Home
last modified time | relevance | path

Searched refs:bug_type (Results 1 – 3 of 3) sorted by relevance

/linux/mm/kasan/
A Dreport_generic.c62 bug_type = "out-of-bounds"; in get_shadow_bug_type()
66 bug_type = "slab-out-of-bounds"; in get_shadow_bug_type()
69 bug_type = "global-out-of-bounds"; in get_shadow_bug_type()
75 bug_type = "stack-out-of-bounds"; in get_shadow_bug_type()
80 bug_type = "use-after-free"; in get_shadow_bug_type()
84 bug_type = "alloca-out-of-bounds"; in get_shadow_bug_type()
91 return bug_type; in get_shadow_bug_type()
99 bug_type = "null-ptr-deref"; in get_wild_bug_type()
101 bug_type = "user-memory-access"; in get_wild_bug_type()
103 bug_type = "wild-memory-access"; in get_wild_bug_type()
[all …]
A Dreport.c471 const char *bug_type; in kasan_non_canonical_hook() local
489 bug_type = "null-ptr-deref"; in kasan_non_canonical_hook()
491 bug_type = "probably user-memory-access"; in kasan_non_canonical_hook()
493 bug_type = "maybe wild-memory-access"; in kasan_non_canonical_hook()
494 pr_alert("KASAN: %s in range [0x%016lx-0x%016lx]\n", bug_type, in kasan_non_canonical_hook()
/linux/arch/arm/kernel/
A Dtraps.c344 enum bug_trap_type bug_type = BUG_TRAP_TYPE_NONE; in die() local
349 bug_type = report_bug(regs->ARM_pc, regs); in die()
350 if (bug_type != BUG_TRAP_TYPE_NONE) in die()

Completed in 9 milliseconds