This is an automated email from the ASF dual-hosted git repository. awong pushed a commit to branch branch-1.13.x in repository https://gitbox.apache.org/repos/asf/kudu.git
commit 1e630db0348c44793f55513eddd23e8f4ab9b2c4 Author: Grant Henke <[email protected]> AuthorDate: Tue Nov 24 11:18:56 2020 -0600 KUDU-2700: Add a LSAN suppression OpenSSL 1.1 has a leak in libcrypto.so when running tests that use the CLI to connect to a remote server. Previously this didn’t impact CI runs because Jenkins and dist_test were using Ubuntu 14 and therefore OpenSSL 1.0. Now that we are using Ubuntu 18 and OpenSSL 1.1 this leak is reproducable 100% of the time. This patch suppresses the leak to unbreak the ASAN builds. Change-Id: I5d1378a820997d3eabfa7e5cda53c07dd4df917d Reviewed-on: http://gerrit.cloudera.org:8080/16781 Reviewed-by: Andrew Wong <[email protected]> Reviewed-by: Alexey Serbin <[email protected]> Tested-by: Kudu Jenkins Reviewed-on: http://gerrit.cloudera.org:8080/16804 Reviewed-by: Grant Henke <[email protected]> Tested-by: Andrew Wong <[email protected]> --- src/kudu/util/sanitizer_options.cc | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/src/kudu/util/sanitizer_options.cc b/src/kudu/util/sanitizer_options.cc index 8c8c0d3..bd77459 100644 --- a/src/kudu/util/sanitizer_options.cc +++ b/src/kudu/util/sanitizer_options.cc @@ -194,6 +194,10 @@ SANITIZER_HOOK_ATTRIBUTE const char *__lsan_default_suppressions() { // Fixed by upstream commit 379d39c17b8930718e98185a5b32a0f7f3e3b4b6 "leak:krb5_authdata_import_attributes\n" + // KUDU-2700: OpenSSL 1.1 has a leak in libcrypto.so when running tests + // that use the CLI to connect to a remote server. + "leak:libcrypto.so.1.1\n" + // KUDU-2653: Memory leak in libgssapi_krb5 [1]. Exists in certain patched // versions of krb5-1.12 (such as krb5 in Debian 8). //
