This is an automated email from the ASF dual-hosted git repository.
mgreber pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/kudu.git
The following commit(s) were added to refs/heads/master by this push:
new 492273ae3 [util] fix typo in sanitizer_options.cc
492273ae3 is described below
commit 492273ae39574dd142dfd2008f741b15cd88763a
Author: Alexey Serbin <[email protected]>
AuthorDate: Tue Nov 4 20:56:23 2025 -0800
[util] fix typo in sanitizer_options.cc
Prior to the fix, compiling the project with ASAN instrumentation would
produce a warning like below:
src/kudu/util/sanitizer_options.cc:230:3: warning: expression result
unused [-Wunused-value]
"leak:libgssapi_krb5.so.2\n";
1 warning generated.
This is a follow-up to bae8c9f896494abffbc297a961d440b30e05e275.
Change-Id: I548e13a79005047e4f2808ca5217f988d51c473c
Reviewed-on: http://gerrit.cloudera.org:8080/23634
Reviewed-by: Marton Greber <[email protected]>
Tested-by: Marton Greber <[email protected]>
Reviewed-by: Gabriella Lotz <[email protected]>
---
src/kudu/util/sanitizer_options.cc | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/kudu/util/sanitizer_options.cc
b/src/kudu/util/sanitizer_options.cc
index db074cfd1..200aa80d6 100644
--- a/src/kudu/util/sanitizer_options.cc
+++ b/src/kudu/util/sanitizer_options.cc
@@ -217,7 +217,7 @@ SANITIZER_HOOK_ATTRIBUTE const char
*__lsan_default_suppressions() {
// CLI to connect to a remote server. But they are considered acceptable
// and intentional by the OpenSSL project.
// https://github.com/openssl/openssl/issues/24729
- "leak:libcrypto.so.3\n";
+ "leak:libcrypto.so.3\n"
// KUDU-2653: Memory leak in libgssapi_krb5 [1]. Exists in certain patched
// versions of krb5-1.12 (such as krb5 in Debian 8).