You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-`TRITON_ENABLE_ASAN=1` invokes the LLVM address sanitizer for
176
+
memory leak and out of bounds access detection. Currently only supported on the AMD
177
+
backend. This must be run using the ASAN libraries documented [here](https://rocm.docs.amd.com/projects/llvm-project/en/latest/conceptual/using-gpu-sanitizer.html).
178
+
179
+
When enabling the address sanitizer it is recommended to disable various memory caching strategies
180
+
both within the ROCm stack and PyTorch. This will give the address sanitizer the best chance at finding the
181
+
memory fault where it originates. This can be done through the HSA_DISABLE_FRAGMENT_ALLOCATOR, AMD_PYTORCH_NO_CUDA_MEMORY_CACHING,
182
+
and PYTORCH_NO_HIP_MEMORY_CACHING environment variables.
183
+
175
184
-`USE_IR_LOC={ttir,ttgir}` reparses the IR such that the location information
176
185
will be the line number of the IR file with that particular extension,
177
186
instead of line number of the python file. This can provide a direct mapping
0 commit comments