Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Skip to content
Commit 64924b31 authored by Chris Manton's avatar Chris Manton
Browse files

Remove asan::address for bluetooth_stack_with_facade

Potential for false positive on container overflow if all targets
are not compiled for asan.
https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow

One solution would be to build all shared library targets with
asan support.
e.g.
libgrpc++_unsecure

Another solution would be to only disable container overflow, but acts
generally does not allow environment variables
e.g.
ASAN_OPTIONS=detect_container_overflow=0 ./<executable>

Bug: 157647700
Test: atest --host bluetooth_test_gd
Tag: #gd-refactor

Change-Id: Iee44cd1b4fbe3ad05d175fb9ee08ff2176cfc255
parent 1e5a2d88
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment