Index: content/common/sandbox_linux/sandbox_linux.cc |
diff --git a/content/common/sandbox_linux/sandbox_linux.cc b/content/common/sandbox_linux/sandbox_linux.cc |
index b2a7b3e6e960a0d824e123544510bfb5332acd14..952772ee648634f796e2aa4879461709a50ea69b 100644 |
--- a/content/common/sandbox_linux/sandbox_linux.cc |
+++ b/content/common/sandbox_linux/sandbox_linux.cc |
@@ -140,7 +140,7 @@ void LinuxSandbox::PreinitializeSandbox() { |
sanitizer_args_.reset(); |
#endif |
-#if !defined(NDEBUG) |
+#if !defined(NDEBUG) || (defined(CFI_ENFORCEMENT) && !defined(OFFICIAL_BUILD)) |
// The in-process stack dumping needs to open /proc/self/maps and cache |
// its contents before the sandbox is enabled. It also pre-opens the |
// object files that are already loaded in the process address space. |