You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
142 lines
5.2 KiB
142 lines
5.2 KiB
diff -up chromium-110.0.5481.77/sandbox/policy/linux/bpf_hardware_video_decoding_policy_linux.cc.me chromium-110.0.5481.77/sandbox/policy/linux/bpf_hardware_video_decoding_policy_linux.cc
|
|
--- chromium-110.0.5481.77/sandbox/policy/linux/bpf_hardware_video_decoding_policy_linux.cc.me 2023-02-08 20:34:02.700010846 +0100
|
|
+++ chromium-110.0.5481.77/sandbox/policy/linux/bpf_hardware_video_decoding_policy_linux.cc 2023-02-08 20:35:30.455580670 +0100
|
|
@@ -4,7 +4,9 @@
|
|
|
|
#include "sandbox/policy/linux/bpf_hardware_video_decoding_policy_linux.h"
|
|
|
|
-#include <linux/kcmp.h>
|
|
+#ifndef KCMP_FILE
|
|
+#define KCMP_FILE 0
|
|
+#endif
|
|
|
|
#include "media/gpu/buildflags.h"
|
|
#include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
|
|
diff -up chromium-99.0.4844.51/mojo/core/channel_linux.cc.epel7-header-workarounds chromium-99.0.4844.51/mojo/core/channel_linux.cc
|
|
--- chromium-99.0.4844.51/mojo/core/channel_linux.cc.epel7-header-workarounds 2022-02-28 19:05:54.000000000 -0500
|
|
+++ chromium-99.0.4844.51/mojo/core/channel_linux.cc 2022-03-05 14:50:49.876812909 -0500
|
|
@@ -44,6 +44,25 @@
|
|
#include "base/android/build_info.h"
|
|
#endif
|
|
|
|
+#ifndef F_LINUX_SPECIFIC_BASE
|
|
+#define F_LINUX_SPECIFIC_BASE 1024
|
|
+#endif
|
|
+#ifndef F_SEAL_SEAL
|
|
+#define F_SEAL_SEAL 0x0001
|
|
+#endif
|
|
+#ifndef F_SEAL_SHRINK
|
|
+#define F_SEAL_SHRINK 0x0002
|
|
+#endif
|
|
+#ifndef F_SEAL_GROW
|
|
+#define F_SEAL_GROW 0x0004
|
|
+#endif
|
|
+#ifndef F_ADD_SEALS
|
|
+#define F_ADD_SEALS (F_LINUX_SPECIFIC_BASE + 9)
|
|
+#endif
|
|
+#ifndef F_GET_SEALS
|
|
+#define F_GET_SEALS (F_LINUX_SPECIFIC_BASE + 10)
|
|
+#endif
|
|
+
|
|
#ifndef EFD_ZERO_ON_WAKE
|
|
#define EFD_ZERO_ON_WAKE O_NOFOLLOW
|
|
#endif
|
|
diff -up chromium-99.0.4844.51/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc.epel7-header-workarounds chromium-99.0.4844.51/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc
|
|
--- chromium-99.0.4844.51/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc.epel7-header-workarounds 2022-03-05 14:50:49.877812915 -0500
|
|
+++ chromium-99.0.4844.51/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc 2022-03-05 15:15:02.536867009 -0500
|
|
@@ -53,6 +53,25 @@
|
|
|
|
#endif // BUILDFLAG(IS_ANDROID)
|
|
|
|
+#ifndef F_LINUX_SPECIFIC_BASE
|
|
+#define F_LINUX_SPECIFIC_BASE 1024
|
|
+#endif
|
|
+#ifndef F_SEAL_SEAL
|
|
+#define F_SEAL_SEAL 0x0001
|
|
+#endif
|
|
+#ifndef F_SEAL_SHRINK
|
|
+#define F_SEAL_SHRINK 0x0002
|
|
+#endif
|
|
+#ifndef F_SEAL_GROW
|
|
+#define F_SEAL_GROW 0x0004
|
|
+#endif
|
|
+#ifndef F_ADD_SEALS
|
|
+#define F_ADD_SEALS (F_LINUX_SPECIFIC_BASE + 9)
|
|
+#endif
|
|
+#ifndef F_GET_SEALS
|
|
+#define F_GET_SEALS (F_LINUX_SPECIFIC_BASE + 10)
|
|
+#endif
|
|
+
|
|
#if defined(__arm__) && !defined(MAP_STACK)
|
|
#define MAP_STACK 0x20000 // Daisy build environment has old headers.
|
|
#endif
|
|
diff -up chromium-99.0.4844.51/sandbox/policy/linux/bpf_cros_amd_gpu_policy_linux.cc.epel7-header-workarounds chromium-99.0.4844.51/sandbox/policy/linux/bpf_cros_amd_gpu_policy_linux.cc
|
|
--- chromium-99.0.4844.51/sandbox/policy/linux/bpf_cros_amd_gpu_policy_linux.cc.epel7-header-workarounds 2022-02-28 19:05:55.000000000 -0500
|
|
+++ chromium-99.0.4844.51/sandbox/policy/linux/bpf_cros_amd_gpu_policy_linux.cc 2022-03-05 14:50:49.877812915 -0500
|
|
@@ -6,7 +6,24 @@
|
|
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
-#include <linux/kcmp.h>
|
|
+#ifndef KCMP_FILE
|
|
+#define KCMP_FILE 0
|
|
+#endif
|
|
+#ifndef F_LINUX_SPECIFIC_BASE
|
|
+#define F_LINUX_SPECIFIC_BASE 1024
|
|
+#endif
|
|
+#ifndef F_SEAL_SEAL
|
|
+#define F_SEAL_SEAL 0x0001
|
|
+#endif
|
|
+#ifndef F_SEAL_SHRINK
|
|
+#define F_SEAL_SHRINK 0x0002
|
|
+#endif
|
|
+#ifndef F_SEAL_GROW
|
|
+#define F_SEAL_GROW 0x0004
|
|
+#endif
|
|
+#ifndef F_ADD_SEALS
|
|
+#define F_ADD_SEALS (F_LINUX_SPECIFIC_BASE + 9)
|
|
+#endif
|
|
#include <sys/socket.h>
|
|
|
|
// Some arch's (arm64 for instance) unistd.h don't pull in symbols used here
|
|
diff -up chromium-99.0.4844.51/sandbox/policy/linux/bpf_gpu_policy_linux.cc.epel7-header-workarounds chromium-99.0.4844.51/sandbox/policy/linux/bpf_gpu_policy_linux.cc
|
|
--- chromium-99.0.4844.51/sandbox/policy/linux/bpf_gpu_policy_linux.cc.epel7-header-workarounds 2022-02-28 19:05:55.000000000 -0500
|
|
+++ chromium-99.0.4844.51/sandbox/policy/linux/bpf_gpu_policy_linux.cc 2022-03-05 14:50:49.877812915 -0500
|
|
@@ -22,6 +22,22 @@
|
|
#include "sandbox/policy/linux/sandbox_linux.h"
|
|
#include "sandbox/policy/linux/sandbox_seccomp_bpf_linux.h"
|
|
|
|
+#ifndef F_LINUX_SPECIFIC_BASE
|
|
+#define F_LINUX_SPECIFIC_BASE 1024
|
|
+#endif
|
|
+#ifndef F_SEAL_SEAL
|
|
+#define F_SEAL_SEAL 0x0001
|
|
+#endif
|
|
+#ifndef F_SEAL_SHRINK
|
|
+#define F_SEAL_SHRINK 0x0002
|
|
+#endif
|
|
+#ifndef F_SEAL_GROW
|
|
+#define F_SEAL_GROW 0x0004
|
|
+#endif
|
|
+#ifndef F_ADD_SEALS
|
|
+#define F_ADD_SEALS (F_LINUX_SPECIFIC_BASE + 9)
|
|
+#endif
|
|
+
|
|
using sandbox::bpf_dsl::AllOf;
|
|
using sandbox::bpf_dsl::Allow;
|
|
using sandbox::bpf_dsl::Arg;
|
|
diff -up chromium-99.0.4844.51/ui/events/ozone/evdev/event_converter_evdev_impl.cc.epel7-header-workarounds chromium-99.0.4844.51/ui/events/ozone/evdev/event_converter_evdev_impl.cc
|
|
--- chromium-99.0.4844.51/ui/events/ozone/evdev/event_converter_evdev_impl.cc.epel7-header-workarounds 2022-02-28 19:06:49.000000000 -0500
|
|
+++ chromium-99.0.4844.51/ui/events/ozone/evdev/event_converter_evdev_impl.cc 2022-03-05 14:50:49.877812915 -0500
|
|
@@ -23,6 +23,10 @@
|
|
#include "ui/events/ozone/evdev/numberpad_metrics.h"
|
|
#endif
|
|
|
|
+#ifndef SW_PEN_INSERTED
|
|
+#define SW_PEN_INSERTED 0x0f /* set = pen inserted */
|
|
+#endif
|
|
+
|
|
namespace ui {
|
|
|
|
namespace {
|