aboutsummaryrefslogtreecommitdiff
path: root/www/chromium/files/patch-sandbox_linux_BUILD.gn
diff options
context:
space:
mode:
authorRene Ladan <rene@FreeBSD.org>2022-02-20 11:35:15 +0000
committerRene Ladan <rene@FreeBSD.org>2022-02-20 11:42:02 +0000
commita23dfd214ae04e8b4d116ca6411570b684eb5ed6 (patch)
treea42703b6563673398eee97ae6ad4d01eafd77738 /www/chromium/files/patch-sandbox_linux_BUILD.gn
parent9341f0aca4ecea11124957da5ea6384640745e43 (diff)
downloadports-a23dfd214ae04e8b4d116ca6411570b684eb5ed6.tar.gz
ports-a23dfd214ae04e8b4d116ca6411570b684eb5ed6.zip
www/chromium: update to 98.0.4758.102
- The port now uses the combined patch set for OpenBSD and FreeBSD maintained by Robert Nagy. - Fix build on i386 again. Obtained from: Robert Nagy <robert@openbsd.org> Security: https://vuxml.freebsd.org/freebsd/e12432af-8e73-11ec-8bc4-3065ec8fd3ec.html Security: https://vuxml.freebsd.org/freebsd/e852f43c-846e-11ec-b043-3065ec8fd3ec.html
Diffstat (limited to 'www/chromium/files/patch-sandbox_linux_BUILD.gn')
-rw-r--r--www/chromium/files/patch-sandbox_linux_BUILD.gn68
1 files changed, 53 insertions, 15 deletions
diff --git a/www/chromium/files/patch-sandbox_linux_BUILD.gn b/www/chromium/files/patch-sandbox_linux_BUILD.gn
index b95954427fce..6a4fd43ab003 100644
--- a/www/chromium/files/patch-sandbox_linux_BUILD.gn
+++ b/www/chromium/files/patch-sandbox_linux_BUILD.gn
@@ -1,20 +1,58 @@
---- sandbox/linux/BUILD.gn.orig 2021-12-31 00:57:38 UTC
+--- sandbox/linux/BUILD.gn.orig 2022-02-07 13:39:41 UTC
+++ sandbox/linux/BUILD.gn
-@@ -394,7 +394,7 @@ component("sandbox_services") {
- deps += [ ":sandbox_services_headers" ]
- }
+@@ -12,12 +12,12 @@ if (is_android) {
+ }
+
+ declare_args() {
+- compile_suid_client = is_linux || is_chromeos
++ compile_suid_client = (is_linux || is_chromeos) && !is_bsd
-- if (is_nacl_nonsfi) {
-+ if (is_nacl_nonsfi || is_bsd) {
- cflags = [ "-fgnu-inline-asm" ]
+- compile_credentials = is_linux || is_chromeos
++ compile_credentials = (is_linux || is_chromeos) && !is_bsd
- sources -= [
-@@ -402,6 +402,8 @@ component("sandbox_services") {
- "services/init_process_reaper.h",
- "services/scoped_process.cc",
- "services/scoped_process.h",
+ # On Android, use plain GTest.
+- use_base_test_suite = is_linux || is_chromeos
++ use_base_test_suite = (is_linux || is_chromeos) && !is_bsd
+ }
+
+ # We have two principal targets: sandbox and sandbox_linux_unittests
+@@ -367,6 +367,39 @@ component("sandbox_services") {
+ sources += [
+ "services/libc_interceptor.cc",
+ "services/libc_interceptor.h",
++ ]
++ }
++
++ if (is_bsd) {
++ sources -= [
++ "services/scoped_process.cc",
++ "services/scoped_process.h",
+ "services/syscall_wrappers.cc",
+ "services/syscall_wrappers.h",
- "services/yama.cc",
- "services/yama.h",
- "syscall_broker/broker_channel.cc",
++ "services/yama.cc",
++ "services/yama.h",
++ "syscall_broker/broker_channel.cc",
++ "syscall_broker/broker_channel.h",
++ "syscall_broker/broker_client.cc",
++ "syscall_broker/broker_client.h",
++ "syscall_broker/broker_command.cc",
++ "syscall_broker/broker_command.h",
++ "syscall_broker/broker_file_permission.cc",
++ "syscall_broker/broker_file_permission.h",
++ "syscall_broker/broker_host.cc",
++ "syscall_broker/broker_host.h",
++ "syscall_broker/broker_permission_list.cc",
++ "syscall_broker/broker_permission_list.h",
++ "syscall_broker/broker_process.cc",
++ "syscall_broker/broker_process.h",
++ "syscall_broker/broker_sandbox_config.cc",
++ "syscall_broker/broker_sandbox_config.h",
++ "syscall_broker/broker_simple_message.cc",
++ "syscall_broker/broker_simple_message.h",
++ "syscall_broker/remote_syscall_arg_handler.cc",
++ "syscall_broker/remote_syscall_arg_handler.h",
++ "syscall_broker/syscall_dispatcher.cc",
++ "syscall_broker/syscall_dispatcher.h",
+ ]
+ }
+ }