Home | History | Annotate | Download | only in asan

Lines Matching refs:stack

127   PrintShadowByte(str, "  Stack left redzone:      ",
129 PrintShadowByte(str, " Stack mid redzone: ",
131 PrintShadowByte(str, " Stack right redzone: ",
133 PrintShadowByte(str, " Stack partial redzone: ",
135 PrintShadowByte(str, " Stack after return: ",
137 PrintShadowByte(str, " Stack use after scope: ",
374 Printf("Address %p is located in stack of thread T%d%s "
380 // We print this frame as a stack trace with one element.
382 // The frame numbers may be different than those in the stack trace printed
385 // (e.g. use-after-scope, or different thread's stack).
391 // Report the number of stack objects.
406 Printf("AddressSanitizer can't parse the stack frame "
428 "some custom stack unwind mechanism or swapcontext\n"
604 "ERROR: AddressSanitizer: stack-overflow on address %p"
610 stack.Print();
611 ReportErrorSummary("stack-overflow", &stack);
625 stack.Print();
627 ReportErrorSummary("SEGV", &stack);
643 stack.Print();
645 ReportErrorSummary("double-free", &stack);
660 stack.Print();
662 ReportErrorSummary("bad-free", &stack);
681 stack.Print();
683 ReportErrorSummary("alloc-dealloc-mismatch", &stack);
688 void ReportMallocUsableSizeNotOwned(uptr addr, StackTrace *stack) {
696 stack->Print();
698 ReportErrorSummary("bad-malloc_usable_size", stack);
701 void ReportSanitizerGetAllocatedSizeNotOwned(uptr addr, StackTrace *stack) {
709 stack->Print();
711 ReportErrorSummary("bad-__sanitizer_get_allocated_size", stack);
716 const char *offset2, uptr length2, StackTrace *stack) {
726 stack->Print();
729 ReportErrorSummary(bug_type, stack);
733 StackTrace *stack) {
740 stack->Print();
742 ReportErrorSummary(bug_type, stack);
747 StackTrace *stack) {
756 stack->Print();
757 ReportErrorSummary("bad-__sanitizer_annotate_contiguous_container", stack);
796 stack.Print();
799 ReportErrorSummary("invalid-pointer-pair", &stack);
818 uptr addr, uptr zone_ptr, const char *zone_name, StackTrace *stack) {
824 stack->Print();
829 uptr addr, uptr zone_ptr, const char *zone_name, StackTrace *stack) {
835 stack->Print();
840 uptr addr, uptr zone_ptr, const char *zone_name, StackTrace *stack) {
846 stack->Print();
878 bug_descr = "stack-buffer-underflow";
886 bug_descr = "stack-buffer-overflow";
889 bug_descr = "stack-use-after-return";
898 bug_descr = "stack-use-after-scope";
922 stack.Print();
925 ReportErrorSummary(bug_descr, &stack);