diff options
author | Jiri Kosina <jkosina@suse.cz> | 2021-11-24 18:36:00 +0100 |
---|---|---|
committer | Jiri Kosina <jkosina@suse.cz> | 2021-11-24 18:36:00 +0100 |
commit | a981f4cca5bbb8ee7f456bd1b4f839c02f10fb22 (patch) | |
tree | 200083e5eb1303705899a1c29c46615f6b9e5b11 | |
parent | 0fa95b6a16eb46888fcd0fbf36dfe042c80b5f66 (diff) | |
download | jikos-for-5.16/mvm-wiphy-lock.tar.gz |
kasan: distinguish kasan report with generic BUG()for-5.16/mvm-wiphy-lock
The typical KASAN report always begins with
BUG: KASAN: ....
in kernel log. That 'BUG:' prefix creates a false impression that it's an actual
BUG() codepath being executed, and as such things like 'oops_on_panic' etc. would
work on it as expected; but that's obviously not the case.
Switch the order of prefixes to make this distinction clear.
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
-rw-r--r-- | mm/kasan/report.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/mm/kasan/report.c b/mm/kasan/report.c index 0bc10f452f7e36..ead714c844e9ec 100644 --- a/mm/kasan/report.c +++ b/mm/kasan/report.c @@ -86,7 +86,7 @@ __setup("kasan_multi_shot", kasan_set_multi_shot); static void print_error_description(struct kasan_access_info *info) { - pr_err("BUG: KASAN: %s in %pS\n", + pr_err("KASAN: BUG: %s in %pS\n", kasan_get_bug_type(info), (void *)info->ip); if (info->access_size) pr_err("%s of size %zu at addr %px by task %s/%d\n", @@ -366,7 +366,7 @@ void kasan_report_invalid_free(void *object, unsigned long ip) #endif /* IS_ENABLED(CONFIG_KUNIT) */ start_report(&flags); - pr_err("BUG: KASAN: double-free or invalid-free in %pS\n", (void *)ip); + pr_err("KASAN: BUG: double-free or invalid-free in %pS\n", (void *)ip); kasan_print_tags(tag, object); pr_err("\n"); print_address_description(object, tag); @@ -386,7 +386,7 @@ void kasan_report_async(void) #endif /* IS_ENABLED(CONFIG_KUNIT) */ start_report(&flags); - pr_err("BUG: KASAN: invalid-access\n"); + pr_err("KASAN: BUG: invalid-access\n"); pr_err("Asynchronous mode enabled: no access details available\n"); pr_err("\n"); dump_stack_lvl(KERN_ERR); |