| Index: content/common/sandbox_linux/sandbox_linux.cc
|
| diff --git a/content/common/sandbox_linux/sandbox_linux.cc b/content/common/sandbox_linux/sandbox_linux.cc
|
| index 237cc89deb9947af3d96fe8753e641a7c907f07a..4d389b5e6de3b267c5d6ee10065e88f21551aa0c 100644
|
| --- a/content/common/sandbox_linux/sandbox_linux.cc
|
| +++ b/content/common/sandbox_linux/sandbox_linux.cc
|
| @@ -34,6 +34,11 @@
|
| #include "sandbox/linux/services/yama.h"
|
| #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
|
|
|
| +#if (defined(ADDRESS_SANITIZER) || defined(MEMORY_SANITIZER) || \
|
| + defined(LEAK_SANITIZER))
|
| +#include <sanitizer/common_interface_defs.h>
|
| +#endif
|
| +
|
| using sandbox::Yama;
|
|
|
| namespace {
|
| @@ -124,12 +129,6 @@ LinuxSandbox* LinuxSandbox::GetInstance() {
|
| return instance;
|
| }
|
|
|
| -#if (defined(ADDRESS_SANITIZER) || defined(MEMORY_SANITIZER) || \
|
| - defined(LEAK_SANITIZER)) && defined(OS_LINUX)
|
| -// Sanitizer API call to notify the tool the sandbox is going to be turned on.
|
| -extern "C" void __sanitizer_sandbox_on_notify(void *reserved);
|
| -#endif
|
| -
|
| void LinuxSandbox::PreinitializeSandbox() {
|
| CHECK(!pre_initialized_);
|
| seccomp_bpf_supported_ = false;
|
|
|