-
Notifications
You must be signed in to change notification settings - Fork 801
[SYCL] Introduce sycl-sanitizer tool #4174
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
cc97308 to
0dc5382
Compare
|
Tests: intel/llvm-test-suite#459 |
f0f21e0 to
48484eb
Compare
sycl-sanitizer tool aims to help developers find memory leaks when using USM pointers.
|
@smaslov-intel FYI |
|
Cool stuff! |
| _ZN2cl4sycl7handler20associateWithHandlerEPNS0_6detail16AccessorBaseHostENS0_6access6targetE | ||
| _ZN2cl4sycl7handler20setStateSpecConstSetEv | ||
| _ZN2cl4sycl7handler22setHandlerKernelBundleERKSt10shared_ptrINS0_6detail18kernel_bundle_implEE | ||
| _ZN2cl4sycl7handler28setStateExplicitKernelBundleEv |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It is ABI breaking change, isn't it?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No, it has been re-ordered
|
replaced with #5389 |
sycl-sanitizer is a CLI tool to facilitate development of DPC++ applications. Currently sycl-sanitizer is capable of the following diagnostics:
Example usage: