Home | History | Annotate | Download | only in runtime

Lines Matching full:shadow

742 shadow memory every X ms.flush_symbolizer_msFlush symbolizer caches every X ms.memory_limit_mbResident memory limit in MB to aim at.If the process consumes more memory, then TSan will flush shadow memory.stop_on_startStops on start until __tsan_resume() is called (for debugging).running_on_valgrindControls whether RunningOnValgrind() returns true or false.history_sizePer-thread history size, controls how many previous memory accesses are remembered per thread.  Possible values are [0..7]. history_size=0 amounts to 32K memory accesses.  Each next value doubles the amount of memory accesses, up to history_size=7 that amounts to 4M memory accesses.  The default value is 2 (128K memory accesses).io_syncControls level of synchronization implied by IO operations. 0 - no synchronization 1 - reasonable level of synchronization (write->read)2 - global synchronization of all IO operations.die_after_forkDie after multi-threaded fork if the child creates new threads.    #%n %f %S %MThreadSanitizer: incorrect value for history_size (must be [0..7])
752 mapped meta shadow for (%p-%p) at (%p-%p)
785 expected '='unterminated stringexpected separator or eolFlag parsing failed.((n_flags_)) < ((kMaxFlags))auto.DEFAULTincluderead more options from the given filesymbolizeIf set, use the online symbolizer from common sanitizer runtime to turn virtual addresses to file/line locations.external_symbolizer_pathPath to external symbolizer. If empty, the tool will search $PATH for the symbolizer.allow_addr2lineIf set, allows online symbolizer to run addr2line binary to symbolize stack traces (addr2line will only be used if llvm-symbolizer binary is unavailable.strip_path_prefixStrips this prefix from file paths in error reports.fast_unwind_on_checkIf available, use the fast frame-pointer-based unwinder on internal CHECK failures.fast_unwind_on_fatalIf available, use the fast frame-pointer-based unwinder on fatal errors.fast_unwind_on_mallocIf available, use the fast frame-pointer-based unwinder on malloc/free.handle_ioctlIntercept and handle ioctl requests.malloc_context_sizeMax number of stack frames kept for each allocation/deallocation.log_pathWrite logs to "log_path.pid". The special values are "stdout" and "stderr". The default is "stderr".verbosityVerbosity level (0 - silent, 1 - a bit of output, 2+ - more output).detect_leaksEnable memory leak detection.leak_check_at_exitInvoke leak checking in an atexit handler. Has no effect if detect_leaks=false, or if __lsan_do_leak_check() is called before the handler has a chance to run.allocator_may_return_nullIf false, the allocator will crash instead of returning 0 on out-of-memory.print_summaryIf false, disable printing error summaries in addition to error reports.check_printfCheck printf arguments.handle_segvIf set, registers the tool's custom SEGV handler (both SIGBUS and SIGSEGV on OSX).allow_user_segv_handlerIf set, allows user to register a SEGV handler even if the tool registers one.use_sigaltstackIf set, uses alternate stack for signal handling.detect_deadlocksIf set, deadlock detection is enabled.clear_shadow_mmap_thresholdLarge shadow regions are zero-filled using mmap(NORESERVE) instead of memset(). This is the threshold size in bytes.colorColorize reports: (always|never|auto).legacy_pthread_condEnables support for dynamic libraries linked with libpthread 2.2.5.intercept_tls_get_addrIntercept __tls_get_addr.helpPrint the flag descriptions.mmap_limit_mbLimit the amount of mmap-ed memory (excluding shadowshadow in core file.symbolize_inline_framesPrint inlined frames in stacktraces. Defaults to true.stack_trace_formatFormat string used to render stack frames. See sanitizer_stacktrace_printer.h for the format description. Use DEFAULT to get default format.no_huge_pages_for_shadowIf true, the shadow is not allowed to use huge pages. (((reinterpret_cast<uptr>(s) | n) & 15)) == ((0))((base)) == ((10))((size)) <= ((1ULL << (40)))Supported Printf formats: %([0-9]*)?(z|ll)?{d,u,x}; %p; %(\.\*)?s; %c
811 ../../sanitizer_common/sanitizer_mutex.h((atomic_load(&state_, memory_order_relaxed))) == ((1))../rtl/tsan_rtl.h((hs)) <= ((7))../rtl/tsan_platform.h((IsShadowMem(s))) != (0)((!(s0.IsAtomic() && s1.IsAtomic()))) != (0)../rtl/tsan_sync.h((uid)) == ((GetLsb(uid, 14)))((ent)) != ((0))((IsShadowMem((uptr)p))) != (0)((IsShadowMem((uptr)(p + size * kShadowCnt / kShadowCell - 1)))) != (0)checking shadow region %p-%p
812 checking pointer %p: shadow=%p meta=%p