test: fix priv level associated with sec context REL.CORESDK.07.01.00.36 REL.CORESDK.07.01.00.37 REL.CORESDK.07.01.00.38 REL.CORESDK.07.01.00.39 REL.CORESDK.07.01.00.40 REL.CORESDK.07.01.00.43 REL.CORESDK.07.01.00.44 REL.CORESDK.07.01.00.45 REL.CORESDK.07.01.00.46 REL.CORESDK.07.01.00.47 REL.CORESDK.07.01.00.48 REL.CORESDK.07.01.00.49 REL.CORESDK.07.01.00.50 REL.CORESDK.07.01.00.51 REL.CORESDK.07.01.00.52 REL.CORESDK.07.01.00.53 REL.CORESDK.07.01.00.54 REL.CORESDK.07.01.00.55 REL.CORESDK.07.01.00.56 REL.CORESDK.07.01.00.57 REL.CORESDK.07.01.00.58 REL.CORESDK.07.01.00.59 REL.CORESDK.07.01.00.60 REL.CORESDK.07.01.05.01 REL.CORESDK.07.01.05.02 REL.CORESDK.07.01.05.03 REL.CORESDK.07.01.05.04 REL.CORESDK.07.01.05.05 REL.CORESDK.07.01.05.06 REL.CORESDK.07.01.05.07 REL.CORESDK.07.01.05.08 REL.CORESDK.07.01.05.09 REL.CORESDK.07.01.05.10 REL.CORESDK.07.01.05.11 REL.CORESDK.07.01.05.12 REL.CORESDK.07.01.05.13 REL.CORESDK.07.01.05.14 REL.CORESDK.07.01.05.15 REL.CORESDK.07.01.05.16 REL.CORESDK.07.02.00.01 REL.CORESDK.07.02.00.02 REL.CORESDK.07.02.00.03 REL.CORESDK.07.02.00.04
author | Stephen Molfetta <sjmolfetta@ti.com> | |
Wed, 11 Nov 2020 19:52:19 +0000 (13:52 -0600) | ||
committer | Stephen Molfetta <sjmolfetta@ti.com> | |
Wed, 11 Nov 2020 19:52:19 +0000 (13:52 -0600) | ||
commit | 87654361aca1c8f3f87ff4370f9e3c18fa4cd075 | |
tree | b3cd448dcb52a9e5159e198902a2700a0dc254d7 | tree | snapshot (tar.xz tar.gz zip) |
parent | 0e56dfbf8936da18b2af1865e3e6b1568ab2c3d4 | commit | diff |
test: fix priv level associated with sec context
For all devices besides am65x, RM board config assigns exclusive access
to resources for individual hosts. This causes channelized ISC and
firewall to be programmed and forces privilege permissions to the
incoming packet attributes. Set the priv bit in the security context to
enable the access to the structure.
Workaround for PDK-8605
Signed-off-by: Stephen Molfetta <sjmolfetta@ti.com>
For all devices besides am65x, RM board config assigns exclusive access
to resources for individual hosts. This causes channelized ISC and
firewall to be programmed and forces privilege permissions to the
incoming packet attributes. Set the priv bit in the security context to
enable the access to the structure.
Workaround for PDK-8605
Signed-off-by: Stephen Molfetta <sjmolfetta@ti.com>
test/SaUnitTest/src/testconn2.c | diff | blob | history |