diff options
author | Matthias Wolf <matthias@rheinwolf.de> | 2021-06-17 11:22:35 +0200 |
---|---|---|
committer | Rene Ladan <rene@FreeBSD.org> | 2021-06-17 11:28:36 +0200 |
commit | 06317815238060a3a7f5911f18a3dd7c95779c83 (patch) | |
tree | 142df5b4e1e27da8f00b667eb5b8656cb0234ec0 /www/chromium/files/patch-sandbox_policy_sandbox.cc | |
parent | dns/bundy: Mark as broken on FreeBSD 14. (diff) |
www/chromium: update to 91.0.4472.101
Security: https://vuxml.freebsd.org/freebsd/20b3ab21-c9df-11eb-8558-3065ec8fd3ec.html
Diffstat (limited to 'www/chromium/files/patch-sandbox_policy_sandbox.cc')
-rw-r--r-- | www/chromium/files/patch-sandbox_policy_sandbox.cc | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/www/chromium/files/patch-sandbox_policy_sandbox.cc b/www/chromium/files/patch-sandbox_policy_sandbox.cc new file mode 100644 index 000000000000..855f4344dff6 --- /dev/null +++ b/www/chromium/files/patch-sandbox_policy_sandbox.cc @@ -0,0 +1,35 @@ +--- sandbox/policy/sandbox.cc.orig 2021-06-11 14:21:39 UTC ++++ sandbox/policy/sandbox.cc +@@ -12,6 +12,10 @@ + #include "base/android/jni_android.h" + #endif // defined(OS_ANDROID) + ++#if defined(OS_FREEBSD) ++#include "sandbox/policy/freebsd/sandbox_freebsd.h" ++#endif // defined(OS_FREEBSD) ++ + #if defined(OS_LINUX) || defined(OS_CHROMEOS) + #include "sandbox/policy/linux/sandbox_linux.h" + #endif // defined(OS_LINUX) || defined(OS_CHROMEOS) +@@ -29,6 +33,12 @@ + namespace sandbox { + namespace policy { + ++#if defined(OS_FREEBSD) ++bool Sandbox::Initialize(SandboxType sandbox_type) { ++ return SandboxFreeBSD::GetInstance()->InitializeSandbox(sandbox_type); ++} ++#endif // defined(OS_FREEBSD) ++ + #if defined(OS_LINUX) || defined(OS_CHROMEOS) + bool Sandbox::Initialize(SandboxType sandbox_type, + SandboxLinux::PreSandboxHook hook, +@@ -89,6 +99,8 @@ bool Sandbox::IsProcessSandboxed() { + base::android::MethodID::Get<base::android::MethodID::TYPE_STATIC>( + env, process_class.obj(), "isIsolated", "()Z"); + return env->CallStaticBooleanMethod(process_class.obj(), is_isolated); ++#elif defined(OS_FREEBSD) ++ return SandboxFreeBSD::GetInstance()->IsSandboxed(); + #elif defined(OS_FUCHSIA) + // TODO(https://crbug.com/1071420): Figure out what to do here. Process + // launching controls the sandbox and there are no ambient capabilities, so |