blob: 356f7e6daae027de6733a84c5a7aed75b3dd3890 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
|
--- content/utility/speech/speech_recognition_sandbox_hook_linux.cc.orig 2022-02-07 13:39:41 UTC
+++ content/utility/speech/speech_recognition_sandbox_hook_linux.cc
@@ -12,11 +12,14 @@
#include "sandbox/linux/syscall_broker/broker_command.h"
#include "sandbox/linux/syscall_broker/broker_file_permission.h"
+#if !defined(OS_BSD)
using sandbox::syscall_broker::BrokerFilePermission;
using sandbox::syscall_broker::MakeBrokerCommandSet;
+#endif
namespace speech {
+#if !defined(OS_BSD)
namespace {
// Gets the file permissions required by the Speech On-Device API (SODA).
@@ -50,9 +53,11 @@ std::vector<BrokerFilePermission> GetSodaFilePermissio
}
} // namespace
+#endif
bool SpeechRecognitionPreSandboxHook(
sandbox::policy::SandboxLinux::Options options) {
+#if !defined(OS_BSD)
#if BUILDFLAG(ENABLE_SODA)
base::FilePath test_binary_path = GetSodaTestBinaryPath();
DVLOG(0) << "SODA test binary path: " << test_binary_path.value().c_str();
@@ -77,6 +82,7 @@ bool SpeechRecognitionPreSandboxHook(
sandbox::policy::SandboxLinux::PreSandboxHook(),
options);
instance->EngageNamespaceSandboxIfPossible();
+#endif
return true;
}
|