zephyr/tests/kernel/mem_protect
Andy Ross 317178b88f sys_clock: Fix unsafe tick count usage
The system tick count is a 64 bit quantity that gets updated from
interrupt context, meaning that it's dangerously non-atomic and has to
be locked.  The core kernel clock code did this right.

But the value was also exposed to the rest of the universe as a global
variable, and virtually nothing else was doing this correctly.  Even
in the timer ISRs themselves, the interrupts may be themselves
preempted (most of our architectures support nested interrupts) by
code that wants to set timeouts and inspect system uptime.

Define a z_tick_{get,set}() API, eliminate the old variable, and make
sure everyone uses the right mechanism.

Signed-off-by: Andy Ross <andrew.j.ross@intel.com>
2018-10-16 15:03:10 -04:00
..
app_memory sys_clock: Fix unsafe tick count usage 2018-10-16 15:03:10 -04:00
mem_protect tests: remove bat_commit, replace core with kernel 2018-10-16 09:17:51 -04:00
obj_validation tests: remove bat_commit, replace core with kernel 2018-10-16 09:17:51 -04:00
protection tests: remove bat_commit, replace core with kernel 2018-10-16 09:17:51 -04:00
stack_random cmake: Prepend 'cmake_minimum_required()' into 'app' build scripts 2018-08-15 04:06:50 -07:00
stackprot tests: remove bat_commit, replace core with kernel 2018-10-16 09:17:51 -04:00
syscalls tests: remove bat_commit, replace core with kernel 2018-10-16 09:17:51 -04:00
userspace tests: remove bat_commit, replace core with kernel 2018-10-16 09:17:51 -04:00
x86_mmu_api portability: Avoid void* arithmetics which is a GNU extension 2018-09-28 07:57:28 +05:30