| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354 |
- /*
- * SPDX-FileCopyrightText: 2015-2022 Espressif Systems (Shanghai) CO LTD
- *
- * SPDX-License-Identifier: Apache-2.0
- */
- #include "riscv/rvruntime-frames.h"
- #include "esp_private/panic_internal.h"
- #define MCAUSE_ILLEGAL_INSTRUCTION 2
- extern void esp_panic_handler(panic_info_t *info);
- volatile bool g_override_illegal_instruction = false;
- void __real_esp_panic_handler(panic_info_t *info);
- void __real_esp_cpu_stall(int core_id);
- void return_from_panic_handler(RvExcFrame *frm) __attribute__((noreturn));
- /* Memprot test specific IllegalInstruction exception handler:
- * when testing the protection against a code execution, sample code
- * is being injected into various memory regions which produces
- * Illegal instruction on execution attempt. Such a result is expected
- * but it causes system reboot in the standard panic handler.
- * The following variant of panic handling simply returns back to the
- * next instruction and continues normal execution.
- *
- * NOTE: if Illegal instruction comes from a different source than the testing code
- * the behavior is undefined
- * */
- void __wrap_esp_panic_handler(panic_info_t *info)
- {
- RvExcFrame *frm = (RvExcFrame *)info->frame;
- if ( frm->mcause == MCAUSE_ILLEGAL_INSTRUCTION && g_override_illegal_instruction == true ) {
- /* Return from exception to the return address that called the faulting function.
- */
- frm->mepc = frm->ra;
- /* Restore the CPU state and return from the exception.
- */
- return_from_panic_handler(frm);
- } else {
- __real_esp_panic_handler(info);
- }
- }
- void __wrap_esp_cpu_stall(int core_id)
- {
- if ( g_override_illegal_instruction == true ) {
- return;
- } else {
- __real_esp_cpu_stall(core_id);
- }
- }
|