FreeRTOS Support Archive
The FreeRTOS support forum is used to obtain active support directly from Real
Time Engineers Ltd. In return for using our top quality software and services for
free, we request you play fair and do your bit to help others too! Sign up
to receive notifications of new support topics then help where you can.
This is a read only archive of threads posted to the FreeRTOS support forum.
The archive is updated every week, so will not always contain the very latest posts.
Use these archive pages to search previous posts. Use the Live FreeRTOS Forum
link to reply to a post, or start a new support thread.
[FreeRTOS Home] [Live FreeRTOS Forum] [FAQ] [Archive Top] [October 2016 Threads] Question about MPU default configurationPosted by mpu-user on October 14, 2016 Hello,
I was looking at the default MPU configuration for ARM Cortex M-4 microcontrollers in FreeRTOS, I have the following questions regarding it:
It seems that the configuration for the priviliged data is (rwx for priviliged only) and the user stack is (rwx). This means that malicous code injection is possible, I am wondering what is the reason behind this configuration?(why is write XOR execute not enforced)
Thanks
Question about MPU default configurationPosted by rtel on October 14, 2016 Are you referring to the fact that portMPUREGIONPRIVILEGEDREADWRITE
sets the AP field of the MPU_RASR register to 1, but leaves XN at 0?
It is feasible that a legitimate program would want to copy executable
code to, and then execute that code from, the privileged RAM. As an
example, that would be necessary if the application was re-programming
the flash memory, making execution from flash temporarily impossible.
An unprivileged application could not write executable code to the
privileged RAM though (I'm not sure if unprivileged code could execute
code from privileged RAM it didn't have read access to though, I would
have to check the documentation).
Question about MPU default configurationPosted by mpu-user on October 17, 2016 I know from ARM's documents to execute code read access is required, so unprivileged code will not be able to execute code from privileged RAM. However, it looks like for the default configuration an unprivileged thread is able to write code to unprivileged RAM and then execute it. Is there anything preventing this?
Question about MPU default configurationPosted by davedoors on October 17, 2016 I think unprivileged code would expect to be able to write and execute from unprivileged RAM, doing so would not give it the ability to do anything more than it could do already. It could not make itself privileged by doing that.
Copyright (C) Amazon Web Services, Inc. or its affiliates. All rights reserved.
|