mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-08 05:43:53 +00:00

This corrects the MISRA violation C2012-15.5: A function should have a single point of exit at the end. Introduced a temporary variable to store the return value to ensure single return for the function. Change-Id: I9c2ca05b506a6ac35b24966fc5fdd5e88e65770d Signed-off-by: Nithin G <nithing@amd.com> Signed-off-by: Maheedhar Bollapalli <maheedharsai.bollapalli@amd.com>
127 lines
3 KiB
C
127 lines
3 KiB
C
/*
|
|
* Copyright (c) 2014-2024, Arm Limited and Contributors. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <assert.h>
|
|
#include <inttypes.h>
|
|
#include <stdint.h>
|
|
|
|
#include <arch_helpers.h>
|
|
#include <common/debug.h>
|
|
#include <drivers/console.h>
|
|
#if ENABLE_FEAT_RAS
|
|
#include <lib/extensions/ras.h>
|
|
#endif
|
|
#include <lib/xlat_tables/xlat_mmu_helpers.h>
|
|
#include <plat/common/platform.h>
|
|
|
|
/* Pointer and function to register platform function to load alernate images */
|
|
const struct plat_try_images_ops *plat_try_img_ops;
|
|
|
|
void plat_setup_try_img_ops(const struct plat_try_images_ops *plat_try_ops)
|
|
{
|
|
plat_try_img_ops = plat_try_ops;
|
|
}
|
|
|
|
/*
|
|
* The following platform setup functions are weakly defined. They
|
|
* provide typical implementations that may be re-used by multiple
|
|
* platforms but may also be overridden by a platform if required.
|
|
*/
|
|
#pragma weak bl31_plat_runtime_setup
|
|
|
|
#if SDEI_SUPPORT
|
|
#pragma weak plat_sdei_handle_masked_trigger
|
|
#pragma weak plat_sdei_validate_entry_point
|
|
#endif
|
|
|
|
#if FFH_SUPPORT
|
|
#pragma weak plat_ea_handler = plat_default_ea_handler
|
|
#endif
|
|
|
|
void bl31_plat_runtime_setup(void)
|
|
{
|
|
}
|
|
|
|
/*
|
|
* Helper function for platform_get_pos() when platform compatibility is
|
|
* disabled. This is to enable SPDs using the older platform API to continue
|
|
* to work.
|
|
*/
|
|
unsigned int platform_core_pos_helper(unsigned long mpidr)
|
|
{
|
|
int idx = plat_core_pos_by_mpidr(mpidr);
|
|
assert(idx >= 0);
|
|
return idx;
|
|
}
|
|
|
|
#if SDEI_SUPPORT
|
|
/*
|
|
* Function that handles spurious SDEI interrupts while events are masked.
|
|
*/
|
|
void plat_sdei_handle_masked_trigger(uint64_t mpidr, unsigned int intr)
|
|
{
|
|
WARN("Spurious SDEI interrupt %u on masked PE %" PRIx64 "\n", intr, mpidr);
|
|
}
|
|
|
|
/*
|
|
* Default Function to validate SDEI entry point, which returns success.
|
|
* Platforms may override this with their own validation mechanism.
|
|
*/
|
|
int plat_sdei_validate_entry_point(uintptr_t ep, unsigned int client_mode)
|
|
{
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
const char *get_el_str(unsigned int el)
|
|
{
|
|
const char *mode = NULL;
|
|
|
|
switch (el) {
|
|
case MODE_EL3:
|
|
mode = "EL3";
|
|
break;
|
|
case MODE_EL2:
|
|
mode = "EL2";
|
|
break;
|
|
case MODE_EL1:
|
|
mode = "EL1";
|
|
break;
|
|
case MODE_EL0:
|
|
mode = "EL0";
|
|
break;
|
|
default:
|
|
assert(false);
|
|
break;
|
|
}
|
|
|
|
return mode;
|
|
}
|
|
|
|
#if FFH_SUPPORT
|
|
/* Handler for External Aborts from lower EL including RAS errors */
|
|
void plat_default_ea_handler(unsigned int ea_reason, uint64_t syndrome, void *cookie,
|
|
void *handle, uint64_t flags)
|
|
{
|
|
#if ENABLE_FEAT_RAS
|
|
/* Call RAS EA handler */
|
|
int handled = ras_ea_handler(ea_reason, syndrome, cookie, handle, flags);
|
|
if (handled != 0)
|
|
return;
|
|
#endif
|
|
unsigned int level = (unsigned int)GET_EL(read_spsr_el3());
|
|
|
|
ERROR_NL();
|
|
ERROR("Unhandled External Abort received on 0x%lx from %s\n",
|
|
read_mpidr_el1(), get_el_str(level));
|
|
ERROR("exception reason=%u syndrome=0x%" PRIx64 "\n", ea_reason, syndrome);
|
|
|
|
/* We reached here due to a panic from a lower EL and assuming this is the default
|
|
* platform registered handler that we could call on a lower EL panic.
|
|
*/
|
|
lower_el_panic();
|
|
}
|
|
#endif
|