summaryrefslogtreecommitdiff
path: root/www/chromium/files/patch-sandbox_policy_sandbox.cc
diff options
context:
space:
mode:
authorMatthias Wolf <freebsd@rheinwolf.de>2022-02-01 18:38:49 +0100
committerRene Ladan <rene@FreeBSD.org>2022-02-01 18:45:40 +0100
commitaa70a996eae7376396a5dd8a9e5105bebb6bc72c (patch)
treeee91e0564101803a57091d4df8e4f3892eb8d0fc /www/chromium/files/patch-sandbox_policy_sandbox.cc
parentwww/firefox-esr: update to 91.6.0 (rc1) (diff)
www/chromium: update to 97.0.4692.99
Note that the port is currently broken on i386 as it does not compile there. Security: https://vuxml.freebsd.org/freebsd/51496cbc-7a0e-11ec-a323-3065ec8fd3ec.html Security: https://vuxml.freebsd.org/freebsd/9eeccbf3-6e26-11ec-bb10-3065ec8fd3ec.html Security: https://vuxml.freebsd.org/freebsd/fb9ba490-5cc4-11ec-aac7-3065ec8fd3ec.html Security: https://vuxml.freebsd.org/freebsd/18ac074c-579f-11ec-aac7-3065ec8fd3ec.html Security: https://vuxml.freebsd.org/freebsd/b8c0cbca-472d-11ec-83dc-3065ec8fd3ec.html Security: https://vuxml.freebsd.org/freebsd/976d7bf9-38ea-11ec-b3b0-3065ec8fd3ec.html Security: https://vuxml.freebsd.org/freebsd/bdaecfad-3117-11ec-b3b0-3065ec8fd3ec.html
Diffstat (limited to 'www/chromium/files/patch-sandbox_policy_sandbox.cc')
-rw-r--r--www/chromium/files/patch-sandbox_policy_sandbox.cc12
1 files changed, 6 insertions, 6 deletions
diff --git a/www/chromium/files/patch-sandbox_policy_sandbox.cc b/www/chromium/files/patch-sandbox_policy_sandbox.cc
index 855f4344dff6..8135427d7a88 100644
--- a/www/chromium/files/patch-sandbox_policy_sandbox.cc
+++ b/www/chromium/files/patch-sandbox_policy_sandbox.cc
@@ -1,6 +1,6 @@
---- sandbox/policy/sandbox.cc.orig 2021-06-11 14:21:39 UTC
+--- sandbox/policy/sandbox.cc.orig 2022-01-20 10:36:01 UTC
+++ sandbox/policy/sandbox.cc
-@@ -12,6 +12,10 @@
+@@ -13,6 +13,10 @@
#include "base/android/jni_android.h"
#endif // defined(OS_ANDROID)
@@ -11,20 +11,20 @@
#if defined(OS_LINUX) || defined(OS_CHROMEOS)
#include "sandbox/policy/linux/sandbox_linux.h"
#endif // defined(OS_LINUX) || defined(OS_CHROMEOS)
-@@ -29,6 +33,12 @@
+@@ -30,6 +34,12 @@
namespace sandbox {
namespace policy {
+#if defined(OS_FREEBSD)
-+bool Sandbox::Initialize(SandboxType sandbox_type) {
++bool Sandbox::Initialize(sandbox::mojom::Sandbox sandbox_type) {
+ return SandboxFreeBSD::GetInstance()->InitializeSandbox(sandbox_type);
+}
+#endif // defined(OS_FREEBSD)
+
#if defined(OS_LINUX) || defined(OS_CHROMEOS)
- bool Sandbox::Initialize(SandboxType sandbox_type,
+ bool Sandbox::Initialize(sandbox::mojom::Sandbox sandbox_type,
SandboxLinux::PreSandboxHook hook,
-@@ -89,6 +99,8 @@ bool Sandbox::IsProcessSandboxed() {
+@@ -90,6 +100,8 @@ bool Sandbox::IsProcessSandboxed() {
base::android::MethodID::Get<base::android::MethodID::TYPE_STATIC>(
env, process_class.obj(), "isIsolated", "()Z");
return env->CallStaticBooleanMethod(process_class.obj(), is_isolated);