From 3fb80aa1b00e5675b3c9972fb0bdd40c3121d7bd Mon Sep 17 00:00:00 2001
From: Weronika Lewandowska <weronika.lewandowska@intel.com>
Date: Fri, 19 Jun 2020 15:07:25 +0200
Subject: [PATCH] test: disable pmem2_map_prot devdax exec test

---
 src/test/pmem2_map_prot/TESTS.py | 17 +++++++++--------
 1 file changed, 9 insertions(+), 8 deletions(-)

diff --git a/src/test/pmem2_map_prot/TESTS.py b/src/test/pmem2_map_prot/TESTS.py
index b08fbd095..7d0aaf69d 100644
--- a/src/test/pmem2_map_prot/TESTS.py
+++ b/src/test/pmem2_map_prot/TESTS.py
@@ -174,11 +174,12 @@ class TEST15(PMEM2_MAP_DEVDAX):
     """
     test_case = "test_rw_mode_rw_prot"
 
-
-@t.require_architectures('x86_64')
-class TEST16(PMEM2_MAP_DEVDAX):
-    """
-    READ|EXEC protection on device DAX opened in read|write|exec mode; test
-    runs the program, which is put in mapped memory - should succeed
-    """
-    test_case = "test_rx_mode_rx_prot_do_execute"
+# XXX: we need to add support to test framework and create a tool-helper
+# to skip this test when exec access is not allowed for specific device
+# @t.require_architectures('x86_64')
+# class TEST16(PMEM2_MAP_DEVDAX):
+#    """
+#    READ|EXEC protection on device DAX opened in read|write|exec mode; test
+#    runs the program, which is put in mapped memory - should succeed
+#    """
+#    test_case = "test_rx_mode_rx_prot_do_execute"
-- 
GitLab