pkgsrc-WIP-changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
qt6-qtwebengine: minor sandbox patches fixups
Module Name: pkgsrc-wip
Committed By: Mark Davies <mark%ecs.vuw.ac.nz@localhost>
Pushed By: markd
Date: Sat Apr 26 11:56:55 2025 +1200
Changeset: 246752a45d4ab396ec1cfd347ba1f0ea884ff651
Modified Files:
qt6-qtwebengine/distinfo
qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.cc
qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.h
qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.cc
qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.h
qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.cc
qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.h
qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_sandbox__type.cc
Log Message:
qt6-qtwebengine: minor sandbox patches fixups
To see a diff of this commit:
https://wip.pkgsrc.org/cgi-bin/gitweb.cgi?p=pkgsrc-wip.git;a=commitdiff;h=246752a45d4ab396ec1cfd347ba1f0ea884ff651
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
diffstat:
qt6-qtwebengine/distinfo | 14 +++---
...mium_sandbox_policy_freebsd_sandbox__freebsd.cc | 40 ++++++++++++++--
...omium_sandbox_policy_freebsd_sandbox__freebsd.h | 4 +-
...romium_sandbox_policy_netbsd_sandbox__netbsd.cc | 40 ++++++++++++++--
...hromium_sandbox_policy_netbsd_sandbox__netbsd.h | 4 +-
...mium_sandbox_policy_openbsd_sandbox__openbsd.cc | 55 +++++++++++++++++-----
...omium_sandbox_policy_openbsd_sandbox__openbsd.h | 4 +-
...dparty_chromium_sandbox_policy_sandbox__type.cc | 9 +++-
8 files changed, 140 insertions(+), 30 deletions(-)
diffs:
diff --git a/qt6-qtwebengine/distinfo b/qt6-qtwebengine/distinfo
index 8776c68c02..122da845a4 100644
--- a/qt6-qtwebengine/distinfo
+++ b/qt6-qtwebengine/distinfo
@@ -607,16 +607,16 @@ SHA1 (patch-src_3rdparty_chromium_sandbox_linux_services_libc__interceptor.cc) =
SHA1 (patch-src_3rdparty_chromium_sandbox_policy_BUILD.gn) = 572809d8774dba0b50b3dd6ac05e5f38028d1a80
SHA1 (patch-src_3rdparty_chromium_sandbox_policy_features.cc) = c1fcac1e67fd8d782f7ba9348557cc4a73f8093d
SHA1 (patch-src_3rdparty_chromium_sandbox_policy_features.h) = fa74e0aa664cb41a157e3e4a78c87e863bce0a16
-SHA1 (patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.cc) = 2fa6bbbadf472adb9ea5d7b66ee049d2be94774c
-SHA1 (patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.h) = 9f148e63d5fd354ed9cb0eb6c7783c3e26cd95a8
+SHA1 (patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.cc) = 0464946da7d1bdca9571ae98e01a49d5d54dcf03
+SHA1 (patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.h) = fa878568c18278fb2813958e23a9136b51253812
SHA1 (patch-src_3rdparty_chromium_sandbox_policy_mojom_sandbox.mojom) = 998da97aae0c5ceb21c02c0a51add96c1b3ea404
-SHA1 (patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.cc) = 20ba18a7aefa14066f19183671787c778e1c738d
-SHA1 (patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.h) = bcc16c297c3b6d47e4dbc9902910d234f72df08a
-SHA1 (patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.cc) = 53fa070923bde5d99b671461aafa3e7fc8f0b33f
-SHA1 (patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.h) = 23945c4ff2444c0616404662bfdb48d3ee00bc15
+SHA1 (patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.cc) = 81458ca1f26ff142c5c31fa982586e9dd817ad82
+SHA1 (patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.h) = 2b4ab27abde1f14614d1760ea20817d1bd81ef8b
+SHA1 (patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.cc) = f65589ee9fb6e4872885d931417309ffbb2efec5
+SHA1 (patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.h) = 9155ca0ec2263de9c0b4b947ef0e1963cb1611b0
SHA1 (patch-src_3rdparty_chromium_sandbox_policy_sandbox.cc) = 29c1680854e05f6fb0ff56d3142a87aabc399169
SHA1 (patch-src_3rdparty_chromium_sandbox_policy_sandbox.h) = f5363643e18497f73bb881b86e5e7cd6438f5316
-SHA1 (patch-src_3rdparty_chromium_sandbox_policy_sandbox__type.cc) = 829955dde84c123995479829f9b03977e7728c82
+SHA1 (patch-src_3rdparty_chromium_sandbox_policy_sandbox__type.cc) = a58fcb31c574359d301fe5f794d950d87dbd4bb8
SHA1 (patch-src_3rdparty_chromium_sandbox_policy_switches.cc) = e5c58817b4960861c84dca355bc3301b73244854
SHA1 (patch-src_3rdparty_chromium_sandbox_policy_switches.h) = e420a1d68732f6e5bf2f7643321d6a78dfa1c0b5
SHA1 (patch-src_3rdparty_chromium_services_audio_audio__sandbox__hook__linux.cc) = 34da1e1a20094ac9cde12046370ac6f5d1dfd00a
diff --git a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.cc b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.cc
index 64f2ac178a..3f2158395b 100644
--- a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.cc
+++ b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.cc
@@ -4,9 +4,9 @@ $NetBSD$
* Based on OpenBSD's chromium patches, and
pkgsrc's qt5-qtwebengine patches
---- src/3rdparty/chromium/sandbox/policy/freebsd/sandbox_freebsd.cc.orig 2024-12-21 10:25:10.566911261 +0000
+--- src/3rdparty/chromium/sandbox/policy/freebsd/sandbox_freebsd.cc.orig 2025-04-24 23:51:17.209942583 +0000
+++ src/3rdparty/chromium/sandbox/policy/freebsd/sandbox_freebsd.cc
-@@ -0,0 +1,211 @@
+@@ -0,0 +1,245 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
@@ -165,7 +165,7 @@ $NetBSD$
+ return true;
+
+ VLOG(1) << "SandboxLinux::InitializeSandbox: process_type="
-+ << process_type << " sandbox_type=" << sandbox_type;
++ << process_type << " sandbox_type=" << GetSandboxTypeInEnglish(sandbox_type);
+
+ // Only one thread is running, pre-initialize if not already done.
+ if (!pre_initialized_)
@@ -216,5 +216,39 @@ $NetBSD$
+ // !defined(THREAD_SANITIZER) && !defined(LEAK_SANITIZER)
+}
+
++// static
++std::string SandboxLinux::GetSandboxTypeInEnglish(sandbox::mojom::Sandbox sandbox_type) {
++ switch (sandbox_type) {
++ case sandbox::mojom::Sandbox::kNoSandbox:
++ return "Unsandboxed";
++ case sandbox::mojom::Sandbox::kRenderer:
++ return "Renderer";
++ case sandbox::mojom::Sandbox::kUtility:
++ return "Utility";
++ case sandbox::mojom::Sandbox::kGpu:
++ return "GPU";
++#if BUILDFLAG(ENABLE_PPAPI)
++ case sandbox::mojom::Sandbox::kPpapi:
++ return "PPAPI";
++#endif
++ case sandbox::mojom::Sandbox::kNetwork:
++ return "Network";
++ case sandbox::mojom::Sandbox::kCdm:
++ return "CDM";
++ case sandbox::mojom::Sandbox::kPrintCompositor:
++ return "Print Compositor";
++ case sandbox::mojom::Sandbox::kAudio:
++ return "Audio";
++ case sandbox::mojom::Sandbox::kSpeechRecognition:
++ return "Speech Recognition";
++ case sandbox::mojom::Sandbox::kService:
++ return "Service";
++ case sandbox::mojom::Sandbox::kVideoCapture:
++ return "Video Capture";
++ default:
++ return "Unknown";
++ }
++}
++
+} // namespace policy
+} // namespace sandbox
diff --git a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.h b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.h
index bb46ef4749..001c9d7703 100644
--- a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.h
+++ b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.h
@@ -6,7 +6,7 @@ $NetBSD$
--- src/3rdparty/chromium/sandbox/policy/freebsd/sandbox_freebsd.h.orig 2024-12-21 10:25:10.567580901 +0000
+++ src/3rdparty/chromium/sandbox/policy/freebsd/sandbox_freebsd.h
-@@ -0,0 +1,276 @@
+@@ -0,0 +1,278 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
@@ -175,6 +175,8 @@ $NetBSD$
+ // is called from inside these processes.
+ int GetStatus();
+
++ static std::string GetSandboxTypeInEnglish(sandbox::mojom::Sandbox sandbox_type);
++
+ // Returns true if the current process is single-threaded or if the number
+ // of threads cannot be determined.
+ bool IsSingleThreaded() const;
diff --git a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.cc b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.cc
index bc7e88d6bc..9f606e7c8a 100644
--- a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.cc
+++ b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.cc
@@ -4,9 +4,9 @@ $NetBSD$
* Based on OpenBSD's chromium patches, and
pkgsrc's qt5-qtwebengine patches
---- src/3rdparty/chromium/sandbox/policy/netbsd/sandbox_netbsd.cc.orig 2024-12-21 10:25:10.569003712 +0000
+--- src/3rdparty/chromium/sandbox/policy/netbsd/sandbox_netbsd.cc.orig 2025-04-24 23:51:17.230159899 +0000
+++ src/3rdparty/chromium/sandbox/policy/netbsd/sandbox_netbsd.cc
-@@ -0,0 +1,211 @@
+@@ -0,0 +1,245 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
@@ -165,7 +165,7 @@ $NetBSD$
+ return true;
+
+ VLOG(1) << "SandboxLinux::InitializeSandbox: process_type="
-+ << process_type << " sandbox_type=" << sandbox_type;
++ << process_type << " sandbox_type=" << GetSandboxTypeInEnglish(sandbox_type);
+
+ // Only one thread is running, pre-initialize if not already done.
+ if (!pre_initialized_)
@@ -216,5 +216,39 @@ $NetBSD$
+ // !defined(THREAD_SANITIZER) && !defined(LEAK_SANITIZER)
+}
+
++// static
++std::string SandboxLinux::GetSandboxTypeInEnglish(sandbox::mojom::Sandbox sandbox_type) {
++ switch (sandbox_type) {
++ case sandbox::mojom::Sandbox::kNoSandbox:
++ return "Unsandboxed";
++ case sandbox::mojom::Sandbox::kRenderer:
++ return "Renderer";
++ case sandbox::mojom::Sandbox::kUtility:
++ return "Utility";
++ case sandbox::mojom::Sandbox::kGpu:
++ return "GPU";
++#if BUILDFLAG(ENABLE_PPAPI)
++ case sandbox::mojom::Sandbox::kPpapi:
++ return "PPAPI";
++#endif
++ case sandbox::mojom::Sandbox::kNetwork:
++ return "Network";
++ case sandbox::mojom::Sandbox::kCdm:
++ return "CDM";
++ case sandbox::mojom::Sandbox::kPrintCompositor:
++ return "Print Compositor";
++ case sandbox::mojom::Sandbox::kAudio:
++ return "Audio";
++ case sandbox::mojom::Sandbox::kSpeechRecognition:
++ return "Speech Recognition";
++ case sandbox::mojom::Sandbox::kService:
++ return "Service";
++ case sandbox::mojom::Sandbox::kVideoCapture:
++ return "Video Capture";
++ default:
++ return "Unknown";
++ }
++}
++
+} // namespace policy
+} // namespace sandbox
diff --git a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.h b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.h
index d29639097b..2ff2f24d47 100644
--- a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.h
+++ b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.h
@@ -6,7 +6,7 @@ $NetBSD$
--- src/3rdparty/chromium/sandbox/policy/netbsd/sandbox_netbsd.h.orig 2024-12-21 10:25:10.569588425 +0000
+++ src/3rdparty/chromium/sandbox/policy/netbsd/sandbox_netbsd.h
-@@ -0,0 +1,276 @@
+@@ -0,0 +1,278 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
@@ -175,6 +175,8 @@ $NetBSD$
+ // is called from inside these processes.
+ int GetStatus();
+
++ static std::string GetSandboxTypeInEnglish(sandbox::mojom::Sandbox sandbox_type);
++
+ // Returns true if the current process is single-threaded or if the number
+ // of threads cannot be determined.
+ bool IsSingleThreaded() const;
diff --git a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.cc b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.cc
index e690c98cb0..9961b35082 100644
--- a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.cc
+++ b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.cc
@@ -4,9 +4,9 @@ $NetBSD$
* Based on OpenBSD's chromium patches, and
pkgsrc's qt5-qtwebengine patches
---- src/3rdparty/chromium/sandbox/policy/openbsd/sandbox_openbsd.cc.orig 2024-12-21 10:25:10.570415628 +0000
+--- src/3rdparty/chromium/sandbox/policy/openbsd/sandbox_openbsd.cc.orig 2025-04-24 23:51:17.243910682 +0000
+++ src/3rdparty/chromium/sandbox/policy/openbsd/sandbox_openbsd.cc
-@@ -0,0 +1,392 @@
+@@ -0,0 +1,423 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
@@ -69,8 +69,7 @@ $NetBSD$
+
+#include "third_party/boringssl/src/include/openssl/crypto.h"
+
-+#include <fontconfig/fontconfig.h>
-+#include "ui/gfx/linux/fontconfig_util.h"
++#include "ui/gfx/font_util.h"
+
+#define MAXTOKENS 3
+
@@ -153,11 +152,8 @@ $NetBSD$
+ break;
+ }
+ case sandbox::mojom::Sandbox::kRenderer:
-+ {
-+ FcConfig* config = gfx::GetGlobalFontConfig();
-+ DCHECK(config);
++ gfx::InitializeFonts();
+ break;
-+ }
+ default:
+ break;
+ }
@@ -209,7 +205,6 @@ $NetBSD$
+ ufile = _UNVEIL_MAIN;
+ break;
+ case sandbox::mojom::Sandbox::kGpu:
-+ case sandbox::mojom::Sandbox::kOnDeviceModelExecution:
+ ufile = _UNVEIL_GPU;
+ break;
+ case sandbox::mojom::Sandbox::kNetwork:
@@ -306,7 +301,7 @@ $NetBSD$
+ return true;
+
+ VLOG(1) << "SandboxLinux::InitializeSandbox: process_type="
-+ << process_type << " sandbox_type=" << sandbox_type;
++ << process_type << " sandbox_type=" << GetSandboxTypeInEnglish(sandbox_type);
+
+ // Only one thread is running, pre-initialize if not already done.
+ if (!pre_initialized_)
@@ -325,6 +320,8 @@ $NetBSD$
+ if (hook)
+ CHECK(std::move(hook).Run(options));
+
++ /**
++ * XXX no pledge, unveil support in QtWebEngine
+ if (!command_line->HasSwitch(switches::kDisableUnveil))
+ SetUnveil(process_type, sandbox_type);
+
@@ -338,7 +335,6 @@ $NetBSD$
+ SetPledge("stdio rpath flock prot_exec recvfd sendfd ps", NULL);
+ break;
+ case sandbox::mojom::Sandbox::kGpu:
-+ case sandbox::mojom::Sandbox::kOnDeviceModelExecution:
+ SetPledge("stdio drm rpath flock cpath wpath prot_exec recvfd sendfd tmppath", NULL);
+ break;
+#if BUILDFLAG(ENABLE_PPAPI)
@@ -361,9 +357,10 @@ $NetBSD$
+ SetPledge("stdio rpath cpath wpath fattr flock sendfd recvfd prot_exec", NULL);
+ break;
+ default:
-+ LOG(ERROR) << "non-pledge()'d process: " << sandbox_type;
++ LOG(ERROR) << "non-pledge()'d process: " << GetSandboxTypeInEnglish(sandbox_type);
+ break;
+ }
++ XXX */
+
+ return true;
+}
@@ -397,5 +394,39 @@ $NetBSD$
+ // !defined(THREAD_SANITIZER) && !defined(LEAK_SANITIZER)
+}
+
++// static
++std::string SandboxLinux::GetSandboxTypeInEnglish(sandbox::mojom::Sandbox sandbox_type) {
++ switch (sandbox_type) {
++ case sandbox::mojom::Sandbox::kNoSandbox:
++ return "Unsandboxed";
++ case sandbox::mojom::Sandbox::kRenderer:
++ return "Renderer";
++ case sandbox::mojom::Sandbox::kUtility:
++ return "Utility";
++ case sandbox::mojom::Sandbox::kGpu:
++ return "GPU";
++#if BUILDFLAG(ENABLE_PPAPI)
++ case sandbox::mojom::Sandbox::kPpapi:
++ return "PPAPI";
++#endif
++ case sandbox::mojom::Sandbox::kNetwork:
++ return "Network";
++ case sandbox::mojom::Sandbox::kCdm:
++ return "CDM";
++ case sandbox::mojom::Sandbox::kPrintCompositor:
++ return "Print Compositor";
++ case sandbox::mojom::Sandbox::kAudio:
++ return "Audio";
++ case sandbox::mojom::Sandbox::kSpeechRecognition:
++ return "Speech Recognition";
++ case sandbox::mojom::Sandbox::kService:
++ return "Service";
++ case sandbox::mojom::Sandbox::kVideoCapture:
++ return "Video Capture";
++ default:
++ return "Unknown";
++ }
++}
++
+} // namespace policy
+} // namespace sandbox
diff --git a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.h b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.h
index 18f357bbf6..b65b87f576 100644
--- a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.h
+++ b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.h
@@ -6,7 +6,7 @@ $NetBSD$
--- src/3rdparty/chromium/sandbox/policy/openbsd/sandbox_openbsd.h.orig 2024-12-21 10:25:10.571038055 +0000
+++ src/3rdparty/chromium/sandbox/policy/openbsd/sandbox_openbsd.h
-@@ -0,0 +1,280 @@
+@@ -0,0 +1,282 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
@@ -175,6 +175,8 @@ $NetBSD$
+ // is called from inside these processes.
+ int GetStatus();
+
++ static std::string GetSandboxTypeInEnglish(sandbox::mojom::Sandbox sandbox_type);
++
+ // Returns true if the current process is single-threaded or if the number
+ // of threads cannot be determined.
+ bool IsSingleThreaded() const;
diff --git a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_sandbox__type.cc b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_sandbox__type.cc
index 1da225f0fc..23a224ad2a 100644
--- a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_sandbox__type.cc
+++ b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_sandbox__type.cc
@@ -4,7 +4,7 @@ $NetBSD$
* Based on OpenBSD's chromium patches, and
pkgsrc's qt5-qtwebengine patches
---- src/3rdparty/chromium/sandbox/policy/sandbox_type.cc.orig 2024-11-21 04:36:37.000000000 +0000
+--- src/3rdparty/chromium/sandbox/policy/sandbox_type.cc.orig 2025-03-18 19:28:59.000000000 +0000
+++ src/3rdparty/chromium/sandbox/policy/sandbox_type.cc
@@ -38,7 +38,7 @@ bool IsUnsandboxedSandboxType(Sandbox sa
#endif
@@ -105,7 +105,12 @@ $NetBSD$
case Sandbox::kZygoteIntermediateSandbox:
#endif
NOTREACHED();
-@@ -392,11 +392,11 @@ sandbox::mojom::Sandbox UtilitySandboxTy
+@@ -388,15 +388,15 @@ sandbox::mojom::Sandbox UtilitySandboxTy
+ if (sandbox_string == switches::kScreenAISandbox)
+ return Sandbox::kScreenAI;
+ #endif
+-#if BUILDFLAG(IS_FUCHSIA)
++#if BUILDFLAG(IS_FUCHSIA) || BUILDFLAG(IS_BSD)
if (sandbox_string == switches::kVideoCaptureSandbox)
return Sandbox::kVideoCapture;
#endif
Home |
Main Index |
Thread Index |
Old Index