Lines Matching full:stack

14 	{ "map shadow stack syscall\n", shadow_stack_map_test },
15 { "shadow stack gup tests\n", shadow_stack_gup_tests },
16 { "shadow stack signal tests\n", shadow_stack_signal_test},
17 { "memory protections of shadow stack memory\n", shadow_stack_protection_test }
22 /* do not optimize shadow stack related test functions */
31 ksft_print_msg("Spewing out shadow stack ptr: %lx\n" in zar()
32 " This is to ensure shadow stack is indeed enabled and working\n", in zar()
51 ksft_print_msg("Spewing out shadow stack ptr: %lx\n" in zar_child()
52 " This is to ensure shadow stack is indeed enabled and working\n", in zar_child()
86 ksft_print_msg("Exercising shadow stack fork test\n"); in shadow_stack_fork_test()
90 ksft_exit_skip("Shadow stack get status prctl failed with errorcode %d\n", ret); in shadow_stack_fork_test()
95 ksft_exit_skip("Shadow stack is not enabled, should be enabled via glibc\n"); in shadow_stack_fork_test()
130 ksft_print_msg("Exercising shadow stack map test\n"); in shadow_stack_map_test()
151 * shadow stack protection tests. map a shadow stack and
160 ksft_print_msg("Exercising shadow stack protection test (WPT)\n"); in shadow_stack_protection_test()
178 * try to perform a store from child on shadow stack memory in shadow_stack_protection_test()
188 /* test fail, if 0xdeadbeef present on shadow stack address */ in shadow_stack_protection_test()
190 ksft_print_msg("Shadow stack WPT failed\n"); in shadow_stack_protection_test()
196 ksft_print_msg("Shadow stack WPT failed: child reached unreachable state\n"); in shadow_stack_protection_test()
203 ksft_print_msg("Shadow stack WPT failed: child wasn't signaled for write\n"); in shadow_stack_protection_test()
209 ksft_print_msg("Shadow stack WPT failed: munmap failed, error code %d\n", in shadow_stack_protection_test()
225 ksft_print_msg("Reading shadow stack mem via gup failed\n"); in gup_tests()
232 ksft_print_msg("Writing shadow stack mem via gup failed\n"); in gup_tests()
237 ksft_print_msg("GUP write to shadow stack memory failed\n"); in gup_tests()
251 ksft_print_msg("Exercising shadow stack gup tests\n"); in shadow_stack_gup_tests()
303 * shadow stack signal test. shadow stack must be enabled.
313 ksft_print_msg("Exercising shadow stack signal test\n"); in shadow_stack_signal_test()
317 ksft_print_msg("Shadow stack get status prctl failed with errorcode %d\n", ret); in shadow_stack_signal_test()
322 ksft_print_msg("Shadow stack is not enabled, should be enabled via glibc\n"); in shadow_stack_signal_test()
362 ksft_print_msg("Executing RISC-V shadow stack self tests\n"); in execute_shadow_stack_tests()
368 ksft_exit_fail_msg("Get shadow stack status failed with %d\n", ret); in execute_shadow_stack_tests()
371 * If we are here that means get shadow stack status succeeded and in execute_shadow_stack_tests()
372 * thus shadow stack support is baked in the kernel. in execute_shadow_stack_tests()