blob: 2f1b42a6e0c55d05594668b8b7814115f764ca25 [file] [log] [blame]
Andrew Walbran68a8c162022-03-07 15:38:42 +00001// Copyright 2022, The Android Open Source Project
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15//! pVM firmware.
16
17#![no_main]
18#![no_std]
Pierre-Clément Tosifc531152022-10-20 12:22:23 +010019#![feature(default_alloc_error_handler)]
Pierre-Clément Tosi20b60962022-10-17 13:35:27 +010020#![feature(ptr_const_cast)] // Stabilized in 1.65.0
Andrew Walbran68a8c162022-03-07 15:38:42 +000021
Pierre-Clément Tosi4ef75222022-10-26 17:40:50 +010022mod avb;
Pierre-Clément Tosi20b60962022-10-17 13:35:27 +010023mod config;
Pierre-Clément Tosi5bbfca52022-10-21 12:14:35 +010024mod entry;
Andrew Walbrandfb73372022-04-21 10:52:27 +000025mod exceptions;
Pierre-Clément Tosia0934c12022-11-25 20:54:11 +000026mod fdt;
Pierre-Clément Tosifc531152022-10-20 12:22:23 +010027mod heap;
Pierre-Clément Tosida4440a2022-08-22 18:06:32 +010028mod helpers;
Andrew Walbranba47d1d2022-12-14 15:21:44 +000029mod hvc;
Pierre-Clément Tosia0934c12022-11-25 20:54:11 +000030mod memory;
Pierre-Clément Tosi072969b2022-10-19 17:32:24 +010031mod mmio_guard;
Pierre-Clément Tosia8a4a202022-11-03 14:16:46 +000032mod mmu;
Andrew Walbran19690632022-12-07 16:41:30 +000033mod pci;
Pierre-Clément Tosida4440a2022-08-22 18:06:32 +010034mod smccc;
Andrew Walbran68a8c162022-03-07 15:38:42 +000035
Andrew Walbrand1d03182022-12-09 18:20:01 +000036use crate::{
37 avb::PUBLIC_KEY,
38 entry::RebootReason,
39 memory::MemoryTracker,
40 pci::{allocate_all_virtio_bars, PciError, PciInfo, PciMemory32Allocator},
41};
Alice Wang20982f72022-12-13 08:56:22 +000042use ::avb::verify_image;
Pierre-Clément Tosi8edf72e2022-12-06 16:02:57 +000043use dice::bcc;
Andrew Walbran19690632022-12-07 16:41:30 +000044use libfdt::Fdt;
Pierre-Clément Tosi8edf72e2022-12-06 16:02:57 +000045use log::{debug, error, info, trace};
Andrew Walbran68a8c162022-03-07 15:38:42 +000046
Alice Wang28cbcf12022-12-01 07:58:28 +000047fn main(
Andrew Walbran19690632022-12-07 16:41:30 +000048 fdt: &Fdt,
Alice Wang28cbcf12022-12-01 07:58:28 +000049 signed_kernel: &[u8],
50 ramdisk: Option<&[u8]>,
Pierre-Clément Tosi8edf72e2022-12-06 16:02:57 +000051 bcc: &bcc::Handover,
Andrew Walbran19690632022-12-07 16:41:30 +000052 memory: &mut MemoryTracker,
Alice Wang0a688d22022-12-02 09:48:41 +000053) -> Result<(), RebootReason> {
Pierre-Clément Tosi37105a62022-10-18 12:21:48 +010054 info!("pVM firmware");
Pierre-Clément Tosia0934c12022-11-25 20:54:11 +000055 debug!("FDT: {:?}", fdt as *const libfdt::Fdt);
56 debug!("Signed kernel: {:?} ({:#x} bytes)", signed_kernel.as_ptr(), signed_kernel.len());
57 if let Some(rd) = ramdisk {
58 debug!("Ramdisk: {:?} ({:#x} bytes)", rd.as_ptr(), rd.len());
59 } else {
60 debug!("Ramdisk: None");
61 }
Pierre-Clément Tosi8edf72e2022-12-06 16:02:57 +000062 trace!("BCC: {bcc:x?}");
Andrew Walbran19690632022-12-07 16:41:30 +000063
64 // Set up PCI bus for VirtIO devices.
Andrew Walbrand1d03182022-12-09 18:20:01 +000065 let pci_info = PciInfo::from_fdt(fdt).map_err(handle_pci_error)?;
66 debug!("PCI: {:#x?}", pci_info);
Andrew Walbran0d8b54d2022-12-08 16:32:33 +000067 pci_info.map(memory)?;
Andrew Walbrand1d03182022-12-09 18:20:01 +000068 let mut bar_allocator = PciMemory32Allocator::new(&pci_info);
69 debug!("Allocator: {:#x?}", bar_allocator);
70 // Safety: This is the only place where we call make_pci_root, and this main function is only
71 // called once.
72 let mut pci_root = unsafe { pci_info.make_pci_root() };
73 allocate_all_virtio_bars(&mut pci_root, &mut bar_allocator).map_err(handle_pci_error)?;
Andrew Walbran19690632022-12-07 16:41:30 +000074
Alice Wang0a688d22022-12-02 09:48:41 +000075 verify_image(signed_kernel, PUBLIC_KEY).map_err(|e| {
76 error!("Failed to verify the payload: {e}");
77 RebootReason::PayloadVerificationError
78 })?;
Alice Wang4379c832022-12-05 15:50:20 +000079 info!("Starting payload...");
Alice Wang28cbcf12022-12-01 07:58:28 +000080 Ok(())
Pierre-Clément Tosi263ffd52022-10-05 20:27:50 +010081}
Andrew Walbrand1d03182022-12-09 18:20:01 +000082
83/// Logs the given PCI error and returns the appropriate `RebootReason`.
84fn handle_pci_error(e: PciError) -> RebootReason {
85 error!("{}", e);
86 match e {
87 PciError::FdtErrorPci(_)
88 | PciError::FdtNoPci
89 | PciError::FdtErrorReg(_)
90 | PciError::FdtMissingReg
91 | PciError::FdtRegEmpty
92 | PciError::FdtRegMissingSize
93 | PciError::CamWrongSize(_)
94 | PciError::FdtErrorRanges(_)
95 | PciError::FdtMissingRanges
96 | PciError::RangeAddressMismatch { .. }
97 | PciError::NoSuitableRange => RebootReason::InvalidFdt,
98 PciError::BarInfoFailed(_)
99 | PciError::BarAllocationFailed { .. }
100 | PciError::UnsupportedBarType(_) => RebootReason::PciError,
101 }
102}