uint64(node, "boot_address",
457 MANIFEST_INVALID_ADDRESS,
458 &vm->primary.boot_address));
David Brazdil7a462ec2019-08-15 12:27:47 +0100459 }
Raghu Krishnamurthy988a5e72021-02-27 21:46:06 -0800460 TRY(read_optional_uint8(node, "exception-level", (uint8_t)EL1,
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -0700461 (uint8_t *)&vm->partition.run_time_el));
Olivier Deprez62d99e32020-01-09 15:58:07 +0100462
David Brazdil7a462ec2019-08-15 12:27:47 +0100463 return MANIFEST_SUCCESS;
464}
465
J-Alves77b6f4f2023-03-15 11:34:49 +0000466static bool is_memory_region_within_ranges(uintptr_t base_address,
467 uint32_t page_count,
468 const struct mem_range *ranges,
469 const size_t ranges_size)
470{
471 uintptr_t region_end =
472 base_address + ((uintptr_t)page_count * PAGE_SIZE - 1);
473
474 for (size_t i = 0; i < ranges_size; i++) {
475 uintptr_t base = (uintptr_t)pa_addr(ranges[i].begin);
476 uintptr_t end = (uintptr_t)pa_addr(ranges[i].end);
477
478 if ((base_address >= base && base_address <= end) ||
479 (region_end >= base && region_end <= end)) {
480 return true;
481 }
482 }
483
484 return false;
485}
486
487void dump_memory_ranges(const struct mem_range *ranges,
488 const size_t ranges_size, bool ns)
489{
490 if (LOG_LEVEL < LOG_LEVEL_VERBOSE) {
491 return;
492 }
493
494 dlog("%s Memory ranges:\n", ns ? "NS" : "S");
495
496 for (size_t i = 0; i < ranges_size; i++) {
497 uintptr_t begin = pa_addr(ranges[i].begin);
498 uintptr_t end = pa_addr(ranges[i].end);
499 size_t page_count =
500 align_up(pa_difference(ranges[i].begin, ranges[i].end),
501 PAGE_SIZE) /
502 PAGE_SIZE;
503
504 dlog(" [%x - %x (%u pages)]\n", begin, end, page_count);
505 }
506}
507
508/**
509 * Check the partition's assigned memory is contained in the memory ranges
510 * configured for the SWd, in the SPMC's manifest.
511 */
512static enum manifest_return_code check_partition_memory_is_valid(
513 uintptr_t base_address, uint32_t page_count, uint32_t attributes,
514 const struct boot_params *params)
515{
516 bool is_secure_region =
517 (attributes & MANIFEST_REGION_ATTR_SECURITY) == 0U;
518 const struct mem_range *ranges_from_manifest =
519 is_secure_region ? params->mem_ranges : params->ns_mem_ranges;
520 size_t ranges_count = is_secure_region ? params->mem_ranges_count
521 : params->ns_mem_ranges_count;
522 bool within_ranges = is_memory_region_within_ranges(
523 base_address, page_count, ranges_from_manifest, ranges_count);
524
525 return within_ranges ? MANIFEST_SUCCESS
526 : MANIFEST_ERROR_MEM_REGION_INVALID;
527}
528
529/*
530 * Keep track of the memory allocated by partitions. This includes memory region
531 * nodes defined in their respective partition manifests, as well address space
532 * defined from their load address.
533 */
534static enum manifest_return_code check_and_record_memory_used(
Varun Wadekar4afbfd72022-10-13 14:30:18 +0100535 uintptr_t base_address, uint32_t page_count)
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100536{
J-Alves77b6f4f2023-03-15 11:34:49 +0000537 bool overlap_of_regions;
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100538
Varun Wadekar4afbfd72022-10-13 14:30:18 +0100539 if (page_count == 0U) {
540 dlog_error(
Daniel Boulbyc1a613d2022-10-18 11:26:17 +0100541 "Empty memory region defined with base address: %#x.\n",
Varun Wadekar4afbfd72022-10-13 14:30:18 +0100542 base_address);
543 return MANIFEST_ERROR_MEM_REGION_EMPTY;
544 }
545
Daniel Boulbyc1a613d2022-10-18 11:26:17 +0100546 if (!is_aligned(base_address, PAGE_SIZE)) {
547 dlog_error("base_address (%#x) is not aligned to page size.\n",
548 base_address);
549 return MANIFEST_ERROR_MEM_REGION_UNALIGNED;
550 }
551
J-Alves77b6f4f2023-03-15 11:34:49 +0000552 overlap_of_regions = is_memory_region_within_ranges(
553 base_address, page_count, manifest_data->mem_regions,
554 allocated_mem_regions_index);
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100555
J-Alves77b6f4f2023-03-15 11:34:49 +0000556 if (!overlap_of_regions) {
557 paddr_t begin = pa_init(base_address);
558
559 manifest_data->mem_regions[allocated_mem_regions_index].begin =
560 begin;
561 manifest_data->mem_regions[allocated_mem_regions_index].end =
562 pa_add(begin, page_count * PAGE_SIZE - 1);
563 allocated_mem_regions_index++;
564
565 return MANIFEST_SUCCESS;
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100566 }
567
J-Alves77b6f4f2023-03-15 11:34:49 +0000568 return MANIFEST_ERROR_MEM_REGION_OVERLAP;
Daniel Boulbya7e9e182022-06-27 14:21:01 +0100569}
570
Manish Pandey6542f5c2020-04-27 14:37:46 +0100571static enum manifest_return_code parse_ffa_memory_region_node(
Karl Meakinf6d49402023-04-04 18:14:26 +0100572 struct fdt_node *mem_node, uintptr_t load_address,
573 struct memory_region *mem_regions, uint16_t *count, struct rx_tx *rxtx,
J-Alves77b6f4f2023-03-15 11:34:49 +0000574 const struct boot_params *boot_params)
Manish Pandey6542f5c2020-04-27 14:37:46 +0100575{
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100576 uint32_t phandle;
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -0700577 uint16_t i = 0;
Madhukar Pappireddy3c2b7912023-10-11 14:47:27 -0500578 uint32_t j = 0;
Karl Meakinf6d49402023-04-04 18:14:26 +0100579 uintptr_t relative_address;
Madhukar Pappireddy3c2b7912023-10-11 14:47:27 -0500580 struct uint32list_iter list;
Manish Pandey6542f5c2020-04-27 14:37:46 +0100581
582 dlog_verbose(" Partition memory regions\n");
583
584 if (!fdt_is_compatible(mem_node, "arm,ffa-manifest-memory-regions")) {
585 return MANIFEST_ERROR_NOT_COMPATIBLE;
586 }
587
588 if (!fdt_first_child(mem_node)) {
589 return MANIFEST_ERROR_MEMORY_REGION_NODE_EMPTY;
590 }
591
592 do {
593 dlog_verbose(" Memory Region[%u]\n", i);
594
595 TRY(read_optional_string(mem_node, "description",
596 &mem_regions[i].name));
597 dlog_verbose(" Name: %s\n",
598 string_data(&mem_regions[i].name));
599
Karl Meakinf6d49402023-04-04 18:14:26 +0100600 TRY(read_optional_uint64(mem_node, "base-address",
601 MANIFEST_INVALID_ADDRESS,
602 &mem_regions[i].base_address));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200603 dlog_verbose(" Base address: %#x\n",
Manish Pandey6542f5c2020-04-27 14:37:46 +0100604 mem_regions[i].base_address);
605
Karl Meakinf6d49402023-04-04 18:14:26 +0100606 TRY(read_optional_uint64(mem_node, "relative-address",
607 MANIFEST_INVALID_ADDRESS,
608 &relative_address));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200609 if (relative_address != MANIFEST_INVALID_ADDRESS) {
610 dlog_verbose(" Relative address: %#x\n",
611 relative_address);
612 }
Karl Meakinf6d49402023-04-04 18:14:26 +0100613
614 if (mem_regions[i].base_address == MANIFEST_INVALID_ADDRESS &&
615 relative_address == MANIFEST_INVALID_ADDRESS) {
616 return MANIFEST_ERROR_PROPERTY_NOT_FOUND;
617 }
618
619 if (mem_regions[i].base_address != MANIFEST_INVALID_ADDRESS &&
620 relative_address != MANIFEST_INVALID_ADDRESS) {
621 return MANIFEST_ERROR_BASE_ADDRESS_AND_RELATIVE_ADDRESS;
622 }
623
624 if (relative_address != MANIFEST_INVALID_ADDRESS &&
625 relative_address > UINT64_MAX - load_address) {
626 return MANIFEST_ERROR_INTEGER_OVERFLOW;
627 }
628
629 if (relative_address != MANIFEST_INVALID_ADDRESS) {
630 mem_regions[i].base_address =
631 load_address + relative_address;
632 }
633
Manish Pandey6542f5c2020-04-27 14:37:46 +0100634 TRY(read_uint32(mem_node, "pages-count",
635 &mem_regions[i].page_count));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200636 dlog_verbose(" Pages_count: %u\n",
Manish Pandey6542f5c2020-04-27 14:37:46 +0100637 mem_regions[i].page_count);
638
639 TRY(read_uint32(mem_node, "attributes",
640 &mem_regions[i].attributes));
Raghu Krishnamurthy384693c2021-10-11 13:56:24 -0700641
Olivier Deprez035fa152022-03-14 11:19:10 +0100642 /*
643 * Check RWX permission attributes.
644 * Security attribute is checked at load phase.
645 */
646 uint32_t permissions = mem_regions[i].attributes &
647 (MANIFEST_REGION_ATTR_READ |
648 MANIFEST_REGION_ATTR_WRITE |
649 MANIFEST_REGION_ATTR_EXEC);
650 if (permissions != MANIFEST_REGION_ATTR_READ &&
651 permissions != (MANIFEST_REGION_ATTR_READ |
652 MANIFEST_REGION_ATTR_WRITE) &&
653 permissions != (MANIFEST_REGION_ATTR_READ |
654 MANIFEST_REGION_ATTR_EXEC)) {
Raghu Krishnamurthy384693c2021-10-11 13:56:24 -0700655 return MANIFEST_ERROR_INVALID_MEM_PERM;
656 }
657
Olivier Deprez035fa152022-03-14 11:19:10 +0100658 /* Filter memory region attributes. */
659 mem_regions[i].attributes &= MANIFEST_REGION_ALL_ATTR_MASK;
660
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200661 dlog_verbose(" Attributes: %#x\n",
Manish Pandey6542f5c2020-04-27 14:37:46 +0100662 mem_regions[i].attributes);
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100663
J-Alves77b6f4f2023-03-15 11:34:49 +0000664 TRY(check_partition_memory_is_valid(
665 mem_regions[i].base_address, mem_regions[i].page_count,
666 mem_regions[i].attributes, boot_params));
667
668 TRY(check_and_record_memory_used(mem_regions[i].base_address,
669 mem_regions[i].page_count));
670
Madhukar Pappireddy3c2b7912023-10-11 14:47:27 -0500671 TRY(read_optional_uint32(mem_node, "smmu-id",
672 MANIFEST_INVALID_ID,
673 &mem_regions[i].dma_prop.smmu_id));
674 if (mem_regions[i].dma_prop.smmu_id != MANIFEST_INVALID_ID) {
675 dlog_verbose(" smmu-id: %u\n",
676 mem_regions[i].dma_prop.smmu_id);
677 }
678
679 TRY(read_optional_uint32list(mem_node, "stream-ids", &list));
680 dlog_verbose(" Stream IDs assigned:\n");
681
682 j = 0;
683 while (uint32list_has_next(&list)) {
684 if (j == PARTITION_MAX_STREAMS_PER_DEVICE) {
685 return MANIFEST_ERROR_STREAM_IDS_OVERFLOW;
686 }
687
688 TRY(uint32list_get_next(
689 &list, &mem_regions[i].dma_prop.stream_ids[j]));
690 dlog_verbose(" %u\n",
691 mem_regions[i].dma_prop.stream_ids[j]);
692 j++;
693 }
694 if (j == 0) {
695 dlog_verbose(" None\n");
696 } else if (mem_regions[i].dma_prop.smmu_id ==
697 MANIFEST_INVALID_ID) {
698 /*
699 * SMMU ID must be specified if the partition specifies
700 * Stream IDs for any device upstream of SMMU.
701 */
702 return MANIFEST_ERROR_MISSING_SMMU_ID;
703 }
704
705 mem_regions[i].dma_prop.stream_count = j;
706
707 TRY(read_optional_uint32list(
708 mem_node, "stream-ids-access-permissions", &list));
709 dlog_verbose(" Access permissions of Stream IDs:\n");
710
711 j = 0;
712 while (uint32list_has_next(&list)) {
713 uint32_t permissions;
714
715 if (j == PARTITION_MAX_STREAMS_PER_DEVICE) {
716 return MANIFEST_ERROR_DMA_ACCESS_PERMISSIONS_OVERFLOW;
717 }
718
719 TRY(uint32list_get_next(&list, &permissions));
720 dlog_verbose(" %u\n", permissions);
721
722 if (j == 0) {
723 mem_regions[i].dma_prop.dma_access_permissions =
724 permissions;
725 }
726
727 /*
728 * All stream ids belonging to a dma device must specify
729 * the same access permissions.
730 */
731 if (permissions !=
732 mem_regions[i].dma_prop.dma_access_permissions) {
733 return MANIFEST_ERROR_MISMATCH_DMA_ACCESS_PERMISSIONS;
734 }
735
736 j++;
737 }
738
739 if (j == 0) {
740 dlog_verbose(" None\n");
741 } else if (j != mem_regions[i].dma_prop.stream_count) {
742 return MANIFEST_ERROR_MISMATCH_DMA_ACCESS_PERMISSIONS;
743 }
744
745 if (j > 0) {
746 /* Filter the dma access permissions. */
747 mem_regions[i].dma_prop.dma_access_permissions &=
748 MANIFEST_REGION_ALL_ATTR_MASK;
749 }
750
Manish Pandeya70a4192020-10-07 22:05:04 +0100751 if (rxtx->available) {
752 TRY(read_optional_uint32(
753 mem_node, "phandle",
754 (uint32_t)MANIFEST_INVALID_ADDRESS, &phandle));
755 if (phandle == rxtx->rx_phandle) {
756 dlog_verbose(" Assigned as RX buffer\n");
757 rxtx->rx_buffer = &mem_regions[i];
758 } else if (phandle == rxtx->tx_phandle) {
759 dlog_verbose(" Assigned as TX buffer\n");
760 rxtx->tx_buffer = &mem_regions[i];
761 }
Manish Pandeyfa1f2912020-05-05 12:57:01 +0100762 }
763
Manish Pandey6542f5c2020-04-27 14:37:46 +0100764 i++;
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -0700765 } while (fdt_next_sibling(mem_node) &&
766 (i < PARTITION_MAX_MEMORY_REGIONS));
Manish Pandey6542f5c2020-04-27 14:37:46 +0100767
Manish Pandeya70a4192020-10-07 22:05:04 +0100768 if (rxtx->available &&
769 (rxtx->rx_buffer->page_count != rxtx->tx_buffer->page_count)) {
Manish Pandeyf06c9072020-09-29 15:41:58 +0100770 return MANIFEST_ERROR_RXTX_SIZE_MISMATCH;
771 }
772
Manish Pandey2145c212020-05-01 16:04:22 +0100773 *count = i;
Manish Pandey6542f5c2020-04-27 14:37:46 +0100774
775 return MANIFEST_SUCCESS;
776}
777
Raghu Krishnamurthy98da1ca2022-10-04 08:59:01 -0700778static struct interrupt_info *device_region_get_interrupt_info(
779 struct device_region *dev_regions, uint32_t intid)
780{
781 for (uint32_t i = 0; i < ARRAY_SIZE(dev_regions->interrupts); i++) {
782 if (dev_regions->interrupts[i].id == intid) {
783 return &(dev_regions->interrupts[i]);
784 }
785 }
786 return NULL;
787}
788
Manish Pandeye68e7932020-04-23 15:29:28 +0100789static enum manifest_return_code parse_ffa_device_region_node(
Manish Pandey2145c212020-05-01 16:04:22 +0100790 struct fdt_node *dev_node, struct device_region *dev_regions,
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -0700791 uint16_t *count)
Manish Pandeye68e7932020-04-23 15:29:28 +0100792{
793 struct uint32list_iter list;
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -0700794 uint16_t i = 0;
Madhukar Pappireddy5fc8be12021-08-03 11:42:53 -0500795 uint32_t j = 0;
Olivier Deprez93644652022-09-09 11:01:12 +0200796 struct interrupt_bitmap allocated_intids = manifest_data->intids;
Manish Pandeye68e7932020-04-23 15:29:28 +0100797
798 dlog_verbose(" Partition Device Regions\n");
799
800 if (!fdt_is_compatible(dev_node, "arm,ffa-manifest-device-regions")) {
801 return MANIFEST_ERROR_NOT_COMPATIBLE;
802 }
803
804 if (!fdt_first_child(dev_node)) {
805 return MANIFEST_ERROR_DEVICE_REGION_NODE_EMPTY;
806 }
807
808 do {
809 dlog_verbose(" Device Region[%u]\n", i);
810
811 TRY(read_optional_string(dev_node, "description",
812 &dev_regions[i].name));
813 dlog_verbose(" Name: %s\n",
814 string_data(&dev_regions[i].name));
815
816 TRY(read_uint64(dev_node, "base-address",
817 &dev_regions[i].base_address));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200818 dlog_verbose(" Base address: %#x\n",
Manish Pandeye68e7932020-04-23 15:29:28 +0100819 dev_regions[i].base_address);
820
821 TRY(read_uint32(dev_node, "pages-count",
822 &dev_regions[i].page_count));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200823 dlog_verbose(" Pages_count: %u\n",
Manish Pandeye68e7932020-04-23 15:29:28 +0100824 dev_regions[i].page_count);
825
826 TRY(read_uint32(dev_node, "attributes",
827 &dev_regions[i].attributes));
Raghu Krishnamurthy384693c2021-10-11 13:56:24 -0700828
Olivier Deprez035fa152022-03-14 11:19:10 +0100829 /*
830 * Check RWX permission attributes.
831 * Security attribute is checked at load phase.
832 */
833 uint32_t permissions = dev_regions[i].attributes &
834 (MANIFEST_REGION_ATTR_READ |
835 MANIFEST_REGION_ATTR_WRITE |
836 MANIFEST_REGION_ATTR_EXEC);
837
838 if (permissions != MANIFEST_REGION_ATTR_READ &&
839 permissions != (MANIFEST_REGION_ATTR_READ |
840 MANIFEST_REGION_ATTR_WRITE)) {
Raghu Krishnamurthy384693c2021-10-11 13:56:24 -0700841 return MANIFEST_ERROR_INVALID_MEM_PERM;
842 }
843
Olivier Deprez035fa152022-03-14 11:19:10 +0100844 /* Filer device region attributes. */
845 dev_regions[i].attributes = dev_regions[i].attributes &
846 MANIFEST_REGION_ALL_ATTR_MASK;
847
Olivier Deprezb7aa0c22023-06-29 10:46:26 +0200848 dlog_verbose(" Attributes: %#x\n",
Manish Pandeye68e7932020-04-23 15:29:28 +0100849 dev_regions[i].attributes);
850
851 TRY(read_optional_uint32list(dev_node, "interrupts", &list));
852 dlog_verbose(" Interrupt List:\n");
853 j = 0;
854 while (uint32list_has_next(&list) &&
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -0700855 j < PARTITION_MAX_INTERRUPTS_PER_DEVICE) {
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100856 uint32_t intid;
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100857
Manish Pandeye68e7932020-04-23 15:29:28 +0100858 TRY(uint32list_get_next(
859 &list, &dev_regions[i].interrupts[j].id));
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100860 intid = dev_regions[i].interrupts[j].id;
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100861
862 dlog_verbose(" ID = %u\n", intid);
863
Daniel Boulby4ca50f02022-07-29 18:29:34 +0100864 if (interrupt_bitmap_get_value(&allocated_intids,
865 intid) == 1U) {
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100866 return MANIFEST_ERROR_INTERRUPT_ID_REPEATED;
867 }
868
Daniel Boulby4ca50f02022-07-29 18:29:34 +0100869 interrupt_bitmap_set_value(&allocated_intids, intid);
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100870
Manish Pandeye68e7932020-04-23 15:29:28 +0100871 if (uint32list_has_next(&list)) {
872 TRY(uint32list_get_next(&list,
873 &dev_regions[i]
874 .interrupts[j]
875 .attributes));
876 } else {
877 return MANIFEST_ERROR_MALFORMED_INTEGER_LIST;
878 }
879
Raghu Krishnamurthy98da1ca2022-10-04 08:59:01 -0700880 dev_regions[i].interrupts[j].mpidr_valid = false;
881 dev_regions[i].interrupts[j].mpidr = 0;
882
Daniel Boulby801f8ef2022-06-27 14:21:01 +0100883 dlog_verbose(" attributes = %u\n",
Manish Pandeye68e7932020-04-23 15:29:28 +0100884 dev_regions[i].interrupts[j].attributes);
885 j++;
886 }
Madhukar Pappireddy5fc8be12021-08-03 11:42:53 -0500887
888 dev_regions[i].interrupt_count = j;
Manish Pandeye68e7932020-04-23 15:29:28 +0100889 if (j == 0) {
890 dlog_verbose(" Empty\n");
Raghu Krishnamurthy98da1ca2022-10-04 08:59:01 -0700891 } else {
892 TRY(read_optional_uint32list(
893 dev_node, "interrupts-target", &list));
894 dlog_verbose(" Interrupt Target List:\n");
895
896 while (uint32list_has_next(&list)) {
897 uint32_t intid;
898 uint64_t mpidr = 0;
899 uint32_t mpidr_lower = 0;
900 uint32_t mpidr_upper = 0;
901 struct interrupt_info *info = NULL;
902
903 TRY(uint32list_get_next(&list, &intid));
904
905 dlog_verbose(" ID = %u\n", intid);
906
907 if (interrupt_bitmap_get_value(
908 &allocated_intids, intid) != 1U) {
909 return MANIFEST_ERROR_INTERRUPT_ID_NOT_IN_LIST;
910 }
911
912 TRY(uint32list_get_next(&list, &mpidr_upper));
913 TRY(uint32list_get_next(&list, &mpidr_lower));
914 mpidr = mpidr_upper;
915 mpidr <<= 32;
916 mpidr |= mpidr_lower;
917
918 info = device_region_get_interrupt_info(
919 &dev_regions[i], intid);
920 /*
921 * We should find info since
922 * interrupt_bitmap_get_value already ensures
923 * that we saw the interrupt and allocated ids
924 * for it.
925 */
926 assert(info != NULL);
927 info->mpidr = mpidr;
928 info->mpidr_valid = true;
929 dlog_verbose(" MPIDR = %#x\n", mpidr);
930 }
Manish Pandeye68e7932020-04-23 15:29:28 +0100931 }
932
933 TRY(read_optional_uint32(dev_node, "smmu-id",
Madhukar Pappireddy54680c72020-10-23 15:02:38 -0500934 MANIFEST_INVALID_ID,
Manish Pandeye68e7932020-04-23 15:29:28 +0100935 &dev_regions[i].smmu_id));
Olivier Deprez86d87ae2021-08-19 14:27:46 +0200936 if (dev_regions[i].smmu_id != MANIFEST_INVALID_ID) {
937 dlog_verbose(" smmu-id: %u\n",
938 dev_regions[i].smmu_id);
939 }
Manish Pandeye68e7932020-04-23 15:29:28 +0100940
941 TRY(read_optional_uint32list(dev_node, "stream-ids", &list));
942 dlog_verbose(" Stream IDs assigned:\n");
943
944 j = 0;
945 while (uint32list_has_next(&list) &&
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -0700946 j < PARTITION_MAX_STREAMS_PER_DEVICE) {
Manish Pandeye68e7932020-04-23 15:29:28 +0100947 TRY(uint32list_get_next(&list,
948 &dev_regions[i].stream_ids[j]));
949 dlog_verbose(" %u\n",
950 dev_regions[i].stream_ids[j]);
951 j++;
952 }
953 if (j == 0) {
954 dlog_verbose(" None\n");
955 }
Madhukar Pappireddy54680c72020-10-23 15:02:38 -0500956 dev_regions[i].stream_count = j;
Manish Pandeye68e7932020-04-23 15:29:28 +0100957
958 TRY(read_bool(dev_node, "exclusive-access",
959 &dev_regions[i].exclusive_access));
J-Alves4369bd92020-08-07 16:35:36 +0100960 dlog_verbose(" Exclusive_access: %u\n",
Manish Pandeye68e7932020-04-23 15:29:28 +0100961 dev_regions[i].exclusive_access);
962
963 i++;
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -0700964 } while (fdt_next_sibling(dev_node) &&
965 (i < PARTITION_MAX_DEVICE_REGIONS));
Manish Pandeye68e7932020-04-23 15:29:28 +0100966
Manish Pandey2145c212020-05-01 16:04:22 +0100967 *count = i;
Manish Pandeye68e7932020-04-23 15:29:28 +0100968
969 return MANIFEST_SUCCESS;
970}
971
J-Alvesabebe432022-05-31 14:40:50 +0100972static enum manifest_return_code sanity_check_ffa_manifest(
973 struct manifest_vm *vm)
974{
975 uint16_t ffa_version_major;
976 uint16_t ffa_version_minor;
977 enum manifest_return_code ret_code = MANIFEST_SUCCESS;
978 const char *error_string = "specified in manifest is unsupported";
979 uint32_t k = 0;
Kathleen Capellaf71dee42023-08-08 16:24:14 -0400980 bool using_req2 = (vm->partition.messaging_method &
981 (FFA_PARTITION_DIRECT_REQ2_RECV |
982 FFA_PARTITION_DIRECT_REQ2_SEND)) != 0;
J-Alvesabebe432022-05-31 14:40:50 +0100983
984 /* ensure that the SPM version is compatible */
985 ffa_version_major = (vm->partition.ffa_version & 0xffff0000) >>
986 FFA_VERSION_MAJOR_OFFSET;
987 ffa_version_minor = vm->partition.ffa_version & 0xffff;
988
989 if (ffa_version_major != FFA_VERSION_MAJOR ||
990 ffa_version_minor > FFA_VERSION_MINOR) {
991 dlog_error("FF-A partition manifest version %s: %u.%u\n",
992 error_string, ffa_version_major, ffa_version_minor);
993 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
994 }
995
996 if (vm->partition.xlat_granule != PAGE_4KB) {
997 dlog_error("Translation granule %s: %u\n", error_string,
998 vm->partition.xlat_granule);
999 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1000 }
1001
1002 if (vm->partition.execution_state != AARCH64) {
1003 dlog_error("Execution state %s: %u\n", error_string,
1004 vm->partition.execution_state);
1005 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1006 }
1007
1008 if (vm->partition.run_time_el != EL1 &&
1009 vm->partition.run_time_el != S_EL1 &&
Daniel Boulby874d5432023-04-27 12:40:24 +01001010 vm->partition.run_time_el != S_EL0 &&
1011 vm->partition.run_time_el != EL0) {
J-Alvesabebe432022-05-31 14:40:50 +01001012 dlog_error("Exception level %s: %d\n", error_string,
1013 vm->partition.run_time_el);
1014 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1015 }
1016
Kathleen Capellaf71dee42023-08-08 16:24:14 -04001017 if (vm->partition.ffa_version < MAKE_FFA_VERSION(1, 2) && using_req2) {
1018 dlog_error("Messaging method %s: %x\n", error_string,
1019 vm->partition.messaging_method);
1020 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1021 }
1022
J-Alvesabebe432022-05-31 14:40:50 +01001023 if ((vm->partition.messaging_method &
1024 ~(FFA_PARTITION_DIRECT_REQ_RECV | FFA_PARTITION_DIRECT_REQ_SEND |
Kathleen Capellaf71dee42023-08-08 16:24:14 -04001025 FFA_PARTITION_INDIRECT_MSG | FFA_PARTITION_DIRECT_REQ2_RECV |
1026 FFA_PARTITION_DIRECT_REQ2_SEND)) != 0U) {
J-Alvesabebe432022-05-31 14:40:50 +01001027 dlog_error("Messaging method %s: %x\n", error_string,
1028 vm->partition.messaging_method);
1029 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1030 }
1031
Daniel Boulby874d5432023-04-27 12:40:24 +01001032 if ((vm->partition.run_time_el == S_EL0 ||
1033 vm->partition.run_time_el == EL0) &&
J-Alvesabebe432022-05-31 14:40:50 +01001034 vm->partition.execution_ctx_count != 1) {
1035 dlog_error(
1036 "Exception level and execution context count %s: %d "
1037 "%d\n",
1038 error_string, vm->partition.run_time_el,
1039 vm->partition.execution_ctx_count);
1040 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1041 }
1042
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -07001043 for (uint16_t i = 0; i < vm->partition.dev_region_count; i++) {
J-Alvesabebe432022-05-31 14:40:50 +01001044 struct device_region dev_region;
1045
1046 dev_region = vm->partition.dev_regions[i];
1047
Raghu Krishnamurthy641dcd82022-07-19 23:21:20 -07001048 if (dev_region.interrupt_count >
1049 PARTITION_MAX_INTERRUPTS_PER_DEVICE) {
J-Alvesabebe432022-05-31 14:40:50 +01001050 dlog_error(
1051 "Interrupt count for device region exceeds "
1052 "limit.\n");
1053 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1054 continue;
1055 }
1056
1057 for (uint8_t j = 0; j < dev_region.interrupt_count; j++) {
1058 k++;
1059 if (k > VM_MANIFEST_MAX_INTERRUPTS) {
1060 dlog_error(
1061 "Interrupt count for VM exceeds "
1062 "limit.\n");
1063 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1064 continue;
1065 }
1066 }
1067 }
1068
1069 /* GP register is restricted to one of x0 - x3. */
1070 if (vm->partition.gp_register_num != -1 &&
1071 vm->partition.gp_register_num > 3) {
1072 dlog_error("GP register number %s: %u\n", error_string,
1073 vm->partition.gp_register_num);
1074 ret_code = MANIFEST_ERROR_NOT_COMPATIBLE;
1075 }
1076
1077 return ret_code;
1078}
1079
J-Alves77b6f4f2023-03-15 11:34:49 +00001080enum manifest_return_code parse_ffa_manifest(
1081 struct fdt *fdt, struct manifest_vm *vm,
1082 struct fdt_node *boot_info_node, const struct boot_params *boot_params)
Olivier Deprez62d99e32020-01-09 15:58:07 +01001083{
1084 unsigned int i = 0;
Kathleen Capella422b10b2023-06-30 18:28:27 -04001085 unsigned int j = 0;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001086 struct uint32list_iter uuid;
1087 uint32_t uuid_word;
1088 struct fdt_node root;
1089 struct fdt_node ffa_node;
1090 struct string rxtx_node_name = STRING_INIT("rx_tx-info");
Manish Pandey6542f5c2020-04-27 14:37:46 +01001091 struct string mem_region_node_name = STRING_INIT("memory-regions");
Manish Pandeye68e7932020-04-23 15:29:28 +01001092 struct string dev_region_node_name = STRING_INIT("device-regions");
J-Alves35315782022-01-25 17:58:32 +00001093 struct string boot_info_node_name = STRING_INIT("boot-info");
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001094 bool managed_exit_field_present = false;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001095
1096 if (!fdt_find_node(fdt, "/", &root)) {
1097 return MANIFEST_ERROR_NO_ROOT_NODE;
1098 }
1099
1100 /* Check "compatible" property. */
1101 if (!fdt_is_compatible(&root, "arm,ffa-manifest-1.0")) {
1102 return MANIFEST_ERROR_NOT_COMPATIBLE;
1103 }
1104
J-Alves4369bd92020-08-07 16:35:36 +01001105 TRY(read_uint32list(&root, "uuid", &uuid));
Olivier Deprez62d99e32020-01-09 15:58:07 +01001106
Kathleen Capella422b10b2023-06-30 18:28:27 -04001107 while (uint32list_has_next(&uuid) && j < PARTITION_MAX_UUIDS) {
1108 while (uint32list_has_next(&uuid) && i < 4) {
1109 TRY(uint32list_get_next(&uuid, &uuid_word));
1110 vm->partition.uuids[j].uuid[i] = uuid_word;
1111 i++;
1112 }
1113
1114 if (ffa_uuid_is_null(&vm->partition.uuids[j])) {
1115 return MANIFEST_ERROR_UUID_ALL_ZEROS;
1116 }
1117 dlog_verbose(" UUID %#x-%x-%x-%x\n",
1118 vm->partition.uuids[j].uuid[0],
1119 vm->partition.uuids[j].uuid[1],
1120 vm->partition.uuids[j].uuid[2],
1121 vm->partition.uuids[j].uuid[3]);
1122 j++;
1123 i = 0;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001124 }
Kathleen Capella422b10b2023-06-30 18:28:27 -04001125
1126 vm->partition.uuid_count = j;
1127 dlog_verbose(" Number of UUIDs %u\n", vm->partition.uuid_count);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001128
Olivier Deprezb7aa0c22023-06-29 10:46:26 +02001129 TRY(read_uint32(&root, "ffa-version", &vm->partition.ffa_version));
1130 dlog_verbose(" Expected FF-A version %u.%u\n",
1131 vm->partition.ffa_version >> 16,
1132 vm->partition.ffa_version & 0xffff);
1133
Olivier Deprez62d99e32020-01-09 15:58:07 +01001134 TRY(read_uint16(&root, "execution-ctx-count",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001135 &vm->partition.execution_ctx_count));
J-Alves4369bd92020-08-07 16:35:36 +01001136 dlog_verbose(" Number of execution context %u\n",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001137 vm->partition.execution_ctx_count);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001138
1139 TRY(read_uint8(&root, "exception-level",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001140 (uint8_t *)&vm->partition.run_time_el));
1141 dlog_verbose(" Run-time EL %u\n", vm->partition.run_time_el);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001142
1143 TRY(read_uint8(&root, "execution-state",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001144 (uint8_t *)&vm->partition.execution_state));
1145 dlog_verbose(" Execution state %u\n", vm->partition.execution_state);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001146
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001147 TRY(read_optional_uint64(&root, "load-address", 0,
1148 &vm->partition.load_addr));
1149 dlog_verbose(" Load address %#x\n", vm->partition.load_addr);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001150
J-Alves4369bd92020-08-07 16:35:36 +01001151 TRY(read_optional_uint64(&root, "entrypoint-offset", 0,
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001152 &vm->partition.ep_offset));
1153 dlog_verbose(" Entry point offset %#x\n", vm->partition.ep_offset);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001154
J-Alves35315782022-01-25 17:58:32 +00001155 TRY(read_optional_uint32(&root, "gp-register-num",
1156 DEFAULT_BOOT_GP_REGISTER,
1157 &vm->partition.gp_register_num));
Olivier Deprezb7aa0c22023-06-29 10:46:26 +02001158
1159 if (vm->partition.gp_register_num != DEFAULT_BOOT_GP_REGISTER) {
1160 dlog_verbose(" Boot GP register: x%u\n",
1161 vm->partition.gp_register_num);
1162 }
J-Alves35315782022-01-25 17:58:32 +00001163
J-Alvesb37fd082020-10-22 12:29:21 +01001164 TRY(read_optional_uint16(&root, "boot-order", DEFAULT_BOOT_ORDER,
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001165 &vm->partition.boot_order));
Kathleen Capella4a2a6e72023-04-21 14:43:26 -04001166 if (vm->partition.boot_order != DEFAULT_BOOT_ORDER) {
1167 dlog_verbose(" Boot order %#u\n", vm->partition.boot_order);
1168 }
1169
1170 if (!check_boot_order(vm->partition.boot_order)) {
1171 return MANIFEST_ERROR_INVALID_BOOT_ORDER;
1172 }
J-Alvesb37fd082020-10-22 12:29:21 +01001173
J-Alves4369bd92020-08-07 16:35:36 +01001174 TRY(read_optional_uint8(&root, "xlat-granule", 0,
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001175 (uint8_t *)&vm->partition.xlat_granule));
1176 dlog_verbose(" Translation granule %u\n", vm->partition.xlat_granule);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001177
1178 ffa_node = root;
1179 if (fdt_find_child(&ffa_node, &rxtx_node_name)) {
1180 if (!fdt_is_compatible(&ffa_node,
1181 "arm,ffa-manifest-rx_tx-buffer")) {
1182 return MANIFEST_ERROR_NOT_COMPATIBLE;
1183 }
1184
Manish Pandeyfa1f2912020-05-05 12:57:01 +01001185 /*
1186 * Read only phandles for now, it will be used to update buffers
1187 * while parsing memory regions.
1188 */
1189 TRY(read_uint32(&ffa_node, "rx-buffer",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001190 &vm->partition.rxtx.rx_phandle));
Olivier Deprez62d99e32020-01-09 15:58:07 +01001191
Manish Pandeyfa1f2912020-05-05 12:57:01 +01001192 TRY(read_uint32(&ffa_node, "tx-buffer",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001193 &vm->partition.rxtx.tx_phandle));
Olivier Deprez62d99e32020-01-09 15:58:07 +01001194
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001195 vm->partition.rxtx.available = true;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001196 }
1197
Kathleen Capellaf71dee42023-08-08 16:24:14 -04001198 TRY(read_uint16(&root, "messaging-method",
1199 (uint16_t *)&vm->partition.messaging_method));
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001200 dlog_verbose(" Messaging method %u\n", vm->partition.messaging_method);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001201
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001202 TRY(read_bool(&root, "managed-exit", &managed_exit_field_present));
1203
1204 TRY(read_optional_uint8(
1205 &root, "ns-interrupts-action", NS_ACTION_SIGNALED,
1206 (uint8_t *)&vm->partition.ns_interrupts_action));
1207
1208 /*
1209 * An SP manifest can specify one of the fields listed below:
1210 * `managed-exit`: Introduced in FF-A v1.0 spec.
1211 * `ns-interrupts-action`: Introduced in FF-A v1.1 EAC0 spec.
1212 * If both are missing from the manifest, the default response is
1213 * NS_ACTION_SIGNALED.
1214 */
1215 if (managed_exit_field_present) {
1216 vm->partition.ns_interrupts_action = NS_ACTION_ME;
1217 }
1218
1219 if (vm->partition.ns_interrupts_action != NS_ACTION_QUEUED &&
1220 vm->partition.ns_interrupts_action != NS_ACTION_ME &&
1221 vm->partition.ns_interrupts_action != NS_ACTION_SIGNALED) {
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001222 return MANIFEST_ERROR_ILLEGAL_NS_INT_ACTION;
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001223 }
1224
1225 dlog_verbose(
Olivier Deprezb7aa0c22023-06-29 10:46:26 +02001226 " NS Interrupts %s\n",
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001227 (vm->partition.ns_interrupts_action == NS_ACTION_QUEUED)
1228 ? "Queued"
1229 : (vm->partition.ns_interrupts_action == NS_ACTION_SIGNALED)
1230 ? "Signaled"
1231 : "Managed exit");
1232
1233 if (vm->partition.ns_interrupts_action == NS_ACTION_ME) {
1234 /* Managed exit only supported by S_EL1 partitions. */
1235 if (vm->partition.run_time_el != S_EL1) {
1236 dlog_error(
1237 "Managed exit cannot be supported by this "
1238 "partition\n");
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001239 return MANIFEST_ERROR_ILLEGAL_NS_INT_ACTION;
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001240 }
Madhukar Pappireddy046dad02022-06-21 18:43:33 -05001241
1242 TRY(read_bool(&root, "managed-exit-virq",
1243 &vm->partition.me_signal_virq));
1244 if (vm->partition.me_signal_virq) {
1245 dlog_verbose(" Managed Exit signaled through vIRQ\n");
1246 }
J-Alvesa4730db2021-11-02 10:31:01 +00001247 }
1248
1249 TRY(read_bool(&root, "notification-support",
1250 &vm->partition.notification_support));
1251 if (vm->partition.notification_support) {
1252 dlog_verbose(" Notifications Receipt Supported\n");
1253 }
Maksims Svecovs9ddf86a2021-05-06 17:17:21 +01001254
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001255 TRY(read_optional_uint8(
1256 &root, "other-s-interrupts-action", OTHER_S_INT_ACTION_SIGNALED,
1257 (uint8_t *)&vm->partition.other_s_interrupts_action));
1258
1259 if (vm->partition.other_s_interrupts_action ==
1260 OTHER_S_INT_ACTION_QUEUED) {
1261 if (vm->partition.ns_interrupts_action != NS_ACTION_QUEUED) {
1262 dlog_error(
1263 "Choice of the fields 'ns-interrupts-action' "
1264 "and 'other-s-interrupts-action' not "
1265 "compatible\n");
1266 return MANIFEST_ERROR_NOT_COMPATIBLE;
1267 }
1268 } else if (vm->partition.other_s_interrupts_action >
1269 OTHER_S_INT_ACTION_SIGNALED) {
1270 dlog_error(
1271 "Illegal value specified for the field"
1272 " 'other-s-interrupts-action': %u\n",
1273 vm->partition.other_s_interrupts_action);
1274 return MANIFEST_ERROR_ILLEGAL_OTHER_S_INT_ACTION;
1275 }
1276
J-Alves35315782022-01-25 17:58:32 +00001277 /* Parse boot info node. */
1278 if (boot_info_node != NULL) {
1279 ffa_node = root;
1280 vm->partition.boot_info =
1281 fdt_find_child(&ffa_node, &boot_info_node_name);
1282 if (vm->partition.boot_info) {
1283 *boot_info_node = ffa_node;
1284 }
1285 } else {
1286 vm->partition.boot_info = false;
1287 }
1288
Olivier Depreza15f2352022-09-26 09:17:24 +02001289 TRY(read_optional_uint32(
1290 &root, "power-management-messages",
1291 MANIFEST_POWER_MANAGEMENT_CPU_OFF_SUPPORTED |
1292 MANIFEST_POWER_MANAGEMENT_CPU_ON_SUPPORTED,
1293 &vm->partition.power_management));
1294 vm->partition.power_management &= MANIFEST_POWER_MANAGEMENT_ALL_MASK;
1295 if (vm->partition.execution_ctx_count == 1 ||
Daniel Boulby874d5432023-04-27 12:40:24 +01001296 vm->partition.run_time_el == S_EL0 ||
1297 vm->partition.run_time_el == EL0) {
Olivier Depreza15f2352022-09-26 09:17:24 +02001298 vm->partition.power_management =
1299 MANIFEST_POWER_MANAGEMENT_NONE_MASK;
1300 }
1301
1302 dlog_verbose(" Power management messages %#x\n",
1303 vm->partition.power_management);
1304
Manish Pandey6542f5c2020-04-27 14:37:46 +01001305 /* Parse memory-regions */
1306 ffa_node = root;
1307 if (fdt_find_child(&ffa_node, &mem_region_node_name)) {
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001308 TRY(parse_ffa_memory_region_node(
Karl Meakinf6d49402023-04-04 18:14:26 +01001309 &ffa_node, vm->partition.load_addr,
1310 vm->partition.mem_regions,
J-Alves77b6f4f2023-03-15 11:34:49 +00001311 &vm->partition.mem_region_count, &vm->partition.rxtx,
1312 boot_params));
Manish Pandey6542f5c2020-04-27 14:37:46 +01001313 }
Manish Pandey2145c212020-05-01 16:04:22 +01001314 dlog_verbose(" Total %u memory regions found\n",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001315 vm->partition.mem_region_count);
Manish Pandey6542f5c2020-04-27 14:37:46 +01001316
Manish Pandeye68e7932020-04-23 15:29:28 +01001317 /* Parse Device-regions */
1318 ffa_node = root;
1319 if (fdt_find_child(&ffa_node, &dev_region_node_name)) {
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001320 TRY(parse_ffa_device_region_node(
1321 &ffa_node, vm->partition.dev_regions,
1322 &vm->partition.dev_region_count));
Manish Pandeye68e7932020-04-23 15:29:28 +01001323 }
Manish Pandey2145c212020-05-01 16:04:22 +01001324 dlog_verbose(" Total %u device regions found\n",
Raghu Krishnamurthy8c250a92021-07-02 12:16:42 -07001325 vm->partition.dev_region_count);
Manish Pandeye68e7932020-04-23 15:29:28 +01001326
J-Alves4eb7b542022-03-02 15:21:52 +00001327 return sanity_check_ffa_manifest(vm);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001328}
1329
Olivier Deprez62d99e32020-01-09 15:58:07 +01001330static enum manifest_return_code parse_ffa_partition_package(
1331 struct mm_stage1_locked stage1_locked, struct fdt_node *node,
J-Alves19e20cf2023-08-02 12:48:55 +01001332 struct manifest_vm *vm, ffa_id_t vm_id,
J-Alves77b6f4f2023-03-15 11:34:49 +00001333 const struct boot_params *boot_params, struct mpool *ppool)
Olivier Deprez62d99e32020-01-09 15:58:07 +01001334{
1335 enum manifest_return_code ret = MANIFEST_ERROR_NOT_COMPATIBLE;
J-Alves2f86c1e2022-02-23 18:44:19 +00001336 uintpaddr_t load_address;
1337 struct sp_pkg_header header;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001338 struct fdt sp_fdt;
J-Alves2f86c1e2022-02-23 18:44:19 +00001339 vaddr_t pkg_start;
1340 vaddr_t manifest_address;
J-Alves35315782022-01-25 17:58:32 +00001341 struct fdt_node boot_info_node;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001342
1343 /*
1344 * This must have been hinted as being an FF-A partition,
1345 * return straight with failure if this is not the case.
1346 */
1347 if (!vm->is_ffa_partition) {
J-Alves2f86c1e2022-02-23 18:44:19 +00001348 return ret;
1349 }
1350
1351 TRY(read_uint64(node, "load_address", &load_address));
1352 if (!is_aligned(load_address, PAGE_SIZE)) {
Olivier Deprez62d99e32020-01-09 15:58:07 +01001353 return MANIFEST_ERROR_NOT_COMPATIBLE;
1354 }
1355
J-Alves2f86c1e2022-02-23 18:44:19 +00001356 assert(load_address != 0U);
1357
1358 if (!sp_pkg_init(stage1_locked, pa_init(load_address), &header,
1359 ppool)) {
1360 return ret;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001361 }
1362
J-Alves2f86c1e2022-02-23 18:44:19 +00001363 pkg_start = va_init(load_address);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001364
J-Alves2f86c1e2022-02-23 18:44:19 +00001365 if (vm_id != HF_PRIMARY_VM_ID &&
1366 sp_pkg_get_mem_size(&header) >= vm->secondary.mem_size) {
J-Alves4369bd92020-08-07 16:35:36 +01001367 dlog_error("Invalid package header or DT size.\n");
J-Alves2f86c1e2022-02-23 18:44:19 +00001368 goto out;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001369 }
1370
J-Alves2f86c1e2022-02-23 18:44:19 +00001371 manifest_address = va_add(va_init(load_address), header.pm_offset);
1372 if (!fdt_init_from_ptr(&sp_fdt, ptr_from_va(manifest_address),
1373 header.pm_size)) {
Kathleen Capella422b10b2023-06-30 18:28:27 -04001374 dlog_error("manifest.c: FDT failed validation.\n");
J-Alves2f86c1e2022-02-23 18:44:19 +00001375 goto out;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001376 }
1377
J-Alves77b6f4f2023-03-15 11:34:49 +00001378 ret = parse_ffa_manifest(&sp_fdt, vm, &boot_info_node, boot_params);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001379 if (ret != MANIFEST_SUCCESS) {
Olivier Deprez3cbdf862023-06-07 15:36:32 +02001380 dlog_error("Error parsing partition manifest.\n");
J-Alves2f86c1e2022-02-23 18:44:19 +00001381 goto out;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001382 }
1383
J-Alves2f86c1e2022-02-23 18:44:19 +00001384 if (vm->partition.load_addr != load_address) {
J-Alvesa26ea212021-03-22 14:33:47 +00001385 dlog_warning(
1386 "Partition's load address at its manifest differs"
1387 " from specified in partition's package.\n");
J-Alves2f86c1e2022-02-23 18:44:19 +00001388 vm->partition.load_addr = load_address;
J-Alvesa26ea212021-03-22 14:33:47 +00001389 }
1390
J-Alves889a1d72022-05-13 11:38:27 +01001391 if (vm->partition.gp_register_num != DEFAULT_BOOT_GP_REGISTER) {
1392 if (header.version == SP_PKG_HEADER_VERSION_2 &&
1393 vm->partition.boot_info &&
1394 !ffa_boot_info_node(&boot_info_node, pkg_start, &header)) {
1395 dlog_error("Failed to process boot information.\n");
1396 }
J-Alves35315782022-01-25 17:58:32 +00001397 }
J-Alves2f86c1e2022-02-23 18:44:19 +00001398out:
1399 sp_pkg_deinit(stage1_locked, pkg_start, &header, ppool);
Olivier Deprez62d99e32020-01-09 15:58:07 +01001400 return ret;
1401}
1402
David Brazdil7a462ec2019-08-15 12:27:47 +01001403/**
1404 * Parse manifest from FDT.
1405 */
Olivier Deprez62d99e32020-01-09 15:58:07 +01001406enum manifest_return_code manifest_init(struct mm_stage1_locked stage1_locked,
Olivier Deprez93644652022-09-09 11:01:12 +02001407 struct manifest **manifest_ret,
Olivier Deprez62d99e32020-01-09 15:58:07 +01001408 struct memiter *manifest_fdt,
J-Alves77b6f4f2023-03-15 11:34:49 +00001409 struct boot_params *boot_params,
Olivier Deprez62d99e32020-01-09 15:58:07 +01001410 struct mpool *ppool)
David Brazdil7a462ec2019-08-15 12:27:47 +01001411{
Olivier Deprez93644652022-09-09 11:01:12 +02001412 struct manifest *manifest;
David Brazdilb856be62020-03-25 10:14:55 +00001413 struct string vm_name;
1414 struct fdt fdt;
David Brazdil7a462ec2019-08-15 12:27:47 +01001415 struct fdt_node hyp_node;
1416 size_t i = 0;
1417 bool found_primary_vm = false;
1418
J-Alvescd438fa2023-04-26 10:13:12 +01001419 if (boot_params->mem_ranges_count == 0 &&
1420 boot_params->ns_mem_ranges_count == 0) {
1421 return MANIFEST_ERROR_MEMORY_MISSING;
1422 }
1423
J-Alves77b6f4f2023-03-15 11:34:49 +00001424 dump_memory_ranges(boot_params->mem_ranges,
1425 boot_params->mem_ranges_count, false);
1426 dump_memory_ranges(boot_params->ns_mem_ranges,
1427 boot_params->ns_mem_ranges_count, true);
1428
Olivier Deprez93644652022-09-09 11:01:12 +02001429 /* Allocate space in the ppool for the manifest data. */
1430 if (!manifest_data_init(ppool)) {
1431 panic("Unable to allocate manifest data.\n");
Daniel Boulby801f8ef2022-06-27 14:21:01 +01001432 }
1433
Olivier Deprez93644652022-09-09 11:01:12 +02001434 manifest = &manifest_data->manifest;
1435 *manifest_ret = manifest;
1436
David Brazdilb856be62020-03-25 10:14:55 +00001437 if (!fdt_init_from_memiter(&fdt, manifest_fdt)) {
1438 return MANIFEST_ERROR_FILE_SIZE; /* TODO */
David Brazdila2358d42020-01-27 18:51:38 +00001439 }
1440
David Brazdil7a462ec2019-08-15 12:27:47 +01001441 /* Find hypervisor node. */
David Brazdilb856be62020-03-25 10:14:55 +00001442 if (!fdt_find_node(&fdt, "/hypervisor", &hyp_node)) {
David Brazdil7a462ec2019-08-15 12:27:47 +01001443 return MANIFEST_ERROR_NO_HYPERVISOR_FDT_NODE;
1444 }
1445
David Brazdil74e9c3b2019-08-28 11:09:08 +01001446 /* Check "compatible" property. */
David Brazdilf4925382020-03-25 13:33:51 +00001447 if (!fdt_is_compatible(&hyp_node, "hafnium,hafnium")) {
David Brazdil74e9c3b2019-08-28 11:09:08 +01001448 return MANIFEST_ERROR_NOT_COMPATIBLE;
1449 }
1450
Olivier Deprez622ab8d2021-08-02 12:15:45 +02001451 TRY(read_bool(&hyp_node, "ffa_tee_enabled",
1452 &manifest->ffa_tee_enabled));
Andrew Walbran41a49d82020-01-10 17:46:38 +00001453
David Brazdil7a462ec2019-08-15 12:27:47 +01001454 /* Iterate over reserved VM IDs and check no such nodes exist. */
Olivier Deprez2a8ee342020-08-03 15:10:44 +02001455 for (i = HF_VM_ID_BASE; i < HF_VM_ID_OFFSET; i++) {
J-Alves19e20cf2023-08-02 12:48:55 +01001456 ffa_id_t vm_id = (ffa_id_t)i - HF_VM_ID_BASE;
David Brazdil7a462ec2019-08-15 12:27:47 +01001457 struct fdt_node vm_node = hyp_node;
David Brazdil7a462ec2019-08-15 12:27:47 +01001458
David Brazdilb856be62020-03-25 10:14:55 +00001459 generate_vm_node_name(&vm_name, vm_id);
1460 if (fdt_find_child(&vm_node, &vm_name)) {
David Brazdil7a462ec2019-08-15 12:27:47 +01001461 return MANIFEST_ERROR_RESERVED_VM_ID;
1462 }
1463 }
1464
1465 /* Iterate over VM nodes until we find one that does not exist. */
1466 for (i = 0; i <= MAX_VMS; ++i) {
J-Alves19e20cf2023-08-02 12:48:55 +01001467 ffa_id_t vm_id = HF_VM_ID_OFFSET + i;
David Brazdil7a462ec2019-08-15 12:27:47 +01001468 struct fdt_node vm_node = hyp_node;
David Brazdil7a462ec2019-08-15 12:27:47 +01001469
Olivier Deprez2a8ee342020-08-03 15:10:44 +02001470 generate_vm_node_name(&vm_name, vm_id - HF_VM_ID_BASE);
David Brazdilb856be62020-03-25 10:14:55 +00001471 if (!fdt_find_child(&vm_node, &vm_name)) {
David Brazdil7a462ec2019-08-15 12:27:47 +01001472 break;
1473 }
1474
1475 if (i == MAX_VMS) {
1476 return MANIFEST_ERROR_TOO_MANY_VMS;
1477 }
1478
1479 if (vm_id == HF_PRIMARY_VM_ID) {
1480 CHECK(found_primary_vm == false); /* sanity check */
1481 found_primary_vm = true;
1482 }
1483
David Brazdil0251b942019-09-10 15:59:50 +01001484 manifest->vm_count = i + 1;
Olivier Deprez62d99e32020-01-09 15:58:07 +01001485
1486 TRY(parse_vm_common(&vm_node, &manifest->vm[i], vm_id));
1487
Raghu Krishnamurthyb49549e2021-07-02 08:27:38 -07001488 CHECK(!manifest->vm[i].is_hyp_loaded ||
1489 manifest->vm[i].is_ffa_partition);
1490
1491 if (manifest->vm[i].is_ffa_partition &&
1492 !manifest->vm[i].is_hyp_loaded) {
Olivier Deprez62d99e32020-01-09 15:58:07 +01001493 TRY(parse_ffa_partition_package(stage1_locked, &vm_node,
1494 &manifest->vm[i], vm_id,
J-Alves77b6f4f2023-03-15 11:34:49 +00001495 boot_params, ppool));
J-Alves596049f2023-03-15 11:40:24 +00001496 size_t page_count =
1497 align_up(manifest->vm[i].secondary.mem_size,
1498 PAGE_SIZE) /
1499 PAGE_SIZE;
1500
1501 if (vm_id == HF_PRIMARY_VM_ID) {
1502 continue;
1503 }
1504
1505 TRY(check_partition_memory_is_valid(
1506 manifest->vm[i].partition.load_addr, page_count,
1507 0, boot_params));
1508
1509 /*
1510 * Check if memory from load-address until (load-address
1511 * + memory size) has been used by other partition.
1512 */
1513 TRY(check_and_record_memory_used(
1514 manifest->vm[i].partition.load_addr,
1515 page_count));
Olivier Deprez62d99e32020-01-09 15:58:07 +01001516 } else {
1517 TRY(parse_vm(&vm_node, &manifest->vm[i], vm_id));
1518 }
David Brazdil7a462ec2019-08-15 12:27:47 +01001519 }
1520
Olivier Deprezfb05f3c2020-11-10 17:48:04 +01001521 if (!found_primary_vm && vm_id_is_current_world(HF_PRIMARY_VM_ID)) {
David Brazdil7a462ec2019-08-15 12:27:47 +01001522 return MANIFEST_ERROR_NO_PRIMARY_VM;
1523 }
1524
1525 return MANIFEST_SUCCESS;
1526}
1527
Olivier Deprez93644652022-09-09 11:01:12 +02001528/**
1529 * Free manifest data resources, called once manifest parsing has
1530 * completed and VMs are loaded.
1531 */
Daniel Boulby801f8ef2022-06-27 14:21:01 +01001532void manifest_deinit(struct mpool *ppool)
1533{
Olivier Deprez93644652022-09-09 11:01:12 +02001534 manifest_data_deinit(ppool);
Daniel Boulby801f8ef2022-06-27 14:21:01 +01001535}
1536
David Brazdil7a462ec2019-08-15 12:27:47 +01001537const char *manifest_strerror(enum manifest_return_code ret_code)
1538{
1539 switch (ret_code) {
1540 case MANIFEST_SUCCESS:
1541 return "Success";
David Brazdila2358d42020-01-27 18:51:38 +00001542 case MANIFEST_ERROR_FILE_SIZE:
1543 return "Total size in header does not match file size";
Olivier Deprez62d99e32020-01-09 15:58:07 +01001544 case MANIFEST_ERROR_MALFORMED_DTB:
1545 return "Malformed device tree blob";
David Brazdila2358d42020-01-27 18:51:38 +00001546 case MANIFEST_ERROR_NO_ROOT_NODE:
1547 return "Could not find root node in manifest";
David Brazdil7a462ec2019-08-15 12:27:47 +01001548 case MANIFEST_ERROR_NO_HYPERVISOR_FDT_NODE:
1549 return "Could not find \"hypervisor\" node in manifest";
David Brazdil74e9c3b2019-08-28 11:09:08 +01001550 case MANIFEST_ERROR_NOT_COMPATIBLE:
1551 return "Hypervisor manifest entry not compatible with Hafnium";
David Brazdil7a462ec2019-08-15 12:27:47 +01001552 case MANIFEST_ERROR_RESERVED_VM_ID:
1553 return "Manifest defines a VM with a reserved ID";
1554 case MANIFEST_ERROR_NO_PRIMARY_VM:
1555 return "Manifest does not contain a primary VM entry";
1556 case MANIFEST_ERROR_TOO_MANY_VMS:
1557 return "Manifest specifies more VMs than Hafnium has "
1558 "statically allocated space for";
1559 case MANIFEST_ERROR_PROPERTY_NOT_FOUND:
1560 return "Property not found";
1561 case MANIFEST_ERROR_MALFORMED_STRING:
1562 return "Malformed string property";
David Brazdil0dbb41f2019-09-09 18:03:35 +01001563 case MANIFEST_ERROR_STRING_TOO_LONG:
1564 return "String too long";
David Brazdil7a462ec2019-08-15 12:27:47 +01001565 case MANIFEST_ERROR_MALFORMED_INTEGER:
1566 return "Malformed integer property";
1567 case MANIFEST_ERROR_INTEGER_OVERFLOW:
1568 return "Integer overflow";
Andrew Scullae9962e2019-10-03 16:51:16 +01001569 case MANIFEST_ERROR_MALFORMED_INTEGER_LIST:
1570 return "Malformed integer list property";
Andrew Scullb2c3a242019-11-04 13:52:36 +00001571 case MANIFEST_ERROR_MALFORMED_BOOLEAN:
1572 return "Malformed boolean property";
Manish Pandey6542f5c2020-04-27 14:37:46 +01001573 case MANIFEST_ERROR_MEMORY_REGION_NODE_EMPTY:
1574 return "Memory-region node should have at least one entry";
Manish Pandeye68e7932020-04-23 15:29:28 +01001575 case MANIFEST_ERROR_DEVICE_REGION_NODE_EMPTY:
1576 return "Device-region node should have at least one entry";
Manish Pandeyf06c9072020-09-29 15:41:58 +01001577 case MANIFEST_ERROR_RXTX_SIZE_MISMATCH:
1578 return "RX and TX buffers should be of same size";
Varun Wadekar4afbfd72022-10-13 14:30:18 +01001579 case MANIFEST_ERROR_MEM_REGION_EMPTY:
1580 return "Memory region should have at least one page";
Karl Meakinf6d49402023-04-04 18:14:26 +01001581 case MANIFEST_ERROR_BASE_ADDRESS_AND_RELATIVE_ADDRESS:
1582 return "Base and relative addresses are mutually exclusive";
Daniel Boulbya7e9e182022-06-27 14:21:01 +01001583 case MANIFEST_ERROR_MEM_REGION_OVERLAP:
1584 return "Memory region overlaps with one already allocated";
Daniel Boulbyc1a613d2022-10-18 11:26:17 +01001585 case MANIFEST_ERROR_MEM_REGION_UNALIGNED:
1586 return "Memory region is not aligned to a page boundary";
Raghu Krishnamurthy384693c2021-10-11 13:56:24 -07001587 case MANIFEST_ERROR_INVALID_MEM_PERM:
1588 return "Memory permission should be RO, RW or RX";
J-Alves35315782022-01-25 17:58:32 +00001589 case MANIFEST_ERROR_ARGUMENTS_LIST_EMPTY:
1590 return "Arguments-list node should have at least one argument";
Daniel Boulby801f8ef2022-06-27 14:21:01 +01001591 case MANIFEST_ERROR_INTERRUPT_ID_REPEATED:
1592 return "Interrupt ID already assigned to another endpoint";
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001593 case MANIFEST_ERROR_ILLEGAL_NS_INT_ACTION:
Madhukar Pappireddy84154052022-06-21 18:30:25 -05001594 return "Illegal value specidied for the field: Action in "
1595 "response to NS Interrupt";
Raghu Krishnamurthy98da1ca2022-10-04 08:59:01 -07001596 case MANIFEST_ERROR_INTERRUPT_ID_NOT_IN_LIST:
1597 return "Interrupt ID is not in the list of interrupts";
Madhukar Pappireddy5c04a382022-12-28 11:29:26 -06001598 case MANIFEST_ERROR_ILLEGAL_OTHER_S_INT_ACTION:
1599 return "Illegal value specified for the field: Action in "
1600 "response to Other-S Interrupt";
J-Alves77b6f4f2023-03-15 11:34:49 +00001601 case MANIFEST_ERROR_MEMORY_MISSING:
1602 return "Memory nodes must be defined in the SPMC manifest "
Olivier Deprez3cbdf862023-06-07 15:36:32 +02001603 "('memory' and 'ns-memory')";
J-Alves77b6f4f2023-03-15 11:34:49 +00001604 case MANIFEST_ERROR_PARTITION_ADDRESS_OVERLAP:
1605 return "Partition's memory [load address: load address + "
1606 "memory size[ overlap with other allocated "
Olivier Deprez3cbdf862023-06-07 15:36:32 +02001607 "regions";
J-Alves77b6f4f2023-03-15 11:34:49 +00001608 case MANIFEST_ERROR_MEM_REGION_INVALID:
Olivier Deprez3cbdf862023-06-07 15:36:32 +02001609 return "Invalid memory region range";
Kathleen Capella4a2a6e72023-04-21 14:43:26 -04001610 case MANIFEST_ERROR_INVALID_BOOT_ORDER:
1611 return "Boot order should be a unique value less than "
1612 "default largest value";
Kathleen Capella422b10b2023-06-30 18:28:27 -04001613 case MANIFEST_ERROR_UUID_ALL_ZEROS:
1614 return "UUID should not be NIL";
Madhukar Pappireddy3c2b7912023-10-11 14:47:27 -05001615 case MANIFEST_ERROR_MISSING_SMMU_ID:
1616 return "SMMU ID must be specified for the given Stream IDs";
1617 case MANIFEST_ERROR_MISMATCH_DMA_ACCESS_PERMISSIONS:
1618 return "DMA device access permissions must match memory region "
1619 "attributes";
1620 case MANIFEST_ERROR_STREAM_IDS_OVERFLOW:
1621 return "DMA device stream ID count exceeds predefined limit";
1622 case MANIFEST_ERROR_DMA_ACCESS_PERMISSIONS_OVERFLOW:
1623 return "DMA access permissions count exceeds predefined limit";
David Brazdil7a462ec2019-08-15 12:27:47 +01001624 }
1625
1626 panic("Unexpected manifest return code.");
1627}