Files
BloomPatched/build/scripts/Targets/TargetDescriptionFiles/Services/ValidationService.php

1139 lines
38 KiB
PHP
Raw Normal View History

2024-02-09 23:34:45 +00:00
<?php
namespace Targets\TargetDescriptionFiles\Services;
use Targets\TargetDescriptionFiles\PhysicalInterface;
2024-02-09 23:34:45 +00:00
use Targets\TargetDescriptionFiles\Pin;
use Targets\TargetDescriptionFiles\TargetDescriptionFile;
use Targets\TargetDescriptionFiles\AddressSpace;
use Targets\TargetDescriptionFiles\BitField;
use Targets\TargetDescriptionFiles\MemorySegment;
use Targets\TargetDescriptionFiles\MemorySegmentSection;
use Targets\TargetDescriptionFiles\Module;
use Targets\TargetDescriptionFiles\Peripheral;
use Targets\TargetDescriptionFiles\RegisterGroupInstance;
2024-02-09 23:34:45 +00:00
use Targets\TargetDescriptionFiles\Property;
use Targets\TargetDescriptionFiles\PropertyGroup;
use Targets\TargetDescriptionFiles\Register;
use Targets\TargetDescriptionFiles\RegisterGroup;
use Targets\TargetDescriptionFiles\RegisterGroupReference;
use Targets\TargetDescriptionFiles\Signal;
use Targets\TargetDescriptionFiles\Pad;
2024-02-09 23:34:45 +00:00
use Targets\TargetDescriptionFiles\Pinout;
use Targets\TargetDescriptionFiles\PinoutType;
use Targets\TargetDescriptionFiles\Variant;
use Targets\TargetPeripheral;
use Targets\TargetPhysicalInterface;
use Targets\TargetRegisterGroup;
2024-02-09 23:34:45 +00:00
require_once __DIR__ . '/../TargetDescriptionFile.php';
class ValidationService
{
public function validateTdf(TargetDescriptionFile $tdf): array
{
$failures = [];
if (empty($tdf->getName())) {
$failures[] = 'Target name not found';
}
if (str_contains($tdf->getName(), ' ')) {
$failures[] = 'Target name cannot contain whitespaces';
}
if (empty($tdf->getFamily())) {
$failures[] = 'Missing/invalid target family';
}
if (empty($tdf->getConfigurationValue())) {
$failures[] = 'Missing configuration value';
}
if (empty($tdf->variants)) {
$failures[] = 'Missing target variants';
}
$processedPropertyGroupKeys = [];
foreach ($tdf->propertyGroups as $propertyGroup) {
$failures = array_merge($failures, $this->validatePropertyGroup($propertyGroup));
if ($propertyGroup->key !== null && in_array($propertyGroup->key, $processedPropertyGroupKeys)) {
$failures[] = 'Duplicate property group key ("' . $propertyGroup->key . '") detected';
}
$processedPropertyGroupKeys[] = $propertyGroup->key;
}
if (empty($tdf->addressSpaces)) {
$failures[] = 'Missing address spaces';
}
$processedAddressSpaceKeys = [];
foreach ($tdf->addressSpaces as $addressSpace) {
$failures = array_merge($failures, $this->validateAddressSpace($addressSpace));
if ($addressSpace->key !== null && in_array($addressSpace->key, $processedAddressSpaceKeys)) {
$failures[] = 'Duplicate address space key ("' . $addressSpace->key . '") detected';
}
$processedAddressSpaceKeys[] = $addressSpace->key;
}
if (empty($tdf->physicalInterfaces)) {
$failures[] = 'Missing physical interfaces';
}
foreach ($tdf->physicalInterfaces as $physicalInterface) {
$failures = array_merge($failures, $this->validatePhysicalInterface($physicalInterface, $tdf));
}
2024-02-09 23:34:45 +00:00
if (empty($tdf->modules)) {
$failures[] = 'Missing modules';
}
$processedModuleKeys = [];
foreach ($tdf->modules as $module) {
$failures = array_merge($failures, $this->validateModule($module, $tdf));
if ($module->key !== null && in_array($module->key, $processedModuleKeys)) {
$failures[] = 'Duplicate module key ("' . $module->key . '") detected';
}
$processedModuleKeys[] = $module->key;
}
if (empty($tdf->getModule('gpio_port'))) {
$failures[] = 'Missing GPIO port module';
}
if (empty($tdf->modules)) {
$failures[] = 'Missing peripherals';
}
$processedPeripheralKeys = [];
foreach ($tdf->peripherals as $peripheral) {
$failures = array_merge($failures, $this->validatePeripheral($peripheral, $tdf));
if ($peripheral->key !== null && in_array($peripheral->key, $processedPeripheralKeys)) {
$failures[] = 'Duplicate peripheral key ("' . $peripheral->key . '") detected';
}
if ($peripheral->moduleKey !== null && $tdf->getModule($peripheral->moduleKey) === null) {
$failures[] = 'Invalid module key ("' . $peripheral->moduleKey . '") on peripheral "'
. $peripheral->key . '"';
}
$processedPeripheralKeys[] = $peripheral->key;
}
if (empty($tdf->getPeripheralsOfModule('gpio_port'))) {
$failures[] = 'Missing GPIO port peripherals';
}
if (empty($tdf->pads)) {
$failures[] = 'Missing pads';
}
$processedPadKeys = [];
foreach ($tdf->pads as $pad) {
$failures = array_merge($failures, $this->validatePad($pad));
if ($pad->key !== null && in_array($pad->key, $processedPadKeys)) {
$failures[] = 'Duplicate pad key ("' . $pad->key . '") detected';
}
$processedPadKeys[] = $pad->key;
}
2024-02-09 23:34:45 +00:00
if (empty($tdf->pinouts)) {
$failures[] = 'Missing pinouts';
} elseif (empty($tdf->getInsightCompatiblePinouts())) {
$failures[] = 'No Insight-compatible pinouts';
2024-02-09 23:34:45 +00:00
}
$processedPinoutKeys = [];
foreach ($tdf->pinouts as $pinout) {
$failures = array_merge($failures, $this->validatePinout($pinout, $tdf));
2024-02-09 23:34:45 +00:00
if ($pinout->key !== null && in_array($pinout->key, $processedPinoutKeys)) {
$failures[] = 'Duplicate pinout key ("' . $pinout->key . '") detected';
}
$processedPinoutKeys[] = $pinout->key;
}
$processedVariantKeys = [];
2024-02-09 23:34:45 +00:00
foreach ($tdf->variants as $variant) {
$failures = array_merge($failures, $this->validateVariant($variant, $tdf));
if ($variant->key !== null && in_array($variant->key, $processedVariantKeys)) {
$failures[] = 'Duplicate variant key ("' . $variant->key . '") detected';
2024-02-09 23:34:45 +00:00
}
$processedVariantKeys[] = $variant->key;
2024-02-09 23:34:45 +00:00
}
// Validate resolved peripherals
foreach ($tdf->peripherals as $peripheral) {
if (($targetPeripheral = $tdf->getTargetPeripheral($peripheral->key)) === null) {
continue;
}
$failures = array_merge($failures, $this->validateTargetPeripheral($targetPeripheral, $tdf));
}
2024-02-09 23:34:45 +00:00
return $failures;
}
protected function validatePropertyGroup(PropertyGroup $propertyGroup): array
{
$failures = [];
if (empty($propertyGroup->key)) {
$failures[] = 'Missing key';
} else {
$failures = array_merge($failures, $this->validateKey($propertyGroup->key));
2024-02-09 23:34:45 +00:00
}
if (empty($propertyGroup->subPropertyGroups) && empty($propertyGroup->properties)) {
$failures[] = 'Empty property group';
}
$processedSubPropertyGroupKeys = [];
foreach ($propertyGroup->subPropertyGroups as $subPropertyGroup) {
$failures = array_merge($failures, $this->validatePropertyGroup($subPropertyGroup));
if ($subPropertyGroup->key !== null && in_array($subPropertyGroup->key, $processedSubPropertyGroupKeys)) {
$failures[] = 'Duplicate property group key ("' . $subPropertyGroup->key . '") detected';
}
$processedSubPropertyGroupKeys[] = $subPropertyGroup->key;
}
$processedPropertyKeys = [];
foreach ($propertyGroup->properties as $property) {
$failures = array_merge($failures, $this->validateProperty($property));
if ($property->key !== null && in_array($property->key, $processedPropertyKeys)) {
$failures[] = 'Duplicate property key ("' . $property->key . '") detected';
}
$processedPropertyKeys[] = $property->key;
}
return array_map(
fn (string $failure): string => 'Property group (id: "' . $propertyGroup->key . '") validation failure: '
. $failure,
$failures
);
}
protected function validateProperty(Property $property): array
{
$failures = [];
if (empty($property->key)) {
$failures[] = 'Missing key';
} else {
$failures = array_merge($failures, $this->validateKey($property->key));
2024-02-09 23:34:45 +00:00
}
if ($property->value === null) {
$failures[] = 'Missing value';
}
return array_map(
fn (string $failure): string => 'Property (key: "' . $property->key . '") validation failure: ' . $failure,
$failures
);
}
protected function validateAddressSpace(AddressSpace $addressSpace): array
{
$failures = [];
if (empty($addressSpace->key)) {
$failures[] = 'Missing key';
} else {
$failures = array_merge($failures, $this->validateKey($addressSpace->key));
2024-02-09 23:34:45 +00:00
}
if ($addressSpace->startAddress === null) {
$failures[] = 'Missing start address';
} elseif ($addressSpace->startAddress > 0xFFFFFFFF) {
$failures[] = 'Start address exceeds 32-bit unsigned integer';
2024-02-09 23:34:45 +00:00
}
if ($addressSpace->size === null) {
$failures[] = 'Missing size';
} elseif ($addressSpace->size > 0xFFFFFFFF) {
$failures[] = 'Size exceeds 32-bit unsigned integer';
} elseif ($addressSpace->size < 1) {
$failures[] = 'Invalid size (' . $addressSpace->size . ')';
2024-02-09 23:34:45 +00:00
}
if (empty($addressSpace->memorySegments)) {
$failures[] = 'Missing memory segments - all address spaces must contain at least one memory segment';
}
$processedSegmentKeys = [];
foreach ($addressSpace->memorySegments as $segment) {
$failures = array_merge($failures, $this->validateMemorySegment($segment));
if ($segment->key !== null && in_array($segment->key, $processedSegmentKeys)) {
$failures[] = 'Duplicate segment key ("' . $segment->key . '") detected';
}
foreach ($addressSpace->memorySegments as $segmentOther) {
if ($segment->key === $segmentOther->key) {
continue;
}
if ($segment->intersectsWith($segmentOther)) {
$failures[] = 'Segment "' . $segment->key . '" overlaps with segment "' . $segmentOther->key . '"';
}
}
$processedSegmentKeys[] = $segment->key;
}
$totalSegmentSize = $addressSpace->totalSegmentSize();
if ($totalSegmentSize > $addressSpace->size) {
$failures[] = 'Total size of all contained segments (' . $totalSegmentSize . ' bytes) exceeds the total'
. ' size of the address space (' . $addressSpace->size . ' bytes)';
}
return array_map(
fn (string $failure): string => 'Address space (key: "' . $addressSpace->key . '") validation failure: '
. $failure,
$failures
);
}
protected function validateMemorySegment(MemorySegment $segment): array
{
$failures = [];
if (empty($segment->key)) {
$failures[] = 'Missing key';
} else {
$failures = array_merge($failures, $this->validateKey($segment->key));
2024-02-09 23:34:45 +00:00
}
if (empty($segment->name)) {
$failures[] = 'Missing name';
}
if (empty($segment->type)) {
$failures[] = 'Missing/invalid type';
}
if ($segment->startAddress === null) {
$failures[] = 'Missing start address';
} elseif ($segment->startAddress > 0xFFFFFFFF) {
$failures[] = 'Start address exceeds 32-bit unsigned integer';
2024-02-09 23:34:45 +00:00
}
if ($segment->size === null) {
$failures[] = 'Missing size';
} elseif ($segment->size > 0xFFFFFFFF) {
$failures[] = 'Size exceeds 32-bit unsigned integer';
} elseif ($segment->size < 1) {
$failures[] = 'Invalid size (' . $segment->size . ')';
2024-02-09 23:34:45 +00:00
}
if ($segment->executable === null) {
$failures[] = 'Missing executable';
}
2024-02-09 23:34:45 +00:00
$processedSectionKeys = [];
foreach ($segment->sections as $section) {
$failures = array_merge($failures, $this->validateMemorySegmentSection($section));
if ($section->key !== null && in_array($section->key, $processedSectionKeys)) {
$failures[] = 'Duplicate section key ("' . $section->key . '") detected';
}
foreach ($segment->sections as $sectionOther) {
if ($section->key === $sectionOther->key) {
continue;
}
if ($section->intersectsWith($sectionOther)) {
$failures[] = 'Section "' . $section->key . '" overlaps with section "' . $sectionOther->key . '"';
}
}
$processedSectionKeys[] = $section->key;
}
$totalSectionSize = $segment->totalSectionSize();
if ($totalSectionSize > $segment->size) {
$failures[] = 'Total size of all contained sections (' . $totalSectionSize . ' bytes) exceeds the total'
. ' size of the memory segment (' . $segment->size . ' bytes)';
}
return array_map(
fn (string $failure): string => 'Memory segment (key: "' . $segment->key . '") validation failure: '
. $failure,
$failures
);
}
protected function validateMemorySegmentSection(MemorySegmentSection $section): array
{
$failures = [];
if (empty($section->key)) {
$failures[] = 'Missing key';
} else {
$failures = array_merge($failures, $this->validateKey($section->key));
2024-02-09 23:34:45 +00:00
}
if (empty($section->name)) {
$failures[] = 'Missing name';
}
if ($section->startAddress === null) {
$failures[] = 'Missing start address';
}
if ($section->size === null) {
$failures[] = 'Missing size';
} elseif ($section->size < 1) {
$failures[] = 'Invalid size (' . $section->size . ')';
2024-02-09 23:34:45 +00:00
}
$processedSectionKeys = [];
foreach ($section->subSections as $subSection) {
$failures = array_merge($failures, $this->validateMemorySegmentSection($subSection));
if ($subSection->key !== null && in_array($subSection->key, $processedSectionKeys)) {
$failures[] = 'Duplicate section key ("' . $subSection->key . '") detected';
}
foreach ($section->subSections as $sectionOther) {
if ($subSection->key === $sectionOther->key) {
continue;
}
if ($subSection->intersectsWith($sectionOther)) {
$failures[] = 'Section "' . $subSection->key . '" overlaps with section "' . $sectionOther->key . '"';
}
}
$processedSectionKeys[] = $subSection->key;
}
return array_map(
fn (string $failure): string => 'Section (key: "' . $section->key . '") validation failure: ' . $failure,
$failures
);
}
protected function validateRegisterGroup(
RegisterGroup $registerGroup,
string $moduleKey,
TargetDescriptionFile $tdf
): array
{
$failures = [];
if (empty($registerGroup->key)) {
$failures[] = 'Missing key';
} else {
$failures = array_merge($failures, $this->validateKey($registerGroup->key));
2024-02-09 23:34:45 +00:00
}
if (empty($registerGroup->name)) {
$failures[] = 'Missing name';
}
if ($registerGroup->offset !== null && $registerGroup->offset > 0xFFFFFFFF) {
$failures[] = 'Offset exceeds 32-bit unsigned integer';
}
2024-02-09 23:34:45 +00:00
$processedChildKeys = [];
foreach ($registerGroup->registers as $register) {
$failures = array_merge($failures, $this->validateRegister($register));
if ($register->key !== null && in_array($register->key, $processedChildKeys)) {
$failures[] = 'Duplicate register key ("' . $register->key . '") detected';
}
if ($register->alternative !== true) {
foreach ($registerGroup->registers as $registerOther) {
if ($register->key === $registerOther->key || $registerOther->alternative === true) {
continue;
}
if ($register->intersectsWith($registerOther)) {
$failures[] = 'Register "' . $register->key . '" overlaps with register "'
. $registerOther->key . '"';
}
}
}
$processedChildKeys[] = $register->key;
}
2024-02-12 19:39:21 +00:00
foreach ($registerGroup->subgroups as $subgroup) {
2024-02-09 23:34:45 +00:00
$failures = array_merge(
$failures,
2024-02-12 19:39:21 +00:00
$this->validateRegisterGroup($subgroup, $moduleKey, $tdf)
2024-02-09 23:34:45 +00:00
);
2024-02-12 19:39:21 +00:00
if ($subgroup->key !== null && in_array($subgroup->key, $processedChildKeys)) {
$failures[] = 'Duplicate register sub group key ("' . $subgroup->key . '") detected';
2024-02-09 23:34:45 +00:00
}
2024-02-12 19:39:21 +00:00
$processedChildKeys[] = $subgroup->key;
2024-02-09 23:34:45 +00:00
}
2024-02-12 19:39:21 +00:00
foreach ($registerGroup->subgroupReferences as $subgroupReference) {
2024-02-09 23:34:45 +00:00
$failures = array_merge(
$failures,
2024-02-12 19:39:21 +00:00
$this->validateRegisterGroupReference($subgroupReference, $moduleKey, $tdf)
2024-02-09 23:34:45 +00:00
);
2024-02-12 19:39:21 +00:00
if ($subgroupReference->key !== null && in_array($subgroupReference->key, $processedChildKeys)) {
$failures[] = 'Duplicate register group reference key ("' . $subgroupReference->key . '") detected';
2024-02-09 23:34:45 +00:00
}
2024-02-12 19:39:21 +00:00
$processedChildKeys[] = $subgroupReference->key;
2024-02-09 23:34:45 +00:00
}
return array_map(
fn (string $failure): string => 'Register group (key: "' . $registerGroup->key . '") validation failure: '
. $failure,
$failures
);
}
protected function validateRegisterGroupReference(
RegisterGroupReference $registerGroupReference,
string $moduleKey,
TargetDescriptionFile $tdf
): array {
$failures = [];
if (empty($registerGroupReference->key)) {
$failures[] = 'Missing key';
} else {
$failures = array_merge($failures, $this->validateKey($registerGroupReference->key));
2024-02-09 23:34:45 +00:00
}
if (empty($registerGroupReference->registerGroupKey)) {
$failures[] = 'Missing register group key';
}
if (empty($registerGroupReference->name)) {
$failures[] = 'Missing name';
}
if ($registerGroupReference->offset === null) {
$failures[] = 'Missing offset';
} elseif ($registerGroupReference->offset > 0xFFFFFFFF) {
$failures[] = 'Offset exceeds 32-bit unsigned integer';
2024-02-09 23:34:45 +00:00
}
if ($tdf->resolveRegisterGroupReference($registerGroupReference, $moduleKey) === null) {
$failures[] = 'Could not resolve register group reference "' . $registerGroupReference->key
. '" - check register group key ("' . $registerGroupReference->registerGroupKey . '")';
}
return array_map(
fn (string $failure): string => 'Register group reference (group key: "'
. $registerGroupReference->registerGroupKey . '") validation failure: ' . $failure,
$failures
);
}
protected function validateRegister(Register $register): array
{
$failures = [];
if (empty($register->key)) {
$failures[] = 'Missing key';
} else {
$failures = array_merge($failures, $this->validateKey($register->key));
2024-02-09 23:34:45 +00:00
}
if (empty($register->name)) {
$failures[] = 'Missing name';
}
if ($register->offset === null) {
$failures[] = 'Missing offset';
} elseif ($register->offset > 0xFFFFFFFF) {
$failures[] = 'Offset exceeds 32-bit unsigned integer';
2024-02-09 23:34:45 +00:00
}
if ($register->size === null) {
$failures[] = 'Missing size';
} elseif ($register->size < 1 || $register->size > 8) {
$failures[] = 'Invalid size (' . $register->size . ')';
2024-02-09 23:34:45 +00:00
}
if ($register->size > 8) {
// We only support a maximum of 64-bit width for registers, for now
$failures[] = 'Width exceeds 64-bit';
}
2024-02-09 23:34:45 +00:00
$processedBitFieldKeys = [];
foreach ($register->bitFields as $bitField) {
$failures = array_merge($failures, $this->validateBitField($bitField));
if ($bitField->key !== null && in_array($bitField->key, $processedBitFieldKeys)) {
$failures[] = 'Duplicate bit field key ("' . $bitField->key . '") detected';
}
$processedBitFieldKeys[] = $bitField->key;
}
return array_map(
fn (string $failure): string => 'Register (name: "' . $register->name . '") validation failure: '
. $failure,
$failures
);
}
protected function validateBitField(BitField $bitField): array
{
$failures = [];
if (empty($bitField->key)) {
$failures[] = 'Missing key';
} else {
$failures = array_merge($failures, $this->validateKey($bitField->key));
2024-02-09 23:34:45 +00:00
}
if (empty($bitField->name)) {
$failures[] = 'Missing name';
}
if ($bitField->mask === null) {
$failures[] = 'Missing mask';
}
return array_map(
fn (string $failure): string => 'Bit field (name: "' . $bitField->name . '") validation failure: '
. $failure,
$failures
);
}
protected function validatePhysicalInterface(
PhysicalInterface $physicalInterface,
TargetDescriptionFile $tdf
): array {
$failures = [];
if (empty($physicalInterface->value)) {
$failures[] = 'Missing value';
}
$containsSignal = function (string $signalName) use ($physicalInterface): bool {
foreach ($physicalInterface->signals as $signal) {
if ($signal->name === $signalName) {
return true;
}
}
return false;
};
$enumValue = TargetPhysicalInterface::tryFrom($physicalInterface->value);
/*
* We only require ISP signals for debugWire targets, as we recommend using the ISP connection when debugging
* debugWire targets.
*/
if (
$enumValue === TargetPhysicalInterface::ISP
&& in_array(TargetPhysicalInterface::DEBUG_WIRE, $tdf->getSupportedPhysicalInterfaces())
) {
if (!$containsSignal('RESET')) {
$failures[] = 'Missing RESET signal';
}
if (!$containsSignal('SCLK')) {
$failures[] = 'Missing SCLK signal';
}
if (!$containsSignal('MOSI')) {
$failures[] = 'Missing MOSI signal';
}
if (!$containsSignal('MISO')) {
$failures[] = 'Missing MISO signal';
}
}
if ($enumValue === TargetPhysicalInterface::DEBUG_WIRE) {
if (!$containsSignal('dW')) {
$failures[] = 'Missing dW signal';
}
}
if ($enumValue === TargetPhysicalInterface::UPDI) {
if (!$containsSignal('UPDI')) {
$failures[] = 'Missing UPDI signal';
}
}
if ($enumValue === TargetPhysicalInterface::PDI) {
if (!$containsSignal('DATA')) {
$failures[] = 'Missing DATA signal';
}
if (!$containsSignal('CLOCK')) {
$failures[] = 'Missing CLOCK signal';
}
}
if ($enumValue === TargetPhysicalInterface::JTAG) {
if (!$containsSignal('TMS')) {
$failures[] = 'Missing TMS signal';
}
if (!$containsSignal('TDI')) {
$failures[] = 'Missing TDI signal';
}
if (!$containsSignal('TCK')) {
$failures[] = 'Missing TCK signal';
}
if (!$containsSignal('TDO')) {
$failures[] = 'Missing TDO signal';
}
}
if ($enumValue === TargetPhysicalInterface::SDI) {
if (!$containsSignal('SWDIO')) {
$failures[] = 'Missing SWDIO signal';
}
if (!$containsSignal('SWCLK')) {
$failures[] = 'Missing SWCLK signal';
}
}
foreach ($physicalInterface->signals as $signal) {
$failures = array_merge($failures, $this->validateSignal($signal, $tdf));
}
return array_map(
fn (string $failure): string => 'Physical Interface ("' . $physicalInterface->value
. '") validation failure: ' . $failure,
$failures
);
}
2024-02-09 23:34:45 +00:00
protected function validateModule(Module $module, TargetDescriptionFile $tdf): array
{
$failures = [];
if (empty($module->key)) {
$failures[] = 'Missing key';
} else {
$failures = array_merge($failures, $this->validateKey($module->key));
2024-02-09 23:34:45 +00:00
}
if (empty($module->name)) {
$failures[] = 'Missing name';
}
if (empty($module->description)) {
$failures[] = 'Missing description';
}
$processedChildKeys = [];
foreach ($module->registerGroups as $registerGroup) {
$failures = array_merge(
$failures,
$this->validateRegisterGroup($registerGroup, $module->key ?? '', $tdf)
);
if ($registerGroup->key !== null && in_array($registerGroup->key, $processedChildKeys)) {
$failures[] = 'Duplicate register group key ("' . $registerGroup->key . '") detected';
}
$processedChildKeys[] = $registerGroup->key;
}
return array_map(
fn (string $failure): string => 'Module (key: "' . $module->key . '") validation failure: ' . $failure,
$failures
);
}
protected function validatePeripheral(Peripheral $peripheral, TargetDescriptionFile $tdf): array
{
$failures = [];
if (empty($peripheral->key)) {
$failures[] = 'Missing key';
} else {
$failures = array_merge($failures, $this->validateKey($peripheral->key));
2024-02-09 23:34:45 +00:00
}
if (empty($peripheral->name)) {
$failures[] = 'Missing name';
}
if (empty($peripheral->moduleKey)) {
$failures[] = 'Missing module key';
}
if (empty($peripheral->registerGroupInstances) && empty($peripheral->signals)) {
$failures[] = 'Empty - no register group instances or signals';
2024-02-09 23:34:45 +00:00
}
$processedChildKeys = [];
foreach ($peripheral->registerGroupInstances as $registerGroupInstance) {
2024-02-09 23:34:45 +00:00
$failures = array_merge(
$failures,
$this->validateRegisterGroupInstance(
$registerGroupInstance,
2024-02-09 23:34:45 +00:00
$peripheral->moduleKey ?? '',
$tdf
)
);
if ($registerGroupInstance->key !== null && in_array($registerGroupInstance->key, $processedChildKeys)) {
$failures[] = 'Duplicate register group instance key ("' . $registerGroupInstance->key . '") detected';
2024-02-09 23:34:45 +00:00
}
$processedChildKeys[] = $registerGroupInstance->key;
2024-02-09 23:34:45 +00:00
}
foreach ($peripheral->signals as $signal) {
$failures = array_merge($failures, $this->validateSignal($signal, $tdf));
2024-02-09 23:34:45 +00:00
}
return array_map(
fn (string $failure): string => 'Peripheral "' . $peripheral->name . '" validation failure: ' . $failure,
$failures
);
}
protected function validateRegisterGroupInstance(
RegisterGroupInstance $registerGroupInstance,
string $moduleKey,
TargetDescriptionFile $tdf
): array {
$failures = [];
if (!empty($registerGroupInstance->key)) {
$failures = array_merge($failures, $this->validateKey($registerGroupInstance->key));
}
if (empty($registerGroupInstance->registerGroupKey)) {
$failures[] = 'Missing register group key';
}
if ($registerGroupInstance->offset === null) {
$failures[] = 'Missing offset';
} elseif ($registerGroupInstance->offset > 0xFFFFFFFF) {
$failures[] = 'Offset exceeds 32-bit unsigned integer';
}
if (empty($registerGroupInstance->addressSpaceKey)) {
$failures[] = 'Missing address space key';
} elseif ($tdf->getAddressSpace($registerGroupInstance->addressSpaceKey) === null) {
$failures[] = 'Could not find address space "' . $registerGroupInstance->addressSpaceKey
. '" - check address space key';
}
if ($tdf->resolveRegisterGroupInstance($registerGroupInstance, $moduleKey) === null) {
$failures[] = 'Could not resolve register group instance "' . $registerGroupInstance->key
. '" - check register group key ("' . $registerGroupInstance->registerGroupKey . '")';
}
return array_map(
fn (string $failure): string => 'Register group instance (group key: "'
. $registerGroupInstance->registerGroupKey . '") validation failure: ' . $failure,
$failures
);
}
protected function validateSignal(Signal $signal, TargetDescriptionFile $tdf): array
2024-02-09 23:34:45 +00:00
{
$failures = [];
if (empty($signal->name)) {
$failures[] = 'Missing name';
}
if (empty($signal->padKey)) {
$failures[] = 'Missing pad key';
} elseif ($tdf->getPad($signal->padKey) === null) {
$failures[] = 'Failed to resolve pad key "' . $signal->padKey . '"';
2024-02-09 23:34:45 +00:00
}
return array_map(
fn (string $failure): string => 'Signal validation failure: ' . $failure,
$failures
);
}
protected function validatePad(Pad $pad): array
{
$failures = [];
if (empty($pad->key)) {
$failures[] = 'Missing key';
} else {
$failures = array_merge($failures, $this->validateKey($pad->key));
}
if (empty($pad->name)) {
$failures[] = 'Missing name';
}
return array_map(
fn (string $failure): string => 'Pad validation failure: ' . $failure,
$failures
);
}
protected function validatePinout(Pinout $pinout, TargetDescriptionFile $tdf): array
2024-02-09 23:34:45 +00:00
{
$failures = [];
if (empty($pinout->key)) {
$failures[] = 'Missing key';
} else {
$failures = array_merge($failures, $this->validateKey($pinout->key));
2024-02-09 23:34:45 +00:00
}
if (empty($pinout->name)) {
$failures[] = 'Missing name';
}
if (empty($pinout->type)) {
$failures[] = 'Unknown type';
}
if (
in_array($pinout->type, [PinoutType::SOIC, PinoutType::DIP, PinoutType::SSOP])
&& count($pinout->pins) % 2 != 0
) {
$failures[] = 'Pin count for ' . $pinout->type->value . ' pinout is not a multiple of two';
}
if (
in_array($pinout->type, [PinoutType::QFP, PinoutType::QFN])
&& count($pinout->pins) % 2 != 0
) {
$failures[] = 'Pin count for ' . $pinout->type->value . ' pinout is not a multiple of four';
}
// It's common for the pin count to be included in the name - we verify it here
$impliedPinCount = filter_var($pinout->name, FILTER_SANITIZE_NUMBER_INT);
if (is_numeric($impliedPinCount) && (int) $impliedPinCount !== count($pinout->pins)) {
$failures[] = 'Implied pin count (' . $impliedPinCount . ') does not match actual pin count ('
. count($pinout->pins) . ')';
}
$processedPositions = [];
foreach ($pinout->pins as $pin) {
$failures = array_merge($failures, $this->validatePin($pin, $pinout, $tdf));
2024-02-09 23:34:45 +00:00
if ($pin->position !== null && in_array($pin->position, $processedPositions)) {
$failures[] = 'Duplicate pin position (' . $pin->position . ') detected';
}
$processedPositions[] = $pin->position;
}
return array_map(
fn (string $failure): string => 'Pinout "' . $pinout->key . '" validation failure: ' . $failure,
$failures
);
}
protected function validatePin(Pin $pin, Pinout $pinout, TargetDescriptionFile $tdf): array
2024-02-09 23:34:45 +00:00
{
$failures = [];
if (empty($pin->position)) {
$failures[] = 'Missing position';
} elseif (
in_array(
$pinout->type,
[PinoutType::QFN, PinoutType::QFP, PinoutType::MLF, PinoutType::DIP, PinoutType::SOIC]
)
&& !is_numeric($pin->position)
) {
$failures[] = 'Position for ' . $pinout->type->value . ' pinouts must be numerical (current value: "'
. $pin->position . '")';
}
if ($pin->padKey !== null) {
if (empty(trim($pin->padKey))) {
$failures[] = 'Missing pad key';
} else if ($tdf->getPad($pin->padKey) === null) {
$failures[] = 'Failed to resolve pad key "' . $pin->padKey . '"';
}
2024-02-09 23:34:45 +00:00
}
return array_map(
fn (string $failure): string => 'Pin "' . $pin->position . '" validation failure: ' . $failure,
2024-02-09 23:34:45 +00:00
$failures
);
}
protected function validateVariant(Variant $variant, TargetDescriptionFile $tdf): array
{
$failures = [];
if (empty($variant->key)) {
$failures[] = 'Missing key';
} else {
$failures = array_merge($failures, $this->validateKey($variant->key));
}
2024-02-09 23:34:45 +00:00
if (empty($variant->name)) {
$failures[] = 'Missing name';
}
if (empty($variant->pinoutKey)) {
$failures[] = 'Missing pinout key';
} elseif (!$tdf->getPinout($variant->pinoutKey) instanceof Pinout) {
$failures[] = 'Could not resolve pinout from key "' . $variant->pinoutKey
. '" - check pinout key';
}
$processedPropertyGroupKeys = [];
foreach ($variant->propertyGroups as $propertyGroup) {
$failures = array_merge($failures, $this->validatePropertyGroup($propertyGroup));
if ($propertyGroup->key !== null && in_array($propertyGroup->key, $processedPropertyGroupKeys)) {
$failures[] = 'Duplicate property group key ("' . $propertyGroup->key . '") detected';
}
$processedPropertyGroupKeys[] = $propertyGroup->key;
}
2024-02-09 23:34:45 +00:00
return array_map(
fn (string $failure): string => 'Variant "' . $variant->name . '" validation failure: ' . $failure,
$failures
);
}
protected function validateTargetPeripheral(TargetPeripheral $targetPeripheral, TargetDescriptionFile $tdf): array
{
$failures = [];
foreach ($targetPeripheral->registerGroups as $registerGroup) {
2024-06-05 19:33:18 +01:00
$failures = array_merge($failures, $this->validateTargetRegisterGroup($registerGroup, $tdf));
}
return array_map(
fn (string $failure): string => 'Resolved target peripheral "' . $targetPeripheral->name
. '" validation failure: ' . $failure,
$failures
);
}
protected function validateTargetRegisterGroup(
TargetRegisterGroup $registerGroup,
TargetDescriptionFile $tdf
): array {
$failures = [];
if (
!empty($registerGroup->addressSpaceKey)
&& ($addressSpace = $tdf->getAddressSpace($registerGroup->addressSpaceKey)) instanceof AddressSpace
) {
2024-06-05 19:33:18 +01:00
// Ensure that all target registers reside in a known memory segment and do not span multiple segments
foreach ($registerGroup->registers as $register) {
$intersectingSegments = $addressSpace->findIntersectingMemorySegments(
$register->address,
($register->address + $register->size - 1)
);
if (empty($intersectingSegments)) {
$failures[] = 'Register "' . $register->key . '" is not contained within any memory segment';
continue;
}
if (count($intersectingSegments) > 1) {
$segmentKeys = array_map(
fn (MemorySegment $segment): string => '"' . $segment->key . '"',
$intersectingSegments
);
$failures[] = 'Register "' . $register->key . '" spans multiple memory segments ('
. implode(',', $segmentKeys) . ')';
continue;
}
}
}
return array_map(
fn (string $failure): string => 'Target register group "' . $registerGroup->name
. '" validation failure: ' . $failure,
$failures
);
}
protected function validateKey(string $key): array
{
$failures = [];
if (!mb_check_encoding($key, 'ASCII')) {
$failures[] = 'Key contains non ASCII characters';
}
if (strtolower($key) !== $key) {
$failures[] = 'Key must contain only lowercase characters';
}
// The underscore character is the only non-alphanumeric character that is permitted in keys
if (!ctype_alnum(str_replace('_', '', $key))) {
$failures[] = 'Key contains non-alphanumeric characters';
}
return array_map(
fn (string $failure): string => 'Key validation failure for key "' . $key
. '": ' . $failure,
$failures
);
}
2024-02-09 23:34:45 +00:00
}