Index: content/common/sandbox_win.cc |
diff --git a/content/common/sandbox_win.cc b/content/common/sandbox_win.cc |
index 7627865c3ed4f7a7daf6a7d3f71df6c252375bae..110edb8a6812438efa13d1d1549568dfdc6553b0 100644 |
--- a/content/common/sandbox_win.cc |
+++ b/content/common/sandbox_win.cc |
@@ -328,8 +328,8 @@ bool AddGenericPolicy(sandbox::TargetPolicy* policy) { |
return false; |
#endif // NDEBUG |
- // Add the policy for read-only PDB file access for AddressSanitizer. |
-#if defined(ADDRESS_SANITIZER) |
+ // Add the policy for read-only PDB file access for stack traces. |
+#if !defined(OFFICIAL_BUILD) |
base::FilePath exe; |
if (!PathService::Get(base::FILE_EXE, &exe)) |
return false; |
@@ -741,12 +741,12 @@ base::Process StartSandboxedProcess( |
return base::Process(); |
} |
- if (browser_command_line.HasSwitch(switches::kEnableLogging)) { |
- // If stdout/stderr point to a Windows console, these calls will |
- // have no effect. |
- policy->SetStdoutHandle(GetStdHandle(STD_OUTPUT_HANDLE)); |
- policy->SetStderrHandle(GetStdHandle(STD_ERROR_HANDLE)); |
- } |
+#if !defined(OFFICIAL_BUILD) |
+ // If stdout/stderr point to a Windows console, these calls will |
+ // have no effect. |
+ policy->SetStdoutHandle(GetStdHandle(STD_OUTPUT_HANDLE)); |
+ policy->SetStderrHandle(GetStdHandle(STD_ERROR_HANDLE)); |
+#endif |
if (delegate) { |
bool success = true; |