Searched refs:bug_type (Results 1 - 6 of 6) sorted by relevance

/linux-master/mm/kasan/
H A Dreport_tags.c37 if ((!info->cache || !info->object) && !info->bug_type) {
38 info->bug_type = get_common_bug_type(info);
82 if (!info->bug_type)
83 info->bug_type = "slab-use-after-free";
97 if (!info->bug_type)
98 info->bug_type = "slab-out-of-bounds";
105 if (!info->bug_type)
106 info->bug_type = get_common_bug_type(info);
H A Dreport_generic.c76 const char *bug_type = "unknown-crash"; local
94 bug_type = "out-of-bounds";
98 bug_type = "slab-out-of-bounds";
101 bug_type = "global-out-of-bounds";
107 bug_type = "stack-out-of-bounds";
110 bug_type = "use-after-free";
114 bug_type = "slab-use-after-free";
118 bug_type = "alloca-out-of-bounds";
121 bug_type = "vmalloc-out-of-bounds";
125 return bug_type;
130 const char *bug_type = "unknown-crash"; local
[all...]
H A Dreport.c246 pr_err("BUG: KASAN: %s in %pS\n", info->bug_type, (void *)info->ip);
322 if (strcmp(info->bug_type, "slab-out-of-bounds") == 0)
324 else if (strcmp(info->bug_type, "slab-use-after-free") == 0)
521 info->bug_type = "invalid-free";
524 info->bug_type = "double-free";
527 /* bug_type filled in by kasan_complete_mode_report_info. */
648 const char *bug_type; local
671 bug_type = "null-ptr-deref";
673 bug_type = "probably user-memory-access";
675 bug_type
[all...]
H A Dkasan.h223 const char *bug_type; member in struct:kasan_report_info
/linux-master/mm/kmsan/
H A Dreport.c154 char *bug_type = NULL; local
172 bug_type = is_uaf ? "use-after-free" : "uninit-value";
175 bug_type = is_uaf ? "kernel-infoleak-after-free" :
179 bug_type = is_uaf ? "kernel-usb-infoleak-after-free" :
188 pr_err("BUG: KMSAN: %s in %pSb\n", bug_type,
/linux-master/arch/arm/kernel/
H A Dtraps.c364 enum bug_trap_type bug_type = BUG_TRAP_TYPE_NONE; local
369 bug_type = report_bug(regs->ARM_pc, regs);
370 if (bug_type != BUG_TRAP_TYPE_NONE)

Completed in 129 milliseconds