| Index: base/security_unittest.cc
|
| diff --git a/base/security_unittest.cc b/base/security_unittest.cc
|
| index 1c24fad65d8a2e5f602b72ba9a1f21aef6b04e5b..cf3b1296667ff7942b143a7890edde6a197f1778 100644
|
| --- a/base/security_unittest.cc
|
| +++ b/base/security_unittest.cc
|
| @@ -230,19 +230,6 @@ TEST(SecurityTest, CallocOverflow) {
|
| }
|
|
|
| #if (defined(OS_LINUX) || defined(OS_CHROMEOS)) && defined(__x86_64__)
|
| -// Useful for debugging.
|
| -void PrintProcSelfMaps() {
|
| - int fd = open("/proc/self/maps", O_RDONLY);
|
| - file_util::ScopedFD fd_closer(&fd);
|
| - ASSERT_GE(fd, 0);
|
| - char buffer[1<<13];
|
| - int ret;
|
| - ret = read(fd, buffer, sizeof(buffer) - 1);
|
| - ASSERT_GT(ret, 0);
|
| - buffer[ret - 1] = 0;
|
| - fprintf(stdout, "%s\n", buffer);
|
| -}
|
| -
|
| // Check if ptr1 and ptr2 are separated by less than size chars.
|
| bool ArePointersToSameArea(void* ptr1, void* ptr2, size_t size) {
|
| ptrdiff_t ptr_diff = reinterpret_cast<char*>(std::max(ptr1, ptr2)) -
|
|
|