Lines Matching refs:stack
25 * Make sure our attempts to over run the kernel stack doesn't trigger
41 * Make sure compiler does not optimize this function or stack frame away:
43 * - stack variables are marked volatile
44 * - stack variables are written (memset()) and read (pr_info())
107 pr_info("FAIL: survived without exhausting stack?!\n");
110 static noinline void __lkdtm_CORRUPT_STACK(void *stack)
112 memset(stack, '\xff', 64);
115 /* This should trip the stack canary, not corrupt the return address. */
118 /* Use default char array length that triggers stack protection. */
121 pr_info("Corrupting stack containing char array ...\n");
133 pr_info("Corrupting stack containing union ...\n");
326 const unsigned char *stack = task_stack_page(current);
327 const unsigned char *ptr = stack - 1;
330 pr_info("attempting bad read from page below current stack\n");
334 pr_err("FAIL: accessed page before stack! (byte: %x)\n", byte);
340 const unsigned char *stack = task_stack_page(current);
341 const unsigned char *ptr = stack + THREAD_SIZE;
344 pr_info("attempting bad read from page above current stack\n");
348 pr_err("FAIL: accessed page after stack! (byte: %x)\n", byte);
421 * Trigger #DF by setting the stack limit to zero. This clobbers
482 * stack pointer. As pac has fewer bits so there is a chance of