| Index: content/common/sandbox_linux/sandbox_linux.cc
|
| diff --git a/content/common/sandbox_linux/sandbox_linux.cc b/content/common/sandbox_linux/sandbox_linux.cc
|
| index b2a7b3e6e960a0d824e123544510bfb5332acd14..952772ee648634f796e2aa4879461709a50ea69b 100644
|
| --- a/content/common/sandbox_linux/sandbox_linux.cc
|
| +++ b/content/common/sandbox_linux/sandbox_linux.cc
|
| @@ -140,7 +140,7 @@ void LinuxSandbox::PreinitializeSandbox() {
|
| sanitizer_args_.reset();
|
| #endif
|
|
|
| -#if !defined(NDEBUG)
|
| +#if !defined(NDEBUG) || (defined(CFI_ENFORCEMENT) && !defined(OFFICIAL_BUILD))
|
| // The in-process stack dumping needs to open /proc/self/maps and cache
|
| // its contents before the sandbox is enabled. It also pre-opens the
|
| // object files that are already loaded in the process address space.
|
|
|