blob: 01646169f0600100c980a0fd09e9215a3230965e [file] [log] [blame]
// Copyright 2023 the authors.
// This project is dual-licensed under Apache 2.0 and MIT terms.
// See LICENSE-APACHE and LICENSE-MIT for details.
use super::{
error::Error, SocIdType, Version, SMCCC_ARCH_FEATURES, SMCCC_ARCH_SOC_ID,
SMCCC_ARCH_WORKAROUND_1, SMCCC_ARCH_WORKAROUND_2, SMCCC_ARCH_WORKAROUND_3, SMCCC_VERSION,
};
use crate::smccc::{
call32,
error::{positive_or_error_32, success_or_error_32},
};
/// Returns the implemented version of the SMC Calling Convention.
pub fn version() -> Result<Version, Error> {
(call32(SMCCC_VERSION, [0; 7])[0] as i32).try_into()
}
/// Returns whether the given Arm Architecture Service function is implemented, and any feature
/// flags specific to the function.
pub fn features(arch_func_id: u32) -> Result<u32, Error> {
positive_or_error_32(call32(SMCCC_ARCH_FEATURES, [arch_func_id, 0, 0, 0, 0, 0, 0])[0])
}
/// Returns the SiP defined SoC identification details.
pub fn soc_id(soc_id_type: SocIdType) -> Result<u32, Error> {
positive_or_error_32(call32(SMCCC_ARCH_SOC_ID, [soc_id_type.into(), 0, 0, 0, 0, 0, 0])[0])
}
/// Executes a firmware workaround to mitigate CVE-2017-5715.
pub fn arch_workaround_1() -> Result<(), Error> {
success_or_error_32(call32(SMCCC_ARCH_WORKAROUND_1, [0; 7])[0])
}
/// Enables or disables the mitigation for CVE-2018-3639.
pub fn arch_workaround_2(enable: bool) -> Result<(), Error> {
success_or_error_32(call32(SMCCC_ARCH_WORKAROUND_2, [enable.into(), 0, 0, 0, 0, 0, 0])[0])
}
/// Executes a firmware workaround to mitigate CVE-2017-5715 and CVE-2022-23960.
pub fn arch_workaround_3() -> Result<(), Error> {
success_or_error_32(call32(SMCCC_ARCH_WORKAROUND_3, [0; 7])[0])
}