-
Notifications
You must be signed in to change notification settings - Fork 787
[SYCL] Introduce sycl-sanitizer tool #4174
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
cc97308
to
0dc5382
Compare
Tests: intel/llvm-test-suite#459 |
f0f21e0
to
48484eb
Compare
sycl-sanitizer tool aims to help developers find memory leaks when using USM pointers.
@smaslov-intel FYI |
Cool stuff! |
@@ -3922,10 +3959,10 @@ _ZN2cl4sycl7handler20DisableRangeRoundingEv | |||
_ZN2cl4sycl7handler20associateWithHandlerEPNS0_6detail16AccessorBaseHostENS0_6access6targetE | |||
_ZN2cl4sycl7handler20setStateSpecConstSetEv | |||
_ZN2cl4sycl7handler22setHandlerKernelBundleERKSt10shared_ptrINS0_6detail18kernel_bundle_implEE | |||
_ZN2cl4sycl7handler28setStateExplicitKernelBundleEv |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It is ABI breaking change, isn't it?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No, it has been re-ordered
replaced with #5389 |
sycl-sanitizer is a CLI tool to facilitate development of DPC++ applications. Currently sycl-sanitizer is capable of the following diagnostics:
Example usage: