mirror of
https://github.com/espressif/esp-idf.git
synced 2025-07-30 18:57:19 +02:00
feat(cpu_region_protect): Enable basic memory protection for SPIRAM
This commit is contained in:
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* SPDX-FileCopyrightText: 2023-2024 Espressif Systems (Shanghai) CO LTD
|
* SPDX-FileCopyrightText: 2023-2025 Espressif Systems (Shanghai) CO LTD
|
||||||
*
|
*
|
||||||
* SPDX-License-Identifier: Apache-2.0
|
* SPDX-License-Identifier: Apache-2.0
|
||||||
*/
|
*/
|
||||||
@ -11,6 +11,9 @@
|
|||||||
#include "esp_fault.h"
|
#include "esp_fault.h"
|
||||||
#include "hal/cache_ll.h"
|
#include "hal/cache_ll.h"
|
||||||
#include "riscv/csr.h"
|
#include "riscv/csr.h"
|
||||||
|
#if CONFIG_SPIRAM
|
||||||
|
#include "esp_private/esp_psram_extram.h"
|
||||||
|
#endif /* CONFIG_SPIRAM */
|
||||||
|
|
||||||
#ifdef BOOTLOADER_BUILD
|
#ifdef BOOTLOADER_BUILD
|
||||||
// Without L bit set
|
// Without L bit set
|
||||||
@ -30,6 +33,7 @@
|
|||||||
|
|
||||||
#define ALIGN_UP_TO_MMU_PAGE_SIZE(addr) (((addr) + (SOC_MMU_PAGE_SIZE) - 1) & ~((SOC_MMU_PAGE_SIZE) - 1))
|
#define ALIGN_UP_TO_MMU_PAGE_SIZE(addr) (((addr) + (SOC_MMU_PAGE_SIZE) - 1) & ~((SOC_MMU_PAGE_SIZE) - 1))
|
||||||
#define ALIGN_DOWN_TO_MMU_PAGE_SIZE(addr) ((addr) & ~((SOC_MMU_PAGE_SIZE) - 1))
|
#define ALIGN_DOWN_TO_MMU_PAGE_SIZE(addr) ((addr) & ~((SOC_MMU_PAGE_SIZE) - 1))
|
||||||
|
#define ALIGN_UP(addr, align) ((addr) & ~((align) - 1))
|
||||||
|
|
||||||
static void esp_cpu_configure_invalid_regions(void)
|
static void esp_cpu_configure_invalid_regions(void)
|
||||||
{
|
{
|
||||||
@ -191,16 +195,34 @@ void esp_cpu_configure_region_protection(void)
|
|||||||
extern int _instruction_reserved_end;
|
extern int _instruction_reserved_end;
|
||||||
extern int _rodata_reserved_end;
|
extern int _rodata_reserved_end;
|
||||||
|
|
||||||
const uint32_t irom_resv_end = ALIGN_UP_TO_MMU_PAGE_SIZE((uint32_t)(&_instruction_reserved_end));
|
const uint32_t page_aligned_irom_resv_end = ALIGN_UP_TO_MMU_PAGE_SIZE((uint32_t)(&_instruction_reserved_end));
|
||||||
const uint32_t drom_resv_end = ALIGN_UP_TO_MMU_PAGE_SIZE((uint32_t)(&_rodata_reserved_end));
|
__attribute__((unused)) const uint32_t page_aligned_drom_resv_end = ALIGN_UP_TO_MMU_PAGE_SIZE((uint32_t)(&_rodata_reserved_end));
|
||||||
|
|
||||||
// 5. I_Cache / D_Cache (flash)
|
// 5. I_Cache / D_Cache (flash)
|
||||||
|
#if CONFIG_SPIRAM_XIP_FROM_PSRAM && CONFIG_SPIRAM_PRE_CONFIGURE_MEMORY_PROTECTION
|
||||||
|
// We could have split CONFIG_SPIRAM_XIP_FROM_PSRAM into CONFIG_SPIRAM_FETCH_INSTRUCTIONS and CONFIG_SPIRAM_RODATA
|
||||||
|
// but we don't have enough PMP entries to do so thus not allowing us finer control over the memory regions
|
||||||
|
PMP_ENTRY_CFG_RESET(6);
|
||||||
|
PMP_ENTRY_CFG_RESET(7);
|
||||||
|
PMP_ENTRY_CFG_RESET(8);
|
||||||
|
PMP_ENTRY_CFG_RESET(9);
|
||||||
|
|
||||||
|
PMP_ENTRY_SET(6, SOC_EXTRAM_LOW, NONE);
|
||||||
|
PMP_ENTRY_SET(7, (uint32_t)(&_instruction_reserved_end), PMP_TOR | RX);
|
||||||
|
PMP_ENTRY_SET(8, page_aligned_irom_resv_end, PMP_TOR | RW);
|
||||||
|
PMP_ENTRY_SET(9, (uint32_t)(&_rodata_reserved_end), PMP_TOR | R);
|
||||||
|
|
||||||
|
size_t available_psram_heap = esp_psram_get_heap_size_to_protect();
|
||||||
|
PMP_ENTRY_CFG_RESET(10);
|
||||||
|
PMP_ENTRY_SET(10, ALIGN_UP(page_aligned_drom_resv_end + available_psram_heap, SOC_CPU_PMP_REGION_GRANULARITY), PMP_TOR | RW);
|
||||||
|
#else
|
||||||
PMP_ENTRY_CFG_RESET(6);
|
PMP_ENTRY_CFG_RESET(6);
|
||||||
PMP_ENTRY_CFG_RESET(7);
|
PMP_ENTRY_CFG_RESET(7);
|
||||||
PMP_ENTRY_CFG_RESET(8);
|
PMP_ENTRY_CFG_RESET(8);
|
||||||
PMP_ENTRY_SET(6, SOC_IROM_LOW, NONE);
|
PMP_ENTRY_SET(6, SOC_IROM_LOW, NONE);
|
||||||
PMP_ENTRY_SET(7, irom_resv_end, PMP_TOR | RX);
|
PMP_ENTRY_SET(7, page_aligned_irom_resv_end, PMP_TOR | RX);
|
||||||
PMP_ENTRY_SET(8, drom_resv_end, PMP_TOR | R);
|
PMP_ENTRY_SET(8, page_aligned_drom_resv_end, PMP_TOR | R);
|
||||||
|
#endif /* CONFIG_SPIRAM_XIP_FROM_PSRAM && CONFIG_SPIRAM_PRE_CONFIGURE_MEMORY_PROTECTION */
|
||||||
#else
|
#else
|
||||||
// 5. I_Cache / D_Cache (flash)
|
// 5. I_Cache / D_Cache (flash)
|
||||||
const uint32_t pmpaddr6 = PMPADDR_NAPOT(SOC_IROM_LOW, SOC_IROM_HIGH);
|
const uint32_t pmpaddr6 = PMPADDR_NAPOT(SOC_IROM_LOW, SOC_IROM_HIGH);
|
||||||
@ -215,24 +237,24 @@ void esp_cpu_configure_region_protection(void)
|
|||||||
/* Reset the corresponding PMP config because PMP_ENTRY_SET only sets the given bits
|
/* Reset the corresponding PMP config because PMP_ENTRY_SET only sets the given bits
|
||||||
* Bootloader might have given extra permissions and those won't be cleared
|
* Bootloader might have given extra permissions and those won't be cleared
|
||||||
*/
|
*/
|
||||||
PMP_ENTRY_CFG_RESET(9);
|
|
||||||
PMP_ENTRY_CFG_RESET(10);
|
|
||||||
PMP_ENTRY_CFG_RESET(11);
|
PMP_ENTRY_CFG_RESET(11);
|
||||||
PMP_ENTRY_CFG_RESET(12);
|
PMP_ENTRY_CFG_RESET(12);
|
||||||
PMP_ENTRY_SET(9, SOC_RTC_IRAM_LOW, NONE);
|
PMP_ENTRY_CFG_RESET(13);
|
||||||
|
PMP_ENTRY_CFG_RESET(14);
|
||||||
|
PMP_ENTRY_SET(11, SOC_RTC_IRAM_LOW, NONE);
|
||||||
// First part of LP mem is reserved for RTC reserved mem (shared between bootloader and app)
|
// First part of LP mem is reserved for RTC reserved mem (shared between bootloader and app)
|
||||||
// as well as memory for ULP coprocessor
|
// as well as memory for ULP coprocessor
|
||||||
PMP_ENTRY_SET(10, (int)&_rtc_text_start, PMP_TOR | RW);
|
PMP_ENTRY_SET(12, (int)&_rtc_text_start, PMP_TOR | RW);
|
||||||
PMP_ENTRY_SET(11, (int)&_rtc_text_end, PMP_TOR | RX);
|
PMP_ENTRY_SET(13, (int)&_rtc_text_end, PMP_TOR | RX);
|
||||||
PMP_ENTRY_SET(12, SOC_RTC_IRAM_HIGH, PMP_TOR | RW);
|
PMP_ENTRY_SET(14, SOC_RTC_IRAM_HIGH, PMP_TOR | RW);
|
||||||
#else
|
#else
|
||||||
const uint32_t pmpaddr9 = PMPADDR_NAPOT(SOC_RTC_IRAM_LOW, SOC_RTC_IRAM_HIGH);
|
const uint32_t pmpaddr11 = PMPADDR_NAPOT(SOC_RTC_IRAM_LOW, SOC_RTC_IRAM_HIGH);
|
||||||
PMP_ENTRY_SET(9, pmpaddr9, PMP_NAPOT | CONDITIONAL_RWX);
|
PMP_ENTRY_SET(11, pmpaddr11, PMP_NAPOT | CONDITIONAL_RWX);
|
||||||
_Static_assert(SOC_RTC_IRAM_LOW < SOC_RTC_IRAM_HIGH, "Invalid RTC IRAM region");
|
_Static_assert(SOC_RTC_IRAM_LOW < SOC_RTC_IRAM_HIGH, "Invalid RTC IRAM region");
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
// 7. Peripheral addresses
|
// 7. Peripheral addresses
|
||||||
const uint32_t pmpaddr13 = PMPADDR_NAPOT(SOC_PERIPHERAL_LOW, SOC_PERIPHERAL_HIGH);
|
const uint32_t pmpaddr15 = PMPADDR_NAPOT(SOC_PERIPHERAL_LOW, SOC_PERIPHERAL_HIGH);
|
||||||
PMP_ENTRY_SET(13, pmpaddr13, PMP_NAPOT | RW);
|
PMP_ENTRY_SET(15, pmpaddr15, PMP_NAPOT | RW);
|
||||||
_Static_assert(SOC_PERIPHERAL_LOW < SOC_PERIPHERAL_HIGH, "Invalid peripheral region");
|
_Static_assert(SOC_PERIPHERAL_LOW < SOC_PERIPHERAL_HIGH, "Invalid peripheral region");
|
||||||
}
|
}
|
||||||
|
@ -10,6 +10,30 @@ config SPIRAM_BOOT_INIT
|
|||||||
have specific requirements, you'll want to leave this enabled so memory allocated
|
have specific requirements, you'll want to leave this enabled so memory allocated
|
||||||
during boot-up can also be placed in SPI RAM.
|
during boot-up can also be placed in SPI RAM.
|
||||||
|
|
||||||
|
config SPIRAM_PRE_CONFIGURE_MEMORY_PROTECTION
|
||||||
|
bool "Pre-configure memory protection for PSRAM"
|
||||||
|
default y if SPIRAM_BOOT_INIT
|
||||||
|
default n
|
||||||
|
depends on SPIRAM
|
||||||
|
help
|
||||||
|
If this is enabled, the PSRAM will be pre-configured for memory protection during initial boot.
|
||||||
|
This configuration takes into consideration the PSRAM memory configurations that are performed
|
||||||
|
by ESP-IDF's default PSRAM initialization function, esp_psram_init().
|
||||||
|
Thus, the config is enabled by default when SPIRAM_BOOT_INIT is enabled,
|
||||||
|
because the function esp_psram_init() would be called in the startup code.
|
||||||
|
|
||||||
|
In case you wish to disable SPIRAM_BOOT_INIT just for delaying the PSRAM initialization and plan
|
||||||
|
to use the ESP-IDF's default PSRAM initialization function, esp_psram_init() in the application code,
|
||||||
|
you should still enable this config to enable memory protection for the PSRAM.
|
||||||
|
|
||||||
|
Note that enabling this config also considers that the rest of the PSRAM memory that is left after
|
||||||
|
the memory configurations are performed by esp_psram_init(), can be allocated to the heap using the function
|
||||||
|
esp_psram_extram_add_to_heap_allocator(), thus configures this region with heap memory protection (RW).
|
||||||
|
|
||||||
|
As an advanced usage, if you plan to initialize the PSRAM memory regions manually by yourself without
|
||||||
|
using the function esp_psram_init(), you should disable this config to avoid any memory protection and
|
||||||
|
usage conflicts.
|
||||||
|
|
||||||
config SPIRAM_IGNORE_NOTFOUND
|
config SPIRAM_IGNORE_NOTFOUND
|
||||||
bool "Ignore PSRAM when not found"
|
bool "Ignore PSRAM when not found"
|
||||||
default "n"
|
default "n"
|
||||||
|
@ -592,3 +592,84 @@ void esp_psram_bss_init(void)
|
|||||||
memset(&_ext_ram_bss_start, 0, size);
|
memset(&_ext_ram_bss_start, 0, size);
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#if CONFIG_SPIRAM_PRE_CONFIGURE_MEMORY_PROTECTION
|
||||||
|
static inline uint32_t s_get_ext_bss_size(void)
|
||||||
|
{
|
||||||
|
#if CONFIG_SPIRAM_ALLOW_BSS_SEG_EXTERNAL_MEMORY
|
||||||
|
return ((intptr_t)&_ext_ram_bss_end - (intptr_t)&_ext_ram_bss_start);
|
||||||
|
#else
|
||||||
|
return 0;
|
||||||
|
#endif /* CONFIG_SPIRAM_ALLOW_BSS_SEG_EXTERNAL_MEMORY */
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline uint32_t s_get_ext_noinit_size(void)
|
||||||
|
{
|
||||||
|
#if CONFIG_SPIRAM_ALLOW_NOINIT_SEG_EXTERNAL_MEMORY
|
||||||
|
return ((intptr_t)&_ext_ram_noinit_end - (intptr_t)&_ext_ram_noinit_start);
|
||||||
|
#else
|
||||||
|
return 0;
|
||||||
|
#endif /* CONFIG_SPIRAM_ALLOW_NOINIT_SEG_EXTERNAL_MEMORY */
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @brief Calculates the effective PSRAM memory that would be / is mapped.
|
||||||
|
*
|
||||||
|
* @return The size of PSRAM memory that would be / is mapped in bytes, or 0 if PSRAM isn't successfully initialized
|
||||||
|
*/
|
||||||
|
static size_t esp_psram_get_effective_mapped_size(void)
|
||||||
|
{
|
||||||
|
size_t byte_aligned_size = 0;
|
||||||
|
size_t total_mapped_size = 0;
|
||||||
|
|
||||||
|
if (s_psram_ctx.is_initialised) {
|
||||||
|
return s_psram_ctx.mapped_regions[PSRAM_MEM_8BIT_ALIGNED].size + s_psram_ctx.mapped_regions[PSRAM_MEM_32BIT_ALIGNED].size;
|
||||||
|
} else {
|
||||||
|
uint32_t psram_available_size = 0;
|
||||||
|
esp_err_t ret = esp_psram_impl_get_available_size(&psram_available_size);
|
||||||
|
assert(ret == ESP_OK);
|
||||||
|
|
||||||
|
#if CONFIG_SPIRAM_RODATA
|
||||||
|
psram_available_size -= mmu_psram_get_rodata_segment_length();
|
||||||
|
#endif /* CONFIG_SPIRAM_RODATA */
|
||||||
|
|
||||||
|
#if CONFIG_SPIRAM_FETCH_INSTRUCTIONS
|
||||||
|
psram_available_size -= mmu_psram_get_text_segment_length();
|
||||||
|
#endif /* CONFIG_SPIRAM_FETCH_INSTRUCTIONS */
|
||||||
|
|
||||||
|
ret = esp_mmu_map_get_max_consecutive_free_block_size(MMU_MEM_CAP_READ | MMU_MEM_CAP_WRITE | MMU_MEM_CAP_8BIT | MMU_MEM_CAP_32BIT, MMU_TARGET_PSRAM0, &byte_aligned_size);
|
||||||
|
assert(ret == ESP_OK);
|
||||||
|
total_mapped_size += MIN(byte_aligned_size, psram_available_size - total_mapped_size);
|
||||||
|
|
||||||
|
#if CONFIG_IDF_TARGET_ESP32S2
|
||||||
|
if (total_mapped_size < psram_available_size) {
|
||||||
|
size_t word_aligned_size = 0;
|
||||||
|
ret = esp_mmu_map_get_max_consecutive_free_block_size(MMU_MEM_CAP_READ | MMU_MEM_CAP_WRITE | MMU_MEM_CAP_32BIT, MMU_TARGET_PSRAM0, &word_aligned_size);
|
||||||
|
assert(ret == ESP_OK);
|
||||||
|
total_mapped_size += MIN(word_aligned_size, psram_available_size - total_mapped_size);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
return total_mapped_size;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
size_t esp_psram_get_heap_size_to_protect(void)
|
||||||
|
{
|
||||||
|
if (s_psram_ctx.is_initialised) {
|
||||||
|
return s_psram_ctx.regions_to_heap[PSRAM_MEM_8BIT_ALIGNED].size + s_psram_ctx.regions_to_heap[PSRAM_MEM_32BIT_ALIGNED].size;
|
||||||
|
} else {
|
||||||
|
size_t effective_mapped_size = esp_psram_get_effective_mapped_size();
|
||||||
|
if (effective_mapped_size == 0) {
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
effective_mapped_size -= s_get_ext_bss_size();
|
||||||
|
effective_mapped_size -= s_get_ext_noinit_size();
|
||||||
|
|
||||||
|
#if CONFIG_IDF_TARGET_ESP32
|
||||||
|
effective_mapped_size -= esp_himem_reserved_area_size() - 1;
|
||||||
|
#endif
|
||||||
|
return effective_mapped_size;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif /* CONFIG_SPIRAM_PRE_CONFIGURE_MEMORY_PROTECTION */
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* SPDX-FileCopyrightText: 2022-2024 Espressif Systems (Shanghai) CO LTD
|
* SPDX-FileCopyrightText: 2022-2025 Espressif Systems (Shanghai) CO LTD
|
||||||
*
|
*
|
||||||
* SPDX-License-Identifier: Apache-2.0
|
* SPDX-License-Identifier: Apache-2.0
|
||||||
*/
|
*/
|
||||||
@ -60,6 +60,18 @@ bool esp_psram_extram_test(void);
|
|||||||
*/
|
*/
|
||||||
void esp_psram_bss_init(void);
|
void esp_psram_bss_init(void);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @brief Calculates the effective PSRAM memory that would be / is added into the heap.
|
||||||
|
*
|
||||||
|
* @return The size of PSRAM memory that would be / is added into the heap in bytes, or 0 if PSRAM hardware isn't successfully initialized
|
||||||
|
* @note The function pre-calculates the effective size of the PSRAM memory that would be added into the heap after performing the XIP or
|
||||||
|
* ext bss and ext noinit considerations, thus, even if the function is called before esp_psram_init(), it will return the final
|
||||||
|
* effective size of the PSRAM memory that would have been added into the heap after esp_psram_init() is performed
|
||||||
|
* instead of the vanilla size of the PSRAM memory.
|
||||||
|
* This function is only available if CONFIG_SPIRAM_PRE_CONFIGURE_MEMORY_PROTECTION is enabled.
|
||||||
|
*/
|
||||||
|
size_t esp_psram_get_heap_size_to_protect(void);
|
||||||
|
|
||||||
#if CONFIG_IDF_TARGET_ESP32
|
#if CONFIG_IDF_TARGET_ESP32
|
||||||
/**
|
/**
|
||||||
* @brief Force a writeback of the data in the PSRAM cache. This is to be called whenever
|
* @brief Force a writeback of the data in the PSRAM cache. This is to be called whenever
|
||||||
|
@ -295,6 +295,11 @@ SECTIONS
|
|||||||
*/
|
*/
|
||||||
. += _esp_flash_mmap_prefetch_pad_size;
|
. += _esp_flash_mmap_prefetch_pad_size;
|
||||||
|
|
||||||
|
#if CONFIG_SPIRAM_FETCH_INSTRUCTIONS
|
||||||
|
/* Align the end of flash text region as per PMP granularity */
|
||||||
|
. = ALIGN(_esp_pmp_align_size);
|
||||||
|
#endif // CONFIG_SPIRAM_FETCH_INSTRUCTIONS
|
||||||
|
|
||||||
_text_end = ABSOLUTE(.);
|
_text_end = ABSOLUTE(.);
|
||||||
/**
|
/**
|
||||||
* Mark the flash.text end.
|
* Mark the flash.text end.
|
||||||
@ -444,6 +449,12 @@ SECTIONS
|
|||||||
*(.tdata .tdata.* .gnu.linkonce.td.*)
|
*(.tdata .tdata.* .gnu.linkonce.td.*)
|
||||||
|
|
||||||
. = ALIGN(ALIGNOF(.flash.tbss));
|
. = ALIGN(ALIGNOF(.flash.tbss));
|
||||||
|
|
||||||
|
#if CONFIG_SPIRAM_RODATA
|
||||||
|
/* Align the end of flash rodata region as per PMP granularity */
|
||||||
|
. = ALIGN(_esp_pmp_align_size);
|
||||||
|
#endif // CONFIG_SPIRAM_RODATA
|
||||||
|
|
||||||
_thread_local_data_end = ABSOLUTE(.);
|
_thread_local_data_end = ABSOLUTE(.);
|
||||||
} > rodata_seg_low
|
} > rodata_seg_low
|
||||||
ASSERT_SECTIONS_GAP(.flash.tdata, .flash.tbss)
|
ASSERT_SECTIONS_GAP(.flash.tdata, .flash.tbss)
|
||||||
|
@ -44,6 +44,10 @@ void test_rtc_slow_reg2_execute_violation(void);
|
|||||||
|
|
||||||
void test_irom_reg_write_violation(void);
|
void test_irom_reg_write_violation(void);
|
||||||
|
|
||||||
|
void test_spiram_xip_irom_alignment_reg_execute_violation(void);
|
||||||
|
|
||||||
|
void test_spiram_xip_drom_alignment_reg_execute_violation(void);
|
||||||
|
|
||||||
void test_drom_reg_write_violation(void);
|
void test_drom_reg_write_violation(void);
|
||||||
|
|
||||||
void test_drom_reg_execute_violation(void);
|
void test_drom_reg_execute_violation(void);
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* SPDX-FileCopyrightText: 2022-2024 Espressif Systems (Shanghai) CO LTD
|
* SPDX-FileCopyrightText: 2022-2025 Espressif Systems (Shanghai) CO LTD
|
||||||
*
|
*
|
||||||
* SPDX-License-Identifier: Apache-2.0
|
* SPDX-License-Identifier: Apache-2.0
|
||||||
*/
|
*/
|
||||||
@ -18,6 +18,9 @@
|
|||||||
#include "test_panic.h"
|
#include "test_panic.h"
|
||||||
#include "test_memprot.h"
|
#include "test_memprot.h"
|
||||||
|
|
||||||
|
#include "sdkconfig.h"
|
||||||
|
#include "soc/soc_caps.h"
|
||||||
|
|
||||||
/* Test Utility Functions */
|
/* Test Utility Functions */
|
||||||
|
|
||||||
#define BOOT_CMD_MAX_LEN (128)
|
#define BOOT_CMD_MAX_LEN (128)
|
||||||
@ -170,6 +173,13 @@ void app_main(void)
|
|||||||
HANDLE_TEST(test_name, test_irom_reg_write_violation);
|
HANDLE_TEST(test_name, test_irom_reg_write_violation);
|
||||||
HANDLE_TEST(test_name, test_drom_reg_write_violation);
|
HANDLE_TEST(test_name, test_drom_reg_write_violation);
|
||||||
HANDLE_TEST(test_name, test_drom_reg_execute_violation);
|
HANDLE_TEST(test_name, test_drom_reg_execute_violation);
|
||||||
|
#if CONFIG_SPIRAM_FETCH_INSTRUCTIONS && SOC_MMU_DI_VADDR_SHARED
|
||||||
|
HANDLE_TEST(test_name, test_spiram_xip_irom_alignment_reg_execute_violation);
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if CONFIG_SPIRAM_RODATA && !CONFIG_IDF_TARGET_ESP32S2
|
||||||
|
HANDLE_TEST(test_name, test_spiram_xip_drom_alignment_reg_execute_violation);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef CONFIG_SOC_CPU_HAS_PMA
|
#ifdef CONFIG_SOC_CPU_HAS_PMA
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* SPDX-FileCopyrightText: 2021-2024 Espressif Systems (Shanghai) CO LTD
|
* SPDX-FileCopyrightText: 2021-2025 Espressif Systems (Shanghai) CO LTD
|
||||||
*
|
*
|
||||||
* SPDX-License-Identifier: Apache-2.0
|
* SPDX-License-Identifier: Apache-2.0
|
||||||
*/
|
*/
|
||||||
@ -13,6 +13,7 @@
|
|||||||
#include "esp_system.h"
|
#include "esp_system.h"
|
||||||
#include "esp_log.h"
|
#include "esp_log.h"
|
||||||
#include "soc/soc.h"
|
#include "soc/soc.h"
|
||||||
|
#include "soc/soc_caps.h"
|
||||||
|
|
||||||
#include "test_memprot.h"
|
#include "test_memprot.h"
|
||||||
#include "sdkconfig.h"
|
#include "sdkconfig.h"
|
||||||
@ -24,6 +25,8 @@ extern int _iram_start;
|
|||||||
extern int _iram_text_start;
|
extern int _iram_text_start;
|
||||||
extern int _iram_text_end;
|
extern int _iram_text_end;
|
||||||
|
|
||||||
|
#define ALIGN_UP_TO_MMU_PAGE_SIZE(addr) (((addr) + (SOC_MMU_PAGE_SIZE) - 1) & ~((SOC_MMU_PAGE_SIZE) - 1))
|
||||||
|
|
||||||
/* NOTE: Naming conventions for RTC_FAST_MEM are
|
/* NOTE: Naming conventions for RTC_FAST_MEM are
|
||||||
* different for ESP32-C3 and other RISC-V targets
|
* different for ESP32-C3 and other RISC-V targets
|
||||||
*/
|
*/
|
||||||
@ -245,8 +248,37 @@ void test_drom_reg_execute_violation(void)
|
|||||||
func_ptr = (void(*)(void))foo_buf;
|
func_ptr = (void(*)(void))foo_buf;
|
||||||
func_ptr();
|
func_ptr();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Check if the memory alignment gaps added to the heap are correctly configured
|
||||||
|
#if CONFIG_SPIRAM_FETCH_INSTRUCTIONS && SOC_MMU_DI_VADDR_SHARED
|
||||||
|
void test_spiram_xip_irom_alignment_reg_execute_violation(void)
|
||||||
|
{
|
||||||
|
extern int _instruction_reserved_end;
|
||||||
|
if (ALIGN_UP_TO_MMU_PAGE_SIZE((uint32_t)(&_instruction_reserved_end)) - (uint32_t)(&_instruction_reserved_end) >= 4) {
|
||||||
|
void (*test_addr)(void) = (void(*)(void))((uint32_t)(&_instruction_reserved_end + 0x4));
|
||||||
|
printf("SPIRAM (IROM): Execute operation | Address: %p\n", test_addr);
|
||||||
|
test_addr();
|
||||||
|
} else {
|
||||||
|
printf("SPIRAM (IROM): IROM alignment gap not added into heap\n");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif /* CONFIG_SPIRAM_FETCH_INSTRUCTIONS && SOC_MMU_DI_VADDR_SHARED */
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#if CONFIG_SPIRAM_RODATA && !CONFIG_IDF_TARGET_ESP32S2
|
||||||
|
void test_spiram_xip_drom_alignment_reg_execute_violation(void)
|
||||||
|
{
|
||||||
|
extern int _rodata_reserved_end;
|
||||||
|
if (ALIGN_UP_TO_MMU_PAGE_SIZE((uint32_t)(&_rodata_reserved_end)) - (uint32_t)(&_rodata_reserved_end) >= 4) {
|
||||||
|
void (*test_addr)(void) = (void(*)(void))((uint32_t)(&_rodata_reserved_end + 0x4));
|
||||||
|
printf("SPIRAM (DROM): Execute operation | Address: %p\n", test_addr);
|
||||||
|
test_addr();
|
||||||
|
} else {
|
||||||
|
printf("SPIRAM (DROM): DROM alignment gap not added into heap\n");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif /* CONFIG_SPIRAM_RODATA && !CONFIG_IDF_TARGET_ESP32S2 */
|
||||||
|
|
||||||
#ifdef CONFIG_SOC_CPU_HAS_PMA
|
#ifdef CONFIG_SOC_CPU_HAS_PMA
|
||||||
void test_invalid_memory_region_write_violation(void)
|
void test_invalid_memory_region_write_violation(void)
|
||||||
{
|
{
|
||||||
|
@ -157,7 +157,8 @@ def common_test(dut: PanicTestDut, config: str, expected_backtrace: Optional[Lis
|
|||||||
dut.revert_log_level()
|
dut.revert_log_level()
|
||||||
return # don't expect "Rebooting" output below
|
return # don't expect "Rebooting" output below
|
||||||
|
|
||||||
# We will only perform comparisons for ELF files, as we are not introducing any new fields to the binary file format.
|
# We will only perform comparisons for ELF files,
|
||||||
|
# as we are not introducing any new fields to the binary file format.
|
||||||
if 'bin' in config:
|
if 'bin' in config:
|
||||||
expected_coredump = None
|
expected_coredump = None
|
||||||
|
|
||||||
@ -751,6 +752,15 @@ CONFIGS_MEMPROT_FLASH_IDROM = [
|
|||||||
pytest.param('memprot_esp32p4', marks=[pytest.mark.esp32p4])
|
pytest.param('memprot_esp32p4', marks=[pytest.mark.esp32p4])
|
||||||
]
|
]
|
||||||
|
|
||||||
|
CONFIGS_MEMPROT_SPIRAM_XIP_IROM_ALIGNMENT_HEAP = [
|
||||||
|
pytest.param('memprot_spiram_xip_esp32p4', marks=[pytest.mark.esp32p4])
|
||||||
|
]
|
||||||
|
|
||||||
|
CONFIGS_MEMPROT_SPIRAM_XIP_DROM_ALIGNMENT_HEAP = [
|
||||||
|
pytest.param('memprot_spiram_xip_esp32s3', marks=[pytest.mark.esp32s3]),
|
||||||
|
pytest.param('memprot_spiram_xip_esp32p4', marks=[pytest.mark.esp32p4])
|
||||||
|
]
|
||||||
|
|
||||||
CONFIGS_MEMPROT_INVALID_REGION_PROTECTION_USING_PMA = [
|
CONFIGS_MEMPROT_INVALID_REGION_PROTECTION_USING_PMA = [
|
||||||
pytest.param('memprot_esp32c6', marks=[pytest.mark.esp32c6]),
|
pytest.param('memprot_esp32c6', marks=[pytest.mark.esp32c6]),
|
||||||
pytest.param('memprot_esp32h2', marks=[pytest.mark.esp32h2]),
|
pytest.param('memprot_esp32h2', marks=[pytest.mark.esp32h2]),
|
||||||
@ -1020,8 +1030,35 @@ def test_drom_reg_execute_violation(dut: PanicTestDut, test_func_name: str) -> N
|
|||||||
dut.expect_cpu_reset()
|
dut.expect_cpu_reset()
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.parametrize('config', CONFIGS_MEMPROT_INVALID_REGION_PROTECTION_USING_PMA, indirect=True)
|
@pytest.mark.parametrize('config', CONFIGS_MEMPROT_SPIRAM_XIP_IROM_ALIGNMENT_HEAP, indirect=True)
|
||||||
@pytest.mark.generic
|
@pytest.mark.generic
|
||||||
|
def test_spiram_xip_irom_alignment_reg_execute_violation(dut: PanicTestDut, test_func_name: str) -> None:
|
||||||
|
dut.run_test_func(test_func_name)
|
||||||
|
try:
|
||||||
|
dut.expect_gme('Instruction access fault')
|
||||||
|
except Exception:
|
||||||
|
dut.expect_exact('SPIRAM (IROM): IROM alignment gap not added into heap')
|
||||||
|
dut.expect_reg_dump(0)
|
||||||
|
dut.expect_cpu_reset()
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('config', CONFIGS_MEMPROT_SPIRAM_XIP_DROM_ALIGNMENT_HEAP, indirect=True)
|
||||||
|
@pytest.mark.generic
|
||||||
|
def test_spiram_xip_drom_alignment_reg_execute_violation(dut: PanicTestDut, test_func_name: str) -> None:
|
||||||
|
dut.run_test_func(test_func_name)
|
||||||
|
try:
|
||||||
|
if dut.target == 'esp32s3':
|
||||||
|
dut.expect_gme('InstructionFetchError')
|
||||||
|
else:
|
||||||
|
dut.expect_gme('Instruction access fault')
|
||||||
|
except Exception:
|
||||||
|
dut.expect_exact('SPIRAM (DROM): DROM alignment gap not added into heap')
|
||||||
|
dut.expect_reg_dump(0)
|
||||||
|
dut.expect_cpu_reset()
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.generic
|
||||||
|
@pytest.mark.parametrize('config', CONFIGS_MEMPROT_INVALID_REGION_PROTECTION_USING_PMA, indirect=True)
|
||||||
def test_invalid_memory_region_write_violation(dut: PanicTestDut, test_func_name: str) -> None:
|
def test_invalid_memory_region_write_violation(dut: PanicTestDut, test_func_name: str) -> None:
|
||||||
dut.run_test_func(test_func_name)
|
dut.run_test_func(test_func_name)
|
||||||
dut.expect_gme('Store access fault')
|
dut.expect_gme('Store access fault')
|
||||||
|
@ -6,3 +6,7 @@ CONFIG_ESP_SYSTEM_PMP_IDRAM_SPLIT=y
|
|||||||
|
|
||||||
# Enable memprot test
|
# Enable memprot test
|
||||||
CONFIG_TEST_MEMPROT=y
|
CONFIG_TEST_MEMPROT=y
|
||||||
|
|
||||||
|
# Enable SPIRAM to check the alignment gap's memory protection
|
||||||
|
CONFIG_SPIRAM=y
|
||||||
|
CONFIG_SPIRAM_USE_CAPS_ALLOC=y
|
||||||
|
@ -0,0 +1,13 @@
|
|||||||
|
# Restricting to ESP32P4
|
||||||
|
CONFIG_IDF_TARGET="esp32p4"
|
||||||
|
|
||||||
|
# Enabling memory protection
|
||||||
|
CONFIG_ESP_SYSTEM_PMP_IDRAM_SPLIT=y
|
||||||
|
|
||||||
|
# Enable memprot test
|
||||||
|
CONFIG_TEST_MEMPROT=y
|
||||||
|
|
||||||
|
# Enable SPIRAM to check the alignment gap's memory protection
|
||||||
|
CONFIG_SPIRAM=y
|
||||||
|
CONFIG_SPIRAM_USE_CAPS_ALLOC=y
|
||||||
|
CONFIG_SPIRAM_XIP_FROM_PSRAM=y
|
@ -0,0 +1,17 @@
|
|||||||
|
# Restricting to ESP32S3
|
||||||
|
CONFIG_IDF_TARGET="esp32s3"
|
||||||
|
|
||||||
|
# Enabling memory protection
|
||||||
|
CONFIG_ESP_SYSTEM_MEMPROT_FEATURE=y
|
||||||
|
CONFIG_ESP_SYSTEM_MEMPROT_FEATURE_LOCK=y
|
||||||
|
|
||||||
|
# Enabling DCACHE
|
||||||
|
CONFIG_ESP32S3_DATA_CACHE_16KB=y
|
||||||
|
|
||||||
|
# Enable memprot test
|
||||||
|
CONFIG_TEST_MEMPROT=y
|
||||||
|
|
||||||
|
# Enable SPIRAM to check the alignment gap's memory protection
|
||||||
|
CONFIG_SPIRAM=y
|
||||||
|
CONFIG_SPIRAM_USE_CAPS_ALLOC=y
|
||||||
|
CONFIG_SPIRAM_XIP_FROM_PSRAM=y
|
Reference in New Issue
Block a user