8000 Check global state destruction in destructors by npmiller · Pull Request #1296 · oneapi-src/unified-memory-framework · GitHub
[go: up one dir, main page]

Skip to content

Check global state destruction in destructors #1296

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
May 5, 2025

Conversation

npmiller
Copy link
Contributor
@npmiller npmiller commented May 5, 2025

In some cases the global state may have been destroyed when we reach umfDestroyPool or umfDestroyProvider, in which case actually going through with the destruction will cause segmentation faults.

The way the global state is managed should maybe be re-worked, but this should be an okay workaround to avoid segmentation faults until then.

Checklist

  • Code compiles without errors locally
  • All tests pass locally
  • CI workflows execute properly

@npmiller npmiller requested a review from a team as a code owner May 5, 2025 10:10
In some cases the global state may have been destroyed when we reach
`umfDestroyPool` or `umfDestroyProvider`, in which case actually going
through with the destruction will cause segmentation faults.

The way the global state is managed should maybe be re-worked, but this
should be an okay workaround to avoid segmentation faults until then.
Copy link
Contributor
@ldorau ldorau left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@bratpiorka
Copy link
Contributor

@npmiller thank you very much for this fix. Please don't worry about some of the failing tests in our CI - they are known sporadic issues

@ldorau ldorau merged commit a622dc7 into oneapi-src:main May 5, 2025
243 of 254 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants
0