1 /*
2  * Copyright (c) 2014-2024, Arm Limited and Contributors. All rights reserved.
3  *
4  * SPDX-License-Identifier: BSD-3-Clause
5  */
6 
7 #include <assert.h>
8 #include <inttypes.h>
9 #include <stdint.h>
10 
11 #include <arch_helpers.h>
12 #include <common/debug.h>
13 #include <drivers/console.h>
14 #if ENABLE_FEAT_RAS
15 #include <lib/extensions/ras.h>
16 #endif
17 #include <lib/xlat_tables/xlat_mmu_helpers.h>
18 #include <plat/common/platform.h>
19 
20 /*
21  * The following platform setup functions are weakly defined. They
22  * provide typical implementations that may be re-used by multiple
23  * platforms but may also be overridden by a platform if required.
24  */
25 #pragma weak bl31_plat_runtime_setup
26 
27 #if SDEI_SUPPORT
28 #pragma weak plat_sdei_handle_masked_trigger
29 #pragma weak plat_sdei_validate_entry_point
30 #endif
31 
32 #if FFH_SUPPORT
33 #pragma weak plat_ea_handler = plat_default_ea_handler
34 #endif
35 
bl31_plat_runtime_setup(void)36 void bl31_plat_runtime_setup(void)
37 {
38 }
39 
40 /*
41  * Helper function for platform_get_pos() when platform compatibility is
42  * disabled. This is to enable SPDs using the older platform API to continue
43  * to work.
44  */
platform_core_pos_helper(unsigned long mpidr)45 unsigned int platform_core_pos_helper(unsigned long mpidr)
46 {
47 	int idx = plat_core_pos_by_mpidr(mpidr);
48 	assert(idx >= 0);
49 	return idx;
50 }
51 
52 #if SDEI_SUPPORT
53 /*
54  * Function that handles spurious SDEI interrupts while events are masked.
55  */
plat_sdei_handle_masked_trigger(uint64_t mpidr,unsigned int intr)56 void plat_sdei_handle_masked_trigger(uint64_t mpidr, unsigned int intr)
57 {
58 	WARN("Spurious SDEI interrupt %u on masked PE %" PRIx64 "\n", intr, mpidr);
59 }
60 
61 /*
62  * Default Function to validate SDEI entry point, which returns success.
63  * Platforms may override this with their own validation mechanism.
64  */
plat_sdei_validate_entry_point(uintptr_t ep,unsigned int client_mode)65 int plat_sdei_validate_entry_point(uintptr_t ep, unsigned int client_mode)
66 {
67 	return 0;
68 }
69 #endif
70 
get_el_str(unsigned int el)71 const char *get_el_str(unsigned int el)
72 {
73 	switch (el) {
74 	case MODE_EL3:
75 		return "EL3";
76 	case MODE_EL2:
77 		return "EL2";
78 	case MODE_EL1:
79 		return "EL1";
80 	case MODE_EL0:
81 		return "EL0";
82 	default:
83 		assert(false);
84 		return NULL;
85 	}
86 }
87 
88 #if FFH_SUPPORT
89 /* Handler for External Aborts from lower EL including RAS errors */
plat_default_ea_handler(unsigned int ea_reason,uint64_t syndrome,void * cookie,void * handle,uint64_t flags)90 void plat_default_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie,
91 		void *handle, uint64_t flags)
92 {
93 #if ENABLE_FEAT_RAS
94 	/* Call RAS EA handler */
95 	int handled = ras_ea_handler(ea_reason, syndrome, cookie, handle, flags);
96 	if (handled != 0)
97 		return;
98 #endif
99 	unsigned int level = (unsigned int)GET_EL(read_spsr_el3());
100 
101 	ERROR_NL();
102 	ERROR("Unhandled External Abort received on 0x%lx from %s\n",
103 		read_mpidr_el1(), get_el_str(level));
104 	ERROR("exception reason=%u syndrome=0x%" PRIx64 "\n", ea_reason, syndrome);
105 
106 	/* We reached here due to a panic from a lower EL and assuming this is the default
107 	 * platform registered handler that we could call on a lower EL panic.
108 	 */
109 	lower_el_panic();
110 }
111 #endif
112