[prev in list] [next in list] [prev in thread] [next in thread]
List: gluster-bugs
Subject: [Bugs] [Bug 1633930] New: ASan (address sanitizer) fixes - Blanket bug
From: bugzilla () redhat ! com
Date: 2018-09-28 6:57:27
Message-ID: bug-1633930-371520 () bugzilla ! redhat ! com
[Download RAW message or body]
https://bugzilla.redhat.com/show_bug.cgi?id=1633930
Bug ID: 1633930
Summary: ASan (address sanitizer) fixes - Blanket bug
Product: GlusterFS
Version: mainline
Component: core
Severity: high
Priority: urgent
Assignee: bugs@gluster.org
Reporter: atumball@redhat.com
CC: amukherj@redhat.com, bugs@gluster.org,
srangana@redhat.com, ykaul@redhat.com
Description of problem:
As of now, glusterfs has an option to have '--enable-asan' during configure,
which can be used to run the system with stricter memory check flags. There is
a nightly job which runs with this flag @ https://build.gluster.org/job/asan/
Let us capture all the fixes which get in to the codebase as part of fixing
ASan errors, using this bug!
Version-Release number of selected component (if applicable):
mainline
How reproducible:
Currently 100%
Steps to Reproduce:
1. Run any regression tests after doing --enable-asan option!
--
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.
_______________________________________________
Bugs mailing list
Bugs@gluster.org
https://lists.gluster.org/mailman/listinfo/bugs
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic