| Index: sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc
|
| diff --git a/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc b/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc
|
| index 6efc4b6344aa75684abdccc6fc5dc6ceced4c028..40a99e4b6abd22a875e4c09c95c5caa5ac254f31 100644
|
| --- a/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc
|
| +++ b/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc
|
| @@ -652,10 +652,6 @@
|
| return UnsafeTrap(AllowRedirectedSyscall, NULL);
|
| }
|
|
|
| -#if !defined(ADDRESS_SANITIZER)
|
| -// ASan does not allow changing the signal handler for SIGBUS, and treats it as
|
| -// a fatal signal.
|
| -
|
| int bus_handler_fd_ = -1;
|
|
|
| void SigBusHandler(int, siginfo_t* info, void* void_context) {
|
| @@ -684,7 +680,6 @@
|
| BPF_ASSERT(close(fds[1]) == 0);
|
| BPF_ASSERT(c == 0x55);
|
| }
|
| -#endif // !defined(ADDRESS_SANITIZER)
|
|
|
| BPF_TEST_C(SandboxBPF, SigMask, RedirectAllSyscallsPolicy) {
|
| // Signal masks are potentially tricky to handle. For instance, if we
|
|
|