Lines Matching refs:pr_err
249 pr_err("FAIL: survived array bounds overflow!\n"); in lkdtm_ARRAY_BOUNDS()
285 pr_err("Overwrite did not happen, but no BUG?!\n"); in lkdtm_CORRUPT_LIST_ADD()
287 pr_err("list_add() corruption not detected!\n"); in lkdtm_CORRUPT_LIST_ADD()
310 pr_err("Overwrite did not happen, but no BUG?!\n"); in lkdtm_CORRUPT_LIST_DEL()
312 pr_err("list_del() corruption not detected!\n"); in lkdtm_CORRUPT_LIST_DEL()
326 pr_err("FAIL: accessed page before stack! (byte: %x)\n", byte); in lkdtm_STACK_GUARD_PAGE_LEADING()
340 pr_err("FAIL: accessed page after stack! (byte: %x)\n", byte); in lkdtm_STACK_GUARD_PAGE_TRAILING()
355 pr_err("FAIL: SMEP not in use\n"); in lkdtm_UNSET_SMEP()
363 pr_err("FAIL: pinning SMEP failed!\n"); in lkdtm_UNSET_SMEP()
399 pr_err("FAIL: cleared SMEP not detected!\n"); in lkdtm_UNSET_SMEP()
405 pr_err("XFAIL: this test is x86_64-only\n"); in lkdtm_UNSET_SMEP()
440 pr_err("FAIL: tried to double fault but didn't die\n"); in lkdtm_DOUBLE_FAULT()
442 pr_err("XFAIL: this test is ia32-only\n"); in lkdtm_DOUBLE_FAULT()
464 pr_err("FAIL: kernel not built with CONFIG_ARM64_PTR_AUTH\n"); in lkdtm_CORRUPT_PAC()
467 pr_err("FAIL: CPU lacks pointer authentication feature\n"); in lkdtm_CORRUPT_PAC()
480 pr_err("FAIL: survived PAC changes! Kernel may be unstable from here\n"); in lkdtm_CORRUPT_PAC()
482 pr_err("XFAIL: this test is arm64-only\n"); in lkdtm_CORRUPT_PAC()