xref: /rk3399_ARM-atf/plat/common/aarch64/plat_common.c (revision ae770fedf459d5643125d29f48659e3e936ebd2d)
1 /*
2  * Copyright (c) 2014-2024, Arm Limited and Contributors. All rights reserved.
3  *
4  * SPDX-License-Identifier: BSD-3-Clause
5  */
6 
7 #include <assert.h>
8 #include <inttypes.h>
9 #include <stdint.h>
10 
11 #include <arch_helpers.h>
12 #include <common/debug.h>
13 #include <drivers/console.h>
14 #if ENABLE_FEAT_RAS
15 #include <lib/extensions/ras.h>
16 #endif
17 #include <lib/xlat_tables/xlat_mmu_helpers.h>
18 #include <plat/common/platform.h>
19 
20 /*
21  * The following platform setup functions are weakly defined. They
22  * provide typical implementations that may be re-used by multiple
23  * platforms but may also be overridden by a platform if required.
24  */
25 #pragma weak bl31_plat_runtime_setup
26 
27 #if SDEI_SUPPORT
28 #pragma weak plat_sdei_handle_masked_trigger
29 #pragma weak plat_sdei_validate_entry_point
30 #endif
31 
32 #if FFH_SUPPORT
33 #pragma weak plat_ea_handler = plat_default_ea_handler
34 #endif
35 
36 void bl31_plat_runtime_setup(void)
37 {
38 	console_flush();
39 	console_switch_state(CONSOLE_FLAG_RUNTIME);
40 }
41 
42 /*
43  * Helper function for platform_get_pos() when platform compatibility is
44  * disabled. This is to enable SPDs using the older platform API to continue
45  * to work.
46  */
47 unsigned int platform_core_pos_helper(unsigned long mpidr)
48 {
49 	int idx = plat_core_pos_by_mpidr(mpidr);
50 	assert(idx >= 0);
51 	return idx;
52 }
53 
54 #if SDEI_SUPPORT
55 /*
56  * Function that handles spurious SDEI interrupts while events are masked.
57  */
58 void plat_sdei_handle_masked_trigger(uint64_t mpidr, unsigned int intr)
59 {
60 	WARN("Spurious SDEI interrupt %u on masked PE %" PRIx64 "\n", intr, mpidr);
61 }
62 
63 /*
64  * Default Function to validate SDEI entry point, which returns success.
65  * Platforms may override this with their own validation mechanism.
66  */
67 int plat_sdei_validate_entry_point(uintptr_t ep, unsigned int client_mode)
68 {
69 	return 0;
70 }
71 #endif
72 
73 const char *get_el_str(unsigned int el)
74 {
75 	switch (el) {
76 	case MODE_EL3:
77 		return "EL3";
78 	case MODE_EL2:
79 		return "EL2";
80 	case MODE_EL1:
81 		return "EL1";
82 	case MODE_EL0:
83 		return "EL0";
84 	default:
85 		assert(false);
86 		return NULL;
87 	}
88 }
89 
90 #if FFH_SUPPORT
91 /* Handler for External Aborts from lower EL including RAS errors */
92 void plat_default_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie,
93 		void *handle, uint64_t flags)
94 {
95 #if ENABLE_FEAT_RAS
96 	/* Call RAS EA handler */
97 	int handled = ras_ea_handler(ea_reason, syndrome, cookie, handle, flags);
98 	if (handled != 0)
99 		return;
100 #endif
101 	unsigned int level = (unsigned int)GET_EL(read_spsr_el3());
102 
103 	ERROR_NL();
104 	ERROR("Unhandled External Abort received on 0x%lx from %s\n",
105 		read_mpidr_el1(), get_el_str(level));
106 	ERROR("exception reason=%u syndrome=0x%" PRIx64 "\n", ea_reason, syndrome);
107 
108 	/* We reached here due to a panic from a lower EL and assuming this is the default
109 	 * platform registered handler that we could call on a lower EL panic.
110 	 */
111 	lower_el_panic();
112 }
113 #endif
114