diff --git a/test/core/client_channel/xds_bootstrap_test.cc b/test/core/client_channel/xds_bootstrap_test.cc index 201578c809e..e1fb3a9e2df 100644 --- a/test/core/client_channel/xds_bootstrap_test.cc +++ b/test/core/client_channel/xds_bootstrap_test.cc @@ -267,6 +267,16 @@ TEST(XdsBootstrapTest, BadChannelCredsContents) { VerifyRegexMatch(error, e); } +// under TSAN, ASAN and UBSAN, bazel RBE can suffer from a std::regex +// stackoverflow bug if the analyzed string is too long (> ~2000 characters). As +// this test is only single-thread and deterministic, it is safe to just disable +// it under TSAN and ASAN until +// https://github.com/GoogleCloudPlatform/layer-definitions/issues/591 +// is resolved. The risk for UBSAN problem also doesn't seem to be very high. +#ifndef GRPC_ASAN +#ifndef GRPC_TSAN +#ifndef GRPC_UBSAN + TEST(XdsBootstrapTest, BadNode) { grpc_slice slice = grpc_slice_from_copied_string( "{" @@ -321,6 +331,10 @@ TEST(XdsBootstrapTest, BadNode) { VerifyRegexMatch(error, e); } +#endif +#endif +#endif + } // namespace testing } // namespace grpc_core diff --git a/tools/bazel.rc b/tools/bazel.rc index 7348c7488eb..4bc5b0fb21b 100644 --- a/tools/bazel.rc +++ b/tools/bazel.rc @@ -20,6 +20,7 @@ build:asan --copt=-fsanitize=address build:asan --copt=-O0 build:asan --copt=-fno-omit-frame-pointer build:asan --copt=-DGPR_NO_DIRECT_SYSCALLS +build:asan --copt=-DGRPC_ASAN build:asan --copt=-DADDRESS_SANITIZER # used by absl build:asan --linkopt=-fsanitize=address build:asan --action_env=ASAN_OPTIONS=detect_leaks=1:color=always