From aa70a996eae7376396a5dd8a9e5105bebb6bc72c Mon Sep 17 00:00:00 2001 From: Matthias Wolf Date: Tue, 1 Feb 2022 18:38:49 +0100 Subject: www/chromium: update to 97.0.4692.99 Note that the port is currently broken on i386 as it does not compile there. Security: https://vuxml.freebsd.org/freebsd/51496cbc-7a0e-11ec-a323-3065ec8fd3ec.html Security: https://vuxml.freebsd.org/freebsd/9eeccbf3-6e26-11ec-bb10-3065ec8fd3ec.html Security: https://vuxml.freebsd.org/freebsd/fb9ba490-5cc4-11ec-aac7-3065ec8fd3ec.html Security: https://vuxml.freebsd.org/freebsd/18ac074c-579f-11ec-aac7-3065ec8fd3ec.html Security: https://vuxml.freebsd.org/freebsd/b8c0cbca-472d-11ec-83dc-3065ec8fd3ec.html Security: https://vuxml.freebsd.org/freebsd/976d7bf9-38ea-11ec-b3b0-3065ec8fd3ec.html Security: https://vuxml.freebsd.org/freebsd/bdaecfad-3117-11ec-b3b0-3065ec8fd3ec.html --- www/chromium/files/patch-sandbox_policy_sandbox.cc | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) (limited to 'www/chromium/files/patch-sandbox_policy_sandbox.cc') diff --git a/www/chromium/files/patch-sandbox_policy_sandbox.cc b/www/chromium/files/patch-sandbox_policy_sandbox.cc index 855f4344dff6..8135427d7a88 100644 --- a/www/chromium/files/patch-sandbox_policy_sandbox.cc +++ b/www/chromium/files/patch-sandbox_policy_sandbox.cc @@ -1,6 +1,6 @@ ---- sandbox/policy/sandbox.cc.orig 2021-06-11 14:21:39 UTC +--- sandbox/policy/sandbox.cc.orig 2022-01-20 10:36:01 UTC +++ sandbox/policy/sandbox.cc -@@ -12,6 +12,10 @@ +@@ -13,6 +13,10 @@ #include "base/android/jni_android.h" #endif // defined(OS_ANDROID) @@ -11,20 +11,20 @@ #if defined(OS_LINUX) || defined(OS_CHROMEOS) #include "sandbox/policy/linux/sandbox_linux.h" #endif // defined(OS_LINUX) || defined(OS_CHROMEOS) -@@ -29,6 +33,12 @@ +@@ -30,6 +34,12 @@ namespace sandbox { namespace policy { +#if defined(OS_FREEBSD) -+bool Sandbox::Initialize(SandboxType sandbox_type) { ++bool Sandbox::Initialize(sandbox::mojom::Sandbox sandbox_type) { + return SandboxFreeBSD::GetInstance()->InitializeSandbox(sandbox_type); +} +#endif // defined(OS_FREEBSD) + #if defined(OS_LINUX) || defined(OS_CHROMEOS) - bool Sandbox::Initialize(SandboxType sandbox_type, + bool Sandbox::Initialize(sandbox::mojom::Sandbox sandbox_type, SandboxLinux::PreSandboxHook hook, -@@ -89,6 +99,8 @@ bool Sandbox::IsProcessSandboxed() { +@@ -90,6 +100,8 @@ bool Sandbox::IsProcessSandboxed() { base::android::MethodID::Get( env, process_class.obj(), "isIsolated", "()Z"); return env->CallStaticBooleanMethod(process_class.obj(), is_isolated); -- cgit v1.2.3