Lines Matching refs:printf

65 	printf("[SKIP]\tCompiler does not support CET.\n");  in main()
136 printf("[INFO]\tnew_ssp = %lx, *new_ssp = %lx\n", in try_shstk()
140 printf("[INFO]\tchanging ssp from %lx to %lx\n", ssp, new_ssp); in try_shstk()
144 printf("[INFO]\tssp is now %lx\n", get_ssp()); in try_shstk()
157 printf("[FAIL]\tError creating shadow stack: %d\n", errno); in test_shstk_pivot()
163 printf("[OK]\tShadow stack pivot\n"); in test_shstk_pivot()
188 printf("[OK]\tShadow stack faults\n"); in test_shstk_faults()
205 printf("[INFO]\tCorrupting shadow stack\n"); in violate_ss()
211 printf("[INFO]\tGenerated shadow stack violation successfully\n"); in segv_handler()
237 printf("[OK]\tShadow stack violation test\n"); in test_shstk_violation()
257 printf("[INFO]\tViolation from %s\n", is_shstk_access ? "shstk access" : "normal write"); in test_access_fix_handler()
337 printf("[INFO]\tGup read -> shstk access success\n"); in test_gup()
344 printf("[INFO]\tGup write -> shstk access success\n"); in test_gup()
351 printf("[INFO]\tGup read -> write access success\n"); in test_gup()
358 printf("[INFO]\tGup write -> write access success\n"); in test_gup()
379 printf("[FAIL]\tWrite in child failed\n"); in test_gup()
383 printf("[FAIL]\tWrite in child wrote through to shared memory\n"); in test_gup()
387 printf("[INFO]\tCow gup write -> write access success\n"); in test_gup()
393 printf("[OK]\tShadow gup test\n"); in test_gup()
412 printf("[FAIL]\tmprotect(PROT_READ) failed\n"); in test_mprotect()
418 printf("[FAIL]\tShadow stack access to read-only memory succeeded\n"); in test_mprotect()
427 printf("[FAIL]\tmprotect(PROT_READ) failed\n"); in test_mprotect()
433 printf("[FAIL]\tmprotect(PROT_WRITE) failed\n"); in test_mprotect()
439 printf("[FAIL]\tShadow stack access to mprotect() writable memory failed\n"); in test_mprotect()
447 printf("[OK]\tmprotect() test\n"); in test_mprotect()
497 printf("[SKIP]\tUserfaultfd unavailable.\n"); in test_userfaultfd()
531 printf("[OK]\tUserfaultfd test\n"); in test_userfaultfd()
596 printf("[OK]\tGuard gap test\n"); in test_guard_gap()
679 printf("[OK]\t32 bit test\n"); in test_32bit()
723 printf("[INFO]\tFailed to PTRACE_GETREGS\n"); in test_ptrace()
728 printf("[INFO]\tPtrace child SSP was 0\n"); in test_ptrace()
736 printf("[INFO]\tToo small size accepted via PTRACE_SETREGS\n"); in test_ptrace()
742 printf("[INFO]\tToo large size accepted via PTRACE_SETREGS\n"); in test_ptrace()
748 printf("[INFO]\tUnaligned SSP written via PTRACE_SETREGS\n"); in test_ptrace()
754 printf("[INFO]\tKernel range SSP written via PTRACE_SETREGS\n"); in test_ptrace()
765 printf("[INFO]\tFailed to PTRACE_SETREGS\n"); in test_ptrace()
770 printf("[INFO]\tFailed to PTRACE_DETACH\n"); in test_ptrace()
778 printf("[OK]\tPtrace test\n"); in test_ptrace()
791 printf("[SKIP]\tCould not enable Shadow stack\n"); in main()
797 printf("[FAIL]\tDisabling shadow stack failed\n"); in main()
801 printf("[SKIP]\tCould not re-enable Shadow stack\n"); in main()
806 printf("[SKIP]\tCould not enable WRSS\n"); in main()
813 printf("[FAIL]\tShadow stack disabled\n"); in main()
819 printf("[FAIL]\tShadow stack pivot\n"); in main()
825 printf("[FAIL]\tShadow stack fault test\n"); in main()
831 printf("[FAIL]\tShadow stack violation test\n"); in main()
837 printf("[FAIL]\tShadow shadow stack gup\n"); in main()
843 printf("[FAIL]\tShadow shadow mprotect test\n"); in main()
849 printf("[FAIL]\tUserfaultfd test\n"); in main()
855 printf("[FAIL]\tGuard gap test\n"); in main()
861 printf("[FAIL]\tptrace test\n"); in main()
866 printf("[FAIL]\t32 bit test\n"); in main()
879 printf("[FAIL]\tDisabling shadow stack failed\n"); in main()