Lines Matching full:shadow
742 shadow memory every X ms. flush_symbolizer_ms Flush symbolizer caches every X ms. memory_limit_mb Resident memory limit in MB to aim at.If the process consumes more memory, then TSan will flush shadow memory. stop_on_start Stops on start until __tsan_resume() is called (for debugging). running_on_valgrind Controls whether RunningOnValgrind() returns true or false. history_size Per-thread history size, controls how many previous memory accesses are remembered per thread. Possible values are [0..7]. history_size=0 amounts to 32K memory accesses. Each next value doubles the amount of memory accesses, up to history_size=7 that amounts to 4M memory accesses. The default value is 2 (128K memory accesses). io_sync Controls level of synchronization implied by IO operations. 0 - no synchronization 1 - reasonable level of synchronization (write->read)2 - global synchronization of all IO operations. die_after_fork Die after multi-threaded fork if the child creates new threads. #%n %f %S %M ThreadSanitizer: incorrect value for history_size (must be [0..7])
752 mapped meta shadow for (%p-%p) at (%p-%p)
785 expected '=' unterminated string expected separator or eol Flag parsing failed. ((n_flags_)) < ((kMaxFlags)) auto . DEFAULT include read more options from the given file symbolize If set, use the online symbolizer from common sanitizer runtime to turn virtual addresses to file/line locations. external_symbolizer_path Path to external symbolizer. If empty, the tool will search $PATH for the symbolizer. allow_addr2line If set, allows online symbolizer to run addr2line binary to symbolize stack traces (addr2line will only be used if llvm-symbolizer binary is unavailable. strip_path_prefix Strips this prefix from file paths in error reports. fast_unwind_on_check If available, use the fast frame-pointer-based unwinder on internal CHECK failures. fast_unwind_on_fatal If available, use the fast frame-pointer-based unwinder on fatal errors. fast_unwind_on_malloc If available, use the fast frame-pointer-based unwinder on malloc/free. handle_ioctl Intercept and handle ioctl requests. malloc_context_size Max number of stack frames kept for each allocation/deallocation. log_path Write logs to "log_path.pid". The special values are "stdout" and "stderr". The default is "stderr". verbosity Verbosity level (0 - silent, 1 - a bit of output, 2+ - more output). detect_leaks Enable memory leak detection. leak_check_at_exit Invoke leak checking in an atexit handler. Has no effect if detect_leaks=false, or if __lsan_do_leak_check() is called before the handler has a chance to run. allocator_may_return_null If false, the allocator will crash instead of returning 0 on out-of-memory. print_summary If false, disable printing error summaries in addition to error reports. check_printf Check printf arguments. handle_segv If set, registers the tool's custom SEGV handler (both SIGBUS and SIGSEGV on OSX). allow_user_segv_handler If set, allows user to register a SEGV handler even if the tool registers one. use_sigaltstack If set, uses alternate stack for signal handling. detect_deadlocks If set, deadlock detection is enabled. clear_shadow_mmap_threshold Large shadow regions are zero-filled using mmap(NORESERVE) instead of memset(). This is the threshold size in bytes. color Colorize reports: (always|never|auto). legacy_pthread_cond Enables support for dynamic libraries linked with libpthread 2.2.5. intercept_tls_get_addr Intercept __tls_get_addr. help Print the flag descriptions. mmap_limit_mb Limit the amount of mmap-ed memory (excluding shadowshadow in core file. symbolize_inline_frames Print inlined frames in stacktraces. Defaults to true. stack_trace_format Format string used to render stack frames. See sanitizer_stacktrace_printer.h for the format description. Use DEFAULT to get default format. no_huge_pages_for_shadow If true, the shadow is not allowed to use huge pages. (((reinterpret_cast<uptr>(s) | n) & 15)) == ((0)) ((base)) == ((10)) ((size)) <= ((1ULL << (40))) Supported Printf formats: %([0-9]*)?(z|ll)?{d,u,x}; %p; %(\.\*)?s; %c
811 ../../sanitizer_common/sanitizer_mutex.h ((atomic_load(&state_, memory_order_relaxed))) == ((1)) ../rtl/tsan_rtl.h ((hs)) <= ((7)) ../rtl/tsan_platform.h ((IsShadowMem(s))) != (0) ((!(s0.IsAtomic() && s1.IsAtomic()))) != (0) ../rtl/tsan_sync.h ((uid)) == ((GetLsb(uid, 14))) ((ent)) != ((0)) ((IsShadowMem((uptr)p))) != (0) ((IsShadowMem((uptr)(p + size * kShadowCnt / kShadowCell - 1)))) != (0) checking shadow region %p-%p
812 checking pointer %p: shadow=%p meta=%p