You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@kudu.apache.org by ad...@apache.org on 2020/03/31 05:24:51 UTC
[kudu] 06/07: KUDU-2059: add a TSAN suppression
This is an automated email from the ASF dual-hosted git repository.
adar pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/kudu.git
commit ce82af1171099e00606c67a351362a0b68549141
Author: Adar Dembo <ad...@cloudera.com>
AuthorDate: Mon Mar 30 14:14:29 2020 -0700
KUDU-2059: add a TSAN suppression
No one is actively working on fixing this, so let's at least suppress it so
that precommits aren't flaky.
Change-Id: I86979e4c511bd4cbf027c629c867378cd0b8cd32
Reviewed-on: http://gerrit.cloudera.org:8080/15603
Tested-by: Kudu Jenkins
Reviewed-by: Alexey Serbin <as...@cloudera.com>
---
src/kudu/util/sanitizer_options.cc | 6 +++++-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/src/kudu/util/sanitizer_options.cc b/src/kudu/util/sanitizer_options.cc
index de7cf4f..8c8c0d3 100644
--- a/src/kudu/util/sanitizer_options.cc
+++ b/src/kudu/util/sanitizer_options.cc
@@ -165,7 +165,11 @@ SANITIZER_HOOK_ATTRIBUTE const char *__tsan_default_suppressions() {
// This is carried out by OPENSSL_cleanup, but TSAN's unwinder doesn't
// include any stack frame above the libcrypto lock destruction or memory release
// call for some reason, so we have to do something more generic.
- "called_from_lib:libcrypto.so\n";
+ "called_from_lib:libcrypto.so\n"
+
+ // KUDU-2059: there may be outstanding reactor threads in DnsResolver at the
+ // time that the KuduClient (and DnsResolver) is destroyed.
+ "race:kudu::DnsResolver::ResolveAddressesAsync\n";
}
#endif // THREAD_SANITIZER