blob: a7e1ceef53df1717f8f51d1cc16f6441ece9e444 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
|
--- src/3rdparty/chromium/services/network/network_sandbox_hook_linux.cc.orig 2023-05-31 08:12:17 UTC
+++ src/3rdparty/chromium/services/network/network_sandbox_hook_linux.cc
@@ -14,11 +14,14 @@
#include "sandbox/policy/features.h"
#include "third_party/abseil-cpp/absl/types/optional.h"
+#if !BUILDFLAG(IS_BSD)
using sandbox::syscall_broker::BrokerFilePermission;
using sandbox::syscall_broker::MakeBrokerCommandSet;
+#endif
namespace network {
+#if !BUILDFLAG(IS_BSD)
sandbox::syscall_broker::BrokerCommandSet GetNetworkBrokerCommandSet() {
return MakeBrokerCommandSet({
sandbox::syscall_broker::COMMAND_ACCESS,
@@ -102,9 +105,11 @@ void LoadNetworkLibraries() {
}
}
#endif // BUILDFLAG(IS_CHROMEOS)
+#endif
bool NetworkPreSandboxHook(std::vector<std::string> network_context_parent_dirs,
sandbox::policy::SandboxLinux::Options options) {
+#if !BUILDFLAG(IS_BSD)
#if BUILDFLAG(IS_CHROMEOS)
LoadNetworkLibraries();
#endif
@@ -117,6 +122,7 @@ bool NetworkPreSandboxHook(std::vector<std::string> ne
GetNetworkBrokerCommandSet(),
GetNetworkFilePermissions(std::move(network_context_parent_dirs)),
sandbox::policy::SandboxLinux::PreSandboxHook(), options);
+#endif
return true;
}
|