first
This commit is contained in:
26
rt-thread/libcpu/arm/cortex-m33/SConscript
Normal file
26
rt-thread/libcpu/arm/cortex-m33/SConscript
Normal file
@@ -0,0 +1,26 @@
|
||||
# RT-Thread building script for component
|
||||
|
||||
from building import *
|
||||
|
||||
Import('rtconfig')
|
||||
|
||||
cwd = GetCurrentDir()
|
||||
src = Glob('*.c') + Glob('*.cpp')
|
||||
CPPPATH = [cwd]
|
||||
|
||||
if rtconfig.PLATFORM in ['armcc', 'armclang']:
|
||||
src += Glob('*_rvds.S')
|
||||
|
||||
if rtconfig.PLATFORM in ['gcc']:
|
||||
src += Glob('*_init.S')
|
||||
src += Glob('*_gcc.S')
|
||||
|
||||
if rtconfig.PLATFORM in ['iccarm']:
|
||||
src += Glob('*_iar.S')
|
||||
|
||||
if not GetDepend('RT_USING_MEM_PROTECTION') and not GetDepend('RT_USING_HW_STACK_GUARD'):
|
||||
SrcRemove(src, 'mpu.c')
|
||||
|
||||
group = DefineGroup('libcpu', src, depend = [''], CPPPATH = CPPPATH)
|
||||
|
||||
Return('group')
|
308
rt-thread/libcpu/arm/cortex-m33/context_gcc.S
Normal file
308
rt-thread/libcpu/arm/cortex-m33/context_gcc.S
Normal file
@@ -0,0 +1,308 @@
|
||||
/*
|
||||
* Copyright (c) 2006-2018, RT-Thread Development Team
|
||||
*
|
||||
* SPDX-License-Identifier: Apache-2.0
|
||||
*
|
||||
* Change Logs:
|
||||
* Date Author Notes
|
||||
* 2009-10-11 Bernard first version
|
||||
* 2012-01-01 aozima support context switch load/store FPU register.
|
||||
* 2013-06-18 aozima add restore MSP feature.
|
||||
* 2013-06-23 aozima support lazy stack optimized.
|
||||
* 2018-07-24 aozima enhancement hard fault exception handler.
|
||||
*/
|
||||
|
||||
/**
|
||||
* @addtogroup cortex-m4
|
||||
*/
|
||||
/*@{*/
|
||||
|
||||
#include <rtconfig.h>
|
||||
|
||||
.cpu cortex-m4
|
||||
.syntax unified
|
||||
.thumb
|
||||
.text
|
||||
|
||||
.equ SCB_VTOR, 0xE000ED08 /* Vector Table Offset Register */
|
||||
.equ NVIC_INT_CTRL, 0xE000ED04 /* interrupt control state register */
|
||||
.equ NVIC_SYSPRI2, 0xE000ED20 /* system priority register (2) */
|
||||
.equ NVIC_PENDSV_PRI, 0xFFFF0000 /* PendSV and SysTick priority value (lowest) */
|
||||
.equ NVIC_PENDSVSET, 0x10000000 /* value to trigger PendSV exception */
|
||||
|
||||
/*
|
||||
* rt_base_t rt_hw_interrupt_disable();
|
||||
*/
|
||||
.global rt_hw_interrupt_disable
|
||||
.type rt_hw_interrupt_disable, %function
|
||||
rt_hw_interrupt_disable:
|
||||
MRS r0, PRIMASK
|
||||
CPSID I
|
||||
BX LR
|
||||
|
||||
/*
|
||||
* void rt_hw_interrupt_enable(rt_base_t level);
|
||||
*/
|
||||
.global rt_hw_interrupt_enable
|
||||
.type rt_hw_interrupt_enable, %function
|
||||
rt_hw_interrupt_enable:
|
||||
MSR PRIMASK, r0
|
||||
BX LR
|
||||
|
||||
/*
|
||||
* void rt_hw_context_switch(rt_uint32 from, rt_uint32 to);
|
||||
* r0 --> from
|
||||
* r1 --> to
|
||||
*/
|
||||
.global rt_hw_context_switch_interrupt
|
||||
.type rt_hw_context_switch_interrupt, %function
|
||||
.global rt_hw_context_switch
|
||||
.type rt_hw_context_switch, %function
|
||||
|
||||
rt_hw_context_switch_interrupt:
|
||||
rt_hw_context_switch:
|
||||
/* set rt_thread_switch_interrupt_flag to 1 */
|
||||
LDR r2, =rt_thread_switch_interrupt_flag
|
||||
LDR r3, [r2]
|
||||
CMP r3, #1
|
||||
BEQ _reswitch
|
||||
MOV r3, #1
|
||||
STR r3, [r2]
|
||||
|
||||
LDR r2, =rt_interrupt_from_thread /* set rt_interrupt_from_thread */
|
||||
STR r0, [r2]
|
||||
|
||||
_reswitch:
|
||||
LDR r2, =rt_interrupt_to_thread /* set rt_interrupt_to_thread */
|
||||
STR r1, [r2]
|
||||
|
||||
LDR r0, =NVIC_INT_CTRL /* trigger the PendSV exception (causes context switch) */
|
||||
LDR r1, =NVIC_PENDSVSET
|
||||
STR r1, [r0]
|
||||
BX LR
|
||||
|
||||
/* r0 --> switch from thread stack
|
||||
* r1 --> switch to thread stack
|
||||
* psr, pc, lr, r12, r3, r2, r1, r0 are pushed into [from] stack
|
||||
*/
|
||||
.global PendSV_Handler
|
||||
.type PendSV_Handler, %function
|
||||
PendSV_Handler:
|
||||
/* disable interrupt to protect context switch */
|
||||
MRS r2, PRIMASK
|
||||
CPSID I
|
||||
|
||||
/* get rt_thread_switch_interrupt_flag */
|
||||
LDR r0, =rt_thread_switch_interrupt_flag /* r0 = &rt_thread_switch_interrupt_flag */
|
||||
LDR r1, [r0] /* r1 = *r1 */
|
||||
CMP r1, #0x00 /* compare r1 == 0x00 */
|
||||
BNE schedule
|
||||
MSR PRIMASK, r2 /* if r1 == 0x00, do msr PRIMASK, r2 */
|
||||
BX lr /* if r1 == 0x00, do bx lr */
|
||||
|
||||
schedule:
|
||||
PUSH {r2} /* store interrupt state */
|
||||
|
||||
/* clear rt_thread_switch_interrupt_flag to 0 */
|
||||
MOV r1, #0x00 /* r1 = 0x00 */
|
||||
STR r1, [r0] /* *r0 = r1 */
|
||||
|
||||
/* skip register save at the first time */
|
||||
LDR r0, =rt_interrupt_from_thread /* r0 = &rt_interrupt_from_thread */
|
||||
LDR r1, [r0] /* r1 = *r0 */
|
||||
CBZ r1, switch_to_thread /* if r1 == 0, goto switch_to_thread */
|
||||
|
||||
/* Whether TrustZone thread stack exists */
|
||||
LDR r1, =rt_trustzone_current_context /* r1 = &rt_secure_current_context */
|
||||
LDR r1, [r1] /* r1 = *r1 */
|
||||
CBZ r1, contex_ns_store /* if r1 == 0, goto contex_ns_store */
|
||||
|
||||
/*call TrustZone fun, Save TrustZone stack */
|
||||
STMFD sp!, {r0-r1, lr} /* push register */
|
||||
MOV r0, r1 /* r0 = rt_secure_current_context */
|
||||
BL rt_trustzone_context_store /* call TrustZone store fun */
|
||||
LDMFD sp!, {r0-r1, lr} /* pop register */
|
||||
|
||||
/* check break from TrustZone */
|
||||
MOV r2, lr /* r2 = lr */
|
||||
TST r2, #0x40 /* if EXC_RETURN[6] is 1, TrustZone stack was used */
|
||||
BEQ contex_ns_store /* if r2 & 0x40 == 0, goto contex_ns_store */
|
||||
|
||||
/* push PSPLIM CONTROL PSP LR current_context to stack */
|
||||
MRS r3, psplim /* r3 = psplim */
|
||||
MRS r4, control /* r4 = control */
|
||||
MRS r5, psp /* r5 = psp */
|
||||
STMFD r5!, {r1-r4} /* push to thread stack */
|
||||
|
||||
/* update from thread stack pointer */
|
||||
LDR r0, [r0] /* r0 = rt_thread_switch_interrupt_flag */
|
||||
STR r5, [r0] /* *r0 = r5 */
|
||||
b switch_to_thread /* goto switch_to_thread */
|
||||
|
||||
contex_ns_store:
|
||||
|
||||
MRS r1, psp /* get from thread stack pointer */
|
||||
|
||||
#if defined (__VFP_FP__) && !defined(__SOFTFP__)
|
||||
TST lr, #0x10 /* if(!EXC_RETURN[4]) */
|
||||
IT EQ
|
||||
VSTMDBEQ r1!, {d8 - d15} /* push FPU register s16~s31 */
|
||||
#endif
|
||||
|
||||
STMFD r1!, {r4 - r11} /* push r4 - r11 register */
|
||||
|
||||
LDR r2, =rt_trustzone_current_context /* r2 = &rt_secure_current_context */
|
||||
LDR r2, [r2] /* r2 = *r2 */
|
||||
MOV r3, lr /* r3 = lr */
|
||||
MRS r4, psplim /* r4 = psplim */
|
||||
MRS r5, control /* r5 = control */
|
||||
STMFD r1!, {r2-r5} /* push to thread stack */
|
||||
|
||||
LDR r0, [r0]
|
||||
STR r1, [r0] /* update from thread stack pointer */
|
||||
|
||||
switch_to_thread:
|
||||
LDR r1, =rt_interrupt_to_thread
|
||||
LDR r1, [r1]
|
||||
LDR r1, [r1] /* load thread stack pointer */
|
||||
|
||||
/* update current TrustZone context */
|
||||
LDMFD r1!, {r2-r5} /* pop thread stack */
|
||||
MSR psplim, r4 /* psplim = r4 */
|
||||
MSR control, r5 /* control = r5 */
|
||||
MOV lr, r3 /* lr = r3 */
|
||||
LDR r6, =rt_trustzone_current_context /* r6 = &rt_secure_current_context */
|
||||
STR r2, [r6] /* *r6 = r2 */
|
||||
MOV r0, r2 /* r0 = r2 */
|
||||
|
||||
/* Whether TrustZone thread stack exists */
|
||||
CBZ r0, contex_ns_load /* if r0 == 0, goto contex_ns_load */
|
||||
PUSH {r1, r3} /* push lr, thread_stack */
|
||||
BL rt_trustzone_context_load /* call TrustZone load fun */
|
||||
POP {r1, r3} /* pop lr, thread_stack */
|
||||
MOV lr, r3 /* lr = r1 */
|
||||
TST r3, #0x40 /* if EXC_RETURN[6] is 1, TrustZone stack was used */
|
||||
BEQ contex_ns_load /* if r1 & 0x40 == 0, goto contex_ns_load */
|
||||
B pendsv_exit
|
||||
|
||||
contex_ns_load:
|
||||
LDMFD r1!, {r4 - r11} /* pop r4 - r11 register */
|
||||
|
||||
#if defined (__VFP_FP__) && !defined(__SOFTFP__)
|
||||
TST lr, #0x10 /* if(!EXC_RETURN[4]) */
|
||||
IT EQ
|
||||
VLDMIAEQ r1!, {d8 - d15} /* pop FPU register s16~s31 */
|
||||
#endif
|
||||
|
||||
#if defined (RT_USING_MEM_PROTECTION)
|
||||
PUSH {r0-r3, r12, lr}
|
||||
BL rt_thread_self
|
||||
BL rt_hw_mpu_table_switch
|
||||
POP {r0-r3, r12, lr}
|
||||
#endif
|
||||
|
||||
pendsv_exit:
|
||||
MSR psp, r1 /* update stack pointer */
|
||||
/* restore interrupt */
|
||||
POP {r2}
|
||||
MSR PRIMASK, r2
|
||||
|
||||
BX lr
|
||||
|
||||
/*
|
||||
* void rt_hw_context_switch_to(rt_uint32 to);
|
||||
* r0 --> to
|
||||
*/
|
||||
.global rt_hw_context_switch_to
|
||||
.type rt_hw_context_switch_to, %function
|
||||
rt_hw_context_switch_to:
|
||||
LDR r1, =rt_interrupt_to_thread
|
||||
STR r0, [r1]
|
||||
|
||||
#if defined (__VFP_FP__) && !defined(__SOFTFP__)
|
||||
/* CLEAR CONTROL.FPCA */
|
||||
MRS r2, CONTROL /* read */
|
||||
BIC r2, #0x04 /* modify */
|
||||
MSR CONTROL, r2 /* write-back */
|
||||
#endif
|
||||
|
||||
/* set from thread to 0 */
|
||||
LDR r1, =rt_interrupt_from_thread
|
||||
MOV r0, #0x0
|
||||
STR r0, [r1]
|
||||
|
||||
/* set interrupt flag to 1 */
|
||||
LDR r1, =rt_thread_switch_interrupt_flag
|
||||
MOV r0, #1
|
||||
STR r0, [r1]
|
||||
|
||||
/* set the PendSV and SysTick exception priority */
|
||||
LDR r0, =NVIC_SYSPRI2
|
||||
LDR r1, =NVIC_PENDSV_PRI
|
||||
LDR.W r2, [r0,#0x00] /* read */
|
||||
ORR r1,r1,r2 /* modify */
|
||||
STR r1, [r0] /* write-back */
|
||||
|
||||
LDR r0, =NVIC_INT_CTRL /* trigger the PendSV exception (causes context switch) */
|
||||
LDR r1, =NVIC_PENDSVSET
|
||||
STR r1, [r0]
|
||||
|
||||
/* restore MSP */
|
||||
LDR r0, =SCB_VTOR
|
||||
LDR r0, [r0]
|
||||
LDR r0, [r0]
|
||||
NOP
|
||||
MSR msp, r0
|
||||
|
||||
/* enable interrupts at processor level */
|
||||
CPSIE F
|
||||
CPSIE I
|
||||
|
||||
/* ensure PendSV exception taken place before subsequent operation */
|
||||
DSB
|
||||
ISB
|
||||
|
||||
/* never reach here! */
|
||||
|
||||
/* compatible with old version */
|
||||
.global rt_hw_interrupt_thread_switch
|
||||
.type rt_hw_interrupt_thread_switch, %function
|
||||
rt_hw_interrupt_thread_switch:
|
||||
BX lr
|
||||
NOP
|
||||
|
||||
.global HardFault_Handler
|
||||
.type HardFault_Handler, %function
|
||||
HardFault_Handler:
|
||||
/* get current context */
|
||||
MRS r0, msp /* get fault context from handler. */
|
||||
TST lr, #0x04 /* if(!EXC_RETURN[2]) */
|
||||
BEQ get_sp_done
|
||||
MRS r0, psp /* get fault context from thread. */
|
||||
get_sp_done:
|
||||
|
||||
STMFD r0!, {r4 - r11} /* push r4 - r11 register */
|
||||
|
||||
LDR r2, =rt_trustzone_current_context /* r2 = &rt_secure_current_context */
|
||||
LDR r2, [r2] /* r2 = *r2 */
|
||||
MOV r3, lr /* r3 = lr */
|
||||
MRS r4, psplim /* r4 = psplim */
|
||||
MRS r5, control /* r5 = control */
|
||||
STMFD r0!, {r2-r5} /* push to thread stack */
|
||||
|
||||
STMFD r0!, {lr} /* push exec_return register */
|
||||
|
||||
TST lr, #0x04 /* if(!EXC_RETURN[2]) */
|
||||
BEQ update_msp
|
||||
MSR psp, r0 /* update stack pointer to PSP. */
|
||||
B update_done
|
||||
update_msp:
|
||||
MSR msp, r0 /* update stack pointer to MSP. */
|
||||
update_done:
|
||||
|
||||
PUSH {LR}
|
||||
BL rt_hw_hard_fault_exception
|
||||
POP {LR}
|
||||
|
||||
ORR lr, lr, #0x04
|
||||
BX lr
|
304
rt-thread/libcpu/arm/cortex-m33/context_iar.S
Normal file
304
rt-thread/libcpu/arm/cortex-m33/context_iar.S
Normal file
@@ -0,0 +1,304 @@
|
||||
;/*
|
||||
; * Copyright (c) 2006-2018, RT-Thread Development Team
|
||||
; *
|
||||
; * SPDX-License-Identifier: Apache-2.0
|
||||
; *
|
||||
; * Change Logs:
|
||||
; * Date Author Notes
|
||||
; * 2009-01-17 Bernard first version
|
||||
; * 2009-09-27 Bernard add protect when contex switch occurs
|
||||
; * 2012-01-01 aozima support context switch load/store FPU register.
|
||||
; * 2013-06-18 aozima add restore MSP feature.
|
||||
; * 2013-06-23 aozima support lazy stack optimized.
|
||||
; * 2018-07-24 aozima enhancement hard fault exception handler.
|
||||
; */
|
||||
|
||||
;/**
|
||||
; * @addtogroup cortex-m33
|
||||
; */
|
||||
;/*@{*/
|
||||
|
||||
SCB_VTOR EQU 0xE000ED08 ; Vector Table Offset Register
|
||||
NVIC_INT_CTRL EQU 0xE000ED04 ; interrupt control state register
|
||||
NVIC_SYSPRI2 EQU 0xE000ED20 ; system priority register (2)
|
||||
NVIC_PENDSV_PRI EQU 0xFFFF0000 ; PendSV and SysTick priority value (lowest)
|
||||
NVIC_PENDSVSET EQU 0x10000000 ; value to trigger PendSV exception
|
||||
|
||||
SECTION .text:CODE(2)
|
||||
THUMB
|
||||
REQUIRE8
|
||||
PRESERVE8
|
||||
|
||||
IMPORT rt_thread_switch_interrupt_flag
|
||||
IMPORT rt_interrupt_from_thread
|
||||
IMPORT rt_interrupt_to_thread
|
||||
IMPORT rt_trustzone_current_context
|
||||
IMPORT rt_trustzone_context_load
|
||||
IMPORT rt_trustzone_context_store
|
||||
|
||||
;/*
|
||||
; * rt_base_t rt_hw_interrupt_disable();
|
||||
; */
|
||||
EXPORT rt_hw_interrupt_disable
|
||||
rt_hw_interrupt_disable:
|
||||
MRS r0, PRIMASK
|
||||
CPSID I
|
||||
BX LR
|
||||
|
||||
;/*
|
||||
; * void rt_hw_interrupt_enable(rt_base_t level);
|
||||
; */
|
||||
EXPORT rt_hw_interrupt_enable
|
||||
rt_hw_interrupt_enable:
|
||||
MSR PRIMASK, r0
|
||||
BX LR
|
||||
|
||||
;/*
|
||||
; * void rt_hw_context_switch(rt_uint32 from, rt_uint32 to);
|
||||
; * r0 --> from
|
||||
; * r1 --> to
|
||||
; */
|
||||
EXPORT rt_hw_context_switch_interrupt
|
||||
EXPORT rt_hw_context_switch
|
||||
rt_hw_context_switch_interrupt:
|
||||
rt_hw_context_switch:
|
||||
; set rt_thread_switch_interrupt_flag to 1
|
||||
LDR r2, =rt_thread_switch_interrupt_flag
|
||||
LDR r3, [r2]
|
||||
CMP r3, #1
|
||||
BEQ _reswitch
|
||||
MOV r3, #1
|
||||
STR r3, [r2]
|
||||
|
||||
LDR r2, =rt_interrupt_from_thread ; set rt_interrupt_from_thread
|
||||
STR r0, [r2]
|
||||
|
||||
_reswitch
|
||||
LDR r2, =rt_interrupt_to_thread ; set rt_interrupt_to_thread
|
||||
STR r1, [r2]
|
||||
|
||||
LDR r0, =NVIC_INT_CTRL ; trigger the PendSV exception (causes context switch)
|
||||
LDR r1, =NVIC_PENDSVSET
|
||||
STR r1, [r0]
|
||||
BX LR
|
||||
|
||||
; r0 --> switch from thread stack
|
||||
; r1 --> switch to thread stack
|
||||
; psr, pc, lr, r12, r3, r2, r1, r0 are pushed into [from] stack
|
||||
EXPORT PendSV_Handler
|
||||
PendSV_Handler:
|
||||
|
||||
; disable interrupt to protect context switch
|
||||
MRS r2, PRIMASK
|
||||
CPSID I
|
||||
|
||||
; get rt_thread_switch_interrupt_flag
|
||||
LDR r0, =rt_thread_switch_interrupt_flag ; r0 = &rt_thread_switch_interrupt_flag
|
||||
LDR r1, [r0] ; r1 = *r1
|
||||
CMP r1, #0x00 ; compare r1 == 0x00
|
||||
BNE schedule
|
||||
MSR PRIMASK, r2 ; if r1 == 0x00, do msr PRIMASK, r2
|
||||
BX lr ; if r1 == 0x00, do bx lr
|
||||
|
||||
schedule
|
||||
PUSH {r2} ; store interrupt state
|
||||
|
||||
; clear rt_thread_switch_interrupt_flag to 0
|
||||
MOV r1, #0x00 ; r1 = 0x00
|
||||
STR r1, [r0] ; *r0 = r1
|
||||
|
||||
; skip register save at the first time
|
||||
LDR r0, =rt_interrupt_from_thread ; r0 = &rt_interrupt_from_thread
|
||||
LDR r1, [r0] ; r1 = *r0
|
||||
CBZ r1, switch_to_thread ; if r1 == 0, goto switch_to_thread
|
||||
|
||||
; Whether TrustZone thread stack exists
|
||||
LDR r1, =rt_trustzone_current_context ; r1 = &rt_secure_current_context
|
||||
LDR r1, [r1] ; r1 = *r1
|
||||
CBZ r1, contex_ns_store ; if r1 == 0, goto contex_ns_store
|
||||
|
||||
;call TrustZone fun, Save TrustZone stack
|
||||
STMFD sp!, {r0-r1, lr} ; push register
|
||||
MOV r0, r1 ; r0 = rt_secure_current_context
|
||||
BL rt_trustzone_context_store ; call TrustZone store fun
|
||||
LDMFD sp!, {r0-r1, lr} ; pop register
|
||||
|
||||
; check break from TrustZone
|
||||
MOV r2, lr ; r2 = lr
|
||||
TST r2, #0x40 ; if EXC_RETURN[6] is 1, TrustZone stack was used
|
||||
BEQ contex_ns_store ; if r2 & 0x40 == 0, goto contex_ns_store
|
||||
|
||||
; push PSPLIM CONTROL PSP LR current_context to stack
|
||||
MRS r3, psplim ; r3 = psplim
|
||||
MRS r4, control ; r4 = control
|
||||
MRS r5, psp ; r5 = psp
|
||||
STMFD r5!, {r1-r4} ; push to thread stack
|
||||
|
||||
; update from thread stack pointer
|
||||
LDR r0, [r0] ; r0 = rt_thread_switch_interrupt_flag
|
||||
STR r5, [r0] ; *r0 = r5
|
||||
b switch_to_thread ; goto switch_to_thread
|
||||
|
||||
contex_ns_store
|
||||
|
||||
MRS r1, psp ; get from thread stack pointer
|
||||
|
||||
#if defined ( __ARMVFP__ )
|
||||
TST lr, #0x10 ; if(!EXC_RETURN[4])
|
||||
BNE skip_push_fpu
|
||||
VSTMDB r1!, {d8 - d15} ; push FPU register s16~s31
|
||||
skip_push_fpu
|
||||
#endif
|
||||
|
||||
STMFD r1!, {r4 - r11} ; push r4 - r11 register
|
||||
|
||||
LDR r2, =rt_trustzone_current_context ; r2 = &rt_secure_current_context
|
||||
LDR r2, [r2] ; r2 = *r2
|
||||
MOV r3, lr ; r3 = lr
|
||||
MRS r4, psplim ; r4 = psplim
|
||||
MRS r5, control ; r5 = control
|
||||
STMFD r1!, {r2-r5} ; push to thread stack
|
||||
|
||||
LDR r0, [r0]
|
||||
STR r1, [r0] ; update from thread stack pointer
|
||||
|
||||
switch_to_thread
|
||||
|
||||
LDR r1, =rt_interrupt_to_thread
|
||||
LDR r1, [r1]
|
||||
LDR r1, [r1] ; load thread stack pointer
|
||||
|
||||
; update current TrustZone context
|
||||
LDMFD r1!, {r2-r5} ; pop thread stack
|
||||
MSR psplim, r4 ; psplim = r4
|
||||
MSR control, r5 ; control = r5
|
||||
MOV lr, r3 ; lr = r3
|
||||
LDR r6, =rt_trustzone_current_context ; r6 = &rt_secure_current_context
|
||||
STR r2, [r6] ; *r6 = r2
|
||||
MOV r0, r2 ; r0 = r2
|
||||
|
||||
; Whether TrustZone thread stack exists
|
||||
CBZ r0, contex_ns_load ; if r0 == 0, goto contex_ns_load
|
||||
PUSH {r1, r3} ; push lr, thread_stack
|
||||
BL rt_trustzone_context_load ; call TrustZone load fun
|
||||
POP {r1, r3} ; pop lr, thread_stack
|
||||
MOV lr, r3 ; lr = r1
|
||||
TST r3, #0x40 ; if EXC_RETURN[6] is 1, TrustZone stack was used
|
||||
BEQ contex_ns_load ; if r1 & 0x40 == 0, goto contex_ns_load
|
||||
B pendsv_exit
|
||||
|
||||
contex_ns_load
|
||||
LDMFD r1!, {r4 - r11} ; pop r4 - r11 register
|
||||
|
||||
#if defined ( __ARMVFP__ )
|
||||
TST lr, #0x10 ; if(!EXC_RETURN[4])
|
||||
BNE skip_pop_fpu
|
||||
VLDMIA r1!, {d8 - d15} ; pop FPU register s16~s31
|
||||
skip_pop_fpu
|
||||
#endif
|
||||
|
||||
pendsv_exit
|
||||
MSR psp, r1 ; update stack pointer
|
||||
; restore interrupt
|
||||
POP {r2}
|
||||
MSR PRIMASK, r2
|
||||
|
||||
BX lr
|
||||
|
||||
;/*
|
||||
; * void rt_hw_context_switch_to(rt_uint32 to);
|
||||
; * r0 --> to
|
||||
; */
|
||||
EXPORT rt_hw_context_switch_to
|
||||
rt_hw_context_switch_to:
|
||||
LDR r1, =rt_interrupt_to_thread
|
||||
STR r0, [r1]
|
||||
|
||||
#if defined ( __ARMVFP__ )
|
||||
; CLEAR CONTROL.FPCA
|
||||
MRS r2, CONTROL ; read
|
||||
BIC r2, r2, #0x04 ; modify
|
||||
MSR CONTROL, r2 ; write-back
|
||||
#endif
|
||||
|
||||
; set from thread to 0
|
||||
LDR r1, =rt_interrupt_from_thread
|
||||
MOV r0, #0x0
|
||||
STR r0, [r1]
|
||||
|
||||
; set interrupt flag to 1
|
||||
LDR r1, =rt_thread_switch_interrupt_flag
|
||||
MOV r0, #1
|
||||
STR r0, [r1]
|
||||
|
||||
; set the PendSV and SysTick exception priority
|
||||
LDR r0, =NVIC_SYSPRI2
|
||||
LDR r1, =NVIC_PENDSV_PRI
|
||||
LDR.W r2, [r0,#0x00] ; read
|
||||
ORR r1,r1,r2 ; modify
|
||||
STR r1, [r0] ; write-back
|
||||
|
||||
LDR r0, =NVIC_INT_CTRL ; trigger the PendSV exception (causes context switch)
|
||||
LDR r1, =NVIC_PENDSVSET
|
||||
STR r1, [r0]
|
||||
|
||||
; restore MSP
|
||||
LDR r0, =SCB_VTOR
|
||||
LDR r0, [r0]
|
||||
LDR r0, [r0]
|
||||
NOP
|
||||
MSR msp, r0
|
||||
|
||||
; enable interrupts at processor level
|
||||
CPSIE F
|
||||
CPSIE I
|
||||
|
||||
; ensure PendSV exception taken place before subsequent operation
|
||||
DSB
|
||||
ISB
|
||||
|
||||
; never reach here!
|
||||
|
||||
; compatible with old version
|
||||
EXPORT rt_hw_interrupt_thread_switch
|
||||
rt_hw_interrupt_thread_switch:
|
||||
BX lr
|
||||
|
||||
IMPORT rt_hw_hard_fault_exception
|
||||
EXPORT HardFault_Handler
|
||||
HardFault_Handler:
|
||||
|
||||
; get current context
|
||||
MRS r0, msp ; get fault context from handler.
|
||||
TST lr, #0x04 ; if(!EXC_RETURN[2])
|
||||
BEQ get_sp_done
|
||||
MRS r0, psp ; get fault context from thread.
|
||||
get_sp_done
|
||||
|
||||
STMFD r0!, {r4 - r11} ; push r4 - r11 register
|
||||
|
||||
LDR r2, =rt_trustzone_current_context ; r2 = &rt_secure_current_context
|
||||
LDR r2, [r2] ; r2 = *r2
|
||||
MOV r3, lr ; r3 = lr
|
||||
MRS r4, psplim ; r4 = psplim
|
||||
MRS r5, control ; r5 = control
|
||||
STMFD r0!, {r2-r5} ; push to thread stack
|
||||
|
||||
STMFD r0!, {lr} ; push exec_return register
|
||||
|
||||
TST lr, #0x04 ; if(!EXC_RETURN[2])
|
||||
BEQ update_msp
|
||||
MSR psp, r0 ; update stack pointer to PSP.
|
||||
B update_done
|
||||
update_msp
|
||||
MSR msp, r0 ; update stack pointer to MSP.
|
||||
update_done
|
||||
|
||||
PUSH {lr}
|
||||
BL rt_hw_hard_fault_exception
|
||||
POP {lr}
|
||||
|
||||
ORR lr, lr, #0x04
|
||||
BX lr
|
||||
|
||||
END
|
310
rt-thread/libcpu/arm/cortex-m33/context_rvds.S
Normal file
310
rt-thread/libcpu/arm/cortex-m33/context_rvds.S
Normal file
@@ -0,0 +1,310 @@
|
||||
;/*
|
||||
;* Copyright (c) 2006-2018, RT-Thread Development Team
|
||||
;*
|
||||
;* SPDX-License-Identifier: Apache-2.0
|
||||
;*
|
||||
; * Change Logs:
|
||||
; * Date Author Notes
|
||||
; * 2009-01-17 Bernard first version.
|
||||
; * 2012-01-01 aozima support context switch load/store FPU register.
|
||||
; * 2013-06-18 aozima add restore MSP feature.
|
||||
; * 2013-06-23 aozima support lazy stack optimized.
|
||||
; * 2018-07-24 aozima enhancement hard fault exception handler.
|
||||
; */
|
||||
|
||||
;/**
|
||||
; * @addtogroup cortex-m33
|
||||
; */
|
||||
;/*@{*/
|
||||
|
||||
SCB_VTOR EQU 0xE000ED08 ; Vector Table Offset Register
|
||||
NVIC_INT_CTRL EQU 0xE000ED04 ; interrupt control state register
|
||||
NVIC_SYSPRI2 EQU 0xE000ED20 ; system priority register (2)
|
||||
NVIC_PENDSV_PRI EQU 0xFFFF0000 ; PendSV and SysTick priority value (lowest)
|
||||
NVIC_PENDSVSET EQU 0x10000000 ; value to trigger PendSV exception
|
||||
|
||||
AREA |.text|, CODE, READONLY, ALIGN=2
|
||||
THUMB
|
||||
REQUIRE8
|
||||
PRESERVE8
|
||||
|
||||
IMPORT rt_thread_switch_interrupt_flag
|
||||
IMPORT rt_interrupt_from_thread
|
||||
IMPORT rt_interrupt_to_thread
|
||||
IMPORT rt_trustzone_current_context
|
||||
IMPORT rt_trustzone_context_load
|
||||
IMPORT rt_trustzone_context_store
|
||||
|
||||
;/*
|
||||
; * rt_base_t rt_hw_interrupt_disable();
|
||||
; */
|
||||
rt_hw_interrupt_disable PROC
|
||||
EXPORT rt_hw_interrupt_disable
|
||||
MRS r0, PRIMASK
|
||||
CPSID I
|
||||
BX LR
|
||||
ENDP
|
||||
|
||||
;/*
|
||||
; * void rt_hw_interrupt_enable(rt_base_t level);
|
||||
; */
|
||||
rt_hw_interrupt_enable PROC
|
||||
EXPORT rt_hw_interrupt_enable
|
||||
MSR PRIMASK, r0
|
||||
BX LR
|
||||
ENDP
|
||||
|
||||
;/*
|
||||
; * void rt_hw_context_switch(rt_uint32 from, rt_uint32 to);
|
||||
; * r0 --> from
|
||||
; * r1 --> to
|
||||
; */
|
||||
rt_hw_context_switch_interrupt
|
||||
EXPORT rt_hw_context_switch_interrupt
|
||||
rt_hw_context_switch PROC
|
||||
EXPORT rt_hw_context_switch
|
||||
|
||||
; set rt_thread_switch_interrupt_flag to 1
|
||||
LDR r2, =rt_thread_switch_interrupt_flag
|
||||
LDR r3, [r2]
|
||||
CMP r3, #1
|
||||
BEQ _reswitch
|
||||
MOV r3, #1
|
||||
STR r3, [r2]
|
||||
|
||||
LDR r2, =rt_interrupt_from_thread ; set rt_interrupt_from_thread
|
||||
STR r0, [r2]
|
||||
|
||||
_reswitch
|
||||
LDR r2, =rt_interrupt_to_thread ; set rt_interrupt_to_thread
|
||||
STR r1, [r2]
|
||||
|
||||
LDR r0, =NVIC_INT_CTRL ; trigger the PendSV exception (causes context switch)
|
||||
LDR r1, =NVIC_PENDSVSET
|
||||
STR r1, [r0]
|
||||
BX LR
|
||||
ENDP
|
||||
|
||||
; r0 --> switch from thread stack
|
||||
; r1 --> switch to thread stack
|
||||
; psr, pc, lr, r12, r3, r2, r1, r0 are pushed into [from] stack
|
||||
PendSV_Handler PROC
|
||||
EXPORT PendSV_Handler
|
||||
|
||||
; disable interrupt to protect context switch
|
||||
MRS r2, PRIMASK ; R2 = PRIMASK
|
||||
CPSID I ; disable all interrupt
|
||||
|
||||
; get rt_thread_switch_interrupt_flag
|
||||
LDR r0, =rt_thread_switch_interrupt_flag ; r0 = &rt_thread_switch_interrupt_flag
|
||||
LDR r1, [r0] ; r1 = *r1
|
||||
CMP r1, #0x00 ; compare r1 == 0x00
|
||||
BNE schedule
|
||||
MSR PRIMASK, r2 ; if r1 == 0x00, do msr PRIMASK, r2
|
||||
BX lr ; if r1 == 0x00, do bx lr
|
||||
|
||||
schedule
|
||||
PUSH {r2} ; store interrupt state
|
||||
|
||||
; clear rt_thread_switch_interrupt_flag to 0
|
||||
MOV r1, #0x00 ; r1 = 0x00
|
||||
STR r1, [r0] ; *r0 = r1
|
||||
|
||||
; skip register save at the first time
|
||||
LDR r0, =rt_interrupt_from_thread ; r0 = &rt_interrupt_from_thread
|
||||
LDR r1, [r0] ; r1 = *r0
|
||||
CBZ r1, switch_to_thread ; if r1 == 0, goto switch_to_thread
|
||||
|
||||
; Whether TrustZone thread stack exists
|
||||
LDR r1, =rt_trustzone_current_context ; r1 = &rt_secure_current_context
|
||||
LDR r1, [r1] ; r1 = *r1
|
||||
CBZ r1, contex_ns_store ; if r1 == 0, goto contex_ns_store
|
||||
|
||||
;call TrustZone fun, Save TrustZone stack
|
||||
STMFD sp!, {r0-r1, lr} ; push register
|
||||
MOV r0, r1 ; r0 = rt_secure_current_context
|
||||
BL rt_trustzone_context_store ; call TrustZone store fun
|
||||
LDMFD sp!, {r0-r1, lr} ; pop register
|
||||
|
||||
; check break from TrustZone
|
||||
MOV r2, lr ; r2 = lr
|
||||
TST r2, #0x40 ; if EXC_RETURN[6] is 1, TrustZone stack was used
|
||||
BEQ contex_ns_store ; if r2 & 0x40 == 0, goto contex_ns_store
|
||||
|
||||
; push PSPLIM CONTROL PSP LR current_context to stack
|
||||
MRS r3, psplim ; r3 = psplim
|
||||
MRS r4, control ; r4 = control
|
||||
MRS r5, psp ; r5 = psp
|
||||
STMFD r5!, {r1-r4} ; push to thread stack
|
||||
|
||||
; update from thread stack pointer
|
||||
LDR r0, [r0] ; r0 = rt_thread_switch_interrupt_flag
|
||||
STR r5, [r0] ; *r0 = r5
|
||||
b switch_to_thread ; goto switch_to_thread
|
||||
|
||||
contex_ns_store
|
||||
|
||||
MRS r1, psp ; get from thread stack pointer
|
||||
|
||||
#if defined (__VFP_FP__) && !defined(__SOFTFP__)
|
||||
TST lr, #0x10 ; if(!EXC_RETURN[4])
|
||||
VSTMFDEQ r1!, {d8 - d15} ; push FPU register s16~s31
|
||||
#endif
|
||||
|
||||
STMFD r1!, {r4 - r11} ; push r4 - r11 register
|
||||
|
||||
LDR r2, =rt_trustzone_current_context ; r2 = &rt_secure_current_context
|
||||
LDR r2, [r2] ; r2 = *r2
|
||||
MOV r3, lr ; r3 = lr
|
||||
MRS r4, psplim ; r4 = psplim
|
||||
MRS r5, control ; r5 = control
|
||||
STMFD r1!, {r2-r5} ; push to thread stack
|
||||
|
||||
LDR r0, [r0]
|
||||
STR r1, [r0] ; update from thread stack pointer
|
||||
|
||||
switch_to_thread
|
||||
LDR r1, =rt_interrupt_to_thread
|
||||
LDR r1, [r1]
|
||||
LDR r1, [r1] ; load thread stack pointer
|
||||
|
||||
; update current TrustZone context
|
||||
LDMFD r1!, {r2-r5} ; pop thread stack
|
||||
MSR psplim, r4 ; psplim = r4
|
||||
MSR control, r5 ; control = r5
|
||||
MOV lr, r3 ; lr = r3
|
||||
LDR r6, =rt_trustzone_current_context ; r6 = &rt_secure_current_context
|
||||
STR r2, [r6] ; *r6 = r2
|
||||
MOV r0, r2 ; r0 = r2
|
||||
|
||||
; Whether TrustZone thread stack exists
|
||||
CBZ r0, contex_ns_load ; if r0 == 0, goto contex_ns_load
|
||||
PUSH {r1, r3} ; push lr, thread_stack
|
||||
BL rt_trustzone_context_load ; call TrustZone load fun
|
||||
POP {r1, r3} ; pop lr, thread_stack
|
||||
MOV lr, r3 ; lr = r1
|
||||
TST r3, #0x40 ; if EXC_RETURN[6] is 1, TrustZone stack was used
|
||||
BEQ contex_ns_load ; if r1 & 0x40 == 0, goto contex_ns_load
|
||||
B pendsv_exit
|
||||
|
||||
contex_ns_load
|
||||
LDMFD r1!, {r4 - r11} ; pop r4 - r11 register
|
||||
|
||||
#if defined (__VFP_FP__) && !defined(__SOFTFP__)
|
||||
TST lr, #0x10 ; if(!EXC_RETURN[4])
|
||||
VLDMFDEQ r1!, {d8 - d15} ; pop FPU register s16~s31
|
||||
#endif
|
||||
|
||||
pendsv_exit
|
||||
MSR psp, r1 ; update stack pointer
|
||||
; restore interrupt
|
||||
POP {r2}
|
||||
MSR PRIMASK, r2
|
||||
|
||||
BX lr
|
||||
ENDP
|
||||
|
||||
;/*
|
||||
; * void rt_hw_context_switch_to(rt_uint32 to);
|
||||
; * r0 --> to
|
||||
; * this fucntion is used to perform the first thread switch
|
||||
; */
|
||||
rt_hw_context_switch_to PROC
|
||||
EXPORT rt_hw_context_switch_to
|
||||
; set to thread
|
||||
LDR r1, =rt_interrupt_to_thread
|
||||
STR r0, [r1]
|
||||
|
||||
#if defined (__VFP_FP__) && !defined(__SOFTFP__)
|
||||
; CLEAR CONTROL.FPCA
|
||||
MRS r2, CONTROL ; read
|
||||
BIC r2, #0x04 ; modify
|
||||
MSR CONTROL, r2 ; write-back
|
||||
#endif
|
||||
|
||||
; set from thread to 0
|
||||
LDR r1, =rt_interrupt_from_thread
|
||||
MOV r0, #0x0
|
||||
STR r0, [r1]
|
||||
|
||||
; set interrupt flag to 1
|
||||
LDR r1, =rt_thread_switch_interrupt_flag
|
||||
MOV r0, #1
|
||||
STR r0, [r1]
|
||||
|
||||
; set the PendSV and SysTick exception priority
|
||||
LDR r0, =NVIC_SYSPRI2
|
||||
LDR r1, =NVIC_PENDSV_PRI
|
||||
LDR.W r2, [r0,#0x00] ; read
|
||||
ORR r1,r1,r2 ; modify
|
||||
STR r1, [r0] ; write-back
|
||||
|
||||
; trigger the PendSV exception (causes context switch)
|
||||
LDR r0, =NVIC_INT_CTRL
|
||||
LDR r1, =NVIC_PENDSVSET
|
||||
STR r1, [r0]
|
||||
|
||||
; restore MSP
|
||||
LDR r0, =SCB_VTOR
|
||||
LDR r0, [r0]
|
||||
LDR r0, [r0]
|
||||
MSR msp, r0
|
||||
|
||||
; enable interrupts at processor level
|
||||
CPSIE F
|
||||
CPSIE I
|
||||
|
||||
; ensure PendSV exception taken place before subsequent operation
|
||||
DSB
|
||||
ISB
|
||||
|
||||
; never reach here!
|
||||
ENDP
|
||||
|
||||
; compatible with old version
|
||||
rt_hw_interrupt_thread_switch PROC
|
||||
EXPORT rt_hw_interrupt_thread_switch
|
||||
BX lr
|
||||
ENDP
|
||||
|
||||
IMPORT rt_hw_hard_fault_exception
|
||||
EXPORT HardFault_Handler
|
||||
HardFault_Handler PROC
|
||||
|
||||
; get current context
|
||||
MRS r0, msp ;get fault context from handler
|
||||
TST lr, #0x04 ;if(!EXC_RETURN[2])
|
||||
BEQ get_sp_done
|
||||
MRS r0, psp ;get fault context from thread
|
||||
get_sp_done
|
||||
|
||||
STMFD r0!, {r4 - r11} ; push r4 - r11 register
|
||||
|
||||
LDR r2, =rt_trustzone_current_context ; r2 = &rt_secure_current_context
|
||||
LDR r2, [r2] ; r2 = *r2
|
||||
MOV r3, lr ; r3 = lr
|
||||
MRS r4, psplim ; r4 = psplim
|
||||
MRS r5, control ; r5 = control
|
||||
STMFD r0!, {r2-r5} ; push to thread stack
|
||||
|
||||
STMFD r0!, {lr} ; push exec_return register
|
||||
|
||||
TST lr, #0x04 ; if(!EXC_RETURN[2])
|
||||
BEQ update_msp
|
||||
MSR psp, r0 ; update stack pointer to PSP
|
||||
B update_done
|
||||
update_msp
|
||||
MSR msp, r0 ; update stack pointer to MSP
|
||||
update_done
|
||||
|
||||
PUSH {lr}
|
||||
BL rt_hw_hard_fault_exception
|
||||
POP {lr}
|
||||
|
||||
ORR lr, lr, #0x04
|
||||
BX lr
|
||||
ENDP
|
||||
|
||||
ALIGN 4
|
||||
|
||||
END
|
578
rt-thread/libcpu/arm/cortex-m33/cpuport.c
Normal file
578
rt-thread/libcpu/arm/cortex-m33/cpuport.c
Normal file
@@ -0,0 +1,578 @@
|
||||
/*
|
||||
* Copyright (c) 2006-2021, RT-Thread Development Team
|
||||
*
|
||||
* SPDX-License-Identifier: Apache-2.0
|
||||
*
|
||||
* Change Logs:
|
||||
* Date Author Notes
|
||||
* 2011-10-21 Bernard the first version.
|
||||
* 2011-10-27 aozima update for cortex-M4 FPU.
|
||||
* 2011-12-31 aozima fixed stack align issues.
|
||||
* 2012-01-01 aozima support context switch load/store FPU register.
|
||||
* 2012-12-11 lgnq fixed the coding style.
|
||||
* 2012-12-23 aozima stack addr align to 8byte.
|
||||
* 2012-12-29 Bernard Add exception hook.
|
||||
* 2013-06-23 aozima support lazy stack optimized.
|
||||
* 2018-07-24 aozima enhancement hard fault exception handler.
|
||||
* 2019-07-03 yangjie add __rt_ffs() for armclang.
|
||||
*/
|
||||
|
||||
#include <rtthread.h>
|
||||
#ifdef RT_USING_HW_STACK_GUARD
|
||||
#include <mprotect.h>
|
||||
#endif
|
||||
|
||||
#if /* ARMCC */ ( (defined ( __CC_ARM ) && defined ( __TARGET_FPU_VFP )) \
|
||||
/* Clang */ || (defined ( __clang__ ) && defined ( __VFP_FP__ ) && !defined(__SOFTFP__)) \
|
||||
/* IAR */ || (defined ( __ICCARM__ ) && defined ( __ARMVFP__ )) \
|
||||
/* GNU */ || (defined ( __GNUC__ ) && defined ( __VFP_FP__ ) && !defined(__SOFTFP__)) )
|
||||
#define USE_FPU 1
|
||||
#else
|
||||
#define USE_FPU 0
|
||||
#endif
|
||||
|
||||
/* exception and interrupt handler table */
|
||||
rt_uint32_t rt_interrupt_from_thread;
|
||||
rt_uint32_t rt_interrupt_to_thread;
|
||||
rt_uint32_t rt_thread_switch_interrupt_flag;
|
||||
|
||||
/* exception hook */
|
||||
static rt_err_t (*rt_exception_hook)(void *context) = RT_NULL;
|
||||
|
||||
struct exception_stack_frame
|
||||
{
|
||||
rt_uint32_t r0;
|
||||
rt_uint32_t r1;
|
||||
rt_uint32_t r2;
|
||||
rt_uint32_t r3;
|
||||
rt_uint32_t r12;
|
||||
rt_uint32_t lr;
|
||||
rt_uint32_t pc;
|
||||
rt_uint32_t psr;
|
||||
};
|
||||
|
||||
struct stack_frame
|
||||
{
|
||||
rt_uint32_t tz;
|
||||
rt_uint32_t lr;
|
||||
rt_uint32_t psplim;
|
||||
rt_uint32_t control;
|
||||
|
||||
/* r4 ~ r11 register */
|
||||
rt_uint32_t r4;
|
||||
rt_uint32_t r5;
|
||||
rt_uint32_t r6;
|
||||
rt_uint32_t r7;
|
||||
rt_uint32_t r8;
|
||||
rt_uint32_t r9;
|
||||
rt_uint32_t r10;
|
||||
rt_uint32_t r11;
|
||||
|
||||
struct exception_stack_frame exception_stack_frame;
|
||||
};
|
||||
|
||||
struct exception_stack_frame_fpu
|
||||
{
|
||||
rt_uint32_t r0;
|
||||
rt_uint32_t r1;
|
||||
rt_uint32_t r2;
|
||||
rt_uint32_t r3;
|
||||
rt_uint32_t r12;
|
||||
rt_uint32_t lr;
|
||||
rt_uint32_t pc;
|
||||
rt_uint32_t psr;
|
||||
|
||||
#if USE_FPU
|
||||
/* FPU register */
|
||||
rt_uint32_t S0;
|
||||
rt_uint32_t S1;
|
||||
rt_uint32_t S2;
|
||||
rt_uint32_t S3;
|
||||
rt_uint32_t S4;
|
||||
rt_uint32_t S5;
|
||||
rt_uint32_t S6;
|
||||
rt_uint32_t S7;
|
||||
rt_uint32_t S8;
|
||||
rt_uint32_t S9;
|
||||
rt_uint32_t S10;
|
||||
rt_uint32_t S11;
|
||||
rt_uint32_t S12;
|
||||
rt_uint32_t S13;
|
||||
rt_uint32_t S14;
|
||||
rt_uint32_t S15;
|
||||
rt_uint32_t FPSCR;
|
||||
rt_uint32_t NO_NAME;
|
||||
#endif
|
||||
};
|
||||
|
||||
struct stack_frame_fpu
|
||||
{
|
||||
rt_uint32_t flag;
|
||||
|
||||
/* r4 ~ r11 register */
|
||||
rt_uint32_t r4;
|
||||
rt_uint32_t r5;
|
||||
rt_uint32_t r6;
|
||||
rt_uint32_t r7;
|
||||
rt_uint32_t r8;
|
||||
rt_uint32_t r9;
|
||||
rt_uint32_t r10;
|
||||
rt_uint32_t r11;
|
||||
|
||||
#if USE_FPU
|
||||
/* FPU register s16 ~ s31 */
|
||||
rt_uint32_t s16;
|
||||
rt_uint32_t s17;
|
||||
rt_uint32_t s18;
|
||||
rt_uint32_t s19;
|
||||
rt_uint32_t s20;
|
||||
rt_uint32_t s21;
|
||||
rt_uint32_t s22;
|
||||
rt_uint32_t s23;
|
||||
rt_uint32_t s24;
|
||||
rt_uint32_t s25;
|
||||
rt_uint32_t s26;
|
||||
rt_uint32_t s27;
|
||||
rt_uint32_t s28;
|
||||
rt_uint32_t s29;
|
||||
rt_uint32_t s30;
|
||||
rt_uint32_t s31;
|
||||
#endif
|
||||
|
||||
struct exception_stack_frame_fpu exception_stack_frame;
|
||||
};
|
||||
|
||||
rt_uint8_t *rt_hw_stack_init(void *tentry,
|
||||
void *parameter,
|
||||
rt_uint8_t *stack_addr,
|
||||
void *texit)
|
||||
{
|
||||
struct stack_frame *stack_frame;
|
||||
rt_uint8_t *stk;
|
||||
unsigned long i;
|
||||
|
||||
stk = stack_addr + sizeof(rt_uint32_t);
|
||||
stk = (rt_uint8_t *)RT_ALIGN_DOWN((rt_uint32_t)stk, 8);
|
||||
stk -= sizeof(struct stack_frame);
|
||||
|
||||
stack_frame = (struct stack_frame *)stk;
|
||||
|
||||
/* init all register */
|
||||
for (i = 0; i < sizeof(struct stack_frame) / sizeof(rt_uint32_t); i ++)
|
||||
{
|
||||
((rt_uint32_t *)stack_frame)[i] = 0xdeadbeef;
|
||||
}
|
||||
|
||||
stack_frame->exception_stack_frame.r0 = (unsigned long)parameter; /* r0 : argument */
|
||||
stack_frame->exception_stack_frame.r1 = 0; /* r1 */
|
||||
stack_frame->exception_stack_frame.r2 = 0; /* r2 */
|
||||
stack_frame->exception_stack_frame.r3 = 0; /* r3 */
|
||||
stack_frame->exception_stack_frame.r12 = 0; /* r12 */
|
||||
stack_frame->exception_stack_frame.lr = (unsigned long)texit; /* lr */
|
||||
stack_frame->exception_stack_frame.pc = (unsigned long)tentry; /* entry point, pc */
|
||||
stack_frame->exception_stack_frame.psr = 0x01000000L; /* PSR */
|
||||
|
||||
stack_frame->tz = 0x00; /* trustzone thread context */
|
||||
/*
|
||||
* Exception return behavior
|
||||
* +--------+---+---+------+-------+------+-------+---+----+
|
||||
* | PREFIX | - | S | DCRS | FType | Mode | SPSEL | - | ES |
|
||||
* +--------+---+---+------+-------+------+-------+---+----+
|
||||
* PREFIX [31:24] - Indicates that this is an EXC_RETURN value. This field reads as 0b11111111.
|
||||
* S [6] - Indicates whether registers have been pushed to a Secure or Non-secure stack.
|
||||
* 0: Non-secure stack used.
|
||||
* 1: Secure stack used.
|
||||
* DCRS [5] - Indicates whether the default stacking rules apply, or whether the callee registers are already on the stack.
|
||||
* 0: Stacking of the callee saved registers is skipped.
|
||||
* 1: Default rules for stacking the callee registers are followed.
|
||||
* FType [4] - In a PE with the Main and Floating-point Extensions:
|
||||
* 0: The PE allocated space on the stack for FP context.
|
||||
* 1: The PE did not allocate space on the stack for FP context.
|
||||
* In a PE without the Floating-point Extension, this bit is Reserved, RES1.
|
||||
* Mode [3] - Indicates the mode that was stacked from.
|
||||
* 0: Handler mode.
|
||||
* 1: Thread mode.
|
||||
* SPSEL [2] - Indicates which stack contains the exception stack frame.
|
||||
* 0: Main stack pointer.
|
||||
* 1: Process stack pointer.
|
||||
* ES [0] - Indicates the Security state the exception was taken to.
|
||||
* 0: Non-secure.
|
||||
* 1: Secure.
|
||||
*/
|
||||
#ifdef ARCH_ARM_CORTEX_SECURE
|
||||
stack_frame->lr = 0xfffffffdL;
|
||||
#else
|
||||
stack_frame->lr = 0xffffffbcL;
|
||||
#endif
|
||||
stack_frame->psplim = 0x00;
|
||||
/*
|
||||
* CONTROL register bit assignments
|
||||
* +---+------+------+-------+-------+
|
||||
* | - | SFPA | FPCA | SPSEL | nPRIV |
|
||||
* +---+------+------+-------+-------+
|
||||
* SFPA [3] - Indicates that the floating-point registers contain active state that belongs to the Secure state:
|
||||
* 0: The floating-point registers do not contain state that belongs to the Secure state.
|
||||
* 1: The floating-point registers contain state that belongs to the Secure state.
|
||||
* This bit is not banked between Security states and RAZ/WI from Non-secure state.
|
||||
* FPCA [2] - Indicates whether floating-point context is active:
|
||||
* 0: No floating-point context active.
|
||||
* 1: Floating-point context active.
|
||||
* This bit is used to determine whether to preserve floating-point state when processing an exception.
|
||||
* This bit is not banked between Security states.
|
||||
* SPSEL [1] - Defines the currently active stack pointer:
|
||||
* 0: MSP is the current stack pointer.
|
||||
* 1: PSP is the current stack pointer.
|
||||
* In Handler mode, this bit reads as zero and ignores writes. The CortexM33 core updates this bit automatically onexception return.
|
||||
* This bit is banked between Security states.
|
||||
* nPRIV [0] - Defines the Thread mode privilege level:
|
||||
* 0: Privileged.
|
||||
* 1: Unprivileged.
|
||||
* This bit is banked between Security states.
|
||||
*
|
||||
*/
|
||||
stack_frame->control = 0x00000000L;
|
||||
|
||||
/* return task's current stack address */
|
||||
return stk;
|
||||
}
|
||||
|
||||
#ifdef RT_USING_HW_STACK_GUARD
|
||||
void rt_hw_stack_guard_init(rt_thread_t thread)
|
||||
{
|
||||
rt_mem_region_t stack_top_region, stack_bottom_region;
|
||||
rt_ubase_t stack_bottom = (rt_ubase_t)thread->stack_addr;
|
||||
rt_ubase_t stack_top = (rt_ubase_t)((rt_uint8_t *)thread->stack_addr + thread->stack_size);
|
||||
rt_ubase_t stack_bottom_region_start = RT_ALIGN(stack_bottom, MPU_MIN_REGION_SIZE);
|
||||
rt_ubase_t stack_top_region_start = RT_ALIGN_DOWN(stack_top - MPU_MIN_REGION_SIZE, MPU_MIN_REGION_SIZE);
|
||||
stack_top_region.start = (void *)stack_top_region_start;
|
||||
stack_top_region.size = MPU_MIN_REGION_SIZE;
|
||||
stack_top_region.attr = RT_MEM_REGION_P_RO_U_NA;
|
||||
stack_bottom_region.start = (void *)stack_bottom_region_start;
|
||||
stack_bottom_region.size = MPU_MIN_REGION_SIZE;
|
||||
stack_bottom_region.attr = RT_MEM_REGION_P_RO_U_NA;
|
||||
rt_mprotect_add_region(thread, &stack_top_region);
|
||||
rt_mprotect_add_region(thread, &stack_bottom_region);
|
||||
thread->stack_buf = thread->stack_addr;
|
||||
thread->stack_addr = (void *)(stack_bottom_region_start + MPU_MIN_REGION_SIZE);
|
||||
thread->stack_size = (rt_uint32_t)(stack_top_region_start - (rt_ubase_t)thread->stack_addr);
|
||||
}
|
||||
#endif
|
||||
|
||||
/**
|
||||
* This function set the hook, which is invoked on fault exception handling.
|
||||
*
|
||||
* @param exception_handle the exception handling hook function.
|
||||
*/
|
||||
void rt_hw_exception_install(rt_err_t (*exception_handle)(void *context))
|
||||
{
|
||||
rt_exception_hook = exception_handle;
|
||||
}
|
||||
|
||||
#define SCB_CFSR (*(volatile const unsigned *)0xE000ED28) /* Configurable Fault Status Register */
|
||||
#define SCB_HFSR (*(volatile const unsigned *)0xE000ED2C) /* HardFault Status Register */
|
||||
#define SCB_MMAR (*(volatile const unsigned *)0xE000ED34) /* MemManage Fault Address register */
|
||||
#define SCB_BFAR (*(volatile const unsigned *)0xE000ED38) /* Bus Fault Address Register */
|
||||
#define SCB_AIRCR (*(volatile unsigned long *)0xE000ED0C) /* Reset control Address Register */
|
||||
#define SCB_RESET_VALUE 0x05FA0004 /* Reset value, write to SCB_AIRCR can reset cpu */
|
||||
|
||||
#define SCB_CFSR_MFSR (*(volatile const unsigned char*)0xE000ED28) /* Memory-management Fault Status Register */
|
||||
#define SCB_CFSR_BFSR (*(volatile const unsigned char*)0xE000ED29) /* Bus Fault Status Register */
|
||||
#define SCB_CFSR_UFSR (*(volatile const unsigned short*)0xE000ED2A) /* Usage Fault Status Register */
|
||||
|
||||
#ifdef RT_USING_FINSH
|
||||
static void usage_fault_track(void)
|
||||
{
|
||||
rt_kprintf("usage fault:\n");
|
||||
rt_kprintf("SCB_CFSR_UFSR:0x%02X ", SCB_CFSR_UFSR);
|
||||
|
||||
if(SCB_CFSR_UFSR & (1<<0))
|
||||
{
|
||||
/* [0]:UNDEFINSTR */
|
||||
rt_kprintf("UNDEFINSTR ");
|
||||
}
|
||||
|
||||
if(SCB_CFSR_UFSR & (1<<1))
|
||||
{
|
||||
/* [1]:INVSTATE */
|
||||
rt_kprintf("INVSTATE ");
|
||||
}
|
||||
|
||||
if(SCB_CFSR_UFSR & (1<<2))
|
||||
{
|
||||
/* [2]:INVPC */
|
||||
rt_kprintf("INVPC ");
|
||||
}
|
||||
|
||||
if(SCB_CFSR_UFSR & (1<<3))
|
||||
{
|
||||
/* [3]:NOCP */
|
||||
rt_kprintf("NOCP ");
|
||||
}
|
||||
|
||||
if(SCB_CFSR_UFSR & (1<<8))
|
||||
{
|
||||
/* [8]:UNALIGNED */
|
||||
rt_kprintf("UNALIGNED ");
|
||||
}
|
||||
|
||||
if(SCB_CFSR_UFSR & (1<<9))
|
||||
{
|
||||
/* [9]:DIVBYZERO */
|
||||
rt_kprintf("DIVBYZERO ");
|
||||
}
|
||||
|
||||
rt_kprintf("\n");
|
||||
}
|
||||
|
||||
static void bus_fault_track(void)
|
||||
{
|
||||
rt_kprintf("bus fault:\n");
|
||||
rt_kprintf("SCB_CFSR_BFSR:0x%02X ", SCB_CFSR_BFSR);
|
||||
|
||||
if(SCB_CFSR_BFSR & (1<<0))
|
||||
{
|
||||
/* [0]:IBUSERR */
|
||||
rt_kprintf("IBUSERR ");
|
||||
}
|
||||
|
||||
if(SCB_CFSR_BFSR & (1<<1))
|
||||
{
|
||||
/* [1]:PRECISERR */
|
||||
rt_kprintf("PRECISERR ");
|
||||
}
|
||||
|
||||
if(SCB_CFSR_BFSR & (1<<2))
|
||||
{
|
||||
/* [2]:IMPRECISERR */
|
||||
rt_kprintf("IMPRECISERR ");
|
||||
}
|
||||
|
||||
if(SCB_CFSR_BFSR & (1<<3))
|
||||
{
|
||||
/* [3]:UNSTKERR */
|
||||
rt_kprintf("UNSTKERR ");
|
||||
}
|
||||
|
||||
if(SCB_CFSR_BFSR & (1<<4))
|
||||
{
|
||||
/* [4]:STKERR */
|
||||
rt_kprintf("STKERR ");
|
||||
}
|
||||
|
||||
if(SCB_CFSR_BFSR & (1<<7))
|
||||
{
|
||||
rt_kprintf("SCB->BFAR:%08X\n", SCB_BFAR);
|
||||
}
|
||||
else
|
||||
{
|
||||
rt_kprintf("\n");
|
||||
}
|
||||
}
|
||||
|
||||
static void mem_manage_fault_track(void)
|
||||
{
|
||||
rt_kprintf("mem manage fault:\n");
|
||||
rt_kprintf("SCB_CFSR_MFSR:0x%02X ", SCB_CFSR_MFSR);
|
||||
|
||||
if(SCB_CFSR_MFSR & (1<<0))
|
||||
{
|
||||
/* [0]:IACCVIOL */
|
||||
rt_kprintf("IACCVIOL ");
|
||||
}
|
||||
|
||||
if(SCB_CFSR_MFSR & (1<<1))
|
||||
{
|
||||
/* [1]:DACCVIOL */
|
||||
rt_kprintf("DACCVIOL ");
|
||||
}
|
||||
|
||||
if(SCB_CFSR_MFSR & (1<<3))
|
||||
{
|
||||
/* [3]:MUNSTKERR */
|
||||
rt_kprintf("MUNSTKERR ");
|
||||
}
|
||||
|
||||
if(SCB_CFSR_MFSR & (1<<4))
|
||||
{
|
||||
/* [4]:MSTKERR */
|
||||
rt_kprintf("MSTKERR ");
|
||||
}
|
||||
|
||||
if(SCB_CFSR_MFSR & (1<<7))
|
||||
{
|
||||
/* [7]:MMARVALID */
|
||||
rt_kprintf("SCB->MMAR:%08X\n", SCB_MMAR);
|
||||
}
|
||||
else
|
||||
{
|
||||
rt_kprintf("\n");
|
||||
}
|
||||
}
|
||||
|
||||
static void hard_fault_track(void)
|
||||
{
|
||||
if(SCB_HFSR & (1UL<<1))
|
||||
{
|
||||
/* [1]:VECTBL, Indicates hard fault is caused by failed vector fetch. */
|
||||
rt_kprintf("failed vector fetch\n");
|
||||
}
|
||||
|
||||
if(SCB_HFSR & (1UL<<30))
|
||||
{
|
||||
/* [30]:FORCED, Indicates hard fault is taken because of bus fault,
|
||||
memory management fault, or usage fault. */
|
||||
if(SCB_CFSR_BFSR)
|
||||
{
|
||||
bus_fault_track();
|
||||
}
|
||||
|
||||
if(SCB_CFSR_MFSR)
|
||||
{
|
||||
mem_manage_fault_track();
|
||||
}
|
||||
|
||||
if(SCB_CFSR_UFSR)
|
||||
{
|
||||
usage_fault_track();
|
||||
}
|
||||
}
|
||||
|
||||
if(SCB_HFSR & (1UL<<31))
|
||||
{
|
||||
/* [31]:DEBUGEVT, Indicates hard fault is triggered by debug event. */
|
||||
rt_kprintf("debug event\n");
|
||||
}
|
||||
}
|
||||
#endif /* RT_USING_FINSH */
|
||||
|
||||
struct exception_info
|
||||
{
|
||||
rt_uint32_t exc_return;
|
||||
struct stack_frame stack_frame;
|
||||
};
|
||||
|
||||
void rt_hw_hard_fault_exception(struct exception_info *exception_info)
|
||||
{
|
||||
#if defined(RT_USING_FINSH) && defined(MSH_USING_BUILT_IN_COMMANDS)
|
||||
extern long list_thread(void);
|
||||
#endif
|
||||
struct exception_stack_frame *exception_stack = &exception_info->stack_frame.exception_stack_frame;
|
||||
struct stack_frame *context = &exception_info->stack_frame;
|
||||
|
||||
if (rt_exception_hook != RT_NULL)
|
||||
{
|
||||
rt_err_t result;
|
||||
|
||||
result = rt_exception_hook(exception_stack);
|
||||
if (result == RT_EOK) return;
|
||||
}
|
||||
|
||||
rt_kprintf("psr: 0x%08x\n", context->exception_stack_frame.psr);
|
||||
|
||||
rt_kprintf("r00: 0x%08x\n", context->exception_stack_frame.r0);
|
||||
rt_kprintf("r01: 0x%08x\n", context->exception_stack_frame.r1);
|
||||
rt_kprintf("r02: 0x%08x\n", context->exception_stack_frame.r2);
|
||||
rt_kprintf("r03: 0x%08x\n", context->exception_stack_frame.r3);
|
||||
rt_kprintf("r04: 0x%08x\n", context->r4);
|
||||
rt_kprintf("r05: 0x%08x\n", context->r5);
|
||||
rt_kprintf("r06: 0x%08x\n", context->r6);
|
||||
rt_kprintf("r07: 0x%08x\n", context->r7);
|
||||
rt_kprintf("r08: 0x%08x\n", context->r8);
|
||||
rt_kprintf("r09: 0x%08x\n", context->r9);
|
||||
rt_kprintf("r10: 0x%08x\n", context->r10);
|
||||
rt_kprintf("r11: 0x%08x\n", context->r11);
|
||||
rt_kprintf("r12: 0x%08x\n", context->exception_stack_frame.r12);
|
||||
rt_kprintf(" lr: 0x%08x\n", context->exception_stack_frame.lr);
|
||||
rt_kprintf(" pc: 0x%08x\n", context->exception_stack_frame.pc);
|
||||
|
||||
if (exception_info->exc_return & (1 << 2))
|
||||
{
|
||||
rt_kprintf("hard fault on thread: %s\r\n\r\n", rt_thread_self()->parent.name);
|
||||
|
||||
#if defined(RT_USING_FINSH) && defined(MSH_USING_BUILT_IN_COMMANDS)
|
||||
list_thread();
|
||||
#endif
|
||||
}
|
||||
else
|
||||
{
|
||||
rt_kprintf("hard fault on handler\r\n\r\n");
|
||||
}
|
||||
|
||||
if ( (exception_info->exc_return & 0x10) == 0)
|
||||
{
|
||||
rt_kprintf("FPU active!\r\n");
|
||||
}
|
||||
|
||||
#ifdef RT_USING_FINSH
|
||||
hard_fault_track();
|
||||
#endif /* RT_USING_FINSH */
|
||||
|
||||
while (1);
|
||||
}
|
||||
|
||||
/**
|
||||
* reset CPU
|
||||
*/
|
||||
void rt_hw_cpu_reset(void)
|
||||
{
|
||||
SCB_AIRCR = SCB_RESET_VALUE;
|
||||
}
|
||||
|
||||
#ifdef RT_USING_CPU_FFS
|
||||
/**
|
||||
* This function finds the first bit set (beginning with the least significant bit)
|
||||
* in value and return the index of that bit.
|
||||
*
|
||||
* Bits are numbered starting at 1 (the least significant bit). A return value of
|
||||
* zero from any of these functions means that the argument was zero.
|
||||
*
|
||||
* @return return the index of the first bit set. If value is 0, then this function
|
||||
* shall return 0.
|
||||
*/
|
||||
#if defined(__CC_ARM)
|
||||
__asm int __rt_ffs(int value)
|
||||
{
|
||||
CMP r0, #0x00
|
||||
BEQ exit
|
||||
|
||||
RBIT r0, r0
|
||||
CLZ r0, r0
|
||||
ADDS r0, r0, #0x01
|
||||
|
||||
exit
|
||||
BX lr
|
||||
}
|
||||
#elif defined(__clang__)
|
||||
int __rt_ffs(int value)
|
||||
{
|
||||
if (value == 0) return value;
|
||||
|
||||
__asm volatile(
|
||||
"RBIT r0, r0 \n"
|
||||
"CLZ r0, r0 \n"
|
||||
"ADDS r0, r0, #0x01 \n"
|
||||
|
||||
: "=r"(value)
|
||||
: "r"(value)
|
||||
);
|
||||
return value;
|
||||
}
|
||||
#elif defined(__IAR_SYSTEMS_ICC__)
|
||||
int __rt_ffs(int value)
|
||||
{
|
||||
if (value == 0) return value;
|
||||
|
||||
asm("RBIT %0, %1" : "=r"(value) : "r"(value));
|
||||
asm("CLZ %0, %1" : "=r"(value) : "r"(value));
|
||||
asm("ADDS %0, %1, #0x01" : "=r"(value) : "r"(value));
|
||||
|
||||
return value;
|
||||
}
|
||||
#elif defined(__GNUC__)
|
||||
int __rt_ffs(int value)
|
||||
{
|
||||
return __builtin_ffs(value);
|
||||
}
|
||||
#endif
|
||||
|
||||
#endif
|
355
rt-thread/libcpu/arm/cortex-m33/mpu.c
Normal file
355
rt-thread/libcpu/arm/cortex-m33/mpu.c
Normal file
@@ -0,0 +1,355 @@
|
||||
/*
|
||||
* Copyright (c) 2006-2023, RT-Thread Development Team
|
||||
*
|
||||
* SPDX-License-Identifier: Apache-2.0
|
||||
*
|
||||
* Change Logs:
|
||||
* Date Author Notes
|
||||
* 2023-09-25 tangzz98 the first version
|
||||
*/
|
||||
|
||||
#include <rtdef.h>
|
||||
#include <mprotect.h>
|
||||
|
||||
#define DBG_ENABLE
|
||||
#define DBG_SECTION_NAME "MEMORY PROTECTION"
|
||||
#define DBG_LEVEL DBG_ERROR
|
||||
#include <rtdbg.h>
|
||||
|
||||
#define MEM_REGION_TO_MPU_INDEX(thread, region) ((((rt_size_t)region - (rt_size_t)(thread->mem_regions)) / sizeof(rt_mem_region_t)) + NUM_STATIC_REGIONS)
|
||||
|
||||
extern rt_mem_region_t *rt_mprotect_find_free_region(rt_thread_t thread);
|
||||
extern rt_mem_region_t *rt_mprotect_find_region(rt_thread_t thread, rt_mem_region_t *region);
|
||||
|
||||
static rt_hw_mpu_exception_hook_t mem_manage_hook = RT_NULL;
|
||||
static rt_uint8_t mpu_mair[8U];
|
||||
|
||||
rt_weak rt_uint8_t rt_hw_mpu_region_default_attr(rt_mem_region_t *region)
|
||||
{
|
||||
static rt_uint8_t default_mem_attr[] =
|
||||
{
|
||||
ARM_MPU_ATTR(ARM_MPU_ATTR_MEMORY_(1U, 0U, 1U, 0U), ARM_MPU_ATTR_MEMORY_(1U, 0U, 1U, 0U)),
|
||||
ARM_MPU_ATTR(ARM_MPU_ATTR_MEMORY_(1U, 1U, 1U, 1U), ARM_MPU_ATTR_MEMORY_(1U, 1U, 1U, 1U)),
|
||||
ARM_MPU_ATTR_DEVICE_nGnRE,
|
||||
ARM_MPU_ATTR(ARM_MPU_ATTR_MEMORY_(1U, 1U, 1U, 1U), ARM_MPU_ATTR_MEMORY_(1U, 1U, 1U, 1U)),
|
||||
ARM_MPU_ATTR(ARM_MPU_ATTR_MEMORY_(1U, 0U, 1U, 0U), ARM_MPU_ATTR_MEMORY_(1U, 0U, 1U, 0U)),
|
||||
ARM_MPU_ATTR_DEVICE_nGnRE,
|
||||
ARM_MPU_ATTR_DEVICE_nGnRE
|
||||
};
|
||||
rt_uint8_t attr = 0U;
|
||||
if ((rt_uint32_t)region->start >= 0xE0000000U)
|
||||
{
|
||||
attr = ((rt_uint32_t)region->start >= 0xE0100000U) ? ARM_MPU_ATTR_DEVICE_nGnRE : ARM_MPU_ATTR_DEVICE_nGnRnE;
|
||||
}
|
||||
else
|
||||
{
|
||||
attr = default_mem_attr[((rt_uint32_t)region->start & ~0xFFFFFFFU) >> 29U];
|
||||
}
|
||||
return attr;
|
||||
}
|
||||
|
||||
static rt_err_t _mpu_rbar_rlar(rt_mem_region_t *region)
|
||||
{
|
||||
rt_uint32_t rlar = 0U;
|
||||
rt_uint8_t mair_attr;
|
||||
rt_uint8_t index;
|
||||
rt_uint8_t attr_indx = 0xFFU;
|
||||
region->attr.rbar = (rt_uint32_t)region->start | (region->attr.rbar & (~MPU_RBAR_BASE_Msk));
|
||||
rlar |= ((rt_uint32_t)region->start + region->size - 1U) & MPU_RLAR_LIMIT_Msk;
|
||||
if (region->attr.mair_attr == RT_ARM_DEFAULT_MAIR_ATTR)
|
||||
{
|
||||
mair_attr = rt_hw_mpu_region_default_attr(region);
|
||||
}
|
||||
else
|
||||
{
|
||||
mair_attr = (rt_uint8_t)region->attr.mair_attr;
|
||||
}
|
||||
for (index = 0U; index < 8U; index++)
|
||||
{
|
||||
if (mpu_mair[index] == RT_ARM_DEFAULT_MAIR_ATTR)
|
||||
{
|
||||
break;
|
||||
}
|
||||
else if (mpu_mair[index] == mair_attr)
|
||||
{
|
||||
attr_indx = index;
|
||||
break;
|
||||
}
|
||||
}
|
||||
/*
|
||||
* Current region's mair_attr does not match any existing region.
|
||||
* All entries in MPU_MAIR are configured.
|
||||
*/
|
||||
if (index == 8U)
|
||||
{
|
||||
return RT_ERROR;
|
||||
}
|
||||
/* An existing region has the same mair_attr. */
|
||||
if (attr_indx != 0xFFU)
|
||||
{
|
||||
rlar |= attr_indx & MPU_RLAR_AttrIndx_Msk;
|
||||
}
|
||||
/* Current region's mair_attr does not match any existing region. */
|
||||
else
|
||||
{
|
||||
ARM_MPU_SetMemAttr(index, mair_attr);
|
||||
rlar |= index & MPU_RLAR_AttrIndx_Msk;
|
||||
}
|
||||
rlar |= MPU_RLAR_EN_Msk;
|
||||
region->attr.rlar = rlar;
|
||||
|
||||
return RT_EOK;
|
||||
}
|
||||
|
||||
rt_bool_t rt_hw_mpu_region_valid(rt_mem_region_t *region)
|
||||
{
|
||||
if (region->size < MPU_MIN_REGION_SIZE)
|
||||
{
|
||||
LOG_E("Region size is too small");
|
||||
return RT_FALSE;
|
||||
}
|
||||
if (region->size & (~(MPU_MIN_REGION_SIZE - 1U)) != region->size)
|
||||
{
|
||||
LOG_E("Region size is not a multiple of 32 bytes");
|
||||
return RT_FALSE;
|
||||
}
|
||||
if ((rt_uint32_t)region->start & (MPU_MIN_REGION_SIZE - 1U) != 0U)
|
||||
{
|
||||
LOG_E("Region is not aligned by 32 bytes");
|
||||
return RT_FALSE;
|
||||
}
|
||||
return RT_TRUE;
|
||||
}
|
||||
|
||||
rt_err_t rt_hw_mpu_init(void)
|
||||
{
|
||||
extern rt_mem_region_t static_regions[NUM_STATIC_REGIONS];
|
||||
rt_uint8_t num_mpu_regions;
|
||||
rt_uint8_t num_dynamic_regions;
|
||||
rt_uint8_t index;
|
||||
num_mpu_regions = (rt_uint8_t)((MPU->TYPE & MPU_TYPE_DREGION_Msk) >> MPU_TYPE_DREGION_Pos);
|
||||
if (num_mpu_regions == 0U)
|
||||
{
|
||||
LOG_E("Hardware does not support MPU");
|
||||
return RT_ERROR;
|
||||
}
|
||||
if (num_mpu_regions != NUM_MEM_REGIONS)
|
||||
{
|
||||
LOG_E("Incorrect setting of NUM_MEM_REGIONS");
|
||||
LOG_E("NUM_MEM_REGIONS = %d, hardware support %d MPU regions", NUM_MEM_REGIONS, num_mpu_regions);
|
||||
return RT_ERROR;
|
||||
}
|
||||
|
||||
num_dynamic_regions = NUM_DYNAMIC_REGIONS + NUM_EXCLUSIVE_REGIONS;
|
||||
if (num_dynamic_regions + NUM_STATIC_REGIONS > num_mpu_regions)
|
||||
{
|
||||
LOG_E("Insufficient MPU regions: %d hardware MPU regions", num_mpu_regions);
|
||||
#ifdef RT_USING_HW_STACK_GUARD
|
||||
LOG_E("Current configuration requires %d static regions + %d configurable regions + %d exclusive regions + %d stack guard regions", NUM_STATIC_REGIONS, NUM_CONFIGURABLE_REGIONS, NUM_EXCLUSIVE_REGIONS, 1);
|
||||
#else
|
||||
LOG_E("Current configuration requires %d static regions + %d configurable regions + %d exclusive regions", NUM_STATIC_REGIONS, NUM_CONFIGURABLE_REGIONS, NUM_EXCLUSIVE_REGIONS);
|
||||
#endif
|
||||
return RT_ERROR;
|
||||
}
|
||||
for (index = 0U; index < 8U; index++)
|
||||
{
|
||||
mpu_mair[index] = RT_ARM_DEFAULT_MAIR_ATTR;
|
||||
}
|
||||
|
||||
ARM_MPU_Disable();
|
||||
for (index = 0U; index < NUM_STATIC_REGIONS; index++)
|
||||
{
|
||||
if (rt_hw_mpu_region_valid(&(static_regions[index])) == RT_FALSE)
|
||||
{
|
||||
return RT_ERROR;
|
||||
}
|
||||
if (_mpu_rbar_rlar(&(static_regions[index])) == RT_ERROR)
|
||||
{
|
||||
LOG_E("Number of different mair_attr configurations exceeds 8");
|
||||
return RT_ERROR;
|
||||
}
|
||||
ARM_MPU_SetRegion(index, static_regions[index].attr.rbar, static_regions[index].attr.rlar);
|
||||
}
|
||||
/* Enable background region. */
|
||||
ARM_MPU_Enable(MPU_CTRL_PRIVDEFENA_Msk);
|
||||
|
||||
return RT_EOK;
|
||||
}
|
||||
|
||||
rt_err_t rt_hw_mpu_add_region(rt_thread_t thread, rt_mem_region_t *region)
|
||||
{
|
||||
rt_uint8_t index;
|
||||
rt_mem_region_t *free_region;
|
||||
if (rt_hw_mpu_region_valid(region) == RT_FALSE)
|
||||
{
|
||||
return RT_ERROR;
|
||||
}
|
||||
rt_enter_critical();
|
||||
if (_mpu_rbar_rlar(region) == RT_ERROR)
|
||||
{
|
||||
rt_exit_critical();
|
||||
LOG_E("Number of different mair_attr configurations exceeds 8");
|
||||
return RT_ERROR;
|
||||
}
|
||||
if (thread == RT_NULL)
|
||||
{
|
||||
rt_exit_critical();
|
||||
return RT_EOK;
|
||||
}
|
||||
free_region = rt_mprotect_find_free_region(thread);
|
||||
if (free_region == RT_NULL)
|
||||
{
|
||||
rt_exit_critical();
|
||||
LOG_E("Insufficient regions");
|
||||
return RT_ERROR;
|
||||
}
|
||||
rt_memcpy(free_region, region, sizeof(rt_mem_region_t));
|
||||
if (thread == rt_thread_self())
|
||||
{
|
||||
index = MEM_REGION_TO_MPU_INDEX(thread, free_region);
|
||||
ARM_MPU_SetRegion(index, region->attr.rbar, region->attr.rlar);
|
||||
}
|
||||
rt_exit_critical();
|
||||
return RT_EOK;
|
||||
}
|
||||
|
||||
rt_err_t rt_hw_mpu_delete_region(rt_thread_t thread, rt_mem_region_t *region)
|
||||
{
|
||||
rt_uint8_t index;
|
||||
rt_enter_critical();
|
||||
rt_mem_region_t *found_region = rt_mprotect_find_region(thread, region);
|
||||
if (found_region == RT_NULL)
|
||||
{
|
||||
rt_exit_critical();
|
||||
LOG_E("Region not found");
|
||||
return RT_ERROR;
|
||||
}
|
||||
rt_memset(found_region, 0, sizeof(rt_mem_region_t));
|
||||
if (thread == rt_thread_self())
|
||||
{
|
||||
index = MEM_REGION_TO_MPU_INDEX(thread, found_region);
|
||||
ARM_MPU_ClrRegion(index);
|
||||
}
|
||||
rt_exit_critical();
|
||||
return RT_EOK;
|
||||
}
|
||||
|
||||
rt_err_t rt_hw_mpu_update_region(rt_thread_t thread, rt_mem_region_t *region)
|
||||
{
|
||||
rt_uint8_t index;
|
||||
if (rt_hw_mpu_region_valid(region) == RT_FALSE)
|
||||
{
|
||||
return RT_ERROR;
|
||||
}
|
||||
rt_enter_critical();
|
||||
if (_mpu_rbar_rlar(region) == RT_ERROR)
|
||||
{
|
||||
rt_exit_critical();
|
||||
LOG_E("Number of different mair_attr configurations exceeds 8");
|
||||
return RT_ERROR;
|
||||
}
|
||||
rt_mem_region_t *old_region = rt_mprotect_find_region(thread, region);
|
||||
if (old_region == RT_NULL)
|
||||
{
|
||||
rt_exit_critical();
|
||||
LOG_E("Region not found");
|
||||
return RT_ERROR;
|
||||
}
|
||||
rt_memcpy(old_region, region, sizeof(rt_mem_region_t));
|
||||
if (thread == rt_thread_self())
|
||||
{
|
||||
index = MEM_REGION_TO_MPU_INDEX(thread, old_region);
|
||||
ARM_MPU_SetRegion(index, region->attr.rbar, region->attr.rlar);
|
||||
}
|
||||
rt_exit_critical();
|
||||
return RT_EOK;
|
||||
}
|
||||
|
||||
rt_err_t rt_hw_mpu_exception_set_hook(rt_hw_mpu_exception_hook_t hook)
|
||||
{
|
||||
mem_manage_hook = hook;
|
||||
return RT_EOK;
|
||||
}
|
||||
|
||||
void rt_hw_mpu_table_switch(rt_thread_t thread)
|
||||
{
|
||||
extern rt_mem_exclusive_region_t exclusive_regions[NUM_EXCLUSIVE_REGIONS];
|
||||
rt_uint8_t i;
|
||||
rt_uint8_t index = NUM_STATIC_REGIONS;
|
||||
if (thread->mem_regions != RT_NULL)
|
||||
{
|
||||
for (i = 0U; i < NUM_DYNAMIC_REGIONS; i++)
|
||||
{
|
||||
if (((rt_mem_region_t *)thread->mem_regions)[i].size != 0U)
|
||||
{
|
||||
ARM_MPU_SetRegion(index, ((rt_mem_region_t *)thread->mem_regions)[i].attr.rbar, ((rt_mem_region_t *)thread->mem_regions)[i].attr.rlar);
|
||||
index += 1U;
|
||||
}
|
||||
}
|
||||
}
|
||||
for (i = 0U; i < NUM_EXCLUSIVE_REGIONS; i++)
|
||||
{
|
||||
if ((exclusive_regions[i].owner != RT_NULL) && (exclusive_regions[i].owner != thread))
|
||||
{
|
||||
ARM_MPU_SetRegion(index, exclusive_regions[i].region.attr.rbar, exclusive_regions[i].region.attr.rlar);
|
||||
index += 1U;
|
||||
}
|
||||
}
|
||||
for ( ; index < NUM_MEM_REGIONS; index++)
|
||||
{
|
||||
ARM_MPU_ClrRegion(index);
|
||||
}
|
||||
}
|
||||
|
||||
void MemManage_Handler(void)
|
||||
{
|
||||
extern rt_mem_region_t static_regions[NUM_STATIC_REGIONS];
|
||||
extern rt_mem_exclusive_region_t exclusive_regions[NUM_EXCLUSIVE_REGIONS];
|
||||
rt_mem_exception_info_t info;
|
||||
rt_int8_t i;
|
||||
rt_memset(&info, 0, sizeof(rt_mem_exception_info_t));
|
||||
info.thread = rt_thread_self();
|
||||
if (SCB->CFSR & SCB_CFSR_MMARVALID_Msk)
|
||||
{
|
||||
info.addr = (void *)(SCB->MMFAR);
|
||||
for (i = NUM_EXCLUSIVE_REGIONS - 1; i >= 0; i--)
|
||||
{
|
||||
if ((exclusive_regions[i].owner != RT_NULL) && ((exclusive_regions[i].owner != rt_thread_self())) && ADDR_IN_REGION(info.addr, (rt_mem_region_t *)&(exclusive_regions[i])))
|
||||
{
|
||||
rt_memcpy(&(info.region), &(exclusive_regions[i]), sizeof(rt_mem_region_t));
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (info.region.size == 0U)
|
||||
{
|
||||
if (info.thread->mem_regions != RT_NULL)
|
||||
{
|
||||
for (i = NUM_DYNAMIC_REGIONS - 1; i >= 0; i--)
|
||||
{
|
||||
if ((((rt_mem_region_t *)info.thread->mem_regions)[i].size != 0U) && ADDR_IN_REGION(info.addr, &(((rt_mem_region_t *)info.thread->mem_regions)[i])))
|
||||
{
|
||||
rt_memcpy(&(info.region), &(((rt_mem_region_t *)info.thread->mem_regions)[i]), sizeof(rt_mem_region_t));
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
if (info.region.size == 0U)
|
||||
{
|
||||
for (i = NUM_STATIC_REGIONS - 1; i >= 0; i--)
|
||||
{
|
||||
if (ADDR_IN_REGION(info.addr, &(static_regions[i])))
|
||||
{
|
||||
rt_memcpy(&(info.region), &(static_regions[i]), sizeof(rt_mem_region_t));
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
info.mmfsr = (SCB->CFSR & SCB_CFSR_MEMFAULTSR_Msk) >> SCB_CFSR_MEMFAULTSR_Pos;
|
||||
if (mem_manage_hook != RT_NULL)
|
||||
{
|
||||
mem_manage_hook(&info);
|
||||
}
|
||||
while (1);
|
||||
}
|
99
rt-thread/libcpu/arm/cortex-m33/mpu.h
Normal file
99
rt-thread/libcpu/arm/cortex-m33/mpu.h
Normal file
@@ -0,0 +1,99 @@
|
||||
/*
|
||||
* Copyright (c) 2006-2023, RT-Thread Development Team
|
||||
*
|
||||
* SPDX-License-Identifier: Apache-2.0
|
||||
*
|
||||
* Change Logs:
|
||||
* Date Author Notes
|
||||
* 2023-09-25 tangzz98 the first version
|
||||
*/
|
||||
|
||||
#ifndef __MPU_H__
|
||||
#define __MPU_H__
|
||||
|
||||
#ifdef RT_USING_MEM_PROTECTION
|
||||
|
||||
#include <board.h>
|
||||
#include <mprotect.h>
|
||||
|
||||
#define MPU_MIN_REGION_SIZE 32U
|
||||
|
||||
#define RT_ARM_DEFAULT_MAIR_ATTR (0xF0U)
|
||||
|
||||
/* MPU attributes for configuring data region permission*/
|
||||
/* Privileged Read Write, Unprivileged No Access */
|
||||
#define P_RW_U_NA_NON_SHAREABLE (((0x0 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x0 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk) | MPU_RBAR_XN_Msk)
|
||||
#define P_RW_U_NA_OUTER_SHAREABLE (((0x2 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x0 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk) | MPU_RBAR_XN_Msk)
|
||||
#define P_RW_U_NA_INNER_SHAREABLE (((0x3 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x0 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk) | MPU_RBAR_XN_Msk)
|
||||
/* Privileged Read Write, Unprivileged Read Write */
|
||||
#define P_RW_U_RW_NON_SHAREABLE (((0x0 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x1 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk) | MPU_RBAR_XN_Msk)
|
||||
#define P_RW_U_RW_OUTER_SHAREABLE (((0x2 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x1 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk) | MPU_RBAR_XN_Msk)
|
||||
#define P_RW_U_RW_INNER_SHAREABLE (((0x3 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x1 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk) | MPU_RBAR_XN_Msk)
|
||||
/* Privileged Read Only, Unprivileged No Access */
|
||||
#define P_RO_U_NA_NON_SHAREABLE (((0x0 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x2 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk) | MPU_RBAR_XN_Msk)
|
||||
#define P_RO_U_NA_OUTER_SHAREABLE (((0x2 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x2 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk) | MPU_RBAR_XN_Msk)
|
||||
#define P_RO_U_NA_INNER_SHAREABLE (((0x3 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x2 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk) | MPU_RBAR_XN_Msk)
|
||||
/* Privileged Read Only, Unprivileged Read Only */
|
||||
#define P_RO_U_RO_NON_SHAREABLE (((0x0 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x3 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk) | MPU_RBAR_XN_Msk)
|
||||
#define P_RO_U_RO_OUTER_SHAREABLE (((0x2 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x3 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk) | MPU_RBAR_XN_Msk)
|
||||
#define P_RO_U_RO_INNER_SHAREABLE (((0x3 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x3 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk) | MPU_RBAR_XN_Msk)
|
||||
|
||||
/* MPU attributes for configuring code region permission */
|
||||
#define P_RWX_U_NA_NON_SHAREABLE (((0x0 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x0 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk))
|
||||
#define P_RWX_U_NA_OUTER_SHAREABLE (((0x2 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x0 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk))
|
||||
#define P_RWX_U_NA_INNER_SHAREABLE (((0x3 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x0 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk))
|
||||
|
||||
/* Privileged Read Write Execute, Unprivileged Read Write Execute */
|
||||
#define P_RWX_U_RWX_NON_SHAREABLE (((0x0 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x1 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk))
|
||||
#define P_RWX_U_RWX_OUTER_SHAREABLE (((0x2 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x1 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk))
|
||||
#define P_RWX_U_RWX_INNER_SHAREABLE (((0x3 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x1 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk))
|
||||
|
||||
/* Privileged Read Execute, Unprivileged No Access */
|
||||
#define P_RX_U_NA_NON_SHAREABLE (((0x0 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x2 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk))
|
||||
#define P_RX_U_NA_OUTER_SHAREABLE (((0x2 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x2 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk))
|
||||
#define P_RX_U_NA_INNER_SHAREABLE (((0x3 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x2 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk))
|
||||
|
||||
/* Privileged Read Execute, Unprivileged Read Execute */
|
||||
#define P_RX_U_RX_NON_SHAREABLE (((0x0 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x3 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk))
|
||||
#define P_RX_U_RX_OUTER_SHAREABLE (((0x2 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x3 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk))
|
||||
#define P_RX_U_RX_INNER_SHAREABLE (((0x3 << MPU_RBAR_SH_Pos) & MPU_RBAR_SH_Msk) | ((0x3 << MPU_RBAR_AP_Pos) & MPU_RBAR_AP_Msk))
|
||||
|
||||
typedef struct
|
||||
{
|
||||
rt_thread_t thread; /* Thread that triggered exception */
|
||||
void *addr; /* Address of faulting memory access */
|
||||
rt_mem_region_t region; /* Configurations of the memory region containing the address */
|
||||
rt_uint8_t mmfsr; /* Content of MemManage Status Register */
|
||||
} rt_mem_exception_info_t;
|
||||
|
||||
typedef void (*rt_hw_mpu_exception_hook_t)(rt_mem_exception_info_t *);
|
||||
|
||||
#define RT_ARM_MEM_ATTR(perm, type) ((rt_mem_attr_t){ .rbar = (perm), .mair_attr = (type) })
|
||||
|
||||
/* Convenient macros for configuring data region attributes with default memory type */
|
||||
#define RT_MEM_REGION_P_RW_U_NA RT_ARM_MEM_ATTR(P_RW_U_NA_NON_SHAREABLE, RT_ARM_DEFAULT_MAIR_ATTR)
|
||||
#define RT_MEM_REGION_P_RW_U_RW RT_ARM_MEM_ATTR(P_RW_U_RW_NON_SHAREABLE, RT_ARM_DEFAULT_MAIR_ATTR)
|
||||
#define RT_MEM_REGION_P_RO_U_NA RT_ARM_MEM_ATTR(P_RO_U_NA_NON_SHAREABLE, RT_ARM_DEFAULT_MAIR_ATTR)
|
||||
#define RT_MEM_REGION_P_RO_U_RO RT_ARM_MEM_ATTR(P_RO_U_RO_NON_SHAREABLE, RT_ARM_DEFAULT_MAIR_ATTR)
|
||||
/* ARM-V8M does not support P_NA_U_NA.
|
||||
For compatibility with rt_mprotect_add_exclusive_region,
|
||||
define RT_MEM_REGION_P_NA_U_NA as the lowest privilege supported.
|
||||
*/
|
||||
#define RT_MEM_REGION_P_NA_U_NA RT_MEM_REGION_P_RO_U_NA
|
||||
|
||||
/* Convenient macros for configuring code region attributes with default memory type and shareability */
|
||||
#define RT_MEM_REGION_P_RWX_U_NA RT_ARM_MEM_ATTR(P_RWX_U_NA_NON_SHAREABLE, RT_ARM_DEFAULT_MAIR_ATTR)
|
||||
#define RT_MEM_REGION_P_RWX_U_RWX RT_ARM_MEM_ATTR(P_RWX_U_RWX_NON_SHAREABLE, RT_ARM_DEFAULT_MAIR_ATTR)
|
||||
#define RT_MEM_REGION_P_RX_U_NA RT_ARM_MEM_ATTR(P_RX_U_NA_NON_SHAREABLE, RT_ARM_DEFAULT_MAIR_ATTR)
|
||||
#define RT_MEM_REGION_P_RX_U_RX RT_ARM_MEM_ATTR(P_RX_U_RX_NON_SHAREABLE, RT_ARM_DEFAULT_MAIR_ATTR)
|
||||
|
||||
rt_bool_t rt_hw_mpu_region_valid(rt_mem_region_t *region);
|
||||
rt_err_t rt_hw_mpu_init(void);
|
||||
rt_err_t rt_hw_mpu_add_region(rt_thread_t thread, rt_mem_region_t *region);
|
||||
rt_err_t rt_hw_mpu_delete_region(rt_thread_t thread, rt_mem_region_t *region);
|
||||
rt_err_t rt_hw_mpu_update_region(rt_thread_t thread, rt_mem_region_t *region);
|
||||
rt_err_t rt_hw_mpu_exception_set_hook(rt_hw_mpu_exception_hook_t hook);
|
||||
|
||||
#endif /* RT_USING_MEM_PROTECTION */
|
||||
|
||||
#endif /* __MPU_H__ */
|
34
rt-thread/libcpu/arm/cortex-m33/mputype.h
Normal file
34
rt-thread/libcpu/arm/cortex-m33/mputype.h
Normal file
@@ -0,0 +1,34 @@
|
||||
/*
|
||||
* Copyright (c) 2006-2023, RT-Thread Development Team
|
||||
*
|
||||
* SPDX-License-Identifier: Apache-2.0
|
||||
*
|
||||
* Change Logs:
|
||||
* Date Author Notes
|
||||
* 2023-09-25 tangzz98 the first version
|
||||
*/
|
||||
|
||||
#ifndef __MPUTYPE_H__
|
||||
#define __MPUTYPE_H__
|
||||
|
||||
#ifdef RT_USING_MEM_PROTECTION
|
||||
|
||||
#ifdef RT_USING_HW_STACK_GUARD
|
||||
#define NUM_DYNAMIC_REGIONS (2 + NUM_CONFIGURABLE_REGIONS)
|
||||
#else
|
||||
#define NUM_DYNAMIC_REGIONS (NUM_CONFIGURABLE_REGIONS)
|
||||
#endif
|
||||
|
||||
typedef struct
|
||||
{
|
||||
rt_uint32_t rbar;
|
||||
union
|
||||
{
|
||||
rt_uint32_t mair_attr;
|
||||
rt_uint32_t rlar;
|
||||
};
|
||||
} rt_mem_attr_t;
|
||||
|
||||
#endif /* RT_USING_MEM_PROTECTION */
|
||||
|
||||
#endif /* __MPUTYPE_H__ */
|
59
rt-thread/libcpu/arm/cortex-m33/syscall_gcc.S
Normal file
59
rt-thread/libcpu/arm/cortex-m33/syscall_gcc.S
Normal file
@@ -0,0 +1,59 @@
|
||||
/*
|
||||
* Copyright (c) 2006-2022, RT-Thread Development Team
|
||||
*
|
||||
* SPDX-License-Identifier: Apache-2.0
|
||||
*
|
||||
* Change Logs:
|
||||
* Date Author Notes
|
||||
* 2019-10-25 tyx first version
|
||||
*/
|
||||
|
||||
.cpu cortex-m4
|
||||
.syntax unified
|
||||
.thumb
|
||||
.text
|
||||
|
||||
/*
|
||||
* int tzcall(int id, rt_ubase_t arg0, rt_ubase_t arg1, rt_ubase_t arg2);
|
||||
*/
|
||||
.global tzcall
|
||||
.type tzcall, %function
|
||||
tzcall:
|
||||
SVC 1 /* call SVC 1 */
|
||||
BX LR
|
||||
|
||||
tzcall_entry:
|
||||
PUSH {R1, R4, LR}
|
||||
MOV R4, R1 /* copy thread SP to R4 */
|
||||
LDMFD R4!, {r0 - r3} /* pop user stack, get input arg0, arg1, arg2 */
|
||||
STMFD R4!, {r0 - r3} /* push stack, user stack recovery */
|
||||
BL rt_secure_svc_handle /* call fun */
|
||||
POP {R1, R4, LR}
|
||||
STR R0, [R1] /* update return value */
|
||||
BX LR /* return to thread */
|
||||
|
||||
syscall_entry:
|
||||
BX LR /* return to user app */
|
||||
|
||||
.global SVC_Handler
|
||||
.type SVC_Handler, %function
|
||||
SVC_Handler:
|
||||
|
||||
/* get SP, save to R1 */
|
||||
MRS R1, MSP /* get fault context from handler. */
|
||||
TST LR, #0x04 /* if(!EXC_RETURN[2]) */
|
||||
BEQ get_sp_done
|
||||
MRS R1, PSP /* get fault context from thread. */
|
||||
get_sp_done:
|
||||
|
||||
/* get svc index */
|
||||
LDR R0, [R1, #24]
|
||||
LDRB R0, [R0, #-2]
|
||||
|
||||
/* if svc == 0, do system call */
|
||||
CMP R0, #0x0
|
||||
BEQ syscall_entry
|
||||
|
||||
/* if svc == 1, do TrustZone call */
|
||||
CMP R0, #0x1
|
||||
BEQ tzcall_entry
|
67
rt-thread/libcpu/arm/cortex-m33/syscall_iar.S
Normal file
67
rt-thread/libcpu/arm/cortex-m33/syscall_iar.S
Normal file
@@ -0,0 +1,67 @@
|
||||
;/*
|
||||
; * Copyright (c) 2006-2022, RT-Thread Development Team
|
||||
; *
|
||||
; * SPDX-License-Identifier: Apache-2.0
|
||||
; *
|
||||
; * Change Logs:
|
||||
; * Date Author Notes
|
||||
; * 2019-10-25 tyx first version
|
||||
; * 2021-03-26 lxf modify bad instruction
|
||||
; */
|
||||
|
||||
;/*
|
||||
; * @addtogroup cortex-m33
|
||||
; */
|
||||
|
||||
|
||||
SECTION .text:CODE(2)
|
||||
THUMB
|
||||
REQUIRE8
|
||||
PRESERVE8
|
||||
|
||||
IMPORT rt_secure_svc_handle
|
||||
|
||||
;/*
|
||||
; * int tzcall(int id, rt_ubase_t arg0, rt_ubase_t arg1, rt_ubase_t arg2);
|
||||
; */
|
||||
EXPORT tzcall
|
||||
tzcall:
|
||||
SVC 1 ;/* call SVC 1 */
|
||||
BX LR
|
||||
|
||||
tzcall_entry:
|
||||
PUSH {R1, R4, LR}
|
||||
MOV R4, R1 ;/* copy thread SP to R4 */
|
||||
LDMFD R4!, {r0 - r3} ;/* pop user stack, get input arg0, arg1, arg2 */
|
||||
STMFD R4!, {r0 - r3} ;/* push stack, user stack recovery */
|
||||
BL rt_secure_svc_handle ;/* call fun */
|
||||
POP {R1, R4, LR}
|
||||
STR R0, [R1] ;/* update return value */
|
||||
BX LR ;/* return to thread */
|
||||
|
||||
syscall_entry:
|
||||
BX LR ;/* return to user app */
|
||||
|
||||
EXPORT SVC_Handler
|
||||
SVC_Handler:
|
||||
|
||||
;/* get SP, save to R1 */
|
||||
MRS R1, MSP ;/* get fault context from handler. */
|
||||
TST LR, #0x04 ;/* if(!EXC_RETURN[2]) */
|
||||
BEQ get_sp_done
|
||||
MRS R1, PSP ;/* get fault context from thread. */
|
||||
get_sp_done:
|
||||
|
||||
;/* get svc index */
|
||||
LDR R0, [R1, #24]
|
||||
LDRB R0, [R0, #-2]
|
||||
|
||||
;/* if svc == 0, do system call */
|
||||
CMP R0, #0x0
|
||||
BEQ syscall_entry
|
||||
|
||||
;/* if svc == 1, do TrustZone call */
|
||||
CMP R0, #0x1
|
||||
BEQ tzcall_entry
|
||||
|
||||
END
|
74
rt-thread/libcpu/arm/cortex-m33/syscall_rvds.S
Normal file
74
rt-thread/libcpu/arm/cortex-m33/syscall_rvds.S
Normal file
@@ -0,0 +1,74 @@
|
||||
;/*
|
||||
; * Copyright (c) 2006-2022, RT-Thread Development Team
|
||||
; *
|
||||
; * SPDX-License-Identifier: Apache-2.0
|
||||
; *
|
||||
; * Change Logs:
|
||||
; * Date Author Notes
|
||||
; * 2019-10-25 tyx first version
|
||||
; */
|
||||
|
||||
AREA |.text|, CODE, READONLY, ALIGN=2
|
||||
THUMB
|
||||
REQUIRE8
|
||||
PRESERVE8
|
||||
|
||||
IMPORT rt_secure_svc_handle
|
||||
|
||||
;/*
|
||||
; * int tzcall(int id, rt_ubase_t arg0, rt_ubase_t arg1, rt_ubase_t arg2);
|
||||
; */
|
||||
tzcall PROC
|
||||
EXPORT tzcall
|
||||
SVC 1 ;call SVC 1
|
||||
BX LR
|
||||
|
||||
ENDP
|
||||
|
||||
tzcall_entry PROC
|
||||
PUSH {R1, R4, LR}
|
||||
MOV R4, R1 ; copy thread SP to R4
|
||||
LDMFD R4!, {r0 - r3} ; pop user stack, get input arg0, arg1, arg2
|
||||
STMFD R4!, {r0 - r3} ; push stack, user stack recovery
|
||||
BL rt_secure_svc_handle ; call fun
|
||||
POP {R1, R4, LR}
|
||||
STR R0, [R1] ; update return value
|
||||
BX LR ; return to thread
|
||||
|
||||
ENDP
|
||||
|
||||
syscall_entry PROC
|
||||
BX LR ; return to user app
|
||||
|
||||
ENDP
|
||||
|
||||
;/*
|
||||
; * void SVC_Handler(void);
|
||||
; */
|
||||
SVC_Handler PROC
|
||||
EXPORT SVC_Handler
|
||||
|
||||
; get SP, save to R1
|
||||
MRS R1, MSP ;get fault context from handler
|
||||
TST LR, #0x04 ;if(!EXC_RETURN[2])
|
||||
BEQ get_sp_done
|
||||
MRS R1, PSP ;get fault context from thread
|
||||
get_sp_done
|
||||
|
||||
; get svc index
|
||||
LDR R0, [R1, #24]
|
||||
LDRB R0, [R0, #-2]
|
||||
|
||||
;if svc == 0, do system call
|
||||
CMP R0, #0x0
|
||||
BEQ syscall_entry
|
||||
|
||||
;if svc == 1, do TrustZone call
|
||||
CMP R0, #0x1
|
||||
BEQ tzcall_entry
|
||||
|
||||
ENDP
|
||||
|
||||
ALIGN
|
||||
|
||||
END
|
98
rt-thread/libcpu/arm/cortex-m33/trustzone.c
Normal file
98
rt-thread/libcpu/arm/cortex-m33/trustzone.c
Normal file
@@ -0,0 +1,98 @@
|
||||
/*
|
||||
* Copyright (c) 2006-2021, RT-Thread Development Team
|
||||
*
|
||||
* SPDX-License-Identifier: Apache-2.0
|
||||
*
|
||||
* Change Logs:
|
||||
* Date Author Notes
|
||||
* 2019-10-28 tyx the first version.
|
||||
*/
|
||||
|
||||
#include <rtthread.h>
|
||||
|
||||
#ifdef ARM_CM33_ENABLE_TRUSTZONE
|
||||
extern void TZ_InitContextSystem_S(void);
|
||||
extern rt_uint32_t TZ_AllocModuleContext_S (rt_uint32_t module);
|
||||
extern rt_uint32_t TZ_FreeModuleContext_S(rt_uint32_t id);
|
||||
extern rt_uint32_t TZ_LoadContext_S(rt_uint32_t id);
|
||||
extern rt_uint32_t TZ_StoreContext_S(rt_uint32_t id);
|
||||
#else
|
||||
void TZ_InitContextSystem_S(void){}
|
||||
rt_uint32_t TZ_AllocModuleContext_S (rt_uint32_t module){return 0;}
|
||||
rt_uint32_t TZ_FreeModuleContext_S(rt_uint32_t id) {return 0;}
|
||||
rt_uint32_t TZ_LoadContext_S(rt_uint32_t id){return 0;};
|
||||
rt_uint32_t TZ_StoreContext_S(rt_uint32_t id){return 0;};
|
||||
#endif
|
||||
extern int tzcall(int id, rt_ubase_t arg0, rt_ubase_t arg1, rt_ubase_t arg2);
|
||||
|
||||
#define TZ_INIT_CONTEXT_ID (0x1001)
|
||||
#define TZ_ALLOC_CONTEXT_ID (0x1002)
|
||||
#define TZ_FREE_CONTEXT_ID (0x1003)
|
||||
|
||||
rt_ubase_t rt_trustzone_current_context;
|
||||
|
||||
void rt_trustzone_init(void)
|
||||
{
|
||||
static rt_uint8_t _init;
|
||||
|
||||
if (_init)
|
||||
return;
|
||||
tzcall(TZ_INIT_CONTEXT_ID, 0, 0, 0);
|
||||
_init = 1;
|
||||
}
|
||||
|
||||
rt_err_t rt_trustzone_enter(rt_ubase_t module)
|
||||
{
|
||||
rt_trustzone_init();
|
||||
if (tzcall(TZ_ALLOC_CONTEXT_ID, module, 0, 0))
|
||||
{
|
||||
return RT_EOK;
|
||||
}
|
||||
return -RT_ERROR;
|
||||
}
|
||||
|
||||
rt_err_t rt_trustzone_exit(void)
|
||||
{
|
||||
tzcall(TZ_FREE_CONTEXT_ID, 0, 0, 0);
|
||||
return RT_EOK;
|
||||
}
|
||||
|
||||
void rt_trustzone_context_store(rt_ubase_t context)
|
||||
{
|
||||
TZ_StoreContext_S(context);
|
||||
}
|
||||
|
||||
void rt_trustzone_context_load(rt_ubase_t context)
|
||||
{
|
||||
TZ_LoadContext_S(context);
|
||||
}
|
||||
|
||||
int rt_secure_svc_handle(int svc_id, rt_ubase_t arg0, rt_ubase_t arg1, rt_ubase_t arg2)
|
||||
{
|
||||
int res = 0;
|
||||
|
||||
switch (svc_id)
|
||||
{
|
||||
case TZ_INIT_CONTEXT_ID:
|
||||
TZ_InitContextSystem_S();
|
||||
break;
|
||||
case TZ_ALLOC_CONTEXT_ID:
|
||||
res = TZ_AllocModuleContext_S(arg0);
|
||||
if (res <= 0)
|
||||
{
|
||||
rt_kprintf("Alloc Context Failed\n");
|
||||
}
|
||||
else
|
||||
{
|
||||
rt_trustzone_current_context = res;
|
||||
TZ_LoadContext_S(res);
|
||||
}
|
||||
break;
|
||||
case TZ_FREE_CONTEXT_ID:
|
||||
TZ_FreeModuleContext_S(rt_trustzone_current_context);
|
||||
rt_trustzone_current_context = 0;
|
||||
break;
|
||||
}
|
||||
return res;
|
||||
}
|
||||
|
Reference in New Issue
Block a user