-
Notifications
You must be signed in to change notification settings - Fork 738
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[DeviceSanitizer] Support "-fsanitize-ignorelist=" to disable sanitizing on some of kernels #15294
base: sycl
Are you sure you want to change the base?
Conversation
Hi @intel/dpcpp-sanitizers-review @intel/dpcpp-tools-reviewers @intel/dpcpp-esimd-reviewers, please review, Thanks! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
not qualified to review the actual devicesan stuff, some high level comments
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
approving as my comments are addressed, but i will leave it to others to review the technical part of the change
SmallVector<Metadata *, 3> MD; | ||
auto *Ty = Type::getInt32Ty(Ctx); | ||
MD.push_back(ConstantAsMetadata::get( | ||
Constant::getIntegerValue(Ty, APInt(32, SPIRV_HOST_ACCESS_DECOR)))); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
host access mode should be read only?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice catch! done.
UR: oneapi-src/unified-runtime#2055
We reuse
-fsanitize-ignorelist=
to support kernel filtering.Usage: https://clang.llvm.org/docs/SanitizerSpecialCaseList.html