Index: chrome_elf/blacklist/blacklist_interceptions.cc |
diff --git a/chrome_elf/blacklist/blacklist_interceptions.cc b/chrome_elf/blacklist/blacklist_interceptions.cc |
index f4c73446f2f104823bb770ba332f80a4e5a7b6b5..48699b1caff86607eeebadef3c97381d6c050e00 100644 |
--- a/chrome_elf/blacklist/blacklist_interceptions.cc |
+++ b/chrome_elf/blacklist/blacklist_interceptions.cc |
@@ -16,10 +16,9 @@ |
// Note that only #includes from base that are either header-only or built into |
// base_static (see base/base.gyp) are allowed here. |
-#include "base/strings/string16.h" |
#include "base/win/pe_image.h" |
#include "chrome_elf/blacklist/blacklist.h" |
-#include "chrome_elf/breakpad.h" |
+#include "chrome_elf/breakpad/breakpad.h" |
#include "sandbox/win/src/internal_types.h" |
#include "sandbox/win/src/nt_internals.h" |
#include "sandbox/win/src/sandbox_nt_util.h" |
@@ -37,7 +36,7 @@ FARPROC GetNtDllExportByName(const char* export_name) { |
return ::GetProcAddress(ntdll, export_name); |
} |
-int DllMatch(const base::string16& module_name) { |
+int DllMatch(const std::wstring& module_name) { |
if (module_name.empty()) |
return -1; |
@@ -52,7 +51,7 @@ int DllMatch(const base::string16& module_name) { |
// code in sandbox_nt_util.cc. See if they can be unified. |
// Native reimplementation of PSAPIs GetMappedFileName. |
-base::string16 GetBackingModuleFilePath(PVOID address) { |
+std::wstring GetBackingModuleFilePath(PVOID address) { |
DCHECK_NT(g_nt_query_virtual_memory_func); |
// We'll start with something close to max_path characters for the name. |
@@ -83,11 +82,11 @@ base::string16 GetBackingModuleFilePath(PVOID address) { |
UNICODE_STRING* section_string = |
reinterpret_cast<UNICODE_STRING*>(section_name); |
- return base::string16(section_string->Buffer, |
- section_string->Length / sizeof(wchar_t)); |
+ return std::wstring(section_string->Buffer, |
+ section_string->Length / sizeof(wchar_t)); |
} |
- return base::string16(); |
+ return std::wstring(); |
} |
bool IsModuleValidImageSection(HANDLE section, |
@@ -114,12 +113,12 @@ bool IsModuleValidImageSection(HANDLE section, |
return true; |
} |
-base::string16 ExtractLoadedModuleName(const base::string16& module_path) { |
+std::wstring ExtractLoadedModuleName(const std::wstring& module_path) { |
if (module_path.empty() || module_path.back() == L'\\') |
- return base::string16(); |
+ return std::wstring(); |
size_t sep = module_path.find_last_of(L'\\'); |
- if (sep == base::string16::npos) |
+ if (sep == std::wstring::npos) |
return module_path; |
return module_path.substr(sep + 1); |
} |
@@ -161,11 +160,11 @@ void SafeGetImageInfo(const base::win::PEImage& pe, |
} |
} |
-base::string16 GetImageInfoFromLoadedModule(HMODULE module, uint32_t* flags) { |
+std::wstring GetImageInfoFromLoadedModule(HMODULE module, uint32_t* flags) { |
std::string out_name; |
base::win::PEImage pe(module); |
SafeGetImageInfo(pe, &out_name, flags); |
- return base::string16(out_name.begin(), out_name.end()); |
+ return std::wstring(out_name.begin(), out_name.end()); |
} |
bool IsSameAsCurrentProcess(HANDLE process) { |
@@ -198,7 +197,7 @@ NTSTATUS BlNtMapViewOfSectionImpl( |
if (module) { |
UINT image_flags; |
- base::string16 module_name_from_image(GetImageInfoFromLoadedModule( |
+ std::wstring module_name_from_image(GetImageInfoFromLoadedModule( |
reinterpret_cast<HMODULE>(*base), &image_flags)); |
int blocked_index = DllMatch(module_name_from_image); |
@@ -206,8 +205,8 @@ NTSTATUS BlNtMapViewOfSectionImpl( |
// If the module name isn't blacklisted, see if the file name is different |
// and blacklisted. |
if (blocked_index == -1) { |
- base::string16 file_name(GetBackingModuleFilePath(*base)); |
- base::string16 module_name_from_file = ExtractLoadedModuleName(file_name); |
+ std::wstring file_name(GetBackingModuleFilePath(*base)); |
+ std::wstring module_name_from_file = ExtractLoadedModuleName(file_name); |
if (module_name_from_image != module_name_from_file) |
blocked_index = DllMatch(module_name_from_file); |