zephyr/tests/kernel/mem_protect
Andrew Boie e09a0255da kernel: sychronize irq_offload() access
Entering irq_offload() on multiple CPUs can cause
difficult to debug/reproduce crashes. Demote irq_offload()
to non-inline (it never needed to be inline anyway) and
wrap the arch call in a semaphore.

Some tests which were unnecessarily killing threads
have been fixed; these threads exit by themselves anyway
and we won't leave the semaphore dangling.

The definition of z_arch_irq_offload() moved to
arch_interface.h as it only gets called by kernel C code.

Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
2019-11-08 15:16:43 -08:00
..
futex
mem_protect kernel: rename z_arch_ to arch_ 2019-11-07 15:21:46 -08:00
obj_validation headers: Refactor kernel and arch headers. 2019-11-06 16:07:32 -08:00
protection
stack_random tests: Never disable SMP 2019-09-26 16:54:06 -04:00
stackprot x86: consolidate x86_64 architecture, SoC and boards 2019-10-25 17:57:55 -04:00
sys_sem kernel: sychronize irq_offload() access 2019-11-08 15:16:43 -08:00
syscalls kernel: rename z_arch_ to arch_ 2019-11-07 15:21:46 -08:00
userspace kernel: rename z_arch_ to arch_ 2019-11-07 15:21:46 -08:00