Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(175)

Unified Diff: sandbox/linux/syscall_broker/broker_host.cc

Issue 1180693002: Update from https://crrev.com/333737 (Closed) Base URL: https://github.com/domokit/mojo.git@master
Patch Set: rebased Created 5 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: sandbox/linux/syscall_broker/broker_host.cc
diff --git a/sandbox/linux/syscall_broker/broker_host.cc b/sandbox/linux/syscall_broker/broker_host.cc
index fe28b477a57a85a8994e94e18cd9b1ff03b179dd..e5957ed224eadb82242ff7c7362783dd2dea3c01 100644
--- a/sandbox/linux/syscall_broker/broker_host.cc
+++ b/sandbox/linux/syscall_broker/broker_host.cc
@@ -59,7 +59,7 @@ int sys_open(const char* pathname, int flags) {
void OpenFileForIPC(const BrokerPolicy& policy,
const std::string& requested_filename,
int flags,
- Pickle* write_pickle,
+ base::Pickle* write_pickle,
std::vector<int>* opened_files) {
DCHECK(write_pickle);
DCHECK(opened_files);
@@ -91,7 +91,7 @@ void OpenFileForIPC(const BrokerPolicy& policy,
void AccessFileForIPC(const BrokerPolicy& policy,
const std::string& requested_filename,
int mode,
- Pickle* write_pickle) {
+ base::Pickle* write_pickle) {
DCHECK(write_pickle);
const char* file_to_access = NULL;
const bool safe_to_access_file = policy.GetFileNameIfAllowedToAccess(
@@ -116,14 +116,14 @@ void AccessFileForIPC(const BrokerPolicy& policy,
bool HandleRemoteCommand(const BrokerPolicy& policy,
IPCCommand command_type,
int reply_ipc,
- PickleIterator iter) {
+ base::PickleIterator iter) {
// Currently all commands have two arguments: filename and flags.
std::string requested_filename;
int flags = 0;
if (!iter.ReadString(&requested_filename) || !iter.ReadInt(&flags))
return false;
- Pickle write_pickle;
+ base::Pickle write_pickle;
std::vector<int> opened_files;
switch (command_type) {
@@ -140,7 +140,7 @@ bool HandleRemoteCommand(const BrokerPolicy& policy,
}
CHECK_LE(write_pickle.size(), kMaxMessageLength);
- ssize_t sent = UnixDomainSocket::SendMsg(
+ ssize_t sent = base::UnixDomainSocket::SendMsg(
reply_ipc, write_pickle.data(), write_pickle.size(), opened_files);
// Close anything we have opened in this process.
@@ -176,8 +176,8 @@ BrokerHost::RequestStatus BrokerHost::HandleRequest() const {
ScopedVector<base::ScopedFD> fds;
char buf[kMaxMessageLength];
errno = 0;
- const ssize_t msg_len =
- UnixDomainSocket::RecvMsg(ipc_channel_.get(), buf, sizeof(buf), &fds);
+ const ssize_t msg_len = base::UnixDomainSocket::RecvMsg(
+ ipc_channel_.get(), buf, sizeof(buf), &fds);
if (msg_len == 0 || (msg_len == -1 && errno == ECONNRESET)) {
// EOF from the client, or the client died, we should die.
@@ -194,8 +194,8 @@ BrokerHost::RequestStatus BrokerHost::HandleRequest() const {
base::ScopedFD temporary_ipc(fds[0]->Pass());
- Pickle pickle(buf, msg_len);
- PickleIterator iter(pickle);
+ base::Pickle pickle(buf, msg_len);
+ base::PickleIterator iter(pickle);
int command_type;
if (iter.ReadInt(&command_type)) {
bool command_handled = false;
« no previous file with comments | « sandbox/linux/syscall_broker/broker_client.cc ('k') | sandbox/linux/syscall_broker/broker_process_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698