[prev in list] [next in list] [prev in thread] [next in thread] 

List:       gluster-bugs
Subject:    [Bugs] [Bug 1633930] New: ASan (address sanitizer) fixes - Blanket bug
From:       bugzilla () redhat ! com
Date:       2018-09-28 6:57:27
Message-ID: bug-1633930-371520 () bugzilla ! redhat ! com
[Download RAW message or body]

https://bugzilla.redhat.com/show_bug.cgi?id=1633930

            Bug ID: 1633930
           Summary: ASan (address sanitizer) fixes - Blanket bug
           Product: GlusterFS
           Version: mainline
         Component: core
          Severity: high
          Priority: urgent
          Assignee: bugs@gluster.org
          Reporter: atumball@redhat.com
                CC: amukherj@redhat.com, bugs@gluster.org,
                    srangana@redhat.com, ykaul@redhat.com



Description of problem:

As of now, glusterfs has an option to have '--enable-asan' during configure,
which can be used to run the system with stricter memory check flags. There is
a nightly job which runs with this flag @ https://build.gluster.org/job/asan/

Let us capture all the fixes which get in to the codebase as part of fixing
ASan errors, using this bug!

Version-Release number of selected component (if applicable):
mainline

How reproducible:
Currently 100%


Steps to Reproduce:
1. Run any regression tests after doing --enable-asan option!

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.
_______________________________________________
Bugs mailing list
Bugs@gluster.org
https://lists.gluster.org/mailman/listinfo/bugs
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic