Index: src/client/linux/handler/exception_handler_unittest.cc |
diff --git a/src/client/linux/handler/exception_handler_unittest.cc b/src/client/linux/handler/exception_handler_unittest.cc |
index b4065b414f884eafc11792842d6f4e69169bddea..439b3c38367fb30a47b8bde44cc34a66291be075 100644 |
--- a/src/client/linux/handler/exception_handler_unittest.cc |
+++ b/src/client/linux/handler/exception_handler_unittest.cc |
@@ -262,8 +262,6 @@ TEST(ExceptionHandlerTest, ChildCrashWithFD) { |
ASSERT_NO_FATAL_FAILURE(ChildCrash(true)); |
} |
-#endif // !ADDRESS_SANITIZER |
- |
static bool DoneCallbackReturnFalse(const MinidumpDescriptor& descriptor, |
void* context, |
bool succeeded) { |
@@ -305,8 +303,6 @@ static bool InstallRaiseSIGKILL() { |
return sigaction(SIGSEGV, &sa, NULL) != -1; |
} |
-#ifndef ADDRESS_SANITIZER |
- |
static void CrashWithCallbacks(ExceptionHandler::FilterCallback filter, |
ExceptionHandler::MinidumpCallback done, |
string path) { |
@@ -878,6 +874,8 @@ TEST(ExceptionHandlerTest, ModuleInfo) { |
unlink(minidump_desc.path()); |
} |
+#ifndef ADDRESS_SANITIZER |
+ |
static const unsigned kControlMsgSize = |
CMSG_SPACE(sizeof(int)) + CMSG_SPACE(sizeof(struct ucred)); |
@@ -930,8 +928,6 @@ CrashHandler(const void* crash_context, size_t crash_context_size, |
return true; |
} |
-#ifndef ADDRESS_SANITIZER |
- |
TEST(ExceptionHandlerTest, ExternalDumper) { |
int fds[2]; |
ASSERT_NE(socketpair(AF_UNIX, SOCK_DGRAM, 0, fds), -1); |