diff options
author | jln@chromium.org <jln@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-08-17 18:43:43 +0000 |
---|---|---|
committer | jln@chromium.org <jln@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-08-17 18:43:43 +0000 |
commit | 270c283c75e211d5f9db4efb193a4ba68b003302 (patch) | |
tree | fda11c7649b86dcb26e6ac9cb5ba3ec84e4eb9bb /sandbox | |
parent | b475ef4e26ba27f2b31969a1ba6de5e3534c7b27 (diff) | |
download | chromium_src-270c283c75e211d5f9db4efb193a4ba68b003302.zip chromium_src-270c283c75e211d5f9db4efb193a4ba68b003302.tar.gz chromium_src-270c283c75e211d5f9db4efb193a4ba68b003302.tar.bz2 |
Correct style issues in Linux sandbox code.
NOTRY=true
Review URL: https://chromiumcodereview.appspot.com/10818015
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@152123 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox')
-rw-r--r-- | sandbox/linux/suid/client/setuid_sandbox_client.cc | 15 | ||||
-rw-r--r-- | sandbox/linux/suid/client/setuid_sandbox_client.h | 1 | ||||
-rw-r--r-- | sandbox/linux/suid/client/setuid_sandbox_client_unittest.cc | 1 |
3 files changed, 10 insertions, 7 deletions
diff --git a/sandbox/linux/suid/client/setuid_sandbox_client.cc b/sandbox/linux/suid/client/setuid_sandbox_client.cc index 4f62d09..45d700b 100644 --- a/sandbox/linux/suid/client/setuid_sandbox_client.cc +++ b/sandbox/linux/suid/client/setuid_sandbox_client.cc @@ -28,8 +28,8 @@ void SetSandboxAPIEnvironmentVariable(base::Environment* env) { // Wrapper around a shared C function. // Returns the "saved" environment variable name corresponding to |envvar| // in a new string or NULL. -std::string* CreateSavedVariableName(const char* envvar) { - char* const saved_env_var = SandboxSavedEnvironmentVariable(envvar); +std::string* CreateSavedVariableName(const char* env_var) { + char* const saved_env_var = SandboxSavedEnvironmentVariable(env_var); if (!saved_env_var) return NULL; std::string* saved_env_var_copy = new std::string(saved_env_var); @@ -44,7 +44,7 @@ std::string* CreateSavedVariableName(const char* envvar) { // renderer. void SaveSUIDUnsafeEnvironmentVariables(base::Environment* env) { for (unsigned i = 0; kSUIDUnsafeEnvironmentVariables[i]; ++i) { - const char* const env_var = kSUIDUnsafeEnvironmentVariables[i]; + const char* env_var = kSUIDUnsafeEnvironmentVariables[i]; // Get the saved environment variable corresponding to envvar. scoped_ptr<std::string> saved_env_var(CreateSavedVariableName(env_var)); if (saved_env_var == NULL) @@ -113,14 +113,14 @@ SetuidSandboxClient::~SetuidSandboxClient() { } bool SetuidSandboxClient::ChrootMe() { - int fd = GetIPCDescriptor(env_); + int ipc_fd = GetIPCDescriptor(env_); - if (fd < 0) { + if (ipc_fd < 0) { LOG(ERROR) << "Failed to obtain the sandbox IPC descriptor"; return false; } - if (HANDLE_EINTR(write(fd, &kMsgChrootMe, 1)) != 1) { + if (HANDLE_EINTR(write(ipc_fd, &kMsgChrootMe, 1)) != 1) { PLOG(ERROR) << "Failed to write to chroot pipe"; return false; } @@ -134,7 +134,7 @@ bool SetuidSandboxClient::ChrootMe() { } char reply; - if (HANDLE_EINTR(read(fd, &reply, 1)) != 1) { + if (HANDLE_EINTR(read(ipc_fd, &reply, 1)) != 1) { PLOG(ERROR) << "Failed to read from chroot pipe"; return false; } @@ -176,3 +176,4 @@ void SetuidSandboxClient::SetupLaunchEnvironment() { } } // namespace sandbox + diff --git a/sandbox/linux/suid/client/setuid_sandbox_client.h b/sandbox/linux/suid/client/setuid_sandbox_client.h index da77ce0..a9f6536 100644 --- a/sandbox/linux/suid/client/setuid_sandbox_client.h +++ b/sandbox/linux/suid/client/setuid_sandbox_client.h @@ -56,3 +56,4 @@ class SetuidSandboxClient { } // namespace sandbox #endif // SANDBOX_LINUX_SUID_SETUID_SANDBOX_CLIENT_H_ + diff --git a/sandbox/linux/suid/client/setuid_sandbox_client_unittest.cc b/sandbox/linux/suid/client/setuid_sandbox_client_unittest.cc index 135e7fc..293f423 100644 --- a/sandbox/linux/suid/client/setuid_sandbox_client_unittest.cc +++ b/sandbox/linux/suid/client/setuid_sandbox_client_unittest.cc @@ -91,3 +91,4 @@ TEST(SetuidSandboxClient, SandboxedClientAPI) { } } // namespace sandbox + |