Index: content/common/sandbox_linux/sandbox_linux.cc |
diff --git a/content/common/sandbox_linux/sandbox_linux.cc b/content/common/sandbox_linux/sandbox_linux.cc |
index 237cc89deb9947af3d96fe8753e641a7c907f07a..4d389b5e6de3b267c5d6ee10065e88f21551aa0c 100644 |
--- a/content/common/sandbox_linux/sandbox_linux.cc |
+++ b/content/common/sandbox_linux/sandbox_linux.cc |
@@ -34,6 +34,11 @@ |
#include "sandbox/linux/services/yama.h" |
#include "sandbox/linux/suid/client/setuid_sandbox_client.h" |
+#if (defined(ADDRESS_SANITIZER) || defined(MEMORY_SANITIZER) || \ |
+ defined(LEAK_SANITIZER)) |
+#include <sanitizer/common_interface_defs.h> |
+#endif |
+ |
using sandbox::Yama; |
namespace { |
@@ -124,12 +129,6 @@ LinuxSandbox* LinuxSandbox::GetInstance() { |
return instance; |
} |
-#if (defined(ADDRESS_SANITIZER) || defined(MEMORY_SANITIZER) || \ |
- defined(LEAK_SANITIZER)) && defined(OS_LINUX) |
-// Sanitizer API call to notify the tool the sandbox is going to be turned on. |
-extern "C" void __sanitizer_sandbox_on_notify(void *reserved); |
-#endif |
- |
void LinuxSandbox::PreinitializeSandbox() { |
CHECK(!pre_initialized_); |
seccomp_bpf_supported_ = false; |