| Index: content/common/sandbox_linux.h
|
| diff --git a/content/common/sandbox_linux.h b/content/common/sandbox_linux.h
|
| index 412c04ab20bdf1915974443370025d853579ed9b..2cf105fadf98b251e3debbbda386dec54c15ad2e 100644
|
| --- a/content/common/sandbox_linux.h
|
| +++ b/content/common/sandbox_linux.h
|
| @@ -80,6 +80,10 @@ class LinuxSandbox {
|
|
|
| // We must have been pre_initialized_ before using this.
|
| bool seccomp_bpf_supported() const;
|
| + // Returns true if it can be determined that the current process has open
|
| + // directories that are not managed by the LinuxSandbox class. This would
|
| + // be a vulnerability as it would allow to bypass the setuid sandbox.
|
| + bool HasOpenDirectories();
|
| // The last part of the initialization is to make sure any temporary "hole"
|
| // in the sandbox is closed. For now, this consists of closing proc_fd_.
|
| void SealSandbox();
|
|
|