Index: sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc |
diff --git a/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc b/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc |
index 8e7e144bd514113516b7073d13ecd8f7643b040d..2d337c6ec97695cf6cedff533fe6ce0547b5c8db 100644 |
--- a/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc |
+++ b/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc |
@@ -651,10 +651,6 @@ ResultExpr RedirectAllSyscallsPolicy::EvaluateSyscall(int sysno) const { |
return UnsafeTrap(AllowRedirectedSyscall, NULL); |
} |
-#if !defined(ADDRESS_SANITIZER) |
-// ASan does not allow changing the signal handler for SIGBUS, and treats it as |
-// a fatal signal. |
- |
int bus_handler_fd_ = -1; |
void SigBusHandler(int, siginfo_t* info, void* void_context) { |
@@ -683,7 +679,6 @@ BPF_TEST_C(SandboxBPF, SigBus, RedirectAllSyscallsPolicy) { |
BPF_ASSERT(close(fds[1]) == 0); |
BPF_ASSERT(c == 0x55); |
} |
-#endif // !defined(ADDRESS_SANITIZER) |
BPF_TEST_C(SandboxBPF, SigMask, RedirectAllSyscallsPolicy) { |
// Signal masks are potentially tricky to handle. For instance, if we |