Skip to content
Commit 5accf359 authored by Bradley Bolen's avatar Bradley Bolen Committed by Christopher Friedt
Browse files

tests: arm_mem_protect: Add a test for stack pointer manipulation



The Cortex-R architecture uses the threads stack to save context.
However, that is a security hole since a userspace thread could
manipulate the stack pointer before performing a system call and cause
the kernel to write to memory that it should not.  This test will sanity
check that the Cortex-R svc and isr routines do not write to a userspace
supplied stack.

Signed-off-by: default avatarBradley Bolen <bbolen@lexmark.com>
parent 60f23a5d
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please to comment