5accf3596a
The Cortex-R architecture uses the threads stack to save context. However, that is a security hole since a userspace thread could manipulate the stack pointer before performing a system call and cause the kernel to write to memory that it should not. This test will sanity check that the Cortex-R svc and isr routines do not write to a userspace supplied stack. Signed-off-by: Bradley Bolen <bbolen@lexmark.com> |
||
---|---|---|
.. | ||
arm_hardfault_validation | ||
arm_interrupt | ||
arm_irq_advanced_features | ||
arm_irq_vector_table | ||
arm_mem_protect | ||
arm_no_multithreading | ||
arm_ramfunc | ||
arm_runtime_nmi | ||
arm_sw_vector_relay | ||
arm_thread_swap | ||
arm_thread_swap_tz | ||
arm_tz_wrap_func |