| Index: base/security_unittest.cc
|
| diff --git a/base/security_unittest.cc b/base/security_unittest.cc
|
| index d5637bbf83a802e38991f4cbdc00c03dcbfbef81..24fbbd71f771c9cb7ac7eccc2db99d8e8b96b3d2 100644
|
| --- a/base/security_unittest.cc
|
| +++ b/base/security_unittest.cc
|
| @@ -87,16 +87,14 @@ void OverflowTestsSoftExpectTrue(bool overflow_detected) {
|
| }
|
| }
|
|
|
| -#if defined(OS_IOS) || defined(OS_LINUX) || defined(ADDRESS_SANITIZER)
|
| +#if defined(OS_IOS) || defined(ADDRESS_SANITIZER) || defined(THREAD_SANITIZER)
|
| #define MAYBE_NewOverflow DISABLED_NewOverflow
|
| #else
|
| #define MAYBE_NewOverflow NewOverflow
|
| #endif
|
| // Test array[TooBig][X] and array[X][TooBig] allocations for int overflows.
|
| // IOS doesn't honor nothrow, so disable the test there.
|
| -// Disabled on Linux because failing Linux Valgrind bot, and Valgrind exclusions
|
| -// are not currently read. See http://crbug.com/582398
|
| -// Disabled under ASan because asan aborts when new returns nullptr,
|
| +// Disabled under XSan because asan aborts when new returns nullptr,
|
| // https://bugs.chromium.org/p/chromium/issues/detail?id=690271#c15
|
| TEST(SecurityTest, MAYBE_NewOverflow) {
|
| const size_t kArraySize = 4096;
|
|
|