linux: Disable test module with sanitizers

Clang's sanitizers on Linux might hook dlopen() to track memory regions
mapped by loaded modules, but they depend on shared libraries having a
preferred address of 0 so that the load bias in the link map is equal
to the module's loaded address in memory.

https://code.woboq.org/llvm/compiler-rt/lib/sanitizer_common/sanitizer_linux.cpp.html#1172

Change-Id: I83d5bffe76ffbf966f490def6a5941ec1b03f4d9
Reviewed-on: https://chromium-review.googlesource.com/c/crashpad/crashpad/+/2585002
Reviewed-by: Mark Mentovai <mark@chromium.org>
Commit-Queue: Joshua Peraza <jperaza@chromium.org>
GitOrigin-RevId: 0886a625cc3b945fa3873eab0d633ed78466579e
2 files changed
tree: 888204e97c494d2ae78d104f3f941a99438a895c
  1. build/
  2. client/
  3. compat/
  4. doc/
  5. handler/
  6. infra/
  7. minidump/
  8. snapshot/
  9. test/
  10. third_party/
  11. tools/
  12. util/
  13. .clang-format
  14. .gitattributes
  15. .gitignore
  16. .gn
  17. .style.yapf
  18. .vpython
  19. AUTHORS
  20. BUILD.gn
  21. codereview.settings
  22. CONTRIBUTORS
  23. crashpad.gyp
  24. DEPS
  25. LICENSE
  26. navbar.md
  27. package.h
  28. README.md
README.md

Crashpad

Crashpad is a crash-reporting system.

Documentation

Source Code

Crashpad’s source code is hosted in a Git repository at https://chromium.googlesource.com/crashpad/crashpad.

Other Links