| Index: chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
|
| diff --git a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
|
| index b55232f5c471c3e4eca9221b84e38d46230d832d..c71ef5f38854b3966c1db2d155cb75e478cc2246 100644
|
| --- a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
|
| +++ b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
|
| @@ -394,7 +394,13 @@ IN_PROC_BROWSER_TEST_F(PhishingDOMFeatureExtractorTest, SubFrames) {
|
| ExpectFeatureMapsAreEqual(features, expected_features);
|
| }
|
|
|
| -IN_PROC_BROWSER_TEST_F(PhishingDOMFeatureExtractorTest, Continuation) {
|
| +// Test flakes with LSAN enabled. See http://crbug.com/373155.
|
| +#if defined(LEAK_SANITIZER)
|
| +#define MAYBE_Continuation DISABLED_Continuation
|
| +#else
|
| +#define MAYBE_Continuation Continuation
|
| +#endif
|
| +IN_PROC_BROWSER_TEST_F(PhishingDOMFeatureExtractorTest, MAYBE_Continuation) {
|
| // For this test, we'll cause the feature extraction to run multiple
|
| // iterations by incrementing the clock.
|
|
|
|
|