Lines Matching full:stack
134 PrintShadowByte(" Stack left redzone: ", kAsanStackLeftRedzoneMagic);
135 PrintShadowByte(" Stack mid redzone: ", kAsanStackMidRedzoneMagic);
136 PrintShadowByte(" Stack right redzone: ", kAsanStackRightRedzoneMagic);
137 PrintShadowByte(" Stack partial redzone: ", kAsanStackPartialRedzoneMagic);
138 PrintShadowByte(" Stack after return: ", kAsanStackAfterReturnMagic);
139 PrintShadowByte(" Stack use after scope: ", kAsanStackUseAfterScopeMagic);
290 Printf("Address %p is located in stack of thread T%d%s "
296 // We print this frame as a stack trace with one element.
298 // The frame numbers may be different than those in the stack trace printed
301 // (e.g. use-after-scope, or different thread's stack).
307 // Report the number of stack objects.
320 Printf("AddressSanitizer can't parse the stack frame "
331 "some custom stack unwind mechanism or swapcontext\n"
434 PrintStack(&context->stack);
480 // We started reporting an error message. Stop using the fake stack
506 static void ReportSummary(const char *error_type, StackTrace *stack) {
507 if (!stack->size) return;
510 // Currently, we include the first stack frame into the report summary.
512 uptr pc = StackTrace::GetPreviousInstructionPc(stack->trace[0]);
533 PrintStack(&stack);
534 ReportSummary("SEGV", &stack);
537 void ReportDoubleFree(uptr addr, StackTrace *stack) {
549 PrintStack(stack);
551 ReportSummary("double-free", stack);
554 void ReportFreeNotMalloced(uptr addr, StackTrace *stack) {
564 PrintStack(stack);
566 ReportSummary("bad-free", stack);
569 void ReportAllocTypeMismatch(uptr addr, StackTrace *stack,
583 PrintStack(stack);
585 ReportSummary("alloc-dealloc-mismatch", stack);
590 void ReportMallocUsableSizeNotOwned(uptr addr, StackTrace *stack) {
598 PrintStack(stack);
600 ReportSummary("bad-malloc_usable_size", stack);
603 void ReportAsanGetAllocatedSizeNotOwned(uptr addr, StackTrace *stack) {
611 PrintStack(stack);
613 ReportSummary("bad-__asan_get_allocated_size", stack);
618 const char *offset2, uptr length2, StackTrace *stack) {
628 PrintStack(stack);
631 ReportSummary(bug_type, stack);
637 uptr addr, uptr zone_ptr, const char *zone_name, StackTrace *stack) {
643 PrintStack(stack);
648 uptr addr, uptr zone_ptr, const char *zone_name, StackTrace *stack) {
654 PrintStack(stack);
659 uptr addr, uptr zone_ptr, const char *zone_name, StackTrace *stack) {
665 PrintStack(stack);
697 bug_descr = "stack-buffer-underflow";
705 bug_descr = "stack-buffer-overflow";
708 bug_descr = "stack-use-after-return";
714 bug_descr = "stack-use-after-scope";
738 PrintStack(&stack);
741 ReportSummary(bug_descr, &stack);