You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@kudu.apache.org by ad...@apache.org on 2020/03/31 05:24:51 UTC

[kudu] 06/07: KUDU-2059: add a TSAN suppression

This is an automated email from the ASF dual-hosted git repository.

adar pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/kudu.git

commit ce82af1171099e00606c67a351362a0b68549141
Author: Adar Dembo <ad...@cloudera.com>
AuthorDate: Mon Mar 30 14:14:29 2020 -0700

    KUDU-2059: add a TSAN suppression
    
    No one is actively working on fixing this, so let's at least suppress it so
    that precommits aren't flaky.
    
    Change-Id: I86979e4c511bd4cbf027c629c867378cd0b8cd32
    Reviewed-on: http://gerrit.cloudera.org:8080/15603
    Tested-by: Kudu Jenkins
    Reviewed-by: Alexey Serbin <as...@cloudera.com>
---
 src/kudu/util/sanitizer_options.cc | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/src/kudu/util/sanitizer_options.cc b/src/kudu/util/sanitizer_options.cc
index de7cf4f..8c8c0d3 100644
--- a/src/kudu/util/sanitizer_options.cc
+++ b/src/kudu/util/sanitizer_options.cc
@@ -165,7 +165,11 @@ SANITIZER_HOOK_ATTRIBUTE const char *__tsan_default_suppressions() {
   // This is carried out by OPENSSL_cleanup, but TSAN's unwinder doesn't
   // include any stack frame above the libcrypto lock destruction or memory release
   // call for some reason, so we have to do something more generic.
-  "called_from_lib:libcrypto.so\n";
+  "called_from_lib:libcrypto.so\n"
+
+  // KUDU-2059: there may be outstanding reactor threads in DnsResolver at the
+  // time that the KuduClient (and DnsResolver) is destroyed.
+  "race:kudu::DnsResolver::ResolveAddressesAsync\n";
 }
 #endif  // THREAD_SANITIZER