New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FIX: use canonical paths and a set when checking loaded dlls #2830
base: master
Are you sure you want to change the base?
Conversation
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## master #2830 +/- ##
=======================================
Coverage 67.15% 67.15%
=======================================
Files 562 562
Lines 104082 104102 +20
=======================================
+ Hits 69896 69910 +14
- Misses 34186 34192 +6 ☔ View full report in Codecov by Sentry. |
The unit tests are added. ✔️ |
Quality Gate passedIssues Measures |
Note: codecov is wrong that is pointing to a problem with the CI's coverage calculations. Perhaps that can be addressed in another PR. |
I take it that this PR is not intended to deal with dlls loaded via The final common function that dynamically loads Given a
can get the same effect from another path location with
|
Yes correct but it still prevents a source of segmentation fault errors that are raised due to the |
Thanks for the hint. I tried to modify that function in here. At the moment it is failing only for macOS-13 platform for some reason. |
Uses a set of canonical path strings to fix the checking of already loaded dlls. It prevents the SEGFAULTs raised from trying to load the same dlls/mods using Python API.
Addresses a part of #2741.