init
This commit is contained in:
		
							
								
								
									
										58
									
								
								yaokon/Drivers/CMSIS/Core/Template/ARMv8-M/main_s.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										58
									
								
								yaokon/Drivers/CMSIS/Core/Template/ARMv8-M/main_s.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,58 @@
 | 
			
		||||
/******************************************************************************
 | 
			
		||||
 * @file     main_s.c
 | 
			
		||||
 * @brief    Code template for secure main function
 | 
			
		||||
 * @version  V1.1.1
 | 
			
		||||
 * @date     10. January 2018
 | 
			
		||||
 ******************************************************************************/
 | 
			
		||||
/*
 | 
			
		||||
 * Copyright (c) 2013-2018 Arm Limited. All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * SPDX-License-Identifier: Apache-2.0
 | 
			
		||||
 *
 | 
			
		||||
 * Licensed under the Apache License, Version 2.0 (the License); you may
 | 
			
		||||
 * not use this file except in compliance with the License.
 | 
			
		||||
 * You may obtain a copy of the License at
 | 
			
		||||
 *
 | 
			
		||||
 * www.apache.org/licenses/LICENSE-2.0
 | 
			
		||||
 *
 | 
			
		||||
 * Unless required by applicable law or agreed to in writing, software
 | 
			
		||||
 * distributed under the License is distributed on an AS IS BASIS, WITHOUT
 | 
			
		||||
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
			
		||||
 * See the License for the specific language governing permissions and
 | 
			
		||||
 * limitations under the License.
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
/* Use CMSE intrinsics */
 | 
			
		||||
#include <arm_cmse.h>
 | 
			
		||||
 
 | 
			
		||||
#include "RTE_Components.h"
 | 
			
		||||
#include CMSIS_device_header
 | 
			
		||||
 
 | 
			
		||||
/* TZ_START_NS: Start address of non-secure application */
 | 
			
		||||
#ifndef TZ_START_NS
 | 
			
		||||
#define TZ_START_NS (0x200000U)
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
/* typedef for non-secure callback functions */
 | 
			
		||||
typedef void (*funcptr_void) (void) __attribute__((cmse_nonsecure_call));
 | 
			
		||||
 
 | 
			
		||||
/* Secure main() */
 | 
			
		||||
int main(void) {
 | 
			
		||||
  funcptr_void NonSecure_ResetHandler;
 | 
			
		||||
 
 | 
			
		||||
  /* Add user setup code for secure part here*/
 | 
			
		||||
 
 | 
			
		||||
  /* Set non-secure main stack (MSP_NS) */
 | 
			
		||||
  __TZ_set_MSP_NS(*((uint32_t *)(TZ_START_NS)));
 | 
			
		||||
 
 | 
			
		||||
  /* Get non-secure reset handler */
 | 
			
		||||
  NonSecure_ResetHandler = (funcptr_void)(*((uint32_t *)((TZ_START_NS) + 4U)));
 | 
			
		||||
 
 | 
			
		||||
  /* Start non-secure state software application */
 | 
			
		||||
  NonSecure_ResetHandler();
 | 
			
		||||
 
 | 
			
		||||
  /* Non-secure software does not return, this code is not executed */
 | 
			
		||||
  while (1) {
 | 
			
		||||
    __NOP();
 | 
			
		||||
  }
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										200
									
								
								yaokon/Drivers/CMSIS/Core/Template/ARMv8-M/tz_context.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										200
									
								
								yaokon/Drivers/CMSIS/Core/Template/ARMv8-M/tz_context.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,200 @@
 | 
			
		||||
/******************************************************************************
 | 
			
		||||
 * @file     tz_context.c
 | 
			
		||||
 * @brief    Context Management for Armv8-M TrustZone - Sample implementation
 | 
			
		||||
 * @version  V1.1.1
 | 
			
		||||
 * @date     10. January 2018
 | 
			
		||||
 ******************************************************************************/
 | 
			
		||||
/*
 | 
			
		||||
 * Copyright (c) 2016-2018 Arm Limited. All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * SPDX-License-Identifier: Apache-2.0
 | 
			
		||||
 *
 | 
			
		||||
 * Licensed under the Apache License, Version 2.0 (the License); you may
 | 
			
		||||
 * not use this file except in compliance with the License.
 | 
			
		||||
 * You may obtain a copy of the License at
 | 
			
		||||
 *
 | 
			
		||||
 * www.apache.org/licenses/LICENSE-2.0
 | 
			
		||||
 *
 | 
			
		||||
 * Unless required by applicable law or agreed to in writing, software
 | 
			
		||||
 * distributed under the License is distributed on an AS IS BASIS, WITHOUT
 | 
			
		||||
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
			
		||||
 * See the License for the specific language governing permissions and
 | 
			
		||||
 * limitations under the License.
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#include "RTE_Components.h"
 | 
			
		||||
#include CMSIS_device_header
 | 
			
		||||
#include "tz_context.h"
 | 
			
		||||
 | 
			
		||||
/// Number of process slots (threads may call secure library code)
 | 
			
		||||
#ifndef TZ_PROCESS_STACK_SLOTS
 | 
			
		||||
#define TZ_PROCESS_STACK_SLOTS     8U
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
/// Stack size of the secure library code
 | 
			
		||||
#ifndef TZ_PROCESS_STACK_SIZE
 | 
			
		||||
#define TZ_PROCESS_STACK_SIZE      256U
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
typedef struct {
 | 
			
		||||
  uint32_t sp_top;      // stack space top
 | 
			
		||||
  uint32_t sp_limit;    // stack space limit
 | 
			
		||||
  uint32_t sp;          // current stack pointer
 | 
			
		||||
} stack_info_t;
 | 
			
		||||
 | 
			
		||||
static stack_info_t ProcessStackInfo  [TZ_PROCESS_STACK_SLOTS];
 | 
			
		||||
static uint64_t     ProcessStackMemory[TZ_PROCESS_STACK_SLOTS][TZ_PROCESS_STACK_SIZE/8U];
 | 
			
		||||
static uint32_t     ProcessStackFreeSlot = 0xFFFFFFFFU;
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
/// Initialize secure context memory system
 | 
			
		||||
/// \return execution status (1: success, 0: error)
 | 
			
		||||
__attribute__((cmse_nonsecure_entry))
 | 
			
		||||
uint32_t TZ_InitContextSystem_S (void) {
 | 
			
		||||
  uint32_t n;
 | 
			
		||||
 | 
			
		||||
  if (__get_IPSR() == 0U) {
 | 
			
		||||
    return 0U;  // Thread Mode
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  for (n = 0U; n < TZ_PROCESS_STACK_SLOTS; n++) {
 | 
			
		||||
    ProcessStackInfo[n].sp = 0U;
 | 
			
		||||
    ProcessStackInfo[n].sp_limit = (uint32_t)&ProcessStackMemory[n];
 | 
			
		||||
    ProcessStackInfo[n].sp_top   = (uint32_t)&ProcessStackMemory[n] + TZ_PROCESS_STACK_SIZE;
 | 
			
		||||
    *((uint32_t *)ProcessStackMemory[n]) = n + 1U;
 | 
			
		||||
  }
 | 
			
		||||
  *((uint32_t *)ProcessStackMemory[--n]) = 0xFFFFFFFFU;
 | 
			
		||||
 | 
			
		||||
  ProcessStackFreeSlot = 0U;
 | 
			
		||||
 | 
			
		||||
  // Default process stack pointer and stack limit
 | 
			
		||||
  __set_PSPLIM((uint32_t)ProcessStackMemory);
 | 
			
		||||
  __set_PSP   ((uint32_t)ProcessStackMemory);
 | 
			
		||||
 | 
			
		||||
  // Privileged Thread Mode using PSP
 | 
			
		||||
  __set_CONTROL(0x02U);
 | 
			
		||||
 | 
			
		||||
  return 1U;    // Success
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
/// Allocate context memory for calling secure software modules in TrustZone
 | 
			
		||||
/// \param[in]  module   identifies software modules called from non-secure mode
 | 
			
		||||
/// \return value != 0 id TrustZone memory slot identifier
 | 
			
		||||
/// \return value 0    no memory available or internal error
 | 
			
		||||
__attribute__((cmse_nonsecure_entry))
 | 
			
		||||
TZ_MemoryId_t TZ_AllocModuleContext_S (TZ_ModuleId_t module) {
 | 
			
		||||
  uint32_t slot;
 | 
			
		||||
 | 
			
		||||
  (void)module; // Ignore (fixed Stack size)
 | 
			
		||||
 | 
			
		||||
  if (__get_IPSR() == 0U) {
 | 
			
		||||
    return 0U;  // Thread Mode
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  if (ProcessStackFreeSlot == 0xFFFFFFFFU) {
 | 
			
		||||
    return 0U;  // No slot available
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  slot = ProcessStackFreeSlot;
 | 
			
		||||
  ProcessStackFreeSlot = *((uint32_t *)ProcessStackMemory[slot]);
 | 
			
		||||
 | 
			
		||||
  ProcessStackInfo[slot].sp = ProcessStackInfo[slot].sp_top;
 | 
			
		||||
 | 
			
		||||
  return (slot + 1U);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
/// Free context memory that was previously allocated with \ref TZ_AllocModuleContext_S
 | 
			
		||||
/// \param[in]  id  TrustZone memory slot identifier
 | 
			
		||||
/// \return execution status (1: success, 0: error)
 | 
			
		||||
__attribute__((cmse_nonsecure_entry))
 | 
			
		||||
uint32_t TZ_FreeModuleContext_S (TZ_MemoryId_t id) {
 | 
			
		||||
  uint32_t slot;
 | 
			
		||||
 | 
			
		||||
  if (__get_IPSR() == 0U) {
 | 
			
		||||
    return 0U;  // Thread Mode
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  if ((id == 0U) || (id > TZ_PROCESS_STACK_SLOTS)) {
 | 
			
		||||
    return 0U;  // Invalid ID
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  slot = id - 1U;
 | 
			
		||||
 | 
			
		||||
  if (ProcessStackInfo[slot].sp == 0U) {
 | 
			
		||||
    return 0U;  // Inactive slot
 | 
			
		||||
  }
 | 
			
		||||
  ProcessStackInfo[slot].sp = 0U;
 | 
			
		||||
 | 
			
		||||
  *((uint32_t *)ProcessStackMemory[slot]) = ProcessStackFreeSlot;
 | 
			
		||||
  ProcessStackFreeSlot = slot;
 | 
			
		||||
 | 
			
		||||
  return 1U;    // Success
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
/// Load secure context (called on RTOS thread context switch)
 | 
			
		||||
/// \param[in]  id  TrustZone memory slot identifier
 | 
			
		||||
/// \return execution status (1: success, 0: error)
 | 
			
		||||
__attribute__((cmse_nonsecure_entry))
 | 
			
		||||
uint32_t TZ_LoadContext_S (TZ_MemoryId_t id) {
 | 
			
		||||
  uint32_t slot;
 | 
			
		||||
 | 
			
		||||
  if ((__get_IPSR() == 0U) || ((__get_CONTROL() & 2U) == 0U)) {
 | 
			
		||||
    return 0U;  // Thread Mode or using Main Stack for threads
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  if ((id == 0U) || (id > TZ_PROCESS_STACK_SLOTS)) {
 | 
			
		||||
    return 0U;  // Invalid ID
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  slot = id - 1U;
 | 
			
		||||
 | 
			
		||||
  if (ProcessStackInfo[slot].sp == 0U) {
 | 
			
		||||
    return 0U;  // Inactive slot
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  // Setup process stack pointer and stack limit
 | 
			
		||||
  __set_PSPLIM(ProcessStackInfo[slot].sp_limit);
 | 
			
		||||
  __set_PSP   (ProcessStackInfo[slot].sp);
 | 
			
		||||
 | 
			
		||||
  return 1U;    // Success
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
/// Store secure context (called on RTOS thread context switch)
 | 
			
		||||
/// \param[in]  id  TrustZone memory slot identifier
 | 
			
		||||
/// \return execution status (1: success, 0: error)
 | 
			
		||||
__attribute__((cmse_nonsecure_entry))
 | 
			
		||||
uint32_t TZ_StoreContext_S (TZ_MemoryId_t id) {
 | 
			
		||||
  uint32_t slot;
 | 
			
		||||
  uint32_t sp;
 | 
			
		||||
 | 
			
		||||
  if ((__get_IPSR() == 0U) || ((__get_CONTROL() & 2U) == 0U)) {
 | 
			
		||||
    return 0U;  // Thread Mode or using Main Stack for threads
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  if ((id == 0U) || (id > TZ_PROCESS_STACK_SLOTS)) {
 | 
			
		||||
    return 0U;  // Invalid ID
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  slot = id - 1U;
 | 
			
		||||
 | 
			
		||||
  if (ProcessStackInfo[slot].sp == 0U) {
 | 
			
		||||
    return 0U;  // Inactive slot
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  sp = __get_PSP();
 | 
			
		||||
  if ((sp < ProcessStackInfo[slot].sp_limit) ||
 | 
			
		||||
      (sp > ProcessStackInfo[slot].sp_top)) {
 | 
			
		||||
    return 0U;  // SP out of range
 | 
			
		||||
  }
 | 
			
		||||
  ProcessStackInfo[slot].sp = sp;
 | 
			
		||||
 | 
			
		||||
  // Default process stack pointer and stack limit
 | 
			
		||||
  __set_PSPLIM((uint32_t)ProcessStackMemory);
 | 
			
		||||
  __set_PSP   ((uint32_t)ProcessStackMemory);
 | 
			
		||||
 | 
			
		||||
  return 1U;    // Success
 | 
			
		||||
}
 | 
			
		||||
		Reference in New Issue
	
	Block a user