aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJiri Kosina <jkosina@suse.cz>2021-11-24 18:36:00 +0100
committerJiri Kosina <jkosina@suse.cz>2021-11-24 18:36:00 +0100
commita981f4cca5bbb8ee7f456bd1b4f839c02f10fb22 (patch)
tree200083e5eb1303705899a1c29c46615f6b9e5b11
parent0fa95b6a16eb46888fcd0fbf36dfe042c80b5f66 (diff)
downloadjikos-for-5.16/mvm-wiphy-lock.tar.gz
kasan: distinguish kasan report with generic BUG()for-5.16/mvm-wiphy-lock
The typical KASAN report always begins with BUG: KASAN: .... in kernel log. That 'BUG:' prefix creates a false impression that it's an actual BUG() codepath being executed, and as such things like 'oops_on_panic' etc. would work on it as expected; but that's obviously not the case. Switch the order of prefixes to make this distinction clear. Signed-off-by: Jiri Kosina <jkosina@suse.cz>
-rw-r--r--mm/kasan/report.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/mm/kasan/report.c b/mm/kasan/report.c
index 0bc10f452f7e36..ead714c844e9ec 100644
--- a/mm/kasan/report.c
+++ b/mm/kasan/report.c
@@ -86,7 +86,7 @@ __setup("kasan_multi_shot", kasan_set_multi_shot);
static void print_error_description(struct kasan_access_info *info)
{
- pr_err("BUG: KASAN: %s in %pS\n",
+ pr_err("KASAN: BUG: %s in %pS\n",
kasan_get_bug_type(info), (void *)info->ip);
if (info->access_size)
pr_err("%s of size %zu at addr %px by task %s/%d\n",
@@ -366,7 +366,7 @@ void kasan_report_invalid_free(void *object, unsigned long ip)
#endif /* IS_ENABLED(CONFIG_KUNIT) */
start_report(&flags);
- pr_err("BUG: KASAN: double-free or invalid-free in %pS\n", (void *)ip);
+ pr_err("KASAN: BUG: double-free or invalid-free in %pS\n", (void *)ip);
kasan_print_tags(tag, object);
pr_err("\n");
print_address_description(object, tag);
@@ -386,7 +386,7 @@ void kasan_report_async(void)
#endif /* IS_ENABLED(CONFIG_KUNIT) */
start_report(&flags);
- pr_err("BUG: KASAN: invalid-access\n");
+ pr_err("KASAN: BUG: invalid-access\n");
pr_err("Asynchronous mode enabled: no access details available\n");
pr_err("\n");
dump_stack_lvl(KERN_ERR);