From c0dedc036b11ab0067f7ceb2e6d9105eec098f89 Mon Sep 17 00:00:00 2001 From: David Benjamin Date: Tue, 24 Jan 2017 17:54:24 -0500 Subject: Fix TODO comment. The bug should point at b/26160319 since that's the bug that tracks fixing the issue. Test: Comment-only change. Change-Id: Ia945196f815aedfefcf1a11b230adeaff4912310 --- Android.bp | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'Android.bp') diff --git a/Android.bp b/Android.bp index f0187da3..0203bccf 100644 --- a/Android.bp +++ b/Android.bp @@ -117,10 +117,10 @@ cc_library_static { target: { host: { - // TODO: b/26097626. ASAN breaks use of this library in JVM. + // TODO: b/26160319. ASAN breaks use of this library in JVM. // Re-enable sanitization when the issue with making clients of this library // preload ASAN runtime is resolved. Without that, clients are getting runtime - // errors due to unresoled ASAN symbols, such as + // errors due to unresolved ASAN symbols, such as // __asan_option_detect_stack_use_after_return. sanitize: { never: true, @@ -153,10 +153,10 @@ cc_library_host_static { name: "libssl_static-host", defaults: ["libssl_sources", "boringssl_defaults", "boringssl_flags"], - // TODO: b/26097626. ASAN breaks use of this library in JVM. + // TODO: b/26160319. ASAN breaks use of this library in JVM. // Re-enable sanitization when the issue with making clients of this library // preload ASAN runtime is resolved. Without that, clients are getting runtime - // errors due to unresoled ASAN symbols, such as + // errors due to unresolved ASAN symbols, such as // __asan_option_detect_stack_use_after_return. sanitize: { never: true, -- cgit v1.2.3