diff options
| author | Andrey Ryabinin <aryabinin@virtuozzo.com> | 2016-05-20 16:59:20 -0700 |
|---|---|---|
| committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2020-10-29 09:03:00 +0100 |
| commit | cb641c4d462e4c6b22d4b07b62dda9cc58ad6e6b (patch) | |
| tree | bd4f434c3bcca88046ddb29322e59f758d22e078 /include/linux/compiler.h | |
| parent | 879c8163da5fa033b155e3a73dccf67b15e595e4 (diff) | |
mm/kasan: print name of mem[set,cpy,move]() caller in report
commit 936bb4bbbb832f81055328b84e5afe1fc7246a8d upstream.
When bogus memory access happens in mem[set,cpy,move]() it's usually
caller's fault. So don't blame mem[set,cpy,move]() in bug report, blame
the caller instead.
Before:
BUG: KASAN: out-of-bounds access in memset+0x23/0x40 at <address>
After:
BUG: KASAN: out-of-bounds access in <memset_caller> at <address>
Link: http://lkml.kernel.org/r/1462538722-1574-2-git-send-email-aryabinin@virtuozzo.com
Signed-off-by: Andrey Ryabinin <aryabinin@virtuozzo.com>
Acked-by: Alexander Potapenko <glider@google.com>
Cc: Dmitry Vyukov <dvyukov@google.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Ben Hutchings <ben.hutchings@codethink.co.uk>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'include/linux/compiler.h')
0 files changed, 0 insertions, 0 deletions
