Home
last modified time | relevance | path

Searched refs:bug_type (Results 1 – 3 of 3) sorted by relevance

/linux-5.19.10/mm/kasan/
Dreport_generic.c48 const char *bug_type = "unknown-crash"; in get_shadow_bug_type() local
66 bug_type = "out-of-bounds"; in get_shadow_bug_type()
70 bug_type = "slab-out-of-bounds"; in get_shadow_bug_type()
73 bug_type = "global-out-of-bounds"; in get_shadow_bug_type()
79 bug_type = "stack-out-of-bounds"; in get_shadow_bug_type()
84 bug_type = "use-after-free"; in get_shadow_bug_type()
88 bug_type = "alloca-out-of-bounds"; in get_shadow_bug_type()
91 bug_type = "vmalloc-out-of-bounds"; in get_shadow_bug_type()
95 return bug_type; in get_shadow_bug_type()
100 const char *bug_type = "unknown-crash"; in get_wild_bug_type() local
[all …]
Dreport.c534 const char *bug_type; in kasan_non_canonical_hook() local
552 bug_type = "null-ptr-deref"; in kasan_non_canonical_hook()
554 bug_type = "probably user-memory-access"; in kasan_non_canonical_hook()
556 bug_type = "maybe wild-memory-access"; in kasan_non_canonical_hook()
557 pr_alert("KASAN: %s in range [0x%016lx-0x%016lx]\n", bug_type, in kasan_non_canonical_hook()
/linux-5.19.10/arch/arm/kernel/
Dtraps.c361 enum bug_trap_type bug_type = BUG_TRAP_TYPE_NONE; in die() local
366 bug_type = report_bug(regs->ARM_pc, regs); in die()
367 if (bug_type != BUG_TRAP_TYPE_NONE) in die()