summaryrefslogtreecommitdiffstats
path: root/sandbox/linux
diff options
context:
space:
mode:
authorjln@chromium.org <jln@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-08-17 18:43:43 +0000
committerjln@chromium.org <jln@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-08-17 18:43:43 +0000
commit270c283c75e211d5f9db4efb193a4ba68b003302 (patch)
treefda11c7649b86dcb26e6ac9cb5ba3ec84e4eb9bb /sandbox/linux
parentb475ef4e26ba27f2b31969a1ba6de5e3534c7b27 (diff)
downloadchromium_src-270c283c75e211d5f9db4efb193a4ba68b003302.zip
chromium_src-270c283c75e211d5f9db4efb193a4ba68b003302.tar.gz
chromium_src-270c283c75e211d5f9db4efb193a4ba68b003302.tar.bz2
Correct style issues in Linux sandbox code.
NOTRY=true Review URL: https://chromiumcodereview.appspot.com/10818015 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@152123 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/linux')
-rw-r--r--sandbox/linux/suid/client/setuid_sandbox_client.cc15
-rw-r--r--sandbox/linux/suid/client/setuid_sandbox_client.h1
-rw-r--r--sandbox/linux/suid/client/setuid_sandbox_client_unittest.cc1
3 files changed, 10 insertions, 7 deletions
diff --git a/sandbox/linux/suid/client/setuid_sandbox_client.cc b/sandbox/linux/suid/client/setuid_sandbox_client.cc
index 4f62d09..45d700b 100644
--- a/sandbox/linux/suid/client/setuid_sandbox_client.cc
+++ b/sandbox/linux/suid/client/setuid_sandbox_client.cc
@@ -28,8 +28,8 @@ void SetSandboxAPIEnvironmentVariable(base::Environment* env) {
// Wrapper around a shared C function.
// Returns the "saved" environment variable name corresponding to |envvar|
// in a new string or NULL.
-std::string* CreateSavedVariableName(const char* envvar) {
- char* const saved_env_var = SandboxSavedEnvironmentVariable(envvar);
+std::string* CreateSavedVariableName(const char* env_var) {
+ char* const saved_env_var = SandboxSavedEnvironmentVariable(env_var);
if (!saved_env_var)
return NULL;
std::string* saved_env_var_copy = new std::string(saved_env_var);
@@ -44,7 +44,7 @@ std::string* CreateSavedVariableName(const char* envvar) {
// renderer.
void SaveSUIDUnsafeEnvironmentVariables(base::Environment* env) {
for (unsigned i = 0; kSUIDUnsafeEnvironmentVariables[i]; ++i) {
- const char* const env_var = kSUIDUnsafeEnvironmentVariables[i];
+ const char* env_var = kSUIDUnsafeEnvironmentVariables[i];
// Get the saved environment variable corresponding to envvar.
scoped_ptr<std::string> saved_env_var(CreateSavedVariableName(env_var));
if (saved_env_var == NULL)
@@ -113,14 +113,14 @@ SetuidSandboxClient::~SetuidSandboxClient() {
}
bool SetuidSandboxClient::ChrootMe() {
- int fd = GetIPCDescriptor(env_);
+ int ipc_fd = GetIPCDescriptor(env_);
- if (fd < 0) {
+ if (ipc_fd < 0) {
LOG(ERROR) << "Failed to obtain the sandbox IPC descriptor";
return false;
}
- if (HANDLE_EINTR(write(fd, &kMsgChrootMe, 1)) != 1) {
+ if (HANDLE_EINTR(write(ipc_fd, &kMsgChrootMe, 1)) != 1) {
PLOG(ERROR) << "Failed to write to chroot pipe";
return false;
}
@@ -134,7 +134,7 @@ bool SetuidSandboxClient::ChrootMe() {
}
char reply;
- if (HANDLE_EINTR(read(fd, &reply, 1)) != 1) {
+ if (HANDLE_EINTR(read(ipc_fd, &reply, 1)) != 1) {
PLOG(ERROR) << "Failed to read from chroot pipe";
return false;
}
@@ -176,3 +176,4 @@ void SetuidSandboxClient::SetupLaunchEnvironment() {
}
} // namespace sandbox
+
diff --git a/sandbox/linux/suid/client/setuid_sandbox_client.h b/sandbox/linux/suid/client/setuid_sandbox_client.h
index da77ce0..a9f6536 100644
--- a/sandbox/linux/suid/client/setuid_sandbox_client.h
+++ b/sandbox/linux/suid/client/setuid_sandbox_client.h
@@ -56,3 +56,4 @@ class SetuidSandboxClient {
} // namespace sandbox
#endif // SANDBOX_LINUX_SUID_SETUID_SANDBOX_CLIENT_H_
+
diff --git a/sandbox/linux/suid/client/setuid_sandbox_client_unittest.cc b/sandbox/linux/suid/client/setuid_sandbox_client_unittest.cc
index 135e7fc..293f423 100644
--- a/sandbox/linux/suid/client/setuid_sandbox_client_unittest.cc
+++ b/sandbox/linux/suid/client/setuid_sandbox_client_unittest.cc
@@ -91,3 +91,4 @@ TEST(SetuidSandboxClient, SandboxedClientAPI) {
}
} // namespace sandbox
+