Home | History | Annotate | Download | only in sanitizer_common

Lines Matching refs:stack

83     // Find the mapping that contains a stack variable.
99 // When running with unlimited stack size, we still want to set some limit.
100 // The unlimited stack size is caused by 'ulimit -s unlimited'.
101 // Also, for some reason, GNU make spawns subprocesses with unlimited stack.
177 "Failed to open libcorkscrew.so. You may see broken stack traces "
191 "You may see broken stack traces in SEGV reports.");
221 StackTrace *stack;
227 CHECK_LT(arg->stack->size, arg->max_depth);
229 arg->stack->trace[arg->stack->size++] = pc;
230 if (arg->stack->size == arg->max_depth) return UNWIND_STOP;
430 // If stack and tls intersect, make them non-intersecting.
445 // GLibC will return (0 - stacksize) as the stack address in the case when
458 Printf("Sanitizer: pre-allocated stack size is insufficient: "