summaryrefslogtreecommitdiff
path: root/www/chromium/files/patch-sandbox_policy_openbsd_sandbox__openbsd.h
diff options
context:
space:
mode:
Diffstat (limited to 'www/chromium/files/patch-sandbox_policy_openbsd_sandbox__openbsd.h')
-rw-r--r--www/chromium/files/patch-sandbox_policy_openbsd_sandbox__openbsd.h8
1 files changed, 6 insertions, 2 deletions
diff --git a/www/chromium/files/patch-sandbox_policy_openbsd_sandbox__openbsd.h b/www/chromium/files/patch-sandbox_policy_openbsd_sandbox__openbsd.h
index 25ac98d7be0c..5e1af030852b 100644
--- a/www/chromium/files/patch-sandbox_policy_openbsd_sandbox__openbsd.h
+++ b/www/chromium/files/patch-sandbox_policy_openbsd_sandbox__openbsd.h
@@ -1,6 +1,6 @@
---- sandbox/policy/openbsd/sandbox_openbsd.h.orig 2022-02-07 13:39:41 UTC
+--- sandbox/policy/openbsd/sandbox_openbsd.h.orig 2022-03-25 21:59:56 UTC
+++ sandbox/policy/openbsd/sandbox_openbsd.h
-@@ -0,0 +1,278 @@
+@@ -0,0 +1,282 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
@@ -178,6 +178,9 @@
+ // Returns true if we started Seccomp BPF.
+ bool seccomp_bpf_started() const;
+
++ // Returns true if unveil(2) is used.
++ bool unveil_initialized() const;
++
+ // Check the policy and eventually start the seccomp-bpf sandbox. This should
+ // never be called with threads started. If we detect that threads have
+ // started we will crash.
@@ -261,6 +264,7 @@
+ int proc_fd_;
+
+ bool seccomp_bpf_started_;
++ bool unveil_initialized_;
+ // The value returned by GetStatus(). Gets computed once and then cached.
+ int sandbox_status_flags_;
+ // Did PreinitializeSandbox() run?