pkgsrc-WIP-changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

qt6-qtwebengine: minor sandbox patches fixups



Module Name:	pkgsrc-wip
Committed By:	Mark Davies <mark%ecs.vuw.ac.nz@localhost>
Pushed By:	markd
Date:		Sat Apr 26 11:56:55 2025 +1200
Changeset:	246752a45d4ab396ec1cfd347ba1f0ea884ff651

Modified Files:
	qt6-qtwebengine/distinfo
	qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.cc
	qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.h
	qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.cc
	qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.h
	qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.cc
	qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.h
	qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_sandbox__type.cc

Log Message:
qt6-qtwebengine: minor sandbox patches fixups

To see a diff of this commit:
https://wip.pkgsrc.org/cgi-bin/gitweb.cgi?p=pkgsrc-wip.git;a=commitdiff;h=246752a45d4ab396ec1cfd347ba1f0ea884ff651

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

diffstat:
 qt6-qtwebengine/distinfo                           | 14 +++---
 ...mium_sandbox_policy_freebsd_sandbox__freebsd.cc | 40 ++++++++++++++--
 ...omium_sandbox_policy_freebsd_sandbox__freebsd.h |  4 +-
 ...romium_sandbox_policy_netbsd_sandbox__netbsd.cc | 40 ++++++++++++++--
 ...hromium_sandbox_policy_netbsd_sandbox__netbsd.h |  4 +-
 ...mium_sandbox_policy_openbsd_sandbox__openbsd.cc | 55 +++++++++++++++++-----
 ...omium_sandbox_policy_openbsd_sandbox__openbsd.h |  4 +-
 ...dparty_chromium_sandbox_policy_sandbox__type.cc |  9 +++-
 8 files changed, 140 insertions(+), 30 deletions(-)

diffs:
diff --git a/qt6-qtwebengine/distinfo b/qt6-qtwebengine/distinfo
index 8776c68c02..122da845a4 100644
--- a/qt6-qtwebengine/distinfo
+++ b/qt6-qtwebengine/distinfo
@@ -607,16 +607,16 @@ SHA1 (patch-src_3rdparty_chromium_sandbox_linux_services_libc__interceptor.cc) =
 SHA1 (patch-src_3rdparty_chromium_sandbox_policy_BUILD.gn) = 572809d8774dba0b50b3dd6ac05e5f38028d1a80
 SHA1 (patch-src_3rdparty_chromium_sandbox_policy_features.cc) = c1fcac1e67fd8d782f7ba9348557cc4a73f8093d
 SHA1 (patch-src_3rdparty_chromium_sandbox_policy_features.h) = fa74e0aa664cb41a157e3e4a78c87e863bce0a16
-SHA1 (patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.cc) = 2fa6bbbadf472adb9ea5d7b66ee049d2be94774c
-SHA1 (patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.h) = 9f148e63d5fd354ed9cb0eb6c7783c3e26cd95a8
+SHA1 (patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.cc) = 0464946da7d1bdca9571ae98e01a49d5d54dcf03
+SHA1 (patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.h) = fa878568c18278fb2813958e23a9136b51253812
 SHA1 (patch-src_3rdparty_chromium_sandbox_policy_mojom_sandbox.mojom) = 998da97aae0c5ceb21c02c0a51add96c1b3ea404
-SHA1 (patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.cc) = 20ba18a7aefa14066f19183671787c778e1c738d
-SHA1 (patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.h) = bcc16c297c3b6d47e4dbc9902910d234f72df08a
-SHA1 (patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.cc) = 53fa070923bde5d99b671461aafa3e7fc8f0b33f
-SHA1 (patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.h) = 23945c4ff2444c0616404662bfdb48d3ee00bc15
+SHA1 (patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.cc) = 81458ca1f26ff142c5c31fa982586e9dd817ad82
+SHA1 (patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.h) = 2b4ab27abde1f14614d1760ea20817d1bd81ef8b
+SHA1 (patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.cc) = f65589ee9fb6e4872885d931417309ffbb2efec5
+SHA1 (patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.h) = 9155ca0ec2263de9c0b4b947ef0e1963cb1611b0
 SHA1 (patch-src_3rdparty_chromium_sandbox_policy_sandbox.cc) = 29c1680854e05f6fb0ff56d3142a87aabc399169
 SHA1 (patch-src_3rdparty_chromium_sandbox_policy_sandbox.h) = f5363643e18497f73bb881b86e5e7cd6438f5316
-SHA1 (patch-src_3rdparty_chromium_sandbox_policy_sandbox__type.cc) = 829955dde84c123995479829f9b03977e7728c82
+SHA1 (patch-src_3rdparty_chromium_sandbox_policy_sandbox__type.cc) = a58fcb31c574359d301fe5f794d950d87dbd4bb8
 SHA1 (patch-src_3rdparty_chromium_sandbox_policy_switches.cc) = e5c58817b4960861c84dca355bc3301b73244854
 SHA1 (patch-src_3rdparty_chromium_sandbox_policy_switches.h) = e420a1d68732f6e5bf2f7643321d6a78dfa1c0b5
 SHA1 (patch-src_3rdparty_chromium_services_audio_audio__sandbox__hook__linux.cc) = 34da1e1a20094ac9cde12046370ac6f5d1dfd00a
diff --git a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.cc b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.cc
index 64f2ac178a..3f2158395b 100644
--- a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.cc
+++ b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.cc
@@ -4,9 +4,9 @@ $NetBSD$
 * Based on OpenBSD's chromium patches, and
   pkgsrc's qt5-qtwebengine patches
 
---- src/3rdparty/chromium/sandbox/policy/freebsd/sandbox_freebsd.cc.orig	2024-12-21 10:25:10.566911261 +0000
+--- src/3rdparty/chromium/sandbox/policy/freebsd/sandbox_freebsd.cc.orig	2025-04-24 23:51:17.209942583 +0000
 +++ src/3rdparty/chromium/sandbox/policy/freebsd/sandbox_freebsd.cc
-@@ -0,0 +1,211 @@
+@@ -0,0 +1,245 @@
 +// Copyright (c) 2012 The Chromium Authors. All rights reserved.
 +// Use of this source code is governed by a BSD-style license that can be
 +// found in the LICENSE file.
@@ -165,7 +165,7 @@ $NetBSD$
 +    return true;
 +
 +  VLOG(1) << "SandboxLinux::InitializeSandbox: process_type="
-+      << process_type << " sandbox_type=" << sandbox_type;
++      << process_type << " sandbox_type=" << GetSandboxTypeInEnglish(sandbox_type);
 +
 +  // Only one thread is running, pre-initialize if not already done.
 +  if (!pre_initialized_)
@@ -216,5 +216,39 @@ $NetBSD$
 +        // !defined(THREAD_SANITIZER) && !defined(LEAK_SANITIZER)
 +}
 +
++// static
++std::string SandboxLinux::GetSandboxTypeInEnglish(sandbox::mojom::Sandbox sandbox_type) {
++  switch (sandbox_type) {
++    case sandbox::mojom::Sandbox::kNoSandbox:
++      return "Unsandboxed";
++    case sandbox::mojom::Sandbox::kRenderer:
++      return "Renderer";
++    case sandbox::mojom::Sandbox::kUtility:
++      return "Utility";
++    case sandbox::mojom::Sandbox::kGpu:
++      return "GPU";
++#if BUILDFLAG(ENABLE_PPAPI)
++    case sandbox::mojom::Sandbox::kPpapi:
++      return "PPAPI";
++#endif
++    case sandbox::mojom::Sandbox::kNetwork:
++      return "Network";
++    case sandbox::mojom::Sandbox::kCdm:
++      return "CDM";
++    case sandbox::mojom::Sandbox::kPrintCompositor:
++      return "Print Compositor";
++    case sandbox::mojom::Sandbox::kAudio:
++      return "Audio";
++    case sandbox::mojom::Sandbox::kSpeechRecognition:
++      return "Speech Recognition";
++    case sandbox::mojom::Sandbox::kService:
++      return "Service";
++    case sandbox::mojom::Sandbox::kVideoCapture:
++      return "Video Capture";
++    default:
++      return "Unknown";
++  }
++}
++
 +}  // namespace policy
 +}  // namespace sandbox
diff --git a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.h b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.h
index bb46ef4749..001c9d7703 100644
--- a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.h
+++ b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_freebsd_sandbox__freebsd.h
@@ -6,7 +6,7 @@ $NetBSD$
 
 --- src/3rdparty/chromium/sandbox/policy/freebsd/sandbox_freebsd.h.orig	2024-12-21 10:25:10.567580901 +0000
 +++ src/3rdparty/chromium/sandbox/policy/freebsd/sandbox_freebsd.h
-@@ -0,0 +1,276 @@
+@@ -0,0 +1,278 @@
 +// Copyright (c) 2012 The Chromium Authors. All rights reserved.
 +// Use of this source code is governed by a BSD-style license that can be
 +// found in the LICENSE file.
@@ -175,6 +175,8 @@ $NetBSD$
 +  // is called from inside these processes.
 +  int GetStatus();
 +
++  static std::string GetSandboxTypeInEnglish(sandbox::mojom::Sandbox sandbox_type);
++
 +  // Returns true if the current process is single-threaded or if the number
 +  // of threads cannot be determined.
 +  bool IsSingleThreaded() const;
diff --git a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.cc b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.cc
index bc7e88d6bc..9f606e7c8a 100644
--- a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.cc
+++ b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.cc
@@ -4,9 +4,9 @@ $NetBSD$
 * Based on OpenBSD's chromium patches, and
   pkgsrc's qt5-qtwebengine patches
 
---- src/3rdparty/chromium/sandbox/policy/netbsd/sandbox_netbsd.cc.orig	2024-12-21 10:25:10.569003712 +0000
+--- src/3rdparty/chromium/sandbox/policy/netbsd/sandbox_netbsd.cc.orig	2025-04-24 23:51:17.230159899 +0000
 +++ src/3rdparty/chromium/sandbox/policy/netbsd/sandbox_netbsd.cc
-@@ -0,0 +1,211 @@
+@@ -0,0 +1,245 @@
 +// Copyright (c) 2012 The Chromium Authors. All rights reserved.
 +// Use of this source code is governed by a BSD-style license that can be
 +// found in the LICENSE file.
@@ -165,7 +165,7 @@ $NetBSD$
 +    return true;
 +
 +  VLOG(1) << "SandboxLinux::InitializeSandbox: process_type="
-+      << process_type << " sandbox_type=" << sandbox_type;
++      << process_type << " sandbox_type=" << GetSandboxTypeInEnglish(sandbox_type);
 +
 +  // Only one thread is running, pre-initialize if not already done.
 +  if (!pre_initialized_)
@@ -216,5 +216,39 @@ $NetBSD$
 +        // !defined(THREAD_SANITIZER) && !defined(LEAK_SANITIZER)
 +}
 +
++// static
++std::string SandboxLinux::GetSandboxTypeInEnglish(sandbox::mojom::Sandbox sandbox_type) {
++  switch (sandbox_type) {
++    case sandbox::mojom::Sandbox::kNoSandbox:
++      return "Unsandboxed";
++    case sandbox::mojom::Sandbox::kRenderer:
++      return "Renderer";
++    case sandbox::mojom::Sandbox::kUtility:
++      return "Utility";
++    case sandbox::mojom::Sandbox::kGpu:
++      return "GPU";
++#if BUILDFLAG(ENABLE_PPAPI)
++    case sandbox::mojom::Sandbox::kPpapi:
++      return "PPAPI";
++#endif
++    case sandbox::mojom::Sandbox::kNetwork:
++      return "Network";
++    case sandbox::mojom::Sandbox::kCdm:
++      return "CDM";
++    case sandbox::mojom::Sandbox::kPrintCompositor:
++      return "Print Compositor";
++    case sandbox::mojom::Sandbox::kAudio:
++      return "Audio";
++    case sandbox::mojom::Sandbox::kSpeechRecognition:
++      return "Speech Recognition";
++    case sandbox::mojom::Sandbox::kService:
++      return "Service";
++    case sandbox::mojom::Sandbox::kVideoCapture:
++      return "Video Capture";
++    default:
++      return "Unknown";
++  }
++}
++
 +}  // namespace policy
 +}  // namespace sandbox
diff --git a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.h b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.h
index d29639097b..2ff2f24d47 100644
--- a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.h
+++ b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_netbsd_sandbox__netbsd.h
@@ -6,7 +6,7 @@ $NetBSD$
 
 --- src/3rdparty/chromium/sandbox/policy/netbsd/sandbox_netbsd.h.orig	2024-12-21 10:25:10.569588425 +0000
 +++ src/3rdparty/chromium/sandbox/policy/netbsd/sandbox_netbsd.h
-@@ -0,0 +1,276 @@
+@@ -0,0 +1,278 @@
 +// Copyright (c) 2012 The Chromium Authors. All rights reserved.
 +// Use of this source code is governed by a BSD-style license that can be
 +// found in the LICENSE file.
@@ -175,6 +175,8 @@ $NetBSD$
 +  // is called from inside these processes.
 +  int GetStatus();
 +
++  static std::string GetSandboxTypeInEnglish(sandbox::mojom::Sandbox sandbox_type);
++
 +  // Returns true if the current process is single-threaded or if the number
 +  // of threads cannot be determined.
 +  bool IsSingleThreaded() const;
diff --git a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.cc b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.cc
index e690c98cb0..9961b35082 100644
--- a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.cc
+++ b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.cc
@@ -4,9 +4,9 @@ $NetBSD$
 * Based on OpenBSD's chromium patches, and
   pkgsrc's qt5-qtwebengine patches
 
---- src/3rdparty/chromium/sandbox/policy/openbsd/sandbox_openbsd.cc.orig	2024-12-21 10:25:10.570415628 +0000
+--- src/3rdparty/chromium/sandbox/policy/openbsd/sandbox_openbsd.cc.orig	2025-04-24 23:51:17.243910682 +0000
 +++ src/3rdparty/chromium/sandbox/policy/openbsd/sandbox_openbsd.cc
-@@ -0,0 +1,392 @@
+@@ -0,0 +1,423 @@
 +// Copyright (c) 2012 The Chromium Authors. All rights reserved.
 +// Use of this source code is governed by a BSD-style license that can be
 +// found in the LICENSE file.
@@ -69,8 +69,7 @@ $NetBSD$
 +
 +#include "third_party/boringssl/src/include/openssl/crypto.h"
 +
-+#include <fontconfig/fontconfig.h>
-+#include "ui/gfx/linux/fontconfig_util.h"
++#include "ui/gfx/font_util.h"
 +
 +#define MAXTOKENS	3
 +
@@ -153,11 +152,8 @@ $NetBSD$
 +      break;
 +    }
 +    case sandbox::mojom::Sandbox::kRenderer:
-+    {
-+      FcConfig* config = gfx::GetGlobalFontConfig();
-+      DCHECK(config);
++      gfx::InitializeFonts();
 +      break;
-+    }
 +    default:
 +      break;
 +  }
@@ -209,7 +205,6 @@ $NetBSD$
 +      ufile = _UNVEIL_MAIN;
 +      break;
 +    case sandbox::mojom::Sandbox::kGpu:
-+    case sandbox::mojom::Sandbox::kOnDeviceModelExecution:
 +      ufile = _UNVEIL_GPU;
 +      break;
 +    case sandbox::mojom::Sandbox::kNetwork:
@@ -306,7 +301,7 @@ $NetBSD$
 +    return true;
 +
 +  VLOG(1) << "SandboxLinux::InitializeSandbox: process_type="
-+      << process_type << " sandbox_type=" << sandbox_type;
++      << process_type << " sandbox_type=" << GetSandboxTypeInEnglish(sandbox_type);
 +
 +  // Only one thread is running, pre-initialize if not already done.
 +  if (!pre_initialized_)
@@ -325,6 +320,8 @@ $NetBSD$
 +  if (hook)
 +    CHECK(std::move(hook).Run(options));
 +
++  /**
++   * XXX no pledge, unveil support in QtWebEngine
 +  if (!command_line->HasSwitch(switches::kDisableUnveil))
 +    SetUnveil(process_type, sandbox_type);
 +
@@ -338,7 +335,6 @@ $NetBSD$
 +      SetPledge("stdio rpath flock prot_exec recvfd sendfd ps", NULL);
 +      break;
 +    case sandbox::mojom::Sandbox::kGpu:
-+    case sandbox::mojom::Sandbox::kOnDeviceModelExecution:
 +      SetPledge("stdio drm rpath flock cpath wpath prot_exec recvfd sendfd tmppath", NULL);
 +      break;
 +#if BUILDFLAG(ENABLE_PPAPI)
@@ -361,9 +357,10 @@ $NetBSD$
 +      SetPledge("stdio rpath cpath wpath fattr flock sendfd recvfd prot_exec", NULL);
 +      break;
 +    default:
-+      LOG(ERROR) << "non-pledge()'d process: " << sandbox_type;
++      LOG(ERROR) << "non-pledge()'d process: " << GetSandboxTypeInEnglish(sandbox_type);
 +      break;
 +  }
++  XXX */
 +
 +  return true;
 +}
@@ -397,5 +394,39 @@ $NetBSD$
 +        // !defined(THREAD_SANITIZER) && !defined(LEAK_SANITIZER)
 +}
 +
++// static
++std::string SandboxLinux::GetSandboxTypeInEnglish(sandbox::mojom::Sandbox sandbox_type) {
++  switch (sandbox_type) {
++    case sandbox::mojom::Sandbox::kNoSandbox:
++      return "Unsandboxed";
++    case sandbox::mojom::Sandbox::kRenderer:
++      return "Renderer";
++    case sandbox::mojom::Sandbox::kUtility:
++      return "Utility";
++    case sandbox::mojom::Sandbox::kGpu:
++      return "GPU";
++#if BUILDFLAG(ENABLE_PPAPI)
++    case sandbox::mojom::Sandbox::kPpapi:
++      return "PPAPI";
++#endif
++    case sandbox::mojom::Sandbox::kNetwork:
++      return "Network";
++    case sandbox::mojom::Sandbox::kCdm:
++      return "CDM";
++    case sandbox::mojom::Sandbox::kPrintCompositor:
++      return "Print Compositor";
++    case sandbox::mojom::Sandbox::kAudio:
++      return "Audio";
++    case sandbox::mojom::Sandbox::kSpeechRecognition:
++      return "Speech Recognition";
++    case sandbox::mojom::Sandbox::kService:
++      return "Service";
++    case sandbox::mojom::Sandbox::kVideoCapture:
++      return "Video Capture";
++    default:
++      return "Unknown";
++  }
++}
++
 +}  // namespace policy
 +}  // namespace sandbox
diff --git a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.h b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.h
index 18f357bbf6..b65b87f576 100644
--- a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.h
+++ b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_openbsd_sandbox__openbsd.h
@@ -6,7 +6,7 @@ $NetBSD$
 
 --- src/3rdparty/chromium/sandbox/policy/openbsd/sandbox_openbsd.h.orig	2024-12-21 10:25:10.571038055 +0000
 +++ src/3rdparty/chromium/sandbox/policy/openbsd/sandbox_openbsd.h
-@@ -0,0 +1,280 @@
+@@ -0,0 +1,282 @@
 +// Copyright (c) 2012 The Chromium Authors. All rights reserved.
 +// Use of this source code is governed by a BSD-style license that can be
 +// found in the LICENSE file.
@@ -175,6 +175,8 @@ $NetBSD$
 +  // is called from inside these processes.
 +  int GetStatus();
 +
++  static std::string GetSandboxTypeInEnglish(sandbox::mojom::Sandbox sandbox_type);
++
 +  // Returns true if the current process is single-threaded or if the number
 +  // of threads cannot be determined.
 +  bool IsSingleThreaded() const;
diff --git a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_sandbox__type.cc b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_sandbox__type.cc
index 1da225f0fc..23a224ad2a 100644
--- a/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_sandbox__type.cc
+++ b/qt6-qtwebengine/patches/patch-src_3rdparty_chromium_sandbox_policy_sandbox__type.cc
@@ -4,7 +4,7 @@ $NetBSD$
 * Based on OpenBSD's chromium patches, and
   pkgsrc's qt5-qtwebengine patches
 
---- src/3rdparty/chromium/sandbox/policy/sandbox_type.cc.orig	2024-11-21 04:36:37.000000000 +0000
+--- src/3rdparty/chromium/sandbox/policy/sandbox_type.cc.orig	2025-03-18 19:28:59.000000000 +0000
 +++ src/3rdparty/chromium/sandbox/policy/sandbox_type.cc
 @@ -38,7 +38,7 @@ bool IsUnsandboxedSandboxType(Sandbox sa
  #endif
@@ -105,7 +105,12 @@ $NetBSD$
      case Sandbox::kZygoteIntermediateSandbox:
  #endif
        NOTREACHED();
-@@ -392,11 +392,11 @@ sandbox::mojom::Sandbox UtilitySandboxTy
+@@ -388,15 +388,15 @@ sandbox::mojom::Sandbox UtilitySandboxTy
+   if (sandbox_string == switches::kScreenAISandbox)
+     return Sandbox::kScreenAI;
+ #endif
+-#if BUILDFLAG(IS_FUCHSIA)
++#if BUILDFLAG(IS_FUCHSIA) || BUILDFLAG(IS_BSD)
    if (sandbox_string == switches::kVideoCaptureSandbox)
      return Sandbox::kVideoCapture;
  #endif


Home | Main Index | Thread Index | Old Index