mirror of
				https://github.com/FreeRTOS/FreeRTOS-Kernel.git
				synced 2025-11-04 02:32:42 -05:00 
			
		
		
		
	Re-sync with upstream and stripping away none kernel related.
This commit is contained in:
		
							parent
							
								
									9c0c37ab9b
								
							
						
					
					
						commit
						210b1ffcc8
					
				
					 13732 changed files with 49 additions and 7054697 deletions
				
			
		
							
								
								
									
										342
									
								
								portable/IAR/ARM_CM33/non_secure/portasm.s
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										342
									
								
								portable/IAR/ARM_CM33/non_secure/portasm.s
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
				
			
			@ -0,0 +1,342 @@
 | 
			
		|||
/*
 | 
			
		||||
 * FreeRTOS Kernel V10.3.0
 | 
			
		||||
 * Copyright (C) 2020 Amazon.com, Inc. or its affiliates.  All Rights Reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Permission is hereby granted, free of charge, to any person obtaining a copy of
 | 
			
		||||
 * this software and associated documentation files (the "Software"), to deal in
 | 
			
		||||
 * the Software without restriction, including without limitation the rights to
 | 
			
		||||
 * use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
 | 
			
		||||
 * the Software, and to permit persons to whom the Software is furnished to do so,
 | 
			
		||||
 * subject to the following conditions:
 | 
			
		||||
 *
 | 
			
		||||
 * The above copyright notice and this permission notice shall be included in all
 | 
			
		||||
 * copies or substantial portions of the Software.
 | 
			
		||||
 *
 | 
			
		||||
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 | 
			
		||||
 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
 | 
			
		||||
 * FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
 | 
			
		||||
 * COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
 | 
			
		||||
 * IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
 | 
			
		||||
 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
 | 
			
		||||
 *
 | 
			
		||||
 * http://www.FreeRTOS.org
 | 
			
		||||
 * http://aws.amazon.com/freertos
 | 
			
		||||
 *
 | 
			
		||||
 * 1 tab == 4 spaces!
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
/* Including FreeRTOSConfig.h here will cause build errors if the header file
 | 
			
		||||
contains code not understood by the assembler - for example the 'extern' keyword.
 | 
			
		||||
To avoid errors place any such code inside a #ifdef __ICCARM__/#endif block so
 | 
			
		||||
the code is included in C files but excluded by the preprocessor in assembly
 | 
			
		||||
files (__ICCARM__ is defined by the IAR C compiler but not by the IAR assembler. */
 | 
			
		||||
#include "FreeRTOSConfig.h"
 | 
			
		||||
 | 
			
		||||
	EXTERN pxCurrentTCB
 | 
			
		||||
	EXTERN xSecureContext
 | 
			
		||||
	EXTERN vTaskSwitchContext
 | 
			
		||||
	EXTERN vPortSVCHandler_C
 | 
			
		||||
	EXTERN SecureContext_SaveContext
 | 
			
		||||
	EXTERN SecureContext_LoadContext
 | 
			
		||||
 | 
			
		||||
	PUBLIC xIsPrivileged
 | 
			
		||||
	PUBLIC vResetPrivilege
 | 
			
		||||
	PUBLIC vPortAllocateSecureContext
 | 
			
		||||
	PUBLIC vRestoreContextOfFirstTask
 | 
			
		||||
	PUBLIC vRaisePrivilege
 | 
			
		||||
	PUBLIC vStartFirstTask
 | 
			
		||||
	PUBLIC ulSetInterruptMask
 | 
			
		||||
	PUBLIC vClearInterruptMask
 | 
			
		||||
	PUBLIC PendSV_Handler
 | 
			
		||||
	PUBLIC SVC_Handler
 | 
			
		||||
	PUBLIC vPortFreeSecureContext
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
/*---------------- Unprivileged Functions -------------------*/
 | 
			
		||||
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
	SECTION .text:CODE:NOROOT(2)
 | 
			
		||||
	THUMB
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
xIsPrivileged:
 | 
			
		||||
	mrs r0, control							/* r0 = CONTROL. */
 | 
			
		||||
	tst r0, #1								/* Perform r0 & 1 (bitwise AND) and update the conditions flag. */
 | 
			
		||||
	ite ne
 | 
			
		||||
	movne r0, #0							/* CONTROL[0]!=0. Return false to indicate that the processor is not privileged. */
 | 
			
		||||
	moveq r0, #1							/* CONTROL[0]==0. Return true to indicate that the processor is not privileged. */
 | 
			
		||||
	bx lr									/* Return. */
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
vResetPrivilege:
 | 
			
		||||
	mrs r0, control							/* r0 = CONTROL. */
 | 
			
		||||
	orr r0, r0, #1							/* r0 = r0 | 1. */
 | 
			
		||||
	msr control, r0							/* CONTROL = r0. */
 | 
			
		||||
	bx lr									/* Return to the caller. */
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
vPortAllocateSecureContext:
 | 
			
		||||
	svc 0									/* Secure context is allocated in the supervisor call. portSVC_ALLOCATE_SECURE_CONTEXT = 0. */
 | 
			
		||||
	bx lr									/* Return. */
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
/*----------------- Privileged Functions --------------------*/
 | 
			
		||||
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
	SECTION privileged_functions:CODE:NOROOT(2)
 | 
			
		||||
	THUMB
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
vRestoreContextOfFirstTask:
 | 
			
		||||
	ldr  r2, =pxCurrentTCB					/* Read the location of pxCurrentTCB i.e. &( pxCurrentTCB ). */
 | 
			
		||||
	ldr  r3, [r2]							/* Read pxCurrentTCB. */
 | 
			
		||||
	ldr  r0, [r3]							/* Read top of stack from TCB - The first item in pxCurrentTCB is the task top of stack. */
 | 
			
		||||
 | 
			
		||||
#if ( configENABLE_MPU == 1 )
 | 
			
		||||
	dmb										/* Complete outstanding transfers before disabling MPU. */
 | 
			
		||||
	ldr r2, =0xe000ed94						/* r2 = 0xe000ed94 [Location of MPU_CTRL]. */
 | 
			
		||||
	ldr r4, [r2]							/* Read the value of MPU_CTRL. */
 | 
			
		||||
	bic r4, r4, #1							/* r4 = r4 & ~1 i.e. Clear the bit 0 in r4. */
 | 
			
		||||
	str r4, [r2]							/* Disable MPU. */
 | 
			
		||||
 | 
			
		||||
	adds r3, #4								/* r3 = r3 + 4. r3 now points to MAIR0 in TCB. */
 | 
			
		||||
	ldr  r4, [r3]							/* r4 = *r3 i.e. r4 = MAIR0. */
 | 
			
		||||
	ldr  r2, =0xe000edc0					/* r2 = 0xe000edc0 [Location of MAIR0]. */
 | 
			
		||||
	str  r4, [r2]							/* Program MAIR0. */
 | 
			
		||||
	ldr  r2, =0xe000ed98					/* r2 = 0xe000ed98 [Location of RNR]. */
 | 
			
		||||
	movs r4, #4								/* r4 = 4. */
 | 
			
		||||
	str  r4, [r2]							/* Program RNR = 4. */
 | 
			
		||||
	adds r3, #4								/* r3 = r3 + 4. r3 now points to first RBAR in TCB. */
 | 
			
		||||
	ldr  r2, =0xe000ed9c					/* r2 = 0xe000ed9c [Location of RBAR]. */
 | 
			
		||||
	ldmia r3!, {r4-r11}						/* Read 4 set of RBAR/RLAR registers from TCB. */
 | 
			
		||||
	stmia r2!, {r4-r11}						/* Write 4 set of RBAR/RLAR registers using alias registers. */
 | 
			
		||||
 | 
			
		||||
	ldr r2, =0xe000ed94						/* r2 = 0xe000ed94 [Location of MPU_CTRL]. */
 | 
			
		||||
	ldr r4, [r2]							/* Read the value of MPU_CTRL. */
 | 
			
		||||
	orr r4, r4, #1							/* r4 = r4 | 1 i.e. Set the bit 0 in r4. */
 | 
			
		||||
	str r4, [r2]							/* Enable MPU. */
 | 
			
		||||
	dsb										/* Force memory writes before continuing. */
 | 
			
		||||
#endif /* configENABLE_MPU */
 | 
			
		||||
 | 
			
		||||
#if ( configENABLE_MPU == 1 )
 | 
			
		||||
	ldm  r0!, {r1-r4}						/* Read from stack - r1 = xSecureContext, r2 = PSPLIM, r3 = CONTROL and r4 = EXC_RETURN. */
 | 
			
		||||
	ldr  r5, =xSecureContext
 | 
			
		||||
	str  r1, [r5]							/* Set xSecureContext to this task's value for the same. */
 | 
			
		||||
	msr  psplim, r2							/* Set this task's PSPLIM value. */
 | 
			
		||||
	msr  control, r3						/* Set this task's CONTROL value. */
 | 
			
		||||
	adds r0, #32							/* Discard everything up to r0. */
 | 
			
		||||
	msr  psp, r0							/* This is now the new top of stack to use in the task. */
 | 
			
		||||
	isb
 | 
			
		||||
	bx   r4									/* Finally, branch to EXC_RETURN. */
 | 
			
		||||
#else /* configENABLE_MPU */
 | 
			
		||||
	ldm  r0!, {r1-r3}						/* Read from stack - r1 = xSecureContext, r2 = PSPLIM and r3 = EXC_RETURN. */
 | 
			
		||||
	ldr  r4, =xSecureContext
 | 
			
		||||
	str  r1, [r4]							/* Set xSecureContext to this task's value for the same. */
 | 
			
		||||
	msr  psplim, r2							/* Set this task's PSPLIM value. */
 | 
			
		||||
	movs r1, #2								/* r1 = 2. */
 | 
			
		||||
	msr  CONTROL, r1						/* Switch to use PSP in the thread mode. */
 | 
			
		||||
	adds r0, #32							/* Discard everything up to r0. */
 | 
			
		||||
	msr  psp, r0							/* This is now the new top of stack to use in the task. */
 | 
			
		||||
	isb
 | 
			
		||||
	bx   r3									/* Finally, branch to EXC_RETURN. */
 | 
			
		||||
#endif /* configENABLE_MPU */
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
vRaisePrivilege:
 | 
			
		||||
	mrs  r0, control						/* Read the CONTROL register. */
 | 
			
		||||
	bic r0, r0, #1							/* Clear the bit 0. */
 | 
			
		||||
	msr  control, r0						/* Write back the new CONTROL value. */
 | 
			
		||||
	bx lr									/* Return to the caller. */
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
vStartFirstTask:
 | 
			
		||||
	ldr r0, =0xe000ed08						/* Use the NVIC offset register to locate the stack. */
 | 
			
		||||
	ldr r0, [r0]							/* Read the VTOR register which gives the address of vector table. */
 | 
			
		||||
	ldr r0, [r0]							/* The first entry in vector table is stack pointer. */
 | 
			
		||||
	msr msp, r0								/* Set the MSP back to the start of the stack. */
 | 
			
		||||
	cpsie i									/* Globally enable interrupts. */
 | 
			
		||||
	cpsie f
 | 
			
		||||
	dsb
 | 
			
		||||
	isb
 | 
			
		||||
	svc 2									/* System call to start the first task. portSVC_START_SCHEDULER = 2. */
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
ulSetInterruptMask:
 | 
			
		||||
	mrs r0, basepri							/* r0 = basepri. Return original basepri value. */
 | 
			
		||||
	mov r1, #configMAX_SYSCALL_INTERRUPT_PRIORITY
 | 
			
		||||
	msr basepri, r1							/* Disable interrupts upto configMAX_SYSCALL_INTERRUPT_PRIORITY. */
 | 
			
		||||
	dsb
 | 
			
		||||
	isb
 | 
			
		||||
	bx lr									/* Return. */
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
vClearInterruptMask:
 | 
			
		||||
	msr basepri, r0							/* basepri = ulMask. */
 | 
			
		||||
	dsb
 | 
			
		||||
	isb
 | 
			
		||||
	bx lr									/* Return. */
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
PendSV_Handler:
 | 
			
		||||
	mrs r1, psp								/* Read PSP in r1. */
 | 
			
		||||
	ldr r2, =xSecureContext					/* Read the location of xSecureContext i.e. &( xSecureContext ). */
 | 
			
		||||
	ldr r0, [r2]							/* Read xSecureContext - Value of xSecureContext must be in r0 as it is used as a parameter later. */
 | 
			
		||||
 | 
			
		||||
	cbz r0, save_ns_context					/* No secure context to save. */
 | 
			
		||||
	push {r0-r2, r14}
 | 
			
		||||
	bl SecureContext_SaveContext
 | 
			
		||||
	pop {r0-r3}								/* LR is now in r3. */
 | 
			
		||||
	mov lr, r3								/* LR = r3. */
 | 
			
		||||
	lsls r2, r3, #25						/* r2 = r3 << 25. Bit[6] of EXC_RETURN is 1 if secure stack was used, 0 if non-secure stack was used to store stack frame. */
 | 
			
		||||
	bpl save_ns_context						/* bpl - branch if positive or zero. If r2 >= 0 ==> Bit[6] in EXC_RETURN is 0 i.e. non-secure stack was used. */
 | 
			
		||||
	ldr r3, =pxCurrentTCB					/* Read the location of pxCurrentTCB i.e. &( pxCurrentTCB ). */
 | 
			
		||||
	ldr r2, [r3]							/* Read pxCurrentTCB. */
 | 
			
		||||
#if ( configENABLE_MPU == 1 )
 | 
			
		||||
	subs r1, r1, #16						/* Make space for xSecureContext, PSPLIM, CONTROL and LR on the stack. */
 | 
			
		||||
	str r1, [r2]							/* Save the new top of stack in TCB. */
 | 
			
		||||
	mrs r2, psplim							/* r2 = PSPLIM. */
 | 
			
		||||
	mrs r3, control							/* r3 = CONTROL. */
 | 
			
		||||
	mov r4, lr								/* r4 = LR/EXC_RETURN. */
 | 
			
		||||
	stmia r1!, {r0, r2-r4}					/* Store xSecureContext, PSPLIM, CONTROL and LR on the stack. */
 | 
			
		||||
#else /* configENABLE_MPU */
 | 
			
		||||
	subs r1, r1, #12						/* Make space for xSecureContext, PSPLIM and LR on the stack. */
 | 
			
		||||
	str r1, [r2]							/* Save the new top of stack in TCB. */
 | 
			
		||||
	mrs r2, psplim							/* r2 = PSPLIM. */
 | 
			
		||||
	mov r3, lr								/* r3 = LR/EXC_RETURN. */
 | 
			
		||||
	stmia r1!, {r0, r2-r3}					/* Store xSecureContext, PSPLIM and LR on the stack. */
 | 
			
		||||
#endif /* configENABLE_MPU */
 | 
			
		||||
	b select_next_task
 | 
			
		||||
 | 
			
		||||
	save_ns_context:
 | 
			
		||||
		ldr r3, =pxCurrentTCB				/* Read the location of pxCurrentTCB i.e. &( pxCurrentTCB ). */
 | 
			
		||||
		ldr r2, [r3]						/* Read pxCurrentTCB. */
 | 
			
		||||
	#if ( configENABLE_FPU == 1 )
 | 
			
		||||
		tst lr, #0x10						/* Test Bit[4] in LR. Bit[4] of EXC_RETURN is 0 if the FPU is in use. */
 | 
			
		||||
		it eq
 | 
			
		||||
		vstmdbeq r1!, {s16-s31}				/* Store the FPU registers which are not saved automatically. */
 | 
			
		||||
	#endif /* configENABLE_FPU */
 | 
			
		||||
	#if ( configENABLE_MPU == 1 )
 | 
			
		||||
		subs r1, r1, #48					/* Make space for xSecureContext, PSPLIM, CONTROL, LR and the remaining registers on the stack. */
 | 
			
		||||
		str r1, [r2]						/* Save the new top of stack in TCB. */
 | 
			
		||||
		adds r1, r1, #16					/* r1 = r1 + 16. */
 | 
			
		||||
		stm r1, {r4-r11}					/* Store the registers that are not saved automatically. */
 | 
			
		||||
		mrs r2, psplim						/* r2 = PSPLIM. */
 | 
			
		||||
		mrs r3, control						/* r3 = CONTROL. */
 | 
			
		||||
		mov r4, lr							/* r4 = LR/EXC_RETURN. */
 | 
			
		||||
		subs r1, r1, #16					/* r1 = r1 - 16. */
 | 
			
		||||
		stm r1, {r0, r2-r4}					/* Store xSecureContext, PSPLIM, CONTROL and LR on the stack. */
 | 
			
		||||
	#else /* configENABLE_MPU */
 | 
			
		||||
		subs r1, r1, #44					/* Make space for xSecureContext, PSPLIM, LR and the remaining registers on the stack. */
 | 
			
		||||
		str r1, [r2]						/* Save the new top of stack in TCB. */
 | 
			
		||||
		adds r1, r1, #12					/* r1 = r1 + 12. */
 | 
			
		||||
		stm r1, {r4-r11}					/* Store the registers that are not saved automatically. */
 | 
			
		||||
		mrs r2, psplim						/* r2 = PSPLIM. */
 | 
			
		||||
		mov r3, lr							/* r3 = LR/EXC_RETURN. */
 | 
			
		||||
		subs r1, r1, #12					/* r1 = r1 - 12. */
 | 
			
		||||
		stmia r1!, {r0, r2-r3}				/* Store xSecureContext, PSPLIM and LR on the stack. */
 | 
			
		||||
	#endif /* configENABLE_MPU */
 | 
			
		||||
 | 
			
		||||
	select_next_task:
 | 
			
		||||
		mov r0, #configMAX_SYSCALL_INTERRUPT_PRIORITY
 | 
			
		||||
		msr basepri, r0						/* Disable interrupts upto configMAX_SYSCALL_INTERRUPT_PRIORITY. */
 | 
			
		||||
		dsb
 | 
			
		||||
		isb
 | 
			
		||||
		bl vTaskSwitchContext
 | 
			
		||||
		mov r0, #0							/* r0 = 0. */
 | 
			
		||||
		msr basepri, r0						/* Enable interrupts. */
 | 
			
		||||
 | 
			
		||||
		ldr r2, =pxCurrentTCB				/* Read the location of pxCurrentTCB i.e. &( pxCurrentTCB ). */
 | 
			
		||||
		ldr r3, [r2]						/* Read pxCurrentTCB. */
 | 
			
		||||
		ldr r1, [r3]						/* The first item in pxCurrentTCB is the task top of stack. r1 now points to the top of stack. */
 | 
			
		||||
 | 
			
		||||
	#if ( configENABLE_MPU == 1 )
 | 
			
		||||
		dmb									/* Complete outstanding transfers before disabling MPU. */
 | 
			
		||||
		ldr r2, =0xe000ed94					/* r2 = 0xe000ed94 [Location of MPU_CTRL]. */
 | 
			
		||||
		ldr r4, [r2]						/* Read the value of MPU_CTRL. */
 | 
			
		||||
		bic r4, r4, #1						/* r4 = r4 & ~1 i.e. Clear the bit 0 in r4. */
 | 
			
		||||
		str r4, [r2]						/* Disable MPU. */
 | 
			
		||||
 | 
			
		||||
		adds r3, #4							/* r3 = r3 + 4. r3 now points to MAIR0 in TCB. */
 | 
			
		||||
		ldr r4, [r3]						/* r4 = *r3 i.e. r4 = MAIR0. */
 | 
			
		||||
		ldr r2, =0xe000edc0					/* r2 = 0xe000edc0 [Location of MAIR0]. */
 | 
			
		||||
		str r4, [r2]						/* Program MAIR0. */
 | 
			
		||||
		ldr r2, =0xe000ed98					/* r2 = 0xe000ed98 [Location of RNR]. */
 | 
			
		||||
		movs r4, #4							/* r4 = 4. */
 | 
			
		||||
		str r4, [r2]						/* Program RNR = 4. */
 | 
			
		||||
		adds r3, #4							/* r3 = r3 + 4. r3 now points to first RBAR in TCB. */
 | 
			
		||||
		ldr  r2, =0xe000ed9c				/* r2 = 0xe000ed9c [Location of RBAR]. */
 | 
			
		||||
		ldmia r3!, {r4-r11}					/* Read 4 sets of RBAR/RLAR registers from TCB. */
 | 
			
		||||
		stmia r2!, {r4-r11}					/* Write 4 set of RBAR/RLAR registers using alias registers. */
 | 
			
		||||
 | 
			
		||||
		ldr r2, =0xe000ed94					/* r2 = 0xe000ed94 [Location of MPU_CTRL]. */
 | 
			
		||||
		ldr r4, [r2]						/* Read the value of MPU_CTRL. */
 | 
			
		||||
		orr r4, r4, #1						/* r4 = r4 | 1 i.e. Set the bit 0 in r4. */
 | 
			
		||||
		str r4, [r2]						/* Enable MPU. */
 | 
			
		||||
		dsb									/* Force memory writes before continuing. */
 | 
			
		||||
	#endif /* configENABLE_MPU */
 | 
			
		||||
 | 
			
		||||
	#if ( configENABLE_MPU == 1 )
 | 
			
		||||
		ldmia r1!, {r0, r2-r4}				/* Read from stack - r0 = xSecureContext, r2 = PSPLIM, r3 = CONTROL and r4 = LR. */
 | 
			
		||||
		msr psplim, r2						/* Restore the PSPLIM register value for the task. */
 | 
			
		||||
		msr control, r3						/* Restore the CONTROL register value for the task. */
 | 
			
		||||
		mov lr, r4							/* LR = r4. */
 | 
			
		||||
		ldr r2, =xSecureContext				/* Read the location of xSecureContext i.e. &( xSecureContext ). */
 | 
			
		||||
		str r0, [r2]						/* Restore the task's xSecureContext. */
 | 
			
		||||
		cbz r0, restore_ns_context			/* If there is no secure context for the task, restore the non-secure context. */
 | 
			
		||||
		push {r1,r4}
 | 
			
		||||
		bl SecureContext_LoadContext		/* Restore the secure context. */
 | 
			
		||||
		pop {r1,r4}
 | 
			
		||||
		mov lr, r4							/* LR = r4. */
 | 
			
		||||
		lsls r2, r4, #25					/* r2 = r4 << 25. Bit[6] of EXC_RETURN is 1 if secure stack was used, 0 if non-secure stack was used to store stack frame. */
 | 
			
		||||
		bpl restore_ns_context				/* bpl - branch if positive or zero. If r2 >= 0 ==> Bit[6] in EXC_RETURN is 0 i.e. non-secure stack was used. */
 | 
			
		||||
		msr psp, r1							/* Remember the new top of stack for the task. */
 | 
			
		||||
		bx lr
 | 
			
		||||
	#else /* configENABLE_MPU */
 | 
			
		||||
		ldmia r1!, {r0, r2-r3}				/* Read from stack - r0 = xSecureContext, r2 = PSPLIM and r3 = LR. */
 | 
			
		||||
		msr psplim, r2						/* Restore the PSPLIM register value for the task. */
 | 
			
		||||
		mov lr, r3							/* LR = r3. */
 | 
			
		||||
		ldr r2, =xSecureContext				/* Read the location of xSecureContext i.e. &( xSecureContext ). */
 | 
			
		||||
		str r0, [r2]						/* Restore the task's xSecureContext. */
 | 
			
		||||
		cbz r0, restore_ns_context			/* If there is no secure context for the task, restore the non-secure context. */
 | 
			
		||||
		push {r1,r3}
 | 
			
		||||
		bl SecureContext_LoadContext		/* Restore the secure context. */
 | 
			
		||||
		pop {r1,r3}
 | 
			
		||||
		mov lr, r3							/* LR = r3. */
 | 
			
		||||
		lsls r2, r3, #25					/* r2 = r3 << 25. Bit[6] of EXC_RETURN is 1 if secure stack was used, 0 if non-secure stack was used to store stack frame. */
 | 
			
		||||
		bpl restore_ns_context				/* bpl - branch if positive or zero. If r2 >= 0 ==> Bit[6] in EXC_RETURN is 0 i.e. non-secure stack was used. */
 | 
			
		||||
		msr psp, r1							/* Remember the new top of stack for the task. */
 | 
			
		||||
		bx lr
 | 
			
		||||
	#endif /* configENABLE_MPU */
 | 
			
		||||
 | 
			
		||||
	restore_ns_context:
 | 
			
		||||
		ldmia r1!, {r4-r11}					/* Restore the registers that are not automatically restored. */
 | 
			
		||||
	#if ( configENABLE_FPU == 1 )
 | 
			
		||||
		tst lr, #0x10						/* Test Bit[4] in LR. Bit[4] of EXC_RETURN is 0 if the FPU is in use. */
 | 
			
		||||
		it eq
 | 
			
		||||
		vldmiaeq r1!, {s16-s31}				/* Restore the FPU registers which are not restored automatically. */
 | 
			
		||||
	#endif /* configENABLE_FPU */
 | 
			
		||||
		msr psp, r1							/* Remember the new top of stack for the task. */
 | 
			
		||||
		bx lr
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
SVC_Handler:
 | 
			
		||||
	tst lr, #4
 | 
			
		||||
	ite eq
 | 
			
		||||
	mrseq r0, msp
 | 
			
		||||
	mrsne r0, psp
 | 
			
		||||
	b vPortSVCHandler_C
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
vPortFreeSecureContext:
 | 
			
		||||
	/* r0 = uint32_t *pulTCB. */
 | 
			
		||||
	ldr r1, [r0]							/* The first item in the TCB is the top of the stack. */
 | 
			
		||||
	ldr r0, [r1]							/* The first item on the stack is the task's xSecureContext. */
 | 
			
		||||
	cmp r0, #0								/* Raise svc if task's xSecureContext is not NULL. */
 | 
			
		||||
	it ne
 | 
			
		||||
	svcne 1									/* Secure context is freed in the supervisor call. portSVC_FREE_SECURE_CONTEXT = 1. */
 | 
			
		||||
	bx lr									/* Return. */
 | 
			
		||||
/*-----------------------------------------------------------*/
 | 
			
		||||
 | 
			
		||||
	END
 | 
			
		||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue