blob: fc3372ba765a04a5eece6f968288c5363acaf0bf (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
|
--- services/network/network_sandbox_hook_linux.cc.orig 2024-04-19 13:02:56 UTC
+++ services/network/network_sandbox_hook_linux.cc
@@ -15,11 +15,14 @@
#include "sandbox/linux/syscall_broker/broker_file_permission.h"
#include "sandbox/policy/features.h"
+#if !BUILDFLAG(IS_BSD)
using sandbox::syscall_broker::BrokerFilePermission;
using sandbox::syscall_broker::MakeBrokerCommandSet;
+#endif
namespace network {
+#if !BUILDFLAG(IS_BSD)
sandbox::syscall_broker::BrokerCommandSet GetNetworkBrokerCommandSet() {
return MakeBrokerCommandSet({
sandbox::syscall_broker::COMMAND_ACCESS,
@@ -103,9 +106,11 @@ void LoadNetworkLibraries() {
}
}
#endif // BUILDFLAG(IS_CHROMEOS)
+#endif
bool NetworkPreSandboxHook(std::vector<std::string> network_context_parent_dirs,
sandbox::policy::SandboxLinux::Options options) {
+#if !BUILDFLAG(IS_BSD)
#if BUILDFLAG(IS_CHROMEOS)
LoadNetworkLibraries();
#endif
@@ -118,6 +123,7 @@ bool NetworkPreSandboxHook(std::vector<std::string> ne
GetNetworkBrokerCommandSet(),
GetNetworkFilePermissions(std::move(network_context_parent_dirs)),
options);
+#endif
return true;
}
|