mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
ci(memprot): enable memory protection tests for ESP32-C61
This commit is contained in:
parent
84791fce2f
commit
fcd751e79c
@ -628,13 +628,14 @@ def test_panic_delay(dut: PanicTestDut) -> None:
|
|||||||
#########################
|
#########################
|
||||||
|
|
||||||
# Memprot-related tests are supported only on targets with PMS/PMA peripheral;
|
# Memprot-related tests are supported only on targets with PMS/PMA peripheral;
|
||||||
# currently ESP32-S2, ESP32-C3, ESP32-C2, ESP32-H2, ESP32-C6, ESP32-P4 and ESP32-C5 are supported
|
# currently ESP32-S2, ESP32-C3, ESP32-C2, ESP32-H2, ESP32-C6, ESP32-P4, ESP32-C5 and ESP32-C61 are supported
|
||||||
CONFIGS_MEMPROT_IDRAM = [
|
CONFIGS_MEMPROT_IDRAM = [
|
||||||
pytest.param('memprot_esp32s2', marks=[pytest.mark.esp32s2]),
|
pytest.param('memprot_esp32s2', marks=[pytest.mark.esp32s2]),
|
||||||
pytest.param('memprot_esp32c3', marks=[pytest.mark.esp32c3]),
|
pytest.param('memprot_esp32c3', marks=[pytest.mark.esp32c3]),
|
||||||
pytest.param('memprot_esp32c2', marks=[pytest.mark.esp32c2]),
|
pytest.param('memprot_esp32c2', marks=[pytest.mark.esp32c2]),
|
||||||
pytest.param('memprot_esp32c5', marks=[pytest.mark.esp32c5]),
|
pytest.param('memprot_esp32c5', marks=[pytest.mark.esp32c5]),
|
||||||
pytest.param('memprot_esp32c6', marks=[pytest.mark.esp32c6]),
|
pytest.param('memprot_esp32c6', marks=[pytest.mark.esp32c6]),
|
||||||
|
pytest.param('memprot_esp32c61', marks=[pytest.mark.esp32c61]),
|
||||||
pytest.param('memprot_esp32h2', marks=[pytest.mark.esp32h2]),
|
pytest.param('memprot_esp32h2', marks=[pytest.mark.esp32h2]),
|
||||||
pytest.param('memprot_esp32p4', marks=[pytest.mark.esp32p4])
|
pytest.param('memprot_esp32p4', marks=[pytest.mark.esp32p4])
|
||||||
]
|
]
|
||||||
@ -659,6 +660,7 @@ CONFIGS_MEMPROT_RTC_SLOW_MEM = [
|
|||||||
CONFIGS_MEMPROT_FLASH_IDROM = [
|
CONFIGS_MEMPROT_FLASH_IDROM = [
|
||||||
pytest.param('memprot_esp32c5', marks=[pytest.mark.esp32c5]),
|
pytest.param('memprot_esp32c5', marks=[pytest.mark.esp32c5]),
|
||||||
pytest.param('memprot_esp32c6', marks=[pytest.mark.esp32c6]),
|
pytest.param('memprot_esp32c6', marks=[pytest.mark.esp32c6]),
|
||||||
|
pytest.param('memprot_esp32c61', marks=[pytest.mark.esp32c61]),
|
||||||
pytest.param('memprot_esp32h2', marks=[pytest.mark.esp32h2]),
|
pytest.param('memprot_esp32h2', marks=[pytest.mark.esp32h2]),
|
||||||
pytest.param('memprot_esp32p4', marks=[pytest.mark.esp32p4])
|
pytest.param('memprot_esp32p4', marks=[pytest.mark.esp32p4])
|
||||||
]
|
]
|
||||||
@ -666,6 +668,7 @@ CONFIGS_MEMPROT_FLASH_IDROM = [
|
|||||||
CONFIGS_MEMPROT_INVALID_REGION_PROTECTION_USING_PMA = [
|
CONFIGS_MEMPROT_INVALID_REGION_PROTECTION_USING_PMA = [
|
||||||
pytest.param('memprot_esp32c5', marks=[pytest.mark.esp32c5]),
|
pytest.param('memprot_esp32c5', marks=[pytest.mark.esp32c5]),
|
||||||
pytest.param('memprot_esp32c6', marks=[pytest.mark.esp32c6]),
|
pytest.param('memprot_esp32c6', marks=[pytest.mark.esp32c6]),
|
||||||
|
pytest.param('memprot_esp32c61', marks=[pytest.mark.esp32c61]),
|
||||||
pytest.param('memprot_esp32h2', marks=[pytest.mark.esp32h2]),
|
pytest.param('memprot_esp32h2', marks=[pytest.mark.esp32h2]),
|
||||||
pytest.param('memprot_esp32p4', marks=[pytest.mark.esp32p4])
|
pytest.param('memprot_esp32p4', marks=[pytest.mark.esp32p4])
|
||||||
]
|
]
|
||||||
@ -704,7 +707,7 @@ def test_iram_reg1_write_violation(dut: PanicTestDut, test_func_name: str) -> No
|
|||||||
dut.expect_backtrace()
|
dut.expect_backtrace()
|
||||||
elif dut.target == 'esp32c3':
|
elif dut.target == 'esp32c3':
|
||||||
dut.expect_exact(r'Test error: Test function has returned')
|
dut.expect_exact(r'Test error: Test function has returned')
|
||||||
elif dut.target in ['esp32c2', 'esp32c5', 'esp32c6', 'esp32h2', 'esp32p4']:
|
else:
|
||||||
dut.expect_gme('Store access fault')
|
dut.expect_gme('Store access fault')
|
||||||
dut.expect_reg_dump(0)
|
dut.expect_reg_dump(0)
|
||||||
dut.expect_stack_dump()
|
dut.expect_stack_dump()
|
||||||
@ -729,7 +732,7 @@ def test_iram_reg2_write_violation(dut: PanicTestDut, test_func_name: str) -> No
|
|||||||
dut.expect(r' operation type: (\S+)')
|
dut.expect(r' operation type: (\S+)')
|
||||||
dut.expect_reg_dump(0)
|
dut.expect_reg_dump(0)
|
||||||
dut.expect_stack_dump()
|
dut.expect_stack_dump()
|
||||||
elif dut.target in ['esp32c2', 'esp32c5', 'esp32c6', 'esp32h2', 'esp32p4']:
|
else:
|
||||||
dut.expect_gme('Store access fault')
|
dut.expect_gme('Store access fault')
|
||||||
dut.expect_reg_dump(0)
|
dut.expect_reg_dump(0)
|
||||||
dut.expect_stack_dump()
|
dut.expect_stack_dump()
|
||||||
@ -754,7 +757,7 @@ def test_iram_reg3_write_violation(dut: PanicTestDut, test_func_name: str) -> No
|
|||||||
dut.expect(r' operation type: (\S+)')
|
dut.expect(r' operation type: (\S+)')
|
||||||
dut.expect_reg_dump(0)
|
dut.expect_reg_dump(0)
|
||||||
dut.expect_stack_dump()
|
dut.expect_stack_dump()
|
||||||
elif dut.target in ['esp32c2', 'esp32c5', 'esp32c6', 'esp32h2', 'esp32p4']:
|
else:
|
||||||
dut.expect_gme('Store access fault')
|
dut.expect_gme('Store access fault')
|
||||||
dut.expect_reg_dump(0)
|
dut.expect_reg_dump(0)
|
||||||
dut.expect_stack_dump()
|
dut.expect_stack_dump()
|
||||||
@ -781,7 +784,7 @@ def test_iram_reg4_write_violation(dut: PanicTestDut, test_func_name: str) -> No
|
|||||||
dut.expect(r' operation type: (\S+)')
|
dut.expect(r' operation type: (\S+)')
|
||||||
dut.expect_reg_dump(0)
|
dut.expect_reg_dump(0)
|
||||||
dut.expect_stack_dump()
|
dut.expect_stack_dump()
|
||||||
elif dut.target in ['esp32c2', 'esp32c6', 'eps32h2']:
|
else:
|
||||||
dut.expect_gme('Store access fault')
|
dut.expect_gme('Store access fault')
|
||||||
dut.expect_reg_dump(0)
|
dut.expect_reg_dump(0)
|
||||||
dut.expect_stack_dump()
|
dut.expect_stack_dump()
|
||||||
@ -801,7 +804,7 @@ def test_dram_reg1_execute_violation(dut: PanicTestDut, test_func_name: str) ->
|
|||||||
dut.expect(r'Unknown operation at address [0-9xa-f]+ not permitted \((\S+)\)')
|
dut.expect(r'Unknown operation at address [0-9xa-f]+ not permitted \((\S+)\)')
|
||||||
dut.expect_reg_dump(0)
|
dut.expect_reg_dump(0)
|
||||||
dut.expect_backtrace(corrupted=True)
|
dut.expect_backtrace(corrupted=True)
|
||||||
elif dut.target in ['esp32c3', 'esp32c2', 'esp32c5', 'esp32c6', 'esp32h2', 'esp32p4']:
|
else:
|
||||||
dut.expect_gme('Instruction access fault')
|
dut.expect_gme('Instruction access fault')
|
||||||
dut.expect_reg_dump(0)
|
dut.expect_reg_dump(0)
|
||||||
dut.expect_stack_dump()
|
dut.expect_stack_dump()
|
||||||
@ -820,7 +823,7 @@ def test_dram_reg2_execute_violation(dut: PanicTestDut, test_func_name: str) ->
|
|||||||
dut.expect_gme('InstructionFetchError')
|
dut.expect_gme('InstructionFetchError')
|
||||||
dut.expect_reg_dump(0)
|
dut.expect_reg_dump(0)
|
||||||
dut.expect_backtrace(corrupted=True)
|
dut.expect_backtrace(corrupted=True)
|
||||||
elif dut.target in ['esp32c3', 'esp32c2', 'esp32c5', 'esp32c6', 'esp32h2', 'esp32p4']:
|
else:
|
||||||
dut.expect_gme('Instruction access fault')
|
dut.expect_gme('Instruction access fault')
|
||||||
dut.expect_reg_dump(0)
|
dut.expect_reg_dump(0)
|
||||||
dut.expect_stack_dump()
|
dut.expect_stack_dump()
|
||||||
@ -876,7 +879,7 @@ def test_rtc_fast_reg3_execute_violation(dut: PanicTestDut, test_func_name: str)
|
|||||||
dut.expect(r' operation type: (\S+)')
|
dut.expect(r' operation type: (\S+)')
|
||||||
dut.expect_reg_dump(0)
|
dut.expect_reg_dump(0)
|
||||||
dut.expect_stack_dump()
|
dut.expect_stack_dump()
|
||||||
elif dut.target in ['esp32c5', 'esp32c6', 'esp32h2', 'esp32p4']:
|
else:
|
||||||
dut.expect_gme('Instruction access fault')
|
dut.expect_gme('Instruction access fault')
|
||||||
dut.expect_reg_dump(0)
|
dut.expect_reg_dump(0)
|
||||||
dut.expect_stack_dump()
|
dut.expect_stack_dump()
|
||||||
|
Loading…
Reference in New Issue
Block a user