Lines Matching full:stack

36 __description("variable-offset stack read, priv vs unpriv")
38 __msg_unpriv("R2 variable stack access prohibited for !root")
43 /* Fill the top 8 bytes of the stack */ \ in stack_read_priv_vs_unpriv()
55 /* dereference it for a stack read */ \ in stack_read_priv_vs_unpriv()
63 __description("variable-offset stack read, uninitialized")
65 __failure_unpriv __msg_unpriv("R2 variable stack access prohibited for !root")
78 /* dereference it for a stack read */ \ in variable_offset_stack_read_uninitialized()
86 __description("variable-offset stack write, priv vs unpriv")
88 /* Check that the maximum stack depth is correctly maintained according to the
91 __log_level(4) __msg("stack depth 16")
93 /* Variable stack access is rejected for unprivileged.
95 __msg_unpriv("R2 variable stack access prohibited for !root")
109 /* Dereference it for a stack write */ \ in stack_write_priv_vs_unpriv()
123 * the sake of it checking the stack depth in the case where there is no read.
126 __description("variable-offset stack write followed by read")
128 /* Check that the maximum stack depth is correctly maintained according to the
131 __log_level(4) __msg("stack depth 16")
133 __msg_unpriv("R2 variable stack access prohibited for !root")
147 /* Dereference it for a stack write */ \ in stack_write_followed_by_read()
158 __description("variable-offset stack write clobbers spilled regs")
161 * register is rejected because the previous variable offset stack
168 * stack access is rejected.
170 __msg_unpriv("R2 variable stack access prohibited for !root")
189 /* Spill R0(map ptr) into stack */ \ in stack_write_clobbers_spilled_regs()
191 /* Dereference the unknown value for a stack write */\ in stack_write_clobbers_spilled_regs()
205 __description("indirect variable-offset stack access, unbounded")
206 __failure __msg("invalid unbounded variable-offset indirect access to stack R4")
212 /* Fill the top 16 bytes of the stack. */ \ in variable_offset_stack_access_unbounded()
221 /* Point the lower bound to initialized stack. Offset is now in range\ in variable_offset_stack_access_unbounded()
238 __description("indirect variable-offset stack access, max out of bound")
239 __failure __msg("invalid variable-offset indirect access to stack R2")
243 /* Fill the top 8 bytes of the stack */ \ in access_max_out_of_bound()
267 * zero-sized stack access. We used to have a bug causing crashes for zero-sized
271 __description("indirect variable-offset stack access, zero-sized, max out of bound")
272 __failure __msg("invalid variable-offset indirect access to stack R1")
277 /* Fill some stack */ \ in zero_sized_access_max_out_of_bound()
296 __description("indirect variable-offset stack access, min out of bound")
297 __failure __msg("invalid variable-offset indirect access to stack R2")
301 /* Fill the top 8 bytes of the stack */ \ in access_min_out_of_bound()
325 __description("indirect variable-offset stack access, min_off < min_initialized")
327 __failure_unpriv __msg_unpriv("R2 variable stack access prohibited for !root")
331 /* Fill only the top 8 bytes of the stack. */ \ in access_min_off_min_initialized()
340 * which. fp-16 size 8 is partially uninitialized stack.\ in access_min_off_min_initialized()
355 __description("indirect variable-offset stack access, priv vs unpriv")
357 __msg_unpriv("R2 variable stack access prohibited for !root")
362 /* Fill the top 16 bytes of the stack. */ \ in stack_access_priv_vs_unpriv()
373 * which, but either way it points to initialized stack.\ in stack_access_priv_vs_unpriv()
388 __description("indirect variable-offset stack access, ok")
393 /* Fill the top 16 bytes of the stack. */ \ in variable_offset_stack_access_ok()
404 * which, but either way it points to initialized stack.\ in variable_offset_stack_access_ok()