zephyr/tests/kernel/fatal
Andy Ross 6564974bae userspace: Support for split 64 bit arguments
System call arguments, at the arch layer, are single words.  So
passing wider values requires splitting them into two registers at
call time.  This gets even more complicated for values (e.g
k_timeout_t) that may have different sizes depending on configuration.
This patch adds a feature to gen_syscalls.py to detect functions with
wide arguments and automatically generates code to split/unsplit them.

Unfortunately the current scheme of Z_SYSCALL_DECLARE_* macros won't
work with functions like this, because for N arguments (our current
maximum N is 10) there are 2^N possible configurations of argument
widths.  So this generates the complete functions for each handler and
wrapper, effectively doing in python what was originally done in the
preprocessor.

Another complexity is that traditional the z_hdlr_*() function for a
system call has taken the raw list of word arguments, which does not
work when some of those arguments must be 64 bit types.  So instead of
using a single Z_SYSCALL_HANDLER macro, this splits the job of
z_hdlr_*() into two steps: An automatically-generated unmarshalling
function, z_mrsh_*(), which then calls a user-supplied verification
function z_vrfy_*().  The verification function is typesafe, and is a
simple C function with exactly the same argument and return signature
as the syscall impl function.  It is also not responsible for
validating the pointers to the extra parameter array or a wide return
value, that code gets automatically generated.

This commit includes new vrfy/msrh handling for all syscalls invoked
during CI runs.  Future commits will port the less testable code.

Signed-off-by: Andy Ross <andrew.j.ross@intel.com>
2019-09-12 11:31:50 +08:00
..
src userspace: Support for split 64 bit arguments 2019-09-12 11:31:50 +08:00
CMakeLists.txt license: cleanup: add SPDX Apache-2.0 license identifier 2019-04-07 08:45:22 -04:00
README
prj.conf tests: remove redundant CONFIG_HW_STACK_PROTECTION=y setting 2019-07-01 12:54:20 -07:00
prj_arm_fp_sharing.conf tests: remove redundant CONFIG_HW_STACK_PROTECTION=y setting 2019-07-01 12:54:20 -07:00
prj_armv8m_mpu_stack_guard.conf tests: kernel: fatal: run test for ARMv8-M with MPU stack guards 2019-07-01 12:54:20 -07:00
protection_no_userspace.conf tests: remove redundant CONFIG_HW_STACK_PROTECTION=y setting 2019-07-01 12:54:20 -07:00
sentinel.conf tests: CONFIG_TEST_USERSPACE now off by default 2019-04-06 14:30:42 -04:00
testcase.yaml tests: exclude twr_ke18f platform from several user mode tests 2019-09-03 16:44:22 +02:00

README

This test case verifies that kernel fatal error handling works correctly.

If a thread causes a CPU exception, and it is not in an ISR or "essential"
thread, the thread gets aborted and the rest of the system executes normally.