Zephyr API Documentation
2.7.0-rc2
A Scalable Open Source RTOS
|
Variables | |
struct k_thread | child_thread |
struct k_thread | extra_thread |
struct k_sem * | random_sem_type |
struct k_sem | kobject_sem_not_hash_table |
struct k_sem | kobject_sem_no_init_no_access |
struct k_sem | kobject_sem_no_init_access |
struct k_mem_slab | ms |
struct k_msgq | mq |
struct k_mutex | mutex |
struct k_pipe | p |
struct k_queue | q |
struct k_poll_signal | ps |
struct k_sem | sem |
struct k_stack | s |
struct k_thread | t |
struct k_timer | timer |
struct z_thread_stack_element | zs |
struct k_futex | f |
struct k_condvar | c |
K_MUTEX_DEFINE | ( | kobject_mutex | ) |
K_SEM_DEFINE | ( | kobject_public_sem | , |
(0) | , | ||
(10) | |||
) |
K_SEM_DEFINE | ( | kobject_sem | , |
(0) | , | ||
(10) | |||
) |
K_THREAD_STACK_DEFINE | ( | child_stack | , |
(512+CONFIG_TEST_EXTRA_STACKSIZE) | |||
) |
K_THREAD_STACK_DEFINE | ( | extra_stack | , |
(512+CONFIG_TEST_EXTRA_STACKSIZE) | |||
) |
Object validation checks without init access.
Test syscall on a kobject which is not initialized and has no access
Test syscall on a kobject which is not initialized and has access.
Test kernel object allocation.
Allocate all kinds of kernel object and do permission operation functions.
Thread creation with prority is higher than current thread.
_handler_k_thread_create validation.
Create a new thread whose prority is invalid.
_handler_k_thread_create validation.
Test to create a new supervisor thread from user.
The system kernel must prevent user threads from creating supervisor threads.
Test thread create from a user thread and check permissions.
Test to check stack overflow from user thread.
Create a new thread from user and use a stack bigger than allowed size. This is_handler_k_thread_create validation.
Test to validate user thread spawning with stack overflow.
Create a new thread from user and use a huge stack size which overflows. This is _handler_k_thread_create validation.
Test creates new thread from usermode without stack access.
Create a new thread from user and the user doesn't have access to the stack region of new thread. _handler_k_thread_create validation.
Test kernel object until out of memory.
Create a dynamic kernel object repeatedly until run out of all heap memory, an expected out of memory error generated.
Test supervisor thread grants kernel objects all access public status.
System makes kernel object kobject_public_sem public to all threads Test the access to that kernel object by creating two new user threads.
Test grant access to all the kobject for thread.
Call function with a NULL parameter, an expected fault happened.
Test access to a invalid semaphore who's address is NULL.
Test grant access of given NULL kobject.
Call function with a NULL parameter in supervisor mode, nothing happened.
Test grant access of given NULL thread in usermode.
Call function with NULL parameter, an expected fault happened.
Test grant access of given NULL kobject in usermode.
Call function with a NULL parameter, an expected fault happened.
Test grant access to a valid kobject but invalid thread id.
Object validation checks.
Test syscall on a kobject which is not present in the hash table.
Test free an invalid kernel object.
Spawn a thread free a NULL, an expected fault happened.
Test access revoke.
Test access grant between threads.
Test access grant to thread B from thread A which doesn't have required permissions.
Test alloc an invalid kernel object.
Allocate invalid kernel objects, then no alloction will be returned.
Test grant access failed in user mode.
Before grant access of static kobject to user thread, any grant access to this thread, will trigger an expected thread permission error.
Test revoke permission of a k_object from userspace.
Test access revoke.
Test when thread exits, kernel marks stack objects uninitialized.
When thread exits, the kernel upon thread exit, should mark the exiting thread and thread stack object as uninitialized
Test create new user thread from a user thread with in-use stack obj.
The kernel must prevent new user threads to use initiliazed (in-use) stack objects. In that case extra_thread is going to be create with in-use stack object child_stack. That will generate error, showing that kernel memory protection is working correctly.
Test syscall can take a different type of kobject.
Test syscall can take a different type of kobject and syscall will generate fatal error if check fails.
Test access permission of a terminated thread.
If a deleted thread with some permissions is recreated with the same tid, check if it still has the permissions.
Test user thread can access a k_object without grant.
The kernel will fail system call on kernel object that tracks thread permissions, on thread that don't have permission granted on the object.
struct k_condvar c |
struct k_thread child_thread |
struct k_thread extra_thread |
struct k_futex f |
struct k_sem kobject_sem_no_init_access |
struct k_sem kobject_sem_no_init_no_access |
struct k_sem kobject_sem_not_hash_table |
struct k_msgq mq |
struct k_mem_slab ms |
struct k_mutex mutex |
struct k_pipe p |
struct k_poll_signal ps |
struct k_queue q |
struct k_sem* random_sem_type |
struct k_stack s |
struct k_sem sem |
struct k_thread t |
struct k_timer timer |
struct z_thread_stack_element zs |