)]}'
{
  "commit": "f620ceacdeab8275bde7b3ca35ada1f5786fe82e",
  "tree": "0495539cfdeac491b51b1b142e9aafb04ee03d64",
  "parents": [
    "8e5e719b17058910d204f84871e8e8cf5c404dfc"
  ],
  "author": {
    "name": "Ioannis Glaropoulos",
    "email": "Ioannis.Glaropoulos@nordicsemi.no",
    "time": "Wed Mar 03 13:14:06 2021 +0100"
  },
  "committer": {
    "name": "Ioannis Glaropoulos",
    "email": "Ioannis.Glaropoulos@nordicsemi.no",
    "time": "Fri Mar 05 15:03:24 2021 +0300"
  },
  "message": "tests: modify test case so it does not crash on cortex-m\n\nThe test case suggests that \"For most arch which support\nuserspace, derefencing NULL pointer will be caught by\nexception.\". This is certainly not true for Cortex-M, where\nread access to address 0x0 is generally allowed. The reason\nthe test had been passing was either 1) because in many\nCortex-M platforms, including QEMU, address 0x0 is unmapped,\nor 2) GCC is generating an undefining instruction. However,\nnow that we have activated the null pointer derefrencing\ndetection, we may end up with two exceptions and the test\nwould fail.\n\nChange illegal access to something outside the mapped memory\narea, e.g. 0xFFFFFFFF.\n\nSigned-off-by: Ioannis Glaropoulos \u003cIoannis.Glaropoulos@nordicsemi.no\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "672573f7d10eb54261de147bed0d32df123f89f2",
      "old_mode": 33188,
      "old_path": "tests/ztest/error_hook/src/main.c",
      "new_id": "6ef1ea13eaf3bae55dd5b8974b7fbfa7f1d59536",
      "new_mode": 33188,
      "new_path": "tests/ztest/error_hook/src/main.c"
    }
  ]
}
