Getting Started¶
This document is intended to help you understand the structure and approach for developing applications under the Privilege Separation framework.
Directory structure¶
The ESP Privilege Separation project has a slightly different directory structure than a normal ESP-IDF application (refer to ESP-IDF directory structure).
An example project under privilege separation philosophy looks like this:
my_project
|-- build
|-- CMakeLists.txt
|-- partitions.csv
|-- protected_app
| `-- main
| |-- CMakeLists.txt
| `-- protected_main.c
|-- sdkconfig
`-- user_app
|-- CMakeLists.txt
|-- main
| |-- CMakeLists.txt
| `-- user_code.c
`-- user_config.h
Any Privilege Separation project contains the following elements:
A top level CMakeLists.txt similar to the one in the ESP-IDF main project. It is the primary file which CMake uses to learn how to build the project. Apart from the ESP-IDF components, we include the additional components of
esp-privilege-separation
andprotected_app
by setting theEXTRA_COMPONENT_DIRS
variable. This is required because this framework does not have amain
component which is typically automatically added by the ESP-IDF build system.The build-system generated
sdkconfig
project configuration file that holds the configuration of the entire project, contains the configuration for protected as well as the user app.protected_app
is the protected space application. It containsmain
component of the protected application. Code contained inside this directory executes under the protected space (higher privilege).user_app
is the user space application. It is built as an external project to the protected app. It is similar to an independent ESP-IDF project and contains a top level CMakeLists.txt to build theuser_app
. Code contained inside this directory executes under the user space.partitions.csv
file specifies the partitions and the space reserved for protected app and user app. User app needs to have the partition name asuser_app
with typeapp
and sub-type0xFF
.build
directory is created when the project is built and contains the build artifacts of the project, such as the ELFs and BINs of the protected and the user apps.
Writing a sample application¶
The traditional ESP-IDF application is a single monolithic application. In this proposed model, we try to split the application in two separate binaries.
Let’s walkthrough one of the sample application by looking at what you will do in both, the protected application and also the user application.
Protected application¶
The protected application is equivalent to any ESP-IDF application. You can use any component from ESP-IDF or otherwise, as it is. Additionally, the protected application is tasked with configuring and booting the user application. This is achieved by using the esp_priv_access component APIs.
IRAM_ATTR void user_app_exception_handler(void *arg)
{
// Perform actions when user app exception happens
}
void app_main()
{
esp_err_t ret;
// Initialise the priv_access module
ret = esp_priv_access_init(user_app_exception_handler);
if (ret != ESP_OK) {
ESP_LOGE(TAG, "Failed to initialize PA %d\n", ret);
}
// Allow user app to use GPIO (all permissions)
esp_priv_access_set_periph_perm(PA_GPIO, PA_WORLD_1, PA_PERM_ALL);
// Register device driver /dev/ws2812 that is exposed to user app
esp_ws2812_device_register("/dev/ws2812");
// Boot-up the user-space application
ret = esp_priv_access_user_boot();
if (ret != ESP_OK) {
ESP_LOGE(TAG, "Failed to boot user app %d\n", ret);
}
for (int i = 0; ; i++) {
ets_printf("Hello from protected environment\n");
vTaskDelay(500);
}
}
As with any IDF application, the app_main
is the function that will be called by the 2nd stage bootloader. In this
model, the app_main
will be the entry point of the protected application. Any code that goes into this directory
is executed under protected space and has access to the entire system. esp_priv_access_init
configures the memory
region and sets up the permissions for user app. user_app_exception_handler
is the handler that will be invoked in
case there is any exception in user space code. esp_priv_access_user_boot
finds the user app in the flash and if
found, spawns a new task that starts executing it.
Apart from initialising and booting the user app, the protected app developer can also give explicit permission to some of the peripherals.
esp_priv_access_set_periph_perm(PA_GPIO, PA_WORLD_1, PA_PERM_ALL);
With this line, it has granted the user application access to GPIO peripheral. Any user application that is executed with this protected app can access the GPIO registers. For more details, refer ESP Priv Access.
esp_ws2812_device_register("/dev/ws2812");
This is a sample driver that we have included in the components to demonstrate how to write a driver for a specific device and how it can be registered so that the user application is able to use it. The driver is implemented in protected space but the user can use it through the VFS layer (open, read, write, close). Check the implementation at shared/drivers/ws2812/ws2812.c.
For more details about the driver development, please refer Driver development.
User application¶
The user application is supposed to contain the business logic of the application. The idea is that even if there is any misbehavior in the user application, the system (i.e. protected app) isn’t affected by it. This allows us to have a robust and resilient system.
What a user application can do depends on the protected app and its configuration. With the protected app which we have developed above, the user application can directly access the GPIO registers as well as the WS2812 LED driver. So in this example, we will demonstrate device control through 2 methods: - by directly toggling the GPIO (since direct access to GPIO is configured by the protected app) - by controling the WS2812 LED using the VFS system calls through to the WS2812 LED driver setup in the protected app
void blink_task()
{
/* WS2812 LED expects data in multiples of 3: 3 bytes for 1 LED.
* The data format is {R, G, B}, with intensity ranging from 0 - 255.
* 0 being dimmest (off) and 255 being the brightest
*/
uint8_t data_on[3] = {0, 8, 8};
uint8_t data_off[3] = {0, 0, 0};
ws2812_dev_conf_t dev_cnf = {
.channel = 0,
.gpio_num = WS2812_GPIO,
.led_cnt = 1
};
// Open the device through VFS' open() call
int ws2812_fd = open("/dev/ws2812/0", O_WRONLY);
// Use the ioctl() to configure the device
ioctl(ws2812_fd, WS2812_INIT, &dev_cnf);
while (1) {
// Directly control the GPIO
gpio_ll_set_level(&GPIO, BLINK_GPIO, 1);
// Write data to the device
write(ws2812_fd, data_on, 3);
vTaskDelay(100);
gpio_ll_set_level(&GPIO, BLINK_GPIO, 0);
write(ws2812_fd, data_off, 3);
vTaskDelay(100);
}
}
void user_main()
{
gpio_config_t io_conf;
io_conf.pin_bit_mask = (1 << BLINK_GPIO);
io_conf.mode = GPIO_MODE_OUTPUT;
io_conf.intr_type = GPIO_PIN_INTR_DISABLE;
io_conf.pull_down_en = 0;
io_conf.pull_up_en = 0;
gpio_config(&io_conf);
if (xTaskCreate(blink_task, "Blink task", 4096, NULL, 1, NULL) != pdPASS) {
ESP_LOGE(TAG, "Task Creation failed");
}
}
The user_main
is the entry point of the user application. We configure the GPIO just like we would do in a traditional ESP-IDF
blink example. We then create a task blink_task
that handles the toggling of the GPIO as well as the WS2812 LED.
- As the protected application has already granted access to GPIO registers, we can directly write to them
and toggle the GPIO state instead of going through the system call approach. This definitely saves some extra
CPU overhead.
- For toggling WS2812 LED, we demonstrate the use of the VFS system calls to configure and operate the LED.
As you can see, most of the APIs remain consistent between protected and user app and choosing the appropriate definition is
handled by the build system (For more details, refer Translation to system call). There are
some exceptions to this, certain API prototypes cannot be kept consistent as it may require some additional user context. Such APIs
can be found under esp_syscall
component.
Memory allocation¶
Memory is divided between the protected and user apps based on the Kconfig options that are set.
Using the provided Kconfig options under “Memory allocation” menu in “Privilege Separation” section, you can:
Reserve IRAM memory (code) for user application.
Reserve DRAM space (data + bss + heap) for either protected app or user app. The size specified will be the DRAM size for the chosen application, rest of the memory will be allocated to the other app.
For this above example, we have kept the default memory allocation policy with default sizes as that can meet this application requirement.
The protected app and the user app get their own heap allocators. The heap allocator uses whatever memory is allocated to the application.