/* * The caller security attribute detection bases on LR of state context. * However, if SP calls PSA APIs based on its customized SVC, the LR may be * occupied by general purpose value while calling SVC. * Check if caller comes from non-secure: return address (ctx[6]) is belongs * to veneer section, and the bit0 of LR (ctx[5]) is zero. */ if (ctx[6] = veneer_base && ctx[6] < veneer_limit && !(ctx[5] & TFM_VENEER_LR_BIT0_MASK)) { ns_caller = true; }
partition = tfm_spm_get_running_partition(); if (!partition) { tfm_core_panic(); }
if (!(exc_return & EXC_RETURN_MODE)) { /* Calling SVC from Handler Mode is not supported */ tfm_core_panic(); }
if ((exc_return & EXC_RETURN_MODE) && (exc_return & EXC_RETURN_SPSEL)) { /* Use PSP when both EXC_RETURN.MODE and EXC_RETURN.SPSEL are set */ svc_args = psp; } else { svc_args = msp; }
/* * Stack contains: * r0, r1, r2, r3, r12, r14 (lr), the return address and xPSR * First argument (r0) is svc_args[0] */ if (is_return_secure_stack(exc_return)) { /* SV called directly from secure context. Check instruction for * svc_number */ svc_number = ((tfm_svc_number_t *)svc_args[6])[-2]; } else { /* Secure SV executing with NS return. * NS cannot directly trigger S SVC so this should not happen. This is * an unrecoverable error. */ tfm_core_panic(); } switch (svc_number) { case TFM_SVC_HANDLER_MODE: tfm_arch_clear_fp_status(); exc_return = tfm_spm_init(); break; case TFM_SVC_GET_BOOT_DATA: tfm_core_get_boot_data_handler(svc_args); break; default: svc_args[0] = SVC_Handler_IPC(svc_number, svc_args, exc_return); break; }
return exc_return; }
代码中有一些重点:
__attribute__((naked))
This attribute tells the compiler that the function is an embedded assembly function. You can write the body of the function entirely in assembly code using __asm statements.
The compiler does not generate prologue and epilogue sequences for functions with __attribute__((naked)).
The compiler only supports basic __asm statements in __attribute__((naked)) functions. Using extended assembly, parameter references or mixing C code with __asm statements might not work reliably.
__ASM
__asm 关键字用于调用内联汇编程序,并且可在 C 或 C++ 语句合法时出现
volatile
volatile tells the compiler not to optimize anything that has to do with the volatile variable.
The SVC instruction generates an SVC. A typical use for SVCs is to request privileged operations or access to system resources from an operating system.
The SVC instruction has a number embedded within it, often referred to as the SVC number. On most ARM processors, the SVC number indicates the service that is being requested. On microcontroller profiles, the processor saves the argument registers to the stack on the initial exception entry.
A late-arriving exception, taken before the first instruction of the SVC handler executes, might corrupt the copy of the arguments still held in R0 to R3. This means that the stack copy of the arguments must be used by the SVC handler. Any return value must also be passed back to the caller by modifying the stacked register values. In order to do this, a short piece of assembly code must be implemented at the start of the SVC handler. This identifies where the registers are saved, extracts the SVC number from the instruction, and passes the number, and a pointer to the arguments, to the main body of the handler written in C.
The following example shows an example SVC handler. This code tests the EXC_RETURN value set by the processor to determine which stack pointer was in use when the SVC was called. This can be useful for reentrant SVCs, but is unnecessary on most systems because in a typical system design, SVCs are only called from user code that uses the process stack. In such cases, the assembly code can consist of a single MSR instruction followed by a tail calling branch (B instruction) to the C body of the handler.
The following example shows how you can make different declarations for a number of SVCs. __svc is a compiler keyword that replaces a function call with an SVC instruction containing the specified number.
Example of calling an SVC from C code
1 2 3 4 5 6 7 8 9
#define SVC_00 0x00 #define SVC_01 0x01 void __svc(SVC_00) svc_zero(constchar *string); void __svc(SVC_01) svc_one(constchar *string); intcall_system_func(void) { svc_zero("String to pass to SVC handler zero"); svc_one("String to pass to a different OS function"); }