diff options
| author | 2023-06-15 19:46:30 -0700 | |
|---|---|---|
| committer | 2023-06-16 10:13:12 -0700 | |
| commit | ffe62933bc0c0b2340b3d69dc202deaea2317ab0 (patch) | |
| tree | 2bc347ae2e3209fca056a445fe8e9fb690bc89f0 /services/surfaceflinger/RegionSamplingThread.cpp | |
| parent | 02deea604821f351e2d9a21f2b2a7572df0dc76e (diff) | |
Initialize InputEventLookup in a static function
Currently, the InputEventLookup class uses static fields, which means
that they are getting initialized early.
This causes issues with address sanitizers. The sanitizers report a
memory leak with the purely static approach. It's not clear whether this
is an actual issue, or just a bug elsewhere in the system.
To get around these problems, create a singleton instance of
InputEventLookup. This singleton will be created upon the first access
to any of its static functions. This helps resolves the sanitizer issues.
Bug: 271455682
Test: FUZZER=inputflinger_input_dispatcher_fuzzer; m $FUZZER && out/host/linux-x86/fuzz/x86_64/$FUZZER/$FUZZER
Note: test requires more CLs that are upcoming
Change-Id: Id655554db9c706f5d45eaebbee55e12519dcfdc8
Diffstat (limited to 'services/surfaceflinger/RegionSamplingThread.cpp')
0 files changed, 0 insertions, 0 deletions