Chromium Code Reviews| Index: sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
| diff --git a/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc b/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
| index 40a99e4b6abd22a875e4c09c95c5caa5ac254f31..dd0f127153f8c031dd174ba6fde848e2f7d7eafd 100644 |
| --- a/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
| +++ b/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
| @@ -652,6 +652,10 @@ ResultExpr RedirectAllSyscallsPolicy::EvaluateSyscall(int sysno) const { |
| return UnsafeTrap(AllowRedirectedSyscall, NULL); |
| } |
| +#if !defined(ADDRESS_SANITIZER) |
| +// ASan does not allow changing the signal handler for SIGBUS, and treats it as |
| +// a fatal signal. |
| + |
| int bus_handler_fd_ = -1; |
| void SigBusHandler(int, siginfo_t* info, void* void_context) { |
| @@ -680,6 +684,7 @@ BPF_TEST_C(SandboxBPF, SigBus, RedirectAllSyscallsPolicy) { |
| BPF_ASSERT(close(fds[1]) == 0); |
| BPF_ASSERT(c == 0x55); |
| } |
| +#endif |
|
jln (very slow on Chromium)
2015/02/05 23:54:14
Add // !defined(ADDRESS_SANITIZER)
hans
2015/02/06 00:05:34
Done.
|
| BPF_TEST_C(SandboxBPF, SigMask, RedirectAllSyscallsPolicy) { |
| // Signal masks are potentially tricky to handle. For instance, if we |