zephyr/tests/kernel/mem_protect
Andrew Boie 83752c1cfe kernel: introduce initial stack randomization
This is a component of address space layout randomization that we can
implement even though we have a physical address space.

Support for upward-growing stacks omitted for now, it's not done
currently on any of our current or planned architectures.

Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
2018-03-16 16:25:22 -07:00
..
app_memory tests: kernel: stop relying on path for naming 2018-02-18 09:16:40 -05:00
obj_validation tests: kernel: stop relying on path for naming 2018-02-18 09:16:40 -05:00
protection tests: kernel: stop relying on path for naming 2018-02-18 09:16:40 -05:00
stack_random kernel: introduce initial stack randomization 2018-03-16 16:25:22 -07:00
stackprot tests: kernel: stop relying on path for naming 2018-02-18 09:16:40 -05:00
userspace tests: kernel: stop relying on path for naming 2018-02-18 09:16:40 -05:00
x86_mmu_api tests: kernel: stop relying on path for naming 2018-02-18 09:16:40 -05:00