123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351 |
- /*
- * FreeRTOS Kernel V10.4.6
- * Copyright (C) 2021 Amazon.com, Inc. or its affiliates. All Rights Reserved.
- *
- * SPDX-License-Identifier: MIT
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy of
- * this software and associated documentation files (the "Software"), to deal in
- * the Software without restriction, including without limitation the rights to
- * use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
- * the Software, and to permit persons to whom the Software is furnished to do so,
- * subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in all
- * copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
- * FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
- * COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
- * IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
- * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
- *
- * https://www.FreeRTOS.org
- * https://github.com/FreeRTOS
- *
- */
- /* Secure context includes. */
- #include "secure_context.h"
- /* Secure heap includes. */
- #include "secure_heap.h"
- /* Secure port macros. */
- #include "secure_port_macros.h"
- /**
- * @brief CONTROL value for privileged tasks.
- *
- * Bit[0] - 0 --> Thread mode is privileged.
- * Bit[1] - 1 --> Thread mode uses PSP.
- */
- #define securecontextCONTROL_VALUE_PRIVILEGED 0x02
- /**
- * @brief CONTROL value for un-privileged tasks.
- *
- * Bit[0] - 1 --> Thread mode is un-privileged.
- * Bit[1] - 1 --> Thread mode uses PSP.
- */
- #define securecontextCONTROL_VALUE_UNPRIVILEGED 0x03
- /**
- * @brief Size of stack seal values in bytes.
- */
- #define securecontextSTACK_SEAL_SIZE 8
- /**
- * @brief Stack seal value as recommended by ARM.
- */
- #define securecontextSTACK_SEAL_VALUE 0xFEF5EDA5
- /**
- * @brief Maximum number of secure contexts.
- */
- #ifndef secureconfigMAX_SECURE_CONTEXTS
- #define secureconfigMAX_SECURE_CONTEXTS 8UL
- #endif
- /*-----------------------------------------------------------*/
- /**
- * @brief Pre-allocated array of secure contexts.
- */
- SecureContext_t xSecureContexts[ secureconfigMAX_SECURE_CONTEXTS ];
- /*-----------------------------------------------------------*/
- /**
- * @brief Get a free secure context for a task from the secure context pool (xSecureContexts).
- *
- * This function ensures that only one secure context is allocated for a task.
- *
- * @param[in] pvTaskHandle The task handle for which the secure context is allocated.
- *
- * @return Index of a free secure context in the xSecureContexts array.
- */
- static uint32_t ulGetSecureContext( void * pvTaskHandle );
- /**
- * @brief Return the secure context to the secure context pool (xSecureContexts).
- *
- * @param[in] ulSecureContextIndex Index of the context in the xSecureContexts array.
- */
- static void vReturnSecureContext( uint32_t ulSecureContextIndex );
- /* These are implemented in assembly. */
- extern void SecureContext_LoadContextAsm( SecureContext_t * pxSecureContext );
- extern void SecureContext_SaveContextAsm( SecureContext_t * pxSecureContext );
- /*-----------------------------------------------------------*/
- static uint32_t ulGetSecureContext( void * pvTaskHandle )
- {
- /* Start with invalid index. */
- uint32_t i, ulSecureContextIndex = secureconfigMAX_SECURE_CONTEXTS;
- for( i = 0; i < secureconfigMAX_SECURE_CONTEXTS; i++ )
- {
- if( ( xSecureContexts[ i ].pucCurrentStackPointer == NULL ) &&
- ( xSecureContexts[ i ].pucStackLimit == NULL ) &&
- ( xSecureContexts[ i ].pucStackStart == NULL ) &&
- ( xSecureContexts[ i ].pvTaskHandle == NULL ) &&
- ( ulSecureContextIndex == secureconfigMAX_SECURE_CONTEXTS ) )
- {
- ulSecureContextIndex = i;
- }
- else if( xSecureContexts[ i ].pvTaskHandle == pvTaskHandle )
- {
- /* A task can only have one secure context. Do not allocate a second
- * context for the same task. */
- ulSecureContextIndex = secureconfigMAX_SECURE_CONTEXTS;
- break;
- }
- }
- return ulSecureContextIndex;
- }
- /*-----------------------------------------------------------*/
- static void vReturnSecureContext( uint32_t ulSecureContextIndex )
- {
- xSecureContexts[ ulSecureContextIndex ].pucCurrentStackPointer = NULL;
- xSecureContexts[ ulSecureContextIndex ].pucStackLimit = NULL;
- xSecureContexts[ ulSecureContextIndex ].pucStackStart = NULL;
- xSecureContexts[ ulSecureContextIndex ].pvTaskHandle = NULL;
- }
- /*-----------------------------------------------------------*/
- secureportNON_SECURE_CALLABLE void SecureContext_Init( void )
- {
- uint32_t ulIPSR, i;
- static uint32_t ulSecureContextsInitialized = 0;
- /* Read the Interrupt Program Status Register (IPSR) value. */
- secureportREAD_IPSR( ulIPSR );
- /* Do nothing if the processor is running in the Thread Mode. IPSR is zero
- * when the processor is running in the Thread Mode. */
- if( ( ulIPSR != 0 ) && ( ulSecureContextsInitialized == 0 ) )
- {
- /* Ensure to initialize secure contexts only once. */
- ulSecureContextsInitialized = 1;
- /* No stack for thread mode until a task's context is loaded. */
- secureportSET_PSPLIM( securecontextNO_STACK );
- secureportSET_PSP( securecontextNO_STACK );
- /* Initialize all secure contexts. */
- for( i = 0; i < secureconfigMAX_SECURE_CONTEXTS; i++ )
- {
- xSecureContexts[ i ].pucCurrentStackPointer = NULL;
- xSecureContexts[ i ].pucStackLimit = NULL;
- xSecureContexts[ i ].pucStackStart = NULL;
- xSecureContexts[ i ].pvTaskHandle = NULL;
- }
- #if ( configENABLE_MPU == 1 )
- {
- /* Configure thread mode to use PSP and to be unprivileged. */
- secureportSET_CONTROL( securecontextCONTROL_VALUE_UNPRIVILEGED );
- }
- #else /* configENABLE_MPU */
- {
- /* Configure thread mode to use PSP and to be privileged. */
- secureportSET_CONTROL( securecontextCONTROL_VALUE_PRIVILEGED );
- }
- #endif /* configENABLE_MPU */
- }
- }
- /*-----------------------------------------------------------*/
- #if ( configENABLE_MPU == 1 )
- secureportNON_SECURE_CALLABLE SecureContextHandle_t SecureContext_AllocateContext( uint32_t ulSecureStackSize,
- uint32_t ulIsTaskPrivileged,
- void * pvTaskHandle )
- #else /* configENABLE_MPU */
- secureportNON_SECURE_CALLABLE SecureContextHandle_t SecureContext_AllocateContext( uint32_t ulSecureStackSize,
- void * pvTaskHandle )
- #endif /* configENABLE_MPU */
- {
- uint8_t * pucStackMemory = NULL;
- uint8_t * pucStackLimit;
- uint32_t ulIPSR, ulSecureContextIndex;
- SecureContextHandle_t xSecureContextHandle = securecontextINVALID_CONTEXT_ID;
- #if ( configENABLE_MPU == 1 )
- uint32_t * pulCurrentStackPointer = NULL;
- #endif /* configENABLE_MPU */
- /* Read the Interrupt Program Status Register (IPSR) and Process Stack Limit
- * Register (PSPLIM) value. */
- secureportREAD_IPSR( ulIPSR );
- secureportREAD_PSPLIM( pucStackLimit );
- /* Do nothing if the processor is running in the Thread Mode. IPSR is zero
- * when the processor is running in the Thread Mode.
- * Also do nothing, if a secure context us already loaded. PSPLIM is set to
- * securecontextNO_STACK when no secure context is loaded. */
- if( ( ulIPSR != 0 ) && ( pucStackLimit == securecontextNO_STACK ) )
- {
- /* Ontain a free secure context. */
- ulSecureContextIndex = ulGetSecureContext( pvTaskHandle );
- /* Were we able to get a free context? */
- if( ulSecureContextIndex < secureconfigMAX_SECURE_CONTEXTS )
- {
- /* Allocate the stack space. */
- pucStackMemory = pvPortMalloc( ulSecureStackSize + securecontextSTACK_SEAL_SIZE );
- if( pucStackMemory != NULL )
- {
- /* Since stack grows down, the starting point will be the last
- * location. Note that this location is next to the last
- * allocated byte for stack (excluding the space for seal values)
- * because the hardware decrements the stack pointer before
- * writing i.e. if stack pointer is 0x2, a push operation will
- * decrement the stack pointer to 0x1 and then write at 0x1. */
- xSecureContexts[ ulSecureContextIndex ].pucStackStart = pucStackMemory + ulSecureStackSize;
- /* Seal the created secure process stack. */
- *( uint32_t * )( pucStackMemory + ulSecureStackSize ) = securecontextSTACK_SEAL_VALUE;
- *( uint32_t * )( pucStackMemory + ulSecureStackSize + 4 ) = securecontextSTACK_SEAL_VALUE;
- /* The stack cannot go beyond this location. This value is
- * programmed in the PSPLIM register on context switch.*/
- xSecureContexts[ ulSecureContextIndex ].pucStackLimit = pucStackMemory;
- xSecureContexts[ ulSecureContextIndex ].pvTaskHandle = pvTaskHandle;
- #if ( configENABLE_MPU == 1 )
- {
- /* Store the correct CONTROL value for the task on the stack.
- * This value is programmed in the CONTROL register on
- * context switch. */
- pulCurrentStackPointer = ( uint32_t * ) xSecureContexts[ ulSecureContextIndex ].pucStackStart;
- pulCurrentStackPointer--;
- if( ulIsTaskPrivileged )
- {
- *( pulCurrentStackPointer ) = securecontextCONTROL_VALUE_PRIVILEGED;
- }
- else
- {
- *( pulCurrentStackPointer ) = securecontextCONTROL_VALUE_UNPRIVILEGED;
- }
- /* Store the current stack pointer. This value is programmed in
- * the PSP register on context switch. */
- xSecureContexts[ ulSecureContextIndex ].pucCurrentStackPointer = ( uint8_t * ) pulCurrentStackPointer;
- }
- #else /* configENABLE_MPU */
- {
- /* Current SP is set to the starting of the stack. This
- * value programmed in the PSP register on context switch. */
- xSecureContexts[ ulSecureContextIndex ].pucCurrentStackPointer = xSecureContexts[ ulSecureContextIndex ].pucStackStart;
- }
- #endif /* configENABLE_MPU */
- /* Ensure to never return 0 as a valid context handle. */
- xSecureContextHandle = ulSecureContextIndex + 1UL;
- }
- }
- }
- return xSecureContextHandle;
- }
- /*-----------------------------------------------------------*/
- secureportNON_SECURE_CALLABLE void SecureContext_FreeContext( SecureContextHandle_t xSecureContextHandle, void * pvTaskHandle )
- {
- uint32_t ulIPSR, ulSecureContextIndex;
- /* Read the Interrupt Program Status Register (IPSR) value. */
- secureportREAD_IPSR( ulIPSR );
- /* Do nothing if the processor is running in the Thread Mode. IPSR is zero
- * when the processor is running in the Thread Mode. */
- if( ulIPSR != 0 )
- {
- /* Only free if a valid context handle is passed. */
- if( ( xSecureContextHandle > 0UL ) && ( xSecureContextHandle <= secureconfigMAX_SECURE_CONTEXTS ) )
- {
- ulSecureContextIndex = xSecureContextHandle - 1UL;
- /* Ensure that the secure context being deleted is associated with
- * the task. */
- if( xSecureContexts[ ulSecureContextIndex ].pvTaskHandle == pvTaskHandle )
- {
- /* Free the stack space. */
- vPortFree( xSecureContexts[ ulSecureContextIndex ].pucStackLimit );
- /* Return the secure context back to the free secure contexts pool. */
- vReturnSecureContext( ulSecureContextIndex );
- }
- }
- }
- }
- /*-----------------------------------------------------------*/
- secureportNON_SECURE_CALLABLE void SecureContext_LoadContext( SecureContextHandle_t xSecureContextHandle, void * pvTaskHandle )
- {
- uint8_t * pucStackLimit;
- uint32_t ulSecureContextIndex;
- if( ( xSecureContextHandle > 0UL ) && ( xSecureContextHandle <= secureconfigMAX_SECURE_CONTEXTS ) )
- {
- ulSecureContextIndex = xSecureContextHandle - 1UL;
- secureportREAD_PSPLIM( pucStackLimit );
- /* Ensure that no secure context is loaded and the task is loading it's
- * own context. */
- if( ( pucStackLimit == securecontextNO_STACK ) &&
- ( xSecureContexts[ ulSecureContextIndex ].pvTaskHandle == pvTaskHandle ) )
- {
- SecureContext_LoadContextAsm( &( xSecureContexts[ ulSecureContextIndex ] ) );
- }
- }
- }
- /*-----------------------------------------------------------*/
- secureportNON_SECURE_CALLABLE void SecureContext_SaveContext( SecureContextHandle_t xSecureContextHandle, void * pvTaskHandle )
- {
- uint8_t * pucStackLimit;
- uint32_t ulSecureContextIndex;
- if( ( xSecureContextHandle > 0UL ) && ( xSecureContextHandle <= secureconfigMAX_SECURE_CONTEXTS ) )
- {
- ulSecureContextIndex = xSecureContextHandle - 1UL;
- secureportREAD_PSPLIM( pucStackLimit );
- /* Ensure that task's context is loaded and the task is saving it's own
- * context. */
- if( ( xSecureContexts[ ulSecureContextIndex ].pucStackLimit == pucStackLimit ) &&
- ( xSecureContexts[ ulSecureContextIndex ].pvTaskHandle == pvTaskHandle ) )
- {
- SecureContext_SaveContextAsm( &( xSecureContexts[ ulSecureContextIndex ] ) );
- }
- }
- }
- /*-----------------------------------------------------------*/
|