187 lines
4.4 KiB
ArmAsm
187 lines
4.4 KiB
ArmAsm
/*
|
|
* Userspace and service handler hooks
|
|
*
|
|
* Copyright (c) 2017 Linaro Limited
|
|
*
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*
|
|
*/
|
|
|
|
#include <offsets_short.h>
|
|
#include <toolchain.h>
|
|
#include <linker/sections.h>
|
|
#include <kernel_structs.h>
|
|
#include <arch/cpu.h>
|
|
#include <syscall.h>
|
|
|
|
_ASM_FILE_PROLOGUE
|
|
|
|
GTEXT(_arm_userspace_enter)
|
|
GTEXT(_arm_do_syscall)
|
|
GDATA(_kernel)
|
|
|
|
/* Imports */
|
|
GTEXT(_k_syscall_table)
|
|
|
|
/**
|
|
*
|
|
* User space entry function
|
|
*
|
|
* This function is the entry point to user mode from privileged execution.
|
|
* The conversion is one way, and threads which transition to user mode do
|
|
* not transition back later, unless they are doing system calls.
|
|
*
|
|
*/
|
|
SECTION_FUNC(TEXT,_arm_userspace_enter)
|
|
/* move user_entry to lr */
|
|
mov lr, r0
|
|
|
|
/* set stack to priviliged stack */
|
|
ldr r0, =_kernel
|
|
ldr r0, [r0, #_kernel_offset_to_current]
|
|
ldr r0, [r0, #_thread_offset_to_priv_stack_start] /* priv stack ptr */
|
|
ldr ip, =CONFIG_PRIVILEGED_STACK_SIZE
|
|
add r0, r0, ip
|
|
|
|
mov ip, sp
|
|
msr PSP, r0
|
|
|
|
/* load up stack info from user stack */
|
|
ldr r0, [ip]
|
|
ldr ip, [ip, #4]
|
|
|
|
#ifdef CONFIG_MPU_REQUIRES_POWER_OF_TWO_ALIGNMENT
|
|
/* Guard is taken out of size, so adjust beginning and size of stack */
|
|
subs ip, #MPU_GUARD_ALIGN_AND_SIZE
|
|
#endif
|
|
|
|
/* push args to stack */
|
|
push {r0,r1,r2,r3,ip,lr}
|
|
|
|
/* clear the user stack area to clean out privileged data */
|
|
/* from right past the guard right up to the end */
|
|
mov r2, ip
|
|
#ifdef CONFIG_INIT_STACKS
|
|
ldr r1,=0xaaaaaaaa
|
|
#else
|
|
eors.n r1, r1
|
|
#endif
|
|
bl memset
|
|
|
|
/* setup arguments to configure_mpu_mem_domain */
|
|
ldr r0, =_kernel
|
|
ldr r0, [r0, #_kernel_offset_to_current]
|
|
bl configure_mpu_mem_domain
|
|
|
|
/* setup arguments configure_mpu_user_context */
|
|
ldr r0, =_kernel
|
|
ldr r0, [r0, #_kernel_offset_to_current]
|
|
bl configure_mpu_user_context
|
|
|
|
pop {r0,r1,r2,r3,ip,lr}
|
|
|
|
/* r0 contains user stack start, ip contains user stack size */
|
|
add r0, r0, ip /* calculate top of stack */
|
|
|
|
/* set stack to user stack */
|
|
msr PSP, r0
|
|
|
|
/* restore r0 */
|
|
mov r0, lr
|
|
|
|
/* change processor mode to unprivileged */
|
|
mrs ip, CONTROL
|
|
orrs ip, ip, #1
|
|
msr CONTROL, ip
|
|
|
|
/* ISB is not strictly necessary here (stack pointer is not being
|
|
* touched), but it's recommended to avoid executing pre-fetched
|
|
* instructions with the previous privilege.
|
|
*/
|
|
isb
|
|
|
|
/* jump to _thread_entry entry */
|
|
ldr ip, =_thread_entry
|
|
bx ip
|
|
|
|
/**
|
|
*
|
|
* Userspace system call function
|
|
*
|
|
* This function is used to do system calls from unprivileged code. This
|
|
* function is responsible for the following:
|
|
* 1) Fixing up bad syscalls
|
|
* 2) Configuring privileged stack and loading up stack arguments
|
|
* 3) Dispatching the system call
|
|
* 4) Restoring stack and calling back to the caller of the SVC
|
|
*
|
|
*/
|
|
SECTION_FUNC(TEXT, _arm_do_syscall)
|
|
/*
|
|
* r0-r5 contain arguments
|
|
* r6 contains call_id
|
|
* r7 contains original LR
|
|
*/
|
|
ldr ip, =_SYSCALL_BAD
|
|
cmp r6, ip
|
|
bne valid_syscall
|
|
|
|
/* BAD SYSCALL path */
|
|
/* fixup stack frame on unprivileged stack, adding ssf */
|
|
mov ip, sp
|
|
push {r4,r5,ip,lr}
|
|
b dispatch_syscall
|
|
|
|
valid_syscall:
|
|
/* setup priviliged stack */
|
|
push {r6}
|
|
ldr r6, =_kernel
|
|
ldr r6, [r6, #_kernel_offset_to_current]
|
|
ldr ip, [r6, #_thread_offset_to_priv_stack_start] /* priv stack ptr */
|
|
ldr r6, =CONFIG_PRIVILEGED_STACK_SIZE
|
|
add ip, r6
|
|
pop {r6}
|
|
subs ip, #8
|
|
str sp, [ip, #0]
|
|
str lr, [ip, #4]
|
|
|
|
/* switch to privileged stack */
|
|
msr PSP, ip
|
|
|
|
/* push args to complete stack frame */
|
|
push {r4,r5}
|
|
|
|
dispatch_syscall:
|
|
ldr ip, =_k_syscall_table
|
|
lsl r6, #2
|
|
add ip, r6
|
|
ldr ip, [ip] /* load table address */
|
|
/* execute function from dispatch table */
|
|
blx ip
|
|
|
|
/* restore LR */
|
|
ldr lr, [sp,#12]
|
|
|
|
/* set stack back to unprivileged stack */
|
|
ldr ip, [sp,#8]
|
|
msr PSP, ip
|
|
|
|
/* drop privileges by setting bit 0 in CONTROL */
|
|
mrs ip, CONTROL
|
|
orrs ip, ip, #1
|
|
msr CONTROL, ip
|
|
|
|
/* ISB is not strictly necessary here (stack pointer is not being
|
|
* touched), but it's recommended to avoid executing pre-fetched
|
|
* instructions with the previous privilege.
|
|
*/
|
|
isb
|
|
|
|
/*
|
|
* return back to original function that called SVC, add 1 to force thumb
|
|
* mode
|
|
*/
|
|
mov ip, r7
|
|
orrs ip, ip, #1
|
|
bx ip
|