Lines Matching refs:stack
161 PrintShadowByte(str, " Stack left redzone: ",
163 PrintShadowByte(str, " Stack mid redzone: ",
165 PrintShadowByte(str, " Stack right redzone: ",
167 PrintShadowByte(str, " Stack partial redzone: ",
169 PrintShadowByte(str, " Stack after return: ",
171 PrintShadowByte(str, " Stack use after scope: ",
455 Printf("Address %p is located in stack of thread T%d%s", addr, t->tid(),
458 stack frame for this access.
467 // We print this frame as a stack trace with one element.
469 // The frame numbers may be different than those in the stack trace printed
472 // (e.g. use-after-scope, or different thread's stack).
486 Printf("AddressSanitizer can't parse the stack frame "
488 // 'addr' is a stack address, so return true even if we can't parse frame
492 // Report the number of stack objects.
503 "some custom stack unwind mechanism or swapcontext\n");
745 "ERROR: AddressSanitizer: stack-overflow on address %p"
751 stack.Print();
752 ReportErrorSummary("stack-overflow", &stack);
769 stack.Print();
772 ReportErrorSummary(description, &stack);
788 stack.Print();
790 ReportErrorSummary("double-free", &stack);
810 stack.Print();
812 ReportErrorSummary("new-delete-type-mismatch", &stack);
829 stack.Print();
831 ReportErrorSummary("bad-free", &stack);
850 stack.Print();
852 ReportErrorSummary("alloc-dealloc-mismatch", &stack);
857 void ReportMallocUsableSizeNotOwned(uptr addr, BufferedStackTrace *stack) {
865 stack->Print();
867 ReportErrorSummary("bad-malloc_usable_size", stack);
871 BufferedStackTrace *stack) {
879 stack->Print();
881 ReportErrorSummary("bad-__sanitizer_get_allocated_size", stack);
887 BufferedStackTrace *stack) {
897 stack->Print();
900 ReportErrorSummary(bug_type, stack);
904 BufferedStackTrace *stack) {
911 stack->Print();
913 ReportErrorSummary(bug_type, stack);
918 BufferedStackTrace *stack) {
930 stack->Print();
931 ReportErrorSummary("bad-__sanitizer_annotate_contiguous_container", stack);
973 stack.Print();
976 ReportErrorSummary(bug_type, &stack);
995 BufferedStackTrace *stack) {
1001 stack->Print();
1053 bug_descr = "stack-buffer-underflow";
1061 bug_descr = "stack-buffer-overflow";
1064 bug_descr = "stack-use-after-return";
1073 bug_descr = "stack-use-after-scope";
1083 bug_descr = "dynamic-stack-buffer-overflow";
1109 stack.Print();
1112 ReportErrorSummary(bug_descr, &stack);