123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081 |
- /*
- * Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
- *
- * SPDX-License-Identifier: BSD-3-Clause
- */
- #include <arm_arch_svc.h>
- #include <debug.h>
- #include <errata_report.h>
- #include <runtime_svc.h>
- #include <smcc.h>
- #include <smcc_helpers.h>
- #include <workaround_cve_2017_5715.h>
- static int32_t smccc_version(void)
- {
- return MAKE_SMCCC_VERSION(SMCCC_MAJOR_VERSION, SMCCC_MINOR_VERSION);
- }
- static int32_t smccc_arch_features(u_register_t arg)
- {
- int ret;
- switch (arg) {
- case SMCCC_VERSION:
- case SMCCC_ARCH_FEATURES:
- return SMC_OK;
- case SMCCC_ARCH_WORKAROUND_1:
- ret = check_workaround_cve_2017_5715();
- if (ret == ERRATA_APPLIES)
- return 0;
- else if (ret == ERRATA_NOT_APPLIES)
- return 1;
- return -1; /* ERRATA_MISSING */
- default:
- return SMC_UNK;
- }
- }
- /*
- * Top-level Arm Architectural Service SMC handler.
- */
- static uintptr_t arm_arch_svc_smc_handler(uint32_t smc_fid,
- u_register_t x1,
- u_register_t x2,
- u_register_t x3,
- u_register_t x4,
- void *cookie,
- void *handle,
- u_register_t flags)
- {
- switch (smc_fid) {
- case SMCCC_VERSION:
- SMC_RET1(handle, smccc_version());
- case SMCCC_ARCH_FEATURES:
- SMC_RET1(handle, smccc_arch_features(x1));
- #if WORKAROUND_CVE_2017_5715
- case SMCCC_ARCH_WORKAROUND_1:
- /*
- * The workaround has already been applied on affected PEs
- * during entry to EL3. On unaffected PEs, this function
- * has no effect.
- */
- SMC_RET0(handle);
- #endif
- default:
- WARN("Unimplemented Arm Architecture Service Call: 0x%x \n",
- smc_fid);
- SMC_RET1(handle, SMC_UNK);
- }
- }
- /* Register Standard Service Calls as runtime service */
- DECLARE_RT_SVC(
- arm_arch_svc,
- OEN_ARM_START,
- OEN_ARM_END,
- SMC_TYPE_FAST,
- NULL,
- arm_arch_svc_smc_handler
- );
|