diff options
author | thakis@chromium.org <thakis@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-03-26 22:34:13 +0000 |
---|---|---|
committer | thakis@chromium.org <thakis@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-03-26 22:34:13 +0000 |
commit | d89744816ba96e64b1d03f18582a7d568794a68a (patch) | |
tree | a7b2611348db862ad2b35579e4a501edc8b308e3 /sandbox | |
parent | ad4388e1dce90b4a28e12c2b382eab23c605aaca (diff) | |
download | chromium_src-d89744816ba96e64b1d03f18582a7d568794a68a.zip chromium_src-d89744816ba96e64b1d03f18582a7d568794a68a.tar.gz chromium_src-d89744816ba96e64b1d03f18582a7d568794a68a.tar.bz2 |
Linux sandbox: disable bare BPF tests on TSANv2
BUG=356588
NOTRY=true
R=thakis@chromium.org
Review URL: https://codereview.chromium.org/213103006
Patch from Julien Tinnes <jln@chromium.org>.
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@259724 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox')
-rw-r--r-- | sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc b/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc index d05878c..17df1d5 100644 --- a/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc +++ b/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc @@ -50,7 +50,7 @@ const char kSandboxDebuggingEnv[] = "CHROME_SANDBOX_DEBUGGING"; // This test should execute no matter whether we have kernel support. So, // we make it a TEST() instead of a BPF_TEST(). -TEST(SandboxBPF, CallSupports) { +TEST(SandboxBPF, DISABLE_ON_TSAN(CallSupports)) { // We check that we don't crash, but it's ok if the kernel doesn't // support it. bool seccomp_bpf_supported = @@ -65,7 +65,7 @@ TEST(SandboxBPF, CallSupports) { std::cout << "Pointer size: " << sizeof(void*) << "\n"; } -SANDBOX_TEST(SandboxBPF, CallSupportsTwice) { +SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(CallSupportsTwice)) { SandboxBPF::SupportsSeccompSandbox(-1); SandboxBPF::SupportsSeccompSandbox(-1); } |