aboutsummaryrefslogtreecommitdiff
path: root/devel/electron23/files/patch-content_gpu_gpu__sandbox__hook__linux.cc
diff options
context:
space:
mode:
Diffstat (limited to 'devel/electron23/files/patch-content_gpu_gpu__sandbox__hook__linux.cc')
-rw-r--r--devel/electron23/files/patch-content_gpu_gpu__sandbox__hook__linux.cc70
1 files changed, 70 insertions, 0 deletions
diff --git a/devel/electron23/files/patch-content_gpu_gpu__sandbox__hook__linux.cc b/devel/electron23/files/patch-content_gpu_gpu__sandbox__hook__linux.cc
new file mode 100644
index 000000000000..bab201f7af90
--- /dev/null
+++ b/devel/electron23/files/patch-content_gpu_gpu__sandbox__hook__linux.cc
@@ -0,0 +1,70 @@
+--- content/gpu/gpu_sandbox_hook_linux.cc.orig 2023-02-01 18:43:19 UTC
++++ content/gpu/gpu_sandbox_hook_linux.cc
+@@ -126,6 +126,7 @@ void AddStandardChromeOsPermissions(
+ }
+ }
+
++#if !defined(OS_BSD)
+ void AddV4L2GpuPermissions(
+ std::vector<BrokerFilePermission>* permissions,
+ const sandbox::policy::SandboxSeccompBPF::Options& options) {
+@@ -445,8 +446,10 @@ std::vector<BrokerFilePermission> FilePermissionsForGp
+ AddStandardGpuPermissions(&permissions);
+ return permissions;
+ }
++#endif
+
+ void LoadArmGpuLibraries() {
++#if !defined(OS_BSD)
+ // Preload the Mali library.
+ if (UseChromecastSandboxAllowlist()) {
+ for (const char* path : kAllowedChromecastPaths) {
+@@ -488,6 +491,7 @@ void LoadArmGpuLibraries() {
+ dlopen(driver_paths[i], dlopen_flag);
+ }
+ }
++#endif
+ }
+
+ bool LoadAmdGpuLibraries() {
+@@ -555,12 +559,14 @@ void LoadV4L2Libraries(
+ }
+
+ void LoadChromecastV4L2Libraries() {
++#if !defined(OS_BSD)
+ for (const char* path : kAllowedChromecastPaths) {
+ const std::string library_path(std::string(path) +
+ std::string("libvpcodec.so"));
+ if (dlopen(library_path.c_str(), dlopen_flag))
+ break;
+ }
++#endif
+ }
+
+ bool LoadLibrariesForGpu(
+@@ -588,6 +594,7 @@ bool LoadLibrariesForGpu(
+ return true;
+ }
+
++#if !defined(OS_BSD)
+ sandbox::syscall_broker::BrokerCommandSet CommandSetForGPU(
+ const sandbox::policy::SandboxLinux::Options& options) {
+ sandbox::syscall_broker::BrokerCommandSet command_set;
+@@ -610,13 +617,17 @@ bool BrokerProcessPreSandboxHook(
+ SetProcessTitleFromCommandLine(nullptr);
+ return true;
+ }
++#endif
+
+ } // namespace
+
+ bool GpuProcessPreSandboxHook(sandbox::policy::SandboxLinux::Options options) {
++ NOTIMPLEMENTED();
++#if !defined(OS_BSD)
+ sandbox::policy::SandboxLinux::GetInstance()->StartBrokerProcess(
+ CommandSetForGPU(options), FilePermissionsForGpu(options),
+ base::BindOnce(BrokerProcessPreSandboxHook), options);
++#endif
+
+ if (!LoadLibrariesForGpu(options))
+ return false;