Remove asan::address for bluetooth_stack_with_facade
Potential for false positive on container overflow if all targets are not compiled for asan. https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow One solution would be to build all shared library targets with asan support. e.g. libgrpc++_unsecure Another solution would be to only disable container overflow, but acts generally does not allow environment variables e.g. ASAN_OPTIONS=detect_container_overflow=0 ./<executable> Bug: 157647700 Test: atest --host bluetooth_test_gd Tag: #gd-refactor Change-Id: Iee44cd1b4fbe3ad05d175fb9ee08ff2176cfc255
Loading
Please register or sign in to comment