Index: content/common/sandbox_linux/sandbox_linux.h |
diff --git a/content/common/sandbox_linux/sandbox_linux.h b/content/common/sandbox_linux/sandbox_linux.h |
index 01a0bd9a3546552fddbe2fea9c8c468d9bb3ab9d..12aabcfc06da020d693ae8b721beb90f805723d1 100644 |
--- a/content/common/sandbox_linux/sandbox_linux.h |
+++ b/content/common/sandbox_linux/sandbox_linux.h |
@@ -9,7 +9,6 @@ |
#include <vector> |
#include "base/basictypes.h" |
-#include "base/logging.h" |
#include "base/memory/scoped_ptr.h" |
#include "content/public/common/sandbox_linux.h" |
@@ -119,13 +118,6 @@ |
// to make some vulnerabilities harder to exploit. |
bool LimitAddressSpace(const std::string& process_type); |
- // Returns a file descriptor to proc. The file descriptor is no longer valid |
- // after the sandbox has been sealed. |
- int proc_fd() const { |
- DCHECK_NE(-1, proc_fd_); |
- return proc_fd_; |
- } |
- |
#if defined(ANY_OF_AMTLU_SANITIZER) |
__sanitizer_sandbox_arguments* sanitizer_args() const { |
return sanitizer_args_.get(); |