zephyr/tests/kernel/mem_protect
Andrew Boie 2cfeba8507 x86: implement interrupt stack trampoline
Upon hard/soft irq or exception entry/exit, handle transitions
off or onto the trampoline stack, which is the only stack that
can be used on the kernel side when the shadow page table
is active. We swap page tables when on this stack.

Adjustments to page tables are now as follows:

- Any adjustments for stack memory access now are always done
  to the user page tables

- Any adjustments for memory domains are now always done to
  the user page tables

- With KPTI, resetting a page now clears the present bit

Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
2019-02-14 12:46:36 -05:00
..
mem_protect userspace: remove APPLICATION_MEMORY feature 2019-02-08 07:04:30 -05:00
obj_validation userspace: remove APPLICATION_MEMORY feature 2019-02-08 07:04:30 -05:00
protection x86: remove support for non-PAE page tables 2019-02-05 20:51:21 -08:00
stack_random cmake: increase minimal required version to 3.13.1 2019-01-03 11:51:29 -05:00
stackprot tests: Increase the stack size by CONFIG_TEST_EXTRA_STACKSIZE. 2019-01-16 06:12:33 -05:00
syscalls userspace: remove APPLICATION_MEMORY feature 2019-02-08 07:04:30 -05:00
userspace userspace: remove APPLICATION_MEMORY feature 2019-02-08 07:04:30 -05:00
x86_mmu_api x86: implement interrupt stack trampoline 2019-02-14 12:46:36 -05:00