aboutsummaryrefslogtreecommitdiff
path: root/www/iridium/files/patch-services_audio_audio__sandbox__hook__linux.cc
diff options
context:
space:
mode:
Diffstat (limited to 'www/iridium/files/patch-services_audio_audio__sandbox__hook__linux.cc')
-rw-r--r--www/iridium/files/patch-services_audio_audio__sandbox__hook__linux.cc8
1 files changed, 4 insertions, 4 deletions
diff --git a/www/iridium/files/patch-services_audio_audio__sandbox__hook__linux.cc b/www/iridium/files/patch-services_audio_audio__sandbox__hook__linux.cc
index d8a53e16c43c..2afa95de116d 100644
--- a/www/iridium/files/patch-services_audio_audio__sandbox__hook__linux.cc
+++ b/www/iridium/files/patch-services_audio_audio__sandbox__hook__linux.cc
@@ -1,6 +1,6 @@
---- services/audio/audio_sandbox_hook_linux.cc.orig 2025-05-07 06:48:23 UTC
+--- services/audio/audio_sandbox_hook_linux.cc.orig 2025-06-19 07:37:57 UTC
+++ services/audio/audio_sandbox_hook_linux.cc
-@@ -143,6 +143,7 @@ void AddPulseAudioFilePermissions(
+@@ -147,6 +147,7 @@ void AddPulseAudioFilePermissions(
}
#endif
@@ -8,7 +8,7 @@
std::vector<BrokerFilePermission> GetAudioFilePermissions() {
std::vector<BrokerFilePermission> permissions{
BrokerFilePermission::ReadOnly("/dev/urandom"),
-@@ -171,10 +172,12 @@ void LoadAudioLibraries() {
+@@ -175,10 +176,12 @@ void LoadAudioLibraries() {
}
}
}
@@ -21,7 +21,7 @@
LoadAudioLibraries();
auto* instance = sandbox::policy::SandboxLinux::GetInstance();
instance->StartBrokerProcess(MakeBrokerCommandSet({
-@@ -192,6 +195,7 @@ bool AudioPreSandboxHook(sandbox::policy::SandboxLinux
+@@ -196,6 +199,7 @@ bool AudioPreSandboxHook(sandbox::policy::SandboxLinux
// TODO(crbug.com/40579955) enable namespace sandbox. Currently, if
// enabled, connect() on pulse native socket fails with ENOENT (called from
// pa_context_connect).