aboutsummaryrefslogtreecommitdiff
path: root/devel/electron38/files/patch-services_audio_audio__sandbox__hook__linux.cc
diff options
context:
space:
mode:
Diffstat (limited to 'devel/electron38/files/patch-services_audio_audio__sandbox__hook__linux.cc')
-rw-r--r--devel/electron38/files/patch-services_audio_audio__sandbox__hook__linux.cc31
1 files changed, 31 insertions, 0 deletions
diff --git a/devel/electron38/files/patch-services_audio_audio__sandbox__hook__linux.cc b/devel/electron38/files/patch-services_audio_audio__sandbox__hook__linux.cc
new file mode 100644
index 000000000000..2668a91ab634
--- /dev/null
+++ b/devel/electron38/files/patch-services_audio_audio__sandbox__hook__linux.cc
@@ -0,0 +1,31 @@
+--- services/audio/audio_sandbox_hook_linux.cc.orig 2025-06-30 07:04:30 UTC
++++ services/audio/audio_sandbox_hook_linux.cc
+@@ -147,6 +147,7 @@ void AddPulseAudioFilePermissions(
+ }
+ #endif
+
++#if !BUILDFLAG(IS_BSD)
+ std::vector<BrokerFilePermission> GetAudioFilePermissions() {
+ std::vector<BrokerFilePermission> permissions{
+ BrokerFilePermission::ReadOnly("/dev/urandom"),
+@@ -175,10 +176,12 @@ void LoadAudioLibraries() {
+ }
+ }
+ }
++#endif
+
+ } // namespace
+
+ bool AudioPreSandboxHook(sandbox::policy::SandboxLinux::Options options) {
++#if !BUILDFLAG(IS_BSD)
+ LoadAudioLibraries();
+ auto* instance = sandbox::policy::SandboxLinux::GetInstance();
+ instance->StartBrokerProcess(MakeBrokerCommandSet({
+@@ -196,6 +199,7 @@ bool AudioPreSandboxHook(sandbox::policy::SandboxLinux
+ // TODO(crbug.com/40579955) enable namespace sandbox. Currently, if
+ // enabled, connect() on pulse native socket fails with ENOENT (called from
+ // pa_context_connect).
++#endif
+
+ return true;
+ }