This is an automated email from the ASF dual-hosted git repository.

mgreber pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/kudu.git


The following commit(s) were added to refs/heads/master by this push:
     new 492273ae3 [util] fix typo in sanitizer_options.cc
492273ae3 is described below

commit 492273ae39574dd142dfd2008f741b15cd88763a
Author: Alexey Serbin <[email protected]>
AuthorDate: Tue Nov 4 20:56:23 2025 -0800

    [util] fix typo in sanitizer_options.cc
    
    Prior to the fix, compiling the project with ASAN instrumentation would
    produce a warning like below:
      src/kudu/util/sanitizer_options.cc:230:3: warning: expression result 
unused [-Wunused-value]
        "leak:libgssapi_krb5.so.2\n";
      1 warning generated.
    
    This is a follow-up to bae8c9f896494abffbc297a961d440b30e05e275.
    
    Change-Id: I548e13a79005047e4f2808ca5217f988d51c473c
    Reviewed-on: http://gerrit.cloudera.org:8080/23634
    Reviewed-by: Marton Greber <[email protected]>
    Tested-by: Marton Greber <[email protected]>
    Reviewed-by: Gabriella Lotz <[email protected]>
---
 src/kudu/util/sanitizer_options.cc | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/src/kudu/util/sanitizer_options.cc 
b/src/kudu/util/sanitizer_options.cc
index db074cfd1..200aa80d6 100644
--- a/src/kudu/util/sanitizer_options.cc
+++ b/src/kudu/util/sanitizer_options.cc
@@ -217,7 +217,7 @@ SANITIZER_HOOK_ATTRIBUTE const char 
*__lsan_default_suppressions() {
   // CLI to connect to a remote server. But they are considered acceptable
   // and intentional by the OpenSSL project.
   // https://github.com/openssl/openssl/issues/24729
-  "leak:libcrypto.so.3\n";
+  "leak:libcrypto.so.3\n"
 
   // KUDU-2653: Memory leak in libgssapi_krb5 [1]. Exists in certain patched
   // versions of krb5-1.12 (such as krb5 in Debian 8).

Reply via email to