| Index: components/nacl/broker/nacl_broker_listener.cc
|
| diff --git a/components/nacl/broker/nacl_broker_listener.cc b/components/nacl/broker/nacl_broker_listener.cc
|
| index f150049bb451d104f058b0ed5d0e083bb1e4db8e..3f28cd009f4003749135cd97e581db70bdd0eab6 100644
|
| --- a/components/nacl/broker/nacl_broker_listener.cc
|
| +++ b/components/nacl/broker/nacl_broker_listener.cc
|
| @@ -51,8 +51,7 @@ void NaClBrokerListener::Listen() {
|
| }
|
|
|
| // NOTE: changes to this method need to be reviewed by the security team.
|
| -void NaClBrokerListener::PreSpawnTarget(sandbox::TargetPolicy* policy,
|
| - bool* success) {
|
| +bool NaClBrokerListener::PreSpawnTarget(sandbox::TargetPolicy* policy) {
|
| // This code is duplicated in chrome_content_browser_client.cc.
|
|
|
| // Allow the server side of a pipe restricted to the "chrome.nacl."
|
| @@ -62,7 +61,7 @@ void NaClBrokerListener::PreSpawnTarget(sandbox::TargetPolicy* policy,
|
| sandbox::TargetPolicy::SUBSYS_NAMED_PIPES,
|
| sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY,
|
| L"\\\\.\\pipe\\chrome.nacl.*");
|
| - *success = (result == sandbox::SBOX_ALL_OK);
|
| + return result == sandbox::SBOX_ALL_OK;
|
| }
|
|
|
| void NaClBrokerListener::OnChannelConnected(int32 peer_pid) {
|
|
|