Home
last modified time | relevance | path

Searched refs:bug_type (Results 1 – 5 of 5) sorted by relevance

/linux/mm/kasan/
H A Dreport_generic.c76 const char *bug_type = "unknown-crash"; in get_shadow_bug_type() local
94 bug_type = "out-of-bounds"; in get_shadow_bug_type()
98 bug_type = "slab-out-of-bounds"; in get_shadow_bug_type()
101 bug_type = "global-out-of-bounds"; in get_shadow_bug_type()
107 bug_type = "stack-out-of-bounds"; in get_shadow_bug_type()
110 bug_type = "use-after-free"; in get_shadow_bug_type()
114 bug_type = "slab-use-after-free"; in get_shadow_bug_type()
118 bug_type = "alloca-out-of-bounds"; in get_shadow_bug_type()
121 bug_type = "vmalloc-out-of-bounds"; in get_shadow_bug_type()
125 return bug_type; in get_shadow_bug_type()
[all …]
H A Dreport_tags.c37 if ((!info->cache || !info->object) && !info->bug_type) { in kasan_complete_mode_report_info()
38 info->bug_type = get_common_bug_type(info); in kasan_complete_mode_report_info()
82 if (!info->bug_type) in kasan_complete_mode_report_info()
83 info->bug_type = "slab-use-after-free"; in kasan_complete_mode_report_info()
97 if (!info->bug_type) in kasan_complete_mode_report_info()
98 info->bug_type = "slab-out-of-bounds"; in kasan_complete_mode_report_info()
105 if (!info->bug_type) in kasan_complete_mode_report_info()
106 info->bug_type = get_common_bug_type(info); in kasan_complete_mode_report_info()
H A Dreport.c246 pr_err("BUG: KASAN: %s in %pS\n", info->bug_type, (void *)info->ip); in print_error_description()
322 if (strcmp(info->bug_type, "slab-out-of-bounds") == 0) in describe_object_addr()
324 else if (strcmp(info->bug_type, "slab-use-after-free") == 0) in describe_object_addr()
521 info->bug_type = "invalid-free"; in complete_report_info()
524 info->bug_type = "double-free"; in complete_report_info()
648 const char *bug_type; in kasan_non_canonical_hook() local
671 bug_type = "null-ptr-deref"; in kasan_non_canonical_hook()
673 bug_type = "probably user-memory-access"; in kasan_non_canonical_hook()
675 bug_type = "probably wild-memory-access"; in kasan_non_canonical_hook()
677 bug_type = "maybe wild-memory-access"; in kasan_non_canonical_hook()
[all …]
H A Dkasan.h223 const char *bug_type; member
/linux/mm/kmsan/
H A Dreport.c156 char *bug_type = NULL; in kmsan_report() local
174 bug_type = is_uaf ? "use-after-free" : "uninit-value"; in kmsan_report()
177 bug_type = is_uaf ? "kernel-infoleak-after-free" : in kmsan_report()
181 bug_type = is_uaf ? "kernel-usb-infoleak-after-free" : in kmsan_report()
190 pr_err("BUG: KMSAN: %s in %pSb\n", bug_type, in kmsan_report()