secure_context.h 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135
  1. /*
  2. * FreeRTOS Kernel V10.4.6
  3. * Copyright (C) 2021 Amazon.com, Inc. or its affiliates. All Rights Reserved.
  4. *
  5. * SPDX-License-Identifier: MIT
  6. *
  7. * Permission is hereby granted, free of charge, to any person obtaining a copy of
  8. * this software and associated documentation files (the "Software"), to deal in
  9. * the Software without restriction, including without limitation the rights to
  10. * use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
  11. * the Software, and to permit persons to whom the Software is furnished to do so,
  12. * subject to the following conditions:
  13. *
  14. * The above copyright notice and this permission notice shall be included in all
  15. * copies or substantial portions of the Software.
  16. *
  17. * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  18. * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
  19. * FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
  20. * COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
  21. * IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
  22. * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
  23. *
  24. * https://www.FreeRTOS.org
  25. * https://github.com/FreeRTOS
  26. *
  27. */
  28. #ifndef __SECURE_CONTEXT_H__
  29. #define __SECURE_CONTEXT_H__
  30. /* Standard includes. */
  31. #include <stdint.h>
  32. /* FreeRTOS includes. */
  33. #include "FreeRTOSConfig.h"
  34. /**
  35. * @brief PSP value when no secure context is loaded.
  36. */
  37. #define securecontextNO_STACK 0x0
  38. /**
  39. * @brief Invalid context ID.
  40. */
  41. #define securecontextINVALID_CONTEXT_ID 0UL
  42. /*-----------------------------------------------------------*/
  43. /**
  44. * @brief Structure to represent a secure context.
  45. *
  46. * @note Since stack grows down, pucStackStart is the highest address while
  47. * pucStackLimit is the first address of the allocated memory.
  48. */
  49. typedef struct SecureContext
  50. {
  51. uint8_t * pucCurrentStackPointer; /**< Current value of stack pointer (PSP). */
  52. uint8_t * pucStackLimit; /**< Last location of the stack memory (PSPLIM). */
  53. uint8_t * pucStackStart; /**< First location of the stack memory. */
  54. void * pvTaskHandle; /**< Task handle of the task this context is associated with. */
  55. } SecureContext_t;
  56. /*-----------------------------------------------------------*/
  57. /**
  58. * @brief Opaque handle for a secure context.
  59. */
  60. typedef uint32_t SecureContextHandle_t;
  61. /*-----------------------------------------------------------*/
  62. /**
  63. * @brief Initializes the secure context management system.
  64. *
  65. * PSP is set to NULL and therefore a task must allocate and load a context
  66. * before calling any secure side function in the thread mode.
  67. *
  68. * @note This function must be called in the handler mode. It is no-op if called
  69. * in the thread mode.
  70. */
  71. void SecureContext_Init( void );
  72. /**
  73. * @brief Allocates a context on the secure side.
  74. *
  75. * @note This function must be called in the handler mode. It is no-op if called
  76. * in the thread mode.
  77. *
  78. * @param[in] ulSecureStackSize Size of the stack to allocate on secure side.
  79. * @param[in] ulIsTaskPrivileged 1 if the calling task is privileged, 0 otherwise.
  80. *
  81. * @return Opaque context handle if context is successfully allocated, NULL
  82. * otherwise.
  83. */
  84. #if ( configENABLE_MPU == 1 )
  85. SecureContextHandle_t SecureContext_AllocateContext( uint32_t ulSecureStackSize,
  86. uint32_t ulIsTaskPrivileged,
  87. void * pvTaskHandle );
  88. #else /* configENABLE_MPU */
  89. SecureContextHandle_t SecureContext_AllocateContext( uint32_t ulSecureStackSize,
  90. void * pvTaskHandle );
  91. #endif /* configENABLE_MPU */
  92. /**
  93. * @brief Frees the given context.
  94. *
  95. * @note This function must be called in the handler mode. It is no-op if called
  96. * in the thread mode.
  97. *
  98. * @param[in] xSecureContextHandle Context handle corresponding to the
  99. * context to be freed.
  100. */
  101. void SecureContext_FreeContext( SecureContextHandle_t xSecureContextHandle, void * pvTaskHandle );
  102. /**
  103. * @brief Loads the given context.
  104. *
  105. * @note This function must be called in the handler mode. It is no-op if called
  106. * in the thread mode.
  107. *
  108. * @param[in] xSecureContextHandle Context handle corresponding to the context
  109. * to be loaded.
  110. */
  111. void SecureContext_LoadContext( SecureContextHandle_t xSecureContextHandle, void * pvTaskHandle );
  112. /**
  113. * @brief Saves the given context.
  114. *
  115. * @note This function must be called in the handler mode. It is no-op if called
  116. * in the thread mode.
  117. *
  118. * @param[in] xSecureContextHandle Context handle corresponding to the context
  119. * to be saved.
  120. */
  121. void SecureContext_SaveContext( SecureContextHandle_t xSecureContextHandle, void * pvTaskHandle );
  122. #endif /* __SECURE_CONTEXT_H__ */