Lines Matching +full:deep +full:- +full:touch
1 // SPDX-License-Identifier: GPL-2.0
4 * bad alignment, bad loops, bad locking, bad scheduling, deep stacks, and
42 * - function marked noinline
43 * - stack variables are marked volatile
44 * - stack variables are written (memset()) and read (pr_info())
45 * - function has external effects (pr_info())
57 return recursive_loop(remaining - 1); in recursive_loop()
125 /* Same as above but will only get a canary with -fstack-protector-strong */
177 volatile unsigned int huge = INT_MAX - 2;
209 /* Intentionally using old-style flex array definition of 1 byte. */
233 /* For both, touch all bytes in the actual member size. */ in lkdtm_ARRAY_BOUNDS()
234 for (i = 0; i < sizeof(checked->data); i++) in lkdtm_ARRAY_BOUNDS()
235 checked->data[i] = 'A'; in lkdtm_ARRAY_BOUNDS()
237 * For the uninstrumented flex array member, also touch 1 byte in lkdtm_ARRAY_BOUNDS()
240 for (i = 0; i < sizeof(not_checked->data) + 1; i++) in lkdtm_ARRAY_BOUNDS()
241 not_checked->data[i] = 'A'; in lkdtm_ARRAY_BOUNDS()
244 for (i = 0; i < sizeof(checked->data) + 1; i++) in lkdtm_ARRAY_BOUNDS()
245 checked->data[i] = 'B'; in lkdtm_ARRAY_BOUNDS()
268 * test_head.next->prev = &good.node in lkdtm_CORRUPT_LIST_ADD()
319 const unsigned char *ptr = stack - 1; in lkdtm_STACK_GUARD_PAGE_LEADING()
372 * To test the post-write pinning verification we need to call in lkdtm_UNSET_SMEP()
405 pr_err("XFAIL: this test is x86_64-only\n"); in lkdtm_UNSET_SMEP()
418 .type = 3, /* expand-up, writable, accessed data */ in lkdtm_DOUBLE_FAULT()
420 .d = 1, /* 32-bit */ in lkdtm_DOUBLE_FAULT()
430 * Put our zero-limit segment in SS and then trigger a fault. The in lkdtm_DOUBLE_FAULT()
431 * 4-byte access to (%esp) will fault with #SS, and the attempt to in lkdtm_DOUBLE_FAULT()
435 * would also double-fault, resulting in the NMI or MCE being lost. in lkdtm_DOUBLE_FAULT()
442 pr_err("XFAIL: this test is ia32-only\n"); in lkdtm_DOUBLE_FAULT()
482 pr_err("XFAIL: this test is arm64-only\n"); in lkdtm_CORRUPT_PAC()