zephyr/tests/kernel/mem_protect
Carlo Caione 807991e15f AArch64: Do not use CONFIG_GEN_PRIV_STACKS
We are setting CONFIG_GEN_PRIV_STACKS when AArch64 actually uses a
statically allocated privileged stack.

This error was not captured by the tests because we only verify whether
a read/write to a privileged stack is failing, but it can fail for a lot
of reasons including when the pointer to the privileged stack is not
initialized at all, like in this case.

With this patch we deselect CONFIG_GEN_PRIV_STACKS and we fix the
mem_protect/userspace test to correctly probe the privileged stack.

Signed-off-by: Carlo Caione <ccaione@baylibre.com>
2021-03-25 07:23:19 -04:00
..
demand_paging mmu: promote public APIs 2021-01-23 19:47:23 -05:00
futex tests: Apply IRQ offload API change 2020-09-02 13:48:13 +02:00
mem_map tests: mem_protect/mem_map: no need to skip test if link in virt 2021-03-16 15:03:44 -04:00
mem_protect tests: mem_protect: add error test case of userspace 2021-03-19 19:15:56 +01:00
obj_validation Revert "tests: add new kernel objects tests" 2020-10-16 14:50:56 -04:00
protection arch: mem protect Kconfig cleanups 2020-11-18 08:02:08 -05:00
stack_random tests: kernel: Add missing kernel tag to tests 2021-03-05 14:52:55 -05:00
stackprot tests: Avoid out-of-bounds array access on SPARC 2020-11-13 14:53:55 -08:00
sys_sem tests: sys_sem: add k_thread_join() calls 2020-10-28 10:29:49 -07:00
syscalls tests: kernel: mem_protect: add Ronoth Lodev to supported boards 2021-03-18 08:48:30 -05:00
userspace AArch64: Do not use CONFIG_GEN_PRIV_STACKS 2021-03-25 07:23:19 -04:00