/* * FreeRTOS Kernel V10.3.1 * Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Permission is hereby granted, free of charge, to any person obtaining a copy of * this software and associated documentation files (the "Software"), to deal in * the Software without restriction, including without limitation the rights to * use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of * the Software, and to permit persons to whom the Software is furnished to do so, * subject to the following conditions: * * The above copyright notice and this permission notice shall be included in all * copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS * FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR * COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER * IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. * * http://www.FreeRTOS.org * http://aws.amazon.com/freertos * * 1 tab == 4 spaces! */ /* Secure context includes. */ #include "secure_context.h" /* Secure heap includes. */ #include "secure_heap.h" /* Secure port macros. */ #include "secure_port_macros.h" /** * @brief CONTROL value for privileged tasks. * * Bit[0] - 0 --> Thread mode is privileged. * Bit[1] - 1 --> Thread mode uses PSP. */ #define securecontextCONTROL_VALUE_PRIVILEGED 0x02 /** * @brief CONTROL value for un-privileged tasks. * * Bit[0] - 1 --> Thread mode is un-privileged. * Bit[1] - 1 --> Thread mode uses PSP. */ #define securecontextCONTROL_VALUE_UNPRIVILEGED 0x03 /*-----------------------------------------------------------*/ /** * @brief Structure to represent secure context. * * @note Since stack grows down, pucStackStart is the highest address while * pucStackLimit is the first addess of the allocated memory. */ typedef struct SecureContext { uint8_t * pucCurrentStackPointer; /**< Current value of stack pointer (PSP). */ uint8_t * pucStackLimit; /**< Last location of the stack memory (PSPLIM). */ uint8_t * pucStackStart; /**< First location of the stack memory. */ } SecureContext_t; /*-----------------------------------------------------------*/ secureportNON_SECURE_CALLABLE void SecureContext_Init( void ) { uint32_t ulIPSR; /* Read the Interrupt Program Status Register (IPSR) value. */ secureportREAD_IPSR( ulIPSR ); /* Do nothing if the processor is running in the Thread Mode. IPSR is zero * when the processor is running in the Thread Mode. */ if( ulIPSR != 0 ) { /* No stack for thread mode until a task's context is loaded. */ secureportSET_PSPLIM( securecontextNO_STACK ); secureportSET_PSP( securecontextNO_STACK ); #if ( configENABLE_MPU == 1 ) { /* Configure thread mode to use PSP and to be unprivileged. */ secureportSET_CONTROL( securecontextCONTROL_VALUE_UNPRIVILEGED ); } #else /* configENABLE_MPU */ { /* Configure thread mode to use PSP and to be privileged.. */ secureportSET_CONTROL( securecontextCONTROL_VALUE_PRIVILEGED ); } #endif /* configENABLE_MPU */ } } /*-----------------------------------------------------------*/ #if ( configENABLE_MPU == 1 ) secureportNON_SECURE_CALLABLE SecureContextHandle_t SecureContext_AllocateContext( uint32_t ulSecureStackSize, uint32_t ulIsTaskPrivileged ) #else /* configENABLE_MPU */ secureportNON_SECURE_CALLABLE SecureContextHandle_t SecureContext_AllocateContext( uint32_t ulSecureStackSize ) #endif /* configENABLE_MPU */ { uint8_t * pucStackMemory = NULL; uint32_t ulIPSR; SecureContextHandle_t xSecureContextHandle = NULL; #if ( configENABLE_MPU == 1 ) uint32_t * pulCurrentStackPointer = NULL; #endif /* configENABLE_MPU */ /* Read the Interrupt Program Status Register (IPSR) value. */ secureportREAD_IPSR( ulIPSR ); /* Do nothing if the processor is running in the Thread Mode. IPSR is zero * when the processor is running in the Thread Mode. */ if( ulIPSR != 0 ) { /* Allocate the context structure. */ xSecureContextHandle = ( SecureContextHandle_t ) pvPortMalloc( sizeof( SecureContext_t ) ); if( xSecureContextHandle != NULL ) { /* Allocate the stack space. */ pucStackMemory = pvPortMalloc( ulSecureStackSize ); if( pucStackMemory != NULL ) { /* Since stack grows down, the starting point will be the last * location. Note that this location is next to the last * allocated byte because the hardware decrements the stack * pointer before writing i.e. if stack pointer is 0x2, a push * operation will decrement the stack pointer to 0x1 and then * write at 0x1. */ xSecureContextHandle->pucStackStart = pucStackMemory + ulSecureStackSize; /* The stack cannot go beyond this location. This value is * programmed in the PSPLIM register on context switch.*/ xSecureContextHandle->pucStackLimit = pucStackMemory; #if ( configENABLE_MPU == 1 ) { /* Store the correct CONTROL value for the task on the stack. * This value is programmed in the CONTROL register on * context switch. */ pulCurrentStackPointer = ( uint32_t * ) xSecureContextHandle->pucStackStart; pulCurrentStackPointer--; if( ulIsTaskPrivileged ) { *( pulCurrentStackPointer ) = securecontextCONTROL_VALUE_PRIVILEGED; } else { *( pulCurrentStackPointer ) = securecontextCONTROL_VALUE_UNPRIVILEGED; } /* Store the current stack pointer. This value is programmed in * the PSP register on context switch. */ xSecureContextHandle->pucCurrentStackPointer = ( uint8_t * ) pulCurrentStackPointer; } #else /* configENABLE_MPU */ { /* Current SP is set to the starting of the stack. This * value programmed in the PSP register on context switch. */ xSecureContextHandle->pucCurrentStackPointer = xSecureContextHandle->pucStackStart; } #endif /* configENABLE_MPU */ } else { /* Free the context to avoid memory leak and make sure to return * NULL to indicate failure. */ vPortFree( xSecureContextHandle ); xSecureContextHandle = NULL; } } } return xSecureContextHandle; } /*-----------------------------------------------------------*/ secureportNON_SECURE_CALLABLE void SecureContext_FreeContext( SecureContextHandle_t xSecureContextHandle ) { uint32_t ulIPSR; /* Read the Interrupt Program Status Register (IPSR) value. */ secureportREAD_IPSR( ulIPSR ); /* Do nothing if the processor is running in the Thread Mode. IPSR is zero * when the processor is running in the Thread Mode. */ if( ulIPSR != 0 ) { /* Ensure that valid parameters are passed. */ secureportASSERT( xSecureContextHandle != NULL ); /* Free the stack space. */ vPortFree( xSecureContextHandle->pucStackLimit ); /* Free the context itself. */ vPortFree( xSecureContextHandle ); } } /*-----------------------------------------------------------*/