Home
last modified time | relevance | path

Searched refs:bug_type (Results 1 – 3 of 3) sorted by relevance

/Linux-v5.15/mm/kasan/
Dreport_generic.c44 const char *bug_type = "unknown-crash"; in get_shadow_bug_type() local
62 bug_type = "out-of-bounds"; in get_shadow_bug_type()
66 bug_type = "slab-out-of-bounds"; in get_shadow_bug_type()
69 bug_type = "global-out-of-bounds"; in get_shadow_bug_type()
75 bug_type = "stack-out-of-bounds"; in get_shadow_bug_type()
80 bug_type = "use-after-free"; in get_shadow_bug_type()
84 bug_type = "alloca-out-of-bounds"; in get_shadow_bug_type()
87 bug_type = "vmalloc-out-of-bounds"; in get_shadow_bug_type()
91 return bug_type; in get_shadow_bug_type()
96 const char *bug_type = "unknown-crash"; in get_wild_bug_type() local
[all …]
Dreport.c480 const char *bug_type; in kasan_non_canonical_hook() local
498 bug_type = "null-ptr-deref"; in kasan_non_canonical_hook()
500 bug_type = "probably user-memory-access"; in kasan_non_canonical_hook()
502 bug_type = "maybe wild-memory-access"; in kasan_non_canonical_hook()
503 pr_alert("KASAN: %s in range [0x%016lx-0x%016lx]\n", bug_type, in kasan_non_canonical_hook()
/Linux-v5.15/arch/arm/kernel/
Dtraps.c344 enum bug_trap_type bug_type = BUG_TRAP_TYPE_NONE; in die() local
349 bug_type = report_bug(regs->ARM_pc, regs); in die()
350 if (bug_type != BUG_TRAP_TYPE_NONE) in die()