MPU Stack Guard Test

Overview

This is a simple application that demonstrates basic thread stack guarding on the supported platforms. A thread spawned by the main task recursively calls a function that fills the thread stack up to where it overwrites a preposed canary. If the MPU is enabled and the Stack Guard feature is present the test succeeds because an MEM Faults exception prevents the canary from being overwritten. If the MPU is disabled the test fails because the canary is overwritten.

Building and Running

This project outputs to the console. To build the test with the MPU disabled:

$ cd samples/mpu_stack_guard_test
$ make

To build the test with the MPU enabled and the stack guard feature present:

$ cd samples/mpu_stack_guard_test
$ make CONF_FILE=prj_stack_guard.conf

Sample Output

With the MPU disabled:

***** BOOTING ZEPHYR OS v1.7.99 - BUILD: Mar 29 2017 11:07:09 *****
MPU STACK GUARD Test
Canary Initial Value = 0xf0cacc1a
Canary = 0x200003a8     Test not passed.
...

With the MPU enabled and the stack guard feature present:

***** BOOTING ZEPHYR OS v1.7.99 - BUILD: Mar 29 2017 11:20:10 *****
MPU STACK GUARD Test
Canary Initial Value = 0xf0cacc1a
[general] [DBG] arm_core_mpu_configure: Region info: 0x200003ac 0x400
***** MPU FAULT *****
  Executing thread ID (thread): 0x200003ac
  Faulting instruction address:  0x0
  Stacking error
Fatal fault in thread 0x200003ac! Aborting.
***** HARD FAULT *****
  Fault escalation (see below)
***** MPU FAULT *****
  Executing thread ID (thread): 0x200003ac
  Faulting instruction address:  0x8000466
  Stacking error
Fatal fault in ISR! Spinning...