Skip to content

Commit 6681e54

Browse files
committed
Working TZ supervisor
1 parent ae82a60 commit 6681e54

File tree

7 files changed

+95
-53
lines changed

7 files changed

+95
-53
lines changed

IDE/pico-sdk/rp2350/test-app/CMakeLists.txt

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,13 @@
11
cmake_minimum_required(VERSION 3.13)
22
set(WOLFBOOT_PATH ../../../../)
33
set(CMAKE_CXX_COMPILER arm-none-eabi-gcc)
4+
set(LIB_PICO_RUNTIME_INIT=0)
45

56
include(${PICO_SDK_PATH}/pico_sdk_init.cmake)
67

78
set(PICOTOOL_FETCH_FROM_GIT_PATH ../wolfboot/build/picotool)
89
set(BOOT_STAGE2_FILE ${CMAKE_CURRENT_LIST_DIR}/boot2_empty.S)
10+
set(PICO_NO_RUNTIME 1)
911

1012
project(blink)
1113

@@ -15,8 +17,16 @@ pico_sdk_init()
1517

1618
add_executable(blink
1719
blink.c
20+
runtime.c
1821
)
1922

23+
target_compile_options(blink PRIVATE
24+
-DPICO_RUNTIME_NO_INIT_BOOTROM_RESET=1
25+
-DPICO_RUNTIME_NO_INIT_CLOCKS=1
26+
-DPICO_TIME_DEFAULT_ALARM_POOL_DISABLED=1
27+
)
28+
target_compile_definitions(blink PRIVATE PICO_NO_RUNTIME=1)
29+
2030
pico_set_linker_script(blink ../../../../../hal/rp2350-app.ld)
2131
target_link_libraries(blink pico_stdlib)
2232

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
#include <stdint.h>
2+
void runtime_init_bootrom_reset(void)
3+
{
4+
}
5+
6+
void runtime_init_clocks(void)
7+
{
8+
}
9+
10+
11+
typedef void (*preinit_fn_t)(void);
12+
13+
void runtime_init_cpasr(void)
14+
{
15+
volatile uint32_t *cpasr_ns = (volatile uint32_t*) 0xE000ED88;
16+
*cpasr_ns |= 0xFF;
17+
}
18+
19+
preinit_fn_t __attribute__((section(".nonsecure_preinit_array"))) *((*nonsecure_preinit)(void)) =
20+
{ &runtime_init_cpasr };

IDE/pico-sdk/rp2350/wolfboot/CMakeLists.txt

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,10 +35,11 @@ add_executable(wolfboot
3535
# Add cflags
3636
target_compile_options(wolfboot PRIVATE
3737
-D__WOLFBOOT
38-
-D__ARM_ARCH_6M__
3938
-DWOLFSSL_USER_SETTINGS
4039
-mcpu=cortex-m33
4140
-DCORTEX_M33
41+
-DTZEN
42+
-mcmse
4243
-DWOLFSSL_SP_ASM
4344
-DWOLFSSL_SP_ARM_CORTEX_M_ASM
4445
-DWOLFSSL_ARM_ARCH=8

arch.mk

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -228,6 +228,7 @@ ifeq ($(ARCH),ARM)
228228
WOLFBOOT_ORIGIN=0x10000000
229229
ifeq ($(TZEN),1)
230230
LSCRIPT_IN=hal/$(TARGET).ld
231+
CFLAGS+=-DTZEN
231232
else
232233
LSCRIPT_IN=hal/$(TARGET)-ns.ld
233234
endif

hal/rp2350-app.ld

Lines changed: 10 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,9 @@
2323

2424
MEMORY
2525
{
26+
BOOT(rx) : ORIGIN = 0x10000000, LENGTH = 0x40400
2627
FLASH(rx) : ORIGIN = 0x10040400, LENGTH = 0x1D0000
27-
RAM(rwx) : ORIGIN = 0x20008000, LENGTH = 472k
28+
RAM(rwx) : ORIGIN = 0x20010000, LENGTH = 0x6E000
2829
SCRATCH_X(rwx) : ORIGIN = 0x2007E000, LENGTH = 4k
2930
SCRATCH_Y(rwx) : ORIGIN = 0x2007F000, LENGTH = 4k
3031
}
@@ -78,15 +79,16 @@ SECTIONS
7879
. = ALIGN(4);
7980
/* preinit data */
8081
PROVIDE_HIDDEN (__preinit_array_start = .);
81-
KEEP(*(SORT(.preinit_array.*)))
82-
KEEP(*(.preinit_array))
82+
/* KEEP(*(SORT(.preinit_array.*))) */
83+
/* KEEP(*(.preinit_array)) */
84+
KEEP(*(.nonsecure_preinit_array))
8385
PROVIDE_HIDDEN (__preinit_array_end = .);
8486

8587
. = ALIGN(4);
8688
/* init data */
8789
PROVIDE_HIDDEN (__init_array_start = .);
88-
KEEP(*(SORT(.init_array.*)))
89-
KEEP(*(.init_array))
90+
/* KEEP(*(SORT(.init_array.*))) */
91+
/* KEEP(*(.init_array)) */
9092
PROVIDE_HIDDEN (__init_array_end = .);
9193

9294
. = ALIGN(4);
@@ -100,30 +102,8 @@ SECTIONS
100102
. = ALIGN(4);
101103
} > FLASH
102104

103-
/* Note the boot2 section is optional, and should be discarded if there is
104-
no reference to it *inside* the binary, as it is not called by the
105-
bootrom. (The bootrom performs a simple best-effort XIP setup and
106-
leaves it to the binary to do anything more sophisticated.) However
107-
there is still a size limit of 256 bytes, to ensure the boot2 can be
108-
stored in boot RAM.
109-
110-
Really this is a "XIP setup function" -- the name boot2 is historic and
111-
refers to its dual-purpose on RP2040, where it also handled vectoring
112-
from the bootrom into the user image.
113-
*/
114-
115-
.boot2 : {
116-
__boot2_start__ = .;
117-
*(.boot2)
118-
__boot2_end__ = .;
119-
} > FLASH
120-
121-
ASSERT(__boot2_end__ - __boot2_start__ <= 256,
122-
"ERROR: Pico second stage bootloader must be no more than 256 bytes in size")
123-
124105
.rodata : {
125106
*(EXCLUDE_FILE(*libgcc.a: *libc.a:*lib_a-mem*.o *libm.a:) .rodata*)
126-
*(.srodata*)
127107
. = ALIGN(4);
128108
*(SORT_BY_ALIGNMENT(SORT_BY_NAME(.flashdata*)))
129109
. = ALIGN(4);
@@ -174,7 +154,6 @@ SECTIONS
174154
. = ALIGN(4);
175155

176156
*(.data*)
177-
*(.sdata*)
178157

179158
. = ALIGN(4);
180159
*(.after_data.*)
@@ -185,6 +164,7 @@ SECTIONS
185164
KEEP(*(.mutex_array))
186165
PROVIDE_HIDDEN (__mutex_array_end = .);
187166

167+
. = ALIGN(4);
188168
*(.jcr)
189169
. = ALIGN(4);
190170
} > RAM AT> FLASH
@@ -270,7 +250,8 @@ SECTIONS
270250
.flash_end : {
271251
KEEP(*(.embedded_end_block*))
272252
PROVIDE(__flash_binary_end = .);
273-
} > FLASH =0xaa
253+
} > FLASH
254+
274255

275256
/* stack limit is poorly named, but historically is maximum heap ptr */
276257
__StackLimit = ORIGIN(RAM) + LENGTH(RAM);

hal/rp2350.c

Lines changed: 50 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,15 @@
3636

3737
#define SCB_VTOR_NS (*(volatile uint32_t *)(0xE002ED08))
3838

39+
#define NSACR (*(volatile uint32_t *)(0xE000ED8C))
40+
#define CPACR (*(volatile uint32_t *)(0xE000ED88))
41+
42+
#define SHCSR (*(volatile uint32_t *)(0xE000ED24))
43+
#define SHCSR_MEMFAULTENA (1 << 16)
44+
#define SHCSR_BUSFAULTENA (1 << 17)
45+
#define SHCSR_USGFAULTENA (1 << 18)
46+
47+
3948
#define ACCESS_BITS_DBG (1 << 7)
4049
#define ACCESS_BITS_DMA (1 << 6)
4150
#define ACCESS_BITS_CORE1 (1 << 5)
@@ -122,10 +131,19 @@ static void rp2350_configure_sau(void)
122131
sau_init_region(1, 0x10030000, 0x1003FFFF, 1); /* Non-secure-callable flash */
123132
sau_init_region(2, 0x10040000, 0x101FFFFF, 0); /* Non-secure flash */
124133
sau_init_region(3, 0x20000000, 0x20007FFF, 1); /* Secure RAM */
125-
sau_init_region(4, 0x20008000, 0x2007FFFF, 0); /* Non-secure RAM */
134+
sau_init_region(4, 0x20008000, 0x20081FFF, 0); /* Non-secure RAM */
135+
sau_init_region(6, 0x40000000, 0x5FFFFFFF, 0); /* Non-secure peripherals */
136+
sau_init_region(7, 0xD0000000, 0xDFFFFFFF, 0); /* Non-secure SIO region */
137+
126138

127139
/* Enable SAU */
128140
SAU_CTRL = 1;
141+
142+
/* Enable MemFault, BusFault and UsageFault */
143+
SHCSR |= SHCSR_MEMFAULTENA | SHCSR_BUSFAULTENA | SHCSR_USGFAULTENA;
144+
145+
/* Add flag to trap misaligned accesses */
146+
*((volatile uint32_t *)0xE000ED14) |= 0x00000008;
129147
}
130148

131149
static void rp2350_configure_nvic(void)
@@ -142,39 +160,49 @@ static void rp2350_configure_access_control(void)
142160
{
143161
int i;
144162
/* Reset ACCESSCTRL */
145-
const uint32_t secure_fl = (ACCESS_BITS_SU | ACCESS_BITS_SP | ACCESS_BITS_DMA | ACCESS_BITS_DBG | ACCESS_BITS_CORE0 | ACCESS_BITS_CORE1 | ACCESS_MAGIC);
146-
const uint32_t non_secure_fl = (ACCESS_BITS_NSU | ACCESS_BITS_NSP | ACCESS_BITS_DMA | ACCESS_BITS_DBG | ACCESS_BITS_CORE0 | ACCESS_BITS_CORE1 | ACCESS_MAGIC);
163+
const uint32_t secure_fl = (ACCESS_BITS_SU | ACCESS_BITS_SP | ACCESS_BITS_DMA | ACCESS_BITS_DBG | ACCESS_BITS_CORE0 | ACCESS_BITS_CORE1) | ACCESS_MAGIC;
164+
const uint32_t non_secure_fl = (ACCESS_BITS_NSU | ACCESS_BITS_NSP | ACCESS_BITS_DMA | ACCESS_BITS_DBG | ACCESS_BITS_CORE0 | ACCESS_BITS_CORE1) | ACCESS_MAGIC;
165+
147166
//ACCESS_CONTROL_CFGRESET = 1;
148167
/* Corresponding regions for the secure flash and RAM */
149-
//for(i = 0; i < 2; i++) {
150-
// ACCESS_CONTROL_SRAM(i) = secure_fl;
151-
//}
168+
/*
169+
for(i = 0; i < 2; i++) {
170+
ACCESS_CONTROL_SRAM(i) = secure_fl;
171+
}
172+
*/
152173
for (i = 0; i < 10; i++) {
153174
ACCESS_CONTROL_SRAM(i) = non_secure_fl | secure_fl;
154175
}
155-
ACCESS_CONTROL_ROM = secure_fl;
176+
ACCESS_CONTROL_ROM = secure_fl | non_secure_fl;
156177
ACCESS_CONTROL_XIP_MAIN = non_secure_fl | secure_fl;
157178
ACCESS_CONTROL_DMA = non_secure_fl;
158179
ACCESS_CONTROL_TRNG = secure_fl;
159-
ACCESS_CONTROL_SYSCFG = secure_fl;
180+
ACCESS_CONTROL_SYSCFG = secure_fl | non_secure_fl;
160181
ACCESS_CONTROL_SHA256 = secure_fl;
161182
ACCESS_CONTROL_GPIOMASK0 = 0xFFFFFFFF;
162183
ACCESS_CONTROL_GPIOMASK1 = 0xFFFFFFFF;
184+
ACCESS_CONTROL_IO_BANK0 = non_secure_fl | secure_fl;
185+
ACCESS_CONTROL_IO_BANK1 = non_secure_fl | secure_fl;
186+
ACCESS_CONTROL_PADS_BANK0 = non_secure_fl | secure_fl;
163187
// ACCESS_CONTROL_FORCE_CORE_NS = (1 << 1); /* Force core 1 to non-secure */
164-
ACCESS_CONTROL_PIO0 = non_secure_fl;
165-
ACCESS_CONTROL_PIO1 = non_secure_fl;
166-
ACCESS_CONTROL_PIO2 = non_secure_fl;
167-
168-
ACCESS_CONTROL_I2C0 = non_secure_fl;
169-
ACCESS_CONTROL_I2C1 = non_secure_fl;
170-
ACCESS_CONTROL_PWM = non_secure_fl;
171-
ACCESS_CONTROL_SPI0 = non_secure_fl;
172-
ACCESS_CONTROL_SPI1 = non_secure_fl;
173-
ACCESS_CONTROL_TIMER0 = non_secure_fl;
174-
ACCESS_CONTROL_TIMER1 = non_secure_fl;
175-
ACCESS_CONTROL_UART0 = non_secure_fl;
176-
ACCESS_CONTROL_UART1 = non_secure_fl;
177-
ACCESS_CONTROL_ADC = non_secure_fl;
188+
ACCESS_CONTROL_PIO0 = non_secure_fl | secure_fl;
189+
ACCESS_CONTROL_PIO1 = non_secure_fl | secure_fl;
190+
ACCESS_CONTROL_PIO2 = non_secure_fl | secure_fl;
191+
192+
ACCESS_CONTROL_I2C0 = non_secure_fl|secure_fl;
193+
ACCESS_CONTROL_I2C1 = non_secure_fl | secure_fl;
194+
ACCESS_CONTROL_PWM = non_secure_fl | secure_fl;
195+
ACCESS_CONTROL_SPI0 = non_secure_fl | secure_fl;
196+
ACCESS_CONTROL_SPI1 = non_secure_fl | secure_fl;
197+
ACCESS_CONTROL_TIMER0 = non_secure_fl | secure_fl;
198+
ACCESS_CONTROL_TIMER1 = non_secure_fl | secure_fl;
199+
ACCESS_CONTROL_UART0 = non_secure_fl | secure_fl;
200+
ACCESS_CONTROL_UART1 = non_secure_fl | secure_fl;
201+
ACCESS_CONTROL_ADC = non_secure_fl | secure_fl;
202+
ACCESS_CONTROL_RESETS = non_secure_fl | secure_fl;
203+
204+
CPACR |= 0x000000FF; /* Enable access to coprocessors CP0-CP7 */
205+
NSACR |= 0x000000FF; /* Enable non-secure access to coprocessors CP0-CP7 */
178206

179207
// ACCESS_CONTROL_LOCK = (1 << 0) | (1 << 1) | (1 << 3);
180208
}

src/boot_arm.c

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -416,7 +416,8 @@ void isr_empty(void)
416416

417417
#ifdef TZEN
418418
#include "hal.h"
419-
#define VTOR (*(volatile uint32_t *)(0xE002ED08))
419+
//#define VTOR (*(volatile uint32_t *)(0xE002ED08))
420+
#define VTOR (*(volatile uint32_t *)(0xE000ED08))
420421
#else
421422
#define VTOR (*(volatile uint32_t *)(0xE000ED08))
422423
#endif

0 commit comments

Comments
 (0)