diff --git a/tests/kernel/fatal/exception/src/main.c b/tests/kernel/fatal/exception/src/main.c index 1033473a21c..260ef39e396 100644 --- a/tests/kernel/fatal/exception/src/main.c +++ b/tests/kernel/fatal/exception/src/main.c @@ -300,7 +300,7 @@ void check_stack_overflow(k_thread_entry_t handler, uint32_t flags) * should match. Check for stack sentinel feature by overflowing the * thread's stack and check for the exception. * - * @ingroup kernel_common_tests + * @ingroup kernel_fatal_tests */ ZTEST(fatal_exception, test_fatal) { diff --git a/tests/kernel/fatal/no-multithreading/src/main.c b/tests/kernel/fatal/no-multithreading/src/main.c index c48ef3d9fd5..fe94c64b308 100644 --- a/tests/kernel/fatal/no-multithreading/src/main.c +++ b/tests/kernel/fatal/no-multithreading/src/main.c @@ -117,14 +117,14 @@ static const exc_trigger_func_t exc_trigger_func[] = { }; /** - * @brief Test the kernel fatal error handling works correctly + * @brief Verify the kernel fatal error handling works correctly * @details Manually trigger the crash with various ways and check * that the kernel is handling that properly or not. Also the crash reason * should match. * - * @ingroup kernel_common_tests + * @ingroup kernel_fatal_tests */ -ZTEST(fatal_no_mt, test_fatal) +ZTEST(fatal_no_mt, test_fatal_no_mt) { #ifdef VIA_TWISTER #define EXC_TRIGGER_FUNC_IDX VIA_TWISTER