1 /*
2 * Copyright (c) 2014-2024, Arm Limited and Contributors. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7 #include <assert.h>
8 #include <inttypes.h>
9 #include <stdint.h>
10
11 #include <arch_helpers.h>
12 #include <common/debug.h>
13 #include <drivers/console.h>
14 #if ENABLE_FEAT_RAS
15 #include <lib/extensions/ras.h>
16 #endif
17 #include <lib/xlat_tables/xlat_mmu_helpers.h>
18 #include <plat/common/platform.h>
19
20 /*
21 * The following platform setup functions are weakly defined. They
22 * provide typical implementations that may be re-used by multiple
23 * platforms but may also be overridden by a platform if required.
24 */
25 #pragma weak bl31_plat_runtime_setup
26
27 #if SDEI_SUPPORT
28 #pragma weak plat_sdei_handle_masked_trigger
29 #pragma weak plat_sdei_validate_entry_point
30 #endif
31
32 #if FFH_SUPPORT
33 #pragma weak plat_ea_handler = plat_default_ea_handler
34 #endif
35
bl31_plat_runtime_setup(void)36 void bl31_plat_runtime_setup(void)
37 {
38 }
39
40 /*
41 * Helper function for platform_get_pos() when platform compatibility is
42 * disabled. This is to enable SPDs using the older platform API to continue
43 * to work.
44 */
platform_core_pos_helper(unsigned long mpidr)45 unsigned int platform_core_pos_helper(unsigned long mpidr)
46 {
47 int idx = plat_core_pos_by_mpidr(mpidr);
48 assert(idx >= 0);
49 return idx;
50 }
51
52 #if SDEI_SUPPORT
53 /*
54 * Function that handles spurious SDEI interrupts while events are masked.
55 */
plat_sdei_handle_masked_trigger(uint64_t mpidr,unsigned int intr)56 void plat_sdei_handle_masked_trigger(uint64_t mpidr, unsigned int intr)
57 {
58 WARN("Spurious SDEI interrupt %u on masked PE %" PRIx64 "\n", intr, mpidr);
59 }
60
61 /*
62 * Default Function to validate SDEI entry point, which returns success.
63 * Platforms may override this with their own validation mechanism.
64 */
plat_sdei_validate_entry_point(uintptr_t ep,unsigned int client_mode)65 int plat_sdei_validate_entry_point(uintptr_t ep, unsigned int client_mode)
66 {
67 return 0;
68 }
69 #endif
70
get_el_str(unsigned int el)71 const char *get_el_str(unsigned int el)
72 {
73 switch (el) {
74 case MODE_EL3:
75 return "EL3";
76 case MODE_EL2:
77 return "EL2";
78 case MODE_EL1:
79 return "EL1";
80 case MODE_EL0:
81 return "EL0";
82 default:
83 assert(false);
84 return NULL;
85 }
86 }
87
88 #if FFH_SUPPORT
89 /* Handler for External Aborts from lower EL including RAS errors */
plat_default_ea_handler(unsigned int ea_reason,uint64_t syndrome,void * cookie,void * handle,uint64_t flags)90 void plat_default_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie,
91 void *handle, uint64_t flags)
92 {
93 #if ENABLE_FEAT_RAS
94 /* Call RAS EA handler */
95 int handled = ras_ea_handler(ea_reason, syndrome, cookie, handle, flags);
96 if (handled != 0)
97 return;
98 #endif
99 unsigned int level = (unsigned int)GET_EL(read_spsr_el3());
100
101 ERROR_NL();
102 ERROR("Unhandled External Abort received on 0x%lx from %s\n",
103 read_mpidr_el1(), get_el_str(level));
104 ERROR("exception reason=%u syndrome=0x%" PRIx64 "\n", ea_reason, syndrome);
105
106 /* We reached here due to a panic from a lower EL and assuming this is the default
107 * platform registered handler that we could call on a lower EL panic.
108 */
109 lower_el_panic();
110 }
111 #endif
112