| Index: content/common/sandbox_linux/sandbox_linux.cc
|
| diff --git a/content/common/sandbox_linux/sandbox_linux.cc b/content/common/sandbox_linux/sandbox_linux.cc
|
| index 952772ee648634f796e2aa4879461709a50ea69b..15472c39d91bc02383115612fe06ba02bb04c16c 100644
|
| --- a/content/common/sandbox_linux/sandbox_linux.cc
|
| +++ b/content/common/sandbox_linux/sandbox_linux.cc
|
| @@ -140,13 +140,6 @@ void LinuxSandbox::PreinitializeSandbox() {
|
| sanitizer_args_.reset();
|
| #endif
|
|
|
| -#if !defined(NDEBUG) || (defined(CFI_ENFORCEMENT) && !defined(OFFICIAL_BUILD))
|
| - // The in-process stack dumping needs to open /proc/self/maps and cache
|
| - // its contents before the sandbox is enabled. It also pre-opens the
|
| - // object files that are already loaded in the process address space.
|
| - base::debug::EnableInProcessStackDumpingForSandbox();
|
| -#endif // !defined(NDEBUG)
|
| -
|
| // Open proc_fd_. It would break the security of the setuid sandbox if it was
|
| // not closed.
|
| // If LinuxSandbox::PreinitializeSandbox() runs, InitializeSandbox() must run
|
|
|