zephyr/tests/kernel/mem_protect
Andrew Boie efc5fe07a2 kernel: overhaul unused stack measurement
The existing stack_analyze APIs had some problems:

1. Not properly namespaced
2. Accepted the stack object as a parameter, yet the stack object
   does not contain the necessary information to get the associated
   buffer region, the thread object is needed for this
3. Caused a crash on certain platforms that do not allow inspection
   of unused stack space for the currently running thread
4. No user mode access
5. Separately passed in thread name

We deprecate these functions and add a new API
k_thread_stack_space_get() which addresses all of these issues.

A helper API log_stack_usage() also added which resembles
STACK_ANALYZE() in functionality.

Fixes: #17852

Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
2020-02-08 10:02:35 +02:00
..
futex tests: futex: use one cpu 2020-01-13 16:35:10 -05:00
mem_protect tests: mem_protect: use one cpu 2020-01-13 16:35:10 -05:00
obj_validation headers: Refactor kernel and arch headers. 2019-11-06 16:07:32 -08:00
protection arch: arm: Move ARM code to AArch32 sub-directory 2019-12-20 11:40:59 -05:00
stack_random tests: stack_random: fix reading volatile variable 2019-11-12 07:07:01 -06:00
stackprot tests/mem_protect/stackprot: Need a delay under SMP 2020-02-03 09:31:56 -05:00
sys_sem tests: semaphore: cleanup asserts 2019-11-15 08:04:52 -05:00
syscalls kernel: rename z_arch_ to arch_ 2019-11-07 15:21:46 -08:00
userspace kernel: overhaul unused stack measurement 2020-02-08 10:02:35 +02:00