From 3fb80aa1b00e5675b3c9972fb0bdd40c3121d7bd Mon Sep 17 00:00:00 2001
From: Weronika Lewandowska <weronika.lewandowska@intel.com>
Date: Fri, 19 Jun 2020 15:07:25 +0200
Subject: [PATCH] test: disable pmem2_map_prot devdax exec test
---
src/test/pmem2_map_prot/TESTS.py | 17 +++++++++--------
1 file changed, 9 insertions(+), 8 deletions(-)
diff --git a/src/test/pmem2_map_prot/TESTS.py b/src/test/pmem2_map_prot/TESTS.py
index b08fbd095..7d0aaf69d 100644
--- a/src/test/pmem2_map_prot/TESTS.py
+++ b/src/test/pmem2_map_prot/TESTS.py
@@ -174,11 +174,12 @@ class TEST15(PMEM2_MAP_DEVDAX):
"""
test_case = "test_rw_mode_rw_prot"
-
-@t.require_architectures('x86_64')
-class TEST16(PMEM2_MAP_DEVDAX):
- """
- READ|EXEC protection on device DAX opened in read|write|exec mode; test
- runs the program, which is put in mapped memory - should succeed
- """
- test_case = "test_rx_mode_rx_prot_do_execute"
+# XXX: we need to add support to test framework and create a tool-helper
+# to skip this test when exec access is not allowed for specific device
+# @t.require_architectures('x86_64')
+# class TEST16(PMEM2_MAP_DEVDAX):
+# """
+# READ|EXEC protection on device DAX opened in read|write|exec mode; test
+# runs the program, which is put in mapped memory - should succeed
+# """
+# test_case = "test_rx_mode_rx_prot_do_execute"
--
GitLab