| Index: content/common/sandbox_linux/sandbox_linux.h
|
| diff --git a/content/common/sandbox_linux/sandbox_linux.h b/content/common/sandbox_linux/sandbox_linux.h
|
| index 12aabcfc06da020d693ae8b721beb90f805723d1..01a0bd9a3546552fddbe2fea9c8c468d9bb3ab9d 100644
|
| --- a/content/common/sandbox_linux/sandbox_linux.h
|
| +++ b/content/common/sandbox_linux/sandbox_linux.h
|
| @@ -9,6 +9,7 @@
|
| #include <vector>
|
|
|
| #include "base/basictypes.h"
|
| +#include "base/logging.h"
|
| #include "base/memory/scoped_ptr.h"
|
| #include "content/public/common/sandbox_linux.h"
|
|
|
| @@ -118,6 +119,13 @@ class LinuxSandbox {
|
| // to make some vulnerabilities harder to exploit.
|
| bool LimitAddressSpace(const std::string& process_type);
|
|
|
| + // Returns a file descriptor to proc. The file descriptor is no longer valid
|
| + // after the sandbox has been sealed.
|
| + int proc_fd() const {
|
| + DCHECK_NE(-1, proc_fd_);
|
| + return proc_fd_;
|
| + }
|
| +
|
| #if defined(ANY_OF_AMTLU_SANITIZER)
|
| __sanitizer_sandbox_arguments* sanitizer_args() const {
|
| return sanitizer_args_.get();
|
|
|